15
15
package cmd
16
16
17
17
import (
18
+ "fmt"
19
+ "net/netip"
20
+ "os"
21
+
18
22
"istio.io/istio/tools/istio-clean-iptables/pkg/config"
19
23
"istio.io/istio/tools/istio-iptables/pkg/builder"
20
24
common "istio.io/istio/tools/istio-iptables/pkg/capture"
@@ -37,6 +41,42 @@ type IptablesCleaner struct {
37
41
ipt6V * dep.IptablesVersion
38
42
}
39
43
44
+ type NetworkRange struct {
45
+ IsWildcard bool
46
+ CIDRs []netip.Prefix
47
+ HasLoopBackIP bool
48
+ }
49
+
50
+ func separateV4V6 (cidrList string ) (NetworkRange , NetworkRange , error ) {
51
+ if cidrList == "*" {
52
+ return NetworkRange {IsWildcard : true }, NetworkRange {IsWildcard : true }, nil
53
+ }
54
+ ipv6Ranges := NetworkRange {}
55
+ ipv4Ranges := NetworkRange {}
56
+ for _ , ipRange := range types .Split (cidrList ) {
57
+ ipp , err := netip .ParsePrefix (ipRange )
58
+ if err != nil {
59
+ _ , err = fmt .Fprintf (os .Stderr , "Ignoring error for bug compatibility with istio-iptables: %s\n " , err .Error ())
60
+ if err != nil {
61
+ return ipv4Ranges , ipv6Ranges , err
62
+ }
63
+ continue
64
+ }
65
+ if ipp .Addr ().Is4 () {
66
+ ipv4Ranges .CIDRs = append (ipv4Ranges .CIDRs , ipp )
67
+ if ipp .Addr ().IsLoopback () {
68
+ ipv4Ranges .HasLoopBackIP = true
69
+ }
70
+ } else {
71
+ ipv6Ranges .CIDRs = append (ipv6Ranges .CIDRs , ipp )
72
+ if ipp .Addr ().IsLoopback () {
73
+ ipv6Ranges .HasLoopBackIP = true
74
+ }
75
+ }
76
+ }
77
+ return ipv4Ranges , ipv6Ranges , nil
78
+ }
79
+
40
80
func NewIptablesCleaner (cfg * config.Config , iptV , ipt6V * dep.IptablesVersion , ext dep.Dependencies ) * IptablesCleaner {
41
81
return & IptablesCleaner {
42
82
ext : ext ,
@@ -85,6 +125,35 @@ func removeOldChains(cfg *config.Config, ext dep.Dependencies, iptV *dep.Iptable
85
125
flushAndDeleteChains (ext , iptV , constants .NAT , chains )
86
126
}
87
127
128
+ func cleanupKubeVirt (cfg * config.Config , ext dep.Dependencies , iptV * dep.IptablesVersion , iptV6 * dep.IptablesVersion ) {
129
+ cleanupFunc := func (iptVer * dep.IptablesVersion , rangeInclude NetworkRange ) {
130
+ if rangeInclude .IsWildcard {
131
+ // Wildcard specified. Redirect all remaining outbound traffic to Envoy.
132
+ for _ , internalInterface := range types .Split (cfg .KubeVirtInterfaces ) {
133
+ DeleteRule (ext , iptVer , constants .PREROUTING , constants .NAT , "-i" , internalInterface , "-j" , constants .ISTIOREDIRECT )
134
+ }
135
+ } else if len (rangeInclude .CIDRs ) > 0 {
136
+ // User has specified a non-empty list of cidrs to be redirected to Envoy.
137
+ for _ , cidr := range rangeInclude .CIDRs {
138
+ for _ , internalInterface := range types .Split (cfg .KubeVirtInterfaces ) {
139
+ DeleteRule (ext , iptVer , constants .PREROUTING , constants .PREROUTING , constants .NAT , "-i" , internalInterface ,
140
+ "-d" , cidr .String (), "-j" , constants .ISTIOREDIRECT )
141
+ }
142
+ }
143
+ }
144
+ // cleanup short circuit
145
+ for _ , internalInterface := range types .Split (cfg .KubeVirtInterfaces ) {
146
+ DeleteRule (ext , iptVer , constants .PREROUTING , constants .NAT , "-i" , internalInterface , "-j" , constants .RETURN )
147
+ }
148
+ }
149
+
150
+ ipv4RangesInclude , ipv6RangesInclude , err := separateV4V6 (cfg .OutboundIPRangesInclude )
151
+ if err == nil {
152
+ cleanupFunc (iptV , ipv4RangesInclude )
153
+ cleanupFunc (iptV6 , ipv6RangesInclude )
154
+ }
155
+ }
156
+
88
157
// cleanupDNSUDP removes any IPv4/v6 UDP rules.
89
158
// TODO BML drop `HandleDSNUDP` and friends, no real need to tread UDP rules specially
90
159
// or create unique abstractions for them
@@ -105,6 +174,8 @@ func (c *IptablesCleaner) Run() {
105
174
}()
106
175
107
176
// clean v4/v6
177
+ // cleanup kube-virt-related jumps
178
+ cleanupKubeVirt (c .cfg , c .ext , c .iptV , c .ipt6V )
108
179
// Remove chains (run once per v4/v6)
109
180
removeOldChains (c .cfg , c .ext , c .iptV )
110
181
removeOldChains (c .cfg , c .ext , c .ipt6V )
0 commit comments