Skip to content

Commit 457d1d4

Browse files
committed
fix: fix reverse routing for KubeSpan
This allows it to not come down when rp_filter is enabled. Fixes #9814 Signed-off-by: Dmitry Sharshakov <[email protected]>
1 parent da2e811 commit 457d1d4

File tree

2 files changed

+47
-2
lines changed

2 files changed

+47
-2
lines changed

internal/app/machined/pkg/controllers/kubespan/manager.go

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,12 @@ import (
2727

2828
kubespanadapter "github.com/siderolabs/talos/internal/app/machined/pkg/adapters/kubespan"
2929
"github.com/siderolabs/talos/pkg/machinery/constants"
30+
"github.com/siderolabs/talos/pkg/machinery/kernel"
3031
"github.com/siderolabs/talos/pkg/machinery/nethelpers"
3132
"github.com/siderolabs/talos/pkg/machinery/resources/config"
3233
"github.com/siderolabs/talos/pkg/machinery/resources/kubespan"
3334
"github.com/siderolabs/talos/pkg/machinery/resources/network"
35+
"github.com/siderolabs/talos/pkg/machinery/resources/runtime"
3436
)
3537

3638
// DefaultPeerReconcileInterval is interval between peer status reconciliation on timer.
@@ -108,6 +110,10 @@ func (ctrl *ManagerController) Outputs() []controller.Output {
108110
Type: kubespan.PeerStatusType,
109111
Kind: controller.OutputExclusive,
110112
},
113+
{
114+
Type: runtime.KernelParamSpecType,
115+
Kind: controller.OutputShared,
116+
},
111117
}
112118
}
113119

@@ -378,6 +384,7 @@ func (ctrl *ManagerController) Run(ctx context.Context, r controller.Runtime, lo
378384
},
379385
Verdict: pointer.To(nethelpers.VerdictAccept),
380386
},
387+
// Mark packets to be sent over the KubeSpan link.
381388
{
382389
MatchDestinationAddress: &network.NfTablesAddressMatch{
383390
IncludeSubnets: allowedIPsSet.Prefixes(),
@@ -388,6 +395,18 @@ func (ctrl *ManagerController) Run(ctx context.Context, r controller.Runtime, lo
388395
},
389396
Verdict: pointer.To(nethelpers.VerdictAccept),
390397
},
398+
// Mark incoming packets from the KubeSpan link for rp_filter to find the correct routing table.
399+
{
400+
MatchIIfName: &network.NfTablesIfNameMatch{
401+
InterfaceNames: []string{constants.KubeSpanLinkName},
402+
Operator: nethelpers.OperatorEqual,
403+
},
404+
SetMark: &network.NfTablesMark{
405+
Mask: ^uint32(constants.KubeSpanDefaultFirewallMask),
406+
Xor: constants.KubeSpanDefaultForceFirewallMark,
407+
},
408+
Verdict: pointer.To(nethelpers.VerdictAccept),
409+
},
391410
}
392411

393412
return nil
@@ -554,6 +573,17 @@ func (ctrl *ManagerController) Run(ctx context.Context, r controller.Runtime, lo
554573
return fmt.Errorf("error modifying link spec: %w", err)
555574
}
556575

576+
if err = safe.WriterModify(ctx, r, runtime.NewKernelParamSpec(
577+
runtime.NamespaceName,
578+
kernel.Sysctl+"."+"net.ipv4.conf."+constants.KubeSpanLinkName+".src_valid_mark",
579+
), func(res *runtime.KernelParamSpec) error {
580+
res.TypedSpec().Value = "1"
581+
582+
return nil
583+
}); err != nil {
584+
return err
585+
}
586+
557587
if rulesMgr == nil {
558588
rulesMgr = ctrl.RulesManagerFactory(constants.KubeSpanDefaultRoutingTable, constants.KubeSpanDefaultForceFirewallMark, constants.KubeSpanDefaultFirewallMask)
559589

internal/app/machined/pkg/controllers/kubespan/manager_test.go

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -244,9 +244,9 @@ func (suite *ManagerSuite) TestReconcile() {
244244
asrt.Equal(nethelpers.ChainPriorityFilter, spec.Priority)
245245
asrt.Equal(nethelpers.VerdictAccept, spec.Policy)
246246

247-
asrt.Len(spec.Rules, 2)
247+
asrt.Len(spec.Rules, 3)
248248

249-
if len(spec.Rules) != 2 {
249+
if len(spec.Rules) != 3 {
250250
return
251251
}
252252

@@ -277,6 +277,21 @@ func (suite *ManagerSuite) TestReconcile() {
277277
},
278278
spec.Rules[1],
279279
)
280+
281+
asrt.Equal(
282+
network.NfTablesRule{
283+
MatchIIfName: &network.NfTablesIfNameMatch{
284+
InterfaceNames: []string{constants.KubeSpanLinkName},
285+
Operator: nethelpers.OperatorEqual,
286+
},
287+
SetMark: &network.NfTablesMark{
288+
Mask: ^uint32(constants.KubeSpanDefaultFirewallMask),
289+
Xor: constants.KubeSpanDefaultForceFirewallMark,
290+
},
291+
Verdict: pointer.To(nethelpers.VerdictAccept),
292+
},
293+
spec.Rules[2],
294+
)
280295
},
281296
)
282297

0 commit comments

Comments
 (0)