cfg.BoolOpt('enable_metadata_proxy', default=True,
help=_("Allow running metadata proxy.")),
cfg.BoolOpt('router_delete_namespaces', default=False,
- help=_("Delete namespace after removing a router."))
+ help=_("Delete namespace after removing a router.")),
+ cfg.StrOpt('metadata_access_mark',
+ default='0x1',
+ help=_('Iptables mangle mark used to mark metadata valid '
+ 'requests'))
]
LOG = logging.getLogger(__name__)
+# Access with redirection to metadata proxy iptables mark mask
+METADATA_ACCESS_MARK_MASK = '0xffffffff'
+
class MetadataDriver(advanced_service.AdvancedService):
def __init__(self, l3_agent):
super(MetadataDriver, self).__init__(l3_agent)
self.metadata_port = l3_agent.conf.metadata_port
+ self.metadata_access_mark = l3_agent.conf.metadata_access_mark
def after_router_added(self, router):
- for c, r in self.metadata_filter_rules(self.metadata_port):
+ for c, r in self.metadata_filter_rules(self.metadata_port,
+ self.metadata_access_mark):
router.iptables_manager.ipv4['filter'].add_rule(c, r)
+ for c, r in self.metadata_mangle_rules(self.metadata_access_mark):
+ router.iptables_manager.ipv4['mangle'].add_rule(c, r)
for c, r in self.metadata_nat_rules(self.metadata_port):
router.iptables_manager.ipv4['nat'].add_rule(c, r)
router.iptables_manager.apply()
self.l3_agent.conf)
def before_router_removed(self, router):
- for c, r in self.metadata_filter_rules(self.metadata_port):
+ for c, r in self.metadata_filter_rules(self.metadata_port,
+ self.metadata_access_mark):
router.iptables_manager.ipv4['filter'].remove_rule(c, r)
+ for c, r in self.metadata_mangle_rules(self.metadata_access_mark):
+ router.iptables_manager.ipv4['mangle'].remove_rule(c, r)
for c, r in self.metadata_nat_rules(self.metadata_port):
router.iptables_manager.ipv4['nat'].remove_rule(c, r)
router.iptables_manager.apply()
self.l3_agent.conf)
@classmethod
- def metadata_filter_rules(cls, port):
- return [('INPUT', '-s 0.0.0.0/0 -p tcp -m tcp --dport %s '
- '-j ACCEPT' % port)]
+ def metadata_filter_rules(cls, port, mark):
+ return [('INPUT', '-m mark --mark %s -j ACCEPT' % mark),
+ ('INPUT', '-s 0.0.0.0/0 -p tcp -m tcp --dport %s '
+ '-j DROP' % port)]
+
+ @classmethod
+ def metadata_mangle_rules(cls, mark):
+ return [('PREROUTING', '-s 0.0.0.0/0 -d 169.254.169.254/32 '
+ '-p tcp -m tcp --dport 80 '
+ '-j MARK --set-xmark %(value)s/%(mask)s' %
+ {'value': mark,
+ 'mask': METADATA_ACCESS_MARK_MASK})]
@classmethod
def metadata_nat_rules(cls, port):
metadata_driver.MetadataDriver.metadata_nat_rules(8775))
def test_metadata_filter_rules(self):
- rules = ('INPUT', '-s 0.0.0.0/0 -p tcp -m tcp --dport 8775 -j ACCEPT')
+ rules = [('INPUT', '-m mark --mark 0x1 -j ACCEPT'),
+ ('INPUT', '-s 0.0.0.0/0 -p tcp -m tcp --dport 8775 -j DROP')]
self.assertEqual(
- [rules],
- metadata_driver.MetadataDriver.metadata_filter_rules(8775))
+ rules,
+ metadata_driver.MetadataDriver.metadata_filter_rules(8775, '0x1'))
+
+ def test_metadata_mangle_rules(self):
+ rule = ('PREROUTING', '-s 0.0.0.0/0 -d 169.254.169.254/32 '
+ '-p tcp -m tcp --dport 80 '
+ '-j MARK --set-xmark 0x1/%s' %
+ metadata_driver.METADATA_ACCESS_MARK_MASK)
+ self.assertEqual(
+ [rule],
+ metadata_driver.MetadataDriver.metadata_mangle_rules('0x1'))
def _test_spawn_metadata_proxy(self, expected_user, expected_group,
user='', group=''):