2019-05-31 09:45:11 +00:00
/ *
Copyright 2016 The Kubernetes Authors .
Licensed under the Apache License , Version 2.0 ( the "License" ) ;
you may not use this file except in compliance with the License .
You may obtain a copy of the License at
http : //www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing , software
distributed under the License is distributed on an "AS IS" BASIS ,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
See the License for the specific language governing permissions and
limitations under the License .
* /
package service
import (
"fmt"
"strings"
api "k8s.io/kubernetes/pkg/apis/core"
utilnet "k8s.io/utils/net"
)
const (
defaultLoadBalancerSourceRanges = "0.0.0.0/0"
)
// IsAllowAll checks whether the utilnet.IPNet allows traffic from 0.0.0.0/0
func IsAllowAll ( ipnets utilnet . IPNetSet ) bool {
for _ , s := range ipnets . StringSlice ( ) {
if s == "0.0.0.0/0" {
return true
}
}
return false
}
// GetLoadBalancerSourceRanges first try to parse and verify LoadBalancerSourceRanges field from a service.
// If the field is not specified, turn to parse and verify the AnnotationLoadBalancerSourceRangesKey annotation from a service,
// extracting the source ranges to allow, and if not present returns a default (allow-all) value.
func GetLoadBalancerSourceRanges ( service * api . Service ) ( utilnet . IPNetSet , error ) {
var ipnets utilnet . IPNetSet
var err error
// if SourceRange field is specified, ignore sourceRange annotation
if len ( service . Spec . LoadBalancerSourceRanges ) > 0 {
specs := service . Spec . LoadBalancerSourceRanges
ipnets , err = utilnet . ParseIPNets ( specs ... )
if err != nil {
return nil , fmt . Errorf ( "service.Spec.LoadBalancerSourceRanges: %v is not valid. Expecting a list of IP ranges. For example, 10.0.0.0/24. Error msg: %v" , specs , err )
}
} else {
val := service . Annotations [ api . AnnotationLoadBalancerSourceRangesKey ]
val = strings . TrimSpace ( val )
if val == "" {
val = defaultLoadBalancerSourceRanges
}
specs := strings . Split ( val , "," )
ipnets , err = utilnet . ParseIPNets ( specs ... )
if err != nil {
return nil , fmt . Errorf ( "%s: %s is not valid. Expecting a comma-separated list of source IP ranges. For example, 10.0.0.0/24,192.168.2.0/24" , api . AnnotationLoadBalancerSourceRangesKey , val )
}
}
return ipnets , nil
}
2023-12-18 20:31:00 +00:00
// ExternallyAccessible checks if service is externally accessible.
func ExternallyAccessible ( service * api . Service ) bool {
return service . Spec . Type == api . ServiceTypeLoadBalancer ||
service . Spec . Type == api . ServiceTypeNodePort ||
( service . Spec . Type == api . ServiceTypeClusterIP && len ( service . Spec . ExternalIPs ) > 0 )
}
2019-05-31 09:45:11 +00:00
// RequestsOnlyLocalTraffic checks if service requests OnlyLocal traffic.
func RequestsOnlyLocalTraffic ( service * api . Service ) bool {
if service . Spec . Type != api . ServiceTypeLoadBalancer &&
service . Spec . Type != api . ServiceTypeNodePort {
return false
}
2023-05-29 21:03:29 +00:00
return service . Spec . ExternalTrafficPolicy == api . ServiceExternalTrafficPolicyLocal
2019-05-31 09:45:11 +00:00
}
// NeedsHealthCheck checks if service needs health check.
func NeedsHealthCheck ( service * api . Service ) bool {
if service . Spec . Type != api . ServiceTypeLoadBalancer {
return false
}
return RequestsOnlyLocalTraffic ( service )
}