Added EC2 Metadata Service Access Flag#512
Added EC2 Metadata Service Access Flag#512openshift-merge-bot[bot] merged 1 commit intocontainers:mainfrom
Conversation
Added `ec2-metadata-access` flag to allow TCP traffic being routed to AWS EC2 metadata service explicitly. This flag is required for easy AWS Nitro Enclave to EC2 IMDSv2 communication via gvproxy. Originally `lincLocal` access has been blocked in #f4a40d2 to prevent issues with CoreOS VM. Signed-off-by: David Dornseifer <dornseid@amazon.com>
500f5c3 to
3cf598b
Compare
|
@cfergeau can you please help getting the PR reviewed? |
I must admit I’m not familiar at all with link local addresses and IMDSv2, and I struggle to understand what #7 (f4a40d2) was doing, and what is different in this PR. Does a nitro enclave have network related differences compared to a normal system/VM which would explain why it needs to be special cased in gvisor-tap-vsock? Or on the contrary, is it the change added for coreos which might be incorrect? |
|
Hey @cfergeau, yes AWS Nitro Enclaves per default do not have any networking besides the |
|
Quite busy with other stuff, and tricky PR, so it takes time :-/ Have you considered adding this to the UDP code for consistency? Apart from this, I have a hard time deciding if:
Since not much progress has been made in answering these questions, I’m tempted to go ahead with your change, the option naming makes it focused on a very specific usecase. When we have a better understanding of the problem/more time, we can rename the option, or deprecate it, … if we come up with a better solution. Would that work for you? |
|
Thanks for your feedback @cfergeau, |
|
@cfergeau, just wondering - do you have an rough estimate when we can get the PR merged? |
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: cfergeau, dpdornseifer The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Finally merged, May was a slow/busy month for me, so it took some time :) |
|
thanks a lot @cfergeau, one last question - when do you expect the next release to be cut? |
I’ll try to make one early next week. |
|
@cfergeau any update on the release schedule? |
|
Let's coordinate to have this done soon
…--
Gerard Braad | http://gbraad.nl
STEM is the source, but BUILD is how you develop!
[ Better Understanding Involves Learning and Doing ]
|
Just released 0.8.7 |
|
I removed the code which blocks link local access. According to the commit: f4a40d2, forwarding packets to link local address was blocked due to recurring error messages from fedora coreos trying to connect to 169.254.169.254:80. However, I don't see those error logs in gvproxy. Tested with fedora coreos, Fedora Cloud, and an old fedora image (Fedora-Cloud-Base-34-1.2). If blocking access to the link local address by default is not necessary, maybe the |
Added
ec2-metadata-accessflag to allow TCP traffic being routed to AWS EC2 metadata service explicitly. This flag is required for easy AWS Nitro Enclave to EC2 IMDSv2 communication via gvproxy. OriginallylincLocalaccess has been blocked in #7 (f4a40d2) to prevent issues with CoreOS VM.