Skip to content

Commit

Permalink
plumb customer-configured DNS into instances (#4265)
Browse files Browse the repository at this point in the history
Currently [OPTE hardcodes DNS servers to
8.8.8.8](oxidecomputer/opte#390), and we would
prefer to not do this.

When setting up the rack, customers configure DNS servers. Currently
this is added to Nexus's deployment configuration, so that Nexus can
resolve external domain names for SAML. This change plumbs these DNS
servers through to sled-agent and OPTE.

For non-instance OPTE ports, `DhcpCfg::default()` is used, which is
equivalent to "no hostname, no domain name, no DNS servers, no search
domains".

This is not the final state of the DHCP work we want to do; in talking
with @rmustacc and @rcgoodfellow we agree that implementing this minimal
DHCP option set is the correct thing to do urgently; and that we still
need to design the broader inter-instance networking picture (whether we
want an instance-facing recursive resolver on the rack and whether it
should resolve domain names for other instances with VPC IPs, what those
hostnames and search domains should be, and how customers can modify
these settings).
  • Loading branch information
iliana authored Oct 19, 2023
1 parent b5e62f6 commit 93b280c
Show file tree
Hide file tree
Showing 14 changed files with 140 additions and 22 deletions.
2 changes: 1 addition & 1 deletion .github/buildomat/jobs/deploy.sh
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
#:
#: name = "helios / deploy"
#: variety = "basic"
#: target = "lab-2.0-opte-0.23"
#: target = "lab-2.0-opte-0.25"
#: output_rules = [
#: "%/var/svc/log/oxide-sled-agent:default.log*",
#: "%/pool/ext/*/crypt/zone/oxz_*/root/var/svc/log/oxide-*.log*",
Expand Down
13 changes: 6 additions & 7 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -249,15 +249,15 @@ omicron-sled-agent = { path = "sled-agent" }
omicron-test-utils = { path = "test-utils" }
omicron-zone-package = "0.8.3"
oxide-client = { path = "clients/oxide-client" }
oxide-vpc = { git = "https://github.com/oxidecomputer/opte", rev = "631c2017f19cafb1535f621e9e5aa9198ccad869", features = [ "api", "std" ] }
oxide-vpc = { git = "https://github.com/oxidecomputer/opte", rev = "258a8b59902dd36fc7ee5425e6b1fb5fc80d4649", features = [ "api", "std" ] }
once_cell = "1.18.0"
openapi-lint = { git = "https://github.com/oxidecomputer/openapi-lint", branch = "main" }
openapiv3 = "1.0"
# must match samael's crate!
openssl = "0.10"
openssl-sys = "0.9"
openssl-probe = "0.1.2"
opte-ioctl = { git = "https://github.com/oxidecomputer/opte", rev = "631c2017f19cafb1535f621e9e5aa9198ccad869" }
opte-ioctl = { git = "https://github.com/oxidecomputer/opte", rev = "258a8b59902dd36fc7ee5425e6b1fb5fc80d4649" }
oso = "0.26"
owo-colors = "3.5.0"
oximeter = { path = "oximeter/oximeter" }
Expand Down
1 change: 1 addition & 0 deletions illumos-utils/src/opte/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ pub use port_manager::PortTicket;
use ipnetwork::IpNetwork;
use macaddr::MacAddr6;
pub use oxide_vpc::api::BoundaryServices;
pub use oxide_vpc::api::DhcpCfg;
pub use oxide_vpc::api::Vni;
use std::net::IpAddr;

Expand Down
23 changes: 23 additions & 0 deletions illumos-utils/src/opte/params.rs
Original file line number Diff line number Diff line change
Expand Up @@ -50,3 +50,26 @@ pub struct DeleteVirtualNetworkInterfaceHost {
/// be deleted.
pub vni: external::Vni,
}

/// DHCP configuration for a port
///
/// Not present here: Hostname (DHCPv4 option 12; used in DHCPv6 option 39); we
/// use `InstanceRuntimeState::hostname` for this value.
#[derive(Clone, Debug, Serialize, Deserialize, JsonSchema)]
pub struct DhcpConfig {
/// DNS servers to send to the instance
///
/// (DHCPv4 option 6; DHCPv6 option 23)
pub dns_servers: Vec<IpAddr>,

/// DNS zone this instance's hostname belongs to (e.g. the `project.example`
/// part of `instance1.project.example`)
///
/// (DHCPv4 option 15; used in DHCPv6 option 39)
pub host_domain: Option<String>,

/// DNS search domains
///
/// (DHCPv4 option 119; DHCPv6 option 24)
pub search_domains: Vec<String>,
}
12 changes: 9 additions & 3 deletions illumos-utils/src/opte/port_manager.rs
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ use omicron_common::api::internal::shared::NetworkInterface;
use omicron_common::api::internal::shared::NetworkInterfaceKind;
use omicron_common::api::internal::shared::SourceNatConfig;
use oxide_vpc::api::AddRouterEntryReq;
use oxide_vpc::api::DhcpCfg;
use oxide_vpc::api::IpCfg;
use oxide_vpc::api::IpCidr;
use oxide_vpc::api::Ipv4Cfg;
Expand Down Expand Up @@ -100,6 +101,7 @@ impl PortManager {
source_nat: Option<SourceNatConfig>,
external_ips: &[IpAddr],
firewall_rules: &[VpcFirewallRule],
dhcp_config: DhcpCfg,
) -> Result<(Port, PortTicket), Error> {
let mac = *nic.mac;
let vni = Vni::new(nic.vni).unwrap();
Expand Down Expand Up @@ -205,8 +207,6 @@ impl PortManager {
vni,
phys_ip: self.inner.underlay_ip.into(),
boundary_services,
// TODO-completeness (#2153): Plumb domain search list
domain_list: vec![],
};

// Create the xde device.
Expand All @@ -227,11 +227,17 @@ impl PortManager {
"Creating xde device";
"port_name" => &port_name,
"vpc_cfg" => ?&vpc_cfg,
"dhcp_config" => ?&dhcp_config,
);
#[cfg(target_os = "illumos")]
let hdl = {
let hdl = opte_ioctl::OpteHdl::open(opte_ioctl::OpteHdl::XDE_CTL)?;
hdl.create_xde(&port_name, vpc_cfg, /* passthru = */ false)?;
hdl.create_xde(
&port_name,
vpc_cfg,
dhcp_config,
/* passthru = */ false,
)?;
hdl
};

Expand Down
6 changes: 6 additions & 0 deletions nexus/src/app/instance.rs
Original file line number Diff line number Diff line change
Expand Up @@ -987,6 +987,12 @@ impl super::Nexus {
source_nat,
external_ips,
firewall_rules,
dhcp_config: sled_agent_client::types::DhcpConfig {
dns_servers: self.external_dns_servers.clone(),
// TODO: finish designing instance DNS
host_domain: None,
search_domains: Vec::new(),
},
disks: disk_reqs,
cloud_init_bytes: Some(base64::Engine::encode(
&base64::engine::general_purpose::STANDARD,
Expand Down
12 changes: 11 additions & 1 deletion nexus/src/app/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ use omicron_common::api::internal::shared::SwitchLocation;
use omicron_common::nexus_config::RegionAllocationStrategy;
use slog::Logger;
use std::collections::HashMap;
use std::net::Ipv6Addr;
use std::net::{IpAddr, Ipv6Addr};
use std::sync::Arc;
use uuid::Uuid;

Expand Down Expand Up @@ -153,6 +153,12 @@ pub struct Nexus {
/// DNS resolver Nexus uses to resolve an external host
external_resolver: Arc<external_dns::Resolver>,

/// DNS servers used in `external_resolver`, used to provide DNS servers to
/// instances via DHCP
// TODO: This needs to be moved to the database.
// https://github.com/oxidecomputer/omicron/issues/3732
external_dns_servers: Vec<IpAddr>,

/// Mapping of SwitchLocations to their respective Dendrite Clients
dpd_clients: HashMap<SwitchLocation, Arc<dpd_client::Client>>,

Expand Down Expand Up @@ -332,6 +338,10 @@ impl Nexus {
samael_max_issue_delay: std::sync::Mutex::new(None),
internal_resolver: resolver,
external_resolver,
external_dns_servers: config
.deployment
.external_dns_servers
.clone(),
dpd_clients,
background_tasks,
default_region_allocation_strategy: config
Expand Down
34 changes: 34 additions & 0 deletions openapi/sled-agent.json
Original file line number Diff line number Diff line change
Expand Up @@ -1194,6 +1194,36 @@
"vni"
]
},
"DhcpConfig": {
"description": "DHCP configuration for a port\n\nNot present here: Hostname (DHCPv4 option 12; used in DHCPv6 option 39); we use `InstanceRuntimeState::hostname` for this value.",
"type": "object",
"properties": {
"dns_servers": {
"description": "DNS servers to send to the instance\n\n(DHCPv4 option 6; DHCPv6 option 23)",
"type": "array",
"items": {
"type": "string",
"format": "ip"
}
},
"host_domain": {
"nullable": true,
"description": "DNS zone this instance's hostname belongs to (e.g. the `project.example` part of `instance1.project.example`)\n\n(DHCPv4 option 15; used in DHCPv6 option 39)",
"type": "string"
},
"search_domains": {
"description": "DNS search domains\n\n(DHCPv4 option 119; DHCPv6 option 24)",
"type": "array",
"items": {
"type": "string"
}
}
},
"required": [
"dns_servers",
"search_domains"
]
},
"DiskEnsureBody": {
"description": "Sent from to a sled agent to establish the runtime state of a Disk",
"type": "object",
Expand Down Expand Up @@ -1697,6 +1727,9 @@
"nullable": true,
"type": "string"
},
"dhcp_config": {
"$ref": "#/components/schemas/DhcpConfig"
},
"disks": {
"type": "array",
"items": {
Expand Down Expand Up @@ -1731,6 +1764,7 @@
}
},
"required": [
"dhcp_config",
"disks",
"external_ips",
"firewall_rules",
Expand Down
1 change: 0 additions & 1 deletion sled-agent/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,6 @@ macaddr.workspace = true
nexus-client.workspace = true
omicron-common.workspace = true
once_cell.workspace = true
oxide-vpc.workspace = true
oximeter.workspace = true
oximeter-producer.workspace = true
percent-encoding.workspace = true
Expand Down
40 changes: 39 additions & 1 deletion sled-agent/src/instance.rs
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ use chrono::Utc;
use futures::lock::{Mutex, MutexGuard};
use illumos_utils::dladm::Etherstub;
use illumos_utils::link::VnicAllocator;
use illumos_utils::opte::PortManager;
use illumos_utils::opte::{DhcpCfg, PortManager};
use illumos_utils::running_zone::{InstalledZone, RunningZone};
use illumos_utils::svc::wait_for_service;
use illumos_utils::zone::Zones;
Expand Down Expand Up @@ -91,6 +91,10 @@ pub enum Error {
#[error(transparent)]
Opte(#[from] illumos_utils::opte::Error),

/// Issued by `impl TryFrom<&[u8]> for oxide_vpc::api::DomainName`
#[error("Invalid hostname: {0}")]
InvalidHostname(&'static str),

#[error("Error resolving DNS name: {0}")]
ResolveError(#[from] internal_dns::resolver::ResolveError),

Expand Down Expand Up @@ -207,6 +211,7 @@ struct InstanceInner {
source_nat: SourceNatConfig,
external_ips: Vec<IpAddr>,
firewall_rules: Vec<VpcFirewallRule>,
dhcp_config: DhcpCfg,

// Disk related properties
// TODO: replace `propolis_client::handmade::*` with properly-modeled local types
Expand Down Expand Up @@ -610,6 +615,37 @@ impl Instance {
zone_bundler,
} = services;

let mut dhcp_config = DhcpCfg {
hostname: Some(
hardware
.properties
.hostname
.parse()
.map_err(Error::InvalidHostname)?,
),
host_domain: hardware
.dhcp_config
.host_domain
.map(|domain| domain.parse())
.transpose()
.map_err(Error::InvalidHostname)?,
domain_search_list: hardware
.dhcp_config
.search_domains
.into_iter()
.map(|domain| domain.parse())
.collect::<Result<_, _>>()
.map_err(Error::InvalidHostname)?,
dns4_servers: Vec::new(),
dns6_servers: Vec::new(),
};
for ip in hardware.dhcp_config.dns_servers {
match ip {
IpAddr::V4(ip) => dhcp_config.dns4_servers.push(ip.into()),
IpAddr::V6(ip) => dhcp_config.dns6_servers.push(ip.into()),
}
}

let instance = InstanceInner {
log: log.new(o!("instance_id" => id.to_string())),
// NOTE: Mostly lies.
Expand All @@ -633,6 +669,7 @@ impl Instance {
source_nat: hardware.source_nat,
external_ips: hardware.external_ips,
firewall_rules: hardware.firewall_rules,
dhcp_config,
requested_disks: hardware.disks,
cloud_init_bytes: hardware.cloud_init_bytes,
state: InstanceStates::new(
Expand Down Expand Up @@ -852,6 +889,7 @@ impl Instance {
snat,
external_ips,
&inner.firewall_rules,
inner.dhcp_config.clone(),
)?;
opte_ports.push(port);
}
Expand Down
2 changes: 2 additions & 0 deletions sled-agent/src/params.rs
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ use crate::zone_bundle::PriorityOrder;
pub use crate::zone_bundle::ZoneBundleCause;
pub use crate::zone_bundle::ZoneBundleId;
pub use crate::zone_bundle::ZoneBundleMetadata;
pub use illumos_utils::opte::params::DhcpConfig;
pub use illumos_utils::opte::params::VpcFirewallRule;
pub use illumos_utils::opte::params::VpcFirewallRulesEnsureBody;
use omicron_common::api::internal::nexus::{
Expand Down Expand Up @@ -68,6 +69,7 @@ pub struct InstanceHardware {
/// provided to an instance to allow inbound connectivity.
pub external_ips: Vec<IpAddr>,
pub firewall_rules: Vec<VpcFirewallRule>,
pub dhcp_config: DhcpConfig,
// TODO: replace `propolis_client::handmade::*` with locally-modeled request type
pub disks: Vec<propolis_client::handmade::api::DiskRequest>,
pub cloud_init_bytes: Option<String>,
Expand Down
10 changes: 5 additions & 5 deletions sled-agent/src/services.rs
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ use illumos_utils::dladm::{
Dladm, Etherstub, EtherstubVnic, GetSimnetError, PhysicalLink,
};
use illumos_utils::link::{Link, VnicAllocator};
use illumos_utils::opte::{Port, PortManager, PortTicket};
use illumos_utils::opte::{DhcpCfg, Port, PortManager, PortTicket};
use illumos_utils::running_zone::{
InstalledZone, RunCommandError, RunningZone,
};
Expand Down Expand Up @@ -863,11 +863,11 @@ impl ServiceManager {
// config allows outbound access which is enough for
// Boundary NTP which needs to come up before Nexus.
let port = port_manager
.create_port(nic, snat, external_ips, &[])
.create_port(nic, snat, external_ips, &[], DhcpCfg::default())
.map_err(|err| Error::ServicePortCreation {
service: svc.details.to_string(),
err: Box::new(err),
})?;
service: svc.details.to_string(),
err: Box::new(err),
})?;

// We also need to update the switch with the NAT mappings
let (target_ip, first_port, last_port) = match snat {
Expand Down
Loading

0 comments on commit 93b280c

Please sign in to comment.