-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Add preliminary support for SCTP #20033
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
08d2dde
to
eecf2c3
Compare
This comment was marked as outdated.
This comment was marked as outdated.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for tackling this feature request! It would be nice to finally have SCTP support 😃
My main concern with the current changes is the many limitations. They need to be documented, but I think it would also be best to put the feature behind a flag rather than introduce many runtime checks. (I'm actually surprised you didn't hit any complexity issues because of that.)
The commit history also needs some work. Each commit should contain changes that logically belong together, in a way that facilitates review of the different aspects of this new feature.
Thanks for the feedback! For a feature flag, is the is goal that everywhere So, my takeaways from the review are:
In general, does the approach here work or will the code itself need to be reworked? |
b4196a3
to
d72dd0a
Compare
bfd8fb1
to
195f297
Compare
Allow specifying SCTP as a protocol for policy tracing. Signed-off-by: Harsh Modi <harshmodi@google.com>
This adds support L4 SCTP policies. Note that L7 policies on top of SCTP are unsupported. One behavior change is that policymap will no longer panic on unknown protos. Previously, it used to explicitly ignore UDP and panic on unknown protocols. Now it ignores all unknown protocols. Signed-off-by: Harsh Modi <harshmodi@google.com>
Allow tracing SCTP packets. Signed-off-by: Harsh Modi <harshmodi@google.com>
Signed-off-by: Harsh Modi <harshmodi@google.com> Co-authored-by: Nathan Sweet <nathanjsweet@users.noreply.github.com>
Signed-off-by: Harsh Modi <harshmodi@google.com>
Add docs on how to enable and the limitations of SCTP support. Signed-off-by: Harsh Modi <harshmodi@google.com>
SCTP requires many more branches and paths which will cause the programs to exceed the instruction limit on older kernels. Signed-off-by: Harsh Modi <harshmodi@google.com>
This test is a clone of hairpin_flow, but for SCTP packets. Signed-off-by: Harsh Modi <harshmodi@google.com>
195f297
to
551d471
Compare
Fixed for real :-/ idk what I did last night... |
No worries. You wouldn't believe of many times these sort of things happened to me 😅 I'll trigger the end-to-end tests now and will keep an eye on them. |
/test |
CI passes and we've had a good number of reviews on the code despite a couple team reviews missing (Hubble and proxy which should be minor here given lack of L7 support). Marking ready to merge. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FWIW, Hubble still looks good
The `policy enforcement` bullet in the referenced issue (cilium#5719) is completed. Looks like the network policy support was added with cilium#20033. Signed-off-by: Julian Wiedmann <jwi@isovalent.com>
Please ensure your pull request adheres to the following guidelines:
description and a
Fixes: #XXX
line if the commit addresses a particularGitHub issue.
Partially implements #5719 and implements M1 for #20490