• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

noironetworks / aci-containers / 11325

10 Nov 2025 03:12PM UTC coverage: 64.026% (-0.2%) from 64.259%
11325

push

travis-pro

web-flow
Merge pull request #1628 from noironetworks/backport_vmm_lite_apic_sync

Handled controller to APIC disconnection issue

2 of 81 new or added lines in 3 files covered. (2.47%)

5 existing lines in 2 files now uncovered.

13352 of 20854 relevant lines covered (64.03%)

0.73 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/pkg/controller/aaepmonitor.go
1
// Copyright 2019 Cisco Systems, Inc.
2
//
3
// Licensed under the Apache License, Version 2.0 (the "License");
4
// you may not use this file except in compliance with the License.
5
// You may obtain a copy of the License at
6
//
7
//     http://www.apache.org/licenses/LICENSE-2.0
8
//
9
// Unless required by applicable law or agreed to in writing, software
10
// distributed under the License is distributed on an "AS IS" BASIS,
11
// WITHOUT WARRATIES OR CONDITIONS OF ANY KIND, either express or implied.
12
// See the License for the specific language governing permissions and
13
// limitations under the License.
14

15
// Handlers for AaepMonitor CR updates.
16

17
package controller
18

19
import (
20
        "context"
21
        "crypto/sha256"
22
        "encoding/hex"
23
        "encoding/json"
24
        "fmt"
25
        "regexp"
26
        "strconv"
27
        "strings"
28

29
        amv1 "github.com/noironetworks/aci-containers/pkg/aaepmonitor/apis/aci.attachmentmonitor/v1"
30
        aaepmonitorclientset "github.com/noironetworks/aci-containers/pkg/aaepmonitor/clientset/versioned"
31
        "github.com/noironetworks/aci-containers/pkg/apicapi"
32

33
        nadapi "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/apis/k8s.cni.cncf.io/v1"
34
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
35
        "k8s.io/apimachinery/pkg/runtime"
36
        "k8s.io/apimachinery/pkg/watch"
37
        "k8s.io/client-go/tools/cache"
38
        "k8s.io/kubernetes/pkg/controller"
39
)
40

41
const (
42
        aaepMonitorCRDName = "aaepmonitors.aci.attachmentmonitor"
43
)
44

45
func (cont *AciController) queueAaepMonitorConfigByKey(key string) {
×
46
        cont.aaepMonitorConfigQueue.Add(key)
×
47
}
×
48

49
func aaepMonitorInit(cont *AciController, stopCh <-chan struct{}) {
×
50
        restconfig := cont.env.RESTConfig()
×
51
        aaepMonitorClient, err := aaepmonitorclientset.NewForConfig(restconfig)
×
52
        if err != nil {
×
53
                cont.log.Errorf("Failed to intialize aaepMonitorClient")
×
54
                return
×
55
        }
×
56

57
        cont.initAaepMonitorInformerFromClient(aaepMonitorClient)
×
58
        go cont.aaepMonitorInformer.Run(stopCh)
×
59
        go cont.processQueue(cont.aaepMonitorConfigQueue, cont.aaepMonitorInformer.GetIndexer(),
×
60
                func(obj interface{}) bool {
×
61
                        return cont.handleAaepMonitorConfigurationUpdate(obj)
×
62
                }, func(key string) bool {
×
63
                        return cont.handleAaepMonitorConfigurationDelete(key)
×
64
                }, nil, stopCh)
×
65
        cache.WaitForCacheSync(stopCh, cont.aaepMonitorInformer.HasSynced)
×
66
}
67

68
func (cont *AciController) initAaepMonitorInformerFromClient(
69
        aaepMonitorClient *aaepmonitorclientset.Clientset) {
×
70
        cont.initAaepMonitorInformerBase(
×
71
                &cache.ListWatch{
×
72
                        ListFunc: func(options metav1.ListOptions) (runtime.Object, error) {
×
73
                                return aaepMonitorClient.AciV1().AaepMonitors().List(context.TODO(), options)
×
74
                        },
×
75
                        WatchFunc: func(options metav1.ListOptions) (watch.Interface, error) {
×
76
                                return aaepMonitorClient.AciV1().AaepMonitors().Watch(context.TODO(), options)
×
77
                        },
×
78
                })
79
}
80

81
func (cont *AciController) initAaepMonitorInformerBase(listWatch *cache.ListWatch) {
×
82
        cont.aaepMonitorInformer = cache.NewSharedIndexInformer(
×
83
                listWatch,
×
84
                &amv1.AaepMonitor{},
×
85
                controller.NoResyncPeriodFunc(),
×
86
                cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc},
×
87
        )
×
88
        cont.aaepMonitorInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{
×
89
                AddFunc: func(obj interface{}) {
×
90
                        cont.aaepMonitorConfAdded(obj)
×
91
                },
×
92
                UpdateFunc: func(oldobj interface{}, newobj interface{}) {
×
93
                        cont.aaepMonitorConfUpdate(oldobj, newobj)
×
94
                },
×
95
                DeleteFunc: func(obj interface{}) {
×
96
                        cont.aaepMonitorConfDelete(obj)
×
97
                },
×
98
        })
99
}
100

101
func (cont *AciController) aaepMonitorConfAdded(obj interface{}) {
×
102
        aaepMonitorConfig, ok := obj.(*amv1.AaepMonitor)
×
103
        if !ok {
×
104
                cont.log.Error("aaepMonitorConfAdded: Bad object type")
×
105
                return
×
106
        }
×
107
        key, err := cache.MetaNamespaceKeyFunc(aaepMonitorConfig)
×
108
        if err != nil {
×
109
                return
×
110
        }
×
111
        cont.queueAaepMonitorConfigByKey(key)
×
112
}
113

114
func (cont *AciController) aaepMonitorConfUpdate(oldobj interface{}, newobj interface{}) {
×
115
        newAaepMonitorConfig := newobj.(*amv1.AaepMonitor)
×
116

×
117
        key, err := cache.MetaNamespaceKeyFunc(newAaepMonitorConfig)
×
118
        if err != nil {
×
119
                return
×
120
        }
×
121
        cont.queueAaepMonitorConfigByKey(key)
×
122
}
123

124
func (cont *AciController) aaepMonitorConfDelete(obj interface{}) {
×
125
        cont.indexMutex.Lock()
×
126
        defer cont.indexMutex.Unlock()
×
127
        aaepMonitorConfig, ok := obj.(*amv1.AaepMonitor)
×
128

×
129
        if !ok {
×
130
                deletedState, ok := obj.(cache.DeletedFinalStateUnknown)
×
131
                if !ok {
×
132
                        cont.log.Errorf("Received unexpected object: ")
×
133
                        return
×
134
                }
×
135
                aaepMonitorConfig, ok = deletedState.Obj.(*amv1.AaepMonitor)
×
136
                if !ok {
×
137
                        cont.log.Errorf("DeletedFinalStateUnknown contained non-aaepmonitorconfiguration object: %v", deletedState.Obj)
×
138
                        return
×
139
                }
×
140
        }
141

142
        key, err := cache.MetaNamespaceKeyFunc(aaepMonitorConfig)
×
143
        if err != nil {
×
144
                return
×
145
        }
×
146
        cont.queueAaepMonitorConfigByKey("DELETED_" + key)
×
147
}
148

149
func (cont *AciController) handleAaepMonitorConfigurationUpdate(obj interface{}) bool {
×
150
        aaepMonitorConfig, ok := obj.(*amv1.AaepMonitor)
×
151
        if !ok {
×
152
                cont.log.Error("handleAaepMonitorConfigurationUpdate: Bad object type")
×
153
                return false
×
154
        }
×
155

156
        cont.log.Infof("Started processing of aaepmonitor CR creation/modification")
×
157
        addedAaeps, removedAaeps := cont.getAaepDiff(aaepMonitorConfig.Spec.Aaeps)
×
158
        for _, aaepName := range addedAaeps {
×
159
                cont.reconcileNadData(aaepName)
×
160
        }
×
161

162
        for _, aaepName := range removedAaeps {
×
163
                cont.cleanAnnotationSubscriptions(aaepName)
×
164

×
165
                cont.indexMutex.Lock()
×
166
                aaepEpgAttachDataMap := cont.sharedAaepMonitor[aaepName]
×
167
                delete(cont.sharedAaepMonitor, aaepName)
×
168

×
169
                for epgDn, aaepEpgAttachData := range aaepEpgAttachDataMap {
×
170
                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, aaepEpgAttachData, "AaepRemovedFromCR")
×
171
                }
×
172
                cont.indexMutex.Unlock()
×
173
        }
174
        cont.log.Infof("Completed processing of aaepmonitor CR creation/modification")
×
175
        return false
×
176
}
177

178
func (cont *AciController) handleAaepMonitorConfigurationDelete(key string) bool {
×
179
        cont.indexMutex.Lock()
×
180
        defer cont.indexMutex.Unlock()
×
181
        cont.log.Infof("Started processing of aaepmonitor CR deletion")
×
182
        for aaepName, aaepEpgAttachDataMap := range cont.sharedAaepMonitor {
×
183
                cont.cleanAnnotationSubscriptions(aaepName)
×
184

×
185
                for epgDn, aaepEpgAttachData := range aaepEpgAttachDataMap {
×
186
                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, aaepEpgAttachData, "CRDeleted")
×
187
                }
×
188
        }
189

190
        cont.sharedAaepMonitor = make(map[string]map[string]*AaepEpgAttachData)
×
191
        cont.log.Infof("Completed processing of aaepmonitor CR deletion")
×
192
        return false
×
193
}
194

195
func (cont *AciController) handleAaepEpgAttach(infraRsObj apicapi.ApicObject) {
×
196
        infraRsObjDn := infraRsObj.GetDn()
×
197
        aaepName := cont.matchesAEPFilter(infraRsObjDn)
×
198
        cont.log.Infof("Started processing of EPG: %s attached with AAEP: %s", infraRsObj.GetAttrStr("tDn"), aaepName)
×
199
        if aaepName == "" {
×
200
                cont.log.Debugf("Unable to find AAEP from %s in monitoring list", infraRsObjDn)
×
201
                return
×
202
        }
×
203

204
        state := infraRsObj.GetAttrStr("state")
×
205
        if state != "formed" {
×
206
                cont.log.Debugf("Skipping NAD creation: %s is with state: %s", infraRsObjDn, state)
×
207
                return
×
208
        }
×
209

210
        epgDn := infraRsObj.GetAttrStr("tDn")
×
211
        encap := infraRsObj.GetAttrStr("encap")
×
212
        vlanID := cont.getVlanId(encap)
×
213

×
214
        if cont.checkDuplicateAaepEpgAttachRequest(aaepName, epgDn, vlanID) {
×
215
                cont.log.Infof("AAEP %s EPG %s attachment data already exists", aaepName, epgDn)
×
216
                return
×
217
        }
×
218

219
        cont.indexMutex.Lock()
×
220
        oldAaepMonitorData := cont.getAaepEpgAttachDataLocked(aaepName, epgDn)
×
221
        cont.indexMutex.Unlock()
×
222

×
223
        if cont.checkVlanUsedInCluster(vlanID) {
×
224
                // This is needed when user updates vlan to the vlan already used in cluster
×
225
                cont.handleOldNadDeletion(aaepName, epgDn, oldAaepMonitorData, "AaepEpgAttachedWithVlanInUse")
×
226
                cont.log.Errorf("Skipping NAD creation: VLAN %d is already used in cluster", vlanID)
×
227
                return
×
228
        }
×
229

230
        defer cont.apicConn.AddImmediateSubscriptionDnLocked(epgDn, []string{"tagAnnotation"}, cont.handleAnnotationAdded,
×
231
                cont.handleAnnotationDeleted)
×
232

×
233
        epgVlanMap := &EpgVlanMap{
×
234
                epgDn:     epgDn,
×
235
                encapVlan: vlanID,
×
236
        }
×
237

×
238
        aaepEpgAttachData := cont.collectNadData(epgVlanMap)
×
239
        if aaepEpgAttachData == nil {
×
240
                return
×
241
        }
×
242

243
        if cont.checkIfEpgWithOverlappingVlan(aaepName, vlanID, epgDn) {
×
244
                // This is needed when user updates vlan from non-overlapping to overlapping
×
245
                cont.handleOldNadDeletion(aaepName, epgDn, oldAaepMonitorData, "AaepEpgAttachedWithOverlappingVlan")
×
246

×
247
                // Add new entry with nadCreated as false
×
248
                cont.indexMutex.Lock()
×
249
                if cont.sharedAaepMonitor[aaepName] == nil {
×
250
                        cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
251
                }
×
252
                aaepEpgAttachData.nadCreated = false
×
253
                cont.sharedAaepMonitor[aaepName][epgDn] = aaepEpgAttachData
×
254
                cont.indexMutex.Unlock()
×
255
                cont.log.Errorf("Skipping NAD creation: EPG %s with AAEP %s has overlapping VLAN %d", epgDn, aaepName, vlanID)
×
256
                return
×
257
        }
258
        cont.syncNADsWithAciState(aaepName, epgDn, oldAaepMonitorData, aaepEpgAttachData, "AaepEpgAttached")
×
259
        cont.log.Infof("Completed processing of EPG: %s attached with AAEP: %s", epgDn, aaepName)
×
260
}
261

262
func (cont *AciController) handleAaepEpgDetach(infraRsObjDn string) {
×
263
        aaepName := cont.matchesAEPFilter(infraRsObjDn)
×
264
        if aaepName == "" {
×
265
                cont.log.Debugf("Unable to find AAEP from %s in monitoring list", infraRsObjDn)
×
266
                return
×
267
        }
×
268

269
        epgDn := cont.getEpgDnFromInfraRsDn(infraRsObjDn)
×
270

×
271
        if epgDn == "" {
×
272
                cont.log.Errorf("Unable to find EPG from %s", infraRsObjDn)
×
273
                return
×
274
        }
×
275

276
        cont.log.Infof("Started processing of EPG: %s detached from AAEP: %s", infraRsObjDn, aaepName)
×
277
        // Need to check if EPG is not attached with any other AAEP
×
278
        if !cont.isEpgAttachedWithAaep(epgDn) {
×
279
                cont.apicConn.UnsubscribeImmediateDnLocked(epgDn, []string{"tagAnnotation"})
×
280
        }
×
281

282
        cont.indexMutex.Lock()
×
283
        aaepEpgAttachData := cont.getAaepEpgAttachDataLocked(aaepName, epgDn)
×
284
        cont.indexMutex.Unlock()
×
285

×
286
        if aaepEpgAttachData == nil {
×
287
                cont.log.Debugf("Monitoring data not available for EPG %s with AAEP %s", epgDn, aaepName)
×
288
                return
×
289
        }
×
290
        if !cont.namespaceChecks(aaepEpgAttachData.namespaceName, epgDn) {
×
291
                cont.log.Debugf("Namespace %s not found", aaepEpgAttachData.namespaceName)
×
292
                return
×
293
        }
×
294

295
        cont.handleOldNadDeletion(aaepName, epgDn, aaepEpgAttachData, "AaepEpgDetached")
×
296
        cont.log.Infof("Completed processing of EPG: %s detached from AAEP: %s", epgDn, aaepName)
×
297
}
298

299
func (cont *AciController) handleAnnotationAdded(obj apicapi.ApicObject) bool {
×
300
        annotationDn := obj.GetDn()
×
301
        epgDn := annotationDn[:strings.Index(annotationDn, "/annotationKey-")]
×
302
        aaepMonitorDataMap := cont.getAaepMonitoringDataForEpg(epgDn)
×
303

×
304
        cont.log.Infof("Started processing of EPG: %s annotation %s addition/modification", epgDn, annotationDn)
×
305
        for aaepName, aaepMonitorData := range aaepMonitorDataMap {
×
306
                cont.indexMutex.Lock()
×
307
                oldAaepMonitorData := cont.getAaepEpgAttachDataLocked(aaepName, epgDn)
×
308
                cont.indexMutex.Unlock()
×
309

×
310
                if len(aaepMonitorData) == 0 {
×
311
                        // No new monitoring data available for this EPG with this AAEP but old data exists
×
312
                        // delete old NAD if exists and remove from monitoring map
×
313
                        // create NAD for next EPG with old VLAN
×
314
                        cont.handleOldNadDeletion(aaepName, epgDn, oldAaepMonitorData, "NamespaceAnnotationAdded")
×
315
                        cont.log.Debugf("Insufficient data for NAD creation: Monitoring data not available for EPG %s with AAEP %s", epgDn, aaepName)
×
316
                        continue
×
317
                }
318

319
                aaepEpgAttachData, exists := aaepMonitorData[epgDn]
×
320
                if !exists || aaepEpgAttachData == nil {
×
321
                        cont.handleOldNadDeletion(aaepName, epgDn, oldAaepMonitorData, "NamespaceAnnotationAdded")
×
322
                        cont.log.Debugf("Insufficient data for NAD creation: Monitoring data not available for EPG %s with AAEP %s", epgDn, aaepName)
×
323
                        continue
×
324
                }
325

326
                if !cont.checkMonitorDataModified(oldAaepMonitorData, aaepEpgAttachData) {
×
327
                        cont.log.Debugf("No changes in annotation for EPG %s with AAEP %s", epgDn, aaepName)
×
328
                        continue
×
329
                }
330

331
                if !cont.namespaceChecks(aaepEpgAttachData.namespaceName, epgDn) {
×
332
                        // Namespace not exist, need to delete old NAD if exists and remove from monitoring map
×
333
                        // create NAD for next EPG with old VLAN
×
334
                        cont.handleOldNadDeletion(aaepName, epgDn, oldAaepMonitorData, "NamespaceAnnotationAdded")
×
335
                        cont.log.Debugf("Insufficient data in annotation for NAD creation: Namespace not exist, in case of EPG %s with AAEP %s", epgDn, aaepName)
×
336
                        continue
×
337
                }
338

339
                // This is needed when user updates annotation and VLAN is already overlapping
340
                if cont.checkIfEpgWithOverlappingVlan(aaepName, aaepEpgAttachData.encapVlan, epgDn) {
×
341
                        // Add new entry with nadCreated as false
×
342
                        aaepEpgAttachData.nadCreated = false
×
343
                        cont.indexMutex.Lock()
×
344
                        if cont.sharedAaepMonitor[aaepName] == nil {
×
345
                                cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
346
                        }
×
347
                        cont.sharedAaepMonitor[aaepName][epgDn] = aaepEpgAttachData
×
348
                        cont.indexMutex.Unlock()
×
349
                        cont.log.Debugf("Skipping EPG annotation add handling: EPG %s with AAEP %s has overlapping VLAN %d", epgDn,
×
350
                                aaepName, aaepEpgAttachData.encapVlan)
×
351
                        continue
×
352
                }
353

354
                cont.syncNADsWithAciState(aaepName, epgDn, oldAaepMonitorData, aaepEpgAttachData, "NamespaceAnnotationAdded")
×
355
        }
356
        cont.log.Infof("Completed processing annotation addition/modification for EPG: %s, AnnotationDn: %s", epgDn, annotationDn)
×
357
        return true
×
358
}
359

360
func (cont *AciController) handleAnnotationDeleted(annotationDn string) {
×
361
        epgDn := annotationDn[:strings.Index(annotationDn, "/annotationKey-")]
×
362
        cont.log.Infof("Started processing of EPG: %s annotation %s deletion", epgDn, annotationDn)
×
363
        aaepMonitorDataMap := cont.getAaepMonitoringDataForEpg(epgDn)
×
364

×
365
        var reason string
×
366
        if !cont.checkIfEPGExists(epgDn) {
×
367
                reason = "EpgDeleted"
×
368
        } else {
×
369
                reason = "NamespaceAnnotationRemoved"
×
370
        }
×
371

372
        for aaepName, aaepMonitorData := range aaepMonitorDataMap {
×
373
                cont.indexMutex.Lock()
×
374
                oldAaepMonitorData := cont.getAaepEpgAttachDataLocked(aaepName, epgDn)
×
375
                cont.indexMutex.Unlock()
×
376

×
377
                if oldAaepMonitorData == nil {
×
378
                        cont.log.Debugf("Monitoring data not available for EPG %s with AAEP %s", epgDn, aaepName)
×
379
                        continue
×
380
                }
381

382
                if oldAaepMonitorData.nadCreated == false {
×
383
                        cont.indexMutex.Lock()
×
384
                        delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
385
                        cont.indexMutex.Unlock()
×
386
                        continue
×
387
                }
388

389
                if aaepMonitorData == nil {
×
390
                        cont.indexMutex.Lock()
×
391
                        delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
392
                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, oldAaepMonitorData, reason)
×
393
                        cont.indexMutex.Unlock()
×
394
                        cont.createNadForNextEpg(aaepName, oldAaepMonitorData.encapVlan)
×
395
                        continue
×
396
                }
397

398
                aaepEpgAttachData, exists := aaepMonitorData[epgDn]
×
399
                if !exists || aaepEpgAttachData == nil {
×
400
                        cont.indexMutex.Lock()
×
401
                        delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
402
                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, oldAaepMonitorData, reason)
×
403
                        cont.indexMutex.Unlock()
×
404
                        cont.createNadForNextEpg(aaepName, oldAaepMonitorData.encapVlan)
×
405
                        continue
×
406
                }
407

408
                cont.syncNADsWithAciState(aaepName, epgDn, oldAaepMonitorData, aaepEpgAttachData, reason)
×
409
        }
410
        cont.log.Infof("Completed processing annotation deletion for EPG: %s, AnnotationDn: %s", epgDn, annotationDn)
×
411
}
412

413
func (cont *AciController) collectNadData(epgVlanMap *EpgVlanMap) *AaepEpgAttachData {
×
414
        epgDn := epgVlanMap.epgDn
×
415
        epgAnnotations := cont.getEpgAnnotations(epgDn)
×
416
        if epgAnnotations == nil {
×
417
                cont.log.Debugf("No annotations found for EPG %s", epgDn)
×
418
                return nil
×
419
        }
×
420
        namespaceName, nadName := cont.getSpecificEPGAnnotation(epgAnnotations)
×
421

×
422
        if !cont.namespaceChecks(namespaceName, epgDn) {
×
423
                cont.log.Debugf("Namespace not exist, in case of EPG %s", epgDn)
×
424
                return nil
×
425
        }
×
426

427
        aaepMonitoringData := &AaepEpgAttachData{
×
428
                encapVlan:     epgVlanMap.encapVlan,
×
429
                nadName:       nadName,
×
430
                namespaceName: namespaceName,
×
431
                nadCreated:    true,
×
432
        }
×
433

×
434
        return aaepMonitoringData
×
435
}
436

437
func (cont *AciController) getAaepEpgAttachDataLocked(aaepName, epgDn string) *AaepEpgAttachData {
×
438
        aaepEpgAttachDataMap, exists := cont.sharedAaepMonitor[aaepName]
×
439
        if !exists || aaepEpgAttachDataMap == nil {
×
440
                cont.log.Debugf("AAEP %s EPG %s attachment data not found", aaepName, epgDn)
×
441
                return nil
×
442
        }
×
443

444
        aaepEpgAttachData, exists := aaepEpgAttachDataMap[epgDn]
×
445
        if !exists || aaepEpgAttachData == nil {
×
446
                cont.log.Debugf("AAEP %s EPG %s attachment data not found", aaepName, epgDn)
×
447
                return nil
×
448
        }
×
449

450
        cont.log.Infof("Found attachment data: %v for EPG : %s AAEP: %s", *aaepEpgAttachData, epgDn, aaepName)
×
451
        return aaepEpgAttachData
×
452
}
453

454
func (cont *AciController) matchesAEPFilter(infraRsObjDn string) string {
×
455
        cont.indexMutex.Lock()
×
456
        defer cont.indexMutex.Unlock()
×
457
        var aaepName string
×
458
        for aaepName = range cont.sharedAaepMonitor {
×
459
                expectedPrefix := fmt.Sprintf("uni/infra/attentp-%s/", aaepName)
×
460
                if strings.HasPrefix(infraRsObjDn, expectedPrefix) {
×
461
                        return aaepName
×
462
                }
×
463
        }
464
        return ""
×
465
}
466

467
func (cont *AciController) getEpgDnFromInfraRsDn(infraRsObjDn string) string {
×
468
        re := regexp.MustCompile(`\[(.*?)\]`)
×
469
        match := re.FindStringSubmatch(infraRsObjDn)
×
470

×
471
        var epgDn string
×
472
        if len(match) > 1 {
×
473
                epgDn = match[1]
×
474
                return epgDn
×
475
        }
×
476

477
        return epgDn
×
478
}
479

480
func (cont *AciController) getAaepMonitoringDataForEpg(epgDn string) map[string]map[string]*AaepEpgAttachData {
×
481
        aaepEpgAttachData := make(map[string]map[string]*AaepEpgAttachData)
×
482

×
483
        cont.indexMutex.Lock()
×
484
        defer cont.indexMutex.Unlock()
×
485
        for aaepName := range cont.sharedAaepMonitor {
×
486
                encap := cont.getEncapFromAaepEpgAttachObj(aaepName, epgDn)
×
487

×
488
                if encap != "" {
×
489
                        vlanID := cont.getVlanId(encap)
×
490
                        epgVlanMap := EpgVlanMap{
×
491
                                epgDn:     epgDn,
×
492
                                encapVlan: vlanID,
×
493
                        }
×
494
                        if aaepEpgAttachData[aaepName] == nil {
×
495
                                aaepEpgAttachData[aaepName] = make(map[string]*AaepEpgAttachData)
×
496
                        }
×
497
                        nadData := cont.collectNadData(&epgVlanMap)
×
498
                        if nadData != nil {
×
499
                                aaepEpgAttachData[aaepName][epgDn] = nadData
×
500
                        }
×
501
                }
502
        }
503

504
        return aaepEpgAttachData
×
505
}
506

507
func (cont *AciController) cleanAnnotationSubscriptions(aaepName string) {
×
508
        epgVlanMapList := cont.getAaepEpgAttObjDetails(aaepName)
×
509
        if epgVlanMapList == nil {
×
510
                return
×
511
        }
×
512

513
        for _, epgVlanMap := range epgVlanMapList {
×
514
                cont.apicConn.UnsubscribeImmediateDnLocked(epgVlanMap.epgDn, []string{"tagAnnotation"})
×
515
        }
×
516
}
517

518
func (cont *AciController) syncNADsWithAciState(aaepName string, epgDn string, oldAaepEpgAttachData,
519
        aaepEpgAttachData *AaepEpgAttachData, syncReason string) {
×
520
        if oldAaepEpgAttachData == nil {
×
521
                cont.handleNewNadCreation(aaepName, epgDn, aaepEpgAttachData, syncReason)
×
522
        } else {
×
523
                if cont.checkAnnotationModified(oldAaepEpgAttachData, aaepEpgAttachData) {
×
524
                        if oldAaepEpgAttachData.namespaceName != aaepEpgAttachData.namespaceName {
×
525
                                cont.indexMutex.Lock()
×
526
                                if oldAaepEpgAttachData.nadCreated == true {
×
527
                                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, oldAaepEpgAttachData, syncReason)
×
528
                                }
×
529
                                delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
530
                                cont.indexMutex.Unlock()
×
531
                        }
NEW
532
                } else if oldAaepEpgAttachData.encapVlan != aaepEpgAttachData.encapVlan {
×
533
                        cont.handleOldNadDeletion(aaepName, epgDn, oldAaepEpgAttachData, syncReason)
×
NEW
534
                } else {
×
NEW
535
                        NADAlreadyInCluster, _ := cont.isNADWithSameVlanAlreadyPresent(aaepName, epgDn, aaepEpgAttachData)
×
NEW
536
                        if NADAlreadyInCluster == nil {
×
NEW
537
                                cont.handleNewNadCreation(aaepName, epgDn, aaepEpgAttachData, syncReason)
×
NEW
538
                        }
×
NEW
539
                        return
×
540
                }
NEW
541
                cont.handleNewNadCreation(aaepName, epgDn, aaepEpgAttachData, syncReason)
×
542
        }
543
}
544

545
func (cont *AciController) addDeferredNADs(namespaceName string) {
×
546
        aaepEpgVlanMap := make(map[string][]EpgVlanMap)
×
547

×
548
        // Collect all AAEP EPG attachment details
×
549
        cont.indexMutex.Lock()
×
550
        for aaepName := range cont.sharedAaepMonitor {
×
551
                epgVlanMapList := cont.getAaepEpgAttObjDetails(aaepName)
×
552

×
553
                if epgVlanMapList == nil {
×
554
                        continue
×
555
                }
556

557
                aaepEpgVlanMap[aaepName] = epgVlanMapList
×
558
        }
559
        cont.indexMutex.Unlock()
×
560

×
561
        // Process each AAEP EPG attachment details
×
562
        for aaepName, epgVlanMapList := range aaepEpgVlanMap {
×
563
                for _, epgVlanMap := range epgVlanMapList {
×
564
                        aaepEpgAttachData := cont.collectNadData(&epgVlanMap)
×
565
                        if aaepEpgAttachData == nil || aaepEpgAttachData.namespaceName != namespaceName {
×
566
                                continue
×
567
                        }
568

569
                        if cont.checkIfEpgWithOverlappingVlan(aaepName, aaepEpgAttachData.encapVlan, epgVlanMap.epgDn) {
×
570
                                cont.indexMutex.Lock()
×
571
                                if cont.sharedAaepMonitor[aaepName] == nil {
×
572
                                        cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
573
                                }
×
574
                                aaepEpgAttachData.nadCreated = false
×
575
                                cont.sharedAaepMonitor[aaepName][epgVlanMap.epgDn] = aaepEpgAttachData
×
576
                                cont.indexMutex.Unlock()
×
577

×
578
                                cont.log.Errorf("Skipping NAD creation: EPG %s with AAEP %s has overlapping VLAN %d", epgVlanMap.epgDn,
×
579
                                        aaepName, aaepEpgAttachData.encapVlan)
×
580
                                continue
×
581
                        } else if cont.checkVlanUsedInCluster(aaepEpgAttachData.encapVlan) {
×
582
                                cont.log.Errorf("Skipping NAD creation: VLAN %d is already used in cluster", aaepEpgAttachData.encapVlan)
×
583
                                continue
×
584
                        } else {
×
585
                                epgDn := epgVlanMap.epgDn
×
586
                                cont.handleNewNadCreation(aaepName, epgDn, aaepEpgAttachData, "NamespaceCreated")
×
587
                        }
×
588
                }
589
        }
590
}
591

592
func (cont *AciController) cleanNADs(namespaceName string) {
×
593
        aaepMonitorDataToDelete := make(map[string]map[string]*AaepEpgAttachData)
×
594
        cont.indexMutex.Lock()
×
595
        for aaepName := range cont.sharedAaepMonitor {
×
596
                aaepEpgAttachDataMap, exists := cont.sharedAaepMonitor[aaepName]
×
597
                if !exists || aaepEpgAttachDataMap == nil {
×
598
                        continue
×
599
                }
600

601
                for epgDn, aaepEpgAttachData := range aaepEpgAttachDataMap {
×
602
                        if aaepEpgAttachData.namespaceName == namespaceName {
×
603
                                nadName := cont.generateDefaultNadName(aaepName, epgDn)
×
604
                                removedAnnotation := cont.removeManagedByAnnotationFromNAD(nadName, namespaceName)
×
605
                                if !removedAnnotation {
×
606
                                        continue
×
607
                                }
608
                                delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
609
                                if aaepEpgAttachData.nadCreated {
×
610
                                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, aaepEpgAttachData, "NamespaceDeleted")
×
611
                                }
×
612
                                aaepMonitorDataToDelete[aaepName] = aaepEpgAttachDataMap
×
613
                        }
614
                }
615
        }
616
        cont.indexMutex.Unlock()
×
617

×
618
        for aaepName, aaepEpgAttachDataMap := range aaepMonitorDataToDelete {
×
619
                for _, aaepEpgAttachData := range aaepEpgAttachDataMap {
×
620
                        cont.createNadForNextEpg(aaepName, aaepEpgAttachData.encapVlan)
×
621
                }
×
622
        }
623
}
624

625
func (cont *AciController) getAaepEpgAttObjDetails(aaepName string) []EpgVlanMap {
×
626
        uri := fmt.Sprintf("/api/node/mo/uni/infra/attentp-%s.json?query-target=subtree&target-subtree-class=infraRsFuncToEpg", aaepName)
×
627

×
628
        resp, err := cont.apicConn.GetApicResponse(uri)
×
629
        if err != nil {
×
630
                cont.log.Errorf("Failed to get response from APIC: %v", err)
×
631
                return nil
×
632
        }
×
633

634
        if len(resp.Imdata) == 0 {
×
635
                cont.log.Debugf("Can't find EPGs attached with AAEP %s", aaepName)
×
636
                return nil
×
637
        }
×
638

639
        epgVlanMapList := make([]EpgVlanMap, 0)
×
640
        for _, respImdata := range resp.Imdata {
×
641
                aaepEpgAttachObj, ok := respImdata["infraRsFuncToEpg"]
×
642
                if !ok {
×
643
                        cont.log.Debugf("Empty AAEP EPG attachment object")
×
644
                        continue
×
645
                }
646

647
                if state, hasState := aaepEpgAttachObj.Attributes["state"].(string); hasState {
×
648
                        if state != "formed" {
×
649
                                aaepEpgAttchDn := aaepEpgAttachObj.Attributes["dn"].(string)
×
650
                                cont.log.Debugf("%s is with state: %s", aaepEpgAttchDn, state)
×
651
                                continue
×
652
                        }
653
                }
654
                vlanID := 0
×
655
                if encap, hasEncap := aaepEpgAttachObj.Attributes["encap"].(string); hasEncap {
×
656
                        vlanID = cont.getVlanId(encap)
×
657
                }
×
658

659
                epgVlanMap := EpgVlanMap{
×
660
                        epgDn:     aaepEpgAttachObj.Attributes["tDn"].(string),
×
661
                        encapVlan: vlanID,
×
662
                }
×
663
                epgVlanMapList = append(epgVlanMapList, epgVlanMap)
×
664
        }
665

666
        return epgVlanMapList
×
667
}
668

669
func (cont *AciController) getEpgAnnotations(epgDn string) map[string]string {
×
670
        uri := fmt.Sprintf("/api/node/mo/%s.json?query-target=subtree&target-subtree-class=tagAnnotation", epgDn)
×
671
        resp, err := cont.apicConn.GetApicResponse(uri)
×
672
        if err != nil {
×
673
                cont.log.Errorf("Failed to get response from APIC: %v", err)
×
674
                return nil
×
675
        }
×
676

677
        annotationsMap := make(map[string]string)
×
678
        for _, respImdata := range resp.Imdata {
×
679
                annotationObj, ok := respImdata["tagAnnotation"]
×
680
                if !ok {
×
681
                        cont.log.Debugf("Empty tag annotation of EPG %s", epgDn)
×
682
                        continue
×
683
                }
684

685
                key := annotationObj.Attributes["key"].(string)
×
686
                annotationsMap[key] = annotationObj.Attributes["value"].(string)
×
687
        }
688

689
        return annotationsMap
×
690
}
691

692
func (cont *AciController) checkIfEPGExists(epgDn string) bool {
×
693
        uri := fmt.Sprintf("/api/node/mo/%s.json", epgDn)
×
694
        resp, err := cont.apicConn.GetApicResponse(uri)
×
695
        if err != nil {
×
696
                cont.log.Errorf("Failed to get response from APIC: %v", err)
×
697
                return false
×
698
        }
×
699
        if len(resp.Imdata) == 0 {
×
700
                cont.log.Debugf("EPG %s does not exist", epgDn)
×
701
                return false
×
702
        }
×
703
        return true
×
704
}
705

706
func (cont *AciController) getSpecificEPGAnnotation(annotations map[string]string) (string, string) {
×
707
        namespaceNameAnnotationKey := cont.config.CnoIdentifier + "-namespace"
×
708
        namespaceName, exists := annotations[namespaceNameAnnotationKey]
×
709
        if !exists {
×
710
                cont.log.Debugf("Annotation with key '%s' not found", namespaceNameAnnotationKey)
×
711
        }
×
712

713
        nadNameAnnotationKey := cont.config.CnoIdentifier + "-nad"
×
714
        nadName, exists := annotations[nadNameAnnotationKey]
×
715
        if !exists {
×
716
                cont.log.Debugf("Annotation with key '%s' not found", nadNameAnnotationKey)
×
717
        }
×
718
        return namespaceName, nadName
×
719
}
720

721
func (cont *AciController) namespaceChecks(namespaceName string, epgDn string) bool {
×
722
        if namespaceName == "" {
×
723
                cont.log.Debugf("Defering NAD operation for EPG %s: Namespace name not provided in EPG annotation", epgDn)
×
724
                return false
×
725
        }
×
726

727
        kubeClient := cont.env.(*K8sEnvironment).kubeClient
×
728
        _, err := kubeClient.CoreV1().Namespaces().Get(context.TODO(), namespaceName, metav1.GetOptions{})
×
729
        namespaceExists := err == nil
×
730
        if !namespaceExists {
×
731
                cont.log.Debugf("Defering NAD operation for EPG %s: Namespace %s not exists", epgDn, namespaceName)
×
732
                return false
×
733
        }
×
734

735
        return true
×
736
}
737

738
func (cont *AciController) reconcileNadData(aaepName string) {
×
739
        epgVlanMapList := cont.getAaepEpgAttObjDetails(aaepName)
×
740

×
741
        for _, epgVlanMap := range epgVlanMapList {
×
742
                if cont.checkVlanUsedInCluster(epgVlanMap.encapVlan) {
×
743
                        cont.log.Errorf("Skipping NAD creation: VLAN %d is already used in cluster", epgVlanMap.encapVlan)
×
744
                        continue
×
745
                }
746
                aaepEpgAttachData := cont.collectNadData(&epgVlanMap)
×
747
                if aaepEpgAttachData == nil {
×
748
                        cont.apicConn.AddImmediateSubscriptionDnLocked(epgVlanMap.epgDn,
×
749
                                []string{"tagAnnotation"}, cont.handleAnnotationAdded,
×
750
                                cont.handleAnnotationDeleted)
×
751
                        continue
×
752
                }
753

754
                epgDn := epgVlanMap.epgDn
×
755
                if cont.checkIfEpgWithOverlappingVlan(aaepName, aaepEpgAttachData.encapVlan, epgDn) {
×
756
                        aaepEpgAttachData.nadCreated = false
×
757
                        cont.indexMutex.Lock()
×
758
                        if cont.sharedAaepMonitor[aaepName] == nil {
×
759
                                cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
760
                        }
×
761
                        cont.sharedAaepMonitor[aaepName][epgDn] = aaepEpgAttachData
×
762
                        cont.indexMutex.Unlock()
×
763
                        cont.apicConn.AddImmediateSubscriptionDnLocked(epgDn,
×
764
                                []string{"tagAnnotation"}, cont.handleAnnotationAdded,
×
765
                                cont.handleAnnotationDeleted)
×
766
                        cont.log.Errorf("Skipping NAD creation: EPG %s with AAEP %s has overlapping VLAN %d",
×
767
                                epgDn, aaepName, aaepEpgAttachData.encapVlan)
×
768
                        continue
×
769
                }
770

771
                OldepgDn := cont.handleNewNadCreation(aaepName, epgDn, aaepEpgAttachData, "AaepAddedInCR")
×
772
                if OldepgDn != "" {
×
773
                        cont.apicConn.AddImmediateSubscriptionDnLocked(OldepgDn,
×
774
                                []string{"tagAnnotation"}, cont.handleAnnotationAdded,
×
775
                                cont.handleAnnotationDeleted)
×
776
                }
×
777

778
                cont.apicConn.AddImmediateSubscriptionDnLocked(epgDn,
×
779
                        []string{"tagAnnotation"}, cont.handleAnnotationAdded,
×
780
                        cont.handleAnnotationDeleted)
×
781
        }
782

783
        cont.indexMutex.Lock()
×
784
        if _, ok := cont.sharedAaepMonitor[aaepName]; !ok {
×
785
                cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
786
        }
×
787
        cont.indexMutex.Unlock()
×
788
}
789

790
// clean converts a string to lowercase, removes underscores and dots,
791
// and replaces any other invalid character with a hyphen.
792
func cleanApicResourceNames(apicResource string) string {
×
793
        apicResource = strings.ToLower(apicResource)
×
794
        var stringBuilder strings.Builder
×
795
        for _, character := range apicResource {
×
796
                switch {
×
797
                case character == '_' || character == '.':
×
798
                        continue
×
799
                case (character >= 'a' && character <= 'z') || (character >= '0' && character <= '9') || character == '-':
×
800
                        stringBuilder.WriteRune(character)
×
801
                default:
×
802
                        stringBuilder.WriteRune('-')
×
803
                }
804
        }
805
        return strings.Trim(stringBuilder.String(), "-")
×
806
}
807

808
func (cont *AciController) generateDefaultNadName(aaepName, epgDn string) string {
×
809
        parts := strings.Split(epgDn, "/")
×
810

×
811
        tenant := parts[1][3:]
×
812
        appProfile := parts[2][3:]
×
813
        epgName := parts[3][4:]
×
814

×
815
        apicResourceNames := tenant + appProfile + epgName + aaepName
×
816
        hashBytes := sha256.Sum256([]byte(apicResourceNames))
×
817
        hash := hex.EncodeToString(hashBytes[:])[:16]
×
818

×
819
        return fmt.Sprintf("%s-%s-%s-%s",
×
820
                cleanApicResourceNames(tenant), cleanApicResourceNames(appProfile), cleanApicResourceNames(epgName), hash)
×
821
}
×
822

823
func (cont *AciController) isNADUpdateRequired(aaepName string, epgDn string, nadData *AaepEpgAttachData,
824
        existingNAD *nadapi.NetworkAttachmentDefinition) bool {
×
825
        vlanID := nadData.encapVlan
×
826
        namespaceName := nadData.namespaceName
×
827
        customNadName := nadData.nadName
×
828
        defaultNadName := cont.generateDefaultNadName(aaepName, epgDn)
×
829
        existingAnnotaions := existingNAD.ObjectMeta.Annotations
×
830
        if existingAnnotaions != nil {
×
831
                if existingNAD.ObjectMeta.Annotations["aci-sync-status"] == "out-of-sync" || existingNAD.ObjectMeta.Annotations["cno-name"] != customNadName {
×
832
                        return true
×
833
                }
×
834
        } else {
×
835
                // NAD exists, check if VLAN needs to be updated
×
836
                existingConfig := existingNAD.Spec.Config
×
837
                if existingConfig != "" {
×
838
                        var existingCNVConfig map[string]interface{}
×
839
                        if json.Unmarshal([]byte(existingConfig), &existingCNVConfig) == nil {
×
840
                                if existingVLAN, ok := existingCNVConfig["vlan"].(float64); ok {
×
841
                                        if int(existingVLAN) == vlanID {
×
842
                                                // VLAN hasn't changed, no update needed
×
843
                                                cont.log.Infof("NetworkAttachmentDefinition %s already exists with correct VLAN %d in namespace %s",
×
844
                                                        defaultNadName, vlanID, namespaceName)
×
845
                                                return false
×
846
                                        }
×
847
                                } else if vlanID == 0 {
×
848
                                        // Both existing and new have no VLAN, no update needed
×
849
                                        cont.log.Infof("NetworkAttachmentDefinition %s already exists with no VLAN in namespace %s", defaultNadName, namespaceName)
×
850
                                        return false
×
851
                                }
×
852
                        }
853
                }
854
        }
855

856
        return true
×
857
}
858

859
func (cont *AciController) createNetworkAttachmentDefinition(aaepName string, epgDn string, nadData *AaepEpgAttachData, createReason string) bool {
×
860
        bridge := cont.config.BridgeName
×
861
        if bridge == "" {
×
862
                cont.log.Errorf("Linux bridge name must be specified when creating NetworkAttachmentDefinitions")
×
863
                return false
×
864
        }
×
865

866
        vlanID := nadData.encapVlan
×
867
        namespaceName := nadData.namespaceName
×
868
        customNadName := nadData.nadName
×
869
        defaultNadName := cont.generateDefaultNadName(aaepName, epgDn)
×
870
        nadClient := cont.env.(*K8sEnvironment).nadClient
×
871
        mtu := 1500
×
872

×
873
        // Check if NAD already exists
×
874
        existingNAD, err := nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Get(context.TODO(), defaultNadName, metav1.GetOptions{})
×
875
        nadExists := err == nil
×
876

×
877
        if nadExists && !cont.isNADUpdateRequired(aaepName, epgDn, nadData, existingNAD) {
×
878
                return true
×
879
        }
×
880

881
        cnvBridgeConfig := map[string]any{
×
882
                "cniVersion": "0.3.1",
×
883
                "name":       defaultNadName,
×
884
                "type":       "bridge",
×
885
                "bridge":     bridge,
×
886
        }
×
887

×
888
        if !nadExists {
×
889
                cnvBridgeConfig["mtu"] = mtu
×
890
                cnvBridgeConfig["disableContainerInterface"] = true
×
891
                // Add optional parameters from controller config if they are set
×
892
                if cont.config.IsGateway != nil {
×
893
                        cnvBridgeConfig["isGateway"] = *cont.config.IsGateway
×
894
                }
×
895
                if cont.config.IsDefaultGateway != nil {
×
896
                        cnvBridgeConfig["isDefaultGateway"] = *cont.config.IsDefaultGateway
×
897
                }
×
898
                if cont.config.ForceAddress != nil {
×
899
                        cnvBridgeConfig["forceAddress"] = *cont.config.ForceAddress
×
900
                }
×
901
                if cont.config.IpMasq != nil {
×
902
                        cnvBridgeConfig["ipMasq"] = *cont.config.IpMasq
×
903
                }
×
904
                if cont.config.IpMasqBackend != "" {
×
905
                        cnvBridgeConfig["ipMasqBackend"] = cont.config.IpMasqBackend
×
906
                }
×
907
                if cont.config.Mtu != nil {
×
908
                        cnvBridgeConfig["mtu"] = *cont.config.Mtu
×
909
                }
×
910
                if cont.config.HairpinMode != nil {
×
911
                        cnvBridgeConfig["hairpinMode"] = *cont.config.HairpinMode
×
912
                }
×
913
                if cont.config.PromiscMode != nil {
×
914
                        cnvBridgeConfig["promiscMode"] = *cont.config.PromiscMode
×
915
                }
×
916
                if cont.config.Enabledad != nil {
×
917
                        cnvBridgeConfig["enabledad"] = *cont.config.Enabledad
×
918
                }
×
919
                if cont.config.Macspoofchk != nil {
×
920
                        cnvBridgeConfig["macspoofchk"] = *cont.config.Macspoofchk
×
921
                }
×
922
                if cont.config.DisableContainerInterface != nil {
×
923
                        cnvBridgeConfig["disableContainerInterface"] = *cont.config.DisableContainerInterface
×
924
                }
×
925
                if cont.config.PortIsolation != nil {
×
926
                        cnvBridgeConfig["portIsolation"] = *cont.config.PortIsolation
×
927
                }
×
928
                if len(cont.config.Ipam) > 0 {
×
929
                        cnvBridgeConfig["ipam"] = cont.config.Ipam
×
930
                }
×
931
        } else {
×
932
                // Preserve existing optional parameters from existing NAD
×
933
                existingConfig := existingNAD.Spec.Config
×
934
                if existingConfig != "" {
×
935
                        var existingCNVConfig map[string]interface{}
×
936
                        if json.Unmarshal([]byte(existingConfig), &existingCNVConfig) == nil {
×
937
                                optionalParams := []string{"isGateway", "isDefaultGateway", "forceAddress", "ipMasq",
×
938
                                        "ipMasqBackend", "mtu", "hairpinMode", "promiscMode", "enabledad", "macspoofchk",
×
939
                                        "disableContainerInterface", "portIsolation", "ipam"}
×
940
                                for _, param := range optionalParams {
×
941
                                        if value, ok := existingCNVConfig[param]; ok {
×
942
                                                cnvBridgeConfig[param] = value
×
943
                                        }
×
944
                                }
945
                        }
946
                }
947
        }
948
        if vlanID > 0 {
×
949
                cnvBridgeConfig["vlan"] = vlanID
×
950
        }
×
951

952
        configJSON, err := json.Marshal(cnvBridgeConfig)
×
953
        if err != nil {
×
954
                cont.log.Errorf("Failed to marshal CNV bridge config: %v", err)
×
955
                return false
×
956
        }
×
957

958
        nad := &nadapi.NetworkAttachmentDefinition{
×
959
                TypeMeta: metav1.TypeMeta{
×
960
                        APIVersion: "k8s.cni.cncf.io/v1",
×
961
                        Kind:       "NetworkAttachmentDefinition",
×
962
                },
×
963
                ObjectMeta: metav1.ObjectMeta{
×
964
                        Name:      defaultNadName,
×
965
                        Namespace: namespaceName,
×
966
                        Labels: map[string]string{
×
967
                                "managed-by": "cisco-network-operator",
×
968
                                "vlan":       strconv.Itoa(vlanID),
×
969
                        },
×
970
                        Annotations: map[string]string{
×
971
                                "managed-by":      "cisco-network-operator",
×
972
                                "vlan":            strconv.Itoa(vlanID),
×
973
                                "cno-name":        customNadName,
×
974
                                "aci-sync-status": "in-sync",
×
975
                                "aaep-name":       aaepName,
×
976
                                "epg-dn":          epgDn,
×
977
                        },
×
978
                },
×
979
                Spec: nadapi.NetworkAttachmentDefinitionSpec{
×
980
                        Config: string(configJSON),
×
981
                },
×
982
        }
×
983

×
984
        if nadExists {
×
985
                nad.ObjectMeta.ResourceVersion = existingNAD.ObjectMeta.ResourceVersion
×
986

×
987
                updatedNad, err := nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Update(context.TODO(), nad, metav1.UpdateOptions{})
×
988

×
989
                if err != nil {
×
990
                        cont.log.Errorf("Failed to update NetworkAttachmentDefinition %s from namespace %s : %v", customNadName, namespaceName, err)
×
991
                        return false
×
992
                }
×
993

994
                cont.log.Debugf("Existing NAD Annotations: %v, %s", existingNAD.ObjectMeta.Annotations, createReason)
×
995
                if existingNAD.ObjectMeta.Annotations["aci-sync-status"] == "out-of-sync" {
×
996
                        cont.submitEvent(updatedNad, createReason, cont.getNADRevampMessage(createReason))
×
997
                }
×
998
                cont.log.Infof("Updated NetworkAttachmentDefinition %s from namespace %s", defaultNadName, namespaceName)
×
999
        } else {
×
1000
                _, err = nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Create(context.TODO(), nad, metav1.CreateOptions{})
×
1001
                if err != nil {
×
1002
                        cont.log.Errorf("Failed to create NetworkAttachmentDefinition %s in namespace %s : %v", customNadName, namespaceName, err)
×
1003
                        return false
×
1004
                }
×
1005
                cont.log.Infof("Created NetworkAttachmentDefinition %s in namespace %s", defaultNadName, namespaceName)
×
1006
        }
1007

1008
        return true
×
1009
}
1010

1011
func (cont *AciController) deleteNetworkAttachmentDefinition(aaepName string, epgDn string, nadData *AaepEpgAttachData, deleteReason string) {
×
1012
        namespaceName := nadData.namespaceName
×
1013

×
1014
        kubeClient := cont.env.(*K8sEnvironment).kubeClient
×
1015
        _, err := kubeClient.CoreV1().Namespaces().Get(context.TODO(), namespaceName, metav1.GetOptions{})
×
1016
        namespaceExists := err == nil
×
1017
        if !namespaceExists {
×
1018
                cont.log.Debugf("Defering NAD deletion for EPG %s: Namespace %s not exists", epgDn, namespaceName)
×
1019
                return
×
1020
        }
×
1021

1022
        nadName := cont.generateDefaultNadName(aaepName, epgDn)
×
1023
        nadClient := cont.env.(*K8sEnvironment).nadClient
×
1024

×
1025
        nadDetails, err := nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Get(context.TODO(), nadName, metav1.GetOptions{})
×
1026
        nadExists := err == nil
×
1027

×
1028
        if nadExists {
×
1029
                if !cont.isVmmLiteNAD(nadDetails) {
×
1030
                        return
×
1031
                }
×
1032

1033
                if cont.isNADinUse(namespaceName, nadName) {
×
1034
                        nadDetails.ObjectMeta.Annotations["aci-sync-status"] = "out-of-sync"
×
1035
                        _, err = nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Update(context.TODO(), nadDetails, metav1.UpdateOptions{})
×
1036
                        if err != nil {
×
1037
                                cont.log.Errorf("Failed to add out-of-sync annotation to the NAD %s from namespace %s : %v", nadName, namespaceName, err)
×
1038
                                return
×
1039
                        }
×
1040
                        cont.submitEvent(nadDetails, deleteReason, cont.getNADDeleteMessage(deleteReason))
×
1041
                        cont.log.Infof("Added annotation out-of-sync for NAD %s from namespace %s", nadName, namespaceName)
×
1042
                        return
×
1043
                }
1044

1045
                delete(nadDetails.ObjectMeta.Annotations, "managed-by")
×
1046
                _, err = nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Update(context.TODO(), nadDetails, metav1.UpdateOptions{})
×
1047
                if err != nil {
×
1048
                        cont.log.Errorf("Failed to remove VMM lite annotation from NetworkAttachmentDefinition %s from namespace %s: %v", nadName, namespaceName, err)
×
1049
                        return
×
1050
                }
×
1051

1052
                nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Delete(context.TODO(), nadName, metav1.DeleteOptions{})
×
1053
                cont.log.Infof("Deleted NAD %s from %s namespace", nadName, namespaceName)
×
1054
        } else {
×
1055
                cont.log.Debugf("NAD %s not there to delete in namespace %s", nadName, namespaceName)
×
1056
        }
×
1057
}
1058

1059
func (cont *AciController) removeManagedByAnnotationFromNAD(nadName, namespaceName string) bool {
×
1060
        nadClient := cont.env.(*K8sEnvironment).nadClient
×
1061
        // Check if NAD already exists
×
1062
        existingNAD, err := nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Get(context.TODO(), nadName, metav1.GetOptions{})
×
1063
        nadExists := err == nil
×
1064

×
1065
        if nadExists {
×
1066
                if !cont.isVmmLiteNAD(existingNAD) {
×
1067
                        return true
×
1068
                }
×
1069

1070
                delete(existingNAD.ObjectMeta.Annotations, "managed-by")
×
1071
                _, err = nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions(namespaceName).Update(context.TODO(), existingNAD, metav1.UpdateOptions{})
×
1072
                if err != nil {
×
1073
                        cont.log.Errorf("Failed to remove managed-by VMM lite annotation from NetworkAttachmentDefinition %s from namespace %s: %v", nadName, namespaceName, err)
×
1074
                        return false
×
1075
                }
×
1076

1077
                cont.log.Infof("Removed managed-by annotation from NAD %s in namespace %s", nadName, namespaceName)
×
1078
        } else {
×
1079
                cont.log.Debugf("NAD %s not there to remove managed-by annotation in namespace %s", nadName, namespaceName)
×
1080
        }
×
1081
        return true
×
1082
}
1083

1084
func (cont *AciController) getVlanId(encap string) int {
×
1085
        if after, ok := strings.CutPrefix(encap, "vlan-"); ok {
×
1086
                vlanStr := after
×
1087
                if vlanID, err := strconv.Atoi(vlanStr); err == nil && vlanID > 0 {
×
1088
                        return vlanID
×
1089
                }
×
1090
        } else if after, ok := strings.CutPrefix(encap, "vlan"); ok {
×
1091
                vlanStr := after
×
1092
                if vlanID, err := strconv.Atoi(vlanStr); err == nil && vlanID > 0 {
×
1093
                        return vlanID
×
1094
                }
×
1095
        }
1096

1097
        return 0
×
1098
}
1099

1100
func (cont *AciController) getAaepDiff(crAaeps []string) (addedAaeps, removedAaeps []string) {
×
1101
        crAaepMap := make(map[string]bool)
×
1102
        for _, crAaep := range crAaeps {
×
1103
                crAaepMap[crAaep] = true
×
1104
        }
×
1105

1106
        cont.indexMutex.Lock()
×
1107
        for _, crAaep := range crAaeps {
×
1108
                if _, ok := cont.sharedAaepMonitor[crAaep]; !ok {
×
1109
                        addedAaeps = append(addedAaeps, crAaep)
×
1110
                }
×
1111
        }
1112
        cont.indexMutex.Unlock()
×
1113

×
1114
        cont.indexMutex.Lock()
×
1115
        for cachedAaep := range cont.sharedAaepMonitor {
×
1116
                if !crAaepMap[cachedAaep] {
×
1117
                        removedAaeps = append(removedAaeps, cachedAaep)
×
1118
                }
×
1119
        }
1120
        cont.indexMutex.Unlock()
×
1121

×
1122
        return
×
1123
}
1124

1125
func (cont *AciController) getEncapFromAaepEpgAttachObj(aaepName, epgDn string) string {
×
1126
        uri := fmt.Sprintf("/api/node/mo/uni/infra/attentp-%s/gen-default/rsfuncToEpg-[%s].json?query-target=self", aaepName, epgDn)
×
1127
        resp, err := cont.apicConn.GetApicResponse(uri)
×
1128
        if err != nil {
×
1129
                cont.log.Errorf("Failed to get response from APIC: AAEP %s and EPG %s ERROR: %v", aaepName, epgDn, err)
×
1130
                return ""
×
1131
        }
×
1132

1133
        for _, obj := range resp.Imdata {
×
1134
                lresp, ok := obj["infraRsFuncToEpg"]
×
1135
                if !ok {
×
1136
                        cont.log.Errorf("InfraRsFuncToEpg object not found in response for %s", uri)
×
1137
                        break
×
1138
                }
1139
                if val, ok := lresp.Attributes["encap"]; ok {
×
1140
                        encap := val.(string)
×
1141
                        return encap
×
1142
                } else {
×
1143
                        cont.log.Errorf("Encap missing for infraRsFuncToEpg object for %s: %v", uri, err)
×
1144
                        break
×
1145
                }
1146
        }
1147

1148
        return ""
×
1149
}
1150

1151
func (cont *AciController) isVmmLiteNAD(nadDetails *nadapi.NetworkAttachmentDefinition) bool {
×
1152
        return nadDetails.ObjectMeta.Annotations["managed-by"] == "cisco-network-operator"
×
1153
}
×
1154

1155
func (cont *AciController) isNADinUse(namespaceName string, nadName string) bool {
×
1156
        kubeClient := cont.env.(*K8sEnvironment).kubeClient
×
1157
        pods, err := kubeClient.CoreV1().Pods(namespaceName).List(context.TODO(), metav1.ListOptions{})
×
1158
        if err == nil {
×
1159
                var networks []map[string]string
×
1160
                for _, pod := range pods.Items {
×
1161
                        networksAnn, ok := pod.Annotations["k8s.v1.cni.cncf.io/networks"]
×
1162
                        if ok && (networksAnn == nadName) {
×
1163
                                cont.log.Infof("NAD %s is still used by Pod %s/%s", nadName, namespaceName, pod.Name)
×
1164
                                return true
×
1165
                        }
×
1166
                        if err := json.Unmarshal([]byte(networksAnn), &networks); err != nil {
×
1167
                                cont.log.Errorf("Error while getting pod annotations: %v", err)
×
1168
                                return false
×
1169
                        }
×
1170
                        for _, network := range networks {
×
1171
                                if ok && (network["name"] == nadName) {
×
1172
                                        cont.log.Infof("NAD %s is still used by VM %s/%s", nadName, namespaceName, pod.Name)
×
1173
                                        return true
×
1174
                                }
×
1175
                        }
1176
                }
1177
        }
1178
        return false
×
1179
}
1180

1181
func (cont *AciController) getNADDeleteMessage(deleteReason string) string {
×
1182
        messagePrefix := "NAD is in use by pods: "
×
1183
        switch {
×
1184
        case deleteReason == "EpgDeleted":
×
1185
                return messagePrefix + "EPG deleted"
×
1186
        case deleteReason == "NamespaceAnnotationRemoved":
×
1187
                return messagePrefix + "Namespace name EPG annotaion removed"
×
NEW
1188
        case deleteReason == "NamespaceAnnotationModified":
×
NEW
1189
                return messagePrefix + "Namespace name EPG annotation modified"
×
1190
        case deleteReason == "AaepEpgDetached":
×
1191
                return messagePrefix + "EPG detached from AAEP"
×
1192
        case deleteReason == "CRDeleted":
×
1193
                return messagePrefix + "aaepmonitor CR deleted"
×
1194
        case deleteReason == "AaepRemovedFromCR":
×
1195
                return messagePrefix + "AAEP removed from aaepmonitor CR"
×
1196
        case deleteReason == "AaepEpgAttachedWithVlanUsedInCluster":
×
1197
                return messagePrefix + "EPG with AAEP has overlapping VLAN with existing cluster VLAN"
×
1198
        case deleteReason == "AaepEpgAttachedWithOverlappingVlan":
×
1199
                return messagePrefix + "EPG with AAEP has overlapping VLAN with another EPG"
×
1200
        case deleteReason == "NamespaceDeleted":
×
1201
                return messagePrefix + "Namespace deleted"
×
1202
        case deleteReason == "AaepEpgAttachedWithVlanInUse":
×
1203
                return messagePrefix + "EPG with AAEP has VLAN already used in cluster"
×
NEW
1204
        case deleteReason == "VlanUpdatedInAaepEpgAttach":
×
NEW
1205
                return messagePrefix + "VLAN updated in AAEP EPG attachment"
×
1206
        }
1207
        return messagePrefix + "One or many pods are using NAD"
×
1208
}
1209

1210
func (cont *AciController) getNADRevampMessage(createReason string) string {
×
1211
        messagePrefix := "NAD is in sync: "
×
1212
        switch {
×
1213
        case createReason == "NamespaceAnnotationAdded":
×
1214
                return messagePrefix + "Namespace name EPG annotaion added"
×
1215
        case createReason == "AaepEpgAttached":
×
1216
                return messagePrefix + "EPG attached with AAEP"
×
1217
        case createReason == "AaepAddedInCR":
×
1218
                return messagePrefix + "AAEP added back in aaepmonitor CR"
×
1219
        case createReason == "NamespaceCreated":
×
1220
                return messagePrefix + "Namespace created back"
×
1221
        case createReason == "NextEpgNadCreation":
×
1222
                return messagePrefix + "NAD creation for next EPG with same VLAN"
×
1223
        }
1224
        return messagePrefix + "NAD synced with ACI"
×
1225
}
1226

1227
func (cont *AciController) isEpgAttachedWithAaep(epgDn string) bool {
×
1228
        cont.indexMutex.Lock()
×
1229
        defer cont.indexMutex.Unlock()
×
1230
        for aaepName := range cont.sharedAaepMonitor {
×
1231
                encap := cont.getEncapFromAaepEpgAttachObj(aaepName, epgDn)
×
1232
                if encap != "" {
×
1233
                        return true
×
1234
                }
×
1235
        }
1236
        return false
×
1237
}
1238

1239
func (cont *AciController) checkDuplicateAaepEpgAttachRequest(aaepName, epgDn string, vlanID int) bool {
×
1240
        cont.indexMutex.Lock()
×
1241
        defer cont.indexMutex.Unlock()
×
1242
        aaepEpgAttachDataMap, exists := cont.sharedAaepMonitor[aaepName]
×
1243
        if !exists || aaepEpgAttachDataMap == nil {
×
1244
                return false
×
1245
        }
×
1246

1247
        aaepEpgAttachData, exists := aaepEpgAttachDataMap[epgDn]
×
1248
        if !exists || aaepEpgAttachData == nil {
×
1249
                return false
×
1250
        }
×
1251

NEW
1252
        if vlanID == aaepEpgAttachData.encapVlan && aaepEpgAttachData.nadCreated {
×
1253
                return true
×
1254
        }
×
1255
        return false
×
1256
}
1257

1258
func (cont *AciController) checkIfEpgWithOverlappingVlan(aaepName string, vlanId int, epgDn string) bool {
×
1259
        cont.indexMutex.Lock()
×
1260
        defer cont.indexMutex.Unlock()
×
1261
        oldAaepEpgAttachData := cont.getAaepEpgAttachDataLocked(aaepName, epgDn)
×
1262

×
1263
        if oldAaepEpgAttachData != nil {
×
1264
                // If old data exists with NAD created and VLAN is same in old and new data, skip checking for overlapping VLAN for the same EPG
×
1265
                if oldAaepEpgAttachData.encapVlan == vlanId && oldAaepEpgAttachData.nadCreated {
×
1266
                        return false
×
1267
                }
×
1268
        }
1269
        aaepEpgAttachDataMap, exists := cont.sharedAaepMonitor[aaepName]
×
1270
        if !exists || aaepEpgAttachDataMap == nil {
×
1271
                return false
×
1272
        }
×
1273

1274
        for _, aaepEpgData := range aaepEpgAttachDataMap {
×
NEW
1275
                if vlanId == aaepEpgData.encapVlan && aaepEpgData.nadCreated {
×
1276
                        return true
×
1277
                }
×
1278
        }
1279
        return false
×
1280
}
1281

1282
func (cont *AciController) createNadForNextEpg(aaepName string, vlanId int) {
×
1283
        cont.indexMutex.Lock()
×
1284
        defer cont.indexMutex.Unlock()
×
1285

×
1286
        aaepEpgAttachDataMap := cont.sharedAaepMonitor[aaepName]
×
1287
        for epgDn, aaepEpgAttachData := range aaepEpgAttachDataMap {
×
1288
                if aaepEpgAttachData.encapVlan != vlanId || aaepEpgAttachData.nadCreated {
×
1289
                        continue
×
1290
                } else if !cont.namespaceChecks(aaepEpgAttachData.namespaceName, epgDn) {
×
1291
                        cont.log.Debugf("Skipping NAD creation for next EPG %s with AAEP %s and VLAN %d: Namespace checks failed", epgDn, aaepName, vlanId)
×
1292
                        continue
×
1293
                } else {
×
1294
                        cont.log.Infof("Creating NAD for next EPG %s with AAEP %s and VLAN %d, for which previously NAD not created due to overlapping Vlan",
×
1295
                                epgDn, aaepName, vlanId)
×
1296
                        needCacheChange := cont.createNetworkAttachmentDefinition(aaepName, epgDn, aaepEpgAttachData, "NextEpgNadCreation")
×
1297
                        if needCacheChange {
×
1298
                                aaepEpgAttachData.nadCreated = true
×
1299
                                if cont.sharedAaepMonitor[aaepName] == nil {
×
1300
                                        cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
1301
                                }
×
1302
                                cont.sharedAaepMonitor[aaepName][epgDn] = aaepEpgAttachData
×
1303
                        }
1304
                        cont.log.Infof("Created NAD for next EPG %s with AAEP %s and VLAN %d", epgDn, aaepName, vlanId)
×
1305
                        break
×
1306
                }
1307
        }
1308
}
1309

1310
func (cont *AciController) checkVlanUsedInCluster(vlanId int) bool {
×
1311
        if vlanId == cont.config.KubeapiVlan {
×
1312
                return true
×
1313
        }
×
1314
        return false
×
1315
}
1316

1317
func (cont *AciController) checkMonitorDataModified(oldData, newData *AaepEpgAttachData) bool {
×
1318
        if oldData == nil {
×
1319
                return true
×
1320
        }
×
1321
        if oldData.namespaceName != newData.namespaceName ||
×
1322
                oldData.nadName != newData.nadName ||
×
1323
                oldData.encapVlan != newData.encapVlan {
×
1324
                return true
×
1325
        }
×
1326
        return false
×
1327
}
1328

1329
func (cont *AciController) handleOldNadDeletion(aaepName, epgDn string,
1330
        oldAaepMonitorData *AaepEpgAttachData, deleteReason string) {
×
1331
        if oldAaepMonitorData == nil {
×
1332
                return
×
1333
        }
×
1334
        cont.indexMutex.Lock()
×
1335
        delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
1336
        if oldAaepMonitorData.nadCreated {
×
1337
                cont.log.Debugf("Deleting NAD for EPG %s with AAEP %s due to %s", epgDn, aaepName, deleteReason)
×
1338
                cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, oldAaepMonitorData, deleteReason)
×
1339
        }
×
1340
        cont.indexMutex.Unlock()
×
1341
        if oldAaepMonitorData.nadCreated {
×
1342
                cont.createNadForNextEpg(aaepName, oldAaepMonitorData.encapVlan)
×
1343
        }
×
1344
}
1345

1346
func (cont *AciController) handleNewNadCreation(aaepName, epgDn string,
1347
        newAaepMonitorData *AaepEpgAttachData, createReason string) string {
×
1348
        cont.indexMutex.Lock()
×
1349
        defer cont.indexMutex.Unlock()
×
1350
        // If there are multiple EPGs associated with same vlan for an aaep,
×
1351
        // then only one NAD will be there.
×
1352
        // After controller restart, if any other EPG notification comes before the already present NAD
×
1353
        // it will result in 2 NADs.
×
1354
        // Below check is to avoid the condition
×
1355
        NADAlreadyInCluster, oldEpgDn := cont.isNADWithSameVlanAlreadyPresent(aaepName, epgDn, newAaepMonitorData)
×
1356
        if NADAlreadyInCluster != nil {
×
1357
                cont.log.Errorf("Cannot create NAD for EPG %s as there is a NAD already present %v with EPG %s attached to AAEP %s", epgDn, NADAlreadyInCluster, oldEpgDn, aaepName)
×
1358
                if cont.sharedAaepMonitor[aaepName] == nil {
×
1359
                        cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
1360
                }
×
1361
                cont.sharedAaepMonitor[aaepName][oldEpgDn] = NADAlreadyInCluster
×
1362
                newAaepMonitorData.nadCreated = false
×
1363
                cont.sharedAaepMonitor[aaepName][epgDn] = newAaepMonitorData
×
1364
                return oldEpgDn
×
1365
        }
1366
        needCacheChange := cont.createNetworkAttachmentDefinition(aaepName, epgDn, newAaepMonitorData, createReason)
×
1367
        if needCacheChange {
×
1368
                if cont.sharedAaepMonitor[aaepName] == nil {
×
1369
                        cont.sharedAaepMonitor[aaepName] = make(map[string]*AaepEpgAttachData)
×
1370
                }
×
1371
                cont.sharedAaepMonitor[aaepName][epgDn] = newAaepMonitorData
×
1372
        }
1373
        return ""
×
1374
}
1375

1376
func (cont *AciController) checkAnnotationModified(oldAaepEpgAttachData, newAaepEpgAttachData *AaepEpgAttachData) bool {
×
1377
        if oldAaepEpgAttachData.nadName != newAaepEpgAttachData.nadName || oldAaepEpgAttachData.namespaceName != newAaepEpgAttachData.namespaceName {
×
1378
                return true
×
1379
        }
×
1380
        return false
×
1381
}
1382

1383
func (cont *AciController) isNADWithSameVlanAlreadyPresent(aaepName string, epgDn string, newAaepMonitorData *AaepEpgAttachData) (*AaepEpgAttachData, string) {
×
1384
        allNADs, err := cont.getAllNADs()
×
1385
        if err != nil {
×
1386
                cont.log.Errorf("Failed to get all NADs: %v", err)
×
1387
                return nil, ""
×
1388
        }
×
1389

1390
        for _, nad := range allNADs {
×
1391
                ns := nad.Namespace
×
1392
                annotations := nad.ObjectMeta.Annotations
×
1393
                if annotations == nil {
×
1394
                        continue
×
1395
                }
1396
                // Check for required annotations
1397
                if annotations["managed-by"] != "cisco-network-operator" ||
×
1398
                        annotations["aci-sync-status"] != "in-sync" ||
×
1399
                        annotations["aaep-name"] != aaepName {
×
1400
                        continue
×
1401
                }
1402

1403
                existingEpgDn := annotations["epg-dn"]
×
1404
                // Skip if same EPG DN
×
1405
                if existingEpgDn == epgDn {
×
1406
                        cont.log.Infof("Found existing NAD %s/%s for epg %s ", ns, nad.Name, epgDn)
×
1407
                        return nil, ""
×
1408
                }
×
1409
                // Compare VLAN
1410
                existingVlan, err := strconv.Atoi(annotations["vlan"])
×
1411
                if err != nil {
×
1412
                        cont.log.Warnf("Invalid VLAN in NAD %s/%s: %v", ns, nad.Name, err)
×
1413
                        continue
×
1414
                }
1415

1416
                if existingVlan == newAaepMonitorData.encapVlan {
×
1417
                        cont.log.Infof("Found existing NAD %s/%s with same VLAN %d for aaep %s", ns, nad.Name, existingVlan, aaepName)
×
1418

×
1419
                        return &AaepEpgAttachData{
×
1420
                                nadName:       annotations["cno-name"],
×
1421
                                namespaceName: ns,
×
1422
                                encapVlan:     existingVlan,
×
1423
                                nadCreated:    true,
×
1424
                        }, existingEpgDn
×
1425
                }
×
1426
        }
1427

1428
        return nil, ""
×
1429
}
1430

1431
func (cont *AciController) getAllNADs() ([]nadapi.NetworkAttachmentDefinition, error) {
×
1432
        nadClient := cont.env.(*K8sEnvironment).nadClient.K8sCniCncfIoV1().NetworkAttachmentDefinitions("")
×
1433

×
1434
        nadList, err := nadClient.List(context.TODO(), metav1.ListOptions{})
×
1435
        if err != nil {
×
1436
                return nil, fmt.Errorf("failed to list all NADs: %v", err)
×
1437
        }
×
1438

1439
        return nadList.Items, nil
×
1440
}
1441

NEW
1442
func (cont *AciController) syncAndCleanNadCache() {
×
NEW
1443
        cont.log.Debugf("Starting sync and clean of NAD cache")
×
NEW
1444
        var reason string
×
NEW
1445
        cont.indexMutex.Lock()
×
NEW
1446
        defer cont.indexMutex.Unlock()
×
NEW
1447
        for aaepName, aaepEpgAttachDataMap := range cont.sharedAaepMonitor {
×
NEW
1448
                // Get the latest EPG attachment details from APIC for the AAEP
×
NEW
1449
                epgVlanMapList := cont.getAaepEpgAttObjDetails(aaepName)
×
NEW
1450

×
NEW
1451
                // Create a set of EPGs from the APIC state for quick lookup
×
NEW
1452
                apicEpgSet := make(map[string]*EpgVlanMap)
×
NEW
1453
                for _, epgVlanMap := range epgVlanMapList {
×
NEW
1454
                        apicEpgSet[epgVlanMap.epgDn] = &epgVlanMap
×
NEW
1455
                }
×
1456

NEW
1457
                var namespaceName string
×
NEW
1458
                // Iterate through the cache and find entries not in the APIC state
×
NEW
1459
                for epgDn, oldAaepEpgAttachData := range aaepEpgAttachDataMap {
×
NEW
1460
                        if oldAaepEpgAttachData == nil {
×
NEW
1461
                                continue
×
1462
                        }
NEW
1463
                        epgAnnotations := cont.getEpgAnnotations(epgDn)
×
NEW
1464
                        if epgAnnotations == nil {
×
NEW
1465
                                namespaceName = ""
×
NEW
1466
                        } else {
×
NEW
1467
                                namespaceName, _ = cont.getSpecificEPGAnnotation(epgAnnotations)
×
NEW
1468
                        }
×
NEW
1469
                        if _, exists := apicEpgSet[epgDn]; !exists {
×
NEW
1470
                                cont.log.Infof("Deleting stale cache entry: EPG %s for AAEP %s. Reason: EPG detached or deleted.", epgDn, aaepName)
×
NEW
1471
                                delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
NEW
1472
                                if oldAaepEpgAttachData.nadCreated {
×
NEW
1473
                                        cont.log.Debugf("Deleting NAD for EPG %s with AAEP %s due to AaepEpgDetached", epgDn, aaepName)
×
NEW
1474
                                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, oldAaepEpgAttachData, "AaepEpgDetached")
×
NEW
1475
                                }
×
NEW
1476
                                cont.log.Infof("Successfully deleted cache entry: EPG %s for AAEP %s.", epgDn, aaepName)
×
NEW
1477
                        } else if namespaceName != aaepEpgAttachDataMap[epgDn].namespaceName {
×
NEW
1478
                                cont.log.Infof("Deleting stale cache entry: EPG %s for AAEP %s. Reason: namespace annotation changed from %s to %s",
×
NEW
1479
                                        epgDn, aaepName, aaepEpgAttachDataMap[epgDn].namespaceName, namespaceName)
×
NEW
1480
                                delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
NEW
1481
                                if oldAaepEpgAttachData.nadCreated {
×
NEW
1482
                                        if cont.checkIfEPGExists(epgDn) {
×
NEW
1483
                                                if namespaceName == "" {
×
NEW
1484
                                                        reason = "NamespaceAnnotationRemoved"
×
NEW
1485
                                                } else {
×
NEW
1486
                                                        reason = "NamespaceAnnotationModified"
×
NEW
1487
                                                }
×
NEW
1488
                                        } else {
×
NEW
1489
                                                reason = "EpgDeleted"
×
NEW
1490
                                        }
×
NEW
1491
                                        cont.log.Debugf("Deleting NAD for EPG %s with AAEP %s due to AaepEpgDetached", epgDn, aaepName)
×
NEW
1492
                                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, oldAaepEpgAttachData, reason)
×
1493
                                }
NEW
1494
                                cont.log.Infof("Successfully deleted cache entry: EPG %s for AAEP %s.", epgDn, aaepName)
×
NEW
1495
                        } else if apicEpgSet[epgDn].encapVlan != aaepEpgAttachDataMap[epgDn].encapVlan {
×
NEW
1496
                                cont.log.Infof("Updating NAD for EPG %s with AAEP %s due to VLAN change from %d to %d",
×
NEW
1497
                                        epgDn, aaepName, aaepEpgAttachDataMap[epgDn].encapVlan, apicEpgSet[epgDn].encapVlan)
×
NEW
1498
                                delete(cont.sharedAaepMonitor[aaepName], epgDn)
×
NEW
1499
                                if oldAaepEpgAttachData.nadCreated {
×
NEW
1500
                                        cont.log.Debugf("Deleting NAD for EPG %s with AAEP %s due to AaepEpgDetached", epgDn, aaepName)
×
NEW
1501
                                        cont.deleteNetworkAttachmentDefinition(aaepName, epgDn, oldAaepEpgAttachData, "VlanUpdatedInAaepEpgAttach")
×
NEW
1502
                                }
×
NEW
1503
                                cont.log.Infof("Successfully deleted cache entry: EPG %s for AAEP %s.", epgDn, aaepName)
×
1504
                        }
1505
                }
1506
        }
NEW
1507
        cont.log.Debugf("completed sync and clean of NAD cache")
×
1508
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc