• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 19558423815

21 Nov 2025 02:57AM UTC coverage: 21.907% (-0.002%) from 21.909%
19558423815

push

github

web-flow
chore(deps): update actions/checkout action to v6 (#5926)

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>

11135 of 50829 relevant lines covered (21.91%)

0.26 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/pkg/controller/init.go
1
package controller
2

3
import (
4
        "context"
5
        "errors"
6
        "fmt"
7
        "maps"
8
        "strings"
9
        "time"
10

11
        "github.com/scylladb/go-set/strset"
12
        v1 "k8s.io/api/core/v1"
13
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
14
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
15
        "k8s.io/apimachinery/pkg/labels"
16
        "k8s.io/apimachinery/pkg/types"
17
        "k8s.io/client-go/tools/cache"
18
        "k8s.io/klog/v2"
19
        "k8s.io/utils/ptr"
20
        "sigs.k8s.io/controller-runtime/pkg/client"
21
        "sigs.k8s.io/controller-runtime/pkg/client/config"
22
        "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
23

24
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
25
        "github.com/kubeovn/kube-ovn/pkg/ovs"
26
        "github.com/kubeovn/kube-ovn/pkg/ovsdb/ovnnb"
27
        "github.com/kubeovn/kube-ovn/pkg/util"
28
)
29

30
func (c *Controller) InitOVN() error {
×
31
        var err error
×
32

×
33
        if err = c.migrateACLForVersionCompat(); err != nil {
×
34
                klog.Errorf("failed to sync the older acl : %v", err)
×
35
                return err
×
36
        }
×
37

38
        if err = c.InitDefaultVpc(); err != nil {
×
39
                klog.Errorf("init default vpc failed: %v", err)
×
40
                return err
×
41
        }
×
42

43
        if err = c.initClusterRouter(); err != nil {
×
44
                klog.Errorf("init cluster router failed: %v", err)
×
45
                return err
×
46
        }
×
47

48
        if c.config.EnableLb {
×
49
                if err = c.initLoadBalancer(); err != nil {
×
50
                        klog.Errorf("init load balancer failed: %v", err)
×
51
                        return err
×
52
                }
×
53
        }
54

55
        if err = c.initDefaultVlan(); err != nil {
×
56
                klog.Errorf("init default vlan failed: %v", err)
×
57
                return err
×
58
        }
×
59

60
        if err = c.initNodeSwitch(); err != nil {
×
61
                klog.Errorf("init node switch failed: %v", err)
×
62
                return err
×
63
        }
×
64

65
        if err = c.initDefaultLogicalSwitch(); err != nil {
×
66
                klog.Errorf("init default switch failed: %v", err)
×
67
                return err
×
68
        }
×
69

70
        return nil
×
71
}
72

73
func (c *Controller) migrateACLForVersionCompat() error {
×
74
        // migrate tier field of ACL rules created in versions prior to v1.13.0
×
75
        // after upgrading, the tier field has a default value of zero, which is not the value used in versions >= v1.13.0
×
76
        // we need to migrate the tier field to the correct value
×
77
        if err := c.OVNNbClient.MigrateACLTier(); err != nil {
×
78
                klog.Errorf("failed to migrate ACL tier: %v", err)
×
79
                return err
×
80
        }
×
81
        // clean all no parent key acls
82
        if err := c.OVNNbClient.CleanNoParentKeyAcls(); err != nil {
×
83
                klog.Errorf("failed to clean all no parent key acls: %v", err)
×
84
                return err
×
85
        }
×
86
        return nil
×
87
}
88

89
func (c *Controller) InitDefaultVpc() error {
×
90
        cachedVpc, err := c.vpcsLister.Get(c.config.ClusterRouter)
×
91
        if err != nil {
×
92
                if !k8serrors.IsNotFound(err) {
×
93
                        klog.Errorf("failed to get default vpc %q: %v", c.config.ClusterRouter, err)
×
94
                        return err
×
95
                }
×
96
                // create default vpc
97
                vpc := &kubeovnv1.Vpc{
×
98
                        ObjectMeta: metav1.ObjectMeta{Name: c.config.ClusterRouter},
×
99
                }
×
100
                cachedVpc, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Create(context.Background(), vpc, metav1.CreateOptions{})
×
101
                if err != nil {
×
102
                        klog.Errorf("failed to create default vpc %q: %v", c.config.ClusterRouter, err)
×
103
                        return err
×
104
                }
×
105
        }
106

107
        // update default vpc status
108
        vpc := cachedVpc.DeepCopy()
×
109
        if !vpc.Status.Default || !vpc.Status.Standby ||
×
110
                vpc.Status.Router != c.config.ClusterRouter ||
×
111
                vpc.Status.DefaultLogicalSwitch != c.config.DefaultLogicalSwitch {
×
112
                vpc.Status.Standby = true
×
113
                vpc.Status.Default = true
×
114
                vpc.Status.Router = c.config.ClusterRouter
×
115
                vpc.Status.DefaultLogicalSwitch = c.config.DefaultLogicalSwitch
×
116

×
117
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().UpdateStatus(context.Background(), vpc, metav1.UpdateOptions{}); err != nil {
×
118
                        klog.Errorf("failed to update default vpc %q: %v", c.config.ClusterRouter, err)
×
119
                        return err
×
120
                }
×
121
        }
122

123
        return nil
×
124
}
125

126
// InitDefaultLogicalSwitch init the default logical switch for ovn network
127
func (c *Controller) initDefaultLogicalSwitch() error {
×
128
        subnet, err := c.subnetsLister.Get(c.config.DefaultLogicalSwitch)
×
129
        if err == nil {
×
130
                if subnet != nil && util.CheckProtocol(c.config.DefaultCIDR) != util.CheckProtocol(subnet.Spec.CIDRBlock) {
×
131
                        // single-stack upgrade to dual-stack
×
132
                        if util.CheckProtocol(c.config.DefaultCIDR) == kubeovnv1.ProtocolDual {
×
133
                                subnet := subnet.DeepCopy()
×
134
                                subnet.Spec.CIDRBlock = c.config.DefaultCIDR
×
135
                                if _, err = c.formatSubnet(subnet); err != nil {
×
136
                                        klog.Errorf("init format subnet %s failed: %v", c.config.DefaultLogicalSwitch, err)
×
137
                                        return err
×
138
                                }
×
139
                        }
140
                }
141
                return nil
×
142
        }
143

144
        if !k8serrors.IsNotFound(err) {
×
145
                klog.Errorf("get default subnet %s failed: %v", c.config.DefaultLogicalSwitch, err)
×
146
                return err
×
147
        }
×
148

149
        defaultSubnet := kubeovnv1.Subnet{
×
150
                ObjectMeta: metav1.ObjectMeta{Name: c.config.DefaultLogicalSwitch},
×
151
                Spec: kubeovnv1.SubnetSpec{
×
152
                        Vpc:                 c.config.ClusterRouter,
×
153
                        Default:             true,
×
154
                        Provider:            util.OvnProvider,
×
155
                        CIDRBlock:           c.config.DefaultCIDR,
×
156
                        Gateway:             c.config.DefaultGateway,
×
157
                        GatewayNode:         "",
×
158
                        DisableGatewayCheck: !c.config.DefaultGatewayCheck,
×
159
                        ExcludeIps:          strings.Split(c.config.DefaultExcludeIps, ","),
×
160
                        NatOutgoing:         true,
×
161
                        GatewayType:         kubeovnv1.GWDistributedType,
×
162
                        Protocol:            util.CheckProtocol(c.config.DefaultCIDR),
×
163
                        EnableLb:            &c.config.EnableLb,
×
164
                },
×
165
        }
×
166
        if c.config.NetworkType == util.NetworkTypeVlan {
×
167
                defaultSubnet.Spec.Vlan = c.config.DefaultVlanName
×
168
                if c.config.DefaultLogicalGateway && c.config.DefaultU2OInterconnection {
×
169
                        err = errors.New("logicalGateway and u2oInterconnection can't be opened at the same time")
×
170
                        klog.Error(err)
×
171
                        return err
×
172
                }
×
173
                defaultSubnet.Spec.LogicalGateway = c.config.DefaultLogicalGateway
×
174
                defaultSubnet.Spec.U2OInterconnection = c.config.DefaultU2OInterconnection
×
175
        }
176

177
        if _, err = c.config.KubeOvnClient.KubeovnV1().Subnets().Create(context.Background(), &defaultSubnet, metav1.CreateOptions{}); err != nil {
×
178
                klog.Errorf("failed to create default subnet %q: %v", c.config.DefaultLogicalSwitch, err)
×
179
                return err
×
180
        }
×
181
        return nil
×
182
}
183

184
// InitNodeSwitch init node switch to connect host and pod
185
func (c *Controller) initNodeSwitch() error {
×
186
        subnet, err := c.subnetsLister.Get(c.config.NodeSwitch)
×
187
        if err == nil {
×
188
                if util.CheckProtocol(c.config.NodeSwitchCIDR) == kubeovnv1.ProtocolDual && util.CheckProtocol(subnet.Spec.CIDRBlock) != kubeovnv1.ProtocolDual {
×
189
                        // single-stack upgrade to dual-stack
×
190
                        subnet := subnet.DeepCopy()
×
191
                        subnet.Spec.CIDRBlock = c.config.NodeSwitchCIDR
×
192
                        if _, err = c.formatSubnet(subnet); err != nil {
×
193
                                klog.Errorf("init format subnet %s failed: %v", c.config.NodeSwitch, err)
×
194
                                return err
×
195
                        }
×
196
                } else {
×
197
                        c.config.NodeSwitchCIDR = subnet.Spec.CIDRBlock
×
198
                }
×
199
                return nil
×
200
        }
201

202
        if !k8serrors.IsNotFound(err) {
×
203
                klog.Errorf("get node subnet %s failed: %v", c.config.NodeSwitch, err)
×
204
                return err
×
205
        }
×
206

207
        nodeSubnet := kubeovnv1.Subnet{
×
208
                ObjectMeta: metav1.ObjectMeta{Name: c.config.NodeSwitch},
×
209
                Spec: kubeovnv1.SubnetSpec{
×
210
                        Vpc:                    c.config.ClusterRouter,
×
211
                        Default:                false,
×
212
                        Provider:               util.OvnProvider,
×
213
                        CIDRBlock:              c.config.NodeSwitchCIDR,
×
214
                        Gateway:                c.config.NodeSwitchGateway,
×
215
                        GatewayNode:            "",
×
216
                        ExcludeIps:             strings.Split(c.config.NodeSwitchGateway, ","),
×
217
                        Protocol:               util.CheckProtocol(c.config.NodeSwitchCIDR),
×
218
                        DisableInterConnection: true,
×
219
                },
×
220
        }
×
221

×
222
        if _, err = c.config.KubeOvnClient.KubeovnV1().Subnets().Create(context.Background(), &nodeSubnet, metav1.CreateOptions{}); err != nil {
×
223
                klog.Errorf("failed to create node subnet %q: %v", c.config.NodeSwitch, err)
×
224
                return err
×
225
        }
×
226
        return nil
×
227
}
228

229
// InitClusterRouter init cluster router to connect different logical switches
230
func (c *Controller) initClusterRouter() error {
×
231
        if err := c.OVNNbClient.CreateLogicalRouter(c.config.ClusterRouter); err != nil {
×
232
                klog.Errorf("create logical router %s failed: %v", c.config.ClusterRouter, err)
×
233
                return err
×
234
        }
×
235

236
        lr, err := c.OVNNbClient.GetLogicalRouter(c.config.ClusterRouter, false)
×
237
        if err != nil {
×
238
                klog.Errorf("get logical router %s failed: %v", c.config.ClusterRouter, err)
×
239
                return err
×
240
        }
×
241

242
        lrOptions := make(map[string]string, len(lr.Options))
×
243
        maps.Copy(lrOptions, lr.Options)
×
244
        lrOptions["mac_binding_age_threshold"] = "300"
×
245
        lrOptions["dynamic_neigh_routers"] = "true"
×
246
        if !maps.Equal(lr.Options, lrOptions) {
×
247
                lr.Options = lrOptions
×
248
                if err = c.OVNNbClient.UpdateLogicalRouter(lr, &lr.Options); err != nil {
×
249
                        klog.Errorf("update logical router %s failed: %v", c.config.ClusterRouter, err)
×
250
                        return err
×
251
                }
×
252
        }
253

254
        return nil
×
255
}
256

257
func (c *Controller) initLB(name, protocol string, sessionAffinity bool) error {
×
258
        protocol = strings.ToLower(protocol)
×
259

×
260
        var (
×
261
                selectFields string
×
262
                err          error
×
263
        )
×
264

×
265
        if sessionAffinity {
×
266
                selectFields = ovnnb.LoadBalancerSelectionFieldsIPSrc
×
267
        }
×
268

269
        if err = c.OVNNbClient.CreateLoadBalancer(name, protocol, selectFields); err != nil {
×
270
                klog.Errorf("create load balancer %s: %v", name, err)
×
271
                return err
×
272
        }
×
273

274
        if sessionAffinity {
×
275
                if err = c.OVNNbClient.SetLoadBalancerAffinityTimeout(name, util.DefaultServiceSessionStickinessTimeout); err != nil {
×
276
                        klog.Errorf("failed to set affinity timeout of %s load balancer %s: %v", protocol, name, err)
×
277
                        return err
×
278
                }
×
279
        }
280

281
        err = c.OVNNbClient.SetLoadBalancerPreferLocalBackend(name, c.config.EnableOVNLBPreferLocal)
×
282
        if err != nil {
×
283
                klog.Errorf("failed to set prefer local backend for load balancer %s: %v", name, err)
×
284
                return err
×
285
        }
×
286

287
        return nil
×
288
}
289

290
// InitLoadBalancer init the default tcp and udp cluster loadbalancer
291
func (c *Controller) initLoadBalancer() error {
×
292
        vpcs, err := c.vpcsLister.List(labels.Everything())
×
293
        if err != nil {
×
294
                klog.Errorf("failed to list vpc: %v", err)
×
295
                return err
×
296
        }
×
297

298
        for _, cachedVpc := range vpcs {
×
299
                vpc := cachedVpc.DeepCopy()
×
300
                vpcLb := c.GenVpcLoadBalancer(vpc.Name)
×
301
                if err = c.initLB(vpcLb.TCPLoadBalancer, string(v1.ProtocolTCP), false); err != nil {
×
302
                        klog.Error(err)
×
303
                        return err
×
304
                }
×
305
                if err = c.initLB(vpcLb.TCPSessLoadBalancer, string(v1.ProtocolTCP), true); err != nil {
×
306
                        klog.Error(err)
×
307
                        return err
×
308
                }
×
309
                if err = c.initLB(vpcLb.UDPLoadBalancer, string(v1.ProtocolUDP), false); err != nil {
×
310
                        klog.Error(err)
×
311
                        return err
×
312
                }
×
313
                if err = c.initLB(vpcLb.UDPSessLoadBalancer, string(v1.ProtocolUDP), true); err != nil {
×
314
                        klog.Error(err)
×
315
                        return err
×
316
                }
×
317
                if err = c.initLB(vpcLb.SctpLoadBalancer, string(v1.ProtocolSCTP), false); err != nil {
×
318
                        klog.Error(err)
×
319
                        return err
×
320
                }
×
321
                if err = c.initLB(vpcLb.SctpSessLoadBalancer, string(v1.ProtocolSCTP), true); err != nil {
×
322
                        klog.Error(err)
×
323
                        return err
×
324
                }
×
325

326
                vpc.Status.TCPLoadBalancer = vpcLb.TCPLoadBalancer
×
327
                vpc.Status.TCPSessionLoadBalancer = vpcLb.TCPSessLoadBalancer
×
328
                vpc.Status.UDPLoadBalancer = vpcLb.UDPLoadBalancer
×
329
                vpc.Status.UDPSessionLoadBalancer = vpcLb.UDPSessLoadBalancer
×
330
                vpc.Status.SctpLoadBalancer = vpcLb.SctpLoadBalancer
×
331
                vpc.Status.SctpSessionLoadBalancer = vpcLb.SctpSessLoadBalancer
×
332
                bytes, err := vpc.Status.Bytes()
×
333
                if err != nil {
×
334
                        klog.Error(err)
×
335
                        return err
×
336
                }
×
337
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Patch(context.Background(), vpc.Name, types.MergePatchType, bytes, metav1.PatchOptions{}, "status"); err != nil {
×
338
                        klog.Error(err)
×
339
                        return err
×
340
                }
×
341
        }
342
        return nil
×
343
}
344

345
func (c *Controller) InitIPAM() error {
×
346
        start := time.Now()
×
347
        subnets, err := c.subnetsLister.List(labels.Everything())
×
348
        if err != nil {
×
349
                klog.Errorf("failed to list subnet: %v", err)
×
350
                return err
×
351
        }
×
352
        subnetProviderMaps := make(map[string]string, len(subnets))
×
353
        for _, subnet := range subnets {
×
354
                klog.Infof("Init subnet %s", subnet.Name)
×
355
                subnetProviderMaps[subnet.Name] = subnet.Spec.Provider
×
356
                if err := c.ipam.AddOrUpdateSubnet(subnet.Name, subnet.Spec.CIDRBlock, subnet.Spec.Gateway, subnet.Spec.ExcludeIps); err != nil {
×
357
                        klog.Errorf("failed to init subnet %s: %v", subnet.Name, err)
×
358
                }
×
359

360
                u2oInterconnName := fmt.Sprintf(util.U2OInterconnName, subnet.Spec.Vpc, subnet.Name)
×
361
                u2oInterconnLrpName := fmt.Sprintf("%s-%s", subnet.Spec.Vpc, subnet.Name)
×
362
                if subnet.Status.U2OInterconnectionIP != "" {
×
363
                        var mac *string
×
364
                        klog.Infof("Init U2O for subnet %s", subnet.Name)
×
365
                        if subnet.Status.U2OInterconnectionMAC != "" {
×
366
                                mac = ptr.To(subnet.Status.U2OInterconnectionMAC)
×
367
                        } else {
×
368
                                lrp, err := c.OVNNbClient.GetLogicalRouterPort(u2oInterconnLrpName, true)
×
369
                                if err != nil {
×
370
                                        klog.Errorf("failed to get logical router port %s: %v", u2oInterconnLrpName, err)
×
371
                                        return err
×
372
                                }
×
373
                                if lrp != nil {
×
374
                                        mac = ptr.To(lrp.MAC)
×
375
                                }
×
376
                        }
377
                        if _, _, _, err = c.ipam.GetStaticAddress(u2oInterconnName, u2oInterconnLrpName, subnet.Status.U2OInterconnectionIP, mac, subnet.Name, true); err != nil {
×
378
                                klog.Errorf("failed to init subnet %q u2o interconnection ip to ipam %v", subnet.Name, err)
×
379
                        }
×
380
                }
381
        }
382

383
        ippools, err := c.ippoolLister.List(labels.Everything())
×
384
        if err != nil {
×
385
                klog.Errorf("failed to list ippool: %v", err)
×
386
                return err
×
387
        }
×
388
        for _, ippool := range ippools {
×
389
                if err = c.ipam.AddOrUpdateIPPool(ippool.Spec.Subnet, ippool.Name, ippool.Spec.IPs); err != nil {
×
390
                        klog.Errorf("failed to init ippool %s: %v", ippool.Name, err)
×
391
                }
×
392
        }
393

394
        klog.Infof("Init IPAM from StatefulSet or VM IP CR")
×
395
        ips, err := c.ipsLister.List(labels.Everything())
×
396
        if err != nil {
×
397
                klog.Errorf("failed to list IPs: %v", err)
×
398
                return err
×
399
        }
×
400

401
        for _, ip := range ips {
×
402
                if !ip.DeletionTimestamp.IsZero() {
×
403
                        klog.Infof("enqueue update for removing finalizer to delete ip %s", ip.Name)
×
404
                        c.updateIPQueue.Add(ip.Name)
×
405
                        continue
×
406
                }
407
                // recover sts and kubevirt vm ip, other ip recover in later pod loop
408
                if ip.Spec.PodType != util.StatefulSet && ip.Spec.PodType != util.VM {
×
409
                        continue
×
410
                }
411

412
                var ipamKey string
×
413
                if ip.Spec.Namespace != "" {
×
414
                        ipamKey = fmt.Sprintf("%s/%s", ip.Spec.Namespace, ip.Spec.PodName)
×
415
                } else {
×
416
                        ipamKey = util.NodeLspName(ip.Spec.PodName)
×
417
                }
×
418
                if _, _, _, err = c.ipam.GetStaticAddress(ipamKey, ip.Name, ip.Spec.IPAddress, &ip.Spec.MacAddress, ip.Spec.Subnet, true); err != nil {
×
419
                        klog.Errorf("failed to init IPAM from IP CR %s: %v", ip.Name, err)
×
420
                }
×
421
        }
422

423
        klog.Infof("Init IPAM from pod")
×
424
        pods, err := c.podsLister.List(labels.Everything())
×
425
        if err != nil {
×
426
                klog.Errorf("failed to list pods: %v", err)
×
427
                return err
×
428
        }
×
429
        for _, pod := range pods {
×
430
                if pod.Spec.HostNetwork {
×
431
                        continue
×
432
                }
433

434
                isAlive := isPodAlive(pod)
×
435
                isStsPod, _, _ := isStatefulSetPod(pod)
×
436
                if !isAlive && !isStsPod {
×
437
                        continue
×
438
                }
439

440
                podNets, err := c.getPodKubeovnNets(pod)
×
441
                if err != nil {
×
442
                        klog.Errorf("failed to get pod kubeovn nets %s.%s address %s: %v", pod.Name, pod.Namespace, pod.Annotations[util.IPAddressAnnotation], err)
×
443
                        continue
×
444
                }
445

446
                podType := getPodType(pod)
×
447
                podName := c.getNameByPod(pod)
×
448
                key := fmt.Sprintf("%s/%s", pod.Namespace, podName)
×
449
                for _, podNet := range podNets {
×
450
                        if pod.Annotations[fmt.Sprintf(util.AllocatedAnnotationTemplate, podNet.ProviderName)] == "true" {
×
451
                                portName := ovs.PodNameToPortName(podName, pod.Namespace, podNet.ProviderName)
×
452
                                ip := pod.Annotations[fmt.Sprintf(util.IPAddressAnnotationTemplate, podNet.ProviderName)]
×
453
                                mac := pod.Annotations[fmt.Sprintf(util.MacAddressAnnotationTemplate, podNet.ProviderName)]
×
454
                                _, _, _, err := c.ipam.GetStaticAddress(key, portName, ip, &mac, podNet.Subnet.Name, true)
×
455
                                if err != nil {
×
456
                                        klog.Errorf("failed to init pod %s.%s address %s: %v", podName, pod.Namespace, pod.Annotations[fmt.Sprintf(util.IPAddressAnnotationTemplate, podNet.ProviderName)], err)
×
457
                                } else {
×
458
                                        err = c.createOrUpdateIPCR(portName, podName, ip, mac, podNet.Subnet.Name, pod.Namespace, pod.Spec.NodeName, podType)
×
459
                                        if err != nil {
×
460
                                                klog.Errorf("failed to create/update ips CR %s.%s with ip address %s: %v", podName, pod.Namespace, ip, err)
×
461
                                        }
×
462
                                }
463

464
                                // Append ExternalIds is added in v1.7, used for upgrading from v1.6.3. It should be deleted now since v1.7 is not used anymore.
465
                        }
466
                }
467
        }
468

469
        klog.Infof("Init IPAM from vip CR")
×
470
        vips, err := c.virtualIpsLister.List(labels.Everything())
×
471
        if err != nil {
×
472
                klog.Errorf("failed to list vips: %v", err)
×
473
                return err
×
474
        }
×
475
        for _, vip := range vips {
×
476
                provider, ok := subnetProviderMaps[vip.Spec.Subnet]
×
477
                if !ok {
×
478
                        klog.Errorf("failed to find subnet %s for vip %s", vip.Spec.Subnet, vip.Name)
×
479
                        continue
×
480
                }
481
                portName := ovs.PodNameToPortName(vip.Name, vip.Spec.Namespace, provider)
×
482
                if _, _, _, err = c.ipam.GetStaticAddress(vip.Name, portName, vip.Status.V4ip, &vip.Status.Mac, vip.Spec.Subnet, true); err != nil {
×
483
                        klog.Errorf("failed to init ipam from vip cr %s: %v", vip.Name, err)
×
484
                }
×
485
        }
486

487
        klog.Infof("Init IPAM from iptables EIP CR")
×
488
        eips, err := c.iptablesEipsLister.List(labels.Everything())
×
489
        if err != nil {
×
490
                klog.Errorf("failed to list EIPs: %v", err)
×
491
                return err
×
492
        }
×
493
        for _, eip := range eips {
×
494
                externalNetwork := util.GetExternalNetwork(eip.Spec.ExternalSubnet)
×
495
                if _, _, _, err = c.ipam.GetStaticAddress(eip.Name, eip.Name, eip.Status.IP, &eip.Spec.MacAddress, externalNetwork, true); err != nil {
×
496
                        klog.Errorf("failed to init ipam from iptables eip cr %s: %v", eip.Name, err)
×
497
                }
×
498
        }
499

500
        klog.Infof("Init IPAM from ovn EIP CR")
×
501
        oeips, err := c.ovnEipsLister.List(labels.Everything())
×
502
        if err != nil {
×
503
                klog.Errorf("failed to list ovn eips: %v", err)
×
504
                return err
×
505
        }
×
506
        for _, oeip := range oeips {
×
507
                if _, _, _, err = c.ipam.GetStaticAddress(oeip.Name, oeip.Name, oeip.Status.V4Ip, &oeip.Status.MacAddress, oeip.Spec.ExternalSubnet, true); err != nil {
×
508
                        klog.Errorf("failed to init ipam from ovn eip cr %s: %v", oeip.Name, err)
×
509
                }
×
510
        }
511

512
        klog.Infof("Init IPAM from node annotation")
×
513
        nodes, err := c.nodesLister.List(labels.Everything())
×
514
        if err != nil {
×
515
                klog.Errorf("failed to list nodes: %v", err)
×
516
                return err
×
517
        }
×
518
        for _, node := range nodes {
×
519
                if node.Annotations[util.AllocatedAnnotation] == "true" {
×
520
                        portName := util.NodeLspName(node.Name)
×
521
                        mac := node.Annotations[util.MacAddressAnnotation]
×
522
                        v4IP, v6IP, _, err := c.ipam.GetStaticAddress(portName, portName,
×
523
                                node.Annotations[util.IPAddressAnnotation], &mac,
×
524
                                node.Annotations[util.LogicalSwitchAnnotation], true)
×
525
                        if err != nil {
×
526
                                klog.Errorf("failed to init node %s.%s address %s: %v", node.Name, node.Namespace, node.Annotations[util.IPAddressAnnotation], err)
×
527
                        }
×
528
                        if v4IP != "" && v6IP != "" {
×
529
                                node.Annotations[util.IPAddressAnnotation] = util.GetStringIP(v4IP, v6IP)
×
530
                        }
×
531
                }
532
        }
533

534
        klog.Infof("take %.2f seconds to initialize IPAM", time.Since(start).Seconds())
×
535
        return nil
×
536
}
537

538
func (c *Controller) initDefaultProviderNetwork() error {
×
539
        _, err := c.providerNetworksLister.Get(c.config.DefaultProviderName)
×
540
        if err == nil {
×
541
                return nil
×
542
        }
×
543
        if !k8serrors.IsNotFound(err) {
×
544
                klog.Errorf("failed to get default provider network %s: %v", c.config.DefaultProviderName, err)
×
545
                return err
×
546
        }
×
547

548
        nodes, err := c.nodesLister.List(labels.Everything())
×
549
        if err != nil {
×
550
                klog.Errorf("failed to get nodes: %v", err)
×
551
                return err
×
552
        }
×
553

554
        pn := kubeovnv1.ProviderNetwork{
×
555
                ObjectMeta: metav1.ObjectMeta{
×
556
                        Name: c.config.DefaultProviderName,
×
557
                },
×
558
                Spec: kubeovnv1.ProviderNetworkSpec{
×
559
                        DefaultInterface: c.config.DefaultHostInterface,
×
560
                        ExchangeLinkName: c.config.DefaultExchangeLinkName,
×
561
                },
×
562
        }
×
563

×
564
        excludeAnno := fmt.Sprintf(util.ProviderNetworkExcludeTemplate, c.config.DefaultProviderName)
×
565
        interfaceAnno := fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, c.config.DefaultProviderName)
×
566
        patchNodes := make([]string, 0, len(nodes))
×
567
        for _, node := range nodes {
×
568
                if len(node.Annotations) == 0 {
×
569
                        continue
×
570
                }
571

572
                if node.Annotations[excludeAnno] == "true" {
×
573
                        pn.Spec.ExcludeNodes = append(pn.Spec.ExcludeNodes, node.Name)
×
574
                        patchNodes = append(patchNodes, node.Name)
×
575
                } else if s := node.Annotations[interfaceAnno]; s != "" {
×
576
                        var index *int
×
577
                        for i := range pn.Spec.CustomInterfaces {
×
578
                                if pn.Spec.CustomInterfaces[i].Interface == s {
×
579
                                        index = &i
×
580
                                        break
×
581
                                }
582
                        }
583
                        if index != nil {
×
584
                                pn.Spec.CustomInterfaces[*index].Nodes = append(pn.Spec.CustomInterfaces[*index].Nodes, node.Name)
×
585
                        } else {
×
586
                                ci := kubeovnv1.CustomInterface{Interface: s, Nodes: []string{node.Name}}
×
587
                                pn.Spec.CustomInterfaces = append(pn.Spec.CustomInterfaces, ci)
×
588
                        }
×
589
                        patchNodes = append(patchNodes, node.Name)
×
590
                }
591
        }
592

593
        defer func() {
×
594
                if err != nil {
×
595
                        return
×
596
                }
×
597

598
                // update nodes only when provider network has been created successfully
599
                patch := util.KVPatch{excludeAnno: nil, interfaceAnno: nil}
×
600
                for _, node := range patchNodes {
×
601
                        if err := util.PatchAnnotations(c.config.KubeClient.CoreV1().Nodes(), node, patch); err != nil {
×
602
                                klog.Errorf("failed to patch node %s: %v", node, err)
×
603
                        }
×
604
                }
605
        }()
606

607
        _, err = c.config.KubeOvnClient.KubeovnV1().ProviderNetworks().Create(context.Background(), &pn, metav1.CreateOptions{})
×
608
        if err != nil {
×
609
                klog.Errorf("failed to create provider network %s: %v", c.config.DefaultProviderName, err)
×
610
                return err
×
611
        }
×
612
        return nil
×
613
}
614

615
func (c *Controller) initDefaultVlan() error {
×
616
        if c.config.NetworkType != util.NetworkTypeVlan {
×
617
                return nil
×
618
        }
×
619

620
        if err := c.initDefaultProviderNetwork(); err != nil {
×
621
                klog.Error(err)
×
622
                return err
×
623
        }
×
624

625
        _, err := c.vlansLister.Get(c.config.DefaultVlanName)
×
626
        if err == nil {
×
627
                return nil
×
628
        }
×
629

630
        if !k8serrors.IsNotFound(err) {
×
631
                klog.Errorf("get default vlan %s failed: %v", c.config.DefaultVlanName, err)
×
632
                return err
×
633
        }
×
634

635
        if c.config.DefaultVlanID < 0 || c.config.DefaultVlanID > 4095 {
×
636
                return errors.New("the default vlan id is not between 1-4095")
×
637
        }
×
638

639
        defaultVlan := kubeovnv1.Vlan{
×
640
                ObjectMeta: metav1.ObjectMeta{Name: c.config.DefaultVlanName},
×
641
                Spec: kubeovnv1.VlanSpec{
×
642
                        ID:       c.config.DefaultVlanID,
×
643
                        Provider: c.config.DefaultProviderName,
×
644
                },
×
645
        }
×
646

×
647
        _, err = c.config.KubeOvnClient.KubeovnV1().Vlans().Create(context.Background(), &defaultVlan, metav1.CreateOptions{})
×
648
        if err != nil {
×
649
                klog.Errorf("failed to create vlan %s: %v", defaultVlan.Name, err)
×
650
                return err
×
651
        }
×
652
        return nil
×
653
}
654

655
func (c *Controller) syncIPCR() error {
×
656
        klog.Info("start to sync ips")
×
657
        ips, err := c.ipsLister.List(labels.Everything())
×
658
        if err != nil {
×
659
                if k8serrors.IsNotFound(err) {
×
660
                        return nil
×
661
                }
×
662
                klog.Error(err)
×
663
                return err
×
664
        }
665

666
        ipMap := strset.New(c.getVMLsps()...)
×
667
        for _, ip := range ips {
×
668
                if !ip.DeletionTimestamp.IsZero() {
×
669
                        klog.Infof("enqueue update for removing finalizer to delete ip %s", ip.Name)
×
670
                        c.updateIPQueue.Add(ip.Name)
×
671
                        continue
×
672
                }
673
                changed := false
×
674
                ip = ip.DeepCopy()
×
675
                if ipMap.Has(ip.Name) && ip.Spec.PodType == "" {
×
676
                        ip.Spec.PodType = util.VM
×
677
                        changed = true
×
678
                }
×
679

680
                v4IP, v6IP := util.SplitStringIP(ip.Spec.IPAddress)
×
681
                if ip.Spec.V4IPAddress == v4IP && ip.Spec.V6IPAddress == v6IP && !changed {
×
682
                        continue
×
683
                }
684

685
                ip.Spec.V4IPAddress = v4IP
×
686
                ip.Spec.V6IPAddress = v6IP
×
687
                _, err := c.config.KubeOvnClient.KubeovnV1().IPs().Update(context.Background(), ip, metav1.UpdateOptions{})
×
688
                if err != nil {
×
689
                        klog.Errorf("failed to sync crd ip %s: %v", ip.Spec.IPAddress, err)
×
690
                        return err
×
691
                }
×
692
        }
693
        return nil
×
694
}
695

696
func (c *Controller) syncSubnetCR() error {
×
697
        klog.Info("start to sync subnets")
×
698
        subnets, err := c.subnetsLister.List(labels.Everything())
×
699
        if err != nil {
×
700
                if k8serrors.IsNotFound(err) {
×
701
                        return nil
×
702
                }
×
703
                klog.Error(err)
×
704
                return err
×
705
        }
706
        for _, cachedSubnet := range subnets {
×
707
                subnet := cachedSubnet.DeepCopy()
×
708
                if !subnet.Status.IsReady() {
×
709
                        klog.Warningf("subnet %s is not ready", subnet.Name)
×
710
                        continue
×
711
                }
712
                if util.CheckProtocol(subnet.Spec.CIDRBlock) == kubeovnv1.ProtocolDual {
×
713
                        subnet, err = c.calcDualSubnetStatusIP(subnet)
×
714
                } else {
×
715
                        subnet, err = c.calcSubnetStatusIP(subnet)
×
716
                }
×
717
                if err != nil {
×
718
                        klog.Errorf("failed to calculate subnet %s used ip: %v", cachedSubnet.Name, err)
×
719
                        return err
×
720
                }
×
721

722
                // only sync subnet spec enableEcmp when subnet.Spec.EnableEcmp is false and c.config.EnableEcmp is true
723
                if subnet.Spec.GatewayType == kubeovnv1.GWCentralizedType && !subnet.Spec.EnableEcmp && subnet.Spec.EnableEcmp != c.config.EnableEcmp {
×
724
                        subnet, err = c.subnetsLister.Get(subnet.Name)
×
725
                        if err != nil {
×
726
                                klog.Errorf("failed to get subnet %s: %v", subnet.Name, err)
×
727
                                return err
×
728
                        }
×
729

730
                        subnet.Spec.EnableEcmp = c.config.EnableEcmp
×
731
                        if _, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Update(context.Background(), subnet, metav1.UpdateOptions{}); err != nil {
×
732
                                klog.Errorf("failed to sync subnet spec enableEcmp with kube-ovn-controller config enableEcmp %s: %v", subnet.Name, err)
×
733
                                return err
×
734
                        }
×
735
                }
736
        }
737
        return nil
×
738
}
739

740
func (c *Controller) syncVpcNatGatewayCR() error {
×
741
        klog.Info("start to sync crd vpc nat gw")
×
742
        gws, err := c.vpcNatGatewayLister.List(labels.Everything())
×
743
        if err != nil {
×
744
                klog.Errorf("failed to list vpc nat gateway, %v", err)
×
745
                return err
×
746
        }
×
747
        if len(gws) == 0 {
×
748
                return nil
×
749
        }
×
750
        // get vpc nat gateway enable state
751
        cm, err := c.configMapsLister.ConfigMaps(c.config.PodNamespace).Get(util.VpcNatGatewayConfig)
×
752
        if err != nil && !k8serrors.IsNotFound(err) {
×
753
                klog.Errorf("failed to get config map %s, %v", util.VpcNatGatewayConfig, err)
×
754
                return err
×
755
        }
×
756
        if k8serrors.IsNotFound(err) || cm.Data["enable-vpc-nat-gw"] == "false" {
×
757
                return nil
×
758
        }
×
759
        // get vpc nat gateway image
760
        cm, err = c.configMapsLister.ConfigMaps(c.config.PodNamespace).Get(util.VpcNatConfig)
×
761
        if err != nil {
×
762
                if k8serrors.IsNotFound(err) {
×
763
                        klog.Errorf("should set config map for vpc-nat-gateway %s, %v", util.VpcNatConfig, err)
×
764
                        return err
×
765
                }
×
766
                klog.Errorf("failed to get config map %s, %v", util.VpcNatConfig, err)
×
767
                return err
×
768
        }
769

770
        if cm.Data["image"] == "" {
×
771
                err = errors.New("should set image for vpc-nat-gateway pod")
×
772
                klog.Error(err)
×
773
                return err
×
774
        }
×
775

776
        for _, gw := range gws {
×
777
                if err := c.updateCrdNatGwLabels(gw.Name, ""); err != nil {
×
778
                        klog.Errorf("failed to update nat gw %s: %v", gw.Name, err)
×
779
                        return err
×
780
                }
×
781
        }
782
        return nil
×
783
}
784

785
func (c *Controller) syncVlanCR() error {
×
786
        klog.Info("start to sync vlans")
×
787
        vlans, err := c.vlansLister.List(labels.Everything())
×
788
        if err != nil {
×
789
                if k8serrors.IsNotFound(err) {
×
790
                        return nil
×
791
                }
×
792
                klog.Error(err)
×
793
                return err
×
794
        }
795

796
        for _, vlan := range vlans {
×
797
                var needUpdate bool
×
798
                newVlan := vlan.DeepCopy()
×
799
                if newVlan.Spec.VlanID != 0 && newVlan.Spec.ID == 0 {
×
800
                        newVlan.Spec.ID = newVlan.Spec.VlanID
×
801
                        newVlan.Spec.VlanID = 0
×
802
                        needUpdate = true
×
803
                }
×
804
                if newVlan.Spec.ProviderInterfaceName != "" && newVlan.Spec.Provider == "" {
×
805
                        newVlan.Spec.Provider = newVlan.Spec.ProviderInterfaceName
×
806
                        newVlan.Spec.ProviderInterfaceName = ""
×
807
                        needUpdate = true
×
808
                }
×
809
                if needUpdate {
×
810
                        if _, err = c.config.KubeOvnClient.KubeovnV1().Vlans().Update(context.Background(), newVlan, metav1.UpdateOptions{}); err != nil {
×
811
                                klog.Errorf("failed to update spec of vlan %s: %v", newVlan.Name, err)
×
812
                                return err
×
813
                        }
×
814
                }
815
        }
816

817
        return nil
×
818
}
819

820
func (c *Controller) batchMigrateNodeRoute(nodes []*v1.Node) error {
×
821
        start := time.Now()
×
822
        addPolicies := make([]*kubeovnv1.PolicyRoute, 0)
×
823
        delPolicies := make([]*kubeovnv1.PolicyRoute, 0)
×
824
        staticRoutes := make([]*kubeovnv1.StaticRoute, 0)
×
825
        externalIDsMap := make(map[string]map[string]string)
×
826
        delAsNames := make([]string, 0)
×
827
        for _, node := range nodes {
×
828
                if node.Annotations[util.AllocatedAnnotation] != "true" {
×
829
                        continue
×
830
                }
831
                nodeName := node.Name
×
832
                nodeIPv4, nodeIPv6 := util.GetNodeInternalIP(*node)
×
833
                joinAddrV4, joinAddrV6 := util.SplitStringIP(node.Annotations[util.IPAddressAnnotation])
×
834
                if nodeIPv4 != "" && joinAddrV4 != "" {
×
835
                        buildNodeRoute(4, nodeName, joinAddrV4, nodeIPv4, &addPolicies, &delPolicies, &staticRoutes, externalIDsMap, &delAsNames)
×
836
                }
×
837
                if nodeIPv6 != "" && joinAddrV6 != "" {
×
838
                        buildNodeRoute(6, nodeName, joinAddrV6, nodeIPv6, &addPolicies, &delPolicies, &staticRoutes, externalIDsMap, &delAsNames)
×
839
                }
×
840
        }
841

842
        if err := c.batchAddPolicyRouteToVpc(c.config.ClusterRouter, addPolicies, externalIDsMap); err != nil {
×
843
                klog.Errorf("failed to batch add logical router policy for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
844
                return err
×
845
        }
×
846
        if err := c.batchDeleteStaticRouteFromVpc(c.config.ClusterRouter, staticRoutes); err != nil {
×
847
                klog.Errorf("failed to batch delete  obsolete logical router static route for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
848
                return err
×
849
        }
×
850
        if err := c.batchDeletePolicyRouteFromVpc(c.config.ClusterRouter, delPolicies); err != nil {
×
851
                klog.Errorf("failed to batch delete obsolete logical router policy for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
852
                return err
×
853
        }
×
854
        if err := c.OVNNbClient.BatchDeleteAddressSetByNames(delAsNames); err != nil {
×
855
                klog.Errorf("failed to batch delete obsolete address set for asNames %v nodes %d: %v", delAsNames, len(nodes), err)
×
856
                return err
×
857
        }
×
858
        klog.V(3).Infof("take to %v batch migrate node route for router: %s priority: %d add policy len: %d extrenalID len: %d del policy len: %d del address set len: %d",
×
859
                time.Since(start), c.config.ClusterRouter, util.NodeRouterPolicyPriority, len(addPolicies), len(externalIDsMap), len(delPolicies), len(delAsNames))
×
860

×
861
        return nil
×
862
}
863

864
func buildNodeRoute(af int, nodeName, nexthop, ip string, addPolicies, delPolicies *[]*kubeovnv1.PolicyRoute, staticRoutes *[]*kubeovnv1.StaticRoute, externalIDsMap map[string]map[string]string, delAsNames *[]string) {
×
865
        var (
×
866
                match       = fmt.Sprintf("ip%d.dst == %s", af, ip)
×
867
                action      = kubeovnv1.PolicyRouteActionReroute
×
868
                externalIDs = map[string]string{
×
869
                        "vendor": util.CniTypeName,
×
870
                        "node":   nodeName,
×
871
                }
×
872
        )
×
873
        *addPolicies = append(*addPolicies, &kubeovnv1.PolicyRoute{
×
874
                Priority:  util.NodeRouterPolicyPriority,
×
875
                Match:     match,
×
876
                Action:    action,
×
877
                NextHopIP: nexthop,
×
878
        })
×
879
        externalIDsMap[buildExternalIDsMapKey(match, string(action), util.NodeRouterPolicyPriority)] = externalIDs
×
880
        *staticRoutes = append(*staticRoutes, &kubeovnv1.StaticRoute{
×
881
                Policy:     kubeovnv1.PolicyDst,
×
882
                RouteTable: util.MainRouteTable,
×
883
                NextHopIP:  "",
×
884
                CIDR:       ip,
×
885
        })
×
886
        asName := nodeUnderlayAddressSetName(nodeName, af)
×
887
        obsoleteMatch := fmt.Sprintf("ip%d.dst == %s && ip%d.src != $%s", af, ip, af, asName)
×
888
        *delPolicies = append(*delPolicies, &kubeovnv1.PolicyRoute{
×
889
                Match:    obsoleteMatch,
×
890
                Priority: util.NodeRouterPolicyPriority,
×
891
        })
×
892
        *delAsNames = append(*delAsNames, asName)
×
893
}
×
894

895
func (c *Controller) syncNodeRoutes() error {
×
896
        nodes, err := c.nodesLister.List(labels.Everything())
×
897
        if err != nil {
×
898
                klog.Errorf("failed to list nodes: %v", err)
×
899
                return err
×
900
        }
×
901

902
        if err := c.batchMigrateNodeRoute(nodes); err != nil {
×
903
                klog.Errorf("failed to batch migrate node routes: %v", err)
×
904
                return err
×
905
        }
×
906

907
        if err := c.addNodeGatewayStaticRoute(); err != nil {
×
908
                klog.Errorf("failed to add static route for node gateway")
×
909
                return err
×
910
        }
×
911
        return nil
×
912
}
913

914
func (c *Controller) initNodeChassis() error {
×
915
        nodes, err := c.nodesLister.List(labels.Everything())
×
916
        if err != nil {
×
917
                klog.Errorf("failed to list nodes: %v", err)
×
918
                return err
×
919
        }
×
920
        chassises, err := c.OVNSbClient.GetKubeOvnChassisses()
×
921
        if err != nil {
×
922
                klog.Errorf("failed to get chassis nodes: %v", err)
×
923
                return err
×
924
        }
×
925
        chassisNodes := make(map[string]string, len(*chassises))
×
926
        for _, chassis := range *chassises {
×
927
                chassisNodes[chassis.Name] = chassis.Hostname
×
928
        }
×
929
        for _, node := range nodes {
×
930
                if err := c.UpdateChassisTag(node); err != nil {
×
931
                        klog.Error(err)
×
932
                        if _, ok := err.(*ErrChassisNotFound); !ok {
×
933
                                return err
×
934
                        }
×
935
                }
936
        }
937
        return nil
×
938
}
939

940
func migrateFinalizers(c client.Client, list client.ObjectList, getObjectItem func(int) (client.Object, client.Object)) error {
×
941
        if err := c.List(context.Background(), list); err != nil {
×
942
                klog.Errorf("failed to list objects: %v", err)
×
943
                return err
×
944
        }
×
945

946
        var i int
×
947
        var cachedObj, patchedObj client.Object
×
948
        for {
×
949
                if cachedObj, patchedObj = getObjectItem(i); cachedObj == nil {
×
950
                        break
×
951
                }
952
                if !controllerutil.ContainsFinalizer(cachedObj, util.DepreciatedFinalizerName) {
×
953
                        i++
×
954
                        continue
×
955
                }
956
                controllerutil.RemoveFinalizer(patchedObj, util.DepreciatedFinalizerName)
×
957
                if cachedObj.GetDeletionTimestamp() == nil {
×
958
                        // if the object is not being deleted, add the new finalizer
×
959
                        controllerutil.AddFinalizer(patchedObj, util.KubeOVNControllerFinalizer)
×
960
                }
×
961
                if err := c.Patch(context.Background(), patchedObj, client.MergeFrom(cachedObj)); client.IgnoreNotFound(err) != nil {
×
962
                        klog.Errorf("failed to sync finalizers for %s %s: %v",
×
963
                                patchedObj.GetObjectKind().GroupVersionKind().Kind,
×
964
                                cache.MetaObjectToName(patchedObj), err)
×
965
                        return err
×
966
                }
×
967
                i++
×
968
        }
969

970
        return nil
×
971
}
972

973
func (c *Controller) syncFinalizers() error {
×
974
        cl, err := client.New(config.GetConfigOrDie(), client.Options{})
×
975
        if err != nil {
×
976
                klog.Errorf("failed to create client: %v", err)
×
977
                return err
×
978
        }
×
979

980
        // migrate depreciated finalizer to new finalizer
981
        klog.Info("start to sync finalizers")
×
982
        if err := c.syncIPFinalizer(cl); err != nil {
×
983
                klog.Errorf("failed to sync ip finalizer: %v", err)
×
984
                return err
×
985
        }
×
986
        if err := c.syncOvnDnatFinalizer(cl); err != nil {
×
987
                klog.Errorf("failed to sync ovn dnat finalizer: %v", err)
×
988
                return err
×
989
        }
×
990
        if err := c.syncOvnEipFinalizer(cl); err != nil {
×
991
                klog.Errorf("failed to sync ovn eip finalizer: %v", err)
×
992
                return err
×
993
        }
×
994
        if err := c.syncOvnFipFinalizer(cl); err != nil {
×
995
                klog.Errorf("failed to sync ovn fip finalizer: %v", err)
×
996
                return err
×
997
        }
×
998
        if err := c.syncOvnSnatFinalizer(cl); err != nil {
×
999
                klog.Errorf("failed to sync ovn snat finalizer: %v", err)
×
1000
                return err
×
1001
        }
×
1002
        if err := c.syncQoSPolicyFinalizer(cl); err != nil {
×
1003
                klog.Errorf("failed to sync qos policy finalizer: %v", err)
×
1004
                return err
×
1005
        }
×
1006
        if err := c.syncSubnetFinalizer(cl); err != nil {
×
1007
                klog.Errorf("failed to sync subnet finalizer: %v", err)
×
1008
                return err
×
1009
        }
×
1010
        if err := c.syncVipFinalizer(cl); err != nil {
×
1011
                klog.Errorf("failed to sync vip finalizer: %v", err)
×
1012
                return err
×
1013
        }
×
1014
        if err := c.syncIptablesEipFinalizer(cl); err != nil {
×
1015
                klog.Errorf("failed to sync iptables eip finalizer: %v", err)
×
1016
                return err
×
1017
        }
×
1018
        if err := c.syncIptablesFipFinalizer(cl); err != nil {
×
1019
                klog.Errorf("failed to sync iptables fip finalizer: %v", err)
×
1020
                return err
×
1021
        }
×
1022
        if err := c.syncIptablesDnatFinalizer(cl); err != nil {
×
1023
                klog.Errorf("failed to sync iptables dnat finalizer: %v", err)
×
1024
                return err
×
1025
        }
×
1026
        if err := c.syncIptablesSnatFinalizer(cl); err != nil {
×
1027
                klog.Errorf("failed to sync iptables snat finalizer: %v", err)
×
1028
                return err
×
1029
        }
×
1030
        klog.Info("sync finalizers done")
×
1031
        return nil
×
1032
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc