• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 19880282979

03 Dec 2025 02:29AM UTC coverage: 22.273% (-0.01%) from 22.284%
19880282979

push

github

oilbeater
perf: remove sleep

Signed-off-by: Mengxin Liu <liumengxinfly@gmail.com>

11554 of 51874 relevant lines covered (22.27%)

0.26 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

6.78
/pkg/controller/subnet.go
1
package controller
2

3
import (
4
        "context"
5
        "encoding/json"
6
        "errors"
7
        "fmt"
8
        "maps"
9
        "net"
10
        "reflect"
11
        "slices"
12
        "sort"
13
        "strconv"
14
        "strings"
15

16
        "github.com/ovn-kubernetes/libovsdb/ovsdb"
17
        v1 "k8s.io/api/core/v1"
18
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
19
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
20
        "k8s.io/apimachinery/pkg/labels"
21
        "k8s.io/apimachinery/pkg/types"
22
        "k8s.io/client-go/tools/cache"
23
        "k8s.io/klog/v2"
24
        "sigs.k8s.io/controller-runtime/pkg/client"
25
        "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
26

27
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
28
        "github.com/kubeovn/kube-ovn/pkg/ipam"
29
        "github.com/kubeovn/kube-ovn/pkg/ovs"
30
        "github.com/kubeovn/kube-ovn/pkg/ovsdb/ovnnb"
31
        "github.com/kubeovn/kube-ovn/pkg/util"
32
)
33

34
func (c *Controller) enqueueAddSubnet(obj any) {
×
35
        key := cache.MetaObjectToName(obj.(*kubeovnv1.Subnet)).String()
×
36
        klog.V(3).Infof("enqueue add subnet %s", key)
×
37
        c.addOrUpdateSubnetQueue.Add(key)
×
38
}
×
39

40
func (c *Controller) enqueueDeleteSubnet(obj any) {
×
41
        var subnet *kubeovnv1.Subnet
×
42
        switch t := obj.(type) {
×
43
        case *kubeovnv1.Subnet:
×
44
                subnet = t
×
45
        case cache.DeletedFinalStateUnknown:
×
46
                s, ok := t.Obj.(*kubeovnv1.Subnet)
×
47
                if !ok {
×
48
                        klog.Warningf("unexpected object type: %T", t.Obj)
×
49
                        return
×
50
                }
×
51
                subnet = s
×
52
        default:
×
53
                klog.Warningf("unexpected type: %T", obj)
×
54
                return
×
55
        }
56

57
        klog.V(3).Infof("enqueue delete subnet %s", subnet.Name)
×
58
        c.deleteSubnetQueue.Add(subnet)
×
59
}
60

61
func (c *Controller) enqueueUpdateSubnet(oldObj, newObj any) {
×
62
        var usingIPs float64
×
63
        var u2oInterconnIP string
×
64
        oldSubnet := oldObj.(*kubeovnv1.Subnet)
×
65
        newSubnet := newObj.(*kubeovnv1.Subnet)
×
66
        key := cache.MetaObjectToName(newSubnet).String()
×
67

×
68
        // Trigger network policy refresh only if they are enabled, otherwise the lister will be nil
×
69
        if c.npsLister != nil {
×
70
                if newSubnet.Spec.Gateway != oldSubnet.Spec.Gateway || newSubnet.Status.U2OInterconnectionIP != oldSubnet.Status.U2OInterconnectionIP {
×
71
                        policies, err := c.npsLister.List(labels.Everything())
×
72
                        if err != nil {
×
73
                                klog.Errorf("failed to list network policies: %v", err)
×
74
                        } else {
×
75
                                for _, np := range policies {
×
76
                                        c.enqueueAddNp(np)
×
77
                                }
×
78
                        }
79
                }
80
        }
81

82
        if newSubnet.Spec.Protocol == kubeovnv1.ProtocolIPv6 {
×
83
                usingIPs = newSubnet.Status.V6UsingIPs
×
84
        } else {
×
85
                usingIPs = newSubnet.Status.V4UsingIPs
×
86
        }
×
87

88
        u2oInterconnIP = newSubnet.Status.U2OInterconnectionIP
×
89
        if !newSubnet.DeletionTimestamp.IsZero() && (usingIPs == 0 || (usingIPs == 1 && u2oInterconnIP != "")) {
×
90
                c.addOrUpdateSubnetQueue.Add(key)
×
91
                return
×
92
        }
×
93

94
        if oldSubnet.Spec.Vpc != newSubnet.Spec.Vpc &&
×
95
                ((oldSubnet.Spec.Vpc != "" || newSubnet.Spec.Vpc != c.config.ClusterRouter) && (oldSubnet.Spec.Vpc != c.config.ClusterRouter || newSubnet.Spec.Vpc != "")) {
×
96
                // recode last vpc name for subnet
×
97
                if oldSubnet.Spec.Vpc == "" {
×
98
                        c.subnetLastVpcNameMap.Store(newSubnet.Name, c.config.ClusterRouter)
×
99
                } else {
×
100
                        c.subnetLastVpcNameMap.Store(newSubnet.Name, oldSubnet.Spec.Vpc)
×
101
                }
×
102

103
                c.updateVpcStatusQueue.Add(oldSubnet.Spec.Vpc)
×
104
        }
105

106
        if oldSubnet.Spec.U2OInterconnection != newSubnet.Spec.U2OInterconnection {
×
107
                klog.Infof("enqueue update vpc %s triggered by u2o interconnection change of subnet %s", newSubnet.Spec.Vpc, key)
×
108
                c.addOrUpdateVpcQueue.Add(newSubnet.Spec.Vpc)
×
109
        }
×
110

111
        if oldSubnet.Spec.Private != newSubnet.Spec.Private ||
×
112
                oldSubnet.Spec.CIDRBlock != newSubnet.Spec.CIDRBlock ||
×
113
                !slices.Equal(oldSubnet.Spec.AllowSubnets, newSubnet.Spec.AllowSubnets) ||
×
114
                !slices.Equal(oldSubnet.Spec.Namespaces, newSubnet.Spec.Namespaces) ||
×
115
                oldSubnet.Spec.GatewayType != newSubnet.Spec.GatewayType ||
×
116
                oldSubnet.Spec.GatewayNode != newSubnet.Spec.GatewayNode ||
×
117
                oldSubnet.Spec.LogicalGateway != newSubnet.Spec.LogicalGateway ||
×
118
                oldSubnet.Spec.Gateway != newSubnet.Spec.Gateway ||
×
119
                !slices.Equal(oldSubnet.Spec.ExcludeIps, newSubnet.Spec.ExcludeIps) ||
×
120
                !slices.Equal(oldSubnet.Spec.Vips, newSubnet.Spec.Vips) ||
×
121
                oldSubnet.Spec.Vlan != newSubnet.Spec.Vlan ||
×
122
                oldSubnet.Spec.EnableDHCP != newSubnet.Spec.EnableDHCP ||
×
123
                oldSubnet.Spec.DHCPv4Options != newSubnet.Spec.DHCPv4Options ||
×
124
                oldSubnet.Spec.DHCPv6Options != newSubnet.Spec.DHCPv6Options ||
×
125
                oldSubnet.Spec.EnableIPv6RA != newSubnet.Spec.EnableIPv6RA ||
×
126
                oldSubnet.Spec.IPv6RAConfigs != newSubnet.Spec.IPv6RAConfigs ||
×
127
                oldSubnet.Spec.Protocol != newSubnet.Spec.Protocol ||
×
128
                (oldSubnet.Spec.EnableLb == nil && newSubnet.Spec.EnableLb != nil) ||
×
129
                (oldSubnet.Spec.EnableLb != nil && newSubnet.Spec.EnableLb == nil) ||
×
130
                (oldSubnet.Spec.EnableLb != nil && newSubnet.Spec.EnableLb != nil && *oldSubnet.Spec.EnableLb != *newSubnet.Spec.EnableLb) ||
×
131
                oldSubnet.Spec.EnableEcmp != newSubnet.Spec.EnableEcmp ||
×
132
                !reflect.DeepEqual(oldSubnet.Spec.Acls, newSubnet.Spec.Acls) ||
×
133
                oldSubnet.Spec.U2OInterconnection != newSubnet.Spec.U2OInterconnection ||
×
134
                oldSubnet.Spec.RouteTable != newSubnet.Spec.RouteTable ||
×
135
                oldSubnet.Spec.Vpc != newSubnet.Spec.Vpc ||
×
136
                oldSubnet.Spec.NatOutgoing != newSubnet.Spec.NatOutgoing ||
×
137
                oldSubnet.Spec.EnableMulticastSnoop != newSubnet.Spec.EnableMulticastSnoop ||
×
138
                !reflect.DeepEqual(oldSubnet.Spec.NatOutgoingPolicyRules, newSubnet.Spec.NatOutgoingPolicyRules) ||
×
139
                !reflect.DeepEqual(oldSubnet.Spec.NamespaceSelectors, newSubnet.Spec.NamespaceSelectors) ||
×
140
                (newSubnet.Spec.U2OInterconnection && newSubnet.Spec.U2OInterconnectionIP != "" && oldSubnet.Spec.U2OInterconnectionIP != newSubnet.Spec.U2OInterconnectionIP) {
×
141
                klog.V(3).Infof("enqueue update subnet %s", key)
×
142

×
143
                if oldSubnet.Spec.GatewayType != newSubnet.Spec.GatewayType {
×
144
                        c.recorder.Eventf(newSubnet, v1.EventTypeNormal, "SubnetGatewayTypeChanged",
×
145
                                "subnet gateway type changes from %q to %q", oldSubnet.Spec.GatewayType, newSubnet.Spec.GatewayType)
×
146
                }
×
147

148
                if oldSubnet.Spec.GatewayNode != newSubnet.Spec.GatewayNode {
×
149
                        c.recorder.Eventf(newSubnet, v1.EventTypeNormal, "SubnetGatewayNodeChanged",
×
150
                                "gateway node changes from %q to %q", oldSubnet.Spec.GatewayNode, newSubnet.Spec.GatewayNode)
×
151
                }
×
152

153
                c.addOrUpdateSubnetQueue.Add(key)
×
154
        }
155
}
156

157
func (c *Controller) formatSubnet(subnet *kubeovnv1.Subnet) (*kubeovnv1.Subnet, error) {
1✔
158
        var (
1✔
159
                changed bool
1✔
160
                err     error
1✔
161
        )
1✔
162

1✔
163
        if changed, err = checkSubnetChanged(subnet); err != nil {
1✔
164
                klog.Error(err)
×
165
                return nil, err
×
166
        }
×
167

168
        if subnet.Spec.Provider == "" {
2✔
169
                subnet.Spec.Provider = util.OvnProvider
1✔
170
                changed = true
1✔
171
        }
1✔
172

173
        if subnet.Spec.Vpc == "" {
2✔
174
                if isOvnSubnet(subnet) {
2✔
175
                        subnet.Spec.Vpc = c.config.ClusterRouter
1✔
176
                        changed = true
1✔
177
                }
1✔
178
        }
179

180
        if subnet.Spec.Vpc == c.config.ClusterRouter && subnet.Name != c.config.NodeSwitch {
2✔
181
                // Some format only needed in the default VPC
1✔
182
                if subnet.Spec.GatewayType == "" {
2✔
183
                        subnet.Spec.GatewayType = kubeovnv1.GWDistributedType
1✔
184
                        changed = true
1✔
185
                }
1✔
186
                if subnet.Spec.Default && subnet.Name != c.config.DefaultLogicalSwitch {
1✔
187
                        subnet.Spec.Default = false
×
188
                        changed = true
×
189
                }
×
190
        }
191

192
        if subnet.Spec.EnableLb == nil && subnet.Name != c.config.NodeSwitch {
2✔
193
                changed = true
1✔
194
                subnet.Spec.EnableLb = &c.config.EnableLb
1✔
195
        }
1✔
196
        // set join subnet Spec.EnableLb to nil
197
        if subnet.Spec.EnableLb != nil && subnet.Name == c.config.NodeSwitch {
1✔
198
                changed = true
×
199
                subnet.Spec.EnableLb = nil
×
200
        }
×
201

202
        if subnet.Spec.U2OInterconnectionIP != "" && !subnet.Spec.U2OInterconnection {
1✔
203
                subnet.Spec.U2OInterconnectionIP = ""
×
204
                changed = true
×
205
        }
×
206

207
        if subnet.Spec.Vlan == "" && subnet.Spec.U2OInterconnection {
1✔
208
                subnet.Spec.U2OInterconnection = false
×
209
                changed = true
×
210
        }
×
211

212
        klog.Infof("format subnet %v, changed %v", subnet.Name, changed)
1✔
213
        if changed {
2✔
214
                newSubnet, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Update(context.Background(), subnet, metav1.UpdateOptions{})
1✔
215
                if err != nil {
1✔
216
                        klog.Errorf("failed to update subnet %s, %v", subnet.Name, err)
×
217
                        return nil, err
×
218
                }
×
219
                return newSubnet, nil
1✔
220
        }
221
        return subnet, nil
1✔
222
}
223

224
func (c *Controller) validateSubnetVlan(subnet *kubeovnv1.Subnet) error {
×
225
        if subnet.Spec.Vlan == "" {
×
226
                return nil
×
227
        }
×
228

229
        vlan, err := c.vlansLister.Get(subnet.Spec.Vlan)
×
230
        if err != nil {
×
231
                err = fmt.Errorf("failed to get vlan %s: %w", subnet.Spec.Vlan, err)
×
232
                klog.Error(err)
×
233
                return err
×
234
        }
×
235

236
        if vlan.Status.Conflict {
×
237
                err = fmt.Errorf("subnet %s has invalid conflict vlan %s", subnet.Name, vlan.Name)
×
238
                klog.Error(err)
×
239
                return err
×
240
        }
×
241
        return nil
×
242
}
243

244
func (c *Controller) updateNatOutgoingPolicyRulesStatus(subnet *kubeovnv1.Subnet) error {
×
245
        if subnet.Spec.NatOutgoing {
×
246
                subnet.Status.NatOutgoingPolicyRules = make([]kubeovnv1.NatOutgoingPolicyRuleStatus, len(subnet.Spec.NatOutgoingPolicyRules))
×
247
                for index, rule := range subnet.Spec.NatOutgoingPolicyRules {
×
248
                        jsonRule, err := json.Marshal(rule)
×
249
                        if err != nil {
×
250
                                klog.Error(err)
×
251
                                return err
×
252
                        }
×
253
                        priority := strconv.Itoa(index)
×
254
                        // hash code generate by subnetName, rule and priority
×
255
                        var retBytes []byte
×
256
                        retBytes = append(retBytes, []byte(subnet.Name)...)
×
257
                        retBytes = append(retBytes, []byte(priority)...)
×
258
                        retBytes = append(retBytes, jsonRule...)
×
259
                        result := util.Sha256Hash(retBytes)
×
260

×
261
                        subnet.Status.NatOutgoingPolicyRules[index].RuleID = result[:util.NatPolicyRuleIDLength]
×
262
                        subnet.Status.NatOutgoingPolicyRules[index].Match = rule.Match
×
263
                        subnet.Status.NatOutgoingPolicyRules[index].Action = rule.Action
×
264
                }
265
        } else {
×
266
                subnet.Status.NatOutgoingPolicyRules = []kubeovnv1.NatOutgoingPolicyRuleStatus{}
×
267
        }
×
268

269
        return nil
×
270
}
271

272
func checkSubnetChanged(subnet *kubeovnv1.Subnet) (bool, error) {
1✔
273
        var (
1✔
274
                changed, ret bool
1✔
275
                err          error
1✔
276
        )
1✔
277

1✔
278
        // changed value may be overlapped, so use ret to record value
1✔
279
        if changed, err = checkAndUpdateCIDR(subnet); err != nil {
1✔
280
                klog.Error(err)
×
281
                return changed, err
×
282
        }
×
283
        if changed {
2✔
284
                ret = true
1✔
285
        }
1✔
286

287
        if changed, err = checkAndUpdateGateway(subnet); err != nil {
1✔
288
                klog.Error(err)
×
289
                return changed, err
×
290
        }
×
291
        if changed {
2✔
292
                ret = true
1✔
293
        }
1✔
294

295
        if changed = checkAndUpdateExcludeIPs(subnet); changed {
2✔
296
                ret = true
1✔
297
        }
1✔
298

299
        if subnet.Spec.Protocol != util.CheckProtocol(subnet.Spec.CIDRBlock) {
2✔
300
                subnet.Spec.Protocol = util.CheckProtocol(subnet.Spec.CIDRBlock)
1✔
301
                ret = true
1✔
302
        }
1✔
303

304
        return ret, nil
1✔
305
}
306

307
func checkAndUpdateCIDR(subnet *kubeovnv1.Subnet) (bool, error) {
1✔
308
        var (
1✔
309
                changed    bool
1✔
310
                cidrBlocks []string
1✔
311
        )
1✔
312

1✔
313
        for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
2✔
314
                _, ipNet, err := net.ParseCIDR(cidr)
1✔
315
                if err != nil {
1✔
316
                        klog.Error(err)
×
317
                        return false, fmt.Errorf("subnet %s cidr %s is invalid", subnet.Name, cidr)
×
318
                }
×
319
                if ipNet.String() != cidr {
2✔
320
                        changed = true
1✔
321
                }
1✔
322
                cidrBlocks = append(cidrBlocks, ipNet.String())
1✔
323
        }
324
        subnet.Spec.CIDRBlock = strings.Join(cidrBlocks, ",")
1✔
325
        return changed, nil
1✔
326
}
327

328
func checkAndUpdateGateway(subnet *kubeovnv1.Subnet) (bool, error) {
1✔
329
        var (
1✔
330
                changed bool
1✔
331
                gw      string
1✔
332
                err     error
1✔
333
        )
1✔
334

1✔
335
        switch {
1✔
336
        case subnet.Spec.Gateway == "":
1✔
337
                gw, err = util.GetGwByCidr(subnet.Spec.CIDRBlock)
1✔
338
        case subnet.Spec.Protocol == kubeovnv1.ProtocolDual && util.CheckProtocol(subnet.Spec.Gateway) != util.CheckProtocol(subnet.Spec.CIDRBlock):
×
339
                gw, err = util.AppendGwByCidr(subnet.Spec.Gateway, subnet.Spec.CIDRBlock)
×
340
        default:
1✔
341
                gw = subnet.Spec.Gateway
1✔
342
        }
343
        if err != nil {
1✔
344
                klog.Error(err)
×
345
                return false, err
×
346
        }
×
347
        if subnet.Spec.Gateway != gw {
2✔
348
                subnet.Spec.Gateway = gw
1✔
349
                changed = true
1✔
350
        }
1✔
351

352
        return changed, nil
1✔
353
}
354

355
// this func must be called after subnet.Spec.Gateway is valued
356
func checkAndUpdateExcludeIPs(subnet *kubeovnv1.Subnet) bool {
1✔
357
        var (
1✔
358
                changed    bool
1✔
359
                excludeIPs []string
1✔
360
        )
1✔
361
        excludeIPs = append(excludeIPs, strings.Split(subnet.Spec.Gateway, ",")...)
1✔
362
        sort.Strings(excludeIPs)
1✔
363
        if len(subnet.Spec.ExcludeIps) == 0 {
2✔
364
                subnet.Spec.ExcludeIps = excludeIPs
1✔
365
                changed = true
1✔
366
        } else {
2✔
367
                changed = checkAndFormatsExcludeIPs(subnet)
1✔
368
                for _, gw := range excludeIPs {
2✔
369
                        gwExists := false
1✔
370
                        for _, excludeIP := range subnet.Spec.ExcludeIps {
2✔
371
                                if util.ContainsIPs(excludeIP, gw) {
2✔
372
                                        gwExists = true
1✔
373
                                        break
1✔
374
                                }
375
                        }
376
                        if !gwExists {
1✔
377
                                subnet.Spec.ExcludeIps = append(subnet.Spec.ExcludeIps, gw)
×
378
                                sort.Strings(subnet.Spec.ExcludeIps)
×
379
                                changed = true
×
380
                        }
×
381
                }
382
        }
383
        return changed
1✔
384
}
385

386
func (c *Controller) syncSubnetFinalizer(cl client.Client) error {
×
387
        // migrate depreciated finalizer to new finalizer
×
388
        subnets := &kubeovnv1.SubnetList{}
×
389
        return migrateFinalizers(cl, subnets, func(i int) (client.Object, client.Object) {
×
390
                if i < 0 || i >= len(subnets.Items) {
×
391
                        return nil, nil
×
392
                }
×
393
                return subnets.Items[i].DeepCopy(), subnets.Items[i].DeepCopy()
×
394
        })
395
}
396

397
func (c *Controller) handleSubnetFinalizer(subnet *kubeovnv1.Subnet) (*kubeovnv1.Subnet, bool, error) {
×
398
        if subnet.DeletionTimestamp.IsZero() && !slices.Contains(subnet.GetFinalizers(), util.KubeOVNControllerFinalizer) {
×
399
                newSubnet := subnet.DeepCopy()
×
400
                controllerutil.AddFinalizer(newSubnet, util.KubeOVNControllerFinalizer)
×
401
                patch, err := util.GenerateMergePatchPayload(subnet, newSubnet)
×
402
                if err != nil {
×
403
                        klog.Errorf("failed to generate patch payload for subnet '%s', %v", subnet.Name, err)
×
404
                        return newSubnet, false, err
×
405
                }
×
406
                patchSubnet, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Patch(context.Background(), subnet.Name, types.MergePatchType, patch, metav1.PatchOptions{}, "")
×
407
                if err != nil {
×
408
                        klog.Errorf("failed to add finalizer to subnet %s, %v", subnet.Name, err)
×
409
                        return patchSubnet, false, err
×
410
                }
×
411

412
                return patchSubnet, false, nil
×
413
        }
414

415
        usingIPs := subnet.Status.V4UsingIPs
×
416
        if util.CheckProtocol(subnet.Spec.CIDRBlock) == kubeovnv1.ProtocolIPv6 {
×
417
                usingIPs = subnet.Status.V6UsingIPs
×
418
        }
×
419

420
        u2oInterconnIP := subnet.Status.U2OInterconnectionIP
×
421
        if !subnet.DeletionTimestamp.IsZero() && (usingIPs == 0 || (usingIPs == 1 && u2oInterconnIP != "")) {
×
422
                newSubnet := subnet.DeepCopy()
×
423
                controllerutil.RemoveFinalizer(newSubnet, util.KubeOVNControllerFinalizer)
×
424
                patch, err := util.GenerateMergePatchPayload(subnet, newSubnet)
×
425
                if err != nil {
×
426
                        klog.Errorf("failed to generate patch payload for subnet '%s', %v", subnet.Name, err)
×
427
                        return newSubnet, false, err
×
428
                }
×
429
                if _, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Patch(context.Background(), subnet.Name,
×
430
                        types.MergePatchType, patch, metav1.PatchOptions{}, ""); err != nil {
×
431
                        klog.Errorf("failed to remove finalizer from subnet %s, %v", subnet.Name, err)
×
432
                        return newSubnet, false, err
×
433
                }
×
434
                return newSubnet, true, nil
×
435
        }
436
        return subnet, false, nil
×
437
}
438

439
func (c *Controller) patchSubnetStatus(subnet *kubeovnv1.Subnet, reason, errStr string) error {
×
440
        if errStr != "" {
×
441
                subnet.Status.SetError(reason, errStr)
×
442
                if reason == "ValidateLogicalSwitchFailed" {
×
443
                        subnet.Status.NotValidated(reason, errStr)
×
444
                } else {
×
445
                        subnet.Status.Validated(reason, "")
×
446
                }
×
447
                subnet.Status.NotReady(reason, errStr)
×
448
                c.recorder.Eventf(subnet, v1.EventTypeWarning, reason, errStr)
×
449
        } else {
×
450
                subnet.Status.Validated(reason, "")
×
451
                c.recorder.Eventf(subnet, v1.EventTypeNormal, reason, errStr)
×
452
                if reason == "SetPrivateLogicalSwitchSuccess" ||
×
453
                        reason == "ResetLogicalSwitchAclSuccess" ||
×
454
                        reason == "ReconcileCentralizedGatewaySuccess" ||
×
455
                        reason == "SetNonOvnSubnetSuccess" {
×
456
                        subnet.Status.Ready(reason, "")
×
457
                }
×
458
        }
459

460
        bytes, err := subnet.Status.Bytes()
×
461
        if err != nil {
×
462
                klog.Error(err)
×
463
                return err
×
464
        }
×
465
        if _, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Patch(context.Background(), subnet.Name, types.MergePatchType, bytes, metav1.PatchOptions{}, "status"); err != nil {
×
466
                klog.Errorf("failed to patch status for subnet %s, %v", subnet.Name, err)
×
467
                return err
×
468
        }
×
469
        return nil
×
470
}
471

472
func (c *Controller) validateVpcBySubnet(subnet *kubeovnv1.Subnet) (*kubeovnv1.Vpc, error) {
×
473
        vpc, err := c.vpcsLister.Get(subnet.Spec.Vpc)
×
474
        if err != nil {
×
475
                klog.Errorf("failed to get subnet's vpc '%s', %v", subnet.Spec.Vpc, err)
×
476
                return vpc, err
×
477
        }
×
478

479
        if !vpc.Status.Standby {
×
480
                err = fmt.Errorf("the vpc '%s' not standby yet", vpc.Name)
×
481
                klog.Error(err)
×
482
                return vpc, err
×
483
        }
×
484

485
        if !vpc.Status.Default {
×
486
                for _, ns := range subnet.Spec.Namespaces {
×
487
                        if !slices.Contains(vpc.Spec.Namespaces, ns) {
×
488
                                err = fmt.Errorf("namespace '%s' is out of range to custom vpc '%s'", ns, vpc.Name)
×
489
                                klog.Error(err)
×
490
                                return vpc, err
×
491
                        }
×
492
                }
493
        } else {
×
494
                vpcs, err := c.vpcsLister.List(labels.Everything())
×
495
                if err != nil {
×
496
                        klog.Errorf("failed to list vpc, %v", err)
×
497
                        return vpc, err
×
498
                }
×
499
                lastVpcName, _ := c.subnetLastVpcNameMap.Load(subnet.Name)
×
500
                for _, vpc := range vpcs {
×
501
                        if (lastVpcName == "" && subnet.Spec.Vpc != vpc.Name || lastVpcName != "" && lastVpcName != vpc.Name) &&
×
502
                                !vpc.Status.Default && util.IsStringsOverlap(vpc.Spec.Namespaces, subnet.Spec.Namespaces) {
×
503
                                err = fmt.Errorf("namespaces %v are overlap with vpc '%s'", subnet.Spec.Namespaces, vpc.Name)
×
504
                                klog.Error(err)
×
505
                                return vpc, err
×
506
                        }
×
507
                }
508
        }
509
        return vpc, nil
×
510
}
511

512
func (c *Controller) checkSubnetConflict(subnet *kubeovnv1.Subnet) error {
×
513
        subnetList, err := c.subnetsLister.List(labels.Everything())
×
514
        if err != nil {
×
515
                klog.Errorf("failed to list subnets %v", err)
×
516
                return err
×
517
        }
×
518

519
        for _, sub := range subnetList {
×
520
                if sub.Spec.Vpc != subnet.Spec.Vpc || sub.Spec.Vlan != subnet.Spec.Vlan || sub.Name == subnet.Name {
×
521
                        continue
×
522
                }
523

524
                if util.CIDROverlap(sub.Spec.CIDRBlock, subnet.Spec.CIDRBlock) {
×
525
                        err = fmt.Errorf("subnet %s cidr %s is conflict with subnet %s cidr %s", subnet.Name, subnet.Spec.CIDRBlock, sub.Name, sub.Spec.CIDRBlock)
×
526
                        klog.Error(err)
×
527
                        if err = c.patchSubnetStatus(subnet, "ValidateLogicalSwitchFailed", err.Error()); err != nil {
×
528
                                klog.Error(err)
×
529
                                return err
×
530
                        }
×
531
                        return err
×
532
                }
533

534
                if subnet.Spec.ExternalEgressGateway != "" && sub.Spec.ExternalEgressGateway != "" &&
×
535
                        subnet.Spec.PolicyRoutingTableID == sub.Spec.PolicyRoutingTableID {
×
536
                        err = fmt.Errorf("subnet %s policy routing table ID %d is conflict with subnet %s policy routing table ID %d", subnet.Name, subnet.Spec.PolicyRoutingTableID, sub.Name, sub.Spec.PolicyRoutingTableID)
×
537
                        klog.Error(err)
×
538
                        if err = c.patchSubnetStatus(subnet, "ValidateLogicalSwitchFailed", err.Error()); err != nil {
×
539
                                klog.Error(err)
×
540
                                return err
×
541
                        }
×
542
                        return err
×
543
                }
544
        }
545

546
        if subnet.Spec.Vlan == "" && subnet.Spec.Vpc == c.config.ClusterRouter {
×
547
                nodes, err := c.nodesLister.List(labels.Everything())
×
548
                if err != nil {
×
549
                        klog.Errorf("failed to list nodes: %v", err)
×
550
                        return err
×
551
                }
×
552
                for _, node := range nodes {
×
553
                        for _, addr := range node.Status.Addresses {
×
554
                                if addr.Type == v1.NodeInternalIP && util.CIDRContainIP(subnet.Spec.CIDRBlock, addr.Address) {
×
555
                                        err = fmt.Errorf("subnet %s cidr %s conflict with node %s address %s", subnet.Name, subnet.Spec.CIDRBlock, node.Name, addr.Address)
×
556
                                        klog.Error(err)
×
557
                                        if err = c.patchSubnetStatus(subnet, "ValidateLogicalSwitchFailed", err.Error()); err != nil {
×
558
                                                klog.Error(err)
×
559
                                                return err
×
560
                                        }
×
561
                                        return err
×
562
                                }
563
                        }
564
                }
565
        }
566
        return nil
×
567
}
568

569
func (c *Controller) updateSubnetDHCPOption(subnet *kubeovnv1.Subnet, needRouter bool) error {
×
570
        var mtu int
×
571
        if subnet.Spec.Mtu > 0 {
×
572
                mtu = int(subnet.Spec.Mtu)
×
573
        } else {
×
574
                mtu = util.DefaultMTU
×
575
                if subnet.Spec.Vlan == "" {
×
576
                        switch c.config.NetworkType {
×
577
                        case util.NetworkTypeVlan:
×
578
                                // default to geneve
×
579
                                fallthrough
×
580
                        case util.NetworkTypeGeneve:
×
581
                                mtu -= util.GeneveHeaderLength
×
582
                        case util.NetworkTypeVxlan:
×
583
                                mtu -= util.VxlanHeaderLength
×
584
                        case util.NetworkTypeStt:
×
585
                                mtu -= util.SttHeaderLength
×
586
                        default:
×
587
                                return fmt.Errorf("invalid network type: %s", c.config.NetworkType)
×
588
                        }
589
                }
590
        }
591

592
        dhcpOptionsUUIDs, err := c.OVNNbClient.UpdateDHCPOptions(subnet, mtu)
×
593
        if err != nil {
×
594
                klog.Errorf("failed to update dhcp options for switch %s, %v", subnet.Name, err)
×
595
                return err
×
596
        }
×
597

598
        vpc, err := c.vpcsLister.Get(subnet.Spec.Vpc)
×
599
        if err != nil {
×
600
                klog.Errorf("failed to get subnet's vpc '%s', %v", subnet.Spec.Vpc, err)
×
601
                return err
×
602
        }
×
603

604
        if needRouter {
×
605
                lrpName := fmt.Sprintf("%s-%s", vpc.Status.Router, subnet.Name)
×
606
                if err := c.OVNNbClient.UpdateLogicalRouterPortRA(lrpName, subnet.Spec.IPv6RAConfigs, subnet.Spec.EnableIPv6RA); err != nil {
×
607
                        klog.Errorf("update ipv6 ra configs for logical router port %s, %v", lrpName, err)
×
608
                        return err
×
609
                }
×
610
        }
611

612
        if subnet.Status.DHCPv4OptionsUUID != dhcpOptionsUUIDs.DHCPv4OptionsUUID || subnet.Status.DHCPv6OptionsUUID != dhcpOptionsUUIDs.DHCPv6OptionsUUID {
×
613
                subnet.Status.DHCPv4OptionsUUID = dhcpOptionsUUIDs.DHCPv4OptionsUUID
×
614
                subnet.Status.DHCPv6OptionsUUID = dhcpOptionsUUIDs.DHCPv6OptionsUUID
×
615
                bytes, err := subnet.Status.Bytes()
×
616
                if err != nil {
×
617
                        klog.Error(err)
×
618
                        return err
×
619
                }
×
620
                if _, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Patch(context.Background(), subnet.Name, types.MergePatchType, bytes, metav1.PatchOptions{}, "status"); err != nil {
×
621
                        klog.Errorf("patch subnet %s dhcp options failed: %v", subnet.Name, err)
×
622
                        return err
×
623
                }
×
624
        }
625

626
        return nil
×
627
}
628

629
func (c *Controller) handleAddOrUpdateSubnet(key string) error {
×
630
        c.subnetKeyMutex.LockKey(key)
×
631
        defer func() { _ = c.subnetKeyMutex.UnlockKey(key) }()
×
632

633
        cachedSubnet, err := c.subnetsLister.Get(key)
×
634
        if err != nil {
×
635
                if k8serrors.IsNotFound(err) {
×
636
                        return nil
×
637
                }
×
638
                klog.Error(err)
×
639
                return err
×
640
        }
641
        klog.V(3).Infof("handle add or update subnet %s", cachedSubnet.Name)
×
642
        subnet := cachedSubnet.DeepCopy()
×
643
        subnet, err = c.formatSubnet(subnet)
×
644
        if err != nil {
×
645
                err := fmt.Errorf("failed to format subnet %s, %w", key, err)
×
646
                klog.Error(err)
×
647
                return err
×
648
        }
×
649

650
        err = c.validateSubnetVlan(subnet)
×
651
        if err != nil {
×
652
                err := fmt.Errorf("failed to validate vlan for subnet %s, %w", key, err)
×
653
                klog.Error(err)
×
654
                if err = c.patchSubnetStatus(subnet, "ValidateSubnetVlanFailed", err.Error()); err != nil {
×
655
                        klog.Error(err)
×
656
                        return err
×
657
                }
×
658
                return err
×
659
        }
660

661
        if err = util.ValidateSubnet(*subnet); err != nil {
×
662
                klog.Errorf("failed to validate subnet %s, %v", subnet.Name, err)
×
663
                if err = c.patchSubnetStatus(subnet, "ValidateLogicalSwitchFailed", err.Error()); err != nil {
×
664
                        klog.Error(err)
×
665
                        return err
×
666
                }
×
667
                return err
×
668
        }
669
        if err = c.patchSubnetStatus(subnet, "ValidateLogicalSwitchSuccess", ""); err != nil {
×
670
                klog.Error(err)
×
671
                return err
×
672
        }
×
673

674
        if err := c.ipam.AddOrUpdateSubnet(subnet.Name, subnet.Spec.CIDRBlock, subnet.Spec.Gateway, subnet.Spec.ExcludeIps); err != nil {
×
675
                klog.Error(err)
×
676
                return err
×
677
        }
×
678

679
        // availableIPStr valued from ipam, so leave update subnet.status after ipam process
680
        if subnet.Spec.Protocol == kubeovnv1.ProtocolDual {
×
681
                subnet, err = c.calcDualSubnetStatusIP(subnet)
×
682
        } else {
×
683
                subnet, err = c.calcSubnetStatusIP(subnet)
×
684
        }
×
685
        if err != nil {
×
686
                klog.Errorf("calculate subnet %s used ip failed, %v", cachedSubnet.Name, err)
×
687
                return err
×
688
        }
×
689

690
        subnet, deleted, err := c.handleSubnetFinalizer(subnet)
×
691
        if err != nil {
×
692
                klog.Errorf("handle subnet finalizer failed %v", err)
×
693
                return err
×
694
        }
×
695
        if deleted {
×
696
                return nil
×
697
        }
×
698

699
        if !isOvnSubnet(subnet) {
×
700
                // subnet provider is not ovn, and vpc is empty, should not reconcile
×
701
                if err = c.patchSubnetStatus(subnet, "SetNonOvnSubnetSuccess", ""); err != nil {
×
702
                        klog.Error(err)
×
703
                        return err
×
704
                }
×
705

706
                subnet.Status.EnsureStandardConditions()
×
707
                klog.Infof("non ovn subnet %s is ready", subnet.Name)
×
708
                return nil
×
709
        }
710

711
        // This validate should be processed after isOvnSubnet, since maybe there's no vpc for subnet not managed by kube-ovn
712
        vpc, err := c.validateVpcBySubnet(subnet)
×
713
        if err != nil {
×
714
                klog.Errorf("failed to get subnet's vpc '%s', %v", subnet.Spec.Vpc, err)
×
715
                return err
×
716
        }
×
717
        _, isMcastQuerierChanged, err := c.reconcileSubnetSpecialIPs(subnet)
×
718
        if err != nil {
×
719
                klog.Errorf("failed to reconcile subnet %s Custom IPs %v", subnet.Name, err)
×
720
                return err
×
721
        }
×
722

723
        needRouter := subnet.Spec.Vlan == "" || subnet.Spec.LogicalGateway ||
×
724
                (subnet.Status.U2OInterconnectionIP != "" && subnet.Spec.U2OInterconnection)
×
725
        // 1. overlay subnet, should add lrp, lrp ip is subnet gw
×
726
        // 2. underlay subnet use logical gw, should add lrp, lrp ip is subnet gw
×
727
        randomAllocateGW := !subnet.Spec.LogicalGateway && vpc.Spec.EnableExternal && subnet.Name == c.config.ExternalGatewaySwitch
×
728
        // 3. underlay subnet use physical gw, vpc has eip, lrp managed in vpc process, lrp ip is random allocation, not subnet gw
×
729

×
730
        gateway := subnet.Spec.Gateway
×
731
        var gatewayMAC string
×
732
        if subnet.Status.U2OInterconnectionIP != "" && subnet.Spec.U2OInterconnection {
×
733
                gateway = subnet.Status.U2OInterconnectionIP
×
734
                gatewayMAC = subnet.Status.U2OInterconnectionMAC
×
735
        }
×
736

737
        if err := c.clearOldU2OResource(subnet); err != nil {
×
738
                klog.Errorf("clear subnet %s old u2o resource failed: %v", subnet.Name, err)
×
739
                return err
×
740
        }
×
741

742
        // Lock VPC to prevent CIDR conflict between concurrent subnet creations in the same VPC
743
        c.vpcKeyMutex.LockKey(subnet.Spec.Vpc)
×
744
        if err := c.checkSubnetConflict(subnet); err != nil {
×
745
                _ = c.vpcKeyMutex.UnlockKey(subnet.Spec.Vpc)
×
746
                klog.Errorf("failed to check subnet %s, %v", subnet.Name, err)
×
747
                return err
×
748
        }
×
749
        // create or update logical switch
750
        if err := c.OVNNbClient.CreateLogicalSwitch(subnet.Name, vpc.Status.Router, subnet.Spec.CIDRBlock, gateway, gatewayMAC, needRouter, randomAllocateGW); err != nil {
×
751
                _ = c.vpcKeyMutex.UnlockKey(subnet.Spec.Vpc)
×
752
                klog.Errorf("create logical switch %s: %v", subnet.Name, err)
×
753
                return err
×
754
        }
×
755
        _ = c.vpcKeyMutex.UnlockKey(subnet.Spec.Vpc)
×
756

×
757
        // Record the gateway MAC in ipam if router port exists
×
758
        if needRouter {
×
759
                routerPortName := ovs.LogicalRouterPortName(vpc.Status.Router, subnet.Name)
×
760
                if lrp, err := c.OVNNbClient.GetLogicalRouterPort(routerPortName, true); err == nil && lrp != nil && lrp.MAC != "" {
×
761
                        if err := c.ipam.RecordGatewayMAC(subnet.Name, lrp.MAC); err != nil {
×
762
                                klog.Warningf("failed to record gateway MAC %s for subnet %s: %v", lrp.MAC, subnet.Name, err)
×
763
                        }
×
764
                } else {
×
765
                        klog.V(3).Infof("router port %s not found or has no MAC, skipping gateway MAC record", routerPortName)
×
766
                }
×
767
        }
768

769
        if isMcastQuerierChanged {
×
770
                if err := c.handleMcastQuerierChange(subnet); err != nil {
×
771
                        klog.Errorf("failed to handle mcast querier IP change for subnet %s: %v", subnet.Name, err)
×
772
                        return err
×
773
                }
×
774
        }
775

776
        subnet.Status.EnsureStandardConditions()
×
777

×
778
        if err := c.updateSubnetDHCPOption(subnet, needRouter); err != nil {
×
779
                klog.Errorf("failed to update subnet %s dhcpOptions: %v", subnet.Name, err)
×
780
                return err
×
781
        }
×
782

783
        if c.config.EnableLb && subnet.Name != c.config.NodeSwitch {
×
784
                lbs := []string{
×
785
                        vpc.Status.TCPLoadBalancer,
×
786
                        vpc.Status.TCPSessionLoadBalancer,
×
787
                        vpc.Status.UDPLoadBalancer,
×
788
                        vpc.Status.UDPSessionLoadBalancer,
×
789
                        vpc.Status.SctpLoadBalancer,
×
790
                        vpc.Status.SctpSessionLoadBalancer,
×
791
                }
×
792
                if subnet.Spec.EnableLb != nil && *subnet.Spec.EnableLb {
×
793
                        if err := c.OVNNbClient.LogicalSwitchUpdateLoadBalancers(subnet.Name, ovsdb.MutateOperationInsert, lbs...); err != nil {
×
794
                                if err = c.patchSubnetStatus(subnet, "AddLbToLogicalSwitchFailed", err.Error()); err != nil {
×
795
                                        klog.Error(err)
×
796
                                        return err
×
797
                                }
×
798
                                klog.Error(err)
×
799
                                return err
×
800
                        }
801
                } else {
×
802
                        if err := c.OVNNbClient.LogicalSwitchUpdateLoadBalancers(subnet.Name, ovsdb.MutateOperationDelete, lbs...); err != nil {
×
803
                                klog.Errorf("remove load-balancer from subnet %s failed: %v", subnet.Name, err)
×
804
                                return err
×
805
                        }
×
806
                }
807
        }
808

809
        if err := c.reconcileSubnet(subnet); err != nil {
×
810
                klog.Errorf("reconcile subnet for %s failed, %v", subnet.Name, err)
×
811
                return err
×
812
        }
×
813

814
        subnet.Status.U2OInterconnectionVPC = ""
×
815
        if subnet.Spec.U2OInterconnection {
×
816
                subnet.Status.U2OInterconnectionVPC = vpc.Status.Router
×
817
        }
×
818

819
        if err = c.updateNatOutgoingPolicyRulesStatus(subnet); err != nil {
×
820
                klog.Errorf("failed to update NAT outgoing policy status for subnet %s: %v", subnet.Name, err)
×
821
                return err
×
822
        }
×
823

824
        if subnet.Spec.Private {
×
825
                if err := c.OVNNbClient.SetLogicalSwitchPrivate(subnet.Name, subnet.Spec.CIDRBlock, c.config.NodeSwitchCIDR, subnet.Spec.AllowSubnets); err != nil {
×
826
                        if err = c.patchSubnetStatus(subnet, "SetPrivateLogicalSwitchFailed", err.Error()); err != nil {
×
827
                                klog.Error(err)
×
828
                                return err
×
829
                        }
×
830
                        klog.Error(err)
×
831
                        return err
×
832
                }
833

834
                if err = c.patchSubnetStatus(subnet, "SetPrivateLogicalSwitchSuccess", ""); err != nil {
×
835
                        klog.Error(err)
×
836
                        return err
×
837
                }
×
838
        } else {
×
839
                // clear acl when direction is ""
×
840
                if err = c.OVNNbClient.DeleteAcls(subnet.Name, logicalSwitchKey, "", nil); err != nil {
×
841
                        if err = c.patchSubnetStatus(subnet, "ResetLogicalSwitchAclFailed", err.Error()); err != nil {
×
842
                                klog.Error(err)
×
843
                                return err
×
844
                        }
×
845
                        klog.Error(err)
×
846
                        return err
×
847
                }
848

849
                if err = c.patchSubnetStatus(subnet, "ResetLogicalSwitchAclSuccess", ""); err != nil {
×
850
                        klog.Error(err)
×
851
                        return err
×
852
                }
×
853
        }
854

855
        if err := c.OVNNbClient.UpdateLogicalSwitchACL(subnet.Name, subnet.Spec.CIDRBlock, subnet.Spec.Acls, subnet.Spec.AllowEWTraffic); err != nil {
×
856
                if err = c.patchSubnetStatus(subnet, "SetLogicalSwitchAclsFailed", err.Error()); err != nil {
×
857
                        klog.Error(err)
×
858
                        return err
×
859
                }
×
860
                klog.Error(err)
×
861
                return err
×
862
        }
863

864
        c.updateVpcStatusQueue.Add(subnet.Spec.Vpc)
×
865

×
866
        ippools, err := c.ippoolLister.List(labels.Everything())
×
867
        if err != nil {
×
868
                klog.Errorf("failed to list ippools: %v", err)
×
869
                return err
×
870
        }
×
871

872
        for _, p := range ippools {
×
873
                if p.Spec.Subnet == subnet.Name {
×
874
                        c.addOrUpdateIPPoolQueue.Add(p.Name)
×
875
                }
×
876
        }
877

878
        return nil
×
879
}
880

881
func (c *Controller) handleUpdateSubnetStatus(key string) error {
×
882
        c.subnetKeyMutex.LockKey(key)
×
883
        defer func() { _ = c.subnetKeyMutex.UnlockKey(key) }()
×
884

885
        cachedSubnet, err := c.subnetsLister.Get(key)
×
886
        subnet := cachedSubnet.DeepCopy()
×
887
        if err != nil {
×
888
                if k8serrors.IsNotFound(err) {
×
889
                        return nil
×
890
                }
×
891
                klog.Error(err)
×
892
                return err
×
893
        }
894

895
        ippools, err := c.ippoolLister.List(labels.Everything())
×
896
        if err != nil {
×
897
                klog.Errorf("failed to list ippool: %v", err)
×
898
                return err
×
899
        }
×
900
        for _, p := range ippools {
×
901
                if p.Spec.Subnet == subnet.Name {
×
902
                        c.updateIPPoolStatusQueue.Add(p.Name)
×
903
                }
×
904
        }
905

906
        if util.CheckProtocol(subnet.Spec.CIDRBlock) == kubeovnv1.ProtocolDual {
×
907
                if _, err := c.calcDualSubnetStatusIP(subnet); err != nil {
×
908
                        klog.Error(err)
×
909
                        return err
×
910
                }
×
911
        } else {
×
912
                if _, err = c.calcSubnetStatusIP(subnet); err != nil {
×
913
                        klog.Error(err)
×
914
                        return err
×
915
                }
×
916
        }
917

918
        if err := c.checkSubnetUsingIPs(subnet); err != nil {
×
919
                klog.Errorf("inconsistency detected in status of subnet %s : %v", subnet.Name, err)
×
920
                return err
×
921
        }
×
922
        return nil
×
923
}
924

925
func (c *Controller) handleDeleteLogicalSwitch(key string) (err error) {
×
926
        c.ipam.DeleteSubnet(key)
×
927

×
928
        exist, err := c.OVNNbClient.LogicalSwitchExists(key)
×
929
        if err != nil {
×
930
                klog.Errorf("check logical switch %s exist: %v", key, err)
×
931
                return err
×
932
        }
×
933

934
        // not found, skip
935
        if !exist {
×
936
                return nil
×
937
        }
×
938

939
        // clear acl when direction is ""
940
        if err = c.OVNNbClient.DeleteAcls(key, logicalSwitchKey, "", nil); err != nil {
×
941
                klog.Errorf("clear logical switch %s acls: %v", key, err)
×
942
                return err
×
943
        }
×
944

945
        if err = c.OVNNbClient.DeleteDHCPOptions(key, kubeovnv1.ProtocolDual); err != nil {
×
946
                klog.Errorf("failed to delete dhcp options of logical switch %s %v", key, err)
×
947
                return err
×
948
        }
×
949

950
        if err = c.OVNNbClient.DeleteLogicalSwitch(key); err != nil {
×
951
                klog.Errorf("delete logical switch %s: %v", key, err)
×
952
                return err
×
953
        }
×
954

955
        nss, err := c.namespacesLister.List(labels.Everything())
×
956
        if err != nil {
×
957
                klog.Errorf("failed to list namespaces, %v", err)
×
958
                return err
×
959
        }
×
960

961
        // re-annotate namespace
962
        for _, ns := range nss {
×
963
                annotations := ns.GetAnnotations()
×
964
                if annotations == nil {
×
965
                        continue
×
966
                }
967

968
                if slices.Contains(strings.Split(annotations[util.LogicalSwitchAnnotation], ","), key) {
×
969
                        c.enqueueAddNamespace(ns)
×
970
                }
×
971
        }
972

973
        return c.delLocalnet(key)
×
974
}
975

976
func (c *Controller) handleDeleteSubnet(subnet *kubeovnv1.Subnet) error {
×
977
        c.subnetKeyMutex.LockKey(subnet.Name)
×
978
        defer func() { _ = c.subnetKeyMutex.UnlockKey(subnet.Name) }()
×
979

980
        c.updateVpcStatusQueue.Add(subnet.Spec.Vpc)
×
981
        klog.Infof("delete u2o interconnection policy route for subnet %s", subnet.Name)
×
982
        if err := c.deletePolicyRouteForU2OInterconn(subnet); err != nil {
×
983
                klog.Errorf("failed to delete policy route for underlay to overlay subnet interconnection %s, %v", subnet.Name, err)
×
984
                return err
×
985
        }
×
986
        if subnet.Spec.Vpc != c.config.ClusterRouter {
×
987
                if err := c.deleteStaticRouteForU2OInterconn(subnet); err != nil {
×
988
                        klog.Errorf("failed to delete static route for underlay to overlay subnet interconnection %s, %v", subnet.Name, err)
×
989
                        return err
×
990
                }
×
991
        }
992

993
        u2oInterconnName := fmt.Sprintf(util.U2OInterconnName, subnet.Spec.Vpc, subnet.Name)
×
994
        if err := c.config.KubeOvnClient.KubeovnV1().IPs().Delete(context.Background(), u2oInterconnName, metav1.DeleteOptions{}); err != nil {
×
995
                if !k8serrors.IsNotFound(err) {
×
996
                        klog.Errorf("failed to delete ip %s, %v", u2oInterconnName, err)
×
997
                        return err
×
998
                }
×
999
        }
1000

1001
        if subnet.Spec.Vpc != c.config.ClusterRouter {
×
1002
                if err := c.deleteCustomVPCPolicyRoutesForSubnet(subnet); err != nil {
×
1003
                        klog.Errorf("failed to delete custom vpc routes subnet %s, %v", subnet.Name, err)
×
1004
                        return err
×
1005
                }
×
1006
        }
1007

1008
        klog.Infof("delete policy route for %s subnet %s", subnet.Spec.GatewayType, subnet.Name)
×
1009
        if err := c.deletePolicyRouteByGatewayType(subnet, subnet.Spec.GatewayType, true); err != nil {
×
1010
                klog.Errorf("failed to delete policy route for overlay subnet %s, %v", subnet.Name, err)
×
1011
                return err
×
1012
        }
×
1013

1014
        err := c.handleDeleteLogicalSwitch(subnet.Name)
×
1015
        if err != nil {
×
1016
                klog.Errorf("failed to delete logical switch %s %v", subnet.Name, err)
×
1017
                return err
×
1018
        }
×
1019

1020
        var router string
×
1021
        vpc, err := c.vpcsLister.Get(subnet.Spec.Vpc)
×
1022
        if err != nil {
×
1023
                if !k8serrors.IsNotFound(err) {
×
1024
                        klog.Errorf("get vpc %s: %v", vpc.Name, err)
×
1025
                        return err
×
1026
                }
×
1027
                router = c.config.ClusterRouter
×
1028
        } else {
×
1029
                router = vpc.Status.Router
×
1030
        }
×
1031

1032
        lspName := fmt.Sprintf("%s-%s", subnet.Name, router)
×
1033
        lrpName := fmt.Sprintf("%s-%s", router, subnet.Name)
×
1034
        if err = c.OVNNbClient.RemoveLogicalPatchPort(lspName, lrpName); err != nil {
×
1035
                klog.Errorf("delete router port %s and %s:%v", lspName, lrpName, err)
×
1036
                return err
×
1037
        }
×
1038

1039
        vlans, err := c.vlansLister.List(labels.Everything())
×
1040
        if err != nil && !k8serrors.IsNotFound(err) {
×
1041
                klog.Errorf("failed to list vlans: %v", err)
×
1042
                return err
×
1043
        }
×
1044

1045
        for _, vlan := range vlans {
×
1046
                if err = c.updateVlanStatusForSubnetDeletion(vlan, subnet.Name); err != nil {
×
1047
                        klog.Error(err)
×
1048
                        return err
×
1049
                }
×
1050
        }
1051

1052
        // clean up subnet last vpc name cached
1053
        c.subnetLastVpcNameMap.Delete(subnet.Name)
×
1054

×
1055
        return nil
×
1056
}
1057

1058
func (c *Controller) updateVlanStatusForSubnetDeletion(vlan *kubeovnv1.Vlan, subnet string) error {
×
1059
        if !slices.Contains(vlan.Status.Subnets, subnet) {
×
1060
                return nil
×
1061
        }
×
1062

1063
        newVlan := vlan.DeepCopy()
×
1064
        newVlan.Status.Subnets = util.RemoveString(newVlan.Status.Subnets, subnet)
×
1065
        _, err := c.config.KubeOvnClient.KubeovnV1().Vlans().UpdateStatus(context.Background(), newVlan, metav1.UpdateOptions{})
×
1066
        if err != nil {
×
1067
                klog.Errorf("failed to update status of vlan %s: %v", vlan.Name, err)
×
1068
                return err
×
1069
        }
×
1070

1071
        return nil
×
1072
}
1073

1074
func (c *Controller) reconcileSubnet(subnet *kubeovnv1.Subnet) error {
×
1075
        if err := c.reconcileNamespaces(subnet); err != nil {
×
1076
                klog.Errorf("reconcile namespaces for subnet %s failed, %v", subnet.Name, err)
×
1077
                return err
×
1078
        }
×
1079

1080
        if err := c.reconcileRouteTableForSubnet(subnet); err != nil {
×
1081
                klog.Errorf("reconcile route table for subnet %s failed, %v", subnet.Name, err)
×
1082
                return err
×
1083
        }
×
1084

1085
        if subnet.Spec.Vpc == c.config.ClusterRouter {
×
1086
                if err := c.reconcileOvnDefaultVpcRoute(subnet); err != nil {
×
1087
                        klog.Errorf("reconcile default vpc ovn route for subnet %s failed: %v", subnet.Name, err)
×
1088
                        return err
×
1089
                }
×
1090
        } else if err := c.reconcileCustomVpcStaticRoute(subnet); err != nil {
×
1091
                klog.Errorf("reconcile custom vpc ovn route for subnet %s failed: %v", subnet.Name, err)
×
1092
                return err
×
1093
        }
×
1094

1095
        if err := c.reconcileVlan(subnet); err != nil {
×
1096
                klog.Errorf("reconcile vlan for subnet %s failed, %v", subnet.Name, err)
×
1097
                return err
×
1098
        }
×
1099

1100
        if err := c.reconcileVips(subnet); err != nil {
×
1101
                klog.Errorf("reconcile vips for subnet %s failed, %v", subnet.Name, err)
×
1102
                return err
×
1103
        }
×
1104
        return nil
×
1105
}
1106

1107
func (c *Controller) reconcileVips(subnet *kubeovnv1.Subnet) error {
1✔
1108
        /* get all virtual port belongs to this logical switch */
1✔
1109
        lsps, err := c.OVNNbClient.ListLogicalSwitchPorts(true, map[string]string{logicalSwitchKey: subnet.Name}, func(lsp *ovnnb.LogicalSwitchPort) bool {
1✔
1110
                return lsp.Type == "virtual"
×
1111
        })
×
1112
        if err != nil {
1✔
1113
                klog.Errorf("failed to find virtual port for subnet %s: %v", subnet.Name, err)
×
1114
                return err
×
1115
        }
×
1116

1117
        /* filter all invalid virtual port */
1118
        existVips := make(map[string]string) // key is vip, value is port name
1✔
1119
        for _, lsp := range lsps {
2✔
1120
                vip, ok := lsp.Options["virtual-ip"]
1✔
1121
                if !ok {
1✔
1122
                        continue // ignore vip which is empty
×
1123
                }
1124

1125
                if net.ParseIP(vip) == nil {
1✔
1126
                        continue // ignore invalid vip
×
1127
                }
1128

1129
                existVips[vip] = lsp.Name
1✔
1130
        }
1131

1132
        /* filter virtual port to be added and old virtual port to be deleted */
1133
        var newVips []string
1✔
1134
        for _, vip := range subnet.Spec.Vips {
2✔
1135
                if _, ok := existVips[vip]; !ok {
2✔
1136
                        // new virtual port to be added
1✔
1137
                        newVips = append(newVips, vip)
1✔
1138
                } else {
2✔
1139
                        // delete old virtual port that do not need to be deleted
1✔
1140
                        delete(existVips, vip)
1✔
1141
                }
1✔
1142
        }
1143

1144
        // delete old virtual ports
1145
        for _, lspName := range existVips {
2✔
1146
                if err = c.OVNNbClient.DeleteLogicalSwitchPort(lspName); err != nil {
1✔
1147
                        klog.Errorf("delete virtual port %s lspName from logical switch %s: %v", lspName, subnet.Name, err)
×
1148
                        return err
×
1149
                }
×
1150
        }
1151

1152
        // add new virtual port
1153
        if err = c.OVNNbClient.CreateVirtualLogicalSwitchPorts(subnet.Name, newVips...); err != nil {
1✔
1154
                klog.Errorf("create virtual port with vips %v from logical switch %s: %v", newVips, subnet.Name, err)
×
1155
                return err
×
1156
        }
×
1157

1158
        c.syncVirtualPortsQueue.Add(subnet.Name)
1✔
1159
        return nil
1✔
1160
}
1161

1162
func (c *Controller) syncVirtualPort(key string) error {
1✔
1163
        subnet, err := c.subnetsLister.Get(key)
1✔
1164
        if err != nil {
1✔
1165
                if k8serrors.IsNotFound(err) {
×
1166
                        return nil
×
1167
                }
×
1168
                klog.Errorf("failed to get subnet %s, %v", key, err)
×
1169
                return err
×
1170
        }
1171
        if len(subnet.Spec.Vips) == 0 {
1✔
1172
                return nil
×
1173
        }
×
1174

1175
        externalIDs := map[string]string{
1✔
1176
                logicalSwitchKey: subnet.Name,
1✔
1177
                "attach-vips":    "true",
1✔
1178
        }
1✔
1179

1✔
1180
        lsps, err := c.OVNNbClient.ListNormalLogicalSwitchPorts(true, externalIDs)
1✔
1181
        if err != nil {
1✔
1182
                klog.Errorf("list logical switch %s ports: %v", subnet.Name, err)
×
1183
                return err
×
1184
        }
×
1185

1186
        for _, vip := range subnet.Spec.Vips {
2✔
1187
                if !util.CIDRContainIP(subnet.Spec.CIDRBlock, vip) {
1✔
1188
                        klog.Errorf("vip %s is out of range to subnet %s", vip, subnet.Name)
×
1189
                        continue
×
1190
                }
1191

1192
                var virtualParents []string
1✔
1193
                for _, lsp := range lsps {
2✔
1194
                        vips, ok := lsp.ExternalIDs["vips"]
1✔
1195
                        if !ok {
1✔
1196
                                continue // ignore vips which is empty
×
1197
                        }
1198

1199
                        if strings.Contains(vips, vip) {
2✔
1200
                                virtualParents = append(virtualParents, lsp.Name)
1✔
1201
                        }
1✔
1202
                }
1203

1204
                // logical switch port has no valid vip
1205
                if len(virtualParents) == 0 {
2✔
1206
                        continue
1✔
1207
                }
1208

1209
                if err = c.OVNNbClient.SetLogicalSwitchPortVirtualParents(subnet.Name, strings.Join(virtualParents, ","), vip); err != nil {
1✔
1210
                        klog.Errorf("set vip %s virtual parents %v: %v", vip, virtualParents, err)
×
1211
                        return err
×
1212
                }
×
1213
        }
1214

1215
        return nil
1✔
1216
}
1217

1218
func (c *Controller) reconcileNamespaces(subnet *kubeovnv1.Subnet) error {
×
1219
        var (
×
1220
                namespaces []*v1.Namespace
×
1221
                err        error
×
1222
        )
×
1223

×
1224
        // 1. get all namespaces should be updated
×
1225
        expectNss, err := c.getNamespacesBySelector(subnet.Spec.NamespaceSelectors)
×
1226
        if err != nil {
×
1227
                klog.Errorf("failed to list namespaces by selector, %v", err)
×
1228
                return err
×
1229
        }
×
1230
        for _, ns := range subnet.Spec.Namespaces {
×
1231
                if !slices.Contains(expectNss, ns) {
×
1232
                        expectNss = append(expectNss, ns)
×
1233
                }
×
1234
        }
1235

1236
        // 2. update namespaces
1237
        for _, expectNs := range expectNss {
×
1238
                checkNs, err := c.namespacesLister.Get(expectNs)
×
1239
                if err != nil {
×
1240
                        if k8serrors.IsNotFound(err) {
×
1241
                                continue
×
1242
                        }
1243
                        klog.Error(err)
×
1244
                        return err
×
1245
                }
1246
                if checkNs.Annotations != nil && slices.Contains(strings.Split(checkNs.Annotations[util.LogicalSwitchAnnotation], ","), subnet.Name) {
×
1247
                        // when subnet cidr changed, the ns annotation with the subnet should be updated
×
1248
                        if !slices.Contains(strings.Split(checkNs.Annotations[util.CidrAnnotation], ";"), subnet.Spec.CIDRBlock) {
×
1249
                                c.addNamespaceQueue.Add(checkNs.Name)
×
1250
                        }
×
1251
                        continue
×
1252
                }
1253
                c.addNamespaceQueue.Add(expectNs)
×
1254
        }
1255

1256
        // 3. update unbind namespace annotation
1257
        if namespaces, err = c.namespacesLister.List(labels.Everything()); err != nil {
×
1258
                klog.Errorf("failed to list namespaces, %v", err)
×
1259
                return err
×
1260
        }
×
1261

1262
        for _, ns := range namespaces {
×
1263
                if ns.Annotations != nil && slices.Contains(strings.Split(ns.Annotations[util.LogicalSwitchAnnotation], ","), subnet.Name) {
×
1264
                        if slices.Contains(expectNss, ns.Name) {
×
1265
                                continue
×
1266
                        }
1267
                        // ns deleted from subnet.Spec.Namespaces or subnet delete namespaceSelectors which match the checked namespace
1268
                        c.addNamespaceQueue.Add(ns.Name)
×
1269
                }
1270
        }
1271

1272
        return nil
×
1273
}
1274

1275
func (c *Controller) getNamespacesBySelector(nsSelectors []metav1.LabelSelector) ([]string, error) {
×
1276
        var expectNss []string
×
1277
        for _, nsSelector := range nsSelectors {
×
1278
                matchSelector, err := metav1.LabelSelectorAsSelector(&nsSelector)
×
1279
                if err != nil {
×
1280
                        klog.Errorf("failed to convert label selector, %v", err)
×
1281
                        return expectNss, err
×
1282
                }
×
1283

1284
                nss, err := c.namespacesLister.List(matchSelector)
×
1285
                if err != nil {
×
1286
                        klog.Errorf("failed to list namespaces by selector, %v", err)
×
1287
                        return expectNss, err
×
1288
                }
×
1289
                for _, ns := range nss {
×
1290
                        expectNss = append(expectNss, ns.Name)
×
1291
                }
×
1292
        }
1293
        return expectNss, nil
×
1294
}
1295

1296
func (c *Controller) reconcileCustomVpcBfdStaticRoute(vpcName, subnetName string) error {
×
1297
        // vpc enable bfd and subnet enable ecmp
×
1298
        // use static ecmp route with bfd
×
1299
        ovnEips, err := c.ovnEipsLister.List(labels.SelectorFromSet(labels.Set{util.OvnEipTypeLabel: util.OvnEipTypeLSP}))
×
1300
        if err != nil {
×
1301
                klog.Errorf("failed to list node external ovn eip, %v", err)
×
1302
                return err
×
1303
        }
×
1304
        if len(ovnEips) < 2 {
×
1305
                err := fmt.Errorf("ecmp route with bfd for HA, which need two %s type eips at least, has %d", util.OvnEipTypeLSP, len(ovnEips))
×
1306
                klog.Error(err)
×
1307
                return err
×
1308
        }
×
1309

1310
        subnet, err := c.subnetsLister.Get(subnetName)
×
1311
        if err != nil {
×
1312
                klog.Errorf("failed to get subnet %s, %v", subnetName, err)
×
1313
                return err
×
1314
        }
×
1315
        cachedVpc, err := c.vpcsLister.Get(vpcName)
×
1316
        if err != nil {
×
1317
                if k8serrors.IsNotFound(err) {
×
1318
                        return nil
×
1319
                }
×
1320
                klog.Errorf("failed to get vpc %s, %v", vpcName, err)
×
1321
                return err
×
1322
        }
1323

1324
        var (
×
1325
                needUpdate, v4Exist bool
×
1326
                lrpEipName          string
×
1327
        )
×
1328

×
1329
        lrpEipName = fmt.Sprintf("%s-%s", vpcName, c.config.ExternalGatewaySwitch)
×
1330
        lrpEip, err := c.ovnEipsLister.Get(lrpEipName)
×
1331
        if err != nil {
×
1332
                err := fmt.Errorf("failed to get lrp eip %s, %w", lrpEipName, err)
×
1333
                klog.Error(err)
×
1334
                return err
×
1335
        }
×
1336
        if !lrpEip.Status.Ready || lrpEip.Status.V4Ip == "" {
×
1337
                err := fmt.Errorf("lrp eip %q not ready", lrpEipName)
×
1338
                klog.Error(err)
×
1339
                return err
×
1340
        }
×
1341
        vpc := cachedVpc.DeepCopy()
×
1342

×
1343
        for _, eip := range ovnEips {
×
1344
                if !eip.Status.Ready || eip.Status.V4Ip == "" {
×
1345
                        err := fmt.Errorf("ovn eip %q not ready", eip.Name)
×
1346
                        klog.Error(err)
×
1347
                        return err
×
1348
                }
×
1349
                bfd, err := c.OVNNbClient.CreateBFD(lrpEipName, eip.Status.V4Ip, c.config.BfdMinRx, c.config.BfdMinTx, c.config.BfdDetectMult, nil)
×
1350
                if err != nil {
×
1351
                        klog.Error(err)
×
1352
                        return err
×
1353
                }
×
1354
                // TODO:// support v6
1355
                v4Exist = false
×
1356
                for _, route := range vpc.Spec.StaticRoutes {
×
1357
                        if route.Policy == kubeovnv1.PolicySrc &&
×
1358
                                route.NextHopIP == eip.Status.V4Ip &&
×
1359
                                route.ECMPMode == util.StaticRouteBfdEcmp &&
×
1360
                                route.CIDR == subnet.Spec.CIDRBlock &&
×
1361
                                route.RouteTable == subnet.Spec.RouteTable {
×
1362
                                v4Exist = true
×
1363
                                break
×
1364
                        }
1365
                }
1366
                if !v4Exist {
×
1367
                        // add ecmp type static route with bfd
×
1368
                        route := &kubeovnv1.StaticRoute{
×
1369
                                Policy:     kubeovnv1.PolicySrc,
×
1370
                                CIDR:       subnet.Spec.CIDRBlock,
×
1371
                                NextHopIP:  eip.Status.V4Ip,
×
1372
                                ECMPMode:   util.StaticRouteBfdEcmp,
×
1373
                                BfdID:      bfd.UUID,
×
1374
                                RouteTable: subnet.Spec.RouteTable,
×
1375
                        }
×
1376
                        klog.Infof("add ecmp bfd static route %v", route)
×
1377
                        vpc.Spec.StaticRoutes = append(vpc.Spec.StaticRoutes, route)
×
1378
                        needUpdate = true
×
1379
                }
×
1380
        }
1381
        if needUpdate {
×
1382
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Update(context.Background(), vpc, metav1.UpdateOptions{}); err != nil {
×
1383
                        klog.Errorf("failed to update vpc spec static route %s, %v", vpc.Name, err)
×
1384
                        return err
×
1385
                }
×
1386
                if err = c.patchVpcBfdStatus(vpc.Name); err != nil {
×
1387
                        klog.Errorf("failed to patch vpc %s, %v", vpc.Name, err)
×
1388
                        return err
×
1389
                }
×
1390
        }
1391
        return nil
×
1392
}
1393

1394
func (c *Controller) reconcileCustomVpcDelNormalStaticRoute(vpcName string) error {
×
1395
        // normal static route is prior than ecmp bfd static route
×
1396
        // if use ecmp bfd static route, normal static route should not exist
×
1397
        defaultExternalSubnet, err := c.subnetsLister.Get(c.config.ExternalGatewaySwitch)
×
1398
        if err != nil {
×
1399
                klog.Errorf("failed to get default external switch subnet %s: %v", c.config.ExternalGatewaySwitch, err)
×
1400
                return err
×
1401
        }
×
1402
        gatewayV4, gatewayV6 := util.SplitStringIP(defaultExternalSubnet.Spec.Gateway)
×
1403
        needUpdate := false
×
1404
        vpc, err := c.vpcsLister.Get(vpcName)
×
1405
        if err != nil {
×
1406
                if k8serrors.IsNotFound(err) {
×
1407
                        return nil
×
1408
                }
×
1409
                klog.Errorf("failed to get vpc %s, %v", vpcName, err)
×
1410
                return err
×
1411
        }
1412
        routeTotal := len(vpc.Spec.StaticRoutes)
×
1413
        routes := make([]*kubeovnv1.StaticRoute, 0, routeTotal)
×
1414
        for _, route := range vpc.Spec.StaticRoutes {
×
1415
                if route.Policy == kubeovnv1.PolicyDst &&
×
1416
                        (route.NextHopIP == gatewayV4 || route.NextHopIP == gatewayV6) &&
×
1417
                        (route.CIDR == "0.0.0.0/0" || route.CIDR == "::/0") {
×
1418
                        klog.Infof("in order to use ecmp bfd route, need remove normal static route %v", route)
×
1419
                        needUpdate = true
×
1420
                } else {
×
1421
                        routes = append(routes, route)
×
1422
                }
×
1423
        }
1424

1425
        if needUpdate {
×
1426
                vpc.Spec.StaticRoutes = routes
×
1427
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Update(context.Background(), vpc, metav1.UpdateOptions{}); err != nil {
×
1428
                        klog.Errorf("failed to update vpc spec static route %s, %v", vpc.Name, err)
×
1429
                        return err
×
1430
                }
×
1431
        }
1432

1433
        if err = c.patchVpcBfdStatus(vpc.Name); err != nil {
×
1434
                klog.Errorf("failed to patch vpc %s, %v", vpc.Name, err)
×
1435
                return err
×
1436
        }
×
1437

1438
        return nil
×
1439
}
1440

1441
func (c *Controller) reconcileDistributedSubnetRouteInDefaultVpc(subnet *kubeovnv1.Subnet) error {
×
1442
        if subnet.Spec.GatewayNode != "" || subnet.Status.ActivateGateway != "" {
×
1443
                klog.Infof("delete old centralized policy route for subnet %s", subnet.Name)
×
1444
                if err := c.deletePolicyRouteForCentralizedSubnet(subnet); err != nil {
×
1445
                        klog.Errorf("failed to delete policy route for subnet %s, %v", subnet.Name, err)
×
1446
                        return err
×
1447
                }
×
1448

1449
                subnet.Spec.GatewayNode = ""
×
1450
                if _, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Update(context.Background(), subnet, metav1.UpdateOptions{}); err != nil {
×
1451
                        klog.Errorf("failed to remove gatewayNode or activateGateway from subnet %s, %v", subnet.Name, err)
×
1452
                        return err
×
1453
                }
×
1454
                subnet.Status.ActivateGateway = ""
×
1455
                if err := c.patchSubnetStatus(subnet, "ChangeToDistributedGw", ""); err != nil {
×
1456
                        klog.Error(err)
×
1457
                        return err
×
1458
                }
×
1459
        }
1460

1461
        nodes, err := c.nodesLister.List(labels.Everything())
×
1462
        if err != nil {
×
1463
                klog.Errorf("failed to list nodes: %v", err)
×
1464
                return err
×
1465
        }
×
1466
        for _, node := range nodes {
×
1467
                if err = c.createPortGroupForDistributedSubnet(node, subnet); err != nil {
×
1468
                        klog.Errorf("failed to create port group %v", err)
×
1469
                        return err
×
1470
                }
×
1471
                if node.Annotations[util.AllocatedAnnotation] != "true" {
×
1472
                        klog.Warningf("node %s has not been successfully initialized, skip adding policy route for subnet %s", node.Name, subnet.Name)
×
1473
                        continue
×
1474
                }
1475
                nodeIP, err := getNodeTunlIP(node)
×
1476
                if err != nil {
×
1477
                        klog.Errorf("failed to get node %s tunnel ip, %v", node.Name, err)
×
1478
                        return err
×
1479
                }
×
1480
                nextHop := getNextHopByTunnelIP(nodeIP)
×
1481
                v4IP, v6IP := util.SplitStringIP(nextHop)
×
1482
                if err = c.addPolicyRouteForDistributedSubnet(subnet, node.Name, v4IP, v6IP); err != nil {
×
1483
                        klog.Errorf("failed to add policy router for node %s and subnet %s: %v", node.Name, subnet.Name, err)
×
1484
                        return err
×
1485
                }
×
1486
        }
1487

1488
        portGroups, err := c.OVNNbClient.ListPortGroups(map[string]string{"subnet": subnet.Name, "node": "", networkPolicyKey: ""})
×
1489
        if err != nil {
×
1490
                klog.Errorf("failed to list port groups for subnet %s: %v", subnet.Name, err)
×
1491
                return err
×
1492
        }
×
1493

1494
        pods, err := c.podsLister.Pods(metav1.NamespaceAll).List(labels.Everything())
×
1495
        if err != nil {
×
1496
                klog.Errorf("failed to list pods %v", err)
×
1497
                return err
×
1498
        }
×
1499
        for _, pod := range pods {
×
1500
                if !isPodAlive(pod) || pod.Spec.NodeName == "" {
×
1501
                        continue
×
1502
                }
1503

1504
                podNets, err := c.getPodKubeovnNets(pod)
×
1505
                if err != nil {
×
1506
                        klog.Errorf("failed to get pod nets %v", err)
×
1507
                        continue
×
1508
                }
1509

1510
                podPorts := make([]string, 0, 1)
×
1511
                for _, podNet := range podNets {
×
1512
                        if !isOvnSubnet(podNet.Subnet) {
×
1513
                                continue
×
1514
                        }
1515

1516
                        if pod.Annotations[fmt.Sprintf(util.IPAddressAnnotationTemplate, podNet.ProviderName)] == "" || pod.Annotations[fmt.Sprintf(util.LogicalSwitchAnnotationTemplate, podNet.ProviderName)] != subnet.Name {
×
1517
                                continue
×
1518
                        }
1519

1520
                        podName := c.getNameByPod(pod)
×
1521
                        portName := ovs.PodNameToPortName(podName, pod.Namespace, podNet.ProviderName)
×
1522
                        podPorts = append(podPorts, portName)
×
1523
                }
1524

1525
                pgName := getOverlaySubnetsPortGroupName(subnet.Name, pod.Spec.NodeName)
×
1526
                portsToAdd := make([]string, 0, len(podPorts))
×
1527
                for _, port := range podPorts {
×
1528
                        exist, err := c.OVNNbClient.LogicalSwitchPortExists(port)
×
1529
                        if err != nil {
×
1530
                                klog.Error(err)
×
1531
                                return err
×
1532
                        }
×
1533

1534
                        if !exist {
×
1535
                                klog.Errorf("lsp does not exist for pod %v, please delete the pod and retry", port)
×
1536
                                continue
×
1537
                        }
1538

1539
                        portsToAdd = append(portsToAdd, port)
×
1540
                }
1541

1542
                // remove lsp from other port groups
1543
                // we need to do this because the pod, e.g. a sts/vm, can be rescheduled to another node
1544
                for _, pg := range portGroups {
×
1545
                        if pg.Name == pgName {
×
1546
                                continue
×
1547
                        }
1548
                        if err = c.OVNNbClient.PortGroupRemovePorts(pg.Name, podPorts...); err != nil {
×
1549
                                klog.Errorf("remove ports from port group %s: %v", pg.Name, err)
×
1550
                                return err
×
1551
                        }
×
1552
                }
1553
                // add ports to the port group
1554
                if err = c.OVNNbClient.PortGroupAddPorts(pgName, portsToAdd...); err != nil {
×
1555
                        klog.Errorf("add ports to port group %s: %v", pgName, err)
×
1556
                        return err
×
1557
                }
×
1558
        }
1559
        return nil
×
1560
}
1561

1562
func (c *Controller) reconcileDefaultCentralizedSubnetRouteInDefaultVpc(subnet *kubeovnv1.Subnet) error {
×
1563
        gatewayNodes, err := c.getGatewayNodes(subnet)
×
1564
        if err != nil {
×
1565
                klog.Errorf("failed to get gateway nodes for subnet %s: %v", subnet.Name, err)
×
1566
                return err
×
1567
        }
×
1568

1569
        // check if activateGateway still ready
1570
        if subnet.Status.ActivateGateway != "" && slices.Contains(gatewayNodes, subnet.Status.ActivateGateway) {
×
1571
                node, err := c.nodesLister.Get(subnet.Status.ActivateGateway)
×
1572
                if err == nil && nodeReady(node) {
×
1573
                        klog.Infof("subnet %s uses the old activate gw %s", subnet.Name, node.Name)
×
1574

×
1575
                        nodeTunlIPAddr, err := getNodeTunlIP(node)
×
1576
                        if err != nil {
×
1577
                                klog.Errorf("failed to get gatewayNode tunnel ip for subnet %s", subnet.Name)
×
1578
                                return err
×
1579
                        }
×
1580
                        nextHop := getNextHopByTunnelIP(nodeTunlIPAddr)
×
1581
                        if err = c.addPolicyRouteForCentralizedSubnet(subnet, subnet.Status.ActivateGateway, nil, strings.Split(nextHop, ",")); err != nil {
×
1582
                                klog.Errorf("failed to add active-backup policy route for centralized subnet %s: %v", subnet.Name, err)
×
1583
                                return err
×
1584
                        }
×
1585
                        return nil
×
1586
                }
1587
        }
1588

1589
        klog.Info("find a new activate node")
×
1590
        // need a new activate gateway
×
1591
        newActivateNode := ""
×
1592
        var nodeTunlIPAddr []net.IP
×
1593
        for _, gw := range gatewayNodes {
×
1594
                node, err := c.nodesLister.Get(gw)
×
1595
                if err == nil && nodeReady(node) {
×
1596
                        newActivateNode = node.Name
×
1597
                        nodeTunlIPAddr, err = getNodeTunlIP(node)
×
1598
                        if err != nil {
×
1599
                                klog.Error(err)
×
1600
                                return err
×
1601
                        }
×
1602
                        klog.Infof("subnet %s uses a new activate gw %s", subnet.Name, node.Name)
×
1603
                        break
×
1604
                }
1605
        }
1606
        if newActivateNode == "" {
×
1607
                klog.Warningf("all gateways of subnet %s are not ready", subnet.Name)
×
1608
                subnet.Status.ActivateGateway = newActivateNode
×
1609
                if err := c.patchSubnetStatus(subnet, "NoActiveGatewayFound", fmt.Sprintf("subnet %s gws are not ready", subnet.Name)); err != nil {
×
1610
                        klog.Error(err)
×
1611
                        return err
×
1612
                }
×
1613

1614
                return fmt.Errorf("subnet %s gws are not ready", subnet.Name)
×
1615
        }
1616

1617
        nextHop := getNextHopByTunnelIP(nodeTunlIPAddr)
×
1618
        klog.Infof("subnet %s configure new gateway node, nextHop %s", subnet.Name, nextHop)
×
1619
        if err := c.addPolicyRouteForCentralizedSubnet(subnet, newActivateNode, nil, strings.Split(nextHop, ",")); err != nil {
×
1620
                klog.Errorf("failed to add policy route for active-backup centralized subnet %s: %v", subnet.Name, err)
×
1621
                return err
×
1622
        }
×
1623
        subnet.Status.ActivateGateway = newActivateNode
×
1624
        if err := c.patchSubnetStatus(subnet, "ReconcileCentralizedGatewaySuccess", ""); err != nil {
×
1625
                klog.Error(err)
×
1626
                return err
×
1627
        }
×
1628

1629
        klog.Infof("delete old distributed policy route for subnet %s", subnet.Name)
×
1630
        if err := c.deletePolicyRouteByGatewayType(subnet, kubeovnv1.GWDistributedType, false); err != nil {
×
1631
                klog.Errorf("failed to delete policy route for overlay subnet %s, %v", subnet.Name, err)
×
1632
                return err
×
1633
        }
×
1634
        return nil
×
1635
}
1636

1637
func (c *Controller) reconcileEcmpCentralizedSubnetRouteInDefaultVpc(subnet *kubeovnv1.Subnet) error {
×
1638
        // centralized subnet, enable ecmp, add ecmp policy route
×
1639
        gatewayNodes, err := c.getGatewayNodes(subnet)
×
1640
        if err != nil {
×
1641
                klog.Errorf("failed to get gateway nodes for subnet %s: %v", subnet.Name, err)
×
1642
                return err
×
1643
        }
×
1644

1645
        var (
×
1646
                nodeV4IPs   = make([]string, 0, len(gatewayNodes))
×
1647
                nodeV6IPs   = make([]string, 0, len(gatewayNodes))
×
1648
                nameV4IPMap = make(map[string]string, len(gatewayNodes))
×
1649
                nameV6IPMap = make(map[string]string, len(gatewayNodes))
×
1650
        )
×
1651

×
1652
        for _, gw := range gatewayNodes {
×
1653
                node, err := c.nodesLister.Get(gw)
×
1654
                if err != nil {
×
1655
                        klog.Errorf("failed to get gw node %s, %v", gw, err)
×
1656
                        continue
×
1657
                }
1658

1659
                if nodeReady(node) {
×
1660
                        nexthopNodeIP := strings.TrimSpace(node.Annotations[util.IPAddressAnnotation])
×
1661
                        if nexthopNodeIP == "" {
×
1662
                                klog.Errorf("gateway node %v has no ip annotation", node.Name)
×
1663
                                continue
×
1664
                        }
1665
                        nexthopV4, nexthopV6 := util.SplitStringIP(nexthopNodeIP)
×
1666
                        if nexthopV4 != "" {
×
1667
                                nameV4IPMap[node.Name] = nexthopV4
×
1668
                                nodeV4IPs = append(nodeV4IPs, nexthopV4)
×
1669
                        }
×
1670
                        if nexthopV6 != "" {
×
1671
                                nameV6IPMap[node.Name] = nexthopV6
×
1672
                                nodeV6IPs = append(nodeV6IPs, nexthopV6)
×
1673
                        }
×
1674
                } else {
×
1675
                        klog.Errorf("gateway node %v is not ready", gw)
×
1676
                }
×
1677
        }
1678

1679
        v4CIDR, v6CIDR := util.SplitStringIP(subnet.Spec.CIDRBlock)
×
1680
        if nodeV4IPs != nil && v4CIDR != "" {
×
1681
                klog.Infof("delete old distributed policy route for subnet %s", subnet.Name)
×
1682
                if err := c.deletePolicyRouteByGatewayType(subnet, kubeovnv1.GWDistributedType, false); err != nil {
×
1683
                        klog.Errorf("failed to delete policy route for overlay subnet %s, %v", subnet.Name, err)
×
1684
                        return err
×
1685
                }
×
1686
                klog.Infof("subnet %s configure ecmp policy route, nexthops %v", subnet.Name, nodeV4IPs)
×
1687
                if err := c.updatePolicyRouteForCentralizedSubnet(subnet.Name, v4CIDR, nodeV4IPs, nameV4IPMap); err != nil {
×
1688
                        klog.Errorf("failed to add v4 ecmp policy route for centralized subnet %s: %v", subnet.Name, err)
×
1689
                        return err
×
1690
                }
×
1691
        }
1692
        if nodeV6IPs != nil && v6CIDR != "" {
×
1693
                klog.Infof("delete old distributed policy route for subnet %s", subnet.Name)
×
1694
                if err := c.deletePolicyRouteByGatewayType(subnet, kubeovnv1.GWDistributedType, false); err != nil {
×
1695
                        klog.Errorf("failed to delete policy route for overlay subnet %s, %v", subnet.Name, err)
×
1696
                        return err
×
1697
                }
×
1698
                klog.Infof("subnet %s configure ecmp policy route, nexthops %v", subnet.Name, nodeV6IPs)
×
1699
                if err := c.updatePolicyRouteForCentralizedSubnet(subnet.Name, v6CIDR, nodeV6IPs, nameV6IPMap); err != nil {
×
1700
                        klog.Errorf("failed to add v6 ecmp policy route for centralized subnet %s: %v", subnet.Name, err)
×
1701
                        return err
×
1702
                }
×
1703
        }
1704
        return nil
×
1705
}
1706

1707
func (c *Controller) reconcileOvnDefaultVpcRoute(subnet *kubeovnv1.Subnet) error {
×
1708
        if subnet.Name == c.config.NodeSwitch {
×
1709
                if err := c.addCommonRoutesForSubnet(subnet); err != nil {
×
1710
                        klog.Error(err)
×
1711
                        return err
×
1712
                }
×
1713
                return nil
×
1714
        }
1715

1716
        if subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway {
×
1717
                // physical switch provide gw for this underlay subnet
×
1718
                pods, err := c.podsLister.Pods(metav1.NamespaceAll).List(labels.Everything())
×
1719
                if err != nil {
×
1720
                        klog.Errorf("failed to list pods %v", err)
×
1721
                        return err
×
1722
                }
×
1723
                for _, pod := range pods {
×
1724
                        if pod.Annotations[util.LogicalSwitchAnnotation] == subnet.Name && pod.Annotations[util.IPAddressAnnotation] != "" {
×
1725
                                if err := c.deleteStaticRoute(
×
1726
                                        pod.Annotations[util.IPAddressAnnotation], c.config.ClusterRouter, subnet.Spec.RouteTable); err != nil {
×
1727
                                        klog.Errorf("failed to delete static route %v", err)
×
1728
                                        return err
×
1729
                                }
×
1730
                        }
1731
                }
1732

1733
                if !subnet.Spec.LogicalGateway && subnet.Name != c.config.ExternalGatewaySwitch && !subnet.Spec.U2OInterconnection {
×
1734
                        lspName := fmt.Sprintf("%s-%s", subnet.Name, c.config.ClusterRouter)
×
1735
                        klog.Infof("delete logical switch port %s", lspName)
×
1736
                        if err := c.OVNNbClient.DeleteLogicalSwitchPort(lspName); err != nil {
×
1737
                                klog.Errorf("failed to delete lsp %s-%s, %v", subnet.Name, c.config.ClusterRouter, err)
×
1738
                                return err
×
1739
                        }
×
1740
                        lrpName := fmt.Sprintf("%s-%s", c.config.ClusterRouter, subnet.Name)
×
1741
                        klog.Infof("delete logical router port %s", lrpName)
×
1742
                        if err := c.OVNNbClient.DeleteLogicalRouterPort(lrpName); err != nil {
×
1743
                                klog.Errorf("failed to delete lrp %s: %v", lrpName, err)
×
1744
                                return err
×
1745
                        }
×
1746
                }
1747

1748
                if subnet.Spec.U2OInterconnection && subnet.Status.U2OInterconnectionIP != "" {
×
1749
                        if err := c.addPolicyRouteForU2OInterconn(subnet); err != nil {
×
1750
                                klog.Errorf("failed to add policy route for underlay to overlay subnet interconnection %s %v", subnet.Name, err)
×
1751
                                return err
×
1752
                        }
×
1753
                } else {
×
1754
                        if err := c.deletePolicyRouteForU2OInterconn(subnet); err != nil {
×
1755
                                klog.Errorf("failed to delete policy route for underlay to overlay subnet interconnection %s, %v", subnet.Name, err)
×
1756
                                return err
×
1757
                        }
×
1758
                }
1759

1760
                if (!c.config.EnableLb || (subnet.Spec.EnableLb == nil || !*subnet.Spec.EnableLb)) &&
×
1761
                        subnet.Spec.U2OInterconnection && subnet.Status.U2OInterconnectionIP != "" {
×
1762
                        if err := c.addPolicyRouteForU2ONoLoadBalancer(subnet); err != nil {
×
1763
                                klog.Errorf("failed to add policy route for underlay to overlay subnet interconnection without enabling loadbalancer %s %v", subnet.Name, err)
×
1764
                                return err
×
1765
                        }
×
1766
                } else {
×
1767
                        if err := c.deletePolicyRouteForU2ONoLoadBalancer(subnet); err != nil {
×
1768
                                klog.Errorf("failed to delete policy route for underlay to overlay subnet interconnection without enabling loadbalancer %s, %v", subnet.Name, err)
×
1769
                                return err
×
1770
                        }
×
1771
                }
1772
        } else {
×
1773
                // It's difficult to update policy route when subnet cidr is changed, add check for cidr changed situation
×
1774
                if err := c.reconcilePolicyRouteForCidrChangedSubnet(subnet, true); err != nil {
×
1775
                        klog.Error(err)
×
1776
                        return err
×
1777
                }
×
1778

1779
                if err := c.addCommonRoutesForSubnet(subnet); err != nil {
×
1780
                        klog.Error(err)
×
1781
                        return err
×
1782
                }
×
1783

1784
                // distributed subnet, only add distributed policy route
1785
                if subnet.Spec.GatewayType == kubeovnv1.GWDistributedType {
×
1786
                        if err := c.reconcileDistributedSubnetRouteInDefaultVpc(subnet); err != nil {
×
1787
                                klog.Error(err)
×
1788
                                return err
×
1789
                        }
×
1790
                } else {
×
1791
                        // centralized subnet
×
1792
                        if subnet.Spec.GatewayNode == "" && len(subnet.Spec.GatewayNodeSelectors) == 0 {
×
1793
                                subnet.Status.NotReady("NoReadyGateway", "")
×
1794
                                if err := c.patchSubnetStatus(subnet, "NoReadyGateway", ""); err != nil {
×
1795
                                        klog.Error(err)
×
1796
                                        return err
×
1797
                                }
×
1798
                                err := fmt.Errorf("subnet %s Spec.GatewayNode or Spec.GatewayNodeSelectors must be specified for centralized gateway type", subnet.Name)
×
1799
                                klog.Error(err)
×
1800
                                return err
×
1801
                        }
1802

1803
                        gwNodeExists := c.checkSubnetGwNodesExist(subnet)
×
1804
                        if !gwNodeExists {
×
1805
                                klog.Errorf("failed to init centralized gateway for subnet %s, no gateway node exists", subnet.Name)
×
1806
                                return errors.New("failed to add ecmp policy route, no gateway node exists")
×
1807
                        }
×
1808

1809
                        if err := c.reconcilePolicyRouteForCidrChangedSubnet(subnet, false); err != nil {
×
1810
                                klog.Error(err)
×
1811
                                return err
×
1812
                        }
×
1813

1814
                        if subnet.Spec.EnableEcmp {
×
1815
                                if err := c.reconcileEcmpCentralizedSubnetRouteInDefaultVpc(subnet); err != nil {
×
1816
                                        klog.Error(err)
×
1817
                                        return err
×
1818
                                }
×
1819
                        } else {
×
1820
                                if err := c.reconcileDefaultCentralizedSubnetRouteInDefaultVpc(subnet); err != nil {
×
1821
                                        klog.Error(err)
×
1822
                                        return err
×
1823
                                }
×
1824
                        }
1825
                }
1826
        }
1827
        return nil
×
1828
}
1829

1830
func (c *Controller) reconcileCustomVpcStaticRoute(subnet *kubeovnv1.Subnet) error {
×
1831
        // in custom vpc, subnet gw type is unmeaning
×
1832
        // 1. vpc out to public network through vpc nat gw pod, the static route is auto managed by admin user
×
1833
        // 2. vpc out to public network through ovn nat lrp, whose nexthop rely on bfd ecmp, the vpc spec bfd static route is auto managed here
×
1834
        // 3. vpc out to public network through ovn nat lrp, without bfd ecmp, the vpc spec static route is auto managed here
×
1835

×
1836
        vpc, err := c.vpcsLister.Get(subnet.Spec.Vpc)
×
1837
        if err != nil {
×
1838
                if k8serrors.IsNotFound(err) {
×
1839
                        return nil
×
1840
                }
×
1841
                klog.Errorf("failed to get vpc %s, %v", subnet.Spec.Vpc, err)
×
1842
                return err
×
1843
        }
1844

1845
        if vpc.Spec.EnableExternal && vpc.Spec.EnableBfd && subnet.Spec.EnableEcmp {
×
1846
                klog.Infof("add bfd and external static ecmp route for vpc %s, subnet %s", vpc.Name, subnet.Name)
×
1847
                // handle vpc static route
×
1848
                // use static ecmp route with bfd
×
1849
                // bfd ecmp static route depend on subnet cidr
×
1850
                if err := c.reconcileCustomVpcBfdStaticRoute(vpc.Name, subnet.Name); err != nil {
×
1851
                        klog.Errorf("failed to reconcile vpc %q bfd static route", vpc.Name)
×
1852
                        return err
×
1853
                }
×
1854
        }
1855

1856
        if subnet.Spec.Vlan == "" || subnet.Spec.LogicalGateway || subnet.Spec.U2OInterconnection {
×
1857
                if err = c.addCustomVPCStaticRouteForSubnet(subnet); err != nil {
×
1858
                        klog.Errorf("failed to add static route for underlay to overlay subnet interconnection %s %v", subnet.Name, err)
×
1859
                        return err
×
1860
                }
×
1861
                if err = c.addCustomVPCPolicyRoutesForSubnet(subnet); err != nil {
×
1862
                        klog.Error(err)
×
1863
                        return err
×
1864
                }
×
1865
        }
1866

1867
        if subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway && subnet.Spec.U2OInterconnection && subnet.Status.U2OInterconnectionIP != "" {
×
1868
                if err := c.addPolicyRouteForU2OInterconn(subnet); err != nil {
×
1869
                        klog.Errorf("failed to add policy route for underlay to overlay subnet interconnection %s %v", subnet.Name, err)
×
1870
                        return err
×
1871
                }
×
1872
        }
1873

1874
        return nil
×
1875
}
1876

1877
func (c *Controller) deleteStaticRoute(ip, router, routeTable string) error {
×
1878
        for ipStr := range strings.SplitSeq(ip, ",") {
×
1879
                if err := c.deleteStaticRouteFromVpc(
×
1880
                        router,
×
1881
                        routeTable,
×
1882
                        ipStr,
×
1883
                        "",
×
1884
                        kubeovnv1.PolicyDst,
×
1885
                ); err != nil {
×
1886
                        klog.Errorf("failed to delete static route %s, %v", ipStr, err)
×
1887
                        return err
×
1888
                }
×
1889
        }
1890

1891
        return nil
×
1892
}
1893

1894
func (c *Controller) reconcileVlan(subnet *kubeovnv1.Subnet) error {
×
1895
        if subnet.Spec.Vlan == "" {
×
1896
                return nil
×
1897
        }
×
1898
        klog.Infof("reconcile vlan %v", subnet.Spec.Vlan)
×
1899

×
1900
        vlan, err := c.vlansLister.Get(subnet.Spec.Vlan)
×
1901
        if err != nil {
×
1902
                klog.Errorf("failed to get vlan %s: %v", subnet.Spec.Vlan, err)
×
1903
                return err
×
1904
        }
×
1905
        if vlan.Status.Conflict {
×
1906
                err = fmt.Errorf("subnet %s has invalid conflict vlan %s", subnet.Name, vlan.Name)
×
1907
                klog.Error(err)
×
1908
                return err
×
1909
        }
×
1910

1911
        localnetPort := ovs.GetLocalnetName(subnet.Name)
×
1912
        if err := c.OVNNbClient.CreateLocalnetLogicalSwitchPort(subnet.Name, localnetPort, vlan.Spec.Provider, subnet.Spec.CIDRBlock, vlan.Spec.ID); err != nil {
×
1913
                klog.Errorf("create localnet port for subnet %s: %v", subnet.Name, err)
×
1914
                return err
×
1915
        }
×
1916

1917
        if !slices.Contains(vlan.Status.Subnets, subnet.Name) {
×
1918
                newVlan := vlan.DeepCopy()
×
1919
                newVlan.Status.Subnets = append(newVlan.Status.Subnets, subnet.Name)
×
1920
                _, err = c.config.KubeOvnClient.KubeovnV1().Vlans().UpdateStatus(context.Background(), newVlan, metav1.UpdateOptions{})
×
1921
                if err != nil {
×
1922
                        klog.Errorf("failed to update status of vlan %s: %v", vlan.Name, err)
×
1923
                        return err
×
1924
                }
×
1925
        }
1926

1927
        return nil
×
1928
}
1929

1930
func (c *Controller) reconcileSubnetSpecialIPs(subnet *kubeovnv1.Subnet) (bool, bool, error) {
×
1931
        isU2OIPChanged := false
×
1932
        isMcastQuerierIPChanged := false
×
1933
        var err error
×
1934

×
1935
        // reconcile u2o IP
×
1936
        if subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway {
×
1937
                u2oInterconnName := fmt.Sprintf(util.U2OInterconnName, subnet.Spec.Vpc, subnet.Name)
×
1938
                u2oInterconnLrpName := fmt.Sprintf("%s-%s", subnet.Spec.Vpc, subnet.Name)
×
1939
                var v4ip, v6ip string
×
1940
                if subnet.Spec.U2OInterconnection {
×
1941
                        v4ip, v6ip, _, err = c.acquireU2OIP(subnet, u2oInterconnName, u2oInterconnLrpName)
×
1942
                        if err != nil {
×
1943
                                return isU2OIPChanged, isMcastQuerierIPChanged, err
×
1944
                        }
×
1945

1946
                        if v4ip != "" || v6ip != "" {
×
1947
                                isU2OIPChanged = true
×
1948
                        }
×
1949
                } else if subnet.Status.U2OInterconnectionIP != "" {
×
1950
                        err = c.releaseU2OIP(subnet, u2oInterconnName)
×
1951
                        if err != nil {
×
1952
                                return isU2OIPChanged, isMcastQuerierIPChanged, err
×
1953
                        }
×
1954
                        isU2OIPChanged = true
×
1955
                }
1956

1957
                if isU2OIPChanged {
×
1958
                        klog.Infof("reconcile underlay subnet %s to overlay interconnection with U2OInterconnection %v U2OInterconnectionIP %s",
×
1959
                                subnet.Name, subnet.Spec.U2OInterconnection, subnet.Status.U2OInterconnectionIP)
×
1960
                }
×
1961
        }
1962

1963
        // reconcile mcast querier IP
1964
        if subnet.Spec.EnableMulticastSnoop {
×
1965
                isMcastQuerierIPChanged, err = c.acquireMcastQuerierIP(subnet)
×
1966
                if err != nil {
×
1967
                        return isU2OIPChanged, isMcastQuerierIPChanged, err
×
1968
                }
×
1969
        } else {
×
1970
                isMcastQuerierIPChanged, err = c.releaseMcastQuerierIP(subnet)
×
1971
                if err != nil {
×
1972
                        return isU2OIPChanged, isMcastQuerierIPChanged, err
×
1973
                }
×
1974
        }
1975

1976
        // caculate subnet status
1977
        if isU2OIPChanged || isMcastQuerierIPChanged {
×
1978
                if subnet.Spec.Protocol == kubeovnv1.ProtocolDual {
×
1979
                        if _, err := c.calcDualSubnetStatusIP(subnet); err != nil {
×
1980
                                klog.Error(err)
×
1981
                                return isU2OIPChanged, isMcastQuerierIPChanged, err
×
1982
                        }
×
1983
                } else {
×
1984
                        if _, err := c.calcSubnetStatusIP(subnet); err != nil {
×
1985
                                klog.Error(err)
×
1986
                                return isU2OIPChanged, isMcastQuerierIPChanged, err
×
1987
                        }
×
1988
                }
1989
        }
1990

1991
        return isU2OIPChanged, isMcastQuerierIPChanged, nil
×
1992
}
1993

1994
func (c *Controller) acquireU2OIP(subnet *kubeovnv1.Subnet, u2oInterconnName, u2oInterconnLrpName string) (string, string, string, error) {
×
1995
        var v4ip, v6ip, mac string
×
1996
        var err error
×
1997
        if subnet.Spec.U2OInterconnectionIP == "" && (subnet.Status.U2OInterconnectionIP == "" || subnet.Status.U2OInterconnectionMAC == "") {
×
1998
                v4ip, v6ip, mac, err = c.acquireIPAddress(subnet.Name, u2oInterconnName, u2oInterconnLrpName)
×
1999
                if err != nil {
×
2000
                        klog.Errorf("failed to acquire underlay to overlay interconnection ip address for subnet %s, %v", subnet.Name, err)
×
2001
                        return "", "", "", err
×
2002
                }
×
2003
        } else if subnet.Spec.U2OInterconnectionIP != "" && subnet.Status.U2OInterconnectionIP != subnet.Spec.U2OInterconnectionIP {
×
2004
                if subnet.Status.U2OInterconnectionIP != "" {
×
2005
                        klog.Infof("release underlay to overlay interconnection ip address %s for subnet %s", subnet.Status.U2OInterconnectionIP, subnet.Name)
×
2006
                        c.ipam.ReleaseAddressByPod(u2oInterconnName, subnet.Name)
×
2007
                }
×
2008
                v4ip, v6ip, mac, err = c.acquireStaticIPAddress(subnet.Name, u2oInterconnName, u2oInterconnLrpName, subnet.Spec.U2OInterconnectionIP, nil)
×
2009
                if err != nil {
×
2010
                        klog.Errorf("failed to acquire static underlay to overlay interconnection ip address for subnet %s, %v", subnet.Name, err)
×
2011
                        return "", "", "", err
×
2012
                }
×
2013
        }
2014
        if v4ip != "" || v6ip != "" {
×
2015
                switch subnet.Spec.Protocol {
×
2016
                case kubeovnv1.ProtocolIPv4:
×
2017
                        subnet.Status.U2OInterconnectionIP = v4ip
×
2018
                case kubeovnv1.ProtocolIPv6:
×
2019
                        subnet.Status.U2OInterconnectionIP = v6ip
×
2020
                case kubeovnv1.ProtocolDual:
×
2021
                        subnet.Status.U2OInterconnectionIP = fmt.Sprintf("%s,%s", v4ip, v6ip)
×
2022
                }
2023
                err = c.createOrUpdateIPCR("", u2oInterconnName, subnet.Status.U2OInterconnectionIP, mac, subnet.Name, "default", "", "")
×
2024
                if err != nil {
×
2025
                        klog.Errorf("failed to create or update IPs of %s : %v", u2oInterconnLrpName, err)
×
2026
                        return "", "", "", err
×
2027
                }
×
2028
                subnet.Status.U2OInterconnectionMAC = mac
×
2029
        }
2030
        return v4ip, v6ip, mac, nil
×
2031
}
2032

2033
func (c *Controller) releaseU2OIP(subnet *kubeovnv1.Subnet, u2oInterconnName string) error {
×
2034
        klog.Infof("release underlay to overlay interconnection ip address %s for subnet %s", subnet.Status.U2OInterconnectionIP, subnet.Name)
×
2035
        c.ipam.ReleaseAddressByPod(u2oInterconnName, subnet.Name)
×
2036
        subnet.Status.U2OInterconnectionIP = ""
×
2037
        subnet.Status.U2OInterconnectionMAC = ""
×
2038
        subnet.Status.U2OInterconnectionVPC = ""
×
2039

×
2040
        err := c.config.KubeOvnClient.KubeovnV1().IPs().Delete(context.Background(), u2oInterconnName, metav1.DeleteOptions{})
×
2041
        if err != nil && !k8serrors.IsNotFound(err) {
×
2042
                klog.Errorf("failed to delete ip %s, %v", u2oInterconnName, err)
×
2043
                return err
×
2044
        }
×
2045

2046
        return nil
×
2047
}
2048

2049
func (c *Controller) acquireMcastQuerierIP(subnet *kubeovnv1.Subnet) (bool, error) {
×
2050
        isMcastQuerierChanged := false
×
2051
        mcastQuerierLspName := fmt.Sprintf(util.McastQuerierName, subnet.Name)
×
2052
        var v4ip, v6ip, mac string
×
2053
        var err error
×
2054

×
2055
        if subnet.Status.McastQuerierIP == "" || subnet.Status.McastQuerierMAC == "" {
×
2056
                v4ip, v6ip, mac, err = c.acquireIPAddress(subnet.Name, mcastQuerierLspName, mcastQuerierLspName)
×
2057
                if err != nil {
×
2058
                        klog.Errorf("failed to acquire mcast querier ip address for subnet %s, %v", subnet.Name, err)
×
2059
                        return isMcastQuerierChanged, err
×
2060
                }
×
2061
        }
2062

2063
        if v4ip != "" || v6ip != "" {
×
2064
                switch subnet.Spec.Protocol {
×
2065
                case kubeovnv1.ProtocolIPv4:
×
2066
                        subnet.Status.McastQuerierIP = v4ip
×
2067
                case kubeovnv1.ProtocolIPv6:
×
2068
                        subnet.Status.McastQuerierIP = v6ip
×
2069
                case kubeovnv1.ProtocolDual:
×
2070
                        subnet.Status.McastQuerierIP = fmt.Sprintf("%s,%s", v4ip, v6ip)
×
2071
                }
2072

2073
                err := c.createOrUpdateIPCR("", mcastQuerierLspName, subnet.Status.McastQuerierIP, mac, subnet.Name, "default", "", "")
×
2074
                if err != nil {
×
2075
                        klog.Errorf("failed to create or update IPs of %s : %v", mcastQuerierLspName, err)
×
2076
                        return isMcastQuerierChanged, err
×
2077
                }
×
2078

2079
                subnet.Status.McastQuerierMAC = mac
×
2080
                klog.Infof("reconcile subnet %s mcast querier IP %s mac %s",
×
2081
                        subnet.Name, subnet.Status.McastQuerierIP, subnet.Status.McastQuerierMAC)
×
2082
                isMcastQuerierChanged = true
×
2083
        }
2084

2085
        return isMcastQuerierChanged, nil
×
2086
}
2087

2088
func (c *Controller) releaseMcastQuerierIP(subnet *kubeovnv1.Subnet) (bool, error) {
×
2089
        isMcastQuerierChanged := false
×
2090
        if subnet.Status.McastQuerierIP != "" {
×
2091
                mcastQuerierLspName := fmt.Sprintf(util.McastQuerierName, subnet.Name)
×
2092
                klog.Infof("release mcast querier ip address %s for subnet %s", subnet.Status.McastQuerierIP, subnet.Name)
×
2093
                c.ipam.ReleaseAddressByPod(mcastQuerierLspName, subnet.Name)
×
2094
                subnet.Status.McastQuerierIP = ""
×
2095
                subnet.Status.McastQuerierMAC = ""
×
2096

×
2097
                if err := c.config.KubeOvnClient.KubeovnV1().IPs().Delete(context.Background(), mcastQuerierLspName, metav1.DeleteOptions{}); err != nil {
×
2098
                        if !k8serrors.IsNotFound(err) {
×
2099
                                klog.Errorf("failed to delete ip %s, %v", mcastQuerierLspName, err)
×
2100
                                return isMcastQuerierChanged, err
×
2101
                        }
×
2102
                }
2103
                isMcastQuerierChanged = true
×
2104
                klog.Infof("reconcile subnet %s mcast querier IP %s mac %s",
×
2105
                        subnet.Name, subnet.Status.McastQuerierIP, subnet.Status.McastQuerierMAC)
×
2106
        }
2107
        return isMcastQuerierChanged, nil
×
2108
}
2109

2110
func (c *Controller) calcDualSubnetStatusIP(subnet *kubeovnv1.Subnet) (*kubeovnv1.Subnet, error) {
×
2111
        if err := util.CheckCidrs(subnet.Spec.CIDRBlock); err != nil {
×
2112
                return nil, err
×
2113
        }
×
2114
        // Get the number of pods, not ips. For one pod with two ip(v4 & v6) in dual-stack, num of Items is 1
2115
        podUsedIPs, err := c.ipsLister.List(labels.SelectorFromSet(labels.Set{subnet.Name: ""}))
×
2116
        if err != nil {
×
2117
                klog.Error(err)
×
2118
                return nil, err
×
2119
        }
×
2120
        var lenIP, lenVip, lenIptablesEip, lenOvnEip int
×
2121
        lenIP = len(podUsedIPs)
×
2122
        usingIPNums := lenIP
×
2123

×
2124
        // TODO:// replace ExcludeIps with ip pool and gw to avoid later loop
×
2125
        noGWExcludeIPs := []string{}
×
2126
        v4gw, v6gw := util.SplitStringIP(subnet.Spec.Gateway)
×
2127
        for _, excludeIP := range subnet.Spec.ExcludeIps {
×
2128
                if v4gw == excludeIP || v6gw == excludeIP {
×
2129
                        // no need to compare gateway ip with pod ip
×
2130
                        continue
×
2131
                }
2132
                noGWExcludeIPs = append(noGWExcludeIPs, excludeIP)
×
2133
        }
2134
        if noGWExcludeIPs != nil {
×
2135
                for _, podUsedIP := range podUsedIPs {
×
2136
                        for _, excludeIP := range noGWExcludeIPs {
×
2137
                                if util.ContainsIPs(excludeIP, podUsedIP.Spec.V4IPAddress) || util.ContainsIPs(excludeIP, podUsedIP.Spec.V6IPAddress) {
×
2138
                                        // This ip cr is allocated from subnet.spec.excludeIPs, do not count it as usingIPNums
×
2139
                                        usingIPNums--
×
2140
                                        break
×
2141
                                }
2142
                        }
2143
                }
2144
        }
2145

2146
        // subnet.Spec.ExcludeIps contains both v4 and v6 addresses
2147
        v4ExcludeIPs, v6ExcludeIPs := util.SplitIpsByProtocol(subnet.Spec.ExcludeIps)
×
2148
        // gateway always in excludeIPs
×
2149
        cidrBlocks := strings.Split(subnet.Spec.CIDRBlock, ",")
×
2150
        v4toSubIPs := util.ExpandExcludeIPs(v4ExcludeIPs, cidrBlocks[0])
×
2151
        v6toSubIPs := util.ExpandExcludeIPs(v6ExcludeIPs, cidrBlocks[1])
×
2152
        _, v4CIDR, _ := net.ParseCIDR(cidrBlocks[0])
×
2153
        _, v6CIDR, _ := net.ParseCIDR(cidrBlocks[1])
×
2154
        v4availableIPs := util.AddressCount(v4CIDR) - util.CountIPNums(v4toSubIPs)
×
2155
        v6availableIPs := util.AddressCount(v6CIDR) - util.CountIPNums(v6toSubIPs)
×
2156

×
2157
        usingIPs := float64(usingIPNums)
×
2158

×
2159
        vips, err := c.virtualIpsLister.List(labels.SelectorFromSet(labels.Set{
×
2160
                util.SubnetNameLabel: subnet.Name,
×
2161
                util.IPReservedLabel: "",
×
2162
        }))
×
2163
        if err != nil {
×
2164
                klog.Error(err)
×
2165
                return nil, err
×
2166
        }
×
2167
        lenVip = len(vips)
×
2168
        usingIPs += float64(lenVip)
×
2169

×
2170
        if !isOvnSubnet(subnet) {
×
2171
                eips, err := c.iptablesEipsLister.List(
×
2172
                        labels.SelectorFromSet(labels.Set{util.SubnetNameLabel: subnet.Name}))
×
2173
                if err != nil {
×
2174
                        klog.Error(err)
×
2175
                        return nil, err
×
2176
                }
×
2177
                lenIptablesEip = len(eips)
×
2178
                usingIPs += float64(lenIptablesEip)
×
2179
        }
2180
        if subnet.Spec.Vlan != "" {
×
2181
                ovnEips, err := c.ovnEipsLister.List(labels.SelectorFromSet(labels.Set{
×
2182
                        util.SubnetNameLabel: subnet.Name,
×
2183
                }))
×
2184
                if err != nil {
×
2185
                        klog.Error(err)
×
2186
                        return nil, err
×
2187
                }
×
2188
                lenOvnEip = len(ovnEips)
×
2189
                usingIPs += float64(lenOvnEip)
×
2190
        }
2191

2192
        v4availableIPs -= usingIPs
×
2193
        if v4availableIPs < 0 {
×
2194
                v4availableIPs = 0
×
2195
        }
×
2196
        v6availableIPs -= usingIPs
×
2197
        if v6availableIPs < 0 {
×
2198
                v6availableIPs = 0
×
2199
        }
×
2200

2201
        v4UsingIPStr, v6UsingIPStr, v4AvailableIPStr, v6AvailableIPStr := c.ipam.GetSubnetIPRangeString(subnet.Name, subnet.Spec.ExcludeIps)
×
2202

×
2203
        if subnet.Status.V4AvailableIPs == v4availableIPs &&
×
2204
                subnet.Status.V6AvailableIPs == v6availableIPs &&
×
2205
                subnet.Status.V4UsingIPs == usingIPs &&
×
2206
                subnet.Status.V6UsingIPs == usingIPs &&
×
2207
                subnet.Status.V4UsingIPRange == v4UsingIPStr &&
×
2208
                subnet.Status.V6UsingIPRange == v6UsingIPStr &&
×
2209
                subnet.Status.V4AvailableIPRange == v4AvailableIPStr &&
×
2210
                subnet.Status.V6AvailableIPRange == v6AvailableIPStr {
×
2211
                return subnet, nil
×
2212
        }
×
2213

2214
        subnet.Status.V4AvailableIPs = v4availableIPs
×
2215
        subnet.Status.V6AvailableIPs = v6availableIPs
×
2216
        subnet.Status.V4UsingIPs = usingIPs
×
2217
        subnet.Status.V6UsingIPs = usingIPs
×
2218
        subnet.Status.V4UsingIPRange = v4UsingIPStr
×
2219
        subnet.Status.V6UsingIPRange = v6UsingIPStr
×
2220
        subnet.Status.V4AvailableIPRange = v4AvailableIPStr
×
2221
        subnet.Status.V6AvailableIPRange = v6AvailableIPStr
×
2222
        bytes, err := subnet.Status.Bytes()
×
2223
        if err != nil {
×
2224
                klog.Error(err)
×
2225
                return nil, err
×
2226
        }
×
2227
        newSubnet, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Patch(context.Background(), subnet.Name, types.MergePatchType, bytes, metav1.PatchOptions{}, "status")
×
2228
        return newSubnet, err
×
2229
}
2230

2231
func (c *Controller) calcSubnetStatusIP(subnet *kubeovnv1.Subnet) (*kubeovnv1.Subnet, error) {
×
2232
        _, cidr, err := net.ParseCIDR(subnet.Spec.CIDRBlock)
×
2233
        if err != nil {
×
2234
                klog.Error(err)
×
2235
                return nil, err
×
2236
        }
×
2237
        var lenIP, lenVip, lenIptablesEip, lenOvnEip int
×
2238
        podUsedIPs, err := c.ipsLister.List(labels.SelectorFromSet(labels.Set{subnet.Name: ""}))
×
2239
        if err != nil {
×
2240
                klog.Error(err)
×
2241
                return nil, err
×
2242
        }
×
2243
        lenIP = len(podUsedIPs)
×
2244
        usingIPNums := lenIP
×
2245

×
2246
        // TODO:// replace ExcludeIps with ip pool and gw to avoid later loop
×
2247
        noGWExcludeIPs := []string{}
×
2248
        v4gw, v6gw := util.SplitStringIP(subnet.Spec.Gateway)
×
2249
        for _, excludeIP := range subnet.Spec.ExcludeIps {
×
2250
                if v4gw == excludeIP || v6gw == excludeIP {
×
2251
                        // no need to compare gateway ip with pod ip
×
2252
                        continue
×
2253
                }
2254
                noGWExcludeIPs = append(noGWExcludeIPs, excludeIP)
×
2255
        }
2256
        if noGWExcludeIPs != nil {
×
2257
                for _, podUsedIP := range podUsedIPs {
×
2258
                        for _, excludeIP := range noGWExcludeIPs {
×
2259
                                if util.ContainsIPs(excludeIP, podUsedIP.Spec.V4IPAddress) || util.ContainsIPs(excludeIP, podUsedIP.Spec.V6IPAddress) {
×
2260
                                        // This ip cr is allocated from subnet.spec.excludeIPs, do not count it as usingIPNums
×
2261
                                        usingIPNums--
×
2262
                                        break
×
2263
                                }
2264
                        }
2265
                }
2266
        }
2267

2268
        // gateway always in excludeIPs
2269
        toSubIPs := util.ExpandExcludeIPs(subnet.Spec.ExcludeIps, subnet.Spec.CIDRBlock)
×
2270
        availableIPs := util.AddressCount(cidr) - util.CountIPNums(toSubIPs)
×
2271
        usingIPs := float64(usingIPNums)
×
2272
        vips, err := c.virtualIpsLister.List(labels.SelectorFromSet(labels.Set{
×
2273
                util.SubnetNameLabel: subnet.Name,
×
2274
                util.IPReservedLabel: "",
×
2275
        }))
×
2276
        if err != nil {
×
2277
                klog.Error(err)
×
2278
                return nil, err
×
2279
        }
×
2280
        lenVip = len(vips)
×
2281
        usingIPs += float64(lenVip)
×
2282
        if !isOvnSubnet(subnet) {
×
2283
                eips, err := c.iptablesEipsLister.List(
×
2284
                        labels.SelectorFromSet(labels.Set{util.SubnetNameLabel: subnet.Name}))
×
2285
                if err != nil {
×
2286
                        klog.Error(err)
×
2287
                        return nil, err
×
2288
                }
×
2289
                lenIptablesEip = len(eips)
×
2290
                usingIPs += float64(lenIptablesEip)
×
2291
        }
2292
        if subnet.Spec.Vlan != "" {
×
2293
                ovnEips, err := c.ovnEipsLister.List(labels.SelectorFromSet(labels.Set{
×
2294
                        util.SubnetNameLabel: subnet.Name,
×
2295
                }))
×
2296
                if err != nil {
×
2297
                        klog.Error(err)
×
2298
                        return nil, err
×
2299
                }
×
2300
                lenOvnEip = len(ovnEips)
×
2301
                usingIPs += float64(lenOvnEip)
×
2302
        }
2303

2304
        availableIPs -= usingIPs
×
2305
        if availableIPs < 0 {
×
2306
                availableIPs = 0
×
2307
        }
×
2308

2309
        v4UsingIPStr, v6UsingIPStr, v4AvailableIPStr, v6AvailableIPStr := c.ipam.GetSubnetIPRangeString(subnet.Name, subnet.Spec.ExcludeIps)
×
2310
        cachedFloatFields := [4]float64{
×
2311
                subnet.Status.V4AvailableIPs,
×
2312
                subnet.Status.V4UsingIPs,
×
2313
                subnet.Status.V6AvailableIPs,
×
2314
                subnet.Status.V6UsingIPs,
×
2315
        }
×
2316
        cachedStringFields := [4]string{
×
2317
                subnet.Status.V4UsingIPRange,
×
2318
                subnet.Status.V4AvailableIPRange,
×
2319
                subnet.Status.V6UsingIPRange,
×
2320
                subnet.Status.V6AvailableIPRange,
×
2321
        }
×
2322

×
2323
        if subnet.Spec.Protocol == kubeovnv1.ProtocolIPv4 {
×
2324
                subnet.Status.V4AvailableIPs = availableIPs
×
2325
                subnet.Status.V4UsingIPs = usingIPs
×
2326
                subnet.Status.V4UsingIPRange = v4UsingIPStr
×
2327
                subnet.Status.V4AvailableIPRange = v4AvailableIPStr
×
2328
                subnet.Status.V6AvailableIPs = 0
×
2329
                subnet.Status.V6UsingIPs = 0
×
2330
        } else {
×
2331
                subnet.Status.V6AvailableIPs = availableIPs
×
2332
                subnet.Status.V6UsingIPs = usingIPs
×
2333
                subnet.Status.V6UsingIPRange = v6UsingIPStr
×
2334
                subnet.Status.V6AvailableIPRange = v6AvailableIPStr
×
2335
                subnet.Status.V4AvailableIPs = 0
×
2336
                subnet.Status.V4UsingIPs = 0
×
2337
        }
×
2338
        if cachedFloatFields == [4]float64{
×
2339
                subnet.Status.V4AvailableIPs,
×
2340
                subnet.Status.V4UsingIPs,
×
2341
                subnet.Status.V6AvailableIPs,
×
2342
                subnet.Status.V6UsingIPs,
×
2343
        } && cachedStringFields == [4]string{
×
2344
                subnet.Status.V4UsingIPRange,
×
2345
                subnet.Status.V4AvailableIPRange,
×
2346
                subnet.Status.V6UsingIPRange,
×
2347
                subnet.Status.V6AvailableIPRange,
×
2348
        } {
×
2349
                return subnet, nil
×
2350
        }
×
2351

2352
        bytes, err := subnet.Status.Bytes()
×
2353
        if err != nil {
×
2354
                klog.Error(err)
×
2355
                return nil, err
×
2356
        }
×
2357
        newSubnet, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Patch(context.Background(), subnet.Name, types.MergePatchType, bytes, metav1.PatchOptions{}, "status")
×
2358
        return newSubnet, err
×
2359
}
2360

2361
func (c *Controller) checkSubnetUsingIPs(subnet *kubeovnv1.Subnet) error {
×
2362
        if subnet.Status.V4UsingIPs != 0 && subnet.Status.V4UsingIPRange == "" {
×
2363
                err := fmt.Errorf("subnet %s has %.0f v4 ip in use, while the v4 using ip range is empty", subnet.Name, subnet.Status.V4UsingIPs)
×
2364
                klog.Error(err)
×
2365
                return err
×
2366
        }
×
2367
        if subnet.Status.V6UsingIPs != 0 && subnet.Status.V6UsingIPRange == "" {
×
2368
                err := fmt.Errorf("subnet %s has %.0f v6 ip in use, while the v6 using ip range is empty", subnet.Name, subnet.Status.V6UsingIPs)
×
2369
                klog.Error(err)
×
2370
                return err
×
2371
        }
×
2372
        return nil
×
2373
}
2374

2375
func isOvnSubnet(subnet *kubeovnv1.Subnet) bool {
1✔
2376
        return util.IsOvnProvider(subnet.Spec.Provider)
1✔
2377
}
1✔
2378

2379
func checkAndFormatsExcludeIPs(subnet *kubeovnv1.Subnet) bool {
1✔
2380
        var excludeIPs []string
1✔
2381
        mapIPs := make(map[string]*ipam.IPRange, len(subnet.Spec.ExcludeIps))
1✔
2382
        for _, excludeIP := range subnet.Spec.ExcludeIps {
2✔
2383
                if _, ok := mapIPs[excludeIP]; !ok {
2✔
2384
                        ips := strings.Split(excludeIP, "..")
1✔
2385
                        start, _ := ipam.NewIP(ips[0])
1✔
2386
                        end := start
1✔
2387
                        if len(ips) != 1 {
1✔
2388
                                end, _ = ipam.NewIP(ips[1])
×
2389
                        }
×
2390
                        mapIPs[excludeIP] = ipam.NewIPRange(start, end)
1✔
2391
                }
2392
        }
2393
        newMap := filterRepeatIPRange(mapIPs)
1✔
2394
        for _, v := range newMap {
2✔
2395
                if v.Start().Equal(v.End()) {
2✔
2396
                        excludeIPs = append(excludeIPs, v.Start().String())
1✔
2397
                } else {
1✔
2398
                        excludeIPs = append(excludeIPs, v.Start().String()+".."+v.End().String())
×
2399
                }
×
2400
        }
2401
        sort.Strings(excludeIPs)
1✔
2402
        if !slices.Equal(subnet.Spec.ExcludeIps, excludeIPs) {
1✔
2403
                klog.V(3).Infof("excludeips before format is %v, after format is %v", subnet.Spec.ExcludeIps, excludeIPs)
×
2404
                subnet.Spec.ExcludeIps = excludeIPs
×
2405
                return true
×
2406
        }
×
2407
        return false
1✔
2408
}
2409

2410
func filterRepeatIPRange(mapIPs map[string]*ipam.IPRange) map[string]*ipam.IPRange {
1✔
2411
        for ka, a := range mapIPs {
2✔
2412
                for kb, b := range mapIPs {
2✔
2413
                        if ka == kb && a == b {
2✔
2414
                                continue
1✔
2415
                        }
2416

2417
                        if b.End().LessThan(a.Start()) || b.Start().GreaterThan(a.End()) {
2✔
2418
                                continue
1✔
2419
                        }
2420

2421
                        if (a.Start().Equal(b.Start()) || a.Start().GreaterThan(b.Start())) &&
×
2422
                                (a.End().Equal(b.End()) || a.End().LessThan(b.End())) {
×
2423
                                delete(mapIPs, ka)
×
2424
                                continue
×
2425
                        }
2426

2427
                        if (a.Start().Equal(b.Start()) || a.Start().GreaterThan(b.Start())) &&
×
2428
                                a.End().GreaterThan(b.End()) {
×
2429
                                delete(mapIPs, ka)
×
2430
                                mapIPs[kb] = ipam.NewIPRange(b.Start(), a.End())
×
2431
                                continue
×
2432
                        }
2433

2434
                        if (a.End().Equal(b.End()) || a.End().LessThan(b.End())) &&
×
2435
                                a.Start().LessThan(b.Start()) {
×
2436
                                delete(mapIPs, ka)
×
2437
                                mapIPs[kb] = ipam.NewIPRange(a.Start(), b.End())
×
2438
                                continue
×
2439
                        }
2440

2441
                        // a contains b
2442
                        mapIPs[kb] = a
×
2443
                        delete(mapIPs, ka)
×
2444
                }
2445
        }
2446
        return mapIPs
1✔
2447
}
2448

2449
func (c *Controller) checkGwNodeExists(gatewayNode string) bool {
×
2450
        found := false
×
2451
        for gwName := range strings.SplitSeq(gatewayNode, ",") {
×
2452
                // the format of gatewayNode can be like 'kube-ovn-worker:172.18.0.2, kube-ovn-control-plane:172.18.0.3', which consists of node name and designative egress ip
×
2453
                if strings.Contains(gwName, ":") {
×
2454
                        gwName = strings.TrimSpace(strings.Split(gwName, ":")[0])
×
2455
                } else {
×
2456
                        gwName = strings.TrimSpace(gwName)
×
2457
                }
×
2458

2459
                gwNode, err := c.nodesLister.Get(gwName)
×
2460
                if err != nil {
×
2461
                        if k8serrors.IsNotFound(err) {
×
2462
                                klog.Errorf("gw node %s does not exist, %v", gwName, err)
×
2463
                                continue
×
2464
                        }
2465
                }
2466
                if gwNode != nil {
×
2467
                        found = true
×
2468
                        break
×
2469
                }
2470
        }
2471
        return found
×
2472
}
2473

2474
func (c *Controller) getGatewayNodes(subnet *kubeovnv1.Subnet) ([]string, error) {
×
2475
        if subnet.Spec.GatewayNode != "" {
×
2476
                var nodes []string
×
2477
                for gw := range strings.SplitSeq(subnet.Spec.GatewayNode, ",") {
×
2478
                        if strings.Contains(gw, ":") {
×
2479
                                gw = strings.TrimSpace(strings.Split(gw, ":")[0])
×
2480
                        } else {
×
2481
                                gw = strings.TrimSpace(gw)
×
2482
                        }
×
2483
                        if gw != "" {
×
2484
                                nodes = append(nodes, gw)
×
2485
                        }
×
2486
                }
2487
                return nodes, nil
×
2488
        }
2489

2490
        if len(subnet.Spec.GatewayNodeSelectors) > 0 {
×
2491
                return c.getNodesBySelectors(subnet.Spec.GatewayNodeSelectors)
×
2492
        }
×
2493

2494
        return nil, nil
×
2495
}
2496

2497
func (c *Controller) getNodesBySelectors(selectors []metav1.LabelSelector) ([]string, error) {
×
2498
        nodeSet := make(map[string]struct{})
×
2499
        for _, selector := range selectors {
×
2500
                labelSelector, err := metav1.LabelSelectorAsSelector(&selector)
×
2501
                if err != nil {
×
2502
                        klog.Errorf("failed to convert label selector: %v", err)
×
2503
                        continue
×
2504
                }
2505
                nodes, err := c.nodesLister.List(labelSelector)
×
2506
                if err != nil {
×
2507
                        return nil, fmt.Errorf("failed to list nodes with selector %s: %w", labelSelector.String(), err)
×
2508
                }
×
2509
                for _, node := range nodes {
×
2510
                        nodeSet[node.Name] = struct{}{}
×
2511
                }
×
2512
        }
2513

2514
        matchedNodes := make([]string, 0, len(nodeSet))
×
2515
        for name := range nodeSet {
×
2516
                matchedNodes = append(matchedNodes, name)
×
2517
        }
×
2518
        return matchedNodes, nil
×
2519
}
2520

2521
func (c *Controller) checkSubnetGwNodesExist(subnet *kubeovnv1.Subnet) bool {
×
2522
        if subnet.Spec.GatewayNode != "" {
×
2523
                return c.checkGwNodeExists(subnet.Spec.GatewayNode)
×
2524
        }
×
2525

2526
        if len(subnet.Spec.GatewayNodeSelectors) > 0 {
×
2527
                nodes, err := c.getNodesBySelectors(subnet.Spec.GatewayNodeSelectors)
×
2528
                if err != nil {
×
2529
                        klog.Errorf("failed to get nodes by selectors: %v", err)
×
2530
                        return false
×
2531
                }
×
2532
                return len(nodes) > 0
×
2533
        }
2534

2535
        return false
×
2536
}
2537

2538
func (c *Controller) addCommonRoutesForSubnet(subnet *kubeovnv1.Subnet) error {
×
2539
        for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
2540
                if cidr == "" {
×
2541
                        continue
×
2542
                }
2543

2544
                var gateway string
×
2545
                protocol := util.CheckProtocol(cidr)
×
2546
                for gw := range strings.SplitSeq(subnet.Spec.Gateway, ",") {
×
2547
                        if util.CheckProtocol(gw) == protocol {
×
2548
                                gateway = gw
×
2549
                                break
×
2550
                        }
2551
                }
2552
                if gateway == "" {
×
2553
                        return fmt.Errorf("failed to get gateway of CIDR %s", cidr)
×
2554
                }
×
2555

2556
                // policy route
2557
                af := 4
×
2558
                if protocol == kubeovnv1.ProtocolIPv6 {
×
2559
                        af = 6
×
2560
                }
×
2561

2562
                var (
×
2563
                        match       = fmt.Sprintf("ip%d.dst == %s", af, cidr)
×
2564
                        action      = kubeovnv1.PolicyRouteActionAllow
×
2565
                        externalIDs = map[string]string{"vendor": util.CniTypeName, "subnet": subnet.Name}
×
2566
                )
×
2567
                klog.Infof("add common policy route for router: %s, match %s, action %s, externalID %v", subnet.Spec.Vpc, match, action, externalIDs)
×
2568
                if err := c.addPolicyRouteToVpc(
×
2569
                        subnet.Spec.Vpc,
×
2570
                        &kubeovnv1.PolicyRoute{
×
2571
                                Priority: util.SubnetRouterPolicyPriority,
×
2572
                                Match:    match,
×
2573
                                Action:   action,
×
2574
                        },
×
2575
                        externalIDs,
×
2576
                ); err != nil {
×
2577
                        klog.Errorf("failed to add logical router policy for CIDR %s of subnet %s: %v", cidr, subnet.Name, err)
×
2578
                        return err
×
2579
                }
×
2580
        }
2581
        return nil
×
2582
}
2583

2584
func getOverlaySubnetsPortGroupName(subnetName, nodeName string) string {
×
2585
        return strings.ReplaceAll(fmt.Sprintf("%s.%s", subnetName, nodeName), "-", ".")
×
2586
}
×
2587

2588
func (c *Controller) createPortGroupForDistributedSubnet(node *v1.Node, subnet *kubeovnv1.Subnet) error {
×
2589
        if subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway {
×
2590
                return nil
×
2591
        }
×
2592
        if subnet.Spec.Vpc != c.config.ClusterRouter || subnet.Name == c.config.NodeSwitch {
×
2593
                return nil
×
2594
        }
×
2595

2596
        pgName := getOverlaySubnetsPortGroupName(subnet.Name, node.Name)
×
2597
        externalIDs := map[string]string{
×
2598
                "subnet":         subnet.Name,
×
2599
                "node":           node.Name,
×
2600
                "vendor":         util.CniTypeName,
×
2601
                networkPolicyKey: subnet.Name + "/" + node.Name,
×
2602
        }
×
2603
        if err := c.OVNNbClient.CreatePortGroup(pgName, externalIDs); err != nil {
×
2604
                klog.Errorf("create port group for subnet %s and node %s: %v", subnet.Name, node.Name, err)
×
2605
                return err
×
2606
        }
×
2607

2608
        return nil
×
2609
}
2610

2611
func (c *Controller) updatePolicyRouteForCentralizedSubnet(subnetName, cidr string, nextHops []string, nameIPMap map[string]string) error {
×
2612
        ipSuffix := "ip4"
×
2613
        if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv6 {
×
2614
                ipSuffix = "ip6"
×
2615
        }
×
2616

2617
        var (
×
2618
                match  = fmt.Sprintf("%s.src == %s", ipSuffix, cidr)
×
2619
                action = kubeovnv1.PolicyRouteActionReroute
×
2620
                // there's no way to update policy route when gatewayNode changed for subnet, so delete and readd policy route
×
2621
                // The delete operation is processed in AddPolicyRoute if the policy route is inconsistent, so no need delete here
×
2622
                externalIDs = map[string]string{
×
2623
                        "vendor": util.CniTypeName,
×
2624
                        "subnet": subnetName,
×
2625
                }
×
2626
        )
×
2627
        // It's difficult to delete policy route when delete node,
×
2628
        // add map nodeName:nodeIP to external_ids to help process when delete node
×
2629
        maps.Copy(externalIDs, nameIPMap)
×
2630
        klog.Infof("add policy route for router: %s, match %s, action %s, nexthops %v, externalID %s", c.config.ClusterRouter, match, action, nextHops, externalIDs)
×
2631
        if err := c.addPolicyRouteToVpc(
×
2632
                c.config.ClusterRouter,
×
2633
                &kubeovnv1.PolicyRoute{
×
2634
                        Priority:  util.GatewayRouterPolicyPriority,
×
2635
                        Match:     match,
×
2636
                        Action:    action,
×
2637
                        NextHopIP: strings.Join(nextHops, ","),
×
2638
                },
×
2639
                externalIDs,
×
2640
        ); err != nil {
×
2641
                klog.Errorf("failed to add policy route for centralized subnet %s: %v", subnetName, err)
×
2642
                return err
×
2643
        }
×
2644
        return nil
×
2645
}
2646

2647
func (c *Controller) addPolicyRouteForCentralizedSubnet(subnet *kubeovnv1.Subnet, nodeName string, ipNameMap map[string]string, nodeIPs []string) error {
×
2648
        for _, nodeIP := range nodeIPs {
×
2649
                // node v4ip v6ip
×
2650
                for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
2651
                        if util.CheckProtocol(cidrBlock) != util.CheckProtocol(nodeIP) {
×
2652
                                continue
×
2653
                        }
2654
                        // Check for repeat policy route is processed in AddPolicyRoute
2655

2656
                        var nextHops []string
×
2657
                        nameIPMap := map[string]string{}
×
2658
                        nextHops = append(nextHops, nodeIP)
×
2659
                        tmpName := nodeName
×
2660
                        if nodeName == "" {
×
2661
                                tmpName = ipNameMap[nodeIP]
×
2662
                        }
×
2663
                        nameIPMap[tmpName] = nodeIP
×
2664
                        if err := c.updatePolicyRouteForCentralizedSubnet(subnet.Name, cidrBlock, nextHops, nameIPMap); err != nil {
×
2665
                                klog.Error(err)
×
2666
                                return err
×
2667
                        }
×
2668
                }
2669
        }
2670
        return nil
×
2671
}
2672

2673
func (c *Controller) deletePolicyRouteForCentralizedSubnet(subnet *kubeovnv1.Subnet) error {
×
2674
        for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
2675
                ipSuffix := "ip4"
×
2676
                if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv6 {
×
2677
                        ipSuffix = "ip6"
×
2678
                }
×
2679
                match := fmt.Sprintf("%s.src == %s", ipSuffix, cidr)
×
2680
                klog.Infof("delete policy route for router: %s, priority: %d, match %s", c.config.ClusterRouter, util.GatewayRouterPolicyPriority, match)
×
2681
                if err := c.deletePolicyRouteFromVpc(c.config.ClusterRouter, util.GatewayRouterPolicyPriority, match); err != nil {
×
2682
                        klog.Errorf("failed to delete policy route for centralized subnet %s: %v", subnet.Name, err)
×
2683
                        return err
×
2684
                }
×
2685
        }
2686
        return nil
×
2687
}
2688

2689
func (c *Controller) addPolicyRouteForDistributedSubnet(subnet *kubeovnv1.Subnet, nodeName, nodeIPv4, nodeIPv6 string) error {
×
2690
        if subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway {
×
2691
                return nil
×
2692
        }
×
2693
        if subnet.Spec.Vpc != c.config.ClusterRouter || subnet.Name == c.config.NodeSwitch {
×
2694
                return nil
×
2695
        }
×
2696

2697
        pgName := getOverlaySubnetsPortGroupName(subnet.Name, nodeName)
×
2698
        for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
2699
                ipSuffix, nodeIP := "ip4", nodeIPv4
×
2700
                if util.CheckProtocol(cidrBlock) == kubeovnv1.ProtocolIPv6 {
×
2701
                        ipSuffix, nodeIP = "ip6", nodeIPv6
×
2702
                }
×
2703
                if nodeIP == "" {
×
2704
                        continue
×
2705
                }
2706

2707
                var (
×
2708
                        pgAs        = fmt.Sprintf("%s_%s", pgName, ipSuffix)
×
2709
                        match       = fmt.Sprintf("%s.src == $%s", ipSuffix, pgAs)
×
2710
                        action      = kubeovnv1.PolicyRouteActionReroute
×
2711
                        externalIDs = map[string]string{
×
2712
                                "vendor": util.CniTypeName,
×
2713
                                "subnet": subnet.Name,
×
2714
                                "node":   nodeName,
×
2715
                        }
×
2716
                )
×
2717

×
2718
                klog.Infof("add policy route for router: %s, match %s, action %s, externalID %v", c.config.ClusterRouter, match, action, externalIDs)
×
2719
                if err := c.addPolicyRouteToVpc(
×
2720
                        c.config.ClusterRouter,
×
2721
                        &kubeovnv1.PolicyRoute{
×
2722
                                Priority:  util.GatewayRouterPolicyPriority,
×
2723
                                Match:     match,
×
2724
                                Action:    action,
×
2725
                                NextHopIP: nodeIP,
×
2726
                        },
×
2727
                        externalIDs,
×
2728
                ); err != nil {
×
2729
                        klog.Errorf("failed to add logical router policy for port-group address-set %s: %v", pgAs, err)
×
2730
                        return err
×
2731
                }
×
2732
        }
2733
        return nil
×
2734
}
2735

2736
func (c *Controller) deletePolicyRouteForDistributedSubnet(subnet *kubeovnv1.Subnet, nodeName string) error {
×
2737
        pgName := getOverlaySubnetsPortGroupName(subnet.Name, nodeName)
×
2738
        for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
2739
                ipSuffix := "ip4"
×
2740
                if util.CheckProtocol(cidrBlock) == kubeovnv1.ProtocolIPv6 {
×
2741
                        ipSuffix = "ip6"
×
2742
                }
×
2743
                pgAs := fmt.Sprintf("%s_%s", pgName, ipSuffix)
×
2744
                match := fmt.Sprintf("%s.src == $%s", ipSuffix, pgAs)
×
2745
                klog.Infof("delete policy route for router: %s, priority: %d, match: %q", c.config.ClusterRouter, util.GatewayRouterPolicyPriority, match)
×
2746
                if err := c.deletePolicyRouteFromVpc(c.config.ClusterRouter, util.GatewayRouterPolicyPriority, match); err != nil {
×
2747
                        klog.Errorf("failed to delete policy route for subnet %s: %v", subnet.Name, err)
×
2748
                        return err
×
2749
                }
×
2750
        }
2751
        return nil
×
2752
}
2753

2754
func (c *Controller) deletePolicyRouteByGatewayType(subnet *kubeovnv1.Subnet, gatewayType string, isDelete bool) error {
×
2755
        if (subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway) || subnet.Spec.Vpc != c.config.ClusterRouter {
×
2756
                return nil
×
2757
        }
×
2758

2759
        for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
2760
                if cidr == "" || !isDelete {
×
2761
                        continue
×
2762
                }
2763

2764
                af := 4
×
2765
                if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv6 {
×
2766
                        af = 6
×
2767
                }
×
2768
                match := fmt.Sprintf("ip%d.dst == %s", af, cidr)
×
2769
                klog.Infof("delete policy route for router: %s, priority: %d, match %s", c.config.ClusterRouter, util.SubnetRouterPolicyPriority, match)
×
2770
                if err := c.deletePolicyRouteFromVpc(c.config.ClusterRouter, util.SubnetRouterPolicyPriority, match); err != nil {
×
2771
                        klog.Errorf("failed to delete logical router policy for CIDR %s of subnet %s: %v", cidr, subnet.Name, err)
×
2772
                        return err
×
2773
                }
×
2774
        }
2775
        if subnet.Name == c.config.NodeSwitch {
×
2776
                return nil
×
2777
        }
×
2778

2779
        if gatewayType == kubeovnv1.GWDistributedType {
×
2780
                nodes, err := c.nodesLister.List(labels.Everything())
×
2781
                if err != nil {
×
2782
                        klog.Errorf("list nodes: %v", err)
×
2783
                        return err
×
2784
                }
×
2785
                for _, node := range nodes {
×
2786
                        pgName := getOverlaySubnetsPortGroupName(subnet.Name, node.Name)
×
2787
                        if err = c.OVNNbClient.DeletePortGroup(pgName); err != nil {
×
2788
                                klog.Errorf("delete port group for subnet %s and node %s: %v", subnet.Name, node.Name, err)
×
2789
                                return err
×
2790
                        }
×
2791

2792
                        if err = c.deletePolicyRouteForDistributedSubnet(subnet, node.Name); err != nil {
×
2793
                                klog.Errorf("delete policy route for subnet %s and node %s: %v", subnet.Name, node.Name, err)
×
2794
                                return err
×
2795
                        }
×
2796
                }
2797
        }
2798

2799
        if gatewayType == kubeovnv1.GWCentralizedType {
×
2800
                klog.Infof("delete policy route for centralized subnet %s", subnet.Name)
×
2801
                if err := c.deletePolicyRouteForCentralizedSubnet(subnet); err != nil {
×
2802
                        klog.Errorf("delete policy route for subnet %s: %v", subnet.Name, err)
×
2803
                        return err
×
2804
                }
×
2805
        }
2806

2807
        return nil
×
2808
}
2809

2810
func (c *Controller) addPolicyRouteForU2OInterconn(subnet *kubeovnv1.Subnet) error {
×
2811
        var v4Gw, v6Gw string
×
2812
        for gw := range strings.SplitSeq(subnet.Spec.Gateway, ",") {
×
2813
                switch util.CheckProtocol(gw) {
×
2814
                case kubeovnv1.ProtocolIPv4:
×
2815
                        v4Gw = gw
×
2816
                case kubeovnv1.ProtocolIPv6:
×
2817
                        v6Gw = gw
×
2818
                }
2819
        }
2820

2821
        externalIDs := map[string]string{
×
2822
                "vendor":           util.CniTypeName,
×
2823
                "subnet":           subnet.Name,
×
2824
                "isU2ORoutePolicy": "true",
×
2825
        }
×
2826

×
2827
        nodes, err := c.nodesLister.List(labels.Everything())
×
2828
        if err != nil {
×
2829
                klog.Errorf("failed to list nodes: %v", err)
×
2830
                return err
×
2831
        }
×
2832

2833
        var nodesIPv4, nodesIPv6 []string
×
2834
        for _, node := range nodes {
×
2835
                nodeIPv4, nodeIPv6 := util.GetNodeInternalIP(*node)
×
2836

×
2837
                if nodeIPv4 != "" {
×
2838
                        nodesIPv4 = append(nodesIPv4, nodeIPv4)
×
2839
                }
×
2840
                if nodeIPv6 != "" {
×
2841
                        nodesIPv6 = append(nodesIPv6, nodeIPv6)
×
2842
                }
×
2843
        }
2844

2845
        u2oExcludeIP4Ag := strings.ReplaceAll(fmt.Sprintf(util.U2OExcludeIPAg, subnet.Name, "ip4"), "-", ".")
×
2846
        u2oExcludeIP6Ag := strings.ReplaceAll(fmt.Sprintf(util.U2OExcludeIPAg, subnet.Name, "ip6"), "-", ".")
×
2847

×
2848
        if err := c.OVNNbClient.CreateAddressSet(u2oExcludeIP4Ag, externalIDs); err != nil {
×
2849
                klog.Errorf("create address set %s: %v", u2oExcludeIP4Ag, err)
×
2850
                return err
×
2851
        }
×
2852

2853
        if err := c.OVNNbClient.CreateAddressSet(u2oExcludeIP6Ag, externalIDs); err != nil {
×
2854
                klog.Errorf("create address set %s: %v", u2oExcludeIP6Ag, err)
×
2855
                return err
×
2856
        }
×
2857

2858
        if len(nodesIPv4) > 0 {
×
2859
                if err := c.OVNNbClient.AddressSetUpdateAddress(u2oExcludeIP4Ag, nodesIPv4...); err != nil {
×
2860
                        klog.Errorf("set v4 address set %s with address %v: %v", u2oExcludeIP4Ag, nodesIPv4, err)
×
2861
                        return err
×
2862
                }
×
2863
        }
2864

2865
        if len(nodesIPv6) > 0 {
×
2866
                if err := c.OVNNbClient.AddressSetUpdateAddress(u2oExcludeIP6Ag, nodesIPv6...); err != nil {
×
2867
                        klog.Errorf("set v6 address set %s with address %v: %v", u2oExcludeIP6Ag, nodesIPv6, err)
×
2868
                        return err
×
2869
                }
×
2870
        }
2871

2872
        for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
2873
                ipSuffix := "ip4"
×
2874
                nextHop := v4Gw
×
2875
                U2OexcludeIPAs := u2oExcludeIP4Ag
×
2876
                if util.CheckProtocol(cidrBlock) == kubeovnv1.ProtocolIPv6 {
×
2877
                        ipSuffix = "ip6"
×
2878
                        nextHop = v6Gw
×
2879
                        U2OexcludeIPAs = u2oExcludeIP6Ag
×
2880
                }
×
2881

2882
                match1 := fmt.Sprintf("%s.dst == %s", ipSuffix, cidrBlock)
×
2883
                match2 := fmt.Sprintf("%s.dst == $%s && %s.src == %s", ipSuffix, U2OexcludeIPAs, ipSuffix, cidrBlock)
×
2884
                match3 := fmt.Sprintf("%s.src == %s", ipSuffix, cidrBlock)
×
2885

×
2886
                /*
×
2887
                        policy1:
×
2888
                        priority 29400 match: "ip4.dst == underlay subnet cidr"                         action: allow
×
2889

×
2890
                        policy2:
×
2891
                        priority 31000 match: "ip4.dst == node ips && ip4.src == underlay subnet cidr"  action: reroute physical gw
×
2892

×
2893
                        policy3:
×
2894
                        priority 29000 match: "ip4.src == underlay subnet cidr"                         action: reroute physical gw
×
2895

×
2896
                        comment:
×
2897
                        policy1 and policy2 allow overlay pod access underlay but when overlay pod access node ip, it should go join subnet,
×
2898
                        policy3: underlay pod first access u2o interconnection lrp and then reroute to physical gw
×
2899
                */
×
2900
                action := kubeovnv1.PolicyRouteActionAllow
×
2901
                if subnet.Spec.Vpc == c.config.ClusterRouter {
×
2902
                        klog.Infof("add u2o interconnection policy for router: %s, match %s, action %s", subnet.Spec.Vpc, match1, action)
×
2903
                        if err := c.addPolicyRouteToVpc(
×
2904
                                subnet.Spec.Vpc,
×
2905
                                &kubeovnv1.PolicyRoute{
×
2906
                                        Priority: util.U2OSubnetPolicyPriority,
×
2907
                                        Match:    match1,
×
2908
                                        Action:   action,
×
2909
                                },
×
2910
                                externalIDs,
×
2911
                        ); err != nil {
×
2912
                                klog.Errorf("failed to add u2o interconnection policy1 for subnet %s %v", subnet.Name, err)
×
2913
                                return err
×
2914
                        }
×
2915

2916
                        action = kubeovnv1.PolicyRouteActionReroute
×
2917
                        klog.Infof("add u2o interconnection policy for router: %s, match %s, action %s", subnet.Spec.Vpc, match2, action)
×
2918
                        if err := c.addPolicyRouteToVpc(
×
2919
                                subnet.Spec.Vpc,
×
2920
                                &kubeovnv1.PolicyRoute{
×
2921
                                        Priority:  util.SubnetRouterPolicyPriority,
×
2922
                                        Match:     match2,
×
2923
                                        Action:    action,
×
2924
                                        NextHopIP: nextHop,
×
2925
                                },
×
2926
                                externalIDs,
×
2927
                        ); err != nil {
×
2928
                                klog.Errorf("failed to add u2o interconnection policy2 for subnet %s %v", subnet.Name, err)
×
2929
                                return err
×
2930
                        }
×
2931
                }
2932

2933
                action = kubeovnv1.PolicyRouteActionReroute
×
2934
                klog.Infof("add u2o interconnection policy for router: %s, match %s, action %s, nexthop %s", subnet.Spec.Vpc, match3, action, nextHop)
×
2935
                if err := c.addPolicyRouteToVpc(
×
2936
                        subnet.Spec.Vpc,
×
2937
                        &kubeovnv1.PolicyRoute{
×
2938
                                Priority:  util.GatewayRouterPolicyPriority,
×
2939
                                Match:     match3,
×
2940
                                Action:    action,
×
2941
                                NextHopIP: nextHop,
×
2942
                        },
×
2943
                        externalIDs,
×
2944
                ); err != nil {
×
2945
                        klog.Errorf("failed to add u2o interconnection policy3 for subnet %s %v", subnet.Name, err)
×
2946
                        return err
×
2947
                }
×
2948
        }
2949
        return nil
×
2950
}
2951

2952
func (c *Controller) deletePolicyRouteForU2OInterconn(subnet *kubeovnv1.Subnet) error {
×
2953
        logicalRouter, err := c.OVNNbClient.GetLogicalRouter(subnet.Spec.Vpc, true)
×
2954
        if err == nil && logicalRouter == nil {
×
2955
                klog.Infof("logical router %s already deleted", subnet.Spec.Vpc)
×
2956
                return nil
×
2957
        }
×
2958
        policies, err := c.OVNNbClient.ListLogicalRouterPolicies(subnet.Spec.Vpc, -1, map[string]string{
×
2959
                "isU2ORoutePolicy": "true",
×
2960
                "vendor":           util.CniTypeName,
×
2961
                "subnet":           subnet.Name,
×
2962
        }, true)
×
2963
        if err != nil {
×
2964
                klog.Errorf("failed to list logical router policies: %v", err)
×
2965
                return err
×
2966
        }
×
2967
        if len(policies) == 0 {
×
2968
                return nil
×
2969
        }
×
2970

2971
        lr := subnet.Status.U2OInterconnectionVPC
×
2972
        if lr == "" {
×
2973
                // old version field U2OInterconnectionVPC may be "" and then use subnet.Spec.Vpc
×
2974
                lr = subnet.Spec.Vpc
×
2975
        }
×
2976

2977
        for _, policy := range policies {
×
2978
                klog.Infof("delete u2o interconnection policy for router %s with match %s priority %d", lr, policy.Match, policy.Priority)
×
2979
                if err = c.OVNNbClient.DeleteLogicalRouterPolicyByUUID(lr, policy.UUID); err != nil {
×
2980
                        klog.Errorf("failed to delete u2o interconnection policy for subnet %s: %v", subnet.Name, err)
×
2981
                        return err
×
2982
                }
×
2983
        }
2984

2985
        u2oExcludeIP4Ag := strings.ReplaceAll(fmt.Sprintf(util.U2OExcludeIPAg, subnet.Name, "ip4"), "-", ".")
×
2986
        u2oExcludeIP6Ag := strings.ReplaceAll(fmt.Sprintf(util.U2OExcludeIPAg, subnet.Name, "ip6"), "-", ".")
×
2987

×
2988
        if err := c.OVNNbClient.DeleteAddressSet(u2oExcludeIP4Ag); err != nil {
×
2989
                klog.Errorf("delete address set %s: %v", u2oExcludeIP4Ag, err)
×
2990
                return err
×
2991
        }
×
2992

2993
        if err := c.OVNNbClient.DeleteAddressSet(u2oExcludeIP6Ag); err != nil {
×
2994
                klog.Errorf("delete address set %s: %v", u2oExcludeIP6Ag, err)
×
2995
                return err
×
2996
        }
×
2997

2998
        return nil
×
2999
}
3000

3001
func (c *Controller) addCustomVPCStaticRouteForSubnet(subnet *kubeovnv1.Subnet) error {
×
3002
        if subnet.Spec.Vpc == "" {
×
3003
                return nil
×
3004
        }
×
3005

3006
        var v4Gw, v6Gw, v4Cidr, v6Cidr string
×
3007
        for gw := range strings.SplitSeq(subnet.Spec.Gateway, ",") {
×
3008
                switch util.CheckProtocol(gw) {
×
3009
                case kubeovnv1.ProtocolIPv4:
×
3010
                        v4Gw = gw
×
3011
                case kubeovnv1.ProtocolIPv6:
×
3012
                        v6Gw = gw
×
3013
                }
3014
        }
3015

3016
        for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
3017
                if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv4 {
×
3018
                        v4Cidr = cidr
×
3019
                } else {
×
3020
                        v6Cidr = cidr
×
3021
                }
×
3022
        }
3023

3024
        if v4Gw != "" && v4Cidr != "" {
×
3025
                if err := c.addStaticRouteToVpc(
×
3026
                        subnet.Spec.Vpc,
×
3027
                        &kubeovnv1.StaticRoute{
×
3028
                                Policy:    kubeovnv1.PolicySrc,
×
3029
                                CIDR:      v4Cidr,
×
3030
                                NextHopIP: v4Gw,
×
3031
                        },
×
3032
                ); err != nil {
×
3033
                        klog.Errorf("failed to add static route, %v", err)
×
3034
                        return err
×
3035
                }
×
3036
        }
3037

3038
        if v6Gw != "" && v6Cidr != "" {
×
3039
                if err := c.addStaticRouteToVpc(
×
3040
                        subnet.Spec.Vpc,
×
3041
                        &kubeovnv1.StaticRoute{
×
3042
                                Policy:    kubeovnv1.PolicySrc,
×
3043
                                CIDR:      v6Cidr,
×
3044
                                NextHopIP: v6Gw,
×
3045
                        },
×
3046
                ); err != nil {
×
3047
                        klog.Errorf("failed to add static route, %v", err)
×
3048
                        return err
×
3049
                }
×
3050
        }
3051
        return nil
×
3052
}
3053

3054
func (c *Controller) deleteStaticRouteForU2OInterconn(subnet *kubeovnv1.Subnet) error {
×
3055
        if subnet.Spec.Vpc == "" {
×
3056
                return nil
×
3057
        }
×
3058

3059
        var v4Gw, v6Gw, v4Cidr, v6Cidr string
×
3060
        for gw := range strings.SplitSeq(subnet.Spec.Gateway, ",") {
×
3061
                switch util.CheckProtocol(gw) {
×
3062
                case kubeovnv1.ProtocolIPv4:
×
3063
                        v4Gw = gw
×
3064
                case kubeovnv1.ProtocolIPv6:
×
3065
                        v6Gw = gw
×
3066
                }
3067
        }
3068

3069
        for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
3070
                if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv4 {
×
3071
                        v4Cidr = cidr
×
3072
                } else {
×
3073
                        v6Cidr = cidr
×
3074
                }
×
3075
        }
3076

3077
        if v4Gw != "" && v4Cidr != "" {
×
3078
                if err := c.deleteStaticRouteFromVpc(
×
3079
                        subnet.Spec.Vpc,
×
3080
                        subnet.Spec.RouteTable,
×
3081
                        v4Cidr,
×
3082
                        v4Gw,
×
3083
                        kubeovnv1.PolicySrc,
×
3084
                ); err != nil {
×
3085
                        klog.Errorf("failed to add static route, %v", err)
×
3086
                        return err
×
3087
                }
×
3088
        }
3089

3090
        if v6Gw != "" && v6Cidr != "" {
×
3091
                if err := c.deleteStaticRouteFromVpc(
×
3092
                        subnet.Spec.Vpc,
×
3093
                        subnet.Spec.RouteTable,
×
3094
                        v6Cidr,
×
3095
                        v6Gw,
×
3096
                        kubeovnv1.PolicySrc,
×
3097
                ); err != nil {
×
3098
                        klog.Errorf("failed to delete static route, %v", err)
×
3099
                        return err
×
3100
                }
×
3101
        }
3102
        return nil
×
3103
}
3104

3105
func (c *Controller) reconcileRouteTableForSubnet(subnet *kubeovnv1.Subnet) error {
×
3106
        if subnet.Spec.Vlan != "" && !subnet.Spec.U2OInterconnection {
×
3107
                return nil
×
3108
        }
×
3109

3110
        routerPortName := ovs.LogicalRouterPortName(subnet.Spec.Vpc, subnet.Name)
×
3111
        lrp, err := c.OVNNbClient.GetLogicalRouterPort(routerPortName, false)
×
3112
        if err != nil {
×
3113
                klog.Error(err)
×
3114
                return err
×
3115
        }
×
3116

3117
        rtb := lrp.Options["route_table"]
×
3118

×
3119
        // no need to update
×
3120
        if rtb == subnet.Spec.RouteTable {
×
3121
                return nil
×
3122
        }
×
3123

3124
        klog.Infof("reconcile route table %q for subnet %s", subnet.Spec.RouteTable, subnet.Name)
×
3125
        opt := map[string]string{"route_table": subnet.Spec.RouteTable}
×
3126
        if err = c.OVNNbClient.UpdateLogicalRouterPortOptions(routerPortName, opt); err != nil {
×
3127
                klog.Errorf("failed to set route table of logical router port %s to %s: %v", routerPortName, subnet.Spec.RouteTable, err)
×
3128
                return err
×
3129
        }
×
3130

3131
        return nil
×
3132
}
3133

3134
func (c *Controller) addCustomVPCPolicyRoutesForSubnet(subnet *kubeovnv1.Subnet) error {
×
3135
        return c.addCommonRoutesForSubnet(subnet)
×
3136
}
×
3137

3138
func (c *Controller) deleteCustomVPCPolicyRoutesForSubnet(subnet *kubeovnv1.Subnet) error {
×
3139
        logicalRouter, err := c.OVNNbClient.GetLogicalRouter(subnet.Spec.Vpc, true)
×
3140
        if err == nil && logicalRouter == nil {
×
3141
                klog.Infof("logical router %s already deleted", subnet.Spec.Vpc)
×
3142
                return nil
×
3143
        }
×
3144
        for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
3145
                af := 4
×
3146
                if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv6 {
×
3147
                        af = 6
×
3148
                }
×
3149
                match := fmt.Sprintf("ip%d.dst == %s", af, cidr)
×
3150
                klog.Infof("delete policy route for router: %s, priority: %d, match %s", subnet.Spec.Vpc, util.SubnetRouterPolicyPriority, match)
×
3151
                if err := c.deletePolicyRouteFromVpc(subnet.Spec.Vpc, util.SubnetRouterPolicyPriority, match); err != nil {
×
3152
                        klog.Errorf("failed to delete logical router policy for CIDR %s of subnet %s: %v", cidr, subnet.Name, err)
×
3153
                        return err
×
3154
                }
×
3155
        }
3156
        return nil
×
3157
}
3158

3159
func (c *Controller) clearOldU2OResource(subnet *kubeovnv1.Subnet) error {
×
3160
        if subnet.Status.U2OInterconnectionVPC != "" &&
×
3161
                (!subnet.Spec.U2OInterconnection || (subnet.Spec.U2OInterconnection && subnet.Status.U2OInterconnectionVPC != subnet.Spec.Vpc)) {
×
3162
                // remove old u2o lsp and lrp first
×
3163
                lspName := fmt.Sprintf("%s-%s", subnet.Name, subnet.Status.U2OInterconnectionVPC)
×
3164
                lrpName := fmt.Sprintf("%s-%s", subnet.Status.U2OInterconnectionVPC, subnet.Name)
×
3165
                klog.Infof("clean subnet %s old u2o resource with lsp %s lrp %s", subnet.Name, lspName, lrpName)
×
3166
                if err := c.OVNNbClient.DeleteLogicalSwitchPort(lspName); err != nil {
×
3167
                        klog.Errorf("failed to delete u2o logical switch port %s: %v", lspName, err)
×
3168
                        return err
×
3169
                }
×
3170

3171
                if err := c.OVNNbClient.DeleteLogicalRouterPort(lrpName); err != nil {
×
3172
                        klog.Errorf("failed to delete u2o logical router port %s: %v", lrpName, err)
×
3173
                        return err
×
3174
                }
×
3175

3176
                if err := c.deletePolicyRouteForU2OInterconn(subnet); err != nil {
×
3177
                        klog.Errorf("failed to delete u2o policy route for u2o connection %s: %v", subnet.Name, err)
×
3178
                        return err
×
3179
                }
×
3180

3181
                if subnet.Status.U2OInterconnectionVPC != c.config.ClusterRouter {
×
3182
                        if err := c.deleteStaticRouteForU2OInterconn(subnet); err != nil {
×
3183
                                klog.Errorf("failed to delete u2o static route for u2o connection %s: %v", subnet.Name, err)
×
3184
                                return err
×
3185
                        }
×
3186
                }
3187
        }
3188
        return nil
×
3189
}
3190

3191
func (c *Controller) reconcilePolicyRouteForCidrChangedSubnet(subnet *kubeovnv1.Subnet, isCommonRoute bool) error {
×
3192
        var match string
×
3193
        var priority int
×
3194

×
3195
        if isCommonRoute {
×
3196
                priority = util.SubnetRouterPolicyPriority
×
3197
        } else {
×
3198
                priority = util.GatewayRouterPolicyPriority
×
3199
        }
×
3200

3201
        policies, err := c.OVNNbClient.ListLogicalRouterPolicies(subnet.Spec.Vpc, priority, map[string]string{
×
3202
                "vendor": util.CniTypeName,
×
3203
                "subnet": subnet.Name,
×
3204
        }, true)
×
3205
        if err != nil {
×
3206
                klog.Errorf("failed to list logical router policies: %v", err)
×
3207
                return err
×
3208
        }
×
3209
        if len(policies) == 0 {
×
3210
                return nil
×
3211
        }
×
3212

3213
        for _, policy := range policies {
×
3214
                policyProtocol := kubeovnv1.ProtocolIPv4
×
3215
                if strings.Contains(policy.Match, "ip6") {
×
3216
                        policyProtocol = kubeovnv1.ProtocolIPv6
×
3217
                }
×
3218

3219
                for cidr := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
3220
                        if cidr == "" {
×
3221
                                continue
×
3222
                        }
3223
                        if policyProtocol != util.CheckProtocol(cidr) {
×
3224
                                continue
×
3225
                        }
3226

3227
                        af := 4
×
3228
                        if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv6 {
×
3229
                                af = 6
×
3230
                        }
×
3231

3232
                        if isCommonRoute {
×
3233
                                match = fmt.Sprintf("ip%d.dst == %s", af, cidr)
×
3234
                        } else {
×
3235
                                if subnet.Spec.GatewayType == kubeovnv1.GWCentralizedType {
×
3236
                                        match = fmt.Sprintf("ip%d.src == %s", af, cidr)
×
3237
                                } else {
×
3238
                                        // distributed subnet does not need process gateway route policy
×
3239
                                        continue
×
3240
                                }
3241
                        }
3242

3243
                        if policy.Match != match {
×
3244
                                klog.Infof("delete old policy route for subnet %s with match %s priority %d, new match %v", subnet.Name, policy.Match, policy.Priority, match)
×
3245
                                if err = c.OVNNbClient.DeleteLogicalRouterPolicyByUUID(subnet.Spec.Vpc, policy.UUID); err != nil {
×
3246
                                        klog.Errorf("failed to delete policy route for subnet %s: %v", subnet.Name, err)
×
3247
                                        return err
×
3248
                                }
×
3249
                        }
3250
                }
3251
        }
3252
        return nil
×
3253
}
3254

3255
func (c *Controller) addPolicyRouteForU2ONoLoadBalancer(subnet *kubeovnv1.Subnet) error {
×
3256
        nodes, err := c.nodesLister.List(labels.Everything())
×
3257
        if err != nil {
×
3258
                klog.Errorf("failed to list nodes: %v", err)
×
3259
                return err
×
3260
        }
×
3261
        for _, node := range nodes {
×
3262
                pgName := getOverlaySubnetsPortGroupName(subnet.Name, node.Name)
×
3263
                if err := c.OVNNbClient.CreatePortGroup(pgName, map[string]string{logicalRouterKey: subnet.Spec.Vpc, logicalSwitchKey: subnet.Name, u2oKey: "true"}); err != nil {
×
3264
                        klog.Errorf("failed to create u2o port group for subnet %s and node %s: %v", subnet.Name, node.Name, err)
×
3265
                        return err
×
3266
                }
×
3267
                key := util.NodeLspName(node.Name)
×
3268
                ip, err := c.ipsLister.Get(key)
×
3269
                if err != nil {
×
3270
                        if k8serrors.IsNotFound(err) {
×
3271
                                return nil
×
3272
                        }
×
3273
                        klog.Error(err)
×
3274
                        return err
×
3275
                }
3276
                v4Svc, v6Svc := util.SplitStringIP(c.config.ServiceClusterIPRange)
×
3277
                for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
3278
                        ipSuffix, nodeIP, svcCIDR := "ip4", ip.Spec.V4IPAddress, v4Svc
×
3279
                        if util.CheckProtocol(cidrBlock) == kubeovnv1.ProtocolIPv6 {
×
3280
                                ipSuffix, nodeIP, svcCIDR = "ip6", ip.Spec.V6IPAddress, v6Svc
×
3281
                        }
×
3282
                        if nodeIP == "" || svcCIDR == "" {
×
3283
                                continue
×
3284
                        }
3285

3286
                        var (
×
3287
                                pgAs        = fmt.Sprintf("%s_%s", pgName, ipSuffix)
×
3288
                                match       = fmt.Sprintf("%s.src == $%s && %s.dst == %s", ipSuffix, pgAs, ipSuffix, svcCIDR)
×
3289
                                action      = kubeovnv1.PolicyRouteActionReroute
×
3290
                                externalIDs = map[string]string{
×
3291
                                        "vendor":               util.CniTypeName,
×
3292
                                        "subnet":               subnet.Name,
×
3293
                                        "isU2ORoutePolicy":     "true",
×
3294
                                        "isU2ONoLBRoutePolicy": "true",
×
3295
                                        "node":                 node.Name,
×
3296
                                }
×
3297
                        )
×
3298

×
3299
                        klog.Infof("add u2o interconnection policy without enabling loadbalancer for router: %s, match %s, action %s, nexthop %s", subnet.Spec.Vpc, match, action, nodeIP)
×
3300
                        if err := c.addPolicyRouteToVpc(
×
3301
                                c.config.ClusterRouter,
×
3302
                                &kubeovnv1.PolicyRoute{
×
3303
                                        Priority:  util.U2OSubnetPolicyPriority,
×
3304
                                        Match:     match,
×
3305
                                        Action:    action,
×
3306
                                        NextHopIP: nodeIP,
×
3307
                                },
×
3308
                                externalIDs,
×
3309
                        ); err != nil {
×
3310
                                klog.Errorf("failed to add logical router policy for port-group address-set %s: %v", pgAs, err)
×
3311
                                return err
×
3312
                        }
×
3313
                }
3314
        }
3315
        lsps, err := c.OVNNbClient.ListNormalLogicalSwitchPorts(true, map[string]string{logicalSwitchKey: subnet.Name})
×
3316
        if err != nil {
×
3317
                klog.Errorf("failed to list normal lsps for subnet %s: %v", subnet.Name, err)
×
3318
                return err
×
3319
        }
×
3320
        for _, lsp := range lsps {
×
3321
                ip, err := c.ipsLister.Get(lsp.Name)
×
3322
                if err != nil {
×
3323
                        if k8serrors.IsNotFound(err) {
×
3324
                                return nil
×
3325
                        }
×
3326
                        klog.Error(err)
×
3327
                        return err
×
3328
                }
3329
                pgName := getOverlaySubnetsPortGroupName(subnet.Name, ip.Spec.NodeName)
×
3330
                if err = c.OVNNbClient.PortGroupAddPorts(pgName, lsp.Name); err != nil {
×
3331
                        klog.Errorf("failed to add port to u2o port group %s: %v", pgName, err)
×
3332
                        return err
×
3333
                }
×
3334
        }
3335
        return nil
×
3336
}
3337

3338
func (c *Controller) deletePolicyRouteForU2ONoLoadBalancer(subnet *kubeovnv1.Subnet) error {
×
3339
        logicalRouter, err := c.OVNNbClient.GetLogicalRouter(subnet.Spec.Vpc, true)
×
3340
        if err == nil && logicalRouter == nil {
×
3341
                klog.Infof("logical router %s already deleted", subnet.Spec.Vpc)
×
3342
                return nil
×
3343
        }
×
3344
        policies, err := c.OVNNbClient.ListLogicalRouterPolicies(subnet.Spec.Vpc, -1, map[string]string{
×
3345
                "isU2ONoLBRoutePolicy": "true",
×
3346
                "vendor":               util.CniTypeName,
×
3347
                "subnet":               subnet.Name,
×
3348
        }, true)
×
3349
        if err != nil {
×
3350
                klog.Errorf("failed to list logical router policies: %v", err)
×
3351
                return err
×
3352
        }
×
3353

3354
        lr := subnet.Status.U2OInterconnectionVPC
×
3355
        if lr == "" {
×
3356
                // old version field U2OInterconnectionVPC may be "" and then use subnet.Spec.Vpc
×
3357
                lr = subnet.Spec.Vpc
×
3358
        }
×
3359

3360
        for _, policy := range policies {
×
3361
                klog.Infof("delete u2o interconnection policy without enabling loadbalancer for router %s with match %s priority %d", lr, policy.Match, policy.Priority)
×
3362
                if err = c.OVNNbClient.DeleteLogicalRouterPolicyByUUID(lr, policy.UUID); err != nil {
×
3363
                        klog.Errorf("failed to delete u2o interconnection policy for subnet %s: %v", subnet.Name, err)
×
3364
                        return err
×
3365
                }
×
3366
        }
3367

3368
        pgs, err := c.OVNNbClient.ListPortGroups(map[string]string{logicalRouterKey: subnet.Spec.Vpc, logicalSwitchKey: subnet.Name, u2oKey: "true"})
×
3369
        if err != nil {
×
3370
                klog.Errorf("failed to list u2o port groups with u2oKey is true for subnet %s: %v", subnet.Name, err)
×
3371
                return err
×
3372
        }
×
3373
        for _, pg := range pgs {
×
3374
                klog.Infof("delete u2o port group %s for subnet %s", pg.Name, subnet.Name)
×
3375
                if err = c.OVNNbClient.DeletePortGroup(pg.Name); err != nil {
×
3376
                        klog.Errorf("failed to delete u2o port group for subnet %s: %v", subnet.Name, err)
×
3377
                        return err
×
3378
                }
×
3379
        }
3380
        return nil
×
3381
}
3382

3383
func (c *Controller) findSubnetByNetworkAttachmentDefinition(ns, name string, subnets []*kubeovnv1.Subnet) (*kubeovnv1.Subnet, error) {
×
3384
        nad, err := c.netAttachLister.NetworkAttachmentDefinitions(ns).Get(name)
×
3385
        if err != nil {
×
3386
                klog.Errorf("failed to get net-attach-def %s/%s: %v", ns, name, err)
×
3387
                return nil, err
×
3388
        }
×
3389
        netCfg, err := loadNetConf([]byte(nad.Spec.Config))
×
3390
        if err != nil {
×
3391
                klog.Errorf("failed to parse config of net-attach-def %s/%s: %v", ns, name, err)
×
3392
                return nil, err
×
3393
        }
×
3394

3395
        var provider string
×
3396
        if netCfg.Conf.Type == util.CniTypeName {
×
3397
                provider = fmt.Sprintf("%s.%s.%s", name, ns, util.OvnProvider)
×
3398
        } else {
×
3399
                provider = fmt.Sprintf("%s.%s", name, ns)
×
3400
        }
×
3401
        var subnet *kubeovnv1.Subnet
×
3402
        for _, s := range subnets {
×
3403
                if s.Spec.Provider == provider {
×
3404
                        subnet = s.DeepCopy()
×
3405
                        break
×
3406
                }
3407
        }
3408
        if subnet == nil {
×
3409
                err = fmt.Errorf("failed to get subnet for net-attach-def %s/%s", ns, name)
×
3410
                klog.Error(err)
×
3411
                return nil, err
×
3412
        }
×
3413

3414
        return subnet, nil
×
3415
}
3416

3417
func (c *Controller) handleMcastQuerierChange(subnet *kubeovnv1.Subnet) error {
×
3418
        if subnet.Spec.EnableMulticastSnoop {
×
3419
                multicastSnoopFlag := map[string]string{
×
3420
                        "mcast_snoop":   "true",
×
3421
                        "mcast_querier": "true",
×
3422
                        "mcast_ip4_src": subnet.Status.McastQuerierIP,
×
3423
                        "mcast_eth_src": subnet.Status.McastQuerierMAC,
×
3424
                }
×
3425
                mcastQuerierLspName := fmt.Sprintf(util.McastQuerierName, subnet.Name)
×
3426
                if err := c.OVNNbClient.CreateLogicalSwitchPort(subnet.Name, mcastQuerierLspName, subnet.Status.McastQuerierIP, subnet.Status.McastQuerierMAC, mcastQuerierLspName, "default", false, "", "", false, nil, ""); err != nil {
×
3427
                        err = fmt.Errorf("failed to create mcast querier lsp %s: %w", mcastQuerierLspName, err)
×
3428
                        klog.Error(err)
×
3429
                        return err
×
3430
                }
×
3431

3432
                if err := c.OVNNbClient.LogicalSwitchUpdateOtherConfig(subnet.Name, ovsdb.MutateOperationInsert, multicastSnoopFlag); err != nil {
×
3433
                        klog.Errorf("enable logical switch multicast snoop %s: %v", subnet.Name, err)
×
3434
                        return err
×
3435
                }
×
3436
        } else {
×
3437
                lss, err := c.OVNNbClient.ListLogicalSwitch(false, func(ls *ovnnb.LogicalSwitch) bool {
×
3438
                        return ls.Name == subnet.Name
×
3439
                })
×
3440
                if err != nil || len(lss) == 0 {
×
3441
                        klog.Errorf("failed to list logical switch %s: %v", subnet.Name, err)
×
3442
                        return err
×
3443
                }
×
3444

3445
                multicastSnoopFlag := map[string]string{
×
3446
                        "mcast_snoop":   lss[0].OtherConfig["mcast_snoop"],
×
3447
                        "mcast_querier": lss[0].OtherConfig["mcast_querier"],
×
3448
                        "mcast_ip4_src": lss[0].OtherConfig["mcast_ip4_src"],
×
3449
                        "mcast_eth_src": lss[0].OtherConfig["mcast_eth_src"],
×
3450
                }
×
3451
                mcastQuerierLspName := fmt.Sprintf(util.McastQuerierName, subnet.Name)
×
3452
                if err := c.OVNNbClient.LogicalSwitchUpdateOtherConfig(subnet.Name, ovsdb.MutateOperationDelete, multicastSnoopFlag); err != nil {
×
3453
                        klog.Errorf("disable logical switch multicast snoop %s: %v", subnet.Name, err)
×
3454
                        return err
×
3455
                }
×
3456

3457
                if err := c.OVNNbClient.DeleteLogicalSwitchPort(mcastQuerierLspName); err != nil {
×
3458
                        err = fmt.Errorf("failed to delete mcast querier lsp %s: %w", mcastQuerierLspName, err)
×
3459
                        klog.Error(err)
×
3460
                        return err
×
3461
                }
×
3462
        }
3463
        return nil
×
3464
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc