• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 20566883762

29 Dec 2025 06:55AM UTC coverage: 22.608% (-0.004%) from 22.612%
20566883762

push

github

web-flow
refactor: add/update field selector to informer factory (#6091)

Signed-off-by: zhangzujian <zhangzujian.7@gmail.com>

0 of 90 new or added lines in 14 files covered. (0.0%)

5 existing lines in 3 files now uncovered.

12065 of 53365 relevant lines covered (22.61%)

0.53 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.97
/pkg/controller/node.go
1
package controller
2

3
import (
4
        "context"
5
        "errors"
6
        "fmt"
7
        "maps"
8
        "reflect"
9
        "slices"
10
        "strconv"
11
        "strings"
12
        "time"
13

14
        goping "github.com/prometheus-community/pro-bing"
15
        "github.com/scylladb/go-set/strset"
16
        v1 "k8s.io/api/core/v1"
17
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
18
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
19
        "k8s.io/apimachinery/pkg/labels"
20
        "k8s.io/apimachinery/pkg/types"
21
        "k8s.io/client-go/tools/cache"
22
        "k8s.io/klog/v2"
23

24
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
25
        "github.com/kubeovn/kube-ovn/pkg/ovs"
26
        "github.com/kubeovn/kube-ovn/pkg/util"
27
)
28

29
type ErrChassisNotFound struct {
30
        Chassis string
31
        Node    string
32
}
33

34
func (e *ErrChassisNotFound) Error() string {
×
35
        return fmt.Sprintf("chassis %s not found for node %s", e.Chassis, e.Node)
×
36
}
×
37

38
func (c *Controller) enqueueAddNode(obj any) {
×
39
        key := cache.MetaObjectToName(obj.(*v1.Node)).String()
×
40
        klog.V(3).Infof("enqueue add node %s", key)
×
41
        c.addNodeQueue.Add(key)
×
42
}
×
43

44
func nodeReady(node *v1.Node) bool {
×
45
        var ready, networkUnavailable bool
×
46
        for _, c := range node.Status.Conditions {
×
47
                switch c.Type {
×
48
                case v1.NodeReady:
×
49
                        ready = c.Status == v1.ConditionTrue
×
50
                case v1.NodeNetworkUnavailable:
×
51
                        networkUnavailable = c.Status == v1.ConditionTrue
×
52
                }
53
        }
54
        return ready && !networkUnavailable
×
55
}
56

57
func kubeOvnAnnotationsChanged(oldAnnotations, newAnnotations map[string]string) bool {
2✔
58
        filterKubeOvnAnnotations := func(annotations map[string]string) map[string]string {
4✔
59
                filtered := make(map[string]string)
2✔
60
                for key, value := range annotations {
4✔
61
                        if strings.Contains(key, ".kubernetes.io/") {
4✔
62
                                filtered[key] = value
2✔
63
                        }
2✔
64
                }
65
                return filtered
2✔
66
        }
67

68
        return !maps.Equal(filterKubeOvnAnnotations(oldAnnotations), filterKubeOvnAnnotations(newAnnotations))
2✔
69
}
70

71
func (c *Controller) enqueueUpdateNode(oldObj, newObj any) {
×
72
        oldNode := oldObj.(*v1.Node)
×
73
        newNode := newObj.(*v1.Node)
×
74

×
75
        if nodeReady(oldNode) != nodeReady(newNode) ||
×
76
                kubeOvnAnnotationsChanged(oldNode.Annotations, newNode.Annotations) ||
×
77
                !reflect.DeepEqual(oldNode.Labels, newNode.Labels) {
×
78
                key := cache.MetaObjectToName(newNode).String()
×
79
                if len(newNode.Annotations) == 0 || newNode.Annotations[util.AllocatedAnnotation] != "true" {
×
80
                        klog.V(3).Infof("enqueue add node %s", key)
×
81
                        c.addNodeQueue.Add(key)
×
82
                } else {
×
83
                        klog.V(3).Infof("enqueue update node %s", key)
×
84
                        c.updateNodeQueue.Add(key)
×
85
                }
×
86
        }
87
}
88

89
func (c *Controller) enqueueDeleteNode(obj any) {
×
90
        var node *v1.Node
×
91
        switch t := obj.(type) {
×
92
        case *v1.Node:
×
93
                node = t
×
94
        case cache.DeletedFinalStateUnknown:
×
95
                n, ok := t.Obj.(*v1.Node)
×
96
                if !ok {
×
97
                        klog.Warningf("unexpected object type: %T", t.Obj)
×
98
                        return
×
99
                }
×
100
                node = n
×
101
        default:
×
102
                klog.Warningf("unexpected type: %T", obj)
×
103
                return
×
104
        }
105

106
        key := cache.MetaObjectToName(node).String()
×
107
        klog.V(3).Infof("enqueue delete node %s", key)
×
108
        c.deletingNodeObjMap.Store(key, node)
×
109
        c.deleteNodeQueue.Add(key)
×
110
}
111

112
func nodeUnderlayAddressSetName(node string, af int) string {
×
113
        return fmt.Sprintf("node_%s_underlay_v%d", strings.ReplaceAll(node, "-", "_"), af)
×
114
}
×
115

116
func (c *Controller) handleAddNode(key string) error {
×
117
        c.nodeKeyMutex.LockKey(key)
×
118
        defer func() { _ = c.nodeKeyMutex.UnlockKey(key) }()
×
119

120
        cachedNode, err := c.nodesLister.Get(key)
×
121
        if err != nil {
×
122
                if k8serrors.IsNotFound(err) {
×
123
                        return nil
×
124
                }
×
125
                klog.Errorf("failed to get node %s: %v", key, err)
×
126
                return err
×
127
        }
128
        node := cachedNode.DeepCopy()
×
129
        klog.Infof("handle add node %s", node.Name)
×
130

×
131
        subnets, err := c.subnetsLister.List(labels.Everything())
×
132
        if err != nil {
×
133
                klog.Errorf("failed to list subnets: %v", err)
×
134
                return err
×
135
        }
×
136

137
        nodeIPv4, nodeIPv6 := util.GetNodeInternalIP(*node)
×
138
        for _, subnet := range subnets {
×
139
                if subnet.Spec.Vpc != c.config.ClusterRouter {
×
140
                        continue
×
141
                }
142

143
                v4, v6 := util.SplitStringIP(subnet.Spec.CIDRBlock)
×
144
                if subnet.Spec.Vlan == "" && (util.CIDRContainIP(v4, nodeIPv4) || util.CIDRContainIP(v6, nodeIPv6)) {
×
145
                        msg := fmt.Sprintf("internal IP address of node %s is in CIDR of subnet %s, this may result in network issues", node.Name, subnet.Name)
×
146
                        klog.Warning(msg)
×
147
                        c.recorder.Eventf(&v1.Node{ObjectMeta: metav1.ObjectMeta{Name: node.Name, UID: types.UID(node.Name)}}, v1.EventTypeWarning, "NodeAddressConflictWithSubnet", msg)
×
148
                        break
×
149
                }
150
        }
151

152
        if err = c.handleNodeAnnotationsForProviderNetworks(node); err != nil {
×
153
                klog.Errorf("failed to handle annotations of node %s for provider networks: %v", node.Name, err)
×
154
                return err
×
155
        }
×
156

157
        subnet, err := c.subnetsLister.Get(c.config.NodeSwitch)
×
158
        if err != nil {
×
159
                klog.Errorf("failed to get node subnet: %v", err)
×
160
                return err
×
161
        }
×
162

163
        var v4IP, v6IP, mac string
×
164

×
165
        portName := util.NodeLspName(key)
×
166
        if node.Annotations[util.AllocatedAnnotation] == "true" && node.Annotations[util.IPAddressAnnotation] != "" && node.Annotations[util.MacAddressAnnotation] != "" {
×
167
                macStr := node.Annotations[util.MacAddressAnnotation]
×
168
                v4IP, v6IP, mac, err = c.ipam.GetStaticAddress(portName, portName, node.Annotations[util.IPAddressAnnotation],
×
169
                        &macStr, node.Annotations[util.LogicalSwitchAnnotation], true)
×
170
                if err != nil {
×
171
                        klog.Errorf("failed to alloc static ip addrs for node %v: %v", node.Name, err)
×
172
                        return err
×
173
                }
×
174
        } else {
×
175
                v4IP, v6IP, mac, err = c.ipam.GetRandomAddress(portName, portName, nil, c.config.NodeSwitch, "", nil, true)
×
176
                if err != nil {
×
177
                        klog.Errorf("failed to alloc random ip addrs for node %v: %v", node.Name, err)
×
178
                        return err
×
179
                }
×
180

181
                // Clean up potentially existing logical switch ports to avoid leftover issues from previous failed configurations
182
                if err := c.OVNNbClient.DeleteLogicalSwitchPort(portName); err != nil {
×
183
                        klog.Errorf("failed to delete stale logical switch port %s: %v", portName, err)
×
184
                        return err
×
185
                }
×
186
                klog.Infof("deleted stale logical switch port %s", portName)
×
187
        }
188

189
        ipStr := util.GetStringIP(v4IP, v6IP)
×
190
        if err := c.OVNNbClient.CreateBareLogicalSwitchPort(c.config.NodeSwitch, portName, ipStr, mac); err != nil {
×
191
                klog.Errorf("failed to create logical switch port %s: %v", portName, err)
×
192
                return err
×
193
        }
×
194

195
        for ip := range strings.SplitSeq(ipStr, ",") {
×
196
                if ip == "" {
×
197
                        continue
×
198
                }
199

200
                nodeIP, af := nodeIPv4, 4
×
201
                protocol := util.CheckProtocol(ip)
×
202
                if protocol == kubeovnv1.ProtocolIPv6 {
×
203
                        nodeIP, af = nodeIPv6, 6
×
204
                }
×
205
                if nodeIP != "" {
×
206
                        var (
×
207
                                match       = fmt.Sprintf("ip%d.dst == %s", af, nodeIP)
×
208
                                action      = kubeovnv1.PolicyRouteActionReroute
×
209
                                externalIDs = map[string]string{
×
210
                                        "vendor":         util.CniTypeName,
×
211
                                        "node":           node.Name,
×
212
                                        "address-family": strconv.Itoa(af),
×
213
                                }
×
214
                        )
×
215
                        klog.Infof("add policy route for router: %s, match %s, action %s, nexthop %s, externalID %v", c.config.ClusterRouter, match, action, ip, externalIDs)
×
216
                        if err = c.addPolicyRouteToVpc(
×
217
                                c.config.ClusterRouter,
×
218
                                &kubeovnv1.PolicyRoute{
×
219
                                        Priority:  util.NodeRouterPolicyPriority,
×
220
                                        Match:     match,
×
221
                                        Action:    action,
×
222
                                        NextHopIP: ip,
×
223
                                },
×
224
                                externalIDs,
×
225
                        ); err != nil {
×
226
                                klog.Errorf("failed to add logical router policy for node %s: %v", node.Name, err)
×
227
                                return err
×
228
                        }
×
229

230
                        dnsIPs := make([]string, 0, len(c.config.NodeLocalDNSIPs))
×
231
                        for _, ip := range c.config.NodeLocalDNSIPs {
×
232
                                if util.CheckProtocol(ip) == protocol {
×
233
                                        dnsIPs = append(dnsIPs, ip)
×
234
                                }
×
235
                        }
236

237
                        if err = c.addPolicyRouteForLocalDNSCacheOnNode(dnsIPs, portName, ip, node.Name, af); err != nil {
×
238
                                klog.Errorf("failed to add policy route for node %s: %v", node.Name, err)
×
239
                                return err
×
240
                        }
×
241
                }
242
        }
243

244
        if err := c.addNodeGatewayStaticRoute(); err != nil {
×
245
                klog.Errorf("failed to add static route for node gw: %v", err)
×
246
                return err
×
247
        }
×
248

249
        patch := util.KVPatch{
×
250
                util.IPAddressAnnotation:     ipStr,
×
251
                util.MacAddressAnnotation:    mac,
×
252
                util.CidrAnnotation:          subnet.Spec.CIDRBlock,
×
253
                util.GatewayAnnotation:       subnet.Spec.Gateway,
×
254
                util.LogicalSwitchAnnotation: c.config.NodeSwitch,
×
255
                util.AllocatedAnnotation:     "true",
×
256
                util.PortNameAnnotation:      portName,
×
257
        }
×
258
        if err = util.PatchAnnotations(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
259
                klog.Errorf("failed to update annotations of node %s: %v", node.Name, err)
×
260
                return err
×
261
        }
×
262

263
        if err := c.createOrUpdateIPCR("", "", ipStr, mac, c.config.NodeSwitch, "", node.Name, ""); err != nil {
×
264
                klog.Errorf("failed to create or update IPs %s: %v", portName, err)
×
265
                return err
×
266
        }
×
267

268
        for _, subnet := range subnets {
×
269
                if (subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway) || subnet.Spec.Vpc != c.config.ClusterRouter || subnet.Name == c.config.NodeSwitch || subnet.Spec.GatewayType != kubeovnv1.GWDistributedType {
×
270
                        continue
×
271
                }
272
                if err = c.createPortGroupForDistributedSubnet(node, subnet); err != nil {
×
273
                        klog.Errorf("failed to create port group for node %s and subnet %s: %v", node.Name, subnet.Name, err)
×
274
                        return err
×
275
                }
×
276
        }
277
        c.distributedSubnetNeedSync.Store(true)
×
278

×
279
        // ovn acl doesn't support address_set name with '-', so replace '-' by '.'
×
280
        pgName := strings.ReplaceAll(portName, "-", ".")
×
281
        if err = c.OVNNbClient.CreatePortGroup(pgName, map[string]string{"node": node.Name, networkPolicyKey: "node" + "/" + key}); err != nil {
×
282
                klog.Errorf("create port group %s for node %s: %v", pgName, key, err)
×
283
                return err
×
284
        }
×
285

286
        if err := c.addPolicyRouteForCentralizedSubnetOnNode(node, ipStr); err != nil {
×
287
                klog.Errorf("failed to add policy route for node %s, %v", key, err)
×
288
                return err
×
289
        }
×
290

291
        if err := c.UpdateChassisTag(node); err != nil {
×
292
                klog.Errorf("failed to update chassis tag for node %s: %v", node.Name, err)
×
293
                return err
×
294
        }
×
295

296
        if err := c.retryDelDupChassis(util.ChassisRetryMaxTimes, util.ChassisControllerRetryInterval, c.cleanDuplicatedChassis, node); err != nil {
×
297
                klog.Errorf("failed to clean duplicated chassis for node %s: %v", node.Name, err)
×
298
                return err
×
299
        }
×
300
        return nil
×
301
}
302

303
func (c *Controller) handleNodeAnnotationsForProviderNetworks(node *v1.Node) error {
×
304
        providerNetworks, err := c.providerNetworksLister.List(labels.Everything())
×
305
        if err != nil && !k8serrors.IsNotFound(err) {
×
306
                klog.Errorf("failed to list provider networks: %v", err)
×
307
                return err
×
308
        }
×
309

310
        for _, pn := range providerNetworks {
×
311
                excludeAnno := fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name)
×
312
                interfaceAnno := fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name)
×
313

×
314
                var newPn *kubeovnv1.ProviderNetwork
×
315
                excluded, err := util.IsNodeExcludedFromProviderNetwork(node, pn)
×
316
                if err != nil {
×
317
                        klog.Error(err)
×
318
                        return err
×
319
                }
×
320

321
                // Handle node annotation for exclusion (only when nodeSelector is not set)
322
                if !excluded && pn.Spec.NodeSelector == nil && len(node.Annotations) != 0 && node.Annotations[excludeAnno] == "true" {
×
323
                        newPn = pn.DeepCopy()
×
324
                        newPn.Spec.ExcludeNodes = append(newPn.Spec.ExcludeNodes, node.Name)
×
325
                        excluded = true
×
326
                }
×
327

328
                var customInterface string
×
329
                for _, v := range pn.Spec.CustomInterfaces {
×
330
                        if slices.Contains(v.Nodes, node.Name) {
×
331
                                customInterface = v.Interface
×
332
                                break
×
333
                        }
334
                }
335
                if customInterface == "" && len(node.Annotations) != 0 {
×
336
                        if customInterface = node.Annotations[interfaceAnno]; customInterface != "" {
×
337
                                if newPn == nil {
×
338
                                        newPn = pn.DeepCopy()
×
339
                                }
×
340
                                var index *int
×
341
                                for i := range newPn.Spec.CustomInterfaces {
×
342
                                        if newPn.Spec.CustomInterfaces[i].Interface == customInterface {
×
343
                                                index = &i
×
344
                                                break
×
345
                                        }
346
                                }
347
                                if index != nil {
×
348
                                        newPn.Spec.CustomInterfaces[*index].Nodes = append(newPn.Spec.CustomInterfaces[*index].Nodes, node.Name)
×
349
                                } else {
×
350
                                        ci := kubeovnv1.CustomInterface{Interface: customInterface, Nodes: []string{node.Name}}
×
351
                                        newPn.Spec.CustomInterfaces = append(newPn.Spec.CustomInterfaces, ci)
×
352
                                }
×
353
                        }
354
                }
355

356
                if newPn != nil {
×
357
                        if newPn, err = c.config.KubeOvnClient.KubeovnV1().ProviderNetworks().Update(context.Background(), newPn, metav1.UpdateOptions{}); err != nil {
×
358
                                klog.Errorf("failed to update provider network %s: %v", pn.Name, err)
×
359
                                return err
×
360
                        }
×
361
                }
362

363
                if len(node.Annotations) != 0 {
×
364
                        patch := util.KVPatch{excludeAnno: nil, interfaceAnno: nil}
×
365
                        if err = util.PatchAnnotations(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
366
                                klog.Errorf("failed to patch node %s: %v", node.Name, err)
×
367
                                return err
×
368
                        }
×
369
                }
370

371
                if excluded {
×
372
                        if newPn == nil {
×
373
                                newPn = pn.DeepCopy()
×
374
                        } else {
×
375
                                newPn = newPn.DeepCopy()
×
376
                        }
×
377

378
                        if newPn.Status.EnsureNodeStandardConditions(node.Name) {
×
379
                                _, err = c.config.KubeOvnClient.KubeovnV1().ProviderNetworks().UpdateStatus(context.Background(), newPn, metav1.UpdateOptions{})
×
380
                                if err != nil {
×
381
                                        klog.Errorf("failed to update status of provider network %s: %v", pn.Name, err)
×
382
                                        return err
×
383
                                }
×
384
                        }
385
                }
386
        }
387

388
        return nil
×
389
}
390

391
func (c *Controller) handleDeleteNode(key string) (err error) {
×
392
        c.nodeKeyMutex.LockKey(key)
×
393
        defer func() {
×
394
                _ = c.nodeKeyMutex.UnlockKey(key)
×
395
                if err == nil {
×
396
                        c.deletingNodeObjMap.Delete(key)
×
397
                }
×
398
        }()
399
        klog.Infof("handle delete node %s", key)
×
400

×
401
        node, ok := c.deletingNodeObjMap.Load(key)
×
402
        if !ok {
×
403
                return nil
×
404
        }
×
405
        n, _ := c.nodesLister.Get(key)
×
406
        if n != nil && n.UID != node.UID {
×
407
                klog.Warningf("Node %s is adding, skip the node delete handler, but it may leave some gc resources behind", key)
×
408
                return nil
×
409
        }
×
410
        return c.deleteNode(key)
×
411
}
412

413
func (c *Controller) deleteNode(key string) error {
×
414
        portName := util.NodeLspName(key)
×
415
        klog.Infof("delete logical switch port %s", portName)
×
416
        if err := c.OVNNbClient.DeleteLogicalSwitchPort(portName); err != nil {
×
417
                klog.Errorf("failed to delete node switch port %s: %v", portName, err)
×
418
                return err
×
419
        }
×
420
        if err := c.OVNSbClient.DeleteChassisByHost(key); err != nil {
×
421
                klog.Errorf("failed to delete chassis for node %s: %v", key, err)
×
422
                return err
×
423
        }
×
424

425
        for _, af := range [...]int{4, 6} {
×
426
                if err := c.deletePolicyRouteForLocalDNSCacheOnNode(key, af); err != nil {
×
427
                        klog.Error(err)
×
428
                        return err
×
429
                }
×
430
        }
431

432
        // ovn acl doesn't support address_set name with '-', so replace '-' by '.'
433
        pgName := strings.ReplaceAll(portName, "-", ".")
×
434
        if err := c.OVNNbClient.DeletePortGroup(pgName); err != nil {
×
435
                klog.Errorf("delete port group %s for node: %v", portName, err)
×
436
                return err
×
437
        }
×
438

439
        if err := c.deletePolicyRouteForNode(key, portName); err != nil {
×
440
                klog.Errorf("failed to delete policy route for node %s: %v", key, err)
×
441
                return err
×
442
        }
×
443

444
        if err := c.OVNNbClient.DeleteAddressSet(nodeUnderlayAddressSetName(key, 4)); err != nil {
×
445
                klog.Errorf("failed to delete address set for node %s: %v", key, err)
×
446
                return err
×
447
        }
×
448
        if err := c.OVNNbClient.DeleteAddressSet(nodeUnderlayAddressSetName(key, 6)); err != nil {
×
449
                klog.Errorf("failed to delete address set for node %s: %v", key, err)
×
450
                return err
×
451
        }
×
452

453
        klog.Infof("release node port %s", portName)
×
454
        c.ipam.ReleaseAddressByPod(portName, c.config.NodeSwitch)
×
455

×
456
        providerNetworks, err := c.providerNetworksLister.List(labels.Everything())
×
457
        if err != nil && !k8serrors.IsNotFound(err) {
×
458
                klog.Errorf("failed to list provider networks: %v", err)
×
459
                return err
×
460
        }
×
461

462
        for _, pn := range providerNetworks {
×
463
                if err = c.updateProviderNetworkForNodeDeletion(pn, key); err != nil {
×
464
                        klog.Error(err)
×
465
                        return err
×
466
                }
×
467
        }
468
        klog.Infof("delete node ip %s", portName)
×
469
        if err = c.config.KubeOvnClient.KubeovnV1().IPs().Delete(context.Background(), portName, metav1.DeleteOptions{}); err != nil && !k8serrors.IsNotFound(err) {
×
470
                return err
×
471
        }
×
472

473
        return nil
×
474
}
475

476
func (c *Controller) updateProviderNetworkForNodeDeletion(pn *kubeovnv1.ProviderNetwork, node string) error {
×
477
        // update provider network status
×
478
        var needUpdate bool
×
479
        newPn := pn.DeepCopy()
×
480
        if slices.Contains(newPn.Status.ReadyNodes, node) {
×
481
                newPn.Status.ReadyNodes = util.RemoveString(newPn.Status.ReadyNodes, node)
×
482
                needUpdate = true
×
483
        }
×
484
        if newPn.Status.RemoveNodeConditions(node) {
×
485
                needUpdate = true
×
486
        }
×
487
        if needUpdate {
×
488
                var err error
×
489
                newPn, err = c.config.KubeOvnClient.KubeovnV1().ProviderNetworks().UpdateStatus(context.Background(), newPn, metav1.UpdateOptions{})
×
490
                if err != nil {
×
491
                        klog.Errorf("failed to update status of provider network %s: %v", pn.Name, err)
×
492
                        return err
×
493
                }
×
494
        }
495

496
        // update provider network spec
497
        pn, newPn = newPn, nil
×
498
        if excludeNodes := util.RemoveString(pn.Spec.ExcludeNodes, node); len(excludeNodes) != len(pn.Spec.ExcludeNodes) {
×
499
                newPn = pn.DeepCopy()
×
500
                newPn.Spec.ExcludeNodes = excludeNodes
×
501
        }
×
502

503
        var changed bool
×
504
        customInterfaces := make([]kubeovnv1.CustomInterface, 0, len(pn.Spec.CustomInterfaces))
×
505
        for _, ci := range pn.Spec.CustomInterfaces {
×
506
                nodes := util.RemoveString(ci.Nodes, node)
×
507
                if !changed {
×
508
                        changed = len(nodes) == 0 || len(nodes) != len(ci.Nodes)
×
509
                }
×
510
                if len(nodes) != 0 {
×
511
                        customInterfaces = append(customInterfaces, kubeovnv1.CustomInterface{Interface: ci.Interface, Nodes: nodes})
×
512
                }
×
513
        }
514
        if changed {
×
515
                newPn = pn.DeepCopy()
×
516
                newPn.Spec.CustomInterfaces = customInterfaces
×
517
        }
×
518
        if newPn != nil {
×
519
                if _, err := c.config.KubeOvnClient.KubeovnV1().ProviderNetworks().Update(context.Background(), newPn, metav1.UpdateOptions{}); err != nil {
×
520
                        klog.Errorf("failed to update provider network %s: %v", pn.Name, err)
×
521
                        return err
×
522
                }
×
523
        }
524

525
        return nil
×
526
}
527

528
func (c *Controller) handleUpdateNode(key string) error {
×
529
        c.nodeKeyMutex.LockKey(key)
×
530
        defer func() { _ = c.nodeKeyMutex.UnlockKey(key) }()
×
531
        klog.Infof("handle update node %s", key)
×
532

×
533
        node, err := c.nodesLister.Get(key)
×
534
        if err != nil {
×
535
                if k8serrors.IsNotFound(err) {
×
536
                        return nil
×
537
                }
×
538
                klog.Errorf("failed to get node %s: %v", key, err)
×
539
                return err
×
540
        }
541

542
        if err = c.handleNodeAnnotationsForProviderNetworks(node); err != nil {
×
543
                klog.Errorf("failed to handle annotations of node %s for provider networks: %v", node.Name, err)
×
544
                return err
×
545
        }
×
546

547
        subnets, err := c.subnetsLister.List(labels.Everything())
×
548
        if err != nil {
×
549
                klog.Errorf("failed to get subnets %v", err)
×
550
                return err
×
551
        }
×
552

553
        if err := c.UpdateChassisTag(node); err != nil {
×
554
                klog.Errorf("failed to update chassis tag for node %s: %v", node.Name, err)
×
555
                return err
×
556
        }
×
557
        if err := c.retryDelDupChassis(util.ChassisRetryMaxTimes, util.ChassisControllerRetryInterval, c.cleanDuplicatedChassis, node); err != nil {
×
558
                klog.Errorf("failed to clean duplicated chassis for node %s: %v", node.Name, err)
×
559
                return err
×
560
        }
×
561

562
        c.distributedSubnetNeedSync.Store(true)
×
563

×
564
        for _, cachedSubnet := range subnets {
×
565
                if cachedSubnet.Spec.GatewayType != kubeovnv1.GWCentralizedType {
×
566
                        continue
×
567
                }
568

569
                // For subnets using GatewayNodeSelectors, always trigger reconciliation
570
                // when node labels change, since the node might have been added or removed
571
                // from the gateway list
572
                if cachedSubnet.Spec.GatewayNode == "" && len(cachedSubnet.Spec.GatewayNodeSelectors) > 0 {
×
573
                        c.addOrUpdateSubnetQueue.Add(cachedSubnet.Name)
×
574
                        continue
×
575
                }
576

577
                if util.GatewayContains(cachedSubnet.Spec.GatewayNode, node.Name) {
×
578
                        if err := c.reconcileOvnDefaultVpcRoute(cachedSubnet); err != nil {
×
579
                                klog.Error(err)
×
580
                                return err
×
581
                        }
×
582
                }
583
        }
584

585
        return nil
×
586
}
587

588
func (c *Controller) syncDistributedSubnetRoutes() {
×
589
        if !c.distributedSubnetNeedSync.Swap(false) {
×
590
                return
×
591
        }
×
592

593
        klog.V(3).Infoln("start to sync distributed subnet routes")
×
594
        subnets, err := c.subnetsLister.List(labels.Everything())
×
595
        if err != nil {
×
596
                klog.Errorf("failed to list subnets: %v", err)
×
597
                c.distributedSubnetNeedSync.Store(true)
×
598
                return
×
599
        }
×
600

601
        for _, subnet := range subnets {
×
602
                if subnet.Spec.Vpc != c.config.ClusterRouter ||
×
603
                        subnet.Name == c.config.NodeSwitch ||
×
604
                        subnet.Spec.GatewayType != kubeovnv1.GWDistributedType ||
×
605
                        (subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway) {
×
606
                        continue
×
607
                }
608
                if err := c.reconcileDistributedSubnetRouteInDefaultVpc(subnet); err != nil {
×
609
                        klog.Errorf("failed to reconcile distributed subnet %s route: %v", subnet.Name, err)
×
610
                        c.distributedSubnetNeedSync.Store(true)
×
611
                }
×
612
        }
613
}
614

615
func (c *Controller) checkSubnetGateway() {
×
616
        if err := c.checkSubnetGatewayNode(); err != nil {
×
617
                klog.Errorf("failed to check subnet gateway node: %v", err)
×
618
        }
×
619
}
620

621
func (c *Controller) checkSubnetGatewayNode() error {
×
622
        klog.V(3).Infoln("start to check subnet gateway node")
×
623
        subnetList, err := c.subnetsLister.List(labels.Everything())
×
624
        if err != nil {
×
625
                klog.Errorf("failed to list subnets: %v", err)
×
626
                return err
×
627
        }
×
628
        nodes, err := c.nodesLister.List(labels.Everything())
×
629
        if err != nil {
×
630
                klog.Errorf("failed to list nodes: %v", err)
×
631
                return err
×
632
        }
×
633

634
        for _, subnet := range subnetList {
×
635
                if (subnet.Spec.Vlan != "" && (subnet.Spec.U2OInterconnection || !subnet.Spec.LogicalGateway)) ||
×
636
                        subnet.Spec.Vpc != c.config.ClusterRouter ||
×
637
                        subnet.Name == c.config.NodeSwitch ||
×
638
                        subnet.Spec.GatewayNode == "" ||
×
639
                        subnet.Spec.GatewayType != kubeovnv1.GWCentralizedType ||
×
640
                        !subnet.Spec.EnableEcmp {
×
641
                        continue
×
642
                }
643
                gwNodes := strings.Split(subnet.Spec.GatewayNode, ",")
×
644
                if len(gwNodes) < 2 {
×
645
                        continue
×
646
                }
647

648
                for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
649
                        nextHops, nameIPMap, err := c.getPolicyRouteParas(cidrBlock, util.GatewayRouterPolicyPriority)
×
650
                        if err != nil {
×
651
                                klog.Errorf("failed to get ecmp policy route paras for subnet %s: %v", subnet.Name, err)
×
652
                                continue
×
653
                        }
654
                        for _, node := range nodes {
×
655
                                ipStr := node.Annotations[util.IPAddressAnnotation]
×
656
                                for ip := range strings.SplitSeq(ipStr, ",") {
×
657
                                        if util.CheckProtocol(cidrBlock) != util.CheckProtocol(ip) {
×
658
                                                continue
×
659
                                        }
660

661
                                        exist := nameIPMap[node.Name] == ip
×
662
                                        if util.GatewayContains(subnet.Spec.GatewayNode, node.Name) {
×
663
                                                pinger, err := goping.NewPinger(ip)
×
664
                                                if err != nil {
×
665
                                                        return fmt.Errorf("failed to init pinger, %w", err)
×
666
                                                }
×
667
                                                pinger.SetPrivileged(true)
×
668

×
669
                                                count := 5
×
670
                                                pinger.Count = count
×
671
                                                pinger.Timeout = time.Duration(count) * time.Second
×
672
                                                pinger.Interval = 1 * time.Second
×
673

×
674
                                                var pingSucceeded bool
×
675
                                                pinger.OnRecv = func(_ *goping.Packet) {
×
676
                                                        pingSucceeded = true
×
677
                                                        pinger.Stop()
×
678
                                                }
×
679
                                                if err = pinger.Run(); err != nil {
×
680
                                                        klog.Errorf("failed to run pinger for destination %s: %v", ip, err)
×
681
                                                        return err
×
682
                                                }
×
683

684
                                                nodeIsReady := nodeReady(node)
×
685
                                                if !pingSucceeded || !nodeIsReady {
×
686
                                                        if exist {
×
687
                                                                if !pingSucceeded {
×
688
                                                                        klog.Warningf("failed to ping %s ip %s on node %s", util.NodeNic, ip, node.Name)
×
689
                                                                }
×
690
                                                                if !nodeIsReady {
×
691
                                                                        klog.Warningf("node %s is not ready", node.Name)
×
692
                                                                }
×
693
                                                                klog.Warningf("delete ecmp policy route for node %s ip %s", node.Name, ip)
×
694
                                                                nextHops.Remove(ip)
×
695
                                                                delete(nameIPMap, node.Name)
×
696
                                                                klog.Infof("update policy route for centralized subnet %s, nextHops %s", subnet.Name, nextHops)
×
697
                                                                if err = c.updatePolicyRouteForCentralizedSubnet(subnet.Name, cidrBlock, nextHops.List(), nameIPMap); err != nil {
×
698
                                                                        klog.Errorf("failed to delete ecmp policy route for subnet %s on node %s, %v", subnet.Name, node.Name, err)
×
699
                                                                        return err
×
700
                                                                }
×
701
                                                        }
702
                                                } else {
×
703
                                                        klog.V(3).Infof("succeeded to ping %s ip %s on node %s", util.NodeNic, ip, node.Name)
×
704
                                                        if !exist {
×
705
                                                                nextHops.Add(ip)
×
706
                                                                if nameIPMap == nil {
×
707
                                                                        nameIPMap = make(map[string]string, 1)
×
708
                                                                }
×
709
                                                                nameIPMap[node.Name] = ip
×
710
                                                                klog.Infof("update policy route for centralized subnet %s, nextHops %s", subnet.Name, nextHops)
×
711
                                                                if err = c.updatePolicyRouteForCentralizedSubnet(subnet.Name, cidrBlock, nextHops.List(), nameIPMap); err != nil {
×
712
                                                                        klog.Errorf("failed to add ecmp policy route for subnet %s on node %s, %v", subnet.Name, node.Name, err)
×
713
                                                                        return err
×
714
                                                                }
×
715
                                                        }
716
                                                }
717
                                        } else if exist {
×
718
                                                klog.Infof("subnet %s gateway nodes does not contain node %s, delete policy route for node ip %s", subnet.Name, node.Name, ip)
×
719
                                                nextHops.Remove(ip)
×
720
                                                delete(nameIPMap, node.Name)
×
721
                                                klog.Infof("update policy route for centralized subnet %s, nextHops %s", subnet.Name, nextHops)
×
722
                                                if err = c.updatePolicyRouteForCentralizedSubnet(subnet.Name, cidrBlock, nextHops.List(), nameIPMap); err != nil {
×
723
                                                        klog.Errorf("failed to delete ecmp policy route for subnet %s on node %s, %v", subnet.Name, node.Name, err)
×
724
                                                        return err
×
725
                                                }
×
726
                                        }
727
                                }
728
                        }
729
                }
730
        }
731
        return nil
×
732
}
733

734
func (c *Controller) cleanDuplicatedChassis(node *v1.Node) error {
×
735
        // if multi chassis has the same node name, delete all of them
×
736
        var err error
×
737
        if _, err := c.OVNSbClient.GetChassisByHost(node.Name); err == nil {
×
738
                return nil
×
739
        }
×
740
        klog.Errorf("failed to get chassis for node %s: %v", node.Name, err)
×
741
        if errors.Is(err, ovs.ErrOneNodeMultiChassis) {
×
742
                klog.Warningf("node %s has multiple chassis", node.Name)
×
743
                if err := c.OVNSbClient.DeleteChassisByHost(node.Name); err != nil {
×
744
                        klog.Errorf("failed to delete chassis for node %s: %v", node.Name, err)
×
745
                        return err
×
746
                }
×
747
        }
748
        return err
×
749
}
750

751
func (c *Controller) retryDelDupChassis(attempts, sleep int, f func(node *v1.Node) error, node *v1.Node) (err error) {
×
752
        i := 0
×
753
        for ; ; i++ {
×
754
                err = f(node)
×
755
                if err == nil {
×
756
                        return err
×
757
                }
×
758
                klog.Errorf("failed to delete duplicated chassis for node %s: %v", node.Name, err)
×
759
                if i >= (attempts - 1) {
×
760
                        break
×
761
                }
762
                time.Sleep(time.Duration(sleep) * time.Second)
×
763
        }
764
        if i >= (attempts - 1) {
×
765
                errMsg := errors.New("exhausting all attempts")
×
766
                klog.Error(errMsg)
×
767
                return errMsg
×
768
        }
×
769
        klog.V(3).Infof("finish check chassis")
×
770
        return nil
×
771
}
772

773
func (c *Controller) fetchPodsOnNode(nodeName string, pods []*v1.Pod) ([]string, error) {
×
774
        ports := make([]string, 0, len(pods))
×
775
        for _, pod := range pods {
×
NEW
776
                if pod.Spec.HostNetwork || pod.Spec.NodeName != nodeName || !isPodAlive(pod) {
×
777
                        continue
×
778
                }
779

780
                if pod.Annotations[util.LogicalRouterAnnotation] != c.config.ClusterRouter {
×
781
                        subnetName := pod.Annotations[util.LogicalSwitchAnnotation]
×
782
                        if subnetName == "" {
×
783
                                klog.V(4).Infof("Pod %s/%s is not on cluster router and has no logical switch annotation, skipping for VLAN check.", pod.Namespace, pod.Name)
×
784
                                continue
×
785
                        }
786

787
                        subnet, err := c.subnetsLister.Get(subnetName)
×
788
                        if err != nil {
×
789
                                klog.Errorf("failed to get subnet %s: %v", subnetName, err)
×
790
                                return nil, err
×
791
                        }
×
792

793
                        if subnet.Spec.Vlan == "" {
×
794
                                continue
×
795
                        }
796
                }
797

798
                podName := c.getNameByPod(pod)
×
799

×
800
                podNets, err := c.getPodKubeovnNets(pod)
×
801
                if err != nil {
×
802
                        klog.Errorf("failed to get pod nets %v", err)
×
803
                        return nil, err
×
804
                }
×
805

806
                for _, podNet := range podNets {
×
807
                        if !isOvnSubnet(podNet.Subnet) {
×
808
                                continue
×
809
                        }
810

811
                        if pod.Annotations != nil && pod.Annotations[fmt.Sprintf(util.AllocatedAnnotationTemplate, podNet.ProviderName)] == "true" {
×
812
                                ports = append(ports, ovs.PodNameToPortName(podName, pod.Namespace, podNet.ProviderName))
×
813
                        }
×
814
                }
815
        }
816
        return ports, nil
×
817
}
818

819
func (c *Controller) CheckNodePortGroup() {
×
820
        if err := c.checkAndUpdateNodePortGroup(); err != nil {
×
821
                klog.Errorf("check node port group status: %v", err)
×
822
        }
×
823
}
824

825
func (c *Controller) checkAndUpdateNodePortGroup() error {
×
826
        klog.V(3).Infoln("start to check node port-group status")
×
827
        var networkPolicyExists bool
×
828
        if c.config.EnableNP {
×
829
                np, _ := c.npsLister.List(labels.Everything())
×
830
                networkPolicyExists = len(np) != 0
×
831
        }
×
832

833
        nodes, err := c.nodesLister.List(labels.Everything())
×
834
        if err != nil {
×
835
                klog.Errorf("list nodes: %v", err)
×
836
                return err
×
837
        }
×
838

839
        pods, err := c.podsLister.List(labels.Everything())
×
840
        if err != nil {
×
841
                klog.Errorf("list pods, %v", err)
×
842
                return err
×
843
        }
×
844

845
        for _, node := range nodes {
×
846
                // The port-group should already created when add node
×
847
                pgName := strings.ReplaceAll(node.Annotations[util.PortNameAnnotation], "-", ".")
×
848

×
849
                // use join IP only when no internal IP exists
×
850
                nodeIPv4, nodeIPv6 := util.GetNodeInternalIP(*node)
×
851
                joinIP := node.Annotations[util.IPAddressAnnotation]
×
852
                joinIPv4, joinIPv6 := util.SplitStringIP(joinIP)
×
853
                if nodeIPv4 == "" {
×
854
                        nodeIPv4 = joinIPv4
×
855
                }
×
856
                if nodeIPv6 == "" {
×
857
                        nodeIPv6 = joinIPv6
×
858
                }
×
859
                nodeIP := strings.Trim(fmt.Sprintf("%s,%s", nodeIPv4, nodeIPv6), ",")
×
860

×
861
                nodePorts, err := c.fetchPodsOnNode(node.Name, pods)
×
862
                if err != nil {
×
863
                        klog.Errorf("fetch pods for node %v: %v", node.Name, err)
×
864
                        return err
×
865
                }
×
866

867
                if err = c.OVNNbClient.PortGroupSetPorts(pgName, nodePorts); err != nil {
×
868
                        klog.Errorf("failed to set ports of port group %s: %v", pgName, err)
×
869
                        return err
×
870
                }
×
871

872
                if networkPolicyExists {
×
873
                        if err := c.OVNNbClient.CreateNodeACL(pgName, nodeIP, joinIP); err != nil {
×
874
                                klog.Errorf("create node acl for node pg %s: %v", pgName, err)
×
875
                        }
×
876
                } else {
×
877
                        // clear all acl
×
878
                        if err = c.OVNNbClient.DeleteAcls(pgName, portGroupKey, "", nil); err != nil {
×
879
                                klog.Errorf("delete node acl for node pg %s: %v", pgName, err)
×
880
                        }
×
881
                }
882
        }
883

884
        return nil
×
885
}
886

887
func (c *Controller) UpdateChassisTag(node *v1.Node) error {
×
888
        annoChassisName := node.Annotations[util.ChassisAnnotation]
×
889
        if annoChassisName == "" {
×
890
                // kube-ovn-cni not ready to set chassis
×
891
                return nil
×
892
        }
×
893
        chassis, err := c.OVNSbClient.GetChassis(annoChassisName, true)
×
894
        if err != nil {
×
895
                klog.Errorf("failed to get chassis %s for node %s: %v", annoChassisName, node.Name, err)
×
896
                return err
×
897
        }
×
898
        if chassis == nil {
×
899
                klog.Infof("chassis %q not registered for node %s, do chassis gc once", annoChassisName, node.Name)
×
900
                // chassis name conflict, do GC
×
901
                if err = c.gcChassis(); err != nil {
×
902
                        klog.Errorf("failed to gc chassis: %v", err)
×
903
                        return err
×
904
                }
×
905
                err = &ErrChassisNotFound{Chassis: annoChassisName, Node: node.Name}
×
906
                klog.Error(err)
×
907
                return err
×
908
        }
909

910
        if chassis.ExternalIDs == nil || chassis.ExternalIDs["vendor"] != util.CniTypeName {
×
911
                klog.Infof("init tag %s for node %s chassis %s", util.CniTypeName, node.Name, chassis.Name)
×
912
                if err = c.OVNSbClient.UpdateChassisTag(chassis.Name, node.Name); err != nil {
×
913
                        err := fmt.Errorf("failed to init chassis tag, %w", err)
×
914
                        klog.Error(err)
×
915
                        return err
×
916
                }
×
917
        }
918
        return nil
×
919
}
920

921
func (c *Controller) addNodeGatewayStaticRoute() error {
×
922
        // If user not manage static route for default vpc, just add route about ovn-default to join
×
923
        if vpc, err := c.vpcsLister.Get(c.config.ClusterRouter); err != nil || vpc.Spec.StaticRoutes != nil {
×
924
                existRoute, err := c.OVNNbClient.ListLogicalRouterStaticRoutes(c.config.ClusterRouter, nil, nil, "", nil)
×
925
                if err != nil {
×
926
                        klog.Errorf("failed to get vpc %s static route list, %v", c.config.ClusterRouter, err)
×
927
                }
×
928
                if len(existRoute) != 0 {
×
929
                        klog.Infof("skip add static route for node gw")
×
930
                        return nil
×
931
                }
×
932
        }
933
        dstCidr := "0.0.0.0/0,::/0"
×
934
        for cidrBlock := range strings.SplitSeq(dstCidr, ",") {
×
935
                for nextHop := range strings.SplitSeq(c.config.NodeSwitchGateway, ",") {
×
936
                        if util.CheckProtocol(cidrBlock) != util.CheckProtocol(nextHop) {
×
937
                                continue
×
938
                        }
939

940
                        if err := c.addStaticRouteToVpc(
×
941
                                c.config.ClusterRouter,
×
942
                                &kubeovnv1.StaticRoute{
×
943
                                        Policy:     kubeovnv1.PolicyDst,
×
944
                                        CIDR:       cidrBlock,
×
945
                                        NextHopIP:  nextHop,
×
946
                                        RouteTable: util.MainRouteTable,
×
947
                                },
×
948
                        ); err != nil {
×
949
                                klog.Errorf("failed to add static route for node gw: %v", err)
×
950
                                return err
×
951
                        }
×
952
                }
953
        }
954
        return nil
×
955
}
956

957
func (c *Controller) getPolicyRouteParas(cidr string, priority int) (*strset.Set, map[string]string, error) {
×
958
        ipSuffix := "ip4"
×
959
        if util.CheckProtocol(cidr) == kubeovnv1.ProtocolIPv6 {
×
960
                ipSuffix = "ip6"
×
961
        }
×
962
        match := fmt.Sprintf("%s.src == %s", ipSuffix, cidr)
×
963
        policyList, err := c.OVNNbClient.GetLogicalRouterPolicy(c.config.ClusterRouter, priority, match, true)
×
964
        if err != nil {
×
965
                klog.Errorf("failed to get logical router policy: %v", err)
×
966
                return nil, nil, err
×
967
        }
×
968
        if len(policyList) == 0 {
×
969
                return strset.New(), map[string]string{}, nil
×
970
        }
×
971
        return strset.New(policyList[0].Nexthops...), policyList[0].ExternalIDs, nil
×
972
}
973

974
func (c *Controller) deletePolicyRouteForNode(nodeName, portName string) error {
×
975
        subnets, err := c.subnetsLister.List(labels.Everything())
×
976
        if err != nil {
×
977
                klog.Errorf("get subnets: %v", err)
×
978
                return err
×
979
        }
×
980

981
        addresses := c.ipam.GetPodAddress(portName)
×
982
        for _, addr := range addresses {
×
983
                if addr.IP == "" {
×
984
                        continue
×
985
                }
986
                klog.Infof("deleting logical router policy with nexthop %q from %s for node %s", addr.IP, c.config.ClusterRouter, nodeName)
×
987
                if err = c.OVNNbClient.DeleteLogicalRouterPolicyByNexthop(c.config.ClusterRouter, util.NodeRouterPolicyPriority, addr.IP); err != nil {
×
988
                        klog.Errorf("failed to delete logical router policy with nexthop %q from %s for node %s: %v", addr.IP, c.config.ClusterRouter, nodeName, err)
×
989
                        return err
×
990
                }
×
991
        }
992

993
        for _, subnet := range subnets {
×
994
                if (subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway) || subnet.Spec.Vpc != c.config.ClusterRouter || subnet.Name == c.config.NodeSwitch {
×
995
                        continue
×
996
                }
997

998
                if subnet.Spec.GatewayType == kubeovnv1.GWDistributedType {
×
999
                        pgName := getOverlaySubnetsPortGroupName(subnet.Name, nodeName)
×
1000
                        if err = c.OVNNbClient.DeletePortGroup(pgName); err != nil {
×
1001
                                klog.Errorf("delete port group for subnet %s and node %s: %v", subnet.Name, nodeName, err)
×
1002
                                return err
×
1003
                        }
×
1004

1005
                        klog.Infof("delete policy route for distributed subnet %s, node %s", subnet.Name, nodeName)
×
1006
                        if err = c.deletePolicyRouteForDistributedSubnet(subnet, nodeName); err != nil {
×
1007
                                klog.Errorf("delete policy route for subnet %s and node %s: %v", subnet.Name, nodeName, err)
×
1008
                                return err
×
1009
                        }
×
1010
                }
1011

1012
                if subnet.Spec.GatewayType == kubeovnv1.GWCentralizedType {
×
1013
                        if subnet.Spec.EnableEcmp {
×
1014
                                for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
1015
                                        nextHops, nameIPMap, err := c.getPolicyRouteParas(cidrBlock, util.GatewayRouterPolicyPriority)
×
1016
                                        if err != nil {
×
1017
                                                klog.Errorf("get ecmp policy route paras for subnet %v, error %v", subnet.Name, err)
×
1018
                                                continue
×
1019
                                        }
1020

1021
                                        exist := false
×
1022
                                        if _, ok := nameIPMap[nodeName]; ok {
×
1023
                                                exist = true
×
1024
                                        }
×
1025

1026
                                        if exist {
×
1027
                                                nextHops.Remove(nameIPMap[nodeName])
×
1028
                                                delete(nameIPMap, nodeName)
×
1029

×
1030
                                                if nextHops.Size() == 0 {
×
1031
                                                        klog.Infof("delete policy route for centralized subnet %s, nextHops %s", subnet.Name, nextHops)
×
1032
                                                        if err := c.deletePolicyRouteForCentralizedSubnet(subnet); err != nil {
×
1033
                                                                klog.Errorf("failed to delete policy route for centralized subnet %s, %v", subnet.Name, err)
×
1034
                                                                return err
×
1035
                                                        }
×
1036
                                                } else {
×
1037
                                                        klog.Infof("update policy route for centralized subnet %s, nextHops %s", subnet.Name, nextHops)
×
1038
                                                        if err = c.updatePolicyRouteForCentralizedSubnet(subnet.Name, cidrBlock, nextHops.List(), nameIPMap); err != nil {
×
1039
                                                                klog.Errorf("failed to update policy route for subnet %s on node %s, %v", subnet.Name, nodeName, err)
×
1040
                                                                return err
×
1041
                                                        }
×
1042
                                                }
1043
                                        }
1044
                                }
1045
                        } else {
×
1046
                                klog.Infof("reconcile policy route for centralized subnet %s", subnet.Name)
×
1047
                                if err := c.reconcileDefaultCentralizedSubnetRouteInDefaultVpc(subnet); err != nil {
×
1048
                                        klog.Errorf("failed to delete policy route for centralized subnet %s, %v", subnet.Name, err)
×
1049
                                        return err
×
1050
                                }
×
1051
                        }
1052
                }
1053
        }
1054
        return nil
×
1055
}
1056

1057
func (c *Controller) addPolicyRouteForCentralizedSubnetOnNode(node *v1.Node, nodeIP string) error {
×
1058
        subnets, err := c.subnetsLister.List(labels.Everything())
×
1059
        if err != nil {
×
1060
                klog.Errorf("failed to get subnets %v", err)
×
1061
                return err
×
1062
        }
×
1063

1064
        for _, subnet := range subnets {
×
1065
                if (subnet.Spec.Vlan != "" && !subnet.Spec.LogicalGateway) || subnet.Spec.Vpc != c.config.ClusterRouter || subnet.Name == c.config.NodeSwitch || subnet.Spec.GatewayType != kubeovnv1.GWCentralizedType {
×
1066
                        continue
×
1067
                }
1068
                nodeName := node.Name
×
1069
                if subnet.Spec.EnableEcmp {
×
1070
                        if !util.GatewayContains(subnet.Spec.GatewayNode, nodeName) &&
×
1071
                                (subnet.Spec.GatewayNode != "" || !util.MatchLabelSelectors(subnet.Spec.GatewayNodeSelectors, node.Labels)) {
×
1072
                                continue
×
1073
                        }
1074

1075
                        for nextHop := range strings.SplitSeq(nodeIP, ",") {
×
1076
                                for cidrBlock := range strings.SplitSeq(subnet.Spec.CIDRBlock, ",") {
×
1077
                                        if util.CheckProtocol(cidrBlock) != util.CheckProtocol(nextHop) {
×
1078
                                                continue
×
1079
                                        }
1080

1081
                                        nextHops, nameIPMap, err := c.getPolicyRouteParas(cidrBlock, util.GatewayRouterPolicyPriority)
×
1082
                                        if err != nil {
×
1083
                                                klog.Errorf("get ecmp policy route paras for subnet %v, error %v", subnet.Name, err)
×
1084
                                                continue
×
1085
                                        }
1086
                                        if nameIPMap[nodeName] == nextHop {
×
1087
                                                continue
×
1088
                                        }
1089

1090
                                        nextHops.Add(nextHop)
×
1091
                                        if nameIPMap == nil {
×
1092
                                                nameIPMap = make(map[string]string, 1)
×
1093
                                        }
×
1094
                                        nameIPMap[nodeName] = nextHop
×
1095
                                        klog.Infof("update policy route for centralized subnet %s, nextHops %s", subnet.Name, nextHops)
×
1096
                                        if err = c.updatePolicyRouteForCentralizedSubnet(subnet.Name, cidrBlock, nextHops.List(), nameIPMap); err != nil {
×
1097
                                                klog.Errorf("failed to update policy route for subnet %s on node %s, %v", subnet.Name, nodeName, err)
×
1098
                                                return err
×
1099
                                        }
×
1100
                                }
1101
                        }
1102
                } else {
×
1103
                        if subnet.Status.ActivateGateway != nodeName {
×
1104
                                continue
×
1105
                        }
1106
                        klog.Infof("add policy route for centralized subnet %s, on node %s, ip %s", subnet.Name, nodeName, nodeIP)
×
1107
                        if err = c.addPolicyRouteForCentralizedSubnet(subnet, nodeName, nil, strings.Split(nodeIP, ",")); err != nil {
×
1108
                                klog.Errorf("failed to add active-backup policy route for centralized subnet %s: %v", subnet.Name, err)
×
1109
                                return err
×
1110
                        }
×
1111
                }
1112
        }
1113
        return nil
×
1114
}
1115

1116
func (c *Controller) addPolicyRouteForLocalDNSCacheOnNode(dnsIPs []string, nodePortName, nodeIP, nodeName string, af int) error {
×
1117
        if len(dnsIPs) == 0 {
×
1118
                return c.deletePolicyRouteForLocalDNSCacheOnNode(nodeName, af)
×
1119
        }
×
1120

1121
        var (
×
1122
                externalIDs = map[string]string{
×
1123
                        "vendor":          util.CniTypeName,
×
1124
                        "node":            nodeName,
×
1125
                        "address-family":  strconv.Itoa(af),
×
1126
                        "isLocalDnsCache": "true",
×
1127
                }
×
1128
                pgAs     = strings.ReplaceAll(fmt.Sprintf("%s_ip%d", nodePortName, af), "-", ".")
×
1129
                action   = kubeovnv1.PolicyRouteActionReroute
×
1130
                nextHops = []string{nodeIP}
×
1131
        )
×
1132
        matches := strset.NewWithSize(len(dnsIPs))
×
1133
        for _, ip := range dnsIPs {
×
1134
                matches.Add(fmt.Sprintf("ip%d.src == $%s && ip%d.dst == %s", af, pgAs, af, ip))
×
1135
        }
×
1136

1137
        policies, err := c.OVNNbClient.GetLogicalRouterPoliciesByExtID(c.config.ClusterRouter, "node", nodeName)
×
1138
        if err != nil {
×
1139
                klog.Errorf("failed to list logical router policies with external-ids:node = %q: %v", nodeName, err)
×
1140
                return err
×
1141
        }
×
1142

1143
        for _, policy := range policies {
×
1144
                if len(policy.ExternalIDs) == 0 || policy.ExternalIDs["vendor"] != util.CniTypeName || policy.ExternalIDs["isLocalDnsCache"] != "true" {
×
1145
                        continue
×
1146
                }
1147
                if policy.Priority == util.NodeRouterPolicyPriority && policy.Action == string(action) && slices.Equal(policy.Nexthops, nextHops) && matches.Has(policy.Match) {
×
1148
                        matches.Remove(policy.Match)
×
1149
                        continue
×
1150
                }
1151
                // delete unused policy router policy
1152
                klog.Infof("deleting logical router policy by UUID %s", policy.UUID)
×
1153
                if err = c.OVNNbClient.DeleteLogicalRouterPolicyByUUID(c.config.ClusterRouter, policy.UUID); err != nil {
×
1154
                        klog.Errorf("failed to delete logical router policy by UUID %s: %v", policy.UUID, err)
×
1155
                        return err
×
1156
                }
×
1157
        }
1158

1159
        for _, match := range matches.List() {
×
1160
                klog.Infof("add node local dns cache policy route for router %s: match %q, action %q, nexthop %q, externalID %v", c.config.ClusterRouter, match, action, nodeIP, externalIDs)
×
1161
                if err := c.addPolicyRouteToVpc(
×
1162
                        c.config.ClusterRouter,
×
1163
                        &kubeovnv1.PolicyRoute{
×
1164
                                Priority:  util.NodeRouterPolicyPriority,
×
1165
                                Match:     match,
×
1166
                                Action:    action,
×
1167
                                NextHopIP: nodeIP,
×
1168
                        },
×
1169
                        externalIDs,
×
1170
                ); err != nil {
×
1171
                        klog.Errorf("failed to add logical router policy for node %s: %v", nodeName, err)
×
1172
                        return err
×
1173
                }
×
1174
        }
1175

1176
        return nil
×
1177
}
1178

1179
func (c *Controller) deletePolicyRouteForLocalDNSCacheOnNode(nodeName string, af int) error {
×
1180
        policies, err := c.OVNNbClient.ListLogicalRouterPolicies(c.config.ClusterRouter, -1, map[string]string{
×
1181
                "vendor":          util.CniTypeName,
×
1182
                "node":            nodeName,
×
1183
                "address-family":  strconv.Itoa(af),
×
1184
                "isLocalDnsCache": "true",
×
1185
        }, true)
×
1186
        if err != nil {
×
1187
                klog.Errorf("failed to list logical router policies: %v", err)
×
1188
                return err
×
1189
        }
×
1190
        if len(policies) == 0 {
×
1191
                return nil
×
1192
        }
×
1193

1194
        for _, policy := range policies {
×
1195
                klog.Infof("delete node local dns cache policy route for router %s with match %s", c.config.ClusterRouter, policy.Match)
×
1196

×
1197
                if err := c.OVNNbClient.DeleteLogicalRouterPolicyByUUID(c.config.ClusterRouter, policy.UUID); err != nil {
×
1198
                        klog.Errorf("failed to delete policy route for node local dns in router %s with match %s: %v", c.config.ClusterRouter, policy.Match, err)
×
1199
                        return err
×
1200
                }
×
1201
        }
1202
        return nil
×
1203
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc