• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 20710698427

05 Jan 2026 09:19AM UTC coverage: 22.584%. Remained the same
20710698427

push

github

web-flow
set transform on informers to remove objects' managed fields (#6119)

Signed-off-by: zhangzujian <zhangzujian.7@gmail.com>

10 of 94 new or added lines in 20 files covered. (10.64%)

1 existing line in 1 file now uncovered.

12076 of 53471 relevant lines covered (22.58%)

0.26 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/pkg/controller/init.go
1
package controller
2

3
import (
4
        "context"
5
        "errors"
6
        "fmt"
7
        "maps"
8
        "strings"
9
        "time"
10

11
        "github.com/scylladb/go-set/strset"
12
        v1 "k8s.io/api/core/v1"
13
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
14
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
15
        "k8s.io/apimachinery/pkg/labels"
16
        "k8s.io/apimachinery/pkg/types"
17
        "k8s.io/client-go/tools/cache"
18
        "k8s.io/klog/v2"
19
        "k8s.io/utils/ptr"
20
        "sigs.k8s.io/controller-runtime/pkg/client"
21
        "sigs.k8s.io/controller-runtime/pkg/client/config"
22
        "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
23

24
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
25
        "github.com/kubeovn/kube-ovn/pkg/ovs"
26
        "github.com/kubeovn/kube-ovn/pkg/ovsdb/ovnnb"
27
        "github.com/kubeovn/kube-ovn/pkg/util"
28
)
29

30
func (c *Controller) InitOVN() error {
×
31
        var err error
×
32

×
33
        // migrate vendor externalIDs to kube-ovn resources created in versions prior to v1.15.0
×
34
        // this must run before ACL cleanup to ensure existing resources are properly tagged
×
35
        if err = c.OVNNbClient.MigrateVendorExternalIDs(); err != nil {
×
36
                klog.Errorf("failed to migrate vendor externalIDs: %v", err)
×
37
                return err
×
38
        }
×
39

40
        // migrate tier field of ACL rules created in versions prior to v1.13.0
41
        // after upgrading, the tier field has a default value of zero, which is not the value used in versions >= v1.13.0
42
        // we need to migrate the tier field to the correct value
43
        if err = c.OVNNbClient.MigrateACLTier(); err != nil {
×
44
                klog.Errorf("failed to migrate ACL tier: %v", err)
×
45
                return err
×
46
        }
×
47

48
        // clean all no parent key acls
49
        if err = c.OVNNbClient.CleanNoParentKeyAcls(); err != nil {
×
50
                klog.Errorf("failed to clean all no parent key acls: %v", err)
×
51
                return err
×
52
        }
×
53

54
        if err = c.InitDefaultVpc(); err != nil {
×
55
                klog.Errorf("init default vpc failed: %v", err)
×
56
                return err
×
57
        }
×
58

59
        if err = c.initClusterRouter(); err != nil {
×
60
                klog.Errorf("init cluster router failed: %v", err)
×
61
                return err
×
62
        }
×
63

64
        if c.config.EnableLb {
×
65
                if err = c.initLoadBalancer(); err != nil {
×
66
                        klog.Errorf("init load balancer failed: %v", err)
×
67
                        return err
×
68
                }
×
69
        }
70

71
        if err = c.initDefaultVlan(); err != nil {
×
72
                klog.Errorf("init default vlan failed: %v", err)
×
73
                return err
×
74
        }
×
75

76
        if err = c.initNodeSwitch(); err != nil {
×
77
                klog.Errorf("init node switch failed: %v", err)
×
78
                return err
×
79
        }
×
80

81
        if err = c.initDefaultLogicalSwitch(); err != nil {
×
82
                klog.Errorf("init default switch failed: %v", err)
×
83
                return err
×
84
        }
×
85

86
        return nil
×
87
}
88

89
func (c *Controller) InitDefaultVpc() error {
×
90
        cachedVpc, err := c.vpcsLister.Get(c.config.ClusterRouter)
×
91
        if err != nil {
×
92
                if !k8serrors.IsNotFound(err) {
×
93
                        klog.Errorf("failed to get default vpc %q: %v", c.config.ClusterRouter, err)
×
94
                        return err
×
95
                }
×
96
                // create default vpc
97
                vpc := &kubeovnv1.Vpc{
×
98
                        ObjectMeta: metav1.ObjectMeta{Name: c.config.ClusterRouter},
×
99
                }
×
100
                cachedVpc, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Create(context.Background(), vpc, metav1.CreateOptions{})
×
101
                if err != nil {
×
102
                        klog.Errorf("failed to create default vpc %q: %v", c.config.ClusterRouter, err)
×
103
                        return err
×
104
                }
×
105
        }
106

107
        // update default vpc status
108
        vpc := cachedVpc.DeepCopy()
×
109
        if !vpc.Status.Default || !vpc.Status.Standby ||
×
110
                vpc.Status.Router != c.config.ClusterRouter ||
×
111
                vpc.Status.DefaultLogicalSwitch != c.config.DefaultLogicalSwitch {
×
112
                vpc.Status.Standby = true
×
113
                vpc.Status.Default = true
×
114
                vpc.Status.Router = c.config.ClusterRouter
×
115
                vpc.Status.DefaultLogicalSwitch = c.config.DefaultLogicalSwitch
×
116

×
117
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().UpdateStatus(context.Background(), vpc, metav1.UpdateOptions{}); err != nil {
×
118
                        klog.Errorf("failed to update default vpc %q: %v", c.config.ClusterRouter, err)
×
119
                        return err
×
120
                }
×
121
        }
122

123
        return nil
×
124
}
125

126
// InitDefaultLogicalSwitch init the default logical switch for ovn network
127
func (c *Controller) initDefaultLogicalSwitch() error {
×
128
        subnet, err := c.subnetsLister.Get(c.config.DefaultLogicalSwitch)
×
129
        if err == nil {
×
130
                if subnet != nil && util.CheckProtocol(c.config.DefaultCIDR) != util.CheckProtocol(subnet.Spec.CIDRBlock) {
×
131
                        // single-stack upgrade to dual-stack
×
132
                        if util.CheckProtocol(c.config.DefaultCIDR) == kubeovnv1.ProtocolDual {
×
133
                                subnet := subnet.DeepCopy()
×
134
                                subnet.Spec.CIDRBlock = c.config.DefaultCIDR
×
135
                                if _, err = c.formatSubnet(subnet); err != nil {
×
136
                                        klog.Errorf("init format subnet %s failed: %v", c.config.DefaultLogicalSwitch, err)
×
137
                                        return err
×
138
                                }
×
139
                        }
140
                }
141
                return nil
×
142
        }
143

144
        if !k8serrors.IsNotFound(err) {
×
145
                klog.Errorf("get default subnet %s failed: %v", c.config.DefaultLogicalSwitch, err)
×
146
                return err
×
147
        }
×
148

149
        defaultSubnet := kubeovnv1.Subnet{
×
150
                ObjectMeta: metav1.ObjectMeta{Name: c.config.DefaultLogicalSwitch},
×
151
                Spec: kubeovnv1.SubnetSpec{
×
152
                        Vpc:                 c.config.ClusterRouter,
×
153
                        Default:             true,
×
154
                        Provider:            util.OvnProvider,
×
155
                        CIDRBlock:           c.config.DefaultCIDR,
×
156
                        Gateway:             c.config.DefaultGateway,
×
157
                        GatewayNode:         "",
×
158
                        DisableGatewayCheck: !c.config.DefaultGatewayCheck,
×
159
                        ExcludeIps:          strings.Split(c.config.DefaultExcludeIps, ","),
×
160
                        NatOutgoing:         true,
×
161
                        GatewayType:         kubeovnv1.GWDistributedType,
×
162
                        Protocol:            util.CheckProtocol(c.config.DefaultCIDR),
×
163
                        EnableLb:            &c.config.EnableLb,
×
164
                },
×
165
        }
×
166
        if c.config.NetworkType == util.NetworkTypeVlan {
×
167
                defaultSubnet.Spec.Vlan = c.config.DefaultVlanName
×
168
                if c.config.DefaultLogicalGateway && c.config.DefaultU2OInterconnection {
×
169
                        err = errors.New("logicalGateway and u2oInterconnection can't be opened at the same time")
×
170
                        klog.Error(err)
×
171
                        return err
×
172
                }
×
173
                defaultSubnet.Spec.LogicalGateway = c.config.DefaultLogicalGateway
×
174
                defaultSubnet.Spec.U2OInterconnection = c.config.DefaultU2OInterconnection
×
175
        }
176

177
        if _, err = c.config.KubeOvnClient.KubeovnV1().Subnets().Create(context.Background(), &defaultSubnet, metav1.CreateOptions{}); err != nil {
×
178
                klog.Errorf("failed to create default subnet %q: %v", c.config.DefaultLogicalSwitch, err)
×
179
                return err
×
180
        }
×
181
        return nil
×
182
}
183

184
// InitNodeSwitch init node switch to connect host and pod
185
func (c *Controller) initNodeSwitch() error {
×
186
        subnet, err := c.subnetsLister.Get(c.config.NodeSwitch)
×
187
        if err == nil {
×
188
                if util.CheckProtocol(c.config.NodeSwitchCIDR) == kubeovnv1.ProtocolDual && util.CheckProtocol(subnet.Spec.CIDRBlock) != kubeovnv1.ProtocolDual {
×
189
                        // single-stack upgrade to dual-stack
×
190
                        subnet := subnet.DeepCopy()
×
191
                        subnet.Spec.CIDRBlock = c.config.NodeSwitchCIDR
×
192
                        if _, err = c.formatSubnet(subnet); err != nil {
×
193
                                klog.Errorf("init format subnet %s failed: %v", c.config.NodeSwitch, err)
×
194
                                return err
×
195
                        }
×
196
                } else {
×
197
                        c.config.NodeSwitchCIDR = subnet.Spec.CIDRBlock
×
198
                }
×
199
                return nil
×
200
        }
201

202
        if !k8serrors.IsNotFound(err) {
×
203
                klog.Errorf("get node subnet %s failed: %v", c.config.NodeSwitch, err)
×
204
                return err
×
205
        }
×
206

207
        nodeSubnet := kubeovnv1.Subnet{
×
208
                ObjectMeta: metav1.ObjectMeta{Name: c.config.NodeSwitch},
×
209
                Spec: kubeovnv1.SubnetSpec{
×
210
                        Vpc:                    c.config.ClusterRouter,
×
211
                        Default:                false,
×
212
                        Provider:               util.OvnProvider,
×
213
                        CIDRBlock:              c.config.NodeSwitchCIDR,
×
214
                        Gateway:                c.config.NodeSwitchGateway,
×
215
                        GatewayNode:            "",
×
216
                        ExcludeIps:             strings.Split(c.config.NodeSwitchGateway, ","),
×
217
                        Protocol:               util.CheckProtocol(c.config.NodeSwitchCIDR),
×
218
                        DisableInterConnection: true,
×
219
                },
×
220
        }
×
221

×
222
        if _, err = c.config.KubeOvnClient.KubeovnV1().Subnets().Create(context.Background(), &nodeSubnet, metav1.CreateOptions{}); err != nil {
×
223
                klog.Errorf("failed to create node subnet %q: %v", c.config.NodeSwitch, err)
×
224
                return err
×
225
        }
×
226
        return nil
×
227
}
228

229
// InitClusterRouter init cluster router to connect different logical switches
230
func (c *Controller) initClusterRouter() error {
×
231
        if err := c.OVNNbClient.CreateLogicalRouter(c.config.ClusterRouter); err != nil {
×
232
                klog.Errorf("create logical router %s failed: %v", c.config.ClusterRouter, err)
×
233
                return err
×
234
        }
×
235

236
        lr, err := c.OVNNbClient.GetLogicalRouter(c.config.ClusterRouter, false)
×
237
        if err != nil {
×
238
                klog.Errorf("get logical router %s failed: %v", c.config.ClusterRouter, err)
×
239
                return err
×
240
        }
×
241

242
        lrOptions := make(map[string]string, len(lr.Options))
×
243
        maps.Copy(lrOptions, lr.Options)
×
244
        lrOptions["mac_binding_age_threshold"] = "300"
×
245
        lrOptions["dynamic_neigh_routers"] = "true"
×
246
        if !maps.Equal(lr.Options, lrOptions) {
×
247
                lr.Options = lrOptions
×
248
                if err = c.OVNNbClient.UpdateLogicalRouter(lr, &lr.Options); err != nil {
×
249
                        klog.Errorf("update logical router %s failed: %v", c.config.ClusterRouter, err)
×
250
                        return err
×
251
                }
×
252
        }
253

254
        return nil
×
255
}
256

257
func (c *Controller) initLB(name, protocol string, sessionAffinity bool) error {
×
258
        protocol = strings.ToLower(protocol)
×
259

×
260
        var (
×
261
                selectFields string
×
262
                err          error
×
263
        )
×
264

×
265
        if sessionAffinity {
×
266
                selectFields = ovnnb.LoadBalancerSelectionFieldsIPSrc
×
267
        }
×
268

269
        if err = c.OVNNbClient.CreateLoadBalancer(name, protocol, selectFields); err != nil {
×
270
                klog.Errorf("create load balancer %s: %v", name, err)
×
271
                return err
×
272
        }
×
273

274
        if sessionAffinity {
×
275
                if err = c.OVNNbClient.SetLoadBalancerAffinityTimeout(name, util.DefaultServiceSessionStickinessTimeout); err != nil {
×
276
                        klog.Errorf("failed to set affinity timeout of %s load balancer %s: %v", protocol, name, err)
×
277
                        return err
×
278
                }
×
279
        }
280

281
        err = c.OVNNbClient.SetLoadBalancerPreferLocalBackend(name, c.config.EnableOVNLBPreferLocal)
×
282
        if err != nil {
×
283
                klog.Errorf("failed to set prefer local backend for load balancer %s: %v", name, err)
×
284
                return err
×
285
        }
×
286

287
        return nil
×
288
}
289

290
// InitLoadBalancer init the default tcp and udp cluster loadbalancer
291
func (c *Controller) initLoadBalancer() error {
×
292
        vpcs, err := c.vpcsLister.List(labels.Everything())
×
293
        if err != nil {
×
294
                klog.Errorf("failed to list vpc: %v", err)
×
295
                return err
×
296
        }
×
297

298
        for _, cachedVpc := range vpcs {
×
299
                vpc := cachedVpc.DeepCopy()
×
300
                vpcLb := c.GenVpcLoadBalancer(vpc.Name)
×
301
                if err = c.initLB(vpcLb.TCPLoadBalancer, string(v1.ProtocolTCP), false); err != nil {
×
302
                        klog.Error(err)
×
303
                        return err
×
304
                }
×
305
                if err = c.initLB(vpcLb.TCPSessLoadBalancer, string(v1.ProtocolTCP), true); err != nil {
×
306
                        klog.Error(err)
×
307
                        return err
×
308
                }
×
309
                if err = c.initLB(vpcLb.UDPLoadBalancer, string(v1.ProtocolUDP), false); err != nil {
×
310
                        klog.Error(err)
×
311
                        return err
×
312
                }
×
313
                if err = c.initLB(vpcLb.UDPSessLoadBalancer, string(v1.ProtocolUDP), true); err != nil {
×
314
                        klog.Error(err)
×
315
                        return err
×
316
                }
×
317
                if err = c.initLB(vpcLb.SctpLoadBalancer, string(v1.ProtocolSCTP), false); err != nil {
×
318
                        klog.Error(err)
×
319
                        return err
×
320
                }
×
321
                if err = c.initLB(vpcLb.SctpSessLoadBalancer, string(v1.ProtocolSCTP), true); err != nil {
×
322
                        klog.Error(err)
×
323
                        return err
×
324
                }
×
325

326
                vpc.Status.TCPLoadBalancer = vpcLb.TCPLoadBalancer
×
327
                vpc.Status.TCPSessionLoadBalancer = vpcLb.TCPSessLoadBalancer
×
328
                vpc.Status.UDPLoadBalancer = vpcLb.UDPLoadBalancer
×
329
                vpc.Status.UDPSessionLoadBalancer = vpcLb.UDPSessLoadBalancer
×
330
                vpc.Status.SctpLoadBalancer = vpcLb.SctpLoadBalancer
×
331
                vpc.Status.SctpSessionLoadBalancer = vpcLb.SctpSessLoadBalancer
×
332
                bytes, err := vpc.Status.Bytes()
×
333
                if err != nil {
×
334
                        klog.Error(err)
×
335
                        return err
×
336
                }
×
337
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Patch(context.Background(), vpc.Name, types.MergePatchType, bytes, metav1.PatchOptions{}, "status"); err != nil {
×
338
                        klog.Error(err)
×
339
                        return err
×
340
                }
×
341
        }
342
        return nil
×
343
}
344

345
func (c *Controller) InitIPAM() error {
×
346
        start := time.Now()
×
347
        subnets, err := c.subnetsLister.List(labels.Everything())
×
348
        if err != nil {
×
349
                klog.Errorf("failed to list subnet: %v", err)
×
350
                return err
×
351
        }
×
352
        subnetProviderMaps := make(map[string]string, len(subnets))
×
353
        for _, subnet := range subnets {
×
354
                klog.Infof("Init subnet %s", subnet.Name)
×
355
                subnetProviderMaps[subnet.Name] = subnet.Spec.Provider
×
356
                if err := c.ipam.AddOrUpdateSubnet(subnet.Name, subnet.Spec.CIDRBlock, subnet.Spec.Gateway, subnet.Spec.ExcludeIps); err != nil {
×
357
                        klog.Errorf("failed to init subnet %s: %v", subnet.Name, err)
×
358
                }
×
359

360
                u2oInterconnName := fmt.Sprintf(util.U2OInterconnName, subnet.Spec.Vpc, subnet.Name)
×
361
                u2oInterconnLrpName := fmt.Sprintf("%s-%s", subnet.Spec.Vpc, subnet.Name)
×
362
                if subnet.Status.U2OInterconnectionIP != "" {
×
363
                        var mac *string
×
364
                        klog.Infof("Init U2O for subnet %s", subnet.Name)
×
365
                        if subnet.Status.U2OInterconnectionMAC != "" {
×
366
                                mac = ptr.To(subnet.Status.U2OInterconnectionMAC)
×
367
                        } else {
×
368
                                lrp, err := c.OVNNbClient.GetLogicalRouterPort(u2oInterconnLrpName, true)
×
369
                                if err != nil {
×
370
                                        klog.Errorf("failed to get logical router port %s: %v", u2oInterconnLrpName, err)
×
371
                                        return err
×
372
                                }
×
373
                                if lrp != nil {
×
374
                                        mac = ptr.To(lrp.MAC)
×
375
                                }
×
376
                        }
377
                        if _, _, _, err = c.ipam.GetStaticAddress(u2oInterconnName, u2oInterconnLrpName, subnet.Status.U2OInterconnectionIP, mac, subnet.Name, true); err != nil {
×
378
                                klog.Errorf("failed to init subnet %q u2o interconnection ip to ipam %v", subnet.Name, err)
×
379
                        }
×
380
                }
381
        }
382

383
        ippools, err := c.ippoolLister.List(labels.Everything())
×
384
        if err != nil {
×
385
                klog.Errorf("failed to list ippool: %v", err)
×
386
                return err
×
387
        }
×
388
        for _, ippool := range ippools {
×
389
                if err = c.ipam.AddOrUpdateIPPool(ippool.Spec.Subnet, ippool.Name, ippool.Spec.IPs); err != nil {
×
390
                        klog.Errorf("failed to init ippool %s: %v", ippool.Name, err)
×
391
                }
×
392
        }
393

394
        klog.Infof("Init IPAM from StatefulSet or VM IP CR")
×
395
        ips, err := c.ipsLister.List(labels.Everything())
×
396
        if err != nil {
×
397
                klog.Errorf("failed to list IPs: %v", err)
×
398
                return err
×
399
        }
×
400

401
        for _, ip := range ips {
×
402
                if !ip.DeletionTimestamp.IsZero() {
×
403
                        klog.Infof("enqueue update for removing finalizer to delete ip %s", ip.Name)
×
404
                        c.updateIPQueue.Add(ip.Name)
×
405
                        continue
×
406
                }
407
                // recover sts and kubevirt vm ip, other ip recover in later pod loop
408
                if ip.Spec.PodType != util.KindStatefulSet &&
×
409
                        ip.Spec.PodType != util.KindVirtualMachine {
×
410
                        continue
×
411
                }
412

413
                var ipamKey string
×
414
                if ip.Spec.Namespace != "" {
×
415
                        ipamKey = fmt.Sprintf("%s/%s", ip.Spec.Namespace, ip.Spec.PodName)
×
416
                } else {
×
417
                        ipamKey = util.NodeLspName(ip.Spec.PodName)
×
418
                }
×
419
                if _, _, _, err = c.ipam.GetStaticAddress(ipamKey, ip.Name, ip.Spec.IPAddress, &ip.Spec.MacAddress, ip.Spec.Subnet, true); err != nil {
×
420
                        klog.Errorf("failed to init IPAM from IP CR %s: %v", ip.Name, err)
×
421
                }
×
422
        }
423

424
        klog.Infof("Init IPAM from pod")
×
425
        pods, err := c.podsLister.List(labels.Everything())
×
426
        if err != nil {
×
427
                klog.Errorf("failed to list pods: %v", err)
×
428
                return err
×
429
        }
×
430
        for _, pod := range pods {
×
431
                if pod.Spec.HostNetwork {
×
432
                        continue
×
433
                }
434

435
                isAlive := isPodAlive(pod)
×
436
                isStsPod, _, _ := isStatefulSetPod(pod)
×
437
                if !isAlive && !isStsPod {
×
438
                        continue
×
439
                }
440

441
                podNets, err := c.getPodKubeovnNets(pod)
×
442
                if err != nil {
×
443
                        klog.Errorf("failed to get pod kubeovn nets %s.%s address %s: %v", pod.Name, pod.Namespace, pod.Annotations[util.IPAddressAnnotation], err)
×
444
                        continue
×
445
                }
446

447
                podType := getPodType(pod)
×
448
                podName := c.getNameByPod(pod)
×
NEW
449
                key := cache.NewObjectName(pod.Namespace, podName).String()
×
450
                for _, podNet := range podNets {
×
451
                        if pod.Annotations[fmt.Sprintf(util.AllocatedAnnotationTemplate, podNet.ProviderName)] == "true" {
×
452
                                portName := ovs.PodNameToPortName(podName, pod.Namespace, podNet.ProviderName)
×
453
                                ip := pod.Annotations[fmt.Sprintf(util.IPAddressAnnotationTemplate, podNet.ProviderName)]
×
454
                                mac := pod.Annotations[fmt.Sprintf(util.MacAddressAnnotationTemplate, podNet.ProviderName)]
×
455
                                _, _, _, err := c.ipam.GetStaticAddress(key, portName, ip, &mac, podNet.Subnet.Name, true)
×
456
                                if err != nil {
×
457
                                        klog.Errorf("failed to init pod %s.%s address %s: %v", podName, pod.Namespace, pod.Annotations[fmt.Sprintf(util.IPAddressAnnotationTemplate, podNet.ProviderName)], err)
×
458
                                } else {
×
459
                                        err = c.createOrUpdateIPCR(portName, podName, ip, mac, podNet.Subnet.Name, pod.Namespace, pod.Spec.NodeName, podType)
×
460
                                        if err != nil {
×
461
                                                klog.Errorf("failed to create/update ips CR %s.%s with ip address %s: %v", podName, pod.Namespace, ip, err)
×
462
                                        }
×
463
                                }
464

465
                                // Append ExternalIds is added in v1.7, used for upgrading from v1.6.3. It should be deleted now since v1.7 is not used anymore.
466
                        }
467
                }
468
        }
469

470
        klog.Infof("Init IPAM from vip CR")
×
471
        vips, err := c.virtualIpsLister.List(labels.Everything())
×
472
        if err != nil {
×
473
                klog.Errorf("failed to list vips: %v", err)
×
474
                return err
×
475
        }
×
476
        for _, vip := range vips {
×
477
                provider, ok := subnetProviderMaps[vip.Spec.Subnet]
×
478
                if !ok {
×
479
                        klog.Errorf("failed to find subnet %s for vip %s", vip.Spec.Subnet, vip.Name)
×
480
                        continue
×
481
                }
482
                portName := ovs.PodNameToPortName(vip.Name, vip.Spec.Namespace, provider)
×
483
                if _, _, _, err = c.ipam.GetStaticAddress(vip.Name, portName, vip.Status.V4ip, &vip.Status.Mac, vip.Spec.Subnet, true); err != nil {
×
484
                        klog.Errorf("failed to init ipam from vip cr %s: %v", vip.Name, err)
×
485
                }
×
486
        }
487

488
        klog.Infof("Init IPAM from iptables EIP CR")
×
489
        eips, err := c.iptablesEipsLister.List(labels.Everything())
×
490
        if err != nil {
×
491
                klog.Errorf("failed to list EIPs: %v", err)
×
492
                return err
×
493
        }
×
494
        for _, eip := range eips {
×
495
                externalNetwork := util.GetExternalNetwork(eip.Spec.ExternalSubnet)
×
496
                if _, _, _, err = c.ipam.GetStaticAddress(eip.Name, eip.Name, eip.Status.IP, &eip.Spec.MacAddress, externalNetwork, true); err != nil {
×
497
                        klog.Errorf("failed to init ipam from iptables eip cr %s: %v", eip.Name, err)
×
498
                }
×
499
        }
500

501
        klog.Infof("Init IPAM from ovn EIP CR")
×
502
        oeips, err := c.ovnEipsLister.List(labels.Everything())
×
503
        if err != nil {
×
504
                klog.Errorf("failed to list ovn eips: %v", err)
×
505
                return err
×
506
        }
×
507
        for _, oeip := range oeips {
×
508
                if _, _, _, err = c.ipam.GetStaticAddress(oeip.Name, oeip.Name, oeip.Status.V4Ip, &oeip.Status.MacAddress, oeip.Spec.ExternalSubnet, true); err != nil {
×
509
                        klog.Errorf("failed to init ipam from ovn eip cr %s: %v", oeip.Name, err)
×
510
                }
×
511
        }
512

513
        klog.Infof("Init IPAM from node annotation")
×
514
        nodes, err := c.nodesLister.List(labels.Everything())
×
515
        if err != nil {
×
516
                klog.Errorf("failed to list nodes: %v", err)
×
517
                return err
×
518
        }
×
519
        for _, node := range nodes {
×
520
                if node.Annotations[util.AllocatedAnnotation] == "true" {
×
521
                        portName := util.NodeLspName(node.Name)
×
522
                        mac := node.Annotations[util.MacAddressAnnotation]
×
523
                        v4IP, v6IP, _, err := c.ipam.GetStaticAddress(portName, portName,
×
524
                                node.Annotations[util.IPAddressAnnotation], &mac,
×
525
                                node.Annotations[util.LogicalSwitchAnnotation], true)
×
526
                        if err != nil {
×
527
                                klog.Errorf("failed to init node %s.%s address %s: %v", node.Name, node.Namespace, node.Annotations[util.IPAddressAnnotation], err)
×
528
                        }
×
529
                        if v4IP != "" && v6IP != "" {
×
530
                                node.Annotations[util.IPAddressAnnotation] = util.GetStringIP(v4IP, v6IP)
×
531
                        }
×
532
                }
533
        }
534

535
        klog.Infof("take %.2f seconds to initialize IPAM", time.Since(start).Seconds())
×
536
        return nil
×
537
}
538

539
func (c *Controller) initDefaultProviderNetwork() error {
×
540
        _, err := c.providerNetworksLister.Get(c.config.DefaultProviderName)
×
541
        if err == nil {
×
542
                return nil
×
543
        }
×
544
        if !k8serrors.IsNotFound(err) {
×
545
                klog.Errorf("failed to get default provider network %s: %v", c.config.DefaultProviderName, err)
×
546
                return err
×
547
        }
×
548

549
        nodes, err := c.nodesLister.List(labels.Everything())
×
550
        if err != nil {
×
551
                klog.Errorf("failed to get nodes: %v", err)
×
552
                return err
×
553
        }
×
554

555
        pn := kubeovnv1.ProviderNetwork{
×
556
                ObjectMeta: metav1.ObjectMeta{
×
557
                        Name: c.config.DefaultProviderName,
×
558
                },
×
559
                Spec: kubeovnv1.ProviderNetworkSpec{
×
560
                        DefaultInterface: c.config.DefaultHostInterface,
×
561
                        ExchangeLinkName: c.config.DefaultExchangeLinkName,
×
562
                },
×
563
        }
×
564

×
565
        excludeAnno := fmt.Sprintf(util.ProviderNetworkExcludeTemplate, c.config.DefaultProviderName)
×
566
        interfaceAnno := fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, c.config.DefaultProviderName)
×
567
        patchNodes := make([]string, 0, len(nodes))
×
568
        for _, node := range nodes {
×
569
                if len(node.Annotations) == 0 {
×
570
                        continue
×
571
                }
572

573
                if node.Annotations[excludeAnno] == "true" {
×
574
                        pn.Spec.ExcludeNodes = append(pn.Spec.ExcludeNodes, node.Name)
×
575
                        patchNodes = append(patchNodes, node.Name)
×
576
                } else if s := node.Annotations[interfaceAnno]; s != "" {
×
577
                        var index *int
×
578
                        for i := range pn.Spec.CustomInterfaces {
×
579
                                if pn.Spec.CustomInterfaces[i].Interface == s {
×
580
                                        index = &i
×
581
                                        break
×
582
                                }
583
                        }
584
                        if index != nil {
×
585
                                pn.Spec.CustomInterfaces[*index].Nodes = append(pn.Spec.CustomInterfaces[*index].Nodes, node.Name)
×
586
                        } else {
×
587
                                ci := kubeovnv1.CustomInterface{Interface: s, Nodes: []string{node.Name}}
×
588
                                pn.Spec.CustomInterfaces = append(pn.Spec.CustomInterfaces, ci)
×
589
                        }
×
590
                        patchNodes = append(patchNodes, node.Name)
×
591
                }
592
        }
593

594
        defer func() {
×
595
                if err != nil {
×
596
                        return
×
597
                }
×
598

599
                // update nodes only when provider network has been created successfully
600
                patch := util.KVPatch{excludeAnno: nil, interfaceAnno: nil}
×
601
                for _, node := range patchNodes {
×
602
                        if err := util.PatchAnnotations(c.config.KubeClient.CoreV1().Nodes(), node, patch); err != nil {
×
603
                                klog.Errorf("failed to patch node %s: %v", node, err)
×
604
                        }
×
605
                }
606
        }()
607

608
        _, err = c.config.KubeOvnClient.KubeovnV1().ProviderNetworks().Create(context.Background(), &pn, metav1.CreateOptions{})
×
609
        if err != nil {
×
610
                klog.Errorf("failed to create provider network %s: %v", c.config.DefaultProviderName, err)
×
611
                return err
×
612
        }
×
613
        return nil
×
614
}
615

616
func (c *Controller) initDefaultVlan() error {
×
617
        if c.config.NetworkType != util.NetworkTypeVlan {
×
618
                return nil
×
619
        }
×
620

621
        if err := c.initDefaultProviderNetwork(); err != nil {
×
622
                klog.Error(err)
×
623
                return err
×
624
        }
×
625

626
        _, err := c.vlansLister.Get(c.config.DefaultVlanName)
×
627
        if err == nil {
×
628
                return nil
×
629
        }
×
630

631
        if !k8serrors.IsNotFound(err) {
×
632
                klog.Errorf("get default vlan %s failed: %v", c.config.DefaultVlanName, err)
×
633
                return err
×
634
        }
×
635

636
        if c.config.DefaultVlanID < 0 || c.config.DefaultVlanID > 4095 {
×
637
                return errors.New("the default vlan id is not between 1-4095")
×
638
        }
×
639

640
        defaultVlan := kubeovnv1.Vlan{
×
641
                ObjectMeta: metav1.ObjectMeta{Name: c.config.DefaultVlanName},
×
642
                Spec: kubeovnv1.VlanSpec{
×
643
                        ID:       c.config.DefaultVlanID,
×
644
                        Provider: c.config.DefaultProviderName,
×
645
                },
×
646
        }
×
647

×
648
        _, err = c.config.KubeOvnClient.KubeovnV1().Vlans().Create(context.Background(), &defaultVlan, metav1.CreateOptions{})
×
649
        if err != nil {
×
650
                klog.Errorf("failed to create vlan %s: %v", defaultVlan.Name, err)
×
651
                return err
×
652
        }
×
653
        return nil
×
654
}
655

656
func (c *Controller) syncIPCR() error {
×
657
        klog.Info("start to sync ips")
×
658
        ips, err := c.ipsLister.List(labels.Everything())
×
659
        if err != nil {
×
660
                if k8serrors.IsNotFound(err) {
×
661
                        return nil
×
662
                }
×
663
                klog.Error(err)
×
664
                return err
×
665
        }
666

667
        ipMap := strset.New(c.getVMLsps()...)
×
668
        for _, ip := range ips {
×
669
                if !ip.DeletionTimestamp.IsZero() {
×
670
                        klog.Infof("enqueue update for removing finalizer to delete ip %s", ip.Name)
×
671
                        c.updateIPQueue.Add(ip.Name)
×
672
                        continue
×
673
                }
674
                changed := false
×
675
                ip = ip.DeepCopy()
×
676
                if ipMap.Has(ip.Name) && ip.Spec.PodType == "" {
×
677
                        ip.Spec.PodType = util.KindVirtualMachine
×
678
                        changed = true
×
679
                }
×
680

681
                v4IP, v6IP := util.SplitStringIP(ip.Spec.IPAddress)
×
682
                if ip.Spec.V4IPAddress == v4IP && ip.Spec.V6IPAddress == v6IP && !changed {
×
683
                        continue
×
684
                }
685

686
                ip.Spec.V4IPAddress = v4IP
×
687
                ip.Spec.V6IPAddress = v6IP
×
688
                _, err := c.config.KubeOvnClient.KubeovnV1().IPs().Update(context.Background(), ip, metav1.UpdateOptions{})
×
689
                if err != nil {
×
690
                        klog.Errorf("failed to sync crd ip %s: %v", ip.Spec.IPAddress, err)
×
691
                        return err
×
692
                }
×
693
        }
694
        return nil
×
695
}
696

697
func (c *Controller) syncSubnetCR() error {
×
698
        klog.Info("start to sync subnets")
×
699
        subnets, err := c.subnetsLister.List(labels.Everything())
×
700
        if err != nil {
×
701
                if k8serrors.IsNotFound(err) {
×
702
                        return nil
×
703
                }
×
704
                klog.Error(err)
×
705
                return err
×
706
        }
707
        for _, cachedSubnet := range subnets {
×
708
                subnet := cachedSubnet.DeepCopy()
×
709
                if !subnet.Status.IsReady() {
×
710
                        klog.Warningf("subnet %s is not ready", subnet.Name)
×
711
                        continue
×
712
                }
713
                subnet, err = c.calcSubnetStatusIP(subnet)
×
714
                if err != nil {
×
715
                        klog.Errorf("failed to calculate subnet %s used ip: %v", cachedSubnet.Name, err)
×
716
                        return err
×
717
                }
×
718

719
                // only sync subnet spec enableEcmp when subnet.Spec.EnableEcmp is false and c.config.EnableEcmp is true
720
                if subnet.Spec.GatewayType == kubeovnv1.GWCentralizedType && !subnet.Spec.EnableEcmp && subnet.Spec.EnableEcmp != c.config.EnableEcmp {
×
721
                        subnet, err = c.subnetsLister.Get(subnet.Name)
×
722
                        if err != nil {
×
723
                                klog.Errorf("failed to get subnet %s: %v", subnet.Name, err)
×
724
                                return err
×
725
                        }
×
726

727
                        subnet.Spec.EnableEcmp = c.config.EnableEcmp
×
728
                        if _, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Update(context.Background(), subnet, metav1.UpdateOptions{}); err != nil {
×
729
                                klog.Errorf("failed to sync subnet spec enableEcmp with kube-ovn-controller config enableEcmp %s: %v", subnet.Name, err)
×
730
                                return err
×
731
                        }
×
732
                }
733
        }
734
        return nil
×
735
}
736

737
func (c *Controller) syncVpcNatGatewayCR() error {
×
738
        klog.Info("start to sync crd vpc nat gw")
×
739
        gws, err := c.vpcNatGatewayLister.List(labels.Everything())
×
740
        if err != nil {
×
741
                klog.Errorf("failed to list vpc nat gateway, %v", err)
×
742
                return err
×
743
        }
×
744
        if len(gws) == 0 {
×
745
                return nil
×
746
        }
×
747
        // get vpc nat gateway enable state
748
        cm, err := c.configMapsLister.ConfigMaps(c.config.PodNamespace).Get(util.VpcNatGatewayConfig)
×
749
        if err != nil && !k8serrors.IsNotFound(err) {
×
750
                klog.Errorf("failed to get config map %s, %v", util.VpcNatGatewayConfig, err)
×
751
                return err
×
752
        }
×
753
        if k8serrors.IsNotFound(err) || cm.Data["enable-vpc-nat-gw"] == "false" {
×
754
                return nil
×
755
        }
×
756
        // get vpc nat gateway image
757
        cm, err = c.configMapsLister.ConfigMaps(c.config.PodNamespace).Get(util.VpcNatConfig)
×
758
        if err != nil {
×
759
                if k8serrors.IsNotFound(err) {
×
760
                        klog.Errorf("should set config map for vpc-nat-gateway %s, %v", util.VpcNatConfig, err)
×
761
                        return err
×
762
                }
×
763
                klog.Errorf("failed to get config map %s, %v", util.VpcNatConfig, err)
×
764
                return err
×
765
        }
766

767
        if cm.Data["image"] == "" {
×
768
                err = errors.New("should set image for vpc-nat-gateway pod")
×
769
                klog.Error(err)
×
770
                return err
×
771
        }
×
772

773
        for _, gw := range gws {
×
774
                if err := c.updateCrdNatGwLabels(gw.Name, ""); err != nil {
×
775
                        klog.Errorf("failed to update nat gw %s: %v", gw.Name, err)
×
776
                        return err
×
777
                }
×
778
        }
779
        return nil
×
780
}
781

782
func (c *Controller) syncVlanCR() error {
×
783
        klog.Info("start to sync vlans")
×
784
        vlans, err := c.vlansLister.List(labels.Everything())
×
785
        if err != nil {
×
786
                if k8serrors.IsNotFound(err) {
×
787
                        return nil
×
788
                }
×
789
                klog.Error(err)
×
790
                return err
×
791
        }
792

793
        for _, vlan := range vlans {
×
794
                var needUpdate bool
×
795
                newVlan := vlan.DeepCopy()
×
796
                if newVlan.Spec.VlanID != 0 && newVlan.Spec.ID == 0 {
×
797
                        newVlan.Spec.ID = newVlan.Spec.VlanID
×
798
                        newVlan.Spec.VlanID = 0
×
799
                        needUpdate = true
×
800
                }
×
801
                if newVlan.Spec.ProviderInterfaceName != "" && newVlan.Spec.Provider == "" {
×
802
                        newVlan.Spec.Provider = newVlan.Spec.ProviderInterfaceName
×
803
                        newVlan.Spec.ProviderInterfaceName = ""
×
804
                        needUpdate = true
×
805
                }
×
806
                if needUpdate {
×
807
                        if _, err = c.config.KubeOvnClient.KubeovnV1().Vlans().Update(context.Background(), newVlan, metav1.UpdateOptions{}); err != nil {
×
808
                                klog.Errorf("failed to update spec of vlan %s: %v", newVlan.Name, err)
×
809
                                return err
×
810
                        }
×
811
                }
812
        }
813

814
        return nil
×
815
}
816

817
func (c *Controller) batchMigrateNodeRoute(nodes []*v1.Node) error {
×
818
        start := time.Now()
×
819
        addPolicies := make([]*kubeovnv1.PolicyRoute, 0)
×
820
        delPolicies := make([]*kubeovnv1.PolicyRoute, 0)
×
821
        staticRoutes := make([]*kubeovnv1.StaticRoute, 0)
×
822
        externalIDsMap := make(map[string]map[string]string)
×
823
        delAsNames := make([]string, 0)
×
824
        for _, node := range nodes {
×
825
                if node.Annotations[util.AllocatedAnnotation] != "true" {
×
826
                        continue
×
827
                }
828
                nodeName := node.Name
×
829
                nodeIPv4, nodeIPv6 := util.GetNodeInternalIP(*node)
×
830
                joinAddrV4, joinAddrV6 := util.SplitStringIP(node.Annotations[util.IPAddressAnnotation])
×
831
                if nodeIPv4 != "" && joinAddrV4 != "" {
×
832
                        buildNodeRoute(4, nodeName, joinAddrV4, nodeIPv4, &addPolicies, &delPolicies, &staticRoutes, externalIDsMap, &delAsNames)
×
833
                }
×
834
                if nodeIPv6 != "" && joinAddrV6 != "" {
×
835
                        buildNodeRoute(6, nodeName, joinAddrV6, nodeIPv6, &addPolicies, &delPolicies, &staticRoutes, externalIDsMap, &delAsNames)
×
836
                }
×
837
        }
838

839
        if err := c.batchAddPolicyRouteToVpc(c.config.ClusterRouter, addPolicies, externalIDsMap); err != nil {
×
840
                klog.Errorf("failed to batch add logical router policy for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
841
                return err
×
842
        }
×
843
        if err := c.batchDeleteStaticRouteFromVpc(c.config.ClusterRouter, staticRoutes); err != nil {
×
844
                klog.Errorf("failed to batch delete  obsolete logical router static route for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
845
                return err
×
846
        }
×
847
        if err := c.batchDeletePolicyRouteFromVpc(c.config.ClusterRouter, delPolicies); err != nil {
×
848
                klog.Errorf("failed to batch delete obsolete logical router policy for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
849
                return err
×
850
        }
×
851
        if err := c.OVNNbClient.BatchDeleteAddressSetByNames(delAsNames); err != nil {
×
852
                klog.Errorf("failed to batch delete obsolete address set for asNames %v nodes %d: %v", delAsNames, len(nodes), err)
×
853
                return err
×
854
        }
×
855
        klog.V(3).Infof("take to %v batch migrate node route for router: %s priority: %d add policy len: %d extrenalID len: %d del policy len: %d del address set len: %d",
×
856
                time.Since(start), c.config.ClusterRouter, util.NodeRouterPolicyPriority, len(addPolicies), len(externalIDsMap), len(delPolicies), len(delAsNames))
×
857

×
858
        return nil
×
859
}
860

861
func buildNodeRoute(af int, nodeName, nexthop, ip string, addPolicies, delPolicies *[]*kubeovnv1.PolicyRoute, staticRoutes *[]*kubeovnv1.StaticRoute, externalIDsMap map[string]map[string]string, delAsNames *[]string) {
×
862
        var (
×
863
                match       = fmt.Sprintf("ip%d.dst == %s", af, ip)
×
864
                action      = kubeovnv1.PolicyRouteActionReroute
×
865
                externalIDs = map[string]string{
×
866
                        "vendor": util.CniTypeName,
×
867
                        "node":   nodeName,
×
868
                }
×
869
        )
×
870
        *addPolicies = append(*addPolicies, &kubeovnv1.PolicyRoute{
×
871
                Priority:  util.NodeRouterPolicyPriority,
×
872
                Match:     match,
×
873
                Action:    action,
×
874
                NextHopIP: nexthop,
×
875
        })
×
876
        externalIDsMap[buildExternalIDsMapKey(match, string(action), util.NodeRouterPolicyPriority)] = externalIDs
×
877
        *staticRoutes = append(*staticRoutes, &kubeovnv1.StaticRoute{
×
878
                Policy:     kubeovnv1.PolicyDst,
×
879
                RouteTable: util.MainRouteTable,
×
880
                NextHopIP:  "",
×
881
                CIDR:       ip,
×
882
        })
×
883
        asName := nodeUnderlayAddressSetName(nodeName, af)
×
884
        obsoleteMatch := fmt.Sprintf("ip%d.dst == %s && ip%d.src != $%s", af, ip, af, asName)
×
885
        *delPolicies = append(*delPolicies, &kubeovnv1.PolicyRoute{
×
886
                Match:    obsoleteMatch,
×
887
                Priority: util.NodeRouterPolicyPriority,
×
888
        })
×
889
        *delAsNames = append(*delAsNames, asName)
×
890
}
×
891

892
func (c *Controller) syncNodeRoutes() error {
×
893
        nodes, err := c.nodesLister.List(labels.Everything())
×
894
        if err != nil {
×
895
                klog.Errorf("failed to list nodes: %v", err)
×
896
                return err
×
897
        }
×
898

899
        if err := c.batchMigrateNodeRoute(nodes); err != nil {
×
900
                klog.Errorf("failed to batch migrate node routes: %v", err)
×
901
                return err
×
902
        }
×
903

904
        if err := c.addNodeGatewayStaticRoute(); err != nil {
×
905
                klog.Errorf("failed to add static route for node gateway")
×
906
                return err
×
907
        }
×
908
        return nil
×
909
}
910

911
func (c *Controller) initNodeChassis() error {
×
912
        nodes, err := c.nodesLister.List(labels.Everything())
×
913
        if err != nil {
×
914
                klog.Errorf("failed to list nodes: %v", err)
×
915
                return err
×
916
        }
×
917
        chassises, err := c.OVNSbClient.GetKubeOvnChassisses()
×
918
        if err != nil {
×
919
                klog.Errorf("failed to get chassis nodes: %v", err)
×
920
                return err
×
921
        }
×
922
        chassisNodes := make(map[string]string, len(*chassises))
×
923
        for _, chassis := range *chassises {
×
924
                chassisNodes[chassis.Name] = chassis.Hostname
×
925
        }
×
926
        for _, node := range nodes {
×
927
                if err := c.UpdateChassisTag(node); err != nil {
×
928
                        klog.Error(err)
×
929
                        if _, ok := err.(*ErrChassisNotFound); !ok {
×
930
                                return err
×
931
                        }
×
932
                }
933
        }
934
        return nil
×
935
}
936

937
func migrateFinalizers(c client.Client, list client.ObjectList, getObjectItem func(int) (client.Object, client.Object)) error {
×
938
        if err := c.List(context.Background(), list); err != nil {
×
939
                klog.Errorf("failed to list objects: %v", err)
×
940
                return err
×
941
        }
×
942

943
        var i int
×
944
        var cachedObj, patchedObj client.Object
×
945
        for {
×
946
                if cachedObj, patchedObj = getObjectItem(i); cachedObj == nil {
×
947
                        break
×
948
                }
949
                if !controllerutil.ContainsFinalizer(cachedObj, util.DepreciatedFinalizerName) {
×
950
                        i++
×
951
                        continue
×
952
                }
953
                controllerutil.RemoveFinalizer(patchedObj, util.DepreciatedFinalizerName)
×
954
                if cachedObj.GetDeletionTimestamp() == nil {
×
955
                        // if the object is not being deleted, add the new finalizer
×
956
                        controllerutil.AddFinalizer(patchedObj, util.KubeOVNControllerFinalizer)
×
957
                }
×
958
                if err := c.Patch(context.Background(), patchedObj, client.MergeFrom(cachedObj)); client.IgnoreNotFound(err) != nil {
×
959
                        klog.Errorf("failed to sync finalizers for %s %s: %v",
×
960
                                patchedObj.GetObjectKind().GroupVersionKind().Kind,
×
961
                                cache.MetaObjectToName(patchedObj), err)
×
962
                        return err
×
963
                }
×
964
                i++
×
965
        }
966

967
        return nil
×
968
}
969

970
func (c *Controller) syncFinalizers() error {
×
971
        cl, err := client.New(config.GetConfigOrDie(), client.Options{})
×
972
        if err != nil {
×
973
                klog.Errorf("failed to create client: %v", err)
×
974
                return err
×
975
        }
×
976

977
        // migrate depreciated finalizer to new finalizer
978
        klog.Info("start to sync finalizers")
×
979
        if err := c.syncIPFinalizer(cl); err != nil {
×
980
                klog.Errorf("failed to sync ip finalizer: %v", err)
×
981
                return err
×
982
        }
×
983
        if err := c.syncIPPoolFinalizer(cl); err != nil {
×
984
                klog.Errorf("failed to sync ippool finalizer: %v", err)
×
985
                return err
×
986
        }
×
987
        if err := c.syncOvnDnatFinalizer(cl); err != nil {
×
988
                klog.Errorf("failed to sync ovn dnat finalizer: %v", err)
×
989
                return err
×
990
        }
×
991
        if err := c.syncOvnEipFinalizer(cl); err != nil {
×
992
                klog.Errorf("failed to sync ovn eip finalizer: %v", err)
×
993
                return err
×
994
        }
×
995
        if err := c.syncOvnFipFinalizer(cl); err != nil {
×
996
                klog.Errorf("failed to sync ovn fip finalizer: %v", err)
×
997
                return err
×
998
        }
×
999
        if err := c.syncOvnSnatFinalizer(cl); err != nil {
×
1000
                klog.Errorf("failed to sync ovn snat finalizer: %v", err)
×
1001
                return err
×
1002
        }
×
1003
        if err := c.syncQoSPolicyFinalizer(cl); err != nil {
×
1004
                klog.Errorf("failed to sync qos policy finalizer: %v", err)
×
1005
                return err
×
1006
        }
×
1007
        if err := c.syncSubnetFinalizer(cl); err != nil {
×
1008
                klog.Errorf("failed to sync subnet finalizer: %v", err)
×
1009
                return err
×
1010
        }
×
1011
        if err := c.syncVipFinalizer(cl); err != nil {
×
1012
                klog.Errorf("failed to sync vip finalizer: %v", err)
×
1013
                return err
×
1014
        }
×
1015
        if err := c.syncIptablesEipFinalizer(cl); err != nil {
×
1016
                klog.Errorf("failed to sync iptables eip finalizer: %v", err)
×
1017
                return err
×
1018
        }
×
1019
        if err := c.syncIptablesFipFinalizer(cl); err != nil {
×
1020
                klog.Errorf("failed to sync iptables fip finalizer: %v", err)
×
1021
                return err
×
1022
        }
×
1023
        if err := c.syncIptablesDnatFinalizer(cl); err != nil {
×
1024
                klog.Errorf("failed to sync iptables dnat finalizer: %v", err)
×
1025
                return err
×
1026
        }
×
1027
        if err := c.syncIptablesSnatFinalizer(cl); err != nil {
×
1028
                klog.Errorf("failed to sync iptables snat finalizer: %v", err)
×
1029
                return err
×
1030
        }
×
1031
        klog.Info("sync finalizers done")
×
1032
        return nil
×
1033
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc