• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 20917238533

12 Jan 2026 11:10AM UTC coverage: 22.568% (-0.2%) from 22.747%
20917238533

Pull #6153

github

zbb88888
feat(controller): add VPC NAT gateway and iptables EIP handling in daemon controller

Signed-off-by: zbb88888 <jmdxjsjgcxy@gmail.com>
Pull Request #6153: feat(controller): allow SSH from node to Iptables eip

42 of 592 new or added lines in 7 files covered. (7.09%)

8 existing lines in 2 files now uncovered.

12226 of 54174 relevant lines covered (22.57%)

0.26 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/pkg/daemon/controller.go
1
package daemon
2

3
import (
4
        "bytes"
5
        "context"
6
        "fmt"
7
        "maps"
8
        "slices"
9
        "strconv"
10
        "strings"
11
        "time"
12

13
        nadutils "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils"
14
        "github.com/scylladb/go-set/strset"
15
        v1 "k8s.io/api/core/v1"
16
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
17
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
18
        "k8s.io/apimachinery/pkg/labels"
19
        utilruntime "k8s.io/apimachinery/pkg/util/runtime"
20
        "k8s.io/apimachinery/pkg/util/wait"
21
        "k8s.io/client-go/informers"
22
        "k8s.io/client-go/kubernetes/scheme"
23
        typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
24
        listerv1 "k8s.io/client-go/listers/core/v1"
25
        "k8s.io/client-go/tools/cache"
26
        "k8s.io/client-go/tools/record"
27
        "k8s.io/client-go/util/workqueue"
28
        "k8s.io/klog/v2"
29
        k8sexec "k8s.io/utils/exec"
30
        kubevirtv1 "kubevirt.io/api/core/v1"
31

32
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
33
        kubeovninformer "github.com/kubeovn/kube-ovn/pkg/client/informers/externalversions"
34
        kubeovnlister "github.com/kubeovn/kube-ovn/pkg/client/listers/kubeovn/v1"
35
        "github.com/kubeovn/kube-ovn/pkg/ovs"
36
        "github.com/kubeovn/kube-ovn/pkg/util"
37
)
38

39
// Controller watch pod and namespace changes to update iptables, ipset and ovs qos
40
type Controller struct {
41
        config *Configuration
42

43
        providerNetworksLister          kubeovnlister.ProviderNetworkLister
44
        providerNetworksSynced          cache.InformerSynced
45
        addOrUpdateProviderNetworkQueue workqueue.TypedRateLimitingInterface[string]
46
        deleteProviderNetworkQueue      workqueue.TypedRateLimitingInterface[*kubeovnv1.ProviderNetwork]
47

48
        vlansLister kubeovnlister.VlanLister
49
        vlansSynced cache.InformerSynced
50

51
        subnetsLister kubeovnlister.SubnetLister
52
        subnetsSynced cache.InformerSynced
53
        subnetQueue   workqueue.TypedRateLimitingInterface[*subnetEvent]
54

55
        macvlanSubnetQueue workqueue.TypedRateLimitingInterface[*subnetEvent]
56

57
        ovnEipsLister kubeovnlister.OvnEipLister
58
        ovnEipsSynced cache.InformerSynced
59

60
        podsLister     listerv1.PodLister
61
        podsSynced     cache.InformerSynced
62
        updatePodQueue workqueue.TypedRateLimitingInterface[string]
63

64
        nodesLister     listerv1.NodeLister
65
        nodesSynced     cache.InformerSynced
66
        updateNodeQueue workqueue.TypedRateLimitingInterface[string]
67

68
        servicesLister listerv1.ServiceLister
69
        servicesSynced cache.InformerSynced
70
        serviceQueue   workqueue.TypedRateLimitingInterface[*serviceEvent]
71

72
        caSecretLister listerv1.SecretLister
73
        caSecretSynced cache.InformerSynced
74
        ipsecQueue     workqueue.TypedRateLimitingInterface[string]
75

76
        iptablesEipsLister     kubeovnlister.IptablesEIPLister
77
        iptablesEipsSynced     cache.InformerSynced
78
        iptablesEipQueue       workqueue.TypedRateLimitingInterface[eipRouteInfo]
79
        iptablesEipDeleteQueue workqueue.TypedRateLimitingInterface[eipRouteInfo]
80

81
        recorder record.EventRecorder
82

83
        protocol string
84

85
        ControllerRuntime
86

87
        k8sExec k8sexec.Interface
88
}
89

90
func newTypedRateLimitingQueue[T comparable](name string, rateLimiter workqueue.TypedRateLimiter[T]) workqueue.TypedRateLimitingInterface[T] {
×
91
        if rateLimiter == nil {
×
92
                rateLimiter = workqueue.DefaultTypedControllerRateLimiter[T]()
×
93
        }
×
94
        return workqueue.NewTypedRateLimitingQueueWithConfig(rateLimiter, workqueue.TypedRateLimitingQueueConfig[T]{Name: name})
×
95
}
96

97
// NewController init a daemon controller
98
func NewController(config *Configuration,
99
        stopCh <-chan struct{},
100
        podInformerFactory, nodeInformerFactory, caSecretInformerFactory informers.SharedInformerFactory,
101
        kubeovnInformerFactory kubeovninformer.SharedInformerFactory,
102
) (*Controller, error) {
×
103
        eventBroadcaster := record.NewBroadcaster()
×
104
        eventBroadcaster.StartLogging(klog.Infof)
×
105
        eventBroadcaster.StartRecordingToSink(&typedcorev1.EventSinkImpl{Interface: config.KubeClient.CoreV1().Events(v1.NamespaceAll)})
×
106
        recorder := eventBroadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: config.NodeName})
×
107
        providerNetworkInformer := kubeovnInformerFactory.Kubeovn().V1().ProviderNetworks()
×
108
        vlanInformer := kubeovnInformerFactory.Kubeovn().V1().Vlans()
×
109
        subnetInformer := kubeovnInformerFactory.Kubeovn().V1().Subnets()
×
110
        ovnEipInformer := kubeovnInformerFactory.Kubeovn().V1().OvnEips()
×
NEW
111
        iptablesEipInformer := kubeovnInformerFactory.Kubeovn().V1().IptablesEIPs()
×
112
        podInformer := podInformerFactory.Core().V1().Pods()
×
113
        nodeInformer := nodeInformerFactory.Core().V1().Nodes()
×
114
        servicesInformer := nodeInformerFactory.Core().V1().Services()
×
115
        caSecretInformer := caSecretInformerFactory.Core().V1().Secrets()
×
116

×
117
        controller := &Controller{
×
118
                config: config,
×
119

×
120
                providerNetworksLister:          providerNetworkInformer.Lister(),
×
121
                providerNetworksSynced:          providerNetworkInformer.Informer().HasSynced,
×
122
                addOrUpdateProviderNetworkQueue: newTypedRateLimitingQueue[string]("AddOrUpdateProviderNetwork", nil),
×
123
                deleteProviderNetworkQueue:      newTypedRateLimitingQueue[*kubeovnv1.ProviderNetwork]("DeleteProviderNetwork", nil),
×
124

×
125
                vlansLister: vlanInformer.Lister(),
×
126
                vlansSynced: vlanInformer.Informer().HasSynced,
×
127

×
128
                subnetsLister: subnetInformer.Lister(),
×
129
                subnetsSynced: subnetInformer.Informer().HasSynced,
×
130
                subnetQueue:   newTypedRateLimitingQueue[*subnetEvent]("Subnet", nil),
×
131

×
NEW
132
                macvlanSubnetQueue: newTypedRateLimitingQueue[*subnetEvent]("MacvlanSubnet", nil),
×
NEW
133

×
134
                ovnEipsLister: ovnEipInformer.Lister(),
×
135
                ovnEipsSynced: ovnEipInformer.Informer().HasSynced,
×
136

×
137
                podsLister:     podInformer.Lister(),
×
138
                podsSynced:     podInformer.Informer().HasSynced,
×
139
                updatePodQueue: newTypedRateLimitingQueue[string]("UpdatePod", nil),
×
140

×
141
                nodesLister:     nodeInformer.Lister(),
×
142
                nodesSynced:     nodeInformer.Informer().HasSynced,
×
143
                updateNodeQueue: newTypedRateLimitingQueue[string]("UpdateNode", nil),
×
144

×
145
                servicesLister: servicesInformer.Lister(),
×
146
                servicesSynced: servicesInformer.Informer().HasSynced,
×
147
                serviceQueue:   newTypedRateLimitingQueue[*serviceEvent]("Service", nil),
×
148

×
149
                caSecretLister: caSecretInformer.Lister(),
×
150
                caSecretSynced: caSecretInformer.Informer().HasSynced,
×
151
                ipsecQueue:     newTypedRateLimitingQueue[string]("IPSecCA", nil),
×
152

×
NEW
153
                iptablesEipsLister:     iptablesEipInformer.Lister(),
×
NEW
154
                iptablesEipsSynced:     iptablesEipInformer.Informer().HasSynced,
×
NEW
155
                iptablesEipQueue:       newTypedRateLimitingQueue[eipRouteInfo]("IptablesEip", nil),
×
NEW
156
                iptablesEipDeleteQueue: newTypedRateLimitingQueue[eipRouteInfo]("IptablesEipDelete", nil),
×
NEW
157

×
158
                recorder: recorder,
×
159
                k8sExec:  k8sexec.New(),
×
160
        }
×
161

×
162
        node, err := config.KubeClient.CoreV1().Nodes().Get(context.Background(), config.NodeName, metav1.GetOptions{})
×
163
        if err != nil {
×
164
                util.LogFatalAndExit(err, "failed to get node %s info", config.NodeName)
×
165
        }
×
166
        controller.protocol = util.CheckProtocol(node.Annotations[util.IPAddressAnnotation])
×
167

×
168
        if err = controller.initRuntime(); err != nil {
×
169
                return nil, err
×
170
        }
×
171

172
        podInformerFactory.Start(stopCh)
×
173
        nodeInformerFactory.Start(stopCh)
×
174
        kubeovnInformerFactory.Start(stopCh)
×
175
        caSecretInformerFactory.Start(stopCh)
×
176

×
177
        if !cache.WaitForCacheSync(stopCh,
×
178
                controller.providerNetworksSynced, controller.vlansSynced, controller.subnetsSynced,
×
NEW
179
                controller.podsSynced, controller.nodesSynced, controller.servicesSynced, controller.caSecretSynced,
×
NEW
180
                controller.iptablesEipsSynced) {
×
181
                util.LogFatalAndExit(nil, "failed to wait for caches to sync")
×
182
        }
×
183

184
        if _, err = providerNetworkInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
185
                AddFunc:    controller.enqueueAddProviderNetwork,
×
186
                UpdateFunc: controller.enqueueUpdateProviderNetwork,
×
187
                DeleteFunc: controller.enqueueDeleteProviderNetwork,
×
188
        }); err != nil {
×
189
                return nil, err
×
190
        }
×
191
        if _, err = vlanInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
192
                UpdateFunc: controller.enqueueUpdateVlan,
×
193
        }); err != nil {
×
194
                return nil, err
×
195
        }
×
196
        if _, err = subnetInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
197
                AddFunc:    controller.enqueueAddSubnet,
×
198
                UpdateFunc: controller.enqueueUpdateSubnet,
×
199
                DeleteFunc: controller.enqueueDeleteSubnet,
×
200
        }); err != nil {
×
201
                return nil, err
×
202
        }
×
203
        if _, err = servicesInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
204
                AddFunc:    controller.enqueueAddService,
×
205
                DeleteFunc: controller.enqueueDeleteService,
×
206
                UpdateFunc: controller.enqueueUpdateService,
×
207
        }); err != nil {
×
208
                util.LogFatalAndExit(err, "failed to add service event handler")
×
209
        }
×
210

211
        if _, err = podInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
212
                UpdateFunc: controller.enqueueUpdatePod,
×
213
        }); err != nil {
×
214
                return nil, err
×
215
        }
×
216
        if _, err = caSecretInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
217
                AddFunc:    controller.enqueueAddIPSecCA,
×
218
                UpdateFunc: controller.enqueueUpdateIPSecCA,
×
219
        }); err != nil {
×
220
                return nil, err
×
221
        }
×
222
        if _, err = nodeInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
223
                UpdateFunc: controller.enqueueUpdateNode,
×
224
        }); err != nil {
×
225
                return nil, err
×
226
        }
×
NEW
227
        if config.EnableNodeLocalAccessVpcNatGwEIP {
×
NEW
228
                if _, err = iptablesEipInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
NEW
229
                        AddFunc:    controller.enqueueAddIptablesEip,
×
NEW
230
                        UpdateFunc: controller.enqueueUpdateIptablesEip,
×
NEW
231
                        DeleteFunc: controller.enqueueDeleteIptablesEip,
×
NEW
232
                }); err != nil {
×
NEW
233
                        return nil, err
×
NEW
234
                }
×
235
        }
236

237
        return controller, nil
×
238
}
239

240
func (c *Controller) enqueueAddIPSecCA(obj any) {
×
241
        key := cache.MetaObjectToName(obj.(*v1.Secret)).String()
×
242
        klog.V(3).Infof("enqueue add CA %s", key)
×
243
        c.ipsecQueue.Add(key)
×
244
}
×
245

246
func (c *Controller) enqueueUpdateIPSecCA(oldObj, newObj any) {
×
247
        oldSecret := oldObj.(*v1.Secret)
×
248
        newSecret := newObj.(*v1.Secret)
×
249
        if maps.EqualFunc(oldSecret.Data, newSecret.Data, bytes.Equal) {
×
250
                // No changes in CA data, no need to enqueue
×
251
                return
×
252
        }
×
253

254
        key := cache.MetaObjectToName(newSecret).String()
×
255
        klog.V(3).Infof("enqueue update CA %s", key)
×
256
        c.ipsecQueue.Add(key)
×
257
}
258

259
func (c *Controller) enqueueUpdateNode(oldObj, newObj any) {
×
260
        oldNode := oldObj.(*v1.Node)
×
261
        newNode := newObj.(*v1.Node)
×
262
        if newNode.Name != c.config.NodeName {
×
263
                return
×
264
        }
×
265
        if oldNode.Annotations[util.NodeNetworksAnnotation] != newNode.Annotations[util.NodeNetworksAnnotation] {
×
266
                klog.V(3).Infof("enqueue update node %s for node networks change", newNode.Name)
×
267
                c.updateNodeQueue.Add(newNode.Name)
×
268
        }
×
269
}
270

271
func (c *Controller) enqueueAddProviderNetwork(obj any) {
×
272
        key := cache.MetaObjectToName(obj.(*kubeovnv1.ProviderNetwork)).String()
×
273
        klog.V(3).Infof("enqueue add provider network %s", key)
×
274
        c.addOrUpdateProviderNetworkQueue.Add(key)
×
275
}
×
276

277
func (c *Controller) enqueueUpdateProviderNetwork(_, newObj any) {
×
278
        key := cache.MetaObjectToName(newObj.(*kubeovnv1.ProviderNetwork)).String()
×
279
        klog.V(3).Infof("enqueue update provider network %s", key)
×
280
        c.addOrUpdateProviderNetworkQueue.Add(key)
×
281
}
×
282

283
func (c *Controller) enqueueDeleteProviderNetwork(obj any) {
×
284
        var pn *kubeovnv1.ProviderNetwork
×
285
        switch t := obj.(type) {
×
286
        case *kubeovnv1.ProviderNetwork:
×
287
                pn = t
×
288
        case cache.DeletedFinalStateUnknown:
×
289
                p, ok := t.Obj.(*kubeovnv1.ProviderNetwork)
×
290
                if !ok {
×
291
                        klog.Warningf("unexpected object type: %T", t.Obj)
×
292
                        return
×
293
                }
×
294
                pn = p
×
295
        default:
×
296
                klog.Warningf("unexpected type: %T", obj)
×
297
                return
×
298
        }
299

300
        key := cache.MetaObjectToName(pn).String()
×
301
        klog.V(3).Infof("enqueue delete provider network %s", key)
×
302
        c.deleteProviderNetworkQueue.Add(pn)
×
303
}
304

305
func (c *Controller) runAddOrUpdateProviderNetworkWorker() {
×
306
        for c.processNextAddOrUpdateProviderNetworkWorkItem() {
×
307
        }
×
308
}
309

310
func (c *Controller) runDeleteProviderNetworkWorker() {
×
311
        for c.processNextDeleteProviderNetworkWorkItem() {
×
312
        }
×
313
}
314

315
func (c *Controller) processNextAddOrUpdateProviderNetworkWorkItem() bool {
×
316
        key, shutdown := c.addOrUpdateProviderNetworkQueue.Get()
×
317
        if shutdown {
×
318
                return false
×
319
        }
×
320

321
        err := func(key string) error {
×
322
                defer c.addOrUpdateProviderNetworkQueue.Done(key)
×
323
                if err := c.handleAddOrUpdateProviderNetwork(key); err != nil {
×
324
                        return fmt.Errorf("error syncing %q: %w, requeuing", key, err)
×
325
                }
×
326
                c.addOrUpdateProviderNetworkQueue.Forget(key)
×
327
                return nil
×
328
        }(key)
329
        if err != nil {
×
330
                utilruntime.HandleError(err)
×
331
                c.addOrUpdateProviderNetworkQueue.AddRateLimited(key)
×
332
                return true
×
333
        }
×
334
        return true
×
335
}
336

337
func (c *Controller) processNextDeleteProviderNetworkWorkItem() bool {
×
338
        obj, shutdown := c.deleteProviderNetworkQueue.Get()
×
339
        if shutdown {
×
340
                return false
×
341
        }
×
342

343
        err := func(obj *kubeovnv1.ProviderNetwork) error {
×
344
                defer c.deleteProviderNetworkQueue.Done(obj)
×
345
                if err := c.handleDeleteProviderNetwork(obj); err != nil {
×
346
                        return fmt.Errorf("error syncing %q: %w, requeuing", obj.Name, err)
×
347
                }
×
348
                c.deleteProviderNetworkQueue.Forget(obj)
×
349
                return nil
×
350
        }(obj)
351
        if err != nil {
×
352
                utilruntime.HandleError(err)
×
353
                c.deleteProviderNetworkQueue.AddRateLimited(obj)
×
354
                return true
×
355
        }
×
356
        return true
×
357
}
358

359
func (c *Controller) handleAddOrUpdateProviderNetwork(key string) error {
×
360
        klog.V(3).Infof("handle update provider network %s", key)
×
361
        node, err := c.nodesLister.Get(c.config.NodeName)
×
362
        if err != nil {
×
363
                klog.Error(err)
×
364
                return err
×
365
        }
×
366
        pn, err := c.providerNetworksLister.Get(key)
×
367
        if err != nil {
×
368
                if k8serrors.IsNotFound(err) {
×
369
                        return nil
×
370
                }
×
371
                klog.Error(err)
×
372
                return err
×
373
        }
374

375
        excluded, err := util.IsNodeExcludedFromProviderNetwork(node, pn)
×
376
        if err != nil {
×
377
                klog.Error(err)
×
378
                return err
×
379
        }
×
380

381
        if excluded {
×
382
                c.recordProviderNetworkErr(pn.Name, "")
×
383
                return c.cleanProviderNetwork(pn.DeepCopy(), node.DeepCopy())
×
384
        }
×
385
        return c.initProviderNetwork(pn.DeepCopy(), node.DeepCopy())
×
386
}
387

388
func (c *Controller) initProviderNetwork(pn *kubeovnv1.ProviderNetwork, node *v1.Node) error {
×
389
        nic := pn.Spec.DefaultInterface
×
390
        for _, item := range pn.Spec.CustomInterfaces {
×
391
                if slices.Contains(item.Nodes, node.Name) {
×
392
                        nic = item.Interface
×
393
                        break
×
394
                }
395
        }
396

397
        patch := util.KVPatch{
×
398
                fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name):     nil,
×
399
                fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name): nil,
×
400
                fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name):       nil,
×
401
                fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name):   nil,
×
402
                fmt.Sprintf(util.ProviderNetworkVlanIntTemplate, pn.Name):   nil,
×
403
        }
×
404

×
405
        vlans := strset.NewWithSize(len(pn.Status.Vlans) + 1)
×
406
        for _, vlanName := range pn.Status.Vlans {
×
407
                vlan, err := c.vlansLister.Get(vlanName)
×
408
                if err != nil {
×
409
                        if k8serrors.IsNotFound(err) {
×
410
                                klog.Infof("vlan %s not found", vlanName)
×
411
                                continue
×
412
                        }
413
                        klog.Errorf("failed to get vlan %q: %v", vlanName, err)
×
414
                        return err
×
415
                }
416
                vlans.Add(strconv.Itoa(vlan.Spec.ID))
×
417
        }
418
        // always add trunk 0 so that the ovs bridge can communicate with the external network
419
        vlans.Add("0")
×
420

×
421
        // Auto-create VLAN subinterface if enabled and nic contains VLAN ID
×
422
        if pn.Spec.AutoCreateVlanSubinterfaces && strings.Contains(nic, ".") {
×
423
                parts := strings.SplitN(nic, ".", 2)
×
424
                parentIf := parts[0]
×
425
                if !util.CheckInterfaceExists(nic) {
×
426
                        klog.Infof("Auto-create enabled: creating default VLAN subinterface %s on %s", nic, parentIf)
×
427
                        if err := c.createVlanSubinterfaces([]string{nic}, parentIf, pn.Name); err != nil {
×
428
                                klog.Errorf("Failed to create default VLAN subinterface %s: %v", nic, err)
×
429
                                return err
×
430
                        }
×
431
                } else {
×
432
                        klog.V(3).Infof("Default VLAN subinterface %s already exists, skipping creation", nic)
×
433
                }
×
434
        }
435

436
        // VLAN sub-interface handling - use map for efficiency
437
        vlanInterfaceMap := make(map[string]int) // interfaceName -> vlanID
×
438

×
439
        // Process explicitly specified VLAN interfaces
×
440
        if len(pn.Spec.VlanInterfaces) > 0 {
×
441
                klog.Infof("Processing %d explicitly specified VLAN interfaces", len(pn.Spec.VlanInterfaces))
×
442
                for _, vlanIfName := range pn.Spec.VlanInterfaces {
×
443
                        if util.CheckInterfaceExists(vlanIfName) {
×
444
                                // Extract VLAN ID from interface name (e.g., "eth0.10" -> 10)
×
445
                                vlanID, err := util.ExtractVlanIDFromInterface(vlanIfName)
×
446
                                if err != nil {
×
447
                                        klog.Warningf("Failed to extract VLAN ID from interface %s: %v", vlanIfName, err)
×
448
                                        continue
×
449
                                }
450
                                vlanInterfaceMap[vlanIfName] = vlanID
×
451
                                vlans.Add(strconv.Itoa(vlanID))
×
452
                                klog.V(3).Infof("Added explicit VLAN interface %s (VLAN ID %d)", vlanIfName, vlanID)
×
453
                        } else {
×
454
                                klog.Warningf("Explicitly specified VLAN interface %s does not exist, skipping", vlanIfName)
×
455
                        }
×
456
                }
457
        }
458

459
        // Auto-detection of additional VLAN interfaces (if enabled)
460
        if pn.Spec.PreserveVlanInterfaces {
×
461
                klog.Infof("Auto-detecting VLAN interfaces on %s", nic)
×
462
                vlanIDs := util.DetectVlanInterfaces(nic)
×
463
                for _, vlanID := range vlanIDs {
×
464
                        vlanIfName := fmt.Sprintf("%s.%d", nic, vlanID)
×
465
                        // Only add if not already explicitly specified
×
466
                        if _, exists := vlanInterfaceMap[vlanIfName]; !exists {
×
467
                                vlanInterfaceMap[vlanIfName] = vlanID
×
468
                                vlans.Add(strconv.Itoa(vlanID))
×
469
                                klog.V(3).Infof("Auto-detected VLAN interface %s (VLAN ID %d)", vlanIfName, vlanID)
×
470
                        } else {
×
471
                                klog.V(3).Infof("VLAN interface %s already explicitly specified, skipping auto-detection", vlanIfName)
×
472
                        }
×
473
                }
474
                klog.Infof("Auto-detected %d additional VLAN interfaces for %s", len(vlanIDs), nic)
×
475
        }
476

477
        var mtu int
×
478
        var err error
×
479
        klog.V(3).Infof("ovs init provider network %s", pn.Name)
×
480
        // Configure main interface with ALL VLANs (including detected ones) in trunk
×
481
        if mtu, err = c.ovsInitProviderNetwork(pn.Name, nic, vlans.List(), pn.Spec.ExchangeLinkName, c.config.MacLearningFallback, vlanInterfaceMap); err != nil {
×
482
                delete(patch, fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name))
×
483
                if err1 := util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err1 != nil {
×
484
                        klog.Errorf("failed to patch annotations of node %s: %v", node.Name, err1)
×
485
                }
×
486
                c.recordProviderNetworkErr(pn.Name, err.Error())
×
487
                return err
×
488
        }
489

490
        patch[fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name)] = "true"
×
491
        patch[fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name)] = nic
×
492
        patch[fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name)] = strconv.Itoa(mtu)
×
493
        if len(vlanInterfaceMap) > 0 {
×
494
                patch[fmt.Sprintf(util.ProviderNetworkVlanIntTemplate, pn.Name)] = "true"
×
495
        }
×
496
        if err = util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
497
                klog.Errorf("failed to patch labels of node %s: %v", node.Name, err)
×
498
                return err
×
499
        }
×
500
        c.recordProviderNetworkErr(pn.Name, "")
×
501
        return nil
×
502
}
503

504
func (c *Controller) recordProviderNetworkErr(providerNetwork, errMsg string) {
×
505
        pod, err := c.podsLister.Pods(c.config.PodNamespace).Get(c.config.PodName)
×
506
        if err != nil {
×
507
                klog.Errorf("failed to get pod %s/%s, %v", c.config.PodNamespace, c.config.PodName, err)
×
508
                return
×
509
        }
×
510

511
        patch := util.KVPatch{}
×
512
        if pod.Annotations[fmt.Sprintf(util.ProviderNetworkErrMessageTemplate, providerNetwork)] != errMsg {
×
513
                if errMsg == "" {
×
514
                        patch[fmt.Sprintf(util.ProviderNetworkErrMessageTemplate, providerNetwork)] = nil
×
515
                } else {
×
516
                        patch[fmt.Sprintf(util.ProviderNetworkErrMessageTemplate, providerNetwork)] = errMsg
×
517
                }
×
518
                if err = util.PatchAnnotations(c.config.KubeClient.CoreV1().Pods(pod.Namespace), pod.Name, patch); err != nil {
×
519
                        klog.Errorf("failed to patch pod %s/%s: %v", pod.Namespace, pod.Name, err)
×
520
                        return
×
521
                }
×
522
        }
523
}
524

525
func (c *Controller) cleanProviderNetwork(pn *kubeovnv1.ProviderNetwork, node *v1.Node) error {
×
526
        patch := util.KVPatch{
×
527
                fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name):     nil,
×
528
                fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name): nil,
×
529
                fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name):       nil,
×
530
                fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name):   "true",
×
531
        }
×
532
        if err := util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
533
                klog.Errorf("failed to patch labels of node %s: %v", node.Name, err)
×
534
                return err
×
535
        }
×
536

537
        return c.ovsCleanProviderNetwork(pn.Name)
×
538
}
539

540
func (c *Controller) handleDeleteProviderNetwork(pn *kubeovnv1.ProviderNetwork) error {
×
541
        if err := c.ovsCleanProviderNetwork(pn.Name); err != nil {
×
542
                klog.Error(err)
×
543
                return err
×
544
        }
×
545

546
        if err := c.cleanupAutoCreatedVlanInterfaces(pn.Name); err != nil {
×
547
                klog.Errorf("Failed to cleanup auto-created VLAN interfaces for provider %s: %v", pn.Name, err)
×
548
                return err
×
549
        }
×
550

551
        node, err := c.nodesLister.Get(c.config.NodeName)
×
552
        if err != nil {
×
553
                klog.Error(err)
×
554
                return err
×
555
        }
×
556
        if len(node.Labels) == 0 {
×
557
                return nil
×
558
        }
×
559

560
        patch := util.KVPatch{
×
561
                fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name):     nil,
×
562
                fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name): nil,
×
563
                fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name):       nil,
×
564
                fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name):   nil,
×
565
                fmt.Sprintf(util.ProviderNetworkVlanIntTemplate, pn.Name):   nil,
×
566
        }
×
567
        if err = util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
568
                klog.Errorf("failed to patch labels of node %s: %v", node.Name, err)
×
569
                return err
×
570
        }
×
571

572
        return nil
×
573
}
574

575
func (c *Controller) enqueueUpdateVlan(oldObj, newObj any) {
×
576
        oldVlan := oldObj.(*kubeovnv1.Vlan)
×
577
        newVlan := newObj.(*kubeovnv1.Vlan)
×
578
        if oldVlan.Spec.ID != newVlan.Spec.ID {
×
579
                klog.V(3).Infof("enqueue update provider network %q", newVlan.Spec.Provider)
×
580
                c.addOrUpdateProviderNetworkQueue.Add(newVlan.Spec.Provider)
×
581
        }
×
582
}
583

584
type subnetEvent struct {
585
        oldObj, newObj any
586
}
587

588
type serviceEvent struct {
589
        oldObj, newObj any
590
}
591

592
func (c *Controller) enqueueAddSubnet(obj any) {
×
NEW
593
        event := &subnetEvent{newObj: obj}
×
NEW
594
        c.subnetQueue.Add(event)
×
NEW
595
        c.enqueueMacvlanSubnet(event)
×
UNCOV
596
}
×
597

598
func (c *Controller) enqueueUpdateSubnet(oldObj, newObj any) {
×
NEW
599
        event := &subnetEvent{oldObj: oldObj, newObj: newObj}
×
NEW
600
        c.subnetQueue.Add(event)
×
NEW
601
        c.enqueueMacvlanSubnet(event)
×
UNCOV
602
}
×
603

604
func (c *Controller) enqueueDeleteSubnet(obj any) {
×
NEW
605
        event := &subnetEvent{oldObj: obj}
×
NEW
606
        c.subnetQueue.Add(event)
×
NEW
607
        c.enqueueMacvlanSubnet(event)
×
UNCOV
608
}
×
609

610
func (c *Controller) runSubnetWorker() {
×
611
        for c.processNextSubnetWorkItem() {
×
612
        }
×
613
}
614

615
// enqueueMacvlanSubnet checks if the subnet event needs macvlan processing and enqueues it
NEW
616
func (c *Controller) enqueueMacvlanSubnet(event *subnetEvent) {
×
NEW
617
        if !c.config.EnableNodeLocalAccessVpcNatGwEIP {
×
NEW
618
                return
×
NEW
619
        }
×
620

621
        // Check if old or new subnet has NadMacvlanMasterAnnotation
NEW
622
        needEnqueue := false
×
NEW
623
        if event.oldObj != nil {
×
NEW
624
                if oldSubnet, ok := event.oldObj.(*kubeovnv1.Subnet); ok && oldSubnet.Annotations[util.NadMacvlanMasterAnnotation] != "" {
×
NEW
625
                        needEnqueue = true
×
NEW
626
                }
×
627
        }
NEW
628
        if event.newObj != nil {
×
NEW
629
                if newSubnet, ok := event.newObj.(*kubeovnv1.Subnet); ok && newSubnet.Annotations[util.NadMacvlanMasterAnnotation] != "" {
×
NEW
630
                        needEnqueue = true
×
NEW
631
                }
×
632
        }
633

NEW
634
        if needEnqueue {
×
NEW
635
                c.macvlanSubnetQueue.Add(event)
×
NEW
636
        }
×
637
}
638

NEW
639
func (c *Controller) runMacvlanSubnetWorker() {
×
NEW
640
        for c.processNextMacvlanSubnetWorkItem() {
×
NEW
641
        }
×
642
}
643

NEW
644
func (c *Controller) processNextMacvlanSubnetWorkItem() bool {
×
NEW
645
        obj, shutdown := c.macvlanSubnetQueue.Get()
×
NEW
646
        if shutdown {
×
NEW
647
                return false
×
NEW
648
        }
×
649

NEW
650
        err := func(obj *subnetEvent) error {
×
NEW
651
                defer c.macvlanSubnetQueue.Done(obj)
×
NEW
652
                if err := c.reconcileMacvlanSubnet(obj); err != nil {
×
NEW
653
                        c.macvlanSubnetQueue.AddRateLimited(obj)
×
NEW
654
                        return fmt.Errorf("error syncing macvlan for %v: %w, requeuing", obj, err)
×
NEW
655
                }
×
NEW
656
                c.macvlanSubnetQueue.Forget(obj)
×
NEW
657
                return nil
×
658
        }(obj)
NEW
659
        if err != nil {
×
NEW
660
                utilruntime.HandleError(err)
×
NEW
661
                return true
×
NEW
662
        }
×
NEW
663
        return true
×
664
}
665

666
func (c *Controller) enqueueAddService(obj any) {
×
667
        c.serviceQueue.Add(&serviceEvent{newObj: obj})
×
668
}
×
669

670
func (c *Controller) enqueueUpdateService(oldObj, newObj any) {
×
671
        c.serviceQueue.Add(&serviceEvent{oldObj: oldObj, newObj: newObj})
×
672
}
×
673

674
func (c *Controller) enqueueDeleteService(obj any) {
×
675
        c.serviceQueue.Add(&serviceEvent{oldObj: obj})
×
676
}
×
677

678
func (c *Controller) runAddOrUpdateServicekWorker() {
×
679
        for c.processNextServiceWorkItem() {
×
680
        }
×
681
}
682

683
func (c *Controller) processNextSubnetWorkItem() bool {
×
684
        obj, shutdown := c.subnetQueue.Get()
×
685
        if shutdown {
×
686
                return false
×
687
        }
×
688

689
        err := func(obj *subnetEvent) error {
×
690
                defer c.subnetQueue.Done(obj)
×
691
                if err := c.reconcileRouters(obj); err != nil {
×
692
                        c.subnetQueue.AddRateLimited(obj)
×
693
                        return fmt.Errorf("error syncing %v: %w, requeuing", obj, err)
×
694
                }
×
695
                c.subnetQueue.Forget(obj)
×
696
                return nil
×
697
        }(obj)
698
        if err != nil {
×
699
                utilruntime.HandleError(err)
×
700
                return true
×
701
        }
×
702
        return true
×
703
}
704

705
func (c *Controller) processNextServiceWorkItem() bool {
×
706
        obj, shutdown := c.serviceQueue.Get()
×
707
        if shutdown {
×
708
                return false
×
709
        }
×
710

711
        err := func(obj *serviceEvent) error {
×
712
                defer c.serviceQueue.Done(obj)
×
713
                if err := c.reconcileServices(obj); err != nil {
×
714
                        c.serviceQueue.AddRateLimited(obj)
×
715
                        return fmt.Errorf("error syncing %v: %w, requeuing", obj, err)
×
716
                }
×
717
                c.serviceQueue.Forget(obj)
×
718
                return nil
×
719
        }(obj)
720
        if err != nil {
×
721
                utilruntime.HandleError(err)
×
722
                return true
×
723
        }
×
724
        return true
×
725
}
726

727
func (c *Controller) enqueueUpdatePod(oldObj, newObj any) {
×
728
        oldPod := oldObj.(*v1.Pod)
×
729
        newPod := newObj.(*v1.Pod)
×
730
        key := cache.MetaObjectToName(newPod).String()
×
731

×
NEW
732
        // Handle NAT GW pod update for EIP route management
×
NEW
733
        if c.config.EnableNodeLocalAccessVpcNatGwEIP {
×
NEW
734
                c.handleNatGwPodUpdate(oldPod, newPod)
×
NEW
735
        }
×
736

737
        if oldPod.Annotations[util.IngressRateAnnotation] != newPod.Annotations[util.IngressRateAnnotation] ||
×
738
                oldPod.Annotations[util.EgressRateAnnotation] != newPod.Annotations[util.EgressRateAnnotation] ||
×
739
                oldPod.Annotations[util.NetemQosLatencyAnnotation] != newPod.Annotations[util.NetemQosLatencyAnnotation] ||
×
740
                oldPod.Annotations[util.NetemQosJitterAnnotation] != newPod.Annotations[util.NetemQosJitterAnnotation] ||
×
741
                oldPod.Annotations[util.NetemQosLimitAnnotation] != newPod.Annotations[util.NetemQosLimitAnnotation] ||
×
742
                oldPod.Annotations[util.NetemQosLossAnnotation] != newPod.Annotations[util.NetemQosLossAnnotation] ||
×
743
                oldPod.Annotations[util.MirrorControlAnnotation] != newPod.Annotations[util.MirrorControlAnnotation] ||
×
744
                oldPod.Annotations[util.IPAddressAnnotation] != newPod.Annotations[util.IPAddressAnnotation] {
×
745
                c.updatePodQueue.Add(key)
×
746
                return
×
747
        }
×
748

749
        attachNets, err := nadutils.ParsePodNetworkAnnotation(newPod)
×
750
        if err != nil {
×
751
                return
×
752
        }
×
753
        for _, multiNet := range attachNets {
×
754
                provider := fmt.Sprintf("%s.%s.%s", multiNet.Name, multiNet.Namespace, util.OvnProvider)
×
755
                if newPod.Annotations[fmt.Sprintf(util.AllocatedAnnotationTemplate, provider)] == "true" {
×
756
                        if oldPod.Annotations[fmt.Sprintf(util.IngressRateAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.IngressRateAnnotationTemplate, provider)] ||
×
757
                                oldPod.Annotations[fmt.Sprintf(util.EgressRateAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.EgressRateAnnotationTemplate, provider)] ||
×
758
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosLatencyAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosLatencyAnnotationTemplate, provider)] ||
×
759
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosJitterAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosJitterAnnotationTemplate, provider)] ||
×
760
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosLimitAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosLimitAnnotationTemplate, provider)] ||
×
761
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosLossAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosLossAnnotationTemplate, provider)] ||
×
762
                                oldPod.Annotations[fmt.Sprintf(util.MirrorControlAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.MirrorControlAnnotationTemplate, provider)] {
×
763
                                c.updatePodQueue.Add(key)
×
764
                        }
×
765
                }
766
        }
767
}
768

769
func (c *Controller) runUpdatePodWorker() {
×
770
        for c.processNextUpdatePodWorkItem() {
×
771
        }
×
772
}
773

774
func (c *Controller) processNextUpdatePodWorkItem() bool {
×
775
        key, shutdown := c.updatePodQueue.Get()
×
776
        if shutdown {
×
777
                return false
×
778
        }
×
779

780
        err := func(key string) error {
×
781
                defer c.updatePodQueue.Done(key)
×
782
                if err := c.handleUpdatePod(key); err != nil {
×
783
                        c.updatePodQueue.AddRateLimited(key)
×
784
                        return fmt.Errorf("error syncing %q: %w, requeuing", key, err)
×
785
                }
×
786
                c.updatePodQueue.Forget(key)
×
787
                return nil
×
788
        }(key)
789
        if err != nil {
×
790
                utilruntime.HandleError(err)
×
791
                return true
×
792
        }
×
793
        return true
×
794
}
795

796
func (c *Controller) gcInterfaces() {
×
797
        interfacePodMap, err := ovs.ListInterfacePodMap()
×
798
        if err != nil {
×
799
                klog.Errorf("failed to list interface pod map: %v", err)
×
800
                return
×
801
        }
×
802
        for iface, pod := range interfacePodMap {
×
803
                parts := strings.Split(pod, "/")
×
804
                if len(parts) < 3 {
×
805
                        klog.Errorf("malformed pod string %q for interface %s, expected format 'namespace/name/errText'", pod, iface)
×
806
                        continue
×
807
                }
808

809
                podNamespace, podName, errText := parts[0], parts[1], parts[2]
×
810
                if strings.Contains(errText, "No such device") {
×
811
                        klog.Infof("pod %s/%s not found, delete ovs interface %s", podNamespace, podName, iface)
×
812
                        if err := ovs.CleanInterface(iface); err != nil {
×
813
                                klog.Errorf("failed to clean ovs interface %s: %v", iface, err)
×
814
                        }
×
815
                        continue
×
816
                }
817

818
                if _, err = c.podsLister.Pods(podNamespace).Get(podName); err != nil {
×
819
                        if !k8serrors.IsNotFound(err) {
×
820
                                klog.Errorf("failed to get pod %s/%s: %v", podNamespace, podName, err)
×
821
                                continue
×
822
                        }
823

824
                        // Pod not found by name. Check if this might be a KubeVirt VM.
825
                        // For KubeVirt VMs, the pod_name in OVS external_ids is set to the VM name (not the launcher pod name).
826
                        // The actual launcher pod has the label 'vm.kubevirt.io/name' with the VM name as value.
827
                        // Try to find launcher pods by this label.
828
                        selector := labels.SelectorFromSet(map[string]string{kubevirtv1.DeprecatedVirtualMachineNameLabel: podName})
×
829
                        launcherPods, err := c.podsLister.Pods(podNamespace).List(selector)
×
830
                        if err != nil {
×
831
                                klog.Errorf("failed to list launcher pods for vm %s/%s: %v", podNamespace, podName, err)
×
832
                                continue
×
833
                        }
834

835
                        // If we found launcher pod(s) for this VM, keep the interface
836
                        if len(launcherPods) > 0 {
×
837
                                klog.V(5).Infof("found %d launcher pod(s) for vm %s/%s, keeping ovs interface %s",
×
838
                                        len(launcherPods), podNamespace, podName, iface)
×
839
                                continue
×
840
                        }
841

842
                        // No pod on this node and no launcher pod found - safe to delete
843
                        klog.Infof("pod %s/%s not found on this node, delete ovs interface %s", podNamespace, podName, iface)
×
844
                        if err = ovs.CleanInterface(iface); err != nil {
×
845
                                klog.Errorf("failed to clean ovs interface %s: %v", iface, err)
×
846
                        }
×
847
                }
848
        }
849
}
850

851
func (c *Controller) runIPSecWorker() {
×
852
        if err := c.StartIPSecService(); err != nil {
×
853
                klog.Errorf("starting ipsec service: %v", err)
×
854
        }
×
855

856
        for c.processNextIPSecWorkItem() {
×
857
        }
×
858
}
859

860
func (c *Controller) processNextIPSecWorkItem() bool {
×
861
        key, shutdown := c.ipsecQueue.Get()
×
862
        if shutdown {
×
863
                return false
×
864
        }
×
865
        defer c.ipsecQueue.Done(key)
×
866

×
867
        err := func(key string) error {
×
868
                if err := c.SyncIPSecKeys(key); err != nil {
×
869
                        c.ipsecQueue.AddRateLimited(key)
×
870
                        return fmt.Errorf("error syncing %q: %w, requeuing", key, err)
×
871
                }
×
872
                c.ipsecQueue.Forget(key)
×
873
                return nil
×
874
        }(key)
875
        if err != nil {
×
876
                utilruntime.HandleError(err)
×
877
                return true
×
878
        }
×
879
        return true
×
880
}
881

882
func (c *Controller) runUpdateNodeWorker() {
×
883
        for c.processNextUpdateNodeWorkItem() {
×
884
        }
×
885
}
886

887
func (c *Controller) processNextUpdateNodeWorkItem() bool {
×
888
        key, shutdown := c.updateNodeQueue.Get()
×
889
        if shutdown {
×
890
                return false
×
891
        }
×
892

893
        err := func(key string) error {
×
894
                defer c.updateNodeQueue.Done(key)
×
895
                if err := c.handleUpdateNode(key); err != nil {
×
896
                        c.updateNodeQueue.AddRateLimited(key)
×
897
                        return fmt.Errorf("error syncing node %q: %w, requeuing", key, err)
×
898
                }
×
899
                c.updateNodeQueue.Forget(key)
×
900
                return nil
×
901
        }(key)
902
        if err != nil {
×
903
                utilruntime.HandleError(err)
×
904
                return true
×
905
        }
×
906
        return true
×
907
}
908

909
func (c *Controller) handleUpdateNode(key string) error {
×
910
        node, err := c.nodesLister.Get(key)
×
911
        if err != nil {
×
912
                if k8serrors.IsNotFound(err) {
×
913
                        return nil
×
914
                }
×
915
                klog.Error(err)
×
916
                return err
×
917
        }
918

919
        klog.Infof("updating node networks for node %s", key)
×
920
        return c.config.UpdateNodeNetworks(node)
×
921
}
922

923
// Run starts controller
924
func (c *Controller) Run(stopCh <-chan struct{}) {
×
925
        defer utilruntime.HandleCrash()
×
926
        defer c.addOrUpdateProviderNetworkQueue.ShutDown()
×
927
        defer c.deleteProviderNetworkQueue.ShutDown()
×
928
        defer c.subnetQueue.ShutDown()
×
NEW
929
        defer c.macvlanSubnetQueue.ShutDown()
×
930
        defer c.serviceQueue.ShutDown()
×
931
        defer c.updatePodQueue.ShutDown()
×
932
        defer c.ipsecQueue.ShutDown()
×
933
        defer c.updateNodeQueue.ShutDown()
×
NEW
934
        defer c.iptablesEipQueue.ShutDown()
×
NEW
935
        defer c.iptablesEipDeleteQueue.ShutDown()
×
936
        go wait.Until(c.gcInterfaces, time.Minute, stopCh)
×
937
        go wait.Until(recompute, 10*time.Minute, stopCh)
×
938
        go wait.Until(rotateLog, 1*time.Hour, stopCh)
×
939

×
940
        if err := c.setIPSet(); err != nil {
×
941
                util.LogFatalAndExit(err, "failed to set ipsets")
×
942
        }
×
943

944
        klog.Info("Started workers")
×
945
        go wait.Until(c.loopOvn0Check, 5*time.Second, stopCh)
×
946
        go wait.Until(c.loopOvnExt0Check, 5*time.Second, stopCh)
×
947
        go wait.Until(c.loopTunnelCheck, 5*time.Second, stopCh)
×
948
        go wait.Until(c.runAddOrUpdateProviderNetworkWorker, time.Second, stopCh)
×
949
        go wait.Until(c.runAddOrUpdateServicekWorker, time.Second, stopCh)
×
950
        go wait.Until(c.runDeleteProviderNetworkWorker, time.Second, stopCh)
×
951
        go wait.Until(c.runSubnetWorker, time.Second, stopCh)
×
952
        go wait.Until(c.runUpdatePodWorker, time.Second, stopCh)
×
953
        go wait.Until(c.runUpdateNodeWorker, time.Second, stopCh)
×
954
        go wait.Until(c.runIPSecWorker, 3*time.Second, stopCh)
×
NEW
955
        if c.config.EnableNodeLocalAccessVpcNatGwEIP {
×
NEW
956
                go wait.Until(c.runMacvlanSubnetWorker, time.Second, stopCh)
×
NEW
957
                go wait.Until(c.runIptablesEipWorker, time.Second, stopCh)
×
NEW
958
                go wait.Until(c.runIptablesEipDeleteWorker, time.Second, stopCh)
×
NEW
959
        }
×
960
        go wait.Until(c.runGateway, 3*time.Second, stopCh)
×
961
        go wait.Until(c.loopEncapIPCheck, 3*time.Second, stopCh)
×
962
        go wait.Until(c.ovnMetricsUpdate, 3*time.Second, stopCh)
×
963
        go wait.Until(func() {
×
964
                if err := c.reconcileRouters(nil); err != nil {
×
965
                        klog.Errorf("failed to reconcile %s routes: %v", util.NodeNic, err)
×
966
                }
×
967
        }, 3*time.Second, stopCh)
968

969
        if c.config.EnableTProxy {
×
970
                go c.StartTProxyForwarding()
×
971
                go wait.Until(c.runTProxyConfigWorker, 3*time.Second, stopCh)
×
972
                // Using the tproxy method, kubelet's TCP probe packets cannot reach the namespace of the pod of the custom VPC,
×
973
                // so tproxy itself probes the pod of the custom VPC, if probe failed remove the iptable rules from
×
974
                // kubelet to tproxy, if probe success recover the iptable rules
×
975
                go wait.Until(c.StartTProxyTCPPortProbe, 1*time.Second, stopCh)
×
976
        } else {
×
977
                c.cleanTProxyConfig()
×
978
        }
×
979

980
        if !c.config.EnableOVNIPSec {
×
981
                if err := c.StopAndClearIPSecResource(); err != nil {
×
982
                        klog.Errorf("stop and clear ipsec resource error: %v", err)
×
983
                }
×
984
        }
985

986
        // Start OpenFlow sync loop
987
        go c.runFlowSync(stopCh)
×
988

×
989
        <-stopCh
×
990
        klog.Info("Shutting down workers")
×
991
}
992

993
func recompute() {
×
994
        output, err := ovs.Appctl(ovs.OvnController, "inc-engine/recompute")
×
995
        if err != nil {
×
996
                klog.Errorf("failed to trigger force recompute for %s: %q", ovs.OvnController, output)
×
997
        }
×
998
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc