• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 21743518827

06 Feb 2026 08:11AM UTC coverage: 22.781% (-0.1%) from 22.897%
21743518827

push

github

zhangzujian
cni-server: add static fdb entry for subnets with u2o enabled (#6269)

Signed-off-by: zhangzujian <zhangzujian.7@gmail.com>

0 of 297 new or added lines in 10 files covered. (0.0%)

1 existing line in 1 file now uncovered.

12310 of 54037 relevant lines covered (22.78%)

0.27 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

0.0
/pkg/daemon/controller.go
1
package daemon
2

3
import (
4
        "bytes"
5
        "context"
6
        "fmt"
7
        "maps"
8
        "slices"
9
        "strconv"
10
        "strings"
11
        "sync"
12
        "time"
13

14
        nadutils "github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils"
15
        "github.com/scylladb/go-set/strset"
16
        v1 "k8s.io/api/core/v1"
17
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
18
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
19
        "k8s.io/apimachinery/pkg/labels"
20
        utilruntime "k8s.io/apimachinery/pkg/util/runtime"
21
        "k8s.io/apimachinery/pkg/util/wait"
22
        "k8s.io/client-go/informers"
23
        "k8s.io/client-go/kubernetes/scheme"
24
        typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
25
        listerv1 "k8s.io/client-go/listers/core/v1"
26
        "k8s.io/client-go/tools/cache"
27
        "k8s.io/client-go/tools/record"
28
        "k8s.io/client-go/util/workqueue"
29
        "k8s.io/klog/v2"
30
        k8sexec "k8s.io/utils/exec"
31
        kubevirtv1 "kubevirt.io/api/core/v1"
32

33
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
34
        kubeovninformer "github.com/kubeovn/kube-ovn/pkg/client/informers/externalversions"
35
        kubeovnlister "github.com/kubeovn/kube-ovn/pkg/client/listers/kubeovn/v1"
36
        "github.com/kubeovn/kube-ovn/pkg/ovs"
37
        "github.com/kubeovn/kube-ovn/pkg/util"
38
)
39

40
// Controller watch pod and namespace changes to update iptables, ipset and ovs qos
41
type Controller struct {
42
        config *Configuration
43

44
        providerNetworksLister          kubeovnlister.ProviderNetworkLister
45
        providerNetworksSynced          cache.InformerSynced
46
        addOrUpdateProviderNetworkQueue workqueue.TypedRateLimitingInterface[string]
47
        deleteProviderNetworkQueue      workqueue.TypedRateLimitingInterface[*kubeovnv1.ProviderNetwork]
48

49
        vlansLister kubeovnlister.VlanLister
50
        vlansSynced cache.InformerSynced
51

52
        subnetsLister kubeovnlister.SubnetLister
53
        subnetsSynced cache.InformerSynced
54
        subnetQueue   workqueue.TypedRateLimitingInterface[*subnetEvent]
55

56
        ovnEipsLister kubeovnlister.OvnEipLister
57
        ovnEipsSynced cache.InformerSynced
58

59
        podsLister     listerv1.PodLister
60
        podsSynced     cache.InformerSynced
61
        updatePodQueue workqueue.TypedRateLimitingInterface[string]
62

63
        nodesLister     listerv1.NodeLister
64
        nodesSynced     cache.InformerSynced
65
        updateNodeQueue workqueue.TypedRateLimitingInterface[string]
66

67
        servicesLister listerv1.ServiceLister
68
        servicesSynced cache.InformerSynced
69
        serviceQueue   workqueue.TypedRateLimitingInterface[*serviceEvent]
70

71
        caSecretLister listerv1.SecretLister
72
        caSecretSynced cache.InformerSynced
73
        ipsecQueue     workqueue.TypedRateLimitingInterface[string]
74

75
        recorder record.EventRecorder
76

77
        protocol string
78

79
        ControllerRuntime
80

81
        k8sExec k8sexec.Interface
82

83
        // channel used for fdb sync
84
        fdbSyncChan   chan struct{}
85
        fdbSyncMutex  sync.Mutex
86
        vswitchClient ovs.Vswitch
87
}
88

89
func newTypedRateLimitingQueue[T comparable](name string, rateLimiter workqueue.TypedRateLimiter[T]) workqueue.TypedRateLimitingInterface[T] {
×
90
        if rateLimiter == nil {
×
91
                rateLimiter = workqueue.DefaultTypedControllerRateLimiter[T]()
×
92
        }
×
93
        return workqueue.NewTypedRateLimitingQueueWithConfig(rateLimiter, workqueue.TypedRateLimitingQueueConfig[T]{Name: name})
×
94
}
95

96
// NewController init a daemon controller
97
func NewController(config *Configuration,
98
        stopCh <-chan struct{},
99
        podInformerFactory, nodeInformerFactory, caSecretInformerFactory informers.SharedInformerFactory,
100
        kubeovnInformerFactory kubeovninformer.SharedInformerFactory,
101
) (*Controller, error) {
×
102
        eventBroadcaster := record.NewBroadcaster()
×
103
        eventBroadcaster.StartLogging(klog.Infof)
×
104
        eventBroadcaster.StartRecordingToSink(&typedcorev1.EventSinkImpl{Interface: config.KubeClient.CoreV1().Events(v1.NamespaceAll)})
×
105
        recorder := eventBroadcaster.NewRecorder(scheme.Scheme, v1.EventSource{Component: config.NodeName})
×
106
        providerNetworkInformer := kubeovnInformerFactory.Kubeovn().V1().ProviderNetworks()
×
107
        vlanInformer := kubeovnInformerFactory.Kubeovn().V1().Vlans()
×
108
        subnetInformer := kubeovnInformerFactory.Kubeovn().V1().Subnets()
×
109
        ovnEipInformer := kubeovnInformerFactory.Kubeovn().V1().OvnEips()
×
110
        podInformer := podInformerFactory.Core().V1().Pods()
×
111
        nodeInformer := nodeInformerFactory.Core().V1().Nodes()
×
112
        servicesInformer := nodeInformerFactory.Core().V1().Services()
×
113
        caSecretInformer := caSecretInformerFactory.Core().V1().Secrets()
×
114

×
115
        controller := &Controller{
×
116
                config: config,
×
117

×
118
                providerNetworksLister:          providerNetworkInformer.Lister(),
×
119
                providerNetworksSynced:          providerNetworkInformer.Informer().HasSynced,
×
120
                addOrUpdateProviderNetworkQueue: newTypedRateLimitingQueue[string]("AddOrUpdateProviderNetwork", nil),
×
121
                deleteProviderNetworkQueue:      newTypedRateLimitingQueue[*kubeovnv1.ProviderNetwork]("DeleteProviderNetwork", nil),
×
122

×
123
                vlansLister: vlanInformer.Lister(),
×
124
                vlansSynced: vlanInformer.Informer().HasSynced,
×
125

×
126
                subnetsLister: subnetInformer.Lister(),
×
127
                subnetsSynced: subnetInformer.Informer().HasSynced,
×
128
                subnetQueue:   newTypedRateLimitingQueue[*subnetEvent]("Subnet", nil),
×
129

×
130
                ovnEipsLister: ovnEipInformer.Lister(),
×
131
                ovnEipsSynced: ovnEipInformer.Informer().HasSynced,
×
132

×
133
                podsLister:     podInformer.Lister(),
×
134
                podsSynced:     podInformer.Informer().HasSynced,
×
135
                updatePodQueue: newTypedRateLimitingQueue[string]("UpdatePod", nil),
×
136

×
137
                nodesLister:     nodeInformer.Lister(),
×
138
                nodesSynced:     nodeInformer.Informer().HasSynced,
×
139
                updateNodeQueue: newTypedRateLimitingQueue[string]("UpdateNode", nil),
×
140

×
141
                servicesLister: servicesInformer.Lister(),
×
142
                servicesSynced: servicesInformer.Informer().HasSynced,
×
143
                serviceQueue:   newTypedRateLimitingQueue[*serviceEvent]("Service", nil),
×
144

×
145
                caSecretLister: caSecretInformer.Lister(),
×
146
                caSecretSynced: caSecretInformer.Informer().HasSynced,
×
147
                ipsecQueue:     newTypedRateLimitingQueue[string]("IPSecCA", nil),
×
148

×
149
                recorder: recorder,
×
150
                k8sExec:  k8sexec.New(),
×
NEW
151

×
NEW
152
                fdbSyncChan: make(chan struct{}, 1),
×
153
        }
×
154

×
155
        node, err := config.KubeClient.CoreV1().Nodes().Get(context.Background(), config.NodeName, metav1.GetOptions{})
×
156
        if err != nil {
×
157
                util.LogFatalAndExit(err, "failed to get node %s info", config.NodeName)
×
158
        }
×
159
        controller.protocol = util.CheckProtocol(node.Annotations[util.IPAddressAnnotation])
×
160

×
161
        if err = controller.initRuntime(); err != nil {
×
162
                return nil, err
×
163
        }
×
164

165
        podInformerFactory.Start(stopCh)
×
166
        nodeInformerFactory.Start(stopCh)
×
167
        kubeovnInformerFactory.Start(stopCh)
×
168
        caSecretInformerFactory.Start(stopCh)
×
169

×
170
        if !cache.WaitForCacheSync(stopCh,
×
171
                controller.providerNetworksSynced, controller.vlansSynced, controller.subnetsSynced,
×
172
                controller.podsSynced, controller.nodesSynced, controller.servicesSynced, controller.caSecretSynced) {
×
173
                util.LogFatalAndExit(nil, "failed to wait for caches to sync")
×
174
        }
×
175

176
        if _, err = providerNetworkInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
177
                AddFunc:    controller.enqueueAddProviderNetwork,
×
178
                UpdateFunc: controller.enqueueUpdateProviderNetwork,
×
179
                DeleteFunc: controller.enqueueDeleteProviderNetwork,
×
180
        }); err != nil {
×
181
                return nil, err
×
182
        }
×
183
        if _, err = vlanInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
184
                UpdateFunc: controller.enqueueUpdateVlan,
×
185
        }); err != nil {
×
186
                return nil, err
×
187
        }
×
188
        if _, err = subnetInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
189
                AddFunc:    controller.enqueueAddSubnet,
×
190
                UpdateFunc: controller.enqueueUpdateSubnet,
×
191
                DeleteFunc: controller.enqueueDeleteSubnet,
×
192
        }); err != nil {
×
193
                return nil, err
×
194
        }
×
195
        if _, err = servicesInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
196
                AddFunc:    controller.enqueueAddService,
×
197
                DeleteFunc: controller.enqueueDeleteService,
×
198
                UpdateFunc: controller.enqueueUpdateService,
×
199
        }); err != nil {
×
200
                util.LogFatalAndExit(err, "failed to add service event handler")
×
201
        }
×
202

203
        if _, err = podInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
204
                UpdateFunc: controller.enqueueUpdatePod,
×
205
        }); err != nil {
×
206
                return nil, err
×
207
        }
×
208
        if _, err = caSecretInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
209
                AddFunc:    controller.enqueueAddIPSecCA,
×
210
                UpdateFunc: controller.enqueueUpdateIPSecCA,
×
211
        }); err != nil {
×
212
                return nil, err
×
213
        }
×
214
        if _, err = nodeInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
×
215
                UpdateFunc: controller.enqueueUpdateNode,
×
216
        }); err != nil {
×
217
                return nil, err
×
218
        }
×
219

NEW
220
        if controller.vswitchClient, err = ovs.NewVswitchClient("unix:/var/run/openvswitch/db.sock", 1, 3); err != nil {
×
NEW
221
                return nil, fmt.Errorf("failed to create vswitch client: %w", err)
×
NEW
222
        }
×
223

UNCOV
224
        return controller, nil
×
225
}
226

227
func (c *Controller) enqueueAddIPSecCA(obj any) {
×
228
        key := cache.MetaObjectToName(obj.(*v1.Secret)).String()
×
229
        klog.V(3).Infof("enqueue add CA %s", key)
×
230
        c.ipsecQueue.Add(key)
×
231
}
×
232

233
func (c *Controller) enqueueUpdateIPSecCA(oldObj, newObj any) {
×
234
        oldSecret := oldObj.(*v1.Secret)
×
235
        newSecret := newObj.(*v1.Secret)
×
236
        if maps.EqualFunc(oldSecret.Data, newSecret.Data, bytes.Equal) {
×
237
                // No changes in CA data, no need to enqueue
×
238
                return
×
239
        }
×
240

241
        key := cache.MetaObjectToName(newSecret).String()
×
242
        klog.V(3).Infof("enqueue update CA %s", key)
×
243
        c.ipsecQueue.Add(key)
×
244
}
245

246
func (c *Controller) enqueueUpdateNode(oldObj, newObj any) {
×
247
        oldNode := oldObj.(*v1.Node)
×
248
        newNode := newObj.(*v1.Node)
×
249
        if newNode.Name != c.config.NodeName {
×
250
                return
×
251
        }
×
252
        if oldNode.Annotations[util.NodeNetworksAnnotation] != newNode.Annotations[util.NodeNetworksAnnotation] {
×
253
                klog.V(3).Infof("enqueue update node %s for node networks change", newNode.Name)
×
254
                c.updateNodeQueue.Add(newNode.Name)
×
255
        }
×
256
}
257

258
func (c *Controller) enqueueAddProviderNetwork(obj any) {
×
259
        key := cache.MetaObjectToName(obj.(*kubeovnv1.ProviderNetwork)).String()
×
260
        klog.V(3).Infof("enqueue add provider network %s", key)
×
261
        c.addOrUpdateProviderNetworkQueue.Add(key)
×
262
}
×
263

264
func (c *Controller) enqueueUpdateProviderNetwork(_, newObj any) {
×
265
        key := cache.MetaObjectToName(newObj.(*kubeovnv1.ProviderNetwork)).String()
×
266
        klog.V(3).Infof("enqueue update provider network %s", key)
×
267
        c.addOrUpdateProviderNetworkQueue.Add(key)
×
268
}
×
269

270
func (c *Controller) enqueueDeleteProviderNetwork(obj any) {
×
271
        var pn *kubeovnv1.ProviderNetwork
×
272
        switch t := obj.(type) {
×
273
        case *kubeovnv1.ProviderNetwork:
×
274
                pn = t
×
275
        case cache.DeletedFinalStateUnknown:
×
276
                p, ok := t.Obj.(*kubeovnv1.ProviderNetwork)
×
277
                if !ok {
×
278
                        klog.Warningf("unexpected object type: %T", t.Obj)
×
279
                        return
×
280
                }
×
281
                pn = p
×
282
        default:
×
283
                klog.Warningf("unexpected type: %T", obj)
×
284
                return
×
285
        }
286

287
        key := cache.MetaObjectToName(pn).String()
×
288
        klog.V(3).Infof("enqueue delete provider network %s", key)
×
289
        c.deleteProviderNetworkQueue.Add(pn)
×
290
}
291

292
func (c *Controller) runAddOrUpdateProviderNetworkWorker() {
×
293
        for c.processNextAddOrUpdateProviderNetworkWorkItem() {
×
294
        }
×
295
}
296

297
func (c *Controller) runDeleteProviderNetworkWorker() {
×
298
        for c.processNextDeleteProviderNetworkWorkItem() {
×
299
        }
×
300
}
301

302
func (c *Controller) processNextAddOrUpdateProviderNetworkWorkItem() bool {
×
303
        key, shutdown := c.addOrUpdateProviderNetworkQueue.Get()
×
304
        if shutdown {
×
305
                return false
×
306
        }
×
307

308
        err := func(key string) error {
×
309
                defer c.addOrUpdateProviderNetworkQueue.Done(key)
×
310
                if err := c.handleAddOrUpdateProviderNetwork(key); err != nil {
×
311
                        return fmt.Errorf("error syncing %q: %w, requeuing", key, err)
×
312
                }
×
313
                c.addOrUpdateProviderNetworkQueue.Forget(key)
×
314
                return nil
×
315
        }(key)
316
        if err != nil {
×
317
                utilruntime.HandleError(err)
×
318
                c.addOrUpdateProviderNetworkQueue.AddRateLimited(key)
×
319
                return true
×
320
        }
×
321
        return true
×
322
}
323

324
func (c *Controller) processNextDeleteProviderNetworkWorkItem() bool {
×
325
        obj, shutdown := c.deleteProviderNetworkQueue.Get()
×
326
        if shutdown {
×
327
                return false
×
328
        }
×
329

330
        err := func(obj *kubeovnv1.ProviderNetwork) error {
×
331
                defer c.deleteProviderNetworkQueue.Done(obj)
×
332
                if err := c.handleDeleteProviderNetwork(obj); err != nil {
×
333
                        return fmt.Errorf("error syncing %q: %w, requeuing", obj.Name, err)
×
334
                }
×
335
                c.deleteProviderNetworkQueue.Forget(obj)
×
336
                return nil
×
337
        }(obj)
338
        if err != nil {
×
339
                utilruntime.HandleError(err)
×
340
                c.deleteProviderNetworkQueue.AddRateLimited(obj)
×
341
                return true
×
342
        }
×
343
        return true
×
344
}
345

346
func (c *Controller) handleAddOrUpdateProviderNetwork(key string) error {
×
347
        klog.V(3).Infof("handle update provider network %s", key)
×
348
        node, err := c.nodesLister.Get(c.config.NodeName)
×
349
        if err != nil {
×
350
                klog.Error(err)
×
351
                return err
×
352
        }
×
353
        pn, err := c.providerNetworksLister.Get(key)
×
354
        if err != nil {
×
355
                if k8serrors.IsNotFound(err) {
×
356
                        return nil
×
357
                }
×
358
                klog.Error(err)
×
359
                return err
×
360
        }
361

362
        excluded, err := util.IsNodeExcludedFromProviderNetwork(node, pn)
×
363
        if err != nil {
×
364
                klog.Error(err)
×
365
                return err
×
366
        }
×
367

368
        if excluded {
×
369
                c.recordProviderNetworkErr(pn.Name, "")
×
370
                return c.cleanProviderNetwork(pn.DeepCopy(), node.DeepCopy())
×
371
        }
×
372
        return c.initProviderNetwork(pn.DeepCopy(), node.DeepCopy())
×
373
}
374

375
func (c *Controller) initProviderNetwork(pn *kubeovnv1.ProviderNetwork, node *v1.Node) error {
×
376
        nic := pn.Spec.DefaultInterface
×
377
        for _, item := range pn.Spec.CustomInterfaces {
×
378
                if slices.Contains(item.Nodes, node.Name) {
×
379
                        nic = item.Interface
×
380
                        break
×
381
                }
382
        }
383

384
        patch := util.KVPatch{
×
385
                fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name):     nil,
×
386
                fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name): nil,
×
387
                fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name):       nil,
×
388
                fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name):   nil,
×
389
                fmt.Sprintf(util.ProviderNetworkVlanIntTemplate, pn.Name):   nil,
×
390
        }
×
391

×
392
        vlans := strset.NewWithSize(len(pn.Status.Vlans) + 1)
×
393
        for _, vlanName := range pn.Status.Vlans {
×
394
                vlan, err := c.vlansLister.Get(vlanName)
×
395
                if err != nil {
×
396
                        if k8serrors.IsNotFound(err) {
×
397
                                klog.Infof("vlan %s not found", vlanName)
×
398
                                continue
×
399
                        }
400
                        klog.Errorf("failed to get vlan %q: %v", vlanName, err)
×
401
                        return err
×
402
                }
403
                vlans.Add(strconv.Itoa(vlan.Spec.ID))
×
404
        }
405
        // always add trunk 0 so that the ovs bridge can communicate with the external network
406
        vlans.Add("0")
×
407

×
408
        // Auto-create VLAN subinterface if enabled and nic contains VLAN ID
×
409
        if pn.Spec.AutoCreateVlanSubinterfaces && strings.Contains(nic, ".") {
×
410
                parts := strings.SplitN(nic, ".", 2)
×
411
                parentIf := parts[0]
×
412
                if !util.CheckInterfaceExists(nic) {
×
413
                        klog.Infof("Auto-create enabled: creating default VLAN subinterface %s on %s", nic, parentIf)
×
414
                        if err := c.createVlanSubinterfaces([]string{nic}, parentIf, pn.Name); err != nil {
×
415
                                klog.Errorf("Failed to create default VLAN subinterface %s: %v", nic, err)
×
416
                                return err
×
417
                        }
×
418
                } else {
×
419
                        klog.V(3).Infof("Default VLAN subinterface %s already exists, skipping creation", nic)
×
420
                }
×
421
        }
422

423
        // VLAN sub-interface handling - use map for efficiency
424
        vlanInterfaceMap := make(map[string]int) // interfaceName -> vlanID
×
425

×
426
        // Process explicitly specified VLAN interfaces
×
427
        if len(pn.Spec.VlanInterfaces) > 0 {
×
428
                klog.Infof("Processing %d explicitly specified VLAN interfaces", len(pn.Spec.VlanInterfaces))
×
429
                for _, vlanIfName := range pn.Spec.VlanInterfaces {
×
430
                        if util.CheckInterfaceExists(vlanIfName) {
×
431
                                // Extract VLAN ID from interface name (e.g., "eth0.10" -> 10)
×
432
                                vlanID, err := util.ExtractVlanIDFromInterface(vlanIfName)
×
433
                                if err != nil {
×
434
                                        klog.Warningf("Failed to extract VLAN ID from interface %s: %v", vlanIfName, err)
×
435
                                        continue
×
436
                                }
437
                                vlanInterfaceMap[vlanIfName] = vlanID
×
438
                                vlans.Add(strconv.Itoa(vlanID))
×
439
                                klog.V(3).Infof("Added explicit VLAN interface %s (VLAN ID %d)", vlanIfName, vlanID)
×
440
                        } else {
×
441
                                klog.Warningf("Explicitly specified VLAN interface %s does not exist, skipping", vlanIfName)
×
442
                        }
×
443
                }
444
        }
445

446
        // Auto-detection of additional VLAN interfaces (if enabled)
447
        if pn.Spec.PreserveVlanInterfaces {
×
448
                klog.Infof("Auto-detecting VLAN interfaces on %s", nic)
×
449
                vlanIDs := util.DetectVlanInterfaces(nic)
×
450
                for _, vlanID := range vlanIDs {
×
451
                        vlanIfName := fmt.Sprintf("%s.%d", nic, vlanID)
×
452
                        // Only add if not already explicitly specified
×
453
                        if _, exists := vlanInterfaceMap[vlanIfName]; !exists {
×
454
                                vlanInterfaceMap[vlanIfName] = vlanID
×
455
                                vlans.Add(strconv.Itoa(vlanID))
×
456
                                klog.V(3).Infof("Auto-detected VLAN interface %s (VLAN ID %d)", vlanIfName, vlanID)
×
457
                        } else {
×
458
                                klog.V(3).Infof("VLAN interface %s already explicitly specified, skipping auto-detection", vlanIfName)
×
459
                        }
×
460
                }
461
                klog.Infof("Auto-detected %d additional VLAN interfaces for %s", len(vlanIDs), nic)
×
462
        }
463

464
        if err := c.cleanupAutoCreatedVlanInterfaces(pn.Name, nic, vlanInterfaceMap); err != nil {
×
465
                klog.Errorf("Failed to cleanup auto-created VLAN interfaces for provider %s: %v", pn.Name, err)
×
466
                return err
×
467
        }
×
468

469
        var mtu int
×
470
        var err error
×
471
        klog.V(3).Infof("ovs init provider network %s", pn.Name)
×
472
        // Configure main interface with ALL VLANs (including detected ones) in trunk
×
473
        if mtu, err = c.ovsInitProviderNetwork(pn.Name, nic, vlans.List(), pn.Spec.ExchangeLinkName, c.config.MacLearningFallback, vlanInterfaceMap); err != nil {
×
474
                delete(patch, fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name))
×
475
                if err1 := util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err1 != nil {
×
476
                        klog.Errorf("failed to patch annotations of node %s: %v", node.Name, err1)
×
477
                }
×
478
                c.recordProviderNetworkErr(pn.Name, err.Error())
×
479
                return err
×
480
        }
481

482
        patch[fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name)] = "true"
×
483
        patch[fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name)] = nic
×
484
        patch[fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name)] = strconv.Itoa(mtu)
×
485
        if len(vlanInterfaceMap) > 0 {
×
486
                patch[fmt.Sprintf(util.ProviderNetworkVlanIntTemplate, pn.Name)] = "true"
×
487
        }
×
488
        if err = util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
489
                klog.Errorf("failed to patch labels of node %s: %v", node.Name, err)
×
490
                return err
×
491
        }
×
492
        c.recordProviderNetworkErr(pn.Name, "")
×
493
        return nil
×
494
}
495

496
func (c *Controller) recordProviderNetworkErr(providerNetwork, errMsg string) {
×
497
        pod, err := c.podsLister.Pods(c.config.PodNamespace).Get(c.config.PodName)
×
498
        if err != nil {
×
499
                klog.Errorf("failed to get pod %s/%s, %v", c.config.PodNamespace, c.config.PodName, err)
×
500
                return
×
501
        }
×
502

503
        patch := util.KVPatch{}
×
504
        if pod.Annotations[fmt.Sprintf(util.ProviderNetworkErrMessageTemplate, providerNetwork)] != errMsg {
×
505
                if errMsg == "" {
×
506
                        patch[fmt.Sprintf(util.ProviderNetworkErrMessageTemplate, providerNetwork)] = nil
×
507
                } else {
×
508
                        patch[fmt.Sprintf(util.ProviderNetworkErrMessageTemplate, providerNetwork)] = errMsg
×
509
                }
×
510
                if err = util.PatchAnnotations(c.config.KubeClient.CoreV1().Pods(pod.Namespace), pod.Name, patch); err != nil {
×
511
                        klog.Errorf("failed to patch pod %s/%s: %v", pod.Namespace, pod.Name, err)
×
512
                        return
×
513
                }
×
514
        }
515
}
516

517
func (c *Controller) cleanProviderNetwork(pn *kubeovnv1.ProviderNetwork, node *v1.Node) error {
×
518
        patch := util.KVPatch{
×
519
                fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name):     nil,
×
520
                fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name): nil,
×
521
                fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name):       nil,
×
522
                fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name):   "true",
×
523
        }
×
524
        if err := util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
525
                klog.Errorf("failed to patch labels of node %s: %v", node.Name, err)
×
526
                return err
×
527
        }
×
528

529
        return c.ovsCleanProviderNetwork(pn.Name)
×
530
}
531

532
func (c *Controller) handleDeleteProviderNetwork(pn *kubeovnv1.ProviderNetwork) error {
×
533
        if err := c.ovsCleanProviderNetwork(pn.Name); err != nil {
×
534
                klog.Error(err)
×
535
                return err
×
536
        }
×
537

538
        if err := c.cleanupAutoCreatedVlanInterfaces(pn.Name, "", nil); err != nil {
×
539
                klog.Errorf("Failed to cleanup auto-created VLAN interfaces for provider %s: %v", pn.Name, err)
×
540
                return err
×
541
        }
×
542

543
        node, err := c.nodesLister.Get(c.config.NodeName)
×
544
        if err != nil {
×
545
                klog.Error(err)
×
546
                return err
×
547
        }
×
548
        if len(node.Labels) == 0 {
×
549
                return nil
×
550
        }
×
551

552
        patch := util.KVPatch{
×
553
                fmt.Sprintf(util.ProviderNetworkReadyTemplate, pn.Name):     nil,
×
554
                fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, pn.Name): nil,
×
555
                fmt.Sprintf(util.ProviderNetworkMtuTemplate, pn.Name):       nil,
×
556
                fmt.Sprintf(util.ProviderNetworkExcludeTemplate, pn.Name):   nil,
×
557
                fmt.Sprintf(util.ProviderNetworkVlanIntTemplate, pn.Name):   nil,
×
558
        }
×
559
        if err = util.PatchLabels(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
560
                klog.Errorf("failed to patch labels of node %s: %v", node.Name, err)
×
561
                return err
×
562
        }
×
563

564
        return nil
×
565
}
566

567
func (c *Controller) enqueueUpdateVlan(oldObj, newObj any) {
×
568
        oldVlan := oldObj.(*kubeovnv1.Vlan)
×
569
        newVlan := newObj.(*kubeovnv1.Vlan)
×
570
        if oldVlan.Spec.ID != newVlan.Spec.ID {
×
571
                klog.V(3).Infof("enqueue update provider network %q", newVlan.Spec.Provider)
×
572
                c.addOrUpdateProviderNetworkQueue.Add(newVlan.Spec.Provider)
×
573
        }
×
574
}
575

576
type subnetEvent struct {
577
        oldObj, newObj any
578
}
579

580
type serviceEvent struct {
581
        oldObj, newObj any
582
}
583

584
func (c *Controller) enqueueAddSubnet(obj any) {
×
585
        c.subnetQueue.Add(&subnetEvent{newObj: obj})
×
586
}
×
587

588
func (c *Controller) enqueueUpdateSubnet(oldObj, newObj any) {
×
589
        c.subnetQueue.Add(&subnetEvent{oldObj: oldObj, newObj: newObj})
×
590
}
×
591

592
func (c *Controller) enqueueDeleteSubnet(obj any) {
×
593
        c.subnetQueue.Add(&subnetEvent{oldObj: obj})
×
594
}
×
595

596
func (c *Controller) runSubnetWorker() {
×
597
        for c.processNextSubnetWorkItem() {
×
598
        }
×
599
}
600

601
func (c *Controller) enqueueAddService(obj any) {
×
602
        c.serviceQueue.Add(&serviceEvent{newObj: obj})
×
603
}
×
604

605
func (c *Controller) enqueueUpdateService(oldObj, newObj any) {
×
606
        c.serviceQueue.Add(&serviceEvent{oldObj: oldObj, newObj: newObj})
×
607
}
×
608

609
func (c *Controller) enqueueDeleteService(obj any) {
×
610
        c.serviceQueue.Add(&serviceEvent{oldObj: obj})
×
611
}
×
612

613
func (c *Controller) runAddOrUpdateServicekWorker() {
×
614
        for c.processNextServiceWorkItem() {
×
615
        }
×
616
}
617

618
func (c *Controller) processNextSubnetWorkItem() bool {
×
619
        obj, shutdown := c.subnetQueue.Get()
×
620
        if shutdown {
×
621
                return false
×
622
        }
×
623

624
        err := func(obj *subnetEvent) error {
×
625
                defer c.subnetQueue.Done(obj)
×
NEW
626
                c.requestFdbSync()
×
627
                if err := c.reconcileRouters(obj); err != nil {
×
628
                        c.subnetQueue.AddRateLimited(obj)
×
629
                        return fmt.Errorf("error syncing %v: %w, requeuing", obj, err)
×
630
                }
×
631
                c.subnetQueue.Forget(obj)
×
632
                return nil
×
633
        }(obj)
634
        if err != nil {
×
635
                utilruntime.HandleError(err)
×
636
                return true
×
637
        }
×
638
        return true
×
639
}
640

641
func (c *Controller) processNextServiceWorkItem() bool {
×
642
        obj, shutdown := c.serviceQueue.Get()
×
643
        if shutdown {
×
644
                return false
×
645
        }
×
646

647
        err := func(obj *serviceEvent) error {
×
648
                defer c.serviceQueue.Done(obj)
×
649
                if err := c.reconcileServices(obj); err != nil {
×
650
                        c.serviceQueue.AddRateLimited(obj)
×
651
                        return fmt.Errorf("error syncing %v: %w, requeuing", obj, err)
×
652
                }
×
653
                c.serviceQueue.Forget(obj)
×
654
                return nil
×
655
        }(obj)
656
        if err != nil {
×
657
                utilruntime.HandleError(err)
×
658
                return true
×
659
        }
×
660
        return true
×
661
}
662

663
func (c *Controller) enqueueUpdatePod(oldObj, newObj any) {
×
664
        oldPod := oldObj.(*v1.Pod)
×
665
        newPod := newObj.(*v1.Pod)
×
666
        key := cache.MetaObjectToName(newPod).String()
×
667

×
668
        if oldPod.Annotations[util.IngressRateAnnotation] != newPod.Annotations[util.IngressRateAnnotation] ||
×
669
                oldPod.Annotations[util.EgressRateAnnotation] != newPod.Annotations[util.EgressRateAnnotation] ||
×
670
                oldPod.Annotations[util.NetemQosLatencyAnnotation] != newPod.Annotations[util.NetemQosLatencyAnnotation] ||
×
671
                oldPod.Annotations[util.NetemQosJitterAnnotation] != newPod.Annotations[util.NetemQosJitterAnnotation] ||
×
672
                oldPod.Annotations[util.NetemQosLimitAnnotation] != newPod.Annotations[util.NetemQosLimitAnnotation] ||
×
673
                oldPod.Annotations[util.NetemQosLossAnnotation] != newPod.Annotations[util.NetemQosLossAnnotation] ||
×
674
                oldPod.Annotations[util.MirrorControlAnnotation] != newPod.Annotations[util.MirrorControlAnnotation] ||
×
675
                oldPod.Annotations[util.IPAddressAnnotation] != newPod.Annotations[util.IPAddressAnnotation] {
×
676
                c.updatePodQueue.Add(key)
×
677
                return
×
678
        }
×
679

680
        attachNets, err := nadutils.ParsePodNetworkAnnotation(newPod)
×
681
        if err != nil {
×
682
                return
×
683
        }
×
684
        for _, multiNet := range attachNets {
×
685
                provider := fmt.Sprintf("%s.%s.%s", multiNet.Name, multiNet.Namespace, util.OvnProvider)
×
686
                if newPod.Annotations[fmt.Sprintf(util.AllocatedAnnotationTemplate, provider)] == "true" {
×
687
                        if oldPod.Annotations[fmt.Sprintf(util.IngressRateAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.IngressRateAnnotationTemplate, provider)] ||
×
688
                                oldPod.Annotations[fmt.Sprintf(util.EgressRateAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.EgressRateAnnotationTemplate, provider)] ||
×
689
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosLatencyAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosLatencyAnnotationTemplate, provider)] ||
×
690
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosJitterAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosJitterAnnotationTemplate, provider)] ||
×
691
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosLimitAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosLimitAnnotationTemplate, provider)] ||
×
692
                                oldPod.Annotations[fmt.Sprintf(util.NetemQosLossAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.NetemQosLossAnnotationTemplate, provider)] ||
×
693
                                oldPod.Annotations[fmt.Sprintf(util.MirrorControlAnnotationTemplate, provider)] != newPod.Annotations[fmt.Sprintf(util.MirrorControlAnnotationTemplate, provider)] {
×
694
                                c.updatePodQueue.Add(key)
×
695
                        }
×
696
                }
697
        }
698
}
699

700
func (c *Controller) runUpdatePodWorker() {
×
701
        for c.processNextUpdatePodWorkItem() {
×
702
        }
×
703
}
704

705
func (c *Controller) processNextUpdatePodWorkItem() bool {
×
706
        key, shutdown := c.updatePodQueue.Get()
×
707
        if shutdown {
×
708
                return false
×
709
        }
×
710

711
        err := func(key string) error {
×
712
                defer c.updatePodQueue.Done(key)
×
713
                if err := c.handleUpdatePod(key); err != nil {
×
714
                        c.updatePodQueue.AddRateLimited(key)
×
715
                        return fmt.Errorf("error syncing %q: %w, requeuing", key, err)
×
716
                }
×
717
                c.updatePodQueue.Forget(key)
×
718
                return nil
×
719
        }(key)
720
        if err != nil {
×
721
                utilruntime.HandleError(err)
×
722
                return true
×
723
        }
×
724
        return true
×
725
}
726

727
func (c *Controller) gcInterfaces() {
×
728
        interfacePodMap, err := ovs.ListInterfacePodMap()
×
729
        if err != nil {
×
730
                klog.Errorf("failed to list interface pod map: %v", err)
×
731
                return
×
732
        }
×
733
        for iface, pod := range interfacePodMap {
×
734
                parts := strings.Split(pod, "/")
×
735
                if len(parts) < 3 {
×
736
                        klog.Errorf("malformed pod string %q for interface %s, expected format 'namespace/name/errText'", pod, iface)
×
737
                        continue
×
738
                }
739

740
                podNamespace, podName, errText := parts[0], parts[1], parts[2]
×
741
                if strings.Contains(errText, "No such device") {
×
742
                        klog.Infof("pod %s/%s not found, delete ovs interface %s", podNamespace, podName, iface)
×
743
                        if err := ovs.CleanInterface(iface); err != nil {
×
744
                                klog.Errorf("failed to clean ovs interface %s: %v", iface, err)
×
745
                        }
×
746
                        continue
×
747
                }
748

749
                if _, err = c.podsLister.Pods(podNamespace).Get(podName); err != nil {
×
750
                        if !k8serrors.IsNotFound(err) {
×
751
                                klog.Errorf("failed to get pod %s/%s: %v", podNamespace, podName, err)
×
752
                                continue
×
753
                        }
754

755
                        // Pod not found by name. Check if this might be a KubeVirt VM.
756
                        // For KubeVirt VMs, the pod_name in OVS external_ids is set to the VM name (not the launcher pod name).
757
                        // The actual launcher pod has the label 'vm.kubevirt.io/name' with the VM name as value.
758
                        // Try to find launcher pods by this label.
759
                        selector := labels.SelectorFromSet(map[string]string{kubevirtv1.DeprecatedVirtualMachineNameLabel: podName})
×
760
                        launcherPods, err := c.podsLister.Pods(podNamespace).List(selector)
×
761
                        if err != nil {
×
762
                                klog.Errorf("failed to list launcher pods for vm %s/%s: %v", podNamespace, podName, err)
×
763
                                continue
×
764
                        }
765

766
                        // If we found launcher pod(s) for this VM, keep the interface
767
                        if len(launcherPods) > 0 {
×
768
                                klog.V(5).Infof("found %d launcher pod(s) for vm %s/%s, keeping ovs interface %s",
×
769
                                        len(launcherPods), podNamespace, podName, iface)
×
770
                                continue
×
771
                        }
772

773
                        // No pod on this node and no launcher pod found - safe to delete
774
                        klog.Infof("pod %s/%s not found on this node, delete ovs interface %s", podNamespace, podName, iface)
×
775
                        if err = ovs.CleanInterface(iface); err != nil {
×
776
                                klog.Errorf("failed to clean ovs interface %s: %v", iface, err)
×
777
                        }
×
778
                }
779
        }
780
}
781

782
func (c *Controller) runIPSecWorker() {
×
783
        if err := c.StartIPSecService(); err != nil {
×
784
                klog.Errorf("starting ipsec service: %v", err)
×
785
        }
×
786

787
        for c.processNextIPSecWorkItem() {
×
788
        }
×
789
}
790

791
func (c *Controller) processNextIPSecWorkItem() bool {
×
792
        key, shutdown := c.ipsecQueue.Get()
×
793
        if shutdown {
×
794
                return false
×
795
        }
×
796
        defer c.ipsecQueue.Done(key)
×
797

×
798
        err := func(key string) error {
×
799
                if err := c.SyncIPSecKeys(key); err != nil {
×
800
                        c.ipsecQueue.AddRateLimited(key)
×
801
                        return fmt.Errorf("error syncing %q: %w, requeuing", key, err)
×
802
                }
×
803
                c.ipsecQueue.Forget(key)
×
804
                return nil
×
805
        }(key)
806
        if err != nil {
×
807
                utilruntime.HandleError(err)
×
808
                return true
×
809
        }
×
810
        return true
×
811
}
812

813
func (c *Controller) runUpdateNodeWorker() {
×
814
        for c.processNextUpdateNodeWorkItem() {
×
815
        }
×
816
}
817

818
func (c *Controller) processNextUpdateNodeWorkItem() bool {
×
819
        key, shutdown := c.updateNodeQueue.Get()
×
820
        if shutdown {
×
821
                return false
×
822
        }
×
823

824
        err := func(key string) error {
×
825
                defer c.updateNodeQueue.Done(key)
×
826
                if err := c.handleUpdateNode(key); err != nil {
×
827
                        c.updateNodeQueue.AddRateLimited(key)
×
828
                        return fmt.Errorf("error syncing node %q: %w, requeuing", key, err)
×
829
                }
×
830
                c.updateNodeQueue.Forget(key)
×
831
                return nil
×
832
        }(key)
833
        if err != nil {
×
834
                utilruntime.HandleError(err)
×
835
                return true
×
836
        }
×
837
        return true
×
838
}
839

840
func (c *Controller) handleUpdateNode(key string) error {
×
841
        node, err := c.nodesLister.Get(key)
×
842
        if err != nil {
×
843
                if k8serrors.IsNotFound(err) {
×
844
                        return nil
×
845
                }
×
846
                klog.Error(err)
×
847
                return err
×
848
        }
849

850
        klog.Infof("updating node networks for node %s", key)
×
851
        return c.config.UpdateNodeNetworks(node)
×
852
}
853

854
// Run starts controller
855
func (c *Controller) Run(stopCh <-chan struct{}) {
×
856
        defer utilruntime.HandleCrash()
×
857
        defer c.addOrUpdateProviderNetworkQueue.ShutDown()
×
858
        defer c.deleteProviderNetworkQueue.ShutDown()
×
859
        defer c.subnetQueue.ShutDown()
×
860
        defer c.serviceQueue.ShutDown()
×
861
        defer c.updatePodQueue.ShutDown()
×
862
        defer c.ipsecQueue.ShutDown()
×
863
        defer c.updateNodeQueue.ShutDown()
×
NEW
864
        defer c.vswitchClient.Close()
×
NEW
865

×
866
        go wait.Until(c.gcInterfaces, time.Minute, stopCh)
×
867
        go wait.Until(recompute, 10*time.Minute, stopCh)
×
868
        go wait.Until(rotateLog, 1*time.Hour, stopCh)
×
869

×
870
        if err := c.setIPSet(); err != nil {
×
871
                util.LogFatalAndExit(err, "failed to set ipsets")
×
872
        }
×
873

874
        klog.Info("Started workers")
×
875
        go wait.Until(c.loopOvn0Check, 5*time.Second, stopCh)
×
876
        go wait.Until(c.loopOvnExt0Check, 5*time.Second, stopCh)
×
877
        go wait.Until(c.loopTunnelCheck, 5*time.Second, stopCh)
×
878
        go wait.Until(c.runAddOrUpdateProviderNetworkWorker, time.Second, stopCh)
×
879
        go wait.Until(c.runAddOrUpdateServicekWorker, time.Second, stopCh)
×
880
        go wait.Until(c.runDeleteProviderNetworkWorker, time.Second, stopCh)
×
881
        go wait.Until(c.runSubnetWorker, time.Second, stopCh)
×
882
        go wait.Until(c.runUpdatePodWorker, time.Second, stopCh)
×
883
        go wait.Until(c.runUpdateNodeWorker, time.Second, stopCh)
×
884
        go wait.Until(c.runIPSecWorker, 3*time.Second, stopCh)
×
885
        go wait.Until(c.runGateway, 3*time.Second, stopCh)
×
886
        go wait.Until(c.loopEncapIPCheck, 3*time.Second, stopCh)
×
887
        go wait.Until(c.ovnMetricsUpdate, 3*time.Second, stopCh)
×
888
        go wait.Until(func() {
×
889
                if err := c.reconcileRouters(nil); err != nil {
×
890
                        klog.Errorf("failed to reconcile %s routes: %v", util.NodeNic, err)
×
891
                }
×
892
        }, 3*time.Second, stopCh)
893

894
        if c.config.EnableTProxy {
×
895
                go c.StartTProxyForwarding()
×
896
                go wait.Until(c.runTProxyConfigWorker, 3*time.Second, stopCh)
×
897
                // Using the tproxy method, kubelet's TCP probe packets cannot reach the namespace of the pod of the custom VPC,
×
898
                // so tproxy itself probes the pod of the custom VPC, if probe failed remove the iptable rules from
×
899
                // kubelet to tproxy, if probe success recover the iptable rules
×
900
                go wait.Until(c.StartTProxyTCPPortProbe, 1*time.Second, stopCh)
×
901
        } else {
×
902
                c.cleanTProxyConfig()
×
903
        }
×
904

905
        if !c.config.EnableOVNIPSec {
×
906
                if err := c.StopAndClearIPSecResource(); err != nil {
×
907
                        klog.Errorf("stop and clear ipsec resource error: %v", err)
×
908
                }
×
909
        }
910

911
        // Start OpenFlow sync loop
912
        go c.runFlowSync(stopCh)
×
913

×
NEW
914
        // start fdb sync loop
×
NEW
915
        go c.runFdbSync(stopCh)
×
NEW
916

×
917
        <-stopCh
×
918
        klog.Info("Shutting down workers")
×
919
}
920

921
func recompute() {
×
922
        output, err := ovs.Appctl(ovs.OvnController, "inc-engine/recompute")
×
923
        if err != nil {
×
924
                klog.Errorf("failed to trigger force recompute for %s: %q", ovs.OvnController, output)
×
925
        }
×
926
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc