• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubeovn / kube-ovn / 24631618291

19 Apr 2026 02:40PM UTC coverage: 24.717% (+0.2%) from 24.56%
24631618291

push

github

web-flow
chore(deps): bump github.com/moby/spdystream in /test/anp (#6648)

Bumps [github.com/moby/spdystream](https://github.com/moby/spdystream) from 0.5.0 to 0.5.1.
- [Release notes](https://github.com/moby/spdystream/releases)
- [Commits](https://github.com/moby/spdystream/compare/v0.5.0...v0.5.1)

---
updated-dependencies:
- dependency-name: github.com/moby/spdystream
  dependency-version: 0.5.1
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

13967 of 56507 relevant lines covered (24.72%)

0.29 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

2.91
/pkg/controller/init.go
1
package controller
2

3
import (
4
        "context"
5
        "encoding/json"
6
        "errors"
7
        "fmt"
8
        "maps"
9
        "strings"
10
        "time"
11

12
        "github.com/scylladb/go-set/strset"
13
        v1 "k8s.io/api/core/v1"
14
        k8serrors "k8s.io/apimachinery/pkg/api/errors"
15
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
16
        "k8s.io/apimachinery/pkg/labels"
17
        "k8s.io/apimachinery/pkg/types"
18
        "k8s.io/client-go/tools/cache"
19
        "k8s.io/klog/v2"
20
        "sigs.k8s.io/controller-runtime/pkg/client"
21
        "sigs.k8s.io/controller-runtime/pkg/client/config"
22
        "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
23

24
        kubeovnv1 "github.com/kubeovn/kube-ovn/pkg/apis/kubeovn/v1"
25
        "github.com/kubeovn/kube-ovn/pkg/ovs"
26
        "github.com/kubeovn/kube-ovn/pkg/ovsdb/ovnnb"
27
        "github.com/kubeovn/kube-ovn/pkg/util"
28
)
29

30
func (c *Controller) InitOVN() error {
×
31
        var err error
×
32

×
33
        // migrate vendor externalIDs to kube-ovn resources created in versions prior to v1.15.0
×
34
        // this must run before ACL cleanup to ensure existing resources are properly tagged
×
35
        if err = c.OVNNbClient.MigrateVendorExternalIDs(); err != nil {
×
36
                klog.Errorf("failed to migrate vendor externalIDs: %v", err)
×
37
                return err
×
38
        }
×
39

40
        // migrate tier field of ACL rules created in versions prior to v1.13.0
41
        // after upgrading, the tier field has a default value of zero, which is not the value used in versions >= v1.13.0
42
        // we need to migrate the tier field to the correct value
43
        if err = c.OVNNbClient.MigrateACLTier(); err != nil {
×
44
                klog.Errorf("failed to migrate ACL tier: %v", err)
×
45
                return err
×
46
        }
×
47

48
        // clean all no parent key acls
49
        if err = c.OVNNbClient.CleanNoParentKeyAcls(); err != nil {
×
50
                klog.Errorf("failed to clean all no parent key acls: %v", err)
×
51
                return err
×
52
        }
×
53

54
        if err = c.InitDefaultVpc(); err != nil {
×
55
                klog.Errorf("init default vpc failed: %v", err)
×
56
                return err
×
57
        }
×
58

59
        if err = c.initClusterRouter(); err != nil {
×
60
                klog.Errorf("init cluster router failed: %v", err)
×
61
                return err
×
62
        }
×
63

64
        if c.config.EnableLb {
×
65
                if err = c.initLoadBalancer(); err != nil {
×
66
                        klog.Errorf("init load balancer failed: %v", err)
×
67
                        return err
×
68
                }
×
69
        }
70

71
        if err = c.initDefaultVlan(); err != nil {
×
72
                klog.Errorf("init default vlan failed: %v", err)
×
73
                return err
×
74
        }
×
75

76
        if err = c.initNodeSwitch(); err != nil {
×
77
                klog.Errorf("init node switch failed: %v", err)
×
78
                return err
×
79
        }
×
80

81
        if err = c.initDefaultLogicalSwitch(); err != nil {
×
82
                klog.Errorf("init default switch failed: %v", err)
×
83
                return err
×
84
        }
×
85

86
        return nil
×
87
}
88

89
func (c *Controller) InitDefaultVpc() error {
×
90
        cachedVpc, err := c.vpcsLister.Get(c.config.ClusterRouter)
×
91
        if err != nil {
×
92
                if !k8serrors.IsNotFound(err) {
×
93
                        klog.Errorf("failed to get default vpc %q: %v", c.config.ClusterRouter, err)
×
94
                        return err
×
95
                }
×
96
                // create default vpc
97
                vpc := &kubeovnv1.Vpc{
×
98
                        ObjectMeta: metav1.ObjectMeta{Name: c.config.ClusterRouter},
×
99
                }
×
100
                cachedVpc, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Create(context.Background(), vpc, metav1.CreateOptions{})
×
101
                if err != nil {
×
102
                        klog.Errorf("failed to create default vpc %q: %v", c.config.ClusterRouter, err)
×
103
                        return err
×
104
                }
×
105
        }
106

107
        // update default vpc status
108
        vpc := cachedVpc.DeepCopy()
×
109
        if !vpc.Status.Default || !vpc.Status.Standby ||
×
110
                vpc.Status.Router != c.config.ClusterRouter ||
×
111
                vpc.Status.DefaultLogicalSwitch != c.config.DefaultLogicalSwitch {
×
112
                vpc.Status.Standby = true
×
113
                vpc.Status.Default = true
×
114
                vpc.Status.Router = c.config.ClusterRouter
×
115
                vpc.Status.DefaultLogicalSwitch = c.config.DefaultLogicalSwitch
×
116

×
117
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().UpdateStatus(context.Background(), vpc, metav1.UpdateOptions{}); err != nil {
×
118
                        klog.Errorf("failed to update default vpc %q: %v", c.config.ClusterRouter, err)
×
119
                        return err
×
120
                }
×
121
        }
122

123
        return nil
×
124
}
125

126
// InitDefaultLogicalSwitch init the default logical switch for ovn network
127
func (c *Controller) initDefaultLogicalSwitch() error {
×
128
        subnet, err := c.subnetsLister.Get(c.config.DefaultLogicalSwitch)
×
129
        if err == nil {
×
130
                if subnet != nil && util.CheckProtocol(c.config.DefaultCIDR) != util.CheckProtocol(subnet.Spec.CIDRBlock) {
×
131
                        // single-stack upgrade to dual-stack
×
132
                        if util.CheckProtocol(c.config.DefaultCIDR) == kubeovnv1.ProtocolDual {
×
133
                                subnet := subnet.DeepCopy()
×
134
                                subnet.Spec.CIDRBlock = c.config.DefaultCIDR
×
135
                                if _, err = c.formatSubnet(subnet); err != nil {
×
136
                                        klog.Errorf("init format subnet %s failed: %v", c.config.DefaultLogicalSwitch, err)
×
137
                                        return err
×
138
                                }
×
139
                        }
140
                }
141
                return nil
×
142
        }
143

144
        if !k8serrors.IsNotFound(err) {
×
145
                klog.Errorf("get default subnet %s failed: %v", c.config.DefaultLogicalSwitch, err)
×
146
                return err
×
147
        }
×
148

149
        defaultSubnet := kubeovnv1.Subnet{
×
150
                ObjectMeta: metav1.ObjectMeta{Name: c.config.DefaultLogicalSwitch},
×
151
                Spec: kubeovnv1.SubnetSpec{
×
152
                        Vpc:                 c.config.ClusterRouter,
×
153
                        Default:             true,
×
154
                        Provider:            util.OvnProvider,
×
155
                        CIDRBlock:           c.config.DefaultCIDR,
×
156
                        Gateway:             c.config.DefaultGateway,
×
157
                        GatewayNode:         "",
×
158
                        DisableGatewayCheck: !c.config.DefaultGatewayCheck,
×
159
                        ExcludeIps:          strings.Split(c.config.DefaultExcludeIps, ","),
×
160
                        NatOutgoing:         true,
×
161
                        GatewayType:         kubeovnv1.GWDistributedType,
×
162
                        Protocol:            util.CheckProtocol(c.config.DefaultCIDR),
×
163
                        EnableLb:            &c.config.EnableLb,
×
164
                },
×
165
        }
×
166
        if c.config.NetworkType == util.NetworkTypeVlan {
×
167
                defaultSubnet.Spec.Vlan = c.config.DefaultVlanName
×
168
                if c.config.DefaultLogicalGateway && c.config.DefaultU2OInterconnection {
×
169
                        err = errors.New("logicalGateway and u2oInterconnection can't be opened at the same time")
×
170
                        klog.Error(err)
×
171
                        return err
×
172
                }
×
173
                defaultSubnet.Spec.LogicalGateway = c.config.DefaultLogicalGateway
×
174
                defaultSubnet.Spec.U2OInterconnection = c.config.DefaultU2OInterconnection
×
175
        }
176

177
        if _, err = c.config.KubeOvnClient.KubeovnV1().Subnets().Create(context.Background(), &defaultSubnet, metav1.CreateOptions{}); err != nil {
×
178
                klog.Errorf("failed to create default subnet %q: %v", c.config.DefaultLogicalSwitch, err)
×
179
                return err
×
180
        }
×
181
        return nil
×
182
}
183

184
// InitNodeSwitch init node switch to connect host and pod
185
func (c *Controller) initNodeSwitch() error {
×
186
        subnet, err := c.subnetsLister.Get(c.config.NodeSwitch)
×
187
        if err == nil {
×
188
                if util.CheckProtocol(c.config.NodeSwitchCIDR) == kubeovnv1.ProtocolDual && util.CheckProtocol(subnet.Spec.CIDRBlock) != kubeovnv1.ProtocolDual {
×
189
                        // single-stack upgrade to dual-stack
×
190
                        subnet := subnet.DeepCopy()
×
191
                        subnet.Spec.CIDRBlock = c.config.NodeSwitchCIDR
×
192
                        if _, err = c.formatSubnet(subnet); err != nil {
×
193
                                klog.Errorf("init format subnet %s failed: %v", c.config.NodeSwitch, err)
×
194
                                return err
×
195
                        }
×
196
                } else {
×
197
                        c.config.NodeSwitchCIDR = subnet.Spec.CIDRBlock
×
198
                }
×
199
                return nil
×
200
        }
201

202
        if !k8serrors.IsNotFound(err) {
×
203
                klog.Errorf("get node subnet %s failed: %v", c.config.NodeSwitch, err)
×
204
                return err
×
205
        }
×
206

207
        nodeSubnet := kubeovnv1.Subnet{
×
208
                ObjectMeta: metav1.ObjectMeta{Name: c.config.NodeSwitch},
×
209
                Spec: kubeovnv1.SubnetSpec{
×
210
                        Vpc:                    c.config.ClusterRouter,
×
211
                        Default:                false,
×
212
                        Provider:               util.OvnProvider,
×
213
                        CIDRBlock:              c.config.NodeSwitchCIDR,
×
214
                        Gateway:                c.config.NodeSwitchGateway,
×
215
                        GatewayNode:            "",
×
216
                        ExcludeIps:             strings.Split(c.config.NodeSwitchGateway, ","),
×
217
                        Protocol:               util.CheckProtocol(c.config.NodeSwitchCIDR),
×
218
                        DisableInterConnection: true,
×
219
                },
×
220
        }
×
221

×
222
        if _, err = c.config.KubeOvnClient.KubeovnV1().Subnets().Create(context.Background(), &nodeSubnet, metav1.CreateOptions{}); err != nil {
×
223
                klog.Errorf("failed to create node subnet %q: %v", c.config.NodeSwitch, err)
×
224
                return err
×
225
        }
×
226
        return nil
×
227
}
228

229
// InitClusterRouter init cluster router to connect different logical switches
230
func (c *Controller) initClusterRouter() error {
×
231
        if err := c.OVNNbClient.CreateLogicalRouter(c.config.ClusterRouter); err != nil {
×
232
                klog.Errorf("create logical router %s failed: %v", c.config.ClusterRouter, err)
×
233
                return err
×
234
        }
×
235

236
        lr, err := c.OVNNbClient.GetLogicalRouter(c.config.ClusterRouter, false)
×
237
        if err != nil {
×
238
                klog.Errorf("get logical router %s failed: %v", c.config.ClusterRouter, err)
×
239
                return err
×
240
        }
×
241

242
        lrOptions := make(map[string]string, len(lr.Options))
×
243
        maps.Copy(lrOptions, lr.Options)
×
244
        lrOptions["mac_binding_age_threshold"] = "300"
×
245
        lrOptions["dynamic_neigh_routers"] = "true"
×
246
        if !maps.Equal(lr.Options, lrOptions) {
×
247
                lr.Options = lrOptions
×
248
                if err = c.OVNNbClient.UpdateLogicalRouter(lr, &lr.Options); err != nil {
×
249
                        klog.Errorf("update logical router %s failed: %v", c.config.ClusterRouter, err)
×
250
                        return err
×
251
                }
×
252
        }
253

254
        return nil
×
255
}
256

257
func (c *Controller) initLB(name, protocol string, sessionAffinity bool) error {
×
258
        protocol = strings.ToLower(protocol)
×
259

×
260
        var (
×
261
                selectFields []string
×
262
                err          error
×
263
        )
×
264

×
265
        if sessionAffinity {
×
266
                selectFields = []string{
×
267
                        ovnnb.LoadBalancerSelectionFieldsIPSrc,
×
268
                        ovnnb.LoadBalancerSelectionFieldsIpv6Src,
×
269
                }
×
270
        }
×
271

272
        if err = c.OVNNbClient.CreateLoadBalancer(name, protocol, selectFields...); err != nil {
×
273
                klog.Errorf("create load balancer %s: %v", name, err)
×
274
                return err
×
275
        }
×
276

277
        if sessionAffinity {
×
278
                if err = c.OVNNbClient.SetLoadBalancerAffinityTimeout(name, util.DefaultServiceSessionStickinessTimeout); err != nil {
×
279
                        klog.Errorf("failed to set affinity timeout of %s load balancer %s: %v", protocol, name, err)
×
280
                        return err
×
281
                }
×
282
        }
283

284
        err = c.OVNNbClient.SetLoadBalancerPreferLocalBackend(name, c.config.EnableOVNLBPreferLocal)
×
285
        if err != nil {
×
286
                klog.Errorf("failed to set prefer local backend for load balancer %s: %v", name, err)
×
287
                return err
×
288
        }
×
289

290
        if protocol == "udp" {
×
291
                if err = c.OVNNbClient.SetLoadBalancerCtFlush(name, true); err != nil {
×
292
                        klog.Errorf("failed to set ct_flush for load balancer %s: %v", name, err)
×
293
                        return err
×
294
                }
×
295
        }
296

297
        return nil
×
298
}
299

300
// InitLoadBalancer creates the default TCP/UDP/SCTP cluster load balancers in
301
// OVN for every existing VPC and records their names in each VPC's status so
302
// the subnet worker can attach them to its logical switch on its first
303
// reconcile.
304
//
305
// The status write uses a targeted merge patch that contains only the six
306
// LB-name fields. An earlier version serialized the whole VpcStatus via
307
// vpc.Status.Bytes() and raced InitDefaultVpc: if the VPC lister cache still
308
// held the pre-UpdateStatus copy (Standby=false) the whole-status merge patch
309
// would silently overwrite the Standby/Default/Router/DefaultLogicalSwitch
310
// fields that InitDefaultVpc had just written, deadlocking the subnet worker.
311
// A field-scoped patch avoids that class of overwrite entirely.
312
func (c *Controller) initLoadBalancer() error {
×
313
        vpcs, err := c.vpcsLister.List(labels.Everything())
×
314
        if err != nil {
×
315
                klog.Errorf("failed to list vpc: %v", err)
×
316
                return err
×
317
        }
×
318

319
        for _, cachedVpc := range vpcs {
×
320
                vpcLb := c.GenVpcLoadBalancer(cachedVpc.Name)
×
321
                if err = c.initLB(vpcLb.TCPLoadBalancer, string(v1.ProtocolTCP), false); err != nil {
×
322
                        klog.Error(err)
×
323
                        return err
×
324
                }
×
325
                if err = c.initLB(vpcLb.TCPSessLoadBalancer, string(v1.ProtocolTCP), true); err != nil {
×
326
                        klog.Error(err)
×
327
                        return err
×
328
                }
×
329
                if err = c.initLB(vpcLb.UDPLoadBalancer, string(v1.ProtocolUDP), false); err != nil {
×
330
                        klog.Error(err)
×
331
                        return err
×
332
                }
×
333
                if err = c.initLB(vpcLb.UDPSessLoadBalancer, string(v1.ProtocolUDP), true); err != nil {
×
334
                        klog.Error(err)
×
335
                        return err
×
336
                }
×
337
                if err = c.initLB(vpcLb.SctpLoadBalancer, string(v1.ProtocolSCTP), false); err != nil {
×
338
                        klog.Error(err)
×
339
                        return err
×
340
                }
×
341
                if err = c.initLB(vpcLb.SctpSessLoadBalancer, string(v1.ProtocolSCTP), true); err != nil {
×
342
                        klog.Error(err)
×
343
                        return err
×
344
                }
×
345

346
                body, err := buildVpcLBStatusPatch(vpcLb)
×
347
                if err != nil {
×
348
                        klog.Error(err)
×
349
                        return err
×
350
                }
×
351
                if _, err = c.config.KubeOvnClient.KubeovnV1().Vpcs().Patch(context.Background(), cachedVpc.Name, types.MergePatchType, body, metav1.PatchOptions{}, "status"); err != nil {
×
352
                        klog.Error(err)
×
353
                        return err
×
354
                }
×
355
        }
356
        return nil
×
357
}
358

359
// buildVpcLBStatusPatch builds a merge-patch body that updates only the six
360
// LB-name fields of VpcStatus. It deliberately excludes every other field so
361
// the merge patch cannot overwrite state owned by InitDefaultVpc (Standby,
362
// Default, Router, DefaultLogicalSwitch) when the caller reads from a stale
363
// lister cache.
364
func buildVpcLBStatusPatch(vpcLb *VpcLoadBalancer) ([]byte, error) {
1✔
365
        patch := struct {
1✔
366
                Status struct {
1✔
367
                        TCPLoadBalancer         string `json:"tcpLoadBalancer"`
1✔
368
                        TCPSessionLoadBalancer  string `json:"tcpSessionLoadBalancer"`
1✔
369
                        UDPLoadBalancer         string `json:"udpLoadBalancer"`
1✔
370
                        UDPSessionLoadBalancer  string `json:"udpSessionLoadBalancer"`
1✔
371
                        SctpLoadBalancer        string `json:"sctpLoadBalancer"`
1✔
372
                        SctpSessionLoadBalancer string `json:"sctpSessionLoadBalancer"`
1✔
373
                } `json:"status"`
1✔
374
        }{}
1✔
375
        patch.Status.TCPLoadBalancer = vpcLb.TCPLoadBalancer
1✔
376
        patch.Status.TCPSessionLoadBalancer = vpcLb.TCPSessLoadBalancer
1✔
377
        patch.Status.UDPLoadBalancer = vpcLb.UDPLoadBalancer
1✔
378
        patch.Status.UDPSessionLoadBalancer = vpcLb.UDPSessLoadBalancer
1✔
379
        patch.Status.SctpLoadBalancer = vpcLb.SctpLoadBalancer
1✔
380
        patch.Status.SctpSessionLoadBalancer = vpcLb.SctpSessLoadBalancer
1✔
381
        return json.Marshal(patch)
1✔
382
}
1✔
383

384
func (c *Controller) InitIPAM() error {
×
385
        start := time.Now()
×
386
        subnets, err := c.subnetsLister.List(labels.Everything())
×
387
        if err != nil {
×
388
                klog.Errorf("failed to list subnet: %v", err)
×
389
                return err
×
390
        }
×
391
        subnetProviderMaps := make(map[string]string, len(subnets))
×
392
        for _, subnet := range subnets {
×
393
                klog.Infof("Init subnet %s", subnet.Name)
×
394
                subnetProviderMaps[subnet.Name] = subnet.Spec.Provider
×
395
                if err := c.ipam.AddOrUpdateSubnet(subnet.Name, subnet.Spec.CIDRBlock, subnet.Spec.Gateway, subnet.Spec.ExcludeIps); err != nil {
×
396
                        klog.Errorf("failed to init subnet %s: %v", subnet.Name, err)
×
397
                }
×
398

399
                u2oInterconnName := fmt.Sprintf(util.U2OInterconnName, subnet.Spec.Vpc, subnet.Name)
×
400
                u2oInterconnLrpName := fmt.Sprintf("%s-%s", subnet.Spec.Vpc, subnet.Name)
×
401
                if subnet.Status.U2OInterconnectionIP != "" {
×
402
                        var mac *string
×
403
                        klog.Infof("Init U2O for subnet %s", subnet.Name)
×
404
                        if subnet.Status.U2OInterconnectionMAC != "" {
×
405
                                mac = new(subnet.Status.U2OInterconnectionMAC)
×
406
                        } else {
×
407
                                lrp, err := c.OVNNbClient.GetLogicalRouterPort(u2oInterconnLrpName, true)
×
408
                                if err != nil {
×
409
                                        klog.Errorf("failed to get logical router port %s: %v", u2oInterconnLrpName, err)
×
410
                                        return err
×
411
                                }
×
412
                                if lrp != nil {
×
413
                                        mac = new(lrp.MAC)
×
414
                                }
×
415
                        }
416
                        if _, _, _, err = c.ipam.GetStaticAddress(u2oInterconnName, u2oInterconnLrpName, subnet.Status.U2OInterconnectionIP, mac, subnet.Name, true); err != nil {
×
417
                                klog.Errorf("failed to init subnet %q u2o interconnection ip to ipam %v", subnet.Name, err)
×
418
                        }
×
419
                }
420
        }
421

422
        ippools, err := c.ippoolLister.List(labels.Everything())
×
423
        if err != nil {
×
424
                klog.Errorf("failed to list ippool: %v", err)
×
425
                return err
×
426
        }
×
427
        for _, ippool := range ippools {
×
428
                if err = c.ipam.AddOrUpdateIPPool(ippool.Spec.Subnet, ippool.Name, ippool.Spec.IPs); err != nil {
×
429
                        klog.Errorf("failed to init ippool %s: %v", ippool.Name, err)
×
430
                }
×
431
        }
432

433
        klog.Infof("Init IPAM from StatefulSet or VM IP CR")
×
434
        ips, err := c.ipsLister.List(labels.Everything())
×
435
        if err != nil {
×
436
                klog.Errorf("failed to list IPs: %v", err)
×
437
                return err
×
438
        }
×
439

440
        for _, ip := range ips {
×
441
                if !ip.DeletionTimestamp.IsZero() {
×
442
                        klog.Infof("enqueue update for removing finalizer to delete ip %s", ip.Name)
×
443
                        c.updateIPQueue.Add(ip.Name)
×
444
                        continue
×
445
                }
446
                // recover sts and kubevirt vm ip, other ip recover in later pod loop
447
                if ip.Spec.PodType != util.KindStatefulSet &&
×
448
                        ip.Spec.PodType != util.KindVirtualMachine {
×
449
                        continue
×
450
                }
451

452
                var ipamKey string
×
453
                if ip.Spec.Namespace != "" {
×
454
                        ipamKey = fmt.Sprintf("%s/%s", ip.Spec.Namespace, ip.Spec.PodName)
×
455
                } else {
×
456
                        ipamKey = util.NodeLspName(ip.Spec.PodName)
×
457
                }
×
458
                if _, _, _, err = c.ipam.GetStaticAddress(ipamKey, ip.Name, ip.Spec.IPAddress, &ip.Spec.MacAddress, ip.Spec.Subnet, true); err != nil {
×
459
                        klog.Errorf("failed to init IPAM from IP CR %s: %v", ip.Name, err)
×
460
                }
×
461
        }
462

463
        klog.Infof("Init IPAM from pod")
×
464
        pods, err := c.podsLister.List(labels.Everything())
×
465
        if err != nil {
×
466
                klog.Errorf("failed to list pods: %v", err)
×
467
                return err
×
468
        }
×
469
        for _, pod := range pods {
×
470
                if pod.Spec.HostNetwork {
×
471
                        continue
×
472
                }
473

474
                isAlive := isPodAlive(pod)
×
475
                isStsPod, _, _ := isStatefulSetPod(pod)
×
476
                if !isAlive && !isStsPod {
×
477
                        continue
×
478
                }
479

480
                if !hasAllocatedAnnotation(pod) {
×
481
                        continue
×
482
                }
483

484
                podNets, err := c.getPodKubeovnNets(pod)
×
485
                if err != nil {
×
486
                        klog.Errorf("failed to get pod kubeovn nets %s.%s address %s: %v", pod.Name, pod.Namespace, pod.Annotations[util.IPAddressAnnotation], err)
×
487
                        continue
×
488
                }
489

490
                podType := getPodType(pod)
×
491
                podName := c.getNameByPod(pod)
×
492
                key := cache.NewObjectName(pod.Namespace, podName).String()
×
493
                for _, podNet := range podNets {
×
494
                        if pod.Annotations[fmt.Sprintf(util.AllocatedAnnotationTemplate, podNet.ProviderName)] == "true" {
×
495
                                portName := ovs.PodNameToPortName(podName, pod.Namespace, podNet.ProviderName)
×
496
                                ip := pod.Annotations[fmt.Sprintf(util.IPAddressAnnotationTemplate, podNet.ProviderName)]
×
497
                                mac := pod.Annotations[fmt.Sprintf(util.MacAddressAnnotationTemplate, podNet.ProviderName)]
×
498
                                if ip == "" {
×
499
                                        klog.Warningf("pod %s/%s has empty IP annotation for provider %s, skip IPAM init", pod.Namespace, podName, podNet.ProviderName)
×
500
                                        continue
×
501
                                }
502
                                _, _, _, err := c.ipam.GetStaticAddress(key, portName, ip, &mac, podNet.Subnet.Name, true)
×
503
                                if err != nil {
×
504
                                        klog.Errorf("failed to init pod %s.%s address %s: %v", podName, pod.Namespace, ip, err)
×
505
                                } else {
×
506
                                        err = c.createOrUpdateIPCR(portName, podName, ip, mac, podNet.Subnet.Name, pod.Namespace, pod.Spec.NodeName, podType)
×
507
                                        if err != nil {
×
508
                                                klog.Errorf("failed to create/update ips CR %s.%s with ip address %s: %v", podName, pod.Namespace, ip, err)
×
509
                                        }
×
510
                                }
511

512
                                // Append ExternalIds is added in v1.7, used for upgrading from v1.6.3. It should be deleted now since v1.7 is not used anymore.
513
                        }
514
                }
515
        }
516

517
        klog.Infof("Init IPAM from vip CR")
×
518
        vips, err := c.virtualIpsLister.List(labels.Everything())
×
519
        if err != nil {
×
520
                klog.Errorf("failed to list vips: %v", err)
×
521
                return err
×
522
        }
×
523
        for _, vip := range vips {
×
524
                provider, ok := subnetProviderMaps[vip.Spec.Subnet]
×
525
                if !ok {
×
526
                        klog.Errorf("failed to find subnet %s for vip %s", vip.Spec.Subnet, vip.Name)
×
527
                        continue
×
528
                }
529
                portName := ovs.PodNameToPortName(vip.Name, vip.Spec.Namespace, provider)
×
530
                if _, _, _, err = c.ipam.GetStaticAddress(vip.Name, portName, vip.Status.V4ip, &vip.Status.Mac, vip.Spec.Subnet, true); err != nil {
×
531
                        klog.Errorf("failed to init ipam from vip cr %s: %v", vip.Name, err)
×
532
                }
×
533
        }
534

535
        klog.Infof("Init IPAM from iptables EIP CR")
×
536
        eips, err := c.iptablesEipsLister.List(labels.Everything())
×
537
        if err != nil {
×
538
                klog.Errorf("failed to list EIPs: %v", err)
×
539
                return err
×
540
        }
×
541
        for _, eip := range eips {
×
542
                externalNetwork := util.GetExternalNetwork(eip.Spec.ExternalSubnet)
×
543
                if _, _, _, err = c.ipam.GetStaticAddress(eip.Name, eip.Name, eip.Status.IP, &eip.Spec.MacAddress, externalNetwork, true); err != nil {
×
544
                        klog.Errorf("failed to init ipam from iptables eip cr %s: %v", eip.Name, err)
×
545
                }
×
546
        }
547

548
        klog.Infof("Init IPAM from ovn EIP CR")
×
549
        oeips, err := c.ovnEipsLister.List(labels.Everything())
×
550
        if err != nil {
×
551
                klog.Errorf("failed to list ovn eips: %v", err)
×
552
                return err
×
553
        }
×
554
        for _, oeip := range oeips {
×
555
                if _, _, _, err = c.ipam.GetStaticAddress(oeip.Name, oeip.Name, oeip.Status.V4Ip, &oeip.Status.MacAddress, oeip.Spec.ExternalSubnet, true); err != nil {
×
556
                        klog.Errorf("failed to init ipam from ovn eip cr %s: %v", oeip.Name, err)
×
557
                }
×
558
        }
559

560
        klog.Infof("Init IPAM from node annotation")
×
561
        nodes, err := c.nodesLister.List(labels.Everything())
×
562
        if err != nil {
×
563
                klog.Errorf("failed to list nodes: %v", err)
×
564
                return err
×
565
        }
×
566
        for _, node := range nodes {
×
567
                if node.Annotations[util.AllocatedAnnotation] == "true" {
×
568
                        portName := util.NodeLspName(node.Name)
×
569
                        mac := node.Annotations[util.MacAddressAnnotation]
×
570
                        v4IP, v6IP, _, err := c.ipam.GetStaticAddress(portName, portName,
×
571
                                node.Annotations[util.IPAddressAnnotation], &mac,
×
572
                                node.Annotations[util.LogicalSwitchAnnotation], true)
×
573
                        if err != nil {
×
574
                                klog.Errorf("failed to init node %s.%s address %s: %v", node.Name, node.Namespace, node.Annotations[util.IPAddressAnnotation], err)
×
575
                        }
×
576
                        if v4IP != "" && v6IP != "" {
×
577
                                ipStr := util.GetStringIP(v4IP, v6IP)
×
578
                                if ipStr != node.Annotations[util.IPAddressAnnotation] {
×
579
                                        patch := util.KVPatch{util.IPAddressAnnotation: ipStr}
×
580
                                        if err = util.PatchAnnotations(c.config.KubeClient.CoreV1().Nodes(), node.Name, patch); err != nil {
×
581
                                                klog.Errorf("failed to patch node %s IP annotation: %v", node.Name, err)
×
582
                                        }
×
583
                                }
584
                        }
585
                }
586
        }
587

588
        klog.Infof("take %.2f seconds to initialize IPAM", time.Since(start).Seconds())
×
589
        return nil
×
590
}
591

592
func (c *Controller) initDefaultProviderNetwork() error {
×
593
        _, err := c.providerNetworksLister.Get(c.config.DefaultProviderName)
×
594
        if err == nil {
×
595
                return nil
×
596
        }
×
597
        if !k8serrors.IsNotFound(err) {
×
598
                klog.Errorf("failed to get default provider network %s: %v", c.config.DefaultProviderName, err)
×
599
                return err
×
600
        }
×
601

602
        nodes, err := c.nodesLister.List(labels.Everything())
×
603
        if err != nil {
×
604
                klog.Errorf("failed to get nodes: %v", err)
×
605
                return err
×
606
        }
×
607

608
        pn := kubeovnv1.ProviderNetwork{
×
609
                ObjectMeta: metav1.ObjectMeta{
×
610
                        Name: c.config.DefaultProviderName,
×
611
                },
×
612
                Spec: kubeovnv1.ProviderNetworkSpec{
×
613
                        DefaultInterface: c.config.DefaultHostInterface,
×
614
                        ExchangeLinkName: c.config.DefaultExchangeLinkName,
×
615
                },
×
616
        }
×
617

×
618
        excludeAnno := fmt.Sprintf(util.ProviderNetworkExcludeTemplate, c.config.DefaultProviderName)
×
619
        interfaceAnno := fmt.Sprintf(util.ProviderNetworkInterfaceTemplate, c.config.DefaultProviderName)
×
620
        patchNodes := make([]string, 0, len(nodes))
×
621
        for _, node := range nodes {
×
622
                if len(node.Annotations) == 0 {
×
623
                        continue
×
624
                }
625

626
                if node.Annotations[excludeAnno] == "true" {
×
627
                        pn.Spec.ExcludeNodes = append(pn.Spec.ExcludeNodes, node.Name)
×
628
                        patchNodes = append(patchNodes, node.Name)
×
629
                } else if s := node.Annotations[interfaceAnno]; s != "" {
×
630
                        var index *int
×
631
                        for i := range pn.Spec.CustomInterfaces {
×
632
                                if pn.Spec.CustomInterfaces[i].Interface == s {
×
633
                                        index = &i
×
634
                                        break
×
635
                                }
636
                        }
637
                        if index != nil {
×
638
                                pn.Spec.CustomInterfaces[*index].Nodes = append(pn.Spec.CustomInterfaces[*index].Nodes, node.Name)
×
639
                        } else {
×
640
                                ci := kubeovnv1.CustomInterface{Interface: s, Nodes: []string{node.Name}}
×
641
                                pn.Spec.CustomInterfaces = append(pn.Spec.CustomInterfaces, ci)
×
642
                        }
×
643
                        patchNodes = append(patchNodes, node.Name)
×
644
                }
645
        }
646

647
        defer func() {
×
648
                if err != nil {
×
649
                        return
×
650
                }
×
651

652
                // update nodes only when provider network has been created successfully
653
                patch := util.KVPatch{excludeAnno: nil, interfaceAnno: nil}
×
654
                for _, node := range patchNodes {
×
655
                        if err := util.PatchAnnotations(c.config.KubeClient.CoreV1().Nodes(), node, patch); err != nil {
×
656
                                klog.Errorf("failed to patch node %s: %v", node, err)
×
657
                        }
×
658
                }
659
        }()
660

661
        _, err = c.config.KubeOvnClient.KubeovnV1().ProviderNetworks().Create(context.Background(), &pn, metav1.CreateOptions{})
×
662
        if err != nil {
×
663
                klog.Errorf("failed to create provider network %s: %v", c.config.DefaultProviderName, err)
×
664
                return err
×
665
        }
×
666
        return nil
×
667
}
668

669
func (c *Controller) initDefaultVlan() error {
×
670
        if c.config.NetworkType != util.NetworkTypeVlan {
×
671
                return nil
×
672
        }
×
673

674
        if err := c.initDefaultProviderNetwork(); err != nil {
×
675
                klog.Error(err)
×
676
                return err
×
677
        }
×
678

679
        _, err := c.vlansLister.Get(c.config.DefaultVlanName)
×
680
        if err == nil {
×
681
                return nil
×
682
        }
×
683

684
        if !k8serrors.IsNotFound(err) {
×
685
                klog.Errorf("get default vlan %s failed: %v", c.config.DefaultVlanName, err)
×
686
                return err
×
687
        }
×
688

689
        if c.config.DefaultVlanID < 0 || c.config.DefaultVlanID > 4095 {
×
690
                return errors.New("the default vlan id is not between 1-4095")
×
691
        }
×
692

693
        defaultVlan := kubeovnv1.Vlan{
×
694
                ObjectMeta: metav1.ObjectMeta{Name: c.config.DefaultVlanName},
×
695
                Spec: kubeovnv1.VlanSpec{
×
696
                        ID:       c.config.DefaultVlanID,
×
697
                        Provider: c.config.DefaultProviderName,
×
698
                },
×
699
        }
×
700

×
701
        _, err = c.config.KubeOvnClient.KubeovnV1().Vlans().Create(context.Background(), &defaultVlan, metav1.CreateOptions{})
×
702
        if err != nil {
×
703
                klog.Errorf("failed to create vlan %s: %v", defaultVlan.Name, err)
×
704
                return err
×
705
        }
×
706
        return nil
×
707
}
708

709
func (c *Controller) syncIPCR() error {
×
710
        klog.Info("start to sync ips")
×
711
        ips, err := c.ipsLister.List(labels.Everything())
×
712
        if err != nil {
×
713
                if k8serrors.IsNotFound(err) {
×
714
                        return nil
×
715
                }
×
716
                klog.Error(err)
×
717
                return err
×
718
        }
719

720
        ipMap := strset.New(c.getVMLsps()...)
×
721
        for _, ip := range ips {
×
722
                if !ip.DeletionTimestamp.IsZero() {
×
723
                        klog.Infof("enqueue update for removing finalizer to delete ip %s", ip.Name)
×
724
                        c.updateIPQueue.Add(ip.Name)
×
725
                        continue
×
726
                }
727
                changed := false
×
728
                ip = ip.DeepCopy()
×
729
                if ipMap.Has(ip.Name) && ip.Spec.PodType == "" {
×
730
                        ip.Spec.PodType = util.KindVirtualMachine
×
731
                        changed = true
×
732
                }
×
733

734
                v4IP, v6IP := util.SplitStringIP(ip.Spec.IPAddress)
×
735
                if ip.Spec.V4IPAddress == v4IP && ip.Spec.V6IPAddress == v6IP && !changed {
×
736
                        continue
×
737
                }
738

739
                ip.Spec.V4IPAddress = v4IP
×
740
                ip.Spec.V6IPAddress = v6IP
×
741
                _, err := c.config.KubeOvnClient.KubeovnV1().IPs().Update(context.Background(), ip, metav1.UpdateOptions{})
×
742
                if err != nil {
×
743
                        klog.Errorf("failed to sync crd ip %s: %v", ip.Spec.IPAddress, err)
×
744
                        return err
×
745
                }
×
746
        }
747
        return nil
×
748
}
749

750
func (c *Controller) syncSubnetCR() error {
×
751
        klog.Info("start to sync subnets")
×
752
        subnets, err := c.subnetsLister.List(labels.Everything())
×
753
        if err != nil {
×
754
                if k8serrors.IsNotFound(err) {
×
755
                        return nil
×
756
                }
×
757
                klog.Error(err)
×
758
                return err
×
759
        }
760
        for _, cachedSubnet := range subnets {
×
761
                subnet := cachedSubnet.DeepCopy()
×
762
                if !subnet.Status.IsReady() {
×
763
                        klog.Warningf("subnet %s is not ready", subnet.Name)
×
764
                        continue
×
765
                }
766
                subnet, err = c.calcSubnetStatusIP(subnet)
×
767
                if err != nil {
×
768
                        klog.Errorf("failed to calculate subnet %s used ip: %v", cachedSubnet.Name, err)
×
769
                        return err
×
770
                }
×
771

772
                // only sync subnet spec enableEcmp when subnet.Spec.EnableEcmp is false and c.config.EnableEcmp is true
773
                if subnet.Spec.GatewayType == kubeovnv1.GWCentralizedType && !subnet.Spec.EnableEcmp && subnet.Spec.EnableEcmp != c.config.EnableEcmp {
×
774
                        subnet, err = c.subnetsLister.Get(subnet.Name)
×
775
                        if err != nil {
×
776
                                klog.Errorf("failed to get subnet %s: %v", subnet.Name, err)
×
777
                                return err
×
778
                        }
×
779

780
                        subnet.Spec.EnableEcmp = c.config.EnableEcmp
×
781
                        if _, err := c.config.KubeOvnClient.KubeovnV1().Subnets().Update(context.Background(), subnet, metav1.UpdateOptions{}); err != nil {
×
782
                                klog.Errorf("failed to sync subnet spec enableEcmp with kube-ovn-controller config enableEcmp %s: %v", subnet.Name, err)
×
783
                                return err
×
784
                        }
×
785
                }
786
        }
787
        return nil
×
788
}
789

790
func (c *Controller) syncVpcNatGatewayCR() error {
×
791
        klog.Info("start to sync crd vpc nat gw")
×
792
        gws, err := c.vpcNatGatewayLister.List(labels.Everything())
×
793
        if err != nil {
×
794
                klog.Errorf("failed to list vpc nat gateway, %v", err)
×
795
                return err
×
796
        }
×
797
        if len(gws) == 0 {
×
798
                return nil
×
799
        }
×
800
        // get vpc nat gateway enable state
801
        cm, err := c.configMapsLister.ConfigMaps(c.config.PodNamespace).Get(util.VpcNatGatewayConfig)
×
802
        if err != nil && !k8serrors.IsNotFound(err) {
×
803
                klog.Errorf("failed to get config map %s, %v", util.VpcNatGatewayConfig, err)
×
804
                return err
×
805
        }
×
806
        if k8serrors.IsNotFound(err) || cm.Data["enable-vpc-nat-gw"] == "false" {
×
807
                return nil
×
808
        }
×
809
        // get vpc nat gateway image
810
        cm, err = c.configMapsLister.ConfigMaps(c.config.PodNamespace).Get(util.VpcNatConfig)
×
811
        if err != nil {
×
812
                if k8serrors.IsNotFound(err) {
×
813
                        klog.Errorf("should set config map for vpc-nat-gateway %s, %v", util.VpcNatConfig, err)
×
814
                        return err
×
815
                }
×
816
                klog.Errorf("failed to get config map %s, %v", util.VpcNatConfig, err)
×
817
                return err
×
818
        }
819

820
        if cm.Data["image"] == "" {
×
821
                err = errors.New("should set image for vpc-nat-gateway pod")
×
822
                klog.Error(err)
×
823
                return err
×
824
        }
×
825

826
        for _, gw := range gws {
×
827
                if err := c.updateCrdNatGwLabels(gw.Name, ""); err != nil {
×
828
                        klog.Errorf("failed to update nat gw %s: %v", gw.Name, err)
×
829
                        return err
×
830
                }
×
831
        }
832
        return nil
×
833
}
834

835
func (c *Controller) syncVlanCR() error {
×
836
        klog.Info("start to sync vlans")
×
837
        vlans, err := c.vlansLister.List(labels.Everything())
×
838
        if err != nil {
×
839
                if k8serrors.IsNotFound(err) {
×
840
                        return nil
×
841
                }
×
842
                klog.Error(err)
×
843
                return err
×
844
        }
845

846
        for _, vlan := range vlans {
×
847
                var needUpdate bool
×
848
                newVlan := vlan.DeepCopy()
×
849
                if newVlan.Spec.VlanID != 0 && newVlan.Spec.ID == 0 {
×
850
                        newVlan.Spec.ID = newVlan.Spec.VlanID
×
851
                        newVlan.Spec.VlanID = 0
×
852
                        needUpdate = true
×
853
                }
×
854
                //nolint:staticcheck // Ignore SA1019 for backward compatibility of deprecated field ProviderInterfaceName
855
                if newVlan.Spec.ProviderInterfaceName != "" && newVlan.Spec.Provider == "" {
×
856
                        //nolint:staticcheck // Ignore SA1019
×
857
                        newVlan.Spec.Provider = newVlan.Spec.ProviderInterfaceName
×
858
                        //nolint:staticcheck // Ignore SA1019
×
859
                        newVlan.Spec.ProviderInterfaceName = ""
×
860
                        needUpdate = true
×
861
                }
×
862
                if needUpdate {
×
863
                        if _, err = c.config.KubeOvnClient.KubeovnV1().Vlans().Update(context.Background(), newVlan, metav1.UpdateOptions{}); err != nil {
×
864
                                klog.Errorf("failed to update spec of vlan %s: %v", newVlan.Name, err)
×
865
                                return err
×
866
                        }
×
867
                }
868
        }
869

870
        return nil
×
871
}
872

873
func (c *Controller) batchMigrateNodeRoute(nodes []*v1.Node) error {
×
874
        start := time.Now()
×
875
        addPolicies := make([]*kubeovnv1.PolicyRoute, 0)
×
876
        delPolicies := make([]*kubeovnv1.PolicyRoute, 0)
×
877
        staticRoutes := make([]*kubeovnv1.StaticRoute, 0)
×
878
        externalIDsMap := make(map[string]map[string]string)
×
879
        delAsNames := make([]string, 0)
×
880
        for _, node := range nodes {
×
881
                if node.Annotations[util.AllocatedAnnotation] != "true" {
×
882
                        continue
×
883
                }
884
                nodeName := node.Name
×
885
                nodeIPv4, nodeIPv6 := util.GetNodeInternalIP(*node)
×
886
                joinAddrV4, joinAddrV6 := util.SplitStringIP(node.Annotations[util.IPAddressAnnotation])
×
887
                if nodeIPv4 != "" && joinAddrV4 != "" {
×
888
                        buildNodeRoute(4, nodeName, joinAddrV4, nodeIPv4, &addPolicies, &delPolicies, &staticRoutes, externalIDsMap, &delAsNames)
×
889
                }
×
890
                if nodeIPv6 != "" && joinAddrV6 != "" {
×
891
                        buildNodeRoute(6, nodeName, joinAddrV6, nodeIPv6, &addPolicies, &delPolicies, &staticRoutes, externalIDsMap, &delAsNames)
×
892
                }
×
893
        }
894

895
        if err := c.batchAddPolicyRouteToVpc(c.config.ClusterRouter, addPolicies, externalIDsMap); err != nil {
×
896
                klog.Errorf("failed to batch add logical router policy for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
897
                return err
×
898
        }
×
899
        if err := c.batchDeleteStaticRouteFromVpc(c.config.ClusterRouter, staticRoutes); err != nil {
×
900
                klog.Errorf("failed to batch delete  obsolete logical router static route for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
901
                return err
×
902
        }
×
903
        if err := c.batchDeletePolicyRouteFromVpc(c.config.ClusterRouter, delPolicies); err != nil {
×
904
                klog.Errorf("failed to batch delete obsolete logical router policy for lr %s nodes %d: %v", c.config.ClusterRouter, len(nodes), err)
×
905
                return err
×
906
        }
×
907
        if err := c.OVNNbClient.BatchDeleteAddressSetByNames(delAsNames); err != nil {
×
908
                klog.Errorf("failed to batch delete obsolete address set for asNames %v nodes %d: %v", delAsNames, len(nodes), err)
×
909
                return err
×
910
        }
×
911
        klog.V(3).Infof("take to %v batch migrate node route for router: %s priority: %d add policy len: %d externalID len: %d del policy len: %d del address set len: %d",
×
912
                time.Since(start), c.config.ClusterRouter, util.NodeRouterPolicyPriority, len(addPolicies), len(externalIDsMap), len(delPolicies), len(delAsNames))
×
913

×
914
        return nil
×
915
}
916

917
func buildNodeRoute(af int, nodeName, nexthop, ip string, addPolicies, delPolicies *[]*kubeovnv1.PolicyRoute, staticRoutes *[]*kubeovnv1.StaticRoute, externalIDsMap map[string]map[string]string, delAsNames *[]string) {
×
918
        var (
×
919
                match       = fmt.Sprintf("ip%d.dst == %s", af, ip)
×
920
                action      = kubeovnv1.PolicyRouteActionReroute
×
921
                externalIDs = map[string]string{
×
922
                        "vendor": util.CniTypeName,
×
923
                        "node":   nodeName,
×
924
                }
×
925
        )
×
926
        *addPolicies = append(*addPolicies, &kubeovnv1.PolicyRoute{
×
927
                Priority:  util.NodeRouterPolicyPriority,
×
928
                Match:     match,
×
929
                Action:    action,
×
930
                NextHopIP: nexthop,
×
931
        })
×
932
        externalIDsMap[buildExternalIDsMapKey(match, string(action), util.NodeRouterPolicyPriority)] = externalIDs
×
933
        *staticRoutes = append(*staticRoutes, &kubeovnv1.StaticRoute{
×
934
                Policy:     kubeovnv1.PolicyDst,
×
935
                RouteTable: util.MainRouteTable,
×
936
                NextHopIP:  "",
×
937
                CIDR:       ip,
×
938
        })
×
939
        asName := nodeUnderlayAddressSetName(nodeName, af)
×
940
        obsoleteMatch := fmt.Sprintf("ip%d.dst == %s && ip%d.src != $%s", af, ip, af, asName)
×
941
        *delPolicies = append(*delPolicies, &kubeovnv1.PolicyRoute{
×
942
                Match:    obsoleteMatch,
×
943
                Priority: util.NodeRouterPolicyPriority,
×
944
        })
×
945
        *delAsNames = append(*delAsNames, asName)
×
946
}
×
947

948
func (c *Controller) syncNodeRoutes() error {
×
949
        nodes, err := c.nodesLister.List(labels.Everything())
×
950
        if err != nil {
×
951
                klog.Errorf("failed to list nodes: %v", err)
×
952
                return err
×
953
        }
×
954

955
        if err := c.batchMigrateNodeRoute(nodes); err != nil {
×
956
                klog.Errorf("failed to batch migrate node routes: %v", err)
×
957
                return err
×
958
        }
×
959

960
        return nil
×
961
}
962

963
func (c *Controller) initNodeChassis() error {
×
964
        nodes, err := c.nodesLister.List(labels.Everything())
×
965
        if err != nil {
×
966
                klog.Errorf("failed to list nodes: %v", err)
×
967
                return err
×
968
        }
×
969
        chassises, err := c.OVNSbClient.GetKubeOvnChassises()
×
970
        if err != nil {
×
971
                klog.Errorf("failed to get chassis nodes: %v", err)
×
972
                return err
×
973
        }
×
974
        chassisNodes := make(map[string]string, len(*chassises))
×
975
        for _, chassis := range *chassises {
×
976
                chassisNodes[chassis.Name] = chassis.Hostname
×
977
        }
×
978
        for _, node := range nodes {
×
979
                if err := c.UpdateChassisTag(node); err != nil {
×
980
                        klog.Error(err)
×
981
                        if _, ok := err.(*ErrChassisNotFound); !ok {
×
982
                                return err
×
983
                        }
×
984
                }
985
        }
986
        return nil
×
987
}
988

989
func migrateFinalizers(c client.Client, list client.ObjectList, getObjectItem func(int) (client.Object, client.Object)) error {
×
990
        if err := c.List(context.Background(), list); err != nil {
×
991
                klog.Errorf("failed to list objects: %v", err)
×
992
                return err
×
993
        }
×
994

995
        var i int
×
996
        var cachedObj, patchedObj client.Object
×
997
        for {
×
998
                if cachedObj, patchedObj = getObjectItem(i); cachedObj == nil {
×
999
                        break
×
1000
                }
1001
                if !controllerutil.ContainsFinalizer(cachedObj, util.DeprecatedFinalizerName) {
×
1002
                        i++
×
1003
                        continue
×
1004
                }
1005
                controllerutil.RemoveFinalizer(patchedObj, util.DeprecatedFinalizerName)
×
1006
                if cachedObj.GetDeletionTimestamp() == nil {
×
1007
                        // if the object is not being deleted, add the new finalizer
×
1008
                        controllerutil.AddFinalizer(patchedObj, util.KubeOVNControllerFinalizer)
×
1009
                }
×
1010
                if err := c.Patch(context.Background(), patchedObj, client.MergeFrom(cachedObj)); client.IgnoreNotFound(err) != nil {
×
1011
                        klog.Errorf("failed to sync finalizers for %s %s: %v",
×
1012
                                patchedObj.GetObjectKind().GroupVersionKind().Kind,
×
1013
                                cache.MetaObjectToName(patchedObj), err)
×
1014
                        return err
×
1015
                }
×
1016
                i++
×
1017
        }
1018

1019
        return nil
×
1020
}
1021

1022
func (c *Controller) syncFinalizers() error {
×
1023
        cl, err := client.New(config.GetConfigOrDie(), client.Options{})
×
1024
        if err != nil {
×
1025
                klog.Errorf("failed to create client: %v", err)
×
1026
                return err
×
1027
        }
×
1028

1029
        // migrate deprecated finalizer to new finalizer
1030
        klog.Info("start to sync finalizers")
×
1031
        if err := c.syncIPFinalizer(cl); err != nil {
×
1032
                klog.Errorf("failed to sync ip finalizer: %v", err)
×
1033
                return err
×
1034
        }
×
1035
        if err := c.syncIPPoolFinalizer(cl); err != nil {
×
1036
                klog.Errorf("failed to sync ippool finalizer: %v", err)
×
1037
                return err
×
1038
        }
×
1039
        if err := c.syncOvnDnatFinalizer(cl); err != nil {
×
1040
                klog.Errorf("failed to sync ovn dnat finalizer: %v", err)
×
1041
                return err
×
1042
        }
×
1043
        if err := c.syncOvnEipFinalizer(cl); err != nil {
×
1044
                klog.Errorf("failed to sync ovn eip finalizer: %v", err)
×
1045
                return err
×
1046
        }
×
1047
        if err := c.syncOvnFipFinalizer(cl); err != nil {
×
1048
                klog.Errorf("failed to sync ovn fip finalizer: %v", err)
×
1049
                return err
×
1050
        }
×
1051
        if err := c.syncOvnSnatFinalizer(cl); err != nil {
×
1052
                klog.Errorf("failed to sync ovn snat finalizer: %v", err)
×
1053
                return err
×
1054
        }
×
1055
        if err := c.syncQoSPolicyFinalizer(cl); err != nil {
×
1056
                klog.Errorf("failed to sync qos policy finalizer: %v", err)
×
1057
                return err
×
1058
        }
×
1059
        if err := c.syncSubnetFinalizer(cl); err != nil {
×
1060
                klog.Errorf("failed to sync subnet finalizer: %v", err)
×
1061
                return err
×
1062
        }
×
1063
        if err := c.syncVipFinalizer(cl); err != nil {
×
1064
                klog.Errorf("failed to sync vip finalizer: %v", err)
×
1065
                return err
×
1066
        }
×
1067
        if err := c.syncIptablesEipFinalizer(cl); err != nil {
×
1068
                klog.Errorf("failed to sync iptables eip finalizer: %v", err)
×
1069
                return err
×
1070
        }
×
1071
        if err := c.syncIptablesFipFinalizer(cl); err != nil {
×
1072
                klog.Errorf("failed to sync iptables fip finalizer: %v", err)
×
1073
                return err
×
1074
        }
×
1075
        if err := c.syncIptablesDnatFinalizer(cl); err != nil {
×
1076
                klog.Errorf("failed to sync iptables dnat finalizer: %v", err)
×
1077
                return err
×
1078
        }
×
1079
        if err := c.syncIptablesSnatFinalizer(cl); err != nil {
×
1080
                klog.Errorf("failed to sync iptables snat finalizer: %v", err)
×
1081
                return err
×
1082
        }
×
1083
        klog.Info("sync finalizers done")
×
1084
        return nil
×
1085
}
1086

1087
func hasAllocatedAnnotation(pod *v1.Pod) bool {
1✔
1088
        for key, value := range pod.Annotations {
2✔
1089
                if value == "true" && strings.HasSuffix(key, util.AllocatedAnnotationSuffix) {
2✔
1090
                        return true
1✔
1091
                }
1✔
1092
        }
1093
        return false
1✔
1094
}
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc