vxlan_network.go 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. // +build !windows
  15. package vxlan
  16. import (
  17. "encoding/json"
  18. "net"
  19. "sync"
  20. "syscall"
  21. "golang.org/x/net/context"
  22. "github.com/flannel-io/flannel/backend"
  23. "github.com/flannel-io/flannel/pkg/ip"
  24. "github.com/flannel-io/flannel/subnet"
  25. "github.com/vishvananda/netlink"
  26. log "k8s.io/klog"
  27. )
  28. type network struct {
  29. backend.SimpleNetwork
  30. dev *vxlanDevice
  31. subnetMgr subnet.Manager
  32. }
  33. const (
  34. encapOverhead = 50
  35. )
  36. func newNetwork(subnetMgr subnet.Manager, extIface *backend.ExternalInterface, dev *vxlanDevice, _ ip.IP4Net, lease *subnet.Lease) (*network, error) {
  37. nw := &network{
  38. SimpleNetwork: backend.SimpleNetwork{
  39. SubnetLease: lease,
  40. ExtIface: extIface,
  41. },
  42. subnetMgr: subnetMgr,
  43. dev: dev,
  44. }
  45. return nw, nil
  46. }
  47. func (nw *network) Run(ctx context.Context) {
  48. wg := sync.WaitGroup{}
  49. log.V(0).Info("watching for new subnet leases")
  50. events := make(chan []subnet.Event)
  51. wg.Add(1)
  52. go func() {
  53. subnet.WatchLeases(ctx, nw.subnetMgr, nw.SubnetLease, events)
  54. log.V(1).Info("WatchLeases exited")
  55. wg.Done()
  56. }()
  57. defer wg.Wait()
  58. for {
  59. select {
  60. case evtBatch, ok := <-events:
  61. if !ok {
  62. log.Infof("evts chan closed")
  63. return
  64. }
  65. nw.handleSubnetEvents(evtBatch)
  66. }
  67. }
  68. }
  69. func (nw *network) MTU() int {
  70. return nw.ExtIface.Iface.MTU - encapOverhead
  71. }
  72. type vxlanLeaseAttrs struct {
  73. VNI uint16
  74. VtepMAC hardwareAddr
  75. }
  76. func (nw *network) handleSubnetEvents(batch []subnet.Event) {
  77. for _, event := range batch {
  78. sn := event.Lease.Subnet
  79. attrs := event.Lease.Attrs
  80. if attrs.BackendType != "vxlan" {
  81. log.Warningf("ignoring non-vxlan subnet(%s): type=%v", sn, attrs.BackendType)
  82. continue
  83. }
  84. var vxlanAttrs vxlanLeaseAttrs
  85. if err := json.Unmarshal(attrs.BackendData, &vxlanAttrs); err != nil {
  86. log.Error("error decoding subnet lease JSON: ", err)
  87. continue
  88. }
  89. // This route is used when traffic should be vxlan encapsulated
  90. vxlanRoute := netlink.Route{
  91. LinkIndex: nw.dev.link.Attrs().Index,
  92. Scope: netlink.SCOPE_UNIVERSE,
  93. Dst: sn.ToIPNet(),
  94. Gw: sn.IP.ToIP(),
  95. }
  96. vxlanRoute.SetFlag(syscall.RTNH_F_ONLINK)
  97. // directRouting is where the remote host is on the same subnet so vxlan isn't required.
  98. directRoute := netlink.Route{
  99. Dst: sn.ToIPNet(),
  100. Gw: attrs.PublicIP.ToIP(),
  101. }
  102. var directRoutingOK = false
  103. if nw.dev.directRouting {
  104. if dr, err := ip.DirectRouting(attrs.PublicIP.ToIP()); err != nil {
  105. log.Error(err)
  106. } else {
  107. directRoutingOK = dr
  108. }
  109. }
  110. switch event.Type {
  111. case subnet.EventAdded:
  112. if directRoutingOK {
  113. log.V(2).Infof("Adding direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
  114. if err := netlink.RouteReplace(&directRoute); err != nil {
  115. log.Errorf("Error adding route to %v via %v: %v", sn, attrs.PublicIP, err)
  116. continue
  117. }
  118. } else {
  119. log.V(2).Infof("adding subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
  120. if err := nw.dev.AddARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  121. log.Error("AddARP failed: ", err)
  122. continue
  123. }
  124. if err := nw.dev.AddFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  125. log.Error("AddFDB failed: ", err)
  126. // Try to clean up the ARP entry then continue
  127. if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  128. log.Error("DelARP failed: ", err)
  129. }
  130. continue
  131. }
  132. // Set the route - the kernel would ARP for the Gw IP address if it hadn't already been set above so make sure
  133. // this is done last.
  134. if err := netlink.RouteReplace(&vxlanRoute); err != nil {
  135. log.Errorf("failed to add vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
  136. // Try to clean up both the ARP and FDB entries then continue
  137. if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  138. log.Error("DelARP failed: ", err)
  139. }
  140. if err := nw.dev.DelFDB(neighbor{IP: event.Lease.Attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  141. log.Error("DelFDB failed: ", err)
  142. }
  143. continue
  144. }
  145. }
  146. case subnet.EventRemoved:
  147. if directRoutingOK {
  148. log.V(2).Infof("Removing direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
  149. if err := netlink.RouteDel(&directRoute); err != nil {
  150. log.Errorf("Error deleting route to %v via %v: %v", sn, attrs.PublicIP, err)
  151. }
  152. } else {
  153. log.V(2).Infof("removing subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
  154. // Try to remove all entries - don't bail out if one of them fails.
  155. if err := nw.dev.DelARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  156. log.Error("DelARP failed: ", err)
  157. }
  158. if err := nw.dev.DelFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  159. log.Error("DelFDB failed: ", err)
  160. }
  161. if err := netlink.RouteDel(&vxlanRoute); err != nil {
  162. log.Errorf("failed to delete vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
  163. }
  164. }
  165. default:
  166. log.Error("internal error: unknown event type: ", int(event.Type))
  167. }
  168. }
  169. }