vxlan_network.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. // +build !windows
  15. package vxlan
  16. import (
  17. "encoding/json"
  18. "net"
  19. "sync"
  20. "syscall"
  21. "golang.org/x/net/context"
  22. "github.com/coreos/flannel/backend"
  23. "github.com/coreos/flannel/pkg/ip"
  24. "github.com/coreos/flannel/subnet"
  25. "github.com/vishvananda/netlink"
  26. log "k8s.io/klog"
  27. )
  28. type network struct {
  29. backend.SimpleNetwork
  30. dev *vxlanDevice
  31. subnetMgr subnet.Manager
  32. }
  33. const (
  34. encapOverhead = 50
  35. )
  36. func newNetwork(subnetMgr subnet.Manager, extIface *backend.ExternalInterface, dev *vxlanDevice, _ ip.IP4Net, lease *subnet.Lease) (*network, error) {
  37. nw := &network{
  38. SimpleNetwork: backend.SimpleNetwork{
  39. SubnetLease: lease,
  40. ExtIface: extIface,
  41. },
  42. subnetMgr: subnetMgr,
  43. dev: dev,
  44. }
  45. return nw, nil
  46. }
  47. func (nw *network) Run(ctx context.Context) {
  48. wg := sync.WaitGroup{}
  49. log.V(0).Info("watching for new subnet leases")
  50. events := make(chan []subnet.Event)
  51. wg.Add(1)
  52. go func() {
  53. subnet.WatchLeases(ctx, nw.subnetMgr, nw.SubnetLease, events)
  54. log.V(1).Info("WatchLeases exited")
  55. wg.Done()
  56. }()
  57. defer wg.Wait()
  58. for {
  59. select {
  60. case evtBatch := <-events:
  61. nw.handleSubnetEvents(evtBatch)
  62. case <-ctx.Done():
  63. return
  64. }
  65. }
  66. }
  67. func (nw *network) MTU() int {
  68. return nw.ExtIface.Iface.MTU - encapOverhead
  69. }
  70. type vxlanLeaseAttrs struct {
  71. VNI uint16
  72. VtepMAC hardwareAddr
  73. }
  74. func (nw *network) handleSubnetEvents(batch []subnet.Event) {
  75. for _, event := range batch {
  76. sn := event.Lease.Subnet
  77. attrs := event.Lease.Attrs
  78. if attrs.BackendType != "vxlan" {
  79. log.Warningf("ignoring non-vxlan subnet(%s): type=%v", sn, attrs.BackendType)
  80. continue
  81. }
  82. var vxlanAttrs vxlanLeaseAttrs
  83. if err := json.Unmarshal(attrs.BackendData, &vxlanAttrs); err != nil {
  84. log.Error("error decoding subnet lease JSON: ", err)
  85. continue
  86. }
  87. // This route is used when traffic should be vxlan encapsulated
  88. vxlanRoute := netlink.Route{
  89. LinkIndex: nw.dev.link.Attrs().Index,
  90. Scope: netlink.SCOPE_UNIVERSE,
  91. Dst: sn.ToIPNet(),
  92. Gw: sn.IP.ToIP(),
  93. }
  94. vxlanRoute.SetFlag(syscall.RTNH_F_ONLINK)
  95. // directRouting is where the remote host is on the same subnet so vxlan isn't required.
  96. directRoute := netlink.Route{
  97. Dst: sn.ToIPNet(),
  98. Gw: attrs.PublicIP.ToIP(),
  99. }
  100. var directRoutingOK = false
  101. if nw.dev.directRouting {
  102. if dr, err := ip.DirectRouting(attrs.PublicIP.ToIP()); err != nil {
  103. log.Error(err)
  104. } else {
  105. directRoutingOK = dr
  106. }
  107. }
  108. switch event.Type {
  109. case subnet.EventAdded:
  110. if directRoutingOK {
  111. log.V(2).Infof("Adding direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
  112. if err := netlink.RouteReplace(&directRoute); err != nil {
  113. log.Errorf("Error adding route to %v via %v: %v", sn, attrs.PublicIP, err)
  114. continue
  115. }
  116. } else {
  117. log.V(2).Infof("adding subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
  118. if err := nw.dev.AddARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  119. log.Error("AddARP failed: ", err)
  120. continue
  121. }
  122. if err := nw.dev.AddFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  123. log.Error("AddFDB failed: ", err)
  124. // Try to clean up the ARP entry then continue
  125. if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  126. log.Error("DelARP failed: ", err)
  127. }
  128. continue
  129. }
  130. // Set the route - the kernel would ARP for the Gw IP address if it hadn't already been set above so make sure
  131. // this is done last.
  132. if err := netlink.RouteReplace(&vxlanRoute); err != nil {
  133. log.Errorf("failed to add vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
  134. // Try to clean up both the ARP and FDB entries then continue
  135. if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  136. log.Error("DelARP failed: ", err)
  137. }
  138. if err := nw.dev.DelFDB(neighbor{IP: event.Lease.Attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  139. log.Error("DelFDB failed: ", err)
  140. }
  141. continue
  142. }
  143. }
  144. case subnet.EventRemoved:
  145. if directRoutingOK {
  146. log.V(2).Infof("Removing direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
  147. if err := netlink.RouteDel(&directRoute); err != nil {
  148. log.Errorf("Error deleting route to %v via %v: %v", sn, attrs.PublicIP, err)
  149. }
  150. } else {
  151. log.V(2).Infof("removing subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
  152. // Try to remove all entries - don't bail out if one of them fails.
  153. if err := nw.dev.DelARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  154. log.Error("DelARP failed: ", err)
  155. }
  156. if err := nw.dev.DelFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  157. log.Error("DelFDB failed: ", err)
  158. }
  159. if err := netlink.RouteDel(&vxlanRoute); err != nil {
  160. log.Errorf("failed to delete vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
  161. }
  162. }
  163. default:
  164. log.Error("internal error: unknown event type: ", int(event.Type))
  165. }
  166. }
  167. }