vxlan_network.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. // Copyright 2015 flannel authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package vxlan
  15. import (
  16. "encoding/json"
  17. "net"
  18. "sync"
  19. log "github.com/golang/glog"
  20. "github.com/vishvananda/netlink"
  21. "golang.org/x/net/context"
  22. "syscall"
  23. "github.com/coreos/flannel/backend"
  24. "github.com/coreos/flannel/pkg/ip"
  25. "github.com/coreos/flannel/subnet"
  26. )
  27. type network struct {
  28. backend.SimpleNetwork
  29. extIface *backend.ExternalInterface
  30. dev *vxlanDevice
  31. subnetMgr subnet.Manager
  32. }
  33. func newNetwork(subnetMgr subnet.Manager, extIface *backend.ExternalInterface, dev *vxlanDevice, _ ip.IP4Net, lease *subnet.Lease) (*network, error) {
  34. nw := &network{
  35. SimpleNetwork: backend.SimpleNetwork{
  36. SubnetLease: lease,
  37. ExtIface: extIface,
  38. },
  39. subnetMgr: subnetMgr,
  40. dev: dev,
  41. }
  42. return nw, nil
  43. }
  44. func (nw *network) Run(ctx context.Context) {
  45. wg := sync.WaitGroup{}
  46. log.V(0).Info("watching for new subnet leases")
  47. events := make(chan []subnet.Event)
  48. wg.Add(1)
  49. go func() {
  50. subnet.WatchLeases(ctx, nw.subnetMgr, nw.SubnetLease, events)
  51. log.V(1).Info("WatchLeases exited")
  52. wg.Done()
  53. }()
  54. defer wg.Wait()
  55. for {
  56. select {
  57. case evtBatch := <-events:
  58. nw.handleSubnetEvents(evtBatch)
  59. case <-ctx.Done():
  60. return
  61. }
  62. }
  63. }
  64. func (nw *network) MTU() int {
  65. return nw.dev.MTU()
  66. }
  67. type vxlanLeaseAttrs struct {
  68. VtepMAC hardwareAddr
  69. }
  70. func (nw *network) handleSubnetEvents(batch []subnet.Event) {
  71. for _, event := range batch {
  72. sn := event.Lease.Subnet
  73. attrs := event.Lease.Attrs
  74. if attrs.BackendType != "vxlan" {
  75. log.Warningf("ignoring non-vxlan subnet(%s): type=%v", sn, attrs.BackendType)
  76. continue
  77. }
  78. var vxlanAttrs vxlanLeaseAttrs
  79. if err := json.Unmarshal(attrs.BackendData, &vxlanAttrs); err != nil {
  80. log.Error("error decoding subnet lease JSON: ", err)
  81. continue
  82. }
  83. // This route is used when traffic should be vxlan encapsulated
  84. vxlanRoute := netlink.Route{
  85. LinkIndex: nw.dev.link.Attrs().Index,
  86. Scope: netlink.SCOPE_UNIVERSE,
  87. Dst: sn.ToIPNet(),
  88. Gw: sn.IP.ToIP(),
  89. }
  90. vxlanRoute.SetFlag(syscall.RTNH_F_ONLINK)
  91. // directRouting is where the remote host is on the same subnet so vxlan isn't required.
  92. directRoute := netlink.Route{
  93. Dst: sn.ToIPNet(),
  94. Gw: attrs.PublicIP.ToIP(),
  95. }
  96. var directRoutingOK = false
  97. if nw.dev.directRouting {
  98. routes, err := netlink.RouteGet(attrs.PublicIP.ToIP())
  99. if err != nil {
  100. log.Errorf("Couldn't lookup route to %v: %v", attrs.PublicIP, err)
  101. continue
  102. }
  103. if len(routes) == 1 && routes[0].Gw == nil {
  104. // There is only a single route and there's no gateway (i.e. it's directly connected)
  105. directRoutingOK = true
  106. }
  107. }
  108. switch event.Type {
  109. case subnet.EventAdded:
  110. if directRoutingOK {
  111. log.V(2).Infof("Adding direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
  112. if err := netlink.RouteReplace(&directRoute); err != nil {
  113. log.Errorf("Error adding route to %v via %v: %v", sn, attrs.PublicIP, err)
  114. continue
  115. }
  116. } else {
  117. log.V(2).Infof("adding subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
  118. if err := nw.dev.AddARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  119. log.Error("AddARP failed: ", err)
  120. continue
  121. }
  122. if err := nw.dev.AddFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  123. log.Error("AddFDB failed: ", err)
  124. // Try to clean up the ARP entry then continue
  125. if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  126. log.Error("DelARP failed: ", err)
  127. }
  128. continue
  129. }
  130. // Set the route - the kernel would ARP for the Gw IP address if it hadn't already been set above so make sure
  131. // this is done last.
  132. if err := netlink.RouteReplace(&vxlanRoute); err != nil {
  133. log.Errorf("failed to add vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
  134. // Try to clean up both the ARP and FDB entries then continue
  135. if err := nw.dev.DelARP(neighbor{IP: event.Lease.Subnet.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  136. log.Error("DelARP failed: ", err)
  137. }
  138. if err := nw.dev.DelFDB(neighbor{IP: event.Lease.Attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  139. log.Error("DelFDB failed: ", err)
  140. }
  141. continue
  142. }
  143. }
  144. case subnet.EventRemoved:
  145. if directRoutingOK {
  146. log.V(2).Infof("Removing direct route to subnet: %s PublicIP: %s", sn, attrs.PublicIP)
  147. if err := netlink.RouteDel(&directRoute); err != nil {
  148. log.Errorf("Error deleting route to %v via %v: %v", sn, attrs.PublicIP, err)
  149. }
  150. } else {
  151. log.V(2).Infof("removing subnet: %s PublicIP: %s VtepMAC: %s", sn, attrs.PublicIP, net.HardwareAddr(vxlanAttrs.VtepMAC))
  152. // Try to remove all entries - don't bail out if one of them fails.
  153. if err := nw.dev.DelARP(neighbor{IP: sn.IP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  154. log.Error("DelARP failed: ", err)
  155. }
  156. if err := nw.dev.DelFDB(neighbor{IP: attrs.PublicIP, MAC: net.HardwareAddr(vxlanAttrs.VtepMAC)}); err != nil {
  157. log.Error("DelFDB failed: ", err)
  158. }
  159. if err := netlink.RouteDel(&vxlanRoute); err != nil {
  160. log.Errorf("failed to delete vxlanRoute (%s -> %s): %v", vxlanRoute.Dst, vxlanRoute.Gw, err)
  161. }
  162. }
  163. default:
  164. log.Error("internal error: unknown event type: ", int(event.Type))
  165. }
  166. }
  167. }