keeper.go 41 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package ovn
  15. import (
  16. "context"
  17. "fmt"
  18. "sort"
  19. "strings"
  20. "yunion.io/x/log"
  21. "yunion.io/x/ovsdb/cli_util"
  22. "yunion.io/x/ovsdb/schema/ovn_nb"
  23. "yunion.io/x/ovsdb/types"
  24. "yunion.io/x/pkg/errors"
  25. "yunion.io/x/pkg/util/netutils"
  26. "yunion.io/x/pkg/utils"
  27. commonapis "yunion.io/x/onecloud/pkg/apis"
  28. apis "yunion.io/x/onecloud/pkg/apis/compute"
  29. "yunion.io/x/onecloud/pkg/mcclient/auth"
  30. "yunion.io/x/onecloud/pkg/util/netutils2"
  31. agentmodels "yunion.io/x/onecloud/pkg/vpcagent/models"
  32. "yunion.io/x/onecloud/pkg/vpcagent/options"
  33. "yunion.io/x/onecloud/pkg/vpcagent/ovn/mac"
  34. "yunion.io/x/onecloud/pkg/vpcagent/ovnutil"
  35. )
  36. const (
  37. externalKeyOcVersion = "oc-version"
  38. externalKeyOcRef = "oc-ref"
  39. )
  40. type OVNNorthboundKeeper struct {
  41. DB ovn_nb.OVNNorthbound
  42. cli *ovnutil.OvnNbCtl
  43. }
  44. func DumpOVNNorthbound(ctx context.Context, cli *ovnutil.OvnNbCtl) (*OVNNorthboundKeeper, error) {
  45. db := ovn_nb.OVNNorthbound{}
  46. itbls := []types.ITable{
  47. &db.LogicalSwitch,
  48. &db.LogicalSwitchPort,
  49. &db.LogicalRouter,
  50. &db.LogicalRouterPort,
  51. &db.LogicalRouterStaticRoute,
  52. &db.ACL,
  53. &db.DHCPOptions,
  54. &db.QoS,
  55. &db.DNS,
  56. }
  57. args := []string{"--format=json", "list", "<tbl>"}
  58. for _, itbl := range itbls {
  59. tbl := itbl.OvsdbTableName()
  60. args[2] = tbl
  61. res := cli.Must(ctx, "List "+tbl, args)
  62. if err := cli_util.UnmarshalJSON([]byte(res.Output), itbl); err != nil {
  63. return nil, errors.Wrapf(err, "Unmarshal %s:\n%s",
  64. itbl.OvsdbTableName(), res.Output)
  65. }
  66. }
  67. keeper := &OVNNorthboundKeeper{
  68. DB: db,
  69. cli: cli,
  70. }
  71. return keeper, nil
  72. }
  73. func ptr(s string) *string {
  74. return &s
  75. }
  76. func ovnCreateArgs(irow types.IRow, idRef string) []string {
  77. args := append([]string{
  78. "--", "--id=@" + idRef, "create", irow.OvsdbTableName(),
  79. }, irow.OvsdbCmdArgs()...)
  80. return args
  81. }
  82. func (keeper *OVNNorthboundKeeper) ClaimVpc(ctx context.Context, vpc *agentmodels.Vpc) error {
  83. var (
  84. args []string
  85. ocVersion = fmt.Sprintf("%s.%d", vpc.UpdatedAt, vpc.UpdateVersion)
  86. )
  87. vpcLr := &ovn_nb.LogicalRouter{
  88. Name: vpcLrName(vpc.Id),
  89. }
  90. irows := []types.IRow{vpcLr}
  91. var (
  92. hasDistgw = vpcHasDistgw(vpc)
  93. hasEipgw = vpcHasEipgw(vpc)
  94. )
  95. var (
  96. vpcExtLr *ovn_nb.LogicalRouter
  97. vpcExtLs *ovn_nb.LogicalSwitch
  98. vpcR1extp *ovn_nb.LogicalRouterPort
  99. vpcExtr1p *ovn_nb.LogicalSwitchPort
  100. vpcR2extp *ovn_nb.LogicalRouterPort
  101. vpcExtr2p *ovn_nb.LogicalSwitchPort
  102. vpcDefaultRoute *ovn_nb.LogicalRouterStaticRoute
  103. )
  104. if hasDistgw || hasEipgw {
  105. vpcExtLr = &ovn_nb.LogicalRouter{
  106. Name: vpcExtLrName(vpc.Id),
  107. }
  108. vpcExtLs = &ovn_nb.LogicalSwitch{
  109. Name: vpcExtLsName(vpc.Id),
  110. }
  111. vpcR1extp = &ovn_nb.LogicalRouterPort{
  112. Name: vpcR1extpName(vpc.Id),
  113. Mac: apis.VpcInterExtMac1,
  114. Networks: []string{
  115. fmt.Sprintf("%s/%d", apis.VpcInterExtIP1(), apis.VpcInterExtMask),
  116. fmt.Sprintf("%s/%d", apis.VpcInterExtIP16(), apis.VpcInterExtMask6),
  117. },
  118. }
  119. vpcExtr1p = &ovn_nb.LogicalSwitchPort{
  120. Name: vpcExtr1pName(vpc.Id),
  121. Type: "router",
  122. Addresses: []string{"router"},
  123. Options: map[string]string{
  124. "router-port": vpcR1extpName(vpc.Id),
  125. },
  126. }
  127. vpcR2extp = &ovn_nb.LogicalRouterPort{
  128. Name: vpcR2extpName(vpc.Id),
  129. Mac: apis.VpcInterExtMac2,
  130. Networks: []string{
  131. fmt.Sprintf("%s/%d", apis.VpcInterExtIP2(), apis.VpcInterExtMask),
  132. fmt.Sprintf("%s/%d", apis.VpcInterExtIP26(), apis.VpcInterExtMask6),
  133. },
  134. }
  135. vpcExtr2p = &ovn_nb.LogicalSwitchPort{
  136. Name: vpcExtr2pName(vpc.Id),
  137. Type: "router",
  138. Addresses: []string{"router"},
  139. Options: map[string]string{
  140. "router-port": vpcR2extpName(vpc.Id),
  141. },
  142. }
  143. vpcDefaultRoute = &ovn_nb.LogicalRouterStaticRoute{
  144. Policy: ptr("dst-ip"),
  145. IpPrefix: "0.0.0.0/0",
  146. Nexthop: apis.VpcInterExtIP2().String(),
  147. OutputPort: ptr(vpcR1extpName(vpc.Id)),
  148. }
  149. irows = append(irows,
  150. vpcExtLr,
  151. vpcExtLs,
  152. vpcR1extp,
  153. vpcExtr1p,
  154. vpcR2extp,
  155. vpcExtr2p,
  156. vpcDefaultRoute,
  157. )
  158. }
  159. // distgw
  160. var (
  161. vpcHostLs *ovn_nb.LogicalSwitch
  162. vpcRhp *ovn_nb.LogicalRouterPort
  163. vpcHrp *ovn_nb.LogicalSwitchPort
  164. )
  165. if hasDistgw {
  166. vpcHostLs = &ovn_nb.LogicalSwitch{
  167. Name: vpcHostLsName(vpc.Id),
  168. }
  169. vpcRhp = &ovn_nb.LogicalRouterPort{
  170. Name: vpcRhpName(vpc.Id),
  171. Mac: apis.VpcMappedGatewayMac,
  172. Networks: []string{
  173. fmt.Sprintf("%s/%d", apis.VpcMappedGatewayIP(), apis.VpcMappedIPMask),
  174. fmt.Sprintf("%s/%d", apis.VpcMappedGatewayIP6(), apis.VpcMappedIPMask6),
  175. },
  176. }
  177. vpcHrp = &ovn_nb.LogicalSwitchPort{
  178. Name: vpcHrpName(vpc.Id),
  179. Type: "router",
  180. Addresses: []string{"router"},
  181. Options: map[string]string{
  182. "router-port": vpcRhpName(vpc.Id),
  183. },
  184. }
  185. irows = append(irows,
  186. vpcHostLs,
  187. vpcRhp,
  188. vpcHrp,
  189. )
  190. }
  191. // eipgw
  192. var (
  193. vpcEipLs *ovn_nb.LogicalSwitch
  194. vpcRep *ovn_nb.LogicalRouterPort
  195. vpcErp *ovn_nb.LogicalSwitchPort
  196. )
  197. if hasEipgw {
  198. vpcEipLs = &ovn_nb.LogicalSwitch{
  199. Name: vpcEipLsName(vpc.Id),
  200. }
  201. vpcRep = &ovn_nb.LogicalRouterPort{
  202. Name: vpcRepName(vpc.Id),
  203. Mac: apis.VpcEipGatewayMac,
  204. Networks: []string{
  205. fmt.Sprintf("%s/%d", apis.VpcEipGatewayIP(), apis.VpcEipGatewayIPMask),
  206. fmt.Sprintf("%s/%d", apis.VpcEipGatewayIP6(), apis.VpcEipGatewayIPMask6),
  207. },
  208. }
  209. vpcErp = &ovn_nb.LogicalSwitchPort{
  210. Name: vpcErpName(vpc.Id),
  211. Type: "router",
  212. Addresses: []string{"router"},
  213. Options: map[string]string{
  214. "router-port": vpcRepName(vpc.Id),
  215. },
  216. }
  217. irows = append(irows,
  218. vpcEipLs,
  219. vpcRep,
  220. vpcErp,
  221. )
  222. }
  223. allFound, args := cmp(&keeper.DB, ocVersion, irows...)
  224. if allFound {
  225. return nil
  226. }
  227. args = append(args, ovnCreateArgs(vpcLr, vpcLr.Name)...)
  228. if hasDistgw || hasEipgw {
  229. args = append(args, ovnCreateArgs(vpcExtLr, vpcExtLr.Name)...)
  230. args = append(args, ovnCreateArgs(vpcExtLs, vpcExtLs.Name)...)
  231. args = append(args, ovnCreateArgs(vpcR1extp, vpcR1extp.Name)...)
  232. args = append(args, ovnCreateArgs(vpcExtr1p, vpcExtr1p.Name)...)
  233. args = append(args, ovnCreateArgs(vpcR2extp, vpcR2extp.Name)...)
  234. args = append(args, ovnCreateArgs(vpcExtr2p, vpcExtr2p.Name)...)
  235. args = append(args, ovnCreateArgs(vpcDefaultRoute, "vpcDefaultRoute")...)
  236. args = append(args, "--", "add", "Logical_Router", vpcLrName(vpc.Id), "static_routes", "@vpcDefaultRoute")
  237. args = append(args, "--", "add", "Logical_Switch", vpcExtLs.Name, "ports", "@"+vpcExtr1p.Name)
  238. args = append(args, "--", "add", "Logical_Router", vpcLr.Name, "ports", "@"+vpcR1extp.Name)
  239. args = append(args, "--", "add", "Logical_Switch", vpcExtLs.Name, "ports", "@"+vpcExtr2p.Name)
  240. args = append(args, "--", "add", "Logical_Router", vpcExtLr.Name, "ports", "@"+vpcR2extp.Name)
  241. }
  242. if hasDistgw {
  243. args = append(args, ovnCreateArgs(vpcHostLs, vpcHostLs.Name)...)
  244. args = append(args, ovnCreateArgs(vpcRhp, vpcRhp.Name)...)
  245. args = append(args, ovnCreateArgs(vpcHrp, vpcHrp.Name)...)
  246. args = append(args, "--", "add", "Logical_Switch", vpcHostLs.Name, "ports", "@"+vpcHrp.Name)
  247. args = append(args, "--", "add", "Logical_Router", vpcExtLr.Name, "ports", "@"+vpcRhp.Name)
  248. }
  249. if hasEipgw {
  250. args = append(args, ovnCreateArgs(vpcEipLs, vpcEipLs.Name)...)
  251. args = append(args, ovnCreateArgs(vpcRep, vpcRep.Name)...)
  252. args = append(args, ovnCreateArgs(vpcErp, vpcErp.Name)...)
  253. args = append(args, "--", "add", "Logical_Switch", vpcEipLs.Name, "ports", "@"+vpcErp.Name)
  254. args = append(args, "--", "add", "Logical_Router", vpcExtLr.Name, "ports", "@"+vpcRep.Name)
  255. }
  256. return keeper.cli.Must(ctx, "ClaimVpc", args)
  257. }
  258. func (keeper *OVNNorthboundKeeper) ClaimNetwork(ctx context.Context, network *agentmodels.Network, opts *options.Options) error {
  259. var (
  260. vpc = network.Vpc
  261. rpMac = mac.HashSubnetRouterPortMac(network.Id)
  262. mdMac = mac.HashSubnetMetadataMac(network.Id)
  263. // mdIp = "169.254.169.254"
  264. )
  265. netLs := &ovn_nb.LogicalSwitch{
  266. Name: netLsName(network.Id),
  267. }
  268. networks := []string{
  269. fmt.Sprintf("%s/%d", network.GuestGateway, network.GuestIpMask),
  270. }
  271. if len(network.GuestGateway6) > 0 && network.GuestIp6Mask > 0 {
  272. networks = append(networks, fmt.Sprintf("%s/%d", network.GuestGateway6, network.GuestIp6Mask))
  273. for _, ip6 := range opts.MetadataServerIp6s {
  274. networks = append(networks, fmt.Sprintf("%s/128", ip6))
  275. }
  276. }
  277. netRnp := &ovn_nb.LogicalRouterPort{
  278. Name: netRnpName(network.Id),
  279. Mac: rpMac,
  280. Networks: networks,
  281. }
  282. mtu := opts.OvnUnderlayMtu
  283. mtu -= apis.VPC_OVN_ENCAP_COST
  284. if len(network.GuestGateway6) > 0 && network.GuestIp6Mask > 0 {
  285. netRnp.Ipv6RaConfigs = map[string]string{
  286. "address_mode": "dhcpv6_stateful",
  287. "mtu": fmt.Sprintf("%d", mtu),
  288. "send_periodic": "true",
  289. }
  290. }
  291. netNrp := &ovn_nb.LogicalSwitchPort{
  292. Name: netNrpName(network.Id),
  293. Type: "router",
  294. Addresses: []string{"router"},
  295. Options: map[string]string{
  296. "router-port": netRnpName(network.Id),
  297. },
  298. }
  299. netMdpAddrs := []string{mdMac}
  300. netMdpAddrs = append(netMdpAddrs, opts.MetadataServerIp4s...)
  301. netMdpAddrs = append(netMdpAddrs, opts.MetadataServerIp6s...)
  302. netMdp := &ovn_nb.LogicalSwitchPort{
  303. Name: netMdpName(network.Id),
  304. Type: "localport",
  305. Addresses: []string{strings.Join(netMdpAddrs, " ")},
  306. }
  307. var (
  308. vpcExtBackRoute *ovn_nb.LogicalRouterStaticRoute
  309. vpcExtBackRouteIdRef string
  310. vpcExtBackRoute6 *ovn_nb.LogicalRouterStaticRoute
  311. vpcExtBackRoute6IdRef string
  312. )
  313. if len(network.GuestGateway) > 0 && network.GuestIpMask > 0 {
  314. if ipAddr, err := netutils.NewIPV4Addr(network.GuestGateway); err != nil {
  315. return errors.Wrap(err, "NewIPV4Addr GuestGateway")
  316. } else {
  317. netAddr := ipAddr.NetAddr(network.GuestIpMask)
  318. netAddrCidr := fmt.Sprintf("%s/%d", netAddr, network.GuestIpMask)
  319. ocStaticRouteRef := fmt.Sprintf("static-default-routes-%s", network.Id)
  320. vpcExtBackRoute = &ovn_nb.LogicalRouterStaticRoute{
  321. Policy: ptr("dst-ip"),
  322. IpPrefix: netAddrCidr,
  323. Nexthop: apis.VpcInterExtIP1().String(),
  324. OutputPort: ptr(vpcR2extpName(vpc.Id)),
  325. ExternalIds: map[string]string{
  326. externalKeyOcRef: ocStaticRouteRef,
  327. },
  328. }
  329. vpcExtBackRouteIdRef = "vpcExtBackRoute"
  330. }
  331. }
  332. if len(network.GuestGateway6) > 0 && network.GuestIp6Mask > 0 {
  333. if ip6Addr, err := netutils.NewIPV6Addr(network.GuestGateway6); err != nil {
  334. return errors.Wrap(err, "NewIPV6Addr GuestGateway6")
  335. } else {
  336. netAddr6 := ip6Addr.NetAddr(network.GuestIp6Mask)
  337. netAddrCidr6 := fmt.Sprintf("%s/%d", netAddr6, network.GuestIp6Mask)
  338. ocStaticRoute6Ref := fmt.Sprintf("static-default-routes6-%s", network.Id)
  339. vpcExtBackRoute6 = &ovn_nb.LogicalRouterStaticRoute{
  340. Policy: ptr("dst-ip"),
  341. IpPrefix: netAddrCidr6,
  342. Nexthop: apis.VpcInterExtIP16().String(),
  343. OutputPort: ptr(vpcR2extpName(vpc.Id)),
  344. ExternalIds: map[string]string{
  345. externalKeyOcRef: ocStaticRoute6Ref,
  346. },
  347. }
  348. vpcExtBackRoute6IdRef = "vpcExtBackRoute6"
  349. }
  350. }
  351. var (
  352. args []string
  353. ocVersion = fmt.Sprintf("%s.%d", network.UpdatedAt, network.UpdateVersion)
  354. )
  355. irows := []types.IRow{
  356. netLs,
  357. netRnp,
  358. netNrp,
  359. netMdp,
  360. }
  361. if vpcExtBackRoute != nil {
  362. irows = append(irows, vpcExtBackRoute)
  363. }
  364. if vpcExtBackRoute6 != nil {
  365. irows = append(irows, vpcExtBackRoute6)
  366. }
  367. allFound, args := cmp(&keeper.DB, ocVersion, irows...)
  368. if allFound {
  369. return nil
  370. }
  371. args = append(args, ovnCreateArgs(netLs, netLs.Name)...)
  372. args = append(args, ovnCreateArgs(netRnp, netRnp.Name)...)
  373. args = append(args, ovnCreateArgs(netNrp, netNrp.Name)...)
  374. args = append(args, ovnCreateArgs(netMdp, netMdp.Name)...)
  375. if vpcExtBackRoute != nil {
  376. args = append(args, ovnCreateArgs(vpcExtBackRoute, vpcExtBackRouteIdRef)...)
  377. }
  378. if vpcExtBackRoute6 != nil {
  379. args = append(args, ovnCreateArgs(vpcExtBackRoute6, vpcExtBackRoute6IdRef)...)
  380. }
  381. args = append(args, "--", "add", "Logical_Switch", netLs.Name, "ports", "@"+netNrp.Name, "@"+netMdp.Name)
  382. args = append(args, "--", "add", "Logical_Router", vpcLrName(vpc.Id), "ports", "@"+netRnp.Name)
  383. if vpcExtBackRoute != nil {
  384. args = append(args, "--", "add", "Logical_Router", vpcExtLrName(vpc.Id), "static_routes", "@"+vpcExtBackRouteIdRef)
  385. }
  386. if vpcExtBackRoute6 != nil {
  387. args = append(args, "--", "add", "Logical_Router", vpcExtLrName(vpc.Id), "static_routes", "@"+vpcExtBackRoute6IdRef)
  388. }
  389. return keeper.cli.Must(ctx, "ClaimNetwork", args)
  390. }
  391. func (keeper *OVNNorthboundKeeper) ClaimVpcHost(ctx context.Context, vpc *agentmodels.Vpc, host *agentmodels.Host) error {
  392. var (
  393. ocVersion = fmt.Sprintf("%s.%d", host.UpdatedAt, host.UpdateVersion)
  394. )
  395. vpcHostLsp := &ovn_nb.LogicalSwitchPort{
  396. Name: vpcHostLspName(vpc.Id, host.Id),
  397. Addresses: []string{fmt.Sprintf("%s %s %s", mac.HashVpcHostDistgwMac(host.Id), host.OvnMappedIpAddr, host.OvnMappedIp6Addr)},
  398. }
  399. if m := keeper.DB.LogicalSwitchPort.FindOneMatchNonZeros(vpcHostLsp); m != nil {
  400. m.SetExternalId(externalKeyOcVersion, ocVersion)
  401. return nil
  402. } else {
  403. args := []string{
  404. "--bare", "--columns=_uuid", "find", vpcHostLsp.OvsdbTableName(),
  405. fmt.Sprintf("name=%q", vpcHostLsp.Name),
  406. }
  407. res := keeper.cli.Must(ctx, "find vpcHostLsp", args)
  408. vpcHostLspUuid := strings.TrimSpace(res.Output)
  409. if vpcHostLspUuid != "" {
  410. return nil
  411. }
  412. }
  413. var args []string
  414. args = append(args, ovnCreateArgs(vpcHostLsp, vpcHostLsp.Name)...)
  415. args = append(args, "--", "add", "Logical_Switch", vpcHostLsName(vpc.Id), "ports", "@"+vpcHostLsp.Name)
  416. return keeper.cli.Must(ctx, "ClaimVpcHost", args)
  417. }
  418. func (keeper *OVNNorthboundKeeper) ClaimVpcEipgw(ctx context.Context, vpc *agentmodels.Vpc) error {
  419. var (
  420. ocVersion = fmt.Sprintf("%s.%d", vpc.UpdatedAt, vpc.UpdateVersion)
  421. eipgwVip = apis.VpcEipGatewayIP3().String()
  422. eipgwVip6 = apis.VpcEipGatewayIP63().String()
  423. )
  424. vpcEipLsp := &ovn_nb.LogicalSwitchPort{
  425. Name: vpcEipLspName(vpc.Id, eipgwVip),
  426. Addresses: []string{fmt.Sprintf("%s %s %s", apis.VpcEipGatewayMac3, eipgwVip, eipgwVip6)},
  427. }
  428. if m := keeper.DB.LogicalSwitchPort.FindOneMatchNonZeros(vpcEipLsp); m != nil {
  429. m.SetExternalId(externalKeyOcVersion, ocVersion)
  430. return nil
  431. } else {
  432. args := []string{
  433. "--bare", "--columns=_uuid", "find", vpcEipLsp.OvsdbTableName(),
  434. fmt.Sprintf("name=%q", vpcEipLsp.Name),
  435. }
  436. res := keeper.cli.Must(ctx, "find vpcEipLsp", args)
  437. vpcEipLspUuid := strings.TrimSpace(res.Output)
  438. if vpcEipLspUuid != "" {
  439. return nil
  440. }
  441. }
  442. var args []string
  443. args = append(args, ovnCreateArgs(vpcEipLsp, vpcEipLsp.Name)...)
  444. args = append(args, "--", "add", "Logical_Switch", vpcEipLsName(vpc.Id), "ports", "@"+vpcEipLsp.Name)
  445. return keeper.cli.Must(ctx, "ClaimVpcEipgw", args)
  446. }
  447. /*func formatNtpServers(srvs string) string {
  448. srv := make([]string, 0)
  449. for _, part := range strings.Split(srvs, ",") {
  450. part = strings.TrimSpace(part)
  451. if len(part) > 0 {
  452. if regutils.MatchIPAddr(part) {
  453. srv = append(srv, part)
  454. } else {
  455. srv = append(srv, "\""+part+"\"")
  456. }
  457. }
  458. }
  459. return strings.Join(srv, ",")
  460. }*/
  461. func generateDhcpOptions(ctx context.Context, guestnetwork *agentmodels.Guestnetwork, opts *options.Options) *ovn_nb.DHCPOptions {
  462. var (
  463. network = guestnetwork.Network
  464. dhcpMac = mac.HashSubnetDhcpMac(network.Id)
  465. mdIp = fmt.Sprintf("%s/32", opts.MetadataServerIp4s[0])
  466. ocDhcpRef = fmt.Sprintf("dhcp/%s/%s", guestnetwork.GuestId, guestnetwork.Ifname)
  467. )
  468. mtu := opts.OvnUnderlayMtu
  469. mtu -= apis.VPC_OVN_ENCAP_COST
  470. var (
  471. leaseTime = opts.DhcpLeaseTime
  472. renewTime = opts.DhcpRenewalTime
  473. rebindTime = opts.DhcpRenewalTime / 2
  474. )
  475. guestStartIp, _ := netutils.NewIPV4Addr(network.GuestIpStart)
  476. cidr := fmt.Sprintf("%s/%d", guestStartIp.NetAddr(network.GuestIpMask).String(), network.GuestIpMask)
  477. dhcpopts := &ovn_nb.DHCPOptions{
  478. Cidr: cidr,
  479. Options: map[string]string{
  480. "server_id": network.GuestGateway,
  481. "server_mac": dhcpMac,
  482. //"router": network.GuestGateway,
  483. "mtu": fmt.Sprintf("%d", mtu),
  484. "lease_time": fmt.Sprintf("%d", leaseTime),
  485. "T1": fmt.Sprintf("%d", renewTime),
  486. "T2": fmt.Sprintf("%d", rebindTime),
  487. },
  488. ExternalIds: map[string]string{
  489. externalKeyOcRef: ocDhcpRef,
  490. },
  491. }
  492. {
  493. routes := []string{}
  494. if guestnetwork.IsDefault {
  495. dhcpopts.Options["router"] = network.GuestGateway
  496. routes = append(routes,
  497. mdIp, "0.0.0.0",
  498. "0.0.0.0/0", network.GuestGateway,
  499. )
  500. } else {
  501. routes = append(routes,
  502. cidr, "0.0.0.0",
  503. )
  504. }
  505. if len(routes) > 0 {
  506. dhcpopts.Options["classless_static_route"] = fmt.Sprintf("{%s}", strings.Join(routes, ","))
  507. }
  508. }
  509. {
  510. dnsSrvs := network.GuestDns
  511. if dnsSrvs == "" {
  512. dns, err := auth.GetDNSServers(opts.Region, "")
  513. if err != nil {
  514. // ignore the error
  515. // log.Errorf("auth.GetDNSServers fail %s", err)
  516. } else {
  517. dnsSrvs = strings.Join(dns, ",")
  518. }
  519. }
  520. if dnsSrvs == "" {
  521. dnsSrvs = opts.DNSServer
  522. }
  523. dnsSrvs4List, _ := netutils2.SplitV46Addr(dnsSrvs)
  524. if len(dnsSrvs4List) > 0 {
  525. dhcpopts.Options["dns_server"] = "{" + strings.Join(dnsSrvs4List, ",") + "}"
  526. }
  527. }
  528. {
  529. dnsDomain := network.GuestDomain
  530. if dnsDomain == "" {
  531. dnsDomain = opts.DNSDomain
  532. }
  533. if len(dnsDomain) > 0 && !commonapis.IsIllegalSearchDomain(dnsDomain) {
  534. dhcpopts.Options["domain_name"] = "\"" + dnsDomain + "\""
  535. }
  536. }
  537. {
  538. ntpSrvs := ""
  539. if network.GuestNtp != "" {
  540. ntpSrvs = network.GuestNtp
  541. } else {
  542. ntp, err := auth.GetNTPServers(opts.Region, "")
  543. if err != nil {
  544. // ignore
  545. // log.Errorf("auth.GetNTPServers fail %s", err)
  546. } else {
  547. ntpSrvs = strings.Join(ntp, ",")
  548. }
  549. }
  550. ntpSrvs4List, _ := netutils2.SplitV46Addr(ntpSrvs)
  551. if len(ntpSrvs4List) > 0 {
  552. // bug on OVN, should not use ntp server: QiuJian
  553. dhcpopts.Options["ntp_server"] = "{" + strings.Join(ntpSrvs4List, ",") + "}"
  554. }
  555. }
  556. return dhcpopts
  557. }
  558. func generateDhcp6Options(ctx context.Context, guestnetwork *agentmodels.Guestnetwork, opts *options.Options) *ovn_nb.DHCPOptions {
  559. var (
  560. network = guestnetwork.Network
  561. dhcpMac = mac.HashSubnetDhcpMac(network.Id)
  562. ocDhcpRef = fmt.Sprintf("dhcp6/%s/%s", guestnetwork.GuestId, guestnetwork.Ifname)
  563. )
  564. guestStartIp6, _ := netutils.NewIPV6Addr(network.GuestIp6Start)
  565. cidr6 := fmt.Sprintf("%s/%d", guestStartIp6.NetAddr(network.GuestIp6Mask).String(), network.GuestIp6Mask)
  566. dhcpopts := &ovn_nb.DHCPOptions{
  567. Cidr: cidr6,
  568. Options: map[string]string{
  569. "server_id": dhcpMac,
  570. "dhcpv6_stateless": "false",
  571. },
  572. ExternalIds: map[string]string{
  573. externalKeyOcRef: ocDhcpRef,
  574. },
  575. }
  576. {
  577. dnsSrvs := network.GuestDns
  578. if dnsSrvs == "" {
  579. dns, err := auth.GetDNSServers(opts.Region, "")
  580. if err != nil {
  581. // ignore the error
  582. // log.Errorf("auth.GetDNSServers fail %s", err)
  583. } else {
  584. dnsSrvs = strings.Join(dns, ",")
  585. }
  586. }
  587. if dnsSrvs == "" {
  588. dnsSrvs = opts.DNSServer
  589. }
  590. _, dnsSrvs6List := netutils2.SplitV46Addr(dnsSrvs)
  591. if len(dnsSrvs6List) > 0 {
  592. dhcpopts.Options["dns_server"] = "{" + strings.Join(dnsSrvs6List, ",") + "}"
  593. }
  594. }
  595. {
  596. dnsDomain := network.GuestDomain
  597. if dnsDomain == "" {
  598. dnsDomain = opts.DNSDomain
  599. }
  600. if len(dnsDomain) > 0 && !commonapis.IsIllegalSearchDomain(dnsDomain) {
  601. dhcpopts.Options["domain_name"] = "\"" + dnsDomain + "\""
  602. }
  603. }
  604. return dhcpopts
  605. }
  606. func (keeper *OVNNorthboundKeeper) ClaimGuestnetwork(ctx context.Context, guestnetwork *agentmodels.Guestnetwork, opts *options.Options) error {
  607. var (
  608. // Callers assure that guestnetwork.Guest is not nil
  609. guest = guestnetwork.Guest
  610. network = guestnetwork.Network
  611. vpc = network.Vpc
  612. host = guest.Host
  613. eip = guestnetwork.Elasticip
  614. lportName = gnpName(guestnetwork.NetworkId, guestnetwork.Ifname)
  615. ocVersion = fmt.Sprintf("%s.%d", guestnetwork.UpdatedAt, guestnetwork.UpdateVersion)
  616. ocGnrDefaultRef = fmt.Sprintf("gnrDefault/%s/%s/%s", vpc.Id, guestnetwork.GuestId, guestnetwork.Ifname)
  617. ocAclRef = fmt.Sprintf("acl/%s/%s/%s", network.Id, guestnetwork.GuestId, guestnetwork.Ifname)
  618. ocQosRef = fmt.Sprintf("qos/%s/%s/%s", network.Id, guestnetwork.GuestId, guestnetwork.Ifname)
  619. ocQosEipRef = fmt.Sprintf("qos-eip/%s/%s/%s/v2", vpc.Id, guestnetwork.GuestId, guestnetwork.Ifname)
  620. ocGnrDefault6Ref = fmt.Sprintf("gnrDefault6/%s/%s/%s", vpc.Id, guestnetwork.GuestId, guestnetwork.Ifname)
  621. )
  622. var (
  623. subIPs = []string{guestnetwork.IpAddr}
  624. subIPms = []string{fmt.Sprintf("%s/%d", guestnetwork.IpAddr, guestnetwork.Network.GuestIpMask)}
  625. )
  626. for _, na := range guestnetwork.SubIPs {
  627. subIPs = append(subIPs, na.IpAddr)
  628. subIPms = append(subIPms, fmt.Sprintf("%s/%d", na.IpAddr, na.Network.GuestIpMask))
  629. }
  630. subIPms = append(subIPms, guestnetwork.Guest.GetVips()...)
  631. sort.Strings(subIPs[1:])
  632. sort.Strings(subIPms[1:])
  633. if len(guestnetwork.Ip6Addr) > 0 {
  634. // ipv6
  635. subIPs = append(subIPs, guestnetwork.Ip6Addr)
  636. subIPms = append(subIPms, fmt.Sprintf("%s/%d", guestnetwork.Ip6Addr, guestnetwork.Network.GuestIp6Mask), "fe80::/64")
  637. }
  638. gnp := &ovn_nb.LogicalSwitchPort{
  639. Name: lportName,
  640. Addresses: []string{fmt.Sprintf("%s %s", guestnetwork.MacAddr, strings.Join(subIPs, " "))},
  641. Options: map[string]string{},
  642. }
  643. if guest.SrcMacCheck.IsFalse() {
  644. gnp.Addresses = append(gnp.Addresses, "unknown")
  645. // empty, not nil, as match condition
  646. gnp.PortSecurity = []string{}
  647. } else if guest.SrcIpCheck.IsFalse() {
  648. gnp.PortSecurity = []string{
  649. guestnetwork.MacAddr,
  650. }
  651. } else {
  652. gnp.PortSecurity = []string{
  653. fmt.Sprintf("%s %s",
  654. guestnetwork.MacAddr,
  655. strings.Join(subIPms, " "),
  656. ),
  657. }
  658. }
  659. var (
  660. dhcpOpt = generateDhcpOptions(ctx, guestnetwork, opts)
  661. dhcpOptName = fmt.Sprintf("dhcp-opt-%s-%s", guestnetwork.GuestId, guestnetwork.Ifname)
  662. dhcp6Opt *ovn_nb.DHCPOptions
  663. dhcp6OptName string
  664. )
  665. if len(guestnetwork.Ip6Addr) > 0 {
  666. dhcp6Opt = generateDhcp6Options(ctx, guestnetwork, opts)
  667. dhcp6OptName = fmt.Sprintf("dhcp6-opt-%s-%s", guestnetwork.GuestId, guestnetwork.Ifname)
  668. }
  669. var qosVif []*ovn_nb.QoS
  670. if bwMbps := guestnetwork.BwLimit; bwMbps > 0 {
  671. var (
  672. kbps = int64(bwMbps * 1000)
  673. kbur = int64(kbps * 2)
  674. )
  675. qosVif = []*ovn_nb.QoS{
  676. {
  677. Priority: 2000,
  678. Direction: "from-lport",
  679. Match: fmt.Sprintf("inport == %q", lportName),
  680. Bandwidth: map[string]int64{
  681. "rate": kbps,
  682. "burst": kbur,
  683. },
  684. ExternalIds: map[string]string{
  685. externalKeyOcRef: ocQosRef,
  686. },
  687. },
  688. {
  689. Priority: 1000,
  690. Direction: "to-lport",
  691. Match: fmt.Sprintf("outport == %q", lportName),
  692. Bandwidth: map[string]int64{
  693. "rate": kbps,
  694. "burst": kbur,
  695. },
  696. ExternalIds: map[string]string{
  697. externalKeyOcRef: ocQosRef,
  698. },
  699. },
  700. }
  701. }
  702. var (
  703. gnrDefault *ovn_nb.LogicalRouterStaticRoute
  704. gnrDefault6 *ovn_nb.LogicalRouterStaticRoute
  705. qosEipIn *ovn_nb.QoS
  706. qosEipOut *ovn_nb.QoS
  707. hasQoSEip bool
  708. )
  709. {
  710. gnrDefaultPolicy := "src-ip"
  711. if eip != nil && vpcHasEipgw(vpc) {
  712. gnrDefault = &ovn_nb.LogicalRouterStaticRoute{
  713. Policy: &gnrDefaultPolicy,
  714. IpPrefix: guestnetwork.IpAddr + "/32",
  715. Nexthop: apis.VpcEipGatewayIP3().String(),
  716. OutputPort: ptr(vpcRepName(vpc.Id)),
  717. ExternalIds: map[string]string{
  718. externalKeyOcRef: ocGnrDefaultRef,
  719. },
  720. }
  721. if bwMbps := eip.Bandwidth; bwMbps > 0 {
  722. var (
  723. kbps = int64(bwMbps * 1000)
  724. kbur = int64(kbps * 2)
  725. eipgwVip = apis.VpcEipGatewayIP3().String()
  726. )
  727. hasQoSEip = true
  728. qosEipIn = &ovn_nb.QoS{
  729. Priority: 2000,
  730. Direction: "from-lport",
  731. Match: fmt.Sprintf("inport == %q && ip4 && ip4.dst == %s", vpcEipLspName(vpc.Id, eipgwVip), guestnetwork.IpAddr),
  732. Bandwidth: map[string]int64{
  733. "rate": kbps,
  734. "burst": kbur,
  735. },
  736. ExternalIds: map[string]string{
  737. externalKeyOcRef: ocQosEipRef,
  738. },
  739. }
  740. qosEipOut = &ovn_nb.QoS{
  741. Priority: 3000,
  742. Direction: "from-lport",
  743. Match: fmt.Sprintf("inport == %q && ip4 && ip4.src == %s", vpcErpName(vpc.Id), guestnetwork.IpAddr),
  744. Bandwidth: map[string]int64{
  745. "rate": kbps,
  746. "burst": kbur,
  747. },
  748. ExternalIds: map[string]string{
  749. externalKeyOcRef: ocQosEipRef,
  750. },
  751. }
  752. }
  753. } else if vpcHasDistgw(vpc) {
  754. if len(guestnetwork.IpAddr) > 0 {
  755. gnrDefault = &ovn_nb.LogicalRouterStaticRoute{
  756. Policy: &gnrDefaultPolicy,
  757. IpPrefix: guestnetwork.IpAddr + "/32",
  758. Nexthop: host.OvnMappedIpAddr,
  759. OutputPort: ptr(vpcRhpName(vpc.Id)),
  760. ExternalIds: map[string]string{
  761. externalKeyOcRef: ocGnrDefaultRef,
  762. },
  763. }
  764. }
  765. if len(guestnetwork.Ip6Addr) > 0 {
  766. gnrDefault6 = &ovn_nb.LogicalRouterStaticRoute{
  767. Policy: &gnrDefaultPolicy,
  768. IpPrefix: guestnetwork.Ip6Addr + "/32",
  769. Nexthop: host.OvnMappedIp6Addr,
  770. OutputPort: ptr(vpcRhpName(vpc.Id)),
  771. ExternalIds: map[string]string{
  772. externalKeyOcRef: ocGnrDefault6Ref,
  773. },
  774. }
  775. }
  776. }
  777. }
  778. var acls []*ovn_nb.ACL
  779. {
  780. enableIPv6 := false
  781. if len(guestnetwork.Ip6Addr) > 0 {
  782. enableIPv6 = true
  783. }
  784. sgrs := guestnetwork.OrderedSecurityGroupRules(guest)
  785. for _, sgr := range sgrs {
  786. // kvm not support peer secgroup
  787. acl, err := ruleToAcl(lportName, sgr, enableIPv6)
  788. if err != nil {
  789. log.Errorf("converting security group rule to acl: %v", err)
  790. break
  791. }
  792. acl.ExternalIds = map[string]string{
  793. externalKeyOcRef: ocAclRef,
  794. }
  795. acls = append(acls, acl)
  796. }
  797. }
  798. irows := []types.IRow{
  799. gnp,
  800. }
  801. if len(guestnetwork.IpAddr) > 0 {
  802. irows = append(irows, dhcpOpt)
  803. }
  804. if len(guestnetwork.Ip6Addr) > 0 {
  805. irows = append(irows, dhcp6Opt)
  806. }
  807. if gnrDefault != nil {
  808. irows = append(irows, gnrDefault)
  809. }
  810. if gnrDefault6 != nil {
  811. irows = append(irows, gnrDefault6)
  812. }
  813. for _, acl := range acls {
  814. irows = append(irows, acl)
  815. }
  816. for _, qos := range qosVif {
  817. irows = append(irows, qos)
  818. }
  819. if hasQoSEip {
  820. irows = append(irows, qosEipIn, qosEipOut)
  821. }
  822. allFound, args := cmp(&keeper.DB, ocVersion, irows...)
  823. if allFound {
  824. return nil
  825. }
  826. args = append(args, ovnCreateArgs(gnp, gnp.Name)...)
  827. args = append(args, ovnCreateArgs(dhcpOpt, dhcpOptName)...)
  828. args = append(args, "--", "add", "Logical_Switch_Port", gnp.Name, "dhcpv4_options", "@"+dhcpOptName)
  829. if len(guestnetwork.Ip6Addr) > 0 {
  830. args = append(args, ovnCreateArgs(dhcp6Opt, dhcp6OptName)...)
  831. args = append(args, "--", "add", "Logical_Switch_Port", gnp.Name, "dhcpv6_options", "@"+dhcp6OptName)
  832. }
  833. args = append(args, "--", "add", "Logical_Switch", netLsName(guestnetwork.NetworkId), "ports", "@"+gnp.Name)
  834. if gnrDefault != nil {
  835. args = append(args, ovnCreateArgs(gnrDefault, "gnrDefault")...)
  836. args = append(args, "--", "add", "Logical_Router", vpcExtLrName(vpc.Id), "static_routes", "@gnrDefault")
  837. }
  838. if gnrDefault6 != nil {
  839. args = append(args, ovnCreateArgs(gnrDefault6, "gnrDefault6")...)
  840. args = append(args, "--", "add", "Logical_Router", vpcExtLrName(vpc.Id), "static_routes", "@gnrDefault6")
  841. }
  842. for i, acl := range acls {
  843. ref := fmt.Sprintf("acl%d", i)
  844. args = append(args, ovnCreateArgs(acl, ref)...)
  845. args = append(args, "--", "add", "Logical_Switch", netLsName(guestnetwork.NetworkId), "acls", "@"+ref)
  846. }
  847. for i, qos := range qosVif {
  848. ref := fmt.Sprintf("qosVif%d", i)
  849. args = append(args, ovnCreateArgs(qos, ref)...)
  850. args = append(args, "--", "add", "Logical_Switch", netLsName(guestnetwork.NetworkId), "qos_rules", "@"+ref)
  851. }
  852. if hasQoSEip {
  853. args = append(args, ovnCreateArgs(qosEipIn, "qosEipIn")...)
  854. args = append(args, "--", "add", "Logical_Switch", vpcEipLsName(vpc.Id), "qos_rules", "@qosEipIn")
  855. args = append(args, ovnCreateArgs(qosEipOut, "qosEipOut")...)
  856. args = append(args, "--", "add", "Logical_Switch", vpcEipLsName(vpc.Id), "qos_rules", "@qosEipOut")
  857. }
  858. return keeper.cli.Must(ctx, "ClaimGuestnetwork", args)
  859. }
  860. func (keeper *OVNNorthboundKeeper) ClaimRoutes(ctx context.Context, vpc *agentmodels.Vpc, routes resolvedRoutes) error {
  861. var irows []types.IRow
  862. for _, route := range routes {
  863. irows = append(irows, &ovn_nb.LogicalRouterStaticRoute{
  864. Policy: ptr("dst-ip"),
  865. IpPrefix: route.Cidr,
  866. Nexthop: route.NextHop,
  867. })
  868. }
  869. ocVersion := fmt.Sprintf("%s.%d", vpc.UpdatedAt, vpc.UpdateVersion)
  870. allFound, args := cmp(&keeper.DB, ocVersion, irows...)
  871. if allFound {
  872. return nil
  873. }
  874. lrName := vpcLrName(vpc.Id)
  875. for i, irow := range irows {
  876. ref := fmt.Sprintf("r%d", i)
  877. args = append(args, ovnCreateArgs(irow, ref)...)
  878. args = append(args, "--", "add", "Logical_Router", lrName, "static_routes", "@"+ref)
  879. }
  880. if len(args) > 0 {
  881. return keeper.cli.Must(ctx, "ClaimGuestnetwork", args)
  882. }
  883. return nil
  884. }
  885. func (keeper *OVNNorthboundKeeper) ClaimLoadbalancerNetwork(ctx context.Context, loadbalancerNetwork *agentmodels.LoadbalancerNetwork) error {
  886. var (
  887. // Callers assure that loadbalancerNetwork.Network is not nil
  888. network = loadbalancerNetwork.Network
  889. vpc = network.Vpc
  890. lbIntIp = loadbalancerNetwork.IpAddr
  891. lbIntIpMask = network.GuestIpMask
  892. lbIntMacAddr = loadbalancerNetwork.MacAddr
  893. lbId = loadbalancerNetwork.LoadbalancerId
  894. lbUpdVer = loadbalancerNetwork.UpdateVersion
  895. lbUpdAt = loadbalancerNetwork.UpdatedAt
  896. networkId = network.Id
  897. vpcId = vpc.Id
  898. vpcHasEipgw = vpcHasEipgw(vpc)
  899. eip = loadbalancerNetwork.Elasticip
  900. lportName = lbpName(lbId)
  901. ocVersion = fmt.Sprintf("%s.%d", lbUpdAt, lbUpdVer)
  902. ocLnrDefaultRef = fmt.Sprintf("lnrDefault/%s/%s", vpcId, lbId)
  903. ocQosEipRef = fmt.Sprintf("qos-eip/%s/%s/v2", vpcId, lbId)
  904. )
  905. lbp := &ovn_nb.LogicalSwitchPort{
  906. Name: lportName,
  907. Addresses: []string{fmt.Sprintf("%s %s", lbIntMacAddr, lbIntIp)},
  908. PortSecurity: []string{fmt.Sprintf("%s %s/%d", lbIntMacAddr, lbIntIp, lbIntIpMask)},
  909. }
  910. var (
  911. lnrDefault *ovn_nb.LogicalRouterStaticRoute
  912. qosEipIn *ovn_nb.QoS
  913. qosEipOut *ovn_nb.QoS
  914. hasQoSEip bool
  915. )
  916. if eip != nil && vpcHasEipgw {
  917. lnrDefault = &ovn_nb.LogicalRouterStaticRoute{
  918. Policy: ptr("src-ip"),
  919. IpPrefix: lbIntIp + "/32",
  920. Nexthop: apis.VpcEipGatewayIP3().String(),
  921. OutputPort: ptr(vpcRepName(vpcId)),
  922. ExternalIds: map[string]string{
  923. externalKeyOcRef: ocLnrDefaultRef,
  924. },
  925. }
  926. if bwMbps := eip.Bandwidth; bwMbps > 0 {
  927. var (
  928. kbps = int64(bwMbps * 1000)
  929. kbur = int64(kbps * 2)
  930. eipgwVip = apis.VpcEipGatewayIP3().String()
  931. )
  932. hasQoSEip = true
  933. qosEipIn = &ovn_nb.QoS{
  934. Priority: 2000,
  935. Direction: "from-lport",
  936. Match: fmt.Sprintf("inport == %q && ip4 && ip4.dst == %s", vpcEipLspName(vpcId, eipgwVip), lbIntIp),
  937. Bandwidth: map[string]int64{
  938. "rate": kbps,
  939. "burst": kbur,
  940. },
  941. ExternalIds: map[string]string{
  942. externalKeyOcRef: ocQosEipRef,
  943. },
  944. }
  945. qosEipOut = &ovn_nb.QoS{
  946. Priority: 3000,
  947. Direction: "from-lport",
  948. Match: fmt.Sprintf("inport == %q", lportName),
  949. Bandwidth: map[string]int64{
  950. "rate": kbps,
  951. "burst": kbur,
  952. },
  953. ExternalIds: map[string]string{
  954. externalKeyOcRef: ocQosEipRef,
  955. },
  956. }
  957. }
  958. }
  959. var acls []*ovn_nb.ACL
  960. {
  961. lblisteners := loadbalancerNetwork.OrderedLoadbalancerListeners()
  962. for _, lblistener := range lblisteners {
  963. acls0, err := lblistenerToAcls(lportName, lblistener)
  964. if err != nil {
  965. log.Errorf("converting acl for listener %s(%s): %v",
  966. lblistener.Name, lblistener.Id, err,
  967. )
  968. continue
  969. }
  970. acls = append(acls, acls0...)
  971. }
  972. }
  973. irows := []types.IRow{
  974. lbp,
  975. }
  976. if lnrDefault != nil {
  977. irows = append(irows, lnrDefault)
  978. }
  979. if hasQoSEip {
  980. irows = append(irows, qosEipIn, qosEipOut)
  981. }
  982. for _, acl := range acls {
  983. irows = append(irows, acl)
  984. }
  985. allFound, args := cmp(&keeper.DB, ocVersion, irows...)
  986. if allFound {
  987. return nil
  988. }
  989. args = append(args, ovnCreateArgs(lbp, lbp.Name)...)
  990. args = append(args, "--", "add", "Logical_Switch", netLsName(networkId), "ports", "@"+lbp.Name)
  991. if lnrDefault != nil {
  992. args = append(args, ovnCreateArgs(lnrDefault, "lnrDefault")...)
  993. args = append(args, "--", "add", "Logical_Router", vpcExtLrName(vpcId), "static_routes", "@lnrDefault")
  994. }
  995. if hasQoSEip {
  996. args = append(args, ovnCreateArgs(qosEipIn, "qosEipIn")...)
  997. args = append(args, "--", "add", "Logical_Switch", vpcEipLsName(vpcId), "qos_rules", "@qosEipIn")
  998. args = append(args, ovnCreateArgs(qosEipOut, "qosEipOut")...)
  999. args = append(args, "--", "add", "Logical_Switch", netLsName(networkId), "qos_rules", "@qosEipOut")
  1000. }
  1001. for i, acl := range acls {
  1002. ref := fmt.Sprintf("acl%d", i)
  1003. args = append(args, ovnCreateArgs(acl, ref)...)
  1004. args = append(args, "--", "add", "Logical_Switch", netLsName(networkId), "acls", "@"+ref)
  1005. }
  1006. return keeper.cli.Must(ctx, "ClaimLoadbalancerNetwork", args)
  1007. }
  1008. func (keeper *OVNNorthboundKeeper) ClaimVpcGuestDnsRecords(ctx context.Context, vpc *agentmodels.Vpc) error {
  1009. var (
  1010. grs = map[string][]string{}
  1011. has = map[string]struct{}{}
  1012. )
  1013. for _, network := range vpc.Networks {
  1014. hasValid := false
  1015. for _, guestnetwork := range network.Guestnetworks {
  1016. if guest := guestnetwork.Guest; guest != nil {
  1017. var (
  1018. name = guest.Hostname
  1019. ip = guestnetwork.IpAddr
  1020. )
  1021. grs[name] = append(grs[name], ip)
  1022. if !hasValid {
  1023. hasValid = true
  1024. }
  1025. }
  1026. }
  1027. if hasValid {
  1028. has[network.Id] = struct{}{}
  1029. }
  1030. }
  1031. if len(has) > 0 {
  1032. var (
  1033. grs_ = map[string]string{}
  1034. ocVersion = fmt.Sprintf("%s.%d", vpc.Id, vpc.UpdateVersion)
  1035. )
  1036. for name, addrs := range grs {
  1037. sort.Strings(addrs)
  1038. grs_[name] = strings.Join(addrs, " ")
  1039. }
  1040. dns := &ovn_nb.DNS{
  1041. Records: grs_,
  1042. }
  1043. allFound, args := cmp(&keeper.DB, ocVersion, dns)
  1044. if allFound {
  1045. return nil
  1046. }
  1047. args = append(args, ovnCreateArgs(dns, "dns")...)
  1048. for networkId := range has {
  1049. args = append(args, "--", "add", "Logical_Switch", netLsName(networkId), "dns_records", "@dns")
  1050. }
  1051. return keeper.cli.Must(ctx, "ClaimVpcGuestDnsRecords", args)
  1052. }
  1053. return nil
  1054. }
  1055. func (keeper *OVNNorthboundKeeper) ClaimDnsRecords(ctx context.Context, vpcs agentmodels.Vpcs, dnsrecords agentmodels.DnsRecords) error {
  1056. var (
  1057. names = map[string][]string{}
  1058. )
  1059. for _, dnsrecord := range dnsrecords {
  1060. if !dnsrecord.Enabled.Bool() {
  1061. continue
  1062. }
  1063. name := fmt.Sprintf("%s.%s", dnsrecord.Name, dnsrecord.DnsZone.Name)
  1064. if utils.IsInStringArray(dnsrecord.DnsType, []string{"A", "AAAA"}) {
  1065. names[name] = append(names[name], dnsrecord.DnsValue)
  1066. }
  1067. }
  1068. if len(names) == 0 {
  1069. return nil
  1070. }
  1071. var (
  1072. has = map[string]struct{}{}
  1073. )
  1074. for _, vpc := range vpcs {
  1075. if vpc.Id == apis.DEFAULT_VPC_ID {
  1076. continue
  1077. }
  1078. for _, network := range vpc.Networks {
  1079. if len(network.Guestnetworks) > 0 {
  1080. has[network.Id] = struct{}{}
  1081. }
  1082. }
  1083. }
  1084. if len(has) == 0 {
  1085. return nil
  1086. }
  1087. var (
  1088. names_ = map[string]string{}
  1089. ocVersion = "dnsrecords"
  1090. )
  1091. for name, addrs := range names {
  1092. names_[name] = strings.Join(addrs, " ")
  1093. }
  1094. dns := &ovn_nb.DNS{
  1095. Records: names_,
  1096. }
  1097. allFound, args := cmp(&keeper.DB, ocVersion, dns)
  1098. if allFound {
  1099. return nil
  1100. }
  1101. args = append(args, ovnCreateArgs(dns, "dns")...)
  1102. for networkId := range has {
  1103. args = append(args, "--", "add", "Logical_Switch", netLsName(networkId), "dns_records", "@dns")
  1104. }
  1105. return keeper.cli.Must(ctx, "ClaimDnsRecords", args)
  1106. }
  1107. func (keeper *OVNNorthboundKeeper) ClaimGroupnetwork(ctx context.Context, groupnetwork *agentmodels.Groupnetwork) error {
  1108. var (
  1109. network = groupnetwork.Network
  1110. vpc = network.Vpc
  1111. eip = groupnetwork.Elasticip
  1112. lportName = vipName(groupnetwork.NetworkId, groupnetwork.GroupId, groupnetwork.IpAddr)
  1113. ocVersion = fmt.Sprintf("vip.%s.%d", groupnetwork.UpdatedAt, groupnetwork.UpdateVersion)
  1114. ocGnrDefaultRef = fmt.Sprintf("gnrDefault-vip/%s/%s/%s", vpc.Id, groupnetwork.GroupId, groupnetwork.IpAddr)
  1115. ocAclRef = fmt.Sprintf("acl-eip/%s/%s/%s", network.Id, groupnetwork.GroupId, groupnetwork.IpAddr)
  1116. ocQosEipRef = fmt.Sprintf("qos-eip-vip/%s/%s/%s/v2", vpc.Id, groupnetwork.GroupId, groupnetwork.IpAddr)
  1117. )
  1118. gns := groupnetwork.GetGuestNetworks()
  1119. gnsNames := make([]string, len(gns))
  1120. for i, gn := range gns {
  1121. gnsNames[i] = gnpName(gn.NetworkId, gn.Ifname)
  1122. }
  1123. sort.Strings(gnsNames)
  1124. gnp := &ovn_nb.LogicalSwitchPort{
  1125. Name: lportName,
  1126. Type: "virtual",
  1127. Options: map[string]string{
  1128. "virtual-ip": groupnetwork.IpAddr,
  1129. "virtual-parents": strings.Join(gnsNames, ","),
  1130. },
  1131. PortSecurity: []string{},
  1132. }
  1133. var (
  1134. gnrDefault *ovn_nb.LogicalRouterStaticRoute
  1135. qosEipIn *ovn_nb.QoS
  1136. qosEipOut *ovn_nb.QoS
  1137. hasQoSEip bool
  1138. )
  1139. {
  1140. gnrDefaultPolicy := "src-ip"
  1141. if eip != nil && vpcHasEipgw(vpc) {
  1142. log.Infof("groupnetwork %s has eip %s", groupnetwork.IpAddr, eip.IpAddr)
  1143. gnrDefault = &ovn_nb.LogicalRouterStaticRoute{
  1144. Policy: &gnrDefaultPolicy,
  1145. IpPrefix: groupnetwork.IpAddr + "/32",
  1146. Nexthop: apis.VpcEipGatewayIP3().String(),
  1147. OutputPort: ptr(vpcRepName(vpc.Id)),
  1148. ExternalIds: map[string]string{
  1149. externalKeyOcRef: ocGnrDefaultRef,
  1150. },
  1151. }
  1152. if bwMbps := eip.Bandwidth; bwMbps > 0 {
  1153. var (
  1154. kbps = int64(bwMbps * 1000)
  1155. kbur = int64(kbps * 2)
  1156. eipgwVip = apis.VpcEipGatewayIP3().String()
  1157. )
  1158. hasQoSEip = true
  1159. qosEipIn = &ovn_nb.QoS{
  1160. Priority: 2000,
  1161. Direction: "from-lport",
  1162. Match: fmt.Sprintf("inport == %q && ip4 && ip4.dst == %s", vpcEipLspName(vpc.Id, eipgwVip), groupnetwork.IpAddr),
  1163. Bandwidth: map[string]int64{
  1164. "rate": kbps,
  1165. "burst": kbur,
  1166. },
  1167. ExternalIds: map[string]string{
  1168. externalKeyOcRef: ocQosEipRef,
  1169. },
  1170. }
  1171. qosEipOut = &ovn_nb.QoS{
  1172. Priority: 3000,
  1173. Direction: "from-lport",
  1174. Match: fmt.Sprintf("inport == %q && ip4 && ip4.src == %s", vpcErpName(vpc.Id), groupnetwork.IpAddr),
  1175. Bandwidth: map[string]int64{
  1176. "rate": kbps,
  1177. "burst": kbur,
  1178. },
  1179. ExternalIds: map[string]string{
  1180. externalKeyOcRef: ocQosEipRef,
  1181. },
  1182. }
  1183. }
  1184. }
  1185. }
  1186. var acl *ovn_nb.ACL
  1187. {
  1188. acl = &ovn_nb.ACL{
  1189. Priority: 1,
  1190. Direction: aclDirToLport,
  1191. Match: fmt.Sprintf(`is_chassis_resident("%s") && ip4`, gnp.Name),
  1192. Action: "allow-related",
  1193. ExternalIds: map[string]string{
  1194. externalKeyOcRef: ocAclRef,
  1195. },
  1196. }
  1197. }
  1198. irows := []types.IRow{
  1199. gnp,
  1200. acl,
  1201. }
  1202. if gnrDefault != nil {
  1203. irows = append(irows, gnrDefault)
  1204. }
  1205. if hasQoSEip {
  1206. irows = append(irows, qosEipIn, qosEipOut)
  1207. }
  1208. allFound, args := cmp(&keeper.DB, ocVersion, irows...)
  1209. if allFound {
  1210. return nil
  1211. }
  1212. args = append(args, ovnCreateArgs(gnp, gnp.Name)...)
  1213. args = append(args, "--", "add", "Logical_Switch", netLsName(groupnetwork.NetworkId), "ports", "@"+gnp.Name)
  1214. aclRef := "vipacl"
  1215. args = append(args, ovnCreateArgs(acl, aclRef)...)
  1216. args = append(args, "--", "add", "Logical_Switch", netLsName(groupnetwork.NetworkId), "acls", "@"+aclRef)
  1217. if gnrDefault != nil {
  1218. args = append(args, ovnCreateArgs(gnrDefault, "vipGnrDefault")...)
  1219. args = append(args, "--", "add", "Logical_Router", vpcExtLrName(vpc.Id), "static_routes", "@vipGnrDefault")
  1220. }
  1221. if hasQoSEip {
  1222. args = append(args, ovnCreateArgs(qosEipIn, "vipQosEipIn")...)
  1223. args = append(args, "--", "add", "Logical_Switch", vpcEipLsName(vpc.Id), "qos_rules", "@vipQosEipIn")
  1224. args = append(args, ovnCreateArgs(qosEipOut, "vipQosEipOut")...)
  1225. args = append(args, "--", "add", "Logical_Switch", vpcEipLsName(vpc.Id), "qos_rules", "@vipQosEipOut")
  1226. }
  1227. return keeper.cli.Must(ctx, "ClaimGroupnetworks", args)
  1228. }
  1229. func (keeper *OVNNorthboundKeeper) Mark(ctx context.Context) {
  1230. db := &keeper.DB
  1231. itbls := []types.ITable{
  1232. &db.LogicalSwitch,
  1233. &db.LogicalSwitchPort,
  1234. &db.LogicalRouter,
  1235. &db.LogicalRouterPort,
  1236. &db.LogicalRouterStaticRoute,
  1237. &db.ACL,
  1238. &db.DHCPOptions,
  1239. &db.QoS,
  1240. &db.DNS,
  1241. }
  1242. for _, itbl := range itbls {
  1243. for _, irow := range itbl.Rows() {
  1244. irow.RemoveExternalId(externalKeyOcVersion)
  1245. }
  1246. }
  1247. }
  1248. func (keeper *OVNNorthboundKeeper) Sweep(ctx context.Context) error {
  1249. db := &keeper.DB
  1250. // isRoot=false tables at the end
  1251. itbls := []types.ITable{
  1252. &db.LogicalSwitchPort,
  1253. &db.LogicalRouterPort,
  1254. &db.LogicalSwitch,
  1255. &db.LogicalRouter,
  1256. &db.DHCPOptions,
  1257. &db.DNS,
  1258. }
  1259. var irows []types.IRow
  1260. for _, itbl := range itbls {
  1261. for _, irow := range itbl.Rows() {
  1262. _, ok := irow.GetExternalId(externalKeyOcVersion)
  1263. if !ok {
  1264. irows = append(irows, irow)
  1265. }
  1266. }
  1267. }
  1268. args := ovnutil.OvnNbctlArgsDestroy(irows)
  1269. if len(args) > 0 {
  1270. keeper.cli.Must(ctx, "Sweep", args)
  1271. }
  1272. {
  1273. var args []string
  1274. for _, irow := range db.LogicalRouterStaticRoute.Rows() {
  1275. _, ok := irow.GetExternalId(externalKeyOcVersion)
  1276. if !ok {
  1277. for _, lr := range db.LogicalRouter.FindLogicalRouterStaticRouteReferrer_static_routes(irow.OvsdbUuid()) {
  1278. args = append(args, "--", "--if-exists", "remove", "Logical_Router", lr.Name, "static_routes", irow.OvsdbUuid())
  1279. }
  1280. }
  1281. }
  1282. if len(args) > 0 {
  1283. keeper.cli.Must(ctx, "Sweep static routes", args)
  1284. }
  1285. }
  1286. {
  1287. var args []string
  1288. for _, irow := range db.ACL.Rows() {
  1289. _, ok := irow.GetExternalId(externalKeyOcVersion)
  1290. if !ok {
  1291. for _, ls := range db.LogicalSwitch.FindACLReferrer_acls(irow.OvsdbUuid()) {
  1292. args = append(args, "--", "--if-exists", "remove", "Logical_Switch", ls.Name, "acls", irow.OvsdbUuid())
  1293. }
  1294. }
  1295. }
  1296. if len(args) > 0 {
  1297. keeper.cli.Must(ctx, "Sweep acls", args)
  1298. }
  1299. }
  1300. { // remove unused QoS rows
  1301. var args []string
  1302. for _, irow := range db.QoS.Rows() {
  1303. _, ok := irow.GetExternalId(externalKeyOcVersion)
  1304. if !ok {
  1305. for _, ls := range db.LogicalSwitch.FindQoSReferrer_qos_rules(irow.OvsdbUuid()) {
  1306. args = append(args, "--", "--if-exists", "remove", "Logical_Switch", ls.Name, "qos_rules", irow.OvsdbUuid())
  1307. }
  1308. }
  1309. }
  1310. if len(args) > 0 {
  1311. keeper.cli.Must(ctx, "Sweep qos", args)
  1312. }
  1313. }
  1314. return nil
  1315. }