Skip to content

Commit d5175c1

Browse files
Merge pull request #18049 from danwinship/egress-ip-setup-fix
Automatic merge from submit-queue (batch tested with PRs 18117, 18049). Make sure oc.tunMAC gets set even if AlreadySetUp() Noticed while trying to fix rhbz 1527642: oc.tunMAC currently only gets set from SetupOVS(), so if you restart OpenShift and SDN setup gets skipped, then tunMAC will be unset, and so new auto-egress-ip rules will fail. The switch from using netlink to use ovs-vsctl to fetch the MAC is because an earlier version of the patch broke the hack in ovscontroller_test.go that manually sets tunMAC, and made it so that SetupOVS would always have to read tunMAC from tun0. But calling netlink wouldn't work from ovscontroller_test, so I rewrote it to use ovs-vsctl to get the MAC instead, since that was mockable. But then I ended up rewriting things so that it was possible for ovscontroller_test to still just manually override it anyway. But I liked the ovs-vsctl-rather-than-netlink approach because it makes ovsController more self-contained and mock-able so I kept it.
2 parents 0201b09 + f40ccbc commit d5175c1

File tree

1 file changed

+18
-9
lines changed

1 file changed

+18
-9
lines changed

pkg/network/node/ovscontroller.go

+18-9
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,6 @@ import (
1818

1919
"k8s.io/apimachinery/pkg/util/sets"
2020
kapi "k8s.io/kubernetes/pkg/apis/core"
21-
22-
"github.com/vishvananda/netlink"
2321
)
2422

2523
type ovsController struct {
@@ -87,13 +85,6 @@ func (oc *ovsController) SetupOVS(clusterNetworkCIDR []string, serviceNetworkCID
8785
if err != nil {
8886
return err
8987
}
90-
if oc.tunMAC == "" {
91-
link, err := netlink.LinkByName(Tun0)
92-
if err != nil {
93-
return err
94-
}
95-
oc.tunMAC = link.Attrs().HardwareAddr.String()
96-
}
9788

9889
otx := oc.ovs.NewTransaction()
9990

@@ -675,6 +666,21 @@ func (oc *ovsController) FindUnusedVNIDs() []int {
675666
return policyVNIDs.Difference(inUseVNIDs).UnsortedList()
676667
}
677668

669+
func (oc *ovsController) ensureTunMAC() error {
670+
if oc.tunMAC != "" {
671+
return nil
672+
}
673+
674+
val, err := oc.ovs.Get("Interface", Tun0, "mac_in_use")
675+
if err != nil {
676+
return fmt.Errorf("could not get %s MAC address: %v", Tun0, err)
677+
} else if len(val) != 19 || val[0] != '"' || val[18] != '"' {
678+
return fmt.Errorf("bad MAC address for %s: %q", Tun0, val)
679+
}
680+
oc.tunMAC = val[1:18]
681+
return nil
682+
}
683+
678684
func (oc *ovsController) UpdateNamespaceEgressRules(vnid uint32, nodeIP, egressHex string) error {
679685
otx := oc.ovs.NewTransaction()
680686
otx.DeleteFlows("table=100, reg0=%d", vnid)
@@ -686,6 +692,9 @@ func (oc *ovsController) UpdateNamespaceEgressRules(vnid uint32, nodeIP, egressH
686692
otx.AddFlow("table=100, priority=100, reg0=%d, actions=drop", vnid)
687693
} else if nodeIP == oc.localIP {
688694
// Local Egress IP
695+
if err := oc.ensureTunMAC(); err != nil {
696+
return err
697+
}
689698
otx.AddFlow("table=100, priority=100, reg0=%d, ip, actions=set_field:%s->eth_dst,set_field:%s->pkt_mark,goto_table:101", vnid, oc.tunMAC, egressHex)
690699
} else {
691700
// Remote Egress IP; send via VXLAN

0 commit comments

Comments
 (0)