[sbr]: Use different tableID for every ipCfg
Check tableID not in use for every ipCfg This allows SBR plugin to accommodate for multi-ip interfaces Fixes #581 Signed-off-by: Anurag Dwivedi <anuragensemble1@gmail.com>
This commit is contained in:
parent
f34c600ea4
commit
f72aa98629
@ -176,23 +176,9 @@ func cmdAdd(args *skel.CmdArgs) error {
|
|||||||
return types.PrintResult(conf.PrevResult, conf.CNIVersion)
|
return types.PrintResult(conf.PrevResult, conf.CNIVersion)
|
||||||
}
|
}
|
||||||
|
|
||||||
// doRoutes does all the work to set up routes and rules during an add.
|
// getNextTableID picks the first free table id from a giveen candidate id
|
||||||
func doRoutes(ipCfgs []*current.IPConfig, origRoutes []*types.Route, iface string) error {
|
func getNextTableID(rules []netlink.Rule, routes []netlink.Route, candidateID int) int {
|
||||||
// Get a list of rules and routes ready.
|
table := candidateID
|
||||||
rules, err := netlink.RuleList(netlink.FAMILY_ALL)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("Failed to list all rules: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
routes, err := netlink.RouteList(nil, netlink.FAMILY_ALL)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("Failed to list all routes: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Pick a table ID to use. We pick the first table ID from firstTableID
|
|
||||||
// on that has no existing rules mapping to it and no existing routes in
|
|
||||||
// it.
|
|
||||||
table := firstTableID
|
|
||||||
for {
|
for {
|
||||||
foundExisting := false
|
foundExisting := false
|
||||||
for _, rule := range rules {
|
for _, rule := range rules {
|
||||||
@ -215,7 +201,26 @@ func doRoutes(ipCfgs []*current.IPConfig, origRoutes []*types.Route, iface strin
|
|||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
return table
|
||||||
|
}
|
||||||
|
|
||||||
|
// doRoutes does all the work to set up routes and rules during an add.
|
||||||
|
func doRoutes(ipCfgs []*current.IPConfig, origRoutes []*types.Route, iface string) error {
|
||||||
|
// Get a list of rules and routes ready.
|
||||||
|
rules, err := netlink.RuleList(netlink.FAMILY_ALL)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("Failed to list all rules: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
routes, err := netlink.RouteList(nil, netlink.FAMILY_ALL)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("Failed to list all routes: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Pick a table ID to use. We pick the first table ID from firstTableID
|
||||||
|
// on that has no existing rules mapping to it and no existing routes in
|
||||||
|
// it.
|
||||||
|
table := getNextTableID(rules, routes, firstTableID)
|
||||||
log.Printf("First unreferenced table: %d", table)
|
log.Printf("First unreferenced table: %d", table)
|
||||||
|
|
||||||
link, err := netlink.LinkByName(iface)
|
link, err := netlink.LinkByName(iface)
|
||||||
@ -287,17 +292,17 @@ func doRoutes(ipCfgs []*current.IPConfig, origRoutes []*types.Route, iface strin
|
|||||||
// to the table we want them in.
|
// to the table we want them in.
|
||||||
for _, r := range routes {
|
for _, r := range routes {
|
||||||
if ipCfg.Address.Contains(r.Src) || ipCfg.Address.Contains(r.Gw) ||
|
if ipCfg.Address.Contains(r.Src) || ipCfg.Address.Contains(r.Gw) ||
|
||||||
(r.Src == nil && r.Gw == nil) {
|
(r.Src == nil && r.Gw == nil) {
|
||||||
// (r.Src == nil && r.Gw == nil) is inferred as a generic route
|
// (r.Src == nil && r.Gw == nil) is inferred as a generic route
|
||||||
log.Printf("Copying route %s from table %d to %d",
|
log.Printf("Copying route %s from table %d to %d",
|
||||||
r.String(), r.Table, table)
|
r.String(), r.Table, table)
|
||||||
|
|
||||||
r.Table = table
|
r.Table = table
|
||||||
|
|
||||||
// Reset the route flags since if it is dynamically created,
|
// Reset the route flags since if it is dynamically created,
|
||||||
// adding it to the new table will fail with "invalid argument"
|
// adding it to the new table will fail with "invalid argument"
|
||||||
r.Flags = 0
|
r.Flags = 0
|
||||||
|
|
||||||
// We use route replace in case the route already exists, which
|
// We use route replace in case the route already exists, which
|
||||||
// is possible for the default gateway we added above.
|
// is possible for the default gateway we added above.
|
||||||
err = netlink.RouteReplace(&r)
|
err = netlink.RouteReplace(&r)
|
||||||
@ -309,8 +314,9 @@ func doRoutes(ipCfgs []*current.IPConfig, origRoutes []*types.Route, iface strin
|
|||||||
|
|
||||||
// Use a different table for each ipCfg
|
// Use a different table for each ipCfg
|
||||||
table++
|
table++
|
||||||
|
table = getNextTableID(rules, routes, table)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Delete all the interface routes in the default routing table, which were
|
// Delete all the interface routes in the default routing table, which were
|
||||||
// copied to source based routing tables.
|
// copied to source based routing tables.
|
||||||
// Not deleting them while copying to accommodate for multiple ipCfgs from
|
// Not deleting them while copying to accommodate for multiple ipCfgs from
|
||||||
|
@ -439,50 +439,50 @@ var _ = Describe("sbr test", func() {
|
|||||||
IfName: ifname,
|
IfName: ifname,
|
||||||
StdinData: []byte(conf),
|
StdinData: []byte(conf),
|
||||||
}
|
}
|
||||||
|
|
||||||
preStatus := createDefaultStatus()
|
preStatus := createDefaultStatus()
|
||||||
|
|
||||||
// Add the second IP on net1 interface
|
// Add the second IP on net1 interface
|
||||||
preStatus.Devices[1].Addrs = append(preStatus.Devices[1].Addrs,
|
preStatus.Devices[1].Addrs = append(preStatus.Devices[1].Addrs,
|
||||||
net.IPNet{
|
net.IPNet{
|
||||||
IP: net.IPv4(192, 168, 101, 209),
|
IP: net.IPv4(192, 168, 101, 209),
|
||||||
Mask: net.IPv4Mask(255, 255, 255, 0),
|
Mask: net.IPv4Mask(255, 255, 255, 0),
|
||||||
})
|
})
|
||||||
|
|
||||||
err := setup(targetNs, preStatus)
|
err := setup(targetNs, preStatus)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
oldStatus, err := readback(targetNs, []string{"net1", "eth0"})
|
oldStatus, err := readback(targetNs, []string{"net1", "eth0"})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
_, _, err = testutils.CmdAddWithArgs(args, func() error { return cmdAdd(args) })
|
_, _, err = testutils.CmdAddWithArgs(args, func() error { return cmdAdd(args) })
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
newStatus, err := readback(targetNs, []string{"net1", "eth0"})
|
newStatus, err := readback(targetNs, []string{"net1", "eth0"})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
// Check results. We expect all the routes on net1 to have moved to
|
// Check results. We expect all the routes on net1 to have moved to
|
||||||
// table 100 except for local routes (table 255); a new default gateway
|
// table 100 except for local routes (table 255); a new default gateway
|
||||||
// route to have been created; and 2 rules to exist.
|
// route to have been created; and 2 rules to exist.
|
||||||
expNet1 := oldStatus.Devices[0]
|
expNet1 := oldStatus.Devices[0]
|
||||||
expEth0 := oldStatus.Devices[1]
|
expEth0 := oldStatus.Devices[1]
|
||||||
|
|
||||||
for i := range expNet1.Routes {
|
for i := range expNet1.Routes {
|
||||||
if expNet1.Routes[i].Table != 255 {
|
if expNet1.Routes[i].Table != 255 {
|
||||||
if expNet1.Routes[i].Src.String() == "192.168.101.209" {
|
if expNet1.Routes[i].Src.String() == "192.168.101.209" {
|
||||||
// All 192.168.101.x routes expected in table 101
|
// All 192.168.101.x routes expected in table 101
|
||||||
expNet1.Routes[i].Table = 101
|
expNet1.Routes[i].Table = 101
|
||||||
} else if (expNet1.Routes[i].Src == nil && expNet1.Routes[i].Gw == nil) {
|
} else if expNet1.Routes[i].Src == nil && expNet1.Routes[i].Gw == nil {
|
||||||
// Generic Link Local Addresses assigned. They should exist in all
|
// Generic Link Local Addresses assigned. They should exist in all
|
||||||
// route tables
|
// route tables
|
||||||
expNet1.Routes[i].Table = 100
|
expNet1.Routes[i].Table = 100
|
||||||
expNet1.Routes = append(expNet1.Routes,
|
expNet1.Routes = append(expNet1.Routes,
|
||||||
netlink.Route{
|
netlink.Route{
|
||||||
Dst: expNet1.Routes[i].Dst,
|
Dst: expNet1.Routes[i].Dst,
|
||||||
Table: 101,
|
Table: 101,
|
||||||
LinkIndex: expNet1.Routes[i].LinkIndex})
|
LinkIndex: expNet1.Routes[i].LinkIndex})
|
||||||
} else {
|
} else {
|
||||||
// All 192.168.1.x routes expected in tabele 100
|
// All 192.168.1.x routes expected in table 100
|
||||||
expNet1.Routes[i].Table = 100
|
expNet1.Routes[i].Table = 100
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -492,30 +492,30 @@ var _ = Describe("sbr test", func() {
|
|||||||
Gw: net.IPv4(192, 168, 1, 1),
|
Gw: net.IPv4(192, 168, 1, 1),
|
||||||
Table: 100,
|
Table: 100,
|
||||||
LinkIndex: expNet1.Routes[0].LinkIndex})
|
LinkIndex: expNet1.Routes[0].LinkIndex})
|
||||||
|
|
||||||
expNet1.Routes = append(expNet1.Routes,
|
expNet1.Routes = append(expNet1.Routes,
|
||||||
netlink.Route{
|
netlink.Route{
|
||||||
Gw: net.IPv4(192, 168, 101, 1),
|
Gw: net.IPv4(192, 168, 101, 1),
|
||||||
Table: 101,
|
Table: 101,
|
||||||
LinkIndex: expNet1.Routes[0].LinkIndex})
|
LinkIndex: expNet1.Routes[0].LinkIndex})
|
||||||
|
|
||||||
// 2 Rules will ve created for each IP address. (100, 101)
|
// 2 Rules will be created for each IP address. (100, 101)
|
||||||
Expect(len(newStatus.Rules)).To(Equal(2))
|
Expect(len(newStatus.Rules)).To(Equal(2))
|
||||||
|
|
||||||
// First entry corresponds to last table
|
// First entry corresponds to last table
|
||||||
Expect(newStatus.Rules[0].Table).To(Equal(101))
|
Expect(newStatus.Rules[0].Table).To(Equal(101))
|
||||||
Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.101.209/32"))
|
Expect(newStatus.Rules[0].Src.String()).To(Equal("192.168.101.209/32"))
|
||||||
|
|
||||||
// Second entry corresponds to first table (100)
|
// Second entry corresponds to first table (100)
|
||||||
Expect(newStatus.Rules[1].Table).To(Equal(100))
|
Expect(newStatus.Rules[1].Table).To(Equal(100))
|
||||||
Expect(newStatus.Rules[1].Src.String()).To(Equal("192.168.1.209/32"))
|
Expect(newStatus.Rules[1].Src.String()).To(Equal("192.168.1.209/32"))
|
||||||
|
|
||||||
devNet1 := newStatus.Devices[0]
|
devNet1 := newStatus.Devices[0]
|
||||||
devEth0 := newStatus.Devices[1]
|
devEth0 := newStatus.Devices[1]
|
||||||
Expect(equalRoutes(expNet1.Routes, devNet1.Routes)).To(BeTrue())
|
Expect(equalRoutes(expNet1.Routes, devNet1.Routes)).To(BeTrue())
|
||||||
Expect(equalRoutes(expEth0.Routes, devEth0.Routes)).To(BeTrue())
|
Expect(equalRoutes(expEth0.Routes, devEth0.Routes)).To(BeTrue())
|
||||||
|
|
||||||
})
|
})
|
||||||
|
|
||||||
It("fails with CNI spec versions that don't support plugin chaining", func() {
|
It("fails with CNI spec versions that don't support plugin chaining", func() {
|
||||||
conf := `{
|
conf := `{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user