peerdb.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. package overlay
  2. import (
  3. "fmt"
  4. "net"
  5. "sync"
  6. "syscall"
  7. "github.com/Sirupsen/logrus"
  8. )
  9. const ovPeerTable = "overlay_peer_table"
  10. type peerKey struct {
  11. peerIP net.IP
  12. peerMac net.HardwareAddr
  13. }
  14. type peerEntry struct {
  15. eid string
  16. vtep net.IP
  17. peerIPMask net.IPMask
  18. inSandbox bool
  19. isLocal bool
  20. }
  21. type peerMap struct {
  22. mp map[string]peerEntry
  23. sync.Mutex
  24. }
  25. type peerNetworkMap struct {
  26. mp map[string]*peerMap
  27. sync.Mutex
  28. }
  29. func (pKey peerKey) String() string {
  30. return fmt.Sprintf("%s %s", pKey.peerIP, pKey.peerMac)
  31. }
  32. func (pKey *peerKey) Scan(state fmt.ScanState, verb rune) error {
  33. ipB, err := state.Token(true, nil)
  34. if err != nil {
  35. return err
  36. }
  37. pKey.peerIP = net.ParseIP(string(ipB))
  38. macB, err := state.Token(true, nil)
  39. if err != nil {
  40. return err
  41. }
  42. pKey.peerMac, err = net.ParseMAC(string(macB))
  43. if err != nil {
  44. return err
  45. }
  46. return nil
  47. }
  48. var peerDbWg sync.WaitGroup
  49. func (d *driver) peerDbWalk(f func(string, *peerKey, *peerEntry) bool) error {
  50. d.peerDb.Lock()
  51. nids := []string{}
  52. for nid := range d.peerDb.mp {
  53. nids = append(nids, nid)
  54. }
  55. d.peerDb.Unlock()
  56. for _, nid := range nids {
  57. d.peerDbNetworkWalk(nid, func(pKey *peerKey, pEntry *peerEntry) bool {
  58. return f(nid, pKey, pEntry)
  59. })
  60. }
  61. return nil
  62. }
  63. func (d *driver) peerDbNetworkWalk(nid string, f func(*peerKey, *peerEntry) bool) error {
  64. d.peerDb.Lock()
  65. pMap, ok := d.peerDb.mp[nid]
  66. d.peerDb.Unlock()
  67. if !ok {
  68. return nil
  69. }
  70. mp := map[string]peerEntry{}
  71. pMap.Lock()
  72. for pKeyStr, pEntry := range pMap.mp {
  73. mp[pKeyStr] = pEntry
  74. }
  75. pMap.Unlock()
  76. for pKeyStr, pEntry := range mp {
  77. var pKey peerKey
  78. if _, err := fmt.Sscan(pKeyStr, &pKey); err != nil {
  79. logrus.Warnf("Peer key scan on network %s failed: %v", nid, err)
  80. }
  81. if f(&pKey, &pEntry) {
  82. return nil
  83. }
  84. }
  85. return nil
  86. }
  87. func (d *driver) peerDbSearch(nid string, peerIP net.IP) (net.HardwareAddr, net.IPMask, net.IP, error) {
  88. var (
  89. peerMac net.HardwareAddr
  90. vtep net.IP
  91. peerIPMask net.IPMask
  92. found bool
  93. )
  94. err := d.peerDbNetworkWalk(nid, func(pKey *peerKey, pEntry *peerEntry) bool {
  95. if pKey.peerIP.Equal(peerIP) {
  96. peerMac = pKey.peerMac
  97. peerIPMask = pEntry.peerIPMask
  98. vtep = pEntry.vtep
  99. found = true
  100. return found
  101. }
  102. return found
  103. })
  104. if err != nil {
  105. return nil, nil, nil, fmt.Errorf("peerdb search for peer ip %q failed: %v", peerIP, err)
  106. }
  107. if !found {
  108. return nil, nil, nil, fmt.Errorf("peer ip %q not found in peerdb", peerIP)
  109. }
  110. return peerMac, peerIPMask, vtep, nil
  111. }
  112. func (d *driver) peerDbAdd(nid, eid string, peerIP net.IP, peerIPMask net.IPMask,
  113. peerMac net.HardwareAddr, vtep net.IP, isLocal bool) {
  114. peerDbWg.Wait()
  115. d.peerDb.Lock()
  116. pMap, ok := d.peerDb.mp[nid]
  117. if !ok {
  118. d.peerDb.mp[nid] = &peerMap{
  119. mp: make(map[string]peerEntry),
  120. }
  121. pMap = d.peerDb.mp[nid]
  122. }
  123. d.peerDb.Unlock()
  124. pKey := peerKey{
  125. peerIP: peerIP,
  126. peerMac: peerMac,
  127. }
  128. pEntry := peerEntry{
  129. eid: eid,
  130. vtep: vtep,
  131. peerIPMask: peerIPMask,
  132. isLocal: isLocal,
  133. }
  134. pMap.Lock()
  135. pMap.mp[pKey.String()] = pEntry
  136. pMap.Unlock()
  137. }
  138. func (d *driver) peerDbDelete(nid, eid string, peerIP net.IP, peerIPMask net.IPMask,
  139. peerMac net.HardwareAddr, vtep net.IP) peerEntry {
  140. peerDbWg.Wait()
  141. d.peerDb.Lock()
  142. pMap, ok := d.peerDb.mp[nid]
  143. if !ok {
  144. d.peerDb.Unlock()
  145. return peerEntry{}
  146. }
  147. d.peerDb.Unlock()
  148. pKey := peerKey{
  149. peerIP: peerIP,
  150. peerMac: peerMac,
  151. }
  152. pMap.Lock()
  153. pEntry, ok := pMap.mp[pKey.String()]
  154. if ok {
  155. // Mismatched endpoint ID(possibly outdated). Do not
  156. // delete peerdb
  157. if pEntry.eid != eid {
  158. pMap.Unlock()
  159. return pEntry
  160. }
  161. }
  162. delete(pMap.mp, pKey.String())
  163. pMap.Unlock()
  164. return pEntry
  165. }
  166. func (d *driver) peerDbUpdateSandbox(nid string) {
  167. d.peerDb.Lock()
  168. pMap, ok := d.peerDb.mp[nid]
  169. if !ok {
  170. d.peerDb.Unlock()
  171. return
  172. }
  173. d.peerDb.Unlock()
  174. peerDbWg.Add(1)
  175. var peerOps []func()
  176. pMap.Lock()
  177. for pKeyStr, pEntry := range pMap.mp {
  178. var pKey peerKey
  179. if _, err := fmt.Sscan(pKeyStr, &pKey); err != nil {
  180. fmt.Printf("peer key scan failed: %v", err)
  181. }
  182. if pEntry.isLocal {
  183. continue
  184. }
  185. // Go captures variables by reference. The pEntry could be
  186. // pointing to the same memory location for every iteration. Make
  187. // a copy of pEntry before capturing it in the following closure.
  188. entry := pEntry
  189. op := func() {
  190. if err := d.peerAdd(nid, entry.eid, pKey.peerIP, entry.peerIPMask,
  191. pKey.peerMac, entry.vtep,
  192. false, false, false); err != nil {
  193. fmt.Printf("peerdbupdate in sandbox failed for ip %s and mac %s: %v",
  194. pKey.peerIP, pKey.peerMac, err)
  195. }
  196. }
  197. peerOps = append(peerOps, op)
  198. }
  199. pMap.Unlock()
  200. for _, op := range peerOps {
  201. op()
  202. }
  203. peerDbWg.Done()
  204. }
  205. func (d *driver) peerAdd(nid, eid string, peerIP net.IP, peerIPMask net.IPMask,
  206. peerMac net.HardwareAddr, vtep net.IP, updateDb, l2Miss, l3Miss bool) error {
  207. if err := validateID(nid, eid); err != nil {
  208. return err
  209. }
  210. if updateDb {
  211. d.peerDbAdd(nid, eid, peerIP, peerIPMask, peerMac, vtep, false)
  212. }
  213. n := d.network(nid)
  214. if n == nil {
  215. return nil
  216. }
  217. sbox := n.sandbox()
  218. if sbox == nil {
  219. return nil
  220. }
  221. IP := &net.IPNet{
  222. IP: peerIP,
  223. Mask: peerIPMask,
  224. }
  225. s := n.getSubnetforIP(IP)
  226. if s == nil {
  227. return fmt.Errorf("couldn't find the subnet %q in network %q", IP.String(), n.id)
  228. }
  229. if err := n.obtainVxlanID(s); err != nil {
  230. return fmt.Errorf("couldn't get vxlan id for %q: %v", s.subnetIP.String(), err)
  231. }
  232. if err := n.joinSubnetSandbox(s, false); err != nil {
  233. return fmt.Errorf("subnet sandbox join failed for %q: %v", s.subnetIP.String(), err)
  234. }
  235. if err := d.checkEncryption(nid, vtep, n.vxlanID(s), false, true); err != nil {
  236. logrus.Warn(err)
  237. }
  238. // Add neighbor entry for the peer IP
  239. if err := sbox.AddNeighbor(peerIP, peerMac, l3Miss, sbox.NeighborOptions().LinkName(s.vxlanName)); err != nil {
  240. return fmt.Errorf("could not add neighbor entry into the sandbox: %v", err)
  241. }
  242. // Add fdb entry to the bridge for the peer mac
  243. if err := sbox.AddNeighbor(vtep, peerMac, l2Miss, sbox.NeighborOptions().LinkName(s.vxlanName),
  244. sbox.NeighborOptions().Family(syscall.AF_BRIDGE)); err != nil {
  245. return fmt.Errorf("could not add fdb entry into the sandbox: %v", err)
  246. }
  247. return nil
  248. }
  249. func (d *driver) peerDelete(nid, eid string, peerIP net.IP, peerIPMask net.IPMask,
  250. peerMac net.HardwareAddr, vtep net.IP, updateDb bool) error {
  251. if err := validateID(nid, eid); err != nil {
  252. return err
  253. }
  254. var pEntry peerEntry
  255. if updateDb {
  256. pEntry = d.peerDbDelete(nid, eid, peerIP, peerIPMask, peerMac, vtep)
  257. }
  258. n := d.network(nid)
  259. if n == nil {
  260. return nil
  261. }
  262. sbox := n.sandbox()
  263. if sbox == nil {
  264. return nil
  265. }
  266. // Delete fdb entry to the bridge for the peer mac only if the
  267. // entry existed in local peerdb. If it is a stale delete
  268. // request, still call DeleteNeighbor but only to cleanup any
  269. // leftover sandbox neighbor cache and not actually delete the
  270. // kernel state.
  271. if (eid == pEntry.eid && vtep.Equal(pEntry.vtep)) ||
  272. (eid != pEntry.eid && !vtep.Equal(pEntry.vtep)) {
  273. if err := sbox.DeleteNeighbor(vtep, peerMac,
  274. eid == pEntry.eid && vtep.Equal(pEntry.vtep)); err != nil {
  275. return fmt.Errorf("could not delete fdb entry into the sandbox: %v", err)
  276. }
  277. }
  278. // Delete neighbor entry for the peer IP
  279. if eid == pEntry.eid {
  280. if err := sbox.DeleteNeighbor(peerIP, peerMac, true); err != nil {
  281. return fmt.Errorf("could not delete neighbor entry into the sandbox: %v", err)
  282. }
  283. }
  284. if err := d.checkEncryption(nid, vtep, 0, false, false); err != nil {
  285. logrus.Warn(err)
  286. }
  287. return nil
  288. }
  289. func (d *driver) pushLocalDb() {
  290. d.peerDbWalk(func(nid string, pKey *peerKey, pEntry *peerEntry) bool {
  291. if pEntry.isLocal {
  292. d.pushLocalEndpointEvent("join", nid, pEntry.eid)
  293. }
  294. return false
  295. })
  296. }
  297. func (d *driver) peerDBUpdateSelf() {
  298. d.peerDbWalk(func(nid string, pkey *peerKey, pEntry *peerEntry) bool {
  299. if pEntry.isLocal {
  300. pEntry.vtep = net.ParseIP(d.advertiseAddress)
  301. }
  302. return false
  303. })
  304. }