// SVCDeleteBySHA256Sum deletes the frontend from the local bpf map by its SHA256Sum. func (d *Daemon) SVCDeleteBySHA256Sum(feL3n4SHA256Sum string) error { d.loadBalancer.BPFMapMU.Lock() defer d.loadBalancer.BPFMapMU.Unlock() svc, ok := d.loadBalancer.SVCMap[feL3n4SHA256Sum] if !ok { return nil } feL3n4 := svc.FE var svcKey lbmap.ServiceKey if !feL3n4.IsIPv6() { svcKey = lbmap.NewService4Key(feL3n4.IP, feL3n4.Port, 0) } else { svcKey = lbmap.NewService6Key(feL3n4.IP, feL3n4.Port, 0) } svcKey.SetBackend(0) err := lbmap.DeleteService(svcKey) // TODO should we delete even if err is != nil? if err == nil { delete(d.loadBalancer.SVCMap, feL3n4SHA256Sum) } return err }
// SVCDelete deletes the frontend from the local bpf map. func (d *Daemon) SVCDelete(feL3n4 types.L3n4Addr) error { feL3n4Uniq, err := feL3n4.SHA256Sum() if err != nil { return err } var svcKey lbmap.ServiceKey if !feL3n4.IsIPv6() { svcKey = lbmap.NewService4Key(feL3n4.IP, feL3n4.Port, 0) } else { svcKey = lbmap.NewService6Key(feL3n4.IP, feL3n4.Port, 0) } svcKey.SetBackend(0) d.loadBalancer.BPFMapMU.Lock() defer d.loadBalancer.BPFMapMU.Unlock() err = lbmap.DeleteService(svcKey) // TODO should we delete even if err is != nil? if err == nil { delete(d.loadBalancer.SVCMap, feL3n4Uniq) } return err }
func (cli *LBClient) SVCDelete(feL3n4 types.L3n4Addr) error { return lbmap.DeleteService(lbmap.L3n4Addr2ServiceKey(feL3n4)) }
// SyncLBMap syncs the bpf lbmap with the daemon's lb map. All bpf entries will overwrite // the daemon's LB map. If the bpf lbmap entry have a different service ID than the // KVStore's ID, that entry will be updated on the bpf map accordingly with the new ID // retrieved from the KVStore. func (d *Daemon) SyncLBMap() error { d.loadBalancer.BPFMapMU.Lock() defer d.loadBalancer.BPFMapMU.Unlock() newSVCMap := types.SVCMap{} newRevNATMap := types.RevNATMap{} failedSyncSVC := []types.LBSVC{} failedSyncRevNAT := map[types.ServiceID]types.L3n4Addr{} parseSVCEntries := func(key bpf.MapKey, value bpf.MapValue) { svcKey := key.(lbmap.ServiceKey) //It's the frontend service so we don't add this one if svcKey.GetBackend() == 0 { return } svcValue := value.(lbmap.ServiceValue) fe, be, err := lbmap.ServiceKeynValue2FEnBE(svcKey, svcValue) if err != nil { log.Errorf("%s", err) return } if err := newSVCMap.AddFEnBE(fe, be, svcKey.GetBackend()); err != nil { log.Errorf("%s", err) return } } parseRevNATEntries := func(key bpf.MapKey, value bpf.MapValue) { revNatK := key.(lbmap.RevNatKey) revNatV := value.(lbmap.RevNatValue) fe, err := lbmap.RevNatValue2L3n4AddrID(revNatK, revNatV) if err != nil { log.Errorf("%s", err) return } newRevNATMap[fe.ID] = fe.L3n4Addr } addSVC2BPFMap := func(oldID types.ServiceID, svc types.LBSVC) error { // check if the reverser nat is present on the bpf map and update the // reverse nat key and delete the old one. revNAT, ok := newRevNATMap[oldID] if ok { revNATK, revNATV := lbmap.L3n4Addr2RevNatKeynValue(svc.FE.ID, revNAT) err := lbmap.UpdateRevNat(revNATK, revNATV) if err != nil { return fmt.Errorf("Unable to add revNAT: %s: %s."+ " This entry will be removed from the bpf's LB map.", revNAT.String(), err) } // Remove the old entry from the bpf map. revNATK, _ = lbmap.L3n4Addr2RevNatKeynValue(oldID, revNAT) if err := lbmap.DeleteRevNat(revNATK); err != nil { log.Warningf("Unable to remove old rev NAT entry with ID %d: %s", oldID, err) } delete(newRevNATMap, oldID) newRevNATMap[svc.FE.ID] = revNAT } fe, besValues, err := lbmap.LBSVC2ServiceKeynValue(svc) if err != nil { return fmt.Errorf("Unable to create a BPF key and values for service FE: %s and backends: %+v. Error: %s."+ " This entry will be removed from the bpf's LB map.", svc.FE.String(), svc.BES, err) } err = d.addSVC2BPFMap(svc.FE, fe, besValues, false) if err != nil { return fmt.Errorf("Unable to add service FE: %s: %s."+ " This entry will be removed from the bpf's LB map.", svc.FE.String(), err) } return nil } if d.conf.IPv4Enabled { lbmap.Service4Map.Dump(lbmap.Service4DumpParser, parseSVCEntries) lbmap.RevNat4Map.Dump(lbmap.RevNat4DumpParser, parseRevNATEntries) } lbmap.Service6Map.Dump(lbmap.Service6DumpParser, parseSVCEntries) lbmap.RevNat6Map.Dump(lbmap.RevNat6DumpParser, parseRevNATEntries) // Let's check if the services read from the lbmap have the same ID set in the // KVStore. for k, svc := range newSVCMap { kvL3n4AddrID, err := d.PutL3n4Addr(svc.FE.L3n4Addr, 0) if err != nil { log.Errorf("Unable to retrieve service ID of: %s from KVStore: %s."+ " This entry will be removed from the bpf's LB map.", svc.FE.L3n4Addr.String(), err) failedSyncSVC = append(failedSyncSVC, svc) delete(newSVCMap, k) continue } if svc.FE.ID != kvL3n4AddrID.ID { log.Infof("Service ID was out of sync, got new ID %d -> %d", svc.FE.ID, kvL3n4AddrID.ID) oldID := svc.FE.ID svc.FE.ID = kvL3n4AddrID.ID if err := addSVC2BPFMap(oldID, svc); err != nil { log.Errorf("%s", err) failedSyncSVC = append(failedSyncSVC, svc) delete(newSVCMap, k) revNAT, ok := newRevNATMap[svc.FE.ID] if ok { // Revert the old revNAT newRevNATMap[oldID] = revNAT failedSyncRevNAT[svc.FE.ID] = revNAT delete(newRevNATMap, svc.FE.ID) } continue } newSVCMap[k] = svc } } // Clean services and rev nats that failed while restoring for _, svc := range failedSyncSVC { log.Debugf("Removing service: %s", svc.FE) feL3n4 := svc.FE var svcKey lbmap.ServiceKey if !feL3n4.IsIPv6() { svcKey = lbmap.NewService4Key(feL3n4.IP, feL3n4.Port, 0) } else { svcKey = lbmap.NewService6Key(feL3n4.IP, feL3n4.Port, 0) } svcKey.SetBackend(0) if err := lbmap.DeleteService(svcKey); err != nil { log.Warningf("Unable to clean service %s from BPF map: %s", svc.FE, err) } } for id, revNAT := range failedSyncRevNAT { log.Debugf("Removing revNAT: %s", revNAT) var revNATK lbmap.RevNatKey if !revNAT.IsIPv6() { revNATK = lbmap.NewRevNat4Key(uint16(id)) } else { revNATK = lbmap.NewRevNat6Key(uint16(id)) } if err := lbmap.DeleteRevNat(revNATK); err != nil { log.Warningf("Unable to clean rev NAT %s from BPF map: %s", revNAT, err) } } d.loadBalancer.SVCMap = newSVCMap d.loadBalancer.RevNATMap = newRevNATMap return nil }