On 3/21/25 2:51 PM, Lorenzo Bianconi wrote:
> Do not drop traffic destinated to the template load-balancer vip if the
> vip var is set to one of the router interface IPs.
>
> Reported-at: https://issues.redhat.com/browse/FDP-988
> Signed-off-by: Lorenzo Bianconi <[email protected]>
> ---
Hi Lorenzo,
Thanks for the patch!
> Changes in v2:
> - Fix logical flows in table S_ROUTER_IN_IP_INPUT
> ---
> lib/lb.c | 1 +
> lib/lb.h | 1 +
> northd/northd.c | 32 +++++++++
> northd/ovn-northd.8.xml | 9 +++
> tests/system-ovn.at | 145 ++++++++++++++++++++++++++++++++++++++++
> 5 files changed, 188 insertions(+)
>
> diff --git a/lib/lb.c b/lib/lb.c
> index 2b2904d1e..6e7a4e296 100644
> --- a/lib/lb.c
> +++ b/lib/lb.c
> @@ -248,6 +248,7 @@ ovn_lb_vip_init_template(struct ovn_lb_vip *lb_vip, const
> char *lb_key_,
> success = true;
> if (!lb_vip->vip_str) {
> lb_vip->vip_str = xstrdup(atom);
> + lb_vip->template_vips = !!strchr(atom, LEX_TEMPLATE_PREFIX);
> } else {
> lb_vip->port_str = xstrdup(atom);
> }
> diff --git a/lib/lb.h b/lib/lb.h
> index e758765bd..b1a89d63c 100644
> --- a/lib/lb.h
> +++ b/lib/lb.h
> @@ -36,6 +36,7 @@ struct ovn_lb_vip {
> char *port_str; /* Actual port string representation. To be used
> * in ovn-northd.
> */
> + bool template_vips; /* True if the vips are templates. */
> struct ovn_lb_backend *backends;
> size_t n_backends;
>
> diff --git a/northd/northd.c b/northd/northd.c
> index 1d3e132d4..4b75f81da 100644
> --- a/northd/northd.c
> +++ b/northd/northd.c
> @@ -12335,6 +12335,35 @@ build_lrouter_defrag_flows_for_lb(struct
> ovn_lb_datapaths *lb_dps,
> }
> }
>
> +static void
> +build_lrouter_allow_vip_traffic_template(struct lflow_table *lflows,
> + struct ovn_lb_datapaths *lb_dps,
> + struct ovn_lb_vip *lb_vip,
> + const struct ovn_northd_lb *lb,
> + const struct ovn_datapaths *lr_dps)
> +{
> + if (!lb_vip->template_vips) {
> + return;
> + }
> +
> + struct ds match = DS_EMPTY_INITIALIZER;
> +
> + size_t index;
> + BITMAP_FOR_EACH_1 (index, ods_size(lr_dps), lb_dps->nb_lr_map) {
> + struct ovn_datapath *od = lr_dps->array[index];
> + /* Do not drop ip traffic with destination the template VIP. */
> + ds_clear(&match);
> + ds_put_format(&match, "ip%d.dst == %s",
> + lb_vip->address_family == AF_INET ? 4 : 6,
> + lb_vip->vip_str);
> + ovn_lflow_add_with_hint(lflows, od, S_ROUTER_IN_IP_INPUT, 100,
> + ds_cstr(&match), "next;",
> + &lb->nlb->header_, lb_dps->lflow_ref);
> + }
> +
> + ds_destroy(&match);
> +}
> +
> static void
> build_lrouter_flows_for_lb(struct ovn_lb_datapaths *lb_dps,
> struct lflow_table *lflows,
> @@ -12359,6 +12388,9 @@ build_lrouter_flows_for_lb(struct ovn_lb_datapaths
> *lb_dps,
> match, action, meter_groups,
> svc_monitor_map);
>
> + build_lrouter_allow_vip_traffic_template(lflows, lb_dps, lb_vip, lb,
> + lr_datapaths);
> +
> if (!build_empty_lb_event_flow(lb_vip, lb, match, action)) {
> continue;
> }
> diff --git a/northd/ovn-northd.8.xml b/northd/ovn-northd.8.xml
> index 155ba8a49..3164b4fff 100644
> --- a/northd/ovn-northd.8.xml
> +++ b/northd/ovn-northd.8.xml
> @@ -3100,6 +3100,15 @@ icmp6_error {
> router.
> </li>
>
> + <li>
> + For each load balancer applied to this logical router configured
> + with <code>VIP</code> template, a priority-100 flow matching
> + <code>ip4.dst</code> or <code>ip6.dst</code> with the configured
> + load balancer <code>VIP</code> and action <code>next;</code>.
> + These flows avoid dropping the packet if the <code>VIP</code> is
> + set to one of the router IPs.
> + </li>
> +
> <li>
> <p>
> ICMP echo reply. These flows reply to ICMP echo requests received
> diff --git a/tests/system-ovn.at b/tests/system-ovn.at
> index 66deeb30e..85d8ac7d0 100644
> --- a/tests/system-ovn.at
> +++ b/tests/system-ovn.at
> @@ -17444,3 +17444,148 @@ OVS_TRAFFIC_VSWITCHD_STOP()
>
> AT_CLEANUP
> ])
> +
> +OVN_FOR_EACH_NORTHD([
> +AT_SETUP([load balancing lb_force_snat_ip with template])
> +AT_KEYWORDS([ovnlb])
> +
> +CHECK_CONNTRACK()
> +CHECK_CONNTRACK_NAT()
> +ovn_start
> +OVS_TRAFFIC_VSWITCHD_START()
> +ADD_BR([br-int])
> +
> +# Set external-ids in br-int needed for ovn-controller
> +ovs-vsctl \
Nit: check
> + -- set Open_vSwitch . external-ids:system-id=hv1 \
> + -- set Open_vSwitch .
> external-ids:ovn-remote=unix:$ovs_base/ovn-sb/ovn-sb.sock \
> + -- set Open_vSwitch . external-ids:ovn-encap-type=geneve \
> + -- set Open_vSwitch . external-ids:ovn-encap-ip=169.0.0.1 \
> + -- set bridge br-int fail-mode=secure
> other-config:disable-in-band=true
> +
> +# Start ovn-controller
> +start_daemon ovn-controller
> +
> +# Logical network:
> +# Two LRs - R1 and R2 that are connected to each other via LS "join"
> +# in 20.0.0.0/24 network. R1 has switchess foo (192.168.1.0/24) and
> +# bar (192.168.2.0/24) connected to it. R2 has alice (172.16.1.0/24)
> connected
> +# to it. R2 is a gateway router on which we add load-balancing rules.
> +#
> +# foo -- R1 -- join - R2 -- alice
> +# |
> +# bar ----
> +
> +check_uuid ovn-nbctl create Logical_Router name=R1
> +check_uuid ovn-nbctl create Logical_Router name=R2 options:chassis=hv1
> +
> +check ovn-nbctl ls-add foo
> +check ovn-nbctl ls-add bar
> +check ovn-nbctl ls-add alice
> +check ovn-nbctl ls-add join
> +
> +# Connect foo to R1
> +check ovn-nbctl lrp-add R1 foo 00:00:01:01:02:03 192.168.1.1/24
> +check ovn-nbctl lsp-add foo rp-foo -- set Logical_Switch_Port rp-foo \
> + type=router options:router-port=foo addresses=\"00:00:01:01:02:03\"
> +
> +# Connect bar to R1
> +check ovn-nbctl lrp-add R1 bar 00:00:01:01:02:04 192.168.2.1/24
> +check ovn-nbctl lsp-add bar rp-bar -- set Logical_Switch_Port rp-bar \
> + type=router options:router-port=bar addresses=\"00:00:01:01:02:04\"
> +
> +# Connect alice to R2
> +check ovn-nbctl lrp-add R2 alice 00:00:02:01:02:03 172.16.1.1/24
> +check ovn-nbctl lsp-add alice rp-alice -- set Logical_Switch_Port rp-alice \
> + type=router options:router-port=alice addresses=\"00:00:02:01:02:03\"
> +
> +# Connect R1 to join
> +check ovn-nbctl lrp-add R1 R1_join 00:00:04:01:02:03 20.0.0.1/24
> +check ovn-nbctl lsp-add join r1-join -- set Logical_Switch_Port r1-join \
> + type=router options:router-port=R1_join addresses='"00:00:04:01:02:03"'
> +
> +# Connect R2 to join
> +check ovn-nbctl lrp-add R2 R2_join 00:00:04:01:02:04 20.0.0.2/24
> +check ovn-nbctl lsp-add join r2-join -- set Logical_Switch_Port r2-join \
> + type=router options:router-port=R2_join addresses='"00:00:04:01:02:04"'
> +
> +# Static routes.
> +check ovn-nbctl lr-route-add R1 172.16.1.0/24 20.0.0.2
> +check ovn-nbctl lr-route-add R2 192.168.0.0/16 20.0.0.1
> +
> +# Logical port 'foo1' in switch 'foo'.
> +ADD_NAMESPACES(foo1)
> +ADD_VETH(foo1, foo1, br-int, "192.168.1.2/24", "f0:00:00:01:02:03", \
> + "192.168.1.1")
> +check ovn-nbctl lsp-add foo foo1 \
> +-- lsp-set-addresses foo1 "f0:00:00:01:02:03 192.168.1.2"
> +
> +# Logical port 'alice1' in switch 'alice'.
> +ADD_NAMESPACES(alice1)
> +ADD_VETH(alice1, alice1, br-int, "172.16.1.2/24", "f0:00:00:01:02:04", \
> + "172.16.1.1")
> +check ovn-nbctl lsp-add alice alice1 \
> +-- lsp-set-addresses alice1 "f0:00:00:01:02:04 172.16.1.2"
> +
> +# Logical port 'bar1' in switch 'bar'.
> +ADD_NAMESPACES(bar1)
> +ADD_VETH(bar1, bar1, br-int, "192.168.2.2/24", "f0:00:00:01:02:05", \
> +"192.168.2.1")
> +check ovn-nbctl lsp-add bar bar1 \
> +-- lsp-set-addresses bar1 "f0:00:00:01:02:05 192.168.2.2"
> +
> +check ovn-nbctl set logical_router R2 options:lb_force_snat_ip="20.0.0.5"
> +
> +AT_CHECK([ovn-nbctl -- create chassis_template_var chassis="hv1" \
> +
> variables="{vip=172.16.1.1,vport1=8000,backends1=\"192.168.1.2:80,192.168.2.2:80\"}"],
> + [0], [ignore])
> +
> +# Config OVN load-balancer with a VIP.
> +check ovn-nbctl --template lb-add lb1 "^vip:^vport1" "^backends1" tcp
> +check ovn-nbctl lr-lb-add R2 lb1
> +# Wait for ovn-controller to catch up.
> +check ovn-nbctl --wait=hv sync
> +
> +# Start webservers in 'foo1', 'bar1'.
> +OVS_START_L7([foo1], [http])
> +OVS_START_L7([bar1], [http])
> +
> +NETNS_START_TCPDUMP([foo1], [-neei foo1 src 20.0.0.5 and tcp], [foo1])
> +NETNS_START_TCPDUMP([bar1], [-neei bar1 src 20.0.0.5 and tcp], [bar1])
> +
> +check ovs-appctl dpctl/flush-conntrack
> +for i in $(seq 10); do
> + NS_EXEC([alice1], [wget 172.16.1.1:8000 -t 5 -T 1 --retry-connrefused -v
> -o wget$i.log])
> +done
> +
> +OVS_WAIT_UNTIL([
> + n_pkt=$(cat foo1.tcpdump | wc -l)
> + test "${n_pkt}" -ge 1
> +])
> +OVS_WAIT_UNTIL([
> + n_pkt=$(cat bar1.tcpdump | wc -l)
> + test "${n_pkt}" -ge 1
> +])
> +
> +AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(20.0.0.5) | \
> +sed -e 's/zone=[[0-9]]*/zone=<cleared>/'], [0], [dnl
> +tcp,orig=(src=172.16.1.2,dst=192.168.1.2,sport=<cleared>,dport=<cleared>),reply=(src=192.168.1.2,dst=20.0.0.5,sport=<cleared>,dport=<cleared>),zone=<cleared>,protoinfo=(state=<cleared>)
> +tcp,orig=(src=172.16.1.2,dst=192.168.2.2,sport=<cleared>,dport=<cleared>),reply=(src=192.168.2.2,dst=20.0.0.5,sport=<cleared>,dport=<cleared>),zone=<cleared>,protoinfo=(state=<cleared>)
> +])
> +
> +OVS_APP_EXIT_AND_WAIT([ovn-controller])
This should be OVN_CLEANUP_CONTROLLER([hv1]) instead.
> +
> +as ovn-sb
> +OVS_APP_EXIT_AND_WAIT([ovsdb-server])
> +
> +as ovn-nb
> +OVS_APP_EXIT_AND_WAIT([ovsdb-server])
> +
> +as northd
> +OVS_APP_EXIT_AND_WAIT([ovn-northd])
> +
> +as
> +OVS_TRAFFIC_VSWITCHD_STOP(["/failed to query port patch-.*/d
> +/connection dropped.*/d"])
> +AT_CLEANUP
> +])
I fixed up the two minor things above and pushed this fix to main,
25.03, 24.09 and 24.03.
Regards,
Dumitru
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev