On 3/21/25 2:51 PM, Lorenzo Bianconi wrote:
> Do not drop traffic destinated to the template load-balancer vip if the
> vip var is set to one of the router interface IPs.
> 
> Reported-at: https://issues.redhat.com/browse/FDP-988
> Signed-off-by: Lorenzo Bianconi <lorenzo.bianc...@redhat.com>
> ---

Hi Lorenzo,

Thanks for the patch!

> Changes in v2:
> - Fix logical flows in table S_ROUTER_IN_IP_INPUT
> ---
>  lib/lb.c                |   1 +
>  lib/lb.h                |   1 +
>  northd/northd.c         |  32 +++++++++
>  northd/ovn-northd.8.xml |   9 +++
>  tests/system-ovn.at     | 145 ++++++++++++++++++++++++++++++++++++++++
>  5 files changed, 188 insertions(+)
> 
> diff --git a/lib/lb.c b/lib/lb.c
> index 2b2904d1e..6e7a4e296 100644
> --- a/lib/lb.c
> +++ b/lib/lb.c
> @@ -248,6 +248,7 @@ ovn_lb_vip_init_template(struct ovn_lb_vip *lb_vip, const 
> char *lb_key_,
>          success = true;
>          if (!lb_vip->vip_str) {
>              lb_vip->vip_str = xstrdup(atom);
> +            lb_vip->template_vips = !!strchr(atom, LEX_TEMPLATE_PREFIX);
>          } else {
>              lb_vip->port_str = xstrdup(atom);
>          }
> diff --git a/lib/lb.h b/lib/lb.h
> index e758765bd..b1a89d63c 100644
> --- a/lib/lb.h
> +++ b/lib/lb.h
> @@ -36,6 +36,7 @@ struct ovn_lb_vip {
>      char *port_str;      /* Actual port string representation.  To be used
>                            * in ovn-northd.
>                            */
> +    bool template_vips;  /* True if the vips are templates. */
>      struct ovn_lb_backend *backends;
>      size_t n_backends;
>  
> diff --git a/northd/northd.c b/northd/northd.c
> index 1d3e132d4..4b75f81da 100644
> --- a/northd/northd.c
> +++ b/northd/northd.c
> @@ -12335,6 +12335,35 @@ build_lrouter_defrag_flows_for_lb(struct 
> ovn_lb_datapaths *lb_dps,
>      }
>  }
>  
> +static void
> +build_lrouter_allow_vip_traffic_template(struct lflow_table *lflows,
> +                                         struct ovn_lb_datapaths *lb_dps,
> +                                         struct ovn_lb_vip *lb_vip,
> +                                         const struct ovn_northd_lb *lb,
> +                                         const struct ovn_datapaths *lr_dps)
> +{
> +    if (!lb_vip->template_vips) {
> +        return;
> +    }
> +
> +    struct ds match = DS_EMPTY_INITIALIZER;
> +
> +    size_t index;
> +    BITMAP_FOR_EACH_1 (index, ods_size(lr_dps), lb_dps->nb_lr_map) {
> +        struct ovn_datapath *od = lr_dps->array[index];
> +        /* Do not drop ip traffic with destination the template VIP. */
> +        ds_clear(&match);
> +        ds_put_format(&match, "ip%d.dst == %s",
> +                      lb_vip->address_family == AF_INET ? 4 : 6,
> +                      lb_vip->vip_str);
> +        ovn_lflow_add_with_hint(lflows, od, S_ROUTER_IN_IP_INPUT, 100,
> +                                ds_cstr(&match), "next;",
> +                                &lb->nlb->header_, lb_dps->lflow_ref);
> +    }
> +
> +    ds_destroy(&match);
> +}
> +
>  static void
>  build_lrouter_flows_for_lb(struct ovn_lb_datapaths *lb_dps,
>                             struct lflow_table *lflows,
> @@ -12359,6 +12388,9 @@ build_lrouter_flows_for_lb(struct ovn_lb_datapaths 
> *lb_dps,
>                                         match, action, meter_groups,
>                                         svc_monitor_map);
>  
> +        build_lrouter_allow_vip_traffic_template(lflows, lb_dps, lb_vip, lb,
> +                                                 lr_datapaths);
> +
>          if (!build_empty_lb_event_flow(lb_vip, lb, match, action)) {
>              continue;
>          }
> diff --git a/northd/ovn-northd.8.xml b/northd/ovn-northd.8.xml
> index 155ba8a49..3164b4fff 100644
> --- a/northd/ovn-northd.8.xml
> +++ b/northd/ovn-northd.8.xml
> @@ -3100,6 +3100,15 @@ icmp6_error {
>            router.
>        </li>
>  
> +      <li>
> +          For each load balancer applied to this logical router configured
> +          with <code>VIP</code> template, a priority-100 flow matching
> +          <code>ip4.dst</code> or <code>ip6.dst</code> with the configured
> +          load balancer <code>VIP</code> and action <code>next;</code>.
> +          These flows avoid dropping the packet if the <code>VIP</code> is
> +          set to one of the router IPs.
> +      </li>
> +
>        <li>
>          <p>
>            ICMP echo reply.  These flows reply to ICMP echo requests received
> diff --git a/tests/system-ovn.at b/tests/system-ovn.at
> index 66deeb30e..85d8ac7d0 100644
> --- a/tests/system-ovn.at
> +++ b/tests/system-ovn.at
> @@ -17444,3 +17444,148 @@ OVS_TRAFFIC_VSWITCHD_STOP()
>  
>  AT_CLEANUP
>  ])
> +
> +OVN_FOR_EACH_NORTHD([
> +AT_SETUP([load balancing lb_force_snat_ip with template])
> +AT_KEYWORDS([ovnlb])
> +
> +CHECK_CONNTRACK()
> +CHECK_CONNTRACK_NAT()
> +ovn_start
> +OVS_TRAFFIC_VSWITCHD_START()
> +ADD_BR([br-int])
> +
> +# Set external-ids in br-int needed for ovn-controller
> +ovs-vsctl \

Nit: check

> +        -- set Open_vSwitch . external-ids:system-id=hv1 \
> +        -- set Open_vSwitch . 
> external-ids:ovn-remote=unix:$ovs_base/ovn-sb/ovn-sb.sock \
> +        -- set Open_vSwitch . external-ids:ovn-encap-type=geneve \
> +        -- set Open_vSwitch . external-ids:ovn-encap-ip=169.0.0.1 \
> +        -- set bridge br-int fail-mode=secure 
> other-config:disable-in-band=true
> +
> +# Start ovn-controller
> +start_daemon ovn-controller
> +
> +# Logical network:
> +# Two LRs - R1 and R2 that are connected to each other via LS "join"
> +# in 20.0.0.0/24 network. R1 has switchess foo (192.168.1.0/24) and
> +# bar (192.168.2.0/24) connected to it. R2 has alice (172.16.1.0/24) 
> connected
> +# to it.  R2 is a gateway router on which we add load-balancing rules.
> +#
> +#    foo -- R1 -- join - R2 -- alice
> +#           |
> +#    bar ----
> +
> +check_uuid ovn-nbctl create Logical_Router name=R1
> +check_uuid ovn-nbctl create Logical_Router name=R2 options:chassis=hv1
> +
> +check ovn-nbctl ls-add foo
> +check ovn-nbctl ls-add bar
> +check ovn-nbctl ls-add alice
> +check ovn-nbctl ls-add join
> +
> +# Connect foo to R1
> +check ovn-nbctl lrp-add R1 foo 00:00:01:01:02:03 192.168.1.1/24
> +check ovn-nbctl lsp-add foo rp-foo -- set Logical_Switch_Port rp-foo \
> +    type=router options:router-port=foo addresses=\"00:00:01:01:02:03\"
> +
> +# Connect bar to R1
> +check ovn-nbctl lrp-add R1 bar 00:00:01:01:02:04 192.168.2.1/24
> +check ovn-nbctl lsp-add bar rp-bar -- set Logical_Switch_Port rp-bar \
> +    type=router options:router-port=bar addresses=\"00:00:01:01:02:04\"
> +
> +# Connect alice to R2
> +check ovn-nbctl lrp-add R2 alice 00:00:02:01:02:03 172.16.1.1/24
> +check ovn-nbctl lsp-add alice rp-alice -- set Logical_Switch_Port rp-alice \
> +    type=router options:router-port=alice addresses=\"00:00:02:01:02:03\"
> +
> +# Connect R1 to join
> +check ovn-nbctl lrp-add R1 R1_join 00:00:04:01:02:03 20.0.0.1/24
> +check ovn-nbctl lsp-add join r1-join -- set Logical_Switch_Port r1-join \
> +    type=router options:router-port=R1_join addresses='"00:00:04:01:02:03"'
> +
> +# Connect R2 to join
> +check ovn-nbctl lrp-add R2 R2_join 00:00:04:01:02:04 20.0.0.2/24
> +check ovn-nbctl lsp-add join r2-join -- set Logical_Switch_Port r2-join \
> +    type=router options:router-port=R2_join addresses='"00:00:04:01:02:04"'
> +
> +# Static routes.
> +check ovn-nbctl lr-route-add R1 172.16.1.0/24 20.0.0.2
> +check ovn-nbctl lr-route-add R2 192.168.0.0/16 20.0.0.1
> +
> +# Logical port 'foo1' in switch 'foo'.
> +ADD_NAMESPACES(foo1)
> +ADD_VETH(foo1, foo1, br-int, "192.168.1.2/24", "f0:00:00:01:02:03", \
> +         "192.168.1.1")
> +check ovn-nbctl lsp-add foo foo1 \
> +-- lsp-set-addresses foo1 "f0:00:00:01:02:03 192.168.1.2"
> +
> +# Logical port 'alice1' in switch 'alice'.
> +ADD_NAMESPACES(alice1)
> +ADD_VETH(alice1, alice1, br-int, "172.16.1.2/24", "f0:00:00:01:02:04", \
> +         "172.16.1.1")
> +check ovn-nbctl lsp-add alice alice1 \
> +-- lsp-set-addresses alice1 "f0:00:00:01:02:04 172.16.1.2"
> +
> +# Logical port 'bar1' in switch 'bar'.
> +ADD_NAMESPACES(bar1)
> +ADD_VETH(bar1, bar1, br-int, "192.168.2.2/24", "f0:00:00:01:02:05", \
> +"192.168.2.1")
> +check ovn-nbctl lsp-add bar bar1 \
> +-- lsp-set-addresses bar1 "f0:00:00:01:02:05 192.168.2.2"
> +
> +check ovn-nbctl set logical_router R2 options:lb_force_snat_ip="20.0.0.5"
> +
> +AT_CHECK([ovn-nbctl -- create chassis_template_var chassis="hv1" \
> +          
> variables="{vip=172.16.1.1,vport1=8000,backends1=\"192.168.1.2:80,192.168.2.2:80\"}"],
> +          [0], [ignore])
> +
> +# Config OVN load-balancer with a VIP.
> +check ovn-nbctl --template lb-add lb1 "^vip:^vport1" "^backends1" tcp
> +check ovn-nbctl lr-lb-add R2 lb1
> +# Wait for ovn-controller to catch up.
> +check ovn-nbctl --wait=hv sync
> +
> +# Start webservers in 'foo1', 'bar1'.
> +OVS_START_L7([foo1], [http])
> +OVS_START_L7([bar1], [http])
> +
> +NETNS_START_TCPDUMP([foo1], [-neei foo1 src 20.0.0.5 and tcp], [foo1])
> +NETNS_START_TCPDUMP([bar1], [-neei bar1 src 20.0.0.5 and tcp], [bar1])
> +
> +check ovs-appctl dpctl/flush-conntrack
> +for i in $(seq 10); do
> +    NS_EXEC([alice1], [wget 172.16.1.1:8000 -t 5 -T 1 --retry-connrefused -v 
> -o wget$i.log])
> +done
> +
> +OVS_WAIT_UNTIL([
> +    n_pkt=$(cat foo1.tcpdump | wc -l)
> +    test "${n_pkt}" -ge 1
> +])
> +OVS_WAIT_UNTIL([
> +    n_pkt=$(cat bar1.tcpdump | wc -l)
> +    test "${n_pkt}" -ge 1
> +])
> +
> +AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(20.0.0.5) | \
> +sed -e 's/zone=[[0-9]]*/zone=<cleared>/'], [0], [dnl
> +tcp,orig=(src=172.16.1.2,dst=192.168.1.2,sport=<cleared>,dport=<cleared>),reply=(src=192.168.1.2,dst=20.0.0.5,sport=<cleared>,dport=<cleared>),zone=<cleared>,protoinfo=(state=<cleared>)
> +tcp,orig=(src=172.16.1.2,dst=192.168.2.2,sport=<cleared>,dport=<cleared>),reply=(src=192.168.2.2,dst=20.0.0.5,sport=<cleared>,dport=<cleared>),zone=<cleared>,protoinfo=(state=<cleared>)
> +])
> +
> +OVS_APP_EXIT_AND_WAIT([ovn-controller])

This should be OVN_CLEANUP_CONTROLLER([hv1]) instead.

> +
> +as ovn-sb
> +OVS_APP_EXIT_AND_WAIT([ovsdb-server])
> +
> +as ovn-nb
> +OVS_APP_EXIT_AND_WAIT([ovsdb-server])
> +
> +as northd
> +OVS_APP_EXIT_AND_WAIT([ovn-northd])
> +
> +as
> +OVS_TRAFFIC_VSWITCHD_STOP(["/failed to query port patch-.*/d
> +/connection dropped.*/d"])
> +AT_CLEANUP
> +])

I fixed up the two minor things above and pushed this fix to main,
25.03, 24.09 and 24.03.

Regards,
Dumitru

_______________________________________________
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to