-
Notifications
You must be signed in to change notification settings - Fork 543
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Aclorch] fix Acl bind point type issue #516
Conversation
merge from Azure/sonic-swss master
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please also cherry pick this PR to 201803 after merged into master.
bpoint_list.push_back(bind); | ||
} | ||
|
||
vector<int32_t> bpoint_list = { SAI_ACL_BIND_POINT_TYPE_PORT, SAI_ACL_BIND_POINT_TYPE_LAG }; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also add SAI_ACL_BIND_POINT_TYPE_VLAN? #Closed
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes, can add this, then we don't need to change the code in the future when deciding to support VLAN.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As comment.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Offline discussed with @lguohan, SONiC should not use SAI_ACL_BIND_POINT_TYPE_VLAN because it is not a supported feature. So let's remove the latest commit from this PR.
Sorry for the late comment.
This reverts commit e026cc1.
well, let's remove it. |
Offline discussed with @prsunny. Our goal is:
However one ASIC SAI implementation is not ready right now (Mellanox SAI is ok). The ETA for unblocking is 7/4. |
- add redis_dummy_remove_route_entry() for meta_sai_remove_route_entry() calls, which is the same logic as create/set - add NULL pointer check and add meta_sai_remove_route_entry() calls which will remove meta data after remove entries. The logic is the same as create/set - syncd add bulkremove option for processEvent() to select processBulkEvent() - together with this , there should be a consumer_table_pops.lua script changes to handle bulkremove in sonic_swss_common sonic-net/sonic-swss-common#306 - after these changes , when we call bulk_create and bulk_remove, the meta data is cleared and we can bulk_create again, otherwise it raise error entry already exists. Signed-off-by: Dong Zhang d.zhang@alibaba-inc.com
What I did
Change the previous way to add ACL table bind point type. previously it will check all the port type in the ACL table to decide which type of bind point will be added to this table. Now by default, an ACL table will support both PORT and LAG bind point, no need to go through all the port and check the port type.
Why I did it
The original way will cause an issue when ACL member LAG is not configured yet but the table already created, then the LAG bind point will not be added and result in failure later when the LAG configured and bind the ACL table to this LAG.
How I verified it
Run ACL/Everflow and CRM test on the testbed.
Details if related