neutron/neutron
Rodolfo Alonso Hernandez f450886ff9 Allow the use of legacy routers within RPN segments
This patch adds to legacy routers (no HA nor DVR) to be connected
to a router provider network segment through the gateway interface.
The router will be connected to one single segment of the RPN; that
means the router will have L2 connectivity to one single subnet.
The gateway router port will have an IP address on the subnet CIDR;
that will provide connectivity to the broadcast domain of this CIDR
(as usual, that doesn't change).

The router, in other scenarios, adds the other subnet CIDRs to the
router namespace routing table. That allows to SNAT any packet to
those CIDRs through the gateway port.

In the RPN case those routes are not added because there is no
broadcast connectivity with the other subnets. Any packet that needs
to reach these other subents, should go through the local segment
gateway IP address. This default route is added always into the
router namespace.

Closes-Bug: #1923592

Change-Id: Ib66b1d7b60eb0ac0a9e3dfd08aae29cb03abde34
2021-06-03 15:58:26 +00:00
..
agent Merge "HA-non-DVR router don't need manually add static route" 2021-05-22 05:05:09 +00:00
api Merge "use payloads for NETWORK callback events" 2021-05-16 08:50:19 +00:00
cmd Merge "Added common config and SR-IOV agent config to sanity check" 2021-04-28 23:30:45 +00:00
common Merge "[OVN] Add "filter-validation" extension to supported list" 2021-05-14 11:17:51 +00:00
conf Deprecate [designate] admin_* parameters 2021-05-11 12:08:42 +09:00
core_extensions Set system_scope='all' in elevated context 2021-03-19 12:05:56 +01:00
db Allow the use of legacy routers within RPN segments 2021-06-03 15:58:26 +00:00
debug Remove rootwrap execution (2) 2021-02-06 16:23:03 +00:00
extensions Allow the use of legacy routers within RPN segments 2021-06-03 15:58:26 +00:00
hacking Merge "Replace assertItemsEqual with assertCountEqual" 2021-04-26 19:12:38 +00:00
ipam Allow to manually define the gateway IP when using subnet pools 2021-02-27 10:06:35 +00:00
locale Imported Translations from Zanata 2020-10-11 07:22:44 +00:00
notifiers [OVS] Fix live-migration connection disruption 2021-01-13 11:13:41 +00:00
objects [DVR] Send allowed address pairs info to the L3 agents 2021-05-18 12:58:23 +02:00
pecan_wsgi Log exception generated in Controller.prepare_request_body 2020-08-18 16:18:34 -03:00
plugins Use local and ip address to create vxlan interface 2021-06-01 11:02:21 -04:00
privileged Replace "get_routing_table" with "list_ip_routes" 2021-05-01 17:39:42 +00:00
profiling Remove "six" library 2020-07-28 16:55:52 +00:00
quota Remove "six" library 2020-07-28 16:55:52 +00:00
scheduler Set system_scope='all' in elevated context 2021-03-19 12:05:56 +01:00
server Re-use existing ProcessLauncher from wsgi in RPC workers 2020-02-07 14:51:06 +01:00
services Merge "use payloads for NETWORK callback events" 2021-05-16 08:50:19 +00:00
tests Allow the use of legacy routers within RPN segments 2021-06-03 15:58:26 +00:00
__init__.py Remove usage of six.PY2 2020-05-22 12:59:01 -04:00
_i18n.py
auth.py
manager.py Remove usage of six.add_metaclass 2020-05-21 14:41:18 -04:00
neutron_plugin_base_v2.py Remove usage of six.add_metaclass 2020-05-21 14:41:18 -04:00
opts.py Adding placement auth options to oslo.config entry_points 2021-05-10 09:00:57 -04:00
policy.py Always perform policy checks if enforce_new_defaults == true 2021-03-18 08:51:00 +01:00
service.py Re-use existing ProcessLauncher from wsgi in RPC workers 2020-02-07 14:51:06 +01:00
version.py
worker.py Change process name of neutron-server to match worker role 2019-03-01 14:18:09 -05:00
wsgi.py neutron-server api worker process should be named to their role 2021-01-11 08:28:32 +08:00