+}
+
+static void
+build_lrouter_bgp_redirect(
+ struct ovn_port *op, struct lflow_table *lflows,
+ struct ds *match, struct ds *actions)
+{
+ /* LRP has to have a peer.*/
+ if (op->peer == NULL) {
+ return;
+ }
+ /* LRP has to have NB record.*/
+ if (op->nbrp == NULL) {
+ return;
+ }
+
+ /* Proceed only for LRPs that have 'bgp-redirect' option set. Value of this
+ * option is the name of LSP to which a BGP traffic will be redirected.
+ */
+ const char *bgp_port = smap_get(&op->nbrp->options, "bgp-redirect");
+ if (bgp_port == NULL) {
+ return;
+ }
+
+ /* Ensure that LSP, to which the BGP traffic is redirected, exists.*/
+ struct ovn_port *peer_lsp;
+ bool bgp_port_exists = false;
+ HMAP_FOR_EACH (peer_lsp, dp_node, &op->peer->od->ports) {
+ size_t peer_lsp_s = strlen(peer_lsp->key);
+ if (peer_lsp_s == strlen(bgp_port)
+ && !strncmp(peer_lsp->key, bgp_port, peer_lsp_s)){
+ bgp_port_exists = true;
+ break;
+ }
+ }
+
+ if (!bgp_port_exists) {
+ static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
+ VLOG_WARN_RL(&rl, "Option 'bgp-redirect' set on Logical Router Port "
+ "'%s' refers to non-existent Logical Switch Port. "
+ "BGP redirecting won't be configured.",
+ op->key);
+ return;
+ }
+
+ if (op->cr_port != NULL) {
+ static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
+ VLOG_WARN_RL(&rl, "Option 'bgp-redirect' is not supported on"
+ " Distributed Gateway Port '%s'", op->key);
+ return;
+ }
+
+ /* Mirror traffic destined for LRP's IPs and default BGP port
+ * to the port defined in 'bgp-redirect' option.
+ */
+ for (size_t i = 0; i < op->lrp_networks.n_ipv4_addrs; i++) {
+ const char *ip_s = op->lrp_networks.ipv4_addrs[i].addr_s;
+ build_bgp_redirect_rule__(ip_s, bgp_port, false, op->peer, lflows,
+ match, actions);
+ }
+ for (size_t i = 0; i < op->lrp_networks.n_ipv6_addrs; i++) {
+ const char *ip_s = op->lrp_networks.ipv6_addrs[i].addr_s;
+ build_bgp_redirect_rule__(ip_s, bgp_port, true, op->peer, lflows,
+ match, actions);
+ }
+}
+
/* This function adds ARP resolve flows related to a LSP. */
static void
build_arp_resolve_flows_for_lsp(
@@ -16003,6 +16110,7 @@ build_lswitch_and_lrouter_iterate_by_lrp(struct
ovn_port *op,
lsi->meter_groups, op->lflow_ref);
build_lrouter_icmp_packet_toobig_admin_flows(op, lsi->lflows, &lsi->match,
&lsi->actions,
op->lflow_ref);
+ build_lrouter_bgp_redirect(op, lsi->lflows, &lsi->match, &lsi->actions);
}
static void *
diff --git a/northd/ovn-northd.8.xml b/northd/ovn-northd.8.xml
index b06b09ac5..4cbdf8f74 100644
--- a/northd/ovn-northd.8.xml
+++ b/northd/ovn-northd.8.xml
@@ -284,6 +284,21 @@
dropped in the next stage.
</li>
+ <li>
+ For each logical port that's defined as a target of BGP redirecting
+ (via <code>bgp-redirect</code> option set on Logical Router Port), a
+ filter is set in place that disallows any traffic entering this port
+ that does not originate from Logical Router Port's IPs and default BGP
+ port (TCP 179). This filtering is achieved by two rules. First rule has
+ priority 81, it matches on <code>inport == <var>BGP_MIRROR_PORT</var>
+ && ip.src == <var>LRP_IP</var> && tcp.src == 179</code>
+ and allows traffic further with <code>REGBIT_PORT_SEC_DROP" =
+ check_in_port_sec(); next;</code>. Second rule with priority 80 matches
+ the rest of the traffic from that port and sets
+ <code>REGBIT_PORT_SEC_DROP" = 1; next;"</code> so that the packets are
+ dropped in the next stage.
+ </li>
+
<li>
For each (enabled) vtep logical port, a priority 70 flow is added
which
matches on all packets and applies the action
@@ -1949,6 +1964,14 @@ output;
on the logical switch.
</li>
+ <li>
+ For any logical port that's defined as a target of BGP redirecting (via
+ <code>bgp-redirect</code> option set on Logical Router Port), a
+ priority-100 flow is added that redirects traffic for Logical Router
+ Port IPs (including IPv6 LLA) and TCP port 179, to the targeted
+ logical port.
+ </li>
+
<li>
Priority-90 flows for transit switches that forward registered
IP multicast traffic to their corresponding multicast group , which
diff --git a/ovn-nb.xml b/ovn-nb.xml
index 9552534f6..2d2f5c9e0 100644
--- a/ovn-nb.xml
+++ b/ovn-nb.xml
@@ -3440,6 +3440,20 @@ or
</p>
</column>
+ <column name="options" key="bgp-redirect" type='{"type": "string"}'>
+ <p>
+ This option expects a name of a Logical Switch Port that's present
+ in the peer's Logical Switch. If set, it causes any traffic
+ that's destined for Logical Router Port's IP addresses (including
+ its IPv6 LLA) and the default BGP port (TCP 179), to be redirected
+ to the specified Logical Switch Port.
+
+ This allows external BGP daemon to be bound to a port in OVN's
+ Logical Switch and act as if it was listening on Logical Router
+ Port's IP address.
+ </p>
+ </column>
+
<column name="options" key="gateway_mtu_bypass">
<p>
When configured, represents a match expression, in the same
diff --git a/tests/ovn-northd.at b/tests/ovn-northd.at
index a389d1988..df1e924ab 100644
--- a/tests/ovn-northd.at
+++ b/tests/ovn-northd.at
@@ -12721,3 +12721,61 @@ AT_CHECK([ovn-sbctl dump-flows lr | grep lr_in_dnat |
ovn_strip_lflows], [0], [d
AT_CLEANUP
])
+
+OVN_FOR_EACH_NORTHD_NO_HV([
+AT_SETUP([BGP control plane redirect])
+ovn_start
+
+check ovn-sbctl chassis-add hv1 geneve 127.0.0.1
+
+check ovn-nbctl lr-add lr -- \
+ lrp-add lr lr-ls 02:ac:10:01:00:01 172.16.1.1/24
+check ovn-nbctl --wait=sb set logical_router lr options:chassis=hv1
+
+check ovn-nbctl ls-add ls -- \
+ lsp-add ls ls-lr -- \
+ lsp-set-type ls-lr router -- \
+ lsp-set-addresses ls-lr router -- \
+ lsp-set-options ls-lr router-port=lr-ls
+
+check ovn-nbctl lsp-add ls lsp-bgp -- \
+ lsp-set-addresses lsp-bgp unknown
+
+# Function that ensures that no BGP redirect ruels are installed.
+check_no_bgp_redirect() {
+ AT_CHECK([ovn-sbctl dump-flows ls | grep ls_in_l2_lkup | grep "tcp.dst ==
179" | wc -l], [0], [0
+])
+
+ AT_CHECK([ovn-sbctl dump-flows ls | grep ls_in_check_port_sec | grep -E
"priority=80|priority=81" | wc -l], [0], [0
+])
+}
+
+# By default, no rules related to BGP redirect are present
+check_no_bgp_redirect
+
+# Set "lsp-bgp" port as target of BGP control plane redirected traffic
+check ovn-nbctl --wait=sb set logical_router_port lr-ls
options:bgp-redirect=lsp-bgp
+
+# Check that BGP control plane traffic is redirected to "lsp-bgp"
+AT_CHECK([ovn-sbctl dump-flows ls | grep ls_in_l2_lkup | grep "tcp.dst == 179"
| ovn_strip_lflows], [0], [dnl
+ table=??(ls_in_l2_lkup ), priority=100 , match=(ip4.dst == 172.16.1.1 && tcp.dst
== 179), action=(outport = "lsp-bgp"; output;)
+ table=??(ls_in_l2_lkup ), priority=100 , match=(ip6.dst == fe80::ac:10ff:fe01:1
&& tcp.dst == 179), action=(outport = "lsp-bgp"; output;)
+])
+
+# Check that only BGP-related traffic is accepted on "lsp-bgp" port
+AT_CHECK([ovn-sbctl dump-flows ls | grep ls_in_check_port_sec | grep -E
"priority=80|priority=81" | ovn_strip_lflows], [0], [dnl
+ table=??(ls_in_check_port_sec), priority=80 , match=(inport == "lsp-bgp"),
action=(reg0[[15]] = 1; next;)
+ table=??(ls_in_check_port_sec), priority=81 , match=(inport == "lsp-bgp" &&
ip4.src == 172.16.1.1 && tcp.src == 179), action=(reg0[[15]] = check_in_port_sec(); next;)
+ table=??(ls_in_check_port_sec), priority=81 , match=(inport == "lsp-bgp" &&
ip6.src == fe80::ac:10ff:fe01:1 && tcp.src == 179), action=(reg0[[15]] = check_in_port_sec();
next;)
+])
+
+# Remove 'bgp-redirect' option from LRP and check that rules are removed
+check ovn-nbctl --wait=sb remove logical_router_port lr-ls options bgp-redirect
+check_no_bgp_redirect
+
+# Set non-existent LSP as target of 'bgp-redirect' and check that no rules are
added
+check ovn-nbctl --wait=sb set logical_router_port lr-ls
options:bgp-redirect=lsp-foo
+check_no_bgp_redirect
+
+AT_CLEANUP
+])
diff --git a/tests/system-ovn.at b/tests/system-ovn.at
index c24ede7c5..c09c1136e 100644
--- a/tests/system-ovn.at
+++ b/tests/system-ovn.at
@@ -13027,3 +13027,89 @@ OVS_TRAFFIC_VSWITCHD_STOP(["/failed to query port
patch-.*/d
/connection dropped.*/d"])
AT_CLEANUP
])
+
+OVN_FOR_EACH_NORTHD([
+AT_SETUP([BGP control plane redirect])
+
+# Start ovn-controller
+start_daemon ovn-controller
+
+ovn-nbctl lr-add R1 \
+ -- set Logical_Router R1 options:chassis=hv1
+
+ovn-nbctl ls-add public
+
+ovn-nbctl lrp-add R1 rp-public 00:00:02:01:02:03 172.16.1.1/24
+
+ovn-nbctl lsp-add public public-rp -- set Logical_Switch_Port public-rp \
+ type=router options:router-port=rp-public \
+ -- lsp-set-addresses public-rp router
+
+ovn-nbctl lsp-add public bgp-daemon \
+ -- lsp-set-addresses bgp-daemon unknown
+
+AT_CHECK([ovs-vsctl set Open_vSwitch .
external-ids:ovn-bridge-mappings=phynet:br-ext])
+ovn-nbctl lsp-add public public1 \
+ -- lsp-set-addresses public1 unknown \
+ -- lsp-set-type public1 localnet \
+ -- lsp-set-options public1 network_name=phynet
+
+ovn-nbctl --wait=hv sync
+
+# Set option that redirects BGP control plane traffic to a LSP "bgp-daemon"
+ovn-nbctl --wait=sb set logical_router_port rp-public
options:bgp-redirect=bgp-daemon
+
+# Create "bgp-daemon" interface in a namespace with IP and MAC matching LRP
"rp-public"
+ADD_NAMESPACES(bgp-daemon)
+ADD_VETH(bgp-daemon, bgp-daemon, br-int, "172.16.1.1/24", "00:00:02:01:02:03")
+
+ADD_NAMESPACES(ext-foo)
+ADD_VETH(ext-foo, ext-foo, br-ext, "172.16.1.100/24", "00:10:10:01:02:13", \
+ "172.16.1.1")
+
+# Flip the interface down/up to get proper IPv6 LLA
+NS_EXEC([bgp-daemon], [ip link set down bgp-daemon])
+NS_EXEC([bgp-daemon], [ip link set up bgp-daemon])
+
+# Wait until IPv6 LLA loses the "tentative" flag otherwise it can't be bound
to.
+OVS_WAIT_UNTIL([NS_EXEC([bgp-daemon], [ip a show dev bgp-daemon | grep
"fe80::" | grep -v tentative])])
+OVS_WAIT_UNTIL([NS_EXEC([ext-foo], [ip a show dev ext-foo | grep "fe80::" |
grep -v tentative])])
+
+# Verify that BGP control plane traffic is delivered to the "bgp-daemon"
+# interface on both IPv4 and IPv6 LLA addresses
+NETNS_DAEMONIZE([bgp-daemon], [nc -l -k 172.16.1.1 179], [bgp_v4.pid])
+NS_CHECK_EXEC([ext-foo], [echo "TCP test" | nc --send-only 172.16.1.1 179])
+
+NETNS_DAEMONIZE([bgp-daemon], [nc -l -6 -k fe80::200:2ff:fe01:203%bgp-daemon
179], [bgp_v6.pid])
+NS_CHECK_EXEC([ext-foo], [echo "TCP test" | nc --send-only -6
fe80::200:2ff:fe01:203%ext-foo 179])
+
+OVS_APP_EXIT_AND_WAIT([ovn-controller])
+
+as ovn-sb
+OVS_APP_EXIT_AND_WAIT([ovsdb-server])
+
+as ovn-nb
+OVS_APP_EXIT_AND_WAIT([ovsdb-server])
+
+as northd
+OVS_APP_EXIT_AND_WAIT([ovn-northd])
+
+as
+OVS_TRAFFIC_VSWITCHD_STOP(["/.*error receiving.*/d
+/.*terminating with signal 15.*/d"])
+AT_CLEANUP
+])