On 8/9/24 04:45, Martin Kalcok wrote:
> This change adds two new LRP options:
>  * routing-protocol-redirect
>  * routing-protocols
> 
> These allow redirection of a routing protocol traffic to
> an Logical Switch Port. This enables external routing daemons
> to listen on an interface bound to an LSP and effectively act
> as if they were listening on (and speaking from) LRP's IP address.
> 
> Option 'routing-protocols' takes a comma-separated list of routing
> protocols whose traffic should be redirected. Currently supported
> are BGP (tcp 179) and BFD (udp 3784).
> 
> Option 'routing-protocol-redirect' expects a string with an LSP
> name.
> 
> When both of these options are set, any traffic entering LS
> that's destined for LRP's IP addresses (including IPv6 LLA) and
> routing protocol's port number, is redirected to the LSP specified
> in the 'routing-protocol-redirect' value.
> 
> NOTE: this feature is experimental and may be subject to
> removal/change in the future.
> 
> Signed-off-by: Martin Kalcok <[email protected]>
> ---

Hi Martin,

Thanks for v5!  Unfortunately it needs a rebase.

Also there were some minor things that need to be fixed in the man
pages.  While at it I have a few other small comments.

> 
>  v5 includes:
>   * change from pure BGP redirect to a configurable protocol redirection
>   * fixes issue with local routing daemon not being able to receive reply
>     traffic when contacting its peer.
>   * ARP and ND traffic is cloned to the redirected port, to properly populate
>     information about its neighbors.
> 
> 
>  northd/northd.c         | 217 ++++++++++++++++++++++++++++++++++++++++
>  northd/northd.h         |   7 ++
>  northd/ovn-northd.8.xml |  54 ++++++++++
>  ovn-nb.xml              |  42 ++++++++
>  tests/ovn-northd.at     |  93 +++++++++++++++++
>  tests/system-ovn.at     | 100 ++++++++++++++++++
>  6 files changed, 513 insertions(+)
> 
> diff --git a/northd/northd.c b/northd/northd.c
> index 4353df07d..39b1998fd 100644
> --- a/northd/northd.c
> +++ b/northd/northd.c
> @@ -13048,6 +13048,221 @@ build_arp_resolve_flows_for_lrp(struct ovn_port *op,
>      }
>  }
>  
> +static void
> +build_r_p_redirect_rule__(

I think I prefer a more explicit name, e.g.,
build_routing_protocols_redirect_rule__().

> +        const char *s_addr, const char *redirect_port_name, int 
> protocol_port,
> +        const char *proto, bool is_ipv6, struct ovn_port *ls_peer,
> +        struct lflow_table *lflows, struct ds *match, struct ds *actions)
> +{
> +    int ip_ver = is_ipv6 ? 6 : 4;
> +    ds_clear(actions);
> +    ds_put_format(actions, "outport = \"%s\"; output;", redirect_port_name);
> +
> +    /* Redirect packets in the input pipeline destined for LR's IP
> +     * and the routing protocol's port to the LSP specified in
> +     * 'routing-protocol-redirect' option.*/
> +    ds_clear(match);
> +    ds_put_format(match, "ip%d.dst == %s && %s.dst == %d", ip_ver, s_addr,
> +                  proto, protocol_port);
> +    ovn_lflow_add(lflows, ls_peer->od, S_SWITCH_IN_L2_LKUP, 100,
> +                  ds_cstr(match),
> +                  ds_cstr(actions),
> +                  ls_peer->lflow_ref);
> +
> +    /* To accomodate "peer" nature of the routing daemons, redirect also
> +     * replies to the daemons' client requests. */
> +    ds_clear(match);
> +    ds_put_format(match, "ip%d.dst == %s && %s.src == %d", ip_ver, s_addr,
> +                  proto, protocol_port);
> +    ovn_lflow_add(lflows, ls_peer->od, S_SWITCH_IN_L2_LKUP, 100,
> +                  ds_cstr(match),
> +                  ds_cstr(actions),
> +                  ls_peer->lflow_ref);
> +}
> +
> +static void
> +apply_r_p_redirect__(

Same here, I think I prefer apply_routing_protocols_redirect__().

> +        const char *s_addr, const char *redirect_port_name, int 
> protocol_flags,
> +        bool is_ipv6, struct ovn_port *ls_peer, struct lflow_table *lflows,
> +        struct ds *match, struct ds *actions)
> +{
> +    if (protocol_flags & REDIRECT_BGP) {
> +        build_r_p_redirect_rule__(s_addr, redirect_port_name, 179, "tcp",
> +                                  is_ipv6, ls_peer, lflows, match, actions);
> +    }
> +
> +    if (protocol_flags & REDIRECT_BFD) {
> +        build_r_p_redirect_rule__(s_addr, redirect_port_name, 3784, "udp",
> +                                  is_ipv6, ls_peer, lflows, match, actions);
> +    }
> +
> +    /* Because the redirected port shares IP and MAC addresses with the LRP,
> +     * special consideration needs to be given to the signaling protocols. */
> +    if (is_ipv6) {
> +        /* Ensure that redirect port receives copy of NA messages destined to
> +         * its IP.*/
> +        ds_clear(match);
> +        ds_clear(actions);
> +        ds_put_format(actions, "clone { outport = \"%s\"; output; };",
> +                      redirect_port_name);
> +        ds_put_format(match, "ip6.dst == %s && nd_na", s_addr);
> +        ovn_lflow_add(lflows, ls_peer->od, S_SWITCH_IN_L2_LKUP, 100,
> +                      ds_cstr(match),
> +                      ds_cstr(actions),
> +                      ls_peer->lflow_ref);
> +    } else {
> +        /* Ensure that redirect port receives copy of ARP replies destined to
> +         * its IP */
> +        ds_clear(match);
> +        ds_clear(actions);
> +        ds_put_format(actions, "clone { outport = \"%s\"; output; };",
> +                      redirect_port_name);
> +        ds_put_format(match, "arp.op == 2 && arp.tpa == %s", s_addr);
> +        ovn_lflow_add(lflows, ls_peer->od, S_SWITCH_IN_L2_LKUP, 100,
> +                      ds_cstr(match),
> +                      ds_cstr(actions),
> +                      ls_peer->lflow_ref);
> +

Nit: no need for newline.

> +    }
> +}
> +
> +static int
> +parse_redirected_routing_protocols(struct ovn_port *lrp) {
> +    int redirected_protocol_flags = 0;
> +    const char *redirect_protocols = smap_get(&lrp->nbrp->options,
> +                                              "routing-protocols");
> +    if (redirect_protocols == NULL) {
> +        return redirected_protocol_flags;
> +    }
> +
> +    char *proto;
> +    char *save_ptr = NULL;
> +    char *tokstr = xstrdup(redirect_protocols);
> +    for (proto = strtok_r(tokstr, ",", &save_ptr); proto != NULL;
> +         proto = strtok_r(NULL, ",", &save_ptr)) {
> +        if (!strcmp(proto, "BGP")) {
> +            redirected_protocol_flags |= REDIRECT_BGP;
> +            continue;
> +        }
> +
> +        if (!strcmp(proto, "BFD")) {
> +            redirected_protocol_flags |= REDIRECT_BFD;
> +            continue;
> +        }

Nit: missing newlines.

> +        static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
> +        VLOG_WARN_RL(&rl, "Option 'routing-protocols' encountered unknown "
> +                          "value %s",
> +                          proto);
> +    }
> +    free(tokstr);
> +    return redirected_protocol_flags;
> +}
> +
> +static void
> +build_lrouter_routing_protocol_redirect(
> +        struct ovn_port *op, struct lflow_table *lflows,
> +        struct ds *match, struct ds *actions)
> +{
> +    /* LRP has to have a peer.*/
> +    if (op->peer == NULL) {
> +        return;
> +    }

Nit: missing newline.

> +    /* LRP has to have NB record.*/
> +    if (op->nbrp == NULL) {
> +        return;
> +    }
> +
> +    /* Proceed only for LRPs that have 'routing-protocol-redirect' option 
> set.
> +     * Value of this option is the name of LSP to which the routing protocol
> +     * traffic will be redirected. */
> +    const char *redirect_port = smap_get(&op->nbrp->options,
> +                                         "routing-protocol-redirect");
> +    if (redirect_port == NULL) {
> +        return;
> +    }
> +
> +    if (op->cr_port != NULL) {
> +        static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
> +        VLOG_WARN_RL(&rl, "Option 'routing-protocol-redirect' is not "
> +                          "supported on Distributed Gateway Port '%s'",
> +                          op->key);
> +        return;
> +    }
> +
> +    /* Ensure that LSP, to which the routing protocol traffic is redirected,
> +     * exists.*/

Nit: missing space after '.'

> +    struct ovn_port *peer_lsp;
> +    bool redirect_port_exists = false;
> +    HMAP_FOR_EACH (peer_lsp, dp_node, &op->peer->od->ports) {
> +        size_t peer_lsp_s = strlen(peer_lsp->key);
> +        if (peer_lsp_s == strlen(redirect_port)
> +            && !strncmp(peer_lsp->key, redirect_port, peer_lsp_s)){
> +            redirect_port_exists = true;
> +            break;
> +        }
> +    }
> +
> +    if (!redirect_port_exists) {
> +        static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
> +        VLOG_WARN_RL(&rl, "Option 'routing-protocol-redirect' set on Logical 
> "
> +                          "Router Port '%s' refers to non-existent Logical "
> +                          "Switch Port. Routing protocol redirecting won't 
> be "
> +                          "configured.",
> +                          op->key);
> +        return;
> +    }
> +
> +

Nit: too many new lines.

> +    int redirected_protocols = parse_redirected_routing_protocols(op);
> +    if (!redirected_protocols) {
> +        static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
> +        VLOG_WARN_RL(&rl, "Option 'routing-protocol-redirect' is set on "
> +                          "Logical Router Port '%s' but no known protocols "
> +                          "were set via 'routing-protocols' options. This "
> +                          "configuration has no effect.",
> +                          op->key);
> +        return;
> +    }
> +
> +    /* Redirecte traffic destined for LRP's IPs and the specified routing

Typo: redirecte

> +     * protocol ports to the port defined in 'routing-protocol-redirect'
> +     * option.*/
> +    for (size_t i = 0; i < op->lrp_networks.n_ipv4_addrs; i++) {
> +        const char *ip_s = op->lrp_networks.ipv4_addrs[i].addr_s;
> +        apply_r_p_redirect__(ip_s, redirect_port, redirected_protocols, 
> false,
> +                             op->peer, lflows,match, actions);
> +    }
> +    for (size_t i = 0; i < op->lrp_networks.n_ipv6_addrs; i++) {
> +        const char *ip_s = op->lrp_networks.ipv6_addrs[i].addr_s;
> +        apply_r_p_redirect__(ip_s, redirect_port, redirected_protocols, true,
> +                                  op->peer, lflows,match, actions);
> +    }
> +
> +    /* Drop ARP replies and IPv6 RA/NA packets originating from
> +     * 'routing-protocol-redirect' LSP. As this port shares IP and MAC
> +     * addresses with LRP, we don't want to create duplicates.*/
> +    ds_clear(match);
> +    ds_put_format(match, "inport == \"%s\" && arp.op == 2", redirect_port);
> +    ovn_lflow_add(lflows, op->peer->od, S_SWITCH_IN_CHECK_PORT_SEC, 80,
> +                  ds_cstr(match),
> +                  REGBIT_PORT_SEC_DROP " = 1; next;",
> +                  op->peer->lflow_ref);
> +
> +    ds_clear(match);
> +    ds_put_format(match, "inport == \"%s\" && nd_na", redirect_port);
> +    ovn_lflow_add(lflows, op->peer->od, S_SWITCH_IN_CHECK_PORT_SEC, 80,
> +                  ds_cstr(match),
> +                  REGBIT_PORT_SEC_DROP " = 1; next;",
> +                  op->peer->lflow_ref);
> +
> +    ds_clear(match);
> +    ds_put_format(match, "inport == \"%s\" && nd_ra", redirect_port);
> +    ovn_lflow_add(lflows, op->peer->od, S_SWITCH_IN_CHECK_PORT_SEC, 80,
> +                  ds_cstr(match),
> +                  REGBIT_PORT_SEC_DROP " = 1; next;",
> +                  op->peer->lflow_ref);
> +}
> +
>  /* This function adds ARP resolve flows related to a LSP. */
>  static void
>  build_arp_resolve_flows_for_lsp(
> @@ -16003,6 +16218,8 @@ build_lswitch_and_lrouter_iterate_by_lrp(struct 
> ovn_port *op,
>                                  lsi->meter_groups, op->lflow_ref);
>      build_lrouter_icmp_packet_toobig_admin_flows(op, lsi->lflows, 
> &lsi->match,
>                                                   &lsi->actions, 
> op->lflow_ref);
> +    build_lrouter_routing_protocol_redirect(op, lsi->lflows,
> +                                            &lsi->match, &lsi->actions);
>  }
>  
>  static void *
> diff --git a/northd/northd.h b/northd/northd.h
> index d4a8d75ab..691c23f01 100644
> --- a/northd/northd.h
> +++ b/northd/northd.h
> @@ -89,6 +89,13 @@ ods_size(const struct ovn_datapaths *datapaths)
>  
>  bool od_has_lb_vip(const struct ovn_datapath *od);
>  
> +/* List of routing and routing-related protocols which
> + * OVN is capable of redirecting from LRP to specific LSP. */
> +enum redirected_routing_protcol_flag_type {
> +    REDIRECT_BGP = (1 << 0),
> +    REDIRECT_BFD = (1 << 1),
> +};
> +
>  struct tracked_ovn_ports {
>      /* tracked created ports.
>       * hmapx node data is 'struct ovn_port *' */
> diff --git a/northd/ovn-northd.8.xml b/northd/ovn-northd.8.xml
> index b06b09ac5..250c602f2 100644
> --- a/northd/ovn-northd.8.xml
> +++ b/northd/ovn-northd.8.xml
> @@ -284,6 +284,32 @@
>          dropped in the next stage.
>        </li>
>  
> +      <li>
> +        <p>
> +          For each logical port that's defined as a target of routing 
> protocol
> +          redirecting (via <code>routing-protocol-redirect</code> option set 
> on
> +          Logical Router Port), a filter is set in place that disallows
> +          following traffic exiting this port:
> +        </p>
> +        <ul>
> +          <li>
> +            ARP replies
> +          </li>
> +          <li>
> +            IPv6 Neighbor Discovery - Router Advertisements
> +          </li>
> +          <li>
> +            IPv6 Neighbor Discovery - Neighbor Advertisements
> +          </li>
> +        </ul>
> +        <p>
> +          Since this port shares IP and MAC addresses with the Logical Router
> +          Port, we wan't to prevent duplicate replies and advertisements. 
> This
> +          is achieved by a rule with priority 80 that sets
> +          <code>REGBIT_PORT_SEC_DROP" = 1; next;"</code>.
> +        </p>
> +      </li>
> +
>        <li>
>          For each (enabled) vtep logical port, a priority 70 flow is added 
> which
>          matches on all packets and applies the action
> @@ -1949,6 +1975,34 @@ output;
>          on the logical switch.
>        </li>
>  
> +      <li>
> +        <p>
> +          For any logical port that's defined as a target of routing protocol
> +          redirecting (via <code>routing-protocol-redirect</code> option set 
> on
> +          Logical Router Port), we redirect the traffic related to protocols
> +          specified in <code>routing-protocols</code> option. It's 
> acoomplished
> +          with following priority-100 flows:
> +        <p>

This should be </p>.

> +        <ul>
> +          <li>
> +            Flows that match Logical Router Port's IPs and destination port 
> of
> +            the routing daemon are redirected to this port to allow external
> +            peers' connection to the daemon listening on this port.
> +          </li>
> +          <li>
> +            Flows that match Logical Router Port's IPs and source port of
> +            the routing daemon are redirected to this port to allow replies
> +            from the peers.
> +          </li>
> +        </ul>
> +        <p>
> +          In addition to this, we add priority-100 rules that
> +          <code>clone</code> ARP replies and IPv6 Neighbor Advertisements to
> +          this port as well. These allow to build proper ARP/IPv6 neighbor
> +          list on this port.
> +        </p>
> +      </li>
> +
>        <li>
>          Priority-90 flows for transit switches that forward registered
>          IP multicast traffic to their corresponding multicast group , which
> diff --git a/ovn-nb.xml b/ovn-nb.xml
> index 9552534f6..092195473 100644
> --- a/ovn-nb.xml
> +++ b/ovn-nb.xml
> @@ -3440,6 +3440,48 @@ or
>          </p>
>        </column>
>  
> +      <column name="options" key="routing-protocol-redirect"
> +              type='{"type": "string"}'>
> +        <p>
> +          NOTE: this feature is experimental and may be subject to
> +          removal/change in the future.
> +        </p>
> +        <p>
> +          This option expects a name of a Logical Switch Port that's present
> +          in the peer's Logical Switch. If set, it causes any traffic
> +          that's destined for Logical Router Port's IP addresses (including
> +          its IPv6 LLA) and the ports associated with routing protocols 
> defined
> +          ip <code>routing-protocols</code> option, to be redirected
> +          to the specified Logical Switch Port.
> +
> +          This allows external routing daemons to be bound to a port in OVN's
> +          Logical Switch and act as if they were listening on Logical Router
> +          Port's IP addresses.
> +        </p>
> +      </column>
> +
> +      <column name="options" key="routing-protocols" type='{"type": 
> "string"}'>
> +        <p>
> +          NOTE: this feature is experimental and may be subject to
> +          removal/change in the future.
> +        </p>
> +        <p>
> +          This option expects a comma-separated list of routing, and
> +          routing-related protocols, whose control plane traffic will be
> +          redirected to a port specified in
> +          <code>routing-protocol-redirect</code> option. Currently supported
> +          options are:
> +        </p>
> +        <ul>
> +          <li>
> +            <code>BGP</code> (forwards TCP port 179)
> +          </li>
> +          <li>
> +            <code>BFD</code> (forwards UDP port 3748)
> +          </li>
> +        <ul>

This should be </ul>.

The rest looks OK to me.  You can find the rebased version, including
these minor nits fixed here:

https://github.com/dceara/ovn/commits/review-pws418655-bgp-redirect-v5/

If the small changes I made look OK to you feel free to squash them in
and post v6 with my:

Acked-by: Dumitru Ceara <[email protected]>

Thanks,
Dumitru

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to