]> git.proxmox.com Git - mirror_frr.git/blobdiff - bgpd/bgp_evpn_vty.c
bgpd: partially revert e23b9ef6d271223d29c7f91a10d98aa6dcd252b3
[mirror_frr.git] / bgpd / bgp_evpn_vty.c
index 1e062528b27927541a4cd1e818d8d44c06925963..c6b08d1a2f65577228b7c1c21030a1ca3e284c50 100644 (file)
@@ -2661,16 +2661,10 @@ static void evpn_unset_advertise_default_gw(struct bgp *bgp,
  * evpn - enable advertisement of default g/w
  */
 static void evpn_process_default_originate_cmd(struct bgp *bgp_vrf,
-                                              afi_t afi, int add)
+                                              afi_t afi, bool add)
 {
-       struct prefix ip_prefix;
        safi_t safi = SAFI_UNICAST; /* ipv4/ipv6 unicast */
 
-       /* form the default prefix 0.0.0.0/0 */
-       memset(&ip_prefix, 0, sizeof(struct prefix));
-       ip_prefix.family = afi2family(afi);
-       ip_prefix.prefixlen = 0;
-
        if (add) {
                /* bail if we are already advertising default route */
                if (evpn_default_originate_set(bgp_vrf, afi, safi))
@@ -2682,8 +2676,6 @@ static void evpn_process_default_originate_cmd(struct bgp *bgp_vrf,
                else if (afi == AFI_IP6)
                        SET_FLAG(bgp_vrf->af_flags[AFI_L2VPN][SAFI_EVPN],
                                 BGP_L2VPN_EVPN_DEFAULT_ORIGINATE_IPV6);
-               bgp_evpn_advertise_type5_route(bgp_vrf, &ip_prefix,
-                                              NULL, afi, safi);
        } else {
                /* bail out if we havent advertised the default route */
                if (!evpn_default_originate_set(bgp_vrf, afi, safi))
@@ -2694,9 +2686,9 @@ static void evpn_process_default_originate_cmd(struct bgp *bgp_vrf,
                else if (afi == AFI_IP6)
                        UNSET_FLAG(bgp_vrf->af_flags[AFI_L2VPN][SAFI_EVPN],
                                   BGP_L2VPN_EVPN_DEFAULT_ORIGINATE_IPV6);
-               bgp_evpn_withdraw_type5_route(bgp_vrf, &ip_prefix,
-                                             afi, safi);
        }
+
+       bgp_evpn_install_uninstall_default_route(bgp_vrf, afi, safi, add);
 }
 
 /*
@@ -2976,7 +2968,7 @@ DEFUN (bgp_evpn_default_originate,
        if (!bgp_vrf)
                return CMD_WARNING;
        argv_find_and_parse_afi(argv, argc, &idx_afi, &afi);
-       evpn_process_default_originate_cmd(bgp_vrf, afi, 1);
+       evpn_process_default_originate_cmd(bgp_vrf, afi, true);
        return CMD_SUCCESS;
 }
 
@@ -2995,7 +2987,131 @@ DEFUN (no_bgp_evpn_default_originate,
        if (!bgp_vrf)
                return CMD_WARNING;
        argv_find_and_parse_afi(argv, argc, &idx_afi, &afi);
-       evpn_process_default_originate_cmd(bgp_vrf, afi, 0);
+       evpn_process_default_originate_cmd(bgp_vrf, afi, false);
+       return CMD_SUCCESS;
+}
+
+DEFPY (dup_addr_detection,
+       dup_addr_detection_cmd,
+       "dup-addr-detection [max-moves (2-1000)$max_moves_val time (2-1800)$time_val]",
+       "Duplicate address detection\n"
+       "Max allowed moves before address detected as duplicate\n"
+       "Num of max allowed moves (2-1000) default 5\n"
+       "Duplicate address detection time\n"
+       "Time in seconds (2-1800) default 180\n")
+{
+       struct bgp *bgp_vrf = VTY_GET_CONTEXT(bgp);
+
+       if (!bgp_vrf)
+               return CMD_WARNING;
+
+       bgp_vrf->evpn_info->dup_addr_detect = true;
+
+       if (time_val)
+               bgp_vrf->evpn_info->dad_time = time_val;
+       if (max_moves_val)
+               bgp_vrf->evpn_info->dad_max_moves = max_moves_val;
+
+       bgp_zebra_dup_addr_detection(bgp_vrf);
+
+       return CMD_SUCCESS;
+}
+
+DEFPY (dup_addr_detection_auto_recovery,
+       dup_addr_detection_auto_recovery_cmd,
+       "dup-addr-detection freeze <permanent |(30-3600)$freeze_time_val>",
+       "Duplicate address detection\n"
+       "Duplicate address detection freeze\n"
+       "Duplicate address detection permanent freeze\n"
+       "Duplicate address detection freeze time (30-3600)\n")
+{
+       struct bgp *bgp_vrf = VTY_GET_CONTEXT(bgp);
+       uint32_t freeze_time = freeze_time_val;
+
+       if (!bgp_vrf)
+               return CMD_WARNING;
+
+       bgp_vrf->evpn_info->dup_addr_detect = true;
+       bgp_vrf->evpn_info->dad_freeze = true;
+       bgp_vrf->evpn_info->dad_freeze_time = freeze_time;
+
+       bgp_zebra_dup_addr_detection(bgp_vrf);
+
+       return CMD_SUCCESS;
+}
+
+DEFPY (no_dup_addr_detection,
+       no_dup_addr_detection_cmd,
+       "no dup-addr-detection [max-moves (2-1000)$max_moves_val time (2-1800)$time_val | freeze <permanent$permanent_val | (30-3600)$freeze_time_val>]",
+       NO_STR
+       "Duplicate address detection\n"
+       "Max allowed moves before address detected as duplicate\n"
+       "Num of max allowed moves (2-1000) default 5\n"
+       "Duplicate address detection time\n"
+       "Time in seconds (2-1800) default 180\n"
+       "Duplicate address detection freeze\n"
+       "Duplicate address detection permanent freeze\n"
+       "Duplicate address detection freeze time (30-3600)\n")
+{
+       struct bgp *bgp_vrf = VTY_GET_CONTEXT(bgp);
+       uint32_t max_moves = (uint32_t)max_moves_val;
+       uint32_t freeze_time = (uint32_t)freeze_time_val;
+
+       if (!bgp_vrf)
+               return CMD_WARNING;
+
+       if (argc == 2) {
+               if (!bgp_vrf->evpn_info->dup_addr_detect)
+                       return CMD_SUCCESS;
+               /* Reset all parameters to default. */
+               bgp_vrf->evpn_info->dup_addr_detect = false;
+               bgp_vrf->evpn_info->dad_time = EVPN_DAD_DEFAULT_TIME;
+               bgp_vrf->evpn_info->dad_max_moves = EVPN_DAD_DEFAULT_MAX_MOVES;
+               bgp_vrf->evpn_info->dad_freeze = false;
+               bgp_vrf->evpn_info->dad_freeze_time = 0;
+       } else {
+               if (max_moves) {
+                       if (bgp_vrf->evpn_info->dad_max_moves != max_moves) {
+                               vty_out(vty,
+                               "%% Value does not match with config\n");
+                               return CMD_SUCCESS;
+                       }
+                       bgp_vrf->evpn_info->dad_max_moves =
+                               EVPN_DAD_DEFAULT_MAX_MOVES;
+               }
+
+               if (time_val) {
+                       if (bgp_vrf->evpn_info->dad_time != time_val) {
+                               vty_out(vty,
+                               "%% Value does not match with config\n");
+                               return CMD_SUCCESS;
+                       }
+                       bgp_vrf->evpn_info->dad_time = EVPN_DAD_DEFAULT_TIME;
+               }
+
+               if (freeze_time) {
+                       if (bgp_vrf->evpn_info->dad_freeze_time
+                           != freeze_time) {
+                               vty_out(vty,
+                               "%% Value does not match with config\n");
+                               return CMD_SUCCESS;
+                       }
+                       bgp_vrf->evpn_info->dad_freeze_time = 0;
+                       bgp_vrf->evpn_info->dad_freeze = false;
+               }
+
+               if (permanent_val) {
+                       if (bgp_vrf->evpn_info->dad_freeze_time) {
+                               vty_out(vty,
+                               "%% Value does not match with config\n");
+                               return CMD_SUCCESS;
+                       }
+                       bgp_vrf->evpn_info->dad_freeze = false;
+               }
+       }
+
+       bgp_zebra_dup_addr_detection(bgp_vrf);
+
        return CMD_SUCCESS;
 }
 
@@ -4919,6 +5035,26 @@ void bgp_config_write_evpn_info(struct vty *vty, struct bgp *bgp, afi_t afi,
        if (bgp->advertise_gw_macip)
                vty_out(vty, "  advertise-default-gw\n");
 
+       if (!bgp->evpn_info->dup_addr_detect)
+               vty_out(vty, "  no dup-addr-detection\n");
+
+       if (bgp->evpn_info->dad_max_moves !=
+               EVPN_DAD_DEFAULT_MAX_MOVES ||
+               bgp->evpn_info->dad_time != EVPN_DAD_DEFAULT_TIME)
+               vty_out(vty, "  dup-addr-detection max-moves %u time %u\n",
+                       bgp->evpn_info->dad_max_moves,
+                       bgp->evpn_info->dad_time);
+
+       if (bgp->evpn_info->dad_freeze) {
+               if (bgp->evpn_info->dad_freeze_time)
+                       vty_out(vty,
+                               "  dup-addr-detection freeze %u\n",
+                               bgp->evpn_info->dad_freeze_time);
+               else
+                       vty_out(vty,
+                               "  dup-addr-detection freeze permanent\n");
+       }
+
        if (bgp->vxlan_flood_ctrl == VXLAN_FLOOD_DISABLED)
                vty_out(vty, "  flooding disable\n");
 
@@ -5013,6 +5149,9 @@ void bgp_ethernetvpn_init(void)
        install_element(BGP_EVPN_NODE, &no_bgp_evpn_advertise_type5_cmd);
        install_element(BGP_EVPN_NODE, &bgp_evpn_default_originate_cmd);
        install_element(BGP_EVPN_NODE, &no_bgp_evpn_default_originate_cmd);
+       install_element(BGP_EVPN_NODE, &dup_addr_detection_cmd);
+       install_element(BGP_EVPN_NODE, &dup_addr_detection_auto_recovery_cmd);
+       install_element(BGP_EVPN_NODE, &no_dup_addr_detection_cmd);
        install_element(BGP_EVPN_NODE, &bgp_evpn_flood_control_cmd);
 
        /* test commands */