]> git.proxmox.com Git - pve-network.git/blob - PVE/Network/SDN/Controllers/EvpnPlugin.pm
evpn : add advertise-subnets option
[pve-network.git] / PVE / Network / SDN / Controllers / EvpnPlugin.pm
1 package PVE::Network::SDN::Controllers::EvpnPlugin;
2
3 use strict;
4 use warnings;
5
6 use PVE::INotify;
7 use PVE::JSONSchema qw(get_standard_option);
8 use PVE::Tools qw(run_command file_set_contents file_get_contents);
9
10 use PVE::Network::SDN::Controllers::Plugin;
11 use PVE::Network::SDN::Zones::Plugin;
12 use Net::IP;
13
14 use base('PVE::Network::SDN::Controllers::Plugin');
15
16 sub type {
17 return 'evpn';
18 }
19
20 sub properties {
21 return {
22 asn => {
23 type => 'integer',
24 description => "autonomous system number",
25 },
26 peers => {
27 description => "peers address list.",
28 type => 'string', format => 'ip-list'
29 },
30 };
31 }
32
33 sub options {
34 return {
35 'asn' => { optional => 0 },
36 'peers' => { optional => 0 },
37 };
38 }
39
40 # Plugin implementation
41 sub generate_controller_config {
42 my ($class, $plugin_config, $controller_cfg, $id, $uplinks, $config) = @_;
43
44 my @peers;
45 @peers = PVE::Tools::split_list($plugin_config->{'peers'}) if $plugin_config->{'peers'};
46
47 my $local_node = PVE::INotify::nodename();
48
49 my $asn = $plugin_config->{asn};
50 my $ebgp = undef;
51 my $loopback = undef;
52 my $autortas = undef;
53 my $bgprouter = find_bgp_controller($local_node, $controller_cfg);
54 if($bgprouter) {
55 $ebgp = 1 if $plugin_config->{'asn'} ne $bgprouter->{asn};
56 $loopback = $bgprouter->{loopback} if $bgprouter->{loopback};
57 $asn = $bgprouter->{asn} if $bgprouter->{asn};
58 $autortas = $plugin_config->{'asn'} if $ebgp;
59 }
60
61 return if !$asn;
62
63 my $bgp = $config->{frr}->{router}->{"bgp $asn"} //= {};
64
65 my ($ifaceip, $interface) = PVE::Network::SDN::Zones::Plugin::find_local_ip_interface_peers(\@peers, $loopback);
66
67 my $remoteas = $ebgp ? "external" : $asn;
68
69 #global options
70 my @controller_config = (
71 "bgp router-id $ifaceip",
72 "no bgp default ipv4-unicast",
73 "coalesce-time 1000",
74 );
75
76 push(@{$bgp->{""}}, @controller_config) if keys %{$bgp} == 0;
77
78 @controller_config = ();
79
80 #VTEP neighbors
81 push @controller_config, "neighbor VTEP peer-group";
82 push @controller_config, "neighbor VTEP remote-as $remoteas";
83 push @controller_config, "neighbor VTEP bfd";
84
85 if($ebgp && $loopback) {
86 push @controller_config, "neighbor VTEP ebgp-multihop 10";
87 push @controller_config, "neighbor VTEP update-source $loopback";
88 }
89
90 # VTEP peers
91 foreach my $address (@peers) {
92 next if $address eq $ifaceip;
93 push @controller_config, "neighbor $address peer-group VTEP";
94 }
95
96 push(@{$bgp->{""}}, @controller_config);
97
98 # address-family l2vpn
99 @controller_config = ();
100 push @controller_config, "neighbor VTEP activate";
101 push @controller_config, "advertise-all-vni";
102 push @controller_config, "autort as $autortas" if $autortas;
103 push(@{$bgp->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
104
105 return $config;
106 }
107
108 sub generate_controller_zone_config {
109 my ($class, $plugin_config, $controller, $controller_cfg, $id, $uplinks, $config) = @_;
110
111 my $local_node = PVE::INotify::nodename();
112
113 my $vrf = "vrf_$id";
114 my $vrfvxlan = $plugin_config->{'vrf-vxlan'};
115 my $exitnodes = $plugin_config->{'exitnodes'};
116 my $advertisesubnets = $plugin_config->{'advertise-subnets'};
117
118 my $asn = $controller->{asn};
119 my $ebgp = undef;
120 my $loopback = undef;
121 my $autortas = undef;
122 my $bgprouter = find_bgp_controller($local_node, $controller_cfg);
123 if($bgprouter) {
124 $ebgp = 1 if $controller->{'asn'} ne $bgprouter->{asn};
125 $loopback = $bgprouter->{loopback} if $bgprouter->{loopback};
126 $asn = $bgprouter->{asn} if $bgprouter->{asn};
127 $autortas = $controller->{'asn'} if $ebgp;
128 }
129
130 return if !$vrf || !$vrfvxlan || !$asn;
131
132 # vrf
133 my @controller_config = ();
134 push @controller_config, "vni $vrfvxlan";
135 push(@{$config->{frr}->{vrf}->{"$vrf"}}, @controller_config);
136
137 #main vrf router
138 @controller_config = ();
139 push @controller_config, "no bgp ebgp-requires-policy" if $ebgp;
140 # push @controller_config, "!";
141 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{""}}, @controller_config);
142
143 if ($autortas) {
144 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, "route-target import $autortas:$vrfvxlan");
145 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, "route-target export $autortas:$vrfvxlan");
146 }
147
148 my $is_gateway = $exitnodes->{$local_node};
149
150 if ($is_gateway) {
151
152 @controller_config = ();
153 #import /32 routes of evpn network from vrf1 to default vrf (for packet return)
154 push @controller_config, "import vrf $vrf";
155 push(@{$config->{frr}->{router}->{"bgp $asn"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
156 push(@{$config->{frr}->{router}->{"bgp $asn"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
157
158 @controller_config = ();
159 #redistribute connected to be able to route to local vms on the gateway
160 push @controller_config, "redistribute connected";
161 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
162 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
163
164 @controller_config = ();
165 #add default originate to announce 0.0.0.0/0 type5 route in evpn
166 push @controller_config, "default-originate ipv4";
167 push @controller_config, "default-originate ipv6";
168 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
169 } elsif ($advertisesubnets) {
170
171 @controller_config = ();
172 #redistribute connected networks
173 push @controller_config, "redistribute connected";
174 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
175 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
176
177 @controller_config = ();
178 #advertise connected networks type5 route in evpn
179 push @controller_config, "advertise ipv4 unicast";
180 push @controller_config, "advertise ipv6 unicast";
181 push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
182 }
183
184 return $config;
185 }
186
187 sub on_delete_hook {
188 my ($class, $controllerid, $zone_cfg) = @_;
189
190 # verify that zone is associated to this controller
191 foreach my $id (keys %{$zone_cfg->{ids}}) {
192 my $zone = $zone_cfg->{ids}->{$id};
193 die "controller $controllerid is used by $id"
194 if (defined($zone->{controller}) && $zone->{controller} eq $controllerid);
195 }
196 }
197
198 sub on_update_hook {
199 my ($class, $controllerid, $controller_cfg) = @_;
200
201 # we can only have 1 evpn controller / 1 asn by server
202
203 my $controllernb = 0;
204 foreach my $id (keys %{$controller_cfg->{ids}}) {
205 next if $id eq $controllerid;
206 my $controller = $controller_cfg->{ids}->{$id};
207 next if $controller->{type} ne "evpn";
208 $controllernb++;
209 die "only 1 global evpn controller can be defined" if $controllernb > 1;
210 }
211 }
212
213 sub find_bgp_controller {
214 my ($nodename, $controller_cfg) = @_;
215
216 my $controller = undef;
217 foreach my $id (keys %{$controller_cfg->{ids}}) {
218 $controller = $controller_cfg->{ids}->{$id};
219 next if $controller->{type} ne 'bgp';
220 next if $controller->{node} ne $nodename;
221 last;
222 }
223
224 return $controller;
225 }
226
227
228 sub sort_frr_config {
229 my $order = {};
230 $order->{''} = 0;
231 $order->{'vrf'} = 1;
232 $order->{'ipv4 unicast'} = 1;
233 $order->{'ipv6 unicast'} = 2;
234 $order->{'l2vpn evpn'} = 3;
235
236 my $a_val = 100;
237 my $b_val = 100;
238
239 $a_val = $order->{$a} if defined($order->{$a});
240 $b_val = $order->{$b} if defined($order->{$b});
241
242 if ($a =~ /bgp (\d+)$/) {
243 $a_val = 2;
244 }
245
246 if ($b =~ /bgp (\d+)$/) {
247 $b_val = 2;
248 }
249
250 return $a_val <=> $b_val;
251 }
252
253 sub generate_frr_recurse{
254 my ($final_config, $content, $parentkey, $level) = @_;
255
256 my $keylist = {};
257 $keylist->{vrf} = 1;
258 $keylist->{'address-family'} = 1;
259 $keylist->{router} = 1;
260
261 my $exitkeylist = {};
262 $exitkeylist->{vrf} = 1;
263 $exitkeylist->{'address-family'} = 1;
264
265 # FIXME: make this generic
266 my $paddinglevel = undef;
267 if ($level == 1 || $level == 2) {
268 $paddinglevel = $level - 1;
269 } elsif ($level == 3 || $level == 4) {
270 $paddinglevel = $level - 2;
271 }
272
273 my $padding = "";
274 $padding = ' ' x ($paddinglevel) if $paddinglevel;
275
276 if (ref $content eq 'HASH') {
277 foreach my $key (sort sort_frr_config keys %$content) {
278 if ($parentkey && defined($keylist->{$parentkey})) {
279 push @{$final_config}, $padding."!";
280 push @{$final_config}, $padding."$parentkey $key";
281 } elsif ($key ne '' && !defined($keylist->{$key})) {
282 push @{$final_config}, $padding."$key";
283 }
284
285 my $option = $content->{$key};
286 generate_frr_recurse($final_config, $option, $key, $level+1);
287
288 push @{$final_config}, $padding."exit-$parentkey" if $parentkey && defined($exitkeylist->{$parentkey});
289 }
290 }
291
292 if (ref $content eq 'ARRAY') {
293 push @{$final_config}, map { $padding . "$_" } @$content;
294 }
295 }
296
297 sub generate_controller_rawconfig {
298 my ($class, $plugin_config, $config) = @_;
299
300 my $nodename = PVE::INotify::nodename();
301
302 my $final_config = [];
303 push @{$final_config}, "log syslog informational";
304 push @{$final_config}, "ip forwarding";
305 push @{$final_config}, "ipv6 forwarding";
306 push @{$final_config}, "frr defaults datacenter";
307 push @{$final_config}, "service integrated-vtysh-config";
308 push @{$final_config}, "hostname $nodename";
309 push @{$final_config}, "!";
310
311 if (-e "/etc/frr/frr.conf.local") {
312 generate_frr_recurse($final_config, $config->{frr}->{vrf}, "vrf", 1);
313 push @{$final_config}, "!";
314
315 my $local_conf = file_get_contents("/etc/frr/frr.conf.local");
316 chomp ($local_conf);
317 push @{$final_config}, $local_conf;
318 } else {
319 generate_frr_recurse($final_config, $config->{frr}, undef, 0);
320 }
321
322 push @{$final_config}, "!";
323 push @{$final_config}, "line vty";
324 push @{$final_config}, "!";
325
326 my $rawconfig = join("\n", @{$final_config});
327
328 return if !$rawconfig;
329 return $rawconfig;
330 }
331
332 sub write_controller_config {
333 my ($class, $plugin_config, $config) = @_;
334
335 my $rawconfig = $class->generate_controller_rawconfig($plugin_config, $config);
336 return if !$rawconfig;
337 return if !-d "/etc/frr";
338
339 file_set_contents("/etc/frr/frr.conf", $rawconfig);
340 }
341
342 sub reload_controller {
343 my ($class) = @_;
344
345 my $conf_file = "/etc/frr/frr.conf";
346 my $bin_path = "/usr/lib/frr/frr-reload.py";
347
348 if (!-e $bin_path) {
349 warn "missing $bin_path. Please install frr-pythontools package";
350 return;
351 }
352
353 my $err = sub {
354 my $line = shift;
355 if ($line =~ /ERROR:/) {
356 warn "$line \n";
357 }
358 };
359
360 if (-e $conf_file && -e $bin_path) {
361 run_command([$bin_path, '--stdout', '--reload', $conf_file], outfunc => {}, errfunc => $err);
362 }
363 }
364
365 1;
366
367