1 package PVE
::Network
::SDN
::Controllers
::EvpnPlugin
;
7 use PVE
::JSONSchema
qw(get_standard_option);
8 use PVE
::Tools
qw(run_command file_set_contents file_get_contents);
10 use PVE
::Network
::SDN
::Controllers
::Plugin
;
11 use PVE
::Network
::SDN
::Zones
::Plugin
;
14 use base
('PVE::Network::SDN::Controllers::Plugin');
24 description
=> "autonomous system number",
27 description
=> "peers address list.",
28 type
=> 'string', format
=> 'ip-list'
35 'asn' => { optional
=> 0 },
36 'peers' => { optional
=> 0 },
40 # Plugin implementation
41 sub generate_controller_config
{
42 my ($class, $plugin_config, $controller_cfg, $id, $uplinks, $config) = @_;
45 @peers = PVE
::Tools
::split_list
($plugin_config->{'peers'}) if $plugin_config->{'peers'};
47 my $local_node = PVE
::INotify
::nodename
();
49 my $asn = $plugin_config->{asn
};
53 my $bgprouter = find_bgp_controller
($local_node, $controller_cfg);
55 $ebgp = 1 if $plugin_config->{'asn'} ne $bgprouter->{asn
};
56 $loopback = $bgprouter->{loopback
} if $bgprouter->{loopback
};
57 $asn = $bgprouter->{asn
} if $bgprouter->{asn
};
58 $autortas = $plugin_config->{'asn'} if $ebgp;
63 my $bgp = $config->{frr
}->{router
}->{"bgp $asn"} //= {};
65 my ($ifaceip, $interface) = PVE
::Network
::SDN
::Zones
::Plugin
::find_local_ip_interface_peers
(\
@peers, $loopback);
67 my $remoteas = $ebgp ?
"external" : $asn;
70 my @controller_config = (
71 "bgp router-id $ifaceip",
72 "no bgp default ipv4-unicast",
76 push(@{$bgp->{""}}, @controller_config) if keys %{$bgp} == 0;
78 @controller_config = ();
81 push @controller_config, "neighbor VTEP peer-group";
82 push @controller_config, "neighbor VTEP remote-as $remoteas";
83 push @controller_config, "neighbor VTEP bfd";
85 if($ebgp && $loopback) {
86 push @controller_config, "neighbor VTEP ebgp-multihop 10";
87 push @controller_config, "neighbor VTEP update-source $loopback";
91 foreach my $address (@peers) {
92 next if $address eq $ifaceip;
93 push @controller_config, "neighbor $address peer-group VTEP";
96 push(@{$bgp->{""}}, @controller_config);
98 # address-family l2vpn
99 @controller_config = ();
100 push @controller_config, "neighbor VTEP activate";
101 push @controller_config, "advertise-all-vni";
102 push @controller_config, "autort as $autortas" if $autortas;
103 push(@{$bgp->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
108 sub generate_controller_zone_config
{
109 my ($class, $plugin_config, $controller, $controller_cfg, $id, $uplinks, $config) = @_;
111 my $local_node = PVE
::INotify
::nodename
();
114 my $vrfvxlan = $plugin_config->{'vrf-vxlan'};
115 my $exitnodes = $plugin_config->{'exitnodes'};
116 my $advertisesubnets = $plugin_config->{'advertise-subnets'};
118 my $asn = $controller->{asn
};
120 my $loopback = undef;
121 my $autortas = undef;
122 my $bgprouter = find_bgp_controller
($local_node, $controller_cfg);
124 $ebgp = 1 if $controller->{'asn'} ne $bgprouter->{asn
};
125 $loopback = $bgprouter->{loopback
} if $bgprouter->{loopback
};
126 $asn = $bgprouter->{asn
} if $bgprouter->{asn
};
127 $autortas = $controller->{'asn'} if $ebgp;
130 return if !$vrf || !$vrfvxlan || !$asn;
133 my @controller_config = ();
134 push @controller_config, "vni $vrfvxlan";
135 push(@{$config->{frr
}->{vrf
}->{"$vrf"}}, @controller_config);
138 @controller_config = ();
139 push @controller_config, "no bgp ebgp-requires-policy" if $ebgp;
140 # push @controller_config, "!";
141 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{""}}, @controller_config);
144 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, "route-target import $autortas:$vrfvxlan");
145 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, "route-target export $autortas:$vrfvxlan");
148 my $is_gateway = $exitnodes->{$local_node};
152 @controller_config = ();
153 #import /32 routes of evpn network from vrf1 to default vrf (for packet return)
154 push @controller_config, "import vrf $vrf";
155 push(@{$config->{frr
}->{router
}->{"bgp $asn"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
156 push(@{$config->{frr
}->{router
}->{"bgp $asn"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
158 @controller_config = ();
159 #redistribute connected to be able to route to local vms on the gateway
160 push @controller_config, "redistribute connected";
161 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
162 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
164 @controller_config = ();
165 #add default originate to announce 0.0.0.0/0 type5 route in evpn
166 push @controller_config, "default-originate ipv4";
167 push @controller_config, "default-originate ipv6";
168 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
169 } elsif ($advertisesubnets) {
171 @controller_config = ();
172 #redistribute connected networks
173 push @controller_config, "redistribute connected";
174 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
175 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
177 @controller_config = ();
178 #advertise connected networks type5 route in evpn
179 push @controller_config, "advertise ipv4 unicast";
180 push @controller_config, "advertise ipv6 unicast";
181 push(@{$config->{frr
}->{router
}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
188 my ($class, $controllerid, $zone_cfg) = @_;
190 # verify that zone is associated to this controller
191 foreach my $id (keys %{$zone_cfg->{ids
}}) {
192 my $zone = $zone_cfg->{ids
}->{$id};
193 die "controller $controllerid is used by $id"
194 if (defined($zone->{controller
}) && $zone->{controller
} eq $controllerid);
199 my ($class, $controllerid, $controller_cfg) = @_;
201 # we can only have 1 evpn controller / 1 asn by server
203 my $controllernb = 0;
204 foreach my $id (keys %{$controller_cfg->{ids
}}) {
205 next if $id eq $controllerid;
206 my $controller = $controller_cfg->{ids
}->{$id};
207 next if $controller->{type
} ne "evpn";
209 die "only 1 global evpn controller can be defined" if $controllernb > 1;
213 sub find_bgp_controller
{
214 my ($nodename, $controller_cfg) = @_;
216 my $controller = undef;
217 foreach my $id (keys %{$controller_cfg->{ids
}}) {
218 $controller = $controller_cfg->{ids
}->{$id};
219 next if $controller->{type
} ne 'bgp';
220 next if $controller->{node
} ne $nodename;
228 sub sort_frr_config
{
232 $order->{'ipv4 unicast'} = 1;
233 $order->{'ipv6 unicast'} = 2;
234 $order->{'l2vpn evpn'} = 3;
239 $a_val = $order->{$a} if defined($order->{$a});
240 $b_val = $order->{$b} if defined($order->{$b});
242 if ($a =~ /bgp (\d+)$/) {
246 if ($b =~ /bgp (\d+)$/) {
250 return $a_val <=> $b_val;
253 sub generate_frr_recurse
{
254 my ($final_config, $content, $parentkey, $level) = @_;
258 $keylist->{'address-family'} = 1;
259 $keylist->{router
} = 1;
261 my $exitkeylist = {};
262 $exitkeylist->{vrf
} = 1;
263 $exitkeylist->{'address-family'} = 1;
265 # FIXME: make this generic
266 my $paddinglevel = undef;
267 if ($level == 1 || $level == 2) {
268 $paddinglevel = $level - 1;
269 } elsif ($level == 3 || $level == 4) {
270 $paddinglevel = $level - 2;
274 $padding = ' ' x
($paddinglevel) if $paddinglevel;
276 if (ref $content eq 'HASH') {
277 foreach my $key (sort sort_frr_config
keys %$content) {
278 if ($parentkey && defined($keylist->{$parentkey})) {
279 push @{$final_config}, $padding."!";
280 push @{$final_config}, $padding."$parentkey $key";
281 } elsif ($key ne '' && !defined($keylist->{$key})) {
282 push @{$final_config}, $padding."$key";
285 my $option = $content->{$key};
286 generate_frr_recurse
($final_config, $option, $key, $level+1);
288 push @{$final_config}, $padding."exit-$parentkey" if $parentkey && defined($exitkeylist->{$parentkey});
292 if (ref $content eq 'ARRAY') {
293 push @{$final_config}, map { $padding . "$_" } @$content;
297 sub generate_controller_rawconfig
{
298 my ($class, $plugin_config, $config) = @_;
300 my $nodename = PVE
::INotify
::nodename
();
302 my $final_config = [];
303 push @{$final_config}, "log syslog informational";
304 push @{$final_config}, "ip forwarding";
305 push @{$final_config}, "ipv6 forwarding";
306 push @{$final_config}, "frr defaults datacenter";
307 push @{$final_config}, "service integrated-vtysh-config";
308 push @{$final_config}, "hostname $nodename";
309 push @{$final_config}, "!";
311 if (-e
"/etc/frr/frr.conf.local") {
312 generate_frr_recurse
($final_config, $config->{frr
}->{vrf
}, "vrf", 1);
313 push @{$final_config}, "!";
315 my $local_conf = file_get_contents
("/etc/frr/frr.conf.local");
317 push @{$final_config}, $local_conf;
319 generate_frr_recurse
($final_config, $config->{frr
}, undef, 0);
322 push @{$final_config}, "!";
323 push @{$final_config}, "line vty";
324 push @{$final_config}, "!";
326 my $rawconfig = join("\n", @{$final_config});
328 return if !$rawconfig;
332 sub write_controller_config
{
333 my ($class, $plugin_config, $config) = @_;
335 my $rawconfig = $class->generate_controller_rawconfig($plugin_config, $config);
336 return if !$rawconfig;
337 return if !-d
"/etc/frr";
339 file_set_contents
("/etc/frr/frr.conf", $rawconfig);
342 sub reload_controller
{
345 my $conf_file = "/etc/frr/frr.conf";
346 my $bin_path = "/usr/lib/frr/frr-reload.py";
349 warn "missing $bin_path. Please install frr-pythontools package";
355 if ($line =~ /ERROR:/) {
360 if (-e
$conf_file && -e
$bin_path) {
361 run_command
([$bin_path, '--stdout', '--reload', $conf_file], outfunc
=> {}, errfunc
=> $err);