From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id CB54A1FF136 for ; Mon, 04 May 2026 18:27:16 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 9F2E9AF48; Mon, 4 May 2026 18:26:11 +0200 (CEST) From: Stefan Hanreich To: pve-devel@lists.proxmox.com Subject: [PATCH pve-network v2 12/18] tests: add rt_import test case when using multiple evpn controllers Date: Mon, 4 May 2026 18:24:51 +0200 Message-ID: <20260504162501.425135-13-s.hanreich@proxmox.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20260504162501.425135-1-s.hanreich@proxmox.com> References: <20260504162501.425135-1-s.hanreich@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Bm-Milter-Handled: 55990f41-d878-4baa-be0a-ee34c49e34d2 X-Bm-Transport-Timestamp: 1777911803405 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.659 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Message-ID-Hash: YS47MZEIVRVUPVR65U7A3AMEZZ3H4OQM X-Message-ID-Hash: YS47MZEIVRVUPVR65U7A3AMEZZ3H4OQM X-MailFrom: s.hanreich@proxmox.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.10 Precedence: list List-Id: Proxmox VE development discussion List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: When enabling multiple EVPN controllers, then the SDN stack filters outgoing routes to only include extended communities with VNIs that are explicitly configured as zones or vnets. In order to override this behavior (e.g. when importing routes from different sites that have other VNIs as well), rt-import can be used. In that case, only the route targets explicitly specified in rt-import are announced via the EVPN controller. Add a test case that checks proper FRR config generation for that case. Signed-off-by: Stefan Hanreich --- .../expected_controller_config | 92 +++++++++++++++++++ .../expected_sdn_interfaces | 41 +++++++++ .../interfaces | 11 +++ .../sdn_config | 60 ++++++++++++ 4 files changed, 204 insertions(+) create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_controller_config create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_sdn_interfaces create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/interfaces create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/sdn_config diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_controller_config b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_controller_config new file mode 100644 index 0000000..a30527c --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_controller_config @@ -0,0 +1,92 @@ +frr version 10.4.1 +frr defaults datacenter +hostname localhost +log syslog informational +service integrated-vtysh-config +! +vrf vrf_myzone + vni 1000 +exit-vrf +! +router bgp 65000 + bgp router-id 203.0.113.1 + no bgp default ipv4-unicast + coalesce-time 1000 + bgp disable-ebgp-connected-route-check + neighbor BGP peer-group + neighbor BGP remote-as external + neighbor BGP local-as 65001 no-prepend replace-as + neighbor BGP bfd + neighbor 198.51.100.10 peer-group BGP + neighbor VTEP peer-group + neighbor VTEP remote-as 65000 + neighbor VTEP bfd + neighbor VTEP update-source dummy1 + neighbor 203.0.113.2 peer-group VTEP + neighbor 203.0.113.4 peer-group VTEP + neighbor wan peer-group + neighbor wan remote-as external + neighbor wan bfd + neighbor wan update-source dummy1 + neighbor 203.0.113.100 peer-group wan + neighbor 203.0.113.101 peer-group wan + ! + address-family ipv4 unicast + network 203.0.113.1/32 + neighbor BGP activate + neighbor BGP soft-reconfiguration inbound + exit-address-family + ! + address-family l2vpn evpn + neighbor VTEP activate + neighbor VTEP route-map MAP_VTEP_IN in + neighbor VTEP route-map MAP_VTEP_OUT out + neighbor wan activate + neighbor wan route-map MAP_VTEP_IN_wan in + neighbor wan route-map MAP_VTEP_OUT_wan out + advertise-all-vni + exit-address-family +exit +! +router bgp 65000 vrf vrf_myzone + bgp router-id 203.0.113.1 + no bgp hard-administrative-reset + no bgp graceful-restart notification + ! + address-family l2vpn evpn + route-target import 65000:1000 + route-target import 65010:10000 + exit-address-family +exit +! +bgp extcommunity-list standard pve_controller_cluster permit rt 65000:1000 +bgp extcommunity-list standard pve_controller_cluster permit rt 65010:10000 +! +bgp extcommunity-list standard pve_controller_wan permit rt 65000:1000 +bgp extcommunity-list standard pve_controller_wan permit rt 65010:10000 +! +ip prefix-list loopbacks_ips seq 10 permit 0.0.0.0/0 le 32 +! +route-map MAP_VTEP_IN permit 1 +exit +! +route-map MAP_VTEP_IN_wan permit 1 +exit +! +route-map MAP_VTEP_OUT permit 1 + match extcommunity pve_controller_cluster any +exit +! +route-map MAP_VTEP_OUT_wan permit 1 + match extcommunity pve_controller_wan any +exit +! +route-map correct_src permit 1 + match ip address prefix-list loopbacks_ips + set src 203.0.113.1 +exit +! +ip protocol bgp route-map correct_src +! +line vty +! diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_sdn_interfaces b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_sdn_interfaces new file mode 100644 index 0000000..7481d36 --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/expected_sdn_interfaces @@ -0,0 +1,41 @@ +#version:1 + +auto myvnet +iface myvnet + address 10.0.0.1/24 + bridge_ports vxlan_myvnet + bridge_stp off + bridge_fd 0 + mtu 1450 + ip-forward on + arp-accept on + vrf vrf_myzone + +auto vrf_myzone +iface vrf_myzone + vrf-table auto + post-up ip route add vrf vrf_myzone unreachable default metric 4278198272 + +auto vrfbr_myzone +iface vrfbr_myzone + bridge-ports vrfvx_myzone + bridge_stp off + bridge_fd 0 + mtu 1450 + vrf vrf_myzone + +auto vrfvx_myzone +iface vrfvx_myzone + vxlan-id 1000 + vxlan-local-tunnelip 203.0.113.1 + bridge-learning off + bridge-arp-nd-suppress on + mtu 1450 + +auto vxlan_myvnet +iface vxlan_myvnet + vxlan-id 100 + vxlan-local-tunnelip 203.0.113.1 + bridge-learning off + bridge-arp-nd-suppress on + mtu 1450 diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/interfaces b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/interfaces new file mode 100644 index 0000000..1736ffb --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/interfaces @@ -0,0 +1,11 @@ +auto vmbr0 +iface vmbr0 inet static + address 198.51.100.1/24 + bridge-ports eth0 + bridge-stp off + bridge-fd 0 + +auto dummy1 +iface dummy1 inet static + address 203.0.113.1/32 + link-type dummy diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/sdn_config b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/sdn_config new file mode 100644 index 0000000..253cb69 --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import/sdn_config @@ -0,0 +1,60 @@ +{ + version => 1, + zones => { + ids => { + myzone => { + ipam => "pve", + type => "evpn", + controller => "cluster", + 'vrf-vxlan' => 1000, + 'secondary-controllers' => ['wan'], + 'rt-import' => '65000:1000,65010:10000' + } + }, + }, + vnets => { + ids => { + myvnet => { + tag => "100", + type => "vnet", + zone => "myzone" + }, + }, + }, + subnets => { + ids => { + 'myzone-10.0.0.0-24' => { + 'type' => 'subnet', + 'vnet' => 'myvnet', + 'gateway' => '10.0.0.1', + } + } + }, + controllers => { + ids => { + cluster => { + type => "evpn", + peers => '203.0.113.1,203.0.113.2,203.0.113.4', + asn => "65000", + 'bgp-mode' => 'internal', + }, + bgp => { + type => "bgp", + 'peers' => '198.51.100.10', + ebgp => "1", + asn => "65001", + loopback => 'dummy1', + node => "localhost", + }, + wan => { + type => "evpn", + peers => '203.0.113.100,203.0.113.101', + asn => "65000", + nodes => 'localhost', + 'bgp-mode' => 'external', + 'peer-group-name' => 'wan', + } + }, + } +} + -- 2.47.3