From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id B2DEE1FF136 for ; Mon, 04 May 2026 18:26:20 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 2958A9D52; Mon, 4 May 2026 18:25:43 +0200 (CEST) From: Stefan Hanreich To: pve-devel@lists.proxmox.com Subject: [PATCH pve-network v2 13/18] tests: add rt_import test case when using multiple evpn controllers Date: Mon, 4 May 2026 18:24:52 +0200 Message-ID: <20260504162501.425135-14-s.hanreich@proxmox.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20260504162501.425135-1-s.hanreich@proxmox.com> References: <20260504162501.425135-1-s.hanreich@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Bm-Milter-Handled: 55990f41-d878-4baa-be0a-ee34c49e34d2 X-Bm-Transport-Timestamp: 1777911803466 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.658 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Message-ID-Hash: PVCCV5Q6HHTATTOFGOI5CU7RAIJZDRJX X-Message-ID-Hash: PVCCV5Q6HHTATTOFGOI5CU7RAIJZDRJX X-MailFrom: s.hanreich@proxmox.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.10 Precedence: list List-Id: Proxmox VE development discussion List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: When enabling multiple EVPN controllers, then the SDN stack filters outgoing routes to only include extended communities with VNIs that are explicitly configured as zones or vnets. In order to override this behavior (e.g. when importing routes from different sites that have other VNIs as well), rt-import can be used. In that case, only the route targets explicitly specified in rt-import are announced via the EVPN controller. Add a test case that checks proper FRR config generation if an EVPN controller has a zone with rt-import set, and another zone without rt-import set. Signed-off-by: Stefan Hanreich --- .../expected_controller_config | 106 ++++++++++++++++++ .../expected_sdn_interfaces | 81 +++++++++++++ .../interfaces | 11 ++ .../sdn_config | 77 +++++++++++++ 4 files changed, 275 insertions(+) create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_controller_config create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_sdn_interfaces create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/interfaces create mode 100644 src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/sdn_config diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_controller_config b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_controller_config new file mode 100644 index 0000000..68f9c3b --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_controller_config @@ -0,0 +1,106 @@ +frr version 10.4.1 +frr defaults datacenter +hostname localhost +log syslog informational +service integrated-vtysh-config +! +vrf vrf_myzone + vni 1000 +exit-vrf +! +vrf vrf_myzone2 + vni 2000 +exit-vrf +! +router bgp 65000 + bgp router-id 203.0.113.1 + no bgp default ipv4-unicast + coalesce-time 1000 + bgp disable-ebgp-connected-route-check + neighbor BGP peer-group + neighbor BGP remote-as external + neighbor BGP local-as 65001 no-prepend replace-as + neighbor BGP bfd + neighbor 198.51.100.10 peer-group BGP + neighbor VTEP peer-group + neighbor VTEP remote-as 65000 + neighbor VTEP bfd + neighbor VTEP update-source dummy1 + neighbor 203.0.113.2 peer-group VTEP + neighbor 203.0.113.4 peer-group VTEP + neighbor wan peer-group + neighbor wan remote-as external + neighbor wan bfd + neighbor wan update-source dummy1 + neighbor 203.0.113.100 peer-group wan + neighbor 203.0.113.101 peer-group wan + ! + address-family ipv4 unicast + network 203.0.113.1/32 + neighbor BGP activate + neighbor BGP soft-reconfiguration inbound + exit-address-family + ! + address-family l2vpn evpn + neighbor VTEP activate + neighbor VTEP route-map MAP_VTEP_IN in + neighbor VTEP route-map MAP_VTEP_OUT out + neighbor wan activate + neighbor wan route-map MAP_VTEP_IN_wan in + neighbor wan route-map MAP_VTEP_OUT_wan out + advertise-all-vni + exit-address-family +exit +! +router bgp 65000 vrf vrf_myzone + bgp router-id 203.0.113.1 + no bgp hard-administrative-reset + no bgp graceful-restart notification +exit +! +router bgp 65000 vrf vrf_myzone2 + bgp router-id 203.0.113.1 + no bgp hard-administrative-reset + no bgp graceful-restart notification + ! + address-family l2vpn evpn + route-target import 65000:2000 + route-target import 65010:20000 + exit-address-family +exit +! +bgp extcommunity-list expanded pve_controller_cluster permit ^RT:.*:1000$ +bgp extcommunity-list expanded pve_controller_cluster permit ^RT:65000:2000$ +bgp extcommunity-list expanded pve_controller_cluster permit ^RT:65010:20000$ +bgp extcommunity-list expanded pve_controller_cluster permit ^RT:.*:100$ +! +bgp extcommunity-list expanded pve_controller_wan permit ^RT:.*:1000$ +bgp extcommunity-list expanded pve_controller_wan permit ^RT:65000:2000$ +bgp extcommunity-list expanded pve_controller_wan permit ^RT:65010:20000$ +bgp extcommunity-list expanded pve_controller_wan permit ^RT:.*:100$ +! +ip prefix-list loopbacks_ips seq 10 permit 0.0.0.0/0 le 32 +! +route-map MAP_VTEP_IN permit 1 +exit +! +route-map MAP_VTEP_IN_wan permit 1 +exit +! +route-map MAP_VTEP_OUT permit 1 + match extcommunity pve_controller_cluster any +exit +! +route-map MAP_VTEP_OUT_wan permit 1 + match extcommunity pve_controller_wan any +exit +! +route-map correct_src permit 1 + match ip address prefix-list loopbacks_ips + set src 203.0.113.1 +exit +! +ip protocol bgp route-map correct_src +! +line vty +! diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_sdn_interfaces b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_sdn_interfaces new file mode 100644 index 0000000..39f3beb --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/expected_sdn_interfaces @@ -0,0 +1,81 @@ +#version:1 + +auto myvnet +iface myvnet + address 10.0.0.1/24 + bridge_ports vxlan_myvnet + bridge_stp off + bridge_fd 0 + mtu 1450 + ip-forward on + arp-accept on + vrf vrf_myzone + +auto myvnet2 +iface myvnet2 + address 10.0.0.1/24 + bridge_ports vxlan_myvnet2 + bridge_stp off + bridge_fd 0 + mtu 1450 + ip-forward on + arp-accept on + vrf vrf_myzone2 + +auto vrf_myzone +iface vrf_myzone + vrf-table auto + post-up ip route add vrf vrf_myzone unreachable default metric 4278198272 + +auto vrf_myzone2 +iface vrf_myzone2 + vrf-table auto + post-up ip route add vrf vrf_myzone2 unreachable default metric 4278198272 + +auto vrfbr_myzone +iface vrfbr_myzone + bridge-ports vrfvx_myzone + bridge_stp off + bridge_fd 0 + mtu 1450 + vrf vrf_myzone + +auto vrfbr_myzone2 +iface vrfbr_myzone2 + bridge-ports vrfvx_myzone2 + bridge_stp off + bridge_fd 0 + mtu 1450 + vrf vrf_myzone2 + +auto vrfvx_myzone +iface vrfvx_myzone + vxlan-id 1000 + vxlan-local-tunnelip 203.0.113.1 + bridge-learning off + bridge-arp-nd-suppress on + mtu 1450 + +auto vrfvx_myzone2 +iface vrfvx_myzone2 + vxlan-id 2000 + vxlan-local-tunnelip 203.0.113.1 + bridge-learning off + bridge-arp-nd-suppress on + mtu 1450 + +auto vxlan_myvnet +iface vxlan_myvnet + vxlan-id 100 + vxlan-local-tunnelip 203.0.113.1 + bridge-learning off + bridge-arp-nd-suppress on + mtu 1450 + +auto vxlan_myvnet2 +iface vxlan_myvnet2 + vxlan-id 200 + vxlan-local-tunnelip 203.0.113.1 + bridge-learning off + bridge-arp-nd-suppress on + mtu 1450 diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/interfaces b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/interfaces new file mode 100644 index 0000000..1736ffb --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/interfaces @@ -0,0 +1,11 @@ +auto vmbr0 +iface vmbr0 inet static + address 198.51.100.1/24 + bridge-ports eth0 + bridge-stp off + bridge-fd 0 + +auto dummy1 +iface dummy1 inet static + address 203.0.113.1/32 + link-type dummy diff --git a/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/sdn_config b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/sdn_config new file mode 100644 index 0000000..daa1977 --- /dev/null +++ b/src/test/zones/evpn/ebgp_evpn_ibgp_wan_evpn_ebgp_rt_import_mixed/sdn_config @@ -0,0 +1,77 @@ +{ + version => 1, + zones => { + ids => { + myzone => { + ipam => "pve", + type => "evpn", + controller => "cluster", + 'vrf-vxlan' => 1000, + 'secondary-controllers' => ['wan'], + }, + myzone2 => { + ipam => "pve", + type => "evpn", + controller => "cluster", + 'vrf-vxlan' => 2000, + 'secondary-controllers' => ['wan'], + 'rt-import' => '65000:2000,65010:20000' + } + }, + }, + vnets => { + ids => { + myvnet => { + tag => "100", + type => "vnet", + zone => "myzone" + }, + myvnet2 => { + tag => "200", + type => "vnet", + zone => "myzone2" + }, + }, + }, + subnets => { + ids => { + 'myzone-10.0.0.0-24' => { + 'type' => 'subnet', + 'vnet' => 'myvnet', + 'gateway' => '10.0.0.1', + }, + 'myzone2-10.0.0.0-24' => { + 'type' => 'subnet', + 'vnet' => 'myvnet2', + 'gateway' => '10.0.0.1', + } + } + }, + controllers => { + ids => { + cluster => { + type => "evpn", + peers => '203.0.113.1,203.0.113.2,203.0.113.4', + asn => "65000", + 'bgp-mode' => 'internal', + }, + bgp => { + type => "bgp", + 'peers' => '198.51.100.10', + ebgp => "1", + asn => "65001", + loopback => 'dummy1', + node => "localhost", + }, + wan => { + type => "evpn", + peers => '203.0.113.100,203.0.113.101', + asn => "65000", + nodes => 'localhost', + 'bgp-mode' => 'external', + 'peer-group-name' => 'wan', + } + }, + } +} + -- 2.47.3