pve-network/src/PVE/Network/SDN/Controllers/EvpnPlugin.pm

586 lines
18 KiB
Perl
Raw Normal View History

package PVE::Network::SDN::Controllers::EvpnPlugin;
use strict;
use warnings;
use PVE::INotify;
use PVE::JSONSchema qw(get_standard_option);
use PVE::Tools qw(run_command file_set_contents file_get_contents);
use PVE::Network::SDN::Controllers::Plugin;
use PVE::Network::SDN::Zones::Plugin;
use Net::IP;
use base('PVE::Network::SDN::Controllers::Plugin');
sub type {
return 'evpn';
}
sub properties {
return {
asn => {
type => 'integer',
description => "autonomous system number",
minimum => 0,
maximum => 4294967296
},
peers => {
description => "peers address list.",
type => 'string', format => 'ip-list'
},
};
}
sub options {
return {
'asn' => { optional => 0 },
'peers' => { optional => 0 },
};
}
# Plugin implementation
sub generate_controller_config {
my ($class, $plugin_config, $controller_cfg, $id, $uplinks, $config) = @_;
my @peers;
@peers = PVE::Tools::split_list($plugin_config->{'peers'}) if $plugin_config->{'peers'};
my $local_node = PVE::INotify::nodename();
my $asn = $plugin_config->{asn};
my $ebgp = undef;
my $loopback = undef;
my $autortas = undef;
my $bgprouter = find_bgp_controller($local_node, $controller_cfg);
if ($bgprouter) {
$ebgp = 1 if $plugin_config->{'asn'} ne $bgprouter->{asn};
$loopback = $bgprouter->{loopback} if $bgprouter->{loopback};
$asn = $bgprouter->{asn} if $bgprouter->{asn};
$autortas = $plugin_config->{'asn'} if $ebgp;
}
return if !$asn;
my $bgp = $config->{frr}->{router}->{"bgp $asn"} //= {};
my ($ifaceip, $interface) = PVE::Network::SDN::Zones::Plugin::find_local_ip_interface_peers(\@peers, $loopback);
my $remoteas = $ebgp ? "external" : $asn;
#global options
my @controller_config = (
"bgp router-id $ifaceip",
"no bgp hard-administrative-reset",
"no bgp graceful-restart notification",
"no bgp default ipv4-unicast",
"coalesce-time 1000",
);
push(@{$bgp->{""}}, @controller_config) if keys %{$bgp} == 0;
@controller_config = ();
#VTEP neighbors
push @controller_config, "neighbor VTEP peer-group";
push @controller_config, "neighbor VTEP remote-as $remoteas";
push @controller_config, "neighbor VTEP bfd";
if($ebgp && $loopback) {
push @controller_config, "neighbor VTEP ebgp-multihop 10";
push @controller_config, "neighbor VTEP update-source $loopback";
}
# VTEP peers
foreach my $address (@peers) {
next if $address eq $ifaceip;
push @controller_config, "neighbor $address peer-group VTEP";
}
push(@{$bgp->{""}}, @controller_config);
# address-family l2vpn
@controller_config = ();
push @controller_config, "neighbor VTEP route-map MAP_VTEP_IN in";
push @controller_config, "neighbor VTEP route-map MAP_VTEP_OUT out";
push @controller_config, "neighbor VTEP activate";
push @controller_config, "advertise-all-vni";
push @controller_config, "autort as $autortas" if $autortas;
push(@{$bgp->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
my $routemap = { rule => undef, action => "permit" };
push(@{$config->{frr_routemap}->{'MAP_VTEP_IN'}}, $routemap );
push(@{$config->{frr_routemap}->{'MAP_VTEP_OUT'}}, $routemap );
return $config;
}
sub generate_controller_zone_config {
my ($class, $plugin_config, $controller, $controller_cfg, $id, $uplinks, $config) = @_;
my $local_node = PVE::INotify::nodename();
my $vrf = "vrf_$id";
my $vrfvxlan = $plugin_config->{'vrf-vxlan'};
my $exitnodes = $plugin_config->{'exitnodes'};
my $exitnodes_primary = $plugin_config->{'exitnodes-primary'};
my $advertisesubnets = $plugin_config->{'advertise-subnets'};
my $exitnodes_local_routing = $plugin_config->{'exitnodes-local-routing'};
my $rt_import;
$rt_import = [PVE::Tools::split_list($plugin_config->{'rt-import'})] if $plugin_config->{'rt-import'};
my $asn = $controller->{asn};
my @peers;
@peers = PVE::Tools::split_list($controller->{'peers'}) if $controller->{'peers'};
my $ebgp = undef;
my $loopback = undef;
my $autortas = undef;
my $bgprouter = find_bgp_controller($local_node, $controller_cfg);
if($bgprouter) {
$ebgp = 1 if $controller->{'asn'} ne $bgprouter->{asn};
$loopback = $bgprouter->{loopback} if $bgprouter->{loopback};
$asn = $bgprouter->{asn} if $bgprouter->{asn};
$autortas = $controller->{'asn'} if $ebgp;
}
return if !$vrf || !$vrfvxlan || !$asn;
my ($ifaceip, $interface) = PVE::Network::SDN::Zones::Plugin::find_local_ip_interface_peers(\@peers, $loopback);
my $is_gateway = $exitnodes->{$local_node};
# vrf
my @controller_config = ();
push @controller_config, "vni $vrfvxlan";
#avoid to routes between nodes through the exit nodes
#null routes subnets of other zones
if ($is_gateway) {
my $subnets = PVE::Network::SDN::Vnets::get_subnets();
foreach my $subnetid (sort keys %{$subnets}) {
my $subnet = $subnets->{$subnetid};
my $cidr = $subnet->{cidr};
my $zone = $subnet->{zone};
push @controller_config, "ip route $cidr null0" if $zone ne $id;
}
}
push(@{$config->{frr}->{vrf}->{"$vrf"}}, @controller_config);
#main vrf router
@controller_config = ();
push @controller_config, "bgp router-id $ifaceip";
push @controller_config, "no bgp hard-administrative-reset";
push @controller_config, "no bgp graceful-restart notification";
# push @controller_config, "!";
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{""}}, @controller_config);
if ($autortas) {
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, "route-target import $autortas:$vrfvxlan");
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, "route-target export $autortas:$vrfvxlan");
}
if ($is_gateway) {
if (!$exitnodes_primary || $exitnodes_primary eq $local_node) {
#filter default type5 route coming from other exit nodes on primary node or both nodes if no primary is defined.
my $routemap_config = ();
push @{$routemap_config}, "match evpn vni $vrfvxlan";
push @{$routemap_config}, "match evpn route-type prefix";
my $routemap = { rule => $routemap_config, action => "deny" };
unshift(@{$config->{frr_routemap}->{'MAP_VTEP_IN'}}, $routemap);
} elsif ($exitnodes_primary ne $local_node) {
my $routemap_config = ();
push @{$routemap_config}, "match evpn vni $vrfvxlan";
push @{$routemap_config}, "match evpn route-type prefix";
push @{$routemap_config}, "set metric 200";
my $routemap = { rule => $routemap_config, action => "permit" };
unshift(@{$config->{frr_routemap}->{'MAP_VTEP_OUT'}}, $routemap);
}
if (!$exitnodes_local_routing) {
@controller_config = ();
#import /32 routes of evpn network from vrf1 to default vrf (for packet return)
push @controller_config, "import vrf $vrf";
push(@{$config->{frr}->{router}->{"bgp $asn"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
push(@{$config->{frr}->{router}->{"bgp $asn"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
@controller_config = ();
#redistribute connected to be able to route to local vms on the gateway
push @controller_config, "redistribute connected";
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
}
@controller_config = ();
#add default originate to announce 0.0.0.0/0 type5 route in evpn
push @controller_config, "default-originate ipv4";
push @controller_config, "default-originate ipv6";
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
} elsif ($advertisesubnets) {
@controller_config = ();
#redistribute connected networks
push @controller_config, "redistribute connected";
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv4 unicast"}}, @controller_config);
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"ipv6 unicast"}}, @controller_config);
@controller_config = ();
#advertise connected networks type5 route in evpn
push @controller_config, "advertise ipv4 unicast";
push @controller_config, "advertise ipv6 unicast";
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
}
if ($rt_import) {
@controller_config = ();
foreach my $rt (sort @{$rt_import}) {
push @controller_config, "route-target import $rt";
}
push(@{$config->{frr}->{router}->{"bgp $asn vrf $vrf"}->{"address-family"}->{"l2vpn evpn"}}, @controller_config);
}
return $config;
}
sub generate_controller_vnet_config {
my ($class, $plugin_config, $controller, $zone, $zoneid, $vnetid, $config) = @_;
my $exitnodes = $zone->{'exitnodes'};
my $exitnodes_local_routing = $zone->{'exitnodes-local-routing'};
return if !$exitnodes_local_routing;
my $local_node = PVE::INotify::nodename();
my $is_gateway = $exitnodes->{$local_node};
return if !$is_gateway;
my $subnets = PVE::Network::SDN::Vnets::get_subnets($vnetid, 1);
my @controller_config = ();
foreach my $subnetid (sort keys %{$subnets}) {
my $subnet = $subnets->{$subnetid};
my $cidr = $subnet->{cidr};
push @controller_config, "ip route $cidr 10.255.255.2 xvrf_$zoneid";
}
push(@{$config->{frr_ip_protocol}}, @controller_config);
}
sub on_delete_hook {
my ($class, $controllerid, $zone_cfg) = @_;
# verify that zone is associated to this controller
foreach my $id (keys %{$zone_cfg->{ids}}) {
my $zone = $zone_cfg->{ids}->{$id};
die "controller $controllerid is used by $id"
if (defined($zone->{controller}) && $zone->{controller} eq $controllerid);
}
}
sub on_update_hook {
my ($class, $controllerid, $controller_cfg) = @_;
# we can only have 1 evpn controller / 1 asn by server
my $controllernb = 0;
foreach my $id (keys %{$controller_cfg->{ids}}) {
next if $id eq $controllerid;
my $controller = $controller_cfg->{ids}->{$id};
next if $controller->{type} ne "evpn";
$controllernb++;
die "only 1 global evpn controller can be defined" if $controllernb >= 1;
}
}
sub find_bgp_controller {
my ($nodename, $controller_cfg) = @_;
my $res = undef;
foreach my $id (keys %{$controller_cfg->{ids}}) {
my $controller = $controller_cfg->{ids}->{$id};
next if $controller->{type} ne 'bgp';
next if $controller->{node} ne $nodename;
$res = $controller;
last;
}
return $res;
}
sub generate_frr_recurse{
my ($final_config, $content, $parentkey, $level) = @_;
my $keylist = {};
$keylist->{'address-family'} = 1;
$keylist->{router} = 1;
my $exitkeylist = {};
$exitkeylist->{'address-family'} = 1;
my $simple_exitkeylist = {};
$simple_exitkeylist->{router} = 1;
# FIXME: make this generic
my $paddinglevel = undef;
if ($level == 1 || $level == 2) {
$paddinglevel = $level - 1;
} elsif ($level == 3 || $level == 4) {
$paddinglevel = $level - 2;
}
my $padding = "";
$padding = ' ' x ($paddinglevel) if $paddinglevel;
if (ref $content eq 'HASH') {
foreach my $key (sort keys %$content) {
next if $key eq 'vrf';
if ($parentkey && defined($keylist->{$parentkey})) {
push @{$final_config}, $padding."!";
push @{$final_config}, $padding."$parentkey $key";
} elsif ($key ne '' && !defined($keylist->{$key})) {
push @{$final_config}, $padding."$key";
}
my $option = $content->{$key};
generate_frr_recurse($final_config, $option, $key, $level+1);
push @{$final_config}, $padding."exit-$parentkey" if $parentkey && defined($exitkeylist->{$parentkey});
push @{$final_config}, $padding."exit" if $parentkey && defined($simple_exitkeylist->{$parentkey});
}
}
if (ref $content eq 'ARRAY') {
push @{$final_config}, map { $padding . "$_" } @$content;
}
}
sub generate_frr_vrf {
my ($final_config, $vrfs) = @_;
return if !$vrfs;
my @config = ();
foreach my $id (sort keys %$vrfs) {
my $vrf = $vrfs->{$id};
push @config, "!";
push @config, "vrf $id";
foreach my $rule (@$vrf) {
push @config, " $rule";
}
push @config, "exit-vrf";
}
push @{$final_config}, @config;
}
sub generate_frr_ip_protocol {
my ($final_config, $ips) = @_;
return if !$ips;
my @config = ();
push @{$final_config}, "!";
foreach my $rule (sort @$ips) {
push @{$final_config}, $rule;
}
}
sub generate_frr_interfaces {
my ($final_config, $interfaces) = @_;
foreach my $k (sort keys %$interfaces) {
my $iface = $interfaces->{$k};
push @{$final_config}, "!";
push @{$final_config}, "interface $k";
foreach my $rule (sort @$iface) {
push @{$final_config}, " $rule";
}
}
}
sub generate_frr_routemap {
my ($final_config, $routemaps) = @_;
foreach my $id (sort keys %$routemaps) {
my $routemap = $routemaps->{$id};
my $order = 0;
foreach my $seq (@$routemap) {
$order++;
next if !defined($seq->{action});
my @config = ();
push @config, "!";
push @config, "route-map $id $seq->{action} $order";
my $rule = $seq->{rule};
push @config, map { " $_" } @$rule;
push @{$final_config}, @config;
push @{$final_config}, "exit";
}
}
}
sub generate_frr_list {
my ($final_config, $lists, $type) = @_;
my $config = [];
for my $id (sort keys %$lists) {
my $list = $lists->{$id};
for my $seq (sort keys %$list) {
my $rule = $list->{$seq};
push @$config, "$type $id seq $seq $rule";
}
}
if (@$config > 0) {
push @{$final_config}, "!", @$config;
}
}
sub generate_controller_rawconfig {
my ($class, $plugin_config, $config) = @_;
my $nodename = PVE::INotify::nodename();
my $final_config = [];
push @{$final_config}, "frr version 8.5.1";
push @{$final_config}, "frr defaults datacenter";
push @{$final_config}, "hostname $nodename";
push @{$final_config}, "log syslog informational";
push @{$final_config}, "service integrated-vtysh-config";
push @{$final_config}, "!";
if (-e "/etc/frr/frr.conf.local") {
my $local_conf = file_get_contents("/etc/frr/frr.conf.local");
parse_merge_frr_local_config($config, $local_conf);
}
generate_frr_vrf($final_config, $config->{frr}->{vrf});
generate_frr_interfaces($final_config, $config->{frr_interfaces});
generate_frr_recurse($final_config, $config->{frr}, undef, 0);
generate_frr_list($final_config, $config->{frr_access_list}, "access-list");
generate_frr_list($final_config, $config->{frr_prefix_list}, "ip prefix-list");
generate_frr_routemap($final_config, $config->{frr_routemap});
generate_frr_ip_protocol($final_config, $config->{frr_ip_protocol});
push @{$final_config}, "!";
push @{$final_config}, "line vty";
push @{$final_config}, "!";
my $rawconfig = join("\n", @{$final_config});
return if !$rawconfig;
return $rawconfig;
}
sub parse_merge_frr_local_config {
my ($config, $local_conf) = @_;
my $section = \$config->{""};
my $router = undef;
my $routemap = undef;
my $routemap_config = ();
my $routemap_action = undef;
while ($local_conf =~ /^\s*(.+?)\s*$/gm) {
my $line = $1;
$line =~ s/^\s+|\s+$//g;
if ($line =~ m/^router (.+)$/) {
$router = $1;
$section = \$config->{'frr'}->{'router'}->{$router}->{""};
next;
} elsif ($line =~ m/^vrf (.+)$/) {
$section = \$config->{'frr'}->{'vrf'}->{$1};
next;
} elsif ($line =~ m/^interface (.+)$/) {
$section = \$config->{'frr_interfaces'}->{$1};
next;
} elsif ($line =~ m/address-family (.+)$/) {
$section = \$config->{'frr'}->{'router'}->{$router}->{'address-family'}->{$1};
next;
} elsif ($line =~ m/^route-map (.+) (permit|deny) (\d+)/) {
$routemap = $1;
$routemap_config = ();
$routemap_action = $2;
$section = \$config->{'frr_routemap'}->{$routemap};
next;
} elsif ($line =~ m/^access-list (.+) seq (\d+) (.+)$/) {
$config->{'frr_access_list'}->{$1}->{$2} = $3;
next;
} elsif ($line =~ m/^ip prefix-list (.+) seq (\d+) (.*)$/) {
$config->{'frr_prefix_list'}->{$1}->{$2} = $3;
next;
} elsif($line =~ m/^exit-address-family$/) {
next;
} elsif($line =~ m/^exit$/) {
if($router) {
$section = \$config->{''};
$router = undef;
} elsif($routemap) {
push(@{$$section}, { rule => $routemap_config, action => $routemap_action });
$section = \$config->{''};
$routemap = undef;
$routemap_action = undef;
$routemap_config = ();
}
next;
} elsif($line =~ m/!/) {
next;
}
next if !$section;
if($routemap) {
push(@{$routemap_config}, $line);
} else {
push(@{$$section}, $line);
}
}
}
sub write_controller_config {
my ($class, $plugin_config, $config) = @_;
my $rawconfig = $class->generate_controller_rawconfig($plugin_config, $config);
return if !$rawconfig;
return if !-d "/etc/frr";
file_set_contents("/etc/frr/frr.conf", $rawconfig);
}
sub reload_controller {
my ($class) = @_;
my $conf_file = "/etc/frr/frr.conf";
my $bin_path = "/usr/lib/frr/frr-reload.py";
if (!-e $bin_path) {
warn "missing $bin_path. Please install frr-pythontools package";
return;
}
my $err = sub {
my $line = shift;
if ($line =~ /ERROR:/) {
warn "$line \n";
}
};
if (-e $conf_file && -e $bin_path) {
eval {
run_command([$bin_path, '--stdout', '--reload', $conf_file], outfunc => {}, errfunc => $err);
};
if ($@) {
warn "frr reload command fail. Restarting frr.";
eval { run_command(['systemctl', 'restart', 'frr']); };
}
}
}
1;