summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
-rw-r--r--server/peer.go68
-rw-r--r--table/adj.go13
-rw-r--r--table/destination.go8
-rw-r--r--table/table_manager.go12
-rw-r--r--test/lib/base.py2
-rw-r--r--test/scenario_test/rtc_test.py144
6 files changed, 210 insertions, 37 deletions
diff --git a/server/peer.go b/server/peer.go
index c985d771..f75b6d57 100644
--- a/server/peer.go
+++ b/server/peer.go
@@ -130,28 +130,48 @@ func (peer *Peer) getAccepted(rfList []bgp.RouteFamily) []*table.Path {
return peer.adjRibIn.PathList(rfList, true)
}
-func (peer *Peer) getBestFromLocal(rfList []bgp.RouteFamily) ([]*table.Path, []*table.Path) {
- pathList := []*table.Path{}
- filtered := []*table.Path{}
+func (peer *Peer) filterpath(path *table.Path) *table.Path {
+ // special handling for RTC nlri
+ // see comments in (*Destination).Calculate()
+ if path != nil && path.GetRouteFamily() == bgp.RF_RTC_UC && !path.IsWithdraw {
+ // if we already sent the same nlri, ignore this
+ if peer.adjRibOut.Exists(path) {
+ return nil
+ }
+ dst := peer.localRib.GetDestination(path)
+ path = nil
+ // we send a path even if it is not a best path
+ for _, p := range dst.GetKnownPathList(peer.TableID()) {
+ // just take care not to send back it
+ if peer.ID() != p.GetSource().Address.String() {
+ path = p
+ break
+ }
+ }
+ }
+ if filterpath(peer, path) == nil {
+ return nil
+ }
+ if !peer.isRouteServerClient() {
+ path = path.Clone(path.IsWithdraw)
+ path.UpdatePathAttrs(peer.fsm.gConf, peer.fsm.pConf)
+ }
options := &table.PolicyOptions{
Neighbor: peer.fsm.peerInfo.Address,
}
+ return peer.policy.ApplyPolicy(peer.TableID(), table.POLICY_DIRECTION_EXPORT, path, options)
+}
+
+func (peer *Peer) getBestFromLocal(rfList []bgp.RouteFamily) ([]*table.Path, []*table.Path) {
+ pathList := []*table.Path{}
+ filtered := []*table.Path{}
for _, path := range peer.localRib.GetBestPathList(peer.TableID(), rfList) {
- if filterpath(peer, path) == nil {
- continue
- }
- p := path
- if !peer.isRouteServerClient() {
- p = path.Clone(p.IsWithdraw)
- p.UpdatePathAttrs(peer.fsm.gConf, peer.fsm.pConf)
- }
- p = peer.policy.ApplyPolicy(peer.TableID(), table.POLICY_DIRECTION_EXPORT, p, options)
- if p == nil {
+ if p := peer.filterpath(path); p != nil {
+ pathList = append(pathList, p)
+ } else {
filtered = append(filtered, path)
- continue
}
- pathList = append(pathList, p)
}
if peer.isGracefulRestartEnabled() {
for _, family := range rfList {
@@ -189,24 +209,10 @@ func (peer *Peer) processOutgoingPaths(paths, withdrawals []*table.Path) []*tabl
}
}
- options := &table.PolicyOptions{
- Neighbor: peer.fsm.peerInfo.Address,
- }
for _, path := range paths {
- if filterpath(peer, path) == nil {
- continue
- }
- if !peer.isRouteServerClient() {
- path = path.Clone(path.IsWithdraw)
- path.UpdatePathAttrs(peer.fsm.gConf, peer.fsm.pConf)
+ if p := peer.filterpath(path); p != nil {
+ outgoing = append(outgoing, p)
}
-
- path = peer.policy.ApplyPolicy(peer.TableID(), table.POLICY_DIRECTION_EXPORT, path, options)
- if path == nil {
- continue
- }
-
- outgoing = append(outgoing, path)
}
peer.adjRibOut.Update(outgoing)
diff --git a/table/adj.go b/table/adj.go
index 5e685f2e..8aa40370 100644
--- a/table/adj.go
+++ b/table/adj.go
@@ -156,3 +156,16 @@ func (adj *AdjRib) StaleAll(rfList []bgp.RouteFamily) {
}
}
}
+
+func (adj *AdjRib) Exists(path *Path) bool {
+ if path == nil {
+ return false
+ }
+ family := path.GetRouteFamily()
+ table, ok := adj.table[family]
+ if !ok {
+ return false
+ }
+ _, ok = table[path.getPrefix()]
+ return ok
+}
diff --git a/table/destination.go b/table/destination.go
index 91d2d89b..e02c7686 100644
--- a/table/destination.go
+++ b/table/destination.go
@@ -254,6 +254,14 @@ func (dest *Destination) Calculate(ids []string) (map[string]*Path, []*Path) {
}()
best := dest.GetBestPath(id)
if best != nil && best.Equal(old) {
+ // RFC4684 3.2. Intra-AS VPN Route Distribution
+ // When processing RT membership NLRIs received from internal iBGP
+ // peers, it is necessary to consider all available iBGP paths for a
+ // given RT prefix, for building the outbound route filter, and not just
+ // the best path.
+ if best.GetRouteFamily() == bgp.RF_RTC_UC {
+ return best
+ }
return nil
}
if best == nil {
diff --git a/table/table_manager.go b/table/table_manager.go
index a041c5b9..cc9784b9 100644
--- a/table/table_manager.go
+++ b/table/table_manager.go
@@ -358,3 +358,15 @@ func (manager *TableManager) GetPathList(id string, rfList []bgp.RouteFamily) []
}
return paths
}
+
+func (manager *TableManager) GetDestination(path *Path) *Destination {
+ if path == nil {
+ return nil
+ }
+ family := path.GetRouteFamily()
+ t, ok := manager.Tables[family]
+ if !ok {
+ return nil
+ }
+ return t.GetDestination(path.getPrefix())
+}
diff --git a/test/lib/base.py b/test/lib/base.py
index d31ec14b..ffbf03b5 100644
--- a/test/lib/base.py
+++ b/test/lib/base.py
@@ -39,6 +39,8 @@ BGP_ATTR_TYPE_NEXT_HOP = 3
BGP_ATTR_TYPE_MULTI_EXIT_DISC = 4
BGP_ATTR_TYPE_LOCAL_PREF = 5
BGP_ATTR_TYPE_COMMUNITIES = 8
+BGP_ATTR_TYPE_ORIGINATOR_ID = 9
+BGP_ATTR_TYPE_CLUSTER_LIST = 10
BGP_ATTR_TYPE_MP_REACH_NLRI = 14
BGP_ATTR_TYPE_EXTENDED_COMMUNITIES = 16
diff --git a/test/scenario_test/rtc_test.py b/test/scenario_test/rtc_test.py
index f1f417c7..6f247213 100644
--- a/test/scenario_test/rtc_test.py
+++ b/test/scenario_test/rtc_test.py
@@ -39,9 +39,10 @@ class GoBGPTestBase(unittest.TestCase):
g2 = GoBGPContainer(name='g2', asn=65000, router_id='192.168.0.2',
ctn_image_name=gobgp_ctn_image_name,
log_level=parser_option.gobgp_log_level)
- ctns = [g1, g2]
- initial_wait_time = max(ctn.run() for ctn in ctns)
+ ctns = {ctn.name: ctn for ctn in [g1, g2]}
+
+ initial_wait_time = max(ctn.run() for ctn in ctns.values())
time.sleep(initial_wait_time)
@@ -55,31 +56,162 @@ class GoBGPTestBase(unittest.TestCase):
g2.local("gobgp vrf vrf1 rib add 20.0.0.0/24")
g2.local("gobgp vrf vrf3 rib add 20.0.0.0/24")
- for a, b in combinations(ctns, 2):
+ for a, b in combinations(ctns.values(), 2):
a.add_peer(b, vpn=True, passwd='rtc', graceful_restart=True)
b.add_peer(a, vpn=True, passwd='rtc', graceful_restart=True)
cls.g1 = g1
cls.g2 = g2
+ cls.ctns = ctns
# test each neighbor state is turned establish
def test_01_neighbor_established(self):
self.g1.wait_for(expected_state=BGP_FSM_ESTABLISHED, peer=self.g2)
def test_02_check_gobgp_adj_rib_out(self):
- time.sleep(10)
+ time.sleep(2)
self.assertTrue(len(self.g1.get_adj_rib_out(self.g2, rf='ipv4-l3vpn')) == 1)
self.assertTrue(len(self.g2.get_adj_rib_out(self.g1, rf='ipv4-l3vpn')) == 1)
def test_03_add_vrf(self):
self.g1.local("gobgp vrf add vrf3 rd 300:300 rt both 300:300")
- time.sleep(10)
+ time.sleep(2)
+ self.assertTrue(len(self.g1.get_adj_rib_out(self.g2, rf='rtc')) == 3)
self.assertTrue(len(self.g1.get_adj_rib_in(self.g2, rf='ipv4-l3vpn')) == 2)
def test_04_del_vrf(self):
self.g1.local("gobgp vrf del vrf1")
- time.sleep(10)
+ time.sleep(2)
self.assertTrue(len(self.g1.get_adj_rib_in(self.g2, rf='ipv4-l3vpn')) == 1)
+ self.assertTrue(len(self.g1.get_adj_rib_out(self.g2, rf='rtc')) == 2)
+
+ def test_05_rr_setup(self):
+ gobgp_ctn_image_name = parser_option.gobgp_image
+ g3 = GoBGPContainer(name='g3', asn=65000, router_id='192.168.0.3',
+ ctn_image_name=gobgp_ctn_image_name,
+ log_level=parser_option.gobgp_log_level)
+ g4 = GoBGPContainer(name='g4', asn=65000, router_id='192.168.0.4',
+ ctn_image_name=gobgp_ctn_image_name,
+ log_level=parser_option.gobgp_log_level)
+ g5 = GoBGPContainer(name='g5', asn=65000, router_id='192.168.0.5',
+ ctn_image_name=gobgp_ctn_image_name,
+ log_level=parser_option.gobgp_log_level)
+
+ time.sleep(max(ctn.run() for ctn in [g3, g4, g5]))
+
+ g3.add_peer(g4, vpn=True, is_rr_client=True)
+ g4.add_peer(g3, vpn=True)
+
+ g3.add_peer(g5, vpn=True, is_rr_client=True)
+ g5.add_peer(g3, vpn=True)
+
+ for v in [g3, g4, g5]:
+ self.ctns[v.name] = v
+
+ def test_06_neighbor_established(self):
+ g3 = self.ctns['g3']
+ g4 = self.ctns['g4']
+ g5 = self.ctns['g5']
+ g3.wait_for(expected_state=BGP_FSM_ESTABLISHED, peer=g4)
+ g3.wait_for(expected_state=BGP_FSM_ESTABLISHED, peer=g5)
+
+ def test_07_rr_test(self):
+ g3 = self.ctns['g3']
+ g4 = self.ctns['g4']
+ g5 = self.ctns['g5']
+ g4.local("gobgp vrf add vrf1 rd 100:100 rt both 100:100")
+ time.sleep(1)
+ g5.local("gobgp vrf add vrf1 rd 100:100 rt both 100:100")
+
+ time.sleep(1)
+ def check(client):
+ rib = g3.get_adj_rib_out(client, rf='rtc')
+ self.assertTrue(len(rib) == 1)
+ path = rib[0]
+ self.assertTrue(path['nexthop'] == g3.peers[client]['local_addr'].split('/')[0])
+ ids = [attr['value'] for attr in path['attrs'] if attr['type'] == base.BGP_ATTR_TYPE_ORIGINATOR_ID]
+ self.assertTrue(len(ids) == 1)
+ self.assertTrue(ids[0] == g3.router_id)
+ check(g4)
+ check(g5)
+
+ g4.local("gobgp vrf vrf1 rib add 40.0.0.0/24")
+ g5.local("gobgp vrf vrf1 rib add 50.0.0.0/24")
+ time.sleep(1)
+ def check(client):
+ rib = g3.get_adj_rib_out(client, rf='ipv4-l3vpn')
+ self.assertTrue(len(rib) == 1)
+ path = rib[0]
+ self.assertTrue(path['nexthop'] != g3.peers[client]['local_addr'].split('/')[0])
+ ids = [attr['value'] for attr in path['attrs'] if attr['type'] == base.BGP_ATTR_TYPE_ORIGINATOR_ID]
+ self.assertTrue(len(ids) == 1)
+ self.assertTrue(ids[0] != client.router_id)
+ check(g4)
+ check(g5)
+
+ def test_08_rr_setup2(self):
+ g1 = self.ctns['g1']
+ g2 = self.ctns['g2']
+ g3 = self.ctns['g3']
+
+ g1.local("gobgp vrf del vrf2")
+ g1.local("gobgp vrf del vrf3")
+ g2.local("gobgp vrf del vrf1")
+ g2.local("gobgp vrf del vrf3")
+
+ g3.add_peer(g1, vpn=True)
+ g1.add_peer(g3, vpn=True)
+ g3.add_peer(g2, vpn=True)
+ g2.add_peer(g3, vpn=True)
+
+ g3.wait_for(expected_state=BGP_FSM_ESTABLISHED, peer=g1)
+ g3.wait_for(expected_state=BGP_FSM_ESTABLISHED, peer=g2)
+
+ def test_09_rr_test2(self):
+ g1 = self.ctns['g1']
+ g2 = self.ctns['g2']
+ g3 = self.ctns['g3']
+ g4 = self.ctns['g4']
+ g5 = self.ctns['g5']
+
+ self.assertTrue(len(g1.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 0)
+ self.assertTrue(len(g2.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 0)
+
+ g1.local("gobgp vrf add vrf1 rd 100:100 rt both 100:100")
+ g1.local("gobgp vrf vrf1 rib add 10.0.0.0/24")
+
+ time.sleep(1)
+
+ self.assertTrue(len(g1.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+ self.assertTrue(len(g2.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 0)
+ self.assertTrue(len(g3.get_adj_rib_in(g1, rf='ipv4-l3vpn')) == 1)
+ self.assertTrue(len(g3.get_adj_rib_in(g2, rf='ipv4-l3vpn')) == 0)
+ self.assertTrue(len(g4.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+ self.assertTrue(len(g5.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+
+ g2.local("gobgp vrf add vrf2 rd 200:200 rt both 200:200")
+ g2.local("gobgp vrf vrf2 rib add 20.0.0.0/24")
+
+ time.sleep(1)
+
+ self.assertTrue(len(g1.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+ self.assertTrue(len(g2.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 0)
+ self.assertTrue(len(g3.get_adj_rib_in(g1, rf='ipv4-l3vpn')) == 1)
+ self.assertTrue(len(g3.get_adj_rib_in(g2, rf='ipv4-l3vpn')) == 0)
+ self.assertTrue(len(g4.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+ self.assertTrue(len(g5.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+
+ g4.local("gobgp vrf add vrf2 rd 200:200 rt both 200:200")
+
+ time.sleep(1)
+
+ self.assertTrue(len(g1.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+ self.assertTrue(len(g2.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 0)
+ self.assertTrue(len(g3.get_adj_rib_in(g1, rf='ipv4-l3vpn')) == 1)
+ self.assertTrue(len(g3.get_adj_rib_in(g2, rf='ipv4-l3vpn')) == 1)
+ self.assertTrue(len(g4.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 3)
+ self.assertTrue(len(g5.get_adj_rib_in(g3, rf='ipv4-l3vpn')) == 2)
+
if __name__ == '__main__':
if os.geteuid() is not 0: