9b8b4e6e4d
What I did: In FRR command update source <interface-name> is not at address-family level. Because of this internal peer route-map for ipv6 were getting applied to ipv4 address family. As a result TSA over iBGP for Ipv6 was not getting applied. How I verify: Manual Verification of TSA over both ipv4 and ipv6 after fix works fine. Updated UT for this. Added sonic-mgmt test gap: sonic-net/sonic-mgmt#8170 Signed-off-by: Abhishek Dosi <abdosi@microsoft.com>
33 lines
1.3 KiB
Django/Jinja
33 lines
1.3 KiB
Django/Jinja
!
|
|
! template: bgpd/templates/internal/peer-group.conf.j2
|
|
!
|
|
neighbor INTERNAL_PEER_V4 peer-group
|
|
neighbor INTERNAL_PEER_V6 peer-group
|
|
{% if CONFIG_DB__DEVICE_METADATA['localhost']['switch_type'] == 'chassis-packet' %}
|
|
neighbor INTERNAL_PEER_V4 update-source Loopback4096
|
|
{% endif %}
|
|
address-family ipv4
|
|
{% if CONFIG_DB__DEVICE_METADATA['localhost']['sub_role'] == 'BackEnd' %}
|
|
neighbor INTERNAL_PEER_V4 route-reflector-client
|
|
{% endif %}
|
|
neighbor INTERNAL_PEER_V4 soft-reconfiguration inbound
|
|
neighbor INTERNAL_PEER_V4 allowas-in 1
|
|
neighbor INTERNAL_PEER_V4 route-map FROM_BGP_INTERNAL_PEER_V4 in
|
|
neighbor INTERNAL_PEER_V4 route-map TO_BGP_INTERNAL_PEER_V4 out
|
|
exit-address-family
|
|
{% if CONFIG_DB__DEVICE_METADATA['localhost']['switch_type'] == 'chassis-packet' %}
|
|
neighbor INTERNAL_PEER_V6 update-source Loopback4096
|
|
{% endif %}
|
|
address-family ipv6
|
|
{% if CONFIG_DB__DEVICE_METADATA['localhost']['sub_role'] == 'BackEnd' %}
|
|
neighbor INTERNAL_PEER_V6 route-reflector-client
|
|
{% endif %}
|
|
neighbor INTERNAL_PEER_V6 soft-reconfiguration inbound
|
|
neighbor INTERNAL_PEER_V6 allowas-in 1
|
|
neighbor INTERNAL_PEER_V6 route-map FROM_BGP_INTERNAL_PEER_V6 in
|
|
neighbor INTERNAL_PEER_V6 route-map TO_BGP_INTERNAL_PEER_V6 out
|
|
exit-address-family
|
|
!
|
|
! end of template: bgpd/templates/internal/peer-group.conf.j2
|
|
!
|