template bgp tnet_tpl { local as 4242423538; neighbor internal; direct; password "trygvis"; ipv6 { next hop self; import filter { if is_tnet() then { print proto, ": import accept, net=", net, ", from=", from, ", gw=", gw; accept; } print proto, ": import reject, reason=not tnet"; reject; }; # newer bird's only # import keep filtered; export filter { if is_tnet() then { print proto, ": export accept, net=", net, ", from=", from, ", gw=", gw; accept; } print proto, ": export reject, reason=not tnet"; reject; }; }; } {% for p in tnet_bird_peers|default([])|sort %} {% set peer = tnet_bird_peers[p] %} {% set policy = peer.policy | default("tnet") %} {% if policy == "tnet" %} protocol bgp tnet_{{ p }} from tnet_tpl { neighbor {{ hostvars[p].tnet_wg[inventory_hostname].address }}; interface "tnet-{{ p }}"; {% if peer.rr_client|default(False) %} rr client; {% endif %} } {% elif policy == "dn42" %} protocol bgp {{ p }} { local as 4242423538; neighbor {{ peer.address }} neighbor as {{ peer.as }}; {% if peer.interface is defined %} interface "{{ peer.interface }}"; {% endif %} ipv6 { import filter { if dn42_is_valid_network() && !is_tnet() then { # Check when unknown or invalid according to ROA if (roa_check(dn42_roa, net, bgp_path.last) == ROA_VALID) then { accept; } else { print "[dn42] ROA check failed for ", net, " ASN ", bgp_path.last; reject; } } else { reject; } } export filter { if dn42_is_valid_network() && source ~ [RTS_STATIC, RTS_BGP] then { accept; } else { reject; } } } } {% endif %} {% endfor %}