]>
Commit | Line | Data |
---|---|---|
b72ede27 FL |
1 | /* |
2 | * VRF functions. | |
3 | * Copyright (C) 2014 6WIND S.A. | |
4 | * | |
5 | * This file is part of GNU Zebra. | |
6 | * | |
7 | * GNU Zebra is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU General Public License as published | |
9 | * by the Free Software Foundation; either version 2, or (at your | |
10 | * option) any later version. | |
11 | * | |
12 | * GNU Zebra is distributed in the hope that it will be useful, but | |
13 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
15 | * General Public License for more details. | |
16 | * | |
896014f4 DL |
17 | * You should have received a copy of the GNU General Public License along |
18 | * with this program; see the file COPYING; if not, write to the Free Software | |
19 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
b72ede27 FL |
20 | */ |
21 | ||
22 | #include <zebra.h> | |
23 | ||
4691b65a PG |
24 | /* for basename */ |
25 | #include <libgen.h> | |
26 | ||
6a69b354 | 27 | #include "if.h" |
b72ede27 | 28 | #include "vrf.h" |
7922fc65 | 29 | #include "vrf_int.h" |
b72ede27 FL |
30 | #include "prefix.h" |
31 | #include "table.h" | |
32 | #include "log.h" | |
33 | #include "memory.h" | |
19dc275e | 34 | #include "command.h" |
b95c1883 | 35 | #include "ns.h" |
3bc34908 | 36 | #include "privs.h" |
98cbbaea | 37 | #include "nexthop_group.h" |
b66d022e | 38 | #include "lib_errors.h" |
bc867a5d | 39 | #include "northbound.h" |
8b4cb7a6 | 40 | #include "northbound_cli.h" |
19dc275e | 41 | |
1eb92f06 | 42 | /* default VRF name value used when VRF backend is not NETNS */ |
dd114702 | 43 | #define VRF_DEFAULT_NAME_INTERNAL "default" |
ec31f30d | 44 | |
bf8d3d6a DL |
45 | DEFINE_MTYPE_STATIC(LIB, VRF, "VRF"); |
46 | DEFINE_MTYPE_STATIC(LIB, VRF_BITMAP, "VRF bit-map"); | |
4a1ab8e4 | 47 | |
96244aca | 48 | DEFINE_QOBJ_TYPE(vrf); |
e80e7cce | 49 | |
d62a17ae | 50 | static __inline int vrf_id_compare(const struct vrf *, const struct vrf *); |
51 | static __inline int vrf_name_compare(const struct vrf *, const struct vrf *); | |
1a1a7065 | 52 | |
d62a17ae | 53 | RB_GENERATE(vrf_id_head, vrf, id_entry, vrf_id_compare); |
54 | RB_GENERATE(vrf_name_head, vrf, name_entry, vrf_name_compare); | |
1a1a7065 | 55 | |
d62a17ae | 56 | struct vrf_id_head vrfs_by_id = RB_INITIALIZER(&vrfs_by_id); |
57 | struct vrf_name_head vrfs_by_name = RB_INITIALIZER(&vrfs_by_name); | |
1a1a7065 | 58 | |
78dd30b2 | 59 | static int vrf_backend; |
72261ecd | 60 | static int vrf_backend_configured; |
c200f5e1 | 61 | static char vrf_default_name[VRF_NAMSIZ] = VRF_DEFAULT_NAME_INTERNAL; |
78dd30b2 | 62 | |
19dc275e DS |
63 | /* |
64 | * Turn on/off debug code | |
65 | * for vrf. | |
66 | */ | |
c17faa4b | 67 | static int debug_vrf = 0; |
b72ede27 | 68 | |
b72ede27 | 69 | /* Holding VRF hooks */ |
1b3e9a21 | 70 | static struct vrf_master { |
d62a17ae | 71 | int (*vrf_new_hook)(struct vrf *); |
72 | int (*vrf_delete_hook)(struct vrf *); | |
73 | int (*vrf_enable_hook)(struct vrf *); | |
74 | int (*vrf_disable_hook)(struct vrf *); | |
ecbc5a37 | 75 | int (*vrf_update_name_hook)(struct vrf *vrf); |
d62a17ae | 76 | } vrf_master = { |
77 | 0, | |
78 | }; | |
b72ede27 | 79 | |
d62a17ae | 80 | static int vrf_is_enabled(struct vrf *vrf); |
e5bf3e1e | 81 | |
216b18ef | 82 | /* VRF list existance check by name. */ |
d62a17ae | 83 | struct vrf *vrf_lookup_by_name(const char *name) |
216b18ef | 84 | { |
d62a17ae | 85 | struct vrf vrf; |
86 | strlcpy(vrf.name, name, sizeof(vrf.name)); | |
87 | return (RB_FIND(vrf_name_head, &vrfs_by_name, &vrf)); | |
216b18ef | 88 | } |
216b18ef | 89 | |
d62a17ae | 90 | static __inline int vrf_id_compare(const struct vrf *a, const struct vrf *b) |
b72ede27 | 91 | { |
d62a17ae | 92 | return (a->vrf_id - b->vrf_id); |
216b18ef DS |
93 | } |
94 | ||
d62a17ae | 95 | static int vrf_name_compare(const struct vrf *a, const struct vrf *b) |
b72ede27 | 96 | { |
d62a17ae | 97 | return strcmp(a->name, b->name); |
b72ede27 FL |
98 | } |
99 | ||
e26aedbe PG |
100 | /* if ns_id is different and not VRF_UNKNOWN, |
101 | * then update vrf identifier, and enable VRF | |
102 | */ | |
103 | static void vrf_update_vrf_id(ns_id_t ns_id, void *opaqueptr) | |
104 | { | |
105 | ns_id_t vrf_id = (vrf_id_t)ns_id; | |
106 | vrf_id_t old_vrf_id; | |
107 | struct vrf *vrf = (struct vrf *)opaqueptr; | |
108 | ||
109 | if (!vrf) | |
110 | return; | |
111 | old_vrf_id = vrf->vrf_id; | |
112 | if (vrf_id == vrf->vrf_id) | |
113 | return; | |
114 | if (vrf->vrf_id != VRF_UNKNOWN) | |
115 | RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf); | |
116 | vrf->vrf_id = vrf_id; | |
117 | RB_INSERT(vrf_id_head, &vrfs_by_id, vrf); | |
118 | if (old_vrf_id == VRF_UNKNOWN) | |
c4efd0f4 | 119 | vrf_enable(vrf); |
e26aedbe PG |
120 | } |
121 | ||
ce1be369 PG |
122 | int vrf_switch_to_netns(vrf_id_t vrf_id) |
123 | { | |
124 | char *name; | |
125 | struct vrf *vrf = vrf_lookup_by_id(vrf_id); | |
126 | ||
ce1be369 | 127 | /* VRF is default VRF. silently ignore */ |
e26aedbe | 128 | if (!vrf || vrf->vrf_id == VRF_DEFAULT) |
9dff1132 | 129 | return 1; /* 1 = default */ |
e26aedbe PG |
130 | /* VRF has no NETNS backend. silently ignore */ |
131 | if (vrf->data.l.netns_name[0] == '\0') | |
9dff1132 | 132 | return 2; /* 2 = no netns */ |
ce1be369 PG |
133 | name = ns_netns_pathname(NULL, vrf->data.l.netns_name); |
134 | if (debug_vrf) | |
135 | zlog_debug("VRF_SWITCH: %s(%u)", name, vrf->vrf_id); | |
136 | return ns_switch_to_netns(name); | |
137 | } | |
138 | ||
139 | int vrf_switchback_to_initial(void) | |
140 | { | |
141 | int ret = ns_switchback_to_initial(); | |
142 | ||
143 | if (ret == 0 && debug_vrf) | |
144 | zlog_debug("VRF_SWITCHBACK"); | |
145 | return ret; | |
146 | } | |
147 | ||
216b18ef | 148 | /* Get a VRF. If not found, create one. |
34f8e6af DS |
149 | * Arg: |
150 | * name - The name of the vrf. May be NULL if unknown. | |
151 | * vrf_id - The vrf_id of the vrf. May be VRF_UNKNOWN if unknown | |
216b18ef | 152 | * Description: Please note that this routine can be called with just the name |
34f8e6af DS |
153 | * and 0 vrf-id |
154 | */ | |
d62a17ae | 155 | struct vrf *vrf_get(vrf_id_t vrf_id, const char *name) |
156 | { | |
157 | struct vrf *vrf = NULL; | |
158 | int new = 0; | |
159 | ||
d62a17ae | 160 | /* Nothing to see, move along here */ |
161 | if (!name && vrf_id == VRF_UNKNOWN) | |
162 | return NULL; | |
163 | ||
0c2bac38 PG |
164 | /* attempt to find already available VRF |
165 | */ | |
166 | if (name) | |
167 | vrf = vrf_lookup_by_name(name); | |
dd114702 PG |
168 | if (vrf && vrf_id != VRF_UNKNOWN |
169 | && vrf->vrf_id != VRF_UNKNOWN | |
170 | && vrf->vrf_id != vrf_id) { | |
171 | zlog_debug("VRF_GET: avoid %s creation(%u), same name exists (%u)", | |
172 | name, vrf_id, vrf->vrf_id); | |
173 | return NULL; | |
174 | } | |
d62a17ae | 175 | /* Try to find VRF both by ID and name */ |
0c2bac38 | 176 | if (!vrf && vrf_id != VRF_UNKNOWN) |
d62a17ae | 177 | vrf = vrf_lookup_by_id(vrf_id); |
d62a17ae | 178 | |
179 | if (vrf == NULL) { | |
180 | vrf = XCALLOC(MTYPE_VRF, sizeof(struct vrf)); | |
181 | vrf->vrf_id = VRF_UNKNOWN; | |
d62a17ae | 182 | QOBJ_REG(vrf, vrf); |
183 | new = 1; | |
184 | ||
185 | if (debug_vrf) | |
186 | zlog_debug("VRF(%u) %s is created.", vrf_id, | |
187 | (name) ? name : "(NULL)"); | |
188 | } | |
189 | ||
190 | /* Set identifier */ | |
191 | if (vrf_id != VRF_UNKNOWN && vrf->vrf_id == VRF_UNKNOWN) { | |
192 | vrf->vrf_id = vrf_id; | |
193 | RB_INSERT(vrf_id_head, &vrfs_by_id, vrf); | |
194 | } | |
195 | ||
196 | /* Set name */ | |
197 | if (name && vrf->name[0] != '\0' && strcmp(name, vrf->name)) { | |
87272aff | 198 | /* update the vrf name */ |
d62a17ae | 199 | RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf); |
87272aff PG |
200 | strlcpy(vrf->data.l.netns_name, |
201 | name, NS_NAMSIZ); | |
d62a17ae | 202 | strlcpy(vrf->name, name, sizeof(vrf->name)); |
203 | RB_INSERT(vrf_name_head, &vrfs_by_name, vrf); | |
87272aff PG |
204 | if (vrf->vrf_id == VRF_DEFAULT) |
205 | vrf_set_default_name(vrf->name, false); | |
d62a17ae | 206 | } else if (name && vrf->name[0] == '\0') { |
207 | strlcpy(vrf->name, name, sizeof(vrf->name)); | |
208 | RB_INSERT(vrf_name_head, &vrfs_by_name, vrf); | |
209 | } | |
d62a17ae | 210 | if (new &&vrf_master.vrf_new_hook) |
211 | (*vrf_master.vrf_new_hook)(vrf); | |
212 | ||
213 | return vrf; | |
b72ede27 FL |
214 | } |
215 | ||
75d26fb3 | 216 | /* Update a VRF. If not found, create one. |
217 | * Arg: | |
218 | * name - The name of the vrf. | |
219 | * vrf_id - The vrf_id of the vrf. | |
220 | * Description: This function first finds the vrf using its name. If the vrf is | |
221 | * found and the vrf-id of the existing vrf does not match the new vrf id, it | |
222 | * will disable the existing vrf and update it with new vrf-id. If the vrf is | |
223 | * not found, it will create the vrf with given name and the new vrf id. | |
224 | */ | |
225 | struct vrf *vrf_update(vrf_id_t new_vrf_id, const char *name) | |
226 | { | |
227 | struct vrf *vrf = NULL; | |
228 | ||
229 | /*Treat VRF add for existing vrf as update | |
230 | * Update VRF ID and also update in VRF ID table | |
231 | */ | |
232 | if (name) | |
233 | vrf = vrf_lookup_by_name(name); | |
234 | if (vrf && new_vrf_id != VRF_UNKNOWN && vrf->vrf_id != VRF_UNKNOWN | |
235 | && vrf->vrf_id != new_vrf_id) { | |
236 | if (debug_vrf) { | |
237 | zlog_debug( | |
238 | "Vrf Update event: %s old id: %u, new id: %u", | |
239 | name, vrf->vrf_id, new_vrf_id); | |
240 | } | |
241 | ||
242 | /*Disable the vrf to simulate implicit delete | |
243 | * so that all stale routes are deleted | |
244 | * This vrf will be enabled down the line | |
245 | */ | |
246 | vrf_disable(vrf); | |
247 | ||
248 | ||
249 | RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf); | |
250 | vrf->vrf_id = new_vrf_id; | |
251 | RB_INSERT(vrf_id_head, &vrfs_by_id, vrf); | |
252 | ||
253 | } else { | |
254 | ||
255 | /* | |
256 | * vrf_get is implied creation if it does not exist | |
257 | */ | |
258 | vrf = vrf_get(new_vrf_id, name); | |
259 | } | |
260 | return vrf; | |
261 | } | |
262 | ||
84915b0a | 263 | /* Delete a VRF. This is called when the underlying VRF goes away, a |
264 | * pre-configured VRF is deleted or when shutting down (vrf_terminate()). | |
265 | */ | |
d62a17ae | 266 | void vrf_delete(struct vrf *vrf) |
b72ede27 | 267 | { |
d62a17ae | 268 | if (debug_vrf) |
c7384cf8 DS |
269 | zlog_debug("VRF %s(%u) is to be deleted.", vrf->name, |
270 | vrf->vrf_id); | |
b72ede27 | 271 | |
d62a17ae | 272 | if (vrf_is_enabled(vrf)) |
273 | vrf_disable(vrf); | |
e5bf3e1e | 274 | |
84915b0a | 275 | /* If the VRF is user configured, it'll stick around, just remove |
276 | * the ID mapping. Interfaces assigned to this VRF should've been | |
277 | * removed already as part of the VRF going down. | |
278 | */ | |
279 | if (vrf_is_user_cfged(vrf)) { | |
280 | if (vrf->vrf_id != VRF_UNKNOWN) { | |
281 | /* Delete any VRF interfaces - should be only | |
282 | * the VRF itself, other interfaces should've | |
283 | * been moved out of the VRF. | |
284 | */ | |
285 | if_terminate(vrf); | |
286 | RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf); | |
287 | vrf->vrf_id = VRF_UNKNOWN; | |
288 | } | |
6910315f | 289 | vrf->ns_ctxt = NULL; |
84915b0a | 290 | return; |
291 | } | |
292 | ||
d62a17ae | 293 | if (vrf_master.vrf_delete_hook) |
294 | (*vrf_master.vrf_delete_hook)(vrf); | |
216b18ef | 295 | |
d62a17ae | 296 | QOBJ_UNREG(vrf); |
f4e14fdb | 297 | if_terminate(vrf); |
b72ede27 | 298 | |
d62a17ae | 299 | if (vrf->vrf_id != VRF_UNKNOWN) |
300 | RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf); | |
301 | if (vrf->name[0] != '\0') | |
302 | RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf); | |
b72ede27 | 303 | |
d62a17ae | 304 | XFREE(MTYPE_VRF, vrf); |
b72ede27 FL |
305 | } |
306 | ||
307 | /* Look up a VRF by identifier. */ | |
d62a17ae | 308 | struct vrf *vrf_lookup_by_id(vrf_id_t vrf_id) |
b72ede27 | 309 | { |
d62a17ae | 310 | struct vrf vrf; |
311 | vrf.vrf_id = vrf_id; | |
312 | return (RB_FIND(vrf_id_head, &vrfs_by_id, &vrf)); | |
b72ede27 FL |
313 | } |
314 | ||
e5bf3e1e FL |
315 | /* |
316 | * Enable a VRF - that is, let the VRF be ready to use. | |
317 | * The VRF_ENABLE_HOOK callback will be called to inform | |
318 | * that they can allocate resources in this VRF. | |
319 | * | |
320 | * RETURN: 1 - enabled successfully; otherwise, 0. | |
321 | */ | |
d62a17ae | 322 | int vrf_enable(struct vrf *vrf) |
e5bf3e1e | 323 | { |
d62a17ae | 324 | if (vrf_is_enabled(vrf)) |
325 | return 1; | |
05e8e11e | 326 | |
d62a17ae | 327 | if (debug_vrf) |
c7384cf8 | 328 | zlog_debug("VRF %s(%u) is enabled.", vrf->name, vrf->vrf_id); |
e5bf3e1e | 329 | |
d62a17ae | 330 | SET_FLAG(vrf->status, VRF_ACTIVE); |
e5bf3e1e | 331 | |
d62a17ae | 332 | if (vrf_master.vrf_enable_hook) |
333 | (*vrf_master.vrf_enable_hook)(vrf); | |
e5bf3e1e | 334 | |
98cbbaea DS |
335 | /* |
336 | * If we have any nexthop group entries that | |
337 | * are awaiting vrf initialization then | |
338 | * let's let people know about it | |
339 | */ | |
340 | nexthop_group_enable_vrf(vrf); | |
341 | ||
d62a17ae | 342 | return 1; |
e5bf3e1e FL |
343 | } |
344 | ||
345 | /* | |
346 | * Disable a VRF - that is, let the VRF be unusable. | |
347 | * The VRF_DELETE_HOOK callback will be called to inform | |
348 | * that they must release the resources in the VRF. | |
349 | */ | |
697d3ec7 | 350 | void vrf_disable(struct vrf *vrf) |
e5bf3e1e | 351 | { |
d62a17ae | 352 | if (!vrf_is_enabled(vrf)) |
353 | return; | |
a647bfa8 | 354 | |
d62a17ae | 355 | UNSET_FLAG(vrf->status, VRF_ACTIVE); |
e5bf3e1e | 356 | |
d62a17ae | 357 | if (debug_vrf) |
c7384cf8 DS |
358 | zlog_debug("VRF %s(%u) is to be disabled.", vrf->name, |
359 | vrf->vrf_id); | |
e5bf3e1e | 360 | |
d62a17ae | 361 | /* Till now, nothing to be done for the default VRF. */ |
362 | // Pending: see why this statement. | |
e74f14fc | 363 | |
0cbee799 DS |
364 | |
365 | /* | |
366 | * When the vrf is disabled let's | |
367 | * handle all nexthop-groups associated | |
368 | * with this vrf | |
369 | */ | |
370 | nexthop_group_disable_vrf(vrf); | |
371 | ||
d62a17ae | 372 | if (vrf_master.vrf_disable_hook) |
373 | (*vrf_master.vrf_disable_hook)(vrf); | |
e5bf3e1e FL |
374 | } |
375 | ||
b7cfce93 MK |
376 | const char *vrf_id_to_name(vrf_id_t vrf_id) |
377 | { | |
378 | struct vrf *vrf; | |
379 | ||
7c1119cb CG |
380 | if (vrf_id == VRF_DEFAULT) |
381 | return VRF_DEFAULT_NAME; | |
382 | ||
b7cfce93 | 383 | vrf = vrf_lookup_by_id(vrf_id); |
bd47f3a3 | 384 | return VRF_LOGNAME(vrf); |
b7cfce93 MK |
385 | } |
386 | ||
d62a17ae | 387 | vrf_id_t vrf_name_to_id(const char *name) |
216b18ef | 388 | { |
d62a17ae | 389 | struct vrf *vrf; |
390 | vrf_id_t vrf_id = VRF_DEFAULT; // Pending: need a way to return invalid | |
391 | // id/ routine not used. | |
216b18ef | 392 | |
2569910b PG |
393 | if (!name) |
394 | return vrf_id; | |
d62a17ae | 395 | vrf = vrf_lookup_by_name(name); |
396 | if (vrf) | |
397 | vrf_id = vrf->vrf_id; | |
216b18ef | 398 | |
d62a17ae | 399 | return vrf_id; |
216b18ef DS |
400 | } |
401 | ||
b72ede27 | 402 | /* Get the data pointer of the specified VRF. If not found, create one. */ |
d62a17ae | 403 | void *vrf_info_get(vrf_id_t vrf_id) |
b72ede27 | 404 | { |
d62a17ae | 405 | struct vrf *vrf = vrf_get(vrf_id, NULL); |
406 | return vrf->info; | |
b72ede27 FL |
407 | } |
408 | ||
409 | /* Look up the data pointer of the specified VRF. */ | |
d62a17ae | 410 | void *vrf_info_lookup(vrf_id_t vrf_id) |
b72ede27 | 411 | { |
d62a17ae | 412 | struct vrf *vrf = vrf_lookup_by_id(vrf_id); |
413 | return vrf ? vrf->info : NULL; | |
b72ede27 FL |
414 | } |
415 | ||
7076bb2f | 416 | /* |
4a8bf858 | 417 | * VRF hash for storing set or not. |
7076bb2f | 418 | */ |
4a8bf858 DS |
419 | struct vrf_bit_set { |
420 | vrf_id_t vrf_id; | |
421 | bool set; | |
422 | }; | |
7076bb2f | 423 | |
d8b87afe | 424 | static unsigned int vrf_hash_bitmap_key(const void *data) |
4a8bf858 | 425 | { |
d8b87afe | 426 | const struct vrf_bit_set *bit = data; |
d62a17ae | 427 | |
4a8bf858 DS |
428 | return bit->vrf_id; |
429 | } | |
d62a17ae | 430 | |
74df8d6d | 431 | static bool vrf_hash_bitmap_cmp(const void *a, const void *b) |
4a8bf858 DS |
432 | { |
433 | const struct vrf_bit_set *bit1 = a; | |
434 | const struct vrf_bit_set *bit2 = b; | |
d62a17ae | 435 | |
4a8bf858 DS |
436 | return bit1->vrf_id == bit2->vrf_id; |
437 | } | |
438 | ||
439 | static void *vrf_hash_bitmap_alloc(void *data) | |
440 | { | |
441 | struct vrf_bit_set *copy = data; | |
442 | struct vrf_bit_set *bit; | |
443 | ||
444 | bit = XMALLOC(MTYPE_VRF_BITMAP, sizeof(*bit)); | |
445 | bit->vrf_id = copy->vrf_id; | |
446 | ||
447 | return bit; | |
448 | } | |
449 | ||
450 | static void vrf_hash_bitmap_free(void *data) | |
451 | { | |
452 | struct vrf_bit_set *bit = data; | |
453 | ||
454 | XFREE(MTYPE_VRF_BITMAP, bit); | |
455 | } | |
7076bb2f | 456 | |
d62a17ae | 457 | vrf_bitmap_t vrf_bitmap_init(void) |
7076bb2f | 458 | { |
4a8bf858 DS |
459 | return hash_create_size(32, vrf_hash_bitmap_key, vrf_hash_bitmap_cmp, |
460 | "VRF BIT HASH"); | |
7076bb2f FL |
461 | } |
462 | ||
d62a17ae | 463 | void vrf_bitmap_free(vrf_bitmap_t bmap) |
7076bb2f | 464 | { |
4a8bf858 | 465 | struct hash *vrf_hash = bmap; |
7076bb2f | 466 | |
4a8bf858 | 467 | if (vrf_hash == NULL) |
d62a17ae | 468 | return; |
7076bb2f | 469 | |
4a8bf858 DS |
470 | hash_clean(vrf_hash, vrf_hash_bitmap_free); |
471 | hash_free(vrf_hash); | |
7076bb2f FL |
472 | } |
473 | ||
d62a17ae | 474 | void vrf_bitmap_set(vrf_bitmap_t bmap, vrf_id_t vrf_id) |
7076bb2f | 475 | { |
4a8bf858 DS |
476 | struct vrf_bit_set lookup = { .vrf_id = vrf_id }; |
477 | struct hash *vrf_hash = bmap; | |
478 | struct vrf_bit_set *bit; | |
7076bb2f | 479 | |
4a8bf858 | 480 | if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN) |
d62a17ae | 481 | return; |
7076bb2f | 482 | |
4a8bf858 DS |
483 | bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc); |
484 | bit->set = true; | |
7076bb2f FL |
485 | } |
486 | ||
d62a17ae | 487 | void vrf_bitmap_unset(vrf_bitmap_t bmap, vrf_id_t vrf_id) |
7076bb2f | 488 | { |
4a8bf858 DS |
489 | struct vrf_bit_set lookup = { .vrf_id = vrf_id }; |
490 | struct hash *vrf_hash = bmap; | |
491 | struct vrf_bit_set *bit; | |
7076bb2f | 492 | |
4a8bf858 | 493 | if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN) |
d62a17ae | 494 | return; |
7076bb2f | 495 | |
4a8bf858 DS |
496 | bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc); |
497 | bit->set = false; | |
7076bb2f FL |
498 | } |
499 | ||
d62a17ae | 500 | int vrf_bitmap_check(vrf_bitmap_t bmap, vrf_id_t vrf_id) |
7076bb2f | 501 | { |
4a8bf858 DS |
502 | struct vrf_bit_set lookup = { .vrf_id = vrf_id }; |
503 | struct hash *vrf_hash = bmap; | |
504 | struct vrf_bit_set *bit; | |
7076bb2f | 505 | |
4a8bf858 | 506 | if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN) |
d62a17ae | 507 | return 0; |
7076bb2f | 508 | |
4a8bf858 DS |
509 | bit = hash_lookup(vrf_hash, &lookup); |
510 | if (bit) | |
511 | return bit->set; | |
512 | ||
513 | return 0; | |
7076bb2f FL |
514 | } |
515 | ||
d62a17ae | 516 | static void vrf_autocomplete(vector comps, struct cmd_token *token) |
d617d5fe | 517 | { |
d62a17ae | 518 | struct vrf *vrf = NULL; |
d617d5fe | 519 | |
723001fc PG |
520 | RB_FOREACH (vrf, vrf_name_head, &vrfs_by_name) |
521 | vector_set(comps, XSTRDUP(MTYPE_COMPLETION, vrf->name)); | |
d617d5fe DS |
522 | } |
523 | ||
524 | static const struct cmd_variable_handler vrf_var_handlers[] = { | |
d62a17ae | 525 | { |
526 | .varname = "vrf", | |
527 | .completions = vrf_autocomplete, | |
528 | }, | |
e429a2a0 IR |
529 | { |
530 | .varname = "vrf_name", | |
531 | .completions = vrf_autocomplete, | |
532 | }, | |
533 | { | |
534 | .varname = "nexthop_vrf", | |
535 | .completions = vrf_autocomplete, | |
536 | }, | |
d62a17ae | 537 | {.completions = NULL}, |
d617d5fe DS |
538 | }; |
539 | ||
b72ede27 | 540 | /* Initialize VRF module. */ |
d62a17ae | 541 | void vrf_init(int (*create)(struct vrf *), int (*enable)(struct vrf *), |
d01b92fd | 542 | int (*disable)(struct vrf *), int (*destroy)(struct vrf *), |
ecbc5a37 | 543 | int ((*update)(struct vrf *))) |
d62a17ae | 544 | { |
545 | struct vrf *default_vrf; | |
546 | ||
e26aedbe PG |
547 | /* initialise NS, in case VRF backend if NETNS */ |
548 | ns_init(); | |
d62a17ae | 549 | if (debug_vrf) |
15569c58 | 550 | zlog_debug("%s: Initializing VRF subsystem", __func__); |
d62a17ae | 551 | |
552 | vrf_master.vrf_new_hook = create; | |
553 | vrf_master.vrf_enable_hook = enable; | |
554 | vrf_master.vrf_disable_hook = disable; | |
d01b92fd | 555 | vrf_master.vrf_delete_hook = destroy; |
ecbc5a37 | 556 | vrf_master.vrf_update_name_hook = update; |
d62a17ae | 557 | |
558 | /* The default VRF always exists. */ | |
eb6934d5 | 559 | default_vrf = vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME); |
d62a17ae | 560 | if (!default_vrf) { |
450971aa | 561 | flog_err(EC_LIB_VRF_START, |
1c50c1c0 | 562 | "vrf_init: failed to create the default VRF!"); |
d62a17ae | 563 | exit(1); |
564 | } | |
20c87e98 TC |
565 | if (vrf_is_backend_netns()) { |
566 | struct ns *ns; | |
567 | ||
fdafe17e | 568 | strlcpy(default_vrf->data.l.netns_name, |
eb6934d5 | 569 | VRF_DEFAULT_NAME, NS_NAMSIZ); |
1eb92f06 | 570 | ns = ns_lookup(NS_DEFAULT); |
c3568c4d TC |
571 | ns->vrf_ctxt = default_vrf; |
572 | default_vrf->ns_ctxt = ns; | |
20c87e98 | 573 | } |
d62a17ae | 574 | |
575 | /* Enable the default VRF. */ | |
576 | if (!vrf_enable(default_vrf)) { | |
450971aa | 577 | flog_err(EC_LIB_VRF_START, |
1c50c1c0 | 578 | "vrf_init: failed to enable the default VRF!"); |
d62a17ae | 579 | exit(1); |
580 | } | |
581 | ||
582 | cmd_variable_handler_register(vrf_var_handlers); | |
b72ede27 FL |
583 | } |
584 | ||
ea0d70b1 SW |
585 | static void vrf_terminate_single(struct vrf *vrf) |
586 | { | |
587 | /* Clear configured flag and invoke delete. */ | |
588 | UNSET_FLAG(vrf->status, VRF_CONFIGURED); | |
589 | vrf_delete(vrf); | |
590 | } | |
591 | ||
b72ede27 | 592 | /* Terminate VRF module. */ |
d62a17ae | 593 | void vrf_terminate(void) |
b72ede27 | 594 | { |
ea0d70b1 | 595 | struct vrf *vrf, *tmp; |
b72ede27 | 596 | |
d62a17ae | 597 | if (debug_vrf) |
15569c58 | 598 | zlog_debug("%s: Shutting down vrf subsystem", __func__); |
19dc275e | 599 | |
ea0d70b1 SW |
600 | RB_FOREACH_SAFE (vrf, vrf_id_head, &vrfs_by_id, tmp) { |
601 | if (vrf->vrf_id == VRF_DEFAULT) | |
602 | continue; | |
55cd0f61 | 603 | |
ea0d70b1 | 604 | vrf_terminate_single(vrf); |
65c3a7c4 | 605 | } |
55cd0f61 | 606 | |
ea0d70b1 SW |
607 | RB_FOREACH_SAFE (vrf, vrf_name_head, &vrfs_by_name, tmp) { |
608 | if (vrf->vrf_id == VRF_DEFAULT) | |
609 | continue; | |
55cd0f61 | 610 | |
ea0d70b1 | 611 | vrf_terminate_single(vrf); |
65c3a7c4 | 612 | } |
ea0d70b1 SW |
613 | |
614 | /* Finally terminate default VRF */ | |
615 | vrf = vrf_lookup_by_id(VRF_DEFAULT); | |
616 | vrf_terminate_single(vrf); | |
b72ede27 FL |
617 | } |
618 | ||
0f4977c6 | 619 | int vrf_socket(int domain, int type, int protocol, vrf_id_t vrf_id, |
02fe07c7 | 620 | const char *interfacename) |
e5bf3e1e | 621 | { |
2e0d2b3d | 622 | int ret, save_errno, ret2; |
e5bf3e1e | 623 | |
2e0d2b3d PG |
624 | ret = vrf_switch_to_netns(vrf_id); |
625 | if (ret < 0) | |
450971aa | 626 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 627 | __func__, vrf_id, safe_strerror(errno)); |
b66d022e | 628 | |
d62a17ae | 629 | ret = socket(domain, type, protocol); |
2e0d2b3d PG |
630 | save_errno = errno; |
631 | ret2 = vrf_switchback_to_initial(); | |
632 | if (ret2 < 0) | |
450971aa | 633 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
634 | "%s: Can't switchback from VRF %u (%s)", __func__, |
635 | vrf_id, safe_strerror(errno)); | |
2e0d2b3d | 636 | errno = save_errno; |
0f4977c6 PG |
637 | if (ret <= 0) |
638 | return ret; | |
639 | ret2 = vrf_bind(vrf_id, ret, interfacename); | |
640 | if (ret2 < 0) { | |
641 | close(ret); | |
642 | ret = ret2; | |
643 | } | |
d62a17ae | 644 | return ret; |
e5bf3e1e FL |
645 | } |
646 | ||
78dd30b2 PG |
647 | int vrf_is_backend_netns(void) |
648 | { | |
649 | return (vrf_backend == VRF_BACKEND_NETNS); | |
650 | } | |
651 | ||
652 | int vrf_get_backend(void) | |
653 | { | |
72261ecd PG |
654 | if (!vrf_backend_configured) |
655 | return VRF_BACKEND_UNKNOWN; | |
78dd30b2 PG |
656 | return vrf_backend; |
657 | } | |
658 | ||
7239d3d9 | 659 | int vrf_configure_backend(enum vrf_backend_type backend) |
78dd30b2 | 660 | { |
f7d45925 QY |
661 | /* Work around issue in old gcc */ |
662 | switch (backend) { | |
663 | case VRF_BACKEND_UNKNOWN: | |
664 | case VRF_BACKEND_NETNS: | |
665 | case VRF_BACKEND_VRF_LITE: | |
666 | break; | |
667 | default: | |
7239d3d9 | 668 | return -1; |
f7d45925 | 669 | } |
7239d3d9 QY |
670 | |
671 | vrf_backend = backend; | |
72261ecd | 672 | vrf_backend_configured = 1; |
7239d3d9 QY |
673 | |
674 | return 0; | |
78dd30b2 PG |
675 | } |
676 | ||
03aff2d8 PG |
677 | int vrf_handler_create(struct vty *vty, const char *vrfname, |
678 | struct vrf **vrf) | |
f30c50b9 | 679 | { |
d62a17ae | 680 | struct vrf *vrfp; |
8b4cb7a6 CS |
681 | char xpath_list[XPATH_MAXLEN]; |
682 | int ret; | |
f30c50b9 | 683 | |
d62a17ae | 684 | if (strlen(vrfname) > VRF_NAMSIZ) { |
697d3ec7 PG |
685 | if (vty) |
686 | vty_out(vty, | |
d9f12794 | 687 | "%% VRF name %s invalid: length exceeds %d bytes\n", |
996c9314 | 688 | vrfname, VRF_NAMSIZ); |
697d3ec7 | 689 | else |
0351a28f | 690 | flog_warn( |
450971aa | 691 | EC_LIB_VRF_LENGTH, |
1d5453d6 | 692 | "%% VRF name %s invalid: length exceeds %d bytes", |
996c9314 | 693 | vrfname, VRF_NAMSIZ); |
d62a17ae | 694 | return CMD_WARNING_CONFIG_FAILED; |
695 | } | |
f30c50b9 | 696 | |
8b4cb7a6 | 697 | if (vty) { |
09b150ef IR |
698 | snprintf(xpath_list, sizeof(xpath_list), FRR_VRF_KEY_XPATH, |
699 | vrfname); | |
8b4cb7a6 CS |
700 | |
701 | nb_cli_enqueue_change(vty, xpath_list, NB_OP_CREATE, NULL); | |
fd396924 | 702 | ret = nb_cli_apply_changes_clear_pending(vty, xpath_list); |
8b4cb7a6 CS |
703 | if (ret == CMD_SUCCESS) { |
704 | VTY_PUSH_XPATH(VRF_NODE, xpath_list); | |
705 | vrfp = vrf_lookup_by_name(vrfname); | |
706 | if (vrfp) | |
707 | VTY_PUSH_CONTEXT(VRF_NODE, vrfp); | |
708 | } | |
709 | } else { | |
710 | vrfp = vrf_get(VRF_UNKNOWN, vrfname); | |
f30c50b9 | 711 | |
8b4cb7a6 CS |
712 | if (vrf) |
713 | *vrf = vrfp; | |
714 | } | |
d62a17ae | 715 | return CMD_SUCCESS; |
f30c50b9 RW |
716 | } |
717 | ||
996c9314 | 718 | int vrf_netns_handler_create(struct vty *vty, struct vrf *vrf, char *pathname, |
20f4b2b0 PG |
719 | ns_id_t ns_id, ns_id_t internal_ns_id, |
720 | ns_id_t rel_def_ns_id) | |
e26aedbe PG |
721 | { |
722 | struct ns *ns = NULL; | |
723 | ||
724 | if (!vrf) | |
725 | return CMD_WARNING_CONFIG_FAILED; | |
726 | if (vrf->vrf_id != VRF_UNKNOWN && vrf->ns_ctxt == NULL) { | |
727 | if (vty) | |
728 | vty_out(vty, | |
729 | "VRF %u is already configured with VRF %s\n", | |
730 | vrf->vrf_id, vrf->name); | |
731 | else | |
9165c5f5 | 732 | zlog_info("VRF %u is already configured with VRF %s", |
e26aedbe PG |
733 | vrf->vrf_id, vrf->name); |
734 | return CMD_WARNING_CONFIG_FAILED; | |
735 | } | |
736 | if (vrf->ns_ctxt != NULL) { | |
996c9314 | 737 | ns = (struct ns *)vrf->ns_ctxt; |
2e1cc436 | 738 | if (!strcmp(ns->name, pathname)) { |
e26aedbe PG |
739 | if (vty) |
740 | vty_out(vty, | |
996c9314 LB |
741 | "VRF %u already configured with NETNS %s\n", |
742 | vrf->vrf_id, ns->name); | |
e26aedbe | 743 | else |
0351a28f | 744 | zlog_info( |
ade6974d QY |
745 | "VRF %u already configured with NETNS %s", |
746 | vrf->vrf_id, ns->name); | |
e26aedbe PG |
747 | return CMD_WARNING_CONFIG_FAILED; |
748 | } | |
749 | } | |
750 | ns = ns_lookup_name(pathname); | |
751 | if (ns && ns->vrf_ctxt) { | |
752 | struct vrf *vrf2 = (struct vrf *)ns->vrf_ctxt; | |
753 | ||
754 | if (vrf2 == vrf) | |
755 | return CMD_SUCCESS; | |
756 | if (vty) | |
996c9314 | 757 | vty_out(vty, |
3efd0893 | 758 | "NS %s is already configured with VRF %u(%s)\n", |
996c9314 | 759 | ns->name, vrf2->vrf_id, vrf2->name); |
e26aedbe | 760 | else |
0351a28f | 761 | zlog_info("NS %s is already configured with VRF %u(%s)", |
e26aedbe PG |
762 | ns->name, vrf2->vrf_id, vrf2->name); |
763 | return CMD_WARNING_CONFIG_FAILED; | |
764 | } | |
765 | ns = ns_get_created(ns, pathname, ns_id); | |
03aff2d8 | 766 | ns->internal_ns_id = internal_ns_id; |
20f4b2b0 | 767 | ns->relative_default_ns = rel_def_ns_id; |
e26aedbe PG |
768 | ns->vrf_ctxt = (void *)vrf; |
769 | vrf->ns_ctxt = (void *)ns; | |
770 | /* update VRF netns NAME */ | |
2e1cc436 | 771 | strlcpy(vrf->data.l.netns_name, basename(pathname), NS_NAMSIZ); |
e26aedbe PG |
772 | |
773 | if (!ns_enable(ns, vrf_update_vrf_id)) { | |
774 | if (vty) | |
775 | vty_out(vty, "Can not associate NS %u with NETNS %s\n", | |
996c9314 | 776 | ns->ns_id, ns->name); |
e26aedbe | 777 | else |
0351a28f | 778 | zlog_info("Can not associate NS %u with NETNS %s", |
e26aedbe PG |
779 | ns->ns_id, ns->name); |
780 | return CMD_WARNING_CONFIG_FAILED; | |
781 | } | |
782 | ||
783 | return CMD_SUCCESS; | |
784 | } | |
785 | ||
697d3ec7 | 786 | /* vrf CLI commands */ |
16d6ea59 QY |
787 | DEFUN_NOSH(vrf_exit, |
788 | vrf_exit_cmd, | |
789 | "exit-vrf", | |
790 | "Exit current mode and down to previous mode\n") | |
791 | { | |
799a81df | 792 | cmd_exit(vty); |
16d6ea59 QY |
793 | return CMD_SUCCESS; |
794 | } | |
795 | ||
ca77b518 | 796 | DEFUN_YANG_NOSH (vrf, |
697d3ec7 PG |
797 | vrf_cmd, |
798 | "vrf NAME", | |
799 | "Select a VRF to configure\n" | |
800 | "VRF's name\n") | |
801 | { | |
802 | int idx_name = 1; | |
803 | const char *vrfname = argv[idx_name]->arg; | |
804 | ||
805 | return vrf_handler_create(vty, vrfname, NULL); | |
806 | } | |
807 | ||
ca77b518 | 808 | DEFUN_YANG (no_vrf, |
34c46274 RW |
809 | no_vrf_cmd, |
810 | "no vrf NAME", | |
811 | NO_STR | |
812 | "Delete a pseudo VRF's configuration\n" | |
813 | "VRF's name\n") | |
f30c50b9 | 814 | { |
d62a17ae | 815 | const char *vrfname = argv[2]->arg; |
8b4cb7a6 | 816 | char xpath_list[XPATH_MAXLEN]; |
53dc2b05 | 817 | |
d62a17ae | 818 | struct vrf *vrfp; |
f30c50b9 | 819 | |
d62a17ae | 820 | vrfp = vrf_lookup_by_name(vrfname); |
f30c50b9 | 821 | |
cd980d03 IR |
822 | if (vrfp == NULL) |
823 | return CMD_SUCCESS; | |
f30c50b9 | 824 | |
d62a17ae | 825 | if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) { |
826 | vty_out(vty, "%% Only inactive VRFs can be deleted\n"); | |
827 | return CMD_WARNING_CONFIG_FAILED; | |
828 | } | |
f30c50b9 | 829 | |
f5eef2d5 IR |
830 | if (vrf_get_backend() == VRF_BACKEND_VRF_LITE) { |
831 | /* | |
832 | * Remove the VRF interface config. Currently, we allow to | |
833 | * remove only inactive VRFs, so we use VRF_DEFAULT_NAME here, | |
834 | * because when the VRF is removed from kernel, the interface | |
835 | * is moved to the default VRF. If we ever allow removing | |
836 | * active VRFs, this code have to be updated accordingly. | |
837 | */ | |
838 | snprintf(xpath_list, sizeof(xpath_list), | |
839 | "/frr-interface:lib/interface[name='%s'][vrf='%s']", | |
840 | vrfname, VRF_DEFAULT_NAME); | |
841 | nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL); | |
842 | } | |
843 | ||
09b150ef | 844 | snprintf(xpath_list, sizeof(xpath_list), FRR_VRF_KEY_XPATH, vrfname); |
f30c50b9 | 845 | |
8b4cb7a6 | 846 | nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL); |
f5eef2d5 | 847 | return nb_cli_apply_changes(vty, NULL); |
f30c50b9 RW |
848 | } |
849 | ||
53dc2b05 | 850 | |
62b346ee | 851 | static struct cmd_node vrf_node = { |
f4b8291f | 852 | .name = "vrf", |
62b346ee | 853 | .node = VRF_NODE, |
24389580 | 854 | .parent_node = CONFIG_NODE, |
62b346ee | 855 | .prompt = "%s(config-vrf)# ", |
62b346ee | 856 | }; |
7ddcfca4 | 857 | |
19dc275e DS |
858 | /* |
859 | * Debug CLI for vrf's | |
860 | */ | |
861 | DEFUN (vrf_debug, | |
862 | vrf_debug_cmd, | |
863 | "debug vrf", | |
864 | DEBUG_STR | |
865 | "VRF Debugging\n") | |
866 | { | |
d62a17ae | 867 | debug_vrf = 1; |
19dc275e | 868 | |
d62a17ae | 869 | return CMD_SUCCESS; |
19dc275e DS |
870 | } |
871 | ||
872 | DEFUN (no_vrf_debug, | |
873 | no_vrf_debug_cmd, | |
874 | "no debug vrf", | |
875 | NO_STR | |
876 | DEBUG_STR | |
877 | "VRF Debugging\n") | |
878 | { | |
d62a17ae | 879 | debug_vrf = 0; |
19dc275e | 880 | |
d62a17ae | 881 | return CMD_SUCCESS; |
19dc275e DS |
882 | } |
883 | ||
d62a17ae | 884 | static int vrf_write_host(struct vty *vty) |
19dc275e | 885 | { |
d62a17ae | 886 | if (debug_vrf) |
887 | vty_out(vty, "debug vrf\n"); | |
19dc275e | 888 | |
d62a17ae | 889 | return 1; |
19dc275e DS |
890 | } |
891 | ||
612c2c15 | 892 | static int vrf_write_host(struct vty *vty); |
62b346ee | 893 | static struct cmd_node vrf_debug_node = { |
f4b8291f | 894 | .name = "vrf debug", |
62b346ee DL |
895 | .node = VRF_DEBUG_NODE, |
896 | .prompt = "", | |
612c2c15 | 897 | .config_write = vrf_write_host, |
62b346ee | 898 | }; |
19dc275e | 899 | |
d62a17ae | 900 | void vrf_install_commands(void) |
19dc275e | 901 | { |
612c2c15 | 902 | install_node(&vrf_debug_node); |
19dc275e | 903 | |
d62a17ae | 904 | install_element(CONFIG_NODE, &vrf_debug_cmd); |
905 | install_element(ENABLE_NODE, &vrf_debug_cmd); | |
906 | install_element(CONFIG_NODE, &no_vrf_debug_cmd); | |
907 | install_element(ENABLE_NODE, &no_vrf_debug_cmd); | |
19dc275e | 908 | } |
53dc2b05 | 909 | |
3bc34908 PG |
910 | void vrf_cmd_init(int (*writefunc)(struct vty *vty), |
911 | struct zebra_privs_t *daemon_privs) | |
7ddcfca4 | 912 | { |
d62a17ae | 913 | install_element(CONFIG_NODE, &vrf_cmd); |
914 | install_element(CONFIG_NODE, &no_vrf_cmd); | |
612c2c15 DL |
915 | vrf_node.config_write = writefunc; |
916 | install_node(&vrf_node); | |
d62a17ae | 917 | install_default(VRF_NODE); |
16d6ea59 | 918 | install_element(VRF_NODE, &vrf_exit_cmd); |
19dc275e | 919 | } |
ec31f30d | 920 | |
4fe52e76 | 921 | void vrf_set_default_name(const char *default_name, bool force) |
ec31f30d | 922 | { |
c200f5e1 | 923 | struct vrf *def_vrf; |
4fe52e76 | 924 | static bool def_vrf_forced; |
ec31f30d | 925 | |
c200f5e1 PG |
926 | def_vrf = vrf_lookup_by_id(VRF_DEFAULT); |
927 | assert(default_name); | |
4fe52e76 PG |
928 | if (def_vrf && !force && def_vrf_forced) { |
929 | zlog_debug("VRF: %s, avoid changing name to %s, previously forced (%u)", | |
930 | def_vrf->name, default_name, | |
931 | def_vrf->vrf_id); | |
932 | return; | |
933 | } | |
87272aff PG |
934 | if (strmatch(vrf_default_name, default_name)) |
935 | return; | |
c200f5e1 PG |
936 | snprintf(vrf_default_name, VRF_NAMSIZ, "%s", default_name); |
937 | if (def_vrf) { | |
4fe52e76 PG |
938 | if (force) |
939 | def_vrf_forced = true; | |
c200f5e1 PG |
940 | RB_REMOVE(vrf_name_head, &vrfs_by_name, def_vrf); |
941 | strlcpy(def_vrf->data.l.netns_name, | |
942 | vrf_default_name, NS_NAMSIZ); | |
943 | strlcpy(def_vrf->name, vrf_default_name, sizeof(def_vrf->name)); | |
944 | RB_INSERT(vrf_name_head, &vrfs_by_name, def_vrf); | |
ecbc5a37 PG |
945 | if (vrf_master.vrf_update_name_hook) |
946 | (*vrf_master.vrf_update_name_hook)(def_vrf); | |
c200f5e1 PG |
947 | } |
948 | } | |
949 | ||
950 | const char *vrf_get_default_name(void) | |
951 | { | |
952 | return vrf_default_name; | |
953 | } | |
954 | ||
36eef858 | 955 | int vrf_bind(vrf_id_t vrf_id, int fd, const char *ifname) |
0f4977c6 PG |
956 | { |
957 | int ret = 0; | |
91f854f6 | 958 | struct interface *ifp; |
36eef858 IR |
959 | struct vrf *vrf; |
960 | ||
961 | if (fd < 0) | |
962 | return -1; | |
963 | ||
964 | if (vrf_id == VRF_UNKNOWN) | |
965 | return -1; | |
966 | ||
967 | /* can't bind to a VRF that doesn't exist */ | |
968 | vrf = vrf_lookup_by_id(vrf_id); | |
969 | if (!vrf_is_enabled(vrf)) | |
970 | return -1; | |
971 | ||
972 | if (ifname && strcmp(ifname, vrf->name)) { | |
973 | /* binding to a regular interface */ | |
974 | ||
975 | /* can't bind to an interface that doesn't exist */ | |
976 | ifp = if_lookup_by_name(ifname, vrf_id); | |
977 | if (!ifp) | |
978 | return -1; | |
979 | } else { | |
980 | /* binding to a VRF device */ | |
981 | ||
982 | /* nothing to do for netns */ | |
983 | if (vrf_is_backend_netns()) | |
984 | return 0; | |
985 | ||
986 | /* nothing to do for default vrf */ | |
987 | if (vrf_id == VRF_DEFAULT) | |
988 | return 0; | |
989 | ||
990 | ifname = vrf->name; | |
991 | } | |
0f4977c6 | 992 | |
0f4977c6 | 993 | #ifdef SO_BINDTODEVICE |
36eef858 IR |
994 | ret = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, ifname, |
995 | strlen(ifname) + 1); | |
0f4977c6 | 996 | if (ret < 0) |
36eef858 IR |
997 | zlog_err("bind to interface %s failed, errno=%d", ifname, |
998 | errno); | |
0f4977c6 PG |
999 | #endif /* SO_BINDTODEVICE */ |
1000 | return ret; | |
1001 | } | |
2e0d2b3d | 1002 | int vrf_getaddrinfo(const char *node, const char *service, |
996c9314 LB |
1003 | const struct addrinfo *hints, struct addrinfo **res, |
1004 | vrf_id_t vrf_id) | |
2e0d2b3d PG |
1005 | { |
1006 | int ret, ret2, save_errno; | |
1007 | ||
1008 | ret = vrf_switch_to_netns(vrf_id); | |
1009 | if (ret < 0) | |
450971aa | 1010 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 1011 | __func__, vrf_id, safe_strerror(errno)); |
2e0d2b3d PG |
1012 | ret = getaddrinfo(node, service, hints, res); |
1013 | save_errno = errno; | |
1014 | ret2 = vrf_switchback_to_initial(); | |
1015 | if (ret2 < 0) | |
450971aa | 1016 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
1017 | "%s: Can't switchback from VRF %u (%s)", __func__, |
1018 | vrf_id, safe_strerror(errno)); | |
2e0d2b3d PG |
1019 | errno = save_errno; |
1020 | return ret; | |
1021 | } | |
1022 | ||
516d7591 PG |
1023 | int vrf_ioctl(vrf_id_t vrf_id, int d, unsigned long request, char *params) |
1024 | { | |
1025 | int ret, saved_errno, rc; | |
1026 | ||
1027 | ret = vrf_switch_to_netns(vrf_id); | |
1028 | if (ret < 0) { | |
450971aa | 1029 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 1030 | __func__, vrf_id, safe_strerror(errno)); |
516d7591 PG |
1031 | return 0; |
1032 | } | |
1033 | rc = ioctl(d, request, params); | |
1034 | saved_errno = errno; | |
1035 | ret = vrf_switchback_to_initial(); | |
1036 | if (ret < 0) | |
450971aa | 1037 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
1038 | "%s: Can't switchback from VRF %u (%s)", __func__, |
1039 | vrf_id, safe_strerror(errno)); | |
516d7591 PG |
1040 | errno = saved_errno; |
1041 | return rc; | |
1042 | } | |
1043 | ||
0f4977c6 | 1044 | int vrf_sockunion_socket(const union sockunion *su, vrf_id_t vrf_id, |
02fe07c7 | 1045 | const char *interfacename) |
2e0d2b3d PG |
1046 | { |
1047 | int ret, save_errno, ret2; | |
1048 | ||
1049 | ret = vrf_switch_to_netns(vrf_id); | |
1050 | if (ret < 0) | |
450971aa | 1051 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 1052 | __func__, vrf_id, safe_strerror(errno)); |
2e0d2b3d PG |
1053 | ret = sockunion_socket(su); |
1054 | save_errno = errno; | |
1055 | ret2 = vrf_switchback_to_initial(); | |
1056 | if (ret2 < 0) | |
450971aa | 1057 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
1058 | "%s: Can't switchback from VRF %u (%s)", __func__, |
1059 | vrf_id, safe_strerror(errno)); | |
2e0d2b3d | 1060 | errno = save_errno; |
0f4977c6 PG |
1061 | |
1062 | if (ret <= 0) | |
1063 | return ret; | |
1064 | ret2 = vrf_bind(vrf_id, ret, interfacename); | |
1065 | if (ret2 < 0) { | |
1066 | close(ret); | |
1067 | ret = ret2; | |
1068 | } | |
2e0d2b3d PG |
1069 | return ret; |
1070 | } | |
0b014ea6 PG |
1071 | |
1072 | vrf_id_t vrf_generate_id(void) | |
1073 | { | |
1074 | static int vrf_id_local; | |
1075 | ||
1076 | return ++vrf_id_local; | |
1077 | } | |
bc867a5d CS |
1078 | |
1079 | /* ------- Northbound callbacks ------- */ | |
1080 | ||
1081 | /* | |
1082 | * XPath: /frr-vrf:lib/vrf | |
1083 | */ | |
60ee8be1 | 1084 | static int lib_vrf_create(struct nb_cb_create_args *args) |
bc867a5d CS |
1085 | { |
1086 | const char *vrfname; | |
1087 | struct vrf *vrfp; | |
1088 | ||
60ee8be1 | 1089 | vrfname = yang_dnode_get_string(args->dnode, "./name"); |
bc867a5d | 1090 | |
60ee8be1 | 1091 | if (args->event != NB_EV_APPLY) |
bc867a5d CS |
1092 | return NB_OK; |
1093 | ||
1094 | vrfp = vrf_get(VRF_UNKNOWN, vrfname); | |
1095 | ||
b9b794db | 1096 | SET_FLAG(vrfp->status, VRF_CONFIGURED); |
60ee8be1 | 1097 | nb_running_set_entry(args->dnode, vrfp); |
bc867a5d CS |
1098 | |
1099 | return NB_OK; | |
1100 | } | |
1101 | ||
60ee8be1 | 1102 | static int lib_vrf_destroy(struct nb_cb_destroy_args *args) |
bc867a5d CS |
1103 | { |
1104 | struct vrf *vrfp; | |
1105 | ||
60ee8be1 | 1106 | switch (args->event) { |
bc867a5d | 1107 | case NB_EV_VALIDATE: |
60ee8be1 | 1108 | vrfp = nb_running_get_entry(args->dnode, NULL, true); |
bc867a5d | 1109 | if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) { |
10bdc68f RW |
1110 | snprintf(args->errmsg, args->errmsg_len, |
1111 | "Only inactive VRFs can be deleted"); | |
bc867a5d CS |
1112 | return NB_ERR_VALIDATION; |
1113 | } | |
1114 | break; | |
1115 | case NB_EV_PREPARE: | |
1116 | case NB_EV_ABORT: | |
1117 | break; | |
1118 | case NB_EV_APPLY: | |
60ee8be1 | 1119 | vrfp = nb_running_unset_entry(args->dnode); |
8b4cb7a6 | 1120 | |
bc867a5d | 1121 | /* Clear configured flag and invoke delete. */ |
b9b794db | 1122 | UNSET_FLAG(vrfp->status, VRF_CONFIGURED); |
bc867a5d CS |
1123 | vrf_delete(vrfp); |
1124 | break; | |
1125 | } | |
1126 | ||
1127 | return NB_OK; | |
1128 | } | |
1129 | ||
60ee8be1 | 1130 | static const void *lib_vrf_get_next(struct nb_cb_get_next_args *args) |
bc867a5d | 1131 | { |
60ee8be1 | 1132 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d | 1133 | |
60ee8be1 | 1134 | if (args->list_entry == NULL) { |
bc867a5d CS |
1135 | vrfp = RB_MIN(vrf_name_head, &vrfs_by_name); |
1136 | } else { | |
1137 | vrfp = RB_NEXT(vrf_name_head, vrfp); | |
1138 | } | |
1139 | ||
1140 | return vrfp; | |
1141 | } | |
1142 | ||
60ee8be1 | 1143 | static int lib_vrf_get_keys(struct nb_cb_get_keys_args *args) |
bc867a5d | 1144 | { |
60ee8be1 | 1145 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d | 1146 | |
60ee8be1 RW |
1147 | args->keys->num = 1; |
1148 | strlcpy(args->keys->key[0], vrfp->name, sizeof(args->keys->key[0])); | |
bc867a5d CS |
1149 | |
1150 | return NB_OK; | |
1151 | } | |
1152 | ||
60ee8be1 | 1153 | static const void *lib_vrf_lookup_entry(struct nb_cb_lookup_entry_args *args) |
bc867a5d | 1154 | { |
60ee8be1 | 1155 | const char *vrfname = args->keys->key[0]; |
bc867a5d CS |
1156 | |
1157 | struct vrf *vrf = vrf_lookup_by_name(vrfname); | |
1158 | ||
1159 | return vrf; | |
1160 | } | |
1161 | ||
1162 | /* | |
1163 | * XPath: /frr-vrf:lib/vrf/id | |
1164 | */ | |
60ee8be1 RW |
1165 | static struct yang_data * |
1166 | lib_vrf_state_id_get_elem(struct nb_cb_get_elem_args *args) | |
bc867a5d | 1167 | { |
60ee8be1 | 1168 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d | 1169 | |
60ee8be1 | 1170 | return yang_data_new_uint32(args->xpath, vrfp->vrf_id); |
bc867a5d CS |
1171 | } |
1172 | ||
1173 | /* | |
1174 | * XPath: /frr-vrf:lib/vrf/active | |
1175 | */ | |
60ee8be1 RW |
1176 | static struct yang_data * |
1177 | lib_vrf_state_active_get_elem(struct nb_cb_get_elem_args *args) | |
bc867a5d | 1178 | { |
60ee8be1 | 1179 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d CS |
1180 | |
1181 | if (vrfp->status == VRF_ACTIVE) | |
1182 | return yang_data_new_bool( | |
60ee8be1 | 1183 | args->xpath, vrfp->status == VRF_ACTIVE ? true : false); |
bc867a5d CS |
1184 | |
1185 | return NULL; | |
1186 | } | |
1187 | ||
1188 | /* clang-format off */ | |
1189 | const struct frr_yang_module_info frr_vrf_info = { | |
1190 | .name = "frr-vrf", | |
1191 | .nodes = { | |
1192 | { | |
1193 | .xpath = "/frr-vrf:lib/vrf", | |
1194 | .cbs = { | |
1195 | .create = lib_vrf_create, | |
1196 | .destroy = lib_vrf_destroy, | |
1197 | .get_next = lib_vrf_get_next, | |
1198 | .get_keys = lib_vrf_get_keys, | |
1199 | .lookup_entry = lib_vrf_lookup_entry, | |
3bb513c3 CH |
1200 | }, |
1201 | .priority = NB_DFLT_PRIORITY - 2, | |
bc867a5d CS |
1202 | }, |
1203 | { | |
1204 | .xpath = "/frr-vrf:lib/vrf/state/id", | |
1205 | .cbs = { | |
1206 | .get_elem = lib_vrf_state_id_get_elem, | |
1207 | } | |
1208 | }, | |
1209 | { | |
1210 | .xpath = "/frr-vrf:lib/vrf/state/active", | |
1211 | .cbs = { | |
1212 | .get_elem = lib_vrf_state_active_get_elem, | |
1213 | } | |
1214 | }, | |
1215 | { | |
1216 | .xpath = NULL, | |
1217 | }, | |
1218 | } | |
1219 | }; | |
1220 |