]> git.proxmox.com Git - mirror_frr.git/blame - lib/vrf.c
Merge pull request #6845 from opensourcerouting/foreach-safi-formatting
[mirror_frr.git] / lib / vrf.c
CommitLineData
b72ede27
FL
1/*
2 * VRF functions.
3 * Copyright (C) 2014 6WIND S.A.
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published
9 * by the Free Software Foundation; either version 2, or (at your
10 * option) any later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
896014f4
DL
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
b72ede27
FL
20 */
21
22#include <zebra.h>
23
4691b65a
PG
24/* for basename */
25#include <libgen.h>
26
6a69b354 27#include "if.h"
b72ede27 28#include "vrf.h"
7922fc65 29#include "vrf_int.h"
b72ede27
FL
30#include "prefix.h"
31#include "table.h"
32#include "log.h"
33#include "memory.h"
19dc275e 34#include "command.h"
b95c1883 35#include "ns.h"
3bc34908 36#include "privs.h"
98cbbaea 37#include "nexthop_group.h"
b66d022e 38#include "lib_errors.h"
bc867a5d 39#include "northbound.h"
8b4cb7a6 40#include "northbound_cli.h"
19dc275e 41
ec31f30d
PG
42/* default VRF ID value used when VRF backend is not NETNS */
43#define VRF_DEFAULT_INTERNAL 0
dd114702 44#define VRF_DEFAULT_NAME_INTERNAL "default"
ec31f30d 45
d62a17ae 46DEFINE_MTYPE_STATIC(LIB, VRF, "VRF")
4a1ab8e4
DL
47DEFINE_MTYPE_STATIC(LIB, VRF_BITMAP, "VRF bit-map")
48
e80e7cce
DL
49DEFINE_QOBJ_TYPE(vrf)
50
d62a17ae 51static __inline int vrf_id_compare(const struct vrf *, const struct vrf *);
52static __inline int vrf_name_compare(const struct vrf *, const struct vrf *);
1a1a7065 53
d62a17ae 54RB_GENERATE(vrf_id_head, vrf, id_entry, vrf_id_compare);
55RB_GENERATE(vrf_name_head, vrf, name_entry, vrf_name_compare);
1a1a7065 56
d62a17ae 57struct vrf_id_head vrfs_by_id = RB_INITIALIZER(&vrfs_by_id);
58struct vrf_name_head vrfs_by_name = RB_INITIALIZER(&vrfs_by_name);
1a1a7065 59
78dd30b2 60static int vrf_backend;
72261ecd 61static int vrf_backend_configured;
3bc34908 62static struct zebra_privs_t *vrf_daemon_privs;
c200f5e1 63static char vrf_default_name[VRF_NAMSIZ] = VRF_DEFAULT_NAME_INTERNAL;
78dd30b2 64
19dc275e
DS
65/*
66 * Turn on/off debug code
67 * for vrf.
68 */
c17faa4b 69static int debug_vrf = 0;
b72ede27 70
b72ede27 71/* Holding VRF hooks */
1b3e9a21 72static struct vrf_master {
d62a17ae 73 int (*vrf_new_hook)(struct vrf *);
74 int (*vrf_delete_hook)(struct vrf *);
75 int (*vrf_enable_hook)(struct vrf *);
76 int (*vrf_disable_hook)(struct vrf *);
ecbc5a37 77 int (*vrf_update_name_hook)(struct vrf *vrf);
d62a17ae 78} vrf_master = {
79 0,
80};
b72ede27 81
d62a17ae 82static int vrf_is_enabled(struct vrf *vrf);
e5bf3e1e 83
216b18ef 84/* VRF list existance check by name. */
d62a17ae 85struct vrf *vrf_lookup_by_name(const char *name)
216b18ef 86{
d62a17ae 87 struct vrf vrf;
88 strlcpy(vrf.name, name, sizeof(vrf.name));
89 return (RB_FIND(vrf_name_head, &vrfs_by_name, &vrf));
216b18ef 90}
216b18ef 91
d62a17ae 92static __inline int vrf_id_compare(const struct vrf *a, const struct vrf *b)
b72ede27 93{
d62a17ae 94 return (a->vrf_id - b->vrf_id);
216b18ef
DS
95}
96
d62a17ae 97static int vrf_name_compare(const struct vrf *a, const struct vrf *b)
b72ede27 98{
d62a17ae 99 return strcmp(a->name, b->name);
b72ede27
FL
100}
101
e26aedbe
PG
102/* if ns_id is different and not VRF_UNKNOWN,
103 * then update vrf identifier, and enable VRF
104 */
105static void vrf_update_vrf_id(ns_id_t ns_id, void *opaqueptr)
106{
107 ns_id_t vrf_id = (vrf_id_t)ns_id;
108 vrf_id_t old_vrf_id;
109 struct vrf *vrf = (struct vrf *)opaqueptr;
110
111 if (!vrf)
112 return;
113 old_vrf_id = vrf->vrf_id;
114 if (vrf_id == vrf->vrf_id)
115 return;
116 if (vrf->vrf_id != VRF_UNKNOWN)
117 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
118 vrf->vrf_id = vrf_id;
119 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
120 if (old_vrf_id == VRF_UNKNOWN)
c4efd0f4 121 vrf_enable(vrf);
e26aedbe
PG
122}
123
ce1be369
PG
124int vrf_switch_to_netns(vrf_id_t vrf_id)
125{
126 char *name;
127 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
128
ce1be369 129 /* VRF is default VRF. silently ignore */
e26aedbe 130 if (!vrf || vrf->vrf_id == VRF_DEFAULT)
9dff1132 131 return 1; /* 1 = default */
e26aedbe
PG
132 /* VRF has no NETNS backend. silently ignore */
133 if (vrf->data.l.netns_name[0] == '\0')
9dff1132 134 return 2; /* 2 = no netns */
ce1be369
PG
135 name = ns_netns_pathname(NULL, vrf->data.l.netns_name);
136 if (debug_vrf)
137 zlog_debug("VRF_SWITCH: %s(%u)", name, vrf->vrf_id);
138 return ns_switch_to_netns(name);
139}
140
141int vrf_switchback_to_initial(void)
142{
143 int ret = ns_switchback_to_initial();
144
145 if (ret == 0 && debug_vrf)
146 zlog_debug("VRF_SWITCHBACK");
147 return ret;
148}
149
216b18ef 150/* Get a VRF. If not found, create one.
34f8e6af
DS
151 * Arg:
152 * name - The name of the vrf. May be NULL if unknown.
153 * vrf_id - The vrf_id of the vrf. May be VRF_UNKNOWN if unknown
216b18ef 154 * Description: Please note that this routine can be called with just the name
34f8e6af
DS
155 * and 0 vrf-id
156 */
d62a17ae 157struct vrf *vrf_get(vrf_id_t vrf_id, const char *name)
158{
159 struct vrf *vrf = NULL;
160 int new = 0;
161
162 if (debug_vrf)
996c9314
LB
163 zlog_debug("VRF_GET: %s(%u)", name == NULL ? "(NULL)" : name,
164 vrf_id);
d62a17ae 165
166 /* Nothing to see, move along here */
167 if (!name && vrf_id == VRF_UNKNOWN)
168 return NULL;
169
0c2bac38
PG
170 /* attempt to find already available VRF
171 */
172 if (name)
173 vrf = vrf_lookup_by_name(name);
dd114702
PG
174 if (vrf && vrf_id != VRF_UNKNOWN
175 && vrf->vrf_id != VRF_UNKNOWN
176 && vrf->vrf_id != vrf_id) {
177 zlog_debug("VRF_GET: avoid %s creation(%u), same name exists (%u)",
178 name, vrf_id, vrf->vrf_id);
179 return NULL;
180 }
d62a17ae 181 /* Try to find VRF both by ID and name */
0c2bac38 182 if (!vrf && vrf_id != VRF_UNKNOWN)
d62a17ae 183 vrf = vrf_lookup_by_id(vrf_id);
d62a17ae 184
185 if (vrf == NULL) {
186 vrf = XCALLOC(MTYPE_VRF, sizeof(struct vrf));
187 vrf->vrf_id = VRF_UNKNOWN;
d62a17ae 188 QOBJ_REG(vrf, vrf);
189 new = 1;
190
191 if (debug_vrf)
192 zlog_debug("VRF(%u) %s is created.", vrf_id,
193 (name) ? name : "(NULL)");
194 }
195
196 /* Set identifier */
197 if (vrf_id != VRF_UNKNOWN && vrf->vrf_id == VRF_UNKNOWN) {
198 vrf->vrf_id = vrf_id;
199 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
200 }
201
202 /* Set name */
203 if (name && vrf->name[0] != '\0' && strcmp(name, vrf->name)) {
87272aff 204 /* update the vrf name */
d62a17ae 205 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
87272aff
PG
206 strlcpy(vrf->data.l.netns_name,
207 name, NS_NAMSIZ);
d62a17ae 208 strlcpy(vrf->name, name, sizeof(vrf->name));
209 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
87272aff
PG
210 if (vrf->vrf_id == VRF_DEFAULT)
211 vrf_set_default_name(vrf->name, false);
d62a17ae 212 } else if (name && vrf->name[0] == '\0') {
213 strlcpy(vrf->name, name, sizeof(vrf->name));
214 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
215 }
d62a17ae 216 if (new &&vrf_master.vrf_new_hook)
217 (*vrf_master.vrf_new_hook)(vrf);
218
219 return vrf;
b72ede27
FL
220}
221
84915b0a 222/* Delete a VRF. This is called when the underlying VRF goes away, a
223 * pre-configured VRF is deleted or when shutting down (vrf_terminate()).
224 */
d62a17ae 225void vrf_delete(struct vrf *vrf)
b72ede27 226{
d62a17ae 227 if (debug_vrf)
228 zlog_debug("VRF %u is to be deleted.", vrf->vrf_id);
b72ede27 229
d62a17ae 230 if (vrf_is_enabled(vrf))
231 vrf_disable(vrf);
e5bf3e1e 232
84915b0a 233 /* If the VRF is user configured, it'll stick around, just remove
234 * the ID mapping. Interfaces assigned to this VRF should've been
235 * removed already as part of the VRF going down.
236 */
237 if (vrf_is_user_cfged(vrf)) {
238 if (vrf->vrf_id != VRF_UNKNOWN) {
239 /* Delete any VRF interfaces - should be only
240 * the VRF itself, other interfaces should've
241 * been moved out of the VRF.
242 */
243 if_terminate(vrf);
244 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
245 vrf->vrf_id = VRF_UNKNOWN;
246 }
247 return;
248 }
249
d62a17ae 250 if (vrf_master.vrf_delete_hook)
251 (*vrf_master.vrf_delete_hook)(vrf);
216b18ef 252
d62a17ae 253 QOBJ_UNREG(vrf);
f4e14fdb 254 if_terminate(vrf);
b72ede27 255
d62a17ae 256 if (vrf->vrf_id != VRF_UNKNOWN)
257 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
258 if (vrf->name[0] != '\0')
259 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
b72ede27 260
d62a17ae 261 XFREE(MTYPE_VRF, vrf);
b72ede27
FL
262}
263
264/* Look up a VRF by identifier. */
d62a17ae 265struct vrf *vrf_lookup_by_id(vrf_id_t vrf_id)
b72ede27 266{
d62a17ae 267 struct vrf vrf;
268 vrf.vrf_id = vrf_id;
269 return (RB_FIND(vrf_id_head, &vrfs_by_id, &vrf));
b72ede27
FL
270}
271
e5bf3e1e
FL
272/*
273 * Enable a VRF - that is, let the VRF be ready to use.
274 * The VRF_ENABLE_HOOK callback will be called to inform
275 * that they can allocate resources in this VRF.
276 *
277 * RETURN: 1 - enabled successfully; otherwise, 0.
278 */
d62a17ae 279int vrf_enable(struct vrf *vrf)
e5bf3e1e 280{
d62a17ae 281 if (vrf_is_enabled(vrf))
282 return 1;
05e8e11e 283
d62a17ae 284 if (debug_vrf)
285 zlog_debug("VRF %u is enabled.", vrf->vrf_id);
e5bf3e1e 286
d62a17ae 287 SET_FLAG(vrf->status, VRF_ACTIVE);
e5bf3e1e 288
d62a17ae 289 if (vrf_master.vrf_enable_hook)
290 (*vrf_master.vrf_enable_hook)(vrf);
e5bf3e1e 291
98cbbaea
DS
292 /*
293 * If we have any nexthop group entries that
294 * are awaiting vrf initialization then
295 * let's let people know about it
296 */
297 nexthop_group_enable_vrf(vrf);
298
d62a17ae 299 return 1;
e5bf3e1e
FL
300}
301
302/*
303 * Disable a VRF - that is, let the VRF be unusable.
304 * The VRF_DELETE_HOOK callback will be called to inform
305 * that they must release the resources in the VRF.
306 */
697d3ec7 307void vrf_disable(struct vrf *vrf)
e5bf3e1e 308{
d62a17ae 309 if (!vrf_is_enabled(vrf))
310 return;
a647bfa8 311
d62a17ae 312 UNSET_FLAG(vrf->status, VRF_ACTIVE);
e5bf3e1e 313
d62a17ae 314 if (debug_vrf)
315 zlog_debug("VRF %u is to be disabled.", vrf->vrf_id);
e5bf3e1e 316
d62a17ae 317 /* Till now, nothing to be done for the default VRF. */
318 // Pending: see why this statement.
e74f14fc 319
d62a17ae 320 if (vrf_master.vrf_disable_hook)
321 (*vrf_master.vrf_disable_hook)(vrf);
e5bf3e1e
FL
322}
323
b7cfce93
MK
324const char *vrf_id_to_name(vrf_id_t vrf_id)
325{
326 struct vrf *vrf;
327
328 vrf = vrf_lookup_by_id(vrf_id);
bd47f3a3 329 return VRF_LOGNAME(vrf);
b7cfce93
MK
330}
331
d62a17ae 332vrf_id_t vrf_name_to_id(const char *name)
216b18ef 333{
d62a17ae 334 struct vrf *vrf;
335 vrf_id_t vrf_id = VRF_DEFAULT; // Pending: need a way to return invalid
336 // id/ routine not used.
216b18ef 337
2569910b
PG
338 if (!name)
339 return vrf_id;
d62a17ae 340 vrf = vrf_lookup_by_name(name);
341 if (vrf)
342 vrf_id = vrf->vrf_id;
216b18ef 343
d62a17ae 344 return vrf_id;
216b18ef
DS
345}
346
b72ede27 347/* Get the data pointer of the specified VRF. If not found, create one. */
d62a17ae 348void *vrf_info_get(vrf_id_t vrf_id)
b72ede27 349{
d62a17ae 350 struct vrf *vrf = vrf_get(vrf_id, NULL);
351 return vrf->info;
b72ede27
FL
352}
353
354/* Look up the data pointer of the specified VRF. */
d62a17ae 355void *vrf_info_lookup(vrf_id_t vrf_id)
b72ede27 356{
d62a17ae 357 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
358 return vrf ? vrf->info : NULL;
b72ede27
FL
359}
360
7076bb2f 361/*
4a8bf858 362 * VRF hash for storing set or not.
7076bb2f 363 */
4a8bf858
DS
364struct vrf_bit_set {
365 vrf_id_t vrf_id;
366 bool set;
367};
7076bb2f 368
d8b87afe 369static unsigned int vrf_hash_bitmap_key(const void *data)
4a8bf858 370{
d8b87afe 371 const struct vrf_bit_set *bit = data;
d62a17ae 372
4a8bf858
DS
373 return bit->vrf_id;
374}
d62a17ae 375
74df8d6d 376static bool vrf_hash_bitmap_cmp(const void *a, const void *b)
4a8bf858
DS
377{
378 const struct vrf_bit_set *bit1 = a;
379 const struct vrf_bit_set *bit2 = b;
d62a17ae 380
4a8bf858
DS
381 return bit1->vrf_id == bit2->vrf_id;
382}
383
384static void *vrf_hash_bitmap_alloc(void *data)
385{
386 struct vrf_bit_set *copy = data;
387 struct vrf_bit_set *bit;
388
389 bit = XMALLOC(MTYPE_VRF_BITMAP, sizeof(*bit));
390 bit->vrf_id = copy->vrf_id;
391
392 return bit;
393}
394
395static void vrf_hash_bitmap_free(void *data)
396{
397 struct vrf_bit_set *bit = data;
398
399 XFREE(MTYPE_VRF_BITMAP, bit);
400}
7076bb2f 401
d62a17ae 402vrf_bitmap_t vrf_bitmap_init(void)
7076bb2f 403{
4a8bf858
DS
404 return hash_create_size(32, vrf_hash_bitmap_key, vrf_hash_bitmap_cmp,
405 "VRF BIT HASH");
7076bb2f
FL
406}
407
d62a17ae 408void vrf_bitmap_free(vrf_bitmap_t bmap)
7076bb2f 409{
4a8bf858 410 struct hash *vrf_hash = bmap;
7076bb2f 411
4a8bf858 412 if (vrf_hash == NULL)
d62a17ae 413 return;
7076bb2f 414
4a8bf858
DS
415 hash_clean(vrf_hash, vrf_hash_bitmap_free);
416 hash_free(vrf_hash);
7076bb2f
FL
417}
418
d62a17ae 419void vrf_bitmap_set(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 420{
4a8bf858
DS
421 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
422 struct hash *vrf_hash = bmap;
423 struct vrf_bit_set *bit;
7076bb2f 424
4a8bf858 425 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 426 return;
7076bb2f 427
4a8bf858
DS
428 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
429 bit->set = true;
7076bb2f
FL
430}
431
d62a17ae 432void vrf_bitmap_unset(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 433{
4a8bf858
DS
434 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
435 struct hash *vrf_hash = bmap;
436 struct vrf_bit_set *bit;
7076bb2f 437
4a8bf858 438 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 439 return;
7076bb2f 440
4a8bf858
DS
441 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
442 bit->set = false;
7076bb2f
FL
443}
444
d62a17ae 445int vrf_bitmap_check(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 446{
4a8bf858
DS
447 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
448 struct hash *vrf_hash = bmap;
449 struct vrf_bit_set *bit;
7076bb2f 450
4a8bf858 451 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 452 return 0;
7076bb2f 453
4a8bf858
DS
454 bit = hash_lookup(vrf_hash, &lookup);
455 if (bit)
456 return bit->set;
457
458 return 0;
7076bb2f
FL
459}
460
d62a17ae 461static void vrf_autocomplete(vector comps, struct cmd_token *token)
d617d5fe 462{
d62a17ae 463 struct vrf *vrf = NULL;
d617d5fe 464
723001fc
PG
465 RB_FOREACH (vrf, vrf_name_head, &vrfs_by_name)
466 vector_set(comps, XSTRDUP(MTYPE_COMPLETION, vrf->name));
d617d5fe
DS
467}
468
469static const struct cmd_variable_handler vrf_var_handlers[] = {
d62a17ae 470 {
471 .varname = "vrf",
472 .completions = vrf_autocomplete,
473 },
e429a2a0
IR
474 {
475 .varname = "vrf_name",
476 .completions = vrf_autocomplete,
477 },
478 {
479 .varname = "nexthop_vrf",
480 .completions = vrf_autocomplete,
481 },
d62a17ae 482 {.completions = NULL},
d617d5fe
DS
483};
484
b72ede27 485/* Initialize VRF module. */
d62a17ae 486void vrf_init(int (*create)(struct vrf *), int (*enable)(struct vrf *),
d01b92fd 487 int (*disable)(struct vrf *), int (*destroy)(struct vrf *),
ecbc5a37 488 int ((*update)(struct vrf *)))
d62a17ae 489{
490 struct vrf *default_vrf;
491
e26aedbe
PG
492 /* initialise NS, in case VRF backend if NETNS */
493 ns_init();
d62a17ae 494 if (debug_vrf)
15569c58 495 zlog_debug("%s: Initializing VRF subsystem", __func__);
d62a17ae 496
497 vrf_master.vrf_new_hook = create;
498 vrf_master.vrf_enable_hook = enable;
499 vrf_master.vrf_disable_hook = disable;
d01b92fd 500 vrf_master.vrf_delete_hook = destroy;
ecbc5a37 501 vrf_master.vrf_update_name_hook = update;
d62a17ae 502
503 /* The default VRF always exists. */
eb6934d5 504 default_vrf = vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME);
d62a17ae 505 if (!default_vrf) {
450971aa 506 flog_err(EC_LIB_VRF_START,
1c50c1c0 507 "vrf_init: failed to create the default VRF!");
d62a17ae 508 exit(1);
509 }
20c87e98
TC
510 if (vrf_is_backend_netns()) {
511 struct ns *ns;
512
fdafe17e 513 strlcpy(default_vrf->data.l.netns_name,
eb6934d5 514 VRF_DEFAULT_NAME, NS_NAMSIZ);
20c87e98 515 ns = ns_lookup(ns_get_default_id());
c3568c4d
TC
516 ns->vrf_ctxt = default_vrf;
517 default_vrf->ns_ctxt = ns;
20c87e98 518 }
d62a17ae 519
520 /* Enable the default VRF. */
521 if (!vrf_enable(default_vrf)) {
450971aa 522 flog_err(EC_LIB_VRF_START,
1c50c1c0 523 "vrf_init: failed to enable the default VRF!");
d62a17ae 524 exit(1);
525 }
526
527 cmd_variable_handler_register(vrf_var_handlers);
b72ede27
FL
528}
529
530/* Terminate VRF module. */
d62a17ae 531void vrf_terminate(void)
b72ede27 532{
d62a17ae 533 struct vrf *vrf;
b72ede27 534
d62a17ae 535 if (debug_vrf)
15569c58 536 zlog_debug("%s: Shutting down vrf subsystem", __func__);
19dc275e 537
55cd0f61
DS
538 while (!RB_EMPTY(vrf_id_head, &vrfs_by_id)) {
539 vrf = RB_ROOT(vrf_id_head, &vrfs_by_id);
540
65c3a7c4 541 /* Clear configured flag and invoke delete. */
542 UNSET_FLAG(vrf->status, VRF_CONFIGURED);
d62a17ae 543 vrf_delete(vrf);
65c3a7c4 544 }
55cd0f61
DS
545
546 while (!RB_EMPTY(vrf_name_head, &vrfs_by_name)) {
547 vrf = RB_ROOT(vrf_name_head, &vrfs_by_name);
548
65c3a7c4 549 /* Clear configured flag and invoke delete. */
550 UNSET_FLAG(vrf->status, VRF_CONFIGURED);
d62a17ae 551 vrf_delete(vrf);
65c3a7c4 552 }
b72ede27
FL
553}
554
0f4977c6 555int vrf_socket(int domain, int type, int protocol, vrf_id_t vrf_id,
02fe07c7 556 const char *interfacename)
e5bf3e1e 557{
2e0d2b3d 558 int ret, save_errno, ret2;
e5bf3e1e 559
2e0d2b3d
PG
560 ret = vrf_switch_to_netns(vrf_id);
561 if (ret < 0)
450971aa 562 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 563 __func__, vrf_id, safe_strerror(errno));
b66d022e 564
d62a17ae 565 ret = socket(domain, type, protocol);
2e0d2b3d
PG
566 save_errno = errno;
567 ret2 = vrf_switchback_to_initial();
568 if (ret2 < 0)
450971aa 569 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
570 "%s: Can't switchback from VRF %u (%s)", __func__,
571 vrf_id, safe_strerror(errno));
2e0d2b3d 572 errno = save_errno;
0f4977c6
PG
573 if (ret <= 0)
574 return ret;
575 ret2 = vrf_bind(vrf_id, ret, interfacename);
576 if (ret2 < 0) {
577 close(ret);
578 ret = ret2;
579 }
d62a17ae 580 return ret;
e5bf3e1e
FL
581}
582
78dd30b2
PG
583int vrf_is_backend_netns(void)
584{
585 return (vrf_backend == VRF_BACKEND_NETNS);
586}
587
588int vrf_get_backend(void)
589{
72261ecd
PG
590 if (!vrf_backend_configured)
591 return VRF_BACKEND_UNKNOWN;
78dd30b2
PG
592 return vrf_backend;
593}
594
7239d3d9 595int vrf_configure_backend(enum vrf_backend_type backend)
78dd30b2 596{
f7d45925
QY
597 /* Work around issue in old gcc */
598 switch (backend) {
599 case VRF_BACKEND_UNKNOWN:
600 case VRF_BACKEND_NETNS:
601 case VRF_BACKEND_VRF_LITE:
602 break;
603 default:
7239d3d9 604 return -1;
f7d45925 605 }
7239d3d9
QY
606
607 vrf_backend = backend;
72261ecd 608 vrf_backend_configured = 1;
7239d3d9
QY
609
610 return 0;
78dd30b2
PG
611}
612
03aff2d8
PG
613int vrf_handler_create(struct vty *vty, const char *vrfname,
614 struct vrf **vrf)
f30c50b9 615{
d62a17ae 616 struct vrf *vrfp;
8b4cb7a6
CS
617 char xpath_list[XPATH_MAXLEN];
618 int ret;
f30c50b9 619
d62a17ae 620 if (strlen(vrfname) > VRF_NAMSIZ) {
697d3ec7
PG
621 if (vty)
622 vty_out(vty,
996c9314
LB
623 "%% VRF name %s invalid: length exceeds %d bytes\n",
624 vrfname, VRF_NAMSIZ);
697d3ec7 625 else
0351a28f 626 flog_warn(
450971aa 627 EC_LIB_VRF_LENGTH,
996c9314
LB
628 "%% VRF name %s invalid: length exceeds %d bytes\n",
629 vrfname, VRF_NAMSIZ);
d62a17ae 630 return CMD_WARNING_CONFIG_FAILED;
631 }
f30c50b9 632
8b4cb7a6
CS
633 if (vty) {
634 snprintf(xpath_list, sizeof(xpath_list),
635 "/frr-vrf:lib/vrf[name='%s']", vrfname);
636
637 nb_cli_enqueue_change(vty, xpath_list, NB_OP_CREATE, NULL);
638 ret = nb_cli_apply_changes(vty, xpath_list);
639 if (ret == CMD_SUCCESS) {
640 VTY_PUSH_XPATH(VRF_NODE, xpath_list);
641 vrfp = vrf_lookup_by_name(vrfname);
642 if (vrfp)
643 VTY_PUSH_CONTEXT(VRF_NODE, vrfp);
644 }
645 } else {
646 vrfp = vrf_get(VRF_UNKNOWN, vrfname);
f30c50b9 647
8b4cb7a6
CS
648 if (vrf)
649 *vrf = vrfp;
650 }
d62a17ae 651 return CMD_SUCCESS;
f30c50b9
RW
652}
653
996c9314 654int vrf_netns_handler_create(struct vty *vty, struct vrf *vrf, char *pathname,
9d3555e0
PG
655 ns_id_t ns_id, ns_id_t internal_ns_id,
656 ns_id_t rel_def_ns_id)
e26aedbe
PG
657{
658 struct ns *ns = NULL;
659
660 if (!vrf)
661 return CMD_WARNING_CONFIG_FAILED;
662 if (vrf->vrf_id != VRF_UNKNOWN && vrf->ns_ctxt == NULL) {
663 if (vty)
664 vty_out(vty,
665 "VRF %u is already configured with VRF %s\n",
666 vrf->vrf_id, vrf->name);
667 else
9165c5f5 668 zlog_info("VRF %u is already configured with VRF %s",
e26aedbe
PG
669 vrf->vrf_id, vrf->name);
670 return CMD_WARNING_CONFIG_FAILED;
671 }
672 if (vrf->ns_ctxt != NULL) {
996c9314 673 ns = (struct ns *)vrf->ns_ctxt;
2e1cc436 674 if (!strcmp(ns->name, pathname)) {
e26aedbe
PG
675 if (vty)
676 vty_out(vty,
996c9314
LB
677 "VRF %u already configured with NETNS %s\n",
678 vrf->vrf_id, ns->name);
e26aedbe 679 else
0351a28f 680 zlog_info(
ade6974d
QY
681 "VRF %u already configured with NETNS %s",
682 vrf->vrf_id, ns->name);
e26aedbe
PG
683 return CMD_WARNING_CONFIG_FAILED;
684 }
685 }
686 ns = ns_lookup_name(pathname);
687 if (ns && ns->vrf_ctxt) {
688 struct vrf *vrf2 = (struct vrf *)ns->vrf_ctxt;
689
690 if (vrf2 == vrf)
691 return CMD_SUCCESS;
692 if (vty)
996c9314 693 vty_out(vty,
3efd0893 694 "NS %s is already configured with VRF %u(%s)\n",
996c9314 695 ns->name, vrf2->vrf_id, vrf2->name);
e26aedbe 696 else
0351a28f 697 zlog_info("NS %s is already configured with VRF %u(%s)",
e26aedbe
PG
698 ns->name, vrf2->vrf_id, vrf2->name);
699 return CMD_WARNING_CONFIG_FAILED;
700 }
701 ns = ns_get_created(ns, pathname, ns_id);
03aff2d8 702 ns->internal_ns_id = internal_ns_id;
9d3555e0 703 ns->relative_default_ns = rel_def_ns_id;
e26aedbe
PG
704 ns->vrf_ctxt = (void *)vrf;
705 vrf->ns_ctxt = (void *)ns;
706 /* update VRF netns NAME */
2e1cc436 707 strlcpy(vrf->data.l.netns_name, basename(pathname), NS_NAMSIZ);
e26aedbe
PG
708
709 if (!ns_enable(ns, vrf_update_vrf_id)) {
710 if (vty)
711 vty_out(vty, "Can not associate NS %u with NETNS %s\n",
996c9314 712 ns->ns_id, ns->name);
e26aedbe 713 else
0351a28f 714 zlog_info("Can not associate NS %u with NETNS %s",
e26aedbe
PG
715 ns->ns_id, ns->name);
716 return CMD_WARNING_CONFIG_FAILED;
717 }
718
719 return CMD_SUCCESS;
720}
721
697d3ec7 722/* vrf CLI commands */
16d6ea59
QY
723DEFUN_NOSH(vrf_exit,
724 vrf_exit_cmd,
725 "exit-vrf",
726 "Exit current mode and down to previous mode\n")
727{
728 /* We have to set vrf context to default vrf */
729 VTY_PUSH_CONTEXT(VRF_NODE, vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME));
799a81df 730 cmd_exit(vty);
16d6ea59
QY
731 return CMD_SUCCESS;
732}
733
697d3ec7
PG
734DEFUN_NOSH (vrf,
735 vrf_cmd,
736 "vrf NAME",
737 "Select a VRF to configure\n"
738 "VRF's name\n")
739{
740 int idx_name = 1;
741 const char *vrfname = argv[idx_name]->arg;
742
743 return vrf_handler_create(vty, vrfname, NULL);
744}
745
34c46274
RW
746DEFUN (no_vrf,
747 no_vrf_cmd,
748 "no vrf NAME",
749 NO_STR
750 "Delete a pseudo VRF's configuration\n"
751 "VRF's name\n")
f30c50b9 752{
d62a17ae 753 const char *vrfname = argv[2]->arg;
8b4cb7a6 754 char xpath_list[XPATH_MAXLEN];
53dc2b05 755
d62a17ae 756 struct vrf *vrfp;
f30c50b9 757
d62a17ae 758 vrfp = vrf_lookup_by_name(vrfname);
f30c50b9 759
cd980d03
IR
760 if (vrfp == NULL)
761 return CMD_SUCCESS;
f30c50b9 762
d62a17ae 763 if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) {
764 vty_out(vty, "%% Only inactive VRFs can be deleted\n");
765 return CMD_WARNING_CONFIG_FAILED;
766 }
f30c50b9 767
8b4cb7a6
CS
768 snprintf(xpath_list, sizeof(xpath_list), "/frr-vrf:lib/vrf[name='%s']",
769 vrfname);
f30c50b9 770
8b4cb7a6
CS
771 nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL);
772 return nb_cli_apply_changes(vty, xpath_list);
f30c50b9
RW
773}
774
53dc2b05 775
62b346ee 776static struct cmd_node vrf_node = {
f4b8291f 777 .name = "vrf",
62b346ee 778 .node = VRF_NODE,
24389580 779 .parent_node = CONFIG_NODE,
62b346ee 780 .prompt = "%s(config-vrf)# ",
62b346ee 781};
7ddcfca4 782
34c46274 783DEFUN_NOSH (vrf_netns,
4a541e8c
PG
784 vrf_netns_cmd,
785 "netns NAME",
786 "Attach VRF to a Namespace\n"
787 "The file name in " NS_RUN_DIR ", or a full pathname\n")
e26aedbe 788{
3bc34908 789 int idx_name = 1, ret;
e26aedbe
PG
790 char *pathname = ns_netns_pathname(vty, argv[idx_name]->arg);
791
792 VTY_DECLVAR_CONTEXT(vrf, vrf);
793
794 if (!pathname)
795 return CMD_WARNING_CONFIG_FAILED;
3bc34908 796
0cf6db21 797 frr_with_privs(vrf_daemon_privs) {
6bb30c2c 798 ret = vrf_netns_handler_create(vty, vrf, pathname,
9d3555e0
PG
799 NS_UNKNOWN,
800 NS_UNKNOWN,
801 NS_UNKNOWN);
6bb30c2c 802 }
3bc34908 803 return ret;
e26aedbe
PG
804}
805
34c46274 806DEFUN_NOSH (no_vrf_netns,
e26aedbe
PG
807 no_vrf_netns_cmd,
808 "no netns [NAME]",
809 NO_STR
810 "Detach VRF from a Namespace\n"
811 "The file name in " NS_RUN_DIR ", or a full pathname\n")
812{
813 struct ns *ns = NULL;
814
815 VTY_DECLVAR_CONTEXT(vrf, vrf);
816
817 if (!vrf_is_backend_netns()) {
818 vty_out(vty, "VRF backend is not Netns. Aborting\n");
819 return CMD_WARNING_CONFIG_FAILED;
820 }
821 if (!vrf->ns_ctxt) {
822 vty_out(vty, "VRF %s(%u) is not configured with NetNS\n",
823 vrf->name, vrf->vrf_id);
824 return CMD_WARNING_CONFIG_FAILED;
825 }
826
827 ns = (struct ns *)vrf->ns_ctxt;
828
829 ns->vrf_ctxt = NULL;
830 vrf_disable(vrf);
831 /* vrf ID from VRF is necessary for Zebra
832 * so that propagate to other clients is done
833 */
834 ns_delete(ns);
835 vrf->ns_ctxt = NULL;
836 return CMD_SUCCESS;
837}
838
19dc275e
DS
839/*
840 * Debug CLI for vrf's
841 */
842DEFUN (vrf_debug,
843 vrf_debug_cmd,
844 "debug vrf",
845 DEBUG_STR
846 "VRF Debugging\n")
847{
d62a17ae 848 debug_vrf = 1;
19dc275e 849
d62a17ae 850 return CMD_SUCCESS;
19dc275e
DS
851}
852
853DEFUN (no_vrf_debug,
854 no_vrf_debug_cmd,
855 "no debug vrf",
856 NO_STR
857 DEBUG_STR
858 "VRF Debugging\n")
859{
d62a17ae 860 debug_vrf = 0;
19dc275e 861
d62a17ae 862 return CMD_SUCCESS;
19dc275e
DS
863}
864
d62a17ae 865static int vrf_write_host(struct vty *vty)
19dc275e 866{
d62a17ae 867 if (debug_vrf)
868 vty_out(vty, "debug vrf\n");
19dc275e 869
d62a17ae 870 return 1;
19dc275e
DS
871}
872
612c2c15 873static int vrf_write_host(struct vty *vty);
62b346ee 874static struct cmd_node vrf_debug_node = {
f4b8291f 875 .name = "vrf debug",
62b346ee
DL
876 .node = VRF_DEBUG_NODE,
877 .prompt = "",
612c2c15 878 .config_write = vrf_write_host,
62b346ee 879};
19dc275e 880
d62a17ae 881void vrf_install_commands(void)
19dc275e 882{
612c2c15 883 install_node(&vrf_debug_node);
19dc275e 884
d62a17ae 885 install_element(CONFIG_NODE, &vrf_debug_cmd);
886 install_element(ENABLE_NODE, &vrf_debug_cmd);
887 install_element(CONFIG_NODE, &no_vrf_debug_cmd);
888 install_element(ENABLE_NODE, &no_vrf_debug_cmd);
19dc275e 889}
53dc2b05 890
3bc34908
PG
891void vrf_cmd_init(int (*writefunc)(struct vty *vty),
892 struct zebra_privs_t *daemon_privs)
7ddcfca4 893{
d62a17ae 894 install_element(CONFIG_NODE, &vrf_cmd);
895 install_element(CONFIG_NODE, &no_vrf_cmd);
612c2c15
DL
896 vrf_node.config_write = writefunc;
897 install_node(&vrf_node);
d62a17ae 898 install_default(VRF_NODE);
16d6ea59 899 install_element(VRF_NODE, &vrf_exit_cmd);
e26aedbe
PG
900 if (vrf_is_backend_netns() && ns_have_netns()) {
901 /* Install NS commands. */
3bc34908 902 vrf_daemon_privs = daemon_privs;
e26aedbe
PG
903 install_element(VRF_NODE, &vrf_netns_cmd);
904 install_element(VRF_NODE, &no_vrf_netns_cmd);
905 }
19dc275e 906}
ec31f30d 907
4fe52e76 908void vrf_set_default_name(const char *default_name, bool force)
ec31f30d 909{
c200f5e1 910 struct vrf *def_vrf;
4fe52e76 911 static bool def_vrf_forced;
ec31f30d 912
c200f5e1
PG
913 def_vrf = vrf_lookup_by_id(VRF_DEFAULT);
914 assert(default_name);
4fe52e76
PG
915 if (def_vrf && !force && def_vrf_forced) {
916 zlog_debug("VRF: %s, avoid changing name to %s, previously forced (%u)",
917 def_vrf->name, default_name,
918 def_vrf->vrf_id);
919 return;
920 }
87272aff
PG
921 if (strmatch(vrf_default_name, default_name))
922 return;
c200f5e1
PG
923 snprintf(vrf_default_name, VRF_NAMSIZ, "%s", default_name);
924 if (def_vrf) {
4fe52e76
PG
925 if (force)
926 def_vrf_forced = true;
c200f5e1
PG
927 RB_REMOVE(vrf_name_head, &vrfs_by_name, def_vrf);
928 strlcpy(def_vrf->data.l.netns_name,
929 vrf_default_name, NS_NAMSIZ);
930 strlcpy(def_vrf->name, vrf_default_name, sizeof(def_vrf->name));
931 RB_INSERT(vrf_name_head, &vrfs_by_name, def_vrf);
ecbc5a37
PG
932 if (vrf_master.vrf_update_name_hook)
933 (*vrf_master.vrf_update_name_hook)(def_vrf);
c200f5e1
PG
934 }
935}
936
937const char *vrf_get_default_name(void)
938{
939 return vrf_default_name;
940}
941
942vrf_id_t vrf_get_default_id(void)
943{
03aff2d8
PG
944 /* backend netns is only known by zebra
945 * for other daemons, we return VRF_DEFAULT_INTERNAL
946 */
ec31f30d
PG
947 if (vrf_is_backend_netns())
948 return ns_get_default_id();
949 else
950 return VRF_DEFAULT_INTERNAL;
951}
2e0d2b3d 952
02fe07c7 953int vrf_bind(vrf_id_t vrf_id, int fd, const char *name)
0f4977c6
PG
954{
955 int ret = 0;
91f854f6 956 struct interface *ifp;
0f4977c6 957
a36898e7 958 if (fd < 0 || name == NULL)
0f4977c6 959 return fd;
91f854f6
PG
960 /* the device should exist
961 * otherwise we should return
962 * case ifname = vrf in netns mode => return
963 */
a36898e7 964 ifp = if_lookup_by_name(name, vrf_id);
91f854f6 965 if (!ifp)
0f4977c6
PG
966 return fd;
967#ifdef SO_BINDTODEVICE
c9c70dd1 968 ret = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1);
0f4977c6 969 if (ret < 0)
996c9314
LB
970 zlog_debug("bind to interface %s failed, errno=%d", name,
971 errno);
0f4977c6
PG
972#endif /* SO_BINDTODEVICE */
973 return ret;
974}
2e0d2b3d 975int vrf_getaddrinfo(const char *node, const char *service,
996c9314
LB
976 const struct addrinfo *hints, struct addrinfo **res,
977 vrf_id_t vrf_id)
2e0d2b3d
PG
978{
979 int ret, ret2, save_errno;
980
981 ret = vrf_switch_to_netns(vrf_id);
982 if (ret < 0)
450971aa 983 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 984 __func__, vrf_id, safe_strerror(errno));
2e0d2b3d
PG
985 ret = getaddrinfo(node, service, hints, res);
986 save_errno = errno;
987 ret2 = vrf_switchback_to_initial();
988 if (ret2 < 0)
450971aa 989 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
990 "%s: Can't switchback from VRF %u (%s)", __func__,
991 vrf_id, safe_strerror(errno));
2e0d2b3d
PG
992 errno = save_errno;
993 return ret;
994}
995
516d7591
PG
996int vrf_ioctl(vrf_id_t vrf_id, int d, unsigned long request, char *params)
997{
998 int ret, saved_errno, rc;
999
1000 ret = vrf_switch_to_netns(vrf_id);
1001 if (ret < 0) {
450971aa 1002 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 1003 __func__, vrf_id, safe_strerror(errno));
516d7591
PG
1004 return 0;
1005 }
1006 rc = ioctl(d, request, params);
1007 saved_errno = errno;
1008 ret = vrf_switchback_to_initial();
1009 if (ret < 0)
450971aa 1010 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
1011 "%s: Can't switchback from VRF %u (%s)", __func__,
1012 vrf_id, safe_strerror(errno));
516d7591
PG
1013 errno = saved_errno;
1014 return rc;
1015}
1016
0f4977c6 1017int vrf_sockunion_socket(const union sockunion *su, vrf_id_t vrf_id,
02fe07c7 1018 const char *interfacename)
2e0d2b3d
PG
1019{
1020 int ret, save_errno, ret2;
1021
1022 ret = vrf_switch_to_netns(vrf_id);
1023 if (ret < 0)
450971aa 1024 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 1025 __func__, vrf_id, safe_strerror(errno));
2e0d2b3d
PG
1026 ret = sockunion_socket(su);
1027 save_errno = errno;
1028 ret2 = vrf_switchback_to_initial();
1029 if (ret2 < 0)
450971aa 1030 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
1031 "%s: Can't switchback from VRF %u (%s)", __func__,
1032 vrf_id, safe_strerror(errno));
2e0d2b3d 1033 errno = save_errno;
0f4977c6
PG
1034
1035 if (ret <= 0)
1036 return ret;
1037 ret2 = vrf_bind(vrf_id, ret, interfacename);
1038 if (ret2 < 0) {
1039 close(ret);
1040 ret = ret2;
1041 }
2e0d2b3d
PG
1042 return ret;
1043}
0b014ea6
PG
1044
1045vrf_id_t vrf_generate_id(void)
1046{
1047 static int vrf_id_local;
1048
1049 return ++vrf_id_local;
1050}
bc867a5d
CS
1051
1052/* ------- Northbound callbacks ------- */
1053
1054/*
1055 * XPath: /frr-vrf:lib/vrf
1056 */
60ee8be1 1057static int lib_vrf_create(struct nb_cb_create_args *args)
bc867a5d
CS
1058{
1059 const char *vrfname;
1060 struct vrf *vrfp;
1061
60ee8be1 1062 vrfname = yang_dnode_get_string(args->dnode, "./name");
bc867a5d 1063
60ee8be1 1064 if (args->event != NB_EV_APPLY)
bc867a5d
CS
1065 return NB_OK;
1066
1067 vrfp = vrf_get(VRF_UNKNOWN, vrfname);
1068
60ee8be1 1069 nb_running_set_entry(args->dnode, vrfp);
bc867a5d
CS
1070
1071 return NB_OK;
1072}
1073
60ee8be1 1074static int lib_vrf_destroy(struct nb_cb_destroy_args *args)
bc867a5d
CS
1075{
1076 struct vrf *vrfp;
1077
60ee8be1 1078 switch (args->event) {
bc867a5d 1079 case NB_EV_VALIDATE:
60ee8be1 1080 vrfp = nb_running_get_entry(args->dnode, NULL, true);
bc867a5d 1081 if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) {
10bdc68f
RW
1082 snprintf(args->errmsg, args->errmsg_len,
1083 "Only inactive VRFs can be deleted");
bc867a5d
CS
1084 return NB_ERR_VALIDATION;
1085 }
1086 break;
1087 case NB_EV_PREPARE:
1088 case NB_EV_ABORT:
1089 break;
1090 case NB_EV_APPLY:
60ee8be1 1091 vrfp = nb_running_unset_entry(args->dnode);
8b4cb7a6 1092
bc867a5d
CS
1093 /* Clear configured flag and invoke delete. */
1094 UNSET_FLAG(vrfp->status, VRF_CONFIGURED);
1095 vrf_delete(vrfp);
1096 break;
1097 }
1098
1099 return NB_OK;
1100}
1101
60ee8be1 1102static const void *lib_vrf_get_next(struct nb_cb_get_next_args *args)
bc867a5d 1103{
60ee8be1 1104 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 1105
60ee8be1 1106 if (args->list_entry == NULL) {
bc867a5d
CS
1107 vrfp = RB_MIN(vrf_name_head, &vrfs_by_name);
1108 } else {
1109 vrfp = RB_NEXT(vrf_name_head, vrfp);
1110 }
1111
1112 return vrfp;
1113}
1114
60ee8be1 1115static int lib_vrf_get_keys(struct nb_cb_get_keys_args *args)
bc867a5d 1116{
60ee8be1 1117 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 1118
60ee8be1
RW
1119 args->keys->num = 1;
1120 strlcpy(args->keys->key[0], vrfp->name, sizeof(args->keys->key[0]));
bc867a5d
CS
1121
1122 return NB_OK;
1123}
1124
60ee8be1 1125static const void *lib_vrf_lookup_entry(struct nb_cb_lookup_entry_args *args)
bc867a5d 1126{
60ee8be1 1127 const char *vrfname = args->keys->key[0];
bc867a5d
CS
1128
1129 struct vrf *vrf = vrf_lookup_by_name(vrfname);
1130
1131 return vrf;
1132}
1133
1134/*
1135 * XPath: /frr-vrf:lib/vrf/id
1136 */
60ee8be1
RW
1137static struct yang_data *
1138lib_vrf_state_id_get_elem(struct nb_cb_get_elem_args *args)
bc867a5d 1139{
60ee8be1 1140 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 1141
60ee8be1 1142 return yang_data_new_uint32(args->xpath, vrfp->vrf_id);
bc867a5d
CS
1143}
1144
1145/*
1146 * XPath: /frr-vrf:lib/vrf/active
1147 */
60ee8be1
RW
1148static struct yang_data *
1149lib_vrf_state_active_get_elem(struct nb_cb_get_elem_args *args)
bc867a5d 1150{
60ee8be1 1151 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d
CS
1152
1153 if (vrfp->status == VRF_ACTIVE)
1154 return yang_data_new_bool(
60ee8be1 1155 args->xpath, vrfp->status == VRF_ACTIVE ? true : false);
bc867a5d
CS
1156
1157 return NULL;
1158}
1159
1160/* clang-format off */
1161const struct frr_yang_module_info frr_vrf_info = {
1162 .name = "frr-vrf",
1163 .nodes = {
1164 {
1165 .xpath = "/frr-vrf:lib/vrf",
1166 .cbs = {
1167 .create = lib_vrf_create,
1168 .destroy = lib_vrf_destroy,
1169 .get_next = lib_vrf_get_next,
1170 .get_keys = lib_vrf_get_keys,
1171 .lookup_entry = lib_vrf_lookup_entry,
1172 }
1173 },
1174 {
1175 .xpath = "/frr-vrf:lib/vrf/state/id",
1176 .cbs = {
1177 .get_elem = lib_vrf_state_id_get_elem,
1178 }
1179 },
1180 {
1181 .xpath = "/frr-vrf:lib/vrf/state/active",
1182 .cbs = {
1183 .get_elem = lib_vrf_state_active_get_elem,
1184 }
1185 },
1186 {
1187 .xpath = NULL,
1188 },
1189 }
1190};
1191