]>
Commit | Line | Data |
---|---|---|
b72ede27 FL |
1 | /* |
2 | * VRF functions. | |
3 | * Copyright (C) 2014 6WIND S.A. | |
4 | * | |
5 | * This file is part of GNU Zebra. | |
6 | * | |
7 | * GNU Zebra is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU General Public License as published | |
9 | * by the Free Software Foundation; either version 2, or (at your | |
10 | * option) any later version. | |
11 | * | |
12 | * GNU Zebra is distributed in the hope that it will be useful, but | |
13 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
15 | * General Public License for more details. | |
16 | * | |
896014f4 DL |
17 | * You should have received a copy of the GNU General Public License along |
18 | * with this program; see the file COPYING; if not, write to the Free Software | |
19 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
b72ede27 FL |
20 | */ |
21 | ||
22 | #include <zebra.h> | |
23 | ||
6a69b354 | 24 | #include "if.h" |
b72ede27 | 25 | #include "vrf.h" |
7922fc65 | 26 | #include "vrf_int.h" |
b72ede27 FL |
27 | #include "prefix.h" |
28 | #include "table.h" | |
29 | #include "log.h" | |
30 | #include "memory.h" | |
19dc275e | 31 | #include "command.h" |
b95c1883 | 32 | #include "ns.h" |
3bc34908 | 33 | #include "privs.h" |
98cbbaea | 34 | #include "nexthop_group.h" |
b66d022e | 35 | #include "lib_errors.h" |
bc867a5d | 36 | #include "northbound.h" |
8b4cb7a6 | 37 | #include "northbound_cli.h" |
19dc275e | 38 | |
1eb92f06 | 39 | /* default VRF name value used when VRF backend is not NETNS */ |
dd114702 | 40 | #define VRF_DEFAULT_NAME_INTERNAL "default" |
ec31f30d | 41 | |
bf8d3d6a DL |
42 | DEFINE_MTYPE_STATIC(LIB, VRF, "VRF"); |
43 | DEFINE_MTYPE_STATIC(LIB, VRF_BITMAP, "VRF bit-map"); | |
4a1ab8e4 | 44 | |
96244aca | 45 | DEFINE_QOBJ_TYPE(vrf); |
e80e7cce | 46 | |
d62a17ae | 47 | static __inline int vrf_id_compare(const struct vrf *, const struct vrf *); |
48 | static __inline int vrf_name_compare(const struct vrf *, const struct vrf *); | |
1a1a7065 | 49 | |
d62a17ae | 50 | RB_GENERATE(vrf_id_head, vrf, id_entry, vrf_id_compare); |
51 | RB_GENERATE(vrf_name_head, vrf, name_entry, vrf_name_compare); | |
1a1a7065 | 52 | |
d62a17ae | 53 | struct vrf_id_head vrfs_by_id = RB_INITIALIZER(&vrfs_by_id); |
54 | struct vrf_name_head vrfs_by_name = RB_INITIALIZER(&vrfs_by_name); | |
1a1a7065 | 55 | |
78dd30b2 | 56 | static int vrf_backend; |
72261ecd | 57 | static int vrf_backend_configured; |
c200f5e1 | 58 | static char vrf_default_name[VRF_NAMSIZ] = VRF_DEFAULT_NAME_INTERNAL; |
78dd30b2 | 59 | |
19dc275e DS |
60 | /* |
61 | * Turn on/off debug code | |
62 | * for vrf. | |
63 | */ | |
c17faa4b | 64 | static int debug_vrf = 0; |
b72ede27 | 65 | |
b72ede27 | 66 | /* Holding VRF hooks */ |
1b3e9a21 | 67 | static struct vrf_master { |
d62a17ae | 68 | int (*vrf_new_hook)(struct vrf *); |
69 | int (*vrf_delete_hook)(struct vrf *); | |
70 | int (*vrf_enable_hook)(struct vrf *); | |
71 | int (*vrf_disable_hook)(struct vrf *); | |
72 | } vrf_master = { | |
73 | 0, | |
74 | }; | |
b72ede27 | 75 | |
d62a17ae | 76 | static int vrf_is_enabled(struct vrf *vrf); |
e5bf3e1e | 77 | |
216b18ef | 78 | /* VRF list existance check by name. */ |
d62a17ae | 79 | struct vrf *vrf_lookup_by_name(const char *name) |
216b18ef | 80 | { |
d62a17ae | 81 | struct vrf vrf; |
82 | strlcpy(vrf.name, name, sizeof(vrf.name)); | |
83 | return (RB_FIND(vrf_name_head, &vrfs_by_name, &vrf)); | |
216b18ef | 84 | } |
216b18ef | 85 | |
d62a17ae | 86 | static __inline int vrf_id_compare(const struct vrf *a, const struct vrf *b) |
b72ede27 | 87 | { |
d62a17ae | 88 | return (a->vrf_id - b->vrf_id); |
216b18ef DS |
89 | } |
90 | ||
d62a17ae | 91 | static int vrf_name_compare(const struct vrf *a, const struct vrf *b) |
b72ede27 | 92 | { |
d62a17ae | 93 | return strcmp(a->name, b->name); |
b72ede27 FL |
94 | } |
95 | ||
ce1be369 PG |
96 | int vrf_switch_to_netns(vrf_id_t vrf_id) |
97 | { | |
98 | char *name; | |
99 | struct vrf *vrf = vrf_lookup_by_id(vrf_id); | |
100 | ||
ce1be369 | 101 | /* VRF is default VRF. silently ignore */ |
e26aedbe | 102 | if (!vrf || vrf->vrf_id == VRF_DEFAULT) |
9dff1132 | 103 | return 1; /* 1 = default */ |
e26aedbe PG |
104 | /* VRF has no NETNS backend. silently ignore */ |
105 | if (vrf->data.l.netns_name[0] == '\0') | |
9dff1132 | 106 | return 2; /* 2 = no netns */ |
ce1be369 PG |
107 | name = ns_netns_pathname(NULL, vrf->data.l.netns_name); |
108 | if (debug_vrf) | |
109 | zlog_debug("VRF_SWITCH: %s(%u)", name, vrf->vrf_id); | |
110 | return ns_switch_to_netns(name); | |
111 | } | |
112 | ||
113 | int vrf_switchback_to_initial(void) | |
114 | { | |
115 | int ret = ns_switchback_to_initial(); | |
116 | ||
117 | if (ret == 0 && debug_vrf) | |
118 | zlog_debug("VRF_SWITCHBACK"); | |
119 | return ret; | |
120 | } | |
121 | ||
216b18ef | 122 | /* Get a VRF. If not found, create one. |
34f8e6af DS |
123 | * Arg: |
124 | * name - The name of the vrf. May be NULL if unknown. | |
125 | * vrf_id - The vrf_id of the vrf. May be VRF_UNKNOWN if unknown | |
216b18ef | 126 | * Description: Please note that this routine can be called with just the name |
34f8e6af DS |
127 | * and 0 vrf-id |
128 | */ | |
d62a17ae | 129 | struct vrf *vrf_get(vrf_id_t vrf_id, const char *name) |
130 | { | |
131 | struct vrf *vrf = NULL; | |
132 | int new = 0; | |
133 | ||
d62a17ae | 134 | /* Nothing to see, move along here */ |
135 | if (!name && vrf_id == VRF_UNKNOWN) | |
136 | return NULL; | |
137 | ||
0c2bac38 PG |
138 | /* attempt to find already available VRF |
139 | */ | |
140 | if (name) | |
141 | vrf = vrf_lookup_by_name(name); | |
dd114702 PG |
142 | if (vrf && vrf_id != VRF_UNKNOWN |
143 | && vrf->vrf_id != VRF_UNKNOWN | |
144 | && vrf->vrf_id != vrf_id) { | |
145 | zlog_debug("VRF_GET: avoid %s creation(%u), same name exists (%u)", | |
146 | name, vrf_id, vrf->vrf_id); | |
147 | return NULL; | |
148 | } | |
d62a17ae | 149 | /* Try to find VRF both by ID and name */ |
0c2bac38 | 150 | if (!vrf && vrf_id != VRF_UNKNOWN) |
d62a17ae | 151 | vrf = vrf_lookup_by_id(vrf_id); |
d62a17ae | 152 | |
153 | if (vrf == NULL) { | |
154 | vrf = XCALLOC(MTYPE_VRF, sizeof(struct vrf)); | |
155 | vrf->vrf_id = VRF_UNKNOWN; | |
d62a17ae | 156 | QOBJ_REG(vrf, vrf); |
157 | new = 1; | |
158 | ||
159 | if (debug_vrf) | |
160 | zlog_debug("VRF(%u) %s is created.", vrf_id, | |
161 | (name) ? name : "(NULL)"); | |
162 | } | |
163 | ||
164 | /* Set identifier */ | |
165 | if (vrf_id != VRF_UNKNOWN && vrf->vrf_id == VRF_UNKNOWN) { | |
166 | vrf->vrf_id = vrf_id; | |
167 | RB_INSERT(vrf_id_head, &vrfs_by_id, vrf); | |
168 | } | |
169 | ||
170 | /* Set name */ | |
171 | if (name && vrf->name[0] != '\0' && strcmp(name, vrf->name)) { | |
87272aff | 172 | /* update the vrf name */ |
d62a17ae | 173 | RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf); |
87272aff PG |
174 | strlcpy(vrf->data.l.netns_name, |
175 | name, NS_NAMSIZ); | |
d62a17ae | 176 | strlcpy(vrf->name, name, sizeof(vrf->name)); |
177 | RB_INSERT(vrf_name_head, &vrfs_by_name, vrf); | |
178 | } else if (name && vrf->name[0] == '\0') { | |
179 | strlcpy(vrf->name, name, sizeof(vrf->name)); | |
180 | RB_INSERT(vrf_name_head, &vrfs_by_name, vrf); | |
181 | } | |
d62a17ae | 182 | if (new &&vrf_master.vrf_new_hook) |
183 | (*vrf_master.vrf_new_hook)(vrf); | |
184 | ||
185 | return vrf; | |
b72ede27 FL |
186 | } |
187 | ||
75d26fb3 | 188 | /* Update a VRF. If not found, create one. |
189 | * Arg: | |
190 | * name - The name of the vrf. | |
191 | * vrf_id - The vrf_id of the vrf. | |
192 | * Description: This function first finds the vrf using its name. If the vrf is | |
193 | * found and the vrf-id of the existing vrf does not match the new vrf id, it | |
194 | * will disable the existing vrf and update it with new vrf-id. If the vrf is | |
195 | * not found, it will create the vrf with given name and the new vrf id. | |
196 | */ | |
197 | struct vrf *vrf_update(vrf_id_t new_vrf_id, const char *name) | |
198 | { | |
199 | struct vrf *vrf = NULL; | |
200 | ||
201 | /*Treat VRF add for existing vrf as update | |
202 | * Update VRF ID and also update in VRF ID table | |
203 | */ | |
204 | if (name) | |
205 | vrf = vrf_lookup_by_name(name); | |
206 | if (vrf && new_vrf_id != VRF_UNKNOWN && vrf->vrf_id != VRF_UNKNOWN | |
207 | && vrf->vrf_id != new_vrf_id) { | |
208 | if (debug_vrf) { | |
209 | zlog_debug( | |
210 | "Vrf Update event: %s old id: %u, new id: %u", | |
211 | name, vrf->vrf_id, new_vrf_id); | |
212 | } | |
213 | ||
214 | /*Disable the vrf to simulate implicit delete | |
215 | * so that all stale routes are deleted | |
216 | * This vrf will be enabled down the line | |
217 | */ | |
218 | vrf_disable(vrf); | |
219 | ||
220 | ||
221 | RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf); | |
222 | vrf->vrf_id = new_vrf_id; | |
223 | RB_INSERT(vrf_id_head, &vrfs_by_id, vrf); | |
224 | ||
225 | } else { | |
226 | ||
227 | /* | |
228 | * vrf_get is implied creation if it does not exist | |
229 | */ | |
230 | vrf = vrf_get(new_vrf_id, name); | |
231 | } | |
232 | return vrf; | |
233 | } | |
234 | ||
84915b0a | 235 | /* Delete a VRF. This is called when the underlying VRF goes away, a |
236 | * pre-configured VRF is deleted or when shutting down (vrf_terminate()). | |
237 | */ | |
d62a17ae | 238 | void vrf_delete(struct vrf *vrf) |
b72ede27 | 239 | { |
d62a17ae | 240 | if (debug_vrf) |
c7384cf8 DS |
241 | zlog_debug("VRF %s(%u) is to be deleted.", vrf->name, |
242 | vrf->vrf_id); | |
b72ede27 | 243 | |
d62a17ae | 244 | if (vrf_is_enabled(vrf)) |
245 | vrf_disable(vrf); | |
e5bf3e1e | 246 | |
f60a1188 IR |
247 | if (vrf->vrf_id != VRF_UNKNOWN) { |
248 | RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf); | |
249 | vrf->vrf_id = VRF_UNKNOWN; | |
250 | } | |
251 | ||
84915b0a | 252 | /* If the VRF is user configured, it'll stick around, just remove |
253 | * the ID mapping. Interfaces assigned to this VRF should've been | |
254 | * removed already as part of the VRF going down. | |
255 | */ | |
9acc98c8 | 256 | if (vrf_is_user_cfged(vrf)) |
84915b0a | 257 | return; |
84915b0a | 258 | |
f60a1188 IR |
259 | /* Do not delete the VRF if it has interfaces configured in it. */ |
260 | if (!RB_EMPTY(if_name_head, &vrf->ifaces_by_name)) | |
261 | return; | |
262 | ||
d62a17ae | 263 | if (vrf_master.vrf_delete_hook) |
264 | (*vrf_master.vrf_delete_hook)(vrf); | |
216b18ef | 265 | |
d62a17ae | 266 | QOBJ_UNREG(vrf); |
b72ede27 | 267 | |
d62a17ae | 268 | if (vrf->name[0] != '\0') |
269 | RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf); | |
b72ede27 | 270 | |
d62a17ae | 271 | XFREE(MTYPE_VRF, vrf); |
b72ede27 FL |
272 | } |
273 | ||
274 | /* Look up a VRF by identifier. */ | |
d62a17ae | 275 | struct vrf *vrf_lookup_by_id(vrf_id_t vrf_id) |
b72ede27 | 276 | { |
d62a17ae | 277 | struct vrf vrf; |
278 | vrf.vrf_id = vrf_id; | |
279 | return (RB_FIND(vrf_id_head, &vrfs_by_id, &vrf)); | |
b72ede27 FL |
280 | } |
281 | ||
e5bf3e1e FL |
282 | /* |
283 | * Enable a VRF - that is, let the VRF be ready to use. | |
284 | * The VRF_ENABLE_HOOK callback will be called to inform | |
285 | * that they can allocate resources in this VRF. | |
286 | * | |
287 | * RETURN: 1 - enabled successfully; otherwise, 0. | |
288 | */ | |
d62a17ae | 289 | int vrf_enable(struct vrf *vrf) |
e5bf3e1e | 290 | { |
d62a17ae | 291 | if (vrf_is_enabled(vrf)) |
292 | return 1; | |
05e8e11e | 293 | |
d62a17ae | 294 | if (debug_vrf) |
c7384cf8 | 295 | zlog_debug("VRF %s(%u) is enabled.", vrf->name, vrf->vrf_id); |
e5bf3e1e | 296 | |
d62a17ae | 297 | SET_FLAG(vrf->status, VRF_ACTIVE); |
e5bf3e1e | 298 | |
d62a17ae | 299 | if (vrf_master.vrf_enable_hook) |
300 | (*vrf_master.vrf_enable_hook)(vrf); | |
e5bf3e1e | 301 | |
98cbbaea DS |
302 | /* |
303 | * If we have any nexthop group entries that | |
304 | * are awaiting vrf initialization then | |
305 | * let's let people know about it | |
306 | */ | |
307 | nexthop_group_enable_vrf(vrf); | |
308 | ||
d62a17ae | 309 | return 1; |
e5bf3e1e FL |
310 | } |
311 | ||
312 | /* | |
313 | * Disable a VRF - that is, let the VRF be unusable. | |
314 | * The VRF_DELETE_HOOK callback will be called to inform | |
315 | * that they must release the resources in the VRF. | |
316 | */ | |
697d3ec7 | 317 | void vrf_disable(struct vrf *vrf) |
e5bf3e1e | 318 | { |
d62a17ae | 319 | if (!vrf_is_enabled(vrf)) |
320 | return; | |
a647bfa8 | 321 | |
d62a17ae | 322 | UNSET_FLAG(vrf->status, VRF_ACTIVE); |
e5bf3e1e | 323 | |
d62a17ae | 324 | if (debug_vrf) |
c7384cf8 DS |
325 | zlog_debug("VRF %s(%u) is to be disabled.", vrf->name, |
326 | vrf->vrf_id); | |
e5bf3e1e | 327 | |
d62a17ae | 328 | /* Till now, nothing to be done for the default VRF. */ |
329 | // Pending: see why this statement. | |
e74f14fc | 330 | |
0cbee799 DS |
331 | |
332 | /* | |
333 | * When the vrf is disabled let's | |
334 | * handle all nexthop-groups associated | |
335 | * with this vrf | |
336 | */ | |
337 | nexthop_group_disable_vrf(vrf); | |
338 | ||
d62a17ae | 339 | if (vrf_master.vrf_disable_hook) |
340 | (*vrf_master.vrf_disable_hook)(vrf); | |
e5bf3e1e FL |
341 | } |
342 | ||
b7cfce93 MK |
343 | const char *vrf_id_to_name(vrf_id_t vrf_id) |
344 | { | |
345 | struct vrf *vrf; | |
346 | ||
7c1119cb CG |
347 | if (vrf_id == VRF_DEFAULT) |
348 | return VRF_DEFAULT_NAME; | |
349 | ||
b7cfce93 | 350 | vrf = vrf_lookup_by_id(vrf_id); |
bd47f3a3 | 351 | return VRF_LOGNAME(vrf); |
b7cfce93 MK |
352 | } |
353 | ||
b72ede27 | 354 | /* Look up the data pointer of the specified VRF. */ |
d62a17ae | 355 | void *vrf_info_lookup(vrf_id_t vrf_id) |
b72ede27 | 356 | { |
d62a17ae | 357 | struct vrf *vrf = vrf_lookup_by_id(vrf_id); |
358 | return vrf ? vrf->info : NULL; | |
b72ede27 FL |
359 | } |
360 | ||
7076bb2f | 361 | /* |
4a8bf858 | 362 | * VRF hash for storing set or not. |
7076bb2f | 363 | */ |
4a8bf858 DS |
364 | struct vrf_bit_set { |
365 | vrf_id_t vrf_id; | |
366 | bool set; | |
367 | }; | |
7076bb2f | 368 | |
d8b87afe | 369 | static unsigned int vrf_hash_bitmap_key(const void *data) |
4a8bf858 | 370 | { |
d8b87afe | 371 | const struct vrf_bit_set *bit = data; |
d62a17ae | 372 | |
4a8bf858 DS |
373 | return bit->vrf_id; |
374 | } | |
d62a17ae | 375 | |
74df8d6d | 376 | static bool vrf_hash_bitmap_cmp(const void *a, const void *b) |
4a8bf858 DS |
377 | { |
378 | const struct vrf_bit_set *bit1 = a; | |
379 | const struct vrf_bit_set *bit2 = b; | |
d62a17ae | 380 | |
4a8bf858 DS |
381 | return bit1->vrf_id == bit2->vrf_id; |
382 | } | |
383 | ||
384 | static void *vrf_hash_bitmap_alloc(void *data) | |
385 | { | |
386 | struct vrf_bit_set *copy = data; | |
387 | struct vrf_bit_set *bit; | |
388 | ||
389 | bit = XMALLOC(MTYPE_VRF_BITMAP, sizeof(*bit)); | |
390 | bit->vrf_id = copy->vrf_id; | |
391 | ||
392 | return bit; | |
393 | } | |
394 | ||
395 | static void vrf_hash_bitmap_free(void *data) | |
396 | { | |
397 | struct vrf_bit_set *bit = data; | |
398 | ||
399 | XFREE(MTYPE_VRF_BITMAP, bit); | |
400 | } | |
7076bb2f | 401 | |
d62a17ae | 402 | vrf_bitmap_t vrf_bitmap_init(void) |
7076bb2f | 403 | { |
4a8bf858 DS |
404 | return hash_create_size(32, vrf_hash_bitmap_key, vrf_hash_bitmap_cmp, |
405 | "VRF BIT HASH"); | |
7076bb2f FL |
406 | } |
407 | ||
d62a17ae | 408 | void vrf_bitmap_free(vrf_bitmap_t bmap) |
7076bb2f | 409 | { |
4a8bf858 | 410 | struct hash *vrf_hash = bmap; |
7076bb2f | 411 | |
4a8bf858 | 412 | if (vrf_hash == NULL) |
d62a17ae | 413 | return; |
7076bb2f | 414 | |
4a8bf858 DS |
415 | hash_clean(vrf_hash, vrf_hash_bitmap_free); |
416 | hash_free(vrf_hash); | |
7076bb2f FL |
417 | } |
418 | ||
d62a17ae | 419 | void vrf_bitmap_set(vrf_bitmap_t bmap, vrf_id_t vrf_id) |
7076bb2f | 420 | { |
4a8bf858 DS |
421 | struct vrf_bit_set lookup = { .vrf_id = vrf_id }; |
422 | struct hash *vrf_hash = bmap; | |
423 | struct vrf_bit_set *bit; | |
7076bb2f | 424 | |
4a8bf858 | 425 | if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN) |
d62a17ae | 426 | return; |
7076bb2f | 427 | |
4a8bf858 DS |
428 | bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc); |
429 | bit->set = true; | |
7076bb2f FL |
430 | } |
431 | ||
d62a17ae | 432 | void vrf_bitmap_unset(vrf_bitmap_t bmap, vrf_id_t vrf_id) |
7076bb2f | 433 | { |
4a8bf858 DS |
434 | struct vrf_bit_set lookup = { .vrf_id = vrf_id }; |
435 | struct hash *vrf_hash = bmap; | |
436 | struct vrf_bit_set *bit; | |
7076bb2f | 437 | |
4a8bf858 | 438 | if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN) |
d62a17ae | 439 | return; |
7076bb2f | 440 | |
4a8bf858 DS |
441 | bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc); |
442 | bit->set = false; | |
7076bb2f FL |
443 | } |
444 | ||
d62a17ae | 445 | int vrf_bitmap_check(vrf_bitmap_t bmap, vrf_id_t vrf_id) |
7076bb2f | 446 | { |
4a8bf858 DS |
447 | struct vrf_bit_set lookup = { .vrf_id = vrf_id }; |
448 | struct hash *vrf_hash = bmap; | |
449 | struct vrf_bit_set *bit; | |
7076bb2f | 450 | |
4a8bf858 | 451 | if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN) |
d62a17ae | 452 | return 0; |
7076bb2f | 453 | |
4a8bf858 DS |
454 | bit = hash_lookup(vrf_hash, &lookup); |
455 | if (bit) | |
456 | return bit->set; | |
457 | ||
458 | return 0; | |
7076bb2f FL |
459 | } |
460 | ||
d62a17ae | 461 | static void vrf_autocomplete(vector comps, struct cmd_token *token) |
d617d5fe | 462 | { |
d62a17ae | 463 | struct vrf *vrf = NULL; |
d617d5fe | 464 | |
723001fc PG |
465 | RB_FOREACH (vrf, vrf_name_head, &vrfs_by_name) |
466 | vector_set(comps, XSTRDUP(MTYPE_COMPLETION, vrf->name)); | |
d617d5fe DS |
467 | } |
468 | ||
469 | static const struct cmd_variable_handler vrf_var_handlers[] = { | |
d62a17ae | 470 | { |
471 | .varname = "vrf", | |
472 | .completions = vrf_autocomplete, | |
473 | }, | |
e429a2a0 IR |
474 | { |
475 | .varname = "vrf_name", | |
476 | .completions = vrf_autocomplete, | |
477 | }, | |
478 | { | |
479 | .varname = "nexthop_vrf", | |
480 | .completions = vrf_autocomplete, | |
481 | }, | |
d62a17ae | 482 | {.completions = NULL}, |
d617d5fe DS |
483 | }; |
484 | ||
b72ede27 | 485 | /* Initialize VRF module. */ |
d62a17ae | 486 | void vrf_init(int (*create)(struct vrf *), int (*enable)(struct vrf *), |
ac2cb9bf | 487 | int (*disable)(struct vrf *), int (*destroy)(struct vrf *)) |
d62a17ae | 488 | { |
489 | struct vrf *default_vrf; | |
490 | ||
e26aedbe PG |
491 | /* initialise NS, in case VRF backend if NETNS */ |
492 | ns_init(); | |
d62a17ae | 493 | if (debug_vrf) |
15569c58 | 494 | zlog_debug("%s: Initializing VRF subsystem", __func__); |
d62a17ae | 495 | |
496 | vrf_master.vrf_new_hook = create; | |
497 | vrf_master.vrf_enable_hook = enable; | |
498 | vrf_master.vrf_disable_hook = disable; | |
d01b92fd | 499 | vrf_master.vrf_delete_hook = destroy; |
d62a17ae | 500 | |
501 | /* The default VRF always exists. */ | |
eb6934d5 | 502 | default_vrf = vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME); |
d62a17ae | 503 | if (!default_vrf) { |
450971aa | 504 | flog_err(EC_LIB_VRF_START, |
1c50c1c0 | 505 | "vrf_init: failed to create the default VRF!"); |
d62a17ae | 506 | exit(1); |
507 | } | |
20c87e98 TC |
508 | if (vrf_is_backend_netns()) { |
509 | struct ns *ns; | |
510 | ||
fdafe17e | 511 | strlcpy(default_vrf->data.l.netns_name, |
eb6934d5 | 512 | VRF_DEFAULT_NAME, NS_NAMSIZ); |
1eb92f06 | 513 | ns = ns_lookup(NS_DEFAULT); |
c3568c4d TC |
514 | ns->vrf_ctxt = default_vrf; |
515 | default_vrf->ns_ctxt = ns; | |
20c87e98 | 516 | } |
d62a17ae | 517 | |
518 | /* Enable the default VRF. */ | |
519 | if (!vrf_enable(default_vrf)) { | |
450971aa | 520 | flog_err(EC_LIB_VRF_START, |
1c50c1c0 | 521 | "vrf_init: failed to enable the default VRF!"); |
d62a17ae | 522 | exit(1); |
523 | } | |
524 | ||
525 | cmd_variable_handler_register(vrf_var_handlers); | |
b72ede27 FL |
526 | } |
527 | ||
ea0d70b1 SW |
528 | static void vrf_terminate_single(struct vrf *vrf) |
529 | { | |
530 | /* Clear configured flag and invoke delete. */ | |
b14fa9c4 | 531 | vrf_disable(vrf); |
ea0d70b1 | 532 | UNSET_FLAG(vrf->status, VRF_CONFIGURED); |
f60a1188 | 533 | if_terminate(vrf); |
ce27a13e | 534 | vrf_delete(vrf); |
ea0d70b1 SW |
535 | } |
536 | ||
b72ede27 | 537 | /* Terminate VRF module. */ |
d62a17ae | 538 | void vrf_terminate(void) |
b72ede27 | 539 | { |
ea0d70b1 | 540 | struct vrf *vrf, *tmp; |
b72ede27 | 541 | |
d62a17ae | 542 | if (debug_vrf) |
15569c58 | 543 | zlog_debug("%s: Shutting down vrf subsystem", __func__); |
19dc275e | 544 | |
ea0d70b1 SW |
545 | RB_FOREACH_SAFE (vrf, vrf_id_head, &vrfs_by_id, tmp) { |
546 | if (vrf->vrf_id == VRF_DEFAULT) | |
547 | continue; | |
55cd0f61 | 548 | |
ea0d70b1 | 549 | vrf_terminate_single(vrf); |
65c3a7c4 | 550 | } |
55cd0f61 | 551 | |
ea0d70b1 SW |
552 | RB_FOREACH_SAFE (vrf, vrf_name_head, &vrfs_by_name, tmp) { |
553 | if (vrf->vrf_id == VRF_DEFAULT) | |
554 | continue; | |
55cd0f61 | 555 | |
ea0d70b1 | 556 | vrf_terminate_single(vrf); |
65c3a7c4 | 557 | } |
ea0d70b1 SW |
558 | |
559 | /* Finally terminate default VRF */ | |
560 | vrf = vrf_lookup_by_id(VRF_DEFAULT); | |
b8984d4e DL |
561 | if (vrf) |
562 | vrf_terminate_single(vrf); | |
b72ede27 FL |
563 | } |
564 | ||
0f4977c6 | 565 | int vrf_socket(int domain, int type, int protocol, vrf_id_t vrf_id, |
02fe07c7 | 566 | const char *interfacename) |
e5bf3e1e | 567 | { |
2e0d2b3d | 568 | int ret, save_errno, ret2; |
e5bf3e1e | 569 | |
2e0d2b3d PG |
570 | ret = vrf_switch_to_netns(vrf_id); |
571 | if (ret < 0) | |
450971aa | 572 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 573 | __func__, vrf_id, safe_strerror(errno)); |
b66d022e | 574 | |
d62a17ae | 575 | ret = socket(domain, type, protocol); |
2e0d2b3d PG |
576 | save_errno = errno; |
577 | ret2 = vrf_switchback_to_initial(); | |
578 | if (ret2 < 0) | |
450971aa | 579 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
580 | "%s: Can't switchback from VRF %u (%s)", __func__, |
581 | vrf_id, safe_strerror(errno)); | |
2e0d2b3d | 582 | errno = save_errno; |
0f4977c6 PG |
583 | if (ret <= 0) |
584 | return ret; | |
585 | ret2 = vrf_bind(vrf_id, ret, interfacename); | |
586 | if (ret2 < 0) { | |
587 | close(ret); | |
588 | ret = ret2; | |
589 | } | |
d62a17ae | 590 | return ret; |
e5bf3e1e FL |
591 | } |
592 | ||
78dd30b2 PG |
593 | int vrf_is_backend_netns(void) |
594 | { | |
595 | return (vrf_backend == VRF_BACKEND_NETNS); | |
596 | } | |
597 | ||
598 | int vrf_get_backend(void) | |
599 | { | |
72261ecd PG |
600 | if (!vrf_backend_configured) |
601 | return VRF_BACKEND_UNKNOWN; | |
78dd30b2 PG |
602 | return vrf_backend; |
603 | } | |
604 | ||
7239d3d9 | 605 | int vrf_configure_backend(enum vrf_backend_type backend) |
78dd30b2 | 606 | { |
f7d45925 QY |
607 | /* Work around issue in old gcc */ |
608 | switch (backend) { | |
609 | case VRF_BACKEND_UNKNOWN: | |
610 | case VRF_BACKEND_NETNS: | |
611 | case VRF_BACKEND_VRF_LITE: | |
612 | break; | |
613 | default: | |
7239d3d9 | 614 | return -1; |
f7d45925 | 615 | } |
7239d3d9 QY |
616 | |
617 | vrf_backend = backend; | |
72261ecd | 618 | vrf_backend_configured = 1; |
7239d3d9 QY |
619 | |
620 | return 0; | |
78dd30b2 PG |
621 | } |
622 | ||
697d3ec7 | 623 | /* vrf CLI commands */ |
16d6ea59 QY |
624 | DEFUN_NOSH(vrf_exit, |
625 | vrf_exit_cmd, | |
626 | "exit-vrf", | |
627 | "Exit current mode and down to previous mode\n") | |
628 | { | |
799a81df | 629 | cmd_exit(vty); |
16d6ea59 QY |
630 | return CMD_SUCCESS; |
631 | } | |
632 | ||
ca77b518 | 633 | DEFUN_YANG_NOSH (vrf, |
697d3ec7 PG |
634 | vrf_cmd, |
635 | "vrf NAME", | |
636 | "Select a VRF to configure\n" | |
637 | "VRF's name\n") | |
638 | { | |
639 | int idx_name = 1; | |
640 | const char *vrfname = argv[idx_name]->arg; | |
62d89c64 IR |
641 | char xpath_list[XPATH_MAXLEN]; |
642 | struct vrf *vrf; | |
643 | int ret; | |
697d3ec7 | 644 | |
62d89c64 IR |
645 | if (strlen(vrfname) > VRF_NAMSIZ) { |
646 | vty_out(vty, | |
647 | "%% VRF name %s invalid: length exceeds %d bytes\n", | |
648 | vrfname, VRF_NAMSIZ); | |
649 | return CMD_WARNING_CONFIG_FAILED; | |
650 | } | |
651 | ||
652 | snprintf(xpath_list, sizeof(xpath_list), FRR_VRF_KEY_XPATH, vrfname); | |
653 | ||
654 | nb_cli_enqueue_change(vty, xpath_list, NB_OP_CREATE, NULL); | |
ae08de9f | 655 | ret = nb_cli_apply_changes_clear_pending(vty, "%s", xpath_list); |
62d89c64 IR |
656 | if (ret == CMD_SUCCESS) { |
657 | VTY_PUSH_XPATH(VRF_NODE, xpath_list); | |
658 | vrf = vrf_lookup_by_name(vrfname); | |
659 | if (vrf) | |
660 | VTY_PUSH_CONTEXT(VRF_NODE, vrf); | |
661 | } | |
662 | ||
663 | return ret; | |
697d3ec7 PG |
664 | } |
665 | ||
ca77b518 | 666 | DEFUN_YANG (no_vrf, |
34c46274 RW |
667 | no_vrf_cmd, |
668 | "no vrf NAME", | |
669 | NO_STR | |
670 | "Delete a pseudo VRF's configuration\n" | |
671 | "VRF's name\n") | |
f30c50b9 | 672 | { |
d62a17ae | 673 | const char *vrfname = argv[2]->arg; |
8b4cb7a6 | 674 | char xpath_list[XPATH_MAXLEN]; |
53dc2b05 | 675 | |
d62a17ae | 676 | struct vrf *vrfp; |
f30c50b9 | 677 | |
d62a17ae | 678 | vrfp = vrf_lookup_by_name(vrfname); |
f30c50b9 | 679 | |
cd980d03 IR |
680 | if (vrfp == NULL) |
681 | return CMD_SUCCESS; | |
f30c50b9 | 682 | |
d62a17ae | 683 | if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) { |
684 | vty_out(vty, "%% Only inactive VRFs can be deleted\n"); | |
685 | return CMD_WARNING_CONFIG_FAILED; | |
686 | } | |
f30c50b9 | 687 | |
f5eef2d5 IR |
688 | if (vrf_get_backend() == VRF_BACKEND_VRF_LITE) { |
689 | /* | |
574445ec | 690 | * Remove the VRF interface config when removing the VRF. |
f5eef2d5 IR |
691 | */ |
692 | snprintf(xpath_list, sizeof(xpath_list), | |
574445ec | 693 | "/frr-interface:lib/interface[name='%s']", vrfname); |
f5eef2d5 IR |
694 | nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL); |
695 | } | |
696 | ||
09b150ef | 697 | snprintf(xpath_list, sizeof(xpath_list), FRR_VRF_KEY_XPATH, vrfname); |
f30c50b9 | 698 | |
8b4cb7a6 | 699 | nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL); |
f5eef2d5 | 700 | return nb_cli_apply_changes(vty, NULL); |
f30c50b9 RW |
701 | } |
702 | ||
53dc2b05 | 703 | |
62b346ee | 704 | static struct cmd_node vrf_node = { |
f4b8291f | 705 | .name = "vrf", |
62b346ee | 706 | .node = VRF_NODE, |
24389580 | 707 | .parent_node = CONFIG_NODE, |
62b346ee | 708 | .prompt = "%s(config-vrf)# ", |
62b346ee | 709 | }; |
7ddcfca4 | 710 | |
19dc275e DS |
711 | /* |
712 | * Debug CLI for vrf's | |
713 | */ | |
714 | DEFUN (vrf_debug, | |
715 | vrf_debug_cmd, | |
716 | "debug vrf", | |
717 | DEBUG_STR | |
718 | "VRF Debugging\n") | |
719 | { | |
d62a17ae | 720 | debug_vrf = 1; |
19dc275e | 721 | |
d62a17ae | 722 | return CMD_SUCCESS; |
19dc275e DS |
723 | } |
724 | ||
725 | DEFUN (no_vrf_debug, | |
726 | no_vrf_debug_cmd, | |
727 | "no debug vrf", | |
728 | NO_STR | |
729 | DEBUG_STR | |
730 | "VRF Debugging\n") | |
731 | { | |
d62a17ae | 732 | debug_vrf = 0; |
19dc275e | 733 | |
d62a17ae | 734 | return CMD_SUCCESS; |
19dc275e DS |
735 | } |
736 | ||
d62a17ae | 737 | static int vrf_write_host(struct vty *vty) |
19dc275e | 738 | { |
d62a17ae | 739 | if (debug_vrf) |
740 | vty_out(vty, "debug vrf\n"); | |
19dc275e | 741 | |
d62a17ae | 742 | return 1; |
19dc275e DS |
743 | } |
744 | ||
612c2c15 | 745 | static int vrf_write_host(struct vty *vty); |
62b346ee | 746 | static struct cmd_node vrf_debug_node = { |
f4b8291f | 747 | .name = "vrf debug", |
62b346ee DL |
748 | .node = VRF_DEBUG_NODE, |
749 | .prompt = "", | |
612c2c15 | 750 | .config_write = vrf_write_host, |
62b346ee | 751 | }; |
19dc275e | 752 | |
d62a17ae | 753 | void vrf_install_commands(void) |
19dc275e | 754 | { |
612c2c15 | 755 | install_node(&vrf_debug_node); |
19dc275e | 756 | |
d62a17ae | 757 | install_element(CONFIG_NODE, &vrf_debug_cmd); |
758 | install_element(ENABLE_NODE, &vrf_debug_cmd); | |
759 | install_element(CONFIG_NODE, &no_vrf_debug_cmd); | |
760 | install_element(ENABLE_NODE, &no_vrf_debug_cmd); | |
19dc275e | 761 | } |
53dc2b05 | 762 | |
cfc369c4 | 763 | void vrf_cmd_init(int (*writefunc)(struct vty *vty)) |
7ddcfca4 | 764 | { |
d62a17ae | 765 | install_element(CONFIG_NODE, &vrf_cmd); |
766 | install_element(CONFIG_NODE, &no_vrf_cmd); | |
612c2c15 DL |
767 | vrf_node.config_write = writefunc; |
768 | install_node(&vrf_node); | |
d62a17ae | 769 | install_default(VRF_NODE); |
16d6ea59 | 770 | install_element(VRF_NODE, &vrf_exit_cmd); |
19dc275e | 771 | } |
ec31f30d | 772 | |
ac2cb9bf | 773 | void vrf_set_default_name(const char *default_name) |
ec31f30d | 774 | { |
c200f5e1 | 775 | snprintf(vrf_default_name, VRF_NAMSIZ, "%s", default_name); |
c200f5e1 PG |
776 | } |
777 | ||
778 | const char *vrf_get_default_name(void) | |
779 | { | |
780 | return vrf_default_name; | |
781 | } | |
782 | ||
36eef858 | 783 | int vrf_bind(vrf_id_t vrf_id, int fd, const char *ifname) |
0f4977c6 PG |
784 | { |
785 | int ret = 0; | |
91f854f6 | 786 | struct interface *ifp; |
36eef858 IR |
787 | struct vrf *vrf; |
788 | ||
789 | if (fd < 0) | |
790 | return -1; | |
791 | ||
792 | if (vrf_id == VRF_UNKNOWN) | |
793 | return -1; | |
794 | ||
795 | /* can't bind to a VRF that doesn't exist */ | |
796 | vrf = vrf_lookup_by_id(vrf_id); | |
797 | if (!vrf_is_enabled(vrf)) | |
798 | return -1; | |
799 | ||
800 | if (ifname && strcmp(ifname, vrf->name)) { | |
801 | /* binding to a regular interface */ | |
802 | ||
803 | /* can't bind to an interface that doesn't exist */ | |
804 | ifp = if_lookup_by_name(ifname, vrf_id); | |
805 | if (!ifp) | |
806 | return -1; | |
807 | } else { | |
808 | /* binding to a VRF device */ | |
809 | ||
810 | /* nothing to do for netns */ | |
811 | if (vrf_is_backend_netns()) | |
812 | return 0; | |
813 | ||
814 | /* nothing to do for default vrf */ | |
815 | if (vrf_id == VRF_DEFAULT) | |
816 | return 0; | |
817 | ||
818 | ifname = vrf->name; | |
819 | } | |
0f4977c6 | 820 | |
0f4977c6 | 821 | #ifdef SO_BINDTODEVICE |
36eef858 IR |
822 | ret = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, ifname, |
823 | strlen(ifname) + 1); | |
0f4977c6 | 824 | if (ret < 0) |
36eef858 IR |
825 | zlog_err("bind to interface %s failed, errno=%d", ifname, |
826 | errno); | |
0f4977c6 PG |
827 | #endif /* SO_BINDTODEVICE */ |
828 | return ret; | |
829 | } | |
2e0d2b3d | 830 | int vrf_getaddrinfo(const char *node, const char *service, |
996c9314 LB |
831 | const struct addrinfo *hints, struct addrinfo **res, |
832 | vrf_id_t vrf_id) | |
2e0d2b3d PG |
833 | { |
834 | int ret, ret2, save_errno; | |
835 | ||
836 | ret = vrf_switch_to_netns(vrf_id); | |
837 | if (ret < 0) | |
450971aa | 838 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 839 | __func__, vrf_id, safe_strerror(errno)); |
2e0d2b3d PG |
840 | ret = getaddrinfo(node, service, hints, res); |
841 | save_errno = errno; | |
842 | ret2 = vrf_switchback_to_initial(); | |
843 | if (ret2 < 0) | |
450971aa | 844 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
845 | "%s: Can't switchback from VRF %u (%s)", __func__, |
846 | vrf_id, safe_strerror(errno)); | |
2e0d2b3d PG |
847 | errno = save_errno; |
848 | return ret; | |
849 | } | |
850 | ||
516d7591 PG |
851 | int vrf_ioctl(vrf_id_t vrf_id, int d, unsigned long request, char *params) |
852 | { | |
853 | int ret, saved_errno, rc; | |
854 | ||
855 | ret = vrf_switch_to_netns(vrf_id); | |
856 | if (ret < 0) { | |
450971aa | 857 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 858 | __func__, vrf_id, safe_strerror(errno)); |
516d7591 PG |
859 | return 0; |
860 | } | |
861 | rc = ioctl(d, request, params); | |
862 | saved_errno = errno; | |
863 | ret = vrf_switchback_to_initial(); | |
864 | if (ret < 0) | |
450971aa | 865 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
866 | "%s: Can't switchback from VRF %u (%s)", __func__, |
867 | vrf_id, safe_strerror(errno)); | |
516d7591 PG |
868 | errno = saved_errno; |
869 | return rc; | |
870 | } | |
871 | ||
0f4977c6 | 872 | int vrf_sockunion_socket(const union sockunion *su, vrf_id_t vrf_id, |
02fe07c7 | 873 | const char *interfacename) |
2e0d2b3d PG |
874 | { |
875 | int ret, save_errno, ret2; | |
876 | ||
877 | ret = vrf_switch_to_netns(vrf_id); | |
878 | if (ret < 0) | |
450971aa | 879 | flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)", |
09c866e3 | 880 | __func__, vrf_id, safe_strerror(errno)); |
2e0d2b3d PG |
881 | ret = sockunion_socket(su); |
882 | save_errno = errno; | |
883 | ret2 = vrf_switchback_to_initial(); | |
884 | if (ret2 < 0) | |
450971aa | 885 | flog_err_sys(EC_LIB_SOCKET, |
09c866e3 QY |
886 | "%s: Can't switchback from VRF %u (%s)", __func__, |
887 | vrf_id, safe_strerror(errno)); | |
2e0d2b3d | 888 | errno = save_errno; |
0f4977c6 PG |
889 | |
890 | if (ret <= 0) | |
891 | return ret; | |
892 | ret2 = vrf_bind(vrf_id, ret, interfacename); | |
893 | if (ret2 < 0) { | |
894 | close(ret); | |
895 | ret = ret2; | |
896 | } | |
2e0d2b3d PG |
897 | return ret; |
898 | } | |
0b014ea6 | 899 | |
bc867a5d CS |
900 | /* ------- Northbound callbacks ------- */ |
901 | ||
902 | /* | |
903 | * XPath: /frr-vrf:lib/vrf | |
904 | */ | |
60ee8be1 | 905 | static int lib_vrf_create(struct nb_cb_create_args *args) |
bc867a5d CS |
906 | { |
907 | const char *vrfname; | |
908 | struct vrf *vrfp; | |
909 | ||
60ee8be1 | 910 | vrfname = yang_dnode_get_string(args->dnode, "./name"); |
bc867a5d | 911 | |
60ee8be1 | 912 | if (args->event != NB_EV_APPLY) |
bc867a5d CS |
913 | return NB_OK; |
914 | ||
915 | vrfp = vrf_get(VRF_UNKNOWN, vrfname); | |
916 | ||
b9b794db | 917 | SET_FLAG(vrfp->status, VRF_CONFIGURED); |
60ee8be1 | 918 | nb_running_set_entry(args->dnode, vrfp); |
bc867a5d CS |
919 | |
920 | return NB_OK; | |
921 | } | |
922 | ||
60ee8be1 | 923 | static int lib_vrf_destroy(struct nb_cb_destroy_args *args) |
bc867a5d CS |
924 | { |
925 | struct vrf *vrfp; | |
926 | ||
60ee8be1 | 927 | switch (args->event) { |
bc867a5d | 928 | case NB_EV_VALIDATE: |
60ee8be1 | 929 | vrfp = nb_running_get_entry(args->dnode, NULL, true); |
bc867a5d | 930 | if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) { |
10bdc68f RW |
931 | snprintf(args->errmsg, args->errmsg_len, |
932 | "Only inactive VRFs can be deleted"); | |
bc867a5d CS |
933 | return NB_ERR_VALIDATION; |
934 | } | |
935 | break; | |
936 | case NB_EV_PREPARE: | |
937 | case NB_EV_ABORT: | |
938 | break; | |
939 | case NB_EV_APPLY: | |
60ee8be1 | 940 | vrfp = nb_running_unset_entry(args->dnode); |
8b4cb7a6 | 941 | |
bc867a5d | 942 | /* Clear configured flag and invoke delete. */ |
b9b794db | 943 | UNSET_FLAG(vrfp->status, VRF_CONFIGURED); |
bc867a5d CS |
944 | vrf_delete(vrfp); |
945 | break; | |
946 | } | |
947 | ||
948 | return NB_OK; | |
949 | } | |
950 | ||
60ee8be1 | 951 | static const void *lib_vrf_get_next(struct nb_cb_get_next_args *args) |
bc867a5d | 952 | { |
60ee8be1 | 953 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d | 954 | |
60ee8be1 | 955 | if (args->list_entry == NULL) { |
bc867a5d CS |
956 | vrfp = RB_MIN(vrf_name_head, &vrfs_by_name); |
957 | } else { | |
958 | vrfp = RB_NEXT(vrf_name_head, vrfp); | |
959 | } | |
960 | ||
961 | return vrfp; | |
962 | } | |
963 | ||
60ee8be1 | 964 | static int lib_vrf_get_keys(struct nb_cb_get_keys_args *args) |
bc867a5d | 965 | { |
60ee8be1 | 966 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d | 967 | |
60ee8be1 RW |
968 | args->keys->num = 1; |
969 | strlcpy(args->keys->key[0], vrfp->name, sizeof(args->keys->key[0])); | |
bc867a5d CS |
970 | |
971 | return NB_OK; | |
972 | } | |
973 | ||
60ee8be1 | 974 | static const void *lib_vrf_lookup_entry(struct nb_cb_lookup_entry_args *args) |
bc867a5d | 975 | { |
60ee8be1 | 976 | const char *vrfname = args->keys->key[0]; |
bc867a5d CS |
977 | |
978 | struct vrf *vrf = vrf_lookup_by_name(vrfname); | |
979 | ||
980 | return vrf; | |
981 | } | |
982 | ||
983 | /* | |
984 | * XPath: /frr-vrf:lib/vrf/id | |
985 | */ | |
60ee8be1 RW |
986 | static struct yang_data * |
987 | lib_vrf_state_id_get_elem(struct nb_cb_get_elem_args *args) | |
bc867a5d | 988 | { |
60ee8be1 | 989 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d | 990 | |
60ee8be1 | 991 | return yang_data_new_uint32(args->xpath, vrfp->vrf_id); |
bc867a5d CS |
992 | } |
993 | ||
994 | /* | |
995 | * XPath: /frr-vrf:lib/vrf/active | |
996 | */ | |
60ee8be1 RW |
997 | static struct yang_data * |
998 | lib_vrf_state_active_get_elem(struct nb_cb_get_elem_args *args) | |
bc867a5d | 999 | { |
60ee8be1 | 1000 | struct vrf *vrfp = (struct vrf *)args->list_entry; |
bc867a5d CS |
1001 | |
1002 | if (vrfp->status == VRF_ACTIVE) | |
ff9232c8 | 1003 | return yang_data_new_bool(args->xpath, true); |
bc867a5d CS |
1004 | |
1005 | return NULL; | |
1006 | } | |
1007 | ||
1008 | /* clang-format off */ | |
1009 | const struct frr_yang_module_info frr_vrf_info = { | |
1010 | .name = "frr-vrf", | |
1011 | .nodes = { | |
1012 | { | |
1013 | .xpath = "/frr-vrf:lib/vrf", | |
1014 | .cbs = { | |
1015 | .create = lib_vrf_create, | |
1016 | .destroy = lib_vrf_destroy, | |
1017 | .get_next = lib_vrf_get_next, | |
1018 | .get_keys = lib_vrf_get_keys, | |
1019 | .lookup_entry = lib_vrf_lookup_entry, | |
3bb513c3 CH |
1020 | }, |
1021 | .priority = NB_DFLT_PRIORITY - 2, | |
bc867a5d CS |
1022 | }, |
1023 | { | |
1024 | .xpath = "/frr-vrf:lib/vrf/state/id", | |
1025 | .cbs = { | |
1026 | .get_elem = lib_vrf_state_id_get_elem, | |
1027 | } | |
1028 | }, | |
1029 | { | |
1030 | .xpath = "/frr-vrf:lib/vrf/state/active", | |
1031 | .cbs = { | |
1032 | .get_elem = lib_vrf_state_active_get_elem, | |
1033 | } | |
1034 | }, | |
1035 | { | |
1036 | .xpath = NULL, | |
1037 | }, | |
1038 | } | |
1039 | }; | |
1040 |