]> git.proxmox.com Git - mirror_frr.git/blame - lib/vrf.c
lib: return human-readable error messages to the northbound clients
[mirror_frr.git] / lib / vrf.c
CommitLineData
b72ede27
FL
1/*
2 * VRF functions.
3 * Copyright (C) 2014 6WIND S.A.
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published
9 * by the Free Software Foundation; either version 2, or (at your
10 * option) any later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
896014f4
DL
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
b72ede27
FL
20 */
21
22#include <zebra.h>
23
4691b65a
PG
24/* for basename */
25#include <libgen.h>
26
6a69b354 27#include "if.h"
b72ede27 28#include "vrf.h"
7922fc65 29#include "vrf_int.h"
b72ede27
FL
30#include "prefix.h"
31#include "table.h"
32#include "log.h"
33#include "memory.h"
19dc275e 34#include "command.h"
b95c1883 35#include "ns.h"
3bc34908 36#include "privs.h"
98cbbaea 37#include "nexthop_group.h"
b66d022e 38#include "lib_errors.h"
bc867a5d 39#include "northbound.h"
8b4cb7a6 40#include "northbound_cli.h"
19dc275e 41
ec31f30d
PG
42/* default VRF ID value used when VRF backend is not NETNS */
43#define VRF_DEFAULT_INTERNAL 0
dd114702 44#define VRF_DEFAULT_NAME_INTERNAL "default"
ec31f30d 45
d62a17ae 46DEFINE_MTYPE_STATIC(LIB, VRF, "VRF")
4a1ab8e4
DL
47DEFINE_MTYPE_STATIC(LIB, VRF_BITMAP, "VRF bit-map")
48
e80e7cce
DL
49DEFINE_QOBJ_TYPE(vrf)
50
d62a17ae 51static __inline int vrf_id_compare(const struct vrf *, const struct vrf *);
52static __inline int vrf_name_compare(const struct vrf *, const struct vrf *);
1a1a7065 53
d62a17ae 54RB_GENERATE(vrf_id_head, vrf, id_entry, vrf_id_compare);
55RB_GENERATE(vrf_name_head, vrf, name_entry, vrf_name_compare);
1a1a7065 56
d62a17ae 57struct vrf_id_head vrfs_by_id = RB_INITIALIZER(&vrfs_by_id);
58struct vrf_name_head vrfs_by_name = RB_INITIALIZER(&vrfs_by_name);
1a1a7065 59
78dd30b2 60static int vrf_backend;
72261ecd 61static int vrf_backend_configured;
3bc34908 62static struct zebra_privs_t *vrf_daemon_privs;
c200f5e1 63static char vrf_default_name[VRF_NAMSIZ] = VRF_DEFAULT_NAME_INTERNAL;
78dd30b2 64
19dc275e
DS
65/*
66 * Turn on/off debug code
67 * for vrf.
68 */
c17faa4b 69static int debug_vrf = 0;
b72ede27 70
b72ede27 71/* Holding VRF hooks */
1b3e9a21 72static struct vrf_master {
d62a17ae 73 int (*vrf_new_hook)(struct vrf *);
74 int (*vrf_delete_hook)(struct vrf *);
75 int (*vrf_enable_hook)(struct vrf *);
76 int (*vrf_disable_hook)(struct vrf *);
ecbc5a37 77 int (*vrf_update_name_hook)(struct vrf *vrf);
d62a17ae 78} vrf_master = {
79 0,
80};
b72ede27 81
d62a17ae 82static int vrf_is_enabled(struct vrf *vrf);
e5bf3e1e 83
216b18ef 84/* VRF list existance check by name. */
d62a17ae 85struct vrf *vrf_lookup_by_name(const char *name)
216b18ef 86{
d62a17ae 87 struct vrf vrf;
88 strlcpy(vrf.name, name, sizeof(vrf.name));
89 return (RB_FIND(vrf_name_head, &vrfs_by_name, &vrf));
216b18ef 90}
216b18ef 91
d62a17ae 92static __inline int vrf_id_compare(const struct vrf *a, const struct vrf *b)
b72ede27 93{
d62a17ae 94 return (a->vrf_id - b->vrf_id);
216b18ef
DS
95}
96
d62a17ae 97static int vrf_name_compare(const struct vrf *a, const struct vrf *b)
b72ede27 98{
d62a17ae 99 return strcmp(a->name, b->name);
b72ede27
FL
100}
101
e26aedbe
PG
102/* if ns_id is different and not VRF_UNKNOWN,
103 * then update vrf identifier, and enable VRF
104 */
105static void vrf_update_vrf_id(ns_id_t ns_id, void *opaqueptr)
106{
107 ns_id_t vrf_id = (vrf_id_t)ns_id;
108 vrf_id_t old_vrf_id;
109 struct vrf *vrf = (struct vrf *)opaqueptr;
110
111 if (!vrf)
112 return;
113 old_vrf_id = vrf->vrf_id;
114 if (vrf_id == vrf->vrf_id)
115 return;
116 if (vrf->vrf_id != VRF_UNKNOWN)
117 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
118 vrf->vrf_id = vrf_id;
119 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
120 if (old_vrf_id == VRF_UNKNOWN)
c4efd0f4 121 vrf_enable(vrf);
e26aedbe
PG
122}
123
ce1be369
PG
124int vrf_switch_to_netns(vrf_id_t vrf_id)
125{
126 char *name;
127 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
128
ce1be369 129 /* VRF is default VRF. silently ignore */
e26aedbe 130 if (!vrf || vrf->vrf_id == VRF_DEFAULT)
9dff1132 131 return 1; /* 1 = default */
e26aedbe
PG
132 /* VRF has no NETNS backend. silently ignore */
133 if (vrf->data.l.netns_name[0] == '\0')
9dff1132 134 return 2; /* 2 = no netns */
ce1be369
PG
135 name = ns_netns_pathname(NULL, vrf->data.l.netns_name);
136 if (debug_vrf)
137 zlog_debug("VRF_SWITCH: %s(%u)", name, vrf->vrf_id);
138 return ns_switch_to_netns(name);
139}
140
141int vrf_switchback_to_initial(void)
142{
143 int ret = ns_switchback_to_initial();
144
145 if (ret == 0 && debug_vrf)
146 zlog_debug("VRF_SWITCHBACK");
147 return ret;
148}
149
216b18ef 150/* Get a VRF. If not found, create one.
34f8e6af
DS
151 * Arg:
152 * name - The name of the vrf. May be NULL if unknown.
153 * vrf_id - The vrf_id of the vrf. May be VRF_UNKNOWN if unknown
216b18ef 154 * Description: Please note that this routine can be called with just the name
34f8e6af
DS
155 * and 0 vrf-id
156 */
d62a17ae 157struct vrf *vrf_get(vrf_id_t vrf_id, const char *name)
158{
159 struct vrf *vrf = NULL;
160 int new = 0;
161
162 if (debug_vrf)
996c9314
LB
163 zlog_debug("VRF_GET: %s(%u)", name == NULL ? "(NULL)" : name,
164 vrf_id);
d62a17ae 165
166 /* Nothing to see, move along here */
167 if (!name && vrf_id == VRF_UNKNOWN)
168 return NULL;
169
0c2bac38
PG
170 /* attempt to find already available VRF
171 */
172 if (name)
173 vrf = vrf_lookup_by_name(name);
dd114702
PG
174 if (vrf && vrf_id != VRF_UNKNOWN
175 && vrf->vrf_id != VRF_UNKNOWN
176 && vrf->vrf_id != vrf_id) {
177 zlog_debug("VRF_GET: avoid %s creation(%u), same name exists (%u)",
178 name, vrf_id, vrf->vrf_id);
179 return NULL;
180 }
d62a17ae 181 /* Try to find VRF both by ID and name */
0c2bac38 182 if (!vrf && vrf_id != VRF_UNKNOWN)
d62a17ae 183 vrf = vrf_lookup_by_id(vrf_id);
d62a17ae 184
185 if (vrf == NULL) {
186 vrf = XCALLOC(MTYPE_VRF, sizeof(struct vrf));
187 vrf->vrf_id = VRF_UNKNOWN;
d62a17ae 188 QOBJ_REG(vrf, vrf);
189 new = 1;
190
191 if (debug_vrf)
192 zlog_debug("VRF(%u) %s is created.", vrf_id,
193 (name) ? name : "(NULL)");
194 }
195
196 /* Set identifier */
197 if (vrf_id != VRF_UNKNOWN && vrf->vrf_id == VRF_UNKNOWN) {
198 vrf->vrf_id = vrf_id;
199 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
200 }
201
202 /* Set name */
203 if (name && vrf->name[0] != '\0' && strcmp(name, vrf->name)) {
87272aff 204 /* update the vrf name */
d62a17ae 205 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
87272aff
PG
206 strlcpy(vrf->data.l.netns_name,
207 name, NS_NAMSIZ);
d62a17ae 208 strlcpy(vrf->name, name, sizeof(vrf->name));
209 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
87272aff
PG
210 if (vrf->vrf_id == VRF_DEFAULT)
211 vrf_set_default_name(vrf->name, false);
d62a17ae 212 } else if (name && vrf->name[0] == '\0') {
213 strlcpy(vrf->name, name, sizeof(vrf->name));
214 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
215 }
d62a17ae 216 if (new &&vrf_master.vrf_new_hook)
217 (*vrf_master.vrf_new_hook)(vrf);
218
219 return vrf;
b72ede27
FL
220}
221
84915b0a 222/* Delete a VRF. This is called when the underlying VRF goes away, a
223 * pre-configured VRF is deleted or when shutting down (vrf_terminate()).
224 */
d62a17ae 225void vrf_delete(struct vrf *vrf)
b72ede27 226{
d62a17ae 227 if (debug_vrf)
228 zlog_debug("VRF %u is to be deleted.", vrf->vrf_id);
b72ede27 229
d62a17ae 230 if (vrf_is_enabled(vrf))
231 vrf_disable(vrf);
e5bf3e1e 232
84915b0a 233 /* If the VRF is user configured, it'll stick around, just remove
234 * the ID mapping. Interfaces assigned to this VRF should've been
235 * removed already as part of the VRF going down.
236 */
237 if (vrf_is_user_cfged(vrf)) {
238 if (vrf->vrf_id != VRF_UNKNOWN) {
239 /* Delete any VRF interfaces - should be only
240 * the VRF itself, other interfaces should've
241 * been moved out of the VRF.
242 */
243 if_terminate(vrf);
244 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
245 vrf->vrf_id = VRF_UNKNOWN;
246 }
247 return;
248 }
249
d62a17ae 250 if (vrf_master.vrf_delete_hook)
251 (*vrf_master.vrf_delete_hook)(vrf);
216b18ef 252
d62a17ae 253 QOBJ_UNREG(vrf);
f4e14fdb 254 if_terminate(vrf);
b72ede27 255
d62a17ae 256 if (vrf->vrf_id != VRF_UNKNOWN)
257 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
258 if (vrf->name[0] != '\0')
259 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
b72ede27 260
d62a17ae 261 XFREE(MTYPE_VRF, vrf);
b72ede27
FL
262}
263
264/* Look up a VRF by identifier. */
d62a17ae 265struct vrf *vrf_lookup_by_id(vrf_id_t vrf_id)
b72ede27 266{
d62a17ae 267 struct vrf vrf;
268 vrf.vrf_id = vrf_id;
269 return (RB_FIND(vrf_id_head, &vrfs_by_id, &vrf));
b72ede27
FL
270}
271
e5bf3e1e
FL
272/*
273 * Enable a VRF - that is, let the VRF be ready to use.
274 * The VRF_ENABLE_HOOK callback will be called to inform
275 * that they can allocate resources in this VRF.
276 *
277 * RETURN: 1 - enabled successfully; otherwise, 0.
278 */
d62a17ae 279int vrf_enable(struct vrf *vrf)
e5bf3e1e 280{
d62a17ae 281 if (vrf_is_enabled(vrf))
282 return 1;
05e8e11e 283
d62a17ae 284 if (debug_vrf)
285 zlog_debug("VRF %u is enabled.", vrf->vrf_id);
e5bf3e1e 286
d62a17ae 287 SET_FLAG(vrf->status, VRF_ACTIVE);
e5bf3e1e 288
d62a17ae 289 if (vrf_master.vrf_enable_hook)
290 (*vrf_master.vrf_enable_hook)(vrf);
e5bf3e1e 291
98cbbaea
DS
292 /*
293 * If we have any nexthop group entries that
294 * are awaiting vrf initialization then
295 * let's let people know about it
296 */
297 nexthop_group_enable_vrf(vrf);
298
d62a17ae 299 return 1;
e5bf3e1e
FL
300}
301
302/*
303 * Disable a VRF - that is, let the VRF be unusable.
304 * The VRF_DELETE_HOOK callback will be called to inform
305 * that they must release the resources in the VRF.
306 */
697d3ec7 307void vrf_disable(struct vrf *vrf)
e5bf3e1e 308{
d62a17ae 309 if (!vrf_is_enabled(vrf))
310 return;
a647bfa8 311
d62a17ae 312 UNSET_FLAG(vrf->status, VRF_ACTIVE);
e5bf3e1e 313
d62a17ae 314 if (debug_vrf)
315 zlog_debug("VRF %u is to be disabled.", vrf->vrf_id);
e5bf3e1e 316
d62a17ae 317 /* Till now, nothing to be done for the default VRF. */
318 // Pending: see why this statement.
e74f14fc 319
d62a17ae 320 if (vrf_master.vrf_disable_hook)
321 (*vrf_master.vrf_disable_hook)(vrf);
e5bf3e1e
FL
322}
323
b7cfce93
MK
324const char *vrf_id_to_name(vrf_id_t vrf_id)
325{
326 struct vrf *vrf;
327
328 vrf = vrf_lookup_by_id(vrf_id);
bd47f3a3 329 return VRF_LOGNAME(vrf);
b7cfce93
MK
330}
331
d62a17ae 332vrf_id_t vrf_name_to_id(const char *name)
216b18ef 333{
d62a17ae 334 struct vrf *vrf;
335 vrf_id_t vrf_id = VRF_DEFAULT; // Pending: need a way to return invalid
336 // id/ routine not used.
216b18ef 337
2569910b
PG
338 if (!name)
339 return vrf_id;
d62a17ae 340 vrf = vrf_lookup_by_name(name);
341 if (vrf)
342 vrf_id = vrf->vrf_id;
216b18ef 343
d62a17ae 344 return vrf_id;
216b18ef
DS
345}
346
b72ede27 347/* Get the data pointer of the specified VRF. If not found, create one. */
d62a17ae 348void *vrf_info_get(vrf_id_t vrf_id)
b72ede27 349{
d62a17ae 350 struct vrf *vrf = vrf_get(vrf_id, NULL);
351 return vrf->info;
b72ede27
FL
352}
353
354/* Look up the data pointer of the specified VRF. */
d62a17ae 355void *vrf_info_lookup(vrf_id_t vrf_id)
b72ede27 356{
d62a17ae 357 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
358 return vrf ? vrf->info : NULL;
b72ede27
FL
359}
360
7076bb2f 361/*
4a8bf858 362 * VRF hash for storing set or not.
7076bb2f 363 */
4a8bf858
DS
364struct vrf_bit_set {
365 vrf_id_t vrf_id;
366 bool set;
367};
7076bb2f 368
d8b87afe 369static unsigned int vrf_hash_bitmap_key(const void *data)
4a8bf858 370{
d8b87afe 371 const struct vrf_bit_set *bit = data;
d62a17ae 372
4a8bf858
DS
373 return bit->vrf_id;
374}
d62a17ae 375
74df8d6d 376static bool vrf_hash_bitmap_cmp(const void *a, const void *b)
4a8bf858
DS
377{
378 const struct vrf_bit_set *bit1 = a;
379 const struct vrf_bit_set *bit2 = b;
d62a17ae 380
4a8bf858
DS
381 return bit1->vrf_id == bit2->vrf_id;
382}
383
384static void *vrf_hash_bitmap_alloc(void *data)
385{
386 struct vrf_bit_set *copy = data;
387 struct vrf_bit_set *bit;
388
389 bit = XMALLOC(MTYPE_VRF_BITMAP, sizeof(*bit));
390 bit->vrf_id = copy->vrf_id;
391
392 return bit;
393}
394
395static void vrf_hash_bitmap_free(void *data)
396{
397 struct vrf_bit_set *bit = data;
398
399 XFREE(MTYPE_VRF_BITMAP, bit);
400}
7076bb2f 401
d62a17ae 402vrf_bitmap_t vrf_bitmap_init(void)
7076bb2f 403{
4a8bf858
DS
404 return hash_create_size(32, vrf_hash_bitmap_key, vrf_hash_bitmap_cmp,
405 "VRF BIT HASH");
7076bb2f
FL
406}
407
d62a17ae 408void vrf_bitmap_free(vrf_bitmap_t bmap)
7076bb2f 409{
4a8bf858 410 struct hash *vrf_hash = bmap;
7076bb2f 411
4a8bf858 412 if (vrf_hash == NULL)
d62a17ae 413 return;
7076bb2f 414
4a8bf858
DS
415 hash_clean(vrf_hash, vrf_hash_bitmap_free);
416 hash_free(vrf_hash);
7076bb2f
FL
417}
418
d62a17ae 419void vrf_bitmap_set(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 420{
4a8bf858
DS
421 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
422 struct hash *vrf_hash = bmap;
423 struct vrf_bit_set *bit;
7076bb2f 424
4a8bf858 425 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 426 return;
7076bb2f 427
4a8bf858
DS
428 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
429 bit->set = true;
7076bb2f
FL
430}
431
d62a17ae 432void vrf_bitmap_unset(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 433{
4a8bf858
DS
434 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
435 struct hash *vrf_hash = bmap;
436 struct vrf_bit_set *bit;
7076bb2f 437
4a8bf858 438 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 439 return;
7076bb2f 440
4a8bf858
DS
441 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
442 bit->set = false;
7076bb2f
FL
443}
444
d62a17ae 445int vrf_bitmap_check(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 446{
4a8bf858
DS
447 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
448 struct hash *vrf_hash = bmap;
449 struct vrf_bit_set *bit;
7076bb2f 450
4a8bf858 451 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 452 return 0;
7076bb2f 453
4a8bf858
DS
454 bit = hash_lookup(vrf_hash, &lookup);
455 if (bit)
456 return bit->set;
457
458 return 0;
7076bb2f
FL
459}
460
d62a17ae 461static void vrf_autocomplete(vector comps, struct cmd_token *token)
d617d5fe 462{
d62a17ae 463 struct vrf *vrf = NULL;
d617d5fe 464
723001fc
PG
465 RB_FOREACH (vrf, vrf_name_head, &vrfs_by_name)
466 vector_set(comps, XSTRDUP(MTYPE_COMPLETION, vrf->name));
d617d5fe
DS
467}
468
469static const struct cmd_variable_handler vrf_var_handlers[] = {
d62a17ae 470 {
471 .varname = "vrf",
472 .completions = vrf_autocomplete,
473 },
e429a2a0
IR
474 {
475 .varname = "vrf_name",
476 .completions = vrf_autocomplete,
477 },
478 {
479 .varname = "nexthop_vrf",
480 .completions = vrf_autocomplete,
481 },
d62a17ae 482 {.completions = NULL},
d617d5fe
DS
483};
484
b72ede27 485/* Initialize VRF module. */
d62a17ae 486void vrf_init(int (*create)(struct vrf *), int (*enable)(struct vrf *),
d01b92fd 487 int (*disable)(struct vrf *), int (*destroy)(struct vrf *),
ecbc5a37 488 int ((*update)(struct vrf *)))
d62a17ae 489{
490 struct vrf *default_vrf;
491
e26aedbe
PG
492 /* initialise NS, in case VRF backend if NETNS */
493 ns_init();
d62a17ae 494 if (debug_vrf)
15569c58 495 zlog_debug("%s: Initializing VRF subsystem", __func__);
d62a17ae 496
497 vrf_master.vrf_new_hook = create;
498 vrf_master.vrf_enable_hook = enable;
499 vrf_master.vrf_disable_hook = disable;
d01b92fd 500 vrf_master.vrf_delete_hook = destroy;
ecbc5a37 501 vrf_master.vrf_update_name_hook = update;
d62a17ae 502
503 /* The default VRF always exists. */
eb6934d5 504 default_vrf = vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME);
d62a17ae 505 if (!default_vrf) {
450971aa 506 flog_err(EC_LIB_VRF_START,
1c50c1c0 507 "vrf_init: failed to create the default VRF!");
d62a17ae 508 exit(1);
509 }
20c87e98
TC
510 if (vrf_is_backend_netns()) {
511 struct ns *ns;
512
fdafe17e 513 strlcpy(default_vrf->data.l.netns_name,
eb6934d5 514 VRF_DEFAULT_NAME, NS_NAMSIZ);
20c87e98 515 ns = ns_lookup(ns_get_default_id());
c3568c4d
TC
516 ns->vrf_ctxt = default_vrf;
517 default_vrf->ns_ctxt = ns;
20c87e98 518 }
d62a17ae 519
520 /* Enable the default VRF. */
521 if (!vrf_enable(default_vrf)) {
450971aa 522 flog_err(EC_LIB_VRF_START,
1c50c1c0 523 "vrf_init: failed to enable the default VRF!");
d62a17ae 524 exit(1);
525 }
526
527 cmd_variable_handler_register(vrf_var_handlers);
b72ede27
FL
528}
529
530/* Terminate VRF module. */
d62a17ae 531void vrf_terminate(void)
b72ede27 532{
d62a17ae 533 struct vrf *vrf;
b72ede27 534
d62a17ae 535 if (debug_vrf)
15569c58 536 zlog_debug("%s: Shutting down vrf subsystem", __func__);
19dc275e 537
55cd0f61
DS
538 while (!RB_EMPTY(vrf_id_head, &vrfs_by_id)) {
539 vrf = RB_ROOT(vrf_id_head, &vrfs_by_id);
540
65c3a7c4 541 /* Clear configured flag and invoke delete. */
542 UNSET_FLAG(vrf->status, VRF_CONFIGURED);
d62a17ae 543 vrf_delete(vrf);
65c3a7c4 544 }
55cd0f61
DS
545
546 while (!RB_EMPTY(vrf_name_head, &vrfs_by_name)) {
547 vrf = RB_ROOT(vrf_name_head, &vrfs_by_name);
548
65c3a7c4 549 /* Clear configured flag and invoke delete. */
550 UNSET_FLAG(vrf->status, VRF_CONFIGURED);
d62a17ae 551 vrf_delete(vrf);
65c3a7c4 552 }
b72ede27
FL
553}
554
0f4977c6 555int vrf_socket(int domain, int type, int protocol, vrf_id_t vrf_id,
02fe07c7 556 const char *interfacename)
e5bf3e1e 557{
2e0d2b3d 558 int ret, save_errno, ret2;
e5bf3e1e 559
2e0d2b3d
PG
560 ret = vrf_switch_to_netns(vrf_id);
561 if (ret < 0)
450971aa 562 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 563 __func__, vrf_id, safe_strerror(errno));
b66d022e 564
d62a17ae 565 ret = socket(domain, type, protocol);
2e0d2b3d
PG
566 save_errno = errno;
567 ret2 = vrf_switchback_to_initial();
568 if (ret2 < 0)
450971aa 569 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
570 "%s: Can't switchback from VRF %u (%s)", __func__,
571 vrf_id, safe_strerror(errno));
2e0d2b3d 572 errno = save_errno;
0f4977c6
PG
573 if (ret <= 0)
574 return ret;
575 ret2 = vrf_bind(vrf_id, ret, interfacename);
576 if (ret2 < 0) {
577 close(ret);
578 ret = ret2;
579 }
d62a17ae 580 return ret;
e5bf3e1e
FL
581}
582
78dd30b2
PG
583int vrf_is_backend_netns(void)
584{
585 return (vrf_backend == VRF_BACKEND_NETNS);
586}
587
588int vrf_get_backend(void)
589{
72261ecd
PG
590 if (!vrf_backend_configured)
591 return VRF_BACKEND_UNKNOWN;
78dd30b2
PG
592 return vrf_backend;
593}
594
7239d3d9 595int vrf_configure_backend(enum vrf_backend_type backend)
78dd30b2 596{
f7d45925
QY
597 /* Work around issue in old gcc */
598 switch (backend) {
599 case VRF_BACKEND_UNKNOWN:
600 case VRF_BACKEND_NETNS:
601 case VRF_BACKEND_VRF_LITE:
602 break;
603 default:
7239d3d9 604 return -1;
f7d45925 605 }
7239d3d9
QY
606
607 vrf_backend = backend;
72261ecd 608 vrf_backend_configured = 1;
7239d3d9
QY
609
610 return 0;
78dd30b2
PG
611}
612
03aff2d8
PG
613int vrf_handler_create(struct vty *vty, const char *vrfname,
614 struct vrf **vrf)
f30c50b9 615{
d62a17ae 616 struct vrf *vrfp;
8b4cb7a6
CS
617 char xpath_list[XPATH_MAXLEN];
618 int ret;
f30c50b9 619
d62a17ae 620 if (strlen(vrfname) > VRF_NAMSIZ) {
697d3ec7
PG
621 if (vty)
622 vty_out(vty,
996c9314
LB
623 "%% VRF name %s invalid: length exceeds %d bytes\n",
624 vrfname, VRF_NAMSIZ);
697d3ec7 625 else
0351a28f 626 flog_warn(
450971aa 627 EC_LIB_VRF_LENGTH,
996c9314
LB
628 "%% VRF name %s invalid: length exceeds %d bytes\n",
629 vrfname, VRF_NAMSIZ);
d62a17ae 630 return CMD_WARNING_CONFIG_FAILED;
631 }
f30c50b9 632
8b4cb7a6
CS
633 if (vty) {
634 snprintf(xpath_list, sizeof(xpath_list),
635 "/frr-vrf:lib/vrf[name='%s']", vrfname);
636
637 nb_cli_enqueue_change(vty, xpath_list, NB_OP_CREATE, NULL);
638 ret = nb_cli_apply_changes(vty, xpath_list);
639 if (ret == CMD_SUCCESS) {
640 VTY_PUSH_XPATH(VRF_NODE, xpath_list);
641 vrfp = vrf_lookup_by_name(vrfname);
642 if (vrfp)
643 VTY_PUSH_CONTEXT(VRF_NODE, vrfp);
644 }
645 } else {
646 vrfp = vrf_get(VRF_UNKNOWN, vrfname);
f30c50b9 647
8b4cb7a6
CS
648 if (vrf)
649 *vrf = vrfp;
650 }
d62a17ae 651 return CMD_SUCCESS;
f30c50b9
RW
652}
653
996c9314 654int vrf_netns_handler_create(struct vty *vty, struct vrf *vrf, char *pathname,
9d3555e0
PG
655 ns_id_t ns_id, ns_id_t internal_ns_id,
656 ns_id_t rel_def_ns_id)
e26aedbe
PG
657{
658 struct ns *ns = NULL;
659
660 if (!vrf)
661 return CMD_WARNING_CONFIG_FAILED;
662 if (vrf->vrf_id != VRF_UNKNOWN && vrf->ns_ctxt == NULL) {
663 if (vty)
664 vty_out(vty,
665 "VRF %u is already configured with VRF %s\n",
666 vrf->vrf_id, vrf->name);
667 else
9165c5f5 668 zlog_info("VRF %u is already configured with VRF %s",
e26aedbe
PG
669 vrf->vrf_id, vrf->name);
670 return CMD_WARNING_CONFIG_FAILED;
671 }
672 if (vrf->ns_ctxt != NULL) {
996c9314 673 ns = (struct ns *)vrf->ns_ctxt;
2e1cc436 674 if (!strcmp(ns->name, pathname)) {
e26aedbe
PG
675 if (vty)
676 vty_out(vty,
996c9314
LB
677 "VRF %u already configured with NETNS %s\n",
678 vrf->vrf_id, ns->name);
e26aedbe 679 else
0351a28f 680 zlog_info(
ade6974d
QY
681 "VRF %u already configured with NETNS %s",
682 vrf->vrf_id, ns->name);
e26aedbe
PG
683 return CMD_WARNING_CONFIG_FAILED;
684 }
685 }
686 ns = ns_lookup_name(pathname);
687 if (ns && ns->vrf_ctxt) {
688 struct vrf *vrf2 = (struct vrf *)ns->vrf_ctxt;
689
690 if (vrf2 == vrf)
691 return CMD_SUCCESS;
692 if (vty)
996c9314
LB
693 vty_out(vty,
694 "NS %s is already configured"
e26aedbe 695 " with VRF %u(%s)\n",
996c9314 696 ns->name, vrf2->vrf_id, vrf2->name);
e26aedbe 697 else
0351a28f 698 zlog_info("NS %s is already configured with VRF %u(%s)",
e26aedbe
PG
699 ns->name, vrf2->vrf_id, vrf2->name);
700 return CMD_WARNING_CONFIG_FAILED;
701 }
702 ns = ns_get_created(ns, pathname, ns_id);
03aff2d8 703 ns->internal_ns_id = internal_ns_id;
9d3555e0 704 ns->relative_default_ns = rel_def_ns_id;
e26aedbe
PG
705 ns->vrf_ctxt = (void *)vrf;
706 vrf->ns_ctxt = (void *)ns;
707 /* update VRF netns NAME */
2e1cc436 708 strlcpy(vrf->data.l.netns_name, basename(pathname), NS_NAMSIZ);
e26aedbe
PG
709
710 if (!ns_enable(ns, vrf_update_vrf_id)) {
711 if (vty)
712 vty_out(vty, "Can not associate NS %u with NETNS %s\n",
996c9314 713 ns->ns_id, ns->name);
e26aedbe 714 else
0351a28f 715 zlog_info("Can not associate NS %u with NETNS %s",
e26aedbe
PG
716 ns->ns_id, ns->name);
717 return CMD_WARNING_CONFIG_FAILED;
718 }
719
720 return CMD_SUCCESS;
721}
722
697d3ec7 723/* vrf CLI commands */
16d6ea59
QY
724DEFUN_NOSH(vrf_exit,
725 vrf_exit_cmd,
726 "exit-vrf",
727 "Exit current mode and down to previous mode\n")
728{
729 /* We have to set vrf context to default vrf */
730 VTY_PUSH_CONTEXT(VRF_NODE, vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME));
799a81df 731 cmd_exit(vty);
16d6ea59
QY
732 return CMD_SUCCESS;
733}
734
697d3ec7
PG
735DEFUN_NOSH (vrf,
736 vrf_cmd,
737 "vrf NAME",
738 "Select a VRF to configure\n"
739 "VRF's name\n")
740{
741 int idx_name = 1;
742 const char *vrfname = argv[idx_name]->arg;
743
744 return vrf_handler_create(vty, vrfname, NULL);
745}
746
34c46274
RW
747DEFUN (no_vrf,
748 no_vrf_cmd,
749 "no vrf NAME",
750 NO_STR
751 "Delete a pseudo VRF's configuration\n"
752 "VRF's name\n")
f30c50b9 753{
d62a17ae 754 const char *vrfname = argv[2]->arg;
8b4cb7a6 755 char xpath_list[XPATH_MAXLEN];
53dc2b05 756
d62a17ae 757 struct vrf *vrfp;
f30c50b9 758
d62a17ae 759 vrfp = vrf_lookup_by_name(vrfname);
f30c50b9 760
d62a17ae 761 if (vrfp == NULL) {
762 vty_out(vty, "%% VRF %s does not exist\n", vrfname);
763 return CMD_WARNING_CONFIG_FAILED;
764 }
f30c50b9 765
d62a17ae 766 if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) {
767 vty_out(vty, "%% Only inactive VRFs can be deleted\n");
768 return CMD_WARNING_CONFIG_FAILED;
769 }
f30c50b9 770
8b4cb7a6
CS
771 snprintf(xpath_list, sizeof(xpath_list), "/frr-vrf:lib/vrf[name='%s']",
772 vrfname);
f30c50b9 773
8b4cb7a6
CS
774 nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL);
775 return nb_cli_apply_changes(vty, xpath_list);
f30c50b9
RW
776}
777
53dc2b05 778
62b346ee 779static struct cmd_node vrf_node = {
f4b8291f 780 .name = "vrf",
62b346ee 781 .node = VRF_NODE,
24389580 782 .parent_node = CONFIG_NODE,
62b346ee 783 .prompt = "%s(config-vrf)# ",
62b346ee 784};
7ddcfca4 785
34c46274 786DEFUN_NOSH (vrf_netns,
4a541e8c
PG
787 vrf_netns_cmd,
788 "netns NAME",
789 "Attach VRF to a Namespace\n"
790 "The file name in " NS_RUN_DIR ", or a full pathname\n")
e26aedbe 791{
3bc34908 792 int idx_name = 1, ret;
e26aedbe
PG
793 char *pathname = ns_netns_pathname(vty, argv[idx_name]->arg);
794
795 VTY_DECLVAR_CONTEXT(vrf, vrf);
796
797 if (!pathname)
798 return CMD_WARNING_CONFIG_FAILED;
3bc34908 799
0cf6db21 800 frr_with_privs(vrf_daemon_privs) {
6bb30c2c 801 ret = vrf_netns_handler_create(vty, vrf, pathname,
9d3555e0
PG
802 NS_UNKNOWN,
803 NS_UNKNOWN,
804 NS_UNKNOWN);
6bb30c2c 805 }
3bc34908 806 return ret;
e26aedbe
PG
807}
808
34c46274 809DEFUN_NOSH (no_vrf_netns,
e26aedbe
PG
810 no_vrf_netns_cmd,
811 "no netns [NAME]",
812 NO_STR
813 "Detach VRF from a Namespace\n"
814 "The file name in " NS_RUN_DIR ", or a full pathname\n")
815{
816 struct ns *ns = NULL;
817
818 VTY_DECLVAR_CONTEXT(vrf, vrf);
819
820 if (!vrf_is_backend_netns()) {
821 vty_out(vty, "VRF backend is not Netns. Aborting\n");
822 return CMD_WARNING_CONFIG_FAILED;
823 }
824 if (!vrf->ns_ctxt) {
825 vty_out(vty, "VRF %s(%u) is not configured with NetNS\n",
826 vrf->name, vrf->vrf_id);
827 return CMD_WARNING_CONFIG_FAILED;
828 }
829
830 ns = (struct ns *)vrf->ns_ctxt;
831
832 ns->vrf_ctxt = NULL;
833 vrf_disable(vrf);
834 /* vrf ID from VRF is necessary for Zebra
835 * so that propagate to other clients is done
836 */
837 ns_delete(ns);
838 vrf->ns_ctxt = NULL;
839 return CMD_SUCCESS;
840}
841
19dc275e
DS
842/*
843 * Debug CLI for vrf's
844 */
845DEFUN (vrf_debug,
846 vrf_debug_cmd,
847 "debug vrf",
848 DEBUG_STR
849 "VRF Debugging\n")
850{
d62a17ae 851 debug_vrf = 1;
19dc275e 852
d62a17ae 853 return CMD_SUCCESS;
19dc275e
DS
854}
855
856DEFUN (no_vrf_debug,
857 no_vrf_debug_cmd,
858 "no debug vrf",
859 NO_STR
860 DEBUG_STR
861 "VRF Debugging\n")
862{
d62a17ae 863 debug_vrf = 0;
19dc275e 864
d62a17ae 865 return CMD_SUCCESS;
19dc275e
DS
866}
867
d62a17ae 868static int vrf_write_host(struct vty *vty)
19dc275e 869{
d62a17ae 870 if (debug_vrf)
871 vty_out(vty, "debug vrf\n");
19dc275e 872
d62a17ae 873 return 1;
19dc275e
DS
874}
875
612c2c15 876static int vrf_write_host(struct vty *vty);
62b346ee 877static struct cmd_node vrf_debug_node = {
f4b8291f 878 .name = "vrf debug",
62b346ee
DL
879 .node = VRF_DEBUG_NODE,
880 .prompt = "",
612c2c15 881 .config_write = vrf_write_host,
62b346ee 882};
19dc275e 883
d62a17ae 884void vrf_install_commands(void)
19dc275e 885{
612c2c15 886 install_node(&vrf_debug_node);
19dc275e 887
d62a17ae 888 install_element(CONFIG_NODE, &vrf_debug_cmd);
889 install_element(ENABLE_NODE, &vrf_debug_cmd);
890 install_element(CONFIG_NODE, &no_vrf_debug_cmd);
891 install_element(ENABLE_NODE, &no_vrf_debug_cmd);
19dc275e 892}
53dc2b05 893
3bc34908
PG
894void vrf_cmd_init(int (*writefunc)(struct vty *vty),
895 struct zebra_privs_t *daemon_privs)
7ddcfca4 896{
d62a17ae 897 install_element(CONFIG_NODE, &vrf_cmd);
898 install_element(CONFIG_NODE, &no_vrf_cmd);
612c2c15
DL
899 vrf_node.config_write = writefunc;
900 install_node(&vrf_node);
d62a17ae 901 install_default(VRF_NODE);
16d6ea59 902 install_element(VRF_NODE, &vrf_exit_cmd);
e26aedbe
PG
903 if (vrf_is_backend_netns() && ns_have_netns()) {
904 /* Install NS commands. */
3bc34908 905 vrf_daemon_privs = daemon_privs;
e26aedbe
PG
906 install_element(VRF_NODE, &vrf_netns_cmd);
907 install_element(VRF_NODE, &no_vrf_netns_cmd);
908 }
19dc275e 909}
ec31f30d 910
4fe52e76 911void vrf_set_default_name(const char *default_name, bool force)
ec31f30d 912{
c200f5e1 913 struct vrf *def_vrf;
4fe52e76 914 static bool def_vrf_forced;
ec31f30d 915
c200f5e1
PG
916 def_vrf = vrf_lookup_by_id(VRF_DEFAULT);
917 assert(default_name);
4fe52e76
PG
918 if (def_vrf && !force && def_vrf_forced) {
919 zlog_debug("VRF: %s, avoid changing name to %s, previously forced (%u)",
920 def_vrf->name, default_name,
921 def_vrf->vrf_id);
922 return;
923 }
87272aff
PG
924 if (strmatch(vrf_default_name, default_name))
925 return;
c200f5e1
PG
926 snprintf(vrf_default_name, VRF_NAMSIZ, "%s", default_name);
927 if (def_vrf) {
4fe52e76
PG
928 if (force)
929 def_vrf_forced = true;
c200f5e1
PG
930 RB_REMOVE(vrf_name_head, &vrfs_by_name, def_vrf);
931 strlcpy(def_vrf->data.l.netns_name,
932 vrf_default_name, NS_NAMSIZ);
933 strlcpy(def_vrf->name, vrf_default_name, sizeof(def_vrf->name));
934 RB_INSERT(vrf_name_head, &vrfs_by_name, def_vrf);
ecbc5a37
PG
935 if (vrf_master.vrf_update_name_hook)
936 (*vrf_master.vrf_update_name_hook)(def_vrf);
c200f5e1
PG
937 }
938}
939
940const char *vrf_get_default_name(void)
941{
942 return vrf_default_name;
943}
944
945vrf_id_t vrf_get_default_id(void)
946{
03aff2d8
PG
947 /* backend netns is only known by zebra
948 * for other daemons, we return VRF_DEFAULT_INTERNAL
949 */
ec31f30d
PG
950 if (vrf_is_backend_netns())
951 return ns_get_default_id();
952 else
953 return VRF_DEFAULT_INTERNAL;
954}
2e0d2b3d 955
02fe07c7 956int vrf_bind(vrf_id_t vrf_id, int fd, const char *name)
0f4977c6
PG
957{
958 int ret = 0;
91f854f6 959 struct interface *ifp;
0f4977c6 960
a36898e7 961 if (fd < 0 || name == NULL)
0f4977c6 962 return fd;
91f854f6
PG
963 /* the device should exist
964 * otherwise we should return
965 * case ifname = vrf in netns mode => return
966 */
a36898e7 967 ifp = if_lookup_by_name(name, vrf_id);
91f854f6 968 if (!ifp)
0f4977c6
PG
969 return fd;
970#ifdef SO_BINDTODEVICE
c9c70dd1 971 ret = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, name, strlen(name)+1);
0f4977c6 972 if (ret < 0)
996c9314
LB
973 zlog_debug("bind to interface %s failed, errno=%d", name,
974 errno);
0f4977c6
PG
975#endif /* SO_BINDTODEVICE */
976 return ret;
977}
2e0d2b3d 978int vrf_getaddrinfo(const char *node, const char *service,
996c9314
LB
979 const struct addrinfo *hints, struct addrinfo **res,
980 vrf_id_t vrf_id)
2e0d2b3d
PG
981{
982 int ret, ret2, save_errno;
983
984 ret = vrf_switch_to_netns(vrf_id);
985 if (ret < 0)
450971aa 986 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 987 __func__, vrf_id, safe_strerror(errno));
2e0d2b3d
PG
988 ret = getaddrinfo(node, service, hints, res);
989 save_errno = errno;
990 ret2 = vrf_switchback_to_initial();
991 if (ret2 < 0)
450971aa 992 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
993 "%s: Can't switchback from VRF %u (%s)", __func__,
994 vrf_id, safe_strerror(errno));
2e0d2b3d
PG
995 errno = save_errno;
996 return ret;
997}
998
516d7591
PG
999int vrf_ioctl(vrf_id_t vrf_id, int d, unsigned long request, char *params)
1000{
1001 int ret, saved_errno, rc;
1002
1003 ret = vrf_switch_to_netns(vrf_id);
1004 if (ret < 0) {
450971aa 1005 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 1006 __func__, vrf_id, safe_strerror(errno));
516d7591
PG
1007 return 0;
1008 }
1009 rc = ioctl(d, request, params);
1010 saved_errno = errno;
1011 ret = vrf_switchback_to_initial();
1012 if (ret < 0)
450971aa 1013 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
1014 "%s: Can't switchback from VRF %u (%s)", __func__,
1015 vrf_id, safe_strerror(errno));
516d7591
PG
1016 errno = saved_errno;
1017 return rc;
1018}
1019
0f4977c6 1020int vrf_sockunion_socket(const union sockunion *su, vrf_id_t vrf_id,
02fe07c7 1021 const char *interfacename)
2e0d2b3d
PG
1022{
1023 int ret, save_errno, ret2;
1024
1025 ret = vrf_switch_to_netns(vrf_id);
1026 if (ret < 0)
450971aa 1027 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 1028 __func__, vrf_id, safe_strerror(errno));
2e0d2b3d
PG
1029 ret = sockunion_socket(su);
1030 save_errno = errno;
1031 ret2 = vrf_switchback_to_initial();
1032 if (ret2 < 0)
450971aa 1033 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
1034 "%s: Can't switchback from VRF %u (%s)", __func__,
1035 vrf_id, safe_strerror(errno));
2e0d2b3d 1036 errno = save_errno;
0f4977c6
PG
1037
1038 if (ret <= 0)
1039 return ret;
1040 ret2 = vrf_bind(vrf_id, ret, interfacename);
1041 if (ret2 < 0) {
1042 close(ret);
1043 ret = ret2;
1044 }
2e0d2b3d
PG
1045 return ret;
1046}
0b014ea6
PG
1047
1048vrf_id_t vrf_generate_id(void)
1049{
1050 static int vrf_id_local;
1051
1052 return ++vrf_id_local;
1053}
bc867a5d
CS
1054
1055/* ------- Northbound callbacks ------- */
1056
1057/*
1058 * XPath: /frr-vrf:lib/vrf
1059 */
60ee8be1 1060static int lib_vrf_create(struct nb_cb_create_args *args)
bc867a5d
CS
1061{
1062 const char *vrfname;
1063 struct vrf *vrfp;
1064
60ee8be1 1065 vrfname = yang_dnode_get_string(args->dnode, "./name");
bc867a5d 1066
60ee8be1 1067 if (args->event != NB_EV_APPLY)
bc867a5d
CS
1068 return NB_OK;
1069
1070 vrfp = vrf_get(VRF_UNKNOWN, vrfname);
1071
60ee8be1 1072 nb_running_set_entry(args->dnode, vrfp);
bc867a5d
CS
1073
1074 return NB_OK;
1075}
1076
60ee8be1 1077static int lib_vrf_destroy(struct nb_cb_destroy_args *args)
bc867a5d
CS
1078{
1079 struct vrf *vrfp;
1080
60ee8be1 1081 switch (args->event) {
bc867a5d 1082 case NB_EV_VALIDATE:
60ee8be1 1083 vrfp = nb_running_get_entry(args->dnode, NULL, true);
bc867a5d
CS
1084 if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) {
1085 zlog_debug("%s Only inactive VRFs can be deleted",
1086 __func__);
1087 return NB_ERR_VALIDATION;
1088 }
1089 break;
1090 case NB_EV_PREPARE:
1091 case NB_EV_ABORT:
1092 break;
1093 case NB_EV_APPLY:
60ee8be1 1094 vrfp = nb_running_unset_entry(args->dnode);
8b4cb7a6 1095
bc867a5d
CS
1096 /* Clear configured flag and invoke delete. */
1097 UNSET_FLAG(vrfp->status, VRF_CONFIGURED);
1098 vrf_delete(vrfp);
1099 break;
1100 }
1101
1102 return NB_OK;
1103}
1104
60ee8be1 1105static const void *lib_vrf_get_next(struct nb_cb_get_next_args *args)
bc867a5d 1106{
60ee8be1 1107 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 1108
60ee8be1 1109 if (args->list_entry == NULL) {
bc867a5d
CS
1110 vrfp = RB_MIN(vrf_name_head, &vrfs_by_name);
1111 } else {
1112 vrfp = RB_NEXT(vrf_name_head, vrfp);
1113 }
1114
1115 return vrfp;
1116}
1117
60ee8be1 1118static int lib_vrf_get_keys(struct nb_cb_get_keys_args *args)
bc867a5d 1119{
60ee8be1 1120 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 1121
60ee8be1
RW
1122 args->keys->num = 1;
1123 strlcpy(args->keys->key[0], vrfp->name, sizeof(args->keys->key[0]));
bc867a5d
CS
1124
1125 return NB_OK;
1126}
1127
60ee8be1 1128static const void *lib_vrf_lookup_entry(struct nb_cb_lookup_entry_args *args)
bc867a5d 1129{
60ee8be1 1130 const char *vrfname = args->keys->key[0];
bc867a5d
CS
1131
1132 struct vrf *vrf = vrf_lookup_by_name(vrfname);
1133
1134 return vrf;
1135}
1136
1137/*
1138 * XPath: /frr-vrf:lib/vrf/id
1139 */
60ee8be1
RW
1140static struct yang_data *
1141lib_vrf_state_id_get_elem(struct nb_cb_get_elem_args *args)
bc867a5d 1142{
60ee8be1 1143 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 1144
60ee8be1 1145 return yang_data_new_uint32(args->xpath, vrfp->vrf_id);
bc867a5d
CS
1146}
1147
1148/*
1149 * XPath: /frr-vrf:lib/vrf/active
1150 */
60ee8be1
RW
1151static struct yang_data *
1152lib_vrf_state_active_get_elem(struct nb_cb_get_elem_args *args)
bc867a5d 1153{
60ee8be1 1154 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d
CS
1155
1156 if (vrfp->status == VRF_ACTIVE)
1157 return yang_data_new_bool(
60ee8be1 1158 args->xpath, vrfp->status == VRF_ACTIVE ? true : false);
bc867a5d
CS
1159
1160 return NULL;
1161}
1162
1163/* clang-format off */
1164const struct frr_yang_module_info frr_vrf_info = {
1165 .name = "frr-vrf",
1166 .nodes = {
1167 {
1168 .xpath = "/frr-vrf:lib/vrf",
1169 .cbs = {
1170 .create = lib_vrf_create,
1171 .destroy = lib_vrf_destroy,
1172 .get_next = lib_vrf_get_next,
1173 .get_keys = lib_vrf_get_keys,
1174 .lookup_entry = lib_vrf_lookup_entry,
1175 }
1176 },
1177 {
1178 .xpath = "/frr-vrf:lib/vrf/state/id",
1179 .cbs = {
1180 .get_elem = lib_vrf_state_id_get_elem,
1181 }
1182 },
1183 {
1184 .xpath = "/frr-vrf:lib/vrf/state/active",
1185 .cbs = {
1186 .get_elem = lib_vrf_state_active_get_elem,
1187 }
1188 },
1189 {
1190 .xpath = NULL,
1191 },
1192 }
1193};
1194