]> git.proxmox.com Git - mirror_frr.git/blob - vtysh/vtysh.c
Merge pull request #4396 from donaldsharp/rpki_stuff
[mirror_frr.git] / vtysh / vtysh.c
1 /* Virtual terminal interface shell.
2 * Copyright (C) 2000 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19 */
20
21 #include <zebra.h>
22
23 #include <sys/un.h>
24 #include <setjmp.h>
25 #include <sys/wait.h>
26 #include <sys/resource.h>
27 #include <sys/stat.h>
28
29 #include <readline/readline.h>
30 #include <readline/history.h>
31
32 #include <dirent.h>
33 #include <stdio.h>
34 #include <string.h>
35
36 #include "linklist.h"
37 #include "command.h"
38 #include "memory.h"
39 #include "filter.h"
40 #include "vtysh/vtysh.h"
41 #include "log.h"
42 #include "bgpd/bgp_vty.h"
43 #include "ns.h"
44 #include "vrf.h"
45 #include "libfrr.h"
46 #include "command_graph.h"
47 #include "frrstr.h"
48 #include "json.h"
49
50 DEFINE_MTYPE_STATIC(MVTYSH, VTYSH_CMD, "Vtysh cmd copy")
51
52 /* Struct VTY. */
53 struct vty *vty;
54
55 /* VTY shell pager name. */
56 char *vtysh_pager_name = NULL;
57
58 /* VTY shell client structure */
59 struct vtysh_client {
60 int fd;
61 const char *name;
62 int flag;
63 char path[MAXPATHLEN];
64 struct vtysh_client *next;
65 };
66
67 /* Some utility functions for working on vtysh-specific vty tasks */
68
69 static FILE *vty_open_pager(struct vty *vty)
70 {
71 if (vty->is_paged)
72 return vty->of;
73
74 if (!vtysh_pager_name)
75 return NULL;
76
77 vty->of_saved = vty->of;
78 vty->of = popen(vtysh_pager_name, "w");
79 if (vty->of == NULL) {
80 vty->of = vty->of_saved;
81 perror("popen");
82 exit(1);
83 }
84
85 vty->is_paged = true;
86
87 return vty->of;
88 }
89
90 static int vty_close_pager(struct vty *vty)
91 {
92 if (!vty->is_paged)
93 return 0;
94
95 fflush(vty->of);
96 if (pclose(vty->of) == -1) {
97 perror("pclose");
98 exit(1);
99 }
100
101 vty->of = vty->of_saved;
102 vty->is_paged = false;
103
104 return 0;
105 }
106
107 static void vtysh_pager_envdef(bool fallback)
108 {
109 char *pager_defined;
110
111 pager_defined = getenv("VTYSH_PAGER");
112
113 if (pager_defined)
114 vtysh_pager_name = strdup(pager_defined);
115 else if (fallback)
116 vtysh_pager_name = strdup(VTYSH_PAGER);
117 }
118
119 /* --- */
120
121 struct vtysh_client vtysh_client[] = {
122 {.fd = -1, .name = "zebra", .flag = VTYSH_ZEBRA, .next = NULL},
123 {.fd = -1, .name = "ripd", .flag = VTYSH_RIPD, .next = NULL},
124 {.fd = -1, .name = "ripngd", .flag = VTYSH_RIPNGD, .next = NULL},
125 {.fd = -1, .name = "ospfd", .flag = VTYSH_OSPFD, .next = NULL},
126 {.fd = -1, .name = "ospf6d", .flag = VTYSH_OSPF6D, .next = NULL},
127 {.fd = -1, .name = "ldpd", .flag = VTYSH_LDPD, .next = NULL},
128 {.fd = -1, .name = "bgpd", .flag = VTYSH_BGPD, .next = NULL},
129 {.fd = -1, .name = "isisd", .flag = VTYSH_ISISD, .next = NULL},
130 {.fd = -1, .name = "pimd", .flag = VTYSH_PIMD, .next = NULL},
131 {.fd = -1, .name = "nhrpd", .flag = VTYSH_NHRPD, .next = NULL},
132 {.fd = -1, .name = "eigrpd", .flag = VTYSH_EIGRPD, .next = NULL},
133 {.fd = -1, .name = "babeld", .flag = VTYSH_BABELD, .next = NULL},
134 {.fd = -1, .name = "sharpd", .flag = VTYSH_SHARPD, .next = NULL},
135 {.fd = -1, .name = "fabricd", .flag = VTYSH_FABRICD, .next = NULL},
136 {.fd = -1, .name = "watchfrr", .flag = VTYSH_WATCHFRR, .next = NULL},
137 {.fd = -1, .name = "pbrd", .flag = VTYSH_PBRD, .next = NULL},
138 {.fd = -1, .name = "staticd", .flag = VTYSH_STATICD, .next = NULL},
139 {.fd = -1, .name = "bfdd", .flag = VTYSH_BFDD, .next = NULL},
140 {.fd = -1, .name = "vrrpd", .flag = VTYSH_VRRPD, .next = NULL},
141 };
142
143 enum vtysh_write_integrated vtysh_write_integrated =
144 WRITE_INTEGRATED_UNSPECIFIED;
145
146 static int vtysh_reconnect(struct vtysh_client *vclient);
147
148 static void vclient_close(struct vtysh_client *vclient)
149 {
150 if (vclient->fd >= 0) {
151 vty_out(vty,
152 "Warning: closing connection to %s because of an I/O error!\n",
153 vclient->name);
154 close(vclient->fd);
155 /* indicate as candidate for reconnect */
156 vclient->fd = VTYSH_WAS_ACTIVE;
157 }
158 }
159
160 /*
161 * Send a CLI command to a client and read the response.
162 *
163 * Output will be printed to vty->of. If you want to suppress output, set that
164 * to NULL.
165 *
166 * vclient
167 * the client to send the command to
168 *
169 * line
170 * the command to send
171 *
172 * callback
173 * if non-null, this will be called with each line of output received from
174 * the client passed in the second parameter
175 *
176 * cbarg
177 * optional first argument to pass to callback
178 *
179 * Returns:
180 * a status code
181 */
182 static int vtysh_client_run(struct vtysh_client *vclient, const char *line,
183 void (*callback)(void *, const char *), void *cbarg)
184 {
185 int ret;
186 char stackbuf[4096];
187 char *buf = stackbuf;
188 size_t bufsz = sizeof(stackbuf);
189 char *bufvalid, *end = NULL;
190 char terminator[3] = {0, 0, 0};
191
192 /* vclinet was previously active, try to reconnect */
193 if (vclient->fd == VTYSH_WAS_ACTIVE) {
194 ret = vtysh_reconnect(vclient);
195 if (ret < 0)
196 goto out_err;
197 }
198
199 if (vclient->fd < 0)
200 return CMD_SUCCESS;
201
202 ret = write(vclient->fd, line, strlen(line) + 1);
203 if (ret <= 0) {
204 /* close connection and try to reconnect */
205 vclient_close(vclient);
206 ret = vtysh_reconnect(vclient);
207 if (ret < 0)
208 goto out_err;
209 /* retry line */
210 ret = write(vclient->fd, line, strlen(line) + 1);
211 if (ret <= 0)
212 goto out_err;
213 }
214
215 bufvalid = buf;
216 do {
217 ssize_t nread =
218 read(vclient->fd, bufvalid, buf + bufsz - bufvalid - 1);
219
220 if (nread < 0 && (errno == EINTR || errno == EAGAIN))
221 continue;
222
223 if (nread <= 0) {
224 vty_out(vty, "vtysh: error reading from %s: %s (%d)",
225 vclient->name, safe_strerror(errno), errno);
226 goto out_err;
227 }
228
229 bufvalid += nread;
230
231 /* Null terminate so we may pass this to *printf later. */
232 bufvalid[0] = '\0';
233
234 /*
235 * We expect string output from daemons, so instead of looking
236 * for the full 3 null bytes of the terminator, we check for
237 * just one instead and assume it is the first byte of the
238 * terminator. The presence of the full terminator is checked
239 * later.
240 */
241 if (bufvalid - buf >= 4)
242 end = memmem(bufvalid - 4, 4, "\0", 1);
243
244 /*
245 * calculate # bytes we have, up to & not including the
246 * terminator if present
247 */
248 size_t textlen = (end ? end : bufvalid) - buf;
249 bool b = false;
250
251 /* feed line processing callback if present */
252 while (callback && bufvalid > buf && (end > buf || !end)) {
253 textlen = (end ? end : bufvalid) - buf;
254 char *eol = memchr(buf, '\n', textlen);
255 if (eol)
256 /* line break */
257 *eol++ = '\0';
258 else if (end == buf)
259 /*
260 * no line break, end of input, no text left
261 * before end; nothing to write
262 */
263 b = true;
264 else if (end)
265 /* no nl, end of input, but some text left */
266 eol = end;
267 else if (bufvalid == buf + bufsz - 1) {
268 /*
269 * no nl, no end of input, no buffer space;
270 * realloc
271 */
272 char *new;
273
274 bufsz *= 2;
275 if (buf == stackbuf) {
276 new = XMALLOC(MTYPE_TMP, bufsz);
277 memcpy(new, stackbuf, sizeof(stackbuf));
278 } else
279 new = XREALLOC(MTYPE_TMP, buf, bufsz);
280
281 bufvalid = bufvalid - buf + new;
282 buf = new;
283 /* if end != NULL, we won't be reading more
284 * data... */
285 assert(end == NULL);
286 b = true;
287 } else
288 b = true;
289
290 if (b)
291 break;
292
293 /* eol is at line end now, either \n => \0 or \0\0\0 */
294 assert(eol && eol <= bufvalid);
295
296 if (vty->of)
297 vty_out(vty, "%s\n", buf);
298
299 callback(cbarg, buf);
300
301 /* shift back data and adjust bufvalid */
302 memmove(buf, eol, bufvalid - eol);
303 bufvalid -= eol - buf;
304 if (end)
305 end -= eol - buf;
306 }
307
308 /* else if no callback, dump raw */
309 if (!callback) {
310 if (vty->of)
311 vty_out(vty, "%s", buf);
312 memmove(buf, buf + textlen, bufvalid - buf - textlen);
313 bufvalid -= textlen;
314 if (end)
315 end -= textlen;
316
317 /*
318 * ----------------------------------------------------
319 * At this point `buf` should be in one of two states:
320 * - Empty (i.e. buf == bufvalid)
321 * - Contains up to 4 bytes of the terminator
322 * ----------------------------------------------------
323 */
324 assert(((buf == bufvalid)
325 || (bufvalid - buf <= 4 && buf[0] == 0x00)));
326 }
327
328 /* if we have the terminator, break */
329 if (end && bufvalid - buf == 4) {
330 assert(!memcmp(buf, terminator, 3));
331 ret = buf[3];
332 break;
333 }
334
335 } while (true);
336 goto out;
337
338 out_err:
339 vclient_close(vclient);
340 ret = CMD_SUCCESS;
341 out:
342 if (buf != stackbuf)
343 XFREE(MTYPE_TMP, buf);
344 return ret;
345 }
346
347 static int vtysh_client_run_all(struct vtysh_client *head_client,
348 const char *line, int continue_on_err,
349 void (*callback)(void *, const char *),
350 void *cbarg)
351 {
352 struct vtysh_client *client;
353 int rc, rc_all = CMD_SUCCESS;
354 int correct_instance = 0, wrong_instance = 0;
355
356 for (client = head_client; client; client = client->next) {
357 rc = vtysh_client_run(client, line, callback, cbarg);
358 if (rc == CMD_NOT_MY_INSTANCE) {
359 wrong_instance++;
360 continue;
361 }
362 if (client->fd > 0)
363 correct_instance++;
364 if (rc != CMD_SUCCESS) {
365 if (!continue_on_err)
366 return rc;
367 rc_all = rc;
368 }
369 }
370 if (wrong_instance && !correct_instance) {
371 vty_out(vty,
372 "%% [%s]: command ignored as it targets an instance that is not running\n",
373 head_client->name);
374 rc_all = CMD_WARNING_CONFIG_FAILED;
375 }
376 return rc_all;
377 }
378
379 /*
380 * Execute command against all daemons.
381 *
382 * head_client
383 * where to start walking in the daemon list
384 *
385 * line
386 * the specific command to execute
387 *
388 * Returns:
389 * a status code
390 */
391 static int vtysh_client_execute(struct vtysh_client *head_client,
392 const char *line)
393 {
394 return vtysh_client_run_all(head_client, line, 0, NULL, NULL);
395 }
396
397 /*
398 * Retrieve all running config from daemons and parse it with the vtysh config
399 * parser. Returned output is not displayed to the user.
400 *
401 * head_client
402 * where to start walking in the daemon list
403 *
404 * line
405 * the specific command to execute
406 */
407 static void vtysh_client_config(struct vtysh_client *head_client, char *line)
408 {
409 /* watchfrr currently doesn't load any config, and has some hardcoded
410 * settings that show up in "show run". skip it here (for now at
411 * least) so we don't get that mangled up in config-write.
412 */
413 if (head_client->flag == VTYSH_WATCHFRR)
414 return;
415
416 /* suppress output to user */
417 vty->of_saved = vty->of;
418 vty->of = NULL;
419 vtysh_client_run_all(head_client, line, 1, vtysh_config_parse_line,
420 NULL);
421 vty->of = vty->of_saved;
422 }
423
424 /* Command execution over the vty interface. */
425 static int vtysh_execute_func(const char *line, int pager)
426 {
427 int ret, cmd_stat;
428 unsigned int i;
429 vector vline;
430 const struct cmd_element *cmd;
431 int tried = 0;
432 int saved_ret, saved_node;
433
434 /* Split readline string up into the vector. */
435 vline = cmd_make_strvec(line);
436
437 if (vline == NULL)
438 return CMD_SUCCESS;
439
440 if (user_mode) {
441 if (strncmp("en", vector_slot(vline, 0), 2) == 0) {
442 cmd_free_strvec(vline);
443 vty_out(vty, "%% Command not allowed: enable\n");
444 return CMD_WARNING;
445 }
446 }
447
448 saved_ret = ret = cmd_execute(vty, line, &cmd, 1);
449 saved_node = vty->node;
450
451 /*
452 * If command doesn't succeeded in current node, try to walk up in node
453 * tree. Changing vty->node is enough to try it just out without actual
454 * walkup in the vtysh.
455 */
456 while (ret != CMD_SUCCESS && ret != CMD_SUCCESS_DAEMON
457 && ret != CMD_WARNING && ret != CMD_WARNING_CONFIG_FAILED
458 && vty->node > CONFIG_NODE) {
459 vty->node = node_parent(vty->node);
460 ret = cmd_execute(vty, line, &cmd, 1);
461 tried++;
462 }
463
464 vty->node = saved_node;
465
466 /*
467 * If command succeeded in any other node than current (tried > 0) we
468 * have to move into node in the vtysh where it succeeded.
469 */
470 if (ret == CMD_SUCCESS || ret == CMD_SUCCESS_DAEMON
471 || ret == CMD_WARNING) {
472 if ((saved_node == BGP_VPNV4_NODE
473 || saved_node == BGP_VPNV6_NODE
474 || saved_node == BGP_IPV4_NODE
475 || saved_node == BGP_IPV6_NODE
476 || saved_node == BGP_FLOWSPECV4_NODE
477 || saved_node == BGP_FLOWSPECV6_NODE
478 || saved_node == BGP_IPV4M_NODE
479 || saved_node == BGP_IPV4L_NODE
480 || saved_node == BGP_IPV6L_NODE
481 || saved_node == BGP_IPV6M_NODE
482 || saved_node == BGP_EVPN_NODE
483 || saved_node == LDP_IPV4_NODE
484 || saved_node == LDP_IPV6_NODE)
485 && (tried == 1)) {
486 vtysh_execute("exit-address-family");
487 } else if ((saved_node == BGP_EVPN_VNI_NODE) && (tried == 1)) {
488 vtysh_execute("exit-vni");
489 } else if (saved_node == BGP_VRF_POLICY_NODE && (tried == 1)) {
490 vtysh_execute("exit-vrf-policy");
491 } else if ((saved_node == BGP_VNC_DEFAULTS_NODE
492 || saved_node == BGP_VNC_NVE_GROUP_NODE
493 || saved_node == BGP_VNC_L2_GROUP_NODE)
494 && (tried == 1)) {
495 vtysh_execute("exit-vnc");
496 } else if (saved_node == VRF_NODE && (tried == 1)) {
497 vtysh_execute("exit-vrf");
498 } else if ((saved_node == KEYCHAIN_KEY_NODE
499 || saved_node == LDP_PSEUDOWIRE_NODE
500 || saved_node == LDP_IPV4_IFACE_NODE
501 || saved_node == LDP_IPV6_IFACE_NODE)
502 && (tried == 1)) {
503 vtysh_execute("exit");
504 } else if (tried) {
505 vtysh_execute("end");
506 vtysh_execute("configure");
507 }
508 }
509 /*
510 * If command didn't succeed in any node, continue with return value
511 * from first try.
512 */
513 else if (tried) {
514 ret = saved_ret;
515 }
516
517 cmd_free_strvec(vline);
518
519 cmd_stat = ret;
520 switch (ret) {
521 case CMD_WARNING:
522 case CMD_WARNING_CONFIG_FAILED:
523 if (vty->type == VTY_FILE)
524 vty_out(vty, "Warning...\n");
525 break;
526 case CMD_ERR_AMBIGUOUS:
527 vty_out(vty, "%% Ambiguous command: %s\n", line);
528 break;
529 case CMD_ERR_NO_MATCH:
530 vty_out(vty, "%% Unknown command: %s\n", line);
531 break;
532 case CMD_ERR_INCOMPLETE:
533 vty_out(vty, "%% Command incomplete: %s\n", line);
534 break;
535 case CMD_SUCCESS_DAEMON: {
536 /*
537 * FIXME: Don't open pager for exit commands. popen() causes
538 * problems if exited from vtysh at all. This hack shouldn't
539 * cause any problem but is really ugly.
540 */
541 if (pager && strncmp(line, "exit", 4))
542 vty_open_pager(vty);
543
544 if (!strcmp(cmd->string, "configure")) {
545 for (i = 0; i < array_size(vtysh_client); i++) {
546 cmd_stat = vtysh_client_execute(
547 &vtysh_client[i], line);
548 if (cmd_stat == CMD_WARNING)
549 break;
550 }
551
552 if (cmd_stat) {
553 line = "end";
554 vline = cmd_make_strvec(line);
555
556
557 if (vline == NULL) {
558 if (vty->is_paged)
559 vty_close_pager(vty);
560 return CMD_SUCCESS;
561 }
562
563 ret = cmd_execute_command(vline, vty, &cmd, 1);
564 cmd_free_strvec(vline);
565 if (ret != CMD_SUCCESS_DAEMON)
566 break;
567 } else if (cmd->func) {
568 (*cmd->func)(cmd, vty, 0, NULL);
569 break;
570 }
571 }
572
573 cmd_stat = CMD_SUCCESS;
574 struct vtysh_client *vc;
575 for (i = 0; i < array_size(vtysh_client); i++) {
576 if (cmd->daemon & vtysh_client[i].flag) {
577 if (vtysh_client[i].fd < 0
578 && (cmd->daemon == vtysh_client[i].flag)) {
579 for (vc = &vtysh_client[i]; vc;
580 vc = vc->next)
581 if (vc->fd == VTYSH_WAS_ACTIVE)
582 vtysh_reconnect(vc);
583 }
584 if (vtysh_client[i].fd < 0
585 && (cmd->daemon == vtysh_client[i].flag)) {
586 bool any_inst = false;
587 for (vc = &vtysh_client[i]; vc;
588 vc = vc->next)
589 any_inst = any_inst
590 || (vc->fd > 0);
591 if (!any_inst) {
592 fprintf(stderr,
593 "%s is not running\n",
594 vtysh_client[i].name);
595 continue;
596 }
597 }
598 cmd_stat = vtysh_client_execute(
599 &vtysh_client[i], line);
600 if (cmd_stat != CMD_SUCCESS)
601 break;
602 }
603 }
604 if (cmd_stat != CMD_SUCCESS)
605 break;
606
607 if (cmd->func)
608 (*cmd->func)(cmd, vty, 0, NULL);
609 }
610 }
611 if (vty->is_paged)
612 vty_close_pager(vty);
613
614 return cmd_stat;
615 }
616
617 int vtysh_execute_no_pager(const char *line)
618 {
619 return vtysh_execute_func(line, 0);
620 }
621
622 int vtysh_execute(const char *line)
623 {
624 return vtysh_execute_func(line, 1);
625 }
626
627 static char *trim(char *s)
628 {
629 size_t size;
630 char *end;
631
632 size = strlen(s);
633
634 if (!size)
635 return s;
636
637 end = s + size - 1;
638 while (end >= s && isspace((int)*end))
639 end--;
640 *(end + 1) = '\0';
641
642 while (*s && isspace((int)*s))
643 s++;
644
645 return s;
646 }
647
648 int vtysh_mark_file(const char *filename)
649 {
650 struct vty *vty;
651 FILE *confp = NULL;
652 int ret;
653 vector vline;
654 int tried = 0;
655 const struct cmd_element *cmd;
656 int saved_ret, prev_node;
657 int lineno = 0;
658 char *vty_buf_copy = NULL;
659 char *vty_buf_trimmed = NULL;
660
661 if (strncmp("-", filename, 1) == 0)
662 confp = stdin;
663 else
664 confp = fopen(filename, "r");
665
666 if (confp == NULL) {
667 fprintf(stderr, "%% Can't open config file %s due to '%s'.\n",
668 filename, safe_strerror(errno));
669 return (CMD_ERR_NO_FILE);
670 }
671
672 vty = vty_new();
673 vty->wfd = STDERR_FILENO;
674 vty->type = VTY_TERM;
675 vty->node = CONFIG_NODE;
676
677 vtysh_execute_no_pager("enable");
678 vtysh_execute_no_pager("configure");
679 vty_buf_copy = XCALLOC(MTYPE_VTYSH_CMD, VTY_BUFSIZ);
680
681 while (fgets(vty->buf, VTY_BUFSIZ, confp)) {
682 lineno++;
683 tried = 0;
684 strcpy(vty_buf_copy, vty->buf);
685 vty_buf_trimmed = trim(vty_buf_copy);
686
687 switch (vty->node) {
688 case LDP_IPV4_IFACE_NODE:
689 if (strncmp(vty_buf_copy, " ", 3)) {
690 vty_out(vty, " end\n");
691 vty->node = LDP_IPV4_NODE;
692 }
693 break;
694 case LDP_IPV6_IFACE_NODE:
695 if (strncmp(vty_buf_copy, " ", 3)) {
696 vty_out(vty, " end\n");
697 vty->node = LDP_IPV6_NODE;
698 }
699 break;
700 case LDP_PSEUDOWIRE_NODE:
701 if (strncmp(vty_buf_copy, " ", 2)) {
702 vty_out(vty, " end\n");
703 vty->node = LDP_L2VPN_NODE;
704 }
705 break;
706 default:
707 break;
708 }
709
710 if (vty_buf_trimmed[0] == '!' || vty_buf_trimmed[0] == '#') {
711 vty_out(vty, "%s", vty->buf);
712 continue;
713 }
714
715 /* Split readline string up into the vector. */
716 vline = cmd_make_strvec(vty->buf);
717
718 if (vline == NULL) {
719 vty_out(vty, "%s", vty->buf);
720 continue;
721 }
722
723 /*
724 * Ignore the "end" lines, we will generate these where
725 * appropriate
726 */
727 if (strlen(vty_buf_trimmed) == 3
728 && strncmp("end", vty_buf_trimmed, 3) == 0) {
729 cmd_free_strvec(vline);
730 continue;
731 }
732
733 prev_node = vty->node;
734 saved_ret = ret = cmd_execute_command_strict(vline, vty, &cmd);
735
736 /*
737 * If command doesn't succeeded in current node, try to walk up
738 * in node tree. Changing vty->node is enough to try it just
739 * out without actual walkup in the vtysh.
740 */
741 while (ret != CMD_SUCCESS && ret != CMD_SUCCESS_DAEMON
742 && ret != CMD_WARNING && ret != CMD_WARNING_CONFIG_FAILED
743 && vty->node > CONFIG_NODE) {
744 vty->node = node_parent(vty->node);
745 ret = cmd_execute_command_strict(vline, vty, &cmd);
746 tried++;
747 }
748
749 /*
750 * If command succeeded in any other node than current (tried >
751 * 0) we have to move into node in the vtysh where it
752 * succeeded.
753 */
754 if (ret == CMD_SUCCESS || ret == CMD_SUCCESS_DAEMON
755 || ret == CMD_WARNING) {
756 if ((prev_node == BGP_VPNV4_NODE
757 || prev_node == BGP_VPNV6_NODE
758 || prev_node == BGP_IPV4_NODE
759 || prev_node == BGP_IPV6_NODE
760 || prev_node == BGP_FLOWSPECV4_NODE
761 || prev_node == BGP_FLOWSPECV6_NODE
762 || prev_node == BGP_IPV4L_NODE
763 || prev_node == BGP_IPV6L_NODE
764 || prev_node == BGP_IPV4M_NODE
765 || prev_node == BGP_IPV6M_NODE
766 || prev_node == BGP_EVPN_NODE)
767 && (tried == 1)) {
768 vty_out(vty, "exit-address-family\n");
769 } else if ((prev_node == BGP_EVPN_VNI_NODE)
770 && (tried == 1)) {
771 vty_out(vty, "exit-vni\n");
772 } else if ((prev_node == KEYCHAIN_KEY_NODE)
773 && (tried == 1)) {
774 vty_out(vty, "exit\n");
775 } else if (tried) {
776 vty_out(vty, "end\n");
777 }
778 }
779 /*
780 * If command didn't succeed in any node, continue with return
781 * value from first try.
782 */
783 else if (tried) {
784 ret = saved_ret;
785 vty->node = prev_node;
786 }
787
788 cmd_free_strvec(vline);
789 switch (ret) {
790 case CMD_WARNING:
791 case CMD_WARNING_CONFIG_FAILED:
792 if (vty->type == VTY_FILE)
793 fprintf(stderr, "line %d: Warning...: %s\n",
794 lineno, vty->buf);
795 fclose(confp);
796 vty_close(vty);
797 XFREE(MTYPE_VTYSH_CMD, vty_buf_copy);
798 return ret;
799 case CMD_ERR_AMBIGUOUS:
800 fprintf(stderr, "line %d: %% Ambiguous command: %s\n",
801 lineno, vty->buf);
802 fclose(confp);
803 vty_close(vty);
804 XFREE(MTYPE_VTYSH_CMD, vty_buf_copy);
805 return CMD_ERR_AMBIGUOUS;
806 case CMD_ERR_NO_MATCH:
807 fprintf(stderr, "line %d: %% Unknown command: %s\n",
808 lineno, vty->buf);
809 fclose(confp);
810 vty_close(vty);
811 XFREE(MTYPE_VTYSH_CMD, vty_buf_copy);
812 return CMD_ERR_NO_MATCH;
813 case CMD_ERR_INCOMPLETE:
814 fprintf(stderr, "line %d: %% Command incomplete: %s\n",
815 lineno, vty->buf);
816 fclose(confp);
817 vty_close(vty);
818 XFREE(MTYPE_VTYSH_CMD, vty_buf_copy);
819 return CMD_ERR_INCOMPLETE;
820 case CMD_SUCCESS:
821 vty_out(vty, "%s", vty->buf);
822 break;
823 case CMD_SUCCESS_DAEMON: {
824 int cmd_stat;
825
826 vty_out(vty, "%s", vty->buf);
827 cmd_stat = vtysh_client_execute(&vtysh_client[0],
828 vty->buf);
829 if (cmd_stat != CMD_SUCCESS)
830 break;
831
832 if (cmd->func)
833 (*cmd->func)(cmd, vty, 0, NULL);
834 }
835 }
836 }
837 /* This is the end */
838 vty_out(vty, "\nend\n");
839 vty_close(vty);
840 XFREE(MTYPE_VTYSH_CMD, vty_buf_copy);
841
842 if (confp != stdin)
843 fclose(confp);
844
845 return (0);
846 }
847
848 /* Configration make from file. */
849 int vtysh_config_from_file(struct vty *vty, FILE *fp)
850 {
851 int ret;
852 const struct cmd_element *cmd;
853 int lineno = 0;
854 /* once we have an error, we remember & return that */
855 int retcode = CMD_SUCCESS;
856
857 while (fgets(vty->buf, VTY_BUFSIZ, fp)) {
858 lineno++;
859
860 ret = command_config_read_one_line(vty, &cmd, lineno, 1);
861
862 switch (ret) {
863 case CMD_WARNING:
864 case CMD_WARNING_CONFIG_FAILED:
865 if (vty->type == VTY_FILE)
866 fprintf(stderr, "line %d: Warning[%d]...: %s\n",
867 lineno, vty->node, vty->buf);
868 retcode = ret;
869
870 break;
871 case CMD_ERR_AMBIGUOUS:
872 fprintf(stderr,
873 "line %d: %% Ambiguous command[%d]: %s\n",
874 lineno, vty->node, vty->buf);
875 retcode = CMD_ERR_AMBIGUOUS;
876 break;
877 case CMD_ERR_NO_MATCH:
878 fprintf(stderr, "line %d: %% Unknown command[%d]: %s",
879 lineno, vty->node, vty->buf);
880 retcode = CMD_ERR_NO_MATCH;
881 break;
882 case CMD_ERR_INCOMPLETE:
883 fprintf(stderr,
884 "line %d: %% Command incomplete[%d]: %s\n",
885 lineno, vty->node, vty->buf);
886 retcode = CMD_ERR_INCOMPLETE;
887 break;
888 case CMD_SUCCESS_DAEMON: {
889 unsigned int i;
890 int cmd_stat = CMD_SUCCESS;
891
892 for (i = 0; i < array_size(vtysh_client); i++) {
893 if (cmd->daemon & vtysh_client[i].flag) {
894 cmd_stat = vtysh_client_execute(
895 &vtysh_client[i], vty->buf);
896 /*
897 * CMD_WARNING - Can mean that the
898 * command was parsed successfully but
899 * it was already entered in a few
900 * spots. As such if we receive a
901 * CMD_WARNING from a daemon we
902 * shouldn't stop talking to the other
903 * daemons for the particular command.
904 */
905 if (cmd_stat != CMD_SUCCESS
906 && cmd_stat != CMD_WARNING) {
907 fprintf(stderr,
908 "line %d: Failure to communicate[%d] to %s, line: %s\n",
909 lineno, cmd_stat,
910 vtysh_client[i].name,
911 vty->buf);
912 retcode = cmd_stat;
913 break;
914 }
915 }
916 }
917 if (cmd_stat != CMD_SUCCESS)
918 break;
919
920 if (cmd->func)
921 (*cmd->func)(cmd, vty, 0, NULL);
922 }
923 }
924 }
925
926 return (retcode);
927 }
928
929 /*
930 * Function processes cli commands terminated with '?' character when entered
931 * through either 'vtysh' or 'vtysh -c' interfaces.
932 */
933 static int vtysh_process_questionmark(const char *input, int input_len)
934 {
935 int ret, width = 0;
936 unsigned int i;
937 vector vline, describe;
938 struct cmd_token *token;
939
940 if (!input)
941 return 1;
942
943 vline = cmd_make_strvec(input);
944
945 /* In case of '> ?'. */
946 if (vline == NULL) {
947 vline = vector_init(1);
948 vector_set(vline, NULL);
949 } else if (input_len && isspace((int)input[input_len - 1]))
950 vector_set(vline, NULL);
951
952 describe = cmd_describe_command(vline, vty, &ret);
953
954 /* Ambiguous and no match error. */
955 switch (ret) {
956 case CMD_ERR_AMBIGUOUS:
957 cmd_free_strvec(vline);
958 vector_free(describe);
959 vty_out(vty, "%% Ambiguous command.\n");
960 rl_on_new_line();
961 return 0;
962 break;
963 case CMD_ERR_NO_MATCH:
964 cmd_free_strvec(vline);
965 if (describe)
966 vector_free(describe);
967 vty_out(vty, "%% There is no matched command.\n");
968 rl_on_new_line();
969 return 0;
970 break;
971 }
972
973 /* Get width of command string. */
974 width = 0;
975 for (i = 0; i < vector_active(describe); i++)
976 if ((token = vector_slot(describe, i)) != NULL) {
977 if (token->text[0] == '\0')
978 continue;
979
980 int len = strlen(token->text);
981
982 if (width < len)
983 width = len;
984 }
985
986 for (i = 0; i < vector_active(describe); i++)
987 if ((token = vector_slot(describe, i)) != NULL) {
988 if (!token->desc)
989 vty_out(vty, " %-s\n", token->text);
990 else
991 vty_out(vty, " %-*s %s\n", width, token->text,
992 token->desc);
993
994 if (IS_VARYING_TOKEN(token->type)) {
995 const char *ref = vector_slot(
996 vline, vector_active(vline) - 1);
997
998 vector varcomps = vector_init(VECTOR_MIN_SIZE);
999 cmd_variable_complete(token, ref, varcomps);
1000
1001 if (vector_active(varcomps) > 0) {
1002 int rows, cols;
1003 rl_get_screen_size(&rows, &cols);
1004
1005 char *ac = cmd_variable_comp2str(
1006 varcomps, cols);
1007 vty_out(vty, "%s\n", ac);
1008 XFREE(MTYPE_TMP, ac);
1009 }
1010
1011 vector_free(varcomps);
1012 }
1013 }
1014
1015 cmd_free_strvec(vline);
1016 vector_free(describe);
1017
1018 return 0;
1019 }
1020
1021 /*
1022 * Entry point for user commands terminated with '?' character and typed through
1023 * the usual vtysh's stdin interface. This is the function being registered with
1024 * readline() api's.
1025 */
1026 static int vtysh_rl_describe(int a, int b)
1027 {
1028 int ret;
1029
1030 vty_out(vty, "\n");
1031
1032 ret = vtysh_process_questionmark(rl_line_buffer, rl_end);
1033 rl_on_new_line();
1034
1035 return ret;
1036 }
1037
1038 /*
1039 * Function in charged of processing vtysh instructions terminating with '?'
1040 * character and received through the 'vtysh -c' interface. If user's
1041 * instruction is well-formatted, we will call the same processing routine
1042 * utilized by the traditional vtysh's stdin interface.
1043 */
1044 int vtysh_execute_command_questionmark(char *input)
1045 {
1046 int input_len, qmark_count = 0;
1047 const char *str;
1048
1049 if (!(input && *input))
1050 return 1;
1051
1052 /* Finding out question_mark count and strlen */
1053 for (str = input; *str; ++str) {
1054 if (*str == '?')
1055 qmark_count++;
1056 }
1057 input_len = str - input;
1058
1059 /*
1060 * Verify that user's input terminates in '?' and that patterns such as
1061 * 'cmd ? subcmd ?' are prevented.
1062 */
1063 if (qmark_count != 1 || input[input_len - 1] != '?')
1064 return 1;
1065
1066 /*
1067 * Questionmark-processing function is not expecting to receive '?'
1068 * character in input string.
1069 */
1070 input[input_len - 1] = '\0';
1071
1072 return vtysh_process_questionmark(input, input_len - 1);
1073 }
1074
1075 /* Result of cmd_complete_command() call will be stored here
1076 * and used in new_completion() in order to put the space in
1077 * correct places only. */
1078 int complete_status;
1079
1080 static char *command_generator(const char *text, int state)
1081 {
1082 vector vline;
1083 static char **matched = NULL;
1084 static int index = 0;
1085
1086 /* First call. */
1087 if (!state) {
1088 index = 0;
1089
1090 if (vty->node == AUTH_NODE || vty->node == AUTH_ENABLE_NODE)
1091 return NULL;
1092
1093 vline = cmd_make_strvec(rl_line_buffer);
1094 if (vline == NULL)
1095 return NULL;
1096
1097 if (rl_end && isspace((int)rl_line_buffer[rl_end - 1]))
1098 vector_set(vline, NULL);
1099
1100 matched = cmd_complete_command(vline, vty, &complete_status);
1101 cmd_free_strvec(vline);
1102 }
1103
1104 if (matched && matched[index])
1105 /*
1106 * this is free()'d by readline, but we leak 1 count of
1107 * MTYPE_COMPLETION
1108 */
1109 return matched[index++];
1110
1111 XFREE(MTYPE_TMP, matched);
1112 matched = NULL;
1113
1114 return NULL;
1115 }
1116
1117 static char **new_completion(const char *text, int start, int end)
1118 {
1119 char **matches;
1120
1121 matches = rl_completion_matches(text, command_generator);
1122
1123 if (matches) {
1124 rl_point = rl_end;
1125 if (complete_status != CMD_COMPLETE_FULL_MATCH)
1126 /* only append a space on full match */
1127 rl_completion_append_character = '\0';
1128 }
1129
1130 return matches;
1131 }
1132
1133 /* Vty node structures. */
1134 static struct cmd_node bgp_node = {
1135 BGP_NODE, "%s(config-router)# ",
1136 };
1137
1138 static struct cmd_node rip_node = {
1139 RIP_NODE, "%s(config-router)# ",
1140 };
1141
1142 static struct cmd_node isis_node = {
1143 ISIS_NODE, "%s(config-router)# ",
1144 };
1145
1146 static struct cmd_node openfabric_node = {
1147 OPENFABRIC_NODE, "%s(config-router)# ",
1148 };
1149
1150 static struct cmd_node interface_node = {
1151 INTERFACE_NODE, "%s(config-if)# ",
1152 };
1153
1154 static struct cmd_node pw_node = {
1155 PW_NODE, "%s(config-pw)# ",
1156 };
1157
1158 static struct cmd_node logicalrouter_node = {
1159 LOGICALROUTER_NODE, "%s(config-logical-router)# ",
1160 };
1161
1162 static struct cmd_node vrf_node = {
1163 VRF_NODE, "%s(config-vrf)# ",
1164 };
1165
1166 static struct cmd_node nh_group_node = {
1167 NH_GROUP_NODE,
1168 "%s(config-nh-group)# ",
1169 };
1170
1171 static struct cmd_node rmap_node = {RMAP_NODE, "%s(config-route-map)# "};
1172
1173 static struct cmd_node pbr_map_node = {PBRMAP_NODE, "%s(config-pbr-map)# "};
1174
1175 static struct cmd_node zebra_node = {ZEBRA_NODE, "%s(config-router)# "};
1176
1177 static struct cmd_node bgp_vpnv4_node = {BGP_VPNV4_NODE,
1178 "%s(config-router-af)# "};
1179
1180 static struct cmd_node bgp_vpnv6_node = {BGP_VPNV6_NODE,
1181 "%s(config-router-af)# "};
1182
1183 static struct cmd_node bgp_flowspecv4_node = {BGP_FLOWSPECV4_NODE,
1184 "%s(config-router-af)# "};
1185
1186 static struct cmd_node bgp_flowspecv6_node = {BGP_FLOWSPECV6_NODE,
1187 "%s(config-router-af)# "};
1188
1189 static struct cmd_node bgp_ipv4_node = {BGP_IPV4_NODE,
1190 "%s(config-router-af)# "};
1191
1192 static struct cmd_node bgp_ipv4m_node = {BGP_IPV4M_NODE,
1193 "%s(config-router-af)# "};
1194
1195 static struct cmd_node bgp_ipv4l_node = {BGP_IPV4L_NODE,
1196 "%s(config-router-af)# "};
1197
1198 static struct cmd_node bgp_ipv6_node = {BGP_IPV6_NODE,
1199 "%s(config-router-af)# "};
1200
1201 static struct cmd_node bgp_ipv6m_node = {BGP_IPV6M_NODE,
1202 "%s(config-router-af)# "};
1203
1204 static struct cmd_node bgp_evpn_node = {BGP_EVPN_NODE,
1205 "%s(config-router-af)# "};
1206
1207 static struct cmd_node bgp_evpn_vni_node = {BGP_EVPN_VNI_NODE,
1208 "%s(config-router-af-vni)# "};
1209
1210 static struct cmd_node bgp_ipv6l_node = {BGP_IPV6L_NODE,
1211 "%s(config-router-af)# "};
1212
1213 static struct cmd_node bgp_vnc_defaults_node = {
1214 BGP_VNC_DEFAULTS_NODE, "%s(config-router-vnc-defaults)# "};
1215
1216 static struct cmd_node bgp_vnc_nve_group_node = {
1217 BGP_VNC_NVE_GROUP_NODE, "%s(config-router-vnc-nve-group)# "};
1218
1219 static struct cmd_node bgp_vrf_policy_node = {BGP_VRF_POLICY_NODE,
1220 "%s(config-router-vrf-policy)# "};
1221
1222 static struct cmd_node bgp_vnc_l2_group_node = {
1223 BGP_VNC_L2_GROUP_NODE, "%s(config-router-vnc-l2-group)# "};
1224
1225 static struct cmd_node ospf_node = {OSPF_NODE, "%s(config-router)# "};
1226
1227 static struct cmd_node eigrp_node = {EIGRP_NODE, "%s(config-router)# "};
1228
1229 static struct cmd_node babel_node = {BABEL_NODE, "%s(config-router)# "};
1230
1231 static struct cmd_node ripng_node = {RIPNG_NODE, "%s(config-router)# "};
1232
1233 static struct cmd_node ospf6_node = {OSPF6_NODE, "%s(config-ospf6)# "};
1234
1235 static struct cmd_node ldp_node = {LDP_NODE, "%s(config-ldp)# "};
1236
1237 static struct cmd_node ldp_ipv4_node = {LDP_IPV4_NODE, "%s(config-ldp-af)# "};
1238
1239 static struct cmd_node ldp_ipv6_node = {LDP_IPV6_NODE, "%s(config-ldp-af)# "};
1240
1241 static struct cmd_node ldp_ipv4_iface_node = {LDP_IPV4_IFACE_NODE,
1242 "%s(config-ldp-af-if)# "};
1243
1244 static struct cmd_node ldp_ipv6_iface_node = {LDP_IPV6_IFACE_NODE,
1245 "%s(config-ldp-af-if)# "};
1246
1247 static struct cmd_node ldp_l2vpn_node = {LDP_L2VPN_NODE, "%s(config-l2vpn)# "};
1248
1249 static struct cmd_node ldp_pseudowire_node = {LDP_PSEUDOWIRE_NODE,
1250 "%s(config-l2vpn-pw)# "};
1251
1252 static struct cmd_node keychain_node = {KEYCHAIN_NODE, "%s(config-keychain)# "};
1253
1254 static struct cmd_node keychain_key_node = {KEYCHAIN_KEY_NODE,
1255 "%s(config-keychain-key)# "};
1256
1257 struct cmd_node link_params_node = {
1258 LINK_PARAMS_NODE, "%s(config-link-params)# ",
1259 };
1260
1261 static struct cmd_node rpki_node = {RPKI_NODE, "%s(config-rpki)# ", 1};
1262
1263 #if HAVE_BFDD > 0
1264 static struct cmd_node bfd_node = {
1265 BFD_NODE,
1266 "%s(config-bfd)# ",
1267 };
1268
1269 static struct cmd_node bfd_peer_node = {
1270 BFD_PEER_NODE,
1271 "%s(config-bfd-peer)# ",
1272 };
1273 #endif /* HAVE_BFDD */
1274
1275 /* Defined in lib/vty.c */
1276 extern struct cmd_node vty_node;
1277
1278 /* When '^Z' is received from vty, move down to the enable mode. */
1279 static int vtysh_end(void)
1280 {
1281 switch (vty->node) {
1282 case VIEW_NODE:
1283 case ENABLE_NODE:
1284 /* Nothing to do. */
1285 break;
1286 default:
1287 vty->node = ENABLE_NODE;
1288 break;
1289 }
1290 return CMD_SUCCESS;
1291 }
1292
1293 DEFUNSH(VTYSH_REALLYALL, vtysh_end_all, vtysh_end_all_cmd, "end",
1294 "End current mode and change to enable mode\n")
1295 {
1296 return vtysh_end();
1297 }
1298
1299 DEFUNSH(VTYSH_BGPD, router_bgp, router_bgp_cmd,
1300 "router bgp [(1-4294967295) [<view|vrf> WORD]]",
1301 ROUTER_STR BGP_STR AS_STR
1302 "BGP view\nBGP VRF\n"
1303 "View/VRF name\n")
1304 {
1305 vty->node = BGP_NODE;
1306 return CMD_SUCCESS;
1307 }
1308
1309 #ifdef KEEP_OLD_VPN_COMMANDS
1310 DEFUNSH(VTYSH_BGPD, address_family_vpnv4, address_family_vpnv4_cmd,
1311 "address-family vpnv4 [unicast]",
1312 "Enter Address Family command mode\n"
1313 "Address Family\n"
1314 "Address Family modifier\n")
1315 {
1316 vty->node = BGP_VPNV4_NODE;
1317 return CMD_SUCCESS;
1318 }
1319
1320 DEFUNSH(VTYSH_BGPD, address_family_vpnv6, address_family_vpnv6_cmd,
1321 "address-family vpnv6 [unicast]",
1322 "Enter Address Family command mode\n"
1323 "Address Family\n"
1324 "Address Family modifier\n")
1325 {
1326 vty->node = BGP_VPNV6_NODE;
1327 return CMD_SUCCESS;
1328 }
1329 #endif /* KEEP_OLD_VPN_COMMANDS */
1330
1331 DEFUNSH(VTYSH_BGPD, address_family_ipv4, address_family_ipv4_cmd,
1332 "address-family ipv4 [unicast]",
1333 "Enter Address Family command mode\n"
1334 "Address Family\n"
1335 "Address Family Modifier\n")
1336 {
1337 vty->node = BGP_IPV4_NODE;
1338 return CMD_SUCCESS;
1339 }
1340
1341 DEFUNSH(VTYSH_BGPD, address_family_flowspecv4, address_family_flowspecv4_cmd,
1342 "address-family ipv4 flowspec",
1343 "Enter Address Family command mode\n"
1344 "Address Family\n"
1345 "Address Family Modifier\n")
1346 {
1347 vty->node = BGP_FLOWSPECV4_NODE;
1348 return CMD_SUCCESS;
1349 }
1350
1351 DEFUNSH(VTYSH_BGPD, address_family_flowspecv6, address_family_flowspecv6_cmd,
1352 "address-family ipv6 flowspec",
1353 "Enter Address Family command mode\n"
1354 "Address Family\n"
1355 "Address Family Modifier\n")
1356 {
1357 vty->node = BGP_FLOWSPECV6_NODE;
1358 return CMD_SUCCESS;
1359 }
1360
1361 DEFUNSH(VTYSH_BGPD, address_family_ipv4_multicast,
1362 address_family_ipv4_multicast_cmd, "address-family ipv4 multicast",
1363 "Enter Address Family command mode\n"
1364 "Address Family\n"
1365 "Address Family modifier\n")
1366 {
1367 vty->node = BGP_IPV4M_NODE;
1368 return CMD_SUCCESS;
1369 }
1370
1371 DEFUNSH(VTYSH_BGPD, address_family_ipv4_vpn, address_family_ipv4_vpn_cmd,
1372 "address-family ipv4 vpn",
1373 "Enter Address Family command mode\n"
1374 "Address Family\n"
1375 "Address Family modifier\n")
1376 {
1377 vty->node = BGP_VPNV4_NODE;
1378 return CMD_SUCCESS;
1379 }
1380
1381 DEFUNSH(VTYSH_BGPD, address_family_ipv4_labeled_unicast,
1382 address_family_ipv4_labeled_unicast_cmd,
1383 "address-family ipv4 labeled-unicast",
1384 "Enter Address Family command mode\n"
1385 "Address Family\n"
1386 "Address Family modifier\n")
1387 {
1388 vty->node = BGP_IPV4L_NODE;
1389 return CMD_SUCCESS;
1390 }
1391
1392 DEFUNSH(VTYSH_BGPD, address_family_ipv6, address_family_ipv6_cmd,
1393 "address-family ipv6 [unicast]",
1394 "Enter Address Family command mode\n"
1395 "Address Family\n"
1396 "Address Family modifier\n")
1397 {
1398 vty->node = BGP_IPV6_NODE;
1399 return CMD_SUCCESS;
1400 }
1401
1402 DEFUNSH(VTYSH_BGPD, address_family_ipv6_multicast,
1403 address_family_ipv6_multicast_cmd, "address-family ipv6 multicast",
1404 "Enter Address Family command mode\n"
1405 "Address Family\n"
1406 "Address Family modifier\n")
1407 {
1408 vty->node = BGP_IPV6M_NODE;
1409 return CMD_SUCCESS;
1410 }
1411
1412 DEFUNSH(VTYSH_BGPD, address_family_ipv6_vpn, address_family_ipv6_vpn_cmd,
1413 "address-family ipv6 vpn",
1414 "Enter Address Family command mode\n"
1415 "Address Family\n"
1416 "Address Family modifier\n")
1417 {
1418 vty->node = BGP_VPNV6_NODE;
1419 return CMD_SUCCESS;
1420 }
1421
1422 DEFUNSH(VTYSH_BGPD, address_family_ipv6_labeled_unicast,
1423 address_family_ipv6_labeled_unicast_cmd,
1424 "address-family ipv6 labeled-unicast",
1425 "Enter Address Family command mode\n"
1426 "Address Family\n"
1427 "Address Family modifier\n")
1428 {
1429 vty->node = BGP_IPV6L_NODE;
1430 return CMD_SUCCESS;
1431 }
1432
1433 DEFUNSH(VTYSH_BGPD,
1434 rpki,
1435 rpki_cmd,
1436 "rpki",
1437 "Enable rpki and enter rpki configuration mode\n")
1438 {
1439 vty->node = RPKI_NODE;
1440 return CMD_SUCCESS;
1441 }
1442
1443 DEFUNSH(VTYSH_BGPD, address_family_evpn, address_family_evpn_cmd,
1444 "address-family <l2vpn evpn>",
1445 "Enter Address Family command mode\n"
1446 "Address Family\n"
1447 "Address Family modifier\n")
1448 {
1449 vty->node = BGP_EVPN_NODE;
1450 return CMD_SUCCESS;
1451 }
1452
1453 #if defined(HAVE_CUMULUS)
1454 DEFUNSH_HIDDEN(VTYSH_BGPD, address_family_evpn2, address_family_evpn2_cmd,
1455 "address-family evpn",
1456 "Enter Address Family command mode\n"
1457 "EVPN Address family\n")
1458 {
1459 vty->node = BGP_EVPN_NODE;
1460 return CMD_SUCCESS;
1461 }
1462 #endif
1463
1464 DEFUNSH(VTYSH_BGPD, bgp_evpn_vni, bgp_evpn_vni_cmd, "vni " CMD_VNI_RANGE,
1465 "VXLAN Network Identifier\n"
1466 "VNI number\n")
1467 {
1468 vty->node = BGP_EVPN_VNI_NODE;
1469 return CMD_SUCCESS;
1470 }
1471
1472 #if defined(ENABLE_BGP_VNC)
1473 DEFUNSH(VTYSH_BGPD, vnc_defaults, vnc_defaults_cmd, "vnc defaults",
1474 "VNC/RFP related configuration\n"
1475 "Configure default NVE group\n")
1476 {
1477 vty->node = BGP_VNC_DEFAULTS_NODE;
1478 return CMD_SUCCESS;
1479 }
1480
1481 DEFUNSH(VTYSH_BGPD, vnc_nve_group, vnc_nve_group_cmd, "vnc nve-group NAME",
1482 "VNC/RFP related configuration\n"
1483 "Configure a NVE group\n"
1484 "Group name\n")
1485 {
1486 vty->node = BGP_VNC_NVE_GROUP_NODE;
1487 return CMD_SUCCESS;
1488 }
1489
1490 DEFUNSH(VTYSH_BGPD, vnc_vrf_policy, vnc_vrf_policy_cmd, "vrf-policy NAME",
1491 "Configure a VRF policy group\n"
1492 "Group name\n")
1493 {
1494 vty->node = BGP_VRF_POLICY_NODE;
1495 return CMD_SUCCESS;
1496 }
1497
1498 DEFUNSH(VTYSH_BGPD, vnc_l2_group, vnc_l2_group_cmd, "vnc l2-group NAME",
1499 "VNC/RFP related configuration\n"
1500 "Configure a L2 group\n"
1501 "Group name\n")
1502 {
1503 vty->node = BGP_VNC_L2_GROUP_NODE;
1504 return CMD_SUCCESS;
1505 }
1506 #endif
1507
1508 DEFUNSH(VTYSH_KEYS, key_chain, key_chain_cmd, "key chain WORD",
1509 "Authentication key management\n"
1510 "Key-chain management\n"
1511 "Key-chain name\n")
1512 {
1513 vty->node = KEYCHAIN_NODE;
1514 return CMD_SUCCESS;
1515 }
1516
1517 DEFUNSH(VTYSH_KEYS, key, key_cmd, "key (0-2147483647)",
1518 "Configure a key\n"
1519 "Key identifier number\n")
1520 {
1521 vty->node = KEYCHAIN_KEY_NODE;
1522 return CMD_SUCCESS;
1523 }
1524
1525 DEFUNSH(VTYSH_RIPD, router_rip, router_rip_cmd, "router rip [vrf NAME]",
1526 ROUTER_STR "RIP\n" VRF_CMD_HELP_STR)
1527 {
1528 vty->node = RIP_NODE;
1529 return CMD_SUCCESS;
1530 }
1531
1532 DEFUNSH(VTYSH_RIPNGD, router_ripng, router_ripng_cmd, "router ripng [vrf NAME]",
1533 ROUTER_STR "RIPng\n" VRF_CMD_HELP_STR)
1534 {
1535 vty->node = RIPNG_NODE;
1536 return CMD_SUCCESS;
1537 }
1538
1539 DEFUNSH(VTYSH_OSPFD, router_ospf, router_ospf_cmd,
1540 "router ospf [(1-65535)] [vrf NAME]",
1541 "Enable a routing process\n"
1542 "Start OSPF configuration\n"
1543 "Instance ID\n"
1544 VRF_CMD_HELP_STR)
1545 {
1546 vty->node = OSPF_NODE;
1547 return CMD_SUCCESS;
1548 }
1549
1550 DEFUNSH(VTYSH_EIGRPD, router_eigrp, router_eigrp_cmd, "router eigrp (1-65535)",
1551 "Enable a routing process\n"
1552 "Start EIGRP configuration\n"
1553 "AS number to use\n")
1554 {
1555 vty->node = EIGRP_NODE;
1556 return CMD_SUCCESS;
1557 }
1558
1559 DEFUNSH(VTYSH_BABELD, router_babel, router_babel_cmd, "router babel",
1560 "Enable a routing process\n"
1561 "Make Babel instance command\n")
1562 {
1563 vty->node = BABEL_NODE;
1564 return CMD_SUCCESS;
1565 }
1566
1567 DEFUNSH(VTYSH_OSPF6D, router_ospf6, router_ospf6_cmd, "router ospf6",
1568 ROUTER_STR OSPF6_STR)
1569 {
1570 vty->node = OSPF6_NODE;
1571 return CMD_SUCCESS;
1572 }
1573
1574 #if defined(HAVE_LDPD)
1575 DEFUNSH(VTYSH_LDPD, ldp_mpls_ldp, ldp_mpls_ldp_cmd, "mpls ldp",
1576 "Global MPLS configuration subcommands\n"
1577 "Label Distribution Protocol\n")
1578 {
1579 vty->node = LDP_NODE;
1580 return CMD_SUCCESS;
1581 }
1582
1583 DEFUNSH(VTYSH_LDPD, ldp_address_family_ipv4, ldp_address_family_ipv4_cmd,
1584 "address-family ipv4",
1585 "Configure Address Family and its parameters\n"
1586 "IPv4\n")
1587 {
1588 vty->node = LDP_IPV4_NODE;
1589 return CMD_SUCCESS;
1590 }
1591
1592 DEFUNSH(VTYSH_LDPD, ldp_address_family_ipv6, ldp_address_family_ipv6_cmd,
1593 "address-family ipv6",
1594 "Configure Address Family and its parameters\n"
1595 "IPv6\n")
1596 {
1597 vty->node = LDP_IPV6_NODE;
1598 return CMD_SUCCESS;
1599 }
1600
1601 DEFUNSH(VTYSH_LDPD, ldp_exit_address_family, ldp_exit_address_family_cmd,
1602 "exit-address-family", "Exit from Address Family configuration mode\n")
1603 {
1604 if (vty->node == LDP_IPV4_NODE || vty->node == LDP_IPV6_NODE)
1605 vty->node = LDP_NODE;
1606 return CMD_SUCCESS;
1607 }
1608
1609 DEFUNSH(VTYSH_LDPD, ldp_interface_ifname, ldp_interface_ifname_cmd,
1610 "interface IFNAME",
1611 "Enable LDP on an interface and enter interface submode\n"
1612 "Interface's name\n")
1613 {
1614 switch (vty->node) {
1615 case LDP_IPV4_NODE:
1616 vty->node = LDP_IPV4_IFACE_NODE;
1617 break;
1618 case LDP_IPV6_NODE:
1619 vty->node = LDP_IPV6_IFACE_NODE;
1620 break;
1621 default:
1622 break;
1623 }
1624
1625 return CMD_SUCCESS;
1626 }
1627
1628 DEFUNSH(VTYSH_LDPD, ldp_l2vpn_word_type_vpls, ldp_l2vpn_word_type_vpls_cmd,
1629 "l2vpn WORD type vpls",
1630 "Configure l2vpn commands\n"
1631 "L2VPN name\n"
1632 "L2VPN type\n"
1633 "Virtual Private LAN Service\n")
1634 {
1635 vty->node = LDP_L2VPN_NODE;
1636 return CMD_SUCCESS;
1637 }
1638
1639 DEFUNSH(VTYSH_LDPD, ldp_member_pseudowire_ifname,
1640 ldp_member_pseudowire_ifname_cmd, "member pseudowire IFNAME",
1641 "L2VPN member configuration\n"
1642 "Pseudowire interface\n"
1643 "Interface's name\n")
1644 {
1645 vty->node = LDP_PSEUDOWIRE_NODE;
1646 return CMD_SUCCESS;
1647 }
1648 #endif
1649
1650 DEFUNSH(VTYSH_ISISD, router_isis, router_isis_cmd, "router isis WORD",
1651 ROUTER_STR
1652 "ISO IS-IS\n"
1653 "ISO Routing area tag\n")
1654 {
1655 vty->node = ISIS_NODE;
1656 return CMD_SUCCESS;
1657 }
1658
1659 DEFUNSH(VTYSH_FABRICD, router_openfabric, router_openfabric_cmd, "router openfabric WORD",
1660 ROUTER_STR
1661 "OpenFabric routing protocol\n"
1662 "ISO Routing area tag\n")
1663 {
1664 vty->node = OPENFABRIC_NODE;
1665 return CMD_SUCCESS;
1666 }
1667
1668 DEFUNSH(VTYSH_RMAP, vtysh_route_map, vtysh_route_map_cmd,
1669 "route-map WORD <deny|permit> (1-65535)",
1670 "Create route-map or enter route-map command mode\n"
1671 "Route map tag\n"
1672 "Route map denies set operations\n"
1673 "Route map permits set operations\n"
1674 "Sequence to insert to/delete from existing route-map entry\n")
1675 {
1676 vty->node = RMAP_NODE;
1677 return CMD_SUCCESS;
1678 }
1679
1680 DEFUNSH(VTYSH_PBRD, vtysh_pbr_map, vtysh_pbr_map_cmd,
1681 "pbr-map NAME seq (1-700)",
1682 "Create pbr-map or enter pbr-map command mode\n"
1683 "The name of the PBR MAP\n"
1684 "Sequence to insert to/delete from existing pbr-map entry\n"
1685 "Sequence number\n")
1686 {
1687 vty->node = PBRMAP_NODE;
1688 return CMD_SUCCESS;
1689 }
1690
1691 #if HAVE_BFDD > 0
1692 DEFUNSH(VTYSH_BFDD, bfd_enter, bfd_enter_cmd, "bfd", "Configure BFD peers\n")
1693 {
1694 vty->node = BFD_NODE;
1695 return CMD_SUCCESS;
1696 }
1697
1698 DEFUNSH(VTYSH_BFDD, bfd_peer_enter, bfd_peer_enter_cmd,
1699 "peer <A.B.C.D|X:X::X:X> [{multihop|local-address <A.B.C.D|X:X::X:X>|interface IFNAME|vrf NAME}]",
1700 "Configure peer\n"
1701 "IPv4 peer address\n"
1702 "IPv6 peer address\n"
1703 "Configure multihop\n"
1704 "Configure local address\n"
1705 "IPv4 local address\n"
1706 "IPv6 local address\n"
1707 INTERFACE_STR
1708 "Configure interface name to use\n"
1709 "Configure VRF\n"
1710 "Configure VRF name\n")
1711 {
1712 vty->node = BFD_PEER_NODE;
1713 return CMD_SUCCESS;
1714 }
1715 #endif /* HAVE_BFDD */
1716
1717 DEFSH(VTYSH_PBRD, vtysh_no_pbr_map_cmd, "no pbr-map WORD [seq (1-700)]",
1718 NO_STR
1719 "Delete pbr-map\n"
1720 "The name of the PBR MAP\n"
1721 "Sequence to delete from existing pbr-map entry\n"
1722 "Sequence number\n")
1723
1724 DEFUNSH(VTYSH_ALL, vtysh_line_vty, vtysh_line_vty_cmd, "line vty",
1725 "Configure a terminal line\n"
1726 "Virtual terminal\n")
1727 {
1728 vty->node = VTY_NODE;
1729 return CMD_SUCCESS;
1730 }
1731
1732 DEFUNSH(VTYSH_REALLYALL, vtysh_enable, vtysh_enable_cmd, "enable",
1733 "Turn on privileged mode command\n")
1734 {
1735 vty->node = ENABLE_NODE;
1736 return CMD_SUCCESS;
1737 }
1738
1739 DEFUNSH(VTYSH_REALLYALL, vtysh_disable, vtysh_disable_cmd, "disable",
1740 "Turn off privileged mode command\n")
1741 {
1742 if (vty->node == ENABLE_NODE)
1743 vty->node = VIEW_NODE;
1744 return CMD_SUCCESS;
1745 }
1746
1747 DEFUNSH(VTYSH_REALLYALL, vtysh_config_terminal, vtysh_config_terminal_cmd,
1748 "configure [terminal]",
1749 "Configuration from vty interface\n"
1750 "Configuration terminal\n")
1751 {
1752 vty->node = CONFIG_NODE;
1753 return CMD_SUCCESS;
1754 }
1755
1756 static int vtysh_exit(struct vty *vty)
1757 {
1758 switch (vty->node) {
1759 case VIEW_NODE:
1760 case ENABLE_NODE:
1761 exit(0);
1762 break;
1763 case CONFIG_NODE:
1764 vty->node = ENABLE_NODE;
1765 break;
1766 case INTERFACE_NODE:
1767 case PW_NODE:
1768 case LOGICALROUTER_NODE:
1769 case VRF_NODE:
1770 case NH_GROUP_NODE:
1771 case ZEBRA_NODE:
1772 case BGP_NODE:
1773 case RIP_NODE:
1774 case RIPNG_NODE:
1775 case OSPF_NODE:
1776 case OSPF6_NODE:
1777 case EIGRP_NODE:
1778 case BABEL_NODE:
1779 case LDP_NODE:
1780 case LDP_L2VPN_NODE:
1781 case ISIS_NODE:
1782 case OPENFABRIC_NODE:
1783 case RMAP_NODE:
1784 case PBRMAP_NODE:
1785 case VTY_NODE:
1786 case KEYCHAIN_NODE:
1787 case BFD_NODE:
1788 case RPKI_NODE:
1789 vtysh_execute("end");
1790 vtysh_execute("configure");
1791 vty->node = CONFIG_NODE;
1792 break;
1793 case BGP_VPNV4_NODE:
1794 case BGP_VPNV6_NODE:
1795 case BGP_IPV4_NODE:
1796 case BGP_IPV4M_NODE:
1797 case BGP_IPV4L_NODE:
1798 case BGP_IPV6_NODE:
1799 case BGP_IPV6M_NODE:
1800 case BGP_IPV6L_NODE:
1801 case BGP_FLOWSPECV4_NODE:
1802 case BGP_FLOWSPECV6_NODE:
1803 case BGP_VRF_POLICY_NODE:
1804 case BGP_EVPN_NODE:
1805 case BGP_VNC_DEFAULTS_NODE:
1806 case BGP_VNC_NVE_GROUP_NODE:
1807 case BGP_VNC_L2_GROUP_NODE:
1808 vty->node = BGP_NODE;
1809 break;
1810 case BGP_EVPN_VNI_NODE:
1811 vty->node = BGP_EVPN_NODE;
1812 break;
1813 case LDP_IPV4_NODE:
1814 case LDP_IPV6_NODE:
1815 vty->node = LDP_NODE;
1816 break;
1817 case LDP_IPV4_IFACE_NODE:
1818 vty->node = LDP_IPV4_NODE;
1819 break;
1820 case LDP_IPV6_IFACE_NODE:
1821 vty->node = LDP_IPV6_NODE;
1822 break;
1823 case LDP_PSEUDOWIRE_NODE:
1824 vty->node = LDP_L2VPN_NODE;
1825 break;
1826 case KEYCHAIN_KEY_NODE:
1827 vty->node = KEYCHAIN_NODE;
1828 break;
1829 case LINK_PARAMS_NODE:
1830 vty->node = INTERFACE_NODE;
1831 break;
1832 case BFD_PEER_NODE:
1833 vty->node = BFD_NODE;
1834 break;
1835 default:
1836 break;
1837 }
1838 return CMD_SUCCESS;
1839 }
1840
1841 DEFUNSH(VTYSH_REALLYALL, vtysh_exit_all, vtysh_exit_all_cmd, "exit",
1842 "Exit current mode and down to previous mode\n")
1843 {
1844 return vtysh_exit(vty);
1845 }
1846
1847 DEFUNSH(VTYSH_ALL, vtysh_quit_all, vtysh_quit_all_cmd, "quit",
1848 "Exit current mode and down to previous mode\n")
1849 {
1850 return vtysh_exit_all(self, vty, argc, argv);
1851 }
1852
1853 DEFUNSH(VTYSH_BGPD, exit_address_family, exit_address_family_cmd,
1854 "exit-address-family", "Exit from Address Family configuration mode\n")
1855 {
1856 if (vty->node == BGP_IPV4_NODE || vty->node == BGP_IPV4M_NODE
1857 || vty->node == BGP_IPV4L_NODE || vty->node == BGP_VPNV4_NODE
1858 || vty->node == BGP_VPNV6_NODE || vty->node == BGP_IPV6_NODE
1859 || vty->node == BGP_IPV6L_NODE || vty->node == BGP_IPV6M_NODE
1860 || vty->node == BGP_EVPN_NODE
1861 || vty->node == BGP_FLOWSPECV4_NODE
1862 || vty->node == BGP_FLOWSPECV6_NODE)
1863 vty->node = BGP_NODE;
1864 return CMD_SUCCESS;
1865 }
1866
1867 DEFUNSH(VTYSH_BGPD, exit_vni, exit_vni_cmd, "exit-vni", "Exit from VNI mode\n")
1868 {
1869 if (vty->node == BGP_EVPN_VNI_NODE)
1870 vty->node = BGP_EVPN_NODE;
1871 return CMD_SUCCESS;
1872 }
1873
1874 DEFUNSH(VTYSH_BGPD, exit_vnc_config, exit_vnc_config_cmd, "exit-vnc",
1875 "Exit from VNC configuration mode\n")
1876 {
1877 if (vty->node == BGP_VNC_DEFAULTS_NODE
1878 || vty->node == BGP_VNC_NVE_GROUP_NODE
1879 || vty->node == BGP_VNC_L2_GROUP_NODE)
1880 vty->node = BGP_NODE;
1881 return CMD_SUCCESS;
1882
1883 }
1884
1885 DEFUNSH(VTYSH_BGPD, rpki_exit, rpki_exit_cmd, "exit",
1886 "Exit current mode and down to previous mode\n")
1887 {
1888 vtysh_exit(vty);
1889 return CMD_SUCCESS;
1890 }
1891
1892 DEFUNSH(VTYSH_BGPD, rpki_quit, rpki_quit_cmd, "quit",
1893 "Exit current mode and down to previous mode\n")
1894 {
1895 return rpki_exit(self, vty, argc, argv);
1896 }
1897
1898 DEFUNSH(VTYSH_PIMD|VTYSH_ZEBRA, exit_vrf_config, exit_vrf_config_cmd, "exit-vrf",
1899 "Exit from VRF configuration mode\n")
1900 {
1901 if (vty->node == VRF_NODE)
1902 vty->node = CONFIG_NODE;
1903 return CMD_SUCCESS;
1904 }
1905
1906 DEFUNSH(VTYSH_BGPD, exit_vrf_policy, exit_vrf_policy_cmd, "exit-vrf-policy",
1907 "Exit from VRF policy configuration mode\n")
1908 {
1909 if (vty->node == BGP_VRF_POLICY_NODE)
1910 vty->node = BGP_NODE;
1911 return CMD_SUCCESS;
1912 }
1913
1914 DEFUNSH(VTYSH_RIPD, vtysh_exit_ripd, vtysh_exit_ripd_cmd, "exit",
1915 "Exit current mode and down to previous mode\n")
1916 {
1917 return vtysh_exit(vty);
1918 }
1919
1920 DEFUNSH(VTYSH_RIPD, vtysh_quit_ripd, vtysh_quit_ripd_cmd, "quit",
1921 "Exit current mode and down to previous mode\n")
1922 {
1923 return vtysh_exit_ripd(self, vty, argc, argv);
1924 }
1925
1926 DEFUNSH(VTYSH_RIPNGD, vtysh_exit_ripngd, vtysh_exit_ripngd_cmd, "exit",
1927 "Exit current mode and down to previous mode\n")
1928 {
1929 return vtysh_exit(vty);
1930 }
1931
1932 DEFUNSH(VTYSH_RIPNGD, vtysh_quit_ripngd, vtysh_quit_ripngd_cmd, "quit",
1933 "Exit current mode and down to previous mode\n")
1934 {
1935 return vtysh_exit_ripngd(self, vty, argc, argv);
1936 }
1937
1938 DEFUNSH(VTYSH_RMAP, vtysh_exit_rmap, vtysh_exit_rmap_cmd, "exit",
1939 "Exit current mode and down to previous mode\n")
1940 {
1941 return vtysh_exit(vty);
1942 }
1943
1944 DEFUNSH(VTYSH_RMAP, vtysh_quit_rmap, vtysh_quit_rmap_cmd, "quit",
1945 "Exit current mode and down to previous mode\n")
1946 {
1947 return vtysh_exit_rmap(self, vty, argc, argv);
1948 }
1949
1950 DEFUNSH(VTYSH_PBRD, vtysh_exit_pbr_map, vtysh_exit_pbr_map_cmd, "exit",
1951 "Exit current mode and down to previous mode\n")
1952 {
1953 return vtysh_exit(vty);
1954 }
1955
1956 DEFUNSH(VTYSH_PBRD, vtysh_quit_pbr_map, vtysh_quit_pbr_map_cmd, "quit",
1957 "Exit current mode and down to previous mode\n")
1958 {
1959 return vtysh_exit_rmap(self, vty, argc, argv);
1960 }
1961
1962 DEFUNSH(VTYSH_BGPD, vtysh_exit_bgpd, vtysh_exit_bgpd_cmd, "exit",
1963 "Exit current mode and down to previous mode\n")
1964 {
1965 return vtysh_exit(vty);
1966 }
1967
1968 DEFUNSH(VTYSH_BGPD, vtysh_quit_bgpd, vtysh_quit_bgpd_cmd, "quit",
1969 "Exit current mode and down to previous mode\n")
1970 {
1971 return vtysh_exit_bgpd(self, vty, argc, argv);
1972 }
1973
1974 DEFUNSH(VTYSH_OSPFD, vtysh_exit_ospfd, vtysh_exit_ospfd_cmd, "exit",
1975 "Exit current mode and down to previous mode\n")
1976 {
1977 return vtysh_exit(vty);
1978 }
1979
1980 DEFUNSH(VTYSH_OSPFD, vtysh_quit_ospfd, vtysh_quit_ospfd_cmd, "quit",
1981 "Exit current mode and down to previous mode\n")
1982 {
1983 return vtysh_exit_ospfd(self, vty, argc, argv);
1984 }
1985
1986 DEFUNSH(VTYSH_EIGRPD, vtysh_exit_eigrpd, vtysh_exit_eigrpd_cmd, "exit",
1987 "Exit current mode and down to previous mode\n")
1988 {
1989 return vtysh_exit(vty);
1990 }
1991
1992 DEFUNSH(VTYSH_EIGRPD, vtysh_quit_eigrpd, vtysh_quit_eigrpd_cmd, "quit",
1993 "Exit current mode and down to previous mode\n")
1994 {
1995 return vtysh_exit(vty);
1996 }
1997
1998 DEFUNSH(VTYSH_EIGRPD, vtysh_exit_babeld, vtysh_exit_babeld_cmd, "exit",
1999 "Exit current mode and down to previous mode\n")
2000 {
2001 return vtysh_exit(vty);
2002 }
2003
2004 DEFUNSH(VTYSH_BABELD, vtysh_quit_babeld, vtysh_quit_babeld_cmd, "quit",
2005 "Exit current mode and down to previous mode\n")
2006 {
2007 return vtysh_exit(vty);
2008 }
2009
2010 DEFUNSH(VTYSH_OSPF6D, vtysh_exit_ospf6d, vtysh_exit_ospf6d_cmd, "exit",
2011 "Exit current mode and down to previous mode\n")
2012 {
2013 return vtysh_exit(vty);
2014 }
2015
2016 DEFUNSH(VTYSH_OSPF6D, vtysh_quit_ospf6d, vtysh_quit_ospf6d_cmd, "quit",
2017 "Exit current mode and down to previous mode\n")
2018 {
2019 return vtysh_exit_ospf6d(self, vty, argc, argv);
2020 }
2021
2022 #if defined(HAVE_LDPD)
2023 DEFUNSH(VTYSH_LDPD, vtysh_exit_ldpd, vtysh_exit_ldpd_cmd, "exit",
2024 "Exit current mode and down to previous mode\n")
2025 {
2026 return vtysh_exit(vty);
2027 }
2028
2029 ALIAS(vtysh_exit_ldpd, vtysh_quit_ldpd_cmd, "quit",
2030 "Exit current mode and down to previous mode\n")
2031 #endif
2032
2033 DEFUNSH(VTYSH_ISISD, vtysh_exit_isisd, vtysh_exit_isisd_cmd, "exit",
2034 "Exit current mode and down to previous mode\n")
2035 {
2036 return vtysh_exit(vty);
2037 }
2038
2039 DEFUNSH(VTYSH_ISISD, vtysh_quit_isisd, vtysh_quit_isisd_cmd, "quit",
2040 "Exit current mode and down to previous mode\n")
2041 {
2042 return vtysh_exit_isisd(self, vty, argc, argv);
2043 }
2044
2045 #if HAVE_BFDD > 0
2046 DEFUNSH(VTYSH_BFDD, vtysh_exit_bfdd, vtysh_exit_bfdd_cmd, "exit",
2047 "Exit current mode and down to previous mode\n")
2048 {
2049 return vtysh_exit(vty);
2050 }
2051
2052 ALIAS(vtysh_exit_bfdd, vtysh_quit_bfdd_cmd, "quit",
2053 "Exit current mode and down to previous mode\n")
2054 #endif
2055
2056 DEFUNSH(VTYSH_FABRICD, vtysh_exit_fabricd, vtysh_exit_fabricd_cmd, "exit",
2057 "Exit current mode and down to previous mode\n")
2058 {
2059 return vtysh_exit(vty);
2060 }
2061
2062 DEFUNSH(VTYSH_FABRICD, vtysh_quit_fabricd, vtysh_quit_fabricd_cmd, "quit",
2063 "Exit current mode and down to previous mode\n")
2064 {
2065 return vtysh_exit_fabricd(self, vty, argc, argv);
2066 }
2067
2068 DEFUNSH(VTYSH_ALL, vtysh_exit_line_vty, vtysh_exit_line_vty_cmd, "exit",
2069 "Exit current mode and down to previous mode\n")
2070 {
2071 return vtysh_exit(vty);
2072 }
2073
2074 DEFUNSH(VTYSH_ALL, vtysh_quit_line_vty, vtysh_quit_line_vty_cmd, "quit",
2075 "Exit current mode and down to previous mode\n")
2076 {
2077 return vtysh_exit_line_vty(self, vty, argc, argv);
2078 }
2079
2080 DEFUNSH(VTYSH_INTERFACE, vtysh_interface, vtysh_interface_cmd,
2081 "interface IFNAME [vrf NAME]",
2082 "Select an interface to configure\n"
2083 "Interface's name\n" VRF_CMD_HELP_STR)
2084 {
2085 vty->node = INTERFACE_NODE;
2086 return CMD_SUCCESS;
2087 }
2088
2089 DEFUNSH(VTYSH_ZEBRA, vtysh_pseudowire, vtysh_pseudowire_cmd,
2090 "pseudowire IFNAME",
2091 "Static pseudowire configuration\n"
2092 "Pseudowire name\n")
2093 {
2094 vty->node = PW_NODE;
2095 return CMD_SUCCESS;
2096 }
2097
2098 DEFUNSH(VTYSH_ZEBRA, vtysh_logicalrouter, vtysh_logicalrouter_cmd,
2099 "logical-router (1-65535) ns NAME",
2100 "Enable a logical-router\n"
2101 "Specify the logical-router indentifier\n"
2102 "The Name Space\n"
2103 "The file name in " NS_RUN_DIR ", or a full pathname\n")
2104 {
2105 vty->node = LOGICALROUTER_NODE;
2106 return CMD_SUCCESS;
2107 }
2108
2109 DEFSH(VTYSH_ZEBRA, vtysh_no_logicalrouter_cmd,
2110 "no logical-router (1-65535) ns NAME", NO_STR
2111 "Enable a Logical-Router\n"
2112 "Specify the Logical-Router identifier\n"
2113 "The Name Space\n"
2114 "The file name in " NS_RUN_DIR ", or a full pathname\n")
2115
2116 DEFUNSH(VTYSH_PBRD | VTYSH_SHARPD, vtysh_nexthop_group, vtysh_nexthop_group_cmd,
2117 "nexthop-group NAME",
2118 "Nexthop Group configuration\n"
2119 "Name of the Nexthop Group\n")
2120 {
2121 vty->node = NH_GROUP_NODE;
2122 return CMD_SUCCESS;
2123 }
2124
2125 DEFSH(VTYSH_PBRD | VTYSH_SHARPD, vtysh_no_nexthop_group_cmd,
2126 "no nexthop-group NAME",
2127 NO_STR
2128 "Nexthop Group Configuration\n"
2129 "Name of the Nexthop Group\n")
2130
2131 DEFUNSH(VTYSH_VRF, vtysh_vrf, vtysh_vrf_cmd, "vrf NAME",
2132 "Select a VRF to configure\n"
2133 "VRF's name\n")
2134 {
2135 vty->node = VRF_NODE;
2136 return CMD_SUCCESS;
2137 }
2138
2139 DEFSH(VTYSH_ZEBRA, vtysh_vrf_netns_cmd,
2140 "netns NAME",
2141 "Attach VRF to a Namespace\n"
2142 "The file name in " NS_RUN_DIR ", or a full pathname\n")
2143
2144 DEFSH(VTYSH_ZEBRA, vtysh_no_vrf_netns_cmd,
2145 "no netns [NAME]",
2146 NO_STR
2147 "Detach VRF from a Namespace\n"
2148 "The file name in " NS_RUN_DIR ", or a full pathname\n")
2149
2150 DEFUNSH(VTYSH_NS, vtysh_exit_logicalrouter,
2151 vtysh_exit_logicalrouter_cmd, "exit",
2152 "Exit current mode and down to previous mode\n")
2153 {
2154 return vtysh_exit(vty);
2155 }
2156
2157 DEFUNSH(VTYSH_NS, vtysh_quit_logicalrouter,
2158 vtysh_quit_logicalrouter_cmd, "quit",
2159 "Exit current mode and down to previous mode\n")
2160 {
2161 return vtysh_exit_logicalrouter(self, vty, argc, argv);
2162 }
2163
2164 DEFUNSH(VTYSH_VRF, vtysh_exit_vrf, vtysh_exit_vrf_cmd, "exit",
2165 "Exit current mode and down to previous mode\n")
2166 {
2167 return vtysh_exit(vty);
2168 }
2169
2170 DEFUNSH(VTYSH_VRF, vtysh_quit_vrf, vtysh_quit_vrf_cmd, "quit",
2171 "Exit current mode and down to previous mode\n")
2172 {
2173 return vtysh_exit_vrf(self, vty, argc, argv);
2174 }
2175
2176 DEFUNSH(VTYSH_PBRD | VTYSH_SHARPD, vtysh_exit_nexthop_group, vtysh_exit_nexthop_group_cmd,
2177 "exit", "Exit current mode and down to previous mode\n")
2178 {
2179 return vtysh_exit(vty);
2180 }
2181
2182 DEFUNSH(VTYSH_VRF, vtysh_quit_nexthop_group, vtysh_quit_nexthop_group_cmd,
2183 "quit", "Exit current mode and down to previous mode\n")
2184 {
2185 return vtysh_exit_nexthop_group(self, vty, argc, argv);
2186 }
2187
2188 DEFUNSH(VTYSH_INTERFACE, vtysh_exit_interface, vtysh_exit_interface_cmd, "exit",
2189 "Exit current mode and down to previous mode\n")
2190 {
2191 return vtysh_exit(vty);
2192 }
2193
2194 DEFUNSH(VTYSH_INTERFACE, vtysh_quit_interface, vtysh_quit_interface_cmd, "quit",
2195 "Exit current mode and down to previous mode\n")
2196 {
2197 return vtysh_exit_interface(self, vty, argc, argv);
2198 }
2199
2200 DEFUN (vtysh_show_poll,
2201 vtysh_show_poll_cmd,
2202 "show thread poll",
2203 SHOW_STR
2204 "Thread information\n"
2205 "Thread Poll Information\n")
2206 {
2207 unsigned int i;
2208 int ret = CMD_SUCCESS;
2209 char line[100];
2210
2211 snprintf(line, sizeof(line), "do show thread poll\n");
2212 for (i = 0; i < array_size(vtysh_client); i++)
2213 if (vtysh_client[i].fd >= 0) {
2214 vty_out(vty, "Thread statistics for %s:\n",
2215 vtysh_client[i].name);
2216 ret = vtysh_client_execute(&vtysh_client[i], line);
2217 vty_out(vty, "\n");
2218 }
2219 return ret;
2220 }
2221
2222 DEFUN (vtysh_show_thread,
2223 vtysh_show_thread_cmd,
2224 "show thread cpu [FILTER]",
2225 SHOW_STR
2226 "Thread information\n"
2227 "Thread CPU usage\n"
2228 "Display filter (rwtexb)\n")
2229 {
2230 unsigned int i;
2231 int idx = 0;
2232 int ret = CMD_SUCCESS;
2233 char line[100];
2234
2235 const char *filter =
2236 argv_find(argv, argc, "FILTER", &idx) ? argv[idx]->arg : "";
2237
2238 snprintf(line, sizeof(line), "do show thread cpu %s\n", filter);
2239 for (i = 0; i < array_size(vtysh_client); i++)
2240 if (vtysh_client[i].fd >= 0) {
2241 vty_out(vty, "Thread statistics for %s:\n",
2242 vtysh_client[i].name);
2243 ret = vtysh_client_execute(&vtysh_client[i], line);
2244 vty_out(vty, "\n");
2245 }
2246 return ret;
2247 }
2248
2249 DEFUN (vtysh_show_work_queues,
2250 vtysh_show_work_queues_cmd,
2251 "show work-queues",
2252 SHOW_STR
2253 "Work Queue information\n")
2254 {
2255 unsigned int i;
2256 int ret = CMD_SUCCESS;
2257 char line[] = "do show work-queues\n";
2258
2259 for (i = 0; i < array_size(vtysh_client); i++)
2260 if (vtysh_client[i].fd >= 0) {
2261 vty_out(vty, "Work queue statistics for %s:\n",
2262 vtysh_client[i].name);
2263 ret = vtysh_client_execute(&vtysh_client[i], line);
2264 vty_out(vty, "\n");
2265 }
2266
2267 return ret;
2268 }
2269
2270 DEFUN (vtysh_show_work_queues_daemon,
2271 vtysh_show_work_queues_daemon_cmd,
2272 "show work-queues <zebra|ripd|ripngd|ospfd|ospf6d|bgpd|isisd|pbrd|fabricd|pimd|staticd>",
2273 SHOW_STR
2274 "Work Queue information\n"
2275 "For the zebra daemon\n"
2276 "For the rip daemon\n"
2277 "For the ripng daemon\n"
2278 "For the ospf daemon\n"
2279 "For the ospfv6 daemon\n"
2280 "For the bgp daemon\n"
2281 "For the isis daemon\n"
2282 "For the pbr daemon\n"
2283 "For the fabricd daemon\n"
2284 "For the pim daemon\n"
2285 "For the static daemon\n")
2286 {
2287 int idx_protocol = 2;
2288 unsigned int i;
2289 int ret = CMD_SUCCESS;
2290
2291 for (i = 0; i < array_size(vtysh_client); i++) {
2292 if (strmatch(vtysh_client[i].name, argv[idx_protocol]->text))
2293 break;
2294 }
2295
2296 ret = vtysh_client_execute(&vtysh_client[i], "show work-queues\n");
2297
2298 return ret;
2299 }
2300
2301 DEFUNSH(VTYSH_ZEBRA, vtysh_link_params, vtysh_link_params_cmd, "link-params",
2302 LINK_PARAMS_STR)
2303 {
2304 vty->node = LINK_PARAMS_NODE;
2305 return CMD_SUCCESS;
2306 }
2307
2308 DEFUNSH(VTYSH_ZEBRA, exit_link_params, exit_link_params_cmd, "exit-link-params",
2309 "Exit from Link Params configuration node\n")
2310 {
2311 if (vty->node == LINK_PARAMS_NODE)
2312 vty->node = INTERFACE_NODE;
2313 return CMD_SUCCESS;
2314 }
2315
2316 static int show_per_daemon(const char *line, const char *headline)
2317 {
2318 unsigned int i;
2319 int ret = CMD_SUCCESS;
2320
2321 for (i = 0; i < array_size(vtysh_client); i++)
2322 if (vtysh_client[i].fd >= 0) {
2323 vty_out(vty, headline, vtysh_client[i].name);
2324 ret = vtysh_client_execute(&vtysh_client[i], line);
2325 vty_out(vty, "\n");
2326 }
2327
2328 return ret;
2329 }
2330
2331 DEFUNSH_HIDDEN (0x00,
2332 vtysh_debug_all,
2333 vtysh_debug_all_cmd,
2334 "[no] debug all",
2335 NO_STR
2336 DEBUG_STR
2337 "Toggle all debugs on or off\n")
2338 {
2339 return CMD_SUCCESS;
2340 }
2341
2342 DEFUN (vtysh_show_debugging,
2343 vtysh_show_debugging_cmd,
2344 "show debugging",
2345 SHOW_STR
2346 DEBUG_STR)
2347 {
2348 return show_per_daemon("do show debugging\n", "");
2349 }
2350
2351 DEFUN (vtysh_show_debugging_hashtable,
2352 vtysh_show_debugging_hashtable_cmd,
2353 "show debugging hashtable [statistics]",
2354 SHOW_STR
2355 DEBUG_STR
2356 "Statistics about hash tables\n"
2357 "Statistics about hash tables\n")
2358 {
2359 vty_out(vty, "\n");
2360 vty_out(vty,
2361 "Load factor (LF) - average number of elements across all buckets\n");
2362 vty_out(vty,
2363 "Full load factor (FLF) - average number of elements across full buckets\n\n");
2364 vty_out(vty,
2365 "Standard deviation (SD) is calculated for both the LF and FLF\n");
2366 vty_out(vty,
2367 "and indicates the typical deviation of bucket chain length\n");
2368 vty_out(vty, "from the value in the corresponding load factor.\n\n");
2369
2370 return show_per_daemon("do show debugging hashtable\n",
2371 "Hashtable statistics for %s:\n");
2372 }
2373
2374 DEFUN (vtysh_show_error_code,
2375 vtysh_show_error_code_cmd,
2376 "show error <(1-4294967296)|all> [json]",
2377 SHOW_STR
2378 "Information on errors\n"
2379 "Error code to get info about\n"
2380 "Information on all errors\n"
2381 JSON_STR)
2382 {
2383 char *fcmd = argv_concat(argv, argc, 0);
2384 char cmd[256];
2385 int rv;
2386
2387 snprintf(cmd, sizeof(cmd), "do %s", fcmd);
2388
2389 /* FIXME: Needs to determine which daemon to send to via code ranges */
2390 rv = show_per_daemon(cmd, "");
2391
2392 XFREE(MTYPE_TMP, fcmd);
2393 return rv;
2394 }
2395
2396 /* Memory */
2397 DEFUN (vtysh_show_memory,
2398 vtysh_show_memory_cmd,
2399 "show memory",
2400 SHOW_STR
2401 "Memory statistics\n")
2402 {
2403 return show_per_daemon("do show memory\n", "Memory statistics for %s:\n");
2404 }
2405
2406 DEFUN (vtysh_show_modules,
2407 vtysh_show_modules_cmd,
2408 "show modules",
2409 SHOW_STR
2410 "Loaded modules\n")
2411 {
2412 return show_per_daemon("do show modules\n",
2413 "Module information for %s:\n");
2414 }
2415
2416 /* Logging commands. */
2417 DEFUN (vtysh_show_logging,
2418 vtysh_show_logging_cmd,
2419 "show logging",
2420 SHOW_STR
2421 "Show current logging configuration\n")
2422 {
2423 return show_per_daemon("do show logging\n",
2424 "Logging configuration for %s:\n");
2425 }
2426
2427 DEFUNSH(VTYSH_ALL, vtysh_log_stdout, vtysh_log_stdout_cmd, "log stdout",
2428 "Logging control\n"
2429 "Set stdout logging level\n")
2430 {
2431 return CMD_SUCCESS;
2432 }
2433
2434 DEFUNSH(VTYSH_ALL, vtysh_log_stdout_level, vtysh_log_stdout_level_cmd,
2435 "log stdout <emergencies|alerts|critical|errors|warnings|notifications|informational|debugging>",
2436 "Logging control\n"
2437 "Set stdout logging level\n" LOG_LEVEL_DESC)
2438 {
2439 return CMD_SUCCESS;
2440 }
2441
2442 DEFUNSH(VTYSH_ALL, no_vtysh_log_stdout, no_vtysh_log_stdout_cmd,
2443 "no log stdout [LEVEL]", NO_STR
2444 "Logging control\n"
2445 "Cancel logging to stdout\n"
2446 "Logging level\n")
2447 {
2448 return CMD_SUCCESS;
2449 }
2450
2451 DEFUNSH(VTYSH_ALL, vtysh_log_file, vtysh_log_file_cmd, "log file FILENAME",
2452 "Logging control\n"
2453 "Logging to file\n"
2454 "Logging filename\n")
2455 {
2456 return CMD_SUCCESS;
2457 }
2458
2459 DEFUNSH(VTYSH_ALL, vtysh_log_file_level, vtysh_log_file_level_cmd,
2460 "log file FILENAME <emergencies|alerts|critical|errors|warnings|notifications|informational|debugging>",
2461 "Logging control\n"
2462 "Logging to file\n"
2463 "Logging filename\n" LOG_LEVEL_DESC)
2464 {
2465 return CMD_SUCCESS;
2466 }
2467
2468 DEFUNSH(VTYSH_ALL, no_vtysh_log_file, no_vtysh_log_file_cmd,
2469 "no log file [FILENAME [LEVEL]]", NO_STR
2470 "Logging control\n"
2471 "Cancel logging to file\n"
2472 "Logging file name\n"
2473 "Logging level\n")
2474 {
2475 return CMD_SUCCESS;
2476 }
2477
2478 DEFUNSH(VTYSH_ALL, vtysh_log_monitor, vtysh_log_monitor_cmd,
2479 "log monitor [<emergencies|alerts|critical|errors|warnings|notifications|informational|debugging>]",
2480 "Logging control\n"
2481 "Set terminal line (monitor) logging level\n" LOG_LEVEL_DESC)
2482 {
2483 return CMD_SUCCESS;
2484 }
2485
2486 DEFUNSH(VTYSH_ALL, no_vtysh_log_monitor, no_vtysh_log_monitor_cmd,
2487 "no log monitor [LEVEL]", NO_STR
2488 "Logging control\n"
2489 "Disable terminal line (monitor) logging\n"
2490 "Logging level\n")
2491 {
2492 return CMD_SUCCESS;
2493 }
2494
2495 DEFUNSH(VTYSH_ALL, vtysh_log_syslog, vtysh_log_syslog_cmd,
2496 "log syslog [<emergencies|alerts|critical|errors|warnings|notifications|informational|debugging>]",
2497 "Logging control\n"
2498 "Set syslog logging level\n" LOG_LEVEL_DESC)
2499 {
2500 return CMD_SUCCESS;
2501 }
2502
2503 DEFUNSH(VTYSH_ALL, no_vtysh_log_syslog, no_vtysh_log_syslog_cmd,
2504 "no log syslog [<emergencies|alerts|critical|errors|warnings|notifications|informational|debugging>]",
2505 NO_STR
2506 "Logging control\n"
2507 "Cancel logging to syslog\n"
2508 LOG_LEVEL_DESC)
2509 {
2510 return CMD_SUCCESS;
2511 }
2512
2513 DEFUNSH(VTYSH_ALL, vtysh_log_facility, vtysh_log_facility_cmd,
2514 "log facility <kern|user|mail|daemon|auth|syslog|lpr|news|uucp|cron|local0|local1|local2|local3|local4|local5|local6|local7>",
2515 "Logging control\n"
2516 "Facility parameter for syslog messages\n" LOG_FACILITY_DESC)
2517 {
2518 return CMD_SUCCESS;
2519 }
2520
2521 DEFUNSH(VTYSH_ALL, no_vtysh_log_facility, no_vtysh_log_facility_cmd,
2522 "no log facility [FACILITY]", NO_STR
2523 "Logging control\n"
2524 "Reset syslog facility to default (daemon)\n"
2525 "Syslog facility\n")
2526 {
2527 return CMD_SUCCESS;
2528 }
2529
2530 DEFUNSH(VTYSH_ALL, vtysh_log_record_priority, vtysh_log_record_priority_cmd,
2531 "log record-priority",
2532 "Logging control\n"
2533 "Log the priority of the message within the message\n")
2534 {
2535 return CMD_SUCCESS;
2536 }
2537
2538 DEFUNSH(VTYSH_ALL, no_vtysh_log_record_priority,
2539 no_vtysh_log_record_priority_cmd, "no log record-priority", NO_STR
2540 "Logging control\n"
2541 "Do not log the priority of the message within the message\n")
2542 {
2543 return CMD_SUCCESS;
2544 }
2545
2546 DEFUNSH(VTYSH_ALL, vtysh_log_timestamp_precision,
2547 vtysh_log_timestamp_precision_cmd, "log timestamp precision (0-6)",
2548 "Logging control\n"
2549 "Timestamp configuration\n"
2550 "Set the timestamp precision\n"
2551 "Number of subsecond digits\n")
2552 {
2553 return CMD_SUCCESS;
2554 }
2555
2556 DEFUNSH(VTYSH_ALL, no_vtysh_log_timestamp_precision,
2557 no_vtysh_log_timestamp_precision_cmd, "no log timestamp precision",
2558 NO_STR
2559 "Logging control\n"
2560 "Timestamp configuration\n"
2561 "Reset the timestamp precision to the default value of 0\n")
2562 {
2563 return CMD_SUCCESS;
2564 }
2565
2566 DEFUNSH(VTYSH_ALL, vtysh_service_password_encrypt,
2567 vtysh_service_password_encrypt_cmd, "service password-encryption",
2568 "Set up miscellaneous service\n"
2569 "Enable encrypted passwords\n")
2570 {
2571 return CMD_SUCCESS;
2572 }
2573
2574 DEFUNSH(VTYSH_ALL, no_vtysh_service_password_encrypt,
2575 no_vtysh_service_password_encrypt_cmd, "no service password-encryption",
2576 NO_STR
2577 "Set up miscellaneous service\n"
2578 "Enable encrypted passwords\n")
2579 {
2580 return CMD_SUCCESS;
2581 }
2582
2583 DEFUNSH(VTYSH_ALL, vtysh_config_password, vtysh_password_cmd,
2584 "password [(8-8)] LINE",
2585 "Modify the terminal connection password\n"
2586 "Specifies a HIDDEN password will follow\n"
2587 "The password string\n")
2588 {
2589 return CMD_SUCCESS;
2590 }
2591
2592 DEFUNSH(VTYSH_ALL, no_vtysh_config_password, no_vtysh_password_cmd,
2593 "no password", NO_STR
2594 "Modify the terminal connection password\n")
2595 {
2596 vty_out(vty, NO_PASSWD_CMD_WARNING);
2597
2598 return CMD_SUCCESS;
2599 }
2600
2601 DEFUNSH(VTYSH_ALL, vtysh_config_enable_password, vtysh_enable_password_cmd,
2602 "enable password [(8-8)] LINE",
2603 "Modify enable password parameters\n"
2604 "Assign the privileged level password\n"
2605 "Specifies a HIDDEN password will follow\n"
2606 "The 'enable' password string\n")
2607 {
2608 return CMD_SUCCESS;
2609 }
2610
2611 DEFUNSH(VTYSH_ALL, no_vtysh_config_enable_password,
2612 no_vtysh_enable_password_cmd, "no enable password", NO_STR
2613 "Modify enable password parameters\n"
2614 "Assign the privileged level password\n")
2615 {
2616 vty_out(vty, NO_PASSWD_CMD_WARNING);
2617
2618 return CMD_SUCCESS;
2619 }
2620
2621 DEFUN (vtysh_write_terminal,
2622 vtysh_write_terminal_cmd,
2623 "write terminal [<zebra|ripd|ripngd|ospfd|ospf6d|ldpd|bgpd|isisd|fabricd|pimd|staticd>]",
2624 "Write running configuration to memory, network, or terminal\n"
2625 "Write to terminal\n"
2626 "For the zebra daemon\n"
2627 "For the rip daemon\n"
2628 "For the ripng daemon\n"
2629 "For the ospf daemon\n"
2630 "For the ospfv6 daemon\n"
2631 "For the ldpd daemon\n"
2632 "For the bgp daemon\n"
2633 "For the isis daemon\n"
2634 "For the fabricd daemon\n"
2635 "For the pim daemon\n"
2636 "For the static daemon\n")
2637 {
2638 unsigned int i;
2639 char line[] = "do write terminal\n";
2640
2641 vty_out(vty, "Building configuration...\n");
2642 vty_out(vty, "\nCurrent configuration:\n");
2643 vty_out(vty, "!\n");
2644
2645 for (i = 0; i < array_size(vtysh_client); i++)
2646 if ((argc < 3)
2647 || (strmatch(vtysh_client[i].name, argv[2]->text)))
2648 vtysh_client_config(&vtysh_client[i], line);
2649
2650 /* Integrate vtysh specific configuration. */
2651 vty_open_pager(vty);
2652 vtysh_config_write();
2653 vtysh_config_dump();
2654 vty_close_pager(vty);
2655 vty_out(vty, "end\n");
2656
2657 return CMD_SUCCESS;
2658 }
2659
2660 DEFUN (vtysh_show_running_config,
2661 vtysh_show_running_config_cmd,
2662 "show running-config [<zebra|ripd|ripngd|ospfd|ospf6d|ldpd|bgpd|isisd|fabricd|pimd|staticd>]",
2663 SHOW_STR
2664 "Current operating configuration\n"
2665 "For the zebra daemon\n"
2666 "For the rip daemon\n"
2667 "For the ripng daemon\n"
2668 "For the ospf daemon\n"
2669 "For the ospfv6 daemon\n"
2670 "For the ldp daemon\n"
2671 "For the bgp daemon\n"
2672 "For the isis daemon\n"
2673 "For the fabricd daemon\n"
2674 "For the pim daemon\n"
2675 "For the static daemon\n")
2676 {
2677 return vtysh_write_terminal(self, vty, argc, argv);
2678 }
2679
2680 DEFUN (vtysh_integrated_config,
2681 vtysh_integrated_config_cmd,
2682 "service integrated-vtysh-config",
2683 "Set up miscellaneous service\n"
2684 "Write configuration into integrated file\n")
2685 {
2686 vtysh_write_integrated = WRITE_INTEGRATED_YES;
2687 return CMD_SUCCESS;
2688 }
2689
2690 DEFUN (no_vtysh_integrated_config,
2691 no_vtysh_integrated_config_cmd,
2692 "no service integrated-vtysh-config",
2693 NO_STR
2694 "Set up miscellaneous service\n"
2695 "Write configuration into integrated file\n")
2696 {
2697 vtysh_write_integrated = WRITE_INTEGRATED_NO;
2698 return CMD_SUCCESS;
2699 }
2700
2701 static void backup_config_file(const char *fbackup)
2702 {
2703 char *integrate_sav = NULL;
2704
2705 integrate_sav = malloc(strlen(fbackup) + strlen(CONF_BACKUP_EXT) + 1);
2706 strcpy(integrate_sav, fbackup);
2707 strcat(integrate_sav, CONF_BACKUP_EXT);
2708
2709 /* Move current configuration file to backup config file. */
2710 if (unlink(integrate_sav) != 0) {
2711 vty_out(vty, "Warning: %s unlink failed\n", integrate_sav);
2712 }
2713 if (rename(fbackup, integrate_sav) != 0) {
2714 vty_out(vty, "Error renaming %s to %s\n", fbackup,
2715 integrate_sav);
2716 }
2717 free(integrate_sav);
2718 }
2719
2720 int vtysh_write_config_integrated(void)
2721 {
2722 unsigned int i;
2723 char line[] = "do write terminal\n";
2724 FILE *fp;
2725 int fd;
2726 #ifdef FRR_USER
2727 struct passwd *pwentry;
2728 #endif
2729 #ifdef FRR_GROUP
2730 struct group *grentry;
2731 #endif
2732 uid_t uid = -1;
2733 gid_t gid = -1;
2734 struct stat st;
2735 int err = 0;
2736
2737 vty_out(vty, "Building Configuration...\n");
2738
2739 backup_config_file(frr_config);
2740 fp = fopen(frr_config, "w");
2741 if (fp == NULL) {
2742 vty_out(vty,
2743 "%% Error: failed to open configuration file %s: %s\n",
2744 frr_config, safe_strerror(errno));
2745 return CMD_WARNING_CONFIG_FAILED;
2746 }
2747 fd = fileno(fp);
2748
2749 for (i = 0; i < array_size(vtysh_client); i++)
2750 vtysh_client_config(&vtysh_client[i], line);
2751
2752 vtysh_config_write();
2753 vty->of_saved = vty->of;
2754 vty->of = fp;
2755 vtysh_config_dump();
2756 vty->of = vty->of_saved;
2757
2758 if (fchmod(fd, CONFIGFILE_MASK) != 0) {
2759 printf("%% Warning: can't chmod configuration file %s: %s\n",
2760 frr_config, safe_strerror(errno));
2761 err++;
2762 }
2763
2764 #ifdef FRR_USER
2765 pwentry = getpwnam(FRR_USER);
2766 if (pwentry)
2767 uid = pwentry->pw_uid;
2768 else {
2769 printf("%% Warning: could not look up user \"%s\"\n", FRR_USER);
2770 err++;
2771 }
2772 #endif
2773 #ifdef FRR_GROUP
2774 grentry = getgrnam(FRR_GROUP);
2775 if (grentry)
2776 gid = grentry->gr_gid;
2777 else {
2778 printf("%% Warning: could not look up group \"%s\"\n",
2779 FRR_GROUP);
2780 err++;
2781 }
2782 #endif
2783
2784 if (!fstat(fd, &st)) {
2785 if (st.st_uid == uid)
2786 uid = -1;
2787 if (st.st_gid == gid)
2788 gid = -1;
2789 if ((uid != (uid_t)-1 || gid != (gid_t)-1)
2790 && fchown(fd, uid, gid)) {
2791 printf("%% Warning: can't chown configuration file %s: %s\n",
2792 frr_config, safe_strerror(errno));
2793 err++;
2794 }
2795 } else {
2796 printf("%% Warning: stat() failed on %s: %s\n", frr_config,
2797 safe_strerror(errno));
2798 err++;
2799 }
2800
2801 fclose(fp);
2802
2803 printf("Integrated configuration saved to %s\n", frr_config);
2804 if (err)
2805 return CMD_WARNING;
2806
2807 printf("[OK]\n");
2808 return CMD_SUCCESS;
2809 }
2810
2811 static bool want_config_integrated(void)
2812 {
2813 struct stat s;
2814
2815 switch (vtysh_write_integrated) {
2816 case WRITE_INTEGRATED_UNSPECIFIED:
2817 if (stat(frr_config, &s) && errno == ENOENT)
2818 return false;
2819 return true;
2820 case WRITE_INTEGRATED_NO:
2821 return false;
2822 case WRITE_INTEGRATED_YES:
2823 return true;
2824 }
2825 return true;
2826 }
2827
2828 DEFUN (vtysh_write_memory,
2829 vtysh_write_memory_cmd,
2830 "write [<memory|file>]",
2831 "Write running configuration to memory, network, or terminal\n"
2832 "Write configuration to the file (same as write file)\n"
2833 "Write configuration to the file (same as write memory)\n")
2834 {
2835 int ret = CMD_SUCCESS;
2836 char line[] = "do write memory\n";
2837 unsigned int i;
2838
2839 vty_out(vty, "Note: this version of vtysh never writes vtysh.conf\n");
2840
2841 /* If integrated frr.conf explicitely set. */
2842 if (want_config_integrated()) {
2843 ret = CMD_WARNING_CONFIG_FAILED;
2844
2845 /* first attempt to use watchfrr if it's available */
2846 bool used_watchfrr = false;
2847
2848 for (i = 0; i < array_size(vtysh_client); i++)
2849 if (vtysh_client[i].flag == VTYSH_WATCHFRR)
2850 break;
2851 if (i < array_size(vtysh_client) && vtysh_client[i].fd != -1) {
2852 used_watchfrr = true;
2853 ret = vtysh_client_execute(&vtysh_client[i],
2854 "do write integrated");
2855 }
2856
2857 /*
2858 * If we didn't use watchfrr, fallback to writing the config
2859 * ourselves
2860 */
2861 if (!used_watchfrr) {
2862 printf("\nWarning: attempting direct configuration write without "
2863 "watchfrr.\nFile permissions and ownership may be "
2864 "incorrect, or write may fail.\n\n");
2865 ret = vtysh_write_config_integrated();
2866 }
2867 return ret;
2868 }
2869
2870 vty_out(vty, "Building Configuration...\n");
2871
2872 for (i = 0; i < array_size(vtysh_client); i++)
2873 ret = vtysh_client_execute(&vtysh_client[i], line);
2874
2875 return ret;
2876 }
2877
2878 DEFUN (vtysh_copy_running_config,
2879 vtysh_copy_running_config_cmd,
2880 "copy running-config startup-config",
2881 "Copy from one file to another\n"
2882 "Copy from current system configuration\n"
2883 "Copy to startup configuration\n")
2884 {
2885 return vtysh_write_memory(self, vty, argc, argv);
2886 }
2887
2888 DEFUN (vtysh_terminal_paginate,
2889 vtysh_terminal_paginate_cmd,
2890 "[no] terminal paginate",
2891 NO_STR
2892 "Set terminal line parameters\n"
2893 "Use pager for output scrolling\n")
2894 {
2895 free(vtysh_pager_name);
2896 vtysh_pager_name = NULL;
2897
2898 if (strcmp(argv[0]->text, "no"))
2899 vtysh_pager_envdef(true);
2900 return CMD_SUCCESS;
2901 }
2902
2903 DEFUN (vtysh_terminal_length,
2904 vtysh_terminal_length_cmd,
2905 "[no] terminal length (0-4294967295)",
2906 NO_STR
2907 "Set terminal line parameters\n"
2908 "Set number of lines on a screen\n"
2909 "Number of lines on screen (0 for no pausing, nonzero to use pager)\n")
2910 {
2911 int idx_number = 2;
2912 unsigned long lines;
2913
2914 free(vtysh_pager_name);
2915 vtysh_pager_name = NULL;
2916
2917 if (!strcmp(argv[0]->text, "no") || !strcmp(argv[1]->text, "no")) {
2918 /* "terminal no length" = use VTYSH_PAGER */
2919 vtysh_pager_envdef(true);
2920 return CMD_SUCCESS;
2921 }
2922
2923 lines = strtoul(argv[idx_number]->arg, NULL, 10);
2924 if (lines != 0) {
2925 vty_out(vty,
2926 "%% The \"terminal length\" command is deprecated and its value is ignored.\n"
2927 "%% Please use \"terminal paginate\" instead with OS TTY length handling.\n");
2928 vtysh_pager_envdef(true);
2929 }
2930
2931 return CMD_SUCCESS;
2932 }
2933
2934 ALIAS_DEPRECATED(vtysh_terminal_length,
2935 vtysh_terminal_no_length_cmd,
2936 "terminal no length",
2937 "Set terminal line parameters\n"
2938 NO_STR
2939 "Set number of lines on a screen\n")
2940
2941 DEFUN (vtysh_show_daemons,
2942 vtysh_show_daemons_cmd,
2943 "show daemons",
2944 SHOW_STR
2945 "Show list of running daemons\n")
2946 {
2947 unsigned int i;
2948
2949 for (i = 0; i < array_size(vtysh_client); i++)
2950 if (vtysh_client[i].fd >= 0)
2951 vty_out(vty, " %s", vtysh_client[i].name);
2952 vty_out(vty, "\n");
2953
2954 return CMD_SUCCESS;
2955 }
2956
2957 /* Execute command in child process. */
2958 static void execute_command(const char *command, int argc, const char *arg1,
2959 const char *arg2)
2960 {
2961 pid_t pid;
2962 int status;
2963
2964 /* Call fork(). */
2965 pid = fork();
2966
2967 if (pid < 0) {
2968 /* Failure of fork(). */
2969 fprintf(stderr, "Can't fork: %s\n", safe_strerror(errno));
2970 exit(1);
2971 } else if (pid == 0) {
2972 /* This is child process. */
2973 switch (argc) {
2974 case 0:
2975 execlp(command, command, (const char *)NULL);
2976 break;
2977 case 1:
2978 execlp(command, command, arg1, (const char *)NULL);
2979 break;
2980 case 2:
2981 execlp(command, command, arg1, arg2,
2982 (const char *)NULL);
2983 break;
2984 }
2985
2986 /* When execlp suceed, this part is not executed. */
2987 fprintf(stderr, "Can't execute %s: %s\n", command,
2988 safe_strerror(errno));
2989 exit(1);
2990 } else {
2991 /* This is parent. */
2992 execute_flag = 1;
2993 wait4(pid, &status, 0, NULL);
2994 execute_flag = 0;
2995 }
2996 }
2997
2998 DEFUN (vtysh_ping,
2999 vtysh_ping_cmd,
3000 "ping WORD",
3001 "Send echo messages\n"
3002 "Ping destination address or hostname\n")
3003 {
3004 int idx = 1;
3005
3006 argv_find(argv, argc, "WORD", &idx);
3007 execute_command("ping", 1, argv[idx]->arg, NULL);
3008 return CMD_SUCCESS;
3009 }
3010
3011 ALIAS(vtysh_ping, vtysh_ping_ip_cmd, "ping ip WORD",
3012 "Send echo messages\n"
3013 "IP echo\n"
3014 "Ping destination address or hostname\n")
3015
3016 DEFUN (vtysh_traceroute,
3017 vtysh_traceroute_cmd,
3018 "traceroute WORD",
3019 "Trace route to destination\n"
3020 "Trace route to destination address or hostname\n")
3021 {
3022 int idx = 1;
3023
3024 argv_find(argv, argc, "WORD", &idx);
3025 execute_command("traceroute", 1, argv[idx]->arg, NULL);
3026 return CMD_SUCCESS;
3027 }
3028
3029 ALIAS(vtysh_traceroute, vtysh_traceroute_ip_cmd, "traceroute ip WORD",
3030 "Trace route to destination\n"
3031 "IP trace\n"
3032 "Trace route to destination address or hostname\n")
3033
3034 DEFUN (vtysh_mtrace,
3035 vtysh_mtrace_cmd,
3036 "mtrace WORD [WORD]",
3037 "Multicast trace route to multicast source\n"
3038 "Multicast trace route to multicast source address\n"
3039 "Multicast trace route for multicast group address\n")
3040 {
3041 if (argc == 2)
3042 execute_command("mtracebis", 1, argv[1]->arg, NULL);
3043 else
3044 execute_command("mtracebis", 2, argv[1]->arg, argv[2]->arg);
3045 return CMD_SUCCESS;
3046 }
3047
3048 DEFUN (vtysh_ping6,
3049 vtysh_ping6_cmd,
3050 "ping ipv6 WORD",
3051 "Send echo messages\n"
3052 "IPv6 echo\n"
3053 "Ping destination address or hostname\n")
3054 {
3055 execute_command("ping6", 1, argv[2]->arg, NULL);
3056 return CMD_SUCCESS;
3057 }
3058
3059 DEFUN (vtysh_traceroute6,
3060 vtysh_traceroute6_cmd,
3061 "traceroute ipv6 WORD",
3062 "Trace route to destination\n"
3063 "IPv6 trace\n"
3064 "Trace route to destination address or hostname\n")
3065 {
3066 execute_command("traceroute6", 1, argv[2]->arg, NULL);
3067 return CMD_SUCCESS;
3068 }
3069
3070 #if defined(HAVE_SHELL_ACCESS)
3071 DEFUN (vtysh_telnet,
3072 vtysh_telnet_cmd,
3073 "telnet WORD",
3074 "Open a telnet connection\n"
3075 "IP address or hostname of a remote system\n")
3076 {
3077 execute_command("telnet", 1, argv[1]->arg, NULL);
3078 return CMD_SUCCESS;
3079 }
3080
3081 DEFUN (vtysh_telnet_port,
3082 vtysh_telnet_port_cmd,
3083 "telnet WORD PORT",
3084 "Open a telnet connection\n"
3085 "IP address or hostname of a remote system\n"
3086 "TCP Port number\n")
3087 {
3088 execute_command("telnet", 2, argv[1]->arg, argv[2]->arg);
3089 return CMD_SUCCESS;
3090 }
3091
3092 DEFUN (vtysh_ssh,
3093 vtysh_ssh_cmd,
3094 "ssh WORD",
3095 "Open an ssh connection\n"
3096 "[user@]host\n")
3097 {
3098 execute_command("ssh", 1, argv[1]->arg, NULL);
3099 return CMD_SUCCESS;
3100 }
3101
3102 DEFUN (vtysh_start_shell,
3103 vtysh_start_shell_cmd,
3104 "start-shell",
3105 "Start UNIX shell\n")
3106 {
3107 execute_command("sh", 0, NULL, NULL);
3108 return CMD_SUCCESS;
3109 }
3110
3111 DEFUN (vtysh_start_bash,
3112 vtysh_start_bash_cmd,
3113 "start-shell bash",
3114 "Start UNIX shell\n"
3115 "Start bash\n")
3116 {
3117 execute_command("bash", 0, NULL, NULL);
3118 return CMD_SUCCESS;
3119 }
3120
3121 DEFUN (vtysh_start_zsh,
3122 vtysh_start_zsh_cmd,
3123 "start-shell zsh",
3124 "Start UNIX shell\n"
3125 "Start Z shell\n")
3126 {
3127 execute_command("zsh", 0, NULL, NULL);
3128 return CMD_SUCCESS;
3129 }
3130 #endif
3131
3132 DEFUN (config_list,
3133 config_list_cmd,
3134 "list [permutations]",
3135 "Print command list\n"
3136 "Print all possible command permutations\n")
3137 {
3138 return cmd_list_cmds(vty, argc == 2);
3139 }
3140
3141 DEFUN (vtysh_output_file,
3142 vtysh_output_file_cmd,
3143 "output file FILE",
3144 "Direct vtysh output to file\n"
3145 "Direct vtysh output to file\n"
3146 "Path to dump output to\n")
3147 {
3148 const char *path = argv[argc - 1]->arg;
3149 vty->of = fopen(path, "a");
3150 if (!vty->of) {
3151 vty_out(vty, "Failed to open file '%s': %s\n", path,
3152 safe_strerror(errno));
3153 vty->of = stdout;
3154 }
3155 return CMD_SUCCESS;
3156 }
3157
3158 DEFUN (no_vtysh_output_file,
3159 no_vtysh_output_file_cmd,
3160 "no output file [FILE]",
3161 NO_STR
3162 "Direct vtysh output to file\n"
3163 "Direct vtysh output to file\n"
3164 "Path to dump output to\n")
3165 {
3166 if (vty->of != stdout) {
3167 fclose(vty->of);
3168 vty->of = stdout;
3169 }
3170 return CMD_SUCCESS;
3171 }
3172
3173 DEFUN(find,
3174 find_cmd,
3175 "find COMMAND...",
3176 "Find CLI command containing text\n"
3177 "Text to search for\n")
3178 {
3179 char *text = argv_concat(argv, argc, 1);
3180 const struct cmd_node *node;
3181 const struct cmd_element *cli;
3182 vector clis;
3183
3184 for (unsigned int i = 0; i < vector_active(cmdvec); i++) {
3185 node = vector_slot(cmdvec, i);
3186 if (!node)
3187 continue;
3188 clis = node->cmd_vector;
3189 for (unsigned int j = 0; j < vector_active(clis); j++) {
3190 cli = vector_slot(clis, j);
3191 if (strcasestr(cli->string, text))
3192 vty_out(vty, " (%s) %s\n",
3193 node_names[node->node], cli->string);
3194 }
3195 }
3196
3197 XFREE(MTYPE_TMP, text);
3198
3199 return CMD_SUCCESS;
3200 }
3201
3202 DEFUN_HIDDEN(show_cli_graph_vtysh,
3203 show_cli_graph_vtysh_cmd,
3204 "show cli graph",
3205 SHOW_STR
3206 "CLI reflection\n"
3207 "Dump current command space as DOT graph\n")
3208 {
3209 struct cmd_node *cn = vector_slot(cmdvec, vty->node);
3210 char *dot = cmd_graph_dump_dot(cn->cmdgraph);
3211
3212 vty_out(vty, "%s\n", dot);
3213 XFREE(MTYPE_TMP, dot);
3214 return CMD_SUCCESS;
3215 }
3216
3217 static void vtysh_install_default(enum node_type node)
3218 {
3219 install_element(node, &config_list_cmd);
3220 install_element(node, &find_cmd);
3221 install_element(node, &show_cli_graph_vtysh_cmd);
3222 install_element(node, &vtysh_output_file_cmd);
3223 install_element(node, &no_vtysh_output_file_cmd);
3224 }
3225
3226 /* Making connection to protocol daemon. */
3227 static int vtysh_connect(struct vtysh_client *vclient)
3228 {
3229 int ret;
3230 int sock, len;
3231 struct sockaddr_un addr;
3232 struct stat s_stat;
3233 const char *path;
3234
3235 if (!vclient->path[0])
3236 snprintf(vclient->path, sizeof(vclient->path), "%s/%s.vty",
3237 vtydir, vclient->name);
3238 path = vclient->path;
3239
3240 /* Stat socket to see if we have permission to access it. */
3241 ret = stat(path, &s_stat);
3242 if (ret < 0 && errno != ENOENT) {
3243 fprintf(stderr, "vtysh_connect(%s): stat = %s\n", path,
3244 safe_strerror(errno));
3245 exit(1);
3246 }
3247
3248 if (ret >= 0) {
3249 if (!S_ISSOCK(s_stat.st_mode)) {
3250 fprintf(stderr, "vtysh_connect(%s): Not a socket\n",
3251 path);
3252 exit(1);
3253 }
3254 }
3255
3256 sock = socket(AF_UNIX, SOCK_STREAM, 0);
3257 if (sock < 0) {
3258 #ifdef DEBUG
3259 fprintf(stderr, "vtysh_connect(%s): socket = %s\n", path,
3260 safe_strerror(errno));
3261 #endif /* DEBUG */
3262 return -1;
3263 }
3264
3265 memset(&addr, 0, sizeof(struct sockaddr_un));
3266 addr.sun_family = AF_UNIX;
3267 strlcpy(addr.sun_path, path, sizeof(addr.sun_path));
3268 #ifdef HAVE_STRUCT_SOCKADDR_UN_SUN_LEN
3269 len = addr.sun_len = SUN_LEN(&addr);
3270 #else
3271 len = sizeof(addr.sun_family) + strlen(addr.sun_path);
3272 #endif /* HAVE_STRUCT_SOCKADDR_UN_SUN_LEN */
3273
3274 ret = connect(sock, (struct sockaddr *)&addr, len);
3275 if (ret < 0) {
3276 #ifdef DEBUG
3277 fprintf(stderr, "vtysh_connect(%s): connect = %s\n", path,
3278 safe_strerror(errno));
3279 #endif /* DEBUG */
3280 close(sock);
3281 return -1;
3282 }
3283 vclient->fd = sock;
3284
3285 return 0;
3286 }
3287
3288 static int vtysh_reconnect(struct vtysh_client *vclient)
3289 {
3290 int ret;
3291
3292 fprintf(stderr, "Warning: connecting to %s...", vclient->name);
3293 ret = vtysh_connect(vclient);
3294 if (ret < 0) {
3295 fprintf(stderr, "failed!\n");
3296 return ret;
3297 }
3298 fprintf(stderr, "success!\n");
3299 if (vtysh_client_execute(vclient, "enable") < 0)
3300 return -1;
3301 return vtysh_execute_no_pager("end");
3302 }
3303
3304 /* Return true if str ends with suffix, else return false */
3305 static int ends_with(const char *str, const char *suffix)
3306 {
3307 if (!str || !suffix)
3308 return 0;
3309 size_t lenstr = strlen(str);
3310 size_t lensuffix = strlen(suffix);
3311 if (lensuffix > lenstr)
3312 return 0;
3313 return strncmp(str + lenstr - lensuffix, suffix, lensuffix) == 0;
3314 }
3315
3316 static void vtysh_client_sorted_insert(struct vtysh_client *head_client,
3317 struct vtysh_client *client)
3318 {
3319 struct vtysh_client *prev_node, *current_node;
3320
3321 prev_node = head_client;
3322 current_node = head_client->next;
3323 while (current_node) {
3324 if (strcmp(current_node->path, client->path) > 0)
3325 break;
3326
3327 prev_node = current_node;
3328 current_node = current_node->next;
3329 }
3330 client->next = current_node;
3331 prev_node->next = client;
3332 }
3333
3334 #define MAXIMUM_INSTANCES 10
3335
3336 static void vtysh_update_all_instances(struct vtysh_client *head_client)
3337 {
3338 struct vtysh_client *client;
3339 DIR *dir;
3340 struct dirent *file;
3341 int n = 0;
3342
3343 if (head_client->flag != VTYSH_OSPFD)
3344 return;
3345
3346 /* ls vty_sock_dir and look for all files ending in .vty */
3347 dir = opendir(vtydir);
3348 if (dir) {
3349 while ((file = readdir(dir)) != NULL) {
3350 if (frrstr_startswith(file->d_name, "ospfd-")
3351 && ends_with(file->d_name, ".vty")) {
3352 if (n == MAXIMUM_INSTANCES) {
3353 fprintf(stderr,
3354 "Parsing %s, client limit(%d) reached!\n",
3355 vtydir, n);
3356 break;
3357 }
3358 client = (struct vtysh_client *)malloc(
3359 sizeof(struct vtysh_client));
3360 client->fd = -1;
3361 client->name = "ospfd";
3362 client->flag = VTYSH_OSPFD;
3363 snprintf(client->path, sizeof(client->path),
3364 "%s/%s", vtydir, file->d_name);
3365 client->next = NULL;
3366 vtysh_client_sorted_insert(head_client, client);
3367 n++;
3368 }
3369 }
3370 closedir(dir);
3371 }
3372 }
3373
3374 static int vtysh_connect_all_instances(struct vtysh_client *head_client)
3375 {
3376 struct vtysh_client *client;
3377 int rc = 0;
3378
3379 vtysh_update_all_instances(head_client);
3380
3381 client = head_client->next;
3382 while (client) {
3383 if (vtysh_connect(client) == 0)
3384 rc++;
3385 client = client->next;
3386 }
3387
3388 return rc;
3389 }
3390
3391 int vtysh_connect_all(const char *daemon_name)
3392 {
3393 unsigned int i;
3394 int rc = 0;
3395 int matches = 0;
3396
3397 for (i = 0; i < array_size(vtysh_client); i++) {
3398 if (!daemon_name
3399 || !strcmp(daemon_name, vtysh_client[i].name)) {
3400 matches++;
3401 if (vtysh_connect(&vtysh_client[i]) == 0)
3402 rc++;
3403
3404 rc += vtysh_connect_all_instances(&vtysh_client[i]);
3405 }
3406 }
3407 if (!matches)
3408 fprintf(stderr, "Error: no daemons match name %s!\n",
3409 daemon_name);
3410 return rc;
3411 }
3412
3413 /* To disable readline's filename completion. */
3414 static char *vtysh_completion_entry_function(const char *ignore,
3415 int invoking_key)
3416 {
3417 return NULL;
3418 }
3419
3420 void vtysh_readline_init(void)
3421 {
3422 /* readline related settings. */
3423 rl_initialize();
3424 rl_bind_key('?', (rl_command_func_t *)vtysh_rl_describe);
3425 rl_completion_entry_function = vtysh_completion_entry_function;
3426 rl_attempted_completion_function = new_completion;
3427 }
3428
3429 char *vtysh_prompt(void)
3430 {
3431 static char buf[100];
3432
3433 snprintf(buf, sizeof buf, cmd_prompt(vty->node), cmd_hostname_get());
3434 return buf;
3435 }
3436
3437 static void vtysh_ac_line(void *arg, const char *line)
3438 {
3439 vector comps = arg;
3440 size_t i;
3441 for (i = 0; i < vector_active(comps); i++)
3442 if (!strcmp(line, (char *)vector_slot(comps, i)))
3443 return;
3444 vector_set(comps, XSTRDUP(MTYPE_COMPLETION, line));
3445 }
3446
3447 static void vtysh_autocomplete(vector comps, struct cmd_token *token)
3448 {
3449 char accmd[256];
3450 size_t i;
3451
3452 snprintf(accmd, sizeof(accmd), "autocomplete %d %s %s", token->type,
3453 token->text, token->varname ? token->varname : "-");
3454
3455 vty->of_saved = vty->of;
3456 vty->of = NULL;
3457 for (i = 0; i < array_size(vtysh_client); i++)
3458 vtysh_client_run_all(&vtysh_client[i], accmd, 1, vtysh_ac_line,
3459 comps);
3460 vty->of = vty->of_saved;
3461 }
3462
3463 static const struct cmd_variable_handler vtysh_var_handler[] = {
3464 {/* match all */
3465 .tokenname = NULL,
3466 .varname = NULL,
3467 .completions = vtysh_autocomplete},
3468 {.completions = NULL}};
3469
3470 void vtysh_uninit(void)
3471 {
3472 if (vty->of != stdout)
3473 fclose(vty->of);
3474 }
3475
3476 void vtysh_init_vty(void)
3477 {
3478 /* Make vty structure. */
3479 vty = vty_new();
3480 vty->type = VTY_SHELL;
3481 vty->node = VIEW_NODE;
3482
3483 /* set default output */
3484 vty->of = stdout;
3485 vtysh_pager_envdef(false);
3486
3487 /* Initialize commands. */
3488 cmd_init(0);
3489 cmd_variable_handler_register(vtysh_var_handler);
3490
3491 /* Install nodes. */
3492 install_node(&bgp_node, NULL);
3493 install_node(&rip_node, NULL);
3494 install_node(&interface_node, NULL);
3495 install_node(&pw_node, NULL);
3496 install_node(&link_params_node, NULL);
3497 install_node(&logicalrouter_node, NULL);
3498 install_node(&vrf_node, NULL);
3499 install_node(&nh_group_node, NULL);
3500 install_node(&rmap_node, NULL);
3501 install_node(&pbr_map_node, NULL);
3502 install_node(&zebra_node, NULL);
3503 install_node(&bgp_vpnv4_node, NULL);
3504 install_node(&bgp_vpnv6_node, NULL);
3505 install_node(&bgp_flowspecv4_node, NULL);
3506 install_node(&bgp_flowspecv6_node, NULL);
3507 install_node(&bgp_ipv4_node, NULL);
3508 install_node(&bgp_ipv4m_node, NULL);
3509 install_node(&bgp_ipv4l_node, NULL);
3510 install_node(&bgp_ipv6_node, NULL);
3511 install_node(&bgp_ipv6m_node, NULL);
3512 install_node(&bgp_ipv6l_node, NULL);
3513 install_node(&bgp_vrf_policy_node, NULL);
3514 install_node(&bgp_evpn_node, NULL);
3515 install_node(&bgp_evpn_vni_node, NULL);
3516 install_node(&bgp_vnc_defaults_node, NULL);
3517 install_node(&bgp_vnc_nve_group_node, NULL);
3518 install_node(&bgp_vnc_l2_group_node, NULL);
3519 install_node(&ospf_node, NULL);
3520 install_node(&eigrp_node, NULL);
3521 install_node(&babel_node, NULL);
3522 install_node(&ripng_node, NULL);
3523 install_node(&ospf6_node, NULL);
3524 install_node(&ldp_node, NULL);
3525 install_node(&ldp_ipv4_node, NULL);
3526 install_node(&ldp_ipv6_node, NULL);
3527 install_node(&ldp_ipv4_iface_node, NULL);
3528 install_node(&ldp_ipv6_iface_node, NULL);
3529 install_node(&ldp_l2vpn_node, NULL);
3530 install_node(&ldp_pseudowire_node, NULL);
3531 install_node(&keychain_node, NULL);
3532 install_node(&keychain_key_node, NULL);
3533 install_node(&isis_node, NULL);
3534 install_node(&openfabric_node, NULL);
3535 install_node(&vty_node, NULL);
3536 install_node(&rpki_node, NULL);
3537 #if HAVE_BFDD > 0
3538 install_node(&bfd_node, NULL);
3539 install_node(&bfd_peer_node, NULL);
3540 #endif /* HAVE_BFDD */
3541
3542 struct cmd_node *node;
3543 for (unsigned int i = 0; i < vector_active(cmdvec); i++) {
3544 node = vector_slot(cmdvec, i);
3545 if (!node || node->node == VIEW_NODE)
3546 continue;
3547 vtysh_install_default(node->node);
3548 }
3549
3550 install_element(VIEW_NODE, &vtysh_enable_cmd);
3551 install_element(ENABLE_NODE, &vtysh_config_terminal_cmd);
3552 install_element(ENABLE_NODE, &vtysh_disable_cmd);
3553
3554 /* "exit" command. */
3555 install_element(VIEW_NODE, &vtysh_exit_all_cmd);
3556 install_element(CONFIG_NODE, &vtysh_exit_all_cmd);
3557 install_element(VIEW_NODE, &vtysh_quit_all_cmd);
3558 install_element(CONFIG_NODE, &vtysh_quit_all_cmd);
3559 install_element(RIP_NODE, &vtysh_exit_ripd_cmd);
3560 install_element(RIP_NODE, &vtysh_quit_ripd_cmd);
3561 install_element(RIPNG_NODE, &vtysh_exit_ripngd_cmd);
3562 install_element(RIPNG_NODE, &vtysh_quit_ripngd_cmd);
3563 install_element(OSPF_NODE, &vtysh_exit_ospfd_cmd);
3564 install_element(OSPF_NODE, &vtysh_quit_ospfd_cmd);
3565 install_element(EIGRP_NODE, &vtysh_exit_eigrpd_cmd);
3566 install_element(EIGRP_NODE, &vtysh_quit_eigrpd_cmd);
3567 install_element(BABEL_NODE, &vtysh_exit_babeld_cmd);
3568 install_element(BABEL_NODE, &vtysh_quit_babeld_cmd);
3569 install_element(OSPF6_NODE, &vtysh_exit_ospf6d_cmd);
3570 install_element(OSPF6_NODE, &vtysh_quit_ospf6d_cmd);
3571 #if defined(HAVE_LDPD)
3572 install_element(LDP_NODE, &vtysh_exit_ldpd_cmd);
3573 install_element(LDP_NODE, &vtysh_quit_ldpd_cmd);
3574 install_element(LDP_IPV4_NODE, &vtysh_exit_ldpd_cmd);
3575 install_element(LDP_IPV4_NODE, &vtysh_quit_ldpd_cmd);
3576 install_element(LDP_IPV4_NODE, &ldp_exit_address_family_cmd);
3577 install_element(LDP_IPV6_NODE, &vtysh_exit_ldpd_cmd);
3578 install_element(LDP_IPV6_NODE, &vtysh_quit_ldpd_cmd);
3579 install_element(LDP_IPV6_NODE, &ldp_exit_address_family_cmd);
3580 install_element(LDP_IPV4_IFACE_NODE, &vtysh_exit_ldpd_cmd);
3581 install_element(LDP_IPV4_IFACE_NODE, &vtysh_quit_ldpd_cmd);
3582 install_element(LDP_IPV6_IFACE_NODE, &vtysh_exit_ldpd_cmd);
3583 install_element(LDP_IPV6_IFACE_NODE, &vtysh_quit_ldpd_cmd);
3584 install_element(LDP_L2VPN_NODE, &vtysh_exit_ldpd_cmd);
3585 install_element(LDP_L2VPN_NODE, &vtysh_quit_ldpd_cmd);
3586 install_element(LDP_PSEUDOWIRE_NODE, &vtysh_exit_ldpd_cmd);
3587 install_element(LDP_PSEUDOWIRE_NODE, &vtysh_quit_ldpd_cmd);
3588 #endif
3589 install_element(BGP_NODE, &vtysh_exit_bgpd_cmd);
3590 install_element(BGP_NODE, &vtysh_quit_bgpd_cmd);
3591 install_element(BGP_VPNV4_NODE, &vtysh_exit_bgpd_cmd);
3592 install_element(BGP_VPNV4_NODE, &vtysh_quit_bgpd_cmd);
3593 install_element(BGP_VPNV6_NODE, &vtysh_exit_bgpd_cmd);
3594 install_element(BGP_VPNV6_NODE, &vtysh_quit_bgpd_cmd);
3595 install_element(BGP_FLOWSPECV4_NODE, &vtysh_exit_bgpd_cmd);
3596 install_element(BGP_FLOWSPECV4_NODE, &vtysh_quit_bgpd_cmd);
3597 install_element(BGP_FLOWSPECV6_NODE, &vtysh_exit_bgpd_cmd);
3598 install_element(BGP_FLOWSPECV6_NODE, &vtysh_quit_bgpd_cmd);
3599 install_element(BGP_IPV4_NODE, &vtysh_exit_bgpd_cmd);
3600 install_element(BGP_IPV4_NODE, &vtysh_quit_bgpd_cmd);
3601 install_element(BGP_IPV4M_NODE, &vtysh_exit_bgpd_cmd);
3602 install_element(BGP_IPV4M_NODE, &vtysh_quit_bgpd_cmd);
3603 install_element(BGP_IPV4L_NODE, &vtysh_exit_bgpd_cmd);
3604 install_element(BGP_IPV4L_NODE, &vtysh_quit_bgpd_cmd);
3605 install_element(BGP_IPV6_NODE, &vtysh_exit_bgpd_cmd);
3606 install_element(BGP_IPV6_NODE, &vtysh_quit_bgpd_cmd);
3607 install_element(BGP_IPV6M_NODE, &vtysh_exit_bgpd_cmd);
3608 install_element(BGP_IPV6M_NODE, &vtysh_quit_bgpd_cmd);
3609 install_element(BGP_EVPN_NODE, &vtysh_quit_bgpd_cmd);
3610 install_element(BGP_EVPN_NODE, &vtysh_exit_bgpd_cmd);
3611 install_element(BGP_EVPN_VNI_NODE, &vtysh_exit_bgpd_cmd);
3612 install_element(BGP_EVPN_VNI_NODE, &vtysh_quit_bgpd_cmd);
3613 install_element(BGP_IPV6L_NODE, &vtysh_exit_bgpd_cmd);
3614 install_element(BGP_IPV6L_NODE, &vtysh_quit_bgpd_cmd);
3615 #if defined(ENABLE_BGP_VNC)
3616 install_element(BGP_VRF_POLICY_NODE, &vtysh_exit_bgpd_cmd);
3617 install_element(BGP_VRF_POLICY_NODE, &vtysh_quit_bgpd_cmd);
3618 install_element(BGP_VNC_DEFAULTS_NODE, &vtysh_exit_bgpd_cmd);
3619 install_element(BGP_VNC_DEFAULTS_NODE, &vtysh_quit_bgpd_cmd);
3620 install_element(BGP_VNC_NVE_GROUP_NODE, &vtysh_exit_bgpd_cmd);
3621 install_element(BGP_VNC_NVE_GROUP_NODE, &vtysh_quit_bgpd_cmd);
3622 install_element(BGP_VNC_L2_GROUP_NODE, &vtysh_exit_bgpd_cmd);
3623 install_element(BGP_VNC_L2_GROUP_NODE, &vtysh_quit_bgpd_cmd);
3624 #endif
3625 install_element(ISIS_NODE, &vtysh_exit_isisd_cmd);
3626 install_element(ISIS_NODE, &vtysh_quit_isisd_cmd);
3627 install_element(OPENFABRIC_NODE, &vtysh_exit_fabricd_cmd);
3628 install_element(OPENFABRIC_NODE, &vtysh_quit_fabricd_cmd);
3629 install_element(KEYCHAIN_NODE, &vtysh_exit_ripd_cmd);
3630 install_element(KEYCHAIN_NODE, &vtysh_quit_ripd_cmd);
3631 install_element(KEYCHAIN_KEY_NODE, &vtysh_exit_ripd_cmd);
3632 install_element(KEYCHAIN_KEY_NODE, &vtysh_quit_ripd_cmd);
3633 install_element(RMAP_NODE, &vtysh_exit_rmap_cmd);
3634 install_element(RMAP_NODE, &vtysh_quit_rmap_cmd);
3635 install_element(PBRMAP_NODE, &vtysh_exit_pbr_map_cmd);
3636 install_element(PBRMAP_NODE, &vtysh_quit_pbr_map_cmd);
3637 #if HAVE_BFDD > 0
3638 /* Enter node. */
3639 install_element(CONFIG_NODE, &bfd_enter_cmd);
3640 install_element(BFD_NODE, &bfd_peer_enter_cmd);
3641
3642 /* Exit/quit node. */
3643 install_element(BFD_NODE, &vtysh_exit_bfdd_cmd);
3644 install_element(BFD_NODE, &vtysh_quit_bfdd_cmd);
3645 install_element(BFD_PEER_NODE, &vtysh_exit_bfdd_cmd);
3646 install_element(BFD_PEER_NODE, &vtysh_quit_bfdd_cmd);
3647
3648 /* End/exit all. */
3649 install_element(BFD_NODE, &vtysh_end_all_cmd);
3650 install_element(BFD_PEER_NODE, &vtysh_end_all_cmd);
3651 #endif /* HAVE_BFDD */
3652 install_element(VTY_NODE, &vtysh_exit_line_vty_cmd);
3653 install_element(VTY_NODE, &vtysh_quit_line_vty_cmd);
3654
3655 /* "end" command. */
3656 install_element(CONFIG_NODE, &vtysh_end_all_cmd);
3657 install_element(ENABLE_NODE, &vtysh_end_all_cmd);
3658 install_element(RIP_NODE, &vtysh_end_all_cmd);
3659 install_element(RIPNG_NODE, &vtysh_end_all_cmd);
3660 install_element(OSPF_NODE, &vtysh_end_all_cmd);
3661 install_element(EIGRP_NODE, &vtysh_end_all_cmd);
3662 install_element(BABEL_NODE, &vtysh_end_all_cmd);
3663 install_element(OSPF6_NODE, &vtysh_end_all_cmd);
3664 install_element(LDP_NODE, &vtysh_end_all_cmd);
3665 install_element(LDP_IPV4_NODE, &vtysh_end_all_cmd);
3666 install_element(LDP_IPV6_NODE, &vtysh_end_all_cmd);
3667 install_element(LDP_IPV4_IFACE_NODE, &vtysh_end_all_cmd);
3668 install_element(LDP_IPV6_IFACE_NODE, &vtysh_end_all_cmd);
3669 install_element(LDP_L2VPN_NODE, &vtysh_end_all_cmd);
3670 install_element(LDP_PSEUDOWIRE_NODE, &vtysh_end_all_cmd);
3671 install_element(BGP_NODE, &vtysh_end_all_cmd);
3672 install_element(BGP_IPV4_NODE, &vtysh_end_all_cmd);
3673 install_element(BGP_IPV4M_NODE, &vtysh_end_all_cmd);
3674 install_element(BGP_IPV4L_NODE, &vtysh_end_all_cmd);
3675 install_element(BGP_VPNV4_NODE, &vtysh_end_all_cmd);
3676 install_element(BGP_VPNV6_NODE, &vtysh_end_all_cmd);
3677 install_element(BGP_FLOWSPECV4_NODE, &vtysh_end_all_cmd);
3678 install_element(BGP_FLOWSPECV6_NODE, &vtysh_end_all_cmd);
3679 install_element(BGP_IPV6_NODE, &vtysh_end_all_cmd);
3680 install_element(BGP_IPV6M_NODE, &vtysh_end_all_cmd);
3681 install_element(BGP_IPV6L_NODE, &vtysh_end_all_cmd);
3682 install_element(BGP_VRF_POLICY_NODE, &vtysh_end_all_cmd);
3683 install_element(BGP_EVPN_NODE, &vtysh_end_all_cmd);
3684 install_element(BGP_EVPN_VNI_NODE, &vtysh_end_all_cmd);
3685 install_element(BGP_VNC_DEFAULTS_NODE, &vtysh_end_all_cmd);
3686 install_element(BGP_VNC_NVE_GROUP_NODE, &vtysh_end_all_cmd);
3687 install_element(BGP_VNC_L2_GROUP_NODE, &vtysh_end_all_cmd);
3688 install_element(ISIS_NODE, &vtysh_end_all_cmd);
3689 install_element(OPENFABRIC_NODE, &vtysh_end_all_cmd);
3690 install_element(KEYCHAIN_NODE, &vtysh_end_all_cmd);
3691 install_element(KEYCHAIN_KEY_NODE, &vtysh_end_all_cmd);
3692 install_element(RMAP_NODE, &vtysh_end_all_cmd);
3693 install_element(PBRMAP_NODE, &vtysh_end_all_cmd);
3694 install_element(VTY_NODE, &vtysh_end_all_cmd);
3695
3696 install_element(INTERFACE_NODE, &vtysh_end_all_cmd);
3697 install_element(INTERFACE_NODE, &vtysh_exit_interface_cmd);
3698 install_element(LINK_PARAMS_NODE, &exit_link_params_cmd);
3699 install_element(LINK_PARAMS_NODE, &vtysh_end_all_cmd);
3700 install_element(LINK_PARAMS_NODE, &vtysh_exit_interface_cmd);
3701 install_element(INTERFACE_NODE, &vtysh_quit_interface_cmd);
3702
3703 install_element(PW_NODE, &vtysh_end_all_cmd);
3704 install_element(PW_NODE, &vtysh_exit_interface_cmd);
3705 install_element(PW_NODE, &vtysh_quit_interface_cmd);
3706
3707 install_element(LOGICALROUTER_NODE, &vtysh_end_all_cmd);
3708
3709 install_element(CONFIG_NODE, &vtysh_logicalrouter_cmd);
3710 install_element(CONFIG_NODE, &vtysh_no_logicalrouter_cmd);
3711 install_element(LOGICALROUTER_NODE, &vtysh_exit_logicalrouter_cmd);
3712 install_element(LOGICALROUTER_NODE, &vtysh_quit_logicalrouter_cmd);
3713
3714 install_element(CONFIG_NODE, &vtysh_nexthop_group_cmd);
3715 install_element(NH_GROUP_NODE, &vtysh_end_all_cmd);
3716 install_element(NH_GROUP_NODE, &vtysh_exit_nexthop_group_cmd);
3717 install_element(NH_GROUP_NODE, &vtysh_quit_nexthop_group_cmd);
3718
3719 install_element(VRF_NODE, &vtysh_end_all_cmd);
3720 install_element(VRF_NODE, &vtysh_exit_vrf_cmd);
3721 install_element(VRF_NODE, &vtysh_quit_vrf_cmd);
3722
3723 install_element(CONFIG_NODE, &router_eigrp_cmd);
3724 install_element(CONFIG_NODE, &router_babel_cmd);
3725 install_element(CONFIG_NODE, &router_rip_cmd);
3726 install_element(CONFIG_NODE, &router_ripng_cmd);
3727 install_element(CONFIG_NODE, &router_ospf_cmd);
3728 install_element(CONFIG_NODE, &router_ospf6_cmd);
3729 #if defined(HAVE_LDPD)
3730 install_element(CONFIG_NODE, &ldp_mpls_ldp_cmd);
3731 install_element(LDP_NODE, &ldp_address_family_ipv4_cmd);
3732 install_element(LDP_NODE, &ldp_address_family_ipv6_cmd);
3733 install_element(LDP_IPV4_NODE, &ldp_interface_ifname_cmd);
3734 install_element(LDP_IPV6_NODE, &ldp_interface_ifname_cmd);
3735 install_element(CONFIG_NODE, &ldp_l2vpn_word_type_vpls_cmd);
3736 install_element(LDP_L2VPN_NODE, &ldp_member_pseudowire_ifname_cmd);
3737 #endif
3738 install_element(CONFIG_NODE, &router_isis_cmd);
3739 install_element(CONFIG_NODE, &router_openfabric_cmd);
3740 install_element(CONFIG_NODE, &router_bgp_cmd);
3741 #ifdef KEEP_OLD_VPN_COMMANDS
3742 install_element(BGP_NODE, &address_family_vpnv4_cmd);
3743 install_element(BGP_NODE, &address_family_vpnv6_cmd);
3744 #endif /* KEEP_OLD_VPN_COMMANDS */
3745 #if defined(ENABLE_BGP_VNC)
3746 install_element(BGP_NODE, &vnc_vrf_policy_cmd);
3747 install_element(BGP_NODE, &vnc_defaults_cmd);
3748 install_element(BGP_NODE, &vnc_nve_group_cmd);
3749 install_element(BGP_NODE, &vnc_l2_group_cmd);
3750 #endif
3751 install_element(BGP_NODE, &address_family_ipv4_cmd);
3752 install_element(BGP_NODE, &address_family_ipv4_multicast_cmd);
3753 install_element(BGP_NODE, &address_family_ipv4_vpn_cmd);
3754 install_element(BGP_NODE, &address_family_ipv4_labeled_unicast_cmd);
3755 install_element(BGP_NODE, &address_family_ipv6_cmd);
3756 install_element(BGP_NODE, &address_family_ipv6_multicast_cmd);
3757 install_element(BGP_NODE, &address_family_ipv6_vpn_cmd);
3758 install_element(BGP_NODE, &address_family_ipv6_labeled_unicast_cmd);
3759 install_element(BGP_NODE, &address_family_evpn_cmd);
3760 install_element(BGP_NODE, &address_family_flowspecv4_cmd);
3761 install_element(BGP_NODE, &address_family_flowspecv6_cmd);
3762 #if defined(HAVE_CUMULUS)
3763 install_element(BGP_NODE, &address_family_evpn2_cmd);
3764 #endif
3765 install_element(BGP_VPNV4_NODE, &exit_address_family_cmd);
3766 install_element(BGP_VPNV6_NODE, &exit_address_family_cmd);
3767 install_element(BGP_IPV4_NODE, &exit_address_family_cmd);
3768 install_element(BGP_IPV4M_NODE, &exit_address_family_cmd);
3769 install_element(BGP_IPV4L_NODE, &exit_address_family_cmd);
3770 install_element(BGP_IPV6_NODE, &exit_address_family_cmd);
3771 install_element(BGP_IPV6M_NODE, &exit_address_family_cmd);
3772 install_element(BGP_EVPN_NODE, &exit_address_family_cmd);
3773 install_element(BGP_IPV6L_NODE, &exit_address_family_cmd);
3774 install_element(BGP_FLOWSPECV4_NODE, &exit_address_family_cmd);
3775 install_element(BGP_FLOWSPECV6_NODE, &exit_address_family_cmd);
3776
3777 install_element(CONFIG_NODE, &rpki_cmd);
3778 install_element(RPKI_NODE, &rpki_exit_cmd);
3779 install_element(RPKI_NODE, &rpki_quit_cmd);
3780 install_element(RPKI_NODE, &vtysh_end_all_cmd);
3781
3782 /* EVPN commands */
3783 install_element(BGP_EVPN_NODE, &bgp_evpn_vni_cmd);
3784 install_element(BGP_EVPN_VNI_NODE, &exit_vni_cmd);
3785
3786 install_element(BGP_VRF_POLICY_NODE, &exit_vrf_policy_cmd);
3787 install_element(BGP_VNC_DEFAULTS_NODE, &exit_vnc_config_cmd);
3788 install_element(BGP_VNC_NVE_GROUP_NODE, &exit_vnc_config_cmd);
3789 install_element(BGP_VNC_L2_GROUP_NODE, &exit_vnc_config_cmd);
3790
3791 install_element(CONFIG_NODE, &key_chain_cmd);
3792 install_element(CONFIG_NODE, &vtysh_route_map_cmd);
3793 install_element(CONFIG_NODE, &vtysh_pbr_map_cmd);
3794 install_element(CONFIG_NODE, &vtysh_no_pbr_map_cmd);
3795 install_element(CONFIG_NODE, &vtysh_line_vty_cmd);
3796 install_element(KEYCHAIN_NODE, &key_cmd);
3797 install_element(KEYCHAIN_NODE, &key_chain_cmd);
3798 install_element(KEYCHAIN_KEY_NODE, &key_chain_cmd);
3799 install_element(CONFIG_NODE, &vtysh_interface_cmd);
3800 install_element(CONFIG_NODE, &vtysh_pseudowire_cmd);
3801 install_element(INTERFACE_NODE, &vtysh_link_params_cmd);
3802 install_element(ENABLE_NODE, &vtysh_show_running_config_cmd);
3803 install_element(ENABLE_NODE, &vtysh_copy_running_config_cmd);
3804
3805 install_element(CONFIG_NODE, &vtysh_vrf_cmd);
3806 install_element(VRF_NODE, &vtysh_vrf_netns_cmd);
3807 install_element(VRF_NODE, &vtysh_no_vrf_netns_cmd);
3808 install_element(VRF_NODE, &exit_vrf_config_cmd);
3809
3810 install_element(CONFIG_NODE, &vtysh_no_nexthop_group_cmd);
3811
3812 /* "write terminal" command. */
3813 install_element(ENABLE_NODE, &vtysh_write_terminal_cmd);
3814
3815 install_element(CONFIG_NODE, &vtysh_integrated_config_cmd);
3816 install_element(CONFIG_NODE, &no_vtysh_integrated_config_cmd);
3817
3818 /* "write memory" command. */
3819 install_element(ENABLE_NODE, &vtysh_write_memory_cmd);
3820
3821 install_element(CONFIG_NODE, &vtysh_terminal_paginate_cmd);
3822 install_element(VIEW_NODE, &vtysh_terminal_paginate_cmd);
3823 install_element(VIEW_NODE, &vtysh_terminal_length_cmd);
3824 install_element(VIEW_NODE, &vtysh_terminal_no_length_cmd);
3825 install_element(VIEW_NODE, &vtysh_show_daemons_cmd);
3826
3827 install_element(VIEW_NODE, &vtysh_ping_cmd);
3828 install_element(VIEW_NODE, &vtysh_ping_ip_cmd);
3829 install_element(VIEW_NODE, &vtysh_traceroute_cmd);
3830 install_element(VIEW_NODE, &vtysh_traceroute_ip_cmd);
3831 install_element(VIEW_NODE, &vtysh_mtrace_cmd);
3832 install_element(VIEW_NODE, &vtysh_ping6_cmd);
3833 install_element(VIEW_NODE, &vtysh_traceroute6_cmd);
3834 #if defined(HAVE_SHELL_ACCESS)
3835 install_element(VIEW_NODE, &vtysh_telnet_cmd);
3836 install_element(VIEW_NODE, &vtysh_telnet_port_cmd);
3837 install_element(VIEW_NODE, &vtysh_ssh_cmd);
3838 #endif
3839 #if defined(HAVE_SHELL_ACCESS)
3840 install_element(ENABLE_NODE, &vtysh_start_shell_cmd);
3841 install_element(ENABLE_NODE, &vtysh_start_bash_cmd);
3842 install_element(ENABLE_NODE, &vtysh_start_zsh_cmd);
3843 #endif
3844
3845 /* debugging */
3846 install_element(VIEW_NODE, &vtysh_show_debugging_cmd);
3847 install_element(VIEW_NODE, &vtysh_show_error_code_cmd);
3848 install_element(VIEW_NODE, &vtysh_show_debugging_hashtable_cmd);
3849 install_element(ENABLE_NODE, &vtysh_debug_all_cmd);
3850 install_element(CONFIG_NODE, &vtysh_debug_all_cmd);
3851
3852 /* misc lib show commands */
3853 install_element(VIEW_NODE, &vtysh_show_memory_cmd);
3854 install_element(VIEW_NODE, &vtysh_show_modules_cmd);
3855 install_element(VIEW_NODE, &vtysh_show_work_queues_cmd);
3856 install_element(VIEW_NODE, &vtysh_show_work_queues_daemon_cmd);
3857 install_element(VIEW_NODE, &vtysh_show_thread_cmd);
3858 install_element(VIEW_NODE, &vtysh_show_poll_cmd);
3859
3860 /* Logging */
3861 install_element(VIEW_NODE, &vtysh_show_logging_cmd);
3862 install_element(CONFIG_NODE, &vtysh_log_stdout_cmd);
3863 install_element(CONFIG_NODE, &vtysh_log_stdout_level_cmd);
3864 install_element(CONFIG_NODE, &no_vtysh_log_stdout_cmd);
3865 install_element(CONFIG_NODE, &vtysh_log_file_cmd);
3866 install_element(CONFIG_NODE, &vtysh_log_file_level_cmd);
3867 install_element(CONFIG_NODE, &no_vtysh_log_file_cmd);
3868 install_element(CONFIG_NODE, &vtysh_log_monitor_cmd);
3869 install_element(CONFIG_NODE, &no_vtysh_log_monitor_cmd);
3870 install_element(CONFIG_NODE, &vtysh_log_syslog_cmd);
3871 install_element(CONFIG_NODE, &no_vtysh_log_syslog_cmd);
3872 install_element(CONFIG_NODE, &vtysh_log_facility_cmd);
3873 install_element(CONFIG_NODE, &no_vtysh_log_facility_cmd);
3874 install_element(CONFIG_NODE, &vtysh_log_record_priority_cmd);
3875 install_element(CONFIG_NODE, &no_vtysh_log_record_priority_cmd);
3876 install_element(CONFIG_NODE, &vtysh_log_timestamp_precision_cmd);
3877 install_element(CONFIG_NODE, &no_vtysh_log_timestamp_precision_cmd);
3878
3879 install_element(CONFIG_NODE, &vtysh_service_password_encrypt_cmd);
3880 install_element(CONFIG_NODE, &no_vtysh_service_password_encrypt_cmd);
3881
3882 install_element(CONFIG_NODE, &vtysh_password_cmd);
3883 install_element(CONFIG_NODE, &no_vtysh_password_cmd);
3884 install_element(CONFIG_NODE, &vtysh_enable_password_cmd);
3885 install_element(CONFIG_NODE, &no_vtysh_enable_password_cmd);
3886 }