mirror of
https://gitlab.nic.cz/labs/bird.git
synced 2024-11-15 07:38:43 +00:00
f93315c417
This is part of the multithreading journey. The parser and lexer were using loads of global variables and all of these are now packed into struct cf_context and others. Note that the config API has changed: * cfg_alloc[zu]?(size) is now cf_alloc[zu]?(ctx, size) * cf_error(msg, ...) is now cf_error(ctx, msg, ...) * config_parse() and cli_parse() are now called differently * there is a brand new CF_CTX section in *.Y files which participates in struct cf_context construction
796 lines
23 KiB
Plaintext
796 lines
23 KiB
Plaintext
/*
|
|
* BIRD -- Core Configuration
|
|
*
|
|
* (c) 1998--2000 Martin Mares <mj@ucw.cz>
|
|
* (c) 2004 Ondrej Filip <feela@network.cz>
|
|
*
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
*/
|
|
|
|
CF_HDR
|
|
|
|
#include "nest/rt-dev.h"
|
|
#include "nest/password.h"
|
|
#include "nest/cmds.h"
|
|
#include "lib/lists.h"
|
|
#include "lib/mac.h"
|
|
|
|
CF_CTX
|
|
|
|
struct proto_config *this_proto;
|
|
struct channel_config *this_channel;
|
|
struct iface_patt *this_ipatt;
|
|
struct iface_patt_node *this_ipn;
|
|
list *this_p_list;
|
|
struct password_item *this_p_item;
|
|
int password_id;
|
|
|
|
CF_DEFINES
|
|
|
|
static void
|
|
iface_patt_check(struct cf_context *ctx)
|
|
{
|
|
struct iface_patt_node *pn;
|
|
|
|
WALK_LIST(pn, ctx->this_ipatt->ipn_list)
|
|
if (!pn->pattern || pn->prefix.type)
|
|
cf_error(ctx, "Interface name/mask expected, not IP prefix");
|
|
}
|
|
|
|
|
|
static inline void
|
|
reset_passwords(struct cf_context *ctx)
|
|
{
|
|
ctx->this_p_list = NULL;
|
|
}
|
|
|
|
static inline list *
|
|
get_passwords(struct cf_context *ctx)
|
|
{
|
|
list *rv = ctx->this_p_list;
|
|
ctx->this_p_list = NULL;
|
|
return rv;
|
|
}
|
|
|
|
static void
|
|
proto_postconfig(struct cf_context *ctx)
|
|
{
|
|
CALL(ctx->this_proto->protocol->postconfig, ctx, ctx->this_proto);
|
|
ctx->this_channel = NULL;
|
|
ctx->this_proto = NULL;
|
|
}
|
|
|
|
|
|
#define DIRECT_CFG ((struct rt_dev_config *) ctx->this_proto)
|
|
|
|
CF_DECLS
|
|
|
|
CF_KEYWORDS(ROUTER, ID, PROTOCOL, TEMPLATE, PREFERENCE, DISABLED, DEBUG, ALL, OFF, DIRECT)
|
|
CF_KEYWORDS(INTERFACE, IMPORT, EXPORT, FILTER, NONE, VRF, TABLE, STATES, ROUTES, FILTERS)
|
|
CF_KEYWORDS(IPV4, IPV6, VPN4, VPN6, ROA4, ROA6, FLOW4, FLOW6, SADR, MPLS)
|
|
CF_KEYWORDS(RECEIVE, LIMIT, ACTION, WARN, BLOCK, RESTART, DISABLE, KEEP, FILTERED)
|
|
CF_KEYWORDS(PASSWORD, FROM, PASSIVE, TO, ID, EVENTS, PACKETS, PROTOCOLS, INTERFACES)
|
|
CF_KEYWORDS(ALGORITHM, KEYED, HMAC, MD5, SHA1, SHA256, SHA384, SHA512)
|
|
CF_KEYWORDS(PRIMARY, STATS, COUNT, BY, FOR, COMMANDS, PREEXPORT, NOEXPORT, GENERATE)
|
|
CF_KEYWORDS(BGP, PASSWORDS, DESCRIPTION, SORTED)
|
|
CF_KEYWORDS(RELOAD, IN, OUT, MRTDUMP, MESSAGES, RESTRICT, MEMORY, IGP_METRIC, CLASS, DSCP)
|
|
CF_KEYWORDS(TIMEFORMAT, ISO, SHORT, LONG, ROUTE, PROTOCOL, BASE, LOG, S, MS, US)
|
|
CF_KEYWORDS(GRACEFUL, RESTART, WAIT, MAX, FLUSH, AS)
|
|
|
|
/* For r_args_channel */
|
|
CF_KEYWORDS(IPV4, IPV4_MC, IPV4_MPLS, IPV6, IPV6_MC, IPV6_MPLS, IPV6_SADR, VPN4, VPN4_MC, VPN4_MPLS, VPN6, VPN6_MC, VPN6_MPLS, ROA4, ROA6, FLOW4, FLOW6, MPLS, PRI, SEC)
|
|
|
|
CF_ENUM(T_ENUM_RTS, RTS_, DUMMY, STATIC, INHERIT, DEVICE, STATIC_DEVICE, REDIRECT,
|
|
RIP, OSPF, OSPF_IA, OSPF_EXT1, OSPF_EXT2, BGP, PIPE, BABEL)
|
|
CF_ENUM(T_ENUM_SCOPE, SCOPE_, HOST, LINK, SITE, ORGANIZATION, UNIVERSE, UNDEFINED)
|
|
CF_ENUM(T_ENUM_RTD, RTD_, UNICAST, BLACKHOLE, UNREACHABLE, PROHIBIT)
|
|
CF_ENUM(T_ENUM_ROA, ROA_, UNKNOWN, VALID, INVALID)
|
|
|
|
%type <i32> idval
|
|
%type <f> imexport
|
|
%type <r> rtable
|
|
%type <s> optsym
|
|
%type <ra> r_args
|
|
%type <sd> sym_args
|
|
%type <i> proto_start echo_mask echo_size debug_mask debug_list debug_flag mrtdump_mask mrtdump_list mrtdump_flag export_mode limit_action net_type table_sorted tos password_algorithm
|
|
%type <ps> proto_patt proto_patt2
|
|
%type <cc> channel_start proto_channel
|
|
%type <cl> limit_spec
|
|
%type <net> r_args_for_val
|
|
%type <net_ptr> r_args_for
|
|
%type <t> r_args_channel
|
|
|
|
CF_GRAMMAR
|
|
|
|
/* Setting of router ID */
|
|
|
|
conf: rtrid ;
|
|
|
|
rtrid:
|
|
ROUTER ID idval ';' { ctx->new_config->router_id = $3; }
|
|
| ROUTER ID FROM iface_patt ';' { ctx->new_config->router_id_from = ctx->this_ipatt; }
|
|
;
|
|
|
|
idval:
|
|
NUM { $$ = $1; }
|
|
| '(' term ')' { $$ = f_eval_int($2, ctx); }
|
|
| IP4 { $$ = ip4_to_u32($1); }
|
|
| SYM {
|
|
if ($1->class == (SYM_CONSTANT | T_INT) || $1->class == (SYM_CONSTANT | T_QUAD))
|
|
$$ = SYM_VAL($1).i;
|
|
else if (($1->class == (SYM_CONSTANT | T_IP)) && ipa_is_ip4(SYM_VAL($1).ip))
|
|
$$ = ipa_to_u32(SYM_VAL($1).ip);
|
|
else
|
|
cf_error(ctx, "Number or IPv4 address constant expected");
|
|
}
|
|
;
|
|
|
|
conf: gr_opts ;
|
|
|
|
gr_opts: GRACEFUL RESTART WAIT expr ';' { ctx->new_config->gr_wait = $4; } ;
|
|
|
|
|
|
/* Network types (for tables, channels) */
|
|
|
|
net_type:
|
|
IPV4 { $$ = NET_IP4; }
|
|
| IPV6 { $$ = NET_IP6; }
|
|
| IPV6 SADR { $$ = NET_IP6_SADR; }
|
|
| VPN4 { $$ = NET_VPN4; }
|
|
| VPN6 { $$ = NET_VPN6; }
|
|
| ROA4 { $$ = NET_ROA4; }
|
|
| ROA6 { $$ = NET_ROA6; }
|
|
| FLOW4{ $$ = NET_FLOW4; }
|
|
| FLOW6{ $$ = NET_FLOW6; }
|
|
| MPLS { $$ = NET_MPLS; }
|
|
;
|
|
|
|
CF_ENUM(T_ENUM_NETTYPE, NET_, IP4, IP6, VPN4, VPN6, ROA4, ROA6, FLOW4, FLOW6, IP6_SADR)
|
|
|
|
|
|
/* Creation of routing tables */
|
|
|
|
conf: table ;
|
|
|
|
table_sorted:
|
|
{ $$ = 0; }
|
|
| SORTED { $$ = 1; }
|
|
;
|
|
|
|
table: net_type TABLE SYM table_sorted {
|
|
struct rtable_config *cf;
|
|
cf = rt_new_table(ctx, $3, $1);
|
|
cf->sorted = $4;
|
|
}
|
|
;
|
|
|
|
|
|
/* Definition of protocols */
|
|
|
|
conf: proto { proto_postconfig(ctx); } ;
|
|
|
|
proto_start:
|
|
PROTOCOL { $$ = SYM_PROTO; }
|
|
| TEMPLATE { $$ = SYM_TEMPLATE; }
|
|
;
|
|
|
|
proto_name:
|
|
/* EMPTY */ {
|
|
struct symbol *s = cf_default_name(ctx, ctx->this_proto->protocol->template, &ctx->this_proto->protocol->name_counter);
|
|
s->class = ctx->this_proto->class;
|
|
s->def = ctx->this_proto;
|
|
ctx->this_proto->name = s->name;
|
|
}
|
|
| SYM {
|
|
cf_define_symbol(ctx, $1, ctx->this_proto->class, ctx->this_proto);
|
|
ctx->this_proto->name = $1->name;
|
|
}
|
|
| FROM SYM {
|
|
struct symbol *s = cf_default_name(ctx, ctx->this_proto->protocol->template, &ctx->this_proto->protocol->name_counter);
|
|
s->class = ctx->this_proto->class;
|
|
s->def = ctx->this_proto;
|
|
ctx->this_proto->name = s->name;
|
|
|
|
if (($2->class != SYM_TEMPLATE) && ($2->class != SYM_PROTO)) cf_error(ctx, "Template or protocol name expected");
|
|
proto_copy_config(ctx, ctx->this_proto, $2->def);
|
|
}
|
|
| SYM FROM SYM {
|
|
cf_define_symbol(ctx, $1, ctx->this_proto->class, ctx->this_proto);
|
|
ctx->this_proto->name = $1->name;
|
|
|
|
if (($3->class != SYM_TEMPLATE) && ($3->class != SYM_PROTO)) cf_error(ctx, "Template or protocol name expected");
|
|
proto_copy_config(ctx, ctx->this_proto, $3->def);
|
|
}
|
|
;
|
|
|
|
proto_item:
|
|
/* EMPTY */
|
|
| DISABLED bool { ctx->this_proto->disabled = $2; }
|
|
| DEBUG debug_mask { ctx->this_proto->debug = $2; }
|
|
| MRTDUMP mrtdump_mask { ctx->this_proto->mrtdump = $2; }
|
|
| ROUTER ID idval { ctx->this_proto->router_id = $3; }
|
|
| DESCRIPTION text { ctx->this_proto->dsc = $2; }
|
|
| VRF text { ctx->this_proto->vrf = if_get_by_name($2); }
|
|
;
|
|
|
|
|
|
channel_start: net_type
|
|
{
|
|
$$ = ctx->this_channel = channel_config_get(ctx, NULL, net_label[$1], $1, ctx->this_proto);
|
|
};
|
|
|
|
channel_item:
|
|
TABLE rtable {
|
|
if (ctx->this_channel->net_type && ($2->addr_type != ctx->this_channel->net_type))
|
|
cf_error(ctx, "Incompatible table type");
|
|
ctx->this_channel->table = $2;
|
|
}
|
|
| IMPORT imexport { ctx->this_channel->in_filter = $2; }
|
|
| EXPORT imexport { ctx->this_channel->out_filter = $2; }
|
|
| RECEIVE LIMIT limit_spec { ctx->this_channel->rx_limit = $3; }
|
|
| IMPORT LIMIT limit_spec { ctx->this_channel->in_limit = $3; }
|
|
| EXPORT LIMIT limit_spec { ctx->this_channel->out_limit = $3; }
|
|
| PREFERENCE expr { ctx->this_channel->preference = $2; check_u16(ctx, $2); }
|
|
| IMPORT KEEP FILTERED bool { ctx->this_channel->in_keep_filtered = $4; }
|
|
;
|
|
|
|
channel_opts:
|
|
/* empty */
|
|
| channel_opts channel_item ';'
|
|
;
|
|
|
|
channel_opt_list:
|
|
/* empty */
|
|
| '{' channel_opts '}'
|
|
;
|
|
|
|
channel_end:
|
|
{
|
|
if (!ctx->this_channel->table)
|
|
cf_error(ctx, "Routing table not specified");
|
|
|
|
ctx->this_channel = NULL;
|
|
};
|
|
|
|
proto_channel: channel_start channel_opt_list channel_end;
|
|
|
|
|
|
rtable:
|
|
SYM {
|
|
if ($1->class != SYM_TABLE) cf_error(ctx, "Table expected");
|
|
$$ = $1->def;
|
|
}
|
|
;
|
|
|
|
imexport:
|
|
FILTER filter { $$ = $2; }
|
|
| where_filter
|
|
| ALL { $$ = FILTER_ACCEPT; }
|
|
| NONE { $$ = FILTER_REJECT; }
|
|
;
|
|
|
|
limit_action:
|
|
/* default */ { $$ = PLA_DISABLE; }
|
|
| ACTION WARN { $$ = PLA_WARN; }
|
|
| ACTION BLOCK { $$ = PLA_BLOCK; }
|
|
| ACTION RESTART { $$ = PLA_RESTART; }
|
|
| ACTION DISABLE { $$ = PLA_DISABLE; }
|
|
;
|
|
|
|
limit_spec:
|
|
expr limit_action { $$ = (struct channel_limit){ .limit = $1, $$.action = $2 }; }
|
|
| OFF { $$ = (struct channel_limit){}; }
|
|
;
|
|
|
|
|
|
conf: debug_default ;
|
|
|
|
debug_default:
|
|
DEBUG PROTOCOLS debug_mask { ctx->new_config->proto_default_debug = $3; }
|
|
| DEBUG COMMANDS expr { ctx->new_config->cli_debug = $3; }
|
|
;
|
|
|
|
/* MRTDUMP PROTOCOLS is in systep/unix/config.Y */
|
|
|
|
conf: timeformat_base ;
|
|
|
|
timeformat_which:
|
|
ROUTE { $$ = &ctx->new_config->tf_route; }
|
|
| PROTOCOL { $$ = &ctx->new_config->tf_proto; }
|
|
| BASE { $$ = &ctx->new_config->tf_base; }
|
|
| LOG { $$ = &ctx->new_config->tf_log; }
|
|
;
|
|
|
|
timeformat_spec:
|
|
timeformat_which TEXT { *$1 = (struct timeformat){$2, NULL, 0}; }
|
|
| timeformat_which TEXT expr TEXT { *$1 = (struct timeformat){$2, $4, (s64) $3 S_}; }
|
|
| timeformat_which ISO SHORT { *$1 = TM_ISO_SHORT_S; }
|
|
| timeformat_which ISO SHORT MS { *$1 = TM_ISO_SHORT_MS; }
|
|
| timeformat_which ISO SHORT US { *$1 = TM_ISO_SHORT_US; }
|
|
| timeformat_which ISO LONG { *$1 = TM_ISO_LONG_S; }
|
|
| timeformat_which ISO LONG MS { *$1 = TM_ISO_LONG_MS; }
|
|
| timeformat_which ISO LONG US { *$1 = TM_ISO_LONG_US; }
|
|
;
|
|
|
|
timeformat_base:
|
|
TIMEFORMAT timeformat_spec ';'
|
|
;
|
|
|
|
|
|
/* Interface patterns */
|
|
|
|
iface_patt_node_init:
|
|
/* EMPTY */ {
|
|
struct iface_patt_node *ipn = cfg_allocz(sizeof(struct iface_patt_node));
|
|
add_tail(&ctx->this_ipatt->ipn_list, NODE ipn);
|
|
ctx->this_ipn = ipn;
|
|
}
|
|
;
|
|
|
|
iface_patt_node_body:
|
|
TEXT { ctx->this_ipn->pattern = $1; /* ctx->this_ipn->prefix stays zero */ }
|
|
| opttext net_or_ipa { ctx->this_ipn->pattern = $1; ctx->this_ipn->prefix = $2; }
|
|
;
|
|
|
|
iface_negate:
|
|
{ ctx->this_ipn->positive = 1; }
|
|
| '-' { ctx->this_ipn->positive = 0; }
|
|
;
|
|
|
|
iface_patt_node:
|
|
iface_patt_node_init iface_negate iface_patt_node_body
|
|
;
|
|
|
|
|
|
iface_patt_list:
|
|
iface_patt_node
|
|
| iface_patt_list ',' iface_patt_node
|
|
;
|
|
|
|
/* For name/mask-only iface patterns */
|
|
iface_patt_list_nopx: iface_patt_list { iface_patt_check(ctx); }
|
|
|
|
iface_patt_init: {
|
|
/* Generic this_ipatt init */
|
|
ctx->this_ipatt = cfg_allocz(sizeof(struct iface_patt));
|
|
init_list(&ctx->this_ipatt->ipn_list);
|
|
}
|
|
;
|
|
|
|
iface_patt:
|
|
iface_patt_init iface_patt_list
|
|
;
|
|
|
|
tos:
|
|
CLASS expr { $$ = $2 & 0xfc; if ($2 > 255) cf_error(ctx, "TX class must be in range 0-255"); }
|
|
| DSCP expr { $$ = ($2 & 0x3f) << 2; if ($2 > 63) cf_error(ctx, "TX DSCP must be in range 0-63"); }
|
|
;
|
|
|
|
/* Direct device route protocol */
|
|
|
|
proto: dev_proto '}' ;
|
|
|
|
dev_proto_start: proto_start DIRECT {
|
|
ctx->this_proto = proto_config_new(ctx, &proto_device, $1);
|
|
init_list(&DIRECT_CFG->iface_list);
|
|
}
|
|
;
|
|
|
|
dev_proto:
|
|
dev_proto_start proto_name '{'
|
|
| dev_proto proto_item ';'
|
|
| dev_proto proto_channel ';'
|
|
| dev_proto dev_iface_patt ';'
|
|
| dev_proto CHECK LINK bool ';' { DIRECT_CFG->check_link = $4; }
|
|
;
|
|
|
|
dev_iface_init:
|
|
/* EMPTY */ {
|
|
ctx->this_ipatt = cfg_allocz(sizeof(struct iface_patt));
|
|
add_tail(&DIRECT_CFG->iface_list, NODE ctx->this_ipatt);
|
|
init_list(&ctx->this_ipatt->ipn_list);
|
|
}
|
|
;
|
|
|
|
dev_iface_patt:
|
|
INTERFACE dev_iface_init iface_patt_list
|
|
;
|
|
|
|
/* Debug flags */
|
|
|
|
debug_mask:
|
|
ALL { $$ = ~0; }
|
|
| OFF { $$ = 0; }
|
|
| '{' debug_list '}' { $$ = $2; }
|
|
;
|
|
|
|
debug_list:
|
|
debug_flag
|
|
| debug_list ',' debug_flag { $$ = $1 | $3; }
|
|
;
|
|
|
|
debug_flag:
|
|
STATES { $$ = D_STATES; }
|
|
| ROUTES { $$ = D_ROUTES; }
|
|
| FILTERS { $$ = D_FILTERS; }
|
|
| INTERFACES { $$ = D_IFACES; }
|
|
| EVENTS { $$ = D_EVENTS; }
|
|
| PACKETS { $$ = D_PACKETS; }
|
|
;
|
|
|
|
/* MRTDump flags */
|
|
|
|
mrtdump_mask:
|
|
ALL { $$ = ~0; }
|
|
| OFF { $$ = 0; }
|
|
| '{' mrtdump_list '}' { $$ = $2; }
|
|
;
|
|
|
|
mrtdump_list:
|
|
mrtdump_flag
|
|
| mrtdump_list ',' mrtdump_flag { $$ = $1 | $3; }
|
|
;
|
|
|
|
mrtdump_flag:
|
|
STATES { $$ = MD_STATES; }
|
|
| MESSAGES { $$ = MD_MESSAGES; }
|
|
;
|
|
|
|
/* Password lists */
|
|
|
|
password_list:
|
|
PASSWORDS '{' password_items '}'
|
|
| password_item
|
|
;
|
|
|
|
password_items:
|
|
/* empty */
|
|
| password_item ';' password_items
|
|
;
|
|
|
|
password_item:
|
|
password_item_begin '{' password_item_params '}'
|
|
| password_item_begin
|
|
;
|
|
|
|
password_item_begin:
|
|
PASSWORD text {
|
|
if (!ctx->this_p_list) {
|
|
ctx->this_p_list = cfg_alloc(sizeof(list));
|
|
init_list(ctx->this_p_list);
|
|
ctx->password_id = 1;
|
|
}
|
|
struct password_item *pi = cfg_alloc(sizeof (struct password_item));
|
|
*pi = (struct password_item) {
|
|
.password = $2,
|
|
.length = strlen($2),
|
|
.genfrom = 0,
|
|
.gento = TIME_INFINITY,
|
|
.accfrom = 0,
|
|
.accto = TIME_INFINITY,
|
|
.id = ctx->password_id++,
|
|
.alg = ALG_UNDEFINED,
|
|
};
|
|
ctx->this_p_item = pi;
|
|
add_tail(ctx->this_p_list, &pi->n);
|
|
}
|
|
;
|
|
|
|
password_item_params:
|
|
/* empty */ { }
|
|
| GENERATE FROM time ';' password_item_params { ctx->this_p_item->genfrom = $3; }
|
|
| GENERATE TO time ';' password_item_params { ctx->this_p_item->gento = $3; }
|
|
| ACCEPT FROM time ';' password_item_params { ctx->this_p_item->accfrom = $3; }
|
|
| ACCEPT TO time ';' password_item_params { ctx->this_p_item->accto = $3; }
|
|
| FROM time ';' password_item_params { ctx->this_p_item->genfrom = ctx->this_p_item->accfrom = $2; }
|
|
| TO time ';' password_item_params { ctx->this_p_item->gento = ctx->this_p_item->accto = $2; }
|
|
| ID expr ';' password_item_params { ctx->this_p_item->id = $2; if ($2 <= 0) cf_error(ctx, "Password ID has to be greated than zero."); }
|
|
| ALGORITHM password_algorithm ';' password_item_params { ctx->this_p_item->alg = $2; }
|
|
;
|
|
|
|
password_algorithm:
|
|
KEYED MD5 { $$ = ALG_MD5; }
|
|
| KEYED SHA1 { $$ = ALG_SHA1; }
|
|
| KEYED SHA256 { $$ = ALG_SHA256; }
|
|
| KEYED SHA384 { $$ = ALG_SHA384; }
|
|
| KEYED SHA512 { $$ = ALG_SHA512; }
|
|
| HMAC MD5 { $$ = ALG_HMAC_MD5; }
|
|
| HMAC SHA1 { $$ = ALG_HMAC_SHA1; }
|
|
| HMAC SHA256 { $$ = ALG_HMAC_SHA256; }
|
|
| HMAC SHA384 { $$ = ALG_HMAC_SHA384; }
|
|
| HMAC SHA512 { $$ = ALG_HMAC_SHA512; }
|
|
;
|
|
|
|
/* Core commands */
|
|
CF_CLI_HELP(SHOW, ..., [[Show status information]])
|
|
|
|
CF_CLI(SHOW STATUS,,, [[Show router status]])
|
|
{ cmd_show_status(); } ;
|
|
|
|
CF_CLI(SHOW MEMORY,,, [[Show memory usage]])
|
|
{ cmd_show_memory(); } ;
|
|
|
|
CF_CLI(SHOW PROTOCOLS, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocols]])
|
|
{ proto_apply_cmd($3, proto_cmd_show, 0, 0); } ;
|
|
|
|
CF_CLI(SHOW PROTOCOLS ALL, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocol details]])
|
|
{ proto_apply_cmd($4, proto_cmd_show, 0, 1); } ;
|
|
|
|
optsym:
|
|
SYM
|
|
| /* empty */ { $$ = NULL; }
|
|
;
|
|
|
|
CF_CLI(SHOW INTERFACES,,, [[Show network interfaces]])
|
|
{ if_show(); } ;
|
|
|
|
CF_CLI(SHOW INTERFACES SUMMARY,,, [[Show summary of network interfaces]])
|
|
{ if_show_summary(); } ;
|
|
|
|
CF_CLI_HELP(SHOW ROUTE, ..., [[Show routing table]])
|
|
CF_CLI(SHOW ROUTE, r_args, [[[<prefix>|for <prefix>|for <ip>] [table <t>] [filter <f>|where <cond>] [all] [primary] [filtered] [(export|preexport|noexport) <p>] [protocol <p>] [stats|count]]], [[Show routing table]])
|
|
{ rt_show($3); } ;
|
|
|
|
r_args:
|
|
/* empty */ {
|
|
$$ = cfg_allocz(sizeof(struct rt_show_data));
|
|
init_list(&($$->tables));
|
|
$$->filter = FILTER_ACCEPT;
|
|
$$->ctx = ctx;
|
|
}
|
|
| r_args net_any {
|
|
$$ = $1;
|
|
if ($$->addr) cf_error(ctx, "Only one prefix expected");
|
|
$$->addr = $2;
|
|
}
|
|
| r_args FOR r_args_for {
|
|
$$ = $1;
|
|
if ($$->addr) cf_error(ctx, "Only one prefix expected");
|
|
$$->show_for = 1;
|
|
$$->addr = $3;
|
|
}
|
|
| r_args TABLE SYM {
|
|
$$ = $1;
|
|
if ($3->class != SYM_TABLE) cf_error(ctx, "%s is not a table", $3->name);
|
|
rt_show_add_table($$, ((struct rtable_config *)$3->def)->table);
|
|
$$->tables_defined_by = RSD_TDB_DIRECT;
|
|
}
|
|
| r_args TABLE ALL {
|
|
struct rtable_config *t;
|
|
$$ = $1;
|
|
WALK_LIST(t, config->tables)
|
|
rt_show_add_table($$, t->table);
|
|
$$->tables_defined_by = RSD_TDB_ALL;
|
|
}
|
|
| r_args FILTER filter {
|
|
$$ = $1;
|
|
if ($$->filter != FILTER_ACCEPT) cf_error(ctx, "Filter specified twice");
|
|
$$->filter = $3;
|
|
}
|
|
| r_args where_filter {
|
|
$$ = $1;
|
|
if ($$->filter != FILTER_ACCEPT) cf_error(ctx, "Filter specified twice");
|
|
$$->filter = $2;
|
|
}
|
|
| r_args ALL {
|
|
$$ = $1;
|
|
$$->verbose = 1;
|
|
}
|
|
| r_args PRIMARY {
|
|
$$ = $1;
|
|
$$->primary_only = 1;
|
|
}
|
|
| r_args FILTERED {
|
|
$$ = $1;
|
|
$$->filtered = 1;
|
|
}
|
|
| r_args export_mode SYM {
|
|
struct proto_config *c = (struct proto_config *) $3->def;
|
|
$$ = $1;
|
|
if ($$->export_mode) cf_error(ctx, "Export specified twice");
|
|
if ($3->class != SYM_PROTO || !c->proto) cf_error(ctx, "%s is not a protocol", $3->name);
|
|
$$->export_mode = $2;
|
|
$$->export_protocol = c->proto;
|
|
$$->running_on_config = c->proto->cf->global;
|
|
$$->tables_defined_by = RSD_TDB_INDIRECT;
|
|
}
|
|
| r_args export_mode SYM '.' r_args_channel {
|
|
struct proto_config *c = (struct proto_config *) $3->def;
|
|
$$ = $1;
|
|
if ($$->export_mode) cf_error(ctx, "Export specified twice");
|
|
if ($3->class != SYM_PROTO || !c->proto) cf_error(ctx, "%s is not a protocol", $3->name);
|
|
$$->export_mode = $2;
|
|
$$->export_channel = proto_find_channel_by_name(c->proto, $5);
|
|
if (!$$->export_channel) cf_error(ctx, "Export channel not found");
|
|
$$->running_on_config = c->proto->cf->global;
|
|
$$->tables_defined_by = RSD_TDB_INDIRECT;
|
|
}
|
|
| r_args PROTOCOL SYM {
|
|
struct proto_config *c = (struct proto_config *) $3->def;
|
|
$$ = $1;
|
|
if ($$->show_protocol) cf_error(ctx, "Protocol specified twice");
|
|
if ($3->class != SYM_PROTO || !c->proto) cf_error(ctx, "%s is not a protocol", $3->name);
|
|
$$->show_protocol = c->proto;
|
|
$$->running_on_config = c->proto->cf->global;
|
|
$$->tables_defined_by = RSD_TDB_INDIRECT;
|
|
}
|
|
| r_args STATS {
|
|
$$ = $1;
|
|
$$->stats = 1;
|
|
}
|
|
| r_args COUNT {
|
|
$$ = $1;
|
|
$$->stats = 2;
|
|
}
|
|
;
|
|
|
|
r_args_for:
|
|
r_args_for_val {
|
|
$$ = cfg_alloc($1.length);
|
|
net_copy($$, &$1);
|
|
}
|
|
| net_vpn4_
|
|
| net_vpn6_
|
|
| net_ip6_sadr_
|
|
| VPN_RD IP4 {
|
|
$$ = cfg_alloc(sizeof(net_addr_vpn4));
|
|
net_fill_vpn4($$, $2, IP4_MAX_PREFIX_LENGTH, $1);
|
|
}
|
|
| VPN_RD IP6 {
|
|
$$ = cfg_alloc(sizeof(net_addr_vpn6));
|
|
net_fill_vpn6($$, $2, IP6_MAX_PREFIX_LENGTH, $1);
|
|
}
|
|
| IP6 FROM IP6 {
|
|
$$ = cfg_alloc(sizeof(net_addr_ip6_sadr));
|
|
net_fill_ip6_sadr($$, $1, IP6_MAX_PREFIX_LENGTH, $3, IP6_MAX_PREFIX_LENGTH);
|
|
}
|
|
| SYM {
|
|
if ($1->class == (SYM_CONSTANT | T_IP))
|
|
{
|
|
$$ = cfg_alloc(ipa_is_ip4(SYM_VAL($1).ip) ? sizeof(net_addr_ip4) : sizeof(net_addr_ip6));
|
|
net_fill_ip_host($$, SYM_VAL($1).ip);
|
|
}
|
|
else if (($1->class == (SYM_CONSTANT | T_NET)) && net_type_match(SYM_VAL($1).net, NB_IP | NB_VPN))
|
|
$$ = (net_addr *) SYM_VAL($1).net; /* Avoid const warning */
|
|
else
|
|
cf_error(ctx, "IP address or network expected");
|
|
}
|
|
;
|
|
|
|
r_args_for_val:
|
|
net_ip4_
|
|
| net_ip6_
|
|
| IP4 { net_fill_ip4(&($$), $1, IP4_MAX_PREFIX_LENGTH); }
|
|
| IP6 { net_fill_ip6(&($$), $1, IP6_MAX_PREFIX_LENGTH); }
|
|
|
|
export_mode:
|
|
PREEXPORT { $$ = RSEM_PREEXPORT; }
|
|
| EXPORT { $$ = RSEM_EXPORT; }
|
|
| NOEXPORT { $$ = RSEM_NOEXPORT; }
|
|
;
|
|
|
|
/* This is ugly hack */
|
|
r_args_channel:
|
|
IPV4 { $$ = "ipv4"; }
|
|
| IPV4_MC { $$ = "ipv4-mc"; }
|
|
| IPV4_MPLS { $$ = "ipv4-mpls"; }
|
|
| IPV6 { $$ = "ipv6"; }
|
|
| IPV6_MC { $$ = "ipv6-mc"; }
|
|
| IPV6_MPLS { $$ = "ipv6-mpls"; }
|
|
| IPV6_SADR { $$ = "ipv6-sadr"; }
|
|
| VPN4 { $$ = "vpn4"; }
|
|
| VPN4_MC { $$ = "vpn4-mc"; }
|
|
| VPN4_MPLS { $$ = "vpn4-mpls"; }
|
|
| VPN6 { $$ = "vpn6"; }
|
|
| VPN6_MC { $$ = "vpn6-mc"; }
|
|
| VPN6_MPLS { $$ = "vpn6-mpls"; }
|
|
| ROA4 { $$ = "roa4"; }
|
|
| ROA6 { $$ = "roa6"; }
|
|
| FLOW4 { $$ = "flow4"; }
|
|
| FLOW6 { $$ = "flow6"; }
|
|
| MPLS { $$ = "mpls"; }
|
|
| PRI { $$ = "pri"; }
|
|
| SEC { $$ = "sec"; }
|
|
;
|
|
|
|
CF_CLI_HELP(SHOW SYMBOLS, ..., [[Show all known symbolic names]])
|
|
CF_CLI(SHOW SYMBOLS, sym_args, [table|filter|function|protocol|template|<symbol>], [[Show all known symbolic names]])
|
|
{ cmd_show_symbols($3); } ;
|
|
|
|
sym_args:
|
|
/* empty */ {
|
|
$$ = cfg_allocz(sizeof(struct sym_show_data));
|
|
}
|
|
| sym_args TABLE { $$ = $1; $$->type = SYM_TABLE; }
|
|
| sym_args FUNCTION { $$ = $1; $$->type = SYM_FUNCTION; }
|
|
| sym_args FILTER { $$ = $1; $$->type = SYM_FILTER; }
|
|
| sym_args PROTOCOL { $$ = $1; $$->type = SYM_PROTO; }
|
|
| sym_args TEMPLATE { $$ = $1; $$->type = SYM_TEMPLATE; }
|
|
| sym_args SYM { $$ = $1; $$->sym = $2; }
|
|
;
|
|
|
|
|
|
CF_CLI_HELP(DUMP, ..., [[Dump debugging information]])
|
|
CF_CLI(DUMP RESOURCES,,, [[Dump all allocated resource]])
|
|
{ rdump(&root_pool); cli_msg(0, ""); } ;
|
|
CF_CLI(DUMP SOCKETS,,, [[Dump open sockets]])
|
|
{ sk_dump_all(); cli_msg(0, ""); } ;
|
|
CF_CLI(DUMP EVENTS,,, [[Dump event log]])
|
|
{ io_log_dump(); cli_msg(0, ""); } ;
|
|
CF_CLI(DUMP INTERFACES,,, [[Dump interface information]])
|
|
{ if_dump_all(); cli_msg(0, ""); } ;
|
|
CF_CLI(DUMP NEIGHBORS,,, [[Dump neighbor cache]])
|
|
{ neigh_dump_all(); cli_msg(0, ""); } ;
|
|
CF_CLI(DUMP ATTRIBUTES,,, [[Dump attribute cache]])
|
|
{ rta_dump_all(); cli_msg(0, ""); } ;
|
|
CF_CLI(DUMP ROUTES,,, [[Dump routing table]])
|
|
{ rt_dump_all(); cli_msg(0, ""); } ;
|
|
CF_CLI(DUMP PROTOCOLS,,, [[Dump protocol information]])
|
|
{ protos_dump_all(); cli_msg(0, ""); } ;
|
|
|
|
CF_CLI(EVAL, term, <expr>, [[Evaluate an expression]])
|
|
{ cmd_eval($2); } ;
|
|
|
|
CF_CLI_HELP(ECHO, ..., [[Control echoing of log messages]])
|
|
CF_CLI(ECHO, echo_mask echo_size, (all | off | { debug|trace|info|remote|warning|error|auth [, ...] }) [<buffer-size>], [[Control echoing of log messages]]) {
|
|
cli_set_log_echo(this_cli, $2, $3);
|
|
cli_msg(0, "");
|
|
} ;
|
|
|
|
echo_mask:
|
|
ALL { $$ = ~0; }
|
|
| OFF { $$ = 0; }
|
|
| '{' log_mask_list '}' { $$ = $2; }
|
|
;
|
|
|
|
echo_size:
|
|
/* empty */ { $$ = 4096; }
|
|
| NUM {
|
|
if ($1 < 256 || $1 > 65536) cf_error(ctx, "Invalid log buffer size");
|
|
$$ = $1;
|
|
}
|
|
;
|
|
|
|
CF_CLI(DISABLE, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Disable protocol]])
|
|
{ proto_apply_cmd($2, proto_cmd_disable, 1, (uintptr_t) $3); } ;
|
|
CF_CLI(ENABLE, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Enable protocol]])
|
|
{ proto_apply_cmd($2, proto_cmd_enable, 1, (uintptr_t) $3); } ;
|
|
CF_CLI(RESTART, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Restart protocol]])
|
|
{ proto_apply_cmd($2, proto_cmd_restart, 1, (uintptr_t) $3); } ;
|
|
CF_CLI(RELOAD, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol]])
|
|
{ proto_apply_cmd($2, proto_cmd_reload, 1, CMD_RELOAD); } ;
|
|
CF_CLI(RELOAD IN, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just imported routes)]])
|
|
{ proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_IN); } ;
|
|
CF_CLI(RELOAD OUT, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just exported routes)]])
|
|
{ proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_OUT); } ;
|
|
|
|
CF_CLI_HELP(DEBUG, ..., [[Control protocol debugging via BIRD logs]])
|
|
CF_CLI(DEBUG, proto_patt debug_mask, (<protocol> | \"<pattern>\" | all) (all | off | { states|routes|filters|interfaces|events|packets [, ...] }), [[Control protocol debugging via BIRD logs]])
|
|
{ proto_apply_cmd($2, proto_cmd_debug, 1, $3); } ;
|
|
|
|
CF_CLI_HELP(MRTDUMP, ..., [[Control protocol debugging via MRTdump files]])
|
|
CF_CLI(MRTDUMP, proto_patt mrtdump_mask, (<protocol> | \"<pattern>\" | all) (all | off | { states|messages [, ...] }), [[Control protocol debugging via MRTdump format]])
|
|
{ proto_apply_cmd($2, proto_cmd_mrtdump, 1, $3); } ;
|
|
|
|
CF_CLI(RESTRICT,,,[[Restrict current CLI session to safe commands]])
|
|
{ this_cli->restricted = 1; cli_msg(16, "Access restricted"); } ;
|
|
|
|
proto_patt:
|
|
SYM { $$.ptr = $1; $$.patt = 0; }
|
|
| ALL { $$.ptr = NULL; $$.patt = 1; }
|
|
| TEXT { $$.ptr = $1; $$.patt = 1; }
|
|
;
|
|
|
|
proto_patt2:
|
|
SYM { $$.ptr = $1; $$.patt = 0; }
|
|
| { $$.ptr = NULL; $$.patt = 1; }
|
|
| TEXT { $$.ptr = $1; $$.patt = 1; }
|
|
;
|
|
|
|
dynamic_attr: IGP_METRIC { $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_GEN_IGP_METRIC); } ;
|
|
|
|
|
|
CF_CODE
|
|
|
|
CF_END
|