Annotation of embedaddon/bird2/nest/config.Y, revision 1.1
1.1 ! misho 1: /*
! 2: * BIRD -- Core Configuration
! 3: *
! 4: * (c) 1998--2000 Martin Mares <mj@ucw.cz>
! 5: * (c) 2004 Ondrej Filip <feela@network.cz>
! 6: *
! 7: * Can be freely distributed and used under the terms of the GNU GPL.
! 8: */
! 9:
! 10: CF_HDR
! 11:
! 12: #include "nest/rt-dev.h"
! 13: #include "nest/password.h"
! 14: #include "nest/cmds.h"
! 15: #include "lib/lists.h"
! 16: #include "lib/mac.h"
! 17:
! 18: CF_DEFINES
! 19:
! 20: static struct proto_config *this_proto;
! 21: static struct channel_config *this_channel;
! 22: static struct iface_patt *this_ipatt;
! 23: static struct iface_patt_node *this_ipn;
! 24: /* static struct roa_table_config *this_roa_table; */
! 25: static list *this_p_list;
! 26: static struct password_item *this_p_item;
! 27: static int password_id;
! 28:
! 29: static void
! 30: iface_patt_check(void)
! 31: {
! 32: struct iface_patt_node *pn;
! 33:
! 34: WALK_LIST(pn, this_ipatt->ipn_list)
! 35: if (!pn->pattern || pn->prefix.type)
! 36: cf_error("Interface name/mask expected, not IP prefix");
! 37: }
! 38:
! 39:
! 40: static inline void
! 41: reset_passwords(void)
! 42: {
! 43: this_p_list = NULL;
! 44: }
! 45:
! 46: static inline list *
! 47: get_passwords(void)
! 48: {
! 49: list *rv = this_p_list;
! 50: this_p_list = NULL;
! 51: return rv;
! 52: }
! 53:
! 54: static void
! 55: proto_postconfig(void)
! 56: {
! 57: CALL(this_proto->protocol->postconfig, this_proto);
! 58: this_channel = NULL;
! 59: this_proto = NULL;
! 60: }
! 61:
! 62:
! 63: #define DIRECT_CFG ((struct rt_dev_config *) this_proto)
! 64:
! 65: CF_DECLS
! 66:
! 67: CF_KEYWORDS(ROUTER, ID, PROTOCOL, TEMPLATE, PREFERENCE, DISABLED, DEBUG, ALL, OFF, DIRECT)
! 68: CF_KEYWORDS(INTERFACE, IMPORT, EXPORT, FILTER, NONE, VRF, DEFAULT, TABLE, STATES, ROUTES, FILTERS)
! 69: CF_KEYWORDS(IPV4, IPV6, VPN4, VPN6, ROA4, ROA6, FLOW4, FLOW6, SADR, MPLS)
! 70: CF_KEYWORDS(RECEIVE, LIMIT, ACTION, WARN, BLOCK, RESTART, DISABLE, KEEP, FILTERED)
! 71: CF_KEYWORDS(PASSWORD, FROM, PASSIVE, TO, ID, EVENTS, PACKETS, PROTOCOLS, INTERFACES)
! 72: CF_KEYWORDS(ALGORITHM, KEYED, HMAC, MD5, SHA1, SHA256, SHA384, SHA512)
! 73: CF_KEYWORDS(PRIMARY, STATS, COUNT, BY, FOR, COMMANDS, PREEXPORT, NOEXPORT, GENERATE)
! 74: CF_KEYWORDS(BGP, PASSWORDS, DESCRIPTION, SORTED)
! 75: CF_KEYWORDS(RELOAD, IN, OUT, MRTDUMP, MESSAGES, RESTRICT, MEMORY, IGP_METRIC, CLASS, DSCP)
! 76: CF_KEYWORDS(TIMEFORMAT, ISO, SHORT, LONG, ROUTE, PROTOCOL, BASE, LOG, S, MS, US)
! 77: CF_KEYWORDS(GRACEFUL, RESTART, WAIT, MAX, FLUSH, AS)
! 78:
! 79: /* For r_args_channel */
! 80: CF_KEYWORDS(IPV4, IPV4_MC, IPV4_MPLS, IPV6, IPV6_MC, IPV6_MPLS, IPV6_SADR, VPN4, VPN4_MC, VPN4_MPLS, VPN6, VPN6_MC, VPN6_MPLS, ROA4, ROA6, FLOW4, FLOW6, MPLS, PRI, SEC)
! 81:
! 82: CF_ENUM(T_ENUM_RTS, RTS_, DUMMY, STATIC, INHERIT, DEVICE, STATIC_DEVICE, REDIRECT,
! 83: RIP, OSPF, OSPF_IA, OSPF_EXT1, OSPF_EXT2, BGP, PIPE, BABEL)
! 84: CF_ENUM(T_ENUM_SCOPE, SCOPE_, HOST, LINK, SITE, ORGANIZATION, UNIVERSE, UNDEFINED)
! 85: CF_ENUM(T_ENUM_RTD, RTD_, UNICAST, BLACKHOLE, UNREACHABLE, PROHIBIT)
! 86: CF_ENUM(T_ENUM_ROA, ROA_, UNKNOWN, VALID, INVALID)
! 87:
! 88: %type <i32> idval
! 89: %type <f> imexport
! 90: %type <r> rtable
! 91: %type <s> optproto
! 92: %type <ra> r_args
! 93: %type <sd> sym_args
! 94: %type <i> proto_start echo_mask echo_size debug_mask debug_list debug_flag mrtdump_mask mrtdump_list mrtdump_flag export_mode limit_action net_type table_sorted tos password_algorithm
! 95: %type <ps> proto_patt proto_patt2
! 96: %type <cc> channel_start proto_channel
! 97: %type <cl> limit_spec
! 98: %type <net> r_args_for_val
! 99: %type <net_ptr> r_args_for
! 100: %type <t> r_args_channel
! 101:
! 102: CF_GRAMMAR
! 103:
! 104: /* Setting of router ID */
! 105:
! 106: conf: rtrid ;
! 107:
! 108: rtrid:
! 109: ROUTER ID idval ';' { new_config->router_id = $3; }
! 110: | ROUTER ID FROM iface_patt ';' { new_config->router_id_from = this_ipatt; }
! 111: ;
! 112:
! 113: idval:
! 114: NUM { $$ = $1; }
! 115: | '(' term ')' { $$ = f_eval_int(f_linearize($2)); }
! 116: | IP4 { $$ = ip4_to_u32($1); }
! 117: | CF_SYM_KNOWN {
! 118: if ($1->class == (SYM_CONSTANT | T_INT) || $1->class == (SYM_CONSTANT | T_QUAD))
! 119: $$ = SYM_VAL($1).i;
! 120: else if (($1->class == (SYM_CONSTANT | T_IP)) && ipa_is_ip4(SYM_VAL($1).ip))
! 121: $$ = ipa_to_u32(SYM_VAL($1).ip);
! 122: else
! 123: cf_error("Number or IPv4 address constant expected");
! 124: }
! 125: ;
! 126:
! 127: conf: gr_opts ;
! 128:
! 129: gr_opts: GRACEFUL RESTART WAIT expr ';' { new_config->gr_wait = $4; } ;
! 130:
! 131:
! 132: /* Network types (for tables, channels) */
! 133:
! 134: net_type:
! 135: IPV4 { $$ = NET_IP4; }
! 136: | IPV6 { $$ = NET_IP6; }
! 137: | IPV6 SADR { $$ = NET_IP6_SADR; }
! 138: | VPN4 { $$ = NET_VPN4; }
! 139: | VPN6 { $$ = NET_VPN6; }
! 140: | ROA4 { $$ = NET_ROA4; }
! 141: | ROA6 { $$ = NET_ROA6; }
! 142: | FLOW4{ $$ = NET_FLOW4; }
! 143: | FLOW6{ $$ = NET_FLOW6; }
! 144: | MPLS { $$ = NET_MPLS; }
! 145: ;
! 146:
! 147: CF_ENUM(T_ENUM_NETTYPE, NET_, IP4, IP6, VPN4, VPN6, ROA4, ROA6, FLOW4, FLOW6, IP6_SADR)
! 148:
! 149:
! 150: /* Creation of routing tables */
! 151:
! 152: conf: table ;
! 153:
! 154: table_sorted:
! 155: { $$ = 0; }
! 156: | SORTED { $$ = 1; }
! 157: ;
! 158:
! 159: table: net_type TABLE symbol table_sorted {
! 160: struct rtable_config *cf;
! 161: cf = rt_new_table($3, $1);
! 162: cf->sorted = $4;
! 163: }
! 164: ;
! 165:
! 166:
! 167: /* Definition of protocols */
! 168:
! 169: conf: proto { proto_postconfig(); } ;
! 170:
! 171: proto_start:
! 172: PROTOCOL { $$ = SYM_PROTO; }
! 173: | TEMPLATE { $$ = SYM_TEMPLATE; }
! 174: ;
! 175:
! 176: proto_name:
! 177: /* EMPTY */ {
! 178: struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
! 179: s->class = this_proto->class;
! 180: s->proto = this_proto;
! 181: this_proto->name = s->name;
! 182: }
! 183: | symbol {
! 184: cf_define_symbol($1, this_proto->class, proto, this_proto);
! 185: this_proto->name = $1->name;
! 186: }
! 187: | FROM CF_SYM_KNOWN {
! 188: if (($2->class != SYM_TEMPLATE) && ($2->class != SYM_PROTO)) cf_error("Template or protocol name expected");
! 189:
! 190: struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
! 191: s->class = this_proto->class;
! 192: s->proto = this_proto;
! 193: this_proto->name = s->name;
! 194:
! 195: proto_copy_config(this_proto, $2->proto);
! 196: }
! 197: | symbol FROM CF_SYM_KNOWN {
! 198: if (($3->class != SYM_TEMPLATE) && ($3->class != SYM_PROTO)) cf_error("Template or protocol name expected");
! 199:
! 200: cf_define_symbol($1, this_proto->class, proto, this_proto);
! 201: this_proto->name = $1->name;
! 202:
! 203: proto_copy_config(this_proto, $3->proto);
! 204: }
! 205: ;
! 206:
! 207: proto_item:
! 208: /* EMPTY */
! 209: | DISABLED bool { this_proto->disabled = $2; }
! 210: | DEBUG debug_mask { this_proto->debug = $2; }
! 211: | MRTDUMP mrtdump_mask { this_proto->mrtdump = $2; }
! 212: | ROUTER ID idval { this_proto->router_id = $3; }
! 213: | DESCRIPTION text { this_proto->dsc = $2; }
! 214: | VRF text { this_proto->vrf = if_get_by_name($2); this_proto->vrf_set = 1; }
! 215: | VRF DEFAULT { this_proto->vrf = NULL; this_proto->vrf_set = 1; }
! 216: ;
! 217:
! 218:
! 219: channel_start: net_type
! 220: {
! 221: $$ = this_channel = channel_config_get(NULL, net_label[$1], $1, this_proto);
! 222: };
! 223:
! 224: channel_item:
! 225: TABLE rtable {
! 226: if (this_channel->net_type && ($2->addr_type != this_channel->net_type))
! 227: cf_error("Incompatible table type");
! 228: this_channel->table = $2;
! 229: }
! 230: | IMPORT imexport { this_channel->in_filter = $2; }
! 231: | EXPORT imexport { this_channel->out_filter = $2; }
! 232: | RECEIVE LIMIT limit_spec { this_channel->rx_limit = $3; }
! 233: | IMPORT LIMIT limit_spec { this_channel->in_limit = $3; }
! 234: | EXPORT LIMIT limit_spec { this_channel->out_limit = $3; }
! 235: | PREFERENCE expr { this_channel->preference = $2; check_u16($2); }
! 236: | IMPORT KEEP FILTERED bool { this_channel->in_keep_filtered = $4; }
! 237: ;
! 238:
! 239: channel_opts:
! 240: /* empty */
! 241: | channel_opts channel_item ';'
! 242: ;
! 243:
! 244: channel_opt_list:
! 245: /* empty */
! 246: | '{' channel_opts '}'
! 247: ;
! 248:
! 249: channel_end:
! 250: {
! 251: if (!this_channel->table)
! 252: cf_error("Routing table not specified");
! 253:
! 254: this_channel = NULL;
! 255: };
! 256:
! 257: proto_channel: channel_start channel_opt_list channel_end;
! 258:
! 259:
! 260: rtable: CF_SYM_KNOWN { cf_assert_symbol($1, SYM_TABLE); $$ = $1->table; } ;
! 261:
! 262: imexport:
! 263: FILTER filter { $$ = $2; }
! 264: | where_filter
! 265: | ALL { $$ = FILTER_ACCEPT; }
! 266: | NONE { $$ = FILTER_REJECT; }
! 267: ;
! 268:
! 269: limit_action:
! 270: /* default */ { $$ = PLA_DISABLE; }
! 271: | ACTION WARN { $$ = PLA_WARN; }
! 272: | ACTION BLOCK { $$ = PLA_BLOCK; }
! 273: | ACTION RESTART { $$ = PLA_RESTART; }
! 274: | ACTION DISABLE { $$ = PLA_DISABLE; }
! 275: ;
! 276:
! 277: limit_spec:
! 278: expr limit_action { $$ = (struct channel_limit){ .limit = $1, $$.action = $2 }; }
! 279: | OFF { $$ = (struct channel_limit){}; }
! 280: ;
! 281:
! 282:
! 283: conf: debug_default ;
! 284:
! 285: debug_default:
! 286: DEBUG PROTOCOLS debug_mask { new_config->proto_default_debug = $3; }
! 287: | DEBUG COMMANDS expr { new_config->cli_debug = $3; }
! 288: ;
! 289:
! 290: /* MRTDUMP PROTOCOLS is in systep/unix/config.Y */
! 291:
! 292: conf: timeformat_base ;
! 293:
! 294: timeformat_which:
! 295: ROUTE { $$ = &new_config->tf_route; }
! 296: | PROTOCOL { $$ = &new_config->tf_proto; }
! 297: | BASE { $$ = &new_config->tf_base; }
! 298: | LOG { $$ = &new_config->tf_log; }
! 299: ;
! 300:
! 301: timeformat_spec:
! 302: timeformat_which TEXT { *$1 = (struct timeformat){$2, NULL, 0}; }
! 303: | timeformat_which TEXT expr TEXT { *$1 = (struct timeformat){$2, $4, (s64) $3 S_}; }
! 304: | timeformat_which ISO SHORT { *$1 = TM_ISO_SHORT_S; }
! 305: | timeformat_which ISO SHORT MS { *$1 = TM_ISO_SHORT_MS; }
! 306: | timeformat_which ISO SHORT US { *$1 = TM_ISO_SHORT_US; }
! 307: | timeformat_which ISO LONG { *$1 = TM_ISO_LONG_S; }
! 308: | timeformat_which ISO LONG MS { *$1 = TM_ISO_LONG_MS; }
! 309: | timeformat_which ISO LONG US { *$1 = TM_ISO_LONG_US; }
! 310: ;
! 311:
! 312: timeformat_base:
! 313: TIMEFORMAT timeformat_spec ';'
! 314: ;
! 315:
! 316:
! 317: /* Interface patterns */
! 318:
! 319: iface_patt_node_init:
! 320: /* EMPTY */ {
! 321: struct iface_patt_node *ipn = cfg_allocz(sizeof(struct iface_patt_node));
! 322: add_tail(&this_ipatt->ipn_list, NODE ipn);
! 323: this_ipn = ipn;
! 324: }
! 325: ;
! 326:
! 327: iface_patt_node_body:
! 328: TEXT { this_ipn->pattern = $1; /* this_ipn->prefix stays zero */ }
! 329: | opttext net_or_ipa { this_ipn->pattern = $1; this_ipn->prefix = $2; }
! 330: ;
! 331:
! 332: iface_negate:
! 333: { this_ipn->positive = 1; }
! 334: | '-' { this_ipn->positive = 0; }
! 335: ;
! 336:
! 337: iface_patt_node:
! 338: iface_patt_node_init iface_negate iface_patt_node_body
! 339: ;
! 340:
! 341:
! 342: iface_patt_list:
! 343: iface_patt_node
! 344: | iface_patt_list ',' iface_patt_node
! 345: ;
! 346:
! 347: /* For name/mask-only iface patterns */
! 348: iface_patt_list_nopx: iface_patt_list { iface_patt_check(); }
! 349:
! 350: iface_patt_init: {
! 351: /* Generic this_ipatt init */
! 352: this_ipatt = cfg_allocz(sizeof(struct iface_patt));
! 353: init_list(&this_ipatt->ipn_list);
! 354: }
! 355: ;
! 356:
! 357: iface_patt:
! 358: iface_patt_init iface_patt_list
! 359: ;
! 360:
! 361: tos:
! 362: CLASS expr { $$ = $2 & 0xfc; if ($2 > 255) cf_error("TX class must be in range 0-255"); }
! 363: | DSCP expr { $$ = ($2 & 0x3f) << 2; if ($2 > 63) cf_error("TX DSCP must be in range 0-63"); }
! 364: ;
! 365:
! 366: /* Direct device route protocol */
! 367:
! 368: proto: dev_proto '}' ;
! 369:
! 370: dev_proto_start: proto_start DIRECT {
! 371: this_proto = proto_config_new(&proto_device, $1);
! 372: init_list(&DIRECT_CFG->iface_list);
! 373: }
! 374: ;
! 375:
! 376: dev_proto:
! 377: dev_proto_start proto_name '{'
! 378: | dev_proto proto_item ';'
! 379: | dev_proto proto_channel ';'
! 380: | dev_proto dev_iface_patt ';'
! 381: | dev_proto CHECK LINK bool ';' { DIRECT_CFG->check_link = $4; }
! 382: ;
! 383:
! 384: dev_iface_init:
! 385: /* EMPTY */ {
! 386: this_ipatt = cfg_allocz(sizeof(struct iface_patt));
! 387: add_tail(&DIRECT_CFG->iface_list, NODE this_ipatt);
! 388: init_list(&this_ipatt->ipn_list);
! 389: }
! 390: ;
! 391:
! 392: dev_iface_patt:
! 393: INTERFACE dev_iface_init iface_patt_list
! 394: ;
! 395:
! 396: /* Debug flags */
! 397:
! 398: debug_mask:
! 399: ALL { $$ = ~0; }
! 400: | OFF { $$ = 0; }
! 401: | '{' debug_list '}' { $$ = $2; }
! 402: ;
! 403:
! 404: debug_list:
! 405: debug_flag
! 406: | debug_list ',' debug_flag { $$ = $1 | $3; }
! 407: ;
! 408:
! 409: debug_flag:
! 410: STATES { $$ = D_STATES; }
! 411: | ROUTES { $$ = D_ROUTES; }
! 412: | FILTERS { $$ = D_FILTERS; }
! 413: | INTERFACES { $$ = D_IFACES; }
! 414: | EVENTS { $$ = D_EVENTS; }
! 415: | PACKETS { $$ = D_PACKETS; }
! 416: ;
! 417:
! 418: /* MRTDump flags */
! 419:
! 420: mrtdump_mask:
! 421: ALL { $$ = ~0; }
! 422: | OFF { $$ = 0; }
! 423: | '{' mrtdump_list '}' { $$ = $2; }
! 424: ;
! 425:
! 426: mrtdump_list:
! 427: mrtdump_flag
! 428: | mrtdump_list ',' mrtdump_flag { $$ = $1 | $3; }
! 429: ;
! 430:
! 431: mrtdump_flag:
! 432: STATES { $$ = MD_STATES; }
! 433: | MESSAGES { $$ = MD_MESSAGES; }
! 434: ;
! 435:
! 436: /* Password lists */
! 437:
! 438: password_list:
! 439: PASSWORDS '{' password_items '}'
! 440: | password_item
! 441: ;
! 442:
! 443: password_items:
! 444: /* empty */
! 445: | password_item ';' password_items
! 446: ;
! 447:
! 448: password_item:
! 449: password_item_begin '{' password_item_params '}'
! 450: | password_item_begin
! 451: ;
! 452:
! 453: password_item_begin:
! 454: PASSWORD text {
! 455: if (!this_p_list) {
! 456: this_p_list = cfg_alloc(sizeof(list));
! 457: init_list(this_p_list);
! 458: password_id = 1;
! 459: }
! 460: this_p_item = cfg_alloc(sizeof (struct password_item));
! 461: this_p_item->password = $2;
! 462: this_p_item->length = strlen($2);
! 463: this_p_item->genfrom = 0;
! 464: this_p_item->gento = TIME_INFINITY;
! 465: this_p_item->accfrom = 0;
! 466: this_p_item->accto = TIME_INFINITY;
! 467: this_p_item->id = password_id++;
! 468: this_p_item->alg = ALG_UNDEFINED;
! 469: add_tail(this_p_list, &this_p_item->n);
! 470: }
! 471: ;
! 472:
! 473: password_item_params:
! 474: /* empty */ { }
! 475: | GENERATE FROM time ';' password_item_params { this_p_item->genfrom = $3; }
! 476: | GENERATE TO time ';' password_item_params { this_p_item->gento = $3; }
! 477: | ACCEPT FROM time ';' password_item_params { this_p_item->accfrom = $3; }
! 478: | ACCEPT TO time ';' password_item_params { this_p_item->accto = $3; }
! 479: | FROM time ';' password_item_params { this_p_item->genfrom = this_p_item->accfrom = $2; }
! 480: | TO time ';' password_item_params { this_p_item->gento = this_p_item->accto = $2; }
! 481: | ID expr ';' password_item_params { this_p_item->id = $2; if ($2 <= 0) cf_error("Password ID has to be greated than zero."); }
! 482: | ALGORITHM password_algorithm ';' password_item_params { this_p_item->alg = $2; }
! 483: ;
! 484:
! 485: password_algorithm:
! 486: KEYED MD5 { $$ = ALG_MD5; }
! 487: | KEYED SHA1 { $$ = ALG_SHA1; }
! 488: | KEYED SHA256 { $$ = ALG_SHA256; }
! 489: | KEYED SHA384 { $$ = ALG_SHA384; }
! 490: | KEYED SHA512 { $$ = ALG_SHA512; }
! 491: | HMAC MD5 { $$ = ALG_HMAC_MD5; }
! 492: | HMAC SHA1 { $$ = ALG_HMAC_SHA1; }
! 493: | HMAC SHA256 { $$ = ALG_HMAC_SHA256; }
! 494: | HMAC SHA384 { $$ = ALG_HMAC_SHA384; }
! 495: | HMAC SHA512 { $$ = ALG_HMAC_SHA512; }
! 496: ;
! 497:
! 498: /* Core commands */
! 499: CF_CLI_HELP(SHOW, ..., [[Show status information]])
! 500:
! 501: CF_CLI(SHOW STATUS,,, [[Show router status]])
! 502: { cmd_show_status(); } ;
! 503:
! 504: CF_CLI(SHOW MEMORY,,, [[Show memory usage]])
! 505: { cmd_show_memory(); } ;
! 506:
! 507: CF_CLI(SHOW PROTOCOLS, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocols]])
! 508: { proto_apply_cmd($3, proto_cmd_show, 0, 0); } ;
! 509:
! 510: CF_CLI(SHOW PROTOCOLS ALL, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocol details]])
! 511: { proto_apply_cmd($4, proto_cmd_show, 0, 1); } ;
! 512:
! 513: optproto:
! 514: CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$ = $1; }
! 515: | /* empty */ { $$ = NULL; }
! 516: ;
! 517:
! 518: CF_CLI(SHOW INTERFACES,,, [[Show network interfaces]])
! 519: { if_show(); } ;
! 520:
! 521: CF_CLI(SHOW INTERFACES SUMMARY,,, [[Show summary of network interfaces]])
! 522: { if_show_summary(); } ;
! 523:
! 524: CF_CLI_HELP(SHOW ROUTE, ..., [[Show routing table]])
! 525: CF_CLI(SHOW ROUTE, r_args, [[[<prefix>|for <prefix>|for <ip>] [table <t>] [filter <f>|where <cond>] [all] [primary] [filtered] [(export|preexport|noexport) <p>] [protocol <p>] [stats|count]]], [[Show routing table]])
! 526: { rt_show($3); } ;
! 527:
! 528: r_args:
! 529: /* empty */ {
! 530: $$ = cfg_allocz(sizeof(struct rt_show_data));
! 531: init_list(&($$->tables));
! 532: $$->filter = FILTER_ACCEPT;
! 533: $$->running_on_config = new_config->fallback;
! 534: }
! 535: | r_args net_any {
! 536: $$ = $1;
! 537: if ($$->addr) cf_error("Only one prefix expected");
! 538: $$->addr = $2;
! 539: }
! 540: | r_args FOR r_args_for {
! 541: $$ = $1;
! 542: if ($$->addr) cf_error("Only one prefix expected");
! 543: $$->show_for = 1;
! 544: $$->addr = $3;
! 545: }
! 546: | r_args TABLE CF_SYM_KNOWN {
! 547: cf_assert_symbol($3, SYM_TABLE);
! 548: $$ = $1;
! 549: rt_show_add_table($$, $3->table->table);
! 550: $$->tables_defined_by = RSD_TDB_DIRECT;
! 551: }
! 552: | r_args TABLE ALL {
! 553: struct rtable_config *t;
! 554: $$ = $1;
! 555: WALK_LIST(t, config->tables)
! 556: rt_show_add_table($$, t->table);
! 557: $$->tables_defined_by = RSD_TDB_ALL;
! 558: }
! 559: | r_args IMPORT TABLE CF_SYM_KNOWN '.' r_args_channel {
! 560: cf_assert_symbol($4, SYM_PROTO);
! 561: $$ = $1;
! 562: struct proto_config *cf = $4->proto;
! 563: if (!cf->proto) cf_error("%s is not a protocol", $4->name);
! 564: struct channel *c = proto_find_channel_by_name(cf->proto, $6);
! 565: if (!c) cf_error("Channel %s.%s not found", $4->name, $6);
! 566: if (!c->in_table) cf_error("No import table in channel %s.%s", $4->name, $6);
! 567: rt_show_add_table($$, c->in_table);
! 568: $$->tables_defined_by = RSD_TDB_DIRECT;
! 569: }
! 570: | r_args EXPORT TABLE CF_SYM_KNOWN '.' r_args_channel {
! 571: cf_assert_symbol($4, SYM_PROTO);
! 572: $$ = $1;
! 573: struct proto_config *cf = $4->proto;
! 574: if (!cf->proto) cf_error("%s is not a protocol", $4->name);
! 575: struct channel *c = proto_find_channel_by_name(cf->proto, $6);
! 576: if (!c) cf_error("Channel %s.%s not found", $4->name, $6);
! 577: if (!c->out_table) cf_error("No export table in channel %s.%s", $4->name, $6);
! 578: rt_show_add_table($$, c->out_table);
! 579: $$->tables_defined_by = RSD_TDB_DIRECT;
! 580: }
! 581: | r_args FILTER filter {
! 582: $$ = $1;
! 583: if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
! 584: $$->filter = $3;
! 585: }
! 586: | r_args where_filter {
! 587: $$ = $1;
! 588: if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
! 589: $$->filter = $2;
! 590: }
! 591: | r_args ALL {
! 592: $$ = $1;
! 593: $$->verbose = 1;
! 594: }
! 595: | r_args PRIMARY {
! 596: $$ = $1;
! 597: $$->primary_only = 1;
! 598: }
! 599: | r_args FILTERED {
! 600: $$ = $1;
! 601: $$->filtered = 1;
! 602: }
! 603: | r_args export_mode CF_SYM_KNOWN {
! 604: cf_assert_symbol($3, SYM_PROTO);
! 605: struct proto_config *c = (struct proto_config *) $3->proto;
! 606: $$ = $1;
! 607: if ($$->export_mode) cf_error("Export specified twice");
! 608: if (!c->proto) cf_error("%s is not a protocol", $3->name);
! 609: $$->export_mode = $2;
! 610: $$->export_protocol = c->proto;
! 611: $$->tables_defined_by = RSD_TDB_INDIRECT;
! 612: }
! 613: | r_args export_mode CF_SYM_KNOWN '.' r_args_channel {
! 614: cf_assert_symbol($3, SYM_PROTO);
! 615: struct proto_config *c = (struct proto_config *) $3->proto;
! 616: $$ = $1;
! 617: if ($$->export_mode) cf_error("Export specified twice");
! 618: if (!c->proto) cf_error("%s is not a protocol", $3->name);
! 619: $$->export_mode = $2;
! 620: $$->export_channel = proto_find_channel_by_name(c->proto, $5);
! 621: if (!$$->export_channel) cf_error("Export channel not found");
! 622: $$->tables_defined_by = RSD_TDB_INDIRECT;
! 623: }
! 624: | r_args PROTOCOL CF_SYM_KNOWN {
! 625: cf_assert_symbol($3, SYM_PROTO);
! 626: struct proto_config *c = (struct proto_config *) $3->proto;
! 627: $$ = $1;
! 628: if ($$->show_protocol) cf_error("Protocol specified twice");
! 629: if (!c->proto) cf_error("%s is not a protocol", $3->name);
! 630: $$->show_protocol = c->proto;
! 631: $$->tables_defined_by = RSD_TDB_INDIRECT;
! 632: }
! 633: | r_args STATS {
! 634: $$ = $1;
! 635: $$->stats = 1;
! 636: }
! 637: | r_args COUNT {
! 638: $$ = $1;
! 639: $$->stats = 2;
! 640: }
! 641: ;
! 642:
! 643: r_args_for:
! 644: r_args_for_val {
! 645: $$ = cfg_alloc($1.length);
! 646: net_copy($$, &$1);
! 647: }
! 648: | net_vpn4_
! 649: | net_vpn6_
! 650: | net_ip6_sadr_
! 651: | VPN_RD IP4 {
! 652: $$ = cfg_alloc(sizeof(net_addr_vpn4));
! 653: net_fill_vpn4($$, $2, IP4_MAX_PREFIX_LENGTH, $1);
! 654: }
! 655: | VPN_RD IP6 {
! 656: $$ = cfg_alloc(sizeof(net_addr_vpn6));
! 657: net_fill_vpn6($$, $2, IP6_MAX_PREFIX_LENGTH, $1);
! 658: }
! 659: | IP6 FROM IP6 {
! 660: $$ = cfg_alloc(sizeof(net_addr_ip6_sadr));
! 661: net_fill_ip6_sadr($$, $1, IP6_MAX_PREFIX_LENGTH, $3, IP6_MAX_PREFIX_LENGTH);
! 662: }
! 663: | CF_SYM_KNOWN {
! 664: if ($1->class == (SYM_CONSTANT | T_IP))
! 665: {
! 666: $$ = cfg_alloc(ipa_is_ip4(SYM_VAL($1).ip) ? sizeof(net_addr_ip4) : sizeof(net_addr_ip6));
! 667: net_fill_ip_host($$, SYM_VAL($1).ip);
! 668: }
! 669: else if (($1->class == (SYM_CONSTANT | T_NET)) && net_type_match(SYM_VAL($1).net, NB_IP | NB_VPN))
! 670: $$ = (net_addr *) SYM_VAL($1).net; /* Avoid const warning */
! 671: else
! 672: cf_error("IP address or network constant expected");
! 673: }
! 674: ;
! 675:
! 676: r_args_for_val:
! 677: net_ip4_
! 678: | net_ip6_
! 679: | IP4 { net_fill_ip4(&($$), $1, IP4_MAX_PREFIX_LENGTH); }
! 680: | IP6 { net_fill_ip6(&($$), $1, IP6_MAX_PREFIX_LENGTH); }
! 681:
! 682: export_mode:
! 683: PREEXPORT { $$ = RSEM_PREEXPORT; }
! 684: | EXPORT { $$ = RSEM_EXPORT; }
! 685: | NOEXPORT { $$ = RSEM_NOEXPORT; }
! 686: ;
! 687:
! 688: /* This is ugly hack */
! 689: r_args_channel:
! 690: IPV4 { $$ = "ipv4"; }
! 691: | IPV4_MC { $$ = "ipv4-mc"; }
! 692: | IPV4_MPLS { $$ = "ipv4-mpls"; }
! 693: | IPV6 { $$ = "ipv6"; }
! 694: | IPV6_MC { $$ = "ipv6-mc"; }
! 695: | IPV6_MPLS { $$ = "ipv6-mpls"; }
! 696: | IPV6_SADR { $$ = "ipv6-sadr"; }
! 697: | VPN4 { $$ = "vpn4"; }
! 698: | VPN4_MC { $$ = "vpn4-mc"; }
! 699: | VPN4_MPLS { $$ = "vpn4-mpls"; }
! 700: | VPN6 { $$ = "vpn6"; }
! 701: | VPN6_MC { $$ = "vpn6-mc"; }
! 702: | VPN6_MPLS { $$ = "vpn6-mpls"; }
! 703: | ROA4 { $$ = "roa4"; }
! 704: | ROA6 { $$ = "roa6"; }
! 705: | FLOW4 { $$ = "flow4"; }
! 706: | FLOW6 { $$ = "flow6"; }
! 707: | MPLS { $$ = "mpls"; }
! 708: | PRI { $$ = "pri"; }
! 709: | SEC { $$ = "sec"; }
! 710: ;
! 711:
! 712: CF_CLI_HELP(SHOW SYMBOLS, ..., [[Show all known symbolic names]])
! 713: CF_CLI(SHOW SYMBOLS, sym_args, [table|filter|function|protocol|template|<symbol>], [[Show all known symbolic names]])
! 714: { cmd_show_symbols($3); } ;
! 715:
! 716: sym_args:
! 717: /* empty */ {
! 718: $$ = cfg_allocz(sizeof(struct sym_show_data));
! 719: }
! 720: | sym_args TABLE { $$ = $1; $$->type = SYM_TABLE; }
! 721: | sym_args FUNCTION { $$ = $1; $$->type = SYM_FUNCTION; }
! 722: | sym_args FILTER { $$ = $1; $$->type = SYM_FILTER; }
! 723: | sym_args PROTOCOL { $$ = $1; $$->type = SYM_PROTO; }
! 724: | sym_args TEMPLATE { $$ = $1; $$->type = SYM_TEMPLATE; }
! 725: | sym_args symbol { $$ = $1; $$->sym = $2; }
! 726: ;
! 727:
! 728:
! 729: CF_CLI_HELP(DUMP, ..., [[Dump debugging information]])
! 730: CF_CLI(DUMP RESOURCES,,, [[Dump all allocated resource]])
! 731: { rdump(&root_pool); cli_msg(0, ""); } ;
! 732: CF_CLI(DUMP SOCKETS,,, [[Dump open sockets]])
! 733: { sk_dump_all(); cli_msg(0, ""); } ;
! 734: CF_CLI(DUMP EVENTS,,, [[Dump event log]])
! 735: { io_log_dump(); cli_msg(0, ""); } ;
! 736: CF_CLI(DUMP INTERFACES,,, [[Dump interface information]])
! 737: { if_dump_all(); cli_msg(0, ""); } ;
! 738: CF_CLI(DUMP NEIGHBORS,,, [[Dump neighbor cache]])
! 739: { neigh_dump_all(); cli_msg(0, ""); } ;
! 740: CF_CLI(DUMP ATTRIBUTES,,, [[Dump attribute cache]])
! 741: { rta_dump_all(); cli_msg(0, ""); } ;
! 742: CF_CLI(DUMP ROUTES,,, [[Dump routing table]])
! 743: { rt_dump_all(); cli_msg(0, ""); } ;
! 744: CF_CLI(DUMP PROTOCOLS,,, [[Dump protocol information]])
! 745: { protos_dump_all(); cli_msg(0, ""); } ;
! 746: CF_CLI(DUMP FILTER ALL,,, [[Dump all filters in linearized form]])
! 747: { filters_dump_all(); cli_msg(0, ""); } ;
! 748:
! 749: CF_CLI(EVAL, term, <expr>, [[Evaluate an expression]])
! 750: { cmd_eval(f_linearize($2)); } ;
! 751:
! 752: CF_CLI_HELP(ECHO, ..., [[Control echoing of log messages]])
! 753: CF_CLI(ECHO, echo_mask echo_size, (all | off | { debug|trace|info|remote|warning|error|auth [, ...] }) [<buffer-size>], [[Control echoing of log messages]]) {
! 754: cli_set_log_echo(this_cli, $2, $3);
! 755: cli_msg(0, "");
! 756: } ;
! 757:
! 758: echo_mask:
! 759: ALL { $$ = ~0; }
! 760: | OFF { $$ = 0; }
! 761: | '{' log_mask_list '}' { $$ = $2; }
! 762: ;
! 763:
! 764: echo_size:
! 765: /* empty */ { $$ = 4096; }
! 766: | NUM {
! 767: if ($1 < 256 || $1 > 65536) cf_error("Invalid log buffer size");
! 768: $$ = $1;
! 769: }
! 770: ;
! 771:
! 772: CF_CLI(DISABLE, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Disable protocol]])
! 773: { proto_apply_cmd($2, proto_cmd_disable, 1, (uintptr_t) $3); } ;
! 774: CF_CLI(ENABLE, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Enable protocol]])
! 775: { proto_apply_cmd($2, proto_cmd_enable, 1, (uintptr_t) $3); } ;
! 776: CF_CLI(RESTART, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Restart protocol]])
! 777: { proto_apply_cmd($2, proto_cmd_restart, 1, (uintptr_t) $3); } ;
! 778: CF_CLI(RELOAD, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol]])
! 779: { proto_apply_cmd($2, proto_cmd_reload, 1, CMD_RELOAD); } ;
! 780: CF_CLI(RELOAD IN, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just imported routes)]])
! 781: { proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_IN); } ;
! 782: CF_CLI(RELOAD OUT, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just exported routes)]])
! 783: { proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_OUT); } ;
! 784:
! 785: CF_CLI_HELP(DEBUG, ..., [[Control protocol debugging via BIRD logs]])
! 786: CF_CLI(DEBUG, proto_patt debug_mask, (<protocol> | \"<pattern>\" | all) (all | off | { states|routes|filters|interfaces|events|packets [, ...] }), [[Control protocol debugging via BIRD logs]])
! 787: { proto_apply_cmd($2, proto_cmd_debug, 1, $3); } ;
! 788:
! 789: CF_CLI_HELP(MRTDUMP, ..., [[Control protocol debugging via MRTdump files]])
! 790: CF_CLI(MRTDUMP, proto_patt mrtdump_mask, (<protocol> | \"<pattern>\" | all) (all | off | { states|messages [, ...] }), [[Control protocol debugging via MRTdump format]])
! 791: { proto_apply_cmd($2, proto_cmd_mrtdump, 1, $3); } ;
! 792:
! 793: CF_CLI(RESTRICT,,,[[Restrict current CLI session to safe commands]])
! 794: { this_cli->restricted = 1; cli_msg(16, "Access restricted"); } ;
! 795:
! 796: proto_patt:
! 797: CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$.ptr = $1; $$.patt = 0; }
! 798: | ALL { $$.ptr = NULL; $$.patt = 1; }
! 799: | TEXT { $$.ptr = $1; $$.patt = 1; }
! 800: ;
! 801:
! 802: proto_patt2:
! 803: CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$.ptr = $1; $$.patt = 0; }
! 804: | { $$.ptr = NULL; $$.patt = 1; }
! 805: | TEXT { $$.ptr = $1; $$.patt = 1; }
! 806: ;
! 807:
! 808: dynamic_attr: IGP_METRIC { $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_GEN_IGP_METRIC); } ;
! 809:
! 810:
! 811: CF_CODE
! 812:
! 813: CF_END
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>