File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / bird2 / nest / config.Y
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Mon Oct 21 16:03:56 2019 UTC (4 years, 9 months ago) by misho
Branches: bird2, MAIN
CVS tags: v2_0_7p0, HEAD
bird2 ver 2.0.7

    1: /*
    2:  *	BIRD -- Core Configuration
    3:  *
    4:  *	(c) 1998--2000 Martin Mares <mj@ucw.cz>
    5:  *      (c) 2004       Ondrej Filip <feela@network.cz>
    6:  *
    7:  *	Can be freely distributed and used under the terms of the GNU GPL.
    8:  */
    9: 
   10: CF_HDR
   11: 
   12: #include "nest/rt-dev.h"
   13: #include "nest/password.h"
   14: #include "nest/cmds.h"
   15: #include "lib/lists.h"
   16: #include "lib/mac.h"
   17: 
   18: CF_DEFINES
   19: 
   20: static struct proto_config *this_proto;
   21: static struct channel_config *this_channel;
   22: static struct iface_patt *this_ipatt;
   23: static struct iface_patt_node *this_ipn;
   24: /* static struct roa_table_config *this_roa_table; */
   25: static list *this_p_list;
   26: static struct password_item *this_p_item;
   27: static int password_id;
   28: 
   29: static void
   30: iface_patt_check(void)
   31: {
   32:   struct iface_patt_node *pn;
   33: 
   34:   WALK_LIST(pn, this_ipatt->ipn_list)
   35:     if (!pn->pattern || pn->prefix.type)
   36:       cf_error("Interface name/mask expected, not IP prefix");
   37: }
   38: 
   39: 
   40: static inline void
   41: reset_passwords(void)
   42: {
   43:   this_p_list = NULL;
   44: }
   45: 
   46: static inline list *
   47: get_passwords(void)
   48: {
   49:   list *rv = this_p_list;
   50:   this_p_list = NULL;
   51:   return rv;
   52: }
   53: 
   54: static void
   55: proto_postconfig(void)
   56: {
   57:   CALL(this_proto->protocol->postconfig, this_proto);
   58:   this_channel = NULL;
   59:   this_proto = NULL;
   60: }
   61: 
   62: 
   63: #define DIRECT_CFG ((struct rt_dev_config *) this_proto)
   64: 
   65: CF_DECLS
   66: 
   67: CF_KEYWORDS(ROUTER, ID, PROTOCOL, TEMPLATE, PREFERENCE, DISABLED, DEBUG, ALL, OFF, DIRECT)
   68: CF_KEYWORDS(INTERFACE, IMPORT, EXPORT, FILTER, NONE, VRF, DEFAULT, TABLE, STATES, ROUTES, FILTERS)
   69: CF_KEYWORDS(IPV4, IPV6, VPN4, VPN6, ROA4, ROA6, FLOW4, FLOW6, SADR, MPLS)
   70: CF_KEYWORDS(RECEIVE, LIMIT, ACTION, WARN, BLOCK, RESTART, DISABLE, KEEP, FILTERED)
   71: CF_KEYWORDS(PASSWORD, FROM, PASSIVE, TO, ID, EVENTS, PACKETS, PROTOCOLS, INTERFACES)
   72: CF_KEYWORDS(ALGORITHM, KEYED, HMAC, MD5, SHA1, SHA256, SHA384, SHA512)
   73: CF_KEYWORDS(PRIMARY, STATS, COUNT, BY, FOR, COMMANDS, PREEXPORT, NOEXPORT, GENERATE)
   74: CF_KEYWORDS(BGP, PASSWORDS, DESCRIPTION, SORTED)
   75: CF_KEYWORDS(RELOAD, IN, OUT, MRTDUMP, MESSAGES, RESTRICT, MEMORY, IGP_METRIC, CLASS, DSCP)
   76: CF_KEYWORDS(TIMEFORMAT, ISO, SHORT, LONG, ROUTE, PROTOCOL, BASE, LOG, S, MS, US)
   77: CF_KEYWORDS(GRACEFUL, RESTART, WAIT, MAX, FLUSH, AS)
   78: 
   79: /* For r_args_channel */
   80: CF_KEYWORDS(IPV4, IPV4_MC, IPV4_MPLS, IPV6, IPV6_MC, IPV6_MPLS, IPV6_SADR, VPN4, VPN4_MC, VPN4_MPLS, VPN6, VPN6_MC, VPN6_MPLS, ROA4, ROA6, FLOW4, FLOW6, MPLS, PRI, SEC)
   81: 
   82: CF_ENUM(T_ENUM_RTS, RTS_, DUMMY, STATIC, INHERIT, DEVICE, STATIC_DEVICE, REDIRECT,
   83: 	RIP, OSPF, OSPF_IA, OSPF_EXT1, OSPF_EXT2, BGP, PIPE, BABEL)
   84: CF_ENUM(T_ENUM_SCOPE, SCOPE_, HOST, LINK, SITE, ORGANIZATION, UNIVERSE, UNDEFINED)
   85: CF_ENUM(T_ENUM_RTD, RTD_, UNICAST, BLACKHOLE, UNREACHABLE, PROHIBIT)
   86: CF_ENUM(T_ENUM_ROA, ROA_, UNKNOWN, VALID, INVALID)
   87: 
   88: %type <i32> idval
   89: %type <f> imexport
   90: %type <r> rtable
   91: %type <s> optproto
   92: %type <ra> r_args
   93: %type <sd> sym_args
   94: %type <i> proto_start echo_mask echo_size debug_mask debug_list debug_flag mrtdump_mask mrtdump_list mrtdump_flag export_mode limit_action net_type table_sorted tos password_algorithm
   95: %type <ps> proto_patt proto_patt2
   96: %type <cc> channel_start proto_channel
   97: %type <cl> limit_spec
   98: %type <net> r_args_for_val
   99: %type <net_ptr> r_args_for
  100: %type <t> r_args_channel
  101: 
  102: CF_GRAMMAR
  103: 
  104: /* Setting of router ID */
  105: 
  106: conf: rtrid ;
  107: 
  108: rtrid:
  109:    ROUTER ID idval ';' { new_config->router_id = $3; }
  110:  | ROUTER ID FROM iface_patt ';' { new_config->router_id_from = this_ipatt; }
  111:  ;
  112: 
  113: idval:
  114:    NUM { $$ = $1; }
  115:  | '(' term ')' { $$ = f_eval_int(f_linearize($2)); }
  116:  | IP4 { $$ = ip4_to_u32($1); }
  117:  | CF_SYM_KNOWN {
  118:      if ($1->class == (SYM_CONSTANT | T_INT) || $1->class == (SYM_CONSTANT | T_QUAD))
  119:        $$ = SYM_VAL($1).i;
  120:      else if (($1->class == (SYM_CONSTANT | T_IP)) && ipa_is_ip4(SYM_VAL($1).ip))
  121:        $$ = ipa_to_u32(SYM_VAL($1).ip);
  122:      else
  123:        cf_error("Number or IPv4 address constant expected");
  124:    }
  125:  ;
  126: 
  127: conf: gr_opts ;
  128: 
  129: gr_opts: GRACEFUL RESTART WAIT expr ';' { new_config->gr_wait = $4; } ;
  130: 
  131: 
  132: /* Network types (for tables, channels) */
  133: 
  134: net_type:
  135:    IPV4 { $$ = NET_IP4; }
  136:  | IPV6 { $$ = NET_IP6; }
  137:  | IPV6 SADR { $$ = NET_IP6_SADR; }
  138:  | VPN4 { $$ = NET_VPN4; }
  139:  | VPN6 { $$ = NET_VPN6; }
  140:  | ROA4 { $$ = NET_ROA4; }
  141:  | ROA6 { $$ = NET_ROA6; }
  142:  | FLOW4{ $$ = NET_FLOW4; }
  143:  | FLOW6{ $$ = NET_FLOW6; }
  144:  | MPLS { $$ = NET_MPLS; }
  145:  ;
  146: 
  147: CF_ENUM(T_ENUM_NETTYPE, NET_, IP4, IP6, VPN4, VPN6, ROA4, ROA6, FLOW4, FLOW6, IP6_SADR)
  148: 
  149: 
  150: /* Creation of routing tables */
  151: 
  152: conf: table ;
  153: 
  154: table_sorted:
  155: 	  { $$ = 0; }
  156:  | SORTED { $$ = 1; }
  157:  ;
  158: 
  159: table: net_type TABLE symbol table_sorted {
  160:    struct rtable_config *cf;
  161:    cf = rt_new_table($3, $1);
  162:    cf->sorted = $4;
  163:    }
  164:  ;
  165: 
  166: 
  167: /* Definition of protocols */
  168: 
  169: conf: proto { proto_postconfig(); } ;
  170: 
  171: proto_start:
  172:    PROTOCOL { $$ = SYM_PROTO; }
  173:  | TEMPLATE { $$ = SYM_TEMPLATE; }
  174:  ;
  175: 
  176: proto_name:
  177:    /* EMPTY */ {
  178:      struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
  179:      s->class = this_proto->class;
  180:      s->proto = this_proto;
  181:      this_proto->name = s->name;
  182:      }
  183:  | symbol {
  184:      cf_define_symbol($1, this_proto->class, proto, this_proto);
  185:      this_proto->name = $1->name;
  186:    }
  187:  | FROM CF_SYM_KNOWN {
  188:      if (($2->class != SYM_TEMPLATE) && ($2->class != SYM_PROTO)) cf_error("Template or protocol name expected");
  189: 
  190:      struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
  191:      s->class = this_proto->class;
  192:      s->proto = this_proto;
  193:      this_proto->name = s->name;
  194: 
  195:      proto_copy_config(this_proto, $2->proto);
  196:    }
  197:  | symbol FROM CF_SYM_KNOWN {
  198:      if (($3->class != SYM_TEMPLATE) && ($3->class != SYM_PROTO)) cf_error("Template or protocol name expected");
  199: 
  200:      cf_define_symbol($1, this_proto->class, proto, this_proto);
  201:      this_proto->name = $1->name;
  202: 
  203:      proto_copy_config(this_proto, $3->proto);
  204:    }
  205:  ;
  206: 
  207: proto_item:
  208:    /* EMPTY */
  209:  | DISABLED bool { this_proto->disabled = $2; }
  210:  | DEBUG debug_mask { this_proto->debug = $2; }
  211:  | MRTDUMP mrtdump_mask { this_proto->mrtdump = $2; }
  212:  | ROUTER ID idval { this_proto->router_id = $3; }
  213:  | DESCRIPTION text { this_proto->dsc = $2; }
  214:  | VRF text { this_proto->vrf = if_get_by_name($2); this_proto->vrf_set = 1; }
  215:  | VRF DEFAULT { this_proto->vrf = NULL; this_proto->vrf_set = 1; }
  216:  ;
  217: 
  218: 
  219: channel_start: net_type
  220: {
  221:   $$ = this_channel = channel_config_get(NULL, net_label[$1], $1, this_proto);
  222: };
  223: 
  224: channel_item:
  225:    TABLE rtable {
  226:      if (this_channel->net_type && ($2->addr_type != this_channel->net_type))
  227:        cf_error("Incompatible table type");
  228:      this_channel->table = $2;
  229:    }
  230:  | IMPORT imexport { this_channel->in_filter = $2; }
  231:  | EXPORT imexport { this_channel->out_filter = $2; }
  232:  | RECEIVE LIMIT limit_spec { this_channel->rx_limit = $3; }
  233:  | IMPORT LIMIT limit_spec { this_channel->in_limit = $3; }
  234:  | EXPORT LIMIT limit_spec { this_channel->out_limit = $3; }
  235:  | PREFERENCE expr { this_channel->preference = $2; check_u16($2); }
  236:  | IMPORT KEEP FILTERED bool { this_channel->in_keep_filtered = $4; }
  237:  ;
  238: 
  239: channel_opts:
  240:    /* empty */
  241:  | channel_opts channel_item ';'
  242:  ;
  243: 
  244: channel_opt_list:
  245:    /* empty */
  246:  | '{' channel_opts '}'
  247:  ;
  248: 
  249: channel_end:
  250: {
  251:   if (!this_channel->table)
  252:     cf_error("Routing table not specified");
  253: 
  254:   this_channel = NULL;
  255: };
  256: 
  257: proto_channel: channel_start channel_opt_list channel_end;
  258: 
  259: 
  260: rtable: CF_SYM_KNOWN { cf_assert_symbol($1, SYM_TABLE); $$ = $1->table; } ;
  261: 
  262: imexport:
  263:    FILTER filter { $$ = $2; }
  264:  | where_filter
  265:  | ALL { $$ = FILTER_ACCEPT; }
  266:  | NONE { $$ = FILTER_REJECT; }
  267:  ;
  268: 
  269: limit_action:
  270:    /* default */ { $$ = PLA_DISABLE; }
  271:  | ACTION WARN { $$ = PLA_WARN; }
  272:  | ACTION BLOCK { $$ = PLA_BLOCK; }
  273:  | ACTION RESTART { $$ = PLA_RESTART; }
  274:  | ACTION DISABLE { $$ = PLA_DISABLE; }
  275:  ;
  276: 
  277: limit_spec:
  278:    expr limit_action { $$ = (struct channel_limit){ .limit = $1, $$.action = $2 }; }
  279:  | OFF { $$ = (struct channel_limit){}; }
  280:  ;
  281: 
  282: 
  283: conf: debug_default ;
  284: 
  285: debug_default:
  286:    DEBUG PROTOCOLS debug_mask { new_config->proto_default_debug = $3; }
  287:  | DEBUG COMMANDS expr { new_config->cli_debug = $3; }
  288:  ;
  289: 
  290: /* MRTDUMP PROTOCOLS is in systep/unix/config.Y */
  291: 
  292: conf: timeformat_base ;
  293: 
  294: timeformat_which:
  295:    ROUTE { $$ = &new_config->tf_route; }
  296:  | PROTOCOL { $$ = &new_config->tf_proto; }
  297:  | BASE { $$ = &new_config->tf_base; }
  298:  | LOG { $$ = &new_config->tf_log; }
  299:  ;
  300: 
  301: timeformat_spec:
  302:    timeformat_which TEXT { *$1 = (struct timeformat){$2, NULL, 0}; }
  303:  | timeformat_which TEXT expr TEXT { *$1 = (struct timeformat){$2, $4, (s64) $3 S_}; }
  304:  | timeformat_which ISO SHORT    { *$1 = TM_ISO_SHORT_S; }
  305:  | timeformat_which ISO SHORT MS { *$1 = TM_ISO_SHORT_MS; }
  306:  | timeformat_which ISO SHORT US { *$1 = TM_ISO_SHORT_US; }
  307:  | timeformat_which ISO LONG    { *$1 = TM_ISO_LONG_S; }
  308:  | timeformat_which ISO LONG MS { *$1 = TM_ISO_LONG_MS; }
  309:  | timeformat_which ISO LONG US { *$1 = TM_ISO_LONG_US; }
  310:  ;
  311: 
  312: timeformat_base:
  313:    TIMEFORMAT timeformat_spec ';'
  314:  ;
  315: 
  316: 
  317: /* Interface patterns */
  318: 
  319: iface_patt_node_init:
  320:    /* EMPTY */ {
  321:      struct iface_patt_node *ipn = cfg_allocz(sizeof(struct iface_patt_node));
  322:      add_tail(&this_ipatt->ipn_list, NODE ipn);
  323:      this_ipn = ipn;
  324:    }
  325:  ;
  326: 
  327: iface_patt_node_body:
  328:    TEXT { this_ipn->pattern = $1; /* this_ipn->prefix stays zero */ }
  329:  | opttext net_or_ipa { this_ipn->pattern = $1; this_ipn->prefix = $2; }
  330:  ;
  331: 
  332: iface_negate:
  333:        { this_ipn->positive = 1; }
  334:  | '-' { this_ipn->positive = 0; }
  335:  ;
  336: 
  337: iface_patt_node:
  338:    iface_patt_node_init iface_negate iface_patt_node_body
  339:  ;
  340: 
  341: 
  342: iface_patt_list:
  343:    iface_patt_node
  344:  | iface_patt_list ',' iface_patt_node
  345:  ;
  346: 
  347: /* For name/mask-only iface patterns */
  348: iface_patt_list_nopx: iface_patt_list { iface_patt_check(); }
  349: 
  350: iface_patt_init: {
  351:    /* Generic this_ipatt init */
  352:    this_ipatt = cfg_allocz(sizeof(struct iface_patt));
  353:    init_list(&this_ipatt->ipn_list);
  354:  }
  355:  ;
  356: 
  357: iface_patt:
  358:    iface_patt_init iface_patt_list
  359:  ;
  360: 
  361: tos:
  362:    CLASS expr { $$ = $2 & 0xfc;        if ($2 > 255) cf_error("TX class must be in range 0-255"); }
  363:  | DSCP expr  { $$ = ($2 & 0x3f) << 2; if ($2 > 63)  cf_error("TX DSCP must be in range 0-63"); }
  364:  ;
  365: 
  366: /* Direct device route protocol */
  367: 
  368: proto: dev_proto '}' ;
  369: 
  370: dev_proto_start: proto_start DIRECT {
  371:      this_proto = proto_config_new(&proto_device, $1);
  372:      init_list(&DIRECT_CFG->iface_list);
  373:    }
  374:  ;
  375: 
  376: dev_proto:
  377:    dev_proto_start proto_name '{'
  378:  | dev_proto proto_item ';'
  379:  | dev_proto proto_channel ';'
  380:  | dev_proto dev_iface_patt ';'
  381:  | dev_proto CHECK LINK bool ';' { DIRECT_CFG->check_link = $4; }
  382:  ;
  383: 
  384: dev_iface_init:
  385:    /* EMPTY */ {
  386:      this_ipatt = cfg_allocz(sizeof(struct iface_patt));
  387:      add_tail(&DIRECT_CFG->iface_list, NODE this_ipatt);
  388:      init_list(&this_ipatt->ipn_list);
  389:    }
  390:  ;
  391: 
  392: dev_iface_patt:
  393:    INTERFACE dev_iface_init iface_patt_list
  394:  ;
  395: 
  396: /* Debug flags */
  397: 
  398: debug_mask:
  399:    ALL { $$ = ~0; }
  400:  | OFF { $$ = 0; }
  401:  | '{' debug_list '}' { $$ = $2; }
  402:  ;
  403: 
  404: debug_list:
  405:    debug_flag
  406:  | debug_list ',' debug_flag { $$ = $1 | $3; }
  407:  ;
  408: 
  409: debug_flag:
  410:    STATES	{ $$ = D_STATES; }
  411:  | ROUTES	{ $$ = D_ROUTES; }
  412:  | FILTERS	{ $$ = D_FILTERS; }
  413:  | INTERFACES	{ $$ = D_IFACES; }
  414:  | EVENTS	{ $$ = D_EVENTS; }
  415:  | PACKETS	{ $$ = D_PACKETS; }
  416:  ;
  417: 
  418: /* MRTDump flags */
  419: 
  420: mrtdump_mask:
  421:    ALL { $$ = ~0; }
  422:  | OFF { $$ = 0; }
  423:  | '{' mrtdump_list '}' { $$ = $2; }
  424:  ;
  425: 
  426: mrtdump_list:
  427:    mrtdump_flag
  428:  | mrtdump_list ',' mrtdump_flag { $$ = $1 | $3; }
  429:  ;
  430: 
  431: mrtdump_flag:
  432:    STATES	{ $$ = MD_STATES; }
  433:  | MESSAGES	{ $$ = MD_MESSAGES; }
  434:  ;
  435: 
  436: /* Password lists */
  437: 
  438: password_list:
  439:    PASSWORDS '{' password_items '}'
  440:  | password_item
  441: ;
  442: 
  443: password_items:
  444:     /* empty */
  445:   | password_item ';' password_items
  446: ;
  447: 
  448: password_item:
  449:     password_item_begin '{' password_item_params '}'
  450:   | password_item_begin
  451: ;
  452: 
  453: password_item_begin:
  454:    PASSWORD text {
  455:      if (!this_p_list) {
  456: 	this_p_list = cfg_alloc(sizeof(list));
  457: 	init_list(this_p_list);
  458: 	password_id = 1;
  459:      }
  460:      this_p_item = cfg_alloc(sizeof (struct password_item));
  461:      this_p_item->password = $2;
  462:      this_p_item->length = strlen($2);
  463:      this_p_item->genfrom = 0;
  464:      this_p_item->gento = TIME_INFINITY;
  465:      this_p_item->accfrom = 0;
  466:      this_p_item->accto = TIME_INFINITY;
  467:      this_p_item->id = password_id++;
  468:      this_p_item->alg = ALG_UNDEFINED;
  469:      add_tail(this_p_list, &this_p_item->n);
  470:    }
  471: ;
  472: 
  473: password_item_params:
  474:    /* empty */ { }
  475:  | GENERATE FROM time ';' password_item_params { this_p_item->genfrom = $3; }
  476:  | GENERATE TO time ';' password_item_params { this_p_item->gento = $3; }
  477:  | ACCEPT FROM time ';' password_item_params { this_p_item->accfrom = $3; }
  478:  | ACCEPT TO time ';' password_item_params { this_p_item->accto = $3; }
  479:  | FROM time ';' password_item_params { this_p_item->genfrom = this_p_item->accfrom = $2; }
  480:  | TO time ';' password_item_params { this_p_item->gento = this_p_item->accto = $2; }
  481:  | ID expr ';' password_item_params { this_p_item->id = $2; if ($2 <= 0) cf_error("Password ID has to be greated than zero."); }
  482:  | ALGORITHM password_algorithm ';' password_item_params { this_p_item->alg = $2; }
  483:  ;
  484: 
  485: password_algorithm:
  486:    KEYED MD5	{ $$ = ALG_MD5; }
  487:  | KEYED SHA1	{ $$ = ALG_SHA1; }
  488:  | KEYED SHA256	{ $$ = ALG_SHA256; }
  489:  | KEYED SHA384	{ $$ = ALG_SHA384; }
  490:  | KEYED SHA512	{ $$ = ALG_SHA512; }
  491:  | HMAC MD5	{ $$ = ALG_HMAC_MD5; }
  492:  | HMAC SHA1	{ $$ = ALG_HMAC_SHA1; }
  493:  | HMAC SHA256	{ $$ = ALG_HMAC_SHA256; }
  494:  | HMAC SHA384	{ $$ = ALG_HMAC_SHA384; }
  495:  | HMAC SHA512	{ $$ = ALG_HMAC_SHA512; }
  496:  ;
  497: 
  498: /* Core commands */
  499: CF_CLI_HELP(SHOW, ..., [[Show status information]])
  500: 
  501: CF_CLI(SHOW STATUS,,, [[Show router status]])
  502: { cmd_show_status(); } ;
  503: 
  504: CF_CLI(SHOW MEMORY,,, [[Show memory usage]])
  505: { cmd_show_memory(); } ;
  506: 
  507: CF_CLI(SHOW PROTOCOLS, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocols]])
  508: { proto_apply_cmd($3, proto_cmd_show, 0, 0); } ;
  509: 
  510: CF_CLI(SHOW PROTOCOLS ALL, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocol details]])
  511: { proto_apply_cmd($4, proto_cmd_show, 0, 1); } ;
  512: 
  513: optproto:
  514:    CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$ = $1; }
  515:  | /* empty */ { $$ = NULL; }
  516:  ;
  517: 
  518: CF_CLI(SHOW INTERFACES,,, [[Show network interfaces]])
  519: { if_show(); } ;
  520: 
  521: CF_CLI(SHOW INTERFACES SUMMARY,,, [[Show summary of network interfaces]])
  522: { if_show_summary(); } ;
  523: 
  524: CF_CLI_HELP(SHOW ROUTE, ..., [[Show routing table]])
  525: CF_CLI(SHOW ROUTE, r_args, [[[<prefix>|for <prefix>|for <ip>] [table <t>] [filter <f>|where <cond>] [all] [primary] [filtered] [(export|preexport|noexport) <p>] [protocol <p>] [stats|count]]], [[Show routing table]])
  526: { rt_show($3); } ;
  527: 
  528: r_args:
  529:    /* empty */ {
  530:      $$ = cfg_allocz(sizeof(struct rt_show_data));
  531:      init_list(&($$->tables));
  532:      $$->filter = FILTER_ACCEPT;
  533:      $$->running_on_config = new_config->fallback;
  534:    }
  535:  | r_args net_any {
  536:      $$ = $1;
  537:      if ($$->addr) cf_error("Only one prefix expected");
  538:      $$->addr = $2;
  539:    }
  540:  | r_args FOR r_args_for {
  541:      $$ = $1;
  542:      if ($$->addr) cf_error("Only one prefix expected");
  543:      $$->show_for = 1;
  544:      $$->addr = $3;
  545:    }
  546:  | r_args TABLE CF_SYM_KNOWN {
  547:      cf_assert_symbol($3, SYM_TABLE);
  548:      $$ = $1;
  549:      rt_show_add_table($$, $3->table->table);
  550:      $$->tables_defined_by = RSD_TDB_DIRECT;
  551:    }
  552:  | r_args TABLE ALL {
  553:      struct rtable_config *t;
  554:      $$ = $1;
  555:      WALK_LIST(t, config->tables)
  556:        rt_show_add_table($$, t->table);
  557:      $$->tables_defined_by = RSD_TDB_ALL;
  558:    }
  559:  | r_args IMPORT TABLE CF_SYM_KNOWN '.' r_args_channel {
  560:      cf_assert_symbol($4, SYM_PROTO);
  561:      $$ = $1;
  562:      struct proto_config *cf = $4->proto;
  563:      if (!cf->proto) cf_error("%s is not a protocol", $4->name);
  564:      struct channel *c = proto_find_channel_by_name(cf->proto, $6);
  565:      if (!c) cf_error("Channel %s.%s not found", $4->name, $6);
  566:      if (!c->in_table) cf_error("No import table in channel %s.%s", $4->name, $6);
  567:      rt_show_add_table($$, c->in_table);
  568:      $$->tables_defined_by = RSD_TDB_DIRECT;
  569:    }
  570:  | r_args EXPORT TABLE CF_SYM_KNOWN '.' r_args_channel {
  571:      cf_assert_symbol($4, SYM_PROTO);
  572:      $$ = $1;
  573:      struct proto_config *cf = $4->proto;
  574:      if (!cf->proto) cf_error("%s is not a protocol", $4->name);
  575:      struct channel *c = proto_find_channel_by_name(cf->proto, $6);
  576:      if (!c) cf_error("Channel %s.%s not found", $4->name, $6);
  577:      if (!c->out_table) cf_error("No export table in channel %s.%s", $4->name, $6);
  578:      rt_show_add_table($$, c->out_table);
  579:      $$->tables_defined_by = RSD_TDB_DIRECT;
  580:    }
  581:  | r_args FILTER filter {
  582:      $$ = $1;
  583:      if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
  584:      $$->filter = $3;
  585:    }
  586:  | r_args where_filter {
  587:      $$ = $1;
  588:      if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
  589:      $$->filter = $2;
  590:    }
  591:  | r_args ALL {
  592:      $$ = $1;
  593:      $$->verbose = 1;
  594:    }
  595:  | r_args PRIMARY {
  596:      $$ = $1;
  597:      $$->primary_only = 1;
  598:    }
  599:  | r_args FILTERED {
  600:      $$ = $1;
  601:      $$->filtered = 1;
  602:    }
  603:  | r_args export_mode CF_SYM_KNOWN {
  604:      cf_assert_symbol($3, SYM_PROTO);
  605:      struct proto_config *c = (struct proto_config *) $3->proto;
  606:      $$ = $1;
  607:      if ($$->export_mode) cf_error("Export specified twice");
  608:      if (!c->proto) cf_error("%s is not a protocol", $3->name);
  609:      $$->export_mode = $2;
  610:      $$->export_protocol = c->proto;
  611:      $$->tables_defined_by = RSD_TDB_INDIRECT;
  612:    }
  613:  | r_args export_mode CF_SYM_KNOWN '.' r_args_channel {
  614:      cf_assert_symbol($3, SYM_PROTO);
  615:      struct proto_config *c = (struct proto_config *) $3->proto;
  616:      $$ = $1;
  617:      if ($$->export_mode) cf_error("Export specified twice");
  618:      if (!c->proto) cf_error("%s is not a protocol", $3->name);
  619:      $$->export_mode = $2;
  620:      $$->export_channel = proto_find_channel_by_name(c->proto, $5);
  621:      if (!$$->export_channel) cf_error("Export channel not found");
  622:      $$->tables_defined_by = RSD_TDB_INDIRECT;
  623:    }
  624:  | r_args PROTOCOL CF_SYM_KNOWN {
  625:      cf_assert_symbol($3, SYM_PROTO);
  626:      struct proto_config *c = (struct proto_config *) $3->proto;
  627:      $$ = $1;
  628:      if ($$->show_protocol) cf_error("Protocol specified twice");
  629:      if (!c->proto) cf_error("%s is not a protocol", $3->name);
  630:      $$->show_protocol = c->proto;
  631:      $$->tables_defined_by = RSD_TDB_INDIRECT;
  632:    }
  633:  | r_args STATS {
  634:      $$ = $1;
  635:      $$->stats = 1;
  636:    }
  637:  | r_args COUNT {
  638:      $$ = $1;
  639:      $$->stats = 2;
  640:    }
  641:  ;
  642: 
  643: r_args_for:
  644:   r_args_for_val {
  645:     $$ = cfg_alloc($1.length);
  646:     net_copy($$, &$1);
  647:   }
  648:  | net_vpn4_
  649:  | net_vpn6_
  650:  | net_ip6_sadr_
  651:  | VPN_RD IP4 {
  652:     $$ = cfg_alloc(sizeof(net_addr_vpn4));
  653:     net_fill_vpn4($$, $2, IP4_MAX_PREFIX_LENGTH, $1);
  654:   }
  655:  | VPN_RD IP6 {
  656:     $$ = cfg_alloc(sizeof(net_addr_vpn6));
  657:     net_fill_vpn6($$, $2, IP6_MAX_PREFIX_LENGTH, $1);
  658:   }
  659:  | IP6 FROM IP6 {
  660:     $$ = cfg_alloc(sizeof(net_addr_ip6_sadr));
  661:     net_fill_ip6_sadr($$, $1, IP6_MAX_PREFIX_LENGTH, $3, IP6_MAX_PREFIX_LENGTH);
  662:   }
  663:  | CF_SYM_KNOWN {
  664:      if ($1->class == (SYM_CONSTANT | T_IP))
  665:      {
  666:        $$ = cfg_alloc(ipa_is_ip4(SYM_VAL($1).ip) ? sizeof(net_addr_ip4) : sizeof(net_addr_ip6));
  667:        net_fill_ip_host($$, SYM_VAL($1).ip);
  668:      }
  669:      else if (($1->class == (SYM_CONSTANT | T_NET)) && net_type_match(SYM_VAL($1).net, NB_IP | NB_VPN))
  670:        $$ = (net_addr *) SYM_VAL($1).net; /* Avoid const warning */
  671:      else
  672:        cf_error("IP address or network constant expected");
  673:    }
  674:  ;
  675: 
  676: r_args_for_val:
  677:    net_ip4_
  678:  | net_ip6_
  679:  | IP4 { net_fill_ip4(&($$), $1, IP4_MAX_PREFIX_LENGTH); }
  680:  | IP6 { net_fill_ip6(&($$), $1, IP6_MAX_PREFIX_LENGTH); }
  681: 
  682: export_mode:
  683:    PREEXPORT	{ $$ = RSEM_PREEXPORT; }
  684:  | EXPORT	{ $$ = RSEM_EXPORT; }
  685:  | NOEXPORT	{ $$ = RSEM_NOEXPORT; }
  686:  ;
  687: 
  688: /* This is ugly hack */
  689: r_args_channel:
  690:    IPV4		{ $$ = "ipv4"; }
  691:  | IPV4_MC	{ $$ = "ipv4-mc"; }
  692:  | IPV4_MPLS	{ $$ = "ipv4-mpls"; }
  693:  | IPV6		{ $$ = "ipv6"; }
  694:  | IPV6_MC	{ $$ = "ipv6-mc"; }
  695:  | IPV6_MPLS	{ $$ = "ipv6-mpls"; }
  696:  | IPV6_SADR	{ $$ = "ipv6-sadr"; }
  697:  | VPN4		{ $$ = "vpn4"; }
  698:  | VPN4_MC	{ $$ = "vpn4-mc"; }
  699:  | VPN4_MPLS	{ $$ = "vpn4-mpls"; }
  700:  | VPN6		{ $$ = "vpn6"; }
  701:  | VPN6_MC	{ $$ = "vpn6-mc"; }
  702:  | VPN6_MPLS	{ $$ = "vpn6-mpls"; }
  703:  | ROA4		{ $$ = "roa4"; }
  704:  | ROA6		{ $$ = "roa6"; }
  705:  | FLOW4	{ $$ = "flow4"; }
  706:  | FLOW6	{ $$ = "flow6"; }
  707:  | MPLS		{ $$ = "mpls"; }
  708:  | PRI		{ $$ = "pri"; }
  709:  | SEC		{ $$ = "sec"; }
  710:  ;
  711: 
  712: CF_CLI_HELP(SHOW SYMBOLS, ..., [[Show all known symbolic names]])
  713: CF_CLI(SHOW SYMBOLS, sym_args, [table|filter|function|protocol|template|<symbol>], [[Show all known symbolic names]])
  714: { cmd_show_symbols($3); } ;
  715: 
  716: sym_args:
  717:    /* empty */ {
  718:      $$ = cfg_allocz(sizeof(struct sym_show_data));
  719:    }
  720:  | sym_args TABLE { $$ = $1; $$->type = SYM_TABLE; }
  721:  | sym_args FUNCTION { $$ = $1; $$->type = SYM_FUNCTION; }
  722:  | sym_args FILTER { $$ = $1; $$->type = SYM_FILTER; }
  723:  | sym_args PROTOCOL { $$ = $1; $$->type = SYM_PROTO; }
  724:  | sym_args TEMPLATE { $$ = $1; $$->type = SYM_TEMPLATE; }
  725:  | sym_args symbol { $$ = $1; $$->sym = $2; }
  726:  ;
  727: 
  728: 
  729: CF_CLI_HELP(DUMP, ..., [[Dump debugging information]])
  730: CF_CLI(DUMP RESOURCES,,, [[Dump all allocated resource]])
  731: { rdump(&root_pool); cli_msg(0, ""); } ;
  732: CF_CLI(DUMP SOCKETS,,, [[Dump open sockets]])
  733: { sk_dump_all(); cli_msg(0, ""); } ;
  734: CF_CLI(DUMP EVENTS,,, [[Dump event log]])
  735: { io_log_dump(); cli_msg(0, ""); } ;
  736: CF_CLI(DUMP INTERFACES,,, [[Dump interface information]])
  737: { if_dump_all(); cli_msg(0, ""); } ;
  738: CF_CLI(DUMP NEIGHBORS,,, [[Dump neighbor cache]])
  739: { neigh_dump_all(); cli_msg(0, ""); } ;
  740: CF_CLI(DUMP ATTRIBUTES,,, [[Dump attribute cache]])
  741: { rta_dump_all(); cli_msg(0, ""); } ;
  742: CF_CLI(DUMP ROUTES,,, [[Dump routing table]])
  743: { rt_dump_all(); cli_msg(0, ""); } ;
  744: CF_CLI(DUMP PROTOCOLS,,, [[Dump protocol information]])
  745: { protos_dump_all(); cli_msg(0, ""); } ;
  746: CF_CLI(DUMP FILTER ALL,,, [[Dump all filters in linearized form]])
  747: { filters_dump_all(); cli_msg(0, ""); } ;
  748: 
  749: CF_CLI(EVAL, term, <expr>, [[Evaluate an expression]])
  750: { cmd_eval(f_linearize($2)); } ;
  751: 
  752: CF_CLI_HELP(ECHO, ..., [[Control echoing of log messages]])
  753: CF_CLI(ECHO, echo_mask echo_size, (all | off | { debug|trace|info|remote|warning|error|auth [, ...] }) [<buffer-size>], [[Control echoing of log messages]]) {
  754:   cli_set_log_echo(this_cli, $2, $3);
  755:   cli_msg(0, "");
  756: } ;
  757: 
  758: echo_mask:
  759:    ALL { $$ = ~0; }
  760:  | OFF { $$ = 0; }
  761:  | '{' log_mask_list '}' { $$ = $2; }
  762:  ;
  763: 
  764: echo_size:
  765:    /* empty */ { $$ = 4096; }
  766:  | NUM {
  767:      if ($1 < 256 || $1 > 65536) cf_error("Invalid log buffer size");
  768:      $$ = $1;
  769:    }
  770:  ;
  771: 
  772: CF_CLI(DISABLE, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Disable protocol]])
  773: { proto_apply_cmd($2, proto_cmd_disable, 1, (uintptr_t) $3); } ;
  774: CF_CLI(ENABLE, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Enable protocol]])
  775: { proto_apply_cmd($2, proto_cmd_enable, 1, (uintptr_t) $3); } ;
  776: CF_CLI(RESTART, proto_patt opttext, (<protocol> | \"<pattern>\" | all) [message], [[Restart protocol]])
  777: { proto_apply_cmd($2, proto_cmd_restart, 1, (uintptr_t) $3); } ;
  778: CF_CLI(RELOAD, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol]])
  779: { proto_apply_cmd($2, proto_cmd_reload, 1, CMD_RELOAD); } ;
  780: CF_CLI(RELOAD IN, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just imported routes)]])
  781: { proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_IN); } ;
  782: CF_CLI(RELOAD OUT, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just exported routes)]])
  783: { proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_OUT); } ;
  784: 
  785: CF_CLI_HELP(DEBUG, ..., [[Control protocol debugging via BIRD logs]])
  786: CF_CLI(DEBUG, proto_patt debug_mask, (<protocol> | \"<pattern>\" | all) (all | off | { states|routes|filters|interfaces|events|packets [, ...] }), [[Control protocol debugging via BIRD logs]])
  787: { proto_apply_cmd($2, proto_cmd_debug, 1, $3); } ;
  788: 
  789: CF_CLI_HELP(MRTDUMP, ..., [[Control protocol debugging via MRTdump files]])
  790: CF_CLI(MRTDUMP, proto_patt mrtdump_mask, (<protocol> | \"<pattern>\" | all) (all | off | { states|messages [, ...] }), [[Control protocol debugging via MRTdump format]])
  791: { proto_apply_cmd($2, proto_cmd_mrtdump, 1, $3); } ;
  792: 
  793: CF_CLI(RESTRICT,,,[[Restrict current CLI session to safe commands]])
  794: { this_cli->restricted = 1; cli_msg(16, "Access restricted"); } ;
  795: 
  796: proto_patt:
  797:    CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$.ptr = $1; $$.patt = 0; }
  798:  | ALL  { $$.ptr = NULL; $$.patt = 1; }
  799:  | TEXT { $$.ptr = $1; $$.patt = 1; }
  800:  ;
  801: 
  802: proto_patt2:
  803:    CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$.ptr = $1; $$.patt = 0; }
  804:  |      { $$.ptr = NULL; $$.patt = 1; }
  805:  | TEXT { $$.ptr = $1; $$.patt = 1; }
  806:  ;
  807: 
  808: dynamic_attr: IGP_METRIC { $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_GEN_IGP_METRIC); } ;
  809: 
  810: 
  811: CF_CODE
  812: 
  813: CF_END

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>