1
0
Fork 0
frr/bfdd/bfdd_nb_config.c
Daniel Baumann cffe896369
Adding upstream version 10.3.
Signed-off-by: Daniel Baumann <daniel@debian.org>
2025-03-12 10:26:12 +01:00

1178 lines
26 KiB
C

// SPDX-License-Identifier: GPL-2.0-or-later
/*
* BFD daemon northbound implementation.
*
* Copyright (C) 2019 Network Device Education Foundation, Inc. ("NetDEF")
* Rafael Zalamena
*/
#include <zebra.h>
#include "lib/log.h"
#include "lib/northbound.h"
#include "bfd.h"
#include "bfdd_nb.h"
#include <ifaddrs.h>
/*
* Helpers.
*/
static void get_ip_by_interface(const char *ifname, const char *vrfname, int family, char *ifip)
{
char intfip[INET6_ADDRSTRLEN];
const struct interface *interface;
const struct connected *connected;
struct vrf *vrf;
vrf = vrf_lookup_by_name(vrfname ? vrfname : VRF_DEFAULT_NAME);
if (!vrf)
return;
interface = if_lookup_by_name_vrf(ifname, vrf);
if (interface == NULL)
return;
frr_each (if_connected_const, interface->connected, connected) {
if (!connected->address)
continue;
if (family != connected->address->family)
continue;
if (family == AF_INET6 && IN6_IS_ADDR_LINKLOCAL(&connected->address->u.prefix6))
continue;
inet_ntop(family,
family == AF_INET ? (void *)(&connected->address->u.prefix4)
: (void *)(&connected->address->u.prefix6),
intfip, INET6_ADDRSTRLEN);
strlcpy(ifip, intfip, INET6_ADDRSTRLEN - 1);
break;
}
}
static void bfd_session_get_key(bool mhop, const struct lyd_node *dnode,
struct bfd_key *bk)
{
const char *ifname = NULL, *vrfname = NULL;
char ifip[INET6_ADDRSTRLEN] = { 0 };
struct sockaddr_any psa, lsa;
/* Required destination parameter. */
strtosa(yang_dnode_get_string(dnode, "dest-addr"), &psa);
/* Get optional source address. */
memset(&lsa, 0, sizeof(lsa));
if (yang_dnode_exists(dnode, "source-addr"))
strtosa(yang_dnode_get_string(dnode, "source-addr"), &lsa);
vrfname = yang_dnode_get_string(dnode, "vrf");
if (!mhop) {
ifname = yang_dnode_get_string(dnode, "interface");
if (strcmp(ifname, "*") == 0)
ifname = NULL;
if (ifname != NULL && !yang_dnode_exists(dnode, "source-addr") &&
psa.sa_sin.sin_family != 0) {
get_ip_by_interface(ifname, vrfname, psa.sa_sin.sin_family, ifip);
strtosa(ifip, &lsa);
}
}
/* Generate the corresponding key. */
gen_bfd_key(bk, &psa, &lsa, mhop, ifname, vrfname, NULL);
}
static void sbfd_session_get_key(bool mhop, const struct lyd_node *dnode, struct bfd_key *bk)
{
const char *ifname = NULL, *vrfname = NULL, *bfdname = NULL;
struct sockaddr_any psa, lsa;
/* Required source parameter. */
strtosa(yang_dnode_get_string(dnode, "source-addr"), &lsa);
strtosa(yang_dnode_get_string(dnode, "dest-addr"), &psa);
if (yang_dnode_exists(dnode, "bfd-name"))
bfdname = yang_dnode_get_string(dnode, "bfd-name");
if (yang_dnode_exists(dnode, "vrf"))
vrfname = yang_dnode_get_string(dnode, "vrf");
/* Generate the corresponding key. */
gen_bfd_key(bk, &psa, &lsa, mhop, ifname, vrfname, bfdname);
}
struct session_iter {
int count;
bool wildcard;
};
static int session_iter_cb(const struct lyd_node *dnode, void *arg)
{
struct session_iter *iter = arg;
const char *ifname;
ifname = yang_dnode_get_string(dnode, "interface");
if (strmatch(ifname, "*"))
iter->wildcard = true;
iter->count++;
return YANG_ITER_CONTINUE;
}
static int segment_list_iter_cb(const struct lyd_node *dnode, void *arg)
{
struct bfd_session *bs = arg;
uint8_t segnum = bs->segnum;
const char *addr;
struct sockaddr_any sa;
addr = yang_dnode_get_string(dnode, NULL);
if (strtosa(addr, &sa) < 0 || sa.sa_sin6.sin6_family != AF_INET6)
return YANG_ITER_STOP;
memcpy(&bs->seg_list[segnum], &sa.sa_sin6.sin6_addr, sizeof(struct in6_addr));
bs->segnum = segnum + 1;
return YANG_ITER_CONTINUE;
}
static int bfd_session_create(struct nb_cb_create_args *args, bool mhop, uint32_t bfd_mode)
{
const struct lyd_node *sess_dnode;
struct session_iter iter;
struct bfd_session *bs;
const char *dest;
const char *ifname;
const char *vrfname;
struct bfd_key bk;
struct prefix p;
const char *bfd_name = NULL;
struct sockaddr_any out_sip6;
switch (args->event) {
case NB_EV_VALIDATE:
if ((bfd_mode == BFD_MODE_TYPE_SBFD_ECHO) || (bfd_mode == BFD_MODE_TYPE_SBFD_INIT)) {
if (bfd_session_get_by_name(yang_dnode_get_string(args->dnode, "bfd-name"))) {
snprintf(args->errmsg, args->errmsg_len, "bfd name already exist.");
return NB_ERR_VALIDATION;
}
return NB_OK;
}
yang_dnode_get_prefix(&p, args->dnode, "./dest-addr");
if (mhop) {
/*
* Do not allow IPv6 link-local address for multihop.
*/
if (p.family == AF_INET6
&& IN6_IS_ADDR_LINKLOCAL(&p.u.prefix6)) {
snprintf(
args->errmsg, args->errmsg_len,
"Cannot use link-local address for multihop sessions");
return NB_ERR_VALIDATION;
}
return NB_OK;
}
/*
* When `dest-addr` is IPv6 and link-local we must
* require interface name, otherwise we can't figure
* which interface to use to send the packets.
*/
ifname = yang_dnode_get_string(args->dnode, "interface");
if (p.family == AF_INET6 && IN6_IS_ADDR_LINKLOCAL(&p.u.prefix6)
&& strcmp(ifname, "*") == 0) {
snprintf(
args->errmsg, args->errmsg_len,
"When using link-local you must specify an interface");
return NB_ERR_VALIDATION;
}
iter.count = 0;
iter.wildcard = false;
sess_dnode = yang_dnode_get_parent(args->dnode, "sessions");
dest = yang_dnode_get_string(args->dnode, "dest-addr");
vrfname = yang_dnode_get_string(args->dnode, "vrf");
yang_dnode_iterate(session_iter_cb, &iter, sess_dnode,
"./single-hop[dest-addr='%s'][vrf='%s']",
dest, vrfname);
if (iter.wildcard && iter.count > 1) {
snprintf(
args->errmsg, args->errmsg_len,
"It is not allowed to configure the same peer with and without ifname");
return NB_ERR_VALIDATION;
}
break;
case NB_EV_PREPARE:
if (bfd_mode == BFD_MODE_TYPE_BFD) {
bfd_session_get_key(mhop, args->dnode, &bk);
bs = bfd_key_lookup(&bk);
/* This session was already configured by another daemon. */
if (bs != NULL) {
/* Now it is configured also by CLI. */
SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG);
bs->refcount++;
args->resource->ptr = bs;
break;
}
bs = bfd_session_new(BFD_MODE_TYPE_BFD);
/* Fill the session key. */
bfd_session_get_key(mhop, args->dnode, &bs->key);
/* Set configuration flags. */
bs->refcount = 1;
SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG);
if (mhop)
SET_FLAG(bs->flags, BFD_SESS_FLAG_MH);
if (bs->key.family == AF_INET6)
SET_FLAG(bs->flags, BFD_SESS_FLAG_IPV6);
args->resource->ptr = bs;
break;
} else if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO ||
bfd_mode == BFD_MODE_TYPE_SBFD_INIT) {
sbfd_session_get_key(mhop, args->dnode, &bk);
bs = bfd_key_lookup(&bk);
/* This session was already configured by another daemon. */
if (bs != NULL) {
/* Now it is configured also by CLI. */
SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG);
bs->refcount++;
args->resource->ptr = bs;
break;
}
if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO &&
!yang_dnode_exists(args->dnode, "srv6-encap-data")) {
//srv6-encap-data should not be null for sbfd echo
snprintf(args->errmsg, args->errmsg_len,
"srv6-encap-data should not be null");
return NB_ERR_RESOURCE;
}
if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO &&
!yang_dnode_exists(args->dnode, "srv6-source-ipv6")) {
snprintf(args->errmsg, args->errmsg_len,
"source_ipv6 should not be null");
return NB_ERR_RESOURCE;
}
if (bfd_mode == BFD_MODE_TYPE_SBFD_INIT) {
if (!yang_dnode_exists(args->dnode, "remote-discr")) {
snprintf(args->errmsg, args->errmsg_len,
"remote-discr should not be null");
return NB_ERR_RESOURCE;
}
}
bfd_name = yang_dnode_get_string(args->dnode, "bfd-name");
bs = bfd_session_new(bfd_mode);
if (bs == NULL) {
snprintf(args->errmsg, args->errmsg_len,
"session-new: allocation failed");
return NB_ERR_RESOURCE;
}
/* Fill the session key. */
sbfd_session_get_key(mhop, args->dnode, &bs->key);
strlcpy(bs->bfd_name, bfd_name, BFD_NAME_SIZE);
if (yang_dnode_exists(args->dnode, "srv6-encap-data")) {
yang_dnode_iterate(segment_list_iter_cb, bs, args->dnode,
"./srv6-encap-data");
strtosa(yang_dnode_get_string(args->dnode, "./srv6-source-ipv6"),
&out_sip6);
memcpy(&bs->out_sip6, &out_sip6.sa_sin6.sin6_addr,
sizeof(struct in6_addr));
}
if (bfd_mode == BFD_MODE_TYPE_SBFD_INIT) {
bs->discrs.remote_discr = yang_dnode_get_uint32(args->dnode,
"./remote-discr");
}
/* Set configuration flags. */
bs->refcount = 1;
SET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG);
if (mhop)
SET_FLAG(bs->flags, BFD_SESS_FLAG_MH);
if (bs->key.family == AF_INET6)
SET_FLAG(bs->flags, BFD_SESS_FLAG_IPV6);
if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO) {
memcpy(&bs->key.peer, &bs->key.local, sizeof(struct in6_addr));
} else {
bs->xmt_TO = bs->timers.desired_min_tx;
bs->detect_TO = bs->detect_mult * bs->xmt_TO;
}
args->resource->ptr = bs;
break;
} else {
snprintf(args->errmsg, args->errmsg_len, "bfd mode must be bfd or sbfd.");
return NB_ERR_VALIDATION;
}
case NB_EV_APPLY:
bs = args->resource->ptr;
/* Only attempt to registrate if freshly allocated. */
if (bs->discrs.my_discr == 0 && bs_registrate(bs) == NULL)
return NB_ERR_RESOURCE;
nb_running_set_entry(args->dnode, bs);
break;
case NB_EV_ABORT:
bs = args->resource->ptr;
if (bs->refcount <= 1)
bfd_session_free(bs);
break;
}
return NB_OK;
}
static int bfd_session_destroy(enum nb_event event, const struct lyd_node *dnode, bool mhop,
uint32_t bfd_mode)
{
struct bfd_session *bs;
struct bfd_key bk;
switch (event) {
case NB_EV_VALIDATE:
if (bfd_mode == BFD_MODE_TYPE_BFD)
bfd_session_get_key(mhop, dnode, &bk);
else
sbfd_session_get_key(mhop, dnode, &bk);
if (bfd_key_lookup(&bk) == NULL)
return NB_ERR_INCONSISTENCY;
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bs = nb_running_unset_entry(dnode);
/* CLI is not using this session anymore. */
if (CHECK_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG) == 0)
break;
UNSET_FLAG(bs->flags, BFD_SESS_FLAG_CONFIG);
bs->refcount--;
/* There are still daemons using it. */
if (bs->refcount > 0)
break;
if (bglobal.debug_peer_event)
zlog_info("session destroy: %s", bs_to_string(bs));
if (bfd_mode == BFD_MODE_TYPE_SBFD_ECHO || bfd_mode == BFD_MODE_TYPE_SBFD_INIT)
ptm_bfd_notify(bs, PTM_BFD_DOWN);
bfd_session_free(bs);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd
*/
int bfdd_bfd_create(struct nb_cb_create_args *args)
{
if (args->event != NB_EV_APPLY)
return NB_OK;
/*
* Set any non-NULL value to be able to call
* nb_running_unset_entry in bfdd_bfd_destroy.
*/
nb_running_set_entry(args->dnode, (void *)0x1);
return NB_OK;
}
int bfdd_bfd_destroy(struct nb_cb_destroy_args *args)
{
switch (args->event) {
case NB_EV_VALIDATE:
/* NOTHING */
return NB_OK;
case NB_EV_PREPARE:
/* NOTHING */
return NB_OK;
case NB_EV_APPLY:
/*
* We need to call this to unset pointers from
* the child nodes - sessions and profiles.
*/
nb_running_unset_entry(args->dnode);
bfd_sessions_remove_manual();
bfd_profiles_remove();
break;
case NB_EV_ABORT:
/* NOTHING */
return NB_OK;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile
*/
int bfdd_bfd_profile_create(struct nb_cb_create_args *args)
{
struct bfd_profile *bp;
const char *name;
if (args->event != NB_EV_APPLY)
return NB_OK;
name = yang_dnode_get_string(args->dnode, "name");
bp = bfd_profile_new(name);
nb_running_set_entry(args->dnode, bp);
return NB_OK;
}
int bfdd_bfd_profile_destroy(struct nb_cb_destroy_args *args)
{
struct bfd_profile *bp;
if (args->event != NB_EV_APPLY)
return NB_OK;
bp = nb_running_unset_entry(args->dnode);
bfd_profile_free(bp);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/detection-multiplier
*/
int bfdd_bfd_profile_detection_multiplier_modify(struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
if (args->event != NB_EV_APPLY)
return NB_OK;
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->detection_multiplier = yang_dnode_get_uint8(args->dnode, NULL);
bfd_profile_update(bp);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/desired-transmission-interval
*/
int bfdd_bfd_profile_desired_transmission_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->min_tx = yang_dnode_get_uint32(args->dnode, NULL);
bfd_profile_update(bp);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/required-receive-interval
*/
int bfdd_bfd_profile_required_receive_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->min_rx = yang_dnode_get_uint32(args->dnode, NULL);
bfd_profile_update(bp);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/administrative-down
*/
int bfdd_bfd_profile_administrative_down_modify(struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
if (args->event != NB_EV_APPLY)
return NB_OK;
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->admin_shutdown = yang_dnode_get_bool(args->dnode, NULL);
bfd_profile_update(bp);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/passive-mode
*/
int bfdd_bfd_profile_passive_mode_modify(struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
if (args->event != NB_EV_APPLY)
return NB_OK;
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->passive = yang_dnode_get_bool(args->dnode, NULL);
bfd_profile_update(bp);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/minimum-ttl
*/
int bfdd_bfd_profile_minimum_ttl_modify(struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
if (args->event != NB_EV_APPLY)
return NB_OK;
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->minimum_ttl = yang_dnode_get_uint8(args->dnode, NULL);
bfd_profile_update(bp);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/echo-mode
*/
int bfdd_bfd_profile_echo_mode_modify(struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
bool echo;
if (args->event != NB_EV_APPLY)
return NB_OK;
echo = yang_dnode_get_bool(args->dnode, NULL);
bp = nb_running_get_entry(args->dnode, NULL, true);
if (bp->echo_mode == echo)
return NB_OK;
bp->echo_mode = echo;
bfd_profile_update(bp);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/desired-echo-transmission-interval
*/
int bfdd_bfd_profile_desired_echo_transmission_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->min_echo_tx = yang_dnode_get_uint32(args->dnode, NULL);
bfd_profile_update(bp);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/profile/required-echo-receive-interval
*/
int bfdd_bfd_profile_required_echo_receive_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_profile *bp;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bp = nb_running_get_entry(args->dnode, NULL, true);
bp->min_echo_rx = yang_dnode_get_uint32(args->dnode, NULL);
bfd_profile_update(bp);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop
*/
int bfdd_bfd_sessions_single_hop_create(struct nb_cb_create_args *args)
{
return bfd_session_create(args, false, BFD_MODE_TYPE_BFD);
}
int bfdd_bfd_sessions_single_hop_destroy(struct nb_cb_destroy_args *args)
{
return bfd_session_destroy(args->event, args->dnode, false, BFD_MODE_TYPE_BFD);
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/source-addr
*/
int bfdd_bfd_sessions_single_hop_source_addr_modify(
struct nb_cb_modify_args *args)
{
return NB_OK;
}
int bfdd_bfd_sessions_single_hop_source_addr_destroy(
struct nb_cb_destroy_args *args)
{
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/profile
*/
int bfdd_bfd_sessions_single_hop_profile_modify(struct nb_cb_modify_args *args)
{
struct bfd_session *bs;
if (args->event != NB_EV_APPLY)
return NB_OK;
bs = nb_running_get_entry(args->dnode, NULL, true);
bfd_profile_apply(yang_dnode_get_string(args->dnode, NULL), bs);
return NB_OK;
}
int bfdd_bfd_sessions_single_hop_profile_destroy(
struct nb_cb_destroy_args *args)
{
struct bfd_session *bs;
if (args->event != NB_EV_APPLY)
return NB_OK;
bs = nb_running_get_entry(args->dnode, NULL, true);
bfd_profile_remove(bs);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/detection-multiplier
*/
int bfdd_bfd_sessions_single_hop_detection_multiplier_modify(
struct nb_cb_modify_args *args)
{
uint8_t detection_multiplier = yang_dnode_get_uint8(args->dnode, NULL);
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.detection_multiplier = detection_multiplier;
bfd_session_apply(bs);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/desired-transmission-interval
*/
int bfdd_bfd_sessions_single_hop_desired_transmission_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.min_tx =
yang_dnode_get_uint32(args->dnode, NULL);
bfd_session_apply(bs);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/required-receive-interval
*/
int bfdd_bfd_sessions_single_hop_required_receive_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.min_rx =
yang_dnode_get_uint32(args->dnode, NULL);
bfd_session_apply(bs);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/administrative-down
*/
int bfdd_bfd_sessions_single_hop_administrative_down_modify(
struct nb_cb_modify_args *args)
{
bool shutdown = yang_dnode_get_bool(args->dnode, NULL);
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
case NB_EV_PREPARE:
return NB_OK;
case NB_EV_APPLY:
break;
case NB_EV_ABORT:
return NB_OK;
}
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.admin_shutdown = shutdown;
bfd_session_apply(bs);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/passive-mode
*/
int bfdd_bfd_sessions_single_hop_passive_mode_modify(
struct nb_cb_modify_args *args)
{
struct bfd_session *bs;
bool passive;
switch (args->event) {
case NB_EV_VALIDATE:
case NB_EV_PREPARE:
return NB_OK;
case NB_EV_APPLY:
break;
case NB_EV_ABORT:
return NB_OK;
}
passive = yang_dnode_get_bool(args->dnode, NULL);
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.passive = passive;
bfd_session_apply(bs);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/bfd-mode
* /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/bfd-mode
*/
int bfdd_bfd_sessions_bfd_mode_modify(struct nb_cb_modify_args *args)
{
uint32_t bfd_mode = yang_dnode_get_uint32(args->dnode, NULL);
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
if ((bfd_mode != BFD_MODE_TYPE_BFD) && (bfd_mode != BFD_MODE_TYPE_SBFD_ECHO) &&
(bfd_mode != BFD_MODE_TYPE_SBFD_INIT)) {
snprintf(args->errmsg, args->errmsg_len, "bfd mode is invalid.");
return NB_ERR_VALIDATION;
}
return NB_OK;
case NB_EV_PREPARE:
return NB_OK;
case NB_EV_APPLY:
break;
case NB_EV_ABORT:
return NB_OK;
}
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->bfd_mode = bfd_mode;
bfd_session_apply(bs);
return NB_OK;
}
int bfdd_bfd_sessions_bfd_mode_destroy(struct nb_cb_destroy_args *args)
{
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/single-hop/echo-mode
*/
int bfdd_bfd_sessions_single_hop_echo_mode_modify(
struct nb_cb_modify_args *args)
{
bool echo = yang_dnode_get_bool(args->dnode, NULL);
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
case NB_EV_PREPARE:
return NB_OK;
case NB_EV_APPLY:
break;
case NB_EV_ABORT:
return NB_OK;
}
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.echo_mode = echo;
bfd_session_apply(bs);
return NB_OK;
}
/*
* XPath:
* /frr-bfdd:bfdd/bfd/sessions/single-hop/desired-echo-transmission-interval
*/
int bfdd_bfd_sessions_single_hop_desired_echo_transmission_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.min_echo_tx =
yang_dnode_get_uint32(args->dnode, NULL);
bfd_session_apply(bs);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath:
* /frr-bfdd:bfdd/bfd/sessions/single-hop/required-echo-receive-interval
*/
int bfdd_bfd_sessions_single_hop_required_echo_receive_interval_modify(
struct nb_cb_modify_args *args)
{
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
break;
case NB_EV_PREPARE:
/* NOTHING */
break;
case NB_EV_APPLY:
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.min_echo_rx =
yang_dnode_get_uint32(args->dnode, NULL);
bfd_session_apply(bs);
break;
case NB_EV_ABORT:
/* NOTHING */
break;
}
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/multi-hop
*/
int bfdd_bfd_sessions_multi_hop_create(struct nb_cb_create_args *args)
{
return bfd_session_create(args, true, BFD_MODE_TYPE_BFD);
}
int bfdd_bfd_sessions_multi_hop_destroy(struct nb_cb_destroy_args *args)
{
return bfd_session_destroy(args->event, args->dnode, true, BFD_MODE_TYPE_BFD);
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/multi-hop/minimum-ttl
*/
int bfdd_bfd_sessions_multi_hop_minimum_ttl_modify(
struct nb_cb_modify_args *args)
{
struct bfd_session *bs;
switch (args->event) {
case NB_EV_VALIDATE:
case NB_EV_PREPARE:
return NB_OK;
case NB_EV_APPLY:
break;
case NB_EV_ABORT:
return NB_OK;
}
bs = nb_running_get_entry(args->dnode, NULL, true);
bs->peer_profile.minimum_ttl = yang_dnode_get_uint8(args->dnode, NULL);
bfd_session_apply(bs);
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo
*/
int bfdd_bfd_sessions_sbfd_echo_create(struct nb_cb_create_args *args)
{
return bfd_session_create(args, yang_dnode_exists(args->dnode, "multi-hop"),
BFD_MODE_TYPE_SBFD_ECHO);
}
int bfdd_bfd_sessions_sbfd_echo_destroy(struct nb_cb_destroy_args *args)
{
return bfd_session_destroy(args->event, args->dnode,
yang_dnode_exists(args->dnode, "multi-hop"),
BFD_MODE_TYPE_SBFD_ECHO);
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/srv6-encap-data
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/srv6-encap-data
*/
int bfdd_bfd_sessions_segment_list_create(struct nb_cb_create_args *args)
{
return NB_OK;
}
int bfdd_bfd_sessions_segment_list_destroy(struct nb_cb_destroy_args *args)
{
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/dest-addr
*/
int bfdd_bfd_sessions_sbfd_echo_dest_addr_modify(struct nb_cb_modify_args *args)
{
return NB_OK;
}
int bfdd_bfd_sessions_sbfd_echo_dest_addr_destroy(struct nb_cb_destroy_args *args)
{
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/echo-mode
*/
int bfdd_bfd_sessions_sbfd_echo_mode_modify(struct nb_cb_modify_args *args)
{
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/srv6-source-ipv6
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/srv6-source-ipv6
*/
int bfdd_bfd_sessions_sbfd_srv6_source_ipv6_modify(struct nb_cb_modify_args *args)
{
return NB_OK;
}
int bfdd_bfd_sessions_sbfd_srv6_source_ipv6_destroy(struct nb_cb_destroy_args *args)
{
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init
*/
int bfdd_bfd_sessions_sbfd_init_create(struct nb_cb_create_args *args)
{
return bfd_session_create(args, yang_dnode_exists(args->dnode, "multi-hop"),
BFD_MODE_TYPE_SBFD_INIT);
}
int bfdd_bfd_sessions_sbfd_init_destroy(struct nb_cb_destroy_args *args)
{
return bfd_session_destroy(args->event, args->dnode,
yang_dnode_exists(args->dnode, "multi-hop"),
BFD_MODE_TYPE_SBFD_INIT);
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/remote-discr
*/
int bfdd_bfd_sessions_sbfd_init_remote_discr_modify(struct nb_cb_modify_args *args)
{
return NB_OK;
}
/*
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-echo/multi-hop
* XPath: /frr-bfdd:bfdd/bfd/sessions/sbfd-init/multi-hop
*/
int bfdd_bfd_sessions_sbfd_multi_hop_modify(struct nb_cb_modify_args *args)
{
return NB_OK;
}
int bfdd_bfd_sessions_sbfd_multi_hop_destroy(struct nb_cb_destroy_args *args)
{
return NB_OK;
}