config.Y 13.7 KB
Newer Older
1 2 3
/*
 *	BIRD -- Core Configuration
 *
4
 *	(c) 1998--2000 Martin Mares <mj@ucw.cz>
5
 *      (c) 2004       Ondrej Filip <feela@network.cz>
6 7 8 9 10 11
 *
 *	Can be freely distributed and used under the terms of the GNU GPL.
 */

CF_HDR

12
#include "nest/rt-dev.h"
13
#include "nest/password.h"
14
#include "nest/cmds.h"
15
#include "lib/lists.h"
16

17 18 19 20
CF_DEFINES

static struct proto_config *this_proto;
static struct iface_patt *this_ipatt;
21
static struct iface_patt_node *this_ipn;
22 23
static list *this_p_list;
static struct password_item *this_p_item;
24 25
static int password_id;

26 27 28
static inline void
reset_passwords(void)
{
29
  this_p_list = NULL;
30 31 32
}

static inline list *
33 34 35 36 37 38 39
get_passwords(void)
{
  list *rv = this_p_list;
  this_p_list = NULL;
  return rv;
}

40
#define DIRECT_CFG ((struct rt_dev_config *) this_proto)
41

42 43
CF_DECLS

44
CF_KEYWORDS(ROUTER, ID, PROTOCOL, TEMPLATE, PREFERENCE, DISABLED, DEBUG, ALL, OFF, DIRECT)
45
CF_KEYWORDS(INTERFACE, IMPORT, EXPORT, FILTER, NONE, TABLE, STATES, ROUTES, FILTERS)
46
CF_KEYWORDS(PASSWORD, FROM, PASSIVE, TO, ID, EVENTS, PACKETS, PROTOCOLS, INTERFACES)
47
CF_KEYWORDS(PRIMARY, STATS, COUNT, FOR, COMMANDS, PREEXPORT, GENERATE)
48
CF_KEYWORDS(LISTEN, BGP, V6ONLY, DUAL, ADDRESS, PORT, PASSWORDS, DESCRIPTION)
49
CF_KEYWORDS(RELOAD, IN, OUT, MRTDUMP, MESSAGES, RESTRICT, MEMORY, IGP_METRIC)
50

51
CF_ENUM(T_ENUM_RTS, RTS_, DUMMY, STATIC, INHERIT, DEVICE, STATIC_DEVICE, REDIRECT,
Ondřej Filip's avatar
Ondřej Filip committed
52
	RIP, OSPF, OSPF_IA, OSPF_EXT1, OSPF_EXT2, BGP, PIPE)
53
CF_ENUM(T_ENUM_SCOPE, SCOPE_, HOST, LINK, SITE, ORGANIZATION, UNIVERSE, UNDEFINED)
54
CF_ENUM(T_ENUM_RTC, RTC_, UNICAST, BROADCAST, MULTICAST, ANYCAST)
55
CF_ENUM(T_ENUM_RTD, RTD_, ROUTER, DEVICE, BLACKHOLE, UNREACHABLE, PROHIBIT, MULTIPATH)
56

57
%type <i32> idval
58
%type <f> imexport
59
%type <r> rtable
60
%type <s> optsym
61
%type <ra> r_args
62
%type <i> proto_start echo_mask echo_size debug_mask debug_list debug_flag mrtdump_mask mrtdump_list mrtdump_flag export_or_preexport
63
%type <ps> proto_patt proto_patt2
64 65 66

CF_GRAMMAR

67 68
/* Setting of router ID */

69
CF_ADDTO(conf, rtrid)
70

71
rtrid: ROUTER ID idval ';' {
72
   new_config->router_id = $3;
73
   }
74 75 76
 ;

idval:
77 78 79 80 81 82
   NUM { $$ = $1; }
 | RTRID
 | IPA {
#ifndef IPV6
     $$ = ipa_to_u32($1);
#else
83
     cf_error("Router IDs must be entered as hexadecimal numbers or IPv4 addresses in IPv6 version");
84 85
#endif
   }
86 87
 ;

88

89
CF_ADDTO(conf, listen)
90

91
listen: LISTEN BGP listen_opts ';' ;
92

93
listen_opts:
94
   /* Nothing */
95
 | listen_opts listen_opt
96 97
 ;

98 99 100
listen_opt: 
   ADDRESS ipa { new_config->listen_bgp_addr = $2; }
 | PORT expr { new_config->listen_bgp_port = $2; }
101 102
 | V6ONLY { new_config->listen_bgp_flags = 0; }
 | DUAL { new_config->listen_bgp_flags = 1; }
103 104 105
 ;


106 107 108 109 110
/* Creation of routing tables */

CF_ADDTO(conf, newtab)

newtab: TABLE SYM {
111
   rt_new_table($2);
112 113 114
   }
 ;

115 116 117 118
/* Definition of protocols */

CF_ADDTO(conf, proto)

119 120 121
proto_start:
   PROTOCOL { $$ = SYM_PROTO; }
 | TEMPLATE { $$ = SYM_TEMPLATE; }
122
 ;
123 124 125

proto_name:
   /* EMPTY */ {
126
     struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
127
     s->class = this_proto->class;
128 129 130 131
     s->def = this_proto;
     this_proto->name = s->name;
     }
 | SYM {
132
     cf_define_symbol($1, this_proto->class, this_proto);
133 134
     this_proto->name = $1->name;
   }
135 136 137 138 139 140 141 142
 | SYM FROM SYM {
     if (($3->class != SYM_TEMPLATE) && ($3->class != SYM_PROTO)) cf_error("Template or protocol name expected");

     cf_define_symbol($1, this_proto->class, this_proto);
     this_proto->name = $1->name;

     proto_copy_config(this_proto, $3->def);
   }
143 144 145 146
 ;

proto_item:
   /* EMPTY */
147
 | PREFERENCE expr {
148
     if ($2 < 0 || $2 > 0xFFFF) cf_error("Invalid preference");
149 150
     this_proto->preference = $2;
   }
151
 | DISABLED bool { this_proto->disabled = $2; }
152
 | DEBUG debug_mask { this_proto->debug = $2; }
153
 | MRTDUMP mrtdump_mask { this_proto->mrtdump = $2; }
154 155
 | IMPORT imexport { this_proto->in_filter = $2; }
 | EXPORT imexport { this_proto->out_filter = $2; }
156
 | TABLE rtable { this_proto->table = $2; }
157
 | ROUTER ID idval { this_proto->router_id = $3; }
158
 | DESCRIPTION TEXT { this_proto->dsc = $2; }
159 160 161 162
 ;

imexport:
   FILTER filter { $$ = $2; }
163
 | where_filter
164 165
 | ALL { $$ = FILTER_ACCEPT; }
 | NONE { $$ = FILTER_REJECT; }
166 167
 ;

168 169 170 171 172 173 174
rtable:
   SYM {
     if ($1->class != SYM_TABLE) cf_error("Table name expected");
     $$ = $1->def;
   }
 ;

175 176 177 178
CF_ADDTO(conf, debug_default)

debug_default:
   DEBUG PROTOCOLS debug_mask { new_config->proto_default_debug = $3; }
179
 | DEBUG COMMANDS expr { new_config->cli_debug = $3; }
180 181
 ;

182 183
/* MRTDUMP PROTOCOLS is in systep/unix/config.Y */

184 185
/* Interface patterns */

186 187 188 189 190 191 192 193 194 195
iface_patt_node_init:
   /* EMPTY */ {
     struct iface_patt_node *ipn = cfg_allocz(sizeof(struct iface_patt_node));
     add_tail(&this_ipatt->ipn_list, NODE ipn);
     this_ipn = ipn;
   }
 ;

iface_patt_node_body:
   TEXT { this_ipn->pattern = $1; this_ipn->prefix = IPA_NONE; this_ipn->pxlen = 0; }
196 197
 | prefix_or_ipa { this_ipn->pattern = NULL; this_ipn->prefix = $1.addr; this_ipn->pxlen = $1.len; }
 | TEXT prefix_or_ipa { this_ipn->pattern = $1; this_ipn->prefix = $2.addr; this_ipn->pxlen = $2.len; }
198 199 200 201 202 203 204 205 206 207 208 209 210 211 212
 ;

iface_negate:
       { this_ipn->positive = 1; }
 | '-' { this_ipn->positive = 0; }
 ;

iface_patt_node:
   iface_patt_node_init iface_negate iface_patt_node_body 
 ;


iface_patt_list:
   iface_patt_node
 | iface_patt_list ',' iface_patt_node
213 214
 ;

215

216
/* Direct device route protocol */
217 218 219

CF_ADDTO(proto, dev_proto '}')

220
dev_proto_start: proto_start DIRECT {
221 222
     this_proto = proto_config_new(&proto_device, sizeof(struct rt_dev_config), $1);
     init_list(&DIRECT_CFG->iface_list);
223 224 225 226
   }
 ;

dev_proto:
227
   dev_proto_start proto_name '{'
228
 | dev_proto proto_item ';'
229
 | dev_proto dev_iface_patt ';'
230 231
 ;

232
dev_iface_init:
233
   /* EMPTY */ {
234
     this_ipatt = cfg_allocz(sizeof(struct iface_patt));
235
     add_tail(&DIRECT_CFG->iface_list, NODE this_ipatt);
236
     init_list(&this_ipatt->ipn_list);
237 238 239
   }
 ;

240 241
dev_iface_patt:
   INTERFACE dev_iface_init iface_patt_list
242 243
 ;

244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260
/* Debug flags */

debug_mask:
   ALL { $$ = ~0; }
 | OFF { $$ = 0; }
 | '{' debug_list '}' { $$ = $2; }
 ;

debug_list:
   debug_flag
 | debug_list ',' debug_flag { $$ = $1 | $3; }
 ;

debug_flag:
   STATES	{ $$ = D_STATES; }
 | ROUTES	{ $$ = D_ROUTES; }
 | FILTERS	{ $$ = D_FILTERS; }
261
 | INTERFACES	{ $$ = D_IFACES; }
262 263 264 265
 | EVENTS	{ $$ = D_EVENTS; }
 | PACKETS	{ $$ = D_PACKETS; }
 ;

266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283
/* MRTDump flags */

mrtdump_mask:
   ALL { $$ = ~0; }
 | OFF { $$ = 0; }
 | '{' mrtdump_list '}' { $$ = $2; }
 ;

mrtdump_list:
   mrtdump_flag
 | mrtdump_list ',' mrtdump_flag { $$ = $1 | $3; }
 ;

mrtdump_flag:
   STATES	{ $$ = MD_STATES; }
 | MESSAGES	{ $$ = MD_MESSAGES; }
 ;

284 285
/* Password lists */

286 287 288 289 290
password_list:
   PASSWORDS '{' password_items '}'
 | password_item
;

291 292 293 294 295 296 297 298 299 300 301
password_items: 
    /* empty */
  | password_item ';' password_items
;

password_item:
    password_item_begin '{' password_item_params '}'
  | password_item_begin
;

password_item_begin:
302
   PASSWORD TEXT {
303 304 305 306 307
     if (!this_p_list) {
     	this_p_list = cfg_alloc(sizeof(list));
     	init_list(this_p_list);
        password_id = 1;
     }
308 309 310 311 312 313
     this_p_item = cfg_alloc(sizeof (struct password_item));
     this_p_item->password = $2;
     this_p_item->genfrom = 0;
     this_p_item->gento = TIME_INFINITY;
     this_p_item->accfrom = 0;
     this_p_item->accto = TIME_INFINITY;
314
     this_p_item->id = password_id++;
315
     add_tail(this_p_list, &this_p_item->n);
316
   }
317
;
318

319
password_item_params:
320
   /* empty */ { } 
321 322 323 324
 | GENERATE FROM datetime ';' password_item_params { this_p_item->genfrom = $3; }
 | GENERATE TO datetime ';' password_item_params { this_p_item->gento = $3; }
 | ACCEPT FROM datetime ';' password_item_params { this_p_item->accfrom = $3; }
 | ACCEPT TO datetime ';' password_item_params { this_p_item->accto = $3; }
325
 | ID expr ';' password_item_params { this_p_item->id = $2; if ($2 <= 0) cf_error("Password ID has to be greated than zero."); }
326 327 328
 ;


329

330
/* Core commands */
331
CF_CLI_HELP(SHOW, ..., [[Show status information]])
332

333
CF_CLI(SHOW STATUS,,, [[Show router status]])
334
{ cmd_show_status(); } ;
335

336 337 338
CF_CLI(SHOW MEMORY,,, [[Show memory usage]])
{ cmd_show_memory(); } ;

339
CF_CLI(SHOW PROTOCOLS, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocols]])
340
{ proto_apply_cmd($3, proto_cmd_show, 0, 0); } ;
341

342
CF_CLI(SHOW PROTOCOLS ALL, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocol details]])
343
{ proto_apply_cmd($4, proto_cmd_show, 0, 1); } ;
344

345 346 347 348 349
optsym:
   SYM
 | /* empty */ { $$ = NULL; }
 ;

350 351 352 353 354 355
CF_CLI(SHOW INTERFACES,,, [[Show network interfaces]])
{ if_show(); } ;

CF_CLI(SHOW INTERFACES SUMMARY,,, [[Show summary of network interfaces]])
{ if_show_summary(); } ;

356
CF_CLI(SHOW ROUTE, r_args, [[[<prefix>|for <prefix>|for <ip>] [table <t>] [filter <f>|where <cond>] [all] [primary] [(export|preexport) <p>] [protocol <p>] [stats|count]]], [[Show routing table]])
357 358 359 360 361 362 363 364 365
{ rt_show($3); } ;

r_args:
   /* empty */ {
     $$ = cfg_allocz(sizeof(struct rt_show_data));
     $$->pxlen = 256;
     $$->filter = FILTER_ACCEPT;
     $$->table = config->master_rtc->table;
   }
366
 | r_args prefix {
367 368
     $$ = $1;
     if ($$->pxlen != 256) cf_error("Only one prefix expected");
369 370
     $$->prefix = $2.addr;
     $$->pxlen = $2.len;
371
   }
372 373 374 375 376 377 378
 | r_args FOR prefix_or_ipa {
     $$ = $1;
     if ($$->pxlen != 256) cf_error("Only one prefix expected");
     $$->prefix = $3.addr;
     $$->pxlen = $3.len;
     $$->show_for = 1;
   }
379 380 381 382 383 384 385
 | r_args TABLE SYM {
     $$ = $1;
     if ($3->class != SYM_TABLE) cf_error("%s is not a table", $3->name);
     $$->table = ((struct rtable_config *)$3->def)->table;
   }
 | r_args FILTER filter {
     $$ = $1;
386
     if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
387 388
     $$->filter = $3;
   }
389 390 391 392 393
 | r_args where_filter {
     $$ = $1;
     if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
     $$->filter = $2;
   }
394 395 396 397
 | r_args ALL {
     $$ = $1;
     $$->verbose = 1;
   }
398 399 400 401
 | r_args PRIMARY {
     $$ = $1;
     $$->primary_only = 1;
   }
402
 | r_args export_or_preexport SYM {
403 404
     struct proto_config *c = (struct proto_config *) $3->def;
     $$ = $1;
405
     if ($$->export_mode) cf_error("Protocol specified twice");
406
     if ($3->class != SYM_PROTO || !c->proto) cf_error("%s is not a protocol", $3->name);
407
     $$->export_mode = $2;
408
     $$->primary_only = 1;
409
     $$->export_protocol = c->proto;
410 411
     $$->running_on_config = c->proto->cf->global;
   }
412 413 414 415 416 417 418
 | r_args PROTOCOL SYM {
     struct proto_config *c = (struct proto_config *) $3->def;
     $$ = $1;
     if ($$->show_protocol) cf_error("Protocol specified twice");
     if ($3->class != SYM_PROTO || !c->proto) cf_error("%s is not a protocol", $3->name);
     $$->show_protocol = c->proto;
     $$->running_on_config = c->proto->cf->global;
419
   }
420 421 422 423
 | r_args STATS {
     $$ = $1;
     $$->stats = 1;
   }
424 425 426 427
 | r_args COUNT {
     $$ = $1;
     $$->stats = 2;
   }
428 429
 ;

430 431 432
export_or_preexport:
   PREEXPORT { $$ = 1; }
 | EXPORT { $$ = 2; }
433 434
 ;

435 436 437
CF_CLI(SHOW SYMBOLS, optsym, [<symbol>], [[Show all known symbolic names]])
{ cmd_show_symbols($3); } ;

438 439
CF_CLI_HELP(DUMP, ..., [[Dump debugging information]])
CF_CLI(DUMP RESOURCES,,, [[Dump all allocated resource]])
440
{ rdump(&root_pool); cli_msg(0, ""); } ;
441
CF_CLI(DUMP SOCKETS,,, [[Dump open sockets]])
442
{ sk_dump_all(); cli_msg(0, ""); } ;
443
CF_CLI(DUMP INTERFACES,,, [[Dump interface information]])
444
{ if_dump_all(); cli_msg(0, ""); } ;
445
CF_CLI(DUMP NEIGHBORS,,, [[Dump neighbor cache]])
446
{ neigh_dump_all(); cli_msg(0, ""); } ;
447
CF_CLI(DUMP ATTRIBUTES,,, [[Dump attribute cache]])
448
{ rta_dump_all(); cli_msg(0, ""); } ;
449
CF_CLI(DUMP ROUTES,,, [[Dump routing table]])
450
{ rt_dump_all(); cli_msg(0, ""); } ;
451
CF_CLI(DUMP PROTOCOLS,,, [[Dump protocol information]])
452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471
{ protos_dump_all(); cli_msg(0, ""); } ;

CF_CLI(ECHO, echo_mask echo_size, [all | off | <mask>] [<buffer-size>], [[Configure echoing of log messages]]) {
  cli_set_log_echo(this_cli, $2, $3);
  cli_msg(0, "");
} ;

echo_mask:
   ALL { $$ = ~0; }
 | OFF { $$ = 0; }
 | NUM
 ;

echo_size:
   /* empty */ { $$ = 4096; }
 | NUM {
     if ($1 < 256 || $1 > 65536) cf_error("Invalid log buffer size");
     $$ = $1;
   }
 ;
472

473
CF_CLI(DISABLE, proto_patt, <protocol> | \"<pattern>\" | all, [[Disable protocol]])
474
{ proto_apply_cmd($2, proto_cmd_disable, 1, 0); } ;
475
CF_CLI(ENABLE, proto_patt, <protocol> | \"<pattern>\" | all, [[Enable protocol]])
476
{ proto_apply_cmd($2, proto_cmd_enable, 1, 0); } ;
477
CF_CLI(RESTART, proto_patt, <protocol> | \"<pattern>\" | all, [[Restart protocol]])
478
{ proto_apply_cmd($2, proto_cmd_restart, 1, 0); } ;
479
CF_CLI(RELOAD, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol]])
480
{ proto_apply_cmd($2, proto_cmd_reload, 1, CMD_RELOAD); } ;
481
CF_CLI(RELOAD IN, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just imported routes)]])
482
{ proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_IN); } ;
483
CF_CLI(RELOAD OUT, proto_patt, <protocol> | \"<pattern>\" | all, [[Reload protocol (just exported routes)]])
484
{ proto_apply_cmd($3, proto_cmd_reload, 1, CMD_RELOAD_OUT); } ;
485

486
CF_CLI_HELP(DEBUG, ..., [[Control protocol debugging via BIRD logs]])
487
CF_CLI(DEBUG, proto_patt debug_mask, (<protocol> | <pattern> | all) (all | off | { states | routes | filters | interfaces | events | packets }), [[Control protocol debugging via BIRD logs]])
488
{ proto_apply_cmd($2, proto_cmd_debug, 1, $3); } ;
489 490 491

CF_CLI_HELP(MRTDUMP, ..., [[Control protocol debugging via MRTdump files]])
CF_CLI(MRTDUMP, proto_patt mrtdump_mask, (<protocol> | <pattern> | all) (all | off | { states | messages }), [[Control protocol debugging via MRTdump format]])
492 493 494 495
{ proto_apply_cmd($2, proto_cmd_mrtdump, 1, $3); } ;

CF_CLI(RESTRICT,,,[[Restrict current CLI session to safe commands]])
{ this_cli->restricted = 1; cli_msg(16, "Access restricted"); } ;
496

497
proto_patt:
498 499 500
   SYM  { $$.ptr = $1; $$.patt = 0; }
 | ALL  { $$.ptr = NULL; $$.patt = 1; }
 | TEXT { $$.ptr = $1; $$.patt = 1; }
501 502
 ;

503 504 505 506 507 508
proto_patt2:
   SYM  { $$.ptr = $1; $$.patt = 0; }
 |      { $$.ptr = NULL; $$.patt = 1; }
 | TEXT { $$.ptr = $1; $$.patt = 1; }
 ;

509 510 511
CF_ADDTO(dynamic_attr, IGP_METRIC
	{ $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_GEN_IGP_METRIC); })

512

513 514 515
CF_CODE

CF_END