2019-11-08 18:48:50 +01:00
|
|
|
/*
|
|
|
|
* FRR filter northbound implementation.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2019 Network Device Education Foundation, Inc. ("NetDEF")
|
|
|
|
* Rafael Zalamena
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
|
|
* 02110-1301 USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "zebra.h"
|
|
|
|
|
|
|
|
#include "lib/northbound.h"
|
|
|
|
#include "lib/prefix.h"
|
2020-08-14 00:59:47 +02:00
|
|
|
#include "lib/printfrr.h"
|
2019-11-08 18:48:50 +01:00
|
|
|
|
|
|
|
#include "lib/filter.h"
|
|
|
|
#include "lib/plist.h"
|
|
|
|
#include "lib/plist_int.h"
|
2020-08-25 16:27:43 +02:00
|
|
|
#include "lib/routemap.h"
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
/* Helper function. */
|
|
|
|
static in_addr_t
|
|
|
|
ipv4_network_addr(in_addr_t hostaddr, int masklen)
|
|
|
|
{
|
|
|
|
struct in_addr mask;
|
|
|
|
|
|
|
|
masklen2ip(masklen, &mask);
|
|
|
|
return hostaddr & mask.s_addr;
|
|
|
|
}
|
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
static void acl_notify_route_map(struct access_list *acl, int route_map_event)
|
|
|
|
{
|
|
|
|
switch (route_map_event) {
|
|
|
|
case RMAP_EVENT_FILTER_ADDED:
|
|
|
|
if (acl->master->add_hook)
|
|
|
|
(*acl->master->add_hook)(acl);
|
|
|
|
break;
|
|
|
|
case RMAP_EVENT_FILTER_DELETED:
|
|
|
|
if (acl->master->delete_hook)
|
|
|
|
(*acl->master->delete_hook)(acl);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
route_map_notify_dependencies(acl->name, route_map_event);
|
|
|
|
}
|
|
|
|
|
2020-08-14 00:59:47 +02:00
|
|
|
static enum nb_error prefix_list_length_validate(struct nb_cb_modify_args *args)
|
2020-04-30 22:53:11 +02:00
|
|
|
{
|
2020-08-14 00:59:47 +02:00
|
|
|
int type = yang_dnode_get_enum(args->dnode, "../../type");
|
2020-04-30 22:53:11 +02:00
|
|
|
const char *xpath_le = NULL, *xpath_ge = NULL;
|
|
|
|
struct prefix p;
|
|
|
|
uint8_t le, ge;
|
|
|
|
|
2020-06-05 20:05:34 +02:00
|
|
|
if (type == YPLT_IPV4) {
|
2020-08-14 00:59:47 +02:00
|
|
|
yang_dnode_get_prefix(&p, args->dnode, "../ipv4-prefix");
|
2020-04-30 22:53:11 +02:00
|
|
|
xpath_le = "../ipv4-prefix-length-lesser-or-equal";
|
|
|
|
xpath_ge = "../ipv4-prefix-length-greater-or-equal";
|
|
|
|
} else {
|
2020-08-14 00:59:47 +02:00
|
|
|
yang_dnode_get_prefix(&p, args->dnode, "../ipv6-prefix");
|
2020-04-30 22:53:11 +02:00
|
|
|
xpath_le = "../ipv6-prefix-length-lesser-or-equal";
|
|
|
|
xpath_ge = "../ipv6-prefix-length-greater-or-equal";
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check rule:
|
|
|
|
* prefix length <= le.
|
|
|
|
*/
|
2020-08-14 00:59:47 +02:00
|
|
|
if (yang_dnode_exists(args->dnode, xpath_le)) {
|
|
|
|
le = yang_dnode_get_uint8(args->dnode, xpath_le);
|
2020-04-30 22:53:11 +02:00
|
|
|
if (p.prefixlen > le)
|
|
|
|
goto log_and_fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check rule:
|
|
|
|
* prefix length < ge.
|
|
|
|
*/
|
2020-08-14 00:59:47 +02:00
|
|
|
if (yang_dnode_exists(args->dnode, xpath_ge)) {
|
|
|
|
ge = yang_dnode_get_uint8(args->dnode, xpath_ge);
|
2020-04-30 22:53:11 +02:00
|
|
|
if (p.prefixlen >= ge)
|
|
|
|
goto log_and_fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check rule:
|
|
|
|
* ge <= le.
|
|
|
|
*/
|
2020-08-14 00:59:47 +02:00
|
|
|
if (yang_dnode_exists(args->dnode, xpath_le)
|
|
|
|
&& yang_dnode_exists(args->dnode, xpath_ge)) {
|
|
|
|
le = yang_dnode_get_uint8(args->dnode, xpath_le);
|
|
|
|
ge = yang_dnode_get_uint8(args->dnode, xpath_ge);
|
2020-04-30 22:53:11 +02:00
|
|
|
if (ge > le)
|
|
|
|
goto log_and_fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
|
2020-08-14 00:59:47 +02:00
|
|
|
log_and_fail:
|
|
|
|
snprintfrr(
|
|
|
|
args->errmsg, args->errmsg_len,
|
|
|
|
"Invalid prefix range for %pFX: Make sure that mask length < ge <= le",
|
|
|
|
&p);
|
2020-04-30 22:53:11 +02:00
|
|
|
return NB_ERR_VALIDATION;
|
|
|
|
}
|
|
|
|
|
2020-05-02 03:14:00 +02:00
|
|
|
/**
|
|
|
|
* Sets prefix list entry to blank value.
|
|
|
|
*
|
|
|
|
* \param[out] ple prefix list entry to modify.
|
|
|
|
*/
|
|
|
|
static void prefix_list_entry_set_empty(struct prefix_list_entry *ple)
|
|
|
|
{
|
|
|
|
ple->any = false;
|
|
|
|
memset(&ple->prefix, 0, sizeof(ple->prefix));
|
|
|
|
ple->ge = 0;
|
|
|
|
ple->le = 0;
|
|
|
|
}
|
|
|
|
|
2020-08-26 17:50:07 +02:00
|
|
|
/**
|
|
|
|
* Unsets the cisco style rule for addresses so it becomes disabled (the
|
|
|
|
* equivalent of setting: `0.0.0.0/32`).
|
|
|
|
*
|
|
|
|
* \param addr address part.
|
|
|
|
* \param mask mask part.
|
|
|
|
*/
|
|
|
|
static void cisco_unset_addr_mask(struct in_addr *addr, struct in_addr *mask)
|
|
|
|
{
|
|
|
|
addr->s_addr = INADDR_ANY;
|
|
|
|
mask->s_addr = CISCO_BIN_HOST_WILDCARD_MASK;
|
|
|
|
}
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_create(struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct access_list *acl = NULL;
|
2019-11-08 18:48:50 +01:00
|
|
|
const char *acl_name;
|
2020-07-19 20:27:56 +02:00
|
|
|
int type;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
type = yang_dnode_get_enum(args->dnode, "./type");
|
|
|
|
acl_name = yang_dnode_get_string(args->dnode, "./name");
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case YALT_IPV4:
|
|
|
|
acl = access_list_get(AFI_IP, acl_name);
|
|
|
|
break;
|
|
|
|
case YALT_IPV6:
|
|
|
|
acl = access_list_get(AFI_IP6, acl_name);
|
|
|
|
break;
|
|
|
|
case YALT_MAC:
|
|
|
|
acl = access_list_get(AFI_L2VPN, acl_name);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
nb_running_set_entry(args->dnode, acl);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct access_master *am;
|
|
|
|
struct access_list *acl;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
acl = nb_running_unset_entry(args->dnode);
|
2019-11-08 18:48:50 +01:00
|
|
|
am = acl->master;
|
|
|
|
if (am->delete_hook)
|
|
|
|
am->delete_hook(acl);
|
|
|
|
|
|
|
|
access_list_delete(acl);
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/remark
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_remark_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct access_list *acl;
|
|
|
|
const char *remark;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
acl = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
if (acl->remark)
|
|
|
|
XFREE(MTYPE_TMP, acl->remark);
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
remark = yang_dnode_get_string(args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
acl->remark = XSTRDUP(MTYPE_TMP, remark);
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_remark_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct access_list *acl;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
acl = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
if (acl->remark)
|
|
|
|
XFREE(MTYPE_TMP, acl->remark);
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_create(struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct access_list *acl;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
|
|
|
f = filter_new();
|
2020-04-29 20:33:46 +02:00
|
|
|
f->seq = yang_dnode_get_uint32(args->dnode, "./sequence");
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
acl = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
f->acl = acl;
|
|
|
|
access_list_filter_add(acl, f);
|
2020-04-29 20:33:46 +02:00
|
|
|
nb_running_set_entry(args->dnode, f);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct access_list *acl;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_unset_entry(args->dnode);
|
2019-11-08 18:48:50 +01:00
|
|
|
acl = f->acl;
|
|
|
|
access_list_filter_delete(acl, f);
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/action
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_entry_action_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
const char *filter_type;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
|
|
|
filter_type = yang_dnode_get_string(args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
if (strcmp(filter_type, "permit") == 0)
|
|
|
|
f->type = FILTER_PERMIT;
|
|
|
|
else
|
|
|
|
f->type = FILTER_DENY;
|
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/ipv4-prefix
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_entry_ipv4_prefix_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_zebra *fz;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
f->cisco = 0;
|
|
|
|
fz = &f->u.zfilter;
|
|
|
|
yang_dnode_get_prefix(&fz->prefix, args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_entry_ipv4_prefix_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_zebra *fz;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
fz = &f->u.zfilter;
|
|
|
|
memset(&fz->prefix, 0, sizeof(fz->prefix));
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/ipv4-exact-match
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_entry_ipv4_exact_match_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_zebra *fz;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
fz = &f->u.zfilter;
|
|
|
|
fz->exact = yang_dnode_get_bool(args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_entry_ipv4_exact_match_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_zebra *fz;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
fz = &f->u.zfilter;
|
|
|
|
fz->exact = 0;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/host
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-04-29 20:33:46 +02:00
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_entry_host_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
f->cisco = 1;
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-07-19 20:27:56 +02:00
|
|
|
yang_dnode_get_ipv4(&fc->addr, args->dnode, NULL);
|
2020-08-26 17:50:07 +02:00
|
|
|
fc->addr_mask.s_addr = CISCO_BIN_HOST_WILDCARD_MASK;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-07-19 20:27:56 +02:00
|
|
|
lib_access_list_entry_host_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-08-26 17:50:07 +02:00
|
|
|
cisco_unset_addr_mask(&fc->addr, &fc->addr_mask);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/network
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int
|
|
|
|
lib_access_list_entry_network_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
2020-07-19 20:27:56 +02:00
|
|
|
struct prefix p;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
f->cisco = 1;
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-07-19 20:27:56 +02:00
|
|
|
yang_dnode_get_prefix(&p, args->dnode, NULL);
|
|
|
|
fc->addr.s_addr = ipv4_network_addr(p.u.prefix4.s_addr, p.prefixlen);
|
|
|
|
masklen2ip(p.prefixlen, &fc->addr_mask);
|
2020-08-26 17:50:07 +02:00
|
|
|
fc->addr_mask.s_addr = ~fc->addr_mask.s_addr;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
static int
|
|
|
|
lib_access_list_entry_network_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-08-26 17:50:07 +02:00
|
|
|
cisco_unset_addr_mask(&fc->addr, &fc->addr_mask);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/source-any
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int
|
|
|
|
lib_access_list_entry_source_any_create(struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
f->cisco = 1;
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-07-19 20:27:56 +02:00
|
|
|
fc->addr.s_addr = INADDR_ANY;
|
2020-08-26 17:50:07 +02:00
|
|
|
fc->addr_mask.s_addr = CISCO_BIN_ANY_WILDCARD_MASK;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
static int
|
|
|
|
lib_access_list_entry_source_any_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-08-26 17:50:07 +02:00
|
|
|
cisco_unset_addr_mask(&fc->addr, &fc->addr_mask);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/destination-host
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_destination_host_modify(
|
|
|
|
struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-07-19 20:27:56 +02:00
|
|
|
fc->extended = 1;
|
|
|
|
yang_dnode_get_ipv4(&fc->mask, args->dnode, NULL);
|
2020-08-26 17:50:07 +02:00
|
|
|
fc->mask_mask.s_addr = CISCO_BIN_HOST_WILDCARD_MASK;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_destination_host_destroy(
|
2020-04-29 20:33:46 +02:00
|
|
|
struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_cisco *fc;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
fc = &f->u.cfilter;
|
2020-07-19 20:27:56 +02:00
|
|
|
fc->extended = 0;
|
2020-08-26 17:50:07 +02:00
|
|
|
cisco_unset_addr_mask(&fc->mask, &fc->mask_mask);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/destination-network
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_destination_network_modify(
|
|
|
|
struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_cisco *fc;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
2020-07-19 20:27:56 +02:00
|
|
|
struct prefix p;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
fc = &f->u.cfilter;
|
|
|
|
fc->extended = 1;
|
|
|
|
yang_dnode_get_prefix(&p, args->dnode, NULL);
|
|
|
|
fc->mask.s_addr = ipv4_network_addr(p.u.prefix4.s_addr, p.prefixlen);
|
|
|
|
masklen2ip(p.prefixlen, &fc->mask_mask);
|
2020-08-26 17:50:07 +02:00
|
|
|
fc->mask_mask.s_addr = ~fc->mask_mask.s_addr;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_destination_network_destroy(
|
|
|
|
struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_cisco *fc;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
fc = &f->u.cfilter;
|
|
|
|
fc->extended = 0;
|
2020-08-26 17:50:07 +02:00
|
|
|
cisco_unset_addr_mask(&fc->mask, &fc->mask_mask);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-07-19 20:27:56 +02:00
|
|
|
* XPath: /frr-filter:lib/access-list/entry/destination-any
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_destination_any_create(
|
|
|
|
struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_cisco *fc;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
fc = &f->u.cfilter;
|
|
|
|
fc->extended = 1;
|
|
|
|
fc->mask.s_addr = INADDR_ANY;
|
2020-08-26 17:50:07 +02:00
|
|
|
fc->mask_mask.s_addr = CISCO_BIN_ANY_WILDCARD_MASK;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-07-19 20:27:56 +02:00
|
|
|
static int lib_access_list_entry_destination_any_destroy(
|
|
|
|
struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
struct filter_cisco *fc;
|
2019-11-08 18:48:50 +01:00
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
fc = &f->u.cfilter;
|
|
|
|
fc->extended = 0;
|
2020-08-26 17:50:07 +02:00
|
|
|
cisco_unset_addr_mask(&fc->mask, &fc->mask_mask);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/access-list/entry/any
|
|
|
|
*/
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_access_list_entry_any_create(struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_zebra *fz;
|
|
|
|
struct filter *f;
|
|
|
|
int type;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2020-07-19 20:27:56 +02:00
|
|
|
f->cisco = 0;
|
2019-11-08 18:48:50 +01:00
|
|
|
fz = &f->u.zfilter;
|
|
|
|
memset(&fz->prefix, 0, sizeof(fz->prefix));
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
type = yang_dnode_get_enum(args->dnode, "../../type");
|
2019-11-08 18:48:50 +01:00
|
|
|
switch (type) {
|
2020-06-05 20:05:34 +02:00
|
|
|
case YALT_IPV4:
|
2019-11-08 18:48:50 +01:00
|
|
|
fz->prefix.family = AF_INET;
|
|
|
|
break;
|
2020-06-05 20:05:34 +02:00
|
|
|
case YALT_IPV6:
|
2019-11-08 18:48:50 +01:00
|
|
|
fz->prefix.family = AF_INET6;
|
|
|
|
break;
|
2020-06-05 20:05:34 +02:00
|
|
|
case YALT_MAC:
|
2019-11-08 18:48:50 +01:00
|
|
|
fz->prefix.family = AF_ETHERNET;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_ADDED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_access_list_entry_any_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct filter_zebra *fz;
|
|
|
|
struct filter *f;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
f = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
fz = &f->u.zfilter;
|
|
|
|
fz->prefix.family = 0;
|
|
|
|
|
2020-08-25 16:27:43 +02:00
|
|
|
acl_notify_route_map(f->acl, RMAP_EVENT_FILTER_DELETED);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/prefix-list
|
|
|
|
*/
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_prefix_list_create(struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
2020-04-29 20:28:38 +02:00
|
|
|
struct prefix_list *pl = NULL;
|
2019-11-08 18:48:50 +01:00
|
|
|
const char *name;
|
|
|
|
int type;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
type = yang_dnode_get_enum(args->dnode, "./type");
|
|
|
|
name = yang_dnode_get_string(args->dnode, "./name");
|
2019-11-08 18:48:50 +01:00
|
|
|
switch (type) {
|
|
|
|
case 0: /* ipv4 */
|
|
|
|
pl = prefix_list_get(AFI_IP, 0, name);
|
|
|
|
break;
|
|
|
|
case 1: /* ipv6 */
|
|
|
|
pl = prefix_list_get(AFI_IP6, 0, name);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
nb_running_set_entry(args->dnode, pl);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_prefix_list_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list *pl;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
pl = nb_running_unset_entry(args->dnode);
|
2019-11-08 18:48:50 +01:00
|
|
|
prefix_list_delete(pl);
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2020-04-30 22:23:51 +02:00
|
|
|
* XPath: /frr-filter:lib/prefix-list/remark
|
2019-11-08 18:48:50 +01:00
|
|
|
*/
|
2020-04-30 22:23:51 +02:00
|
|
|
static int lib_prefix_list_remark_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list *pl;
|
|
|
|
const char *remark;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
pl = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
if (pl->desc)
|
|
|
|
XFREE(MTYPE_TMP, pl->desc);
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
remark = yang_dnode_get_string(args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
pl->desc = XSTRDUP(MTYPE_TMP, remark);
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-04-30 22:23:51 +02:00
|
|
|
static int lib_prefix_list_remark_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list *pl;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
pl = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
if (pl->desc)
|
|
|
|
XFREE(MTYPE_TMP, pl->desc);
|
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/prefix-list/entry
|
|
|
|
*/
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_prefix_list_entry_create(struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
struct prefix_list *pl;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
pl = nb_running_get_entry(args->dnode, NULL, true);
|
2019-11-08 18:48:50 +01:00
|
|
|
ple = prefix_list_entry_new();
|
|
|
|
ple->pl = pl;
|
2020-04-30 22:23:51 +02:00
|
|
|
ple->seq = yang_dnode_get_uint32(args->dnode, "./sequence");
|
2020-05-02 03:14:00 +02:00
|
|
|
prefix_list_entry_set_empty(ple);
|
2020-05-01 15:34:03 +02:00
|
|
|
nb_running_set_entry(args->dnode, ple);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_prefix_list_entry_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_unset_entry(args->dnode);
|
2020-05-01 15:34:03 +02:00
|
|
|
if (ple->installed)
|
2020-05-02 03:14:00 +02:00
|
|
|
prefix_list_entry_delete2(ple);
|
2020-05-01 15:34:03 +02:00
|
|
|
else
|
|
|
|
prefix_list_entry_free(ple);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/prefix-list/entry/action
|
|
|
|
*/
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_prefix_list_entry_action_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
2020-06-05 20:05:34 +02:00
|
|
|
int action_type;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2020-06-05 20:05:34 +02:00
|
|
|
action_type = yang_dnode_get_enum(args->dnode, NULL);
|
|
|
|
if (action_type == YPLA_PERMIT)
|
2019-11-08 18:48:50 +01:00
|
|
|
ple->type = PREFIX_PERMIT;
|
|
|
|
else
|
|
|
|
ple->type = PREFIX_DENY;
|
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/prefix-list/entry/ipv4-prefix
|
|
|
|
*/
|
|
|
|
static int
|
2020-04-29 20:33:46 +02:00
|
|
|
lib_prefix_list_entry_ipv4_prefix_modify(struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
2020-05-04 22:32:06 +02:00
|
|
|
struct prefix p;
|
|
|
|
|
|
|
|
if (args->event == NB_EV_VALIDATE) {
|
|
|
|
/*
|
|
|
|
* TODO: validate prefix_entry_dup_check() passes.
|
|
|
|
*
|
|
|
|
* This needs to be implemented using YANG lyd_node
|
|
|
|
* navigation, because the `priv` data structures are not
|
|
|
|
* available at `NB_EV_VALIDATE` phase. An easier
|
|
|
|
* alternative would be mark `ipvx-prefix` as unique
|
|
|
|
* (see RFC 7950, Section 7.8.3. The list "unique" Statement).
|
|
|
|
*/
|
|
|
|
return NB_OK;
|
|
|
|
}
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
yang_dnode_get_prefix(&ple->prefix, args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-05-04 22:32:06 +02:00
|
|
|
/* Apply mask and correct original address if necessary. */
|
|
|
|
prefix_copy(&p, &ple->prefix);
|
|
|
|
apply_mask(&p);
|
|
|
|
if (!prefix_same(&ple->prefix, &p)) {
|
|
|
|
zlog_info("%s: bad network %pFX correcting it to %pFX",
|
|
|
|
__func__, &ple->prefix, &p);
|
|
|
|
prefix_copy(&ple->prefix, &p);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2020-04-29 20:33:46 +02:00
|
|
|
lib_prefix_list_entry_ipv4_prefix_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
memset(&ple->prefix, 0, sizeof(ple->prefix));
|
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/prefix-list/entry/ipv4-prefix-length-greater-or-equal
|
|
|
|
*/
|
|
|
|
static int lib_prefix_list_entry_ipv4_prefix_length_greater_or_equal_modify(
|
2020-04-29 20:33:46 +02:00
|
|
|
struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
|
2020-04-30 22:53:11 +02:00
|
|
|
if (args->event == NB_EV_VALIDATE &&
|
2020-08-14 00:59:47 +02:00
|
|
|
prefix_list_length_validate(args) != NB_OK)
|
2020-04-30 22:53:11 +02:00
|
|
|
return NB_ERR_VALIDATION;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple->ge = yang_dnode_get_uint8(args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int lib_prefix_list_entry_ipv4_prefix_length_greater_or_equal_destroy(
|
2020-04-29 20:33:46 +02:00
|
|
|
struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
ple->ge = 0;
|
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/prefix-list/entry/ipv4-prefix-length-lesser-or-equal
|
|
|
|
*/
|
|
|
|
static int lib_prefix_list_entry_ipv4_prefix_length_lesser_or_equal_modify(
|
2020-04-29 20:33:46 +02:00
|
|
|
struct nb_cb_modify_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
|
2020-04-30 22:53:11 +02:00
|
|
|
if (args->event == NB_EV_VALIDATE &&
|
2020-08-14 00:59:47 +02:00
|
|
|
prefix_list_length_validate(args) != NB_OK)
|
2020-04-30 22:53:11 +02:00
|
|
|
return NB_ERR_VALIDATION;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple->le = yang_dnode_get_uint8(args->dnode, NULL);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int lib_prefix_list_entry_ipv4_prefix_length_lesser_or_equal_destroy(
|
2020-04-29 20:33:46 +02:00
|
|
|
struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
ple->le = 0;
|
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XPath: /frr-filter:lib/prefix-list/entry/any
|
|
|
|
*/
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_prefix_list_entry_any_create(struct nb_cb_create_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
2020-05-02 03:14:00 +02:00
|
|
|
int type;
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2020-05-02 03:14:00 +02:00
|
|
|
ple->any = true;
|
|
|
|
|
|
|
|
/* Fill prefix struct from scratch. */
|
2019-11-08 18:48:50 +01:00
|
|
|
memset(&ple->prefix, 0, sizeof(ple->prefix));
|
2020-05-02 03:14:00 +02:00
|
|
|
|
|
|
|
type = yang_dnode_get_enum(args->dnode, "../../type");
|
|
|
|
switch (type) {
|
2020-06-05 20:05:34 +02:00
|
|
|
case YPLT_IPV4:
|
2020-05-02 03:14:00 +02:00
|
|
|
ple->prefix.family = AF_INET;
|
|
|
|
ple->ge = 0;
|
|
|
|
ple->le = IPV4_MAX_BITLEN;
|
|
|
|
break;
|
2020-06-05 20:05:34 +02:00
|
|
|
case YPLT_IPV6:
|
2020-05-02 03:14:00 +02:00
|
|
|
ple->prefix.family = AF_INET6;
|
|
|
|
ple->ge = 0;
|
|
|
|
ple->le = IPV6_MAX_BITLEN;
|
|
|
|
break;
|
|
|
|
}
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
static int lib_prefix_list_entry_any_destroy(struct nb_cb_destroy_args *args)
|
2019-11-08 18:48:50 +01:00
|
|
|
{
|
|
|
|
struct prefix_list_entry *ple;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
if (args->event != NB_EV_APPLY)
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
|
2020-04-29 20:33:46 +02:00
|
|
|
ple = nb_running_get_entry(args->dnode, NULL, true);
|
2020-05-01 15:34:03 +02:00
|
|
|
|
|
|
|
/* Start prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_start(ple);
|
|
|
|
|
2020-05-02 03:14:00 +02:00
|
|
|
prefix_list_entry_set_empty(ple);
|
2019-11-08 18:48:50 +01:00
|
|
|
|
2020-05-01 15:34:03 +02:00
|
|
|
/* Finish prefix entry update procedure. */
|
|
|
|
prefix_list_entry_update_finish(ple);
|
|
|
|
|
2019-11-08 18:48:50 +01:00
|
|
|
return NB_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* clang-format off */
|
|
|
|
const struct frr_yang_module_info frr_filter_info = {
|
|
|
|
.name = "frr-filter",
|
|
|
|
.nodes = {
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.create = lib_access_list_create,
|
|
|
|
.destroy = lib_access_list_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/remark",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_remark_modify,
|
|
|
|
.destroy = lib_access_list_remark_destroy,
|
|
|
|
.cli_show = access_list_remark_show,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.create = lib_access_list_entry_create,
|
|
|
|
.destroy = lib_access_list_entry_destroy,
|
|
|
|
.cli_show = access_list_show,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/action",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_entry_action_modify,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/ipv4-prefix",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_entry_ipv4_prefix_modify,
|
|
|
|
.destroy = lib_access_list_entry_ipv4_prefix_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/ipv4-exact-match",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_entry_ipv4_exact_match_modify,
|
|
|
|
.destroy = lib_access_list_entry_ipv4_exact_match_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/host",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_entry_host_modify,
|
|
|
|
.destroy = lib_access_list_entry_host_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/network",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_entry_network_modify,
|
|
|
|
.destroy = lib_access_list_entry_network_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/source-any",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.create = lib_access_list_entry_source_any_create,
|
|
|
|
.destroy = lib_access_list_entry_source_any_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/destination-host",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_entry_destination_host_modify,
|
|
|
|
.destroy = lib_access_list_entry_destination_host_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/destination-network",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.modify = lib_access_list_entry_destination_network_modify,
|
|
|
|
.destroy = lib_access_list_entry_destination_network_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-07-19 20:27:56 +02:00
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/destination-any",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-07-19 20:27:56 +02:00
|
|
|
.create = lib_access_list_entry_destination_any_create,
|
|
|
|
.destroy = lib_access_list_entry_destination_any_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/ipv6-prefix",
|
|
|
|
.cbs = {
|
2020-06-05 20:07:47 +02:00
|
|
|
.modify = lib_access_list_entry_ipv4_prefix_modify,
|
|
|
|
.destroy = lib_access_list_entry_ipv4_prefix_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/ipv6-exact-match",
|
|
|
|
.cbs = {
|
2020-06-05 20:07:47 +02:00
|
|
|
.modify = lib_access_list_entry_ipv4_exact_match_modify,
|
|
|
|
.destroy = lib_access_list_entry_ipv4_exact_match_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/mac",
|
|
|
|
.cbs = {
|
2020-06-05 20:07:47 +02:00
|
|
|
.modify = lib_access_list_entry_ipv4_prefix_modify,
|
|
|
|
.destroy = lib_access_list_entry_ipv4_prefix_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/access-list/entry/any",
|
|
|
|
.cbs = {
|
|
|
|
.create = lib_access_list_entry_any_create,
|
|
|
|
.destroy = lib_access_list_entry_any_destroy,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list",
|
|
|
|
.cbs = {
|
|
|
|
.create = lib_prefix_list_create,
|
|
|
|
.destroy = lib_prefix_list_destroy,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
2020-04-30 22:23:51 +02:00
|
|
|
.xpath = "/frr-filter:lib/prefix-list/remark",
|
2019-11-08 18:48:50 +01:00
|
|
|
.cbs = {
|
2020-04-30 22:23:51 +02:00
|
|
|
.modify = lib_prefix_list_remark_modify,
|
|
|
|
.destroy = lib_prefix_list_remark_destroy,
|
2020-04-30 18:56:05 +02:00
|
|
|
.cli_show = prefix_list_remark_show,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry",
|
|
|
|
.cbs = {
|
|
|
|
.create = lib_prefix_list_entry_create,
|
|
|
|
.destroy = lib_prefix_list_entry_destroy,
|
2020-04-30 18:56:05 +02:00
|
|
|
.cli_show = prefix_list_show,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/action",
|
|
|
|
.cbs = {
|
|
|
|
.modify = lib_prefix_list_entry_action_modify,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/ipv4-prefix",
|
|
|
|
.cbs = {
|
|
|
|
.modify = lib_prefix_list_entry_ipv4_prefix_modify,
|
|
|
|
.destroy = lib_prefix_list_entry_ipv4_prefix_destroy,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/ipv4-prefix-length-greater-or-equal",
|
|
|
|
.cbs = {
|
|
|
|
.modify = lib_prefix_list_entry_ipv4_prefix_length_greater_or_equal_modify,
|
|
|
|
.destroy = lib_prefix_list_entry_ipv4_prefix_length_greater_or_equal_destroy,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/ipv4-prefix-length-lesser-or-equal",
|
|
|
|
.cbs = {
|
|
|
|
.modify = lib_prefix_list_entry_ipv4_prefix_length_lesser_or_equal_modify,
|
|
|
|
.destroy = lib_prefix_list_entry_ipv4_prefix_length_lesser_or_equal_destroy,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/ipv6-prefix",
|
|
|
|
.cbs = {
|
2020-06-05 20:07:47 +02:00
|
|
|
.modify = lib_prefix_list_entry_ipv4_prefix_modify,
|
|
|
|
.destroy = lib_prefix_list_entry_ipv4_prefix_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/ipv6-prefix-length-greater-or-equal",
|
|
|
|
.cbs = {
|
2020-06-05 20:07:47 +02:00
|
|
|
.modify = lib_prefix_list_entry_ipv4_prefix_length_greater_or_equal_modify,
|
|
|
|
.destroy = lib_prefix_list_entry_ipv4_prefix_length_greater_or_equal_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/ipv6-prefix-length-lesser-or-equal",
|
|
|
|
.cbs = {
|
2020-06-05 20:07:47 +02:00
|
|
|
.modify = lib_prefix_list_entry_ipv4_prefix_length_lesser_or_equal_modify,
|
|
|
|
.destroy = lib_prefix_list_entry_ipv4_prefix_length_lesser_or_equal_destroy,
|
2019-11-08 18:48:50 +01:00
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = "/frr-filter:lib/prefix-list/entry/any",
|
|
|
|
.cbs = {
|
|
|
|
.create = lib_prefix_list_entry_any_create,
|
|
|
|
.destroy = lib_prefix_list_entry_any_destroy,
|
|
|
|
}
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.xpath = NULL,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
};
|