2009-12-08 17:18:12 -08:00
|
|
|
|
/*
|
2010-01-25 10:13:52 -08:00
|
|
|
|
* Copyright (c) 2009, 2010 Nicira Networks.
|
2009-12-08 17:18:12 -08:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
|
|
#include <assert.h>
|
2010-01-25 10:13:52 -08:00
|
|
|
|
#include <ctype.h>
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include <errno.h>
|
2010-01-25 10:13:52 -08:00
|
|
|
|
#include <float.h>
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include <getopt.h>
|
|
|
|
|
#include <inttypes.h>
|
|
|
|
|
#include <signal.h>
|
|
|
|
|
#include <stdarg.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
|
|
#include "command-line.h"
|
|
|
|
|
#include "compiler.h"
|
|
|
|
|
#include "dirs.h"
|
|
|
|
|
#include "dynamic-string.h"
|
2009-12-16 16:26:17 -08:00
|
|
|
|
#include "json.h"
|
2010-01-25 10:13:52 -08:00
|
|
|
|
#include "ovsdb-data.h"
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include "ovsdb-idl.h"
|
|
|
|
|
#include "poll-loop.h"
|
2010-01-28 16:09:26 -08:00
|
|
|
|
#include "process.h"
|
2010-03-23 15:29:10 -07:00
|
|
|
|
#include "stream-ssl.h"
|
2009-12-09 13:28:48 -08:00
|
|
|
|
#include "svec.h"
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include "vswitchd/vswitch-idl.h"
|
|
|
|
|
#include "timeval.h"
|
|
|
|
|
#include "util.h"
|
|
|
|
|
#include "vlog.h"
|
2010-07-16 11:02:49 -07:00
|
|
|
|
|
|
|
|
|
VLOG_DEFINE_THIS_MODULE(vsctl)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-02-02 14:25:11 -08:00
|
|
|
|
/* vsctl_fatal() also logs the error, so it is preferred in this file. */
|
|
|
|
|
#define ovs_fatal please_use_vsctl_fatal_instead_of_ovs_fatal
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct vsctl_context;
|
|
|
|
|
|
|
|
|
|
typedef void vsctl_handler_func(struct vsctl_context *);
|
|
|
|
|
|
|
|
|
|
struct vsctl_command_syntax {
|
|
|
|
|
const char *name;
|
|
|
|
|
int min_args;
|
|
|
|
|
int max_args;
|
|
|
|
|
vsctl_handler_func *run;
|
2010-01-28 13:33:24 -08:00
|
|
|
|
vsctl_handler_func *postprocess;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
const char *options;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_command {
|
|
|
|
|
/* Data that remains constant after initialization. */
|
|
|
|
|
const struct vsctl_command_syntax *syntax;
|
|
|
|
|
int argc;
|
|
|
|
|
char **argv;
|
|
|
|
|
struct shash options;
|
|
|
|
|
|
|
|
|
|
/* Data modified by commands. */
|
|
|
|
|
struct ds output;
|
|
|
|
|
};
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
/* --db: The database server to contact. */
|
|
|
|
|
static const char *db;
|
|
|
|
|
|
|
|
|
|
/* --oneline: Write each command's output as a single line? */
|
|
|
|
|
static bool oneline;
|
|
|
|
|
|
2009-12-11 11:28:36 -08:00
|
|
|
|
/* --dry-run: Do not commit any changes. */
|
|
|
|
|
static bool dry_run;
|
|
|
|
|
|
2009-12-16 16:26:17 -08:00
|
|
|
|
/* --no-wait: Wait for ovs-vswitchd to reload its configuration? */
|
|
|
|
|
static bool wait_for_reload = true;
|
|
|
|
|
|
2009-12-14 13:59:58 -08:00
|
|
|
|
/* --timeout: Time to wait for a connection to 'db'. */
|
|
|
|
|
static int timeout = 5;
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
/* All supported commands. */
|
|
|
|
|
static const struct vsctl_command_syntax all_commands[];
|
|
|
|
|
|
2010-02-02 14:26:17 -08:00
|
|
|
|
/* The IDL we're using and the current transaction, if any.
|
|
|
|
|
* This is for use by vsctl_exit() only, to allow it to clean up.
|
|
|
|
|
* Other code should use its context arguments. */
|
|
|
|
|
static struct ovsdb_idl *the_idl;
|
|
|
|
|
static struct ovsdb_idl_txn *the_idl_txn;
|
|
|
|
|
|
|
|
|
|
static void vsctl_exit(int status) NO_RETURN;
|
2009-12-10 16:05:20 -08:00
|
|
|
|
static void vsctl_fatal(const char *, ...) PRINTF_FORMAT(1, 2) NO_RETURN;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static char *default_db(void);
|
|
|
|
|
static void usage(void) NO_RETURN;
|
|
|
|
|
static void parse_options(int argc, char *argv[]);
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
static struct vsctl_command *parse_commands(int argc, char *argv[],
|
|
|
|
|
size_t *n_commandsp);
|
|
|
|
|
static void parse_command(int argc, char *argv[], struct vsctl_command *);
|
|
|
|
|
static void do_vsctl(const char *args,
|
|
|
|
|
struct vsctl_command *, size_t n_commands,
|
|
|
|
|
struct ovsdb_idl *);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-04-05 12:58:21 -07:00
|
|
|
|
static const struct vsctl_table_class *get_table(const char *table_name);
|
|
|
|
|
static void set_column(const struct vsctl_table_class *,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const struct ovsdb_idl_row *, const char *arg,
|
|
|
|
|
struct ovsdb_symbol_table *);
|
2010-04-05 12:58:21 -07:00
|
|
|
|
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
int
|
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
|
{
|
|
|
|
|
struct ovsdb_idl *idl;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct vsctl_command *commands;
|
|
|
|
|
size_t n_commands;
|
|
|
|
|
char *args;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
set_program_name(argv[0]);
|
|
|
|
|
signal(SIGPIPE, SIG_IGN);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
vlog_set_levels(VLM_ANY_MODULE, VLF_CONSOLE, VLL_WARN);
|
|
|
|
|
vlog_set_levels(VLM_reconnect, VLF_ANY_FACILITY, VLL_WARN);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsrec_init();
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Log our arguments. This is often valuable for debugging systems. */
|
|
|
|
|
args = process_escape_args(argv);
|
|
|
|
|
VLOG_INFO("Called as %s", args);
|
|
|
|
|
|
|
|
|
|
/* Parse command line. */
|
2009-12-08 17:18:12 -08:00
|
|
|
|
parse_options(argc, argv);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
commands = parse_commands(argc - optind, argv + optind, &n_commands);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-14 13:59:58 -08:00
|
|
|
|
if (timeout) {
|
|
|
|
|
time_alarm(timeout);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-11 10:40:55 -08:00
|
|
|
|
/* Now execute the commands. */
|
2010-02-02 14:26:17 -08:00
|
|
|
|
idl = the_idl = ovsdb_idl_create(db, &ovsrec_idl_class);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (;;) {
|
2010-06-09 15:18:17 -07:00
|
|
|
|
if (ovsdb_idl_run(idl)) {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
do_vsctl(args, commands, n_commands, idl);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_wait(idl);
|
|
|
|
|
poll_block();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
parse_options(int argc, char *argv[])
|
|
|
|
|
{
|
|
|
|
|
enum {
|
|
|
|
|
OPT_DB = UCHAR_MAX + 1,
|
|
|
|
|
OPT_ONELINE,
|
2009-12-10 15:32:50 -08:00
|
|
|
|
OPT_NO_SYSLOG,
|
2009-12-11 11:28:36 -08:00
|
|
|
|
OPT_NO_WAIT,
|
2010-01-04 19:15:22 -08:00
|
|
|
|
OPT_DRY_RUN,
|
2010-03-23 15:29:10 -07:00
|
|
|
|
OPT_PEER_CA_CERT,
|
2010-01-04 19:15:22 -08:00
|
|
|
|
VLOG_OPTION_ENUMS
|
2009-12-08 17:18:12 -08:00
|
|
|
|
};
|
|
|
|
|
static struct option long_options[] = {
|
|
|
|
|
{"db", required_argument, 0, OPT_DB},
|
2009-12-09 13:28:48 -08:00
|
|
|
|
{"no-syslog", no_argument, 0, OPT_NO_SYSLOG},
|
2009-12-10 15:32:50 -08:00
|
|
|
|
{"no-wait", no_argument, 0, OPT_NO_WAIT},
|
2009-12-11 11:28:36 -08:00
|
|
|
|
{"dry-run", no_argument, 0, OPT_DRY_RUN},
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{"oneline", no_argument, 0, OPT_ONELINE},
|
2009-12-14 10:13:36 -08:00
|
|
|
|
{"timeout", required_argument, 0, 't'},
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{"help", no_argument, 0, 'h'},
|
|
|
|
|
{"version", no_argument, 0, 'V'},
|
2010-01-04 19:15:22 -08:00
|
|
|
|
VLOG_LONG_OPTIONS,
|
2010-03-23 15:29:10 -07:00
|
|
|
|
#ifdef HAVE_OPENSSL
|
|
|
|
|
STREAM_SSL_LONG_OPTIONS
|
|
|
|
|
{"peer-ca-cert", required_argument, 0, OPT_PEER_CA_CERT},
|
|
|
|
|
#endif
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{0, 0, 0, 0},
|
|
|
|
|
};
|
|
|
|
|
|
2009-12-14 10:13:36 -08:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (;;) {
|
|
|
|
|
int c;
|
|
|
|
|
|
2009-12-14 10:13:36 -08:00
|
|
|
|
c = getopt_long(argc, argv, "+v::hVt:", long_options, NULL);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (c == -1) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch (c) {
|
|
|
|
|
case OPT_DB:
|
|
|
|
|
db = optarg;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case OPT_ONELINE:
|
|
|
|
|
oneline = true;
|
|
|
|
|
break;
|
|
|
|
|
|
2009-12-09 13:28:48 -08:00
|
|
|
|
case OPT_NO_SYSLOG:
|
|
|
|
|
vlog_set_levels(VLM_vsctl, VLF_SYSLOG, VLL_WARN);
|
|
|
|
|
break;
|
|
|
|
|
|
2009-12-10 15:32:50 -08:00
|
|
|
|
case OPT_NO_WAIT:
|
2009-12-16 16:26:17 -08:00
|
|
|
|
wait_for_reload = false;
|
2009-12-10 15:32:50 -08:00
|
|
|
|
break;
|
|
|
|
|
|
2009-12-11 11:28:36 -08:00
|
|
|
|
case OPT_DRY_RUN:
|
|
|
|
|
dry_run = true;
|
|
|
|
|
break;
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case 'h':
|
|
|
|
|
usage();
|
|
|
|
|
|
|
|
|
|
case 'V':
|
|
|
|
|
OVS_PRINT_VERSION(0, 0);
|
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
|
|
2009-12-14 10:13:36 -08:00
|
|
|
|
case 't':
|
|
|
|
|
timeout = strtoul(optarg, NULL, 10);
|
2009-12-14 13:59:58 -08:00
|
|
|
|
if (timeout < 0) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("value %s on -t or --timeout is invalid",
|
|
|
|
|
optarg);
|
2009-12-14 10:13:36 -08:00
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
|
2010-01-04 19:15:22 -08:00
|
|
|
|
VLOG_OPTION_HANDLERS
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-03-23 15:29:10 -07:00
|
|
|
|
#ifdef HAVE_OPENSSL
|
|
|
|
|
STREAM_SSL_OPTION_HANDLERS
|
|
|
|
|
|
|
|
|
|
case OPT_PEER_CA_CERT:
|
|
|
|
|
stream_ssl_set_peer_ca_cert_file(optarg);
|
|
|
|
|
break;
|
|
|
|
|
#endif
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case '?':
|
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
abort();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!db) {
|
|
|
|
|
db = default_db();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
static struct vsctl_command *
|
|
|
|
|
parse_commands(int argc, char *argv[], size_t *n_commandsp)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_command *commands;
|
|
|
|
|
size_t n_commands, allocated_commands;
|
|
|
|
|
int i, start;
|
|
|
|
|
|
|
|
|
|
commands = NULL;
|
|
|
|
|
n_commands = allocated_commands = 0;
|
|
|
|
|
|
|
|
|
|
for (start = i = 0; i <= argc; i++) {
|
|
|
|
|
if (i == argc || !strcmp(argv[i], "--")) {
|
|
|
|
|
if (i > start) {
|
|
|
|
|
if (n_commands >= allocated_commands) {
|
|
|
|
|
struct vsctl_command *c;
|
|
|
|
|
|
|
|
|
|
commands = x2nrealloc(commands, &allocated_commands,
|
|
|
|
|
sizeof *commands);
|
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
shash_moved(&c->options);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
parse_command(i - start, &argv[start],
|
|
|
|
|
&commands[n_commands++]);
|
|
|
|
|
}
|
|
|
|
|
start = i + 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (!n_commands) {
|
|
|
|
|
vsctl_fatal("missing command name (use --help for help)");
|
|
|
|
|
}
|
|
|
|
|
*n_commandsp = n_commands;
|
|
|
|
|
return commands;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
parse_command(int argc, char *argv[], struct vsctl_command *command)
|
|
|
|
|
{
|
|
|
|
|
const struct vsctl_command_syntax *p;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
shash_init(&command->options);
|
|
|
|
|
for (i = 0; i < argc; i++) {
|
2010-05-18 12:46:56 -07:00
|
|
|
|
const char *option = argv[i];
|
|
|
|
|
const char *equals;
|
|
|
|
|
char *key, *value;
|
|
|
|
|
|
|
|
|
|
if (option[0] != '-') {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
break;
|
|
|
|
|
}
|
2010-05-18 12:46:56 -07:00
|
|
|
|
|
|
|
|
|
equals = strchr(option, '=');
|
|
|
|
|
if (equals) {
|
|
|
|
|
key = xmemdup0(option, equals - option);
|
|
|
|
|
value = xstrdup(equals + 1);
|
|
|
|
|
} else {
|
|
|
|
|
key = xstrdup(option);
|
|
|
|
|
value = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (shash_find(&command->options, key)) {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
vsctl_fatal("'%s' option specified multiple times", argv[i]);
|
|
|
|
|
}
|
2010-05-18 12:46:56 -07:00
|
|
|
|
shash_add_nocopy(&command->options, key, value);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
if (i == argc) {
|
|
|
|
|
vsctl_fatal("missing command name");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (p = all_commands; p->name; p++) {
|
|
|
|
|
if (!strcmp(p->name, argv[i])) {
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
int n_arg;
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, &command->options) {
|
|
|
|
|
const char *s = strstr(p->options, node->name);
|
|
|
|
|
int end = s ? s[strlen(node->name)] : EOF;
|
2010-05-18 12:46:56 -07:00
|
|
|
|
|
|
|
|
|
if (end != '=' && end != ',' && end != ' ' && end != '\0') {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
vsctl_fatal("'%s' command has no '%s' option",
|
|
|
|
|
argv[i], node->name);
|
|
|
|
|
}
|
2010-05-18 12:46:56 -07:00
|
|
|
|
if ((end == '=') != (node->data != NULL)) {
|
|
|
|
|
if (end == '=') {
|
|
|
|
|
vsctl_fatal("missing argument to '%s' option on '%s' "
|
|
|
|
|
"command", node->name, argv[i]);
|
|
|
|
|
} else {
|
|
|
|
|
vsctl_fatal("'%s' option on '%s' does not accept an "
|
|
|
|
|
"argument", node->name, argv[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
n_arg = argc - i - 1;
|
|
|
|
|
if (n_arg < p->min_args) {
|
|
|
|
|
vsctl_fatal("'%s' command requires at least %d arguments",
|
|
|
|
|
p->name, p->min_args);
|
|
|
|
|
} else if (n_arg > p->max_args) {
|
2010-02-09 11:02:44 -08:00
|
|
|
|
int j;
|
|
|
|
|
|
|
|
|
|
for (j = i + 1; j < argc; j++) {
|
|
|
|
|
if (argv[j][0] == '-') {
|
|
|
|
|
vsctl_fatal("'%s' command takes at most %d arguments "
|
|
|
|
|
"(note that options must precede command "
|
|
|
|
|
"names and follow a \"--\" argument)",
|
|
|
|
|
p->name, p->max_args);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
vsctl_fatal("'%s' command takes at most %d arguments",
|
|
|
|
|
p->name, p->max_args);
|
|
|
|
|
} else {
|
|
|
|
|
command->syntax = p;
|
|
|
|
|
command->argc = n_arg + 1;
|
|
|
|
|
command->argv = &argv[i];
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
vsctl_fatal("unknown command '%s'; use --help for help", argv[i]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
vsctl_fatal(const char *format, ...)
|
|
|
|
|
{
|
|
|
|
|
char *message;
|
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
|
|
va_start(args, format);
|
|
|
|
|
message = xvasprintf(format, args);
|
|
|
|
|
va_end(args);
|
|
|
|
|
|
|
|
|
|
vlog_set_levels(VLM_vsctl, VLF_CONSOLE, VLL_EMER);
|
|
|
|
|
VLOG_ERR("%s", message);
|
2010-02-02 14:25:11 -08:00
|
|
|
|
ovs_error(0, "%s", message);
|
2010-02-02 14:26:17 -08:00
|
|
|
|
vsctl_exit(EXIT_FAILURE);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Frees the current transaction and the underlying IDL and then calls
|
|
|
|
|
* exit(status).
|
|
|
|
|
*
|
|
|
|
|
* Freeing the transaction and the IDL is not strictly necessary, but it makes
|
|
|
|
|
* for a clean memory leak report from valgrind in the normal case. That makes
|
|
|
|
|
* it easier to notice real memory leaks. */
|
|
|
|
|
static void
|
|
|
|
|
vsctl_exit(int status)
|
|
|
|
|
{
|
|
|
|
|
if (the_idl_txn) {
|
|
|
|
|
ovsdb_idl_txn_abort(the_idl_txn);
|
|
|
|
|
ovsdb_idl_txn_destroy(the_idl_txn);
|
|
|
|
|
}
|
|
|
|
|
ovsdb_idl_destroy(the_idl);
|
|
|
|
|
exit(status);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
|
|
|
|
usage(void)
|
|
|
|
|
{
|
2010-01-27 13:49:19 -08:00
|
|
|
|
printf("\
|
|
|
|
|
%s: ovs-vswitchd management utility\n\
|
|
|
|
|
usage: %s [OPTIONS] COMMAND [ARG...]\n\
|
|
|
|
|
\n\
|
|
|
|
|
Bridge commands:\n\
|
|
|
|
|
add-br BRIDGE create a new bridge named BRIDGE\n\
|
|
|
|
|
add-br BRIDGE PARENT VLAN create new fake BRIDGE in PARENT on VLAN\n\
|
|
|
|
|
del-br BRIDGE delete BRIDGE and all of its ports\n\
|
|
|
|
|
list-br print the names of all the bridges\n\
|
|
|
|
|
br-exists BRIDGE test whether BRIDGE exists\n\
|
|
|
|
|
br-to-vlan BRIDGE print the VLAN which BRIDGE is on\n\
|
|
|
|
|
br-to-parent BRIDGE print the parent of BRIDGE\n\
|
|
|
|
|
br-set-external-id BRIDGE KEY VALUE set KEY on BRIDGE to VALUE\n\
|
|
|
|
|
br-set-external-id BRIDGE KEY unset KEY on BRIDGE\n\
|
|
|
|
|
br-get-external-id BRIDGE KEY print value of KEY on BRIDGE\n\
|
|
|
|
|
br-get-external-id BRIDGE list key-value pairs on BRIDGE\n\
|
|
|
|
|
\n\
|
|
|
|
|
Port commands:\n\
|
|
|
|
|
list-ports BRIDGE print the names of all the ports on BRIDGE\n\
|
|
|
|
|
add-port BRIDGE PORT add network device PORT to BRIDGE\n\
|
|
|
|
|
add-bond BRIDGE PORT IFACE... add bonded port PORT in BRIDGE from IFACES\n\
|
|
|
|
|
del-port [BRIDGE] PORT delete PORT (which may be bonded) from BRIDGE\n\
|
|
|
|
|
port-to-br PORT print name of bridge that contains PORT\n\
|
|
|
|
|
A bond is considered to be a single port.\n\
|
|
|
|
|
\n\
|
|
|
|
|
Interface commands (a bond consists of multiple interfaces):\n\
|
|
|
|
|
list-ifaces BRIDGE print the names of all interfaces on BRIDGE\n\
|
|
|
|
|
iface-to-br IFACE print name of bridge that contains IFACE\n\
|
|
|
|
|
\n\
|
|
|
|
|
Controller commands:\n\
|
|
|
|
|
get-controller [BRIDGE] print the controller for BRIDGE\n\
|
|
|
|
|
del-controller [BRIDGE] delete the controller for BRIDGE\n\
|
|
|
|
|
set-controller [BRIDGE] TARGET set the controller for BRIDGE to TARGET\n\
|
|
|
|
|
get-fail-mode [BRIDGE] print the fail-mode for BRIDGE\n\
|
|
|
|
|
del-fail-mode [BRIDGE] delete the fail-mode for BRIDGE\n\
|
|
|
|
|
set-fail-mode [BRIDGE] MODE set the fail-mode for BRIDGE to MODE\n\
|
|
|
|
|
\n\
|
|
|
|
|
SSL commands:\n\
|
|
|
|
|
get-ssl print the SSL configuration\n\
|
|
|
|
|
del-ssl delete the SSL configuration\n\
|
|
|
|
|
set-ssl PRIV-KEY CERT CA-CERT set the SSL configuration\n\
|
|
|
|
|
\n\
|
2010-04-30 15:06:51 -07:00
|
|
|
|
Switch commands:\n\
|
|
|
|
|
emer-reset reset switch to known good state\n\
|
|
|
|
|
\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
Database commands:\n\
|
|
|
|
|
list TBL [REC] list RECord (or all records) in TBL\n\
|
2010-07-14 16:36:42 -07:00
|
|
|
|
get TBL REC COL[:KEY] print values of COLumns in RECord in TBL\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
set TBL REC COL[:KEY]=VALUE set COLumn values in RECord in TBL\n\
|
|
|
|
|
add TBL REC COL [KEY=]VALUE add (KEY=)VALUE to COLumn in RECord in TBL\n\
|
|
|
|
|
remove TBL REC COL [KEY=]VALUE remove (KEY=)VALUE from COLumn\n\
|
|
|
|
|
clear TBL REC COL clear values from COLumn in RECord in TBL\n\
|
|
|
|
|
create TBL COL[:KEY]=VALUE create and initialize new record\n\
|
2010-07-14 16:36:42 -07:00
|
|
|
|
destroy TBL REC delete RECord from TBL\n\
|
2010-06-29 09:54:10 -07:00
|
|
|
|
wait-until TBL REC [COL[:KEY]=VALUE] wait until condition is true\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
Potentially unsafe database commands require --force option.\n\
|
|
|
|
|
\n\
|
|
|
|
|
Options:\n\
|
|
|
|
|
--db=DATABASE connect to DATABASE\n\
|
|
|
|
|
(default: %s)\n\
|
|
|
|
|
--oneline print exactly one line of output per command\n",
|
|
|
|
|
program_name, program_name, default_db());
|
2009-12-08 17:18:12 -08:00
|
|
|
|
vlog_usage();
|
2010-01-27 13:49:19 -08:00
|
|
|
|
printf("\n\
|
|
|
|
|
Other options:\n\
|
|
|
|
|
-h, --help display this help message\n\
|
|
|
|
|
-V, --version display version information\n");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static char *
|
|
|
|
|
default_db(void)
|
|
|
|
|
{
|
|
|
|
|
static char *def;
|
|
|
|
|
if (!def) {
|
2010-03-25 22:38:13 -07:00
|
|
|
|
def = xasprintf("unix:%s/db.sock", ovs_rundir);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
return def;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
struct vsctl_context {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
/* Read-only. */
|
2009-12-10 13:28:22 -08:00
|
|
|
|
int argc;
|
|
|
|
|
char **argv;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct shash options;
|
|
|
|
|
|
|
|
|
|
/* Modifiable state. */
|
|
|
|
|
struct ds output;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
struct ovsdb_idl *idl;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct ovsdb_idl_txn *txn;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
struct ovsdb_symbol_table *symtab;
|
2009-12-10 13:28:22 -08:00
|
|
|
|
const struct ovsrec_open_vswitch *ovs;
|
2010-06-24 11:01:53 -07:00
|
|
|
|
|
|
|
|
|
/* A command may set this member to true if some prerequisite is not met
|
|
|
|
|
* and the caller should wait for something to change and then retry. */
|
|
|
|
|
bool try_again;
|
2009-12-10 13:28:22 -08:00
|
|
|
|
};
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge {
|
|
|
|
|
struct ovsrec_bridge *br_cfg;
|
|
|
|
|
char *name;
|
2010-04-20 10:43:42 -07:00
|
|
|
|
struct ovsrec_controller **ctrl;
|
|
|
|
|
size_t n_ctrl;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *parent;
|
|
|
|
|
int vlan;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_port {
|
|
|
|
|
struct ovsrec_port *port_cfg;
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_iface {
|
|
|
|
|
struct ovsrec_interface *iface_cfg;
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_info {
|
|
|
|
|
struct shash bridges;
|
|
|
|
|
struct shash ports;
|
|
|
|
|
struct shash ifaces;
|
2010-04-20 10:43:42 -07:00
|
|
|
|
struct ovsrec_controller **ctrl;
|
|
|
|
|
size_t n_ctrl;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
};
|
|
|
|
|
|
2010-02-09 12:13:46 -08:00
|
|
|
|
static char *
|
|
|
|
|
vsctl_context_to_string(const struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct shash_node *node;
|
|
|
|
|
struct svec words;
|
|
|
|
|
char *s;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
svec_init(&words);
|
|
|
|
|
SHASH_FOR_EACH (node, &ctx->options) {
|
|
|
|
|
svec_add(&words, node->name);
|
|
|
|
|
}
|
|
|
|
|
for (i = 0; i < ctx->argc; i++) {
|
|
|
|
|
svec_add(&words, ctx->argv[i]);
|
|
|
|
|
}
|
|
|
|
|
svec_terminate(&words);
|
|
|
|
|
|
|
|
|
|
s = process_escape_args(words.names);
|
|
|
|
|
|
|
|
|
|
svec_destroy(&words);
|
|
|
|
|
|
|
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static struct vsctl_bridge *
|
|
|
|
|
add_bridge(struct vsctl_info *b,
|
|
|
|
|
struct ovsrec_bridge *br_cfg, const char *name,
|
|
|
|
|
struct vsctl_bridge *parent, int vlan)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br = xmalloc(sizeof *br);
|
|
|
|
|
br->br_cfg = br_cfg;
|
|
|
|
|
br->name = xstrdup(name);
|
|
|
|
|
br->parent = parent;
|
|
|
|
|
br->vlan = vlan;
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (parent) {
|
|
|
|
|
br->ctrl = parent->br_cfg->controller;
|
|
|
|
|
br->n_ctrl = parent->br_cfg->n_controller;
|
|
|
|
|
} else {
|
|
|
|
|
br->ctrl = br_cfg->controller;
|
|
|
|
|
br->n_ctrl = br_cfg->n_controller;
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
shash_add(&b->bridges, br->name, br);
|
|
|
|
|
return br;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
|
port_is_fake_bridge(const struct ovsrec_port *port_cfg)
|
|
|
|
|
{
|
|
|
|
|
return (port_cfg->fake_bridge
|
|
|
|
|
&& port_cfg->tag
|
|
|
|
|
&& *port_cfg->tag >= 1 && *port_cfg->tag <= 4095);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct vsctl_bridge *
|
|
|
|
|
find_vlan_bridge(struct vsctl_info *info,
|
|
|
|
|
struct vsctl_bridge *parent, int vlan)
|
|
|
|
|
{
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, &info->bridges) {
|
|
|
|
|
struct vsctl_bridge *br = node->data;
|
|
|
|
|
if (br->parent == parent && br->vlan == vlan) {
|
|
|
|
|
return br;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
free_info(struct vsctl_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, &info->bridges) {
|
|
|
|
|
struct vsctl_bridge *bridge = node->data;
|
|
|
|
|
free(bridge->name);
|
|
|
|
|
free(bridge);
|
|
|
|
|
}
|
|
|
|
|
shash_destroy(&info->bridges);
|
|
|
|
|
|
2010-06-10 14:40:13 -07:00
|
|
|
|
shash_destroy_free_data(&info->ports);
|
|
|
|
|
shash_destroy_free_data(&info->ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
get_info(const struct ovsrec_open_vswitch *ovs, struct vsctl_info *info)
|
|
|
|
|
{
|
|
|
|
|
struct shash bridges, ports;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
shash_init(&info->bridges);
|
|
|
|
|
shash_init(&info->ports);
|
|
|
|
|
shash_init(&info->ifaces);
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
info->ctrl = ovs->controller;
|
2010-04-20 10:43:42 -07:00
|
|
|
|
info->n_ctrl = ovs->n_controller;
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
shash_init(&bridges);
|
|
|
|
|
shash_init(&ports);
|
|
|
|
|
for (i = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
struct ovsrec_bridge *br_cfg = ovs->bridges[i];
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
|
|
if (!shash_add_once(&bridges, br_cfg->name, NULL)) {
|
|
|
|
|
VLOG_WARN("%s: database contains duplicate bridge name",
|
|
|
|
|
br_cfg->name);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
br = add_bridge(info, br_cfg, br_cfg->name, NULL, 0);
|
|
|
|
|
if (!br) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (j = 0; j < br_cfg->n_ports; j++) {
|
|
|
|
|
struct ovsrec_port *port_cfg = br_cfg->ports[j];
|
|
|
|
|
|
|
|
|
|
if (!shash_add_once(&ports, port_cfg->name, NULL)) {
|
|
|
|
|
VLOG_WARN("%s: database contains duplicate port name",
|
|
|
|
|
port_cfg->name);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (port_is_fake_bridge(port_cfg)
|
2009-12-09 13:28:48 -08:00
|
|
|
|
&& shash_add_once(&bridges, port_cfg->name, NULL)) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
add_bridge(info, NULL, port_cfg->name, br, *port_cfg->tag);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
shash_destroy(&bridges);
|
|
|
|
|
shash_destroy(&ports);
|
|
|
|
|
|
|
|
|
|
shash_init(&bridges);
|
|
|
|
|
shash_init(&ports);
|
|
|
|
|
for (i = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
struct ovsrec_bridge *br_cfg = ovs->bridges[i];
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
|
|
if (!shash_add_once(&bridges, br_cfg->name, NULL)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
br = shash_find_data(&info->bridges, br_cfg->name);
|
|
|
|
|
for (j = 0; j < br_cfg->n_ports; j++) {
|
|
|
|
|
struct ovsrec_port *port_cfg = br_cfg->ports[j];
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
size_t k;
|
|
|
|
|
|
|
|
|
|
if (!shash_add_once(&ports, port_cfg->name, NULL)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (port_is_fake_bridge(port_cfg)
|
2009-12-09 13:28:48 -08:00
|
|
|
|
&& !shash_add_once(&bridges, port_cfg->name, NULL)) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
port = xmalloc(sizeof *port);
|
|
|
|
|
port->port_cfg = port_cfg;
|
|
|
|
|
if (port_cfg->tag
|
|
|
|
|
&& *port_cfg->tag >= 1 && *port_cfg->tag <= 4095) {
|
|
|
|
|
port->bridge = find_vlan_bridge(info, br, *port_cfg->tag);
|
|
|
|
|
if (!port->bridge) {
|
|
|
|
|
port->bridge = br;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
port->bridge = br;
|
|
|
|
|
}
|
|
|
|
|
shash_add(&info->ports, port_cfg->name, port);
|
|
|
|
|
|
|
|
|
|
for (k = 0; k < port_cfg->n_interfaces; k++) {
|
|
|
|
|
struct ovsrec_interface *iface_cfg = port_cfg->interfaces[k];
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
|
|
|
|
|
if (shash_find(&info->ifaces, iface_cfg->name)) {
|
|
|
|
|
VLOG_WARN("%s: database contains duplicate interface name",
|
|
|
|
|
iface_cfg->name);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
iface = xmalloc(sizeof *iface);
|
|
|
|
|
iface->iface_cfg = iface_cfg;
|
|
|
|
|
iface->port = port;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
shash_add(&info->ifaces, iface_cfg->name, iface);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
shash_destroy(&bridges);
|
|
|
|
|
shash_destroy(&ports);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
check_conflicts(struct vsctl_info *info, const char *name,
|
|
|
|
|
char *msg)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
|
|
|
|
|
if (shash_find(&info->bridges, name)) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("%s because a bridge named %s already exists",
|
|
|
|
|
msg, name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
port = shash_find_data(&info->ports, name);
|
|
|
|
|
if (port) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("%s because a port named %s already exists on "
|
|
|
|
|
"bridge %s", msg, name, port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
iface = shash_find_data(&info->ifaces, name);
|
|
|
|
|
if (iface) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("%s because an interface named %s already exists "
|
|
|
|
|
"on bridge %s", msg, name, iface->port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(msg);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct vsctl_bridge *
|
2009-12-10 13:42:12 -08:00
|
|
|
|
find_bridge(struct vsctl_info *info, const char *name, bool must_exist)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br = shash_find_data(&info->bridges, name);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
if (must_exist && !br) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("no bridge named %s", name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
return br;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-17 16:05:55 -08:00
|
|
|
|
static struct vsctl_bridge *
|
|
|
|
|
find_real_bridge(struct vsctl_info *info, const char *name, bool must_exist)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br = find_bridge(info, name, must_exist);
|
|
|
|
|
if (br && br->parent) {
|
|
|
|
|
vsctl_fatal("%s is a fake bridge", name);
|
|
|
|
|
}
|
|
|
|
|
return br;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static struct vsctl_port *
|
2009-12-10 13:42:12 -08:00
|
|
|
|
find_port(struct vsctl_info *info, const char *name, bool must_exist)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_port *port = shash_find_data(&info->ports, name);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
if (port && !strcmp(name, port->bridge->name)) {
|
2009-12-10 13:42:12 -08:00
|
|
|
|
port = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (must_exist && !port) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("no port named %s", name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
return port;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct vsctl_iface *
|
2009-12-10 13:42:12 -08:00
|
|
|
|
find_iface(struct vsctl_info *info, const char *name, bool must_exist)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_iface *iface = shash_find_data(&info->ifaces, name);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
if (iface && !strcmp(name, iface->port->bridge->name)) {
|
2009-12-10 13:42:12 -08:00
|
|
|
|
iface = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (must_exist && !iface) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("no interface named %s", name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
return iface;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
bridge_insert_port(struct ovsrec_bridge *br, struct ovsrec_port *port)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_port **ports;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
ports = xmalloc(sizeof *br->ports * (br->n_ports + 1));
|
|
|
|
|
for (i = 0; i < br->n_ports; i++) {
|
|
|
|
|
ports[i] = br->ports[i];
|
|
|
|
|
}
|
|
|
|
|
ports[br->n_ports] = port;
|
|
|
|
|
ovsrec_bridge_set_ports(br, ports, br->n_ports + 1);
|
|
|
|
|
free(ports);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
bridge_delete_port(struct ovsrec_bridge *br, struct ovsrec_port *port)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_port **ports;
|
|
|
|
|
size_t i, n;
|
|
|
|
|
|
|
|
|
|
ports = xmalloc(sizeof *br->ports * br->n_ports);
|
|
|
|
|
for (i = n = 0; i < br->n_ports; i++) {
|
|
|
|
|
if (br->ports[i] != port) {
|
|
|
|
|
ports[n++] = br->ports[i];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsrec_bridge_set_ports(br, ports, n);
|
|
|
|
|
free(ports);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovs_insert_bridge(const struct ovsrec_open_vswitch *ovs,
|
|
|
|
|
struct ovsrec_bridge *bridge)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_bridge **bridges;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
bridges = xmalloc(sizeof *ovs->bridges * (ovs->n_bridges + 1));
|
|
|
|
|
for (i = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
bridges[i] = ovs->bridges[i];
|
|
|
|
|
}
|
|
|
|
|
bridges[ovs->n_bridges] = bridge;
|
|
|
|
|
ovsrec_open_vswitch_set_bridges(ovs, bridges, ovs->n_bridges + 1);
|
|
|
|
|
free(bridges);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovs_delete_bridge(const struct ovsrec_open_vswitch *ovs,
|
|
|
|
|
struct ovsrec_bridge *bridge)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_bridge **bridges;
|
|
|
|
|
size_t i, n;
|
|
|
|
|
|
|
|
|
|
bridges = xmalloc(sizeof *ovs->bridges * ovs->n_bridges);
|
|
|
|
|
for (i = n = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
if (ovs->bridges[i] != bridge) {
|
|
|
|
|
bridges[n++] = ovs->bridges[i];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsrec_open_vswitch_set_bridges(ovs, bridges, n);
|
|
|
|
|
free(bridges);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-11 10:40:55 -08:00
|
|
|
|
static void
|
2010-02-11 11:11:23 -08:00
|
|
|
|
cmd_init(struct vsctl_context *ctx OVS_UNUSED)
|
2009-12-11 10:40:55 -08:00
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-30 15:06:51 -07:00
|
|
|
|
static void
|
|
|
|
|
cmd_emer_reset(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl *idl = ctx->idl;
|
|
|
|
|
const struct ovsrec_bridge *br;
|
|
|
|
|
const struct ovsrec_port *port;
|
|
|
|
|
const struct ovsrec_interface *iface;
|
|
|
|
|
const struct ovsrec_mirror *mirror, *next_mirror;
|
|
|
|
|
const struct ovsrec_controller *ctrl, *next_ctrl;
|
|
|
|
|
const struct ovsrec_netflow *nf, *next_nf;
|
|
|
|
|
const struct ovsrec_ssl *ssl, *next_ssl;
|
|
|
|
|
const struct ovsrec_sflow *sflow, *next_sflow;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/* Reset the Open_vSwitch table. */
|
|
|
|
|
ovsrec_open_vswitch_set_managers(ctx->ovs, NULL, 0);
|
|
|
|
|
ovsrec_open_vswitch_set_controller(ctx->ovs, NULL, 0);
|
|
|
|
|
ovsrec_open_vswitch_set_ssl(ctx->ovs, NULL);
|
|
|
|
|
|
|
|
|
|
OVSREC_BRIDGE_FOR_EACH (br, idl) {
|
|
|
|
|
int i;
|
|
|
|
|
char *hw_key = "hwaddr";
|
|
|
|
|
char *hw_val = NULL;
|
|
|
|
|
|
|
|
|
|
ovsrec_bridge_set_controller(br, NULL, 0);
|
|
|
|
|
ovsrec_bridge_set_mirrors(br, NULL, 0);
|
|
|
|
|
ovsrec_bridge_set_netflow(br, NULL);
|
|
|
|
|
ovsrec_bridge_set_sflow(br, NULL);
|
|
|
|
|
ovsrec_bridge_set_flood_vlans(br, NULL, 0);
|
|
|
|
|
|
|
|
|
|
/* We only want to save the "hwaddr" key from other_config. */
|
|
|
|
|
for (i=0; i < br->n_other_config; i++) {
|
|
|
|
|
if (!strcmp(br->key_other_config[i], hw_key)) {
|
|
|
|
|
hw_val = br->value_other_config[i];
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (hw_val) {
|
|
|
|
|
char *val = xstrdup(hw_val);
|
|
|
|
|
ovsrec_bridge_set_other_config(br, &hw_key, &val, 1);
|
|
|
|
|
free(val);
|
|
|
|
|
} else {
|
|
|
|
|
ovsrec_bridge_set_other_config(br, NULL, NULL, 0);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_PORT_FOR_EACH (port, idl) {
|
|
|
|
|
ovsrec_port_set_other_config(port, NULL, NULL, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_INTERFACE_FOR_EACH (iface, idl) {
|
|
|
|
|
/* xxx What do we do about gre/patch devices created by mgr? */
|
|
|
|
|
|
|
|
|
|
ovsrec_interface_set_ingress_policing_rate(iface, 0);
|
|
|
|
|
ovsrec_interface_set_ingress_policing_burst(iface, 0);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_MIRROR_FOR_EACH_SAFE (mirror, next_mirror, idl) {
|
|
|
|
|
ovsrec_mirror_delete(mirror);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_CONTROLLER_FOR_EACH_SAFE (ctrl, next_ctrl, idl) {
|
|
|
|
|
ovsrec_controller_delete(ctrl);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_NETFLOW_FOR_EACH_SAFE (nf, next_nf, idl) {
|
|
|
|
|
ovsrec_netflow_delete(nf);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_SSL_FOR_EACH_SAFE (ssl, next_ssl, idl) {
|
|
|
|
|
ovsrec_ssl_delete(ssl);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_SFLOW_FOR_EACH_SAFE (sflow, next_sflow, idl) {
|
|
|
|
|
ovsrec_sflow_delete(sflow);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_add_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2010-02-09 11:03:14 -08:00
|
|
|
|
bool may_exist = shash_find(&ctx->options, "--may-exist") != 0;
|
2010-02-10 11:21:56 -08:00
|
|
|
|
const char *br_name, *parent_name;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_info info;
|
2010-02-10 11:21:56 -08:00
|
|
|
|
int vlan;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-02-09 11:03:14 -08:00
|
|
|
|
br_name = ctx->argv[1];
|
|
|
|
|
if (ctx->argc == 2) {
|
|
|
|
|
parent_name = NULL;
|
|
|
|
|
vlan = 0;
|
|
|
|
|
} else if (ctx->argc == 4) {
|
|
|
|
|
parent_name = ctx->argv[2];
|
|
|
|
|
vlan = atoi(ctx->argv[3]);
|
|
|
|
|
if (vlan < 1 || vlan > 4095) {
|
|
|
|
|
vsctl_fatal("%s: vlan must be between 1 and 4095", ctx->argv[0]);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
vsctl_fatal("'%s' command takes exactly 1 or 3 arguments",
|
|
|
|
|
ctx->argv[0]);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2010-02-09 11:03:14 -08:00
|
|
|
|
if (may_exist) {
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
|
|
|
|
|
br = find_bridge(&info, br_name, false);
|
|
|
|
|
if (br) {
|
|
|
|
|
if (!parent_name) {
|
|
|
|
|
if (br->parent) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s\" but %s is "
|
|
|
|
|
"a VLAN bridge for VLAN %d",
|
|
|
|
|
br_name, br_name, br->vlan);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
if (!br->parent) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
|
|
|
|
|
"is not a VLAN bridge",
|
|
|
|
|
br_name, parent_name, vlan, br_name);
|
|
|
|
|
} else if (strcmp(br->parent->name, parent_name)) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
|
|
|
|
|
"has the wrong parent %s",
|
|
|
|
|
br_name, parent_name, vlan,
|
|
|
|
|
br_name, br->parent->name);
|
|
|
|
|
} else if (br->vlan != vlan) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
|
|
|
|
|
"is a VLAN bridge for the wrong VLAN %d",
|
|
|
|
|
br_name, parent_name, vlan, br_name, br->vlan);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
check_conflicts(&info, br_name,
|
|
|
|
|
xasprintf("cannot create a bridge named %s", br_name));
|
|
|
|
|
|
2010-02-09 11:03:14 -08:00
|
|
|
|
if (!parent_name) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct ovsrec_port *port;
|
|
|
|
|
struct ovsrec_interface *iface;
|
2010-02-09 11:03:14 -08:00
|
|
|
|
struct ovsrec_bridge *br;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
iface = ovsrec_interface_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_interface_set_name(iface, br_name);
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
port = ovsrec_port_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_port_set_name(port, br_name);
|
|
|
|
|
ovsrec_port_set_interfaces(port, &iface, 1);
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
br = ovsrec_bridge_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_bridge_set_name(br, br_name);
|
|
|
|
|
ovsrec_bridge_set_ports(br, &port, 1);
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ovs_insert_bridge(ctx->ovs, br);
|
2010-02-09 11:03:14 -08:00
|
|
|
|
} else {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *parent;
|
|
|
|
|
struct ovsrec_port *port;
|
|
|
|
|
struct ovsrec_interface *iface;
|
2010-02-09 11:03:14 -08:00
|
|
|
|
struct ovsrec_bridge *br;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
int64_t tag = vlan;
|
|
|
|
|
|
2009-12-10 13:42:12 -08:00
|
|
|
|
parent = find_bridge(&info, parent_name, false);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (parent && parent->vlan) {
|
2009-12-17 16:07:14 -08:00
|
|
|
|
vsctl_fatal("cannot create bridge with fake bridge as parent");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
if (!parent) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("parent bridge %s does not exist", parent_name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
br = parent->br_cfg;
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
iface = ovsrec_interface_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_interface_set_name(iface, br_name);
|
|
|
|
|
ovsrec_interface_set_type(iface, "internal");
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
port = ovsrec_port_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_port_set_name(port, br_name);
|
|
|
|
|
ovsrec_port_set_interfaces(port, &iface, 1);
|
|
|
|
|
ovsrec_port_set_fake_bridge(port, true);
|
|
|
|
|
ovsrec_port_set_tag(port, &tag, 1);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
bridge_insert_port(br, port);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
del_port(struct vsctl_info *info, struct vsctl_port *port)
|
|
|
|
|
{
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, &info->ifaces) {
|
|
|
|
|
struct vsctl_iface *iface = node->data;
|
|
|
|
|
if (iface->port == port) {
|
|
|
|
|
ovsrec_interface_delete(iface->iface_cfg);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsrec_port_delete(port->port_cfg);
|
|
|
|
|
|
|
|
|
|
bridge_delete_port((port->bridge->parent
|
|
|
|
|
? port->bridge->parent->br_cfg
|
|
|
|
|
: port->bridge->br_cfg), port->port_cfg);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_del_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2009-12-10 14:07:33 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *bridge;
|
2009-12-10 14:07:33 -08:00
|
|
|
|
struct vsctl_info info;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
bridge = find_bridge(&info, ctx->argv[1], must_exist);
|
|
|
|
|
if (bridge) {
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, &info.ports) {
|
|
|
|
|
struct vsctl_port *port = node->data;
|
2010-02-05 14:10:02 -08:00
|
|
|
|
if (port->bridge == bridge || port->bridge->parent == bridge
|
2009-12-10 14:07:33 -08:00
|
|
|
|
|| !strcmp(port->port_cfg->name, bridge->name)) {
|
|
|
|
|
del_port(&info, port);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (bridge->br_cfg) {
|
|
|
|
|
ovsrec_bridge_delete(bridge->br_cfg);
|
|
|
|
|
ovs_delete_bridge(ctx->ovs, bridge->br_cfg);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-09 13:28:48 -08:00
|
|
|
|
static void
|
|
|
|
|
output_sorted(struct svec *svec, struct ds *output)
|
|
|
|
|
{
|
|
|
|
|
const char *name;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
svec_sort(svec);
|
|
|
|
|
SVEC_FOR_EACH (i, name, svec) {
|
|
|
|
|
ds_put_format(output, "%s\n", name);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_list_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
struct vsctl_info info;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
struct svec bridges;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
svec_init(&bridges);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
SHASH_FOR_EACH (node, &info.bridges) {
|
|
|
|
|
struct vsctl_bridge *br = node->data;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_add(&bridges, br->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
output_sorted(&bridges, &ctx->output);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_destroy(&bridges);
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_exists(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
if (!find_bridge(&info, ctx->argv[1], false)) {
|
2010-02-02 14:26:17 -08:00
|
|
|
|
vsctl_exit(2);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-09 17:04:08 -08:00
|
|
|
|
/* Returns true if 'b_prefix' (of length 'b_prefix_len') concatenated with 'b'
|
|
|
|
|
* equals 'a', false otherwise. */
|
|
|
|
|
static bool
|
|
|
|
|
key_matches(const char *a,
|
|
|
|
|
const char *b_prefix, size_t b_prefix_len, const char *b)
|
|
|
|
|
{
|
|
|
|
|
return !strncmp(a, b_prefix, b_prefix_len) && !strcmp(a + b_prefix_len, b);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
set_external_id(char **old_keys, char **old_values, size_t old_n,
|
|
|
|
|
char *key, char *value,
|
|
|
|
|
char ***new_keysp, char ***new_valuesp, size_t *new_np)
|
|
|
|
|
{
|
|
|
|
|
char **new_keys;
|
|
|
|
|
char **new_values;
|
|
|
|
|
size_t new_n;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
new_keys = xmalloc(sizeof *new_keys * (old_n + 1));
|
|
|
|
|
new_values = xmalloc(sizeof *new_values * (old_n + 1));
|
|
|
|
|
new_n = 0;
|
|
|
|
|
for (i = 0; i < old_n; i++) {
|
|
|
|
|
if (strcmp(key, old_keys[i])) {
|
|
|
|
|
new_keys[new_n] = old_keys[i];
|
|
|
|
|
new_values[new_n] = old_values[i];
|
|
|
|
|
new_n++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (value) {
|
|
|
|
|
new_keys[new_n] = key;
|
|
|
|
|
new_values[new_n] = value;
|
|
|
|
|
new_n++;
|
|
|
|
|
}
|
|
|
|
|
*new_keysp = new_keys;
|
|
|
|
|
*new_valuesp = new_values;
|
|
|
|
|
*new_np = new_n;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_set_external_id(struct vsctl_context *ctx)
|
2009-12-09 17:04:08 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
char **keys, **values;
|
|
|
|
|
size_t n;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
bridge = find_bridge(&info, ctx->argv[1], true);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
if (bridge->br_cfg) {
|
|
|
|
|
set_external_id(bridge->br_cfg->key_external_ids,
|
|
|
|
|
bridge->br_cfg->value_external_ids,
|
|
|
|
|
bridge->br_cfg->n_external_ids,
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ctx->argv[2], ctx->argc >= 4 ? ctx->argv[3] : NULL,
|
2009-12-09 17:04:08 -08:00
|
|
|
|
&keys, &values, &n);
|
|
|
|
|
ovsrec_bridge_set_external_ids(bridge->br_cfg, keys, values, n);
|
|
|
|
|
} else {
|
2009-12-10 13:28:22 -08:00
|
|
|
|
char *key = xasprintf("fake-bridge-%s", ctx->argv[2]);
|
|
|
|
|
struct vsctl_port *port = shash_find_data(&info.ports, ctx->argv[1]);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
set_external_id(port->port_cfg->key_external_ids,
|
|
|
|
|
port->port_cfg->value_external_ids,
|
|
|
|
|
port->port_cfg->n_external_ids,
|
2009-12-10 13:28:22 -08:00
|
|
|
|
key, ctx->argc >= 4 ? ctx->argv[3] : NULL,
|
2009-12-09 17:04:08 -08:00
|
|
|
|
&keys, &values, &n);
|
|
|
|
|
ovsrec_port_set_external_ids(port->port_cfg, keys, values, n);
|
|
|
|
|
free(key);
|
|
|
|
|
}
|
|
|
|
|
free(keys);
|
|
|
|
|
free(values);
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
get_external_id(char **keys, char **values, size_t n,
|
|
|
|
|
const char *prefix, const char *key,
|
|
|
|
|
struct ds *output)
|
|
|
|
|
{
|
|
|
|
|
size_t prefix_len = strlen(prefix);
|
|
|
|
|
struct svec svec;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
svec_init(&svec);
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
|
if (!key && !strncmp(keys[i], prefix, prefix_len)) {
|
|
|
|
|
svec_add_nocopy(&svec, xasprintf("%s=%s",
|
|
|
|
|
keys[i] + prefix_len, values[i]));
|
|
|
|
|
} else if (key_matches(keys[i], prefix, prefix_len, key)) {
|
|
|
|
|
svec_add(&svec, values[i]);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
output_sorted(&svec, output);
|
|
|
|
|
svec_destroy(&svec);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_get_external_id(struct vsctl_context *ctx)
|
2009-12-09 17:04:08 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
bridge = find_bridge(&info, ctx->argv[1], true);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
if (bridge->br_cfg) {
|
|
|
|
|
get_external_id(bridge->br_cfg->key_external_ids,
|
|
|
|
|
bridge->br_cfg->value_external_ids,
|
|
|
|
|
bridge->br_cfg->n_external_ids,
|
2009-12-10 13:28:22 -08:00
|
|
|
|
"", ctx->argc >= 3 ? ctx->argv[2] : NULL,
|
|
|
|
|
&ctx->output);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
} else {
|
2009-12-10 13:28:22 -08:00
|
|
|
|
struct vsctl_port *port = shash_find_data(&info.ports, ctx->argv[1]);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
get_external_id(port->port_cfg->key_external_ids,
|
|
|
|
|
port->port_cfg->value_external_ids,
|
|
|
|
|
port->port_cfg->n_external_ids,
|
2009-12-10 13:28:22 -08:00
|
|
|
|
"fake-bridge-", ctx->argc >= 3 ? ctx->argv[2] : NULL, &ctx->output);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
}
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_list_ports(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
struct vsctl_info info;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
struct svec ports;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
br = find_bridge(&info, ctx->argv[1], true);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
svec_init(&ports);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
SHASH_FOR_EACH (node, &info.ports) {
|
|
|
|
|
struct vsctl_port *port = node->data;
|
|
|
|
|
|
|
|
|
|
if (strcmp(port->port_cfg->name, br->name) && br == port->bridge) {
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_add(&ports, port->port_cfg->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
output_sorted(&ports, &ctx->output);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_destroy(&ports);
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2010-01-28 16:09:26 -08:00
|
|
|
|
add_port(struct vsctl_context *ctx,
|
2010-02-09 12:13:46 -08:00
|
|
|
|
const char *br_name, const char *port_name,
|
|
|
|
|
bool may_exist, bool fake_iface,
|
2010-04-05 12:58:21 -07:00
|
|
|
|
char *iface_names[], int n_ifaces,
|
|
|
|
|
char *settings[], int n_settings)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
struct ovsrec_interface **ifaces;
|
|
|
|
|
struct ovsrec_port *port;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2010-02-09 12:13:46 -08:00
|
|
|
|
if (may_exist) {
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
|
|
|
|
|
port = find_port(&info, port_name, false);
|
|
|
|
|
if (port) {
|
|
|
|
|
struct svec want_names, have_names;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
svec_init(&want_names);
|
|
|
|
|
for (i = 0; i < n_ifaces; i++) {
|
|
|
|
|
svec_add(&want_names, iface_names[i]);
|
|
|
|
|
}
|
|
|
|
|
svec_sort(&want_names);
|
|
|
|
|
|
|
|
|
|
svec_init(&have_names);
|
|
|
|
|
for (i = 0; i < port->port_cfg->n_interfaces; i++) {
|
|
|
|
|
svec_add(&have_names, port->port_cfg->interfaces[i]->name);
|
|
|
|
|
}
|
|
|
|
|
svec_sort(&have_names);
|
|
|
|
|
|
|
|
|
|
if (strcmp(port->bridge->name, br_name)) {
|
|
|
|
|
char *command = vsctl_context_to_string(ctx);
|
|
|
|
|
vsctl_fatal("\"%s\" but %s is actually attached to bridge %s",
|
|
|
|
|
command, port_name, port->bridge->name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!svec_equal(&want_names, &have_names)) {
|
|
|
|
|
char *have_names_string = svec_join(&have_names, ", ", "");
|
|
|
|
|
char *command = vsctl_context_to_string(ctx);
|
|
|
|
|
|
|
|
|
|
vsctl_fatal("\"%s\" but %s actually has interface(s) %s",
|
|
|
|
|
command, port_name, have_names_string);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
svec_destroy(&want_names);
|
|
|
|
|
svec_destroy(&have_names);
|
|
|
|
|
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
check_conflicts(&info, port_name,
|
|
|
|
|
xasprintf("cannot create a port named %s", port_name));
|
2010-02-09 12:13:46 -08:00
|
|
|
|
for (i = 0; i < n_ifaces; i++) {
|
|
|
|
|
check_conflicts(&info, iface_names[i],
|
|
|
|
|
xasprintf("cannot create an interface named %s",
|
|
|
|
|
iface_names[i]));
|
|
|
|
|
}
|
2009-12-10 13:42:12 -08:00
|
|
|
|
bridge = find_bridge(&info, br_name, true);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
ifaces = xmalloc(n_ifaces * sizeof *ifaces);
|
|
|
|
|
for (i = 0; i < n_ifaces; i++) {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
ifaces[i] = ovsrec_interface_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_interface_set_name(ifaces[i], iface_names[i]);
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
port = ovsrec_port_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_port_set_name(port, port_name);
|
|
|
|
|
ovsrec_port_set_interfaces(port, ifaces, n_ifaces);
|
2010-01-14 21:53:43 -08:00
|
|
|
|
ovsrec_port_set_bond_fake_iface(port, fake_iface);
|
2009-12-09 22:14:54 -08:00
|
|
|
|
free(ifaces);
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (bridge->vlan) {
|
|
|
|
|
int64_t tag = bridge->vlan;
|
|
|
|
|
ovsrec_port_set_tag(port, &tag, 1);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-05 12:58:21 -07:00
|
|
|
|
for (i = 0; i < n_settings; i++) {
|
2010-06-02 11:08:03 -07:00
|
|
|
|
set_column(get_table("Port"), &port->header_, settings[i],
|
|
|
|
|
ctx->symtab);
|
2010-04-05 12:58:21 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
bridge_insert_port((bridge->parent ? bridge->parent->br_cfg
|
|
|
|
|
: bridge->br_cfg), port);
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_add_port(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2010-02-09 12:13:46 -08:00
|
|
|
|
bool may_exist = shash_find(&ctx->options, "--may-exist") != 0;
|
|
|
|
|
|
|
|
|
|
add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, false,
|
2010-04-05 12:58:21 -07:00
|
|
|
|
&ctx->argv[2], 1, &ctx->argv[3], ctx->argc - 3);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_add_bond(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2010-02-09 12:13:46 -08:00
|
|
|
|
bool may_exist = shash_find(&ctx->options, "--may-exist") != 0;
|
2010-01-14 21:53:43 -08:00
|
|
|
|
bool fake_iface = shash_find(&ctx->options, "--fake-iface");
|
2010-04-05 12:58:21 -07:00
|
|
|
|
int n_ifaces;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
n_ifaces = ctx->argc - 3;
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
|
|
|
|
if (strchr(ctx->argv[i], '=')) {
|
|
|
|
|
n_ifaces = i - 3;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (n_ifaces < 2) {
|
|
|
|
|
vsctl_fatal("add-bond requires at least 2 interfaces, but only "
|
|
|
|
|
"%d were specified", n_ifaces);
|
|
|
|
|
}
|
2010-01-14 21:53:43 -08:00
|
|
|
|
|
2010-02-09 12:13:46 -08:00
|
|
|
|
add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, fake_iface,
|
2010-04-05 12:58:21 -07:00
|
|
|
|
&ctx->argv[3], n_ifaces,
|
|
|
|
|
&ctx->argv[n_ifaces + 3], ctx->argc - 3 - n_ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_del_port(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2009-12-10 14:07:33 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2010-02-22 16:36:30 -08:00
|
|
|
|
bool with_iface = shash_find(&ctx->options, "--with-iface") != NULL;
|
|
|
|
|
struct vsctl_port *port;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2010-02-22 16:36:30 -08:00
|
|
|
|
if (!with_iface) {
|
|
|
|
|
port = find_port(&info, ctx->argv[ctx->argc - 1], must_exist);
|
|
|
|
|
} else {
|
|
|
|
|
const char *target = ctx->argv[ctx->argc - 1];
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
|
|
|
|
|
port = find_port(&info, target, false);
|
|
|
|
|
if (!port) {
|
|
|
|
|
iface = find_iface(&info, target, false);
|
|
|
|
|
if (iface) {
|
|
|
|
|
port = iface->port;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (must_exist && !port) {
|
|
|
|
|
vsctl_fatal("no port or interface named %s", target);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
}
|
2010-02-22 16:36:30 -08:00
|
|
|
|
}
|
2009-12-10 14:07:33 -08:00
|
|
|
|
|
2010-02-22 16:36:30 -08:00
|
|
|
|
if (port) {
|
|
|
|
|
if (ctx->argc == 3) {
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
|
|
|
|
|
bridge = find_bridge(&info, ctx->argv[1], true);
|
|
|
|
|
if (port->bridge != bridge) {
|
|
|
|
|
if (port->bridge->parent == bridge) {
|
|
|
|
|
vsctl_fatal("bridge %s does not have a port %s (although "
|
|
|
|
|
"its parent bridge %s does)",
|
|
|
|
|
ctx->argv[1], ctx->argv[2],
|
|
|
|
|
bridge->parent->name);
|
|
|
|
|
} else {
|
|
|
|
|
vsctl_fatal("bridge %s does not have a port %s",
|
|
|
|
|
ctx->argv[1], ctx->argv[2]);
|
|
|
|
|
}
|
2009-12-10 14:07:33 -08:00
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2010-02-22 16:36:30 -08:00
|
|
|
|
|
|
|
|
|
del_port(&info, port);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2010-02-22 16:36:30 -08:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_port_to_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
port = find_port(&info, ctx->argv[1], true);
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%s\n", port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_to_vlan(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
bridge = find_bridge(&info, ctx->argv[1], true);
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%d\n", bridge->vlan);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_to_parent(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
bridge = find_bridge(&info, ctx->argv[1], true);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (bridge->parent) {
|
|
|
|
|
bridge = bridge->parent;
|
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%s\n", bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_list_ifaces(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
struct vsctl_info info;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
struct svec ifaces;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
br = find_bridge(&info, ctx->argv[1], true);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
svec_init(&ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
SHASH_FOR_EACH (node, &info.ifaces) {
|
|
|
|
|
struct vsctl_iface *iface = node->data;
|
|
|
|
|
|
2009-12-09 13:28:48 -08:00
|
|
|
|
if (strcmp(iface->iface_cfg->name, br->name)
|
|
|
|
|
&& br == iface->port->bridge) {
|
|
|
|
|
svec_add(&ifaces, iface->iface_cfg->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
output_sorted(&ifaces, &ctx->output);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_destroy(&ifaces);
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_iface_to_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
get_info(ctx->ovs, &info);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
iface = find_iface(&info, ctx->argv[1], true);
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%s\n", iface->port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
2009-12-09 17:04:08 -08:00
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
/* Print targets of the 'n_controllers' in 'controllers' on the output for
|
|
|
|
|
* 'ctx'. */
|
|
|
|
|
static void
|
|
|
|
|
print_controllers(struct vsctl_context *ctx,
|
|
|
|
|
struct ovsrec_controller **controllers,
|
|
|
|
|
size_t n_controllers)
|
|
|
|
|
{
|
|
|
|
|
/* Print the targets in sorted order for reproducibility. */
|
|
|
|
|
struct svec targets;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
svec_init(&targets);
|
|
|
|
|
for (i = 0; i < n_controllers; i++) {
|
|
|
|
|
svec_add(&targets, controllers[i]->target);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
svec_sort(&targets);
|
|
|
|
|
for (i = 0; i < targets.n; i++) {
|
|
|
|
|
ds_put_format(&ctx->output, "%s\n", targets.names[i]);
|
|
|
|
|
}
|
|
|
|
|
svec_destroy(&targets);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_get_controller(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
|
|
|
|
get_info(ctx->ovs, &info);
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (ctx->argc == 1 || !strcmp(ctx->argv[1], "default")) {
|
|
|
|
|
print_controllers(ctx, info.ctrl, info.n_ctrl);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
} else {
|
|
|
|
|
struct vsctl_bridge *br = find_bridge(&info, ctx->argv[1], true);
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (br->n_ctrl) {
|
|
|
|
|
print_controllers(ctx, br->ctrl, br->n_ctrl);
|
|
|
|
|
} else {
|
|
|
|
|
print_controllers(ctx, info.ctrl, info.n_ctrl);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
static void
|
|
|
|
|
delete_controllers(struct ovsrec_controller **controllers,
|
|
|
|
|
size_t n_controllers)
|
|
|
|
|
{
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_controllers; i++) {
|
|
|
|
|
ovsrec_controller_delete(controllers[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_del_controller(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
|
|
|
|
get_info(ctx->ovs, &info);
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (ctx->argc == 1 || !strcmp(ctx->argv[1], "default")) {
|
|
|
|
|
if (info.n_ctrl) {
|
|
|
|
|
delete_controllers(info.ctrl, info.n_ctrl);
|
|
|
|
|
ovsrec_open_vswitch_set_controller(ctx->ovs, NULL, 0);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
2009-12-17 16:05:55 -08:00
|
|
|
|
struct vsctl_bridge *br = find_real_bridge(&info, ctx->argv[1], true);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
if (br->ctrl) {
|
2010-04-20 10:43:42 -07:00
|
|
|
|
delete_controllers(br->ctrl, br->n_ctrl);
|
|
|
|
|
ovsrec_bridge_set_controller(br->br_cfg, NULL, 0);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
static struct ovsrec_controller **
|
|
|
|
|
insert_controllers(struct ovsdb_idl_txn *txn, char *targets[], size_t n)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_controller **controllers;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
controllers = xmalloc(n * sizeof *controllers);
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
|
controllers[i] = ovsrec_controller_insert(txn);
|
|
|
|
|
ovsrec_controller_set_target(controllers[i], targets[i]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return controllers;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
set_default_controllers(struct vsctl_context *ctx, char *targets[], size_t n)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_controller **controllers;
|
|
|
|
|
|
|
|
|
|
delete_controllers(ctx->ovs->controller, ctx->ovs->n_controller);
|
|
|
|
|
|
|
|
|
|
controllers = insert_controllers(ctx->txn, targets, n);
|
|
|
|
|
ovsrec_open_vswitch_set_controller(ctx->ovs, controllers, n);
|
|
|
|
|
free(controllers);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_set_controller(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
|
|
|
|
get_info(ctx->ovs, &info);
|
|
|
|
|
|
|
|
|
|
if (ctx->argc == 2) {
|
2010-04-20 10:43:42 -07:00
|
|
|
|
/* Set one controller in the "Open_vSwitch" table. */
|
|
|
|
|
set_default_controllers(ctx, &ctx->argv[1], 1);
|
|
|
|
|
} else if (!strcmp(ctx->argv[1], "default")) {
|
|
|
|
|
/* Set one or more controllers in the "Open_vSwitch" table. */
|
|
|
|
|
set_default_controllers(ctx, &ctx->argv[2], ctx->argc - 2);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
} else {
|
2010-04-20 10:43:42 -07:00
|
|
|
|
/* Set one or more controllers for a particular bridge. */
|
2009-12-17 16:05:55 -08:00
|
|
|
|
struct vsctl_bridge *br = find_real_bridge(&info, ctx->argv[1], true);
|
2010-04-20 10:43:42 -07:00
|
|
|
|
struct ovsrec_controller **controllers;
|
|
|
|
|
size_t n;
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
delete_controllers(br->ctrl, br->n_ctrl);
|
|
|
|
|
|
|
|
|
|
n = ctx->argc - 2;
|
|
|
|
|
controllers = insert_controllers(ctx->txn, &ctx->argv[2], n);
|
|
|
|
|
ovsrec_bridge_set_controller(br->br_cfg, controllers, n);
|
|
|
|
|
free(controllers);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
static const char *
|
|
|
|
|
get_fail_mode(struct ovsrec_controller **controllers, size_t n_controllers)
|
|
|
|
|
{
|
|
|
|
|
const char *fail_mode;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
fail_mode = NULL;
|
|
|
|
|
for (i = 0; i < n_controllers; i++) {
|
|
|
|
|
const char *s = controllers[i]->fail_mode;
|
|
|
|
|
if (s) {
|
|
|
|
|
if (!strcmp(s, "secure")) {
|
|
|
|
|
return s;
|
|
|
|
|
} else {
|
|
|
|
|
fail_mode = s;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return fail_mode;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_get_fail_mode(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
const char *fail_mode = NULL;
|
|
|
|
|
|
|
|
|
|
get_info(ctx->ovs, &info);
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (ctx->argc == 1 || !strcmp(ctx->argv[1], "default")) {
|
2009-12-16 15:10:35 -08:00
|
|
|
|
/* Return the fail-mode from the "Open_vSwitch" table */
|
2010-04-20 10:43:42 -07:00
|
|
|
|
fail_mode = get_fail_mode(info.ctrl, info.n_ctrl);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
} else {
|
|
|
|
|
/* Return the fail-mode for a particular bridge. */
|
|
|
|
|
struct vsctl_bridge *br = find_bridge(&info, ctx->argv[1], true);
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
/* If no controller is defined for the requested bridge, fallback to
|
|
|
|
|
* the "Open_vSwitch" table's controller. */
|
|
|
|
|
fail_mode = (br->n_ctrl
|
|
|
|
|
? get_fail_mode(br->ctrl, br->n_ctrl)
|
|
|
|
|
: get_fail_mode(info.ctrl, info.n_ctrl));
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (fail_mode && strlen(fail_mode)) {
|
2010-01-11 16:57:29 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%s\n", fail_mode);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
static void
|
|
|
|
|
set_fail_mode(struct ovsrec_controller **controllers, size_t n_controllers,
|
|
|
|
|
const char *fail_mode)
|
|
|
|
|
{
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_controllers; i++) {
|
|
|
|
|
ovsrec_controller_set_fail_mode(controllers[i], fail_mode);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_del_fail_mode(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
|
|
|
|
|
|
|
|
|
get_info(ctx->ovs, &info);
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (ctx->argc == 1 || !strcmp(ctx->argv[1], "default")) {
|
|
|
|
|
set_fail_mode(info.ctrl, info.n_ctrl, NULL);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
} else {
|
2009-12-17 16:05:55 -08:00
|
|
|
|
struct vsctl_bridge *br = find_real_bridge(&info, ctx->argv[1], true);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
set_fail_mode(br->ctrl, br->n_ctrl, NULL);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_set_fail_mode(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_info info;
|
2010-04-20 10:43:42 -07:00
|
|
|
|
const char *bridge;
|
2009-12-16 15:10:35 -08:00
|
|
|
|
const char *fail_mode;
|
|
|
|
|
|
|
|
|
|
get_info(ctx->ovs, &info);
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (ctx->argc == 2) {
|
|
|
|
|
bridge = "default";
|
|
|
|
|
fail_mode = ctx->argv[1];
|
|
|
|
|
} else {
|
|
|
|
|
bridge = ctx->argv[1];
|
|
|
|
|
fail_mode = ctx->argv[2];
|
|
|
|
|
}
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
|
|
|
|
if (strcmp(fail_mode, "standalone") && strcmp(fail_mode, "secure")) {
|
|
|
|
|
vsctl_fatal("fail-mode must be \"standalone\" or \"secure\"");
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
if (!strcmp(bridge, "default")) {
|
2009-12-16 15:10:35 -08:00
|
|
|
|
/* Set the fail-mode in the "Open_vSwitch" table. */
|
|
|
|
|
if (!info.ctrl) {
|
|
|
|
|
vsctl_fatal("no controller declared");
|
|
|
|
|
}
|
2010-04-20 10:43:42 -07:00
|
|
|
|
set_fail_mode(info.ctrl, info.n_ctrl, fail_mode);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
} else {
|
2010-04-20 10:43:42 -07:00
|
|
|
|
struct vsctl_bridge *br = find_real_bridge(&info, bridge, true);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
|
|
|
|
if (!br->ctrl) {
|
|
|
|
|
vsctl_fatal("no controller declared for %s", br->name);
|
|
|
|
|
}
|
2010-04-20 10:43:42 -07:00
|
|
|
|
set_fail_mode(br->ctrl, br->n_ctrl, fail_mode);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free_info(&info);
|
|
|
|
|
}
|
2009-12-18 13:43:28 -08:00
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_get_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_ssl *ssl = ctx->ovs->ssl;
|
|
|
|
|
|
|
|
|
|
if (ssl) {
|
|
|
|
|
ds_put_format(&ctx->output, "Private key: %s\n", ssl->private_key);
|
|
|
|
|
ds_put_format(&ctx->output, "Certificate: %s\n", ssl->certificate);
|
|
|
|
|
ds_put_format(&ctx->output, "CA Certificate: %s\n", ssl->ca_cert);
|
|
|
|
|
ds_put_format(&ctx->output, "Bootstrap: %s\n",
|
|
|
|
|
ssl->bootstrap_ca_cert ? "true" : "false");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_del_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_ssl *ssl = ctx->ovs->ssl;
|
|
|
|
|
|
|
|
|
|
if (ssl) {
|
|
|
|
|
ovsrec_ssl_delete(ssl);
|
|
|
|
|
ovsrec_open_vswitch_set_ssl(ctx->ovs, NULL);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_set_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
bool bootstrap = shash_find(&ctx->options, "--bootstrap");
|
|
|
|
|
struct ovsrec_ssl *ssl = ctx->ovs->ssl;
|
|
|
|
|
|
|
|
|
|
if (ssl) {
|
|
|
|
|
ovsrec_ssl_delete(ssl);
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
ssl = ovsrec_ssl_insert(ctx->txn);
|
2009-12-18 13:43:28 -08:00
|
|
|
|
|
|
|
|
|
ovsrec_ssl_set_private_key(ssl, ctx->argv[1]);
|
|
|
|
|
ovsrec_ssl_set_certificate(ssl, ctx->argv[2]);
|
|
|
|
|
ovsrec_ssl_set_ca_cert(ssl, ctx->argv[3]);
|
|
|
|
|
|
|
|
|
|
ovsrec_ssl_set_bootstrap_ca_cert(ssl, bootstrap);
|
|
|
|
|
|
|
|
|
|
ovsrec_open_vswitch_set_ssl(ctx->ovs, ssl);
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
/* Parameter commands. */
|
|
|
|
|
|
|
|
|
|
struct vsctl_row_id {
|
|
|
|
|
const struct ovsdb_idl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_column *name_column;
|
|
|
|
|
const struct ovsdb_idl_column *uuid_column;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_table_class {
|
|
|
|
|
struct ovsdb_idl_table_class *class;
|
|
|
|
|
struct vsctl_row_id row_ids[2];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static const struct vsctl_table_class tables[] = {
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_bridge,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_bridge, &ovsrec_bridge_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_controller,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
|
|
|
|
&ovsrec_bridge_col_controller},
|
|
|
|
|
{&ovsrec_table_open_vswitch,
|
|
|
|
|
NULL,
|
|
|
|
|
&ovsrec_open_vswitch_col_controller}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_interface,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_interface, &ovsrec_interface_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_mirror,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_mirror, &ovsrec_mirror_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_netflow,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
|
|
|
|
&ovsrec_bridge_col_netflow},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_open_vswitch,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_open_vswitch, NULL, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_port,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_port, &ovsrec_port_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-06-17 15:04:12 -07:00
|
|
|
|
{&ovsrec_table_qos,
|
|
|
|
|
{{&ovsrec_table_port, &ovsrec_port_col_name, &ovsrec_port_col_qos},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_queue,
|
|
|
|
|
{{NULL, NULL, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_ssl,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_open_vswitch, NULL, &ovsrec_open_vswitch_col_ssl}}},
|
|
|
|
|
|
2010-05-05 10:38:24 -07:00
|
|
|
|
{&ovsrec_table_sflow,
|
|
|
|
|
{{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
|
|
|
|
&ovsrec_bridge_col_sflow},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{NULL, {{NULL, NULL, NULL}, {NULL, NULL, NULL}}}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
};
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
static void
|
|
|
|
|
die_if_error(char *error)
|
|
|
|
|
{
|
|
|
|
|
if (error) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("%s", error);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
static int
|
|
|
|
|
to_lower_and_underscores(unsigned c)
|
|
|
|
|
{
|
|
|
|
|
return c == '-' ? '_' : tolower(c);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static unsigned int
|
|
|
|
|
score_partial_match(const char *name, const char *s)
|
|
|
|
|
{
|
|
|
|
|
int score;
|
|
|
|
|
|
2010-01-27 11:21:43 -08:00
|
|
|
|
if (!strcmp(name, s)) {
|
|
|
|
|
return UINT_MAX;
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
for (score = 0; ; score++, name++, s++) {
|
|
|
|
|
if (to_lower_and_underscores(*name) != to_lower_and_underscores(*s)) {
|
|
|
|
|
break;
|
|
|
|
|
} else if (*name == '\0') {
|
2010-01-27 11:21:43 -08:00
|
|
|
|
return UINT_MAX - 1;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return *s == '\0' ? score : 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct vsctl_table_class *
|
|
|
|
|
get_table(const char *table_name)
|
|
|
|
|
{
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct vsctl_table_class *best_match = NULL;
|
|
|
|
|
unsigned int best_score = 0;
|
|
|
|
|
|
|
|
|
|
for (table = tables; table->class; table++) {
|
|
|
|
|
unsigned int score = score_partial_match(table->class->name,
|
|
|
|
|
table_name);
|
|
|
|
|
if (score > best_score) {
|
|
|
|
|
best_match = table;
|
|
|
|
|
best_score = score;
|
|
|
|
|
} else if (score == best_score) {
|
|
|
|
|
best_match = NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (best_match) {
|
|
|
|
|
return best_match;
|
|
|
|
|
} else if (best_score) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("multiple table names match \"%s\"", table_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("unknown table \"%s\"", table_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct ovsdb_idl_row *
|
|
|
|
|
get_row_by_id(struct vsctl_context *ctx, const struct vsctl_table_class *table,
|
2010-07-14 17:04:22 -07:00
|
|
|
|
const struct vsctl_row_id *id, const char *record_id)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_row *referrer, *final;
|
|
|
|
|
|
|
|
|
|
if (!id->table) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!id->name_column) {
|
|
|
|
|
if (strcmp(record_id, ".")) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
referrer = ovsdb_idl_first_row(ctx->idl, id->table);
|
|
|
|
|
if (!referrer || ovsdb_idl_next_row(referrer)) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
|
|
|
|
|
referrer = NULL;
|
|
|
|
|
for (row = ovsdb_idl_first_row(ctx->idl, id->table);
|
2010-07-14 17:04:22 -07:00
|
|
|
|
row != NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
row = ovsdb_idl_next_row(row))
|
|
|
|
|
{
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *name;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
name = ovsdb_idl_get(row, id->name_column,
|
|
|
|
|
OVSDB_TYPE_STRING, OVSDB_TYPE_VOID);
|
2010-07-14 17:04:22 -07:00
|
|
|
|
if (name->n == 1 && !strcmp(name->keys[0].string, record_id)) {
|
|
|
|
|
if (referrer) {
|
|
|
|
|
vsctl_fatal("multiple rows in %s match \"%s\"",
|
|
|
|
|
table->class->name, record_id);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-07-14 17:04:22 -07:00
|
|
|
|
referrer = row;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (!referrer) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 15:08:10 -05:00
|
|
|
|
final = NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (id->uuid_column) {
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *uuid;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
uuid = ovsdb_idl_get(referrer, id->uuid_column,
|
|
|
|
|
OVSDB_TYPE_UUID, OVSDB_TYPE_VOID);
|
|
|
|
|
if (uuid->n == 1) {
|
2010-01-25 10:13:52 -08:00
|
|
|
|
final = ovsdb_idl_get_row_for_uuid(ctx->idl, table->class,
|
2010-06-16 14:35:48 -07:00
|
|
|
|
&uuid->keys[0].uuid);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
final = referrer;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return final;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct ovsdb_idl_row *
|
2010-07-14 17:04:22 -07:00
|
|
|
|
get_row (struct vsctl_context *ctx,
|
|
|
|
|
const struct vsctl_table_class *table, const char *record_id)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
struct uuid uuid;
|
|
|
|
|
|
|
|
|
|
if (uuid_from_string(&uuid, record_id)) {
|
|
|
|
|
row = ovsdb_idl_get_row_for_uuid(ctx->idl, table->class, &uuid);
|
|
|
|
|
} else {
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(table->row_ids); i++) {
|
2010-07-14 17:04:22 -07:00
|
|
|
|
row = get_row_by_id(ctx, table, &table->row_ids[i], record_id);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (row) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-27 13:26:44 -08:00
|
|
|
|
return row;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct ovsdb_idl_row *
|
|
|
|
|
must_get_row(struct vsctl_context *ctx,
|
|
|
|
|
const struct vsctl_table_class *table, const char *record_id)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_row *row = get_row(ctx, table, record_id);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (!row) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("no row \"%s\" in table %s",
|
|
|
|
|
record_id, table->class->name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
return row;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
static char *
|
|
|
|
|
get_column(const struct vsctl_table_class *table, const char *column_name,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column **columnp)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *best_match = NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
unsigned int best_score = 0;
|
2010-02-08 14:09:36 -08:00
|
|
|
|
size_t i;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
for (i = 0; i < table->class->n_columns; i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column = &table->class->columns[i];
|
|
|
|
|
unsigned int score = score_partial_match(column->name, column_name);
|
|
|
|
|
if (score > best_score) {
|
|
|
|
|
best_match = column;
|
|
|
|
|
best_score = score;
|
|
|
|
|
} else if (score == best_score) {
|
|
|
|
|
best_match = NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-27 11:25:20 -08:00
|
|
|
|
|
|
|
|
|
*columnp = best_match;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (best_match) {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else if (best_score) {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return xasprintf("%s contains more than one column whose name "
|
|
|
|
|
"matches \"%s\"", table->class->name, column_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return xasprintf("%s does not contain a column whose name matches "
|
|
|
|
|
"\"%s\"", table->class->name, column_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-06-28 17:20:15 -07:00
|
|
|
|
static char *
|
|
|
|
|
missing_operator_error(const char *arg, const char **allowed_operators,
|
|
|
|
|
size_t n_allowed)
|
|
|
|
|
{
|
|
|
|
|
struct ds s;
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
ds_put_format(&s, "%s: argument does not end in ", arg);
|
|
|
|
|
ds_put_format(&s, "\"%s\"", allowed_operators[0]);
|
|
|
|
|
if (n_allowed == 2) {
|
|
|
|
|
ds_put_format(&s, " or \"%s\"", allowed_operators[1]);
|
|
|
|
|
} else if (n_allowed > 2) {
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 1; i < n_allowed - 1; i++) {
|
|
|
|
|
ds_put_format(&s, ", \"%s\"", allowed_operators[i]);
|
|
|
|
|
}
|
|
|
|
|
ds_put_format(&s, ", or \"%s\"", allowed_operators[i]);
|
|
|
|
|
}
|
|
|
|
|
ds_put_format(&s, " followed by a value.");
|
|
|
|
|
|
|
|
|
|
return ds_steal_cstr(&s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Breaks 'arg' apart into a number of fields in the following order:
|
|
|
|
|
*
|
|
|
|
|
* - If 'columnp' is nonnull, the name of a column in 'table'. The column
|
|
|
|
|
* is stored into '*columnp'. The column name may be abbreviated.
|
|
|
|
|
*
|
|
|
|
|
* - If 'keyp' is nonnull, optionally a key string. (If both 'columnp'
|
|
|
|
|
* and 'keyp' are nonnull, then the column and key names are expected to
|
|
|
|
|
* be separated by ':'). The key is stored as a malloc()'d string into
|
|
|
|
|
* '*keyp', or NULL if no key is present in 'arg'.
|
|
|
|
|
*
|
|
|
|
|
* - If 'valuep' is nonnull, an operator followed by a value string. The
|
|
|
|
|
* allowed operators are the 'n_allowed' string in 'allowed_operators',
|
|
|
|
|
* or just "=" if 'n_allowed' is 0. If 'operatorp' is nonnull, then the
|
|
|
|
|
* operator is stored into '*operatorp' (one of the pointers from
|
|
|
|
|
* 'allowed_operators' is stored; nothing is malloc()'d). The value is
|
|
|
|
|
* stored as a malloc()'d string into '*valuep', or NULL if no value is
|
|
|
|
|
* present in 'arg'.
|
|
|
|
|
*
|
|
|
|
|
* At least 'columnp' or 'keyp' must be nonnull.
|
|
|
|
|
*
|
|
|
|
|
* On success, returns NULL. On failure, returned a malloc()'d string error
|
|
|
|
|
* message and stores NULL into all of the nonnull output arguments. */
|
2010-01-27 11:25:20 -08:00
|
|
|
|
static char * WARN_UNUSED_RESULT
|
2010-06-28 17:20:15 -07:00
|
|
|
|
parse_column_key_value(const char *arg,
|
|
|
|
|
const struct vsctl_table_class *table,
|
|
|
|
|
const struct ovsdb_idl_column **columnp, char **keyp,
|
|
|
|
|
const char **operatorp,
|
|
|
|
|
const char **allowed_operators, size_t n_allowed,
|
|
|
|
|
char **valuep)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
|
|
|
|
const char *p = arg;
|
2010-01-27 11:25:20 -08:00
|
|
|
|
char *error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
|
|
|
|
assert(columnp || keyp);
|
2010-06-28 17:20:15 -07:00
|
|
|
|
assert(!(operatorp && !valuep));
|
2010-01-27 11:25:20 -08:00
|
|
|
|
if (keyp) {
|
|
|
|
|
*keyp = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (valuep) {
|
|
|
|
|
*valuep = NULL;
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
|
|
|
|
/* Parse column name. */
|
|
|
|
|
if (columnp) {
|
|
|
|
|
char *column_name;
|
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
error = ovsdb_token_parse(&p, &column_name);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
if (error) {
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (column_name[0] == '\0') {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
free(column_name);
|
|
|
|
|
error = xasprintf("%s: missing column name", arg);
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
error = get_column(table, column_name, columnp);
|
2010-02-02 14:26:53 -08:00
|
|
|
|
free(column_name);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
if (error) {
|
|
|
|
|
goto error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parse key string. */
|
|
|
|
|
if (*p == ':' || !columnp) {
|
|
|
|
|
if (columnp) {
|
|
|
|
|
p++;
|
|
|
|
|
} else if (!keyp) {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
error = xasprintf("%s: key not accepted here", arg);
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
error = ovsdb_token_parse(&p, keyp);
|
|
|
|
|
if (error) {
|
|
|
|
|
goto error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
} else if (keyp) {
|
|
|
|
|
*keyp = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parse value string. */
|
2010-06-28 17:20:15 -07:00
|
|
|
|
if (valuep) {
|
|
|
|
|
const char *best;
|
|
|
|
|
size_t best_len;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
if (!allowed_operators) {
|
|
|
|
|
static const char *equals = "=";
|
|
|
|
|
allowed_operators = =
|
|
|
|
|
n_allowed = 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
best = NULL;
|
|
|
|
|
best_len = 0;
|
|
|
|
|
for (i = 0; i < n_allowed; i++) {
|
|
|
|
|
const char *op = allowed_operators[i];
|
|
|
|
|
size_t op_len = strlen(op);
|
|
|
|
|
|
2010-06-29 09:54:10 -07:00
|
|
|
|
if (op_len > best_len && !strncmp(op, p, op_len) && p[op_len]) {
|
2010-06-28 17:20:15 -07:00
|
|
|
|
best_len = op_len;
|
|
|
|
|
best = op;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (!best) {
|
|
|
|
|
error = missing_operator_error(arg, allowed_operators, n_allowed);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
goto error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-06-28 17:20:15 -07:00
|
|
|
|
|
|
|
|
|
if (operatorp) {
|
|
|
|
|
*operatorp = best;
|
|
|
|
|
}
|
2010-06-29 09:54:10 -07:00
|
|
|
|
*valuep = xstrdup(p + best_len);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
|
|
|
|
if (valuep) {
|
|
|
|
|
*valuep = NULL;
|
|
|
|
|
}
|
2010-01-27 11:25:20 -08:00
|
|
|
|
if (*p != '\0') {
|
2010-01-28 16:03:26 -08:00
|
|
|
|
error = xasprintf("%s: trailing garbage \"%s\" in argument",
|
|
|
|
|
arg, p);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
error:
|
|
|
|
|
if (columnp) {
|
|
|
|
|
*columnp = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (keyp) {
|
|
|
|
|
free(*keyp);
|
|
|
|
|
*keyp = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (valuep) {
|
|
|
|
|
free(*valuep);
|
|
|
|
|
*valuep = NULL;
|
2010-06-28 17:20:15 -07:00
|
|
|
|
if (operatorp) {
|
|
|
|
|
*operatorp = NULL;
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_get(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2010-01-28 16:03:52 -08:00
|
|
|
|
bool if_exists = shash_find(&ctx->options, "--if-exists");
|
2010-01-25 10:13:52 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
struct ds *out = &ctx->output;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2010-01-27 13:26:44 -08:00
|
|
|
|
row = must_get_row(ctx, table, record_id);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *datum;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
char *key_string;
|
|
|
|
|
|
2010-06-24 16:06:07 -07:00
|
|
|
|
/* Special case for obtaining the UUID of a row. We can't just do this
|
|
|
|
|
* through parse_column_key_value() below since it returns a "struct
|
|
|
|
|
* ovsdb_idl_column" and the UUID column doesn't have one. */
|
|
|
|
|
if (!strcasecmp(ctx->argv[i], "_uuid")
|
|
|
|
|
|| !strcasecmp(ctx->argv[i], "-uuid")) {
|
|
|
|
|
ds_put_format(out, UUID_FMT"\n", UUID_ARGS(&row->uuid));
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
die_if_error(parse_column_key_value(ctx->argv[i], table,
|
2010-06-28 17:20:15 -07:00
|
|
|
|
&column, &key_string,
|
|
|
|
|
NULL, NULL, 0, NULL));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
datum = ovsdb_idl_read(row, column);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (key_string) {
|
|
|
|
|
union ovsdb_atom key;
|
|
|
|
|
unsigned int idx;
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
if (column->type.value.type == OVSDB_TYPE_VOID) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("cannot specify key to get for non-map column %s",
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
die_if_error(ovsdb_atom_from_string(&key,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
&column->type.key,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
key_string, ctx->symtab));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
idx = ovsdb_datum_find_key(datum, &key,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->type.key.type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (idx == UINT_MAX) {
|
2010-01-28 16:03:52 -08:00
|
|
|
|
if (!if_exists) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("no key \"%s\" in %s record \"%s\" column %s",
|
|
|
|
|
key_string, table->class->name, record_id,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name);
|
2010-01-28 16:03:52 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_atom_to_string(&datum->values[idx],
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->type.value.type, out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_atom_destroy(&key, column->type.key.type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_to_string(datum, &column->type, out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
ds_put_char(out, '\n');
|
|
|
|
|
|
|
|
|
|
free(key_string);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2010-01-27 11:25:20 -08:00
|
|
|
|
list_record(const struct vsctl_table_class *table,
|
|
|
|
|
const struct ovsdb_idl_row *row, struct ds *out)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
2010-02-08 14:09:36 -08:00
|
|
|
|
size_t i;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ds_put_format(out, "%-20s: "UUID_FMT"\n", "_uuid",
|
2010-01-27 11:23:03 -08:00
|
|
|
|
UUID_ARGS(&row->uuid));
|
2010-02-08 14:09:36 -08:00
|
|
|
|
for (i = 0; i < table->class->n_columns; i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column = &table->class->columns[i];
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *datum;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
datum = ovsdb_idl_read(row, column);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ds_put_format(out, "%-20s: ", column->name);
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_to_string(datum, &column->type, out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
ds_put_char(out, '\n');
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_list(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
struct ds *out = &ctx->output;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
|
|
|
|
if (ctx->argc > 2) {
|
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
|
|
|
|
if (i > 2) {
|
|
|
|
|
ds_put_char(out, '\n');
|
|
|
|
|
}
|
2010-01-27 13:26:44 -08:00
|
|
|
|
list_record(table, must_get_row(ctx, table, ctx->argv[i]), out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
bool first;
|
|
|
|
|
|
|
|
|
|
for (row = ovsdb_idl_first_row(ctx->idl, table->class), first = true;
|
|
|
|
|
row != NULL;
|
|
|
|
|
row = ovsdb_idl_next_row(row), first = false) {
|
|
|
|
|
if (!first) {
|
|
|
|
|
ds_put_char(out, '\n');
|
|
|
|
|
}
|
|
|
|
|
list_record(table, row, out);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2010-01-27 13:19:46 -08:00
|
|
|
|
set_column(const struct vsctl_table_class *table,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const struct ovsdb_idl_row *row, const char *arg,
|
|
|
|
|
struct ovsdb_symbol_table *symtab)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-27 13:19:46 -08:00
|
|
|
|
char *key_string, *value_string;
|
|
|
|
|
char *error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
error = parse_column_key_value(arg, table, &column, &key_string,
|
2010-06-28 17:20:15 -07:00
|
|
|
|
NULL, NULL, 0, &value_string);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
die_if_error(error);
|
|
|
|
|
if (!value_string) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("%s: missing value", arg);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
if (key_string) {
|
|
|
|
|
union ovsdb_atom key, value;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
struct ovsdb_datum datum;
|
2010-01-27 13:19:46 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
if (column->type.value.type == OVSDB_TYPE_VOID) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("cannot specify key to set for non-map column %s",
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
die_if_error(ovsdb_atom_from_string(&key, &column->type.key,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
key_string, symtab));
|
2010-02-08 14:09:36 -08:00
|
|
|
|
die_if_error(ovsdb_atom_from_string(&value, &column->type.value,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
value_string, symtab));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_init_empty(&datum);
|
|
|
|
|
ovsdb_datum_add_unsafe(&datum, &key, &value, &column->type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_atom_destroy(&key, column->type.key.type);
|
|
|
|
|
ovsdb_atom_destroy(&value, column->type.value.type);
|
2010-02-02 14:26:53 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_union(&datum, ovsdb_idl_read(row, column),
|
|
|
|
|
&column->type, false);
|
|
|
|
|
ovsdb_idl_txn_write(row, column, &datum);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
} else {
|
|
|
|
|
struct ovsdb_datum datum;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
die_if_error(ovsdb_datum_from_string(&datum, &column->type,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
value_string, symtab));
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &datum);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
free(key_string);
|
2010-02-02 14:26:53 -08:00
|
|
|
|
free(value_string);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_set(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
int i;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
table = get_table(table_name);
|
2010-01-27 13:26:44 -08:00
|
|
|
|
row = must_get_row(ctx, table, record_id);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2010-06-02 11:08:03 -07:00
|
|
|
|
set_column(table, row, ctx->argv[i], ctx->symtab);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_add(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const char *column_name = ctx->argv[3];
|
|
|
|
|
const struct vsctl_table_class *table;
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
const struct ovsdb_type *type;
|
|
|
|
|
struct ovsdb_datum old;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2010-01-27 13:26:44 -08:00
|
|
|
|
row = must_get_row(ctx, table, record_id);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
die_if_error(get_column(table, column_name, &column));
|
2010-01-28 16:03:26 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type = &column->type;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_clone(&old, ovsdb_idl_read(row, column), &column->type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
for (i = 4; i < ctx->argc; i++) {
|
|
|
|
|
struct ovsdb_type add_type;
|
|
|
|
|
struct ovsdb_datum add;
|
|
|
|
|
|
|
|
|
|
add_type = *type;
|
|
|
|
|
add_type.n_min = 1;
|
|
|
|
|
add_type.n_max = UINT_MAX;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
die_if_error(ovsdb_datum_from_string(&add, &add_type, ctx->argv[i],
|
|
|
|
|
ctx->symtab));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
ovsdb_datum_union(&old, &add, type, false);
|
|
|
|
|
ovsdb_datum_destroy(&add, type);
|
|
|
|
|
}
|
|
|
|
|
if (old.n > type->n_max) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("\"add\" operation would put %u %s in column %s of "
|
|
|
|
|
"table %s but the maximum number is %u",
|
|
|
|
|
old.n,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type->value.type == OVSDB_TYPE_VOID ? "values" : "pairs",
|
|
|
|
|
column->name, table->class->name, type->n_max);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &old);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-01-27 11:30:59 -08:00
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_remove(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const char *column_name = ctx->argv[3];
|
|
|
|
|
const struct vsctl_table_class *table;
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-27 11:30:59 -08:00
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
const struct ovsdb_type *type;
|
|
|
|
|
struct ovsdb_datum old;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2010-01-27 13:26:44 -08:00
|
|
|
|
row = must_get_row(ctx, table, record_id);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
die_if_error(get_column(table, column_name, &column));
|
2010-01-28 16:03:26 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type = &column->type;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_clone(&old, ovsdb_idl_read(row, column), &column->type);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
for (i = 4; i < ctx->argc; i++) {
|
|
|
|
|
struct ovsdb_type rm_type;
|
|
|
|
|
struct ovsdb_datum rm;
|
|
|
|
|
char *error;
|
|
|
|
|
|
|
|
|
|
rm_type = *type;
|
|
|
|
|
rm_type.n_min = 1;
|
|
|
|
|
rm_type.n_max = UINT_MAX;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
error = ovsdb_datum_from_string(&rm, &rm_type,
|
|
|
|
|
ctx->argv[i], ctx->symtab);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
if (error && ovsdb_type_is_map(&rm_type)) {
|
|
|
|
|
free(error);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
rm_type.value.type = OVSDB_TYPE_VOID;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
die_if_error(ovsdb_datum_from_string(&rm, &rm_type,
|
|
|
|
|
ctx->argv[i], ctx->symtab));
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
|
|
|
|
ovsdb_datum_subtract(&old, type, &rm, &rm_type);
|
|
|
|
|
ovsdb_datum_destroy(&rm, &rm_type);
|
|
|
|
|
}
|
|
|
|
|
if (old.n < type->n_min) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("\"remove\" operation would put %u %s in column %s of "
|
2010-06-15 16:09:34 -07:00
|
|
|
|
"table %s but the minimum number is %u",
|
2010-02-02 14:25:11 -08:00
|
|
|
|
old.n,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type->value.type == OVSDB_TYPE_VOID ? "values" : "pairs",
|
|
|
|
|
column->name, table->class->name, type->n_min);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &old);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_clear(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2010-01-27 13:26:44 -08:00
|
|
|
|
row = must_get_row(ctx, table, record_id);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-27 11:30:59 -08:00
|
|
|
|
const struct ovsdb_type *type;
|
|
|
|
|
struct ovsdb_datum datum;
|
|
|
|
|
|
|
|
|
|
die_if_error(get_column(table, ctx->argv[i], &column));
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type = &column->type;
|
|
|
|
|
if (type->n_min > 0) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("\"clear\" operation cannot be applied to column %s "
|
|
|
|
|
"of table %s, which is not allowed to be empty",
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name, table->class->name);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ovsdb_datum_init_empty(&datum);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &datum);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-27 13:19:46 -08:00
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_create(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const char *id = shash_find_data(&ctx->options, "--id");
|
2010-01-27 13:19:46 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const struct uuid *uuid;
|
2010-01-27 13:19:46 -08:00
|
|
|
|
int i;
|
|
|
|
|
|
2010-06-02 11:08:03 -07:00
|
|
|
|
if (id) {
|
|
|
|
|
struct ovsdb_symbol *symbol;
|
|
|
|
|
|
|
|
|
|
if (id[0] != '@') {
|
|
|
|
|
vsctl_fatal("row id \"%s\" does not begin with \"@\"", id);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
symbol = ovsdb_symbol_table_insert(ctx->symtab, id);
|
|
|
|
|
if (symbol->used) {
|
|
|
|
|
vsctl_fatal("row id \"%s\" may only be used to insert a single "
|
|
|
|
|
"row", id);
|
|
|
|
|
}
|
|
|
|
|
symbol->used = true;
|
|
|
|
|
|
|
|
|
|
uuid = &symbol->uuid;
|
|
|
|
|
} else {
|
|
|
|
|
uuid = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
table = get_table(table_name);
|
2010-06-02 11:08:03 -07:00
|
|
|
|
row = ovsdb_idl_txn_insert(ctx->txn, table->class, uuid);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
2010-06-02 11:08:03 -07:00
|
|
|
|
set_column(table, row, ctx->argv[i], ctx->symtab);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
ds_put_format(&ctx->output, UUID_FMT, UUID_ARGS(&row->uuid));
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-27 13:26:44 -08:00
|
|
|
|
|
2010-01-28 14:00:22 -08:00
|
|
|
|
/* This function may be used as the 'postprocess' function for commands that
|
|
|
|
|
* insert new rows into the database. It expects that the command's 'run'
|
|
|
|
|
* function prints the UUID reported by ovsdb_idl_txn_insert() as the command's
|
|
|
|
|
* sole output. It replaces that output by the row's permanent UUID assigned
|
|
|
|
|
* by the database server and appends a new-line.
|
|
|
|
|
*
|
|
|
|
|
* Currently we use this only for "create", because the higher-level commands
|
|
|
|
|
* are supposed to be independent of the actual structure of the vswitch
|
|
|
|
|
* configuration. */
|
|
|
|
|
static void
|
|
|
|
|
post_create(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct uuid *real;
|
|
|
|
|
struct uuid dummy;
|
|
|
|
|
|
|
|
|
|
uuid_from_string(&dummy, ds_cstr(&ctx->output));
|
|
|
|
|
real = ovsdb_idl_txn_get_insert_uuid(ctx->txn, &dummy);
|
|
|
|
|
if (real) {
|
|
|
|
|
ds_clear(&ctx->output);
|
|
|
|
|
ds_put_format(&ctx->output, UUID_FMT, UUID_ARGS(real));
|
|
|
|
|
}
|
|
|
|
|
ds_put_char(&ctx->output, '\n');
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 13:26:44 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_destroy(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
2010-01-27 13:26:44 -08:00
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
|
|
|
|
|
row = (must_exist ? must_get_row : get_row)(ctx, table, ctx->argv[i]);
|
|
|
|
|
if (row) {
|
|
|
|
|
ovsdb_idl_txn_delete(row);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-06-29 09:54:10 -07:00
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
|
is_condition_satified(const struct vsctl_table_class *table,
|
|
|
|
|
const struct ovsdb_idl_row *row, const char *arg,
|
|
|
|
|
struct ovsdb_symbol_table *symtab)
|
|
|
|
|
{
|
|
|
|
|
static const char *operators[] = {
|
|
|
|
|
"=", "!=", "<", ">", "<=", ">="
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *have_datum;
|
2010-06-29 09:54:10 -07:00
|
|
|
|
char *key_string, *value_string;
|
|
|
|
|
const char *operator;
|
|
|
|
|
unsigned int idx;
|
|
|
|
|
char *error;
|
2010-07-15 18:04:10 -07:00
|
|
|
|
int cmp = 0;
|
2010-06-29 09:54:10 -07:00
|
|
|
|
|
|
|
|
|
error = parse_column_key_value(arg, table, &column, &key_string,
|
|
|
|
|
&operator, operators, ARRAY_SIZE(operators),
|
|
|
|
|
&value_string);
|
|
|
|
|
die_if_error(error);
|
|
|
|
|
if (!value_string) {
|
|
|
|
|
vsctl_fatal("%s: missing value", arg);
|
|
|
|
|
}
|
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
have_datum = ovsdb_idl_read(row, column);
|
2010-06-29 09:54:10 -07:00
|
|
|
|
if (key_string) {
|
|
|
|
|
union ovsdb_atom want_key, want_value;
|
|
|
|
|
|
|
|
|
|
if (column->type.value.type == OVSDB_TYPE_VOID) {
|
|
|
|
|
vsctl_fatal("cannot specify key to check for non-map column %s",
|
|
|
|
|
column->name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
die_if_error(ovsdb_atom_from_string(&want_key, &column->type.key,
|
|
|
|
|
key_string, symtab));
|
|
|
|
|
die_if_error(ovsdb_atom_from_string(&want_value, &column->type.value,
|
|
|
|
|
value_string, symtab));
|
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
idx = ovsdb_datum_find_key(have_datum,
|
2010-06-29 09:54:10 -07:00
|
|
|
|
&want_key, column->type.key.type);
|
|
|
|
|
if (idx != UINT_MAX) {
|
2010-06-16 14:35:48 -07:00
|
|
|
|
cmp = ovsdb_atom_compare_3way(&have_datum->values[idx],
|
2010-06-29 09:54:10 -07:00
|
|
|
|
&want_value,
|
|
|
|
|
column->type.value.type);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ovsdb_atom_destroy(&want_key, column->type.key.type);
|
|
|
|
|
ovsdb_atom_destroy(&want_value, column->type.value.type);
|
|
|
|
|
} else {
|
|
|
|
|
struct ovsdb_datum want_datum;
|
|
|
|
|
|
|
|
|
|
die_if_error(ovsdb_datum_from_string(&want_datum, &column->type,
|
|
|
|
|
value_string, symtab));
|
|
|
|
|
idx = 0;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
cmp = ovsdb_datum_compare_3way(have_datum, &want_datum,
|
2010-06-29 09:54:10 -07:00
|
|
|
|
&column->type);
|
|
|
|
|
ovsdb_datum_destroy(&want_datum, &column->type);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(key_string);
|
|
|
|
|
free(value_string);
|
|
|
|
|
|
|
|
|
|
return (idx == UINT_MAX ? false
|
|
|
|
|
: !strcmp(operator, "=") ? cmp == 0
|
|
|
|
|
: !strcmp(operator, "!=") ? cmp != 0
|
|
|
|
|
: !strcmp(operator, "<") ? cmp < 0
|
|
|
|
|
: !strcmp(operator, ">") ? cmp > 0
|
|
|
|
|
: !strcmp(operator, "<=") ? cmp <= 0
|
|
|
|
|
: !strcmp(operator, ">=") ? cmp >= 0
|
|
|
|
|
: (abort(), 0));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_wait_until(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
|
|
|
|
|
2010-07-14 17:04:22 -07:00
|
|
|
|
row = get_row(ctx, table, record_id);
|
2010-06-29 09:54:10 -07:00
|
|
|
|
if (!row) {
|
|
|
|
|
ctx->try_again = true;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
|
|
|
|
if (!is_condition_satified(table, row, ctx->argv[i], ctx->symtab)) {
|
|
|
|
|
ctx->try_again = true;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2009-12-16 16:26:17 -08:00
|
|
|
|
static struct json *
|
|
|
|
|
where_uuid_equals(const struct uuid *uuid)
|
|
|
|
|
{
|
|
|
|
|
return
|
|
|
|
|
json_array_create_1(
|
|
|
|
|
json_array_create_3(
|
|
|
|
|
json_string_create("_uuid"),
|
|
|
|
|
json_string_create("=="),
|
|
|
|
|
json_array_create_2(
|
|
|
|
|
json_string_create("uuid"),
|
|
|
|
|
json_string_create_nocopy(
|
|
|
|
|
xasprintf(UUID_FMT, UUID_ARGS(uuid))))));
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2010-01-28 16:09:26 -08:00
|
|
|
|
vsctl_context_init(struct vsctl_context *ctx, struct vsctl_command *command,
|
|
|
|
|
struct ovsdb_idl *idl, struct ovsdb_idl_txn *txn,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const struct ovsrec_open_vswitch *ovs,
|
|
|
|
|
struct ovsdb_symbol_table *symtab)
|
2010-01-28 16:09:26 -08:00
|
|
|
|
{
|
|
|
|
|
ctx->argc = command->argc;
|
|
|
|
|
ctx->argv = command->argv;
|
|
|
|
|
ctx->options = command->options;
|
|
|
|
|
|
|
|
|
|
ds_swap(&ctx->output, &command->output);
|
|
|
|
|
ctx->idl = idl;
|
|
|
|
|
ctx->txn = txn;
|
|
|
|
|
ctx->ovs = ovs;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
ctx->symtab = symtab;
|
2010-06-24 11:01:53 -07:00
|
|
|
|
|
|
|
|
|
ctx->try_again = false;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
vsctl_context_done(struct vsctl_context *ctx, struct vsctl_command *command)
|
|
|
|
|
{
|
|
|
|
|
ds_swap(&ctx->output, &command->output);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
do_vsctl(const char *args, struct vsctl_command *commands, size_t n_commands,
|
|
|
|
|
struct ovsdb_idl *idl)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct ovsdb_idl_txn *txn;
|
|
|
|
|
const struct ovsrec_open_vswitch *ovs;
|
|
|
|
|
enum ovsdb_idl_txn_status status;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
struct ovsdb_symbol_table *symtab;
|
|
|
|
|
const char *unused;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct vsctl_command *c;
|
2010-01-20 14:19:47 -05:00
|
|
|
|
int64_t next_cfg = 0;
|
2010-07-15 18:04:10 -07:00
|
|
|
|
char *error = NULL;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-02-02 14:26:17 -08:00
|
|
|
|
txn = the_idl_txn = ovsdb_idl_txn_create(idl);
|
2009-12-11 11:28:36 -08:00
|
|
|
|
if (dry_run) {
|
|
|
|
|
ovsdb_idl_txn_set_dry_run(txn);
|
|
|
|
|
}
|
2009-12-11 10:40:55 -08:00
|
|
|
|
|
2010-03-08 14:18:44 -08:00
|
|
|
|
ovsdb_idl_txn_add_comment(txn, "ovs-vsctl: %s", args);
|
2009-12-16 13:30:53 -08:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovs = ovsrec_open_vswitch_first(idl);
|
|
|
|
|
if (!ovs) {
|
2009-12-11 10:40:55 -08:00
|
|
|
|
/* XXX add verification that table is empty */
|
|
|
|
|
ovs = ovsrec_open_vswitch_insert(txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 16:26:17 -08:00
|
|
|
|
if (wait_for_reload) {
|
|
|
|
|
struct json *where = where_uuid_equals(&ovs->header_.uuid);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
ovsdb_idl_txn_increment(txn, "Open_vSwitch", "next_cfg", where);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
json_destroy(where);
|
|
|
|
|
}
|
|
|
|
|
|
2010-06-02 11:08:03 -07:00
|
|
|
|
symtab = ovsdb_symbol_table_create();
|
2010-06-24 11:01:53 -07:00
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
ds_init(&c->output);
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
struct vsctl_context ctx;
|
|
|
|
|
|
2010-06-02 11:08:03 -07:00
|
|
|
|
vsctl_context_init(&ctx, c, idl, txn, ovs, symtab);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
(c->syntax->run)(&ctx);
|
|
|
|
|
vsctl_context_done(&ctx, c);
|
2010-06-24 11:01:53 -07:00
|
|
|
|
|
|
|
|
|
if (ctx.try_again) {
|
|
|
|
|
goto try_again;
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-03-03 12:55:39 -08:00
|
|
|
|
status = ovsdb_idl_txn_commit_block(txn);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
if (wait_for_reload && status == TXN_SUCCESS) {
|
|
|
|
|
next_cfg = ovsdb_idl_txn_get_increment_new_value(txn);
|
|
|
|
|
}
|
2010-05-18 14:16:43 -07:00
|
|
|
|
if (status == TXN_UNCHANGED || status == TXN_SUCCESS) {
|
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
if (c->syntax->postprocess) {
|
|
|
|
|
struct vsctl_context ctx;
|
|
|
|
|
|
2010-06-02 11:08:03 -07:00
|
|
|
|
vsctl_context_init(&ctx, c, idl, txn, ovs, symtab);
|
2010-05-18 14:16:43 -07:00
|
|
|
|
(c->syntax->postprocess)(&ctx);
|
|
|
|
|
vsctl_context_done(&ctx, c);
|
|
|
|
|
}
|
2010-01-28 13:33:24 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2010-02-05 14:11:12 -08:00
|
|
|
|
error = xstrdup(ovsdb_idl_txn_get_error(txn));
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsdb_idl_txn_destroy(txn);
|
2010-02-02 14:26:17 -08:00
|
|
|
|
the_idl_txn = NULL;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-06-02 11:08:03 -07:00
|
|
|
|
unused = ovsdb_symbol_table_find_unused(symtab);
|
|
|
|
|
if (unused) {
|
|
|
|
|
vsctl_fatal("row id \"%s\" is referenced but never created (e.g. "
|
|
|
|
|
"with \"-- --id=%s create ...\")", unused, unused);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
switch (status) {
|
|
|
|
|
case TXN_INCOMPLETE:
|
|
|
|
|
NOT_REACHED();
|
|
|
|
|
|
|
|
|
|
case TXN_ABORTED:
|
|
|
|
|
/* Should not happen--we never call ovsdb_idl_txn_abort(). */
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("transaction aborted");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-16 16:26:17 -08:00
|
|
|
|
case TXN_UNCHANGED:
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case TXN_SUCCESS:
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case TXN_TRY_AGAIN:
|
2010-06-24 11:01:53 -07:00
|
|
|
|
goto try_again;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
case TXN_ERROR:
|
2010-02-05 14:11:12 -08:00
|
|
|
|
vsctl_fatal("transaction error: %s", error);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
NOT_REACHED();
|
|
|
|
|
}
|
2010-02-05 14:11:12 -08:00
|
|
|
|
free(error);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-06-24 11:01:53 -07:00
|
|
|
|
ovsdb_symbol_table_destroy(symtab);
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
struct ds *ds = &c->output;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (oneline) {
|
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
|
|
ds_chomp(ds, '\n');
|
|
|
|
|
for (j = 0; j < ds->length; j++) {
|
|
|
|
|
int c = ds->string[j];
|
|
|
|
|
switch (c) {
|
|
|
|
|
case '\n':
|
|
|
|
|
fputs("\\n", stdout);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case '\\':
|
|
|
|
|
fputs("\\\\", stdout);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
putchar(c);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
putchar('\n');
|
|
|
|
|
} else {
|
|
|
|
|
fputs(ds_cstr(ds), stdout);
|
|
|
|
|
}
|
2010-02-02 14:27:22 -08:00
|
|
|
|
ds_destroy(&c->output);
|
2010-06-02 11:08:03 -07:00
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, &c->options) {
|
|
|
|
|
free(node->data);
|
|
|
|
|
}
|
2010-02-02 14:27:22 -08:00
|
|
|
|
shash_destroy(&c->options);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2010-02-02 14:27:22 -08:00
|
|
|
|
free(commands);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
|
|
|
|
|
if (wait_for_reload && status != TXN_UNCHANGED) {
|
|
|
|
|
for (;;) {
|
|
|
|
|
const struct ovsrec_open_vswitch *ovs;
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_run(idl);
|
|
|
|
|
OVSREC_OPEN_VSWITCH_FOR_EACH (ovs, idl) {
|
|
|
|
|
if (ovs->cur_cfg >= next_cfg) {
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsdb_idl_wait(idl);
|
|
|
|
|
poll_block();
|
|
|
|
|
}
|
|
|
|
|
done: ;
|
|
|
|
|
}
|
2010-02-02 14:27:22 -08:00
|
|
|
|
ovsdb_idl_destroy(idl);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
exit(EXIT_SUCCESS);
|
2010-06-24 11:01:53 -07:00
|
|
|
|
|
|
|
|
|
try_again:
|
|
|
|
|
/* Our transaction needs to be rerun, or a prerequisite was not met. Free
|
|
|
|
|
* resources and return so that the caller can try again. */
|
|
|
|
|
ovsdb_idl_txn_abort(txn);
|
|
|
|
|
ovsdb_idl_txn_destroy(txn);
|
|
|
|
|
ovsdb_symbol_table_destroy(symtab);
|
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
ds_destroy(&c->output);
|
|
|
|
|
}
|
|
|
|
|
free(error);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
static const struct vsctl_command_syntax all_commands[] = {
|
|
|
|
|
/* Open vSwitch commands. */
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"init", 0, 0, cmd_init, NULL, ""},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Bridge commands. */
|
2010-02-09 11:03:14 -08:00
|
|
|
|
{"add-br", 1, 3, cmd_add_br, NULL, "--may-exist"},
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"del-br", 1, 1, cmd_del_br, NULL, "--if-exists"},
|
|
|
|
|
{"list-br", 0, 0, cmd_list_br, NULL, ""},
|
|
|
|
|
{"br-exists", 1, 1, cmd_br_exists, NULL, ""},
|
|
|
|
|
{"br-to-vlan", 1, 1, cmd_br_to_vlan, NULL, ""},
|
|
|
|
|
{"br-to-parent", 1, 1, cmd_br_to_parent, NULL, ""},
|
|
|
|
|
{"br-set-external-id", 2, 3, cmd_br_set_external_id, NULL, ""},
|
|
|
|
|
{"br-get-external-id", 1, 2, cmd_br_get_external_id, NULL, ""},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Port commands. */
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"list-ports", 1, 1, cmd_list_ports, NULL, ""},
|
2010-04-05 12:58:21 -07:00
|
|
|
|
{"add-port", 2, INT_MAX, cmd_add_port, NULL, "--may-exist"},
|
2010-02-09 12:13:46 -08:00
|
|
|
|
{"add-bond", 4, INT_MAX, cmd_add_bond, NULL, "--may-exist,--fake-iface"},
|
2010-02-22 16:36:30 -08:00
|
|
|
|
{"del-port", 1, 2, cmd_del_port, NULL, "--if-exists,--with-iface"},
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"port-to-br", 1, 1, cmd_port_to_br, NULL, ""},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Interface commands. */
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"list-ifaces", 1, 1, cmd_list_ifaces, NULL, ""},
|
|
|
|
|
{"iface-to-br", 1, 1, cmd_iface_to_br, NULL, ""},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Controller commands. */
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"get-controller", 0, 1, cmd_get_controller, NULL, ""},
|
|
|
|
|
{"del-controller", 0, 1, cmd_del_controller, NULL, ""},
|
2010-04-20 10:43:42 -07:00
|
|
|
|
{"set-controller", 1, INT_MAX, cmd_set_controller, NULL, ""},
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"get-fail-mode", 0, 1, cmd_get_fail_mode, NULL, ""},
|
|
|
|
|
{"del-fail-mode", 0, 1, cmd_del_fail_mode, NULL, ""},
|
|
|
|
|
{"set-fail-mode", 1, 2, cmd_set_fail_mode, NULL, ""},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* SSL commands. */
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"get-ssl", 0, 0, cmd_get_ssl, NULL, ""},
|
|
|
|
|
{"del-ssl", 0, 0, cmd_del_ssl, NULL, ""},
|
|
|
|
|
{"set-ssl", 3, 3, cmd_set_ssl, NULL, "--bootstrap"},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
2010-04-30 15:06:51 -07:00
|
|
|
|
/* Switch commands. */
|
|
|
|
|
{"emer-reset", 0, 0, cmd_emer_reset, NULL, ""},
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
/* Parameter commands. */
|
2010-01-28 16:03:52 -08:00
|
|
|
|
{"get", 3, INT_MAX, cmd_get, NULL, "--if-exists"},
|
2010-01-28 13:33:24 -08:00
|
|
|
|
{"list", 1, INT_MAX, cmd_list, NULL, ""},
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{"set", 3, INT_MAX, cmd_set, NULL, ""},
|
|
|
|
|
{"add", 4, INT_MAX, cmd_add, NULL, ""},
|
|
|
|
|
{"remove", 4, INT_MAX, cmd_remove, NULL, ""},
|
|
|
|
|
{"clear", 3, INT_MAX, cmd_clear, NULL, ""},
|
2010-06-02 11:08:03 -07:00
|
|
|
|
{"create", 2, INT_MAX, cmd_create, post_create, "--id="},
|
2010-02-08 14:09:41 -08:00
|
|
|
|
{"destroy", 1, INT_MAX, cmd_destroy, NULL, "--if-exists"},
|
2010-06-29 09:54:10 -07:00
|
|
|
|
{"wait-until", 2, INT_MAX, cmd_wait_until, NULL, ""},
|
2010-01-28 13:33:24 -08:00
|
|
|
|
|
|
|
|
|
{NULL, 0, 0, NULL, NULL, NULL},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
};
|
2009-12-10 13:28:22 -08:00
|
|
|
|
|