From 0a1c6b5565e20167d1f1f33a5a8b597f420b18b0 Mon Sep 17 00:00:00 2001 From: Jordan Augé Date: Fri, 26 Jul 2019 23:20:30 +0200 Subject: [HICN-252] Add per-application policy framework to hicn-light forwarder MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Change-Id: I0531cd7a7de179581295ae34766c81cd9cf3e172 Signed-off-by: Jordan Augé Signed-off-by: Mauro Sardara Co-authored-by: Mauro Sardara --- ctrl/libhicnctrl/src/api.c | 2163 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 2163 insertions(+) create mode 100644 ctrl/libhicnctrl/src/api.c (limited to 'ctrl/libhicnctrl/src/api.c') diff --git a/ctrl/libhicnctrl/src/api.c b/ctrl/libhicnctrl/src/api.c new file mode 100644 index 000000000..3d8a2c166 --- /dev/null +++ b/ctrl/libhicnctrl/src/api.c @@ -0,0 +1,2163 @@ +/* + * Copyright (c) 2017-2019 Cisco and/or its affiliates. + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at: + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +/** + * \file api.c + * \brief Implementation of hICN control library API + */ + +#include // assert +#include // log2 +#include // snprintf +#include // memmove, strcasecmp +#include // socket +#include // close, fcntl +#include // fcntl + +#include +#include +#include "util/log.h" +#include "util/token.h" +#include + +#define PORT 9695 + +/* + * list was working with all seq set to 0, but it seems hicnLightControl uses + * 1, and replies with the same seqno + */ +#define HICN_CTRL_SEND_SEQ_INIT 1 +#define HICN_CTRL_RECV_SEQ_INIT 1 + +#define MAX(x, y) ((x > y) ? x : y) + +/** + * \brief Defines the default size for the allocated data arrays holding the + * results of API calls. + * + * This size should not be too small to avoid wasting memoyy, but also not too + * big to avoid unnecessary realloc's. Later on this size is doubled at each + * reallocation. + */ +#define DEFAULT_SIZE_LOG 3 + +/** + * In practise, we want to preserve enough room to store a full packet of + * average expected size (say a header + N payload elements). + */ +#define AVG_ELEMENTS (1 << DEFAULT_SIZE_LOG) +#define AVG_BUFLEN sizeof(hc_msg_header_t) + AVG_ELEMENTS * sizeof(hc_msg_payload_t) + +/* + * We should at least have buffer space allowing to store one processable unit + * of data, either the header of the maximum possible payload + */ +#define MIN_BUFLEN MAX(sizeof(hc_msg_header_t), sizeof(hc_msg_payload_t)) + +static const struct in6_addr loopback_addr = IN6ADDR_LOOPBACK_INIT; + +/* /!\ Please update constants in header file upon changes */ +const char * connection_type_str[] = { +#define _(x) [CONNECTION_TYPE_ ## x] = STRINGIZE(x), +foreach_connection_type +#undef _ +}; + +#define IS_VALID_CONNECTION_TYPE(x) IS_VALID_ENUM_TYPE(CONNECTION_TYPE, x) + +hc_connection_type_t +connection_type_from_str(const char * str) +{ + if (strcasecmp(str, "TCP") == 0) + return CONNECTION_TYPE_TCP; + else if (strcasecmp(str, "UDP") == 0) + return CONNECTION_TYPE_UDP; + else if (strcasecmp(str, "HICN") == 0) + return CONNECTION_TYPE_HICN; + else + return CONNECTION_TYPE_UNDEFINED; +} + +/* Conversions to shield lib user from heterogeneity */ + +#define IS_VALID_LIST_CONNECTIONS_TYPE(x) ((x >= CONN_GRE) && (x <= CONN_HICN)) + +static const hc_connection_type_t map_from_list_connections_type[] = { + [CONN_GRE] = CONNECTION_TYPE_UNDEFINED, + [CONN_TCP] = CONNECTION_TYPE_TCP, + [CONN_UDP] = CONNECTION_TYPE_UDP, + [CONN_MULTICAST] = CONNECTION_TYPE_UNDEFINED, + [CONN_L2] = CONNECTION_TYPE_UNDEFINED, + [CONN_HICN] = CONNECTION_TYPE_HICN, +}; + +typedef enum { + ENCAP_TCP, + ENCAP_UDP, + ENCAP_ETHER, + ENCAP_LOCAL, + ENCAP_HICN +} EncapType; + +#define IS_VALID_LIST_LISTENERS_TYPE(x) ((x >= ENCAP_TCP) && (x <= ENCAP_HICN)) + +static const hc_connection_type_t map_from_encap_type[] = { + [ENCAP_TCP] = CONNECTION_TYPE_TCP, + [ENCAP_UDP] = CONNECTION_TYPE_UDP, + [ENCAP_ETHER] = CONNECTION_TYPE_UNDEFINED, + [ENCAP_LOCAL] = CONNECTION_TYPE_UNDEFINED, + [ENCAP_HICN] = CONNECTION_TYPE_HICN, +}; + +static const connection_type map_to_connection_type[] = { + [CONNECTION_TYPE_TCP] = TCP_CONN, + [CONNECTION_TYPE_UDP] = UDP_CONN, + [CONNECTION_TYPE_HICN] = HICN_CONN, +}; + +static const listener_mode map_to_listener_mode[] = { + [CONNECTION_TYPE_TCP] = IP_MODE, + [CONNECTION_TYPE_UDP] = IP_MODE, + [CONNECTION_TYPE_HICN] = HICN_MODE, +}; + +#define IS_VALID_LIST_CONNECTIONS_STATE(x) ((x >= IFACE_UP) && (x <= IFACE_UNKNOWN)) + +/* /!\ Please update constants in header file upon changes */ +const char * connection_state_str[] = { +#define _(x) [HC_CONNECTION_STATE_ ## x] = STRINGIZE(x), +foreach_connection_state +#undef _ +}; + +/* +#define IS_VALID_CONNECTION_STATE(x) IS_VALID_ENUM_TYPE(CONNECTION_STATE, x) + +static const connection_state map_to_connection_state[] = { + [HC_CONNECTION_STATE_UP] = IFACE_UP, + [HC_CONNECTION_STATE_DOWN] = IFACE_DOWN, +}; + +*/ + +static const hc_connection_state_t map_from_list_connections_state[] = { + [IFACE_UP] = HC_CONNECTION_STATE_UP, + [IFACE_DOWN] = HC_CONNECTION_STATE_DOWN, + [IFACE_UNKNOWN] = HC_CONNECTION_STATE_UNDEFINED, +}; + + +#define connection_state_to_face_state(x) ((face_state_t)x) +#define face_state_to_connection_state(x) ((hc_connection_state_t)x) + +#define IS_VALID_ADDR_TYPE(x) ((x >= ADDR_INET) && (x <= ADDR_UNIX)) + +static const int map_from_addr_type[] = { + [ADDR_INET] = AF_INET, + [ADDR_INET6] = AF_INET6, + [ADDR_LINK] = AF_UNSPEC, + [ADDR_IFACE] = AF_UNSPEC, + [ADDR_UNIX] = AF_UNSPEC, +}; + +static const address_type map_to_addr_type[] = { + [AF_INET] = ADDR_INET, + [AF_INET6] = ADDR_INET6, +}; + +/****************************************************************************** + * Message helper types and aliases + ******************************************************************************/ + +#define foreach_hc_command \ + _(add_connection) \ + _(remove_connection) \ + _(list_connections) \ + _(add_listener) \ + _(remove_listener) \ + _(list_listeners) \ + _(add_route) \ + _(remove_route) \ + _(list_routes) \ + _(cache_store) \ + _(cache_serve) \ + /*_(cache_clear) */ \ + _(set_strategy) \ + _(set_wldr) \ + _(add_punting) \ + _(mapme_activator) \ + _(mapme_timing) + +typedef header_control_message hc_msg_header_t; + +typedef union { +#define _(x) x ## _command x; + foreach_hc_command +#undef _ +} hc_msg_payload_t; + + +typedef struct hc_msg_s { + hc_msg_header_t hdr; + hc_msg_payload_t payload; +} hc_msg_t; + +/****************************************************************************** + * Control Data + ******************************************************************************/ + +hc_data_t * +hc_data_create(size_t in_element_size, size_t out_element_size) +{ + hc_data_t * data = malloc(sizeof(hc_data_t)); + if (!data) + goto ERR_MALLOC; + + /* FIXME Could be NULL thanks to realloc provided size is 0 */ + data->max_size_log = DEFAULT_SIZE_LOG; + data->in_element_size = in_element_size; + data->out_element_size = out_element_size; + data->size = 0; + data->complete = 0; + data->command_id = 0; // TODO this could also be a busy mark in the socket + /* No callback needed in blocking code for instance */ + data->complete_cb = NULL; + + data->buffer = malloc((1 << data->max_size_log) * data->out_element_size); + if (!data->buffer) + goto ERR_BUFFER; + + return data; + +ERR_BUFFER: + free(data); +ERR_MALLOC: + return NULL; +} + +void +hc_data_free(hc_data_t * data) +{ + if (data->buffer) + free(data->buffer); + free(data); +} + +int +hc_data_ensure_available(hc_data_t * data, size_t count) +{ + size_t new_size_log = (data->size + count - 1 > 0) + ? log2(data->size + count - 1) + 1 + : 0; + if (new_size_log > data->max_size_log) { + data->max_size_log = new_size_log; + data->buffer = realloc(data->buffer, (1 << new_size_log) * data->out_element_size); + if (!data->buffer) + return LIBHICNCTRL_FAILURE; + } + return LIBHICNCTRL_SUCCESS; +} + +int +hc_data_push_many(hc_data_t * data, const void * elements, size_t count) +{ + if (hc_data_ensure_available(data, count) < 0) + return LIBHICNCTRL_FAILURE; + + memcpy(data->buffer + data->size * data->out_element_size, elements, + count * data->out_element_size); + data->size += count; + return LIBHICNCTRL_SUCCESS; +} + +int +hc_data_push(hc_data_t * data, const void * element) +{ + return hc_data_push_many(data, element, 1); +} + +/** + * + * NOTE: This function make sure there is enough room available in the data + * structure. + */ +u8 * +hc_data_get_next(hc_data_t * data) +{ + if (hc_data_ensure_available(data, 1) < 0) + return NULL; + + return data->buffer + data->size * data->out_element_size; +} + +int +hc_data_set_callback(hc_data_t * data, data_callback_t cb, void * cb_data) +{ + data->complete_cb = cb; + data->complete_cb_data = cb_data; + return LIBHICNCTRL_SUCCESS; +} + +int +hc_data_set_complete(hc_data_t * data) +{ + data->complete = true; + if (data->complete_cb) + return data->complete_cb(data, data->complete_cb_data); + return LIBHICNCTRL_SUCCESS; +} + +int +hc_data_reset(hc_data_t * data) +{ + data->size = 0; + return LIBHICNCTRL_SUCCESS; +} + +/****************************************************************************** + * Control socket + ******************************************************************************/ + +/** + * \brief Parse a connection URL into a sockaddr + * \param [in] url - URL + * \param [out] sa - Resulting struct sockaddr, expected zero'ed. + * \return 0 if parsing succeeded, a negative error value otherwise. + */ +int +hc_sock_parse_url(const char * url, struct sockaddr * sa) +{ + /* FIXME URL parsing is currently not implemented */ + assert(!url); + + /* + * A temporary solution is to inspect the sa_family fields of the passed in + * sockaddr, which defaults to AF_UNSPEC (0) and thus creates an IPv4/TCP + * connection to localhost. + */ + switch (sa->sa_family) { + case AF_UNSPEC: + case AF_INET: + { + struct sockaddr_in * sai = (struct sockaddr_in *)sa; + sai->sin_family = AF_INET; + sai->sin_port = htons(PORT); + sai->sin_addr.s_addr = htonl(INADDR_LOOPBACK); + break; + } + case AF_INET6: + { + struct sockaddr_in6 * sai6 = (struct sockaddr_in6 *)sa; + sai6->sin6_family = AF_INET6; + sai6->sin6_port = htons(PORT); + sai6->sin6_addr = loopback_addr; + break; + } + default: + return LIBHICNCTRL_FAILURE; + } + + return LIBHICNCTRL_SUCCESS; +} + +hc_sock_t * +hc_sock_create_url(const char * url) +{ + hc_sock_t * s = malloc(sizeof(hc_sock_t)); + if (!s) + goto ERR_MALLOC; + + s->url = url ? strdup(url) : NULL; + + s->fd = socket(AF_INET, SOCK_STREAM, 0); + if (s->fd < 0) + goto ERR_SOCKET; + + if (hc_sock_reset(s) < 0) + goto ERR_RESET; + + return s; + +ERR_RESET: + close(s->fd); +ERR_SOCKET: + free(s); +ERR_MALLOC: + return NULL; +} + +hc_sock_t * +hc_sock_create(void) +{ + return hc_sock_create_url(NULL); +} + +void +hc_sock_free(hc_sock_t * s) +{ + if (s->url) + free(s->url); + close(s->fd); + free(s); +} + +int +hc_sock_set_nonblocking(hc_sock_t *s) +{ + return (fcntl(s->fd, F_SETFL, fcntl(s->fd, F_GETFL) | O_NONBLOCK) < 0); +} + +int +hc_sock_connect(hc_sock_t *s) +{ + struct sockaddr_storage ss = { 0 }; + + if (hc_sock_parse_url(s->url, (struct sockaddr *)&ss) < 0) + goto ERR_PARSE; + + size_t size = ss.ss_family == AF_INET + ? sizeof(struct sockaddr_in) + : sizeof(struct sockaddr_in6); + if (connect(s->fd, (struct sockaddr *)&ss, size) < 0) //sizeof(struct sockaddr)) < 0) + goto ERR_CONNECT; + + return LIBHICNCTRL_SUCCESS; + +ERR_CONNECT: +ERR_PARSE: + return LIBHICNCTRL_FAILURE; +} + +int +hc_sock_send(hc_sock_t * s, hc_msg_t * msg, size_t msglen) +{ + return send(s->fd, msg, msglen, 0); +} + +int +hc_sock_get_available(hc_sock_t * s, u8 ** buffer, size_t * size) +{ + *buffer = s->buf + s->woff; + *size = RECV_BUFLEN - s->woff; + + return LIBHICNCTRL_SUCCESS; +} + +int +hc_sock_recv(hc_sock_t * s, hc_data_t * data) +{ + int rc; + + /* + * This condition should be ensured to guarantee correct processing of + * messages + */ + assert(RECV_BUFLEN - s->woff > MIN_BUFLEN); + + rc = recv(s->fd, s->buf + s->woff, RECV_BUFLEN - s->woff, 0); + if (rc == 0) { + return LIBHICNCTRL_FAILURE; + /* Connection has been closed */ + // XXX + } + if (rc < 0) { + /* Error occurred */ + // XXX check for EWOULDBLOCK; + // XXX + return LIBHICNCTRL_FAILURE; + } + s->woff += rc; + return LIBHICNCTRL_SUCCESS; +} + +int +hc_sock_process(hc_sock_t * s, hc_data_t * data, + int (*parse)(const u8 * src, u8 * dst)) +{ + int err = 0; + + /* We must have received at least one byte */ + size_t available = s->woff - s->roff; + + while(available > 0) { + + if (s->remaining == 0) { + hc_msg_t * msg = (hc_msg_t*)(s->buf + s->roff); + + /* We expect a message header */ + if (available < sizeof(hc_msg_header_t)) + break; + + /* Sanity checks (might instead raise warnings) */ + // TODO: sync check ? + assert((msg->hdr.messageType == RESPONSE_LIGHT) || + (msg->hdr.messageType == ACK_LIGHT) || + (msg->hdr.messageType == NACK_LIGHT)); + //assert(msg->hdr.commandID == data->command_id); // FIXME + assert(msg->hdr.seqNum == s->recv_seq++); + + s->remaining = msg->hdr.length; + if (s->remaining == 0) { + /* + * The protocol expects all sequence number to be reset after + * each transaction. We reset before running the callback in + * case it triggers new exchanges. + */ + s->send_seq = HICN_CTRL_SEND_SEQ_INIT; + s->recv_seq = HICN_CTRL_RECV_SEQ_INIT; + + // TODO : check before even sending ? + /* Complete message without payload */ + // TODO : is this correct ? no error code ? + hc_data_set_complete(data); + } + + available -= sizeof(hc_msg_header_t); + s->roff += sizeof(hc_msg_header_t); + } else { + /* We expect the complete payload, or at least a chunk of it */ + size_t num_chunks = available / data->in_element_size; + if (num_chunks == 0) + break; + if (num_chunks > s->remaining) + num_chunks = s->remaining; + + if (!parse) { + hc_data_push_many(data, s->buf + s->roff, num_chunks); + } else { + int rc; + rc = hc_data_ensure_available(data, num_chunks); + if (rc < 0) + return LIBHICNCTRL_FAILURE; + for (int i = 0; i < num_chunks; i++) { + u8 * dst = hc_data_get_next(data); + if (!dst) + return LIBHICNCTRL_FAILURE; + + rc = parse(s->buf + s->roff + i * data->in_element_size, dst); + if (rc < 0) + err = -1; /* FIXME we let the loop complete (?) */ + data->size++; + } + } + + + s->remaining -= num_chunks; + if (s->remaining == 0) { + /* + * The protocol expects all sequence number to be reset after + * each transaction. We reset before running the callback in + * case it triggers new exchanges. + */ + s->send_seq = HICN_CTRL_SEND_SEQ_INIT; + s->recv_seq = HICN_CTRL_RECV_SEQ_INIT; + + hc_data_set_complete(data); + } + + available -= num_chunks * data->in_element_size; + s->roff += num_chunks * data->in_element_size; + } + } + + /* Make sure there is enough remaining space in the buffer */ + if (RECV_BUFLEN - s->woff < AVG_BUFLEN) { + /* + * There should be no overlap provided a sufficiently large BUFLEN, but + * who knows. + */ + memmove(s->buf, s->buf + s->roff, s->woff - s->roff); + s->woff -= s->roff; + s->roff = 0; + } + + return err; +} + +int +hc_sock_reset(hc_sock_t * s) +{ + s->roff = s->woff = 0; + s->send_seq = HICN_CTRL_SEND_SEQ_INIT; + s->recv_seq = HICN_CTRL_RECV_SEQ_INIT; + s->remaining = 0; + return LIBHICNCTRL_SUCCESS; +} + +/****************************************************************************** + * Command-specific structures and functions + ******************************************************************************/ + +typedef int (*HC_PARSE)(const u8 *, u8 *); + +typedef struct { + hc_action_t cmd; + command_id cmd_id; + size_t size_in; + size_t size_out; + HC_PARSE parse; +} hc_command_params_t; + +int +hc_execute_command(hc_sock_t * s, hc_msg_t * msg, size_t msg_len, + hc_command_params_t * params, hc_data_t ** pdata) +{ + /* Sanity check */ + switch(params->cmd) { + case ACTION_CREATE: + assert(params->size_in != 0); /* payload repeated */ + assert(params->size_out == 0); + assert(params->parse == NULL); + break; + case ACTION_DELETE: + assert(params->size_in != 0); /* payload repeated */ + assert(params->size_out == 0); + assert(params->parse == NULL); + break; + case ACTION_LIST: + assert(params->size_in != 0); + assert(params->size_out != 0); + assert(params->parse != NULL); + break; + case ACTION_SET: + assert(params->size_in != 0); + assert(params->size_out == 0); + assert(params->parse == NULL); + break; + default: + return LIBHICNCTRL_FAILURE; + } + + hc_sock_reset(s); + + /* XXX data will at least store the result (complete) */ + hc_data_t * data = hc_data_create(params->size_in, params->size_out); + if (!data) + goto ERR_DATA; + + hc_sock_send(s, msg, msg_len); + while(!data->complete) { + if (hc_sock_recv(s, data) < 0) + break; + if (hc_sock_process(s, data, params->parse) < 0) { + goto ERR_PROCESS; + } + } + + if (pdata) + *pdata = data; + + return LIBHICNCTRL_SUCCESS; + +ERR_PROCESS: + free(data); +ERR_DATA: + return LIBHICNCTRL_FAILURE; +} + +/* /!\ Please update constants in header file upon changes */ +int +hc_url_snprintf(char * s, size_t size, int family, + const ip_address_t * ip_address, u16 port) +{ + char * cur = s; + int rc; + + /* Other address are currently not supported */ + if (!IS_VALID_FAMILY(family)) { + ERROR("Invalid family %d for IP address", family); + return -1; + } + + rc = snprintf(cur, s + size - cur, "inet%c://", + (family == AF_INET) ? '4' : '6'); + if (rc < 0) + return rc; + cur += rc; + if (size != 0 && cur >= s + size) + return cur - s; + + rc = ip_address_snprintf(cur, s + size - cur, ip_address, family); + if (rc < 0) + return rc; + cur += rc; + if (size != 0 && cur >= s + size) + return cur - s; + + rc = snprintf(cur, s + size - cur, ":"); + if (rc < 0) + return rc; + cur += rc; + if (size != 0 && cur >= s + size) + return cur - s; + + rc = snprintf(cur, s + size - cur, "%d", port); + if (rc < 0) + return rc; + cur += rc; + if (size != 0 && cur >= s + size) + return cur - s; + + return cur - s; +} + +/*----------------------------------------------------------------------------* + * Listeners + *----------------------------------------------------------------------------*/ + +/* LISTENER CREATE */ + +int +hc_listener_create(hc_sock_t * s, hc_listener_t * listener) +{ + if (!IS_VALID_FAMILY(listener->family)) + return LIBHICNCTRL_FAILURE; + + if (!IS_VALID_CONNECTION_TYPE(listener->type)) + return LIBHICNCTRL_FAILURE; + + struct { + header_control_message hdr; + add_listener_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = ADD_LISTENER, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + .address = { + .ipv6 = listener->local_addr.v6.as_in6addr, + }, + .port = htons(listener->local_port), + .addressType = (u8)map_to_addr_type[listener->family], + .listenerMode = (u8)map_to_listener_mode[listener->type], + .connectionType = (u8)map_to_connection_type[listener->type], + } + }; + + snprintf(msg.payload.symbolic, NAME_LEN, "%s", listener->name); +#ifdef __linux__ + snprintf(msg.payload.interfaceName, INTERFACE_LEN, "%s", listener->interface_name); +#endif + + hc_command_params_t params = { + .cmd = ACTION_CREATE, + .cmd_id = ADD_LISTENER, + .size_in = sizeof(add_listener_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/* LISTENER GET */ + +int +hc_listener_get(hc_sock_t *s, hc_listener_t * listener, + hc_listener_t ** listener_found) +{ + hc_data_t * listeners; + + if (hc_listener_list(s, &listeners) < 0) + return LIBHICNCTRL_FAILURE; + + /* Test */ + if (hc_listener_find(listeners, listener, listener_found) < 0) + return LIBHICNCTRL_FAILURE; + + hc_data_free(listeners); + + return LIBHICNCTRL_SUCCESS; +} + + +/* LISTENER DELETE */ + +int +hc_listener_delete(hc_sock_t * s, hc_listener_t * listener) +{ + struct { + header_control_message hdr; + remove_listener_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = REMOVE_LISTENER, + .length = 1, + .seqNum = s->send_seq, + }, + }; + + if (listener->id) { + printf("Delete by ID\n"); + snprintf(msg.payload.symbolicOrListenerid, NAME_LEN, "%d", listener->id); + } else if (*listener->name) { + printf("Delete by name %s\n", listener->name); + snprintf(msg.payload.symbolicOrListenerid, NAME_LEN, "%s", listener->name); + } else { + printf("Delete after search\n"); + hc_listener_t * listener_found; + if (hc_listener_get(s, listener, &listener_found) < 0) + return LIBHICNCTRL_FAILURE; + if (!listener_found) + return LIBHICNCTRL_FAILURE; + printf("Delete listener ID=%d\n", listener_found->id); + snprintf(msg.payload.symbolicOrListenerid, NAME_LEN, "%d", listener_found->id); + } + + hc_command_params_t params = { + .cmd = ACTION_DELETE, + .cmd_id = REMOVE_LISTENER, + .size_in = sizeof(remove_listener_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/* LISTENER LIST */ + +int +hc_listener_list(hc_sock_t * s, hc_data_t ** pdata) +{ + struct { + header_control_message hdr; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = LIST_LISTENERS, + .length = 0, + .seqNum = s->send_seq, + }, + }; + + hc_command_params_t params = { + .cmd = ACTION_LIST, + .cmd_id = LIST_LISTENERS, + .size_in = sizeof(list_listeners_command), + .size_out = sizeof(hc_listener_t), + .parse = (HC_PARSE)hc_listener_parse, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, pdata); +} + +/* LISTENER VALIDATE */ + +int +hc_listener_validate(const hc_listener_t * listener) +{ + if (!IS_VALID_FAMILY(listener->family)) + return LIBHICNCTRL_FAILURE; + + if (!IS_VALID_CONNECTION_TYPE(listener->type)) + return LIBHICNCTRL_FAILURE; + + return LIBHICNCTRL_SUCCESS; +} + +/* LISTENER CMP */ + +int +hc_listener_cmp(const hc_listener_t * l1, const hc_listener_t * l2) +{ + return ((l1->type == l2->type) && + (l1->family == l2->family) && + (ip_address_cmp(&l1->local_addr, &l2->local_addr, l1->family) == 0) && + (l1->local_port == l2->local_port)) + ? LIBHICNCTRL_SUCCESS + : LIBHICNCTRL_FAILURE; +} + +/* LISTENER PARSE */ + +int +hc_listener_parse(void * in, hc_listener_t * listener) +{ + list_listeners_command * cmd = (list_listeners_command *)in; + + if (!IS_VALID_LIST_LISTENERS_TYPE(cmd->encapType)) + return LIBHICNCTRL_FAILURE; + + hc_connection_type_t type = map_from_encap_type[cmd->encapType]; + if (type == CONNECTION_TYPE_UNDEFINED) + return LIBHICNCTRL_FAILURE; + + if (!IS_VALID_ADDR_TYPE(cmd->addressType)) + return LIBHICNCTRL_FAILURE; + + int family = map_from_addr_type[cmd->addressType]; + if (!IS_VALID_FAMILY(family)) + return LIBHICNCTRL_FAILURE; + + *listener = (hc_listener_t) { + .id = cmd->connid, + .type = type, + .family = family, + .local_addr = UNION_CAST(cmd->address, ip_address_t), + .local_port = ntohs(cmd->port), + }; + memset(listener->name, 0, NAME_LEN); + return LIBHICNCTRL_SUCCESS; +} + +GENERATE_FIND(listener) + +/* LISTENER SNPRINTF */ + +/* /!\ Please update constants in header file upon changes */ +int +hc_listener_snprintf(char * s, size_t size, hc_listener_t * listener) +{ + char local[MAXSZ_HC_URL]; + int rc; + rc = hc_url_snprintf(local, MAXSZ_HC_URL, + listener->family, &listener->local_addr, listener->local_port); + if (rc < 0) + return rc; + + return snprintf(s, size+17, "%s %s", + local, + connection_type_str[listener->type]); +} + +/*----------------------------------------------------------------------------* + * CONNECTION + *----------------------------------------------------------------------------*/ + +/* CONNECTION CREATE */ + +int +hc_connection_create(hc_sock_t * s, hc_connection_t * connection) +{ + if (hc_connection_validate(connection) < 0) + return LIBHICNCTRL_FAILURE; + + struct { + header_control_message hdr; + add_connection_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = ADD_CONNECTION, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + /* we use IPv6 which is the longest address */ + .remoteIp.ipv6 = connection->remote_addr.v6.as_in6addr, + .localIp.ipv6 = connection->local_addr.v6.as_in6addr, + .remotePort = htons(connection->remote_port), + .localPort = htons(connection->local_port), + .ipType = (u8)map_to_addr_type[connection->family], + .admin_state = connection->admin_state, +#ifdef WITH_POLICY + .tags = connection->tags, +#endif /* WITH_POLICY */ + .connectionType = (u8)map_to_connection_type[connection->type], + } + }; + snprintf(msg.payload.symbolic, NAME_LEN, "%s", connection->name); + + hc_command_params_t params = { + .cmd = ACTION_CREATE, + .cmd_id = ADD_CONNECTION, + .size_in = sizeof(add_connection_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/* CONNECTION GET */ + +int +hc_connection_get(hc_sock_t *s, hc_connection_t * connection, + hc_connection_t ** connection_found) +{ + hc_data_t * connections; + + if (hc_connection_list(s, &connections) < 0) + return LIBHICNCTRL_FAILURE; + + /* Test */ + if (hc_connection_find(connections, connection, connection_found) < 0) + return LIBHICNCTRL_FAILURE; + + hc_data_free(connections); + + return LIBHICNCTRL_SUCCESS; +} + + +/* CONNECTION DELETE */ + +int +hc_connection_delete(hc_sock_t * s, hc_connection_t * connection) +{ + struct { + header_control_message hdr; + remove_connection_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = REMOVE_CONNECTION, + .length = 1, + .seqNum = s->send_seq, + }, + }; + + if (connection->id) { + printf("Delete by ID\n"); + snprintf(msg.payload.symbolicOrConnid, NAME_LEN, "%d", connection->id); + } else if (*connection->name) { + printf("Delete by name %s\n", connection->name); + snprintf(msg.payload.symbolicOrConnid, NAME_LEN, "%s", connection->name); + } else { + printf("Delete after search\n"); + hc_connection_t * connection_found; + if (hc_connection_get(s, connection, &connection_found) < 0) + return LIBHICNCTRL_FAILURE; + if (!connection_found) + return LIBHICNCTRL_FAILURE; + printf("Delete connection ID=%d\n", connection_found->id); + snprintf(msg.payload.symbolicOrConnid, NAME_LEN, "%d", connection_found->id); + } + + hc_command_params_t params = { + .cmd = ACTION_DELETE, + .cmd_id = REMOVE_CONNECTION, + .size_in = sizeof(remove_connection_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + + +/* CONNECTION LIST */ + +int +hc_connection_list(hc_sock_t * s, hc_data_t ** pdata) +{ + struct { + header_control_message hdr; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = LIST_CONNECTIONS, + .length = 0, + .seqNum = s->send_seq, + }, + }; + + hc_command_params_t params = { + .cmd = ACTION_LIST, + .cmd_id = LIST_CONNECTIONS, + .size_in = sizeof(list_connections_command), + .size_out = sizeof(hc_connection_t), + .parse = (HC_PARSE)hc_connection_parse, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, pdata); +} + +/* CONNECTION VALIDATE */ + +int +hc_connection_validate(const hc_connection_t * connection) +{ + if (!IS_VALID_FAMILY(connection->family)) + return LIBHICNCTRL_FAILURE; + + if (!IS_VALID_CONNECTION_TYPE(connection->type)) + return LIBHICNCTRL_FAILURE; + + /* TODO assert both local and remote have the right family */ + + return LIBHICNCTRL_SUCCESS; +} + +/* CONNECTION CMP */ + +/* + * hICN light uses ports even for hICN connections, but their value is ignored. + * As connections are specific to hicn-light, we can safely use IP and ports for + * comparison independently of the face type. + */ +int hc_connection_cmp(const hc_connection_t * c1, const hc_connection_t * c2) +{ + return ((c1->type == c2->type) && + (c1->family == c2->family) && + (ip_address_cmp(&c1->local_addr, &c2->local_addr, c1->family) == 0) && + (c1->local_port == c2->local_port) && + (ip_address_cmp(&c1->remote_addr, &c2->remote_addr, c1->family) == 0) && + (c1->remote_port == c2->remote_port)) + ? LIBHICNCTRL_SUCCESS + : LIBHICNCTRL_FAILURE; +} + +/* CONNECTION PARSE */ + +int +hc_connection_parse(void * in, hc_connection_t * connection) +{ + list_connections_command * cmd = (list_connections_command *)in; + + if (!IS_VALID_LIST_CONNECTIONS_TYPE(cmd->connectionData.connectionType)) + return LIBHICNCTRL_FAILURE; + + hc_connection_type_t type = map_from_list_connections_type[cmd->connectionData.connectionType]; + if (type == CONNECTION_TYPE_UNDEFINED) + return LIBHICNCTRL_FAILURE; + + if (!IS_VALID_LIST_CONNECTIONS_STATE(cmd->state)) + return LIBHICNCTRL_FAILURE; + + hc_connection_state_t state = map_from_list_connections_state[cmd->state]; + if (state == HC_CONNECTION_STATE_UNDEFINED) + return LIBHICNCTRL_FAILURE; + + if (!IS_VALID_ADDR_TYPE(cmd->connectionData.ipType)) + return LIBHICNCTRL_FAILURE; + + int family = map_from_addr_type[cmd->connectionData.ipType]; + if (!IS_VALID_FAMILY(family)) + return LIBHICNCTRL_FAILURE; + + *connection = (hc_connection_t) { + .id = cmd->connid, + .type = type, + .family = family, + .local_addr = UNION_CAST(cmd->connectionData.localIp, ip_address_t), + .local_port = ntohs(cmd->connectionData.localPort), + .remote_addr = UNION_CAST(cmd->connectionData.remoteIp, ip_address_t), + .remote_port = ntohs(cmd->connectionData.remotePort), + .admin_state = cmd->connectionData.admin_state, +#ifdef WITH_POLICY + .tags = cmd->connectionData.tags, +#endif /* WITH_POLICY */ + .state = state, + }; + snprintf(connection->name, NAME_LEN, "%s", cmd->connectionData.symbolic); + return LIBHICNCTRL_SUCCESS; +} + +GENERATE_FIND(connection) + +/* CONNECTION SNPRINTF */ + +/* /!\ Please update constants in header file upon changes */ +int +hc_connection_snprintf(char * s, size_t size, const hc_connection_t * connection) +{ + char local[MAXSZ_HC_URL]; + char remote[MAXSZ_HC_URL]; + int rc; + + // assert(connection->connection_state) + + rc = hc_url_snprintf(local, MAXSZ_HC_URL, connection->family, + &connection->local_addr, connection->local_port); + if (rc < 0) + return rc; + rc = hc_url_snprintf(remote, MAXSZ_HC_URL, connection->family, + &connection->remote_addr, connection->remote_port); + if (rc < 0) + return rc; + + return snprintf(s, size, "%s %s %s %s", + connection_state_str[connection->state], + local, + remote, + connection_type_str[connection->type]); +} + +/* CONNECTION SET ADMIN STATE */ + +int +hc_connection_set_admin_state(hc_sock_t * s, const char * conn_id_or_name, + hc_connection_state_t admin_state) +{ + struct { + header_control_message hdr; + connection_set_admin_state_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = CONNECTION_SET_ADMIN_STATE, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + .admin_state = admin_state, + }, + }; + snprintf(msg.payload.symbolicOrConnid, NAME_LEN, "%s", conn_id_or_name); + + hc_command_params_t params = { + .cmd = ACTION_SET, + .cmd_id = CONNECTION_SET_ADMIN_STATE, + .size_in = sizeof(connection_set_admin_state_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/*----------------------------------------------------------------------------* + * Routes + *----------------------------------------------------------------------------*/ + +/* ROUTE CREATE */ + +int +hc_route_create(hc_sock_t * s, hc_route_t * route) +{ + if (!IS_VALID_FAMILY(route->family)) + return LIBHICNCTRL_FAILURE; + + struct { + header_control_message hdr; + add_route_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = ADD_ROUTE, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + /* we use IPv6 which is the longest address */ + .address.ipv6 = route->remote_addr.v6.as_in6addr, + .cost = route->cost, + .addressType = (u8)map_to_addr_type[route->family], + .len = route->len, + } + }; + + /* + * The route commands expects the ID (or name that we don't use) as part of + * the symbolicOrConnid attribute. + */ + snprintf(msg.payload.symbolicOrConnid, NAME_LEN, "%d", route->face_id); + + hc_command_params_t params = { + .cmd = ACTION_CREATE, + .cmd_id = ADD_ROUTE, + .size_in = sizeof(add_route_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/* ROUTE DELETE */ + +int +hc_route_delete(hc_sock_t * s, hc_route_t * route) +{ + if (!IS_VALID_FAMILY(route->family)) + return LIBHICNCTRL_FAILURE; + + struct { + header_control_message hdr; + remove_route_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = REMOVE_ROUTE, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + /* we use IPv6 which is the longest address */ + .address.ipv6 = route->remote_addr.v6.as_in6addr, + .addressType = (u8)map_to_addr_type[route->family], + .len = route->len, + } + }; + + hc_command_params_t params = { + .cmd = ACTION_DELETE, + .cmd_id = REMOVE_ROUTE, + .size_in = sizeof(remove_route_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/* ROUTE LIST */ + +int +hc_route_list(hc_sock_t * s, hc_data_t ** pdata) +{ + struct { + header_control_message hdr; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = LIST_ROUTES, + .length = 0, + .seqNum = s->send_seq, + }, + }; + + hc_command_params_t params = { + .cmd = ACTION_LIST, + .cmd_id = LIST_ROUTES, + .size_in = sizeof(list_routes_command), + .size_out = sizeof(hc_route_t), + .parse = (HC_PARSE)hc_route_parse, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, pdata); +} + +/* ROUTE PARSE */ + +int +hc_route_parse(void * in, hc_route_t * route) +{ + list_routes_command * cmd = (list_routes_command *) in; + + if (!IS_VALID_ADDR_TYPE(cmd->addressType)) + return LIBHICNCTRL_FAILURE; + + int family = map_from_addr_type[cmd->addressType]; + if (!IS_VALID_FAMILY(family)) + return LIBHICNCTRL_FAILURE; + + *route = (hc_route_t) { + .face_id = cmd->connid, + .family = family, + .remote_addr = UNION_CAST(cmd->address, ip_address_t), + .len = cmd->len, + .cost = cmd->cost, + }; + return LIBHICNCTRL_SUCCESS; +} + +/* ROUTE SNPRINTF */ + +/* /!\ Please update constants in header file upon changes */ +int +hc_route_snprintf(char * s, size_t size, hc_route_t * route) +{ + /* interface cost prefix length */ + + char prefix[MAXSZ_IP_ADDRESS]; + int rc; + + rc = ip_address_snprintf(prefix, MAXSZ_IP_ADDRESS, &route->remote_addr, + route->family); + if (rc < 0) + return rc; + + return snprintf(s, size, "%*d %*d %s %*d", + MAXSZ_FACE_ID, + route->face_id, + MAXSZ_COST, + route->cost, + prefix, + MAXSZ_LEN, + route->len); +} + +/*----------------------------------------------------------------------------* + * Face + * + * Face support is not directly available in hicn-light, but we can offer such + * an interface through a combination of listeners and connections. The code + * starts with some conversion functions between faces/listeners/connections. + * + * We also need to make sure that there always exist a (single) listener when a + * connection is created, and in the hICN face case, that there is a single + * connection attached to this listener. + * + *----------------------------------------------------------------------------*/ + +/* FACE -> LISTENER */ + +int +hc_face_to_listener(const hc_face_t * face, hc_listener_t * listener) +{ + const face_t * f = &face->face; + + switch(f->type) { + case FACE_TYPE_HICN_LISTENER: + break; + case FACE_TYPE_TCP_LISTENER: + break; + case FACE_TYPE_UDP_LISTENER: + break; + default: + return LIBHICNCTRL_FAILURE; + } + return LIBHICNCTRL_FAILURE; /* XXX Not implemented */ +} + +/* LISTENER -> FACE */ + +int +hc_listener_to_face(const hc_listener_t * listener, hc_face_t * face) +{ + return LIBHICNCTRL_FAILURE; /* XXX Not implemented */ +} + +/* FACE -> CONNECTION */ + +int +hc_face_to_connection(const hc_face_t * face, hc_connection_t * connection, bool generate_name) +{ + const face_t * f = &face->face; + + switch(f->type) { + case FACE_TYPE_HICN: + /* FIXME truncations, collisions, ... */ + *connection = (hc_connection_t) { + .type = CONNECTION_TYPE_HICN, + .family = f->params.hicn.family, + .local_addr = f->params.hicn.local_addr, + .local_port = 0, + .remote_addr = f->params.hicn.remote_addr, + .remote_port = 0, + .admin_state = face_state_to_connection_state(f->admin_state), + .state = face_state_to_connection_state(f->state), +#ifdef WITH_POLICY + .tags = f->tags, +#endif /* WITH_POLICY */ + }; + snprintf(connection->name, NAME_LEN, "%s", + f->params.hicn.netdevice.name); + break; + case FACE_TYPE_TCP: + *connection = (hc_connection_t) { + .type = CONNECTION_TYPE_TCP, + .family = f->params.hicn.family, + .local_addr = f->params.tunnel.local_addr, + .local_port = f->params.tunnel.local_port, + .remote_addr = f->params.tunnel.remote_addr, + .remote_port = f->params.tunnel.remote_port, + .admin_state = face_state_to_connection_state(f->admin_state), + .state = face_state_to_connection_state(f->state), +#ifdef WITH_POLICY + .tags = f->tags, +#endif /* WITH_POLICY */ + }; + if (generate_name) { +#ifdef __APPLE__ + snprintf(connection->name, NAME_LEN, "tcp%d", arc4random() & 0xFF); +#else + snprintf(connection->name, NAME_LEN, "tcp%ld", random() & 0xFF); +#endif + } else { + memset(connection->name, 0, NAME_LEN); + } + break; + case FACE_TYPE_UDP: + *connection = (hc_connection_t) { + .type = CONNECTION_TYPE_UDP, + .family = AF_INET, + .local_addr = f->params.tunnel.local_addr, + .local_port = f->params.tunnel.local_port, + .remote_addr = f->params.tunnel.remote_addr, + .remote_port = f->params.tunnel.remote_port, + .admin_state = face_state_to_connection_state(f->admin_state), + .state = face_state_to_connection_state(f->state), +#ifdef WITH_POLICY + .tags = f->tags, +#endif /* WITH_POLICY */ + }; + if (generate_name) { +#ifdef __APPLE__ + snprintf(connection->name, NAME_LEN, "udp%d", arc4random() & 0xFF); +#else + snprintf(connection->name, NAME_LEN, "udp%ld", random() & 0xFF); +#endif + } else { + memset(connection->name, 0, NAME_LEN); + } + break; + default: + return LIBHICNCTRL_FAILURE; + } + + return LIBHICNCTRL_SUCCESS; +} + +/* CONNECTION -> FACE */ + +int +hc_connection_to_face(const hc_connection_t * connection, hc_face_t * face) +{ + switch (connection->type) { + case CONNECTION_TYPE_TCP: + *face = (hc_face_t) { + .id = connection->id, + .face = { + .type = FACE_TYPE_TCP, + .params.tunnel = { + .family = connection->family, + .local_addr = connection->local_addr, + .local_port = connection->local_port, + .remote_addr = connection->remote_addr, + .remote_port = connection->remote_port, + }, + .admin_state = connection_state_to_face_state(connection->admin_state), + .state = connection_state_to_face_state(connection->state), +#ifdef WITH_POLICY + .tags = connection->tags, +#endif /* WITH_POLICY */ + }, + }; + break; + case CONNECTION_TYPE_UDP: + *face = (hc_face_t) { + .id = connection->id, + .face = { + .type = FACE_TYPE_UDP, + .params.tunnel = { + .family = connection->family, + .local_addr = connection->local_addr, + .local_port = connection->local_port, + .remote_addr = connection->remote_addr, + .remote_port = connection->remote_port, + }, + .admin_state = connection_state_to_face_state(connection->admin_state), + .state = connection_state_to_face_state(connection->state), +#ifdef WITH_POLICY + .tags = connection->tags, +#endif /* WITH_POLICY */ + }, + }; + break; + case CONNECTION_TYPE_HICN: + *face = (hc_face_t) { + .id = connection->id, + .face = { + .type = FACE_TYPE_HICN, + .params.hicn = { + .family = connection->family, + .netdevice.index = NETDEVICE_UNDEFINED_INDEX, // XXX + .local_addr = connection->local_addr, + .remote_addr = connection->remote_addr, + }, + .admin_state = connection_state_to_face_state(connection->admin_state), + .state = connection_state_to_face_state(connection->state), +#ifdef WITH_POLICY + .tags = connection->tags, +#endif /* WITH_POLICY */ + }, + }; + break; + default: + return LIBHICNCTRL_FAILURE; + } + snprintf(face->name, NAME_LEN, "%s", connection->name); + return LIBHICNCTRL_SUCCESS; +} + +/* CONNECTION -> LISTENER */ + +int +hc_connection_to_local_listener(const hc_connection_t * connection, hc_listener_t * listener) +{ + *listener = (hc_listener_t) { + .id = ~0, + .type = connection->type, + .family = connection->family, + .local_addr = connection->local_addr, + .local_port = connection->local_port, + }; + return LIBHICNCTRL_SUCCESS; +} + +/* FACE CREATE */ + +int +hc_face_create(hc_sock_t * s, hc_face_t * face) +{ + hc_listener_t listener; + hc_listener_t * listener_found; + + hc_connection_t connection; + hc_connection_t * connection_found; + + switch(face->face.type) + { + case FACE_TYPE_HICN: + case FACE_TYPE_TCP: + case FACE_TYPE_UDP: + if (hc_face_to_connection(face, &connection, true) < 0) { + ERROR("[hc_face_create] Could not convert face to connection."); + return LIBHICNCTRL_FAILURE; + } + + /* Ensure we have a corresponding local listener */ + if (hc_connection_to_local_listener(&connection, &listener) < 0) { + ERROR("[hc_face_create] Could not convert face to local listener."); + return LIBHICNCTRL_FAILURE; + } + + if (hc_listener_get(s, &listener, &listener_found) < 0) { + ERROR("[hc_face_create] Could not retrieve listener"); + return LIBHICNCTRL_FAILURE; + } + + if (!listener_found) { + /* We need to create the listener if it does not exist */ + if (hc_listener_create(s, &listener) < 0) { + ERROR("[hc_face_create] Could not create listener."); + return LIBHICNCTRL_FAILURE; + } + } + + /* Create corresponding connection */ + if (hc_connection_create(s, &connection) < 0) { + ERROR("[hc_face_create] Could not create connection."); + return LIBHICNCTRL_FAILURE; + } + + /* + * Once the connection is created, we need to list all connections + * and compare with the current one to find the created face ID. + */ + if (hc_connection_get(s, &connection, &connection_found) < 0) { + ERROR("[hc_face_create] Could not retrieve connection"); + return LIBHICNCTRL_FAILURE; + } + + if (!connection_found) { + ERROR("[hc_face_create] Could not find newly created connection."); + return LIBHICNCTRL_FAILURE; + } + + face->id = connection_found->id; + + break; + + case FACE_TYPE_HICN_LISTENER: + case FACE_TYPE_TCP_LISTENER: + case FACE_TYPE_UDP_LISTENER: + if (hc_face_to_listener(face, &listener) < 0) { + ERROR("Could not convert face to listener."); + return LIBHICNCTRL_FAILURE; + } + if (hc_listener_create(s, &listener) < 0) { + ERROR("[hc_face_create] Could not create listener."); + return LIBHICNCTRL_FAILURE; + } + return LIBHICNCTRL_FAILURE; + break; + default: + ERROR("[hc_face_create] Unknwon face type."); + return LIBHICNCTRL_FAILURE; + }; + + return LIBHICNCTRL_SUCCESS; +} + +int +hc_face_get(hc_sock_t * s, hc_face_t * face, hc_face_t ** face_found) +{ + hc_listener_t listener; + hc_listener_t * listener_found; + + hc_connection_t connection; + hc_connection_t * connection_found; + + switch(face->face.type) + { + case FACE_TYPE_HICN: + case FACE_TYPE_TCP: + case FACE_TYPE_UDP: + if (hc_face_to_connection(face, &connection, false) < 0) + return LIBHICNCTRL_FAILURE; + if (hc_connection_get(s, &connection, &connection_found) < 0) + return LIBHICNCTRL_FAILURE; + if (!connection_found) { + *face_found = NULL; + return LIBHICNCTRL_SUCCESS; + } + hc_connection_to_face(connection_found, *face_found); + break; + + case FACE_TYPE_HICN_LISTENER: + case FACE_TYPE_TCP_LISTENER: + case FACE_TYPE_UDP_LISTENER: + if (hc_face_to_listener(face, &listener) < 0) + return LIBHICNCTRL_FAILURE; + if (hc_listener_get(s, &listener, &listener_found) < 0) + return LIBHICNCTRL_FAILURE; + if (!listener_found) { + *face_found = NULL; + return LIBHICNCTRL_SUCCESS; + } + hc_listener_to_face(listener_found, *face_found); + break; + + default: + return LIBHICNCTRL_FAILURE; + } + + return LIBHICNCTRL_SUCCESS; + +} + +/* FACE DELETE */ + +int +hc_face_delete(hc_sock_t * s, hc_face_t * face) +{ + /* XXX We currently do not delete the listener */ + hc_connection_t connection; + if (hc_face_to_connection(face, &connection, false) < 0) { + ERROR("[hc_face_delete] Could not convert face to connection."); + return LIBHICNCTRL_FAILURE; + } + return hc_connection_delete(s, &connection); +} + +/* FACE LIST */ + +int +hc_face_list(hc_sock_t * s, hc_data_t ** pdata) +{ + hc_data_t * connection_data; + hc_face_t face; + + if (hc_connection_list(s, &connection_data) < 0) { + ERROR("[hc_face_list] Could not list connections."); + return LIBHICNCTRL_FAILURE; + } + + hc_data_t * face_data = hc_data_create(sizeof(hc_connection_t), sizeof(hc_face_t)); + foreach_connection(c, connection_data) { + if (hc_connection_to_face(c, &face) < 0) { + ERROR("[hc_face_list] Could not convert connection to face."); + goto ERR; + } + hc_data_push(face_data, &face); + } + + *pdata = face_data; + hc_data_free(connection_data); + return LIBHICNCTRL_SUCCESS; + +ERR: + hc_data_free(connection_data); + return LIBHICNCTRL_FAILURE; +} + +/* /!\ Please update constants in header file upon changes */ +int +hc_face_snprintf(char * s, size_t size, hc_face_t * face) +{ + return LIBHICNCTRL_SUCCESS; +} + +int +hc_face_set_admin_state(hc_sock_t * s, const char * conn_id_or_name, // XXX wrong identifier + face_state_t admin_state) +{ + return hc_connection_set_admin_state(s, conn_id_or_name, (hc_connection_state_t)admin_state); +} + +/*----------------------------------------------------------------------------* + * Punting + *----------------------------------------------------------------------------*/ + +int hc_punting_create(hc_sock_t * s, hc_punting_t * punting) +{ + if (hc_punting_validate(punting) < 0) + return LIBHICNCTRL_FAILURE; + + struct { + header_control_message hdr; + add_punting_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = ADD_PUNTING, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + /* we use IPv6 which is the longest address */ + .address.ipv6 = punting->prefix.v6.as_in6addr, + .addressType = (u8)map_to_addr_type[punting->family], + .len = punting->prefix_len, + } + }; + snprintf(msg.payload.symbolicOrConnid, NAME_LEN, "%d", punting->face_id); + + hc_command_params_t params = { + .cmd = ACTION_CREATE, + .cmd_id = ADD_PUNTING, + .size_in = sizeof(add_punting_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +int hc_punting_get(hc_sock_t * s, hc_punting_t * punting, hc_punting_t ** punting_found) +{ + return LIBHICNCTRL_NOT_IMPLEMENTED; +} + +int hc_punting_delete(hc_sock_t * s, hc_punting_t * punting) +{ + return LIBHICNCTRL_NOT_IMPLEMENTED; +} + +int hc_punting_list(hc_sock_t * s, hc_data_t ** pdata) +{ + return LIBHICNCTRL_NOT_IMPLEMENTED; +} + +int hc_punting_validate(const hc_punting_t * punting) +{ + if (!IS_VALID_FAMILY(punting->family)) + return LIBHICNCTRL_FAILURE; + + /* + * We might use the zero value to add punting on all faces but this is not + * (yet) implemented + */ + if (punting->face_id == 0) + return LIBHICNCTRL_NOT_IMPLEMENTED; + + return LIBHICNCTRL_SUCCESS; +} + +int hc_punting_cmp(const hc_punting_t * p1, const hc_punting_t * p2) +{ + return ((p1->face_id == p2->face_id) && + (p1->family == p2->family) && + (ip_address_cmp(&p1->prefix, &p2->prefix, p1->family) == 0) && + (p1->prefix_len == p2->prefix_len)) + ? LIBHICNCTRL_SUCCESS + : LIBHICNCTRL_FAILURE; +} + +int hc_punting_parse(void * in, hc_punting_t * punting) +{ + return LIBHICNCTRL_NOT_IMPLEMENTED; +} + +int hc_punting_snprintf(char * s, size_t size, hc_punting_t * punting) +{ + return LIBHICNCTRL_NOT_IMPLEMENTED; +} + + +/*----------------------------------------------------------------------------* + * Cache + *----------------------------------------------------------------------------*/ + +int +hc_cache_set_store(hc_sock_t * s, int enabled) +{ + struct { + header_control_message hdr; + cache_store_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = CACHE_STORE, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + .activate = enabled, + } + }; + + hc_command_params_t params = { + .cmd = ACTION_SET, + .cmd_id = CACHE_STORE, + .size_in = sizeof(cache_store_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +int +hc_cache_set_serve(hc_sock_t * s, int enabled) +{ + struct { + header_control_message hdr; + cache_serve_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = CACHE_SERVE, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + .activate = enabled, + } + }; + + hc_command_params_t params = { + .cmd = ACTION_SET, + .cmd_id = CACHE_SERVE, + .size_in = sizeof(cache_serve_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + + +/*----------------------------------------------------------------------------* + * Strategy + *----------------------------------------------------------------------------*/ + +// per prefix +int +hc_strategy_set(hc_sock_t * s /* XXX */) +{ + return LIBHICNCTRL_SUCCESS; +} + +/* How to retrieve that from the forwarder ? */ +static const char * strategies[] = { + "random", + "load_balancer", +}; + +#define ARRAY_SIZE(array) (sizeof(array) / sizeof(*array)) + +int +hc_strategy_list(hc_sock_t * s, hc_data_t ** data) +{ + *data = hc_data_create(0, sizeof(hc_strategy_t)); + + for (unsigned i = 0; i < ARRAY_SIZE(strategies); i++) { + hc_strategy_t * strategy = (hc_strategy_t*)hc_data_get_next(*data); + if (!strategy) + return LIBHICNCTRL_FAILURE; + snprintf(strategy->name, MAXSZ_HC_STRATEGY, "%s", strategies[i]); + (*data)->size++; + } + + return LIBHICNCTRL_SUCCESS; +} + +/* /!\ Please update constants in header file upon changes */ +int +hc_strategy_snprintf(char * s, size_t size, hc_strategy_t * strategy) +{ + return snprintf(s, size, "%s", strategy->name); +} + +/*----------------------------------------------------------------------------* + * WLDR + *----------------------------------------------------------------------------*/ + +// per connection +int +hc_wldr_set(hc_sock_t * s /* XXX */) +{ + return LIBHICNCTRL_SUCCESS; +} + +/*----------------------------------------------------------------------------* + * MAP-Me + *----------------------------------------------------------------------------*/ + +int +hc_mapme_set(hc_sock_t * s, int enabled) +{ + return LIBHICNCTRL_SUCCESS; +} + +int +hc_mapme_set_discovery(hc_sock_t * s, int enabled) +{ + return LIBHICNCTRL_SUCCESS; +} + +int +hc_mapme_set_timescale(hc_sock_t * s, double timescale) +{ + return LIBHICNCTRL_SUCCESS; +} + +int +hc_mapme_set_retx(hc_sock_t * s, double timescale) +{ + return LIBHICNCTRL_SUCCESS; +} + +/*----------------------------------------------------------------------------* + * Policy + *----------------------------------------------------------------------------*/ + +#ifdef WITH_POLICY + +/* POLICY CREATE */ + +int +hc_policy_create(hc_sock_t * s, hc_policy_t * policy) +{ + if (!IS_VALID_FAMILY(policy->family)) + return LIBHICNCTRL_FAILURE; + + struct { + header_control_message hdr; + add_policy_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = ADD_POLICY, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + /* we use IPv6 which is the longest address */ + .address.ipv6 = policy->remote_addr.v6.as_in6addr, + .addressType = (u8)map_to_addr_type[policy->family], + .len = policy->len, + .policy = policy->policy, + } + }; + + hc_command_params_t params = { + .cmd = ACTION_CREATE, + .cmd_id = ADD_POLICY, + .size_in = sizeof(add_policy_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/* POLICY DELETE */ + +int +hc_policy_delete(hc_sock_t * s, hc_policy_t * policy) +{ + if (!IS_VALID_FAMILY(policy->family)) + return LIBHICNCTRL_FAILURE; + + struct { + header_control_message hdr; + remove_policy_command payload; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = REMOVE_POLICY, + .length = 1, + .seqNum = s->send_seq, + }, + .payload = { + /* we use IPv6 which is the longest address */ + .address.ipv6 = policy->remote_addr.v6.as_in6addr, + .addressType = (u8)map_to_addr_type[policy->family], + .len = policy->len, + } + }; + + hc_command_params_t params = { + .cmd = ACTION_DELETE, + .cmd_id = REMOVE_POLICY, + .size_in = sizeof(remove_policy_command), + .size_out = 0, + .parse = NULL, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, NULL); +} + +/* POLICY LIST */ + +int +hc_policy_list(hc_sock_t * s, hc_data_t ** pdata) +{ + struct { + header_control_message hdr; + } msg = { + .hdr = { + .messageType = REQUEST_LIGHT, + .commandID = LIST_POLICIES, + .length = 0, + .seqNum = s->send_seq, + }, + }; + + hc_command_params_t params = { + .cmd = ACTION_LIST, + .cmd_id = LIST_POLICIES, + .size_in = sizeof(list_policies_command), + .size_out = sizeof(hc_policy_t), + .parse = (HC_PARSE)hc_policy_parse, + }; + + return hc_execute_command(s, (hc_msg_t*)&msg, sizeof(msg), ¶ms, pdata); +} + +/* POLICY PARSE */ + +int +hc_policy_parse(void * in, hc_policy_t * policy) +{ + list_policies_command * cmd = (list_policies_command *) in; + + if (!IS_VALID_ADDR_TYPE(cmd->addressType)) + return LIBHICNCTRL_FAILURE; + + int family = map_from_addr_type[cmd->addressType]; + if (!IS_VALID_FAMILY(family)) + return LIBHICNCTRL_FAILURE; + + *policy = (hc_policy_t) { + .family = family, + .remote_addr = UNION_CAST(cmd->address, ip_address_t), + .len = cmd->len, + .policy = cmd->policy, + }; + return LIBHICNCTRL_SUCCESS; +} + +/* POLICY SNPRINTF */ + +/* /!\ Please update constants in header file upon changes */ +int +hc_policy_snprintf(char * s, size_t size, hc_policy_t * policy) +{ + return LIBHICNCTRL_SUCCESS; +} + +#endif /* WITH_POLICY */ -- cgit 1.2.3-korg