summaryrefslogtreecommitdiffstats
path: root/src/vnet/teib/teib.h
blob: 69fa740f4325bad25fffb30e143d4460eb3f86b2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
/*
 * teib.h: next-hop resolution
 *
 * Copyright (c) 2016 Cisco and/or its affiliates.
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at:
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#ifndef __TEIB_H__
#define __TEIB_H__

#include <vnet/ip/ip.h>

/**
 * Tunnel Endpoint Information Base.
 *
 * A TEIB entry represents the mapping between a peer on an interface in the overlay
 * and a next-hop address in the underlay.
 *  i.e. there's a multipoint tunnel providing the overlay (henace a peer on
 *   that tunnel) which is reachable via 'tunnel destination' address in the
 *   underlay.
 *
 * Such overlay to underlay mappings might be providied by a protocol like NHRP
 */
typedef struct teib_entry_t_ teib_entry_t;

/** accessors for the opaque struct */
extern u32 teib_entry_get_sw_if_index (const teib_entry_t * ne);
extern u32 teib_entry_get_fib_index (const teib_entry_t * ne);
extern const ip_address_t *teib_entry_get_peer (const teib_entry_t * ne);
extern const fib_prefix_t *teib_entry_get_nh (const teib_entry_t * ne);
extern u8 *format_teib_entry (u8 * s, va_list * args);

/**
 * Create a new TEIB entry
 */
extern int teib_entry_add (u32 sw_if_index,
			   const ip_address_t * peer,
			   u32 nh_table_id, const ip_address_t * nh);

extern int teib_entry_del (u32 sw_if_index, const ip_address_t * peer);

extern teib_entry_t *teib_entry_find (u32 sw_if_index,
				      const ip_address_t * peer);
extern teib_entry_t *teib_entry_find_46 (u32 sw_if_index,
					 fib_protocol_t fproto,
					 const ip46_address_t * peer);
extern teib_entry_t *teib_entry_get (index_t nei);

extern void teib_entry_adj_stack (const teib_entry_t * ne, adj_index_t ai);

typedef walk_rc_t (*teib_walk_cb_t) (index_t nei, void *ctx);

extern void teib_walk (teib_walk_cb_t fn, void *ctx);
extern void teib_walk_itf (u32 sw_if_index, teib_walk_cb_t fn, void *ctx);

/**
 * Notifications for the creation and deletion of TEIB entries
 */
typedef void (*teib_entry_added_t) (const teib_entry_t * ne);
typedef void (*teib_entry_deleted_t) (const teib_entry_t * ne);

typedef struct teib_vft_t_
{
  teib_entry_added_t nv_added;
  teib_entry_deleted_t nv_deleted;
} teib_vft_t;

extern void teib_register (const teib_vft_t * vft);

#endif

/*
 * fd.io coding-style-patch-verification: ON
 *
 * Local Variables:
 * eval: (c-set-style "gnu")
 * End:
 */
if isinstance(id_type, str): t = IDType.value(id_type) self.remote_id = {"id_type": t, "data": data, "is_local": False} def add_local_ts( self, start_addr, end_addr, start_port=0, end_port=0xFFFF, proto=0, is_ip4=True ): self.ts_is_ip4 = is_ip4 self.local_ts = { "is_local": True, "protocol_id": proto, "start_port": start_port, "end_port": end_port, "start_addr": start_addr, "end_addr": end_addr, } def add_remote_ts( self, start_addr, end_addr, start_port=0, end_port=0xFFFF, proto=0 ): try: IPv4Address(start_addr) is_ip4 = True except AddressValueError: is_ip4 = False self.ts_is_ip4 = is_ip4 self.remote_ts = { "is_local": False, "protocol_id": proto, "start_port": start_port, "end_port": end_port, "start_addr": start_addr, "end_addr": end_addr, } def add_responder_hostname(self, hn): self.responder_hostname = hn def add_responder(self, responder): self.responder = responder def add_ike_transforms(self, tr): self.ike_transforms = tr def add_esp_transforms(self, tr): self.esp_transforms = tr def set_udp_encap(self, udp_encap): self.udp_encap = udp_encap def set_lifetime_data(self, data): self.lifetime_data = data def set_ipsec_over_udp_port(self, port): self.ipsec_udp_port = {"is_set": 1, "port": port} def set_tunnel_interface(self, sw_if_index): self.tun_itf = sw_if_index def object_id(self): return "ikev2-profile-%s" % self.profile_name def remove_vpp_config(self): self.vapi.ikev2_profile_add_del(name=self.profile_name, is_add=False) def add_vpp_config(self): self.vapi.ikev2_profile_add_del(name=self.profile_name, is_add=True) if hasattr(self, "auth"): self.vapi.ikev2_profile_set_auth( name=self.profile_name, data_len=len(self.auth["data"]), **self.auth ) if hasattr(self, "local_id"): self.vapi.ikev2_profile_set_id( name=self.profile_name, data_len=len(self.local_id["data"]), **self.local_id, ) if hasattr(self, "remote_id"): self.vapi.ikev2_profile_set_id( name=self.profile_name, data_len=len(self.remote_id["data"]), **self.remote_id, ) if hasattr(self, "local_ts"): self.vapi.ikev2_profile_set_ts(name=self.profile_name, ts=self.local_ts) if hasattr(self, "remote_ts"): self.vapi.ikev2_profile_set_ts(name=self.profile_name, ts=self.remote_ts) if hasattr(self, "responder"): self.vapi.ikev2_set_responder( name=self.profile_name, responder=self.responder ) if hasattr(self, "responder_hostname"): print(self.responder_hostname) self.vapi.ikev2_set_responder_hostname( name=self.profile_name, **self.responder_hostname ) if hasattr(self, "ike_transforms"): self.vapi.ikev2_set_ike_transforms( name=self.profile_name, tr=self.ike_transforms ) if hasattr(self, "esp_transforms"): self.vapi.ikev2_set_esp_transforms( name=self.profile_name, tr=self.esp_transforms ) if self.udp_encap: self.vapi.ikev2_profile_set_udp_encap(name=self.profile_name) if hasattr(self, "lifetime_data"): self.vapi.ikev2_set_sa_lifetime( name=self.profile_name, **self.lifetime_data ) if hasattr(self, "ipsec_udp_port"): self.vapi.ikev2_profile_set_ipsec_udp_port( name=self.profile_name, **self.ipsec_udp_port ) if hasattr(self, "tun_itf"): self.vapi.ikev2_set_tunnel_interface( name=self.profile_name, sw_if_index=self.tun_itf ) if not self.natt: self.vapi.ikev2_profile_disable_natt(name=self.profile_name) def query_vpp_config(self): res = self.vapi.ikev2_profile_dump() for r in res: if r.profile.name == self.profile_name: return r.profile return None