summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--manpages.mk22
-rw-r--r--tests/automake.mk5
-rw-r--r--tests/testsuite.at1
-rw-r--r--tests/vtep-ctl.at889
-rw-r--r--vtep/.gitignore2
-rw-r--r--vtep/automake.mk15
-rw-r--r--vtep/vtep-ctl.8.in590
-rw-r--r--vtep/vtep-ctl.c3890
8 files changed, 5412 insertions, 2 deletions
diff --git a/manpages.mk b/manpages.mk
index 2a34f04bc..5bfcdaa14 100644
--- a/manpages.mk
+++ b/manpages.mk
@@ -253,3 +253,25 @@ ofproto/ofproto-dpif-unixctl.man:
ofproto/ofproto-unixctl.man:
ovsdb/remote-active.man:
ovsdb/remote-passive.man:
+
+vtep/vtep-ctl.8: \
+ vtep/vtep-ctl.8.in \
+ lib/ssl-bootstrap.man \
+ lib/ssl-peer-ca-cert.man \
+ lib/ssl.man \
+ lib/table.man \
+ lib/vlog.man \
+ ovsdb/remote-active.man \
+ ovsdb/remote-active.man \
+ ovsdb/remote-passive.man \
+ ovsdb/remote-passive.man
+vtep/vtep-ctl.8.in:
+lib/ssl-bootstrap.man:
+lib/ssl-peer-ca-cert.man:
+lib/ssl.man:
+lib/table.man:
+lib/vlog.man:
+ovsdb/remote-active.man:
+ovsdb/remote-active.man:
+ovsdb/remote-passive.man:
+ovsdb/remote-passive.man:
diff --git a/tests/automake.mk b/tests/automake.mk
index 8f51a659d..f2e0edcc4 100644
--- a/tests/automake.mk
+++ b/tests/automake.mk
@@ -64,11 +64,12 @@ TESTSUITE_AT = \
tests/ovs-xapi-sync.at \
tests/stp.at \
tests/interface-reconfigure.at \
- tests/vlog.at
+ tests/vlog.at \
+ tests/vtep-ctl.at
TESTSUITE = $(srcdir)/tests/testsuite
DISTCLEANFILES += tests/atconfig tests/atlocal
-AUTOTEST_PATH = utilities:vswitchd:ovsdb:tests
+AUTOTEST_PATH = utilities:vswitchd:ovsdb:vtep:tests
check-local: tests/atconfig tests/atlocal $(TESTSUITE)
$(SHELL) '$(TESTSUITE)' -C tests AUTOTEST_PATH=$(AUTOTEST_PATH) $(TESTSUITEFLAGS)
diff --git a/tests/testsuite.at b/tests/testsuite.at
index 9e16f9464..772a7eb50 100644
--- a/tests/testsuite.at
+++ b/tests/testsuite.at
@@ -107,3 +107,4 @@ m4_include([tests/ovs-xapi-sync.at])
m4_include([tests/interface-reconfigure.at])
m4_include([tests/stp.at])
m4_include([tests/vlog.at])
+m4_include([tests/vtep-ctl.at])
diff --git a/tests/vtep-ctl.at b/tests/vtep-ctl.at
new file mode 100644
index 000000000..40ee16e87
--- /dev/null
+++ b/tests/vtep-ctl.at
@@ -0,0 +1,889 @@
+dnl VTEP_OVSDB_INIT([$1])
+dnl
+dnl Creates an empty database named $1.
+m4_define([VTEP_OVSDB_INIT],
+ [OVS_RUNDIR=`pwd`; export OVS_RUNDIR
+ AT_CHECK(
+ [ovsdb-tool create $1 $abs_top_srcdir/vtep/vtep.ovsschema],
+ [0], [stdout], [ignore])
+ AT_CHECK(
+ [[ovsdb-tool transact $1 \
+ '["hardware_vtep",
+ {"op": "insert",
+ "table": "Global",
+ "row": {}}]']],
+ [0], [ignore], [ignore])])
+
+dnl VTEP_CTL_SETUP
+dnl
+dnl Creates an empty database in the current directory and then starts
+dnl an ovsdb-server on it for vtep-ctl to connect to.
+m4_define([VTEP_CTL_SETUP],
+ [VTEP_OVSDB_INIT([db])
+ AT_CHECK([ovsdb-server --detach --no-chdir --pidfile="`pwd`"/pid --remote=punix:socket --unixctl="`pwd`"/unixctl db >/dev/null 2>&1], [0], [ignore], [ignore])])
+
+dnl VTEP_CTL_CLEANUP
+dnl
+dnl Kills off the database server.
+m4_define([VTEP_CTL_CLEANUP], [OVSDB_SERVER_SHUTDOWN])
+
+dnl RUN_VTEP_CTL(COMMAND, ...)
+dnl
+dnl Executes each vtep-ctl COMMAND.
+m4_define([RUN_VTEP_CTL],
+ [m4_foreach([command], [$@], [vtep-ctl --timeout=5 -vreconnect:emer --db=unix:socket command
+])])
+m4_define([RUN_VTEP_CTL_ONELINE],
+ [m4_foreach([command], [$@], [vtep-ctl --timeout=5 -vreconnect:emer --db=unix:socket --oneline -- command
+])])
+
+dnl RUN_VTEP_CTL_TOGETHER(COMMAND, ...)
+dnl
+dnl Executes each vtep-ctl COMMAND in a single run of vtep-ctl.
+m4_define([RUN_VTEP_CTL_TOGETHER],
+ [vtep-ctl --timeout=5 -vreconnect:emer --db=unix:socket --oneline dnl
+m4_foreach([command], [$@], [ -- command])])
+
+dnl CHECK_PSWITCHES([PSWITCH], ...)
+dnl
+dnl Verifies that "vtep-ctl list-ps" prints the specified list of
+dnl physical switches, which must be in alphabetical order.
+m4_define([CHECK_PSWITCHES],
+ [dnl Check that the pswitches appear on list-ps, without --oneline.
+ AT_CHECK(
+ [RUN_VTEP_CTL([list-ps])],
+ [0],
+ [m4_foreach([psinfo], [$@], [m4_car(psinfo)
+])],
+ [],
+ [VTEP_CTL_CLEANUP])
+
+ dnl Check that the pswitches appear on list-ps, with --oneline.
+ AT_CHECK(
+ [RUN_VTEP_CTL_ONELINE([list-ps])],
+ [0],
+ [m4_join([\n], m4_foreach([psinfo], [$@], [m4_car(psinfo),]))
+],
+ [],
+ [VTEP_CTL_CLEANUP])
+
+ dnl Check that each pswitch exists according to ps-exists and that
+ dnl a pswitch that should not exist does not.
+ m4_foreach([psinfo], [$@],
+ [AT_CHECK([RUN_VTEP_CTL([ps-exists m4_car(psinfo)])], [0], [],
+ [], [VTEP_CTL_CLEANUP])])
+ AT_CHECK([RUN_VTEP_CTL([ps-exists nonexistent])], [2], [], [],
+ [VTEP_CTL_CLEANUP])])
+
+dnl CHECK_PORTS(PSWITCH, PORT[, PORT...])
+dnl
+dnl Verifies that "vtep-ctl list-ports PSWITCH" prints the specified
+dnl list of ports, which must be in alphabetical order.
+m4_define([CHECK_PORTS],
+ [dnl Check ports without --oneline.
+ AT_CHECK(
+ [RUN_VTEP_CTL([list-ports $1])],
+ [0],
+ [m4_foreach([port], m4_cdr($@), [port
+])],
+ [],
+ [VTEP_CTL_CLEANUP])
+
+ dnl Check ports with --oneline.
+ AT_CHECK(
+ [RUN_VTEP_CTL_ONELINE([list-ports $1])],
+ [0],
+ [m4_join([\n], m4_shift($@))
+],
+ [],
+ [VTEP_CTL_CLEANUP])])
+
+
+dnl CHECK_LSWITCHES([LSWITCH], ...)
+dnl
+dnl Verifies that "vtep-ctl list-ls" prints the specified list of
+dnl logical switches, which must be in alphabetical order.
+m4_define([CHECK_LSWITCHES],
+ [dnl Check that the lswitches appear on list-ls, without --oneline.
+ AT_CHECK(
+ [RUN_VTEP_CTL([list-ls])],
+ [0],
+ [m4_foreach([lsinfo], [$@], [m4_car(lsinfo)
+])],
+ [],
+ [VTEP_CTL_CLEANUP])
+
+ dnl Check that the lswitches appear on list-ls, with --oneline.
+ AT_CHECK(
+ [RUN_VTEP_CTL_ONELINE([list-ls])],
+ [0],
+ [m4_join([\n], m4_foreach([lsinfo], [$@], [m4_car(lsinfo),]))
+],
+ [],
+ [VTEP_CTL_CLEANUP])
+
+ dnl Check that each lswitch exists according to ls-exists and that
+ dnl a pswitch that should not exist does not.
+ m4_foreach([lsinfo], [$@],
+ [AT_CHECK([RUN_VTEP_CTL([ls-exists m4_car(lsinfo)])], [0], [],
+ [], [VTEP_CTL_CLEANUP])])
+ AT_CHECK([RUN_VTEP_CTL([ls-exists nonexistent])], [2], [], [],
+ [VTEP_CTL_CLEANUP])])
+
+dnl ----------------------------------------------------------------------
+AT_BANNER([vtep-ctl unit tests -- physical switch tests])
+
+AT_SETUP([add-ps a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ps a])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([a])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a, add-ps a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ps a])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([add-ps a])], [1], [],
+ [vtep-ctl: cannot create physical switch a because it already exists
+], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a, add-ps b])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ps a], [add-ps b])], [0], [], [],
+ [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([a], [b])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a, add-ps b, del-ps a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ps a], [add-ps b], [del-ps a])], [0], [], [],
+ [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([b])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a, del-ps a, add-ps a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL_TOGETHER(
+ [add-ps a],
+ [del-ps a],
+ [add-ps a])], [0], [
+
+
+], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([a])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a, add-port a a1, add-port a a2])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ps a],
+ [--if-exists del-ps b],
+ [add-port a a1],
+ [add-port a a2])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([a])
+CHECK_PORTS([a], [a1], [a2])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a, add-port a a1, add-port a a1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ps a],
+ [add-port a a1])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([add-port a a1])], [1], [],
+ [vtep-ctl: cannot create a port named a1 on a because a port with that name already exists
+], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a b, add-port a a1, add-port b b1, del-ps a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL_TOGETHER(
+ [add-ps a],
+ [add-ps b],
+ [add-port a a1],
+ [add-port b b1],
+ [--if-exists del-port b b2],
+ [del-ps a])], [0], [
+
+
+
+
+
+], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([b])
+CHECK_PORTS([b], [b1])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a b, add-port a a1, add-port b b1, del-port a a1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ps a],
+ [add-ps b],
+ [add-port a a1],
+ [--may-exist add-port b b1],
+ [del-port a a1])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([--may-exist add-port b b1])], [0], [], [],
+ [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([a], [b])
+CHECK_PORTS([a])
+CHECK_PORTS([b], [b1])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ps a b, add-port a p1, add-port b p1, del-port a p1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ps a],
+ [add-ps b],
+ [add-port a p1],
+ [add-port b p1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([a], [b])
+CHECK_PORTS([a], [p1])
+CHECK_PORTS([b], [p1])
+AT_CHECK([RUN_VTEP_CTL([del-port a p1])], [0], [], [],
+ [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([a], [b])
+CHECK_PORTS([a])
+CHECK_PORTS([b], [p1])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+
+dnl ----------------------------------------------------------------------
+AT_BANNER([vtep-ctl unit tests -- logical switch tests])
+
+AT_SETUP([add-ls a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ls a])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([a])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ls a, add-ls a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ls a])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([add-ls a])], [1], [],
+ [vtep-ctl: cannot create logical switch a because it already exists
+], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ls a, add-ls b])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ls a], [add-ls b])], [0], [], [],
+ [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([a], [b])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ls a, add-ls b, del-ls a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL([add-ls a], [add-ls b], [del-ls a])], [0], [], [],
+ [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([b])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ls a, del-ls a, add-ls a])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL_TOGETHER(
+ [add-ls a],
+ [del-ls a],
+ [add-ls a])], [0], [
+
+
+], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([a])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+
+dnl ----------------------------------------------------------------------
+AT_BANNER([vtep-ctl unit tests -- logical binding tests])
+
+AT_SETUP([bind-ls ps1 pp1 300 ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ps ps1],
+ [add-port ps1 pp1],
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([ps1])
+CHECK_PORTS([ps1], [pp1])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [bind-ls ps1 pp1 300 ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-bindings ps1 pp1])], [0],
+ [0300 ls1
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([bind-ls ps1 pp1 300 ls1, bind-ls ps1 pp1 400 ls2])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ps ps1],
+ [add-port ps1 pp1],
+ [add-ls ls1],
+ [add-ls ls2])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([ps1])
+CHECK_PORTS([ps1], [pp1])
+CHECK_LSWITCHES([ls1], [ls2])
+AT_CHECK([RUN_VTEP_CTL(
+ [bind-ls ps1 pp1 300 ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [bind-ls ps1 pp1 400 ls2])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-bindings ps1 pp1])], [0],
+ [0300 ls1
+0400 ls2
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([bind-ls ps1 pp1 300, bind-ls ps2 pp2 300 ls2])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ps ps1],
+ [add-ps ps2],
+ [add-port ps1 pp1],
+ [add-port ps2 pp2],
+ [add-ls ls1],
+ [add-ls ls2])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_PSWITCHES([ps1], [ps2])
+CHECK_PORTS([ps1], [pp1])
+CHECK_PORTS([ps2], [pp2])
+CHECK_LSWITCHES([ls1], [ls2])
+AT_CHECK([RUN_VTEP_CTL(
+ [bind-ls ps1 pp1 300 ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [bind-ls ps2 pp2 300 ls2])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-bindings ps1 pp1])], [0],
+ [0300 ls1
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-bindings ps2 pp2])], [0],
+ [0300 ls2
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+
+dnl ----------------------------------------------------------------------
+AT_BANNER([vtep-ctl unit tests -- MAC binding tests])
+
+AT_SETUP([add-ucast-local ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ucast-local ls1, overwrite])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.11])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ucast-local ls1, del-ucast-local ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-ucast-local ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [del-ucast-local ls1 00:11:22:33:44:55])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ucast-remote ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-remote ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-ucast-remote ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ucast-remote ls1, overwrite])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-remote ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-ucast-remote ls1 00:11:22:33:44:55 10.0.0.11])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ucast-remote ls1, del-ucast-remote ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-remote ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-ucast-remote ls1 00:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [del-ucast-remote ls1 00:11:22:33:44:55])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-ucast-local ls1, add-ucast-remote ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-ucast-local ls1 00:11:22:33:44:66 10.0.0.11],
+ [add-ucast-remote ls1 02:11:22:33:44:55 10.0.0.10],
+ [add-ucast-remote ls1 02:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 00:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 02:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 02:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-mcast-local ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-local ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.12])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+
+mcast-mac-local
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-mcast-local ls1, del-mcast-local ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-local ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.12],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.13])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+
+mcast-mac-local
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.13
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [del-mcast-local ls1 01:11:22:33:44:55 10.0.0.12])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+
+mcast-mac-local
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.13
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-mcast-remote ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-remote ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.12])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+
+mcast-mac-remote
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-mcast-remote ls1, del-mcast-remote ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-remote ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.12],
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.13])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+
+mcast-mac-remote
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.13
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [del-mcast-remote ls1 01:11:22:33:44:55 10.0.0.12])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+
+mcast-mac-remote
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.13
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add-mcast-local ls1, add-mcast-remote ls1])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-local ls1 01:11:22:33:44:66 10.0.0.11],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.12],
+ [add-mcast-remote ls1 03:11:22:33:44:55 10.0.0.10],
+ [add-mcast-remote ls1 03:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-remote ls1 03:11:22:33:44:55 10.0.0.12])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+
+mcast-mac-local
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+
+mcast-mac-remote
+ 03:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 03:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 03:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add local and remote macs, clear-local-macs])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-local ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.12],
+ [add-ucast-remote ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-remote ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.12])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+
+mcast-mac-local
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+
+mcast-mac-remote
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [clear-local-macs ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+
+mcast-mac-local
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+
+mcast-mac-remote
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+AT_SETUP([add local and remote macs, clear-remote-macs])
+AT_KEYWORDS([vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ls ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+CHECK_LSWITCHES([ls1])
+AT_CHECK([RUN_VTEP_CTL(
+ [add-ucast-local ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-local ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-local ls1 01:11:22:33:44:55 10.0.0.12],
+ [add-ucast-remote ls1 00:11:22:33:44:55 10.0.0.10],
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.10],
+ [add-mcast-remote ls1 01:11:22:33:44:66 vxlan_over_ipv4 10.0.0.11],
+ [add-mcast-remote ls1 01:11:22:33:44:55 10.0.0.12])
+], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+
+mcast-mac-local
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+
+mcast-mac-remote
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL(
+ [clear-remote-macs ls1])], [0], [], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-local-macs ls1])], [0],
+ [ucast-mac-local
+ 00:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+
+mcast-mac-local
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.10
+ 01:11:22:33:44:55 -> vxlan_over_ipv4/10.0.0.12
+ 01:11:22:33:44:66 -> vxlan_over_ipv4/10.0.0.11
+
+], [], [VTEP_CTL_CLEANUP])
+AT_CHECK([RUN_VTEP_CTL([list-remote-macs ls1])], [0],
+ [ucast-mac-remote
+
+mcast-mac-remote
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
+
+dnl ----------------------------------------------------------------------
+AT_BANNER([vtep-ctl unit tests -- manager commands])
+
+AT_SETUP([managers])
+AT_KEYWORDS([manager vtep-ctl])
+VTEP_CTL_SETUP
+AT_CHECK([RUN_VTEP_CTL_TOGETHER(
+ [del-manager],
+ [get-manager],
+ [set-manager tcp:4.5.6.7],
+ [get-manager],
+ [set-manager tcp:8.9.10.11 tcp:5.4.3.2],
+ [get-manager],
+ [del-manager],
+ [get-manager])], [0], [
+
+
+tcp:4.5.6.7
+
+tcp:5.4.3.2\ntcp:8.9.10.11
+
+
+], [], [VTEP_CTL_CLEANUP])
+VTEP_CTL_CLEANUP
+AT_CLEANUP
diff --git a/vtep/.gitignore b/vtep/.gitignore
index 1549759c1..c898bc40a 100644
--- a/vtep/.gitignore
+++ b/vtep/.gitignore
@@ -1,5 +1,7 @@
/Makefile
/Makefile.in
+/vtep-ctl
+/vtep-ctl.8
/vtep.5
/vtep.gv
/vtep.ovsschema.stamp
diff --git a/vtep/automake.mk b/vtep/automake.mk
index 2db12c29e..0803855be 100644
--- a/vtep/automake.mk
+++ b/vtep/automake.mk
@@ -1,3 +1,18 @@
+bin_PROGRAMS += \
+ vtep/vtep-ctl
+
+MAN_ROOTS += \
+ vtep/vtep-ctl.8.in
+
+DISTCLEANFILES += \
+ vtep/vtep-ctl.8
+
+man_MANS += \
+ vtep/vtep-ctl.8
+
+vtep_vtep_ctl_SOURCES = vtep/vtep-ctl.c
+vtep_vtep_ctl_LDADD = lib/libopenvswitch.a $(SSL_LIBS)
+
# VTEP schema and IDL
EXTRA_DIST += vtep/vtep.ovsschema
pkgdata_DATA += vtep/vtep.ovsschema
diff --git a/vtep/vtep-ctl.8.in b/vtep/vtep-ctl.8.in
new file mode 100644
index 000000000..57bfa65f3
--- /dev/null
+++ b/vtep/vtep-ctl.8.in
@@ -0,0 +1,590 @@
+.\" -*- nroff -*-
+.de IQ
+. br
+. ns
+. IP "\\$1"
+..
+.de ST
+. PP
+. RS -0.15in
+. I "\\$1"
+. RE
+..
+.TH vtep\-ctl 8 "March 2013" "Open vSwitch" "Open vSwitch Manual"
+.\" This program's name:
+.ds PN vtep\-ctl
+.\" SSL peer program's name:
+.ds SN ovsdb\-server
+.
+.SH NAME
+vtep\-ctl \- utility for querying and configuring a VTEP database
+.
+.SH SYNOPSIS
+\fBvtep\-ctl\fR [\fIoptions\fR] \fB\-\-\fR [\fIoptions\fR] \fIcommand
+\fR[\fIargs\fR] [\fB\-\-\fR [\fIoptions\fR] \fIcommand \fR[\fIargs\fR]]...
+.
+.SH DESCRIPTION
+The \fBvtep\-ctl\fR program configures a VTEP database.
+See \fBvtep\fR(5) for comprehensive documentation of
+the database schema.
+.PP
+\fBvtep\-ctl\fR connects to an \fBovsdb\-server\fR process that
+maintains a VTEP configuration database. Using this connection, it
+queries and possibly applies changes to the database, depending on the
+supplied commands.
+.PP
+\fBvtep\-ctl\fR can perform any number of commands in a single run,
+implemented as a single atomic transaction against the database.
+.PP
+The \fBvtep\-ctl\fR command line begins with global options (see
+\fBOPTIONS\fR below for details). The global options are followed by
+one or more commands. Each command should begin with \fB\-\-\fR by
+itself as a command-line argument, to separate it from the following
+commands. (The \fB\-\-\fR before the first command is optional.) The
+command itself starts with command-specific options, if any, followed by
+the command name and any arguments. See \fBEXAMPLES\fR below for syntax
+examples.
+.
+.SH OPTIONS
+.
+The following options affect the behavior \fBvtep\-ctl\fR as a whole.
+Some individual commands also accept their own options, which are
+given just before the command name. If the first command on the
+command line has options, then those options must be separated from
+the global options by \fB\-\-\fR.
+.
+.IP "\fB\-\-db=\fIserver\fR"
+Sets \fIserver\fR as the database server that \fBvtep\-ctl\fR
+contacts to query or modify configuration. The default is
+\fBunix:@RUNDIR@/db.sock\fR. \fIserver\fR must take one of the
+following forms:
+.RS
+.so ovsdb/remote-active.man
+.so ovsdb/remote-passive.man
+.RE
+.
+.IP "\fB\-\-no\-syslog\fR"
+By default, \fBvtep\-ctl\fR logs its arguments and the details of any
+changes that it makes to the system log. This option disables this
+logging.
+.IP
+This option is equivalent to \fB\-\-verbose=vtep_ctl:syslog:warn\fR.
+.
+.IP "\fB\-\-oneline\fR"
+Modifies the output format so that the output for each command is printed
+on a single line. New-line characters that would otherwise separate
+lines are printed as \fB\\n\fR, and any instances of \fB\\\fR that
+would otherwise appear in the output are doubled.
+Prints a blank line for each command that has no output.
+This option does not affect the formatting of output from the
+\fBlist\fR or \fBfind\fR commands; see \fBTable Formatting Options\fR
+below.
+.
+.IP "\fB\-\-dry\-run\fR"
+Prevents \fBvtep\-ctl\fR from actually modifying the database.
+.
+.IP "\fB\-t \fIsecs\fR"
+.IQ "\fB\-\-timeout=\fIsecs\fR"
+By default, or with a \fIsecs\fR of \fB0\fR, \fBvtep\-ctl\fR waits
+forever for a response from the database. This option limits runtime
+to approximately \fIsecs\fR seconds. If the timeout expires,
+\fBvtep\-ctl\fR will exit with a \fBSIGALRM\fR signal. (A timeout
+would normally happen only if the database cannot be contacted, or if
+the system is overloaded.)
+.
+.SS "Table Formatting Options"
+These options control the format of output from the \fBlist\fR and
+\fBfind\fR commands.
+.so lib/table.man
+.
+.SS "Public Key Infrastructure Options"
+.so lib/ssl.man
+.so lib/ssl-bootstrap.man
+.so lib/ssl-peer-ca-cert.man
+.so lib/vlog.man
+.
+.SH COMMANDS
+The commands implemented by \fBvtep\-ctl\fR are described in the
+sections below.
+.
+.SS "Physical Switch Commands"
+These commands examine and manipulate physical switches.
+.
+.IP "[\fB\-\-may\-exist\fR] \fBadd\-ps \fIpswitch\fR"
+Creates a new physical switch named \fIpswitch\fR. Initially the switch
+will have no ports.
+.IP
+Without \fB\-\-may\-exist\fR, attempting to create a switch that
+exists is an error. With \fB\-\-may\-exist\fR, this command does
+nothing if \fIpswitch\fR already exists.
+.
+.IP "[\fB\-\-if\-exists\fR] \fBdel\-ps \fIpswitch\fR"
+Deletes \fIpswitch\fR and all of its ports.
+.IP
+Without \fB\-\-if\-exists\fR, attempting to delete a switch that does
+not exist is an error. With \fB\-\-if\-exists\fR, attempting to
+delete a switch that does not exist has no effect.
+.
+.IP "\fBlist\-ps\fR"
+Lists all existing physical switches on standard output, one per line.
+.
+.IP "\fBps\-exists \fIpswitch\fR"
+Tests whether \fIpswitch\fR exists. If so, \fBvtep\-ctl\fR exits
+successfully with exit code 0. If not, \fBvtep\-ctl\fR exits
+unsuccessfully with exit code 2.
+.
+.SS "Port Commands"
+.
+These commands examine and manipulate VTEP physical ports.
+.
+.IP "\fBlist\-ports \fIpswitch\fR"
+Lists all of the ports within \fIpswitch\fR on standard output, one per
+line.
+.
+.IP "[\fB\-\-may\-exist\fR] \fBadd\-port \fIpswitch port\fR"
+Creates on \fIpswitch\fR a new port named \fIport\fR from the network
+device of the same name.
+.IP
+Without \fB\-\-may\-exist\fR, attempting to create a port that exists
+is an error. With \fB\-\-may\-exist\fR, this command does nothing if
+\fIport\fR already exists on \fIpswitch\fR.
+.
+.IP "[\fB\-\-if\-exists\fR] \fBdel\-port \fR[\fIpswitch\fR] \fIport\fR"
+Deletes \fIport\fR. If \fIpswitch\fR is omitted, \fIport\fR is removed
+from whatever switch contains it; if \fIpswitch\fR is specified, it
+must be the switch that contains \fIport\fR.
+.IP
+Without \fB\-\-if\-exists\fR, attempting to delete a port that does
+not exist is an error. With \fB\-\-if\-exists\fR, attempting to
+delete a port that does not exist has no effect.
+.
+.SS "Logical Switch Commands"
+These commands examine and manipulate logical switches.
+.
+.IP "[\fB\-\-may\-exist\fR] \fBadd\-ls \fIlswitch\fR"
+Creates a new logical switch named \fIlswitch\fR. Initially the switch
+will have no locator bindings.
+.IP
+Without \fB\-\-may\-exist\fR, attempting to create a switch that
+exists is an error. With \fB\-\-may\-exist\fR, this command does
+nothing if \fIlswitch\fR already exists.
+.
+.IP "[\fB\-\-if\-exists\fR] \fBdel\-ls \fIlswitch\fR"
+Deletes \fIlswitch\fR.
+.IP
+Without \fB\-\-if\-exists\fR, attempting to delete a switch that does
+not exist is an error. With \fB\-\-if\-exists\fR, attempting to
+delete a switch that does not exist has no effect.
+.
+.IP "\fBlist\-ls\fR"
+Lists all existing logical switches on standard output, one per line.
+.
+.IP "\fBls\-exists \fIlswitch\fR"
+Tests whether \fIlswitch\fR exists. If so, \fBvtep\-ctl\fR exits
+successfully with exit code 0. If not, \fBvtep\-ctl\fR exits
+unsuccessfully with exit code 2.
+.
+.IP "\fBbind\-ls \fIpswitch port vlan lswitch\fR"
+Bind logical switch \fIlswitch\fR to the \fIport\fR/\fIvlan\fR
+combination on the physical switch \fIpswitch\fR.
+.
+.IP "\fBunbind\-ls \fIpswitch port vlan\fR"
+Remove the logical switch binding from the \fIport\fR/\fIvlan\fR
+combination on the physical switch \fIpswitch\fR.
+.
+.IP "\fBlist\-bindings \fIpswitch port\fR"
+List the logical switch bindings for \fIport\fR on the physical switch
+\fIpswitch\fR.
+.
+.SS "Local MAC Binding Commands"
+These commands examine and manipulate local MAC bindings for the logical
+switch. The local maps are written by the VTEP to refer to MACs it has
+learned on its physical ports.
+.
+.IP "\fBadd\-ucast\-local \fIlswitch mac\fR [\fIencap\fR] \fIip\fR"
+Map the unicast Ethernet address \fImac\fR to the physical location
+\fIip\fR using encapsulation \fIencap\fR on \fIlswitch\fR. If
+\fIencap\fR is not specified, the default is "vxlan_over_ipv4". The
+local mappings are used by the VTEP to refer to MACs learned on its
+physical ports.
+.
+.IP "\fBdel\-ucast\-local \fIlswitch mac\fR"
+Remove the local unicast Ethernet address \fImac\fR map from
+\fIlswitch\fR. The local mappings are used by the VTEP to refer to MACs
+learned on its physical ports.
+.
+.IP "\fBadd\-mcast\-local \fIlswitch mac\fR [\fIencap\fR] \fIip\fR"
+Add physical location \fIip\fR using encapsulation \fIencap\fR to the
+local mac binding table for multicast Ethernet address \fImac\fR on
+\fIlswitch\fR. If \fIencap\fR is not specified, the default is
+"vxlan_over_ipv4". The local mappings are used by the VTEP to refer to
+MACs learned on its physical ports.
+.
+.IP "\fBdel\-mcast\-local \fIlswitch mac\fR [\fIencap\fR] \fIip\fR"
+Remove physical location \fIip\fR using encapsulation \fIencap\fR from
+the local mac binding table for multicast Ethernet address \fImac\fR on
+\fIlswitch\fR. If \fIencap\fR is not specified, the default is
+"vxlan_over_ipv4". The local mappings are used by the VTEP to refer to
+MACs learned on its physical ports.
+.
+.IP "\fBclear\-local\-macs \fIlswitch\fR"
+Clear the local MAC bindings for \fIlswitch\fR.
+.
+.IP "\fBlist\-local\-macs \fIlswitch\fR"
+List the local MAC bindings for \fIlswitch\fR, one per line.
+.
+.SS "Remote MAC Binding Commands"
+These commands examine and manipulate local and remote MAC bindings for
+the logical switch. The remote maps are written by the network
+virtualization controller to refer to MACs that it has learned.
+.
+.IP "\fBadd\-ucast\-remote \fIlswitch mac\fR [\fIencap\fR] \fIip\fR"
+Map the unicast Ethernet address \fImac\fR to the physical location
+\fIip\fR using encapsulation \fIencap\fR on \fIlswitch\fR. If
+\fIencap\fR is not specified, the default is "vxlan_over_ipv4". The
+remote mappings are used by the network virtualization platform to refer
+to MACs that it has learned.
+.
+.IP "\fBdel\-ucast\-remote \fIlswitch mac\fR"
+Remove the remote unicast Ethernet address \fImac\fR map from
+\fIlswitch\fR. The remote mappings are used by the network
+virtualization platform to refer to MACs that it has learned.
+.
+.IP "\fBadd\-mcast\-remote \fIlswitch mac\fR [\fIencap\fR] \fIip\fR"
+Add physical location \fIip\fR using encapsulation \fIencap\fR to the
+remote mac binding table for multicast Ethernet address \fImac\fR on
+\fIlswitch\fR. If \fIencap\fR is not specified, the default is
+"vxlan_over_ipv4". The remote mappings are used by the network
+virtualization platform to refer to MACs that it has learned.
+.
+.IP "\fBdel\-mcast\-remote \fIlswitch mac\fR [\fIencap\fR] \fIip\fR"
+Remove physical location \fIip\fR using encapsulation \fIencap\fR from
+the remote mac binding table for multicast Ethernet address \fImac\fR on
+\fIlswitch\fR. If \fIencap\fR is not specified, the default is
+"vxlan_over_ipv4". The remote mappings are used by the network
+virtualization platform to refer to MACs that it has learned.
+.
+.IP "\fBclear\-remote\-macs \fIlswitch\fR"
+Clear the remote MAC bindings for \fIlswitch\fR.
+.
+.IP "\fBlist\-remote\-macs \fIlswitch\fR"
+List the remote MAC bindings for \fIlswitch\fR, one per line.
+.
+.SS "Manager Connectivity"
+.
+These commands manipulate the \fBmanagers\fR column in the \fBGlobal\fR
+table and rows in the \fBManagers\fR table. When \fBovsdb\-server\fR is
+configured to use the \fBmanagers\fR column for OVSDB connections (as
+described in \fBINSTALL.Linux\fR and in the startup scripts provided
+with Open vSwitch), this allows the administrator to use \fBvtep\-ctl\fR
+to configure database connections.
+.
+.IP "\fBget\-manager\fR"
+Prints the configured manager(s).
+.
+.IP "\fBdel\-manager\fR"
+Deletes the configured manager(s).
+.
+.IP "\fBset\-manager\fR \fItarget\fR\&..."
+Sets the configured manager target or targets. Each \fItarget\fR may
+use any of the following forms:
+.
+.RS
+.so ovsdb/remote-active.man
+.so ovsdb/remote-passive.man
+.RE
+.
+.SS "Database Commands"
+.
+These commands query and modify the contents of \fBovsdb\fR tables.
+They are a slight abstraction of the \fBovsdb\fR interface and as such
+they operate at a lower level than other \fBvtep\-ctl\fR commands.
+.PP
+.ST "Identifying Tables, Records, and Columns"
+.PP
+Each of these commands has a \fItable\fR parameter to identify a table
+within the database. Many of them also take a \fIrecord\fR parameter
+that identifies a particular record within a table. The \fIrecord\fR
+parameter may be the UUID for a record, and many tables offer
+additional ways to identify records. Some commands also take
+\fIcolumn\fR parameters that identify a particular field within the
+records in a table.
+.PP
+The following tables are currently defined:
+.IP "\fBGlobal\fR"
+Top-level configuration for a hardware VTEP. This table contains
+exactly one record, identified by specifying \fB.\fR as the record name.
+.IP "\fBManager\fR"
+Configuration for an OVSDB connection. Records may be identified
+by target (e.g. \fBtcp:1.2.3.4\fR).
+.IP "\fBPhysical_Switch\fR"
+A physical switch that implements a VTEP. Records may be identified by
+physical switch name.
+.IP "\fBPhysical_Port\fR"
+A port within a physical switch.
+.IP "\fBLogical_Binding_Stats\fR"
+Reports statistics for the logical switch with which a VLAN on a
+physical port is associated.
+.IP "\fBLogical_Switch\fR"
+A logical Ethernet switch. Records may be identified by logical switch
+name.
+.IP "\fBUcast_Macs_Local\fR"
+Mapping of locally discovered unicast MAC addresses to tunnels.
+.IP "\fBUcast_Macs_Remote\fR"
+Mapping of remotely programmed unicast MAC addresses to tunnels.
+.IP "\fBMcast_Macs_Local\fR"
+Mapping of locally discovered multicast MAC addresses to tunnels.
+.IP "\fBMcast_Macs_Remote\fR"
+Mapping of remotely programmed multicast MAC addresses to tunnels.
+.IP "\fBPhysical_Locator_Set\fR"
+A set of one or more physical locators.
+.IP "\fBPhysical_Locator\fR"
+Identifies an endpoint to which logical switch traffic may be
+encapsulated and forwarded. Records may be identified by physical
+locator name.
+.PP
+Record names must be specified in full and with correct
+capitalization. Names of tables and columns are not case-sensitive,
+and \fB\-\-\fR and \fB_\fR are treated interchangeably. Unique
+abbreviations are acceptable, e.g. \fBman\fR or \fBm\fR is sufficient
+to identify the \fBManager\fR table.
+.
+.ST "Database Values"
+.PP
+Each column in the database accepts a fixed type of data. The
+currently defined basic types, and their representations, are:
+.IP "integer"
+A decimal integer in the range \-2**63 to 2**63\-1, inclusive.
+.IP "real"
+A floating-point number.
+.IP "Boolean"
+True or false, written \fBtrue\fR or \fBfalse\fR, respectively.
+.IP "string"
+An arbitrary Unicode string, except that null bytes are not allowed.
+Quotes are optional for most strings that begin with an English letter
+or underscore and consist only of letters, underscores, hyphens, and
+periods. However, \fBtrue\fR and \fBfalse\fR and strings that match
+the syntax of UUIDs (see below) must be enclosed in double quotes to
+distinguish them from other basic types. When double quotes are used,
+the syntax is that of strings in JSON, e.g. backslashes may be used to
+escape special characters. The empty string must be represented as a
+pair of double quotes (\fB""\fR).
+.IP "UUID"
+Either a universally unique identifier in the style of RFC 4122,
+e.g. \fBf81d4fae\-7dec\-11d0\-a765\-00a0c91e6bf6\fR, or an \fB@\fIname\fR
+defined by a \fBget\fR or \fBcreate\fR command within the same \fBvtep\-ctl\fR
+invocation.
+.PP
+Multiple values in a single column may be separated by spaces or a
+single comma. When multiple values are present, duplicates are not
+allowed, and order is not important. Conversely, some database
+columns can have an empty set of values, represented as \fB[]\fR, and
+square brackets may optionally enclose other non-empty sets or single
+values as well.
+.PP
+A few database columns are ``maps'' of key-value pairs, where the key
+and the value are each some fixed database type. These are specified
+in the form \fIkey\fB=\fIvalue\fR, where \fIkey\fR and \fIvalue\fR
+follow the syntax for the column's key type and value type,
+respectively. When multiple pairs are present (separated by spaces or
+a comma), duplicate keys are not allowed, and again the order is not
+important. Duplicate values are allowed. An empty map is represented
+as \fB{}\fR. Curly braces may optionally enclose non-empty maps as
+well (but use quotes to prevent the shell from expanding
+\fBother-config={0=x,1=y}\fR into \fBother-config=0=x
+other-config=1=y\fR, which may not have the desired effect).
+.
+.ST "Database Command Syntax"
+.IP "[\fB\-\-columns=\fIcolumn\fR[\fB,\fIcolumn\fR]...] \fBlist \fItable \fR[\fIrecord\fR]..."
+Lists the data in each specified \fIrecord\fR. If no
+records are specified, lists all the records in \fItable\fR.
+.IP
+If \fB\-\-columns\fR is specified, only the requested columns are
+listed, in the specified order. Otherwise, all columns are listed, in
+alphabetical order by column name.
+.
+.IP "[\fB\-\-columns=\fIcolumn\fR[\fB,\fIcolumn\fR]...] \fBfind \fItable \fR[\fIcolumn\fR[\fB:\fIkey\fR]\fB=\fIvalue\fR]..."
+Lists the data in each record in \fItable\fR whose \fIcolumn\fR equals
+\fIvalue\fR or, if \fIkey\fR is specified, whose \fIcolumn\fR contains
+a \fIkey\fR with the specified \fIvalue\fR. The following operators
+may be used where \fB=\fR is written in the syntax summary:
+.RS
+.IP "\fB= != < > <= >=\fR"
+Selects records in which \fIcolumn\fR[\fB:\fIkey\fR] equals, does not
+equal, is less than, is greater than, is less than or equal to, or is
+greater than or equal to \fIvalue\fR, respectively.
+.IP
+Consider \fIcolumn\fR[\fB:\fIkey\fR] and \fIvalue\fR as sets of
+elements. Identical sets are considered equal. Otherwise, if the
+sets have different numbers of elements, then the set with more
+elements is considered to be larger. Otherwise, consider a element
+from each set pairwise, in increasing order within each set. The
+first pair that differs determines the result. (For a column that
+contains key-value pairs, first all the keys are compared, and values
+are considered only if the two sets contain identical keys.)
+.IP "\fB{=} {!=}\fR"
+Test for set equality or inequality, respectively.
+.IP "\fB{<=}\fR"
+Selects records in which \fIcolumn\fR[\fB:\fIkey\fR] is a subset of
+\fIvalue\fR. For example, \fBflood-vlans{<=}1,2\fR selects records in
+which the \fBflood-vlans\fR column is the empty set or contains 1 or 2
+or both.
+.IP "\fB{<}\fR"
+Selects records in which \fIcolumn\fR[\fB:\fIkey\fR] is a proper
+subset of \fIvalue\fR. For example, \fBflood-vlans{<}1,2\fR selects
+records in which the \fBflood-vlans\fR column is the empty set or
+contains 1 or 2 but not both.
+.IP "\fB{>=} {>}\fR"
+Same as \fB{<=}\fR and \fB{<}\fR, respectively, except that the
+relationship is reversed. For example, \fBflood-vlans{>=}1,2\fR
+selects records in which the \fBflood-vlans\fR column contains both 1
+and 2.
+.RE
+.IP
+For arithmetic operators (\fB= != < > <= >=\fR), when \fIkey\fR is
+specified but a particular record's \fIcolumn\fR does not contain
+\fIkey\fR, the record is always omitted from the results. Thus, the
+condition \fBother-config:mtu!=1500\fR matches records that have a
+\fBmtu\fR key whose value is not 1500, but not those that lack an
+\fBmtu\fR key.
+.IP
+For the set operators, when \fIkey\fR is specified but a particular
+record's \fIcolumn\fR does not contain \fIkey\fR, the comparison is
+done against an empty set. Thus, the condition
+\fBother-config:mtu{!=}1500\fR matches records that have a \fBmtu\fR
+key whose value is not 1500 and those that lack an \fBmtu\fR key.
+.IP
+Don't forget to escape \fB<\fR or \fB>\fR from interpretation by the
+shell.
+.IP
+If \fB\-\-columns\fR is specified, only the requested columns are
+listed, in the specified order. Otherwise all columns are listed, in
+alphabetical order by column name.
+.IP
+The UUIDs shown for rows created in the same \fBvtep\-ctl\fR
+invocation will be wrong.
+.
+.IP "[\fB\-\-id=@\fIname\fR] [\fB\-\-if\-exists\fR] \fBget \fItable record \fR[\fIcolumn\fR[\fB:\fIkey\fR]]..."
+Prints the value of each specified \fIcolumn\fR in the given
+\fIrecord\fR in \fItable\fR. For map columns, a \fIkey\fR may
+optionally be specified, in which case the value associated with
+\fIkey\fR in the column is printed, instead of the entire map.
+.IP
+For a map column, without \fB\-\-if\-exists\fR it is an error if
+\fIkey\fR does not exist; with it, a blank line is printed. If
+\fIcolumn\fR is not a map column or if \fIkey\fR is not specified,
+\fB\-\-if\-exists\fR has no effect.
+.IP
+If \fB@\fIname\fR is specified, then the UUID for \fIrecord\fR may be
+referred to by that name later in the same \fBvtep\-ctl\fR
+invocation in contexts where a UUID is expected.
+.IP
+Both \fB\-\-id\fR and the \fIcolumn\fR arguments are optional, but
+usually at least one or the other should be specified. If both are
+omitted, then \fBget\fR has no effect except to verify that
+\fIrecord\fR exists in \fItable\fR.
+.
+.IP "\fBset \fItable record column\fR[\fB:\fIkey\fR]\fB=\fIvalue\fR..."
+Sets the value of each specified \fIcolumn\fR in the given
+\fIrecord\fR in \fItable\fR to \fIvalue\fR. For map columns, a
+\fIkey\fR may optionally be specified, in which case the value
+associated with \fIkey\fR in that column is changed (or added, if none
+exists), instead of the entire map.
+.
+.IP "\fBadd \fItable record column \fR[\fIkey\fB=\fR]\fIvalue\fR..."
+Adds the specified value or key-value pair to \fIcolumn\fR in
+\fIrecord\fR in \fItable\fR. If \fIcolumn\fR is a map, then \fIkey\fR
+is required, otherwise it is prohibited. If \fIkey\fR already exists
+in a map column, then the current \fIvalue\fR is not replaced (use the
+\fBset\fR command to replace an existing value).
+.
+.IP "\fBremove \fItable record column \fR\fIvalue\fR..."
+.IQ "\fBremove \fItable record column \fR\fIkey\fR..."
+.IQ "\fBremove \fItable record column \fR\fIkey\fB=\fR\fIvalue\fR..."
+Removes the specified values or key-value pairs from \fIcolumn\fR in
+\fIrecord\fR in \fItable\fR. The first form applies to columns that
+are not maps: each specified \fIvalue\fR is removed from the column.
+The second and third forms apply to map columns: if only a \fIkey\fR
+is specified, then any key-value pair with the given \fIkey\fR is
+removed, regardless of its value; if a \fIvalue\fR is given then a
+pair is removed only if both key and value match.
+.IP
+It is not an error if the column does not contain the specified key or
+value or pair.
+.
+.IP "\fBclear\fR \fItable record column\fR..."
+Sets each \fIcolumn\fR in \fIrecord\fR in \fItable\fR to the empty set
+or empty map, as appropriate. This command applies only to columns
+that are allowed to be empty.
+.
+.IP "[\fB\-\-id=@\fIname\fR] \fBcreate\fR \fItable column\fR[\fB:\fIkey\fR]\fB=\fIvalue\fR..."
+Creates a new record in \fItable\fR and sets the initial values of
+each \fIcolumn\fR. Columns not explicitly set will receive their
+default values. Outputs the UUID of the new row.
+.IP
+If \fB@\fIname\fR is specified, then the UUID for the new row may be
+referred to by that name elsewhere in the same \fBvtep\-ctl\fR
+invocation in contexts where a UUID is expected. Such references may
+precede or follow the \fBcreate\fR command.
+.IP
+Records in the Open vSwitch database are significant only when they
+can be reached directly or indirectly from the \fBOpen_vSwitch\fR
+table. Except for records in the \fBQoS\fR or \fBQueue\fR tables,
+records that are not reachable from the \fBOpen_vSwitch\fR table are
+automatically deleted from the database. This deletion happens
+immediately, without waiting for additional \fBvtep\-ctl\fR commands
+or other database activity. Thus, a \fBcreate\fR command must
+generally be accompanied by additional commands \fIwithin the same
+\fBvtep\-ctl\fI invocation\fR to add a chain of references to the
+newly created record from the top-level \fBOpen_vSwitch\fR record.
+The \fBEXAMPLES\fR section gives some examples that show how to do
+this.
+.
+.IP "\fR[\fB\-\-if\-exists\fR] \fBdestroy \fItable record\fR..."
+Deletes each specified \fIrecord\fR from \fItable\fR. Unless
+\fB\-\-if\-exists\fR is specified, each \fIrecord\fRs must exist.
+.IP "\fB\-\-all destroy \fItable\fR"
+Deletes all records from the \fItable\fR.
+.IP
+The \fBdestroy\fR command is only useful for records in the \fBQoS\fR
+or \fBQueue\fR tables. Records in other tables are automatically
+deleted from the database when they become unreachable from the
+\fBOpen_vSwitch\fR table. This means that deleting the last reference
+to a record is sufficient for deleting the record itself. For records
+in these tables, \fBdestroy\fR is silently ignored. See the
+\fBEXAMPLES\fR section below for more information.
+.
+.IP "\fBwait\-until \fItable record \fR[\fIcolumn\fR[\fB:\fIkey\fR]\fB=\fIvalue\fR]..."
+Waits until \fItable\fR contains a record named \fIrecord\fR whose
+\fIcolumn\fR equals \fIvalue\fR or, if \fIkey\fR is specified, whose
+\fIcolumn\fR contains a \fIkey\fR with the specified \fIvalue\fR. Any
+of the operators \fB!=\fR, \fB<\fR, \fB>\fR, \fB<=\fR, or \fB>=\fR may
+be substituted for \fB=\fR to test for inequality, less than, greater
+than, less than or equal to, or greater than or equal to,
+respectively. (Don't forget to escape \fB<\fR or \fB>\fR from
+interpretation by the shell.)
+.IP
+If no \fIcolumn\fR[\fB:\fIkey\fR]\fB=\fIvalue\fR arguments are given,
+this command waits only until \fIrecord\fR exists. If more than one
+such argument is given, the command waits until all of them are
+satisfied.
+.IP
+Consider specifying \fB\-\-timeout=0\fR along with
+\fB\-\-wait\-until\fR, to prevent \fBvtep\-ctl\fR from terminating
+after waiting only at most 5 seconds.
+.IP "\fBcomment \fR[\fIarg\fR]..."
+This command has no effect on behavior, but any database log record
+created by the command will include the command and its arguments.
+.PP
+.SH "EXIT STATUS"
+.IP "0"
+Successful program execution.
+.IP "1"
+Usage, syntax, or configuration file error.
+.IP "2"
+The \fIswitch\fR argument to \fBps\-exists\fR specified the name of a
+physical switch that does not exist.
+.SH "SEE ALSO"
+.
+.BR ovsdb\-server (1),
+.BR vtep (5).
diff --git a/vtep/vtep-ctl.c b/vtep/vtep-ctl.c
new file mode 100644
index 000000000..7b904f625
--- /dev/null
+++ b/vtep/vtep-ctl.c
@@ -0,0 +1,3890 @@
+/*
+ * Copyright (c) 2009, 2010, 2011, 2012 Nicira, Inc.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at:
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <config.h>
+
+#include <ctype.h>
+#include <errno.h>
+#include <float.h>
+#include <getopt.h>
+#include <inttypes.h>
+#include <signal.h>
+#include <stdarg.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+
+#include "command-line.h"
+#include "compiler.h"
+#include "dirs.h"
+#include "dynamic-string.h"
+#include "hash.h"
+#include "json.h"
+#include "ovsdb-data.h"
+#include "ovsdb-idl.h"
+#include "poll-loop.h"
+#include "process.h"
+#include "stream.h"
+#include "stream-ssl.h"
+#include "smap.h"
+#include "sset.h"
+#include "svec.h"
+#include "lib/vtep-idl.h"
+#include "table.h"
+#include "timeval.h"
+#include "util.h"
+#include "vconn.h"
+#include "vlog.h"
+
+VLOG_DEFINE_THIS_MODULE(vtep_ctl);
+
+/* vtep_ctl_fatal() also logs the error, so it is preferred in this file. */
+#define ovs_fatal please_use_vtep_ctl_fatal_instead_of_ovs_fatal
+
+struct vtep_ctl_context;
+
+/* A command supported by vtep-ctl. */
+struct vtep_ctl_command_syntax {
+ const char *name; /* e.g. "add-ps" */
+ int min_args; /* Min number of arguments following name. */
+ int max_args; /* Max number of arguments following name. */
+
+ /* If nonnull, calls ovsdb_idl_add_column() or ovsdb_idl_add_table() for
+ * each column or table in ctx->idl that it uses. */
+ void (*prerequisites)(struct vtep_ctl_context *ctx);
+
+ /* Does the actual work of the command and puts the command's output, if
+ * any, in ctx->output or ctx->table.
+ *
+ * Alternatively, if some prerequisite of the command is not met and the
+ * caller should wait for something to change and then retry, it may set
+ * ctx->try_again to true. (Only the "wait-until" command currently does
+ * this.) */
+ void (*run)(struct vtep_ctl_context *ctx);
+
+ /* If nonnull, called after the transaction has been successfully
+ * committed. ctx->output is the output from the "run" function, which
+ * this function may modify and otherwise postprocess as needed. (Only the
+ * "create" command currently does any postprocessing.) */
+ void (*postprocess)(struct vtep_ctl_context *ctx);
+
+ /* A comma-separated list of supported options, e.g. "--a,--b", or the
+ * empty string if the command does not support any options. */
+ const char *options;
+ enum { RO, RW } mode; /* Does this command modify the database? */
+};
+
+struct vtep_ctl_command {
+ /* Data that remains constant after initialization. */
+ const struct vtep_ctl_command_syntax *syntax;
+ int argc;
+ char **argv;
+ struct shash options;
+
+ /* Data modified by commands. */
+ struct ds output;
+ struct table *table;
+};
+
+/* --db: The database server to contact. */
+static const char *db;
+
+/* --oneline: Write each command's output as a single line? */
+static bool oneline;
+
+/* --dry-run: Do not commit any changes. */
+static bool dry_run;
+
+/* --timeout: Time to wait for a connection to 'db'. */
+static int timeout;
+
+/* Format for table output. */
+static struct table_style table_style = TABLE_STYLE_DEFAULT;
+
+/* All supported commands. */
+static const struct vtep_ctl_command_syntax all_commands[];
+
+/* The IDL we're using and the current transaction, if any.
+ * This is for use by vtep_ctl_exit() only, to allow it to clean up.
+ * Other code should use its context arguments. */
+static struct ovsdb_idl *the_idl;
+static struct ovsdb_idl_txn *the_idl_txn;
+
+static void vtep_ctl_exit(int status) NO_RETURN;
+static void vtep_ctl_fatal(const char *, ...) PRINTF_FORMAT(1, 2) NO_RETURN;
+static char *default_db(void);
+static void usage(void) NO_RETURN;
+static void parse_options(int argc, char *argv[], struct shash *local_options);
+static bool might_write_to_db(char **argv);
+
+static struct vtep_ctl_command *parse_commands(int argc, char *argv[],
+ struct shash *local_options,
+ size_t *n_commandsp);
+static void parse_command(int argc, char *argv[], struct shash *local_options,
+ struct vtep_ctl_command *);
+static const struct vtep_ctl_command_syntax *find_command(const char *name);
+static void run_prerequisites(struct vtep_ctl_command[], size_t n_commands,
+ struct ovsdb_idl *);
+static void do_vtep_ctl(const char *args, struct vtep_ctl_command *, size_t n,
+ struct ovsdb_idl *);
+
+static const struct vtep_ctl_table_class *get_table(const char *table_name);
+static void set_column(const struct vtep_ctl_table_class *,
+ const struct ovsdb_idl_row *, const char *arg,
+ struct ovsdb_symbol_table *);
+
+static bool is_condition_satisfied(const struct vtep_ctl_table_class *,
+ const struct ovsdb_idl_row *,
+ const char *arg,
+ struct ovsdb_symbol_table *);
+
+static struct vtep_ctl_lswitch *find_lswitch(struct vtep_ctl_context *,
+ const char *name,
+ bool must_exist);
+
+int
+main(int argc, char *argv[])
+{
+ extern struct vlog_module VLM_reconnect;
+ struct ovsdb_idl *idl;
+ struct vtep_ctl_command *commands;
+ struct shash local_options;
+ unsigned int seqno;
+ size_t n_commands;
+ char *args;
+
+ set_program_name(argv[0]);
+ signal(SIGPIPE, SIG_IGN);
+ vlog_set_levels(NULL, VLF_CONSOLE, VLL_WARN);
+ vlog_set_levels(&VLM_reconnect, VLF_ANY_FACILITY, VLL_WARN);
+ vteprec_init();
+
+ /* Log our arguments. This is often valuable for debugging systems. */
+ args = process_escape_args(argv);
+ VLOG(might_write_to_db(argv) ? VLL_INFO : VLL_DBG, "Called as %s", args);
+
+ /* Parse command line. */
+ shash_init(&local_options);
+ parse_options(argc, argv, &local_options);
+ commands = parse_commands(argc - optind, argv + optind, &local_options,
+ &n_commands);
+
+ if (timeout) {
+ time_alarm(timeout);
+ }
+
+ /* Initialize IDL. */
+ idl = the_idl = ovsdb_idl_create(db, &vteprec_idl_class, false, false);
+ run_prerequisites(commands, n_commands, idl);
+
+ /* Execute the commands.
+ *
+ * 'seqno' is the database sequence number for which we last tried to
+ * execute our transaction. There's no point in trying to commit more than
+ * once for any given sequence number, because if the transaction fails
+ * it's because the database changed and we need to obtain an up-to-date
+ * view of the database before we try the transaction again. */
+ seqno = ovsdb_idl_get_seqno(idl);
+ for (;;) {
+ ovsdb_idl_run(idl);
+
+ if (seqno != ovsdb_idl_get_seqno(idl)) {
+ seqno = ovsdb_idl_get_seqno(idl);
+ do_vtep_ctl(args, commands, n_commands, idl);
+ }
+
+ if (seqno == ovsdb_idl_get_seqno(idl)) {
+ ovsdb_idl_wait(idl);
+ poll_block();
+ }
+ }
+}
+
+static struct option *
+find_option(const char *name, struct option *options, size_t n_options)
+{
+ size_t i;
+
+ for (i = 0; i < n_options; i++) {
+ if (!strcmp(options[i].name, name)) {
+ return &options[i];
+ }
+ }
+ return NULL;
+}
+
+static struct option *
+add_option(struct option **optionsp, size_t *n_optionsp,
+ size_t *allocated_optionsp)
+{
+ if (*n_optionsp >= *allocated_optionsp) {
+ *optionsp = x2nrealloc(*optionsp, allocated_optionsp,
+ sizeof **optionsp);
+ }
+ return &(*optionsp)[(*n_optionsp)++];
+}
+
+static void
+parse_options(int argc, char *argv[], struct shash *local_options)
+{
+ enum {
+ OPT_DB = UCHAR_MAX + 1,
+ OPT_ONELINE,
+ OPT_NO_SYSLOG,
+ OPT_DRY_RUN,
+ OPT_PEER_CA_CERT,
+ OPT_LOCAL,
+ VLOG_OPTION_ENUMS,
+ TABLE_OPTION_ENUMS
+ };
+ static const struct option global_long_options[] = {
+ {"db", required_argument, NULL, OPT_DB},
+ {"no-syslog", no_argument, NULL, OPT_NO_SYSLOG},
+ {"dry-run", no_argument, NULL, OPT_DRY_RUN},
+ {"oneline", no_argument, NULL, OPT_ONELINE},
+ {"timeout", required_argument, NULL, 't'},
+ {"help", no_argument, NULL, 'h'},
+ {"version", no_argument, NULL, 'V'},
+ VLOG_LONG_OPTIONS,
+ TABLE_LONG_OPTIONS,
+ STREAM_SSL_LONG_OPTIONS,
+ {"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
+ {NULL, 0, NULL, 0},
+ };
+ const int n_global_long_options = ARRAY_SIZE(global_long_options) - 1;
+ char *tmp, *short_options;
+
+ const struct vtep_ctl_command_syntax *p;
+ struct option *options, *o;
+ size_t allocated_options;
+ size_t n_options;
+ size_t i;
+
+ tmp = long_options_to_short_options(global_long_options);
+ short_options = xasprintf("+%s", tmp);
+ free(tmp);
+
+ /* We want to parse both global and command-specific options here, but
+ * getopt_long() isn't too convenient for the job. We copy our global
+ * options into a dynamic array, then append all of the command-specific
+ * options. */
+ options = xmemdup(global_long_options, sizeof global_long_options);
+ allocated_options = ARRAY_SIZE(global_long_options);
+ n_options = n_global_long_options;
+ for (p = all_commands; p->name; p++) {
+ if (p->options[0]) {
+ char *save_ptr = NULL;
+ char *name;
+ char *s;
+
+ s = xstrdup(p->options);
+ for (name = strtok_r(s, ",", &save_ptr); name != NULL;
+ name = strtok_r(NULL, ",", &save_ptr)) {
+ char *equals;
+ int has_arg;
+
+ ovs_assert(name[0] == '-' && name[1] == '-' && name[2]);
+ name += 2;
+
+ equals = strchr(name, '=');
+ if (equals) {
+ has_arg = required_argument;
+ *equals = '\0';
+ } else {
+ has_arg = no_argument;
+ }
+
+ o = find_option(name, options, n_options);
+ if (o) {
+ ovs_assert(o - options >= n_global_long_options);
+ ovs_assert(o->has_arg == has_arg);
+ } else {
+ o = add_option(&options, &n_options, &allocated_options);
+ o->name = xstrdup(name);
+ o->has_arg = has_arg;
+ o->flag = NULL;
+ o->val = OPT_LOCAL;
+ }
+ }
+
+ free(s);
+ }
+ }
+ o = add_option(&options, &n_options, &allocated_options);
+ memset(o, 0, sizeof *o);
+
+ table_style.format = TF_LIST;
+
+ for (;;) {
+ int idx;
+ int c;
+
+ c = getopt_long(argc, argv, short_options, options, &idx);
+ if (c == -1) {
+ break;
+ }
+
+ switch (c) {
+ case OPT_DB:
+ db = optarg;
+ break;
+
+ case OPT_ONELINE:
+ oneline = true;
+ break;
+
+ case OPT_NO_SYSLOG:
+ vlog_set_levels(&VLM_vtep_ctl, VLF_SYSLOG, VLL_WARN);
+ break;
+
+ case OPT_DRY_RUN:
+ dry_run = true;
+ break;
+
+ case OPT_LOCAL:
+ if (shash_find(local_options, options[idx].name)) {
+ vtep_ctl_fatal("'%s' option specified multiple times",
+ options[idx].name);
+ }
+ shash_add_nocopy(local_options,
+ xasprintf("--%s", options[idx].name),
+ optarg ? xstrdup(optarg) : NULL);
+ break;
+
+ case 'h':
+ usage();
+
+ case 'V':
+ ovs_print_version(0, 0);
+ exit(EXIT_SUCCESS);
+
+ case 't':
+ timeout = strtoul(optarg, NULL, 10);
+ if (timeout < 0) {
+ vtep_ctl_fatal("value %s on -t or --timeout is invalid",
+ optarg);
+ }
+ break;
+
+ VLOG_OPTION_HANDLERS
+ TABLE_OPTION_HANDLERS(&table_style)
+
+ STREAM_SSL_OPTION_HANDLERS
+
+ case OPT_PEER_CA_CERT:
+ stream_ssl_set_peer_ca_cert_file(optarg);
+ break;
+
+ case '?':
+ exit(EXIT_FAILURE);
+
+ default:
+ abort();
+ }
+ }
+ free(short_options);
+
+ if (!db) {
+ db = default_db();
+ }
+
+ for (i = n_global_long_options; options[i].name; i++) {
+ free(CONST_CAST(char *, options[i].name));
+ }
+ free(options);
+}
+
+static struct vtep_ctl_command *
+parse_commands(int argc, char *argv[], struct shash *local_options,
+ size_t *n_commandsp)
+{
+ struct vtep_ctl_command *commands;
+ size_t n_commands, allocated_commands;
+ int i, start;
+
+ commands = NULL;
+ n_commands = allocated_commands = 0;
+
+ for (start = i = 0; i <= argc; i++) {
+ if (i == argc || !strcmp(argv[i], "--")) {
+ if (i > start) {
+ if (n_commands >= allocated_commands) {
+ struct vtep_ctl_command *c;
+
+ commands = x2nrealloc(commands, &allocated_commands,
+ sizeof *commands);
+ for (c = commands; c < &commands[n_commands]; c++) {
+ shash_moved(&c->options);
+ }
+ }
+ parse_command(i - start, &argv[start], local_options,
+ &commands[n_commands++]);
+ } else if (!shash_is_empty(local_options)) {
+ vtep_ctl_fatal("missing command name (use --help for help)");
+ }
+ start = i + 1;
+ }
+ }
+ if (!n_commands) {
+ vtep_ctl_fatal("missing command name (use --help for help)");
+ }
+ *n_commandsp = n_commands;
+ return commands;
+}
+
+static void
+parse_command(int argc, char *argv[], struct shash *local_options,
+ struct vtep_ctl_command *command)
+{
+ const struct vtep_ctl_command_syntax *p;
+ struct shash_node *node;
+ int n_arg;
+ int i;
+
+ shash_init(&command->options);
+ shash_swap(local_options, &command->options);
+ for (i = 0; i < argc; i++) {
+ const char *option = argv[i];
+ const char *equals;
+ char *key, *value;
+
+ if (option[0] != '-') {
+ break;
+ }
+
+ equals = strchr(option, '=');
+ if (equals) {
+ key = xmemdup0(option, equals - option);
+ value = xstrdup(equals + 1);
+ } else {
+ key = xstrdup(option);
+ value = NULL;
+ }
+
+ if (shash_find(&command->options, key)) {
+ vtep_ctl_fatal("'%s' option specified multiple times", argv[i]);
+ }
+ shash_add_nocopy(&command->options, key, value);
+ }
+ if (i == argc) {
+ vtep_ctl_fatal("missing command name (use --help for help)");
+ }
+
+ p = find_command(argv[i]);
+ if (!p) {
+ vtep_ctl_fatal("unknown command '%s'; use --help for help", argv[i]);
+ }
+
+ SHASH_FOR_EACH (node, &command->options) {
+ const char *s = strstr(p->options, node->name);
+ int end = s ? s[strlen(node->name)] : EOF;
+
+ if (end != '=' && end != ',' && end != ' ' && end != '\0') {
+ vtep_ctl_fatal("'%s' command has no '%s' option",
+ argv[i], node->name);
+ }
+ if ((end == '=') != (node->data != NULL)) {
+ if (end == '=') {
+ vtep_ctl_fatal("missing argument to '%s' option on '%s' "
+ "command", node->name, argv[i]);
+ } else {
+ vtep_ctl_fatal("'%s' option on '%s' does not accept an "
+ "argument", node->name, argv[i]);
+ }
+ }
+ }
+
+ n_arg = argc - i - 1;
+ if (n_arg < p->min_args) {
+ vtep_ctl_fatal("'%s' command requires at least %d arguments",
+ p->name, p->min_args);
+ } else if (n_arg > p->max_args) {
+ int j;
+
+ for (j = i + 1; j < argc; j++) {
+ if (argv[j][0] == '-') {
+ vtep_ctl_fatal("'%s' command takes at most %d arguments "
+ "(note that options must precede command "
+ "names and follow a \"--\" argument)",
+ p->name, p->max_args);
+ }
+ }
+
+ vtep_ctl_fatal("'%s' command takes at most %d arguments",
+ p->name, p->max_args);
+ }
+
+ command->syntax = p;
+ command->argc = n_arg + 1;
+ command->argv = &argv[i];
+}
+
+/* Returns the "struct vtep_ctl_command_syntax" for a given command 'name', or a
+ * null pointer if there is none. */
+static const struct vtep_ctl_command_syntax *
+find_command(const char *name)
+{
+ static struct shash commands = SHASH_INITIALIZER(&commands);
+
+ if (shash_is_empty(&commands)) {
+ const struct vtep_ctl_command_syntax *p;
+
+ for (p = all_commands; p->name; p++) {
+ shash_add_assert(&commands, p->name, p);
+ }
+ }
+
+ return shash_find_data(&commands, name);
+}
+
+static void
+vtep_ctl_fatal(const char *format, ...)
+{
+ char *message;
+ va_list args;
+
+ va_start(args, format);
+ message = xvasprintf(format, args);
+ va_end(args);
+
+ vlog_set_levels(&VLM_vtep_ctl, VLF_CONSOLE, VLL_OFF);
+ VLOG_ERR("%s", message);
+ ovs_error(0, "%s", message);
+ vtep_ctl_exit(EXIT_FAILURE);
+}
+
+/* Frees the current transaction and the underlying IDL and then calls
+ * exit(status).
+ *
+ * Freeing the transaction and the IDL is not strictly necessary, but it makes
+ * for a clean memory leak report from valgrind in the normal case. That makes
+ * it easier to notice real memory leaks. */
+static void
+vtep_ctl_exit(int status)
+{
+ if (the_idl_txn) {
+ ovsdb_idl_txn_abort(the_idl_txn);
+ ovsdb_idl_txn_destroy(the_idl_txn);
+ }
+ ovsdb_idl_destroy(the_idl);
+ exit(status);
+}
+
+static void
+usage(void)
+{
+ printf("\
+%s: VTEP configuration utility\n\
+usage: %s [OPTIONS] COMMAND [ARG...]\n\
+\n\
+Manager commands:\n\
+ get-manager print the managers\n\
+ del-manager delete the managers\n\
+ set-manager TARGET... set the list of managers to TARGET...\n\
+\n\
+Physical Switch commands:\n\
+ add-ps PS create a new physical switch named PS\n\
+ del-ps PS delete PS and all of its ports\n\
+ list-ps print the names of all the physical switches\n\
+ ps-exists PS exit 2 if PS does not exist\n\
+\n\
+Port commands:\n\
+ list-ports PS print the names of all the ports on PS\n\
+ add-port PS PORT add network device PORT to PS\n\
+ del-port PS PORT delete PORT from PS\n\
+\n\
+Logical Switch commands:\n\
+ add-ls LS create a new logical switch named LS\n\
+ del-ls LS delete LS and all of its ports\n\
+ list-ls print the names of all the logical switches\n\
+ ls-exists LS exit 2 if LS does not exist\n\
+ bind-ls PS PORT VLAN LS bind LS to VLAN on PORT\n\
+ unbind-ls PS PORT VLAN unbind logical switch on VLAN from PORT\n\
+ list-bindings PS PORT list bindings for PORT on PS\n\
+\n\
+MAC binding commands:\n\
+ add-ucast-local LS MAC [ENCAP] IP add ucast local entry in LS\n\
+ del-ucast-local LS MAC del ucast local entry from LS\n\
+ add-mcast-local LS MAC [ENCAP] IP add mcast local entry in LS\n\
+ del-mcast-local LS MAC [ENCAP] IP del mcast local entry from LS\n\
+ clear-local-macs LS clear local mac entries\n\
+ list-local-macs LS list local mac entries\n\
+ add-ucast-remote LS MAC [ENCAP] IP add ucast remote entry in LS\n\
+ del-ucast-remote LS MAC del ucast remote entry from LS\n\
+ add-mcast-remote LS MAC [ENCAP] IP add mcast remote entry in LS\n\
+ del-mcast-remote LS MAC [ENCAP] IP del mcast remote entry from LS\n\
+ clear-remote-macs LS clear remote mac entries\n\
+ list-remote-macs LS list remote mac entries\n\
+\n\
+Database commands:\n\
+ list TBL [REC] list RECord (or all records) in TBL\n\
+ find TBL CONDITION... list records satisfying CONDITION in TBL\n\
+ get TBL REC COL[:KEY] print values of COLumns in RECord in TBL\n\
+ set TBL REC COL[:KEY]=VALUE set COLumn values in RECord in TBL\n\
+ add TBL REC COL [KEY=]VALUE add (KEY=)VALUE to COLumn in RECord in TBL\n\
+ remove TBL REC COL [KEY=]VALUE remove (KEY=)VALUE from COLumn\n\
+ clear TBL REC COL clear values from COLumn in RECord in TBL\n\
+ create TBL COL[:KEY]=VALUE create and initialize new record\n\
+ destroy TBL REC delete RECord from TBL\n\
+ wait-until TBL REC [COL[:KEY]=VALUE] wait until condition is true\n\
+Potentially unsafe database commands require --force option.\n\
+\n\
+Options:\n\
+ --db=DATABASE connect to DATABASE\n\
+ (default: %s)\n\
+ -t, --timeout=SECS wait at most SECS seconds\n\
+ --dry-run do not commit changes to database\n\
+ --oneline print exactly one line of output per command\n",
+ program_name, program_name, default_db());
+ vlog_usage();
+ printf("\
+ --no-syslog equivalent to --verbose=vtep_ctl:syslog:warn\n");
+ stream_usage("database", true, true, false);
+ printf("\n\
+Other options:\n\
+ -h, --help display this help message\n\
+ -V, --version display version information\n");
+ exit(EXIT_SUCCESS);
+}
+
+static char *
+default_db(void)
+{
+ static char *def;
+ if (!def) {
+ def = xasprintf("unix:%s/db.sock", ovs_rundir());
+ }
+ return def;
+}
+
+/* Returns true if it looks like this set of arguments might modify the
+ * database, otherwise false. (Not very smart, so it's prone to false
+ * positives.) */
+static bool
+might_write_to_db(char **argv)
+{
+ for (; *argv; argv++) {
+ const struct vtep_ctl_command_syntax *p = find_command(*argv);
+ if (p && p->mode == RW) {
+ return true;
+ }
+ }
+ return false;
+}
+
+struct vtep_ctl_context {
+ /* Read-only. */
+ int argc;
+ char **argv;
+ struct shash options;
+
+ /* Modifiable state. */
+ struct ds output;
+ struct table *table;
+ struct ovsdb_idl *idl;
+ struct ovsdb_idl_txn *txn;
+ struct ovsdb_symbol_table *symtab;
+ const struct vteprec_global *vtep_global;
+ bool verified_ports;
+
+ /* A cache of the contents of the database.
+ *
+ * A command that needs to use any of this information must first
+ * call vtep_ctl_context_populate_cache(). A command that changes
+ * anything that could invalidate the cache must either call
+ * vtep_ctl_context_invalidate_cache() or manually update the cache
+ * to maintain its correctness. */
+ bool cache_valid;
+ struct shash pswitches; /* Maps from physical switch name to
+ * struct vtep_ctl_pswitch. */
+ struct shash ports; /* Maps from port name to struct vtep_ctl_port. */
+
+ struct shash lswitches; /* Maps from logical switch name to
+ * struct vtep_ctl_lswitch. */
+ struct shash plocs; /* Maps from "<encap>+<dst_ip>" to
+ * struct vteprec_physical_locator. */
+
+ /* A command may set this member to true if some prerequisite is not met
+ * and the caller should wait for something to change and then retry. */
+ bool try_again;
+};
+
+struct vtep_ctl_pswitch {
+ const struct vteprec_physical_switch *ps_cfg;
+ char *name;
+ struct list ports; /* Contains "struct vteprec_physical_port"s. */
+};
+
+struct vtep_ctl_port {
+ struct list ports_node; /* In struct vtep_ctl_pswitch's 'ports' list. */
+ const struct vteprec_physical_port *port_cfg;
+ struct vtep_ctl_pswitch *ps;
+ struct shash bindings; /* Maps from vlan to vtep_ctl_lswitch. */
+};
+
+struct vtep_ctl_lswitch {
+ const struct vteprec_logical_switch *ls_cfg;
+ char *name;
+ struct shash ucast_local; /* Maps from mac to vteprec_ucast_macs_local. */
+ struct shash ucast_remote; /* Maps from mac to vteprec_ucast_macs_remote.*/
+ struct shash mcast_local; /* Maps from mac to vtep_ctl_mcast_mac. */
+ struct shash mcast_remote; /* Maps from mac to vtep_ctl_mcast_mac. */
+};
+
+struct vtep_ctl_mcast_mac {
+ const struct vteprec_mcast_macs_local *local_cfg;
+ const struct vteprec_mcast_macs_remote *remote_cfg;
+
+ const struct vteprec_physical_locator_set *ploc_set_cfg;
+ struct list locators; /* Contains 'vtep_ctl_ploc's. */
+};
+
+struct vtep_ctl_ploc {
+ struct list locators_node; /* In struct vtep_ctl_ploc_set's 'locators'
+ list. */
+ const struct vteprec_physical_locator *ploc_cfg;
+};
+
+static void
+verify_ports(struct vtep_ctl_context *ctx)
+{
+ if (!ctx->verified_ports) {
+ const struct vteprec_physical_switch *ps;
+
+ vteprec_global_verify_switches(ctx->vtep_global);
+ VTEPREC_PHYSICAL_SWITCH_FOR_EACH (ps, ctx->idl) {
+ vteprec_physical_switch_verify_ports(ps);
+ }
+
+ ctx->verified_ports = true;
+ }
+}
+
+static struct vtep_ctl_port *
+add_port_to_cache(struct vtep_ctl_context *ctx,
+ struct vtep_ctl_pswitch *ps,
+ struct vteprec_physical_port *port_cfg)
+{
+ char *cache_name = xasprintf("%s+%s", ps->name, port_cfg->name);
+ struct vtep_ctl_port *port;
+
+ port = xmalloc(sizeof *port);
+ list_push_back(&ps->ports, &port->ports_node);
+ port->port_cfg = port_cfg;
+ port->ps = ps;
+ shash_add(&ctx->ports, cache_name, port);
+ free(cache_name);
+ shash_init(&port->bindings);
+
+ return port;
+}
+
+static void
+del_cached_port(struct vtep_ctl_context *ctx, struct vtep_ctl_port *port)
+{
+ char *cache_name = xasprintf("%s+%s", port->ps->name, port->port_cfg->name);
+
+ list_remove(&port->ports_node);
+ shash_find_and_delete(&ctx->ports, port->port_cfg->name);
+ vteprec_physical_port_delete(port->port_cfg);
+ free(cache_name);
+ free(port);
+}
+
+static struct vtep_ctl_pswitch *
+add_pswitch_to_cache(struct vtep_ctl_context *ctx,
+ struct vteprec_physical_switch *ps_cfg)
+{
+ struct vtep_ctl_pswitch *ps = xmalloc(sizeof *ps);
+ ps->ps_cfg = ps_cfg;
+ ps->name = xstrdup(ps_cfg->name);
+ list_init(&ps->ports);
+ shash_add(&ctx->pswitches, ps->name, ps);
+ return ps;
+}
+
+static void
+vtep_delete_pswitch(const struct vteprec_global *vtep_global,
+ const struct vteprec_physical_switch *ps)
+{
+ struct vteprec_physical_switch **pswitches;
+ size_t i, n;
+
+ pswitches = xmalloc(sizeof *vtep_global->switches
+ * vtep_global->n_switches);
+ for (i = n = 0; i < vtep_global->n_switches; i++) {
+ if (vtep_global->switches[i] != ps) {
+ pswitches[n++] = vtep_global->switches[i];
+ }
+ }
+ vteprec_global_set_switches(vtep_global, pswitches, n);
+ free(pswitches);
+}
+
+static void
+del_cached_pswitch(struct vtep_ctl_context *ctx, struct vtep_ctl_pswitch *ps)
+{
+ ovs_assert(list_is_empty(&ps->ports));
+ if (ps->ps_cfg) {
+ vteprec_physical_switch_delete(ps->ps_cfg);
+ vtep_delete_pswitch(ctx->vtep_global, ps->ps_cfg);
+ }
+ shash_find_and_delete(&ctx->pswitches, ps->name);
+ free(ps->name);
+ free(ps);
+}
+
+static struct vtep_ctl_lswitch *
+add_lswitch_to_cache(struct vtep_ctl_context *ctx,
+ const struct vteprec_logical_switch *ls_cfg)
+{
+ struct vtep_ctl_lswitch *ls = xmalloc(sizeof *ls);
+ ls->ls_cfg = ls_cfg;
+ ls->name = xstrdup(ls_cfg->name);
+ shash_add(&ctx->lswitches, ls->name, ls);
+ shash_init(&ls->ucast_local);
+ shash_init(&ls->ucast_remote);
+ shash_init(&ls->mcast_local);
+ shash_init(&ls->mcast_remote);
+ return ls;
+}
+
+static void
+del_cached_lswitch(struct vtep_ctl_context *ctx, struct vtep_ctl_lswitch *ls)
+{
+ if (ls->ls_cfg) {
+ vteprec_logical_switch_delete(ls->ls_cfg);
+ }
+ shash_find_and_delete(&ctx->lswitches, ls->name);
+ free(ls->name);
+ free(ls);
+}
+
+static void
+commit_ls_bindings(struct vtep_ctl_port *port)
+{
+ struct vteprec_logical_switch **binding_values;
+ int64_t *binding_keys;
+ size_t n_bindings;
+ struct shash_node *node;
+ int i;
+
+ n_bindings = shash_count(&port->bindings);
+ binding_keys = xmalloc(n_bindings * sizeof *binding_keys);
+ binding_values = xmalloc(n_bindings * sizeof *binding_values);
+
+ i = 0;
+ SHASH_FOR_EACH(node, &port->bindings) {
+ struct vtep_ctl_lswitch *ls_entry = node->data;
+
+ binding_keys[i] = strtoll(node->name, NULL, 0);
+ binding_values[i] = (struct vteprec_logical_switch *)ls_entry->ls_cfg;
+ i++;
+ }
+
+ vteprec_physical_port_set_vlan_bindings(port->port_cfg,
+ binding_keys, binding_values,
+ n_bindings);
+ free(binding_values);
+ free(binding_keys);
+}
+
+static void
+add_ls_binding_to_cache(struct vtep_ctl_port *port,
+ const char *vlan,
+ struct vtep_ctl_lswitch *ls)
+{
+ if (shash_find(&port->bindings, vlan)) {
+ vtep_ctl_fatal("multiple bindings for vlan %s", vlan);
+ }
+
+ shash_add(&port->bindings, vlan, ls);
+}
+
+static void
+del_cached_ls_binding(struct vtep_ctl_port *port, const char *vlan)
+{
+ if (!shash_find(&port->bindings, vlan)) {
+ vtep_ctl_fatal("no binding for vlan %s", vlan);
+ }
+
+ shash_find_and_delete(&port->bindings, vlan);
+}
+
+static struct vteprec_physical_locator *
+find_ploc(struct vtep_ctl_context *ctx, const char *encap,
+ const char *dst_ip)
+{
+ struct vteprec_physical_locator *ploc;
+ char *name = xasprintf("%s+%s", encap, dst_ip);
+
+ ovs_assert(ctx->cache_valid);
+
+ ploc = shash_find_data(&ctx->plocs, name);
+ free(name);
+
+ return ploc;
+}
+
+static void
+add_ploc_to_cache(struct vtep_ctl_context *ctx,
+ struct vteprec_physical_locator *ploc)
+{
+ char *name = xasprintf("%s+%s", ploc->encapsulation_type, ploc->dst_ip);
+ struct vteprec_physical_locator *orig_ploc;
+
+ orig_ploc = find_ploc(ctx, ploc->encapsulation_type, ploc->dst_ip);
+ if (!orig_ploc) {
+ shash_add(&ctx->plocs, name, ploc);
+ }
+
+ free(name);
+}
+
+static void
+add_ploc_to_mcast_mac(struct vtep_ctl_mcast_mac *mcast_mac,
+ struct vteprec_physical_locator *ploc_cfg)
+{
+ struct vtep_ctl_ploc *ploc;
+
+ ploc = xmalloc(sizeof *ploc);
+ ploc->ploc_cfg = ploc_cfg;
+ list_push_back(&mcast_mac->locators, &ploc->locators_node);
+}
+
+static void
+del_ploc_from_mcast_mac(struct vtep_ctl_mcast_mac *mcast_mac,
+ struct vteprec_physical_locator *ploc_cfg)
+{
+ struct vtep_ctl_ploc *ploc;
+
+ LIST_FOR_EACH (ploc, locators_node, &mcast_mac->locators) {
+ if (ploc->ploc_cfg == ploc_cfg) {
+ list_remove(&ploc->locators_node);
+ free(ploc);
+ return;
+ }
+ }
+}
+
+static struct vtep_ctl_mcast_mac *
+add_mcast_mac_to_cache(struct vtep_ctl_context *ctx,
+ struct vtep_ctl_lswitch *ls, const char *mac,
+ struct vteprec_physical_locator_set *ploc_set_cfg,
+ bool local)
+{
+ struct vtep_ctl_mcast_mac *mcast_mac;
+ struct shash *mcast_shash;
+ size_t i;
+
+ mcast_mac = xmalloc(sizeof *mcast_mac);
+ mcast_shash = local ? &ls->mcast_local : &ls->mcast_remote;
+
+ mcast_mac->ploc_set_cfg = ploc_set_cfg;
+ list_init(&mcast_mac->locators);
+ shash_add(mcast_shash, mac, mcast_mac);
+
+ for (i = 0; i < ploc_set_cfg->n_locators; i++) {
+ struct vteprec_physical_locator *ploc_cfg;
+
+ ploc_cfg = ploc_set_cfg->locators[i];
+ add_ploc_to_mcast_mac(mcast_mac, ploc_cfg);
+ add_ploc_to_cache(ctx, ploc_cfg);
+ }
+
+ return mcast_mac;
+}
+
+static void
+vtep_ctl_context_invalidate_cache(struct vtep_ctl_context *ctx)
+{
+ struct shash_node *node;
+
+ if (!ctx->cache_valid) {
+ return;
+ }
+ ctx->cache_valid = false;
+
+ SHASH_FOR_EACH (node, &ctx->pswitches) {
+ struct vtep_ctl_pswitch *ps = node->data;
+ free(ps->name);
+ free(ps);
+ }
+ shash_destroy(&ctx->pswitches);
+
+ SHASH_FOR_EACH (node, &ctx->ports) {
+ struct vtep_ctl_port *port = node->data;
+ shash_destroy(&port->bindings);
+ }
+ shash_destroy_free_data(&ctx->ports);
+
+ SHASH_FOR_EACH (node, &ctx->lswitches) {
+ struct vtep_ctl_lswitch *ls = node->data;
+ struct shash_node *node2, *next_node2;
+
+ shash_destroy(&ls->ucast_local);
+ shash_destroy(&ls->ucast_remote);
+
+ SHASH_FOR_EACH_SAFE (node2, next_node2, &ls->mcast_local) {
+ struct vtep_ctl_mcast_mac *mcast_mac = node2->data;
+ struct vtep_ctl_ploc *ploc, *next_ploc;
+
+ LIST_FOR_EACH_SAFE (ploc, next_ploc, locators_node,
+ &mcast_mac->locators) {
+ free(ploc);
+ }
+ free(mcast_mac);
+ }
+ shash_destroy(&ls->mcast_local);
+
+ SHASH_FOR_EACH_SAFE (node2, next_node2, &ls->mcast_remote) {
+ struct vtep_ctl_mcast_mac *mcast_mac = node2->data;
+ struct vtep_ctl_ploc *ploc, *next_ploc;
+
+ LIST_FOR_EACH_SAFE (ploc, next_ploc, locators_node,
+ &mcast_mac->locators) {
+ free(ploc);
+ }
+ free(mcast_mac);
+ }
+ shash_destroy(&ls->mcast_remote);
+
+ free(ls->name);
+ free(ls);
+ }
+ shash_destroy(&ctx->lswitches);
+ shash_destroy(&ctx->plocs);
+}
+
+static void
+pre_get_info(struct vtep_ctl_context *ctx)
+{
+ ovsdb_idl_add_column(ctx->idl, &vteprec_global_col_switches);
+
+ ovsdb_idl_add_column(ctx->idl, &vteprec_physical_switch_col_name);
+ ovsdb_idl_add_column(ctx->idl, &vteprec_physical_switch_col_ports);
+
+ ovsdb_idl_add_column(ctx->idl, &vteprec_physical_port_col_name);
+ ovsdb_idl_add_column(ctx->idl, &vteprec_physical_port_col_vlan_bindings);
+
+ ovsdb_idl_add_column(ctx->idl, &vteprec_logical_switch_col_name);
+
+ ovsdb_idl_add_column(ctx->idl, &vteprec_ucast_macs_local_col_MAC);
+ ovsdb_idl_add_column(ctx->idl, &vteprec_ucast_macs_local_col_locator);
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_ucast_macs_local_col_logical_switch);
+
+ ovsdb_idl_add_column(ctx->idl, &vteprec_ucast_macs_remote_col_MAC);
+ ovsdb_idl_add_column(ctx->idl, &vteprec_ucast_macs_remote_col_locator);
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_ucast_macs_remote_col_logical_switch);
+
+ ovsdb_idl_add_column(ctx->idl, &vteprec_mcast_macs_local_col_MAC);
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_mcast_macs_local_col_locator_set);
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_mcast_macs_local_col_logical_switch);
+
+ ovsdb_idl_add_column(ctx->idl, &vteprec_mcast_macs_remote_col_MAC);
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_mcast_macs_remote_col_locator_set);
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_mcast_macs_remote_col_logical_switch);
+
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_physical_locator_set_col_locators);
+
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_physical_locator_col_dst_ip);
+ ovsdb_idl_add_column(ctx->idl,
+ &vteprec_physical_locator_col_encapsulation_type);
+}
+
+static void
+vtep_ctl_context_populate_cache(struct vtep_ctl_context *ctx)
+{
+ const struct vteprec_global *vtep_global = ctx->vtep_global;
+ const struct vteprec_logical_switch *ls_cfg;
+ const struct vteprec_ucast_macs_local *ucast_local_cfg;
+ const struct vteprec_ucast_macs_remote *ucast_remote_cfg;
+ const struct vteprec_mcast_macs_local *mcast_local_cfg;
+ const struct vteprec_mcast_macs_remote *mcast_remote_cfg;
+ struct sset pswitches, ports, lswitches;
+ size_t i;
+
+ if (ctx->cache_valid) {
+ /* Cache is already populated. */
+ return;
+ }
+ ctx->cache_valid = true;
+ shash_init(&ctx->pswitches);
+ shash_init(&ctx->ports);
+ shash_init(&ctx->lswitches);
+ shash_init(&ctx->plocs);
+
+ sset_init(&pswitches);
+ sset_init(&ports);
+ for (i = 0; i < vtep_global->n_switches; i++) {
+ struct vteprec_physical_switch *ps_cfg = vtep_global->switches[i];
+ struct vtep_ctl_pswitch *ps;
+ size_t j;
+
+ if (!sset_add(&pswitches, ps_cfg->name)) {
+ VLOG_WARN("%s: database contains duplicate physical switch name",
+ ps_cfg->name);
+ continue;
+ }
+ ps = add_pswitch_to_cache(ctx, ps_cfg);
+ if (!ps) {
+ continue;
+ }
+
+ for (j = 0; j < ps_cfg->n_ports; j++) {
+ struct vteprec_physical_port *port_cfg = ps_cfg->ports[j];
+
+ if (!sset_add(&ports, port_cfg->name)) {
+ /* Duplicate port name. (We will warn about that later.) */
+ continue;
+ }
+ }
+ }
+ sset_destroy(&pswitches);
+ sset_destroy(&ports);
+
+ sset_init(&lswitches);
+ VTEPREC_LOGICAL_SWITCH_FOR_EACH (ls_cfg, ctx->idl) {
+ if (!sset_add(&lswitches, ls_cfg->name)) {
+ VLOG_WARN("%s: database contains duplicate logical switch name",
+ ls_cfg->name);
+ continue;
+ }
+ add_lswitch_to_cache(ctx, ls_cfg);
+ }
+ sset_destroy(&lswitches);
+
+ VTEPREC_UCAST_MACS_LOCAL_FOR_EACH (ucast_local_cfg, ctx->idl) {
+ struct vtep_ctl_lswitch *ls;
+
+ if (!ucast_local_cfg->logical_switch) {
+ continue;
+ }
+ ls = find_lswitch(ctx, ucast_local_cfg->logical_switch->name, false);
+ if (!ls) {
+ continue;
+ }
+
+ if (ucast_local_cfg->locator) {
+ add_ploc_to_cache(ctx, ucast_local_cfg->locator);
+ }
+
+ shash_add(&ls->ucast_local, ucast_local_cfg->MAC, ucast_local_cfg);
+ }
+
+ VTEPREC_UCAST_MACS_REMOTE_FOR_EACH (ucast_remote_cfg, ctx->idl) {
+ struct vtep_ctl_lswitch *ls;
+
+ if (!ucast_remote_cfg->logical_switch) {
+ continue;
+ }
+ ls = find_lswitch(ctx, ucast_remote_cfg->logical_switch->name, false);
+ if (!ls) {
+ continue;
+ }
+
+ if (ucast_remote_cfg->locator) {
+ add_ploc_to_cache(ctx, ucast_remote_cfg->locator);
+ }
+
+ shash_add(&ls->ucast_remote, ucast_remote_cfg->MAC, ucast_remote_cfg);
+ }
+
+ VTEPREC_MCAST_MACS_LOCAL_FOR_EACH (mcast_local_cfg, ctx->idl) {
+ struct vtep_ctl_mcast_mac *mcast_mac;
+ struct vtep_ctl_lswitch *ls;
+
+ if (!mcast_local_cfg->logical_switch) {
+ continue;
+ }
+ ls = find_lswitch(ctx, mcast_local_cfg->logical_switch->name, false);
+ if (!ls) {
+ continue;
+ }
+
+ mcast_mac = add_mcast_mac_to_cache(ctx, ls, mcast_local_cfg->MAC,
+ mcast_local_cfg->locator_set,
+ true);
+ mcast_mac->local_cfg = mcast_local_cfg;
+ }
+
+ VTEPREC_MCAST_MACS_REMOTE_FOR_EACH (mcast_remote_cfg, ctx->idl) {
+ struct vtep_ctl_mcast_mac *mcast_mac;
+ struct vtep_ctl_lswitch *ls;
+
+ if (!mcast_remote_cfg->logical_switch) {
+ continue;
+ }
+ ls = find_lswitch(ctx, mcast_remote_cfg->logical_switch->name, false);
+ if (!ls) {
+ continue;
+ }
+
+ mcast_mac = add_mcast_mac_to_cache(ctx, ls, mcast_remote_cfg->MAC,
+ mcast_remote_cfg->locator_set,
+ false);
+ mcast_mac->remote_cfg = mcast_remote_cfg;
+ }
+
+ sset_init(&pswitches);
+ for (i = 0; i < vtep_global->n_switches; i++) {
+ struct vteprec_physical_switch *ps_cfg = vtep_global->switches[i];
+ struct vtep_ctl_pswitch *ps;
+ size_t j;
+
+ if (!sset_add(&pswitches, ps_cfg->name)) {
+ continue;
+ }
+ ps = shash_find_data(&ctx->pswitches, ps_cfg->name);
+ for (j = 0; j < ps_cfg->n_ports; j++) {
+ struct vteprec_physical_port *port_cfg = ps_cfg->ports[j];
+ struct vtep_ctl_port *port;
+ size_t k;
+
+ port = shash_find_data(&ctx->ports, port_cfg->name);
+ if (port) {
+ if (port_cfg == port->port_cfg) {
+ VLOG_WARN("%s: port is in multiple physical switches "
+ "(%s and %s)",
+ port_cfg->name, ps->name, port->ps->name);
+ } else {
+ /* Log as an error because this violates the database's
+ * uniqueness constraints, so the database server shouldn't
+ * have allowed it. */
+ VLOG_ERR("%s: database contains duplicate port name",
+ port_cfg->name);
+ }
+ continue;
+ }
+
+ port = add_port_to_cache(ctx, ps, port_cfg);
+
+ for (k = 0; k < port_cfg->n_vlan_bindings; k++) {
+ struct vteprec_logical_switch *ls_cfg;
+ struct vtep_ctl_lswitch *ls;
+ char *vlan;
+
+ vlan = xasprintf("%"PRId64, port_cfg->key_vlan_bindings[k]);
+ if (shash_find(&port->bindings, vlan)) {
+ vtep_ctl_fatal("multiple bindings for vlan %s", vlan);
+ }
+
+ ls_cfg = port_cfg->value_vlan_bindings[k];
+ ls = find_lswitch(ctx, ls_cfg->name, true);
+
+ shash_add_nocopy(&port->bindings, vlan, ls);
+ }
+ }
+ }
+ sset_destroy(&pswitches);
+}
+
+static struct vtep_ctl_pswitch *
+find_pswitch(struct vtep_ctl_context *ctx, const char *name, bool must_exist)
+{
+ struct vtep_ctl_pswitch *ps;
+
+ ovs_assert(ctx->cache_valid);
+
+ ps = shash_find_data(&ctx->pswitches, name);
+ if (must_exist && !ps) {
+ vtep_ctl_fatal("no physical switch named %s", name);
+ }
+ vteprec_global_verify_switches(ctx->vtep_global);
+ return ps;
+}
+
+static struct vtep_ctl_port *
+find_port(struct vtep_ctl_context *ctx, const char *ps_name,
+ const char *port_name, bool must_exist)
+{
+ char *cache_name = xasprintf("%s+%s", ps_name, port_name);
+ struct vtep_ctl_port *port;
+
+ ovs_assert(ctx->cache_valid);
+
+ port = shash_find_data(&ctx->ports, cache_name);
+ if (port && !strcmp(port_name, port->ps->name)) {
+ port = NULL;
+ }
+ free(cache_name);
+ if (must_exist && !port) {
+ vtep_ctl_fatal("no port named %s", port_name);
+ }
+ verify_ports(ctx);
+ return port;
+}
+
+static void
+pswitch_insert_port(const struct vteprec_physical_switch *ps,
+ struct vteprec_physical_port *port)
+{
+ struct vteprec_physical_port **ports;
+ size_t i;
+
+ ports = xmalloc(sizeof *ps->ports * (ps->n_ports + 1));
+ for (i = 0; i < ps->n_ports; i++) {
+ ports[i] = ps->ports[i];
+ }
+ ports[ps->n_ports] = port;
+ vteprec_physical_switch_set_ports(ps, ports, ps->n_ports + 1);
+ free(ports);
+}
+
+static void
+pswitch_delete_port(const struct vteprec_physical_switch *ps,
+ const struct vteprec_physical_port *port)
+{
+ struct vteprec_physical_port **ports;
+ size_t i, n;
+
+ ports = xmalloc(sizeof *ps->ports * ps->n_ports);
+ for (i = n = 0; i < ps->n_ports; i++) {
+ if (ps->ports[i] != port) {
+ ports[n++] = ps->ports[i];
+ }
+ }
+ vteprec_physical_switch_set_ports(ps, ports, n);
+ free(ports);
+}
+
+static void
+vtep_insert_pswitch(const struct vteprec_global *vtep_global,
+ struct vteprec_physical_switch *ps)
+{
+ struct vteprec_physical_switch **pswitches;
+ size_t i;
+
+ pswitches = xmalloc(sizeof *vtep_global->switches
+ * (vtep_global->n_switches + 1));
+ for (i = 0; i < vtep_global->n_switches; i++) {
+ pswitches[i] = vtep_global->switches[i];
+ }
+ pswitches[vtep_global->n_switches] = ps;
+ vteprec_global_set_switches(vtep_global, pswitches,
+ vtep_global->n_switches + 1);
+ free(pswitches);
+}
+
+static void
+cmd_add_ps(struct vtep_ctl_context *ctx)
+{
+ const char *ps_name = ctx->argv[1];
+ bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
+ struct vteprec_physical_switch *ps;
+
+ vtep_ctl_context_populate_cache(ctx);
+ if (find_pswitch(ctx, ps_name, false)) {
+ if (!may_exist) {
+ vtep_ctl_fatal("cannot create physical switch %s because it "
+ "already exists", ps_name);
+ }
+ return;
+ }
+
+ ps = vteprec_physical_switch_insert(ctx->txn);
+ vteprec_physical_switch_set_name(ps, ps_name);
+
+ vtep_insert_pswitch(ctx->vtep_global, ps);
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+del_port(struct vtep_ctl_context *ctx, struct vtep_ctl_port *port)
+{
+ pswitch_delete_port(port->ps->ps_cfg, port->port_cfg);
+ del_cached_port(ctx, port);
+}
+
+static void
+del_pswitch(struct vtep_ctl_context *ctx, struct vtep_ctl_pswitch *ps)
+{
+ struct vtep_ctl_port *port, *next_port;
+
+ LIST_FOR_EACH_SAFE (port, next_port, ports_node, &ps->ports) {
+ del_port(ctx, port);
+ }
+
+ del_cached_pswitch(ctx, ps);
+}
+
+static void
+cmd_del_ps(struct vtep_ctl_context *ctx)
+{
+ bool must_exist = !shash_find(&ctx->options, "--if-exists");
+ struct vtep_ctl_pswitch *ps;
+
+ vtep_ctl_context_populate_cache(ctx);
+ ps = find_pswitch(ctx, ctx->argv[1], must_exist);
+ if (ps) {
+ del_pswitch(ctx, ps);
+ }
+}
+
+static void
+output_sorted(struct svec *svec, struct ds *output)
+{
+ const char *name;
+ size_t i;
+
+ svec_sort(svec);
+ SVEC_FOR_EACH (i, name, svec) {
+ ds_put_format(output, "%s\n", name);
+ }
+}
+
+static void
+cmd_list_ps(struct vtep_ctl_context *ctx)
+{
+ struct shash_node *node;
+ struct svec pswitches;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ svec_init(&pswitches);
+ SHASH_FOR_EACH (node, &ctx->pswitches) {
+ struct vtep_ctl_pswitch *ps = node->data;
+
+ svec_add(&pswitches, ps->name);
+ }
+ output_sorted(&pswitches, &ctx->output);
+ svec_destroy(&pswitches);
+}
+
+static void
+cmd_ps_exists(struct vtep_ctl_context *ctx)
+{
+ vtep_ctl_context_populate_cache(ctx);
+ if (!find_pswitch(ctx, ctx->argv[1], false)) {
+ vtep_ctl_exit(2);
+ }
+}
+
+static void
+cmd_list_ports(struct vtep_ctl_context *ctx)
+{
+ struct vtep_ctl_pswitch *ps;
+ struct vtep_ctl_port *port;
+ struct svec ports;
+
+ vtep_ctl_context_populate_cache(ctx);
+ ps = find_pswitch(ctx, ctx->argv[1], true);
+ vteprec_physical_switch_verify_ports(ps->ps_cfg);
+
+ svec_init(&ports);
+ LIST_FOR_EACH (port, ports_node, &ps->ports) {
+ if (strcmp(port->port_cfg->name, ps->name)) {
+ svec_add(&ports, port->port_cfg->name);
+ }
+ }
+ output_sorted(&ports, &ctx->output);
+ svec_destroy(&ports);
+}
+
+static void
+add_port(struct vtep_ctl_context *ctx, const char *ps_name,
+ const char *port_name, bool may_exist)
+{
+ struct vtep_ctl_port *vtep_ctl_port;
+ struct vtep_ctl_pswitch *ps;
+ struct vteprec_physical_port *port;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ vtep_ctl_port = find_port(ctx, ps_name, port_name, false);
+ if (vtep_ctl_port) {
+ if (!may_exist) {
+ vtep_ctl_fatal("cannot create a port named %s on %s because a "
+ "port with that name already exists",
+ port_name, ps_name);
+ }
+ return;
+ }
+
+ ps = find_pswitch(ctx, ps_name, true);
+
+ port = vteprec_physical_port_insert(ctx->txn);
+ vteprec_physical_port_set_name(port, port_name);
+
+ pswitch_insert_port(ps->ps_cfg, port);
+
+ add_port_to_cache(ctx, ps, port);
+}
+
+static void
+cmd_add_port(struct vtep_ctl_context *ctx)
+{
+ bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
+ add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist);
+}
+
+static void
+cmd_del_port(struct vtep_ctl_context *ctx)
+{
+ bool must_exist = !shash_find(&ctx->options, "--if-exists");
+ struct vtep_ctl_port *port;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ port = find_port(ctx, ctx->argv[1], ctx->argv[2], must_exist);
+ if (port) {
+ if (ctx->argc == 3) {
+ struct vtep_ctl_pswitch *ps;
+
+ ps = find_pswitch(ctx, ctx->argv[1], true);
+ if (port->ps != ps) {
+ vtep_ctl_fatal("physical switch %s does not have a port %s",
+ ctx->argv[1], ctx->argv[2]);
+ }
+ }
+
+ del_port(ctx, port);
+ }
+}
+
+static struct vtep_ctl_lswitch *
+find_lswitch(struct vtep_ctl_context *ctx, const char *name, bool must_exist)
+{
+ struct vtep_ctl_lswitch *ls;
+
+ ovs_assert(ctx->cache_valid);
+
+ ls = shash_find_data(&ctx->lswitches, name);
+ if (must_exist && !ls) {
+ vtep_ctl_fatal("no logical switch named %s", name);
+ }
+ return ls;
+}
+
+static void
+cmd_add_ls(struct vtep_ctl_context *ctx)
+{
+ const char *ls_name = ctx->argv[1];
+ bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
+ struct vteprec_logical_switch *ls;
+
+ vtep_ctl_context_populate_cache(ctx);
+ if (find_lswitch(ctx, ls_name, false)) {
+ if (!may_exist) {
+ vtep_ctl_fatal("cannot create logical switch %s because it "
+ "already exists", ls_name);
+ }
+ return;
+ }
+
+ ls = vteprec_logical_switch_insert(ctx->txn);
+ vteprec_logical_switch_set_name(ls, ls_name);
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+del_lswitch(struct vtep_ctl_context *ctx, struct vtep_ctl_lswitch *ls)
+{
+ del_cached_lswitch(ctx, ls);
+}
+
+static void
+cmd_del_ls(struct vtep_ctl_context *ctx)
+{
+ bool must_exist = !shash_find(&ctx->options, "--if-exists");
+ struct vtep_ctl_lswitch *ls;
+
+ vtep_ctl_context_populate_cache(ctx);
+ ls = find_lswitch(ctx, ctx->argv[1], must_exist);
+ if (ls) {
+ del_lswitch(ctx, ls);
+ }
+}
+
+static void
+cmd_list_ls(struct vtep_ctl_context *ctx)
+{
+ struct shash_node *node;
+ struct svec lswitches;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ svec_init(&lswitches);
+ SHASH_FOR_EACH (node, &ctx->lswitches) {
+ struct vtep_ctl_lswitch *ls = node->data;
+
+ svec_add(&lswitches, ls->name);
+ }
+ output_sorted(&lswitches, &ctx->output);
+ svec_destroy(&lswitches);
+}
+
+static void
+cmd_ls_exists(struct vtep_ctl_context *ctx)
+{
+ vtep_ctl_context_populate_cache(ctx);
+ if (!find_lswitch(ctx, ctx->argv[1], false)) {
+ vtep_ctl_exit(2);
+ }
+}
+
+static void
+cmd_list_bindings(struct vtep_ctl_context *ctx)
+{
+ const struct shash_node *node;
+ struct vtep_ctl_port *port;
+ struct svec bindings;
+
+ vtep_ctl_context_populate_cache(ctx);
+ port = find_port(ctx, ctx->argv[1], ctx->argv[2], true);
+
+ svec_init(&bindings);
+ SHASH_FOR_EACH (node, &port->bindings) {
+ struct vtep_ctl_lswitch *lswitch = node->data;
+ char *binding;
+
+ binding = xasprintf("%04lld %s", strtoll(node->name, NULL, 0),
+ lswitch->name);
+ svec_add_nocopy(&bindings, binding);
+ }
+ output_sorted(&bindings, &ctx->output);
+ svec_destroy(&bindings);
+}
+
+static void
+cmd_bind_ls(struct vtep_ctl_context *ctx)
+{
+ struct vtep_ctl_lswitch *ls;
+ struct vtep_ctl_port *port;
+ const char *vlan;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ port = find_port(ctx, ctx->argv[1], ctx->argv[2], true);
+ vlan = ctx->argv[3];
+ ls = find_lswitch(ctx, ctx->argv[4], true);
+
+ add_ls_binding_to_cache(port, vlan, ls);
+ commit_ls_bindings(port);
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+cmd_unbind_ls(struct vtep_ctl_context *ctx)
+{
+ struct vtep_ctl_port *port;
+ const char *vlan;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ port = find_port(ctx, ctx->argv[1], ctx->argv[2], true);
+ vlan = ctx->argv[3];
+
+ del_cached_ls_binding(port, vlan);
+ commit_ls_bindings(port);
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+add_ucast_entry(struct vtep_ctl_context *ctx, bool local)
+{
+ struct vtep_ctl_lswitch *ls;
+ const char *mac;
+ const char *encap;
+ const char *dst_ip;
+ struct vteprec_physical_locator *ploc_cfg;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ ls = find_lswitch(ctx, ctx->argv[1], true);
+ mac = ctx->argv[2];
+
+ if (ctx->argc == 4) {
+ encap = "vxlan_over_ipv4";
+ dst_ip = ctx->argv[3];
+ } else {
+ encap = ctx->argv[3];
+ dst_ip = ctx->argv[4];
+ }
+
+ ploc_cfg = find_ploc(ctx, encap, dst_ip);
+ if (!ploc_cfg) {
+ ploc_cfg = vteprec_physical_locator_insert(ctx->txn);
+ vteprec_physical_locator_set_dst_ip(ploc_cfg, dst_ip);
+ vteprec_physical_locator_set_encapsulation_type(ploc_cfg, encap);
+
+ add_ploc_to_cache(ctx, ploc_cfg);
+ }
+
+ if (local) {
+ struct vteprec_ucast_macs_local *ucast_cfg;
+
+ ucast_cfg = shash_find_data(&ls->ucast_local, mac);
+ if (!ucast_cfg) {
+ ucast_cfg = vteprec_ucast_macs_local_insert(ctx->txn);
+ vteprec_ucast_macs_local_set_MAC(ucast_cfg, mac);
+ vteprec_ucast_macs_local_set_logical_switch(ucast_cfg, ls->ls_cfg);
+ shash_add(&ls->ucast_local, mac, ucast_cfg);
+ }
+ vteprec_ucast_macs_local_set_locator(ucast_cfg, ploc_cfg);
+ } else {
+ struct vteprec_ucast_macs_remote *ucast_cfg;
+
+ ucast_cfg = shash_find_data(&ls->ucast_remote, mac);
+ if (!ucast_cfg) {
+ ucast_cfg = vteprec_ucast_macs_remote_insert(ctx->txn);
+ vteprec_ucast_macs_remote_set_MAC(ucast_cfg, mac);
+ vteprec_ucast_macs_remote_set_logical_switch(ucast_cfg, ls->ls_cfg);
+ shash_add(&ls->ucast_remote, mac, ucast_cfg);
+ }
+ vteprec_ucast_macs_remote_set_locator(ucast_cfg, ploc_cfg);
+ }
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+cmd_add_ucast_local(struct vtep_ctl_context *ctx)
+{
+ add_ucast_entry(ctx, true);
+}
+
+static void
+cmd_add_ucast_remote(struct vtep_ctl_context *ctx)
+{
+ add_ucast_entry(ctx, false);
+}
+
+static void
+del_ucast_entry(struct vtep_ctl_context *ctx, bool local)
+{
+ struct vtep_ctl_lswitch *ls;
+ struct shash *ucast_shash;
+ struct shash_node *node;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ ls = find_lswitch(ctx, ctx->argv[1], true);
+ ucast_shash = local ? &ls->ucast_local : &ls->ucast_remote;
+
+ node = shash_find(ucast_shash, ctx->argv[2]);
+ if (!node) {
+ return;
+ }
+
+ if (local) {
+ struct vteprec_ucast_macs_local *ucast_cfg = node->data;
+ vteprec_ucast_macs_local_delete(ucast_cfg);
+ } else {
+ struct vteprec_ucast_macs_remote *ucast_cfg = node->data;
+ vteprec_ucast_macs_remote_delete(ucast_cfg);
+ }
+ shash_delete(ucast_shash, node);
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+cmd_del_ucast_local(struct vtep_ctl_context *ctx)
+{
+ del_ucast_entry(ctx, true);
+}
+
+static void
+cmd_del_ucast_remote(struct vtep_ctl_context *ctx)
+{
+ del_ucast_entry(ctx, false);
+}
+
+static void
+commit_mcast_entries(struct vtep_ctl_mcast_mac *mcast_mac)
+{
+ struct vtep_ctl_ploc *ploc;
+ struct vteprec_physical_locator **locators = NULL;
+ size_t n_locators;
+ int i;
+
+ n_locators = list_size(&mcast_mac->locators);
+ ovs_assert(n_locators);
+
+ locators = xmalloc(n_locators * sizeof *locators);
+
+ i = 0;
+ LIST_FOR_EACH (ploc, locators_node, &mcast_mac->locators) {
+ locators[i] = (struct vteprec_physical_locator *)ploc->ploc_cfg;
+ i++;
+ }
+
+ vteprec_physical_locator_set_set_locators(mcast_mac->ploc_set_cfg,
+ locators,
+ n_locators);
+
+ free(locators);
+}
+
+static void
+add_mcast_entry(struct vtep_ctl_context *ctx,
+ struct vtep_ctl_lswitch *ls, const char *mac,
+ const char *encap, const char *dst_ip, bool local)
+{
+ struct shash *mcast_shash;
+ struct vtep_ctl_mcast_mac *mcast_mac;
+ struct vteprec_physical_locator *ploc_cfg;
+ struct vteprec_physical_locator_set *ploc_set_cfg;
+
+ mcast_shash = local ? &ls->mcast_local : &ls->mcast_remote;
+
+ /* Physical locator sets are immutable, so allocate a new one. */
+ ploc_set_cfg = vteprec_physical_locator_set_insert(ctx->txn);
+
+ mcast_mac = shash_find_data(mcast_shash, mac);
+ if (!mcast_mac) {
+ mcast_mac = add_mcast_mac_to_cache(ctx, ls, mac, ploc_set_cfg, local);
+
+ if (local) {
+ mcast_mac->local_cfg = vteprec_mcast_macs_local_insert(ctx->txn);
+ vteprec_mcast_macs_local_set_MAC(mcast_mac->local_cfg, mac);
+ vteprec_mcast_macs_local_set_locator_set(mcast_mac->local_cfg,
+ ploc_set_cfg);
+ vteprec_mcast_macs_local_set_logical_switch(mcast_mac->local_cfg,
+ ls->ls_cfg);
+ mcast_mac->remote_cfg = NULL;
+ } else {
+ mcast_mac->remote_cfg = vteprec_mcast_macs_remote_insert(ctx->txn);
+ vteprec_mcast_macs_remote_set_MAC(mcast_mac->remote_cfg, mac);
+ vteprec_mcast_macs_remote_set_locator_set(mcast_mac->remote_cfg,
+ ploc_set_cfg);
+ vteprec_mcast_macs_remote_set_logical_switch(mcast_mac->remote_cfg,
+ ls->ls_cfg);
+ mcast_mac->local_cfg = NULL;
+ }
+ } else {
+ mcast_mac->ploc_set_cfg = ploc_set_cfg;
+ if (local) {
+ vteprec_mcast_macs_local_set_locator_set(mcast_mac->local_cfg,
+ ploc_set_cfg);
+ } else {
+ vteprec_mcast_macs_remote_set_locator_set(mcast_mac->remote_cfg,
+ ploc_set_cfg);
+ }
+ }
+
+ ploc_cfg = find_ploc(ctx, encap, dst_ip);
+ if (!ploc_cfg) {
+ ploc_cfg = vteprec_physical_locator_insert(ctx->txn);
+ vteprec_physical_locator_set_dst_ip(ploc_cfg, dst_ip);
+ vteprec_physical_locator_set_encapsulation_type(ploc_cfg, encap);
+
+ add_ploc_to_cache(ctx, ploc_cfg);
+ }
+
+ add_ploc_to_mcast_mac(mcast_mac, ploc_cfg);
+ commit_mcast_entries(mcast_mac);
+}
+
+static void
+del_mcast_entry(struct vtep_ctl_context *ctx,
+ struct vtep_ctl_lswitch *ls, const char *mac,
+ const char *encap, const char *dst_ip, bool local)
+{
+ struct vtep_ctl_mcast_mac *mcast_mac;
+ struct shash *mcast_shash;
+ struct vteprec_physical_locator *ploc_cfg;
+ struct vteprec_physical_locator_set *ploc_set_cfg;
+
+ mcast_shash = local ? &ls->mcast_local : &ls->mcast_remote;
+
+ mcast_mac = shash_find_data(mcast_shash, mac);
+ if (!mcast_mac) {
+ return;
+ }
+
+ ploc_cfg = find_ploc(ctx, encap, dst_ip);
+ if (!ploc_cfg) {
+ /* Couldn't find the physical locator, so just ignore. */
+ return;
+ }
+
+ /* Physical locator sets are immutable, so allocate a new one. */
+ ploc_set_cfg = vteprec_physical_locator_set_insert(ctx->txn);
+ mcast_mac->ploc_set_cfg = ploc_set_cfg;
+
+ del_ploc_from_mcast_mac(mcast_mac, ploc_cfg);
+ if (list_is_empty(&mcast_mac->locators)) {
+ struct shash_node *node = shash_find(mcast_shash, mac);
+
+ vteprec_physical_locator_set_delete(ploc_set_cfg);
+
+ if (local) {
+ vteprec_mcast_macs_local_delete(mcast_mac->local_cfg);
+ } else {
+ vteprec_mcast_macs_remote_delete(mcast_mac->remote_cfg);
+ }
+
+ free(node->data);
+ shash_delete(mcast_shash, node);
+ } else {
+ if (local) {
+ vteprec_mcast_macs_local_set_locator_set(mcast_mac->local_cfg,
+ ploc_set_cfg);
+ } else {
+ vteprec_mcast_macs_remote_set_locator_set(mcast_mac->remote_cfg,
+ ploc_set_cfg);
+ }
+ commit_mcast_entries(mcast_mac);
+ }
+}
+
+static void
+add_del_mcast_entry(struct vtep_ctl_context *ctx, bool add, bool local)
+{
+ struct vtep_ctl_lswitch *ls;
+ const char *mac;
+ const char *encap;
+ const char *dst_ip;
+
+ vtep_ctl_context_populate_cache(ctx);
+
+ ls = find_lswitch(ctx, ctx->argv[1], true);
+ mac = ctx->argv[2];
+
+ if (ctx->argc == 4) {
+ encap = "vxlan_over_ipv4";
+ dst_ip = ctx->argv[3];
+ } else {
+ encap = ctx->argv[3];
+ dst_ip = ctx->argv[4];
+ }
+
+ if (add) {
+ add_mcast_entry(ctx, ls, mac, encap, dst_ip, local);
+ } else {
+ del_mcast_entry(ctx, ls, mac, encap, dst_ip, local);
+ }
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+cmd_add_mcast_local(struct vtep_ctl_context *ctx)
+{
+ add_del_mcast_entry(ctx, true, true);
+}
+
+static void
+cmd_add_mcast_remote(struct vtep_ctl_context *ctx)
+{
+ add_del_mcast_entry(ctx, true, false);
+}
+
+static void
+cmd_del_mcast_local(struct vtep_ctl_context *ctx)
+{
+ add_del_mcast_entry(ctx, false, true);
+}
+
+static void
+cmd_del_mcast_remote(struct vtep_ctl_context *ctx)
+{
+ add_del_mcast_entry(ctx, false, false);
+}
+
+static void
+clear_macs(struct vtep_ctl_context *ctx, bool local)
+{
+ struct vtep_ctl_lswitch *ls;
+ const struct shash_node *node;
+ struct shash *ucast_shash;
+ struct shash *mcast_shash;
+
+ vtep_ctl_context_populate_cache(ctx);
+ ls = find_lswitch(ctx, ctx->argv[1], true);
+
+ ucast_shash = local ? &ls->ucast_local : &ls->ucast_remote;
+ mcast_shash = local ? &ls->mcast_local : &ls->mcast_remote;
+
+ SHASH_FOR_EACH (node, ucast_shash) {
+ if (local) {
+ struct vteprec_ucast_macs_local *ucast_cfg = node->data;
+ vteprec_ucast_macs_local_delete(ucast_cfg);
+ } else {
+ struct vteprec_ucast_macs_remote *ucast_cfg = node->data;
+ vteprec_ucast_macs_remote_delete(ucast_cfg);
+ }
+ }
+
+ SHASH_FOR_EACH (node, mcast_shash) {
+ struct vtep_ctl_mcast_mac *mcast_mac = node->data;
+ if (local) {
+ vteprec_mcast_macs_local_delete(mcast_mac->local_cfg);
+ } else {
+ vteprec_mcast_macs_remote_delete(mcast_mac->remote_cfg);
+ }
+ }
+
+ vtep_ctl_context_invalidate_cache(ctx);
+}
+
+static void
+cmd_clear_local_macs(struct vtep_ctl_context *ctx)
+{
+ clear_macs(ctx, true);
+}
+
+static void
+cmd_clear_remote_macs(struct vtep_ctl_context *ctx)
+{
+ clear_macs(ctx, false);
+}
+
+static void
+list_macs(struct vtep_ctl_context *ctx, bool local)
+{
+ struct vtep_ctl_lswitch *ls;
+ const struct shash_node *node;
+ struct shash *ucast_shash;
+ struct svec ucast_macs;
+ struct shash *mcast_shash;
+ struct svec mcast_macs;
+
+ vtep_ctl_context_populate_cache(ctx);
+ ls = find_lswitch(ctx, ctx->argv[1], true);
+
+ ucast_shash = local ? &ls->ucast_local : &ls->ucast_remote;
+ mcast_shash = local ? &ls->mcast_local : &ls->mcast_remote;
+
+ svec_init(&ucast_macs);
+ SHASH_FOR_EACH (node, ucast_shash) {
+ struct vteprec_ucast_macs_local *ucast_local = node->data;
+ struct vteprec_ucast_macs_remote *ucast_remote = node->data;
+ struct vteprec_physical_locator *ploc_cfg;
+ char *entry;
+
+ ploc_cfg = local ? ucast_local->locator : ucast_remote->locator;
+
+ entry = xasprintf(" %s -> %s/%s", node->name,
+ ploc_cfg->encapsulation_type, ploc_cfg->dst_ip);
+ svec_add_nocopy(&ucast_macs, entry);
+ }
+ ds_put_format(&ctx->output, "ucast-mac-%s\n", local ? "local" : "remote");
+ output_sorted(&ucast_macs, &ctx->output);
+ ds_put_char(&ctx->output, '\n');
+ svec_destroy(&ucast_macs);
+
+ svec_init(&mcast_macs);
+ SHASH_FOR_EACH (node, mcast_shash) {
+ struct vtep_ctl_mcast_mac *mcast_mac = node->data;
+ struct vtep_ctl_ploc *ploc;
+ char *entry;
+
+ LIST_FOR_EACH (ploc, locators_node, &mcast_mac->locators) {
+ entry = xasprintf(" %s -> %s/%s", node->name,
+ ploc->ploc_cfg->encapsulation_type,
+ ploc->ploc_cfg->dst_ip);
+ svec_add_nocopy(&mcast_macs, entry);
+ }
+ }
+ ds_put_format(&ctx->output, "mcast-mac-%s\n", local ? "local" : "remote");
+ output_sorted(&mcast_macs, &ctx->output);
+ ds_put_char(&ctx->output, '\n');
+ svec_destroy(&mcast_macs);
+}
+
+static void
+cmd_list_local_macs(struct vtep_ctl_context *ctx)
+{
+ list_macs(ctx, true);
+}
+
+static void
+cmd_list_remote_macs(struct vtep_ctl_context *ctx)
+{
+ list_macs(ctx, false);
+}
+
+static void
+verify_managers(const struct vteprec_global *vtep_global)
+{
+ size_t i;
+
+ vteprec_global_verify_managers(vtep_global);
+
+ for (i = 0; i < vtep_global->n_managers; ++i) {
+ const struct vteprec_manager *mgr = vtep_global->managers[i];
+
+ vteprec_manager_verify_target(mgr);
+ }
+}
+
+static void
+pre_manager(struct vtep_ctl_context *ctx)
+{
+ ovsdb_idl_add_column(ctx->idl, &vteprec_global_col_managers);
+ ovsdb_idl_add_column(ctx->idl, &vteprec_manager_col_target);
+}
+
+static void
+cmd_get_manager(struct vtep_ctl_context *ctx)
+{
+ const struct vteprec_global *vtep_global = ctx->vtep_global;
+ struct svec targets;
+ size_t i;
+
+ verify_managers(vtep_global);
+
+ /* Print the targets in sorted order for reproducibility. */
+ svec_init(&targets);
+
+ for (i = 0; i < vtep_global->n_managers; i++) {
+ svec_add(&targets, vtep_global->managers[i]->target);
+ }
+
+ svec_sort_unique(&targets);
+ for (i = 0; i < targets.n; i++) {
+ ds_put_format(&ctx->output, "%s\n", targets.names[i]);
+ }
+ svec_destroy(&targets);
+}
+
+static void
+delete_managers(const struct vtep_ctl_context *ctx)
+{
+ const struct vteprec_global *vtep_global = ctx->vtep_global;
+ size_t i;
+
+ /* Delete Manager rows pointed to by 'managers' column. */
+ for (i = 0; i < vtep_global->n_managers; i++) {
+ vteprec_manager_delete(vtep_global->managers[i]);
+ }
+
+ /* Delete 'Manager' row refs in 'managers' column. */
+ vteprec_global_set_managers(vtep_global, NULL, 0);
+}
+
+static void
+cmd_del_manager(struct vtep_ctl_context *ctx)
+{
+ const struct vteprec_global *vtep_global = ctx->vtep_global;
+
+ verify_managers(vtep_global);
+ delete_managers(ctx);
+}
+
+static void
+insert_managers(struct vtep_ctl_context *ctx, char *targets[], size_t n)
+{
+ struct vteprec_manager **managers;
+ size_t i;
+
+ /* Insert each manager in a new row in Manager table. */
+ managers = xmalloc(n * sizeof *managers);
+ for (i = 0; i < n; i++) {
+ if (stream_verify_name(targets[i]) && pstream_verify_name(targets[i])) {
+ VLOG_WARN("target type \"%s\" is possibly erroneous", targets[i]);
+ }
+ managers[i] = vteprec_manager_insert(ctx->txn);
+ vteprec_manager_set_target(managers[i], targets[i]);
+ }
+
+ /* Store uuids of new Manager rows in 'managers' column. */
+ vteprec_global_set_managers(ctx->vtep_global, managers, n);
+ free(managers);
+}
+
+static void
+cmd_set_manager(struct vtep_ctl_context *ctx)
+{
+ const size_t n = ctx->argc - 1;
+
+ verify_managers(ctx->vtep_global);
+ delete_managers(ctx);
+ insert_managers(ctx, &ctx->argv[1], n);
+}
+
+/* Parameter commands. */
+
+struct vtep_ctl_row_id {
+ const struct ovsdb_idl_table_class *table;
+ const struct ovsdb_idl_column *name_column;
+ const struct ovsdb_idl_column *uuid_column;
+};
+
+struct vtep_ctl_table_class {
+ struct ovsdb_idl_table_class *class;
+ struct vtep_ctl_row_id row_ids[2];
+};
+
+static const struct vtep_ctl_table_class tables[] = {
+ {&vteprec_table_global,
+ {{&vteprec_table_global, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_logical_binding_stats,
+ {{NULL, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_logical_switch,
+ {{&vteprec_table_logical_switch, &vteprec_logical_switch_col_name, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_ucast_macs_local,
+ {{NULL, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_ucast_macs_remote,
+ {{NULL, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_mcast_macs_local,
+ {{NULL, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_mcast_macs_remote,
+ {{NULL, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_manager,
+ {{&vteprec_table_manager, &vteprec_manager_col_target, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_physical_locator,
+ {{NULL, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_physical_locator_set,
+ {{NULL, NULL, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_physical_port,
+ {{&vteprec_table_physical_port, &vteprec_physical_port_col_name, NULL},
+ {NULL, NULL, NULL}}},
+
+ {&vteprec_table_physical_switch,
+ {{&vteprec_table_physical_switch, &vteprec_physical_switch_col_name, NULL},
+ {NULL, NULL, NULL}}},
+
+ {NULL, {{NULL, NULL, NULL}, {NULL, NULL, NULL}}}
+};
+
+static void
+die_if_error(char *error)
+{
+ if (error) {
+ vtep_ctl_fatal("%s", error);
+ }
+}
+
+static int
+to_lower_and_underscores(unsigned c)
+{
+ return c == '-' ? '_' : tolower(c);
+}
+
+static unsigned int
+score_partial_match(const char *name, const char *s)
+{
+ int score;
+
+ if (!strcmp(name, s)) {
+ return UINT_MAX;
+ }
+ for (score = 0; ; score++, name++, s++) {
+ if (to_lower_and_underscores(*name) != to_lower_and_underscores(*s)) {
+ break;
+ } else if (*name == '\0') {
+ return UINT_MAX - 1;
+ }
+ }
+ return *s == '\0' ? score : 0;
+}
+
+static const struct vtep_ctl_table_class *
+get_table(const char *table_name)
+{
+ const struct vtep_ctl_table_class *table;
+ const struct vtep_ctl_table_class *best_match = NULL;
+ unsigned int best_score = 0;
+
+ for (table = tables; table->class; table++) {
+ unsigned int score = score_partial_match(table->class->name,
+ table_name);
+ if (score > best_score) {
+ best_match = table;
+ best_score = score;
+ } else if (score == best_score) {
+ best_match = NULL;
+ }
+ }
+ if (best_match) {
+ return best_match;
+ } else if (best_score) {
+ vtep_ctl_fatal("multiple table names match \"%s\"", table_name);
+ } else {
+ vtep_ctl_fatal("unknown table \"%s\"", table_name);
+ }
+}
+
+static const struct vtep_ctl_table_class *
+pre_get_table(struct vtep_ctl_context *ctx, const char *table_name)
+{
+ const struct vtep_ctl_table_class *table_class;
+ int i;
+
+ table_class = get_table(table_name);
+ ovsdb_idl_add_table(ctx->idl, table_class->class);
+
+ for (i = 0; i < ARRAY_SIZE(table_class->row_ids); i++) {
+ const struct vtep_ctl_row_id *id = &table_class->row_ids[i];
+ if (id->table) {
+ ovsdb_idl_add_table(ctx->idl, id->table);
+ }
+ if (id->name_column) {
+ ovsdb_idl_add_column(ctx->idl, id->name_column);
+ }
+ if (id->uuid_column) {
+ ovsdb_idl_add_column(ctx->idl, id->uuid_column);
+ }
+ }
+
+ return table_class;
+}
+
+static const struct ovsdb_idl_row *
+get_row_by_id(struct vtep_ctl_context *ctx, const struct vtep_ctl_table_class *table,
+ const struct vtep_ctl_row_id *id, const char *record_id)
+{
+ const struct ovsdb_idl_row *referrer, *final;
+
+ if (!id->table) {
+ return NULL;
+ }
+
+ if (!id->name_column) {
+ if (strcmp(record_id, ".")) {
+ return NULL;
+ }
+ referrer = ovsdb_idl_first_row(ctx->idl, id->table);
+ if (!referrer || ovsdb_idl_next_row(referrer)) {
+ return NULL;
+ }
+ } else {
+ const struct ovsdb_idl_row *row;
+
+ referrer = NULL;
+ for (row = ovsdb_idl_first_row(ctx->idl, id->table);
+ row != NULL;
+ row = ovsdb_idl_next_row(row))
+ {
+ const struct ovsdb_datum *name;
+
+ name = ovsdb_idl_get(row, id->name_column,
+ OVSDB_TYPE_STRING, OVSDB_TYPE_VOID);
+ if (name->n == 1 && !strcmp(name->keys[0].string, record_id)) {
+ if (referrer) {
+ vtep_ctl_fatal("multiple rows in %s match \"%s\"",
+ table->class->name, record_id);
+ }
+ referrer = row;
+ }
+ }
+ }
+ if (!referrer) {
+ return NULL;
+ }
+
+ final = NULL;
+ if (id->uuid_column) {
+ const struct ovsdb_datum *uuid;
+
+ ovsdb_idl_txn_verify(referrer, id->uuid_column);
+ uuid = ovsdb_idl_get(referrer, id->uuid_column,
+ OVSDB_TYPE_UUID, OVSDB_TYPE_VOID);
+ if (uuid->n == 1) {
+ final = ovsdb_idl_get_row_for_uuid(ctx->idl, table->class,
+ &uuid->keys[0].uuid);
+ }
+ } else {
+ final = referrer;
+ }
+
+ return final;
+}
+
+static const struct ovsdb_idl_row *
+get_row (struct vtep_ctl_context *ctx,
+ const struct vtep_ctl_table_class *table, const char *record_id)
+{
+ const struct ovsdb_idl_row *row;
+ struct uuid uuid;
+
+ if (uuid_from_string(&uuid, record_id)) {
+ row = ovsdb_idl_get_row_for_uuid(ctx->idl, table->class, &uuid);
+ } else {
+ int i;
+
+ for (i = 0; i < ARRAY_SIZE(table->row_ids); i++) {
+ row = get_row_by_id(ctx, table, &table->row_ids[i], record_id);
+ if (row) {
+ break;
+ }
+ }
+ }
+ return row;
+}
+
+static const struct ovsdb_idl_row *
+must_get_row(struct vtep_ctl_context *ctx,
+ const struct vtep_ctl_table_class *table, const char *record_id)
+{
+ const struct ovsdb_idl_row *row = get_row(ctx, table, record_id);
+ if (!row) {
+ vtep_ctl_fatal("no row \"%s\" in table %s",
+ record_id, table->class->name);
+ }
+ return row;
+}
+
+static char *
+get_column(const struct vtep_ctl_table_class *table, const char *column_name,
+ const struct ovsdb_idl_column **columnp)
+{
+ const struct ovsdb_idl_column *best_match = NULL;
+ unsigned int best_score = 0;
+ size_t i;
+
+ for (i = 0; i < table->class->n_columns; i++) {
+ const struct ovsdb_idl_column *column = &table->class->columns[i];
+ unsigned int score = score_partial_match(column->name, column_name);
+ if (score > best_score) {
+ best_match = column;
+ best_score = score;
+ } else if (score == best_score) {
+ best_match = NULL;
+ }
+ }
+
+ *columnp = best_match;
+ if (best_match) {
+ return NULL;
+ } else if (best_score) {
+ return xasprintf("%s contains more than one column whose name "
+ "matches \"%s\"", table->class->name, column_name);
+ } else {
+ return xasprintf("%s does not contain a column whose name matches "
+ "\"%s\"", table->class->name, column_name);
+ }
+}
+
+static struct ovsdb_symbol *
+create_symbol(struct ovsdb_symbol_table *symtab, const char *id, bool *newp)
+{
+ struct ovsdb_symbol *symbol;
+
+ if (id[0] != '@') {
+ vtep_ctl_fatal("row id \"%s\" does not begin with \"@\"", id);
+ }
+
+ if (newp) {
+ *newp = ovsdb_symbol_table_get(symtab, id) == NULL;
+ }
+
+ symbol = ovsdb_symbol_table_insert(symtab, id);
+ if (symbol->created) {
+ vtep_ctl_fatal("row id \"%s\" may only be specified on one --id option",
+ id);
+ }
+ symbol->created = true;
+ return symbol;
+}
+
+static void
+pre_get_column(struct vtep_ctl_context *ctx,
+ const struct vtep_ctl_table_class *table, const char *column_name,
+ const struct ovsdb_idl_column **columnp)
+{
+ die_if_error(get_column(table, column_name, columnp));
+ ovsdb_idl_add_column(ctx->idl, *columnp);
+}
+
+static char *
+missing_operator_error(const char *arg, const char **allowed_operators,
+ size_t n_allowed)
+{
+ struct ds s;
+
+ ds_init(&s);
+ ds_put_format(&s, "%s: argument does not end in ", arg);
+ ds_put_format(&s, "\"%s\"", allowed_operators[0]);
+ if (n_allowed == 2) {
+ ds_put_format(&s, " or \"%s\"", allowed_operators[1]);
+ } else if (n_allowed > 2) {
+ size_t i;
+
+ for (i = 1; i < n_allowed - 1; i++) {
+ ds_put_format(&s, ", \"%s\"", allowed_operators[i]);
+ }
+ ds_put_format(&s, ", or \"%s\"", allowed_operators[i]);
+ }
+ ds_put_format(&s, " followed by a value.");
+
+ return ds_steal_cstr(&s);
+}
+
+/* Breaks 'arg' apart into a number of fields in the following order:
+ *
+ * - The name of a column in 'table', stored into '*columnp'. The column
+ * name may be abbreviated.
+ *
+ * - Optionally ':' followed by a key string. The key is stored as a
+ * malloc()'d string into '*keyp', or NULL if no key is present in
+ * 'arg'.
+ *
+ * - If 'valuep' is nonnull, an operator followed by a value string. The
+ * allowed operators are the 'n_allowed' string in 'allowed_operators',
+ * or just "=" if 'n_allowed' is 0. If 'operatorp' is nonnull, then the
+ * index of the operator within 'allowed_operators' is stored into
+ * '*operatorp'. The value is stored as a malloc()'d string into
+ * '*valuep', or NULL if no value is present in 'arg'.
+ *
+ * On success, returns NULL. On failure, returned a malloc()'d string error
+ * message and stores NULL into all of the nonnull output arguments. */
+static char * WARN_UNUSED_RESULT
+parse_column_key_value(const char *arg,
+ const struct vtep_ctl_table_class *table,
+ const struct ovsdb_idl_column **columnp, char **keyp,
+ int *operatorp,
+ const char **allowed_operators, size_t n_allowed,
+ char **valuep)
+{
+ const char *p = arg;
+ char *column_name;
+ char *error;
+
+ ovs_assert(!(operatorp && !valuep));
+ *keyp = NULL;
+ if (valuep) {
+ *valuep = NULL;
+ }
+
+ /* Parse column name. */
+ error = ovsdb_token_parse(&p, &column_name);
+ if (error) {
+ goto error;
+ }
+ if (column_name[0] == '\0') {
+ free(column_name);
+ error = xasprintf("%s: missing column name", arg);
+ goto error;
+ }
+ error = get_column(table, column_name, columnp);
+ free(column_name);
+ if (error) {
+ goto error;
+ }
+
+ /* Parse key string. */
+ if (*p == ':') {
+ p++;
+ error = ovsdb_token_parse(&p, keyp);
+ if (error) {
+ goto error;
+ }
+ }
+
+ /* Parse value string. */
+ if (valuep) {
+ size_t best_len;
+ size_t i;
+ int best;
+
+ if (!allowed_operators) {
+ static const char *equals = "=";
+ allowed_operators = &equals;
+ n_allowed = 1;
+ }
+
+ best = -1;
+ best_len = 0;
+ for (i = 0; i < n_allowed; i++) {
+ const char *op = allowed_operators[i];
+ size_t op_len = strlen(op);
+
+ if (op_len > best_len && !strncmp(op, p, op_len) && p[op_len]) {
+ best_len = op_len;
+ best = i;
+ }
+ }
+ if (best < 0) {
+ error = missing_operator_error(arg, allowed_operators, n_allowed);
+ goto error;
+ }
+
+ if (operatorp) {
+ *operatorp = best;
+ }
+ *valuep = xstrdup(p + best_len);
+ } else {
+ if (*p != '\0') {
+ error = xasprintf("%s: trailing garbage \"%s\" in argument",
+ arg, p);
+ goto error;
+ }
+ }
+ return NULL;
+
+error:
+ *columnp = NULL;
+ free(*keyp);
+ *keyp = NULL;
+ if (valuep) {
+ free(*valuep);
+ *valuep = NULL;
+ if (operatorp) {
+ *operatorp = -1;
+ }
+ }
+ return error;
+}
+
+static const struct ovsdb_idl_column *
+pre_parse_column_key_value(struct vtep_ctl_context *ctx,
+ const char *arg,
+ const struct vtep_ctl_table_class *table)
+{
+ const struct ovsdb_idl_column *column;
+ const char *p;
+ char *column_name;
+
+ p = arg;
+ die_if_error(ovsdb_token_parse(&p, &column_name));
+ if (column_name[0] == '\0') {
+ vtep_ctl_fatal("%s: missing column name", arg);
+ }
+
+ pre_get_column(ctx, table, column_name, &column);
+ free(column_name);
+
+ return column;
+}
+
+static void
+check_mutable(const struct vtep_ctl_table_class *table,
+ const struct ovsdb_idl_column *column)
+{
+ if (!column->mutable) {
+ vtep_ctl_fatal("cannot modify read-only column %s in table %s",
+ column->name, table->class->name);
+ }
+}
+
+static void
+pre_cmd_get(struct vtep_ctl_context *ctx)
+{
+ const char *id = shash_find_data(&ctx->options, "--id");
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ int i;
+
+ /* Using "get" without --id or a column name could possibly make sense.
+ * Maybe, for example, a vtep-ctl run wants to assert that a row exists.
+ * But it is unlikely that an interactive user would want to do that, so
+ * issue a warning if we're running on a terminal. */
+ if (!id && ctx->argc <= 3 && isatty(STDOUT_FILENO)) {
+ VLOG_WARN("\"get\" command without row arguments or \"--id\" is "
+ "possibly erroneous");
+ }
+
+ table = pre_get_table(ctx, table_name);
+ for (i = 3; i < ctx->argc; i++) {
+ if (!strcasecmp(ctx->argv[i], "_uuid")
+ || !strcasecmp(ctx->argv[i], "-uuid")) {
+ continue;
+ }
+
+ pre_parse_column_key_value(ctx, ctx->argv[i], table);
+ }
+}
+
+static void
+cmd_get(struct vtep_ctl_context *ctx)
+{
+ const char *id = shash_find_data(&ctx->options, "--id");
+ bool if_exists = shash_find(&ctx->options, "--if-exists");
+ const char *table_name = ctx->argv[1];
+ const char *record_id = ctx->argv[2];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_row *row;
+ struct ds *out = &ctx->output;
+ int i;
+
+ table = get_table(table_name);
+ row = must_get_row(ctx, table, record_id);
+ if (id) {
+ struct ovsdb_symbol *symbol;
+ bool new;
+
+ symbol = create_symbol(ctx->symtab, id, &new);
+ if (!new) {
+ vtep_ctl_fatal("row id \"%s\" specified on \"get\" command was used "
+ "before it was defined", id);
+ }
+ symbol->uuid = row->uuid;
+
+ /* This symbol refers to a row that already exists, so disable warnings
+ * about it being unreferenced. */
+ symbol->strong_ref = true;
+ }
+ for (i = 3; i < ctx->argc; i++) {
+ const struct ovsdb_idl_column *column;
+ const struct ovsdb_datum *datum;
+ char *key_string;
+
+ /* Special case for obtaining the UUID of a row. We can't just do this
+ * through parse_column_key_value() below since it returns a "struct
+ * ovsdb_idl_column" and the UUID column doesn't have one. */
+ if (!strcasecmp(ctx->argv[i], "_uuid")
+ || !strcasecmp(ctx->argv[i], "-uuid")) {
+ ds_put_format(out, UUID_FMT"\n", UUID_ARGS(&row->uuid));
+ continue;
+ }
+
+ die_if_error(parse_column_key_value(ctx->argv[i], table,
+ &column, &key_string,
+ NULL, NULL, 0, NULL));
+
+ ovsdb_idl_txn_verify(row, column);
+ datum = ovsdb_idl_read(row, column);
+ if (key_string) {
+ union ovsdb_atom key;
+ unsigned int idx;
+
+ if (column->type.value.type == OVSDB_TYPE_VOID) {
+ vtep_ctl_fatal("cannot specify key to get for non-map column %s",
+ column->name);
+ }
+
+ die_if_error(ovsdb_atom_from_string(&key,
+ &column->type.key,
+ key_string, ctx->symtab));
+
+ idx = ovsdb_datum_find_key(datum, &key,
+ column->type.key.type);
+ if (idx == UINT_MAX) {
+ if (!if_exists) {
+ vtep_ctl_fatal("no key \"%s\" in %s record \"%s\" column %s",
+ key_string, table->class->name, record_id,
+ column->name);
+ }
+ } else {
+ ovsdb_atom_to_string(&datum->values[idx],
+ column->type.value.type, out);
+ }
+ ovsdb_atom_destroy(&key, column->type.key.type);
+ } else {
+ ovsdb_datum_to_string(datum, &column->type, out);
+ }
+ ds_put_char(out, '\n');
+
+ free(key_string);
+ }
+}
+
+static void
+parse_column_names(const char *column_names,
+ const struct vtep_ctl_table_class *table,
+ const struct ovsdb_idl_column ***columnsp,
+ size_t *n_columnsp)
+{
+ const struct ovsdb_idl_column **columns;
+ size_t n_columns;
+
+ if (!column_names) {
+ size_t i;
+
+ n_columns = table->class->n_columns + 1;
+ columns = xmalloc(n_columns * sizeof *columns);
+ columns[0] = NULL;
+ for (i = 0; i < table->class->n_columns; i++) {
+ columns[i + 1] = &table->class->columns[i];
+ }
+ } else {
+ char *s = xstrdup(column_names);
+ size_t allocated_columns;
+ char *save_ptr = NULL;
+ char *column_name;
+
+ columns = NULL;
+ allocated_columns = n_columns = 0;
+ for (column_name = strtok_r(s, ", ", &save_ptr); column_name;
+ column_name = strtok_r(NULL, ", ", &save_ptr)) {
+ const struct ovsdb_idl_column *column;
+
+ if (!strcasecmp(column_name, "_uuid")) {
+ column = NULL;
+ } else {
+ die_if_error(get_column(table, column_name, &column));
+ }
+ if (n_columns >= allocated_columns) {
+ columns = x2nrealloc(columns, &allocated_columns,
+ sizeof *columns);
+ }
+ columns[n_columns++] = column;
+ }
+ free(s);
+
+ if (!n_columns) {
+ vtep_ctl_fatal("must specify at least one column name");
+ }
+ }
+ *columnsp = columns;
+ *n_columnsp = n_columns;
+}
+
+
+static void
+pre_list_columns(struct vtep_ctl_context *ctx,
+ const struct vtep_ctl_table_class *table,
+ const char *column_names)
+{
+ const struct ovsdb_idl_column **columns;
+ size_t n_columns;
+ size_t i;
+
+ parse_column_names(column_names, table, &columns, &n_columns);
+ for (i = 0; i < n_columns; i++) {
+ if (columns[i]) {
+ ovsdb_idl_add_column(ctx->idl, columns[i]);
+ }
+ }
+ free(columns);
+}
+
+static void
+pre_cmd_list(struct vtep_ctl_context *ctx)
+{
+ const char *column_names = shash_find_data(&ctx->options, "--columns");
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+
+ table = pre_get_table(ctx, table_name);
+ pre_list_columns(ctx, table, column_names);
+}
+
+static struct table *
+list_make_table(const struct ovsdb_idl_column **columns, size_t n_columns)
+{
+ struct table *out;
+ size_t i;
+
+ out = xmalloc(sizeof *out);
+ table_init(out);
+
+ for (i = 0; i < n_columns; i++) {
+ const struct ovsdb_idl_column *column = columns[i];
+ const char *column_name = column ? column->name : "_uuid";
+
+ table_add_column(out, "%s", column_name);
+ }
+
+ return out;
+}
+
+static void
+list_record(const struct ovsdb_idl_row *row,
+ const struct ovsdb_idl_column **columns, size_t n_columns,
+ struct table *out)
+{
+ size_t i;
+
+ table_add_row(out);
+ for (i = 0; i < n_columns; i++) {
+ const struct ovsdb_idl_column *column = columns[i];
+ struct cell *cell = table_add_cell(out);
+
+ if (!column) {
+ struct ovsdb_datum datum;
+ union ovsdb_atom atom;
+
+ atom.uuid = row->uuid;
+
+ datum.keys = &atom;
+ datum.values = NULL;
+ datum.n = 1;
+
+ cell->json = ovsdb_datum_to_json(&datum, &ovsdb_type_uuid);
+ cell->type = &ovsdb_type_uuid;
+ } else {
+ const struct ovsdb_datum *datum = ovsdb_idl_read(row, column);
+
+ cell->json = ovsdb_datum_to_json(datum, &column->type);
+ cell->type = &column->type;
+ }
+ }
+}
+
+static void
+cmd_list(struct vtep_ctl_context *ctx)
+{
+ const char *column_names = shash_find_data(&ctx->options, "--columns");
+ const struct ovsdb_idl_column **columns;
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ struct table *out;
+ size_t n_columns;
+ int i;
+
+ table = get_table(table_name);
+ parse_column_names(column_names, table, &columns, &n_columns);
+ out = ctx->table = list_make_table(columns, n_columns);
+ if (ctx->argc > 2) {
+ for (i = 2; i < ctx->argc; i++) {
+ list_record(must_get_row(ctx, table, ctx->argv[i]),
+ columns, n_columns, out);
+ }
+ } else {
+ const struct ovsdb_idl_row *row;
+
+ for (row = ovsdb_idl_first_row(ctx->idl, table->class); row != NULL;
+ row = ovsdb_idl_next_row(row)) {
+ list_record(row, columns, n_columns, out);
+ }
+ }
+ free(columns);
+}
+
+static void
+pre_cmd_find(struct vtep_ctl_context *ctx)
+{
+ const char *column_names = shash_find_data(&ctx->options, "--columns");
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ int i;
+
+ table = pre_get_table(ctx, table_name);
+ pre_list_columns(ctx, table, column_names);
+ for (i = 2; i < ctx->argc; i++) {
+ pre_parse_column_key_value(ctx, ctx->argv[i], table);
+ }
+}
+
+static void
+cmd_find(struct vtep_ctl_context *ctx)
+{
+ const char *column_names = shash_find_data(&ctx->options, "--columns");
+ const struct ovsdb_idl_column **columns;
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_row *row;
+ struct table *out;
+ size_t n_columns;
+
+ table = get_table(table_name);
+ parse_column_names(column_names, table, &columns, &n_columns);
+ out = ctx->table = list_make_table(columns, n_columns);
+ for (row = ovsdb_idl_first_row(ctx->idl, table->class); row;
+ row = ovsdb_idl_next_row(row)) {
+ int i;
+
+ for (i = 2; i < ctx->argc; i++) {
+ if (!is_condition_satisfied(table, row, ctx->argv[i],
+ ctx->symtab)) {
+ goto next_row;
+ }
+ }
+ list_record(row, columns, n_columns, out);
+
+ next_row: ;
+ }
+ free(columns);
+}
+
+static void
+pre_cmd_set(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ int i;
+
+ table = pre_get_table(ctx, table_name);
+ for (i = 3; i < ctx->argc; i++) {
+ const struct ovsdb_idl_column *column;
+
+ column = pre_parse_column_key_value(ctx, ctx->argv[i], table);
+ check_mutable(table, column);
+ }
+}
+
+static void
+set_column(const struct vtep_ctl_table_class *table,
+ const struct ovsdb_idl_row *row, const char *arg,
+ struct ovsdb_symbol_table *symtab)
+{
+ const struct ovsdb_idl_column *column;
+ char *key_string, *value_string;
+ char *error;
+
+ error = parse_column_key_value(arg, table, &column, &key_string,
+ NULL, NULL, 0, &value_string);
+ die_if_error(error);
+ if (!value_string) {
+ vtep_ctl_fatal("%s: missing value", arg);
+ }
+
+ if (key_string) {
+ union ovsdb_atom key, value;
+ struct ovsdb_datum datum;
+
+ if (column->type.value.type == OVSDB_TYPE_VOID) {
+ vtep_ctl_fatal("cannot specify key to set for non-map column %s",
+ column->name);
+ }
+
+ die_if_error(ovsdb_atom_from_string(&key, &column->type.key,
+ key_string, symtab));
+ die_if_error(ovsdb_atom_from_string(&value, &column->type.value,
+ value_string, symtab));
+
+ ovsdb_datum_init_empty(&datum);
+ ovsdb_datum_add_unsafe(&datum, &key, &value, &column->type);
+
+ ovsdb_atom_destroy(&key, column->type.key.type);
+ ovsdb_atom_destroy(&value, column->type.value.type);
+
+ ovsdb_datum_union(&datum, ovsdb_idl_read(row, column),
+ &column->type, false);
+ ovsdb_idl_txn_write(row, column, &datum);
+ } else {
+ struct ovsdb_datum datum;
+
+ die_if_error(ovsdb_datum_from_string(&datum, &column->type,
+ value_string, symtab));
+ ovsdb_idl_txn_write(row, column, &datum);
+ }
+
+ free(key_string);
+ free(value_string);
+}
+
+static void
+cmd_set(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const char *record_id = ctx->argv[2];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_row *row;
+ int i;
+
+ table = get_table(table_name);
+ row = must_get_row(ctx, table, record_id);
+ for (i = 3; i < ctx->argc; i++) {
+ set_column(table, row, ctx->argv[i], ctx->symtab);
+ }
+}
+
+static void
+pre_cmd_add(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const char *column_name = ctx->argv[3];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_column *column;
+
+ table = pre_get_table(ctx, table_name);
+ pre_get_column(ctx, table, column_name, &column);
+ check_mutable(table, column);
+}
+
+static void
+cmd_add(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const char *record_id = ctx->argv[2];
+ const char *column_name = ctx->argv[3];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_column *column;
+ const struct ovsdb_idl_row *row;
+ const struct ovsdb_type *type;
+ struct ovsdb_datum old;
+ int i;
+
+ table = get_table(table_name);
+ row = must_get_row(ctx, table, record_id);
+ die_if_error(get_column(table, column_name, &column));
+
+ type = &column->type;
+ ovsdb_datum_clone(&old, ovsdb_idl_read(row, column), &column->type);
+ for (i = 4; i < ctx->argc; i++) {
+ struct ovsdb_type add_type;
+ struct ovsdb_datum add;
+
+ add_type = *type;
+ add_type.n_min = 1;
+ add_type.n_max = UINT_MAX;
+ die_if_error(ovsdb_datum_from_string(&add, &add_type, ctx->argv[i],
+ ctx->symtab));
+ ovsdb_datum_union(&old, &add, type, false);
+ ovsdb_datum_destroy(&add, type);
+ }
+ if (old.n > type->n_max) {
+ vtep_ctl_fatal("\"add\" operation would put %u %s in column %s of "
+ "table %s but the maximum number is %u",
+ old.n,
+ type->value.type == OVSDB_TYPE_VOID ? "values" : "pairs",
+ column->name, table->class->name, type->n_max);
+ }
+ ovsdb_idl_txn_verify(row, column);
+ ovsdb_idl_txn_write(row, column, &old);
+}
+
+static void
+pre_cmd_remove(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const char *column_name = ctx->argv[3];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_column *column;
+
+ table = pre_get_table(ctx, table_name);
+ pre_get_column(ctx, table, column_name, &column);
+ check_mutable(table, column);
+}
+
+static void
+cmd_remove(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const char *record_id = ctx->argv[2];
+ const char *column_name = ctx->argv[3];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_column *column;
+ const struct ovsdb_idl_row *row;
+ const struct ovsdb_type *type;
+ struct ovsdb_datum old;
+ int i;
+
+ table = get_table(table_name);
+ row = must_get_row(ctx, table, record_id);
+ die_if_error(get_column(table, column_name, &column));
+
+ type = &column->type;
+ ovsdb_datum_clone(&old, ovsdb_idl_read(row, column), &column->type);
+ for (i = 4; i < ctx->argc; i++) {
+ struct ovsdb_type rm_type;
+ struct ovsdb_datum rm;
+ char *error;
+
+ rm_type = *type;
+ rm_type.n_min = 1;
+ rm_type.n_max = UINT_MAX;
+ error = ovsdb_datum_from_string(&rm, &rm_type,
+ ctx->argv[i], ctx->symtab);
+ if (error && ovsdb_type_is_map(&rm_type)) {
+ free(error);
+ rm_type.value.type = OVSDB_TYPE_VOID;
+ die_if_error(ovsdb_datum_from_string(&rm, &rm_type,
+ ctx->argv[i], ctx->symtab));
+ }
+ ovsdb_datum_subtract(&old, type, &rm, &rm_type);
+ ovsdb_datum_destroy(&rm, &rm_type);
+ }
+ if (old.n < type->n_min) {
+ vtep_ctl_fatal("\"remove\" operation would put %u %s in column %s of "
+ "table %s but the minimum number is %u",
+ old.n,
+ type->value.type == OVSDB_TYPE_VOID ? "values" : "pairs",
+ column->name, table->class->name, type->n_min);
+ }
+ ovsdb_idl_txn_verify(row, column);
+ ovsdb_idl_txn_write(row, column, &old);
+}
+
+static void
+pre_cmd_clear(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ int i;
+
+ table = pre_get_table(ctx, table_name);
+ for (i = 3; i < ctx->argc; i++) {
+ const struct ovsdb_idl_column *column;
+
+ pre_get_column(ctx, table, ctx->argv[i], &column);
+ check_mutable(table, column);
+ }
+}
+
+static void
+cmd_clear(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const char *record_id = ctx->argv[2];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_row *row;
+ int i;
+
+ table = get_table(table_name);
+ row = must_get_row(ctx, table, record_id);
+ for (i = 3; i < ctx->argc; i++) {
+ const struct ovsdb_idl_column *column;
+ const struct ovsdb_type *type;
+ struct ovsdb_datum datum;
+
+ die_if_error(get_column(table, ctx->argv[i], &column));
+
+ type = &column->type;
+ if (type->n_min > 0) {
+ vtep_ctl_fatal("\"clear\" operation cannot be applied to column %s "
+ "of table %s, which is not allowed to be empty",
+ column->name, table->class->name);
+ }
+
+ ovsdb_datum_init_empty(&datum);
+ ovsdb_idl_txn_write(row, column, &datum);
+ }
+}
+
+static void
+pre_create(struct vtep_ctl_context *ctx)
+{
+ const char *id = shash_find_data(&ctx->options, "--id");
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+
+ table = get_table(table_name);
+ if (!id && !table->class->is_root) {
+ VLOG_WARN("applying \"create\" command to table %s without --id "
+ "option will have no effect", table->class->name);
+ }
+}
+
+static void
+cmd_create(struct vtep_ctl_context *ctx)
+{
+ const char *id = shash_find_data(&ctx->options, "--id");
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table = get_table(table_name);
+ const struct ovsdb_idl_row *row;
+ const struct uuid *uuid;
+ int i;
+
+ if (id) {
+ struct ovsdb_symbol *symbol = create_symbol(ctx->symtab, id, NULL);
+ if (table->class->is_root) {
+ /* This table is in the root set, meaning that rows created in it
+ * won't disappear even if they are unreferenced, so disable
+ * warnings about that by pretending that there is a reference. */
+ symbol->strong_ref = true;
+ }
+ uuid = &symbol->uuid;
+ } else {
+ uuid = NULL;
+ }
+
+ row = ovsdb_idl_txn_insert(ctx->txn, table->class, uuid);
+ for (i = 2; i < ctx->argc; i++) {
+ set_column(table, row, ctx->argv[i], ctx->symtab);
+ }
+ ds_put_format(&ctx->output, UUID_FMT, UUID_ARGS(&row->uuid));
+}
+
+/* This function may be used as the 'postprocess' function for commands that
+ * insert new rows into the database. It expects that the command's 'run'
+ * function prints the UUID reported by ovsdb_idl_txn_insert() as the command's
+ * sole output. It replaces that output by the row's permanent UUID assigned
+ * by the database server and appends a new-line.
+ *
+ * Currently we use this only for "create", because the higher-level commands
+ * are supposed to be independent of the actual structure of the VTEP
+ * configuration. */
+static void
+post_create(struct vtep_ctl_context *ctx)
+{
+ const struct uuid *real;
+ struct uuid dummy;
+
+ if (!uuid_from_string(&dummy, ds_cstr(&ctx->output))) {
+ NOT_REACHED();
+ }
+ real = ovsdb_idl_txn_get_insert_uuid(ctx->txn, &dummy);
+ if (real) {
+ ds_clear(&ctx->output);
+ ds_put_format(&ctx->output, UUID_FMT, UUID_ARGS(real));
+ }
+ ds_put_char(&ctx->output, '\n');
+}
+
+static void
+pre_cmd_destroy(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+
+ pre_get_table(ctx, table_name);
+}
+
+static void
+cmd_destroy(struct vtep_ctl_context *ctx)
+{
+ bool must_exist = !shash_find(&ctx->options, "--if-exists");
+ bool delete_all = shash_find(&ctx->options, "--all");
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ int i;
+
+ table = get_table(table_name);
+
+ if (delete_all && ctx->argc > 2) {
+ vtep_ctl_fatal("--all and records argument should not be specified together");
+ }
+
+ if (delete_all && !must_exist) {
+ vtep_ctl_fatal("--all and --if-exists should not be specified together");
+ }
+
+ if (delete_all) {
+ const struct ovsdb_idl_row *row;
+ const struct ovsdb_idl_row *next_row;
+
+ for (row = ovsdb_idl_first_row(ctx->idl, table->class);
+ row;) {
+ next_row = ovsdb_idl_next_row(row);
+ ovsdb_idl_txn_delete(row);
+ row = next_row;
+ }
+ } else {
+ for (i = 2; i < ctx->argc; i++) {
+ const struct ovsdb_idl_row *row;
+
+ row = (must_exist ? must_get_row : get_row)(ctx, table, ctx->argv[i]);
+ if (row) {
+ ovsdb_idl_txn_delete(row);
+ }
+ }
+ }
+}
+
+#define RELOPS \
+ RELOP(RELOP_EQ, "=") \
+ RELOP(RELOP_NE, "!=") \
+ RELOP(RELOP_LT, "<") \
+ RELOP(RELOP_GT, ">") \
+ RELOP(RELOP_LE, "<=") \
+ RELOP(RELOP_GE, ">=") \
+ RELOP(RELOP_SET_EQ, "{=}") \
+ RELOP(RELOP_SET_NE, "{!=}") \
+ RELOP(RELOP_SET_LT, "{<}") \
+ RELOP(RELOP_SET_GT, "{>}") \
+ RELOP(RELOP_SET_LE, "{<=}") \
+ RELOP(RELOP_SET_GE, "{>=}")
+
+enum relop {
+#define RELOP(ENUM, STRING) ENUM,
+ RELOPS
+#undef RELOP
+};
+
+static bool
+is_set_operator(enum relop op)
+{
+ return (op == RELOP_SET_EQ || op == RELOP_SET_NE ||
+ op == RELOP_SET_LT || op == RELOP_SET_GT ||
+ op == RELOP_SET_LE || op == RELOP_SET_GE);
+}
+
+static bool
+evaluate_relop(const struct ovsdb_datum *a, const struct ovsdb_datum *b,
+ const struct ovsdb_type *type, enum relop op)
+{
+ switch (op) {
+ case RELOP_EQ:
+ case RELOP_SET_EQ:
+ return ovsdb_datum_compare_3way(a, b, type) == 0;
+ case RELOP_NE:
+ case RELOP_SET_NE:
+ return ovsdb_datum_compare_3way(a, b, type) != 0;
+ case RELOP_LT:
+ return ovsdb_datum_compare_3way(a, b, type) < 0;
+ case RELOP_GT:
+ return ovsdb_datum_compare_3way(a, b, type) > 0;
+ case RELOP_LE:
+ return ovsdb_datum_compare_3way(a, b, type) <= 0;
+ case RELOP_GE:
+ return ovsdb_datum_compare_3way(a, b, type) >= 0;
+
+ case RELOP_SET_LT:
+ return b->n > a->n && ovsdb_datum_includes_all(a, b, type);
+ case RELOP_SET_GT:
+ return a->n > b->n && ovsdb_datum_includes_all(b, a, type);
+ case RELOP_SET_LE:
+ return ovsdb_datum_includes_all(a, b, type);
+ case RELOP_SET_GE:
+ return ovsdb_datum_includes_all(b, a, type);
+
+ default:
+ NOT_REACHED();
+ }
+}
+
+static bool
+is_condition_satisfied(const struct vtep_ctl_table_class *table,
+ const struct ovsdb_idl_row *row, const char *arg,
+ struct ovsdb_symbol_table *symtab)
+{
+ static const char *operators[] = {
+#define RELOP(ENUM, STRING) STRING,
+ RELOPS
+#undef RELOP
+ };
+
+ const struct ovsdb_idl_column *column;
+ const struct ovsdb_datum *have_datum;
+ char *key_string, *value_string;
+ struct ovsdb_type type;
+ int operator;
+ bool retval;
+ char *error;
+
+ error = parse_column_key_value(arg, table, &column, &key_string,
+ &operator, operators, ARRAY_SIZE(operators),
+ &value_string);
+ die_if_error(error);
+ if (!value_string) {
+ vtep_ctl_fatal("%s: missing value", arg);
+ }
+
+ type = column->type;
+ type.n_max = UINT_MAX;
+
+ have_datum = ovsdb_idl_read(row, column);
+ if (key_string) {
+ union ovsdb_atom want_key;
+ struct ovsdb_datum b;
+ unsigned int idx;
+
+ if (column->type.value.type == OVSDB_TYPE_VOID) {
+ vtep_ctl_fatal("cannot specify key to check for non-map column %s",
+ column->name);
+ }
+
+ die_if_error(ovsdb_atom_from_string(&want_key, &column->type.key,
+ key_string, symtab));
+
+ type.key = type.value;
+ type.value.type = OVSDB_TYPE_VOID;
+ die_if_error(ovsdb_datum_from_string(&b, &type, value_string, symtab));
+
+ idx = ovsdb_datum_find_key(have_datum,
+ &want_key, column->type.key.type);
+ if (idx == UINT_MAX && !is_set_operator(operator)) {
+ retval = false;
+ } else {
+ struct ovsdb_datum a;
+
+ if (idx != UINT_MAX) {
+ a.n = 1;
+ a.keys = &have_datum->values[idx];
+ a.values = NULL;
+ } else {
+ a.n = 0;
+ a.keys = NULL;
+ a.values = NULL;
+ }
+
+ retval = evaluate_relop(&a, &b, &type, operator);
+ }
+
+ ovsdb_atom_destroy(&want_key, column->type.key.type);
+ ovsdb_datum_destroy(&b, &type);
+ } else {
+ struct ovsdb_datum want_datum;
+
+ die_if_error(ovsdb_datum_from_string(&want_datum, &column->type,
+ value_string, symtab));
+ retval = evaluate_relop(have_datum, &want_datum, &type, operator);
+ ovsdb_datum_destroy(&want_datum, &column->type);
+ }
+
+ free(key_string);
+ free(value_string);
+
+ return retval;
+}
+
+static void
+pre_cmd_wait_until(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const struct vtep_ctl_table_class *table;
+ int i;
+
+ table = pre_get_table(ctx, table_name);
+
+ for (i = 3; i < ctx->argc; i++) {
+ pre_parse_column_key_value(ctx, ctx->argv[i], table);
+ }
+}
+
+static void
+cmd_wait_until(struct vtep_ctl_context *ctx)
+{
+ const char *table_name = ctx->argv[1];
+ const char *record_id = ctx->argv[2];
+ const struct vtep_ctl_table_class *table;
+ const struct ovsdb_idl_row *row;
+ int i;
+
+ table = get_table(table_name);
+
+ row = get_row(ctx, table, record_id);
+ if (!row) {
+ ctx->try_again = true;
+ return;
+ }
+
+ for (i = 3; i < ctx->argc; i++) {
+ if (!is_condition_satisfied(table, row, ctx->argv[i], ctx->symtab)) {
+ ctx->try_again = true;
+ return;
+ }
+ }
+}
+
+/* Prepares 'ctx', which has already been initialized with
+ * vtep_ctl_context_init(), for processing 'command'. */
+static void
+vtep_ctl_context_init_command(struct vtep_ctl_context *ctx,
+ struct vtep_ctl_command *command)
+{
+ ctx->argc = command->argc;
+ ctx->argv = command->argv;
+ ctx->options = command->options;
+
+ ds_swap(&ctx->output, &command->output);
+ ctx->table = command->table;
+
+ ctx->verified_ports = false;
+
+ ctx->try_again = false;
+}
+
+/* Prepares 'ctx' for processing commands, initializing its members with the
+ * values passed in as arguments.
+ *
+ * If 'command' is nonnull, calls vtep_ctl_context_init_command() to prepare for
+ * that particular command. */
+static void
+vtep_ctl_context_init(struct vtep_ctl_context *ctx,
+ struct vtep_ctl_command *command,
+ struct ovsdb_idl *idl, struct ovsdb_idl_txn *txn,
+ const struct vteprec_global *vtep_global,
+ struct ovsdb_symbol_table *symtab)
+{
+ if (command) {
+ vtep_ctl_context_init_command(ctx, command);
+ }
+ ctx->idl = idl;
+ ctx->txn = txn;
+ ctx->vtep_global = vtep_global;
+ ctx->symtab = symtab;
+ ctx->cache_valid = false;
+}
+
+/* Completes processing of 'command' within 'ctx'. */
+static void
+vtep_ctl_context_done_command(struct vtep_ctl_context *ctx,
+ struct vtep_ctl_command *command)
+{
+ ds_swap(&ctx->output, &command->output);
+ command->table = ctx->table;
+}
+
+/* Finishes up with 'ctx'.
+ *
+ * If command is nonnull, first calls vtep_ctl_context_done_command() to complete
+ * processing that command within 'ctx'. */
+static void
+vtep_ctl_context_done(struct vtep_ctl_context *ctx, struct vtep_ctl_command *command)
+{
+ if (command) {
+ vtep_ctl_context_done_command(ctx, command);
+ }
+}
+
+static void
+run_prerequisites(struct vtep_ctl_command *commands, size_t n_commands,
+ struct ovsdb_idl *idl)
+{
+ struct vtep_ctl_command *c;
+
+ ovsdb_idl_add_table(idl, &vteprec_table_global);
+ for (c = commands; c < &commands[n_commands]; c++) {
+ if (c->syntax->prerequisites) {
+ struct vtep_ctl_context ctx;
+
+ ds_init(&c->output);
+ c->table = NULL;
+
+ vtep_ctl_context_init(&ctx, c, idl, NULL, NULL, NULL);
+ (c->syntax->prerequisites)(&ctx);
+ vtep_ctl_context_done(&ctx, c);
+
+ ovs_assert(!c->output.string);
+ ovs_assert(!c->table);
+ }
+ }
+}
+
+static void
+do_vtep_ctl(const char *args, struct vtep_ctl_command *commands,
+ size_t n_commands, struct ovsdb_idl *idl)
+{
+ struct ovsdb_idl_txn *txn;
+ const struct vteprec_global *vtep_global;
+ enum ovsdb_idl_txn_status status;
+ struct ovsdb_symbol_table *symtab;
+ struct vtep_ctl_context ctx;
+ struct vtep_ctl_command *c;
+ struct shash_node *node;
+ char *error = NULL;
+
+ txn = the_idl_txn = ovsdb_idl_txn_create(idl);
+ if (dry_run) {
+ ovsdb_idl_txn_set_dry_run(txn);
+ }
+
+ ovsdb_idl_txn_add_comment(txn, "vtep-ctl: %s", args);
+
+ vtep_global = vteprec_global_first(idl);
+ if (!vtep_global) {
+ /* XXX add verification that table is empty */
+ vtep_global = vteprec_global_insert(txn);
+ }
+
+ symtab = ovsdb_symbol_table_create();
+ for (c = commands; c < &commands[n_commands]; c++) {
+ ds_init(&c->output);
+ c->table = NULL;
+ }
+ vtep_ctl_context_init(&ctx, NULL, idl, txn, vtep_global, symtab);
+ for (c = commands; c < &commands[n_commands]; c++) {
+ vtep_ctl_context_init_command(&ctx, c);
+ if (c->syntax->run) {
+ (c->syntax->run)(&ctx);
+ }
+ vtep_ctl_context_done_command(&ctx, c);
+
+ if (ctx.try_again) {
+ vtep_ctl_context_done(&ctx, NULL);
+ goto try_again;
+ }
+ }
+ vtep_ctl_context_done(&ctx, NULL);
+
+ SHASH_FOR_EACH (node, &symtab->sh) {
+ struct ovsdb_symbol *symbol = node->data;
+ if (!symbol->created) {
+ vtep_ctl_fatal("row id \"%s\" is referenced but never created "
+ "(e.g. with \"-- --id=%s create ...\")",
+ node->name, node->name);
+ }
+ if (!symbol->strong_ref) {
+ if (!symbol->weak_ref) {
+ VLOG_WARN("row id \"%s\" was created but no reference to it "
+ "was inserted, so it will not actually appear in "
+ "the database", node->name);
+ } else {
+ VLOG_WARN("row id \"%s\" was created but only a weak "
+ "reference to it was inserted, so it will not "
+ "actually appear in the database", node->name);
+ }
+ }
+ }
+
+ status = ovsdb_idl_txn_commit_block(txn);
+ if (status == TXN_UNCHANGED || status == TXN_SUCCESS) {
+ for (c = commands; c < &commands[n_commands]; c++) {
+ if (c->syntax->postprocess) {
+ struct vtep_ctl_context ctx;
+
+ vtep_ctl_context_init(&ctx, c, idl, txn, vtep_global, symtab);
+ (c->syntax->postprocess)(&ctx);
+ vtep_ctl_context_done(&ctx, c);
+ }
+ }
+ }
+ error = xstrdup(ovsdb_idl_txn_get_error(txn));
+ ovsdb_idl_txn_destroy(txn);
+ txn = the_idl_txn = NULL;
+
+ switch (status) {
+ case TXN_UNCOMMITTED:
+ case TXN_INCOMPLETE:
+ NOT_REACHED();
+
+ case TXN_ABORTED:
+ /* Should not happen--we never call ovsdb_idl_txn_abort(). */
+ vtep_ctl_fatal("transaction aborted");
+
+ case TXN_UNCHANGED:
+ case TXN_SUCCESS:
+ break;
+
+ case TXN_TRY_AGAIN:
+ goto try_again;
+
+ case TXN_ERROR:
+ vtep_ctl_fatal("transaction error: %s", error);
+
+ case TXN_NOT_LOCKED:
+ /* Should not happen--we never call ovsdb_idl_set_lock(). */
+ vtep_ctl_fatal("database not locked");
+
+ default:
+ NOT_REACHED();
+ }
+ free(error);
+
+ ovsdb_symbol_table_destroy(symtab);
+
+ for (c = commands; c < &commands[n_commands]; c++) {
+ struct ds *ds = &c->output;
+
+ if (c->table) {
+ table_print(c->table, &table_style);
+ } else if (oneline) {
+ size_t j;
+
+ ds_chomp(ds, '\n');
+ for (j = 0; j < ds->length; j++) {
+ int ch = ds->string[j];
+ switch (ch) {
+ case '\n':
+ fputs("\\n", stdout);
+ break;
+
+ case '\\':
+ fputs("\\\\", stdout);
+ break;
+
+ default:
+ putchar(ch);
+ }
+ }
+ putchar('\n');
+ } else {
+ fputs(ds_cstr(ds), stdout);
+ }
+ ds_destroy(&c->output);
+ table_destroy(c->table);
+ free(c->table);
+
+ shash_destroy_free_data(&c->options);
+ }
+ free(commands);
+
+ ovsdb_idl_destroy(idl);
+
+ exit(EXIT_SUCCESS);
+
+try_again:
+ /* Our transaction needs to be rerun, or a prerequisite was not met. Free
+ * resources and return so that the caller can try again. */
+ if (txn) {
+ ovsdb_idl_txn_abort(txn);
+ ovsdb_idl_txn_destroy(txn);
+ }
+ ovsdb_symbol_table_destroy(symtab);
+ for (c = commands; c < &commands[n_commands]; c++) {
+ ds_destroy(&c->output);
+ table_destroy(c->table);
+ free(c->table);
+ }
+ free(error);
+}
+
+static const struct vtep_ctl_command_syntax all_commands[] = {
+ /* Physical Switch commands. */
+ {"add-ps", 1, 1, pre_get_info, cmd_add_ps, NULL, "--may-exist", RW},
+ {"del-ps", 1, 1, pre_get_info, cmd_del_ps, NULL, "--if-exists", RW},
+ {"list-ps", 0, 0, pre_get_info, cmd_list_ps, NULL, "", RO},
+ {"ps-exists", 1, 1, pre_get_info, cmd_ps_exists, NULL, "", RO},
+
+ /* Port commands. */
+ {"list-ports", 1, 1, pre_get_info, cmd_list_ports, NULL, "", RO},
+ {"add-port", 2, 2, pre_get_info, cmd_add_port, NULL, "--may-exist",
+ RW},
+ {"del-port", 2, 2, pre_get_info, cmd_del_port, NULL, "--if-exists", RW},
+
+ /* Logical Switch commands. */
+ {"add-ls", 1, 1, pre_get_info, cmd_add_ls, NULL, "--may-exist", RW},
+ {"del-ls", 1, 1, pre_get_info, cmd_del_ls, NULL, "--if-exists", RW},
+ {"list-ls", 0, 0, pre_get_info, cmd_list_ls, NULL, "", RO},
+ {"ls-exists", 1, 1, pre_get_info, cmd_ls_exists, NULL, "", RO},
+ {"list-bindings", 2, 2, pre_get_info, cmd_list_bindings, NULL, "", RO},
+ {"bind-ls", 4, 4, pre_get_info, cmd_bind_ls, NULL, "", RO},
+ {"unbind-ls", 3, 3, pre_get_info, cmd_unbind_ls, NULL, "", RO},
+
+ /* MAC binding commands. */
+ {"add-ucast-local", 3, 4, pre_get_info, cmd_add_ucast_local, NULL, "", RW},
+ {"del-ucast-local", 2, 2, pre_get_info, cmd_del_ucast_local, NULL, "", RW},
+ {"add-mcast-local", 3, 4, pre_get_info, cmd_add_mcast_local, NULL, "", RW},
+ {"del-mcast-local", 3, 4, pre_get_info, cmd_del_mcast_local, NULL, "", RW},
+ {"clear-local-macs", 1, 1, pre_get_info, cmd_clear_local_macs, NULL, "",
+ RO},
+ {"list-local-macs", 1, 1, pre_get_info, cmd_list_local_macs, NULL, "", RO},
+ {"add-ucast-remote", 3, 4, pre_get_info, cmd_add_ucast_remote, NULL, "",
+ RW},
+ {"del-ucast-remote", 2, 2, pre_get_info, cmd_del_ucast_remote, NULL, "",
+ RW},
+ {"add-mcast-remote", 3, 4, pre_get_info, cmd_add_mcast_remote, NULL, "",
+ RW},
+ {"del-mcast-remote", 3, 4, pre_get_info, cmd_del_mcast_remote, NULL, "",
+ RW},
+ {"clear-remote-macs", 1, 1, pre_get_info, cmd_clear_remote_macs, NULL, "",
+ RO},
+ {"list-remote-macs", 1, 1, pre_get_info, cmd_list_remote_macs, NULL, "",
+ RO},
+
+ /* Manager commands. */
+ {"get-manager", 0, 0, pre_manager, cmd_get_manager, NULL, "", RO},
+ {"del-manager", 0, 0, pre_manager, cmd_del_manager, NULL, "", RW},
+ {"set-manager", 1, INT_MAX, pre_manager, cmd_set_manager, NULL, "", RW},
+
+ /* Database commands. */
+ {"comment", 0, INT_MAX, NULL, NULL, NULL, "", RO},
+ {"get", 2, INT_MAX, pre_cmd_get, cmd_get, NULL, "--if-exists,--id=", RO},
+ {"list", 1, INT_MAX, pre_cmd_list, cmd_list, NULL, "--columns=", RO},
+ {"find", 1, INT_MAX, pre_cmd_find, cmd_find, NULL, "--columns=", RO},
+ {"set", 3, INT_MAX, pre_cmd_set, cmd_set, NULL, "", RW},
+ {"add", 4, INT_MAX, pre_cmd_add, cmd_add, NULL, "", RW},
+ {"remove", 4, INT_MAX, pre_cmd_remove, cmd_remove, NULL, "", RW},
+ {"clear", 3, INT_MAX, pre_cmd_clear, cmd_clear, NULL, "", RW},
+ {"create", 2, INT_MAX, pre_create, cmd_create, post_create, "--id=", RW},
+ {"destroy", 1, INT_MAX, pre_cmd_destroy, cmd_destroy, NULL,
+ "--if-exists,--all", RW},
+ {"wait-until", 2, INT_MAX, pre_cmd_wait_until, cmd_wait_until, NULL, "",
+ RO},
+
+ {NULL, 0, 0, NULL, NULL, NULL, NULL, RO},
+};
+