/* * Copyright (c) 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017 Nicira, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include "db-ctl-base.h" #include "command-line.h" #include "compiler.h" #include "dirs.h" #include "fatal-signal.h" #include "hash.h" #include "openvswitch/dynamic-string.h" #include "openvswitch/json.h" #include "openvswitch/ofp-parse.h" #include "openvswitch/poll-loop.h" #include "openvswitch/vconn.h" #include "openvswitch/vlog.h" #include "ovsdb-data.h" #include "ovsdb-idl.h" #include "process.h" #include "simap.h" #include "stream.h" #include "stream-ssl.h" #include "smap.h" #include "sset.h" #include "svec.h" #include "lib/vswitch-idl.h" #include "table.h" #include "timeval.h" #include "util.h" VLOG_DEFINE_THIS_MODULE(vsctl); struct vsctl_context; /* --db: The database server to contact. */ static const char *db; /* --oneline: Write each command's output as a single line? */ static bool oneline; /* --dry-run: Do not commit any changes. */ static bool dry_run; /* --no-wait: Wait for ovs-vswitchd to reload its configuration? */ static bool wait_for_reload = true; /* --timeout: Time to wait for a connection to 'db'. */ static unsigned int timeout; /* --retry: If true, ovs-vsctl will retry connecting to the database forever. * If false and --db says to use an active connection method (e.g. "unix:", * "tcp:", "ssl:"), then ovs-vsctl will try to connect once and exit with an * error if the database server cannot be contacted (e.g. ovsdb-server is not * running). * * Regardless of this setting, --timeout always limits how long ovs-vsctl will * wait. */ static bool retry; /* --leader-only, --no-leader-only: Only accept the leader in a cluster. * * In a real Open vSwitch environment, it doesn't make much sense to cluster * the Open vSwitch database. This option exists to enable using ovs-vsctl to * test OVSDB's clustering feature. */ static int leader_only = true; /* --shuffle-remotes, --no-shuffle-remotes: Shuffle the order of remotes that * are specified in the connetion method string. * * In a real Open vSwitch environment, it doesn't make much sense to cluster * the Open vSwitch database. This option exists to enable using ovs-vsctl to * test OVSDB's clustering feature. */ static int shuffle_remotes = true; /* Format for table output. */ static struct table_style table_style = TABLE_STYLE_DEFAULT; static void vsctl_cmd_init(void); /* The IDL we're using and the current transaction, if any. * This is for use by vsctl_exit() only, to allow it to clean up. * Other code should use its context arguments. */ static struct ovsdb_idl *the_idl; static struct ovsdb_idl_txn *the_idl_txn; OVS_NO_RETURN static void vsctl_exit(int status); OVS_NO_RETURN static void usage(void); static void parse_options(int argc, char *argv[], struct shash *local_options); static void run_prerequisites(struct ctl_command[], size_t n_commands, struct ovsdb_idl *); static bool do_vsctl(const char *args, struct ctl_command *, size_t n, struct ovsdb_idl *); /* post_db_reload_check frame work is to allow ovs-vsctl to do additional * checks after OVSDB transactions are successfully recorded and reload by * ovs-vswitchd. * * For example, When a new interface is added to OVSDB, ovs-vswitchd will * either store a positive values on successful implementing the new * interface, or -1 on failure. * * Unless --no-wait command line option is specified, * post_db_reload_do_checks() is called right after any configuration * changes is picked up (i.e. reload) by ovs-vswitchd. Any error detected * post OVSDB reload is reported as ovs-vsctl errors. OVS-vswitchd logs * more detailed messages about those errors. * * Current implementation only check for Post OVSDB reload failures on new * interface additions with 'add-br' and 'add-port' commands. * * post_db_reload_expect_iface() * * keep track of interfaces to be checked post OVSDB reload. */ static void post_db_reload_check_init(void); static void post_db_reload_do_checks(const struct vsctl_context *); static void post_db_reload_expect_iface(const struct ovsrec_interface *); static struct uuid *neoteric_ifaces; static size_t n_neoteric_ifaces; static size_t allocated_neoteric_ifaces; int main(int argc, char *argv[]) { struct ovsdb_idl *idl; struct ctl_command *commands; struct shash local_options; unsigned int seqno; size_t n_commands; set_program_name(argv[0]); fatal_ignore_sigpipe(); vlog_set_levels(NULL, VLF_CONSOLE, VLL_WARN); vlog_set_levels_from_string_assert("reconnect:warn"); vsctl_cmd_init(); /* Parse command line. */ char *args = process_escape_args(argv); shash_init(&local_options); parse_options(argc, argv, &local_options); char *error = ctl_parse_commands(argc - optind, argv + optind, &local_options, &commands, &n_commands); if (error) { ctl_fatal("%s", error); } VLOG(ctl_might_write_to_db(commands, n_commands) ? VLL_INFO : VLL_DBG, "Called as %s", args); ctl_timeout_setup(timeout); /* Initialize IDL. */ idl = the_idl = ovsdb_idl_create_unconnected(&ovsrec_idl_class, false); ovsdb_idl_set_shuffle_remotes(idl, shuffle_remotes); ovsdb_idl_set_remote(idl, db, retry); ovsdb_idl_set_leader_only(idl, leader_only); ovsdb_idl_set_db_change_aware(idl, false); run_prerequisites(commands, n_commands, idl); /* Execute the commands. * * 'seqno' is the database sequence number for which we last tried to * execute our transaction. There's no point in trying to commit more than * once for any given sequence number, because if the transaction fails * it's because the database changed and we need to obtain an up-to-date * view of the database before we try the transaction again. */ seqno = ovsdb_idl_get_seqno(idl); for (;;) { ovsdb_idl_run(idl); if (!ovsdb_idl_is_alive(idl)) { int retval = ovsdb_idl_get_last_error(idl); ctl_fatal("%s: database connection failed (%s)", db, ovs_retval_to_string(retval)); } if (seqno != ovsdb_idl_get_seqno(idl)) { seqno = ovsdb_idl_get_seqno(idl); if (do_vsctl(args, commands, n_commands, idl)) { free(args); exit(EXIT_SUCCESS); } } if (seqno == ovsdb_idl_get_seqno(idl)) { ovsdb_idl_wait(idl); poll_block(); } } } static void parse_options(int argc, char *argv[], struct shash *local_options) { enum { OPT_DB = UCHAR_MAX + 1, OPT_ONELINE, OPT_NO_SYSLOG, OPT_NO_WAIT, OPT_DRY_RUN, OPT_BOOTSTRAP_CA_CERT, OPT_PEER_CA_CERT, OPT_LOCAL, OPT_RETRY, OPT_COMMANDS, OPT_OPTIONS, VLOG_OPTION_ENUMS, TABLE_OPTION_ENUMS, SSL_OPTION_ENUMS, }; static const struct option global_long_options[] = { {"db", required_argument, NULL, OPT_DB}, {"no-syslog", no_argument, NULL, OPT_NO_SYSLOG}, {"no-wait", no_argument, NULL, OPT_NO_WAIT}, {"dry-run", no_argument, NULL, OPT_DRY_RUN}, {"oneline", no_argument, NULL, OPT_ONELINE}, {"timeout", required_argument, NULL, 't'}, {"retry", no_argument, NULL, OPT_RETRY}, {"help", no_argument, NULL, 'h'}, {"commands", no_argument, NULL, OPT_COMMANDS}, {"options", no_argument, NULL, OPT_OPTIONS}, {"leader-only", no_argument, &leader_only, true}, {"no-leader-only", no_argument, &leader_only, false}, {"shuffle-remotes", no_argument, &shuffle_remotes, true}, {"no-shuffle-remotes", no_argument, &shuffle_remotes, false}, {"version", no_argument, NULL, 'V'}, VLOG_LONG_OPTIONS, TABLE_LONG_OPTIONS, STREAM_SSL_LONG_OPTIONS, {"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT}, {"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT}, {NULL, 0, NULL, 0}, }; const int n_global_long_options = ARRAY_SIZE(global_long_options) - 1; char *tmp, *short_options; struct option *options; size_t allocated_options; size_t n_options; size_t i; tmp = ovs_cmdl_long_options_to_short_options(global_long_options); short_options = xasprintf("+%s", tmp); free(tmp); /* We want to parse both global and command-specific options here, but * getopt_long() isn't too convenient for the job. We copy our global * options into a dynamic array, then append all of the command-specific * options. */ options = xmemdup(global_long_options, sizeof global_long_options); allocated_options = ARRAY_SIZE(global_long_options); n_options = n_global_long_options; ctl_add_cmd_options(&options, &n_options, &allocated_options, OPT_LOCAL); for (;;) { int idx; int c; c = getopt_long(argc, argv, short_options, options, &idx); if (c == -1) { break; } switch (c) { case OPT_DB: db = optarg; break; case OPT_ONELINE: oneline = true; break; case OPT_NO_SYSLOG: vlog_set_levels(&this_module, VLF_SYSLOG, VLL_WARN); break; case OPT_NO_WAIT: wait_for_reload = false; break; case OPT_DRY_RUN: dry_run = true; break; case OPT_LOCAL: if (shash_find(local_options, options[idx].name)) { ctl_fatal("'%s' option specified multiple times", options[idx].name); } shash_add_nocopy(local_options, xasprintf("--%s", options[idx].name), nullable_xstrdup(optarg)); break; case 'h': usage(); case OPT_COMMANDS: ctl_print_commands(); /* fall through */ case OPT_OPTIONS: ctl_print_options(global_long_options); /* fall through */ case 'V': ovs_print_version(0, 0); printf("DB Schema %s\n", ovsrec_get_db_version()); exit(EXIT_SUCCESS); case 't': if (!str_to_uint(optarg, 10, &timeout) || !timeout) { ctl_fatal("value %s on -t or --timeout is invalid", optarg); } break; case OPT_RETRY: retry = true; break; VLOG_OPTION_HANDLERS TABLE_OPTION_HANDLERS(&table_style) STREAM_SSL_OPTION_HANDLERS case OPT_PEER_CA_CERT: stream_ssl_set_peer_ca_cert_file(optarg); break; case OPT_BOOTSTRAP_CA_CERT: stream_ssl_set_ca_cert_file(optarg, true); break; case '?': exit(EXIT_FAILURE); case 0: break; default: abort(); } } free(short_options); if (!db) { db = ctl_default_db(); } for (i = n_global_long_options; options[i].name; i++) { free(CONST_CAST(char *, options[i].name)); } free(options); } static void usage(void) { printf("\ %s: ovs-vswitchd management utility\n\ usage: %s [OPTIONS] COMMAND [ARG...]\n\ \n\ Open vSwitch commands:\n\ init initialize database, if not yet initialized\n\ show print overview of database contents\n\ emer-reset reset configuration to clean state\n\ \n\ Bridge commands:\n\ add-br BRIDGE create a new bridge named BRIDGE\n\ add-br BRIDGE PARENT VLAN create new fake BRIDGE in PARENT on VLAN\n\ del-br BRIDGE delete BRIDGE and all of its ports\n\ list-br print the names of all the bridges\n\ br-exists BRIDGE exit 2 if BRIDGE does not exist\n\ br-to-vlan BRIDGE print the VLAN which BRIDGE is on\n\ br-to-parent BRIDGE print the parent of BRIDGE\n\ br-set-external-id BRIDGE KEY VALUE set KEY on BRIDGE to VALUE\n\ br-set-external-id BRIDGE KEY unset KEY on BRIDGE\n\ br-get-external-id BRIDGE KEY print value of KEY on BRIDGE\n\ br-get-external-id BRIDGE list key-value pairs on BRIDGE\n\ \n\ Port commands (a bond is considered to be a single port):\n\ list-ports BRIDGE print the names of all the ports on BRIDGE\n\ add-port BRIDGE PORT add network device PORT to BRIDGE\n\ add-bond BRIDGE PORT IFACE... add bonded port PORT in BRIDGE from IFACES\n\ del-port [BRIDGE] PORT delete PORT (which may be bonded) from BRIDGE\n\ port-to-br PORT print name of bridge that contains PORT\n\ \n\ Interface commands (a bond consists of multiple interfaces):\n\ list-ifaces BRIDGE print the names of all interfaces on BRIDGE\n\ iface-to-br IFACE print name of bridge that contains IFACE\n\ \n\ Controller commands:\n\ get-controller BRIDGE print the controllers for BRIDGE\n\ del-controller BRIDGE delete the controllers for BRIDGE\n\ [--inactivity-probe=MSECS]\n\ set-controller BRIDGE TARGET... set the controllers for BRIDGE\n\ get-fail-mode BRIDGE print the fail-mode for BRIDGE\n\ del-fail-mode BRIDGE delete the fail-mode for BRIDGE\n\ set-fail-mode BRIDGE MODE set the fail-mode for BRIDGE to MODE\n\ \n\ Manager commands:\n\ get-manager print the managers\n\ del-manager delete the managers\n\ [--inactivity-probe=MSECS]\n\ set-manager TARGET... set the list of managers to TARGET...\n\ \n\ SSL commands:\n\ get-ssl print the SSL configuration\n\ del-ssl delete the SSL configuration\n\ set-ssl PRIV-KEY CERT CA-CERT set the SSL configuration\n\ \n\ Auto Attach commands:\n\ add-aa-mapping BRIDGE I-SID VLAN add Auto Attach mapping to BRIDGE\n\ del-aa-mapping BRIDGE I-SID VLAN delete Auto Attach mapping VLAN from BRIDGE\n\ get-aa-mapping BRIDGE get Auto Attach mappings from BRIDGE\n\ \n\ Switch commands:\n\ emer-reset reset switch to known good state\n\ \n\ %s\ %s\ \n\ Options:\n\ --db=DATABASE connect to DATABASE\n\ (default: %s)\n\ --no-wait do not wait for ovs-vswitchd to reconfigure\n\ --retry keep trying to connect to server forever\n\ -t, --timeout=SECS wait at most SECS seconds for ovs-vswitchd\n\ --dry-run do not commit changes to database\n\ --oneline print exactly one line of output per command\n", program_name, program_name, ctl_get_db_cmd_usage(), ctl_list_db_tables_usage(), ctl_default_db()); table_usage(); vlog_usage(); printf("\ --no-syslog equivalent to --verbose=vsctl:syslog:warn\n"); stream_usage("database", true, true, true); printf("\n\ Other options:\n\ -h, --help display this help message\n\ -V, --version display version information\n"); exit(EXIT_SUCCESS); } /* ovs-vsctl specific context. Inherits the 'struct ctl_context' as base. */ struct vsctl_context { struct ctl_context base; /* Modifiable state. */ const struct ovsrec_open_vswitch *ovs; bool verified_ports; /* A cache of the contents of the database. * * A command that needs to use any of this information must first call * vsctl_context_populate_cache(). A command that changes anything that * could invalidate the cache must either call * vsctl_context_invalidate_cache() or manually update the cache to * maintain its correctness. */ bool cache_valid; struct shash bridges; /* Maps from bridge name to struct vsctl_bridge. */ struct shash ports; /* Maps from port name to struct vsctl_port. */ struct shash ifaces; /* Maps from port name to struct vsctl_iface. */ }; struct vsctl_bridge { struct ovsrec_bridge *br_cfg; char *name; struct ovs_list ports; /* Contains "struct vsctl_port"s. */ /* VLAN ("fake") bridge support. * * Use 'parent != NULL' to detect a fake bridge, because 'vlan' can be 0 * in either case. */ struct hmap children; /* VLAN bridges indexed by 'vlan'. */ struct hmap_node children_node; /* Node in parent's 'children' hmap. */ struct vsctl_bridge *parent; /* Real bridge, or NULL. */ int vlan; /* VLAN VID (0...4095), or 0. */ }; struct vsctl_port { struct ovs_list ports_node; /* In struct vsctl_bridge's 'ports' list. */ struct ovs_list ifaces; /* Contains "struct vsctl_iface"s. */ struct ovsrec_port *port_cfg; struct vsctl_bridge *bridge; }; struct vsctl_iface { struct ovs_list ifaces_node; /* In struct vsctl_port's 'ifaces' list. */ struct ovsrec_interface *iface_cfg; struct vsctl_port *port; }; /* Casts 'base' into 'struct vsctl_context'. */ static struct vsctl_context * vsctl_context_cast(struct ctl_context *base) { return CONTAINER_OF(base, struct vsctl_context, base); } static struct vsctl_bridge *find_vlan_bridge(struct vsctl_bridge *parent, int vlan); static char * vsctl_context_to_string(const struct ctl_context *ctx) { const struct shash_node *node; struct svec words; char *s; int i; svec_init(&words); SHASH_FOR_EACH (node, &ctx->options) { svec_add(&words, node->name); } for (i = 0; i < ctx->argc; i++) { svec_add(&words, ctx->argv[i]); } svec_terminate(&words); s = process_escape_args(words.names); svec_destroy(&words); return s; } static void verify_ports(struct vsctl_context *vsctl_ctx) { if (!vsctl_ctx->verified_ports) { const struct ovsrec_bridge *bridge; const struct ovsrec_port *port; ovsrec_open_vswitch_verify_bridges(vsctl_ctx->ovs); OVSREC_BRIDGE_FOR_EACH (bridge, vsctl_ctx->base.idl) { ovsrec_bridge_verify_ports(bridge); } OVSREC_PORT_FOR_EACH (port, vsctl_ctx->base.idl) { ovsrec_port_verify_interfaces(port); } vsctl_ctx->verified_ports = true; } } static struct vsctl_bridge * add_bridge_to_cache(struct vsctl_context *vsctl_ctx, struct ovsrec_bridge *br_cfg, const char *name, struct vsctl_bridge *parent, int vlan) { struct vsctl_bridge *br = xmalloc(sizeof *br); br->br_cfg = br_cfg; br->name = xstrdup(name); ovs_list_init(&br->ports); br->parent = parent; br->vlan = vlan; hmap_init(&br->children); if (parent) { struct vsctl_bridge *conflict = find_vlan_bridge(parent, vlan); if (conflict) { VLOG_WARN("%s: bridge has multiple VLAN bridges (%s and %s) " "for VLAN %d, but only one is allowed", parent->name, name, conflict->name, vlan); } else { hmap_insert(&parent->children, &br->children_node, hash_int(vlan, 0)); } } shash_add(&vsctl_ctx->bridges, br->name, br); return br; } static void ovs_delete_bridge(const struct ovsrec_open_vswitch *ovs, struct ovsrec_bridge *bridge) { struct ovsrec_bridge **bridges; size_t i, n; bridges = xmalloc(sizeof *ovs->bridges * ovs->n_bridges); for (i = n = 0; i < ovs->n_bridges; i++) { if (ovs->bridges[i] != bridge) { bridges[n++] = ovs->bridges[i]; } } ovsrec_open_vswitch_set_bridges(ovs, bridges, n); free(bridges); } static void del_cached_bridge(struct vsctl_context *vsctl_ctx, struct vsctl_bridge *br) { ovs_assert(ovs_list_is_empty(&br->ports)); ovs_assert(hmap_is_empty(&br->children)); if (br->parent) { hmap_remove(&br->parent->children, &br->children_node); } if (br->br_cfg) { ovsrec_bridge_delete(br->br_cfg); ovs_delete_bridge(vsctl_ctx->ovs, br->br_cfg); } shash_find_and_delete(&vsctl_ctx->bridges, br->name); hmap_destroy(&br->children); free(br->name); free(br); } static bool port_is_fake_bridge(const struct ovsrec_port *port_cfg) { return (port_cfg->fake_bridge && port_cfg->tag && *port_cfg->tag >= 0 && *port_cfg->tag <= 4095); } static struct vsctl_bridge * find_vlan_bridge(struct vsctl_bridge *parent, int vlan) { struct vsctl_bridge *child; HMAP_FOR_EACH_IN_BUCKET (child, children_node, hash_int(vlan, 0), &parent->children) { if (child->vlan == vlan) { return child; } } return NULL; } static struct vsctl_port * add_port_to_cache(struct vsctl_context *vsctl_ctx, struct vsctl_bridge *parent, struct ovsrec_port *port_cfg) { struct vsctl_port *port; if (port_cfg->tag && *port_cfg->tag >= 0 && *port_cfg->tag <= 4095) { struct vsctl_bridge *vlan_bridge; vlan_bridge = find_vlan_bridge(parent, *port_cfg->tag); if (vlan_bridge) { parent = vlan_bridge; } } port = xmalloc(sizeof *port); ovs_list_push_back(&parent->ports, &port->ports_node); ovs_list_init(&port->ifaces); port->port_cfg = port_cfg; port->bridge = parent; shash_add(&vsctl_ctx->ports, port_cfg->name, port); return port; } static void del_cached_port(struct vsctl_context *vsctl_ctx, struct vsctl_port *port) { ovs_assert(ovs_list_is_empty(&port->ifaces)); ovs_list_remove(&port->ports_node); shash_find_and_delete(&vsctl_ctx->ports, port->port_cfg->name); ovsrec_port_delete(port->port_cfg); free(port); } static struct vsctl_iface * add_iface_to_cache(struct vsctl_context *vsctl_ctx, struct vsctl_port *parent, struct ovsrec_interface *iface_cfg) { struct vsctl_iface *iface; iface = xmalloc(sizeof *iface); ovs_list_push_back(&parent->ifaces, &iface->ifaces_node); iface->iface_cfg = iface_cfg; iface->port = parent; shash_add(&vsctl_ctx->ifaces, iface_cfg->name, iface); return iface; } static void del_cached_iface(struct vsctl_context *vsctl_ctx, struct vsctl_iface *iface) { ovs_list_remove(&iface->ifaces_node); shash_find_and_delete(&vsctl_ctx->ifaces, iface->iface_cfg->name); ovsrec_interface_delete(iface->iface_cfg); free(iface); } static void vsctl_context_invalidate_cache(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct shash_node *node; if (!vsctl_ctx->cache_valid) { return; } vsctl_ctx->cache_valid = false; SHASH_FOR_EACH (node, &vsctl_ctx->bridges) { struct vsctl_bridge *bridge = node->data; hmap_destroy(&bridge->children); free(bridge->name); free(bridge); } shash_destroy(&vsctl_ctx->bridges); shash_destroy_free_data(&vsctl_ctx->ports); shash_destroy_free_data(&vsctl_ctx->ifaces); } static void pre_get_info(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_bridges); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_name); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_controller); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_fail_mode); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_ports); ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_name); ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_fake_bridge); ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_tag); ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_interfaces); ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_name); ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_ofport); ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_error); } static void vsctl_context_populate_cache(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); const struct ovsrec_open_vswitch *ovs = vsctl_ctx->ovs; struct sset bridges, ports; size_t i; if (vsctl_ctx->cache_valid) { /* Cache is already populated. */ return; } vsctl_ctx->cache_valid = true; shash_init(&vsctl_ctx->bridges); shash_init(&vsctl_ctx->ports); shash_init(&vsctl_ctx->ifaces); sset_init(&bridges); sset_init(&ports); for (i = 0; i < ovs->n_bridges; i++) { struct ovsrec_bridge *br_cfg = ovs->bridges[i]; struct vsctl_bridge *br; size_t j; if (!sset_add(&bridges, br_cfg->name)) { VLOG_WARN("%s: database contains duplicate bridge name", br_cfg->name); continue; } br = add_bridge_to_cache(vsctl_ctx, br_cfg, br_cfg->name, NULL, 0); for (j = 0; j < br_cfg->n_ports; j++) { struct ovsrec_port *port_cfg = br_cfg->ports[j]; if (!sset_add(&ports, port_cfg->name)) { /* Duplicate port name. (We will warn about that later.) */ continue; } if (port_is_fake_bridge(port_cfg) && sset_add(&bridges, port_cfg->name)) { add_bridge_to_cache(vsctl_ctx, NULL, port_cfg->name, br, *port_cfg->tag); } } } sset_destroy(&bridges); sset_destroy(&ports); sset_init(&bridges); for (i = 0; i < ovs->n_bridges; i++) { struct ovsrec_bridge *br_cfg = ovs->bridges[i]; struct vsctl_bridge *br; size_t j; if (!sset_add(&bridges, br_cfg->name)) { continue; } br = shash_find_data(&vsctl_ctx->bridges, br_cfg->name); for (j = 0; j < br_cfg->n_ports; j++) { struct ovsrec_port *port_cfg = br_cfg->ports[j]; struct vsctl_port *port; size_t k; port = shash_find_data(&vsctl_ctx->ports, port_cfg->name); if (port) { if (port_cfg == port->port_cfg) { VLOG_WARN("%s: port is in multiple bridges (%s and %s)", port_cfg->name, br->name, port->bridge->name); } else { /* Log as an error because this violates the database's * uniqueness constraints, so the database server shouldn't * have allowed it. */ VLOG_ERR("%s: database contains duplicate port name", port_cfg->name); } continue; } if (port_is_fake_bridge(port_cfg) && !sset_add(&bridges, port_cfg->name)) { continue; } port = add_port_to_cache(vsctl_ctx, br, port_cfg); for (k = 0; k < port_cfg->n_interfaces; k++) { struct ovsrec_interface *iface_cfg = port_cfg->interfaces[k]; struct vsctl_iface *iface; iface = shash_find_data(&vsctl_ctx->ifaces, iface_cfg->name); if (iface) { if (iface_cfg == iface->iface_cfg) { VLOG_WARN("%s: interface is in multiple ports " "(%s and %s)", iface_cfg->name, iface->port->port_cfg->name, port->port_cfg->name); } else { /* Log as an error because this violates the database's * uniqueness constraints, so the database server * shouldn't have allowed it. */ VLOG_ERR("%s: database contains duplicate interface " "name", iface_cfg->name); } continue; } add_iface_to_cache(vsctl_ctx, port, iface_cfg); } } } sset_destroy(&bridges); } static void check_conflicts(struct vsctl_context *vsctl_ctx, const char *name, char *msg) { struct vsctl_iface *iface; struct vsctl_port *port; verify_ports(vsctl_ctx); if (shash_find(&vsctl_ctx->bridges, name)) { ctl_fatal("%s because a bridge named %s already exists", msg, name); } port = shash_find_data(&vsctl_ctx->ports, name); if (port) { ctl_fatal("%s because a port named %s already exists on " "bridge %s", msg, name, port->bridge->name); } iface = shash_find_data(&vsctl_ctx->ifaces, name); if (iface) { ctl_fatal("%s because an interface named %s already exists " "on bridge %s", msg, name, iface->port->bridge->name); } free(msg); } static struct vsctl_bridge * find_bridge(struct vsctl_context *vsctl_ctx, const char *name, bool must_exist) { struct vsctl_bridge *br; ovs_assert(vsctl_ctx->cache_valid); br = shash_find_data(&vsctl_ctx->bridges, name); if (must_exist && !br) { ctl_fatal("no bridge named %s", name); } ovsrec_open_vswitch_verify_bridges(vsctl_ctx->ovs); return br; } static struct vsctl_bridge * find_real_bridge(struct vsctl_context *vsctl_ctx, const char *name, bool must_exist) { struct vsctl_bridge *br = find_bridge(vsctl_ctx, name, must_exist); if (br && br->parent) { ctl_fatal("%s is a fake bridge", name); } return br; } static struct vsctl_port * find_port(struct vsctl_context *vsctl_ctx, const char *name, bool must_exist) { struct vsctl_port *port; ovs_assert(vsctl_ctx->cache_valid); port = shash_find_data(&vsctl_ctx->ports, name); if (port && !strcmp(name, port->bridge->name)) { port = NULL; } if (must_exist && !port) { ctl_fatal("no port named %s", name); } verify_ports(vsctl_ctx); return port; } static struct vsctl_iface * find_iface(struct vsctl_context *vsctl_ctx, const char *name, bool must_exist) { struct vsctl_iface *iface; ovs_assert(vsctl_ctx->cache_valid); iface = shash_find_data(&vsctl_ctx->ifaces, name); if (iface && !strcmp(name, iface->port->bridge->name)) { iface = NULL; } if (must_exist && !iface) { ctl_fatal("no interface named %s", name); } verify_ports(vsctl_ctx); return iface; } static void bridge_insert_port(struct ovsrec_bridge *br, struct ovsrec_port *port) { struct ovsrec_port **ports; size_t i; ports = xmalloc(sizeof *br->ports * (br->n_ports + 1)); for (i = 0; i < br->n_ports; i++) { ports[i] = br->ports[i]; } ports[br->n_ports] = port; ovsrec_bridge_set_ports(br, ports, br->n_ports + 1); free(ports); } static void bridge_delete_port(struct ovsrec_bridge *br, struct ovsrec_port *port) { struct ovsrec_port **ports; size_t i, n; ports = xmalloc(sizeof *br->ports * br->n_ports); for (i = n = 0; i < br->n_ports; i++) { if (br->ports[i] != port) { ports[n++] = br->ports[i]; } } ovsrec_bridge_set_ports(br, ports, n); free(ports); } static void ovs_insert_bridge(const struct ovsrec_open_vswitch *ovs, struct ovsrec_bridge *bridge) { struct ovsrec_bridge **bridges; size_t i; bridges = xmalloc(sizeof *ovs->bridges * (ovs->n_bridges + 1)); for (i = 0; i < ovs->n_bridges; i++) { bridges[i] = ovs->bridges[i]; } bridges[ovs->n_bridges] = bridge; ovsrec_open_vswitch_set_bridges(ovs, bridges, ovs->n_bridges + 1); free(bridges); } static void cmd_init(struct ctl_context *ctx OVS_UNUSED) { } static struct cmd_show_table cmd_show_tables[] = { {&ovsrec_table_open_vswitch, NULL, {&ovsrec_open_vswitch_col_manager_options, &ovsrec_open_vswitch_col_bridges, &ovsrec_open_vswitch_col_ovs_version}, {NULL, NULL, NULL} }, {&ovsrec_table_bridge, &ovsrec_bridge_col_name, {&ovsrec_bridge_col_controller, &ovsrec_bridge_col_fail_mode, &ovsrec_bridge_col_datapath_type, &ovsrec_bridge_col_ports}, {NULL, NULL, NULL} }, {&ovsrec_table_port, &ovsrec_port_col_name, {&ovsrec_port_col_tag, &ovsrec_port_col_trunks, &ovsrec_port_col_interfaces}, {NULL, NULL, NULL} }, {&ovsrec_table_interface, &ovsrec_interface_col_name, {&ovsrec_interface_col_type, &ovsrec_interface_col_options, &ovsrec_interface_col_error, &ovsrec_interface_col_bfd_status}, {NULL, NULL, NULL} }, {&ovsrec_table_controller, &ovsrec_controller_col_target, {&ovsrec_controller_col_is_connected, NULL, NULL}, {NULL, NULL, NULL} }, {&ovsrec_table_manager, &ovsrec_manager_col_target, {&ovsrec_manager_col_is_connected, NULL, NULL}, {NULL, NULL, NULL} }, {NULL, NULL, {NULL, NULL, NULL}, {NULL, NULL, NULL}} }; static void pre_cmd_emer_reset(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_manager_options); ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_controller); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_fail_mode); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_mirrors); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_netflow); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_sflow); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_ipfix); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_flood_vlans); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_other_config); ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_other_config); ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_ingress_policing_rate); ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_ingress_policing_burst); } static void cmd_emer_reset(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); const struct ovsdb_idl *idl = ctx->idl; const struct ovsrec_bridge *br; const struct ovsrec_port *port; const struct ovsrec_interface *iface; const struct ovsrec_mirror *mirror; const struct ovsrec_controller *ctrl; const struct ovsrec_manager *mgr; const struct ovsrec_netflow *nf; const struct ovsrec_ssl *ssl; const struct ovsrec_sflow *sflow; const struct ovsrec_ipfix *ipfix; const struct ovsrec_flow_sample_collector_set *fscset; /* Reset the Open_vSwitch table. */ ovsrec_open_vswitch_set_manager_options(vsctl_ctx->ovs, NULL, 0); ovsrec_open_vswitch_set_ssl(vsctl_ctx->ovs, NULL); OVSREC_BRIDGE_FOR_EACH (br, idl) { const char *hwaddr; ovsrec_bridge_set_controller(br, NULL, 0); ovsrec_bridge_set_fail_mode(br, NULL); ovsrec_bridge_set_mirrors(br, NULL, 0); ovsrec_bridge_set_netflow(br, NULL); ovsrec_bridge_set_sflow(br, NULL); ovsrec_bridge_set_ipfix(br, NULL); ovsrec_bridge_set_flood_vlans(br, NULL, 0); /* We only want to save the "hwaddr" key from other_config. */ hwaddr = smap_get(&br->other_config, "hwaddr"); if (hwaddr) { const struct smap smap = SMAP_CONST1(&smap, "hwaddr", hwaddr); ovsrec_bridge_set_other_config(br, &smap); } else { ovsrec_bridge_set_other_config(br, NULL); } } OVSREC_PORT_FOR_EACH (port, idl) { ovsrec_port_set_other_config(port, NULL); } OVSREC_INTERFACE_FOR_EACH (iface, idl) { /* xxx What do we do about gre/patch devices created by mgr? */ ovsrec_interface_set_ingress_policing_rate(iface, 0); ovsrec_interface_set_ingress_policing_burst(iface, 0); } OVSREC_MIRROR_FOR_EACH_SAFE (mirror, idl) { ovsrec_mirror_delete(mirror); } OVSREC_CONTROLLER_FOR_EACH_SAFE (ctrl, idl) { ovsrec_controller_delete(ctrl); } OVSREC_MANAGER_FOR_EACH_SAFE (mgr, idl) { ovsrec_manager_delete(mgr); } OVSREC_NETFLOW_FOR_EACH_SAFE (nf, idl) { ovsrec_netflow_delete(nf); } OVSREC_SSL_FOR_EACH_SAFE (ssl, idl) { ovsrec_ssl_delete(ssl); } OVSREC_SFLOW_FOR_EACH_SAFE (sflow, idl) { ovsrec_sflow_delete(sflow); } OVSREC_IPFIX_FOR_EACH_SAFE (ipfix, idl) { ovsrec_ipfix_delete(ipfix); } OVSREC_FLOW_SAMPLE_COLLECTOR_SET_FOR_EACH_SAFE (fscset, idl) { ovsrec_flow_sample_collector_set_delete(fscset); } vsctl_context_invalidate_cache(ctx); } static struct ovsrec_datapath * find_datapath(struct vsctl_context *vsctl_ctx, const char *dp_name) { const struct ovsrec_open_vswitch *ovs = vsctl_ctx->ovs; for (int i = 0; i < ovs->n_datapaths; i++) { if (!strcmp(ovs->key_datapaths[i], dp_name)) { return ovs->value_datapaths[i]; } } return NULL; } static struct ovsrec_ct_zone * find_ct_zone(struct ovsrec_datapath *dp, const int64_t zone_id) { for (int i = 0; i < dp->n_ct_zones; i++) { if (dp->key_ct_zones[i] == zone_id) { return dp->value_ct_zones[i]; } } return NULL; } static struct ovsrec_ct_timeout_policy * create_timeout_policy(struct ctl_context *ctx, char **tps, int n_tps) { const struct ovsrec_ct_timeout_policy_table *tp_table; const struct ovsrec_ct_timeout_policy *row; struct ovsrec_ct_timeout_policy *tp = NULL; struct simap new_tp = SIMAP_INITIALIZER(&new_tp); char **policies = xzalloc(sizeof *policies * n_tps); const char **key_timeouts = xmalloc(sizeof *key_timeouts * n_tps); int64_t *value_timeouts = xmalloc(sizeof *value_timeouts * n_tps); /* Parse timeout arguments. */ for (int i = 0; i < n_tps; i++) { policies[i] = xstrdup(tps[i]); char *key, *value; char *policy = policies[i]; if (!ofputil_parse_key_value(&policy, &key, &value)) { goto done; } key_timeouts[i] = key; value_timeouts[i] = atoi(value); simap_put(&new_tp, key, (unsigned int)value_timeouts[i]); } done: tp_table = ovsrec_ct_timeout_policy_table_get(ctx->idl); OVSREC_CT_TIMEOUT_POLICY_TABLE_FOR_EACH (row, tp_table) { struct simap s = SIMAP_INITIALIZER(&s); /* Convert to simap. */ for (int i = 0; i < row->n_timeouts; i++) { simap_put(&s, row->key_timeouts[i], row->value_timeouts[i]); } if (simap_equal(&s, &new_tp)) { tp = CONST_CAST(struct ovsrec_ct_timeout_policy *, row); simap_destroy(&s); break; } simap_destroy(&s); } if (!tp) { tp = ovsrec_ct_timeout_policy_insert(ctx->txn); ovsrec_ct_timeout_policy_set_timeouts(tp, key_timeouts, (const int64_t *)value_timeouts, n_tps); } for (int i = 0; i < n_tps; i++) { free(policies[i]); } free(policies); simap_destroy(&new_tp); free(key_timeouts); free(value_timeouts); return tp; } static void cmd_add_zone_tp(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct ovsrec_ct_timeout_policy *tp; int64_t zone_id; const char *dp_name = ctx->argv[1]; ovs_scan(ctx->argv[2], "zone=%"SCNi64, &zone_id); bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL; struct ovsrec_datapath *dp = find_datapath(vsctl_ctx, dp_name); if (!dp) { ctl_fatal("datapath %s does not exist", dp_name); } int n_tps = ctx->argc - 3; struct ovsrec_ct_zone *zone = find_ct_zone(dp, zone_id); if (n_tps <= 0) { ctl_fatal("No timeout policy"); } if (zone && !may_exist) { ctl_fatal("zone id %"PRIu64" already exists", zone_id); } tp = create_timeout_policy(ctx, &ctx->argv[3], n_tps); if (zone) { ovsrec_ct_zone_set_timeout_policy(zone, tp); } else { zone = ovsrec_ct_zone_insert(ctx->txn); ovsrec_ct_zone_set_timeout_policy(zone, tp); ovsrec_datapath_update_ct_zones_setkey(dp, zone_id, zone); } } static void cmd_del_zone_tp(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); int64_t zone_id; bool must_exist = !shash_find(&ctx->options, "--if-exists"); const char *dp_name = ctx->argv[1]; ovs_scan(ctx->argv[2], "zone=%"SCNi64, &zone_id); struct ovsrec_datapath *dp = find_datapath(vsctl_ctx, dp_name); if (!dp) { ctl_fatal("datapath %s does not exist", dp_name); } struct ovsrec_ct_zone *zone = find_ct_zone(dp, zone_id); if (must_exist && !zone) { ctl_fatal("zone id %"PRIu64" does not exist", zone_id); } if (zone) { ovsrec_datapath_update_ct_zones_delkey(dp, zone_id); } } static void cmd_list_zone_tp(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct ovsrec_datapath *dp = find_datapath(vsctl_ctx, ctx->argv[1]); if (!dp) { ctl_fatal("datapath: %s record not found", ctx->argv[1]); } for (int i = 0; i < dp->n_ct_zones; i++) { struct ovsrec_ct_zone *zone = dp->value_ct_zones[i]; ds_put_format(&ctx->output, "Zone:%"PRIu64", Timeout Policies: ", dp->key_ct_zones[i]); struct ovsrec_ct_timeout_policy *tp = zone->timeout_policy; if (tp) { for (int j = 0; j < tp->n_timeouts; j++) { ds_put_format(&ctx->output, "%s=%"PRIu64" ", tp->key_timeouts[j], tp->value_timeouts[j]); } } else { ds_put_cstr(&ctx->output, "system default"); } ds_chomp(&ctx->output, ' '); ds_put_char(&ctx->output, '\n'); } } static void pre_get_zone(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_datapaths); ovsdb_idl_add_column(ctx->idl, &ovsrec_datapath_col_ct_zones); ovsdb_idl_add_column(ctx->idl, &ovsrec_ct_zone_col_timeout_policy); ovsdb_idl_add_column(ctx->idl, &ovsrec_ct_timeout_policy_col_timeouts); } static void pre_get_dp_cap(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_datapaths); ovsdb_idl_add_column(ctx->idl, &ovsrec_datapath_col_capabilities); } static void cmd_list_dp_cap(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct smap_node *node; struct ovsrec_datapath *dp = find_datapath(vsctl_ctx, ctx->argv[1]); if (!dp) { ctl_fatal("datapath \"%s\" record not found", ctx->argv[1]); } SMAP_FOR_EACH (node, &dp->capabilities) { ds_put_format(&ctx->output, "%s=%s ",node->key, node->value); } ds_chomp(&ctx->output, ' '); ds_put_char(&ctx->output, '\n'); } static void cmd_add_br(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL; const char *br_name, *parent_name; struct ovsrec_interface *iface; int vlan; br_name = ctx->argv[1]; if (!br_name[0]) { ctl_fatal("bridge name must not be empty string"); } if (ctx->argc == 2) { parent_name = NULL; vlan = 0; } else if (ctx->argc == 4) { parent_name = ctx->argv[2]; vlan = atoi(ctx->argv[3]); if (vlan < 0 || vlan > 4095) { ctl_fatal("%s: vlan must be between 0 and 4095", ctx->argv[0]); } } else { ctl_fatal("'%s' command takes exactly 1 or 3 arguments", ctx->argv[0]); } vsctl_context_populate_cache(ctx); if (may_exist) { struct vsctl_bridge *br; br = find_bridge(vsctl_ctx, br_name, false); if (br) { if (!parent_name) { if (br->parent) { ctl_fatal("\"--may-exist add-br %s\" but %s is " "a VLAN bridge for VLAN %d", br_name, br_name, br->vlan); } } else { if (!br->parent) { ctl_fatal("\"--may-exist add-br %s %s %d\" but %s " "is not a VLAN bridge", br_name, parent_name, vlan, br_name); } else if (strcmp(br->parent->name, parent_name)) { ctl_fatal("\"--may-exist add-br %s %s %d\" but %s " "has the wrong parent %s", br_name, parent_name, vlan, br_name, br->parent->name); } else if (br->vlan != vlan) { ctl_fatal("\"--may-exist add-br %s %s %d\" but %s " "is a VLAN bridge for the wrong VLAN %d", br_name, parent_name, vlan, br_name, br->vlan); } } return; } } check_conflicts(vsctl_ctx, br_name, xasprintf("cannot create a bridge named %s", br_name)); if (!parent_name) { struct ovsrec_port *port; struct ovsrec_bridge *br; iface = ovsrec_interface_insert(ctx->txn); ovsrec_interface_set_name(iface, br_name); ovsrec_interface_set_type(iface, "internal"); port = ovsrec_port_insert(ctx->txn); ovsrec_port_set_name(port, br_name); ovsrec_port_set_interfaces(port, &iface, 1); br = ovsrec_bridge_insert(ctx->txn); ovsrec_bridge_set_name(br, br_name); ovsrec_bridge_set_ports(br, &port, 1); ovs_insert_bridge(vsctl_ctx->ovs, br); } else { struct vsctl_bridge *conflict; struct vsctl_bridge *parent; struct ovsrec_port *port; struct ovsrec_bridge *br; int64_t tag = vlan; parent = find_bridge(vsctl_ctx, parent_name, false); if (parent && parent->parent) { ctl_fatal("cannot create bridge with fake bridge as parent"); } if (!parent) { ctl_fatal("parent bridge %s does not exist", parent_name); } conflict = find_vlan_bridge(parent, vlan); if (conflict) { ctl_fatal("bridge %s already has a child VLAN bridge %s " "on VLAN %d", parent_name, conflict->name, vlan); } br = parent->br_cfg; iface = ovsrec_interface_insert(ctx->txn); ovsrec_interface_set_name(iface, br_name); ovsrec_interface_set_type(iface, "internal"); port = ovsrec_port_insert(ctx->txn); ovsrec_port_set_name(port, br_name); ovsrec_port_set_interfaces(port, &iface, 1); ovsrec_port_set_fake_bridge(port, true); ovsrec_port_set_tag(port, &tag, 1); bridge_insert_port(br, port); } post_db_reload_expect_iface(iface); vsctl_context_invalidate_cache(ctx); } static void del_port(struct vsctl_context *vsctl_ctx, struct vsctl_port *port) { struct vsctl_iface *iface; bridge_delete_port((port->bridge->parent ? port->bridge->parent->br_cfg : port->bridge->br_cfg), port->port_cfg); LIST_FOR_EACH_SAFE (iface, ifaces_node, &port->ifaces) { del_cached_iface(vsctl_ctx, iface); } del_cached_port(vsctl_ctx, port); } static void del_bridge(struct vsctl_context *vsctl_ctx, struct vsctl_bridge *br) { struct vsctl_bridge *child; struct vsctl_port *port; const struct ovsrec_flow_sample_collector_set *fscset; HMAP_FOR_EACH_SAFE (child, children_node, &br->children) { del_bridge(vsctl_ctx, child); } LIST_FOR_EACH_SAFE (port, ports_node, &br->ports) { del_port(vsctl_ctx, port); } OVSREC_FLOW_SAMPLE_COLLECTOR_SET_FOR_EACH_SAFE (fscset, vsctl_ctx->base.idl) { if (fscset->bridge == br->br_cfg) { ovsrec_flow_sample_collector_set_delete(fscset); } } del_cached_bridge(vsctl_ctx, br); } static void cmd_del_br(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); bool must_exist = !shash_find(&ctx->options, "--if-exists"); struct vsctl_bridge *bridge; vsctl_context_populate_cache(ctx); bridge = find_bridge(vsctl_ctx, ctx->argv[1], must_exist); if (bridge) { del_bridge(vsctl_ctx, bridge); } } static void output_sorted(struct svec *svec, struct ds *output) { const char *name; size_t i; svec_sort(svec); SVEC_FOR_EACH (i, name, svec) { ds_put_format(output, "%s\n", name); } } static void cmd_list_br(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct shash_node *node; struct svec bridges; bool real = shash_find(&ctx->options, "--real"); bool fake = shash_find(&ctx->options, "--fake"); /* If neither fake nor real were requested, return both. */ if (!real && !fake) { real = fake = true; } vsctl_context_populate_cache(ctx); svec_init(&bridges); SHASH_FOR_EACH (node, &vsctl_ctx->bridges) { struct vsctl_bridge *br = node->data; if (br->parent ? fake : real) { svec_add(&bridges, br->name); } } output_sorted(&bridges, &ctx->output); svec_destroy(&bridges); } static void cmd_br_exists(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); vsctl_context_populate_cache(ctx); if (!find_bridge(vsctl_ctx, ctx->argv[1], false)) { vsctl_exit(2); } } static void set_external_id(struct smap *old, struct smap *new, char *key, char *value) { smap_clone(new, old); if (value) { smap_replace(new, key, value); } else { smap_remove(new, key); } } static void pre_cmd_br_set_external_id(struct ctl_context *ctx) { pre_get_info(ctx); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_external_ids); ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_external_ids); } static void cmd_br_set_external_id(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *bridge; struct smap new; vsctl_context_populate_cache(ctx); bridge = find_bridge(vsctl_ctx, ctx->argv[1], true); if (bridge->br_cfg) { set_external_id(&bridge->br_cfg->external_ids, &new, ctx->argv[2], ctx->argc >= 4 ? ctx->argv[3] : NULL); ovsrec_bridge_verify_external_ids(bridge->br_cfg); ovsrec_bridge_set_external_ids(bridge->br_cfg, &new); } else { char *key = xasprintf("fake-bridge-%s", ctx->argv[2]); struct vsctl_port *port = shash_find_data(&vsctl_ctx->ports, ctx->argv[1]); set_external_id(&port->port_cfg->external_ids, &new, key, ctx->argc >= 4 ? ctx->argv[3] : NULL); ovsrec_port_verify_external_ids(port->port_cfg); ovsrec_port_set_external_ids(port->port_cfg, &new); free(key); } smap_destroy(&new); } static void get_external_id(struct smap *smap, const char *prefix, const char *key, struct ds *output) { if (key) { char *prefix_key = xasprintf("%s%s", prefix, key); const char *value = smap_get(smap, prefix_key); if (value) { ds_put_format(output, "%s\n", value); } free(prefix_key); } else { const struct smap_node **sorted = smap_sort(smap); size_t prefix_len = strlen(prefix); size_t i; for (i = 0; i < smap_count(smap); i++) { const struct smap_node *node = sorted[i]; if (!strncmp(node->key, prefix, prefix_len)) { ds_put_format(output, "%s=%s\n", node->key + prefix_len, node->value); } } free(sorted); } } static void pre_cmd_br_get_external_id(struct ctl_context *ctx) { pre_cmd_br_set_external_id(ctx); } static void cmd_br_get_external_id(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *bridge; vsctl_context_populate_cache(ctx); bridge = find_bridge(vsctl_ctx, ctx->argv[1], true); if (bridge->br_cfg) { ovsrec_bridge_verify_external_ids(bridge->br_cfg); get_external_id(&bridge->br_cfg->external_ids, "", ctx->argc >= 3 ? ctx->argv[2] : NULL, &ctx->output); } else { struct vsctl_port *port = shash_find_data(&vsctl_ctx->ports, ctx->argv[1]); ovsrec_port_verify_external_ids(port->port_cfg); get_external_id(&port->port_cfg->external_ids, "fake-bridge-", ctx->argc >= 3 ? ctx->argv[2] : NULL, &ctx->output); } } static void cmd_list_ports(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; struct vsctl_port *port; struct svec ports; vsctl_context_populate_cache(ctx); br = find_bridge(vsctl_ctx, ctx->argv[1], true); ovsrec_bridge_verify_ports(br->br_cfg ? br->br_cfg : br->parent->br_cfg); svec_init(&ports); LIST_FOR_EACH (port, ports_node, &br->ports) { if (strcmp(port->port_cfg->name, br->name)) { svec_add(&ports, port->port_cfg->name); } } output_sorted(&ports, &ctx->output); svec_destroy(&ports); } static void add_port(struct ctl_context *ctx, const char *br_name, const char *port_name, bool may_exist, bool fake_iface, char *iface_names[], int n_ifaces, char *settings[], int n_settings) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *bridge; struct ovsrec_interface **ifaces; struct ovsrec_port *port; size_t i; if (!port_name[0]) { ctl_fatal("port name must not be empty string"); } for (i = 0; i < n_ifaces; i++) { if (!iface_names[i][0]) { ctl_fatal("interface name must not be empty string"); } } vsctl_context_populate_cache(ctx); if (may_exist) { struct vsctl_port *vsctl_port; vsctl_port = find_port(vsctl_ctx, port_name, false); if (vsctl_port) { struct svec want_names, have_names; svec_init(&want_names); for (i = 0; i < n_ifaces; i++) { svec_add(&want_names, iface_names[i]); } svec_sort(&want_names); svec_init(&have_names); for (i = 0; i < vsctl_port->port_cfg->n_interfaces; i++) { svec_add(&have_names, vsctl_port->port_cfg->interfaces[i]->name); } svec_sort(&have_names); if (strcmp(vsctl_port->bridge->name, br_name)) { char *command = vsctl_context_to_string(ctx); ctl_fatal("\"%s\" but %s is actually attached to bridge %s", command, port_name, vsctl_port->bridge->name); } if (!svec_equal(&want_names, &have_names)) { char *have_names_string = svec_join(&have_names, ", ", ""); char *command = vsctl_context_to_string(ctx); ctl_fatal("\"%s\" but %s actually has interface(s) %s", command, port_name, have_names_string); } svec_destroy(&want_names); svec_destroy(&have_names); return; } } check_conflicts(vsctl_ctx, port_name, xasprintf("cannot create a port named %s", port_name)); for (i = 0; i < n_ifaces; i++) { check_conflicts(vsctl_ctx, iface_names[i], xasprintf("cannot create an interface named %s", iface_names[i])); } bridge = find_bridge(vsctl_ctx, br_name, true); ifaces = xmalloc(n_ifaces * sizeof *ifaces); for (i = 0; i < n_ifaces; i++) { ifaces[i] = ovsrec_interface_insert(ctx->txn); ovsrec_interface_set_name(ifaces[i], iface_names[i]); post_db_reload_expect_iface(ifaces[i]); } port = ovsrec_port_insert(ctx->txn); ovsrec_port_set_name(port, port_name); ovsrec_port_set_interfaces(port, ifaces, n_ifaces); ovsrec_port_set_bond_fake_iface(port, fake_iface); if (bridge->parent) { int64_t tag = bridge->vlan; ovsrec_port_set_tag(port, &tag, 1); } for (i = 0; i < n_settings; i++) { char *error = ctl_set_column("Port", &port->header_, settings[i], ctx->symtab); if (error) { ctl_fatal("%s", error); } } bridge_insert_port((bridge->parent ? bridge->parent->br_cfg : bridge->br_cfg), port); struct vsctl_port *vsctl_port = add_port_to_cache(vsctl_ctx, bridge, port); for (i = 0; i < n_ifaces; i++) { add_iface_to_cache(vsctl_ctx, vsctl_port, ifaces[i]); } free(ifaces); } static void cmd_add_port(struct ctl_context *ctx) { bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL; add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, false, &ctx->argv[2], 1, &ctx->argv[3], ctx->argc - 3); } static void cmd_add_bond(struct ctl_context *ctx) { bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL; bool fake_iface = shash_find(&ctx->options, "--fake-iface"); int n_ifaces; int i; n_ifaces = ctx->argc - 3; for (i = 3; i < ctx->argc; i++) { if (strchr(ctx->argv[i], '=')) { n_ifaces = i - 3; break; } } if (n_ifaces < 2) { ctl_fatal("add-bond requires at least 2 interfaces, but only " "%d were specified", n_ifaces); } add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, fake_iface, &ctx->argv[3], n_ifaces, &ctx->argv[n_ifaces + 3], ctx->argc - 3 - n_ifaces); } static void cmd_add_bond_iface(struct ctl_context *ctx) { vsctl_context_populate_cache(ctx); struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL; struct vsctl_port *port = find_port(vsctl_ctx, ctx->argv[1], true); const char *iface_name = ctx->argv[2]; if (may_exist) { struct vsctl_iface *iface = find_iface(vsctl_ctx, iface_name, false); if (iface) { if (iface->port == port) { return; } char *command = vsctl_context_to_string(ctx); ctl_fatal("\"%s\" but %s is actually attached to port %s", command, iface_name, iface->port->port_cfg->name); } } check_conflicts(vsctl_ctx, iface_name, xasprintf("cannot create an interface named %s", iface_name)); struct ovsrec_interface *iface = ovsrec_interface_insert(ctx->txn); ovsrec_interface_set_name(iface, iface_name); ovsrec_port_update_interfaces_addvalue(port->port_cfg, iface); post_db_reload_expect_iface(iface); add_iface_to_cache(vsctl_ctx, port, iface); } static void cmd_del_bond_iface(struct ctl_context *ctx) { vsctl_context_populate_cache(ctx); struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); const char *iface_name = ctx->argv[ctx->argc - 1]; bool must_exist = !shash_find(&ctx->options, "--if-exists"); struct vsctl_iface *iface = find_iface(vsctl_ctx, iface_name, must_exist); if (!iface) { ovs_assert(!must_exist); return; } const char *port_name = ctx->argc > 2 ? ctx->argv[1] : NULL; if (port_name) { struct vsctl_port *port = find_port(vsctl_ctx, port_name, true); if (iface->port != port) { ctl_fatal("port %s does not have an interface %s", port_name, iface_name); } } if (ovs_list_is_short(&iface->port->ifaces)) { ctl_fatal("cannot delete last interface from port %s", iface->port->port_cfg->name); } ovsrec_port_update_interfaces_delvalue(iface->port->port_cfg, iface->iface_cfg); del_cached_iface(vsctl_ctx, iface); } static void cmd_del_port(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); bool must_exist = !shash_find(&ctx->options, "--if-exists"); bool with_iface = shash_find(&ctx->options, "--with-iface") != NULL; const char *target = ctx->argv[ctx->argc - 1]; struct vsctl_port *port; vsctl_context_populate_cache(ctx); if (find_bridge(vsctl_ctx, target, false)) { if (must_exist) { ctl_fatal("cannot delete port %s because it is the local port " "for bridge %s (deleting this port requires deleting " "the entire bridge)", target, target); } port = NULL; } else if (!with_iface) { port = find_port(vsctl_ctx, target, must_exist); } else { struct vsctl_iface *iface; port = find_port(vsctl_ctx, target, false); if (!port) { iface = find_iface(vsctl_ctx, target, false); if (iface) { port = iface->port; } } if (must_exist && !port) { ctl_fatal("no port or interface named %s", target); } } if (port) { if (ctx->argc == 3) { struct vsctl_bridge *bridge; bridge = find_bridge(vsctl_ctx, ctx->argv[1], true); if (port->bridge != bridge) { if (port->bridge->parent == bridge) { ctl_fatal("bridge %s does not have a port %s (although " "its child bridge %s does)", ctx->argv[1], ctx->argv[2], port->bridge->name); } else { ctl_fatal("bridge %s does not have a port %s", ctx->argv[1], ctx->argv[2]); } } } del_port(vsctl_ctx, port); } } static void cmd_port_to_br(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_port *port; vsctl_context_populate_cache(ctx); port = find_port(vsctl_ctx, ctx->argv[1], true); ds_put_format(&ctx->output, "%s\n", port->bridge->name); } static void cmd_br_to_vlan(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *bridge; vsctl_context_populate_cache(ctx); bridge = find_bridge(vsctl_ctx, ctx->argv[1], true); ds_put_format(&ctx->output, "%d\n", bridge->vlan); } static void cmd_br_to_parent(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *bridge; vsctl_context_populate_cache(ctx); bridge = find_bridge(vsctl_ctx, ctx->argv[1], true); if (bridge->parent) { bridge = bridge->parent; } ds_put_format(&ctx->output, "%s\n", bridge->name); } static void cmd_list_ifaces(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; struct vsctl_port *port; struct svec ifaces; vsctl_context_populate_cache(ctx); br = find_bridge(vsctl_ctx, ctx->argv[1], true); verify_ports(vsctl_ctx); svec_init(&ifaces); LIST_FOR_EACH (port, ports_node, &br->ports) { struct vsctl_iface *iface; LIST_FOR_EACH (iface, ifaces_node, &port->ifaces) { if (strcmp(iface->iface_cfg->name, br->name)) { svec_add(&ifaces, iface->iface_cfg->name); } } } output_sorted(&ifaces, &ctx->output); svec_destroy(&ifaces); } static void cmd_iface_to_br(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_iface *iface; vsctl_context_populate_cache(ctx); iface = find_iface(vsctl_ctx, ctx->argv[1], true); ds_put_format(&ctx->output, "%s\n", iface->port->bridge->name); } static void verify_controllers(struct ovsrec_bridge *bridge) { size_t i; ovsrec_bridge_verify_controller(bridge); for (i = 0; i < bridge->n_controller; i++) { ovsrec_controller_verify_target(bridge->controller[i]); } } static void pre_controller(struct ctl_context *ctx) { pre_get_info(ctx); ovsdb_idl_add_column(ctx->idl, &ovsrec_controller_col_target); ovsdb_idl_add_column(ctx->idl, &ovsrec_controller_col_inactivity_probe); } static void cmd_get_controller(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; struct svec targets; size_t i; vsctl_context_populate_cache(ctx); br = find_bridge(vsctl_ctx, ctx->argv[1], true); if (br->parent) { br = br->parent; } verify_controllers(br->br_cfg); /* Print the targets in sorted order for reproducibility. */ svec_init(&targets); for (i = 0; i < br->br_cfg->n_controller; i++) { svec_add(&targets, br->br_cfg->controller[i]->target); } svec_sort(&targets); for (i = 0; i < targets.n; i++) { ds_put_format(&ctx->output, "%s\n", targets.names[i]); } svec_destroy(&targets); } static void delete_controllers(struct ovsrec_controller **controllers, size_t n_controllers) { size_t i; for (i = 0; i < n_controllers; i++) { ovsrec_controller_delete(controllers[i]); } } static void cmd_del_controller(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct ovsrec_bridge *br; vsctl_context_populate_cache(ctx); br = find_real_bridge(vsctl_ctx, ctx->argv[1], true)->br_cfg; verify_controllers(br); if (br->controller) { delete_controllers(br->controller, br->n_controller); ovsrec_bridge_set_controller(br, NULL, 0); } } static struct ovsrec_controller ** insert_controllers(struct ctl_context *ctx, char *targets[], size_t n) { struct ovsrec_controller **controllers; size_t i; const char *inactivity_probe = shash_find_data(&ctx->options, "--inactivity-probe"); controllers = xmalloc(n * sizeof *controllers); for (i = 0; i < n; i++) { if (vconn_verify_name(targets[i]) && pvconn_verify_name(targets[i])) { VLOG_WARN("target type \"%s\" is possibly erroneous", targets[i]); } controllers[i] = ovsrec_controller_insert(ctx->txn); ovsrec_controller_set_target(controllers[i], targets[i]); if (inactivity_probe) { int64_t msecs = atoll(inactivity_probe); ovsrec_controller_set_inactivity_probe(controllers[i], &msecs, 1); } } return controllers; } static void cmd_set_controller(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct ovsrec_controller **controllers; struct ovsrec_bridge *br; size_t n; vsctl_context_populate_cache(ctx); br = find_real_bridge(vsctl_ctx, ctx->argv[1], true)->br_cfg; verify_controllers(br); delete_controllers(br->controller, br->n_controller); n = ctx->argc - 2; controllers = insert_controllers(ctx, &ctx->argv[2], n); ovsrec_bridge_set_controller(br, controllers, n); free(controllers); } static void cmd_get_fail_mode(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; const char *fail_mode; vsctl_context_populate_cache(ctx); br = find_bridge(vsctl_ctx, ctx->argv[1], true); if (br->parent) { br = br->parent; } ovsrec_bridge_verify_fail_mode(br->br_cfg); fail_mode = br->br_cfg->fail_mode; if (fail_mode && strlen(fail_mode)) { ds_put_format(&ctx->output, "%s\n", fail_mode); } } static void cmd_del_fail_mode(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; vsctl_context_populate_cache(ctx); br = find_real_bridge(vsctl_ctx, ctx->argv[1], true); ovsrec_bridge_set_fail_mode(br->br_cfg, NULL); } static void cmd_set_fail_mode(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; const char *fail_mode = ctx->argv[2]; vsctl_context_populate_cache(ctx); br = find_real_bridge(vsctl_ctx, ctx->argv[1], true); if (strcmp(fail_mode, "standalone") && strcmp(fail_mode, "secure")) { ctl_fatal("fail-mode must be \"standalone\" or \"secure\""); } ovsrec_bridge_set_fail_mode(br->br_cfg, fail_mode); } static void verify_managers(const struct ovsrec_open_vswitch *ovs) { size_t i; ovsrec_open_vswitch_verify_manager_options(ovs); for (i = 0; i < ovs->n_manager_options; ++i) { const struct ovsrec_manager *mgr = ovs->manager_options[i]; ovsrec_manager_verify_target(mgr); } } static void pre_manager(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_manager_options); ovsdb_idl_add_column(ctx->idl, &ovsrec_manager_col_target); ovsdb_idl_add_column(ctx->idl, &ovsrec_manager_col_inactivity_probe); } static void cmd_get_manager(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); const struct ovsrec_open_vswitch *ovs = vsctl_ctx->ovs; struct svec targets; size_t i; verify_managers(ovs); /* Print the targets in sorted order for reproducibility. */ svec_init(&targets); for (i = 0; i < ovs->n_manager_options; i++) { svec_add(&targets, ovs->manager_options[i]->target); } svec_sort_unique(&targets); for (i = 0; i < targets.n; i++) { ds_put_format(&ctx->output, "%s\n", targets.names[i]); } svec_destroy(&targets); } static void delete_managers(const struct ovsrec_open_vswitch *ovs) { size_t i; /* Delete Manager rows pointed to by 'manager_options' column. */ for (i = 0; i < ovs->n_manager_options; i++) { ovsrec_manager_delete(ovs->manager_options[i]); } /* Delete 'Manager' row refs in 'manager_options' column. */ ovsrec_open_vswitch_set_manager_options(ovs, NULL, 0); } static void cmd_del_manager(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); const struct ovsrec_open_vswitch *ovs = vsctl_ctx->ovs; verify_managers(ovs); delete_managers(ovs); } static void insert_managers(struct vsctl_context *vsctl_ctx, char *targets[], size_t n, struct shash *options) { struct ovsrec_manager **managers; size_t i; const char *inactivity_probe = shash_find_data(options, "--inactivity-probe"); /* Insert each manager in a new row in Manager table. */ managers = xmalloc(n * sizeof *managers); for (i = 0; i < n; i++) { if (stream_verify_name(targets[i]) && pstream_verify_name(targets[i])) { VLOG_WARN("target type \"%s\" is possibly erroneous", targets[i]); } managers[i] = ovsrec_manager_insert(vsctl_ctx->base.txn); ovsrec_manager_set_target(managers[i], targets[i]); if (inactivity_probe) { int64_t msecs = atoll(inactivity_probe); ovsrec_manager_set_inactivity_probe(managers[i], &msecs, 1); } } /* Store uuids of new Manager rows in 'manager_options' column. */ ovsrec_open_vswitch_set_manager_options(vsctl_ctx->ovs, managers, n); free(managers); } static void cmd_set_manager(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); const size_t n = ctx->argc - 1; verify_managers(vsctl_ctx->ovs); delete_managers(vsctl_ctx->ovs); insert_managers(vsctl_ctx, &ctx->argv[1], n, &ctx->options); } static void pre_cmd_get_ssl(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl); ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_private_key); ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_certificate); ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_ca_cert); ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_bootstrap_ca_cert); } static void cmd_get_ssl(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct ovsrec_ssl *ssl = vsctl_ctx->ovs->ssl; ovsrec_open_vswitch_verify_ssl(vsctl_ctx->ovs); if (ssl) { ovsrec_ssl_verify_private_key(ssl); ovsrec_ssl_verify_certificate(ssl); ovsrec_ssl_verify_ca_cert(ssl); ovsrec_ssl_verify_bootstrap_ca_cert(ssl); ds_put_format(&ctx->output, "Private key: %s\n", ssl->private_key); ds_put_format(&ctx->output, "Certificate: %s\n", ssl->certificate); ds_put_format(&ctx->output, "CA Certificate: %s\n", ssl->ca_cert); ds_put_format(&ctx->output, "Bootstrap: %s\n", ssl->bootstrap_ca_cert ? "true" : "false"); } } static void pre_cmd_del_ssl(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl); } static void cmd_del_ssl(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct ovsrec_ssl *ssl = vsctl_ctx->ovs->ssl; if (ssl) { ovsrec_open_vswitch_verify_ssl(vsctl_ctx->ovs); ovsrec_ssl_delete(ssl); ovsrec_open_vswitch_set_ssl(vsctl_ctx->ovs, NULL); } } static void pre_cmd_set_ssl(struct ctl_context *ctx) { ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl); } static void cmd_set_ssl(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); bool bootstrap = shash_find(&ctx->options, "--bootstrap"); struct ovsrec_ssl *ssl = vsctl_ctx->ovs->ssl; ovsrec_open_vswitch_verify_ssl(vsctl_ctx->ovs); if (ssl) { ovsrec_ssl_delete(ssl); } ssl = ovsrec_ssl_insert(ctx->txn); ovsrec_ssl_set_private_key(ssl, ctx->argv[1]); ovsrec_ssl_set_certificate(ssl, ctx->argv[2]); ovsrec_ssl_set_ca_cert(ssl, ctx->argv[3]); ovsrec_ssl_set_bootstrap_ca_cert(ssl, bootstrap); ovsrec_open_vswitch_set_ssl(vsctl_ctx->ovs, ssl); } static void autoattach_insert_mapping(struct ovsrec_autoattach *aa, int64_t isid, int64_t vlan) { int64_t *key_mappings, *value_mappings; size_t i; key_mappings = xmalloc(sizeof *aa->key_mappings * (aa->n_mappings + 1)); value_mappings = xmalloc(sizeof *aa->value_mappings * (aa->n_mappings + 1)); for (i = 0; i < aa->n_mappings; i++) { key_mappings[i] = aa->key_mappings[i]; value_mappings[i] = aa->value_mappings[i]; } key_mappings[aa->n_mappings] = isid; value_mappings[aa->n_mappings] = vlan; ovsrec_autoattach_set_mappings(aa, key_mappings, value_mappings, aa->n_mappings + 1); free(key_mappings); free(value_mappings); } static void cmd_add_aa_mapping(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; int64_t isid, vlan; char *nptr = NULL; isid = strtoull(ctx->argv[2], &nptr, 10); if (nptr == ctx->argv[2] || nptr == NULL) { ctl_fatal("Invalid argument %s", ctx->argv[2]); return; } vlan = strtoull(ctx->argv[3], &nptr, 10); if (nptr == ctx->argv[3] || nptr == NULL) { ctl_fatal("Invalid argument %s", ctx->argv[3]); return; } vsctl_context_populate_cache(ctx); br = find_bridge(vsctl_ctx, ctx->argv[1], true); if (br->parent) { br = br->parent; } if (br->br_cfg) { if (!br->br_cfg->auto_attach) { struct ovsrec_autoattach *aa = ovsrec_autoattach_insert(ctx->txn); ovsrec_bridge_set_auto_attach(br->br_cfg, aa); } autoattach_insert_mapping(br->br_cfg->auto_attach, isid, vlan); } } static void del_aa_mapping(struct ovsrec_autoattach *aa, int64_t isid, int64_t vlan) { int64_t *key_mappings, *value_mappings; size_t i, n; key_mappings = xmalloc(sizeof *aa->key_mappings * (aa->n_mappings)); value_mappings = xmalloc(sizeof *value_mappings * (aa->n_mappings)); for (i = n = 0; i < aa->n_mappings; i++) { if (aa->key_mappings[i] != isid && aa->value_mappings[i] != vlan) { key_mappings[n] = aa->key_mappings[i]; value_mappings[n++] = aa->value_mappings[i]; } } ovsrec_autoattach_set_mappings(aa, key_mappings, value_mappings, n); free(key_mappings); free(value_mappings); } static void cmd_del_aa_mapping(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; int64_t isid, vlan; char *nptr = NULL; isid = strtoull(ctx->argv[2], &nptr, 10); if (nptr == ctx->argv[2] || nptr == NULL) { ctl_fatal("Invalid argument %s", ctx->argv[2]); return; } vlan = strtoull(ctx->argv[3], &nptr, 10); if (nptr == ctx->argv[3] || nptr == NULL) { ctl_fatal("Invalid argument %s", ctx->argv[3]); return; } vsctl_context_populate_cache(ctx); br = find_bridge(vsctl_ctx, ctx->argv[1], true); if (br->parent) { br = br->parent; } if (br->br_cfg && br->br_cfg->auto_attach && br->br_cfg->auto_attach->key_mappings && br->br_cfg->auto_attach->value_mappings) { size_t i; for (i = 0; i < br->br_cfg->auto_attach->n_mappings; i++) { if (br->br_cfg->auto_attach->key_mappings[i] == isid && br->br_cfg->auto_attach->value_mappings[i] == vlan) { del_aa_mapping(br->br_cfg->auto_attach, isid, vlan); break; } } } } static void pre_aa_mapping(struct ctl_context *ctx) { pre_get_info(ctx); ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_auto_attach); ovsdb_idl_add_column(ctx->idl, &ovsrec_autoattach_col_mappings); } static void verify_auto_attach(struct ovsrec_bridge *bridge) { if (bridge) { ovsrec_bridge_verify_auto_attach(bridge); if (bridge->auto_attach) { ovsrec_autoattach_verify_mappings(bridge->auto_attach); } } } static void cmd_get_aa_mapping(struct ctl_context *ctx) { struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx); struct vsctl_bridge *br; vsctl_context_populate_cache(ctx); br = find_bridge(vsctl_ctx, ctx->argv[1], true); if (br->parent) { br = br->parent; } verify_auto_attach(br->br_cfg); if (br->br_cfg && br->br_cfg->auto_attach && br->br_cfg->auto_attach->key_mappings && br->br_cfg->auto_attach->value_mappings) { size_t i; for (i = 0; i < br->br_cfg->auto_attach->n_mappings; i++) { ds_put_format(&ctx->output, "%"PRId64" %"PRId64"\n", br->br_cfg->auto_attach->key_mappings[i], br->br_cfg->auto_attach->value_mappings[i]); } } } static const struct ctl_table_class tables[OVSREC_N_TABLES] = { [OVSREC_TABLE_BRIDGE].row_ids[0] = {&ovsrec_bridge_col_name, NULL, NULL}, [OVSREC_TABLE_CONTROLLER].row_ids[0] = {&ovsrec_bridge_col_name, NULL, &ovsrec_bridge_col_controller}, [OVSREC_TABLE_INTERFACE].row_ids[0] = {&ovsrec_interface_col_name, NULL, NULL}, [OVSREC_TABLE_MIRROR].row_ids[0] = {&ovsrec_mirror_col_name, NULL, NULL}, [OVSREC_TABLE_MANAGER].row_ids[0] = {&ovsrec_manager_col_target, NULL, NULL}, [OVSREC_TABLE_NETFLOW].row_ids[0] = {&ovsrec_bridge_col_name, NULL, &ovsrec_bridge_col_netflow}, [OVSREC_TABLE_PORT].row_ids[0] = {&ovsrec_port_col_name, NULL, NULL}, [OVSREC_TABLE_QOS].row_ids[0] = {&ovsrec_port_col_name, NULL, &ovsrec_port_col_qos}, [OVSREC_TABLE_SFLOW].row_ids[0] = {&ovsrec_bridge_col_name, NULL, &ovsrec_bridge_col_sflow}, [OVSREC_TABLE_FLOW_TABLE].row_ids[0] = {&ovsrec_flow_table_col_name, NULL, NULL}, [OVSREC_TABLE_IPFIX].row_ids[0] = {&ovsrec_bridge_col_name, NULL, &ovsrec_bridge_col_ipfix}, [OVSREC_TABLE_AUTOATTACH].row_ids[0] = {&ovsrec_bridge_col_name, NULL, &ovsrec_bridge_col_auto_attach}, [OVSREC_TABLE_FLOW_SAMPLE_COLLECTOR_SET].row_ids[0] = {&ovsrec_flow_sample_collector_set_col_id, NULL, NULL}, }; static void post_db_reload_check_init(void) { n_neoteric_ifaces = 0; } static void post_db_reload_expect_iface(const struct ovsrec_interface *iface) { if (n_neoteric_ifaces >= allocated_neoteric_ifaces) { neoteric_ifaces = x2nrealloc(neoteric_ifaces, &allocated_neoteric_ifaces, sizeof *neoteric_ifaces); } neoteric_ifaces[n_neoteric_ifaces++] = iface->header_.uuid; } static void post_db_reload_do_checks(const struct vsctl_context *vsctl_ctx) { bool print_error = false; size_t i; for (i = 0; i < n_neoteric_ifaces; i++) { const struct uuid *uuid; uuid = ovsdb_idl_txn_get_insert_uuid(vsctl_ctx->base.txn, &neoteric_ifaces[i]); if (uuid) { const struct ovsrec_interface *iface; iface = ovsrec_interface_get_for_uuid(vsctl_ctx->base.idl, uuid); if (iface && (!iface->ofport || *iface->ofport == -1)) { if (iface->error && *iface->error) { ovs_error(0, "Error detected while setting up '%s': %s. " "See ovs-vswitchd log for details.", iface->name, iface->error); } else { ovs_error(0, "Error detected while setting up '%s'. " "See ovs-vswitchd log for details.", iface->name); } print_error = true; } } } if (print_error) { ovs_error(0, "The default log directory is \"%s\".", ovs_logdir()); } } static void vsctl_context_init_command(struct vsctl_context *vsctl_ctx, struct ctl_command *command, bool last_command) { ctl_context_init_command(&vsctl_ctx->base, command, last_command); vsctl_ctx->verified_ports = false; } static void vsctl_context_init(struct vsctl_context *vsctl_ctx, struct ctl_command *command, struct ovsdb_idl *idl, struct ovsdb_idl_txn *txn, const struct ovsrec_open_vswitch *ovs, struct ovsdb_symbol_table *symtab) { ctl_context_init(&vsctl_ctx->base, command, idl, txn, symtab, vsctl_context_invalidate_cache); if (command) { vsctl_ctx->verified_ports = false; } vsctl_ctx->ovs = ovs; vsctl_ctx->cache_valid = false; } static void vsctl_context_done_command(struct vsctl_context *vsctl_ctx, struct ctl_command *command) { ctl_context_done_command(&vsctl_ctx->base, command); } static void vsctl_context_done(struct vsctl_context *vsctl_ctx, struct ctl_command *command) { ctl_context_done(&vsctl_ctx->base, command); } static void run_prerequisites(struct ctl_command *commands, size_t n_commands, struct ovsdb_idl *idl) { struct ctl_command *c; ovsdb_idl_add_table(idl, &ovsrec_table_open_vswitch); if (wait_for_reload) { ovsdb_idl_add_column(idl, &ovsrec_open_vswitch_col_cur_cfg); } for (c = commands; c < &commands[n_commands]; c++) { if (c->syntax->prerequisites) { struct vsctl_context vsctl_ctx; ds_init(&c->output); c->table = NULL; vsctl_context_init(&vsctl_ctx, c, idl, NULL, NULL, NULL); (c->syntax->prerequisites)(&vsctl_ctx.base); if (vsctl_ctx.base.error) { ctl_fatal("%s", vsctl_ctx.base.error); } vsctl_context_done(&vsctl_ctx, c); ovs_assert(!c->output.string); ovs_assert(!c->table); } } } static char * vsctl_parent_process_info(void) { #ifdef __linux__ pid_t parent_pid; struct ds s; parent_pid = getppid(); ds_init(&s); /* Retrive the command line of the parent process, except the init * process since /proc/0 does not exist. */ if (parent_pid) { char *procfile; FILE *f; procfile = xasprintf("/proc/%d/cmdline", parent_pid); f = fopen(procfile, "r"); free(procfile); if (f) { ds_get_line(&s, f); fclose(f); } } else { ds_put_cstr(&s, "init"); } ds_put_format(&s, " (pid %d)", parent_pid); return ds_steal_cstr(&s); #else return NULL; #endif } static bool do_vsctl(const char *args, struct ctl_command *commands, size_t n_commands, struct ovsdb_idl *idl) { struct ovsdb_idl_txn *txn; const struct ovsrec_open_vswitch *ovs; enum ovsdb_idl_txn_status status; struct ovsdb_symbol_table *symtab; struct vsctl_context vsctl_ctx; struct ctl_command *c; struct shash_node *node; int64_t next_cfg = 0; char *ppid_info = NULL; txn = the_idl_txn = ovsdb_idl_txn_create(idl); if (dry_run) { ovsdb_idl_txn_set_dry_run(txn); } ppid_info = vsctl_parent_process_info(); if (ppid_info) { ovsdb_idl_txn_add_comment(txn, "ovs-vsctl (invoked by %s): %s", ppid_info, args); free(ppid_info); } else { ovsdb_idl_txn_add_comment(txn, "ovs-vsctl: %s", args); } ovs = ovsrec_open_vswitch_first(idl); if (!ovs) { /* XXX add verification that table is empty */ ovs = ovsrec_open_vswitch_insert(txn); } if (wait_for_reload) { ovsdb_idl_txn_increment(txn, &ovs->header_, &ovsrec_open_vswitch_col_next_cfg, false); } post_db_reload_check_init(); symtab = ovsdb_symbol_table_create(); for (c = commands; c < &commands[n_commands]; c++) { ds_init(&c->output); c->table = NULL; } vsctl_context_init(&vsctl_ctx, NULL, idl, txn, ovs, symtab); for (c = commands; c < &commands[n_commands]; c++) { vsctl_context_init_command(&vsctl_ctx, c, c == &commands[n_commands - 1]); if (c->syntax->run) { (c->syntax->run)(&vsctl_ctx.base); } if (vsctl_ctx.base.error) { ctl_fatal("%s", vsctl_ctx.base.error); } vsctl_context_done_command(&vsctl_ctx, c); if (vsctl_ctx.base.try_again) { vsctl_context_done(&vsctl_ctx, NULL); goto try_again; } } vsctl_context_done(&vsctl_ctx, NULL); SHASH_FOR_EACH (node, &symtab->sh) { struct ovsdb_symbol *symbol = node->data; if (!symbol->created) { ctl_fatal("row id \"%s\" is referenced but never created (e.g. " "with \"-- --id=%s create ...\")", node->name, node->name); } if (!symbol->strong_ref) { if (!symbol->weak_ref) { VLOG_WARN("row id \"%s\" was created but no reference to it " "was inserted, so it will not actually appear in " "the database", node->name); } else { VLOG_WARN("row id \"%s\" was created but only a weak " "reference to it was inserted, so it will not " "actually appear in the database", node->name); } } } status = ovsdb_idl_txn_commit_block(txn); if (wait_for_reload && status == TXN_SUCCESS) { next_cfg = ovsdb_idl_txn_get_increment_new_value(txn); } if (status == TXN_UNCHANGED || status == TXN_SUCCESS) { for (c = commands; c < &commands[n_commands]; c++) { if (c->syntax->postprocess) { vsctl_context_init(&vsctl_ctx, c, idl, txn, ovs, symtab); (c->syntax->postprocess)(&vsctl_ctx.base); if (vsctl_ctx.base.error) { ctl_fatal("%s", vsctl_ctx.base.error); } vsctl_context_done(&vsctl_ctx, c); } } } switch (status) { case TXN_UNCOMMITTED: case TXN_INCOMPLETE: OVS_NOT_REACHED(); case TXN_ABORTED: /* Should not happen--we never call ovsdb_idl_txn_abort(). */ ctl_fatal("transaction aborted"); case TXN_UNCHANGED: case TXN_SUCCESS: break; case TXN_TRY_AGAIN: goto try_again; case TXN_ERROR: ctl_fatal("transaction error: %s", ovsdb_idl_txn_get_error(txn)); case TXN_NOT_LOCKED: /* Should not happen--we never call ovsdb_idl_set_lock(). */ ctl_fatal("database not locked"); default: OVS_NOT_REACHED(); } ovsdb_symbol_table_destroy(symtab); for (c = commands; c < &commands[n_commands]; c++) { struct ds *ds = &c->output; if (c->table) { table_print(c->table, &table_style); } else if (oneline) { size_t j; ds_chomp(ds, '\n'); for (j = 0; j < ds->length; j++) { int ch = ds->string[j]; switch (ch) { case '\n': fputs("\\n", stdout); break; case '\\': fputs("\\\\", stdout); break; default: putchar(ch); } } putchar('\n'); } else { fputs(ds_cstr(ds), stdout); } ds_destroy(&c->output); table_destroy(c->table); free(c->table); shash_destroy_free_data(&c->options); } free(commands); if (wait_for_reload && status != TXN_UNCHANGED) { /* Even, if --retry flag was not specified, ovs-vsctl still * has to retry to establish OVSDB connection, if wait_for_reload * was set. Otherwise, ovs-vsctl would end up waiting forever * until cur_cfg would be updated. */ ovsdb_idl_enable_reconnect(idl); for (;;) { ovsdb_idl_run(idl); OVSREC_OPEN_VSWITCH_FOR_EACH (ovs, idl) { if (ovs->cur_cfg >= next_cfg) { post_db_reload_do_checks(&vsctl_ctx); goto done; } } ovsdb_idl_wait(idl); poll_block(); } done: ; } ovsdb_idl_txn_destroy(txn); ovsdb_idl_destroy(idl); return true; try_again: /* Our transaction needs to be rerun, or a prerequisite was not met. Free * resources and return so that the caller can try again. */ ovsdb_idl_txn_abort(txn); ovsdb_idl_txn_destroy(txn); the_idl_txn = NULL; ovsdb_symbol_table_destroy(symtab); for (c = commands; c < &commands[n_commands]; c++) { ds_destroy(&c->output); table_destroy(c->table); free(c->table); } return false; } /* Frees the current transaction and the underlying IDL and then calls * exit(status). * * Freeing the transaction and the IDL is not strictly necessary, but it makes * for a clean memory leak report from valgrind in the normal case. That makes * it easier to notice real memory leaks. */ static void vsctl_exit(int status) { if (the_idl_txn) { ovsdb_idl_txn_abort(the_idl_txn); ovsdb_idl_txn_destroy(the_idl_txn); } ovsdb_idl_destroy(the_idl); exit(status); } /* * Developers who add new commands to the 'struct ctl_command_syntax' must * define the 'arguments' member of the struct. The following keywords are * available for composing the argument format: * * TABLE RECORD BRIDGE PARENT PORT * KEY VALUE ARG KEY=VALUE ?KEY=VALUE * IFACE SYSIFACE COLUMN COLUMN?:KEY COLUMN?:KEY=VALUE * MODE CA-CERT CERTIFICATE PRIVATE-KEY * TARGET NEW-* (e.g. NEW-PORT) * * For argument types not listed above, just uses 'ARG' as place holder. * * Encloses the keyword with '[]' if it is optional. Appends '...' to * keyword or enclosed keyword to indicate that the argument can be specified * multiple times. * * */ static const struct ctl_command_syntax vsctl_commands[] = { /* Open vSwitch commands. */ {"init", 0, 0, "", NULL, cmd_init, NULL, "", RW}, /* Bridge commands. */ {"add-br", 1, 3, "NEW-BRIDGE [PARENT] [NEW-VLAN]", pre_get_info, cmd_add_br, NULL, "--may-exist", RW}, {"del-br", 1, 1, "BRIDGE", pre_get_info, cmd_del_br, NULL, "--if-exists", RW}, {"list-br", 0, 0, "", pre_get_info, cmd_list_br, NULL, "--real,--fake", RO}, {"br-exists", 1, 1, "BRIDGE", pre_get_info, cmd_br_exists, NULL, "", RO}, {"br-to-vlan", 1, 1, "BRIDGE", pre_get_info, cmd_br_to_vlan, NULL, "", RO}, {"br-to-parent", 1, 1, "BRIDGE", pre_get_info, cmd_br_to_parent, NULL, "", RO}, {"br-set-external-id", 2, 3, "BRIDGE KEY [VALUE]", pre_cmd_br_set_external_id, cmd_br_set_external_id, NULL, "", RW}, {"br-get-external-id", 1, 2, "BRIDGE [KEY]", pre_cmd_br_get_external_id, cmd_br_get_external_id, NULL, "", RO}, /* Port commands. */ {"list-ports", 1, 1, "BRIDGE", pre_get_info, cmd_list_ports, NULL, "", RO}, {"add-port", 2, INT_MAX, "BRIDGE NEW-PORT [COLUMN[:KEY]=VALUE]...", pre_get_info, cmd_add_port, NULL, "--may-exist", RW}, {"del-port", 1, 2, "[BRIDGE] PORT|IFACE", pre_get_info, cmd_del_port, NULL, "--if-exists,--with-iface", RW}, {"port-to-br", 1, 1, "PORT", pre_get_info, cmd_port_to_br, NULL, "", RO}, /* Bond commands. */ {"add-bond", 4, INT_MAX, "BRIDGE BOND IFACE... [COLUMN[:KEY]=VALUE]...", pre_get_info, cmd_add_bond, NULL, "--may-exist,--fake-iface", RW}, {"add-bond-iface", 2, 2, "BOND IFACE", pre_get_info, cmd_add_bond_iface, NULL, "--may-exist", RW}, {"del-bond-iface", 1, 2, "[BOND] IFACE", pre_get_info, cmd_del_bond_iface, NULL, "--if-exists", RW}, /* Interface commands. */ {"list-ifaces", 1, 1, "BRIDGE", pre_get_info, cmd_list_ifaces, NULL, "", RO}, {"iface-to-br", 1, 1, "IFACE", pre_get_info, cmd_iface_to_br, NULL, "", RO}, /* Controller commands. */ {"get-controller", 1, 1, "BRIDGE", pre_controller, cmd_get_controller, NULL, "", RO}, {"del-controller", 1, 1, "BRIDGE", pre_controller, cmd_del_controller, NULL, "", RW}, {"set-controller", 1, INT_MAX, "BRIDGE TARGET...", pre_controller, cmd_set_controller, NULL, "--inactivity-probe=", RW}, {"get-fail-mode", 1, 1, "BRIDGE", pre_get_info, cmd_get_fail_mode, NULL, "", RO}, {"del-fail-mode", 1, 1, "BRIDGE", pre_get_info, cmd_del_fail_mode, NULL, "", RW}, {"set-fail-mode", 2, 2, "BRIDGE MODE", pre_get_info, cmd_set_fail_mode, NULL, "", RW}, /* Manager commands. */ {"get-manager", 0, 0, "", pre_manager, cmd_get_manager, NULL, "", RO}, {"del-manager", 0, 0, "", pre_manager, cmd_del_manager, NULL, "", RW}, {"set-manager", 1, INT_MAX, "TARGET...", pre_manager, cmd_set_manager, NULL, "--inactivity-probe=", RW}, /* SSL commands. */ {"get-ssl", 0, 0, "", pre_cmd_get_ssl, cmd_get_ssl, NULL, "", RO}, {"del-ssl", 0, 0, "", pre_cmd_del_ssl, cmd_del_ssl, NULL, "", RW}, {"set-ssl", 3, 3, "PRIVATE-KEY CERTIFICATE CA-CERT", pre_cmd_set_ssl, cmd_set_ssl, NULL, "--bootstrap", RW}, /* Auto Attach commands. */ {"add-aa-mapping", 3, 3, "BRIDGE ARG ARG", pre_aa_mapping, cmd_add_aa_mapping, NULL, "", RW}, {"del-aa-mapping", 3, 3, "BRIDGE ARG ARG", pre_aa_mapping, cmd_del_aa_mapping, NULL, "", RW}, {"get-aa-mapping", 1, 1, "BRIDGE", pre_aa_mapping, cmd_get_aa_mapping, NULL, "", RO}, /* Switch commands. */ {"emer-reset", 0, 0, "", pre_cmd_emer_reset, cmd_emer_reset, NULL, "", RW}, /* Zone and CT Timeout Policy commands. */ {"add-zone-tp", 3, INT_MAX, "", pre_get_zone, cmd_add_zone_tp, NULL, "--may-exist", RW}, {"del-zone-tp", 2, 2, "", pre_get_zone, cmd_del_zone_tp, NULL, "--if-exists", RW}, {"list-zone-tp", 1, 1, "", pre_get_zone, cmd_list_zone_tp, NULL, "", RO}, /* Datapath capabilities. */ {"list-dp-cap", 1, 1, "", pre_get_dp_cap, cmd_list_dp_cap, NULL, "", RO}, {NULL, 0, 0, NULL, NULL, NULL, NULL, NULL, RO}, }; /* Registers vsctl and common db commands. */ static void vsctl_cmd_init(void) { ctl_init(&ovsrec_idl_class, ovsrec_table_classes, tables, cmd_show_tables, vsctl_exit); ctl_register_commands(vsctl_commands); }