2 * Copyright (c) 2017 Cisco and/or its affiliates.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
7 * http://www.apache.org/licenses/LICENSE-2.0
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
16 #include "vom/acl_list.hpp"
17 #include "vom/acl_list_cmds.hpp"
18 #include "vom/logger.hpp"
24 l2_list::event_handler::handle_populate(const client_db::key_t& key)
26 /* hack to get this function instantiated */
30 * dump VPP Bridge domains
32 std::shared_ptr<list_cmds::l2_dump_cmd> cmd =
33 std::make_shared<list_cmds::l2_dump_cmd>();
38 for (auto& record : *cmd) {
39 auto& payload = record.get_payload();
41 const handle_t hdl(payload.acl_index);
42 l2_list acl(hdl, std::string(reinterpret_cast<const char*>(payload.tag)));
44 for (unsigned int ii = 0; ii < payload.count; ii++) {
45 const route::prefix_t pfx(payload.r[ii].is_ipv6,
46 payload.r[ii].src_ip_addr,
47 payload.r[ii].src_ip_prefix_len);
48 l2_rule rule(ii, action_t::from_int(payload.r[ii].is_permit), pfx,
49 { payload.r[ii].src_mac }, { payload.r[ii].src_mac_mask });
53 VOM_LOG(log_level_t::DEBUG) << "dump: " << acl.to_string();
56 * Write each of the discovered ACLs into the OM,
57 * but disable the HW Command q whilst we do, so that no
58 * commands are sent to VPP
66 l3_list::event_handler::handle_populate(const client_db::key_t& key)
68 /* hack to get this function instantiated */
72 * dump L3 ACLs Bridge domains
74 std::shared_ptr<list_cmds::l3_dump_cmd> cmd =
75 std::make_shared<list_cmds::l3_dump_cmd>();
80 for (auto& record : *cmd) {
81 auto& payload = record.get_payload();
83 const handle_t hdl(payload.acl_index);
84 l3_list acl(hdl, std::string(reinterpret_cast<const char*>(payload.tag)));
86 for (unsigned int ii = 0; ii < payload.count; ii++) {
87 const route::prefix_t src(payload.r[ii].is_ipv6,
88 payload.r[ii].src_ip_addr,
89 payload.r[ii].src_ip_prefix_len);
90 const route::prefix_t dst(payload.r[ii].is_ipv6,
91 payload.r[ii].dst_ip_addr,
92 payload.r[ii].dst_ip_prefix_len);
93 l3_rule rule(ii, action_t::from_int(payload.r[ii].is_permit), src, dst);
97 VOM_LOG(log_level_t::DEBUG) << "dump: " << acl.to_string();
100 * Write each of the discovered ACLs into the OM,
101 * but disable the HW Command q whilst we do, so that no
102 * commands are sent to VPP
104 OM::commit(key, acl);
110 l3_list::update(const l3_list& obj)
113 * always update the instance with the latest rule set
115 if (!m_hdl || obj.m_rules != m_rules) {
116 HW::enqueue(new list_cmds::l3_update_cmd(m_hdl, m_key, m_rules));
119 * We don't, can't, read the priority from VPP,
120 * so the is equals check above does not include the priorty.
121 * but we save it now.
123 m_rules = obj.m_rules;
127 l2_list::update(const l2_list& obj)
130 * always update the instance with the latest rule set
132 if (!m_hdl || obj.m_rules != m_rules) {
133 HW::enqueue(new list_cmds::l2_update_cmd(m_hdl, m_key, m_rules));
136 * We don't, can't, read the priority from VPP,
137 * so the is equals check above does not include the priorty.
138 * but we save it now.
140 m_rules = obj.m_rules;
143 * Sweep/reap the object if still stale
150 HW::enqueue(new list_cmds::l3_delete_cmd(m_hdl));
159 HW::enqueue(new list_cmds::l2_delete_cmd(m_hdl));
165 * Replay the objects state to HW
169 l3_list::replay(void)
172 HW::enqueue(new list_cmds::l3_update_cmd(m_hdl, m_key, m_rules));
177 l2_list::replay(void)
180 HW::enqueue(new list_cmds::l2_update_cmd(m_hdl, m_key, m_rules));
188 * fd.io coding-style-patch-verification: ON
191 * eval: (c-set-style "mozilla")