| /* |
| * Copyright (c) 2017-2019 Cisco and/or its affiliates. |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <vnet/session/application.h> |
| #include <vnet/session/application_interface.h> |
| #include <vnet/session/application_namespace.h> |
| #include <vnet/session/application_local.h> |
| #include <vnet/session/session.h> |
| |
| static app_main_t app_main; |
| |
| #define app_interface_check_thread_and_barrier(_fn, _arg) \ |
| if (PREDICT_FALSE (!vlib_thread_is_main_w_barrier ())) \ |
| { \ |
| vlib_rpc_call_main_thread (_fn, (u8 *) _arg, sizeof(*_arg)); \ |
| return 0; \ |
| } |
| |
| static app_listener_t * |
| app_listener_alloc (application_t * app) |
| { |
| app_listener_t *app_listener; |
| pool_get (app->listeners, app_listener); |
| clib_memset (app_listener, 0, sizeof (*app_listener)); |
| app_listener->al_index = app_listener - app->listeners; |
| app_listener->app_index = app->app_index; |
| app_listener->session_index = SESSION_INVALID_INDEX; |
| app_listener->local_index = SESSION_INVALID_INDEX; |
| app_listener->ls_handle = SESSION_INVALID_HANDLE; |
| return app_listener; |
| } |
| |
| app_listener_t * |
| app_listener_get (application_t * app, u32 app_listener_index) |
| { |
| return pool_elt_at_index (app->listeners, app_listener_index); |
| } |
| |
| static void |
| app_listener_free (application_t * app, app_listener_t * app_listener) |
| { |
| clib_bitmap_free (app_listener->workers); |
| if (CLIB_DEBUG) |
| clib_memset (app_listener, 0xfa, sizeof (*app_listener)); |
| pool_put (app->listeners, app_listener); |
| } |
| |
| session_handle_t |
| app_listener_handle (app_listener_t * al) |
| { |
| return al->ls_handle; |
| } |
| |
| app_listener_t * |
| app_listener_get_w_session (session_t * ls) |
| { |
| application_t *app; |
| |
| app = application_get_if_valid (ls->app_index); |
| if (!app) |
| return 0; |
| return app_listener_get (app, ls->al_index); |
| } |
| |
| session_handle_t |
| app_listen_session_handle (session_t * ls) |
| { |
| app_listener_t *al; |
| al = app_listener_get_w_session (ls); |
| if (!al) |
| return listen_session_get_handle (ls); |
| return al->ls_handle; |
| } |
| |
| app_listener_t * |
| app_listener_get_w_handle (session_handle_t handle) |
| { |
| session_t *ls; |
| ls = session_get_from_handle_if_valid (handle); |
| if (!ls) |
| return 0; |
| return app_listener_get_w_session (ls); |
| } |
| |
| app_listener_t * |
| app_listener_lookup (application_t * app, session_endpoint_cfg_t * sep_ext) |
| { |
| u32 table_index, fib_proto; |
| session_endpoint_t *sep; |
| session_handle_t handle; |
| session_t *ls; |
| |
| sep = (session_endpoint_t *) sep_ext; |
| if (application_has_local_scope (app) && session_endpoint_is_local (sep)) |
| { |
| table_index = application_local_session_table (app); |
| handle = session_lookup_endpoint_listener (table_index, sep, 1); |
| if (handle != SESSION_INVALID_HANDLE) |
| { |
| ls = listen_session_get_from_handle (handle); |
| return app_listener_get_w_session (ls); |
| } |
| } |
| |
| fib_proto = session_endpoint_fib_proto (sep); |
| table_index = session_lookup_get_index_for_fib (fib_proto, sep->fib_index); |
| handle = session_lookup_endpoint_listener (table_index, sep, 1); |
| if (handle != SESSION_INVALID_HANDLE) |
| { |
| ls = listen_session_get_from_handle (handle); |
| return app_listener_get_w_session ((session_t *) ls); |
| } |
| |
| return 0; |
| } |
| |
| int |
| app_listener_alloc_and_init (application_t * app, |
| session_endpoint_cfg_t * sep, |
| app_listener_t ** listener) |
| { |
| app_listener_t *app_listener; |
| transport_connection_t *tc; |
| u32 al_index, table_index; |
| session_handle_t lh; |
| session_type_t st; |
| session_t *ls = 0; |
| int rv; |
| |
| app_listener = app_listener_alloc (app); |
| al_index = app_listener->al_index; |
| st = session_type_from_proto_and_ip (sep->transport_proto, sep->is_ip4); |
| |
| /* |
| * Add session endpoint to local session table. Only binds to "inaddr_any" |
| * (i.e., zero address) are added to local scope table. |
| */ |
| if (application_has_local_scope (app) |
| && session_endpoint_is_local ((session_endpoint_t *) sep)) |
| { |
| session_type_t local_st; |
| |
| local_st = session_type_from_proto_and_ip (TRANSPORT_PROTO_NONE, |
| sep->is_ip4); |
| ls = listen_session_alloc (0, local_st); |
| ls->app_index = app->app_index; |
| ls->app_wrk_index = sep->app_wrk_index; |
| lh = session_handle (ls); |
| |
| if ((rv = session_listen (ls, sep))) |
| { |
| ls = session_get_from_handle (lh); |
| session_free (ls); |
| return rv; |
| } |
| |
| ls = session_get_from_handle (lh); |
| app_listener = app_listener_get (app, al_index); |
| app_listener->local_index = ls->session_index; |
| app_listener->ls_handle = lh; |
| ls->al_index = al_index; |
| |
| table_index = application_local_session_table (app); |
| session_lookup_add_session_endpoint (table_index, |
| (session_endpoint_t *) sep, lh); |
| } |
| |
| if (application_has_global_scope (app)) |
| { |
| /* |
| * Start listening on local endpoint for requested transport and scope. |
| * Creates a stream session with state LISTENING to be used in session |
| * lookups, prior to establishing connection. Requests transport to |
| * build it's own specific listening connection. |
| */ |
| ls = listen_session_alloc (0, st); |
| ls->app_index = app->app_index; |
| ls->app_wrk_index = sep->app_wrk_index; |
| |
| /* Listen pool can be reallocated if the transport is |
| * recursive (tls) */ |
| lh = listen_session_get_handle (ls); |
| |
| if ((rv = session_listen (ls, sep))) |
| { |
| ls = listen_session_get_from_handle (lh); |
| session_free (ls); |
| return rv; |
| } |
| ls = listen_session_get_from_handle (lh); |
| app_listener = app_listener_get (app, al_index); |
| app_listener->session_index = ls->session_index; |
| app_listener->ls_handle = lh; |
| ls->al_index = al_index; |
| |
| /* Add to the global lookup table after transport was initialized. |
| * Lookup table needs to be populated only now because sessions |
| * with cut-through transport are are added to app local tables that |
| * are not related to network fibs, i.e., cannot be added as |
| * connections */ |
| tc = session_get_transport (ls); |
| if (!(tc->flags & TRANSPORT_CONNECTION_F_NO_LOOKUP)) |
| { |
| fib_protocol_t fib_proto; |
| fib_proto = session_endpoint_fib_proto ((session_endpoint_t *) sep); |
| table_index = session_lookup_get_index_for_fib (fib_proto, |
| sep->fib_index); |
| ASSERT (table_index != SESSION_TABLE_INVALID_INDEX); |
| session_lookup_add_session_endpoint (table_index, |
| (session_endpoint_t *) sep, |
| lh); |
| } |
| } |
| |
| if (!ls) |
| { |
| app_listener_free (app, app_listener); |
| return -1; |
| } |
| |
| *listener = app_listener; |
| return 0; |
| } |
| |
| void |
| app_listener_cleanup (app_listener_t * al) |
| { |
| application_t *app = application_get (al->app_index); |
| session_t *ls; |
| |
| if (al->session_index != SESSION_INVALID_INDEX) |
| { |
| ls = session_get (al->session_index, 0); |
| session_stop_listen (ls); |
| listen_session_free (ls); |
| } |
| if (al->local_index != SESSION_INVALID_INDEX) |
| { |
| session_endpoint_t sep = SESSION_ENDPOINT_NULL; |
| u32 table_index; |
| |
| table_index = application_local_session_table (app); |
| ls = listen_session_get (al->local_index); |
| ct_session_endpoint (ls, &sep); |
| session_lookup_del_session_endpoint (table_index, &sep); |
| session_stop_listen (ls); |
| listen_session_free (ls); |
| } |
| app_listener_free (app, al); |
| } |
| |
| static app_worker_t * |
| app_listener_select_worker (application_t * app, app_listener_t * al) |
| { |
| u32 wrk_index; |
| |
| app = application_get (al->app_index); |
| wrk_index = clib_bitmap_next_set (al->workers, al->accept_rotor + 1); |
| if (wrk_index == ~0) |
| wrk_index = clib_bitmap_first_set (al->workers); |
| |
| ASSERT (wrk_index != ~0); |
| al->accept_rotor = wrk_index; |
| return application_get_worker (app, wrk_index); |
| } |
| |
| session_t * |
| app_listener_get_session (app_listener_t * al) |
| { |
| if (al->session_index == SESSION_INVALID_INDEX) |
| return 0; |
| |
| return listen_session_get (al->session_index); |
| } |
| |
| session_t * |
| app_listener_get_local_session (app_listener_t * al) |
| { |
| if (al->local_index == SESSION_INVALID_INDEX) |
| return 0; |
| return listen_session_get (al->local_index); |
| } |
| |
| static app_worker_map_t * |
| app_worker_map_alloc (application_t * app) |
| { |
| app_worker_map_t *map; |
| pool_get (app->worker_maps, map); |
| clib_memset (map, 0, sizeof (*map)); |
| return map; |
| } |
| |
| static u32 |
| app_worker_map_index (application_t * app, app_worker_map_t * map) |
| { |
| return (map - app->worker_maps); |
| } |
| |
| static void |
| app_worker_map_free (application_t * app, app_worker_map_t * map) |
| { |
| pool_put (app->worker_maps, map); |
| } |
| |
| static app_worker_map_t * |
| app_worker_map_get (application_t * app, u32 map_index) |
| { |
| if (pool_is_free_index (app->worker_maps, map_index)) |
| return 0; |
| return pool_elt_at_index (app->worker_maps, map_index); |
| } |
| |
| static const u8 * |
| app_get_name (application_t * app) |
| { |
| return app->name; |
| } |
| |
| u32 |
| application_session_table (application_t * app, u8 fib_proto) |
| { |
| app_namespace_t *app_ns; |
| app_ns = app_namespace_get (app->ns_index); |
| if (!application_has_global_scope (app)) |
| return APP_INVALID_INDEX; |
| if (fib_proto == FIB_PROTOCOL_IP4) |
| return session_lookup_get_index_for_fib (fib_proto, |
| app_ns->ip4_fib_index); |
| else |
| return session_lookup_get_index_for_fib (fib_proto, |
| app_ns->ip6_fib_index); |
| } |
| |
| u32 |
| application_local_session_table (application_t * app) |
| { |
| app_namespace_t *app_ns; |
| if (!application_has_local_scope (app)) |
| return APP_INVALID_INDEX; |
| app_ns = app_namespace_get (app->ns_index); |
| return app_ns->local_table_index; |
| } |
| |
| /** |
| * Returns app name for app-index |
| */ |
| const u8 * |
| application_name_from_index (u32 app_index) |
| { |
| application_t *app = application_get (app_index); |
| if (!app) |
| return 0; |
| return app_get_name (app); |
| } |
| |
| static void |
| application_api_table_add (u32 app_index, u32 api_client_index) |
| { |
| if (api_client_index != APP_INVALID_INDEX) |
| hash_set (app_main.app_by_api_client_index, api_client_index, app_index); |
| } |
| |
| static void |
| application_api_table_del (u32 api_client_index) |
| { |
| hash_unset (app_main.app_by_api_client_index, api_client_index); |
| } |
| |
| static void |
| application_name_table_add (application_t * app) |
| { |
| hash_set_mem (app_main.app_by_name, app->name, app->app_index); |
| } |
| |
| static void |
| application_name_table_del (application_t * app) |
| { |
| hash_unset_mem (app_main.app_by_name, app->name); |
| } |
| |
| application_t * |
| application_lookup (u32 api_client_index) |
| { |
| uword *p; |
| p = hash_get (app_main.app_by_api_client_index, api_client_index); |
| if (p) |
| return application_get_if_valid (p[0]); |
| |
| return 0; |
| } |
| |
| application_t * |
| application_lookup_name (const u8 * name) |
| { |
| uword *p; |
| p = hash_get_mem (app_main.app_by_name, name); |
| if (p) |
| return application_get (p[0]); |
| |
| return 0; |
| } |
| |
| static application_t * |
| application_alloc (void) |
| { |
| application_t *app; |
| pool_get (app_main.app_pool, app); |
| clib_memset (app, 0, sizeof (*app)); |
| app->app_index = app - app_main.app_pool; |
| return app; |
| } |
| |
| application_t * |
| application_get (u32 app_index) |
| { |
| if (app_index == APP_INVALID_INDEX) |
| return 0; |
| return pool_elt_at_index (app_main.app_pool, app_index); |
| } |
| |
| application_t * |
| application_get_if_valid (u32 app_index) |
| { |
| if (pool_is_free_index (app_main.app_pool, app_index)) |
| return 0; |
| |
| return pool_elt_at_index (app_main.app_pool, app_index); |
| } |
| |
| static void |
| application_verify_cb_fns (session_cb_vft_t * cb_fns) |
| { |
| if (cb_fns->session_accept_callback == 0) |
| clib_warning ("No accept callback function provided"); |
| if (cb_fns->session_connected_callback == 0) |
| clib_warning ("No session connected callback function provided"); |
| if (cb_fns->session_disconnect_callback == 0) |
| clib_warning ("No session disconnect callback function provided"); |
| if (cb_fns->session_reset_callback == 0) |
| clib_warning ("No session reset callback function provided"); |
| } |
| |
| /** |
| * Check app config for given segment type |
| * |
| * Returns 1 on success and 0 otherwise |
| */ |
| static u8 |
| application_verify_cfg (ssvm_segment_type_t st) |
| { |
| u8 is_valid; |
| if (st == SSVM_SEGMENT_MEMFD) |
| { |
| is_valid = (session_main_get_evt_q_segment () != 0); |
| if (!is_valid) |
| clib_warning ("memfd seg: vpp's event qs IN binary api svm region"); |
| return is_valid; |
| } |
| else if (st == SSVM_SEGMENT_SHM) |
| { |
| is_valid = (session_main_get_evt_q_segment () == 0); |
| if (!is_valid) |
| clib_warning ("shm seg: vpp's event qs NOT IN binary api svm region"); |
| return is_valid; |
| } |
| else |
| return 1; |
| } |
| |
| static int |
| application_alloc_and_init (app_init_args_t * a) |
| { |
| ssvm_segment_type_t seg_type = SSVM_SEGMENT_MEMFD; |
| segment_manager_props_t *props; |
| vl_api_registration_t *reg; |
| application_t *app; |
| u64 *options; |
| |
| app = application_alloc (); |
| options = a->options; |
| /* |
| * Make sure we support the requested configuration |
| */ |
| if (!(options[APP_OPTIONS_FLAGS] & APP_OPTIONS_FLAGS_IS_BUILTIN)) |
| { |
| reg = vl_api_client_index_to_registration (a->api_client_index); |
| if (!reg) |
| return VNET_API_ERROR_APP_UNSUPPORTED_CFG; |
| if (vl_api_registration_file_index (reg) == VL_API_INVALID_FI) |
| seg_type = SSVM_SEGMENT_SHM; |
| } |
| else |
| { |
| seg_type = SSVM_SEGMENT_PRIVATE; |
| } |
| |
| if ((options[APP_OPTIONS_FLAGS] & APP_OPTIONS_FLAGS_EVT_MQ_USE_EVENTFD) |
| && seg_type != SSVM_SEGMENT_MEMFD) |
| { |
| clib_warning ("mq eventfds can only be used if socket transport is " |
| "used for binary api"); |
| return VNET_API_ERROR_APP_UNSUPPORTED_CFG; |
| } |
| |
| if (!application_verify_cfg (seg_type)) |
| return VNET_API_ERROR_APP_UNSUPPORTED_CFG; |
| |
| /* Check that the obvious things are properly set up */ |
| application_verify_cb_fns (a->session_cb_vft); |
| |
| app->flags = options[APP_OPTIONS_FLAGS]; |
| app->cb_fns = *a->session_cb_vft; |
| app->ns_index = options[APP_OPTIONS_NAMESPACE]; |
| app->proxied_transports = options[APP_OPTIONS_PROXY_TRANSPORT]; |
| app->name = vec_dup (a->name); |
| |
| /* If no scope enabled, default to global */ |
| if (!application_has_global_scope (app) |
| && !application_has_local_scope (app)) |
| app->flags |= APP_OPTIONS_FLAGS_USE_GLOBAL_SCOPE; |
| |
| props = application_segment_manager_properties (app); |
| segment_manager_props_init (props); |
| props->segment_size = options[APP_OPTIONS_SEGMENT_SIZE]; |
| props->prealloc_fifos = options[APP_OPTIONS_PREALLOC_FIFO_PAIRS]; |
| if (options[APP_OPTIONS_ADD_SEGMENT_SIZE]) |
| { |
| props->add_segment_size = options[APP_OPTIONS_ADD_SEGMENT_SIZE]; |
| props->add_segment = 1; |
| } |
| if (options[APP_OPTIONS_RX_FIFO_SIZE]) |
| props->rx_fifo_size = options[APP_OPTIONS_RX_FIFO_SIZE]; |
| if (options[APP_OPTIONS_TX_FIFO_SIZE]) |
| props->tx_fifo_size = options[APP_OPTIONS_TX_FIFO_SIZE]; |
| if (options[APP_OPTIONS_EVT_QUEUE_SIZE]) |
| props->evt_q_size = options[APP_OPTIONS_EVT_QUEUE_SIZE]; |
| if (options[APP_OPTIONS_FLAGS] & APP_OPTIONS_FLAGS_EVT_MQ_USE_EVENTFD) |
| props->use_mq_eventfd = 1; |
| if (options[APP_OPTIONS_TLS_ENGINE]) |
| app->tls_engine = options[APP_OPTIONS_TLS_ENGINE]; |
| if (options[APP_OPTIONS_MAX_FIFO_SIZE]) |
| props->max_fifo_size = options[APP_OPTIONS_MAX_FIFO_SIZE]; |
| if (options[APP_OPTIONS_HIGH_WATERMARK]) |
| props->high_watermark = options[APP_OPTIONS_HIGH_WATERMARK]; |
| if (options[APP_OPTIONS_LOW_WATERMARK]) |
| props->low_watermark = options[APP_OPTIONS_LOW_WATERMARK]; |
| if (options[APP_OPTIONS_PCT_FIRST_ALLOC]) |
| props->pct_first_alloc = options[APP_OPTIONS_PCT_FIRST_ALLOC]; |
| props->segment_type = seg_type; |
| |
| /* Add app to lookup by api_client_index table */ |
| if (!application_is_builtin (app)) |
| application_api_table_add (app->app_index, a->api_client_index); |
| else |
| application_name_table_add (app); |
| |
| a->app_index = app->app_index; |
| |
| APP_DBG ("New app name: %v api index: %u index %u", app->name, |
| a->api_client_index, app->app_index); |
| |
| return 0; |
| } |
| |
| static void |
| application_free (application_t * app) |
| { |
| app_worker_map_t *wrk_map; |
| app_worker_t *app_wrk; |
| |
| /* |
| * The app event queue allocated in first segment is cleared with |
| * the segment manager. No need to explicitly free it. |
| */ |
| APP_DBG ("Delete app name %v index: %d", app->name, app->app_index); |
| |
| if (application_is_proxy (app)) |
| application_remove_proxy (app); |
| |
| /* |
| * Free workers |
| */ |
| |
| /* *INDENT-OFF* */ |
| pool_flush (wrk_map, app->worker_maps, ({ |
| app_wrk = app_worker_get (wrk_map->wrk_index); |
| app_worker_free (app_wrk); |
| })); |
| /* *INDENT-ON* */ |
| pool_free (app->worker_maps); |
| |
| /* |
| * Cleanup remaining state |
| */ |
| if (application_is_builtin (app)) |
| application_name_table_del (app); |
| vec_free (app->name); |
| pool_put (app_main.app_pool, app); |
| } |
| |
| static void |
| application_detach_process (application_t * app, u32 api_client_index) |
| { |
| vnet_app_worker_add_del_args_t _args = { 0 }, *args = &_args; |
| app_worker_map_t *wrk_map; |
| u32 *wrks = 0, *wrk_index; |
| app_worker_t *app_wrk; |
| |
| if (api_client_index == ~0) |
| { |
| application_free (app); |
| return; |
| } |
| |
| APP_DBG ("Detaching for app %v index %u api client index %u", app->name, |
| app->app_index, api_client_index); |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (wrk_map, app->worker_maps, ({ |
| app_wrk = app_worker_get (wrk_map->wrk_index); |
| if (app_wrk->api_client_index == api_client_index) |
| vec_add1 (wrks, app_wrk->wrk_index); |
| })); |
| /* *INDENT-ON* */ |
| |
| if (!vec_len (wrks)) |
| { |
| clib_warning ("no workers for app %u api_index %u", app->app_index, |
| api_client_index); |
| return; |
| } |
| |
| args->app_index = app->app_index; |
| args->api_client_index = api_client_index; |
| vec_foreach (wrk_index, wrks) |
| { |
| app_wrk = app_worker_get (wrk_index[0]); |
| args->wrk_map_index = app_wrk->wrk_map_index; |
| args->is_add = 0; |
| vnet_app_worker_add_del (args); |
| } |
| vec_free (wrks); |
| } |
| |
| app_worker_t * |
| application_get_worker (application_t * app, u32 wrk_map_index) |
| { |
| app_worker_map_t *map; |
| map = app_worker_map_get (app, wrk_map_index); |
| if (!map) |
| return 0; |
| return app_worker_get (map->wrk_index); |
| } |
| |
| app_worker_t * |
| application_get_default_worker (application_t * app) |
| { |
| return application_get_worker (app, 0); |
| } |
| |
| u32 |
| application_n_workers (application_t * app) |
| { |
| return pool_elts (app->worker_maps); |
| } |
| |
| app_worker_t * |
| application_listener_select_worker (session_t * ls) |
| { |
| application_t *app; |
| app_listener_t *al; |
| |
| app = application_get (ls->app_index); |
| al = app_listener_get (app, ls->al_index); |
| return app_listener_select_worker (app, al); |
| } |
| |
| int |
| application_alloc_worker_and_init (application_t * app, app_worker_t ** wrk) |
| { |
| app_worker_map_t *wrk_map; |
| app_worker_t *app_wrk; |
| segment_manager_t *sm; |
| int rv; |
| |
| app_wrk = app_worker_alloc (app); |
| wrk_map = app_worker_map_alloc (app); |
| wrk_map->wrk_index = app_wrk->wrk_index; |
| app_wrk->wrk_map_index = app_worker_map_index (app, wrk_map); |
| |
| /* |
| * Setup first segment manager |
| */ |
| sm = segment_manager_alloc (); |
| sm->app_wrk_index = app_wrk->wrk_index; |
| |
| if ((rv = segment_manager_init (sm))) |
| { |
| app_worker_free (app_wrk); |
| return rv; |
| } |
| sm->first_is_protected = 1; |
| |
| /* |
| * Setup app worker |
| */ |
| app_wrk->first_segment_manager = segment_manager_index (sm); |
| app_wrk->listeners_table = hash_create (0, sizeof (u64)); |
| app_wrk->event_queue = segment_manager_event_queue (sm); |
| app_wrk->app_is_builtin = application_is_builtin (app); |
| |
| *wrk = app_wrk; |
| |
| return 0; |
| } |
| |
| int |
| vnet_app_worker_add_del (vnet_app_worker_add_del_args_t * a) |
| { |
| fifo_segment_t *fs; |
| app_worker_map_t *wrk_map; |
| app_worker_t *app_wrk; |
| segment_manager_t *sm; |
| application_t *app; |
| int rv; |
| |
| app = application_get (a->app_index); |
| if (!app) |
| return VNET_API_ERROR_INVALID_VALUE; |
| |
| if (a->is_add) |
| { |
| if ((rv = application_alloc_worker_and_init (app, &app_wrk))) |
| return rv; |
| |
| /* Map worker api index to the app */ |
| app_wrk->api_client_index = a->api_client_index; |
| application_api_table_add (app->app_index, a->api_client_index); |
| |
| sm = segment_manager_get (app_wrk->first_segment_manager); |
| fs = segment_manager_get_segment_w_lock (sm, 0); |
| a->segment = &fs->ssvm; |
| a->segment_handle = segment_manager_segment_handle (sm, fs); |
| segment_manager_segment_reader_unlock (sm); |
| a->evt_q = app_wrk->event_queue; |
| a->wrk_map_index = app_wrk->wrk_map_index; |
| } |
| else |
| { |
| wrk_map = app_worker_map_get (app, a->wrk_map_index); |
| if (!wrk_map) |
| return VNET_API_ERROR_INVALID_VALUE; |
| |
| app_wrk = app_worker_get (wrk_map->wrk_index); |
| if (!app_wrk) |
| return VNET_API_ERROR_INVALID_VALUE; |
| |
| application_api_table_del (app_wrk->api_client_index); |
| app_worker_free (app_wrk); |
| app_worker_map_free (app, wrk_map); |
| if (application_n_workers (app) == 0) |
| application_free (app); |
| } |
| return 0; |
| } |
| |
| static int |
| app_validate_namespace (u8 * namespace_id, u64 secret, u32 * app_ns_index) |
| { |
| app_namespace_t *app_ns; |
| if (vec_len (namespace_id) == 0) |
| { |
| /* Use default namespace */ |
| *app_ns_index = 0; |
| return 0; |
| } |
| |
| *app_ns_index = app_namespace_index_from_id (namespace_id); |
| if (*app_ns_index == APP_NAMESPACE_INVALID_INDEX) |
| return VNET_API_ERROR_APP_INVALID_NS; |
| app_ns = app_namespace_get (*app_ns_index); |
| if (!app_ns) |
| return VNET_API_ERROR_APP_INVALID_NS; |
| if (app_ns->ns_secret != secret) |
| return VNET_API_ERROR_APP_WRONG_NS_SECRET; |
| return 0; |
| } |
| |
| static u8 * |
| app_name_from_api_index (u32 api_client_index) |
| { |
| vl_api_registration_t *regp; |
| regp = vl_api_client_index_to_registration (api_client_index); |
| if (regp) |
| return format (0, "%s", regp->name); |
| |
| clib_warning ("api client index %u does not have an api registration!", |
| api_client_index); |
| return format (0, "unknown"); |
| } |
| |
| /** |
| * Attach application to vpp |
| * |
| * Allocates a vpp app, i.e., a structure that keeps back pointers |
| * to external app and a segment manager for shared memory fifo based |
| * communication with the external app. |
| */ |
| int |
| vnet_application_attach (vnet_app_attach_args_t * a) |
| { |
| fifo_segment_t *fs; |
| application_t *app = 0; |
| app_worker_t *app_wrk; |
| segment_manager_t *sm; |
| u32 app_ns_index = 0; |
| u8 *app_name = 0; |
| u64 secret; |
| int rv; |
| |
| if (a->api_client_index != APP_INVALID_INDEX) |
| app = application_lookup (a->api_client_index); |
| else if (a->name) |
| app = application_lookup_name (a->name); |
| else |
| return VNET_API_ERROR_INVALID_VALUE; |
| |
| if (app) |
| return VNET_API_ERROR_APP_ALREADY_ATTACHED; |
| |
| if (a->api_client_index != APP_INVALID_INDEX) |
| { |
| app_name = app_name_from_api_index (a->api_client_index); |
| a->name = app_name; |
| } |
| |
| secret = a->options[APP_OPTIONS_NAMESPACE_SECRET]; |
| if ((rv = app_validate_namespace (a->namespace_id, secret, &app_ns_index))) |
| return rv; |
| a->options[APP_OPTIONS_NAMESPACE] = app_ns_index; |
| |
| if ((rv = application_alloc_and_init ((app_init_args_t *) a))) |
| return rv; |
| |
| app = application_get (a->app_index); |
| if ((rv = application_alloc_worker_and_init (app, &app_wrk))) |
| return rv; |
| |
| a->app_evt_q = app_wrk->event_queue; |
| app_wrk->api_client_index = a->api_client_index; |
| sm = segment_manager_get (app_wrk->first_segment_manager); |
| fs = segment_manager_get_segment_w_lock (sm, 0); |
| |
| if (application_is_proxy (app)) |
| application_setup_proxy (app); |
| |
| ASSERT (vec_len (fs->ssvm.name) <= 128); |
| a->segment = &fs->ssvm; |
| a->segment_handle = segment_manager_segment_handle (sm, fs); |
| |
| segment_manager_segment_reader_unlock (sm); |
| vec_free (app_name); |
| return 0; |
| } |
| |
| /** |
| * Detach application from vpp |
| */ |
| int |
| vnet_application_detach (vnet_app_detach_args_t * a) |
| { |
| application_t *app; |
| |
| app = application_get_if_valid (a->app_index); |
| if (!app) |
| { |
| clib_warning ("app not attached"); |
| return VNET_API_ERROR_APPLICATION_NOT_ATTACHED; |
| } |
| |
| app_interface_check_thread_and_barrier (vnet_application_detach, a); |
| application_detach_process (app, a->api_client_index); |
| return 0; |
| } |
| |
| |
| static u8 |
| session_endpoint_in_ns (session_endpoint_t * sep) |
| { |
| u8 is_lep = session_endpoint_is_local (sep); |
| if (!is_lep && sep->sw_if_index != ENDPOINT_INVALID_INDEX |
| && !ip_interface_has_address (sep->sw_if_index, &sep->ip, sep->is_ip4)) |
| { |
| clib_warning ("sw_if_index %u not configured with ip %U", |
| sep->sw_if_index, format_ip46_address, &sep->ip, |
| sep->is_ip4); |
| return 0; |
| } |
| return (is_lep || ip_is_local (sep->fib_index, &sep->ip, sep->is_ip4)); |
| } |
| |
| static void |
| session_endpoint_update_for_app (session_endpoint_cfg_t * sep, |
| application_t * app, u8 is_connect) |
| { |
| app_namespace_t *app_ns; |
| u32 ns_index, fib_index; |
| |
| ns_index = app->ns_index; |
| |
| /* App is a transport proto, so fetch the calling app's ns */ |
| if (app->flags & APP_OPTIONS_FLAGS_IS_TRANSPORT_APP) |
| ns_index = sep->ns_index; |
| |
| app_ns = app_namespace_get (ns_index); |
| if (!app_ns) |
| return; |
| |
| /* Ask transport and network to bind to/connect using local interface |
| * that "supports" app's namespace. This will fix our local connection |
| * endpoint. |
| */ |
| |
| /* If in default namespace and user requested a fib index use it */ |
| if (ns_index == 0 && sep->fib_index != ENDPOINT_INVALID_INDEX) |
| fib_index = sep->fib_index; |
| else |
| fib_index = sep->is_ip4 ? app_ns->ip4_fib_index : app_ns->ip6_fib_index; |
| sep->peer.fib_index = fib_index; |
| sep->fib_index = fib_index; |
| |
| if (!is_connect) |
| { |
| sep->sw_if_index = app_ns->sw_if_index; |
| } |
| else |
| { |
| if (app_ns->sw_if_index != APP_NAMESPACE_INVALID_INDEX |
| && sep->peer.sw_if_index != ENDPOINT_INVALID_INDEX |
| && sep->peer.sw_if_index != app_ns->sw_if_index) |
| clib_warning ("Local sw_if_index different from app ns sw_if_index"); |
| |
| sep->peer.sw_if_index = app_ns->sw_if_index; |
| } |
| } |
| |
| int |
| vnet_listen (vnet_listen_args_t * a) |
| { |
| app_listener_t *app_listener; |
| app_worker_t *app_wrk; |
| application_t *app; |
| int rv; |
| |
| ASSERT (vlib_thread_is_main_w_barrier ()); |
| |
| app = application_get_if_valid (a->app_index); |
| if (!app) |
| return VNET_API_ERROR_APPLICATION_NOT_ATTACHED; |
| |
| app_wrk = application_get_worker (app, a->wrk_map_index); |
| if (!app_wrk) |
| return VNET_API_ERROR_INVALID_VALUE; |
| |
| a->sep_ext.app_wrk_index = app_wrk->wrk_index; |
| |
| session_endpoint_update_for_app (&a->sep_ext, app, 0 /* is_connect */ ); |
| if (!session_endpoint_in_ns (&a->sep)) |
| return VNET_API_ERROR_INVALID_VALUE_2; |
| |
| /* |
| * Check if we already have an app listener |
| */ |
| app_listener = app_listener_lookup (app, &a->sep_ext); |
| if (app_listener) |
| { |
| if (app_listener->app_index != app->app_index) |
| return VNET_API_ERROR_ADDRESS_IN_USE; |
| if (app_worker_start_listen (app_wrk, app_listener)) |
| return -1; |
| a->handle = app_listener_handle (app_listener); |
| return 0; |
| } |
| |
| /* |
| * Create new app listener |
| */ |
| if ((rv = app_listener_alloc_and_init (app, &a->sep_ext, &app_listener))) |
| return rv; |
| |
| if ((rv = app_worker_start_listen (app_wrk, app_listener))) |
| { |
| app_listener_cleanup (app_listener); |
| return rv; |
| } |
| |
| a->handle = app_listener_handle (app_listener); |
| return 0; |
| } |
| |
| int |
| vnet_connect (vnet_connect_args_t * a) |
| { |
| app_worker_t *client_wrk; |
| application_t *client; |
| |
| ASSERT (vlib_thread_is_main_w_barrier ()); |
| |
| if (session_endpoint_is_zero (&a->sep)) |
| return SESSION_E_INVALID_RMT_IP; |
| |
| client = application_get (a->app_index); |
| session_endpoint_update_for_app (&a->sep_ext, client, 1 /* is_connect */ ); |
| client_wrk = application_get_worker (client, a->wrk_map_index); |
| |
| /* |
| * First check the local scope for locally attached destinations. |
| * If we have local scope, we pass *all* connects through it since we may |
| * have special policy rules even for non-local destinations, think proxy. |
| */ |
| if (application_has_local_scope (client)) |
| { |
| int rv; |
| |
| a->sep_ext.original_tp = a->sep_ext.transport_proto; |
| a->sep_ext.transport_proto = TRANSPORT_PROTO_NONE; |
| rv = app_worker_connect_session (client_wrk, &a->sep, a->api_context); |
| if (rv <= 0) |
| return rv; |
| a->sep_ext.transport_proto = a->sep_ext.original_tp; |
| } |
| /* |
| * Not connecting to a local server, propagate to transport |
| */ |
| return app_worker_connect_session (client_wrk, &a->sep, a->api_context); |
| } |
| |
| int |
| vnet_unlisten (vnet_unlisten_args_t * a) |
| { |
| app_worker_t *app_wrk; |
| app_listener_t *al; |
| application_t *app; |
| |
| ASSERT (vlib_thread_is_main_w_barrier ()); |
| |
| if (!(app = application_get_if_valid (a->app_index))) |
| return VNET_API_ERROR_APPLICATION_NOT_ATTACHED; |
| |
| if (!(al = app_listener_get_w_handle (a->handle))) |
| return -1; |
| |
| if (al->app_index != app->app_index) |
| { |
| clib_warning ("app doesn't own handle %llu!", a->handle); |
| return -1; |
| } |
| |
| app_wrk = application_get_worker (app, a->wrk_map_index); |
| if (!app_wrk) |
| { |
| clib_warning ("no app %u worker %u", app->app_index, a->wrk_map_index); |
| return -1; |
| } |
| |
| return app_worker_stop_listen (app_wrk, al); |
| } |
| |
| int |
| vnet_disconnect_session (vnet_disconnect_args_t * a) |
| { |
| app_worker_t *app_wrk; |
| session_t *s; |
| |
| s = session_get_from_handle_if_valid (a->handle); |
| if (!s) |
| return VNET_API_ERROR_INVALID_VALUE; |
| app_wrk = app_worker_get (s->app_wrk_index); |
| if (app_wrk->app_index != a->app_index) |
| return VNET_API_ERROR_INVALID_VALUE; |
| |
| /* We're peeking into another's thread pool. Make sure */ |
| ASSERT (s->session_index == session_index_from_handle (a->handle)); |
| |
| session_close (s); |
| return 0; |
| } |
| |
| int |
| application_change_listener_owner (session_t * s, app_worker_t * app_wrk) |
| { |
| app_worker_t *old_wrk = app_worker_get (s->app_wrk_index); |
| app_listener_t *app_listener; |
| application_t *app; |
| |
| if (!old_wrk) |
| return -1; |
| |
| hash_unset (old_wrk->listeners_table, listen_session_get_handle (s)); |
| if (session_transport_service_type (s) == TRANSPORT_SERVICE_CL |
| && s->rx_fifo) |
| segment_manager_dealloc_fifos (s->rx_fifo, s->tx_fifo); |
| |
| app = application_get (old_wrk->app_index); |
| if (!app) |
| return -1; |
| |
| app_listener = app_listener_get (app, s->al_index); |
| |
| /* Only remove from lb for now */ |
| app_listener->workers = clib_bitmap_set (app_listener->workers, |
| old_wrk->wrk_map_index, 0); |
| |
| if (app_worker_start_listen (app_wrk, app_listener)) |
| return -1; |
| |
| s->app_wrk_index = app_wrk->wrk_index; |
| |
| return 0; |
| } |
| |
| int |
| application_is_proxy (application_t * app) |
| { |
| return (app->flags & APP_OPTIONS_FLAGS_IS_PROXY); |
| } |
| |
| int |
| application_is_builtin (application_t * app) |
| { |
| return (app->flags & APP_OPTIONS_FLAGS_IS_BUILTIN); |
| } |
| |
| int |
| application_is_builtin_proxy (application_t * app) |
| { |
| return (application_is_proxy (app) && application_is_builtin (app)); |
| } |
| |
| u8 |
| application_has_local_scope (application_t * app) |
| { |
| return app->flags & APP_OPTIONS_FLAGS_USE_LOCAL_SCOPE; |
| } |
| |
| u8 |
| application_has_global_scope (application_t * app) |
| { |
| return app->flags & APP_OPTIONS_FLAGS_USE_GLOBAL_SCOPE; |
| } |
| |
| static clib_error_t * |
| application_start_stop_proxy_fib_proto (application_t * app, u8 fib_proto, |
| u8 transport_proto, u8 is_start) |
| { |
| app_namespace_t *app_ns = app_namespace_get (app->ns_index); |
| u8 is_ip4 = (fib_proto == FIB_PROTOCOL_IP4); |
| session_endpoint_cfg_t sep = SESSION_ENDPOINT_CFG_NULL; |
| transport_connection_t *tc; |
| app_worker_t *app_wrk; |
| app_listener_t *al; |
| session_t *s; |
| u32 flags; |
| |
| /* TODO decide if we want proxy to be enabled for all workers */ |
| app_wrk = application_get_default_worker (app); |
| if (is_start) |
| { |
| s = app_worker_first_listener (app_wrk, fib_proto, transport_proto); |
| if (!s) |
| { |
| sep.is_ip4 = is_ip4; |
| sep.fib_index = app_namespace_get_fib_index (app_ns, fib_proto); |
| sep.sw_if_index = app_ns->sw_if_index; |
| sep.transport_proto = transport_proto; |
| sep.app_wrk_index = app_wrk->wrk_index; /* only default */ |
| |
| /* force global scope listener */ |
| flags = app->flags; |
| app->flags &= ~APP_OPTIONS_FLAGS_USE_LOCAL_SCOPE; |
| app_listener_alloc_and_init (app, &sep, &al); |
| app->flags = flags; |
| |
| app_worker_start_listen (app_wrk, al); |
| s = listen_session_get (al->session_index); |
| s->flags |= SESSION_F_PROXY; |
| } |
| } |
| else |
| { |
| s = app_worker_proxy_listener (app_wrk, fib_proto, transport_proto); |
| ASSERT (s); |
| } |
| |
| tc = listen_session_get_transport (s); |
| |
| if (!ip_is_zero (&tc->lcl_ip, 1)) |
| { |
| u32 sti; |
| sep.is_ip4 = is_ip4; |
| sep.fib_index = app_namespace_get_fib_index (app_ns, fib_proto); |
| sep.transport_proto = transport_proto; |
| sep.port = 0; |
| sti = session_lookup_get_index_for_fib (fib_proto, sep.fib_index); |
| if (is_start) |
| session_lookup_add_session_endpoint (sti, |
| (session_endpoint_t *) & sep, |
| s->session_index); |
| else |
| session_lookup_del_session_endpoint (sti, |
| (session_endpoint_t *) & sep); |
| } |
| |
| return 0; |
| } |
| |
| static void |
| application_start_stop_proxy_local_scope (application_t * app, |
| u8 transport_proto, u8 is_start) |
| { |
| session_endpoint_t sep = SESSION_ENDPOINT_NULL; |
| app_namespace_t *app_ns; |
| app_ns = app_namespace_get (app->ns_index); |
| sep.is_ip4 = 1; |
| sep.transport_proto = transport_proto; |
| sep.port = 0; |
| |
| if (is_start) |
| { |
| session_lookup_add_session_endpoint (app_ns->local_table_index, &sep, |
| app->app_index); |
| sep.is_ip4 = 0; |
| session_lookup_add_session_endpoint (app_ns->local_table_index, &sep, |
| app->app_index); |
| } |
| else |
| { |
| session_lookup_del_session_endpoint (app_ns->local_table_index, &sep); |
| sep.is_ip4 = 0; |
| session_lookup_del_session_endpoint (app_ns->local_table_index, &sep); |
| } |
| } |
| |
| void |
| application_start_stop_proxy (application_t * app, |
| transport_proto_t transport_proto, u8 is_start) |
| { |
| if (application_has_local_scope (app)) |
| application_start_stop_proxy_local_scope (app, transport_proto, is_start); |
| |
| if (application_has_global_scope (app)) |
| { |
| application_start_stop_proxy_fib_proto (app, FIB_PROTOCOL_IP4, |
| transport_proto, is_start); |
| application_start_stop_proxy_fib_proto (app, FIB_PROTOCOL_IP6, |
| transport_proto, is_start); |
| } |
| } |
| |
| void |
| application_setup_proxy (application_t * app) |
| { |
| u16 transports = app->proxied_transports; |
| transport_proto_t tp; |
| |
| ASSERT (application_is_proxy (app)); |
| |
| /* *INDENT-OFF* */ |
| transport_proto_foreach (tp, ({ |
| if (transports & (1 << tp)) |
| application_start_stop_proxy (app, tp, 1); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| void |
| application_remove_proxy (application_t * app) |
| { |
| u16 transports = app->proxied_transports; |
| transport_proto_t tp; |
| |
| ASSERT (application_is_proxy (app)); |
| |
| /* *INDENT-OFF* */ |
| transport_proto_foreach (tp, ({ |
| if (transports & (1 << tp)) |
| application_start_stop_proxy (app, tp, 0); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| segment_manager_props_t * |
| application_segment_manager_properties (application_t * app) |
| { |
| return &app->sm_properties; |
| } |
| |
| segment_manager_props_t * |
| application_get_segment_manager_properties (u32 app_index) |
| { |
| application_t *app = application_get (app_index); |
| return &app->sm_properties; |
| } |
| |
| clib_error_t * |
| vnet_app_add_tls_cert (vnet_app_add_tls_cert_args_t * a) |
| { |
| /* Deprected, will be remove after 20.01 */ |
| app_cert_key_pair_t *ckpair; |
| ckpair = app_cert_key_pair_get_default (); |
| ckpair->cert = vec_dup (a->cert); |
| return 0; |
| } |
| |
| clib_error_t * |
| vnet_app_add_tls_key (vnet_app_add_tls_key_args_t * a) |
| { |
| /* Deprected, will be remove after 20.01 */ |
| app_cert_key_pair_t *ckpair; |
| ckpair = app_cert_key_pair_get_default (); |
| ckpair->key = vec_dup (a->key); |
| return 0; |
| } |
| |
| static void |
| application_format_listeners (application_t * app, int verbose) |
| { |
| vlib_main_t *vm = vlib_get_main (); |
| app_worker_map_t *wrk_map; |
| app_worker_t *app_wrk; |
| u32 sm_index; |
| u64 handle; |
| |
| if (!app) |
| { |
| vlib_cli_output (vm, "%U", format_app_worker_listener, 0 /* header */ , |
| 0, 0, verbose); |
| return; |
| } |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (wrk_map, app->worker_maps, ({ |
| app_wrk = app_worker_get (wrk_map->wrk_index); |
| if (hash_elts (app_wrk->listeners_table) == 0) |
| continue; |
| hash_foreach (handle, sm_index, app_wrk->listeners_table, ({ |
| vlib_cli_output (vm, "%U", format_app_worker_listener, app_wrk, |
| handle, sm_index, verbose); |
| })); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| static void |
| application_format_connects (application_t * app, int verbose) |
| { |
| app_worker_map_t *wrk_map; |
| app_worker_t *app_wrk; |
| |
| if (!app) |
| { |
| app_worker_format_connects (0, verbose); |
| return; |
| } |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (wrk_map, app->worker_maps, ({ |
| app_wrk = app_worker_get (wrk_map->wrk_index); |
| app_worker_format_connects (app_wrk, verbose); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| u8 * |
| format_cert_key_pair (u8 * s, va_list * args) |
| { |
| app_cert_key_pair_t *ckpair = va_arg (*args, app_cert_key_pair_t *); |
| int key_len = 0, cert_len = 0; |
| cert_len = vec_len (ckpair->cert); |
| key_len = vec_len (ckpair->key); |
| if (ckpair->cert_key_index == 0) |
| s = format (s, "DEFAULT (cert:%d, key:%d)", cert_len, key_len); |
| else |
| s = format (s, "%d (cert:%d, key:%d)", ckpair->cert_key_index, |
| cert_len, key_len); |
| return s; |
| } |
| |
| u8 * |
| format_crypto_engine (u8 * s, va_list * args) |
| { |
| u32 engine = va_arg (*args, u32); |
| switch (engine) |
| { |
| case CRYPTO_ENGINE_NONE: |
| return format (s, "none"); |
| case CRYPTO_ENGINE_MBEDTLS: |
| return format (s, "mbedtls"); |
| case CRYPTO_ENGINE_OPENSSL: |
| return format (s, "openssl"); |
| case CRYPTO_ENGINE_PICOTLS: |
| return format (s, "picotls"); |
| case CRYPTO_ENGINE_VPP: |
| return format (s, "vpp"); |
| default: |
| return format (s, "unknown engine"); |
| } |
| return s; |
| } |
| |
| uword |
| unformat_crypto_engine (unformat_input_t * input, va_list * args) |
| { |
| u8 *a = va_arg (*args, u8 *); |
| if (unformat (input, "mbedtls")) |
| *a = CRYPTO_ENGINE_MBEDTLS; |
| else if (unformat (input, "openssl")) |
| *a = CRYPTO_ENGINE_OPENSSL; |
| else if (unformat (input, "picotls")) |
| *a = CRYPTO_ENGINE_PICOTLS; |
| else if (unformat (input, "vpp")) |
| *a = CRYPTO_ENGINE_VPP; |
| else |
| return 0; |
| return 1; |
| } |
| |
| u8 * |
| format_crypto_context (u8 * s, va_list * args) |
| { |
| crypto_context_t *crctx = va_arg (*args, crypto_context_t *); |
| s = format (s, "[0x%x][sub%d,ckpair%x]", crctx->ctx_index, |
| crctx->n_subscribers, crctx->ckpair_index); |
| s = format (s, "[%U]", format_crypto_engine, crctx->crypto_engine); |
| return s; |
| } |
| |
| u8 * |
| format_application (u8 * s, va_list * args) |
| { |
| application_t *app = va_arg (*args, application_t *); |
| CLIB_UNUSED (int verbose) = va_arg (*args, int); |
| segment_manager_props_t *props; |
| const u8 *app_ns_name, *app_name; |
| app_worker_map_t *wrk_map; |
| app_worker_t *app_wrk; |
| |
| if (app == 0) |
| { |
| if (!verbose) |
| s = format (s, "%-10s%-20s%-40s", "Index", "Name", "Namespace"); |
| return s; |
| } |
| |
| app_name = app_get_name (app); |
| app_ns_name = app_namespace_id_from_index (app->ns_index); |
| props = application_segment_manager_properties (app); |
| if (!verbose) |
| { |
| s = format (s, "%-10u%-20v%-40s", app->app_index, app_name, |
| app_ns_name); |
| return s; |
| } |
| |
| s = format (s, "app-name %v app-index %u ns-index %u seg-size %U\n", |
| app_name, app->app_index, app->ns_index, |
| format_memory_size, props->add_segment_size); |
| s = format (s, "rx-fifo-size %U tx-fifo-size %U workers:\n", |
| format_memory_size, props->rx_fifo_size, |
| format_memory_size, props->tx_fifo_size); |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (wrk_map, app->worker_maps, ({ |
| app_wrk = app_worker_get (wrk_map->wrk_index); |
| s = format (s, "%U", format_app_worker, app_wrk); |
| })); |
| /* *INDENT-ON* */ |
| |
| return s; |
| } |
| |
| void |
| application_format_all_listeners (vlib_main_t * vm, int verbose) |
| { |
| application_t *app; |
| |
| if (!pool_elts (app_main.app_pool)) |
| { |
| vlib_cli_output (vm, "No active server bindings"); |
| return; |
| } |
| |
| application_format_listeners (0, verbose); |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (app, app_main.app_pool, ({ |
| application_format_listeners (app, verbose); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| void |
| application_format_all_clients (vlib_main_t * vm, int verbose) |
| { |
| application_t *app; |
| |
| if (!pool_elts (app_main.app_pool)) |
| { |
| vlib_cli_output (vm, "No active apps"); |
| return; |
| } |
| |
| application_format_connects (0, verbose); |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (app, app_main.app_pool, ({ |
| application_format_connects (app, verbose); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| static clib_error_t * |
| show_certificate_command_fn (vlib_main_t * vm, unformat_input_t * input, |
| vlib_cli_command_t * cmd) |
| { |
| app_cert_key_pair_t *ckpair; |
| session_cli_return_if_not_enabled (); |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (ckpair, app_main.cert_key_pair_store, ({ |
| vlib_cli_output (vm, "%U", format_cert_key_pair, ckpair); |
| })); |
| /* *INDENT-ON* */ |
| return 0; |
| } |
| |
| static inline void |
| appliction_format_app_mq (vlib_main_t * vm, application_t * app) |
| { |
| app_worker_map_t *map; |
| app_worker_t *wrk; |
| /* *INDENT-OFF* */ |
| pool_foreach (map, app->worker_maps, ({ |
| wrk = app_worker_get (map->wrk_index); |
| vlib_cli_output (vm, "[A%d][%d]%U", app->app_index, |
| map->wrk_index, format_svm_msg_q, |
| wrk->event_queue); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| static clib_error_t * |
| appliction_format_all_app_mq (vlib_main_t * vm) |
| { |
| application_t *app; |
| int i, n_threads; |
| |
| n_threads = vec_len (vlib_mains); |
| |
| for (i = 0; i < n_threads; i++) |
| { |
| vlib_cli_output (vm, "[Ctrl%d]%U", i, format_svm_msg_q, |
| session_main_get_vpp_event_queue (i)); |
| } |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (app, app_main.app_pool, ({ |
| appliction_format_app_mq (vm, app); |
| })); |
| /* *INDENT-ON* */ |
| return 0; |
| } |
| |
| static clib_error_t * |
| show_app_command_fn (vlib_main_t * vm, unformat_input_t * input, |
| vlib_cli_command_t * cmd) |
| { |
| int do_server = 0, do_client = 0, do_mq = 0; |
| application_t *app; |
| u32 app_index = ~0; |
| int verbose = 0; |
| |
| session_cli_return_if_not_enabled (); |
| |
| while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) |
| { |
| if (unformat (input, "server")) |
| do_server = 1; |
| else if (unformat (input, "client")) |
| do_client = 1; |
| else if (unformat (input, "mq")) |
| do_mq = 1; |
| else if (unformat (input, "%u", &app_index)) |
| ; |
| else if (unformat (input, "verbose")) |
| verbose = 1; |
| else |
| return clib_error_return (0, "unknown input `%U'", |
| format_unformat_error, input); |
| } |
| |
| if (do_mq && app_index != ~0) |
| { |
| app = application_get_if_valid (app_index); |
| if (!app) |
| return clib_error_return (0, "No app with index %u", app_index); |
| |
| appliction_format_app_mq (vm, app); |
| return 0; |
| } |
| |
| if (do_mq) |
| { |
| appliction_format_all_app_mq (vm); |
| return 0; |
| } |
| |
| if (do_server) |
| { |
| application_format_all_listeners (vm, verbose); |
| return 0; |
| } |
| |
| if (do_client) |
| { |
| application_format_all_clients (vm, verbose); |
| return 0; |
| } |
| |
| if (app_index != ~0) |
| { |
| app = application_get_if_valid (app_index); |
| if (!app) |
| return clib_error_return (0, "No app with index %u", app_index); |
| |
| vlib_cli_output (vm, "%U", format_application, app, /* verbose */ 1); |
| return 0; |
| } |
| |
| /* Print app related info */ |
| if (!do_server && !do_client) |
| { |
| vlib_cli_output (vm, "%U", format_application, 0, 0); |
| /* *INDENT-OFF* */ |
| pool_foreach (app, app_main.app_pool, ({ |
| vlib_cli_output (vm, "%U", format_application, app, 0); |
| })); |
| /* *INDENT-ON* */ |
| } |
| |
| return 0; |
| } |
| |
| /* Certificate store */ |
| |
| static app_cert_key_pair_t * |
| app_cert_key_pair_alloc () |
| { |
| app_cert_key_pair_t *ckpair; |
| pool_get (app_main.cert_key_pair_store, ckpair); |
| clib_memset (ckpair, 0, sizeof (*ckpair)); |
| ckpair->cert_key_index = ckpair - app_main.cert_key_pair_store; |
| return ckpair; |
| } |
| |
| app_cert_key_pair_t * |
| app_cert_key_pair_get_if_valid (u32 index) |
| { |
| if (pool_is_free_index (app_main.cert_key_pair_store, index)) |
| return 0; |
| return app_cert_key_pair_get (index); |
| } |
| |
| app_cert_key_pair_t * |
| app_cert_key_pair_get (u32 index) |
| { |
| return pool_elt_at_index (app_main.cert_key_pair_store, index); |
| } |
| |
| app_cert_key_pair_t * |
| app_cert_key_pair_get_default () |
| { |
| /* To maintain legacy bapi */ |
| return app_cert_key_pair_get (0); |
| } |
| |
| int |
| vnet_app_add_cert_key_pair (vnet_app_add_cert_key_pair_args_t * a) |
| { |
| app_cert_key_pair_t *ckpair = app_cert_key_pair_alloc (); |
| ckpair->cert = vec_dup (a->cert); |
| ckpair->key = vec_dup (a->key); |
| a->index = ckpair->cert_key_index; |
| return 0; |
| } |
| |
| int |
| vnet_app_add_cert_key_interest (u32 index, u32 app_index) |
| { |
| app_cert_key_pair_t *ckpair; |
| if (!(ckpair = app_cert_key_pair_get_if_valid (index))) |
| return -1; |
| if (vec_search (ckpair->app_interests, app_index) != ~0) |
| vec_add1 (ckpair->app_interests, app_index); |
| return 0; |
| } |
| |
| int |
| vnet_app_del_cert_key_pair (u32 index) |
| { |
| app_cert_key_pair_t *ckpair; |
| application_t *app; |
| u32 *app_index; |
| |
| if (!(ckpair = app_cert_key_pair_get_if_valid (index))) |
| return (VNET_API_ERROR_INVALID_VALUE); |
| |
| vec_foreach (app_index, ckpair->app_interests) |
| { |
| if ((app = application_get_if_valid (*app_index)) |
| && app->cb_fns.app_cert_key_pair_delete_callback) |
| app->cb_fns.app_cert_key_pair_delete_callback (ckpair); |
| } |
| |
| vec_free (ckpair->cert); |
| vec_free (ckpair->key); |
| pool_put (app_main.cert_key_pair_store, ckpair); |
| return 0; |
| } |
| |
| clib_error_t * |
| application_init (vlib_main_t * vm) |
| { |
| /* Add a certificate with index 0 to support legacy apis */ |
| (void) app_cert_key_pair_alloc (); |
| app_main.last_crypto_engine = CRYPTO_ENGINE_LAST; |
| return 0; |
| } |
| |
| /* *INDENT-OFF* */ |
| VLIB_INIT_FUNCTION (application_init); |
| |
| VLIB_CLI_COMMAND (show_app_command, static) = |
| { |
| .path = "show app", |
| .short_help = "show app [app_id] [server|client] [mq] [verbose]", |
| .function = show_app_command_fn, |
| }; |
| |
| VLIB_CLI_COMMAND (show_certificate_command, static) = |
| { |
| .path = "show app certificate", |
| .short_help = "list app certs and keys present in store", |
| .function = show_certificate_command_fn, |
| }; |
| /* *INDENT-ON* */ |
| |
| crypto_engine_type_t |
| app_crypto_engine_type_add (void) |
| { |
| return (++app_main.last_crypto_engine); |
| } |
| |
| u8 |
| app_crypto_engine_n_types (void) |
| { |
| return (app_main.last_crypto_engine + 1); |
| } |
| |
| /* |
| * fd.io coding-style-patch-verification: ON |
| * |
| * Local Variables: |
| * eval: (c-set-style "gnu") |
| * End: |
| */ |