2 * Copyright (c) 2009, 2010, 2011, 2012, 2013, 2014, 2015 Nicira, Inc.
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at:
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
30 #include "db-ctl-base.h"
32 #include "command-line.h"
34 #include "dynamic-string.h"
35 #include "fatal-signal.h"
38 #include "ovsdb-data.h"
39 #include "ovsdb-idl.h"
40 #include "poll-loop.h"
43 #include "stream-ssl.h"
47 #include "lib/vswitch-idl.h"
51 #include "openvswitch/vconn.h"
52 #include "openvswitch/vlog.h"
54 VLOG_DEFINE_THIS_MODULE(vsctl);
58 /* --db: The database server to contact. */
59 static const char *db;
61 /* --oneline: Write each command's output as a single line? */
64 /* --dry-run: Do not commit any changes. */
67 /* --no-wait: Wait for ovs-vswitchd to reload its configuration? */
68 static bool wait_for_reload = true;
70 /* --timeout: Time to wait for a connection to 'db'. */
73 /* --retry: If true, ovs-vsctl will retry connecting to the database forever.
74 * If false and --db says to use an active connection method (e.g. "unix:",
75 * "tcp:", "ssl:"), then ovs-vsctl will try to connect once and exit with an
76 * error if the database server cannot be contacted (e.g. ovsdb-server is not
79 * Regardless of this setting, --timeout always limits how long ovs-vsctl will
83 /* Format for table output. */
84 static struct table_style table_style = TABLE_STYLE_DEFAULT;
86 static void vsctl_cmd_init(void);
88 /* The IDL we're using and the current transaction, if any.
89 * This is for use by vsctl_exit() only, to allow it to clean up.
90 * Other code should use its context arguments. */
91 static struct ovsdb_idl *the_idl;
92 static struct ovsdb_idl_txn *the_idl_txn;
93 OVS_NO_RETURN static void vsctl_exit(int status);
95 OVS_NO_RETURN static void usage(void);
96 static void parse_options(int argc, char *argv[], struct shash *local_options);
97 static void run_prerequisites(struct ctl_command[], size_t n_commands,
99 static void do_vsctl(const char *args, struct ctl_command *, size_t n,
102 /* post_db_reload_check frame work is to allow ovs-vsctl to do additional
103 * checks after OVSDB transactions are successfully recorded and reload by
106 * For example, When a new interface is added to OVSDB, ovs-vswitchd will
107 * either store a positive values on successful implementing the new
108 * interface, or -1 on failure.
110 * Unless -no-wait command line option is specified,
111 * post_db_reload_do_checks() is called right after any configuration
112 * changes is picked up (i.e. reload) by ovs-vswitchd. Any error detected
113 * post OVSDB reload is reported as ovs-vsctl errors. OVS-vswitchd logs
114 * more detailed messages about those errors.
116 * Current implementation only check for Post OVSDB reload failures on new
117 * interface additions with 'add-br' and 'add-port' commands.
119 * post_db_reload_expect_iface()
121 * keep track of interfaces to be checked post OVSDB reload. */
122 static void post_db_reload_check_init(void);
123 static void post_db_reload_do_checks(const struct vsctl_context *);
124 static void post_db_reload_expect_iface(const struct ovsrec_interface *);
126 static struct uuid *neoteric_ifaces;
127 static size_t n_neoteric_ifaces;
128 static size_t allocated_neoteric_ifaces;
131 main(int argc, char *argv[])
133 extern struct vlog_module VLM_reconnect;
134 struct ovsdb_idl *idl;
135 struct ctl_command *commands;
136 struct shash local_options;
141 set_program_name(argv[0]);
142 fatal_ignore_sigpipe();
143 vlog_set_levels(NULL, VLF_CONSOLE, VLL_WARN);
144 vlog_set_levels(&VLM_reconnect, VLF_ANY_DESTINATION, VLL_WARN);
149 /* Log our arguments. This is often valuable for debugging systems. */
150 args = process_escape_args(argv);
151 VLOG(ctl_might_write_to_db(argv) ? VLL_INFO : VLL_DBG, "Called as %s", args);
153 /* Parse command line. */
154 shash_init(&local_options);
155 parse_options(argc, argv, &local_options);
156 commands = ctl_parse_commands(argc - optind, argv + optind, &local_options,
163 /* Initialize IDL. */
164 idl = the_idl = ovsdb_idl_create(db, &ovsrec_idl_class, false, retry);
165 run_prerequisites(commands, n_commands, idl);
167 /* Execute the commands.
169 * 'seqno' is the database sequence number for which we last tried to
170 * execute our transaction. There's no point in trying to commit more than
171 * once for any given sequence number, because if the transaction fails
172 * it's because the database changed and we need to obtain an up-to-date
173 * view of the database before we try the transaction again. */
174 seqno = ovsdb_idl_get_seqno(idl);
177 if (!ovsdb_idl_is_alive(idl)) {
178 int retval = ovsdb_idl_get_last_error(idl);
179 ctl_fatal("%s: database connection failed (%s)",
180 db, ovs_retval_to_string(retval));
183 if (seqno != ovsdb_idl_get_seqno(idl)) {
184 seqno = ovsdb_idl_get_seqno(idl);
185 do_vsctl(args, commands, n_commands, idl);
188 if (seqno == ovsdb_idl_get_seqno(idl)) {
196 parse_options(int argc, char *argv[], struct shash *local_options)
199 OPT_DB = UCHAR_MAX + 1,
204 OPT_BOOTSTRAP_CA_CERT,
213 static const struct option global_long_options[] = {
214 {"db", required_argument, NULL, OPT_DB},
215 {"no-syslog", no_argument, NULL, OPT_NO_SYSLOG},
216 {"no-wait", no_argument, NULL, OPT_NO_WAIT},
217 {"dry-run", no_argument, NULL, OPT_DRY_RUN},
218 {"oneline", no_argument, NULL, OPT_ONELINE},
219 {"timeout", required_argument, NULL, 't'},
220 {"retry", no_argument, NULL, OPT_RETRY},
221 {"help", no_argument, NULL, 'h'},
222 {"commands", no_argument, NULL, OPT_COMMANDS},
223 {"options", no_argument, NULL, OPT_OPTIONS},
224 {"version", no_argument, NULL, 'V'},
227 STREAM_SSL_LONG_OPTIONS,
228 {"bootstrap-ca-cert", required_argument, NULL, OPT_BOOTSTRAP_CA_CERT},
229 {"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
232 const int n_global_long_options = ARRAY_SIZE(global_long_options) - 1;
233 char *tmp, *short_options;
235 struct option *options;
236 size_t allocated_options;
240 tmp = ovs_cmdl_long_options_to_short_options(global_long_options);
241 short_options = xasprintf("+%s", tmp);
244 /* We want to parse both global and command-specific options here, but
245 * getopt_long() isn't too convenient for the job. We copy our global
246 * options into a dynamic array, then append all of the command-specific
248 options = xmemdup(global_long_options, sizeof global_long_options);
249 allocated_options = ARRAY_SIZE(global_long_options);
250 n_options = n_global_long_options;
251 ctl_add_cmd_options(&options, &n_options, &allocated_options, OPT_LOCAL);
252 table_style.format = TF_LIST;
258 c = getopt_long(argc, argv, short_options, options, &idx);
273 vlog_set_levels(&VLM_vsctl, VLF_SYSLOG, VLL_WARN);
277 wait_for_reload = false;
285 if (shash_find(local_options, options[idx].name)) {
286 ctl_fatal("'%s' option specified multiple times",
289 shash_add_nocopy(local_options,
290 xasprintf("--%s", options[idx].name),
291 optarg ? xstrdup(optarg) : NULL);
298 ctl_print_commands();
301 ctl_print_options(global_long_options);
304 ovs_print_version(0, 0);
305 printf("DB Schema %s\n", ovsrec_get_db_version());
309 timeout = strtoul(optarg, NULL, 10);
311 ctl_fatal("value %s on -t or --timeout is invalid",
321 TABLE_OPTION_HANDLERS(&table_style)
323 STREAM_SSL_OPTION_HANDLERS
325 case OPT_PEER_CA_CERT:
326 stream_ssl_set_peer_ca_cert_file(optarg);
329 case OPT_BOOTSTRAP_CA_CERT:
330 stream_ssl_set_ca_cert_file(optarg, true);
343 db = ctl_default_db();
346 for (i = n_global_long_options; options[i].name; i++) {
347 free(CONST_CAST(char *, options[i].name));
356 %s: ovs-vswitchd management utility\n\
357 usage: %s [OPTIONS] COMMAND [ARG...]\n\
359 Open vSwitch commands:\n\
360 init initialize database, if not yet initialized\n\
361 show print overview of database contents\n\
362 emer-reset reset configuration to clean state\n\
365 add-br BRIDGE create a new bridge named BRIDGE\n\
366 add-br BRIDGE PARENT VLAN create new fake BRIDGE in PARENT on VLAN\n\
367 del-br BRIDGE delete BRIDGE and all of its ports\n\
368 list-br print the names of all the bridges\n\
369 br-exists BRIDGE exit 2 if BRIDGE does not exist\n\
370 br-to-vlan BRIDGE print the VLAN which BRIDGE is on\n\
371 br-to-parent BRIDGE print the parent of BRIDGE\n\
372 br-set-external-id BRIDGE KEY VALUE set KEY on BRIDGE to VALUE\n\
373 br-set-external-id BRIDGE KEY unset KEY on BRIDGE\n\
374 br-get-external-id BRIDGE KEY print value of KEY on BRIDGE\n\
375 br-get-external-id BRIDGE list key-value pairs on BRIDGE\n\
377 Port commands (a bond is considered to be a single port):\n\
378 list-ports BRIDGE print the names of all the ports on BRIDGE\n\
379 add-port BRIDGE PORT add network device PORT to BRIDGE\n\
380 add-bond BRIDGE PORT IFACE... add bonded port PORT in BRIDGE from IFACES\n\
381 del-port [BRIDGE] PORT delete PORT (which may be bonded) from BRIDGE\n\
382 port-to-br PORT print name of bridge that contains PORT\n\
384 Interface commands (a bond consists of multiple interfaces):\n\
385 list-ifaces BRIDGE print the names of all interfaces on BRIDGE\n\
386 iface-to-br IFACE print name of bridge that contains IFACE\n\
388 Controller commands:\n\
389 get-controller BRIDGE print the controllers for BRIDGE\n\
390 del-controller BRIDGE delete the controllers for BRIDGE\n\
391 set-controller BRIDGE TARGET... set the controllers for BRIDGE\n\
392 get-fail-mode BRIDGE print the fail-mode for BRIDGE\n\
393 del-fail-mode BRIDGE delete the fail-mode for BRIDGE\n\
394 set-fail-mode BRIDGE MODE set the fail-mode for BRIDGE to MODE\n\
397 get-manager print the managers\n\
398 del-manager delete the managers\n\
399 set-manager TARGET... set the list of managers to TARGET...\n\
402 get-ssl print the SSL configuration\n\
403 del-ssl delete the SSL configuration\n\
404 set-ssl PRIV-KEY CERT CA-CERT set the SSL configuration\n\
406 Auto Attach commands:\n\
407 add-aa-mapping BRIDGE I-SID VLAN add Auto Attach mapping to BRIDGE\n\
408 del-aa-mapping BRIDGE I-SID VLAN delete Auto Attach mapping VLAN from BRIDGE\n\
409 get-aa-mapping BRIDGE get Auto Attach mappings from BRIDGE\n\
412 emer-reset reset switch to known good state\n\
417 --db=DATABASE connect to DATABASE\n\
419 --no-wait do not wait for ovs-vswitchd to reconfigure\n\
420 --retry keep trying to connect to server forever\n\
421 -t, --timeout=SECS wait at most SECS seconds for ovs-vswitchd\n\
422 --dry-run do not commit changes to database\n\
423 --oneline print exactly one line of output per command\n",
424 program_name, program_name, ctl_get_db_cmd_usage(), ctl_default_db());
427 --no-syslog equivalent to --verbose=vsctl:syslog:warn\n");
428 stream_usage("database", true, true, false);
431 -h, --help display this help message\n\
432 -V, --version display version information\n");
437 /* ovs-vsctl specific context. Inherits the 'struct ctl_context' as base. */
438 struct vsctl_context {
439 struct ctl_context base;
441 /* Modifiable state. */
442 const struct ovsrec_open_vswitch *ovs;
445 /* A cache of the contents of the database.
447 * A command that needs to use any of this information must first call
448 * vsctl_context_populate_cache(). A command that changes anything that
449 * could invalidate the cache must either call
450 * vsctl_context_invalidate_cache() or manually update the cache to
451 * maintain its correctness. */
453 struct shash bridges; /* Maps from bridge name to struct vsctl_bridge. */
454 struct shash ports; /* Maps from port name to struct vsctl_port. */
455 struct shash ifaces; /* Maps from port name to struct vsctl_iface. */
458 struct vsctl_bridge {
459 struct ovsrec_bridge *br_cfg;
461 struct ovs_list ports; /* Contains "struct vsctl_port"s. */
463 /* VLAN ("fake") bridge support.
465 * Use 'parent != NULL' to detect a fake bridge, because 'vlan' can be 0
467 struct hmap children; /* VLAN bridges indexed by 'vlan'. */
468 struct hmap_node children_node; /* Node in parent's 'children' hmap. */
469 struct vsctl_bridge *parent; /* Real bridge, or NULL. */
470 int vlan; /* VLAN VID (0...4095), or 0. */
474 struct ovs_list ports_node; /* In struct vsctl_bridge's 'ports' list. */
475 struct ovs_list ifaces; /* Contains "struct vsctl_iface"s. */
476 struct ovsrec_port *port_cfg;
477 struct vsctl_bridge *bridge;
481 struct ovs_list ifaces_node; /* In struct vsctl_port's 'ifaces' list. */
482 struct ovsrec_interface *iface_cfg;
483 struct vsctl_port *port;
486 /* Casts 'base' into 'strcut vsctl_context'. */
487 static struct vsctl_context *
488 vsctl_context_cast(struct ctl_context *base)
490 return CONTAINER_OF(base, struct vsctl_context, base);
493 static struct vsctl_bridge *find_vlan_bridge(struct vsctl_bridge *parent,
497 vsctl_context_to_string(const struct ctl_context *ctx)
499 const struct shash_node *node;
505 SHASH_FOR_EACH (node, &ctx->options) {
506 svec_add(&words, node->name);
508 for (i = 0; i < ctx->argc; i++) {
509 svec_add(&words, ctx->argv[i]);
511 svec_terminate(&words);
513 s = process_escape_args(words.names);
515 svec_destroy(&words);
521 verify_ports(struct vsctl_context *vsctl_ctx)
523 if (!vsctl_ctx->verified_ports) {
524 const struct ovsrec_bridge *bridge;
525 const struct ovsrec_port *port;
527 ovsrec_open_vswitch_verify_bridges(vsctl_ctx->ovs);
528 OVSREC_BRIDGE_FOR_EACH (bridge, vsctl_ctx->base.idl) {
529 ovsrec_bridge_verify_ports(bridge);
531 OVSREC_PORT_FOR_EACH (port, vsctl_ctx->base.idl) {
532 ovsrec_port_verify_interfaces(port);
535 vsctl_ctx->verified_ports = true;
539 static struct vsctl_bridge *
540 add_bridge_to_cache(struct vsctl_context *vsctl_ctx,
541 struct ovsrec_bridge *br_cfg, const char *name,
542 struct vsctl_bridge *parent, int vlan)
544 struct vsctl_bridge *br = xmalloc(sizeof *br);
546 br->name = xstrdup(name);
547 list_init(&br->ports);
550 hmap_init(&br->children);
552 struct vsctl_bridge *conflict = find_vlan_bridge(parent, vlan);
554 VLOG_WARN("%s: bridge has multiple VLAN bridges (%s and %s) "
555 "for VLAN %d, but only one is allowed",
556 parent->name, name, conflict->name, vlan);
558 hmap_insert(&parent->children, &br->children_node,
562 shash_add(&vsctl_ctx->bridges, br->name, br);
567 ovs_delete_bridge(const struct ovsrec_open_vswitch *ovs,
568 struct ovsrec_bridge *bridge)
570 struct ovsrec_bridge **bridges;
573 bridges = xmalloc(sizeof *ovs->bridges * ovs->n_bridges);
574 for (i = n = 0; i < ovs->n_bridges; i++) {
575 if (ovs->bridges[i] != bridge) {
576 bridges[n++] = ovs->bridges[i];
579 ovsrec_open_vswitch_set_bridges(ovs, bridges, n);
584 del_cached_bridge(struct vsctl_context *vsctl_ctx, struct vsctl_bridge *br)
586 ovs_assert(list_is_empty(&br->ports));
587 ovs_assert(hmap_is_empty(&br->children));
589 hmap_remove(&br->parent->children, &br->children_node);
592 ovsrec_bridge_delete(br->br_cfg);
593 ovs_delete_bridge(vsctl_ctx->ovs, br->br_cfg);
595 shash_find_and_delete(&vsctl_ctx->bridges, br->name);
596 hmap_destroy(&br->children);
602 port_is_fake_bridge(const struct ovsrec_port *port_cfg)
604 return (port_cfg->fake_bridge
606 && *port_cfg->tag >= 0 && *port_cfg->tag <= 4095);
609 static struct vsctl_bridge *
610 find_vlan_bridge(struct vsctl_bridge *parent, int vlan)
612 struct vsctl_bridge *child;
614 HMAP_FOR_EACH_IN_BUCKET (child, children_node, hash_int(vlan, 0),
616 if (child->vlan == vlan) {
624 static struct vsctl_port *
625 add_port_to_cache(struct vsctl_context *vsctl_ctx, struct vsctl_bridge *parent,
626 struct ovsrec_port *port_cfg)
628 struct vsctl_port *port;
631 && *port_cfg->tag >= 0 && *port_cfg->tag <= 4095) {
632 struct vsctl_bridge *vlan_bridge;
634 vlan_bridge = find_vlan_bridge(parent, *port_cfg->tag);
636 parent = vlan_bridge;
640 port = xmalloc(sizeof *port);
641 list_push_back(&parent->ports, &port->ports_node);
642 list_init(&port->ifaces);
643 port->port_cfg = port_cfg;
644 port->bridge = parent;
645 shash_add(&vsctl_ctx->ports, port_cfg->name, port);
651 del_cached_port(struct vsctl_context *vsctl_ctx, struct vsctl_port *port)
653 ovs_assert(list_is_empty(&port->ifaces));
654 list_remove(&port->ports_node);
655 shash_find_and_delete(&vsctl_ctx->ports, port->port_cfg->name);
656 ovsrec_port_delete(port->port_cfg);
660 static struct vsctl_iface *
661 add_iface_to_cache(struct vsctl_context *vsctl_ctx, struct vsctl_port *parent,
662 struct ovsrec_interface *iface_cfg)
664 struct vsctl_iface *iface;
666 iface = xmalloc(sizeof *iface);
667 list_push_back(&parent->ifaces, &iface->ifaces_node);
668 iface->iface_cfg = iface_cfg;
669 iface->port = parent;
670 shash_add(&vsctl_ctx->ifaces, iface_cfg->name, iface);
676 del_cached_iface(struct vsctl_context *vsctl_ctx, struct vsctl_iface *iface)
678 list_remove(&iface->ifaces_node);
679 shash_find_and_delete(&vsctl_ctx->ifaces, iface->iface_cfg->name);
680 ovsrec_interface_delete(iface->iface_cfg);
685 vsctl_context_invalidate_cache(struct ctl_context *ctx)
687 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
688 struct shash_node *node;
690 if (!vsctl_ctx->cache_valid) {
693 vsctl_ctx->cache_valid = false;
695 SHASH_FOR_EACH (node, &vsctl_ctx->bridges) {
696 struct vsctl_bridge *bridge = node->data;
697 hmap_destroy(&bridge->children);
701 shash_destroy(&vsctl_ctx->bridges);
703 shash_destroy_free_data(&vsctl_ctx->ports);
704 shash_destroy_free_data(&vsctl_ctx->ifaces);
708 pre_get_info(struct ctl_context *ctx)
710 ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_bridges);
712 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_name);
713 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_controller);
714 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_fail_mode);
715 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_ports);
717 ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_name);
718 ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_fake_bridge);
719 ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_tag);
720 ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_interfaces);
722 ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_name);
724 ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_ofport);
728 vsctl_context_populate_cache(struct ctl_context *ctx)
730 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
731 const struct ovsrec_open_vswitch *ovs = vsctl_ctx->ovs;
732 struct sset bridges, ports;
735 if (vsctl_ctx->cache_valid) {
736 /* Cache is already populated. */
739 vsctl_ctx->cache_valid = true;
740 shash_init(&vsctl_ctx->bridges);
741 shash_init(&vsctl_ctx->ports);
742 shash_init(&vsctl_ctx->ifaces);
746 for (i = 0; i < ovs->n_bridges; i++) {
747 struct ovsrec_bridge *br_cfg = ovs->bridges[i];
748 struct vsctl_bridge *br;
751 if (!sset_add(&bridges, br_cfg->name)) {
752 VLOG_WARN("%s: database contains duplicate bridge name",
756 br = add_bridge_to_cache(vsctl_ctx, br_cfg, br_cfg->name, NULL, 0);
758 for (j = 0; j < br_cfg->n_ports; j++) {
759 struct ovsrec_port *port_cfg = br_cfg->ports[j];
761 if (!sset_add(&ports, port_cfg->name)) {
762 /* Duplicate port name. (We will warn about that later.) */
766 if (port_is_fake_bridge(port_cfg)
767 && sset_add(&bridges, port_cfg->name)) {
768 add_bridge_to_cache(vsctl_ctx, NULL, port_cfg->name, br,
773 sset_destroy(&bridges);
774 sset_destroy(&ports);
777 for (i = 0; i < ovs->n_bridges; i++) {
778 struct ovsrec_bridge *br_cfg = ovs->bridges[i];
779 struct vsctl_bridge *br;
782 if (!sset_add(&bridges, br_cfg->name)) {
785 br = shash_find_data(&vsctl_ctx->bridges, br_cfg->name);
786 for (j = 0; j < br_cfg->n_ports; j++) {
787 struct ovsrec_port *port_cfg = br_cfg->ports[j];
788 struct vsctl_port *port;
791 port = shash_find_data(&vsctl_ctx->ports, port_cfg->name);
793 if (port_cfg == port->port_cfg) {
794 VLOG_WARN("%s: port is in multiple bridges (%s and %s)",
795 port_cfg->name, br->name, port->bridge->name);
797 /* Log as an error because this violates the database's
798 * uniqueness constraints, so the database server shouldn't
799 * have allowed it. */
800 VLOG_ERR("%s: database contains duplicate port name",
806 if (port_is_fake_bridge(port_cfg)
807 && !sset_add(&bridges, port_cfg->name)) {
811 port = add_port_to_cache(vsctl_ctx, br, port_cfg);
812 for (k = 0; k < port_cfg->n_interfaces; k++) {
813 struct ovsrec_interface *iface_cfg = port_cfg->interfaces[k];
814 struct vsctl_iface *iface;
816 iface = shash_find_data(&vsctl_ctx->ifaces, iface_cfg->name);
818 if (iface_cfg == iface->iface_cfg) {
819 VLOG_WARN("%s: interface is in multiple ports "
822 iface->port->port_cfg->name,
823 port->port_cfg->name);
825 /* Log as an error because this violates the database's
826 * uniqueness constraints, so the database server
827 * shouldn't have allowed it. */
828 VLOG_ERR("%s: database contains duplicate interface "
829 "name", iface_cfg->name);
834 add_iface_to_cache(vsctl_ctx, port, iface_cfg);
838 sset_destroy(&bridges);
842 check_conflicts(struct vsctl_context *vsctl_ctx, const char *name,
845 struct vsctl_iface *iface;
846 struct vsctl_port *port;
848 verify_ports(vsctl_ctx);
850 if (shash_find(&vsctl_ctx->bridges, name)) {
851 ctl_fatal("%s because a bridge named %s already exists",
855 port = shash_find_data(&vsctl_ctx->ports, name);
857 ctl_fatal("%s because a port named %s already exists on "
858 "bridge %s", msg, name, port->bridge->name);
861 iface = shash_find_data(&vsctl_ctx->ifaces, name);
863 ctl_fatal("%s because an interface named %s already exists "
864 "on bridge %s", msg, name, iface->port->bridge->name);
870 static struct vsctl_bridge *
871 find_bridge(struct vsctl_context *vsctl_ctx, const char *name, bool must_exist)
873 struct vsctl_bridge *br;
875 ovs_assert(vsctl_ctx->cache_valid);
877 br = shash_find_data(&vsctl_ctx->bridges, name);
878 if (must_exist && !br) {
879 ctl_fatal("no bridge named %s", name);
881 ovsrec_open_vswitch_verify_bridges(vsctl_ctx->ovs);
885 static struct vsctl_bridge *
886 find_real_bridge(struct vsctl_context *vsctl_ctx,
887 const char *name, bool must_exist)
889 struct vsctl_bridge *br = find_bridge(vsctl_ctx, name, must_exist);
890 if (br && br->parent) {
891 ctl_fatal("%s is a fake bridge", name);
896 static struct vsctl_port *
897 find_port(struct vsctl_context *vsctl_ctx, const char *name, bool must_exist)
899 struct vsctl_port *port;
901 ovs_assert(vsctl_ctx->cache_valid);
903 port = shash_find_data(&vsctl_ctx->ports, name);
904 if (port && !strcmp(name, port->bridge->name)) {
907 if (must_exist && !port) {
908 ctl_fatal("no port named %s", name);
910 verify_ports(vsctl_ctx);
914 static struct vsctl_iface *
915 find_iface(struct vsctl_context *vsctl_ctx, const char *name, bool must_exist)
917 struct vsctl_iface *iface;
919 ovs_assert(vsctl_ctx->cache_valid);
921 iface = shash_find_data(&vsctl_ctx->ifaces, name);
922 if (iface && !strcmp(name, iface->port->bridge->name)) {
925 if (must_exist && !iface) {
926 ctl_fatal("no interface named %s", name);
928 verify_ports(vsctl_ctx);
933 bridge_insert_port(struct ovsrec_bridge *br, struct ovsrec_port *port)
935 struct ovsrec_port **ports;
938 ports = xmalloc(sizeof *br->ports * (br->n_ports + 1));
939 for (i = 0; i < br->n_ports; i++) {
940 ports[i] = br->ports[i];
942 ports[br->n_ports] = port;
943 ovsrec_bridge_set_ports(br, ports, br->n_ports + 1);
948 bridge_delete_port(struct ovsrec_bridge *br, struct ovsrec_port *port)
950 struct ovsrec_port **ports;
953 ports = xmalloc(sizeof *br->ports * br->n_ports);
954 for (i = n = 0; i < br->n_ports; i++) {
955 if (br->ports[i] != port) {
956 ports[n++] = br->ports[i];
959 ovsrec_bridge_set_ports(br, ports, n);
964 ovs_insert_bridge(const struct ovsrec_open_vswitch *ovs,
965 struct ovsrec_bridge *bridge)
967 struct ovsrec_bridge **bridges;
970 bridges = xmalloc(sizeof *ovs->bridges * (ovs->n_bridges + 1));
971 for (i = 0; i < ovs->n_bridges; i++) {
972 bridges[i] = ovs->bridges[i];
974 bridges[ovs->n_bridges] = bridge;
975 ovsrec_open_vswitch_set_bridges(ovs, bridges, ovs->n_bridges + 1);
980 cmd_init(struct ctl_context *ctx OVS_UNUSED)
984 static struct cmd_show_table cmd_show_tables[] = {
985 {&ovsrec_table_open_vswitch,
987 {&ovsrec_open_vswitch_col_manager_options,
988 &ovsrec_open_vswitch_col_bridges,
989 &ovsrec_open_vswitch_col_ovs_version},
993 {&ovsrec_table_bridge,
994 &ovsrec_bridge_col_name,
995 {&ovsrec_bridge_col_controller,
996 &ovsrec_bridge_col_fail_mode,
997 &ovsrec_bridge_col_ports},
1001 {&ovsrec_table_port,
1002 &ovsrec_port_col_name,
1003 {&ovsrec_port_col_tag,
1004 &ovsrec_port_col_trunks,
1005 &ovsrec_port_col_interfaces},
1009 {&ovsrec_table_interface,
1010 &ovsrec_interface_col_name,
1011 {&ovsrec_interface_col_type,
1012 &ovsrec_interface_col_options,
1013 &ovsrec_interface_col_error},
1017 {&ovsrec_table_controller,
1018 &ovsrec_controller_col_target,
1019 {&ovsrec_controller_col_is_connected,
1025 {&ovsrec_table_manager,
1026 &ovsrec_manager_col_target,
1027 {&ovsrec_manager_col_is_connected,
1033 {NULL, NULL, {NULL, NULL, NULL}, {NULL, NULL, NULL}}
1037 pre_cmd_emer_reset(struct ctl_context *ctx)
1039 ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_manager_options);
1040 ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
1042 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_controller);
1043 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_fail_mode);
1044 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_mirrors);
1045 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_netflow);
1046 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_sflow);
1047 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_ipfix);
1048 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_flood_vlans);
1049 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_other_config);
1051 ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_other_config);
1053 ovsdb_idl_add_column(ctx->idl,
1054 &ovsrec_interface_col_ingress_policing_rate);
1055 ovsdb_idl_add_column(ctx->idl,
1056 &ovsrec_interface_col_ingress_policing_burst);
1060 cmd_emer_reset(struct ctl_context *ctx)
1062 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1063 const struct ovsdb_idl *idl = ctx->idl;
1064 const struct ovsrec_bridge *br;
1065 const struct ovsrec_port *port;
1066 const struct ovsrec_interface *iface;
1067 const struct ovsrec_mirror *mirror, *next_mirror;
1068 const struct ovsrec_controller *ctrl, *next_ctrl;
1069 const struct ovsrec_manager *mgr, *next_mgr;
1070 const struct ovsrec_netflow *nf, *next_nf;
1071 const struct ovsrec_ssl *ssl, *next_ssl;
1072 const struct ovsrec_sflow *sflow, *next_sflow;
1073 const struct ovsrec_ipfix *ipfix, *next_ipfix;
1074 const struct ovsrec_flow_sample_collector_set *fscset, *next_fscset;
1076 /* Reset the Open_vSwitch table. */
1077 ovsrec_open_vswitch_set_manager_options(vsctl_ctx->ovs, NULL, 0);
1078 ovsrec_open_vswitch_set_ssl(vsctl_ctx->ovs, NULL);
1080 OVSREC_BRIDGE_FOR_EACH (br, idl) {
1083 ovsrec_bridge_set_controller(br, NULL, 0);
1084 ovsrec_bridge_set_fail_mode(br, NULL);
1085 ovsrec_bridge_set_mirrors(br, NULL, 0);
1086 ovsrec_bridge_set_netflow(br, NULL);
1087 ovsrec_bridge_set_sflow(br, NULL);
1088 ovsrec_bridge_set_ipfix(br, NULL);
1089 ovsrec_bridge_set_flood_vlans(br, NULL, 0);
1091 /* We only want to save the "hwaddr" key from other_config. */
1092 hwaddr = smap_get(&br->other_config, "hwaddr");
1094 struct smap smap = SMAP_INITIALIZER(&smap);
1095 smap_add(&smap, "hwaddr", hwaddr);
1096 ovsrec_bridge_set_other_config(br, &smap);
1097 smap_destroy(&smap);
1099 ovsrec_bridge_set_other_config(br, NULL);
1103 OVSREC_PORT_FOR_EACH (port, idl) {
1104 ovsrec_port_set_other_config(port, NULL);
1107 OVSREC_INTERFACE_FOR_EACH (iface, idl) {
1108 /* xxx What do we do about gre/patch devices created by mgr? */
1110 ovsrec_interface_set_ingress_policing_rate(iface, 0);
1111 ovsrec_interface_set_ingress_policing_burst(iface, 0);
1114 OVSREC_MIRROR_FOR_EACH_SAFE (mirror, next_mirror, idl) {
1115 ovsrec_mirror_delete(mirror);
1118 OVSREC_CONTROLLER_FOR_EACH_SAFE (ctrl, next_ctrl, idl) {
1119 ovsrec_controller_delete(ctrl);
1122 OVSREC_MANAGER_FOR_EACH_SAFE (mgr, next_mgr, idl) {
1123 ovsrec_manager_delete(mgr);
1126 OVSREC_NETFLOW_FOR_EACH_SAFE (nf, next_nf, idl) {
1127 ovsrec_netflow_delete(nf);
1130 OVSREC_SSL_FOR_EACH_SAFE (ssl, next_ssl, idl) {
1131 ovsrec_ssl_delete(ssl);
1134 OVSREC_SFLOW_FOR_EACH_SAFE (sflow, next_sflow, idl) {
1135 ovsrec_sflow_delete(sflow);
1138 OVSREC_IPFIX_FOR_EACH_SAFE (ipfix, next_ipfix, idl) {
1139 ovsrec_ipfix_delete(ipfix);
1142 OVSREC_FLOW_SAMPLE_COLLECTOR_SET_FOR_EACH_SAFE (fscset, next_fscset, idl) {
1143 ovsrec_flow_sample_collector_set_delete(fscset);
1146 vsctl_context_invalidate_cache(ctx);
1150 cmd_add_br(struct ctl_context *ctx)
1152 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1153 bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
1154 const char *br_name, *parent_name;
1155 struct ovsrec_interface *iface;
1158 br_name = ctx->argv[1];
1159 if (ctx->argc == 2) {
1162 } else if (ctx->argc == 4) {
1163 parent_name = ctx->argv[2];
1164 vlan = atoi(ctx->argv[3]);
1165 if (vlan < 0 || vlan > 4095) {
1166 ctl_fatal("%s: vlan must be between 0 and 4095", ctx->argv[0]);
1169 ctl_fatal("'%s' command takes exactly 1 or 3 arguments",
1173 vsctl_context_populate_cache(ctx);
1175 struct vsctl_bridge *br;
1177 br = find_bridge(vsctl_ctx, br_name, false);
1181 ctl_fatal("\"--may-exist add-br %s\" but %s is "
1182 "a VLAN bridge for VLAN %d",
1183 br_name, br_name, br->vlan);
1187 ctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
1188 "is not a VLAN bridge",
1189 br_name, parent_name, vlan, br_name);
1190 } else if (strcmp(br->parent->name, parent_name)) {
1191 ctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
1192 "has the wrong parent %s",
1193 br_name, parent_name, vlan,
1194 br_name, br->parent->name);
1195 } else if (br->vlan != vlan) {
1196 ctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
1197 "is a VLAN bridge for the wrong VLAN %d",
1198 br_name, parent_name, vlan, br_name, br->vlan);
1204 check_conflicts(vsctl_ctx, br_name,
1205 xasprintf("cannot create a bridge named %s", br_name));
1208 struct ovsrec_port *port;
1209 struct ovsrec_bridge *br;
1211 iface = ovsrec_interface_insert(ctx->txn);
1212 ovsrec_interface_set_name(iface, br_name);
1213 ovsrec_interface_set_type(iface, "internal");
1215 port = ovsrec_port_insert(ctx->txn);
1216 ovsrec_port_set_name(port, br_name);
1217 ovsrec_port_set_interfaces(port, &iface, 1);
1219 br = ovsrec_bridge_insert(ctx->txn);
1220 ovsrec_bridge_set_name(br, br_name);
1221 ovsrec_bridge_set_ports(br, &port, 1);
1223 ovs_insert_bridge(vsctl_ctx->ovs, br);
1225 struct vsctl_bridge *conflict;
1226 struct vsctl_bridge *parent;
1227 struct ovsrec_port *port;
1228 struct ovsrec_bridge *br;
1231 parent = find_bridge(vsctl_ctx, parent_name, false);
1232 if (parent && parent->parent) {
1233 ctl_fatal("cannot create bridge with fake bridge as parent");
1236 ctl_fatal("parent bridge %s does not exist", parent_name);
1238 conflict = find_vlan_bridge(parent, vlan);
1240 ctl_fatal("bridge %s already has a child VLAN bridge %s "
1241 "on VLAN %d", parent_name, conflict->name, vlan);
1243 br = parent->br_cfg;
1245 iface = ovsrec_interface_insert(ctx->txn);
1246 ovsrec_interface_set_name(iface, br_name);
1247 ovsrec_interface_set_type(iface, "internal");
1249 port = ovsrec_port_insert(ctx->txn);
1250 ovsrec_port_set_name(port, br_name);
1251 ovsrec_port_set_interfaces(port, &iface, 1);
1252 ovsrec_port_set_fake_bridge(port, true);
1253 ovsrec_port_set_tag(port, &tag, 1);
1255 bridge_insert_port(br, port);
1258 post_db_reload_expect_iface(iface);
1259 vsctl_context_invalidate_cache(ctx);
1263 del_port(struct vsctl_context *vsctl_ctx, struct vsctl_port *port)
1265 struct vsctl_iface *iface, *next_iface;
1267 bridge_delete_port((port->bridge->parent
1268 ? port->bridge->parent->br_cfg
1269 : port->bridge->br_cfg), port->port_cfg);
1271 LIST_FOR_EACH_SAFE (iface, next_iface, ifaces_node, &port->ifaces) {
1272 del_cached_iface(vsctl_ctx, iface);
1274 del_cached_port(vsctl_ctx, port);
1278 del_bridge(struct vsctl_context *vsctl_ctx, struct vsctl_bridge *br)
1280 struct vsctl_bridge *child, *next_child;
1281 struct vsctl_port *port, *next_port;
1282 const struct ovsrec_flow_sample_collector_set *fscset, *next_fscset;
1284 HMAP_FOR_EACH_SAFE (child, next_child, children_node, &br->children) {
1285 del_bridge(vsctl_ctx, child);
1288 LIST_FOR_EACH_SAFE (port, next_port, ports_node, &br->ports) {
1289 del_port(vsctl_ctx, port);
1292 OVSREC_FLOW_SAMPLE_COLLECTOR_SET_FOR_EACH_SAFE (fscset, next_fscset,
1293 vsctl_ctx->base.idl) {
1294 if (fscset->bridge == br->br_cfg) {
1295 ovsrec_flow_sample_collector_set_delete(fscset);
1299 del_cached_bridge(vsctl_ctx, br);
1303 cmd_del_br(struct ctl_context *ctx)
1305 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1306 bool must_exist = !shash_find(&ctx->options, "--if-exists");
1307 struct vsctl_bridge *bridge;
1309 vsctl_context_populate_cache(ctx);
1310 bridge = find_bridge(vsctl_ctx, ctx->argv[1], must_exist);
1312 del_bridge(vsctl_ctx, bridge);
1317 output_sorted(struct svec *svec, struct ds *output)
1323 SVEC_FOR_EACH (i, name, svec) {
1324 ds_put_format(output, "%s\n", name);
1329 cmd_list_br(struct ctl_context *ctx)
1331 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1332 struct shash_node *node;
1333 struct svec bridges;
1334 bool real = shash_find(&ctx->options, "--real");
1335 bool fake = shash_find(&ctx->options, "--fake");
1337 /* If neither fake nor real were requested, return both. */
1338 if (!real && !fake) {
1342 vsctl_context_populate_cache(ctx);
1344 svec_init(&bridges);
1345 SHASH_FOR_EACH (node, &vsctl_ctx->bridges) {
1346 struct vsctl_bridge *br = node->data;
1348 if (br->parent ? fake : real) {
1349 svec_add(&bridges, br->name);
1352 output_sorted(&bridges, &ctx->output);
1353 svec_destroy(&bridges);
1357 cmd_br_exists(struct ctl_context *ctx)
1359 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1361 vsctl_context_populate_cache(ctx);
1362 if (!find_bridge(vsctl_ctx, ctx->argv[1], false)) {
1368 set_external_id(struct smap *old, struct smap *new,
1369 char *key, char *value)
1371 smap_clone(new, old);
1374 smap_replace(new, key, value);
1376 smap_remove(new, key);
1381 pre_cmd_br_set_external_id(struct ctl_context *ctx)
1384 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_external_ids);
1385 ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_external_ids);
1389 cmd_br_set_external_id(struct ctl_context *ctx)
1391 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1392 struct vsctl_bridge *bridge;
1395 vsctl_context_populate_cache(ctx);
1396 bridge = find_bridge(vsctl_ctx, ctx->argv[1], true);
1397 if (bridge->br_cfg) {
1399 set_external_id(&bridge->br_cfg->external_ids, &new, ctx->argv[2],
1400 ctx->argc >= 4 ? ctx->argv[3] : NULL);
1401 ovsrec_bridge_verify_external_ids(bridge->br_cfg);
1402 ovsrec_bridge_set_external_ids(bridge->br_cfg, &new);
1404 char *key = xasprintf("fake-bridge-%s", ctx->argv[2]);
1405 struct vsctl_port *port = shash_find_data(&vsctl_ctx->ports,
1407 set_external_id(&port->port_cfg->external_ids, &new,
1408 key, ctx->argc >= 4 ? ctx->argv[3] : NULL);
1409 ovsrec_port_verify_external_ids(port->port_cfg);
1410 ovsrec_port_set_external_ids(port->port_cfg, &new);
1417 get_external_id(struct smap *smap, const char *prefix, const char *key,
1421 char *prefix_key = xasprintf("%s%s", prefix, key);
1422 const char *value = smap_get(smap, prefix_key);
1425 ds_put_format(output, "%s\n", value);
1429 const struct smap_node **sorted = smap_sort(smap);
1430 size_t prefix_len = strlen(prefix);
1433 for (i = 0; i < smap_count(smap); i++) {
1434 const struct smap_node *node = sorted[i];
1435 if (!strncmp(node->key, prefix, prefix_len)) {
1436 ds_put_format(output, "%s=%s\n", node->key + prefix_len,
1445 pre_cmd_br_get_external_id(struct ctl_context *ctx)
1447 pre_cmd_br_set_external_id(ctx);
1451 cmd_br_get_external_id(struct ctl_context *ctx)
1453 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1454 struct vsctl_bridge *bridge;
1456 vsctl_context_populate_cache(ctx);
1458 bridge = find_bridge(vsctl_ctx, ctx->argv[1], true);
1459 if (bridge->br_cfg) {
1460 ovsrec_bridge_verify_external_ids(bridge->br_cfg);
1461 get_external_id(&bridge->br_cfg->external_ids, "",
1462 ctx->argc >= 3 ? ctx->argv[2] : NULL, &ctx->output);
1464 struct vsctl_port *port = shash_find_data(&vsctl_ctx->ports,
1466 ovsrec_port_verify_external_ids(port->port_cfg);
1467 get_external_id(&port->port_cfg->external_ids, "fake-bridge-",
1468 ctx->argc >= 3 ? ctx->argv[2] : NULL, &ctx->output);
1473 cmd_list_ports(struct ctl_context *ctx)
1475 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1476 struct vsctl_bridge *br;
1477 struct vsctl_port *port;
1480 vsctl_context_populate_cache(ctx);
1481 br = find_bridge(vsctl_ctx, ctx->argv[1], true);
1482 ovsrec_bridge_verify_ports(br->br_cfg ? br->br_cfg : br->parent->br_cfg);
1485 LIST_FOR_EACH (port, ports_node, &br->ports) {
1486 if (strcmp(port->port_cfg->name, br->name)) {
1487 svec_add(&ports, port->port_cfg->name);
1490 output_sorted(&ports, &ctx->output);
1491 svec_destroy(&ports);
1495 add_port(struct ctl_context *ctx,
1496 const char *br_name, const char *port_name,
1497 bool may_exist, bool fake_iface,
1498 char *iface_names[], int n_ifaces,
1499 char *settings[], int n_settings)
1501 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1502 struct vsctl_port *vsctl_port;
1503 struct vsctl_bridge *bridge;
1504 struct ovsrec_interface **ifaces;
1505 struct ovsrec_port *port;
1508 vsctl_context_populate_cache(ctx);
1510 struct vsctl_port *vsctl_port;
1512 vsctl_port = find_port(vsctl_ctx, port_name, false);
1514 struct svec want_names, have_names;
1516 svec_init(&want_names);
1517 for (i = 0; i < n_ifaces; i++) {
1518 svec_add(&want_names, iface_names[i]);
1520 svec_sort(&want_names);
1522 svec_init(&have_names);
1523 for (i = 0; i < vsctl_port->port_cfg->n_interfaces; i++) {
1524 svec_add(&have_names,
1525 vsctl_port->port_cfg->interfaces[i]->name);
1527 svec_sort(&have_names);
1529 if (strcmp(vsctl_port->bridge->name, br_name)) {
1530 char *command = vsctl_context_to_string(ctx);
1531 ctl_fatal("\"%s\" but %s is actually attached to bridge %s",
1532 command, port_name, vsctl_port->bridge->name);
1535 if (!svec_equal(&want_names, &have_names)) {
1536 char *have_names_string = svec_join(&have_names, ", ", "");
1537 char *command = vsctl_context_to_string(ctx);
1539 ctl_fatal("\"%s\" but %s actually has interface(s) %s",
1540 command, port_name, have_names_string);
1543 svec_destroy(&want_names);
1544 svec_destroy(&have_names);
1549 check_conflicts(vsctl_ctx, port_name,
1550 xasprintf("cannot create a port named %s", port_name));
1551 for (i = 0; i < n_ifaces; i++) {
1552 check_conflicts(vsctl_ctx, iface_names[i],
1553 xasprintf("cannot create an interface named %s",
1556 bridge = find_bridge(vsctl_ctx, br_name, true);
1558 ifaces = xmalloc(n_ifaces * sizeof *ifaces);
1559 for (i = 0; i < n_ifaces; i++) {
1560 ifaces[i] = ovsrec_interface_insert(ctx->txn);
1561 ovsrec_interface_set_name(ifaces[i], iface_names[i]);
1562 post_db_reload_expect_iface(ifaces[i]);
1565 port = ovsrec_port_insert(ctx->txn);
1566 ovsrec_port_set_name(port, port_name);
1567 ovsrec_port_set_interfaces(port, ifaces, n_ifaces);
1568 ovsrec_port_set_bond_fake_iface(port, fake_iface);
1570 if (bridge->parent) {
1571 int64_t tag = bridge->vlan;
1572 ovsrec_port_set_tag(port, &tag, 1);
1575 for (i = 0; i < n_settings; i++) {
1576 ctl_set_column("Port", &port->header_, settings[i],
1580 bridge_insert_port((bridge->parent ? bridge->parent->br_cfg
1581 : bridge->br_cfg), port);
1583 vsctl_port = add_port_to_cache(vsctl_ctx, bridge, port);
1584 for (i = 0; i < n_ifaces; i++) {
1585 add_iface_to_cache(vsctl_ctx, vsctl_port, ifaces[i]);
1591 cmd_add_port(struct ctl_context *ctx)
1593 bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
1595 add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, false,
1596 &ctx->argv[2], 1, &ctx->argv[3], ctx->argc - 3);
1600 cmd_add_bond(struct ctl_context *ctx)
1602 bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
1603 bool fake_iface = shash_find(&ctx->options, "--fake-iface");
1607 n_ifaces = ctx->argc - 3;
1608 for (i = 3; i < ctx->argc; i++) {
1609 if (strchr(ctx->argv[i], '=')) {
1615 ctl_fatal("add-bond requires at least 2 interfaces, but only "
1616 "%d were specified", n_ifaces);
1619 add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, fake_iface,
1620 &ctx->argv[3], n_ifaces,
1621 &ctx->argv[n_ifaces + 3], ctx->argc - 3 - n_ifaces);
1625 cmd_del_port(struct ctl_context *ctx)
1627 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1628 bool must_exist = !shash_find(&ctx->options, "--if-exists");
1629 bool with_iface = shash_find(&ctx->options, "--with-iface") != NULL;
1630 const char *target = ctx->argv[ctx->argc - 1];
1631 struct vsctl_port *port;
1633 vsctl_context_populate_cache(ctx);
1634 if (find_bridge(vsctl_ctx, target, false)) {
1636 ctl_fatal("cannot delete port %s because it is the local port "
1637 "for bridge %s (deleting this port requires deleting "
1638 "the entire bridge)", target, target);
1641 } else if (!with_iface) {
1642 port = find_port(vsctl_ctx, target, must_exist);
1644 struct vsctl_iface *iface;
1646 port = find_port(vsctl_ctx, target, false);
1648 iface = find_iface(vsctl_ctx, target, false);
1653 if (must_exist && !port) {
1654 ctl_fatal("no port or interface named %s", target);
1659 if (ctx->argc == 3) {
1660 struct vsctl_bridge *bridge;
1662 bridge = find_bridge(vsctl_ctx, ctx->argv[1], true);
1663 if (port->bridge != bridge) {
1664 if (port->bridge->parent == bridge) {
1665 ctl_fatal("bridge %s does not have a port %s (although "
1666 "its parent bridge %s does)",
1667 ctx->argv[1], ctx->argv[2],
1668 bridge->parent->name);
1670 ctl_fatal("bridge %s does not have a port %s",
1671 ctx->argv[1], ctx->argv[2]);
1676 del_port(vsctl_ctx, port);
1681 cmd_port_to_br(struct ctl_context *ctx)
1683 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1684 struct vsctl_port *port;
1686 vsctl_context_populate_cache(ctx);
1688 port = find_port(vsctl_ctx, ctx->argv[1], true);
1689 ds_put_format(&ctx->output, "%s\n", port->bridge->name);
1693 cmd_br_to_vlan(struct ctl_context *ctx)
1695 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1696 struct vsctl_bridge *bridge;
1698 vsctl_context_populate_cache(ctx);
1700 bridge = find_bridge(vsctl_ctx, ctx->argv[1], true);
1701 ds_put_format(&ctx->output, "%d\n", bridge->vlan);
1705 cmd_br_to_parent(struct ctl_context *ctx)
1707 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1708 struct vsctl_bridge *bridge;
1710 vsctl_context_populate_cache(ctx);
1712 bridge = find_bridge(vsctl_ctx, ctx->argv[1], true);
1713 if (bridge->parent) {
1714 bridge = bridge->parent;
1716 ds_put_format(&ctx->output, "%s\n", bridge->name);
1720 cmd_list_ifaces(struct ctl_context *ctx)
1722 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1723 struct vsctl_bridge *br;
1724 struct vsctl_port *port;
1727 vsctl_context_populate_cache(ctx);
1729 br = find_bridge(vsctl_ctx, ctx->argv[1], true);
1730 verify_ports(vsctl_ctx);
1733 LIST_FOR_EACH (port, ports_node, &br->ports) {
1734 struct vsctl_iface *iface;
1736 LIST_FOR_EACH (iface, ifaces_node, &port->ifaces) {
1737 if (strcmp(iface->iface_cfg->name, br->name)) {
1738 svec_add(&ifaces, iface->iface_cfg->name);
1742 output_sorted(&ifaces, &ctx->output);
1743 svec_destroy(&ifaces);
1747 cmd_iface_to_br(struct ctl_context *ctx)
1749 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1750 struct vsctl_iface *iface;
1752 vsctl_context_populate_cache(ctx);
1754 iface = find_iface(vsctl_ctx, ctx->argv[1], true);
1755 ds_put_format(&ctx->output, "%s\n", iface->port->bridge->name);
1759 verify_controllers(struct ovsrec_bridge *bridge)
1763 ovsrec_bridge_verify_controller(bridge);
1764 for (i = 0; i < bridge->n_controller; i++) {
1765 ovsrec_controller_verify_target(bridge->controller[i]);
1770 pre_controller(struct ctl_context *ctx)
1774 ovsdb_idl_add_column(ctx->idl, &ovsrec_controller_col_target);
1778 cmd_get_controller(struct ctl_context *ctx)
1780 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1781 struct vsctl_bridge *br;
1782 struct svec targets;
1785 vsctl_context_populate_cache(ctx);
1787 br = find_bridge(vsctl_ctx, ctx->argv[1], true);
1791 verify_controllers(br->br_cfg);
1793 /* Print the targets in sorted order for reproducibility. */
1794 svec_init(&targets);
1795 for (i = 0; i < br->br_cfg->n_controller; i++) {
1796 svec_add(&targets, br->br_cfg->controller[i]->target);
1799 svec_sort(&targets);
1800 for (i = 0; i < targets.n; i++) {
1801 ds_put_format(&ctx->output, "%s\n", targets.names[i]);
1803 svec_destroy(&targets);
1807 delete_controllers(struct ovsrec_controller **controllers,
1808 size_t n_controllers)
1812 for (i = 0; i < n_controllers; i++) {
1813 ovsrec_controller_delete(controllers[i]);
1818 cmd_del_controller(struct ctl_context *ctx)
1820 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1821 struct ovsrec_bridge *br;
1823 vsctl_context_populate_cache(ctx);
1825 br = find_real_bridge(vsctl_ctx, ctx->argv[1], true)->br_cfg;
1826 verify_controllers(br);
1828 if (br->controller) {
1829 delete_controllers(br->controller, br->n_controller);
1830 ovsrec_bridge_set_controller(br, NULL, 0);
1834 static struct ovsrec_controller **
1835 insert_controllers(struct ovsdb_idl_txn *txn, char *targets[], size_t n)
1837 struct ovsrec_controller **controllers;
1840 controllers = xmalloc(n * sizeof *controllers);
1841 for (i = 0; i < n; i++) {
1842 if (vconn_verify_name(targets[i]) && pvconn_verify_name(targets[i])) {
1843 VLOG_WARN("target type \"%s\" is possibly erroneous", targets[i]);
1845 controllers[i] = ovsrec_controller_insert(txn);
1846 ovsrec_controller_set_target(controllers[i], targets[i]);
1853 cmd_set_controller(struct ctl_context *ctx)
1855 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1856 struct ovsrec_controller **controllers;
1857 struct ovsrec_bridge *br;
1860 vsctl_context_populate_cache(ctx);
1862 br = find_real_bridge(vsctl_ctx, ctx->argv[1], true)->br_cfg;
1863 verify_controllers(br);
1865 delete_controllers(br->controller, br->n_controller);
1868 controllers = insert_controllers(ctx->txn, &ctx->argv[2], n);
1869 ovsrec_bridge_set_controller(br, controllers, n);
1874 cmd_get_fail_mode(struct ctl_context *ctx)
1876 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1877 struct vsctl_bridge *br;
1878 const char *fail_mode;
1880 vsctl_context_populate_cache(ctx);
1881 br = find_bridge(vsctl_ctx, ctx->argv[1], true);
1886 ovsrec_bridge_verify_fail_mode(br->br_cfg);
1888 fail_mode = br->br_cfg->fail_mode;
1889 if (fail_mode && strlen(fail_mode)) {
1890 ds_put_format(&ctx->output, "%s\n", fail_mode);
1895 cmd_del_fail_mode(struct ctl_context *ctx)
1897 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1898 struct vsctl_bridge *br;
1900 vsctl_context_populate_cache(ctx);
1902 br = find_real_bridge(vsctl_ctx, ctx->argv[1], true);
1904 ovsrec_bridge_set_fail_mode(br->br_cfg, NULL);
1908 cmd_set_fail_mode(struct ctl_context *ctx)
1910 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1911 struct vsctl_bridge *br;
1912 const char *fail_mode = ctx->argv[2];
1914 vsctl_context_populate_cache(ctx);
1916 br = find_real_bridge(vsctl_ctx, ctx->argv[1], true);
1918 if (strcmp(fail_mode, "standalone") && strcmp(fail_mode, "secure")) {
1919 ctl_fatal("fail-mode must be \"standalone\" or \"secure\"");
1922 ovsrec_bridge_set_fail_mode(br->br_cfg, fail_mode);
1926 verify_managers(const struct ovsrec_open_vswitch *ovs)
1930 ovsrec_open_vswitch_verify_manager_options(ovs);
1932 for (i = 0; i < ovs->n_manager_options; ++i) {
1933 const struct ovsrec_manager *mgr = ovs->manager_options[i];
1935 ovsrec_manager_verify_target(mgr);
1940 pre_manager(struct ctl_context *ctx)
1942 ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_manager_options);
1943 ovsdb_idl_add_column(ctx->idl, &ovsrec_manager_col_target);
1947 cmd_get_manager(struct ctl_context *ctx)
1949 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1950 const struct ovsrec_open_vswitch *ovs = vsctl_ctx->ovs;
1951 struct svec targets;
1954 verify_managers(ovs);
1956 /* Print the targets in sorted order for reproducibility. */
1957 svec_init(&targets);
1959 for (i = 0; i < ovs->n_manager_options; i++) {
1960 svec_add(&targets, ovs->manager_options[i]->target);
1963 svec_sort_unique(&targets);
1964 for (i = 0; i < targets.n; i++) {
1965 ds_put_format(&ctx->output, "%s\n", targets.names[i]);
1967 svec_destroy(&targets);
1971 delete_managers(const struct ovsrec_open_vswitch *ovs)
1975 /* Delete Manager rows pointed to by 'manager_options' column. */
1976 for (i = 0; i < ovs->n_manager_options; i++) {
1977 ovsrec_manager_delete(ovs->manager_options[i]);
1980 /* Delete 'Manager' row refs in 'manager_options' column. */
1981 ovsrec_open_vswitch_set_manager_options(ovs, NULL, 0);
1985 cmd_del_manager(struct ctl_context *ctx)
1987 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
1988 const struct ovsrec_open_vswitch *ovs = vsctl_ctx->ovs;
1990 verify_managers(ovs);
1991 delete_managers(ovs);
1995 insert_managers(struct vsctl_context *vsctl_ctx, char *targets[], size_t n)
1997 struct ovsrec_manager **managers;
2000 /* Insert each manager in a new row in Manager table. */
2001 managers = xmalloc(n * sizeof *managers);
2002 for (i = 0; i < n; i++) {
2003 if (stream_verify_name(targets[i]) && pstream_verify_name(targets[i])) {
2004 VLOG_WARN("target type \"%s\" is possibly erroneous", targets[i]);
2006 managers[i] = ovsrec_manager_insert(vsctl_ctx->base.txn);
2007 ovsrec_manager_set_target(managers[i], targets[i]);
2010 /* Store uuids of new Manager rows in 'manager_options' column. */
2011 ovsrec_open_vswitch_set_manager_options(vsctl_ctx->ovs, managers, n);
2016 cmd_set_manager(struct ctl_context *ctx)
2018 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
2019 const size_t n = ctx->argc - 1;
2021 verify_managers(vsctl_ctx->ovs);
2022 delete_managers(vsctl_ctx->ovs);
2023 insert_managers(vsctl_ctx, &ctx->argv[1], n);
2027 pre_cmd_get_ssl(struct ctl_context *ctx)
2029 ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
2031 ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_private_key);
2032 ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_certificate);
2033 ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_ca_cert);
2034 ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_bootstrap_ca_cert);
2038 cmd_get_ssl(struct ctl_context *ctx)
2040 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
2041 struct ovsrec_ssl *ssl = vsctl_ctx->ovs->ssl;
2043 ovsrec_open_vswitch_verify_ssl(vsctl_ctx->ovs);
2045 ovsrec_ssl_verify_private_key(ssl);
2046 ovsrec_ssl_verify_certificate(ssl);
2047 ovsrec_ssl_verify_ca_cert(ssl);
2048 ovsrec_ssl_verify_bootstrap_ca_cert(ssl);
2050 ds_put_format(&ctx->output, "Private key: %s\n", ssl->private_key);
2051 ds_put_format(&ctx->output, "Certificate: %s\n", ssl->certificate);
2052 ds_put_format(&ctx->output, "CA Certificate: %s\n", ssl->ca_cert);
2053 ds_put_format(&ctx->output, "Bootstrap: %s\n",
2054 ssl->bootstrap_ca_cert ? "true" : "false");
2059 pre_cmd_del_ssl(struct ctl_context *ctx)
2061 ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
2065 cmd_del_ssl(struct ctl_context *ctx)
2067 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
2068 struct ovsrec_ssl *ssl = vsctl_ctx->ovs->ssl;
2071 ovsrec_open_vswitch_verify_ssl(vsctl_ctx->ovs);
2072 ovsrec_ssl_delete(ssl);
2073 ovsrec_open_vswitch_set_ssl(vsctl_ctx->ovs, NULL);
2078 pre_cmd_set_ssl(struct ctl_context *ctx)
2080 ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
2084 cmd_set_ssl(struct ctl_context *ctx)
2086 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
2087 bool bootstrap = shash_find(&ctx->options, "--bootstrap");
2088 struct ovsrec_ssl *ssl = vsctl_ctx->ovs->ssl;
2090 ovsrec_open_vswitch_verify_ssl(vsctl_ctx->ovs);
2092 ovsrec_ssl_delete(ssl);
2094 ssl = ovsrec_ssl_insert(ctx->txn);
2096 ovsrec_ssl_set_private_key(ssl, ctx->argv[1]);
2097 ovsrec_ssl_set_certificate(ssl, ctx->argv[2]);
2098 ovsrec_ssl_set_ca_cert(ssl, ctx->argv[3]);
2100 ovsrec_ssl_set_bootstrap_ca_cert(ssl, bootstrap);
2102 ovsrec_open_vswitch_set_ssl(vsctl_ctx->ovs, ssl);
2106 autoattach_insert_mapping(struct ovsrec_autoattach *aa,
2110 int64_t *key_mappings, *value_mappings;
2113 key_mappings = xmalloc(sizeof *aa->key_mappings * (aa->n_mappings + 1));
2114 value_mappings = xmalloc(sizeof *aa->value_mappings * (aa->n_mappings + 1));
2116 for (i = 0; i < aa->n_mappings; i++) {
2117 key_mappings[i] = aa->key_mappings[i];
2118 value_mappings[i] = aa->value_mappings[i];
2120 key_mappings[aa->n_mappings] = isid;
2121 value_mappings[aa->n_mappings] = vlan;
2123 ovsrec_autoattach_set_mappings(aa, key_mappings, value_mappings,
2124 aa->n_mappings + 1);
2127 free(value_mappings);
2131 cmd_add_aa_mapping(struct ctl_context *ctx)
2133 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
2134 struct vsctl_bridge *br;
2138 isid = strtoull(ctx->argv[2], &nptr, 10);
2139 if (nptr == ctx->argv[2] || nptr == NULL) {
2140 ctl_fatal("Invalid argument %s", ctx->argv[2]);
2144 vlan = strtoull(ctx->argv[3], &nptr, 10);
2145 if (nptr == ctx->argv[3] || nptr == NULL) {
2146 ctl_fatal("Invalid argument %s", ctx->argv[3]);
2150 vsctl_context_populate_cache(ctx);
2152 br = find_bridge(vsctl_ctx, ctx->argv[1], true);
2158 if (!br->br_cfg->auto_attach) {
2159 struct ovsrec_autoattach *aa = ovsrec_autoattach_insert(ctx->txn);
2160 ovsrec_bridge_set_auto_attach(br->br_cfg, aa);
2162 autoattach_insert_mapping(br->br_cfg->auto_attach, isid, vlan);
2167 del_aa_mapping(struct ovsrec_autoattach *aa,
2171 int64_t *key_mappings, *value_mappings;
2174 key_mappings = xmalloc(sizeof *aa->key_mappings * (aa->n_mappings));
2175 value_mappings = xmalloc(sizeof *value_mappings * (aa->n_mappings));
2177 for (i = n = 0; i < aa->n_mappings; i++) {
2178 if (aa->key_mappings[i] != isid && aa->value_mappings[i] != vlan) {
2179 key_mappings[n] = aa->key_mappings[i];
2180 value_mappings[n++] = aa->value_mappings[i];
2184 ovsrec_autoattach_set_mappings(aa, key_mappings, value_mappings, n);
2187 free(value_mappings);
2191 cmd_del_aa_mapping(struct ctl_context *ctx)
2193 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
2194 struct vsctl_bridge *br;
2198 isid = strtoull(ctx->argv[2], &nptr, 10);
2199 if (nptr == ctx->argv[2] || nptr == NULL) {
2200 ctl_fatal("Invalid argument %s", ctx->argv[2]);
2204 vlan = strtoull(ctx->argv[3], &nptr, 10);
2205 if (nptr == ctx->argv[3] || nptr == NULL) {
2206 ctl_fatal("Invalid argument %s", ctx->argv[3]);
2210 vsctl_context_populate_cache(ctx);
2212 br = find_bridge(vsctl_ctx, ctx->argv[1], true);
2217 if (br->br_cfg && br->br_cfg->auto_attach &&
2218 br->br_cfg->auto_attach->key_mappings &&
2219 br->br_cfg->auto_attach->value_mappings) {
2222 for (i = 0; i < br->br_cfg->auto_attach->n_mappings; i++) {
2223 if (br->br_cfg->auto_attach->key_mappings[i] == isid &&
2224 br->br_cfg->auto_attach->value_mappings[i] == vlan) {
2225 del_aa_mapping(br->br_cfg->auto_attach, isid, vlan);
2233 pre_aa_mapping(struct ctl_context *ctx)
2237 ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_auto_attach);
2238 ovsdb_idl_add_column(ctx->idl, &ovsrec_autoattach_col_mappings);
2242 verify_auto_attach(struct ovsrec_bridge *bridge)
2245 ovsrec_bridge_verify_auto_attach(bridge);
2247 if (bridge->auto_attach) {
2248 ovsrec_autoattach_verify_mappings(bridge->auto_attach);
2254 cmd_get_aa_mapping(struct ctl_context *ctx)
2256 struct vsctl_context *vsctl_ctx = vsctl_context_cast(ctx);
2257 struct vsctl_bridge *br;
2259 vsctl_context_populate_cache(ctx);
2261 br = find_bridge(vsctl_ctx, ctx->argv[1], true);
2266 verify_auto_attach(br->br_cfg);
2268 if (br->br_cfg && br->br_cfg->auto_attach &&
2269 br->br_cfg->auto_attach->key_mappings &&
2270 br->br_cfg->auto_attach->value_mappings) {
2273 for (i = 0; i < br->br_cfg->auto_attach->n_mappings; i++) {
2274 ds_put_format(&ctx->output, "%"PRId64" %"PRId64"\n",
2275 br->br_cfg->auto_attach->key_mappings[i],
2276 br->br_cfg->auto_attach->value_mappings[i]);
2282 static const struct ctl_table_class tables[] = {
2283 {&ovsrec_table_bridge,
2284 {{&ovsrec_table_bridge, &ovsrec_bridge_col_name, NULL},
2285 {&ovsrec_table_flow_sample_collector_set, NULL,
2286 &ovsrec_flow_sample_collector_set_col_bridge}}},
2288 {&ovsrec_table_controller,
2289 {{&ovsrec_table_bridge,
2290 &ovsrec_bridge_col_name,
2291 &ovsrec_bridge_col_controller}}},
2293 {&ovsrec_table_interface,
2294 {{&ovsrec_table_interface, &ovsrec_interface_col_name, NULL},
2295 {NULL, NULL, NULL}}},
2297 {&ovsrec_table_mirror,
2298 {{&ovsrec_table_mirror, &ovsrec_mirror_col_name, NULL},
2299 {NULL, NULL, NULL}}},
2301 {&ovsrec_table_manager,
2302 {{&ovsrec_table_manager, &ovsrec_manager_col_target, NULL},
2303 {NULL, NULL, NULL}}},
2305 {&ovsrec_table_netflow,
2306 {{&ovsrec_table_bridge,
2307 &ovsrec_bridge_col_name,
2308 &ovsrec_bridge_col_netflow},
2309 {NULL, NULL, NULL}}},
2311 {&ovsrec_table_open_vswitch,
2312 {{&ovsrec_table_open_vswitch, NULL, NULL},
2313 {NULL, NULL, NULL}}},
2315 {&ovsrec_table_port,
2316 {{&ovsrec_table_port, &ovsrec_port_col_name, NULL},
2317 {NULL, NULL, NULL}}},
2320 {{&ovsrec_table_port, &ovsrec_port_col_name, &ovsrec_port_col_qos},
2321 {NULL, NULL, NULL}}},
2323 {&ovsrec_table_queue,
2324 {{NULL, NULL, NULL},
2325 {NULL, NULL, NULL}}},
2328 {{&ovsrec_table_open_vswitch, NULL, &ovsrec_open_vswitch_col_ssl}}},
2330 {&ovsrec_table_sflow,
2331 {{&ovsrec_table_bridge,
2332 &ovsrec_bridge_col_name,
2333 &ovsrec_bridge_col_sflow},
2334 {NULL, NULL, NULL}}},
2336 {&ovsrec_table_flow_table,
2337 {{&ovsrec_table_flow_table, &ovsrec_flow_table_col_name, NULL},
2338 {NULL, NULL, NULL}}},
2340 {&ovsrec_table_ipfix,
2341 {{&ovsrec_table_bridge,
2342 &ovsrec_bridge_col_name,
2343 &ovsrec_bridge_col_ipfix},
2344 {&ovsrec_table_flow_sample_collector_set, NULL,
2345 &ovsrec_flow_sample_collector_set_col_ipfix}}},
2347 {&ovsrec_table_autoattach,
2348 {{&ovsrec_table_bridge,
2349 &ovsrec_bridge_col_name,
2350 &ovsrec_bridge_col_auto_attach},
2351 {NULL, NULL, NULL}}},
2353 {&ovsrec_table_flow_sample_collector_set,
2354 {{NULL, NULL, NULL},
2355 {NULL, NULL, NULL}}},
2357 {NULL, {{NULL, NULL, NULL}, {NULL, NULL, NULL}}}
2361 post_db_reload_check_init(void)
2363 n_neoteric_ifaces = 0;
2367 post_db_reload_expect_iface(const struct ovsrec_interface *iface)
2369 if (n_neoteric_ifaces >= allocated_neoteric_ifaces) {
2370 neoteric_ifaces = x2nrealloc(neoteric_ifaces,
2371 &allocated_neoteric_ifaces,
2372 sizeof *neoteric_ifaces);
2374 neoteric_ifaces[n_neoteric_ifaces++] = iface->header_.uuid;
2378 post_db_reload_do_checks(const struct vsctl_context *vsctl_ctx)
2380 struct ds dead_ifaces = DS_EMPTY_INITIALIZER;
2383 for (i = 0; i < n_neoteric_ifaces; i++) {
2384 const struct uuid *uuid;
2386 uuid = ovsdb_idl_txn_get_insert_uuid(vsctl_ctx->base.txn,
2387 &neoteric_ifaces[i]);
2389 const struct ovsrec_interface *iface;
2391 iface = ovsrec_interface_get_for_uuid(vsctl_ctx->base.idl, uuid);
2392 if (iface && (!iface->ofport || *iface->ofport == -1)) {
2393 ds_put_format(&dead_ifaces, "'%s', ", iface->name);
2398 if (dead_ifaces.length) {
2399 dead_ifaces.length -= 2; /* Strip off trailing comma and space. */
2400 ovs_error(0, "Error detected while setting up %s. See ovs-vswitchd "
2401 "log for details.", ds_cstr(&dead_ifaces));
2404 ds_destroy(&dead_ifaces);
2409 vsctl_context_init_command(struct vsctl_context *vsctl_ctx,
2410 struct ctl_command *command)
2412 ctl_context_init_command(&vsctl_ctx->base, command);
2413 vsctl_ctx->verified_ports = false;
2417 vsctl_context_init(struct vsctl_context *vsctl_ctx,
2418 struct ctl_command *command, struct ovsdb_idl *idl,
2419 struct ovsdb_idl_txn *txn,
2420 const struct ovsrec_open_vswitch *ovs,
2421 struct ovsdb_symbol_table *symtab)
2423 ctl_context_init(&vsctl_ctx->base, command, idl, txn, symtab,
2424 vsctl_context_invalidate_cache);
2426 vsctl_ctx->verified_ports = false;
2428 vsctl_ctx->ovs = ovs;
2429 vsctl_ctx->cache_valid = false;
2433 vsctl_context_done_command(struct vsctl_context *vsctl_ctx,
2434 struct ctl_command *command)
2436 ctl_context_done_command(&vsctl_ctx->base, command);
2440 vsctl_context_done(struct vsctl_context *vsctl_ctx,
2441 struct ctl_command *command)
2443 ctl_context_done(&vsctl_ctx->base, command);
2447 run_prerequisites(struct ctl_command *commands, size_t n_commands,
2448 struct ovsdb_idl *idl)
2450 struct ctl_command *c;
2452 ovsdb_idl_add_table(idl, &ovsrec_table_open_vswitch);
2453 if (wait_for_reload) {
2454 ovsdb_idl_add_column(idl, &ovsrec_open_vswitch_col_cur_cfg);
2456 for (c = commands; c < &commands[n_commands]; c++) {
2457 if (c->syntax->prerequisites) {
2458 struct vsctl_context vsctl_ctx;
2460 ds_init(&c->output);
2463 vsctl_context_init(&vsctl_ctx, c, idl, NULL, NULL, NULL);
2464 (c->syntax->prerequisites)(&vsctl_ctx.base);
2465 vsctl_context_done(&vsctl_ctx, c);
2467 ovs_assert(!c->output.string);
2468 ovs_assert(!c->table);
2474 do_vsctl(const char *args, struct ctl_command *commands, size_t n_commands,
2475 struct ovsdb_idl *idl)
2477 struct ovsdb_idl_txn *txn;
2478 const struct ovsrec_open_vswitch *ovs;
2479 enum ovsdb_idl_txn_status status;
2480 struct ovsdb_symbol_table *symtab;
2481 struct vsctl_context vsctl_ctx;
2482 struct ctl_command *c;
2483 struct shash_node *node;
2484 int64_t next_cfg = 0;
2487 txn = the_idl_txn = ovsdb_idl_txn_create(idl);
2489 ovsdb_idl_txn_set_dry_run(txn);
2492 ovsdb_idl_txn_add_comment(txn, "ovs-vsctl: %s", args);
2494 ovs = ovsrec_open_vswitch_first(idl);
2496 /* XXX add verification that table is empty */
2497 ovs = ovsrec_open_vswitch_insert(txn);
2500 if (wait_for_reload) {
2501 ovsdb_idl_txn_increment(txn, &ovs->header_,
2502 &ovsrec_open_vswitch_col_next_cfg);
2505 post_db_reload_check_init();
2506 symtab = ovsdb_symbol_table_create();
2507 for (c = commands; c < &commands[n_commands]; c++) {
2508 ds_init(&c->output);
2511 vsctl_context_init(&vsctl_ctx, NULL, idl, txn, ovs, symtab);
2512 for (c = commands; c < &commands[n_commands]; c++) {
2513 vsctl_context_init_command(&vsctl_ctx, c);
2514 if (c->syntax->run) {
2515 (c->syntax->run)(&vsctl_ctx.base);
2517 vsctl_context_done_command(&vsctl_ctx, c);
2519 if (vsctl_ctx.base.try_again) {
2520 vsctl_context_done(&vsctl_ctx, NULL);
2524 vsctl_context_done(&vsctl_ctx, NULL);
2526 SHASH_FOR_EACH (node, &symtab->sh) {
2527 struct ovsdb_symbol *symbol = node->data;
2528 if (!symbol->created) {
2529 ctl_fatal("row id \"%s\" is referenced but never created (e.g. "
2530 "with \"-- --id=%s create ...\")",
2531 node->name, node->name);
2533 if (!symbol->strong_ref) {
2534 if (!symbol->weak_ref) {
2535 VLOG_WARN("row id \"%s\" was created but no reference to it "
2536 "was inserted, so it will not actually appear in "
2537 "the database", node->name);
2539 VLOG_WARN("row id \"%s\" was created but only a weak "
2540 "reference to it was inserted, so it will not "
2541 "actually appear in the database", node->name);
2546 status = ovsdb_idl_txn_commit_block(txn);
2547 if (wait_for_reload && status == TXN_SUCCESS) {
2548 next_cfg = ovsdb_idl_txn_get_increment_new_value(txn);
2550 if (status == TXN_UNCHANGED || status == TXN_SUCCESS) {
2551 for (c = commands; c < &commands[n_commands]; c++) {
2552 if (c->syntax->postprocess) {
2553 vsctl_context_init(&vsctl_ctx, c, idl, txn, ovs, symtab);
2554 (c->syntax->postprocess)(&vsctl_ctx.base);
2555 vsctl_context_done(&vsctl_ctx, c);
2559 error = xstrdup(ovsdb_idl_txn_get_error(txn));
2562 case TXN_UNCOMMITTED:
2563 case TXN_INCOMPLETE:
2567 /* Should not happen--we never call ovsdb_idl_txn_abort(). */
2568 ctl_fatal("transaction aborted");
2578 ctl_fatal("transaction error: %s", error);
2580 case TXN_NOT_LOCKED:
2581 /* Should not happen--we never call ovsdb_idl_set_lock(). */
2582 ctl_fatal("database not locked");
2589 ovsdb_symbol_table_destroy(symtab);
2591 for (c = commands; c < &commands[n_commands]; c++) {
2592 struct ds *ds = &c->output;
2595 table_print(c->table, &table_style);
2596 } else if (oneline) {
2600 for (j = 0; j < ds->length; j++) {
2601 int ch = ds->string[j];
2604 fputs("\\n", stdout);
2608 fputs("\\\\", stdout);
2617 fputs(ds_cstr(ds), stdout);
2619 ds_destroy(&c->output);
2620 table_destroy(c->table);
2623 shash_destroy_free_data(&c->options);
2627 if (wait_for_reload && status != TXN_UNCHANGED) {
2628 /* Even, if --retry flag was not specified, ovs-vsctl still
2629 * has to retry to establish OVSDB connection, if wait_for_reload
2630 * was set. Otherwise, ovs-vsctl would end up waiting forever
2631 * until cur_cfg would be updated. */
2632 ovsdb_idl_enable_reconnect(idl);
2635 OVSREC_OPEN_VSWITCH_FOR_EACH (ovs, idl) {
2636 if (ovs->cur_cfg >= next_cfg) {
2637 post_db_reload_do_checks(&vsctl_ctx);
2641 ovsdb_idl_wait(idl);
2646 ovsdb_idl_txn_destroy(txn);
2647 ovsdb_idl_destroy(idl);
2652 /* Our transaction needs to be rerun, or a prerequisite was not met. Free
2653 * resources and return so that the caller can try again. */
2655 ovsdb_idl_txn_abort(txn);
2656 ovsdb_idl_txn_destroy(txn);
2659 ovsdb_symbol_table_destroy(symtab);
2660 for (c = commands; c < &commands[n_commands]; c++) {
2661 ds_destroy(&c->output);
2662 table_destroy(c->table);
2668 /* Frees the current transaction and the underlying IDL and then calls
2671 * Freeing the transaction and the IDL is not strictly necessary, but it makes
2672 * for a clean memory leak report from valgrind in the normal case. That makes
2673 * it easier to notice real memory leaks. */
2675 vsctl_exit(int status)
2678 ovsdb_idl_txn_abort(the_idl_txn);
2679 ovsdb_idl_txn_destroy(the_idl_txn);
2681 ovsdb_idl_destroy(the_idl);
2686 * Developers who add new commands to the 'struct ctl_command_syntax' must
2687 * define the 'arguments' member of the struct. The following keywords are
2688 * available for composing the argument format:
2690 * TABLE RECORD BRIDGE PARENT PORT
2691 * KEY VALUE ARG KEY=VALUE ?KEY=VALUE
2692 * IFACE SYSIFACE COLUMN COLUMN?:KEY COLUMN?:KEY=VALUE
2693 * MODE CA-CERT CERTIFICATE PRIVATE-KEY
2694 * TARGET NEW-* (e.g. NEW-PORT)
2696 * For argument types not listed above, just uses 'ARG' as place holder.
2698 * Encloses the keyword with '[]' if it is optional. Appends '...' to
2699 * keyword or enclosed keyword to indicate that the argument can be specified
2703 static const struct ctl_command_syntax vsctl_commands[] = {
2704 /* Open vSwitch commands. */
2705 {"init", 0, 0, "", NULL, cmd_init, NULL, "", RW},
2707 /* Bridge commands. */
2708 {"add-br", 1, 3, "NEW-BRIDGE [PARENT] [NEW-VLAN]", pre_get_info,
2709 cmd_add_br, NULL, "--may-exist", RW},
2710 {"del-br", 1, 1, "BRIDGE", pre_get_info, cmd_del_br,
2711 NULL, "--if-exists", RW},
2712 {"list-br", 0, 0, "", pre_get_info, cmd_list_br, NULL, "--real,--fake",
2714 {"br-exists", 1, 1, "BRIDGE", pre_get_info, cmd_br_exists, NULL, "", RO},
2715 {"br-to-vlan", 1, 1, "BRIDGE", pre_get_info, cmd_br_to_vlan, NULL, "",
2717 {"br-to-parent", 1, 1, "BRIDGE", pre_get_info, cmd_br_to_parent, NULL,
2719 {"br-set-external-id", 2, 3, "BRIDGE KEY [VALUE]",
2720 pre_cmd_br_set_external_id, cmd_br_set_external_id, NULL, "", RW},
2721 {"br-get-external-id", 1, 2, "BRIDGE [KEY]", pre_cmd_br_get_external_id,
2722 cmd_br_get_external_id, NULL, "", RO},
2724 /* Port commands. */
2725 {"list-ports", 1, 1, "BRIDGE", pre_get_info, cmd_list_ports, NULL, "",
2727 {"add-port", 2, INT_MAX, "BRIDGE NEW-PORT [COLUMN[:KEY]=VALUE]...",
2728 pre_get_info, cmd_add_port, NULL, "--may-exist", RW},
2729 {"add-bond", 4, INT_MAX,
2730 "BRIDGE NEW-BOND-PORT SYSIFACE... [COLUMN[:KEY]=VALUE]...", pre_get_info,
2731 cmd_add_bond, NULL, "--may-exist,--fake-iface", RW},
2732 {"del-port", 1, 2, "[BRIDGE] PORT|IFACE", pre_get_info, cmd_del_port, NULL,
2733 "--if-exists,--with-iface", RW},
2734 {"port-to-br", 1, 1, "PORT", pre_get_info, cmd_port_to_br, NULL, "", RO},
2736 /* Interface commands. */
2737 {"list-ifaces", 1, 1, "BRIDGE", pre_get_info, cmd_list_ifaces, NULL, "",
2739 {"iface-to-br", 1, 1, "IFACE", pre_get_info, cmd_iface_to_br, NULL, "",
2742 /* Controller commands. */
2743 {"get-controller", 1, 1, "BRIDGE", pre_controller, cmd_get_controller,
2745 {"del-controller", 1, 1, "BRIDGE", pre_controller, cmd_del_controller,
2747 {"set-controller", 1, INT_MAX, "BRIDGE TARGET...", pre_controller,
2748 cmd_set_controller, NULL, "", RW},
2749 {"get-fail-mode", 1, 1, "BRIDGE", pre_get_info, cmd_get_fail_mode, NULL,
2751 {"del-fail-mode", 1, 1, "BRIDGE", pre_get_info, cmd_del_fail_mode, NULL,
2753 {"set-fail-mode", 2, 2, "BRIDGE MODE", pre_get_info, cmd_set_fail_mode,
2756 /* Manager commands. */
2757 {"get-manager", 0, 0, "", pre_manager, cmd_get_manager, NULL, "", RO},
2758 {"del-manager", 0, 0, "", pre_manager, cmd_del_manager, NULL, "", RW},
2759 {"set-manager", 1, INT_MAX, "TARGET...", pre_manager, cmd_set_manager,
2763 {"get-ssl", 0, 0, "", pre_cmd_get_ssl, cmd_get_ssl, NULL, "", RO},
2764 {"del-ssl", 0, 0, "", pre_cmd_del_ssl, cmd_del_ssl, NULL, "", RW},
2765 {"set-ssl", 3, 3, "PRIVATE-KEY CERTIFICATE CA-CERT", pre_cmd_set_ssl,
2766 cmd_set_ssl, NULL, "--bootstrap", RW},
2768 /* Auto Attach commands. */
2769 {"add-aa-mapping", 3, 3, "BRIDGE ARG ARG", pre_aa_mapping, cmd_add_aa_mapping,
2771 {"del-aa-mapping", 3, 3, "BRIDGE ARG ARG", pre_aa_mapping, cmd_del_aa_mapping,
2773 {"get-aa-mapping", 1, 1, "BRIDGE", pre_aa_mapping, cmd_get_aa_mapping,
2776 /* Switch commands. */
2777 {"emer-reset", 0, 0, "", pre_cmd_emer_reset, cmd_emer_reset, NULL, "", RW},
2779 {NULL, 0, 0, NULL, NULL, NULL, NULL, NULL, RO},
2782 /* Registers vsctl and common db commands. */
2784 vsctl_cmd_init(void)
2786 ctl_init(tables, cmd_show_tables, vsctl_exit);
2787 ctl_register_commands(vsctl_commands);