bird/conf/confbase.Y

390 lines
8.8 KiB
Text
Raw Permalink Normal View History

1998-11-28 03:36:06 +08:00
/*
* BIRD -- Configuration Parser Top
*
* (c) 1998--2000 Martin Mares <mj@ucw.cz>
1998-11-28 03:36:06 +08:00
*
* Can be freely distributed and used under the terms of the GNU GPL.
*/
CF_HDR
#define PARSER 1
1998-11-28 03:36:06 +08:00
#include "nest/bird.h"
#include "conf/conf.h"
#include "lib/resource.h"
#include "lib/socket.h"
#include "lib/timer.h"
#include "lib/string.h"
#include "nest/protocol.h"
#include "nest/iface.h"
#include "nest/route.h"
#include "nest/bfd.h"
#include "nest/cli.h"
#include "filter/filter.h"
1998-11-28 03:36:06 +08:00
/* FIXME: Turn on YYERROR_VERBOSE and work around lots of bison bugs? */
CF_DEFINES
static void
check_u16(uint val)
{
if (val > 0xFFFF)
cf_error("Value %u out of range (0-65535)", val);
}
#define cf_assert(cond, ...) do { if (!(cond)) cf_error(__VA_ARGS__); } while (0)
static inline void cf_assert_symbol(const struct symbol *sym, uint class) {
switch (class) {
case SYM_PROTO: cf_assert(sym->class == SYM_PROTO, "Protocol name required"); break;
case SYM_TEMPLATE: cf_assert(sym->class == SYM_TEMPLATE, "Protocol template name required"); break;
case SYM_FUNCTION: cf_assert(sym->class == SYM_FUNCTION, "Function name required"); break;
case SYM_FILTER: cf_assert(sym->class == SYM_FILTER, "Filter name required"); break;
case SYM_TABLE: cf_assert(sym->class == SYM_TABLE, "Table name required"); break;
case SYM_ATTRIBUTE: cf_assert(sym->class == SYM_ATTRIBUTE, "Custom attribute name required"); break;
case SYM_VARIABLE: cf_assert((sym->class & ~0xff) == SYM_VARIABLE, "Variable name required"); break;
case SYM_CONSTANT: cf_assert((sym->class & ~0xff) == SYM_CONSTANT, "Constant name required"); break;
default: bug("This shall not happen");
}
}
1998-11-28 03:36:06 +08:00
CF_DECLS
%union {
uint i;
u32 i32;
u64 i64;
1998-11-28 03:36:06 +08:00
ip_addr a;
ip4_addr ip4;
ip6_addr ip6;
2015-12-24 22:52:03 +08:00
net_addr net;
net_addr *net_ptr;
1998-11-28 03:36:06 +08:00
struct symbol *s;
const char *t;
struct rtable_config *r;
struct channel_config *cc;
struct channel *c;
struct f_inst *x;
2019-07-03 07:23:49 +08:00
struct {
struct f_inst *begin, *end;
} xp;
enum filter_return fret;
enum ec_subtype ecs;
struct f_dynamic_attr fda;
struct f_static_attr fsa;
struct f_lval flv;
struct f_line *fl;
const struct filter *f;
struct f_tree *e;
struct f_trie *trie;
struct f_val v;
1999-05-26 22:24:32 +08:00
struct password_item *p;
struct rt_show_data *ra;
struct sym_show_data *sd;
struct lsadb_show_data *ld;
struct mrt_dump_data *md;
struct iface *iface;
void *g;
btime time;
struct f_prefix px;
struct proto_spec ps;
struct channel_limit cl;
2010-02-03 07:19:24 +08:00
struct timeformat *tf;
mpls_label_stack *mls;
struct bytestring *bs;
1998-11-28 03:36:06 +08:00
}
%token END CLI_MARKER INVALID_TOKEN ELSECOL DDOT
2000-06-01 16:43:29 +08:00
%token GEQ LEQ NEQ AND OR
2009-03-14 19:43:10 +08:00
%token PO PC
1999-11-15 19:35:41 +08:00
%token <i> NUM ENUM
%token <ip4> IP4
%token <ip6> IP6
%token <i64> VPN_RD
%token <s> CF_SYM_KNOWN CF_SYM_UNDEFINED
1998-11-28 03:36:06 +08:00
%token <t> TEXT
%token <bs> BYTESTRING
%type <iface> ipa_scope
1998-11-28 03:36:06 +08:00
2015-12-24 22:52:03 +08:00
%type <i> expr bool pxlen4
%type <time> expr_us time
2015-12-24 22:52:03 +08:00
%type <a> ipa
%type <net> net_ip4_ net_ip6_ net_ip6 net_ip_ net_ip net_or_ipa
%type <net_ptr> net_ net_any net_vpn4_ net_vpn6_ net_vpn_ net_roa4_ net_roa6_ net_roa_ net_ip6_sadr_ net_mpls_
%type <mls> label_stack_start label_stack
%type <t> text opttext
%type <s> symbol
2000-05-16 22:24:33 +08:00
%nonassoc PREFIX_DUMMY
2010-01-28 06:45:36 +08:00
%left AND OR
2016-09-20 21:13:01 +08:00
%nonassoc '=' '<' '>' '~' GEQ LEQ NEQ NMA PO PC
2010-01-28 06:45:36 +08:00
%left '+' '-'
%left '*' '/' '%'
%left '!'
%nonassoc '.'
%start config
CF_KEYWORDS(DEFINE, ON, OFF, YES, NO, S, MS, US, PORT, VPN, MPLS, FROM)
1998-11-28 03:36:06 +08:00
CF_GRAMMAR
/* Basic config file structure */
config: conf_entries END { return 0; }
1999-11-17 20:00:21 +08:00
| CLI_MARKER cli_cmd { return 0; }
1998-11-28 03:36:06 +08:00
;
conf_entries:
/* EMPTY */
| conf_entries conf
1998-11-28 03:36:06 +08:00
;
2018-06-26 20:29:03 +08:00
conf: ';' ;
1998-11-28 03:36:06 +08:00
/* Constant expressions */
2018-06-26 20:29:03 +08:00
conf: definition ;
definition:
2019-07-30 20:28:40 +08:00
DEFINE symbol '=' term ';' {
struct f_val *val = cfg_allocz(sizeof(struct f_val));
if (f_eval(f_linearize($4), cfg_mem, val) > F_RETURN) cf_error("Runtime error");
cf_define_symbol($2, SYM_CONSTANT | val->type, val, val);
}
;
expr:
NUM
| '(' term ')' { $$ = f_eval_int(f_linearize($2)); }
| CF_SYM_KNOWN {
if ($1->class != (SYM_CONSTANT | T_INT)) cf_error("Number constant expected");
$$ = SYM_VAL($1).i; }
;
expr_us:
expr S { $$ = $1 S_; }
| expr MS { $$ = $1 MS_; }
| expr US { $$ = $1 US_; }
;
2019-07-30 20:28:40 +08:00
symbol: CF_SYM_UNDEFINED | CF_SYM_KNOWN ;
/* Switches */
bool:
2016-11-09 00:46:29 +08:00
expr { $$ = !!$1; }
| ON { $$ = 1; }
| YES { $$ = 1; }
| OFF { $$ = 0; }
| NO { $$ = 0; }
| /* Silence means agreement */ { $$ = 1; }
;
2015-12-24 22:52:03 +08:00
/* Addresses */
ipa:
2015-12-24 22:52:03 +08:00
IP4 { $$ = ipa_from_ip4($1); }
| IP6 { $$ = ipa_from_ip6($1); }
| CF_SYM_KNOWN {
if ($1->class != (SYM_CONSTANT | T_IP)) cf_error("IP address constant expected");
$$ = SYM_VAL($1).ip;
}
;
ipa_scope:
/* empty */ { $$ = NULL; }
| '%' symbol { $$ = if_get_by_name($2->name); }
;
2015-12-24 22:52:03 +08:00
/* Networks - internal */
2015-12-24 22:52:03 +08:00
pxlen4:
'/' NUM {
if ($2 > IP4_MAX_PREFIX_LENGTH) cf_error("Invalid prefix length %u", $2);
2015-12-24 22:52:03 +08:00
$$ = $2;
}
;
2015-12-24 22:52:03 +08:00
net_ip4_: IP4 pxlen4
{
net_fill_ip4(&($$), $1, $2);
net_addr_ip4 *n = (void *) &($$);
if (!net_validate_ip4(n))
cf_error("Invalid IPv4 prefix %I4/%d, maybe you wanted %I4/%d",
n->prefix, n->pxlen, ip4_and(n->prefix, ip4_mkmask(n->pxlen)), n->pxlen);
2015-12-24 22:52:03 +08:00
};
2015-12-24 22:52:03 +08:00
net_ip6_: IP6 '/' NUM
{
if ($3 > IP6_MAX_PREFIX_LENGTH)
cf_error("Invalid prefix length %u", $3);
net_fill_ip6(&($$), $1, $3);
net_addr_ip6 *n = (void *) &($$);
if (!net_validate_ip6(n))
cf_error("Invalid IPv6 prefix %I6/%d, maybe you wanted %I6/%d",
n->prefix, n->pxlen, ip6_and(n->prefix, ip6_mkmask(n->pxlen)), n->pxlen);
2015-12-24 22:52:03 +08:00
};
net_ip6_sadr_: IP6 '/' NUM FROM IP6 '/' NUM
{
if ($3 > IP6_MAX_PREFIX_LENGTH)
cf_error("Invalid prefix length %u", $3);
if ($7 > IP6_MAX_PREFIX_LENGTH)
cf_error("Invalid prefix length %u", $7);
$$ = cfg_alloc(sizeof(net_addr_ip6_sadr));
net_fill_ip6_sadr($$, $1, $3, $5, $7);
net_addr_ip6_sadr *n = (void *) $$;
if (!net_validate_ip6_sadr(n))
cf_error("Invalid SADR IPv6 prefix %I6/%d from %I6/%d, maybe you wanted %I6/%d from %I6/%d",
n->dst_prefix, n->dst_pxlen, n->src_prefix, n->src_pxlen,
ip6_and(n->dst_prefix, ip6_mkmask(n->dst_pxlen)), n->dst_pxlen,
ip6_and(n->src_prefix, ip6_mkmask(n->src_pxlen)), n->src_pxlen);
};
net_vpn4_: VPN_RD net_ip4_
{
$$ = cfg_alloc(sizeof(net_addr_vpn4));
2017-02-20 09:26:45 +08:00
net_fill_vpn4($$, net4_prefix(&$2), net4_pxlen(&$2), $1);
}
net_vpn6_: VPN_RD net_ip6_
{
$$ = cfg_alloc(sizeof(net_addr_vpn6));
2017-02-20 09:26:45 +08:00
net_fill_vpn6($$, net6_prefix(&$2), net6_pxlen(&$2), $1);
}
net_roa4_: net_ip4_ MAX NUM AS NUM
{
$$ = cfg_alloc(sizeof(net_addr_roa4));
2016-05-12 22:04:47 +08:00
net_fill_roa4($$, net4_prefix(&$1), net4_pxlen(&$1), $3, $5);
if ($3 < net4_pxlen(&$1) || $3 > IP4_MAX_PREFIX_LENGTH)
cf_error("Invalid max prefix length %u", $3);
};
net_roa6_: net_ip6_ MAX NUM AS NUM
{
$$ = cfg_alloc(sizeof(net_addr_roa6));
2016-05-12 22:04:47 +08:00
net_fill_roa6($$, net6_prefix(&$1), net6_pxlen(&$1), $3, $5);
if ($3 < net6_pxlen(&$1) || $3 > IP6_MAX_PREFIX_LENGTH)
cf_error("Invalid max prefix length %u", $3);
};
2017-12-12 07:05:49 +08:00
net_mpls_: MPLS NUM
{
$$ = cfg_alloc(sizeof(net_addr_roa6));
net_fill_mpls($$, $2);
}
2015-12-24 22:52:03 +08:00
net_ip_: net_ip4_ | net_ip6_ ;
net_vpn_: net_vpn4_ | net_vpn6_ ;
2017-02-20 09:26:45 +08:00
net_roa_: net_roa4_ | net_roa6_ ;
net_:
net_ip_ { $$ = cfg_alloc($1.length); net_copy($$, &($1)); }
| net_vpn_
| net_roa_
| net_flow_
| net_ip6_sadr_
2017-12-12 07:05:49 +08:00
| net_mpls_
;
2015-12-24 22:52:03 +08:00
/* Networks - regular */
net_ip6:
net_ip6_
| CF_SYM_KNOWN {
2015-12-24 22:52:03 +08:00
if (($1->class != (SYM_CONSTANT | T_NET)) || (SYM_VAL($1).net->type != NET_IP6))
cf_error("IPv6 network constant expected");
2015-12-24 22:52:03 +08:00
$$ = * SYM_VAL($1).net;
}
2015-12-24 22:52:03 +08:00
;
net_ip:
net_ip_
| CF_SYM_KNOWN {
2015-12-24 22:52:03 +08:00
if (($1->class != (SYM_CONSTANT | T_NET)) || !net_is_ip(SYM_VAL($1).net))
cf_error("IP network constant expected");
2015-12-24 22:52:03 +08:00
$$ = * SYM_VAL($1).net;
}
;
2015-12-24 22:52:03 +08:00
net_any:
net_
| CF_SYM_KNOWN {
2015-12-24 22:52:03 +08:00
if ($1->class != (SYM_CONSTANT | T_NET))
cf_error("Network constant expected");
2015-12-24 22:52:03 +08:00
$$ = (net_addr *) SYM_VAL($1).net; /* Avoid const warning */
}
;
net_or_ipa:
net_ip4_
| net_ip6_
| IP4 { net_fill_ip4(&($$), $1, IP4_MAX_PREFIX_LENGTH); }
| IP6 { net_fill_ip6(&($$), $1, IP6_MAX_PREFIX_LENGTH); }
| CF_SYM_KNOWN {
2015-12-24 22:52:03 +08:00
if ($1->class == (SYM_CONSTANT | T_IP))
net_fill_ip_host(&($$), SYM_VAL($1).ip);
else if (($1->class == (SYM_CONSTANT | T_NET)) && net_is_ip(SYM_VAL($1).net))
$$ = * SYM_VAL($1).net;
else
cf_error("IP address or network constant expected");
}
;
label_stack_start: NUM
{
$$ = cfg_allocz(sizeof(mpls_label_stack));
$$->len = 1;
$$->stack[0] = $1;
};
label_stack:
label_stack_start
| label_stack '/' NUM {
if ($1->len >= MPLS_MAX_LABEL_STACK)
2017-02-20 09:26:45 +08:00
cf_error("Too many labels in stack");
$1->stack[$1->len++] = $3;
$$ = $1;
}
;
2015-12-24 22:52:03 +08:00
time:
TEXT {
$$ = tm_parse_time($1);
if (!$$)
cf_error("Invalid date/time");
}
1999-05-26 22:24:32 +08:00
;
text:
TEXT
| CF_SYM_KNOWN {
if ($1->class != (SYM_CONSTANT | T_STRING)) cf_error("String constant expected");
$$ = SYM_VAL($1).s;
}
;
opttext:
TEXT
| /* empty */ { $$ = NULL; }
;
1998-11-28 03:36:06 +08:00
CF_CODE
CF_END