blob: fbb270bd70d7db37b5ab01c90bc48f0bb1587c4f [file] [log] [blame]
Michal Vasko086311b2016-01-08 09:53:11 +01001/**
2 * \file session_client.c
3 * \author Michal Vasko <mvasko@cesnet.cz>
4 * \brief libnetconf2 session client functions
5 *
6 * Copyright (c) 2015 CESNET, z.s.p.o.
7 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +01008 * This source code is licensed under BSD 3-Clause License (the "License").
9 * You may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
Michal Vaskoafd416b2016-02-25 14:51:46 +010011 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +010012 * https://opensource.org/licenses/BSD-3-Clause
Michal Vasko086311b2016-01-08 09:53:11 +010013 */
14
15#include <assert.h>
16#include <errno.h>
17#include <fcntl.h>
18#include <netdb.h>
Radek Krejci4cf58ec2016-02-26 15:04:52 +010019#include <netinet/in.h>
Michal Vasko086311b2016-01-08 09:53:11 +010020#include <pthread.h>
21#include <stdlib.h>
22#include <string.h>
23#include <sys/socket.h>
24#include <sys/stat.h>
25#include <sys/types.h>
26#include <unistd.h>
27#include <arpa/inet.h>
28#include <poll.h>
29
30#include <libyang/libyang.h>
31
Michal Vasko086311b2016-01-08 09:53:11 +010032#include "libnetconf.h"
Michal Vasko1a38c862016-01-15 15:50:07 +010033#include "session_client.h"
Michal Vaskoa8ad4482016-01-28 14:25:54 +010034#include "messages_client.h"
Michal Vasko086311b2016-01-08 09:53:11 +010035
Michal Vasko80ef5d22016-01-18 09:21:02 +010036static const char *ncds2str[] = {NULL, "config", "url", "running", "startup", "candidate"};
37
Michal Vaskodaf9a092016-02-09 10:42:05 +010038struct nc_client_opts client_opts;
Michal Vasko086311b2016-01-08 09:53:11 +010039
40API int
Michal Vasko3031aae2016-01-27 16:07:18 +010041nc_client_schema_searchpath(const char *path)
Michal Vasko086311b2016-01-08 09:53:11 +010042{
Michal Vasko3031aae2016-01-27 16:07:18 +010043 if (client_opts.schema_searchpath) {
44 free(client_opts.schema_searchpath);
Michal Vasko086311b2016-01-08 09:53:11 +010045 }
Michal Vasko086311b2016-01-08 09:53:11 +010046
Michal Vasko7f1c78b2016-01-19 09:52:14 +010047 if (path) {
Michal Vasko3031aae2016-01-27 16:07:18 +010048 client_opts.schema_searchpath = strdup(path);
49 if (!client_opts.schema_searchpath) {
Michal Vasko7f1c78b2016-01-19 09:52:14 +010050 ERRMEM;
51 return 1;
52 }
53 } else {
Michal Vasko3031aae2016-01-27 16:07:18 +010054 client_opts.schema_searchpath = NULL;
Michal Vasko7f1c78b2016-01-19 09:52:14 +010055 }
56
57 return 0;
Michal Vasko086311b2016-01-08 09:53:11 +010058}
59
Michal Vasko3031aae2016-01-27 16:07:18 +010060/* SCHEMAS_DIR not used (implicitly) */
Michal Vasko086311b2016-01-08 09:53:11 +010061static int
62ctx_check_and_load_model(struct nc_session *session, const char *cpblt)
63{
64 const struct lys_module *module;
65 char *ptr, *ptr2;
66 char *model_name, *revision = NULL, *features = NULL;
67
68 /* parse module */
69 ptr = strstr(cpblt, "module=");
70 if (!ptr) {
Michal Vaskoef578332016-01-25 13:20:09 +010071 ERR("Unknown capability \"%s\" could not be parsed.", cpblt);
72 return -1;
Michal Vasko086311b2016-01-08 09:53:11 +010073 }
74 ptr += 7;
75 ptr2 = strchr(ptr, '&');
76 if (!ptr2) {
77 ptr2 = ptr + strlen(ptr);
78 }
79 model_name = strndup(ptr, ptr2 - ptr);
80
81 /* parse revision */
82 ptr = strstr(cpblt, "revision=");
83 if (ptr) {
84 ptr += 9;
85 ptr2 = strchr(ptr, '&');
86 if (!ptr2) {
87 ptr2 = ptr + strlen(ptr);
88 }
89 revision = strndup(ptr, ptr2 - ptr);
90 }
91
92 /* load module if needed */
93 module = ly_ctx_get_module(session->ctx, model_name, revision);
94 if (!module) {
95 module = ly_ctx_load_module(session->ctx, model_name, revision);
96 }
97
Michal Vasko086311b2016-01-08 09:53:11 +010098 free(revision);
99 if (!module) {
Michal Vaskoef578332016-01-25 13:20:09 +0100100 WRN("Failed to load model \"%s\".", model_name);
101 free(model_name);
Michal Vasko086311b2016-01-08 09:53:11 +0100102 return 1;
103 }
Michal Vaskoef578332016-01-25 13:20:09 +0100104 free(model_name);
Michal Vasko086311b2016-01-08 09:53:11 +0100105
106 /* parse features */
107 ptr = strstr(cpblt, "features=");
108 if (ptr) {
109 ptr += 9;
110 ptr2 = strchr(ptr, '&');
111 if (!ptr2) {
112 ptr2 = ptr + strlen(ptr);
113 }
114 features = strndup(ptr, ptr2 - ptr);
115 }
116
117 /* enable features */
118 if (features) {
119 /* basically manual strtok_r (to avoid macro) */
120 ptr2 = features;
121 for (ptr = features; *ptr; ++ptr) {
122 if (*ptr == ',') {
123 *ptr = '\0';
124 /* remember last feature */
125 ptr2 = ptr + 1;
126 }
127 }
128
129 ptr = features;
130 lys_features_enable(module, ptr);
131 while (ptr != ptr2) {
132 ptr += strlen(ptr) + 1;
133 lys_features_enable(module, ptr);
134 }
135
136 free(features);
137 }
138
139 return 0;
140}
141
Michal Vasko1aaa6602016-02-09 11:04:33 +0100142/* SCHEMAS_DIR used as the last resort */
Michal Vasko086311b2016-01-08 09:53:11 +0100143static int
Michal Vasko1aaa6602016-02-09 11:04:33 +0100144ctx_check_and_load_ietf_netconf(struct ly_ctx *ctx, const char **cpblts)
Michal Vasko086311b2016-01-08 09:53:11 +0100145{
146 int i;
147 const struct lys_module *ietfnc;
148
149 ietfnc = ly_ctx_get_module(ctx, "ietf-netconf", NULL);
150 if (!ietfnc) {
Michal Vasko1aaa6602016-02-09 11:04:33 +0100151 ietfnc = ly_ctx_load_module(ctx, "ietf-netconf", NULL);
152 if (!ietfnc) {
Michal Vasko086311b2016-01-08 09:53:11 +0100153 ietfnc = lys_parse_path(ctx, SCHEMAS_DIR"/ietf-netconf.yin", LYS_IN_YIN);
Michal Vasko086311b2016-01-08 09:53:11 +0100154 }
155 }
156 if (!ietfnc) {
157 ERR("Loading base NETCONF schema failed.");
158 return 1;
159 }
160
161 /* set supported capabilities from ietf-netconf */
162 for (i = 0; cpblts[i]; ++i) {
163 if (!strncmp(cpblts[i], "urn:ietf:params:netconf:capability:", 35)) {
164 if (!strncmp(cpblts[i] + 35, "writable-running", 16)) {
165 lys_features_enable(ietfnc, "writable-running");
166 } else if (!strncmp(cpblts[i] + 35, "candidate", 9)) {
167 lys_features_enable(ietfnc, "candidate");
168 } else if (!strcmp(cpblts[i] + 35, "confirmed-commit:1.1")) {
169 lys_features_enable(ietfnc, "confirmed-commit");
170 } else if (!strncmp(cpblts[i] + 35, "rollback-on-error", 17)) {
171 lys_features_enable(ietfnc, "rollback-on-error");
172 } else if (!strcmp(cpblts[i] + 35, "validate:1.1")) {
173 lys_features_enable(ietfnc, "validate");
174 } else if (!strncmp(cpblts[i] + 35, "startup", 7)) {
175 lys_features_enable(ietfnc, "startup");
176 } else if (!strncmp(cpblts[i] + 35, "url", 3)) {
177 lys_features_enable(ietfnc, "url");
178 } else if (!strncmp(cpblts[i] + 35, "xpath", 5)) {
179 lys_features_enable(ietfnc, "xpath");
180 }
181 }
182 }
183
184 return 0;
185}
186
187static char *
188libyang_module_clb(const char *name, const char *revision, void *user_data, LYS_INFORMAT *format,
189 void (**free_model_data)(char *model_data))
190{
191 struct nc_session *session = (struct nc_session *)user_data;
192 struct nc_rpc *rpc;
193 struct nc_reply *reply;
194 struct nc_reply_data *data_rpl;
195 NC_MSG_TYPE msg;
Michal Vaskoa4c23d82016-02-03 15:48:09 +0100196 char *model_data = NULL, *ptr, *ptr2, *anyxml = NULL;
Michal Vasko086311b2016-01-08 09:53:11 +0100197 uint64_t msgid;
198
199 /* TODO later replace with yang to reduce model size? */
Michal Vasko05ba9df2016-01-13 14:40:27 +0100200 rpc = nc_rpc_getschema(name, revision, "yin", NC_PARAMTYPE_CONST);
Michal Vasko086311b2016-01-08 09:53:11 +0100201 *format = LYS_IN_YIN;
202
203 while ((msg = nc_send_rpc(session, rpc, 0, &msgid)) == NC_MSG_WOULDBLOCK) {
204 usleep(1000);
205 }
206 if (msg == NC_MSG_ERROR) {
Michal Vaskod083db62016-01-19 10:31:29 +0100207 ERR("Session %u: failed to send the <get-schema> RPC.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100208 nc_rpc_free(rpc);
209 return NULL;
210 }
211
Michal Vaskoeb7080e2016-02-18 13:27:05 +0100212 msg = nc_recv_reply(session, rpc, msgid, 250, 0, &reply);
Michal Vasko086311b2016-01-08 09:53:11 +0100213 nc_rpc_free(rpc);
214 if (msg == NC_MSG_WOULDBLOCK) {
Michal Vaskod083db62016-01-19 10:31:29 +0100215 ERR("Session %u: timeout for receiving reply to a <get-schema> expired.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100216 return NULL;
217 } else if (msg == NC_MSG_ERROR) {
Michal Vaskod083db62016-01-19 10:31:29 +0100218 ERR("Session %u: failed to receive a reply to <get-schema>.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100219 return NULL;
220 }
221
Michal Vasko05ba9df2016-01-13 14:40:27 +0100222 if (reply->type != NC_RPL_DATA) {
223 /* TODO print the error, if error */
Michal Vaskod083db62016-01-19 10:31:29 +0100224 ERR("Session %u: unexpected reply type to a <get-schema> RPC.", session->id);
Michal Vasko05ba9df2016-01-13 14:40:27 +0100225 nc_reply_free(reply);
226 return NULL;
227 }
228
Michal Vasko086311b2016-01-08 09:53:11 +0100229 data_rpl = (struct nc_reply_data *)reply;
Michal Vaskoa4c23d82016-02-03 15:48:09 +0100230 lyxml_print_mem(&anyxml, ((struct lyd_node_anyxml *)data_rpl->data)->value, 0);
Michal Vasko086311b2016-01-08 09:53:11 +0100231 nc_reply_free(reply);
232 *free_model_data = NULL;
233
234 /* it's with the data root node, remove it */
235 if (anyxml) {
236 ptr = strchr(anyxml, '>');
237 ++ptr;
238
239 ptr2 = strrchr(anyxml, '<');
240
241 model_data = strndup(ptr, strlen(ptr) - strlen(ptr2));
242 free(anyxml);
243 }
244
245 return model_data;
246}
247
Michal Vaskoef578332016-01-25 13:20:09 +0100248/* return 0 - ok, 1 - some models failed to load, -1 - error */
Michal Vasko086311b2016-01-08 09:53:11 +0100249int
250nc_ctx_check_and_fill(struct nc_session *session)
251{
Michal Vaskoef578332016-01-25 13:20:09 +0100252 int i, get_schema_support = 0, ret = 0, r;
Michal Vasko086311b2016-01-08 09:53:11 +0100253 ly_module_clb old_clb = NULL;
254 void *old_data = NULL;
255
256 assert(session->cpblts && session->ctx);
257
258 /* check if get-schema is supported */
259 for (i = 0; session->cpblts[i]; ++i) {
260 if (!strncmp(session->cpblts[i], "urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring", 51)) {
261 get_schema_support = 1;
262 break;
263 }
264 }
265
266 /* get-schema is supported, load local ietf-netconf-monitoring so we can create <get-schema> RPCs */
267 if (get_schema_support && !ly_ctx_get_module(session->ctx, "ietf-netconf-monitoring", NULL)) {
268 if (lys_parse_path(session->ctx, SCHEMAS_DIR"/ietf-netconf-monitoring.yin", LYS_IN_YIN)) {
269 /* set module retrieval using <get-schema> */
270 old_clb = ly_ctx_get_module_clb(session->ctx, &old_data);
271 ly_ctx_set_module_clb(session->ctx, &libyang_module_clb, session);
272 } else {
273 WRN("Loading NETCONF monitoring schema failed, cannot use <get-schema>.");
274 }
275 }
276
277 /* load base model disregarding whether it's in capabilities (but NETCONF capabilities are used to enable features) */
Michal Vasko1aaa6602016-02-09 11:04:33 +0100278 if (ctx_check_and_load_ietf_netconf(session->ctx, session->cpblts)) {
Michal Vasko086311b2016-01-08 09:53:11 +0100279 if (old_clb) {
280 ly_ctx_set_module_clb(session->ctx, old_clb, old_data);
281 }
Michal Vaskoef578332016-01-25 13:20:09 +0100282 return -1;
Michal Vasko086311b2016-01-08 09:53:11 +0100283 }
284
285 /* load all other models */
286 for (i = 0; session->cpblts[i]; ++i) {
287 if (!strncmp(session->cpblts[i], "urn:ietf:params:netconf:capability", 34)
288 || !strncmp(session->cpblts[i], "urn:ietf:params:netconf:base", 28)) {
289 continue;
290 }
291
Michal Vaskoef578332016-01-25 13:20:09 +0100292 r = ctx_check_and_load_model(session, session->cpblts[i]);
293 if (r == -1) {
294 ret = -1;
295 break;
296 }
297
298 /* failed to load schema, but let's try to find it using user callback (or locally, if not set),
299 * if it was using get-schema */
300 if (r == 1) {
301 if (get_schema_support) {
302 VRB("Trying to load the schema from a different source.");
303 /* works even if old_clb is NULL */
304 ly_ctx_set_module_clb(session->ctx, old_clb, old_data);
305 r = ctx_check_and_load_model(session, session->cpblts[i]);
306 }
307
308 /* fail again (or no other way to try), too bad */
309 if (r) {
310 ret = 1;
311 }
312
313 /* set get-schema callback back */
314 ly_ctx_set_module_clb(session->ctx, &libyang_module_clb, session);
315 }
Michal Vasko086311b2016-01-08 09:53:11 +0100316 }
317
318 if (old_clb) {
319 ly_ctx_set_module_clb(session->ctx, old_clb, old_data);
320 }
Michal Vaskoef578332016-01-25 13:20:09 +0100321 if (ret == 1) {
322 WRN("Some models failed to be loaded, any data from these models will be ignored.");
323 }
324 return ret;
Michal Vasko086311b2016-01-08 09:53:11 +0100325}
326
327API struct nc_session *
328nc_connect_inout(int fdin, int fdout, struct ly_ctx *ctx)
329{
Michal Vaskod083db62016-01-19 10:31:29 +0100330 struct nc_session *session;
Michal Vasko086311b2016-01-08 09:53:11 +0100331
Michal Vaskod083db62016-01-19 10:31:29 +0100332 if ((fdin < 0) || (fdout < 0)) {
333 ERRARG;
Michal Vasko086311b2016-01-08 09:53:11 +0100334 return NULL;
335 }
336
337 /* prepare session structure */
338 session = calloc(1, sizeof *session);
339 if (!session) {
340 ERRMEM;
341 return NULL;
342 }
343 session->status = NC_STATUS_STARTING;
344 session->side = NC_CLIENT;
345
346 /* transport specific data */
347 session->ti_type = NC_TI_FD;
348 session->ti.fd.in = fdin;
349 session->ti.fd.out = fdout;
350
351 /* assign context (dicionary needed for handshake) */
352 if (!ctx) {
353 ctx = ly_ctx_new(SCHEMAS_DIR);
354 } else {
355 session->flags |= NC_SESSION_SHAREDCTX;
356 }
357 session->ctx = ctx;
358
359 /* NETCONF handshake */
360 if (nc_handshake(session)) {
361 goto fail;
362 }
363 session->status = NC_STATUS_RUNNING;
364
Michal Vaskoef578332016-01-25 13:20:09 +0100365 if (nc_ctx_check_and_fill(session) == -1) {
Michal Vasko086311b2016-01-08 09:53:11 +0100366 goto fail;
367 }
368
369 return session;
370
371fail:
Michal Vaskoe1a64ec2016-03-01 12:21:58 +0100372 nc_session_free(session, NULL);
Michal Vasko086311b2016-01-08 09:53:11 +0100373 return NULL;
374}
375
376int
Michal Vaskof05562c2016-01-20 12:06:43 +0100377nc_sock_connect(const char* host, uint16_t port)
Michal Vasko086311b2016-01-08 09:53:11 +0100378{
379 int i, sock = -1;
380 struct addrinfo hints, *res_list, *res;
381 char port_s[6]; /* length of string representation of short int */
382
383 snprintf(port_s, 6, "%u", port);
384
385 /* Connect to a server */
386 memset(&hints, 0, sizeof hints);
387 hints.ai_family = AF_UNSPEC;
388 hints.ai_socktype = SOCK_STREAM;
389 hints.ai_protocol = IPPROTO_TCP;
390 i = getaddrinfo(host, port_s, &hints, &res_list);
391 if (i != 0) {
392 ERR("Unable to translate the host address (%s).", gai_strerror(i));
393 return -1;
394 }
395
396 for (i = 0, res = res_list; res != NULL; res = res->ai_next) {
397 sock = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
398 if (sock == -1) {
399 /* socket was not created, try another resource */
400 i = errno;
401 goto errloop;
402 }
403
404 if (connect(sock, res->ai_addr, res->ai_addrlen) == -1) {
405 /* network connection failed, try another resource */
406 i = errno;
407 close(sock);
408 sock = -1;
409 goto errloop;
410 }
411
412 /* we're done, network connection established */
413 break;
414errloop:
415 VRB("Unable to connect to %s:%s over %s (%s).", host, port_s,
416 (res->ai_family == AF_INET6) ? "IPv6" : "IPv4", strerror(i));
417 continue;
418 }
419
420 if (sock == -1) {
421 ERR("Unable to connect to %s:%s.", host, port_s);
422 } else {
Michal Vaskod083db62016-01-19 10:31:29 +0100423 VRB("Successfully connected to %s:%s over %s.", host, port_s, (res->ai_family == AF_INET6) ? "IPv6" : "IPv4");
Michal Vasko086311b2016-01-08 09:53:11 +0100424 }
425 freeaddrinfo(res_list);
426
427 return sock;
428}
429
Michal Vasko086311b2016-01-08 09:53:11 +0100430static NC_MSG_TYPE
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100431get_msg(struct nc_session *session, int timeout, uint64_t msgid, struct lyxml_elem **msg)
Michal Vasko086311b2016-01-08 09:53:11 +0100432{
Michal Vasko2518b6b2016-01-28 13:24:53 +0100433 int r, elapsed = 0;
Michal Vasko086311b2016-01-08 09:53:11 +0100434 char *ptr;
435 const char *str_msgid;
436 uint64_t cur_msgid;
437 struct lyxml_elem *xml;
Michal Vasko2518b6b2016-01-28 13:24:53 +0100438 struct nc_msg_cont *cont, **cont_ptr;
Michal Vasko086311b2016-01-08 09:53:11 +0100439 NC_MSG_TYPE msgtype = 0; /* NC_MSG_ERROR */
440
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100441 r = nc_timedlock(session->ti_lock, timeout, &elapsed);
442 if (r == -1) {
Michal Vasko086311b2016-01-08 09:53:11 +0100443 /* error */
444 return NC_MSG_ERROR;
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100445 } else if (!r) {
Michal Vasko086311b2016-01-08 09:53:11 +0100446 /* timeout */
447 return NC_MSG_WOULDBLOCK;
448 }
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100449 if (timeout > 0) {
450 timeout -= elapsed;
451 }
Michal Vasko086311b2016-01-08 09:53:11 +0100452
453 /* try to get notification from the session's queue */
454 if (!msgid && session->notifs) {
455 cont = session->notifs;
456 session->notifs = cont->next;
457
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100458 pthread_mutex_unlock(session->ti_lock);
Michal Vasko086311b2016-01-08 09:53:11 +0100459
460 *msg = cont->msg;
461 free(cont);
462
463 return NC_MSG_NOTIF;
464 }
465
466 /* try to get rpc-reply from the session's queue */
467 if (msgid && session->replies) {
Michal Vasko2518b6b2016-01-28 13:24:53 +0100468 while (session->replies) {
469 cont = session->replies;
470 session->replies = cont->next;
471
Michal Vasko086311b2016-01-08 09:53:11 +0100472 str_msgid = lyxml_get_attr(cont->msg, "message-id", NULL);
473 cur_msgid = strtoul(str_msgid, &ptr, 10);
474
475 if (cur_msgid == msgid) {
Michal Vasko2518b6b2016-01-28 13:24:53 +0100476 session->replies = cont->next;
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100477 pthread_mutex_unlock(session->ti_lock);
Michal Vasko086311b2016-01-08 09:53:11 +0100478
479 *msg = cont->msg;
480 free(cont);
481
482 return NC_MSG_REPLY;
483 }
484
Michal Vasko2518b6b2016-01-28 13:24:53 +0100485 ERR("Session %u: discarding a <rpc-reply> with an unexpected message-id \"%s\".", str_msgid);
486 lyxml_free(session->ctx, cont->msg);
Michal Vaskob2d91072016-02-01 13:25:20 +0100487 free(cont);
Michal Vasko086311b2016-01-08 09:53:11 +0100488 }
489 }
490
491 /* read message from wire */
Michal Vasko05ba9df2016-01-13 14:40:27 +0100492 msgtype = nc_read_msg_poll(session, timeout, &xml);
Michal Vasko086311b2016-01-08 09:53:11 +0100493
494 /* we read rpc-reply, want a notif */
495 if (!msgid && (msgtype == NC_MSG_REPLY)) {
Michal Vasko11d142a2016-01-19 15:58:24 +0100496 /* just check that there is a message-id */
Michal Vasko086311b2016-01-08 09:53:11 +0100497 str_msgid = lyxml_get_attr(xml, "message-id", NULL);
498 if (!str_msgid) {
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100499 pthread_mutex_unlock(session->ti_lock);
Michal Vaskod083db62016-01-19 10:31:29 +0100500 ERR("Session %u: received a <rpc-reply> with no message-id, discarding.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100501 lyxml_free(session->ctx, xml);
Michal Vasko2518b6b2016-01-28 13:24:53 +0100502 return NC_MSG_ERROR;
Michal Vasko086311b2016-01-08 09:53:11 +0100503 }
Michal Vasko086311b2016-01-08 09:53:11 +0100504
505 cont_ptr = &session->replies;
506 while (*cont_ptr) {
507 cont_ptr = &((*cont_ptr)->next);
508 }
509 *cont_ptr = malloc(sizeof **cont_ptr);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100510 if (!*cont_ptr) {
511 ERRMEM;
512 lyxml_free(session->ctx, xml);
513 return NC_MSG_ERROR;
514 }
Michal Vasko086311b2016-01-08 09:53:11 +0100515 (*cont_ptr)->msg = xml;
516 (*cont_ptr)->next = NULL;
517 }
518
519 /* we read notif, want a rpc-reply */
520 if (msgid && (msgtype == NC_MSG_NOTIF)) {
Michal Vaskoa8ad4482016-01-28 14:25:54 +0100521 /* TODO check whether the session is even subscribed */
522 /*if (!session->notif) {
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100523 pthread_mutex_unlock(session->ti_lock);
Michal Vaskod083db62016-01-19 10:31:29 +0100524 ERR("Session %u: received a <notification> but session is not subscribed.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100525 lyxml_free(session->ctx, xml);
Michal Vasko2518b6b2016-01-28 13:24:53 +0100526 return NC_MSG_ERROR;
Michal Vaskoa8ad4482016-01-28 14:25:54 +0100527 }*/
Michal Vasko086311b2016-01-08 09:53:11 +0100528
529 cont_ptr = &session->notifs;
530 while (*cont_ptr) {
531 cont_ptr = &((*cont_ptr)->next);
532 }
533 *cont_ptr = malloc(sizeof **cont_ptr);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100534 if (!cont_ptr) {
535 ERRMEM;
536 lyxml_free(session->ctx, xml);
537 return NC_MSG_ERROR;
538 }
Michal Vasko086311b2016-01-08 09:53:11 +0100539 (*cont_ptr)->msg = xml;
540 (*cont_ptr)->next = NULL;
541 }
542
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100543 pthread_mutex_unlock(session->ti_lock);
Michal Vasko086311b2016-01-08 09:53:11 +0100544
545 switch (msgtype) {
546 case NC_MSG_NOTIF:
Michal Vasko2518b6b2016-01-28 13:24:53 +0100547 if (!msgid) {
548 *msg = xml;
Michal Vasko086311b2016-01-08 09:53:11 +0100549 }
Michal Vasko086311b2016-01-08 09:53:11 +0100550 break;
551
552 case NC_MSG_REPLY:
Michal Vasko2518b6b2016-01-28 13:24:53 +0100553 if (msgid) {
554 *msg = xml;
Michal Vasko086311b2016-01-08 09:53:11 +0100555 }
Michal Vasko086311b2016-01-08 09:53:11 +0100556 break;
557
558 case NC_MSG_HELLO:
Michal Vaskod083db62016-01-19 10:31:29 +0100559 ERR("Session %u: received another <hello> message.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100560 lyxml_free(session->ctx, xml);
Michal Vasko2518b6b2016-01-28 13:24:53 +0100561 return NC_MSG_ERROR;
Michal Vasko086311b2016-01-08 09:53:11 +0100562
563 case NC_MSG_RPC:
Michal Vaskod083db62016-01-19 10:31:29 +0100564 ERR("Session %u: received <rpc> from a NETCONF server.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100565 lyxml_free(session->ctx, xml);
Michal Vasko2518b6b2016-01-28 13:24:53 +0100566 return NC_MSG_ERROR;
Michal Vasko086311b2016-01-08 09:53:11 +0100567
568 default:
569 /* NC_MSG_WOULDBLOCK and NC_MSG_ERROR - pass it out;
570 * NC_MSG_NONE is not returned by nc_read_msg()
571 */
572 break;
573 }
574
575 return msgtype;
576}
577
578/* cannot strictly fail, but does not need to fill any error parameter at all */
579static void
580parse_rpc_error(struct ly_ctx *ctx, struct lyxml_elem *xml, struct nc_err *err)
581{
582 struct lyxml_elem *iter, *next, *info;
583
584 LY_TREE_FOR(xml->child, iter) {
585 if (!iter->ns) {
586 if (iter->content) {
587 WRN("<rpc-error> child \"%s\" with value \"%s\" without namespace.", iter->name, iter->content);
588 } else {
589 WRN("<rpc-error> child \"%s\" without namespace.", iter->name);
590 }
591 continue;
592 } else if (strcmp(iter->ns->value, NC_NS_BASE)) {
593 if (iter->content) {
594 WRN("<rpc-error> child \"%s\" with value \"%s\" in an unknown namespace \"%s\".",
595 iter->name, iter->content, iter->ns->value);
596 } else {
597 WRN("<rpc-error> child \"%s\" in an unknown namespace \"%s\".", iter->name, iter->ns->value);
598 }
599 continue;
600 }
601
602 if (!strcmp(iter->name, "error-type")) {
603 if (!iter->content || (strcmp(iter->content, "transport") && strcmp(iter->content, "rpc")
604 && strcmp(iter->content, "protocol") && strcmp(iter->content, "application"))) {
605 WRN("<rpc-error> <error-type> unknown value \"%s\".", (iter->content ? iter->content : ""));
606 } else if (err->type) {
607 WRN("<rpc-error> <error-type> duplicated.");
608 } else {
609 err->type = lydict_insert(ctx, iter->content, 0);
610 }
611 } else if (!strcmp(iter->name, "error-tag")) {
612 if (!iter->content || (strcmp(iter->content, "in-use") && strcmp(iter->content, "invalid-value")
613 && strcmp(iter->content, "too-big") && strcmp(iter->content, "missing-attribute")
614 && strcmp(iter->content, "bad-attribute") && strcmp(iter->content, "unknown-attribute")
615 && strcmp(iter->content, "missing-element") && strcmp(iter->content, "bad-element")
616 && strcmp(iter->content, "unknown-element") && strcmp(iter->content, "unknown-namespace")
617 && strcmp(iter->content, "access-denied") && strcmp(iter->content, "lock-denied")
618 && strcmp(iter->content, "resource-denied") && strcmp(iter->content, "rollback-failed")
619 && strcmp(iter->content, "data-exists") && strcmp(iter->content, "data-missing")
620 && strcmp(iter->content, "operation-not-supported") && strcmp(iter->content, "operation-failed")
621 && strcmp(iter->content, "malformed-message"))) {
622 WRN("<rpc-error> <error-tag> unknown value \"%s\".", (iter->content ? iter->content : ""));
623 } else if (err->tag) {
624 WRN("<rpc-error> <error-tag> duplicated.");
625 } else {
626 err->tag = lydict_insert(ctx, iter->content, 0);
627 }
628 } else if (!strcmp(iter->name, "error-severity")) {
629 if (!iter->content || (strcmp(iter->content, "error") && strcmp(iter->content, "warning"))) {
630 WRN("<rpc-error> <error-severity> unknown value \"%s\".", (iter->content ? iter->content : ""));
631 } else if (err->severity) {
632 WRN("<rpc-error> <error-severity> duplicated.");
633 } else {
634 err->severity = lydict_insert(ctx, iter->content, 0);
635 }
636 } else if (!strcmp(iter->name, "error-app-tag")) {
637 if (err->apptag) {
638 WRN("<rpc-error> <error-app-tag> duplicated.");
639 } else {
640 err->apptag = lydict_insert(ctx, (iter->content ? iter->content : ""), 0);
641 }
642 } else if (!strcmp(iter->name, "error-path")) {
643 if (err->path) {
644 WRN("<rpc-error> <error-path> duplicated.");
645 } else {
646 err->path = lydict_insert(ctx, (iter->content ? iter->content : ""), 0);
647 }
648 } else if (!strcmp(iter->name, "error-message")) {
649 if (err->message) {
650 WRN("<rpc-error> <error-message> duplicated.");
651 } else {
652 err->message_lang = lyxml_get_attr(iter, "xml:lang", NULL);
653 if (!err->message_lang) {
654 VRB("<rpc-error> <error-message> without the recommended \"xml:lang\" attribute.");
655 }
656 err->message = lydict_insert(ctx, (iter->content ? iter->content : ""), 0);
657 }
658 } else if (!strcmp(iter->name, "error-info")) {
659 LY_TREE_FOR_SAFE(iter->child, next, info) {
660 if (info->ns && !strcmp(info->ns->value, NC_NS_BASE)) {
661 if (!strcmp(info->name, "session-id")) {
662 if (err->sid) {
663 WRN("<rpc-error> <error-info> <session-id> duplicated.");
664 } else {
665 err->sid = lydict_insert(ctx, (info->content ? info->content : ""), 0);
666 }
667 } else if (!strcmp(info->name, "bad-attr")) {
668 ++err->attr_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100669 err->attr = nc_realloc(err->attr, err->attr_count * sizeof *err->attr);
670 if (!err->attr) {
671 ERRMEM;
672 return;
673 }
Michal Vasko086311b2016-01-08 09:53:11 +0100674 err->attr[err->attr_count - 1] = lydict_insert(ctx, (info->content ? info->content : ""), 0);
675 } else if (!strcmp(info->name, "bad-element")) {
676 ++err->elem_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100677 err->elem = nc_realloc(err->elem, err->elem_count * sizeof *err->elem);
678 if (!err->elem) {
679 ERRMEM;
680 return;
681 }
Michal Vasko086311b2016-01-08 09:53:11 +0100682 err->elem[err->elem_count - 1] = lydict_insert(ctx, (info->content ? info->content : ""), 0);
683 } else if (!strcmp(info->name, "bad-namespace")) {
684 ++err->ns_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100685 err->ns = nc_realloc(err->ns, err->ns_count * sizeof *err->ns);
686 if (!err->ns) {
687 ERRMEM;
688 return;
689 }
Michal Vasko086311b2016-01-08 09:53:11 +0100690 err->ns[err->ns_count - 1] = lydict_insert(ctx, (info->content ? info->content : ""), 0);
691 } else {
692 if (info->content) {
693 WRN("<rpc-error> <error-info> unknown child \"%s\" with value \"%s\".",
694 info->name, info->content);
695 } else {
696 WRN("<rpc-error> <error-info> unknown child \"%s\".", info->name);
697 }
698 }
699 } else {
700 lyxml_unlink(ctx, info);
701 ++err->other_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100702 err->other = nc_realloc(err->other, err->other_count * sizeof *err->other);
703 if (!err->other) {
704 ERRMEM;
705 return;
706 }
Michal Vasko086311b2016-01-08 09:53:11 +0100707 err->other[err->other_count - 1] = info;
708 }
709 }
710 } else {
711 if (iter->content) {
712 WRN("<rpc-error> unknown child \"%s\" with value \"%s\".", iter->name, iter->content);
713 } else {
714 WRN("<rpc-error> unknown child \"%s\".", iter->name);
715 }
716 }
717 }
718}
719
720static struct nc_reply *
Michal Vaskoeb7080e2016-02-18 13:27:05 +0100721parse_reply(struct ly_ctx *ctx, struct lyxml_elem *xml, struct nc_rpc *rpc, int parseroptions)
Michal Vasko086311b2016-01-08 09:53:11 +0100722{
723 struct lyxml_elem *iter;
Michal Vasko0473c4c2016-01-19 10:40:06 +0100724 const struct lys_node *schema = NULL;
Michal Vasko086311b2016-01-08 09:53:11 +0100725 struct lyd_node *data = NULL;
Michal Vasko1a38c862016-01-15 15:50:07 +0100726 struct nc_client_reply_error *error_rpl;
Michal Vasko086311b2016-01-08 09:53:11 +0100727 struct nc_reply_data *data_rpl;
728 struct nc_reply *reply = NULL;
729 struct nc_rpc_generic *rpc_gen;
730 int i;
731
732 if (!xml->child) {
733 ERR("An empty <rpc-reply>.");
734 return NULL;
735 }
736
737 /* rpc-error */
738 if (!strcmp(xml->child->name, "rpc-error") && xml->child->ns && !strcmp(xml->child->ns->value, NC_NS_BASE)) {
739 /* count and check elements */
740 i = 0;
741 LY_TREE_FOR(xml->child, iter) {
742 if (strcmp(iter->name, "rpc-error")) {
743 ERR("<rpc-reply> content mismatch (<rpc-error> and <%s>).", iter->name);
744 return NULL;
745 } else if (!iter->ns) {
746 ERR("<rpc-reply> content mismatch (<rpc-error> without namespace).");
747 return NULL;
748 } else if (strcmp(iter->ns->value, NC_NS_BASE)) {
749 ERR("<rpc-reply> content mismatch (<rpc-error> with NS \"%s\").", iter->ns->value);
750 return NULL;
751 }
752 ++i;
753 }
754
755 error_rpl = malloc(sizeof *error_rpl);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100756 if (!error_rpl) {
757 ERRMEM;
758 return NULL;
759 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100760 error_rpl->type = NC_RPL_ERROR;
Michal Vasko086311b2016-01-08 09:53:11 +0100761 error_rpl->err = calloc(i, sizeof *error_rpl->err);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100762 if (!error_rpl->err) {
763 ERRMEM;
764 free(error_rpl);
765 return NULL;
766 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100767 error_rpl->count = i;
Michal Vasko1a38c862016-01-15 15:50:07 +0100768 error_rpl->ctx = ctx;
Michal Vasko086311b2016-01-08 09:53:11 +0100769 reply = (struct nc_reply *)error_rpl;
770
771 i = 0;
772 LY_TREE_FOR(xml->child, iter) {
773 parse_rpc_error(ctx, iter, error_rpl->err + i);
774 ++i;
775 }
776
777 /* ok */
778 } else if (!strcmp(xml->child->name, "ok") && xml->child->ns && !strcmp(xml->child->ns->value, NC_NS_BASE)) {
779 if (xml->child->next) {
780 ERR("<rpc-reply> content mismatch (<ok> and <%s>).", xml->child->next->name);
781 return NULL;
782 }
783 reply = malloc(sizeof *reply);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100784 if (!reply) {
785 ERRMEM;
786 return NULL;
787 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100788 reply->type = NC_RPL_OK;
Michal Vasko086311b2016-01-08 09:53:11 +0100789
790 /* some RPC output */
791 } else {
792 switch (rpc->type) {
793 case NC_RPC_GENERIC:
794 rpc_gen = (struct nc_rpc_generic *)rpc;
795
796 if (rpc_gen->has_data) {
797 schema = rpc_gen->content.data->schema;
798 } else {
Michal Vaskoeb7080e2016-02-18 13:27:05 +0100799 data = lyd_parse_mem(ctx, rpc_gen->content.xml_str, LYD_XML, LYD_OPT_RPC | parseroptions);
Michal Vasko086311b2016-01-08 09:53:11 +0100800 if (!data) {
801 ERR("Failed to parse a generic RPC XML.");
802 return NULL;
803 }
804 schema = data->schema;
805 lyd_free(data);
806 data = NULL;
807 }
808 if (!schema) {
Michal Vasko9e036d52016-01-08 10:49:26 +0100809 ERRINT;
Michal Vasko086311b2016-01-08 09:53:11 +0100810 return NULL;
811 }
812 break;
813
814 case NC_RPC_GETCONFIG:
815 case NC_RPC_GET:
Michal Vasko13ed2942016-02-29 16:21:00 +0100816 if (!xml->child->child) {
817 /* we did not receive any data */
818 data_rpl = malloc(sizeof *data_rpl);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100819 if (!data_rpl) {
820 ERRMEM;
821 return NULL;
822 }
Michal Vasko13ed2942016-02-29 16:21:00 +0100823 data_rpl->type = NC_RPL_DATA;
824 data_rpl->data = NULL;
825 return (struct nc_reply *)data_rpl;
826 }
827
Michal Vasko086311b2016-01-08 09:53:11 +0100828 /* special treatment */
829 data = lyd_parse_xml(ctx, &xml->child->child, LYD_OPT_DESTRUCT
Michal Vaskoeb7080e2016-02-18 13:27:05 +0100830 | (rpc->type == NC_RPC_GETCONFIG ? LYD_OPT_GETCONFIG : LYD_OPT_GET) | parseroptions);
Michal Vasko086311b2016-01-08 09:53:11 +0100831 if (!data) {
832 ERR("Failed to parse <%s> reply.", (rpc->type == NC_RPC_GETCONFIG ? "get-config" : "get"));
833 return NULL;
834 }
835 break;
836
837 case NC_RPC_GETSCHEMA:
Michal Vaskofea54dc2016-02-17 13:12:16 +0100838 schema = ly_ctx_get_node(ctx, "/ietf-netconf-monitoring:get-schema");
Michal Vasko086311b2016-01-08 09:53:11 +0100839 if (!schema) {
Michal Vasko9e036d52016-01-08 10:49:26 +0100840 ERRINT;
Michal Vasko086311b2016-01-08 09:53:11 +0100841 return NULL;
842 }
843 break;
844
845 case NC_RPC_EDIT:
846 case NC_RPC_COPY:
847 case NC_RPC_DELETE:
848 case NC_RPC_LOCK:
849 case NC_RPC_UNLOCK:
850 case NC_RPC_KILL:
851 case NC_RPC_COMMIT:
852 case NC_RPC_DISCARD:
853 case NC_RPC_CANCEL:
854 case NC_RPC_VALIDATE:
855 case NC_RPC_SUBSCRIBE:
856 /* there is no output defined */
857 ERR("Unexpected data reply (root elem \"%s\").", xml->child->name);
858 return NULL;
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100859 default:
860 ERRINT;
861 return NULL;
Michal Vasko086311b2016-01-08 09:53:11 +0100862 }
863
864 data_rpl = malloc(sizeof *data_rpl);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100865 if (!data_rpl) {
866 ERRMEM;
867 return NULL;
868 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100869 data_rpl->type = NC_RPL_DATA;
Michal Vasko086311b2016-01-08 09:53:11 +0100870 if (!data) {
Michal Vaskoeb7080e2016-02-18 13:27:05 +0100871 data_rpl->data = lyd_parse_xml(ctx, &xml->child, LYD_OPT_DESTRUCT | LYD_OPT_RPCREPLY | parseroptions, schema);
Michal Vasko086311b2016-01-08 09:53:11 +0100872 } else {
873 /* <get>, <get-config> */
874 data_rpl->data = data;
875 }
876 if (!data_rpl->data) {
877 ERR("Failed to parse <rpc-reply>.");
878 free(data_rpl);
879 return NULL;
880 }
881 reply = (struct nc_reply *)data_rpl;
882 }
883
884 return reply;
885}
886
Radek Krejci53691be2016-02-22 13:58:37 +0100887#if defined(NC_ENABLED_SSH) || defined(NC_ENABLED_TLS)
Michal Vasko3d865d22016-01-28 16:00:53 +0100888
Michal Vasko3031aae2016-01-27 16:07:18 +0100889int
890nc_client_ch_add_bind_listen(const char *address, uint16_t port, NC_TRANSPORT_IMPL ti)
891{
892 int sock;
893
894 if (!address || !port) {
895 ERRARG;
896 return -1;
897 }
898
899 sock = nc_sock_listen(address, port);
900 if (sock == -1) {
901 return -1;
902 }
903
904 ++client_opts.ch_bind_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100905 client_opts.ch_binds = nc_realloc(client_opts.ch_binds, client_opts.ch_bind_count * sizeof *client_opts.ch_binds);
906 if (!client_opts.ch_binds) {
907 ERRMEM;
908 return -1;
909 }
Michal Vasko3031aae2016-01-27 16:07:18 +0100910
911 client_opts.ch_binds[client_opts.ch_bind_count - 1].address = strdup(address);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100912 if (!client_opts.ch_binds[client_opts.ch_bind_count - 1].address) {
913 ERRMEM;
914 return -1;
915 }
Michal Vasko3031aae2016-01-27 16:07:18 +0100916 client_opts.ch_binds[client_opts.ch_bind_count - 1].port = port;
917 client_opts.ch_binds[client_opts.ch_bind_count - 1].sock = sock;
918 client_opts.ch_binds[client_opts.ch_bind_count - 1].ti = ti;
919
920 return 0;
921}
922
923int
924nc_client_ch_del_bind(const char *address, uint16_t port, NC_TRANSPORT_IMPL ti)
925{
926 uint32_t i;
927 int ret = -1;
928
929 if (!address && !port && !ti) {
930 for (i = 0; i < client_opts.ch_bind_count; ++i) {
931 close(client_opts.ch_binds[i].sock);
932 free((char *)client_opts.ch_binds[i].address);
933
934 ret = 0;
935 }
936 free(client_opts.ch_binds);
937 client_opts.ch_binds = NULL;
938 client_opts.ch_bind_count = 0;
939 } else {
940 for (i = 0; i < client_opts.ch_bind_count; ++i) {
941 if ((!address || !strcmp(client_opts.ch_binds[i].address, address))
942 && (!port || (client_opts.ch_binds[i].port == port))
943 && (!ti || (client_opts.ch_binds[i].ti == ti))) {
944 close(client_opts.ch_binds[i].sock);
945 free((char *)client_opts.ch_binds[i].address);
946
947 --client_opts.ch_bind_count;
948 memcpy(&client_opts.ch_binds[i], &client_opts.ch_binds[client_opts.ch_bind_count], sizeof *client_opts.ch_binds);
949
950 ret = 0;
951 }
952 }
953 }
954
955 return ret;
956}
957
958API int
959nc_accept_callhome(int timeout, struct ly_ctx *ctx, struct nc_session **session)
960{
961 int sock;
962 char *host = NULL;
963 uint16_t port, idx;
964
965 if (!client_opts.ch_binds || !session) {
966 ERRARG;
967 return -1;
968 }
969
970 sock = nc_sock_accept_binds(client_opts.ch_binds, client_opts.ch_bind_count, timeout, &host, &port, &idx);
971
Michal Vasko50456e82016-02-02 12:16:08 +0100972 if (sock < 1) {
Michal Vaskob737d752016-02-09 09:01:27 +0100973 free(host);
Michal Vasko3031aae2016-01-27 16:07:18 +0100974 return sock;
975 }
976
Radek Krejci53691be2016-02-22 13:58:37 +0100977#ifdef NC_ENABLED_SSH
Michal Vasko3031aae2016-01-27 16:07:18 +0100978 if (client_opts.ch_binds[idx].ti == NC_TI_LIBSSH) {
Michal Vaskoaf58cd92016-01-28 11:56:02 +0100979 *session = nc_accept_callhome_ssh_sock(sock, host, port, ctx);
Michal Vasko3d865d22016-01-28 16:00:53 +0100980 } else
981#endif
Radek Krejci53691be2016-02-22 13:58:37 +0100982#ifdef NC_ENABLED_TLS
Michal Vasko3d865d22016-01-28 16:00:53 +0100983 if (client_opts.ch_binds[idx].ti == NC_TI_OPENSSL) {
Michal Vaskoaf58cd92016-01-28 11:56:02 +0100984 *session = nc_accept_callhome_tls_sock(sock, host, port, ctx);
Michal Vasko3d865d22016-01-28 16:00:53 +0100985 } else
986#endif
987 {
Michal Vaskofee717c2016-02-01 13:25:43 +0100988 close(sock);
Michal Vasko3031aae2016-01-27 16:07:18 +0100989 *session = NULL;
990 }
991
992 free(host);
993
994 if (!(*session)) {
995 return -1;
996 }
997
998 return 1;
999}
1000
Radek Krejci53691be2016-02-22 13:58:37 +01001001#endif /* NC_ENABLED_SSH || NC_ENABLED_TLS */
Michal Vasko3d865d22016-01-28 16:00:53 +01001002
Michal Vaskob7558c52016-02-26 15:04:19 +01001003API void
Michal Vaskoa7b8ca52016-03-01 12:09:29 +01001004nc_client_init(void)
1005{
1006 nc_init();
1007}
1008
1009API void
Michal Vaskob7558c52016-02-26 15:04:19 +01001010nc_client_destroy(void)
1011{
1012 nc_client_schema_searchpath(NULL);
1013#if defined(NC_ENABLED_SSH) || defined(NC_ENABLED_TLS)
1014 nc_client_ch_del_bind(NULL, 0, 0);
1015#endif
1016#ifdef NC_ENABLED_SSH
1017 nc_client_ssh_destroy_opts();
1018#endif
Michal Vaskoc979d3a2016-02-26 15:26:21 +01001019#ifdef NC_ENABLED_TLS
Michal Vaskob7558c52016-02-26 15:04:19 +01001020 nc_client_tls_destroy_opts();
1021#endif
Michal Vaskoa7b8ca52016-03-01 12:09:29 +01001022 nc_destroy();
Michal Vaskob7558c52016-02-26 15:04:19 +01001023}
1024
Michal Vasko086311b2016-01-08 09:53:11 +01001025API NC_MSG_TYPE
Michal Vaskoeb7080e2016-02-18 13:27:05 +01001026nc_recv_reply(struct nc_session *session, struct nc_rpc *rpc, uint64_t msgid, int timeout, int parseroptions, struct nc_reply **reply)
Michal Vasko086311b2016-01-08 09:53:11 +01001027{
1028 struct lyxml_elem *xml;
1029 NC_MSG_TYPE msgtype = 0; /* NC_MSG_ERROR */
1030
Michal Vaskoeb7080e2016-02-18 13:27:05 +01001031 if (!session || !rpc || !reply || (parseroptions & LYD_OPT_TYPEMASK)) {
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001032 ERRARG;
Michal Vasko086311b2016-01-08 09:53:11 +01001033 return NC_MSG_ERROR;
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001034 } else if ((session->status != NC_STATUS_RUNNING) || (session->side != NC_CLIENT)) {
Michal Vaskod083db62016-01-19 10:31:29 +01001035 ERR("Session %u: invalid session to receive RPC replies.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001036 return NC_MSG_ERROR;
1037 }
Michal Vaskoeb7080e2016-02-18 13:27:05 +01001038 parseroptions &= ~(LYD_OPT_DESTRUCT | LYD_OPT_NOSIBLINGS);
Michal Vasko086311b2016-01-08 09:53:11 +01001039 *reply = NULL;
1040
1041 msgtype = get_msg(session, timeout, msgid, &xml);
Michal Vasko086311b2016-01-08 09:53:11 +01001042
1043 if (msgtype == NC_MSG_REPLY) {
Michal Vaskoeb7080e2016-02-18 13:27:05 +01001044 *reply = parse_reply(session->ctx, xml, rpc, parseroptions);
Michal Vasko086311b2016-01-08 09:53:11 +01001045 lyxml_free(session->ctx, xml);
1046 if (!(*reply)) {
1047 return NC_MSG_ERROR;
1048 }
1049 }
1050
1051 return msgtype;
1052}
1053
1054API NC_MSG_TYPE
1055nc_recv_notif(struct nc_session *session, int timeout, struct nc_notif **notif)
1056{
1057 struct lyxml_elem *xml, *ev_time;
1058 NC_MSG_TYPE msgtype = 0; /* NC_MSG_ERROR */
1059
1060 if (!session || !notif) {
Michal Vaskod083db62016-01-19 10:31:29 +01001061 ERRARG;
Michal Vasko086311b2016-01-08 09:53:11 +01001062 return NC_MSG_ERROR;
1063 } else if (session->status != NC_STATUS_RUNNING || session->side != NC_CLIENT) {
Michal Vaskod083db62016-01-19 10:31:29 +01001064 ERR("Session %u: invalid session to receive Notifications.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001065 return NC_MSG_ERROR;
1066 }
1067
1068 msgtype = get_msg(session, timeout, 0, &xml);
1069
1070 if (msgtype == NC_MSG_NOTIF) {
1071 *notif = calloc(1, sizeof **notif);
Michal Vasko4eb3c312016-03-01 14:09:37 +01001072 if (!*notif) {
1073 ERRMEM;
1074 lyxml_free(session->ctx, xml);
1075 return NC_MSG_ERROR;
1076 }
Michal Vasko086311b2016-01-08 09:53:11 +01001077
1078 /* eventTime */
1079 LY_TREE_FOR(xml->child, ev_time) {
1080 if (!strcmp(ev_time->name, "eventTime")) {
1081 (*notif)->datetime = lydict_insert(session->ctx, ev_time->content, 0);
1082 /* lyd_parse does not know this element */
1083 lyxml_free(session->ctx, ev_time);
1084 break;
1085 }
1086 }
1087 if (!(*notif)->datetime) {
Michal Vaskod083db62016-01-19 10:31:29 +01001088 ERR("Session %u: notification is missing the \"eventTime\" element.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001089 goto fail;
1090 }
1091
1092 /* notification body */
Michal Vasko05ba9df2016-01-13 14:40:27 +01001093 (*notif)->tree = lyd_parse_xml(session->ctx, &xml->child, LYD_OPT_DESTRUCT | LYD_OPT_NOTIF);
Michal Vasko086311b2016-01-08 09:53:11 +01001094 lyxml_free(session->ctx, xml);
1095 xml = NULL;
1096 if (!(*notif)->tree) {
Michal Vaskod083db62016-01-19 10:31:29 +01001097 ERR("Session %u: failed to parse a new notification.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001098 goto fail;
1099 }
1100 }
1101
1102 return msgtype;
1103
1104fail:
1105 lydict_remove(session->ctx, (*notif)->datetime);
1106 lyd_free((*notif)->tree);
1107 free(*notif);
1108 *notif = NULL;
1109 lyxml_free(session->ctx, xml);
1110
1111 return NC_MSG_ERROR;
1112}
1113
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001114static void *
1115nc_recv_notif_thread(void *arg)
1116{
1117 struct nc_ntf_thread_arg *ntarg;
1118 struct nc_session *session;
1119 void (*notif_clb)(struct nc_session *session, const struct nc_notif *notif);
1120 struct nc_notif *notif;
1121 NC_MSG_TYPE msgtype;
1122
1123 ntarg = (struct nc_ntf_thread_arg *)arg;
1124 session = ntarg->session;
1125 notif_clb = ntarg->notif_clb;
1126 free(ntarg);
1127
1128 while (session->ntf_tid) {
1129 msgtype = nc_recv_notif(session, 0, &notif);
1130 if (msgtype == NC_MSG_NOTIF) {
1131 notif_clb(session, notif);
Michal Vaskof0537d82016-01-29 14:42:38 +01001132 if (!strcmp(notif->tree->schema->name, "notificationComplete")
1133 && !strcmp(notif->tree->schema->module->name, "nc-notifications")) {
1134 nc_notif_free(notif);
1135 break;
1136 }
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001137 nc_notif_free(notif);
1138 }
1139
1140 usleep(NC_CLIENT_NOTIF_THREAD_SLEEP);
1141 }
1142
1143 return NULL;
1144}
1145
1146API int
1147nc_recv_notif_dispatch(struct nc_session *session, void (*notif_clb)(struct nc_session *session, const struct nc_notif *notif))
1148{
1149 struct nc_ntf_thread_arg *ntarg;
1150 int ret;
1151
1152 if (!session || !notif_clb) {
1153 ERRARG;
1154 return -1;
1155 } else if ((session->status != NC_STATUS_RUNNING) || (session->side != NC_CLIENT)) {
1156 ERR("Session %u: invalid session to receive Notifications.", session->id);
1157 return -1;
1158 } else if (session->ntf_tid) {
1159 ERR("Session %u: separate notification thread is already running.", session->id);
1160 return -1;
1161 }
1162
1163 ntarg = malloc(sizeof *ntarg);
Michal Vasko4eb3c312016-03-01 14:09:37 +01001164 if (!ntarg) {
1165 ERRMEM;
1166 return -1;
1167 }
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001168 ntarg->session = session;
1169 ntarg->notif_clb = notif_clb;
1170
1171 /* just so that nc_recv_notif_thread() does not immediately exit, the value does not matter */
1172 session->ntf_tid = malloc(sizeof *session->ntf_tid);
Michal Vasko4eb3c312016-03-01 14:09:37 +01001173 if (!session->ntf_tid) {
1174 ERRMEM;
1175 free(ntarg);
1176 return -1;
1177 }
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001178
1179 ret = pthread_create((pthread_t *)session->ntf_tid, NULL, nc_recv_notif_thread, ntarg);
1180 if (ret) {
1181 ERR("Session %u: failed to create a new thread (%s).", strerror(errno));
1182 free(ntarg);
1183 free((pthread_t *)session->ntf_tid);
1184 session->ntf_tid = NULL;
1185 return -1;
1186 }
1187
1188 return 0;
1189}
1190
Michal Vasko086311b2016-01-08 09:53:11 +01001191API NC_MSG_TYPE
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001192nc_send_rpc(struct nc_session *session, struct nc_rpc *rpc, int timeout, uint64_t *msgid)
Michal Vasko086311b2016-01-08 09:53:11 +01001193{
1194 NC_MSG_TYPE r;
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001195 int ret;
Michal Vasko086311b2016-01-08 09:53:11 +01001196 struct nc_rpc_generic *rpc_gen;
1197 struct nc_rpc_getconfig *rpc_gc;
1198 struct nc_rpc_edit *rpc_e;
1199 struct nc_rpc_copy *rpc_cp;
1200 struct nc_rpc_delete *rpc_del;
1201 struct nc_rpc_lock *rpc_lock;
1202 struct nc_rpc_get *rpc_g;
1203 struct nc_rpc_kill *rpc_k;
1204 struct nc_rpc_commit *rpc_com;
1205 struct nc_rpc_cancel *rpc_can;
1206 struct nc_rpc_validate *rpc_val;
1207 struct nc_rpc_getschema *rpc_gs;
1208 struct nc_rpc_subscribe *rpc_sub;
1209 struct lyd_node *data, *node;
1210 const struct lys_module *ietfnc, *ietfncmon, *notifs, *ietfncwd = NULL;
1211 char str[11];
1212 uint64_t cur_msgid;
1213
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001214 if (!session || !rpc || !msgid) {
1215 ERRARG;
Michal Vasko086311b2016-01-08 09:53:11 +01001216 return NC_MSG_ERROR;
1217 } else if (session->status != NC_STATUS_RUNNING || session->side != NC_CLIENT) {
Michal Vaskod083db62016-01-19 10:31:29 +01001218 ERR("Session %u: invalid session to send RPCs.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001219 return NC_MSG_ERROR;
1220 }
1221
1222 if ((rpc->type != NC_RPC_GETSCHEMA) && (rpc->type != NC_RPC_GENERIC) && (rpc->type != NC_RPC_SUBSCRIBE)) {
1223 ietfnc = ly_ctx_get_module(session->ctx, "ietf-netconf", NULL);
1224 if (!ietfnc) {
Michal Vaskod083db62016-01-19 10:31:29 +01001225 ERR("Session %u: missing ietf-netconf schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001226 return NC_MSG_ERROR;
1227 }
1228 }
1229
1230 switch (rpc->type) {
1231 case NC_RPC_GENERIC:
1232 rpc_gen = (struct nc_rpc_generic *)rpc;
1233
1234 if (rpc_gen->has_data) {
1235 data = rpc_gen->content.data;
1236 } else {
Michal Vaskoa4c23d82016-02-03 15:48:09 +01001237 data = lyd_parse_mem(session->ctx, rpc_gen->content.xml_str, LYD_XML, LYD_OPT_STRICT);
Michal Vasko086311b2016-01-08 09:53:11 +01001238 }
1239 break;
1240
1241 case NC_RPC_GETCONFIG:
1242 rpc_gc = (struct nc_rpc_getconfig *)rpc;
1243
1244 data = lyd_new(NULL, ietfnc, "get-config");
1245 node = lyd_new(data, ietfnc, "source");
1246 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_gc->source], NULL);
1247 if (!node) {
1248 lyd_free(data);
1249 return NC_MSG_ERROR;
1250 }
1251 if (rpc_gc->filter) {
1252 if (rpc_gc->filter[0] == '<') {
1253 node = lyd_new_anyxml(data, ietfnc, "filter", rpc_gc->filter);
1254 lyd_insert_attr(node, "type", "subtree");
1255 } else {
1256 node = lyd_new_anyxml(data, ietfnc, "filter", NULL);
1257 lyd_insert_attr(node, "type", "xpath");
1258 lyd_insert_attr(node, "select", rpc_gc->filter);
1259 }
1260 if (!node) {
1261 lyd_free(data);
1262 return NC_MSG_ERROR;
1263 }
1264 }
1265
1266 if (rpc_gc->wd_mode) {
1267 if (!ietfncwd) {
1268 ietfncwd = ly_ctx_get_module(session->ctx, "ietf-netconf-with-defaults", NULL);
1269 if (!ietfncwd) {
Michal Vaskod083db62016-01-19 10:31:29 +01001270 ERR("Session %u: missing ietf-netconf-with-defaults schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001271 return NC_MSG_ERROR;
1272 }
1273 }
1274 switch (rpc_gc->wd_mode) {
1275 case NC_WD_UNKNOWN:
1276 /* cannot get here */
1277 break;
1278 case NC_WD_ALL:
1279 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all");
1280 break;
1281 case NC_WD_ALL_TAG:
1282 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all-tagged");
1283 break;
1284 case NC_WD_TRIM:
1285 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "trim");
1286 break;
1287 case NC_WD_EXPLICIT:
1288 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "explicit");
1289 break;
1290 }
1291 if (!node) {
1292 lyd_free(data);
1293 return NC_MSG_ERROR;
1294 }
1295 }
1296 break;
1297
1298 case NC_RPC_EDIT:
1299 rpc_e = (struct nc_rpc_edit *)rpc;
1300
1301 data = lyd_new(NULL, ietfnc, "edit-config");
1302 node = lyd_new(data, ietfnc, "target");
1303 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_e->target], NULL);
1304 if (!node) {
1305 lyd_free(data);
1306 return NC_MSG_ERROR;
1307 }
1308
1309 if (rpc_e->default_op) {
1310 node = lyd_new_leaf(data, ietfnc, "default-operation", rpcedit_dfltop2str[rpc_e->default_op]);
1311 if (!node) {
1312 lyd_free(data);
1313 return NC_MSG_ERROR;
1314 }
1315 }
1316
1317 if (rpc_e->test_opt) {
1318 node = lyd_new_leaf(data, ietfnc, "test-option", rpcedit_testopt2str[rpc_e->test_opt]);
1319 if (!node) {
1320 lyd_free(data);
1321 return NC_MSG_ERROR;
1322 }
1323 }
1324
1325 if (rpc_e->error_opt) {
1326 node = lyd_new_leaf(data, ietfnc, "error-option", rpcedit_erropt2str[rpc_e->error_opt]);
1327 if (!node) {
1328 lyd_free(data);
1329 return NC_MSG_ERROR;
1330 }
1331 }
1332
1333 if (rpc_e->edit_cont[0] == '<') {
1334 node = lyd_new_anyxml(data, ietfnc, "config", rpc_e->edit_cont);
1335 } else {
1336 node = lyd_new_leaf(data, ietfnc, "url", rpc_e->edit_cont);
1337 }
1338 if (!node) {
1339 lyd_free(data);
1340 return NC_MSG_ERROR;
1341 }
1342 break;
1343
1344 case NC_RPC_COPY:
1345 rpc_cp = (struct nc_rpc_copy *)rpc;
1346
1347 data = lyd_new(NULL, ietfnc, "copy-config");
1348 node = lyd_new(data, ietfnc, "target");
1349 if (rpc_cp->url_trg) {
1350 node = lyd_new_leaf(node, ietfnc, "url", rpc_cp->url_trg);
1351 } else {
1352 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_cp->target], NULL);
1353 }
1354 if (!node) {
1355 lyd_free(data);
1356 return NC_MSG_ERROR;
1357 }
1358
1359 node = lyd_new(data, ietfnc, "source");
1360 if (rpc_cp->url_config_src) {
1361 if (rpc_cp->url_config_src[0] == '<') {
1362 node = lyd_new_anyxml(node, ietfnc, "config", rpc_cp->url_config_src);
1363 } else {
1364 node = lyd_new_leaf(node, ietfnc, "url", rpc_cp->url_config_src);
1365 }
1366 } else {
1367 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_cp->source], NULL);
1368 }
1369 if (!node) {
1370 lyd_free(data);
1371 return NC_MSG_ERROR;
1372 }
1373
1374 if (rpc_cp->wd_mode) {
1375 if (!ietfncwd) {
1376 ietfncwd = ly_ctx_get_module(session->ctx, "ietf-netconf-with-defaults", NULL);
1377 if (!ietfncwd) {
Michal Vaskod083db62016-01-19 10:31:29 +01001378 ERR("Session %u: missing ietf-netconf-with-defaults schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001379 return NC_MSG_ERROR;
1380 }
1381 }
1382 switch (rpc_cp->wd_mode) {
1383 case NC_WD_UNKNOWN:
1384 /* cannot get here */
1385 break;
1386 case NC_WD_ALL:
1387 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all");
1388 break;
1389 case NC_WD_ALL_TAG:
1390 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all-tagged");
1391 break;
1392 case NC_WD_TRIM:
1393 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "trim");
1394 break;
1395 case NC_WD_EXPLICIT:
1396 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "explicit");
1397 break;
1398 }
1399 if (!node) {
1400 lyd_free(data);
1401 return NC_MSG_ERROR;
1402 }
1403 }
1404 break;
1405
1406 case NC_RPC_DELETE:
1407 rpc_del = (struct nc_rpc_delete *)rpc;
1408
1409 data = lyd_new(NULL, ietfnc, "delete-config");
1410 node = lyd_new(data, ietfnc, "target");
1411 if (rpc_del->url) {
1412 node = lyd_new_leaf(node, ietfnc, "url", rpc_del->url);
1413 } else {
1414 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_del->target], NULL);
1415 }
1416 if (!node) {
1417 lyd_free(data);
1418 return NC_MSG_ERROR;
1419 }
1420 break;
1421
1422 case NC_RPC_LOCK:
1423 rpc_lock = (struct nc_rpc_lock *)rpc;
1424
1425 data = lyd_new(NULL, ietfnc, "lock");
1426 node = lyd_new(data, ietfnc, "target");
1427 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_lock->target], NULL);
1428 if (!node) {
1429 lyd_free(data);
1430 return NC_MSG_ERROR;
1431 }
1432 break;
1433
1434 case NC_RPC_UNLOCK:
1435 rpc_lock = (struct nc_rpc_lock *)rpc;
1436
1437 data = lyd_new(NULL, ietfnc, "unlock");
1438 node = lyd_new(data, ietfnc, "target");
1439 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_lock->target], NULL);
1440 if (!node) {
1441 lyd_free(data);
1442 return NC_MSG_ERROR;
1443 }
1444 break;
1445
1446 case NC_RPC_GET:
1447 rpc_g = (struct nc_rpc_get *)rpc;
1448
1449 data = lyd_new(NULL, ietfnc, "get");
1450 if (rpc_g->filter) {
1451 if (rpc_g->filter[0] == '<') {
1452 node = lyd_new_anyxml(data, ietfnc, "filter", rpc_g->filter);
1453 lyd_insert_attr(node, "type", "subtree");
1454 } else {
1455 node = lyd_new_anyxml(data, ietfnc, "filter", NULL);
1456 lyd_insert_attr(node, "type", "xpath");
1457 lyd_insert_attr(node, "select", rpc_g->filter);
1458 }
1459 if (!node) {
1460 lyd_free(data);
1461 return NC_MSG_ERROR;
1462 }
1463 }
1464
1465 if (rpc_g->wd_mode) {
1466 if (!ietfncwd) {
1467 ietfncwd = ly_ctx_get_module(session->ctx, "ietf-netconf-with-defaults", NULL);
1468 if (!ietfncwd) {
Michal Vaskod083db62016-01-19 10:31:29 +01001469 ERR("Session %u: missing ietf-netconf-with-defaults schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001470 return NC_MSG_ERROR;
1471 }
1472 }
1473 switch (rpc_g->wd_mode) {
1474 case NC_WD_UNKNOWN:
1475 /* cannot get here */
1476 break;
1477 case NC_WD_ALL:
1478 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all");
1479 break;
1480 case NC_WD_ALL_TAG:
1481 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all-tagged");
1482 break;
1483 case NC_WD_TRIM:
1484 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "trim");
1485 break;
1486 case NC_WD_EXPLICIT:
1487 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "explicit");
1488 break;
1489 }
1490 if (!node) {
1491 lyd_free(data);
1492 return NC_MSG_ERROR;
1493 }
1494 }
1495 break;
1496
1497 case NC_RPC_KILL:
1498 rpc_k = (struct nc_rpc_kill *)rpc;
1499
1500 data = lyd_new(NULL, ietfnc, "kill-session");
1501 sprintf(str, "%u", rpc_k->sid);
1502 lyd_new_leaf(data, ietfnc, "session-id", str);
1503 break;
1504
1505 case NC_RPC_COMMIT:
1506 rpc_com = (struct nc_rpc_commit *)rpc;
1507
1508 data = lyd_new(NULL, ietfnc, "commit");
1509 if (rpc_com->confirmed) {
1510 lyd_new_leaf(data, ietfnc, "confirmed", NULL);
1511 }
1512
1513 if (rpc_com->confirm_timeout) {
1514 sprintf(str, "%u", rpc_com->confirm_timeout);
1515 lyd_new_leaf(data, ietfnc, "confirm-timeout", str);
1516 }
1517
1518 if (rpc_com->persist) {
1519 node = lyd_new_leaf(data, ietfnc, "persist", rpc_com->persist);
1520 if (!node) {
1521 lyd_free(data);
1522 return NC_MSG_ERROR;
1523 }
1524 }
1525
1526 if (rpc_com->persist_id) {
1527 node = lyd_new_leaf(data, ietfnc, "persist-id", rpc_com->persist_id);
1528 if (!node) {
1529 lyd_free(data);
1530 return NC_MSG_ERROR;
1531 }
1532 }
1533 break;
1534
1535 case NC_RPC_DISCARD:
1536 data = lyd_new(NULL, ietfnc, "discard-changes");
1537 break;
1538
1539 case NC_RPC_CANCEL:
1540 rpc_can = (struct nc_rpc_cancel *)rpc;
1541
1542 data = lyd_new(NULL, ietfnc, "cancel-commit");
1543 if (rpc_can->persist_id) {
1544 node = lyd_new_leaf(data, ietfnc, "persist-id", rpc_can->persist_id);
1545 if (!node) {
1546 lyd_free(data);
1547 return NC_MSG_ERROR;
1548 }
1549 }
1550 break;
1551
1552 case NC_RPC_VALIDATE:
1553 rpc_val = (struct nc_rpc_validate *)rpc;
1554
1555 data = lyd_new(NULL, ietfnc, "validate");
1556 node = lyd_new(data, ietfnc, "source");
1557 if (rpc_val->url_config_src) {
1558 if (rpc_val->url_config_src[0] == '<') {
1559 node = lyd_new_anyxml(node, ietfnc, "config", rpc_val->url_config_src);
1560 } else {
1561 node = lyd_new_leaf(node, ietfnc, "url", rpc_val->url_config_src);
1562 }
1563 } else {
1564 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_val->source], NULL);
1565 }
1566 if (!node) {
1567 lyd_free(data);
1568 return NC_MSG_ERROR;
1569 }
1570 break;
1571
1572 case NC_RPC_GETSCHEMA:
1573 ietfncmon = ly_ctx_get_module(session->ctx, "ietf-netconf-monitoring", NULL);
1574 if (!ietfncmon) {
Michal Vaskod083db62016-01-19 10:31:29 +01001575 ERR("Session %u: missing ietf-netconf-monitoring schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001576 return NC_MSG_ERROR;
1577 }
1578
1579 rpc_gs = (struct nc_rpc_getschema *)rpc;
1580
1581 data = lyd_new(NULL, ietfncmon, "get-schema");
1582 node = lyd_new_leaf(data, ietfncmon, "identifier", rpc_gs->identifier);
1583 if (!node) {
1584 lyd_free(data);
1585 return NC_MSG_ERROR;
1586 }
1587 if (rpc_gs->version) {
1588 node = lyd_new_leaf(data, ietfncmon, "version", rpc_gs->version);
1589 if (!node) {
1590 lyd_free(data);
1591 return NC_MSG_ERROR;
1592 }
1593 }
1594 if (rpc_gs->format) {
1595 node = lyd_new_leaf(data, ietfncmon, "format", rpc_gs->format);
1596 if (!node) {
1597 lyd_free(data);
1598 return NC_MSG_ERROR;
1599 }
1600 }
1601 break;
1602
1603 case NC_RPC_SUBSCRIBE:
1604 notifs = ly_ctx_get_module(session->ctx, "notifications", NULL);
1605 if (!notifs) {
Michal Vaskod083db62016-01-19 10:31:29 +01001606 ERR("Session %u: missing notifications schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001607 return NC_MSG_ERROR;
1608 }
1609
1610 rpc_sub = (struct nc_rpc_subscribe *)rpc;
1611
1612 data = lyd_new(NULL, notifs, "create-subscription");
1613 if (rpc_sub->stream) {
1614 node = lyd_new_leaf(data, notifs, "stream", rpc_sub->stream);
1615 if (!node) {
1616 lyd_free(data);
1617 return NC_MSG_ERROR;
1618 }
1619 }
1620
1621 if (rpc_sub->filter) {
1622 if (rpc_sub->filter[0] == '<') {
1623 node = lyd_new_anyxml(data, notifs, "filter", rpc_sub->filter);
1624 lyd_insert_attr(node, "type", "subtree");
1625 } else {
1626 node = lyd_new_anyxml(data, notifs, "filter", NULL);
1627 lyd_insert_attr(node, "type", "xpath");
1628 lyd_insert_attr(node, "select", rpc_sub->filter);
1629 }
1630 if (!node) {
1631 lyd_free(data);
1632 return NC_MSG_ERROR;
1633 }
1634 }
1635
1636 if (rpc_sub->start) {
1637 node = lyd_new_leaf(data, notifs, "startTime", rpc_sub->start);
1638 if (!node) {
1639 lyd_free(data);
1640 return NC_MSG_ERROR;
1641 }
1642 }
1643
1644 if (rpc_sub->stop) {
1645 node = lyd_new_leaf(data, notifs, "stopTime", rpc_sub->stop);
1646 if (!node) {
1647 lyd_free(data);
1648 return NC_MSG_ERROR;
1649 }
1650 }
1651 break;
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001652 default:
1653 ERRINT;
1654 return NC_MSG_ERROR;
Michal Vasko086311b2016-01-08 09:53:11 +01001655 }
1656
1657 if (lyd_validate(data, LYD_OPT_STRICT)) {
1658 lyd_free(data);
1659 return NC_MSG_ERROR;
1660 }
1661
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001662 ret = nc_timedlock(session->ti_lock, timeout, NULL);
1663 if (ret == -1) {
1664 /* error */
1665 r = NC_MSG_ERROR;
1666 } else if (!ret) {
1667 /* blocking */
Michal Vasko086311b2016-01-08 09:53:11 +01001668 r = NC_MSG_WOULDBLOCK;
1669 } else {
1670 /* send RPC, store its message ID */
1671 r = nc_send_msg(session, data);
1672 cur_msgid = session->msgid;
1673 }
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001674 pthread_mutex_unlock(session->ti_lock);
Michal Vasko086311b2016-01-08 09:53:11 +01001675
1676 lyd_free(data);
1677
1678 if (r != NC_MSG_RPC) {
1679 return r;
1680 }
1681
1682 *msgid = cur_msgid;
1683 return NC_MSG_RPC;
1684}