blob: 5b9902cf56072f1fdc7c9c9bc86cad25010613d6 [file] [log] [blame]
Michal Vasko086311b2016-01-08 09:53:11 +01001/**
2 * \file session_client.c
3 * \author Michal Vasko <mvasko@cesnet.cz>
4 * \brief libnetconf2 session client functions
5 *
6 * Copyright (c) 2015 CESNET, z.s.p.o.
7 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +01008 * This source code is licensed under BSD 3-Clause License (the "License").
9 * You may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
Michal Vaskoafd416b2016-02-25 14:51:46 +010011 *
Radek Krejci9b81f5b2016-02-24 13:14:49 +010012 * https://opensource.org/licenses/BSD-3-Clause
Michal Vasko086311b2016-01-08 09:53:11 +010013 */
14
15#include <assert.h>
16#include <errno.h>
17#include <fcntl.h>
18#include <netdb.h>
Radek Krejci4cf58ec2016-02-26 15:04:52 +010019#include <netinet/in.h>
Michal Vasko086311b2016-01-08 09:53:11 +010020#include <pthread.h>
21#include <stdlib.h>
22#include <string.h>
23#include <sys/socket.h>
24#include <sys/stat.h>
25#include <sys/types.h>
26#include <unistd.h>
27#include <arpa/inet.h>
28#include <poll.h>
29
30#include <libyang/libyang.h>
31
Michal Vasko086311b2016-01-08 09:53:11 +010032#include "libnetconf.h"
Michal Vasko1a38c862016-01-15 15:50:07 +010033#include "session_client.h"
Michal Vaskoa8ad4482016-01-28 14:25:54 +010034#include "messages_client.h"
Michal Vasko086311b2016-01-08 09:53:11 +010035
Michal Vasko80ef5d22016-01-18 09:21:02 +010036static const char *ncds2str[] = {NULL, "config", "url", "running", "startup", "candidate"};
37
Michal Vaskodaf9a092016-02-09 10:42:05 +010038struct nc_client_opts client_opts;
Michal Vasko086311b2016-01-08 09:53:11 +010039
40API int
Michal Vasko7f1c0ef2016-03-11 11:13:06 +010041nc_client_set_schema_searchpath(const char *path)
Michal Vasko086311b2016-01-08 09:53:11 +010042{
Michal Vasko3031aae2016-01-27 16:07:18 +010043 if (client_opts.schema_searchpath) {
44 free(client_opts.schema_searchpath);
Michal Vasko086311b2016-01-08 09:53:11 +010045 }
Michal Vasko086311b2016-01-08 09:53:11 +010046
Michal Vasko7f1c78b2016-01-19 09:52:14 +010047 if (path) {
Michal Vasko3031aae2016-01-27 16:07:18 +010048 client_opts.schema_searchpath = strdup(path);
49 if (!client_opts.schema_searchpath) {
Michal Vasko7f1c78b2016-01-19 09:52:14 +010050 ERRMEM;
51 return 1;
52 }
53 } else {
Michal Vasko3031aae2016-01-27 16:07:18 +010054 client_opts.schema_searchpath = NULL;
Michal Vasko7f1c78b2016-01-19 09:52:14 +010055 }
56
57 return 0;
Michal Vasko086311b2016-01-08 09:53:11 +010058}
59
Michal Vasko7f1c0ef2016-03-11 11:13:06 +010060API const char *
61nc_client_get_schema_searchpath(void)
62{
63 return client_opts.schema_searchpath;
64}
65
Michal Vasko3031aae2016-01-27 16:07:18 +010066/* SCHEMAS_DIR not used (implicitly) */
Michal Vasko086311b2016-01-08 09:53:11 +010067static int
Michal Vaskoeee99412016-11-21 10:19:43 +010068ctx_check_and_load_model(struct nc_session *session, const char *module_cpblt)
Michal Vasko086311b2016-01-08 09:53:11 +010069{
70 const struct lys_module *module;
71 char *ptr, *ptr2;
72 char *model_name, *revision = NULL, *features = NULL;
73
Michal Vaskoeee99412016-11-21 10:19:43 +010074 assert(!strncmp(module_cpblt, "module=", 7));
75
76 ptr = (char *)module_cpblt + 7;
Michal Vasko086311b2016-01-08 09:53:11 +010077 ptr2 = strchr(ptr, '&');
78 if (!ptr2) {
79 ptr2 = ptr + strlen(ptr);
80 }
81 model_name = strndup(ptr, ptr2 - ptr);
82
83 /* parse revision */
Michal Vaskoeee99412016-11-21 10:19:43 +010084 ptr = strstr(module_cpblt, "revision=");
Michal Vasko086311b2016-01-08 09:53:11 +010085 if (ptr) {
86 ptr += 9;
87 ptr2 = strchr(ptr, '&');
88 if (!ptr2) {
89 ptr2 = ptr + strlen(ptr);
90 }
91 revision = strndup(ptr, ptr2 - ptr);
92 }
93
94 /* load module if needed */
95 module = ly_ctx_get_module(session->ctx, model_name, revision);
96 if (!module) {
97 module = ly_ctx_load_module(session->ctx, model_name, revision);
98 }
99
Michal Vasko086311b2016-01-08 09:53:11 +0100100 free(revision);
101 if (!module) {
Michal Vaskoef578332016-01-25 13:20:09 +0100102 WRN("Failed to load model \"%s\".", model_name);
103 free(model_name);
Michal Vasko086311b2016-01-08 09:53:11 +0100104 return 1;
105 }
Michal Vaskoef578332016-01-25 13:20:09 +0100106 free(model_name);
Michal Vasko086311b2016-01-08 09:53:11 +0100107
108 /* parse features */
Michal Vaskoeee99412016-11-21 10:19:43 +0100109 ptr = strstr(module_cpblt, "features=");
Michal Vasko086311b2016-01-08 09:53:11 +0100110 if (ptr) {
111 ptr += 9;
112 ptr2 = strchr(ptr, '&');
113 if (!ptr2) {
114 ptr2 = ptr + strlen(ptr);
115 }
116 features = strndup(ptr, ptr2 - ptr);
117 }
118
119 /* enable features */
120 if (features) {
121 /* basically manual strtok_r (to avoid macro) */
122 ptr2 = features;
123 for (ptr = features; *ptr; ++ptr) {
124 if (*ptr == ',') {
125 *ptr = '\0';
126 /* remember last feature */
127 ptr2 = ptr + 1;
128 }
129 }
130
131 ptr = features;
132 lys_features_enable(module, ptr);
133 while (ptr != ptr2) {
134 ptr += strlen(ptr) + 1;
135 lys_features_enable(module, ptr);
136 }
137
138 free(features);
139 }
140
141 return 0;
142}
143
Michal Vasko1aaa6602016-02-09 11:04:33 +0100144/* SCHEMAS_DIR used as the last resort */
Michal Vasko086311b2016-01-08 09:53:11 +0100145static int
Michal Vasko1aaa6602016-02-09 11:04:33 +0100146ctx_check_and_load_ietf_netconf(struct ly_ctx *ctx, const char **cpblts)
Michal Vasko086311b2016-01-08 09:53:11 +0100147{
148 int i;
149 const struct lys_module *ietfnc;
150
151 ietfnc = ly_ctx_get_module(ctx, "ietf-netconf", NULL);
152 if (!ietfnc) {
Michal Vasko1aaa6602016-02-09 11:04:33 +0100153 ietfnc = ly_ctx_load_module(ctx, "ietf-netconf", NULL);
154 if (!ietfnc) {
Michal Vasko086311b2016-01-08 09:53:11 +0100155 ietfnc = lys_parse_path(ctx, SCHEMAS_DIR"/ietf-netconf.yin", LYS_IN_YIN);
Michal Vasko086311b2016-01-08 09:53:11 +0100156 }
157 }
158 if (!ietfnc) {
159 ERR("Loading base NETCONF schema failed.");
160 return 1;
161 }
162
163 /* set supported capabilities from ietf-netconf */
164 for (i = 0; cpblts[i]; ++i) {
165 if (!strncmp(cpblts[i], "urn:ietf:params:netconf:capability:", 35)) {
166 if (!strncmp(cpblts[i] + 35, "writable-running", 16)) {
167 lys_features_enable(ietfnc, "writable-running");
168 } else if (!strncmp(cpblts[i] + 35, "candidate", 9)) {
169 lys_features_enable(ietfnc, "candidate");
170 } else if (!strcmp(cpblts[i] + 35, "confirmed-commit:1.1")) {
171 lys_features_enable(ietfnc, "confirmed-commit");
172 } else if (!strncmp(cpblts[i] + 35, "rollback-on-error", 17)) {
173 lys_features_enable(ietfnc, "rollback-on-error");
174 } else if (!strcmp(cpblts[i] + 35, "validate:1.1")) {
175 lys_features_enable(ietfnc, "validate");
176 } else if (!strncmp(cpblts[i] + 35, "startup", 7)) {
177 lys_features_enable(ietfnc, "startup");
178 } else if (!strncmp(cpblts[i] + 35, "url", 3)) {
179 lys_features_enable(ietfnc, "url");
180 } else if (!strncmp(cpblts[i] + 35, "xpath", 5)) {
181 lys_features_enable(ietfnc, "xpath");
182 }
183 }
184 }
185
186 return 0;
187}
188
189static char *
Michal Vaskod5ad5f72016-07-25 16:17:46 +0200190libyang_module_clb(const char *mod_name, const char *mod_rev, const char *submod_name, const char *submod_rev,
191 void *user_data, LYS_INFORMAT *format, void (**free_model_data)(void *model_data))
Michal Vasko086311b2016-01-08 09:53:11 +0100192{
193 struct nc_session *session = (struct nc_session *)user_data;
194 struct nc_rpc *rpc;
195 struct nc_reply *reply;
196 struct nc_reply_data *data_rpl;
Michal Vasko998ba412016-09-16 12:00:07 +0200197 struct nc_reply_error *error_rpl;
Radek Krejci539efb62016-08-24 15:05:16 +0200198 struct lyd_node_anydata *get_schema_data;
Michal Vasko086311b2016-01-08 09:53:11 +0100199 NC_MSG_TYPE msg;
Michal Vaskod91f6e62016-04-05 11:34:22 +0200200 char *model_data = NULL;
Michal Vasko086311b2016-01-08 09:53:11 +0100201 uint64_t msgid;
202
Michal Vaskod5ad5f72016-07-25 16:17:46 +0200203 if (submod_name) {
Michal Vasko3e7eaf42016-09-20 10:51:23 +0200204 rpc = nc_rpc_getschema(submod_name, submod_rev, "yang", NC_PARAMTYPE_CONST);
Michal Vaskod5ad5f72016-07-25 16:17:46 +0200205 } else {
Michal Vasko3e7eaf42016-09-20 10:51:23 +0200206 rpc = nc_rpc_getschema(mod_name, mod_rev, "yang", NC_PARAMTYPE_CONST);
Michal Vaskod5ad5f72016-07-25 16:17:46 +0200207 }
Michal Vasko086311b2016-01-08 09:53:11 +0100208
209 while ((msg = nc_send_rpc(session, rpc, 0, &msgid)) == NC_MSG_WOULDBLOCK) {
210 usleep(1000);
211 }
212 if (msg == NC_MSG_ERROR) {
Michal Vaskod083db62016-01-19 10:31:29 +0100213 ERR("Session %u: failed to send the <get-schema> RPC.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100214 nc_rpc_free(rpc);
215 return NULL;
216 }
217
Michal Vaskoff8ddc02016-10-03 14:13:29 +0200218 do {
Michal Vaskof471fa02017-02-15 10:48:12 +0100219 msg = nc_recv_reply(session, rpc, msgid, NC_READ_ACT_TIMEOUT * 1000, 0, &reply);
Michal Vaskoff8ddc02016-10-03 14:13:29 +0200220 } while (msg == NC_MSG_NOTIF);
Michal Vasko086311b2016-01-08 09:53:11 +0100221 nc_rpc_free(rpc);
222 if (msg == NC_MSG_WOULDBLOCK) {
Michal Vaskod083db62016-01-19 10:31:29 +0100223 ERR("Session %u: timeout for receiving reply to a <get-schema> expired.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100224 return NULL;
225 } else if (msg == NC_MSG_ERROR) {
Michal Vaskod083db62016-01-19 10:31:29 +0100226 ERR("Session %u: failed to receive a reply to <get-schema>.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100227 return NULL;
228 }
229
Michal Vasko998ba412016-09-16 12:00:07 +0200230 switch (reply->type) {
231 case NC_RPL_OK:
232 ERR("Session %u: unexpected reply OK to a <get-schema> RPC.", session->id);
233 nc_reply_free(reply);
234 return NULL;
235 case NC_RPL_DATA:
236 /* fine */
237 break;
238 case NC_RPL_ERROR:
239 error_rpl = (struct nc_reply_error *)reply;
240 if (error_rpl->count) {
241 ERR("Session %u: error reply to a <get-schema> RPC (tag \"%s\", message \"%s\").",
242 session->id, error_rpl->err[0].tag, error_rpl->err[0].message);
243 } else {
244 ERR("Session %u: unexpected reply error to a <get-schema> RPC.", session->id);
245 }
246 nc_reply_free(reply);
247 return NULL;
248 case NC_RPL_NOTIF:
249 ERR("Session %u: unexpected reply notification to a <get-schema> RPC.", session->id);
Michal Vasko05ba9df2016-01-13 14:40:27 +0100250 nc_reply_free(reply);
251 return NULL;
252 }
253
Michal Vasko086311b2016-01-08 09:53:11 +0100254 data_rpl = (struct nc_reply_data *)reply;
Michal Vaskob2583f12016-05-12 11:40:23 +0200255 if ((data_rpl->data->schema->nodetype != LYS_RPC) || strcmp(data_rpl->data->schema->name, "get-schema")
256 || !data_rpl->data->child || (data_rpl->data->child->schema->nodetype != LYS_ANYXML)) {
257 ERR("Session %u: unexpected data in reply to a <get-schema> RPC.", session->id);
258 nc_reply_free(reply);
259 return NULL;
260 }
Radek Krejci539efb62016-08-24 15:05:16 +0200261 get_schema_data = (struct lyd_node_anydata *)data_rpl->data->child;
262 switch (get_schema_data->value_type) {
263 case LYD_ANYDATA_CONSTSTRING:
264 case LYD_ANYDATA_STRING:
Michal Vaskob2583f12016-05-12 11:40:23 +0200265 model_data = strdup(get_schema_data->value.str);
Radek Krejci539efb62016-08-24 15:05:16 +0200266 break;
267 case LYD_ANYDATA_DATATREE:
268 lyd_print_mem(&model_data, get_schema_data->value.tree, LYD_XML, LYP_WITHSIBLINGS);
269 break;
270 case LYD_ANYDATA_XML:
271 lyxml_print_mem(&model_data, get_schema_data->value.xml, LYXML_PRINT_SIBLINGS);
272 break;
Radek Krejci03438ec2016-09-21 14:12:26 +0200273 case LYD_ANYDATA_JSON:
274 case LYD_ANYDATA_JSOND:
Michal Vasko94868ed2016-09-29 10:33:38 +0200275 case LYD_ANYDATA_SXML:
276 case LYD_ANYDATA_SXMLD:
Radek Krejci03438ec2016-09-21 14:12:26 +0200277 ERRINT;
278 break;
Michal Vaskod91f6e62016-04-05 11:34:22 +0200279 }
Michal Vasko086311b2016-01-08 09:53:11 +0100280 nc_reply_free(reply);
Michal Vaskoca4ad152016-03-03 15:50:45 +0100281 *free_model_data = free;
Michal Vasko3e7eaf42016-09-20 10:51:23 +0200282 *format = LYS_IN_YANG;
Michal Vasko086311b2016-01-08 09:53:11 +0100283
Michal Vasko086311b2016-01-08 09:53:11 +0100284 return model_data;
285}
286
287int
288nc_ctx_check_and_fill(struct nc_session *session)
289{
Michal Vaskoeee99412016-11-21 10:19:43 +0100290 const char *module_cpblt;
Michal Vaskoef578332016-01-25 13:20:09 +0100291 int i, get_schema_support = 0, ret = 0, r;
Michal Vaskocdeee432017-01-13 13:51:01 +0100292 ly_module_imp_clb old_clb = NULL;
Michal Vasko086311b2016-01-08 09:53:11 +0100293 void *old_data = NULL;
294
Michal Vasko2e6defd2016-10-07 15:48:15 +0200295 assert(session->opts.client.cpblts && session->ctx);
Michal Vasko086311b2016-01-08 09:53:11 +0100296
297 /* check if get-schema is supported */
Michal Vasko2e6defd2016-10-07 15:48:15 +0200298 for (i = 0; session->opts.client.cpblts[i]; ++i) {
299 if (!strncmp(session->opts.client.cpblts[i], "urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring", 51)) {
Michal Vasko086311b2016-01-08 09:53:11 +0100300 get_schema_support = 1;
301 break;
302 }
303 }
304
305 /* get-schema is supported, load local ietf-netconf-monitoring so we can create <get-schema> RPCs */
306 if (get_schema_support && !ly_ctx_get_module(session->ctx, "ietf-netconf-monitoring", NULL)) {
307 if (lys_parse_path(session->ctx, SCHEMAS_DIR"/ietf-netconf-monitoring.yin", LYS_IN_YIN)) {
308 /* set module retrieval using <get-schema> */
Michal Vaskocdeee432017-01-13 13:51:01 +0100309 old_clb = ly_ctx_get_module_imp_clb(session->ctx, &old_data);
310 ly_ctx_set_module_imp_clb(session->ctx, libyang_module_clb, session);
Michal Vasko086311b2016-01-08 09:53:11 +0100311 } else {
312 WRN("Loading NETCONF monitoring schema failed, cannot use <get-schema>.");
313 }
314 }
315
316 /* load base model disregarding whether it's in capabilities (but NETCONF capabilities are used to enable features) */
Michal Vasko2e6defd2016-10-07 15:48:15 +0200317 if (ctx_check_and_load_ietf_netconf(session->ctx, session->opts.client.cpblts)) {
Michal Vasko086311b2016-01-08 09:53:11 +0100318 if (old_clb) {
Michal Vaskocdeee432017-01-13 13:51:01 +0100319 ly_ctx_set_module_imp_clb(session->ctx, old_clb, old_data);
Michal Vasko086311b2016-01-08 09:53:11 +0100320 }
Michal Vaskoef578332016-01-25 13:20:09 +0100321 return -1;
Michal Vasko086311b2016-01-08 09:53:11 +0100322 }
323
324 /* load all other models */
Michal Vasko2e6defd2016-10-07 15:48:15 +0200325 for (i = 0; session->opts.client.cpblts[i]; ++i) {
Michal Vaskoeee99412016-11-21 10:19:43 +0100326 module_cpblt = strstr(session->opts.client.cpblts[i], "module=");
327 /* this capability requires a module */
328 if (module_cpblt) {
329 r = ctx_check_and_load_model(session, module_cpblt);
330 if (r == -1) {
331 ret = -1;
332 break;
Michal Vaskoef578332016-01-25 13:20:09 +0100333 }
334
Michal Vaskoeee99412016-11-21 10:19:43 +0100335 /* failed to load schema, but let's try to find it using user callback (or locally, if not set),
336 * if it was using get-schema */
337 if (r == 1) {
338 if (get_schema_support) {
339 VRB("Trying to load the schema from a different source.");
340 /* works even if old_clb is NULL */
Michal Vaskocdeee432017-01-13 13:51:01 +0100341 ly_ctx_set_module_imp_clb(session->ctx, old_clb, old_data);
Michal Vaskoeee99412016-11-21 10:19:43 +0100342 r = ctx_check_and_load_model(session, module_cpblt);
343 }
Michal Vaskoef578332016-01-25 13:20:09 +0100344
Michal Vaskoeee99412016-11-21 10:19:43 +0100345 /* fail again (or no other way to try), too bad */
346 if (r) {
347 session->flags |= NC_SESSION_CLIENT_NOT_STRICT;
348 }
349
350 /* set get-schema callback back */
Michal Vaskocdeee432017-01-13 13:51:01 +0100351 ly_ctx_set_module_imp_clb(session->ctx, &libyang_module_clb, session);
Michal Vaskoeee99412016-11-21 10:19:43 +0100352 }
Michal Vaskoef578332016-01-25 13:20:09 +0100353 }
Michal Vasko086311b2016-01-08 09:53:11 +0100354 }
355
356 if (old_clb) {
Michal Vaskocdeee432017-01-13 13:51:01 +0100357 ly_ctx_set_module_imp_clb(session->ctx, old_clb, old_data);
Michal Vasko086311b2016-01-08 09:53:11 +0100358 }
Michal Vaskoeee99412016-11-21 10:19:43 +0100359 if (session->flags & NC_SESSION_CLIENT_NOT_STRICT) {
360 WRN("Some models failed to be loaded, any data from these models (and any other unknown) will be ignored.");
Michal Vaskoef578332016-01-25 13:20:09 +0100361 }
362 return ret;
Michal Vasko086311b2016-01-08 09:53:11 +0100363}
364
365API struct nc_session *
366nc_connect_inout(int fdin, int fdout, struct ly_ctx *ctx)
367{
Michal Vaskod083db62016-01-19 10:31:29 +0100368 struct nc_session *session;
Michal Vasko086311b2016-01-08 09:53:11 +0100369
Michal Vasko45e53ae2016-04-07 11:46:03 +0200370 if (fdin < 0) {
371 ERRARG("fdin");
372 return NULL;
373 } else if (fdout < 0) {
374 ERRARG("fdout");
Michal Vasko086311b2016-01-08 09:53:11 +0100375 return NULL;
376 }
377
378 /* prepare session structure */
379 session = calloc(1, sizeof *session);
380 if (!session) {
381 ERRMEM;
382 return NULL;
383 }
384 session->status = NC_STATUS_STARTING;
385 session->side = NC_CLIENT;
386
387 /* transport specific data */
388 session->ti_type = NC_TI_FD;
389 session->ti.fd.in = fdin;
390 session->ti.fd.out = fdout;
391
392 /* assign context (dicionary needed for handshake) */
393 if (!ctx) {
394 ctx = ly_ctx_new(SCHEMAS_DIR);
Michal Vaskoe035b8e2016-03-11 10:10:03 +0100395 /* definitely should not happen, but be ready */
396 if (!ctx && !(ctx = ly_ctx_new(NULL))) {
397 /* that's just it */
398 goto fail;
399 }
Michal Vasko086311b2016-01-08 09:53:11 +0100400 } else {
401 session->flags |= NC_SESSION_SHAREDCTX;
402 }
403 session->ctx = ctx;
404
405 /* NETCONF handshake */
Michal Vasko71090fc2016-05-24 16:37:28 +0200406 if (nc_handshake(session) != NC_MSG_HELLO) {
Michal Vasko086311b2016-01-08 09:53:11 +0100407 goto fail;
408 }
409 session->status = NC_STATUS_RUNNING;
410
Michal Vaskoef578332016-01-25 13:20:09 +0100411 if (nc_ctx_check_and_fill(session) == -1) {
Michal Vasko086311b2016-01-08 09:53:11 +0100412 goto fail;
413 }
414
415 return session;
416
417fail:
Michal Vaskoe1a64ec2016-03-01 12:21:58 +0100418 nc_session_free(session, NULL);
Michal Vasko086311b2016-01-08 09:53:11 +0100419 return NULL;
420}
421
422int
Michal Vaskof05562c2016-01-20 12:06:43 +0100423nc_sock_connect(const char* host, uint16_t port)
Michal Vasko086311b2016-01-08 09:53:11 +0100424{
Michal Vasko0190bc32016-03-02 15:47:49 +0100425 int i, sock = -1, flags;
Michal Vasko086311b2016-01-08 09:53:11 +0100426 struct addrinfo hints, *res_list, *res;
427 char port_s[6]; /* length of string representation of short int */
428
429 snprintf(port_s, 6, "%u", port);
430
431 /* Connect to a server */
432 memset(&hints, 0, sizeof hints);
433 hints.ai_family = AF_UNSPEC;
434 hints.ai_socktype = SOCK_STREAM;
435 hints.ai_protocol = IPPROTO_TCP;
436 i = getaddrinfo(host, port_s, &hints, &res_list);
437 if (i != 0) {
438 ERR("Unable to translate the host address (%s).", gai_strerror(i));
439 return -1;
440 }
441
Michal Vasko1f0b2ac2016-10-13 10:33:50 +0200442 for (res = res_list; res != NULL; res = res->ai_next) {
Michal Vasko086311b2016-01-08 09:53:11 +0100443 sock = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
444 if (sock == -1) {
445 /* socket was not created, try another resource */
Michal Vasko1f0b2ac2016-10-13 10:33:50 +0200446 continue;
Michal Vasko086311b2016-01-08 09:53:11 +0100447 }
448
449 if (connect(sock, res->ai_addr, res->ai_addrlen) == -1) {
450 /* network connection failed, try another resource */
Michal Vasko086311b2016-01-08 09:53:11 +0100451 close(sock);
452 sock = -1;
Michal Vasko1f0b2ac2016-10-13 10:33:50 +0200453 continue;
Michal Vasko086311b2016-01-08 09:53:11 +0100454 }
455
Michal Vasko0190bc32016-03-02 15:47:49 +0100456 /* make the socket non-blocking */
457 if (((flags = fcntl(sock, F_GETFL)) == -1) || (fcntl(sock, F_SETFL, flags | O_NONBLOCK) == -1)) {
458 ERR("Fcntl failed (%s).", strerror(errno));
Michal Vasko0f74da52016-03-03 08:52:52 +0100459 close(sock);
Michal Vaskoa8a66b62016-10-05 14:14:19 +0200460 freeaddrinfo(res_list);
Michal Vasko0190bc32016-03-02 15:47:49 +0100461 return -1;
462 }
463
Michal Vasko086311b2016-01-08 09:53:11 +0100464 /* we're done, network connection established */
465 break;
Michal Vasko086311b2016-01-08 09:53:11 +0100466 }
467
Michal Vasko29af44b2016-10-13 10:59:55 +0200468 if (sock != -1) {
Michal Vaskod083db62016-01-19 10:31:29 +0100469 VRB("Successfully connected to %s:%s over %s.", host, port_s, (res->ai_family == AF_INET6) ? "IPv6" : "IPv4");
Michal Vasko086311b2016-01-08 09:53:11 +0100470 }
471 freeaddrinfo(res_list);
472
473 return sock;
474}
475
Michal Vasko086311b2016-01-08 09:53:11 +0100476static NC_MSG_TYPE
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100477get_msg(struct nc_session *session, int timeout, uint64_t msgid, struct lyxml_elem **msg)
Michal Vasko086311b2016-01-08 09:53:11 +0100478{
Michal Vasko62be1ce2016-03-03 13:24:52 +0100479 int r;
Michal Vasko086311b2016-01-08 09:53:11 +0100480 char *ptr;
481 const char *str_msgid;
482 uint64_t cur_msgid;
483 struct lyxml_elem *xml;
Michal Vasko2518b6b2016-01-28 13:24:53 +0100484 struct nc_msg_cont *cont, **cont_ptr;
Michal Vasko086311b2016-01-08 09:53:11 +0100485 NC_MSG_TYPE msgtype = 0; /* NC_MSG_ERROR */
486
Michal vasko50cc94f2016-10-04 13:46:20 +0200487 r = nc_timedlock(session->ti_lock, timeout, __func__);
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100488 if (r == -1) {
Michal Vasko086311b2016-01-08 09:53:11 +0100489 /* error */
490 return NC_MSG_ERROR;
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100491 } else if (!r) {
Michal Vasko086311b2016-01-08 09:53:11 +0100492 /* timeout */
493 return NC_MSG_WOULDBLOCK;
494 }
495
496 /* try to get notification from the session's queue */
Michal Vasko2e6defd2016-10-07 15:48:15 +0200497 if (!msgid && session->opts.client.notifs) {
498 cont = session->opts.client.notifs;
499 session->opts.client.notifs = cont->next;
Michal Vasko086311b2016-01-08 09:53:11 +0100500
Michal Vasko71ba2da2016-05-04 10:53:16 +0200501 xml = cont->msg;
Michal Vasko086311b2016-01-08 09:53:11 +0100502 free(cont);
503
Michal Vasko71ba2da2016-05-04 10:53:16 +0200504 msgtype = NC_MSG_NOTIF;
Michal Vasko086311b2016-01-08 09:53:11 +0100505 }
506
507 /* try to get rpc-reply from the session's queue */
Michal Vasko2e6defd2016-10-07 15:48:15 +0200508 if (msgid && session->opts.client.replies) {
509 cont = session->opts.client.replies;
510 session->opts.client.replies = cont->next;
Michal Vasko2518b6b2016-01-28 13:24:53 +0100511
Michal Vasko71ba2da2016-05-04 10:53:16 +0200512 xml = cont->msg;
513 free(cont);
Michal Vasko086311b2016-01-08 09:53:11 +0100514
Michal Vasko71ba2da2016-05-04 10:53:16 +0200515 msgtype = NC_MSG_REPLY;
Michal Vasko086311b2016-01-08 09:53:11 +0100516 }
517
Michal Vasko71ba2da2016-05-04 10:53:16 +0200518 if (!msgtype) {
519 /* read message from wire */
520 msgtype = nc_read_msg_poll(session, timeout, &xml);
521 }
Michal Vasko086311b2016-01-08 09:53:11 +0100522
523 /* we read rpc-reply, want a notif */
524 if (!msgid && (msgtype == NC_MSG_REPLY)) {
Michal Vasko2e6defd2016-10-07 15:48:15 +0200525 cont_ptr = &session->opts.client.replies;
Michal Vasko086311b2016-01-08 09:53:11 +0100526 while (*cont_ptr) {
527 cont_ptr = &((*cont_ptr)->next);
528 }
529 *cont_ptr = malloc(sizeof **cont_ptr);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100530 if (!*cont_ptr) {
531 ERRMEM;
Michal Vasko71ba2da2016-05-04 10:53:16 +0200532 pthread_mutex_unlock(session->ti_lock);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100533 lyxml_free(session->ctx, xml);
534 return NC_MSG_ERROR;
535 }
Michal Vasko086311b2016-01-08 09:53:11 +0100536 (*cont_ptr)->msg = xml;
537 (*cont_ptr)->next = NULL;
538 }
539
540 /* we read notif, want a rpc-reply */
541 if (msgid && (msgtype == NC_MSG_NOTIF)) {
Michal Vaskoa8ad4482016-01-28 14:25:54 +0100542 /* TODO check whether the session is even subscribed */
543 /*if (!session->notif) {
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100544 pthread_mutex_unlock(session->ti_lock);
Michal Vaskod083db62016-01-19 10:31:29 +0100545 ERR("Session %u: received a <notification> but session is not subscribed.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100546 lyxml_free(session->ctx, xml);
Michal Vasko2518b6b2016-01-28 13:24:53 +0100547 return NC_MSG_ERROR;
Michal Vaskoa8ad4482016-01-28 14:25:54 +0100548 }*/
Michal Vasko086311b2016-01-08 09:53:11 +0100549
Michal Vasko2e6defd2016-10-07 15:48:15 +0200550 cont_ptr = &session->opts.client.notifs;
Michal Vasko086311b2016-01-08 09:53:11 +0100551 while (*cont_ptr) {
552 cont_ptr = &((*cont_ptr)->next);
553 }
554 *cont_ptr = malloc(sizeof **cont_ptr);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100555 if (!cont_ptr) {
556 ERRMEM;
Michal Vasko71ba2da2016-05-04 10:53:16 +0200557 pthread_mutex_unlock(session->ti_lock);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100558 lyxml_free(session->ctx, xml);
559 return NC_MSG_ERROR;
560 }
Michal Vasko086311b2016-01-08 09:53:11 +0100561 (*cont_ptr)->msg = xml;
562 (*cont_ptr)->next = NULL;
563 }
564
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100565 pthread_mutex_unlock(session->ti_lock);
Michal Vasko086311b2016-01-08 09:53:11 +0100566
567 switch (msgtype) {
568 case NC_MSG_NOTIF:
Michal Vasko2518b6b2016-01-28 13:24:53 +0100569 if (!msgid) {
570 *msg = xml;
Michal Vasko086311b2016-01-08 09:53:11 +0100571 }
Michal Vasko086311b2016-01-08 09:53:11 +0100572 break;
573
574 case NC_MSG_REPLY:
Michal Vasko2518b6b2016-01-28 13:24:53 +0100575 if (msgid) {
Michal Vasko71ba2da2016-05-04 10:53:16 +0200576 /* check message-id */
577 str_msgid = lyxml_get_attr(xml, "message-id", NULL);
578 if (!str_msgid) {
579 ERR("Session %u: received a <rpc-reply> without a message-id.", session->id);
580 msgtype = NC_MSG_REPLY_ERR_MSGID;
581 } else {
582 cur_msgid = strtoul(str_msgid, &ptr, 10);
583 if (cur_msgid != msgid) {
584 ERR("Session %u: received a <rpc-reply> with an unexpected message-id \"%s\".",
585 session->id, str_msgid);
586 msgtype = NC_MSG_REPLY_ERR_MSGID;
587 }
588 }
Michal Vasko2518b6b2016-01-28 13:24:53 +0100589 *msg = xml;
Michal Vasko086311b2016-01-08 09:53:11 +0100590 }
Michal Vasko086311b2016-01-08 09:53:11 +0100591 break;
592
593 case NC_MSG_HELLO:
Michal Vaskod083db62016-01-19 10:31:29 +0100594 ERR("Session %u: received another <hello> message.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100595 lyxml_free(session->ctx, xml);
Michal Vasko71ba2da2016-05-04 10:53:16 +0200596 msgtype = NC_MSG_ERROR;
597 break;
Michal Vasko086311b2016-01-08 09:53:11 +0100598
599 case NC_MSG_RPC:
Michal Vaskod083db62016-01-19 10:31:29 +0100600 ERR("Session %u: received <rpc> from a NETCONF server.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +0100601 lyxml_free(session->ctx, xml);
Michal Vasko71ba2da2016-05-04 10:53:16 +0200602 msgtype = NC_MSG_ERROR;
603 break;
Michal Vasko086311b2016-01-08 09:53:11 +0100604
605 default:
606 /* NC_MSG_WOULDBLOCK and NC_MSG_ERROR - pass it out;
607 * NC_MSG_NONE is not returned by nc_read_msg()
608 */
609 break;
610 }
611
612 return msgtype;
613}
614
615/* cannot strictly fail, but does not need to fill any error parameter at all */
616static void
617parse_rpc_error(struct ly_ctx *ctx, struct lyxml_elem *xml, struct nc_err *err)
618{
619 struct lyxml_elem *iter, *next, *info;
620
621 LY_TREE_FOR(xml->child, iter) {
622 if (!iter->ns) {
623 if (iter->content) {
624 WRN("<rpc-error> child \"%s\" with value \"%s\" without namespace.", iter->name, iter->content);
625 } else {
626 WRN("<rpc-error> child \"%s\" without namespace.", iter->name);
627 }
628 continue;
629 } else if (strcmp(iter->ns->value, NC_NS_BASE)) {
630 if (iter->content) {
631 WRN("<rpc-error> child \"%s\" with value \"%s\" in an unknown namespace \"%s\".",
632 iter->name, iter->content, iter->ns->value);
633 } else {
634 WRN("<rpc-error> child \"%s\" in an unknown namespace \"%s\".", iter->name, iter->ns->value);
635 }
636 continue;
637 }
638
639 if (!strcmp(iter->name, "error-type")) {
640 if (!iter->content || (strcmp(iter->content, "transport") && strcmp(iter->content, "rpc")
641 && strcmp(iter->content, "protocol") && strcmp(iter->content, "application"))) {
642 WRN("<rpc-error> <error-type> unknown value \"%s\".", (iter->content ? iter->content : ""));
643 } else if (err->type) {
644 WRN("<rpc-error> <error-type> duplicated.");
645 } else {
646 err->type = lydict_insert(ctx, iter->content, 0);
647 }
648 } else if (!strcmp(iter->name, "error-tag")) {
649 if (!iter->content || (strcmp(iter->content, "in-use") && strcmp(iter->content, "invalid-value")
650 && strcmp(iter->content, "too-big") && strcmp(iter->content, "missing-attribute")
651 && strcmp(iter->content, "bad-attribute") && strcmp(iter->content, "unknown-attribute")
652 && strcmp(iter->content, "missing-element") && strcmp(iter->content, "bad-element")
653 && strcmp(iter->content, "unknown-element") && strcmp(iter->content, "unknown-namespace")
654 && strcmp(iter->content, "access-denied") && strcmp(iter->content, "lock-denied")
655 && strcmp(iter->content, "resource-denied") && strcmp(iter->content, "rollback-failed")
656 && strcmp(iter->content, "data-exists") && strcmp(iter->content, "data-missing")
657 && strcmp(iter->content, "operation-not-supported") && strcmp(iter->content, "operation-failed")
658 && strcmp(iter->content, "malformed-message"))) {
659 WRN("<rpc-error> <error-tag> unknown value \"%s\".", (iter->content ? iter->content : ""));
660 } else if (err->tag) {
661 WRN("<rpc-error> <error-tag> duplicated.");
662 } else {
663 err->tag = lydict_insert(ctx, iter->content, 0);
664 }
665 } else if (!strcmp(iter->name, "error-severity")) {
666 if (!iter->content || (strcmp(iter->content, "error") && strcmp(iter->content, "warning"))) {
667 WRN("<rpc-error> <error-severity> unknown value \"%s\".", (iter->content ? iter->content : ""));
668 } else if (err->severity) {
669 WRN("<rpc-error> <error-severity> duplicated.");
670 } else {
671 err->severity = lydict_insert(ctx, iter->content, 0);
672 }
673 } else if (!strcmp(iter->name, "error-app-tag")) {
674 if (err->apptag) {
675 WRN("<rpc-error> <error-app-tag> duplicated.");
676 } else {
677 err->apptag = lydict_insert(ctx, (iter->content ? iter->content : ""), 0);
678 }
679 } else if (!strcmp(iter->name, "error-path")) {
680 if (err->path) {
681 WRN("<rpc-error> <error-path> duplicated.");
682 } else {
683 err->path = lydict_insert(ctx, (iter->content ? iter->content : ""), 0);
684 }
685 } else if (!strcmp(iter->name, "error-message")) {
686 if (err->message) {
687 WRN("<rpc-error> <error-message> duplicated.");
688 } else {
689 err->message_lang = lyxml_get_attr(iter, "xml:lang", NULL);
690 if (!err->message_lang) {
691 VRB("<rpc-error> <error-message> without the recommended \"xml:lang\" attribute.");
692 }
693 err->message = lydict_insert(ctx, (iter->content ? iter->content : ""), 0);
694 }
695 } else if (!strcmp(iter->name, "error-info")) {
696 LY_TREE_FOR_SAFE(iter->child, next, info) {
697 if (info->ns && !strcmp(info->ns->value, NC_NS_BASE)) {
698 if (!strcmp(info->name, "session-id")) {
699 if (err->sid) {
700 WRN("<rpc-error> <error-info> <session-id> duplicated.");
701 } else {
702 err->sid = lydict_insert(ctx, (info->content ? info->content : ""), 0);
703 }
704 } else if (!strcmp(info->name, "bad-attr")) {
705 ++err->attr_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100706 err->attr = nc_realloc(err->attr, err->attr_count * sizeof *err->attr);
707 if (!err->attr) {
708 ERRMEM;
709 return;
710 }
Michal Vasko086311b2016-01-08 09:53:11 +0100711 err->attr[err->attr_count - 1] = lydict_insert(ctx, (info->content ? info->content : ""), 0);
712 } else if (!strcmp(info->name, "bad-element")) {
713 ++err->elem_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100714 err->elem = nc_realloc(err->elem, err->elem_count * sizeof *err->elem);
715 if (!err->elem) {
716 ERRMEM;
717 return;
718 }
Michal Vasko086311b2016-01-08 09:53:11 +0100719 err->elem[err->elem_count - 1] = lydict_insert(ctx, (info->content ? info->content : ""), 0);
720 } else if (!strcmp(info->name, "bad-namespace")) {
721 ++err->ns_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100722 err->ns = nc_realloc(err->ns, err->ns_count * sizeof *err->ns);
723 if (!err->ns) {
724 ERRMEM;
725 return;
726 }
Michal Vasko086311b2016-01-08 09:53:11 +0100727 err->ns[err->ns_count - 1] = lydict_insert(ctx, (info->content ? info->content : ""), 0);
728 } else {
729 if (info->content) {
730 WRN("<rpc-error> <error-info> unknown child \"%s\" with value \"%s\".",
731 info->name, info->content);
732 } else {
733 WRN("<rpc-error> <error-info> unknown child \"%s\".", info->name);
734 }
735 }
736 } else {
737 lyxml_unlink(ctx, info);
738 ++err->other_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100739 err->other = nc_realloc(err->other, err->other_count * sizeof *err->other);
740 if (!err->other) {
741 ERRMEM;
742 return;
743 }
Michal Vasko086311b2016-01-08 09:53:11 +0100744 err->other[err->other_count - 1] = info;
745 }
746 }
747 } else {
748 if (iter->content) {
749 WRN("<rpc-error> unknown child \"%s\" with value \"%s\".", iter->name, iter->content);
750 } else {
751 WRN("<rpc-error> unknown child \"%s\".", iter->name);
752 }
753 }
754 }
755}
756
757static struct nc_reply *
Michal Vaskoeb7080e2016-02-18 13:27:05 +0100758parse_reply(struct ly_ctx *ctx, struct lyxml_elem *xml, struct nc_rpc *rpc, int parseroptions)
Michal Vasko086311b2016-01-08 09:53:11 +0100759{
760 struct lyxml_elem *iter;
Michal Vaskoe1708602016-10-18 12:17:22 +0200761 struct lyd_node *data = NULL, *rpc_act = NULL;
Michal Vasko1a38c862016-01-15 15:50:07 +0100762 struct nc_client_reply_error *error_rpl;
Michal Vasko086311b2016-01-08 09:53:11 +0100763 struct nc_reply_data *data_rpl;
764 struct nc_reply *reply = NULL;
Michal Vasko90e8e692016-07-13 12:27:57 +0200765 struct nc_rpc_act_generic *rpc_gen;
Michal Vasko086311b2016-01-08 09:53:11 +0100766 int i;
767
768 if (!xml->child) {
769 ERR("An empty <rpc-reply>.");
770 return NULL;
771 }
772
773 /* rpc-error */
774 if (!strcmp(xml->child->name, "rpc-error") && xml->child->ns && !strcmp(xml->child->ns->value, NC_NS_BASE)) {
775 /* count and check elements */
776 i = 0;
777 LY_TREE_FOR(xml->child, iter) {
778 if (strcmp(iter->name, "rpc-error")) {
779 ERR("<rpc-reply> content mismatch (<rpc-error> and <%s>).", iter->name);
780 return NULL;
781 } else if (!iter->ns) {
782 ERR("<rpc-reply> content mismatch (<rpc-error> without namespace).");
783 return NULL;
784 } else if (strcmp(iter->ns->value, NC_NS_BASE)) {
785 ERR("<rpc-reply> content mismatch (<rpc-error> with NS \"%s\").", iter->ns->value);
786 return NULL;
787 }
788 ++i;
789 }
790
791 error_rpl = malloc(sizeof *error_rpl);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100792 if (!error_rpl) {
793 ERRMEM;
794 return NULL;
795 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100796 error_rpl->type = NC_RPL_ERROR;
Michal Vasko086311b2016-01-08 09:53:11 +0100797 error_rpl->err = calloc(i, sizeof *error_rpl->err);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100798 if (!error_rpl->err) {
799 ERRMEM;
800 free(error_rpl);
801 return NULL;
802 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100803 error_rpl->count = i;
Michal Vasko1a38c862016-01-15 15:50:07 +0100804 error_rpl->ctx = ctx;
Michal Vasko086311b2016-01-08 09:53:11 +0100805 reply = (struct nc_reply *)error_rpl;
806
807 i = 0;
808 LY_TREE_FOR(xml->child, iter) {
809 parse_rpc_error(ctx, iter, error_rpl->err + i);
810 ++i;
811 }
812
813 /* ok */
814 } else if (!strcmp(xml->child->name, "ok") && xml->child->ns && !strcmp(xml->child->ns->value, NC_NS_BASE)) {
815 if (xml->child->next) {
816 ERR("<rpc-reply> content mismatch (<ok> and <%s>).", xml->child->next->name);
817 return NULL;
818 }
819 reply = malloc(sizeof *reply);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100820 if (!reply) {
821 ERRMEM;
822 return NULL;
823 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100824 reply->type = NC_RPL_OK;
Michal Vasko086311b2016-01-08 09:53:11 +0100825
826 /* some RPC output */
827 } else {
828 switch (rpc->type) {
Michal Vasko90e8e692016-07-13 12:27:57 +0200829 case NC_RPC_ACT_GENERIC:
830 rpc_gen = (struct nc_rpc_act_generic *)rpc;
Michal Vasko086311b2016-01-08 09:53:11 +0100831
832 if (rpc_gen->has_data) {
Michal Vaskoe1708602016-10-18 12:17:22 +0200833 rpc_act = rpc_gen->content.data;
Michal Vasko086311b2016-01-08 09:53:11 +0100834 } else {
Michal Vaskoeee99412016-11-21 10:19:43 +0100835 rpc_act = lyd_parse_mem(ctx, rpc_gen->content.xml_str, LYD_XML, LYD_OPT_RPC | parseroptions, NULL);
Michal Vaskoe1708602016-10-18 12:17:22 +0200836 if (!rpc_act) {
Michal Vasko90e8e692016-07-13 12:27:57 +0200837 ERR("Failed to parse a generic RPC/action XML.");
Michal Vasko086311b2016-01-08 09:53:11 +0100838 return NULL;
839 }
Michal Vasko90e8e692016-07-13 12:27:57 +0200840 }
Michal Vasko086311b2016-01-08 09:53:11 +0100841 break;
842
843 case NC_RPC_GETCONFIG:
844 case NC_RPC_GET:
Michal Vasko13ed2942016-02-29 16:21:00 +0100845 if (!xml->child->child) {
846 /* we did not receive any data */
847 data_rpl = malloc(sizeof *data_rpl);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100848 if (!data_rpl) {
849 ERRMEM;
850 return NULL;
851 }
Michal Vasko13ed2942016-02-29 16:21:00 +0100852 data_rpl->type = NC_RPL_DATA;
853 data_rpl->data = NULL;
854 return (struct nc_reply *)data_rpl;
855 }
856
Michal Vasko086311b2016-01-08 09:53:11 +0100857 /* special treatment */
Michal Vasko0a5ae9a2016-11-15 11:54:47 +0100858 data = lyd_parse_xml(ctx, &xml->child->child,
859 LYD_OPT_DESTRUCT | (rpc->type == NC_RPC_GETCONFIG ? LYD_OPT_GETCONFIG : LYD_OPT_GET)
Michal Vaskoeee99412016-11-21 10:19:43 +0100860 | parseroptions);
Michal Vasko086311b2016-01-08 09:53:11 +0100861 if (!data) {
862 ERR("Failed to parse <%s> reply.", (rpc->type == NC_RPC_GETCONFIG ? "get-config" : "get"));
863 return NULL;
864 }
865 break;
866
867 case NC_RPC_GETSCHEMA:
Michal Vaskoe1708602016-10-18 12:17:22 +0200868 rpc_act = lyd_new(NULL, ly_ctx_get_module(ctx, "ietf-netconf-monitoring", NULL), "get-schema");
869 if (!rpc_act) {
Michal Vasko9e036d52016-01-08 10:49:26 +0100870 ERRINT;
Michal Vasko086311b2016-01-08 09:53:11 +0100871 return NULL;
872 }
873 break;
874
875 case NC_RPC_EDIT:
876 case NC_RPC_COPY:
877 case NC_RPC_DELETE:
878 case NC_RPC_LOCK:
879 case NC_RPC_UNLOCK:
880 case NC_RPC_KILL:
881 case NC_RPC_COMMIT:
882 case NC_RPC_DISCARD:
883 case NC_RPC_CANCEL:
884 case NC_RPC_VALIDATE:
885 case NC_RPC_SUBSCRIBE:
886 /* there is no output defined */
887 ERR("Unexpected data reply (root elem \"%s\").", xml->child->name);
888 return NULL;
Michal Vasko7f1c78b2016-01-19 09:52:14 +0100889 default:
890 ERRINT;
891 return NULL;
Michal Vasko086311b2016-01-08 09:53:11 +0100892 }
893
894 data_rpl = malloc(sizeof *data_rpl);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100895 if (!data_rpl) {
896 ERRMEM;
897 return NULL;
898 }
Michal Vasko05ba9df2016-01-13 14:40:27 +0100899 data_rpl->type = NC_RPL_DATA;
Michal Vasko086311b2016-01-08 09:53:11 +0100900 if (!data) {
Michal Vasko68b3f292016-09-16 12:00:32 +0200901 data_rpl->data = lyd_parse_xml(ctx, &xml->child, LYD_OPT_RPCREPLY | LYD_OPT_DESTRUCT | parseroptions,
Michal Vaskocc3d52b2016-10-18 12:17:22 +0200902 rpc_act, NULL);
Michal Vasko086311b2016-01-08 09:53:11 +0100903 } else {
904 /* <get>, <get-config> */
905 data_rpl->data = data;
906 }
Michal Vaskoe1708602016-10-18 12:17:22 +0200907 lyd_free_withsiblings(rpc_act);
Michal Vasko086311b2016-01-08 09:53:11 +0100908 if (!data_rpl->data) {
909 ERR("Failed to parse <rpc-reply>.");
910 free(data_rpl);
911 return NULL;
912 }
913 reply = (struct nc_reply *)data_rpl;
914 }
915
916 return reply;
917}
918
Radek Krejci53691be2016-02-22 13:58:37 +0100919#if defined(NC_ENABLED_SSH) || defined(NC_ENABLED_TLS)
Michal Vasko3d865d22016-01-28 16:00:53 +0100920
Michal Vasko3031aae2016-01-27 16:07:18 +0100921int
922nc_client_ch_add_bind_listen(const char *address, uint16_t port, NC_TRANSPORT_IMPL ti)
923{
924 int sock;
925
Michal Vasko45e53ae2016-04-07 11:46:03 +0200926 if (!address) {
927 ERRARG("address");
928 return -1;
929 } else if (!port) {
930 ERRARG("port");
Michal Vasko3031aae2016-01-27 16:07:18 +0100931 return -1;
932 }
933
934 sock = nc_sock_listen(address, port);
935 if (sock == -1) {
936 return -1;
937 }
938
939 ++client_opts.ch_bind_count;
Michal Vasko4eb3c312016-03-01 14:09:37 +0100940 client_opts.ch_binds = nc_realloc(client_opts.ch_binds, client_opts.ch_bind_count * sizeof *client_opts.ch_binds);
941 if (!client_opts.ch_binds) {
942 ERRMEM;
Michal Vasko0f74da52016-03-03 08:52:52 +0100943 close(sock);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100944 return -1;
945 }
Michal Vasko3031aae2016-01-27 16:07:18 +0100946
Michal Vasko2e6defd2016-10-07 15:48:15 +0200947 client_opts.ch_bind_ti = nc_realloc(client_opts.ch_bind_ti, client_opts.ch_bind_count * sizeof *client_opts.ch_bind_ti);
948 if (!client_opts.ch_bind_ti) {
949 ERRMEM;
950 close(sock);
951 return -1;
952 }
953 client_opts.ch_bind_ti[client_opts.ch_bind_count - 1] = ti;
954
Michal Vasko3031aae2016-01-27 16:07:18 +0100955 client_opts.ch_binds[client_opts.ch_bind_count - 1].address = strdup(address);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100956 if (!client_opts.ch_binds[client_opts.ch_bind_count - 1].address) {
957 ERRMEM;
Michal Vasko0f74da52016-03-03 08:52:52 +0100958 close(sock);
Michal Vasko4eb3c312016-03-01 14:09:37 +0100959 return -1;
960 }
Michal Vasko3031aae2016-01-27 16:07:18 +0100961 client_opts.ch_binds[client_opts.ch_bind_count - 1].port = port;
962 client_opts.ch_binds[client_opts.ch_bind_count - 1].sock = sock;
Michal Vasko0a3f3752016-10-13 14:58:38 +0200963 client_opts.ch_binds[client_opts.ch_bind_count - 1].pollin = 0;
Michal Vasko3031aae2016-01-27 16:07:18 +0100964
965 return 0;
966}
967
968int
969nc_client_ch_del_bind(const char *address, uint16_t port, NC_TRANSPORT_IMPL ti)
970{
971 uint32_t i;
972 int ret = -1;
973
974 if (!address && !port && !ti) {
975 for (i = 0; i < client_opts.ch_bind_count; ++i) {
976 close(client_opts.ch_binds[i].sock);
977 free((char *)client_opts.ch_binds[i].address);
978
979 ret = 0;
980 }
981 free(client_opts.ch_binds);
982 client_opts.ch_binds = NULL;
983 client_opts.ch_bind_count = 0;
984 } else {
985 for (i = 0; i < client_opts.ch_bind_count; ++i) {
986 if ((!address || !strcmp(client_opts.ch_binds[i].address, address))
987 && (!port || (client_opts.ch_binds[i].port == port))
Michal Vasko2e6defd2016-10-07 15:48:15 +0200988 && (!ti || (client_opts.ch_bind_ti[i] == ti))) {
Michal Vasko3031aae2016-01-27 16:07:18 +0100989 close(client_opts.ch_binds[i].sock);
990 free((char *)client_opts.ch_binds[i].address);
991
992 --client_opts.ch_bind_count;
Michal Vasko66c762a2016-10-13 10:34:14 +0200993 if (!client_opts.ch_bind_count) {
994 free(client_opts.ch_binds);
995 client_opts.ch_binds = NULL;
996 } else if (i < client_opts.ch_bind_count) {
997 memcpy(&client_opts.ch_binds[i], &client_opts.ch_binds[client_opts.ch_bind_count], sizeof *client_opts.ch_binds);
998 client_opts.ch_bind_ti[i] = client_opts.ch_bind_ti[client_opts.ch_bind_count];
999 }
Michal Vasko3031aae2016-01-27 16:07:18 +01001000
1001 ret = 0;
1002 }
1003 }
1004 }
1005
1006 return ret;
1007}
1008
1009API int
1010nc_accept_callhome(int timeout, struct ly_ctx *ctx, struct nc_session **session)
1011{
1012 int sock;
1013 char *host = NULL;
1014 uint16_t port, idx;
1015
Michal Vasko45e53ae2016-04-07 11:46:03 +02001016 if (!client_opts.ch_binds) {
1017 ERRINIT;
1018 return -1;
1019 } else if (!session) {
1020 ERRARG("session");
Michal Vasko3031aae2016-01-27 16:07:18 +01001021 return -1;
1022 }
1023
1024 sock = nc_sock_accept_binds(client_opts.ch_binds, client_opts.ch_bind_count, timeout, &host, &port, &idx);
1025
Michal Vasko50456e82016-02-02 12:16:08 +01001026 if (sock < 1) {
Michal Vaskob737d752016-02-09 09:01:27 +01001027 free(host);
Michal Vasko3031aae2016-01-27 16:07:18 +01001028 return sock;
1029 }
1030
Radek Krejci53691be2016-02-22 13:58:37 +01001031#ifdef NC_ENABLED_SSH
Michal Vasko2e6defd2016-10-07 15:48:15 +02001032 if (client_opts.ch_bind_ti[idx] == NC_TI_LIBSSH) {
Michal Vasko0190bc32016-03-02 15:47:49 +01001033 *session = nc_accept_callhome_ssh_sock(sock, host, port, ctx, NC_TRANSPORT_TIMEOUT);
Michal Vasko3d865d22016-01-28 16:00:53 +01001034 } else
1035#endif
Radek Krejci53691be2016-02-22 13:58:37 +01001036#ifdef NC_ENABLED_TLS
Michal Vasko2e6defd2016-10-07 15:48:15 +02001037 if (client_opts.ch_bind_ti[idx] == NC_TI_OPENSSL) {
Michal Vasko0190bc32016-03-02 15:47:49 +01001038 *session = nc_accept_callhome_tls_sock(sock, host, port, ctx, NC_TRANSPORT_TIMEOUT);
Michal Vasko3d865d22016-01-28 16:00:53 +01001039 } else
1040#endif
1041 {
Michal Vaskofee717c2016-02-01 13:25:43 +01001042 close(sock);
Michal Vasko3031aae2016-01-27 16:07:18 +01001043 *session = NULL;
1044 }
1045
1046 free(host);
1047
1048 if (!(*session)) {
1049 return -1;
1050 }
1051
1052 return 1;
1053}
1054
Radek Krejci53691be2016-02-22 13:58:37 +01001055#endif /* NC_ENABLED_SSH || NC_ENABLED_TLS */
Michal Vasko3d865d22016-01-28 16:00:53 +01001056
Michal Vaskobdfb5242016-05-24 09:11:01 +02001057API const char **
1058nc_session_get_cpblts(const struct nc_session *session)
1059{
1060 if (!session) {
1061 ERRARG("session");
1062 return NULL;
1063 }
1064
Michal Vasko2e6defd2016-10-07 15:48:15 +02001065 return session->opts.client.cpblts;
Michal Vaskobdfb5242016-05-24 09:11:01 +02001066}
1067
1068API const char *
1069nc_session_cpblt(const struct nc_session *session, const char *capab)
1070{
1071 int i, len;
1072
1073 if (!session) {
1074 ERRARG("session");
1075 return NULL;
1076 } else if (!capab) {
1077 ERRARG("capab");
1078 return NULL;
1079 }
1080
1081 len = strlen(capab);
Michal Vasko2e6defd2016-10-07 15:48:15 +02001082 for (i = 0; session->opts.client.cpblts[i]; ++i) {
1083 if (!strncmp(session->opts.client.cpblts[i], capab, len)) {
1084 return session->opts.client.cpblts[i];
Michal Vaskobdfb5242016-05-24 09:11:01 +02001085 }
1086 }
1087
1088 return NULL;
1089}
1090
Michal Vasko9cd26a82016-05-31 08:58:48 +02001091API int
1092nc_session_ntf_thread_running(const struct nc_session *session)
1093{
Michal Vasko2e6defd2016-10-07 15:48:15 +02001094 if (!session || (session->side != NC_CLIENT)) {
Michal Vasko9cd26a82016-05-31 08:58:48 +02001095 ERRARG("session");
1096 return 0;
1097 }
1098
Michal Vasko2e6defd2016-10-07 15:48:15 +02001099 return session->opts.client.ntf_tid ? 1 : 0;
Michal Vasko9cd26a82016-05-31 08:58:48 +02001100}
1101
Michal Vaskob7558c52016-02-26 15:04:19 +01001102API void
Michal Vaskoa7b8ca52016-03-01 12:09:29 +01001103nc_client_init(void)
1104{
1105 nc_init();
1106}
1107
1108API void
Michal Vaskob7558c52016-02-26 15:04:19 +01001109nc_client_destroy(void)
1110{
Michal Vasko7f1c0ef2016-03-11 11:13:06 +01001111 nc_client_set_schema_searchpath(NULL);
Michal Vaskob7558c52016-02-26 15:04:19 +01001112#if defined(NC_ENABLED_SSH) || defined(NC_ENABLED_TLS)
1113 nc_client_ch_del_bind(NULL, 0, 0);
1114#endif
1115#ifdef NC_ENABLED_SSH
1116 nc_client_ssh_destroy_opts();
1117#endif
Michal Vaskoc979d3a2016-02-26 15:26:21 +01001118#ifdef NC_ENABLED_TLS
Michal Vaskob7558c52016-02-26 15:04:19 +01001119 nc_client_tls_destroy_opts();
1120#endif
Michal Vaskoa7b8ca52016-03-01 12:09:29 +01001121 nc_destroy();
Michal Vaskob7558c52016-02-26 15:04:19 +01001122}
1123
Michal Vasko086311b2016-01-08 09:53:11 +01001124API NC_MSG_TYPE
Michal Vaskoeb7080e2016-02-18 13:27:05 +01001125nc_recv_reply(struct nc_session *session, struct nc_rpc *rpc, uint64_t msgid, int timeout, int parseroptions, struct nc_reply **reply)
Michal Vasko086311b2016-01-08 09:53:11 +01001126{
1127 struct lyxml_elem *xml;
1128 NC_MSG_TYPE msgtype = 0; /* NC_MSG_ERROR */
1129
Michal Vasko45e53ae2016-04-07 11:46:03 +02001130 if (!session) {
1131 ERRARG("session");
1132 return NC_MSG_ERROR;
1133 } else if (!rpc) {
1134 ERRARG("rpc");
1135 return NC_MSG_ERROR;
1136 } else if (!reply) {
1137 ERRARG("reply");
1138 return NC_MSG_ERROR;
1139 } else if (parseroptions & LYD_OPT_TYPEMASK) {
1140 ERRARG("parseroptions");
Michal Vasko086311b2016-01-08 09:53:11 +01001141 return NC_MSG_ERROR;
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001142 } else if ((session->status != NC_STATUS_RUNNING) || (session->side != NC_CLIENT)) {
Michal Vaskod083db62016-01-19 10:31:29 +01001143 ERR("Session %u: invalid session to receive RPC replies.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001144 return NC_MSG_ERROR;
1145 }
Michal Vaskoeb7080e2016-02-18 13:27:05 +01001146 parseroptions &= ~(LYD_OPT_DESTRUCT | LYD_OPT_NOSIBLINGS);
Michal Vaskoeee99412016-11-21 10:19:43 +01001147 if (!(session->flags & NC_SESSION_CLIENT_NOT_STRICT)) {
1148 parseroptions &= LYD_OPT_STRICT;
1149 }
Michal Vasko41adf392017-01-17 10:39:04 +01001150 /* no mechanism to check external dependencies is provided */
1151 parseroptions|= LYD_OPT_NOEXTDEPS;
Michal Vasko086311b2016-01-08 09:53:11 +01001152 *reply = NULL;
1153
1154 msgtype = get_msg(session, timeout, msgid, &xml);
Michal Vasko086311b2016-01-08 09:53:11 +01001155
Michal Vasko71ba2da2016-05-04 10:53:16 +02001156 if ((msgtype == NC_MSG_REPLY) || (msgtype == NC_MSG_REPLY_ERR_MSGID)) {
Michal Vaskoeee99412016-11-21 10:19:43 +01001157 *reply = parse_reply(session->ctx, xml, rpc, parseroptions);
Michal Vasko086311b2016-01-08 09:53:11 +01001158 lyxml_free(session->ctx, xml);
1159 if (!(*reply)) {
1160 return NC_MSG_ERROR;
1161 }
1162 }
1163
1164 return msgtype;
1165}
1166
1167API NC_MSG_TYPE
1168nc_recv_notif(struct nc_session *session, int timeout, struct nc_notif **notif)
1169{
1170 struct lyxml_elem *xml, *ev_time;
1171 NC_MSG_TYPE msgtype = 0; /* NC_MSG_ERROR */
1172
Michal Vasko45e53ae2016-04-07 11:46:03 +02001173 if (!session) {
1174 ERRARG("session");
1175 return NC_MSG_ERROR;
1176 } else if (!notif) {
1177 ERRARG("notif");
Michal Vasko086311b2016-01-08 09:53:11 +01001178 return NC_MSG_ERROR;
1179 } else if (session->status != NC_STATUS_RUNNING || session->side != NC_CLIENT) {
Michal Vaskod083db62016-01-19 10:31:29 +01001180 ERR("Session %u: invalid session to receive Notifications.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001181 return NC_MSG_ERROR;
1182 }
1183
1184 msgtype = get_msg(session, timeout, 0, &xml);
1185
1186 if (msgtype == NC_MSG_NOTIF) {
1187 *notif = calloc(1, sizeof **notif);
Michal Vasko4eb3c312016-03-01 14:09:37 +01001188 if (!*notif) {
1189 ERRMEM;
1190 lyxml_free(session->ctx, xml);
1191 return NC_MSG_ERROR;
1192 }
Michal Vasko086311b2016-01-08 09:53:11 +01001193
1194 /* eventTime */
1195 LY_TREE_FOR(xml->child, ev_time) {
1196 if (!strcmp(ev_time->name, "eventTime")) {
1197 (*notif)->datetime = lydict_insert(session->ctx, ev_time->content, 0);
1198 /* lyd_parse does not know this element */
1199 lyxml_free(session->ctx, ev_time);
1200 break;
1201 }
1202 }
1203 if (!(*notif)->datetime) {
Michal Vaskod083db62016-01-19 10:31:29 +01001204 ERR("Session %u: notification is missing the \"eventTime\" element.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001205 goto fail;
1206 }
1207
1208 /* notification body */
Michal Vasko41adf392017-01-17 10:39:04 +01001209 (*notif)->tree = lyd_parse_xml(session->ctx, &xml->child, LYD_OPT_NOTIF | LYD_OPT_DESTRUCT | LYD_OPT_NOEXTDEPS
Michal Vaskoeee99412016-11-21 10:19:43 +01001210 | (session->flags & NC_SESSION_CLIENT_NOT_STRICT ? 0 : LYD_OPT_STRICT), NULL);
Michal Vasko086311b2016-01-08 09:53:11 +01001211 lyxml_free(session->ctx, xml);
1212 xml = NULL;
1213 if (!(*notif)->tree) {
Michal Vaskod083db62016-01-19 10:31:29 +01001214 ERR("Session %u: failed to parse a new notification.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001215 goto fail;
1216 }
1217 }
1218
1219 return msgtype;
1220
1221fail:
1222 lydict_remove(session->ctx, (*notif)->datetime);
1223 lyd_free((*notif)->tree);
1224 free(*notif);
1225 *notif = NULL;
1226 lyxml_free(session->ctx, xml);
1227
1228 return NC_MSG_ERROR;
1229}
1230
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001231static void *
1232nc_recv_notif_thread(void *arg)
1233{
1234 struct nc_ntf_thread_arg *ntarg;
1235 struct nc_session *session;
1236 void (*notif_clb)(struct nc_session *session, const struct nc_notif *notif);
1237 struct nc_notif *notif;
1238 NC_MSG_TYPE msgtype;
1239
1240 ntarg = (struct nc_ntf_thread_arg *)arg;
1241 session = ntarg->session;
1242 notif_clb = ntarg->notif_clb;
1243 free(ntarg);
1244
Michal Vasko2e6defd2016-10-07 15:48:15 +02001245 while (session->opts.client.ntf_tid) {
Michal vasko4e1a36c2016-10-05 13:04:37 +02001246 msgtype = nc_recv_notif(session, NC_CLIENT_NOTIF_THREAD_SLEEP / 1000, &notif);
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001247 if (msgtype == NC_MSG_NOTIF) {
1248 notif_clb(session, notif);
Michal Vaskof0537d82016-01-29 14:42:38 +01001249 if (!strcmp(notif->tree->schema->name, "notificationComplete")
1250 && !strcmp(notif->tree->schema->module->name, "nc-notifications")) {
1251 nc_notif_free(notif);
1252 break;
1253 }
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001254 nc_notif_free(notif);
Michal Vasko0651c902016-05-19 15:55:42 +02001255 } else if (msgtype == NC_MSG_ERROR) {
1256 break;
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001257 }
1258
1259 usleep(NC_CLIENT_NOTIF_THREAD_SLEEP);
1260 }
1261
Michal Vasko0651c902016-05-19 15:55:42 +02001262 VRB("Session %u: notification thread exit.", session->id);
Michal Vasko2e6defd2016-10-07 15:48:15 +02001263 session->opts.client.ntf_tid = NULL;
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001264 return NULL;
1265}
1266
1267API int
1268nc_recv_notif_dispatch(struct nc_session *session, void (*notif_clb)(struct nc_session *session, const struct nc_notif *notif))
1269{
1270 struct nc_ntf_thread_arg *ntarg;
1271 int ret;
1272
Michal Vasko45e53ae2016-04-07 11:46:03 +02001273 if (!session) {
1274 ERRARG("session");
1275 return -1;
1276 } else if (!notif_clb) {
1277 ERRARG("notif_clb");
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001278 return -1;
1279 } else if ((session->status != NC_STATUS_RUNNING) || (session->side != NC_CLIENT)) {
1280 ERR("Session %u: invalid session to receive Notifications.", session->id);
1281 return -1;
Michal Vasko2e6defd2016-10-07 15:48:15 +02001282 } else if (session->opts.client.ntf_tid) {
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001283 ERR("Session %u: separate notification thread is already running.", session->id);
1284 return -1;
1285 }
1286
1287 ntarg = malloc(sizeof *ntarg);
Michal Vasko4eb3c312016-03-01 14:09:37 +01001288 if (!ntarg) {
1289 ERRMEM;
1290 return -1;
1291 }
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001292 ntarg->session = session;
1293 ntarg->notif_clb = notif_clb;
1294
1295 /* just so that nc_recv_notif_thread() does not immediately exit, the value does not matter */
Michal Vasko2e6defd2016-10-07 15:48:15 +02001296 session->opts.client.ntf_tid = malloc(sizeof *session->opts.client.ntf_tid);
1297 if (!session->opts.client.ntf_tid) {
Michal Vasko4eb3c312016-03-01 14:09:37 +01001298 ERRMEM;
1299 free(ntarg);
1300 return -1;
1301 }
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001302
Michal Vasko2e6defd2016-10-07 15:48:15 +02001303 ret = pthread_create((pthread_t *)session->opts.client.ntf_tid, NULL, nc_recv_notif_thread, ntarg);
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001304 if (ret) {
1305 ERR("Session %u: failed to create a new thread (%s).", strerror(errno));
1306 free(ntarg);
Michal Vasko2e6defd2016-10-07 15:48:15 +02001307 free((pthread_t *)session->opts.client.ntf_tid);
1308 session->opts.client.ntf_tid = NULL;
Michal Vaskoa8ad4482016-01-28 14:25:54 +01001309 return -1;
1310 }
1311
1312 return 0;
1313}
1314
Michal Vasko086311b2016-01-08 09:53:11 +01001315API NC_MSG_TYPE
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001316nc_send_rpc(struct nc_session *session, struct nc_rpc *rpc, int timeout, uint64_t *msgid)
Michal Vasko086311b2016-01-08 09:53:11 +01001317{
1318 NC_MSG_TYPE r;
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001319 int ret;
Michal Vasko90e8e692016-07-13 12:27:57 +02001320 struct nc_rpc_act_generic *rpc_gen;
Michal Vasko086311b2016-01-08 09:53:11 +01001321 struct nc_rpc_getconfig *rpc_gc;
1322 struct nc_rpc_edit *rpc_e;
1323 struct nc_rpc_copy *rpc_cp;
1324 struct nc_rpc_delete *rpc_del;
1325 struct nc_rpc_lock *rpc_lock;
1326 struct nc_rpc_get *rpc_g;
1327 struct nc_rpc_kill *rpc_k;
1328 struct nc_rpc_commit *rpc_com;
1329 struct nc_rpc_cancel *rpc_can;
1330 struct nc_rpc_validate *rpc_val;
1331 struct nc_rpc_getschema *rpc_gs;
1332 struct nc_rpc_subscribe *rpc_sub;
1333 struct lyd_node *data, *node;
Michal Vasko9d8bee62016-03-03 10:58:24 +01001334 const struct lys_module *ietfnc = NULL, *ietfncmon, *notifs, *ietfncwd = NULL;
Radek Krejci539efb62016-08-24 15:05:16 +02001335 char str[11];
Michal Vasko086311b2016-01-08 09:53:11 +01001336 uint64_t cur_msgid;
1337
Michal Vasko45e53ae2016-04-07 11:46:03 +02001338 if (!session) {
1339 ERRARG("session");
1340 return NC_MSG_ERROR;
1341 } else if (!rpc) {
1342 ERRARG("rpc");
1343 return NC_MSG_ERROR;
1344 } else if (!msgid) {
1345 ERRARG("msgid");
Michal Vasko086311b2016-01-08 09:53:11 +01001346 return NC_MSG_ERROR;
1347 } else if (session->status != NC_STATUS_RUNNING || session->side != NC_CLIENT) {
Michal Vaskod083db62016-01-19 10:31:29 +01001348 ERR("Session %u: invalid session to send RPCs.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001349 return NC_MSG_ERROR;
1350 }
1351
Michal Vasko90e8e692016-07-13 12:27:57 +02001352 if ((rpc->type != NC_RPC_GETSCHEMA) && (rpc->type != NC_RPC_ACT_GENERIC) && (rpc->type != NC_RPC_SUBSCRIBE)) {
Michal Vasko086311b2016-01-08 09:53:11 +01001353 ietfnc = ly_ctx_get_module(session->ctx, "ietf-netconf", NULL);
1354 if (!ietfnc) {
Michal Vasko086cd572017-01-12 12:19:05 +01001355 ERR("Session %u: missing \"ietf-netconf\" schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001356 return NC_MSG_ERROR;
1357 }
1358 }
1359
1360 switch (rpc->type) {
Michal Vasko90e8e692016-07-13 12:27:57 +02001361 case NC_RPC_ACT_GENERIC:
1362 rpc_gen = (struct nc_rpc_act_generic *)rpc;
Michal Vasko086311b2016-01-08 09:53:11 +01001363
1364 if (rpc_gen->has_data) {
1365 data = rpc_gen->content.data;
1366 } else {
Michal Vasko41adf392017-01-17 10:39:04 +01001367 data = lyd_parse_mem(session->ctx, rpc_gen->content.xml_str, LYD_XML, LYD_OPT_RPC | LYD_OPT_NOEXTDEPS
Michal Vaskoeee99412016-11-21 10:19:43 +01001368 | (session->flags & NC_SESSION_CLIENT_NOT_STRICT ? 0 : LYD_OPT_STRICT), NULL);
Michal Vasko086311b2016-01-08 09:53:11 +01001369 }
1370 break;
1371
1372 case NC_RPC_GETCONFIG:
1373 rpc_gc = (struct nc_rpc_getconfig *)rpc;
1374
1375 data = lyd_new(NULL, ietfnc, "get-config");
1376 node = lyd_new(data, ietfnc, "source");
1377 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_gc->source], NULL);
1378 if (!node) {
1379 lyd_free(data);
1380 return NC_MSG_ERROR;
1381 }
1382 if (rpc_gc->filter) {
Michal Vaskof3c647b2016-03-08 12:17:33 +01001383 if (!rpc_gc->filter[0] || (rpc_gc->filter[0] == '<')) {
Michal Vaskoc741ddb2016-10-07 13:34:57 +02001384 node = lyd_new_anydata(data, ietfnc, "filter", rpc_gc->filter, LYD_ANYDATA_SXML);
Michal Vasko303245c2016-03-24 15:20:03 +01001385 lyd_insert_attr(node, NULL, "type", "subtree");
Michal Vasko086311b2016-01-08 09:53:11 +01001386 } else {
Radek Krejci539efb62016-08-24 15:05:16 +02001387 node = lyd_new_anydata(data, ietfnc, "filter", NULL, LYD_ANYDATA_CONSTSTRING);
Michal Vasko303245c2016-03-24 15:20:03 +01001388 lyd_insert_attr(node, NULL, "type", "xpath");
1389 lyd_insert_attr(node, NULL, "select", rpc_gc->filter);
Michal Vasko086311b2016-01-08 09:53:11 +01001390 }
1391 if (!node) {
1392 lyd_free(data);
1393 return NC_MSG_ERROR;
1394 }
1395 }
1396
1397 if (rpc_gc->wd_mode) {
1398 if (!ietfncwd) {
1399 ietfncwd = ly_ctx_get_module(session->ctx, "ietf-netconf-with-defaults", NULL);
1400 if (!ietfncwd) {
Michal Vasko086cd572017-01-12 12:19:05 +01001401 ERR("Session %u: missing \"ietf-netconf-with-defaults\" schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001402 return NC_MSG_ERROR;
1403 }
1404 }
1405 switch (rpc_gc->wd_mode) {
1406 case NC_WD_UNKNOWN:
1407 /* cannot get here */
1408 break;
1409 case NC_WD_ALL:
1410 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all");
1411 break;
1412 case NC_WD_ALL_TAG:
1413 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all-tagged");
1414 break;
1415 case NC_WD_TRIM:
1416 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "trim");
1417 break;
1418 case NC_WD_EXPLICIT:
1419 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "explicit");
1420 break;
1421 }
1422 if (!node) {
1423 lyd_free(data);
1424 return NC_MSG_ERROR;
1425 }
1426 }
1427 break;
1428
1429 case NC_RPC_EDIT:
1430 rpc_e = (struct nc_rpc_edit *)rpc;
1431
1432 data = lyd_new(NULL, ietfnc, "edit-config");
1433 node = lyd_new(data, ietfnc, "target");
1434 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_e->target], NULL);
1435 if (!node) {
1436 lyd_free(data);
1437 return NC_MSG_ERROR;
1438 }
1439
1440 if (rpc_e->default_op) {
1441 node = lyd_new_leaf(data, ietfnc, "default-operation", rpcedit_dfltop2str[rpc_e->default_op]);
1442 if (!node) {
1443 lyd_free(data);
1444 return NC_MSG_ERROR;
1445 }
1446 }
1447
1448 if (rpc_e->test_opt) {
1449 node = lyd_new_leaf(data, ietfnc, "test-option", rpcedit_testopt2str[rpc_e->test_opt]);
1450 if (!node) {
1451 lyd_free(data);
1452 return NC_MSG_ERROR;
1453 }
1454 }
1455
1456 if (rpc_e->error_opt) {
1457 node = lyd_new_leaf(data, ietfnc, "error-option", rpcedit_erropt2str[rpc_e->error_opt]);
1458 if (!node) {
1459 lyd_free(data);
1460 return NC_MSG_ERROR;
1461 }
1462 }
1463
Michal Vasko7793bc62016-09-16 11:58:41 +02001464 if (!rpc_e->edit_cont[0] || (rpc_e->edit_cont[0] == '<')) {
Michal Vaskoc741ddb2016-10-07 13:34:57 +02001465 node = lyd_new_anydata(data, ietfnc, "config", rpc_e->edit_cont, LYD_ANYDATA_SXML);
Michal Vasko086311b2016-01-08 09:53:11 +01001466 } else {
1467 node = lyd_new_leaf(data, ietfnc, "url", rpc_e->edit_cont);
1468 }
1469 if (!node) {
1470 lyd_free(data);
1471 return NC_MSG_ERROR;
1472 }
1473 break;
1474
1475 case NC_RPC_COPY:
1476 rpc_cp = (struct nc_rpc_copy *)rpc;
1477
1478 data = lyd_new(NULL, ietfnc, "copy-config");
1479 node = lyd_new(data, ietfnc, "target");
1480 if (rpc_cp->url_trg) {
1481 node = lyd_new_leaf(node, ietfnc, "url", rpc_cp->url_trg);
1482 } else {
1483 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_cp->target], NULL);
1484 }
1485 if (!node) {
1486 lyd_free(data);
1487 return NC_MSG_ERROR;
1488 }
1489
1490 node = lyd_new(data, ietfnc, "source");
1491 if (rpc_cp->url_config_src) {
Michal Vasko7793bc62016-09-16 11:58:41 +02001492 if (!rpc_cp->url_config_src[0] || (rpc_cp->url_config_src[0] == '<')) {
Michal Vaskoc741ddb2016-10-07 13:34:57 +02001493 node = lyd_new_anydata(node, ietfnc, "config", rpc_cp->url_config_src, LYD_ANYDATA_SXML);
Michal Vasko086311b2016-01-08 09:53:11 +01001494 } else {
1495 node = lyd_new_leaf(node, ietfnc, "url", rpc_cp->url_config_src);
1496 }
1497 } else {
1498 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_cp->source], NULL);
1499 }
1500 if (!node) {
1501 lyd_free(data);
1502 return NC_MSG_ERROR;
1503 }
1504
1505 if (rpc_cp->wd_mode) {
1506 if (!ietfncwd) {
1507 ietfncwd = ly_ctx_get_module(session->ctx, "ietf-netconf-with-defaults", NULL);
1508 if (!ietfncwd) {
Michal Vasko086cd572017-01-12 12:19:05 +01001509 ERR("Session %u: missing \"ietf-netconf-with-defaults\" schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001510 return NC_MSG_ERROR;
1511 }
1512 }
1513 switch (rpc_cp->wd_mode) {
1514 case NC_WD_UNKNOWN:
1515 /* cannot get here */
1516 break;
1517 case NC_WD_ALL:
1518 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all");
1519 break;
1520 case NC_WD_ALL_TAG:
1521 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all-tagged");
1522 break;
1523 case NC_WD_TRIM:
1524 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "trim");
1525 break;
1526 case NC_WD_EXPLICIT:
1527 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "explicit");
1528 break;
1529 }
1530 if (!node) {
1531 lyd_free(data);
1532 return NC_MSG_ERROR;
1533 }
1534 }
1535 break;
1536
1537 case NC_RPC_DELETE:
1538 rpc_del = (struct nc_rpc_delete *)rpc;
1539
1540 data = lyd_new(NULL, ietfnc, "delete-config");
1541 node = lyd_new(data, ietfnc, "target");
1542 if (rpc_del->url) {
1543 node = lyd_new_leaf(node, ietfnc, "url", rpc_del->url);
1544 } else {
1545 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_del->target], NULL);
1546 }
1547 if (!node) {
1548 lyd_free(data);
1549 return NC_MSG_ERROR;
1550 }
1551 break;
1552
1553 case NC_RPC_LOCK:
1554 rpc_lock = (struct nc_rpc_lock *)rpc;
1555
1556 data = lyd_new(NULL, ietfnc, "lock");
1557 node = lyd_new(data, ietfnc, "target");
1558 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_lock->target], NULL);
1559 if (!node) {
1560 lyd_free(data);
1561 return NC_MSG_ERROR;
1562 }
1563 break;
1564
1565 case NC_RPC_UNLOCK:
1566 rpc_lock = (struct nc_rpc_lock *)rpc;
1567
1568 data = lyd_new(NULL, ietfnc, "unlock");
1569 node = lyd_new(data, ietfnc, "target");
1570 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_lock->target], NULL);
1571 if (!node) {
1572 lyd_free(data);
1573 return NC_MSG_ERROR;
1574 }
1575 break;
1576
1577 case NC_RPC_GET:
1578 rpc_g = (struct nc_rpc_get *)rpc;
1579
1580 data = lyd_new(NULL, ietfnc, "get");
1581 if (rpc_g->filter) {
Michal Vaskof3c647b2016-03-08 12:17:33 +01001582 if (!rpc_g->filter[0] || (rpc_g->filter[0] == '<')) {
Michal Vaskoc741ddb2016-10-07 13:34:57 +02001583 node = lyd_new_anydata(data, ietfnc, "filter", rpc_g->filter, LYD_ANYDATA_SXML);
Michal Vasko303245c2016-03-24 15:20:03 +01001584 lyd_insert_attr(node, NULL, "type", "subtree");
Michal Vasko086311b2016-01-08 09:53:11 +01001585 } else {
Radek Krejci539efb62016-08-24 15:05:16 +02001586 node = lyd_new_anydata(data, ietfnc, "filter", NULL, LYD_ANYDATA_CONSTSTRING);
Michal Vasko303245c2016-03-24 15:20:03 +01001587 lyd_insert_attr(node, NULL, "type", "xpath");
1588 lyd_insert_attr(node, NULL, "select", rpc_g->filter);
Michal Vasko086311b2016-01-08 09:53:11 +01001589 }
1590 if (!node) {
1591 lyd_free(data);
1592 return NC_MSG_ERROR;
1593 }
1594 }
1595
1596 if (rpc_g->wd_mode) {
1597 if (!ietfncwd) {
1598 ietfncwd = ly_ctx_get_module(session->ctx, "ietf-netconf-with-defaults", NULL);
1599 if (!ietfncwd) {
Michal Vasko086cd572017-01-12 12:19:05 +01001600 ERR("Session %u: missing \"ietf-netconf-with-defaults\" schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001601 return NC_MSG_ERROR;
1602 }
1603 }
1604 switch (rpc_g->wd_mode) {
1605 case NC_WD_UNKNOWN:
1606 /* cannot get here */
1607 break;
1608 case NC_WD_ALL:
1609 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all");
1610 break;
1611 case NC_WD_ALL_TAG:
1612 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "report-all-tagged");
1613 break;
1614 case NC_WD_TRIM:
1615 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "trim");
1616 break;
1617 case NC_WD_EXPLICIT:
1618 node = lyd_new_leaf(data, ietfncwd, "with-defaults", "explicit");
1619 break;
1620 }
1621 if (!node) {
1622 lyd_free(data);
1623 return NC_MSG_ERROR;
1624 }
1625 }
1626 break;
1627
1628 case NC_RPC_KILL:
1629 rpc_k = (struct nc_rpc_kill *)rpc;
1630
1631 data = lyd_new(NULL, ietfnc, "kill-session");
1632 sprintf(str, "%u", rpc_k->sid);
1633 lyd_new_leaf(data, ietfnc, "session-id", str);
1634 break;
1635
1636 case NC_RPC_COMMIT:
1637 rpc_com = (struct nc_rpc_commit *)rpc;
1638
1639 data = lyd_new(NULL, ietfnc, "commit");
1640 if (rpc_com->confirmed) {
1641 lyd_new_leaf(data, ietfnc, "confirmed", NULL);
1642 }
1643
1644 if (rpc_com->confirm_timeout) {
1645 sprintf(str, "%u", rpc_com->confirm_timeout);
1646 lyd_new_leaf(data, ietfnc, "confirm-timeout", str);
1647 }
1648
1649 if (rpc_com->persist) {
1650 node = lyd_new_leaf(data, ietfnc, "persist", rpc_com->persist);
1651 if (!node) {
1652 lyd_free(data);
1653 return NC_MSG_ERROR;
1654 }
1655 }
1656
1657 if (rpc_com->persist_id) {
1658 node = lyd_new_leaf(data, ietfnc, "persist-id", rpc_com->persist_id);
1659 if (!node) {
1660 lyd_free(data);
1661 return NC_MSG_ERROR;
1662 }
1663 }
1664 break;
1665
1666 case NC_RPC_DISCARD:
1667 data = lyd_new(NULL, ietfnc, "discard-changes");
1668 break;
1669
1670 case NC_RPC_CANCEL:
1671 rpc_can = (struct nc_rpc_cancel *)rpc;
1672
1673 data = lyd_new(NULL, ietfnc, "cancel-commit");
1674 if (rpc_can->persist_id) {
1675 node = lyd_new_leaf(data, ietfnc, "persist-id", rpc_can->persist_id);
1676 if (!node) {
1677 lyd_free(data);
1678 return NC_MSG_ERROR;
1679 }
1680 }
1681 break;
1682
1683 case NC_RPC_VALIDATE:
1684 rpc_val = (struct nc_rpc_validate *)rpc;
1685
1686 data = lyd_new(NULL, ietfnc, "validate");
1687 node = lyd_new(data, ietfnc, "source");
1688 if (rpc_val->url_config_src) {
Michal Vasko7793bc62016-09-16 11:58:41 +02001689 if (!rpc_val->url_config_src[0] || (rpc_val->url_config_src[0] == '<')) {
Michal Vaskoc741ddb2016-10-07 13:34:57 +02001690 node = lyd_new_anydata(node, ietfnc, "config", rpc_val->url_config_src, LYD_ANYDATA_SXML);
Michal Vasko086311b2016-01-08 09:53:11 +01001691 } else {
1692 node = lyd_new_leaf(node, ietfnc, "url", rpc_val->url_config_src);
1693 }
1694 } else {
1695 node = lyd_new_leaf(node, ietfnc, ncds2str[rpc_val->source], NULL);
1696 }
1697 if (!node) {
1698 lyd_free(data);
1699 return NC_MSG_ERROR;
1700 }
1701 break;
1702
1703 case NC_RPC_GETSCHEMA:
1704 ietfncmon = ly_ctx_get_module(session->ctx, "ietf-netconf-monitoring", NULL);
1705 if (!ietfncmon) {
Michal Vasko086cd572017-01-12 12:19:05 +01001706 ERR("Session %u: missing \"ietf-netconf-monitoring\" schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001707 return NC_MSG_ERROR;
1708 }
1709
1710 rpc_gs = (struct nc_rpc_getschema *)rpc;
1711
1712 data = lyd_new(NULL, ietfncmon, "get-schema");
1713 node = lyd_new_leaf(data, ietfncmon, "identifier", rpc_gs->identifier);
1714 if (!node) {
1715 lyd_free(data);
1716 return NC_MSG_ERROR;
1717 }
1718 if (rpc_gs->version) {
1719 node = lyd_new_leaf(data, ietfncmon, "version", rpc_gs->version);
1720 if (!node) {
1721 lyd_free(data);
1722 return NC_MSG_ERROR;
1723 }
1724 }
1725 if (rpc_gs->format) {
1726 node = lyd_new_leaf(data, ietfncmon, "format", rpc_gs->format);
1727 if (!node) {
1728 lyd_free(data);
1729 return NC_MSG_ERROR;
1730 }
1731 }
1732 break;
1733
1734 case NC_RPC_SUBSCRIBE:
1735 notifs = ly_ctx_get_module(session->ctx, "notifications", NULL);
1736 if (!notifs) {
Michal Vasko086cd572017-01-12 12:19:05 +01001737 ERR("Session %u: missing \"notifications\" schema in the context.", session->id);
Michal Vasko086311b2016-01-08 09:53:11 +01001738 return NC_MSG_ERROR;
1739 }
1740
1741 rpc_sub = (struct nc_rpc_subscribe *)rpc;
1742
1743 data = lyd_new(NULL, notifs, "create-subscription");
1744 if (rpc_sub->stream) {
1745 node = lyd_new_leaf(data, notifs, "stream", rpc_sub->stream);
1746 if (!node) {
1747 lyd_free(data);
1748 return NC_MSG_ERROR;
1749 }
1750 }
1751
1752 if (rpc_sub->filter) {
Michal Vaskof3c647b2016-03-08 12:17:33 +01001753 if (!rpc_sub->filter[0] || (rpc_sub->filter[0] == '<')) {
Michal Vaskoc741ddb2016-10-07 13:34:57 +02001754 node = lyd_new_anydata(data, notifs, "filter", rpc_sub->filter, LYD_ANYDATA_SXML);
Michal Vasko303245c2016-03-24 15:20:03 +01001755 lyd_insert_attr(node, NULL, "type", "subtree");
Michal Vasko086311b2016-01-08 09:53:11 +01001756 } else {
Radek Krejci539efb62016-08-24 15:05:16 +02001757 node = lyd_new_anydata(data, notifs, "filter", NULL, LYD_ANYDATA_CONSTSTRING);
Michal Vasko303245c2016-03-24 15:20:03 +01001758 lyd_insert_attr(node, NULL, "type", "xpath");
1759 lyd_insert_attr(node, NULL, "select", rpc_sub->filter);
Michal Vasko086311b2016-01-08 09:53:11 +01001760 }
1761 if (!node) {
1762 lyd_free(data);
1763 return NC_MSG_ERROR;
1764 }
1765 }
1766
1767 if (rpc_sub->start) {
1768 node = lyd_new_leaf(data, notifs, "startTime", rpc_sub->start);
1769 if (!node) {
1770 lyd_free(data);
1771 return NC_MSG_ERROR;
1772 }
1773 }
1774
1775 if (rpc_sub->stop) {
1776 node = lyd_new_leaf(data, notifs, "stopTime", rpc_sub->stop);
1777 if (!node) {
1778 lyd_free(data);
1779 return NC_MSG_ERROR;
1780 }
1781 }
1782 break;
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001783 default:
1784 ERRINT;
1785 return NC_MSG_ERROR;
Michal Vasko086311b2016-01-08 09:53:11 +01001786 }
1787
Michal Vasko41adf392017-01-17 10:39:04 +01001788 if (lyd_validate(&data, LYD_OPT_RPC | LYD_OPT_NOEXTDEPS
1789 | (session->flags & NC_SESSION_CLIENT_NOT_STRICT ? 0 : LYD_OPT_STRICT), NULL)) {
Michal Vasko086311b2016-01-08 09:53:11 +01001790 lyd_free(data);
1791 return NC_MSG_ERROR;
1792 }
1793
Michal vasko50cc94f2016-10-04 13:46:20 +02001794 ret = nc_timedlock(session->ti_lock, timeout, __func__);
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001795 if (ret == -1) {
1796 /* error */
1797 r = NC_MSG_ERROR;
1798 } else if (!ret) {
1799 /* blocking */
Michal Vasko086311b2016-01-08 09:53:11 +01001800 r = NC_MSG_WOULDBLOCK;
1801 } else {
1802 /* send RPC, store its message ID */
1803 r = nc_send_msg(session, data);
Michal Vasko2e6defd2016-10-07 15:48:15 +02001804 cur_msgid = session->opts.client.msgid;
Michal Vasko086311b2016-01-08 09:53:11 +01001805 }
Michal Vasko7f1c78b2016-01-19 09:52:14 +01001806 pthread_mutex_unlock(session->ti_lock);
Michal Vasko086311b2016-01-08 09:53:11 +01001807
1808 lyd_free(data);
1809
1810 if (r != NC_MSG_RPC) {
1811 return r;
1812 }
1813
1814 *msgid = cur_msgid;
1815 return NC_MSG_RPC;
1816}
Michal Vaskode2946c2017-01-12 12:19:26 +01001817
1818API void
1819nc_client_session_set_not_strict(struct nc_session *session)
1820{
1821 if (session->side != NC_CLIENT) {
1822 ERRARG("session");
1823 return;
1824 }
1825
1826 session->flags |= NC_SESSION_CLIENT_NOT_STRICT;
1827}