Cleanup the formating issues found.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
vpn = bgp_evpn_lookup_vni(bgp, vni);
if (!vpn) {
if (bgp_debug_zebra(NULL))
- zlog_warn("%u: VNI hash entry for VNI %u not "
- "found at DEL", bgp->vrf_id, vni);
+ zlog_warn(
+ "%u: VNI hash entry for VNI %u not found at DEL",
+ bgp->vrf_id, vni);
return 0;
}
if (bgp->adv_cmd_rmap[afi][safi].map) {
int ret = 0;
- ret =
- route_map_apply(
- bgp->adv_cmd_rmap[afi][safi].map,
- &rn->p, RMAP_BGP, new_select);
+ ret = route_map_apply(
+ bgp->adv_cmd_rmap[afi][safi].map,
+ &rn->p, RMAP_BGP, new_select);
if (ret == RMAP_MATCH)
- bgp_evpn_advertise_type5_route(bgp,
- &rn->p,
- new_select->attr,
- afi, safi);
+ bgp_evpn_advertise_type5_route(
+ bgp, &rn->p, new_select->attr,
+ afi, safi);
} else {
bgp_evpn_advertise_type5_route(bgp,
&rn->p,
if (afi == AFI_L2VPN && safi == SAFI_EVPN) {
if (set) {
- /* if we are setting NEXTHOP_SELF, we need to unset the
- * NEXTHOP_UNCHANGED flag */
+ /*
+ * if we are setting NEXTHOP_SELF, we need to unset the
+ * NEXTHOP_UNCHANGED flag
+ */
if (CHECK_FLAG(flag, PEER_FLAG_NEXTHOP_SELF) ||
CHECK_FLAG(flag, PEER_FLAG_FORCE_NEXTHOP_SELF))
UNSET_FLAG(peer->af_flags[afi][safi],
PEER_FLAG_NEXTHOP_UNCHANGED);
} else {
- /* if we are unsetting NEXTHOP_SELF, we need to set the
+ /*
+ * if we are unsetting NEXTHOP_SELF, we need to set the
* NEXTHOP_UNCHANGED flag to reset the defaults for EVPN
*/
if (CHECK_FLAG(flag, PEER_FLAG_NEXTHOP_SELF) ||
/* atribute-unchanged. */
if (peer_af_flag_check(peer, afi, safi, PEER_FLAG_AS_PATH_UNCHANGED)
- || (safi != SAFI_EVPN &&
- peer_af_flag_check(peer, afi, safi, PEER_FLAG_NEXTHOP_UNCHANGED))
+ || (safi != SAFI_EVPN
+ && peer_af_flag_check(peer, afi, safi,
+ PEER_FLAG_NEXTHOP_UNCHANGED))
|| peer_af_flag_check(peer, afi, safi, PEER_FLAG_MED_UNCHANGED)) {
if (!peer_group_active(peer)
vty_out(vty, "domainname %s\n", cmd_domainname_get());
/* The following are all configuration commands that are not sent to
- * watchfrr. For instance watchfrr is hardcoded to log to syslog so
- * we would always display 'log syslog informational' in the config
- * which would cause other daemons to then switch to syslog when they
- * parse frr.conf.
- */
+ * watchfrr. For instance watchfrr is hardcoded to log to syslog so
+ * we would always display 'log syslog informational' in the config
+ * which would cause other daemons to then switch to syslog when they
+ * parse frr.conf.
+ */
if (strcmp(zlog_default->protoname, "WATCHFRR")) {
if (host.encrypt) {
if (host.password_encrypt)
- vty_out(vty, "password 8 %s\n", host.password_encrypt);
+ vty_out(vty, "password 8 %s\n",
+ host.password_encrypt);
if (host.enable_encrypt)
vty_out(vty, "enable password 8 %s\n",
host.enable_encrypt);
if (host.password)
vty_out(vty, "password %s\n", host.password);
if (host.enable)
- vty_out(vty, "enable password %s\n", host.enable);
+ vty_out(vty, "enable password %s\n",
+ host.enable);
}
if (zlog_default->default_lvl != LOG_DEBUG) {
- vty_out(vty, "! N.B. The 'log trap' command is deprecated.\n");
+ vty_out(vty,
+ "! N.B. The 'log trap' command is deprecated.\n");
vty_out(vty, "log trap %s\n",
zlog_priority[zlog_default->default_lvl]);
}
if (host.logfile
- && (zlog_default->maxlvl[ZLOG_DEST_FILE] != ZLOG_DISABLED)) {
+ && (zlog_default->maxlvl[ZLOG_DEST_FILE]
+ != ZLOG_DISABLED)) {
vty_out(vty, "log file %s", host.logfile);
if (zlog_default->maxlvl[ZLOG_DEST_FILE]
!= zlog_default->default_lvl)
vty_out(vty, " %s",
zlog_priority
- [zlog_default->maxlvl[ZLOG_DEST_FILE]]);
+ [zlog_default->maxlvl
+ [ZLOG_DEST_FILE]]);
vty_out(vty, "\n");
}
if (zlog_default->maxlvl[ZLOG_DEST_STDOUT]
!= zlog_default->default_lvl)
vty_out(vty, " %s",
- zlog_priority[zlog_default->maxlvl
- [ZLOG_DEST_STDOUT]]);
+ zlog_priority
+ [zlog_default->maxlvl
+ [ZLOG_DEST_STDOUT]]);
vty_out(vty, "\n");
}
else if (zlog_default->maxlvl[ZLOG_DEST_MONITOR]
!= zlog_default->default_lvl)
vty_out(vty, "log monitor %s\n",
- zlog_priority[zlog_default->maxlvl[ZLOG_DEST_MONITOR]]);
+ zlog_priority[zlog_default->maxlvl
+ [ZLOG_DEST_MONITOR]]);
if (zlog_default->maxlvl[ZLOG_DEST_SYSLOG] != ZLOG_DISABLED) {
vty_out(vty, "log syslog");
vty_out(vty, "service password-encryption\n");
if (host.lines >= 0)
- vty_out(vty, "service terminal-length %d\n", host.lines);
+ vty_out(vty, "service terminal-length %d\n",
+ host.lines);
if (host.motdfile)
vty_out(vty, "banner motd file %s\n", host.motdfile);
if (!zl3vni || !is_l3vni_oper_up(zl3vni))
return;
- /*
+ /*
* add the next hop neighbor -
* neigh to be installed is the ipv6 nexthop neigh
*/
- zl3vni_remote_nh_add(zl3vni, vtep_ip, rmac, host_prefix);
+ zl3vni_remote_nh_add(zl3vni, vtep_ip, rmac, host_prefix);
/*
* if the remote vtep is a ipv4 mapped ipv6 address convert it to ipv4
memcpy(&(ipv4_vtep.ipaddr_v4), &vtep_ip->ipaddr_v4,
sizeof(struct in_addr));
- /* add the rmac - remote rmac to be installed is against the ipv4
+ /*
+ * add the rmac - remote rmac to be installed is against the ipv4
* nexthop address
*/
- zl3vni_remote_rmac_add(zl3vni, rmac, &ipv4_vtep, host_prefix);
+ zl3vni_remote_rmac_add(zl3vni, rmac, &ipv4_vtep, host_prefix);
}
/* handle evpn vrf route delete */