]>
git.puffer.fish Git - matthieu/frr.git/log
Russ White [Tue, 26 Jun 2018 15:17:32 +0000 (11:17 -0400)]
Merge pull request #2540 from LabNConsulting/working/master/bgp-twice-leaked-nht
bgpd: don't nexthop-track twice-leaked routes that came from zebra
Russ White [Tue, 26 Jun 2018 15:15:59 +0000 (11:15 -0400)]
Merge pull request #2542 from pacovn/Coverity_1452552_Out-of-bounds_access
isisd: out-of-bounds access (Coverity
1452552 )
Russ White [Tue, 26 Jun 2018 15:14:39 +0000 (11:14 -0400)]
Merge pull request #2545 from pacovn/Coverity_1468413_Explicit_null_dereferenced
bgpd: null check (Coverity
1468413 )
Russ White [Tue, 26 Jun 2018 15:14:07 +0000 (11:14 -0400)]
Merge pull request #2547 from pacovn/Coverity_1458168_Dereference_null_return_value
eigrpd ospfd: null check (Coverity
1458168 1455335 )
Renato Westphal [Tue, 26 Jun 2018 15:03:52 +0000 (12:03 -0300)]
Merge pull request #2535 from donaldsharp/netlink_talk_fun
Netlink talk fun
Renato Westphal [Tue, 26 Jun 2018 13:55:08 +0000 (10:55 -0300)]
Merge pull request #2549 from pacovn/Coverity_1452317_Explicit_null_dereferenced
ldpd: null check (Coverity
1452317 )
Renato Westphal [Tue, 26 Jun 2018 13:25:00 +0000 (10:25 -0300)]
Merge pull request #2552 from qlyoung/remove-defun-deprecated
Remove DEFUN_DEPRECATED
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 21:30:31 +0000 (17:30 -0400)]
Merge pull request #2548 from pacovn/Coverity_1453456_Unchecked_return_value_from_library
lib: check return value (Coverity
1453456 )
paco [Mon, 25 Jun 2018 14:10:47 +0000 (16:10 +0200)]
lib: check return value (Coverity
1453456 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:53:26 +0000 (12:53 -0400)]
Merge pull request #2546 from pacovn/Coverity_1465491_Untrusted_value_as_argument_2
pimd: untrusted argument (2) (Coverity
1465491 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:46:57 +0000 (12:46 -0400)]
Merge pull request #2530 from pacovn/Coverity_1399295_Out-of-bounds_read
Coverity
1399295 out of bounds read
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:43:31 +0000 (12:43 -0400)]
Merge pull request #2536 from pacovn/Coverity_1470150_Dereference_null_return_value
lib: null check (Coverity
1470150 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:40:02 +0000 (12:40 -0400)]
Merge pull request #2550 from pacovn/Coverity_1399284_Dereference_null_return_value
ospfd: null check (Coverity
1399284 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:39:17 +0000 (12:39 -0400)]
Merge pull request #2544 from pacovn/Coverity_1468510_Dereference_null_return_value
ospf6d: null check (Coverity
1468510 )
Quentin Young [Fri, 1 Jun 2018 20:31:52 +0000 (20:31 +0000)]
lib: remove DEFUN_DEPRECATED
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
Quentin Young [Mon, 4 Jun 2018 16:05:56 +0000 (16:05 +0000)]
bgpd: remove DEFUN_DEPRECATED usage
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:38:44 +0000 (12:38 -0400)]
Merge pull request #2543 from pacovn/Coverity_1399304_Out-of-bounds_access
ospfd: out-of-bounds access (Coverity
1399304 1399286 )
Jafar Al-Gharaibeh [Mon, 25 Jun 2018 16:37:57 +0000 (12:37 -0400)]
Merge pull request #2541 from pacovn/Coverity_1221445_1221448_Out-of-bounds_access
ospfd: OoB access (Coverity
1221445 1221448 )
Quentin Young [Fri, 1 Jun 2018 20:31:48 +0000 (20:31 +0000)]
*: remove deprecated 'log trap' commands
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>
paco [Mon, 25 Jun 2018 13:25:26 +0000 (15:25 +0200)]
pimd: untrusted argument (2) (Coverity
1465491 )
Additional fix over
18e994a0437cfba9f4c09bd62293e13e49ea774b (PR #2457)
Previous correction was not enough for fixing the Coverity warning. Now we
ensure we don't overflow the buffer.
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 15:18:17 +0000 (17:18 +0200)]
ospfd: null check (Coverity
1399284 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 10:55:53 +0000 (12:55 +0200)]
ospfd: OoB access (Coverity
1399304 1399286 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 14:47:15 +0000 (16:47 +0200)]
ldpd: null check (Coverity
1452317 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 13:43:04 +0000 (15:43 +0200)]
eigrpd ospfd: null chk (Coverity
1458168 1455335 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Fri, 22 Jun 2018 18:26:56 +0000 (14:26 -0400)]
zebra: Log how we got to this failure.
When a filter function fails to work correctly, we get an
error message that something has gone wrong. Unfortunately
we may not have any clues as to where the decode failure
happened. Add a backtrace to give us a clue.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 22 Jun 2018 18:22:02 +0000 (14:22 -0400)]
zebra: Add error messages in places where we have a decode problem
When we receive a netlink message from the kernel we have
handler functions for when we send a netlink command, if these
return a failure ( < 0 ) then we output that we had a parse
issue. But if all we get is:
2018-06-21T23:47:45.298156+00:00 qct-ix1-08 zebra[1484]: netlink-cmd (NS 0) filter function error
Then it is not very useful to figure out *where* the error happened.
Add more error code when in a decode path to hopefully allow us
to figure out where this message is coming from.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Mon, 25 Jun 2018 13:03:17 +0000 (15:03 +0200)]
bgpd: null check (Coverity
1468413 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 11:09:34 +0000 (13:09 +0200)]
ospf6d: null check (Coverity
1468510 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 10:16:32 +0000 (12:16 +0200)]
isisd: out-of-bounds access (Coverity
1452552 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Mon, 25 Jun 2018 09:19:55 +0000 (11:19 +0200)]
ospfd: OoB access (Coverity
1221445 1221448 )
Signed-off-by: F. Aragon <paco@voltanet.io>
G. Paul Ziemba [Sun, 24 Jun 2018 19:39:03 +0000 (12:39 -0700)]
bgpd: don't nexthop-track twice-leaked routes that came from zebra
Issue 2381: interface based routes not marked "up" when they originate
in zebra, redistributed to bgp vrf, then imported to vpn and then
imported by another vrf.
Routes that are redistributed into BGP from zebra should not get
nexthop tracking (the assumption is that the originating protocol
is responsible to export or withdraw the route according to its own
notion of nexthop status).
The vpn-vrf route-leaking code checks the source route sub_type to
decide whether to use nexthop tracking on the resulting leaked route.
A route that is redistributed from zebra into bgp will have
sub_type==BGP_ROUTE_REDISTRIBUTE. If it is leaked to the vpn RIB,
the resulting vpn RIB route will have sub_type==BGP_ROUTE_IMPORTED.
If THAT vpn route is leaked to another vrf, the original code will
examine only the leak-source route sub_type and, since it is
not BGP_ROUTE_REDISTRIBUTE, will wrongly try to use nexthop tracking
on the new route in the final vrf.
This change modifies the leak function to track back up the
parent links to the ultimate parent of the leak source route
and look at that route's sub_type instead.
Signed-off-by: G. Paul Ziemba <paulz@labn.net>
paco [Fri, 22 Jun 2018 19:35:01 +0000 (21:35 +0200)]
lib: null check (Coverity
1470150 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Jafar Al-Gharaibeh [Fri, 22 Jun 2018 19:19:13 +0000 (14:19 -0500)]
Merge pull request #2520 from donaldsharp/privs_smivs
lib: Fix privs when using HAVE_CAPABILITIES
Quentin Young [Fri, 22 Jun 2018 18:11:09 +0000 (14:11 -0400)]
Merge pull request #2512 from pacovn/Coverity_1399200_Unchecked_return_value_from_library
vtysh: return value check (Coverity
1399200 )
paco [Fri, 22 Jun 2018 13:41:35 +0000 (15:41 +0200)]
ripd: out-of-bounds read (Coverity
1399295 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Lou Berger [Fri, 22 Jun 2018 17:13:05 +0000 (13:13 -0400)]
Merge pull request #2449 from donaldsharp/lib_delayed_read
Lib delayed read
paco [Thu, 21 Jun 2018 10:09:44 +0000 (12:09 +0200)]
vtysh: return value check (Coverity
1399200 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Quentin Young [Thu, 21 Jun 2018 19:12:33 +0000 (15:12 -0400)]
Merge pull request #2501 from pacovn/infer_unused1
bgpd isisd ldpd lib ospfd pimd: redundancy (infer, grouped)
Quentin Young [Thu, 21 Jun 2018 19:02:31 +0000 (15:02 -0400)]
Merge pull request #2505 from pacovn/Coverity_1143220_Argument_cannot_be_negative
tools: return check (2) (Coverity
1143220 )
Quentin Young [Thu, 21 Jun 2018 19:00:12 +0000 (15:00 -0400)]
Merge pull request #2511 from pacovn/Coverity_1452287_et_al_Explicit_null_dereferenced
ldpd, lib: null check (Coverity
1452287 and 20 alike)
Quentin Young [Thu, 21 Jun 2018 18:43:16 +0000 (14:43 -0400)]
Merge pull request #2408 from ajones-rvbd/ajones-issue-2403
tests: use BUILT_SOURCES in tests/Makefile.am for automake 1.16.1
Quentin Young [Thu, 21 Jun 2018 18:38:47 +0000 (14:38 -0400)]
Merge pull request #2502 from pacovn/Coverity_1221459_Use_after_free
ospf6d: fix use after free (2) (Coverity
1221459 )
Quentin Young [Thu, 21 Jun 2018 18:34:56 +0000 (14:34 -0400)]
Merge pull request #2513 from pacovn/Coverity_1455334_et_al_Dereference_null_return_value
eigrpd: null check (Coverity
1455334 and 4 alike)
Quentin Young [Thu, 21 Jun 2018 18:24:11 +0000 (14:24 -0400)]
Merge pull request #2518 from pacovn/Coverity_23106_Explicit_null_dereferenced
bgpd: null check (Coverity 23106)
Quentin Young [Thu, 21 Jun 2018 18:20:48 +0000 (14:20 -0400)]
Merge pull request #2519 from pacovn/Coverity_1399238_Logically_dead_code
bgpd: dead code (Coverity
1399238 )
Quentin Young [Thu, 21 Jun 2018 18:18:47 +0000 (14:18 -0400)]
Merge pull request #2522 from pacovn/Coverity_1399277_Explicit_null_dereferenced
lib: null check (Coverity
1399277 )
Quentin Young [Thu, 21 Jun 2018 18:17:58 +0000 (14:17 -0400)]
Merge pull request #2523 from pacovn/Coverity_1455380_Dereference_null_return_value
bgpd: null check (Coverity
1455380 )
paco [Thu, 21 Jun 2018 15:49:13 +0000 (17:49 +0200)]
bgpd: null check (Coverity
1455380 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Thu, 21 Jun 2018 15:34:16 +0000 (17:34 +0200)]
lib: null check (Coverity
1399277 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 15:28:16 +0000 (11:28 -0400)]
sharpd: Does not need any special priv's
Remove the unnecessary privs that we were requesting
for the sharp daemon.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Thu, 21 Jun 2018 15:22:55 +0000 (17:22 +0200)]
bgpd: dead code (Coverity
1399238 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 15:22:51 +0000 (11:22 -0400)]
lib: Fix privs when using HAVE_CAPABILITIES
If your daemon does not need any special privileges
and you are compiling with HAVE_CAPABILIES, the
zprivs->change pointer will end up NULL due
to the way zprivs_caps_init. So as a check
let's add a NULL check for zprivs->change
and set it to a function that will do nothing.
This change prevents a crash if you raise privileges
when your daemon needs no special privileges.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Renato Westphal [Thu, 21 Jun 2018 15:16:53 +0000 (12:16 -0300)]
Merge pull request #2510 from donaldsharp/extended_ack
zebra: Add extended Ack error parsing to FRR
paco [Thu, 21 Jun 2018 13:58:51 +0000 (15:58 +0200)]
bgpd: null check (Coverity 23106)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 16:09:35 +0000 (18:09 +0200)]
spf6d: fix use after free (2) (Coverity
1221459 )
Previous fix was incomplete, as calling ospf6_lsa_unlock() frees 'req' but
it does not put it to zero, so it was called ospf6_lsdb_remove() afterwards
even being 'req' already freed.
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 10:13:20 +0000 (06:13 -0400)]
include: add netlink.h to our build system
For compilation on platforms that do not have the
linux headers installed.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Thu, 21 Jun 2018 01:20:31 +0000 (21:20 -0400)]
zebra: Add extended Ack error parsing to FRR
Add code to request and read in extended ack information
to provide a bit more context of what went wrong when
a failure is detected in the kernel.
Example of a failed delete:
Jun 20 21:19:25 robot zebra[11878]: Extended Error: Invalid prefix for given prefix length
Jun 20 21:19:25 robot zebra[11878]: netlink-cmd (NS 0) error: Invalid argument, type=RTM_DELROUTE(25), seq=8, pid=
4078403400
Jun 20 21:19:25 robot zebra[11878]: 0:4.3.2.0/24: Route Deletion failure
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Thu, 21 Jun 2018 10:24:53 +0000 (12:24 +0200)]
eigrpd: null check (Coverity
1455334 and 4 alike)
Coverity issues fixed with this commit:
1455334 1455335 1455336 1455337 1455339
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Thu, 21 Jun 2018 11:30:21 +0000 (07:30 -0400)]
Merge pull request #2504 from pacovn/Coverity_23110_Dereference_after_null_check
ospfd: null check (Coverity 23110)
Donald Sharp [Thu, 21 Jun 2018 11:29:51 +0000 (07:29 -0400)]
Merge pull request #2507 from pacovn/Coverity_1436344_1451361_Dereference_after_null_check
bgpd, lib: null check (Coverity
1436344 ,
1451361 )
Donald Sharp [Thu, 21 Jun 2018 11:27:54 +0000 (07:27 -0400)]
Merge pull request #2508 from pacovn/Coverity_1470113_Untrusted_array_index_write
zebra: untrusted array index (Coverity
1470113 )
Donald Sharp [Thu, 21 Jun 2018 11:26:47 +0000 (07:26 -0400)]
Merge pull request #2506 from pacovn/Coverity_1221453_1461297_Dereference_after_null_check
bgpd ospf6d: null check (Coverity
1221453 1461297 )
paco [Thu, 21 Jun 2018 09:18:05 +0000 (11:18 +0200)]
ldpd lib: null check (Coverity
1452287 + 20 alike)
Coverity issues fixed with this commit:
1452287 1452291 1452307 1452310 1452317 1452321 1452327 1452330 1452331 1452336
1452337 1452340 1452352 1452354 1452358
(originated at ldpd/ldpd_vty_cmds_clippy.c)
1448388 1448390 1448392 1448397 1448404 1448408
(originated at lib/plist_clippy.c)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 15:15:37 +0000 (17:15 +0200)]
bgpd isisd ldpd lib ospfd pimd: redundancy (infer)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 16:41:48 +0000 (18:41 +0200)]
tools: return check (2) (Coverity
1143220 )
Previous correction (
657f9948ed593387d29d391832c18dc04326a5a9 ) was incomplete.
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 17:25:06 +0000 (19:25 +0200)]
zebra: untrusted array index (Coverity
1470113 )
This is a correction over
32ac96b2ba9693696d2f1156af1b80985d4e55bb , so
removing the forced string null termination doesn't involve a worse situation
than before (the underflow check should protect for the case of receiving
an incomplete buffer, which would be the cause of non-zero terminated string)
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 17:11:18 +0000 (19:11 +0200)]
bgpd, lib: null check (Coverity
1436344 ,
1451361 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Wed, 20 Jun 2018 16:57:16 +0000 (18:57 +0200)]
bgpd ospf6d: null check (Coverity
1221453 1461297 )
paco [Wed, 20 Jun 2018 16:35:20 +0000 (18:35 +0200)]
ospfd: null check (Coverity 23110)
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Wed, 20 Jun 2018 15:39:07 +0000 (11:39 -0400)]
Merge pull request #2498 from pacovn/Coverity_1470098_Logically_dead_code
bgpd: json output fix (Coverity
1470098 )
paco [Tue, 19 Jun 2018 17:12:36 +0000 (19:12 +0200)]
bgpd: json output fix (Coverity
1470098 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Russ White [Wed, 20 Jun 2018 11:55:56 +0000 (07:55 -0400)]
Merge pull request #2415 from qlyoung/pbr-table-range
PBR table range configuration + misc cleanups
Russ White [Wed, 20 Jun 2018 11:55:08 +0000 (07:55 -0400)]
Merge pull request #2462 from pacovn/Coverity_1465494_String_not_null_terminated
zebra: string null termination (Coverity
1465494 )
Russ White [Wed, 20 Jun 2018 11:52:37 +0000 (07:52 -0400)]
Merge pull request #2485 from pacovn/cppcheck_ldpd_redundant_condition
ldpd: redundant condition (cppcheck)
Russ White [Wed, 20 Jun 2018 11:41:06 +0000 (07:41 -0400)]
Merge pull request #2461 from pacovn/Coverity_1399380_Untrusted_value_as_argument
bgpd: Untrusted argument (Coverity
1399380 )
Russ White [Wed, 20 Jun 2018 11:38:19 +0000 (07:38 -0400)]
Merge pull request #2495 from pacovn/fixme_all_digit
bgpd, lib, ospfd, zebra: all_digit moved to frrstr
Russ White [Wed, 20 Jun 2018 11:37:27 +0000 (07:37 -0400)]
Merge pull request #2496 from pacovn/fixme_group1
isisd, zebra: FIXME fixes (grouped)
Russ White [Wed, 20 Jun 2018 11:19:31 +0000 (07:19 -0400)]
Merge pull request #2499 from donaldsharp/routemap_kisses
Some route-map prep
Russ White [Wed, 20 Jun 2018 11:18:11 +0000 (07:18 -0400)]
Merge pull request #2500 from msablic/pim_doc2
doc: added parameters to two PIM commands
Russ White [Wed, 20 Jun 2018 11:14:49 +0000 (07:14 -0400)]
Merge pull request #2446 from pacovn/Coverity_1452454_1452455_1452456_Out-of-bounds_access
ospfd: OoB access (Cov
1452454 1452455 1452456 )
Mladen Sablic [Wed, 20 Jun 2018 09:48:15 +0000 (11:48 +0200)]
doc: added parameters to two PIM commands
ip igmp join and mtrace have parameters which were missing from
the command spec.
Signed-off-by: Mladen Sablic <mladen.sablic@gmail.com>
Donald Sharp [Wed, 20 Jun 2018 01:18:33 +0000 (21:18 -0400)]
bgpd, lib, zebra: Remove unnecessary return
The route_map_walk_update_list callback function
never uses the return code, so just remove it.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Wed, 20 Jun 2018 01:12:11 +0000 (21:12 -0400)]
lib: Don't expose a function that is never used
route_map_clear_updated is only used by routemap.c,
don't expose it too be used by the outside world.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Wed, 20 Jun 2018 01:00:39 +0000 (21:00 -0400)]
zebra: Add initial framework to keep track of changed route-maps
Add some basic code for zebra to start to keep track
of route-maps that have changed. At this point we
are not doing anything. As we fix code to handle
route-maps better, code will be shifted around.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Wed, 20 Jun 2018 00:46:07 +0000 (20:46 -0400)]
pimd: Remove unused code
pim does not even use route-maps, remove the
unneded code.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Wed, 20 Jun 2018 00:44:15 +0000 (20:44 -0400)]
bgpd, lib, pimd: Remove unused variable.
route_map_mark_updated has a `int del_later` variable
that is passed in but never used. Just remove it.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Tue, 19 Jun 2018 16:22:01 +0000 (18:22 +0200)]
isisd, zebra: FIXME fixes
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Tue, 19 Jun 2018 15:59:53 +0000 (17:59 +0200)]
bgpd, lib, ospfd, zebra: all_digit moved to frrstr
This solves a pending FIXME
Signed-off-by: F. Aragon <paco@voltanet.io>
Quentin Young [Tue, 19 Jun 2018 15:15:13 +0000 (11:15 -0400)]
Merge pull request #2459 from pacovn/Coverity_1469898_Uninitialized_scalar_variable
lib: uninitialized variable (Coverity
1469898 )
Martin Winter [Tue, 19 Jun 2018 14:17:03 +0000 (07:17 -0700)]
Merge pull request #2373 from rubenk/specfile-cleanups
Red Hat spec file cleanup
Donald Sharp [Tue, 19 Jun 2018 13:06:37 +0000 (09:06 -0400)]
doc: Add --log-level documentation
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Tue, 19 Jun 2018 13:02:21 +0000 (09:02 -0400)]
lib: Add --log-level to daemons
Add the ability to specify the designated log level at startup.
--log-level <emergencies|alerts|critical|errors|warnings|notifications|informational|debugging>
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
paco [Fri, 15 Jun 2018 13:55:03 +0000 (15:55 +0200)]
bgpd: Untrusted argument (Coverity
1399380 )
Signed-off-by: F. Aragon <paco@voltanet.io>
paco [Fri, 15 Jun 2018 14:16:11 +0000 (16:16 +0200)]
zebra: string null termination (Coverity
1465494 )
Signed-off-by: F. Aragon <paco@voltanet.io>
Donald Sharp [Fri, 15 Jun 2018 17:48:11 +0000 (13:48 -0400)]
lib: Remove special case code to use syslog
Remove the special case code to use syslog for Cumulus.
They can specify this via startup now instead of having
a special compile flag for this option.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 15 Jun 2018 17:43:13 +0000 (13:43 -0400)]
doc: Add some documentation for cli logging
Add some basic documentation for the new cli added to all daemons.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 15 Jun 2018 17:38:46 +0000 (13:38 -0400)]
lib: Add new cli to specify where to output logs on startup
When we are starting a daemon, allow the user to specify:
--log <stdout|syslog|file:file_name>
This can be used on early startup to put the log files
where the end user wants them to show up.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 15 Jun 2018 16:34:31 +0000 (12:34 -0400)]
vtysh: Fix 'no log syslog ..' to be correct
The vtysh version of `no log syslog...` was out
of sync with what is actually correct. Fix.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Fri, 15 Jun 2018 02:33:59 +0000 (22:33 -0400)]
ldpd: Schedule application of config till after read-in
With commit
e94b38d94b5 we are now scheduling the read
of vty config until after the startup of main thread
processing. It now becomes necessary to move the
application of the config until after the read
in of the config from a file if we are using a
non-integrated config.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Donald Sharp [Tue, 8 May 2018 12:35:06 +0000 (08:35 -0400)]
lib: Create a thread for reading in the cli
The read in of cli was happening prior to thread
event handling for non-integrated configs. This
is interesting for 2 reasons:
1) Read-in of integrated configs was after thread
event loop startup, so we had a difference of behavior
2) Read-in can cause a series of events that cause
us to attempt to communicate with zebra. The zebra
zapi connection only happens after the thread event
loop has been started. This can cause data that
is being written down to zebra to be lost and
no real way to notice that this has happened and
to recover gracefully.
Modify the code to create a thread event for read
in of client config.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>