Skip to content

Commit a6a2198

Browse files
author
Marc Odermatt
committed
FABRID detachable extensions
1 parent be0252c commit a6a2198

File tree

1 file changed

+80
-0
lines changed

1 file changed

+80
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
// Copyright 2018 ETH Zurich, Anapaya Systems
2+
//
3+
// Licensed under the Apache License, Version 2.0 (the "License");
4+
// you may not use this file except in compliance with the License.
5+
// You may obtain a copy of the License at
6+
//
7+
// http://www.apache.org/licenses/LICENSE-2.0
8+
//
9+
// Unless required by applicable law or agreed to in writing, software
10+
// distributed under the License is distributed on an "AS IS" BASIS,
11+
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12+
// See the License for the specific language governing permissions and
13+
// limitations under the License.
14+
15+
package combinator
16+
17+
import (
18+
"time"
19+
20+
"github.com/scionproto/scion/pkg/addr"
21+
"github.com/scionproto/scion/pkg/experimental/fabrid"
22+
fabrid_ext "github.com/scionproto/scion/pkg/segment/extensions/fabrid"
23+
"github.com/scionproto/scion/pkg/snet"
24+
)
25+
26+
// We go through the list of ASEntries and store for each IA a pointer to the FABRID
27+
// Map found in the ASEntries' extensions. If there is already a map stored, check the info time,
28+
// and replace with the newer FABRID maps. This results in a map[IA]FabridMapEntry, which can be
29+
// used to find the policies that are available for each of the interface pairs on the path.
30+
type FabridMapEntry struct {
31+
Map *fabrid_ext.Detached
32+
Ts time.Time
33+
// The Digest of the Fabrid Maps, this can be empty.
34+
Digest []byte
35+
}
36+
37+
func GetFabridInfoForIntfs(ia addr.IA, ig, eg uint16, maps map[addr.IA]FabridMapEntry,
38+
allowIpPolicies bool) *snet.FabridInfo {
39+
policies := make([]*fabrid.Policy, 0)
40+
fabridMap, exist := maps[ia]
41+
if !exist {
42+
return &snet.FabridInfo{
43+
Enabled: false,
44+
Policies: policies,
45+
Digest: []byte{},
46+
Detached: false,
47+
}
48+
} else if fabridMap.Map == nil {
49+
return &snet.FabridInfo{
50+
Enabled: true,
51+
Policies: policies,
52+
Digest: fabridMap.Digest,
53+
Detached: len(fabridMap.Digest) > 0,
54+
}
55+
}
56+
for k, v := range fabridMap.Map.SupportedIndicesMap {
57+
if !k.Matches(ig, eg, allowIpPolicies) {
58+
continue
59+
}
60+
for _, policy := range v {
61+
val, ok := fabridMap.Map.IndexIdentiferMap[policy]
62+
if !ok {
63+
continue
64+
}
65+
policies = append(policies, &fabrid.Policy{
66+
IsLocal: val.IsLocal,
67+
Identifier: val.Identifier,
68+
Index: fabrid.PolicyID(policy),
69+
})
70+
71+
}
72+
}
73+
74+
return &snet.FabridInfo{
75+
Enabled: true,
76+
Policies: policies,
77+
Digest: fabridMap.Digest,
78+
Detached: false,
79+
}
80+
}

0 commit comments

Comments
 (0)