]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
fc2f9534 | 2 | |
baa3fadf DDM |
3 | #include <linux/rtnetlink.h> |
4 | ||
b78d73fa | 5 | #include "alloc-util.h" |
1e4e5572 | 6 | #include "bitfield.h" |
fc2f9534 | 7 | #include "conf-parser.h" |
89fa9a6b | 8 | #include "escape.h" |
3ae6b3bf | 9 | #include "logarithm.h" |
fd221544 | 10 | #include "networkd-link.h" |
81f63763 | 11 | #include "networkd-network.h" |
fc2f9534 | 12 | #include "networkd-util.h" |
6bedfcbb | 13 | #include "parse-util.h" |
8b43440b | 14 | #include "string-table.h" |
07630cea | 15 | #include "string-util.h" |
89fa9a6b | 16 | #include "web-util.h" |
fc2f9534 | 17 | |
a093533c YW |
18 | /* This is used in log messages, and never used in parsing settings. So, upper cases are OK. */ |
19 | static const char * const network_config_source_table[_NETWORK_CONFIG_SOURCE_MAX] = { | |
20 | [NETWORK_CONFIG_SOURCE_FOREIGN] = "foreign", | |
21 | [NETWORK_CONFIG_SOURCE_STATIC] = "static", | |
22 | [NETWORK_CONFIG_SOURCE_IPV4LL] = "IPv4LL", | |
23 | [NETWORK_CONFIG_SOURCE_DHCP4] = "DHCPv4", | |
24 | [NETWORK_CONFIG_SOURCE_DHCP6] = "DHCPv6", | |
a27588d4 | 25 | [NETWORK_CONFIG_SOURCE_DHCP_PD] = "DHCP-PD", |
a093533c | 26 | [NETWORK_CONFIG_SOURCE_NDISC] = "NDisc", |
2e62139a | 27 | [NETWORK_CONFIG_SOURCE_RUNTIME] = "runtime", |
a093533c YW |
28 | }; |
29 | ||
bf6e9b38 | 30 | DEFINE_STRING_TABLE_LOOKUP(network_config_source, NetworkConfigSource); |
a093533c YW |
31 | |
32 | int network_config_state_to_string_alloc(NetworkConfigState s, char **ret) { | |
67b65e11 | 33 | static const char* states[] = { |
67b65e11 ZJS |
34 | [LOG2U(NETWORK_CONFIG_STATE_REQUESTING)] = "requesting", |
35 | [LOG2U(NETWORK_CONFIG_STATE_CONFIGURING)] = "configuring", | |
36 | [LOG2U(NETWORK_CONFIG_STATE_CONFIGURED)] = "configured", | |
37 | [LOG2U(NETWORK_CONFIG_STATE_MARKED)] = "marked", | |
38 | [LOG2U(NETWORK_CONFIG_STATE_REMOVING)] = "removing", | |
a093533c YW |
39 | }; |
40 | _cleanup_free_ char *buf = NULL; | |
41 | ||
42 | assert(ret); | |
43 | ||
67b65e11 | 44 | for (size_t i = 0; i < ELEMENTSOF(states); i++) |
1e4e5572 MY |
45 | if (BIT_SET(s, i)) |
46 | if (!strextend_with_separator(&buf, ",", ASSERT_PTR(states[i]))) | |
67b65e11 | 47 | return -ENOMEM; |
a093533c YW |
48 | |
49 | *ret = TAKE_PTR(buf); | |
50 | return 0; | |
51 | } | |
52 | ||
53 | static const char * const address_family_table[_ADDRESS_FAMILY_MAX] = { | |
135c4aad LP |
54 | [ADDRESS_FAMILY_NO] = "no", |
55 | [ADDRESS_FAMILY_YES] = "yes", | |
56 | [ADDRESS_FAMILY_IPV4] = "ipv4", | |
57 | [ADDRESS_FAMILY_IPV6] = "ipv6", | |
e800fd24 YW |
58 | }; |
59 | ||
a093533c | 60 | static const char * const routing_policy_rule_address_family_table[_ADDRESS_FAMILY_MAX] = { |
135c4aad LP |
61 | [ADDRESS_FAMILY_YES] = "both", |
62 | [ADDRESS_FAMILY_IPV4] = "ipv4", | |
63 | [ADDRESS_FAMILY_IPV6] = "ipv6", | |
f6c6ff97 YW |
64 | }; |
65 | ||
a093533c | 66 | static const char * const nexthop_address_family_table[_ADDRESS_FAMILY_MAX] = { |
135c4aad LP |
67 | [ADDRESS_FAMILY_IPV4] = "ipv4", |
68 | [ADDRESS_FAMILY_IPV6] = "ipv6", | |
f1923efc YW |
69 | }; |
70 | ||
a093533c | 71 | static const char * const duplicate_address_detection_address_family_table[_ADDRESS_FAMILY_MAX] = { |
135c4aad LP |
72 | [ADDRESS_FAMILY_NO] = "none", |
73 | [ADDRESS_FAMILY_YES] = "both", | |
74 | [ADDRESS_FAMILY_IPV4] = "ipv4", | |
75 | [ADDRESS_FAMILY_IPV6] = "ipv6", | |
051e77ca SS |
76 | }; |
77 | ||
a093533c | 78 | static const char * const dhcp_deprecated_address_family_table[_ADDRESS_FAMILY_MAX] = { |
135c4aad LP |
79 | [ADDRESS_FAMILY_NO] = "none", |
80 | [ADDRESS_FAMILY_YES] = "both", | |
81 | [ADDRESS_FAMILY_IPV4] = "v4", | |
82 | [ADDRESS_FAMILY_IPV6] = "v6", | |
bde8467a YW |
83 | }; |
84 | ||
a093533c | 85 | static const char * const ip_masquerade_address_family_table[_ADDRESS_FAMILY_MAX] = { |
4c72d851 YW |
86 | [ADDRESS_FAMILY_NO] = "no", |
87 | [ADDRESS_FAMILY_YES] = "both", | |
88 | [ADDRESS_FAMILY_IPV4] = "ipv4", | |
89 | [ADDRESS_FAMILY_IPV6] = "ipv6", | |
90 | }; | |
91 | ||
a093533c | 92 | static const char * const dhcp_lease_server_type_table[_SD_DHCP_LEASE_SERVER_TYPE_MAX] = { |
ddb82ec2 LP |
93 | [SD_DHCP_LEASE_DNS] = "DNS servers", |
94 | [SD_DHCP_LEASE_NTP] = "NTP servers", | |
95 | [SD_DHCP_LEASE_SIP] = "SIP servers", | |
96 | [SD_DHCP_LEASE_POP3] = "POP3 servers", | |
97 | [SD_DHCP_LEASE_SMTP] = "SMTP servers", | |
98 | [SD_DHCP_LEASE_LPR] = "LPR servers", | |
ddc026f3 ZJS |
99 | }; |
100 | ||
2d792895 | 101 | DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(address_family, AddressFamily, ADDRESS_FAMILY_YES); |
3ca1fab7 ZJS |
102 | |
103 | AddressFamily link_local_address_family_from_string(const char *s) { | |
104 | if (streq_ptr(s, "fallback")) /* compat name */ | |
105 | return ADDRESS_FAMILY_YES; | |
106 | if (streq_ptr(s, "fallback-ipv4")) /* compat name */ | |
107 | return ADDRESS_FAMILY_IPV4; | |
108 | return address_family_from_string(s); | |
109 | } | |
110 | ||
f6c6ff97 | 111 | DEFINE_STRING_TABLE_LOOKUP(routing_policy_rule_address_family, AddressFamily); |
f1923efc | 112 | DEFINE_STRING_TABLE_LOOKUP(nexthop_address_family, AddressFamily); |
051e77ca | 113 | DEFINE_STRING_TABLE_LOOKUP(duplicate_address_detection_address_family, AddressFamily); |
42efe5be | 114 | DEFINE_CONFIG_PARSE_ENUM(config_parse_link_local_address_family, link_local_address_family, AddressFamily); |
bde8467a | 115 | DEFINE_STRING_TABLE_LOOKUP_FROM_STRING(dhcp_deprecated_address_family, AddressFamily); |
4c72d851 | 116 | DEFINE_PRIVATE_STRING_TABLE_LOOKUP_FROM_STRING(ip_masquerade_address_family, AddressFamily); |
2324fd3a | 117 | DEFINE_STRING_TABLE_LOOKUP(dhcp_lease_server_type, sd_dhcp_lease_server_type_t); |
fc2f9534 | 118 | |
81f63763 YW |
119 | bool link_should_mark_config(Link *link, bool only_static, NetworkConfigSource source, uint8_t protocol) { |
120 | /* Always mark static configs. */ | |
121 | if (source == NETWORK_CONFIG_SOURCE_STATIC) | |
122 | return true; | |
123 | ||
124 | /* When 'only_static' is true, do not mark other configs. */ | |
125 | if (only_static) | |
126 | return false; | |
127 | ||
128 | /* Always ignore dynamically assigned configs. */ | |
129 | if (source != NETWORK_CONFIG_SOURCE_FOREIGN) | |
130 | return false; | |
131 | ||
132 | /* When only_static is false, the logic is conditionalized with KeepConfiguration=. Hence, the | |
133 | * interface needs to have a matching .network file. */ | |
134 | assert(link); | |
135 | assert(link->network); | |
136 | ||
137 | /* When KeepConfiguration=yes, keep all foreign configs. */ | |
138 | if (FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_YES)) | |
139 | return false; | |
140 | ||
141 | /* When static, keep all static configs. */ | |
142 | if (FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_STATIC) && | |
143 | protocol == RTPROT_STATIC) | |
144 | return false; | |
145 | ||
146 | /* When dynamic, keep all dynamic configs. */ | |
147 | if (FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_DYNAMIC) && | |
148 | IN_SET(protocol, RTPROT_DHCP, RTPROT_RA, RTPROT_REDIRECT)) | |
149 | return false; | |
150 | ||
151 | /* Otherwise, mark the config. */ | |
152 | return true; | |
153 | } | |
154 | ||
4c72d851 YW |
155 | int config_parse_ip_masquerade( |
156 | const char *unit, | |
157 | const char *filename, | |
158 | unsigned line, | |
159 | const char *section, | |
160 | unsigned section_line, | |
161 | const char *lvalue, | |
162 | int ltype, | |
163 | const char *rvalue, | |
164 | void *data, | |
165 | void *userdata) { | |
166 | ||
167 | AddressFamily a, *ret = data; | |
168 | int r; | |
169 | ||
170 | if (isempty(rvalue)) { | |
171 | *ret = ADDRESS_FAMILY_NO; | |
172 | return 0; | |
173 | } | |
174 | ||
175 | r = parse_boolean(rvalue); | |
176 | if (r >= 0) { | |
177 | if (r) | |
178 | log_syntax(unit, LOG_WARNING, filename, line, 0, | |
179 | "IPMasquerade=%s is deprecated, and it is handled as \"ipv4\" instead of \"both\". " | |
180 | "Please use \"ipv4\" or \"both\".", | |
181 | rvalue); | |
182 | ||
183 | *ret = r ? ADDRESS_FAMILY_IPV4 : ADDRESS_FAMILY_NO; | |
184 | return 0; | |
185 | } | |
186 | ||
187 | a = ip_masquerade_address_family_from_string(rvalue); | |
188 | if (a < 0) { | |
189 | log_syntax(unit, LOG_WARNING, filename, line, a, | |
190 | "Failed to parse IPMasquerade= setting, ignoring assignment: %s", rvalue); | |
191 | return 0; | |
192 | } | |
193 | ||
194 | *ret = a; | |
195 | return 0; | |
196 | } | |
197 | ||
89fa9a6b ZJS |
198 | int config_parse_mud_url( |
199 | const char *unit, | |
200 | const char *filename, | |
201 | unsigned line, | |
202 | const char *section, | |
203 | unsigned section_line, | |
204 | const char *lvalue, | |
205 | int ltype, | |
206 | const char *rvalue, | |
77976a68 YW |
207 | void *data, |
208 | void *userdata) { | |
209 | ||
210 | _cleanup_free_ char *unescaped = NULL; | |
99534007 | 211 | char **url = ASSERT_PTR(data); |
77976a68 | 212 | ssize_t l; |
89fa9a6b ZJS |
213 | |
214 | assert(filename); | |
215 | assert(lvalue); | |
216 | assert(rvalue); | |
89fa9a6b | 217 | |
77976a68 YW |
218 | if (isempty(rvalue)) { |
219 | *url = mfree(*url); | |
220 | return 0; | |
221 | } | |
89fa9a6b ZJS |
222 | |
223 | l = cunescape(rvalue, 0, &unescaped); | |
224 | if (l < 0) { | |
225 | log_syntax(unit, LOG_WARNING, filename, line, l, | |
226 | "Failed to unescape MUD URL, ignoring: %s", rvalue); | |
227 | return 0; | |
228 | } | |
229 | ||
230 | if (l > UINT8_MAX || !http_url_is_valid(unescaped)) { | |
231 | log_syntax(unit, LOG_WARNING, filename, line, 0, | |
232 | "Invalid MUD URL, ignoring: %s", rvalue); | |
233 | return 0; | |
234 | } | |
235 | ||
77976a68 | 236 | return free_and_replace(*url, unescaped); |
89fa9a6b | 237 | } |