]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
f579559b | 2 | |
9aa5d8ba | 3 | #include <netinet/in.h> |
ca78ad1d ZJS |
4 | #include <sys/stat.h> |
5 | #include <sys/types.h> | |
6 | ||
a553fd32 | 7 | #include "sd-daemon.h" |
b76d99d9 | 8 | #include "sd-event.h" |
b1d4f8e1 | 9 | |
6b4c1c9f | 10 | #include "bus-log-control-api.h" |
430f0182 | 11 | #include "capability-util.h" |
2362a8f5 | 12 | #include "daemon-util.h" |
761cf19d | 13 | #include "firewall-util.h" |
2362a8f5 | 14 | #include "main-func.h" |
35cd0ba5 | 15 | #include "mkdir-label.h" |
413708d1 | 16 | #include "networkd-conf.h" |
6b4c1c9f | 17 | #include "networkd-manager-bus.h" |
23f53b99 | 18 | #include "networkd-manager.h" |
6b4c1c9f | 19 | #include "service-util.h" |
b1d4f8e1 LP |
20 | #include "signal-util.h" |
21 | #include "user-util.h" | |
f579559b | 22 | |
2362a8f5 | 23 | static int run(int argc, char *argv[]) { |
8e766630 | 24 | _cleanup_(manager_freep) Manager *m = NULL; |
d7ac0952 | 25 | _unused_ _cleanup_(notify_on_cleanup) const char *notify_message = NULL; |
f579559b TG |
26 | int r; |
27 | ||
d2acb93d | 28 | log_setup(); |
f579559b | 29 | |
6b4c1c9f YW |
30 | r = service_parse_argv("systemd-networkd.service", |
31 | "Manage and configure network devices, create virtual network devices", | |
32 | BUS_IMPLEMENTATIONS(&manager_object, &log_control_object), | |
33 | argc, argv); | |
34 | if (r <= 0) | |
35 | return r; | |
36 | ||
f579559b TG |
37 | umask(0022); |
38 | ||
2362a8f5 YW |
39 | if (argc != 1) |
40 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "This program takes no arguments."); | |
f579559b | 41 | |
c61f302d | 42 | /* Drop privileges, but only if we have been started as root. If we are not running as root we assume all |
07317d6e | 43 | * privileges are already dropped and we can't create our runtime directory. */ |
c61f302d | 44 | if (geteuid() == 0) { |
07317d6e TM |
45 | const char *user = "systemd-network"; |
46 | uid_t uid; | |
47 | gid_t gid; | |
48 | ||
49 | r = get_user_creds(&user, &uid, &gid, NULL, NULL, 0); | |
50 | if (r < 0) | |
51 | return log_error_errno(r, "Cannot resolve user name %s: %m", user); | |
52 | ||
53 | /* Create runtime directory. This is not necessary when networkd is | |
54 | * started with "RuntimeDirectory=systemd/netif", or after | |
55 | * systemd-tmpfiles-setup.service. */ | |
56 | r = mkdir_safe_label("/run/systemd/netif", 0755, uid, gid, MKDIR_WARN_MODE); | |
57 | if (r < 0) | |
58 | log_warning_errno(r, "Could not create runtime directory: %m"); | |
59 | ||
c61f302d YW |
60 | r = drop_privileges(uid, gid, |
61 | (1ULL << CAP_NET_ADMIN) | | |
62 | (1ULL << CAP_NET_BIND_SERVICE) | | |
63 | (1ULL << CAP_NET_BROADCAST) | | |
64 | (1ULL << CAP_NET_RAW)); | |
65 | if (r < 0) | |
2362a8f5 | 66 | return log_error_errno(r, "Failed to drop privileges: %m"); |
c61f302d | 67 | } |
d3cf48f4 | 68 | |
0a02e383 YW |
69 | /* Always create the directories people can create inotify watches in. |
70 | * It is necessary to create the following subdirectories after drop_privileges() | |
71 | * to support old kernels not supporting AmbientCapabilities=. */ | |
07317d6e | 72 | r = mkdir_safe_label("/run/systemd/netif/links", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE); |
0a02e383 YW |
73 | if (r < 0) |
74 | log_warning_errno(r, "Could not create runtime directory 'links': %m"); | |
75 | ||
07317d6e | 76 | r = mkdir_safe_label("/run/systemd/netif/leases", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE); |
0a02e383 YW |
77 | if (r < 0) |
78 | log_warning_errno(r, "Could not create runtime directory 'leases': %m"); | |
79 | ||
07317d6e | 80 | r = mkdir_safe_label("/run/systemd/netif/lldp", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE); |
0a02e383 YW |
81 | if (r < 0) |
82 | log_warning_errno(r, "Could not create runtime directory 'lldp': %m"); | |
83 | ||
4c78dc17 | 84 | r = manager_new(&m, /* test_mode = */ false); |
2362a8f5 YW |
85 | if (r < 0) |
86 | return log_error_errno(r, "Could not create manager: %m"); | |
8f203c16 | 87 | |
4c78dc17 | 88 | r = manager_setup(m); |
2362a8f5 | 89 | if (r < 0) |
f31fa080 | 90 | return log_error_errno(r, "Could not set up manager: %m"); |
f579559b | 91 | |
413708d1 VK |
92 | r = manager_parse_config_file(m); |
93 | if (r < 0) | |
94 | log_warning_errno(r, "Failed to parse configuration file: %m"); | |
95 | ||
f0c4cd7a | 96 | r = manager_load_config(m); |
2362a8f5 YW |
97 | if (r < 0) |
98 | return log_error_errno(r, "Could not load configuration files: %m"); | |
3bef724f | 99 | |
446aaaf3 | 100 | r = manager_enumerate(m); |
2362a8f5 | 101 | if (r < 0) |
446aaaf3 | 102 | return r; |
c16c7808 | 103 | |
b76d99d9 | 104 | r = manager_start(m); |
2362a8f5 YW |
105 | if (r < 0) |
106 | return log_error_errno(r, "Could not start manager: %m"); | |
b76d99d9 | 107 | |
73432d67 TG |
108 | log_info("Enumeration completed"); |
109 | ||
2362a8f5 | 110 | notify_message = notify_start(NOTIFY_READY, NOTIFY_STOPPING); |
f882c247 | 111 | |
3534a043 | 112 | r = sd_event_loop(m->event); |
2362a8f5 YW |
113 | if (r < 0) |
114 | return log_error_errno(r, "Event loop failed: %m"); | |
f579559b | 115 | |
2362a8f5 | 116 | return 0; |
f579559b | 117 | } |
2362a8f5 YW |
118 | |
119 | DEFINE_MAIN_FUNCTION(run); |