]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-util.c
4e1a12d8d3bc97b6c8bb6debb2a29f4d38c9254f
[thirdparty/systemd.git] / src / network / networkd-util.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <linux/rtnetlink.h>
4
5 #include "alloc-util.h"
6 #include "bitfield.h"
7 #include "conf-parser.h"
8 #include "escape.h"
9 #include "logarithm.h"
10 #include "networkd-link.h"
11 #include "networkd-network.h"
12 #include "networkd-util.h"
13 #include "parse-util.h"
14 #include "string-table.h"
15 #include "string-util.h"
16 #include "web-util.h"
17
18 /* This is used in log messages, and never used in parsing settings. So, upper cases are OK. */
19 static const char * const network_config_source_table[_NETWORK_CONFIG_SOURCE_MAX] = {
20 [NETWORK_CONFIG_SOURCE_FOREIGN] = "foreign",
21 [NETWORK_CONFIG_SOURCE_STATIC] = "static",
22 [NETWORK_CONFIG_SOURCE_IPV4LL] = "IPv4LL",
23 [NETWORK_CONFIG_SOURCE_DHCP4] = "DHCPv4",
24 [NETWORK_CONFIG_SOURCE_DHCP6] = "DHCPv6",
25 [NETWORK_CONFIG_SOURCE_DHCP_PD] = "DHCP-PD",
26 [NETWORK_CONFIG_SOURCE_NDISC] = "NDisc",
27 [NETWORK_CONFIG_SOURCE_RUNTIME] = "runtime",
28 };
29
30 DEFINE_STRING_TABLE_LOOKUP(network_config_source, NetworkConfigSource);
31
32 int network_config_state_to_string_alloc(NetworkConfigState s, char **ret) {
33 static const char* states[] = {
34 [LOG2U(NETWORK_CONFIG_STATE_REQUESTING)] = "requesting",
35 [LOG2U(NETWORK_CONFIG_STATE_CONFIGURING)] = "configuring",
36 [LOG2U(NETWORK_CONFIG_STATE_CONFIGURED)] = "configured",
37 [LOG2U(NETWORK_CONFIG_STATE_MARKED)] = "marked",
38 [LOG2U(NETWORK_CONFIG_STATE_REMOVING)] = "removing",
39 };
40 _cleanup_free_ char *buf = NULL;
41
42 assert(ret);
43
44 for (size_t i = 0; i < ELEMENTSOF(states); i++)
45 if (BIT_SET(s, i))
46 if (!strextend_with_separator(&buf, ",", ASSERT_PTR(states[i])))
47 return -ENOMEM;
48
49 *ret = TAKE_PTR(buf);
50 return 0;
51 }
52
53 static const char * const address_family_table[_ADDRESS_FAMILY_MAX] = {
54 [ADDRESS_FAMILY_NO] = "no",
55 [ADDRESS_FAMILY_YES] = "yes",
56 [ADDRESS_FAMILY_IPV4] = "ipv4",
57 [ADDRESS_FAMILY_IPV6] = "ipv6",
58 };
59
60 static const char * const routing_policy_rule_address_family_table[_ADDRESS_FAMILY_MAX] = {
61 [ADDRESS_FAMILY_YES] = "both",
62 [ADDRESS_FAMILY_IPV4] = "ipv4",
63 [ADDRESS_FAMILY_IPV6] = "ipv6",
64 };
65
66 static const char * const nexthop_address_family_table[_ADDRESS_FAMILY_MAX] = {
67 [ADDRESS_FAMILY_IPV4] = "ipv4",
68 [ADDRESS_FAMILY_IPV6] = "ipv6",
69 };
70
71 static const char * const duplicate_address_detection_address_family_table[_ADDRESS_FAMILY_MAX] = {
72 [ADDRESS_FAMILY_NO] = "none",
73 [ADDRESS_FAMILY_YES] = "both",
74 [ADDRESS_FAMILY_IPV4] = "ipv4",
75 [ADDRESS_FAMILY_IPV6] = "ipv6",
76 };
77
78 static const char * const dhcp_deprecated_address_family_table[_ADDRESS_FAMILY_MAX] = {
79 [ADDRESS_FAMILY_NO] = "none",
80 [ADDRESS_FAMILY_YES] = "both",
81 [ADDRESS_FAMILY_IPV4] = "v4",
82 [ADDRESS_FAMILY_IPV6] = "v6",
83 };
84
85 static const char * const ip_masquerade_address_family_table[_ADDRESS_FAMILY_MAX] = {
86 [ADDRESS_FAMILY_NO] = "no",
87 [ADDRESS_FAMILY_YES] = "both",
88 [ADDRESS_FAMILY_IPV4] = "ipv4",
89 [ADDRESS_FAMILY_IPV6] = "ipv6",
90 };
91
92 static const char * const dhcp_lease_server_type_table[_SD_DHCP_LEASE_SERVER_TYPE_MAX] = {
93 [SD_DHCP_LEASE_DNS] = "DNS servers",
94 [SD_DHCP_LEASE_NTP] = "NTP servers",
95 [SD_DHCP_LEASE_SIP] = "SIP servers",
96 [SD_DHCP_LEASE_POP3] = "POP3 servers",
97 [SD_DHCP_LEASE_SMTP] = "SMTP servers",
98 [SD_DHCP_LEASE_LPR] = "LPR servers",
99 };
100
101 DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(address_family, AddressFamily, ADDRESS_FAMILY_YES);
102
103 AddressFamily link_local_address_family_from_string(const char *s) {
104 if (streq_ptr(s, "fallback")) /* compat name */
105 return ADDRESS_FAMILY_YES;
106 if (streq_ptr(s, "fallback-ipv4")) /* compat name */
107 return ADDRESS_FAMILY_IPV4;
108 return address_family_from_string(s);
109 }
110
111 DEFINE_STRING_TABLE_LOOKUP(routing_policy_rule_address_family, AddressFamily);
112 DEFINE_STRING_TABLE_LOOKUP(nexthop_address_family, AddressFamily);
113 DEFINE_STRING_TABLE_LOOKUP(duplicate_address_detection_address_family, AddressFamily);
114 DEFINE_CONFIG_PARSE_ENUM(config_parse_link_local_address_family, link_local_address_family, AddressFamily);
115 DEFINE_STRING_TABLE_LOOKUP_FROM_STRING(dhcp_deprecated_address_family, AddressFamily);
116 DEFINE_PRIVATE_STRING_TABLE_LOOKUP_FROM_STRING(ip_masquerade_address_family, AddressFamily);
117 DEFINE_STRING_TABLE_LOOKUP(dhcp_lease_server_type, sd_dhcp_lease_server_type_t);
118
119 bool link_should_mark_config(Link *link, bool only_static, NetworkConfigSource source, uint8_t protocol) {
120 /* Always mark static configs. */
121 if (source == NETWORK_CONFIG_SOURCE_STATIC)
122 return true;
123
124 /* When 'only_static' is true, do not mark other configs. */
125 if (only_static)
126 return false;
127
128 /* Always ignore dynamically assigned configs. */
129 if (source != NETWORK_CONFIG_SOURCE_FOREIGN)
130 return false;
131
132 /* When only_static is false, the logic is conditionalized with KeepConfiguration=. Hence, the
133 * interface needs to have a matching .network file. */
134 assert(link);
135 assert(link->network);
136
137 /* When KeepConfiguration=yes, keep all foreign configs. */
138 if (FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_YES))
139 return false;
140
141 /* When static, keep all static configs. */
142 if (FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_STATIC) &&
143 protocol == RTPROT_STATIC)
144 return false;
145
146 /* When dynamic, keep all dynamic configs. */
147 if (FLAGS_SET(link->network->keep_configuration, KEEP_CONFIGURATION_DYNAMIC) &&
148 IN_SET(protocol, RTPROT_DHCP, RTPROT_RA, RTPROT_REDIRECT))
149 return false;
150
151 /* Otherwise, mark the config. */
152 return true;
153 }
154
155 int config_parse_ip_masquerade(
156 const char *unit,
157 const char *filename,
158 unsigned line,
159 const char *section,
160 unsigned section_line,
161 const char *lvalue,
162 int ltype,
163 const char *rvalue,
164 void *data,
165 void *userdata) {
166
167 AddressFamily a, *ret = data;
168 int r;
169
170 if (isempty(rvalue)) {
171 *ret = ADDRESS_FAMILY_NO;
172 return 0;
173 }
174
175 r = parse_boolean(rvalue);
176 if (r >= 0) {
177 if (r)
178 log_syntax(unit, LOG_WARNING, filename, line, 0,
179 "IPMasquerade=%s is deprecated, and it is handled as \"ipv4\" instead of \"both\". "
180 "Please use \"ipv4\" or \"both\".",
181 rvalue);
182
183 *ret = r ? ADDRESS_FAMILY_IPV4 : ADDRESS_FAMILY_NO;
184 return 0;
185 }
186
187 a = ip_masquerade_address_family_from_string(rvalue);
188 if (a < 0) {
189 log_syntax(unit, LOG_WARNING, filename, line, a,
190 "Failed to parse IPMasquerade= setting, ignoring assignment: %s", rvalue);
191 return 0;
192 }
193
194 *ret = a;
195 return 0;
196 }
197
198 int config_parse_mud_url(
199 const char *unit,
200 const char *filename,
201 unsigned line,
202 const char *section,
203 unsigned section_line,
204 const char *lvalue,
205 int ltype,
206 const char *rvalue,
207 void *data,
208 void *userdata) {
209
210 _cleanup_free_ char *unescaped = NULL;
211 char **url = ASSERT_PTR(data);
212 ssize_t l;
213
214 assert(filename);
215 assert(lvalue);
216 assert(rvalue);
217
218 if (isempty(rvalue)) {
219 *url = mfree(*url);
220 return 0;
221 }
222
223 l = cunescape(rvalue, 0, &unescaped);
224 if (l < 0) {
225 log_syntax(unit, LOG_WARNING, filename, line, l,
226 "Failed to unescape MUD URL, ignoring: %s", rvalue);
227 return 0;
228 }
229
230 if (l > UINT8_MAX || !http_url_is_valid(unescaped)) {
231 log_syntax(unit, LOG_WARNING, filename, line, 0,
232 "Invalid MUD URL, ignoring: %s", rvalue);
233 return 0;
234 }
235
236 return free_and_replace(*url, unescaped);
237 }