networkd-network.c revision 79f17ea6f8d885da063f50d966891adaee236b26
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering/***
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering This file is part of systemd.
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering Copyright 2013 Tom Gundersen <teg@jklm.no>
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering systemd is free software; you can redistribute it and/or modify it
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering under the terms of the GNU Lesser General Public License as published by
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering the Free Software Foundation; either version 2.1 of the License, or
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering (at your option) any later version.
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering systemd is distributed in the hope that it will be useful, but
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering WITHOUT ANY WARRANTY; without even the implied warranty of
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering Lesser General Public License for more details.
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering You should have received a copy of the GNU Lesser General Public License
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering along with systemd; If not, see <http://www.gnu.org/licenses/>.
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering***/
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering#include <ctype.h>
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering#include <net/if.h>
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering#include "conf-files.h"
50f1e641a93cacfc693b0c3d300bee5df0c8c460Tom Gundersen#include "conf-parser.h"
71d35b6b5563817dfbe757ab9e3b9f018b2db491Thomas Hindoe Paaboel Andersen#include "util.h"
322345fdb9865ef2477fba8e4bdde0e1183ef505Lennart Poettering#include "hostname-util.h"
623a4c97b9175f95c4b1c6fc34e36c56f1e4ddbfLennart Poettering#include "networkd.h"
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering#include "networkd-netdev.h"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering#include "networkd-link.h"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering#include "network-internal.h"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering#include "dns-domain.h"
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poetteringstatic int network_load_one(Manager *manager, const char *filename) {
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering _cleanup_network_free_ Network *network = NULL;
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering _cleanup_fclose_ FILE *file = NULL;
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering char *d;
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering Route *route;
23502de3b0891455c8ce499a9eb61b69d060a829Daniel Mack Address *address;
23502de3b0891455c8ce499a9eb61b69d060a829Daniel Mack int r;
23502de3b0891455c8ce499a9eb61b69d060a829Daniel Mack
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering assert(manager);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering assert(filename);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering file = fopen(filename, "re");
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering if (!file) {
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering if (errno == ENOENT)
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering return 0;
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering else
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering return -errno;
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering }
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering if (null_or_empty_fd(fileno(file))) {
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering log_debug("Skipping empty file: %s", filename);
e0240c64b76ba8f0c9219feb23a5783f23100216Lennart Poettering return 0;
e0240c64b76ba8f0c9219feb23a5783f23100216Lennart Poettering }
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering network = new0(Network, 1);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering if (!network)
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering return log_oom();
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering network->manager = manager;
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering LIST_HEAD_INIT(network->static_addresses);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering LIST_HEAD_INIT(network->static_routes);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering LIST_HEAD_INIT(network->static_fdb_entries);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
af22c65b272f0e7a1c0518c222749f3c09d05438Lennart Poettering network->stacked_netdevs = hashmap_new(&string_hash_ops);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering if (!network->stacked_netdevs)
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering return log_oom();
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering network->addresses_by_section = hashmap_new(NULL);
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering if (!network->addresses_by_section)
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering return log_oom();
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering network->routes_by_section = hashmap_new(NULL);
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering if (!network->routes_by_section)
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering return log_oom();
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering network->fdb_entries_by_section = hashmap_new(NULL);
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering if (!network->fdb_entries_by_section)
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering return log_oom();
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering network->filename = strdup(filename);
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering if (!network->filename)
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering return log_oom();
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering network->name = strdup(basename(filename));
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering if (!network->name)
1b4f6e79ec51a57003896a0b605fba427b4a98d2Lennart Poettering return log_oom();
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering d = strrchr(network->name, '.');
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering if (!d)
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering return -EINVAL;
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering assert(streq(d, ".network"));
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering *d = '\0';
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering
7b50eb2efa122200e39646c19a29abab302f7d24Lennart Poettering network->dhcp = ADDRESS_FAMILY_NO;
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering network->dhcp_ntp = true;
a8812dd7f161a3e459c1730ac92ff2bbc9986ff1Lennart Poettering network->dhcp_dns = true;
a8812dd7f161a3e459c1730ac92ff2bbc9986ff1Lennart Poettering network->dhcp_hostname = true;
a8812dd7f161a3e459c1730ac92ff2bbc9986ff1Lennart Poettering network->dhcp_routes = true;
a8812dd7f161a3e459c1730ac92ff2bbc9986ff1Lennart Poettering network->dhcp_sendhost = true;
a8812dd7f161a3e459c1730ac92ff2bbc9986ff1Lennart Poettering network->dhcp_route_metric = DHCP_ROUTE_METRIC;
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering network->dhcp_client_identifier = DHCP_CLIENT_ID_DUID;
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering network->use_bpdu = true;
f5430a3ef308f3a102899fcaf7fbece757082f2aLennart Poettering network->allow_port_to_be_root = true;
d75acfb059ece4512278b8820a9103664996f1e5Lennart Poettering network->unicast_flood = true;
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
9c92ce6d67f88beb31dd6555d12ae3f632218a39Lennart Poettering network->llmnr = LLMNR_SUPPORT_YES;
9c92ce6d67f88beb31dd6555d12ae3f632218a39Lennart Poettering
9c92ce6d67f88beb31dd6555d12ae3f632218a39Lennart Poettering network->link_local = ADDRESS_FAMILY_IPV6;
9c92ce6d67f88beb31dd6555d12ae3f632218a39Lennart Poettering
9c92ce6d67f88beb31dd6555d12ae3f632218a39Lennart Poettering network->ipv6_privacy_extensions = IPV6_PRIVACY_EXTENSIONS_NO;
9c92ce6d67f88beb31dd6555d12ae3f632218a39Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering r = config_parse(NULL, filename, file,
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "Match\0"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "Link\0"
8ac4e9e1e54397f6d1745c2a7a806132418c7da2Lennart Poettering "Network\0"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "Address\0"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "Route\0"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "DHCP\0"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "DHCPv4\0"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "Bridge\0"
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering "BridgeFDB\0",
2e276efc7b0398a3086629a52970bdd4ab7252f9Zbigniew Jędrzejewski-Szmek config_item_perf_lookup, network_network_gperf_lookup,
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering false, false, true, network);
c0eb11cfd016381fe02875a4ef29c1ade00c94e7Lennart Poettering if (r < 0)
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering return r;
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering /* IPMasquerade=yes implies IPForward=yes */
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering if (network->ip_masquerade)
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering network->ip_forward |= ADDRESS_FAMILY_IPV4;
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering LIST_PREPEND(networks, manager->networks, network);
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering r = hashmap_ensure_allocated(&manager->networks_by_name, &string_hash_ops);
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering if (r < 0)
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering return r;
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering r = hashmap_put(manager->networks_by_name, network->name, network);
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering if (r < 0)
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering return r;
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering LIST_FOREACH(routes, route, network->static_routes) {
7e8e0422aeb16f2a09a40546c61df753d10029b6Lennart Poettering if (!route->family) {
946c70944ebdf428ffeb9991a7449edbd4011461Zbigniew Jędrzejewski-Szmek log_warning("Route section without Gateway field configured in %s. "
946c70944ebdf428ffeb9991a7449edbd4011461Zbigniew Jędrzejewski-Szmek "Ignoring", filename);
946c70944ebdf428ffeb9991a7449edbd4011461Zbigniew Jędrzejewski-Szmek return 0;
946c70944ebdf428ffeb9991a7449edbd4011461Zbigniew Jędrzejewski-Szmek }
946c70944ebdf428ffeb9991a7449edbd4011461Zbigniew Jędrzejewski-Szmek }
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek LIST_FOREACH(addresses, address, network->static_addresses) {
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek if (!address->family) {
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek log_warning("Address section without Address field configured in %s. "
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek "Ignoring", filename);
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek return 0;
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek }
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek }
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek
0dae31d468b1a0e22d98921f7b0dbd92fd217167Zbigniew Jędrzejewski-Szmek network = NULL;
42cc2eebb01056beb7acd3ecfe8e533558237f84Lennart Poettering
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersen return 0;
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersen}
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersen
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersenint network_load(Manager *manager) {
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersen Network *network;
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersen _cleanup_strv_free_ char **files = NULL;
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersen char **f;
abf126a355e2f2b62b6c51ab3bb37895d1e3eee7Tom Gundersen int r;
549c1a2564b56f2bb38f1203d59c747ea15817f3Tom Gundersen
42cc2eebb01056beb7acd3ecfe8e533558237f84Lennart Poettering assert(manager);
42cc2eebb01056beb7acd3ecfe8e533558237f84Lennart Poettering
42cc2eebb01056beb7acd3ecfe8e533558237f84Lennart Poettering while ((network = manager->networks))
549c1a2564b56f2bb38f1203d59c747ea15817f3Tom Gundersen network_free(network);
549c1a2564b56f2bb38f1203d59c747ea15817f3Tom Gundersen
42cc2eebb01056beb7acd3ecfe8e533558237f84Lennart Poettering r = conf_files_list_strv(&files, ".network", NULL, network_dirs);
8db0d2f5c37e7e8f5bfce016cfdad7947a3ea939Zbigniew Jędrzejewski-Szmek if (r < 0)
8db0d2f5c37e7e8f5bfce016cfdad7947a3ea939Zbigniew Jędrzejewski-Szmek return log_error_errno(r, "Failed to enumerate network files: %m");
8db0d2f5c37e7e8f5bfce016cfdad7947a3ea939Zbigniew Jędrzejewski-Szmek
f91dc2400dc33e9a0745ecaaef7489af116dca38Lennart Poettering STRV_FOREACH_BACKWARDS(f, files) {
f91dc2400dc33e9a0745ecaaef7489af116dca38Lennart Poettering r = network_load_one(manager, *f);
8db0d2f5c37e7e8f5bfce016cfdad7947a3ea939Zbigniew Jędrzejewski-Szmek if (r < 0)
8db0d2f5c37e7e8f5bfce016cfdad7947a3ea939Zbigniew Jędrzejewski-Szmek return r;
8db0d2f5c37e7e8f5bfce016cfdad7947a3ea939Zbigniew Jędrzejewski-Szmek }
8db0d2f5c37e7e8f5bfce016cfdad7947a3ea939Zbigniew Jędrzejewski-Szmek
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek return 0;
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek}
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmekvoid network_free(Network *network) {
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek NetDev *netdev;
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek Route *route;
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek Address *address;
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek FdbEntry *fdb_entry;
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek Iterator i;
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek if (!network)
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek return;
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek
151226ab4bf276d60d51864330a99f886b923697Zbigniew Jędrzejewski-Szmek free(network->filename);
50f1e641a93cacfc693b0c3d300bee5df0c8c460Tom Gundersen
9ead3519c54b6d1b79b35541873b5cf7c8b3a7d3Lennart Poettering free(network->match_mac);
50f1e641a93cacfc693b0c3d300bee5df0c8c460Tom Gundersen strv_free(network->match_path);
50f1e641a93cacfc693b0c3d300bee5df0c8c460Tom Gundersen strv_free(network->match_driver);
50f1e641a93cacfc693b0c3d300bee5df0c8c460Tom Gundersen strv_free(network->match_type);
50f1e641a93cacfc693b0c3d300bee5df0c8c460Tom Gundersen strv_free(network->match_name);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen free(network->description);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen free(network->dhcp_vendor_class_identifier);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen free(network->hostname);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen free(network->mac);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen strv_free(network->ntp);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen strv_free(network->dns);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen strv_free(network->domains);
5d45a8808431987c370706d365fb0cc95cf03d52Tom Gundersen strv_free(network->bind_carrier);
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering netdev_unref(network->bridge);
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering netdev_unref(network->bond);
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering HASHMAP_FOREACH(netdev, network->stacked_netdevs, i) {
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering hashmap_remove(network->stacked_netdevs, netdev->ifname);
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering netdev_unref(netdev);
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering }
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering hashmap_free(network->stacked_netdevs);
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering while ((route = network->static_routes))
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering route_free(route);
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering
36d9205d669bcdcb04fa730d1f3549a9fc9a9001Tom Gundersen while ((address = network->static_addresses))
801ad6a6a9cd8fbd58b9f9c27f20dbb3c87d47ddLennart Poettering address_free(address);
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering while ((fdb_entry = network->static_fdb_entries))
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering fdb_entry_free(fdb_entry);
28b9b7640603f88cb49f95609331fa5072715f15Lennart Poettering
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering hashmap_free(network->addresses_by_section);
105e151299dc1208855380be2b22d0db2d66ebc6Lennart Poettering hashmap_free(network->routes_by_section);
5d27351f8546530cf779847b0b04b0172c09f9d0Tom Gundersen hashmap_free(network->fdb_entries_by_section);
547973dea7abd6c124ff6c79fe2bbe322a7314aeLennart Poettering
2d4c5cbc0ed3ccb09dc086a040088b454c22c644Lennart Poettering if (network->manager) {
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering if (network->manager->networks)
322345fdb9865ef2477fba8e4bdde0e1183ef505Lennart Poettering LIST_REMOVE(networks, network->manager->networks, network);
7778dffff3d8bd7438fe19a248c16203668324c9Daniel Mack
7778dffff3d8bd7438fe19a248c16203668324c9Daniel Mack if (network->manager->networks_by_name)
7778dffff3d8bd7438fe19a248c16203668324c9Daniel Mack hashmap_remove(network->manager->networks_by_name, network->name);
7778dffff3d8bd7438fe19a248c16203668324c9Daniel Mack }
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering
8bf52d3d17d364438191077d0750b8b80b5dc53aLennart Poettering free(network->name);
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering
74b2466e14a1961bf3ac0e8a60cfaceec705bd59Lennart Poettering condition_free_list(network->match_host);
623a4c97b9175f95c4b1c6fc34e36c56f1e4ddbfLennart Poettering condition_free_list(network->match_virt);
78c6a153c47f8d597c827bdcaf8c4e42ac87f738Lennart Poettering condition_free_list(network->match_kernel);
322345fdb9865ef2477fba8e4bdde0e1183ef505Lennart Poettering condition_free_list(network->match_arch);
7b50eb2efa122200e39646c19a29abab302f7d24Lennart Poettering
faa133f3aa7a18f26563dc5d6b95898cb315c37aLennart Poettering free(network);
322345fdb9865ef2477fba8e4bdde0e1183ef505Lennart Poettering}
a8812dd7f161a3e459c1730ac92ff2bbc9986ff1Lennart Poettering
a8812dd7f161a3e459c1730ac92ff2bbc9986ff1Lennart Poetteringint network_get_by_name(Manager *manager, const char *name, Network **ret) {
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering Network *network;
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering
2001c80560e3dae69e14fd994d3978c187af48b8Lennart Poettering assert(manager);
d5099efc47d4e6ac60816b5381a5f607ab03f06eMichal Schmidt assert(name);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering assert(ret);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering network = hashmap_get(manager->networks_by_name, name);
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering if (!network)
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering return -ENOENT;
8730bccfc59fe507bd3e0a3abcf411b497ac4f0eLennart Poettering
*ret = network;
return 0;
}
int network_get(Manager *manager, struct udev_device *device,
const char *ifname, const struct ether_addr *address,
Network **ret) {
Network *network;
struct udev_device *parent;
const char *path = NULL, *parent_driver = NULL, *driver = NULL, *devtype = NULL;
assert(manager);
assert(ret);
if (device) {
path = udev_device_get_property_value(device, "ID_PATH");
parent = udev_device_get_parent(device);
if (parent)
parent_driver = udev_device_get_driver(parent);
driver = udev_device_get_property_value(device, "ID_NET_DRIVER");
devtype = udev_device_get_devtype(device);
}
LIST_FOREACH(networks, network, manager->networks) {
if (net_match_config(network->match_mac, network->match_path,
network->match_driver, network->match_type,
network->match_name, network->match_host,
network->match_virt, network->match_kernel,
network->match_arch,
address, path, parent_driver, driver,
devtype, ifname)) {
if (network->match_name && device) {
const char *attr;
uint8_t name_assign_type = NET_NAME_UNKNOWN;
attr = udev_device_get_sysattr_value(device, "name_assign_type");
if (attr)
(void) safe_atou8(attr, &name_assign_type);
if (name_assign_type == NET_NAME_ENUM)
log_warning("%-*s: found matching network '%s', based on potentially unpredictable ifname",
IFNAMSIZ, ifname, network->filename);
else
log_debug("%-*s: found matching network '%s'", IFNAMSIZ, ifname, network->filename);
} else
log_debug("%-*s: found matching network '%s'", IFNAMSIZ, ifname, network->filename);
*ret = network;
return 0;
}
}
*ret = NULL;
return -ENOENT;
}
int network_apply(Manager *manager, Network *network, Link *link) {
int r;
link->network = network;
if (network->ipv4ll_route) {
Route *route;
r = route_new_static(network, 0, &route);
if (r < 0)
return r;
r = inet_pton(AF_INET, "169.254.0.0", &route->dst_addr.in);
if (r == 0)
return -EINVAL;
if (r < 0)
return -errno;
route->family = AF_INET;
route->dst_prefixlen = 16;
route->scope = RT_SCOPE_LINK;
route->metrics = IPV4LL_ROUTE_METRIC;
route->protocol = RTPROT_STATIC;
}
if (network->dns || network->ntp) {
r = link_save(link);
if (r < 0)
return r;
}
return 0;
}
int config_parse_netdev(const char *unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
Network *network = userdata;
_cleanup_free_ char *kind_string = NULL;
char *p;
NetDev *netdev;
NetDevKind kind;
int r;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(data);
kind_string = strdup(lvalue);
if (!kind_string)
return log_oom();
/* the keys are CamelCase versions of the kind */
for (p = kind_string; *p; p++)
*p = tolower(*p);
kind = netdev_kind_from_string(kind_string);
if (kind == _NETDEV_KIND_INVALID) {
log_syntax(unit, LOG_ERR, filename, line, EINVAL,
"Invalid NetDev kind: %s", lvalue);
return 0;
}
r = netdev_get(network->manager, rvalue, &netdev);
if (r < 0) {
log_syntax(unit, LOG_ERR, filename, line, EINVAL,
"%s could not be found, ignoring assignment: %s", lvalue, rvalue);
return 0;
}
if (netdev->kind != kind) {
log_syntax(unit, LOG_ERR, filename, line, EINVAL,
"NetDev is not a %s, ignoring assignment: %s", lvalue, rvalue);
return 0;
}
switch (kind) {
case NETDEV_KIND_BRIDGE:
network->bridge = netdev;
break;
case NETDEV_KIND_BOND:
network->bond = netdev;
break;
case NETDEV_KIND_VLAN:
case NETDEV_KIND_MACVLAN:
case NETDEV_KIND_IPVLAN:
case NETDEV_KIND_VXLAN:
r = hashmap_put(network->stacked_netdevs, netdev->ifname, netdev);
if (r < 0) {
log_syntax(unit, LOG_ERR, filename, line, EINVAL,
"Can not add VLAN '%s' to network: %m",
rvalue);
return 0;
}
break;
default:
assert_not_reached("Can not parse NetDev");
}
netdev_ref(netdev);
return 0;
}
int config_parse_domains(const char *unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
Network *network = userdata;
char ***domains = data;
char **domain;
int r;
r = config_parse_strv(unit, filename, line, section, section_line,
lvalue, ltype, rvalue, domains, userdata);
if (r < 0)
return r;
strv_uniq(*domains);
network->wildcard_domain = !!strv_find(*domains, "*");
STRV_FOREACH(domain, *domains) {
if (is_localhost(*domain))
log_syntax(unit, LOG_ERR, filename, line, EINVAL, "'localhost' domain names may not be configured, ignoring assignment: %s", *domain);
else {
r = dns_name_is_valid(*domain);
if (r <= 0 && !streq(*domain, "*")) {
if (r < 0)
log_error_errno(r, "Failed to validate domain name: %s: %m", *domain);
if (r == 0)
log_warning("Domain name is not valid, ignoring assignment: %s", *domain);
} else
continue;
}
strv_remove(*domains, *domain);
/* We removed one entry, make sure we don't skip the next one */
domain--;
}
return 0;
}
int config_parse_tunnel(const char *unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
Network *network = userdata;
NetDev *netdev;
int r;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(data);
r = netdev_get(network->manager, rvalue, &netdev);
if (r < 0) {
log_syntax(unit, LOG_ERR, filename, line, r, "Tunnel is invalid, ignoring assignment: %s", rvalue);
return 0;
}
if (netdev->kind != NETDEV_KIND_IPIP &&
netdev->kind != NETDEV_KIND_SIT &&
netdev->kind != NETDEV_KIND_GRE &&
netdev->kind != NETDEV_KIND_GRETAP &&
netdev->kind != NETDEV_KIND_IP6GRE &&
netdev->kind != NETDEV_KIND_IP6GRETAP &&
netdev->kind != NETDEV_KIND_VTI &&
netdev->kind != NETDEV_KIND_VTI6 &&
netdev->kind != NETDEV_KIND_IP6TNL
) {
log_syntax(unit, LOG_ERR, filename, line, EINVAL,
"NetDev is not a tunnel, ignoring assignment: %s", rvalue);
return 0;
}
r = hashmap_put(network->stacked_netdevs, netdev->ifname, netdev);
if (r < 0) {
log_syntax(unit, LOG_ERR, filename, line, r, "Cannot add VLAN '%s' to network, ignoring: %m", rvalue);
return 0;
}
netdev_ref(netdev);
return 0;
}
int config_parse_ipv4ll(
const char* unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
AddressFamilyBoolean *link_local = data;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(data);
/* Note that this is mostly like
* config_parse_address_family_boolean(), except that it
* applies only to IPv4 */
if (parse_boolean(rvalue))
*link_local |= ADDRESS_FAMILY_IPV4;
else
*link_local &= ~ADDRESS_FAMILY_IPV4;
return 0;
}
int config_parse_dhcp(
const char* unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
AddressFamilyBoolean *dhcp = data, s;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(data);
/* Note that this is mostly like
* config_parse_address_family_boolean(), except that it
* understands some old names for the enum values */
s = address_family_boolean_from_string(rvalue);
if (s < 0) {
/* Previously, we had a slightly different enum here,
* support its values for compatbility. */
if (streq(rvalue, "none"))
s = ADDRESS_FAMILY_NO;
else if (streq(rvalue, "v4"))
s = ADDRESS_FAMILY_IPV4;
else if (streq(rvalue, "v6"))
s = ADDRESS_FAMILY_IPV6;
else if (streq(rvalue, "both"))
s = ADDRESS_FAMILY_YES;
else {
log_syntax(unit, LOG_ERR, filename, line, s, "Failed to parse DHCP option, ignoring: %s", rvalue);
return 0;
}
}
*dhcp = s;
return 0;
}
static const char* const dhcp_client_identifier_table[_DHCP_CLIENT_ID_MAX] = {
[DHCP_CLIENT_ID_MAC] = "mac",
[DHCP_CLIENT_ID_DUID] = "duid"
};
DEFINE_PRIVATE_STRING_TABLE_LOOKUP_FROM_STRING(dhcp_client_identifier, DCHPClientIdentifier);
DEFINE_CONFIG_PARSE_ENUM(config_parse_dhcp_client_identifier, dhcp_client_identifier, DCHPClientIdentifier, "Failed to parse client identifier type");
static const char* const llmnr_support_table[_LLMNR_SUPPORT_MAX] = {
[LLMNR_SUPPORT_NO] = "no",
[LLMNR_SUPPORT_YES] = "yes",
[LLMNR_SUPPORT_RESOLVE] = "resolve",
};
DEFINE_STRING_TABLE_LOOKUP(llmnr_support, LLMNRSupport);
int config_parse_llmnr(
const char* unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
LLMNRSupport *llmnr = data;
int k;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(llmnr);
/* Our enum shall be a superset of booleans, hence first try
* to parse as boolean, and then as enum */
k = parse_boolean(rvalue);
if (k > 0)
*llmnr = LLMNR_SUPPORT_YES;
else if (k == 0)
*llmnr = LLMNR_SUPPORT_NO;
else {
LLMNRSupport s;
s = llmnr_support_from_string(rvalue);
if (s < 0){
log_syntax(unit, LOG_ERR, filename, line, -s, "Failed to parse LLMNR option, ignoring: %s", rvalue);
return 0;
}
*llmnr = s;
}
return 0;
}
int config_parse_ipv6token(
const char* unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
union in_addr_union buffer;
struct in6_addr *token = data;
int r;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(token);
r = in_addr_from_string(AF_INET6, rvalue, &buffer);
if (r < 0) {
log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse IPv6 token, ignoring: %s", rvalue);
return 0;
}
r = in_addr_is_null(AF_INET6, &buffer);
if (r < 0) {
log_syntax(unit, LOG_ERR, filename, line, r, "IPv6 token can not be the ANY address, ignoring: %s", rvalue);
return 0;
}
if ((buffer.in6.s6_addr32[0] | buffer.in6.s6_addr32[1]) != 0) {
log_syntax(unit, LOG_ERR, filename, line, EINVAL, "IPv6 token can not be longer than 64 bits, ignoring: %s", rvalue);
return 0;
}
*token = buffer.in6;
return 0;
}
int config_parse_address_family_boolean_with_kernel(
const char* unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
AddressFamilyBoolean *fwd = data, s;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(data);
s = address_family_boolean_from_string(rvalue);
if (s < 0) {
if (streq(rvalue, "kernel"))
s = _ADDRESS_FAMILY_BOOLEAN_INVALID;
else {
log_syntax(unit, LOG_ERR, filename, line, s, "Failed to parse IPForwarding option, ignoring: %s", rvalue);
return 0;
}
}
*fwd = s;
return 0;
}
static const char* const ipv6_privacy_extensions_table[_IPV6_PRIVACY_EXTENSIONS_MAX] = {
[IPV6_PRIVACY_EXTENSIONS_NO] = "no",
[IPV6_PRIVACY_EXTENSIONS_PREFER_PUBLIC] = "prefer-public",
[IPV6_PRIVACY_EXTENSIONS_YES] = "yes",
};
DEFINE_STRING_TABLE_LOOKUP(ipv6_privacy_extensions, IPv6PrivacyExtensions);
int config_parse_ipv6_privacy_extensions(
const char* unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
IPv6PrivacyExtensions *ipv6_privacy_extensions = data;
int k;
assert(filename);
assert(lvalue);
assert(rvalue);
assert(ipv6_privacy_extensions);
/* Our enum shall be a superset of booleans, hence first try
* to parse as boolean, and then as enum */
k = parse_boolean(rvalue);
if (k > 0)
*ipv6_privacy_extensions = IPV6_PRIVACY_EXTENSIONS_YES;
else if (k == 0)
*ipv6_privacy_extensions = IPV6_PRIVACY_EXTENSIONS_NO;
else {
IPv6PrivacyExtensions s;
s = ipv6_privacy_extensions_from_string(rvalue);
if (s < 0) {
if (streq(rvalue, "kernel"))
s = _IPV6_PRIVACY_EXTENSIONS_INVALID;
else {
log_syntax(unit, LOG_ERR, filename, line, s, "Failed to parse IPv6 privacy extensions option, ignoring: %s", rvalue);
return 0;
}
}
*ipv6_privacy_extensions = s;
}
return 0;
}
int config_parse_hostname(const char *unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
char **hostname = data;
char *hn = NULL;
int r;
assert(filename);
assert(lvalue);
assert(rvalue);
r = config_parse_string(unit, filename, line, section, section_line,
lvalue, ltype, rvalue, &hn, userdata);
if (r < 0)
return r;
if (!hostname_is_valid(hn, true)) {
log_syntax(unit, LOG_ERR, filename, line, EINVAL, "hostname is not valid, ignoring assignment: %s", rvalue);
free(hn);
return 0;
}
*hostname = hostname_cleanup(hn, false);
return 0;
}