VBoxManageNATNetwork.cpp revision 6eb65b2eefabe4acca6c24bd794075aeb605872f
/* $Id$ */
/** @file
* VBoxManage - Implementation of NAT Network command command.
*/
/*
* Copyright (C) 2006-2013 Oracle Corporation
*
* This file is part of VirtualBox Open Source Edition (OSE), as
* available from http://www.virtualbox.org. This file is free software;
* you can redistribute it and/or modify it under the terms of the GNU
* General Public License (GPL) as published by the Free Software
* Foundation, in version 2 as it comes in the "COPYING" file of the
* VirtualBox OSE distribution. VirtualBox OSE is distributed in the
* hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
*/
/*******************************************************************************
* Header Files *
*******************************************************************************/
#ifndef VBOX_ONLY_DOCS
#include <VBox/com/com.h>
#include <VBox/com/array.h>
#include <VBox/com/ErrorInfo.h>
#include <VBox/com/errorprint.h>
#include <VBox/com/VirtualBox.h>
#endif /* !VBOX_ONLY_DOCS */
#ifndef RT_OS_WINDOWS
# include <netinet/in.h>
#endif
#define IPv6
#include <iprt/cdefs.h>
#include <iprt/cidr.h>
#include <iprt/param.h>
#include <iprt/path.h>
#include <iprt/stream.h>
#include <iprt/string.h>
#include <iprt/net.h>
#include <iprt/getopt.h>
#include <iprt/ctype.h>
#include <VBox/log.h>
#include <vector>
#include <string>
#include "VBoxManage.h"
#include "VBoxPortForwardString.h"
#ifndef VBOX_ONLY_DOCS
using namespace com;
typedef enum enMainOpCodes
{
OP_ADD = 1000,
OP_REMOVE,
OP_MODIFY,
OP_START,
OP_STOP
} OPCODE;
static const RTGETOPTDEF g_aNATNetworkIPOptions[]
= {
{ "--netname", 't', RTGETOPT_REQ_STRING },
{ "--network", 'n', RTGETOPT_REQ_STRING },
{ "--dhcp", 'h', RTGETOPT_REQ_BOOL },
{ "--ipv6", '6', RTGETOPT_REQ_BOOL},
{ "--enable", 'e', RTGETOPT_REQ_NOTHING },
{ "--disable", 'd', RTGETOPT_REQ_NOTHING },
{ "--port-forward-4", 'p', RTGETOPT_REQ_STRING },
{ "--port-forward-6", 'P', RTGETOPT_REQ_STRING },
{ "--loopback-4", 'l', RTGETOPT_REQ_STRING },
{ "--loopback-6", 'L', RTGETOPT_REQ_STRING },
};
typedef struct PFNAME2DELETE
{
char aszName[PF_NAMELEN];
bool fIPv6;
} PFNAME2DELETE, *PPFNAME2DELETE;
typedef std::vector<PFNAME2DELETE> VPF2DELETE;
typedef VPF2DELETE::const_iterator VPF2DELETEITERATOR;
typedef std::vector<PORTFORWARDRULE> VPF2ADD;
typedef VPF2ADD::const_iterator VPF2ADDITERATOR;
typedef std::vector<std::string> LOOPBACK2DELETEADD;
typedef LOOPBACK2DELETEADD::iterator LOOPBACK2DELETEADDITERATOR;
static int handleOp(HandlerArg *a, OPCODE enmCode, int iStart, int *pcProcessed)
{
if (a->argc - iStart < 2)
return errorSyntax(USAGE_NATNETWORK, "Not enough parameters");
int index = iStart;
HRESULT rc;
const char *pNetName = NULL;
const char *pNetworkCidr = NULL;
int enable = -1;
int dhcp = -1;
int ipv6 = -1;
VPF2DELETE vPfName2Delete;
VPF2ADD vPf2Add;
LOOPBACK2DELETEADD vLoopback2Delete;
LOOPBACK2DELETEADD vLoopback2Add;
LONG loopback6Offset = 0; /* ignore me */
int c;
RTGETOPTUNION ValueUnion;
RTGETOPTSTATE GetState;
RTGetOptInit(&GetState,
a->argc,
a->argv,
g_aNATNetworkIPOptions,
enmCode != OP_REMOVE ? RT_ELEMENTS(g_aNATNetworkIPOptions) : 4, /* we use only --netname and --ifname for remove*/
index,
RTGETOPTINIT_FLAGS_NO_STD_OPTS);
while ((c = RTGetOpt(&GetState, &ValueUnion)))
{
switch (c)
{
case 't': // --netname
if (pNetName)
return errorSyntax(USAGE_NATNETWORK, "You can only specify --netname only once.");
else
pNetName = ValueUnion.psz;
break;
case 'n': // --network
if (pNetworkCidr)
return errorSyntax(USAGE_NATNETWORK, "You can only specify --network only once.");
else
pNetworkCidr = ValueUnion.psz;
break;
case 'e': // --enable
if (enable >= 0)
return errorSyntax(USAGE_NATNETWORK, "You can specify either --enable or --disable once.");
else
enable = 1;
break;
case 'd': // --disable
if (enable >= 0)
return errorSyntax(USAGE_NATNETWORK, "You can specify either --enable or --disable once.");
else
enable = 0;
break;
case 'h':
if (dhcp != -1)
return errorSyntax(USAGE_NATNETWORK, "You can specify --dhcp only once.");
dhcp = ValueUnion.f;
break;
case '6':
if (ipv6 != -1)
return errorSyntax(USAGE_NATNETWORK, "You can specify --ipv6 only once.");
ipv6 = ValueUnion.f;
break;
case 'L': /* ipv6 loopback */
case 'l': /* ipv4 loopback */
if (RTStrCmp(ValueUnion.psz, "delete") == 0)
{
/* deletion */
if (enmCode != OP_MODIFY)
errorSyntax(USAGE_NATNETWORK,
"loopback couldn't be deleted on modified\n");
if (c == 'L')
loopback6Offset = -1;
else
{
int vrc;
RTGETOPTUNION Addr2Delete;
vrc = RTGetOptFetchValue(&GetState,
&Addr2Delete,
RTGETOPT_REQ_STRING);
if (RT_FAILURE(vrc))
return errorSyntax(USAGE_NATNETWORK,
"Not enough parmaters\n");
vLoopback2Delete.push_back(std::string(Addr2Delete.psz));
}
}
else /* addition */
{
if (c == 'L')
loopback6Offset = ValueUnion.u32;
else
vLoopback2Add.push_back(std::string(ValueUnion.psz));
}
break;
case 'P': /* ipv6 portforwarding*/
case 'p': /* ipv4 portforwarding */
{
if (RTStrCmp(ValueUnion.psz, "delete") != 0)
{
PORTFORWARDRULE Pfr;
/* netPfStrToPf will clean up the Pfr */
int irc = netPfStrToPf(ValueUnion.psz, (c == 'P'), &Pfr);
if (RT_FAILURE(irc))
return errorSyntax(USAGE_NATNETWORK,
"Invalid port-forward rule %s\n",
ValueUnion.psz);
vPf2Add.push_back(Pfr);
}
else
{
int vrc;
RTGETOPTUNION NamePf2DeleteUnion;
PFNAME2DELETE Name2Delete;
if (enmCode != OP_MODIFY)
return errorSyntax(USAGE_NATNETWORK,
"Port-forward could be deleted on modify \n");
vrc = RTGetOptFetchValue(&GetState,
&NamePf2DeleteUnion,
RTGETOPT_REQ_STRING);
if (RT_FAILURE(vrc))
return errorSyntax(USAGE_NATNETWORK,
"Not enough parmaters\n");
if (strlen(NamePf2DeleteUnion.psz) > PF_NAMELEN)
return errorSyntax(USAGE_NATNETWORK,
"Port-forward rule name is too long\n");
RT_ZERO(Name2Delete);
RTStrCopy(Name2Delete.aszName, PF_NAMELEN, NamePf2DeleteUnion.psz);
Name2Delete.fIPv6 = (c == 'P');
vPfName2Delete.push_back(Name2Delete);
}
break;
}
case VINF_GETOPT_NOT_OPTION:
return errorSyntax(USAGE_NATNETWORK,
"unhandled parameter: %s",
ValueUnion.psz);
break;
default:
if (c > 0)
{
if (RT_C_IS_GRAPH(c))
return errorSyntax(USAGE_NATNETWORK,
"unhandled option: -%c", c);
else
return errorSyntax(USAGE_NATNETWORK,
"unhandled option: %i", c);
}
else if (c == VERR_GETOPT_UNKNOWN_OPTION)
return errorSyntax(USAGE_NATNETWORK,
"unknown option: %s", ValueUnion.psz);
else if (ValueUnion.pDef)
return errorSyntax(USAGE_NATNETWORK,
"%s: %Rrs", ValueUnion.pDef->pszLong, c);
else
return errorSyntax(USAGE_NATNETWORK, "%Rrs", c);
}
}
if (!pNetName)
return errorSyntax(USAGE_NATNETWORK,
"You need to specify the --netname option");
/* verification */
switch (enmCode)
{
case OP_ADD:
if (!pNetworkCidr)
return errorSyntax(USAGE_NATNETWORK,
"You need to specify the --network option");
break;
case OP_MODIFY:
case OP_REMOVE:
case OP_START:
case OP_STOP:
break;
default:
AssertMsgFailedReturn(("Unknown operation (:%d)", enmCode), VERR_NOT_IMPLEMENTED);
}
Bstr NetName;
NetName = Bstr(pNetName);
ComPtr<INATNetwork> net;
rc = a->virtualBox->FindNATNetworkByName(NetName.mutableRaw(), net.asOutParam());
if (enmCode == OP_ADD)
{
if (SUCCEEDED(rc))
return errorArgument("NATNetwork server already exists");
CHECK_ERROR(a->virtualBox, CreateNATNetwork(NetName.raw(), net.asOutParam()));
if (FAILED(rc))
return errorArgument("Failed to create the NAT network service");
}
else if (FAILED(rc))
return errorArgument("NATNetwork server does not exist");
switch (enmCode)
{
case OP_ADD:
case OP_MODIFY:
{
if (pNetworkCidr)
{
CHECK_ERROR(net, COMSETTER(Network)(Bstr(pNetworkCidr).raw()));
if (FAILED(rc))
return errorArgument("Failed to set configuration");
}
if (dhcp >= 0)
{
CHECK_ERROR(net, COMSETTER(NeedDhcpServer) ((BOOL)dhcp));
if (FAILED(rc))
return errorArgument("Failed to set configuration");
}
if (ipv6 >= 0)
{
CHECK_ERROR(net, COMSETTER(IPv6Enabled) ((BOOL)ipv6));
if (FAILED(rc))
return errorArgument("Failed to set configuration");
}
if (!vPfName2Delete.empty())
{
VPF2DELETEITERATOR it;
for (it = vPfName2Delete.begin(); it != vPfName2Delete.end(); ++it)
{
CHECK_ERROR(net, RemovePortForwardRule((BOOL)(*it).fIPv6,
Bstr((*it).aszName).raw()));
if (FAILED(rc))
return errorArgument("Failed to delete pf");
}
}
if (!vPf2Add.empty())
{
VPF2ADDITERATOR it;
for (it = vPf2Add.begin(); it != vPf2Add.end(); ++it)
{
NATProtocol_T proto = NATProtocol_TCP;
if ((*it).iPfrProto == IPPROTO_TCP)
proto = NATProtocol_TCP;
else if ((*it).iPfrProto == IPPROTO_UDP)
proto = NATProtocol_UDP;
else
continue; /* XXX: warning here. */
CHECK_ERROR(net, AddPortForwardRule((BOOL)(*it).fPfrIPv6,
Bstr((*it).aszPfrName).raw(),
proto,
Bstr((*it).aszPfrHostAddr).raw(),
(*it).u16PfrHostPort,
Bstr((*it).aszPfrGuestAddr).raw(),
(*it).u16PfrGuestPort));
if (FAILED(rc))
return errorArgument("Failed to add pf");
}
}
if (loopback6Offset)
{
if (loopback6Offset == -1)
loopback6Offset = 0; /* deletion */
CHECK_ERROR_RET(net, COMSETTER(LoopbackIp6)(loopback6Offset), rc);
}
/* addLocalMapping (hostid, offset) */
if (!vLoopback2Add.empty())
{
/* we're expecting stings 127.0.0.1;5 */
LOOPBACK2DELETEADDITERATOR it;
for (it = vLoopback2Add.begin();
it != vLoopback2Add.end();
++it)
{
std::string address, strOffset;
int pos = it->find(';');
LONG lOffset = 0;
Bstr bstrAddress;
AssertReturn(pos != -1, errorArgument("invalid loopback string"));
address = it->substr(0, pos);
strOffset = it->substr(pos + 1);
lOffset = RTStrToUInt32(strOffset.c_str());
AssertReturn(lOffset > 0, errorArgument("invalid loopback string"));
bstrAddress = Bstr(address.c_str());
CHECK_ERROR_RET(net, AddLocalMapping(bstrAddress.raw(), lOffset), rc);
}
}
if (!vLoopback2Delete.empty())
{
/* we're expecting stings 127.0.0.1 */
LOOPBACK2DELETEADDITERATOR it;
for (it = vLoopback2Add.begin();
it != vLoopback2Add.end();
++it)
{
Bstr bstrAddress;
bstrAddress = Bstr(it->c_str());
CHECK_ERROR_RET(net, AddLocalMapping(bstrAddress.raw(), 0), rc);
}
}
if (enable >= 0)
{
CHECK_ERROR(net, COMSETTER(Enabled) ((BOOL)enable));
if (FAILED(rc))
return errorArgument("Failed to set configuration");
}
break;
}
case OP_REMOVE:
{
CHECK_ERROR(a->virtualBox, RemoveNATNetwork(net));
if (FAILED(rc))
return errorArgument("Failed to remove nat network");
break;
}
case OP_START:
{
CHECK_ERROR(net, Start(Bstr("whatever").raw()));
if (FAILED(rc))
return errorArgument("Failed to start network");
break;
}
case OP_STOP:
{
CHECK_ERROR(net, Stop());
if (FAILED(rc))
return errorArgument("Failed to start network");
break;
}
default:;
}
return 0;
}
int handleNATNetwork(HandlerArg *a)
{
if (a->argc < 1)
return errorSyntax(USAGE_NATNETWORK, "Not enough parameters");
int result;
int cProcessed;
if (strcmp(a->argv[0], "modify") == 0)
result = handleOp(a, OP_MODIFY, 1, &cProcessed);
else if (strcmp(a->argv[0], "add") == 0)
result = handleOp(a, OP_ADD, 1, &cProcessed);
else if (strcmp(a->argv[0], "remove") == 0)
result = handleOp(a, OP_REMOVE, 1, &cProcessed);
else if (strcmp(a->argv[0], "start") == 0)
result = handleOp(a, OP_START, 1, &cProcessed);
else if (strcmp(a->argv[0], "stop") == 0)
result = handleOp(a, OP_STOP, 1, &cProcessed);
else
result = errorSyntax(USAGE_NATNETWORK, "Invalid parameter '%s'", Utf8Str(a->argv[0]).c_str());
return result;
}
#endif /* !VBOX_ONLY_DOCS */