mirror of
https://github.com/morgan9e/systemd
synced 2026-04-14 00:14:32 +09:00
1477 lines
45 KiB
C
1477 lines
45 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
|
|
#include "fd-util.h"
|
|
#include "fileio.h"
|
|
#include "hostname-util.h"
|
|
#include "log.h"
|
|
#include "macro.h"
|
|
#include "memstream-util.h"
|
|
#include "netif-naming-scheme.h"
|
|
#include "network-generator.h"
|
|
#include "parse-util.h"
|
|
#include "proc-cmdline.h"
|
|
#include "socket-util.h"
|
|
#include "string-table.h"
|
|
#include "string-util.h"
|
|
#include "strv.h"
|
|
#include "vlan-util.h"
|
|
|
|
/*
|
|
# .network
|
|
ip={dhcp|on|any|dhcp6|auto6|either6|link6|link-local}
|
|
ip=<interface>:{dhcp|on|any|dhcp6|auto6|link6|link-local}[:[<mtu>][:<macaddr>]]
|
|
ip=<client-IP>:[<peer>]:<gateway-IP>:<netmask>:<client_hostname>:<interface>:{none|off|dhcp|on|any|dhcp6|auto6|link6|ibft|link-local}[:[<mtu>][:<macaddr>]]
|
|
ip=<client-IP>:[<peer>]:<gateway-IP>:<netmask>:<client_hostname>:<interface>:{none|off|dhcp|on|any|dhcp6|auto6|link6|ibft|link-local}[:[<dns1>][:<dns2>]]
|
|
rd.route=<net>/<netmask>:<gateway>[:<interface>]
|
|
nameserver=<IP> [nameserver=<IP> ...]
|
|
rd.peerdns=0
|
|
|
|
# .link
|
|
ifname=<interface>:<MAC>
|
|
net.ifname_policy=policy1[,policy2,...][,<MAC>] # This is an original rule, not supported by other tools.
|
|
|
|
# .netdev
|
|
vlan=<vlanname>:<phydevice>
|
|
bond=<bondname>[:<bondslaves>:[:<options>[:<mtu>]]]
|
|
team=<teammaster>:<teamslaves> # not supported
|
|
bridge=<bridgename>:<ethnames>
|
|
|
|
# ignored
|
|
bootdev=<interface>
|
|
BOOTIF=<MAC>
|
|
rd.bootif=0
|
|
biosdevname=0
|
|
rd.neednet=1
|
|
*/
|
|
|
|
static const char * const dracut_dhcp_type_table[_DHCP_TYPE_MAX] = {
|
|
[DHCP_TYPE_NONE] = "none",
|
|
[DHCP_TYPE_OFF] = "off",
|
|
[DHCP_TYPE_ON] = "on",
|
|
[DHCP_TYPE_ANY] = "any",
|
|
[DHCP_TYPE_DHCP] = "dhcp",
|
|
[DHCP_TYPE_DHCP6] = "dhcp6",
|
|
[DHCP_TYPE_AUTO6] = "auto6",
|
|
[DHCP_TYPE_EITHER6] = "either6",
|
|
[DHCP_TYPE_IBFT] = "ibft",
|
|
[DHCP_TYPE_LINK6] = "link6",
|
|
[DHCP_TYPE_LINK_LOCAL] = "link-local",
|
|
};
|
|
|
|
DEFINE_PRIVATE_STRING_TABLE_LOOKUP_FROM_STRING(dracut_dhcp_type, DHCPType);
|
|
|
|
static const char * const networkd_dhcp_type_table[_DHCP_TYPE_MAX] = {
|
|
[DHCP_TYPE_NONE] = "no",
|
|
[DHCP_TYPE_OFF] = "no",
|
|
[DHCP_TYPE_ON] = "yes",
|
|
[DHCP_TYPE_ANY] = "yes",
|
|
[DHCP_TYPE_DHCP] = "ipv4",
|
|
[DHCP_TYPE_DHCP6] = "ipv6",
|
|
[DHCP_TYPE_AUTO6] = "no", /* TODO: enable other setting? */
|
|
[DHCP_TYPE_EITHER6] = "ipv6", /* TODO: enable other setting? */
|
|
[DHCP_TYPE_IBFT] = "no",
|
|
[DHCP_TYPE_LINK6] = "no",
|
|
[DHCP_TYPE_LINK_LOCAL] = "no",
|
|
};
|
|
|
|
DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(networkd_dhcp_type, DHCPType);
|
|
|
|
static const char * const networkd_ipv6ra_type_table[_DHCP_TYPE_MAX] = {
|
|
[DHCP_TYPE_NONE] = "no",
|
|
[DHCP_TYPE_OFF] = "no",
|
|
[DHCP_TYPE_LINK6] = "no",
|
|
[DHCP_TYPE_LINK_LOCAL] = "no",
|
|
/* We omit the other entries, to leave the default in effect */
|
|
};
|
|
|
|
DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(networkd_ipv6ra_type, DHCPType);
|
|
|
|
static const char * const networkd_link_local_type_table[_DHCP_TYPE_MAX] = {
|
|
[DHCP_TYPE_NONE] = "no",
|
|
[DHCP_TYPE_OFF] = "no",
|
|
[DHCP_TYPE_LINK6] = "ipv6",
|
|
[DHCP_TYPE_LINK_LOCAL] = "yes",
|
|
/* We omit the other entries, to leave the default in effect */
|
|
};
|
|
|
|
DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(networkd_link_local_type, DHCPType);
|
|
|
|
static Address* address_free(Address *address) {
|
|
if (!address)
|
|
return NULL;
|
|
|
|
if (address->network)
|
|
LIST_REMOVE(addresses, address->network->addresses, address);
|
|
|
|
return mfree(address);
|
|
}
|
|
|
|
static int address_new(
|
|
Network *network,
|
|
int family,
|
|
unsigned char prefixlen,
|
|
union in_addr_union *addr,
|
|
union in_addr_union *peer,
|
|
Address **ret) {
|
|
|
|
Address *address;
|
|
|
|
assert(network);
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
assert(addr);
|
|
|
|
address = new(Address, 1);
|
|
if (!address)
|
|
return -ENOMEM;
|
|
|
|
*address = (Address) {
|
|
.family = family,
|
|
.prefixlen = prefixlen,
|
|
.address = *addr,
|
|
.peer = peer ? *peer : IN_ADDR_NULL,
|
|
};
|
|
|
|
LIST_PREPEND(addresses, network->addresses, address);
|
|
|
|
address->network = network;
|
|
|
|
if (ret)
|
|
*ret = address;
|
|
return 0;
|
|
}
|
|
|
|
static Route* route_free(Route *route) {
|
|
if (!route)
|
|
return NULL;
|
|
|
|
if (route->network)
|
|
LIST_REMOVE(routes, route->network->routes, route);
|
|
|
|
return mfree(route);
|
|
}
|
|
|
|
static int route_new(
|
|
Network *network,
|
|
int family,
|
|
unsigned char prefixlen,
|
|
union in_addr_union *dest,
|
|
union in_addr_union *gateway,
|
|
Route **ret) {
|
|
|
|
Route *route;
|
|
|
|
assert(network);
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
assert(dest || gateway);
|
|
|
|
route = new(Route, 1);
|
|
if (!route)
|
|
return -ENOMEM;
|
|
|
|
*route = (Route) {
|
|
.family = family,
|
|
.prefixlen = prefixlen,
|
|
.dest = dest ? *dest : IN_ADDR_NULL,
|
|
.gateway = gateway ? *gateway : IN_ADDR_NULL,
|
|
};
|
|
|
|
LIST_PREPEND(routes, network->routes, route);
|
|
|
|
route->network = network;
|
|
|
|
if (ret)
|
|
*ret = route;
|
|
return 0;
|
|
}
|
|
|
|
static Network* network_free(Network *network) {
|
|
Address *address;
|
|
Route *route;
|
|
|
|
if (!network)
|
|
return NULL;
|
|
|
|
free(network->ifname);
|
|
free(network->hostname);
|
|
strv_free(network->dns);
|
|
strv_free(network->vlan);
|
|
free(network->bridge);
|
|
free(network->bond);
|
|
|
|
while ((address = network->addresses))
|
|
address_free(address);
|
|
|
|
while ((route = network->routes))
|
|
route_free(route);
|
|
|
|
return mfree(network);
|
|
}
|
|
|
|
DEFINE_TRIVIAL_CLEANUP_FUNC(Network*, network_free);
|
|
|
|
static int network_new(Context *context, const char *name, Network **ret) {
|
|
_cleanup_(network_freep) Network *network = NULL;
|
|
_cleanup_free_ char *ifname = NULL;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(name);
|
|
|
|
if (!isempty(name) && !ifname_valid(name))
|
|
return -EINVAL;
|
|
|
|
ifname = strdup(name);
|
|
if (!ifname)
|
|
return -ENOMEM;
|
|
|
|
network = new(Network, 1);
|
|
if (!network)
|
|
return -ENOMEM;
|
|
|
|
*network = (Network) {
|
|
.ifname = TAKE_PTR(ifname),
|
|
.dhcp_type = _DHCP_TYPE_INVALID,
|
|
.dhcp_use_dns = -1,
|
|
};
|
|
|
|
r = hashmap_ensure_put(&context->networks_by_name, &string_hash_ops, network->ifname, network);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (ret)
|
|
*ret = network;
|
|
|
|
TAKE_PTR(network);
|
|
return 0;
|
|
}
|
|
|
|
Network* network_get(Context *context, const char *ifname) {
|
|
assert(context);
|
|
assert(ifname);
|
|
return hashmap_get(context->networks_by_name, ifname);
|
|
}
|
|
|
|
static int network_acquire(Context *context, const char *ifname, Network **ret) {
|
|
Network *network;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
|
|
network = network_get(context, ifname);
|
|
if (!network)
|
|
return network_new(context, ifname, ret);
|
|
|
|
if (ret)
|
|
*ret = network;
|
|
return 0;
|
|
}
|
|
|
|
static NetDev* netdev_free(NetDev *netdev) {
|
|
if (!netdev)
|
|
return NULL;
|
|
|
|
free(netdev->ifname);
|
|
free(netdev->kind);
|
|
return mfree(netdev);
|
|
}
|
|
|
|
DEFINE_TRIVIAL_CLEANUP_FUNC(NetDev*, netdev_free);
|
|
|
|
static int netdev_new(Context *context, const char *_kind, const char *_ifname, NetDev **ret) {
|
|
_cleanup_(netdev_freep) NetDev *netdev = NULL;
|
|
_cleanup_free_ char *kind = NULL, *ifname = NULL;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(_kind);
|
|
assert(_ifname);
|
|
|
|
if (!ifname_valid(_ifname))
|
|
return -EINVAL;
|
|
|
|
kind = strdup(_kind);
|
|
if (!kind)
|
|
return -ENOMEM;
|
|
|
|
ifname = strdup(_ifname);
|
|
if (!ifname)
|
|
return -ENOMEM;
|
|
|
|
netdev = new(NetDev, 1);
|
|
if (!netdev)
|
|
return -ENOMEM;
|
|
|
|
*netdev = (NetDev) {
|
|
.kind = TAKE_PTR(kind),
|
|
.ifname = TAKE_PTR(ifname),
|
|
};
|
|
|
|
r = hashmap_ensure_put(&context->netdevs_by_name, &string_hash_ops, netdev->ifname, netdev);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (ret)
|
|
*ret = netdev;
|
|
|
|
TAKE_PTR(netdev);
|
|
return 0;
|
|
}
|
|
|
|
NetDev* netdev_get(Context *context, const char *ifname) {
|
|
assert(context);
|
|
assert(ifname);
|
|
return hashmap_get(context->netdevs_by_name, ifname);
|
|
}
|
|
|
|
static int netdev_acquire(Context *context, const char *kind, const char *name, NetDev **ret) {
|
|
NetDev *netdev;
|
|
|
|
assert(context);
|
|
assert(kind);
|
|
assert(name);
|
|
|
|
netdev = netdev_get(context, name);
|
|
if (!netdev)
|
|
return netdev_new(context, kind, name, ret);
|
|
|
|
if (!streq_ptr(netdev->kind, kind))
|
|
return -EEXIST; /* conflicting netdev already exists. */
|
|
|
|
if (ret)
|
|
*ret = netdev;
|
|
return 0;
|
|
}
|
|
|
|
static Link* link_free(Link *link) {
|
|
if (!link)
|
|
return NULL;
|
|
|
|
free(link->filename);
|
|
free(link->ifname);
|
|
strv_free(link->policies);
|
|
strv_free(link->alt_policies);
|
|
return mfree(link);
|
|
}
|
|
|
|
DEFINE_TRIVIAL_CLEANUP_FUNC(Link*, link_free);
|
|
|
|
static int link_new(
|
|
Context *context,
|
|
const char *name,
|
|
const struct hw_addr_data *mac,
|
|
Link **ret) {
|
|
|
|
_cleanup_(link_freep) Link *link = NULL;
|
|
_cleanup_free_ char *ifname = NULL, *filename = NULL;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(mac);
|
|
|
|
if (name) {
|
|
if (!ifname_valid(name))
|
|
return -EINVAL;
|
|
|
|
ifname = strdup(name);
|
|
if (!ifname)
|
|
return -ENOMEM;
|
|
|
|
filename = strdup(name);
|
|
if (!filename)
|
|
return -ENOMEM;
|
|
}
|
|
|
|
if (!filename) {
|
|
filename = strdup(hw_addr_is_null(mac) ? "default" :
|
|
HW_ADDR_TO_STR_FULL(mac, HW_ADDR_TO_STRING_NO_COLON));
|
|
if (!filename)
|
|
return -ENOMEM;
|
|
}
|
|
|
|
link = new(Link, 1);
|
|
if (!link)
|
|
return -ENOMEM;
|
|
|
|
*link = (Link) {
|
|
.filename = TAKE_PTR(filename),
|
|
.ifname = TAKE_PTR(ifname),
|
|
.mac = *mac,
|
|
};
|
|
|
|
r = hashmap_ensure_put(&context->links_by_filename, &string_hash_ops, link->filename, link);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (ret)
|
|
*ret = link;
|
|
|
|
TAKE_PTR(link);
|
|
return 0;
|
|
}
|
|
|
|
Link* link_get(Context *context, const char *filename) {
|
|
assert(context);
|
|
assert(filename);
|
|
return hashmap_get(context->links_by_filename, filename);
|
|
}
|
|
|
|
static int network_set_dhcp_type(Context *context, const char *ifname, const char *dhcp_type) {
|
|
Network *network;
|
|
DHCPType t;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
assert(dhcp_type);
|
|
|
|
t = dracut_dhcp_type_from_string(dhcp_type);
|
|
if (t < 0)
|
|
return log_debug_errno(t, "Invalid DHCP type '%s'", dhcp_type);
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
network->dhcp_type = t;
|
|
return 0;
|
|
}
|
|
|
|
static int network_set_hostname(Context *context, const char *ifname, const char *hostname) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
|
|
if (isempty(hostname))
|
|
return 0;
|
|
|
|
if (!hostname_is_valid(hostname, 0))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid hostname '%s'.", hostname);
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
return free_and_strdup(&network->hostname, hostname);
|
|
}
|
|
|
|
static int network_set_mtu(Context *context, const char *ifname, const char *mtu) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
|
|
if (isempty(mtu))
|
|
return 0;
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
r = parse_mtu(AF_UNSPEC, mtu, &network->mtu);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Invalid MTU '%s' for '%s': %m", mtu, ifname);
|
|
|
|
return r;
|
|
}
|
|
|
|
static int network_set_mac_address(Context *context, const char *ifname, const char *mac) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
|
|
if (isempty(mac))
|
|
return 0;
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
r = parse_ether_addr(mac, &network->mac);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Invalid MAC address '%s' for '%s'", mac, ifname);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int network_set_address(
|
|
Context *context,
|
|
const char *ifname,
|
|
int family,
|
|
unsigned char prefixlen,
|
|
union in_addr_union *addr,
|
|
union in_addr_union *peer) {
|
|
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
assert(addr);
|
|
|
|
if (!in_addr_is_set(family, addr))
|
|
return 0;
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
return address_new(network, family, prefixlen, addr, peer, NULL);
|
|
}
|
|
|
|
static int network_set_route(
|
|
Context *context,
|
|
const char *ifname,
|
|
int family,
|
|
unsigned char prefixlen,
|
|
union in_addr_union *dest,
|
|
union in_addr_union *gateway) {
|
|
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
|
|
if (!(dest && in_addr_is_set(family, dest)) &&
|
|
!(gateway && in_addr_is_set(family, gateway)))
|
|
return 0;
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
return route_new(network, family, prefixlen, dest, gateway, NULL);
|
|
}
|
|
|
|
static int network_set_dns(Context *context, const char *ifname, const char *dns) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
|
|
if (isempty(dns))
|
|
return 0;
|
|
|
|
r = in_addr_from_string_auto(dns, NULL, NULL);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Invalid DNS address '%s' for '%s'", dns, ifname);
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
return strv_extend(&network->dns, dns);
|
|
}
|
|
|
|
static int network_set_dhcp_use_dns(Context *context, const char *ifname, bool value) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to create network for '%s': %m", ifname);
|
|
|
|
network->dhcp_use_dns = value;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int network_set_vlan(Context *context, const char *ifname, const char *value) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
|
|
if (isempty(ifname))
|
|
return 0;
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
return strv_extend(&network->vlan, value);
|
|
}
|
|
|
|
static int network_set_bridge(Context *context, const char *ifname, const char *value) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
|
|
if (isempty(ifname))
|
|
return 0;
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
return free_and_strdup(&network->bridge, value);
|
|
}
|
|
|
|
static int network_set_bond(Context *context, const char *ifname, const char *value) {
|
|
Network *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
|
|
if (isempty(ifname))
|
|
return 0;
|
|
|
|
r = network_acquire(context, ifname, &network);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire network for '%s': %m", ifname);
|
|
|
|
return free_and_strdup(&network->bond, value);
|
|
}
|
|
|
|
static int parse_cmdline_ip_mtu_mac(Context *context, const char *ifname, const char *value) {
|
|
_cleanup_free_ char *mtu = NULL;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(ifname);
|
|
|
|
/* [<mtu>][:<macaddr>] */
|
|
|
|
const char *p = value;
|
|
r = extract_first_word(&p, &mtu, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return r;
|
|
|
|
r = network_set_mtu(context, ifname, mtu);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
return network_set_mac_address(context, ifname, p);
|
|
}
|
|
|
|
static int extract_ip_address_str(int family, const char **ptr, char **ret) {
|
|
_cleanup_free_ char *buf = NULL;
|
|
const char *p;
|
|
int r;
|
|
|
|
assert(IN_SET(family, AF_UNSPEC, AF_INET, AF_INET6));
|
|
assert(ptr);
|
|
assert(ret);
|
|
|
|
if (isempty(*ptr)) {
|
|
*ptr = NULL;
|
|
*ret = NULL;
|
|
return 0;
|
|
}
|
|
|
|
if (**ptr != '[')
|
|
return extract_first_word(ptr, ret, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
|
|
if (family == AF_INET)
|
|
return -EINVAL;
|
|
|
|
p = *ptr + 1;
|
|
r = extract_first_word(&p, &buf, "]", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
return -EINVAL; /* Missing "]". */
|
|
|
|
if (!isempty(p)) {
|
|
if (p[0] != ':')
|
|
return -EINVAL; /* Missing ":" after "]". */
|
|
p++;
|
|
}
|
|
|
|
*ptr = p;
|
|
*ret = TAKE_PTR(buf);
|
|
return 1;
|
|
}
|
|
|
|
static int extract_ip_address(int family, const char **ptr, union in_addr_union *ret) {
|
|
_cleanup_free_ char *buf = NULL;
|
|
const char *p;
|
|
int r, k;
|
|
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
assert(ptr);
|
|
assert(ret);
|
|
|
|
p = *ptr;
|
|
r = extract_ip_address_str(family, &p, &buf);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (isempty(buf)) {
|
|
*ret = IN_ADDR_NULL;
|
|
r = 0;
|
|
} else {
|
|
assert(r > 0);
|
|
k = in_addr_from_string(family, buf, ret);
|
|
if (k < 0)
|
|
return k;
|
|
}
|
|
|
|
*ptr = p;
|
|
return r;
|
|
}
|
|
|
|
static int extract_netmask_or_prefixlen(int family, const char **ptr, unsigned char *ret) {
|
|
_cleanup_free_ char *buf = NULL;
|
|
const char *p;
|
|
int r;
|
|
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
assert(ptr);
|
|
assert(ret);
|
|
|
|
if (family == AF_INET) {
|
|
union in_addr_union netmask;
|
|
|
|
p = *ptr;
|
|
r = extract_ip_address(family, &p, &netmask);
|
|
if (r > 0) {
|
|
*ptr = p;
|
|
*ret = in4_addr_netmask_to_prefixlen(&netmask.in);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
p = *ptr;
|
|
r = extract_first_word(&p, &buf, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r < 0)
|
|
return r;
|
|
if (isempty(buf))
|
|
*ret = family == AF_INET6 ? 128 : 32;
|
|
else {
|
|
r = safe_atou8(buf, ret);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
*ptr = p;
|
|
return 0;
|
|
}
|
|
|
|
static int parse_cmdline_ip_address(Context *context, int family, const char *value) {
|
|
union in_addr_union addr, peer = {}, gateway = {};
|
|
unsigned char prefixlen;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(IN_SET(family, AF_INET, AF_INET6));
|
|
assert(value);
|
|
|
|
/* ip=<client-IP>:[<peer>]:<gateway-IP>:<netmask>:<client_hostname>:<interface>:{none|off|dhcp|on|any|dhcp6|auto6|ibft|link6}[:[<mtu>][:<macaddr>]]
|
|
* ip=<client-IP>:[<peer>]:<gateway-IP>:<netmask>:<client_hostname>:<interface>:{none|off|dhcp|on|any|dhcp6|auto6|ibft|link6}[:[<dns1>][:<dns2>]]
|
|
*
|
|
* Here, only DHCP type is mandatory. */
|
|
|
|
const char *p = value;
|
|
r = extract_ip_address(family, &p, &addr);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse IP address in ip=%s: %m", value);
|
|
r = extract_ip_address(family, &p, &peer);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse peer address in ip=%s: %m", value);
|
|
r = extract_ip_address(family, &p, &gateway);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse gateway address in ip=%s: %m", value);
|
|
r = extract_netmask_or_prefixlen(family, &p, &prefixlen);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse netmask in ip=%s: %m", value);
|
|
|
|
/* hostname */
|
|
_cleanup_free_ char *hostname = NULL;
|
|
r = extract_first_word(&p, &hostname, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse hostname in ip=%s: %m", value);
|
|
|
|
/* ifname */
|
|
_cleanup_free_ char *ifname = NULL;
|
|
r = extract_first_word(&p, &ifname, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse interface name in ip=%s: %m", value);
|
|
|
|
/* dhcp_type */
|
|
_cleanup_free_ char *dhcp_type = NULL;
|
|
r = extract_first_word(&p, &dhcp_type, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse DHCP type name in ip=%s: %m", value);
|
|
|
|
/* set values */
|
|
r = network_set_address(context, ifname, family, prefixlen, &addr, &peer);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = network_set_route(context, ifname, family, 0, NULL, &gateway);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = network_set_hostname(context, ifname, hostname);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = network_set_dhcp_type(context, ifname, dhcp_type);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* First, try [<mtu>][:<macaddr>] if an interface name is specified. */
|
|
if (!isempty(ifname) && parse_cmdline_ip_mtu_mac(context, ifname, p) >= 0)
|
|
return 0;
|
|
|
|
/* Next, try [<dns1>][:<dns2>] */
|
|
_cleanup_free_ char *dns = NULL;
|
|
r = extract_ip_address_str(AF_UNSPEC, &p, &dns);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse DNS address in ip=%s: %m", value);
|
|
if (r == 0)
|
|
return 0;
|
|
|
|
r = network_set_dns(context, ifname, dns);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
dns = mfree(dns);
|
|
r = extract_ip_address_str(AF_UNSPEC, &p, &dns);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse DNS address in ip=%s: %m", value);
|
|
if (r == 0)
|
|
return 0;
|
|
|
|
r = network_set_dns(context, ifname, dns);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* refuse unexpected trailing strings */
|
|
if (!isempty(p))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Unexpected trailing string in 'ip=%s'.", value);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int parse_cmdline_ip_interface(Context *context, const char *value) {
|
|
_cleanup_free_ char *ifname = NULL, *dhcp_type = NULL;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(value);
|
|
|
|
/* ip=<interface>:{dhcp|on|any|dhcp6|auto6|link6}[:[<mtu>][:<macaddr>]] */
|
|
|
|
const char *p = value;
|
|
r = extract_first_word(&p, &ifname, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse interface name in ip=%s: %m", value);
|
|
|
|
if (isempty(ifname))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing interface name in ip=%s: %m", value);
|
|
|
|
r = extract_first_word(&p, &dhcp_type, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse DHCP type in ip=%s: %m", value);
|
|
|
|
r = network_set_dhcp_type(context, ifname, dhcp_type);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
return parse_cmdline_ip_mtu_mac(context, ifname, p);
|
|
}
|
|
|
|
static int parse_cmdline_ip(Context *context, const char *key, const char *value) {
|
|
const char *p;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
p = strchr(value, ':');
|
|
if (!p)
|
|
/* ip={dhcp|on|any|dhcp6|auto6|either6|link6} */
|
|
return network_set_dhcp_type(context, "", value);
|
|
|
|
/* extract_first_word() eats the trailing separator, so check this earlier. */
|
|
if (endswith(value, ":"))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Unexpected trailing colon in 'ip=%s'.", value);
|
|
|
|
if (value[0] == '[')
|
|
return parse_cmdline_ip_address(context, AF_INET6, value);
|
|
|
|
r = parse_cmdline_ip_address(context, AF_INET, value);
|
|
if (r < 0)
|
|
return parse_cmdline_ip_interface(context, value);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int parse_cmdline_rd_route(Context *context, const char *key, const char *value) {
|
|
_cleanup_free_ char *buf = NULL;
|
|
union in_addr_union dest, gateway;
|
|
unsigned char prefixlen;
|
|
int family, r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
/* rd.route=<net>/<netmask>:<gateway>[:<interface>] */
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
const char *p = value;
|
|
r = extract_ip_address_str(AF_UNSPEC, &p, &buf);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse destination address in %s=%s: %m", key, value);
|
|
|
|
r = in_addr_prefix_from_string_auto(buf, &family, &dest, &prefixlen);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse route destination '%s': %m", buf);
|
|
|
|
buf = mfree(buf);
|
|
r = extract_ip_address(family, &p, &gateway);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse gateway address in %s=%s: %m", key, value);
|
|
|
|
return network_set_route(context, strempty(p), family, prefixlen, &dest, &gateway);
|
|
}
|
|
|
|
static int parse_cmdline_nameserver(Context *context, const char *key, const char *value) {
|
|
assert(context);
|
|
assert(key);
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
return network_set_dns(context, "", value);
|
|
}
|
|
|
|
static int parse_cmdline_rd_peerdns(Context *context, const char *key, const char *value) {
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return network_set_dhcp_use_dns(context, "", true);
|
|
|
|
r = parse_boolean(value);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Invalid boolean value '%s'", value);
|
|
|
|
return network_set_dhcp_use_dns(context, "", r);
|
|
}
|
|
|
|
static int extract_vlan_id(const char *vlan_name, uint16_t *ret) {
|
|
assert(!isempty(vlan_name));
|
|
assert(ret);
|
|
|
|
/* From dracut.cmdline(7):
|
|
* We support the four styles of vlan names:
|
|
* VLAN_PLUS_VID (vlan0005),
|
|
* VLAN_PLUS_VID_NO_PAD (vlan5),
|
|
* DEV_PLUS_VID (eth0.0005), and
|
|
* DEV_PLUS_VID_NO_PAD (eth0.5). */
|
|
|
|
for (const char *p = vlan_name + strlen(vlan_name) - 1; p > vlan_name; p--)
|
|
if (!ascii_isdigit(*p))
|
|
return parse_vlanid(p+1, ret);
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
static int parse_cmdline_vlan(Context *context, const char *key, const char *value) {
|
|
_cleanup_free_ char *name = NULL;
|
|
NetDev *netdev;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
/* vlan=<vlanname>:<phydevice> */
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
const char *p = value;
|
|
r = extract_first_word(&p, &name, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse %s=%s: %m", key, value);
|
|
|
|
r = netdev_acquire(context, "vlan", name, &netdev);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire VLAN device for '%s': %m", name);
|
|
|
|
r = extract_vlan_id(name, &netdev->vlan_id);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse VLAN ID from VLAN device name '%s': %m", name);
|
|
|
|
return network_set_vlan(context, p, name);
|
|
}
|
|
|
|
static int parse_cmdline_bridge(Context *context, const char *key, const char *value) {
|
|
_cleanup_free_ char *name = NULL;
|
|
NetDev *netdev;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
/* bridge=<bridgename>:<ethnames> */
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
const char *p = value;
|
|
r = extract_first_word(&p, &name, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse %s=%s: %m", key, value);
|
|
|
|
r = netdev_acquire(context, "bridge", name, &netdev);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire bridge device for '%s': %m", name);
|
|
|
|
for (;;) {
|
|
_cleanup_free_ char *word = NULL;
|
|
|
|
r = extract_first_word(&p, &word, ",", 0);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse slave interfaces for bridge '%s'", name);
|
|
if (r == 0)
|
|
return 0;
|
|
|
|
r = network_set_bridge(context, word, name);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
}
|
|
|
|
static int parse_cmdline_bond(Context *context, const char *key, const char *value) {
|
|
_cleanup_free_ char *name = NULL, *slaves = NULL, *options = NULL;
|
|
NetDev *netdev;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
/* bond=<bondname>[:<bondslaves>:[:<options>[:<mtu>]]] */
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
const char *p = value;
|
|
r = extract_first_word(&p, &name, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse %s=%s: %m", key, value);
|
|
|
|
r = netdev_acquire(context, "bond", name, &netdev);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to acquire bond device for '%s': %m", name);
|
|
|
|
r = extract_first_word(&p, &slaves, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse %s=%s: %m", key, value);
|
|
|
|
for (const char *q = slaves; ; ) {
|
|
_cleanup_free_ char *word = NULL;
|
|
|
|
r = extract_first_word(&q, &word, ",", 0);
|
|
if (r == 0)
|
|
break;
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse slave interfaces for bond '%s'", name);
|
|
|
|
r = network_set_bond(context, word, name);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
r = extract_first_word(&p, &options, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse %s=%s: %m", key, value);
|
|
|
|
/* TODO: set bonding options */
|
|
|
|
if (!isempty(p)) {
|
|
r = parse_mtu(AF_UNSPEC, p, &netdev->mtu);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Invalid MTU '%s' for '%s': %m", p, name);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int parse_cmdline_ifname(Context *context, const char *key, const char *value) {
|
|
_cleanup_free_ char *name = NULL;
|
|
struct hw_addr_data mac;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
/* ifname=<interface>:<MAC> */
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
const char *p = value;
|
|
r = extract_first_word(&p, &name, ":", EXTRACT_DONT_COALESCE_SEPARATORS);
|
|
if (r <= 0)
|
|
return log_debug_errno(r < 0 ? r : SYNTHETIC_ERRNO(EINVAL), "Failed to parse %s=%s: %m", key, value);
|
|
|
|
if (isempty(p))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing MAC address for '%s'", name);
|
|
|
|
r = parse_hw_addr(p, &mac);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Invalid MAC address '%s' for '%s'", p, name);
|
|
|
|
r = link_new(context, name, &mac, NULL);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to create link for '%s': %m", name);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int parse_cmdline_ifname_policy(Context *context, const char *key, const char *value) {
|
|
_cleanup_strv_free_ char **policies = NULL, **alt_policies = NULL;
|
|
struct hw_addr_data mac = HW_ADDR_NULL;
|
|
Link *link;
|
|
int r;
|
|
|
|
assert(context);
|
|
assert(key);
|
|
|
|
/* net.ifname_policy=policy1[,policy2,...][,<MAC>] */
|
|
|
|
if (proc_cmdline_value_missing(key, value))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Missing value for '%s'", key);
|
|
|
|
for (const char *q = value; ; ) {
|
|
_cleanup_free_ char *word = NULL;
|
|
NamePolicy p;
|
|
|
|
r = extract_first_word(&q, &word, ",", 0);
|
|
if (r == 0)
|
|
break;
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to parse ifname policy '%s'", value);
|
|
|
|
p = name_policy_from_string(word);
|
|
if (p < 0) {
|
|
r = parse_hw_addr(word, &mac);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Invalid MAC address '%s'", word);
|
|
|
|
if (hw_addr_is_null(&mac))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "MAC address is not set");
|
|
|
|
if (!isempty(q))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Unexpected trailing string '%s' in ifname policy '%s'", q, value);
|
|
|
|
break;
|
|
}
|
|
|
|
if (alternative_names_policy_from_string(word) >= 0) {
|
|
r = strv_extend(&alt_policies, word);
|
|
if (r < 0)
|
|
return log_oom_debug();
|
|
}
|
|
|
|
r = strv_consume(&policies, TAKE_PTR(word));
|
|
if (r < 0)
|
|
return log_oom_debug();
|
|
}
|
|
|
|
if (strv_isempty(policies))
|
|
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "No ifname policy specified");
|
|
|
|
r = link_new(context, NULL, &mac, &link);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to create link: %m");
|
|
|
|
link->policies = TAKE_PTR(policies);
|
|
link->alt_policies = TAKE_PTR(alt_policies);
|
|
return 0;
|
|
}
|
|
|
|
int parse_cmdline_item(const char *key, const char *value, void *data) {
|
|
Context *context = ASSERT_PTR(data);
|
|
|
|
assert(key);
|
|
|
|
if (proc_cmdline_key_streq(key, "ip"))
|
|
return parse_cmdline_ip(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "rd.route"))
|
|
return parse_cmdline_rd_route(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "nameserver"))
|
|
return parse_cmdline_nameserver(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "rd.peerdns"))
|
|
return parse_cmdline_rd_peerdns(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "vlan"))
|
|
return parse_cmdline_vlan(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "bridge"))
|
|
return parse_cmdline_bridge(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "bond"))
|
|
return parse_cmdline_bond(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "ifname"))
|
|
return parse_cmdline_ifname(context, key, value);
|
|
if (proc_cmdline_key_streq(key, "net.ifname_policy"))
|
|
return parse_cmdline_ifname_policy(context, key, value);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int context_merge_networks(Context *context) {
|
|
Network *all, *network;
|
|
int r;
|
|
|
|
assert(context);
|
|
|
|
/* Copy settings about the following options
|
|
rd.route=<net>/<netmask>:<gateway>[:<interface>]
|
|
nameserver=<IP> [nameserver=<IP> ...]
|
|
rd.peerdns=0 */
|
|
|
|
all = network_get(context, "");
|
|
if (!all)
|
|
return 0;
|
|
|
|
if (hashmap_size(context->networks_by_name) <= 1)
|
|
return 0;
|
|
|
|
HASHMAP_FOREACH(network, context->networks_by_name) {
|
|
if (network == all)
|
|
continue;
|
|
|
|
network->dhcp_use_dns = all->dhcp_use_dns;
|
|
|
|
r = strv_extend_strv(&network->dns, all->dns, false);
|
|
if (r < 0)
|
|
return log_oom_debug();
|
|
|
|
LIST_FOREACH(routes, route, all->routes) {
|
|
r = route_new(network, route->family, route->prefixlen, &route->dest, &route->gateway, NULL);
|
|
if (r < 0)
|
|
return log_debug_errno(r, "Failed to copy route: %m");
|
|
}
|
|
}
|
|
|
|
assert_se(hashmap_remove(context->networks_by_name, "") == all);
|
|
network_free(all);
|
|
return 0;
|
|
}
|
|
|
|
void context_clear(Context *context) {
|
|
if (!context)
|
|
return;
|
|
|
|
hashmap_free_with_destructor(context->networks_by_name, network_free);
|
|
hashmap_free_with_destructor(context->netdevs_by_name, netdev_free);
|
|
hashmap_free_with_destructor(context->links_by_filename, link_free);
|
|
}
|
|
|
|
static int address_dump(Address *address, FILE *f) {
|
|
assert(address);
|
|
assert(f);
|
|
|
|
fprintf(f,
|
|
"\n[Address]\n"
|
|
"Address=%s\n",
|
|
IN_ADDR_PREFIX_TO_STRING(address->family, &address->address, address->prefixlen));
|
|
if (in_addr_is_set(address->family, &address->peer))
|
|
fprintf(f, "Peer=%s\n",
|
|
IN_ADDR_TO_STRING(address->family, &address->peer));
|
|
return 0;
|
|
}
|
|
|
|
static int route_dump(Route *route, FILE *f) {
|
|
assert(route);
|
|
assert(f);
|
|
|
|
fputs("\n[Route]\n", f);
|
|
if (in_addr_is_set(route->family, &route->dest))
|
|
fprintf(f, "Destination=%s\n",
|
|
IN_ADDR_PREFIX_TO_STRING(route->family, &route->dest, route->prefixlen));
|
|
if (in_addr_is_set(route->family, &route->gateway))
|
|
fprintf(f, "Gateway=%s\n",
|
|
IN_ADDR_TO_STRING(route->family, &route->gateway));
|
|
|
|
return 0;
|
|
}
|
|
|
|
void network_dump(Network *network, FILE *f) {
|
|
const char *dhcp;
|
|
|
|
assert(network);
|
|
assert(f);
|
|
|
|
fputs("[Match]\n", f);
|
|
|
|
if (isempty(network->ifname))
|
|
/* If the interface name is not specified, then let's make the .network file match the all
|
|
* physical interfaces. */
|
|
fputs("Kind=!*\n"
|
|
"Type=!loopback\n", f);
|
|
else
|
|
fprintf(f, "Name=%s\n", network->ifname);
|
|
|
|
fputs("\n[Link]\n", f);
|
|
|
|
if (!ether_addr_is_null(&network->mac))
|
|
fprintf(f, "MACAddress=%s\n", ETHER_ADDR_TO_STR(&network->mac));
|
|
if (network->mtu > 0)
|
|
fprintf(f, "MTUBytes=%" PRIu32 "\n", network->mtu);
|
|
|
|
fputs("\n[Network]\n", f);
|
|
|
|
dhcp = networkd_dhcp_type_to_string(network->dhcp_type);
|
|
if (dhcp)
|
|
fprintf(f, "DHCP=%s\n", dhcp);
|
|
|
|
const char *ll;
|
|
ll = networkd_link_local_type_to_string(network->dhcp_type);
|
|
if (ll)
|
|
fprintf(f, "LinkLocalAddressing=%s\n", ll);
|
|
|
|
const char *ra;
|
|
ra = networkd_ipv6ra_type_to_string(network->dhcp_type);
|
|
if (ra)
|
|
fprintf(f, "IPv6AcceptRA=%s\n", ra);
|
|
|
|
if (!strv_isempty(network->dns))
|
|
STRV_FOREACH(dns, network->dns)
|
|
fprintf(f, "DNS=%s\n", *dns);
|
|
|
|
STRV_FOREACH(v, network->vlan)
|
|
fprintf(f, "VLAN=%s\n", *v);
|
|
|
|
if (network->bridge)
|
|
fprintf(f, "Bridge=%s\n", network->bridge);
|
|
|
|
if (network->bond)
|
|
fprintf(f, "Bond=%s\n", network->bond);
|
|
|
|
fputs("\n[DHCP]\n", f);
|
|
|
|
if (!isempty(network->hostname))
|
|
fprintf(f, "Hostname=%s\n", network->hostname);
|
|
|
|
if (network->dhcp_use_dns >= 0)
|
|
fprintf(f, "UseDNS=%s\n", yes_no(network->dhcp_use_dns));
|
|
|
|
LIST_FOREACH(addresses, address, network->addresses)
|
|
(void) address_dump(address, f);
|
|
|
|
LIST_FOREACH(routes, route, network->routes)
|
|
(void) route_dump(route, f);
|
|
}
|
|
|
|
void netdev_dump(NetDev *netdev, FILE *f) {
|
|
assert(netdev);
|
|
assert(f);
|
|
|
|
fprintf(f,
|
|
"[NetDev]\n"
|
|
"Kind=%s\n"
|
|
"Name=%s\n",
|
|
netdev->kind,
|
|
netdev->ifname);
|
|
|
|
if (netdev->mtu > 0)
|
|
fprintf(f, "MTUBytes=%" PRIu32 "\n", netdev->mtu);
|
|
|
|
if (streq(netdev->kind, "vlan")) {
|
|
fprintf(f,
|
|
"\n[VLAN]\n"
|
|
"Id=%u\n",
|
|
netdev->vlan_id);
|
|
}
|
|
}
|
|
|
|
void link_dump(Link *link, FILE *f) {
|
|
assert(link);
|
|
assert(f);
|
|
|
|
fputs("[Match]\n", f);
|
|
|
|
if (!hw_addr_is_null(&link->mac))
|
|
fprintf(f, "MACAddress=%s\n", HW_ADDR_TO_STR(&link->mac));
|
|
else
|
|
fputs("OriginalName=*\n", f);
|
|
|
|
fputs("\n[Link]\n", f);
|
|
|
|
if (!isempty(link->ifname))
|
|
fprintf(f, "Name=%s\n", link->ifname);
|
|
|
|
if (!strv_isempty(link->policies)) {
|
|
fputs("NamePolicy=", f);
|
|
fputstrv(f, link->policies, " ", NULL);
|
|
fputc('\n', f);
|
|
}
|
|
|
|
if (!strv_isempty(link->alt_policies)) {
|
|
fputs("AlternativeNamesPolicy=", f);
|
|
fputstrv(f, link->alt_policies, " ", NULL);
|
|
fputc('\n', f);
|
|
}
|
|
}
|
|
|
|
int network_format(Network *network, char **ret) {
|
|
_cleanup_(memstream_done) MemStream m = {};
|
|
FILE *f;
|
|
|
|
assert(network);
|
|
assert(ret);
|
|
|
|
f = memstream_init(&m);
|
|
if (!f)
|
|
return log_oom_debug();
|
|
|
|
network_dump(network, f);
|
|
|
|
return memstream_finalize(&m, ret, NULL);
|
|
}
|
|
|
|
int netdev_format(NetDev *netdev, char **ret) {
|
|
_cleanup_(memstream_done) MemStream m = {};
|
|
FILE *f;
|
|
|
|
assert(netdev);
|
|
assert(ret);
|
|
|
|
f = memstream_init(&m);
|
|
if (!f)
|
|
return log_oom_debug();
|
|
|
|
netdev_dump(netdev, f);
|
|
|
|
return memstream_finalize(&m, ret, NULL);
|
|
}
|
|
|
|
int link_format(Link *link, char **ret) {
|
|
_cleanup_(memstream_done) MemStream m = {};
|
|
FILE *f;
|
|
|
|
assert(link);
|
|
assert(ret);
|
|
|
|
f = memstream_init(&m);
|
|
if (!f)
|
|
return log_oom_debug();
|
|
|
|
link_dump(link, f);
|
|
|
|
return memstream_finalize(&m, ret, NULL);
|
|
}
|