summaryrefslogtreecommitdiff
path: root/src/conf_mode/dhcp_server.py
diff options
context:
space:
mode:
authorChristian Breunig <christian@breunig.cc>2023-12-30 23:25:20 +0100
committerChristian Breunig <christian@breunig.cc>2023-12-31 23:49:48 +0100
commit4ef110fd2c501b718344c72d495ad7e16d2bd465 (patch)
treee98bf08f93c029ec4431a3b6ca078e7562e0cc58 /src/conf_mode/dhcp_server.py
parent2286b8600da6c631b17e1d5b9b341843e50f9abf (diff)
downloadvyos-1x-4ef110fd2c501b718344c72d495ad7e16d2bd465.tar.gz
vyos-1x-4ef110fd2c501b718344c72d495ad7e16d2bd465.zip
T5474: establish common file name pattern for XML conf mode commands
We will use _ as CLI level divider. The XML definition filename and also the Python helper should match the CLI node. Example: set interfaces ethernet -> interfaces_ethernet.xml.in set interfaces bond -> interfaces_bond.xml.in set service dhcp-server -> service_dhcp-server-xml.in
Diffstat (limited to 'src/conf_mode/dhcp_server.py')
-rwxr-xr-xsrc/conf_mode/dhcp_server.py385
1 files changed, 0 insertions, 385 deletions
diff --git a/src/conf_mode/dhcp_server.py b/src/conf_mode/dhcp_server.py
deleted file mode 100755
index 7ebc560ba..000000000
--- a/src/conf_mode/dhcp_server.py
+++ /dev/null
@@ -1,385 +0,0 @@
-#!/usr/bin/env python3
-#
-# Copyright (C) 2018-2023 VyOS maintainers and contributors
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License version 2 or later as
-# published by the Free Software Foundation.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-
-import os
-
-from ipaddress import ip_address
-from ipaddress import ip_network
-from netaddr import IPRange
-from sys import exit
-
-from vyos.config import Config
-from vyos.pki import wrap_certificate
-from vyos.pki import wrap_private_key
-from vyos.template import render
-from vyos.utils.dict import dict_search
-from vyos.utils.dict import dict_search_args
-from vyos.utils.file import chmod_775
-from vyos.utils.file import makedir
-from vyos.utils.file import write_file
-from vyos.utils.process import call
-from vyos.utils.network import is_subnet_connected
-from vyos.utils.network import is_addr_assigned
-from vyos import ConfigError
-from vyos import airbag
-airbag.enable()
-
-ctrl_config_file = '/run/kea/kea-ctrl-agent.conf'
-ctrl_socket = '/run/kea/dhcp4-ctrl-socket'
-config_file = '/run/kea/kea-dhcp4.conf'
-lease_file = '/config/dhcp/dhcp4-leases.csv'
-systemd_override = r'/run/systemd/system/kea-ctrl-agent.service.d/10-override.conf'
-user_group = '_kea'
-
-ca_cert_file = '/run/kea/kea-failover-ca.pem'
-cert_file = '/run/kea/kea-failover.pem'
-cert_key_file = '/run/kea/kea-failover-key.pem'
-
-def dhcp_slice_range(exclude_list, range_dict):
- """
- This function is intended to slice a DHCP range. What does it mean?
-
- Lets assume we have a DHCP range from '192.0.2.1' to '192.0.2.100'
- but want to exclude address '192.0.2.74' and '192.0.2.75'. We will
- pass an input 'range_dict' in the format:
- {'start' : '192.0.2.1', 'stop' : '192.0.2.100' }
- and we will receive an output list of:
- [{'start' : '192.0.2.1' , 'stop' : '192.0.2.73' },
- {'start' : '192.0.2.76', 'stop' : '192.0.2.100' }]
- The resulting list can then be used in turn to build the proper dhcpd
- configuration file.
- """
- output = []
- # exclude list must be sorted for this to work
- exclude_list = sorted(exclude_list)
- range_start = range_dict['start']
- range_stop = range_dict['stop']
- range_last_exclude = ''
-
- for e in exclude_list:
- if (ip_address(e) >= ip_address(range_start)) and \
- (ip_address(e) <= ip_address(range_stop)):
- range_last_exclude = e
-
- for e in exclude_list:
- if (ip_address(e) >= ip_address(range_start)) and \
- (ip_address(e) <= ip_address(range_stop)):
-
- # Build new address range ending one address before exclude address
- r = {
- 'start' : range_start,
- 'stop' : str(ip_address(e) -1)
- }
- # On the next run our address range will start one address after
- # the exclude address
- range_start = str(ip_address(e) + 1)
-
- # on subsequent exclude addresses we can not
- # append them to our output
- if not (ip_address(r['start']) > ip_address(r['stop'])):
- # Everything is fine, add range to result
- output.append(r)
-
- # Take care of last IP address range spanning from the last exclude
- # address (+1) to the end of the initial configured range
- if ip_address(e) == ip_address(range_last_exclude):
- r = {
- 'start': str(ip_address(e) + 1),
- 'stop': str(range_stop)
- }
- if not (ip_address(r['start']) > ip_address(r['stop'])):
- output.append(r)
- else:
- # if the excluded address was not part of the range, we simply return
- # the entire ranga again
- if not range_last_exclude:
- if range_dict not in output:
- output.append(range_dict)
-
- return output
-
-def get_config(config=None):
- if config:
- conf = config
- else:
- conf = Config()
- base = ['service', 'dhcp-server']
- if not conf.exists(base):
- return None
-
- dhcp = conf.get_config_dict(base, key_mangling=('-', '_'),
- no_tag_node_value_mangle=True,
- get_first_key=True,
- with_recursive_defaults=True)
-
- if 'shared_network_name' in dhcp:
- for network, network_config in dhcp['shared_network_name'].items():
- if 'subnet' in network_config:
- for subnet, subnet_config in network_config['subnet'].items():
- # If exclude IP addresses are defined we need to slice them out of
- # the defined ranges
- if {'exclude', 'range'} <= set(subnet_config):
- new_range_id = 0
- new_range_dict = {}
- for r, r_config in subnet_config['range'].items():
- for slice in dhcp_slice_range(subnet_config['exclude'], r_config):
- new_range_dict.update({new_range_id : slice})
- new_range_id +=1
-
- dhcp['shared_network_name'][network]['subnet'][subnet].update(
- {'range' : new_range_dict})
-
- if dict_search('failover.certificate', dhcp):
- dhcp['pki'] = conf.get_config_dict(['pki'], key_mangling=('-', '_'), get_first_key=True, no_tag_node_value_mangle=True)
-
- return dhcp
-
-def verify(dhcp):
- # bail out early - looks like removal from running config
- if not dhcp or 'disable' in dhcp:
- return None
-
- # If DHCP is enabled we need one share-network
- if 'shared_network_name' not in dhcp:
- raise ConfigError('No DHCP shared networks configured.\n' \
- 'At least one DHCP shared network must be configured.')
-
- # Inspect shared-network/subnet
- listen_ok = False
- subnets = []
- failover_ok = False
- shared_networks = len(dhcp['shared_network_name'])
- disabled_shared_networks = 0
-
-
- # A shared-network requires a subnet definition
- for network, network_config in dhcp['shared_network_name'].items():
- if 'disable' in network_config:
- disabled_shared_networks += 1
-
- if 'subnet' not in network_config:
- raise ConfigError(f'No subnets defined for {network}. At least one\n' \
- 'lease subnet must be configured.')
-
- for subnet, subnet_config in network_config['subnet'].items():
- # All delivered static routes require a next-hop to be set
- if 'static_route' in subnet_config:
- for route, route_option in subnet_config['static_route'].items():
- if 'next_hop' not in route_option:
- raise ConfigError(f'DHCP static-route "{route}" requires router to be defined!')
-
- # Check if DHCP address range is inside configured subnet declaration
- if 'range' in subnet_config:
- networks = []
- for range, range_config in subnet_config['range'].items():
- if not {'start', 'stop'} <= set(range_config):
- raise ConfigError(f'DHCP range "{range}" start and stop address must be defined!')
-
- # Start/Stop address must be inside network
- for key in ['start', 'stop']:
- if ip_address(range_config[key]) not in ip_network(subnet):
- raise ConfigError(f'DHCP range "{range}" {key} address not within shared-network "{network}, {subnet}"!')
-
- # Stop address must be greater or equal to start address
- if ip_address(range_config['stop']) < ip_address(range_config['start']):
- raise ConfigError(f'DHCP range "{range}" stop address must be greater or equal\n' \
- 'to the ranges start address!')
-
- for network in networks:
- start = range_config['start']
- stop = range_config['stop']
- if start in network:
- raise ConfigError(f'Range "{range}" start address "{start}" already part of another range!')
- if stop in network:
- raise ConfigError(f'Range "{range}" stop address "{stop}" already part of another range!')
-
- tmp = IPRange(range_config['start'], range_config['stop'])
- networks.append(tmp)
-
- # Exclude addresses must be in bound
- if 'exclude' in subnet_config:
- for exclude in subnet_config['exclude']:
- if ip_address(exclude) not in ip_network(subnet):
- raise ConfigError(f'Excluded IP address "{exclude}" not within shared-network "{network}, {subnet}"!')
-
- # At least one DHCP address range or static-mapping required
- if 'range' not in subnet_config and 'static_mapping' not in subnet_config:
- raise ConfigError(f'No DHCP address range or active static-mapping configured\n' \
- f'within shared-network "{network}, {subnet}"!')
-
- if 'static_mapping' in subnet_config:
- # Static mappings require just a MAC address (will use an IP from the dynamic pool if IP is not set)
- for mapping, mapping_config in subnet_config['static_mapping'].items():
- if 'ip_address' in mapping_config:
- if ip_address(mapping_config['ip_address']) not in ip_network(subnet):
- raise ConfigError(f'Configured static lease address for mapping "{mapping}" is\n' \
- f'not within shared-network "{network}, {subnet}"!')
-
- if ('mac' not in mapping_config and 'duid' not in mapping_config) or \
- ('mac' in mapping_config and 'duid' in mapping_config):
- raise ConfigError(f'Either MAC address or Client identifier (DUID) is required for '
- f'static mapping "{mapping}" within shared-network "{network}, {subnet}"!')
-
- # There must be one subnet connected to a listen interface.
- # This only counts if the network itself is not disabled!
- if 'disable' not in network_config:
- if is_subnet_connected(subnet, primary=False):
- listen_ok = True
-
- # Subnets must be non overlapping
- if subnet in subnets:
- raise ConfigError(f'Configured subnets must be unique! Subnet "{subnet}"\n'
- 'defined multiple times!')
- subnets.append(subnet)
-
- # Check for overlapping subnets
- net = ip_network(subnet)
- for n in subnets:
- net2 = ip_network(n)
- if (net != net2):
- if net.overlaps(net2):
- raise ConfigError(f'Conflicting subnet ranges: "{net}" overlaps "{net2}"!')
-
- # Prevent 'disable' for shared-network if only one network is configured
- if (shared_networks - disabled_shared_networks) < 1:
- raise ConfigError(f'At least one shared network must be active!')
-
- if 'failover' in dhcp:
- for key in ['name', 'remote', 'source_address', 'status']:
- if key not in dhcp['failover']:
- tmp = key.replace('_', '-')
- raise ConfigError(f'DHCP failover requires "{tmp}" to be specified!')
-
- if len({'certificate', 'ca_certificate'} & set(dhcp['failover'])) == 1:
- raise ConfigError(f'DHCP secured failover requires both certificate and CA certificate')
-
- if 'certificate' in dhcp['failover']:
- cert_name = dhcp['failover']['certificate']
-
- if cert_name not in dhcp['pki']['certificate']:
- raise ConfigError(f'Invalid certificate specified for DHCP failover')
-
- if not dict_search_args(dhcp['pki']['certificate'], cert_name, 'certificate'):
- raise ConfigError(f'Invalid certificate specified for DHCP failover')
-
- if not dict_search_args(dhcp['pki']['certificate'], cert_name, 'private', 'key'):
- raise ConfigError(f'Missing private key on certificate specified for DHCP failover')
-
- if 'ca_certificate' in dhcp['failover']:
- ca_cert_name = dhcp['failover']['ca_certificate']
- if ca_cert_name not in dhcp['pki']['ca']:
- raise ConfigError(f'Invalid CA certificate specified for DHCP failover')
-
- if not dict_search_args(dhcp['pki']['ca'], ca_cert_name, 'certificate'):
- raise ConfigError(f'Invalid CA certificate specified for DHCP failover')
-
- for address in (dict_search('listen_address', dhcp) or []):
- if is_addr_assigned(address):
- listen_ok = True
- # no need to probe further networks, we have one that is valid
- continue
- else:
- raise ConfigError(f'listen-address "{address}" not configured on any interface')
-
-
- if not listen_ok:
- raise ConfigError('None of the configured subnets have an appropriate primary IP address on any\n'
- 'broadcast interface configured, nor was there an explicit listen-address\n'
- 'configured for serving DHCP relay packets!')
-
- return None
-
-def generate(dhcp):
- # bail out early - looks like removal from running config
- if not dhcp or 'disable' in dhcp:
- return None
-
- dhcp['lease_file'] = lease_file
- dhcp['machine'] = os.uname().machine
-
- # Create directory for lease file if necessary
- lease_dir = os.path.dirname(lease_file)
- if not os.path.isdir(lease_dir):
- makedir(lease_dir, group='vyattacfg')
- chmod_775(lease_dir)
-
- # Create lease file if necessary and let kea own it - 'kea-lfc' expects it that way
- if not os.path.exists(lease_file):
- write_file(lease_file, '', user=user_group, group=user_group, mode=0o644)
-
- for f in [cert_file, cert_key_file, ca_cert_file]:
- if os.path.exists(f):
- os.unlink(f)
-
- if 'failover' in dhcp:
- if 'certificate' in dhcp['failover']:
- cert_name = dhcp['failover']['certificate']
- cert_data = dhcp['pki']['certificate'][cert_name]['certificate']
- key_data = dhcp['pki']['certificate'][cert_name]['private']['key']
- write_file(cert_file, wrap_certificate(cert_data), user=user_group, mode=0o600)
- write_file(cert_key_file, wrap_private_key(key_data), user=user_group, mode=0o600)
-
- dhcp['failover']['cert_file'] = cert_file
- dhcp['failover']['cert_key_file'] = cert_key_file
-
- if 'ca_certificate' in dhcp['failover']:
- ca_cert_name = dhcp['failover']['ca_certificate']
- ca_cert_data = dhcp['pki']['ca'][ca_cert_name]['certificate']
- write_file(ca_cert_file, wrap_certificate(ca_cert_data), user=user_group, mode=0o600)
-
- dhcp['failover']['ca_cert_file'] = ca_cert_file
-
- render(systemd_override, 'dhcp-server/10-override.conf.j2', dhcp)
-
- render(ctrl_config_file, 'dhcp-server/kea-ctrl-agent.conf.j2', dhcp, user=user_group, group=user_group)
- render(config_file, 'dhcp-server/kea-dhcp4.conf.j2', dhcp, user=user_group, group=user_group)
-
- return None
-
-def apply(dhcp):
- services = ['kea-ctrl-agent', 'kea-dhcp4-server', 'kea-dhcp-ddns-server']
-
- if not dhcp or 'disable' in dhcp:
- for service in services:
- call(f'systemctl stop {service}.service')
-
- if os.path.exists(config_file):
- os.unlink(config_file)
-
- return None
-
- for service in services:
- action = 'restart'
-
- if service == 'kea-dhcp-ddns-server' and 'dynamic_dns_update' not in dhcp:
- action = 'stop'
-
- if service == 'kea-ctrl-agent' and 'failover' not in dhcp:
- action = 'stop'
-
- call(f'systemctl {action} {service}.service')
-
- return None
-
-if __name__ == '__main__':
- try:
- c = get_config()
- verify(c)
- generate(c)
- apply(c)
- except ConfigError as e:
- print(e)
- exit(1)