diff options
42 files changed, 380 insertions, 396 deletions
| diff --git a/python/vyos/configdict.py b/python/vyos/configdict.py index 38f4475d4..2a47e88f9 100644 --- a/python/vyos/configdict.py +++ b/python/vyos/configdict.py @@ -245,6 +245,48 @@ def is_mirror_intf(conf, interface, direction=None):      return ret_val +def has_address_configured(conf, intf): +    """ +    Checks if interface has an address configured. +    Checks the following config nodes: +    'address', 'ipv6 address eui64', 'ipv6 address autoconf' + +    Returns True if interface has address configured, False if it doesn't. +    """ +    from vyos.ifconfig import Section +    ret = False + +    old_level = conf.get_level() +    conf.set_level([]) + +    intfpath = 'interfaces ' + Section.get_config_path(intf) +    if ( conf.exists(f'{intfpath} address') or +            conf.exists(f'{intfpath} ipv6 address autoconf') or +            conf.exists(f'{intfpath} ipv6 address eui64') ): +        ret = True + +    conf.set_level(old_level) +    return ret + +def has_vrf_configured(conf, intf): +    """ +    Checks if interface has a VRF configured. + +    Returns True if interface has VRF configured, False if it doesn't. +    """ +    from vyos.ifconfig import Section +    ret = False + +    old_level = conf.get_level() +    conf.set_level([]) + +    tmp = ['interfaces', Section.get_config_path(intf), 'vrf'] +    if conf.exists(tmp): +        ret = True + +    conf.set_level(old_level) +    return ret +  def has_vlan_subinterface_configured(conf, intf):      """      Checks if interface has an VLAN subinterface configured. diff --git a/python/vyos/ifconfig/bond.py b/python/vyos/ifconfig/bond.py index e88f860be..d1d7d48c4 100644 --- a/python/vyos/ifconfig/bond.py +++ b/python/vyos/ifconfig/bond.py @@ -18,8 +18,8 @@ import os  from vyos.ifconfig.interface import Interface  from vyos.utils.process import cmd  from vyos.utils.dict import dict_search -from vyos.validate import assert_list -from vyos.validate import assert_positive +from vyos.utils.assertion import assert_list +from vyos.utils.assertion import assert_positive  @Interface.register  class BondIf(Interface): diff --git a/python/vyos/ifconfig/bridge.py b/python/vyos/ifconfig/bridge.py index b103b49d8..b29e71394 100644 --- a/python/vyos/ifconfig/bridge.py +++ b/python/vyos/ifconfig/bridge.py @@ -17,8 +17,8 @@ from netifaces import interfaces  import json  from vyos.ifconfig.interface import Interface -from vyos.validate import assert_boolean -from vyos.validate import assert_positive +from vyos.utils.assertion import assert_boolean +from vyos.utils.assertion import assert_positive  from vyos.utils.process import cmd  from vyos.utils.dict import dict_search  from vyos.configdict import get_vlan_ids diff --git a/python/vyos/ifconfig/ethernet.py b/python/vyos/ifconfig/ethernet.py index 4ff044c23..24ce3a803 100644 --- a/python/vyos/ifconfig/ethernet.py +++ b/python/vyos/ifconfig/ethernet.py @@ -23,7 +23,7 @@ from vyos.ifconfig.interface import Interface  from vyos.utils.dict import dict_search  from vyos.utils.file import read_file  from vyos.utils.process import run -from vyos.validate import assert_list +from vyos.utils.assertion import assert_list  @Interface.register  class EthernetIf(Interface): diff --git a/python/vyos/ifconfig/interface.py b/python/vyos/ifconfig/interface.py index 48eb68cae..8ed5cb114 100644 --- a/python/vyos/ifconfig/interface.py +++ b/python/vyos/ifconfig/interface.py @@ -41,14 +41,14 @@ from vyos.utils.network import get_interface_namespace  from vyos.utils.process import is_systemd_service_active  from vyos.template import is_ipv4  from vyos.template import is_ipv6 -from vyos.validate import is_intf_addr_assigned -from vyos.validate import is_ipv6_link_local -from vyos.validate import assert_boolean -from vyos.validate import assert_list -from vyos.validate import assert_mac -from vyos.validate import assert_mtu -from vyos.validate import assert_positive -from vyos.validate import assert_range +from vyos.utils.network import is_intf_addr_assigned +from vyos.utils.network import is_ipv6_link_local +from vyos.utils.assertion import assert_boolean +from vyos.utils.assertion import assert_list +from vyos.utils.assertion import assert_mac +from vyos.utils.assertion import assert_mtu +from vyos.utils.assertion import assert_positive +from vyos.utils.assertion import assert_range  from vyos.ifconfig.control import Control  from vyos.ifconfig.vrrp import VRRP diff --git a/python/vyos/ifconfig/pppoe.py b/python/vyos/ifconfig/pppoe.py index fd4590beb..febf1452d 100644 --- a/python/vyos/ifconfig/pppoe.py +++ b/python/vyos/ifconfig/pppoe.py @@ -14,7 +14,7 @@  # License along with this library.  If not, see <http://www.gnu.org/licenses/>.  from vyos.ifconfig.interface import Interface -from vyos.validate import assert_range +from vyos.utils.assertion import assert_range  from vyos.utils.network import get_interface_config  @Interface.register diff --git a/python/vyos/ifconfig/tunnel.py b/python/vyos/ifconfig/tunnel.py index fb2f38e2b..9ba7b31a6 100644 --- a/python/vyos/ifconfig/tunnel.py +++ b/python/vyos/ifconfig/tunnel.py @@ -18,7 +18,7 @@  from vyos.ifconfig.interface import Interface  from vyos.utils.dict import dict_search -from vyos.validate import assert_list +from vyos.utils.assertion import assert_list  def enable_to_on(value):      if value == 'enable': diff --git a/python/vyos/utils/__init__.py b/python/vyos/utils/__init__.py index f2783113a..12ef2d3b8 100644 --- a/python/vyos/utils/__init__.py +++ b/python/vyos/utils/__init__.py @@ -13,6 +13,7 @@  # You should have received a copy of the GNU Lesser General Public  # License along with this library.  If not, see <http://www.gnu.org/licenses/>. +from vyos.utils import assertion  from vyos.utils import auth  from vyos.utils import boot  from vyos.utils import commit diff --git a/python/vyos/utils/assertion.py b/python/vyos/utils/assertion.py new file mode 100644 index 000000000..1aaa54dff --- /dev/null +++ b/python/vyos/utils/assertion.py @@ -0,0 +1,81 @@ +# Copyright 2023 VyOS maintainers and contributors <maintainers@vyos.io> +# +# This library is free software; you can redistribute it and/or +# modify it under the terms of the GNU Lesser General Public +# License as published by the Free Software Foundation; either +# version 2.1 of the License, or (at your option) any later version. +# +# This library is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU +# Lesser General Public License for more details. +# +# You should have received a copy of the GNU Lesser General Public +# License along with this library.  If not, see <http://www.gnu.org/licenses/>. + +def assert_boolean(b): +    if int(b) not in (0, 1): +        raise ValueError(f'Value {b} out of range') + +def assert_range(value, lower=0, count=3): +    if int(value, 16) not in range(lower, lower+count): +        raise ValueError("Value out of range") + +def assert_list(s, l): +    if s not in l: +        o = ' or '.join([f'"{n}"' for n in l]) +        raise ValueError(f'state must be {o}, got {s}') + +def assert_number(n): +    if not str(n).isnumeric(): +        raise ValueError(f'{n} must be a number') + +def assert_positive(n, smaller=0): +    assert_number(n) +    if int(n) < smaller: +        raise ValueError(f'{n} is smaller than {smaller}') + +def assert_mtu(mtu, ifname): +    assert_number(mtu) + +    import json +    from vyos.utils.process import cmd +    out = cmd(f'ip -j -d link show dev {ifname}') +    # [{"ifindex":2,"ifname":"eth0","flags":["BROADCAST","MULTICAST","UP","LOWER_UP"],"mtu":1500,"qdisc":"pfifo_fast","operstate":"UP","linkmode":"DEFAULT","group":"default","txqlen":1000,"link_type":"ether","address":"08:00:27:d9:5b:04","broadcast":"ff:ff:ff:ff:ff:ff","promiscuity":0,"min_mtu":46,"max_mtu":16110,"inet6_addr_gen_mode":"none","num_tx_queues":1,"num_rx_queues":1,"gso_max_size":65536,"gso_max_segs":65535}] +    parsed = json.loads(out)[0] +    min_mtu = int(parsed.get('min_mtu', '0')) +    # cur_mtu = parsed.get('mtu',0), +    max_mtu = int(parsed.get('max_mtu', '0')) +    cur_mtu = int(mtu) + +    if (min_mtu and cur_mtu < min_mtu) or cur_mtu < 68: +        raise ValueError(f'MTU is too small for interface "{ifname}": {mtu} < {min_mtu}') +    if (max_mtu and cur_mtu > max_mtu) or cur_mtu > 65536: +        raise ValueError(f'MTU is too small for interface "{ifname}": {mtu} > {max_mtu}') + +def assert_mac(m): +    split = m.split(':') +    size = len(split) + +    # a mac address consits out of 6 octets +    if size != 6: +        raise ValueError(f'wrong number of MAC octets ({size}): {m}') + +    octets = [] +    try: +        for octet in split: +            octets.append(int(octet, 16)) +    except ValueError: +        raise ValueError(f'invalid hex number "{octet}" in : {m}') + +    # validate against the first mac address byte if it's a multicast +    # address +    if octets[0] & 1: +        raise ValueError(f'{m} is a multicast MAC address') + +    # overall mac address is not allowed to be 00:00:00:00:00:00 +    if sum(octets) == 0: +        raise ValueError('00:00:00:00:00:00 is not a valid MAC address') + +    if octets[:5] == (0, 0, 94, 0, 1): +        raise ValueError(f'{m} is a VRRP MAC address') diff --git a/python/vyos/utils/network.py b/python/vyos/utils/network.py index 3786caf26..3f9a3ef4b 100644 --- a/python/vyos/utils/network.py +++ b/python/vyos/utils/network.py @@ -13,7 +13,15 @@  # You should have received a copy of the GNU Lesser General Public  # License along with this library.  If not, see <http://www.gnu.org/licenses/>. -import os +def _are_same_ip(one, two): +    from socket import AF_INET +    from socket import AF_INET6 +    from socket import inet_pton +    from vyos.template import is_ipv4 +    # compare the binary representation of the IP +    f_one = AF_INET if is_ipv4(one) else AF_INET6 +    s_two = AF_INET if is_ipv4(two) else AF_INET6 +    return inet_pton(f_one, one) == inet_pton(f_one, two)  def get_protocol_by_name(protocol_name):      """Get protocol number by protocol name @@ -48,6 +56,7 @@ def get_interface_config(interface):      """ Returns the used encapsulation protocol for given interface.          If interface does not exist, None is returned.      """ +    import os      if not os.path.exists(f'/sys/class/net/{interface}'):          return None      from json import loads @@ -59,6 +68,7 @@ def get_interface_address(interface):      """ Returns the used encapsulation protocol for given interface.          If interface does not exist, None is returned.      """ +    import os      if not os.path.exists(f'/sys/class/net/{interface}'):          return None      from json import loads @@ -85,7 +95,6 @@ def get_interface_namespace(iface):              if iface == tmp["ifname"]:                  return netns -  def is_wwan_connected(interface):      """ Determine if a given WWAN interface, e.g. wwan0 is connected to the      carrier network or not """ @@ -110,6 +119,7 @@ def is_wwan_connected(interface):  def get_bridge_fdb(interface):      """ Returns the forwarding database entries for a given interface """ +    import os      if not os.path.exists(f'/sys/class/net/{interface}'):          return None      from json import loads @@ -211,3 +221,175 @@ def is_listen_port_bind_service(port: int, service: str) -> bool:          if service == pid_name and port == pid_port:              return True      return False + +def is_ipv6_link_local(addr): +    """ Check if addrsss is an IPv6 link-local address. Returns True/False """ +    from ipaddress import ip_interface +    from vyos.template import is_ipv6 +    addr = addr.split('%')[0] +    if is_ipv6(addr): +        if ip_interface(addr).is_link_local: +            return True + +    return False + +def is_addr_assigned(ip_address, vrf=None) -> bool: +    """ Verify if the given IPv4/IPv6 address is assigned to any interface """ +    from netifaces import interfaces +    from vyos.utils.network import get_interface_config +    from vyos.utils.dict import dict_search + +    for interface in interfaces(): +        # Check if interface belongs to the requested VRF, if this is not the +        # case there is no need to proceed with this data set - continue loop +        # with next element +        tmp = get_interface_config(interface) +        if dict_search('master', tmp) != vrf: +            continue + +        if is_intf_addr_assigned(interface, ip_address): +            return True + +    return False + +def is_intf_addr_assigned(intf, address) -> bool: +    """ +    Verify if the given IPv4/IPv6 address is assigned to specific interface. +    It can check both a single IP address (e.g. 192.0.2.1 or a assigned CIDR +    address 192.0.2.1/24. +    """ +    from vyos.template import is_ipv4 + +    from netifaces import ifaddresses +    from netifaces import AF_INET +    from netifaces import AF_INET6 + +    # check if the requested address type is configured at all +    # { +    # 17: [{'addr': '08:00:27:d9:5b:04', 'broadcast': 'ff:ff:ff:ff:ff:ff'}], +    # 2:  [{'addr': '10.0.2.15', 'netmask': '255.255.255.0', 'broadcast': '10.0.2.255'}], +    # 10: [{'addr': 'fe80::a00:27ff:fed9:5b04%eth0', 'netmask': 'ffff:ffff:ffff:ffff::'}] +    # } +    try: +        addresses = ifaddresses(intf) +    except ValueError as e: +        print(e) +        return False + +    # determine IP version (AF_INET or AF_INET6) depending on passed address +    addr_type = AF_INET if is_ipv4(address) else AF_INET6 + +    # Check every IP address on this interface for a match +    netmask = None +    if '/' in address: +        address, netmask = address.split('/') +    for ip in addresses.get(addr_type, []): +        # ip can have the interface name in the 'addr' field, we need to remove it +        # {'addr': 'fe80::a00:27ff:fec5:f821%eth2', 'netmask': 'ffff:ffff:ffff:ffff::'} +        ip_addr = ip['addr'].split('%')[0] + +        if not _are_same_ip(address, ip_addr): +            continue + +        # we do not have a netmask to compare against, they are the same +        if not netmask: +            return True + +        prefixlen = '' +        if is_ipv4(ip_addr): +            prefixlen = sum([bin(int(_)).count('1') for _ in ip['netmask'].split('.')]) +        else: +            prefixlen = sum([bin(int(_,16)).count('1') for _ in ip['netmask'].split('/')[0].split(':') if _]) + +        if str(prefixlen) == netmask: +            return True + +    return False + +def is_loopback_addr(addr): +    """ Check if supplied IPv4/IPv6 address is a loopback address """ +    from ipaddress import ip_address +    return ip_address(addr).is_loopback + +def is_wireguard_key_pair(private_key: str, public_key:str) -> bool: +    """ +     Checks if public/private keys are keypair +    :param private_key: Wireguard private key +    :type private_key: str +    :param public_key: Wireguard public key +    :type public_key: str +    :return: If public/private keys are keypair returns True else False +    :rtype: bool +    """ +    from vyos.utils.process import cmd +    gen_public_key = cmd('wg pubkey', input=private_key) +    if gen_public_key == public_key: +        return True +    else: +        return False + +def is_subnet_connected(subnet, primary=False): +    """ +    Verify is the given IPv4/IPv6 subnet is connected to any interface on this +    system. + +    primary check if the subnet is reachable via the primary IP address of this +    interface, or in other words has a broadcast address configured. ISC DHCP +    for instance will complain if it should listen on non broadcast interfaces. + +    Return True/False +    """ +    from ipaddress import ip_address +    from ipaddress import ip_network + +    from netifaces import ifaddresses +    from netifaces import interfaces +    from netifaces import AF_INET +    from netifaces import AF_INET6 + +    from vyos.template import is_ipv6 + +    # determine IP version (AF_INET or AF_INET6) depending on passed address +    addr_type = AF_INET +    if is_ipv6(subnet): +        addr_type = AF_INET6 + +    for interface in interfaces(): +        # check if the requested address type is configured at all +        if addr_type not in ifaddresses(interface).keys(): +            continue + +        # An interface can have multiple addresses, but some software components +        # only support the primary address :( +        if primary: +            ip = ifaddresses(interface)[addr_type][0]['addr'] +            if ip_address(ip) in ip_network(subnet): +                return True +        else: +            # Check every assigned IP address if it is connected to the subnet +            # in question +            for ip in ifaddresses(interface)[addr_type]: +                # remove interface extension (e.g. %eth0) that gets thrown on the end of _some_ addrs +                addr = ip['addr'].split('%')[0] +                if ip_address(addr) in ip_network(subnet): +                    return True + +    return False + +def is_afi_configured(interface, afi): +    """ Check if given address family is configured, or in other words - an IP +    address is assigned to the interface. """ +    from netifaces import ifaddresses +    from netifaces import AF_INET +    from netifaces import AF_INET6 + +    if afi not in [AF_INET, AF_INET6]: +        raise ValueError('Address family must be in [AF_INET, AF_INET6]') + +    try: +        addresses = ifaddresses(interface) +    except ValueError as e: +        print(e) +        return False + +    return afi in addresses diff --git a/python/vyos/validate.py b/python/vyos/validate.py deleted file mode 100644 index b149b258f..000000000 --- a/python/vyos/validate.py +++ /dev/null @@ -1,321 +0,0 @@ -# Copyright 2018-2023 VyOS maintainers and contributors <maintainers@vyos.io> -# -# This library is free software; you can redistribute it and/or -# modify it under the terms of the GNU Lesser General Public -# License as published by the Free Software Foundation; either -# version 2.1 of the License, or (at your option) any later version. -# -# This library is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU -# Lesser General Public License for more details. -# -# You should have received a copy of the GNU Lesser General Public -# License along with this library.  If not, see <http://www.gnu.org/licenses/>. - -# Important note when you are adding new validation functions: -# -# The Control class will analyse the signature of the function in this file -# and will build the parameters to be passed to it. -# -# The parameter names "ifname" and "self" will get the Interface name and class -# parameters with default will be left unset -# all other paramters will receive the value to check - -def is_ipv6_link_local(addr): -    """ Check if addrsss is an IPv6 link-local address. Returns True/False """ -    from ipaddress import ip_interface -    from vyos.template import is_ipv6 -    addr = addr.split('%')[0] -    if is_ipv6(addr): -        if ip_interface(addr).is_link_local: -            return True - -    return False - -def _are_same_ip(one, two): -    from socket import AF_INET -    from socket import AF_INET6 -    from socket import inet_pton -    from vyos.template import is_ipv4 -    # compare the binary representation of the IP -    f_one = AF_INET if is_ipv4(one) else AF_INET6 -    s_two = AF_INET if is_ipv4(two) else AF_INET6 -    return inet_pton(f_one, one) == inet_pton(f_one, two) - -def is_intf_addr_assigned(intf, address) -> bool: -    """ -    Verify if the given IPv4/IPv6 address is assigned to specific interface. -    It can check both a single IP address (e.g. 192.0.2.1 or a assigned CIDR -    address 192.0.2.1/24. -    """ -    from vyos.template import is_ipv4 - -    from netifaces import ifaddresses -    from netifaces import AF_INET -    from netifaces import AF_INET6 - -    # check if the requested address type is configured at all -    # { -    # 17: [{'addr': '08:00:27:d9:5b:04', 'broadcast': 'ff:ff:ff:ff:ff:ff'}], -    # 2:  [{'addr': '10.0.2.15', 'netmask': '255.255.255.0', 'broadcast': '10.0.2.255'}], -    # 10: [{'addr': 'fe80::a00:27ff:fed9:5b04%eth0', 'netmask': 'ffff:ffff:ffff:ffff::'}] -    # } -    try: -        addresses = ifaddresses(intf) -    except ValueError as e: -        print(e) -        return False - -    # determine IP version (AF_INET or AF_INET6) depending on passed address -    addr_type = AF_INET if is_ipv4(address) else AF_INET6 - -    # Check every IP address on this interface for a match -    netmask = None -    if '/' in address: -        address, netmask = address.split('/') -    for ip in addresses.get(addr_type, []): -        # ip can have the interface name in the 'addr' field, we need to remove it -        # {'addr': 'fe80::a00:27ff:fec5:f821%eth2', 'netmask': 'ffff:ffff:ffff:ffff::'} -        ip_addr = ip['addr'].split('%')[0] - -        if not _are_same_ip(address, ip_addr): -            continue - -        # we do not have a netmask to compare against, they are the same -        if not netmask: -            return True - -        prefixlen = '' -        if is_ipv4(ip_addr): -            prefixlen = sum([bin(int(_)).count('1') for _ in ip['netmask'].split('.')]) -        else: -            prefixlen = sum([bin(int(_,16)).count('1') for _ in ip['netmask'].split('/')[0].split(':') if _]) - -        if str(prefixlen) == netmask: -            return True - -    return False - -def is_addr_assigned(ip_address, vrf=None) -> bool: -    """ Verify if the given IPv4/IPv6 address is assigned to any interface """ -    from netifaces import interfaces -    from vyos.utils.network import get_interface_config -    from vyos.utils.dict import dict_search - -    for interface in interfaces(): -        # Check if interface belongs to the requested VRF, if this is not the -        # case there is no need to proceed with this data set - continue loop -        # with next element -        tmp = get_interface_config(interface) -        if dict_search('master', tmp) != vrf: -            continue - -        if is_intf_addr_assigned(interface, ip_address): -            return True - -    return False - -def is_afi_configured(interface, afi): -    """ Check if given address family is configured, or in other words - an IP -    address is assigned to the interface. """ -    from netifaces import ifaddresses -    from netifaces import AF_INET -    from netifaces import AF_INET6 - -    if afi not in [AF_INET, AF_INET6]: -        raise ValueError('Address family must be in [AF_INET, AF_INET6]') - -    try: -        addresses = ifaddresses(interface) -    except ValueError as e: -        print(e) -        return False - -    return afi in addresses - -def is_loopback_addr(addr): -    """ Check if supplied IPv4/IPv6 address is a loopback address """ -    from ipaddress import ip_address -    return ip_address(addr).is_loopback - -def is_subnet_connected(subnet, primary=False): -    """ -    Verify is the given IPv4/IPv6 subnet is connected to any interface on this -    system. - -    primary check if the subnet is reachable via the primary IP address of this -    interface, or in other words has a broadcast address configured. ISC DHCP -    for instance will complain if it should listen on non broadcast interfaces. - -    Return True/False -    """ -    from ipaddress import ip_address -    from ipaddress import ip_network - -    from netifaces import ifaddresses -    from netifaces import interfaces -    from netifaces import AF_INET -    from netifaces import AF_INET6 - -    from vyos.template import is_ipv6 - -    # determine IP version (AF_INET or AF_INET6) depending on passed address -    addr_type = AF_INET -    if is_ipv6(subnet): -        addr_type = AF_INET6 - -    for interface in interfaces(): -        # check if the requested address type is configured at all -        if addr_type not in ifaddresses(interface).keys(): -            continue - -        # An interface can have multiple addresses, but some software components -        # only support the primary address :( -        if primary: -            ip = ifaddresses(interface)[addr_type][0]['addr'] -            if ip_address(ip) in ip_network(subnet): -                return True -        else: -            # Check every assigned IP address if it is connected to the subnet -            # in question -            for ip in ifaddresses(interface)[addr_type]: -                # remove interface extension (e.g. %eth0) that gets thrown on the end of _some_ addrs -                addr = ip['addr'].split('%')[0] -                if ip_address(addr) in ip_network(subnet): -                    return True - -    return False - - -def assert_boolean(b): -    if int(b) not in (0, 1): -        raise ValueError(f'Value {b} out of range') - - -def assert_range(value, lower=0, count=3): -    if int(value, 16) not in range(lower, lower+count): -        raise ValueError("Value out of range") - - -def assert_list(s, l): -    if s not in l: -        o = ' or '.join([f'"{n}"' for n in l]) -        raise ValueError(f'state must be {o}, got {s}') - - -def assert_number(n): -    if not str(n).isnumeric(): -        raise ValueError(f'{n} must be a number') - - -def assert_positive(n, smaller=0): -    assert_number(n) -    if int(n) < smaller: -        raise ValueError(f'{n} is smaller than {smaller}') - - -def assert_mtu(mtu, ifname): -    assert_number(mtu) - -    import json -    from vyos.utils.process import cmd -    out = cmd(f'ip -j -d link show dev {ifname}') -    # [{"ifindex":2,"ifname":"eth0","flags":["BROADCAST","MULTICAST","UP","LOWER_UP"],"mtu":1500,"qdisc":"pfifo_fast","operstate":"UP","linkmode":"DEFAULT","group":"default","txqlen":1000,"link_type":"ether","address":"08:00:27:d9:5b:04","broadcast":"ff:ff:ff:ff:ff:ff","promiscuity":0,"min_mtu":46,"max_mtu":16110,"inet6_addr_gen_mode":"none","num_tx_queues":1,"num_rx_queues":1,"gso_max_size":65536,"gso_max_segs":65535}] -    parsed = json.loads(out)[0] -    min_mtu = int(parsed.get('min_mtu', '0')) -    # cur_mtu = parsed.get('mtu',0), -    max_mtu = int(parsed.get('max_mtu', '0')) -    cur_mtu = int(mtu) - -    if (min_mtu and cur_mtu < min_mtu) or cur_mtu < 68: -        raise ValueError(f'MTU is too small for interface "{ifname}": {mtu} < {min_mtu}') -    if (max_mtu and cur_mtu > max_mtu) or cur_mtu > 65536: -        raise ValueError(f'MTU is too small for interface "{ifname}": {mtu} > {max_mtu}') - - -def assert_mac(m): -    split = m.split(':') -    size = len(split) - -    # a mac address consits out of 6 octets -    if size != 6: -        raise ValueError(f'wrong number of MAC octets ({size}): {m}') - -    octets = [] -    try: -        for octet in split: -            octets.append(int(octet, 16)) -    except ValueError: -        raise ValueError(f'invalid hex number "{octet}" in : {m}') - -    # validate against the first mac address byte if it's a multicast -    # address -    if octets[0] & 1: -        raise ValueError(f'{m} is a multicast MAC address') - -    # overall mac address is not allowed to be 00:00:00:00:00:00 -    if sum(octets) == 0: -        raise ValueError('00:00:00:00:00:00 is not a valid MAC address') - -    if octets[:5] == (0, 0, 94, 0, 1): -        raise ValueError(f'{m} is a VRRP MAC address') - -def has_address_configured(conf, intf): -    """ -    Checks if interface has an address configured. -    Checks the following config nodes: -    'address', 'ipv6 address eui64', 'ipv6 address autoconf' - -    Returns True if interface has address configured, False if it doesn't. -    """ -    from vyos.ifconfig import Section -    ret = False - -    old_level = conf.get_level() -    conf.set_level([]) - -    intfpath = 'interfaces ' + Section.get_config_path(intf) -    if ( conf.exists(f'{intfpath} address') or -            conf.exists(f'{intfpath} ipv6 address autoconf') or -            conf.exists(f'{intfpath} ipv6 address eui64') ): -        ret = True - -    conf.set_level(old_level) -    return ret - -def has_vrf_configured(conf, intf): -    """ -    Checks if interface has a VRF configured. - -    Returns True if interface has VRF configured, False if it doesn't. -    """ -    from vyos.ifconfig import Section -    ret = False - -    old_level = conf.get_level() -    conf.set_level([]) - -    tmp = ['interfaces', Section.get_config_path(intf), 'vrf'] -    if conf.exists(tmp): -        ret = True - -    conf.set_level(old_level) -    return ret - -def is_wireguard_key_pair(private_key: str, public_key:str) -> bool: -    """ -     Checks if public/private keys are keypair -    :param private_key: Wireguard private key -    :type private_key: str -    :param public_key: Wireguard public key -    :type public_key: str -    :return: If public/private keys are keypair returns True else False -    :rtype: bool -    """ -    from vyos.utils.process import cmd -    gen_public_key = cmd('wg pubkey', input=private_key) -    if gen_public_key == public_key: -        return True -    else: -        return False diff --git a/smoketest/scripts/cli/base_interfaces_test.py b/smoketest/scripts/cli/base_interfaces_test.py index ea64601fb..d4652a5ad 100644 --- a/smoketest/scripts/cli/base_interfaces_test.py +++ b/smoketest/scripts/cli/base_interfaces_test.py @@ -34,8 +34,8 @@ from vyos.utils.dict import dict_search  from vyos.utils.process import process_named_running  from vyos.utils.network import get_interface_config  from vyos.utils.process import cmd -from vyos.validate import is_intf_addr_assigned -from vyos.validate import is_ipv6_link_local +from vyos.utils.network import is_intf_addr_assigned +from vyos.utils.network import is_ipv6_link_local  from vyos.xml_ref import cli_defined  dhcp6c_base_dir = directories['dhcp6_client_dir'] diff --git a/smoketest/scripts/cli/test_interfaces_bridge.py b/smoketest/scripts/cli/test_interfaces_bridge.py index 674b0535a..ce46643fb 100755 --- a/smoketest/scripts/cli/test_interfaces_bridge.py +++ b/smoketest/scripts/cli/test_interfaces_bridge.py @@ -27,7 +27,7 @@ from vyos.ifconfig import Section  from vyos.utils.process import cmd  from vyos.utils.file import read_file  from vyos.utils.network import get_interface_config -from vyos.validate import is_intf_addr_assigned +from vyos.utils.network import is_intf_addr_assigned  class BridgeInterfaceTest(BasicInterfaceTest.TestCase):      @classmethod diff --git a/smoketest/scripts/cli/test_interfaces_ethernet.py b/smoketest/scripts/cli/test_interfaces_ethernet.py index eec3ddbe8..5ea21fea8 100755 --- a/smoketest/scripts/cli/test_interfaces_ethernet.py +++ b/smoketest/scripts/cli/test_interfaces_ethernet.py @@ -31,7 +31,7 @@ from vyos.template import is_ipv6  from vyos.utils.process import cmd  from vyos.utils.process import process_named_running  from vyos.utils.file import read_file -from vyos.validate import is_ipv6_link_local +from vyos.utils.network import is_ipv6_link_local  server_ca_root_cert_data = """  MIIBcTCCARagAwIBAgIUDcAf1oIQV+6WRaW7NPcSnECQ/lUwCgYIKoZIzj0EAwIw diff --git a/smoketest/scripts/cli/test_interfaces_loopback.py b/smoketest/scripts/cli/test_interfaces_loopback.py index cde90189b..0454dc658 100755 --- a/smoketest/scripts/cli/test_interfaces_loopback.py +++ b/smoketest/scripts/cli/test_interfaces_loopback.py @@ -19,7 +19,7 @@ import unittest  from base_interfaces_test import BasicInterfaceTest  from netifaces import interfaces -from vyos.validate import is_intf_addr_assigned +from vyos.utils.network import is_intf_addr_assigned  loopbacks = ['127.0.0.1', '::1'] diff --git a/smoketest/scripts/cli/test_system_ipv6.py b/smoketest/scripts/cli/test_system_ipv6.py index b540be9ff..978af3766 100755 --- a/smoketest/scripts/cli/test_system_ipv6.py +++ b/smoketest/scripts/cli/test_system_ipv6.py @@ -22,7 +22,7 @@ from vyos.configsession import ConfigSessionError  from vyos.template import is_ipv4  from vyos.utils.file import read_file  from vyos.utils.network import get_interface_config -from vyos.validate import is_intf_addr_assigned +from vyos.utils.network import is_intf_addr_assigned  base_path = ['system', 'ipv6'] diff --git a/smoketest/scripts/cli/test_vrf.py b/smoketest/scripts/cli/test_vrf.py index 932f7b4f1..b4faac67d 100755 --- a/smoketest/scripts/cli/test_vrf.py +++ b/smoketest/scripts/cli/test_vrf.py @@ -29,7 +29,7 @@ from vyos.template import is_ipv4  from vyos.utils.process import cmd  from vyos.utils.file import read_file  from vyos.utils.network import get_interface_config -from vyos.validate import is_intf_addr_assigned +from vyos.utils.network import is_intf_addr_assigned  base_path = ['vrf']  vrfs = ['red', 'green', 'blue', 'foo-bar', 'baz_foo'] diff --git a/src/conf_mode/bcast_relay.py b/src/conf_mode/bcast_relay.py index ced5d212e..31c552f5a 100755 --- a/src/conf_mode/bcast_relay.py +++ b/src/conf_mode/bcast_relay.py @@ -24,7 +24,7 @@ from vyos.config import Config  from vyos.configverify import verify_interface_exists  from vyos.template import render  from vyos.utils.process import call -from vyos.validate import is_afi_configured +from vyos.utils.network import is_afi_configured  from vyos import ConfigError  from vyos import airbag  airbag.enable() diff --git a/src/conf_mode/conntrack_sync.py b/src/conf_mode/conntrack_sync.py index a83c2274d..6a4d102f7 100755 --- a/src/conf_mode/conntrack_sync.py +++ b/src/conf_mode/conntrack_sync.py @@ -27,7 +27,7 @@ from vyos.utils.process import call  from vyos.utils.process import run  from vyos.template import render  from vyos.template import get_ipv4 -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos.xml import defaults  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/dhcp_server.py b/src/conf_mode/dhcp_server.py index c29270367..3ea708902 100755 --- a/src/conf_mode/dhcp_server.py +++ b/src/conf_mode/dhcp_server.py @@ -28,8 +28,8 @@ from vyos.template import render  from vyos.utils.dict import dict_search  from vyos.utils.process import call  from vyos.utils.process import run -from vyos.validate import is_subnet_connected -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_subnet_connected +from vyos.utils.network import is_addr_assigned  from vyos.xml import defaults  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/dhcpv6_relay.py b/src/conf_mode/dhcpv6_relay.py index 0e7da6f89..d912611b3 100755 --- a/src/conf_mode/dhcpv6_relay.py +++ b/src/conf_mode/dhcpv6_relay.py @@ -25,7 +25,7 @@ from vyos.template import render  from vyos.template import is_ipv6  from vyos.utils.process import call  from vyos.utils.dict import dict_search -from vyos.validate import is_ipv6_link_local +from vyos.utils.network import is_ipv6_link_local  from vyos.xml import defaults  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/dhcpv6_server.py b/src/conf_mode/dhcpv6_server.py index f89ad5b9c..427001609 100755 --- a/src/conf_mode/dhcpv6_server.py +++ b/src/conf_mode/dhcpv6_server.py @@ -25,7 +25,7 @@ from vyos.template import render  from vyos.template import is_ipv6  from vyos.utils.process import call  from vyos.utils.dict import dict_search -from vyos.validate import is_subnet_connected +from vyos.utils.network import is_subnet_connected  from vyos import ConfigError  from vyos import airbag  airbag.enable() diff --git a/src/conf_mode/flow_accounting_conf.py b/src/conf_mode/flow_accounting_conf.py index bfe906c87..372bb0da7 100755 --- a/src/conf_mode/flow_accounting_conf.py +++ b/src/conf_mode/flow_accounting_conf.py @@ -28,7 +28,7 @@ from vyos.ifconfig import Section  from vyos.template import render  from vyos.utils.process import call  from vyos.utils.process import cmd -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos.xml import defaults  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/interfaces-bonding.py b/src/conf_mode/interfaces-bonding.py index c2a569fa9..b3b4e6342 100755 --- a/src/conf_mode/interfaces-bonding.py +++ b/src/conf_mode/interfaces-bonding.py @@ -36,8 +36,8 @@ from vyos.configverify import verify_vrf  from vyos.ifconfig import BondIf  from vyos.ifconfig import Section  from vyos.utils.dict import dict_search -from vyos.validate import has_address_configured -from vyos.validate import has_vrf_configured +from vyos.configdict import has_address_configured +from vyos.configdict import has_vrf_configured  from vyos import ConfigError  from vyos import airbag  airbag.enable() diff --git a/src/conf_mode/interfaces-bridge.py b/src/conf_mode/interfaces-bridge.py index 087ead20a..1bdd61eca 100755 --- a/src/conf_mode/interfaces-bridge.py +++ b/src/conf_mode/interfaces-bridge.py @@ -30,8 +30,8 @@ from vyos.configverify import verify_dhcpv6  from vyos.configverify import verify_mirror_redirect  from vyos.configverify import verify_vrf  from vyos.ifconfig import BridgeIf -from vyos.validate import has_address_configured -from vyos.validate import has_vrf_configured +from vyos.configdict import has_address_configured +from vyos.configdict import has_vrf_configured  from vyos.xml import defaults  from vyos.utils.process import cmd diff --git a/src/conf_mode/interfaces-l2tpv3.py b/src/conf_mode/interfaces-l2tpv3.py index 6efeac302..e1db3206e 100755 --- a/src/conf_mode/interfaces-l2tpv3.py +++ b/src/conf_mode/interfaces-l2tpv3.py @@ -29,7 +29,7 @@ from vyos.configverify import verify_mirror_redirect  from vyos.configverify import verify_bond_bridge_member  from vyos.ifconfig import L2TPv3If  from vyos.utils.kernel import check_kmod -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos import ConfigError  from vyos import airbag  airbag.enable() diff --git a/src/conf_mode/interfaces-openvpn.py b/src/conf_mode/interfaces-openvpn.py index 3bef9b8f6..2a9b43f9b 100755 --- a/src/conf_mode/interfaces-openvpn.py +++ b/src/conf_mode/interfaces-openvpn.py @@ -61,7 +61,7 @@ from vyos.utils.kernel import unload_kmod  from vyos.utils.process import call  from vyos.utils.permission import chown  from vyos.utils.process import cmd -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/interfaces-wireguard.py b/src/conf_mode/interfaces-wireguard.py index 40404d091..446399255 100755 --- a/src/conf_mode/interfaces-wireguard.py +++ b/src/conf_mode/interfaces-wireguard.py @@ -29,7 +29,7 @@ from vyos.configverify import verify_bond_bridge_member  from vyos.ifconfig import WireGuardIf  from vyos.utils.kernel import check_kmod  from vyos.utils.network import check_port_availability -from vyos.validate import is_wireguard_key_pair +from vyos.utils.network import is_wireguard_key_pair  from vyos import ConfigError  from vyos import airbag  airbag.enable() diff --git a/src/conf_mode/lldp.py b/src/conf_mode/lldp.py index 0e5fc29d3..c8f341327 100755 --- a/src/conf_mode/lldp.py +++ b/src/conf_mode/lldp.py @@ -21,8 +21,8 @@ from sys import exit  from vyos.base import Warning  from vyos.config import Config  from vyos.configdict import dict_merge -from vyos.validate import is_addr_assigned -from vyos.validate import is_loopback_addr +from vyos.utils.network import is_addr_assigned +from vyos.utils.network import is_loopback_addr  from vyos.version import get_version_data  from vyos.utils.process import call  from vyos.utils.dict import dict_search diff --git a/src/conf_mode/nat.py b/src/conf_mode/nat.py index e19b12937..b27470b6e 100755 --- a/src/conf_mode/nat.py +++ b/src/conf_mode/nat.py @@ -33,7 +33,7 @@ from vyos.utils.dict import dict_search  from vyos.utils.dict import dict_search_args  from vyos.utils.process import cmd  from vyos.utils.process import run -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos.xml import defaults  from vyos import ConfigError diff --git a/src/conf_mode/protocols_bfd.py b/src/conf_mode/protocols_bfd.py index 0436abaf9..b8d2d65ee 100755 --- a/src/conf_mode/protocols_bfd.py +++ b/src/conf_mode/protocols_bfd.py @@ -21,7 +21,7 @@ from vyos.configdict import dict_merge  from vyos.configverify import verify_vrf  from vyos.template import is_ipv6  from vyos.template import render_to_string -from vyos.validate import is_ipv6_link_local +from vyos.utils.network import is_ipv6_link_local  from vyos.xml import defaults  from vyos import ConfigError  from vyos import frr diff --git a/src/conf_mode/protocols_bgp.py b/src/conf_mode/protocols_bgp.py index 7b9f15505..00015023c 100755 --- a/src/conf_mode/protocols_bgp.py +++ b/src/conf_mode/protocols_bgp.py @@ -29,7 +29,7 @@ from vyos.template import is_interface  from vyos.template import render_to_string  from vyos.utils.dict import dict_search  from vyos.utils.network import get_interface_vrf -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos import ConfigError  from vyos import frr  from vyos import airbag diff --git a/src/conf_mode/service_webproxy.py b/src/conf_mode/service_webproxy.py index bbdb756bd..db4066572 100755 --- a/src/conf_mode/service_webproxy.py +++ b/src/conf_mode/service_webproxy.py @@ -26,7 +26,7 @@ from vyos.utils.process import call  from vyos.utils.permission import chmod_755  from vyos.utils.dict import dict_search  from vyos.utils.file import write_file -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos.xml import defaults  from vyos.base import Warning  from vyos import ConfigError diff --git a/src/conf_mode/snmp.py b/src/conf_mode/snmp.py index 0f0d97ac3..4bf67f079 100755 --- a/src/conf_mode/snmp.py +++ b/src/conf_mode/snmp.py @@ -29,7 +29,7 @@ from vyos.template import render  from vyos.utils.process import call  from vyos.utils.permission import chmod_755  from vyos.utils.dict import dict_search -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos.version import get_version_data  from vyos.xml import defaults  from vyos import ConfigError diff --git a/src/conf_mode/system-option.py b/src/conf_mode/system-option.py index 1495e9223..917013651 100755 --- a/src/conf_mode/system-option.py +++ b/src/conf_mode/system-option.py @@ -26,8 +26,8 @@ from vyos.configverify import verify_source_interface  from vyos.template import render  from vyos.utils.process import cmd  from vyos.utils.process import is_systemd_service_running -from vyos.validate import is_addr_assigned -from vyos.validate import is_intf_addr_assigned +from vyos.utils.network import is_addr_assigned +from vyos.utils.network import is_intf_addr_assigned  from vyos.xml import defaults  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/system_sflow.py b/src/conf_mode/system_sflow.py index 9e3d41100..eae869a6d 100755 --- a/src/conf_mode/system_sflow.py +++ b/src/conf_mode/system_sflow.py @@ -22,7 +22,7 @@ from vyos.config import Config  from vyos.configdict import dict_merge  from vyos.template import render  from vyos.utils.process import call -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos.xml import defaults  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/tftp_server.py b/src/conf_mode/tftp_server.py index 2735772dc..32882fc12 100755 --- a/src/conf_mode/tftp_server.py +++ b/src/conf_mode/tftp_server.py @@ -30,7 +30,7 @@ from vyos.template import render  from vyos.template import is_ipv4  from vyos.utils.process import call  from vyos.utils.permission import chmod_755 -from vyos.validate import is_addr_assigned +from vyos.utils.network import is_addr_assigned  from vyos.xml import defaults  from vyos import ConfigError  from vyos import airbag diff --git a/src/conf_mode/vpn_ipsec.py b/src/conf_mode/vpn_ipsec.py index 51e2869da..9a27a44bf 100755 --- a/src/conf_mode/vpn_ipsec.py +++ b/src/conf_mode/vpn_ipsec.py @@ -40,7 +40,7 @@ from vyos.template import ip_from_cidr  from vyos.template import is_ipv4  from vyos.template import is_ipv6  from vyos.template import render -from vyos.validate import is_ipv6_link_local +from vyos.utils.network import is_ipv6_link_local  from vyos.utils.dict import dict_search  from vyos.utils.dict import dict_search_args  from vyos.utils.process import call diff --git a/src/migration-scripts/interfaces/29-to-30 b/src/migration-scripts/interfaces/29-to-30 index 54def1be9..97e1b329c 100755 --- a/src/migration-scripts/interfaces/29-to-30 +++ b/src/migration-scripts/interfaces/29-to-30 @@ -17,7 +17,7 @@  # Deletes Wireguard peers if they have the same public key as the router has.  import sys  from vyos.configtree import ConfigTree -from vyos.validate import is_wireguard_key_pair +from vyos.utils.network import is_wireguard_key_pair  if __name__ == '__main__':      if len(sys.argv) < 2: diff --git a/src/tests/test_util.py b/src/tests/test_util.py index 27ee648d4..9ae329ced 100644 --- a/src/tests/test_util.py +++ b/src/tests/test_util.py @@ -15,8 +15,7 @@  # along with this program.  If not, see <http://www.gnu.org/licenses/>.  from unittest import TestCase - -class TestVyOSUtil(TestCase): +class TestVyOSUtils(TestCase):      def test_key_mangling(self):          from vyos.utils.dict import mangle_dict_keys          data = {"foo-bar": {"baz-quux": None}} diff --git a/src/tests/test_validate.py b/src/tests/test_validate.py index 68a257d25..5a6dc2586 100644 --- a/src/tests/test_validate.py +++ b/src/tests/test_validate.py @@ -1,6 +1,6 @@  #!/usr/bin/env python3  # -# Copyright (C) 2020 VyOS maintainers and contributors +# Copyright (C) 2020-2023 VyOS maintainers and contributors  #  # This program is free software; you can redistribute it and/or modify  # it under the terms of the GNU General Public License version 2 or later as @@ -14,37 +14,37 @@  # You should have received a copy of the GNU General Public License  # along with this program.  If not, see <http://www.gnu.org/licenses/>. -import vyos.validate +import vyos.utils.network  from unittest import TestCase -class TestVyOSValidate(TestCase): +class TestVyOSUtilsNetwork(TestCase):      def setUp(self):          pass      def test_is_addr_assigned(self): -        self.assertTrue(vyos.validate.is_addr_assigned('127.0.0.1')) -        self.assertTrue(vyos.validate.is_addr_assigned('::1')) -        self.assertFalse(vyos.validate.is_addr_assigned('127.251.255.123')) +        self.assertTrue(vyos.utils.network.is_addr_assigned('127.0.0.1')) +        self.assertTrue(vyos.utils.network.is_addr_assigned('::1')) +        self.assertFalse(vyos.utils.network.is_addr_assigned('127.251.255.123'))      def test_is_ipv6_link_local(self): -        self.assertFalse(vyos.validate.is_ipv6_link_local('169.254.0.1')) -        self.assertTrue(vyos.validate.is_ipv6_link_local('fe80::')) -        self.assertTrue(vyos.validate.is_ipv6_link_local('fe80::affe:1')) -        self.assertTrue(vyos.validate.is_ipv6_link_local('fe80::affe:1%eth0')) -        self.assertFalse(vyos.validate.is_ipv6_link_local('2001:db8::')) -        self.assertFalse(vyos.validate.is_ipv6_link_local('2001:db8::%eth0')) -        self.assertFalse(vyos.validate.is_ipv6_link_local('VyOS')) -        self.assertFalse(vyos.validate.is_ipv6_link_local('::1')) -        self.assertFalse(vyos.validate.is_ipv6_link_local('::1%lo')) +        self.assertFalse(vyos.utils.network.is_ipv6_link_local('169.254.0.1')) +        self.assertTrue(vyos.utils.network.is_ipv6_link_local('fe80::')) +        self.assertTrue(vyos.utils.network.is_ipv6_link_local('fe80::affe:1')) +        self.assertTrue(vyos.utils.network.is_ipv6_link_local('fe80::affe:1%eth0')) +        self.assertFalse(vyos.utils.network.is_ipv6_link_local('2001:db8::')) +        self.assertFalse(vyos.utils.network.is_ipv6_link_local('2001:db8::%eth0')) +        self.assertFalse(vyos.utils.network.is_ipv6_link_local('VyOS')) +        self.assertFalse(vyos.utils.network.is_ipv6_link_local('::1')) +        self.assertFalse(vyos.utils.network.is_ipv6_link_local('::1%lo'))      def test_is_ipv6_link_local(self): -        self.assertTrue(vyos.validate.is_loopback_addr('127.0.0.1')) -        self.assertTrue(vyos.validate.is_loopback_addr('127.0.1.1')) -        self.assertTrue(vyos.validate.is_loopback_addr('127.1.1.1')) -        self.assertTrue(vyos.validate.is_loopback_addr('::1')) +        self.assertTrue(vyos.utils.network.is_loopback_addr('127.0.0.1')) +        self.assertTrue(vyos.utils.network.is_loopback_addr('127.0.1.1')) +        self.assertTrue(vyos.utils.network.is_loopback_addr('127.1.1.1')) +        self.assertTrue(vyos.utils.network.is_loopback_addr('::1')) -        self.assertFalse(vyos.validate.is_loopback_addr('::2')) -        self.assertFalse(vyos.validate.is_loopback_addr('192.0.2.1')) +        self.assertFalse(vyos.utils.network.is_loopback_addr('::2')) +        self.assertFalse(vyos.utils.network.is_loopback_addr('192.0.2.1')) diff --git a/src/validators/ipv6-link-local b/src/validators/ipv6-link-local index 05e693b77..6ac3ea710 100755 --- a/src/validators/ipv6-link-local +++ b/src/validators/ipv6-link-local @@ -1,7 +1,7 @@  #!/usr/bin/python3  import sys -from vyos.validate import is_ipv6_link_local +from vyos.utils.network import is_ipv6_link_local  if __name__ == '__main__':      if len(sys.argv)>1: | 
