diff options
Diffstat (limited to 'src')
| -rwxr-xr-x | src/activation-scripts/20-ethernet_offload.py | 103 | ||||
| -rwxr-xr-x | src/conf_mode/load-balancing_reverse-proxy.py | 13 | ||||
| -rwxr-xr-x | src/conf_mode/nat64.py | 10 | ||||
| -rwxr-xr-x | src/conf_mode/protocols_bfd.py | 2 | ||||
| -rwxr-xr-x | src/helpers/run-config-activation.py | 83 | ||||
| -rwxr-xr-x | src/init/vyos-router | 23 | 
6 files changed, 227 insertions, 7 deletions
| diff --git a/src/activation-scripts/20-ethernet_offload.py b/src/activation-scripts/20-ethernet_offload.py new file mode 100755 index 000000000..33b0ea469 --- /dev/null +++ b/src/activation-scripts/20-ethernet_offload.py @@ -0,0 +1,103 @@ +# Copyright 2021-2024 VyOS maintainers and contributors <maintainers@vyos.io> +# +# This library is free software; you can redistribute it and/or +# modify it under the terms of the GNU Lesser General Public +# License as published by the Free Software Foundation; either +# version 2.1 of the License, or (at your option) any later version. +# +# This library is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU +# Lesser General Public License for more details. +# +# You should have received a copy of the GNU Lesser General Public License +# along with this library.  If not, see <http://www.gnu.org/licenses/>. + +# T3619: mirror Linux Kernel defaults for ethernet offloading options into VyOS +#        CLI. See https://vyos.dev/T3619#102254 for all the details. +# T3787: Remove deprecated UDP fragmentation offloading option +# T6006: add to activation-scripts: migration-scripts/interfaces/20-to-21 + +from vyos.ethtool import Ethtool +from vyos.configtree import ConfigTree + +def activate(config: ConfigTree): +    base = ['interfaces', 'ethernet'] + +    if not config.exists(base): +        return + +    for ifname in config.list_nodes(base): +        eth = Ethtool(ifname) + +        # If GRO is enabled by the Kernel - we reflect this on the CLI. If GRO is +        # enabled via CLI but not supported by the NIC - we remove it from the CLI +        configured = config.exists(base + [ifname, 'offload', 'gro']) +        enabled, fixed = eth.get_generic_receive_offload() +        if configured and fixed: +            config.delete(base + [ifname, 'offload', 'gro']) +        elif enabled and not fixed: +            config.set(base + [ifname, 'offload', 'gro']) + +        # If GSO is enabled by the Kernel - we reflect this on the CLI. If GSO is +        # enabled via CLI but not supported by the NIC - we remove it from the CLI +        configured = config.exists(base + [ifname, 'offload', 'gso']) +        enabled, fixed = eth.get_generic_segmentation_offload() +        if configured and fixed: +            config.delete(base + [ifname, 'offload', 'gso']) +        elif enabled and not fixed: +            config.set(base + [ifname, 'offload', 'gso']) + +        # If LRO is enabled by the Kernel - we reflect this on the CLI. If LRO is +        # enabled via CLI but not supported by the NIC - we remove it from the CLI +        configured = config.exists(base + [ifname, 'offload', 'lro']) +        enabled, fixed = eth.get_large_receive_offload() +        if configured and fixed: +            config.delete(base + [ifname, 'offload', 'lro']) +        elif enabled and not fixed: +            config.set(base + [ifname, 'offload', 'lro']) + +        # If SG is enabled by the Kernel - we reflect this on the CLI. If SG is +        # enabled via CLI but not supported by the NIC - we remove it from the CLI +        configured = config.exists(base + [ifname, 'offload', 'sg']) +        enabled, fixed = eth.get_scatter_gather() +        if configured and fixed: +            config.delete(base + [ifname, 'offload', 'sg']) +        elif enabled and not fixed: +            config.set(base + [ifname, 'offload', 'sg']) + +        # If TSO is enabled by the Kernel - we reflect this on the CLI. If TSO is +        # enabled via CLI but not supported by the NIC - we remove it from the CLI +        configured = config.exists(base + [ifname, 'offload', 'tso']) +        enabled, fixed = eth.get_tcp_segmentation_offload() +        if configured and fixed: +            config.delete(base + [ifname, 'offload', 'tso']) +        elif enabled and not fixed: +            config.set(base + [ifname, 'offload', 'tso']) + +        # Remove deprecated UDP fragmentation offloading option +        if config.exists(base + [ifname, 'offload', 'ufo']): +            config.delete(base + [ifname, 'offload', 'ufo']) + +        # Also while processing the interface configuration, not all adapters support +        # changing the speed and duplex settings. If the desired speed and duplex +        # values do not work for the NIC driver, we change them back to the default +        # value of "auto" - which will be applied if the CLI node is deleted. +        speed_path = base + [ifname, 'speed'] +        duplex_path = base + [ifname, 'duplex'] +        # speed and duplex must always be set at the same time if not set to "auto" +        if config.exists(speed_path) and config.exists(duplex_path): +            speed = config.return_value(speed_path) +            duplex = config.return_value(duplex_path) +            if speed != 'auto' and duplex != 'auto': +                if not eth.check_speed_duplex(speed, duplex): +                    config.delete(speed_path) +                    config.delete(duplex_path) + +        # Also while processing the interface configuration, not all adapters support +        # changing disabling flow-control - or change this setting. If disabling +        # flow-control is not supported by the NIC, we remove the setting from CLI +        flow_control_path = base + [ifname, 'disable-flow-control'] +        if config.exists(flow_control_path): +            if not eth.check_flow_control(): +                config.delete(flow_control_path) diff --git a/src/conf_mode/load-balancing_reverse-proxy.py b/src/conf_mode/load-balancing_reverse-proxy.py index 1c1252df0..09c68dadd 100755 --- a/src/conf_mode/load-balancing_reverse-proxy.py +++ b/src/conf_mode/load-balancing_reverse-proxy.py @@ -79,12 +79,21 @@ def verify(lb):              raise ConfigError(f'"TCP" port "{tmp_port}" is used by another service')      for back, back_config in lb['backend'].items(): -        if 'http-check' in back_config: -            http_check = back_config['http-check'] +        if 'http_check' in back_config: +            http_check = back_config['http_check']              if 'expect' in http_check and 'status' in http_check['expect'] and 'string' in http_check['expect']:                  raise ConfigError(f'"expect status" and "expect string" can not be configured together!') + +        if 'health_check' in back_config: +            if 'mode' not in back_config or back_config['mode'] != 'tcp': +                raise ConfigError(f'backend "{back}" can only be configured with {back_config["health_check"]} ' + +                                  f'health-check whilst in TCP mode!') +            if 'http_check' in back_config: +                raise ConfigError(f'backend "{back}" cannot be configured with both http-check and health-check!') +          if 'server' not in back_config:              raise ConfigError(f'"{back} server" must be configured!') +          for bk_server, bk_server_conf in back_config['server'].items():              if 'address' not in bk_server_conf or 'port' not in bk_server_conf:                  raise ConfigError(f'"backend {back} server {bk_server} address and port" must be configured!') diff --git a/src/conf_mode/nat64.py b/src/conf_mode/nat64.py index c1e7ebf85..32a1c47d1 100755 --- a/src/conf_mode/nat64.py +++ b/src/conf_mode/nat64.py @@ -20,7 +20,7 @@ import csv  import os  import re -from ipaddress import IPv6Network +from ipaddress import IPv6Network, IPv6Address  from json import dumps as json_write  from vyos import ConfigError @@ -103,8 +103,14 @@ def verify(nat64) -> None:              # Verify that source.prefix is set and is a /96              if not dict_search("source.prefix", instance):                  raise ConfigError(f"Source NAT64 rule {rule} missing source prefix") -            if IPv6Network(instance["source"]["prefix"]).prefixlen != 96: +            src_prefix = IPv6Network(instance["source"]["prefix"]) +            if src_prefix.prefixlen != 96:                  raise ConfigError(f"Source NAT64 rule {rule} source prefix must be /96") +            if (int(src_prefix[0]) & int(IPv6Address('0:0:0:0:ff00::'))) != 0: +                raise ConfigError( +                    f'Source NAT64 rule {rule} source prefix is not RFC6052-compliant: ' +                    'bits 64 to 71 (9th octet) must be zeroed' +                )              pools = dict_search("translation.pool", instance)              if pools: diff --git a/src/conf_mode/protocols_bfd.py b/src/conf_mode/protocols_bfd.py index 1c01a9013..1361bb1a9 100755 --- a/src/conf_mode/protocols_bfd.py +++ b/src/conf_mode/protocols_bfd.py @@ -49,7 +49,7 @@ def verify(bfd):          for peer, peer_config in bfd['peer'].items():              # IPv6 link local peers require an explicit local address/interface              if is_ipv6_link_local(peer): -                if 'source' not in peer_config or len(peer_config['source'] < 2): +                if 'source' not in peer_config or len(peer_config['source']) < 2:                      raise ConfigError('BFD IPv6 link-local peers require explicit local address and interface setting')              # IPv6 peers require an explicit local address diff --git a/src/helpers/run-config-activation.py b/src/helpers/run-config-activation.py new file mode 100755 index 000000000..58293702a --- /dev/null +++ b/src/helpers/run-config-activation.py @@ -0,0 +1,83 @@ +#!/usr/bin/env python3 +# +# Copyright (C) 2024 VyOS maintainers and contributors +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License version 2 or later as +# published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program.  If not, see <http://www.gnu.org/licenses/>. + +import re +import logging +from pathlib import Path +from argparse import ArgumentParser + +from vyos.compose_config import ComposeConfig +from vyos.compose_config import ComposeConfigError +from vyos.defaults import directories + +parser = ArgumentParser() +parser.add_argument('config_file', type=str, +                    help="configuration file to modify with system-specific settings") +parser.add_argument('--test-script', type=str, +                    help="test effect of named script") + +args = parser.parse_args() + +checkpoint_file = '/run/vyos-activate-checkpoint' +log_file = Path(directories['config']).joinpath('vyos-activate.log') + +logger = logging.getLogger(__name__) +fh = logging.FileHandler(log_file) +formatter = logging.Formatter('%(message)s') +fh.setFormatter(formatter) +logger.addHandler(fh) + +if 'vyos-activate-debug' in Path('/proc/cmdline').read_text(): +    print(f'\nactivate-debug enabled: file {checkpoint_file}_* on error') +    debug = checkpoint_file +    logger.setLevel(logging.DEBUG) +else: +    debug = None +    logger.setLevel(logging.INFO) + +def sort_key(s: Path): +    s = s.stem +    pre, rem = re.match(r'(\d*)(?:-)?(.+)', s).groups() +    return int(pre or 0), rem + +def file_ext(file_name: str) -> str: +    """Return an identifier from file name for checkpoint file extension. +    """ +    return Path(file_name).stem + +script_dir = Path(directories['activate']) + +if args.test_script: +    script_list = [script_dir.joinpath(args.test_script)] +else: +    script_list = sorted(script_dir.glob('*.py'), key=sort_key) + +config_file = args.config_file +config_str = Path(config_file).read_text() + +compose = ComposeConfig(config_str, checkpoint_file=debug) + +for file in script_list: +    file = file.as_posix() +    logger.info(f'calling {file}') +    try: +        compose.apply_file(file, func_name='activate') +    except ComposeConfigError as e: +        if debug: +            compose.write(f'{compose.checkpoint_file}_{file_ext(file)}') +        logger.error(f'config-activation error in {file}: {e}') + +compose.write(config_file, with_version=True) diff --git a/src/init/vyos-router b/src/init/vyos-router index 15e37df07..59004fdc1 100755 --- a/src/init/vyos-router +++ b/src/init/vyos-router @@ -22,6 +22,7 @@ declare progname=${0##*/}  declare action=$1; shift  declare -x BOOTFILE=$vyatta_sysconfdir/config/config.boot +declare -x DEFAULT_BOOTFILE=$vyatta_sysconfdir/config.boot.default  # If vyos-config= boot option is present, use that file instead  for x in $(cat /proc/cmdline); do @@ -129,9 +130,16 @@ unmount_encrypted_config() {  # if necessary, provide initial config  init_bootfile () { +    # define and version default boot config if not present +    if [ ! -r $DEFAULT_BOOTFILE ]; then +        if [ -f $vyos_data_dir/config.boot.default ]; then +            cp $vyos_data_dir/config.boot.default $DEFAULT_BOOTFILE +            $vyos_libexec_dir/system-versions-foot.py >> $DEFAULT_BOOTFILE +        fi +    fi      if [ ! -r $BOOTFILE ] ; then -        if [ -f $vyatta_sysconfdir/config.boot.default ]; then -            cp $vyatta_sysconfdir/config.boot.default $BOOTFILE +        if [ -f $DEFAULT_BOOTFILE ]; then +            cp $DEFAULT_BOOTFILE $BOOTFILE          else              $vyos_libexec_dir/system-versions-foot.py > $BOOTFILE          fi @@ -149,6 +157,15 @@ migrate_bootfile ()      fi  } +# configure system-specific settings +system_config () +{ +    if [ -x $vyos_libexec_dir/run-config-activation.py ]; then +        log_progress_msg system +        sg ${GROUP} -c "$vyos_libexec_dir/run-config-activation.py $BOOTFILE" +    fi +} +  # load the initial config  load_bootfile ()  { @@ -493,6 +510,8 @@ start ()      update_interface_config +    disabled system_config || system_config +      for s in ${subinit[@]} ; do      if ! disabled $s; then          log_progress_msg $s | 
