From 4c92ab9ff4ddf44f0d6a2bf4c7e724fc35629f0c Mon Sep 17 00:00:00 2001
From: Indrajit Raychaudhuri <irc@indrajit.com>
Date: Thu, 16 Jan 2025 21:37:44 -0600
Subject: dhcp: T5840: Merge systemd service overrides for kea-ctrl-agent

Default systemd service for kea-ctrl-agent expects
`/etc/kea/kea-api-password` which is not used in
VyOS.

The systemd unit override to remove the condition
does not need to be in a separate (templated and
dynamic) override file and can be merged into the
existing static override file.
---
 src/conf_mode/service_dhcp-server.py | 5 +----
 1 file changed, 1 insertion(+), 4 deletions(-)

(limited to 'src/conf_mode')

diff --git a/src/conf_mode/service_dhcp-server.py b/src/conf_mode/service_dhcp-server.py
index 9c59aa63d..47abe80df 100755
--- a/src/conf_mode/service_dhcp-server.py
+++ b/src/conf_mode/service_dhcp-server.py
@@ -1,6 +1,6 @@
 #!/usr/bin/env python3
 #
-# Copyright (C) 2018-2024 VyOS maintainers and contributors
+# Copyright (C) 2018-2025 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
@@ -45,7 +45,6 @@ ctrl_socket = '/run/kea/dhcp4-ctrl-socket'
 config_file = '/run/kea/kea-dhcp4.conf'
 lease_file = '/config/dhcp/dhcp4-leases.csv'
 lease_file_glob = '/config/dhcp/dhcp4-leases*'
-systemd_override = r'/run/systemd/system/kea-ctrl-agent.service.d/10-override.conf'
 user_group = '_kea'
 
 ca_cert_file = '/run/kea/kea-failover-ca.pem'
@@ -395,8 +394,6 @@ def generate(dhcp):
 
             dhcp['high_availability']['ca_cert_file'] = ca_cert_file
 
-        render(systemd_override, 'dhcp-server/10-override.conf.j2', dhcp)
-
     render(ctrl_config_file, 'dhcp-server/kea-ctrl-agent.conf.j2', dhcp, user=user_group, group=user_group)
     render(config_file, 'dhcp-server/kea-dhcp4.conf.j2', dhcp, user=user_group, group=user_group)
 
-- 
cgit v1.2.3


From 1dffe1ab01783fe820f41695f15a6214f3c2e51f Mon Sep 17 00:00:00 2001
From: Indrajit Raychaudhuri <irc@indrajit.com>
Date: Thu, 16 Jan 2025 21:47:38 -0600
Subject: ruff: T6583: Reformat to comply with code style

---
 src/conf_mode/service_dhcp-server.py | 265 ++++++++++++++++++++++++-----------
 1 file changed, 182 insertions(+), 83 deletions(-)

(limited to 'src/conf_mode')

diff --git a/src/conf_mode/service_dhcp-server.py b/src/conf_mode/service_dhcp-server.py
index 47abe80df..5a729af74 100755
--- a/src/conf_mode/service_dhcp-server.py
+++ b/src/conf_mode/service_dhcp-server.py
@@ -38,6 +38,7 @@ from vyos.utils.network import is_subnet_connected
 from vyos.utils.network import is_addr_assigned
 from vyos import ConfigError
 from vyos import airbag
+
 airbag.enable()
 
 ctrl_config_file = '/run/kea/kea-ctrl-agent.conf'
@@ -51,6 +52,7 @@ ca_cert_file = '/run/kea/kea-failover-ca.pem'
 cert_file = '/run/kea/kea-failover.pem'
 cert_key_file = '/run/kea/kea-failover-key.pem'
 
+
 def dhcp_slice_range(exclude_list, range_dict):
     """
     This function is intended to slice a DHCP range. What does it mean?
@@ -73,19 +75,17 @@ def dhcp_slice_range(exclude_list, range_dict):
     range_last_exclude = ''
 
     for e in exclude_list:
-        if (ip_address(e) >= ip_address(range_start)) and \
-           (ip_address(e) <= ip_address(range_stop)):
+        if (ip_address(e) >= ip_address(range_start)) and (
+            ip_address(e) <= ip_address(range_stop)
+        ):
             range_last_exclude = e
 
     for e in exclude_list:
-        if (ip_address(e) >= ip_address(range_start)) and \
-           (ip_address(e) <= ip_address(range_stop)):
-
+        if (ip_address(e) >= ip_address(range_start)) and (
+            ip_address(e) <= ip_address(range_stop)
+        ):
             # Build new address range ending one address before exclude address
-            r = {
-                'start' : range_start,
-                'stop' : str(ip_address(e) -1)
-            }
+            r = {'start': range_start, 'stop': str(ip_address(e) - 1)}
 
             if 'option' in range_dict:
                 r['option'] = range_dict['option']
@@ -103,10 +103,7 @@ def dhcp_slice_range(exclude_list, range_dict):
             # Take care of last IP address range spanning from the last exclude
             # address (+1) to the end of the initial configured range
             if ip_address(e) == ip_address(range_last_exclude):
-                r = {
-                  'start': str(ip_address(e) + 1),
-                  'stop': str(range_stop)
-                }
+                r = {'start': str(ip_address(e) + 1), 'stop': str(range_stop)}
 
                 if 'option' in range_dict:
                     r['option'] = range_dict['option']
@@ -114,14 +111,15 @@ def dhcp_slice_range(exclude_list, range_dict):
                 if not (ip_address(r['start']) > ip_address(r['stop'])):
                     output.append(r)
         else:
-          # if the excluded address was not part of the range, we simply return
-          # the entire ranga again
-          if not range_last_exclude:
-              if range_dict not in output:
-                  output.append(range_dict)
+            # if the excluded address was not part of the range, we simply return
+            # the entire ranga again
+            if not range_last_exclude:
+                if range_dict not in output:
+                    output.append(range_dict)
 
     return output
 
+
 def get_config(config=None):
     if config:
         conf = config
@@ -131,10 +129,13 @@ def get_config(config=None):
     if not conf.exists(base):
         return None
 
-    dhcp = conf.get_config_dict(base, key_mangling=('-', '_'),
-                                no_tag_node_value_mangle=True,
-                                get_first_key=True,
-                                with_recursive_defaults=True)
+    dhcp = conf.get_config_dict(
+        base,
+        key_mangling=('-', '_'),
+        no_tag_node_value_mangle=True,
+        get_first_key=True,
+        with_recursive_defaults=True,
+    )
 
     if 'shared_network_name' in dhcp:
         for network, network_config in dhcp['shared_network_name'].items():
@@ -146,22 +147,31 @@ def get_config(config=None):
                         new_range_id = 0
                         new_range_dict = {}
                         for r, r_config in subnet_config['range'].items():
-                            for slice in dhcp_slice_range(subnet_config['exclude'], r_config):
-                                new_range_dict.update({new_range_id : slice})
-                                new_range_id +=1
+                            for slice in dhcp_slice_range(
+                                subnet_config['exclude'], r_config
+                            ):
+                                new_range_dict.update({new_range_id: slice})
+                                new_range_id += 1
 
                         dhcp['shared_network_name'][network]['subnet'][subnet].update(
-                                {'range' : new_range_dict})
+                            {'range': new_range_dict}
+                        )
 
     if len(dhcp['high_availability']) == 1:
         ## only default value for mode is set, need to remove ha node
         del dhcp['high_availability']
     else:
         if dict_search('high_availability.certificate', dhcp):
-            dhcp['pki'] = conf.get_config_dict(['pki'], key_mangling=('-', '_'), get_first_key=True, no_tag_node_value_mangle=True)
+            dhcp['pki'] = conf.get_config_dict(
+                ['pki'],
+                key_mangling=('-', '_'),
+                get_first_key=True,
+                no_tag_node_value_mangle=True,
+            )
 
     return dhcp
 
+
 def verify(dhcp):
     # bail out early - looks like removal from running config
     if not dhcp or 'disable' in dhcp:
@@ -169,13 +179,15 @@ def verify(dhcp):
 
     # If DHCP is enabled we need one share-network
     if 'shared_network_name' not in dhcp:
-        raise ConfigError('No DHCP shared networks configured.\n' \
-                          'At least one DHCP shared network must be configured.')
+        raise ConfigError(
+            'No DHCP shared networks configured.\n'
+            'At least one DHCP shared network must be configured.'
+        )
 
     # Inspect shared-network/subnet
     listen_ok = False
     subnets = []
-    shared_networks =  len(dhcp['shared_network_name'])
+    shared_networks = len(dhcp['shared_network_name'])
     disabled_shared_networks = 0
 
     subnet_ids = []
@@ -186,12 +198,16 @@ def verify(dhcp):
             disabled_shared_networks += 1
 
         if 'subnet' not in network_config:
-            raise ConfigError(f'No subnets defined for {network}. At least one\n' \
-                              'lease subnet must be configured.')
+            raise ConfigError(
+                f'No subnets defined for {network}. At least one\n'
+                'lease subnet must be configured.'
+            )
 
         for subnet, subnet_config in network_config['subnet'].items():
             if 'subnet_id' not in subnet_config:
-                raise ConfigError(f'Unique subnet ID not specified for subnet "{subnet}"')
+                raise ConfigError(
+                    f'Unique subnet ID not specified for subnet "{subnet}"'
+                )
 
             if subnet_config['subnet_id'] in subnet_ids:
                 raise ConfigError(f'Subnet ID for subnet "{subnet}" is not unique')
@@ -202,32 +218,46 @@ def verify(dhcp):
             if 'static_route' in subnet_config:
                 for route, route_option in subnet_config['static_route'].items():
                     if 'next_hop' not in route_option:
-                        raise ConfigError(f'DHCP static-route "{route}" requires router to be defined!')
+                        raise ConfigError(
+                            f'DHCP static-route "{route}" requires router to be defined!'
+                        )
 
             # Check if DHCP address range is inside configured subnet declaration
             if 'range' in subnet_config:
                 networks = []
                 for range, range_config in subnet_config['range'].items():
                     if not {'start', 'stop'} <= set(range_config):
-                        raise ConfigError(f'DHCP range "{range}" start and stop address must be defined!')
+                        raise ConfigError(
+                            f'DHCP range "{range}" start and stop address must be defined!'
+                        )
 
                     # Start/Stop address must be inside network
                     for key in ['start', 'stop']:
                         if ip_address(range_config[key]) not in ip_network(subnet):
-                            raise ConfigError(f'DHCP range "{range}" {key} address not within shared-network "{network}, {subnet}"!')
+                            raise ConfigError(
+                                f'DHCP range "{range}" {key} address not within shared-network "{network}, {subnet}"!'
+                            )
 
                     # Stop address must be greater or equal to start address
-                    if ip_address(range_config['stop']) < ip_address(range_config['start']):
-                        raise ConfigError(f'DHCP range "{range}" stop address must be greater or equal\n' \
-                                          'to the ranges start address!')
+                    if ip_address(range_config['stop']) < ip_address(
+                        range_config['start']
+                    ):
+                        raise ConfigError(
+                            f'DHCP range "{range}" stop address must be greater or equal\n'
+                            'to the ranges start address!'
+                        )
 
                     for network in networks:
                         start = range_config['start']
                         stop = range_config['stop']
                         if start in network:
-                            raise ConfigError(f'Range "{range}" start address "{start}" already part of another range!')
+                            raise ConfigError(
+                                f'Range "{range}" start address "{start}" already part of another range!'
+                            )
                         if stop in network:
-                            raise ConfigError(f'Range "{range}" stop address "{stop}" already part of another range!')
+                            raise ConfigError(
+                                f'Range "{range}" stop address "{stop}" already part of another range!'
+                            )
 
                     tmp = IPRange(range_config['start'], range_config['stop'])
                     networks.append(tmp)
@@ -236,12 +266,16 @@ def verify(dhcp):
             if 'exclude' in subnet_config:
                 for exclude in subnet_config['exclude']:
                     if ip_address(exclude) not in ip_network(subnet):
-                        raise ConfigError(f'Excluded IP address "{exclude}" not within shared-network "{network}, {subnet}"!')
+                        raise ConfigError(
+                            f'Excluded IP address "{exclude}" not within shared-network "{network}, {subnet}"!'
+                        )
 
             # At least one DHCP address range or static-mapping required
             if 'range' not in subnet_config and 'static_mapping' not in subnet_config:
-                raise ConfigError(f'No DHCP address range or active static-mapping configured\n' \
-                                  f'within shared-network "{network}, {subnet}"!')
+                raise ConfigError(
+                    f'No DHCP address range or active static-mapping configured\n'
+                    f'within shared-network "{network}, {subnet}"!'
+                )
 
             if 'static_mapping' in subnet_config:
                 # Static mappings require just a MAC address (will use an IP from the dynamic pool if IP is not set)
@@ -250,29 +284,42 @@ def verify(dhcp):
                 used_duid = []
                 for mapping, mapping_config in subnet_config['static_mapping'].items():
                     if 'ip_address' in mapping_config:
-                        if ip_address(mapping_config['ip_address']) not in ip_network(subnet):
-                            raise ConfigError(f'Configured static lease address for mapping "{mapping}" is\n' \
-                                              f'not within shared-network "{network}, {subnet}"!')
-
-                        if ('mac' not in mapping_config and 'duid' not in mapping_config) or \
-                            ('mac' in mapping_config and 'duid' in mapping_config):
-                            raise ConfigError(f'Either MAC address or Client identifier (DUID) is required for '
-                                              f'static mapping "{mapping}" within shared-network "{network}, {subnet}"!')
+                        if ip_address(mapping_config['ip_address']) not in ip_network(
+                            subnet
+                        ):
+                            raise ConfigError(
+                                f'Configured static lease address for mapping "{mapping}" is\n'
+                                f'not within shared-network "{network}, {subnet}"!'
+                            )
+
+                        if (
+                            'mac' not in mapping_config and 'duid' not in mapping_config
+                        ) or ('mac' in mapping_config and 'duid' in mapping_config):
+                            raise ConfigError(
+                                f'Either MAC address or Client identifier (DUID) is required for '
+                                f'static mapping "{mapping}" within shared-network "{network}, {subnet}"!'
+                            )
 
                         if 'disable' not in mapping_config:
                             if mapping_config['ip_address'] in used_ips:
-                                raise ConfigError(f'Configured IP address for static mapping "{mapping}" already exists on another static mapping')
+                                raise ConfigError(
+                                    f'Configured IP address for static mapping "{mapping}" already exists on another static mapping'
+                                )
                             used_ips.append(mapping_config['ip_address'])
 
                     if 'disable' not in mapping_config:
                         if 'mac' in mapping_config:
                             if mapping_config['mac'] in used_mac:
-                                raise ConfigError(f'Configured MAC address for static mapping "{mapping}" already exists on another static mapping')
+                                raise ConfigError(
+                                    f'Configured MAC address for static mapping "{mapping}" already exists on another static mapping'
+                                )
                             used_mac.append(mapping_config['mac'])
 
                         if 'duid' in mapping_config:
                             if mapping_config['duid'] in used_duid:
-                                raise ConfigError(f'Configured DUID for static mapping "{mapping}" already exists on another static mapping')
+                                raise ConfigError(
+                                    f'Configured DUID for static mapping "{mapping}" already exists on another static mapping'
+                                )
                             used_duid.append(mapping_config['duid'])
 
             # There must be one subnet connected to a listen interface.
@@ -283,73 +330,102 @@ def verify(dhcp):
 
             # Subnets must be non overlapping
             if subnet in subnets:
-                raise ConfigError(f'Configured subnets must be unique! Subnet "{subnet}"\n'
-                                   'defined multiple times!')
+                raise ConfigError(
+                    f'Configured subnets must be unique! Subnet "{subnet}"\n'
+                    'defined multiple times!'
+                )
             subnets.append(subnet)
 
             # Check for overlapping subnets
             net = ip_network(subnet)
             for n in subnets:
                 net2 = ip_network(n)
-                if (net != net2):
+                if net != net2:
                     if net.overlaps(net2):
-                        raise ConfigError(f'Conflicting subnet ranges: "{net}" overlaps "{net2}"!')
+                        raise ConfigError(
+                            f'Conflicting subnet ranges: "{net}" overlaps "{net2}"!'
+                        )
 
     # Prevent 'disable' for shared-network if only one network is configured
     if (shared_networks - disabled_shared_networks) < 1:
-        raise ConfigError(f'At least one shared network must be active!')
+        raise ConfigError('At least one shared network must be active!')
 
     if 'high_availability' in dhcp:
         for key in ['name', 'remote', 'source_address', 'status']:
             if key not in dhcp['high_availability']:
                 tmp = key.replace('_', '-')
-                raise ConfigError(f'DHCP high-availability requires "{tmp}" to be specified!')
+                raise ConfigError(
+                    f'DHCP high-availability requires "{tmp}" to be specified!'
+                )
 
         if len({'certificate', 'ca_certificate'} & set(dhcp['high_availability'])) == 1:
-            raise ConfigError(f'DHCP secured high-availability requires both certificate and CA certificate')
+            raise ConfigError(
+                'DHCP secured high-availability requires both certificate and CA certificate'
+            )
 
         if 'certificate' in dhcp['high_availability']:
             cert_name = dhcp['high_availability']['certificate']
 
             if cert_name not in dhcp['pki']['certificate']:
-                raise ConfigError(f'Invalid certificate specified for DHCP high-availability')
-
-            if not dict_search_args(dhcp['pki']['certificate'], cert_name, 'certificate'):
-                raise ConfigError(f'Invalid certificate specified for DHCP high-availability')
-
-            if not dict_search_args(dhcp['pki']['certificate'], cert_name, 'private', 'key'):
-                raise ConfigError(f'Missing private key on certificate specified for DHCP high-availability')
+                raise ConfigError(
+                    'Invalid certificate specified for DHCP high-availability'
+                )
+
+            if not dict_search_args(
+                dhcp['pki']['certificate'], cert_name, 'certificate'
+            ):
+                raise ConfigError(
+                    'Invalid certificate specified for DHCP high-availability'
+                )
+
+            if not dict_search_args(
+                dhcp['pki']['certificate'], cert_name, 'private', 'key'
+            ):
+                raise ConfigError(
+                    'Missing private key on certificate specified for DHCP high-availability'
+                )
 
         if 'ca_certificate' in dhcp['high_availability']:
             ca_cert_name = dhcp['high_availability']['ca_certificate']
             if ca_cert_name not in dhcp['pki']['ca']:
-                raise ConfigError(f'Invalid CA certificate specified for DHCP high-availability')
+                raise ConfigError(
+                    'Invalid CA certificate specified for DHCP high-availability'
+                )
 
             if not dict_search_args(dhcp['pki']['ca'], ca_cert_name, 'certificate'):
-                raise ConfigError(f'Invalid CA certificate specified for DHCP high-availability')
+                raise ConfigError(
+                    'Invalid CA certificate specified for DHCP high-availability'
+                )
 
-    for address in (dict_search('listen_address', dhcp) or []):
+    for address in dict_search('listen_address', dhcp) or []:
         if is_addr_assigned(address, include_vrf=True):
             listen_ok = True
             # no need to probe further networks, we have one that is valid
             continue
         else:
-            raise ConfigError(f'listen-address "{address}" not configured on any interface')
+            raise ConfigError(
+                f'listen-address "{address}" not configured on any interface'
+            )
 
     if not listen_ok:
-        raise ConfigError('None of the configured subnets have an appropriate primary IP address on any\n'
-                          'broadcast interface configured, nor was there an explicit listen-address\n'
-                          'configured for serving DHCP relay packets!')
+        raise ConfigError(
+            'None of the configured subnets have an appropriate primary IP address on any\n'
+            'broadcast interface configured, nor was there an explicit listen-address\n'
+            'configured for serving DHCP relay packets!'
+        )
 
     if 'listen_address' in dhcp and 'listen_interface' in dhcp:
-        raise ConfigError(f'Cannot define listen-address and listen-interface at the same time')
+        raise ConfigError(
+            'Cannot define listen-address and listen-interface at the same time'
+        )
 
-    for interface in (dict_search('listen_interface', dhcp) or []):
+    for interface in dict_search('listen_interface', dhcp) or []:
         if not interface_exists(interface):
             raise ConfigError(f'listen-interface "{interface}" does not exist')
 
     return None
 
+
 def generate(dhcp):
     # bail out early - looks like removal from running config
     if not dhcp or 'disable' in dhcp:
@@ -381,8 +457,12 @@ def generate(dhcp):
             cert_name = dhcp['high_availability']['certificate']
             cert_data = dhcp['pki']['certificate'][cert_name]['certificate']
             key_data = dhcp['pki']['certificate'][cert_name]['private']['key']
-            write_file(cert_file, wrap_certificate(cert_data), user=user_group, mode=0o600)
-            write_file(cert_key_file, wrap_private_key(key_data), user=user_group, mode=0o600)
+            write_file(
+                cert_file, wrap_certificate(cert_data), user=user_group, mode=0o600
+            )
+            write_file(
+                cert_key_file, wrap_private_key(key_data), user=user_group, mode=0o600
+            )
 
             dhcp['high_availability']['cert_file'] = cert_file
             dhcp['high_availability']['cert_key_file'] = cert_key_file
@@ -390,15 +470,33 @@ def generate(dhcp):
         if 'ca_certificate' in dhcp['high_availability']:
             ca_cert_name = dhcp['high_availability']['ca_certificate']
             ca_cert_data = dhcp['pki']['ca'][ca_cert_name]['certificate']
-            write_file(ca_cert_file, wrap_certificate(ca_cert_data), user=user_group, mode=0o600)
+            write_file(
+                ca_cert_file,
+                wrap_certificate(ca_cert_data),
+                user=user_group,
+                mode=0o600,
+            )
 
             dhcp['high_availability']['ca_cert_file'] = ca_cert_file
 
-    render(ctrl_config_file, 'dhcp-server/kea-ctrl-agent.conf.j2', dhcp, user=user_group, group=user_group)
-    render(config_file, 'dhcp-server/kea-dhcp4.conf.j2', dhcp, user=user_group, group=user_group)
+    render(
+        ctrl_config_file,
+        'dhcp-server/kea-ctrl-agent.conf.j2',
+        dhcp,
+        user=user_group,
+        group=user_group,
+    )
+    render(
+        config_file,
+        'dhcp-server/kea-dhcp4.conf.j2',
+        dhcp,
+        user=user_group,
+        group=user_group,
+    )
 
     return None
 
+
 def apply(dhcp):
     services = ['kea-ctrl-agent', 'kea-dhcp4-server', 'kea-dhcp-ddns-server']
 
@@ -424,6 +522,7 @@ def apply(dhcp):
 
     return None
 
+
 if __name__ == '__main__':
     try:
         c = get_config()
-- 
cgit v1.2.3