#!/usr/bin/env python3 # # Copyright (C) 2018-2020 VyOS maintainers and contributors # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License version 2 or later as # published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . import os import re from socket import socket, AF_INET, SOCK_STREAM from sys import exit from time import sleep from vyos.config import Config from vyos import ConfigError from vyos.util import run from vyos.template import render ipoe_cnf_dir = r'/etc/accel-ppp/ipoe' ipoe_cnf = ipoe_cnf_dir + r'/ipoe.config' pidfile = r'/var/run/accel_ipoe.pid' cmd_port = r'2002' chap_secrets = ipoe_cnf_dir + '/chap-secrets' ## accel-pppd -d -c /etc/accel-ppp/pppoe/pppoe.config -p /var/run/accel_pppoe.pid if not os.path.exists(ipoe_cnf_dir): os.makedirs(ipoe_cnf_dir) def _get_cpu(): cpu_cnt = 1 if os.cpu_count() == 1: cpu_cnt = 1 else: cpu_cnt = int(os.cpu_count()/2) return cpu_cnt def _chk_con(): cnt = 0 s = socket(AF_INET, SOCK_STREAM) while True: try: s.connect(("127.0.0.1", int(cmd_port))) break except ConnectionRefusedError: sleep(0.5) cnt += 1 if cnt == 100: raise("failed to start pppoe server") break def _accel_cmd(command): return run('/usr/bin/accel-cmd -p {cmd_port} {command}') ##### Inline functions end #### def get_config(): c = Config() if not c.exists(['service', 'ipoe-server']): return None config_data = {} c.set_level(['service', 'ipoe-server']) config_data['interfaces'] = {} for intfc in c.list_nodes(['interface']): config_data['interfaces'][intfc] = { 'mode': 'L2', 'shared': '1', # may need a conifg option, can be dhcpv4 or up for unclassified pkts 'sess_start': 'dhcpv4', 'range': None, 'ifcfg': '1', 'vlan_mon': [] } config_data['dns'] = { 'server1': None, 'server2': None } config_data['dnsv6'] = { 'server1': None, 'server2': None, 'server3': None } config_data['ipv6'] = { 'prfx': [], 'pd': [], } config_data['auth'] = { 'auth_if': {}, 'mech': 'noauth', 'radius': {}, 'radsettings': { 'dae-server': {} } } if c.exists(['interface', intfc, 'network-mode']): config_data['interfaces'][intfc]['mode'] = c.return_value( ['interface', intfc, 'network-mode']) if c.return_value(['interface', intfc, 'network']) == 'vlan': config_data['interfaces'][intfc]['shared'] = '0' if c.exists(['interface', intfc, 'vlan-id']): config_data['interfaces'][intfc]['vlan_mon'] += c.return_values( ['interface', intfc, 'vlan-id']) if c.exists(['interface', intfc, 'vlan-range']): config_data['interfaces'][intfc]['vlan_mon'] += c.return_values( ['interface', intfc, 'vlan-range']) if c.exists(['interface', intfc, 'client-subnet']): config_data['interfaces'][intfc]['range'] = c.return_value( ['interface', intfc, 'client-subnet']) if c.exists(['dns-server', 'server-1']): config_data['dns']['server1'] = c.return_value( ['dns-server', 'server-1']) if c.exists(['dns-server', 'server-2']): config_data['dns']['server2'] = c.return_value( ['dns-server', 'server-2']) if c.exists(['dnsv6-server', 'server-1']): config_data['dnsv6']['server1'] = c.return_value( ['dnsv6-server', 'server-1']) if c.exists(['dnsv6-server', 'server-2']): config_data['dnsv6']['server2'] = c.return_value( ['dnsv6-server', 'server-2']) if c.exists(['dnsv6-server', 'server-3']): config_data['dnsv6']['server3'] = c.return_value( ['dnsv6-server', 'server-3']) if not c.exists(['authentication', 'mode', 'noauth']): config_data['auth']['mech'] = c.return_value( ['authentication', 'mode']) if c.exists(['authentication', 'mode', 'local']): for auth_int in c.list_nodes(['authentication', 'interface']): for mac in c.list_nodes(['authentication', 'interface', auth_int, 'mac-address']): config_data['auth']['auth_if'][auth_int] = {} if c.exists(['authentication', 'interface', auth_int, 'mac-address', mac, 'rate-limit']): config_data['auth']['auth_if'][auth_int][mac] = {} config_data['auth']['auth_if'][auth_int][mac]['up'] = c.return_value( ['authentication', 'interface', auth_int, 'mac-address', mac, 'rate-limit upload']) config_data['auth']['auth_if'][auth_int][mac]['down'] = c.return_value( ['authentication', 'interface', auth_int, 'mac-address', 'mac', 'rate-limit download']) else: config_data['auth']['auth_if'][auth_int][mac] = {} config_data['auth']['auth_if'][auth_int][mac]['up'] = None config_data['auth']['auth_if'][auth_int][mac]['down'] = None # client vlan-id if c.exists(['authentication', 'interface', auth_int, 'mac-address', mac, 'vlan-id']): config_data['auth']['auth_if'][auth_int][mac]['vlan'] = c.return_value( ['authentication', 'interface', auth_int, 'mac-address', mac, 'vlan-id']) if c.exists(['authentication', 'mode', 'radius']): for rsrv in c.list_nodes(['authentication', 'radius-server']): config_data['auth']['radius'][rsrv] = {} if c.exists(['authentication', 'radius-server', rsrv, 'secret']): config_data['auth']['radius'][rsrv]['secret'] = c.return_value( ['authentication', 'radius-server', rsrv, 'secret']) else: config_data['auth']['radius'][rsrv]['secret'] = None if c.exists(['authentication', 'radius-server', rsrv, 'fail-time']): config_data['auth']['radius'][rsrv]['fail-time'] = c.return_value( ['authentication', 'radius-server', rsrv, 'fail-time']) else: config_data['auth']['radius'][rsrv]['fail-time'] = '0' if c.exists(['authentication', 'radius-server', rsrv, 'req-limit']): config_data['auth']['radius'][rsrv]['req-limit'] = c.return_value( ['authentication', 'radius-server', rsrv, 'req-limit']) else: config_data['auth']['radius'][rsrv]['req-limit'] = '0' if c.exists(['authentication', 'radius-settings']): if c.exists(['authentication', 'radius-settings', 'timeout']): config_data['auth']['radsettings']['timeout'] = c.return_value( ['authentication', 'radius-settings', 'timeout']) if c.exists(['authentication', 'radius-settings', 'nas-ip-address']): config_data['auth']['radsettings']['nas-ip-address'] = c.return_value( ['authentication', 'radius-settings', 'nas-ip-address']) if c.exists(['authentication', 'radius-settings', 'nas-identifier']): config_data['auth']['radsettings']['nas-identifier'] = c.return_value( ['authentication', 'radius-settings', 'nas-identifier']) if c.exists(['authentication', 'radius-settings', 'max-try']): config_data['auth']['radsettings']['max-try'] = c.return_value( ['authentication', 'radius-settings', 'max-try']) if c.exists(['authentication', 'radius-settings', 'acct-timeout']): config_data['auth']['radsettings']['acct-timeout'] = c.return_value( ['authentication', 'radius-settings', 'acct-timeout']) if c.exists(['authentication', 'radius-settings', 'dae-server', 'ip-address']): config_data['auth']['radsettings']['dae-server']['ip-address'] = c.return_value( ['authentication', 'radius-settings', 'dae-server', 'ip-address']) if c.exists(['authentication', 'radius-settings', 'dae-server', 'port']): config_data['auth']['radsettings']['dae-server']['port'] = c.return_value( ['authentication', 'radius-settings', 'dae-server', 'port']) if c.exists(['authentication', 'radius-settings', 'dae-server', 'secret']): config_data['auth']['radsettings']['dae-server']['secret'] = c.return_value( ['authentication', 'radius-settings', 'dae-server', 'secret']) if c.exists(['client-ipv6-pool', 'prefix']): config_data['ipv6']['prfx'] = c.return_values( ['client-ipv6-pool', 'prefix']) if c.exists(['client-ipv6-pool', 'delegate-prefix']): config_data['ipv6']['pd'] = c.return_values( ['client-ipv6-pool', 'delegate-prefix']) return config_data def generate(c): if c == None or not c: return None c['thread_cnt'] = _get_cpu() if c['auth']['mech'] == 'local': old_umask = os.umask(0o077) render(chap_secrets, 'ipoe-server/chap-secrets.tmpl', c, trim_blocks=True) os.umask(old_umask) render(ipoe_cnf, 'ipoe-server/ipoe.config.tmpl', c, trim_blocks=True) # return c ?? return c def verify(c): if c == None or not c: return None if not c['interfaces']: raise ConfigError("service ipoe-server interface requires a value") for intfc in c['interfaces']: if not c['interfaces'][intfc]['range']: raise ConfigError("service ipoe-server interface " + intfc + " client-subnet needs a value") if c['auth']['mech'] == 'radius': if not c['auth']['radius']: raise ConfigError( "service ipoe-server authentication radius-server requires a value for authentication mode radius") else: for radsrv in c['auth']['radius']: if not c['auth']['radius'][radsrv]['secret']: raise ConfigError( "service ipoe-server authentication radius-server " + radsrv + " secret requires a value") if c['auth']['radsettings']['dae-server']: try: if c['auth']['radsettings']['dae-server']['ip-address']: pass except: raise ConfigError( "service ipoe-server authentication radius-settings dae-server ip-address value required") try: if c['auth']['radsettings']['dae-server']['secret']: pass except: raise ConfigError( "service ipoe-server authentication radius-settings dae-server secret value required") try: if c['auth']['radsettings']['dae-server']['port']: pass except: raise ConfigError( "service ipoe-server authentication radius-settings dae-server port value required") if len(c['ipv6']['pd']) != 0 and len(c['ipv6']['prfx']) == 0: raise ConfigError( "service ipoe-server client-ipv6-pool prefix needs a value") return c def apply(c): if c == None: if os.path.exists(pidfile): _accel_cmd('shutdown hard') if os.path.exists(pidfile): os.remove(pidfile) return None if not os.path.exists(pidfile): ret = run(f'/usr/sbin/accel-pppd -c {ipoe_cnf} -p {pidfile} -d') _chk_con() if ret != 0 and os.path.exists(pidfile): os.remove(pidfile) raise ConfigError('accel-pppd failed to start') else: _accel_cmd('restart') if __name__ == '__main__': try: c = get_config() verify(c) generate(c) apply(c) except ConfigError as e: print(e) exit(1)