#!/usr/bin/env python3 # # Copyright (C) 2018-2020 VyOS maintainers and contributors # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License version 2 or later as # published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . import os import re from sys import exit from time import sleep from stat import S_IRUSR, S_IWUSR, S_IRGRP from vyos.config import Config from vyos import ConfigError from vyos.util import call from vyos.template import render ipoe_conf = '/run/accel-pppd/ipoe.conf' ipoe_chap_secrets = '/run/accel-pppd/ipoe.chap-secrets' def _get_cpu(): cpu_cnt = 1 if os.cpu_count() == 1: cpu_cnt = 1 else: cpu_cnt = int(os.cpu_count()/2) return cpu_cnt def get_config(): c = Config() if not c.exists(['service', 'ipoe-server']): return None config_data = { 'chap_secrets_file' : ipoe_chap_secrets } c.set_level(['service', 'ipoe-server']) config_data['interfaces'] = {} for intfc in c.list_nodes(['interface']): config_data['interfaces'][intfc] = { 'mode': 'L2', 'shared': '1', # may need a conifg option, can be dhcpv4 or up for unclassified pkts 'sess_start': 'dhcpv4', 'range': None, 'ifcfg': '1', 'vlan_mon': [] } config_data['dns'] = { 'server1': None, 'server2': None } config_data['dnsv6'] = { 'server1': None, 'server2': None, 'server3': None } config_data['ipv6'] = { 'prfx': [], 'pd': [], } config_data['auth'] = { 'auth_if': {}, 'mech': 'noauth', 'radius': {}, 'radsettings': { 'dae-server': {} } } if c.exists(['interface', intfc, 'network-mode']): config_data['interfaces'][intfc]['mode'] = c.return_value( ['interface', intfc, 'network-mode']) if c.return_value(['interface', intfc, 'network']) == 'vlan': config_data['interfaces'][intfc]['shared'] = '0' if c.exists(['interface', intfc, 'vlan-id']): config_data['interfaces'][intfc]['vlan_mon'] += c.return_values( ['interface', intfc, 'vlan-id']) if c.exists(['interface', intfc, 'vlan-range']): config_data['interfaces'][intfc]['vlan_mon'] += c.return_values( ['interface', intfc, 'vlan-range']) if c.exists(['interface', intfc, 'client-subnet']): config_data['interfaces'][intfc]['range'] = c.return_value( ['interface', intfc, 'client-subnet']) if c.exists(['dns-server', 'server-1']): config_data['dns']['server1'] = c.return_value( ['dns-server', 'server-1']) if c.exists(['dns-server', 'server-2']): config_data['dns']['server2'] = c.return_value( ['dns-server', 'server-2']) if c.exists(['dnsv6-server', 'server-1']): config_data['dnsv6']['server1'] = c.return_value( ['dnsv6-server', 'server-1']) if c.exists(['dnsv6-server', 'server-2']): config_data['dnsv6']['server2'] = c.return_value( ['dnsv6-server', 'server-2']) if c.exists(['dnsv6-server', 'server-3']): config_data['dnsv6']['server3'] = c.return_value( ['dnsv6-server', 'server-3']) if not c.exists(['authentication', 'mode', 'noauth']): config_data['auth']['mech'] = c.return_value( ['authentication', 'mode']) if c.exists(['authentication', 'mode', 'local']): for auth_int in c.list_nodes(['authentication', 'interface']): for mac in c.list_nodes(['authentication', 'interface', auth_int, 'mac-address']): config_data['auth']['auth_if'][auth_int] = {} if c.exists(['authentication', 'interface', auth_int, 'mac-address', mac, 'rate-limit']): config_data['auth']['auth_if'][auth_int][mac] = {} config_data['auth']['auth_if'][auth_int][mac]['up'] = c.return_value( ['authentication', 'interface', auth_int, 'mac-address', mac, 'rate-limit upload']) config_data['auth']['auth_if'][auth_int][mac]['down'] = c.return_value( ['authentication', 'interface', auth_int, 'mac-address', 'mac', 'rate-limit download']) else: config_data['auth']['auth_if'][auth_int][mac] = {} config_data['auth']['auth_if'][auth_int][mac]['up'] = None config_data['auth']['auth_if'][auth_int][mac]['down'] = None # client vlan-id if c.exists(['authentication', 'interface', auth_int, 'mac-address', mac, 'vlan-id']): config_data['auth']['auth_if'][auth_int][mac]['vlan'] = c.return_value( ['authentication', 'interface', auth_int, 'mac-address', mac, 'vlan-id']) if c.exists(['authentication', 'mode', 'radius']): for rsrv in c.list_nodes(['authentication', 'radius-server']): config_data['auth']['radius'][rsrv] = {} if c.exists(['authentication', 'radius-server', rsrv, 'secret']): config_data['auth']['radius'][rsrv]['secret'] = c.return_value( ['authentication', 'radius-server', rsrv, 'secret']) else: config_data['auth']['radius'][rsrv]['secret'] = None if c.exists(['authentication', 'radius-server', rsrv, 'fail-time']): config_data['auth']['radius'][rsrv]['fail-time'] = c.return_value( ['authentication', 'radius-server', rsrv, 'fail-time']) else: config_data['auth']['radius'][rsrv]['fail-time'] = '0' if c.exists(['authentication', 'radius-server', rsrv, 'req-limit']): config_data['auth']['radius'][rsrv]['req-limit'] = c.return_value( ['authentication', 'radius-server', rsrv, 'req-limit']) else: config_data['auth']['radius'][rsrv]['req-limit'] = '0' if c.exists(['authentication', 'radius-settings']): if c.exists(['authentication', 'radius-settings', 'timeout']): config_data['auth']['radsettings']['timeout'] = c.return_value( ['authentication', 'radius-settings', 'timeout']) if c.exists(['authentication', 'radius-settings', 'nas-ip-address']): config_data['auth']['radsettings']['nas-ip-address'] = c.return_value( ['authentication', 'radius-settings', 'nas-ip-address']) if c.exists(['authentication', 'radius-settings', 'nas-identifier']): config_data['auth']['radsettings']['nas-identifier'] = c.return_value( ['authentication', 'radius-settings', 'nas-identifier']) if c.exists(['authentication', 'radius-settings', 'max-try']): config_data['auth']['radsettings']['max-try'] = c.return_value( ['authentication', 'radius-settings', 'max-try']) if c.exists(['authentication', 'radius-settings', 'acct-timeout']): config_data['auth']['radsettings']['acct-timeout'] = c.return_value( ['authentication', 'radius-settings', 'acct-timeout']) if c.exists(['authentication', 'radius-settings', 'dae-server', 'ip-address']): config_data['auth']['radsettings']['dae-server']['ip-address'] = c.return_value( ['authentication', 'radius-settings', 'dae-server', 'ip-address']) if c.exists(['authentication', 'radius-settings', 'dae-server', 'port']): config_data['auth']['radsettings']['dae-server']['port'] = c.return_value( ['authentication', 'radius-settings', 'dae-server', 'port']) if c.exists(['authentication', 'radius-settings', 'dae-server', 'secret']): config_data['auth']['radsettings']['dae-server']['secret'] = c.return_value( ['authentication', 'radius-settings', 'dae-server', 'secret']) if c.exists(['client-ipv6-pool', 'prefix']): config_data['ipv6']['prfx'] = c.return_values( ['client-ipv6-pool', 'prefix']) if c.exists(['client-ipv6-pool', 'delegate-prefix']): config_data['ipv6']['pd'] = c.return_values( ['client-ipv6-pool', 'delegate-prefix']) return config_data def generate(ipoe): if not ipoe: return None dirname = os.path.dirname(ipoe_conf) if not os.path.exists(dirname): os.mkdir(dirname) ipoe['thread_cnt'] = _get_cpu() render(ipoe_conf, 'ipoe-server/ipoe.config.tmpl', ipoe, trim_blocks=True) if ipoe['auth']['mech'] == 'local': render(ipoe_chap_secrets, 'ipoe-server/chap-secrets.tmpl', ipoe) os.chmod(ipoe_chap_secrets, S_IRUSR | S_IWUSR | S_IRGRP) else: if os.path.exists(ipoe_chap_secrets): os.unlink(ipoe_chap_secrets) return None def verify(c): if c == None or not c: return None if not c['interfaces']: raise ConfigError("service ipoe-server interface requires a value") for intfc in c['interfaces']: if not c['interfaces'][intfc]['range']: raise ConfigError("service ipoe-server interface " + intfc + " client-subnet needs a value") if c['auth']['mech'] == 'radius': if not c['auth']['radius']: raise ConfigError( "service ipoe-server authentication radius-server requires a value for authentication mode radius") else: for radsrv in c['auth']['radius']: if not c['auth']['radius'][radsrv]['secret']: raise ConfigError( "service ipoe-server authentication radius-server " + radsrv + " secret requires a value") if c['auth']['radsettings']['dae-server']: try: if c['auth']['radsettings']['dae-server']['ip-address']: pass except: raise ConfigError( "service ipoe-server authentication radius-settings dae-server ip-address value required") try: if c['auth']['radsettings']['dae-server']['secret']: pass except: raise ConfigError( "service ipoe-server authentication radius-settings dae-server secret value required") try: if c['auth']['radsettings']['dae-server']['port']: pass except: raise ConfigError( "service ipoe-server authentication radius-settings dae-server port value required") if len(c['ipv6']['pd']) != 0 and len(c['ipv6']['prfx']) == 0: raise ConfigError( "service ipoe-server client-ipv6-pool prefix needs a value") return c def apply(ipoe): if ipoe == None: call('systemctl stop accel-ppp@ipoe.service') if os.path.exists(ipoe_conf): os.unlink(ipoe_conf) if os.path.exists(ipoe_chap_secrets): os.unlink(ipoe_chap_secrets) return None call('systemctl restart accel-ppp@ipoe.service') if __name__ == '__main__': try: c = get_config() verify(c) generate(c) apply(c) except ConfigError as e: print(e) exit(1)