summaryrefslogtreecommitdiff
path: root/src/conf_mode/system-ipv6.py
blob: cfbbf80eec69704c8091e580a34d9e635e38ae25 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
#!/usr/bin/env python3
#
# Copyright (C) 2019 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import os
import sys

from sys import exit
from copy import deepcopy
from vyos.config import Config
from vyos import ConfigError

ipv6_blacklist_file = '/etc/modprobe.d/vyos_blacklist_ipv6.conf'
ipv6_disable_file = '/etc/modprobe.d/vyos_disable_ipv6.conf'

default_config_data = {
    'blacklist': False,
    'reboot_message': False,
    'ipv6_forward': '1',
    'disable_addr_assignment': False,
    'mp_layer4_hashing': '0',
    'neighbor_cache': 8192,
    'strict_dad': '1'

}

def sysctl(name, value):
    os.system('sysctl -wq {}={}'.format(name, value))

def get_config():
    ip_opt = deepcopy(default_config_data)
    conf = Config()
    conf.set_level('system ipv6')
    if conf.exists(''):
        ip_opt['blacklist'] = conf.exists('blacklist')
        if conf.exists_effective('blacklist') != conf.exists('blacklist'):
            ip_opt['reboot_message'] = True

        ip_opt['disable_addr_assignment'] = conf.exists('disable')
        if conf.exists_effective('disable') != conf.exists('disable'):
            ip_opt['reboot_message'] = True

        if conf.exists('disable-forwarding'):
            ip_opt['ipv6_forward'] = '0'

        if conf.exists('multipath layer4-hashing'):
            ip_opt['mp_layer4_hashing'] = '1'

        if conf.exists('neighbor table-size'):
            ip_opt['neighbor_cache'] = int(conf.return_value('neighbor table-size'))

        if conf.exists('strict-dad'):
            ip_opt['strict_dad'] = 2

    return ip_opt

def verify(ip_opt):
    pass

def generate(ip_opt):
    pass

def apply(ip_opt):
    # disable IPv6 kernel module
    if ip_opt['blacklist']:
        with open(ipv6_blacklist_file, 'w') as f:
            f.write('blacklist ipv6')
    else:
        if os.path.exists(ipv6_blacklist_file):
            os.unlink(ipv6_blacklist_file)

    # disable IPv6 address assignment
    if ip_opt['disable_addr_assignment']:
        with open(ipv6_disable_file, 'w') as f:
            f.write('options ipv6 disable_ipv6=1')
    else:
        if os.path.exists(ipv6_disable_file):
            os.unlink(ipv6_disable_file)

    if ip_opt['reboot_message']:
        print('Changing IPv6 blacklist/disable parameter will only take affect\n' \
              'when the system is rebooted.')

    # configure multipath
    sysctl('net.ipv6.fib_multipath_hash_policy', ip_opt['mp_layer4_hashing'])

    # apply neighbor table threshold values
    sysctl('net.ipv6.neigh.default.gc_thresh3', ip_opt['neighbor_cache'])
    sysctl('net.ipv6.neigh.default.gc_thresh2', ip_opt['neighbor_cache'] // 2)
    sysctl('net.ipv6.neigh.default.gc_thresh1', ip_opt['neighbor_cache'] // 8)

    # enable/disable IPv6 forwarding
    with open('/proc/sys/net/ipv6/conf/all/forwarding', 'w') as f:
        f.write(ip_opt['ipv6_forward'])

    # configure IPv6 strict-dad
    for root, dirs, files in os.walk('/proc/sys/net/ipv6/conf'):
        for name in files:
            if name == "accept_dad":
                with open(os.path.join(root, name), 'w') as f:
                    f.write(str(ip_opt['strict_dad']))

if __name__ == '__main__':
    try:
        c = get_config()
        verify(c)
        generate(c)
        apply(c)
    except ConfigError as e:
        print(e)
        exit(1)