/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include "condition.h" #include "conf-parser.h" #include "escape.h" #include "networkd-link.h" #include "networkd-util.h" #include "parse-util.h" #include "string-table.h" #include "string-util.h" #include "web-util.h" /* This is used in log messages, and never used in parsing settings. So, upper cases are OK. */ static const char * const network_config_source_table[_NETWORK_CONFIG_SOURCE_MAX] = { [NETWORK_CONFIG_SOURCE_FOREIGN] = "foreign", [NETWORK_CONFIG_SOURCE_STATIC] = "static", [NETWORK_CONFIG_SOURCE_IPV4LL] = "IPv4LL", [NETWORK_CONFIG_SOURCE_DHCP4] = "DHCPv4", [NETWORK_CONFIG_SOURCE_DHCP6] = "DHCPv6", [NETWORK_CONFIG_SOURCE_DHCP_PD] = "DHCP-PD", [NETWORK_CONFIG_SOURCE_NDISC] = "NDisc", [NETWORK_CONFIG_SOURCE_RUNTIME] = "runtime", }; DEFINE_STRING_TABLE_LOOKUP_TO_STRING(network_config_source, NetworkConfigSource); int network_config_state_to_string_alloc(NetworkConfigState s, char **ret) { static const char* states[] = { [LOG2U(NETWORK_CONFIG_STATE_PROBING)] = "probing", [LOG2U(NETWORK_CONFIG_STATE_REQUESTING)] = "requesting", [LOG2U(NETWORK_CONFIG_STATE_CONFIGURING)] = "configuring", [LOG2U(NETWORK_CONFIG_STATE_CONFIGURED)] = "configured", [LOG2U(NETWORK_CONFIG_STATE_MARKED)] = "marked", [LOG2U(NETWORK_CONFIG_STATE_REMOVING)] = "removing", }; _cleanup_free_ char *buf = NULL; assert(ret); for (size_t i = 0; i < ELEMENTSOF(states); i++) if (FLAGS_SET(s, 1 << i)) { assert(states[i]); if (!strextend_with_separator(&buf, ",", states[i])) return -ENOMEM; } *ret = TAKE_PTR(buf); return 0; } static const char * const address_family_table[_ADDRESS_FAMILY_MAX] = { [ADDRESS_FAMILY_NO] = "no", [ADDRESS_FAMILY_YES] = "yes", [ADDRESS_FAMILY_IPV4] = "ipv4", [ADDRESS_FAMILY_IPV6] = "ipv6", }; static const char * const routing_policy_rule_address_family_table[_ADDRESS_FAMILY_MAX] = { [ADDRESS_FAMILY_YES] = "both", [ADDRESS_FAMILY_IPV4] = "ipv4", [ADDRESS_FAMILY_IPV6] = "ipv6", }; static const char * const nexthop_address_family_table[_ADDRESS_FAMILY_MAX] = { [ADDRESS_FAMILY_IPV4] = "ipv4", [ADDRESS_FAMILY_IPV6] = "ipv6", }; static const char * const duplicate_address_detection_address_family_table[_ADDRESS_FAMILY_MAX] = { [ADDRESS_FAMILY_NO] = "none", [ADDRESS_FAMILY_YES] = "both", [ADDRESS_FAMILY_IPV4] = "ipv4", [ADDRESS_FAMILY_IPV6] = "ipv6", }; static const char * const dhcp_deprecated_address_family_table[_ADDRESS_FAMILY_MAX] = { [ADDRESS_FAMILY_NO] = "none", [ADDRESS_FAMILY_YES] = "both", [ADDRESS_FAMILY_IPV4] = "v4", [ADDRESS_FAMILY_IPV6] = "v6", }; static const char * const ip_masquerade_address_family_table[_ADDRESS_FAMILY_MAX] = { [ADDRESS_FAMILY_NO] = "no", [ADDRESS_FAMILY_YES] = "both", [ADDRESS_FAMILY_IPV4] = "ipv4", [ADDRESS_FAMILY_IPV6] = "ipv6", }; static const char * const dhcp_lease_server_type_table[_SD_DHCP_LEASE_SERVER_TYPE_MAX] = { [SD_DHCP_LEASE_DNS] = "DNS servers", [SD_DHCP_LEASE_NTP] = "NTP servers", [SD_DHCP_LEASE_SIP] = "SIP servers", [SD_DHCP_LEASE_POP3] = "POP3 servers", [SD_DHCP_LEASE_SMTP] = "SMTP servers", [SD_DHCP_LEASE_LPR] = "LPR servers", }; DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(address_family, AddressFamily, ADDRESS_FAMILY_YES); AddressFamily link_local_address_family_from_string(const char *s) { if (streq_ptr(s, "fallback")) /* compat name */ return ADDRESS_FAMILY_YES; if (streq_ptr(s, "fallback-ipv4")) /* compat name */ return ADDRESS_FAMILY_IPV4; return address_family_from_string(s); } DEFINE_STRING_TABLE_LOOKUP(routing_policy_rule_address_family, AddressFamily); DEFINE_STRING_TABLE_LOOKUP(nexthop_address_family, AddressFamily); DEFINE_STRING_TABLE_LOOKUP(duplicate_address_detection_address_family, AddressFamily); DEFINE_CONFIG_PARSE_ENUM(config_parse_link_local_address_family, link_local_address_family, AddressFamily, "Failed to parse option"); DEFINE_STRING_TABLE_LOOKUP_FROM_STRING(dhcp_deprecated_address_family, AddressFamily); DEFINE_PRIVATE_STRING_TABLE_LOOKUP_FROM_STRING(ip_masquerade_address_family, AddressFamily); DEFINE_STRING_TABLE_LOOKUP(dhcp_lease_server_type, sd_dhcp_lease_server_type_t); int config_parse_address_family_with_kernel( const char* unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { AddressFamily *fwd = data, s; assert(filename); assert(lvalue); assert(rvalue); assert(data); /* This function is mostly obsolete now. It simply redirects * "kernel" to "no". In older networkd versions we used to * distinguish IPForward=off from IPForward=kernel, where the * former would explicitly turn off forwarding while the * latter would simply not touch the setting. But that logic * is gone, hence silently accept the old setting, but turn it * to "no". */ s = address_family_from_string(rvalue); if (s < 0) { if (streq(rvalue, "kernel")) s = ADDRESS_FAMILY_NO; else { log_syntax(unit, LOG_WARNING, filename, line, 0, "Failed to parse IPForward= option, ignoring: %s", rvalue); return 0; } } *fwd = s; return 0; } int config_parse_ip_masquerade( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { AddressFamily a, *ret = data; int r; if (isempty(rvalue)) { *ret = ADDRESS_FAMILY_NO; return 0; } r = parse_boolean(rvalue); if (r >= 0) { if (r) log_syntax(unit, LOG_WARNING, filename, line, 0, "IPMasquerade=%s is deprecated, and it is handled as \"ipv4\" instead of \"both\". " "Please use \"ipv4\" or \"both\".", rvalue); *ret = r ? ADDRESS_FAMILY_IPV4 : ADDRESS_FAMILY_NO; return 0; } a = ip_masquerade_address_family_from_string(rvalue); if (a < 0) { log_syntax(unit, LOG_WARNING, filename, line, a, "Failed to parse IPMasquerade= setting, ignoring assignment: %s", rvalue); return 0; } *ret = a; return 0; } int config_parse_mud_url( const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata) { _cleanup_free_ char *unescaped = NULL; char **url = data; ssize_t l; assert(filename); assert(lvalue); assert(rvalue); assert(url); if (isempty(rvalue)) { *url = mfree(*url); return 0; } l = cunescape(rvalue, 0, &unescaped); if (l < 0) { log_syntax(unit, LOG_WARNING, filename, line, l, "Failed to unescape MUD URL, ignoring: %s", rvalue); return 0; } if (l > UINT8_MAX || !http_url_is_valid(unescaped)) { log_syntax(unit, LOG_WARNING, filename, line, 0, "Invalid MUD URL, ignoring: %s", rvalue); return 0; } return free_and_replace(*url, unescaped); } int log_link_message_full_errno(Link *link, sd_netlink_message *m, int level, int err, const char *msg) { const char *err_msg = NULL; /* link may be NULL. */ (void) sd_netlink_message_read_string(m, NLMSGERR_ATTR_MSG, &err_msg); return log_link_full_errno(link, level, err, "%s: %s%s%s%m", msg, strempty(err_msg), err_msg && !endswith(err_msg, ".") ? "." : "", err_msg ? " " : ""); }