network_conf.c 151.8 KB
Newer Older
1 2 3
/*
 * network_conf.c: network XML handling
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006-2008 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

26
#include <unistd.h>
27 28
#include <arpa/inet.h>
#include <sys/types.h>
A
Atsushi SAKAI 已提交
29
#include <sys/stat.h>
30
#include <fcntl.h>
31
#include <string.h>
32 33
#include <dirent.h>

34
#include "virerror.h"
35
#include "datatypes.h"
36
#include "network_conf.h"
37 38
#include "netdev_vport_profile_conf.h"
#include "netdev_bandwidth_conf.h"
39
#include "netdev_vlan_conf.h"
40
#include "viralloc.h"
41
#include "virxml.h"
42
#include "viruuid.h"
43
#include "virbuffer.h"
44
#include "c-ctype.h"
E
Eric Blake 已提交
45
#include "virfile.h"
46
#include "virstring.h"
47

48
#define VIR_FROM_THIS VIR_FROM_NETWORK
49 50
/* currently, /sbin/tc implementation allows up to 16 bits for minor class size */
#define CLASS_ID_BITMAP_SIZE (1<<16)
51

52
struct _virNetworkObjList {
53
    virObjectLockable parent;
54

55
    virHashTablePtr objs;
56 57
};

58 59
VIR_ENUM_IMPL(virNetworkForward,
              VIR_NETWORK_FORWARD_LAST,
60 61 62
              "none", "nat", "route", "open",
              "bridge", "private", "vepa", "passthrough",
              "hostdev")
63

64 65 66 67
VIR_ENUM_IMPL(virNetworkBridgeMACTableManager,
              VIR_NETWORK_BRIDGE_MAC_TABLE_MANAGER_LAST,
              "default", "kernel", "libvirt")

68 69 70 71
VIR_ENUM_DECL(virNetworkForwardHostdevDevice)
VIR_ENUM_IMPL(virNetworkForwardHostdevDevice,
              VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_LAST,
              "none", "pci", "netdev")
72

73 74 75 76 77 78
VIR_ENUM_IMPL(virNetworkForwardDriverName,
              VIR_NETWORK_FORWARD_DRIVER_NAME_LAST,
              "default",
              "kvm",
              "vfio")

79 80 81
VIR_ENUM_IMPL(virNetworkTaint, VIR_NETWORK_TAINT_LAST,
              "hook-script");

82
static virClassPtr virNetworkObjClass;
83
static virClassPtr virNetworkObjListClass;
84
static void virNetworkObjDispose(void *obj);
85 86 87
static void virNetworkObjListDispose(void *obj);

static int virNetworkObjOnceInit(void)
88
{
89 90 91 92 93 94
    if (!(virNetworkObjClass = virClassNew(virClassForObjectLockable(),
                                           "virNetworkObj",
                                           sizeof(virNetworkObj),
                                           virNetworkObjDispose)))
        return -1;

95
    if (!(virNetworkObjListClass = virClassNew(virClassForObjectLockable(),
96 97 98 99 100 101
                                               "virNetworkObjList",
                                               sizeof(virNetworkObjList),
                                               virNetworkObjListDispose)))
        return -1;
    return 0;
}
102 103


104 105
VIR_ONCE_GLOBAL_INIT(virNetworkObj)

106 107
virNetworkObjPtr
virNetworkObjNew(void)
108
{
109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
    virNetworkObjPtr net;

    if (virNetworkObjInitialize() < 0)
        return NULL;

    if (!(net = virObjectLockableNew(virNetworkObjClass)))
        return NULL;

    if (!(net->class_id = virBitmapNew(CLASS_ID_BITMAP_SIZE)))
        goto error;

    /* The first three class IDs are already taken */
    ignore_value(virBitmapSetBit(net->class_id, 0));
    ignore_value(virBitmapSetBit(net->class_id, 1));
    ignore_value(virBitmapSetBit(net->class_id, 2));

    return net;

 error:
    virObjectUnref(net);
    return NULL;
130 131
}

132 133 134 135 136 137 138
void
virNetworkObjEndAPI(virNetworkObjPtr *net)
{
    if (!*net)
        return;

    virObjectUnlock(*net);
139
    virObjectUnref(*net);
140 141 142
    *net = NULL;
}

143 144 145 146 147 148 149
virNetworkObjListPtr virNetworkObjListNew(void)
{
    virNetworkObjListPtr nets;

    if (virNetworkObjInitialize() < 0)
        return NULL;

150
    if (!(nets = virObjectLockableNew(virNetworkObjListClass)))
151 152
        return NULL;

153
    if (!(nets->objs = virHashCreate(50, virObjectFreeHashData))) {
154 155 156 157
        virObjectUnref(nets);
        return NULL;
    }

158
    return nets;
159 160
}

161 162 163 164 165 166 167 168 169
/**
 * virNetworkObjFindByUUIDLocked:
 * @nets: list of network objects
 * @uuid: network uuid to find
 *
 * This functions requires @nets to be locked already!
 *
 * Returns: not locked, but ref'd network object.
 */
170 171 172
virNetworkObjPtr
virNetworkObjFindByUUIDLocked(virNetworkObjListPtr nets,
                              const unsigned char *uuid)
173
{
174 175
    virNetworkObjPtr ret = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];
176

177
    virUUIDFormat(uuid, uuidstr);
178

179 180
    ret = virHashLookup(nets->objs, uuidstr);
    if (ret)
181
        virObjectRef(ret);
182 183 184
    return ret;
}

185 186 187 188 189 190 191 192 193 194
/**
 * virNetworkObjFindByUUID:
 * @nets: list of network objects
 * @uuid: network uuid to find
 *
 * This functions locks @nets and find network object which
 * corresponds to @uuid.
 *
 * Returns: locked and ref'd network object.
 */
195 196 197 198 199 200 201 202 203
virNetworkObjPtr
virNetworkObjFindByUUID(virNetworkObjListPtr nets,
                        const unsigned char *uuid)
{
    virNetworkObjPtr ret;

    virObjectLock(nets);
    ret = virNetworkObjFindByUUIDLocked(nets, uuid);
    virObjectUnlock(nets);
204 205
    if (ret)
        virObjectLock(ret);
206 207 208
    return ret;
}

209 210 211 212 213 214 215 216
static int
virNetworkObjSearchName(const void *payload,
                        const void *name ATTRIBUTE_UNUSED,
                        const void *data)
{
    virNetworkObjPtr net = (virNetworkObjPtr) payload;
    int want = 0;

217
    virObjectLock(net);
218 219
    if (STREQ(net->def->name, (const char *)data))
        want = 1;
220
    virObjectUnlock(net);
221
    return want;
222 223
}

224 225 226 227 228 229 230 231 232
/*
 * virNetworkObjFindByNameLocked:
 * @nets: list of network objects
 * @name: network name to find
 *
 * This functions requires @nets to be locked already!
 *
 * Returns: not locked, but ref'd network object.
 */
233 234 235
virNetworkObjPtr
virNetworkObjFindByNameLocked(virNetworkObjListPtr nets,
                              const char *name)
236
{
237
    virNetworkObjPtr ret = NULL;
238

239 240
    ret = virHashSearch(nets->objs, virNetworkObjSearchName, name);
    if (ret)
241
        virObjectRef(ret);
242
    return ret;
243 244
}

245 246 247 248 249 250 251 252 253 254
/**
 * virNetworkObjFindByName:
 * @nets: list of network objects
 * @name: network name to find
 *
 * This functions locks @nets and find network object which
 * corresponds to @name.
 *
 * Returns: locked and ref'd network object.
 */
255 256 257 258 259 260 261 262 263
virNetworkObjPtr
virNetworkObjFindByName(virNetworkObjListPtr nets,
                        const char *name)
{
    virNetworkObjPtr ret;

    virObjectLock(nets);
    ret = virNetworkObjFindByNameLocked(nets, name);
    virObjectUnlock(nets);
264 265
    if (ret)
        virObjectLock(ret);
266 267 268
    return ret;
}

269 270 271 272 273 274 275 276 277 278 279 280 281
bool
virNetworkObjTaint(virNetworkObjPtr obj,
                   virNetworkTaintFlags taint)
{
    unsigned int flag = (1 << taint);

    if (obj->taint & flag)
        return false;

    obj->taint |= flag;
    return true;
}

282

283 284 285 286 287
static void
virPortGroupDefClear(virPortGroupDefPtr def)
{
    VIR_FREE(def->name);
    VIR_FREE(def->virtPortProfile);
288
    virNetDevBandwidthFree(def->bandwidth);
289
    virNetDevVlanClear(&def->vlan);
290
    def->bandwidth = NULL;
291 292 293 294 295
}

static void
virNetworkForwardIfDefClear(virNetworkForwardIfDefPtr def)
{
296 297
    if (def->type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV)
        VIR_FREE(def->device.dev);
298 299
}

300 301 302 303 304 305
static void
virNetworkForwardPfDefClear(virNetworkForwardPfDefPtr def)
{
    VIR_FREE(def->dev);
}

306 307 308 309
static void
virNetworkDHCPHostDefClear(virNetworkDHCPHostDefPtr def)
{
    VIR_FREE(def->mac);
310
    VIR_FREE(def->id);
311 312 313
    VIR_FREE(def->name);
}

314
static void
315
virNetworkIPDefClear(virNetworkIPDefPtr def)
316 317 318 319
{
    VIR_FREE(def->family);
    VIR_FREE(def->ranges);

320 321
    while (def->nhosts)
        virNetworkDHCPHostDefClear(&def->hosts[--def->nhosts]);
322 323 324 325 326 327

    VIR_FREE(def->hosts);
    VIR_FREE(def->tftproot);
    VIR_FREE(def->bootfile);
}

328 329
static void
virNetworkDNSTxtDefClear(virNetworkDNSTxtDefPtr def)
330
{
331 332 333 334 335 336 337
    VIR_FREE(def->name);
    VIR_FREE(def->value);
}

static void
virNetworkDNSHostDefClear(virNetworkDNSHostDefPtr def)
{
338 339
    while (def->nnames)
        VIR_FREE(def->names[--def->nnames]);
340 341 342 343 344 345 346 347 348 349 350 351
    VIR_FREE(def->names);
}

static void
virNetworkDNSSrvDefClear(virNetworkDNSSrvDefPtr def)
{
    VIR_FREE(def->domain);
    VIR_FREE(def->service);
    VIR_FREE(def->protocol);
    VIR_FREE(def->target);
}

352 353 354 355 356 357 358 359

static void
virNetworkDNSForwarderClear(virNetworkDNSForwarderPtr def)
{
    VIR_FREE(def->domain);
}


360 361 362
static void
virNetworkDNSDefClear(virNetworkDNSDefPtr def)
{
363 364
    if (def->forwarders) {
        while (def->nfwds)
365
            virNetworkDNSForwarderClear(&def->forwarders[--def->nfwds]);
366 367
        VIR_FREE(def->forwarders);
    }
368
    if (def->txts) {
369 370
        while (def->ntxts)
            virNetworkDNSTxtDefClear(&def->txts[--def->ntxts]);
371
        VIR_FREE(def->txts);
372 373
    }
    if (def->hosts) {
374 375
        while (def->nhosts)
            virNetworkDNSHostDefClear(&def->hosts[--def->nhosts]);
376
        VIR_FREE(def->hosts);
377 378
    }
    if (def->srvs) {
379 380
        while (def->nsrvs)
            virNetworkDNSSrvDefClear(&def->srvs[--def->nsrvs]);
381
        VIR_FREE(def->srvs);
382 383 384
    }
}

385 386 387
static void
virNetworkForwardDefClear(virNetworkForwardDefPtr def)
{
388
    size_t i;
389

390
    for (i = 0; i < def->npfs && def->pfs; i++)
391
        virNetworkForwardPfDefClear(&def->pfs[i]);
392 393
    VIR_FREE(def->pfs);

394
    for (i = 0; i < def->nifs && def->ifs; i++)
395
        virNetworkForwardIfDefClear(&def->ifs[i]);
396
    VIR_FREE(def->ifs);
397
    def->nifs = def->npfs = 0;
398 399 400 401
}

void
virNetworkDefFree(virNetworkDefPtr def)
402
{
403
    size_t i;
404 405 406 407 408 409

    if (!def)
        return;

    VIR_FREE(def->name);
    VIR_FREE(def->bridge);
410
    VIR_FREE(def->domain);
411

412
    virNetworkForwardDefClear(&def->forward);
413

414
    for (i = 0; i < def->nips && def->ips; i++)
415
        virNetworkIPDefClear(&def->ips[i]);
416
    VIR_FREE(def->ips);
417

418
    for (i = 0; i < def->nroutes && def->routes; i++)
419
        virNetDevIPRouteFree(def->routes[i]);
420 421
    VIR_FREE(def->routes);

422
    for (i = 0; i < def->nPortGroups && def->portGroups; i++)
423
        virPortGroupDefClear(&def->portGroups[i]);
424 425
    VIR_FREE(def->portGroups);

426
    virNetworkDNSDefClear(&def->dns);
427

428 429
    VIR_FREE(def->virtPortProfile);

430
    virNetDevBandwidthFree(def->bandwidth);
431
    virNetDevVlanClear(&def->vlan);
432 433 434

    xmlFreeNode(def->metadata);

435 436 437
    VIR_FREE(def);
}

438 439
static void
virNetworkObjDispose(void *obj)
440
{
441
    virNetworkObjPtr net = obj;
442 443 444

    virNetworkDefFree(net->def);
    virNetworkDefFree(net->newDef);
445
    virBitmapFree(net->class_id);
446 447
}

448 449
static void
virNetworkObjListDispose(void *obj)
450
{
451
    virNetworkObjListPtr nets = obj;
452

453
    virHashFree(nets->objs);
454 455
}

456 457 458
/*
 * virNetworkObjAssignDef:
 * @network: the network object to update
459
 * @def: the new NetworkDef (will be consumed by this function)
460 461
 * @live: is this new def the "live" version, or the "persistent" version
 *
462
 * Replace the appropriate copy of the given network's def or newDef
463
 * with def. Use "live" and current state of the network to determine
464 465 466 467 468 469
 * which to replace and what to do with the old defs. When a non-live
 * def is set, indicate that the network is now persistent.
 *
 * NB: a persistent network can be made transient by calling with:
 * virNetworkObjAssignDef(network, NULL, false) (i.e. set the
 * persistent def to NULL)
470 471
 *
 */
472
void
473
virNetworkObjAssignDef(virNetworkObjPtr network,
E
Eric Blake 已提交
474
                       virNetworkDefPtr def,
475
                       bool live)
476
{
477 478 479 480 481 482 483 484
    if (live) {
        /* before setting new live def, save (into newDef) any
         * existing persistent (!live) def to be restored when the
         * network is destroyed, unless there is one already saved.
         */
        if (network->persistent && !network->newDef)
            network->newDef = network->def;
        else
485
            virNetworkDefFree(network->def);
486 487 488 489 490 491 492
        network->def = def;
    } else { /* !live */
        virNetworkDefFree(network->newDef);
        if (virNetworkObjIsActive(network)) {
            /* save new configuration to be restored on network
             * shutdown, leaving current live def alone
             */
493
            network->newDef = def;
494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511
        } else { /* !live and !active */
            if (network->def && !network->persistent) {
                /* network isn't (yet) marked active or persistent,
                 * but already has a "live" def set. This means we are
                 * currently setting the persistent def as a part of
                 * the process of starting the network, so we need to
                 * preserve the "not yet live" def in network->def.
                 */
                network->newDef = def;
            } else {
                /* either there is no live def set, or this network
                 * was already set as persistent, so the proper thing
                 * is to overwrite network->def.
                 */
                network->newDef = NULL;
                virNetworkDefFree(network->def);
                network->def = def;
            }
512
        }
513
        network->persistent = !!def;
514 515
    }
}
516

517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593
/*
 * If flags & VIR_NETWORK_OBJ_LIST_ADD_CHECK_LIVE then this will
 * refuse updating an existing def if the current def is live
 *
 * If flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE then the @def being
 * added is assumed to represent a live config, not a future
 * inactive config
 *
 * If flags is zero, network is considered as inactive and persistent.
 */
static virNetworkObjPtr
virNetworkAssignDefLocked(virNetworkObjListPtr nets,
                          virNetworkDefPtr def,
                          unsigned int flags)
{
    virNetworkObjPtr network;
    virNetworkObjPtr ret = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];

    /* See if a network with matching UUID already exists */
    if ((network = virNetworkObjFindByUUIDLocked(nets, def->uuid))) {
        virObjectLock(network);
        /* UUID matches, but if names don't match, refuse it */
        if (STRNEQ(network->def->name, def->name)) {
            virUUIDFormat(network->def->uuid, uuidstr);
            virReportError(VIR_ERR_OPERATION_FAILED,
                           _("network '%s' is already defined with uuid %s"),
                           network->def->name, uuidstr);
            goto cleanup;
        }

        if (flags & VIR_NETWORK_OBJ_LIST_ADD_CHECK_LIVE) {
            /* UUID & name match, but if network is already active, refuse it */
            if (virNetworkObjIsActive(network)) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("network is already active as '%s'"),
                               network->def->name);
                goto cleanup;
            }
        }

        virNetworkObjAssignDef(network,
                               def,
                               !!(flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE));
    } else {
        /* UUID does not match, but if a name matches, refuse it */
        if ((network = virNetworkObjFindByNameLocked(nets, def->name))) {
            virObjectLock(network);
            virUUIDFormat(network->def->uuid, uuidstr);
            virReportError(VIR_ERR_OPERATION_FAILED,
                           _("network '%s' already exists with uuid %s"),
                           def->name, uuidstr);
            goto cleanup;
        }

        if (!(network = virNetworkObjNew()))
              goto cleanup;

        virObjectLock(network);

        virUUIDFormat(def->uuid, uuidstr);
        if (virHashAddEntry(nets->objs, uuidstr, network) < 0)
            goto cleanup;

        network->def = def;
        network->persistent = !(flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE);
        virObjectRef(network);
    }

    ret = network;
    network = NULL;

 cleanup:
    virNetworkObjEndAPI(&network);
    return ret;
}

594 595 596 597
/*
 * virNetworkAssignDef:
 * @nets: list of all networks
 * @def: the new NetworkDef (will be consumed by this function iff successful)
598
 * @flags: bitwise-OR of VIR_NETWORK_OBJ_LIST_ADD_* flags
599 600 601 602 603 604
 *
 * Either replace the appropriate copy of the NetworkDef with name
 * matching def->name or, if not found, create a new NetworkObj with
 * def. For an existing network, use "live" and current state of the
 * network to determine which to replace.
 *
605 606
 * Look at virNetworkAssignDefLocked() for @flags description.
 *
607
 * Returns NULL on error, virNetworkObjPtr on success.
608 609 610
 */
virNetworkObjPtr
virNetworkAssignDef(virNetworkObjListPtr nets,
E
Eric Blake 已提交
611
                    virNetworkDefPtr def,
612
                    unsigned int flags)
613 614 615
{
    virNetworkObjPtr network;

616
    virObjectLock(nets);
617
    network = virNetworkAssignDefLocked(nets, def, flags);
618
    virObjectUnlock(nets);
619 620 621
    return network;
}

622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648
/*
 * virNetworkObjSetDefTransient:
 * @network: network object pointer
 * @live: if true, run this operation even for an inactive network.
 *   this allows freely updated network->def with runtime defaults
 *   before starting the network, which will be discarded on network
 *   shutdown. Any cleanup paths need to be sure to handle newDef if
 *   the network is never started.
 *
 * Mark the active network config as transient. Ensures live-only update
 * operations do not persist past network destroy.
 *
 * Returns 0 on success, -1 on failure
 */
int
virNetworkObjSetDefTransient(virNetworkObjPtr network, bool live)
{
    if (!virNetworkObjIsActive(network) && !live)
        return 0;

    if (!network->persistent || network->newDef)
        return 0;

    network->newDef = virNetworkDefCopy(network->def, VIR_NETWORK_XML_INACTIVE);
    return network->newDef ? 0 : -1;
}

649 650 651 652 653 654 655
/* virNetworkObjUnsetDefTransient:
 *
 * This *undoes* what virNetworkObjSetDefTransient did.
 */
void
virNetworkObjUnsetDefTransient(virNetworkObjPtr network)
{
656
    if (network->newDef) {
657 658 659 660 661 662
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }
}

663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730
/*
 * virNetworkObjGetPersistentDef:
 * @network: network object pointer
 *
 * Return the persistent network configuration. If network is transient,
 * return the running config.
 *
 * Returns NULL on error, virNetworkDefPtr on success.
 */
virNetworkDefPtr
virNetworkObjGetPersistentDef(virNetworkObjPtr network)
{
    if (network->newDef)
        return network->newDef;
    else
        return network->def;
}

/*
 * virNetworkObjReplacePersistentDef:
 * @network: network object pointer
 * @def: new virNetworkDef to replace current persistent config
 *
 * Replace the "persistent" network configuration with the given new
 * virNetworkDef. This pays attention to whether or not the network
 * is active.
 *
 * Returns -1 on error, 0 on success
 */
int
virNetworkObjReplacePersistentDef(virNetworkObjPtr network,
                                  virNetworkDefPtr def)
{
    if (virNetworkObjIsActive(network)) {
        virNetworkDefFree(network->newDef);
        network->newDef = def;
    } else {
        virNetworkDefFree(network->def);
        network->def = def;
    }
    return 0;
}

/*
 * virNetworkDefCopy:
 * @def: NetworkDef to copy
 * @flags: VIR_NETWORK_XML_INACTIVE if appropriate
 *
 * make a deep copy of the given NetworkDef
 *
 * Returns a new NetworkDef on success, or NULL on failure.
 */
virNetworkDefPtr
virNetworkDefCopy(virNetworkDefPtr def, unsigned int flags)
{
    char *xml = NULL;
    virNetworkDefPtr newDef = NULL;

    if (!def) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("NULL NetworkDef"));
        return NULL;
    }

    /* deep copy with a format/parse cycle */
    if (!(xml = virNetworkDefFormat(def, flags)))
        goto cleanup;
    newDef = virNetworkDefParseString(xml);
731
 cleanup:
732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775
    VIR_FREE(xml);
    return newDef;
}

/*
 * virNetworkConfigChangeSetup:
 *
 * 1) checks whether network state is consistent with the requested
 *    type of modification.
 *
 * 3) make sure there are separate "def" and "newDef" copies of
 *    networkDef if appropriate.
 *
 * Returns 0 on success, -1 on error.
 */
int
virNetworkConfigChangeSetup(virNetworkObjPtr network, unsigned int flags)
{
    bool isActive;
    int ret = -1;

    isActive = virNetworkObjIsActive(network);

    if (!isActive && (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("network is not running"));
        goto cleanup;
    }

    if (flags & VIR_NETWORK_UPDATE_AFFECT_CONFIG) {
        if (!network->persistent) {
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot change persistent config of a "
                             "transient network"));
            goto cleanup;
        }
        /* this should already have been done by the driver, but do it
         * anyway just in case.
         */
        if (isActive && (virNetworkObjSetDefTransient(network, false) < 0))
            goto cleanup;
    }

    ret = 0;
776
 cleanup:
777 778 779
    return ret;
}

780
void virNetworkRemoveInactive(virNetworkObjListPtr nets,
E
Eric Blake 已提交
781
                              virNetworkObjPtr net)
782
{
783
    char uuidstr[VIR_UUID_STRING_BUFLEN];
784

785
    virUUIDFormat(net->def->uuid, uuidstr);
786
    virObjectRef(net);
787
    virObjectUnlock(net);
788 789
    virObjectLock(nets);
    virObjectLock(net);
790
    virHashRemoveEntry(nets->objs, uuidstr);
791 792
    virObjectUnlock(nets);
    virObjectUnref(net);
793 794
}

795
/* return ips[index], or NULL if there aren't enough ips */
796 797
virNetworkIPDefPtr
virNetworkDefGetIPByIndex(const virNetworkDef *def,
798 799
                          int family, size_t n)
{
800
    size_t i;
801 802 803 804

    if (!def->ips || n >= def->nips)
        return NULL;

805
    if (family == AF_UNSPEC)
806 807 808
        return &def->ips[n];

    /* find the nth ip of type "family" */
809 810
    for (i = 0; i < def->nips; i++) {
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->ips[i].address, family)
811
            && (n-- <= 0)) {
812
            return &def->ips[i];
813 814 815 816 817 818
        }
    }
    /* failed to find enough of the right family */
    return NULL;
}

819
/* return routes[index], or NULL if there aren't enough routes */
820
virNetDevIPRoutePtr
821 822 823 824 825 826 827 828 829 830 831 832 833
virNetworkDefGetRouteByIndex(const virNetworkDef *def,
                             int family, size_t n)
{
    size_t i;

    if (!def->routes || n >= def->nroutes)
        return NULL;

    if (family == AF_UNSPEC)
        return def->routes[n];

    /* find the nth route of type "family" */
    for (i = 0; i < def->nroutes; i++) {
834
        virSocketAddrPtr addr = virNetDevIPRouteGetAddress(def->routes[i]);
835 836 837 838 839 840 841 842 843 844
        if (VIR_SOCKET_ADDR_IS_FAMILY(addr, family)
            && (n-- <= 0)) {
            return def->routes[i];
        }
    }

    /* failed to find enough of the right family */
    return NULL;
}

L
Laine Stump 已提交
845 846 847
/* return number of 1 bits in netmask for the network's ipAddress,
 * or -1 on error
 */
848
int virNetworkIPDefPrefix(const virNetworkIPDef *def)
L
Laine Stump 已提交
849
{
850
    return virSocketAddrGetIPPrefix(&def->address,
851 852
                                    &def->netmask,
                                    def->prefix);
L
Laine Stump 已提交
853 854 855 856 857 858
}

/* Fill in a virSocketAddr with the proper netmask for this
 * definition, based on either the definition's netmask, or its
 * prefix. Return -1 on error (and set the netmask family to AF_UNSPEC)
 */
859
int virNetworkIPDefNetmask(const virNetworkIPDef *def,
860
                           virSocketAddrPtr netmask)
L
Laine Stump 已提交
861
{
862
    if (VIR_SOCKET_ADDR_IS_FAMILY(&def->netmask, AF_INET)) {
L
Laine Stump 已提交
863 864 865 866
        *netmask = def->netmask;
        return 0;
    }

867
    return virSocketAddrPrefixToNetmask(virNetworkIPDefPrefix(def), netmask,
868
                                        VIR_SOCKET_ADDR_FAMILY(&def->address));
L
Laine Stump 已提交
869 870
}

871 872

static int
873
virSocketAddrRangeParseXML(const char *networkName,
874
                           virNetworkIPDefPtr ipdef,
875 876
                           xmlNodePtr node,
                           virSocketAddrRangePtr range)
877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901
{


    char *start = NULL, *end = NULL;
    int ret = -1;

    if (!(start = virXMLPropString(node, "start"))) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing 'start' attribute in dhcp range for network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&range->start, start, AF_UNSPEC) < 0)
        goto cleanup;

    if (!(end = virXMLPropString(node, "end"))) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing 'end' attribute in dhcp range for network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&range->end, end, AF_UNSPEC) < 0)
        goto cleanup;

    /* do a sanity check of the range */
902
    if (virSocketAddrGetRange(&range->start, &range->end, &ipdef->address,
903
                              virNetworkIPDefPrefix(ipdef)) < 0)
904 905 906 907
        goto cleanup;

    ret = 0;

908
 cleanup:
909 910 911 912 913 914
    VIR_FREE(start);
    VIR_FREE(end);
    return ret;
}

static int
915
virNetworkDHCPHostDefParseXML(const char *networkName,
916
                              virNetworkIPDefPtr def,
917 918 919
                              xmlNodePtr node,
                              virNetworkDHCPHostDefPtr host,
                              bool partialOkay)
920
{
921
    char *mac = NULL, *name = NULL, *ip = NULL, *id = NULL;
922 923 924 925 926 927
    virMacAddr addr;
    virSocketAddr inaddr;
    int ret = -1;

    mac = virXMLPropString(node, "mac");
    if (mac != NULL) {
G
Gene Czarcinski 已提交
928 929 930 931 932 933 934
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid to specify MAC address '%s' "
                             "in network '%s' IPv6 static host definition"),
                           mac, networkName);
            goto cleanup;
        }
935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
        if (virMacAddrParse(mac, &addr) < 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Cannot parse MAC address '%s' in network '%s'"),
                           mac, networkName);
            goto cleanup;
        }
        if (virMacAddrIsMulticast(&addr)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("expected unicast mac address, found "
                             "multicast '%s' in network '%s'"),
                           (const char *)mac, networkName);
            goto cleanup;
        }
    }

950 951 952 953 954 955 956
    id = virXMLPropString(node, "id");
    if (id) {
        char *cp = id + strspn(id, "0123456789abcdefABCDEF:");
        if (*cp) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid character '%c' in id '%s' of network '%s'"),
                           *cp, id, networkName);
L
Luyao Huang 已提交
957
            goto cleanup;
958 959 960
        }
    }

961 962 963
    name = virXMLPropString(node, "name");
    if (name && (!c_isalpha(name[0]))) {
        virReportError(VIR_ERR_XML_ERROR,
964
                       _("Cannot use host name '%s' in network '%s'"),
965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985
                       name, networkName);
        goto cleanup;
    }

    ip = virXMLPropString(node, "ip");
    if (ip && (virSocketAddrParse(&inaddr, ip, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid IP address in static host definition "
                         "for network '%s'"),
                       networkName);
        goto cleanup;
    }

    if (partialOkay) {
        /* for search/match, you just need one of the three */
        if (!(mac || name || ip)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("At least one of name, mac, or ip attribute "
                             "must be specified for static host definition "
                             "in network '%s' "),
                           networkName);
986
            goto cleanup;
987 988
        }
    } else {
G
Gene Czarcinski 已提交
989 990 991 992
        /* normal usage - you need at least name (IPv6) or one of MAC
         * address or name (IPv4)
         */
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
993
            if (!(id || name)) {
G
Gene Czarcinski 已提交
994 995
                virReportError(VIR_ERR_XML_ERROR,
                           _("Static host definition in IPv6 network '%s' "
996
                             "must have id or name attribute"),
G
Gene Czarcinski 已提交
997 998 999 1000
                           networkName);
                goto cleanup;
            }
        } else if (!(mac || name)) {
1001
            virReportError(VIR_ERR_XML_ERROR,
G
Gene Czarcinski 已提交
1002
                           _("Static host definition in IPv4 network '%s' "
1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017
                             "must have mac or name attribute"),
                           networkName);
            goto cleanup;
        }
        if (!ip) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Missing IP address in static host definition "
                             "for network '%s'"),
                           networkName);
            goto cleanup;
        }
    }

    host->mac = mac;
    mac = NULL;
1018 1019
    host->id = id;
    id = NULL;
1020 1021 1022 1023 1024 1025
    host->name = name;
    name = NULL;
    if (ip)
        host->ip = inaddr;
    ret = 0;

1026
 cleanup:
1027
    VIR_FREE(mac);
1028
    VIR_FREE(id);
1029 1030 1031 1032 1033 1034
    VIR_FREE(name);
    VIR_FREE(ip);
    return ret;
}

static int
1035 1036
virNetworkDHCPDefParseXML(const char *networkName,
                          xmlNodePtr node,
1037
                          virNetworkIPDefPtr def)
1038
{
1039
    int ret = -1;
1040
    xmlNodePtr cur;
1041 1042 1043 1044 1045
    virSocketAddrRange range;
    virNetworkDHCPHostDef host;

    memset(&range, 0, sizeof(range));
    memset(&host, 0, sizeof(host));
1046 1047 1048

    cur = node->children;
    while (cur != NULL) {
1049 1050
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "range")) {
1051

1052 1053 1054 1055
            if (virSocketAddrRangeParseXML(networkName, def, cur, &range) < 0)
                goto cleanup;
            if (VIR_APPEND_ELEMENT(def->ranges, def->nranges, range) < 0)
                goto cleanup;
1056

1057 1058 1059
        } else if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "host")) {

G
Gene Czarcinski 已提交
1060
            if (virNetworkDHCPHostDefParseXML(networkName, def, cur,
1061 1062 1063 1064
                                              &host, false) < 0)
                goto cleanup;
            if (VIR_APPEND_ELEMENT(def->hosts, def->nhosts, host) < 0)
                goto cleanup;
1065

G
Gene Czarcinski 已提交
1066 1067 1068
        } else if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET) &&
                   cur->type == XML_ELEMENT_NODE &&
                   xmlStrEqual(cur->name, BAD_CAST "bootp")) {
1069 1070
            char *file;
            char *server;
1071
            virSocketAddr inaddr;
1072
            memset(&inaddr, 0, sizeof(inaddr));
1073

1074
            if (!(file = virXMLPropString(cur, "file"))) {
1075 1076 1077
                cur = cur->next;
                continue;
            }
1078
            server = virXMLPropString(cur, "server");
1079

1080
            if (server &&
1081
                virSocketAddrParse(&inaddr, server, AF_UNSPEC) < 0) {
E
Eric Blake 已提交
1082 1083
                VIR_FREE(file);
                VIR_FREE(server);
1084
                goto cleanup;
E
Eric Blake 已提交
1085
            }
1086

1087
            def->bootfile = file;
1088
            def->bootserver = inaddr;
E
Eric Blake 已提交
1089
            VIR_FREE(server);
1090 1091 1092 1093 1094
        }

        cur = cur->next;
    }

1095 1096 1097 1098
    ret = 0;
 cleanup:
    virNetworkDHCPHostDefClear(&host);
    return ret;
1099 1100
}

1101
static int
1102 1103 1104 1105
virNetworkDNSHostDefParseXML(const char *networkName,
                             xmlNodePtr node,
                             virNetworkDNSHostDefPtr def,
                             bool partialOkay)
1106 1107 1108 1109
{
    xmlNodePtr cur;
    char *ip;

1110 1111 1112 1113
    if (!(ip = virXMLPropString(node, "ip")) && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing IP address in network '%s' DNS HOST record"),
                       networkName);
1114 1115 1116
        goto error;
    }

1117 1118 1119 1120 1121
    if (ip && (virSocketAddrParse(&def->ip, ip, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Invalid IP address in network '%s' DNS HOST record"),
                       networkName);
        VIR_FREE(ip);
1122 1123
        goto error;
    }
1124
    VIR_FREE(ip);
1125 1126 1127 1128 1129 1130

    cur = node->children;
    while (cur != NULL) {
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "hostname")) {
              if (cur->children != NULL) {
1131 1132 1133
                  char *name = (char *) xmlNodeGetContent(cur);

                  if (!name) {
1134 1135 1136
                      virReportError(VIR_ERR_XML_DETAIL,
                                     _("Missing hostname in network '%s' DNS HOST record"),
                                     networkName);
1137 1138 1139 1140 1141
                      goto error;
                  }
                  if (VIR_APPEND_ELEMENT(def->names, def->nnames, name) < 0) {
                      VIR_FREE(name);
                      goto error;
1142
                  }
1143 1144 1145 1146
              }
        }
        cur = cur->next;
    }
1147 1148 1149 1150 1151 1152
    if (def->nnames == 0 && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing hostname in network '%s' DNS HOST record"),
                       networkName);
        goto error;
    }
1153

1154 1155 1156 1157 1158 1159
    if (!VIR_SOCKET_ADDR_VALID(&def->ip) && def->nnames == 0) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing ip and hostname in network '%s' DNS HOST record"),
                       networkName);
        goto error;
    }
1160

1161
    return 0;
1162

1163
 error:
1164 1165
    virNetworkDNSHostDefClear(def);
    return -1;
1166 1167
}

1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182
/* This includes all characters used in the names of current
 * /etc/services and /etc/protocols files (on Fedora 20), except ".",
 * which we can't allow because it would conflict with the use of "."
 * as a field separator in the SRV record, there appears to be no way
 * to escape it in, and the protocols/services that use "." in the
 * name are obscure and unlikely to be used anyway.
 */
#define PROTOCOL_CHARS \
    "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" \
    "-+/"

#define SERVICE_CHARS \
    "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" \
    "_-+/*"

1183
static int
1184 1185 1186 1187 1188
virNetworkDNSSrvDefParseXML(const char *networkName,
                            xmlNodePtr node,
                            xmlXPathContextPtr ctxt,
                            virNetworkDNSSrvDefPtr def,
                            bool partialOkay)
1189
{
1190 1191 1192 1193 1194
    int ret;
    xmlNodePtr save_ctxt = ctxt->node;

    ctxt->node = node;

1195
    if (!(def->service = virXMLPropString(node, "service")) && !partialOkay) {
1196
        virReportError(VIR_ERR_XML_DETAIL,
1197 1198
                       _("missing required service attribute in DNS SRV record "
                         "of network '%s'"), networkName);
1199 1200
        goto error;
    }
1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215
    if (def->service) {
        if (strlen(def->service) > DNS_RECORD_LENGTH_SRV) {
            virReportError(VIR_ERR_XML_DETAIL,
                           _("service attribute '%s' in network '%s' is too long, "
                             "limit is %d bytes"),
                           def->service, networkName, DNS_RECORD_LENGTH_SRV);
            goto error;
        }
        if (strspn(def->service, SERVICE_CHARS) < strlen(def->service)) {
            virReportError(VIR_ERR_XML_DETAIL,
                           _("invalid character in service attribute '%s' "
                             "in DNS SRV record of network '%s'"),
                           def->service, networkName);
            goto error;
        }
1216 1217
    }

1218
    if (!(def->protocol = virXMLPropString(node, "protocol")) && !partialOkay) {
1219
        virReportError(VIR_ERR_XML_DETAIL,
1220 1221
                       _("missing required protocol attribute "
                         "in DNS SRV record '%s' of network '%s'"),
1222
                       def->service, networkName);
1223 1224
        goto error;
    }
1225 1226
    if (def->protocol &&
        strspn(def->protocol, PROTOCOL_CHARS) < strlen(def->protocol)) {
1227
        virReportError(VIR_ERR_XML_DETAIL,
1228 1229
                       _("invalid character in protocol attribute '%s' "
                         "in DNS SRV record of network '%s'"),
1230
                       def->protocol, networkName);
1231 1232 1233
        goto error;
    }

1234
    /* Following attributes are optional */
1235 1236
    def->domain = virXMLPropString(node, "domain");
    def->target = virXMLPropString(node, "target");
1237

1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252
    ret = virXPathUInt("string(./@port)", ctxt, &def->port);
    if (ret >= 0 && !def->target) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("DNS SRV port attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
    if (ret == -2 || (ret >= 0 && (def->port < 1 || def->port > 65535))) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("invalid DNS SRV port attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
1253

1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267
    ret = virXPathUInt("string(./@priority)", ctxt, &def->priority);
    if (ret >= 0 && !def->target) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("DNS SRV priority attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
    if (ret == -2 || (ret >= 0 && def->priority > 65535)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Invalid DNS SRV priority attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
1268 1269
    }

1270 1271
    ret = virXPathUInt("string(./@weight)", ctxt, &def->weight);
    if (ret >= 0 && !def->target) {
1272
        virReportError(VIR_ERR_XML_DETAIL,
1273 1274 1275
                       _("DNS SRV weight attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
1276 1277
        goto error;
    }
1278 1279 1280 1281 1282 1283 1284 1285 1286
    if (ret == -2 || (ret >= 0 && def->weight > 65535)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("invalid DNS SRV weight attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }

    ctxt->node = save_ctxt;
1287
    return 0;
1288

1289
 error:
1290
    virNetworkDNSSrvDefClear(def);
1291
    ctxt->node = save_ctxt;
1292 1293 1294 1295 1296 1297 1298 1299 1300
    return -1;
}

static int
virNetworkDNSTxtDefParseXML(const char *networkName,
                            xmlNodePtr node,
                            virNetworkDNSTxtDefPtr def,
                            bool partialOkay)
{
1301 1302
    const char *bad = " ,";

1303 1304 1305 1306 1307 1308
    if (!(def->name = virXMLPropString(node, "name"))) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("missing required name attribute in DNS TXT record "
                         "of network %s"), networkName);
        goto error;
    }
1309
    if (strcspn(def->name, bad) != strlen(def->name)) {
1310
        virReportError(VIR_ERR_XML_DETAIL,
1311
                       _("prohibited character in DNS TXT record "
1312 1313 1314 1315 1316 1317 1318 1319 1320
                         "name '%s' of network %s"), def->name, networkName);
        goto error;
    }
    if (!(def->value = virXMLPropString(node, "value")) && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("missing required value attribute in DNS TXT record "
                         "named '%s' of network %s"), def->name, networkName);
        goto error;
    }
1321

1322 1323 1324 1325 1326 1327 1328
    if (!(def->name || def->value)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing required name or value "
                         "in DNS TXT record of network %s"), networkName);
        goto error;
    }
    return 0;
1329

1330
 error:
1331 1332
    virNetworkDNSTxtDefClear(def);
    return -1;
1333 1334
}

1335
static int
1336
virNetworkDNSDefParseXML(const char *networkName,
1337
                         xmlNodePtr node,
1338 1339
                         xmlXPathContextPtr ctxt,
                         virNetworkDNSDefPtr def)
1340
{
1341 1342 1343
    xmlNodePtr *hostNodes = NULL;
    xmlNodePtr *srvNodes = NULL;
    xmlNodePtr *txtNodes = NULL;
1344
    xmlNodePtr *fwdNodes = NULL;
1345
    char *forwardPlainNames = NULL;
1346
    char *enable = NULL;
1347
    int nhosts, nsrvs, ntxts, nfwds;
1348 1349
    size_t i;
    int ret = -1;
1350
    xmlNodePtr save = ctxt->node;
1351

1352 1353
    ctxt->node = node;

1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365
    enable = virXPathString("string(./@enable)", ctxt);
    if (enable) {
        def->enable = virTristateBoolTypeFromString(enable);
        if (def->enable <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid dns enable setting '%s' "
                             "in network '%s'"),
                           enable, networkName);
            goto cleanup;
        }
    }

1366 1367
    forwardPlainNames = virXPathString("string(./@forwardPlainNames)", ctxt);
    if (forwardPlainNames) {
J
Ján Tomko 已提交
1368
        def->forwardPlainNames = virTristateBoolTypeFromString(forwardPlainNames);
1369
        if (def->forwardPlainNames <= 0) {
1370 1371 1372 1373 1374 1375 1376 1377
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid dns forwardPlainNames setting '%s' "
                             "in network '%s'"),
                           forwardPlainNames, networkName);
            goto cleanup;
        }
    }

1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389
    nfwds = virXPathNodeSet("./forwarder", ctxt, &fwdNodes);
    if (nfwds < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <forwarder> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (nfwds > 0) {
        if (VIR_ALLOC_N(def->forwarders, nfwds) < 0)
            goto cleanup;

        for (i = 0; i < nfwds; i++) {
1390 1391 1392 1393
            char *addr = virXMLPropString(fwdNodes[i], "addr");

            if (addr && virSocketAddrParse(&def->forwarders[i].addr,
                                           addr, AF_UNSPEC) < 0) {
1394
                virReportError(VIR_ERR_XML_ERROR,
1395 1396 1397 1398
                               _("Invalid forwarder IP address '%s' "
                                 "in network '%s'"),
                               addr, networkName);
                VIR_FREE(addr);
1399 1400
                goto cleanup;
            }
1401 1402 1403 1404 1405 1406 1407 1408
            def->forwarders[i].domain = virXMLPropString(fwdNodes[i], "domain");
            if (!(addr || def->forwarders[i].domain)) {
                virReportError(VIR_ERR_XML_ERROR, "%s",
                               _("Invalid forwarder element, must contain "
                                 "at least one of addr or domain"));
                goto cleanup;
            }
            VIR_FREE(addr);
1409 1410 1411 1412
            def->nfwds++;
        }
    }

1413 1414 1415 1416 1417 1418
    nhosts = virXPathNodeSet("./host", ctxt, &hostNodes);
    if (nhosts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <host> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
1419
    }
1420
    if (nhosts > 0) {
1421
        if (VIR_ALLOC_N(def->hosts, nhosts) < 0)
1422
            goto cleanup;
1423

1424 1425
        for (i = 0; i < nhosts; i++) {
            if (virNetworkDNSHostDefParseXML(networkName, hostNodes[i],
1426 1427
                                             &def->hosts[def->nhosts], false) < 0) {
                goto cleanup;
1428
            }
1429 1430 1431
            def->nhosts++;
        }
    }
1432

1433 1434 1435 1436 1437 1438 1439 1440
    nsrvs = virXPathNodeSet("./srv", ctxt, &srvNodes);
    if (nsrvs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <srv> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (nsrvs > 0) {
1441
        if (VIR_ALLOC_N(def->srvs, nsrvs) < 0)
1442
            goto cleanup;
1443

1444 1445
        for (i = 0; i < nsrvs; i++) {
            if (virNetworkDNSSrvDefParseXML(networkName, srvNodes[i], ctxt,
1446 1447
                                            &def->srvs[def->nsrvs], false) < 0) {
                goto cleanup;
1448
            }
1449 1450 1451
            def->nsrvs++;
        }
    }
1452

1453 1454 1455 1456 1457 1458 1459 1460
    ntxts = virXPathNodeSet("./txt", ctxt, &txtNodes);
    if (ntxts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <txt> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (ntxts > 0) {
1461
        if (VIR_ALLOC_N(def->txts, ntxts) < 0)
1462
            goto cleanup;
1463

1464 1465
        for (i = 0; i < ntxts; i++) {
            if (virNetworkDNSTxtDefParseXML(networkName, txtNodes[i],
1466 1467 1468 1469 1470
                                            &def->txts[def->ntxts], false) < 0) {
                goto cleanup;
            }
            def->ntxts++;
        }
1471 1472
    }

1473 1474 1475 1476 1477 1478 1479 1480
    if (def->enable == VIR_TRISTATE_BOOL_NO &&
        (nfwds || nhosts || nsrvs || ntxts)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Extra data in disabled network '%s'"),
                       networkName);
        goto cleanup;
    }

1481
    ret = 0;
1482
 cleanup:
1483
    VIR_FREE(enable);
1484
    VIR_FREE(forwardPlainNames);
1485
    VIR_FREE(fwdNodes);
1486 1487 1488 1489
    VIR_FREE(hostNodes);
    VIR_FREE(srvNodes);
    VIR_FREE(txtNodes);
    ctxt->node = save;
1490 1491 1492
    return ret;
}

1493
static int
1494 1495 1496
virNetworkIPDefParseXML(const char *networkName,
                        xmlNodePtr node,
                        xmlXPathContextPtr ctxt,
1497
                        virNetworkIPDefPtr def)
1498 1499
{
    /*
1500
     * virNetworkIPDef object is already allocated as part of an array.
1501 1502 1503 1504 1505
     * On failure clear it out, but don't free it.
     */

    xmlNodePtr cur, save;
    char *address = NULL, *netmask = NULL;
G
Gene Czarcinski 已提交
1506 1507
    unsigned long prefix = 0;
    int prefixRc;
1508 1509 1510 1511 1512 1513 1514
    int result = -1;

    save = ctxt->node;
    ctxt->node = node;

    /* grab raw data from XML */
    def->family = virXPathString("string(./@family)", ctxt);
G
Gene Czarcinski 已提交
1515

1516
    address = virXPathString("string(./@address)", ctxt);
G
Gene Czarcinski 已提交
1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528
    if (!address) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing required address attribute in network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&def->address, address, AF_UNSPEC) < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid address '%s' in network '%s'"),
                       address, networkName);
        goto cleanup;
    }
1529 1530

    netmask = virXPathString("string(./@netmask)", ctxt);
G
Gene Czarcinski 已提交
1531 1532 1533 1534 1535 1536 1537
    if (netmask &&
        (virSocketAddrParse(&def->netmask, netmask, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid netmask '%s' in network '%s'"),
                       netmask, networkName);
        goto cleanup;
    }
1538

G
Gene Czarcinski 已提交
1539 1540 1541 1542 1543 1544
    prefixRc = virXPathULong("string(./@prefix)", ctxt, &prefix);
    if (prefixRc == -2) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid ULong value specified for prefix in definition of network '%s'"),
                       networkName);
        goto cleanup;
1545
    }
G
Gene Czarcinski 已提交
1546 1547 1548 1549
    if (prefixRc < 0)
        def->prefix = 0;
    else
        def->prefix = prefix;
1550

G
Gene Czarcinski 已提交
1551 1552
    /* validate address, etc. for each family */
    if ((def->family == NULL) || (STREQ(def->family, "ipv4"))) {
1553 1554
        if (!(VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET) ||
              VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_UNSPEC))) {
1555
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1556 1557
                           _("%s family specified for non-IPv4 address '%s' in network '%s'"),
                           def->family == NULL? "no" : "ipv4", address, networkName);
1558
            goto cleanup;
1559
        }
G
Gene Czarcinski 已提交
1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574
        if (netmask) {
            if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->netmask, AF_INET)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Invalid netmask '%s' for address '%s' "
                                 "in network '%s' (both must be IPv4)"),
                               netmask, address, networkName);
                goto cleanup;
            }
            if (def->prefix > 0) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Network '%s' IP address cannot have "
                                 "both a prefix and a netmask"), networkName);
                goto cleanup;
            }
        } else if (def->prefix > 32) {
1575
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1576 1577
                           _("Invalid IPv4 prefix '%lu' in network '%s'"),
                           prefix, networkName);
1578
            goto cleanup;
1579 1580
        }
    } else if (STREQ(def->family, "ipv6")) {
1581
        if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
1582
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1583
                           _("Family 'ipv6' specified for non-IPv6 address '%s' in network '%s'"),
1584
                           address, networkName);
1585
            goto cleanup;
1586
        }
G
Gene Czarcinski 已提交
1587
        if (netmask) {
1588
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1589
                           _("netmask not allowed for IPv6 address '%s' in network '%s'"),
1590
                           address, networkName);
1591
            goto cleanup;
1592
        }
G
Gene Czarcinski 已提交
1593
        if (def->prefix > 128) {
1594
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1595 1596
                           _("Invalid IPv6 prefix '%lu' in network '%s'"),
                           prefix, networkName);
1597
            goto cleanup;
1598
        }
G
Gene Czarcinski 已提交
1599 1600 1601 1602 1603
    } else {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Unrecognized family '%s' in network '%s'"),
                       def->family, networkName);
        goto cleanup;
1604 1605
    }

G
Gene Czarcinski 已提交
1606 1607 1608 1609 1610 1611 1612 1613 1614
    cur = node->children;
    while (cur != NULL) {
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "dhcp")) {
            if (virNetworkDHCPDefParseXML(networkName, cur, def) < 0)
                goto cleanup;
        } else if (cur->type == XML_ELEMENT_NODE &&
                   xmlStrEqual(cur->name, BAD_CAST "tftp")) {
            char *root;
1615

G
Gene Czarcinski 已提交
1616 1617 1618 1619 1620
            if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Unsupported <tftp> element in an IPv6 element in network '%s'"),
                               networkName);
                goto cleanup;
1621
            }
G
Gene Czarcinski 已提交
1622 1623 1624 1625 1626
            if (!(root = virXMLPropString(cur, "root"))) {
                cur = cur->next;
                continue;
            }
            def->tftproot = (char *)root;
1627
        }
G
Gene Czarcinski 已提交
1628
        cur = cur->next;
1629
    }
1630

1631 1632
    result = 0;

1633
 cleanup:
1634
    if (result < 0)
1635
        virNetworkIPDefClear(def);
1636 1637 1638 1639 1640
    VIR_FREE(address);
    VIR_FREE(netmask);

    ctxt->node = save;
    return result;
1641 1642
}

1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654
static int
virNetworkPortGroupParseXML(virPortGroupDefPtr def,
                            xmlNodePtr node,
                            xmlXPathContextPtr ctxt)
{
    /*
     * virPortGroupDef object is already allocated as part of an array.
     * On failure clear it out, but don't free it.
     */

    xmlNodePtr save;
    xmlNodePtr virtPortNode;
1655
    xmlNodePtr vlanNode;
1656
    xmlNodePtr bandwidth_node;
1657
    char *isDefault = NULL;
1658
    char *trustGuestRxFilters = NULL;
1659 1660 1661 1662 1663 1664 1665 1666

    int result = -1;

    save = ctxt->node;
    ctxt->node = node;

    /* grab raw data from XML */
    def->name = virXPathString("string(./@name)", ctxt);
1667 1668 1669
    if (!def->name) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("Missing required name attribute in portgroup"));
1670
        goto cleanup;
1671 1672
    }

1673 1674 1675
    isDefault = virXPathString("string(./@default)", ctxt);
    def->isDefault = isDefault && STRCASEEQ(isDefault, "yes");

1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687
    trustGuestRxFilters
        = virXPathString("string(./@trustGuestRxFilters)", ctxt);
    if (trustGuestRxFilters) {
        if ((def->trustGuestRxFilters
             = virTristateBoolTypeFromString(trustGuestRxFilters)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid trustGuestRxFilters setting '%s' "
                             "in portgroup"), trustGuestRxFilters);
            goto cleanup;
        }
    }

1688 1689
    virtPortNode = virXPathNode("./virtualport", ctxt);
    if (virtPortNode &&
1690
        (!(def->virtPortProfile = virNetDevVPortProfileParse(virtPortNode, 0)))) {
1691
        goto cleanup;
1692
    }
1693

1694 1695
    bandwidth_node = virXPathNode("./bandwidth", ctxt);
    if (bandwidth_node &&
1696
        virNetDevBandwidthParse(&def->bandwidth, bandwidth_node, -1) < 0)
1697
        goto cleanup;
1698

1699 1700
    vlanNode = virXPathNode("./vlan", ctxt);
    if (vlanNode && virNetDevVlanParse(vlanNode, ctxt, &def->vlan) < 0)
1701
        goto cleanup;
1702

1703
    result = 0;
1704
 cleanup:
1705
    if (result < 0)
1706 1707
        virPortGroupDefClear(def);
    VIR_FREE(isDefault);
1708
    VIR_FREE(trustGuestRxFilters);
1709 1710 1711 1712 1713

    ctxt->node = save;
    return result;
}

1714 1715 1716 1717 1718 1719 1720 1721
static int
virNetworkForwardNatDefParseXML(const char *networkName,
                                xmlNodePtr node,
                                xmlXPathContextPtr ctxt,
                                virNetworkForwardDefPtr def)
{
    int ret = -1;
    xmlNodePtr *natAddrNodes = NULL;
1722 1723
    xmlNodePtr *natPortNodes = NULL;
    int nNatAddrs, nNatPorts;
1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765
    char *addrStart = NULL;
    char *addrEnd = NULL;
    xmlNodePtr save = ctxt->node;

    ctxt->node = node;

    if (def->type != VIR_NETWORK_FORWARD_NAT) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("The <nat> element can only be used when <forward> 'mode' is 'nat' in network %s"),
                       networkName);
        goto cleanup;
    }

    /* addresses for SNAT */
    nNatAddrs = virXPathNodeSet("./address", ctxt, &natAddrNodes);
    if (nNatAddrs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <address> element found in <forward> of "
                         "network %s"), networkName);
        goto cleanup;
    } else if (nNatAddrs > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <address> element is allowed in <nat> in "
                         "<forward> in network %s"), networkName);
        goto cleanup;
    } else if (nNatAddrs == 1) {
        addrStart = virXMLPropString(*natAddrNodes, "start");
        if (addrStart == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("missing 'start' attribute in <address> element in <nat> in "
                             "<forward> in network %s"), networkName);
            goto cleanup;
        }
        addrEnd = virXMLPropString(*natAddrNodes, "end");
        if (addrEnd == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("missing 'end' attribute in <address> element in <nat> in "
                             "<forward> in network %s"), networkName);
            goto cleanup;
        }
    }

1766
    if (addrStart && virSocketAddrParse(&def->addr.start, addrStart, AF_INET) < 0) {
1767 1768 1769 1770 1771 1772
        virReportError(VIR_ERR_XML_ERROR,
                       _("Bad ipv4 start address '%s' in <nat> in <forward> in "
                         "network '%s'"), addrStart, networkName);
        goto cleanup;
    }

1773
    if (addrEnd && virSocketAddrParse(&def->addr.end, addrEnd, AF_INET) < 0) {
1774 1775 1776 1777 1778 1779
        virReportError(VIR_ERR_XML_ERROR,
                       _("Bad ipv4 end address '%s' in <nat> in <forward> in "
                         "network '%s'"), addrEnd, networkName);
        goto cleanup;
    }

1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799
    if (addrStart && addrEnd) {
        /* verify that start <= end */
        if (virSocketAddrGetRange(&def->addr.start, &def->addr.end, NULL, 0) < 0)
            goto cleanup;
    } else {
        if (addrStart) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Only start address '%s' specified in <nat> in "
                             "<forward> in network '%s'"),
                           addrStart, networkName);
            goto cleanup;
        }
        if (addrEnd) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Only end address '%s' specified in <nat> in "
                             "<forward> in network '%s'"),
                           addrEnd, networkName);
            goto cleanup;
        }
    }
1800

1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813
    /* ports for SNAT and MASQUERADE */
    nNatPorts = virXPathNodeSet("./port", ctxt, &natPortNodes);
    if (nNatPorts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <port> element found in <forward> of "
                         "network %s"), networkName);
        goto cleanup;
    } else if (nNatPorts > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <port> element is allowed in <nat> in "
                         "<forward> in network %s"), networkName);
        goto cleanup;
    } else if (nNatPorts == 1) {
1814 1815
        if (virXPathUInt("string(./port[1]/@start)", ctxt, &def->port.start) < 0
            || def->port.start > 65535) {
1816 1817 1818 1819 1820 1821 1822

            virReportError(VIR_ERR_XML_DETAIL,
                           _("Missing or invalid 'start' attribute in <port> "
                             "in <nat> in <forward> in network %s"),
                             networkName);
            goto cleanup;
        }
1823 1824
        if (virXPathUInt("string(./port[1]/@end)", ctxt, &def->port.end) < 0
            || def->port.end > 65535 || def->port.end < def->port.start) {
1825 1826 1827 1828 1829 1830
            virReportError(VIR_ERR_XML_DETAIL,
                           _("Missing or invalid 'end' attribute in <port> in "
                             "<nat> in <forward> in network %s"), networkName);
            goto cleanup;
        }
    }
1831 1832
    ret = 0;

1833
 cleanup:
1834 1835 1836
    VIR_FREE(addrStart);
    VIR_FREE(addrEnd);
    VIR_FREE(natAddrNodes);
1837
    VIR_FREE(natPortNodes);
1838 1839 1840 1841
    ctxt->node = save;
    return ret;
}

1842 1843 1844 1845 1846 1847
static int
virNetworkForwardDefParseXML(const char *networkName,
                             xmlNodePtr node,
                             xmlXPathContextPtr ctxt,
                             virNetworkForwardDefPtr def)
{
1848
    size_t i, j;
1849
    int ret = -1;
1850 1851 1852
    xmlNodePtr *forwardIfNodes = NULL;
    xmlNodePtr *forwardPfNodes = NULL;
    xmlNodePtr *forwardAddrNodes = NULL;
1853 1854
    xmlNodePtr *forwardNatNodes = NULL;
    int nForwardIfs, nForwardAddrs, nForwardPfs, nForwardNats;
1855 1856
    char *forwardDev = NULL;
    char *forwardManaged = NULL;
1857
    char *forwardDriverName = NULL;
1858 1859 1860 1861 1862 1863 1864 1865 1866
    char *type = NULL;
    xmlNodePtr save = ctxt->node;

    ctxt->node = node;

    if (!(type = virXPathString("string(./@mode)", ctxt))) {
        def->type = VIR_NETWORK_FORWARD_NAT;
    } else {
        if ((def->type = virNetworkForwardTypeFromString(type)) < 0) {
1867
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879
                           _("unknown forwarding type '%s'"), type);
            goto cleanup;
        }
        VIR_FREE(type);
    }

    forwardManaged = virXPathString("string(./@managed)", ctxt);
    if (forwardManaged != NULL &&
        STRCASEEQ(forwardManaged, "yes")) {
        def->managed = true;
    }

1880 1881 1882 1883 1884 1885
    forwardDriverName = virXPathString("string(./driver/@name)", ctxt);
    if (forwardDriverName) {
        int driverName
            = virNetworkForwardDriverNameTypeFromString(forwardDriverName);

        if (driverName <= 0) {
1886
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1887 1888 1889 1890 1891 1892 1893 1894
                           _("Unknown forward <driver name='%s'/> "
                             "in network %s"),
                           forwardDriverName, networkName);
            goto cleanup;
        }
        def->driverName = driverName;
    }

1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919
    /* bridge and hostdev modes can use a pool of physical interfaces */
    nForwardIfs = virXPathNodeSet("./interface", ctxt, &forwardIfNodes);
    if (nForwardIfs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <interface> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

    nForwardAddrs = virXPathNodeSet("./address", ctxt, &forwardAddrNodes);
    if (nForwardAddrs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <address> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

    nForwardPfs = virXPathNodeSet("./pf", ctxt, &forwardPfNodes);
    if (nForwardPfs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <pf> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937
    nForwardNats = virXPathNodeSet("./nat", ctxt, &forwardNatNodes);
    if (nForwardNats < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <nat> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardNats > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <nat> element is allowed in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardNats == 1) {
        if (virNetworkForwardNatDefParseXML(networkName,
                                            *forwardNatNodes,
                                            ctxt, def) < 0)
            goto cleanup;
    }

1938 1939 1940 1941 1942 1943 1944 1945 1946 1947
    forwardDev = virXPathString("string(./@dev)", ctxt);
    if (forwardDev && (nForwardAddrs > 0 || nForwardPfs > 0)) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("the <forward> 'dev' attribute cannot be used when "
                         "<address> or <pf> sub-elements are present "
                         "in network %s"));
        goto cleanup;
    }

    if (nForwardIfs > 0 || forwardDev) {
1948
        if (VIR_ALLOC_N(def->ifs, MAX(nForwardIfs, 1)) < 0)
1949 1950 1951 1952 1953 1954 1955 1956 1957 1958
            goto cleanup;

        if (forwardDev) {
            def->ifs[0].device.dev = forwardDev;
            def->ifs[0].type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
            forwardDev = NULL;
            def->nifs++;
        }

        /* parse each <interface> */
1959 1960
        for (i = 0; i < nForwardIfs; i++) {
            forwardDev = virXMLPropString(forwardIfNodes[i], "dev");
1961 1962 1963 1964 1965 1966 1967 1968
            if (!forwardDev) {
                virReportError(VIR_ERR_XML_ERROR,
                               _("Missing required dev attribute in "
                                 "<forward> <interface> element of network %s"),
                               networkName);
                goto cleanup;
            }

1969
            if ((i == 0) && (def->nifs == 1)) {
1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984
                /* both <forward dev='x'> and <interface dev='x'/> are
                 * present.  If they don't match, it's an error.
                 */
                if (STRNEQ(forwardDev, def->ifs[0].device.dev)) {
                    virReportError(VIR_ERR_XML_ERROR,
                                   _("<forward dev='%s'> must match first "
                                     "<interface dev='%s'/> in network %s"),
                                   def->ifs[0].device.dev,
                                   forwardDev, networkName);
                    goto cleanup;
                }
                VIR_FREE(forwardDev);
                continue;
            }

1985 1986 1987 1988 1989 1990 1991 1992 1993 1994
            for (j = 0; j < i; j++) {
                if (STREQ_NULLABLE(def->ifs[j].device.dev, forwardDev)) {
                    virReportError(VIR_ERR_XML_ERROR,
                                   _("interface '%s' can only be "
                                     "listed once in network %s"),
                                   forwardDev, networkName);
                    goto cleanup;
                }
            }

1995
            def->ifs[i].device.dev = forwardDev;
1996
            forwardDev = NULL;
1997
            def->ifs[i].type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
1998 1999 2000 2001
            def->nifs++;
        }

    } else if (nForwardAddrs > 0) {
2002
        if (VIR_ALLOC_N(def->ifs, nForwardAddrs) < 0)
2003 2004
            goto cleanup;

2005 2006
        for (i = 0; i < nForwardAddrs; i++) {
            if (!(type = virXMLPropString(forwardAddrNodes[i], "type"))) {
2007 2008 2009 2010 2011 2012
                virReportError(VIR_ERR_XML_ERROR,
                               _("missing address type in network %s"),
                               networkName);
                goto cleanup;
            }

2013
            if ((def->ifs[i].type = virNetworkForwardHostdevDeviceTypeFromString(type)) < 0) {
2014
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
2015 2016 2017 2018 2019
                               _("unknown address type '%s' in network %s"),
                               type, networkName);
                goto cleanup;
            }

2020
            switch (def->ifs[i].type) {
2021
            case VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI:
2022
            {
2023
                virPCIDeviceAddressPtr addr = &def->ifs[i].device.pci;
2024

2025
                if (virPCIDeviceAddressParseXML(forwardAddrNodes[i], addr) < 0)
2026
                    goto cleanup;
2027 2028

                for (j = 0; j < i; j++) {
2029
                    if (virPCIDeviceAddressEqual(addr, &def->ifs[j].device.pci)) {
2030 2031 2032 2033 2034 2035 2036 2037
                        virReportError(VIR_ERR_XML_ERROR,
                                       _("PCI device '%04x:%02x:%02x.%x' can "
                                         "only be listed once in network %s"),
                                       addr->domain, addr->bus,
                                       addr->slot, addr->function,
                                       networkName);
                        goto cleanup;
                    }
2038 2039
                }
                break;
2040
            }
2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058
            /* Add USB case here if we ever find a reason to support it */

            default:
                virReportError(VIR_ERR_XML_ERROR,
                               _("unsupported address type '%s' in network %s"),
                               type, networkName);
                goto cleanup;
            }
            VIR_FREE(type);
            def->nifs++;
        }

    } else if (nForwardPfs > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <pf> element is allowed in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardPfs == 1) {
2059
        if (VIR_ALLOC_N(def->pfs, nForwardPfs) < 0)
2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076
            goto cleanup;

        forwardDev = virXMLPropString(*forwardPfNodes, "dev");
        if (!forwardDev) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Missing required dev attribute "
                             "in <pf> element of network '%s'"),
                           networkName);
            goto cleanup;
        }

        def->pfs->dev = forwardDev;
        forwardDev = NULL;
        def->npfs++;
    }

    ret = 0;
2077
 cleanup:
2078 2079 2080
    VIR_FREE(type);
    VIR_FREE(forwardDev);
    VIR_FREE(forwardManaged);
2081
    VIR_FREE(forwardDriverName);
2082 2083 2084
    VIR_FREE(forwardPfNodes);
    VIR_FREE(forwardIfNodes);
    VIR_FREE(forwardAddrNodes);
2085
    VIR_FREE(forwardNatNodes);
2086 2087 2088 2089
    ctxt->node = save;
    return ret;
}

2090
static virNetworkDefPtr
2091
virNetworkDefParseXML(xmlXPathContextPtr ctxt)
2092 2093
{
    virNetworkDefPtr def;
2094
    char *tmp = NULL;
2095
    char *stp = NULL;
2096
    xmlNodePtr *ipNodes = NULL;
2097
    xmlNodePtr *routeNodes = NULL;
2098
    xmlNodePtr *portGroupNodes = NULL;
2099
    int nips, nPortGroups, nRoutes;
2100
    xmlNodePtr dnsNode = NULL;
2101 2102
    xmlNodePtr virtPortNode = NULL;
    xmlNodePtr forwardNode = NULL;
2103
    char *ipv6nogwStr = NULL;
2104
    char *trustGuestRxFilters = NULL;
2105
    xmlNodePtr save = ctxt->node;
2106
    xmlNodePtr bandwidthNode = NULL;
2107
    xmlNodePtr vlanNode;
2108
    xmlNodePtr metadataNode = NULL;
2109

2110
    if (VIR_ALLOC(def) < 0)
2111 2112 2113
        return NULL;

    /* Extract network name */
2114
    def->name = virXPathString("string(./name[1])", ctxt);
2115
    if (!def->name) {
2116
        virReportError(VIR_ERR_NO_NAME, NULL);
2117 2118 2119
        goto error;
    }

2120 2121 2122 2123 2124 2125
    if (strchr(def->name, '/')) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("name %s cannot contain '/'"), def->name);
        goto error;
    }

2126
    /* Extract network uuid */
2127
    tmp = virXPathString("string(./uuid[1])", ctxt);
2128
    if (!tmp) {
2129
        if (virUUIDGenerate(def->uuid)) {
2130 2131
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("Failed to generate UUID"));
2132 2133 2134 2135
            goto error;
        }
    } else {
        if (virUUIDParse(tmp, def->uuid) < 0) {
2136 2137
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("malformed uuid element"));
2138 2139 2140
            goto error;
        }
        VIR_FREE(tmp);
M
Matthias Bolte 已提交
2141
        def->uuid_specified = true;
2142 2143
    }

2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159
    /* check if definitions with no IPv6 gateway addresses is to
     * allow guest-to-guest communications.
     */
    ipv6nogwStr = virXPathString("string(./@ipv6)", ctxt);
    if (ipv6nogwStr) {
        if (STREQ(ipv6nogwStr, "yes")) {
            def->ipv6nogw = true;
        } else if (STRNEQ(ipv6nogwStr, "no")) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid ipv6 setting '%s' in network '%s'"),
                           ipv6nogwStr, def->name);
            goto error;
        }
        VIR_FREE(ipv6nogwStr);
    }

2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173
    trustGuestRxFilters
        = virXPathString("string(./@trustGuestRxFilters)", ctxt);
    if (trustGuestRxFilters) {
        if ((def->trustGuestRxFilters
             = virTristateBoolTypeFromString(trustGuestRxFilters)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid trustGuestRxFilters setting '%s' "
                             "in network '%s'"),
                           trustGuestRxFilters, def->name);
            goto error;
        }
        VIR_FREE(trustGuestRxFilters);
    }

2174
    /* Parse network domain information */
2175
    def->domain = virXPathString("string(./domain[1]/@name)", ctxt);
2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187
    tmp = virXPathString("string(./domain[1]/@localOnly)", ctxt);
    if (tmp) {
        def->domainLocalOnly = virTristateBoolTypeFromString(tmp);
        if (def->domainLocalOnly <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid domain localOnly setting '%s' "
                             "in network '%s'"),
                           tmp, def->name);
            goto error;
        }
        VIR_FREE(tmp);
    }
2188

2189 2190
    if ((bandwidthNode = virXPathNode("./bandwidth", ctxt)) &&
        virNetDevBandwidthParse(&def->bandwidth, bandwidthNode, -1) < 0)
2191 2192
        goto error;

2193 2194 2195 2196
    vlanNode = virXPathNode("./vlan", ctxt);
    if (vlanNode && virNetDevVlanParse(vlanNode, ctxt, &def->vlan) < 0)
        goto error;

2197
    /* Parse bridge information */
2198
    def->bridge = virXPathString("string(./bridge[1]/@name)", ctxt);
2199
    stp = virXPathString("string(./bridge[1]/@stp)", ctxt);
2200
    def->stp = (stp && STREQ(stp, "off")) ? false : true;
2201

2202 2203 2204 2205 2206 2207 2208 2209 2210 2211
    tmp = virXPathString("string(./bridge[1]/@delay)", ctxt);
    if (tmp) {
        if (virStrToLong_ulp(tmp, NULL, 10, &def->delay) < 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid delay value in network '%s'"),
                           def->name);
            goto error;
        }
    }
    VIR_FREE(tmp);
2212

2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224
    tmp = virXPathString("string(./bridge[1]/@macTableManager)", ctxt);
    if (tmp) {
        if ((def->macTableManager
             = virNetworkBridgeMACTableManagerTypeFromString(tmp)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid macTableManager setting '%s' "
                             "in network '%s'"), tmp, def->name);
            goto error;
        }
        VIR_FREE(tmp);
    }

2225 2226
    tmp = virXPathString("string(./mac[1]/@address)", ctxt);
    if (tmp) {
2227
        if (virMacAddrParse(tmp, &def->mac) < 0) {
2228 2229 2230
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid bridge mac address '%s' in network '%s'"),
                           tmp, def->name);
2231 2232
            goto error;
        }
2233
        if (virMacAddrIsMulticast(&def->mac)) {
2234 2235 2236
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid multicast bridge mac address '%s' in network '%s'"),
                           tmp, def->name);
2237 2238
            goto error;
        }
2239 2240 2241 2242
        VIR_FREE(tmp);
        def->mac_specified = true;
    }

2243
    dnsNode = virXPathNode("./dns", ctxt);
2244 2245 2246
    if (dnsNode != NULL &&
        virNetworkDNSDefParseXML(def->name, dnsNode, ctxt, &def->dns) < 0) {
        goto error;
2247 2248
    }

2249 2250
    virtPortNode = virXPathNode("./virtualport", ctxt);
    if (virtPortNode &&
2251 2252
        (!(def->virtPortProfile = virNetDevVPortProfileParse(virtPortNode,
                                                             VIR_VPORT_XML_REQUIRE_TYPE)))) {
2253
        goto error;
2254
    }
2255 2256 2257 2258 2259 2260

    nPortGroups = virXPathNodeSet("./portgroup", ctxt, &portGroupNodes);
    if (nPortGroups < 0)
        goto error;

    if (nPortGroups > 0) {
2261
        size_t i;
2262 2263

        /* allocate array to hold all the portgroups */
2264
        if (VIR_ALLOC_N(def->portGroups, nPortGroups) < 0)
2265 2266
            goto error;
        /* parse each portgroup */
2267
        for (i = 0; i < nPortGroups; i++) {
2268 2269 2270
            if (virNetworkPortGroupParseXML(&def->portGroups[i],
                                            portGroupNodes[i],
                                            ctxt) < 0)
2271 2272 2273 2274 2275 2276
                goto error;
            def->nPortGroups++;
        }
    }
    VIR_FREE(portGroupNodes);

2277 2278
    nips = virXPathNodeSet("./ip", ctxt, &ipNodes);
    if (nips < 0)
2279 2280
        goto error;

2281
    if (nips > 0) {
2282
        size_t i;
2283

2284
        /* allocate array to hold all the addrs */
2285
        if (VIR_ALLOC_N(def->ips, nips) < 0)
2286
            goto error;
2287
        /* parse each addr */
2288
        for (i = 0; i < nips; i++) {
2289 2290 2291 2292
            if (virNetworkIPDefParseXML(def->name,
                                        ipNodes[i],
                                        ctxt,
                                        &def->ips[i]) < 0)
2293 2294
                goto error;
            def->nips++;
2295
        }
2296
    }
E
Eric Blake 已提交
2297
    VIR_FREE(ipNodes);
2298

2299 2300 2301 2302 2303
    nRoutes = virXPathNodeSet("./route", ctxt, &routeNodes);
    if (nRoutes < 0)
        goto error;

    if (nRoutes > 0) {
2304
        size_t i;
2305 2306

        /* allocate array to hold all the route definitions */
2307
        if (VIR_ALLOC_N(def->routes, nRoutes) < 0)
2308 2309
            goto error;
        /* parse each definition */
2310
        for (i = 0; i < nRoutes; i++) {
2311
            virNetDevIPRoutePtr route = NULL;
2312

2313 2314 2315
            if (!(route = virNetDevIPRouteParseXML(def->name,
                                                   routeNodes[i],
                                                   ctxt)))
2316
                goto error;
2317
            def->routes[i] = route;
2318 2319 2320 2321 2322 2323 2324 2325 2326 2327
            def->nroutes++;
        }

        /* now validate the correctness of any static route gateways specified
         *
         * note: the parameters within each definition are verified/assumed valid;
         * the question being asked and answered here is if the specified gateway
         * is directly reachable from this bridge.
         */
        nRoutes = def->nroutes;
2328
        nips = def->nips;
2329 2330
        for (i = 0; i < nRoutes; i++) {
            size_t j;
2331 2332
            virSocketAddr testAddr, testGw;
            bool addrMatch;
2333 2334
            virNetDevIPRoutePtr gwdef = def->routes[i];
            virSocketAddrPtr gateway = virNetDevIPRouteGetGateway(gwdef);
2335
            addrMatch = false;
2336 2337
            for (j = 0; j < nips; j++) {
                virNetworkIPDefPtr def2 = &def->ips[j];
2338
                if (VIR_SOCKET_ADDR_FAMILY(gateway)
2339 2340 2341
                    != VIR_SOCKET_ADDR_FAMILY(&def2->address)) {
                    continue;
                }
2342
                int prefix = virNetworkIPDefPrefix(def2);
2343
                virSocketAddrMaskByPrefix(&def2->address, prefix, &testAddr);
2344
                virSocketAddrMaskByPrefix(gateway, prefix, &testGw);
2345 2346 2347 2348 2349 2350 2351 2352
                if (VIR_SOCKET_ADDR_VALID(&testAddr) &&
                    VIR_SOCKET_ADDR_VALID(&testGw) &&
                    virSocketAddrEqual(&testAddr, &testGw)) {
                    addrMatch = true;
                    break;
                }
            }
            if (!addrMatch) {
2353
                char *gw = virSocketAddrFormat(gateway);
2354 2355 2356 2357 2358 2359 2360 2361 2362 2363
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unreachable static route gateway '%s' specified for network '%s'"),
                               gw, def->name);
                VIR_FREE(gw);
                goto error;
            }
        }
    }
    VIR_FREE(routeNodes);

2364
    forwardNode = virXPathNode("./forward", ctxt);
2365 2366 2367 2368
    if (forwardNode &&
        virNetworkForwardDefParseXML(def->name, forwardNode, ctxt, &def->forward) < 0) {
        goto error;
    }
2369

2370 2371 2372 2373 2374 2375 2376 2377 2378
    /* Validate some items in the main NetworkDef that need to align
     * with the chosen forward mode.
     */
    switch (def->forward.type) {
    case VIR_NETWORK_FORWARD_NONE:
        break;

    case VIR_NETWORK_FORWARD_ROUTE:
    case VIR_NETWORK_FORWARD_NAT:
2379
    case VIR_NETWORK_FORWARD_OPEN:
2380 2381 2382 2383 2384 2385 2386 2387 2388
        /* It's pointless to specify L3 forwarding without specifying
         * the network we're on.
         */
        if (def->nips == 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("%s forwarding requested, "
                             "but no IP address provided for network '%s'"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2389
            goto error;
2390
        }
2391 2392 2393 2394 2395
        if (def->forward.nifs > 1) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("multiple forwarding interfaces specified "
                             "for network '%s', only one is supported"),
                           def->name);
2396 2397
            goto error;
        }
2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410

        if (def->forward.type == VIR_NETWORK_FORWARD_OPEN && def->forward.nifs) {
            /* an open network by definition can't place any restrictions
             * on what traffic is allowed or where it goes, so specifying
             * a forwarding device is nonsensical.
             */
            virReportError(VIR_ERR_XML_ERROR,
                           _("forward dev not allowed for "
                             "network '%s' with forward mode='%s'"),
                           def->name,
                           virNetworkForwardTypeToString(def->forward.type));
            goto error;
        }
2411
        break;
2412

2413 2414 2415 2416 2417 2418 2419 2420 2421
    case VIR_NETWORK_FORWARD_PRIVATE:
    case VIR_NETWORK_FORWARD_VEPA:
    case VIR_NETWORK_FORWARD_PASSTHROUGH:
    case VIR_NETWORK_FORWARD_HOSTDEV:
        if (def->bridge) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge name not allowed in %s mode (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2422 2423
            goto error;
        }
2424 2425 2426 2427 2428 2429 2430 2431
        if (def->macTableManager) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge macTableManager setting not allowed "
                             "in %s mode (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
            goto error;
        }
2432 2433 2434 2435 2436 2437 2438
        /* fall through to next case */
    case VIR_NETWORK_FORWARD_BRIDGE:
        if (def->delay || stp) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge delay/stp options only allowed in route, nat, and isolated mode, not in %s (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2439 2440
            goto error;
        }
2441 2442 2443 2444 2445 2446 2447 2448
        if (def->bridge && (def->forward.nifs || def->forward.npfs)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("A network with forward mode='%s' can specify "
                             "a bridge name or a forward dev, but not "
                             "both (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
            goto error;
2449
        }
2450
        break;
2451
    }
2452

2453
    VIR_FREE(stp);
2454 2455 2456 2457 2458 2459 2460

    /* Extract custom metadata */
    if ((metadataNode = virXPathNode("./metadata[1]", ctxt)) != NULL) {
        def->metadata = xmlCopyNode(metadataNode, 1);
        virXMLNodeSanitizeNamespaces(def->metadata);
    }

2461
    ctxt->node = save;
2462 2463
    return def;

2464
 error:
2465
    VIR_FREE(tmp);
2466
    VIR_FREE(routeNodes);
2467
    VIR_FREE(stp);
2468
    virNetworkDefFree(def);
E
Eric Blake 已提交
2469
    VIR_FREE(ipNodes);
2470
    VIR_FREE(portGroupNodes);
2471
    VIR_FREE(ipv6nogwStr);
2472
    VIR_FREE(trustGuestRxFilters);
2473
    ctxt->node = save;
2474 2475 2476
    return NULL;
}

J
Jiri Denemark 已提交
2477 2478 2479
static virNetworkDefPtr
virNetworkDefParse(const char *xmlStr,
                   const char *filename)
2480
{
J
Jiri Denemark 已提交
2481
    xmlDocPtr xml;
2482
    virNetworkDefPtr def = NULL;
2483
    int keepBlanksDefault = xmlKeepBlanksDefault(0);
2484

2485
    if ((xml = virXMLParse(filename, xmlStr, _("(network_definition)")))) {
J
Jiri Denemark 已提交
2486 2487
        def = virNetworkDefParseNode(xml, xmlDocGetRootElement(xml));
        xmlFreeDoc(xml);
2488 2489
    }

2490
    xmlKeepBlanksDefault(keepBlanksDefault);
2491 2492 2493
    return def;
}

J
Jiri Denemark 已提交
2494
virNetworkDefPtr virNetworkDefParseString(const char *xmlStr)
2495
{
J
Jiri Denemark 已提交
2496 2497
    return virNetworkDefParse(xmlStr, NULL);
}
2498

J
Jiri Denemark 已提交
2499 2500 2501
virNetworkDefPtr virNetworkDefParseFile(const char *filename)
{
    return virNetworkDefParse(NULL, filename);
2502 2503 2504
}


2505
virNetworkDefPtr virNetworkDefParseNode(xmlDocPtr xml,
2506 2507 2508 2509 2510 2511
                                        xmlNodePtr root)
{
    xmlXPathContextPtr ctxt = NULL;
    virNetworkDefPtr def = NULL;

    if (!xmlStrEqual(root->name, BAD_CAST "network")) {
2512 2513 2514 2515
        virReportError(VIR_ERR_XML_ERROR,
                       _("unexpected root element <%s>, "
                         "expecting <network>"),
                       root->name);
2516 2517 2518 2519 2520
        return NULL;
    }

    ctxt = xmlXPathNewContext(xml);
    if (ctxt == NULL) {
2521
        virReportOOMError();
2522 2523 2524 2525
        goto cleanup;
    }

    ctxt->node = root;
2526
    def = virNetworkDefParseXML(ctxt);
2527

2528
 cleanup:
2529 2530 2531 2532
    xmlXPathFreeContext(ctxt);
    return def;
}

2533

2534 2535
static int
virNetworkDNSDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2536
                       const virNetworkDNSDef *def)
2537
{
2538
    size_t i, j;
2539

2540
    if (!(def->enable || def->forwardPlainNames || def->nfwds || def->nhosts ||
2541
          def->nsrvs || def->ntxts))
2542
        return 0;
2543

2544
    virBufferAddLit(buf, "<dns");
2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555
    if (def->enable) {
        const char *fwd = virTristateBoolTypeToString(def->enable);

        if (!fwd) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown enable type %d in network"),
                           def->enable);
            return -1;
        }
        virBufferAsprintf(buf, " enable='%s'", fwd);
    }
2556
    if (def->forwardPlainNames) {
J
Ján Tomko 已提交
2557
        const char *fwd = virTristateBoolTypeToString(def->forwardPlainNames);
2558 2559 2560 2561 2562 2563 2564 2565

        if (!fwd) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown forwardPlainNames type %d in network"),
                           def->forwardPlainNames);
            return -1;
        }
        virBufferAsprintf(buf, " forwardPlainNames='%s'", fwd);
2566 2567 2568 2569
    }
    if (!(def->nfwds || def->nhosts || def->nsrvs || def->ntxts)) {
        virBufferAddLit(buf, "/>\n");
        return 0;
2570 2571 2572
    }

    virBufferAddLit(buf, ">\n");
2573
    virBufferAdjustIndent(buf, 2);
2574

2575
    for (i = 0; i < def->nfwds; i++) {
2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591

        virBufferAddLit(buf, "<forwarder");
        if (def->forwarders[i].domain) {
            virBufferEscapeString(buf, " domain='%s'",
                                  def->forwarders[i].domain);
        }
        if (VIR_SOCKET_ADDR_VALID(&def->forwarders[i].addr)) {
        char *addr = virSocketAddrFormat(&def->forwarders[i].addr);

        if (!addr)
            return -1;

        virBufferAsprintf(buf, " addr='%s'", addr);
        VIR_FREE(addr);
        }
        virBufferAddLit(buf, "/>\n");
2592 2593
    }

2594
    for (i = 0; i < def->ntxts; i++) {
2595 2596
        virBufferEscapeString(buf, "<txt name='%s' ", def->txts[i].name);
        virBufferEscapeString(buf, "value='%s'/>\n", def->txts[i].value);
2597 2598
    }

2599
    for (i = 0; i < def->nsrvs; i++) {
2600
        if (def->srvs[i].service && def->srvs[i].protocol) {
2601 2602 2603
            virBufferEscapeString(buf, "<srv service='%s' ",
                                  def->srvs[i].service);
            virBufferEscapeString(buf, "protocol='%s'", def->srvs[i].protocol);
2604 2605

            if (def->srvs[i].domain)
2606
                virBufferEscapeString(buf, " domain='%s'", def->srvs[i].domain);
2607
            if (def->srvs[i].target)
2608
                virBufferEscapeString(buf, " target='%s'", def->srvs[i].target);
2609 2610 2611 2612 2613 2614
            if (def->srvs[i].port)
                virBufferAsprintf(buf, " port='%d'", def->srvs[i].port);
            if (def->srvs[i].priority)
                virBufferAsprintf(buf, " priority='%d'", def->srvs[i].priority);
            if (def->srvs[i].weight)
                virBufferAsprintf(buf, " weight='%d'", def->srvs[i].weight);
2615

2616
            virBufferAddLit(buf, "/>\n");
2617 2618 2619
        }
    }

2620
    if (def->nhosts) {
2621 2622
        for (i = 0; i < def->nhosts; i++) {
            char *ip = virSocketAddrFormat(&def->hosts[i].ip);
2623

2624 2625
            virBufferAsprintf(buf, "<host ip='%s'>\n", ip);
            virBufferAdjustIndent(buf, 2);
2626
            for (j = 0; j < def->hosts[i].nnames; j++)
2627 2628
                virBufferEscapeString(buf, "<hostname>%s</hostname>\n",
                                      def->hosts[i].names[j]);
2629

2630
            virBufferAdjustIndent(buf, -2);
2631
            virBufferAddLit(buf, "</host>\n");
2632
            VIR_FREE(ip);
2633 2634
        }
    }
2635 2636
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</dns>\n");
2637
    return 0;
2638 2639
}

2640
static int
2641 2642
virNetworkIPDefFormat(virBufferPtr buf,
                      const virNetworkIPDef *def)
2643 2644 2645
{
    int result = -1;

2646
    virBufferAddLit(buf, "<ip");
2647

2648
    if (def->family)
2649
        virBufferAsprintf(buf, " family='%s'", def->family);
2650 2651
    if (VIR_SOCKET_ADDR_VALID(&def->address)) {
        char *addr = virSocketAddrFormat(&def->address);
2652 2653
        if (!addr)
            goto error;
2654
        virBufferAsprintf(buf, " address='%s'", addr);
2655 2656
        VIR_FREE(addr);
    }
2657 2658
    if (VIR_SOCKET_ADDR_VALID(&def->netmask)) {
        char *addr = virSocketAddrFormat(&def->netmask);
2659 2660
        if (!addr)
            goto error;
2661
        virBufferAsprintf(buf, " netmask='%s'", addr);
2662 2663
        VIR_FREE(addr);
    }
2664
    if (def->prefix > 0)
E
Eric Blake 已提交
2665
        virBufferAsprintf(buf, " prefix='%u'", def->prefix);
2666
    virBufferAddLit(buf, ">\n");
2667
    virBufferAdjustIndent(buf, 2);
2668 2669

    if (def->tftproot) {
2670
        virBufferEscapeString(buf, "<tftp root='%s'/>\n",
2671 2672 2673
                              def->tftproot);
    }
    if ((def->nranges || def->nhosts)) {
2674
        size_t i;
2675 2676 2677
        virBufferAddLit(buf, "<dhcp>\n");
        virBufferAdjustIndent(buf, 2);

2678 2679
        for (i = 0; i < def->nranges; i++) {
            char *saddr = virSocketAddrFormat(&def->ranges[i].start);
2680 2681
            if (!saddr)
                goto error;
2682
            char *eaddr = virSocketAddrFormat(&def->ranges[i].end);
2683 2684 2685 2686
            if (!eaddr) {
                VIR_FREE(saddr);
                goto error;
            }
2687
            virBufferAsprintf(buf, "<range start='%s' end='%s'/>\n",
2688 2689 2690 2691
                              saddr, eaddr);
            VIR_FREE(saddr);
            VIR_FREE(eaddr);
        }
2692
        for (i = 0; i < def->nhosts; i++) {
2693
            virBufferAddLit(buf, "<host");
2694
            if (def->hosts[i].mac)
2695
                virBufferAsprintf(buf, " mac='%s'", def->hosts[i].mac);
2696
            if (def->hosts[i].id)
2697
                virBufferAsprintf(buf, " id='%s'", def->hosts[i].id);
2698
            if (def->hosts[i].name)
2699
                virBufferAsprintf(buf, " name='%s'", def->hosts[i].name);
2700 2701
            if (VIR_SOCKET_ADDR_VALID(&def->hosts[i].ip)) {
                char *ipaddr = virSocketAddrFormat(&def->hosts[i].ip);
2702 2703
                if (!ipaddr)
                    goto error;
2704
                virBufferAsprintf(buf, " ip='%s'", ipaddr);
2705 2706 2707 2708 2709
                VIR_FREE(ipaddr);
            }
            virBufferAddLit(buf, "/>\n");
        }
        if (def->bootfile) {
2710
            virBufferEscapeString(buf, "<bootp file='%s'",
2711
                                  def->bootfile);
2712 2713
            if (VIR_SOCKET_ADDR_VALID(&def->bootserver)) {
                char *ipaddr = virSocketAddrFormat(&def->bootserver);
2714 2715
                if (!ipaddr)
                    goto error;
2716
                virBufferEscapeString(buf, " server='%s'", ipaddr);
2717 2718 2719
                VIR_FREE(ipaddr);
            }
            virBufferAddLit(buf, "/>\n");
2720

2721 2722
        }

2723 2724
        virBufferAdjustIndent(buf, -2);
        virBufferAddLit(buf, "</dhcp>\n");
2725 2726
    }

2727 2728
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</ip>\n");
2729 2730

    result = 0;
2731
 error:
2732 2733 2734
    return result;
}

2735
static int
2736
virPortGroupDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2737
                      const virPortGroupDef *def)
2738
{
2739
    virBufferAsprintf(buf, "<portgroup name='%s'", def->name);
2740
    if (def->isDefault)
2741
        virBufferAddLit(buf, " default='yes'");
2742 2743 2744
    if (def->trustGuestRxFilters)
        virBufferAsprintf(buf, " trustGuestRxFilters='%s'",
                          virTristateBoolTypeToString(def->trustGuestRxFilters));
2745
    virBufferAddLit(buf, ">\n");
2746
    virBufferAdjustIndent(buf, 2);
2747 2748
    if (virNetDevVlanFormat(&def->vlan, buf) < 0)
        return -1;
2749 2750
    if (virNetDevVPortProfileFormat(def->virtPortProfile, buf) < 0)
        return -1;
2751
    virNetDevBandwidthFormat(def->bandwidth, buf);
2752 2753
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</portgroup>\n");
2754
    return 0;
2755 2756
}

2757 2758
static int
virNetworkForwardNatDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2759
                              const virNetworkForwardDef *fwd)
2760 2761 2762 2763 2764
{
    char *addrStart = NULL;
    char *addrEnd = NULL;
    int ret = -1;

2765 2766
    if (VIR_SOCKET_ADDR_VALID(&fwd->addr.start)) {
        addrStart = virSocketAddrFormat(&fwd->addr.start);
2767 2768 2769 2770
        if (!addrStart)
            goto cleanup;
    }

2771 2772
    if (VIR_SOCKET_ADDR_VALID(&fwd->addr.end)) {
        addrEnd = virSocketAddrFormat(&fwd->addr.end);
2773 2774 2775 2776
        if (!addrEnd)
            goto cleanup;
    }

2777
    if (!addrEnd && !addrStart && !fwd->port.start && !fwd->port.end)
2778 2779 2780 2781 2782
        return 0;

    virBufferAddLit(buf, "<nat>\n");
    virBufferAdjustIndent(buf, 2);

2783 2784 2785 2786 2787 2788 2789
    if (addrStart) {
        virBufferAsprintf(buf, "<address start='%s'", addrStart);
        if (addrEnd)
            virBufferAsprintf(buf, " end='%s'", addrEnd);
        virBufferAddLit(buf, "/>\n");
    }

2790 2791 2792 2793
    if (fwd->port.start || fwd->port.end) {
        virBufferAsprintf(buf, "<port start='%d'", fwd->port.start);
        if (fwd->port.end)
            virBufferAsprintf(buf, " end='%d'", fwd->port.end);
2794 2795
        virBufferAddLit(buf, "/>\n");
    }
2796 2797 2798 2799 2800

    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</nat>\n");
    ret = 0;

2801
 cleanup:
2802 2803 2804 2805 2806
    VIR_FREE(addrStart);
    VIR_FREE(addrEnd);
    return ret;
}

2807 2808 2809 2810
int
virNetworkDefFormatBuf(virBufferPtr buf,
                       const virNetworkDef *def,
                       unsigned int flags)
2811
{
E
Eric Blake 已提交
2812
    const unsigned char *uuid;
2813
    char uuidstr[VIR_UUID_STRING_BUFLEN];
2814
    size_t i;
J
Ján Tomko 已提交
2815
    bool shortforward;
2816

2817
    virBufferAddLit(buf, "<network");
2818
    if (!(flags & VIR_NETWORK_XML_INACTIVE) && (def->connections > 0))
2819
        virBufferAsprintf(buf, " connections='%d'", def->connections);
2820
    if (def->ipv6nogw)
2821
        virBufferAddLit(buf, " ipv6='yes'");
2822 2823 2824
    if (def->trustGuestRxFilters)
        virBufferAsprintf(buf, " trustGuestRxFilters='%s'",
                          virTristateBoolTypeToString(def->trustGuestRxFilters));
2825 2826 2827
    virBufferAddLit(buf, ">\n");
    virBufferAdjustIndent(buf, 2);
    virBufferEscapeString(buf, "<name>%s</name>\n", def->name);
2828 2829 2830

    uuid = def->uuid;
    virUUIDFormat(uuid, uuidstr);
2831
    virBufferAsprintf(buf, "<uuid>%s</uuid>\n", uuidstr);
2832

2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851 2852 2853 2854 2855
    if (def->metadata) {
        xmlBufferPtr xmlbuf;
        int oldIndentTreeOutput = xmlIndentTreeOutput;

        /* Indentation on output requires that we previously set
         * xmlKeepBlanksDefault to 0 when parsing; also, libxml does 2
         * spaces per level of indentation of intermediate elements,
         * but no leading indentation before the starting element.
         * Thankfully, libxml maps what looks like globals into
         * thread-local uses, so we are thread-safe.  */
        xmlIndentTreeOutput = 1;
        xmlbuf = xmlBufferCreate();
        if (xmlNodeDump(xmlbuf, def->metadata->doc, def->metadata,
                        virBufferGetIndent(buf, false) / 2, 1) < 0) {
            xmlBufferFree(xmlbuf);
            xmlIndentTreeOutput = oldIndentTreeOutput;
            goto error;
        }
        virBufferAsprintf(buf, "%s\n", (char *) xmlBufferContent(xmlbuf));
        xmlBufferFree(xmlbuf);
        xmlIndentTreeOutput = oldIndentTreeOutput;
    }

2856
    if (def->forward.type != VIR_NETWORK_FORWARD_NONE) {
2857
        const char *dev = NULL;
2858
        if (!def->forward.npfs)
2859
            dev = virNetworkDefForwardIf(def, 0);
2860
        const char *mode = virNetworkForwardTypeToString(def->forward.type);
2861 2862

        if (!mode) {
2863 2864
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown forward type %d in network '%s'"),
2865
                           def->forward.type, def->name);
2866 2867
            goto error;
        }
2868 2869 2870
        virBufferAddLit(buf, "<forward");
        virBufferEscapeString(buf, " dev='%s'", dev);
        virBufferAsprintf(buf, " mode='%s'", mode);
2871 2872
        if (def->forward.type == VIR_NETWORK_FORWARD_HOSTDEV) {
            if (def->forward.managed)
2873
                virBufferAddLit(buf, " managed='yes'");
2874
            else
2875
                virBufferAddLit(buf, " managed='no'");
2876
        }
2877
        shortforward = !(def->forward.nifs || def->forward.npfs
2878 2879 2880
                         || VIR_SOCKET_ADDR_VALID(&def->forward.addr.start)
                         || VIR_SOCKET_ADDR_VALID(&def->forward.addr.end)
                         || def->forward.port.start
2881 2882 2883
                         || def->forward.port.end
                         || (def->forward.driverName
                             != VIR_NETWORK_FORWARD_DRIVER_NAME_DEFAULT));
2884
        virBufferAsprintf(buf, "%s>\n", shortforward ? "/" : "");
2885
        virBufferAdjustIndent(buf, 2);
2886

2887 2888 2889 2890 2891 2892 2893 2894 2895 2896 2897 2898
        if (def->forward.driverName
            != VIR_NETWORK_FORWARD_DRIVER_NAME_DEFAULT) {
            const char *driverName
                = virNetworkForwardDriverNameTypeToString(def->forward.driverName);
            if (!driverName) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("unexpected hostdev driver name type %d "),
                               def->forward.driverName);
                goto error;
            }
            virBufferAsprintf(buf, "<driver name='%s'/>\n", driverName);
        }
2899 2900 2901 2902 2903
        if (def->forward.type == VIR_NETWORK_FORWARD_NAT) {
            if (virNetworkForwardNatDefFormat(buf, &def->forward) < 0)
                goto error;
        }

2904 2905
        /* For now, hard-coded to at most 1 forward.pfs */
        if (def->forward.npfs)
2906
            virBufferEscapeString(buf, "<pf dev='%s'/>\n",
2907
                                  def->forward.pfs[0].dev);
2908

2909 2910
        if (def->forward.nifs &&
            (!def->forward.npfs || !(flags & VIR_NETWORK_XML_INACTIVE))) {
2911
            for (i = 0; i < def->forward.nifs; i++) {
2912
                if (def->forward.ifs[i].type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV) {
2913
                    virBufferEscapeString(buf, "<interface dev='%s'",
2914
                                          def->forward.ifs[i].device.dev);
2915
                    if (!(flags & VIR_NETWORK_XML_INACTIVE) &&
2916
                        (def->forward.ifs[i].connections > 0)) {
2917
                        virBufferAsprintf(buf, " connections='%d'",
2918
                                          def->forward.ifs[i].connections);
2919
                    }
2920
                    virBufferAddLit(buf, "/>\n");
2921
                } else {
2922
                    if (def->forward.ifs[i].type ==  VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI) {
2923
                        if (virPCIDeviceAddressFormat(buf,
2924
                                                      def->forward.ifs[i].device.pci,
2925 2926 2927
                                                      true) < 0)
                            goto error;
                    }
2928
                }
2929 2930
            }
        }
2931
        virBufferAdjustIndent(buf, -2);
2932
        if (!shortforward)
2933
            virBufferAddLit(buf, "</forward>\n");
2934 2935
    }

2936

2937
    if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
2938 2939
        def->forward.type == VIR_NETWORK_FORWARD_NAT ||
        def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
2940
        def->forward.type == VIR_NETWORK_FORWARD_OPEN ||
2941
        def->bridge || def->macTableManager) {
2942

2943
        virBufferAddLit(buf, "<bridge");
2944 2945 2946
        virBufferEscapeString(buf, " name='%s'", def->bridge);
        if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
            def->forward.type == VIR_NETWORK_FORWARD_NAT ||
2947 2948
            def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
            def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
2949 2950 2951 2952 2953 2954 2955 2956
            virBufferAsprintf(buf, " stp='%s' delay='%ld'",
                              def->stp ? "on" : "off", def->delay);
        }
        if (def->macTableManager) {
            virBufferAsprintf(buf, " macTableManager='%s'",
                             virNetworkBridgeMACTableManagerTypeToString(def->macTableManager));
        }
        virBufferAddLit(buf, "/>\n");
2957 2958
    }

2959 2960
    if (def->mac_specified) {
        char macaddr[VIR_MAC_STRING_BUFLEN];
2961
        virMacAddrFormat(&def->mac, macaddr);
2962
        virBufferAsprintf(buf, "<mac address='%s'/>\n", macaddr);
2963
    }
2964

2965 2966 2967 2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978 2979 2980 2981 2982
    if (def->domain) {
        virBufferAsprintf(buf, "<domain name='%s'", def->domain);

        /* default to "no", but don't format it in the XML */
        if (def->domainLocalOnly) {
            const char *local = virTristateBoolTypeToString(def->domainLocalOnly);

            if (!local) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Unknown localOnly type %d in network"),
                               def->domainLocalOnly);
                return -1;
            }
            virBufferAsprintf(buf, " localOnly='%s'", local);
        }

        virBufferAddLit(buf, "/>\n");
    }
2983

2984
    if (virNetworkDNSDefFormat(buf, &def->dns) < 0)
2985 2986
        goto error;

2987
    if (virNetDevVlanFormat(&def->vlan, buf) < 0)
2988
        goto error;
2989
    if (virNetDevBandwidthFormat(def->bandwidth, buf) < 0)
2990 2991
        goto error;

2992
    for (i = 0; i < def->nips; i++) {
2993
        if (virNetworkIPDefFormat(buf, &def->ips[i]) < 0)
2994
            goto error;
2995 2996
    }

2997
    for (i = 0; i < def->nroutes; i++) {
2998
        if (virNetDevIPRouteFormat(buf, def->routes[i]) < 0)
2999 3000 3001
            goto error;
    }

3002
    if (virNetDevVPortProfileFormat(def->virtPortProfile, buf) < 0)
3003
        goto error;
3004

3005 3006
    for (i = 0; i < def->nPortGroups; i++)
        if (virPortGroupDefFormat(buf, &def->portGroups[i]) < 0)
3007
            goto error;
3008

3009 3010 3011 3012 3013
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</network>\n");

    return 0;

3014
 error:
3015 3016 3017 3018
    return -1;
}

char *
E
Eric Blake 已提交
3019
virNetworkDefFormat(const virNetworkDef *def,
3020 3021 3022 3023
                    unsigned int flags)
{
    virBuffer buf = VIR_BUFFER_INITIALIZER;

3024
    if (virNetworkDefFormatBuf(&buf, def, flags) < 0)
3025 3026
        goto error;

3027 3028
    if (virBufferCheckError(&buf) < 0)
        goto error;
3029 3030 3031

    return virBufferContentAndReset(&buf);

3032
 error:
3033 3034 3035 3036 3037 3038 3039 3040 3041 3042
    virBufferFreeAndReset(&buf);
    return NULL;
}

static char *
virNetworkObjFormat(virNetworkObjPtr net,
                    unsigned int flags)
{
    virBuffer buf = VIR_BUFFER_INITIALIZER;
    char *class_id = virBitmapFormat(net->class_id);
3043
    size_t i;
3044 3045

    if (!class_id)
3046
        goto error;
3047 3048

    virBufferAddLit(&buf, "<networkstatus>\n");
3049 3050 3051
    virBufferAdjustIndent(&buf, 2);
    virBufferAsprintf(&buf, "<class_id bitmap='%s'/>\n", class_id);
    virBufferAsprintf(&buf, "<floor sum='%llu'/>\n", net->floor_sum);
3052 3053
    VIR_FREE(class_id);

3054 3055
    for (i = 0; i < VIR_NETWORK_TAINT_LAST; i++) {
        if (net->taint & (1 << i))
3056
            virBufferAsprintf(&buf, "<taint flag='%s'/>\n",
3057 3058 3059
                              virNetworkTaintTypeToString(i));
    }

3060
    if (virNetworkDefFormatBuf(&buf, net->def, flags) < 0)
3061 3062
        goto error;

3063
    virBufferAdjustIndent(&buf, -2);
3064
    virBufferAddLit(&buf, "</networkstatus>");
3065

3066 3067
    if (virBufferCheckError(&buf) < 0)
        goto error;
3068 3069 3070

    return virBufferContentAndReset(&buf);

3071
 error:
3072
    virBufferFreeAndReset(&buf);
3073 3074 3075
    return NULL;
}

3076 3077 3078 3079 3080 3081 3082 3083
const char *
virNetworkDefForwardIf(const virNetworkDef *def, size_t n)
{
    return ((def->forward.ifs && (def->forward.nifs > n) &&
             def->forward.ifs[n].type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV)
            ? def->forward.ifs[n].device.dev : NULL);
}

3084 3085 3086
virPortGroupDefPtr virPortGroupFindByName(virNetworkDefPtr net,
                                          const char *portgroup)
{
3087 3088
    size_t i;
    for (i = 0; i < net->nPortGroups; i++) {
3089
        if (portgroup) {
3090 3091
            if (STREQ(portgroup, net->portGroups[i].name))
                return &net->portGroups[i];
3092
        } else {
3093 3094
            if (net->portGroups[i].isDefault)
                return &net->portGroups[i];
3095 3096 3097 3098 3099
        }
    }
    return NULL;
}

3100
int virNetworkSaveXML(const char *configDir,
3101 3102
                      virNetworkDefPtr def,
                      const char *xml)
3103
{
J
Ján Tomko 已提交
3104
    char uuidstr[VIR_UUID_STRING_BUFLEN];
3105
    char *configFile = NULL;
3106
    int ret = -1;
3107

3108
    if ((configFile = virNetworkConfigFile(configDir, def->name)) == NULL)
3109 3110
        goto cleanup;

3111 3112
    if (virFileMakePath(configDir) < 0) {
        virReportSystemError(errno,
3113 3114
                             _("cannot create config directory '%s'"),
                             configDir);
3115 3116 3117
        goto cleanup;
    }

J
Ján Tomko 已提交
3118 3119 3120 3121
    virUUIDFormat(def->uuid, uuidstr);
    ret = virXMLSaveFile(configFile,
                         virXMLPickShellSafeComment(def->name, uuidstr),
                         "net-edit", xml);
3122 3123

 cleanup:
3124 3125 3126 3127
    VIR_FREE(configFile);
    return ret;
}

3128
int virNetworkSaveConfig(const char *configDir,
3129 3130 3131 3132 3133
                         virNetworkDefPtr def)
{
    int ret = -1;
    char *xml;

3134
    if (!(xml = virNetworkDefFormat(def, VIR_NETWORK_XML_INACTIVE)))
3135 3136
        goto cleanup;

3137
    if (virNetworkSaveXML(configDir, def, xml))
3138 3139 3140
        goto cleanup;

    ret = 0;
3141
 cleanup:
3142
    VIR_FREE(xml);
3143 3144 3145
    return ret;
}

3146

3147 3148 3149 3150
int virNetworkSaveStatus(const char *statusDir,
                         virNetworkObjPtr network)
{
    int ret = -1;
3151
    int flags = 0;
3152 3153
    char *xml;

3154
    if (!(xml = virNetworkObjFormat(network, flags)))
3155 3156 3157 3158 3159 3160
        goto cleanup;

    if (virNetworkSaveXML(statusDir, network->def, xml))
        goto cleanup;

    ret = 0;
3161
 cleanup:
3162 3163 3164 3165
    VIR_FREE(xml);
    return ret;
}

3166 3167 3168 3169 3170 3171 3172 3173 3174
virNetworkObjPtr
virNetworkLoadState(virNetworkObjListPtr nets,
                    const char *stateDir,
                    const char *name)
{
    char *configFile = NULL;
    virNetworkDefPtr def = NULL;
    virNetworkObjPtr net = NULL;
    xmlDocPtr xml = NULL;
3175
    xmlNodePtr node = NULL, *nodes = NULL;
3176 3177 3178
    xmlXPathContextPtr ctxt = NULL;
    virBitmapPtr class_id_map = NULL;
    unsigned long long floor_sum_val = 0;
3179 3180 3181
    unsigned int taint = 0;
    int n;
    size_t i;
3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200


    if ((configFile = virNetworkConfigFile(stateDir, name)) == NULL)
        goto error;

    if (!(xml = virXMLParseCtxt(configFile, NULL, _("(network status)"), &ctxt)))
        goto error;

    if (!(node = virXPathNode("//network", ctxt))) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Could not find any 'network' element in status file"));
        goto error;
    }

    /* parse the definition first */
    ctxt->node = node;
    if (!(def = virNetworkDefParseXML(ctxt)))
        goto error;

3201
    if (STRNEQ(name, def->name)) {
3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Network config filename '%s'"
                         " does not match network name '%s'"),
                       configFile, def->name);
        goto error;
    }

    /* now parse possible status data */
    node = xmlDocGetRootElement(xml);
    if (xmlStrEqual(node->name, BAD_CAST "networkstatus")) {
        /* Newer network status file. Contains useful
         * info which are not to be found in bare config XML */
        char *class_id = NULL;
        char *floor_sum = NULL;

        ctxt->node = node;
        if ((class_id = virXPathString("string(./class_id[1]/@bitmap)", ctxt))) {
3219
            if (virBitmapParse(class_id, &class_id_map,
3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233
                               CLASS_ID_BITMAP_SIZE) < 0) {
                VIR_FREE(class_id);
                goto error;
            }
        }
        VIR_FREE(class_id);

        floor_sum = virXPathString("string(./floor[1]/@sum)", ctxt);
        if (floor_sum &&
            virStrToLong_ull(floor_sum, NULL, 10, &floor_sum_val) < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Malformed 'floor_sum' attribute: %s"),
                           floor_sum);
            VIR_FREE(floor_sum);
3234
            goto error;
3235 3236
        }
        VIR_FREE(floor_sum);
3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257

        if ((n = virXPathNodeSet("./taint", ctxt, &nodes)) < 0)
            goto error;

        for (i = 0; i < n; i++) {
            char *str = virXMLPropString(nodes[i], "flag");
            if (str) {
                int flag = virNetworkTaintTypeFromString(str);
                if (flag < 0) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                   _("Unknown taint flag %s"), str);
                    VIR_FREE(str);
                    goto error;
                }
                VIR_FREE(str);
                /* Compute taint mask here. The network object does not
                 * exist yet, so we can't use virNetworkObjtTaint. */
                taint |= (1 << flag);
            }
        }
        VIR_FREE(nodes);
3258 3259 3260
    }

    /* create the object */
3261
    if (!(net = virNetworkAssignDef(nets, def, VIR_NETWORK_OBJ_LIST_ADD_LIVE)))
3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273
        goto error;
    /* do not put any "goto error" below this comment */

    /* assign status data stored in the network object */
    if (class_id_map) {
        virBitmapFree(net->class_id);
        net->class_id = class_id_map;
    }

    if (floor_sum_val > 0)
        net->floor_sum = floor_sum_val;

3274
    net->taint = taint;
3275
    net->active = 1; /* any network with a state file is by definition active */
3276

3277
 cleanup:
3278 3279 3280 3281 3282
    VIR_FREE(configFile);
    xmlFreeDoc(xml);
    xmlXPathFreeContext(ctxt);
    return net;

3283
 error:
3284
    VIR_FREE(nodes);
3285 3286 3287 3288 3289
    virBitmapFree(class_id_map);
    virNetworkDefFree(def);
    goto cleanup;
}

3290
virNetworkObjPtr virNetworkLoadConfig(virNetworkObjListPtr nets,
3291 3292
                                      const char *configDir,
                                      const char *autostartDir,
3293
                                      const char *name)
3294 3295 3296 3297 3298 3299
{
    char *configFile = NULL, *autostartLink = NULL;
    virNetworkDefPtr def = NULL;
    virNetworkObjPtr net;
    int autostart;

3300
    if ((configFile = virNetworkConfigFile(configDir, name)) == NULL)
3301
        goto error;
3302
    if ((autostartLink = virNetworkConfigFile(autostartDir, name)) == NULL)
3303 3304 3305 3306 3307
        goto error;

    if ((autostart = virFileLinkPointsTo(autostartLink, configFile)) < 0)
        goto error;

3308
    if (!(def = virNetworkDefParseFile(configFile)))
3309 3310
        goto error;

3311
    if (STRNEQ(name, def->name)) {
3312 3313 3314 3315
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Network config filename '%s'"
                         " does not match network name '%s'"),
                       configFile, def->name);
3316 3317 3318
        goto error;
    }

3319 3320
    if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
        def->forward.type == VIR_NETWORK_FORWARD_NAT ||
3321 3322
        def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
        def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
3323

3324 3325 3326 3327
        if (!def->mac_specified) {
            virNetworkSetBridgeMacAddr(def);
            virNetworkSaveConfig(configDir, def);
        }
3328 3329 3330 3331
    } else {
        /* Throw away MAC address for other forward types,
         * which could have been generated by older libvirt RPMs */
        def->mac_specified = false;
3332
    }
3333

3334
    if (!(net = virNetworkAssignDef(nets, def, 0)))
3335 3336 3337 3338
        goto error;

    net->autostart = autostart;

3339 3340 3341
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);

3342 3343
    return net;

3344
 error:
3345 3346 3347 3348 3349 3350
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
    virNetworkDefFree(def);
    return NULL;
}

3351 3352 3353 3354 3355 3356 3357

int
virNetworkLoadAllState(virNetworkObjListPtr nets,
                       const char *stateDir)
{
    DIR *dir;
    struct dirent *entry;
E
Eric Blake 已提交
3358
    int ret = -1;
J
Ján Tomko 已提交
3359
    int rc;
3360

J
Ján Tomko 已提交
3361 3362
    if ((rc = virDirOpenIfExists(&dir, stateDir)) <= 0)
        return rc;
3363

E
Eric Blake 已提交
3364
    while ((ret = virDirRead(dir, &entry, stateDir)) > 0) {
3365 3366 3367 3368 3369
        virNetworkObjPtr net;

        if (!virFileStripSuffix(entry->d_name, ".xml"))
            continue;

3370 3371
        net = virNetworkLoadState(nets, stateDir, entry->d_name);
        virNetworkObjEndAPI(&net);
3372 3373
    }

J
Ján Tomko 已提交
3374
    VIR_DIR_CLOSE(dir);
E
Eric Blake 已提交
3375
    return ret;
3376 3377 3378
}


3379
int virNetworkLoadAllConfigs(virNetworkObjListPtr nets,
3380 3381 3382 3383 3384
                             const char *configDir,
                             const char *autostartDir)
{
    DIR *dir;
    struct dirent *entry;
E
Eric Blake 已提交
3385
    int ret = -1;
J
Ján Tomko 已提交
3386
    int rc;
3387

J
Ján Tomko 已提交
3388 3389
    if ((rc = virDirOpenIfExists(&dir, configDir)) <= 0)
        return rc;
3390

E
Eric Blake 已提交
3391
    while ((ret = virDirRead(dir, &entry, configDir)) > 0) {
3392 3393
        virNetworkObjPtr net;

3394
        if (!virFileStripSuffix(entry->d_name, ".xml"))
3395 3396 3397 3398
            continue;

        /* NB: ignoring errors, so one malformed config doesn't
           kill the whole process */
3399
        net = virNetworkLoadConfig(nets,
3400 3401 3402
                                   configDir,
                                   autostartDir,
                                   entry->d_name);
3403
        virNetworkObjEndAPI(&net);
3404 3405
    }

J
Ján Tomko 已提交
3406
    VIR_DIR_CLOSE(dir);
E
Eric Blake 已提交
3407
    return ret;
3408 3409
}

3410
int virNetworkDeleteConfig(const char *configDir,
3411
                           const char *autostartDir,
3412 3413
                           virNetworkObjPtr net)
{
3414 3415
    char *configFile = NULL;
    char *autostartLink = NULL;
R
Ryota Ozaki 已提交
3416
    int ret = -1;
3417

3418
    if ((configFile = virNetworkConfigFile(configDir, net->def->name)) == NULL)
3419
        goto error;
3420
    if ((autostartLink = virNetworkConfigFile(autostartDir, net->def->name)) == NULL)
3421
        goto error;
3422 3423

    /* Not fatal if this doesn't work */
3424
    unlink(autostartLink);
3425
    net->autostart = 0;
3426

3427
    if (unlink(configFile) < 0) {
3428
        virReportSystemError(errno,
3429
                             _("cannot remove config file '%s'"),
3430 3431
                             configFile);
        goto error;
3432 3433
    }

R
Ryota Ozaki 已提交
3434
    ret = 0;
3435

3436
 error:
3437 3438
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
R
Ryota Ozaki 已提交
3439
    return ret;
3440 3441
}

3442
char *virNetworkConfigFile(const char *dir,
3443 3444 3445 3446
                           const char *name)
{
    char *ret = NULL;

3447
    ignore_value(virAsprintf(&ret, "%s/%s.xml", dir, name));
3448
    return ret;
3449
}
D
Daniel P. Berrange 已提交
3450

3451 3452 3453 3454 3455 3456 3457 3458 3459 3460
struct virNetworkBridgeInUseHelperData {
    const char *bridge;
    const char *skipname;
};

static int
virNetworkBridgeInUseHelper(const void *payload,
                            const void *name ATTRIBUTE_UNUSED,
                            const void *opaque)
{
3461
    int ret;
3462 3463 3464
    virNetworkObjPtr net = (virNetworkObjPtr) payload;
    const struct virNetworkBridgeInUseHelperData *data = opaque;

3465
    virObjectLock(net);
3466 3467 3468 3469 3470 3471 3472 3473
    if (data->skipname &&
        ((net->def && STREQ(net->def->name, data->skipname)) ||
         (net->newDef && STREQ(net->newDef->name, data->skipname))))
        ret = 0;
    else if ((net->def && net->def->bridge &&
              STREQ(net->def->bridge, data->bridge)) ||
             (net->newDef && net->newDef->bridge &&
              STREQ(net->newDef->bridge, data->bridge)))
3474
        ret = 1;
3475 3476
    else
        ret = 0;
3477
    virObjectUnlock(net);
3478 3479 3480
    return ret;
}

E
Eric Blake 已提交
3481
int virNetworkBridgeInUse(virNetworkObjListPtr nets,
3482 3483 3484
                          const char *bridge,
                          const char *skipname)
{
3485 3486
    virNetworkObjPtr obj;
    struct virNetworkBridgeInUseHelperData data = {bridge, skipname};
3487

3488
    virObjectLock(nets);
3489
    obj = virHashSearch(nets->objs, virNetworkBridgeInUseHelper, &data);
3490
    virObjectUnlock(nets);
3491

3492
    return obj != NULL;
3493 3494
}

3495

3496 3497 3498 3499 3500 3501
void virNetworkSetBridgeMacAddr(virNetworkDefPtr def)
{
    if (!def->mac_specified) {
        /* if the bridge doesn't have a mac address explicitly defined,
         * autogenerate a random one.
         */
3502
        virMacAddrGenerate((unsigned char[]){ 0x52, 0x54, 0 },
3503
                           &def->mac);
3504 3505 3506 3507
        def->mac_specified = true;
    }
}

3508 3509 3510 3511 3512
/* NetworkObj backend of the virNetworkUpdate API */

static void
virNetworkDefUpdateNoSupport(virNetworkDefPtr def, const char *section)
{
3513
    virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3514 3515 3516
                   _("can't update '%s' section of network '%s'"),
                   section, def->name);
}
3517 3518 3519
static void
virNetworkDefUpdateUnknownCommand(unsigned int command)
{
3520
    virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3521 3522
                   _("unrecognized network update command code %d"), command);
}
3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565 3566 3567 3568 3569 3570 3571 3572 3573 3574

static int
virNetworkDefUpdateCheckElementName(virNetworkDefPtr def,
                                    xmlNodePtr node,
                                    const char *section)
{
    if (!xmlStrEqual(node->name, BAD_CAST section)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("unexpected element <%s>, expecting <%s>, "
                         "while updating network '%s'"),
                       node->name, section, def->name);
        return -1;
    }
    return 0;
}

static int
virNetworkDefUpdateBridge(virNetworkDefPtr def,
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "bridge");
    return -1;
}

static int
virNetworkDefUpdateDomain(virNetworkDefPtr def,
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "domain");
    return -1;
}

static int
virNetworkDefUpdateIP(virNetworkDefPtr def,
                      unsigned int command ATTRIBUTE_UNUSED,
                      int parentIndex ATTRIBUTE_UNUSED,
                      xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                      /* virNetworkUpdateFlags */
                      unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "ip");
    return -1;
}

3575 3576
static virNetworkIPDefPtr
virNetworkIPDefByIndex(virNetworkDefPtr def, int parentIndex)
3577
{
3578
    virNetworkIPDefPtr ipdef = NULL;
3579
    size_t i;
3580 3581 3582

    /* first find which ip element's dhcp host list to work on */
    if (parentIndex >= 0) {
3583
        ipdef = virNetworkDefGetIPByIndex(def, AF_UNSPEC, parentIndex);
G
Gene Czarcinski 已提交
3584
        if (!(ipdef)) {
3585
            virReportError(VIR_ERR_OPERATION_INVALID,
G
Gene Czarcinski 已提交
3586
                           _("couldn't update dhcp host entry - no <ip> "
3587 3588 3589 3590 3591 3592 3593 3594 3595
                             "element found at index %d in network '%s'"),
                           parentIndex, def->name);
        }
        return ipdef;
    }

    /* -1 means "find the most appropriate", which in this case
     * means the one and only <ip> that has <dhcp> element
     */
3596
    for (i = 0;
3597
         (ipdef = virNetworkDefGetIPByIndex(def, AF_UNSPEC, i));
3598
         i++) {
G
Gene Czarcinski 已提交
3599
        if (ipdef->nranges || ipdef->nhosts)
3600 3601
            break;
    }
G
Gene Czarcinski 已提交
3602
    if (!ipdef) {
3603
        ipdef = virNetworkDefGetIPByIndex(def, AF_INET, 0);
G
Gene Czarcinski 已提交
3604
        if (!ipdef)
3605
            ipdef = virNetworkDefGetIPByIndex(def, AF_INET6, 0);
G
Gene Czarcinski 已提交
3606
    }
3607 3608
    if (!ipdef) {
        virReportError(VIR_ERR_OPERATION_INVALID,
G
Gene Czarcinski 已提交
3609
                       _("couldn't update dhcp host entry - no <ip> "
3610 3611 3612 3613 3614
                         "element found in network '%s'"), def->name);
    }
    return ipdef;
}

3615 3616 3617

static int
virNetworkDefUpdateCheckMultiDHCP(virNetworkDefPtr def,
3618
                                  virNetworkIPDefPtr ipdef)
3619 3620 3621
{
    int family = VIR_SOCKET_ADDR_FAMILY(&ipdef->address);
    size_t i;
3622
    virNetworkIPDefPtr ip;
3623

3624
    for (i = 0; (ip = virNetworkDefGetIPByIndex(def, family, i)); i++) {
3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638
        if (ip != ipdef) {
            if (ip->nranges || ip->nhosts) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("dhcp is supported only for a "
                                 "single %s address on each network"),
                               (family == AF_INET) ? "IPv4" : "IPv6");
                return -1;
            }
        }
    }
    return 0;
}


3639 3640
static int
virNetworkDefUpdateIPDHCPHost(virNetworkDefPtr def,
3641 3642 3643
                              unsigned int command,
                              int parentIndex,
                              xmlXPathContextPtr ctxt,
3644 3645 3646
                              /* virNetworkUpdateFlags */
                              unsigned int fflags ATTRIBUTE_UNUSED)
{
3647 3648
    size_t i;
    int ret = -1;
3649
    virNetworkIPDefPtr ipdef = virNetworkIPDefByIndex(def, parentIndex);
3650
    virNetworkDHCPHostDef host;
3651
    bool partialOkay = (command == VIR_NETWORK_UPDATE_COMMAND_DELETE);
3652 3653 3654 3655 3656 3657 3658 3659 3660 3661

    memset(&host, 0, sizeof(host));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "host") < 0)
        goto cleanup;

    /* ipdef is the ip element that needs its host array updated */
    if (!ipdef)
        goto cleanup;

3662 3663 3664
    if (virNetworkDHCPHostDefParseXML(def->name, ipdef, ctxt->node,
                                      &host, partialOkay) < 0)
        goto cleanup;
3665

3666 3667 3668 3669 3670 3671 3672 3673 3674
    if (!partialOkay &&
        VIR_SOCKET_ADDR_FAMILY(&ipdef->address)
        != VIR_SOCKET_ADDR_FAMILY(&host.ip)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("the address family of a host entry IP must match "
                         "the address family of the dhcp element's parent"));
        goto cleanup;
    }

3675
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
3676

3677
        /* search for the entry with this (ip|mac|name),
3678
         * and update the IP+(mac|name) */
3679
        for (i = 0; i < ipdef->nhosts; i++) {
3680
            if ((host.mac && ipdef->hosts[i].mac &&
3681
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) ||
3682 3683
                (VIR_SOCKET_ADDR_VALID(&host.ip) &&
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip)) ||
3684
                (host.name &&
3685
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name))) {
3686 3687 3688 3689
                break;
            }
        }

3690
        if (i == ipdef->nhosts) {
3691
            char *ip = virSocketAddrFormat(&host.ip);
3692 3693
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate an existing dhcp host entry with "
3694 3695 3696 3697 3698
                             "\"mac='%s'\" \"name='%s'\" \"ip='%s'\" in"
                             " network '%s'"),
                           host.mac ? host.mac : _("unknown"), host.name,
                           ip ? ip : _("unknown"), def->name);
            VIR_FREE(ip);
3699 3700 3701 3702 3703 3704 3705
            goto cleanup;
        }

        /* clear the existing hosts entry, move the new one in its place,
         * then clear out the extra copy to get rid of the duplicate pointers
         * to its data (mac and name strings).
         */
3706 3707
        virNetworkDHCPHostDefClear(&ipdef->hosts[i]);
        ipdef->hosts[i] = host;
3708 3709 3710 3711 3712
        memset(&host, 0, sizeof(host));

    } else if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
               (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3713 3714 3715
        if (virNetworkDefUpdateCheckMultiDHCP(def, ipdef) < 0)
            goto cleanup;

3716
        /* log error if an entry with same name/address/ip already exists */
3717
        for (i = 0; i < ipdef->nhosts; i++) {
3718
            if ((host.mac && ipdef->hosts[i].mac &&
3719
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) ||
3720
                (host.name &&
3721
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name)) ||
3722
                (VIR_SOCKET_ADDR_VALID(&host.ip) &&
3723
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip))) {
3724 3725 3726 3727 3728 3729
                char *ip = virSocketAddrFormat(&host.ip);

                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("there is an existing dhcp host entry in "
                                 "network '%s' that matches "
                                 "\"<host mac='%s' name='%s' ip='%s'/>\""),
3730 3731
                               def->name, host.mac ? host.mac : _("unknown"),
                               host.name, ip ? ip : _("unknown"));
3732 3733 3734 3735
                VIR_FREE(ip);
                goto cleanup;
            }
        }
3736

3737
        /* add to beginning/end of list */
3738 3739 3740 3741
        if (VIR_INSERT_ELEMENT(ipdef->hosts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : ipdef->nhosts,
                               ipdef->nhosts, host) < 0)
3742 3743 3744 3745
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        /* find matching entry - all specified attributes must match */
3746
        for (i = 0; i < ipdef->nhosts; i++) {
3747
            if ((!host.mac || !ipdef->hosts[i].mac ||
3748
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) &&
3749
                (!host.name ||
3750
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name)) &&
3751
                (!VIR_SOCKET_ADDR_VALID(&host.ip) ||
3752
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip))) {
3753 3754 3755
                break;
            }
        }
3756
        if (i == ipdef->nhosts) {
3757 3758 3759 3760 3761 3762 3763
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching dhcp host entry "
                             "in network '%s'"), def->name);
            goto cleanup;
        }

        /* remove it */
3764 3765
        virNetworkDHCPHostDefClear(&ipdef->hosts[i]);
        VIR_DELETE_ELEMENT(ipdef->hosts, i, ipdef->nhosts);
3766

3767 3768 3769
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
3770 3771 3772
    }

    ret = 0;
3773
 cleanup:
3774 3775
    virNetworkDHCPHostDefClear(&host);
    return ret;
3776 3777 3778 3779
}

static int
virNetworkDefUpdateIPDHCPRange(virNetworkDefPtr def,
3780
                               unsigned int command,
3781
                               int parentIndex,
3782
                               xmlXPathContextPtr ctxt,
3783 3784 3785
                               /* virNetworkUpdateFlags */
                               unsigned int fflags ATTRIBUTE_UNUSED)
{
3786 3787
    size_t i;
    int ret = -1;
3788
    virNetworkIPDefPtr ipdef = virNetworkIPDefByIndex(def, parentIndex);
3789
    virSocketAddrRange range;
3790 3791 3792 3793 3794 3795 3796 3797 3798 3799

    memset(&range, 0, sizeof(range));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "range") < 0)
        goto cleanup;

    /* ipdef is the ip element that needs its range array updated */
    if (!ipdef)
        goto cleanup;

3800
    /* parse the xml into a virSocketAddrRange */
3801 3802
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {

3803
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3804 3805 3806 3807 3808
                       _("dhcp ranges cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

3809
    if (virSocketAddrRangeParseXML(def->name, ipdef, ctxt->node, &range) < 0)
3810 3811
        goto cleanup;

3812 3813 3814 3815 3816 3817 3818 3819
    if (VIR_SOCKET_ADDR_FAMILY(&ipdef->address)
        != VIR_SOCKET_ADDR_FAMILY(&range.start)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("the address family of a dhcp range must match "
                         "the address family of the dhcp element's parent"));
        goto cleanup;
    }

3820
    /* check if an entry with same name/address/ip already exists */
3821 3822 3823
    for (i = 0; i < ipdef->nranges; i++) {
        if (virSocketAddrEqual(&range.start, &ipdef->ranges[i].start) &&
            virSocketAddrEqual(&range.end, &ipdef->ranges[i].end)) {
3824 3825 3826 3827 3828 3829 3830
            break;
        }
    }

    if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3831 3832 3833
        if (virNetworkDefUpdateCheckMultiDHCP(def, ipdef) < 0)
            goto cleanup;

3834
        if (i < ipdef->nranges) {
3835 3836 3837 3838 3839 3840 3841 3842 3843 3844
            char *startip = virSocketAddrFormat(&range.start);
            char *endip = virSocketAddrFormat(&range.end);

            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is an existing dhcp range entry in "
                             "network '%s' that matches "
                             "\"<range start='%s' end='%s'/>\""),
                           def->name,
                           startip ? startip : "unknown",
                           endip ? endip : "unknown");
3845 3846
            VIR_FREE(startip);
            VIR_FREE(endip);
3847 3848 3849 3850
            goto cleanup;
        }

        /* add to beginning/end of list */
3851 3852 3853 3854
        if (VIR_INSERT_ELEMENT(ipdef->ranges,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : ipdef->nranges,
                               ipdef->nranges, range) < 0)
3855 3856 3857
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

3858
        if (i == ipdef->nranges) {
3859 3860 3861 3862 3863 3864 3865 3866
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching dhcp range entry "
                             "in network '%s'"), def->name);
            goto cleanup;
        }

        /* remove it */
        /* NB: nothing to clear from a RangeDef that's being freed */
3867
        VIR_DELETE_ELEMENT(ipdef->ranges, i, ipdef->nranges);
3868

3869 3870 3871
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
3872 3873 3874
    }

    ret = 0;
3875
 cleanup:
3876
    return ret;
3877 3878 3879 3880 3881 3882 3883 3884 3885 3886 3887 3888 3889 3890 3891 3892
}

static int
virNetworkDefUpdateForward(virNetworkDefPtr def,
                           unsigned int command ATTRIBUTE_UNUSED,
                           int parentIndex ATTRIBUTE_UNUSED,
                           xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                           /* virNetworkUpdateFlags */
                           unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "forward");
    return -1;
}

static int
virNetworkDefUpdateForwardInterface(virNetworkDefPtr def,
3893
                                    unsigned int command,
3894
                                    int parentIndex ATTRIBUTE_UNUSED,
3895
                                    xmlXPathContextPtr ctxt,
3896 3897 3898
                                    /* virNetworkUpdateFlags */
                                    unsigned int fflags ATTRIBUTE_UNUSED)
{
3899 3900
    size_t i;
    int ret = -1;
3901 3902 3903 3904 3905 3906 3907 3908
    virNetworkForwardIfDef iface;

    memset(&iface, 0, sizeof(iface));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "interface") < 0)
        goto cleanup;

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
3909
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923
                       _("forward interface entries cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    /* parsing this is so simple that it doesn't have its own function */
    iface.type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
    if (!(iface.device.dev = virXMLPropString(ctxt->node, "dev"))) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("missing dev attribute in <interface> element"));
        goto cleanup;
    }

    /* check if an <interface> with same dev name already exists */
3924 3925
    for (i = 0; i < def->forward.nifs; i++) {
        if (def->forward.ifs[i].type
3926
            == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV &&
3927
            STREQ(iface.device.dev, def->forward.ifs[i].device.dev))
3928 3929 3930 3931 3932 3933
            break;
    }

    if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3934
        if (i < def->forward.nifs) {
3935 3936 3937 3938 3939 3940 3941 3942 3943
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is an existing interface entry "
                             "in network '%s' that matches "
                             "\"<interface dev='%s'>\""),
                           def->name, iface.device.dev);
            goto cleanup;
        }

        /* add to beginning/end of list */
3944 3945 3946 3947
        if (VIR_INSERT_ELEMENT(def->forward.ifs,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : def->forward.nifs,
                               def->forward.nifs, iface) < 0)
3948 3949 3950
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

3951
        if (i == def->forward.nifs) {
3952 3953 3954 3955 3956 3957 3958 3959
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't find an interface entry "
                             "in network '%s' matching <interface dev='%s'>"),
                           def->name, iface.device.dev);
            goto cleanup;
        }

        /* fail if the interface is being used */
3960
        if (def->forward.ifs[i].connections > 0) {
3961 3962 3963 3964 3965
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("unable to delete interface '%s' "
                             "in network '%s'. It is currently being used "
                             " by %d domains."),
                           iface.device.dev, def->name,
3966
                           def->forward.ifs[i].connections);
3967 3968 3969 3970
            goto cleanup;
        }

        /* remove it */
3971 3972
        virNetworkForwardIfDefClear(&def->forward.ifs[i]);
        VIR_DELETE_ELEMENT(def->forward.ifs, i, def->forward.nifs);
3973

3974 3975 3976 3977 3978 3979
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
3980
 cleanup:
3981 3982
    virNetworkForwardIfDefClear(&iface);
    return ret;
3983 3984 3985 3986 3987 3988 3989 3990 3991 3992 3993 3994 3995 3996 3997
}

static int
virNetworkDefUpdateForwardPF(virNetworkDefPtr def,
                             unsigned int command ATTRIBUTE_UNUSED,
                             int parentIndex ATTRIBUTE_UNUSED,
                             xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                             /* virNetworkUpdateFlags */
                             unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "forward pf");
    return -1;
}

static int
3998 3999
virNetworkDefUpdatePortGroup(virNetworkDefPtr def,
                             unsigned int command,
4000
                             int parentIndex ATTRIBUTE_UNUSED,
4001
                             xmlXPathContextPtr ctxt,
4002 4003 4004
                             /* virNetworkUpdateFlags */
                             unsigned int fflags ATTRIBUTE_UNUSED)
{
4005 4006
    size_t i;
    int foundName = -1, foundDefault = -1;
4007
    int ret = -1;
4008 4009 4010 4011 4012 4013 4014 4015 4016 4017 4018
    virPortGroupDef portgroup;

    memset(&portgroup, 0, sizeof(portgroup));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "portgroup") < 0)
        goto cleanup;

    if (virNetworkPortGroupParseXML(&portgroup, ctxt->node, ctxt) < 0)
        goto cleanup;

    /* check if a portgroup with same name already exists */
4019 4020 4021 4022 4023
    for (i = 0; i < def->nPortGroups; i++) {
        if (STREQ(portgroup.name, def->portGroups[i].name))
            foundName = i;
        if (def->portGroups[i].isDefault)
            foundDefault = i;
4024
    }
4025
    if (foundName == -1 &&
4026 4027 4028 4029 4030 4031 4032
        ((command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) ||
         (command == VIR_NETWORK_UPDATE_COMMAND_DELETE))) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("couldn't find a portgroup entry "
                         "in network '%s' matching <portgroup name='%s'>"),
                       def->name, portgroup.name);
        goto cleanup;
4033
    } else if (foundName >= 0 &&
4034 4035 4036 4037 4038 4039 4040 4041 4042 4043
               ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
                (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST))) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("there is an existing portgroup entry in "
                         "network '%s' that matches "
                         "\"<portgroup name='%s'>\""),
                       def->name, portgroup.name);
        goto cleanup;
    }

4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054 4055 4056 4057
    /* if there is already a different default, we can't make this
     * one the default.
     */
    if (command != VIR_NETWORK_UPDATE_COMMAND_DELETE &&
        portgroup.isDefault &&
        foundDefault >= 0 && foundDefault != foundName) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("a different portgroup entry in "
                         "network '%s' is already set as the default. "
                         "Only one default is allowed."),
                       def->name);
        goto cleanup;
    }

4058 4059 4060
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {

        /* replace existing entry */
4061 4062
        virPortGroupDefClear(&def->portGroups[foundName]);
        def->portGroups[foundName] = portgroup;
4063 4064 4065 4066 4067 4068
        memset(&portgroup, 0, sizeof(portgroup));

    } else if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

        /* add to beginning/end of list */
4069 4070 4071 4072
        if (VIR_INSERT_ELEMENT(def->portGroups,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : def->nPortGroups,
                               def->nPortGroups, portgroup) < 0)
4073 4074 4075 4076
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        /* remove it */
4077
        virPortGroupDefClear(&def->portGroups[foundName]);
4078 4079
        VIR_DELETE_ELEMENT(def->portGroups, foundName, def->nPortGroups);

4080 4081 4082
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
4083 4084 4085
    }

    ret = 0;
4086
 cleanup:
4087 4088
    virPortGroupDefClear(&portgroup);
    return ret;
4089 4090 4091 4092 4093 4094 4095 4096 4097 4098
}

static int
virNetworkDefUpdateDNSHost(virNetworkDefPtr def,
                           unsigned int command ATTRIBUTE_UNUSED,
                           int parentIndex ATTRIBUTE_UNUSED,
                           xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                           /* virNetworkUpdateFlags */
                           unsigned int fflags ATTRIBUTE_UNUSED)
{
4099 4100
    size_t i, j, k;
    int foundIdx = -1, ret = -1;
4101 4102 4103 4104
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSHostDef host;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);
4105
    int foundCt = 0;
4106 4107 4108 4109

    memset(&host, 0, sizeof(host));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4110
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121
                       _("DNS HOST records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "host") < 0)
        goto cleanup;

    if (virNetworkDNSHostDefParseXML(def->name, ctxt->node, &host, !isAdd) < 0)
        goto cleanup;

4122
    for (i = 0; i < dns->nhosts; i++) {
4123 4124
        bool foundThisTime = false;

4125
        if (virSocketAddrEqual(&host.ip, &dns->hosts[i].ip))
4126 4127
            foundThisTime = true;

4128 4129 4130
        for (j = 0; j < host.nnames && !foundThisTime; j++) {
            for (k = 0; k < dns->hosts[i].nnames && !foundThisTime; k++) {
                if (STREQ(host.names[j], dns->hosts[i].names[k]))
4131 4132 4133 4134 4135
                    foundThisTime = true;
            }
        }
        if (foundThisTime) {
            foundCt++;
4136
            foundIdx = i;
4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150
        }
    }

    if (isAdd) {

        if (foundCt > 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already at least one DNS HOST "
                             "record with a matching field in network %s"),
                           def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4151 4152 4153
        if (VIR_INSERT_ELEMENT(dns->hosts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->nhosts, dns->nhosts, host) < 0)
4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundCt == 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS HOST "
                             "record in network %s"), def->name);
            goto cleanup;
        }
        if (foundCt > 1) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("multiple matching DNS HOST records were "
                             "found in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSHostDefClear(&dns->hosts[foundIdx]);
        VIR_DELETE_ELEMENT(dns->hosts, foundIdx, dns->nhosts);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4180
 cleanup:
4181 4182
    virNetworkDNSHostDefClear(&host);
    return ret;
4183 4184 4185
}

static int
4186
virNetworkDefUpdateDNSSrv(virNetworkDefPtr def,
4187 4188 4189 4190 4191 4192
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
4193 4194
    size_t i;
    int foundIdx = -1, ret = -1;
4195 4196 4197 4198
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSSrvDef srv;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);
4199
    int foundCt = 0;
4200 4201 4202 4203

    memset(&srv, 0, sizeof(srv));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4204
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4205 4206 4207 4208 4209 4210 4211 4212 4213 4214 4215
                       _("DNS SRV records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "srv") < 0)
        goto cleanup;

    if (virNetworkDNSSrvDefParseXML(def->name, ctxt->node, ctxt, &srv, !isAdd) < 0)
        goto cleanup;

4216 4217 4218 4219 4220
    for (i = 0; i < dns->nsrvs; i++) {
        if ((!srv.domain || STREQ_NULLABLE(srv.domain, dns->srvs[i].domain)) &&
            (!srv.service || STREQ_NULLABLE(srv.service, dns->srvs[i].service)) &&
            (!srv.protocol || STREQ_NULLABLE(srv.protocol, dns->srvs[i].protocol)) &&
            (!srv.target || STREQ_NULLABLE(srv.target, dns->srvs[i].target))) {
4221
            foundCt++;
4222
            foundIdx = i;
4223 4224 4225 4226 4227 4228 4229 4230 4231 4232 4233 4234 4235 4236
        }
    }

    if (isAdd) {

        if (foundCt > 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already at least one DNS SRV "
                             "record matching all specified fields in network %s"),
                           def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4237 4238 4239
        if (VIR_INSERT_ELEMENT(dns->srvs,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->nsrvs, dns->nsrvs, srv) < 0)
4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257 4258 4259 4260 4261 4262 4263 4264 4265
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundCt == 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS SRV "
                             "record in network %s"), def->name);
            goto cleanup;
        }
        if (foundCt > 1) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("multiple DNS SRV records matching all specified "
                             "fields were found in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSSrvDefClear(&dns->srvs[foundIdx]);
        VIR_DELETE_ELEMENT(dns->srvs, foundIdx, dns->nsrvs);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4266
 cleanup:
4267 4268
    virNetworkDNSSrvDefClear(&srv);
    return ret;
4269 4270 4271
}

static int
4272
virNetworkDefUpdateDNSTxt(virNetworkDefPtr def,
4273 4274 4275 4276 4277 4278
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
4279 4280 4281 4282 4283 4284 4285 4286 4287
    int foundIdx, ret = -1;
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSTxtDef txt;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);

    memset(&txt, 0, sizeof(txt));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4288
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307 4308 4309 4310 4311 4312 4313 4314 4315
                       _("DNS TXT records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "txt") < 0)
        goto cleanup;

    if (virNetworkDNSTxtDefParseXML(def->name, ctxt->node, &txt, !isAdd) < 0)
        goto cleanup;

    for (foundIdx = 0; foundIdx < dns->ntxts; foundIdx++) {
        if (STREQ(txt.name, dns->txts[foundIdx].name))
            break;
    }

    if (isAdd) {

        if (foundIdx < dns->ntxts) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already a DNS TXT record "
                             "with name '%s' in network %s"),
                           txt.name, def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4316 4317 4318
        if (VIR_INSERT_ELEMENT(dns->txts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->ntxts, dns->ntxts, txt) < 0)
4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331 4332 4333 4334 4335 4336 4337 4338
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundIdx == dns->ntxts) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS TXT "
                             "record in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSTxtDefClear(&dns->txts[foundIdx]);
        VIR_DELETE_ELEMENT(dns->txts, foundIdx, dns->ntxts);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4339
 cleanup:
4340 4341
    virNetworkDNSTxtDefClear(&txt);
    return ret;
4342 4343
}

J
Ján Tomko 已提交
4344
int
4345 4346 4347 4348 4349 4350 4351 4352 4353 4354 4355 4356 4357 4358 4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373 4374 4375 4376 4377 4378 4379 4380 4381 4382 4383 4384 4385 4386 4387 4388 4389 4390
virNetworkDefUpdateSection(virNetworkDefPtr def,
                           unsigned int command, /* virNetworkUpdateCommand */
                           unsigned int section, /* virNetworkUpdateSection */
                           int parentIndex,
                           const char *xml,
                           unsigned int flags)  /* virNetworkUpdateFlags */
{
    int ret = -1;
    xmlDocPtr doc;
    xmlXPathContextPtr ctxt = NULL;

    if (!(doc = virXMLParseStringCtxt(xml, _("network_update_xml"), &ctxt)))
        goto cleanup;

    switch (section) {
    case VIR_NETWORK_SECTION_BRIDGE:
       ret = virNetworkDefUpdateBridge(def, command, parentIndex, ctxt, flags);
        break;

    case VIR_NETWORK_SECTION_DOMAIN:
        ret = virNetworkDefUpdateDomain(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP:
        ret = virNetworkDefUpdateIP(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP_DHCP_HOST:
        ret = virNetworkDefUpdateIPDHCPHost(def, command,
                                            parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP_DHCP_RANGE:
        ret = virNetworkDefUpdateIPDHCPRange(def, command,
                                             parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD:
        ret = virNetworkDefUpdateForward(def, command,
                                         parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD_INTERFACE:
        ret = virNetworkDefUpdateForwardInterface(def, command,
                                                  parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD_PF:
        ret = virNetworkDefUpdateForwardPF(def, command,
                                           parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_PORTGROUP:
4391
        ret = virNetworkDefUpdatePortGroup(def, command,
4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404
                                           parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_HOST:
        ret = virNetworkDefUpdateDNSHost(def, command,
                                         parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_TXT:
        ret = virNetworkDefUpdateDNSTxt(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_SRV:
        ret = virNetworkDefUpdateDNSSrv(def, command, parentIndex, ctxt, flags);
        break;
    default:
4405
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4406 4407 4408 4409
                       _("can't update unrecognized section of network"));
        break;
    }

4410
 cleanup:
4411 4412 4413 4414 4415 4416 4417 4418 4419 4420 4421 4422 4423 4424 4425 4426 4427 4428 4429 4430 4431 4432 4433 4434 4435 4436 4437 4438
    xmlFreeDoc(doc);
    xmlXPathFreeContext(ctxt);
    return ret;
}

/*
 * virNetworkObjUpdate:
 *
 * Apply the supplied update to the given virNetworkObj. Except for
 * @network pointing to an actual network object rather than the
 * opaque virNetworkPtr, parameters are identical to the public API
 * virNetworkUpdate.
 *
 * The original virNetworkDefs are copied, and all modifications made
 * to these copies. The originals are replaced with the copies only
 * after success has been guaranteed.
 *
 * Returns: -1 on error, 0 on success.
 */
int
virNetworkObjUpdate(virNetworkObjPtr network,
                    unsigned int command, /* virNetworkUpdateCommand */
                    unsigned int section, /* virNetworkUpdateSection */
                    int parentIndex,
                    const char *xml,
                    unsigned int flags)  /* virNetworkUpdateFlags */
{
    int ret = -1;
4439
    virNetworkDefPtr livedef = NULL, configdef = NULL;
4440 4441 4442 4443 4444 4445

    /* normalize config data, and check for common invalid requests. */
    if (virNetworkConfigChangeSetup(network, flags) < 0)
       goto cleanup;

    if (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE) {
4446 4447
        virNetworkDefPtr checkdef;

4448
        /* work on a copy of the def */
4449
        if (!(livedef = virNetworkDefCopy(network->def, 0)))
4450
            goto cleanup;
4451
        if (virNetworkDefUpdateSection(livedef, command, section,
4452 4453 4454
                                       parentIndex, xml, flags) < 0) {
            goto cleanup;
        }
4455 4456 4457 4458 4459 4460
        /* run a final format/parse cycle to make sure we didn't
         * add anything illegal to the def
         */
        if (!(checkdef = virNetworkDefCopy(livedef, 0)))
            goto cleanup;
        virNetworkDefFree(checkdef);
4461 4462 4463
    }

    if (flags & VIR_NETWORK_UPDATE_AFFECT_CONFIG) {
4464 4465
        virNetworkDefPtr checkdef;

4466
        /* work on a copy of the def */
4467 4468
        if (!(configdef = virNetworkDefCopy(virNetworkObjGetPersistentDef(network),
                                            VIR_NETWORK_XML_INACTIVE))) {
4469 4470
            goto cleanup;
        }
4471
        if (virNetworkDefUpdateSection(configdef, command, section,
4472 4473 4474
                                       parentIndex, xml, flags) < 0) {
            goto cleanup;
        }
4475 4476 4477 4478 4479 4480 4481 4482
        if (!(checkdef = virNetworkDefCopy(configdef,
                                           VIR_NETWORK_XML_INACTIVE))) {
            goto cleanup;
        }
        virNetworkDefFree(checkdef);
    }

    if (configdef) {
4483
        /* successfully modified copy, now replace original */
4484
        if (virNetworkObjReplacePersistentDef(network, configdef) < 0)
4485
           goto cleanup;
4486 4487 4488 4489 4490 4491 4492
        configdef = NULL;
    }
    if (livedef) {
        /* successfully modified copy, now replace original */
        virNetworkDefFree(network->def);
        network->def = livedef;
        livedef = NULL;
4493 4494 4495
    }

    ret = 0;
4496
 cleanup:
4497 4498
    virNetworkDefFree(livedef);
    virNetworkDefFree(configdef);
4499 4500 4501
    return ret;
}

4502 4503
#define MATCH(FLAG) (flags & (FLAG))
static bool
4504 4505
virNetworkMatch(virNetworkObjPtr netobj,
                unsigned int flags)
4506 4507 4508 4509 4510 4511 4512 4513 4514 4515 4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526 4527 4528 4529 4530 4531 4532 4533 4534
{
    /* filter by active state */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_ACTIVE) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_ACTIVE) &&
           virNetworkObjIsActive(netobj)) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_INACTIVE) &&
           !virNetworkObjIsActive(netobj))))
        return false;

    /* filter by persistence */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_PERSISTENT) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_PERSISTENT) &&
           netobj->persistent) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_TRANSIENT) &&
           !netobj->persistent)))
        return false;

    /* filter by autostart option */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_AUTOSTART) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_AUTOSTART) &&
           netobj->autostart) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_NO_AUTOSTART) &&
           !netobj->autostart)))
        return false;

    return true;
}
#undef MATCH

4535 4536 4537 4538 4539 4540 4541 4542 4543
struct virNetworkObjListData {
    virConnectPtr conn;
    virNetworkPtr *nets;
    virNetworkObjListFilter filter;
    unsigned int flags;
    int nnets;
    bool error;
};

4544
static int
4545 4546 4547 4548 4549 4550 4551 4552 4553
virNetworkObjListPopulate(void *payload,
                          const void *name ATTRIBUTE_UNUSED,
                          void *opaque)
{
    struct virNetworkObjListData *data = opaque;
    virNetworkObjPtr obj = payload;
    virNetworkPtr net = NULL;

    if (data->error)
4554
        return 0;
4555

4556
    virObjectLock(obj);
4557 4558 4559 4560 4561 4562 4563 4564 4565 4566 4567 4568 4569 4570 4571 4572 4573 4574 4575 4576 4577

    if (data->filter &&
        !data->filter(data->conn, obj->def))
        goto cleanup;

    if (!virNetworkMatch(obj, data->flags))
        goto cleanup;

    if (!data->nets) {
        data->nnets++;
        goto cleanup;
    }

    if (!(net = virGetNetwork(data->conn, obj->def->name, obj->def->uuid))) {
        data->error = true;
        goto cleanup;
    }

    data->nets[data->nnets++] = net;

 cleanup:
4578
    virObjectUnlock(obj);
4579
    return 0;
4580 4581
}

4582
int
4583
virNetworkObjListExport(virConnectPtr conn,
4584
                        virNetworkObjListPtr netobjs,
4585 4586 4587
                        virNetworkPtr **nets,
                        virNetworkObjListFilter filter,
                        unsigned int flags)
4588 4589
{
    int ret = -1;
4590
    struct virNetworkObjListData data = { conn, NULL, filter, flags, 0, false};
4591

4592
    virObjectLock(netobjs);
4593
    if (nets && VIR_ALLOC_N(data.nets, virHashSize(netobjs->objs) + 1) < 0)
4594
        goto cleanup;
4595

4596 4597 4598 4599
    virHashForEach(netobjs->objs, virNetworkObjListPopulate, &data);

    if (data.error)
        goto cleanup;
4600

4601
    if (data.nets) {
4602
        /* trim the array to the final size */
4603 4604 4605
        ignore_value(VIR_REALLOC_N(data.nets, data.nnets + 1));
        *nets = data.nets;
        data.nets = NULL;
4606 4607
    }

4608
    ret = data.nnets;
4609
 cleanup:
4610
    virObjectUnlock(netobjs);
4611 4612
    while (data.nets && data.nnets)
        virObjectUnref(data.nets[--data.nnets]);
4613

4614
    VIR_FREE(data.nets);
4615 4616
    return ret;
}
4617

4618 4619 4620 4621 4622 4623
struct virNetworkObjListForEachHelperData {
    virNetworkObjListIterator callback;
    void *opaque;
    int ret;
};

4624
static int
4625 4626 4627 4628 4629 4630 4631 4632
virNetworkObjListForEachHelper(void *payload,
                               const void *name ATTRIBUTE_UNUSED,
                               void *opaque)
{
    struct virNetworkObjListForEachHelperData *data = opaque;

    if (data->callback(payload, data->opaque) < 0)
        data->ret = -1;
4633
    return 0;
4634 4635
}

4636 4637 4638 4639 4640 4641 4642
/**
 * virNetworkObjListForEach:
 * @nets: a list of network objects
 * @callback: function to call over each of object in the list
 * @opaque: pointer to pass to the @callback
 *
 * Function iterates over the list of network objects and calls
4643 4644 4645
 * passed callback over each one of them. You should avoid
 * calling those virNetworkObjList APIs, which lock the list
 * again in favor of their virNetworkObj*Locked variants.
4646 4647 4648 4649 4650 4651 4652 4653
 *
 * Returns: 0 on success, -1 otherwise.
 */
int
virNetworkObjListForEach(virNetworkObjListPtr nets,
                         virNetworkObjListIterator callback,
                         void *opaque)
{
4654
    struct virNetworkObjListForEachHelperData data = {callback, opaque, 0};
4655
    virObjectLock(nets);
4656
    virHashForEach(nets->objs, virNetworkObjListForEachHelper, &data);
4657
    virObjectUnlock(nets);
4658 4659 4660 4661 4662 4663 4664 4665 4666 4667 4668 4669
    return data.ret;
}

struct virNetworkObjListGetHelperData {
    virConnectPtr conn;
    virNetworkObjListFilter filter;
    char **names;
    int nnames;
    bool active;
    int got;
    bool error;
};
4670

4671
static int
4672 4673 4674 4675 4676 4677 4678 4679
virNetworkObjListGetHelper(void *payload,
                           const void *name ATTRIBUTE_UNUSED,
                           void *opaque)
{
    struct virNetworkObjListGetHelperData *data = opaque;
    virNetworkObjPtr obj = payload;

    if (data->error)
4680
        return 0;
4681 4682 4683

    if (data->nnames >= 0 &&
        data->got == data->nnames)
4684
        return 0;
4685

4686
    virObjectLock(obj);
4687 4688 4689 4690 4691 4692 4693 4694 4695 4696 4697 4698 4699

    if (data->filter &&
        !data->filter(data->conn, obj->def))
        goto cleanup;

    if ((data->active && virNetworkObjIsActive(obj)) ||
        (!data->active && !virNetworkObjIsActive(obj))) {
        if (data->names &&
            VIR_STRDUP(data->names[data->got], obj->def->name) < 0) {
            data->error = true;
            goto cleanup;
        }
        data->got++;
4700 4701
    }

4702
 cleanup:
4703
    virObjectUnlock(obj);
4704
    return 0;
4705
}
4706 4707 4708 4709 4710 4711 4712 4713 4714

int
virNetworkObjListGetNames(virNetworkObjListPtr nets,
                          bool active,
                          char **names,
                          int nnames,
                          virNetworkObjListFilter filter,
                          virConnectPtr conn)
{
4715
    int ret = -1;
4716

4717 4718
    struct virNetworkObjListGetHelperData data = {
        conn, filter, names, nnames, active, 0, false};
4719

4720
    virObjectLock(nets);
4721
    virHashForEach(nets->objs, virNetworkObjListGetHelper, &data);
4722
    virObjectUnlock(nets);
4723

4724 4725
    if (data.error)
        goto cleanup;
4726

4727 4728 4729 4730 4731 4732 4733
    ret = data.got;
 cleanup:
    if (ret < 0) {
        while (data.got)
            VIR_FREE(data.names[--data.got]);
    }
    return ret;
4734
}
4735 4736 4737 4738 4739 4740 4741

int
virNetworkObjListNumOfNetworks(virNetworkObjListPtr nets,
                               bool active,
                               virNetworkObjListFilter filter,
                               virConnectPtr conn)
{
4742 4743
    struct virNetworkObjListGetHelperData data = {
        conn, filter, NULL, -1, active, 0, false};
4744

4745
    virObjectLock(nets);
4746
    virHashForEach(nets->objs, virNetworkObjListGetHelper, &data);
4747
    virObjectUnlock(nets);
4748

4749 4750 4751 4752 4753 4754
    return data.got;
}

struct virNetworkObjListPruneHelperData {
    unsigned int flags;
};
4755

4756 4757 4758 4759 4760 4761 4762 4763 4764
static int
virNetworkObjListPruneHelper(const void *payload,
                             const void *name ATTRIBUTE_UNUSED,
                             const void *opaque)
{
    const struct virNetworkObjListPruneHelperData *data = opaque;
    virNetworkObjPtr obj = (virNetworkObjPtr) payload;
    int want = 0;

4765
    virObjectLock(obj);
4766
    want = virNetworkMatch(obj, data->flags);
4767
    virObjectUnlock(obj);
4768
    return want;
4769
}
4770 4771 4772 4773 4774 4775 4776 4777 4778 4779 4780 4781 4782

/**
 * virNetworkObjListPrune:
 * @nets: a list of network objects
 * @flags: bitwise-OR of virConnectListAllNetworksFlags
 *
 * Iterate over list of network objects and remove the desired
 * ones from it.
 */
void
virNetworkObjListPrune(virNetworkObjListPtr nets,
                       unsigned int flags)
{
4783
    struct virNetworkObjListPruneHelperData data = {flags};
4784

4785
    virObjectLock(nets);
4786
    virHashRemoveSet(nets->objs, virNetworkObjListPruneHelper, &data);
4787
    virObjectUnlock(nets);
4788
}