network_conf.c 150.8 KB
Newer Older
1 2 3
/*
 * network_conf.c: network XML handling
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006-2008 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

26
#include <unistd.h>
27 28
#include <arpa/inet.h>
#include <sys/types.h>
A
Atsushi SAKAI 已提交
29
#include <sys/stat.h>
30
#include <fcntl.h>
31
#include <string.h>
32 33
#include <dirent.h>

34
#include "virerror.h"
35
#include "datatypes.h"
36
#include "network_conf.h"
37 38
#include "netdev_vport_profile_conf.h"
#include "netdev_bandwidth_conf.h"
39
#include "netdev_vlan_conf.h"
40
#include "viralloc.h"
41
#include "virxml.h"
42
#include "viruuid.h"
43
#include "virbuffer.h"
44
#include "c-ctype.h"
E
Eric Blake 已提交
45
#include "virfile.h"
46
#include "virstring.h"
47

48
#define VIR_FROM_THIS VIR_FROM_NETWORK
49 50
/* currently, /sbin/tc implementation allows up to 16 bits for minor class size */
#define CLASS_ID_BITMAP_SIZE (1<<16)
51

52
struct _virNetworkObjList {
53
    virObjectLockable parent;
54

55
    virHashTablePtr objs;
56 57
};

58 59
VIR_ENUM_IMPL(virNetworkForward,
              VIR_NETWORK_FORWARD_LAST,
60 61 62
              "none", "nat", "route", "open",
              "bridge", "private", "vepa", "passthrough",
              "hostdev")
63

64 65 66 67
VIR_ENUM_IMPL(virNetworkBridgeMACTableManager,
              VIR_NETWORK_BRIDGE_MAC_TABLE_MANAGER_LAST,
              "default", "kernel", "libvirt")

68 69 70 71
VIR_ENUM_DECL(virNetworkForwardHostdevDevice)
VIR_ENUM_IMPL(virNetworkForwardHostdevDevice,
              VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_LAST,
              "none", "pci", "netdev")
72

73 74 75 76 77 78
VIR_ENUM_IMPL(virNetworkForwardDriverName,
              VIR_NETWORK_FORWARD_DRIVER_NAME_LAST,
              "default",
              "kvm",
              "vfio")

79 80 81
VIR_ENUM_IMPL(virNetworkTaint, VIR_NETWORK_TAINT_LAST,
              "hook-script");

82
static virClassPtr virNetworkObjClass;
83
static virClassPtr virNetworkObjListClass;
84
static void virNetworkObjDispose(void *obj);
85 86 87
static void virNetworkObjListDispose(void *obj);

static int virNetworkObjOnceInit(void)
88
{
89 90 91 92 93 94
    if (!(virNetworkObjClass = virClassNew(virClassForObjectLockable(),
                                           "virNetworkObj",
                                           sizeof(virNetworkObj),
                                           virNetworkObjDispose)))
        return -1;

95
    if (!(virNetworkObjListClass = virClassNew(virClassForObjectLockable(),
96 97 98 99 100 101
                                               "virNetworkObjList",
                                               sizeof(virNetworkObjList),
                                               virNetworkObjListDispose)))
        return -1;
    return 0;
}
102 103


104 105
VIR_ONCE_GLOBAL_INIT(virNetworkObj)

106 107
virNetworkObjPtr
virNetworkObjNew(void)
108
{
109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
    virNetworkObjPtr net;

    if (virNetworkObjInitialize() < 0)
        return NULL;

    if (!(net = virObjectLockableNew(virNetworkObjClass)))
        return NULL;

    if (!(net->class_id = virBitmapNew(CLASS_ID_BITMAP_SIZE)))
        goto error;

    /* The first three class IDs are already taken */
    ignore_value(virBitmapSetBit(net->class_id, 0));
    ignore_value(virBitmapSetBit(net->class_id, 1));
    ignore_value(virBitmapSetBit(net->class_id, 2));

    return net;

 error:
    virObjectUnref(net);
    return NULL;
130 131
}

132 133 134 135 136 137 138
void
virNetworkObjEndAPI(virNetworkObjPtr *net)
{
    if (!*net)
        return;

    virObjectUnlock(*net);
139
    virObjectUnref(*net);
140 141 142
    *net = NULL;
}

143 144 145 146 147 148 149
virNetworkObjListPtr virNetworkObjListNew(void)
{
    virNetworkObjListPtr nets;

    if (virNetworkObjInitialize() < 0)
        return NULL;

150
    if (!(nets = virObjectLockableNew(virNetworkObjListClass)))
151 152
        return NULL;

153
    if (!(nets->objs = virHashCreate(50, virObjectFreeHashData))) {
154 155 156 157
        virObjectUnref(nets);
        return NULL;
    }

158
    return nets;
159 160
}

161 162 163 164 165 166 167 168 169
/**
 * virNetworkObjFindByUUIDLocked:
 * @nets: list of network objects
 * @uuid: network uuid to find
 *
 * This functions requires @nets to be locked already!
 *
 * Returns: not locked, but ref'd network object.
 */
170 171 172
virNetworkObjPtr
virNetworkObjFindByUUIDLocked(virNetworkObjListPtr nets,
                              const unsigned char *uuid)
173
{
174 175
    virNetworkObjPtr ret = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];
176

177
    virUUIDFormat(uuid, uuidstr);
178

179 180
    ret = virHashLookup(nets->objs, uuidstr);
    if (ret)
181
        virObjectRef(ret);
182 183 184
    return ret;
}

185 186 187 188 189 190 191 192 193 194
/**
 * virNetworkObjFindByUUID:
 * @nets: list of network objects
 * @uuid: network uuid to find
 *
 * This functions locks @nets and find network object which
 * corresponds to @uuid.
 *
 * Returns: locked and ref'd network object.
 */
195 196 197 198 199 200 201 202 203
virNetworkObjPtr
virNetworkObjFindByUUID(virNetworkObjListPtr nets,
                        const unsigned char *uuid)
{
    virNetworkObjPtr ret;

    virObjectLock(nets);
    ret = virNetworkObjFindByUUIDLocked(nets, uuid);
    virObjectUnlock(nets);
204 205
    if (ret)
        virObjectLock(ret);
206 207 208
    return ret;
}

209 210 211 212 213 214 215 216
static int
virNetworkObjSearchName(const void *payload,
                        const void *name ATTRIBUTE_UNUSED,
                        const void *data)
{
    virNetworkObjPtr net = (virNetworkObjPtr) payload;
    int want = 0;

217
    virObjectLock(net);
218 219
    if (STREQ(net->def->name, (const char *)data))
        want = 1;
220
    virObjectUnlock(net);
221
    return want;
222 223
}

224 225 226 227 228 229 230 231 232
/*
 * virNetworkObjFindByNameLocked:
 * @nets: list of network objects
 * @name: network name to find
 *
 * This functions requires @nets to be locked already!
 *
 * Returns: not locked, but ref'd network object.
 */
233 234 235
virNetworkObjPtr
virNetworkObjFindByNameLocked(virNetworkObjListPtr nets,
                              const char *name)
236
{
237
    virNetworkObjPtr ret = NULL;
238

239 240
    ret = virHashSearch(nets->objs, virNetworkObjSearchName, name);
    if (ret)
241
        virObjectRef(ret);
242
    return ret;
243 244
}

245 246 247 248 249 250 251 252 253 254
/**
 * virNetworkObjFindByName:
 * @nets: list of network objects
 * @name: network name to find
 *
 * This functions locks @nets and find network object which
 * corresponds to @name.
 *
 * Returns: locked and ref'd network object.
 */
255 256 257 258 259 260 261 262 263
virNetworkObjPtr
virNetworkObjFindByName(virNetworkObjListPtr nets,
                        const char *name)
{
    virNetworkObjPtr ret;

    virObjectLock(nets);
    ret = virNetworkObjFindByNameLocked(nets, name);
    virObjectUnlock(nets);
264 265
    if (ret)
        virObjectLock(ret);
266 267 268
    return ret;
}

269 270 271 272 273 274 275 276 277 278 279 280 281
bool
virNetworkObjTaint(virNetworkObjPtr obj,
                   virNetworkTaintFlags taint)
{
    unsigned int flag = (1 << taint);

    if (obj->taint & flag)
        return false;

    obj->taint |= flag;
    return true;
}

282

283 284 285 286 287
static void
virPortGroupDefClear(virPortGroupDefPtr def)
{
    VIR_FREE(def->name);
    VIR_FREE(def->virtPortProfile);
288
    virNetDevBandwidthFree(def->bandwidth);
289
    virNetDevVlanClear(&def->vlan);
290
    def->bandwidth = NULL;
291 292 293 294 295
}

static void
virNetworkForwardIfDefClear(virNetworkForwardIfDefPtr def)
{
296 297
    if (def->type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV)
        VIR_FREE(def->device.dev);
298 299
}

300 301 302 303 304 305
static void
virNetworkForwardPfDefClear(virNetworkForwardPfDefPtr def)
{
    VIR_FREE(def->dev);
}

306 307 308 309
static void
virNetworkDHCPHostDefClear(virNetworkDHCPHostDefPtr def)
{
    VIR_FREE(def->mac);
310
    VIR_FREE(def->id);
311 312 313
    VIR_FREE(def->name);
}

314
static void
315
virNetworkIPDefClear(virNetworkIPDefPtr def)
316 317 318 319
{
    VIR_FREE(def->family);
    VIR_FREE(def->ranges);

320 321
    while (def->nhosts)
        virNetworkDHCPHostDefClear(&def->hosts[--def->nhosts]);
322 323 324 325 326 327

    VIR_FREE(def->hosts);
    VIR_FREE(def->tftproot);
    VIR_FREE(def->bootfile);
}

328 329
static void
virNetworkDNSTxtDefClear(virNetworkDNSTxtDefPtr def)
330
{
331 332 333 334 335 336 337
    VIR_FREE(def->name);
    VIR_FREE(def->value);
}

static void
virNetworkDNSHostDefClear(virNetworkDNSHostDefPtr def)
{
338 339
    while (def->nnames)
        VIR_FREE(def->names[--def->nnames]);
340 341 342 343 344 345 346 347 348 349 350 351 352 353 354
    VIR_FREE(def->names);
}

static void
virNetworkDNSSrvDefClear(virNetworkDNSSrvDefPtr def)
{
    VIR_FREE(def->domain);
    VIR_FREE(def->service);
    VIR_FREE(def->protocol);
    VIR_FREE(def->target);
}

static void
virNetworkDNSDefClear(virNetworkDNSDefPtr def)
{
355 356 357 358 359
    if (def->forwarders) {
        while (def->nfwds)
            VIR_FREE(def->forwarders[--def->nfwds]);
        VIR_FREE(def->forwarders);
    }
360
    if (def->txts) {
361 362
        while (def->ntxts)
            virNetworkDNSTxtDefClear(&def->txts[--def->ntxts]);
363
        VIR_FREE(def->txts);
364 365
    }
    if (def->hosts) {
366 367
        while (def->nhosts)
            virNetworkDNSHostDefClear(&def->hosts[--def->nhosts]);
368
        VIR_FREE(def->hosts);
369 370
    }
    if (def->srvs) {
371 372
        while (def->nsrvs)
            virNetworkDNSSrvDefClear(&def->srvs[--def->nsrvs]);
373
        VIR_FREE(def->srvs);
374 375 376
    }
}

377 378 379
static void
virNetworkForwardDefClear(virNetworkForwardDefPtr def)
{
380
    size_t i;
381

382
    for (i = 0; i < def->npfs && def->pfs; i++)
383
        virNetworkForwardPfDefClear(&def->pfs[i]);
384 385
    VIR_FREE(def->pfs);

386
    for (i = 0; i < def->nifs && def->ifs; i++)
387
        virNetworkForwardIfDefClear(&def->ifs[i]);
388
    VIR_FREE(def->ifs);
389
    def->nifs = def->npfs = 0;
390 391 392 393
}

void
virNetworkDefFree(virNetworkDefPtr def)
394
{
395
    size_t i;
396 397 398 399 400 401

    if (!def)
        return;

    VIR_FREE(def->name);
    VIR_FREE(def->bridge);
402
    VIR_FREE(def->domain);
403

404
    virNetworkForwardDefClear(&def->forward);
405

406
    for (i = 0; i < def->nips && def->ips; i++)
407
        virNetworkIPDefClear(&def->ips[i]);
408
    VIR_FREE(def->ips);
409

410
    for (i = 0; i < def->nroutes && def->routes; i++)
411
        virNetDevIPRouteFree(def->routes[i]);
412 413
    VIR_FREE(def->routes);

414
    for (i = 0; i < def->nPortGroups && def->portGroups; i++)
415
        virPortGroupDefClear(&def->portGroups[i]);
416 417
    VIR_FREE(def->portGroups);

418
    virNetworkDNSDefClear(&def->dns);
419

420 421
    VIR_FREE(def->virtPortProfile);

422
    virNetDevBandwidthFree(def->bandwidth);
423
    virNetDevVlanClear(&def->vlan);
424 425 426

    xmlFreeNode(def->metadata);

427 428 429
    VIR_FREE(def);
}

430 431
static void
virNetworkObjDispose(void *obj)
432
{
433
    virNetworkObjPtr net = obj;
434 435 436

    virNetworkDefFree(net->def);
    virNetworkDefFree(net->newDef);
437
    virBitmapFree(net->class_id);
438 439
}

440 441
static void
virNetworkObjListDispose(void *obj)
442
{
443
    virNetworkObjListPtr nets = obj;
444

445
    virHashFree(nets->objs);
446 447
}

448 449 450
/*
 * virNetworkObjAssignDef:
 * @network: the network object to update
451
 * @def: the new NetworkDef (will be consumed by this function)
452 453
 * @live: is this new def the "live" version, or the "persistent" version
 *
454
 * Replace the appropriate copy of the given network's def or newDef
455
 * with def. Use "live" and current state of the network to determine
456 457 458 459 460 461
 * which to replace and what to do with the old defs. When a non-live
 * def is set, indicate that the network is now persistent.
 *
 * NB: a persistent network can be made transient by calling with:
 * virNetworkObjAssignDef(network, NULL, false) (i.e. set the
 * persistent def to NULL)
462 463
 *
 */
464
void
465
virNetworkObjAssignDef(virNetworkObjPtr network,
E
Eric Blake 已提交
466
                       virNetworkDefPtr def,
467
                       bool live)
468
{
469 470 471 472 473 474 475 476
    if (live) {
        /* before setting new live def, save (into newDef) any
         * existing persistent (!live) def to be restored when the
         * network is destroyed, unless there is one already saved.
         */
        if (network->persistent && !network->newDef)
            network->newDef = network->def;
        else
477
            virNetworkDefFree(network->def);
478 479 480 481 482 483 484
        network->def = def;
    } else { /* !live */
        virNetworkDefFree(network->newDef);
        if (virNetworkObjIsActive(network)) {
            /* save new configuration to be restored on network
             * shutdown, leaving current live def alone
             */
485
            network->newDef = def;
486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503
        } else { /* !live and !active */
            if (network->def && !network->persistent) {
                /* network isn't (yet) marked active or persistent,
                 * but already has a "live" def set. This means we are
                 * currently setting the persistent def as a part of
                 * the process of starting the network, so we need to
                 * preserve the "not yet live" def in network->def.
                 */
                network->newDef = def;
            } else {
                /* either there is no live def set, or this network
                 * was already set as persistent, so the proper thing
                 * is to overwrite network->def.
                 */
                network->newDef = NULL;
                virNetworkDefFree(network->def);
                network->def = def;
            }
504
        }
505
        network->persistent = !!def;
506 507
    }
}
508

509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585
/*
 * If flags & VIR_NETWORK_OBJ_LIST_ADD_CHECK_LIVE then this will
 * refuse updating an existing def if the current def is live
 *
 * If flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE then the @def being
 * added is assumed to represent a live config, not a future
 * inactive config
 *
 * If flags is zero, network is considered as inactive and persistent.
 */
static virNetworkObjPtr
virNetworkAssignDefLocked(virNetworkObjListPtr nets,
                          virNetworkDefPtr def,
                          unsigned int flags)
{
    virNetworkObjPtr network;
    virNetworkObjPtr ret = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];

    /* See if a network with matching UUID already exists */
    if ((network = virNetworkObjFindByUUIDLocked(nets, def->uuid))) {
        virObjectLock(network);
        /* UUID matches, but if names don't match, refuse it */
        if (STRNEQ(network->def->name, def->name)) {
            virUUIDFormat(network->def->uuid, uuidstr);
            virReportError(VIR_ERR_OPERATION_FAILED,
                           _("network '%s' is already defined with uuid %s"),
                           network->def->name, uuidstr);
            goto cleanup;
        }

        if (flags & VIR_NETWORK_OBJ_LIST_ADD_CHECK_LIVE) {
            /* UUID & name match, but if network is already active, refuse it */
            if (virNetworkObjIsActive(network)) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("network is already active as '%s'"),
                               network->def->name);
                goto cleanup;
            }
        }

        virNetworkObjAssignDef(network,
                               def,
                               !!(flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE));
    } else {
        /* UUID does not match, but if a name matches, refuse it */
        if ((network = virNetworkObjFindByNameLocked(nets, def->name))) {
            virObjectLock(network);
            virUUIDFormat(network->def->uuid, uuidstr);
            virReportError(VIR_ERR_OPERATION_FAILED,
                           _("network '%s' already exists with uuid %s"),
                           def->name, uuidstr);
            goto cleanup;
        }

        if (!(network = virNetworkObjNew()))
              goto cleanup;

        virObjectLock(network);

        virUUIDFormat(def->uuid, uuidstr);
        if (virHashAddEntry(nets->objs, uuidstr, network) < 0)
            goto cleanup;

        network->def = def;
        network->persistent = !(flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE);
        virObjectRef(network);
    }

    ret = network;
    network = NULL;

 cleanup:
    virNetworkObjEndAPI(&network);
    return ret;
}

586 587 588 589
/*
 * virNetworkAssignDef:
 * @nets: list of all networks
 * @def: the new NetworkDef (will be consumed by this function iff successful)
590
 * @flags: bitwise-OR of VIR_NETWORK_OBJ_LIST_ADD_* flags
591 592 593 594 595 596
 *
 * Either replace the appropriate copy of the NetworkDef with name
 * matching def->name or, if not found, create a new NetworkObj with
 * def. For an existing network, use "live" and current state of the
 * network to determine which to replace.
 *
597 598
 * Look at virNetworkAssignDefLocked() for @flags description.
 *
599
 * Returns NULL on error, virNetworkObjPtr on success.
600 601 602
 */
virNetworkObjPtr
virNetworkAssignDef(virNetworkObjListPtr nets,
E
Eric Blake 已提交
603
                    virNetworkDefPtr def,
604
                    unsigned int flags)
605 606 607
{
    virNetworkObjPtr network;

608
    virObjectLock(nets);
609
    network = virNetworkAssignDefLocked(nets, def, flags);
610
    virObjectUnlock(nets);
611 612 613
    return network;
}

614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640
/*
 * virNetworkObjSetDefTransient:
 * @network: network object pointer
 * @live: if true, run this operation even for an inactive network.
 *   this allows freely updated network->def with runtime defaults
 *   before starting the network, which will be discarded on network
 *   shutdown. Any cleanup paths need to be sure to handle newDef if
 *   the network is never started.
 *
 * Mark the active network config as transient. Ensures live-only update
 * operations do not persist past network destroy.
 *
 * Returns 0 on success, -1 on failure
 */
int
virNetworkObjSetDefTransient(virNetworkObjPtr network, bool live)
{
    if (!virNetworkObjIsActive(network) && !live)
        return 0;

    if (!network->persistent || network->newDef)
        return 0;

    network->newDef = virNetworkDefCopy(network->def, VIR_NETWORK_XML_INACTIVE);
    return network->newDef ? 0 : -1;
}

641 642 643 644 645 646 647
/* virNetworkObjUnsetDefTransient:
 *
 * This *undoes* what virNetworkObjSetDefTransient did.
 */
void
virNetworkObjUnsetDefTransient(virNetworkObjPtr network)
{
648
    if (network->newDef) {
649 650 651 652 653 654
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }
}

655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722
/*
 * virNetworkObjGetPersistentDef:
 * @network: network object pointer
 *
 * Return the persistent network configuration. If network is transient,
 * return the running config.
 *
 * Returns NULL on error, virNetworkDefPtr on success.
 */
virNetworkDefPtr
virNetworkObjGetPersistentDef(virNetworkObjPtr network)
{
    if (network->newDef)
        return network->newDef;
    else
        return network->def;
}

/*
 * virNetworkObjReplacePersistentDef:
 * @network: network object pointer
 * @def: new virNetworkDef to replace current persistent config
 *
 * Replace the "persistent" network configuration with the given new
 * virNetworkDef. This pays attention to whether or not the network
 * is active.
 *
 * Returns -1 on error, 0 on success
 */
int
virNetworkObjReplacePersistentDef(virNetworkObjPtr network,
                                  virNetworkDefPtr def)
{
    if (virNetworkObjIsActive(network)) {
        virNetworkDefFree(network->newDef);
        network->newDef = def;
    } else {
        virNetworkDefFree(network->def);
        network->def = def;
    }
    return 0;
}

/*
 * virNetworkDefCopy:
 * @def: NetworkDef to copy
 * @flags: VIR_NETWORK_XML_INACTIVE if appropriate
 *
 * make a deep copy of the given NetworkDef
 *
 * Returns a new NetworkDef on success, or NULL on failure.
 */
virNetworkDefPtr
virNetworkDefCopy(virNetworkDefPtr def, unsigned int flags)
{
    char *xml = NULL;
    virNetworkDefPtr newDef = NULL;

    if (!def) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("NULL NetworkDef"));
        return NULL;
    }

    /* deep copy with a format/parse cycle */
    if (!(xml = virNetworkDefFormat(def, flags)))
        goto cleanup;
    newDef = virNetworkDefParseString(xml);
723
 cleanup:
724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767
    VIR_FREE(xml);
    return newDef;
}

/*
 * virNetworkConfigChangeSetup:
 *
 * 1) checks whether network state is consistent with the requested
 *    type of modification.
 *
 * 3) make sure there are separate "def" and "newDef" copies of
 *    networkDef if appropriate.
 *
 * Returns 0 on success, -1 on error.
 */
int
virNetworkConfigChangeSetup(virNetworkObjPtr network, unsigned int flags)
{
    bool isActive;
    int ret = -1;

    isActive = virNetworkObjIsActive(network);

    if (!isActive && (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("network is not running"));
        goto cleanup;
    }

    if (flags & VIR_NETWORK_UPDATE_AFFECT_CONFIG) {
        if (!network->persistent) {
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot change persistent config of a "
                             "transient network"));
            goto cleanup;
        }
        /* this should already have been done by the driver, but do it
         * anyway just in case.
         */
        if (isActive && (virNetworkObjSetDefTransient(network, false) < 0))
            goto cleanup;
    }

    ret = 0;
768
 cleanup:
769 770 771
    return ret;
}

772
void virNetworkRemoveInactive(virNetworkObjListPtr nets,
E
Eric Blake 已提交
773
                              virNetworkObjPtr net)
774
{
775
    char uuidstr[VIR_UUID_STRING_BUFLEN];
776

777
    virUUIDFormat(net->def->uuid, uuidstr);
778
    virObjectRef(net);
779
    virObjectUnlock(net);
780 781
    virObjectLock(nets);
    virObjectLock(net);
782
    virHashRemoveEntry(nets->objs, uuidstr);
783 784
    virObjectUnlock(nets);
    virObjectUnref(net);
785 786
}

787
/* return ips[index], or NULL if there aren't enough ips */
788 789
virNetworkIPDefPtr
virNetworkDefGetIPByIndex(const virNetworkDef *def,
790 791
                          int family, size_t n)
{
792
    size_t i;
793 794 795 796

    if (!def->ips || n >= def->nips)
        return NULL;

797
    if (family == AF_UNSPEC)
798 799 800
        return &def->ips[n];

    /* find the nth ip of type "family" */
801 802
    for (i = 0; i < def->nips; i++) {
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->ips[i].address, family)
803
            && (n-- <= 0)) {
804
            return &def->ips[i];
805 806 807 808 809 810
        }
    }
    /* failed to find enough of the right family */
    return NULL;
}

811
/* return routes[index], or NULL if there aren't enough routes */
812
virNetDevIPRoutePtr
813 814 815 816 817 818 819 820 821 822 823 824 825
virNetworkDefGetRouteByIndex(const virNetworkDef *def,
                             int family, size_t n)
{
    size_t i;

    if (!def->routes || n >= def->nroutes)
        return NULL;

    if (family == AF_UNSPEC)
        return def->routes[n];

    /* find the nth route of type "family" */
    for (i = 0; i < def->nroutes; i++) {
826
        virSocketAddrPtr addr = virNetDevIPRouteGetAddress(def->routes[i]);
827 828 829 830 831 832 833 834 835 836
        if (VIR_SOCKET_ADDR_IS_FAMILY(addr, family)
            && (n-- <= 0)) {
            return def->routes[i];
        }
    }

    /* failed to find enough of the right family */
    return NULL;
}

L
Laine Stump 已提交
837 838 839
/* return number of 1 bits in netmask for the network's ipAddress,
 * or -1 on error
 */
840
int virNetworkIPDefPrefix(const virNetworkIPDef *def)
L
Laine Stump 已提交
841
{
842
    return virSocketAddrGetIPPrefix(&def->address,
843 844
                                    &def->netmask,
                                    def->prefix);
L
Laine Stump 已提交
845 846 847 848 849 850
}

/* Fill in a virSocketAddr with the proper netmask for this
 * definition, based on either the definition's netmask, or its
 * prefix. Return -1 on error (and set the netmask family to AF_UNSPEC)
 */
851
int virNetworkIPDefNetmask(const virNetworkIPDef *def,
852
                           virSocketAddrPtr netmask)
L
Laine Stump 已提交
853
{
854
    if (VIR_SOCKET_ADDR_IS_FAMILY(&def->netmask, AF_INET)) {
L
Laine Stump 已提交
855 856 857 858
        *netmask = def->netmask;
        return 0;
    }

859
    return virSocketAddrPrefixToNetmask(virNetworkIPDefPrefix(def), netmask,
860
                                        VIR_SOCKET_ADDR_FAMILY(&def->address));
L
Laine Stump 已提交
861 862
}

863 864

static int
865
virSocketAddrRangeParseXML(const char *networkName,
866
                           virNetworkIPDefPtr ipdef,
867 868
                           xmlNodePtr node,
                           virSocketAddrRangePtr range)
869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893
{


    char *start = NULL, *end = NULL;
    int ret = -1;

    if (!(start = virXMLPropString(node, "start"))) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing 'start' attribute in dhcp range for network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&range->start, start, AF_UNSPEC) < 0)
        goto cleanup;

    if (!(end = virXMLPropString(node, "end"))) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing 'end' attribute in dhcp range for network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&range->end, end, AF_UNSPEC) < 0)
        goto cleanup;

    /* do a sanity check of the range */
894
    if (virSocketAddrGetRange(&range->start, &range->end, &ipdef->address,
895
                              virNetworkIPDefPrefix(ipdef)) < 0)
896 897 898 899
        goto cleanup;

    ret = 0;

900
 cleanup:
901 902 903 904 905 906
    VIR_FREE(start);
    VIR_FREE(end);
    return ret;
}

static int
907
virNetworkDHCPHostDefParseXML(const char *networkName,
908
                              virNetworkIPDefPtr def,
909 910 911
                              xmlNodePtr node,
                              virNetworkDHCPHostDefPtr host,
                              bool partialOkay)
912
{
913
    char *mac = NULL, *name = NULL, *ip = NULL, *id = NULL;
914 915 916 917 918 919
    virMacAddr addr;
    virSocketAddr inaddr;
    int ret = -1;

    mac = virXMLPropString(node, "mac");
    if (mac != NULL) {
G
Gene Czarcinski 已提交
920 921 922 923 924 925 926
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid to specify MAC address '%s' "
                             "in network '%s' IPv6 static host definition"),
                           mac, networkName);
            goto cleanup;
        }
927 928 929 930 931 932 933 934 935 936 937 938 939 940 941
        if (virMacAddrParse(mac, &addr) < 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Cannot parse MAC address '%s' in network '%s'"),
                           mac, networkName);
            goto cleanup;
        }
        if (virMacAddrIsMulticast(&addr)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("expected unicast mac address, found "
                             "multicast '%s' in network '%s'"),
                           (const char *)mac, networkName);
            goto cleanup;
        }
    }

942 943 944 945 946 947 948
    id = virXMLPropString(node, "id");
    if (id) {
        char *cp = id + strspn(id, "0123456789abcdefABCDEF:");
        if (*cp) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid character '%c' in id '%s' of network '%s'"),
                           *cp, id, networkName);
L
Luyao Huang 已提交
949
            goto cleanup;
950 951 952
        }
    }

953 954 955
    name = virXMLPropString(node, "name");
    if (name && (!c_isalpha(name[0]))) {
        virReportError(VIR_ERR_XML_ERROR,
956
                       _("Cannot use host name '%s' in network '%s'"),
957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977
                       name, networkName);
        goto cleanup;
    }

    ip = virXMLPropString(node, "ip");
    if (ip && (virSocketAddrParse(&inaddr, ip, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid IP address in static host definition "
                         "for network '%s'"),
                       networkName);
        goto cleanup;
    }

    if (partialOkay) {
        /* for search/match, you just need one of the three */
        if (!(mac || name || ip)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("At least one of name, mac, or ip attribute "
                             "must be specified for static host definition "
                             "in network '%s' "),
                           networkName);
978
            goto cleanup;
979 980
        }
    } else {
G
Gene Czarcinski 已提交
981 982 983 984
        /* normal usage - you need at least name (IPv6) or one of MAC
         * address or name (IPv4)
         */
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
985
            if (!(id || name)) {
G
Gene Czarcinski 已提交
986 987
                virReportError(VIR_ERR_XML_ERROR,
                           _("Static host definition in IPv6 network '%s' "
988
                             "must have id or name attribute"),
G
Gene Czarcinski 已提交
989 990 991 992
                           networkName);
                goto cleanup;
            }
        } else if (!(mac || name)) {
993
            virReportError(VIR_ERR_XML_ERROR,
G
Gene Czarcinski 已提交
994
                           _("Static host definition in IPv4 network '%s' "
995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009
                             "must have mac or name attribute"),
                           networkName);
            goto cleanup;
        }
        if (!ip) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Missing IP address in static host definition "
                             "for network '%s'"),
                           networkName);
            goto cleanup;
        }
    }

    host->mac = mac;
    mac = NULL;
1010 1011
    host->id = id;
    id = NULL;
1012 1013 1014 1015 1016 1017
    host->name = name;
    name = NULL;
    if (ip)
        host->ip = inaddr;
    ret = 0;

1018
 cleanup:
1019
    VIR_FREE(mac);
1020
    VIR_FREE(id);
1021 1022 1023 1024 1025 1026
    VIR_FREE(name);
    VIR_FREE(ip);
    return ret;
}

static int
1027 1028
virNetworkDHCPDefParseXML(const char *networkName,
                          xmlNodePtr node,
1029
                          virNetworkIPDefPtr def)
1030
{
1031
    int ret = -1;
1032
    xmlNodePtr cur;
1033 1034 1035 1036 1037
    virSocketAddrRange range;
    virNetworkDHCPHostDef host;

    memset(&range, 0, sizeof(range));
    memset(&host, 0, sizeof(host));
1038 1039 1040

    cur = node->children;
    while (cur != NULL) {
1041 1042
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "range")) {
1043

1044 1045 1046 1047
            if (virSocketAddrRangeParseXML(networkName, def, cur, &range) < 0)
                goto cleanup;
            if (VIR_APPEND_ELEMENT(def->ranges, def->nranges, range) < 0)
                goto cleanup;
1048

1049 1050 1051
        } else if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "host")) {

G
Gene Czarcinski 已提交
1052
            if (virNetworkDHCPHostDefParseXML(networkName, def, cur,
1053 1054 1055 1056
                                              &host, false) < 0)
                goto cleanup;
            if (VIR_APPEND_ELEMENT(def->hosts, def->nhosts, host) < 0)
                goto cleanup;
1057

G
Gene Czarcinski 已提交
1058 1059 1060
        } else if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET) &&
                   cur->type == XML_ELEMENT_NODE &&
                   xmlStrEqual(cur->name, BAD_CAST "bootp")) {
1061 1062
            char *file;
            char *server;
1063
            virSocketAddr inaddr;
1064
            memset(&inaddr, 0, sizeof(inaddr));
1065

1066
            if (!(file = virXMLPropString(cur, "file"))) {
1067 1068 1069
                cur = cur->next;
                continue;
            }
1070
            server = virXMLPropString(cur, "server");
1071

1072
            if (server &&
1073
                virSocketAddrParse(&inaddr, server, AF_UNSPEC) < 0) {
E
Eric Blake 已提交
1074 1075
                VIR_FREE(file);
                VIR_FREE(server);
1076
                goto cleanup;
E
Eric Blake 已提交
1077
            }
1078

1079
            def->bootfile = file;
1080
            def->bootserver = inaddr;
E
Eric Blake 已提交
1081
            VIR_FREE(server);
1082 1083 1084 1085 1086
        }

        cur = cur->next;
    }

1087 1088 1089 1090
    ret = 0;
 cleanup:
    virNetworkDHCPHostDefClear(&host);
    return ret;
1091 1092
}

1093
static int
1094 1095 1096 1097
virNetworkDNSHostDefParseXML(const char *networkName,
                             xmlNodePtr node,
                             virNetworkDNSHostDefPtr def,
                             bool partialOkay)
1098 1099 1100 1101
{
    xmlNodePtr cur;
    char *ip;

1102 1103 1104 1105
    if (!(ip = virXMLPropString(node, "ip")) && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing IP address in network '%s' DNS HOST record"),
                       networkName);
1106 1107 1108
        goto error;
    }

1109 1110 1111 1112 1113
    if (ip && (virSocketAddrParse(&def->ip, ip, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Invalid IP address in network '%s' DNS HOST record"),
                       networkName);
        VIR_FREE(ip);
1114 1115
        goto error;
    }
1116
    VIR_FREE(ip);
1117 1118 1119 1120 1121 1122

    cur = node->children;
    while (cur != NULL) {
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "hostname")) {
              if (cur->children != NULL) {
1123 1124 1125
                  char *name = (char *) xmlNodeGetContent(cur);

                  if (!name) {
1126 1127 1128
                      virReportError(VIR_ERR_XML_DETAIL,
                                     _("Missing hostname in network '%s' DNS HOST record"),
                                     networkName);
1129 1130 1131 1132 1133
                      goto error;
                  }
                  if (VIR_APPEND_ELEMENT(def->names, def->nnames, name) < 0) {
                      VIR_FREE(name);
                      goto error;
1134
                  }
1135 1136 1137 1138
              }
        }
        cur = cur->next;
    }
1139 1140 1141 1142 1143 1144
    if (def->nnames == 0 && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing hostname in network '%s' DNS HOST record"),
                       networkName);
        goto error;
    }
1145

1146 1147 1148 1149 1150 1151
    if (!VIR_SOCKET_ADDR_VALID(&def->ip) && def->nnames == 0) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing ip and hostname in network '%s' DNS HOST record"),
                       networkName);
        goto error;
    }
1152

1153
    return 0;
1154

1155
 error:
1156 1157
    virNetworkDNSHostDefClear(def);
    return -1;
1158 1159
}

1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174
/* This includes all characters used in the names of current
 * /etc/services and /etc/protocols files (on Fedora 20), except ".",
 * which we can't allow because it would conflict with the use of "."
 * as a field separator in the SRV record, there appears to be no way
 * to escape it in, and the protocols/services that use "." in the
 * name are obscure and unlikely to be used anyway.
 */
#define PROTOCOL_CHARS \
    "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" \
    "-+/"

#define SERVICE_CHARS \
    "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" \
    "_-+/*"

1175
static int
1176 1177 1178 1179 1180
virNetworkDNSSrvDefParseXML(const char *networkName,
                            xmlNodePtr node,
                            xmlXPathContextPtr ctxt,
                            virNetworkDNSSrvDefPtr def,
                            bool partialOkay)
1181
{
1182 1183 1184 1185 1186
    int ret;
    xmlNodePtr save_ctxt = ctxt->node;

    ctxt->node = node;

1187
    if (!(def->service = virXMLPropString(node, "service")) && !partialOkay) {
1188
        virReportError(VIR_ERR_XML_DETAIL,
1189 1190
                       _("missing required service attribute in DNS SRV record "
                         "of network '%s'"), networkName);
1191 1192
        goto error;
    }
1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207
    if (def->service) {
        if (strlen(def->service) > DNS_RECORD_LENGTH_SRV) {
            virReportError(VIR_ERR_XML_DETAIL,
                           _("service attribute '%s' in network '%s' is too long, "
                             "limit is %d bytes"),
                           def->service, networkName, DNS_RECORD_LENGTH_SRV);
            goto error;
        }
        if (strspn(def->service, SERVICE_CHARS) < strlen(def->service)) {
            virReportError(VIR_ERR_XML_DETAIL,
                           _("invalid character in service attribute '%s' "
                             "in DNS SRV record of network '%s'"),
                           def->service, networkName);
            goto error;
        }
1208 1209
    }

1210
    if (!(def->protocol = virXMLPropString(node, "protocol")) && !partialOkay) {
1211
        virReportError(VIR_ERR_XML_DETAIL,
1212 1213
                       _("missing required protocol attribute "
                         "in DNS SRV record '%s' of network '%s'"),
1214
                       def->service, networkName);
1215 1216
        goto error;
    }
1217 1218
    if (def->protocol &&
        strspn(def->protocol, PROTOCOL_CHARS) < strlen(def->protocol)) {
1219
        virReportError(VIR_ERR_XML_DETAIL,
1220 1221
                       _("invalid character in protocol attribute '%s' "
                         "in DNS SRV record of network '%s'"),
1222
                       def->protocol, networkName);
1223 1224 1225
        goto error;
    }

1226
    /* Following attributes are optional */
1227 1228
    def->domain = virXMLPropString(node, "domain");
    def->target = virXMLPropString(node, "target");
1229

1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244
    ret = virXPathUInt("string(./@port)", ctxt, &def->port);
    if (ret >= 0 && !def->target) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("DNS SRV port attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
    if (ret == -2 || (ret >= 0 && (def->port < 1 || def->port > 65535))) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("invalid DNS SRV port attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
1245

1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259
    ret = virXPathUInt("string(./@priority)", ctxt, &def->priority);
    if (ret >= 0 && !def->target) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("DNS SRV priority attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
    if (ret == -2 || (ret >= 0 && def->priority > 65535)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Invalid DNS SRV priority attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
1260 1261
    }

1262 1263
    ret = virXPathUInt("string(./@weight)", ctxt, &def->weight);
    if (ret >= 0 && !def->target) {
1264
        virReportError(VIR_ERR_XML_DETAIL,
1265 1266 1267
                       _("DNS SRV weight attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
1268 1269
        goto error;
    }
1270 1271 1272 1273 1274 1275 1276 1277 1278
    if (ret == -2 || (ret >= 0 && def->weight > 65535)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("invalid DNS SRV weight attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }

    ctxt->node = save_ctxt;
1279
    return 0;
1280

1281
 error:
1282
    virNetworkDNSSrvDefClear(def);
1283
    ctxt->node = save_ctxt;
1284 1285 1286 1287 1288 1289 1290 1291 1292
    return -1;
}

static int
virNetworkDNSTxtDefParseXML(const char *networkName,
                            xmlNodePtr node,
                            virNetworkDNSTxtDefPtr def,
                            bool partialOkay)
{
1293 1294
    const char *bad = " ,";

1295 1296 1297 1298 1299 1300
    if (!(def->name = virXMLPropString(node, "name"))) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("missing required name attribute in DNS TXT record "
                         "of network %s"), networkName);
        goto error;
    }
1301
    if (strcspn(def->name, bad) != strlen(def->name)) {
1302
        virReportError(VIR_ERR_XML_DETAIL,
1303
                       _("prohibited character in DNS TXT record "
1304 1305 1306 1307 1308 1309 1310 1311 1312
                         "name '%s' of network %s"), def->name, networkName);
        goto error;
    }
    if (!(def->value = virXMLPropString(node, "value")) && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("missing required value attribute in DNS TXT record "
                         "named '%s' of network %s"), def->name, networkName);
        goto error;
    }
1313

1314 1315 1316 1317 1318 1319 1320
    if (!(def->name || def->value)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing required name or value "
                         "in DNS TXT record of network %s"), networkName);
        goto error;
    }
    return 0;
1321

1322
 error:
1323 1324
    virNetworkDNSTxtDefClear(def);
    return -1;
1325 1326
}

1327
static int
1328
virNetworkDNSDefParseXML(const char *networkName,
1329
                         xmlNodePtr node,
1330 1331
                         xmlXPathContextPtr ctxt,
                         virNetworkDNSDefPtr def)
1332
{
1333 1334 1335
    xmlNodePtr *hostNodes = NULL;
    xmlNodePtr *srvNodes = NULL;
    xmlNodePtr *txtNodes = NULL;
1336
    xmlNodePtr *fwdNodes = NULL;
1337
    char *forwardPlainNames = NULL;
1338
    char *enable = NULL;
1339
    int nhosts, nsrvs, ntxts, nfwds;
1340 1341
    size_t i;
    int ret = -1;
1342
    xmlNodePtr save = ctxt->node;
1343

1344 1345
    ctxt->node = node;

1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357
    enable = virXPathString("string(./@enable)", ctxt);
    if (enable) {
        def->enable = virTristateBoolTypeFromString(enable);
        if (def->enable <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid dns enable setting '%s' "
                             "in network '%s'"),
                           enable, networkName);
            goto cleanup;
        }
    }

1358 1359
    forwardPlainNames = virXPathString("string(./@forwardPlainNames)", ctxt);
    if (forwardPlainNames) {
J
Ján Tomko 已提交
1360
        def->forwardPlainNames = virTristateBoolTypeFromString(forwardPlainNames);
1361
        if (def->forwardPlainNames <= 0) {
1362 1363 1364 1365 1366 1367 1368 1369
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid dns forwardPlainNames setting '%s' "
                             "in network '%s'"),
                           forwardPlainNames, networkName);
            goto cleanup;
        }
    }

1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393
    nfwds = virXPathNodeSet("./forwarder", ctxt, &fwdNodes);
    if (nfwds < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <forwarder> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (nfwds > 0) {
        if (VIR_ALLOC_N(def->forwarders, nfwds) < 0)
            goto cleanup;

        for (i = 0; i < nfwds; i++) {
            def->forwarders[i] = virXMLPropString(fwdNodes[i], "addr");
            if (virSocketAddrParse(NULL, def->forwarders[i], AF_UNSPEC) < 0) {
                virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid forwarder IP address '%s' "
                             "in network '%s'"),
                           def->forwarders[i], networkName);
                goto cleanup;
            }
            def->nfwds++;
        }
    }

1394 1395 1396 1397 1398 1399
    nhosts = virXPathNodeSet("./host", ctxt, &hostNodes);
    if (nhosts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <host> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
1400
    }
1401
    if (nhosts > 0) {
1402
        if (VIR_ALLOC_N(def->hosts, nhosts) < 0)
1403
            goto cleanup;
1404

1405 1406
        for (i = 0; i < nhosts; i++) {
            if (virNetworkDNSHostDefParseXML(networkName, hostNodes[i],
1407 1408
                                             &def->hosts[def->nhosts], false) < 0) {
                goto cleanup;
1409
            }
1410 1411 1412
            def->nhosts++;
        }
    }
1413

1414 1415 1416 1417 1418 1419 1420 1421
    nsrvs = virXPathNodeSet("./srv", ctxt, &srvNodes);
    if (nsrvs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <srv> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (nsrvs > 0) {
1422
        if (VIR_ALLOC_N(def->srvs, nsrvs) < 0)
1423
            goto cleanup;
1424

1425 1426
        for (i = 0; i < nsrvs; i++) {
            if (virNetworkDNSSrvDefParseXML(networkName, srvNodes[i], ctxt,
1427 1428
                                            &def->srvs[def->nsrvs], false) < 0) {
                goto cleanup;
1429
            }
1430 1431 1432
            def->nsrvs++;
        }
    }
1433

1434 1435 1436 1437 1438 1439 1440 1441
    ntxts = virXPathNodeSet("./txt", ctxt, &txtNodes);
    if (ntxts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <txt> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (ntxts > 0) {
1442
        if (VIR_ALLOC_N(def->txts, ntxts) < 0)
1443
            goto cleanup;
1444

1445 1446
        for (i = 0; i < ntxts; i++) {
            if (virNetworkDNSTxtDefParseXML(networkName, txtNodes[i],
1447 1448 1449 1450 1451
                                            &def->txts[def->ntxts], false) < 0) {
                goto cleanup;
            }
            def->ntxts++;
        }
1452 1453
    }

1454 1455 1456 1457 1458 1459 1460 1461
    if (def->enable == VIR_TRISTATE_BOOL_NO &&
        (nfwds || nhosts || nsrvs || ntxts)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Extra data in disabled network '%s'"),
                       networkName);
        goto cleanup;
    }

1462
    ret = 0;
1463
 cleanup:
1464
    VIR_FREE(enable);
1465
    VIR_FREE(forwardPlainNames);
1466
    VIR_FREE(fwdNodes);
1467 1468 1469 1470
    VIR_FREE(hostNodes);
    VIR_FREE(srvNodes);
    VIR_FREE(txtNodes);
    ctxt->node = save;
1471 1472 1473
    return ret;
}

1474
static int
1475 1476 1477
virNetworkIPDefParseXML(const char *networkName,
                        xmlNodePtr node,
                        xmlXPathContextPtr ctxt,
1478
                        virNetworkIPDefPtr def)
1479 1480
{
    /*
1481
     * virNetworkIPDef object is already allocated as part of an array.
1482 1483 1484 1485 1486
     * On failure clear it out, but don't free it.
     */

    xmlNodePtr cur, save;
    char *address = NULL, *netmask = NULL;
G
Gene Czarcinski 已提交
1487 1488
    unsigned long prefix = 0;
    int prefixRc;
1489 1490 1491 1492 1493 1494 1495
    int result = -1;

    save = ctxt->node;
    ctxt->node = node;

    /* grab raw data from XML */
    def->family = virXPathString("string(./@family)", ctxt);
G
Gene Czarcinski 已提交
1496

1497
    address = virXPathString("string(./@address)", ctxt);
G
Gene Czarcinski 已提交
1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509
    if (!address) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing required address attribute in network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&def->address, address, AF_UNSPEC) < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid address '%s' in network '%s'"),
                       address, networkName);
        goto cleanup;
    }
1510 1511

    netmask = virXPathString("string(./@netmask)", ctxt);
G
Gene Czarcinski 已提交
1512 1513 1514 1515 1516 1517 1518
    if (netmask &&
        (virSocketAddrParse(&def->netmask, netmask, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid netmask '%s' in network '%s'"),
                       netmask, networkName);
        goto cleanup;
    }
1519

G
Gene Czarcinski 已提交
1520 1521 1522 1523 1524 1525
    prefixRc = virXPathULong("string(./@prefix)", ctxt, &prefix);
    if (prefixRc == -2) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid ULong value specified for prefix in definition of network '%s'"),
                       networkName);
        goto cleanup;
1526
    }
G
Gene Czarcinski 已提交
1527 1528 1529 1530
    if (prefixRc < 0)
        def->prefix = 0;
    else
        def->prefix = prefix;
1531

G
Gene Czarcinski 已提交
1532 1533
    /* validate address, etc. for each family */
    if ((def->family == NULL) || (STREQ(def->family, "ipv4"))) {
1534 1535
        if (!(VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET) ||
              VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_UNSPEC))) {
1536
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1537 1538
                           _("%s family specified for non-IPv4 address '%s' in network '%s'"),
                           def->family == NULL? "no" : "ipv4", address, networkName);
1539
            goto cleanup;
1540
        }
G
Gene Czarcinski 已提交
1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555
        if (netmask) {
            if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->netmask, AF_INET)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Invalid netmask '%s' for address '%s' "
                                 "in network '%s' (both must be IPv4)"),
                               netmask, address, networkName);
                goto cleanup;
            }
            if (def->prefix > 0) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Network '%s' IP address cannot have "
                                 "both a prefix and a netmask"), networkName);
                goto cleanup;
            }
        } else if (def->prefix > 32) {
1556
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1557 1558
                           _("Invalid IPv4 prefix '%lu' in network '%s'"),
                           prefix, networkName);
1559
            goto cleanup;
1560 1561
        }
    } else if (STREQ(def->family, "ipv6")) {
1562
        if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
1563
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1564
                           _("Family 'ipv6' specified for non-IPv6 address '%s' in network '%s'"),
1565
                           address, networkName);
1566
            goto cleanup;
1567
        }
G
Gene Czarcinski 已提交
1568
        if (netmask) {
1569
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1570
                           _("netmask not allowed for IPv6 address '%s' in network '%s'"),
1571
                           address, networkName);
1572
            goto cleanup;
1573
        }
G
Gene Czarcinski 已提交
1574
        if (def->prefix > 128) {
1575
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1576 1577
                           _("Invalid IPv6 prefix '%lu' in network '%s'"),
                           prefix, networkName);
1578
            goto cleanup;
1579
        }
G
Gene Czarcinski 已提交
1580 1581 1582 1583 1584
    } else {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Unrecognized family '%s' in network '%s'"),
                       def->family, networkName);
        goto cleanup;
1585 1586
    }

G
Gene Czarcinski 已提交
1587 1588 1589 1590 1591 1592 1593 1594 1595
    cur = node->children;
    while (cur != NULL) {
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "dhcp")) {
            if (virNetworkDHCPDefParseXML(networkName, cur, def) < 0)
                goto cleanup;
        } else if (cur->type == XML_ELEMENT_NODE &&
                   xmlStrEqual(cur->name, BAD_CAST "tftp")) {
            char *root;
1596

G
Gene Czarcinski 已提交
1597 1598 1599 1600 1601
            if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Unsupported <tftp> element in an IPv6 element in network '%s'"),
                               networkName);
                goto cleanup;
1602
            }
G
Gene Czarcinski 已提交
1603 1604 1605 1606 1607
            if (!(root = virXMLPropString(cur, "root"))) {
                cur = cur->next;
                continue;
            }
            def->tftproot = (char *)root;
1608
        }
G
Gene Czarcinski 已提交
1609
        cur = cur->next;
1610
    }
1611

1612 1613
    result = 0;

1614
 cleanup:
1615
    if (result < 0)
1616
        virNetworkIPDefClear(def);
1617 1618 1619 1620 1621
    VIR_FREE(address);
    VIR_FREE(netmask);

    ctxt->node = save;
    return result;
1622 1623
}

1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635
static int
virNetworkPortGroupParseXML(virPortGroupDefPtr def,
                            xmlNodePtr node,
                            xmlXPathContextPtr ctxt)
{
    /*
     * virPortGroupDef object is already allocated as part of an array.
     * On failure clear it out, but don't free it.
     */

    xmlNodePtr save;
    xmlNodePtr virtPortNode;
1636
    xmlNodePtr vlanNode;
1637
    xmlNodePtr bandwidth_node;
1638
    char *isDefault = NULL;
1639
    char *trustGuestRxFilters = NULL;
1640 1641 1642 1643 1644 1645 1646 1647

    int result = -1;

    save = ctxt->node;
    ctxt->node = node;

    /* grab raw data from XML */
    def->name = virXPathString("string(./@name)", ctxt);
1648 1649 1650
    if (!def->name) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("Missing required name attribute in portgroup"));
1651
        goto cleanup;
1652 1653
    }

1654 1655 1656
    isDefault = virXPathString("string(./@default)", ctxt);
    def->isDefault = isDefault && STRCASEEQ(isDefault, "yes");

1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668
    trustGuestRxFilters
        = virXPathString("string(./@trustGuestRxFilters)", ctxt);
    if (trustGuestRxFilters) {
        if ((def->trustGuestRxFilters
             = virTristateBoolTypeFromString(trustGuestRxFilters)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid trustGuestRxFilters setting '%s' "
                             "in portgroup"), trustGuestRxFilters);
            goto cleanup;
        }
    }

1669 1670
    virtPortNode = virXPathNode("./virtualport", ctxt);
    if (virtPortNode &&
1671
        (!(def->virtPortProfile = virNetDevVPortProfileParse(virtPortNode, 0)))) {
1672
        goto cleanup;
1673
    }
1674

1675 1676
    bandwidth_node = virXPathNode("./bandwidth", ctxt);
    if (bandwidth_node &&
1677
        virNetDevBandwidthParse(&def->bandwidth, bandwidth_node, -1) < 0)
1678
        goto cleanup;
1679

1680 1681
    vlanNode = virXPathNode("./vlan", ctxt);
    if (vlanNode && virNetDevVlanParse(vlanNode, ctxt, &def->vlan) < 0)
1682
        goto cleanup;
1683

1684
    result = 0;
1685
 cleanup:
1686
    if (result < 0)
1687 1688
        virPortGroupDefClear(def);
    VIR_FREE(isDefault);
1689
    VIR_FREE(trustGuestRxFilters);
1690 1691 1692 1693 1694

    ctxt->node = save;
    return result;
}

1695 1696 1697 1698 1699 1700 1701 1702
static int
virNetworkForwardNatDefParseXML(const char *networkName,
                                xmlNodePtr node,
                                xmlXPathContextPtr ctxt,
                                virNetworkForwardDefPtr def)
{
    int ret = -1;
    xmlNodePtr *natAddrNodes = NULL;
1703 1704
    xmlNodePtr *natPortNodes = NULL;
    int nNatAddrs, nNatPorts;
1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746
    char *addrStart = NULL;
    char *addrEnd = NULL;
    xmlNodePtr save = ctxt->node;

    ctxt->node = node;

    if (def->type != VIR_NETWORK_FORWARD_NAT) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("The <nat> element can only be used when <forward> 'mode' is 'nat' in network %s"),
                       networkName);
        goto cleanup;
    }

    /* addresses for SNAT */
    nNatAddrs = virXPathNodeSet("./address", ctxt, &natAddrNodes);
    if (nNatAddrs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <address> element found in <forward> of "
                         "network %s"), networkName);
        goto cleanup;
    } else if (nNatAddrs > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <address> element is allowed in <nat> in "
                         "<forward> in network %s"), networkName);
        goto cleanup;
    } else if (nNatAddrs == 1) {
        addrStart = virXMLPropString(*natAddrNodes, "start");
        if (addrStart == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("missing 'start' attribute in <address> element in <nat> in "
                             "<forward> in network %s"), networkName);
            goto cleanup;
        }
        addrEnd = virXMLPropString(*natAddrNodes, "end");
        if (addrEnd == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("missing 'end' attribute in <address> element in <nat> in "
                             "<forward> in network %s"), networkName);
            goto cleanup;
        }
    }

1747
    if (addrStart && virSocketAddrParse(&def->addr.start, addrStart, AF_INET) < 0) {
1748 1749 1750 1751 1752 1753
        virReportError(VIR_ERR_XML_ERROR,
                       _("Bad ipv4 start address '%s' in <nat> in <forward> in "
                         "network '%s'"), addrStart, networkName);
        goto cleanup;
    }

1754
    if (addrEnd && virSocketAddrParse(&def->addr.end, addrEnd, AF_INET) < 0) {
1755 1756 1757 1758 1759 1760
        virReportError(VIR_ERR_XML_ERROR,
                       _("Bad ipv4 end address '%s' in <nat> in <forward> in "
                         "network '%s'"), addrEnd, networkName);
        goto cleanup;
    }

1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780
    if (addrStart && addrEnd) {
        /* verify that start <= end */
        if (virSocketAddrGetRange(&def->addr.start, &def->addr.end, NULL, 0) < 0)
            goto cleanup;
    } else {
        if (addrStart) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Only start address '%s' specified in <nat> in "
                             "<forward> in network '%s'"),
                           addrStart, networkName);
            goto cleanup;
        }
        if (addrEnd) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Only end address '%s' specified in <nat> in "
                             "<forward> in network '%s'"),
                           addrEnd, networkName);
            goto cleanup;
        }
    }
1781

1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794
    /* ports for SNAT and MASQUERADE */
    nNatPorts = virXPathNodeSet("./port", ctxt, &natPortNodes);
    if (nNatPorts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <port> element found in <forward> of "
                         "network %s"), networkName);
        goto cleanup;
    } else if (nNatPorts > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <port> element is allowed in <nat> in "
                         "<forward> in network %s"), networkName);
        goto cleanup;
    } else if (nNatPorts == 1) {
1795 1796
        if (virXPathUInt("string(./port[1]/@start)", ctxt, &def->port.start) < 0
            || def->port.start > 65535) {
1797 1798 1799 1800 1801 1802 1803

            virReportError(VIR_ERR_XML_DETAIL,
                           _("Missing or invalid 'start' attribute in <port> "
                             "in <nat> in <forward> in network %s"),
                             networkName);
            goto cleanup;
        }
1804 1805
        if (virXPathUInt("string(./port[1]/@end)", ctxt, &def->port.end) < 0
            || def->port.end > 65535 || def->port.end < def->port.start) {
1806 1807 1808 1809 1810 1811
            virReportError(VIR_ERR_XML_DETAIL,
                           _("Missing or invalid 'end' attribute in <port> in "
                             "<nat> in <forward> in network %s"), networkName);
            goto cleanup;
        }
    }
1812 1813
    ret = 0;

1814
 cleanup:
1815 1816 1817
    VIR_FREE(addrStart);
    VIR_FREE(addrEnd);
    VIR_FREE(natAddrNodes);
1818
    VIR_FREE(natPortNodes);
1819 1820 1821 1822
    ctxt->node = save;
    return ret;
}

1823 1824 1825 1826 1827 1828
static int
virNetworkForwardDefParseXML(const char *networkName,
                             xmlNodePtr node,
                             xmlXPathContextPtr ctxt,
                             virNetworkForwardDefPtr def)
{
1829
    size_t i, j;
1830
    int ret = -1;
1831 1832 1833
    xmlNodePtr *forwardIfNodes = NULL;
    xmlNodePtr *forwardPfNodes = NULL;
    xmlNodePtr *forwardAddrNodes = NULL;
1834 1835
    xmlNodePtr *forwardNatNodes = NULL;
    int nForwardIfs, nForwardAddrs, nForwardPfs, nForwardNats;
1836 1837
    char *forwardDev = NULL;
    char *forwardManaged = NULL;
1838
    char *forwardDriverName = NULL;
1839 1840 1841 1842 1843 1844 1845 1846 1847
    char *type = NULL;
    xmlNodePtr save = ctxt->node;

    ctxt->node = node;

    if (!(type = virXPathString("string(./@mode)", ctxt))) {
        def->type = VIR_NETWORK_FORWARD_NAT;
    } else {
        if ((def->type = virNetworkForwardTypeFromString(type)) < 0) {
1848
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860
                           _("unknown forwarding type '%s'"), type);
            goto cleanup;
        }
        VIR_FREE(type);
    }

    forwardManaged = virXPathString("string(./@managed)", ctxt);
    if (forwardManaged != NULL &&
        STRCASEEQ(forwardManaged, "yes")) {
        def->managed = true;
    }

1861 1862 1863 1864 1865 1866
    forwardDriverName = virXPathString("string(./driver/@name)", ctxt);
    if (forwardDriverName) {
        int driverName
            = virNetworkForwardDriverNameTypeFromString(forwardDriverName);

        if (driverName <= 0) {
1867
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1868 1869 1870 1871 1872 1873 1874 1875
                           _("Unknown forward <driver name='%s'/> "
                             "in network %s"),
                           forwardDriverName, networkName);
            goto cleanup;
        }
        def->driverName = driverName;
    }

1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900
    /* bridge and hostdev modes can use a pool of physical interfaces */
    nForwardIfs = virXPathNodeSet("./interface", ctxt, &forwardIfNodes);
    if (nForwardIfs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <interface> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

    nForwardAddrs = virXPathNodeSet("./address", ctxt, &forwardAddrNodes);
    if (nForwardAddrs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <address> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

    nForwardPfs = virXPathNodeSet("./pf", ctxt, &forwardPfNodes);
    if (nForwardPfs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <pf> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918
    nForwardNats = virXPathNodeSet("./nat", ctxt, &forwardNatNodes);
    if (nForwardNats < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <nat> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardNats > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <nat> element is allowed in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardNats == 1) {
        if (virNetworkForwardNatDefParseXML(networkName,
                                            *forwardNatNodes,
                                            ctxt, def) < 0)
            goto cleanup;
    }

1919 1920 1921 1922 1923 1924 1925 1926 1927 1928
    forwardDev = virXPathString("string(./@dev)", ctxt);
    if (forwardDev && (nForwardAddrs > 0 || nForwardPfs > 0)) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("the <forward> 'dev' attribute cannot be used when "
                         "<address> or <pf> sub-elements are present "
                         "in network %s"));
        goto cleanup;
    }

    if (nForwardIfs > 0 || forwardDev) {
1929
        if (VIR_ALLOC_N(def->ifs, MAX(nForwardIfs, 1)) < 0)
1930 1931 1932 1933 1934 1935 1936 1937 1938 1939
            goto cleanup;

        if (forwardDev) {
            def->ifs[0].device.dev = forwardDev;
            def->ifs[0].type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
            forwardDev = NULL;
            def->nifs++;
        }

        /* parse each <interface> */
1940 1941
        for (i = 0; i < nForwardIfs; i++) {
            forwardDev = virXMLPropString(forwardIfNodes[i], "dev");
1942 1943 1944 1945 1946 1947 1948 1949
            if (!forwardDev) {
                virReportError(VIR_ERR_XML_ERROR,
                               _("Missing required dev attribute in "
                                 "<forward> <interface> element of network %s"),
                               networkName);
                goto cleanup;
            }

1950
            if ((i == 0) && (def->nifs == 1)) {
1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965
                /* both <forward dev='x'> and <interface dev='x'/> are
                 * present.  If they don't match, it's an error.
                 */
                if (STRNEQ(forwardDev, def->ifs[0].device.dev)) {
                    virReportError(VIR_ERR_XML_ERROR,
                                   _("<forward dev='%s'> must match first "
                                     "<interface dev='%s'/> in network %s"),
                                   def->ifs[0].device.dev,
                                   forwardDev, networkName);
                    goto cleanup;
                }
                VIR_FREE(forwardDev);
                continue;
            }

1966 1967 1968 1969 1970 1971 1972 1973 1974 1975
            for (j = 0; j < i; j++) {
                if (STREQ_NULLABLE(def->ifs[j].device.dev, forwardDev)) {
                    virReportError(VIR_ERR_XML_ERROR,
                                   _("interface '%s' can only be "
                                     "listed once in network %s"),
                                   forwardDev, networkName);
                    goto cleanup;
                }
            }

1976
            def->ifs[i].device.dev = forwardDev;
1977
            forwardDev = NULL;
1978
            def->ifs[i].type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
1979 1980 1981 1982
            def->nifs++;
        }

    } else if (nForwardAddrs > 0) {
1983
        if (VIR_ALLOC_N(def->ifs, nForwardAddrs) < 0)
1984 1985
            goto cleanup;

1986 1987
        for (i = 0; i < nForwardAddrs; i++) {
            if (!(type = virXMLPropString(forwardAddrNodes[i], "type"))) {
1988 1989 1990 1991 1992 1993
                virReportError(VIR_ERR_XML_ERROR,
                               _("missing address type in network %s"),
                               networkName);
                goto cleanup;
            }

1994
            if ((def->ifs[i].type = virNetworkForwardHostdevDeviceTypeFromString(type)) < 0) {
1995
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1996 1997 1998 1999 2000
                               _("unknown address type '%s' in network %s"),
                               type, networkName);
                goto cleanup;
            }

2001
            switch (def->ifs[i].type) {
2002
            case VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI:
2003
            {
2004
                virPCIDeviceAddressPtr addr = &def->ifs[i].device.pci;
2005

2006
                if (virPCIDeviceAddressParseXML(forwardAddrNodes[i], addr) < 0)
2007
                    goto cleanup;
2008 2009

                for (j = 0; j < i; j++) {
2010
                    if (virPCIDeviceAddressEqual(addr, &def->ifs[j].device.pci)) {
2011 2012 2013 2014 2015 2016 2017 2018
                        virReportError(VIR_ERR_XML_ERROR,
                                       _("PCI device '%04x:%02x:%02x.%x' can "
                                         "only be listed once in network %s"),
                                       addr->domain, addr->bus,
                                       addr->slot, addr->function,
                                       networkName);
                        goto cleanup;
                    }
2019 2020
                }
                break;
2021
            }
2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039
            /* Add USB case here if we ever find a reason to support it */

            default:
                virReportError(VIR_ERR_XML_ERROR,
                               _("unsupported address type '%s' in network %s"),
                               type, networkName);
                goto cleanup;
            }
            VIR_FREE(type);
            def->nifs++;
        }

    } else if (nForwardPfs > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <pf> element is allowed in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardPfs == 1) {
2040
        if (VIR_ALLOC_N(def->pfs, nForwardPfs) < 0)
2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057
            goto cleanup;

        forwardDev = virXMLPropString(*forwardPfNodes, "dev");
        if (!forwardDev) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Missing required dev attribute "
                             "in <pf> element of network '%s'"),
                           networkName);
            goto cleanup;
        }

        def->pfs->dev = forwardDev;
        forwardDev = NULL;
        def->npfs++;
    }

    ret = 0;
2058
 cleanup:
2059 2060 2061
    VIR_FREE(type);
    VIR_FREE(forwardDev);
    VIR_FREE(forwardManaged);
2062
    VIR_FREE(forwardDriverName);
2063 2064 2065
    VIR_FREE(forwardPfNodes);
    VIR_FREE(forwardIfNodes);
    VIR_FREE(forwardAddrNodes);
2066
    VIR_FREE(forwardNatNodes);
2067 2068 2069 2070
    ctxt->node = save;
    return ret;
}

2071
static virNetworkDefPtr
2072
virNetworkDefParseXML(xmlXPathContextPtr ctxt)
2073 2074
{
    virNetworkDefPtr def;
2075
    char *tmp = NULL;
2076
    char *stp = NULL;
2077
    xmlNodePtr *ipNodes = NULL;
2078
    xmlNodePtr *routeNodes = NULL;
2079
    xmlNodePtr *portGroupNodes = NULL;
2080
    int nips, nPortGroups, nRoutes;
2081
    xmlNodePtr dnsNode = NULL;
2082 2083
    xmlNodePtr virtPortNode = NULL;
    xmlNodePtr forwardNode = NULL;
2084
    char *ipv6nogwStr = NULL;
2085
    char *trustGuestRxFilters = NULL;
2086
    xmlNodePtr save = ctxt->node;
2087
    xmlNodePtr bandwidthNode = NULL;
2088
    xmlNodePtr vlanNode;
2089
    xmlNodePtr metadataNode = NULL;
2090

2091
    if (VIR_ALLOC(def) < 0)
2092 2093 2094
        return NULL;

    /* Extract network name */
2095
    def->name = virXPathString("string(./name[1])", ctxt);
2096
    if (!def->name) {
2097
        virReportError(VIR_ERR_NO_NAME, NULL);
2098 2099 2100
        goto error;
    }

2101 2102 2103 2104 2105 2106
    if (strchr(def->name, '/')) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("name %s cannot contain '/'"), def->name);
        goto error;
    }

2107
    /* Extract network uuid */
2108
    tmp = virXPathString("string(./uuid[1])", ctxt);
2109
    if (!tmp) {
2110
        if (virUUIDGenerate(def->uuid)) {
2111 2112
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("Failed to generate UUID"));
2113 2114 2115 2116
            goto error;
        }
    } else {
        if (virUUIDParse(tmp, def->uuid) < 0) {
2117 2118
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("malformed uuid element"));
2119 2120 2121
            goto error;
        }
        VIR_FREE(tmp);
M
Matthias Bolte 已提交
2122
        def->uuid_specified = true;
2123 2124
    }

2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140
    /* check if definitions with no IPv6 gateway addresses is to
     * allow guest-to-guest communications.
     */
    ipv6nogwStr = virXPathString("string(./@ipv6)", ctxt);
    if (ipv6nogwStr) {
        if (STREQ(ipv6nogwStr, "yes")) {
            def->ipv6nogw = true;
        } else if (STRNEQ(ipv6nogwStr, "no")) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid ipv6 setting '%s' in network '%s'"),
                           ipv6nogwStr, def->name);
            goto error;
        }
        VIR_FREE(ipv6nogwStr);
    }

2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154
    trustGuestRxFilters
        = virXPathString("string(./@trustGuestRxFilters)", ctxt);
    if (trustGuestRxFilters) {
        if ((def->trustGuestRxFilters
             = virTristateBoolTypeFromString(trustGuestRxFilters)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid trustGuestRxFilters setting '%s' "
                             "in network '%s'"),
                           trustGuestRxFilters, def->name);
            goto error;
        }
        VIR_FREE(trustGuestRxFilters);
    }

2155
    /* Parse network domain information */
2156
    def->domain = virXPathString("string(./domain[1]/@name)", ctxt);
2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168
    tmp = virXPathString("string(./domain[1]/@localOnly)", ctxt);
    if (tmp) {
        def->domainLocalOnly = virTristateBoolTypeFromString(tmp);
        if (def->domainLocalOnly <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid domain localOnly setting '%s' "
                             "in network '%s'"),
                           tmp, def->name);
            goto error;
        }
        VIR_FREE(tmp);
    }
2169

2170 2171
    if ((bandwidthNode = virXPathNode("./bandwidth", ctxt)) &&
        virNetDevBandwidthParse(&def->bandwidth, bandwidthNode, -1) < 0)
2172 2173
        goto error;

2174 2175 2176 2177
    vlanNode = virXPathNode("./vlan", ctxt);
    if (vlanNode && virNetDevVlanParse(vlanNode, ctxt, &def->vlan) < 0)
        goto error;

2178
    /* Parse bridge information */
2179
    def->bridge = virXPathString("string(./bridge[1]/@name)", ctxt);
2180
    stp = virXPathString("string(./bridge[1]/@stp)", ctxt);
2181
    def->stp = (stp && STREQ(stp, "off")) ? false : true;
2182

2183 2184 2185 2186 2187 2188 2189 2190 2191 2192
    tmp = virXPathString("string(./bridge[1]/@delay)", ctxt);
    if (tmp) {
        if (virStrToLong_ulp(tmp, NULL, 10, &def->delay) < 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid delay value in network '%s'"),
                           def->name);
            goto error;
        }
    }
    VIR_FREE(tmp);
2193

2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205
    tmp = virXPathString("string(./bridge[1]/@macTableManager)", ctxt);
    if (tmp) {
        if ((def->macTableManager
             = virNetworkBridgeMACTableManagerTypeFromString(tmp)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid macTableManager setting '%s' "
                             "in network '%s'"), tmp, def->name);
            goto error;
        }
        VIR_FREE(tmp);
    }

2206 2207
    tmp = virXPathString("string(./mac[1]/@address)", ctxt);
    if (tmp) {
2208
        if (virMacAddrParse(tmp, &def->mac) < 0) {
2209 2210 2211
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid bridge mac address '%s' in network '%s'"),
                           tmp, def->name);
2212 2213
            goto error;
        }
2214
        if (virMacAddrIsMulticast(&def->mac)) {
2215 2216 2217
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid multicast bridge mac address '%s' in network '%s'"),
                           tmp, def->name);
2218 2219
            goto error;
        }
2220 2221 2222 2223
        VIR_FREE(tmp);
        def->mac_specified = true;
    }

2224
    dnsNode = virXPathNode("./dns", ctxt);
2225 2226 2227
    if (dnsNode != NULL &&
        virNetworkDNSDefParseXML(def->name, dnsNode, ctxt, &def->dns) < 0) {
        goto error;
2228 2229
    }

2230 2231
    virtPortNode = virXPathNode("./virtualport", ctxt);
    if (virtPortNode &&
2232 2233
        (!(def->virtPortProfile = virNetDevVPortProfileParse(virtPortNode,
                                                             VIR_VPORT_XML_REQUIRE_TYPE)))) {
2234
        goto error;
2235
    }
2236 2237 2238 2239 2240 2241

    nPortGroups = virXPathNodeSet("./portgroup", ctxt, &portGroupNodes);
    if (nPortGroups < 0)
        goto error;

    if (nPortGroups > 0) {
2242
        size_t i;
2243 2244

        /* allocate array to hold all the portgroups */
2245
        if (VIR_ALLOC_N(def->portGroups, nPortGroups) < 0)
2246 2247
            goto error;
        /* parse each portgroup */
2248
        for (i = 0; i < nPortGroups; i++) {
2249 2250 2251
            if (virNetworkPortGroupParseXML(&def->portGroups[i],
                                            portGroupNodes[i],
                                            ctxt) < 0)
2252 2253 2254 2255 2256 2257
                goto error;
            def->nPortGroups++;
        }
    }
    VIR_FREE(portGroupNodes);

2258 2259
    nips = virXPathNodeSet("./ip", ctxt, &ipNodes);
    if (nips < 0)
2260 2261
        goto error;

2262
    if (nips > 0) {
2263
        size_t i;
2264

2265
        /* allocate array to hold all the addrs */
2266
        if (VIR_ALLOC_N(def->ips, nips) < 0)
2267
            goto error;
2268
        /* parse each addr */
2269
        for (i = 0; i < nips; i++) {
2270 2271 2272 2273
            if (virNetworkIPDefParseXML(def->name,
                                        ipNodes[i],
                                        ctxt,
                                        &def->ips[i]) < 0)
2274 2275
                goto error;
            def->nips++;
2276
        }
2277
    }
E
Eric Blake 已提交
2278
    VIR_FREE(ipNodes);
2279

2280 2281 2282 2283 2284
    nRoutes = virXPathNodeSet("./route", ctxt, &routeNodes);
    if (nRoutes < 0)
        goto error;

    if (nRoutes > 0) {
2285
        size_t i;
2286 2287

        /* allocate array to hold all the route definitions */
2288
        if (VIR_ALLOC_N(def->routes, nRoutes) < 0)
2289 2290
            goto error;
        /* parse each definition */
2291
        for (i = 0; i < nRoutes; i++) {
2292
            virNetDevIPRoutePtr route = NULL;
2293

2294 2295 2296
            if (!(route = virNetDevIPRouteParseXML(def->name,
                                                   routeNodes[i],
                                                   ctxt)))
2297
                goto error;
2298
            def->routes[i] = route;
2299 2300 2301 2302 2303 2304 2305 2306 2307 2308
            def->nroutes++;
        }

        /* now validate the correctness of any static route gateways specified
         *
         * note: the parameters within each definition are verified/assumed valid;
         * the question being asked and answered here is if the specified gateway
         * is directly reachable from this bridge.
         */
        nRoutes = def->nroutes;
2309
        nips = def->nips;
2310 2311
        for (i = 0; i < nRoutes; i++) {
            size_t j;
2312 2313
            virSocketAddr testAddr, testGw;
            bool addrMatch;
2314 2315
            virNetDevIPRoutePtr gwdef = def->routes[i];
            virSocketAddrPtr gateway = virNetDevIPRouteGetGateway(gwdef);
2316
            addrMatch = false;
2317 2318
            for (j = 0; j < nips; j++) {
                virNetworkIPDefPtr def2 = &def->ips[j];
2319
                if (VIR_SOCKET_ADDR_FAMILY(gateway)
2320 2321 2322
                    != VIR_SOCKET_ADDR_FAMILY(&def2->address)) {
                    continue;
                }
2323
                int prefix = virNetworkIPDefPrefix(def2);
2324
                virSocketAddrMaskByPrefix(&def2->address, prefix, &testAddr);
2325
                virSocketAddrMaskByPrefix(gateway, prefix, &testGw);
2326 2327 2328 2329 2330 2331 2332 2333
                if (VIR_SOCKET_ADDR_VALID(&testAddr) &&
                    VIR_SOCKET_ADDR_VALID(&testGw) &&
                    virSocketAddrEqual(&testAddr, &testGw)) {
                    addrMatch = true;
                    break;
                }
            }
            if (!addrMatch) {
2334
                char *gw = virSocketAddrFormat(gateway);
2335 2336 2337 2338 2339 2340 2341 2342 2343 2344
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unreachable static route gateway '%s' specified for network '%s'"),
                               gw, def->name);
                VIR_FREE(gw);
                goto error;
            }
        }
    }
    VIR_FREE(routeNodes);

2345
    forwardNode = virXPathNode("./forward", ctxt);
2346 2347 2348 2349
    if (forwardNode &&
        virNetworkForwardDefParseXML(def->name, forwardNode, ctxt, &def->forward) < 0) {
        goto error;
    }
2350

2351 2352 2353 2354 2355 2356 2357 2358 2359
    /* Validate some items in the main NetworkDef that need to align
     * with the chosen forward mode.
     */
    switch (def->forward.type) {
    case VIR_NETWORK_FORWARD_NONE:
        break;

    case VIR_NETWORK_FORWARD_ROUTE:
    case VIR_NETWORK_FORWARD_NAT:
2360
    case VIR_NETWORK_FORWARD_OPEN:
2361 2362 2363 2364 2365 2366 2367 2368 2369
        /* It's pointless to specify L3 forwarding without specifying
         * the network we're on.
         */
        if (def->nips == 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("%s forwarding requested, "
                             "but no IP address provided for network '%s'"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2370
            goto error;
2371
        }
2372 2373 2374 2375 2376
        if (def->forward.nifs > 1) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("multiple forwarding interfaces specified "
                             "for network '%s', only one is supported"),
                           def->name);
2377 2378
            goto error;
        }
2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391

        if (def->forward.type == VIR_NETWORK_FORWARD_OPEN && def->forward.nifs) {
            /* an open network by definition can't place any restrictions
             * on what traffic is allowed or where it goes, so specifying
             * a forwarding device is nonsensical.
             */
            virReportError(VIR_ERR_XML_ERROR,
                           _("forward dev not allowed for "
                             "network '%s' with forward mode='%s'"),
                           def->name,
                           virNetworkForwardTypeToString(def->forward.type));
            goto error;
        }
2392
        break;
2393

2394 2395 2396 2397 2398 2399 2400 2401 2402
    case VIR_NETWORK_FORWARD_PRIVATE:
    case VIR_NETWORK_FORWARD_VEPA:
    case VIR_NETWORK_FORWARD_PASSTHROUGH:
    case VIR_NETWORK_FORWARD_HOSTDEV:
        if (def->bridge) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge name not allowed in %s mode (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2403 2404
            goto error;
        }
2405 2406 2407 2408 2409 2410 2411 2412
        if (def->macTableManager) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge macTableManager setting not allowed "
                             "in %s mode (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
            goto error;
        }
2413 2414 2415 2416 2417 2418 2419
        /* fall through to next case */
    case VIR_NETWORK_FORWARD_BRIDGE:
        if (def->delay || stp) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge delay/stp options only allowed in route, nat, and isolated mode, not in %s (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2420 2421
            goto error;
        }
2422 2423 2424 2425 2426 2427 2428 2429
        if (def->bridge && (def->forward.nifs || def->forward.npfs)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("A network with forward mode='%s' can specify "
                             "a bridge name or a forward dev, but not "
                             "both (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
            goto error;
2430
        }
2431
        break;
2432
    }
2433

2434
    VIR_FREE(stp);
2435 2436 2437 2438 2439 2440 2441

    /* Extract custom metadata */
    if ((metadataNode = virXPathNode("./metadata[1]", ctxt)) != NULL) {
        def->metadata = xmlCopyNode(metadataNode, 1);
        virXMLNodeSanitizeNamespaces(def->metadata);
    }

2442
    ctxt->node = save;
2443 2444
    return def;

2445
 error:
2446
    VIR_FREE(tmp);
2447
    VIR_FREE(routeNodes);
2448
    VIR_FREE(stp);
2449
    virNetworkDefFree(def);
E
Eric Blake 已提交
2450
    VIR_FREE(ipNodes);
2451
    VIR_FREE(portGroupNodes);
2452
    VIR_FREE(ipv6nogwStr);
2453
    VIR_FREE(trustGuestRxFilters);
2454
    ctxt->node = save;
2455 2456 2457
    return NULL;
}

J
Jiri Denemark 已提交
2458 2459 2460
static virNetworkDefPtr
virNetworkDefParse(const char *xmlStr,
                   const char *filename)
2461
{
J
Jiri Denemark 已提交
2462
    xmlDocPtr xml;
2463
    virNetworkDefPtr def = NULL;
2464
    int keepBlanksDefault = xmlKeepBlanksDefault(0);
2465

2466
    if ((xml = virXMLParse(filename, xmlStr, _("(network_definition)")))) {
J
Jiri Denemark 已提交
2467 2468
        def = virNetworkDefParseNode(xml, xmlDocGetRootElement(xml));
        xmlFreeDoc(xml);
2469 2470
    }

2471
    xmlKeepBlanksDefault(keepBlanksDefault);
2472 2473 2474
    return def;
}

J
Jiri Denemark 已提交
2475
virNetworkDefPtr virNetworkDefParseString(const char *xmlStr)
2476
{
J
Jiri Denemark 已提交
2477 2478
    return virNetworkDefParse(xmlStr, NULL);
}
2479

J
Jiri Denemark 已提交
2480 2481 2482
virNetworkDefPtr virNetworkDefParseFile(const char *filename)
{
    return virNetworkDefParse(NULL, filename);
2483 2484 2485
}


2486
virNetworkDefPtr virNetworkDefParseNode(xmlDocPtr xml,
2487 2488 2489 2490 2491 2492
                                        xmlNodePtr root)
{
    xmlXPathContextPtr ctxt = NULL;
    virNetworkDefPtr def = NULL;

    if (!xmlStrEqual(root->name, BAD_CAST "network")) {
2493 2494 2495 2496
        virReportError(VIR_ERR_XML_ERROR,
                       _("unexpected root element <%s>, "
                         "expecting <network>"),
                       root->name);
2497 2498 2499 2500 2501
        return NULL;
    }

    ctxt = xmlXPathNewContext(xml);
    if (ctxt == NULL) {
2502
        virReportOOMError();
2503 2504 2505 2506
        goto cleanup;
    }

    ctxt->node = root;
2507
    def = virNetworkDefParseXML(ctxt);
2508

2509
 cleanup:
2510 2511 2512 2513
    xmlXPathFreeContext(ctxt);
    return def;
}

2514

2515 2516
static int
virNetworkDNSDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2517
                       const virNetworkDNSDef *def)
2518
{
2519
    size_t i, j;
2520

2521
    if (!(def->enable || def->forwardPlainNames || def->nfwds || def->nhosts ||
2522
          def->nsrvs || def->ntxts))
2523
        return 0;
2524

2525
    virBufferAddLit(buf, "<dns");
2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536
    if (def->enable) {
        const char *fwd = virTristateBoolTypeToString(def->enable);

        if (!fwd) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown enable type %d in network"),
                           def->enable);
            return -1;
        }
        virBufferAsprintf(buf, " enable='%s'", fwd);
    }
2537
    if (def->forwardPlainNames) {
J
Ján Tomko 已提交
2538
        const char *fwd = virTristateBoolTypeToString(def->forwardPlainNames);
2539 2540 2541 2542 2543 2544 2545 2546

        if (!fwd) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown forwardPlainNames type %d in network"),
                           def->forwardPlainNames);
            return -1;
        }
        virBufferAsprintf(buf, " forwardPlainNames='%s'", fwd);
2547 2548 2549 2550
    }
    if (!(def->nfwds || def->nhosts || def->nsrvs || def->ntxts)) {
        virBufferAddLit(buf, "/>\n");
        return 0;
2551 2552 2553
    }

    virBufferAddLit(buf, ">\n");
2554
    virBufferAdjustIndent(buf, 2);
2555

2556 2557 2558 2559 2560
    for (i = 0; i < def->nfwds; i++) {
        virBufferAsprintf(buf, "<forwarder addr='%s'/>\n",
                          def->forwarders[i]);
    }

2561
    for (i = 0; i < def->ntxts; i++) {
2562 2563
        virBufferEscapeString(buf, "<txt name='%s' ", def->txts[i].name);
        virBufferEscapeString(buf, "value='%s'/>\n", def->txts[i].value);
2564 2565
    }

2566
    for (i = 0; i < def->nsrvs; i++) {
2567
        if (def->srvs[i].service && def->srvs[i].protocol) {
2568 2569 2570
            virBufferEscapeString(buf, "<srv service='%s' ",
                                  def->srvs[i].service);
            virBufferEscapeString(buf, "protocol='%s'", def->srvs[i].protocol);
2571 2572

            if (def->srvs[i].domain)
2573
                virBufferEscapeString(buf, " domain='%s'", def->srvs[i].domain);
2574
            if (def->srvs[i].target)
2575
                virBufferEscapeString(buf, " target='%s'", def->srvs[i].target);
2576 2577 2578 2579 2580 2581
            if (def->srvs[i].port)
                virBufferAsprintf(buf, " port='%d'", def->srvs[i].port);
            if (def->srvs[i].priority)
                virBufferAsprintf(buf, " priority='%d'", def->srvs[i].priority);
            if (def->srvs[i].weight)
                virBufferAsprintf(buf, " weight='%d'", def->srvs[i].weight);
2582

2583
            virBufferAddLit(buf, "/>\n");
2584 2585 2586
        }
    }

2587
    if (def->nhosts) {
2588 2589
        for (i = 0; i < def->nhosts; i++) {
            char *ip = virSocketAddrFormat(&def->hosts[i].ip);
2590

2591 2592
            virBufferAsprintf(buf, "<host ip='%s'>\n", ip);
            virBufferAdjustIndent(buf, 2);
2593
            for (j = 0; j < def->hosts[i].nnames; j++)
2594 2595
                virBufferEscapeString(buf, "<hostname>%s</hostname>\n",
                                      def->hosts[i].names[j]);
2596

2597
            virBufferAdjustIndent(buf, -2);
2598
            virBufferAddLit(buf, "</host>\n");
2599
            VIR_FREE(ip);
2600 2601
        }
    }
2602 2603
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</dns>\n");
2604
    return 0;
2605 2606
}

2607
static int
2608 2609
virNetworkIPDefFormat(virBufferPtr buf,
                      const virNetworkIPDef *def)
2610 2611 2612
{
    int result = -1;

2613
    virBufferAddLit(buf, "<ip");
2614

2615
    if (def->family)
2616
        virBufferAsprintf(buf, " family='%s'", def->family);
2617 2618
    if (VIR_SOCKET_ADDR_VALID(&def->address)) {
        char *addr = virSocketAddrFormat(&def->address);
2619 2620
        if (!addr)
            goto error;
2621
        virBufferAsprintf(buf, " address='%s'", addr);
2622 2623
        VIR_FREE(addr);
    }
2624 2625
    if (VIR_SOCKET_ADDR_VALID(&def->netmask)) {
        char *addr = virSocketAddrFormat(&def->netmask);
2626 2627
        if (!addr)
            goto error;
2628
        virBufferAsprintf(buf, " netmask='%s'", addr);
2629 2630
        VIR_FREE(addr);
    }
2631
    if (def->prefix > 0)
E
Eric Blake 已提交
2632
        virBufferAsprintf(buf, " prefix='%u'", def->prefix);
2633
    virBufferAddLit(buf, ">\n");
2634
    virBufferAdjustIndent(buf, 2);
2635 2636

    if (def->tftproot) {
2637
        virBufferEscapeString(buf, "<tftp root='%s'/>\n",
2638 2639 2640
                              def->tftproot);
    }
    if ((def->nranges || def->nhosts)) {
2641
        size_t i;
2642 2643 2644
        virBufferAddLit(buf, "<dhcp>\n");
        virBufferAdjustIndent(buf, 2);

2645 2646
        for (i = 0; i < def->nranges; i++) {
            char *saddr = virSocketAddrFormat(&def->ranges[i].start);
2647 2648
            if (!saddr)
                goto error;
2649
            char *eaddr = virSocketAddrFormat(&def->ranges[i].end);
2650 2651 2652 2653
            if (!eaddr) {
                VIR_FREE(saddr);
                goto error;
            }
2654
            virBufferAsprintf(buf, "<range start='%s' end='%s'/>\n",
2655 2656 2657 2658
                              saddr, eaddr);
            VIR_FREE(saddr);
            VIR_FREE(eaddr);
        }
2659
        for (i = 0; i < def->nhosts; i++) {
2660
            virBufferAddLit(buf, "<host");
2661
            if (def->hosts[i].mac)
2662
                virBufferAsprintf(buf, " mac='%s'", def->hosts[i].mac);
2663
            if (def->hosts[i].id)
2664
                virBufferAsprintf(buf, " id='%s'", def->hosts[i].id);
2665
            if (def->hosts[i].name)
2666
                virBufferAsprintf(buf, " name='%s'", def->hosts[i].name);
2667 2668
            if (VIR_SOCKET_ADDR_VALID(&def->hosts[i].ip)) {
                char *ipaddr = virSocketAddrFormat(&def->hosts[i].ip);
2669 2670
                if (!ipaddr)
                    goto error;
2671
                virBufferAsprintf(buf, " ip='%s'", ipaddr);
2672 2673 2674 2675 2676
                VIR_FREE(ipaddr);
            }
            virBufferAddLit(buf, "/>\n");
        }
        if (def->bootfile) {
2677
            virBufferEscapeString(buf, "<bootp file='%s'",
2678
                                  def->bootfile);
2679 2680
            if (VIR_SOCKET_ADDR_VALID(&def->bootserver)) {
                char *ipaddr = virSocketAddrFormat(&def->bootserver);
2681 2682
                if (!ipaddr)
                    goto error;
2683
                virBufferEscapeString(buf, " server='%s'", ipaddr);
2684 2685 2686
                VIR_FREE(ipaddr);
            }
            virBufferAddLit(buf, "/>\n");
2687

2688 2689
        }

2690 2691
        virBufferAdjustIndent(buf, -2);
        virBufferAddLit(buf, "</dhcp>\n");
2692 2693
    }

2694 2695
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</ip>\n");
2696 2697

    result = 0;
2698
 error:
2699 2700 2701
    return result;
}

2702
static int
2703
virPortGroupDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2704
                      const virPortGroupDef *def)
2705
{
2706
    virBufferAsprintf(buf, "<portgroup name='%s'", def->name);
2707
    if (def->isDefault)
2708
        virBufferAddLit(buf, " default='yes'");
2709 2710 2711
    if (def->trustGuestRxFilters)
        virBufferAsprintf(buf, " trustGuestRxFilters='%s'",
                          virTristateBoolTypeToString(def->trustGuestRxFilters));
2712
    virBufferAddLit(buf, ">\n");
2713
    virBufferAdjustIndent(buf, 2);
2714 2715
    if (virNetDevVlanFormat(&def->vlan, buf) < 0)
        return -1;
2716 2717
    if (virNetDevVPortProfileFormat(def->virtPortProfile, buf) < 0)
        return -1;
2718
    virNetDevBandwidthFormat(def->bandwidth, buf);
2719 2720
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</portgroup>\n");
2721
    return 0;
2722 2723
}

2724 2725
static int
virNetworkForwardNatDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2726
                              const virNetworkForwardDef *fwd)
2727 2728 2729 2730 2731
{
    char *addrStart = NULL;
    char *addrEnd = NULL;
    int ret = -1;

2732 2733
    if (VIR_SOCKET_ADDR_VALID(&fwd->addr.start)) {
        addrStart = virSocketAddrFormat(&fwd->addr.start);
2734 2735 2736 2737
        if (!addrStart)
            goto cleanup;
    }

2738 2739
    if (VIR_SOCKET_ADDR_VALID(&fwd->addr.end)) {
        addrEnd = virSocketAddrFormat(&fwd->addr.end);
2740 2741 2742 2743
        if (!addrEnd)
            goto cleanup;
    }

2744
    if (!addrEnd && !addrStart && !fwd->port.start && !fwd->port.end)
2745 2746 2747 2748 2749
        return 0;

    virBufferAddLit(buf, "<nat>\n");
    virBufferAdjustIndent(buf, 2);

2750 2751 2752 2753 2754 2755 2756
    if (addrStart) {
        virBufferAsprintf(buf, "<address start='%s'", addrStart);
        if (addrEnd)
            virBufferAsprintf(buf, " end='%s'", addrEnd);
        virBufferAddLit(buf, "/>\n");
    }

2757 2758 2759 2760
    if (fwd->port.start || fwd->port.end) {
        virBufferAsprintf(buf, "<port start='%d'", fwd->port.start);
        if (fwd->port.end)
            virBufferAsprintf(buf, " end='%d'", fwd->port.end);
2761 2762
        virBufferAddLit(buf, "/>\n");
    }
2763 2764 2765 2766 2767

    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</nat>\n");
    ret = 0;

2768
 cleanup:
2769 2770 2771 2772 2773
    VIR_FREE(addrStart);
    VIR_FREE(addrEnd);
    return ret;
}

2774 2775 2776 2777
int
virNetworkDefFormatBuf(virBufferPtr buf,
                       const virNetworkDef *def,
                       unsigned int flags)
2778
{
E
Eric Blake 已提交
2779
    const unsigned char *uuid;
2780
    char uuidstr[VIR_UUID_STRING_BUFLEN];
2781
    size_t i;
J
Ján Tomko 已提交
2782
    bool shortforward;
2783

2784
    virBufferAddLit(buf, "<network");
2785
    if (!(flags & VIR_NETWORK_XML_INACTIVE) && (def->connections > 0))
2786
        virBufferAsprintf(buf, " connections='%d'", def->connections);
2787
    if (def->ipv6nogw)
2788
        virBufferAddLit(buf, " ipv6='yes'");
2789 2790 2791
    if (def->trustGuestRxFilters)
        virBufferAsprintf(buf, " trustGuestRxFilters='%s'",
                          virTristateBoolTypeToString(def->trustGuestRxFilters));
2792 2793 2794
    virBufferAddLit(buf, ">\n");
    virBufferAdjustIndent(buf, 2);
    virBufferEscapeString(buf, "<name>%s</name>\n", def->name);
2795 2796 2797

    uuid = def->uuid;
    virUUIDFormat(uuid, uuidstr);
2798
    virBufferAsprintf(buf, "<uuid>%s</uuid>\n", uuidstr);
2799

2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822
    if (def->metadata) {
        xmlBufferPtr xmlbuf;
        int oldIndentTreeOutput = xmlIndentTreeOutput;

        /* Indentation on output requires that we previously set
         * xmlKeepBlanksDefault to 0 when parsing; also, libxml does 2
         * spaces per level of indentation of intermediate elements,
         * but no leading indentation before the starting element.
         * Thankfully, libxml maps what looks like globals into
         * thread-local uses, so we are thread-safe.  */
        xmlIndentTreeOutput = 1;
        xmlbuf = xmlBufferCreate();
        if (xmlNodeDump(xmlbuf, def->metadata->doc, def->metadata,
                        virBufferGetIndent(buf, false) / 2, 1) < 0) {
            xmlBufferFree(xmlbuf);
            xmlIndentTreeOutput = oldIndentTreeOutput;
            goto error;
        }
        virBufferAsprintf(buf, "%s\n", (char *) xmlBufferContent(xmlbuf));
        xmlBufferFree(xmlbuf);
        xmlIndentTreeOutput = oldIndentTreeOutput;
    }

2823
    if (def->forward.type != VIR_NETWORK_FORWARD_NONE) {
2824
        const char *dev = NULL;
2825
        if (!def->forward.npfs)
2826
            dev = virNetworkDefForwardIf(def, 0);
2827
        const char *mode = virNetworkForwardTypeToString(def->forward.type);
2828 2829

        if (!mode) {
2830 2831
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown forward type %d in network '%s'"),
2832
                           def->forward.type, def->name);
2833 2834
            goto error;
        }
2835 2836 2837
        virBufferAddLit(buf, "<forward");
        virBufferEscapeString(buf, " dev='%s'", dev);
        virBufferAsprintf(buf, " mode='%s'", mode);
2838 2839
        if (def->forward.type == VIR_NETWORK_FORWARD_HOSTDEV) {
            if (def->forward.managed)
2840
                virBufferAddLit(buf, " managed='yes'");
2841
            else
2842
                virBufferAddLit(buf, " managed='no'");
2843
        }
2844
        shortforward = !(def->forward.nifs || def->forward.npfs
2845 2846 2847
                         || VIR_SOCKET_ADDR_VALID(&def->forward.addr.start)
                         || VIR_SOCKET_ADDR_VALID(&def->forward.addr.end)
                         || def->forward.port.start
2848 2849 2850
                         || def->forward.port.end
                         || (def->forward.driverName
                             != VIR_NETWORK_FORWARD_DRIVER_NAME_DEFAULT));
2851
        virBufferAsprintf(buf, "%s>\n", shortforward ? "/" : "");
2852
        virBufferAdjustIndent(buf, 2);
2853

2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865
        if (def->forward.driverName
            != VIR_NETWORK_FORWARD_DRIVER_NAME_DEFAULT) {
            const char *driverName
                = virNetworkForwardDriverNameTypeToString(def->forward.driverName);
            if (!driverName) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("unexpected hostdev driver name type %d "),
                               def->forward.driverName);
                goto error;
            }
            virBufferAsprintf(buf, "<driver name='%s'/>\n", driverName);
        }
2866 2867 2868 2869 2870
        if (def->forward.type == VIR_NETWORK_FORWARD_NAT) {
            if (virNetworkForwardNatDefFormat(buf, &def->forward) < 0)
                goto error;
        }

2871 2872
        /* For now, hard-coded to at most 1 forward.pfs */
        if (def->forward.npfs)
2873
            virBufferEscapeString(buf, "<pf dev='%s'/>\n",
2874
                                  def->forward.pfs[0].dev);
2875

2876 2877
        if (def->forward.nifs &&
            (!def->forward.npfs || !(flags & VIR_NETWORK_XML_INACTIVE))) {
2878
            for (i = 0; i < def->forward.nifs; i++) {
2879
                if (def->forward.ifs[i].type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV) {
2880
                    virBufferEscapeString(buf, "<interface dev='%s'",
2881
                                          def->forward.ifs[i].device.dev);
2882
                    if (!(flags & VIR_NETWORK_XML_INACTIVE) &&
2883
                        (def->forward.ifs[i].connections > 0)) {
2884
                        virBufferAsprintf(buf, " connections='%d'",
2885
                                          def->forward.ifs[i].connections);
2886
                    }
2887
                    virBufferAddLit(buf, "/>\n");
2888
                } else {
2889
                    if (def->forward.ifs[i].type ==  VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI) {
2890
                        if (virPCIDeviceAddressFormat(buf,
2891
                                                      def->forward.ifs[i].device.pci,
2892 2893 2894
                                                      true) < 0)
                            goto error;
                    }
2895
                }
2896 2897
            }
        }
2898
        virBufferAdjustIndent(buf, -2);
2899
        if (!shortforward)
2900
            virBufferAddLit(buf, "</forward>\n");
2901 2902
    }

2903

2904
    if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
2905 2906
        def->forward.type == VIR_NETWORK_FORWARD_NAT ||
        def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
2907
        def->forward.type == VIR_NETWORK_FORWARD_OPEN ||
2908
        def->bridge || def->macTableManager) {
2909

2910
        virBufferAddLit(buf, "<bridge");
2911 2912 2913
        virBufferEscapeString(buf, " name='%s'", def->bridge);
        if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
            def->forward.type == VIR_NETWORK_FORWARD_NAT ||
2914 2915
            def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
            def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
2916 2917 2918 2919 2920 2921 2922 2923
            virBufferAsprintf(buf, " stp='%s' delay='%ld'",
                              def->stp ? "on" : "off", def->delay);
        }
        if (def->macTableManager) {
            virBufferAsprintf(buf, " macTableManager='%s'",
                             virNetworkBridgeMACTableManagerTypeToString(def->macTableManager));
        }
        virBufferAddLit(buf, "/>\n");
2924 2925
    }

2926 2927
    if (def->mac_specified) {
        char macaddr[VIR_MAC_STRING_BUFLEN];
2928
        virMacAddrFormat(&def->mac, macaddr);
2929
        virBufferAsprintf(buf, "<mac address='%s'/>\n", macaddr);
2930
    }
2931

2932 2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949
    if (def->domain) {
        virBufferAsprintf(buf, "<domain name='%s'", def->domain);

        /* default to "no", but don't format it in the XML */
        if (def->domainLocalOnly) {
            const char *local = virTristateBoolTypeToString(def->domainLocalOnly);

            if (!local) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Unknown localOnly type %d in network"),
                               def->domainLocalOnly);
                return -1;
            }
            virBufferAsprintf(buf, " localOnly='%s'", local);
        }

        virBufferAddLit(buf, "/>\n");
    }
2950

2951
    if (virNetworkDNSDefFormat(buf, &def->dns) < 0)
2952 2953
        goto error;

2954
    if (virNetDevVlanFormat(&def->vlan, buf) < 0)
2955
        goto error;
2956
    if (virNetDevBandwidthFormat(def->bandwidth, buf) < 0)
2957 2958
        goto error;

2959
    for (i = 0; i < def->nips; i++) {
2960
        if (virNetworkIPDefFormat(buf, &def->ips[i]) < 0)
2961
            goto error;
2962 2963
    }

2964
    for (i = 0; i < def->nroutes; i++) {
2965
        if (virNetDevIPRouteFormat(buf, def->routes[i]) < 0)
2966 2967 2968
            goto error;
    }

2969
    if (virNetDevVPortProfileFormat(def->virtPortProfile, buf) < 0)
2970
        goto error;
2971

2972 2973
    for (i = 0; i < def->nPortGroups; i++)
        if (virPortGroupDefFormat(buf, &def->portGroups[i]) < 0)
2974
            goto error;
2975

2976 2977 2978 2979 2980
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</network>\n");

    return 0;

2981
 error:
2982 2983 2984 2985
    return -1;
}

char *
E
Eric Blake 已提交
2986
virNetworkDefFormat(const virNetworkDef *def,
2987 2988 2989 2990
                    unsigned int flags)
{
    virBuffer buf = VIR_BUFFER_INITIALIZER;

2991
    if (virNetworkDefFormatBuf(&buf, def, flags) < 0)
2992 2993
        goto error;

2994 2995
    if (virBufferCheckError(&buf) < 0)
        goto error;
2996 2997 2998

    return virBufferContentAndReset(&buf);

2999
 error:
3000 3001 3002 3003 3004 3005 3006 3007 3008 3009
    virBufferFreeAndReset(&buf);
    return NULL;
}

static char *
virNetworkObjFormat(virNetworkObjPtr net,
                    unsigned int flags)
{
    virBuffer buf = VIR_BUFFER_INITIALIZER;
    char *class_id = virBitmapFormat(net->class_id);
3010
    size_t i;
3011 3012

    if (!class_id)
3013
        goto error;
3014 3015

    virBufferAddLit(&buf, "<networkstatus>\n");
3016 3017 3018
    virBufferAdjustIndent(&buf, 2);
    virBufferAsprintf(&buf, "<class_id bitmap='%s'/>\n", class_id);
    virBufferAsprintf(&buf, "<floor sum='%llu'/>\n", net->floor_sum);
3019 3020
    VIR_FREE(class_id);

3021 3022
    for (i = 0; i < VIR_NETWORK_TAINT_LAST; i++) {
        if (net->taint & (1 << i))
3023
            virBufferAsprintf(&buf, "<taint flag='%s'/>\n",
3024 3025 3026
                              virNetworkTaintTypeToString(i));
    }

3027
    if (virNetworkDefFormatBuf(&buf, net->def, flags) < 0)
3028 3029
        goto error;

3030
    virBufferAdjustIndent(&buf, -2);
3031
    virBufferAddLit(&buf, "</networkstatus>");
3032

3033 3034
    if (virBufferCheckError(&buf) < 0)
        goto error;
3035 3036 3037

    return virBufferContentAndReset(&buf);

3038
 error:
3039
    virBufferFreeAndReset(&buf);
3040 3041 3042
    return NULL;
}

3043 3044 3045 3046 3047 3048 3049 3050
const char *
virNetworkDefForwardIf(const virNetworkDef *def, size_t n)
{
    return ((def->forward.ifs && (def->forward.nifs > n) &&
             def->forward.ifs[n].type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV)
            ? def->forward.ifs[n].device.dev : NULL);
}

3051 3052 3053
virPortGroupDefPtr virPortGroupFindByName(virNetworkDefPtr net,
                                          const char *portgroup)
{
3054 3055
    size_t i;
    for (i = 0; i < net->nPortGroups; i++) {
3056
        if (portgroup) {
3057 3058
            if (STREQ(portgroup, net->portGroups[i].name))
                return &net->portGroups[i];
3059
        } else {
3060 3061
            if (net->portGroups[i].isDefault)
                return &net->portGroups[i];
3062 3063 3064 3065 3066
        }
    }
    return NULL;
}

3067
int virNetworkSaveXML(const char *configDir,
3068 3069
                      virNetworkDefPtr def,
                      const char *xml)
3070
{
J
Ján Tomko 已提交
3071
    char uuidstr[VIR_UUID_STRING_BUFLEN];
3072
    char *configFile = NULL;
3073
    int ret = -1;
3074

3075
    if ((configFile = virNetworkConfigFile(configDir, def->name)) == NULL)
3076 3077
        goto cleanup;

3078 3079
    if (virFileMakePath(configDir) < 0) {
        virReportSystemError(errno,
3080 3081
                             _("cannot create config directory '%s'"),
                             configDir);
3082 3083 3084
        goto cleanup;
    }

J
Ján Tomko 已提交
3085 3086 3087 3088
    virUUIDFormat(def->uuid, uuidstr);
    ret = virXMLSaveFile(configFile,
                         virXMLPickShellSafeComment(def->name, uuidstr),
                         "net-edit", xml);
3089 3090

 cleanup:
3091 3092 3093 3094
    VIR_FREE(configFile);
    return ret;
}

3095
int virNetworkSaveConfig(const char *configDir,
3096 3097 3098 3099 3100
                         virNetworkDefPtr def)
{
    int ret = -1;
    char *xml;

3101
    if (!(xml = virNetworkDefFormat(def, VIR_NETWORK_XML_INACTIVE)))
3102 3103
        goto cleanup;

3104
    if (virNetworkSaveXML(configDir, def, xml))
3105 3106 3107
        goto cleanup;

    ret = 0;
3108
 cleanup:
3109
    VIR_FREE(xml);
3110 3111 3112
    return ret;
}

3113

3114 3115 3116 3117
int virNetworkSaveStatus(const char *statusDir,
                         virNetworkObjPtr network)
{
    int ret = -1;
3118
    int flags = 0;
3119 3120
    char *xml;

3121
    if (!(xml = virNetworkObjFormat(network, flags)))
3122 3123 3124 3125 3126 3127
        goto cleanup;

    if (virNetworkSaveXML(statusDir, network->def, xml))
        goto cleanup;

    ret = 0;
3128
 cleanup:
3129 3130 3131 3132
    VIR_FREE(xml);
    return ret;
}

3133 3134 3135 3136 3137 3138 3139 3140 3141
virNetworkObjPtr
virNetworkLoadState(virNetworkObjListPtr nets,
                    const char *stateDir,
                    const char *name)
{
    char *configFile = NULL;
    virNetworkDefPtr def = NULL;
    virNetworkObjPtr net = NULL;
    xmlDocPtr xml = NULL;
3142
    xmlNodePtr node = NULL, *nodes = NULL;
3143 3144 3145
    xmlXPathContextPtr ctxt = NULL;
    virBitmapPtr class_id_map = NULL;
    unsigned long long floor_sum_val = 0;
3146 3147 3148
    unsigned int taint = 0;
    int n;
    size_t i;
3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166 3167


    if ((configFile = virNetworkConfigFile(stateDir, name)) == NULL)
        goto error;

    if (!(xml = virXMLParseCtxt(configFile, NULL, _("(network status)"), &ctxt)))
        goto error;

    if (!(node = virXPathNode("//network", ctxt))) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Could not find any 'network' element in status file"));
        goto error;
    }

    /* parse the definition first */
    ctxt->node = node;
    if (!(def = virNetworkDefParseXML(ctxt)))
        goto error;

3168
    if (STRNEQ(name, def->name)) {
3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Network config filename '%s'"
                         " does not match network name '%s'"),
                       configFile, def->name);
        goto error;
    }

    /* now parse possible status data */
    node = xmlDocGetRootElement(xml);
    if (xmlStrEqual(node->name, BAD_CAST "networkstatus")) {
        /* Newer network status file. Contains useful
         * info which are not to be found in bare config XML */
        char *class_id = NULL;
        char *floor_sum = NULL;

        ctxt->node = node;
        if ((class_id = virXPathString("string(./class_id[1]/@bitmap)", ctxt))) {
3186
            if (virBitmapParse(class_id, &class_id_map,
3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200
                               CLASS_ID_BITMAP_SIZE) < 0) {
                VIR_FREE(class_id);
                goto error;
            }
        }
        VIR_FREE(class_id);

        floor_sum = virXPathString("string(./floor[1]/@sum)", ctxt);
        if (floor_sum &&
            virStrToLong_ull(floor_sum, NULL, 10, &floor_sum_val) < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Malformed 'floor_sum' attribute: %s"),
                           floor_sum);
            VIR_FREE(floor_sum);
3201
            goto error;
3202 3203
        }
        VIR_FREE(floor_sum);
3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224

        if ((n = virXPathNodeSet("./taint", ctxt, &nodes)) < 0)
            goto error;

        for (i = 0; i < n; i++) {
            char *str = virXMLPropString(nodes[i], "flag");
            if (str) {
                int flag = virNetworkTaintTypeFromString(str);
                if (flag < 0) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                   _("Unknown taint flag %s"), str);
                    VIR_FREE(str);
                    goto error;
                }
                VIR_FREE(str);
                /* Compute taint mask here. The network object does not
                 * exist yet, so we can't use virNetworkObjtTaint. */
                taint |= (1 << flag);
            }
        }
        VIR_FREE(nodes);
3225 3226 3227
    }

    /* create the object */
3228
    if (!(net = virNetworkAssignDef(nets, def, VIR_NETWORK_OBJ_LIST_ADD_LIVE)))
3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240
        goto error;
    /* do not put any "goto error" below this comment */

    /* assign status data stored in the network object */
    if (class_id_map) {
        virBitmapFree(net->class_id);
        net->class_id = class_id_map;
    }

    if (floor_sum_val > 0)
        net->floor_sum = floor_sum_val;

3241
    net->taint = taint;
3242
    net->active = 1; /* any network with a state file is by definition active */
3243

3244
 cleanup:
3245 3246 3247 3248 3249
    VIR_FREE(configFile);
    xmlFreeDoc(xml);
    xmlXPathFreeContext(ctxt);
    return net;

3250
 error:
3251
    VIR_FREE(nodes);
3252 3253 3254 3255 3256
    virBitmapFree(class_id_map);
    virNetworkDefFree(def);
    goto cleanup;
}

3257
virNetworkObjPtr virNetworkLoadConfig(virNetworkObjListPtr nets,
3258 3259
                                      const char *configDir,
                                      const char *autostartDir,
3260
                                      const char *name)
3261 3262 3263 3264 3265 3266
{
    char *configFile = NULL, *autostartLink = NULL;
    virNetworkDefPtr def = NULL;
    virNetworkObjPtr net;
    int autostart;

3267
    if ((configFile = virNetworkConfigFile(configDir, name)) == NULL)
3268
        goto error;
3269
    if ((autostartLink = virNetworkConfigFile(autostartDir, name)) == NULL)
3270 3271 3272 3273 3274
        goto error;

    if ((autostart = virFileLinkPointsTo(autostartLink, configFile)) < 0)
        goto error;

3275
    if (!(def = virNetworkDefParseFile(configFile)))
3276 3277
        goto error;

3278
    if (STRNEQ(name, def->name)) {
3279 3280 3281 3282
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Network config filename '%s'"
                         " does not match network name '%s'"),
                       configFile, def->name);
3283 3284 3285
        goto error;
    }

3286 3287
    if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
        def->forward.type == VIR_NETWORK_FORWARD_NAT ||
3288 3289
        def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
        def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
3290

3291 3292 3293 3294
        if (!def->mac_specified) {
            virNetworkSetBridgeMacAddr(def);
            virNetworkSaveConfig(configDir, def);
        }
3295 3296 3297 3298
    } else {
        /* Throw away MAC address for other forward types,
         * which could have been generated by older libvirt RPMs */
        def->mac_specified = false;
3299
    }
3300

3301
    if (!(net = virNetworkAssignDef(nets, def, 0)))
3302 3303 3304 3305
        goto error;

    net->autostart = autostart;

3306 3307 3308
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);

3309 3310
    return net;

3311
 error:
3312 3313 3314 3315 3316 3317
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
    virNetworkDefFree(def);
    return NULL;
}

3318 3319 3320 3321 3322 3323 3324

int
virNetworkLoadAllState(virNetworkObjListPtr nets,
                       const char *stateDir)
{
    DIR *dir;
    struct dirent *entry;
E
Eric Blake 已提交
3325
    int ret = -1;
J
Ján Tomko 已提交
3326
    int rc;
3327

J
Ján Tomko 已提交
3328 3329
    if ((rc = virDirOpenIfExists(&dir, stateDir)) <= 0)
        return rc;
3330

E
Eric Blake 已提交
3331
    while ((ret = virDirRead(dir, &entry, stateDir)) > 0) {
3332 3333 3334 3335 3336
        virNetworkObjPtr net;

        if (!virFileStripSuffix(entry->d_name, ".xml"))
            continue;

3337 3338
        net = virNetworkLoadState(nets, stateDir, entry->d_name);
        virNetworkObjEndAPI(&net);
3339 3340
    }

J
Ján Tomko 已提交
3341
    VIR_DIR_CLOSE(dir);
E
Eric Blake 已提交
3342
    return ret;
3343 3344 3345
}


3346
int virNetworkLoadAllConfigs(virNetworkObjListPtr nets,
3347 3348 3349 3350 3351
                             const char *configDir,
                             const char *autostartDir)
{
    DIR *dir;
    struct dirent *entry;
E
Eric Blake 已提交
3352
    int ret = -1;
J
Ján Tomko 已提交
3353
    int rc;
3354

J
Ján Tomko 已提交
3355 3356
    if ((rc = virDirOpenIfExists(&dir, configDir)) <= 0)
        return rc;
3357

E
Eric Blake 已提交
3358
    while ((ret = virDirRead(dir, &entry, configDir)) > 0) {
3359 3360
        virNetworkObjPtr net;

3361
        if (!virFileStripSuffix(entry->d_name, ".xml"))
3362 3363 3364 3365
            continue;

        /* NB: ignoring errors, so one malformed config doesn't
           kill the whole process */
3366
        net = virNetworkLoadConfig(nets,
3367 3368 3369
                                   configDir,
                                   autostartDir,
                                   entry->d_name);
3370
        virNetworkObjEndAPI(&net);
3371 3372
    }

J
Ján Tomko 已提交
3373
    VIR_DIR_CLOSE(dir);
E
Eric Blake 已提交
3374
    return ret;
3375 3376
}

3377
int virNetworkDeleteConfig(const char *configDir,
3378
                           const char *autostartDir,
3379 3380
                           virNetworkObjPtr net)
{
3381 3382
    char *configFile = NULL;
    char *autostartLink = NULL;
R
Ryota Ozaki 已提交
3383
    int ret = -1;
3384

3385
    if ((configFile = virNetworkConfigFile(configDir, net->def->name)) == NULL)
3386
        goto error;
3387
    if ((autostartLink = virNetworkConfigFile(autostartDir, net->def->name)) == NULL)
3388
        goto error;
3389 3390

    /* Not fatal if this doesn't work */
3391
    unlink(autostartLink);
3392
    net->autostart = 0;
3393

3394
    if (unlink(configFile) < 0) {
3395
        virReportSystemError(errno,
3396
                             _("cannot remove config file '%s'"),
3397 3398
                             configFile);
        goto error;
3399 3400
    }

R
Ryota Ozaki 已提交
3401
    ret = 0;
3402

3403
 error:
3404 3405
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
R
Ryota Ozaki 已提交
3406
    return ret;
3407 3408
}

3409
char *virNetworkConfigFile(const char *dir,
3410 3411 3412 3413
                           const char *name)
{
    char *ret = NULL;

3414
    ignore_value(virAsprintf(&ret, "%s/%s.xml", dir, name));
3415
    return ret;
3416
}
D
Daniel P. Berrange 已提交
3417

3418 3419 3420 3421 3422 3423 3424 3425 3426 3427
struct virNetworkBridgeInUseHelperData {
    const char *bridge;
    const char *skipname;
};

static int
virNetworkBridgeInUseHelper(const void *payload,
                            const void *name ATTRIBUTE_UNUSED,
                            const void *opaque)
{
3428
    int ret;
3429 3430 3431
    virNetworkObjPtr net = (virNetworkObjPtr) payload;
    const struct virNetworkBridgeInUseHelperData *data = opaque;

3432
    virObjectLock(net);
3433 3434 3435 3436 3437 3438 3439 3440
    if (data->skipname &&
        ((net->def && STREQ(net->def->name, data->skipname)) ||
         (net->newDef && STREQ(net->newDef->name, data->skipname))))
        ret = 0;
    else if ((net->def && net->def->bridge &&
              STREQ(net->def->bridge, data->bridge)) ||
             (net->newDef && net->newDef->bridge &&
              STREQ(net->newDef->bridge, data->bridge)))
3441
        ret = 1;
3442 3443
    else
        ret = 0;
3444
    virObjectUnlock(net);
3445 3446 3447
    return ret;
}

E
Eric Blake 已提交
3448
int virNetworkBridgeInUse(virNetworkObjListPtr nets,
3449 3450 3451
                          const char *bridge,
                          const char *skipname)
{
3452 3453
    virNetworkObjPtr obj;
    struct virNetworkBridgeInUseHelperData data = {bridge, skipname};
3454

3455
    virObjectLock(nets);
3456
    obj = virHashSearch(nets->objs, virNetworkBridgeInUseHelper, &data);
3457
    virObjectUnlock(nets);
3458

3459
    return obj != NULL;
3460 3461
}

3462

3463 3464 3465 3466 3467 3468
void virNetworkSetBridgeMacAddr(virNetworkDefPtr def)
{
    if (!def->mac_specified) {
        /* if the bridge doesn't have a mac address explicitly defined,
         * autogenerate a random one.
         */
3469
        virMacAddrGenerate((unsigned char[]){ 0x52, 0x54, 0 },
3470
                           &def->mac);
3471 3472 3473 3474
        def->mac_specified = true;
    }
}

3475 3476 3477 3478 3479
/* NetworkObj backend of the virNetworkUpdate API */

static void
virNetworkDefUpdateNoSupport(virNetworkDefPtr def, const char *section)
{
3480
    virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3481 3482 3483
                   _("can't update '%s' section of network '%s'"),
                   section, def->name);
}
3484 3485 3486
static void
virNetworkDefUpdateUnknownCommand(unsigned int command)
{
3487
    virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3488 3489
                   _("unrecognized network update command code %d"), command);
}
3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539 3540 3541

static int
virNetworkDefUpdateCheckElementName(virNetworkDefPtr def,
                                    xmlNodePtr node,
                                    const char *section)
{
    if (!xmlStrEqual(node->name, BAD_CAST section)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("unexpected element <%s>, expecting <%s>, "
                         "while updating network '%s'"),
                       node->name, section, def->name);
        return -1;
    }
    return 0;
}

static int
virNetworkDefUpdateBridge(virNetworkDefPtr def,
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "bridge");
    return -1;
}

static int
virNetworkDefUpdateDomain(virNetworkDefPtr def,
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "domain");
    return -1;
}

static int
virNetworkDefUpdateIP(virNetworkDefPtr def,
                      unsigned int command ATTRIBUTE_UNUSED,
                      int parentIndex ATTRIBUTE_UNUSED,
                      xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                      /* virNetworkUpdateFlags */
                      unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "ip");
    return -1;
}

3542 3543
static virNetworkIPDefPtr
virNetworkIPDefByIndex(virNetworkDefPtr def, int parentIndex)
3544
{
3545
    virNetworkIPDefPtr ipdef = NULL;
3546
    size_t i;
3547 3548 3549

    /* first find which ip element's dhcp host list to work on */
    if (parentIndex >= 0) {
3550
        ipdef = virNetworkDefGetIPByIndex(def, AF_UNSPEC, parentIndex);
G
Gene Czarcinski 已提交
3551
        if (!(ipdef)) {
3552
            virReportError(VIR_ERR_OPERATION_INVALID,
G
Gene Czarcinski 已提交
3553
                           _("couldn't update dhcp host entry - no <ip> "
3554 3555 3556 3557 3558 3559 3560 3561 3562
                             "element found at index %d in network '%s'"),
                           parentIndex, def->name);
        }
        return ipdef;
    }

    /* -1 means "find the most appropriate", which in this case
     * means the one and only <ip> that has <dhcp> element
     */
3563
    for (i = 0;
3564
         (ipdef = virNetworkDefGetIPByIndex(def, AF_UNSPEC, i));
3565
         i++) {
G
Gene Czarcinski 已提交
3566
        if (ipdef->nranges || ipdef->nhosts)
3567 3568
            break;
    }
G
Gene Czarcinski 已提交
3569
    if (!ipdef) {
3570
        ipdef = virNetworkDefGetIPByIndex(def, AF_INET, 0);
G
Gene Czarcinski 已提交
3571
        if (!ipdef)
3572
            ipdef = virNetworkDefGetIPByIndex(def, AF_INET6, 0);
G
Gene Czarcinski 已提交
3573
    }
3574 3575
    if (!ipdef) {
        virReportError(VIR_ERR_OPERATION_INVALID,
G
Gene Czarcinski 已提交
3576
                       _("couldn't update dhcp host entry - no <ip> "
3577 3578 3579 3580 3581
                         "element found in network '%s'"), def->name);
    }
    return ipdef;
}

3582 3583 3584

static int
virNetworkDefUpdateCheckMultiDHCP(virNetworkDefPtr def,
3585
                                  virNetworkIPDefPtr ipdef)
3586 3587 3588
{
    int family = VIR_SOCKET_ADDR_FAMILY(&ipdef->address);
    size_t i;
3589
    virNetworkIPDefPtr ip;
3590

3591
    for (i = 0; (ip = virNetworkDefGetIPByIndex(def, family, i)); i++) {
3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602 3603 3604 3605
        if (ip != ipdef) {
            if (ip->nranges || ip->nhosts) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("dhcp is supported only for a "
                                 "single %s address on each network"),
                               (family == AF_INET) ? "IPv4" : "IPv6");
                return -1;
            }
        }
    }
    return 0;
}


3606 3607
static int
virNetworkDefUpdateIPDHCPHost(virNetworkDefPtr def,
3608 3609 3610
                              unsigned int command,
                              int parentIndex,
                              xmlXPathContextPtr ctxt,
3611 3612 3613
                              /* virNetworkUpdateFlags */
                              unsigned int fflags ATTRIBUTE_UNUSED)
{
3614 3615
    size_t i;
    int ret = -1;
3616
    virNetworkIPDefPtr ipdef = virNetworkIPDefByIndex(def, parentIndex);
3617
    virNetworkDHCPHostDef host;
3618
    bool partialOkay = (command == VIR_NETWORK_UPDATE_COMMAND_DELETE);
3619 3620 3621 3622 3623 3624 3625 3626 3627 3628

    memset(&host, 0, sizeof(host));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "host") < 0)
        goto cleanup;

    /* ipdef is the ip element that needs its host array updated */
    if (!ipdef)
        goto cleanup;

3629 3630 3631
    if (virNetworkDHCPHostDefParseXML(def->name, ipdef, ctxt->node,
                                      &host, partialOkay) < 0)
        goto cleanup;
3632

3633 3634 3635 3636 3637 3638 3639 3640 3641
    if (!partialOkay &&
        VIR_SOCKET_ADDR_FAMILY(&ipdef->address)
        != VIR_SOCKET_ADDR_FAMILY(&host.ip)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("the address family of a host entry IP must match "
                         "the address family of the dhcp element's parent"));
        goto cleanup;
    }

3642
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
3643

3644
        /* search for the entry with this (ip|mac|name),
3645
         * and update the IP+(mac|name) */
3646
        for (i = 0; i < ipdef->nhosts; i++) {
3647
            if ((host.mac && ipdef->hosts[i].mac &&
3648
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) ||
3649 3650
                (VIR_SOCKET_ADDR_VALID(&host.ip) &&
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip)) ||
3651
                (host.name &&
3652
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name))) {
3653 3654 3655 3656
                break;
            }
        }

3657
        if (i == ipdef->nhosts) {
3658
            char *ip = virSocketAddrFormat(&host.ip);
3659 3660
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate an existing dhcp host entry with "
3661 3662 3663 3664 3665
                             "\"mac='%s'\" \"name='%s'\" \"ip='%s'\" in"
                             " network '%s'"),
                           host.mac ? host.mac : _("unknown"), host.name,
                           ip ? ip : _("unknown"), def->name);
            VIR_FREE(ip);
3666 3667 3668 3669 3670 3671 3672
            goto cleanup;
        }

        /* clear the existing hosts entry, move the new one in its place,
         * then clear out the extra copy to get rid of the duplicate pointers
         * to its data (mac and name strings).
         */
3673 3674
        virNetworkDHCPHostDefClear(&ipdef->hosts[i]);
        ipdef->hosts[i] = host;
3675 3676 3677 3678 3679
        memset(&host, 0, sizeof(host));

    } else if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
               (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3680 3681 3682
        if (virNetworkDefUpdateCheckMultiDHCP(def, ipdef) < 0)
            goto cleanup;

3683
        /* log error if an entry with same name/address/ip already exists */
3684
        for (i = 0; i < ipdef->nhosts; i++) {
3685
            if ((host.mac && ipdef->hosts[i].mac &&
3686
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) ||
3687
                (host.name &&
3688
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name)) ||
3689
                (VIR_SOCKET_ADDR_VALID(&host.ip) &&
3690
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip))) {
3691 3692 3693 3694 3695 3696
                char *ip = virSocketAddrFormat(&host.ip);

                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("there is an existing dhcp host entry in "
                                 "network '%s' that matches "
                                 "\"<host mac='%s' name='%s' ip='%s'/>\""),
3697 3698
                               def->name, host.mac ? host.mac : _("unknown"),
                               host.name, ip ? ip : _("unknown"));
3699 3700 3701 3702
                VIR_FREE(ip);
                goto cleanup;
            }
        }
3703

3704
        /* add to beginning/end of list */
3705 3706 3707 3708
        if (VIR_INSERT_ELEMENT(ipdef->hosts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : ipdef->nhosts,
                               ipdef->nhosts, host) < 0)
3709 3710 3711 3712
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        /* find matching entry - all specified attributes must match */
3713
        for (i = 0; i < ipdef->nhosts; i++) {
3714
            if ((!host.mac || !ipdef->hosts[i].mac ||
3715
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) &&
3716
                (!host.name ||
3717
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name)) &&
3718
                (!VIR_SOCKET_ADDR_VALID(&host.ip) ||
3719
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip))) {
3720 3721 3722
                break;
            }
        }
3723
        if (i == ipdef->nhosts) {
3724 3725 3726 3727 3728 3729 3730
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching dhcp host entry "
                             "in network '%s'"), def->name);
            goto cleanup;
        }

        /* remove it */
3731 3732
        virNetworkDHCPHostDefClear(&ipdef->hosts[i]);
        VIR_DELETE_ELEMENT(ipdef->hosts, i, ipdef->nhosts);
3733

3734 3735 3736
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
3737 3738 3739
    }

    ret = 0;
3740
 cleanup:
3741 3742
    virNetworkDHCPHostDefClear(&host);
    return ret;
3743 3744 3745 3746
}

static int
virNetworkDefUpdateIPDHCPRange(virNetworkDefPtr def,
3747
                               unsigned int command,
3748
                               int parentIndex,
3749
                               xmlXPathContextPtr ctxt,
3750 3751 3752
                               /* virNetworkUpdateFlags */
                               unsigned int fflags ATTRIBUTE_UNUSED)
{
3753 3754
    size_t i;
    int ret = -1;
3755
    virNetworkIPDefPtr ipdef = virNetworkIPDefByIndex(def, parentIndex);
3756
    virSocketAddrRange range;
3757 3758 3759 3760 3761 3762 3763 3764 3765 3766

    memset(&range, 0, sizeof(range));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "range") < 0)
        goto cleanup;

    /* ipdef is the ip element that needs its range array updated */
    if (!ipdef)
        goto cleanup;

3767
    /* parse the xml into a virSocketAddrRange */
3768 3769
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {

3770
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3771 3772 3773 3774 3775
                       _("dhcp ranges cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

3776
    if (virSocketAddrRangeParseXML(def->name, ipdef, ctxt->node, &range) < 0)
3777 3778
        goto cleanup;

3779 3780 3781 3782 3783 3784 3785 3786
    if (VIR_SOCKET_ADDR_FAMILY(&ipdef->address)
        != VIR_SOCKET_ADDR_FAMILY(&range.start)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("the address family of a dhcp range must match "
                         "the address family of the dhcp element's parent"));
        goto cleanup;
    }

3787
    /* check if an entry with same name/address/ip already exists */
3788 3789 3790
    for (i = 0; i < ipdef->nranges; i++) {
        if (virSocketAddrEqual(&range.start, &ipdef->ranges[i].start) &&
            virSocketAddrEqual(&range.end, &ipdef->ranges[i].end)) {
3791 3792 3793 3794 3795 3796 3797
            break;
        }
    }

    if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3798 3799 3800
        if (virNetworkDefUpdateCheckMultiDHCP(def, ipdef) < 0)
            goto cleanup;

3801
        if (i < ipdef->nranges) {
3802 3803 3804 3805 3806 3807 3808 3809 3810 3811
            char *startip = virSocketAddrFormat(&range.start);
            char *endip = virSocketAddrFormat(&range.end);

            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is an existing dhcp range entry in "
                             "network '%s' that matches "
                             "\"<range start='%s' end='%s'/>\""),
                           def->name,
                           startip ? startip : "unknown",
                           endip ? endip : "unknown");
3812 3813
            VIR_FREE(startip);
            VIR_FREE(endip);
3814 3815 3816 3817
            goto cleanup;
        }

        /* add to beginning/end of list */
3818 3819 3820 3821
        if (VIR_INSERT_ELEMENT(ipdef->ranges,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : ipdef->nranges,
                               ipdef->nranges, range) < 0)
3822 3823 3824
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

3825
        if (i == ipdef->nranges) {
3826 3827 3828 3829 3830 3831 3832 3833
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching dhcp range entry "
                             "in network '%s'"), def->name);
            goto cleanup;
        }

        /* remove it */
        /* NB: nothing to clear from a RangeDef that's being freed */
3834
        VIR_DELETE_ELEMENT(ipdef->ranges, i, ipdef->nranges);
3835

3836 3837 3838
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
3839 3840 3841
    }

    ret = 0;
3842
 cleanup:
3843
    return ret;
3844 3845 3846 3847 3848 3849 3850 3851 3852 3853 3854 3855 3856 3857 3858 3859
}

static int
virNetworkDefUpdateForward(virNetworkDefPtr def,
                           unsigned int command ATTRIBUTE_UNUSED,
                           int parentIndex ATTRIBUTE_UNUSED,
                           xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                           /* virNetworkUpdateFlags */
                           unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "forward");
    return -1;
}

static int
virNetworkDefUpdateForwardInterface(virNetworkDefPtr def,
3860
                                    unsigned int command,
3861
                                    int parentIndex ATTRIBUTE_UNUSED,
3862
                                    xmlXPathContextPtr ctxt,
3863 3864 3865
                                    /* virNetworkUpdateFlags */
                                    unsigned int fflags ATTRIBUTE_UNUSED)
{
3866 3867
    size_t i;
    int ret = -1;
3868 3869 3870 3871 3872 3873 3874 3875
    virNetworkForwardIfDef iface;

    memset(&iface, 0, sizeof(iface));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "interface") < 0)
        goto cleanup;

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
3876
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3877 3878 3879 3880 3881 3882 3883 3884 3885 3886 3887 3888 3889 3890
                       _("forward interface entries cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    /* parsing this is so simple that it doesn't have its own function */
    iface.type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
    if (!(iface.device.dev = virXMLPropString(ctxt->node, "dev"))) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("missing dev attribute in <interface> element"));
        goto cleanup;
    }

    /* check if an <interface> with same dev name already exists */
3891 3892
    for (i = 0; i < def->forward.nifs; i++) {
        if (def->forward.ifs[i].type
3893
            == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV &&
3894
            STREQ(iface.device.dev, def->forward.ifs[i].device.dev))
3895 3896 3897 3898 3899 3900
            break;
    }

    if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3901
        if (i < def->forward.nifs) {
3902 3903 3904 3905 3906 3907 3908 3909 3910
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is an existing interface entry "
                             "in network '%s' that matches "
                             "\"<interface dev='%s'>\""),
                           def->name, iface.device.dev);
            goto cleanup;
        }

        /* add to beginning/end of list */
3911 3912 3913 3914
        if (VIR_INSERT_ELEMENT(def->forward.ifs,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : def->forward.nifs,
                               def->forward.nifs, iface) < 0)
3915 3916 3917
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

3918
        if (i == def->forward.nifs) {
3919 3920 3921 3922 3923 3924 3925 3926
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't find an interface entry "
                             "in network '%s' matching <interface dev='%s'>"),
                           def->name, iface.device.dev);
            goto cleanup;
        }

        /* fail if the interface is being used */
3927
        if (def->forward.ifs[i].connections > 0) {
3928 3929 3930 3931 3932
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("unable to delete interface '%s' "
                             "in network '%s'. It is currently being used "
                             " by %d domains."),
                           iface.device.dev, def->name,
3933
                           def->forward.ifs[i].connections);
3934 3935 3936 3937
            goto cleanup;
        }

        /* remove it */
3938 3939
        virNetworkForwardIfDefClear(&def->forward.ifs[i]);
        VIR_DELETE_ELEMENT(def->forward.ifs, i, def->forward.nifs);
3940

3941 3942 3943 3944 3945 3946
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
3947
 cleanup:
3948 3949
    virNetworkForwardIfDefClear(&iface);
    return ret;
3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964
}

static int
virNetworkDefUpdateForwardPF(virNetworkDefPtr def,
                             unsigned int command ATTRIBUTE_UNUSED,
                             int parentIndex ATTRIBUTE_UNUSED,
                             xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                             /* virNetworkUpdateFlags */
                             unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "forward pf");
    return -1;
}

static int
3965 3966
virNetworkDefUpdatePortGroup(virNetworkDefPtr def,
                             unsigned int command,
3967
                             int parentIndex ATTRIBUTE_UNUSED,
3968
                             xmlXPathContextPtr ctxt,
3969 3970 3971
                             /* virNetworkUpdateFlags */
                             unsigned int fflags ATTRIBUTE_UNUSED)
{
3972 3973
    size_t i;
    int foundName = -1, foundDefault = -1;
3974
    int ret = -1;
3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985
    virPortGroupDef portgroup;

    memset(&portgroup, 0, sizeof(portgroup));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "portgroup") < 0)
        goto cleanup;

    if (virNetworkPortGroupParseXML(&portgroup, ctxt->node, ctxt) < 0)
        goto cleanup;

    /* check if a portgroup with same name already exists */
3986 3987 3988 3989 3990
    for (i = 0; i < def->nPortGroups; i++) {
        if (STREQ(portgroup.name, def->portGroups[i].name))
            foundName = i;
        if (def->portGroups[i].isDefault)
            foundDefault = i;
3991
    }
3992
    if (foundName == -1 &&
3993 3994 3995 3996 3997 3998 3999
        ((command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) ||
         (command == VIR_NETWORK_UPDATE_COMMAND_DELETE))) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("couldn't find a portgroup entry "
                         "in network '%s' matching <portgroup name='%s'>"),
                       def->name, portgroup.name);
        goto cleanup;
4000
    } else if (foundName >= 0 &&
4001 4002 4003 4004 4005 4006 4007 4008 4009 4010
               ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
                (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST))) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("there is an existing portgroup entry in "
                         "network '%s' that matches "
                         "\"<portgroup name='%s'>\""),
                       def->name, portgroup.name);
        goto cleanup;
    }

4011 4012 4013 4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024
    /* if there is already a different default, we can't make this
     * one the default.
     */
    if (command != VIR_NETWORK_UPDATE_COMMAND_DELETE &&
        portgroup.isDefault &&
        foundDefault >= 0 && foundDefault != foundName) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("a different portgroup entry in "
                         "network '%s' is already set as the default. "
                         "Only one default is allowed."),
                       def->name);
        goto cleanup;
    }

4025 4026 4027
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {

        /* replace existing entry */
4028 4029
        virPortGroupDefClear(&def->portGroups[foundName]);
        def->portGroups[foundName] = portgroup;
4030 4031 4032 4033 4034 4035
        memset(&portgroup, 0, sizeof(portgroup));

    } else if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

        /* add to beginning/end of list */
4036 4037 4038 4039
        if (VIR_INSERT_ELEMENT(def->portGroups,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : def->nPortGroups,
                               def->nPortGroups, portgroup) < 0)
4040 4041 4042 4043
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        /* remove it */
4044
        virPortGroupDefClear(&def->portGroups[foundName]);
4045 4046
        VIR_DELETE_ELEMENT(def->portGroups, foundName, def->nPortGroups);

4047 4048 4049
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
4050 4051 4052
    }

    ret = 0;
4053
 cleanup:
4054 4055
    virPortGroupDefClear(&portgroup);
    return ret;
4056 4057 4058 4059 4060 4061 4062 4063 4064 4065
}

static int
virNetworkDefUpdateDNSHost(virNetworkDefPtr def,
                           unsigned int command ATTRIBUTE_UNUSED,
                           int parentIndex ATTRIBUTE_UNUSED,
                           xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                           /* virNetworkUpdateFlags */
                           unsigned int fflags ATTRIBUTE_UNUSED)
{
4066 4067
    size_t i, j, k;
    int foundIdx = -1, ret = -1;
4068 4069 4070 4071
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSHostDef host;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);
4072
    int foundCt = 0;
4073 4074 4075 4076

    memset(&host, 0, sizeof(host));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4077
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4078 4079 4080 4081 4082 4083 4084 4085 4086 4087 4088
                       _("DNS HOST records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "host") < 0)
        goto cleanup;

    if (virNetworkDNSHostDefParseXML(def->name, ctxt->node, &host, !isAdd) < 0)
        goto cleanup;

4089
    for (i = 0; i < dns->nhosts; i++) {
4090 4091
        bool foundThisTime = false;

4092
        if (virSocketAddrEqual(&host.ip, &dns->hosts[i].ip))
4093 4094
            foundThisTime = true;

4095 4096 4097
        for (j = 0; j < host.nnames && !foundThisTime; j++) {
            for (k = 0; k < dns->hosts[i].nnames && !foundThisTime; k++) {
                if (STREQ(host.names[j], dns->hosts[i].names[k]))
4098 4099 4100 4101 4102
                    foundThisTime = true;
            }
        }
        if (foundThisTime) {
            foundCt++;
4103
            foundIdx = i;
4104 4105 4106 4107 4108 4109 4110 4111 4112 4113 4114 4115 4116 4117
        }
    }

    if (isAdd) {

        if (foundCt > 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already at least one DNS HOST "
                             "record with a matching field in network %s"),
                           def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4118 4119 4120
        if (VIR_INSERT_ELEMENT(dns->hosts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->nhosts, dns->nhosts, host) < 0)
4121 4122 4123 4124 4125 4126 4127 4128 4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundCt == 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS HOST "
                             "record in network %s"), def->name);
            goto cleanup;
        }
        if (foundCt > 1) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("multiple matching DNS HOST records were "
                             "found in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSHostDefClear(&dns->hosts[foundIdx]);
        VIR_DELETE_ELEMENT(dns->hosts, foundIdx, dns->nhosts);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4147
 cleanup:
4148 4149
    virNetworkDNSHostDefClear(&host);
    return ret;
4150 4151 4152
}

static int
4153
virNetworkDefUpdateDNSSrv(virNetworkDefPtr def,
4154 4155 4156 4157 4158 4159
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
4160 4161
    size_t i;
    int foundIdx = -1, ret = -1;
4162 4163 4164 4165
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSSrvDef srv;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);
4166
    int foundCt = 0;
4167 4168 4169 4170

    memset(&srv, 0, sizeof(srv));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4171
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182
                       _("DNS SRV records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "srv") < 0)
        goto cleanup;

    if (virNetworkDNSSrvDefParseXML(def->name, ctxt->node, ctxt, &srv, !isAdd) < 0)
        goto cleanup;

4183 4184 4185 4186 4187
    for (i = 0; i < dns->nsrvs; i++) {
        if ((!srv.domain || STREQ_NULLABLE(srv.domain, dns->srvs[i].domain)) &&
            (!srv.service || STREQ_NULLABLE(srv.service, dns->srvs[i].service)) &&
            (!srv.protocol || STREQ_NULLABLE(srv.protocol, dns->srvs[i].protocol)) &&
            (!srv.target || STREQ_NULLABLE(srv.target, dns->srvs[i].target))) {
4188
            foundCt++;
4189
            foundIdx = i;
4190 4191 4192 4193 4194 4195 4196 4197 4198 4199 4200 4201 4202 4203
        }
    }

    if (isAdd) {

        if (foundCt > 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already at least one DNS SRV "
                             "record matching all specified fields in network %s"),
                           def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4204 4205 4206
        if (VIR_INSERT_ELEMENT(dns->srvs,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->nsrvs, dns->nsrvs, srv) < 0)
4207 4208 4209 4210 4211 4212 4213 4214 4215 4216 4217 4218 4219 4220 4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231 4232
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundCt == 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS SRV "
                             "record in network %s"), def->name);
            goto cleanup;
        }
        if (foundCt > 1) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("multiple DNS SRV records matching all specified "
                             "fields were found in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSSrvDefClear(&dns->srvs[foundIdx]);
        VIR_DELETE_ELEMENT(dns->srvs, foundIdx, dns->nsrvs);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4233
 cleanup:
4234 4235
    virNetworkDNSSrvDefClear(&srv);
    return ret;
4236 4237 4238
}

static int
4239
virNetworkDefUpdateDNSTxt(virNetworkDefPtr def,
4240 4241 4242 4243 4244 4245
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
4246 4247 4248 4249 4250 4251 4252 4253 4254
    int foundIdx, ret = -1;
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSTxtDef txt;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);

    memset(&txt, 0, sizeof(txt));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4255
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4256 4257 4258 4259 4260 4261 4262 4263 4264 4265 4266 4267 4268 4269 4270 4271 4272 4273 4274 4275 4276 4277 4278 4279 4280 4281 4282
                       _("DNS TXT records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "txt") < 0)
        goto cleanup;

    if (virNetworkDNSTxtDefParseXML(def->name, ctxt->node, &txt, !isAdd) < 0)
        goto cleanup;

    for (foundIdx = 0; foundIdx < dns->ntxts; foundIdx++) {
        if (STREQ(txt.name, dns->txts[foundIdx].name))
            break;
    }

    if (isAdd) {

        if (foundIdx < dns->ntxts) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already a DNS TXT record "
                             "with name '%s' in network %s"),
                           txt.name, def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4283 4284 4285
        if (VIR_INSERT_ELEMENT(dns->txts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->ntxts, dns->ntxts, txt) < 0)
4286 4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundIdx == dns->ntxts) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS TXT "
                             "record in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSTxtDefClear(&dns->txts[foundIdx]);
        VIR_DELETE_ELEMENT(dns->txts, foundIdx, dns->ntxts);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4306
 cleanup:
4307 4308
    virNetworkDNSTxtDefClear(&txt);
    return ret;
4309 4310
}

J
Ján Tomko 已提交
4311
int
4312 4313 4314 4315 4316 4317 4318 4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331 4332 4333 4334 4335 4336 4337 4338 4339 4340 4341 4342 4343 4344 4345 4346 4347 4348 4349 4350 4351 4352 4353 4354 4355 4356 4357
virNetworkDefUpdateSection(virNetworkDefPtr def,
                           unsigned int command, /* virNetworkUpdateCommand */
                           unsigned int section, /* virNetworkUpdateSection */
                           int parentIndex,
                           const char *xml,
                           unsigned int flags)  /* virNetworkUpdateFlags */
{
    int ret = -1;
    xmlDocPtr doc;
    xmlXPathContextPtr ctxt = NULL;

    if (!(doc = virXMLParseStringCtxt(xml, _("network_update_xml"), &ctxt)))
        goto cleanup;

    switch (section) {
    case VIR_NETWORK_SECTION_BRIDGE:
       ret = virNetworkDefUpdateBridge(def, command, parentIndex, ctxt, flags);
        break;

    case VIR_NETWORK_SECTION_DOMAIN:
        ret = virNetworkDefUpdateDomain(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP:
        ret = virNetworkDefUpdateIP(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP_DHCP_HOST:
        ret = virNetworkDefUpdateIPDHCPHost(def, command,
                                            parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP_DHCP_RANGE:
        ret = virNetworkDefUpdateIPDHCPRange(def, command,
                                             parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD:
        ret = virNetworkDefUpdateForward(def, command,
                                         parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD_INTERFACE:
        ret = virNetworkDefUpdateForwardInterface(def, command,
                                                  parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD_PF:
        ret = virNetworkDefUpdateForwardPF(def, command,
                                           parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_PORTGROUP:
4358
        ret = virNetworkDefUpdatePortGroup(def, command,
4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371
                                           parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_HOST:
        ret = virNetworkDefUpdateDNSHost(def, command,
                                         parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_TXT:
        ret = virNetworkDefUpdateDNSTxt(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_SRV:
        ret = virNetworkDefUpdateDNSSrv(def, command, parentIndex, ctxt, flags);
        break;
    default:
4372
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4373 4374 4375 4376
                       _("can't update unrecognized section of network"));
        break;
    }

4377
 cleanup:
4378 4379 4380 4381 4382 4383 4384 4385 4386 4387 4388 4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404 4405
    xmlFreeDoc(doc);
    xmlXPathFreeContext(ctxt);
    return ret;
}

/*
 * virNetworkObjUpdate:
 *
 * Apply the supplied update to the given virNetworkObj. Except for
 * @network pointing to an actual network object rather than the
 * opaque virNetworkPtr, parameters are identical to the public API
 * virNetworkUpdate.
 *
 * The original virNetworkDefs are copied, and all modifications made
 * to these copies. The originals are replaced with the copies only
 * after success has been guaranteed.
 *
 * Returns: -1 on error, 0 on success.
 */
int
virNetworkObjUpdate(virNetworkObjPtr network,
                    unsigned int command, /* virNetworkUpdateCommand */
                    unsigned int section, /* virNetworkUpdateSection */
                    int parentIndex,
                    const char *xml,
                    unsigned int flags)  /* virNetworkUpdateFlags */
{
    int ret = -1;
4406
    virNetworkDefPtr livedef = NULL, configdef = NULL;
4407 4408 4409 4410 4411 4412

    /* normalize config data, and check for common invalid requests. */
    if (virNetworkConfigChangeSetup(network, flags) < 0)
       goto cleanup;

    if (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE) {
4413 4414
        virNetworkDefPtr checkdef;

4415
        /* work on a copy of the def */
4416
        if (!(livedef = virNetworkDefCopy(network->def, 0)))
4417
            goto cleanup;
4418
        if (virNetworkDefUpdateSection(livedef, command, section,
4419 4420 4421
                                       parentIndex, xml, flags) < 0) {
            goto cleanup;
        }
4422 4423 4424 4425 4426 4427
        /* run a final format/parse cycle to make sure we didn't
         * add anything illegal to the def
         */
        if (!(checkdef = virNetworkDefCopy(livedef, 0)))
            goto cleanup;
        virNetworkDefFree(checkdef);
4428 4429 4430
    }

    if (flags & VIR_NETWORK_UPDATE_AFFECT_CONFIG) {
4431 4432
        virNetworkDefPtr checkdef;

4433
        /* work on a copy of the def */
4434 4435
        if (!(configdef = virNetworkDefCopy(virNetworkObjGetPersistentDef(network),
                                            VIR_NETWORK_XML_INACTIVE))) {
4436 4437
            goto cleanup;
        }
4438
        if (virNetworkDefUpdateSection(configdef, command, section,
4439 4440 4441
                                       parentIndex, xml, flags) < 0) {
            goto cleanup;
        }
4442 4443 4444 4445 4446 4447 4448 4449
        if (!(checkdef = virNetworkDefCopy(configdef,
                                           VIR_NETWORK_XML_INACTIVE))) {
            goto cleanup;
        }
        virNetworkDefFree(checkdef);
    }

    if (configdef) {
4450
        /* successfully modified copy, now replace original */
4451
        if (virNetworkObjReplacePersistentDef(network, configdef) < 0)
4452
           goto cleanup;
4453 4454 4455 4456 4457 4458 4459
        configdef = NULL;
    }
    if (livedef) {
        /* successfully modified copy, now replace original */
        virNetworkDefFree(network->def);
        network->def = livedef;
        livedef = NULL;
4460 4461 4462
    }

    ret = 0;
4463
 cleanup:
4464 4465
    virNetworkDefFree(livedef);
    virNetworkDefFree(configdef);
4466 4467 4468
    return ret;
}

4469 4470
#define MATCH(FLAG) (flags & (FLAG))
static bool
4471 4472
virNetworkMatch(virNetworkObjPtr netobj,
                unsigned int flags)
4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488 4489 4490 4491 4492 4493 4494 4495 4496 4497 4498 4499 4500 4501
{
    /* filter by active state */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_ACTIVE) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_ACTIVE) &&
           virNetworkObjIsActive(netobj)) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_INACTIVE) &&
           !virNetworkObjIsActive(netobj))))
        return false;

    /* filter by persistence */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_PERSISTENT) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_PERSISTENT) &&
           netobj->persistent) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_TRANSIENT) &&
           !netobj->persistent)))
        return false;

    /* filter by autostart option */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_AUTOSTART) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_AUTOSTART) &&
           netobj->autostart) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_NO_AUTOSTART) &&
           !netobj->autostart)))
        return false;

    return true;
}
#undef MATCH

4502 4503 4504 4505 4506 4507 4508 4509 4510
struct virNetworkObjListData {
    virConnectPtr conn;
    virNetworkPtr *nets;
    virNetworkObjListFilter filter;
    unsigned int flags;
    int nnets;
    bool error;
};

4511
static int
4512 4513 4514 4515 4516 4517 4518 4519 4520
virNetworkObjListPopulate(void *payload,
                          const void *name ATTRIBUTE_UNUSED,
                          void *opaque)
{
    struct virNetworkObjListData *data = opaque;
    virNetworkObjPtr obj = payload;
    virNetworkPtr net = NULL;

    if (data->error)
4521
        return 0;
4522

4523
    virObjectLock(obj);
4524 4525 4526 4527 4528 4529 4530 4531 4532 4533 4534 4535 4536 4537 4538 4539 4540 4541 4542 4543 4544

    if (data->filter &&
        !data->filter(data->conn, obj->def))
        goto cleanup;

    if (!virNetworkMatch(obj, data->flags))
        goto cleanup;

    if (!data->nets) {
        data->nnets++;
        goto cleanup;
    }

    if (!(net = virGetNetwork(data->conn, obj->def->name, obj->def->uuid))) {
        data->error = true;
        goto cleanup;
    }

    data->nets[data->nnets++] = net;

 cleanup:
4545
    virObjectUnlock(obj);
4546
    return 0;
4547 4548
}

4549
int
4550
virNetworkObjListExport(virConnectPtr conn,
4551
                        virNetworkObjListPtr netobjs,
4552 4553 4554
                        virNetworkPtr **nets,
                        virNetworkObjListFilter filter,
                        unsigned int flags)
4555 4556
{
    int ret = -1;
4557
    struct virNetworkObjListData data = { conn, NULL, filter, flags, 0, false};
4558

4559
    virObjectLock(netobjs);
4560
    if (nets && VIR_ALLOC_N(data.nets, virHashSize(netobjs->objs) + 1) < 0)
4561
        goto cleanup;
4562

4563 4564 4565 4566
    virHashForEach(netobjs->objs, virNetworkObjListPopulate, &data);

    if (data.error)
        goto cleanup;
4567

4568
    if (data.nets) {
4569
        /* trim the array to the final size */
4570 4571 4572
        ignore_value(VIR_REALLOC_N(data.nets, data.nnets + 1));
        *nets = data.nets;
        data.nets = NULL;
4573 4574
    }

4575
    ret = data.nnets;
4576
 cleanup:
4577
    virObjectUnlock(netobjs);
4578 4579
    while (data.nets && data.nnets)
        virObjectUnref(data.nets[--data.nnets]);
4580

4581
    VIR_FREE(data.nets);
4582 4583
    return ret;
}
4584

4585 4586 4587 4588 4589 4590
struct virNetworkObjListForEachHelperData {
    virNetworkObjListIterator callback;
    void *opaque;
    int ret;
};

4591
static int
4592 4593 4594 4595 4596 4597 4598 4599
virNetworkObjListForEachHelper(void *payload,
                               const void *name ATTRIBUTE_UNUSED,
                               void *opaque)
{
    struct virNetworkObjListForEachHelperData *data = opaque;

    if (data->callback(payload, data->opaque) < 0)
        data->ret = -1;
4600
    return 0;
4601 4602
}

4603 4604 4605 4606 4607 4608 4609
/**
 * virNetworkObjListForEach:
 * @nets: a list of network objects
 * @callback: function to call over each of object in the list
 * @opaque: pointer to pass to the @callback
 *
 * Function iterates over the list of network objects and calls
4610 4611 4612
 * passed callback over each one of them. You should avoid
 * calling those virNetworkObjList APIs, which lock the list
 * again in favor of their virNetworkObj*Locked variants.
4613 4614 4615 4616 4617 4618 4619 4620
 *
 * Returns: 0 on success, -1 otherwise.
 */
int
virNetworkObjListForEach(virNetworkObjListPtr nets,
                         virNetworkObjListIterator callback,
                         void *opaque)
{
4621
    struct virNetworkObjListForEachHelperData data = {callback, opaque, 0};
4622
    virObjectLock(nets);
4623
    virHashForEach(nets->objs, virNetworkObjListForEachHelper, &data);
4624
    virObjectUnlock(nets);
4625 4626 4627 4628 4629 4630 4631 4632 4633 4634 4635 4636
    return data.ret;
}

struct virNetworkObjListGetHelperData {
    virConnectPtr conn;
    virNetworkObjListFilter filter;
    char **names;
    int nnames;
    bool active;
    int got;
    bool error;
};
4637

4638
static int
4639 4640 4641 4642 4643 4644 4645 4646
virNetworkObjListGetHelper(void *payload,
                           const void *name ATTRIBUTE_UNUSED,
                           void *opaque)
{
    struct virNetworkObjListGetHelperData *data = opaque;
    virNetworkObjPtr obj = payload;

    if (data->error)
4647
        return 0;
4648 4649 4650

    if (data->nnames >= 0 &&
        data->got == data->nnames)
4651
        return 0;
4652

4653
    virObjectLock(obj);
4654 4655 4656 4657 4658 4659 4660 4661 4662 4663 4664 4665 4666

    if (data->filter &&
        !data->filter(data->conn, obj->def))
        goto cleanup;

    if ((data->active && virNetworkObjIsActive(obj)) ||
        (!data->active && !virNetworkObjIsActive(obj))) {
        if (data->names &&
            VIR_STRDUP(data->names[data->got], obj->def->name) < 0) {
            data->error = true;
            goto cleanup;
        }
        data->got++;
4667 4668
    }

4669
 cleanup:
4670
    virObjectUnlock(obj);
4671
    return 0;
4672
}
4673 4674 4675 4676 4677 4678 4679 4680 4681

int
virNetworkObjListGetNames(virNetworkObjListPtr nets,
                          bool active,
                          char **names,
                          int nnames,
                          virNetworkObjListFilter filter,
                          virConnectPtr conn)
{
4682
    int ret = -1;
4683

4684 4685
    struct virNetworkObjListGetHelperData data = {
        conn, filter, names, nnames, active, 0, false};
4686

4687
    virObjectLock(nets);
4688
    virHashForEach(nets->objs, virNetworkObjListGetHelper, &data);
4689
    virObjectUnlock(nets);
4690

4691 4692
    if (data.error)
        goto cleanup;
4693

4694 4695 4696 4697 4698 4699 4700
    ret = data.got;
 cleanup:
    if (ret < 0) {
        while (data.got)
            VIR_FREE(data.names[--data.got]);
    }
    return ret;
4701
}
4702 4703 4704 4705 4706 4707 4708

int
virNetworkObjListNumOfNetworks(virNetworkObjListPtr nets,
                               bool active,
                               virNetworkObjListFilter filter,
                               virConnectPtr conn)
{
4709 4710
    struct virNetworkObjListGetHelperData data = {
        conn, filter, NULL, -1, active, 0, false};
4711

4712
    virObjectLock(nets);
4713
    virHashForEach(nets->objs, virNetworkObjListGetHelper, &data);
4714
    virObjectUnlock(nets);
4715

4716 4717 4718 4719 4720 4721
    return data.got;
}

struct virNetworkObjListPruneHelperData {
    unsigned int flags;
};
4722

4723 4724 4725 4726 4727 4728 4729 4730 4731
static int
virNetworkObjListPruneHelper(const void *payload,
                             const void *name ATTRIBUTE_UNUSED,
                             const void *opaque)
{
    const struct virNetworkObjListPruneHelperData *data = opaque;
    virNetworkObjPtr obj = (virNetworkObjPtr) payload;
    int want = 0;

4732
    virObjectLock(obj);
4733
    want = virNetworkMatch(obj, data->flags);
4734
    virObjectUnlock(obj);
4735
    return want;
4736
}
4737 4738 4739 4740 4741 4742 4743 4744 4745 4746 4747 4748 4749

/**
 * virNetworkObjListPrune:
 * @nets: a list of network objects
 * @flags: bitwise-OR of virConnectListAllNetworksFlags
 *
 * Iterate over list of network objects and remove the desired
 * ones from it.
 */
void
virNetworkObjListPrune(virNetworkObjListPtr nets,
                       unsigned int flags)
{
4750
    struct virNetworkObjListPruneHelperData data = {flags};
4751

4752
    virObjectLock(nets);
4753
    virHashRemoveSet(nets->objs, virNetworkObjListPruneHelper, &data);
4754
    virObjectUnlock(nets);
4755
}