network_conf.c 151.7 KB
Newer Older
1 2 3
/*
 * network_conf.c: network XML handling
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006-2008 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

#include <config.h>

26
#include <unistd.h>
27 28
#include <arpa/inet.h>
#include <sys/types.h>
A
Atsushi SAKAI 已提交
29
#include <sys/stat.h>
30
#include <fcntl.h>
31
#include <string.h>
32 33
#include <dirent.h>

34
#include "virerror.h"
35
#include "datatypes.h"
36
#include "network_conf.h"
37 38
#include "netdev_vport_profile_conf.h"
#include "netdev_bandwidth_conf.h"
39
#include "netdev_vlan_conf.h"
40
#include "viralloc.h"
41
#include "virxml.h"
42
#include "viruuid.h"
43
#include "virbuffer.h"
44
#include "c-ctype.h"
E
Eric Blake 已提交
45
#include "virfile.h"
46
#include "virstring.h"
47

48
#define VIR_FROM_THIS VIR_FROM_NETWORK
49 50
/* currently, /sbin/tc implementation allows up to 16 bits for minor class size */
#define CLASS_ID_BITMAP_SIZE (1<<16)
51

52
struct _virNetworkObjList {
53
    virObjectLockable parent;
54

55
    virHashTablePtr objs;
56 57
};

58 59
VIR_ENUM_IMPL(virNetworkForward,
              VIR_NETWORK_FORWARD_LAST,
60 61 62
              "none", "nat", "route", "open",
              "bridge", "private", "vepa", "passthrough",
              "hostdev")
63

64 65 66 67
VIR_ENUM_IMPL(virNetworkBridgeMACTableManager,
              VIR_NETWORK_BRIDGE_MAC_TABLE_MANAGER_LAST,
              "default", "kernel", "libvirt")

68 69 70 71
VIR_ENUM_DECL(virNetworkForwardHostdevDevice)
VIR_ENUM_IMPL(virNetworkForwardHostdevDevice,
              VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_LAST,
              "none", "pci", "netdev")
72

73 74 75 76 77 78
VIR_ENUM_IMPL(virNetworkForwardDriverName,
              VIR_NETWORK_FORWARD_DRIVER_NAME_LAST,
              "default",
              "kvm",
              "vfio")

79 80 81
VIR_ENUM_IMPL(virNetworkTaint, VIR_NETWORK_TAINT_LAST,
              "hook-script");

82
static virClassPtr virNetworkObjClass;
83
static virClassPtr virNetworkObjListClass;
84
static void virNetworkObjDispose(void *obj);
85 86 87
static void virNetworkObjListDispose(void *obj);

static int virNetworkObjOnceInit(void)
88
{
89 90 91 92 93 94
    if (!(virNetworkObjClass = virClassNew(virClassForObjectLockable(),
                                           "virNetworkObj",
                                           sizeof(virNetworkObj),
                                           virNetworkObjDispose)))
        return -1;

95
    if (!(virNetworkObjListClass = virClassNew(virClassForObjectLockable(),
96 97 98 99 100 101
                                               "virNetworkObjList",
                                               sizeof(virNetworkObjList),
                                               virNetworkObjListDispose)))
        return -1;
    return 0;
}
102 103


104 105
VIR_ONCE_GLOBAL_INIT(virNetworkObj)

106 107
virNetworkObjPtr
virNetworkObjNew(void)
108
{
109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
    virNetworkObjPtr net;

    if (virNetworkObjInitialize() < 0)
        return NULL;

    if (!(net = virObjectLockableNew(virNetworkObjClass)))
        return NULL;

    if (!(net->class_id = virBitmapNew(CLASS_ID_BITMAP_SIZE)))
        goto error;

    /* The first three class IDs are already taken */
    ignore_value(virBitmapSetBit(net->class_id, 0));
    ignore_value(virBitmapSetBit(net->class_id, 1));
    ignore_value(virBitmapSetBit(net->class_id, 2));

    return net;

 error:
    virObjectUnref(net);
    return NULL;
130 131
}

132 133 134 135 136 137 138
void
virNetworkObjEndAPI(virNetworkObjPtr *net)
{
    if (!*net)
        return;

    virObjectUnlock(*net);
139
    virObjectUnref(*net);
140 141 142
    *net = NULL;
}

143 144 145 146 147 148 149
virNetworkObjListPtr virNetworkObjListNew(void)
{
    virNetworkObjListPtr nets;

    if (virNetworkObjInitialize() < 0)
        return NULL;

150
    if (!(nets = virObjectLockableNew(virNetworkObjListClass)))
151 152
        return NULL;

153
    if (!(nets->objs = virHashCreate(50, virObjectFreeHashData))) {
154 155 156 157
        virObjectUnref(nets);
        return NULL;
    }

158
    return nets;
159 160
}

161 162 163 164 165 166 167 168 169
/**
 * virNetworkObjFindByUUIDLocked:
 * @nets: list of network objects
 * @uuid: network uuid to find
 *
 * This functions requires @nets to be locked already!
 *
 * Returns: not locked, but ref'd network object.
 */
170 171 172
virNetworkObjPtr
virNetworkObjFindByUUIDLocked(virNetworkObjListPtr nets,
                              const unsigned char *uuid)
173
{
174 175
    virNetworkObjPtr ret = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];
176

177
    virUUIDFormat(uuid, uuidstr);
178

179 180
    ret = virHashLookup(nets->objs, uuidstr);
    if (ret)
181
        virObjectRef(ret);
182 183 184
    return ret;
}

185 186 187 188 189 190 191 192 193 194
/**
 * virNetworkObjFindByUUID:
 * @nets: list of network objects
 * @uuid: network uuid to find
 *
 * This functions locks @nets and find network object which
 * corresponds to @uuid.
 *
 * Returns: locked and ref'd network object.
 */
195 196 197 198 199 200 201 202 203
virNetworkObjPtr
virNetworkObjFindByUUID(virNetworkObjListPtr nets,
                        const unsigned char *uuid)
{
    virNetworkObjPtr ret;

    virObjectLock(nets);
    ret = virNetworkObjFindByUUIDLocked(nets, uuid);
    virObjectUnlock(nets);
204 205
    if (ret)
        virObjectLock(ret);
206 207 208
    return ret;
}

209 210 211 212 213 214 215 216
static int
virNetworkObjSearchName(const void *payload,
                        const void *name ATTRIBUTE_UNUSED,
                        const void *data)
{
    virNetworkObjPtr net = (virNetworkObjPtr) payload;
    int want = 0;

217
    virObjectLock(net);
218 219
    if (STREQ(net->def->name, (const char *)data))
        want = 1;
220
    virObjectUnlock(net);
221
    return want;
222 223
}

224 225 226 227 228 229 230 231 232
/*
 * virNetworkObjFindByNameLocked:
 * @nets: list of network objects
 * @name: network name to find
 *
 * This functions requires @nets to be locked already!
 *
 * Returns: not locked, but ref'd network object.
 */
233 234 235
virNetworkObjPtr
virNetworkObjFindByNameLocked(virNetworkObjListPtr nets,
                              const char *name)
236
{
237
    virNetworkObjPtr ret = NULL;
238

239 240
    ret = virHashSearch(nets->objs, virNetworkObjSearchName, name);
    if (ret)
241
        virObjectRef(ret);
242
    return ret;
243 244
}

245 246 247 248 249 250 251 252 253 254
/**
 * virNetworkObjFindByName:
 * @nets: list of network objects
 * @name: network name to find
 *
 * This functions locks @nets and find network object which
 * corresponds to @name.
 *
 * Returns: locked and ref'd network object.
 */
255 256 257 258 259 260 261 262 263
virNetworkObjPtr
virNetworkObjFindByName(virNetworkObjListPtr nets,
                        const char *name)
{
    virNetworkObjPtr ret;

    virObjectLock(nets);
    ret = virNetworkObjFindByNameLocked(nets, name);
    virObjectUnlock(nets);
264 265
    if (ret)
        virObjectLock(ret);
266 267 268
    return ret;
}

269 270 271 272 273 274 275 276 277 278 279 280 281
bool
virNetworkObjTaint(virNetworkObjPtr obj,
                   virNetworkTaintFlags taint)
{
    unsigned int flag = (1 << taint);

    if (obj->taint & flag)
        return false;

    obj->taint |= flag;
    return true;
}

282

283 284 285 286 287
static void
virPortGroupDefClear(virPortGroupDefPtr def)
{
    VIR_FREE(def->name);
    VIR_FREE(def->virtPortProfile);
288
    virNetDevBandwidthFree(def->bandwidth);
289
    virNetDevVlanClear(&def->vlan);
290
    def->bandwidth = NULL;
291 292 293 294 295
}

static void
virNetworkForwardIfDefClear(virNetworkForwardIfDefPtr def)
{
296 297
    if (def->type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV)
        VIR_FREE(def->device.dev);
298 299
}

300 301 302 303 304 305
static void
virNetworkForwardPfDefClear(virNetworkForwardPfDefPtr def)
{
    VIR_FREE(def->dev);
}

306 307 308 309
static void
virNetworkDHCPHostDefClear(virNetworkDHCPHostDefPtr def)
{
    VIR_FREE(def->mac);
310
    VIR_FREE(def->id);
311 312 313
    VIR_FREE(def->name);
}

314
static void
315
virNetworkIPDefClear(virNetworkIPDefPtr def)
316 317 318 319
{
    VIR_FREE(def->family);
    VIR_FREE(def->ranges);

320 321
    while (def->nhosts)
        virNetworkDHCPHostDefClear(&def->hosts[--def->nhosts]);
322 323 324 325 326 327

    VIR_FREE(def->hosts);
    VIR_FREE(def->tftproot);
    VIR_FREE(def->bootfile);
}

328 329
static void
virNetworkDNSTxtDefClear(virNetworkDNSTxtDefPtr def)
330
{
331 332 333 334 335 336 337
    VIR_FREE(def->name);
    VIR_FREE(def->value);
}

static void
virNetworkDNSHostDefClear(virNetworkDNSHostDefPtr def)
{
338 339
    while (def->nnames)
        VIR_FREE(def->names[--def->nnames]);
340 341 342 343 344 345 346 347 348 349 350 351
    VIR_FREE(def->names);
}

static void
virNetworkDNSSrvDefClear(virNetworkDNSSrvDefPtr def)
{
    VIR_FREE(def->domain);
    VIR_FREE(def->service);
    VIR_FREE(def->protocol);
    VIR_FREE(def->target);
}

352 353 354 355 356 357 358 359

static void
virNetworkDNSForwarderClear(virNetworkDNSForwarderPtr def)
{
    VIR_FREE(def->domain);
}


360 361 362
static void
virNetworkDNSDefClear(virNetworkDNSDefPtr def)
{
363 364
    if (def->forwarders) {
        while (def->nfwds)
365
            virNetworkDNSForwarderClear(&def->forwarders[--def->nfwds]);
366 367
        VIR_FREE(def->forwarders);
    }
368
    if (def->txts) {
369 370
        while (def->ntxts)
            virNetworkDNSTxtDefClear(&def->txts[--def->ntxts]);
371
        VIR_FREE(def->txts);
372 373
    }
    if (def->hosts) {
374 375
        while (def->nhosts)
            virNetworkDNSHostDefClear(&def->hosts[--def->nhosts]);
376
        VIR_FREE(def->hosts);
377 378
    }
    if (def->srvs) {
379 380
        while (def->nsrvs)
            virNetworkDNSSrvDefClear(&def->srvs[--def->nsrvs]);
381
        VIR_FREE(def->srvs);
382 383 384
    }
}

385 386 387
static void
virNetworkForwardDefClear(virNetworkForwardDefPtr def)
{
388
    size_t i;
389

390
    for (i = 0; i < def->npfs && def->pfs; i++)
391
        virNetworkForwardPfDefClear(&def->pfs[i]);
392 393
    VIR_FREE(def->pfs);

394
    for (i = 0; i < def->nifs && def->ifs; i++)
395
        virNetworkForwardIfDefClear(&def->ifs[i]);
396
    VIR_FREE(def->ifs);
397
    def->nifs = def->npfs = 0;
398 399 400 401
}

void
virNetworkDefFree(virNetworkDefPtr def)
402
{
403
    size_t i;
404 405 406 407 408 409

    if (!def)
        return;

    VIR_FREE(def->name);
    VIR_FREE(def->bridge);
410
    VIR_FREE(def->domain);
411

412
    virNetworkForwardDefClear(&def->forward);
413

414
    for (i = 0; i < def->nips && def->ips; i++)
415
        virNetworkIPDefClear(&def->ips[i]);
416
    VIR_FREE(def->ips);
417

418
    for (i = 0; i < def->nroutes && def->routes; i++)
419
        virNetDevIPRouteFree(def->routes[i]);
420 421
    VIR_FREE(def->routes);

422
    for (i = 0; i < def->nPortGroups && def->portGroups; i++)
423
        virPortGroupDefClear(&def->portGroups[i]);
424 425
    VIR_FREE(def->portGroups);

426
    virNetworkDNSDefClear(&def->dns);
427

428 429
    VIR_FREE(def->virtPortProfile);

430
    virNetDevBandwidthFree(def->bandwidth);
431
    virNetDevVlanClear(&def->vlan);
432 433 434

    xmlFreeNode(def->metadata);

435 436 437
    VIR_FREE(def);
}

438 439
static void
virNetworkObjDispose(void *obj)
440
{
441
    virNetworkObjPtr net = obj;
442 443 444

    virNetworkDefFree(net->def);
    virNetworkDefFree(net->newDef);
445
    virBitmapFree(net->class_id);
446 447
}

448 449
static void
virNetworkObjListDispose(void *obj)
450
{
451
    virNetworkObjListPtr nets = obj;
452

453
    virHashFree(nets->objs);
454 455
}

456 457 458
/*
 * virNetworkObjAssignDef:
 * @network: the network object to update
459
 * @def: the new NetworkDef (will be consumed by this function)
460 461
 * @live: is this new def the "live" version, or the "persistent" version
 *
462
 * Replace the appropriate copy of the given network's def or newDef
463
 * with def. Use "live" and current state of the network to determine
464 465 466 467 468 469
 * which to replace and what to do with the old defs. When a non-live
 * def is set, indicate that the network is now persistent.
 *
 * NB: a persistent network can be made transient by calling with:
 * virNetworkObjAssignDef(network, NULL, false) (i.e. set the
 * persistent def to NULL)
470 471
 *
 */
472
void
473
virNetworkObjAssignDef(virNetworkObjPtr network,
E
Eric Blake 已提交
474
                       virNetworkDefPtr def,
475
                       bool live)
476
{
477 478 479 480 481 482 483 484
    if (live) {
        /* before setting new live def, save (into newDef) any
         * existing persistent (!live) def to be restored when the
         * network is destroyed, unless there is one already saved.
         */
        if (network->persistent && !network->newDef)
            network->newDef = network->def;
        else
485
            virNetworkDefFree(network->def);
486 487 488 489 490 491 492
        network->def = def;
    } else { /* !live */
        virNetworkDefFree(network->newDef);
        if (virNetworkObjIsActive(network)) {
            /* save new configuration to be restored on network
             * shutdown, leaving current live def alone
             */
493
            network->newDef = def;
494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511
        } else { /* !live and !active */
            if (network->def && !network->persistent) {
                /* network isn't (yet) marked active or persistent,
                 * but already has a "live" def set. This means we are
                 * currently setting the persistent def as a part of
                 * the process of starting the network, so we need to
                 * preserve the "not yet live" def in network->def.
                 */
                network->newDef = def;
            } else {
                /* either there is no live def set, or this network
                 * was already set as persistent, so the proper thing
                 * is to overwrite network->def.
                 */
                network->newDef = NULL;
                virNetworkDefFree(network->def);
                network->def = def;
            }
512
        }
513
        network->persistent = !!def;
514 515
    }
}
516

517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593
/*
 * If flags & VIR_NETWORK_OBJ_LIST_ADD_CHECK_LIVE then this will
 * refuse updating an existing def if the current def is live
 *
 * If flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE then the @def being
 * added is assumed to represent a live config, not a future
 * inactive config
 *
 * If flags is zero, network is considered as inactive and persistent.
 */
static virNetworkObjPtr
virNetworkAssignDefLocked(virNetworkObjListPtr nets,
                          virNetworkDefPtr def,
                          unsigned int flags)
{
    virNetworkObjPtr network;
    virNetworkObjPtr ret = NULL;
    char uuidstr[VIR_UUID_STRING_BUFLEN];

    /* See if a network with matching UUID already exists */
    if ((network = virNetworkObjFindByUUIDLocked(nets, def->uuid))) {
        virObjectLock(network);
        /* UUID matches, but if names don't match, refuse it */
        if (STRNEQ(network->def->name, def->name)) {
            virUUIDFormat(network->def->uuid, uuidstr);
            virReportError(VIR_ERR_OPERATION_FAILED,
                           _("network '%s' is already defined with uuid %s"),
                           network->def->name, uuidstr);
            goto cleanup;
        }

        if (flags & VIR_NETWORK_OBJ_LIST_ADD_CHECK_LIVE) {
            /* UUID & name match, but if network is already active, refuse it */
            if (virNetworkObjIsActive(network)) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("network is already active as '%s'"),
                               network->def->name);
                goto cleanup;
            }
        }

        virNetworkObjAssignDef(network,
                               def,
                               !!(flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE));
    } else {
        /* UUID does not match, but if a name matches, refuse it */
        if ((network = virNetworkObjFindByNameLocked(nets, def->name))) {
            virObjectLock(network);
            virUUIDFormat(network->def->uuid, uuidstr);
            virReportError(VIR_ERR_OPERATION_FAILED,
                           _("network '%s' already exists with uuid %s"),
                           def->name, uuidstr);
            goto cleanup;
        }

        if (!(network = virNetworkObjNew()))
              goto cleanup;

        virObjectLock(network);

        virUUIDFormat(def->uuid, uuidstr);
        if (virHashAddEntry(nets->objs, uuidstr, network) < 0)
            goto cleanup;

        network->def = def;
        network->persistent = !(flags & VIR_NETWORK_OBJ_LIST_ADD_LIVE);
        virObjectRef(network);
    }

    ret = network;
    network = NULL;

 cleanup:
    virNetworkObjEndAPI(&network);
    return ret;
}

594 595 596 597
/*
 * virNetworkAssignDef:
 * @nets: list of all networks
 * @def: the new NetworkDef (will be consumed by this function iff successful)
598
 * @flags: bitwise-OR of VIR_NETWORK_OBJ_LIST_ADD_* flags
599 600 601 602 603 604
 *
 * Either replace the appropriate copy of the NetworkDef with name
 * matching def->name or, if not found, create a new NetworkObj with
 * def. For an existing network, use "live" and current state of the
 * network to determine which to replace.
 *
605 606
 * Look at virNetworkAssignDefLocked() for @flags description.
 *
607
 * Returns NULL on error, virNetworkObjPtr on success.
608 609 610
 */
virNetworkObjPtr
virNetworkAssignDef(virNetworkObjListPtr nets,
E
Eric Blake 已提交
611
                    virNetworkDefPtr def,
612
                    unsigned int flags)
613 614 615
{
    virNetworkObjPtr network;

616
    virObjectLock(nets);
617
    network = virNetworkAssignDefLocked(nets, def, flags);
618
    virObjectUnlock(nets);
619 620 621
    return network;
}

622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648
/*
 * virNetworkObjSetDefTransient:
 * @network: network object pointer
 * @live: if true, run this operation even for an inactive network.
 *   this allows freely updated network->def with runtime defaults
 *   before starting the network, which will be discarded on network
 *   shutdown. Any cleanup paths need to be sure to handle newDef if
 *   the network is never started.
 *
 * Mark the active network config as transient. Ensures live-only update
 * operations do not persist past network destroy.
 *
 * Returns 0 on success, -1 on failure
 */
int
virNetworkObjSetDefTransient(virNetworkObjPtr network, bool live)
{
    if (!virNetworkObjIsActive(network) && !live)
        return 0;

    if (!network->persistent || network->newDef)
        return 0;

    network->newDef = virNetworkDefCopy(network->def, VIR_NETWORK_XML_INACTIVE);
    return network->newDef ? 0 : -1;
}

649 650 651 652 653 654 655
/* virNetworkObjUnsetDefTransient:
 *
 * This *undoes* what virNetworkObjSetDefTransient did.
 */
void
virNetworkObjUnsetDefTransient(virNetworkObjPtr network)
{
656
    if (network->newDef) {
657 658 659 660 661 662
        virNetworkDefFree(network->def);
        network->def = network->newDef;
        network->newDef = NULL;
    }
}

663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730
/*
 * virNetworkObjGetPersistentDef:
 * @network: network object pointer
 *
 * Return the persistent network configuration. If network is transient,
 * return the running config.
 *
 * Returns NULL on error, virNetworkDefPtr on success.
 */
virNetworkDefPtr
virNetworkObjGetPersistentDef(virNetworkObjPtr network)
{
    if (network->newDef)
        return network->newDef;
    else
        return network->def;
}

/*
 * virNetworkObjReplacePersistentDef:
 * @network: network object pointer
 * @def: new virNetworkDef to replace current persistent config
 *
 * Replace the "persistent" network configuration with the given new
 * virNetworkDef. This pays attention to whether or not the network
 * is active.
 *
 * Returns -1 on error, 0 on success
 */
int
virNetworkObjReplacePersistentDef(virNetworkObjPtr network,
                                  virNetworkDefPtr def)
{
    if (virNetworkObjIsActive(network)) {
        virNetworkDefFree(network->newDef);
        network->newDef = def;
    } else {
        virNetworkDefFree(network->def);
        network->def = def;
    }
    return 0;
}

/*
 * virNetworkDefCopy:
 * @def: NetworkDef to copy
 * @flags: VIR_NETWORK_XML_INACTIVE if appropriate
 *
 * make a deep copy of the given NetworkDef
 *
 * Returns a new NetworkDef on success, or NULL on failure.
 */
virNetworkDefPtr
virNetworkDefCopy(virNetworkDefPtr def, unsigned int flags)
{
    char *xml = NULL;
    virNetworkDefPtr newDef = NULL;

    if (!def) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("NULL NetworkDef"));
        return NULL;
    }

    /* deep copy with a format/parse cycle */
    if (!(xml = virNetworkDefFormat(def, flags)))
        goto cleanup;
    newDef = virNetworkDefParseString(xml);
731
 cleanup:
732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775
    VIR_FREE(xml);
    return newDef;
}

/*
 * virNetworkConfigChangeSetup:
 *
 * 1) checks whether network state is consistent with the requested
 *    type of modification.
 *
 * 3) make sure there are separate "def" and "newDef" copies of
 *    networkDef if appropriate.
 *
 * Returns 0 on success, -1 on error.
 */
int
virNetworkConfigChangeSetup(virNetworkObjPtr network, unsigned int flags)
{
    bool isActive;
    int ret = -1;

    isActive = virNetworkObjIsActive(network);

    if (!isActive && (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("network is not running"));
        goto cleanup;
    }

    if (flags & VIR_NETWORK_UPDATE_AFFECT_CONFIG) {
        if (!network->persistent) {
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot change persistent config of a "
                             "transient network"));
            goto cleanup;
        }
        /* this should already have been done by the driver, but do it
         * anyway just in case.
         */
        if (isActive && (virNetworkObjSetDefTransient(network, false) < 0))
            goto cleanup;
    }

    ret = 0;
776
 cleanup:
777 778 779
    return ret;
}

780
void virNetworkRemoveInactive(virNetworkObjListPtr nets,
E
Eric Blake 已提交
781
                              virNetworkObjPtr net)
782
{
783
    char uuidstr[VIR_UUID_STRING_BUFLEN];
784

785
    virUUIDFormat(net->def->uuid, uuidstr);
786
    virObjectRef(net);
787
    virObjectUnlock(net);
788 789
    virObjectLock(nets);
    virObjectLock(net);
790
    virHashRemoveEntry(nets->objs, uuidstr);
791 792
    virObjectUnlock(nets);
    virObjectUnref(net);
793 794
}

795
/* return ips[index], or NULL if there aren't enough ips */
796 797
virNetworkIPDefPtr
virNetworkDefGetIPByIndex(const virNetworkDef *def,
798 799
                          int family, size_t n)
{
800
    size_t i;
801 802 803 804

    if (!def->ips || n >= def->nips)
        return NULL;

805
    if (family == AF_UNSPEC)
806 807 808
        return &def->ips[n];

    /* find the nth ip of type "family" */
809 810
    for (i = 0; i < def->nips; i++) {
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->ips[i].address, family)
811
            && (n-- <= 0)) {
812
            return &def->ips[i];
813 814 815 816 817 818
        }
    }
    /* failed to find enough of the right family */
    return NULL;
}

819
/* return routes[index], or NULL if there aren't enough routes */
820
virNetDevIPRoutePtr
821 822 823 824 825 826 827 828 829 830 831 832 833
virNetworkDefGetRouteByIndex(const virNetworkDef *def,
                             int family, size_t n)
{
    size_t i;

    if (!def->routes || n >= def->nroutes)
        return NULL;

    if (family == AF_UNSPEC)
        return def->routes[n];

    /* find the nth route of type "family" */
    for (i = 0; i < def->nroutes; i++) {
834
        virSocketAddrPtr addr = virNetDevIPRouteGetAddress(def->routes[i]);
835 836 837 838 839 840 841 842 843 844
        if (VIR_SOCKET_ADDR_IS_FAMILY(addr, family)
            && (n-- <= 0)) {
            return def->routes[i];
        }
    }

    /* failed to find enough of the right family */
    return NULL;
}

L
Laine Stump 已提交
845 846 847
/* return number of 1 bits in netmask for the network's ipAddress,
 * or -1 on error
 */
848
int virNetworkIPDefPrefix(const virNetworkIPDef *def)
L
Laine Stump 已提交
849
{
850
    return virSocketAddrGetIPPrefix(&def->address,
851 852
                                    &def->netmask,
                                    def->prefix);
L
Laine Stump 已提交
853 854 855 856 857 858
}

/* Fill in a virSocketAddr with the proper netmask for this
 * definition, based on either the definition's netmask, or its
 * prefix. Return -1 on error (and set the netmask family to AF_UNSPEC)
 */
859
int virNetworkIPDefNetmask(const virNetworkIPDef *def,
860
                           virSocketAddrPtr netmask)
L
Laine Stump 已提交
861
{
862
    if (VIR_SOCKET_ADDR_IS_FAMILY(&def->netmask, AF_INET)) {
L
Laine Stump 已提交
863 864 865 866
        *netmask = def->netmask;
        return 0;
    }

867
    return virSocketAddrPrefixToNetmask(virNetworkIPDefPrefix(def), netmask,
868
                                        VIR_SOCKET_ADDR_FAMILY(&def->address));
L
Laine Stump 已提交
869 870
}

871 872

static int
873
virSocketAddrRangeParseXML(const char *networkName,
874
                           virNetworkIPDefPtr ipdef,
875 876
                           xmlNodePtr node,
                           virSocketAddrRangePtr range)
877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901
{


    char *start = NULL, *end = NULL;
    int ret = -1;

    if (!(start = virXMLPropString(node, "start"))) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing 'start' attribute in dhcp range for network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&range->start, start, AF_UNSPEC) < 0)
        goto cleanup;

    if (!(end = virXMLPropString(node, "end"))) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing 'end' attribute in dhcp range for network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&range->end, end, AF_UNSPEC) < 0)
        goto cleanup;

    /* do a sanity check of the range */
902
    if (virSocketAddrGetRange(&range->start, &range->end, &ipdef->address,
903
                              virNetworkIPDefPrefix(ipdef)) < 0)
904 905 906 907
        goto cleanup;

    ret = 0;

908
 cleanup:
909 910 911 912 913 914
    VIR_FREE(start);
    VIR_FREE(end);
    return ret;
}

static int
915
virNetworkDHCPHostDefParseXML(const char *networkName,
916
                              virNetworkIPDefPtr def,
917 918 919
                              xmlNodePtr node,
                              virNetworkDHCPHostDefPtr host,
                              bool partialOkay)
920
{
921
    char *mac = NULL, *name = NULL, *ip = NULL, *id = NULL;
922 923 924 925 926 927
    virMacAddr addr;
    virSocketAddr inaddr;
    int ret = -1;

    mac = virXMLPropString(node, "mac");
    if (mac != NULL) {
G
Gene Czarcinski 已提交
928 929 930 931 932 933 934
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid to specify MAC address '%s' "
                             "in network '%s' IPv6 static host definition"),
                           mac, networkName);
            goto cleanup;
        }
935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
        if (virMacAddrParse(mac, &addr) < 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Cannot parse MAC address '%s' in network '%s'"),
                           mac, networkName);
            goto cleanup;
        }
        if (virMacAddrIsMulticast(&addr)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("expected unicast mac address, found "
                             "multicast '%s' in network '%s'"),
                           (const char *)mac, networkName);
            goto cleanup;
        }
    }

950 951 952 953 954 955 956
    id = virXMLPropString(node, "id");
    if (id) {
        char *cp = id + strspn(id, "0123456789abcdefABCDEF:");
        if (*cp) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid character '%c' in id '%s' of network '%s'"),
                           *cp, id, networkName);
L
Luyao Huang 已提交
957
            goto cleanup;
958 959 960
        }
    }

961 962 963
    name = virXMLPropString(node, "name");
    if (name && (!c_isalpha(name[0]))) {
        virReportError(VIR_ERR_XML_ERROR,
964
                       _("Cannot use host name '%s' in network '%s'"),
965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985
                       name, networkName);
        goto cleanup;
    }

    ip = virXMLPropString(node, "ip");
    if (ip && (virSocketAddrParse(&inaddr, ip, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid IP address in static host definition "
                         "for network '%s'"),
                       networkName);
        goto cleanup;
    }

    if (partialOkay) {
        /* for search/match, you just need one of the three */
        if (!(mac || name || ip)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("At least one of name, mac, or ip attribute "
                             "must be specified for static host definition "
                             "in network '%s' "),
                           networkName);
986
            goto cleanup;
987 988
        }
    } else {
G
Gene Czarcinski 已提交
989 990 991 992
        /* normal usage - you need at least name (IPv6) or one of MAC
         * address or name (IPv4)
         */
        if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
993
            if (!(id || name)) {
G
Gene Czarcinski 已提交
994 995
                virReportError(VIR_ERR_XML_ERROR,
                           _("Static host definition in IPv6 network '%s' "
996
                             "must have id or name attribute"),
G
Gene Czarcinski 已提交
997 998 999 1000
                           networkName);
                goto cleanup;
            }
        } else if (!(mac || name)) {
1001
            virReportError(VIR_ERR_XML_ERROR,
G
Gene Czarcinski 已提交
1002
                           _("Static host definition in IPv4 network '%s' "
1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017
                             "must have mac or name attribute"),
                           networkName);
            goto cleanup;
        }
        if (!ip) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Missing IP address in static host definition "
                             "for network '%s'"),
                           networkName);
            goto cleanup;
        }
    }

    host->mac = mac;
    mac = NULL;
1018 1019
    host->id = id;
    id = NULL;
1020 1021 1022 1023 1024 1025
    host->name = name;
    name = NULL;
    if (ip)
        host->ip = inaddr;
    ret = 0;

1026
 cleanup:
1027
    VIR_FREE(mac);
1028
    VIR_FREE(id);
1029 1030 1031 1032 1033 1034
    VIR_FREE(name);
    VIR_FREE(ip);
    return ret;
}

static int
1035 1036
virNetworkDHCPDefParseXML(const char *networkName,
                          xmlNodePtr node,
1037
                          virNetworkIPDefPtr def)
1038
{
1039
    int ret = -1;
1040
    xmlNodePtr cur;
1041 1042 1043 1044 1045
    virSocketAddrRange range;
    virNetworkDHCPHostDef host;

    memset(&range, 0, sizeof(range));
    memset(&host, 0, sizeof(host));
1046 1047 1048

    cur = node->children;
    while (cur != NULL) {
1049 1050
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "range")) {
1051

1052 1053 1054 1055
            if (virSocketAddrRangeParseXML(networkName, def, cur, &range) < 0)
                goto cleanup;
            if (VIR_APPEND_ELEMENT(def->ranges, def->nranges, range) < 0)
                goto cleanup;
1056

1057 1058 1059
        } else if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "host")) {

G
Gene Czarcinski 已提交
1060
            if (virNetworkDHCPHostDefParseXML(networkName, def, cur,
1061 1062 1063 1064
                                              &host, false) < 0)
                goto cleanup;
            if (VIR_APPEND_ELEMENT(def->hosts, def->nhosts, host) < 0)
                goto cleanup;
1065

G
Gene Czarcinski 已提交
1066 1067 1068
        } else if (VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET) &&
                   cur->type == XML_ELEMENT_NODE &&
                   xmlStrEqual(cur->name, BAD_CAST "bootp")) {
1069 1070
            char *file;
            char *server;
1071
            virSocketAddr inaddr;
1072
            memset(&inaddr, 0, sizeof(inaddr));
1073

1074
            if (!(file = virXMLPropString(cur, "file"))) {
1075 1076 1077
                cur = cur->next;
                continue;
            }
1078
            server = virXMLPropString(cur, "server");
1079

1080
            if (server &&
1081
                virSocketAddrParse(&inaddr, server, AF_UNSPEC) < 0) {
E
Eric Blake 已提交
1082 1083
                VIR_FREE(file);
                VIR_FREE(server);
1084
                goto cleanup;
E
Eric Blake 已提交
1085
            }
1086

1087
            def->bootfile = file;
1088
            def->bootserver = inaddr;
E
Eric Blake 已提交
1089
            VIR_FREE(server);
1090 1091 1092 1093 1094
        }

        cur = cur->next;
    }

1095 1096 1097 1098
    ret = 0;
 cleanup:
    virNetworkDHCPHostDefClear(&host);
    return ret;
1099 1100
}

1101
static int
1102 1103 1104 1105
virNetworkDNSHostDefParseXML(const char *networkName,
                             xmlNodePtr node,
                             virNetworkDNSHostDefPtr def,
                             bool partialOkay)
1106 1107 1108 1109
{
    xmlNodePtr cur;
    char *ip;

1110 1111 1112 1113
    if (!(ip = virXMLPropString(node, "ip")) && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing IP address in network '%s' DNS HOST record"),
                       networkName);
1114 1115 1116
        goto error;
    }

1117 1118 1119 1120 1121
    if (ip && (virSocketAddrParse(&def->ip, ip, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Invalid IP address in network '%s' DNS HOST record"),
                       networkName);
        VIR_FREE(ip);
1122 1123
        goto error;
    }
1124
    VIR_FREE(ip);
1125 1126 1127 1128 1129 1130

    cur = node->children;
    while (cur != NULL) {
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "hostname")) {
              if (cur->children != NULL) {
1131 1132 1133
                  char *name = (char *) xmlNodeGetContent(cur);

                  if (!name) {
1134 1135 1136
                      virReportError(VIR_ERR_XML_DETAIL,
                                     _("Missing hostname in network '%s' DNS HOST record"),
                                     networkName);
1137 1138 1139 1140 1141
                      goto error;
                  }
                  if (VIR_APPEND_ELEMENT(def->names, def->nnames, name) < 0) {
                      VIR_FREE(name);
                      goto error;
1142
                  }
1143 1144 1145 1146
              }
        }
        cur = cur->next;
    }
1147 1148 1149 1150 1151 1152
    if (def->nnames == 0 && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing hostname in network '%s' DNS HOST record"),
                       networkName);
        goto error;
    }
1153

1154 1155 1156 1157 1158 1159
    if (!VIR_SOCKET_ADDR_VALID(&def->ip) && def->nnames == 0) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing ip and hostname in network '%s' DNS HOST record"),
                       networkName);
        goto error;
    }
1160

1161
    return 0;
1162

1163
 error:
1164 1165
    virNetworkDNSHostDefClear(def);
    return -1;
1166 1167
}

1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182
/* This includes all characters used in the names of current
 * /etc/services and /etc/protocols files (on Fedora 20), except ".",
 * which we can't allow because it would conflict with the use of "."
 * as a field separator in the SRV record, there appears to be no way
 * to escape it in, and the protocols/services that use "." in the
 * name are obscure and unlikely to be used anyway.
 */
#define PROTOCOL_CHARS \
    "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" \
    "-+/"

#define SERVICE_CHARS \
    "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" \
    "_-+/*"

1183
static int
1184 1185 1186 1187 1188
virNetworkDNSSrvDefParseXML(const char *networkName,
                            xmlNodePtr node,
                            xmlXPathContextPtr ctxt,
                            virNetworkDNSSrvDefPtr def,
                            bool partialOkay)
1189
{
1190 1191 1192 1193 1194
    int ret;
    xmlNodePtr save_ctxt = ctxt->node;

    ctxt->node = node;

1195
    if (!(def->service = virXMLPropString(node, "service")) && !partialOkay) {
1196
        virReportError(VIR_ERR_XML_DETAIL,
1197 1198
                       _("missing required service attribute in DNS SRV record "
                         "of network '%s'"), networkName);
1199 1200
        goto error;
    }
1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215
    if (def->service) {
        if (strlen(def->service) > DNS_RECORD_LENGTH_SRV) {
            virReportError(VIR_ERR_XML_DETAIL,
                           _("service attribute '%s' in network '%s' is too long, "
                             "limit is %d bytes"),
                           def->service, networkName, DNS_RECORD_LENGTH_SRV);
            goto error;
        }
        if (strspn(def->service, SERVICE_CHARS) < strlen(def->service)) {
            virReportError(VIR_ERR_XML_DETAIL,
                           _("invalid character in service attribute '%s' "
                             "in DNS SRV record of network '%s'"),
                           def->service, networkName);
            goto error;
        }
1216 1217
    }

1218
    if (!(def->protocol = virXMLPropString(node, "protocol")) && !partialOkay) {
1219
        virReportError(VIR_ERR_XML_DETAIL,
1220 1221
                       _("missing required protocol attribute "
                         "in DNS SRV record '%s' of network '%s'"),
1222
                       def->service, networkName);
1223 1224
        goto error;
    }
1225 1226
    if (def->protocol &&
        strspn(def->protocol, PROTOCOL_CHARS) < strlen(def->protocol)) {
1227
        virReportError(VIR_ERR_XML_DETAIL,
1228 1229
                       _("invalid character in protocol attribute '%s' "
                         "in DNS SRV record of network '%s'"),
1230
                       def->protocol, networkName);
1231 1232 1233
        goto error;
    }

1234
    /* Following attributes are optional */
1235 1236
    def->domain = virXMLPropString(node, "domain");
    def->target = virXMLPropString(node, "target");
1237

1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252
    ret = virXPathUInt("string(./@port)", ctxt, &def->port);
    if (ret >= 0 && !def->target) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("DNS SRV port attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
    if (ret == -2 || (ret >= 0 && (def->port < 1 || def->port > 65535))) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("invalid DNS SRV port attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
1253

1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267
    ret = virXPathUInt("string(./@priority)", ctxt, &def->priority);
    if (ret >= 0 && !def->target) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("DNS SRV priority attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }
    if (ret == -2 || (ret >= 0 && def->priority > 65535)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Invalid DNS SRV priority attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
1268 1269
    }

1270 1271
    ret = virXPathUInt("string(./@weight)", ctxt, &def->weight);
    if (ret >= 0 && !def->target) {
1272
        virReportError(VIR_ERR_XML_DETAIL,
1273 1274 1275
                       _("DNS SRV weight attribute not permitted without "
                         "target for service '%s' in network '%s'"),
                       def->service, networkName);
1276 1277
        goto error;
    }
1278 1279 1280 1281 1282 1283 1284 1285 1286
    if (ret == -2 || (ret >= 0 && def->weight > 65535)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("invalid DNS SRV weight attribute "
                         "for service '%s' in network '%s'"),
                       def->service, networkName);
        goto error;
    }

    ctxt->node = save_ctxt;
1287
    return 0;
1288

1289
 error:
1290
    virNetworkDNSSrvDefClear(def);
1291
    ctxt->node = save_ctxt;
1292 1293 1294 1295 1296 1297 1298 1299 1300
    return -1;
}

static int
virNetworkDNSTxtDefParseXML(const char *networkName,
                            xmlNodePtr node,
                            virNetworkDNSTxtDefPtr def,
                            bool partialOkay)
{
1301 1302
    const char *bad = " ,";

1303 1304 1305 1306 1307 1308
    if (!(def->name = virXMLPropString(node, "name"))) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("missing required name attribute in DNS TXT record "
                         "of network %s"), networkName);
        goto error;
    }
1309
    if (strcspn(def->name, bad) != strlen(def->name)) {
1310
        virReportError(VIR_ERR_XML_DETAIL,
1311
                       _("prohibited character in DNS TXT record "
1312 1313 1314 1315 1316 1317 1318 1319 1320
                         "name '%s' of network %s"), def->name, networkName);
        goto error;
    }
    if (!(def->value = virXMLPropString(node, "value")) && !partialOkay) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("missing required value attribute in DNS TXT record "
                         "named '%s' of network %s"), def->name, networkName);
        goto error;
    }
1321

1322 1323 1324 1325 1326 1327 1328
    if (!(def->name || def->value)) {
        virReportError(VIR_ERR_XML_DETAIL,
                       _("Missing required name or value "
                         "in DNS TXT record of network %s"), networkName);
        goto error;
    }
    return 0;
1329

1330
 error:
1331 1332
    virNetworkDNSTxtDefClear(def);
    return -1;
1333 1334
}

1335
static int
1336
virNetworkDNSDefParseXML(const char *networkName,
1337
                         xmlNodePtr node,
1338 1339
                         xmlXPathContextPtr ctxt,
                         virNetworkDNSDefPtr def)
1340
{
1341 1342 1343
    xmlNodePtr *hostNodes = NULL;
    xmlNodePtr *srvNodes = NULL;
    xmlNodePtr *txtNodes = NULL;
1344
    xmlNodePtr *fwdNodes = NULL;
1345
    char *forwardPlainNames = NULL;
1346
    char *enable = NULL;
1347
    int nhosts, nsrvs, ntxts, nfwds;
1348 1349
    size_t i;
    int ret = -1;
1350
    xmlNodePtr save = ctxt->node;
1351

1352 1353
    ctxt->node = node;

1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365
    enable = virXPathString("string(./@enable)", ctxt);
    if (enable) {
        def->enable = virTristateBoolTypeFromString(enable);
        if (def->enable <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid dns enable setting '%s' "
                             "in network '%s'"),
                           enable, networkName);
            goto cleanup;
        }
    }

1366 1367
    forwardPlainNames = virXPathString("string(./@forwardPlainNames)", ctxt);
    if (forwardPlainNames) {
J
Ján Tomko 已提交
1368
        def->forwardPlainNames = virTristateBoolTypeFromString(forwardPlainNames);
1369
        if (def->forwardPlainNames <= 0) {
1370 1371 1372 1373 1374 1375 1376 1377
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid dns forwardPlainNames setting '%s' "
                             "in network '%s'"),
                           forwardPlainNames, networkName);
            goto cleanup;
        }
    }

1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389
    nfwds = virXPathNodeSet("./forwarder", ctxt, &fwdNodes);
    if (nfwds < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <forwarder> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (nfwds > 0) {
        if (VIR_ALLOC_N(def->forwarders, nfwds) < 0)
            goto cleanup;

        for (i = 0; i < nfwds; i++) {
1390 1391 1392 1393
            char *addr = virXMLPropString(fwdNodes[i], "addr");

            if (addr && virSocketAddrParse(&def->forwarders[i].addr,
                                           addr, AF_UNSPEC) < 0) {
1394
                virReportError(VIR_ERR_XML_ERROR,
1395 1396 1397 1398
                               _("Invalid forwarder IP address '%s' "
                                 "in network '%s'"),
                               addr, networkName);
                VIR_FREE(addr);
1399 1400
                goto cleanup;
            }
1401 1402 1403 1404 1405 1406 1407 1408
            def->forwarders[i].domain = virXMLPropString(fwdNodes[i], "domain");
            if (!(addr || def->forwarders[i].domain)) {
                virReportError(VIR_ERR_XML_ERROR, "%s",
                               _("Invalid forwarder element, must contain "
                                 "at least one of addr or domain"));
                goto cleanup;
            }
            VIR_FREE(addr);
1409 1410 1411 1412
            def->nfwds++;
        }
    }

1413 1414 1415 1416 1417 1418
    nhosts = virXPathNodeSet("./host", ctxt, &hostNodes);
    if (nhosts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <host> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
1419
    }
1420
    if (nhosts > 0) {
1421
        if (VIR_ALLOC_N(def->hosts, nhosts) < 0)
1422
            goto cleanup;
1423

1424 1425
        for (i = 0; i < nhosts; i++) {
            if (virNetworkDNSHostDefParseXML(networkName, hostNodes[i],
1426 1427
                                             &def->hosts[def->nhosts], false) < 0) {
                goto cleanup;
1428
            }
1429 1430 1431
            def->nhosts++;
        }
    }
1432

1433 1434 1435 1436 1437 1438 1439 1440
    nsrvs = virXPathNodeSet("./srv", ctxt, &srvNodes);
    if (nsrvs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <srv> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (nsrvs > 0) {
1441
        if (VIR_ALLOC_N(def->srvs, nsrvs) < 0)
1442
            goto cleanup;
1443

1444 1445
        for (i = 0; i < nsrvs; i++) {
            if (virNetworkDNSSrvDefParseXML(networkName, srvNodes[i], ctxt,
1446 1447
                                            &def->srvs[def->nsrvs], false) < 0) {
                goto cleanup;
1448
            }
1449 1450 1451
            def->nsrvs++;
        }
    }
1452

1453 1454 1455 1456 1457 1458 1459 1460
    ntxts = virXPathNodeSet("./txt", ctxt, &txtNodes);
    if (ntxts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <txt> element found in <dns> of network %s"),
                       networkName);
        goto cleanup;
    }
    if (ntxts > 0) {
1461
        if (VIR_ALLOC_N(def->txts, ntxts) < 0)
1462
            goto cleanup;
1463

1464 1465
        for (i = 0; i < ntxts; i++) {
            if (virNetworkDNSTxtDefParseXML(networkName, txtNodes[i],
1466 1467 1468 1469 1470
                                            &def->txts[def->ntxts], false) < 0) {
                goto cleanup;
            }
            def->ntxts++;
        }
1471 1472
    }

1473 1474 1475 1476 1477 1478 1479 1480
    if (def->enable == VIR_TRISTATE_BOOL_NO &&
        (nfwds || nhosts || nsrvs || ntxts)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Extra data in disabled network '%s'"),
                       networkName);
        goto cleanup;
    }

1481
    ret = 0;
1482
 cleanup:
1483
    VIR_FREE(enable);
1484
    VIR_FREE(forwardPlainNames);
1485
    VIR_FREE(fwdNodes);
1486 1487 1488 1489
    VIR_FREE(hostNodes);
    VIR_FREE(srvNodes);
    VIR_FREE(txtNodes);
    ctxt->node = save;
1490 1491 1492
    return ret;
}

1493
static int
1494 1495 1496
virNetworkIPDefParseXML(const char *networkName,
                        xmlNodePtr node,
                        xmlXPathContextPtr ctxt,
1497
                        virNetworkIPDefPtr def)
1498 1499
{
    /*
1500
     * virNetworkIPDef object is already allocated as part of an array.
1501 1502 1503 1504 1505
     * On failure clear it out, but don't free it.
     */

    xmlNodePtr cur, save;
    char *address = NULL, *netmask = NULL;
G
Gene Czarcinski 已提交
1506 1507
    unsigned long prefix = 0;
    int prefixRc;
1508 1509 1510 1511 1512 1513 1514
    int result = -1;

    save = ctxt->node;
    ctxt->node = node;

    /* grab raw data from XML */
    def->family = virXPathString("string(./@family)", ctxt);
G
Gene Czarcinski 已提交
1515

1516
    address = virXPathString("string(./@address)", ctxt);
G
Gene Czarcinski 已提交
1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528
    if (!address) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Missing required address attribute in network '%s'"),
                       networkName);
        goto cleanup;
    }
    if (virSocketAddrParse(&def->address, address, AF_UNSPEC) < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid address '%s' in network '%s'"),
                       address, networkName);
        goto cleanup;
    }
1529 1530

    netmask = virXPathString("string(./@netmask)", ctxt);
G
Gene Czarcinski 已提交
1531 1532 1533 1534 1535 1536 1537
    if (netmask &&
        (virSocketAddrParse(&def->netmask, netmask, AF_UNSPEC) < 0)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid netmask '%s' in network '%s'"),
                       netmask, networkName);
        goto cleanup;
    }
1538

G
Gene Czarcinski 已提交
1539 1540 1541 1542 1543 1544
    prefixRc = virXPathULong("string(./@prefix)", ctxt, &prefix);
    if (prefixRc == -2) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Invalid ULong value specified for prefix in definition of network '%s'"),
                       networkName);
        goto cleanup;
1545
    }
G
Gene Czarcinski 已提交
1546 1547 1548 1549
    if (prefixRc < 0)
        def->prefix = 0;
    else
        def->prefix = prefix;
1550

G
Gene Czarcinski 已提交
1551 1552
    /* validate address, etc. for each family */
    if ((def->family == NULL) || (STREQ(def->family, "ipv4"))) {
1553 1554
        if (!(VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET) ||
              VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_UNSPEC))) {
1555
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1556 1557
                           _("%s family specified for non-IPv4 address '%s' in network '%s'"),
                           def->family == NULL? "no" : "ipv4", address, networkName);
1558
            goto cleanup;
1559
        }
G
Gene Czarcinski 已提交
1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574
        if (netmask) {
            if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->netmask, AF_INET)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Invalid netmask '%s' for address '%s' "
                                 "in network '%s' (both must be IPv4)"),
                               netmask, address, networkName);
                goto cleanup;
            }
            if (def->prefix > 0) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Network '%s' IP address cannot have "
                                 "both a prefix and a netmask"), networkName);
                goto cleanup;
            }
        } else if (def->prefix > 32) {
1575
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1576 1577
                           _("Invalid IPv4 prefix '%lu' in network '%s'"),
                           prefix, networkName);
1578
            goto cleanup;
1579 1580
        }
    } else if (STREQ(def->family, "ipv6")) {
1581
        if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET6)) {
1582
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1583
                           _("Family 'ipv6' specified for non-IPv6 address '%s' in network '%s'"),
1584
                           address, networkName);
1585
            goto cleanup;
1586
        }
G
Gene Czarcinski 已提交
1587
        if (netmask) {
1588
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1589
                           _("netmask not allowed for IPv6 address '%s' in network '%s'"),
1590
                           address, networkName);
1591
            goto cleanup;
1592
        }
G
Gene Czarcinski 已提交
1593
        if (def->prefix > 128) {
1594
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
G
Gene Czarcinski 已提交
1595 1596
                           _("Invalid IPv6 prefix '%lu' in network '%s'"),
                           prefix, networkName);
1597
            goto cleanup;
1598
        }
G
Gene Czarcinski 已提交
1599 1600 1601 1602 1603
    } else {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Unrecognized family '%s' in network '%s'"),
                       def->family, networkName);
        goto cleanup;
1604 1605
    }

G
Gene Czarcinski 已提交
1606 1607 1608 1609 1610 1611 1612 1613 1614
    cur = node->children;
    while (cur != NULL) {
        if (cur->type == XML_ELEMENT_NODE &&
            xmlStrEqual(cur->name, BAD_CAST "dhcp")) {
            if (virNetworkDHCPDefParseXML(networkName, cur, def) < 0)
                goto cleanup;
        } else if (cur->type == XML_ELEMENT_NODE &&
                   xmlStrEqual(cur->name, BAD_CAST "tftp")) {
            char *root;
1615

G
Gene Czarcinski 已提交
1616 1617 1618 1619 1620
            if (!VIR_SOCKET_ADDR_IS_FAMILY(&def->address, AF_INET)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("Unsupported <tftp> element in an IPv6 element in network '%s'"),
                               networkName);
                goto cleanup;
1621
            }
G
Gene Czarcinski 已提交
1622 1623 1624 1625 1626
            if (!(root = virXMLPropString(cur, "root"))) {
                cur = cur->next;
                continue;
            }
            def->tftproot = (char *)root;
1627
        }
G
Gene Czarcinski 已提交
1628
        cur = cur->next;
1629
    }
1630

1631 1632
    result = 0;

1633
 cleanup:
1634
    if (result < 0)
1635
        virNetworkIPDefClear(def);
1636 1637 1638 1639 1640
    VIR_FREE(address);
    VIR_FREE(netmask);

    ctxt->node = save;
    return result;
1641 1642
}

1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654
static int
virNetworkPortGroupParseXML(virPortGroupDefPtr def,
                            xmlNodePtr node,
                            xmlXPathContextPtr ctxt)
{
    /*
     * virPortGroupDef object is already allocated as part of an array.
     * On failure clear it out, but don't free it.
     */

    xmlNodePtr save;
    xmlNodePtr virtPortNode;
1655
    xmlNodePtr vlanNode;
1656
    xmlNodePtr bandwidth_node;
1657
    char *isDefault = NULL;
1658
    char *trustGuestRxFilters = NULL;
1659 1660 1661 1662 1663 1664 1665 1666

    int result = -1;

    save = ctxt->node;
    ctxt->node = node;

    /* grab raw data from XML */
    def->name = virXPathString("string(./@name)", ctxt);
1667 1668 1669
    if (!def->name) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("Missing required name attribute in portgroup"));
1670
        goto cleanup;
1671 1672
    }

1673 1674 1675
    isDefault = virXPathString("string(./@default)", ctxt);
    def->isDefault = isDefault && STRCASEEQ(isDefault, "yes");

1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687
    trustGuestRxFilters
        = virXPathString("string(./@trustGuestRxFilters)", ctxt);
    if (trustGuestRxFilters) {
        if ((def->trustGuestRxFilters
             = virTristateBoolTypeFromString(trustGuestRxFilters)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid trustGuestRxFilters setting '%s' "
                             "in portgroup"), trustGuestRxFilters);
            goto cleanup;
        }
    }

1688 1689
    virtPortNode = virXPathNode("./virtualport", ctxt);
    if (virtPortNode &&
1690
        (!(def->virtPortProfile = virNetDevVPortProfileParse(virtPortNode, 0)))) {
1691
        goto cleanup;
1692
    }
1693

1694 1695
    bandwidth_node = virXPathNode("./bandwidth", ctxt);
    if (bandwidth_node &&
1696
        virNetDevBandwidthParse(&def->bandwidth, bandwidth_node, -1) < 0)
1697
        goto cleanup;
1698

1699 1700
    vlanNode = virXPathNode("./vlan", ctxt);
    if (vlanNode && virNetDevVlanParse(vlanNode, ctxt, &def->vlan) < 0)
1701
        goto cleanup;
1702

1703
    result = 0;
1704
 cleanup:
1705
    if (result < 0)
1706 1707
        virPortGroupDefClear(def);
    VIR_FREE(isDefault);
1708
    VIR_FREE(trustGuestRxFilters);
1709 1710 1711 1712 1713

    ctxt->node = save;
    return result;
}

1714 1715 1716 1717 1718 1719 1720 1721
static int
virNetworkForwardNatDefParseXML(const char *networkName,
                                xmlNodePtr node,
                                xmlXPathContextPtr ctxt,
                                virNetworkForwardDefPtr def)
{
    int ret = -1;
    xmlNodePtr *natAddrNodes = NULL;
1722 1723
    xmlNodePtr *natPortNodes = NULL;
    int nNatAddrs, nNatPorts;
1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765
    char *addrStart = NULL;
    char *addrEnd = NULL;
    xmlNodePtr save = ctxt->node;

    ctxt->node = node;

    if (def->type != VIR_NETWORK_FORWARD_NAT) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("The <nat> element can only be used when <forward> 'mode' is 'nat' in network %s"),
                       networkName);
        goto cleanup;
    }

    /* addresses for SNAT */
    nNatAddrs = virXPathNodeSet("./address", ctxt, &natAddrNodes);
    if (nNatAddrs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <address> element found in <forward> of "
                         "network %s"), networkName);
        goto cleanup;
    } else if (nNatAddrs > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <address> element is allowed in <nat> in "
                         "<forward> in network %s"), networkName);
        goto cleanup;
    } else if (nNatAddrs == 1) {
        addrStart = virXMLPropString(*natAddrNodes, "start");
        if (addrStart == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("missing 'start' attribute in <address> element in <nat> in "
                             "<forward> in network %s"), networkName);
            goto cleanup;
        }
        addrEnd = virXMLPropString(*natAddrNodes, "end");
        if (addrEnd == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("missing 'end' attribute in <address> element in <nat> in "
                             "<forward> in network %s"), networkName);
            goto cleanup;
        }
    }

1766
    if (addrStart && virSocketAddrParse(&def->addr.start, addrStart, AF_INET) < 0) {
1767 1768 1769 1770 1771 1772
        virReportError(VIR_ERR_XML_ERROR,
                       _("Bad ipv4 start address '%s' in <nat> in <forward> in "
                         "network '%s'"), addrStart, networkName);
        goto cleanup;
    }

1773
    if (addrEnd && virSocketAddrParse(&def->addr.end, addrEnd, AF_INET) < 0) {
1774 1775 1776 1777 1778 1779
        virReportError(VIR_ERR_XML_ERROR,
                       _("Bad ipv4 end address '%s' in <nat> in <forward> in "
                         "network '%s'"), addrEnd, networkName);
        goto cleanup;
    }

1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799
    if (addrStart && addrEnd) {
        /* verify that start <= end */
        if (virSocketAddrGetRange(&def->addr.start, &def->addr.end, NULL, 0) < 0)
            goto cleanup;
    } else {
        if (addrStart) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Only start address '%s' specified in <nat> in "
                             "<forward> in network '%s'"),
                           addrStart, networkName);
            goto cleanup;
        }
        if (addrEnd) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Only end address '%s' specified in <nat> in "
                             "<forward> in network '%s'"),
                           addrEnd, networkName);
            goto cleanup;
        }
    }
1800

1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813
    /* ports for SNAT and MASQUERADE */
    nNatPorts = virXPathNodeSet("./port", ctxt, &natPortNodes);
    if (nNatPorts < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <port> element found in <forward> of "
                         "network %s"), networkName);
        goto cleanup;
    } else if (nNatPorts > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <port> element is allowed in <nat> in "
                         "<forward> in network %s"), networkName);
        goto cleanup;
    } else if (nNatPorts == 1) {
1814 1815
        if (virXPathUInt("string(./port[1]/@start)", ctxt, &def->port.start) < 0
            || def->port.start > 65535) {
1816 1817 1818 1819 1820 1821 1822

            virReportError(VIR_ERR_XML_DETAIL,
                           _("Missing or invalid 'start' attribute in <port> "
                             "in <nat> in <forward> in network %s"),
                             networkName);
            goto cleanup;
        }
1823 1824
        if (virXPathUInt("string(./port[1]/@end)", ctxt, &def->port.end) < 0
            || def->port.end > 65535 || def->port.end < def->port.start) {
1825 1826 1827 1828 1829 1830
            virReportError(VIR_ERR_XML_DETAIL,
                           _("Missing or invalid 'end' attribute in <port> in "
                             "<nat> in <forward> in network %s"), networkName);
            goto cleanup;
        }
    }
1831 1832
    ret = 0;

1833
 cleanup:
1834 1835 1836
    VIR_FREE(addrStart);
    VIR_FREE(addrEnd);
    VIR_FREE(natAddrNodes);
1837
    VIR_FREE(natPortNodes);
1838 1839 1840 1841
    ctxt->node = save;
    return ret;
}

1842 1843 1844 1845 1846 1847
static int
virNetworkForwardDefParseXML(const char *networkName,
                             xmlNodePtr node,
                             xmlXPathContextPtr ctxt,
                             virNetworkForwardDefPtr def)
{
1848
    size_t i, j;
1849
    int ret = -1;
1850 1851 1852
    xmlNodePtr *forwardIfNodes = NULL;
    xmlNodePtr *forwardPfNodes = NULL;
    xmlNodePtr *forwardAddrNodes = NULL;
1853 1854
    xmlNodePtr *forwardNatNodes = NULL;
    int nForwardIfs, nForwardAddrs, nForwardPfs, nForwardNats;
1855 1856
    char *forwardDev = NULL;
    char *forwardManaged = NULL;
1857
    char *forwardDriverName = NULL;
1858 1859 1860 1861 1862 1863 1864 1865 1866
    char *type = NULL;
    xmlNodePtr save = ctxt->node;

    ctxt->node = node;

    if (!(type = virXPathString("string(./@mode)", ctxt))) {
        def->type = VIR_NETWORK_FORWARD_NAT;
    } else {
        if ((def->type = virNetworkForwardTypeFromString(type)) < 0) {
1867
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879
                           _("unknown forwarding type '%s'"), type);
            goto cleanup;
        }
        VIR_FREE(type);
    }

    forwardManaged = virXPathString("string(./@managed)", ctxt);
    if (forwardManaged != NULL &&
        STRCASEEQ(forwardManaged, "yes")) {
        def->managed = true;
    }

1880 1881 1882 1883 1884 1885
    forwardDriverName = virXPathString("string(./driver/@name)", ctxt);
    if (forwardDriverName) {
        int driverName
            = virNetworkForwardDriverNameTypeFromString(forwardDriverName);

        if (driverName <= 0) {
1886
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
1887 1888 1889 1890 1891 1892 1893 1894
                           _("Unknown forward <driver name='%s'/> "
                             "in network %s"),
                           forwardDriverName, networkName);
            goto cleanup;
        }
        def->driverName = driverName;
    }

1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919
    /* bridge and hostdev modes can use a pool of physical interfaces */
    nForwardIfs = virXPathNodeSet("./interface", ctxt, &forwardIfNodes);
    if (nForwardIfs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <interface> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

    nForwardAddrs = virXPathNodeSet("./address", ctxt, &forwardAddrNodes);
    if (nForwardAddrs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <address> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

    nForwardPfs = virXPathNodeSet("./pf", ctxt, &forwardPfNodes);
    if (nForwardPfs < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <pf> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    }

1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937
    nForwardNats = virXPathNodeSet("./nat", ctxt, &forwardNatNodes);
    if (nForwardNats < 0) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("invalid <nat> element found in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardNats > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <nat> element is allowed in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardNats == 1) {
        if (virNetworkForwardNatDefParseXML(networkName,
                                            *forwardNatNodes,
                                            ctxt, def) < 0)
            goto cleanup;
    }

1938 1939 1940 1941 1942 1943 1944 1945 1946 1947
    forwardDev = virXPathString("string(./@dev)", ctxt);
    if (forwardDev && (nForwardAddrs > 0 || nForwardPfs > 0)) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("the <forward> 'dev' attribute cannot be used when "
                         "<address> or <pf> sub-elements are present "
                         "in network %s"));
        goto cleanup;
    }

    if (nForwardIfs > 0 || forwardDev) {
1948
        if (VIR_ALLOC_N(def->ifs, MAX(nForwardIfs, 1)) < 0)
1949 1950 1951 1952 1953 1954 1955 1956 1957 1958
            goto cleanup;

        if (forwardDev) {
            def->ifs[0].device.dev = forwardDev;
            def->ifs[0].type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
            forwardDev = NULL;
            def->nifs++;
        }

        /* parse each <interface> */
1959 1960
        for (i = 0; i < nForwardIfs; i++) {
            forwardDev = virXMLPropString(forwardIfNodes[i], "dev");
1961 1962 1963 1964 1965 1966 1967 1968
            if (!forwardDev) {
                virReportError(VIR_ERR_XML_ERROR,
                               _("Missing required dev attribute in "
                                 "<forward> <interface> element of network %s"),
                               networkName);
                goto cleanup;
            }

1969
            if ((i == 0) && (def->nifs == 1)) {
1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984
                /* both <forward dev='x'> and <interface dev='x'/> are
                 * present.  If they don't match, it's an error.
                 */
                if (STRNEQ(forwardDev, def->ifs[0].device.dev)) {
                    virReportError(VIR_ERR_XML_ERROR,
                                   _("<forward dev='%s'> must match first "
                                     "<interface dev='%s'/> in network %s"),
                                   def->ifs[0].device.dev,
                                   forwardDev, networkName);
                    goto cleanup;
                }
                VIR_FREE(forwardDev);
                continue;
            }

1985 1986 1987 1988 1989 1990 1991 1992 1993 1994
            for (j = 0; j < i; j++) {
                if (STREQ_NULLABLE(def->ifs[j].device.dev, forwardDev)) {
                    virReportError(VIR_ERR_XML_ERROR,
                                   _("interface '%s' can only be "
                                     "listed once in network %s"),
                                   forwardDev, networkName);
                    goto cleanup;
                }
            }

1995
            def->ifs[i].device.dev = forwardDev;
1996
            forwardDev = NULL;
1997
            def->ifs[i].type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
1998 1999 2000 2001
            def->nifs++;
        }

    } else if (nForwardAddrs > 0) {
2002
        if (VIR_ALLOC_N(def->ifs, nForwardAddrs) < 0)
2003 2004
            goto cleanup;

2005 2006
        for (i = 0; i < nForwardAddrs; i++) {
            if (!(type = virXMLPropString(forwardAddrNodes[i], "type"))) {
2007 2008 2009 2010 2011 2012
                virReportError(VIR_ERR_XML_ERROR,
                               _("missing address type in network %s"),
                               networkName);
                goto cleanup;
            }

2013
            if ((def->ifs[i].type = virNetworkForwardHostdevDeviceTypeFromString(type)) < 0) {
2014
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
2015 2016 2017 2018 2019
                               _("unknown address type '%s' in network %s"),
                               type, networkName);
                goto cleanup;
            }

2020
            switch (def->ifs[i].type) {
2021
            case VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI:
2022
            {
2023
                virPCIDeviceAddressPtr addr = &def->ifs[i].device.pci;
2024

2025
                if (virPCIDeviceAddressParseXML(forwardAddrNodes[i], addr) < 0)
2026
                    goto cleanup;
2027 2028

                for (j = 0; j < i; j++) {
2029
                    if (virPCIDeviceAddressEqual(addr, &def->ifs[j].device.pci)) {
2030 2031 2032 2033 2034 2035 2036 2037
                        virReportError(VIR_ERR_XML_ERROR,
                                       _("PCI device '%04x:%02x:%02x.%x' can "
                                         "only be listed once in network %s"),
                                       addr->domain, addr->bus,
                                       addr->slot, addr->function,
                                       networkName);
                        goto cleanup;
                    }
2038 2039
                }
                break;
2040
            }
2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058
            /* Add USB case here if we ever find a reason to support it */

            default:
                virReportError(VIR_ERR_XML_ERROR,
                               _("unsupported address type '%s' in network %s"),
                               type, networkName);
                goto cleanup;
            }
            VIR_FREE(type);
            def->nifs++;
        }

    } else if (nForwardPfs > 1) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("Only one <pf> element is allowed in <forward> of network %s"),
                       networkName);
        goto cleanup;
    } else if (nForwardPfs == 1) {
2059
        if (VIR_ALLOC_N(def->pfs, nForwardPfs) < 0)
2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076
            goto cleanup;

        forwardDev = virXMLPropString(*forwardPfNodes, "dev");
        if (!forwardDev) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Missing required dev attribute "
                             "in <pf> element of network '%s'"),
                           networkName);
            goto cleanup;
        }

        def->pfs->dev = forwardDev;
        forwardDev = NULL;
        def->npfs++;
    }

    ret = 0;
2077
 cleanup:
2078 2079 2080
    VIR_FREE(type);
    VIR_FREE(forwardDev);
    VIR_FREE(forwardManaged);
2081
    VIR_FREE(forwardDriverName);
2082 2083 2084
    VIR_FREE(forwardPfNodes);
    VIR_FREE(forwardIfNodes);
    VIR_FREE(forwardAddrNodes);
2085
    VIR_FREE(forwardNatNodes);
2086 2087 2088 2089
    ctxt->node = save;
    return ret;
}

2090
static virNetworkDefPtr
2091
virNetworkDefParseXML(xmlXPathContextPtr ctxt)
2092 2093
{
    virNetworkDefPtr def;
2094
    char *tmp = NULL;
2095
    char *stp = NULL;
2096
    xmlNodePtr *ipNodes = NULL;
2097
    xmlNodePtr *routeNodes = NULL;
2098
    xmlNodePtr *portGroupNodes = NULL;
2099
    int nips, nPortGroups, nRoutes;
2100
    xmlNodePtr dnsNode = NULL;
2101 2102
    xmlNodePtr virtPortNode = NULL;
    xmlNodePtr forwardNode = NULL;
2103
    char *ipv6nogwStr = NULL;
2104
    char *trustGuestRxFilters = NULL;
2105
    xmlNodePtr save = ctxt->node;
2106
    xmlNodePtr bandwidthNode = NULL;
2107
    xmlNodePtr vlanNode;
2108
    xmlNodePtr metadataNode = NULL;
2109

2110
    if (VIR_ALLOC(def) < 0)
2111 2112 2113
        return NULL;

    /* Extract network name */
2114
    def->name = virXPathString("string(./name[1])", ctxt);
2115
    if (!def->name) {
2116
        virReportError(VIR_ERR_NO_NAME, NULL);
2117 2118 2119
        goto error;
    }

2120
    if (virXMLCheckIllegalChars("name", def->name, "/") < 0)
2121 2122
        goto error;

2123
    /* Extract network uuid */
2124
    tmp = virXPathString("string(./uuid[1])", ctxt);
2125
    if (!tmp) {
2126
        if (virUUIDGenerate(def->uuid)) {
2127 2128
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("Failed to generate UUID"));
2129 2130 2131 2132
            goto error;
        }
    } else {
        if (virUUIDParse(tmp, def->uuid) < 0) {
2133 2134
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("malformed uuid element"));
2135 2136 2137
            goto error;
        }
        VIR_FREE(tmp);
M
Matthias Bolte 已提交
2138
        def->uuid_specified = true;
2139 2140
    }

2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156
    /* check if definitions with no IPv6 gateway addresses is to
     * allow guest-to-guest communications.
     */
    ipv6nogwStr = virXPathString("string(./@ipv6)", ctxt);
    if (ipv6nogwStr) {
        if (STREQ(ipv6nogwStr, "yes")) {
            def->ipv6nogw = true;
        } else if (STRNEQ(ipv6nogwStr, "no")) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid ipv6 setting '%s' in network '%s'"),
                           ipv6nogwStr, def->name);
            goto error;
        }
        VIR_FREE(ipv6nogwStr);
    }

2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170
    trustGuestRxFilters
        = virXPathString("string(./@trustGuestRxFilters)", ctxt);
    if (trustGuestRxFilters) {
        if ((def->trustGuestRxFilters
             = virTristateBoolTypeFromString(trustGuestRxFilters)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid trustGuestRxFilters setting '%s' "
                             "in network '%s'"),
                           trustGuestRxFilters, def->name);
            goto error;
        }
        VIR_FREE(trustGuestRxFilters);
    }

2171
    /* Parse network domain information */
2172
    def->domain = virXPathString("string(./domain[1]/@name)", ctxt);
2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184
    tmp = virXPathString("string(./domain[1]/@localOnly)", ctxt);
    if (tmp) {
        def->domainLocalOnly = virTristateBoolTypeFromString(tmp);
        if (def->domainLocalOnly <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid domain localOnly setting '%s' "
                             "in network '%s'"),
                           tmp, def->name);
            goto error;
        }
        VIR_FREE(tmp);
    }
2185

2186 2187
    if ((bandwidthNode = virXPathNode("./bandwidth", ctxt)) &&
        virNetDevBandwidthParse(&def->bandwidth, bandwidthNode, -1) < 0)
2188 2189
        goto error;

2190 2191 2192 2193
    vlanNode = virXPathNode("./vlan", ctxt);
    if (vlanNode && virNetDevVlanParse(vlanNode, ctxt, &def->vlan) < 0)
        goto error;

2194
    /* Parse bridge information */
2195
    def->bridge = virXPathString("string(./bridge[1]/@name)", ctxt);
2196
    stp = virXPathString("string(./bridge[1]/@stp)", ctxt);
2197
    def->stp = (stp && STREQ(stp, "off")) ? false : true;
2198

2199 2200 2201 2202 2203 2204 2205 2206 2207 2208
    tmp = virXPathString("string(./bridge[1]/@delay)", ctxt);
    if (tmp) {
        if (virStrToLong_ulp(tmp, NULL, 10, &def->delay) < 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid delay value in network '%s'"),
                           def->name);
            goto error;
        }
    }
    VIR_FREE(tmp);
2209

2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221
    tmp = virXPathString("string(./bridge[1]/@macTableManager)", ctxt);
    if (tmp) {
        if ((def->macTableManager
             = virNetworkBridgeMACTableManagerTypeFromString(tmp)) <= 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid macTableManager setting '%s' "
                             "in network '%s'"), tmp, def->name);
            goto error;
        }
        VIR_FREE(tmp);
    }

2222 2223
    tmp = virXPathString("string(./mac[1]/@address)", ctxt);
    if (tmp) {
2224
        if (virMacAddrParse(tmp, &def->mac) < 0) {
2225 2226 2227
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid bridge mac address '%s' in network '%s'"),
                           tmp, def->name);
2228 2229
            goto error;
        }
2230
        if (virMacAddrIsMulticast(&def->mac)) {
2231 2232 2233
            virReportError(VIR_ERR_XML_ERROR,
                           _("Invalid multicast bridge mac address '%s' in network '%s'"),
                           tmp, def->name);
2234 2235
            goto error;
        }
2236 2237 2238 2239
        VIR_FREE(tmp);
        def->mac_specified = true;
    }

2240
    dnsNode = virXPathNode("./dns", ctxt);
2241 2242 2243
    if (dnsNode != NULL &&
        virNetworkDNSDefParseXML(def->name, dnsNode, ctxt, &def->dns) < 0) {
        goto error;
2244 2245
    }

2246 2247
    virtPortNode = virXPathNode("./virtualport", ctxt);
    if (virtPortNode &&
2248 2249
        (!(def->virtPortProfile = virNetDevVPortProfileParse(virtPortNode,
                                                             VIR_VPORT_XML_REQUIRE_TYPE)))) {
2250
        goto error;
2251
    }
2252 2253 2254 2255 2256 2257

    nPortGroups = virXPathNodeSet("./portgroup", ctxt, &portGroupNodes);
    if (nPortGroups < 0)
        goto error;

    if (nPortGroups > 0) {
2258
        size_t i;
2259 2260

        /* allocate array to hold all the portgroups */
2261
        if (VIR_ALLOC_N(def->portGroups, nPortGroups) < 0)
2262 2263
            goto error;
        /* parse each portgroup */
2264
        for (i = 0; i < nPortGroups; i++) {
2265 2266 2267
            if (virNetworkPortGroupParseXML(&def->portGroups[i],
                                            portGroupNodes[i],
                                            ctxt) < 0)
2268 2269 2270 2271 2272 2273
                goto error;
            def->nPortGroups++;
        }
    }
    VIR_FREE(portGroupNodes);

2274 2275
    nips = virXPathNodeSet("./ip", ctxt, &ipNodes);
    if (nips < 0)
2276 2277
        goto error;

2278
    if (nips > 0) {
2279
        size_t i;
2280

2281
        /* allocate array to hold all the addrs */
2282
        if (VIR_ALLOC_N(def->ips, nips) < 0)
2283
            goto error;
2284
        /* parse each addr */
2285
        for (i = 0; i < nips; i++) {
2286 2287 2288 2289
            if (virNetworkIPDefParseXML(def->name,
                                        ipNodes[i],
                                        ctxt,
                                        &def->ips[i]) < 0)
2290 2291
                goto error;
            def->nips++;
2292
        }
2293
    }
E
Eric Blake 已提交
2294
    VIR_FREE(ipNodes);
2295

2296 2297 2298 2299 2300
    nRoutes = virXPathNodeSet("./route", ctxt, &routeNodes);
    if (nRoutes < 0)
        goto error;

    if (nRoutes > 0) {
2301
        size_t i;
2302 2303

        /* allocate array to hold all the route definitions */
2304
        if (VIR_ALLOC_N(def->routes, nRoutes) < 0)
2305 2306
            goto error;
        /* parse each definition */
2307
        for (i = 0; i < nRoutes; i++) {
2308
            virNetDevIPRoutePtr route = NULL;
2309

2310 2311 2312
            if (!(route = virNetDevIPRouteParseXML(def->name,
                                                   routeNodes[i],
                                                   ctxt)))
2313
                goto error;
2314
            def->routes[i] = route;
2315 2316 2317 2318 2319 2320 2321 2322 2323 2324
            def->nroutes++;
        }

        /* now validate the correctness of any static route gateways specified
         *
         * note: the parameters within each definition are verified/assumed valid;
         * the question being asked and answered here is if the specified gateway
         * is directly reachable from this bridge.
         */
        nRoutes = def->nroutes;
2325
        nips = def->nips;
2326 2327
        for (i = 0; i < nRoutes; i++) {
            size_t j;
2328 2329
            virSocketAddr testAddr, testGw;
            bool addrMatch;
2330 2331
            virNetDevIPRoutePtr gwdef = def->routes[i];
            virSocketAddrPtr gateway = virNetDevIPRouteGetGateway(gwdef);
2332
            addrMatch = false;
2333 2334
            for (j = 0; j < nips; j++) {
                virNetworkIPDefPtr def2 = &def->ips[j];
2335
                if (VIR_SOCKET_ADDR_FAMILY(gateway)
2336 2337 2338
                    != VIR_SOCKET_ADDR_FAMILY(&def2->address)) {
                    continue;
                }
2339
                int prefix = virNetworkIPDefPrefix(def2);
2340
                virSocketAddrMaskByPrefix(&def2->address, prefix, &testAddr);
2341
                virSocketAddrMaskByPrefix(gateway, prefix, &testGw);
2342 2343 2344 2345 2346 2347 2348 2349
                if (VIR_SOCKET_ADDR_VALID(&testAddr) &&
                    VIR_SOCKET_ADDR_VALID(&testGw) &&
                    virSocketAddrEqual(&testAddr, &testGw)) {
                    addrMatch = true;
                    break;
                }
            }
            if (!addrMatch) {
2350
                char *gw = virSocketAddrFormat(gateway);
2351 2352 2353 2354 2355 2356 2357 2358 2359 2360
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unreachable static route gateway '%s' specified for network '%s'"),
                               gw, def->name);
                VIR_FREE(gw);
                goto error;
            }
        }
    }
    VIR_FREE(routeNodes);

2361
    forwardNode = virXPathNode("./forward", ctxt);
2362 2363 2364 2365
    if (forwardNode &&
        virNetworkForwardDefParseXML(def->name, forwardNode, ctxt, &def->forward) < 0) {
        goto error;
    }
2366

2367 2368 2369 2370 2371 2372 2373 2374 2375
    /* Validate some items in the main NetworkDef that need to align
     * with the chosen forward mode.
     */
    switch (def->forward.type) {
    case VIR_NETWORK_FORWARD_NONE:
        break;

    case VIR_NETWORK_FORWARD_ROUTE:
    case VIR_NETWORK_FORWARD_NAT:
2376
    case VIR_NETWORK_FORWARD_OPEN:
2377 2378 2379 2380 2381 2382 2383 2384 2385
        /* It's pointless to specify L3 forwarding without specifying
         * the network we're on.
         */
        if (def->nips == 0) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("%s forwarding requested, "
                             "but no IP address provided for network '%s'"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2386
            goto error;
2387
        }
2388 2389 2390 2391 2392
        if (def->forward.nifs > 1) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("multiple forwarding interfaces specified "
                             "for network '%s', only one is supported"),
                           def->name);
2393 2394
            goto error;
        }
2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407

        if (def->forward.type == VIR_NETWORK_FORWARD_OPEN && def->forward.nifs) {
            /* an open network by definition can't place any restrictions
             * on what traffic is allowed or where it goes, so specifying
             * a forwarding device is nonsensical.
             */
            virReportError(VIR_ERR_XML_ERROR,
                           _("forward dev not allowed for "
                             "network '%s' with forward mode='%s'"),
                           def->name,
                           virNetworkForwardTypeToString(def->forward.type));
            goto error;
        }
2408
        break;
2409

2410 2411 2412 2413 2414 2415 2416 2417 2418
    case VIR_NETWORK_FORWARD_PRIVATE:
    case VIR_NETWORK_FORWARD_VEPA:
    case VIR_NETWORK_FORWARD_PASSTHROUGH:
    case VIR_NETWORK_FORWARD_HOSTDEV:
        if (def->bridge) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge name not allowed in %s mode (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2419 2420
            goto error;
        }
2421 2422 2423 2424 2425 2426 2427 2428
        if (def->macTableManager) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge macTableManager setting not allowed "
                             "in %s mode (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
            goto error;
        }
2429 2430 2431 2432 2433 2434 2435
        /* fall through to next case */
    case VIR_NETWORK_FORWARD_BRIDGE:
        if (def->delay || stp) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("bridge delay/stp options only allowed in route, nat, and isolated mode, not in %s (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
2436 2437
            goto error;
        }
2438 2439 2440 2441 2442 2443 2444 2445
        if (def->bridge && (def->forward.nifs || def->forward.npfs)) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("A network with forward mode='%s' can specify "
                             "a bridge name or a forward dev, but not "
                             "both (network '%s')"),
                           virNetworkForwardTypeToString(def->forward.type),
                           def->name);
            goto error;
2446
        }
2447
        break;
2448
    }
2449

2450
    VIR_FREE(stp);
2451 2452 2453 2454 2455 2456 2457

    /* Extract custom metadata */
    if ((metadataNode = virXPathNode("./metadata[1]", ctxt)) != NULL) {
        def->metadata = xmlCopyNode(metadataNode, 1);
        virXMLNodeSanitizeNamespaces(def->metadata);
    }

2458
    ctxt->node = save;
2459 2460
    return def;

2461
 error:
2462
    VIR_FREE(tmp);
2463
    VIR_FREE(routeNodes);
2464
    VIR_FREE(stp);
2465
    virNetworkDefFree(def);
E
Eric Blake 已提交
2466
    VIR_FREE(ipNodes);
2467
    VIR_FREE(portGroupNodes);
2468
    VIR_FREE(ipv6nogwStr);
2469
    VIR_FREE(trustGuestRxFilters);
2470
    ctxt->node = save;
2471 2472 2473
    return NULL;
}

J
Jiri Denemark 已提交
2474 2475 2476
static virNetworkDefPtr
virNetworkDefParse(const char *xmlStr,
                   const char *filename)
2477
{
J
Jiri Denemark 已提交
2478
    xmlDocPtr xml;
2479
    virNetworkDefPtr def = NULL;
2480
    int keepBlanksDefault = xmlKeepBlanksDefault(0);
2481

2482
    if ((xml = virXMLParse(filename, xmlStr, _("(network_definition)")))) {
J
Jiri Denemark 已提交
2483 2484
        def = virNetworkDefParseNode(xml, xmlDocGetRootElement(xml));
        xmlFreeDoc(xml);
2485 2486
    }

2487
    xmlKeepBlanksDefault(keepBlanksDefault);
2488 2489 2490
    return def;
}

J
Jiri Denemark 已提交
2491
virNetworkDefPtr virNetworkDefParseString(const char *xmlStr)
2492
{
J
Jiri Denemark 已提交
2493 2494
    return virNetworkDefParse(xmlStr, NULL);
}
2495

J
Jiri Denemark 已提交
2496 2497 2498
virNetworkDefPtr virNetworkDefParseFile(const char *filename)
{
    return virNetworkDefParse(NULL, filename);
2499 2500 2501
}


2502
virNetworkDefPtr virNetworkDefParseNode(xmlDocPtr xml,
2503 2504 2505 2506 2507 2508
                                        xmlNodePtr root)
{
    xmlXPathContextPtr ctxt = NULL;
    virNetworkDefPtr def = NULL;

    if (!xmlStrEqual(root->name, BAD_CAST "network")) {
2509 2510 2511 2512
        virReportError(VIR_ERR_XML_ERROR,
                       _("unexpected root element <%s>, "
                         "expecting <network>"),
                       root->name);
2513 2514 2515 2516 2517
        return NULL;
    }

    ctxt = xmlXPathNewContext(xml);
    if (ctxt == NULL) {
2518
        virReportOOMError();
2519 2520 2521 2522
        goto cleanup;
    }

    ctxt->node = root;
2523
    def = virNetworkDefParseXML(ctxt);
2524

2525
 cleanup:
2526 2527 2528 2529
    xmlXPathFreeContext(ctxt);
    return def;
}

2530

2531 2532
static int
virNetworkDNSDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2533
                       const virNetworkDNSDef *def)
2534
{
2535
    size_t i, j;
2536

2537
    if (!(def->enable || def->forwardPlainNames || def->nfwds || def->nhosts ||
2538
          def->nsrvs || def->ntxts))
2539
        return 0;
2540

2541
    virBufferAddLit(buf, "<dns");
2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552
    if (def->enable) {
        const char *fwd = virTristateBoolTypeToString(def->enable);

        if (!fwd) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown enable type %d in network"),
                           def->enable);
            return -1;
        }
        virBufferAsprintf(buf, " enable='%s'", fwd);
    }
2553
    if (def->forwardPlainNames) {
J
Ján Tomko 已提交
2554
        const char *fwd = virTristateBoolTypeToString(def->forwardPlainNames);
2555 2556 2557 2558 2559 2560 2561 2562

        if (!fwd) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown forwardPlainNames type %d in network"),
                           def->forwardPlainNames);
            return -1;
        }
        virBufferAsprintf(buf, " forwardPlainNames='%s'", fwd);
2563 2564 2565 2566
    }
    if (!(def->nfwds || def->nhosts || def->nsrvs || def->ntxts)) {
        virBufferAddLit(buf, "/>\n");
        return 0;
2567 2568 2569
    }

    virBufferAddLit(buf, ">\n");
2570
    virBufferAdjustIndent(buf, 2);
2571

2572
    for (i = 0; i < def->nfwds; i++) {
2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588

        virBufferAddLit(buf, "<forwarder");
        if (def->forwarders[i].domain) {
            virBufferEscapeString(buf, " domain='%s'",
                                  def->forwarders[i].domain);
        }
        if (VIR_SOCKET_ADDR_VALID(&def->forwarders[i].addr)) {
        char *addr = virSocketAddrFormat(&def->forwarders[i].addr);

        if (!addr)
            return -1;

        virBufferAsprintf(buf, " addr='%s'", addr);
        VIR_FREE(addr);
        }
        virBufferAddLit(buf, "/>\n");
2589 2590
    }

2591
    for (i = 0; i < def->ntxts; i++) {
2592 2593
        virBufferEscapeString(buf, "<txt name='%s' ", def->txts[i].name);
        virBufferEscapeString(buf, "value='%s'/>\n", def->txts[i].value);
2594 2595
    }

2596
    for (i = 0; i < def->nsrvs; i++) {
2597
        if (def->srvs[i].service && def->srvs[i].protocol) {
2598 2599 2600
            virBufferEscapeString(buf, "<srv service='%s' ",
                                  def->srvs[i].service);
            virBufferEscapeString(buf, "protocol='%s'", def->srvs[i].protocol);
2601 2602

            if (def->srvs[i].domain)
2603
                virBufferEscapeString(buf, " domain='%s'", def->srvs[i].domain);
2604
            if (def->srvs[i].target)
2605
                virBufferEscapeString(buf, " target='%s'", def->srvs[i].target);
2606 2607 2608 2609 2610 2611
            if (def->srvs[i].port)
                virBufferAsprintf(buf, " port='%d'", def->srvs[i].port);
            if (def->srvs[i].priority)
                virBufferAsprintf(buf, " priority='%d'", def->srvs[i].priority);
            if (def->srvs[i].weight)
                virBufferAsprintf(buf, " weight='%d'", def->srvs[i].weight);
2612

2613
            virBufferAddLit(buf, "/>\n");
2614 2615 2616
        }
    }

2617
    if (def->nhosts) {
2618 2619
        for (i = 0; i < def->nhosts; i++) {
            char *ip = virSocketAddrFormat(&def->hosts[i].ip);
2620

2621 2622
            virBufferAsprintf(buf, "<host ip='%s'>\n", ip);
            virBufferAdjustIndent(buf, 2);
2623
            for (j = 0; j < def->hosts[i].nnames; j++)
2624 2625
                virBufferEscapeString(buf, "<hostname>%s</hostname>\n",
                                      def->hosts[i].names[j]);
2626

2627
            virBufferAdjustIndent(buf, -2);
2628
            virBufferAddLit(buf, "</host>\n");
2629
            VIR_FREE(ip);
2630 2631
        }
    }
2632 2633
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</dns>\n");
2634
    return 0;
2635 2636
}

2637
static int
2638 2639
virNetworkIPDefFormat(virBufferPtr buf,
                      const virNetworkIPDef *def)
2640 2641 2642
{
    int result = -1;

2643
    virBufferAddLit(buf, "<ip");
2644

2645
    if (def->family)
2646
        virBufferAsprintf(buf, " family='%s'", def->family);
2647 2648
    if (VIR_SOCKET_ADDR_VALID(&def->address)) {
        char *addr = virSocketAddrFormat(&def->address);
2649 2650
        if (!addr)
            goto error;
2651
        virBufferAsprintf(buf, " address='%s'", addr);
2652 2653
        VIR_FREE(addr);
    }
2654 2655
    if (VIR_SOCKET_ADDR_VALID(&def->netmask)) {
        char *addr = virSocketAddrFormat(&def->netmask);
2656 2657
        if (!addr)
            goto error;
2658
        virBufferAsprintf(buf, " netmask='%s'", addr);
2659 2660
        VIR_FREE(addr);
    }
2661
    if (def->prefix > 0)
E
Eric Blake 已提交
2662
        virBufferAsprintf(buf, " prefix='%u'", def->prefix);
2663
    virBufferAddLit(buf, ">\n");
2664
    virBufferAdjustIndent(buf, 2);
2665 2666

    if (def->tftproot) {
2667
        virBufferEscapeString(buf, "<tftp root='%s'/>\n",
2668 2669 2670
                              def->tftproot);
    }
    if ((def->nranges || def->nhosts)) {
2671
        size_t i;
2672 2673 2674
        virBufferAddLit(buf, "<dhcp>\n");
        virBufferAdjustIndent(buf, 2);

2675 2676
        for (i = 0; i < def->nranges; i++) {
            char *saddr = virSocketAddrFormat(&def->ranges[i].start);
2677 2678
            if (!saddr)
                goto error;
2679
            char *eaddr = virSocketAddrFormat(&def->ranges[i].end);
2680 2681 2682 2683
            if (!eaddr) {
                VIR_FREE(saddr);
                goto error;
            }
2684
            virBufferAsprintf(buf, "<range start='%s' end='%s'/>\n",
2685 2686 2687 2688
                              saddr, eaddr);
            VIR_FREE(saddr);
            VIR_FREE(eaddr);
        }
2689
        for (i = 0; i < def->nhosts; i++) {
2690
            virBufferAddLit(buf, "<host");
2691
            if (def->hosts[i].mac)
2692
                virBufferAsprintf(buf, " mac='%s'", def->hosts[i].mac);
2693
            if (def->hosts[i].id)
2694
                virBufferAsprintf(buf, " id='%s'", def->hosts[i].id);
2695
            if (def->hosts[i].name)
2696
                virBufferAsprintf(buf, " name='%s'", def->hosts[i].name);
2697 2698
            if (VIR_SOCKET_ADDR_VALID(&def->hosts[i].ip)) {
                char *ipaddr = virSocketAddrFormat(&def->hosts[i].ip);
2699 2700
                if (!ipaddr)
                    goto error;
2701
                virBufferAsprintf(buf, " ip='%s'", ipaddr);
2702 2703 2704 2705 2706
                VIR_FREE(ipaddr);
            }
            virBufferAddLit(buf, "/>\n");
        }
        if (def->bootfile) {
2707
            virBufferEscapeString(buf, "<bootp file='%s'",
2708
                                  def->bootfile);
2709 2710
            if (VIR_SOCKET_ADDR_VALID(&def->bootserver)) {
                char *ipaddr = virSocketAddrFormat(&def->bootserver);
2711 2712
                if (!ipaddr)
                    goto error;
2713
                virBufferEscapeString(buf, " server='%s'", ipaddr);
2714 2715 2716
                VIR_FREE(ipaddr);
            }
            virBufferAddLit(buf, "/>\n");
2717

2718 2719
        }

2720 2721
        virBufferAdjustIndent(buf, -2);
        virBufferAddLit(buf, "</dhcp>\n");
2722 2723
    }

2724 2725
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</ip>\n");
2726 2727

    result = 0;
2728
 error:
2729 2730 2731
    return result;
}

2732
static int
2733
virPortGroupDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2734
                      const virPortGroupDef *def)
2735
{
2736
    virBufferAsprintf(buf, "<portgroup name='%s'", def->name);
2737
    if (def->isDefault)
2738
        virBufferAddLit(buf, " default='yes'");
2739 2740 2741
    if (def->trustGuestRxFilters)
        virBufferAsprintf(buf, " trustGuestRxFilters='%s'",
                          virTristateBoolTypeToString(def->trustGuestRxFilters));
2742
    virBufferAddLit(buf, ">\n");
2743
    virBufferAdjustIndent(buf, 2);
2744 2745
    if (virNetDevVlanFormat(&def->vlan, buf) < 0)
        return -1;
2746 2747
    if (virNetDevVPortProfileFormat(def->virtPortProfile, buf) < 0)
        return -1;
2748
    virNetDevBandwidthFormat(def->bandwidth, buf);
2749 2750
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</portgroup>\n");
2751
    return 0;
2752 2753
}

2754 2755
static int
virNetworkForwardNatDefFormat(virBufferPtr buf,
E
Eric Blake 已提交
2756
                              const virNetworkForwardDef *fwd)
2757 2758 2759 2760 2761
{
    char *addrStart = NULL;
    char *addrEnd = NULL;
    int ret = -1;

2762 2763
    if (VIR_SOCKET_ADDR_VALID(&fwd->addr.start)) {
        addrStart = virSocketAddrFormat(&fwd->addr.start);
2764 2765 2766 2767
        if (!addrStart)
            goto cleanup;
    }

2768 2769
    if (VIR_SOCKET_ADDR_VALID(&fwd->addr.end)) {
        addrEnd = virSocketAddrFormat(&fwd->addr.end);
2770 2771 2772 2773
        if (!addrEnd)
            goto cleanup;
    }

2774
    if (!addrEnd && !addrStart && !fwd->port.start && !fwd->port.end)
2775 2776 2777 2778 2779
        return 0;

    virBufferAddLit(buf, "<nat>\n");
    virBufferAdjustIndent(buf, 2);

2780 2781 2782 2783 2784 2785 2786
    if (addrStart) {
        virBufferAsprintf(buf, "<address start='%s'", addrStart);
        if (addrEnd)
            virBufferAsprintf(buf, " end='%s'", addrEnd);
        virBufferAddLit(buf, "/>\n");
    }

2787 2788 2789 2790
    if (fwd->port.start || fwd->port.end) {
        virBufferAsprintf(buf, "<port start='%d'", fwd->port.start);
        if (fwd->port.end)
            virBufferAsprintf(buf, " end='%d'", fwd->port.end);
2791 2792
        virBufferAddLit(buf, "/>\n");
    }
2793 2794 2795 2796 2797

    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</nat>\n");
    ret = 0;

2798
 cleanup:
2799 2800 2801 2802 2803
    VIR_FREE(addrStart);
    VIR_FREE(addrEnd);
    return ret;
}

2804 2805 2806 2807
int
virNetworkDefFormatBuf(virBufferPtr buf,
                       const virNetworkDef *def,
                       unsigned int flags)
2808
{
E
Eric Blake 已提交
2809
    const unsigned char *uuid;
2810
    char uuidstr[VIR_UUID_STRING_BUFLEN];
2811
    size_t i;
J
Ján Tomko 已提交
2812
    bool shortforward;
2813

2814
    virBufferAddLit(buf, "<network");
2815
    if (!(flags & VIR_NETWORK_XML_INACTIVE) && (def->connections > 0))
2816
        virBufferAsprintf(buf, " connections='%d'", def->connections);
2817
    if (def->ipv6nogw)
2818
        virBufferAddLit(buf, " ipv6='yes'");
2819 2820 2821
    if (def->trustGuestRxFilters)
        virBufferAsprintf(buf, " trustGuestRxFilters='%s'",
                          virTristateBoolTypeToString(def->trustGuestRxFilters));
2822 2823 2824
    virBufferAddLit(buf, ">\n");
    virBufferAdjustIndent(buf, 2);
    virBufferEscapeString(buf, "<name>%s</name>\n", def->name);
2825 2826 2827

    uuid = def->uuid;
    virUUIDFormat(uuid, uuidstr);
2828
    virBufferAsprintf(buf, "<uuid>%s</uuid>\n", uuidstr);
2829

2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851 2852
    if (def->metadata) {
        xmlBufferPtr xmlbuf;
        int oldIndentTreeOutput = xmlIndentTreeOutput;

        /* Indentation on output requires that we previously set
         * xmlKeepBlanksDefault to 0 when parsing; also, libxml does 2
         * spaces per level of indentation of intermediate elements,
         * but no leading indentation before the starting element.
         * Thankfully, libxml maps what looks like globals into
         * thread-local uses, so we are thread-safe.  */
        xmlIndentTreeOutput = 1;
        xmlbuf = xmlBufferCreate();
        if (xmlNodeDump(xmlbuf, def->metadata->doc, def->metadata,
                        virBufferGetIndent(buf, false) / 2, 1) < 0) {
            xmlBufferFree(xmlbuf);
            xmlIndentTreeOutput = oldIndentTreeOutput;
            goto error;
        }
        virBufferAsprintf(buf, "%s\n", (char *) xmlBufferContent(xmlbuf));
        xmlBufferFree(xmlbuf);
        xmlIndentTreeOutput = oldIndentTreeOutput;
    }

2853
    if (def->forward.type != VIR_NETWORK_FORWARD_NONE) {
2854
        const char *dev = NULL;
2855
        if (!def->forward.npfs)
2856
            dev = virNetworkDefForwardIf(def, 0);
2857
        const char *mode = virNetworkForwardTypeToString(def->forward.type);
2858 2859

        if (!mode) {
2860 2861
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown forward type %d in network '%s'"),
2862
                           def->forward.type, def->name);
2863 2864
            goto error;
        }
2865 2866 2867
        virBufferAddLit(buf, "<forward");
        virBufferEscapeString(buf, " dev='%s'", dev);
        virBufferAsprintf(buf, " mode='%s'", mode);
2868 2869
        if (def->forward.type == VIR_NETWORK_FORWARD_HOSTDEV) {
            if (def->forward.managed)
2870
                virBufferAddLit(buf, " managed='yes'");
2871
            else
2872
                virBufferAddLit(buf, " managed='no'");
2873
        }
2874
        shortforward = !(def->forward.nifs || def->forward.npfs
2875 2876 2877
                         || VIR_SOCKET_ADDR_VALID(&def->forward.addr.start)
                         || VIR_SOCKET_ADDR_VALID(&def->forward.addr.end)
                         || def->forward.port.start
2878 2879 2880
                         || def->forward.port.end
                         || (def->forward.driverName
                             != VIR_NETWORK_FORWARD_DRIVER_NAME_DEFAULT));
2881
        virBufferAsprintf(buf, "%s>\n", shortforward ? "/" : "");
2882
        virBufferAdjustIndent(buf, 2);
2883

2884 2885 2886 2887 2888 2889 2890 2891 2892 2893 2894 2895
        if (def->forward.driverName
            != VIR_NETWORK_FORWARD_DRIVER_NAME_DEFAULT) {
            const char *driverName
                = virNetworkForwardDriverNameTypeToString(def->forward.driverName);
            if (!driverName) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("unexpected hostdev driver name type %d "),
                               def->forward.driverName);
                goto error;
            }
            virBufferAsprintf(buf, "<driver name='%s'/>\n", driverName);
        }
2896 2897 2898 2899 2900
        if (def->forward.type == VIR_NETWORK_FORWARD_NAT) {
            if (virNetworkForwardNatDefFormat(buf, &def->forward) < 0)
                goto error;
        }

2901 2902
        /* For now, hard-coded to at most 1 forward.pfs */
        if (def->forward.npfs)
2903
            virBufferEscapeString(buf, "<pf dev='%s'/>\n",
2904
                                  def->forward.pfs[0].dev);
2905

2906 2907
        if (def->forward.nifs &&
            (!def->forward.npfs || !(flags & VIR_NETWORK_XML_INACTIVE))) {
2908
            for (i = 0; i < def->forward.nifs; i++) {
2909
                if (def->forward.ifs[i].type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV) {
2910
                    virBufferEscapeString(buf, "<interface dev='%s'",
2911
                                          def->forward.ifs[i].device.dev);
2912
                    if (!(flags & VIR_NETWORK_XML_INACTIVE) &&
2913
                        (def->forward.ifs[i].connections > 0)) {
2914
                        virBufferAsprintf(buf, " connections='%d'",
2915
                                          def->forward.ifs[i].connections);
2916
                    }
2917
                    virBufferAddLit(buf, "/>\n");
2918
                } else {
2919
                    if (def->forward.ifs[i].type ==  VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_PCI) {
2920
                        if (virPCIDeviceAddressFormat(buf,
2921
                                                      def->forward.ifs[i].device.pci,
2922 2923 2924
                                                      true) < 0)
                            goto error;
                    }
2925
                }
2926 2927
            }
        }
2928
        virBufferAdjustIndent(buf, -2);
2929
        if (!shortforward)
2930
            virBufferAddLit(buf, "</forward>\n");
2931 2932
    }

2933

2934
    if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
2935 2936
        def->forward.type == VIR_NETWORK_FORWARD_NAT ||
        def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
2937
        def->forward.type == VIR_NETWORK_FORWARD_OPEN ||
2938
        def->bridge || def->macTableManager) {
2939

2940
        virBufferAddLit(buf, "<bridge");
2941 2942 2943
        virBufferEscapeString(buf, " name='%s'", def->bridge);
        if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
            def->forward.type == VIR_NETWORK_FORWARD_NAT ||
2944 2945
            def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
            def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
2946 2947 2948 2949 2950 2951 2952 2953
            virBufferAsprintf(buf, " stp='%s' delay='%ld'",
                              def->stp ? "on" : "off", def->delay);
        }
        if (def->macTableManager) {
            virBufferAsprintf(buf, " macTableManager='%s'",
                             virNetworkBridgeMACTableManagerTypeToString(def->macTableManager));
        }
        virBufferAddLit(buf, "/>\n");
2954 2955
    }

2956 2957
    if (def->mac_specified) {
        char macaddr[VIR_MAC_STRING_BUFLEN];
2958
        virMacAddrFormat(&def->mac, macaddr);
2959
        virBufferAsprintf(buf, "<mac address='%s'/>\n", macaddr);
2960
    }
2961

2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978 2979
    if (def->domain) {
        virBufferAsprintf(buf, "<domain name='%s'", def->domain);

        /* default to "no", but don't format it in the XML */
        if (def->domainLocalOnly) {
            const char *local = virTristateBoolTypeToString(def->domainLocalOnly);

            if (!local) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Unknown localOnly type %d in network"),
                               def->domainLocalOnly);
                return -1;
            }
            virBufferAsprintf(buf, " localOnly='%s'", local);
        }

        virBufferAddLit(buf, "/>\n");
    }
2980

2981
    if (virNetworkDNSDefFormat(buf, &def->dns) < 0)
2982 2983
        goto error;

2984
    if (virNetDevVlanFormat(&def->vlan, buf) < 0)
2985
        goto error;
2986
    if (virNetDevBandwidthFormat(def->bandwidth, buf) < 0)
2987 2988
        goto error;

2989
    for (i = 0; i < def->nips; i++) {
2990
        if (virNetworkIPDefFormat(buf, &def->ips[i]) < 0)
2991
            goto error;
2992 2993
    }

2994
    for (i = 0; i < def->nroutes; i++) {
2995
        if (virNetDevIPRouteFormat(buf, def->routes[i]) < 0)
2996 2997 2998
            goto error;
    }

2999
    if (virNetDevVPortProfileFormat(def->virtPortProfile, buf) < 0)
3000
        goto error;
3001

3002 3003
    for (i = 0; i < def->nPortGroups; i++)
        if (virPortGroupDefFormat(buf, &def->portGroups[i]) < 0)
3004
            goto error;
3005

3006 3007 3008 3009 3010
    virBufferAdjustIndent(buf, -2);
    virBufferAddLit(buf, "</network>\n");

    return 0;

3011
 error:
3012 3013 3014 3015
    return -1;
}

char *
E
Eric Blake 已提交
3016
virNetworkDefFormat(const virNetworkDef *def,
3017 3018 3019 3020
                    unsigned int flags)
{
    virBuffer buf = VIR_BUFFER_INITIALIZER;

3021
    if (virNetworkDefFormatBuf(&buf, def, flags) < 0)
3022 3023
        goto error;

3024 3025
    if (virBufferCheckError(&buf) < 0)
        goto error;
3026 3027 3028

    return virBufferContentAndReset(&buf);

3029
 error:
3030 3031 3032 3033 3034 3035 3036 3037 3038 3039
    virBufferFreeAndReset(&buf);
    return NULL;
}

static char *
virNetworkObjFormat(virNetworkObjPtr net,
                    unsigned int flags)
{
    virBuffer buf = VIR_BUFFER_INITIALIZER;
    char *class_id = virBitmapFormat(net->class_id);
3040
    size_t i;
3041 3042

    if (!class_id)
3043
        goto error;
3044 3045

    virBufferAddLit(&buf, "<networkstatus>\n");
3046 3047 3048
    virBufferAdjustIndent(&buf, 2);
    virBufferAsprintf(&buf, "<class_id bitmap='%s'/>\n", class_id);
    virBufferAsprintf(&buf, "<floor sum='%llu'/>\n", net->floor_sum);
3049 3050
    VIR_FREE(class_id);

3051 3052
    for (i = 0; i < VIR_NETWORK_TAINT_LAST; i++) {
        if (net->taint & (1 << i))
3053
            virBufferAsprintf(&buf, "<taint flag='%s'/>\n",
3054 3055 3056
                              virNetworkTaintTypeToString(i));
    }

3057
    if (virNetworkDefFormatBuf(&buf, net->def, flags) < 0)
3058 3059
        goto error;

3060
    virBufferAdjustIndent(&buf, -2);
3061
    virBufferAddLit(&buf, "</networkstatus>");
3062

3063 3064
    if (virBufferCheckError(&buf) < 0)
        goto error;
3065 3066 3067

    return virBufferContentAndReset(&buf);

3068
 error:
3069
    virBufferFreeAndReset(&buf);
3070 3071 3072
    return NULL;
}

3073 3074 3075 3076 3077 3078 3079 3080
const char *
virNetworkDefForwardIf(const virNetworkDef *def, size_t n)
{
    return ((def->forward.ifs && (def->forward.nifs > n) &&
             def->forward.ifs[n].type == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV)
            ? def->forward.ifs[n].device.dev : NULL);
}

3081 3082 3083
virPortGroupDefPtr virPortGroupFindByName(virNetworkDefPtr net,
                                          const char *portgroup)
{
3084 3085
    size_t i;
    for (i = 0; i < net->nPortGroups; i++) {
3086
        if (portgroup) {
3087 3088
            if (STREQ(portgroup, net->portGroups[i].name))
                return &net->portGroups[i];
3089
        } else {
3090 3091
            if (net->portGroups[i].isDefault)
                return &net->portGroups[i];
3092 3093 3094 3095 3096
        }
    }
    return NULL;
}

3097
int virNetworkSaveXML(const char *configDir,
3098 3099
                      virNetworkDefPtr def,
                      const char *xml)
3100
{
J
Ján Tomko 已提交
3101
    char uuidstr[VIR_UUID_STRING_BUFLEN];
3102
    char *configFile = NULL;
3103
    int ret = -1;
3104

3105
    if ((configFile = virNetworkConfigFile(configDir, def->name)) == NULL)
3106 3107
        goto cleanup;

3108 3109
    if (virFileMakePath(configDir) < 0) {
        virReportSystemError(errno,
3110 3111
                             _("cannot create config directory '%s'"),
                             configDir);
3112 3113 3114
        goto cleanup;
    }

J
Ján Tomko 已提交
3115 3116 3117 3118
    virUUIDFormat(def->uuid, uuidstr);
    ret = virXMLSaveFile(configFile,
                         virXMLPickShellSafeComment(def->name, uuidstr),
                         "net-edit", xml);
3119 3120

 cleanup:
3121 3122 3123 3124
    VIR_FREE(configFile);
    return ret;
}

3125
int virNetworkSaveConfig(const char *configDir,
3126 3127 3128 3129 3130
                         virNetworkDefPtr def)
{
    int ret = -1;
    char *xml;

3131
    if (!(xml = virNetworkDefFormat(def, VIR_NETWORK_XML_INACTIVE)))
3132 3133
        goto cleanup;

3134
    if (virNetworkSaveXML(configDir, def, xml))
3135 3136 3137
        goto cleanup;

    ret = 0;
3138
 cleanup:
3139
    VIR_FREE(xml);
3140 3141 3142
    return ret;
}

3143

3144 3145 3146 3147
int virNetworkSaveStatus(const char *statusDir,
                         virNetworkObjPtr network)
{
    int ret = -1;
3148
    int flags = 0;
3149 3150
    char *xml;

3151
    if (!(xml = virNetworkObjFormat(network, flags)))
3152 3153 3154 3155 3156 3157
        goto cleanup;

    if (virNetworkSaveXML(statusDir, network->def, xml))
        goto cleanup;

    ret = 0;
3158
 cleanup:
3159 3160 3161 3162
    VIR_FREE(xml);
    return ret;
}

3163 3164 3165 3166 3167 3168 3169 3170 3171
virNetworkObjPtr
virNetworkLoadState(virNetworkObjListPtr nets,
                    const char *stateDir,
                    const char *name)
{
    char *configFile = NULL;
    virNetworkDefPtr def = NULL;
    virNetworkObjPtr net = NULL;
    xmlDocPtr xml = NULL;
3172
    xmlNodePtr node = NULL, *nodes = NULL;
3173 3174 3175
    xmlXPathContextPtr ctxt = NULL;
    virBitmapPtr class_id_map = NULL;
    unsigned long long floor_sum_val = 0;
3176 3177 3178
    unsigned int taint = 0;
    int n;
    size_t i;
3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197


    if ((configFile = virNetworkConfigFile(stateDir, name)) == NULL)
        goto error;

    if (!(xml = virXMLParseCtxt(configFile, NULL, _("(network status)"), &ctxt)))
        goto error;

    if (!(node = virXPathNode("//network", ctxt))) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Could not find any 'network' element in status file"));
        goto error;
    }

    /* parse the definition first */
    ctxt->node = node;
    if (!(def = virNetworkDefParseXML(ctxt)))
        goto error;

3198
    if (STRNEQ(name, def->name)) {
3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Network config filename '%s'"
                         " does not match network name '%s'"),
                       configFile, def->name);
        goto error;
    }

    /* now parse possible status data */
    node = xmlDocGetRootElement(xml);
    if (xmlStrEqual(node->name, BAD_CAST "networkstatus")) {
        /* Newer network status file. Contains useful
         * info which are not to be found in bare config XML */
        char *class_id = NULL;
        char *floor_sum = NULL;

        ctxt->node = node;
        if ((class_id = virXPathString("string(./class_id[1]/@bitmap)", ctxt))) {
3216
            if (virBitmapParse(class_id, &class_id_map,
3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230
                               CLASS_ID_BITMAP_SIZE) < 0) {
                VIR_FREE(class_id);
                goto error;
            }
        }
        VIR_FREE(class_id);

        floor_sum = virXPathString("string(./floor[1]/@sum)", ctxt);
        if (floor_sum &&
            virStrToLong_ull(floor_sum, NULL, 10, &floor_sum_val) < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Malformed 'floor_sum' attribute: %s"),
                           floor_sum);
            VIR_FREE(floor_sum);
3231
            goto error;
3232 3233
        }
        VIR_FREE(floor_sum);
3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254

        if ((n = virXPathNodeSet("./taint", ctxt, &nodes)) < 0)
            goto error;

        for (i = 0; i < n; i++) {
            char *str = virXMLPropString(nodes[i], "flag");
            if (str) {
                int flag = virNetworkTaintTypeFromString(str);
                if (flag < 0) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                   _("Unknown taint flag %s"), str);
                    VIR_FREE(str);
                    goto error;
                }
                VIR_FREE(str);
                /* Compute taint mask here. The network object does not
                 * exist yet, so we can't use virNetworkObjtTaint. */
                taint |= (1 << flag);
            }
        }
        VIR_FREE(nodes);
3255 3256 3257
    }

    /* create the object */
3258
    if (!(net = virNetworkAssignDef(nets, def, VIR_NETWORK_OBJ_LIST_ADD_LIVE)))
3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270
        goto error;
    /* do not put any "goto error" below this comment */

    /* assign status data stored in the network object */
    if (class_id_map) {
        virBitmapFree(net->class_id);
        net->class_id = class_id_map;
    }

    if (floor_sum_val > 0)
        net->floor_sum = floor_sum_val;

3271
    net->taint = taint;
3272
    net->active = 1; /* any network with a state file is by definition active */
3273

3274
 cleanup:
3275 3276 3277 3278 3279
    VIR_FREE(configFile);
    xmlFreeDoc(xml);
    xmlXPathFreeContext(ctxt);
    return net;

3280
 error:
3281
    VIR_FREE(nodes);
3282 3283 3284 3285 3286
    virBitmapFree(class_id_map);
    virNetworkDefFree(def);
    goto cleanup;
}

3287
virNetworkObjPtr virNetworkLoadConfig(virNetworkObjListPtr nets,
3288 3289
                                      const char *configDir,
                                      const char *autostartDir,
3290
                                      const char *name)
3291 3292 3293 3294 3295 3296
{
    char *configFile = NULL, *autostartLink = NULL;
    virNetworkDefPtr def = NULL;
    virNetworkObjPtr net;
    int autostart;

3297
    if ((configFile = virNetworkConfigFile(configDir, name)) == NULL)
3298
        goto error;
3299
    if ((autostartLink = virNetworkConfigFile(autostartDir, name)) == NULL)
3300 3301 3302 3303 3304
        goto error;

    if ((autostart = virFileLinkPointsTo(autostartLink, configFile)) < 0)
        goto error;

3305
    if (!(def = virNetworkDefParseFile(configFile)))
3306 3307
        goto error;

3308
    if (STRNEQ(name, def->name)) {
3309 3310 3311 3312
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Network config filename '%s'"
                         " does not match network name '%s'"),
                       configFile, def->name);
3313 3314 3315
        goto error;
    }

3316 3317
    if (def->forward.type == VIR_NETWORK_FORWARD_NONE ||
        def->forward.type == VIR_NETWORK_FORWARD_NAT ||
3318 3319
        def->forward.type == VIR_NETWORK_FORWARD_ROUTE ||
        def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
3320

3321 3322 3323 3324
        if (!def->mac_specified) {
            virNetworkSetBridgeMacAddr(def);
            virNetworkSaveConfig(configDir, def);
        }
3325 3326 3327 3328
    } else {
        /* Throw away MAC address for other forward types,
         * which could have been generated by older libvirt RPMs */
        def->mac_specified = false;
3329
    }
3330

3331
    if (!(net = virNetworkAssignDef(nets, def, 0)))
3332 3333 3334 3335
        goto error;

    net->autostart = autostart;

3336 3337 3338
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);

3339 3340
    return net;

3341
 error:
3342 3343 3344 3345 3346 3347
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
    virNetworkDefFree(def);
    return NULL;
}

3348 3349 3350 3351 3352 3353 3354

int
virNetworkLoadAllState(virNetworkObjListPtr nets,
                       const char *stateDir)
{
    DIR *dir;
    struct dirent *entry;
E
Eric Blake 已提交
3355
    int ret = -1;
J
Ján Tomko 已提交
3356
    int rc;
3357

J
Ján Tomko 已提交
3358 3359
    if ((rc = virDirOpenIfExists(&dir, stateDir)) <= 0)
        return rc;
3360

E
Eric Blake 已提交
3361
    while ((ret = virDirRead(dir, &entry, stateDir)) > 0) {
3362 3363 3364 3365 3366
        virNetworkObjPtr net;

        if (!virFileStripSuffix(entry->d_name, ".xml"))
            continue;

3367 3368
        net = virNetworkLoadState(nets, stateDir, entry->d_name);
        virNetworkObjEndAPI(&net);
3369 3370
    }

J
Ján Tomko 已提交
3371
    VIR_DIR_CLOSE(dir);
E
Eric Blake 已提交
3372
    return ret;
3373 3374 3375
}


3376
int virNetworkLoadAllConfigs(virNetworkObjListPtr nets,
3377 3378 3379 3380 3381
                             const char *configDir,
                             const char *autostartDir)
{
    DIR *dir;
    struct dirent *entry;
E
Eric Blake 已提交
3382
    int ret = -1;
J
Ján Tomko 已提交
3383
    int rc;
3384

J
Ján Tomko 已提交
3385 3386
    if ((rc = virDirOpenIfExists(&dir, configDir)) <= 0)
        return rc;
3387

E
Eric Blake 已提交
3388
    while ((ret = virDirRead(dir, &entry, configDir)) > 0) {
3389 3390
        virNetworkObjPtr net;

3391
        if (!virFileStripSuffix(entry->d_name, ".xml"))
3392 3393 3394 3395
            continue;

        /* NB: ignoring errors, so one malformed config doesn't
           kill the whole process */
3396
        net = virNetworkLoadConfig(nets,
3397 3398 3399
                                   configDir,
                                   autostartDir,
                                   entry->d_name);
3400
        virNetworkObjEndAPI(&net);
3401 3402
    }

J
Ján Tomko 已提交
3403
    VIR_DIR_CLOSE(dir);
E
Eric Blake 已提交
3404
    return ret;
3405 3406
}

3407
int virNetworkDeleteConfig(const char *configDir,
3408
                           const char *autostartDir,
3409 3410
                           virNetworkObjPtr net)
{
3411 3412
    char *configFile = NULL;
    char *autostartLink = NULL;
R
Ryota Ozaki 已提交
3413
    int ret = -1;
3414

3415
    if ((configFile = virNetworkConfigFile(configDir, net->def->name)) == NULL)
3416
        goto error;
3417
    if ((autostartLink = virNetworkConfigFile(autostartDir, net->def->name)) == NULL)
3418
        goto error;
3419 3420

    /* Not fatal if this doesn't work */
3421
    unlink(autostartLink);
3422
    net->autostart = 0;
3423

3424
    if (unlink(configFile) < 0) {
3425
        virReportSystemError(errno,
3426
                             _("cannot remove config file '%s'"),
3427 3428
                             configFile);
        goto error;
3429 3430
    }

R
Ryota Ozaki 已提交
3431
    ret = 0;
3432

3433
 error:
3434 3435
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
R
Ryota Ozaki 已提交
3436
    return ret;
3437 3438
}

3439
char *virNetworkConfigFile(const char *dir,
3440 3441 3442 3443
                           const char *name)
{
    char *ret = NULL;

3444
    ignore_value(virAsprintf(&ret, "%s/%s.xml", dir, name));
3445
    return ret;
3446
}
D
Daniel P. Berrange 已提交
3447

3448 3449 3450 3451 3452 3453 3454 3455 3456 3457
struct virNetworkBridgeInUseHelperData {
    const char *bridge;
    const char *skipname;
};

static int
virNetworkBridgeInUseHelper(const void *payload,
                            const void *name ATTRIBUTE_UNUSED,
                            const void *opaque)
{
3458
    int ret;
3459 3460 3461
    virNetworkObjPtr net = (virNetworkObjPtr) payload;
    const struct virNetworkBridgeInUseHelperData *data = opaque;

3462
    virObjectLock(net);
3463 3464 3465 3466 3467 3468 3469 3470
    if (data->skipname &&
        ((net->def && STREQ(net->def->name, data->skipname)) ||
         (net->newDef && STREQ(net->newDef->name, data->skipname))))
        ret = 0;
    else if ((net->def && net->def->bridge &&
              STREQ(net->def->bridge, data->bridge)) ||
             (net->newDef && net->newDef->bridge &&
              STREQ(net->newDef->bridge, data->bridge)))
3471
        ret = 1;
3472 3473
    else
        ret = 0;
3474
    virObjectUnlock(net);
3475 3476 3477
    return ret;
}

E
Eric Blake 已提交
3478
int virNetworkBridgeInUse(virNetworkObjListPtr nets,
3479 3480 3481
                          const char *bridge,
                          const char *skipname)
{
3482 3483
    virNetworkObjPtr obj;
    struct virNetworkBridgeInUseHelperData data = {bridge, skipname};
3484

3485
    virObjectLock(nets);
3486
    obj = virHashSearch(nets->objs, virNetworkBridgeInUseHelper, &data);
3487
    virObjectUnlock(nets);
3488

3489
    return obj != NULL;
3490 3491
}

3492

3493 3494 3495 3496 3497 3498
void virNetworkSetBridgeMacAddr(virNetworkDefPtr def)
{
    if (!def->mac_specified) {
        /* if the bridge doesn't have a mac address explicitly defined,
         * autogenerate a random one.
         */
3499
        virMacAddrGenerate((unsigned char[]){ 0x52, 0x54, 0 },
3500
                           &def->mac);
3501 3502 3503 3504
        def->mac_specified = true;
    }
}

3505 3506 3507 3508 3509
/* NetworkObj backend of the virNetworkUpdate API */

static void
virNetworkDefUpdateNoSupport(virNetworkDefPtr def, const char *section)
{
3510
    virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3511 3512 3513
                   _("can't update '%s' section of network '%s'"),
                   section, def->name);
}
3514 3515 3516
static void
virNetworkDefUpdateUnknownCommand(unsigned int command)
{
3517
    virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3518 3519
                   _("unrecognized network update command code %d"), command);
}
3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565 3566 3567 3568 3569 3570 3571

static int
virNetworkDefUpdateCheckElementName(virNetworkDefPtr def,
                                    xmlNodePtr node,
                                    const char *section)
{
    if (!xmlStrEqual(node->name, BAD_CAST section)) {
        virReportError(VIR_ERR_XML_ERROR,
                       _("unexpected element <%s>, expecting <%s>, "
                         "while updating network '%s'"),
                       node->name, section, def->name);
        return -1;
    }
    return 0;
}

static int
virNetworkDefUpdateBridge(virNetworkDefPtr def,
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "bridge");
    return -1;
}

static int
virNetworkDefUpdateDomain(virNetworkDefPtr def,
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "domain");
    return -1;
}

static int
virNetworkDefUpdateIP(virNetworkDefPtr def,
                      unsigned int command ATTRIBUTE_UNUSED,
                      int parentIndex ATTRIBUTE_UNUSED,
                      xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                      /* virNetworkUpdateFlags */
                      unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "ip");
    return -1;
}

3572 3573
static virNetworkIPDefPtr
virNetworkIPDefByIndex(virNetworkDefPtr def, int parentIndex)
3574
{
3575
    virNetworkIPDefPtr ipdef = NULL;
3576
    size_t i;
3577 3578 3579

    /* first find which ip element's dhcp host list to work on */
    if (parentIndex >= 0) {
3580
        ipdef = virNetworkDefGetIPByIndex(def, AF_UNSPEC, parentIndex);
G
Gene Czarcinski 已提交
3581
        if (!(ipdef)) {
3582
            virReportError(VIR_ERR_OPERATION_INVALID,
G
Gene Czarcinski 已提交
3583
                           _("couldn't update dhcp host entry - no <ip> "
3584 3585 3586 3587 3588 3589 3590 3591 3592
                             "element found at index %d in network '%s'"),
                           parentIndex, def->name);
        }
        return ipdef;
    }

    /* -1 means "find the most appropriate", which in this case
     * means the one and only <ip> that has <dhcp> element
     */
3593
    for (i = 0;
3594
         (ipdef = virNetworkDefGetIPByIndex(def, AF_UNSPEC, i));
3595
         i++) {
G
Gene Czarcinski 已提交
3596
        if (ipdef->nranges || ipdef->nhosts)
3597 3598
            break;
    }
G
Gene Czarcinski 已提交
3599
    if (!ipdef) {
3600
        ipdef = virNetworkDefGetIPByIndex(def, AF_INET, 0);
G
Gene Czarcinski 已提交
3601
        if (!ipdef)
3602
            ipdef = virNetworkDefGetIPByIndex(def, AF_INET6, 0);
G
Gene Czarcinski 已提交
3603
    }
3604 3605
    if (!ipdef) {
        virReportError(VIR_ERR_OPERATION_INVALID,
G
Gene Czarcinski 已提交
3606
                       _("couldn't update dhcp host entry - no <ip> "
3607 3608 3609 3610 3611
                         "element found in network '%s'"), def->name);
    }
    return ipdef;
}

3612 3613 3614

static int
virNetworkDefUpdateCheckMultiDHCP(virNetworkDefPtr def,
3615
                                  virNetworkIPDefPtr ipdef)
3616 3617 3618
{
    int family = VIR_SOCKET_ADDR_FAMILY(&ipdef->address);
    size_t i;
3619
    virNetworkIPDefPtr ip;
3620

3621
    for (i = 0; (ip = virNetworkDefGetIPByIndex(def, family, i)); i++) {
3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635
        if (ip != ipdef) {
            if (ip->nranges || ip->nhosts) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("dhcp is supported only for a "
                                 "single %s address on each network"),
                               (family == AF_INET) ? "IPv4" : "IPv6");
                return -1;
            }
        }
    }
    return 0;
}


3636 3637
static int
virNetworkDefUpdateIPDHCPHost(virNetworkDefPtr def,
3638 3639 3640
                              unsigned int command,
                              int parentIndex,
                              xmlXPathContextPtr ctxt,
3641 3642 3643
                              /* virNetworkUpdateFlags */
                              unsigned int fflags ATTRIBUTE_UNUSED)
{
3644 3645
    size_t i;
    int ret = -1;
3646
    virNetworkIPDefPtr ipdef = virNetworkIPDefByIndex(def, parentIndex);
3647
    virNetworkDHCPHostDef host;
3648
    bool partialOkay = (command == VIR_NETWORK_UPDATE_COMMAND_DELETE);
3649 3650 3651 3652 3653 3654 3655 3656 3657 3658

    memset(&host, 0, sizeof(host));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "host") < 0)
        goto cleanup;

    /* ipdef is the ip element that needs its host array updated */
    if (!ipdef)
        goto cleanup;

3659 3660 3661
    if (virNetworkDHCPHostDefParseXML(def->name, ipdef, ctxt->node,
                                      &host, partialOkay) < 0)
        goto cleanup;
3662

3663 3664 3665 3666 3667 3668 3669 3670 3671
    if (!partialOkay &&
        VIR_SOCKET_ADDR_FAMILY(&ipdef->address)
        != VIR_SOCKET_ADDR_FAMILY(&host.ip)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("the address family of a host entry IP must match "
                         "the address family of the dhcp element's parent"));
        goto cleanup;
    }

3672
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
3673

3674
        /* search for the entry with this (ip|mac|name),
3675
         * and update the IP+(mac|name) */
3676
        for (i = 0; i < ipdef->nhosts; i++) {
3677
            if ((host.mac && ipdef->hosts[i].mac &&
3678
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) ||
3679 3680
                (VIR_SOCKET_ADDR_VALID(&host.ip) &&
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip)) ||
3681
                (host.name &&
3682
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name))) {
3683 3684 3685 3686
                break;
            }
        }

3687
        if (i == ipdef->nhosts) {
3688
            char *ip = virSocketAddrFormat(&host.ip);
3689 3690
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate an existing dhcp host entry with "
3691 3692 3693 3694 3695
                             "\"mac='%s'\" \"name='%s'\" \"ip='%s'\" in"
                             " network '%s'"),
                           host.mac ? host.mac : _("unknown"), host.name,
                           ip ? ip : _("unknown"), def->name);
            VIR_FREE(ip);
3696 3697 3698 3699 3700 3701 3702
            goto cleanup;
        }

        /* clear the existing hosts entry, move the new one in its place,
         * then clear out the extra copy to get rid of the duplicate pointers
         * to its data (mac and name strings).
         */
3703 3704
        virNetworkDHCPHostDefClear(&ipdef->hosts[i]);
        ipdef->hosts[i] = host;
3705 3706 3707 3708 3709
        memset(&host, 0, sizeof(host));

    } else if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
               (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3710 3711 3712
        if (virNetworkDefUpdateCheckMultiDHCP(def, ipdef) < 0)
            goto cleanup;

3713
        /* log error if an entry with same name/address/ip already exists */
3714
        for (i = 0; i < ipdef->nhosts; i++) {
3715
            if ((host.mac && ipdef->hosts[i].mac &&
3716
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) ||
3717
                (host.name &&
3718
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name)) ||
3719
                (VIR_SOCKET_ADDR_VALID(&host.ip) &&
3720
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip))) {
3721 3722 3723 3724 3725 3726
                char *ip = virSocketAddrFormat(&host.ip);

                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("there is an existing dhcp host entry in "
                                 "network '%s' that matches "
                                 "\"<host mac='%s' name='%s' ip='%s'/>\""),
3727 3728
                               def->name, host.mac ? host.mac : _("unknown"),
                               host.name, ip ? ip : _("unknown"));
3729 3730 3731 3732
                VIR_FREE(ip);
                goto cleanup;
            }
        }
3733

3734
        /* add to beginning/end of list */
3735 3736 3737 3738
        if (VIR_INSERT_ELEMENT(ipdef->hosts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : ipdef->nhosts,
                               ipdef->nhosts, host) < 0)
3739 3740 3741 3742
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        /* find matching entry - all specified attributes must match */
3743
        for (i = 0; i < ipdef->nhosts; i++) {
3744
            if ((!host.mac || !ipdef->hosts[i].mac ||
3745
                 !virMacAddrCompare(host.mac, ipdef->hosts[i].mac)) &&
3746
                (!host.name ||
3747
                 STREQ_NULLABLE(host.name, ipdef->hosts[i].name)) &&
3748
                (!VIR_SOCKET_ADDR_VALID(&host.ip) ||
3749
                 virSocketAddrEqual(&host.ip, &ipdef->hosts[i].ip))) {
3750 3751 3752
                break;
            }
        }
3753
        if (i == ipdef->nhosts) {
3754 3755 3756 3757 3758 3759 3760
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching dhcp host entry "
                             "in network '%s'"), def->name);
            goto cleanup;
        }

        /* remove it */
3761 3762
        virNetworkDHCPHostDefClear(&ipdef->hosts[i]);
        VIR_DELETE_ELEMENT(ipdef->hosts, i, ipdef->nhosts);
3763

3764 3765 3766
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
3767 3768 3769
    }

    ret = 0;
3770
 cleanup:
3771 3772
    virNetworkDHCPHostDefClear(&host);
    return ret;
3773 3774 3775 3776
}

static int
virNetworkDefUpdateIPDHCPRange(virNetworkDefPtr def,
3777
                               unsigned int command,
3778
                               int parentIndex,
3779
                               xmlXPathContextPtr ctxt,
3780 3781 3782
                               /* virNetworkUpdateFlags */
                               unsigned int fflags ATTRIBUTE_UNUSED)
{
3783 3784
    size_t i;
    int ret = -1;
3785
    virNetworkIPDefPtr ipdef = virNetworkIPDefByIndex(def, parentIndex);
3786
    virSocketAddrRange range;
3787 3788 3789 3790 3791 3792 3793 3794 3795 3796

    memset(&range, 0, sizeof(range));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "range") < 0)
        goto cleanup;

    /* ipdef is the ip element that needs its range array updated */
    if (!ipdef)
        goto cleanup;

3797
    /* parse the xml into a virSocketAddrRange */
3798 3799
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {

3800
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3801 3802 3803 3804 3805
                       _("dhcp ranges cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

3806
    if (virSocketAddrRangeParseXML(def->name, ipdef, ctxt->node, &range) < 0)
3807 3808
        goto cleanup;

3809 3810 3811 3812 3813 3814 3815 3816
    if (VIR_SOCKET_ADDR_FAMILY(&ipdef->address)
        != VIR_SOCKET_ADDR_FAMILY(&range.start)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("the address family of a dhcp range must match "
                         "the address family of the dhcp element's parent"));
        goto cleanup;
    }

3817
    /* check if an entry with same name/address/ip already exists */
3818 3819 3820
    for (i = 0; i < ipdef->nranges; i++) {
        if (virSocketAddrEqual(&range.start, &ipdef->ranges[i].start) &&
            virSocketAddrEqual(&range.end, &ipdef->ranges[i].end)) {
3821 3822 3823 3824 3825 3826 3827
            break;
        }
    }

    if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3828 3829 3830
        if (virNetworkDefUpdateCheckMultiDHCP(def, ipdef) < 0)
            goto cleanup;

3831
        if (i < ipdef->nranges) {
3832 3833 3834 3835 3836 3837 3838 3839 3840 3841
            char *startip = virSocketAddrFormat(&range.start);
            char *endip = virSocketAddrFormat(&range.end);

            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is an existing dhcp range entry in "
                             "network '%s' that matches "
                             "\"<range start='%s' end='%s'/>\""),
                           def->name,
                           startip ? startip : "unknown",
                           endip ? endip : "unknown");
3842 3843
            VIR_FREE(startip);
            VIR_FREE(endip);
3844 3845 3846 3847
            goto cleanup;
        }

        /* add to beginning/end of list */
3848 3849 3850 3851
        if (VIR_INSERT_ELEMENT(ipdef->ranges,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : ipdef->nranges,
                               ipdef->nranges, range) < 0)
3852 3853 3854
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

3855
        if (i == ipdef->nranges) {
3856 3857 3858 3859 3860 3861 3862 3863
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching dhcp range entry "
                             "in network '%s'"), def->name);
            goto cleanup;
        }

        /* remove it */
        /* NB: nothing to clear from a RangeDef that's being freed */
3864
        VIR_DELETE_ELEMENT(ipdef->ranges, i, ipdef->nranges);
3865

3866 3867 3868
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
3869 3870 3871
    }

    ret = 0;
3872
 cleanup:
3873
    return ret;
3874 3875 3876 3877 3878 3879 3880 3881 3882 3883 3884 3885 3886 3887 3888 3889
}

static int
virNetworkDefUpdateForward(virNetworkDefPtr def,
                           unsigned int command ATTRIBUTE_UNUSED,
                           int parentIndex ATTRIBUTE_UNUSED,
                           xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                           /* virNetworkUpdateFlags */
                           unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "forward");
    return -1;
}

static int
virNetworkDefUpdateForwardInterface(virNetworkDefPtr def,
3890
                                    unsigned int command,
3891
                                    int parentIndex ATTRIBUTE_UNUSED,
3892
                                    xmlXPathContextPtr ctxt,
3893 3894 3895
                                    /* virNetworkUpdateFlags */
                                    unsigned int fflags ATTRIBUTE_UNUSED)
{
3896 3897
    size_t i;
    int ret = -1;
3898 3899 3900 3901 3902 3903 3904 3905
    virNetworkForwardIfDef iface;

    memset(&iface, 0, sizeof(iface));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "interface") < 0)
        goto cleanup;

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
3906
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920
                       _("forward interface entries cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    /* parsing this is so simple that it doesn't have its own function */
    iface.type = VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV;
    if (!(iface.device.dev = virXMLPropString(ctxt->node, "dev"))) {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("missing dev attribute in <interface> element"));
        goto cleanup;
    }

    /* check if an <interface> with same dev name already exists */
3921 3922
    for (i = 0; i < def->forward.nifs; i++) {
        if (def->forward.ifs[i].type
3923
            == VIR_NETWORK_FORWARD_HOSTDEV_DEVICE_NETDEV &&
3924
            STREQ(iface.device.dev, def->forward.ifs[i].device.dev))
3925 3926 3927 3928 3929 3930
            break;
    }

    if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

3931
        if (i < def->forward.nifs) {
3932 3933 3934 3935 3936 3937 3938 3939 3940
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is an existing interface entry "
                             "in network '%s' that matches "
                             "\"<interface dev='%s'>\""),
                           def->name, iface.device.dev);
            goto cleanup;
        }

        /* add to beginning/end of list */
3941 3942 3943 3944
        if (VIR_INSERT_ELEMENT(def->forward.ifs,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : def->forward.nifs,
                               def->forward.nifs, iface) < 0)
3945 3946 3947
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

3948
        if (i == def->forward.nifs) {
3949 3950 3951 3952 3953 3954 3955 3956
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't find an interface entry "
                             "in network '%s' matching <interface dev='%s'>"),
                           def->name, iface.device.dev);
            goto cleanup;
        }

        /* fail if the interface is being used */
3957
        if (def->forward.ifs[i].connections > 0) {
3958 3959 3960 3961 3962
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("unable to delete interface '%s' "
                             "in network '%s'. It is currently being used "
                             " by %d domains."),
                           iface.device.dev, def->name,
3963
                           def->forward.ifs[i].connections);
3964 3965 3966 3967
            goto cleanup;
        }

        /* remove it */
3968 3969
        virNetworkForwardIfDefClear(&def->forward.ifs[i]);
        VIR_DELETE_ELEMENT(def->forward.ifs, i, def->forward.nifs);
3970

3971 3972 3973 3974 3975 3976
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
3977
 cleanup:
3978 3979
    virNetworkForwardIfDefClear(&iface);
    return ret;
3980 3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991 3992 3993 3994
}

static int
virNetworkDefUpdateForwardPF(virNetworkDefPtr def,
                             unsigned int command ATTRIBUTE_UNUSED,
                             int parentIndex ATTRIBUTE_UNUSED,
                             xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                             /* virNetworkUpdateFlags */
                             unsigned int fflags ATTRIBUTE_UNUSED)
{
    virNetworkDefUpdateNoSupport(def, "forward pf");
    return -1;
}

static int
3995 3996
virNetworkDefUpdatePortGroup(virNetworkDefPtr def,
                             unsigned int command,
3997
                             int parentIndex ATTRIBUTE_UNUSED,
3998
                             xmlXPathContextPtr ctxt,
3999 4000 4001
                             /* virNetworkUpdateFlags */
                             unsigned int fflags ATTRIBUTE_UNUSED)
{
4002 4003
    size_t i;
    int foundName = -1, foundDefault = -1;
4004
    int ret = -1;
4005 4006 4007 4008 4009 4010 4011 4012 4013 4014 4015
    virPortGroupDef portgroup;

    memset(&portgroup, 0, sizeof(portgroup));

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "portgroup") < 0)
        goto cleanup;

    if (virNetworkPortGroupParseXML(&portgroup, ctxt->node, ctxt) < 0)
        goto cleanup;

    /* check if a portgroup with same name already exists */
4016 4017 4018 4019 4020
    for (i = 0; i < def->nPortGroups; i++) {
        if (STREQ(portgroup.name, def->portGroups[i].name))
            foundName = i;
        if (def->portGroups[i].isDefault)
            foundDefault = i;
4021
    }
4022
    if (foundName == -1 &&
4023 4024 4025 4026 4027 4028 4029
        ((command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) ||
         (command == VIR_NETWORK_UPDATE_COMMAND_DELETE))) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("couldn't find a portgroup entry "
                         "in network '%s' matching <portgroup name='%s'>"),
                       def->name, portgroup.name);
        goto cleanup;
4030
    } else if (foundName >= 0 &&
4031 4032 4033 4034 4035 4036 4037 4038 4039 4040
               ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
                (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST))) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("there is an existing portgroup entry in "
                         "network '%s' that matches "
                         "\"<portgroup name='%s'>\""),
                       def->name, portgroup.name);
        goto cleanup;
    }

4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054
    /* if there is already a different default, we can't make this
     * one the default.
     */
    if (command != VIR_NETWORK_UPDATE_COMMAND_DELETE &&
        portgroup.isDefault &&
        foundDefault >= 0 && foundDefault != foundName) {
        virReportError(VIR_ERR_OPERATION_INVALID,
                       _("a different portgroup entry in "
                         "network '%s' is already set as the default. "
                         "Only one default is allowed."),
                       def->name);
        goto cleanup;
    }

4055 4056 4057
    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {

        /* replace existing entry */
4058 4059
        virPortGroupDefClear(&def->portGroups[foundName]);
        def->portGroups[foundName] = portgroup;
4060 4061 4062 4063 4064 4065
        memset(&portgroup, 0, sizeof(portgroup));

    } else if ((command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST) ||
        (command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST)) {

        /* add to beginning/end of list */
4066 4067 4068 4069
        if (VIR_INSERT_ELEMENT(def->portGroups,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : def->nPortGroups,
                               def->nPortGroups, portgroup) < 0)
4070 4071 4072 4073
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        /* remove it */
4074
        virPortGroupDefClear(&def->portGroups[foundName]);
4075 4076
        VIR_DELETE_ELEMENT(def->portGroups, foundName, def->nPortGroups);

4077 4078 4079
    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
4080 4081 4082
    }

    ret = 0;
4083
 cleanup:
4084 4085
    virPortGroupDefClear(&portgroup);
    return ret;
4086 4087 4088 4089 4090 4091 4092 4093 4094 4095
}

static int
virNetworkDefUpdateDNSHost(virNetworkDefPtr def,
                           unsigned int command ATTRIBUTE_UNUSED,
                           int parentIndex ATTRIBUTE_UNUSED,
                           xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                           /* virNetworkUpdateFlags */
                           unsigned int fflags ATTRIBUTE_UNUSED)
{
4096 4097
    size_t i, j, k;
    int foundIdx = -1, ret = -1;
4098 4099 4100 4101
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSHostDef host;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);
4102
    int foundCt = 0;
4103 4104 4105 4106

    memset(&host, 0, sizeof(host));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4107
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4108 4109 4110 4111 4112 4113 4114 4115 4116 4117 4118
                       _("DNS HOST records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "host") < 0)
        goto cleanup;

    if (virNetworkDNSHostDefParseXML(def->name, ctxt->node, &host, !isAdd) < 0)
        goto cleanup;

4119
    for (i = 0; i < dns->nhosts; i++) {
4120 4121
        bool foundThisTime = false;

4122
        if (virSocketAddrEqual(&host.ip, &dns->hosts[i].ip))
4123 4124
            foundThisTime = true;

4125 4126 4127
        for (j = 0; j < host.nnames && !foundThisTime; j++) {
            for (k = 0; k < dns->hosts[i].nnames && !foundThisTime; k++) {
                if (STREQ(host.names[j], dns->hosts[i].names[k]))
4128 4129 4130 4131 4132
                    foundThisTime = true;
            }
        }
        if (foundThisTime) {
            foundCt++;
4133
            foundIdx = i;
4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147
        }
    }

    if (isAdd) {

        if (foundCt > 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already at least one DNS HOST "
                             "record with a matching field in network %s"),
                           def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4148 4149 4150
        if (VIR_INSERT_ELEMENT(dns->hosts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->nhosts, dns->nhosts, host) < 0)
4151 4152 4153 4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundCt == 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS HOST "
                             "record in network %s"), def->name);
            goto cleanup;
        }
        if (foundCt > 1) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("multiple matching DNS HOST records were "
                             "found in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSHostDefClear(&dns->hosts[foundIdx]);
        VIR_DELETE_ELEMENT(dns->hosts, foundIdx, dns->nhosts);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4177
 cleanup:
4178 4179
    virNetworkDNSHostDefClear(&host);
    return ret;
4180 4181 4182
}

static int
4183
virNetworkDefUpdateDNSSrv(virNetworkDefPtr def,
4184 4185 4186 4187 4188 4189
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
4190 4191
    size_t i;
    int foundIdx = -1, ret = -1;
4192 4193 4194 4195
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSSrvDef srv;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);
4196
    int foundCt = 0;
4197 4198 4199 4200

    memset(&srv, 0, sizeof(srv));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4201
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4202 4203 4204 4205 4206 4207 4208 4209 4210 4211 4212
                       _("DNS SRV records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "srv") < 0)
        goto cleanup;

    if (virNetworkDNSSrvDefParseXML(def->name, ctxt->node, ctxt, &srv, !isAdd) < 0)
        goto cleanup;

4213 4214 4215 4216 4217
    for (i = 0; i < dns->nsrvs; i++) {
        if ((!srv.domain || STREQ_NULLABLE(srv.domain, dns->srvs[i].domain)) &&
            (!srv.service || STREQ_NULLABLE(srv.service, dns->srvs[i].service)) &&
            (!srv.protocol || STREQ_NULLABLE(srv.protocol, dns->srvs[i].protocol)) &&
            (!srv.target || STREQ_NULLABLE(srv.target, dns->srvs[i].target))) {
4218
            foundCt++;
4219
            foundIdx = i;
4220 4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231 4232 4233
        }
    }

    if (isAdd) {

        if (foundCt > 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already at least one DNS SRV "
                             "record matching all specified fields in network %s"),
                           def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4234 4235 4236
        if (VIR_INSERT_ELEMENT(dns->srvs,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->nsrvs, dns->nsrvs, srv) < 0)
4237 4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257 4258 4259 4260 4261 4262
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundCt == 0) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS SRV "
                             "record in network %s"), def->name);
            goto cleanup;
        }
        if (foundCt > 1) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("multiple DNS SRV records matching all specified "
                             "fields were found in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSSrvDefClear(&dns->srvs[foundIdx]);
        VIR_DELETE_ELEMENT(dns->srvs, foundIdx, dns->nsrvs);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4263
 cleanup:
4264 4265
    virNetworkDNSSrvDefClear(&srv);
    return ret;
4266 4267 4268
}

static int
4269
virNetworkDefUpdateDNSTxt(virNetworkDefPtr def,
4270 4271 4272 4273 4274 4275
                          unsigned int command ATTRIBUTE_UNUSED,
                          int parentIndex ATTRIBUTE_UNUSED,
                          xmlXPathContextPtr ctxt ATTRIBUTE_UNUSED,
                          /* virNetworkUpdateFlags */
                          unsigned int fflags ATTRIBUTE_UNUSED)
{
4276 4277 4278 4279 4280 4281 4282 4283 4284
    int foundIdx, ret = -1;
    virNetworkDNSDefPtr dns = &def->dns;
    virNetworkDNSTxtDef txt;
    bool isAdd = (command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST ||
                  command == VIR_NETWORK_UPDATE_COMMAND_ADD_LAST);

    memset(&txt, 0, sizeof(txt));

    if (command == VIR_NETWORK_UPDATE_COMMAND_MODIFY) {
4285
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4286 4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307 4308 4309 4310 4311 4312
                       _("DNS TXT records cannot be modified, "
                         "only added or deleted"));
        goto cleanup;
    }

    if (virNetworkDefUpdateCheckElementName(def, ctxt->node, "txt") < 0)
        goto cleanup;

    if (virNetworkDNSTxtDefParseXML(def->name, ctxt->node, &txt, !isAdd) < 0)
        goto cleanup;

    for (foundIdx = 0; foundIdx < dns->ntxts; foundIdx++) {
        if (STREQ(txt.name, dns->txts[foundIdx].name))
            break;
    }

    if (isAdd) {

        if (foundIdx < dns->ntxts) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("there is already a DNS TXT record "
                             "with name '%s' in network %s"),
                           txt.name, def->name);
            goto cleanup;
        }

        /* add to beginning/end of list */
4313 4314 4315
        if (VIR_INSERT_ELEMENT(dns->txts,
                               command == VIR_NETWORK_UPDATE_COMMAND_ADD_FIRST
                               ? 0 : dns->ntxts, dns->ntxts, txt) < 0)
4316 4317 4318 4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331 4332 4333 4334 4335
            goto cleanup;
    } else if (command == VIR_NETWORK_UPDATE_COMMAND_DELETE) {

        if (foundIdx == dns->ntxts) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("couldn't locate a matching DNS TXT "
                             "record in network %s"), def->name);
            goto cleanup;
        }

        /* remove it */
        virNetworkDNSTxtDefClear(&dns->txts[foundIdx]);
        VIR_DELETE_ELEMENT(dns->txts, foundIdx, dns->ntxts);

    } else {
        virNetworkDefUpdateUnknownCommand(command);
        goto cleanup;
    }

    ret = 0;
4336
 cleanup:
4337 4338
    virNetworkDNSTxtDefClear(&txt);
    return ret;
4339 4340
}

J
Ján Tomko 已提交
4341
int
4342 4343 4344 4345 4346 4347 4348 4349 4350 4351 4352 4353 4354 4355 4356 4357 4358 4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373 4374 4375 4376 4377 4378 4379 4380 4381 4382 4383 4384 4385 4386 4387
virNetworkDefUpdateSection(virNetworkDefPtr def,
                           unsigned int command, /* virNetworkUpdateCommand */
                           unsigned int section, /* virNetworkUpdateSection */
                           int parentIndex,
                           const char *xml,
                           unsigned int flags)  /* virNetworkUpdateFlags */
{
    int ret = -1;
    xmlDocPtr doc;
    xmlXPathContextPtr ctxt = NULL;

    if (!(doc = virXMLParseStringCtxt(xml, _("network_update_xml"), &ctxt)))
        goto cleanup;

    switch (section) {
    case VIR_NETWORK_SECTION_BRIDGE:
       ret = virNetworkDefUpdateBridge(def, command, parentIndex, ctxt, flags);
        break;

    case VIR_NETWORK_SECTION_DOMAIN:
        ret = virNetworkDefUpdateDomain(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP:
        ret = virNetworkDefUpdateIP(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP_DHCP_HOST:
        ret = virNetworkDefUpdateIPDHCPHost(def, command,
                                            parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_IP_DHCP_RANGE:
        ret = virNetworkDefUpdateIPDHCPRange(def, command,
                                             parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD:
        ret = virNetworkDefUpdateForward(def, command,
                                         parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD_INTERFACE:
        ret = virNetworkDefUpdateForwardInterface(def, command,
                                                  parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_FORWARD_PF:
        ret = virNetworkDefUpdateForwardPF(def, command,
                                           parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_PORTGROUP:
4388
        ret = virNetworkDefUpdatePortGroup(def, command,
4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401
                                           parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_HOST:
        ret = virNetworkDefUpdateDNSHost(def, command,
                                         parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_TXT:
        ret = virNetworkDefUpdateDNSTxt(def, command, parentIndex, ctxt, flags);
        break;
    case VIR_NETWORK_SECTION_DNS_SRV:
        ret = virNetworkDefUpdateDNSSrv(def, command, parentIndex, ctxt, flags);
        break;
    default:
4402
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4403 4404 4405 4406
                       _("can't update unrecognized section of network"));
        break;
    }

4407
 cleanup:
4408 4409 4410 4411 4412 4413 4414 4415 4416 4417 4418 4419 4420 4421 4422 4423 4424 4425 4426 4427 4428 4429 4430 4431 4432 4433 4434 4435
    xmlFreeDoc(doc);
    xmlXPathFreeContext(ctxt);
    return ret;
}

/*
 * virNetworkObjUpdate:
 *
 * Apply the supplied update to the given virNetworkObj. Except for
 * @network pointing to an actual network object rather than the
 * opaque virNetworkPtr, parameters are identical to the public API
 * virNetworkUpdate.
 *
 * The original virNetworkDefs are copied, and all modifications made
 * to these copies. The originals are replaced with the copies only
 * after success has been guaranteed.
 *
 * Returns: -1 on error, 0 on success.
 */
int
virNetworkObjUpdate(virNetworkObjPtr network,
                    unsigned int command, /* virNetworkUpdateCommand */
                    unsigned int section, /* virNetworkUpdateSection */
                    int parentIndex,
                    const char *xml,
                    unsigned int flags)  /* virNetworkUpdateFlags */
{
    int ret = -1;
4436
    virNetworkDefPtr livedef = NULL, configdef = NULL;
4437 4438 4439 4440 4441 4442

    /* normalize config data, and check for common invalid requests. */
    if (virNetworkConfigChangeSetup(network, flags) < 0)
       goto cleanup;

    if (flags & VIR_NETWORK_UPDATE_AFFECT_LIVE) {
4443 4444
        virNetworkDefPtr checkdef;

4445
        /* work on a copy of the def */
4446
        if (!(livedef = virNetworkDefCopy(network->def, 0)))
4447
            goto cleanup;
4448
        if (virNetworkDefUpdateSection(livedef, command, section,
4449 4450 4451
                                       parentIndex, xml, flags) < 0) {
            goto cleanup;
        }
4452 4453 4454 4455 4456 4457
        /* run a final format/parse cycle to make sure we didn't
         * add anything illegal to the def
         */
        if (!(checkdef = virNetworkDefCopy(livedef, 0)))
            goto cleanup;
        virNetworkDefFree(checkdef);
4458 4459 4460
    }

    if (flags & VIR_NETWORK_UPDATE_AFFECT_CONFIG) {
4461 4462
        virNetworkDefPtr checkdef;

4463
        /* work on a copy of the def */
4464 4465
        if (!(configdef = virNetworkDefCopy(virNetworkObjGetPersistentDef(network),
                                            VIR_NETWORK_XML_INACTIVE))) {
4466 4467
            goto cleanup;
        }
4468
        if (virNetworkDefUpdateSection(configdef, command, section,
4469 4470 4471
                                       parentIndex, xml, flags) < 0) {
            goto cleanup;
        }
4472 4473 4474 4475 4476 4477 4478 4479
        if (!(checkdef = virNetworkDefCopy(configdef,
                                           VIR_NETWORK_XML_INACTIVE))) {
            goto cleanup;
        }
        virNetworkDefFree(checkdef);
    }

    if (configdef) {
4480
        /* successfully modified copy, now replace original */
4481
        if (virNetworkObjReplacePersistentDef(network, configdef) < 0)
4482
           goto cleanup;
4483 4484 4485 4486 4487 4488 4489
        configdef = NULL;
    }
    if (livedef) {
        /* successfully modified copy, now replace original */
        virNetworkDefFree(network->def);
        network->def = livedef;
        livedef = NULL;
4490 4491 4492
    }

    ret = 0;
4493
 cleanup:
4494 4495
    virNetworkDefFree(livedef);
    virNetworkDefFree(configdef);
4496 4497 4498
    return ret;
}

4499 4500
#define MATCH(FLAG) (flags & (FLAG))
static bool
4501 4502
virNetworkMatch(virNetworkObjPtr netobj,
                unsigned int flags)
4503 4504 4505 4506 4507 4508 4509 4510 4511 4512 4513 4514 4515 4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526 4527 4528 4529 4530 4531
{
    /* filter by active state */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_ACTIVE) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_ACTIVE) &&
           virNetworkObjIsActive(netobj)) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_INACTIVE) &&
           !virNetworkObjIsActive(netobj))))
        return false;

    /* filter by persistence */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_PERSISTENT) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_PERSISTENT) &&
           netobj->persistent) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_TRANSIENT) &&
           !netobj->persistent)))
        return false;

    /* filter by autostart option */
    if (MATCH(VIR_CONNECT_LIST_NETWORKS_FILTERS_AUTOSTART) &&
        !((MATCH(VIR_CONNECT_LIST_NETWORKS_AUTOSTART) &&
           netobj->autostart) ||
          (MATCH(VIR_CONNECT_LIST_NETWORKS_NO_AUTOSTART) &&
           !netobj->autostart)))
        return false;

    return true;
}
#undef MATCH

4532 4533 4534 4535 4536 4537 4538 4539 4540
struct virNetworkObjListData {
    virConnectPtr conn;
    virNetworkPtr *nets;
    virNetworkObjListFilter filter;
    unsigned int flags;
    int nnets;
    bool error;
};

4541
static int
4542 4543 4544 4545 4546 4547 4548 4549 4550
virNetworkObjListPopulate(void *payload,
                          const void *name ATTRIBUTE_UNUSED,
                          void *opaque)
{
    struct virNetworkObjListData *data = opaque;
    virNetworkObjPtr obj = payload;
    virNetworkPtr net = NULL;

    if (data->error)
4551
        return 0;
4552

4553
    virObjectLock(obj);
4554 4555 4556 4557 4558 4559 4560 4561 4562 4563 4564 4565 4566 4567 4568 4569 4570 4571 4572 4573 4574

    if (data->filter &&
        !data->filter(data->conn, obj->def))
        goto cleanup;

    if (!virNetworkMatch(obj, data->flags))
        goto cleanup;

    if (!data->nets) {
        data->nnets++;
        goto cleanup;
    }

    if (!(net = virGetNetwork(data->conn, obj->def->name, obj->def->uuid))) {
        data->error = true;
        goto cleanup;
    }

    data->nets[data->nnets++] = net;

 cleanup:
4575
    virObjectUnlock(obj);
4576
    return 0;
4577 4578
}

4579
int
4580
virNetworkObjListExport(virConnectPtr conn,
4581
                        virNetworkObjListPtr netobjs,
4582 4583 4584
                        virNetworkPtr **nets,
                        virNetworkObjListFilter filter,
                        unsigned int flags)
4585 4586
{
    int ret = -1;
4587
    struct virNetworkObjListData data = { conn, NULL, filter, flags, 0, false};
4588

4589
    virObjectLock(netobjs);
4590
    if (nets && VIR_ALLOC_N(data.nets, virHashSize(netobjs->objs) + 1) < 0)
4591
        goto cleanup;
4592

4593 4594 4595 4596
    virHashForEach(netobjs->objs, virNetworkObjListPopulate, &data);

    if (data.error)
        goto cleanup;
4597

4598
    if (data.nets) {
4599
        /* trim the array to the final size */
4600 4601 4602
        ignore_value(VIR_REALLOC_N(data.nets, data.nnets + 1));
        *nets = data.nets;
        data.nets = NULL;
4603 4604
    }

4605
    ret = data.nnets;
4606
 cleanup:
4607
    virObjectUnlock(netobjs);
4608 4609
    while (data.nets && data.nnets)
        virObjectUnref(data.nets[--data.nnets]);
4610

4611
    VIR_FREE(data.nets);
4612 4613
    return ret;
}
4614

4615 4616 4617 4618 4619 4620
struct virNetworkObjListForEachHelperData {
    virNetworkObjListIterator callback;
    void *opaque;
    int ret;
};

4621
static int
4622 4623 4624 4625 4626 4627 4628 4629
virNetworkObjListForEachHelper(void *payload,
                               const void *name ATTRIBUTE_UNUSED,
                               void *opaque)
{
    struct virNetworkObjListForEachHelperData *data = opaque;

    if (data->callback(payload, data->opaque) < 0)
        data->ret = -1;
4630
    return 0;
4631 4632
}

4633 4634 4635 4636 4637 4638 4639
/**
 * virNetworkObjListForEach:
 * @nets: a list of network objects
 * @callback: function to call over each of object in the list
 * @opaque: pointer to pass to the @callback
 *
 * Function iterates over the list of network objects and calls
4640 4641 4642
 * passed callback over each one of them. You should avoid
 * calling those virNetworkObjList APIs, which lock the list
 * again in favor of their virNetworkObj*Locked variants.
4643 4644 4645 4646 4647 4648 4649 4650
 *
 * Returns: 0 on success, -1 otherwise.
 */
int
virNetworkObjListForEach(virNetworkObjListPtr nets,
                         virNetworkObjListIterator callback,
                         void *opaque)
{
4651
    struct virNetworkObjListForEachHelperData data = {callback, opaque, 0};
4652
    virObjectLock(nets);
4653
    virHashForEach(nets->objs, virNetworkObjListForEachHelper, &data);
4654
    virObjectUnlock(nets);
4655 4656 4657 4658 4659 4660 4661 4662 4663 4664 4665 4666
    return data.ret;
}

struct virNetworkObjListGetHelperData {
    virConnectPtr conn;
    virNetworkObjListFilter filter;
    char **names;
    int nnames;
    bool active;
    int got;
    bool error;
};
4667

4668
static int
4669 4670 4671 4672 4673 4674 4675 4676
virNetworkObjListGetHelper(void *payload,
                           const void *name ATTRIBUTE_UNUSED,
                           void *opaque)
{
    struct virNetworkObjListGetHelperData *data = opaque;
    virNetworkObjPtr obj = payload;

    if (data->error)
4677
        return 0;
4678 4679 4680

    if (data->nnames >= 0 &&
        data->got == data->nnames)
4681
        return 0;
4682

4683
    virObjectLock(obj);
4684 4685 4686 4687 4688 4689 4690 4691 4692 4693 4694 4695 4696

    if (data->filter &&
        !data->filter(data->conn, obj->def))
        goto cleanup;

    if ((data->active && virNetworkObjIsActive(obj)) ||
        (!data->active && !virNetworkObjIsActive(obj))) {
        if (data->names &&
            VIR_STRDUP(data->names[data->got], obj->def->name) < 0) {
            data->error = true;
            goto cleanup;
        }
        data->got++;
4697 4698
    }

4699
 cleanup:
4700
    virObjectUnlock(obj);
4701
    return 0;
4702
}
4703 4704 4705 4706 4707 4708 4709 4710 4711

int
virNetworkObjListGetNames(virNetworkObjListPtr nets,
                          bool active,
                          char **names,
                          int nnames,
                          virNetworkObjListFilter filter,
                          virConnectPtr conn)
{
4712
    int ret = -1;
4713

4714 4715
    struct virNetworkObjListGetHelperData data = {
        conn, filter, names, nnames, active, 0, false};
4716

4717
    virObjectLock(nets);
4718
    virHashForEach(nets->objs, virNetworkObjListGetHelper, &data);
4719
    virObjectUnlock(nets);
4720

4721 4722
    if (data.error)
        goto cleanup;
4723

4724 4725 4726 4727 4728 4729 4730
    ret = data.got;
 cleanup:
    if (ret < 0) {
        while (data.got)
            VIR_FREE(data.names[--data.got]);
    }
    return ret;
4731
}
4732 4733 4734 4735 4736 4737 4738

int
virNetworkObjListNumOfNetworks(virNetworkObjListPtr nets,
                               bool active,
                               virNetworkObjListFilter filter,
                               virConnectPtr conn)
{
4739 4740
    struct virNetworkObjListGetHelperData data = {
        conn, filter, NULL, -1, active, 0, false};
4741

4742
    virObjectLock(nets);
4743
    virHashForEach(nets->objs, virNetworkObjListGetHelper, &data);
4744
    virObjectUnlock(nets);
4745

4746 4747 4748 4749 4750 4751
    return data.got;
}

struct virNetworkObjListPruneHelperData {
    unsigned int flags;
};
4752

4753 4754 4755 4756 4757 4758 4759 4760 4761
static int
virNetworkObjListPruneHelper(const void *payload,
                             const void *name ATTRIBUTE_UNUSED,
                             const void *opaque)
{
    const struct virNetworkObjListPruneHelperData *data = opaque;
    virNetworkObjPtr obj = (virNetworkObjPtr) payload;
    int want = 0;

4762
    virObjectLock(obj);
4763
    want = virNetworkMatch(obj, data->flags);
4764
    virObjectUnlock(obj);
4765
    return want;
4766
}
4767 4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779

/**
 * virNetworkObjListPrune:
 * @nets: a list of network objects
 * @flags: bitwise-OR of virConnectListAllNetworksFlags
 *
 * Iterate over list of network objects and remove the desired
 * ones from it.
 */
void
virNetworkObjListPrune(virNetworkObjListPtr nets,
                       unsigned int flags)
{
4780
    struct virNetworkObjListPruneHelperData data = {flags};
4781

4782
    virObjectLock(nets);
4783
    virHashRemoveSet(nets->objs, virNetworkObjListPruneHelper, &data);
4784
    virObjectUnlock(nets);
4785
}