1 package PVE
::Network
::SDN
::Zones
::Plugin
;
6 use PVE
::Tools
qw(run_command);
12 use PVE
::JSONSchema
qw(get_standard_option);
13 use base
qw(PVE::SectionConfig);
15 PVE
::Cluster
::cfs_register_file
('sdn/zones.cfg',
16 sub { __PACKAGE__-
>parse_config(@_); },
17 sub { __PACKAGE__-
>write_config(@_); });
19 PVE
::JSONSchema
::register_standard_option
('pve-sdn-zone-id', {
20 description
=> "The SDN zone object identifier.",
21 type
=> 'string', format
=> 'pve-sdn-zone-id',
24 PVE
::JSONSchema
::register_format
('pve-sdn-zone-id', \
&parse_sdn_zone_id
);
25 sub parse_sdn_zone_id
{
26 my ($id, $noerr) = @_;
28 if ($id !~ m/^[a-z][a-z0-9]*[a-z0-9]$/i) {
29 return undef if $noerr;
30 die "zone ID '$id' contains illegal characters\n";
32 die "zone ID '$id' can't be more length than 8 characters\n" if length($id) > 8;
40 description
=> "Plugin type.",
41 type
=> 'string', format
=> 'pve-configid',
44 nodes
=> get_standard_option
('pve-node-list', { optional
=> 1 }),
45 zone
=> get_standard_option
('pve-sdn-zone-id',
46 { completion
=> \
&PVE
::Network
::SDN
::Zones
::complete_sdn_zone
}),
49 description
=> "use a specific ipam",
58 sub parse_section_header
{
59 my ($class, $line) = @_;
61 if ($line =~ m/^(\S+):\s*(\S+)\s*$/) {
62 my ($type, $id) = (lc($1), $2);
63 my $errmsg = undef; # set if you want to skip whole section
64 eval { PVE
::JSONSchema
::pve_verify_configid
($type); };
66 my $config = {}; # to return additional attributes
67 return ($type, $id, $errmsg, $config);
72 sub generate_sdn_config
{
73 my ($class, $plugin_config, $zoneid, $vnetid, $vnet, $controller, $controller_cfg, $subnet_cfg, $interfaces_config, $config) = @_;
75 die "please implement inside plugin";
78 sub generate_controller_config
{
79 my ($class, $plugin_config, $controller, $id, $uplinks, $config) = @_;
81 die "please implement inside plugin";
84 sub generate_controller_vnet_config
{
85 my ($class, $plugin_config, $controller, $zoneid, $vnetid, $config) = @_;
89 sub write_controller_config
{
90 my ($class, $plugin_config, $config) = @_;
92 die "please implement inside plugin";
95 sub controller_reload
{
98 die "please implement inside plugin";
102 my ($class, $zoneid, $vnet_cfg) = @_;
104 # verify that no vnet are associated to this zone
105 foreach my $id (keys %{$vnet_cfg->{ids
}}) {
106 my $vnet = $vnet_cfg->{ids
}->{$id};
107 die "zone $zoneid is used by vnet $id"
108 if ($vnet->{type
} eq 'vnet' && defined($vnet->{zone
}) && $vnet->{zone
} eq $zoneid);
113 my ($class, $zoneid, $zone_cfg, $controller_cfg) = @_;
115 # do nothing by default
118 sub vnet_update_hook
{
119 my ($class, $vnet_cfg, $vnetid, $zone_cfg) = @_;
121 # do nothing by default
125 sub parse_tag_number_or_range
{
126 my ($str, $max, $tag) = @_;
128 my @elements = split(/,/, $str);
132 die "extraneous commas in list\n" if $str ne join(',', @elements);
133 foreach my $item (@elements) {
134 if ($item =~ m/^([0-9]+)-([0-9]+)$/) {
136 my ($port1, $port2) = ($1, $2);
137 die "invalid port '$port1'\n" if $port1 > $max;
138 die "invalid port '$port2'\n" if $port2 > $max;
139 die "backwards range '$port1:$port2' not allowed, did you mean '$port2:$port1'?\n" if $port1 > $port2;
141 if ($tag && $tag >= $port1 && $tag <= $port2){
146 } elsif ($item =~ m/^([0-9]+)$/) {
149 die "invalid port '$port'\n" if $port > $max;
151 if ($tag && $tag == $port){
157 die "tag $tag is not allowed" if $tag && !$allowed;
159 return (scalar(@elements) > 1);
163 my ($class, $plugin_config, $zone, $vnetid, $vnet, $status) = @_;
168 my $ifaces = [ $vnetid ];
170 foreach my $iface (@{$ifaces}) {
171 if (!$status->{$iface}->{status
}) {
172 push @$err_msg, "missing $iface";
173 } elsif ($status->{$iface}->{status
} ne 'pass') {
174 push @$err_msg, "error $iface";
182 my ($class, $plugin_config, $vnet, $iface, $vnetid) = @_;
184 PVE
::Network
::tap_create
($iface, $vnetid);
188 my ($class, $plugin_config, $vnet, $veth, $vethpeer, $vnetid, $hwaddr) = @_;
190 PVE
::Network
::veth_create
($veth, $vethpeer, $vnetid, $hwaddr);
194 my ($class, $plugin_config, $vnet, $tag, $iface, $vnetid, $firewall, $trunks, $rate) = @_;
196 my $vlan_aware = PVE
::Tools
::file_read_firstline
("/sys/class/net/$vnetid/bridge/vlan_filtering");
197 die "vm vlans are not allowed on vnet $vnetid" if !$vlan_aware && ($tag || $trunks);
199 PVE
::Network
::tap_plug
($iface, $vnetid, $tag, $firewall, $trunks, $rate);
204 sub get_uplink_iface
{
205 my ($interfaces_config, $uplink) = @_;
208 foreach my $id (keys %{$interfaces_config->{ifaces
}}) {
209 my $interface = $interfaces_config->{ifaces
}->{$id};
210 if (my $iface_uplink = $interface->{'uplink-id'}) {
211 next if $iface_uplink ne $uplink;
212 if($interface->{type
} ne 'eth' && $interface->{type
} ne 'bond') {
213 warn "uplink $uplink is not a physical or bond interface";
220 #create a dummy uplink interface if no uplink found
222 warn "can't find uplink $uplink in physical interface";
223 $iface = "uplink${uplink}";
229 sub get_local_route_ip
{
233 my $interface = undef;
235 run_command
(['/sbin/ip', 'route', 'get', $targetip], outfunc
=> sub {
236 if ($_[0] =~ m/src ($PVE::Tools::IPRE)/) {
239 if ($_[0] =~ m/dev (\S+)/) {
244 return ($ip, $interface);
248 sub find_local_ip_interface_peers
{
249 my ($peers, $iface) = @_;
251 my $network_config = PVE
::INotify
::read_file
('interfaces');
252 my $ifaces = $network_config->{ifaces
};
254 #if iface is defined, return ip if exist (if not,try to find it on other ifaces)
256 my $ip = $ifaces->{$iface}->{address
};
257 return ($ip,$iface) if $ip;
260 #is a local ip member of peers list ?
261 foreach my $address (@{$peers}) {
262 while (my $interface = each %$ifaces) {
263 my $ip = $ifaces->{$interface}->{address
};
264 if ($ip && $ip eq $address) {
265 return ($ip, $interface);
270 #if peer is remote, find source with ip route
271 foreach my $address (@{$peers}) {
272 my ($ip, $interface) = get_local_route_ip
($address);
273 return ($ip, $interface);