]> git.proxmox.com Git - mirror_ifupdown2.git/blob - ifupdown2/nlmanager/nlmanager.py
debian: changelog: update 1.2.6-1 entry
[mirror_ifupdown2.git] / ifupdown2 / nlmanager / nlmanager.py
1 #!/usr/bin/env python
2 #
3 # Copyright (C) 2015, 2017 Cumulus Networks, Inc. all rights reserved
4 #
5 # This program is free software; you can redistribute it and/or
6 # modify it under the terms of the GNU General Public License as
7 # published by the Free Software Foundation; version 2.
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 # General Public License for more details.
13 #
14 # You should have received a copy of the GNU General Public License
15 # along with this program; if not, write to the Free Software
16 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
17 # 02110-1301, USA.
18 #
19 # https://www.gnu.org/licenses/gpl-2.0-standalone.html
20 #
21 # Authors:
22 # Daniel Walton, dwalton@cumulusnetworks.com
23 # Julien Fortin, julien@cumulusnetworks.com
24 #
25 # Netlink Manager --
26 #
27
28 from collections import OrderedDict
29 from ipaddr import IPv4Address, IPv6Address
30 from nlpacket import *
31 from select import select
32 from struct import pack, unpack
33 import logging
34 import os
35 import socket
36
37 log = logging.getLogger(__name__)
38
39
40 class NetlinkError(Exception):
41 pass
42
43
44 class NetlinkNoAddressError(NetlinkError):
45 pass
46
47
48 class NetlinkInterruptedSystemCall(NetlinkError):
49 pass
50
51
52 class InvalidInterfaceNameVlanCombo(Exception):
53 pass
54
55
56 class Sequence(object):
57
58 def __init__(self):
59 self._next = 0
60
61 def next(self):
62 self._next += 1
63 return self._next
64
65
66 class NetlinkManager(object):
67
68 def __init__(self, pid_offset=0, use_color=True, log_level=None):
69 # PID_MAX_LIMIT is 2^22 allowing 1024 sockets per-pid. We default to 0
70 # in the upper space (top 10 bits), which will simply be the PID. Other
71 # NetlinkManager instantiations in the same process can choose other
72 # offsets to avoid conflicts with each other.
73 self.pid = os.getpid() | (pid_offset << 22)
74 self.sequence = Sequence()
75 self.shutdown_flag = False
76 self.ifindexmap = {}
77 self.tx_socket = None
78 self.use_color = use_color
79
80 # debugs
81 self.debug = {}
82 self.debug_link(False)
83 self.debug_address(False)
84 self.debug_neighbor(False)
85 self.debug_route(False)
86
87 if log_level:
88 log.setLevel(log_level)
89 set_log_level(log_level)
90
91 def __str__(self):
92 return 'NetlinkManager'
93
94 def signal_term_handler(self, signal, frame):
95 log.info("NetlinkManager: Caught SIGTERM")
96 self.shutdown_flag = True
97
98 def signal_int_handler(self, signal, frame):
99 log.info("NetlinkManager: Caught SIGINT")
100 self.shutdown_flag = True
101
102 def shutdown(self):
103 if self.tx_socket:
104 self.tx_socket.close()
105 self.tx_socket = None
106 log.info("NetlinkManager: shutdown complete")
107
108 def _debug_set_clear(self, msg_types, enabled):
109 """
110 Enable or disable debugs for all msgs_types messages
111 """
112
113 for x in msg_types:
114 if enabled:
115 self.debug[x] = True
116 else:
117 if x in self.debug:
118 del self.debug[x]
119
120 def debug_link(self, enabled):
121 self._debug_set_clear((RTM_NEWLINK, RTM_DELLINK, RTM_GETLINK, RTM_SETLINK), enabled)
122
123 def debug_address(self, enabled):
124 self._debug_set_clear((RTM_NEWADDR, RTM_DELADDR, RTM_GETADDR), enabled)
125
126 def debug_neighbor(self, enabled):
127 self._debug_set_clear((RTM_NEWNEIGH, RTM_DELNEIGH, RTM_GETNEIGH), enabled)
128
129 def debug_route(self, enabled):
130 self._debug_set_clear((RTM_NEWROUTE, RTM_DELROUTE, RTM_GETROUTE), enabled)
131
132 def debug_netconf(self, enabled):
133 self._debug_set_clear((RTM_GETNETCONF, RTM_NEWNETCONF), enabled)
134
135 def debug_this_packet(self, mtype):
136 if mtype in self.debug:
137 return True
138 return False
139
140 def tx_socket_allocate(self):
141 """
142 The TX socket is used for install requests, sending RTM_GETXXXX
143 requests, etc
144 """
145 self.tx_socket = socket.socket(socket.AF_NETLINK, socket.SOCK_RAW, 0)
146 self.tx_socket.bind((self.pid, 0))
147
148 def tx_nlpacket_raw(self, message):
149 """
150 TX a bunch of concatenated nlpacket.messages....do NOT wait for an ACK
151 """
152 if not self.tx_socket:
153 self.tx_socket_allocate()
154 self.tx_socket.sendall(message)
155
156 def tx_nlpacket(self, nlpacket):
157 """
158 TX a netlink packet but do NOT wait for an ACK
159 """
160 if not nlpacket.message:
161 log.error('You must first call build_message() to create the packet')
162 return
163
164 if not self.tx_socket:
165 self.tx_socket_allocate()
166 self.tx_socket.sendall(nlpacket.message)
167
168 def tx_nlpacket_get_response(self, nlpacket):
169
170 if not nlpacket.message:
171 log.error('You must first call build_message() to create the packet')
172 return
173
174 if not self.tx_socket:
175 self.tx_socket_allocate()
176 self.tx_socket.sendall(nlpacket.message)
177
178 # If nlpacket.debug is True we already printed the following in the
179 # build_message() call...so avoid printing two messages for one packet.
180 if not nlpacket.debug:
181 log.debug("TXed %12s, pid %d, seq %d, %d bytes" %
182 (nlpacket.get_type_string(), nlpacket.pid, nlpacket.seq, nlpacket.length))
183
184 header_PACK = NetlinkPacket.header_PACK
185 header_LEN = NetlinkPacket.header_LEN
186 null_read = 0
187 nle_intr_count = 0
188 MAX_NULL_READS = 3
189 MAX_ERROR_NLE_INTR = 3
190 msgs = []
191
192 # Now listen to our socket and wait for the reply
193 while True:
194
195 if self.shutdown_flag:
196 log.info('shutdown flag is True, exiting')
197 return msgs
198
199 # Only block for 1 second so we can wake up to see if self.shutdown_flag is True
200 try:
201 (readable, writeable, exceptional) = select([self.tx_socket, ], [], [self.tx_socket, ], 1)
202 except Exception as e:
203 # 4 is Interrupted system call
204 if isinstance(e.args, tuple) and e[0] == 4:
205 nle_intr_count += 1
206 log.info("select() Interrupted system call %d/%d" % (nle_intr_count, MAX_ERROR_NLE_INTR))
207
208 if nle_intr_count >= MAX_ERROR_NLE_INTR:
209 raise NetlinkInterruptedSystemCall(error_str)
210 else:
211 continue
212 else:
213 raise
214
215 if readable:
216 null_read = 0
217 else:
218 null_read += 1
219
220 # Safety net to make sure we do not spend too much time in
221 # this while True loop
222 if null_read >= MAX_NULL_READS:
223 log.info('Socket was not readable for %d attempts' % null_read)
224 return msgs
225 else:
226 continue
227
228 for s in readable:
229 data = []
230
231 try:
232 data = s.recv(4096)
233 except Exception as e:
234 # 4 is Interrupted system call
235 if isinstance(e.args, tuple) and e[0] == 4:
236 nle_intr_count += 1
237 log.info("%s: recv() Interrupted system call %d/%d" % (s, nle_intr_count, MAX_ERROR_NLE_INTR))
238
239 if nle_intr_count >= MAX_ERROR_NLE_INTR:
240 raise NetlinkInterruptedSystemCall(error_str)
241 else:
242 continue
243 else:
244 raise
245
246 if not data:
247 log.info('RXed zero length data, the socket is closed')
248 return msgs
249
250 while data:
251
252 # Extract the length, etc from the header
253 (length, msgtype, flags, seq, pid) = unpack(header_PACK, data[:header_LEN])
254
255 debug_str = "RXed %12s, pid %d, seq %d, %d bytes" % (NetlinkPacket.type_to_string[msgtype], pid, seq, length)
256
257 # This shouldn't happen but it would be nice to be aware of it if it does
258 if pid != nlpacket.pid:
259 log.debug(debug_str + '...we are not interested in this pid %s since ours is %s' %
260 (pid, nlpacket.pid))
261 data = data[length:]
262 continue
263
264 if seq != nlpacket.seq:
265 log.debug(debug_str + '...we are not interested in this seq %s since ours is %s' %
266 (seq, nlpacket.seq))
267 data = data[length:]
268 continue
269
270 # See if we RXed an ACK for our RTM_GETXXXX
271 if msgtype == NLMSG_DONE:
272 log.debug(debug_str + '...this is an ACK')
273 return msgs
274
275 elif msgtype == NLMSG_ERROR:
276
277 msg = Error(msgtype, nlpacket.debug)
278 msg.decode_packet(length, flags, seq, pid, data)
279
280 # The error code is a signed negative number.
281 error_code = abs(msg.negative_errno)
282
283 # 0 is NLE_SUCCESS...everything else is a true error
284 if error_code:
285
286 if self.debug:
287 msg.dump()
288
289 try:
290 # os.strerror might raise ValueError
291 strerror = os.strerror(error_code)
292
293 if strerror:
294 error_str = "operation failed with '%s' (%s)" % (strerror, error_code)
295 else:
296 error_str = "operation failed with code %s" % error_code
297
298 except ValueError:
299 error_str = "operation failed with code %s" % error_code
300
301 raise NetlinkError(error_str)
302 else:
303 log.debug('%s code NLE_SUCCESS...this is an ACK' % debug_str)
304 return msgs
305
306 # No ACK...create a nlpacket object and append it to msgs
307 else:
308 nle_intr_count = 0
309
310 if msgtype == RTM_NEWLINK or msgtype == RTM_DELLINK:
311 msg = Link(msgtype, nlpacket.debug, use_color=self.use_color)
312
313 elif msgtype == RTM_NEWADDR or msgtype == RTM_DELADDR:
314 msg = Address(msgtype, nlpacket.debug, use_color=self.use_color)
315
316 elif msgtype == RTM_NEWNEIGH or msgtype == RTM_DELNEIGH:
317 msg = Neighbor(msgtype, nlpacket.debug, use_color=self.use_color)
318
319 elif msgtype == RTM_NEWROUTE or msgtype == RTM_DELROUTE:
320 msg = Route(msgtype, nlpacket.debug, use_color=self.use_color)
321
322 elif msgtype in (RTM_GETNETCONF, RTM_NEWNETCONF):
323 msg = Netconf(msgtype, nlpacket.debug, use_color=self.use_color)
324
325 else:
326 raise Exception("RXed unknown netlink message type %s" % msgtype)
327
328 msg.decode_packet(length, flags, seq, pid, data)
329 msgs.append(msg)
330
331 if nlpacket.debug:
332 msg.dump()
333
334 data = data[length:]
335
336 def ip_to_afi(self, ip):
337 type_ip = type(ip)
338
339 if type_ip == IPv4Address:
340 return socket.AF_INET
341 elif type_ip == IPv6Address:
342 return socket.AF_INET6
343 else:
344 raise Exception("%s is an invalid IP type" % type_ip)
345
346 def request_dump(self, rtm_type, family, debug):
347 """
348 Issue a RTM_GETROUTE, etc with the NLM_F_DUMP flag
349 set and return the results
350 """
351
352 if rtm_type == RTM_GETADDR:
353 msg = Address(rtm_type, debug, use_color=self.use_color)
354 msg.body = pack('Bxxxi', family, 0)
355
356 elif rtm_type == RTM_GETLINK:
357 msg = Link(rtm_type, debug, use_color=self.use_color)
358 msg.body = pack('Bxxxiii', family, 0, 0, 0)
359
360 elif rtm_type == RTM_GETNEIGH:
361 msg = Neighbor(rtm_type, debug, use_color=self.use_color)
362 msg.body = pack('Bxxxii', family, 0, 0)
363
364 elif rtm_type == RTM_GETROUTE:
365 msg = Route(rtm_type, debug, use_color=self.use_color)
366 msg.body = pack('Bxxxii', family, 0, 0)
367
368 else:
369 log.error("request_dump RTM_GET %s is not supported" % rtm_type)
370 return None
371
372 msg.flags = NLM_F_REQUEST | NLM_F_DUMP
373 msg.attributes = {}
374 msg.build_message(self.sequence.next(), self.pid)
375 return self.tx_nlpacket_get_response(msg)
376
377 # ======
378 # Routes
379 # ======
380 def _routes_add_or_delete(self, add_route, routes, ecmp_routes, table, protocol, route_scope, route_type):
381
382 def tx_or_concat_message(total_message, route):
383 """
384 Adding an ipv4 route only takes 60 bytes, if we are adding thousands
385 of them this can add up to a lot of send calls. Concat several of
386 them together before TXing.
387 """
388
389 if not total_message:
390 total_message = route.message
391 else:
392 total_message += route.message
393
394 if len(total_message) >= PACKET_CONCAT_SIZE:
395 self.tx_nlpacket_raw(total_message)
396 total_message = None
397
398 return total_message
399
400 if add_route:
401 rtm_command = RTM_NEWROUTE
402 else:
403 rtm_command = RTM_DELROUTE
404
405 total_message = None
406 PACKET_CONCAT_SIZE = 16384
407 debug = rtm_command in self.debug
408
409 if routes:
410 for (afi, ip, mask, nexthop, interface_index) in routes:
411 route = Route(rtm_command, debug, use_color=self.use_color)
412 route.flags = NLM_F_REQUEST | NLM_F_CREATE
413 route.body = pack('BBBBBBBBi', afi, mask, 0, 0, table, protocol,
414 route_scope, route_type, 0)
415 route.family = afi
416 route.add_attribute(Route.RTA_DST, ip)
417 if nexthop:
418 route.add_attribute(Route.RTA_GATEWAY, nexthop)
419 route.add_attribute(Route.RTA_OIF, interface_index)
420 route.build_message(self.sequence.next(), self.pid)
421 total_message = tx_or_concat_message(total_message, route)
422
423 if total_message:
424 self.tx_nlpacket_raw(total_message)
425
426 if ecmp_routes:
427
428 for (route_key, value) in ecmp_routes.iteritems():
429 (afi, ip, mask) = route_key
430
431 route = Route(rtm_command, debug, use_color=self.use_color)
432 route.flags = NLM_F_REQUEST | NLM_F_CREATE
433 route.body = pack('BBBBBBBBi', afi, mask, 0, 0, table, protocol,
434 route_scope, route_type, 0)
435 route.family = afi
436 route.add_attribute(Route.RTA_DST, ip)
437 route.add_attribute(Route.RTA_MULTIPATH, value)
438 route.build_message(self.sequence.next(), self.pid)
439 total_message = tx_or_concat_message(total_message, route)
440
441 if total_message:
442 self.tx_nlpacket_raw(total_message)
443
444 def routes_add(self, routes, ecmp_routes,
445 table=Route.RT_TABLE_MAIN,
446 protocol=Route.RT_PROT_XORP,
447 route_scope=Route.RT_SCOPE_UNIVERSE,
448 route_type=Route.RTN_UNICAST):
449 self._routes_add_or_delete(True, routes, ecmp_routes, table, protocol, route_scope, route_type)
450
451 def routes_del(self, routes, ecmp_routes,
452 table=Route.RT_TABLE_MAIN,
453 protocol=Route.RT_PROT_XORP,
454 route_scope=Route.RT_SCOPE_UNIVERSE,
455 route_type=Route.RTN_UNICAST):
456 self._routes_add_or_delete(False, routes, ecmp_routes, table, protocol, route_scope, route_type)
457
458 def route_get(self, ip, debug=False):
459 """
460 ip must be one of the following:
461 - IPv4Address
462 - IPv6Address
463 """
464 # Transmit a RTM_GETROUTE to query for the route we want
465 route = Route(RTM_GETROUTE, debug, use_color=self.use_color)
466 route.flags = NLM_F_REQUEST | NLM_F_ACK
467
468 # Set everything in the service header as 0 other than the afi
469 afi = self.ip_to_afi(ip)
470 route.body = pack('Bxxxxxxxi', afi, 0)
471 route.family = afi
472 route.add_attribute(Route.RTA_DST, ip)
473 route.build_message(self.sequence.next(), self.pid)
474 return self.tx_nlpacket_get_response(route)
475
476 def routes_dump(self, family=socket.AF_UNSPEC, debug=True):
477 return self.request_dump(RTM_GETROUTE, family, debug)
478
479 def routes_print(self, routes):
480 """
481 Print a table of 'routes'
482 """
483 print "Prefix Nexthop ifindex"
484
485 for x in routes:
486 if Route.RTA_DST not in x.attributes:
487 log.warning("Route is missing RTA_DST")
488 continue
489
490 ip = "%s/%d" % (x.attributes[Route.RTA_DST].value, x.src_len)
491 print "%-15s %-15s %s" %\
492 (ip,
493 str(x.attributes[Route.RTA_GATEWAY].value) if Route.RTA_GATEWAY in x.attributes else None,
494 x.attributes[Route.RTA_OIF].value)
495
496 # =====
497 # Links
498 # =====
499 def _get_iface_by_name(self, ifname):
500 """
501 Return a Link object for ifname
502 """
503 debug = RTM_GETLINK in self.debug
504
505 link = Link(RTM_GETLINK, debug, use_color=self.use_color)
506 link.flags = NLM_F_REQUEST | NLM_F_ACK
507 link.body = pack('=Bxxxiii', socket.AF_UNSPEC, 0, 0, 0)
508 link.add_attribute(Link.IFLA_IFNAME, ifname)
509 link.build_message(self.sequence.next(), self.pid)
510
511 try:
512 return self.tx_nlpacket_get_response(link)[0]
513
514 except NetlinkNoAddressError:
515 log.info("Netlink did not find interface %s" % ifname)
516 return None
517
518 def _get_iface_by_index(self, ifindex):
519 """
520 Return a Link object for ifindex
521 """
522 debug = RTM_GETLINK in self.debug
523
524 link = Link(RTM_GETLINK, debug, use_color=self.use_color)
525 link.flags = NLM_F_REQUEST | NLM_F_ACK
526 link.body = pack('=Bxxxiii', socket.AF_UNSPEC, ifindex, 0, 0)
527 link.build_message(self.sequence.next(), self.pid)
528 try:
529 return self.tx_nlpacket_get_response(link)[0]
530 except NetlinkNoAddressError:
531 log.info("Netlink did not find interface %s" % ifindex)
532 return None
533
534 def get_iface_index(self, ifname):
535 """
536 Return the interface index for ifname
537 """
538 iface = self._get_iface_by_name(ifname)
539
540 if iface:
541 return iface.ifindex
542 return None
543
544 def get_iface_name(self, ifindex):
545 iface = self._get_iface_by_index(ifindex)
546
547 if iface:
548 return iface.attributes[Link.IFLA_IFNAME].get_pretty_value(str)
549 return None
550
551 def link_dump(self, ifname=None):
552 debug = RTM_GETLINK in self.debug
553 msg = Link(RTM_GETLINK, debug, use_color=self.use_color)
554 msg.body = pack('Bxxxiii', socket.AF_UNSPEC, 0, 0, 0)
555 msg.flags = NLM_F_REQUEST | NLM_F_ACK
556
557 if ifname:
558 msg.add_attribute(Link.IFLA_IFNAME, ifname)
559 else:
560 msg.flags |= NLM_F_DUMP
561
562 msg.build_message(self.sequence.next(), self.pid)
563 return self.tx_nlpacket_get_response(msg)
564
565 def link_set_attrs(self, ifname, kind=None, slave_kind=None, ifindex=0, ifla={}, ifla_info_data={}, ifla_info_slave_data={}):
566 debug = RTM_NEWLINK in self.debug
567
568 link = Link(RTM_NEWLINK, debug, use_color=self.use_color)
569 link.flags = NLM_F_REQUEST | NLM_F_ACK
570 link.body = pack('Bxxxiii', socket.AF_UNSPEC, ifindex, 0, 0)
571
572 for nl_attr, value in ifla.items():
573 link.add_attribute(nl_attr, value)
574
575 if ifname:
576 link.add_attribute(Link.IFLA_IFNAME, ifname)
577
578 linkinfo = dict()
579
580 if kind:
581 linkinfo[Link.IFLA_INFO_KIND] = kind
582 linkinfo[Link.IFLA_INFO_DATA] = ifla_info_data
583 elif slave_kind:
584 linkinfo[Link.IFLA_INFO_SLAVE_KIND] = slave_kind,
585 linkinfo[Link.IFLA_INFO_SLAVE_DATA] = ifla_info_slave_data
586
587 link.add_attribute(Link.IFLA_LINKINFO, linkinfo)
588 link.build_message(self.sequence.next(), self.pid)
589 return self.tx_nlpacket_get_response(link)
590
591 def link_add_set(self, kind,
592 ifname=None,
593 ifindex=0,
594 slave_kind=None,
595 ifla={},
596 ifla_info_data={},
597 ifla_info_slave_data={}):
598 """
599 Build and TX a RTM_NEWLINK message to add the desired interface
600 """
601 debug = RTM_NEWLINK in self.debug
602
603 link = Link(RTM_NEWLINK, debug, use_color=self.use_color)
604 link.flags = NLM_F_CREATE | NLM_F_REQUEST | NLM_F_ACK
605 link.body = pack('Bxxxiii', socket.AF_UNSPEC, ifindex, 0, 0)
606
607 for nl_attr, value in ifla.items():
608 link.add_attribute(nl_attr, value)
609
610 if ifname:
611 link.add_attribute(Link.IFLA_IFNAME, ifname)
612
613 linkinfo = dict()
614 if kind:
615 linkinfo[Link.IFLA_INFO_KIND] = kind
616 linkinfo[Link.IFLA_INFO_DATA] = ifla_info_data
617 if slave_kind:
618 linkinfo[Link.IFLA_INFO_SLAVE_KIND] = slave_kind
619 linkinfo[Link.IFLA_INFO_SLAVE_DATA] = ifla_info_slave_data
620 link.add_attribute(Link.IFLA_LINKINFO, linkinfo)
621
622 link.build_message(self.sequence.next(), self.pid)
623 return self.tx_nlpacket_get_response(link)
624
625 def link_del(self, ifindex=None, ifname=None):
626 if not ifindex and not ifname:
627 raise ValueError('invalid ifindex and/or ifname')
628
629 if not ifindex:
630 ifindex = self.get_iface_index(ifname)
631
632 debug = RTM_DELLINK in self.debug
633
634 link = Link(RTM_DELLINK, debug, use_color=self.use_color)
635 link.flags = NLM_F_REQUEST | NLM_F_ACK
636 link.body = pack('Bxxxiii', socket.AF_UNSPEC, ifindex, 0, 0)
637 link.build_message(self.sequence.next(), self.pid)
638 return self.tx_nlpacket_get_response(link)
639
640 def _link_add(self, ifindex, ifname, kind, ifla_info_data, mtu=None):
641 """
642 Build and TX a RTM_NEWLINK message to add the desired interface
643 """
644 debug = RTM_NEWLINK in self.debug
645
646 link = Link(RTM_NEWLINK, debug, use_color=self.use_color)
647 link.flags = NLM_F_CREATE | NLM_F_REQUEST | NLM_F_ACK
648 link.body = pack('Bxxxiii', socket.AF_UNSPEC, 0, 0, 0)
649 link.add_attribute(Link.IFLA_IFNAME, ifname)
650
651 if ifindex:
652 link.add_attribute(Link.IFLA_LINK, ifindex)
653
654 if mtu:
655 link.add_attribute(Link.IFLA_MTU, mtu)
656
657 link.add_attribute(Link.IFLA_LINKINFO, {
658 Link.IFLA_INFO_KIND: kind,
659 Link.IFLA_INFO_DATA: ifla_info_data
660 })
661 link.build_message(self.sequence.next(), self.pid)
662 return self.tx_nlpacket_get_response(link)
663
664 def link_add_bridge(self, ifname, ifla_info_data={}, mtu=None):
665 return self._link_add(ifindex=None, ifname=ifname, kind='bridge', ifla_info_data=ifla_info_data, mtu=mtu)
666
667 def link_add_vlan(self, ifindex, ifname, vlanid, vlan_protocol=None):
668 """
669 ifindex is the index of the parent interface that this sub-interface
670 is being added to
671 """
672
673 '''
674 If you name an interface swp2.17 but assign it to vlan 12, the kernel
675 will return a very misleading NLE_MSG_OVERFLOW error. It only does
676 this check if the ifname uses dot notation.
677
678 Do this check here so we can provide a more intuitive error
679 '''
680 if '.' in ifname:
681 ifname_vlanid = int(ifname.split('.')[-1])
682
683 if ifname_vlanid != vlanid:
684 raise InvalidInterfaceNameVlanCombo("Interface %s must belong "
685 "to VLAN %d (VLAN %d was requested)" %
686 (ifname, ifname_vlanid, vlanid))
687
688 ifla_info_data = {Link.IFLA_VLAN_ID: vlanid}
689
690 if vlan_protocol:
691 ifla_info_data[Link.IFLA_VLAN_PROTOCOL] = vlan_protocol
692
693 return self._link_add(ifindex, ifname, 'vlan', ifla_info_data)
694
695 def link_add_macvlan(self, ifindex, ifname):
696 """
697 ifindex is the index of the parent interface that this sub-interface
698 is being added to
699 """
700 return self._link_add(ifindex, ifname, 'macvlan', {Link.IFLA_MACVLAN_MODE: Link.MACVLAN_MODE_PRIVATE})
701
702 def vlan_get(self, filter_ifindex=None, filter_vlanid=None, compress_vlans=True):
703 """
704 filter_ifindex should be a tuple if interface indexes, this is a whitelist filter
705 filter_vlandid should be a tuple if VLAN IDs, this is a whitelist filter
706 """
707 debug = RTM_GETLINK in self.debug
708
709 link = Link(RTM_GETLINK, debug, use_color=self.use_color)
710 link.family = AF_BRIDGE
711 link.flags = NLM_F_DUMP | NLM_F_REQUEST
712 link.body = pack('Bxxxiii', socket.AF_BRIDGE, 0, 0, 0)
713
714 if compress_vlans:
715 link.add_attribute(Link.IFLA_EXT_MASK, Link.RTEXT_FILTER_BRVLAN_COMPRESSED)
716 else:
717 link.add_attribute(Link.IFLA_EXT_MASK, Link.RTEXT_FILTER_BRVLAN)
718
719 link.build_message(self.sequence.next(), self.pid)
720 reply = self.tx_nlpacket_get_response(link)
721
722 iface_vlans = {}
723
724 for msg in reply:
725 if msg.family != socket.AF_BRIDGE:
726 continue
727
728 if filter_ifindex and msg.ifindex not in filter_ifindex:
729 continue
730
731 ifla_af_spec = msg.get_attribute_value(Link.IFLA_AF_SPEC)
732
733 if not ifla_af_spec:
734 continue
735
736 ifname = msg.get_attribute_value(Link.IFLA_IFNAME)
737
738 '''
739 Example IFLA_AF_SPEC
740
741 20: 0x1c001a00 .... Length 0x001c (28), Type 0x001a (26) IFLA_AF_SPEC
742 21: 0x08000200 .... Nested Attribute - Length 0x0008 (8), Type 0x0002 (2) IFLA_BRIDGE_VLAN_INFO
743 22: 0x00000a00 ....
744 23: 0x08000200 .... Nested Attribute - Length 0x0008 (8), Type 0x0002 (2) IFLA_BRIDGE_VLAN_INFO
745 24: 0x00001000 ....
746 25: 0x08000200 .... Nested Attribute - Length 0x0008 (8), Type 0x0002 (2) IFLA_BRIDGE_VLAN_INFO
747 26: 0x00001400 ....
748 '''
749 for (x_type, x_value) in ifla_af_spec.iteritems():
750 if x_type == Link.IFLA_BRIDGE_VLAN_INFO:
751 for (vlan_flag, vlan_id) in x_value:
752 if filter_vlanid is None or vlan_id in filter_vlanid:
753
754 if ifname not in iface_vlans:
755 iface_vlans[ifname] = []
756
757 # We store these in the tuple as (vlan, flag) instead (flag, vlan)
758 # so that we can sort the list of tuples
759 iface_vlans[ifname].append((vlan_id, vlan_flag))
760
761 return iface_vlans
762
763 def vlan_show(self, filter_ifindex=None, filter_vlanid=None, compress_vlans=True):
764
765 def vlan_flag_to_string(vlan_flag):
766 flag_str = []
767 if vlan_flag & Link.BRIDGE_VLAN_INFO_PVID:
768 flag_str.append('PVID')
769
770 if vlan_flag & Link.BRIDGE_VLAN_INFO_UNTAGGED:
771 flag_str.append('Egress Untagged')
772
773 return ', '.join(flag_str)
774
775 iface_vlans = self.vlan_get(filter_ifindex, filter_vlanid, compress_vlans)
776 log.debug("iface_vlans:\n%s\n" % pformat(iface_vlans))
777 range_begin_vlan_id = None
778 range_flag = None
779
780 print " Interface VLAN Flags"
781 print " ========== ==== ====="
782
783 for (ifname, vlan_tuples) in sorted(iface_vlans.iteritems()):
784 for (vlan_id, vlan_flag) in sorted(vlan_tuples):
785
786 if vlan_flag & Link.BRIDGE_VLAN_INFO_RANGE_BEGIN:
787 range_begin_vlan_id = vlan_id
788 range_flag = vlan_flag
789
790 elif vlan_flag & Link.BRIDGE_VLAN_INFO_RANGE_END:
791 range_flag |= vlan_flag
792
793 if not range_begin_vlan_id:
794 log.warning("BRIDGE_VLAN_INFO_RANGE_END is %d but we never saw a BRIDGE_VLAN_INFO_RANGE_BEGIN" % vlan_id)
795 range_begin_vlan_id = vlan_id
796
797 for x in xrange(range_begin_vlan_id, vlan_id + 1):
798 print " %10s %4d %s" % (ifname, x, vlan_flag_to_string(vlan_flag))
799 ifname = ''
800
801 range_begin_vlan_id = None
802 range_flag = None
803
804 else:
805 print " %10s %4d %s" % (ifname, vlan_id, vlan_flag_to_string(vlan_flag))
806 ifname = ''
807
808
809 def vlan_modify(self, msgtype, ifindex, vlanid_start, vlanid_end=None, bridge_self=False, bridge_master=False, pvid=False, untagged=False):
810 """
811 iproute2 bridge/vlan.c vlan_modify()
812 """
813 assert msgtype in (RTM_SETLINK, RTM_DELLINK), "Invalid msgtype %s, must be RTM_SETLINK or RTM_DELLINK" % msgtype
814 assert vlanid_start >= 1 and vlanid_start <= 4096, "Invalid VLAN start %s" % vlanid_start
815
816 if vlanid_end is None:
817 vlanid_end = vlanid_start
818
819 assert vlanid_end >= 1 and vlanid_end <= 4096, "Invalid VLAN end %s" % vlanid_end
820 assert vlanid_start <= vlanid_end, "Invalid VLAN range %s-%s, start must be <= end" % (vlanid_start, vlanid_end)
821
822 debug = msgtype in self.debug
823 bridge_flags = 0
824 vlan_info_flags = 0
825
826 link = Link(msgtype, debug, use_color=self.use_color)
827 link.flags = NLM_F_REQUEST | NLM_F_ACK
828 link.body = pack('Bxxxiii', socket.AF_BRIDGE, ifindex, 0, 0)
829
830 if bridge_self:
831 bridge_flags |= Link.BRIDGE_FLAGS_SELF
832
833 if bridge_master:
834 bridge_flags |= Link.BRIDGE_FLAGS_MASTER
835
836 if pvid:
837 vlan_info_flags |= Link.BRIDGE_VLAN_INFO_PVID
838
839 if untagged:
840 vlan_info_flags |= Link.BRIDGE_VLAN_INFO_UNTAGGED
841
842 ifla_af_spec = OrderedDict()
843
844 if bridge_flags:
845 ifla_af_spec[Link.IFLA_BRIDGE_FLAGS] = bridge_flags
846
847 # just one VLAN
848 if vlanid_start == vlanid_end:
849 ifla_af_spec[Link.IFLA_BRIDGE_VLAN_INFO] = [(vlan_info_flags, vlanid_start), ]
850
851 # a range of VLANs
852 else:
853 ifla_af_spec[Link.IFLA_BRIDGE_VLAN_INFO] = [
854 (vlan_info_flags | Link.BRIDGE_VLAN_INFO_RANGE_BEGIN, vlanid_start),
855 (vlan_info_flags | Link.BRIDGE_VLAN_INFO_RANGE_END, vlanid_end)
856 ]
857
858 link.add_attribute(Link.IFLA_AF_SPEC, ifla_af_spec)
859 link.build_message(self.sequence.next(), self.pid)
860 return self.tx_nlpacket_get_response(link)
861
862 def link_add_bridge_vlan(self, ifindex, vlanid_start, vlanid_end=None, pvid=False, untagged=False, master=False):
863 """
864 Add VLAN(s) to a bridge interface
865 """
866 bridge_self = False if master else True
867 self.vlan_modify(RTM_SETLINK, ifindex, vlanid_start, vlanid_end, bridge_self, master, pvid, untagged)
868
869 def link_del_bridge_vlan(self, ifindex, vlanid_start, vlanid_end=None, pvid=False, untagged=False, master=False):
870 """
871 Delete VLAN(s) from a bridge interface
872 """
873 bridge_self = False if master else True
874 self.vlan_modify(RTM_DELLINK, ifindex, vlanid_start, vlanid_end, bridge_self, master, pvid, untagged)
875
876 def link_set_updown(self, ifname, state):
877 """
878 Either bring ifname up or take it down
879 """
880
881 if state == 'up':
882 if_flags = Link.IFF_UP
883 elif state == 'down':
884 if_flags = 0
885 else:
886 raise Exception('Unsupported state %s, valid options are "up" and "down"' % state)
887
888 debug = RTM_NEWLINK in self.debug
889 if_change = Link.IFF_UP
890
891 link = Link(RTM_NEWLINK, debug, use_color=self.use_color)
892 link.flags = NLM_F_REQUEST | NLM_F_ACK
893 link.body = pack('=BxxxiLL', socket.AF_UNSPEC, 0, if_flags, if_change)
894 link.add_attribute(Link.IFLA_IFNAME, ifname)
895 link.build_message(self.sequence.next(), self.pid)
896 return self.tx_nlpacket_get_response(link)
897
898 def link_set_protodown(self, ifname, state):
899 """
900 Either bring ifname up or take it down by setting IFLA_PROTO_DOWN on or off
901 """
902 flags = 0
903 protodown = 1 if state == "on" else 0
904
905 debug = RTM_NEWLINK in self.debug
906
907 link = Link(RTM_NEWLINK, debug, use_color=self.use_color)
908 link.flags = NLM_F_REQUEST | NLM_F_ACK
909 link.body = pack('=BxxxiLL', socket.AF_UNSPEC, 0, 0, 0)
910 link.add_attribute(Link.IFLA_IFNAME, ifname)
911 link.add_attribute(Link.IFLA_PROTO_DOWN, protodown)
912 link.build_message(self.sequence.next(), self.pid)
913 return self.tx_nlpacket_get_response(link)
914
915 def link_set_master(self, ifname, master_ifindex=0, state=None):
916 """
917 ip link set %ifname master %master_ifindex %state
918 use master_ifindex=0 for nomaster
919 """
920 if state == 'up':
921 if_change = Link.IFF_UP
922 if_flags = Link.IFF_UP
923 elif state == 'down':
924 if_change = Link.IFF_UP
925 if_flags = 0
926 else:
927 if_change = 0
928 if_flags = 0
929
930 debug = RTM_NEWLINK in self.debug
931
932 link = Link(RTM_NEWLINK, debug, use_color=self.use_color)
933 link.flags = NLM_F_REQUEST | NLM_F_ACK
934 link.body = pack('=BxxxiLL', socket.AF_UNSPEC, 0, if_flags, if_change)
935 link.add_attribute(Link.IFLA_IFNAME, ifname)
936 link.add_attribute(Link.IFLA_MASTER, master_ifindex)
937 link.build_message(self.sequence.next(), self.pid)
938 return self.tx_nlpacket_get_response(link)
939
940 # =========
941 # Neighbors
942 # =========
943 def neighbor_add(self, afi, ifindex, ip, mac):
944 debug = RTM_NEWNEIGH in self.debug
945 service_hdr_flags = 0
946
947 nbr = Neighbor(RTM_NEWNEIGH, debug, use_color=self.use_color)
948 nbr.flags = NLM_F_CREATE | NLM_F_REQUEST | NLM_F_ACK
949 nbr.family = afi
950 nbr.body = pack('=BxxxiHBB', afi, ifindex, Neighbor.NUD_REACHABLE, service_hdr_flags, Route.RTN_UNICAST)
951 nbr.add_attribute(Neighbor.NDA_DST, ip)
952 nbr.add_attribute(Neighbor.NDA_LLADDR, mac)
953 nbr.build_message(self.sequence.next(), self.pid)
954 return self.tx_nlpacket_get_response(nbr)
955
956 def neighbor_del(self, afi, ifindex, ip, mac):
957 debug = RTM_DELNEIGH in self.debug
958 service_hdr_flags = 0
959
960 nbr = Neighbor(RTM_DELNEIGH, debug, use_color=self.use_color)
961 nbr.flags = NLM_F_REQUEST | NLM_F_ACK
962 nbr.family = afi
963 nbr.body = pack('=BxxxiHBB', afi, ifindex, Neighbor.NUD_REACHABLE, service_hdr_flags, Route.RTN_UNICAST)
964 nbr.add_attribute(Neighbor.NDA_DST, ip)
965 nbr.add_attribute(Neighbor.NDA_LLADDR, mac)
966 nbr.build_message(self.sequence.next(), self.pid)
967 return self.tx_nlpacket_get_response(nbr)
968
969 def link_add_vxlan(self, ifname, vxlanid, dstport=None, local=None,
970 group=None, learning=True, ageing=None, physdev=None, ttl=None):
971
972 debug = RTM_NEWLINK in self.debug
973
974 info_data = {Link.IFLA_VXLAN_ID: int(vxlanid)}
975 if dstport:
976 info_data[Link.IFLA_VXLAN_PORT] = int(dstport)
977 if local:
978 info_data[Link.IFLA_VXLAN_LOCAL] = local
979 if group:
980 info_data[Link.IFLA_VXLAN_GROUP] = group
981
982 info_data[Link.IFLA_VXLAN_LEARNING] = int(learning)
983 info_data[Link.IFLA_VXLAN_TTL] = ttl
984
985 if ageing:
986 info_data[Link.IFLA_VXLAN_AGEING] = int(ageing)
987
988 if physdev:
989 info_data[Link.IFLA_VXLAN_LINK] = int(physdev)
990
991 link = Link(RTM_NEWLINK, debug, use_color=self.use_color)
992 link.flags = NLM_F_CREATE | NLM_F_REQUEST | NLM_F_ACK
993 link.body = pack('Bxxxiii', socket.AF_UNSPEC, 0, 0, 0)
994 link.add_attribute(Link.IFLA_IFNAME, ifname)
995 link.add_attribute(Link.IFLA_LINKINFO, {
996 Link.IFLA_INFO_KIND: "vxlan",
997 Link.IFLA_INFO_DATA: info_data
998 })
999
1000 link.build_message(self.sequence.next(), self.pid)
1001 return self.tx_nlpacket_get_response(link)
1002
1003 # =========
1004 # Addresses
1005 # =========
1006 def addr_dump(self):
1007 """
1008 TODO: add ifname/ifindex filtering:
1009 - via the RTM_GETADDR request packet
1010 - or in python if kernel doesn't support per intf dump
1011 """
1012 debug = RTM_GETADDR in self.debug
1013
1014 msg = Address(RTM_GETADDR, debug, use_color=self.use_color)
1015 msg.body = pack('=Bxxxi', socket.AF_UNSPEC, 0)
1016 msg.flags = NLM_F_REQUEST | NLM_F_ACK | NLM_F_DUMP
1017
1018 msg.build_message(self.sequence.next(), self.pid)
1019 return self.tx_nlpacket_get_response(msg)
1020
1021 # =======
1022 # Netconf
1023 # =======
1024 def netconf_dump(self):
1025 """
1026 The attribute Netconf.NETCONFA_IFINDEX is available but don't let it fool you
1027 it seems like the kernel doesn't really care about this attribute and will dump
1028 everything according of the requested family (AF_UNSPEC for everything).
1029 Device filtering needs to be done afterwards by the user.
1030 """
1031 debug = RTM_GETNETCONF in self.debug
1032 msg = Netconf(RTM_GETNETCONF, debug, use_color=self.use_color)
1033 msg.body = pack('Bxxxiii', socket.AF_UNSPEC, 0, 0, 0)
1034 msg.flags = NLM_F_REQUEST | NLM_F_DUMP | NLM_F_ACK
1035 msg.build_message(self.sequence.next(), self.pid)
1036 return self.tx_nlpacket_get_response(msg)