Query the network driver for the path of the custom leases file for the given virtual network and parse it to retrieve info. src/network/bridge_driver.c: * Implement networkGetDHCPLeases * Implement networkGetDHCPLeasesForMAC * Implement networkGetDHCPLeasesHelper --- src/network/bridge_driver.c | 232 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 232 insertions(+) diff --git a/src/network/bridge_driver.c b/src/network/bridge_driver.c index 4fc4c9a..361f36f 100644 --- a/src/network/bridge_driver.c +++ b/src/network/bridge_driver.c @@ -73,9 +73,17 @@ #include "viraccessapicheck.h" #include "network_event.h" #include "virhook.h" +#include "virjson.h" #define VIR_FROM_THIS VIR_FROM_NETWORK +/** + * VIR_NETWORK_DHCP_LEASE_FILE_SIZE_MAX: + * + * Macro providing the upper limit on the size of leases file + */ +#define VIR_NETWORK_DHCP_LEASE_FILE_SIZE_MAX (32 * 1024 * 1024) + VIR_LOG_INIT("network.bridge_driver"); static void networkDriverLock(virNetworkDriverStatePtr driver) @@ -3360,6 +3368,228 @@ static int networkSetAutostart(virNetworkPtr net, return ret; } +static int +networkGetDHCPLeasesHelper(virNetworkObjPtr obj, + const char *mac, + virNetworkDHCPLeasePtr **leases) +{ + size_t i, j; + size_t nleases = 0; + int rv = -1; + int size = 0; + int custom_lease_file_len = 0; + bool need_results = !!leases; + long long currtime = 0; + long long expirytime_tmp = -1; + bool ipv6 = false; + char *lease_entries = NULL; + char *custom_lease_file = NULL; + const char *ip_tmp = NULL; + const char *mac_tmp = NULL; + virJSONValuePtr lease_tmp = NULL; + virJSONValuePtr leases_array = NULL; + virNetworkIpDefPtr ipdef_tmp = NULL; + virNetworkDHCPLeasePtr lease = NULL; + virNetworkDHCPLeasePtr *leases_ret = NULL; + + /* Retrieve custom leases file location */ + custom_lease_file = networkDnsmasqLeaseFileNameCustom(obj->def->bridge); + + /* Read entire contents */ + if ((custom_lease_file_len = virFileReadAll(custom_lease_file, + VIR_NETWORK_DHCP_LEASE_FILE_SIZE_MAX, + &lease_entries)) < 0) { + /* Even though src/network/leaseshelper.c guarantees the existence of + * leases file (even if no leases are present), and the control reaches + * here, instead of reporting error, return 0 leases */ + rv = 0; + goto error; + } + + if (custom_lease_file_len) { + if (!(leases_array = virJSONValueFromString(lease_entries))) { + virReportError(VIR_ERR_INTERNAL_ERROR, + _("invalid json in file: %s"), custom_lease_file); + goto error; + } + + if ((size = virJSONValueArraySize(leases_array)) < 0) { + virReportError(VIR_ERR_INTERNAL_ERROR, "%s", + _("couldn't fetch array of leases")); + goto error; + } + } + + currtime = (long long) time(NULL); + + for (i = 0; i < size; i++) { + if (!(lease_tmp = virJSONValueArrayGet(leases_array, i))) { + virReportError(VIR_ERR_INTERNAL_ERROR, "%s", + _("failed to parse json")); + goto error; + } + + if (!(mac_tmp = virJSONValueObjectGetString(lease_tmp, "mac-address"))) { + /* leaseshelper program guarantees that lease will be stored only if + * mac-address is known otherwise not */ + virReportError(VIR_ERR_INTERNAL_ERROR, "%s", + _("found lease without mac-address")); + goto error; + } + + if (mac && virMacAddrCompare(mac, mac_tmp)) { + virJSONValueFree(lease_tmp); + continue; + } + + if (virJSONValueObjectGetNumberLong(lease_tmp, "expiry-time", &expirytime_tmp) < 0) { + /* A lease cannot be present without expiry-time */ + virReportError(VIR_ERR_INTERNAL_ERROR, "%s", + _("found lease without expiry-time")); + goto error; + } + + /* Do not report expired lease */ + if (expirytime_tmp < currtime) + continue; + + if (need_results) { + if (VIR_ALLOC(lease) < 0) + goto error; + + lease->expirytime = expirytime_tmp; + + if (!(ip_tmp = virJSONValueObjectGetString(lease_tmp, "ip-address"))) { + /* A lease without ip-address makes no sense */ + virReportError(VIR_ERR_INTERNAL_ERROR, "%s", + _("found lease without ip-address")); + goto error; + } + + /* Unlike IPv4, IPv6 uses ':' instead of '.' as separator */ + ipv6 = strchr(ip_tmp, ':') ? true : false; + lease->type = ipv6 ? VIR_IP_ADDR_TYPE_IPV6 : VIR_IP_ADDR_TYPE_IPV4; + + /* Obtain prefix */ + for (j = 0; j < obj->def->nips; j++) { + ipdef_tmp = &obj->def->ips[j]; + + if (ipv6 && VIR_SOCKET_ADDR_IS_FAMILY(&ipdef_tmp->address, + AF_INET6)) { + lease->prefix = ipdef_tmp->prefix; + break; + } + if (!ipv6 && VIR_SOCKET_ADDR_IS_FAMILY(&ipdef_tmp->address, + AF_INET)) { + lease->prefix = virSocketAddrGetIpPrefix(&ipdef_tmp->address, + &ipdef_tmp->netmask, + ipdef_tmp->prefix); + break; + } + } + + if ((VIR_STRDUP(lease->mac, mac_tmp) < 0) || + (VIR_STRDUP(lease->ipaddr, ip_tmp) < 0) || + (VIR_STRDUP(lease->interface, obj->def->bridge) < 0)) + goto error; + + /* Fields that can be NULL */ + if ((VIR_STRDUP(lease->iaid, + virJSONValueObjectGetString(lease_tmp, "iaid")) < 0) || + (VIR_STRDUP(lease->clientid, + virJSONValueObjectGetString(lease_tmp, "client-id")) < 0) || + (VIR_STRDUP(lease->hostname, + virJSONValueObjectGetString(lease_tmp, "hostname")) < 0)) + goto error; + + if (VIR_INSERT_ELEMENT(leases_ret, nleases, nleases, lease) < 0) + goto error; + + } else { + nleases++; + } + + VIR_FREE(lease); + } + + if (need_results && mac && !leases_ret) { + virReportError(VIR_ERR_INTERNAL_ERROR, + _("no lease with matching MAC address: %s"), mac); + goto error; + } + + if (leases_ret) { + /* NULL terminated array */ + ignore_value(VIR_REALLOC_N(leases_ret, nleases + 1)); + *leases = leases_ret; + leases_ret = NULL; + } + + rv = nleases; + + cleanup: + VIR_FREE(lease); + VIR_FREE(custom_lease_file); + virJSONValueFree(leases_array); + return rv; + + error: + if (leases_ret) { + for (i = 0; i < nleases; i++) + virNetworkDHCPLeaseFree(leases_ret[i]); + VIR_FREE(leases_ret); + } + goto cleanup; +} + +static int +networkGetDHCPLeases(virNetworkPtr network, + virNetworkDHCPLeasePtr **leases, + unsigned int flags) +{ + int rv = -1; + virNetworkObjPtr obj; + + virCheckFlags(0, -1); + + if (!(obj = networkObjFromNetwork(network))) + return rv; + + if (virNetworkGetDHCPLeasesEnsureACL(network->conn, obj->def) < 0) + goto cleanup; + + rv = networkGetDHCPLeasesHelper(obj, NULL, leases); + + cleanup: + if (obj) + virNetworkObjUnlock(obj); + return rv; +} + +static int +networkGetDHCPLeasesForMAC(virNetworkPtr network, + const char *mac, + virNetworkDHCPLeasePtr **leases, + unsigned int flags) +{ + int rv = -1; + virNetworkObjPtr obj; + + virCheckFlags(0, -1); + + if (!(obj = networkObjFromNetwork(network))) + return rv; + + if (virNetworkGetDHCPLeasesForMACEnsureACL(network->conn, obj->def) < 0) + goto cleanup; + + rv = networkGetDHCPLeasesHelper(obj, mac, leases); + + cleanup: + if (obj) + virNetworkObjUnlock(obj); + return rv; +} static virNetworkDriver networkDriver = { "Network", @@ -3386,6 +3616,8 @@ static virNetworkDriver networkDriver = { .networkSetAutostart = networkSetAutostart, /* 0.2.1 */ .networkIsActive = networkIsActive, /* 0.7.3 */ .networkIsPersistent = networkIsPersistent, /* 0.7.3 */ + .networkGetDHCPLeases = networkGetDHCPLeases, /* 1.2.6 */ + .networkGetDHCPLeasesForMAC = networkGetDHCPLeasesForMAC, /* 1.2.6 */ }; static virStateDriver networkStateDriver = { -- 1.9.3 -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list