forked from Mirror/pve-network
sdn: dhcp: add dnsmasq plugin
The plugin creates a dnsmasq@<zone> service that spawns a dnsmasq instance that handles dhcp for that zone. The configuration files for a dnsmasq instance lie within /etc/dnsmasq.d/<zone> The plugin generates the following configuration files: * 00-default.conf Contains the default global configuration for dnsmasq. Disables DNS, enables some specific options for Windows, does some security-related configuration and makes dnsmasq bind only to the interfaces it is responsible for * 10-<subnet>.conf Contains the default settings for a subnet. Sets dhcp options for DNS and gateway. * 10-<subnet>.ranges.conf Contains the configuration of DHCP ranges for a subnet. * ethers Contains the MAC address to IP mappings for a zone. Every subnet gets assigned a tag in the dnsmasq configuration that is equal to the subnet_id. This can be used to override / set additional configuration options on a per-subnet basis. Additionally it creates the file /etc/default/dnsmasq.<zone> that provides default options for the dnsmasq service. Leases are stored in /var/lib/misc/dnsmasq.<zone>. Co-Authored-By: Alexandre Derumier <aderumier@odiso.com> Signed-off-by: Stefan Hanreich <s.hanreich@proxmox.com>
This commit is contained in:
parent
b240ff0b1f
commit
33074dfbee
1
debian/control
vendored
1
debian/control
vendored
|
@ -24,6 +24,7 @@ Depends: libpve-common-perl (>= 5.0-45),
|
|||
${misc:Depends},
|
||||
${perl:Depends},
|
||||
Recommends: frr-pythontools (>= 8.5.1~), ifupdown2
|
||||
Suggests: dnsmasq
|
||||
Description: Proxmox VE's SDN (Software Defined Network) stack
|
||||
This package contains the Software Defined Network (tech preview) for
|
||||
Proxmox VE.
|
||||
|
|
198
src/PVE/Network/SDN/Dhcp/Dnsmasq.pm
Normal file
198
src/PVE/Network/SDN/Dhcp/Dnsmasq.pm
Normal file
|
@ -0,0 +1,198 @@
|
|||
package PVE::Network::SDN::Dhcp::Dnsmasq;
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use base qw(PVE::Network::SDN::Dhcp::Plugin);
|
||||
|
||||
use Net::IP qw(:PROC);
|
||||
use PVE::Tools qw(file_set_contents run_command lock_file);
|
||||
|
||||
use File::Copy;
|
||||
|
||||
my $DNSMASQ_CONFIG_ROOT = '/etc/dnsmasq.d';
|
||||
my $DNSMASQ_DEFAULT_ROOT = '/etc/default';
|
||||
my $DNSMASQ_LEASE_ROOT = '/var/lib/misc';
|
||||
|
||||
sub type {
|
||||
return 'dnsmasq';
|
||||
}
|
||||
|
||||
sub del_ip_mapping {
|
||||
my ($class, $dhcpid, $mac) = @_;
|
||||
|
||||
my $ethers_file = "$DNSMASQ_CONFIG_ROOT/$dhcpid/ethers";
|
||||
my $ethers_tmp_file = "$ethers_file.tmp";
|
||||
|
||||
my $removeFn = sub {
|
||||
open(my $in, '<', $ethers_file) or die "Could not open file '$ethers_file' $!\n";
|
||||
open(my $out, '>', $ethers_tmp_file) or die "Could not open file '$ethers_tmp_file' $!\n";
|
||||
|
||||
while (my $line = <$in>) {
|
||||
next if $line =~ m/^$mac/;
|
||||
print $out $line;
|
||||
}
|
||||
|
||||
close $in;
|
||||
close $out;
|
||||
|
||||
move $ethers_tmp_file, $ethers_file;
|
||||
|
||||
chmod 0644, $ethers_file;
|
||||
};
|
||||
|
||||
PVE::Tools::lock_file($ethers_file, 10, $removeFn);
|
||||
|
||||
if ($@) {
|
||||
warn "Unable to remove $mac from the dnsmasq configuration: $@\n";
|
||||
return;
|
||||
}
|
||||
|
||||
my $service_name = "dnsmasq\@$dhcpid";
|
||||
PVE::Tools::run_command(['systemctl', 'reload', $service_name]);
|
||||
}
|
||||
|
||||
sub add_ip_mapping {
|
||||
my ($class, $dhcpid, $mac, $ip) = @_;
|
||||
|
||||
my $ethers_file = "$DNSMASQ_CONFIG_ROOT/$dhcpid/ethers";
|
||||
my $ethers_tmp_file = "$ethers_file.tmp";
|
||||
|
||||
my $appendFn = sub {
|
||||
open(my $in, '<', $ethers_file) or die "Could not open file '$ethers_file' $!\n";
|
||||
open(my $out, '>', $ethers_tmp_file) or die "Could not open file '$ethers_tmp_file' $!\n";
|
||||
|
||||
while (my $line = <$in>) {
|
||||
next if $line =~ m/^$mac/;
|
||||
print $out $line;
|
||||
}
|
||||
|
||||
print $out "$mac,$ip\n";
|
||||
close $in;
|
||||
close $out;
|
||||
move $ethers_tmp_file, $ethers_file;
|
||||
chmod 0644, $ethers_file;
|
||||
};
|
||||
|
||||
PVE::Tools::lock_file($ethers_file, 10, $appendFn);
|
||||
|
||||
if ($@) {
|
||||
warn "Unable to add $mac/$ip to the dnsmasq configuration: $@\n";
|
||||
return;
|
||||
}
|
||||
|
||||
my $service_name = "dnsmasq\@$dhcpid";
|
||||
PVE::Tools::run_command(['systemctl', 'reload', $service_name]);
|
||||
}
|
||||
|
||||
sub configure_subnet {
|
||||
my ($class, $dhcpid, $subnet_config) = @_;
|
||||
|
||||
die "No gateway defined for subnet $subnet_config->{id}"
|
||||
if !$subnet_config->{gateway};
|
||||
|
||||
my $tag = $subnet_config->{id};
|
||||
|
||||
my @dnsmasq_config = (
|
||||
"listen-address=$subnet_config->{gateway}",
|
||||
);
|
||||
|
||||
my $option_string;
|
||||
if (ip_is_ipv6($subnet_config->{network})) {
|
||||
$option_string = 'option6';
|
||||
push @dnsmasq_config, "enable-ra";
|
||||
} else {
|
||||
$option_string = 'option';
|
||||
push @dnsmasq_config, "dhcp-option=tag:$tag,$option_string:router,$subnet_config->{gateway}";
|
||||
}
|
||||
|
||||
push @dnsmasq_config, "dhcp-option=tag:$tag,$option_string:dns-server,$subnet_config->{'dhcp-dns-server'}"
|
||||
if $subnet_config->{'dhcp-dns-server'};
|
||||
|
||||
PVE::Tools::file_set_contents(
|
||||
"$DNSMASQ_CONFIG_ROOT/$dhcpid/10-$subnet_config->{id}.conf",
|
||||
join("\n", @dnsmasq_config) . "\n"
|
||||
);
|
||||
}
|
||||
|
||||
sub configure_range {
|
||||
my ($class, $dhcpid, $subnet_config, $range_config) = @_;
|
||||
|
||||
my $range_file = "$DNSMASQ_CONFIG_ROOT/$dhcpid/10-$subnet_config->{id}.ranges.conf",
|
||||
my $tag = $subnet_config->{id};
|
||||
|
||||
open(my $fh, '>>', $range_file) or die "Could not open file '$range_file' $!\n";
|
||||
print $fh "dhcp-range=set:$tag,$range_config->{'start-address'},$range_config->{'end-address'}\n";
|
||||
close $fh;
|
||||
}
|
||||
|
||||
sub before_configure {
|
||||
my ($class, $dhcpid) = @_;
|
||||
|
||||
my $config_directory = "$DNSMASQ_CONFIG_ROOT/$dhcpid";
|
||||
|
||||
mkdir($config_directory, 755) if !-d $config_directory;
|
||||
|
||||
my $default_config = <<CFG;
|
||||
CONFIG_DIR='$config_directory,\*.conf'
|
||||
DNSMASQ_OPTS="--conf-file=/dev/null"
|
||||
CFG
|
||||
|
||||
PVE::Tools::file_set_contents(
|
||||
"$DNSMASQ_DEFAULT_ROOT/dnsmasq.$dhcpid",
|
||||
$default_config
|
||||
);
|
||||
|
||||
my $default_dnsmasq_config = <<CFG;
|
||||
except-interface=lo
|
||||
bind-dynamic
|
||||
no-resolv
|
||||
no-hosts
|
||||
dhcp-leasefile=$DNSMASQ_LEASE_ROOT/dnsmasq.$dhcpid.leases
|
||||
dhcp-hostsfile=$config_directory/ethers
|
||||
dhcp-ignore=tag:!known
|
||||
|
||||
# Send an empty WPAD option. This may be REQUIRED to get windows 7 to behave.
|
||||
dhcp-option=252,"\\n"
|
||||
|
||||
# Send microsoft-specific option to tell windows to release the DHCP lease
|
||||
# when it shuts down. Note the "i" flag, to tell dnsmasq to send the
|
||||
# value as a four-byte integer - that's what microsoft wants.
|
||||
dhcp-option=vendor:MSFT,2,1i
|
||||
|
||||
# If a DHCP client claims that its name is "wpad", ignore that.
|
||||
# This fixes a security hole. see CERT Vulnerability VU#598349
|
||||
dhcp-name-match=set:wpad-ignore,wpad
|
||||
dhcp-ignore-names=tag:wpad-ignore
|
||||
CFG
|
||||
|
||||
PVE::Tools::file_set_contents(
|
||||
"$config_directory/00-default.conf",
|
||||
$default_dnsmasq_config
|
||||
);
|
||||
|
||||
unlink glob "$config_directory/10-*.conf";
|
||||
}
|
||||
|
||||
sub after_configure {
|
||||
my ($class, $dhcpid) = @_;
|
||||
|
||||
my $service_name = "dnsmasq\@$dhcpid";
|
||||
|
||||
PVE::Tools::run_command(['systemctl', 'enable', $service_name]);
|
||||
PVE::Tools::run_command(['systemctl', 'restart', $service_name]);
|
||||
}
|
||||
|
||||
sub before_regenerate {
|
||||
my ($class) = @_;
|
||||
|
||||
PVE::Tools::run_command(['systemctl', 'stop', "dnsmasq@*"]);
|
||||
PVE::Tools::run_command(['systemctl', 'disable', 'dnsmasq@']);
|
||||
}
|
||||
|
||||
sub after_regenerate {
|
||||
my ($class) = @_;
|
||||
# noop
|
||||
}
|
||||
|
||||
1;
|
Loading…
Reference in a new issue