2 # VSYS script to configure per-slice virtual network interfaces from the root slice
3 # Thom Haddow - 06/10/09
5 # Gets slice name as argv[1]
6 # Takes remaining args on stdin:
7 # - Interface name (eg [tun|tap]<sliceid>-<n>)
8 # - IP address (eg 1.2.3.4)
9 # - Netmask (as int, e.g. 24)
10 # - Followed by options as name=value pairs
20 vsys_config_dir = "/etc/planetlab/vsys-attributes"
22 if len(sys.argv) != 2: sys.exit(1)
24 # VSYS scripts get slicename as $1
26 sliceid = pwd.getpwnam(slicename).pw_uid
28 netblock_config=os.path.join(vsys_config_dir,slicename,"vsys_vnet")
30 # Read netblock allocation file
33 for netblock in open(netblock_config,'r'):
34 base, mask = netblock.split('/')
37 print >>sys.stderr, "Could not find entry for slice %s in netblock config file %s" % (slicename, netblock_config)
41 ### Read args from stdin
42 arglines = map(string.strip, sys.stdin.readlines())
45 print >>sys.stderr, "Insufficient argument lines."
48 vif = arglines[0] # interface name
49 vip = arglines[1] # IP
50 vmask = int(arglines[2]) # netmask as int
54 options = arglines[3:]
58 # Convert network base addr to int format by unpacking as 32bit net-ordered long (!L)
59 base_int = struct.unpack('!L',socket.inet_aton(base))[0]
64 # Validate interface name
66 print >>sys.stderr, "Interface name %s invalid"%(vif)
69 if re.match(r'(tun|tap)%d-\d+' % sliceid, vif ) is None:
70 print >>sys.stderr, "Interface name %s does not match slice id %d."%(vif, sliceid)
75 # Validate requested IP and convert to int format.
77 vip_int = struct.unpack('!L',socket.inet_aton(vip))[0]
79 print >>sys.stderr, "Invalid IP: %s" % vip
82 # Check IP is in netblock
83 if (vip_int>>(32-mask)) != (base_int>>(32-mask)):
84 print >>sys.stderr, "Requested IP %s not in netblock %s/%d" % (vip,base,mask)
87 # TODO. Check IP is not in use?
89 # Validate mask: Check requested mask is sane and within our netblock
90 if vmask>32 or vmask <8:
91 print >>sys.stderr, "Requested netmask /%d is invalid" %(vmask)
95 print >>sys.stderr, "Requested netmask /%d larger than allocation /%d" %(vmask, mask)
102 opt_txqueuelen = None
106 opt_pointopoint = None
109 for optionline in options:
110 if len(optionline)==0: continue
112 opt, val = optionline.split('=')
114 print >>sys.stderr, "Bad option line: \"%s\"" % (optionline)
123 print >>sys.stderr, "rp_filter value invalid: \"%s\"" % (val)
126 elif opt=="txqueuelen":
128 if intval<1 or intval>10000:
129 print >>sys.stderr, "txqueuelen value %s out of range 1-10000" % (val)
131 opt_txqueuelen = intval
136 elif opt=="pointopoint":
137 opt_pointopoint = val.strip()
139 socket.inet_aton(opt_pointopoint)
140 except socket.error,e:
141 print >>sys.stderr, "pointopoint: %s" % (e,)
146 print >>sys.stderr, "Unknown option: \"%s\"" % (opt)
150 ### Configure interface
152 cmd_ifconfig = "/sbin/ifconfig %s %s" % (vif, vip)
153 if opt_pointopoint is None:
154 cmd_ifconfig += "/%d" % (vmask,)
156 # point-to-point mask
157 cmd_ifconfig += " netmask 255.255.255.255"
158 if opt_txqueuelen is not None:
159 cmd_ifconfig += " txqueuelen %d" % (opt_txqueuelen,)
160 if opt_pointopoint is not None:
161 cmd_ifconfig += " pointopoint %s" % (opt_pointopoint,)
163 os.system(cmd_ifconfig)
165 # Add iptables rules (Clearing old ones first, if they exist)
166 cmd_iptables_in = "/sbin/iptables -A INPUT -i %s -m mark -m state --state NEW ! --mark %d -j DROP" % (vif, sliceid)
167 cmd_iptables_del_in = "/sbin/iptables -D INPUT -i %s -m mark -m state --state NEW ! --mark %d -j DROP 2>/dev/null" % (vif, sliceid)
168 cmd_iptables_out = "/sbin/iptables -A OUTPUT -o %s -m state --state NEW -m mark ! --mark %d -j DROP" % (vif, sliceid)
169 cmd_iptables_del_out = "/sbin/iptables -D OUTPUT -o %s -m state --state NEW -m mark ! --mark %d -j DROP 2>/dev/null" % (vif, sliceid)
171 public_src = os.popen("ifconfig | grep $(ip route | grep default | awk '{print $3}' | awk -F. '{print $1\"[.]\"$2}') | head -1 | awk '{print $2}' | awk -F : '{print $2}'").read().rstrip()
172 cmd_iptables_pr = "/sbin/iptables -t nat -A POSTROUTING -s %s/%d -j SNAT --to-source %s --random" % (vip, vmask, public_src)
173 cmd_iptables_del_pr = "/sbin/iptables -t nat -D POSTROUTING -s %s/%d -j SNAT --to-source %s --random > /dev/null 2>&1" % (vip, vmask, public_src)
175 os.system(cmd_iptables_del_in)
176 os.system(cmd_iptables_in)
177 os.system(cmd_iptables_del_out)
178 os.system(cmd_iptables_out)
180 # always remove snat rules
181 # in case there are leftovers from previous calls
182 os.system(cmd_iptables_del_pr)
184 os.system(cmd_iptables_pr)
185 #print cmd_iptables_del_pr
186 #print cmd_iptables_pr
188 #if opt_pointopoint and vmask < 32:
189 # # Make target vnet masked address
190 # p2p_int = struct.unpack('!L', socket.inet_aton(opt_pointopoint))[0]
191 # vip_vnet = socket.inet_ntoa(
192 # struct.pack('!L', ((p2p_int>>(32-vmask))<<(32-vmask))) )
194 # cmd_routing_p2p = "/sbin/route add -net %s/%d gw %s dev %s" % (vip_vnet, vmask, opt_pointopoint, vif)
195 # print >>sys.stderr, cmd_routing_p2p
196 # os.system(cmd_routing_p2p)
198 # Process additional options
199 if opt_rp_filter is not None:
200 rp_cmd = "/sbin/sysctl net.ipv4.conf.%s.rp_filter=%s" % (vif, opt_rp_filter)
204 if opt_ovs_dp is not None:
205 cmd_ovs_addif = "ovs-dpctl add-if %s %s"%(opt_ovs_dp,vif)
206 os.system(cmd_ovs_addif)