761cf19d7b
for planned nft backend we have three choices: - open/close a new nfnetlink socket for every operation - keep a nfnetlink socket open internally - expose a opaque fw_ctx and stash all internal data here. Originally I opted for the 2nd option, but during review it was suggested to avoid static storage duration because of perceived problems with threaded applications. This adds fw_ctx and new/free functions, then converts the existing api and nspawn and networkd to use it.
116 lines
4.2 KiB
C
116 lines
4.2 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
|
|
#include <netinet/in.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
|
|
#include "sd-daemon.h"
|
|
#include "sd-event.h"
|
|
|
|
#include "capability-util.h"
|
|
#include "daemon-util.h"
|
|
#include "firewall-util.h"
|
|
#include "main-func.h"
|
|
#include "mkdir.h"
|
|
#include "networkd-conf.h"
|
|
#include "networkd-manager.h"
|
|
#include "signal-util.h"
|
|
#include "user-util.h"
|
|
|
|
static int run(int argc, char *argv[]) {
|
|
_cleanup_(manager_freep) Manager *m = NULL;
|
|
_cleanup_(notify_on_cleanup) const char *notify_message = NULL;
|
|
int r;
|
|
|
|
log_setup_service();
|
|
|
|
umask(0022);
|
|
|
|
if (argc != 1)
|
|
return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "This program takes no arguments.");
|
|
|
|
/* Drop privileges, but only if we have been started as root. If we are not running as root we assume all
|
|
* privileges are already dropped and we can't create our runtime directory. */
|
|
if (geteuid() == 0) {
|
|
const char *user = "systemd-network";
|
|
uid_t uid;
|
|
gid_t gid;
|
|
|
|
r = get_user_creds(&user, &uid, &gid, NULL, NULL, 0);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Cannot resolve user name %s: %m", user);
|
|
|
|
/* Create runtime directory. This is not necessary when networkd is
|
|
* started with "RuntimeDirectory=systemd/netif", or after
|
|
* systemd-tmpfiles-setup.service. */
|
|
r = mkdir_safe_label("/run/systemd/netif", 0755, uid, gid, MKDIR_WARN_MODE);
|
|
if (r < 0)
|
|
log_warning_errno(r, "Could not create runtime directory: %m");
|
|
|
|
r = drop_privileges(uid, gid,
|
|
(1ULL << CAP_NET_ADMIN) |
|
|
(1ULL << CAP_NET_BIND_SERVICE) |
|
|
(1ULL << CAP_NET_BROADCAST) |
|
|
(1ULL << CAP_NET_RAW));
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to drop privileges: %m");
|
|
}
|
|
|
|
/* Always create the directories people can create inotify watches in.
|
|
* It is necessary to create the following subdirectories after drop_privileges()
|
|
* to support old kernels not supporting AmbientCapabilities=. */
|
|
r = mkdir_safe_label("/run/systemd/netif/links", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE);
|
|
if (r < 0)
|
|
log_warning_errno(r, "Could not create runtime directory 'links': %m");
|
|
|
|
r = mkdir_safe_label("/run/systemd/netif/leases", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE);
|
|
if (r < 0)
|
|
log_warning_errno(r, "Could not create runtime directory 'leases': %m");
|
|
|
|
r = mkdir_safe_label("/run/systemd/netif/lldp", 0755, UID_INVALID, GID_INVALID, MKDIR_WARN_MODE);
|
|
if (r < 0)
|
|
log_warning_errno(r, "Could not create runtime directory 'lldp': %m");
|
|
|
|
assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGTERM, SIGINT, -1) >= 0);
|
|
|
|
r = manager_new(&m);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Could not create manager: %m");
|
|
|
|
r = manager_connect_bus(m);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Could not connect to bus: %m");
|
|
|
|
r = manager_parse_config_file(m);
|
|
if (r < 0)
|
|
log_warning_errno(r, "Failed to parse configuration file: %m");
|
|
|
|
r = manager_load_config(m);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Could not load configuration files: %m");
|
|
|
|
r = manager_enumerate(m);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = fw_ctx_new(&m->fw_ctx);
|
|
if (r < 0)
|
|
log_warning_errno(r, "Could not initialize firewall, IPMasquerade= option not available: %m");
|
|
|
|
r = manager_start(m);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Could not start manager: %m");
|
|
|
|
log_info("Enumeration completed");
|
|
|
|
notify_message = notify_start(NOTIFY_READY, NOTIFY_STOPPING);
|
|
|
|
r = sd_event_loop(m->event);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Event loop failed: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
DEFINE_MAIN_FUNCTION(run);
|