mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-23 06:05:27 +00:00
network: prevent a few invalid configuration combinations
This resolves: https://bugzilla.redhat.com/show_bug.cgi?id=767057 It was possible to define a network with <forward mode='bridge'> that had both a bridge device and a forward device defined. These two are mutually exclusive by definition (if you are using a bridge device, then this is a host bridge, and if you have a forward dev defined, this is using macvtap). It was also possible to put <ip>, <dns>, and <domain> elements in this definition, although those aren't supported by the current driver (although it's conceivable that some other driver might support that). The items that are invalid by definition, are now checked in the XML parser (since they will definitely *always* be wrong), and the others are checked in networkValidate() in the network driver (since, as mentioned, it's possible that some other network driver, or even this one, could some day support setting those).
This commit is contained in:
parent
705e67d40b
commit
fd54f1de53
@ -1594,6 +1594,15 @@ virNetworkDefParseXML(xmlXPathContextPtr ctxt)
|
||||
def->name);
|
||||
goto error;
|
||||
}
|
||||
if (def->bridge && (def->nForwardIfs || nForwardPfs)) {
|
||||
virReportError(VIR_ERR_XML_ERROR,
|
||||
_("A network with forward mode='%s' can specify "
|
||||
"a bridge name or a forward dev, but not "
|
||||
"both (network '%s')"),
|
||||
virNetworkForwardTypeToString(def->forwardType),
|
||||
def->name);
|
||||
goto error;
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -857,6 +857,7 @@ virNetworkDefParseString;
|
||||
virNetworkDeleteConfig;
|
||||
virNetworkFindByName;
|
||||
virNetworkFindByUUID;
|
||||
virNetworkForwardTypeToString;
|
||||
virNetworkIpDefNetmask;
|
||||
virNetworkIpDefPrefix;
|
||||
virNetworkList;
|
||||
|
@ -2751,6 +2751,35 @@ networkValidate(struct network_driver *driver,
|
||||
return -1;
|
||||
|
||||
virNetworkSetBridgeMacAddr(def);
|
||||
} else {
|
||||
/* They are also the only types that currently support setting
|
||||
* an IP address for the host-side device (bridge)
|
||||
*/
|
||||
if (virNetworkDefGetIpByIndex(def, AF_UNSPEC, 0)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unsupported <ip> element in network %s "
|
||||
"with forward mode='%s'"),
|
||||
def->name,
|
||||
virNetworkForwardTypeToString(def->forwardType));
|
||||
return -1;
|
||||
}
|
||||
if (def->dns &&
|
||||
(def->dns->ntxtrecords || def->dns->nhosts || def->dns->nsrvrecords)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unsupported <dns> element in network %s "
|
||||
"with forward mode='%s'"),
|
||||
def->name,
|
||||
virNetworkForwardTypeToString(def->forwardType));
|
||||
return -1;
|
||||
}
|
||||
if (def->domain) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unsupported <domain> element in network %s "
|
||||
"with forward mode='%s'"),
|
||||
def->name,
|
||||
virNetworkForwardTypeToString(def->forwardType));
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
||||
/* We only support dhcp on one IPv4 address per defined network */
|
||||
|
Loading…
Reference in New Issue
Block a user