genode/repos/os/src/server/nic_router/domain.cc

166 lines
4.3 KiB
C++

/*
* \brief Reflects an effective domain configuration node
* \author Martin Stein
* \date 2016-08-19
*/
/*
* Copyright (C) 2016 Genode Labs GmbH
*
* This file is part of the Genode OS framework, which is distributed
* under the terms of the GNU General Public License version 2.
*/
/* local includes */
#include <configuration.h>
#include <protocol_name.h>
/* Genode includes */
#include <util/xml_node.h>
#include <base/allocator.h>
#include <base/log.h>
using namespace Net;
using namespace Genode;
/***********************
** Domain_avl_member **
***********************/
Domain_avl_member::Domain_avl_member(Domain_name const &name,
Domain &domain)
:
Avl_string_base(name.string()), _domain(domain)
{ }
/*****************
** Domain_base **
*****************/
Domain_base::Domain_base(Xml_node const &node)
:
_name(Cstring(node.attribute("name").value_base(),
node.attribute("name").value_size()))
{ }
/************
** Domain **
************/
void Domain::_read_forward_rules(Cstring const &protocol,
Domain_tree &domains,
Xml_node const &node,
char const *type,
Forward_rule_tree &rules)
{
node.for_each_sub_node(type, [&] (Xml_node const &node) {
try {
Forward_rule &rule = *new (_alloc) Forward_rule(domains, node);
rules.insert(&rule);
if (_config.verbose()) {
log(" Forward rule: ", protocol, " ", rule); }
}
catch (Rule::Invalid) { warning("invalid forward rule"); }
});
}
void Domain::_read_transport_rules(Cstring const &protocol,
Domain_tree &domains,
Xml_node const &node,
char const *type,
Transport_rule_list &rules)
{
node.for_each_sub_node(type, [&] (Xml_node const &node) {
try {
rules.insert(*new (_alloc) Transport_rule(domains, node, _alloc,
protocol, _config));
}
catch (Rule::Invalid) { warning("invalid transport rule"); }
});
}
void Domain::print(Output &output) const
{
Genode::print(output, "\"", _name, "\"");
}
Domain::Domain(Configuration &config, Xml_node const &node, Allocator &alloc)
:
Domain_base(node), _avl_member(_name, *this), _config(config),
_node(node), _alloc(alloc),
_interface_attr(node.attribute_value("interface", Ipv4_address_prefix())),
_gateway(node.attribute_value("gateway", Ipv4_address())),
_gateway_valid(_gateway.valid())
{
if (_name == Domain_name() || !_interface_attr.valid() ||
(_gateway_valid && !_interface_attr.prefix_matches(_gateway)))
{
throw Invalid();
}
}
void Domain::create_rules(Domain_tree &domains)
{
/* read forward rules */
_read_forward_rules(tcp_name(), domains, _node, "tcp-forward",
_tcp_forward_rules);
_read_forward_rules(udp_name(), domains, _node, "udp-forward",
_udp_forward_rules);
/* read UDP and TCP rules */
_read_transport_rules(tcp_name(), domains, _node, "tcp", _tcp_rules);
_read_transport_rules(udp_name(), domains, _node, "udp", _udp_rules);
/* read NAT rules */
_node.for_each_sub_node("nat", [&] (Xml_node const &node) {
try {
_nat_rules.insert(
new (_alloc) Nat_rule(domains, _tcp_port_alloc,
_udp_port_alloc, node));
}
catch (Rule::Invalid) { warning("invalid NAT rule"); }
});
/* read IP rules */
_node.for_each_sub_node("ip", [&] (Xml_node const &node) {
try { _ip_rules.insert(*new (_alloc) Ip_rule(domains, node)); }
catch (Rule::Invalid) { warning("invalid IP rule"); }
});
}
Ipv4_address const &Domain::next_hop(Ipv4_address const &ip) const
{
if (_interface_attr.prefix_matches(ip)) { return ip; }
if (_gateway_valid) { return _gateway; }
throw No_next_hop();
}
/*****************
** Domain_tree **
*****************/
Domain &Domain_tree::domain(Avl_string_base const &node)
{
return static_cast<Domain_avl_member const *>(&node)->domain();
}
Domain &Domain_tree::find_by_name(Domain_name name)
{
if (name == Domain_name() || !first()) {
throw No_match(); }
Avl_string_base *node = first()->find_by_name(name.string());
if (!node) {
throw No_match(); }
return domain(*node);
}