Skip to content

Commit

Permalink
ssh: T6192: allow binding to multiple VRF instances
Browse files Browse the repository at this point in the history
Currently VyOS only supports binding a service to one individual VRF. It might
become handy to have the services (initially it will be VRF, NTP and SNMP) be
bound to multiple VRFs.

Changed VRF from leafNode to multi leafNode with defaultValue: default - which
is the name of the default VRF.

(cherry picked from commit e5af1f0)
  • Loading branch information
c-po authored and mergify[bot] committed Apr 2, 2024
1 parent b3fb51c commit cc208d7
Show file tree
Hide file tree
Showing 8 changed files with 88 additions and 39 deletions.
14 changes: 0 additions & 14 deletions data/templates/ssh/override.conf.j2

This file was deleted.

7 changes: 7 additions & 0 deletions debian/vyos-1x.postinst
Original file line number Diff line number Diff line change
Expand Up @@ -192,3 +192,10 @@ systemctl enable vyos-config-cloud-init.service

# Update XML cache
python3 /usr/lib/python3/dist-packages/vyos/xml_ref/update_cache.py

# Generate hardlinks for systemd units for multi VRF support
# as softlinks will fail in systemd:
# symlink target name type "ssh.service" does not match source, rejecting.
if [ ! -f /lib/systemd/system/ssh@.service ]; then
ln /lib/systemd/system/ssh.service /lib/systemd/system/ssh@.service
fi
22 changes: 22 additions & 0 deletions interface-definitions/include/vrf-multi.xml.i
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
<!-- include start from interface/vrf.xml.i -->
<leafNode name="vrf">
<properties>
<help>VRF instance name</help>
<completionHelp>
<path>vrf name</path>
<list>default</list>
</completionHelp>
<valueHelp>
<format>default</format>
<description>Explicitly start in default VRF</description>
</valueHelp>
<valueHelp>
<format>txt</format>
<description>VRF instance name</description>
</valueHelp>
#include <include/constraint/vrf.xml.i>
<multi/>
</properties>
<defaultValue>default</defaultValue>
</leafNode>
<!-- include end -->
2 changes: 1 addition & 1 deletion interface-definitions/service_ssh.xml.in
Original file line number Diff line number Diff line change
Expand Up @@ -262,7 +262,7 @@
</constraint>
</properties>
</leafNode>
#include <include/interface/vrf.xml.i>
#include <include/vrf-multi.xml.i>
</children>
</node>
</children>
Expand Down
15 changes: 11 additions & 4 deletions python/vyos/configverify.py
Original file line number Diff line number Diff line change
Expand Up @@ -99,10 +99,17 @@ def verify_vrf(config):
Common helper function used by interface implementations to perform
recurring validation of VRF configuration.
"""
from netifaces import interfaces
if 'vrf' in config and config['vrf'] != 'default':
if config['vrf'] not in interfaces():
raise ConfigError('VRF "{vrf}" does not exist'.format(**config))
from vyos.utils.network import interface_exists
if 'vrf' in config:
vrfs = config['vrf']
if isinstance(vrfs, str):
vrfs = [vrfs]

for vrf in vrfs:
if vrf == 'default':
continue
if not interface_exists(vrf):
raise ConfigError(f'VRF "{vrf}" does not exist!')

if 'is_bridge_member' in config:
raise ConfigError(
Expand Down
38 changes: 27 additions & 11 deletions smoketest/scripts/cli/test_service_ssh.py
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,6 @@
PROCESS_NAME = 'sshd'
SSHD_CONF = '/run/sshd/sshd_config'
base_path = ['service', 'ssh']
vrf = 'mgmt'

key_rsa = '/etc/ssh/ssh_host_rsa_key'
key_dsa = '/etc/ssh/ssh_host_dsa_key'
Expand All @@ -51,13 +50,15 @@ def setUpClass(cls):
# ensure we can also run this test on a live system - so lets clean
# out the current configuration :)
cls.cli_delete(cls, base_path)
cls.cli_delete(cls, ['vrf'])

def tearDown(self):
# Check for running process
self.assertTrue(process_named_running(PROCESS_NAME))

# delete testing SSH config
self.cli_delete(base_path)
self.cli_delete(['vrf'])
self.cli_commit()

self.assertTrue(os.path.isfile(key_rsa))
Expand All @@ -79,7 +80,7 @@ def test_ssh_default(self):

# Check configured port
port = get_config_value('Port')[0]
self.assertEqual('22', port)
self.assertEqual('22', port) # default value

def test_ssh_single_listen_address(self):
# Check if SSH service can be configured and runs
Expand Down Expand Up @@ -141,10 +142,9 @@ def test_ssh_multiple_listen_addresses(self):
for address in addresses:
self.assertIn(address, tmp)

def test_ssh_vrf(self):
def test_ssh_vrf_single(self):
vrf = 'mgmt'
# Check if SSH service can be bound to given VRF
port = '22'
self.cli_set(base_path + ['port', port])
self.cli_set(base_path + ['vrf', vrf])

# VRF does yet not exist - an error must be thrown
Expand All @@ -156,16 +156,32 @@ def test_ssh_vrf(self):
# commit changes
self.cli_commit()

# Check configured port
tmp = get_config_value('Port')
self.assertIn(port, tmp)

# Check for process in VRF
tmp = cmd(f'ip vrf pids {vrf}')
self.assertIn(PROCESS_NAME, tmp)

# delete VRF
self.cli_delete(['vrf', 'name', vrf])
def test_ssh_vrf_multi(self):
# Check if SSH service can be bound to multiple VRFs
vrfs = ['red', 'blue', 'green']
for vrf in vrfs:
self.cli_set(base_path + ['vrf', vrf])

# VRF does yet not exist - an error must be thrown
with self.assertRaises(ConfigSessionError):
self.cli_commit()

table = 12345
for vrf in vrfs:
self.cli_set(['vrf', 'name', vrf, 'table', str(table)])
table += 1

# commit changes
self.cli_commit()

# Check for process in VRF
for vrf in vrfs:
tmp = cmd(f'ip vrf pids {vrf}')
self.assertIn(PROCESS_NAME, tmp)

def test_ssh_login(self):
# Perform SSH login and command execution with a predefined user. The
Expand Down
16 changes: 7 additions & 9 deletions src/conf_mode/service_ssh.py
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
#!/usr/bin/env python3
#
# Copyright (C) 2018-2022 VyOS maintainers and contributors
# Copyright (C) 2018-2024 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
Expand Down Expand Up @@ -30,7 +30,6 @@
airbag.enable()

config_file = r'/run/sshd/sshd_config'
systemd_override = r'/run/systemd/system/ssh.service.d/override.conf'

sshguard_config_file = '/etc/sshguard/sshguard.conf'
sshguard_whitelist = '/etc/sshguard/whitelist'
Expand Down Expand Up @@ -81,8 +80,6 @@ def generate(ssh):
if not ssh:
if os.path.isfile(config_file):
os.unlink(config_file)
if os.path.isfile(systemd_override):
os.unlink(systemd_override)

return None

Expand All @@ -99,13 +96,10 @@ def generate(ssh):
call(f'ssh-keygen -q -N "" -t ed25519 -f {key_ed25519}')

render(config_file, 'ssh/sshd_config.j2', ssh)
render(systemd_override, 'ssh/override.conf.j2', ssh)

if 'dynamic_protection' in ssh:
render(sshguard_config_file, 'ssh/sshguard_config.j2', ssh)
render(sshguard_whitelist, 'ssh/sshguard_whitelist.j2', ssh)
# Reload systemd manager configuration
call('systemctl daemon-reload')

return None

Expand All @@ -114,7 +108,7 @@ def apply(ssh):
systemd_service_sshguard = 'sshguard.service'
if not ssh:
# SSH access is removed in the commit
call(f'systemctl stop {systemd_service_ssh}')
call(f'systemctl stop ssh@*.service')
call(f'systemctl stop {systemd_service_sshguard}')
return None

Expand All @@ -126,9 +120,13 @@ def apply(ssh):
# we need to restart the service if e.g. the VRF name changed
systemd_action = 'reload-or-restart'
if 'restart_required' in ssh:
# this is only true if something for the VRFs changed, thus we
# stop all VRF services and only restart then new ones
call(f'systemctl stop ssh@*.service')
systemd_action = 'restart'

call(f'systemctl {systemd_action} {systemd_service_ssh}')
for vrf in ssh['vrf']:
call(f'systemctl {systemd_action} ssh@{vrf}.service')
return None

if __name__ == '__main__':
Expand Down
13 changes: 13 additions & 0 deletions src/etc/systemd/system/ssh@.service.d/vrf-override.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
[Unit]
StartLimitIntervalSec=0
After=vyos-router.service
ConditionPathExists=/run/sshd/sshd_config

[Service]
EnvironmentFile=
ExecStart=
ExecStart=ip vrf exec %i /usr/sbin/sshd -f /run/sshd/sshd_config
Restart=always
RestartPreventExitStatus=
RestartSec=10
RuntimeDirectoryPreserve=yes

0 comments on commit cc208d7

Please sign in to comment.