On Sat, Apr 26, 2025 at 09:42:35AM +0200, Roman Bogorodskiy wrote:
> Add BSD-specific platform flavor of the bridge driver which will be used
> as a base for Packet Filter (pf) based NAT networking implementation.
>
> Signed-off-by: Roman Bogorodskiy <[email protected]>
> ---
> po/POTFILES | 1 +
> src/network/bridge_driver_bsd.c | 101 +++++++++++++++++++++++++++
> src/network/bridge_driver_platform.c | 2 +
> 3 files changed, 104 insertions(+)
> create mode 100644 src/network/bridge_driver_bsd.c
>
> diff --git a/po/POTFILES b/po/POTFILES
> index 9747c38951..90664fe6e7 100644
> --- a/po/POTFILES
> +++ b/po/POTFILES
> @@ -145,6 +145,7 @@ src/lxc/lxc_hostdev.c
> src/lxc/lxc_native.c
> src/lxc/lxc_process.c
> src/network/bridge_driver.c
> +src/network/bridge_driver_bsd.c
> src/network/bridge_driver_conf.c
> src/network/bridge_driver_linux.c
> src/network/bridge_driver_nop.c
> diff --git a/src/network/bridge_driver_bsd.c b/src/network/bridge_driver_bsd.c
> new file mode 100644
> index 0000000000..93312fe6db
> --- /dev/null
> +++ b/src/network/bridge_driver_bsd.c
> @@ -0,0 +1,101 @@
> +/*
> + * Copyright (C) 2025 FreeBSD Foundation
> + *
> + * This library is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU Lesser General Public
> + * License as published by the Free Software Foundation; either
> + * version 2.1 of the License, or (at your option) any later version.
> + *
> + * This library is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> + * Lesser General Public License for more details.
> + *
> + * You should have received a copy of the GNU Lesser General Public
> + * License along with this library. If not, see
> + * <http://www.gnu.org/licenses/>.
> + */
> +
> +#include <config.h>
> +
> +#include "virlog.h"
> +
> +#define VIR_FROM_THIS VIR_FROM_NONE
> +
> +VIR_LOG_INIT("network.bridge_driver_bsd");
> +
> +static virErrorPtr errInitV4;
> +static virErrorPtr errInitV6;
> +
> +void networkPreReloadFirewallRules(virNetworkDriverState *driver
> G_GNUC_UNUSED,
> + bool startup G_GNUC_UNUSED,
> + bool force G_GNUC_UNUSED)
> +{
> +}
> +
> +
> +void networkPostReloadFirewallRules(bool startup G_GNUC_UNUSED)
> +{
> +}
> +
> +
> +int networkCheckRouteCollision(virNetworkDef *def G_GNUC_UNUSED)
> +{
> + return 0;
> +}
> +
> +int networkAddFirewallRules(virNetworkDef *def G_GNUC_UNUSED,
> + virFirewallBackend firewallBackend,
> + virFirewall **fwRemoval G_GNUC_UNUSED)
> +{
You should report an error if "def->bridgeZone" is non-NULL,
similar to the way Linux reports it when firewalld is not
available.
> + if (def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
> + VIR_DEBUG("No firewall rules to add for mode='open' network '%s'",
> def->name);
> + } else {
> + VIR_DEBUG("Adding firewall rules for mode='%s' network '%s' using
> %s",
> + virNetworkForwardTypeToString(def->forward.type),
> + def->name,
> + virFirewallBackendTypeToString(firewallBackend));
> +
> + if (errInitV4 &&
> + (virNetworkDefGetIPByIndex(def, AF_INET, 0) ||
> + virNetworkDefGetRouteByIndex(def, AF_INET, 0))) {
> + virSetError(errInitV4);
> + return -1;
> + }
> +
> + if (errInitV6 &&
> + (virNetworkDefGetIPByIndex(def, AF_INET6, 0) ||
> + virNetworkDefGetRouteByIndex(def, AF_INET6, 0) ||
> + def->ipv6nogw)) {
> + virSetError(errInitV6);
> + return -1;
> + }
> +
> + /* now actually add the rules */
> + switch (firewallBackend) {
> + case VIR_FIREWALL_BACKEND_NONE:
> + virReportError(VIR_ERR_NO_SUPPORT, "%s",
> + _("No firewall backend is available"));
> + return -1;
> +
> + case VIR_FIREWALL_BACKEND_IPTABLES:
> + case VIR_FIREWALL_BACKEND_NFTABLES:
> + case VIR_FIREWALL_BACKEND_LAST:
> + virReportEnumRangeError(virFirewallBackend, firewallBackend);
> + return -1;
> + }
> + }
> + return 0;
> +}
> +
> +void
> +networkRemoveFirewallRules(virNetworkObj *obj,
> + bool unsetZone G_GNUC_UNUSED)
> +{
> + virNetworkDef *def = virNetworkObjGetDef(obj);
> + if (def->forward.type == VIR_NETWORK_FORWARD_OPEN) {
> + VIR_DEBUG("No firewall rules to remove for mode='open' network '%s'",
> + def->name);
> + return;
> + }
> +}
> diff --git a/src/network/bridge_driver_platform.c
> b/src/network/bridge_driver_platform.c
> index 9ddcb71063..42fbcdbc0b 100644
> --- a/src/network/bridge_driver_platform.c
> +++ b/src/network/bridge_driver_platform.c
> @@ -25,6 +25,8 @@
>
> #if defined(__linux__)
> # include "bridge_driver_linux.c"
> +#elif defined(__FreeBSD__)
> +# include "bridge_driver_bsd.c"
> #else
> # include "bridge_driver_nop.c"
> #endif
> --
> 2.49.0
>
With regards,
Daniel
--
|: https://berrange.com -o- https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o- https://fstop138.berrange.com :|
|: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|