toe_beans/v4/server/
leases.rs1use super::Config;
2use crate::v4::error::Result;
3use ip_network::Ipv4Network;
4use log::{debug, warn};
5use mac_address::MacAddress;
6use serde::{Deserialize, Serialize};
7use std::fs::{File, read_to_string};
8use std::io::Write;
9use std::os::unix::fs::OpenOptionsExt;
10use std::time::{Duration, SystemTime};
11use std::{
12 collections::{HashMap, HashSet},
13 fs::OpenOptions,
14 net::Ipv4Addr,
15};
16
17#[derive(Deserialize, Serialize, Clone)]
18enum LeaseStatus {
19 Offered,
20 Acked,
21}
22
23#[derive(Deserialize, Serialize, Clone)]
24struct Lease {
25 ip: Ipv4Addr,
26 status: LeaseStatus,
27 is_static: bool,
28 when: SystemTime,
30}
31
32impl Lease {
33 #[inline]
34 fn new(ip: Ipv4Addr, status: LeaseStatus, is_static: bool) -> Self {
35 Self {
36 ip,
37 status,
38 is_static,
39 when: SystemTime::now(),
40 }
41 }
42
43 #[inline]
45 fn extend(&mut self) {
46 self.when = SystemTime::now();
47 }
48
49 fn is_expired(&self, lease_time: u32) -> Result<bool> {
50 match self.when.elapsed() {
51 Ok(elapsed) => Ok(elapsed >= Duration::from_secs(lease_time as u64)),
52 Err(_) => Err("Problem getting elapsed system time"),
53 }
54 }
55}
56
57#[derive(Deserialize, Serialize)]
59pub struct Leases {
60 #[serde(skip)]
61 available: HashSet<Ipv4Addr>,
62 leased: HashMap<MacAddress, Lease>,
63 #[serde(skip)]
66 static_leases: HashMap<MacAddress, Ipv4Addr>,
67 lease_time: u32,
69 #[serde(skip)]
74 leases_file: Option<File>,
75}
76
77impl Leases {
78 pub const FILE_NAME: &'static str = "toe-beans-leases.toml";
80
81 const OFFER_TIMEOUT: u32 = 300;
88
89 pub fn new(config: &Config) -> Self {
92 let empty_leases = || {
93 debug!("Not using leases file");
94 let size = config.network_cidr.hosts().len();
95 Self {
96 available: HashSet::with_capacity(size),
97 leased: HashMap::with_capacity(size),
98 static_leases: HashMap::new(),
99 lease_time: config.lease_time.as_server(),
100 leases_file: None,
101 }
102 };
103
104 let mut leases = if config.use_leases_file {
105 let mut leases = Self::read_leases(config).unwrap_or_else(|_| empty_leases());
106 leases.leases_file = Some(
107 OpenOptions::new()
108 .read(false)
109 .write(true)
110 .create(true)
111 .truncate(true)
112 .mode(0o644) .open(config.path.join(Self::FILE_NAME))
114 .expect("Failed to open leases file"),
115 );
116 leases
117 } else {
118 empty_leases()
119 };
120
121 leases.static_leases = config.static_leases.clone();
122 leases.fill_available(&config.network_cidr);
123
124 leases
125 }
126
127 fn read_leases(config: &Config) -> Result<Leases> {
128 debug!("Trying to read, parse, and validate leases file");
129 let read_result = read_to_string(config.path.join(Self::FILE_NAME));
130
131 let leases: Leases = match read_result {
132 Ok(toml_string) => {
133 let toml_result = toml::from_str(&toml_string);
134 match toml_result {
135 Ok(leases) => leases,
136 Err(_) => return Err("Problem parsing leases file"),
137 }
138 }
139 Err(_) => {
140 return Err("Problem reading leases file");
141 }
142 };
143
144 leases.validate(&config.network_cidr)?;
145
146 Ok(leases)
147 }
148
149 #[inline]
153 fn validate(&self, network: &Ipv4Network) -> Result<()> {
154 let broadcast_address = network.broadcast_address();
155 let network_address = network.network_address();
156
157 self.static_leases.values().try_for_each(|static_ip| {
158 if !network.contains(*static_ip) {
159 return Err("The configured network range does not include the restored static ip. Did the network range change?");
160 }
161
162 if static_ip == &broadcast_address {
163 return Err("The network's broadcast address can't be statically leased");
164 }
165
166 if static_ip == &network_address {
167 return Err("The network's network address can't be statically leased");
168 }
169
170 Ok(())
171 })?;
172
173 self.leased.values().try_for_each(|lease| {
174 let ip = lease.ip;
175
176 if !network.contains(ip) {
177 return Err("The configured network range does not include the restored leased ip. Did the network range change?");
178 }
179
180 if ip == broadcast_address {
181 return Err("The network's broadcast address can't be leased");
182 }
183
184 if ip == network_address {
185 return Err("The network's network address can't be leased");
186 }
187
188 Ok(())
189 })?;
190
191 Ok(())
192 }
193
194 fn fill_available(&mut self, network: &Ipv4Network) {
196 let hosts = network.hosts();
197
198 self.available.extend(hosts);
199
200 self.available.remove(&network.broadcast_address());
202 self.available.remove(&network.network_address());
203
204 self.leased.values().for_each(|lease| {
206 self.available.remove(&lease.ip);
207 });
208
209 self.static_leases.values().for_each(|ip| {
211 self.available.remove(ip);
212 });
213 }
214
215 fn commit(&mut self) -> Result<()> {
217 if self.leases_file.is_none() {
219 return Ok(());
220 }
221
222 debug!("Writing {}", Self::FILE_NAME);
223
224 let file_content = match toml::to_string_pretty(&self) {
225 Ok(content) => content,
226 Err(_) => return Err("Failed to generate toml content for leases file"),
227 };
228
229 let leases_file = self
230 .leases_file
231 .as_mut()
232 .expect("A leases file should always be Some at this point");
233
234 if leases_file.set_len(0).is_err() {
236 return Err("Failed to truncate leases file");
237 }
238
239 match leases_file.write_all(file_content.as_bytes()) {
240 Ok(_) => Ok(()),
241 Err(_) => Err("Failed to write to leases file"),
242 }
243 }
244
245 pub fn offer(&mut self, owner: MacAddress, requested_ip: Option<Ipv4Addr>) -> Result<Ipv4Addr> {
255 if let Some(lease) = self.leased.get_mut(&owner) {
256 match lease.status {
257 LeaseStatus::Offered => {
258 warn!(
259 "{} will be offered an IP address that it has already been offered",
260 owner
261 );
262 lease.extend();
263 return Ok(lease.ip);
264 }
265 LeaseStatus::Acked => {
266 if !lease.is_expired(self.lease_time)? {
267 warn!(
268 "{} will be offered its non-expired, acked IP address again",
269 owner
270 );
271 lease.status = LeaseStatus::Offered;
272 lease.extend();
273 return Ok(lease.ip);
274 }
275 }
277 }
278 }
279
280 if let Some(requested_ip) = requested_ip {
281 let not_available = !self.available.contains(&requested_ip);
282 let has_static_lease = self.static_leases.contains_key(&owner);
283
284 if not_available {
285 debug!("Requested IP Address is not available (or maybe not in network range)");
287 } else if has_static_lease {
288 debug!("Requested IP Address ignored because owner has static lease");
289 } else {
290 self.available.remove(&requested_ip);
291 self.leased
292 .insert(owner, Lease::new(requested_ip, LeaseStatus::Offered, false));
293 return Ok(requested_ip);
294 }
295 }
296
297 let lease = self.get_lease(&owner, LeaseStatus::Offered)?;
299 let ip = lease.ip;
300 self.leased.insert(owner, lease);
301 Ok(ip)
302 }
303
304 pub fn ack(&mut self, owner: MacAddress) -> Result<Ipv4Addr> {
307 let maybe_leased = self.leased.get_mut(&owner);
308 let ip = match maybe_leased {
309 Some(leased) => {
310 match leased.status {
311 LeaseStatus::Offered => {
312 leased.status = LeaseStatus::Acked;
313 }
314 LeaseStatus::Acked => {
315 warn!(
316 "{} will be leased an IP address it was already leased",
317 owner
318 );
319 }
320 };
321
322 leased.extend();
323 leased.ip
324 }
325 None => {
326 let lease = self.get_lease(&owner, LeaseStatus::Acked)?;
328 let ip = lease.ip;
329 self.leased.insert(owner, lease);
330 ip
331 }
332 };
333
334 self.commit()?;
335
336 Ok(ip)
337 }
338
339 pub fn extend(&mut self, owner: MacAddress) -> Result<()> {
342 match self.leased.get_mut(&owner) {
343 Some(lease) => {
344 lease.extend();
345 Ok(())
346 }
347 None => Err("No IP address lease found with that owner"),
348 }
349 }
350
351 pub fn release(&mut self, owner: MacAddress) -> Result<()> {
353 let maybe_leased = self.leased.remove(&owner);
354
355 match maybe_leased {
356 Some(lease) => {
357 if !lease.is_static {
358 self.available.insert(lease.ip);
359 }
360 Ok(())
361 }
362 None => Err("No IP address lease found with that owner"),
363 }
364 }
365
366 fn get_lease(&mut self, owner: &MacAddress, status: LeaseStatus) -> Result<Lease> {
368 let lease = match self.static_leases.get(owner) {
369 Some(ip) => Lease::new(*ip, status, true),
370 None => Lease::new(self.get_ip()?, status, false),
371 };
372 Ok(lease)
373 }
374
375 fn get_ip(&mut self) -> Result<Ipv4Addr> {
380 if let Some(any) = self.available.iter().next().cloned() {
381 debug!("Chose available IP address {any}");
382 return Ok(self.available.take(&any).unwrap());
384 }
385
386 let maybe_expired_lease = self
387 .leased
388 .clone() .into_iter() .find(|(_owner, lease)| {
391 let expiration = match lease.status {
392 LeaseStatus::Offered => Self::OFFER_TIMEOUT,
393 LeaseStatus::Acked => self.lease_time,
394 };
395 lease.is_expired(expiration).unwrap_or(false)
396 });
397
398 if let Some(expired_lease) = maybe_expired_lease {
399 debug!("Reusing expired lease's IP address");
400 return Ok(self.leased.remove(&expired_lease.0).unwrap().ip);
402 }
403
404 Err("No more IP addresses available")
405 }
406
407 pub fn is_available(&self, ip: &Ipv4Addr) -> bool {
409 self.available.contains(ip)
410 }
411
412 pub fn verify_lease(&self, owner: MacAddress, ip: &Ipv4Addr) -> Result<()> {
415 let maybe_leased = self.leased.get(&owner);
416
417 match maybe_leased {
418 Some(lease) => {
419 if let LeaseStatus::Offered = lease.status {
420 return Err("Lease offered but not previously acked");
421 }
422
423 if &lease.ip != ip {
424 return Err("Client's notion of ip address is wrong");
425 }
426
427 if lease.is_expired(self.lease_time)? {
428 return Err("Lease has expired");
429 }
430
431 Ok(())
432 }
433 None => Err("No IP address lease found with that owner"),
434 }
435 }
436}