]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
4d1cf1e2 | 2 | |
4d1cf1e2 | 3 | #include <errno.h> |
07630cea LP |
4 | #include <netdb.h> |
5 | #include <nss.h> | |
55679e29 | 6 | #include <pthread.h> |
4d1cf1e2 | 7 | #include <stdlib.h> |
ca78ad1d ZJS |
8 | #include <sys/types.h> |
9 | #include <unistd.h> | |
4d1cf1e2 | 10 | |
aee9d18c | 11 | #include "env-util.h" |
2b2fec7d | 12 | #include "errno-util.h" |
28e5e1e9 | 13 | #include "glyph-util.h" |
07630cea | 14 | #include "in-addr-util.h" |
4d1cf1e2 LP |
15 | #include "macro.h" |
16 | #include "nss-util.h" | |
4cbfd62b | 17 | #include "resolved-def.h" |
0c5eb056 | 18 | #include "signal-util.h" |
2b2fec7d | 19 | #include "string-util.h" |
0c73f4f0 LP |
20 | #include "strv.h" |
21 | #include "varlink.h" | |
4d1cf1e2 | 22 | |
f0e4244b | 23 | static JsonDispatchFlags json_dispatch_flags = JSON_ALLOW_EXTENSIONS; |
55679e29 ZJS |
24 | |
25 | static void setup_logging(void) { | |
a7d15a24 | 26 | log_parse_environment_variables(); |
55679e29 ZJS |
27 | |
28 | if (DEBUG_LOGGING) | |
29 | json_dispatch_flags = JSON_LOG; | |
30 | } | |
31 | ||
32 | static void setup_logging_once(void) { | |
33 | static pthread_once_t once = PTHREAD_ONCE_INIT; | |
34 | assert_se(pthread_once(&once, setup_logging) == 0); | |
35 | } | |
36 | ||
37 | #define NSS_ENTRYPOINT_BEGIN \ | |
38 | BLOCK_SIGNALS(NSS_SIGNALS_BLOCK); \ | |
39 | setup_logging_once() | |
40 | ||
4d1cf1e2 LP |
41 | NSS_GETHOSTBYNAME_PROTOTYPES(resolve); |
42 | NSS_GETHOSTBYADDR_PROTOTYPES(resolve); | |
43 | ||
0c73f4f0 | 44 | static bool error_shall_fallback(const char *error_id) { |
ae78529f LP |
45 | /* The Varlink errors where we shall signal "please fallback" back to the NSS stack, so that some |
46 | * fallback module can be loaded. (These are mostly all Varlink-internal errors, as apparently we | |
47 | * then were unable to even do IPC with systemd-resolved.) */ | |
0c73f4f0 LP |
48 | return STR_IN_SET(error_id, |
49 | VARLINK_ERROR_DISCONNECTED, | |
50 | VARLINK_ERROR_TIMEOUT, | |
51 | VARLINK_ERROR_PROTOCOL, | |
52 | VARLINK_ERROR_INTERFACE_NOT_FOUND, | |
53 | VARLINK_ERROR_METHOD_NOT_FOUND, | |
54 | VARLINK_ERROR_METHOD_NOT_IMPLEMENTED); | |
7c2a5e26 LP |
55 | } |
56 | ||
ae78529f LP |
57 | static bool error_shall_try_again(const char *error_id) { |
58 | /* The Varlink errors where we shall signal "can't answer now but might be able to later" back to the | |
59 | * NSS stack. These are all errors that indicate lack of configuration or network problems. */ | |
60 | return STR_IN_SET(error_id, | |
61 | "io.systemd.Resolve.NoNameServers", | |
62 | "io.systemd.Resolve.QueryTimedOut", | |
63 | "io.systemd.Resolve.MaxAttemptsReached", | |
64 | "io.systemd.Resolve.NetworkDown"); | |
65 | } | |
66 | ||
0c73f4f0 LP |
67 | static int connect_to_resolved(Varlink **ret) { |
68 | _cleanup_(varlink_unrefp) Varlink *link = NULL; | |
69 | int r; | |
309e9d86 | 70 | |
0c73f4f0 | 71 | r = varlink_connect_address(&link, "/run/systemd/resolve/io.systemd.Resolve"); |
4d1cf1e2 LP |
72 | if (r < 0) |
73 | return r; | |
74 | ||
0c73f4f0 | 75 | r = varlink_set_relative_timeout(link, SD_RESOLVED_QUERY_TIMEOUT_USEC); |
309e9d86 LP |
76 | if (r < 0) |
77 | return r; | |
78 | ||
0c73f4f0 LP |
79 | *ret = TAKE_PTR(link); |
80 | return 0; | |
4d1cf1e2 LP |
81 | } |
82 | ||
27007eff LP |
83 | static uint32_t ifindex_to_scopeid(int family, const void *a, int ifindex) { |
84 | struct in6_addr in6; | |
85 | ||
425ed139 | 86 | if (family != AF_INET6 || ifindex == 0) |
27007eff LP |
87 | return 0; |
88 | ||
89 | /* Some apps can't deal with the scope ID attached to non-link-local addresses. Hence, let's suppress that. */ | |
90 | ||
11814bbb | 91 | assert(sizeof(in6) == FAMILY_ADDRESS_SIZE(AF_INET6)); |
27007eff LP |
92 | memcpy(&in6, a, sizeof(struct in6_addr)); |
93 | ||
94876904 | 94 | return in6_addr_is_link_local(&in6) ? ifindex : 0; |
27007eff LP |
95 | } |
96 | ||
0c73f4f0 | 97 | static int json_dispatch_ifindex(const char *name, JsonVariant *variant, JsonDispatchFlags flags, void *userdata) { |
99534007 | 98 | int *ifi = ASSERT_PTR(userdata); |
718ca772 | 99 | int64_t t; |
2f28018c | 100 | |
0c73f4f0 | 101 | assert(variant); |
2f28018c | 102 | |
0c73f4f0 LP |
103 | if (!json_variant_is_integer(variant)) |
104 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an integer.", strna(name)); | |
2f28018c | 105 | |
0c73f4f0 | 106 | t = json_variant_integer(variant); |
6da52ca8 | 107 | if (t > INT_MAX) |
0c73f4f0 LP |
108 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is out of bounds for an interface index.", strna(name)); |
109 | ||
110 | *ifi = (int) t; | |
111 | return 0; | |
112 | } | |
113 | ||
114 | static int json_dispatch_family(const char *name, JsonVariant *variant, JsonDispatchFlags flags, void *userdata) { | |
99534007 | 115 | int *family = ASSERT_PTR(userdata); |
718ca772 | 116 | int64_t t; |
0c73f4f0 LP |
117 | |
118 | assert(variant); | |
0c73f4f0 LP |
119 | |
120 | if (!json_variant_is_integer(variant)) | |
121 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an integer.", strna(name)); | |
122 | ||
123 | t = json_variant_integer(variant); | |
124 | if (t < 0 || t > INT_MAX) | |
125 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid family.", strna(name)); | |
126 | ||
127 | *family = (int) t; | |
128 | return 0; | |
129 | } | |
130 | ||
131 | typedef struct ResolveHostnameReply { | |
132 | JsonVariant *addresses; | |
133 | char *name; | |
134 | uint64_t flags; | |
135 | } ResolveHostnameReply; | |
136 | ||
137 | static void resolve_hostname_reply_destroy(ResolveHostnameReply *p) { | |
138 | assert(p); | |
139 | ||
140 | json_variant_unref(p->addresses); | |
141 | free(p->name); | |
2f28018c LP |
142 | } |
143 | ||
0c73f4f0 | 144 | static const JsonDispatch resolve_hostname_reply_dispatch_table[] = { |
9942f855 LP |
145 | { "addresses", JSON_VARIANT_ARRAY, json_dispatch_variant, offsetof(ResolveHostnameReply, addresses), JSON_MANDATORY }, |
146 | { "name", JSON_VARIANT_STRING, json_dispatch_string, offsetof(ResolveHostnameReply, name), 0 }, | |
147 | { "flags", _JSON_VARIANT_TYPE_INVALID, json_dispatch_uint64, offsetof(ResolveHostnameReply, flags), 0 }, | |
0c73f4f0 LP |
148 | {} |
149 | }; | |
150 | ||
151 | typedef struct AddressParameters { | |
152 | int ifindex; | |
153 | int family; | |
154 | union in_addr_union address; | |
155 | size_t address_size; | |
156 | } AddressParameters; | |
157 | ||
158 | static int json_dispatch_address(const char *name, JsonVariant *variant, JsonDispatchFlags flags, void *userdata) { | |
99534007 | 159 | AddressParameters *p = ASSERT_PTR(userdata); |
0c73f4f0 LP |
160 | union in_addr_union buf = {}; |
161 | JsonVariant *i; | |
162 | size_t n, k = 0; | |
163 | ||
164 | assert(variant); | |
0c73f4f0 LP |
165 | |
166 | if (!json_variant_is_array(variant)) | |
167 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array.", strna(name)); | |
168 | ||
169 | n = json_variant_elements(variant); | |
170 | if (!IN_SET(n, 4, 16)) | |
171 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is array of unexpected size.", strna(name)); | |
172 | ||
173 | JSON_VARIANT_ARRAY_FOREACH(i, variant) { | |
718ca772 | 174 | int64_t b; |
0c73f4f0 LP |
175 | |
176 | if (!json_variant_is_integer(i)) | |
177 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "Element %zu of JSON field '%s' is not an integer.", k, strna(name)); | |
178 | ||
179 | b = json_variant_integer(i); | |
180 | if (b < 0 || b > 0xff) | |
28e5e1e9 DT |
181 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), |
182 | "Element %zu of JSON field '%s' is out of range 0%s255.", | |
183 | k, strna(name), special_glyph(SPECIAL_GLYPH_ELLIPSIS)); | |
0c73f4f0 LP |
184 | |
185 | buf.bytes[k++] = (uint8_t) b; | |
186 | } | |
187 | ||
188 | p->address = buf; | |
189 | p->address_size = k; | |
190 | ||
191 | return 0; | |
192 | } | |
193 | ||
194 | static const JsonDispatch address_parameters_dispatch_table[] = { | |
195 | { "ifindex", JSON_VARIANT_INTEGER, json_dispatch_ifindex, offsetof(AddressParameters, ifindex), 0 }, | |
196 | { "family", JSON_VARIANT_INTEGER, json_dispatch_family, offsetof(AddressParameters, family), JSON_MANDATORY }, | |
197 | { "address", JSON_VARIANT_ARRAY, json_dispatch_address, 0, JSON_MANDATORY }, | |
198 | {} | |
199 | }; | |
200 | ||
8ef114c6 ZJS |
201 | static uint64_t query_flag( |
202 | const char *name, | |
203 | const int value, | |
204 | uint64_t flag) { | |
efb9b3ba | 205 | |
aee9d18c LP |
206 | int r; |
207 | ||
efb9b3ba | 208 | r = secure_getenv_bool(name); |
8ef114c6 ZJS |
209 | if (r >= 0) |
210 | return r == value ? flag : 0; | |
211 | if (r != -ENXIO) | |
212 | log_debug_errno(r, "Failed to parse $%s, ignoring.", name); | |
213 | return 0; | |
214 | } | |
aee9d18c | 215 | |
8ef114c6 ZJS |
216 | static uint64_t query_flags(void) { |
217 | /* Allow callers to turn off validation, synthetization, caching, etc., when we resolve via | |
218 | * nss-resolve. */ | |
219 | return query_flag("SYSTEMD_NSS_RESOLVE_VALIDATE", 0, SD_RESOLVED_NO_VALIDATE) | | |
220 | query_flag("SYSTEMD_NSS_RESOLVE_SYNTHESIZE", 0, SD_RESOLVED_NO_SYNTHESIZE) | | |
221 | query_flag("SYSTEMD_NSS_RESOLVE_CACHE", 0, SD_RESOLVED_NO_CACHE) | | |
222 | query_flag("SYSTEMD_NSS_RESOLVE_ZONE", 0, SD_RESOLVED_NO_ZONE) | | |
223 | query_flag("SYSTEMD_NSS_RESOLVE_TRUST_ANCHOR", 0, SD_RESOLVED_NO_TRUST_ANCHOR) | | |
224 | query_flag("SYSTEMD_NSS_RESOLVE_NETWORK", 0, SD_RESOLVED_NO_NETWORK); | |
aee9d18c LP |
225 | } |
226 | ||
4d1cf1e2 LP |
227 | enum nss_status _nss_resolve_gethostbyname4_r( |
228 | const char *name, | |
229 | struct gaih_addrtuple **pat, | |
230 | char *buffer, size_t buflen, | |
231 | int *errnop, int *h_errnop, | |
232 | int32_t *ttlp) { | |
233 | ||
0c73f4f0 | 234 | _cleanup_(varlink_unrefp) Varlink *link = NULL; |
75d2f0a0 ZJS |
235 | _cleanup_(json_variant_unrefp) JsonVariant *cparams = NULL; |
236 | _cleanup_(resolve_hostname_reply_destroy) ResolveHostnameReply p = {}; | |
237 | JsonVariant *rparams, *entry; | |
0c73f4f0 | 238 | int r; |
4d1cf1e2 | 239 | |
06202b9e | 240 | PROTECT_ERRNO; |
55679e29 | 241 | NSS_ENTRYPOINT_BEGIN; |
0c5eb056 | 242 | |
4d1cf1e2 LP |
243 | assert(name); |
244 | assert(pat); | |
245 | assert(buffer); | |
246 | assert(errnop); | |
247 | assert(h_errnop); | |
248 | ||
0c73f4f0 | 249 | r = connect_to_resolved(&link); |
4d1cf1e2 LP |
250 | if (r < 0) |
251 | goto fail; | |
252 | ||
0c73f4f0 | 253 | r = json_build(&cparams, JSON_BUILD_OBJECT( |
aee9d18c LP |
254 | JSON_BUILD_PAIR("name", JSON_BUILD_STRING(name)), |
255 | JSON_BUILD_PAIR("flags", JSON_BUILD_UNSIGNED(query_flags())))); | |
4d1cf1e2 LP |
256 | if (r < 0) |
257 | goto fail; | |
258 | ||
3c229a9a YW |
259 | /* Return NSS_STATUS_UNAVAIL when communication with systemd-resolved fails, allowing falling |
260 | * back to other nss modules. Treat all other error conditions as NOTFOUND. This includes | |
261 | * DNSSEC errors and suchlike. (We don't use UNAVAIL in this case so that the nsswitch.conf | |
262 | * configuration can distinguish such executed but negative replies from complete failure to | |
263 | * talk to resolved). */ | |
75d2f0a0 | 264 | const char *error_id; |
0444391d | 265 | r = varlink_call(link, "io.systemd.Resolve.ResolveHostname", cparams, &rparams, &error_id); |
3c229a9a YW |
266 | if (r < 0) |
267 | goto fail; | |
268 | if (!isempty(error_id)) { | |
ae78529f LP |
269 | if (error_shall_try_again(error_id)) |
270 | goto try_again; | |
271 | if (error_shall_fallback(error_id)) | |
272 | goto fail; | |
cb4e5d51 MP |
273 | if (streq(error_id, "io.systemd.Resolve.NoSuchResourceRecord")) |
274 | goto no_data; | |
ae78529f | 275 | goto not_found; |
4d1cf1e2 LP |
276 | } |
277 | ||
f1b622a0 | 278 | r = json_dispatch(rparams, resolve_hostname_reply_dispatch_table, json_dispatch_flags, &p); |
0c73f4f0 | 279 | if (r < 0) |
4d1cf1e2 | 280 | goto fail; |
0c73f4f0 | 281 | if (json_variant_is_blank_object(p.addresses)) |
06202b9e | 282 | goto not_found; |
4d1cf1e2 | 283 | |
75d2f0a0 | 284 | size_t n_addresses = 0; |
0c73f4f0 LP |
285 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
286 | AddressParameters q = {}; | |
287 | ||
f1b622a0 | 288 | r = json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 LP |
289 | if (r < 0) |
290 | goto fail; | |
291 | ||
292 | if (!IN_SET(q.family, AF_INET, AF_INET6)) | |
293 | continue; | |
294 | ||
295 | if (q.address_size != FAMILY_ADDRESS_SIZE(q.family)) { | |
296 | r = -EINVAL; | |
297 | goto fail; | |
298 | } | |
299 | ||
75d2f0a0 | 300 | n_addresses++; |
0c73f4f0 LP |
301 | } |
302 | ||
75d2f0a0 ZJS |
303 | const char *canonical = p.name ?: name; |
304 | size_t l = strlen(canonical); | |
305 | size_t idx, ms = ALIGN(l+1) + ALIGN(sizeof(struct gaih_addrtuple)) * n_addresses; | |
309e9d86 | 306 | |
4d1cf1e2 | 307 | if (buflen < ms) { |
cdccd29f | 308 | UNPROTECT_ERRNO; |
0192cbdb | 309 | *errnop = ERANGE; |
e36c6e48 | 310 | *h_errnop = NETDB_INTERNAL; |
4d1cf1e2 LP |
311 | return NSS_STATUS_TRYAGAIN; |
312 | } | |
313 | ||
314 | /* First, append name */ | |
75d2f0a0 ZJS |
315 | char *r_name = buffer; |
316 | memcpy(r_name, canonical, l + 1); | |
317 | idx = ALIGN(l + 1); | |
4d1cf1e2 LP |
318 | |
319 | /* Second, append addresses */ | |
75d2f0a0 ZJS |
320 | struct gaih_addrtuple *r_tuple = NULL, |
321 | *r_tuple_first = (struct gaih_addrtuple*) (buffer + idx); | |
309e9d86 | 322 | |
0c73f4f0 LP |
323 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
324 | AddressParameters q = {}; | |
78c6a153 | 325 | |
f1b622a0 | 326 | r = json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
4d1cf1e2 LP |
327 | if (r < 0) |
328 | goto fail; | |
329 | ||
0c73f4f0 | 330 | if (!IN_SET(q.family, AF_INET, AF_INET6)) |
4d1cf1e2 LP |
331 | continue; |
332 | ||
4d1cf1e2 | 333 | r_tuple = (struct gaih_addrtuple*) (buffer + idx); |
0c73f4f0 | 334 | r_tuple->next = (struct gaih_addrtuple*) ((char*) r_tuple + ALIGN(sizeof(struct gaih_addrtuple))); |
4d1cf1e2 | 335 | r_tuple->name = r_name; |
0c73f4f0 LP |
336 | r_tuple->family = q.family; |
337 | r_tuple->scopeid = ifindex_to_scopeid(q.family, &q.address, q.ifindex); | |
338 | memcpy(r_tuple->addr, &q.address, q.address_size); | |
4d1cf1e2 LP |
339 | |
340 | idx += ALIGN(sizeof(struct gaih_addrtuple)); | |
4d1cf1e2 | 341 | } |
4d1cf1e2 | 342 | |
75d2f0a0 | 343 | assert(r_tuple); /* We had at least one address, so r_tuple must be set */ |
0c73f4f0 LP |
344 | r_tuple->next = NULL; /* Override last next pointer */ |
345 | ||
4d1cf1e2 LP |
346 | assert(idx == ms); |
347 | ||
348 | if (*pat) | |
349 | **pat = *r_tuple_first; | |
350 | else | |
351 | *pat = r_tuple_first; | |
352 | ||
353 | if (ttlp) | |
354 | *ttlp = 0; | |
355 | ||
06202b9e YW |
356 | /* Explicitly reset both *h_errnop and h_errno to work around |
357 | * https://bugzilla.redhat.com/show_bug.cgi?id=1125975 */ | |
e70df46b LP |
358 | *h_errnop = NETDB_SUCCESS; |
359 | h_errno = 0; | |
360 | ||
4d1cf1e2 LP |
361 | return NSS_STATUS_SUCCESS; |
362 | ||
363 | fail: | |
cdccd29f | 364 | UNPROTECT_ERRNO; |
0192cbdb | 365 | *errnop = -r; |
a464cf80 | 366 | *h_errnop = NO_RECOVERY; |
954cba66 | 367 | return NSS_STATUS_UNAVAIL; |
06202b9e YW |
368 | |
369 | not_found: | |
370 | *h_errnop = HOST_NOT_FOUND; | |
371 | return NSS_STATUS_NOTFOUND; | |
ae78529f | 372 | |
cb4e5d51 MP |
373 | no_data: |
374 | *h_errnop = NO_DATA; | |
375 | return NSS_STATUS_NOTFOUND; | |
376 | ||
ae78529f LP |
377 | try_again: |
378 | UNPROTECT_ERRNO; | |
379 | *errnop = -r; | |
380 | *h_errnop = TRY_AGAIN; | |
381 | return NSS_STATUS_TRYAGAIN; | |
4d1cf1e2 LP |
382 | } |
383 | ||
384 | enum nss_status _nss_resolve_gethostbyname3_r( | |
385 | const char *name, | |
386 | int af, | |
387 | struct hostent *result, | |
388 | char *buffer, size_t buflen, | |
389 | int *errnop, int *h_errnop, | |
390 | int32_t *ttlp, | |
391 | char **canonp) { | |
392 | ||
0c73f4f0 | 393 | _cleanup_(varlink_unrefp) Varlink *link = NULL; |
75d2f0a0 ZJS |
394 | _cleanup_(json_variant_unrefp) JsonVariant *cparams = NULL; |
395 | _cleanup_(resolve_hostname_reply_destroy) ResolveHostnameReply p = {}; | |
396 | JsonVariant *rparams, *entry; | |
0c73f4f0 | 397 | int r; |
4d1cf1e2 | 398 | |
06202b9e | 399 | PROTECT_ERRNO; |
55679e29 | 400 | NSS_ENTRYPOINT_BEGIN; |
0c5eb056 | 401 | |
4d1cf1e2 LP |
402 | assert(name); |
403 | assert(result); | |
404 | assert(buffer); | |
405 | assert(errnop); | |
406 | assert(h_errnop); | |
407 | ||
408 | if (af == AF_UNSPEC) | |
409 | af = AF_INET; | |
410 | ||
4c701096 | 411 | if (!IN_SET(af, AF_INET, AF_INET6)) { |
4d1cf1e2 LP |
412 | r = -EAFNOSUPPORT; |
413 | goto fail; | |
414 | } | |
415 | ||
0c73f4f0 | 416 | r = connect_to_resolved(&link); |
4d1cf1e2 LP |
417 | if (r < 0) |
418 | goto fail; | |
419 | ||
0c73f4f0 | 420 | r = json_build(&cparams, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("name", JSON_BUILD_STRING(name)), |
aee9d18c LP |
421 | JSON_BUILD_PAIR("family", JSON_BUILD_INTEGER(af)), |
422 | JSON_BUILD_PAIR("flags", JSON_BUILD_UNSIGNED(query_flags())))); | |
4d1cf1e2 LP |
423 | if (r < 0) |
424 | goto fail; | |
425 | ||
75d2f0a0 | 426 | const char *error_id; |
0444391d | 427 | r = varlink_call(link, "io.systemd.Resolve.ResolveHostname", cparams, &rparams, &error_id); |
3c229a9a YW |
428 | if (r < 0) |
429 | goto fail; | |
430 | if (!isempty(error_id)) { | |
ae78529f LP |
431 | if (error_shall_try_again(error_id)) |
432 | goto try_again; | |
433 | if (error_shall_fallback(error_id)) | |
434 | goto fail; | |
cb4e5d51 MP |
435 | if (streq(error_id, "io.systemd.Resolve.NoSuchResourceRecord")) |
436 | goto no_data; | |
ae78529f | 437 | goto not_found; |
4d1cf1e2 LP |
438 | } |
439 | ||
f1b622a0 | 440 | r = json_dispatch(rparams, resolve_hostname_reply_dispatch_table, json_dispatch_flags, &p); |
0c73f4f0 | 441 | if (r < 0) |
4d1cf1e2 | 442 | goto fail; |
0c73f4f0 | 443 | if (json_variant_is_blank_object(p.addresses)) |
06202b9e | 444 | goto not_found; |
4d1cf1e2 | 445 | |
75d2f0a0 | 446 | size_t n_addresses = 0; |
0c73f4f0 LP |
447 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
448 | AddressParameters q = {}; | |
449 | ||
f1b622a0 | 450 | r = json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 LP |
451 | if (r < 0) |
452 | goto fail; | |
453 | ||
454 | if (!IN_SET(q.family, AF_INET, AF_INET6)) | |
455 | continue; | |
456 | ||
457 | if (q.address_size != FAMILY_ADDRESS_SIZE(q.family)) { | |
458 | r = -EINVAL; | |
459 | goto fail; | |
460 | } | |
461 | ||
75d2f0a0 | 462 | n_addresses++; |
0c73f4f0 LP |
463 | } |
464 | ||
75d2f0a0 | 465 | const char *canonical = p.name ?: name; |
309e9d86 | 466 | |
75d2f0a0 ZJS |
467 | size_t alen = FAMILY_ADDRESS_SIZE(af); |
468 | size_t l = strlen(canonical); | |
4d1cf1e2 | 469 | |
75d2f0a0 | 470 | size_t idx, ms = ALIGN(l + 1) + n_addresses * ALIGN(alen) + (n_addresses + 2) * sizeof(char*); |
4d1cf1e2 LP |
471 | |
472 | if (buflen < ms) { | |
cdccd29f | 473 | UNPROTECT_ERRNO; |
0192cbdb | 474 | *errnop = ERANGE; |
e36c6e48 | 475 | *h_errnop = NETDB_INTERNAL; |
4d1cf1e2 LP |
476 | return NSS_STATUS_TRYAGAIN; |
477 | } | |
478 | ||
479 | /* First, append name */ | |
75d2f0a0 | 480 | char *r_name = buffer; |
309e9d86 | 481 | memcpy(r_name, canonical, l+1); |
4d1cf1e2 LP |
482 | idx = ALIGN(l+1); |
483 | ||
309e9d86 | 484 | /* Second, create empty aliases array */ |
75d2f0a0 | 485 | char *r_aliases = buffer + idx; |
4d1cf1e2 LP |
486 | ((char**) r_aliases)[0] = NULL; |
487 | idx += sizeof(char*); | |
488 | ||
489 | /* Third, append addresses */ | |
75d2f0a0 | 490 | char *r_addr = buffer + idx; |
309e9d86 | 491 | |
75d2f0a0 | 492 | size_t i = 0; |
0c73f4f0 LP |
493 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
494 | AddressParameters q = {}; | |
4d1cf1e2 | 495 | |
f1b622a0 | 496 | r = json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
4d1cf1e2 LP |
497 | if (r < 0) |
498 | goto fail; | |
499 | ||
0c73f4f0 | 500 | if (q.family != af) |
4d1cf1e2 LP |
501 | continue; |
502 | ||
0c73f4f0 | 503 | if (q.address_size != alen) { |
4d1cf1e2 LP |
504 | r = -EINVAL; |
505 | goto fail; | |
506 | } | |
507 | ||
0c73f4f0 | 508 | memcpy(r_addr + i*ALIGN(alen), &q.address, alen); |
4d1cf1e2 LP |
509 | i++; |
510 | } | |
511 | ||
75d2f0a0 ZJS |
512 | assert(i == n_addresses); |
513 | idx += n_addresses * ALIGN(alen); | |
4d1cf1e2 | 514 | |
309e9d86 | 515 | /* Fourth, append address pointer array */ |
75d2f0a0 ZJS |
516 | char *r_addr_list = buffer + idx; |
517 | for (i = 0; i < n_addresses; i++) | |
4d1cf1e2 LP |
518 | ((char**) r_addr_list)[i] = r_addr + i*ALIGN(alen); |
519 | ||
520 | ((char**) r_addr_list)[i] = NULL; | |
75d2f0a0 | 521 | idx += (n_addresses + 1) * sizeof(char*); |
4d1cf1e2 LP |
522 | |
523 | assert(idx == ms); | |
524 | ||
525 | result->h_name = r_name; | |
526 | result->h_aliases = (char**) r_aliases; | |
527 | result->h_addrtype = af; | |
528 | result->h_length = alen; | |
529 | result->h_addr_list = (char**) r_addr_list; | |
530 | ||
531 | if (ttlp) | |
532 | *ttlp = 0; | |
533 | ||
534 | if (canonp) | |
535 | *canonp = r_name; | |
536 | ||
06202b9e YW |
537 | /* Explicitly reset both *h_errnop and h_errno to work around |
538 | * https://bugzilla.redhat.com/show_bug.cgi?id=1125975 */ | |
539 | *h_errnop = NETDB_SUCCESS; | |
540 | h_errno = 0; | |
541 | ||
4d1cf1e2 LP |
542 | return NSS_STATUS_SUCCESS; |
543 | ||
544 | fail: | |
cdccd29f | 545 | UNPROTECT_ERRNO; |
0192cbdb | 546 | *errnop = -r; |
a464cf80 | 547 | *h_errnop = NO_RECOVERY; |
954cba66 | 548 | return NSS_STATUS_UNAVAIL; |
06202b9e YW |
549 | |
550 | not_found: | |
551 | *h_errnop = HOST_NOT_FOUND; | |
552 | return NSS_STATUS_NOTFOUND; | |
ae78529f | 553 | |
cb4e5d51 MP |
554 | no_data: |
555 | *h_errnop = NO_DATA; | |
556 | return NSS_STATUS_NOTFOUND; | |
557 | ||
ae78529f LP |
558 | try_again: |
559 | UNPROTECT_ERRNO; | |
560 | *errnop = -r; | |
561 | *h_errnop = TRY_AGAIN; | |
562 | return NSS_STATUS_TRYAGAIN; | |
4d1cf1e2 LP |
563 | } |
564 | ||
0c73f4f0 LP |
565 | typedef struct ResolveAddressReply { |
566 | JsonVariant *names; | |
567 | uint64_t flags; | |
568 | } ResolveAddressReply; | |
569 | ||
570 | static void resolve_address_reply_destroy(ResolveAddressReply *p) { | |
571 | assert(p); | |
572 | ||
573 | json_variant_unref(p->names); | |
574 | } | |
575 | ||
576 | static const JsonDispatch resolve_address_reply_dispatch_table[] = { | |
9942f855 LP |
577 | { "names", JSON_VARIANT_ARRAY, json_dispatch_variant, offsetof(ResolveAddressReply, names), JSON_MANDATORY }, |
578 | { "flags", _JSON_VARIANT_TYPE_INVALID, json_dispatch_uint64, offsetof(ResolveAddressReply, flags), 0 }, | |
0c73f4f0 LP |
579 | {} |
580 | }; | |
581 | ||
582 | typedef struct NameParameters { | |
583 | int ifindex; | |
584 | char *name; | |
585 | } NameParameters; | |
586 | ||
587 | static void name_parameters_destroy(NameParameters *p) { | |
588 | assert(p); | |
589 | ||
590 | free(p->name); | |
591 | } | |
592 | ||
593 | static const JsonDispatch name_parameters_dispatch_table[] = { | |
77fac974 ZJS |
594 | { "ifindex", JSON_VARIANT_INTEGER, json_dispatch_ifindex, offsetof(NameParameters, ifindex), 0 }, |
595 | { "name", JSON_VARIANT_STRING, json_dispatch_string, offsetof(NameParameters, name), JSON_MANDATORY }, | |
0c73f4f0 LP |
596 | {} |
597 | }; | |
598 | ||
4d1cf1e2 LP |
599 | enum nss_status _nss_resolve_gethostbyaddr2_r( |
600 | const void* addr, socklen_t len, | |
601 | int af, | |
602 | struct hostent *result, | |
603 | char *buffer, size_t buflen, | |
604 | int *errnop, int *h_errnop, | |
605 | int32_t *ttlp) { | |
606 | ||
0c73f4f0 | 607 | _cleanup_(varlink_unrefp) Varlink *link = NULL; |
75d2f0a0 ZJS |
608 | _cleanup_(json_variant_unrefp) JsonVariant *cparams = NULL; |
609 | _cleanup_(resolve_address_reply_destroy) ResolveAddressReply p = {}; | |
77fac974 | 610 | JsonVariant *rparams, *entry; |
0c73f4f0 | 611 | int r; |
4d1cf1e2 | 612 | |
06202b9e | 613 | PROTECT_ERRNO; |
55679e29 | 614 | NSS_ENTRYPOINT_BEGIN; |
0c5eb056 | 615 | |
4d1cf1e2 LP |
616 | assert(addr); |
617 | assert(result); | |
618 | assert(buffer); | |
619 | assert(errnop); | |
620 | assert(h_errnop); | |
621 | ||
622 | if (!IN_SET(af, AF_INET, AF_INET6)) { | |
cdccd29f | 623 | UNPROTECT_ERRNO; |
0192cbdb | 624 | *errnop = EAFNOSUPPORT; |
4d1cf1e2 LP |
625 | *h_errnop = NO_DATA; |
626 | return NSS_STATUS_UNAVAIL; | |
627 | } | |
628 | ||
9d485985 | 629 | if (len != FAMILY_ADDRESS_SIZE(af)) { |
a62fc245 LP |
630 | r = -EINVAL; |
631 | goto fail; | |
4d1cf1e2 LP |
632 | } |
633 | ||
0c73f4f0 | 634 | r = connect_to_resolved(&link); |
4d1cf1e2 LP |
635 | if (r < 0) |
636 | goto fail; | |
637 | ||
0c73f4f0 | 638 | r = json_build(&cparams, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("address", JSON_BUILD_BYTE_ARRAY(addr, len)), |
aee9d18c LP |
639 | JSON_BUILD_PAIR("family", JSON_BUILD_INTEGER(af)), |
640 | JSON_BUILD_PAIR("flags", JSON_BUILD_UNSIGNED(query_flags())))); | |
4d1cf1e2 LP |
641 | if (r < 0) |
642 | goto fail; | |
643 | ||
77fac974 | 644 | const char* error_id; |
0444391d | 645 | r = varlink_call(link, "io.systemd.Resolve.ResolveAddress", cparams, &rparams, &error_id); |
3c229a9a YW |
646 | if (r < 0) |
647 | goto fail; | |
648 | if (!isempty(error_id)) { | |
ae78529f LP |
649 | if (error_shall_try_again(error_id)) |
650 | goto try_again; | |
651 | if (error_shall_fallback(error_id)) | |
652 | goto fail; | |
653 | goto not_found; | |
4d1cf1e2 LP |
654 | } |
655 | ||
f1b622a0 | 656 | r = json_dispatch(rparams, resolve_address_reply_dispatch_table, json_dispatch_flags, &p); |
51323288 LP |
657 | if (r < 0) |
658 | goto fail; | |
0c73f4f0 LP |
659 | if (json_variant_is_blank_object(p.names)) |
660 | goto not_found; | |
51323288 | 661 | |
77fac974 ZJS |
662 | size_t ms = 0, idx; |
663 | ||
0c73f4f0 LP |
664 | JSON_VARIANT_ARRAY_FOREACH(entry, p.names) { |
665 | _cleanup_(name_parameters_destroy) NameParameters q = {}; | |
51323288 | 666 | |
f1b622a0 | 667 | r = json_dispatch(entry, name_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 | 668 | if (r < 0) |
78c6a153 | 669 | goto fail; |
4d1cf1e2 | 670 | |
0c73f4f0 | 671 | ms += ALIGN(strlen(q.name) + 1); |
4d1cf1e2 | 672 | } |
4d1cf1e2 | 673 | |
77fac974 ZJS |
674 | size_t n_names = json_variant_elements(p.names); |
675 | ms += ALIGN(len) + /* the address */ | |
676 | 2 * sizeof(char*) + /* pointer to the address, plus trailing NULL */ | |
677 | n_names * sizeof(char*); /* pointers to aliases, plus trailing NULL */ | |
4d1cf1e2 LP |
678 | |
679 | if (buflen < ms) { | |
cdccd29f | 680 | UNPROTECT_ERRNO; |
0192cbdb | 681 | *errnop = ERANGE; |
e36c6e48 | 682 | *h_errnop = NETDB_INTERNAL; |
4d1cf1e2 LP |
683 | return NSS_STATUS_TRYAGAIN; |
684 | } | |
685 | ||
686 | /* First, place address */ | |
77fac974 | 687 | char *r_addr = buffer; |
4d1cf1e2 LP |
688 | memcpy(r_addr, addr, len); |
689 | idx = ALIGN(len); | |
690 | ||
691 | /* Second, place address list */ | |
77fac974 | 692 | char *r_addr_list = buffer + idx; |
4d1cf1e2 LP |
693 | ((char**) r_addr_list)[0] = r_addr; |
694 | ((char**) r_addr_list)[1] = NULL; | |
695 | idx += sizeof(char*) * 2; | |
696 | ||
77fac974 ZJS |
697 | /* Third, reserve space for the aliases array, plus trailing NULL */ |
698 | char *r_aliases = buffer + idx; | |
699 | idx += sizeof(char*) * n_names; | |
4d1cf1e2 LP |
700 | |
701 | /* Fourth, place aliases */ | |
77fac974 ZJS |
702 | char *r_name = buffer + idx; |
703 | ||
704 | size_t i = 0; | |
0c73f4f0 LP |
705 | JSON_VARIANT_ARRAY_FOREACH(entry, p.names) { |
706 | _cleanup_(name_parameters_destroy) NameParameters q = {}; | |
4d1cf1e2 | 707 | |
f1b622a0 | 708 | r = json_dispatch(entry, name_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 LP |
709 | if (r < 0) |
710 | goto fail; | |
711 | ||
77fac974 ZJS |
712 | size_t l = strlen(q.name); |
713 | char *z = buffer + idx; | |
714 | memcpy(z, q.name, l + 1); | |
4d1cf1e2 | 715 | |
963783d7 | 716 | if (i > 0) |
77fac974 | 717 | ((char**) r_aliases)[i - 1] = z; |
4d1cf1e2 LP |
718 | i++; |
719 | ||
77fac974 | 720 | idx += ALIGN(l + 1); |
4d1cf1e2 | 721 | } |
77fac974 | 722 | ((char**) r_aliases)[n_names - 1] = NULL; |
4d1cf1e2 | 723 | |
4d1cf1e2 LP |
724 | assert(idx == ms); |
725 | ||
726 | result->h_name = r_name; | |
727 | result->h_aliases = (char**) r_aliases; | |
728 | result->h_addrtype = af; | |
729 | result->h_length = len; | |
730 | result->h_addr_list = (char**) r_addr_list; | |
731 | ||
732 | if (ttlp) | |
733 | *ttlp = 0; | |
734 | ||
06202b9e YW |
735 | /* Explicitly reset both *h_errnop and h_errno to work around |
736 | * https://bugzilla.redhat.com/show_bug.cgi?id=1125975 */ | |
e70df46b LP |
737 | *h_errnop = NETDB_SUCCESS; |
738 | h_errno = 0; | |
739 | ||
4d1cf1e2 LP |
740 | return NSS_STATUS_SUCCESS; |
741 | ||
742 | fail: | |
cdccd29f | 743 | UNPROTECT_ERRNO; |
0192cbdb | 744 | *errnop = -r; |
a464cf80 | 745 | *h_errnop = NO_RECOVERY; |
954cba66 | 746 | return NSS_STATUS_UNAVAIL; |
06202b9e YW |
747 | |
748 | not_found: | |
749 | *h_errnop = HOST_NOT_FOUND; | |
750 | return NSS_STATUS_NOTFOUND; | |
ae78529f LP |
751 | |
752 | try_again: | |
753 | UNPROTECT_ERRNO; | |
754 | *errnop = -r; | |
755 | *h_errnop = TRY_AGAIN; | |
756 | return NSS_STATUS_TRYAGAIN; | |
4d1cf1e2 LP |
757 | } |
758 | ||
759 | NSS_GETHOSTBYNAME_FALLBACKS(resolve); | |
760 | NSS_GETHOSTBYADDR_FALLBACKS(resolve); |