1 /* SPDX-License-Identifier: LGPL-2.1+ */
4 #include <netinet/in.h>
5 #include <sys/capability.h>
7 #include "alloc-util.h"
8 #include "bus-common-errors.h"
9 #include "bus-get-properties.h"
10 #include "bus-message-util.h"
11 #include "bus-polkit.h"
12 #include "dns-domain.h"
13 #include "networkd-link-bus.h"
14 #include "networkd-link.h"
15 #include "networkd-manager.h"
16 #include "parse-util.h"
17 #include "resolve-util.h"
18 #include "socket-netlink.h"
20 #include "user-util.h"
22 BUS_DEFINE_PROPERTY_GET_ENUM(property_get_operational_state
, link_operstate
, LinkOperationalState
);
23 BUS_DEFINE_PROPERTY_GET_ENUM(property_get_carrier_state
, link_carrier_state
, LinkCarrierState
);
24 BUS_DEFINE_PROPERTY_GET_ENUM(property_get_address_state
, link_address_state
, LinkAddressState
);
25 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_administrative_state
, link_state
, LinkState
);
27 static int property_get_bit_rates(
30 const char *interface
,
32 sd_bus_message
*reply
,
34 sd_bus_error
*error
) {
36 Link
*link
= userdata
;
45 manager
= link
->manager
;
47 if (!manager
->use_speed_meter
||
48 manager
->speed_meter_usec_old
== 0 ||
50 return sd_bus_message_append(reply
, "(tt)", UINT64_MAX
, UINT64_MAX
);
52 assert(manager
->speed_meter_usec_new
> manager
->speed_meter_usec_old
);
53 interval_sec
= (manager
->speed_meter_usec_new
- manager
->speed_meter_usec_old
) / USEC_PER_SEC
;
55 if (link
->stats_new
.tx_bytes
> link
->stats_old
.tx_bytes
)
56 tx
= (uint64_t) ((link
->stats_new
.tx_bytes
- link
->stats_old
.tx_bytes
) / interval_sec
);
58 tx
= (uint64_t) ((UINT64_MAX
- (link
->stats_old
.tx_bytes
- link
->stats_new
.tx_bytes
)) / interval_sec
);
60 if (link
->stats_new
.rx_bytes
> link
->stats_old
.rx_bytes
)
61 rx
= (uint64_t) ((link
->stats_new
.rx_bytes
- link
->stats_old
.rx_bytes
) / interval_sec
);
63 rx
= (uint64_t) ((UINT64_MAX
- (link
->stats_old
.rx_bytes
- link
->stats_new
.rx_bytes
)) / interval_sec
);
65 return sd_bus_message_append(reply
, "(tt)", tx
, rx
);
68 static int verify_managed_link(Link
*l
, sd_bus_error
*error
) {
71 if (l
->flags
& IFF_LOOPBACK
)
72 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is loopback device.", l
->ifname
);
77 int bus_link_method_set_ntp_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
78 _cleanup_strv_free_
char **ntp
= NULL
;
86 r
= verify_managed_link(l
, error
);
90 r
= sd_bus_message_read_strv(message
, &ntp
);
94 STRV_FOREACH(i
, ntp
) {
95 r
= dns_name_is_valid_or_address(*i
);
99 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid NTP server: %s", *i
);
102 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
103 "org.freedesktop.network1.set-ntp-servers",
104 NULL
, true, UID_INVALID
,
105 &l
->manager
->polkit_registry
, error
);
109 return 1; /* Polkit will call us back */
111 strv_free_and_replace(l
->ntp
, ntp
);
113 (void) link_dirty(l
);
115 return sd_bus_reply_method_return(message
, NULL
);
118 static int bus_link_method_set_dns_servers_internal(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
, bool extended
) {
119 struct in_addr_full
**dns
;
127 r
= verify_managed_link(l
, error
);
131 r
= bus_message_read_dns_servers(message
, error
, extended
, &dns
, &n
);
135 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
136 "org.freedesktop.network1.set-dns-servers",
137 NULL
, true, UID_INVALID
,
138 &l
->manager
->polkit_registry
, error
);
142 r
= 1; /* Polkit will call us back */
146 if (l
->n_dns
!= (unsigned) -1)
147 for (unsigned i
= 0; i
< l
->n_dns
; i
++)
148 in_addr_full_free(l
->dns
[i
]);
150 free_and_replace(l
->dns
, dns
);
153 (void) link_dirty(l
);
155 return sd_bus_reply_method_return(message
, NULL
);
158 for (size_t i
= 0; i
< n
; i
++)
159 in_addr_full_free(dns
[i
]);
165 int bus_link_method_set_dns_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
166 return bus_link_method_set_dns_servers_internal(message
, userdata
, error
, false);
169 int bus_link_method_set_dns_servers_ex(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
170 return bus_link_method_set_dns_servers_internal(message
, userdata
, error
, true);
173 int bus_link_method_set_domains(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
174 _cleanup_(ordered_set_freep
) OrderedSet
*search_domains
= NULL
, *route_domains
= NULL
;
181 r
= verify_managed_link(l
, error
);
185 r
= sd_bus_message_enter_container(message
, 'a', "(sb)");
190 _cleanup_free_
char *str
= NULL
;
191 OrderedSet
**domains
;
195 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
201 r
= dns_name_is_valid(name
);
205 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid search domain %s", name
);
206 if (!route_only
&& dns_name_is_root(name
))
207 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Root domain is not suitable as search domain");
209 r
= dns_name_normalize(name
, 0, &str
);
211 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid search domain %s", name
);
213 domains
= route_only
? &route_domains
: &search_domains
;
214 r
= ordered_set_ensure_allocated(domains
, &string_hash_ops
);
218 r
= ordered_set_put(*domains
, str
);
225 r
= sd_bus_message_exit_container(message
);
229 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
230 "org.freedesktop.network1.set-domains",
231 NULL
, true, UID_INVALID
,
232 &l
->manager
->polkit_registry
, error
);
236 return 1; /* Polkit will call us back */
238 ordered_set_free_free(l
->search_domains
);
239 ordered_set_free_free(l
->route_domains
);
240 l
->search_domains
= TAKE_PTR(search_domains
);
241 l
->route_domains
= TAKE_PTR(route_domains
);
243 (void) link_dirty(l
);
245 return sd_bus_reply_method_return(message
, NULL
);
248 int bus_link_method_set_default_route(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
255 r
= verify_managed_link(l
, error
);
259 r
= sd_bus_message_read(message
, "b", &b
);
263 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
264 "org.freedesktop.network1.set-default-route",
265 NULL
, true, UID_INVALID
,
266 &l
->manager
->polkit_registry
, error
);
270 return 1; /* Polkit will call us back */
272 if (l
->dns_default_route
!= b
) {
273 l
->dns_default_route
= b
;
274 (void) link_dirty(l
);
277 return sd_bus_reply_method_return(message
, NULL
);
280 int bus_link_method_set_llmnr(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
289 r
= verify_managed_link(l
, error
);
293 r
= sd_bus_message_read(message
, "s", &llmnr
);
298 mode
= RESOLVE_SUPPORT_YES
;
300 mode
= resolve_support_from_string(llmnr
);
302 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid LLMNR setting: %s", llmnr
);
305 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
306 "org.freedesktop.network1.set-llmnr",
307 NULL
, true, UID_INVALID
,
308 &l
->manager
->polkit_registry
, error
);
312 return 1; /* Polkit will call us back */
314 if (l
->llmnr
!= mode
) {
316 (void) link_dirty(l
);
319 return sd_bus_reply_method_return(message
, NULL
);
322 int bus_link_method_set_mdns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
331 r
= verify_managed_link(l
, error
);
335 r
= sd_bus_message_read(message
, "s", &mdns
);
340 mode
= RESOLVE_SUPPORT_NO
;
342 mode
= resolve_support_from_string(mdns
);
344 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid MulticastDNS setting: %s", mdns
);
347 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
348 "org.freedesktop.network1.set-mdns",
349 NULL
, true, UID_INVALID
,
350 &l
->manager
->polkit_registry
, error
);
354 return 1; /* Polkit will call us back */
356 if (l
->mdns
!= mode
) {
358 (void) link_dirty(l
);
361 return sd_bus_reply_method_return(message
, NULL
);
364 int bus_link_method_set_dns_over_tls(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
366 const char *dns_over_tls
;
373 r
= verify_managed_link(l
, error
);
377 r
= sd_bus_message_read(message
, "s", &dns_over_tls
);
381 if (isempty(dns_over_tls
))
382 mode
= _DNS_OVER_TLS_MODE_INVALID
;
384 mode
= dns_over_tls_mode_from_string(dns_over_tls
);
386 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSOverTLS setting: %s", dns_over_tls
);
389 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
390 "org.freedesktop.network1.set-dns-over-tls",
391 NULL
, true, UID_INVALID
,
392 &l
->manager
->polkit_registry
, error
);
396 return 1; /* Polkit will call us back */
398 if (l
->dns_over_tls_mode
!= mode
) {
399 l
->dns_over_tls_mode
= mode
;
400 (void) link_dirty(l
);
403 return sd_bus_reply_method_return(message
, NULL
);
406 int bus_link_method_set_dnssec(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
415 r
= verify_managed_link(l
, error
);
419 r
= sd_bus_message_read(message
, "s", &dnssec
);
424 mode
= _DNSSEC_MODE_INVALID
;
426 mode
= dnssec_mode_from_string(dnssec
);
428 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSSEC setting: %s", dnssec
);
431 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
432 "org.freedesktop.network1.set-dnssec",
433 NULL
, true, UID_INVALID
,
434 &l
->manager
->polkit_registry
, error
);
438 return 1; /* Polkit will call us back */
440 if (l
->dnssec_mode
!= mode
) {
441 l
->dnssec_mode
= mode
;
442 (void) link_dirty(l
);
445 return sd_bus_reply_method_return(message
, NULL
);
448 int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
449 _cleanup_set_free_free_ Set
*ns
= NULL
;
450 _cleanup_strv_free_
char **ntas
= NULL
;
458 r
= verify_managed_link(l
, error
);
462 r
= sd_bus_message_read_strv(message
, &ntas
);
466 STRV_FOREACH(i
, ntas
) {
467 r
= dns_name_is_valid(*i
);
471 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid negative trust anchor domain: %s", *i
);
474 ns
= set_new(&dns_name_hash_ops
);
478 STRV_FOREACH(i
, ntas
) {
479 r
= set_put_strdup(&ns
, *i
);
484 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
485 "org.freedesktop.network1.set-dnssec-negative-trust-anchors",
486 NULL
, true, UID_INVALID
,
487 &l
->manager
->polkit_registry
, error
);
491 return 1; /* Polkit will call us back */
493 set_free_free(l
->dnssec_negative_trust_anchors
);
494 l
->dnssec_negative_trust_anchors
= TAKE_PTR(ns
);
496 (void) link_dirty(l
);
498 return sd_bus_reply_method_return(message
, NULL
);
501 int bus_link_method_revert_ntp(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
508 r
= verify_managed_link(l
, error
);
512 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
513 "org.freedesktop.network1.revert-ntp",
514 NULL
, true, UID_INVALID
,
515 &l
->manager
->polkit_registry
, error
);
519 return 1; /* Polkit will call us back */
521 link_ntp_settings_clear(l
);
522 (void) link_dirty(l
);
524 return sd_bus_reply_method_return(message
, NULL
);
527 int bus_link_method_revert_dns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
534 r
= verify_managed_link(l
, error
);
538 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
539 "org.freedesktop.network1.revert-dns",
540 NULL
, true, UID_INVALID
,
541 &l
->manager
->polkit_registry
, error
);
545 return 1; /* Polkit will call us back */
547 link_dns_settings_clear(l
);
548 (void) link_dirty(l
);
550 return sd_bus_reply_method_return(message
, NULL
);
553 int bus_link_method_force_renew(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
560 return sd_bus_error_setf(error
, BUS_ERROR_UNMANAGED_INTERFACE
,
561 "Interface %s is not managed by systemd-networkd",
564 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
565 "org.freedesktop.network1.forcerenew",
566 NULL
, true, UID_INVALID
,
567 &l
->manager
->polkit_registry
, error
);
571 return 1; /* Polkit will call us back */
573 if (l
->dhcp_server
) {
574 r
= sd_dhcp_server_forcerenew(l
->dhcp_server
);
579 return sd_bus_reply_method_return(message
, NULL
);
582 int bus_link_method_renew(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
589 return sd_bus_error_setf(error
, BUS_ERROR_UNMANAGED_INTERFACE
,
590 "Interface %s is not managed by systemd-networkd",
593 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
594 "org.freedesktop.network1.renew",
595 NULL
, true, UID_INVALID
,
596 &l
->manager
->polkit_registry
, error
);
600 return 1; /* Polkit will call us back */
602 if (l
->dhcp_client
) {
603 r
= sd_dhcp_client_send_renew(l
->dhcp_client
);
608 return sd_bus_reply_method_return(message
, NULL
);
611 int bus_link_method_reconfigure(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
618 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
619 "org.freedesktop.network1.reconfigure",
620 NULL
, true, UID_INVALID
,
621 &l
->manager
->polkit_registry
, error
);
625 return 1; /* Polkit will call us back */
627 r
= link_reconfigure(l
, true);
631 link_set_state(l
, LINK_STATE_INITIALIZED
);
637 return sd_bus_reply_method_return(message
, NULL
);
640 const sd_bus_vtable link_vtable
[] = {
641 SD_BUS_VTABLE_START(0),
643 SD_BUS_PROPERTY("OperationalState", "s", property_get_operational_state
, offsetof(Link
, operstate
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
644 SD_BUS_PROPERTY("CarrierState", "s", property_get_carrier_state
, offsetof(Link
, carrier_state
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
645 SD_BUS_PROPERTY("AddressState", "s", property_get_address_state
, offsetof(Link
, address_state
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
646 SD_BUS_PROPERTY("AdministrativeState", "s", property_get_administrative_state
, offsetof(Link
, state
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
647 SD_BUS_PROPERTY("BitRates", "(tt)", property_get_bit_rates
, 0, 0),
649 SD_BUS_METHOD("SetNTP", "as", NULL
, bus_link_method_set_ntp_servers
, SD_BUS_VTABLE_UNPRIVILEGED
),
650 SD_BUS_METHOD("SetDNS", "a(iay)", NULL
, bus_link_method_set_dns_servers
, SD_BUS_VTABLE_UNPRIVILEGED
),
651 SD_BUS_METHOD("SetDNSEx", "a(iayqs)", NULL
, bus_link_method_set_dns_servers_ex
, SD_BUS_VTABLE_UNPRIVILEGED
),
652 SD_BUS_METHOD("SetDomains", "a(sb)", NULL
, bus_link_method_set_domains
, SD_BUS_VTABLE_UNPRIVILEGED
),
653 SD_BUS_METHOD("SetDefaultRoute", "b", NULL
, bus_link_method_set_default_route
, SD_BUS_VTABLE_UNPRIVILEGED
),
654 SD_BUS_METHOD("SetLLMNR", "s", NULL
, bus_link_method_set_llmnr
, SD_BUS_VTABLE_UNPRIVILEGED
),
655 SD_BUS_METHOD("SetMulticastDNS", "s", NULL
, bus_link_method_set_mdns
, SD_BUS_VTABLE_UNPRIVILEGED
),
656 SD_BUS_METHOD("SetDNSOverTLS", "s", NULL
, bus_link_method_set_dns_over_tls
, SD_BUS_VTABLE_UNPRIVILEGED
),
657 SD_BUS_METHOD("SetDNSSEC", "s", NULL
, bus_link_method_set_dnssec
, SD_BUS_VTABLE_UNPRIVILEGED
),
658 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL
, bus_link_method_set_dnssec_negative_trust_anchors
, SD_BUS_VTABLE_UNPRIVILEGED
),
659 SD_BUS_METHOD("RevertNTP", NULL
, NULL
, bus_link_method_revert_ntp
, SD_BUS_VTABLE_UNPRIVILEGED
),
660 SD_BUS_METHOD("RevertDNS", NULL
, NULL
, bus_link_method_revert_dns
, SD_BUS_VTABLE_UNPRIVILEGED
),
661 SD_BUS_METHOD("Renew", NULL
, NULL
, bus_link_method_renew
, SD_BUS_VTABLE_UNPRIVILEGED
),
662 SD_BUS_METHOD("ForceRenew", NULL
, NULL
, bus_link_method_force_renew
, SD_BUS_VTABLE_UNPRIVILEGED
),
663 SD_BUS_METHOD("Reconfigure", NULL
, NULL
, bus_link_method_reconfigure
, SD_BUS_VTABLE_UNPRIVILEGED
),
668 char *link_bus_path(Link
*link
) {
669 _cleanup_free_
char *ifindex
= NULL
;
674 assert(link
->ifindex
> 0);
676 if (asprintf(&ifindex
, "%d", link
->ifindex
) < 0)
679 r
= sd_bus_path_encode("/org/freedesktop/network1/link", ifindex
, &p
);
686 int link_node_enumerator(sd_bus
*bus
, const char *path
, void *userdata
, char ***nodes
, sd_bus_error
*error
) {
687 _cleanup_strv_free_
char **l
= NULL
;
688 Manager
*m
= userdata
;
698 l
= new0(char*, hashmap_size(m
->links
) + 1);
702 HASHMAP_FOREACH(link
, m
->links
, i
) {
705 p
= link_bus_path(link
);
713 *nodes
= TAKE_PTR(l
);
718 int link_object_find(sd_bus
*bus
, const char *path
, const char *interface
, void *userdata
, void **found
, sd_bus_error
*error
) {
719 _cleanup_free_
char *identifier
= NULL
;
720 Manager
*m
= userdata
;
730 r
= sd_bus_path_decode(path
, "/org/freedesktop/network1/link", &identifier
);
734 ifindex
= parse_ifindex(identifier
);
738 r
= link_get(m
, ifindex
, &link
);
742 if (streq(interface
, "org.freedesktop.network1.DHCPServer") && !link
->dhcp_server
)
750 int link_send_changed_strv(Link
*link
, char **properties
) {
751 _cleanup_free_
char *p
= NULL
;
754 assert(link
->manager
);
757 if (!link
->manager
->bus
)
760 p
= link_bus_path(link
);
764 return sd_bus_emit_properties_changed_strv(
767 "org.freedesktop.network1.Link",
771 int link_send_changed(Link
*link
, const char *property
, ...) {
774 properties
= strv_from_stdarg_alloca(property
);
776 return link_send_changed_strv(link
, properties
);