]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-link-bus.c
tree-wide: define iterator inside of the macro
[thirdparty/systemd.git] / src / resolve / resolved-link-bus.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
3abaabda 2
6ff79f76 3#include <net/if.h>
52aaef0f
ZJS
4#include <netinet/in.h>
5#include <sys/capability.h>
6ff79f76 6
3abaabda 7#include "alloc-util.h"
04b764bf 8#include "bus-common-errors.h"
40af3d02 9#include "bus-get-properties.h"
10d46204 10#include "bus-message-util.h"
269e4d2d 11#include "bus-polkit.h"
3abaabda
LP
12#include "parse-util.h"
13#include "resolve-util.h"
14#include "resolved-bus.h"
15#include "resolved-link-bus.h"
7207052d 16#include "resolved-resolv-conf.h"
95ce1ba8 17#include "socket-netlink.h"
0a6c0745 18#include "stdio-util.h"
3abaabda 19#include "strv.h"
52aaef0f 20#include "user-util.h"
3abaabda 21
acd380c4
YW
22static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported, "b", Link, link_dnssec_supported);
23static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode, "s", Link, link_get_dnssec_mode, dnssec_mode_to_string);
3abaabda 24
c9299be2 25static int property_get_dns_over_tls_mode(
d050561a
IT
26 sd_bus *bus,
27 const char *path,
28 const char *interface,
29 const char *property,
30 sd_bus_message *reply,
31 void *userdata,
32 sd_bus_error *error) {
33
34 Link *l = userdata;
35
36 assert(reply);
37 assert(l);
38
c9299be2 39 return sd_bus_message_append(reply, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l)));
d050561a
IT
40}
41
8e56ea4c 42static int property_get_dns_internal(
3abaabda
LP
43 sd_bus *bus,
44 const char *path,
45 const char *interface,
46 const char *property,
47 sd_bus_message *reply,
48 void *userdata,
8e56ea4c
YW
49 sd_bus_error *error,
50 bool extended) {
3abaabda
LP
51
52 Link *l = userdata;
53 DnsServer *s;
54 int r;
55
56 assert(reply);
57 assert(l);
58
8e56ea4c 59 r = sd_bus_message_open_container(reply, 'a', extended ? "(iayqs)" : "(iay)");
3abaabda
LP
60 if (r < 0)
61 return r;
62
63 LIST_FOREACH(servers, s, l->dns_servers) {
8e56ea4c 64 r = bus_dns_server_append(reply, s, false, extended);
3abaabda
LP
65 if (r < 0)
66 return r;
67 }
68
69 return sd_bus_message_close_container(reply);
70}
71
8e56ea4c
YW
72static int property_get_dns(
73 sd_bus *bus,
74 const char *path,
75 const char *interface,
76 const char *property,
77 sd_bus_message *reply,
78 void *userdata,
79 sd_bus_error *error) {
80 return property_get_dns_internal(bus, path, interface, property, reply, userdata, error, false);
81}
82
83static int property_get_dns_ex(
b7ac92cd
YW
84 sd_bus *bus,
85 const char *path,
86 const char *interface,
87 const char *property,
88 sd_bus_message *reply,
89 void *userdata,
90 sd_bus_error *error) {
8e56ea4c
YW
91 return property_get_dns_internal(bus, path, interface, property, reply, userdata, error, true);
92}
93
94static int property_get_current_dns_server_internal(
95 sd_bus *bus,
96 const char *path,
97 const char *interface,
98 const char *property,
99 sd_bus_message *reply,
100 void *userdata,
101 sd_bus_error *error,
102 bool extended) {
b7ac92cd
YW
103
104 DnsServer *s;
105
106 assert(reply);
107 assert(userdata);
108
109 s = *(DnsServer **) userdata;
110
8e56ea4c
YW
111 return bus_dns_server_append(reply, s, false, extended);
112}
113
114static int property_get_current_dns_server(
115 sd_bus *bus,
116 const char *path,
117 const char *interface,
118 const char *property,
119 sd_bus_message *reply,
120 void *userdata,
121 sd_bus_error *error) {
122 return property_get_current_dns_server_internal(bus, path, interface, property, reply, userdata, error, false);
123}
124
125static int property_get_current_dns_server_ex(
126 sd_bus *bus,
127 const char *path,
128 const char *interface,
129 const char *property,
130 sd_bus_message *reply,
131 void *userdata,
132 sd_bus_error *error) {
133 return property_get_current_dns_server_internal(bus, path, interface, property, reply, userdata, error, true);
b7ac92cd
YW
134}
135
3abaabda
LP
136static int property_get_domains(
137 sd_bus *bus,
138 const char *path,
139 const char *interface,
140 const char *property,
141 sd_bus_message *reply,
142 void *userdata,
143 sd_bus_error *error) {
144
145 Link *l = userdata;
146 DnsSearchDomain *d;
147 int r;
148
149 assert(reply);
150 assert(l);
151
ad44b56b 152 r = sd_bus_message_open_container(reply, 'a', "(sb)");
3abaabda
LP
153 if (r < 0)
154 return r;
155
156 LIST_FOREACH(domains, d, l->search_domains) {
ad44b56b 157 r = sd_bus_message_append(reply, "(sb)", d->name, d->route_only);
3abaabda
LP
158 if (r < 0)
159 return r;
160 }
161
162 return sd_bus_message_close_container(reply);
163}
164
77673795
LP
165static int property_get_default_route(
166 sd_bus *bus,
167 const char *path,
168 const char *interface,
169 const char *property,
170 sd_bus_message *reply,
171 void *userdata,
172 sd_bus_error *error) {
173
174 Link *l = userdata;
175
176 assert(reply);
177 assert(l);
178
179 /* Return what is configured, if there's something configured */
180 if (l->default_route >= 0)
181 return sd_bus_message_append(reply, "b", l->default_route);
182
183 /* Otherwise report what is in effect */
184 if (l->unicast_scope)
185 return sd_bus_message_append(reply, "b", dns_scope_is_default_route(l->unicast_scope));
186
187 return sd_bus_message_append(reply, "b", false);
188}
189
3abaabda
LP
190static int property_get_scopes_mask(
191 sd_bus *bus,
192 const char *path,
193 const char *interface,
194 const char *property,
195 sd_bus_message *reply,
196 void *userdata,
197 sd_bus_error *error) {
198
199 Link *l = userdata;
200 uint64_t mask;
201
202 assert(reply);
203 assert(l);
204
205 mask = (l->unicast_scope ? SD_RESOLVED_DNS : 0) |
206 (l->llmnr_ipv4_scope ? SD_RESOLVED_LLMNR_IPV4 : 0) |
207 (l->llmnr_ipv6_scope ? SD_RESOLVED_LLMNR_IPV6 : 0) |
208 (l->mdns_ipv4_scope ? SD_RESOLVED_MDNS_IPV4 : 0) |
209 (l->mdns_ipv6_scope ? SD_RESOLVED_MDNS_IPV6 : 0);
210
211 return sd_bus_message_append(reply, "t", mask);
212}
213
214static int property_get_ntas(
215 sd_bus *bus,
216 const char *path,
217 const char *interface,
218 const char *property,
219 sd_bus_message *reply,
220 void *userdata,
221 sd_bus_error *error) {
222
223 Link *l = userdata;
224 const char *name;
3abaabda
LP
225 int r;
226
227 assert(reply);
228 assert(l);
229
230 r = sd_bus_message_open_container(reply, 'a', "s");
231 if (r < 0)
232 return r;
233
90e74a66 234 SET_FOREACH(name, l->dnssec_negative_trust_anchors) {
3abaabda
LP
235 r = sd_bus_message_append(reply, "s", name);
236 if (r < 0)
237 return r;
238 }
239
240 return sd_bus_message_close_container(reply);
241}
242
04b764bf
LP
243static int verify_unmanaged_link(Link *l, sd_bus_error *error) {
244 assert(l);
245
246 if (l->flags & IFF_LOOPBACK)
6ff79f76 247 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is loopback device.", l->ifname);
04b764bf 248 if (l->is_managed)
6ff79f76 249 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is managed.", l->ifname);
04b764bf
LP
250
251 return 0;
252}
253
95ce1ba8 254static int bus_link_method_set_dns_servers_internal(sd_bus_message *message, void *userdata, sd_bus_error *error, bool extended) {
10d46204 255 struct in_addr_full **dns;
d2ec6608 256 Link *l = userdata;
10d46204 257 size_t n;
d2ec6608
LP
258 int r;
259
260 assert(message);
261 assert(l);
262
04b764bf
LP
263 r = verify_unmanaged_link(l, error);
264 if (r < 0)
265 return r;
266
10d46204 267 r = bus_message_read_dns_servers(message, error, extended, &dns, &n);
d2ec6608
LP
268 if (r < 0)
269 return r;
270
52aaef0f
ZJS
271 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
272 "org.freedesktop.resolve1.set-dns-servers",
273 NULL, true, UID_INVALID,
274 &l->manager->polkit_registry, error);
275 if (r < 0)
95ce1ba8
YW
276 goto finalize;
277 if (r == 0) {
278 r = 1; /* Polkit will call us back */
279 goto finalize;
280 }
52aaef0f 281
d2ec6608
LP
282 dns_server_mark_all(l->dns_servers);
283
95ce1ba8 284 for (size_t i = 0; i < n; i++) {
d2ec6608
LP
285 DnsServer *s;
286
95ce1ba8 287 s = dns_server_find(l->dns_servers, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
d2ec6608
LP
288 if (s)
289 dns_server_move_back_and_unmark(s);
290 else {
95ce1ba8
YW
291 r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
292 if (r < 0) {
293 dns_server_unlink_all(l->dns_servers);
294 goto finalize;
295 }
d2ec6608
LP
296 }
297
298 }
299
300 dns_server_unlink_marked(l->dns_servers);
301 link_allocate_scopes(l);
302
943ef07c 303 (void) link_save_user(l);
7207052d 304 (void) manager_write_resolv_conf(l->manager);
5f3340ca 305 (void) manager_send_changed(l->manager, "DNS");
7207052d 306
95ce1ba8
YW
307 r = sd_bus_reply_method_return(message, NULL);
308
309finalize:
310 for (size_t i = 0; i < n; i++)
311 in_addr_full_free(dns[i]);
312 free(dns);
d2ec6608 313
d2ec6608
LP
314 return r;
315}
316
95ce1ba8
YW
317int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_bus_error *error) {
318 return bus_link_method_set_dns_servers_internal(message, userdata, error, false);
319}
320
321int bus_link_method_set_dns_servers_ex(sd_bus_message *message, void *userdata, sd_bus_error *error) {
322 return bus_link_method_set_dns_servers_internal(message, userdata, error, true);
323}
324
ee116b54 325int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d2ec6608 326 Link *l = userdata;
d2ec6608
LP
327 int r;
328
329 assert(message);
330 assert(l);
331
04b764bf
LP
332 r = verify_unmanaged_link(l, error);
333 if (r < 0)
334 return r;
335
ad44b56b 336 r = sd_bus_message_enter_container(message, 'a', "(sb)");
d2ec6608
LP
337 if (r < 0)
338 return r;
339
ad44b56b
LP
340 for (;;) {
341 const char *name;
342 int route_only;
d2ec6608 343
ad44b56b 344 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
d2ec6608
LP
345 if (r < 0)
346 return r;
347 if (r == 0)
ad44b56b
LP
348 break;
349
350 r = dns_name_is_valid(name);
351 if (r < 0)
352 return r;
353 if (r == 0)
354 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid search domain %s", name);
355 if (!route_only && dns_name_is_root(name))
d2ec6608
LP
356 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Root domain is not suitable as search domain");
357 }
358
ad44b56b
LP
359 r = sd_bus_message_rewind(message, false);
360 if (r < 0)
361 return r;
362
52aaef0f
ZJS
363 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
364 "org.freedesktop.resolve1.set-domains",
365 NULL, true, UID_INVALID,
366 &l->manager->polkit_registry, error);
367 if (r < 0)
368 return r;
369 if (r == 0)
370 return 1; /* Polkit will call us back */
371
372 dns_search_domain_mark_all(l->search_domains);
373
ad44b56b 374 for (;;) {
d2ec6608 375 DnsSearchDomain *d;
ad44b56b
LP
376 const char *name;
377 int route_only;
d2ec6608 378
ad44b56b
LP
379 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
380 if (r < 0)
381 goto clear;
382 if (r == 0)
383 break;
384
385 r = dns_search_domain_find(l->search_domains, name, &d);
d2ec6608
LP
386 if (r < 0)
387 goto clear;
388
389 if (r > 0)
390 dns_search_domain_move_back_and_unmark(d);
391 else {
ad44b56b 392 r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name);
d2ec6608
LP
393 if (r < 0)
394 goto clear;
395 }
ad44b56b
LP
396
397 d->route_only = route_only;
d2ec6608
LP
398 }
399
ad44b56b
LP
400 r = sd_bus_message_exit_container(message);
401 if (r < 0)
402 goto clear;
403
d2ec6608 404 dns_search_domain_unlink_marked(l->search_domains);
7207052d 405
943ef07c 406 (void) link_save_user(l);
7207052d
LP
407 (void) manager_write_resolv_conf(l->manager);
408
d2ec6608
LP
409 return sd_bus_reply_method_return(message, NULL);
410
411clear:
412 dns_search_domain_unlink_all(l->search_domains);
413 return r;
414}
415
77673795
LP
416int bus_link_method_set_default_route(sd_bus_message *message, void *userdata, sd_bus_error *error) {
417 Link *l = userdata;
418 int r, b;
419
420 assert(message);
421 assert(l);
422
423 r = verify_unmanaged_link(l, error);
424 if (r < 0)
425 return r;
426
427 r = sd_bus_message_read(message, "b", &b);
428 if (r < 0)
429 return r;
430
52aaef0f
ZJS
431 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
432 "org.freedesktop.resolve1.set-default-route",
433 NULL, true, UID_INVALID,
434 &l->manager->polkit_registry, error);
435 if (r < 0)
436 return r;
437 if (r == 0)
438 return 1; /* Polkit will call us back */
439
77673795
LP
440 if (l->default_route != b) {
441 l->default_route = b;
442
443 (void) link_save_user(l);
444 (void) manager_write_resolv_conf(l->manager);
445 }
446
447 return sd_bus_reply_method_return(message, NULL);
448}
449
d2ec6608
LP
450int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error) {
451 Link *l = userdata;
452 ResolveSupport mode;
453 const char *llmnr;
454 int r;
455
456 assert(message);
457 assert(l);
458
04b764bf
LP
459 r = verify_unmanaged_link(l, error);
460 if (r < 0)
461 return r;
462
d2ec6608
LP
463 r = sd_bus_message_read(message, "s", &llmnr);
464 if (r < 0)
465 return r;
466
467 if (isempty(llmnr))
468 mode = RESOLVE_SUPPORT_YES;
469 else {
470 mode = resolve_support_from_string(llmnr);
471 if (mode < 0)
472 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid LLMNR setting: %s", llmnr);
473 }
474
52aaef0f
ZJS
475 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
476 "org.freedesktop.resolve1.set-llmnr",
477 NULL, true, UID_INVALID,
478 &l->manager->polkit_registry, error);
479 if (r < 0)
480 return r;
481 if (r == 0)
482 return 1; /* Polkit will call us back */
483
d2ec6608
LP
484 l->llmnr_support = mode;
485 link_allocate_scopes(l);
486 link_add_rrs(l, false);
487
943ef07c
LP
488 (void) link_save_user(l);
489
d2ec6608
LP
490 return sd_bus_reply_method_return(message, NULL);
491}
492
493int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error) {
494 Link *l = userdata;
495 ResolveSupport mode;
496 const char *mdns;
497 int r;
498
499 assert(message);
500 assert(l);
501
04b764bf
LP
502 r = verify_unmanaged_link(l, error);
503 if (r < 0)
504 return r;
505
d2ec6608
LP
506 r = sd_bus_message_read(message, "s", &mdns);
507 if (r < 0)
508 return r;
509
510 if (isempty(mdns))
511 mode = RESOLVE_SUPPORT_NO;
512 else {
513 mode = resolve_support_from_string(mdns);
514 if (mode < 0)
515 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid MulticastDNS setting: %s", mdns);
516 }
517
52aaef0f
ZJS
518 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
519 "org.freedesktop.resolve1.set-mdns",
520 NULL, true, UID_INVALID,
521 &l->manager->polkit_registry, error);
522 if (r < 0)
523 return r;
524 if (r == 0)
525 return 1; /* Polkit will call us back */
526
d2ec6608
LP
527 l->mdns_support = mode;
528 link_allocate_scopes(l);
529 link_add_rrs(l, false);
530
943ef07c
LP
531 (void) link_save_user(l);
532
d2ec6608
LP
533 return sd_bus_reply_method_return(message, NULL);
534}
535
c9299be2 536int bus_link_method_set_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d050561a 537 Link *l = userdata;
c9299be2
IT
538 const char *dns_over_tls;
539 DnsOverTlsMode mode;
d050561a
IT
540 int r;
541
542 assert(message);
543 assert(l);
544
545 r = verify_unmanaged_link(l, error);
546 if (r < 0)
547 return r;
548
c9299be2 549 r = sd_bus_message_read(message, "s", &dns_over_tls);
d050561a
IT
550 if (r < 0)
551 return r;
552
c9299be2
IT
553 if (isempty(dns_over_tls))
554 mode = _DNS_OVER_TLS_MODE_INVALID;
d050561a 555 else {
c9299be2 556 mode = dns_over_tls_mode_from_string(dns_over_tls);
d050561a 557 if (mode < 0)
c9299be2 558 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSOverTLS setting: %s", dns_over_tls);
d050561a
IT
559 }
560
52aaef0f
ZJS
561 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
562 "org.freedesktop.resolve1.set-dns-over-tls",
563 NULL, true, UID_INVALID,
564 &l->manager->polkit_registry, error);
565 if (r < 0)
566 return r;
567 if (r == 0)
568 return 1; /* Polkit will call us back */
569
c9299be2 570 link_set_dns_over_tls_mode(l, mode);
d050561a
IT
571
572 (void) link_save_user(l);
573
574 return sd_bus_reply_method_return(message, NULL);
575}
576
d2ec6608
LP
577int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) {
578 Link *l = userdata;
579 const char *dnssec;
580 DnssecMode mode;
581 int r;
582
583 assert(message);
584 assert(l);
585
04b764bf
LP
586 r = verify_unmanaged_link(l, error);
587 if (r < 0)
588 return r;
589
d2ec6608
LP
590 r = sd_bus_message_read(message, "s", &dnssec);
591 if (r < 0)
592 return r;
593
594 if (isempty(dnssec))
595 mode = _DNSSEC_MODE_INVALID;
596 else {
597 mode = dnssec_mode_from_string(dnssec);
598 if (mode < 0)
599 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSSEC setting: %s", dnssec);
600 }
601
52aaef0f
ZJS
602 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
603 "org.freedesktop.resolve1.set-dnssec",
604 NULL, true, UID_INVALID,
605 &l->manager->polkit_registry, error);
606 if (r < 0)
607 return r;
608 if (r == 0)
609 return 1; /* Polkit will call us back */
610
d2ec6608
LP
611 link_set_dnssec_mode(l, mode);
612
943ef07c
LP
613 (void) link_save_user(l);
614
d2ec6608
LP
615 return sd_bus_reply_method_return(message, NULL);
616}
617
618int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error) {
619 _cleanup_set_free_free_ Set *ns = NULL;
c6d92582 620 _cleanup_strv_free_ char **ntas = NULL;
d2ec6608
LP
621 Link *l = userdata;
622 int r;
623 char **i;
624
625 assert(message);
626 assert(l);
627
04b764bf
LP
628 r = verify_unmanaged_link(l, error);
629 if (r < 0)
630 return r;
631
ab77c879
ZJS
632 ns = set_new(&dns_name_hash_ops);
633 if (!ns)
634 return -ENOMEM;
635
d2ec6608
LP
636 r = sd_bus_message_read_strv(message, &ntas);
637 if (r < 0)
638 return r;
639
640 STRV_FOREACH(i, ntas) {
641 r = dns_name_is_valid(*i);
642 if (r < 0)
643 return r;
644 if (r == 0)
ab77c879
ZJS
645 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS,
646 "Invalid negative trust anchor domain: %s", *i);
d2ec6608 647
be327321 648 r = set_put_strdup(&ns, *i);
d2ec6608
LP
649 if (r < 0)
650 return r;
651 }
652
52aaef0f
ZJS
653 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
654 "org.freedesktop.resolve1.set-dnssec-negative-trust-anchors",
655 NULL, true, UID_INVALID,
656 &l->manager->polkit_registry, error);
657 if (r < 0)
658 return r;
659 if (r == 0)
660 return 1; /* Polkit will call us back */
661
d2ec6608 662 set_free_free(l->dnssec_negative_trust_anchors);
ae2a15bc 663 l->dnssec_negative_trust_anchors = TAKE_PTR(ns);
d2ec6608 664
943ef07c
LP
665 (void) link_save_user(l);
666
d2ec6608
LP
667 return sd_bus_reply_method_return(message, NULL);
668}
669
670int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error) {
671 Link *l = userdata;
04b764bf 672 int r;
d2ec6608
LP
673
674 assert(message);
675 assert(l);
676
04b764bf
LP
677 r = verify_unmanaged_link(l, error);
678 if (r < 0)
679 return r;
680
52aaef0f
ZJS
681 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
682 "org.freedesktop.resolve1.revert",
683 NULL, true, UID_INVALID,
684 &l->manager->polkit_registry, error);
685 if (r < 0)
686 return r;
687 if (r == 0)
688 return 1; /* Polkit will call us back */
689
d2ec6608
LP
690 link_flush_settings(l);
691 link_allocate_scopes(l);
692 link_add_rrs(l, false);
693
943ef07c 694 (void) link_save_user(l);
7207052d 695 (void) manager_write_resolv_conf(l->manager);
5f3340ca 696 (void) manager_send_changed(l->manager, "DNS");
7207052d 697
d2ec6608
LP
698 return sd_bus_reply_method_return(message, NULL);
699}
700
8d128089 701static int link_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
3abaabda
LP
702 _cleanup_free_ char *e = NULL;
703 Manager *m = userdata;
3abaabda 704 Link *link;
597da51b 705 int ifindex, r;
3abaabda
LP
706
707 assert(bus);
708 assert(path);
709 assert(interface);
710 assert(found);
711 assert(m);
712
713 r = sd_bus_path_decode(path, "/org/freedesktop/resolve1/link", &e);
714 if (r <= 0)
715 return 0;
716
597da51b
ZJS
717 ifindex = parse_ifindex(e);
718 if (ifindex < 0)
3abaabda
LP
719 return 0;
720
721 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
722 if (!link)
723 return 0;
724
725 *found = link;
726 return 1;
727}
728
0a6c0745
ZJS
729char *link_bus_path(const Link *link) {
730 char *p, ifindex[DECIMAL_STR_MAX(link->ifindex)];
3abaabda
LP
731 int r;
732
733 assert(link);
734
0a6c0745 735 xsprintf(ifindex, "%i", link->ifindex);
3abaabda
LP
736
737 r = sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex, &p);
738 if (r < 0)
739 return NULL;
740
741 return p;
742}
743
8d128089 744static int link_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
3abaabda
LP
745 _cleanup_strv_free_ char **l = NULL;
746 Manager *m = userdata;
747 Link *link;
3abaabda
LP
748 unsigned c = 0;
749
750 assert(bus);
751 assert(path);
752 assert(m);
753 assert(nodes);
754
755 l = new0(char*, hashmap_size(m->links) + 1);
756 if (!l)
757 return -ENOMEM;
758
90e74a66 759 HASHMAP_FOREACH(link, m->links) {
3abaabda
LP
760 char *p;
761
762 p = link_bus_path(link);
763 if (!p)
764 return -ENOMEM;
765
766 l[c++] = p;
767 }
768
769 l[c] = NULL;
ae2a15bc 770 *nodes = TAKE_PTR(l);
3abaabda
LP
771
772 return 1;
773}
8d128089
ZJS
774
775static const sd_bus_vtable link_vtable[] = {
776 SD_BUS_VTABLE_START(0),
777
778 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask, 0, 0),
779 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns, 0, 0),
8e56ea4c 780 SD_BUS_PROPERTY("DNSEx", "a(iayqs)", property_get_dns_ex, 0, 0),
8d128089 781 SD_BUS_PROPERTY("CurrentDNSServer", "(iay)", property_get_current_dns_server, offsetof(Link, current_dns_server), 0),
8e56ea4c 782 SD_BUS_PROPERTY("CurrentDNSServerEx", "(iayqs)", property_get_current_dns_server_ex, offsetof(Link, current_dns_server), 0),
8d128089
ZJS
783 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0),
784 SD_BUS_PROPERTY("DefaultRoute", "b", property_get_default_route, 0, 0),
785 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support, offsetof(Link, llmnr_support), 0),
786 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support, offsetof(Link, mdns_support), 0),
787 SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode, 0, 0),
788 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, 0, 0),
789 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0),
790 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0),
791
ba5a389d
ZJS
792 SD_BUS_METHOD_WITH_ARGS("SetDNS",
793 SD_BUS_ARGS("a(iay)", addresses),
794 SD_BUS_NO_RESULT,
795 bus_link_method_set_dns_servers,
796 SD_BUS_VTABLE_UNPRIVILEGED),
95ce1ba8
YW
797 SD_BUS_METHOD_WITH_ARGS("SetDNSEx",
798 SD_BUS_ARGS("a(iayqs)", addresses),
799 SD_BUS_NO_RESULT,
800 bus_link_method_set_dns_servers_ex,
801 SD_BUS_VTABLE_UNPRIVILEGED),
ba5a389d
ZJS
802 SD_BUS_METHOD_WITH_ARGS("SetDomains",
803 SD_BUS_ARGS("a(sb)", domains),
804 SD_BUS_NO_RESULT,
805 bus_link_method_set_domains,
806 SD_BUS_VTABLE_UNPRIVILEGED),
807 SD_BUS_METHOD_WITH_ARGS("SetDefaultRoute",
808 SD_BUS_ARGS("b", enable),
809 SD_BUS_NO_RESULT,
810 bus_link_method_set_default_route,
811 SD_BUS_VTABLE_UNPRIVILEGED),
812 SD_BUS_METHOD_WITH_ARGS("SetLLMNR",
813 SD_BUS_ARGS("s", mode),
814 SD_BUS_NO_RESULT,
815 bus_link_method_set_llmnr,
816 SD_BUS_VTABLE_UNPRIVILEGED),
817 SD_BUS_METHOD_WITH_ARGS("SetMulticastDNS",
818 SD_BUS_ARGS("s", mode),
819 SD_BUS_NO_RESULT,
820 bus_link_method_set_mdns,
821 SD_BUS_VTABLE_UNPRIVILEGED),
822 SD_BUS_METHOD_WITH_ARGS("SetDNSOverTLS",
823 SD_BUS_ARGS("s", mode),
824 SD_BUS_NO_RESULT,
825 bus_link_method_set_dns_over_tls,
826 SD_BUS_VTABLE_UNPRIVILEGED),
827 SD_BUS_METHOD_WITH_ARGS("SetDNSSEC",
828 SD_BUS_ARGS("s", mode),
829 SD_BUS_NO_RESULT,
830 bus_link_method_set_dnssec,
831 SD_BUS_VTABLE_UNPRIVILEGED),
832 SD_BUS_METHOD_WITH_ARGS("SetDNSSECNegativeTrustAnchors",
833 SD_BUS_ARGS("as", names),
834 SD_BUS_NO_RESULT,
835 bus_link_method_set_dnssec_negative_trust_anchors,
836 SD_BUS_VTABLE_UNPRIVILEGED),
837 SD_BUS_METHOD_WITH_ARGS("Revert",
838 SD_BUS_NO_ARGS,
839 SD_BUS_NO_RESULT,
840 bus_link_method_revert,
841 SD_BUS_VTABLE_UNPRIVILEGED),
8d128089
ZJS
842
843 SD_BUS_VTABLE_END
844};
845
846const BusObjectImplementation link_object = {
847 "/org/freedesktop/resolve1/link",
848 "org.freedesktop.resolve1.Link",
849 .fallback_vtables = BUS_FALLBACK_VTABLES({link_vtable, link_object_find}),
850 .node_enumerator = link_node_enumerator,
851};