]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
4d1cf1e2 | 2 | |
07630cea LP |
3 | #include <netdb.h> |
4 | #include <nss.h> | |
55679e29 | 5 | #include <pthread.h> |
ca78ad1d | 6 | #include <unistd.h> |
4d1cf1e2 | 7 | |
25ff515b LP |
8 | #include "sd-varlink.h" |
9 | ||
aee9d18c | 10 | #include "env-util.h" |
2b2fec7d | 11 | #include "errno-util.h" |
28e5e1e9 | 12 | #include "glyph-util.h" |
07630cea | 13 | #include "in-addr-util.h" |
309a747f | 14 | #include "json-util.h" |
4d1cf1e2 | 15 | #include "nss-util.h" |
4cbfd62b | 16 | #include "resolved-def.h" |
0c5eb056 | 17 | #include "signal-util.h" |
2b2fec7d | 18 | #include "string-util.h" |
0c73f4f0 | 19 | #include "strv.h" |
ca00c939 | 20 | #include "time-util.h" |
4d1cf1e2 | 21 | |
309a747f | 22 | static sd_json_dispatch_flags_t json_dispatch_flags = SD_JSON_ALLOW_EXTENSIONS; |
55679e29 ZJS |
23 | |
24 | static void setup_logging(void) { | |
a7d15a24 | 25 | log_parse_environment_variables(); |
55679e29 ZJS |
26 | |
27 | if (DEBUG_LOGGING) | |
309a747f | 28 | json_dispatch_flags = SD_JSON_LOG; |
55679e29 ZJS |
29 | } |
30 | ||
31 | static void setup_logging_once(void) { | |
32 | static pthread_once_t once = PTHREAD_ONCE_INIT; | |
33 | assert_se(pthread_once(&once, setup_logging) == 0); | |
34 | } | |
35 | ||
36 | #define NSS_ENTRYPOINT_BEGIN \ | |
37 | BLOCK_SIGNALS(NSS_SIGNALS_BLOCK); \ | |
38 | setup_logging_once() | |
39 | ||
4d1cf1e2 LP |
40 | NSS_GETHOSTBYNAME_PROTOTYPES(resolve); |
41 | NSS_GETHOSTBYADDR_PROTOTYPES(resolve); | |
42 | ||
0c73f4f0 | 43 | static bool error_shall_fallback(const char *error_id) { |
ae78529f LP |
44 | /* The Varlink errors where we shall signal "please fallback" back to the NSS stack, so that some |
45 | * fallback module can be loaded. (These are mostly all Varlink-internal errors, as apparently we | |
46 | * then were unable to even do IPC with systemd-resolved.) */ | |
0c73f4f0 | 47 | return STR_IN_SET(error_id, |
25ff515b LP |
48 | SD_VARLINK_ERROR_DISCONNECTED, |
49 | SD_VARLINK_ERROR_TIMEOUT, | |
50 | SD_VARLINK_ERROR_PROTOCOL, | |
51 | SD_VARLINK_ERROR_INTERFACE_NOT_FOUND, | |
52 | SD_VARLINK_ERROR_METHOD_NOT_FOUND, | |
53 | SD_VARLINK_ERROR_METHOD_NOT_IMPLEMENTED); | |
7c2a5e26 LP |
54 | } |
55 | ||
ae78529f LP |
56 | static bool error_shall_try_again(const char *error_id) { |
57 | /* The Varlink errors where we shall signal "can't answer now but might be able to later" back to the | |
58 | * NSS stack. These are all errors that indicate lack of configuration or network problems. */ | |
59 | return STR_IN_SET(error_id, | |
60 | "io.systemd.Resolve.NoNameServers", | |
61 | "io.systemd.Resolve.QueryTimedOut", | |
62 | "io.systemd.Resolve.MaxAttemptsReached", | |
63 | "io.systemd.Resolve.NetworkDown"); | |
64 | } | |
65 | ||
25ff515b LP |
66 | static int connect_to_resolved(sd_varlink **ret) { |
67 | _cleanup_(sd_varlink_unrefp) sd_varlink *link = NULL; | |
0c73f4f0 | 68 | int r; |
309e9d86 | 69 | |
25ff515b | 70 | r = sd_varlink_connect_address(&link, "/run/systemd/resolve/io.systemd.Resolve"); |
4d1cf1e2 LP |
71 | if (r < 0) |
72 | return r; | |
73 | ||
25ff515b | 74 | r = sd_varlink_set_relative_timeout(link, SD_RESOLVED_QUERY_TIMEOUT_USEC); |
309e9d86 LP |
75 | if (r < 0) |
76 | return r; | |
77 | ||
0c73f4f0 LP |
78 | *ret = TAKE_PTR(link); |
79 | return 0; | |
4d1cf1e2 LP |
80 | } |
81 | ||
27007eff LP |
82 | static uint32_t ifindex_to_scopeid(int family, const void *a, int ifindex) { |
83 | struct in6_addr in6; | |
84 | ||
425ed139 | 85 | if (family != AF_INET6 || ifindex == 0) |
27007eff LP |
86 | return 0; |
87 | ||
88 | /* Some apps can't deal with the scope ID attached to non-link-local addresses. Hence, let's suppress that. */ | |
89 | ||
11814bbb | 90 | assert(sizeof(in6) == FAMILY_ADDRESS_SIZE(AF_INET6)); |
27007eff LP |
91 | memcpy(&in6, a, sizeof(struct in6_addr)); |
92 | ||
94876904 | 93 | return in6_addr_is_link_local(&in6) ? ifindex : 0; |
27007eff LP |
94 | } |
95 | ||
309a747f | 96 | static int json_dispatch_family(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) { |
99534007 | 97 | int *family = ASSERT_PTR(userdata); |
718ca772 | 98 | int64_t t; |
0c73f4f0 LP |
99 | |
100 | assert(variant); | |
0c73f4f0 | 101 | |
309a747f | 102 | if (!sd_json_variant_is_integer(variant)) |
0c73f4f0 LP |
103 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an integer.", strna(name)); |
104 | ||
309a747f | 105 | t = sd_json_variant_integer(variant); |
0c73f4f0 LP |
106 | if (t < 0 || t > INT_MAX) |
107 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid family.", strna(name)); | |
108 | ||
109 | *family = (int) t; | |
110 | return 0; | |
111 | } | |
112 | ||
113 | typedef struct ResolveHostnameReply { | |
309a747f | 114 | sd_json_variant *addresses; |
0c73f4f0 LP |
115 | char *name; |
116 | uint64_t flags; | |
117 | } ResolveHostnameReply; | |
118 | ||
119 | static void resolve_hostname_reply_destroy(ResolveHostnameReply *p) { | |
120 | assert(p); | |
121 | ||
309a747f | 122 | sd_json_variant_unref(p->addresses); |
0c73f4f0 | 123 | free(p->name); |
2f28018c LP |
124 | } |
125 | ||
309a747f LP |
126 | static const sd_json_dispatch_field resolve_hostname_reply_dispatch_table[] = { |
127 | { "addresses", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_variant, offsetof(ResolveHostnameReply, addresses), SD_JSON_MANDATORY }, | |
128 | { "name", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(ResolveHostnameReply, name), 0 }, | |
129 | { "flags", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(ResolveHostnameReply, flags), 0 }, | |
0c73f4f0 LP |
130 | {} |
131 | }; | |
132 | ||
133 | typedef struct AddressParameters { | |
134 | int ifindex; | |
135 | int family; | |
136 | union in_addr_union address; | |
137 | size_t address_size; | |
138 | } AddressParameters; | |
139 | ||
309a747f | 140 | static int json_dispatch_address(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) { |
99534007 | 141 | AddressParameters *p = ASSERT_PTR(userdata); |
0c73f4f0 | 142 | union in_addr_union buf = {}; |
309a747f | 143 | sd_json_variant *i; |
0c73f4f0 LP |
144 | size_t n, k = 0; |
145 | ||
146 | assert(variant); | |
0c73f4f0 | 147 | |
309a747f | 148 | if (!sd_json_variant_is_array(variant)) |
0c73f4f0 LP |
149 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array.", strna(name)); |
150 | ||
309a747f | 151 | n = sd_json_variant_elements(variant); |
0c73f4f0 LP |
152 | if (!IN_SET(n, 4, 16)) |
153 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is array of unexpected size.", strna(name)); | |
154 | ||
155 | JSON_VARIANT_ARRAY_FOREACH(i, variant) { | |
718ca772 | 156 | int64_t b; |
0c73f4f0 | 157 | |
309a747f | 158 | if (!sd_json_variant_is_integer(i)) |
0c73f4f0 LP |
159 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "Element %zu of JSON field '%s' is not an integer.", k, strna(name)); |
160 | ||
309a747f | 161 | b = sd_json_variant_integer(i); |
0c73f4f0 | 162 | if (b < 0 || b > 0xff) |
28e5e1e9 DT |
163 | return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), |
164 | "Element %zu of JSON field '%s' is out of range 0%s255.", | |
1ae9b0cf | 165 | k, strna(name), glyph(GLYPH_ELLIPSIS)); |
0c73f4f0 LP |
166 | |
167 | buf.bytes[k++] = (uint8_t) b; | |
168 | } | |
169 | ||
170 | p->address = buf; | |
171 | p->address_size = k; | |
172 | ||
173 | return 0; | |
174 | } | |
175 | ||
309a747f LP |
176 | static const sd_json_dispatch_field address_parameters_dispatch_table[] = { |
177 | { "ifindex", SD_JSON_VARIANT_INTEGER, json_dispatch_ifindex, offsetof(AddressParameters, ifindex), 0 }, | |
178 | { "family", SD_JSON_VARIANT_INTEGER, json_dispatch_family, offsetof(AddressParameters, family), SD_JSON_MANDATORY }, | |
179 | { "address", SD_JSON_VARIANT_ARRAY, json_dispatch_address, 0, SD_JSON_MANDATORY }, | |
0c73f4f0 LP |
180 | {} |
181 | }; | |
182 | ||
8ef114c6 ZJS |
183 | static uint64_t query_flag( |
184 | const char *name, | |
185 | const int value, | |
186 | uint64_t flag) { | |
efb9b3ba | 187 | |
aee9d18c LP |
188 | int r; |
189 | ||
efb9b3ba | 190 | r = secure_getenv_bool(name); |
8ef114c6 ZJS |
191 | if (r >= 0) |
192 | return r == value ? flag : 0; | |
193 | if (r != -ENXIO) | |
194 | log_debug_errno(r, "Failed to parse $%s, ignoring.", name); | |
195 | return 0; | |
196 | } | |
aee9d18c | 197 | |
8ef114c6 ZJS |
198 | static uint64_t query_flags(void) { |
199 | /* Allow callers to turn off validation, synthetization, caching, etc., when we resolve via | |
200 | * nss-resolve. */ | |
201 | return query_flag("SYSTEMD_NSS_RESOLVE_VALIDATE", 0, SD_RESOLVED_NO_VALIDATE) | | |
202 | query_flag("SYSTEMD_NSS_RESOLVE_SYNTHESIZE", 0, SD_RESOLVED_NO_SYNTHESIZE) | | |
203 | query_flag("SYSTEMD_NSS_RESOLVE_CACHE", 0, SD_RESOLVED_NO_CACHE) | | |
204 | query_flag("SYSTEMD_NSS_RESOLVE_ZONE", 0, SD_RESOLVED_NO_ZONE) | | |
205 | query_flag("SYSTEMD_NSS_RESOLVE_TRUST_ANCHOR", 0, SD_RESOLVED_NO_TRUST_ANCHOR) | | |
206 | query_flag("SYSTEMD_NSS_RESOLVE_NETWORK", 0, SD_RESOLVED_NO_NETWORK); | |
aee9d18c LP |
207 | } |
208 | ||
4d1cf1e2 LP |
209 | enum nss_status _nss_resolve_gethostbyname4_r( |
210 | const char *name, | |
211 | struct gaih_addrtuple **pat, | |
212 | char *buffer, size_t buflen, | |
213 | int *errnop, int *h_errnop, | |
214 | int32_t *ttlp) { | |
215 | ||
25ff515b | 216 | _cleanup_(sd_varlink_unrefp) sd_varlink *link = NULL; |
309a747f | 217 | _cleanup_(sd_json_variant_unrefp) sd_json_variant *cparams = NULL; |
75d2f0a0 | 218 | _cleanup_(resolve_hostname_reply_destroy) ResolveHostnameReply p = {}; |
309a747f | 219 | sd_json_variant *rparams, *entry; |
0c73f4f0 | 220 | int r; |
4d1cf1e2 | 221 | |
06202b9e | 222 | PROTECT_ERRNO; |
55679e29 | 223 | NSS_ENTRYPOINT_BEGIN; |
0c5eb056 | 224 | |
4d1cf1e2 LP |
225 | assert(name); |
226 | assert(pat); | |
227 | assert(buffer); | |
228 | assert(errnop); | |
229 | assert(h_errnop); | |
230 | ||
0c73f4f0 | 231 | r = connect_to_resolved(&link); |
4d1cf1e2 LP |
232 | if (r < 0) |
233 | goto fail; | |
234 | ||
be5bee2a LP |
235 | r = sd_json_buildo( |
236 | &cparams, | |
237 | SD_JSON_BUILD_PAIR("name", SD_JSON_BUILD_STRING(name)), | |
238 | SD_JSON_BUILD_PAIR("flags", SD_JSON_BUILD_UNSIGNED(query_flags()))); | |
4d1cf1e2 LP |
239 | if (r < 0) |
240 | goto fail; | |
241 | ||
3c229a9a YW |
242 | /* Return NSS_STATUS_UNAVAIL when communication with systemd-resolved fails, allowing falling |
243 | * back to other nss modules. Treat all other error conditions as NOTFOUND. This includes | |
244 | * DNSSEC errors and suchlike. (We don't use UNAVAIL in this case so that the nsswitch.conf | |
245 | * configuration can distinguish such executed but negative replies from complete failure to | |
246 | * talk to resolved). */ | |
75d2f0a0 | 247 | const char *error_id; |
25ff515b | 248 | r = sd_varlink_call(link, "io.systemd.Resolve.ResolveHostname", cparams, &rparams, &error_id); |
3c229a9a YW |
249 | if (r < 0) |
250 | goto fail; | |
251 | if (!isempty(error_id)) { | |
ae78529f LP |
252 | if (error_shall_try_again(error_id)) |
253 | goto try_again; | |
254 | if (error_shall_fallback(error_id)) | |
255 | goto fail; | |
cb4e5d51 MP |
256 | if (streq(error_id, "io.systemd.Resolve.NoSuchResourceRecord")) |
257 | goto no_data; | |
ae78529f | 258 | goto not_found; |
4d1cf1e2 LP |
259 | } |
260 | ||
309a747f | 261 | r = sd_json_dispatch(rparams, resolve_hostname_reply_dispatch_table, json_dispatch_flags, &p); |
0c73f4f0 | 262 | if (r < 0) |
4d1cf1e2 | 263 | goto fail; |
309a747f | 264 | if (sd_json_variant_is_blank_object(p.addresses)) |
06202b9e | 265 | goto not_found; |
4d1cf1e2 | 266 | |
75d2f0a0 | 267 | size_t n_addresses = 0; |
0c73f4f0 LP |
268 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
269 | AddressParameters q = {}; | |
270 | ||
309a747f | 271 | r = sd_json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 LP |
272 | if (r < 0) |
273 | goto fail; | |
274 | ||
275 | if (!IN_SET(q.family, AF_INET, AF_INET6)) | |
276 | continue; | |
277 | ||
278 | if (q.address_size != FAMILY_ADDRESS_SIZE(q.family)) { | |
279 | r = -EINVAL; | |
280 | goto fail; | |
281 | } | |
282 | ||
75d2f0a0 | 283 | n_addresses++; |
0c73f4f0 LP |
284 | } |
285 | ||
75d2f0a0 ZJS |
286 | const char *canonical = p.name ?: name; |
287 | size_t l = strlen(canonical); | |
288 | size_t idx, ms = ALIGN(l+1) + ALIGN(sizeof(struct gaih_addrtuple)) * n_addresses; | |
309e9d86 | 289 | |
4d1cf1e2 | 290 | if (buflen < ms) { |
cdccd29f | 291 | UNPROTECT_ERRNO; |
0192cbdb | 292 | *errnop = ERANGE; |
e36c6e48 | 293 | *h_errnop = NETDB_INTERNAL; |
4d1cf1e2 LP |
294 | return NSS_STATUS_TRYAGAIN; |
295 | } | |
296 | ||
297 | /* First, append name */ | |
75d2f0a0 ZJS |
298 | char *r_name = buffer; |
299 | memcpy(r_name, canonical, l + 1); | |
300 | idx = ALIGN(l + 1); | |
4d1cf1e2 LP |
301 | |
302 | /* Second, append addresses */ | |
75d2f0a0 ZJS |
303 | struct gaih_addrtuple *r_tuple = NULL, |
304 | *r_tuple_first = (struct gaih_addrtuple*) (buffer + idx); | |
309e9d86 | 305 | |
0c73f4f0 LP |
306 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
307 | AddressParameters q = {}; | |
78c6a153 | 308 | |
309a747f | 309 | r = sd_json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
4d1cf1e2 LP |
310 | if (r < 0) |
311 | goto fail; | |
312 | ||
0c73f4f0 | 313 | if (!IN_SET(q.family, AF_INET, AF_INET6)) |
4d1cf1e2 LP |
314 | continue; |
315 | ||
4d1cf1e2 | 316 | r_tuple = (struct gaih_addrtuple*) (buffer + idx); |
0c73f4f0 | 317 | r_tuple->next = (struct gaih_addrtuple*) ((char*) r_tuple + ALIGN(sizeof(struct gaih_addrtuple))); |
4d1cf1e2 | 318 | r_tuple->name = r_name; |
0c73f4f0 LP |
319 | r_tuple->family = q.family; |
320 | r_tuple->scopeid = ifindex_to_scopeid(q.family, &q.address, q.ifindex); | |
321 | memcpy(r_tuple->addr, &q.address, q.address_size); | |
4d1cf1e2 LP |
322 | |
323 | idx += ALIGN(sizeof(struct gaih_addrtuple)); | |
4d1cf1e2 | 324 | } |
4d1cf1e2 | 325 | |
75d2f0a0 | 326 | assert(r_tuple); /* We had at least one address, so r_tuple must be set */ |
0c73f4f0 LP |
327 | r_tuple->next = NULL; /* Override last next pointer */ |
328 | ||
4d1cf1e2 LP |
329 | assert(idx == ms); |
330 | ||
331 | if (*pat) | |
332 | **pat = *r_tuple_first; | |
333 | else | |
334 | *pat = r_tuple_first; | |
335 | ||
336 | if (ttlp) | |
337 | *ttlp = 0; | |
338 | ||
06202b9e YW |
339 | /* Explicitly reset both *h_errnop and h_errno to work around |
340 | * https://bugzilla.redhat.com/show_bug.cgi?id=1125975 */ | |
e70df46b LP |
341 | *h_errnop = NETDB_SUCCESS; |
342 | h_errno = 0; | |
343 | ||
4d1cf1e2 LP |
344 | return NSS_STATUS_SUCCESS; |
345 | ||
346 | fail: | |
cdccd29f | 347 | UNPROTECT_ERRNO; |
0192cbdb | 348 | *errnop = -r; |
a464cf80 | 349 | *h_errnop = NO_RECOVERY; |
954cba66 | 350 | return NSS_STATUS_UNAVAIL; |
06202b9e YW |
351 | |
352 | not_found: | |
353 | *h_errnop = HOST_NOT_FOUND; | |
354 | return NSS_STATUS_NOTFOUND; | |
ae78529f | 355 | |
cb4e5d51 MP |
356 | no_data: |
357 | *h_errnop = NO_DATA; | |
358 | return NSS_STATUS_NOTFOUND; | |
359 | ||
ae78529f LP |
360 | try_again: |
361 | UNPROTECT_ERRNO; | |
362 | *errnop = -r; | |
363 | *h_errnop = TRY_AGAIN; | |
364 | return NSS_STATUS_TRYAGAIN; | |
4d1cf1e2 LP |
365 | } |
366 | ||
367 | enum nss_status _nss_resolve_gethostbyname3_r( | |
368 | const char *name, | |
369 | int af, | |
370 | struct hostent *result, | |
371 | char *buffer, size_t buflen, | |
372 | int *errnop, int *h_errnop, | |
373 | int32_t *ttlp, | |
374 | char **canonp) { | |
375 | ||
25ff515b | 376 | _cleanup_(sd_varlink_unrefp) sd_varlink *link = NULL; |
309a747f | 377 | _cleanup_(sd_json_variant_unrefp) sd_json_variant *cparams = NULL; |
75d2f0a0 | 378 | _cleanup_(resolve_hostname_reply_destroy) ResolveHostnameReply p = {}; |
309a747f | 379 | sd_json_variant *rparams, *entry; |
0c73f4f0 | 380 | int r; |
4d1cf1e2 | 381 | |
06202b9e | 382 | PROTECT_ERRNO; |
55679e29 | 383 | NSS_ENTRYPOINT_BEGIN; |
0c5eb056 | 384 | |
4d1cf1e2 LP |
385 | assert(name); |
386 | assert(result); | |
387 | assert(buffer); | |
388 | assert(errnop); | |
389 | assert(h_errnop); | |
390 | ||
391 | if (af == AF_UNSPEC) | |
392 | af = AF_INET; | |
393 | ||
4c701096 | 394 | if (!IN_SET(af, AF_INET, AF_INET6)) { |
4d1cf1e2 LP |
395 | r = -EAFNOSUPPORT; |
396 | goto fail; | |
397 | } | |
398 | ||
0c73f4f0 | 399 | r = connect_to_resolved(&link); |
4d1cf1e2 LP |
400 | if (r < 0) |
401 | goto fail; | |
402 | ||
be5bee2a LP |
403 | r = sd_json_buildo( |
404 | &cparams, | |
405 | SD_JSON_BUILD_PAIR("name", SD_JSON_BUILD_STRING(name)), | |
406 | SD_JSON_BUILD_PAIR("family", SD_JSON_BUILD_INTEGER(af)), | |
407 | SD_JSON_BUILD_PAIR("flags", SD_JSON_BUILD_UNSIGNED(query_flags()))); | |
4d1cf1e2 LP |
408 | if (r < 0) |
409 | goto fail; | |
410 | ||
75d2f0a0 | 411 | const char *error_id; |
25ff515b | 412 | r = sd_varlink_call(link, "io.systemd.Resolve.ResolveHostname", cparams, &rparams, &error_id); |
3c229a9a YW |
413 | if (r < 0) |
414 | goto fail; | |
415 | if (!isempty(error_id)) { | |
ae78529f LP |
416 | if (error_shall_try_again(error_id)) |
417 | goto try_again; | |
418 | if (error_shall_fallback(error_id)) | |
419 | goto fail; | |
cb4e5d51 MP |
420 | if (streq(error_id, "io.systemd.Resolve.NoSuchResourceRecord")) |
421 | goto no_data; | |
ae78529f | 422 | goto not_found; |
4d1cf1e2 LP |
423 | } |
424 | ||
309a747f | 425 | r = sd_json_dispatch(rparams, resolve_hostname_reply_dispatch_table, json_dispatch_flags, &p); |
0c73f4f0 | 426 | if (r < 0) |
4d1cf1e2 | 427 | goto fail; |
309a747f | 428 | if (sd_json_variant_is_blank_object(p.addresses)) |
06202b9e | 429 | goto not_found; |
4d1cf1e2 | 430 | |
75d2f0a0 | 431 | size_t n_addresses = 0; |
0c73f4f0 LP |
432 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
433 | AddressParameters q = {}; | |
434 | ||
309a747f | 435 | r = sd_json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 LP |
436 | if (r < 0) |
437 | goto fail; | |
438 | ||
439 | if (!IN_SET(q.family, AF_INET, AF_INET6)) | |
440 | continue; | |
441 | ||
442 | if (q.address_size != FAMILY_ADDRESS_SIZE(q.family)) { | |
443 | r = -EINVAL; | |
444 | goto fail; | |
445 | } | |
446 | ||
75d2f0a0 | 447 | n_addresses++; |
0c73f4f0 LP |
448 | } |
449 | ||
75d2f0a0 | 450 | const char *canonical = p.name ?: name; |
309e9d86 | 451 | |
75d2f0a0 ZJS |
452 | size_t alen = FAMILY_ADDRESS_SIZE(af); |
453 | size_t l = strlen(canonical); | |
4d1cf1e2 | 454 | |
75d2f0a0 | 455 | size_t idx, ms = ALIGN(l + 1) + n_addresses * ALIGN(alen) + (n_addresses + 2) * sizeof(char*); |
4d1cf1e2 LP |
456 | |
457 | if (buflen < ms) { | |
cdccd29f | 458 | UNPROTECT_ERRNO; |
0192cbdb | 459 | *errnop = ERANGE; |
e36c6e48 | 460 | *h_errnop = NETDB_INTERNAL; |
4d1cf1e2 LP |
461 | return NSS_STATUS_TRYAGAIN; |
462 | } | |
463 | ||
464 | /* First, append name */ | |
75d2f0a0 | 465 | char *r_name = buffer; |
309e9d86 | 466 | memcpy(r_name, canonical, l+1); |
4d1cf1e2 LP |
467 | idx = ALIGN(l+1); |
468 | ||
309e9d86 | 469 | /* Second, create empty aliases array */ |
75d2f0a0 | 470 | char *r_aliases = buffer + idx; |
4d1cf1e2 LP |
471 | ((char**) r_aliases)[0] = NULL; |
472 | idx += sizeof(char*); | |
473 | ||
474 | /* Third, append addresses */ | |
75d2f0a0 | 475 | char *r_addr = buffer + idx; |
309e9d86 | 476 | |
75d2f0a0 | 477 | size_t i = 0; |
0c73f4f0 LP |
478 | JSON_VARIANT_ARRAY_FOREACH(entry, p.addresses) { |
479 | AddressParameters q = {}; | |
4d1cf1e2 | 480 | |
309a747f | 481 | r = sd_json_dispatch(entry, address_parameters_dispatch_table, json_dispatch_flags, &q); |
4d1cf1e2 LP |
482 | if (r < 0) |
483 | goto fail; | |
484 | ||
0c73f4f0 | 485 | if (q.family != af) |
4d1cf1e2 LP |
486 | continue; |
487 | ||
0c73f4f0 | 488 | if (q.address_size != alen) { |
4d1cf1e2 LP |
489 | r = -EINVAL; |
490 | goto fail; | |
491 | } | |
492 | ||
0c73f4f0 | 493 | memcpy(r_addr + i*ALIGN(alen), &q.address, alen); |
4d1cf1e2 LP |
494 | i++; |
495 | } | |
496 | ||
75d2f0a0 ZJS |
497 | assert(i == n_addresses); |
498 | idx += n_addresses * ALIGN(alen); | |
4d1cf1e2 | 499 | |
309e9d86 | 500 | /* Fourth, append address pointer array */ |
75d2f0a0 ZJS |
501 | char *r_addr_list = buffer + idx; |
502 | for (i = 0; i < n_addresses; i++) | |
4d1cf1e2 LP |
503 | ((char**) r_addr_list)[i] = r_addr + i*ALIGN(alen); |
504 | ||
505 | ((char**) r_addr_list)[i] = NULL; | |
75d2f0a0 | 506 | idx += (n_addresses + 1) * sizeof(char*); |
4d1cf1e2 LP |
507 | |
508 | assert(idx == ms); | |
509 | ||
510 | result->h_name = r_name; | |
511 | result->h_aliases = (char**) r_aliases; | |
512 | result->h_addrtype = af; | |
513 | result->h_length = alen; | |
514 | result->h_addr_list = (char**) r_addr_list; | |
515 | ||
516 | if (ttlp) | |
517 | *ttlp = 0; | |
518 | ||
519 | if (canonp) | |
520 | *canonp = r_name; | |
521 | ||
06202b9e YW |
522 | /* Explicitly reset both *h_errnop and h_errno to work around |
523 | * https://bugzilla.redhat.com/show_bug.cgi?id=1125975 */ | |
524 | *h_errnop = NETDB_SUCCESS; | |
525 | h_errno = 0; | |
526 | ||
4d1cf1e2 LP |
527 | return NSS_STATUS_SUCCESS; |
528 | ||
529 | fail: | |
cdccd29f | 530 | UNPROTECT_ERRNO; |
0192cbdb | 531 | *errnop = -r; |
a464cf80 | 532 | *h_errnop = NO_RECOVERY; |
954cba66 | 533 | return NSS_STATUS_UNAVAIL; |
06202b9e YW |
534 | |
535 | not_found: | |
536 | *h_errnop = HOST_NOT_FOUND; | |
537 | return NSS_STATUS_NOTFOUND; | |
ae78529f | 538 | |
cb4e5d51 MP |
539 | no_data: |
540 | *h_errnop = NO_DATA; | |
541 | return NSS_STATUS_NOTFOUND; | |
542 | ||
ae78529f LP |
543 | try_again: |
544 | UNPROTECT_ERRNO; | |
545 | *errnop = -r; | |
546 | *h_errnop = TRY_AGAIN; | |
547 | return NSS_STATUS_TRYAGAIN; | |
4d1cf1e2 LP |
548 | } |
549 | ||
0c73f4f0 | 550 | typedef struct ResolveAddressReply { |
309a747f | 551 | sd_json_variant *names; |
0c73f4f0 LP |
552 | uint64_t flags; |
553 | } ResolveAddressReply; | |
554 | ||
555 | static void resolve_address_reply_destroy(ResolveAddressReply *p) { | |
556 | assert(p); | |
557 | ||
309a747f | 558 | sd_json_variant_unref(p->names); |
0c73f4f0 LP |
559 | } |
560 | ||
309a747f LP |
561 | static const sd_json_dispatch_field resolve_address_reply_dispatch_table[] = { |
562 | { "names", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_variant, offsetof(ResolveAddressReply, names), SD_JSON_MANDATORY }, | |
563 | { "flags", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(ResolveAddressReply, flags), 0 }, | |
0c73f4f0 LP |
564 | {} |
565 | }; | |
566 | ||
567 | typedef struct NameParameters { | |
568 | int ifindex; | |
569 | char *name; | |
570 | } NameParameters; | |
571 | ||
572 | static void name_parameters_destroy(NameParameters *p) { | |
573 | assert(p); | |
574 | ||
575 | free(p->name); | |
576 | } | |
577 | ||
309a747f LP |
578 | static const sd_json_dispatch_field name_parameters_dispatch_table[] = { |
579 | { "ifindex", SD_JSON_VARIANT_INTEGER, json_dispatch_ifindex, offsetof(NameParameters, ifindex), 0 }, | |
580 | { "name", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(NameParameters, name), SD_JSON_MANDATORY }, | |
0c73f4f0 LP |
581 | {} |
582 | }; | |
583 | ||
4d1cf1e2 LP |
584 | enum nss_status _nss_resolve_gethostbyaddr2_r( |
585 | const void* addr, socklen_t len, | |
586 | int af, | |
587 | struct hostent *result, | |
588 | char *buffer, size_t buflen, | |
589 | int *errnop, int *h_errnop, | |
590 | int32_t *ttlp) { | |
591 | ||
25ff515b | 592 | _cleanup_(sd_varlink_unrefp) sd_varlink *link = NULL; |
309a747f | 593 | _cleanup_(sd_json_variant_unrefp) sd_json_variant *cparams = NULL; |
75d2f0a0 | 594 | _cleanup_(resolve_address_reply_destroy) ResolveAddressReply p = {}; |
309a747f | 595 | sd_json_variant *rparams, *entry; |
0c73f4f0 | 596 | int r; |
4d1cf1e2 | 597 | |
06202b9e | 598 | PROTECT_ERRNO; |
55679e29 | 599 | NSS_ENTRYPOINT_BEGIN; |
0c5eb056 | 600 | |
4d1cf1e2 LP |
601 | assert(addr); |
602 | assert(result); | |
603 | assert(buffer); | |
604 | assert(errnop); | |
605 | assert(h_errnop); | |
606 | ||
607 | if (!IN_SET(af, AF_INET, AF_INET6)) { | |
cdccd29f | 608 | UNPROTECT_ERRNO; |
0192cbdb | 609 | *errnop = EAFNOSUPPORT; |
4d1cf1e2 LP |
610 | *h_errnop = NO_DATA; |
611 | return NSS_STATUS_UNAVAIL; | |
612 | } | |
613 | ||
9d485985 | 614 | if (len != FAMILY_ADDRESS_SIZE(af)) { |
a62fc245 LP |
615 | r = -EINVAL; |
616 | goto fail; | |
4d1cf1e2 LP |
617 | } |
618 | ||
0c73f4f0 | 619 | r = connect_to_resolved(&link); |
4d1cf1e2 LP |
620 | if (r < 0) |
621 | goto fail; | |
622 | ||
be5bee2a LP |
623 | r = sd_json_buildo( |
624 | &cparams, | |
625 | SD_JSON_BUILD_PAIR("address", SD_JSON_BUILD_BYTE_ARRAY(addr, len)), | |
626 | SD_JSON_BUILD_PAIR("family", SD_JSON_BUILD_INTEGER(af)), | |
627 | SD_JSON_BUILD_PAIR("flags", SD_JSON_BUILD_UNSIGNED(query_flags()))); | |
4d1cf1e2 LP |
628 | if (r < 0) |
629 | goto fail; | |
630 | ||
77fac974 | 631 | const char* error_id; |
25ff515b | 632 | r = sd_varlink_call(link, "io.systemd.Resolve.ResolveAddress", cparams, &rparams, &error_id); |
3c229a9a YW |
633 | if (r < 0) |
634 | goto fail; | |
635 | if (!isempty(error_id)) { | |
ae78529f LP |
636 | if (error_shall_try_again(error_id)) |
637 | goto try_again; | |
638 | if (error_shall_fallback(error_id)) | |
639 | goto fail; | |
640 | goto not_found; | |
4d1cf1e2 LP |
641 | } |
642 | ||
309a747f | 643 | r = sd_json_dispatch(rparams, resolve_address_reply_dispatch_table, json_dispatch_flags, &p); |
51323288 LP |
644 | if (r < 0) |
645 | goto fail; | |
309a747f | 646 | if (sd_json_variant_is_blank_object(p.names)) |
0c73f4f0 | 647 | goto not_found; |
51323288 | 648 | |
77fac974 ZJS |
649 | size_t ms = 0, idx; |
650 | ||
0c73f4f0 LP |
651 | JSON_VARIANT_ARRAY_FOREACH(entry, p.names) { |
652 | _cleanup_(name_parameters_destroy) NameParameters q = {}; | |
51323288 | 653 | |
309a747f | 654 | r = sd_json_dispatch(entry, name_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 | 655 | if (r < 0) |
78c6a153 | 656 | goto fail; |
4d1cf1e2 | 657 | |
0c73f4f0 | 658 | ms += ALIGN(strlen(q.name) + 1); |
4d1cf1e2 | 659 | } |
4d1cf1e2 | 660 | |
309a747f | 661 | size_t n_names = sd_json_variant_elements(p.names); |
77fac974 ZJS |
662 | ms += ALIGN(len) + /* the address */ |
663 | 2 * sizeof(char*) + /* pointer to the address, plus trailing NULL */ | |
664 | n_names * sizeof(char*); /* pointers to aliases, plus trailing NULL */ | |
4d1cf1e2 LP |
665 | |
666 | if (buflen < ms) { | |
cdccd29f | 667 | UNPROTECT_ERRNO; |
0192cbdb | 668 | *errnop = ERANGE; |
e36c6e48 | 669 | *h_errnop = NETDB_INTERNAL; |
4d1cf1e2 LP |
670 | return NSS_STATUS_TRYAGAIN; |
671 | } | |
672 | ||
673 | /* First, place address */ | |
77fac974 | 674 | char *r_addr = buffer; |
4d1cf1e2 LP |
675 | memcpy(r_addr, addr, len); |
676 | idx = ALIGN(len); | |
677 | ||
678 | /* Second, place address list */ | |
77fac974 | 679 | char *r_addr_list = buffer + idx; |
4d1cf1e2 LP |
680 | ((char**) r_addr_list)[0] = r_addr; |
681 | ((char**) r_addr_list)[1] = NULL; | |
682 | idx += sizeof(char*) * 2; | |
683 | ||
77fac974 ZJS |
684 | /* Third, reserve space for the aliases array, plus trailing NULL */ |
685 | char *r_aliases = buffer + idx; | |
686 | idx += sizeof(char*) * n_names; | |
4d1cf1e2 LP |
687 | |
688 | /* Fourth, place aliases */ | |
77fac974 ZJS |
689 | char *r_name = buffer + idx; |
690 | ||
691 | size_t i = 0; | |
0c73f4f0 LP |
692 | JSON_VARIANT_ARRAY_FOREACH(entry, p.names) { |
693 | _cleanup_(name_parameters_destroy) NameParameters q = {}; | |
4d1cf1e2 | 694 | |
309a747f | 695 | r = sd_json_dispatch(entry, name_parameters_dispatch_table, json_dispatch_flags, &q); |
0c73f4f0 LP |
696 | if (r < 0) |
697 | goto fail; | |
698 | ||
77fac974 ZJS |
699 | size_t l = strlen(q.name); |
700 | char *z = buffer + idx; | |
701 | memcpy(z, q.name, l + 1); | |
4d1cf1e2 | 702 | |
963783d7 | 703 | if (i > 0) |
77fac974 | 704 | ((char**) r_aliases)[i - 1] = z; |
4d1cf1e2 LP |
705 | i++; |
706 | ||
77fac974 | 707 | idx += ALIGN(l + 1); |
4d1cf1e2 | 708 | } |
77fac974 | 709 | ((char**) r_aliases)[n_names - 1] = NULL; |
4d1cf1e2 | 710 | |
4d1cf1e2 LP |
711 | assert(idx == ms); |
712 | ||
713 | result->h_name = r_name; | |
714 | result->h_aliases = (char**) r_aliases; | |
715 | result->h_addrtype = af; | |
716 | result->h_length = len; | |
717 | result->h_addr_list = (char**) r_addr_list; | |
718 | ||
719 | if (ttlp) | |
720 | *ttlp = 0; | |
721 | ||
06202b9e YW |
722 | /* Explicitly reset both *h_errnop and h_errno to work around |
723 | * https://bugzilla.redhat.com/show_bug.cgi?id=1125975 */ | |
e70df46b LP |
724 | *h_errnop = NETDB_SUCCESS; |
725 | h_errno = 0; | |
726 | ||
4d1cf1e2 LP |
727 | return NSS_STATUS_SUCCESS; |
728 | ||
729 | fail: | |
cdccd29f | 730 | UNPROTECT_ERRNO; |
0192cbdb | 731 | *errnop = -r; |
a464cf80 | 732 | *h_errnop = NO_RECOVERY; |
954cba66 | 733 | return NSS_STATUS_UNAVAIL; |
06202b9e YW |
734 | |
735 | not_found: | |
736 | *h_errnop = HOST_NOT_FOUND; | |
737 | return NSS_STATUS_NOTFOUND; | |
ae78529f LP |
738 | |
739 | try_again: | |
740 | UNPROTECT_ERRNO; | |
741 | *errnop = -r; | |
742 | *h_errnop = TRY_AGAIN; | |
743 | return NSS_STATUS_TRYAGAIN; | |
4d1cf1e2 LP |
744 | } |
745 | ||
746 | NSS_GETHOSTBYNAME_FALLBACKS(resolve); | |
747 | NSS_GETHOSTBYADDR_FALLBACKS(resolve); |