]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-link-bus.c
tree-wide: use ASSERT_PTR more
[thirdparty/systemd.git] / src / resolve / resolved-link-bus.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
3abaabda 2
6ff79f76 3#include <net/if.h>
52aaef0f
ZJS
4#include <netinet/in.h>
5#include <sys/capability.h>
6ff79f76 6
3abaabda 7#include "alloc-util.h"
04b764bf 8#include "bus-common-errors.h"
40af3d02 9#include "bus-get-properties.h"
10d46204 10#include "bus-message-util.h"
269e4d2d 11#include "bus-polkit.h"
0b261ac5 12#include "log-link.h"
3abaabda
LP
13#include "parse-util.h"
14#include "resolve-util.h"
15#include "resolved-bus.h"
16#include "resolved-link-bus.h"
7207052d 17#include "resolved-resolv-conf.h"
95ce1ba8 18#include "socket-netlink.h"
0a6c0745 19#include "stdio-util.h"
3abaabda 20#include "strv.h"
52aaef0f 21#include "user-util.h"
3abaabda 22
acd380c4
YW
23static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported, "b", Link, link_dnssec_supported);
24static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode, "s", Link, link_get_dnssec_mode, dnssec_mode_to_string);
3abaabda 25
c9299be2 26static int property_get_dns_over_tls_mode(
d050561a
IT
27 sd_bus *bus,
28 const char *path,
29 const char *interface,
30 const char *property,
31 sd_bus_message *reply,
32 void *userdata,
33 sd_bus_error *error) {
34
99534007 35 Link *l = ASSERT_PTR(userdata);
d050561a
IT
36
37 assert(reply);
d050561a 38
c9299be2 39 return sd_bus_message_append(reply, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l)));
d050561a
IT
40}
41
8e56ea4c 42static int property_get_dns_internal(
3abaabda
LP
43 sd_bus *bus,
44 const char *path,
45 const char *interface,
46 const char *property,
47 sd_bus_message *reply,
48 void *userdata,
8e56ea4c
YW
49 sd_bus_error *error,
50 bool extended) {
3abaabda 51
99534007 52 Link *l = ASSERT_PTR(userdata);
3abaabda
LP
53 int r;
54
55 assert(reply);
3abaabda 56
8e56ea4c 57 r = sd_bus_message_open_container(reply, 'a', extended ? "(iayqs)" : "(iay)");
3abaabda
LP
58 if (r < 0)
59 return r;
60
61 LIST_FOREACH(servers, s, l->dns_servers) {
8e56ea4c 62 r = bus_dns_server_append(reply, s, false, extended);
3abaabda
LP
63 if (r < 0)
64 return r;
65 }
66
67 return sd_bus_message_close_container(reply);
68}
69
8e56ea4c
YW
70static int property_get_dns(
71 sd_bus *bus,
72 const char *path,
73 const char *interface,
74 const char *property,
75 sd_bus_message *reply,
76 void *userdata,
77 sd_bus_error *error) {
78 return property_get_dns_internal(bus, path, interface, property, reply, userdata, error, false);
79}
80
81static int property_get_dns_ex(
b7ac92cd
YW
82 sd_bus *bus,
83 const char *path,
84 const char *interface,
85 const char *property,
86 sd_bus_message *reply,
87 void *userdata,
88 sd_bus_error *error) {
8e56ea4c
YW
89 return property_get_dns_internal(bus, path, interface, property, reply, userdata, error, true);
90}
91
92static int property_get_current_dns_server_internal(
93 sd_bus *bus,
94 const char *path,
95 const char *interface,
96 const char *property,
97 sd_bus_message *reply,
98 void *userdata,
99 sd_bus_error *error,
100 bool extended) {
b7ac92cd
YW
101
102 DnsServer *s;
103
104 assert(reply);
105 assert(userdata);
106
107 s = *(DnsServer **) userdata;
108
8e56ea4c
YW
109 return bus_dns_server_append(reply, s, false, extended);
110}
111
112static int property_get_current_dns_server(
113 sd_bus *bus,
114 const char *path,
115 const char *interface,
116 const char *property,
117 sd_bus_message *reply,
118 void *userdata,
119 sd_bus_error *error) {
120 return property_get_current_dns_server_internal(bus, path, interface, property, reply, userdata, error, false);
121}
122
123static int property_get_current_dns_server_ex(
124 sd_bus *bus,
125 const char *path,
126 const char *interface,
127 const char *property,
128 sd_bus_message *reply,
129 void *userdata,
130 sd_bus_error *error) {
131 return property_get_current_dns_server_internal(bus, path, interface, property, reply, userdata, error, true);
b7ac92cd
YW
132}
133
3abaabda
LP
134static int property_get_domains(
135 sd_bus *bus,
136 const char *path,
137 const char *interface,
138 const char *property,
139 sd_bus_message *reply,
140 void *userdata,
141 sd_bus_error *error) {
142
99534007 143 Link *l = ASSERT_PTR(userdata);
3abaabda
LP
144 int r;
145
146 assert(reply);
3abaabda 147
ad44b56b 148 r = sd_bus_message_open_container(reply, 'a', "(sb)");
3abaabda
LP
149 if (r < 0)
150 return r;
151
152 LIST_FOREACH(domains, d, l->search_domains) {
ad44b56b 153 r = sd_bus_message_append(reply, "(sb)", d->name, d->route_only);
3abaabda
LP
154 if (r < 0)
155 return r;
156 }
157
158 return sd_bus_message_close_container(reply);
159}
160
77673795
LP
161static int property_get_default_route(
162 sd_bus *bus,
163 const char *path,
164 const char *interface,
165 const char *property,
166 sd_bus_message *reply,
167 void *userdata,
168 sd_bus_error *error) {
169
99534007 170 Link *l = ASSERT_PTR(userdata);
77673795
LP
171
172 assert(reply);
77673795
LP
173
174 /* Return what is configured, if there's something configured */
175 if (l->default_route >= 0)
176 return sd_bus_message_append(reply, "b", l->default_route);
177
178 /* Otherwise report what is in effect */
179 if (l->unicast_scope)
180 return sd_bus_message_append(reply, "b", dns_scope_is_default_route(l->unicast_scope));
181
182 return sd_bus_message_append(reply, "b", false);
183}
184
3abaabda
LP
185static int property_get_scopes_mask(
186 sd_bus *bus,
187 const char *path,
188 const char *interface,
189 const char *property,
190 sd_bus_message *reply,
191 void *userdata,
192 sd_bus_error *error) {
193
99534007 194 Link *l = ASSERT_PTR(userdata);
3abaabda
LP
195 uint64_t mask;
196
197 assert(reply);
3abaabda
LP
198
199 mask = (l->unicast_scope ? SD_RESOLVED_DNS : 0) |
200 (l->llmnr_ipv4_scope ? SD_RESOLVED_LLMNR_IPV4 : 0) |
201 (l->llmnr_ipv6_scope ? SD_RESOLVED_LLMNR_IPV6 : 0) |
202 (l->mdns_ipv4_scope ? SD_RESOLVED_MDNS_IPV4 : 0) |
203 (l->mdns_ipv6_scope ? SD_RESOLVED_MDNS_IPV6 : 0);
204
205 return sd_bus_message_append(reply, "t", mask);
206}
207
208static int property_get_ntas(
209 sd_bus *bus,
210 const char *path,
211 const char *interface,
212 const char *property,
213 sd_bus_message *reply,
214 void *userdata,
215 sd_bus_error *error) {
216
99534007 217 Link *l = ASSERT_PTR(userdata);
3abaabda 218 const char *name;
3abaabda
LP
219 int r;
220
221 assert(reply);
3abaabda
LP
222
223 r = sd_bus_message_open_container(reply, 'a', "s");
224 if (r < 0)
225 return r;
226
90e74a66 227 SET_FOREACH(name, l->dnssec_negative_trust_anchors) {
3abaabda
LP
228 r = sd_bus_message_append(reply, "s", name);
229 if (r < 0)
230 return r;
231 }
232
233 return sd_bus_message_close_container(reply);
234}
235
04b764bf
LP
236static int verify_unmanaged_link(Link *l, sd_bus_error *error) {
237 assert(l);
238
239 if (l->flags & IFF_LOOPBACK)
6ff79f76 240 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is loopback device.", l->ifname);
04b764bf 241 if (l->is_managed)
6ff79f76 242 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is managed.", l->ifname);
04b764bf
LP
243
244 return 0;
245}
246
95ce1ba8 247static int bus_link_method_set_dns_servers_internal(sd_bus_message *message, void *userdata, sd_bus_error *error, bool extended) {
0b261ac5 248 _cleanup_free_ char *j = NULL;
10d46204 249 struct in_addr_full **dns;
cbf23f38 250 bool changed = false;
99534007 251 Link *l = ASSERT_PTR(userdata);
10d46204 252 size_t n;
d2ec6608
LP
253 int r;
254
255 assert(message);
d2ec6608 256
04b764bf
LP
257 r = verify_unmanaged_link(l, error);
258 if (r < 0)
259 return r;
260
10d46204 261 r = bus_message_read_dns_servers(message, error, extended, &dns, &n);
d2ec6608
LP
262 if (r < 0)
263 return r;
264
52aaef0f
ZJS
265 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
266 "org.freedesktop.resolve1.set-dns-servers",
267 NULL, true, UID_INVALID,
268 &l->manager->polkit_registry, error);
269 if (r < 0)
95ce1ba8
YW
270 goto finalize;
271 if (r == 0) {
272 r = 1; /* Polkit will call us back */
273 goto finalize;
274 }
52aaef0f 275
0b261ac5
LP
276 for (size_t i = 0; i < n; i++) {
277 const char *s;
278
279 s = in_addr_full_to_string(dns[i]);
280 if (!s) {
281 r = -ENOMEM;
282 goto finalize;
283 }
284
c2bc710b 285 if (!strextend_with_separator(&j, ", ", s)) {
0b261ac5
LP
286 r = -ENOMEM;
287 goto finalize;
288 }
289 }
290
1e69eadd
LP
291 bus_client_log(message, "DNS server change");
292
d2ec6608
LP
293 dns_server_mark_all(l->dns_servers);
294
95ce1ba8 295 for (size_t i = 0; i < n; i++) {
d2ec6608
LP
296 DnsServer *s;
297
95ce1ba8 298 s = dns_server_find(l->dns_servers, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
d2ec6608
LP
299 if (s)
300 dns_server_move_back_and_unmark(s);
301 else {
95ce1ba8
YW
302 r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
303 if (r < 0) {
304 dns_server_unlink_all(l->dns_servers);
305 goto finalize;
306 }
cbf23f38
LP
307
308 changed = true;
d2ec6608
LP
309 }
310
311 }
312
cbf23f38
LP
313 changed = dns_server_unlink_marked(l->dns_servers) || changed;
314
315 if (changed) {
316 link_allocate_scopes(l);
d2ec6608 317
cbf23f38
LP
318 (void) link_save_user(l);
319 (void) manager_write_resolv_conf(l->manager);
320 (void) manager_send_changed(l->manager, "DNS");
7207052d 321
cbf23f38
LP
322 if (j)
323 log_link_info(l, "Bus client set DNS server list to: %s", j);
324 else
325 log_link_info(l, "Bus client reset DNS server list.");
326 }
0b261ac5 327
95ce1ba8
YW
328 r = sd_bus_reply_method_return(message, NULL);
329
330finalize:
331 for (size_t i = 0; i < n; i++)
332 in_addr_full_free(dns[i]);
333 free(dns);
d2ec6608 334
d2ec6608
LP
335 return r;
336}
337
95ce1ba8
YW
338int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_bus_error *error) {
339 return bus_link_method_set_dns_servers_internal(message, userdata, error, false);
340}
341
342int bus_link_method_set_dns_servers_ex(sd_bus_message *message, void *userdata, sd_bus_error *error) {
343 return bus_link_method_set_dns_servers_internal(message, userdata, error, true);
344}
345
ee116b54 346int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error) {
0b261ac5 347 _cleanup_free_ char *j = NULL;
99534007 348 Link *l = ASSERT_PTR(userdata);
cbf23f38 349 bool changed = false;
d2ec6608
LP
350 int r;
351
352 assert(message);
d2ec6608 353
04b764bf
LP
354 r = verify_unmanaged_link(l, error);
355 if (r < 0)
356 return r;
357
ad44b56b 358 r = sd_bus_message_enter_container(message, 'a', "(sb)");
d2ec6608
LP
359 if (r < 0)
360 return r;
361
ad44b56b 362 for (;;) {
0b261ac5 363 _cleanup_free_ char *prefixed = NULL;
ad44b56b
LP
364 const char *name;
365 int route_only;
d2ec6608 366
ad44b56b 367 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
d2ec6608
LP
368 if (r < 0)
369 return r;
370 if (r == 0)
ad44b56b
LP
371 break;
372
373 r = dns_name_is_valid(name);
374 if (r < 0)
375 return r;
376 if (r == 0)
377 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid search domain %s", name);
378 if (!route_only && dns_name_is_root(name))
1b09b81c 379 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Root domain is not suitable as search domain");
0b261ac5
LP
380
381 if (route_only) {
382 prefixed = strjoin("~", name);
383 if (!prefixed)
384 return -ENOMEM;
385
386 name = prefixed;
387 }
388
c2bc710b 389 if (!strextend_with_separator(&j, ", ", name))
0b261ac5 390 return -ENOMEM;
d2ec6608
LP
391 }
392
ad44b56b
LP
393 r = sd_bus_message_rewind(message, false);
394 if (r < 0)
395 return r;
396
52aaef0f
ZJS
397 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
398 "org.freedesktop.resolve1.set-domains",
399 NULL, true, UID_INVALID,
400 &l->manager->polkit_registry, error);
401 if (r < 0)
402 return r;
403 if (r == 0)
404 return 1; /* Polkit will call us back */
405
1e69eadd
LP
406 bus_client_log(message, "dns domains change");
407
52aaef0f
ZJS
408 dns_search_domain_mark_all(l->search_domains);
409
ad44b56b 410 for (;;) {
d2ec6608 411 DnsSearchDomain *d;
ad44b56b
LP
412 const char *name;
413 int route_only;
d2ec6608 414
ad44b56b
LP
415 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
416 if (r < 0)
417 goto clear;
418 if (r == 0)
419 break;
420
421 r = dns_search_domain_find(l->search_domains, name, &d);
d2ec6608
LP
422 if (r < 0)
423 goto clear;
424
425 if (r > 0)
426 dns_search_domain_move_back_and_unmark(d);
427 else {
ad44b56b 428 r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name);
d2ec6608
LP
429 if (r < 0)
430 goto clear;
cbf23f38
LP
431
432 changed = true;
d2ec6608 433 }
ad44b56b
LP
434
435 d->route_only = route_only;
d2ec6608
LP
436 }
437
ad44b56b
LP
438 r = sd_bus_message_exit_container(message);
439 if (r < 0)
440 goto clear;
441
cbf23f38 442 changed = dns_search_domain_unlink_marked(l->search_domains) || changed;
7207052d 443
cbf23f38
LP
444 if (changed) {
445 (void) link_save_user(l);
446 (void) manager_write_resolv_conf(l->manager);
7207052d 447
cbf23f38
LP
448 if (j)
449 log_link_info(l, "Bus client set search domain list to: %s", j);
450 else
451 log_link_info(l, "Bus client reset search domain list.");
452 }
0b261ac5 453
d2ec6608
LP
454 return sd_bus_reply_method_return(message, NULL);
455
456clear:
457 dns_search_domain_unlink_all(l->search_domains);
458 return r;
459}
460
77673795 461int bus_link_method_set_default_route(sd_bus_message *message, void *userdata, sd_bus_error *error) {
99534007 462 Link *l = ASSERT_PTR(userdata);
77673795
LP
463 int r, b;
464
465 assert(message);
77673795
LP
466
467 r = verify_unmanaged_link(l, error);
468 if (r < 0)
469 return r;
470
471 r = sd_bus_message_read(message, "b", &b);
472 if (r < 0)
473 return r;
474
52aaef0f
ZJS
475 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
476 "org.freedesktop.resolve1.set-default-route",
477 NULL, true, UID_INVALID,
478 &l->manager->polkit_registry, error);
479 if (r < 0)
480 return r;
481 if (r == 0)
482 return 1; /* Polkit will call us back */
483
1e69eadd
LP
484 bus_client_log(message, "dns default route change");
485
77673795
LP
486 if (l->default_route != b) {
487 l->default_route = b;
488
489 (void) link_save_user(l);
490 (void) manager_write_resolv_conf(l->manager);
77673795 491
cbf23f38
LP
492 log_link_info(l, "Bus client set default route setting: %s", yes_no(b));
493 }
0b261ac5 494
77673795
LP
495 return sd_bus_reply_method_return(message, NULL);
496}
497
d2ec6608 498int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error) {
99534007 499 Link *l = ASSERT_PTR(userdata);
d2ec6608
LP
500 ResolveSupport mode;
501 const char *llmnr;
502 int r;
503
504 assert(message);
d2ec6608 505
04b764bf
LP
506 r = verify_unmanaged_link(l, error);
507 if (r < 0)
508 return r;
509
d2ec6608
LP
510 r = sd_bus_message_read(message, "s", &llmnr);
511 if (r < 0)
512 return r;
513
514 if (isempty(llmnr))
515 mode = RESOLVE_SUPPORT_YES;
516 else {
517 mode = resolve_support_from_string(llmnr);
518 if (mode < 0)
519 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid LLMNR setting: %s", llmnr);
520 }
521
52aaef0f
ZJS
522 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
523 "org.freedesktop.resolve1.set-llmnr",
524 NULL, true, UID_INVALID,
525 &l->manager->polkit_registry, error);
526 if (r < 0)
527 return r;
528 if (r == 0)
529 return 1; /* Polkit will call us back */
530
1e69eadd
LP
531 bus_client_log(message, "LLMNR change");
532
cbf23f38
LP
533 if (l->llmnr_support != mode) {
534 l->llmnr_support = mode;
535 link_allocate_scopes(l);
536 link_add_rrs(l, false);
d2ec6608 537
cbf23f38 538 (void) link_save_user(l);
943ef07c 539
cbf23f38
LP
540 log_link_info(l, "Bus client set LLMNR setting: %s", resolve_support_to_string(mode));
541 }
0b261ac5 542
d2ec6608
LP
543 return sd_bus_reply_method_return(message, NULL);
544}
545
546int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error) {
99534007 547 Link *l = ASSERT_PTR(userdata);
d2ec6608
LP
548 ResolveSupport mode;
549 const char *mdns;
550 int r;
551
552 assert(message);
d2ec6608 553
04b764bf
LP
554 r = verify_unmanaged_link(l, error);
555 if (r < 0)
556 return r;
557
d2ec6608
LP
558 r = sd_bus_message_read(message, "s", &mdns);
559 if (r < 0)
560 return r;
561
562 if (isempty(mdns))
563 mode = RESOLVE_SUPPORT_NO;
564 else {
565 mode = resolve_support_from_string(mdns);
566 if (mode < 0)
567 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid MulticastDNS setting: %s", mdns);
568 }
569
52aaef0f
ZJS
570 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
571 "org.freedesktop.resolve1.set-mdns",
572 NULL, true, UID_INVALID,
573 &l->manager->polkit_registry, error);
574 if (r < 0)
575 return r;
576 if (r == 0)
577 return 1; /* Polkit will call us back */
578
1e69eadd
LP
579 bus_client_log(message, "mDNS change");
580
cbf23f38
LP
581 if (l->mdns_support != mode) {
582 l->mdns_support = mode;
583 link_allocate_scopes(l);
584 link_add_rrs(l, false);
d2ec6608 585
cbf23f38 586 (void) link_save_user(l);
943ef07c 587
cbf23f38
LP
588 log_link_info(l, "Bus client set MulticastDNS setting: %s", resolve_support_to_string(mode));
589 }
0b261ac5 590
d2ec6608
LP
591 return sd_bus_reply_method_return(message, NULL);
592}
593
c9299be2 594int bus_link_method_set_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error) {
99534007 595 Link *l = ASSERT_PTR(userdata);
c9299be2
IT
596 const char *dns_over_tls;
597 DnsOverTlsMode mode;
d050561a
IT
598 int r;
599
600 assert(message);
d050561a
IT
601
602 r = verify_unmanaged_link(l, error);
603 if (r < 0)
604 return r;
605
c9299be2 606 r = sd_bus_message_read(message, "s", &dns_over_tls);
d050561a
IT
607 if (r < 0)
608 return r;
609
c9299be2
IT
610 if (isempty(dns_over_tls))
611 mode = _DNS_OVER_TLS_MODE_INVALID;
d050561a 612 else {
c9299be2 613 mode = dns_over_tls_mode_from_string(dns_over_tls);
d050561a 614 if (mode < 0)
c9299be2 615 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSOverTLS setting: %s", dns_over_tls);
d050561a
IT
616 }
617
52aaef0f
ZJS
618 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
619 "org.freedesktop.resolve1.set-dns-over-tls",
620 NULL, true, UID_INVALID,
621 &l->manager->polkit_registry, error);
622 if (r < 0)
623 return r;
624 if (r == 0)
625 return 1; /* Polkit will call us back */
626
1e69eadd
LP
627 bus_client_log(message, "D-o-T change");
628
cbf23f38
LP
629 if (l->dns_over_tls_mode != mode) {
630 link_set_dns_over_tls_mode(l, mode);
16f74783 631 link_allocate_scopes(l);
d050561a 632
cbf23f38 633 (void) link_save_user(l);
d050561a 634
cbf23f38
LP
635 log_link_info(l, "Bus client set DNSOverTLS setting: %s",
636 mode < 0 ? "default" : dns_over_tls_mode_to_string(mode));
637 }
0b261ac5 638
d050561a
IT
639 return sd_bus_reply_method_return(message, NULL);
640}
641
d2ec6608 642int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) {
99534007 643 Link *l = ASSERT_PTR(userdata);
d2ec6608
LP
644 const char *dnssec;
645 DnssecMode mode;
646 int r;
647
648 assert(message);
d2ec6608 649
04b764bf
LP
650 r = verify_unmanaged_link(l, error);
651 if (r < 0)
652 return r;
653
d2ec6608
LP
654 r = sd_bus_message_read(message, "s", &dnssec);
655 if (r < 0)
656 return r;
657
658 if (isempty(dnssec))
659 mode = _DNSSEC_MODE_INVALID;
660 else {
661 mode = dnssec_mode_from_string(dnssec);
662 if (mode < 0)
663 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSSEC setting: %s", dnssec);
664 }
665
52aaef0f
ZJS
666 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
667 "org.freedesktop.resolve1.set-dnssec",
668 NULL, true, UID_INVALID,
669 &l->manager->polkit_registry, error);
670 if (r < 0)
671 return r;
672 if (r == 0)
673 return 1; /* Polkit will call us back */
674
1e69eadd
LP
675 bus_client_log(message, "DNSSEC change");
676
cbf23f38
LP
677 if (l->dnssec_mode != mode) {
678 link_set_dnssec_mode(l, mode);
16f74783 679 link_allocate_scopes(l);
d2ec6608 680
cbf23f38 681 (void) link_save_user(l);
943ef07c 682
cbf23f38
LP
683 log_link_info(l, "Bus client set DNSSEC setting: %s",
684 mode < 0 ? "default" : dnssec_mode_to_string(mode));
685 }
0b261ac5 686
d2ec6608
LP
687 return sd_bus_reply_method_return(message, NULL);
688}
689
690int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error) {
691 _cleanup_set_free_free_ Set *ns = NULL;
c6d92582 692 _cleanup_strv_free_ char **ntas = NULL;
0b261ac5 693 _cleanup_free_ char *j = NULL;
99534007 694 Link *l = ASSERT_PTR(userdata);
d2ec6608 695 int r;
d2ec6608
LP
696
697 assert(message);
d2ec6608 698
04b764bf
LP
699 r = verify_unmanaged_link(l, error);
700 if (r < 0)
701 return r;
702
ab77c879
ZJS
703 ns = set_new(&dns_name_hash_ops);
704 if (!ns)
705 return -ENOMEM;
706
d2ec6608
LP
707 r = sd_bus_message_read_strv(message, &ntas);
708 if (r < 0)
709 return r;
710
711 STRV_FOREACH(i, ntas) {
712 r = dns_name_is_valid(*i);
713 if (r < 0)
714 return r;
715 if (r == 0)
ab77c879
ZJS
716 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS,
717 "Invalid negative trust anchor domain: %s", *i);
d2ec6608 718
be327321 719 r = set_put_strdup(&ns, *i);
d2ec6608
LP
720 if (r < 0)
721 return r;
0b261ac5 722
c2bc710b 723 if (!strextend_with_separator(&j, ", ", *i))
0b261ac5 724 return -ENOMEM;
d2ec6608
LP
725 }
726
52aaef0f
ZJS
727 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
728 "org.freedesktop.resolve1.set-dnssec-negative-trust-anchors",
729 NULL, true, UID_INVALID,
730 &l->manager->polkit_registry, error);
731 if (r < 0)
732 return r;
733 if (r == 0)
734 return 1; /* Polkit will call us back */
735
1e69eadd
LP
736 bus_client_log(message, "DNSSEC NTA change");
737
cbf23f38
LP
738 if (!set_equal(ns, l->dnssec_negative_trust_anchors)) {
739 set_free_free(l->dnssec_negative_trust_anchors);
740 l->dnssec_negative_trust_anchors = TAKE_PTR(ns);
d2ec6608 741
cbf23f38 742 (void) link_save_user(l);
943ef07c 743
cbf23f38
LP
744 if (j)
745 log_link_info(l, "Bus client set NTA list to: %s", j);
746 else
747 log_link_info(l, "Bus client reset NTA list.");
748 }
0b261ac5 749
d2ec6608
LP
750 return sd_bus_reply_method_return(message, NULL);
751}
752
753int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error) {
99534007 754 Link *l = ASSERT_PTR(userdata);
04b764bf 755 int r;
d2ec6608
LP
756
757 assert(message);
d2ec6608 758
04b764bf
LP
759 r = verify_unmanaged_link(l, error);
760 if (r < 0)
761 return r;
762
52aaef0f
ZJS
763 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
764 "org.freedesktop.resolve1.revert",
765 NULL, true, UID_INVALID,
766 &l->manager->polkit_registry, error);
767 if (r < 0)
768 return r;
769 if (r == 0)
770 return 1; /* Polkit will call us back */
771
1e69eadd
LP
772 bus_client_log(message, "revert");
773
d2ec6608
LP
774 link_flush_settings(l);
775 link_allocate_scopes(l);
776 link_add_rrs(l, false);
777
943ef07c 778 (void) link_save_user(l);
7207052d 779 (void) manager_write_resolv_conf(l->manager);
5f3340ca 780 (void) manager_send_changed(l->manager, "DNS");
7207052d 781
d2ec6608
LP
782 return sd_bus_reply_method_return(message, NULL);
783}
784
8d128089 785static int link_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
3abaabda 786 _cleanup_free_ char *e = NULL;
99534007 787 Manager *m = ASSERT_PTR(userdata);
3abaabda 788 Link *link;
597da51b 789 int ifindex, r;
3abaabda
LP
790
791 assert(bus);
792 assert(path);
793 assert(interface);
794 assert(found);
3abaabda
LP
795
796 r = sd_bus_path_decode(path, "/org/freedesktop/resolve1/link", &e);
797 if (r <= 0)
798 return 0;
799
597da51b
ZJS
800 ifindex = parse_ifindex(e);
801 if (ifindex < 0)
3abaabda
LP
802 return 0;
803
804 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
805 if (!link)
806 return 0;
807
808 *found = link;
809 return 1;
810}
811
0a6c0745
ZJS
812char *link_bus_path(const Link *link) {
813 char *p, ifindex[DECIMAL_STR_MAX(link->ifindex)];
3abaabda
LP
814 int r;
815
816 assert(link);
817
0a6c0745 818 xsprintf(ifindex, "%i", link->ifindex);
3abaabda
LP
819
820 r = sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex, &p);
821 if (r < 0)
822 return NULL;
823
824 return p;
825}
826
8d128089 827static int link_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
3abaabda 828 _cleanup_strv_free_ char **l = NULL;
99534007 829 Manager *m = ASSERT_PTR(userdata);
3abaabda 830 Link *link;
3abaabda
LP
831 unsigned c = 0;
832
833 assert(bus);
834 assert(path);
3abaabda
LP
835 assert(nodes);
836
837 l = new0(char*, hashmap_size(m->links) + 1);
838 if (!l)
839 return -ENOMEM;
840
90e74a66 841 HASHMAP_FOREACH(link, m->links) {
3abaabda
LP
842 char *p;
843
844 p = link_bus_path(link);
845 if (!p)
846 return -ENOMEM;
847
848 l[c++] = p;
849 }
850
851 l[c] = NULL;
ae2a15bc 852 *nodes = TAKE_PTR(l);
3abaabda
LP
853
854 return 1;
855}
8d128089
ZJS
856
857static const sd_bus_vtable link_vtable[] = {
858 SD_BUS_VTABLE_START(0),
859
860 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask, 0, 0),
861 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns, 0, 0),
8e56ea4c 862 SD_BUS_PROPERTY("DNSEx", "a(iayqs)", property_get_dns_ex, 0, 0),
8d128089 863 SD_BUS_PROPERTY("CurrentDNSServer", "(iay)", property_get_current_dns_server, offsetof(Link, current_dns_server), 0),
8e56ea4c 864 SD_BUS_PROPERTY("CurrentDNSServerEx", "(iayqs)", property_get_current_dns_server_ex, offsetof(Link, current_dns_server), 0),
8d128089
ZJS
865 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0),
866 SD_BUS_PROPERTY("DefaultRoute", "b", property_get_default_route, 0, 0),
867 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support, offsetof(Link, llmnr_support), 0),
868 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support, offsetof(Link, mdns_support), 0),
869 SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode, 0, 0),
870 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, 0, 0),
871 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0),
872 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0),
873
ba5a389d
ZJS
874 SD_BUS_METHOD_WITH_ARGS("SetDNS",
875 SD_BUS_ARGS("a(iay)", addresses),
876 SD_BUS_NO_RESULT,
877 bus_link_method_set_dns_servers,
878 SD_BUS_VTABLE_UNPRIVILEGED),
95ce1ba8
YW
879 SD_BUS_METHOD_WITH_ARGS("SetDNSEx",
880 SD_BUS_ARGS("a(iayqs)", addresses),
881 SD_BUS_NO_RESULT,
882 bus_link_method_set_dns_servers_ex,
883 SD_BUS_VTABLE_UNPRIVILEGED),
ba5a389d
ZJS
884 SD_BUS_METHOD_WITH_ARGS("SetDomains",
885 SD_BUS_ARGS("a(sb)", domains),
886 SD_BUS_NO_RESULT,
887 bus_link_method_set_domains,
888 SD_BUS_VTABLE_UNPRIVILEGED),
889 SD_BUS_METHOD_WITH_ARGS("SetDefaultRoute",
890 SD_BUS_ARGS("b", enable),
891 SD_BUS_NO_RESULT,
892 bus_link_method_set_default_route,
893 SD_BUS_VTABLE_UNPRIVILEGED),
894 SD_BUS_METHOD_WITH_ARGS("SetLLMNR",
895 SD_BUS_ARGS("s", mode),
896 SD_BUS_NO_RESULT,
897 bus_link_method_set_llmnr,
898 SD_BUS_VTABLE_UNPRIVILEGED),
899 SD_BUS_METHOD_WITH_ARGS("SetMulticastDNS",
900 SD_BUS_ARGS("s", mode),
901 SD_BUS_NO_RESULT,
902 bus_link_method_set_mdns,
903 SD_BUS_VTABLE_UNPRIVILEGED),
904 SD_BUS_METHOD_WITH_ARGS("SetDNSOverTLS",
905 SD_BUS_ARGS("s", mode),
906 SD_BUS_NO_RESULT,
907 bus_link_method_set_dns_over_tls,
908 SD_BUS_VTABLE_UNPRIVILEGED),
909 SD_BUS_METHOD_WITH_ARGS("SetDNSSEC",
910 SD_BUS_ARGS("s", mode),
911 SD_BUS_NO_RESULT,
912 bus_link_method_set_dnssec,
913 SD_BUS_VTABLE_UNPRIVILEGED),
914 SD_BUS_METHOD_WITH_ARGS("SetDNSSECNegativeTrustAnchors",
915 SD_BUS_ARGS("as", names),
916 SD_BUS_NO_RESULT,
917 bus_link_method_set_dnssec_negative_trust_anchors,
918 SD_BUS_VTABLE_UNPRIVILEGED),
919 SD_BUS_METHOD_WITH_ARGS("Revert",
920 SD_BUS_NO_ARGS,
921 SD_BUS_NO_RESULT,
922 bus_link_method_revert,
923 SD_BUS_VTABLE_UNPRIVILEGED),
8d128089
ZJS
924
925 SD_BUS_VTABLE_END
926};
927
928const BusObjectImplementation link_object = {
929 "/org/freedesktop/resolve1/link",
930 "org.freedesktop.resolve1.Link",
931 .fallback_vtables = BUS_FALLBACK_VTABLES({link_vtable, link_object_find}),
932 .node_enumerator = link_node_enumerator,
933};