]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-link-bus.c
basic: add set_equal() helper
[thirdparty/systemd.git] / src / resolve / resolved-link-bus.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
3abaabda 2
6ff79f76 3#include <net/if.h>
52aaef0f
ZJS
4#include <netinet/in.h>
5#include <sys/capability.h>
6ff79f76 6
3abaabda 7#include "alloc-util.h"
04b764bf 8#include "bus-common-errors.h"
40af3d02 9#include "bus-get-properties.h"
10d46204 10#include "bus-message-util.h"
269e4d2d 11#include "bus-polkit.h"
0b261ac5 12#include "log-link.h"
3abaabda
LP
13#include "parse-util.h"
14#include "resolve-util.h"
15#include "resolved-bus.h"
16#include "resolved-link-bus.h"
7207052d 17#include "resolved-resolv-conf.h"
95ce1ba8 18#include "socket-netlink.h"
0a6c0745 19#include "stdio-util.h"
3abaabda 20#include "strv.h"
52aaef0f 21#include "user-util.h"
3abaabda 22
acd380c4
YW
23static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported, "b", Link, link_dnssec_supported);
24static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode, "s", Link, link_get_dnssec_mode, dnssec_mode_to_string);
3abaabda 25
c9299be2 26static int property_get_dns_over_tls_mode(
d050561a
IT
27 sd_bus *bus,
28 const char *path,
29 const char *interface,
30 const char *property,
31 sd_bus_message *reply,
32 void *userdata,
33 sd_bus_error *error) {
34
35 Link *l = userdata;
36
37 assert(reply);
38 assert(l);
39
c9299be2 40 return sd_bus_message_append(reply, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l)));
d050561a
IT
41}
42
8e56ea4c 43static int property_get_dns_internal(
3abaabda
LP
44 sd_bus *bus,
45 const char *path,
46 const char *interface,
47 const char *property,
48 sd_bus_message *reply,
49 void *userdata,
8e56ea4c
YW
50 sd_bus_error *error,
51 bool extended) {
3abaabda
LP
52
53 Link *l = userdata;
54 DnsServer *s;
55 int r;
56
57 assert(reply);
58 assert(l);
59
8e56ea4c 60 r = sd_bus_message_open_container(reply, 'a', extended ? "(iayqs)" : "(iay)");
3abaabda
LP
61 if (r < 0)
62 return r;
63
64 LIST_FOREACH(servers, s, l->dns_servers) {
8e56ea4c 65 r = bus_dns_server_append(reply, s, false, extended);
3abaabda
LP
66 if (r < 0)
67 return r;
68 }
69
70 return sd_bus_message_close_container(reply);
71}
72
8e56ea4c
YW
73static int property_get_dns(
74 sd_bus *bus,
75 const char *path,
76 const char *interface,
77 const char *property,
78 sd_bus_message *reply,
79 void *userdata,
80 sd_bus_error *error) {
81 return property_get_dns_internal(bus, path, interface, property, reply, userdata, error, false);
82}
83
84static int property_get_dns_ex(
b7ac92cd
YW
85 sd_bus *bus,
86 const char *path,
87 const char *interface,
88 const char *property,
89 sd_bus_message *reply,
90 void *userdata,
91 sd_bus_error *error) {
8e56ea4c
YW
92 return property_get_dns_internal(bus, path, interface, property, reply, userdata, error, true);
93}
94
95static int property_get_current_dns_server_internal(
96 sd_bus *bus,
97 const char *path,
98 const char *interface,
99 const char *property,
100 sd_bus_message *reply,
101 void *userdata,
102 sd_bus_error *error,
103 bool extended) {
b7ac92cd
YW
104
105 DnsServer *s;
106
107 assert(reply);
108 assert(userdata);
109
110 s = *(DnsServer **) userdata;
111
8e56ea4c
YW
112 return bus_dns_server_append(reply, s, false, extended);
113}
114
115static int property_get_current_dns_server(
116 sd_bus *bus,
117 const char *path,
118 const char *interface,
119 const char *property,
120 sd_bus_message *reply,
121 void *userdata,
122 sd_bus_error *error) {
123 return property_get_current_dns_server_internal(bus, path, interface, property, reply, userdata, error, false);
124}
125
126static int property_get_current_dns_server_ex(
127 sd_bus *bus,
128 const char *path,
129 const char *interface,
130 const char *property,
131 sd_bus_message *reply,
132 void *userdata,
133 sd_bus_error *error) {
134 return property_get_current_dns_server_internal(bus, path, interface, property, reply, userdata, error, true);
b7ac92cd
YW
135}
136
3abaabda
LP
137static int property_get_domains(
138 sd_bus *bus,
139 const char *path,
140 const char *interface,
141 const char *property,
142 sd_bus_message *reply,
143 void *userdata,
144 sd_bus_error *error) {
145
146 Link *l = userdata;
147 DnsSearchDomain *d;
148 int r;
149
150 assert(reply);
151 assert(l);
152
ad44b56b 153 r = sd_bus_message_open_container(reply, 'a', "(sb)");
3abaabda
LP
154 if (r < 0)
155 return r;
156
157 LIST_FOREACH(domains, d, l->search_domains) {
ad44b56b 158 r = sd_bus_message_append(reply, "(sb)", d->name, d->route_only);
3abaabda
LP
159 if (r < 0)
160 return r;
161 }
162
163 return sd_bus_message_close_container(reply);
164}
165
77673795
LP
166static int property_get_default_route(
167 sd_bus *bus,
168 const char *path,
169 const char *interface,
170 const char *property,
171 sd_bus_message *reply,
172 void *userdata,
173 sd_bus_error *error) {
174
175 Link *l = userdata;
176
177 assert(reply);
178 assert(l);
179
180 /* Return what is configured, if there's something configured */
181 if (l->default_route >= 0)
182 return sd_bus_message_append(reply, "b", l->default_route);
183
184 /* Otherwise report what is in effect */
185 if (l->unicast_scope)
186 return sd_bus_message_append(reply, "b", dns_scope_is_default_route(l->unicast_scope));
187
188 return sd_bus_message_append(reply, "b", false);
189}
190
3abaabda
LP
191static int property_get_scopes_mask(
192 sd_bus *bus,
193 const char *path,
194 const char *interface,
195 const char *property,
196 sd_bus_message *reply,
197 void *userdata,
198 sd_bus_error *error) {
199
200 Link *l = userdata;
201 uint64_t mask;
202
203 assert(reply);
204 assert(l);
205
206 mask = (l->unicast_scope ? SD_RESOLVED_DNS : 0) |
207 (l->llmnr_ipv4_scope ? SD_RESOLVED_LLMNR_IPV4 : 0) |
208 (l->llmnr_ipv6_scope ? SD_RESOLVED_LLMNR_IPV6 : 0) |
209 (l->mdns_ipv4_scope ? SD_RESOLVED_MDNS_IPV4 : 0) |
210 (l->mdns_ipv6_scope ? SD_RESOLVED_MDNS_IPV6 : 0);
211
212 return sd_bus_message_append(reply, "t", mask);
213}
214
215static int property_get_ntas(
216 sd_bus *bus,
217 const char *path,
218 const char *interface,
219 const char *property,
220 sd_bus_message *reply,
221 void *userdata,
222 sd_bus_error *error) {
223
224 Link *l = userdata;
225 const char *name;
3abaabda
LP
226 int r;
227
228 assert(reply);
229 assert(l);
230
231 r = sd_bus_message_open_container(reply, 'a', "s");
232 if (r < 0)
233 return r;
234
90e74a66 235 SET_FOREACH(name, l->dnssec_negative_trust_anchors) {
3abaabda
LP
236 r = sd_bus_message_append(reply, "s", name);
237 if (r < 0)
238 return r;
239 }
240
241 return sd_bus_message_close_container(reply);
242}
243
04b764bf
LP
244static int verify_unmanaged_link(Link *l, sd_bus_error *error) {
245 assert(l);
246
247 if (l->flags & IFF_LOOPBACK)
6ff79f76 248 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is loopback device.", l->ifname);
04b764bf 249 if (l->is_managed)
6ff79f76 250 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is managed.", l->ifname);
04b764bf
LP
251
252 return 0;
253}
254
95ce1ba8 255static int bus_link_method_set_dns_servers_internal(sd_bus_message *message, void *userdata, sd_bus_error *error, bool extended) {
0b261ac5 256 _cleanup_free_ char *j = NULL;
10d46204 257 struct in_addr_full **dns;
d2ec6608 258 Link *l = userdata;
10d46204 259 size_t n;
d2ec6608
LP
260 int r;
261
262 assert(message);
263 assert(l);
264
04b764bf
LP
265 r = verify_unmanaged_link(l, error);
266 if (r < 0)
267 return r;
268
10d46204 269 r = bus_message_read_dns_servers(message, error, extended, &dns, &n);
d2ec6608
LP
270 if (r < 0)
271 return r;
272
52aaef0f
ZJS
273 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
274 "org.freedesktop.resolve1.set-dns-servers",
275 NULL, true, UID_INVALID,
276 &l->manager->polkit_registry, error);
277 if (r < 0)
95ce1ba8
YW
278 goto finalize;
279 if (r == 0) {
280 r = 1; /* Polkit will call us back */
281 goto finalize;
282 }
52aaef0f 283
0b261ac5
LP
284 for (size_t i = 0; i < n; i++) {
285 const char *s;
286
287 s = in_addr_full_to_string(dns[i]);
288 if (!s) {
289 r = -ENOMEM;
290 goto finalize;
291 }
292
c2bc710b 293 if (!strextend_with_separator(&j, ", ", s)) {
0b261ac5
LP
294 r = -ENOMEM;
295 goto finalize;
296 }
297 }
298
1e69eadd
LP
299 bus_client_log(message, "DNS server change");
300
d2ec6608
LP
301 dns_server_mark_all(l->dns_servers);
302
95ce1ba8 303 for (size_t i = 0; i < n; i++) {
d2ec6608
LP
304 DnsServer *s;
305
95ce1ba8 306 s = dns_server_find(l->dns_servers, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
d2ec6608
LP
307 if (s)
308 dns_server_move_back_and_unmark(s);
309 else {
95ce1ba8
YW
310 r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
311 if (r < 0) {
312 dns_server_unlink_all(l->dns_servers);
313 goto finalize;
314 }
d2ec6608
LP
315 }
316
317 }
318
319 dns_server_unlink_marked(l->dns_servers);
320 link_allocate_scopes(l);
321
943ef07c 322 (void) link_save_user(l);
7207052d 323 (void) manager_write_resolv_conf(l->manager);
5f3340ca 324 (void) manager_send_changed(l->manager, "DNS");
7207052d 325
0b261ac5
LP
326 if (j)
327 log_link_info(l, "Bus client set DNS server list to: %s", j);
328 else
329 log_link_info(l, "Bus client reset DNS server list.");
330
95ce1ba8
YW
331 r = sd_bus_reply_method_return(message, NULL);
332
333finalize:
334 for (size_t i = 0; i < n; i++)
335 in_addr_full_free(dns[i]);
336 free(dns);
d2ec6608 337
d2ec6608
LP
338 return r;
339}
340
95ce1ba8
YW
341int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_bus_error *error) {
342 return bus_link_method_set_dns_servers_internal(message, userdata, error, false);
343}
344
345int bus_link_method_set_dns_servers_ex(sd_bus_message *message, void *userdata, sd_bus_error *error) {
346 return bus_link_method_set_dns_servers_internal(message, userdata, error, true);
347}
348
ee116b54 349int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error) {
0b261ac5 350 _cleanup_free_ char *j = NULL;
d2ec6608 351 Link *l = userdata;
d2ec6608
LP
352 int r;
353
354 assert(message);
355 assert(l);
356
04b764bf
LP
357 r = verify_unmanaged_link(l, error);
358 if (r < 0)
359 return r;
360
ad44b56b 361 r = sd_bus_message_enter_container(message, 'a', "(sb)");
d2ec6608
LP
362 if (r < 0)
363 return r;
364
ad44b56b 365 for (;;) {
0b261ac5 366 _cleanup_free_ char *prefixed = NULL;
ad44b56b
LP
367 const char *name;
368 int route_only;
d2ec6608 369
ad44b56b 370 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
d2ec6608
LP
371 if (r < 0)
372 return r;
373 if (r == 0)
ad44b56b
LP
374 break;
375
376 r = dns_name_is_valid(name);
377 if (r < 0)
378 return r;
379 if (r == 0)
380 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid search domain %s", name);
381 if (!route_only && dns_name_is_root(name))
d2ec6608 382 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Root domain is not suitable as search domain");
0b261ac5
LP
383
384 if (route_only) {
385 prefixed = strjoin("~", name);
386 if (!prefixed)
387 return -ENOMEM;
388
389 name = prefixed;
390 }
391
c2bc710b 392 if (!strextend_with_separator(&j, ", ", name))
0b261ac5 393 return -ENOMEM;
d2ec6608
LP
394 }
395
ad44b56b
LP
396 r = sd_bus_message_rewind(message, false);
397 if (r < 0)
398 return r;
399
52aaef0f
ZJS
400 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
401 "org.freedesktop.resolve1.set-domains",
402 NULL, true, UID_INVALID,
403 &l->manager->polkit_registry, error);
404 if (r < 0)
405 return r;
406 if (r == 0)
407 return 1; /* Polkit will call us back */
408
1e69eadd
LP
409 bus_client_log(message, "dns domains change");
410
52aaef0f
ZJS
411 dns_search_domain_mark_all(l->search_domains);
412
ad44b56b 413 for (;;) {
d2ec6608 414 DnsSearchDomain *d;
ad44b56b
LP
415 const char *name;
416 int route_only;
d2ec6608 417
ad44b56b
LP
418 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
419 if (r < 0)
420 goto clear;
421 if (r == 0)
422 break;
423
424 r = dns_search_domain_find(l->search_domains, name, &d);
d2ec6608
LP
425 if (r < 0)
426 goto clear;
427
428 if (r > 0)
429 dns_search_domain_move_back_and_unmark(d);
430 else {
ad44b56b 431 r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name);
d2ec6608
LP
432 if (r < 0)
433 goto clear;
434 }
ad44b56b
LP
435
436 d->route_only = route_only;
d2ec6608
LP
437 }
438
ad44b56b
LP
439 r = sd_bus_message_exit_container(message);
440 if (r < 0)
441 goto clear;
442
d2ec6608 443 dns_search_domain_unlink_marked(l->search_domains);
7207052d 444
943ef07c 445 (void) link_save_user(l);
7207052d
LP
446 (void) manager_write_resolv_conf(l->manager);
447
0b261ac5
LP
448 if (j)
449 log_link_info(l, "Bus client set search domain list to: %s", j);
450 else
451 log_link_info(l, "Bus client reset search domain list.");
452
d2ec6608
LP
453 return sd_bus_reply_method_return(message, NULL);
454
455clear:
456 dns_search_domain_unlink_all(l->search_domains);
457 return r;
458}
459
77673795
LP
460int bus_link_method_set_default_route(sd_bus_message *message, void *userdata, sd_bus_error *error) {
461 Link *l = userdata;
462 int r, b;
463
464 assert(message);
465 assert(l);
466
467 r = verify_unmanaged_link(l, error);
468 if (r < 0)
469 return r;
470
471 r = sd_bus_message_read(message, "b", &b);
472 if (r < 0)
473 return r;
474
52aaef0f
ZJS
475 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
476 "org.freedesktop.resolve1.set-default-route",
477 NULL, true, UID_INVALID,
478 &l->manager->polkit_registry, error);
479 if (r < 0)
480 return r;
481 if (r == 0)
482 return 1; /* Polkit will call us back */
483
1e69eadd
LP
484 bus_client_log(message, "dns default route change");
485
77673795
LP
486 if (l->default_route != b) {
487 l->default_route = b;
488
489 (void) link_save_user(l);
490 (void) manager_write_resolv_conf(l->manager);
491 }
492
0b261ac5
LP
493 log_link_info(l, "Bus client set default route setting: %s", yes_no(b));
494
77673795
LP
495 return sd_bus_reply_method_return(message, NULL);
496}
497
d2ec6608
LP
498int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error) {
499 Link *l = userdata;
500 ResolveSupport mode;
501 const char *llmnr;
502 int r;
503
504 assert(message);
505 assert(l);
506
04b764bf
LP
507 r = verify_unmanaged_link(l, error);
508 if (r < 0)
509 return r;
510
d2ec6608
LP
511 r = sd_bus_message_read(message, "s", &llmnr);
512 if (r < 0)
513 return r;
514
515 if (isempty(llmnr))
516 mode = RESOLVE_SUPPORT_YES;
517 else {
518 mode = resolve_support_from_string(llmnr);
519 if (mode < 0)
520 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid LLMNR setting: %s", llmnr);
521 }
522
52aaef0f
ZJS
523 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
524 "org.freedesktop.resolve1.set-llmnr",
525 NULL, true, UID_INVALID,
526 &l->manager->polkit_registry, error);
527 if (r < 0)
528 return r;
529 if (r == 0)
530 return 1; /* Polkit will call us back */
531
1e69eadd
LP
532 bus_client_log(message, "LLMNR change");
533
d2ec6608
LP
534 l->llmnr_support = mode;
535 link_allocate_scopes(l);
536 link_add_rrs(l, false);
537
943ef07c
LP
538 (void) link_save_user(l);
539
0b261ac5
LP
540 log_link_info(l, "Bus client set LLMNR setting: %s", resolve_support_to_string(mode));
541
d2ec6608
LP
542 return sd_bus_reply_method_return(message, NULL);
543}
544
545int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error) {
546 Link *l = userdata;
547 ResolveSupport mode;
548 const char *mdns;
549 int r;
550
551 assert(message);
552 assert(l);
553
04b764bf
LP
554 r = verify_unmanaged_link(l, error);
555 if (r < 0)
556 return r;
557
d2ec6608
LP
558 r = sd_bus_message_read(message, "s", &mdns);
559 if (r < 0)
560 return r;
561
562 if (isempty(mdns))
563 mode = RESOLVE_SUPPORT_NO;
564 else {
565 mode = resolve_support_from_string(mdns);
566 if (mode < 0)
567 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid MulticastDNS setting: %s", mdns);
568 }
569
52aaef0f
ZJS
570 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
571 "org.freedesktop.resolve1.set-mdns",
572 NULL, true, UID_INVALID,
573 &l->manager->polkit_registry, error);
574 if (r < 0)
575 return r;
576 if (r == 0)
577 return 1; /* Polkit will call us back */
578
1e69eadd
LP
579 bus_client_log(message, "mDNS change");
580
d2ec6608
LP
581 l->mdns_support = mode;
582 link_allocate_scopes(l);
583 link_add_rrs(l, false);
584
943ef07c
LP
585 (void) link_save_user(l);
586
0b261ac5
LP
587 log_link_info(l, "Bus client set MulticastDNS setting: %s", resolve_support_to_string(mode));
588
d2ec6608
LP
589 return sd_bus_reply_method_return(message, NULL);
590}
591
c9299be2 592int bus_link_method_set_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d050561a 593 Link *l = userdata;
c9299be2
IT
594 const char *dns_over_tls;
595 DnsOverTlsMode mode;
d050561a
IT
596 int r;
597
598 assert(message);
599 assert(l);
600
601 r = verify_unmanaged_link(l, error);
602 if (r < 0)
603 return r;
604
c9299be2 605 r = sd_bus_message_read(message, "s", &dns_over_tls);
d050561a
IT
606 if (r < 0)
607 return r;
608
c9299be2
IT
609 if (isempty(dns_over_tls))
610 mode = _DNS_OVER_TLS_MODE_INVALID;
d050561a 611 else {
c9299be2 612 mode = dns_over_tls_mode_from_string(dns_over_tls);
d050561a 613 if (mode < 0)
c9299be2 614 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSOverTLS setting: %s", dns_over_tls);
d050561a
IT
615 }
616
52aaef0f
ZJS
617 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
618 "org.freedesktop.resolve1.set-dns-over-tls",
619 NULL, true, UID_INVALID,
620 &l->manager->polkit_registry, error);
621 if (r < 0)
622 return r;
623 if (r == 0)
624 return 1; /* Polkit will call us back */
625
1e69eadd
LP
626 bus_client_log(message, "D-o-T change");
627
c9299be2 628 link_set_dns_over_tls_mode(l, mode);
d050561a
IT
629
630 (void) link_save_user(l);
631
0b261ac5
LP
632 log_link_info(l, "Bus client set DNSOverTLS setting: %s",
633 mode < 0 ? "default" : dns_over_tls_mode_to_string(mode));
634
d050561a
IT
635 return sd_bus_reply_method_return(message, NULL);
636}
637
d2ec6608
LP
638int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) {
639 Link *l = userdata;
640 const char *dnssec;
641 DnssecMode mode;
642 int r;
643
644 assert(message);
645 assert(l);
646
04b764bf
LP
647 r = verify_unmanaged_link(l, error);
648 if (r < 0)
649 return r;
650
d2ec6608
LP
651 r = sd_bus_message_read(message, "s", &dnssec);
652 if (r < 0)
653 return r;
654
655 if (isempty(dnssec))
656 mode = _DNSSEC_MODE_INVALID;
657 else {
658 mode = dnssec_mode_from_string(dnssec);
659 if (mode < 0)
660 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSSEC setting: %s", dnssec);
661 }
662
52aaef0f
ZJS
663 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
664 "org.freedesktop.resolve1.set-dnssec",
665 NULL, true, UID_INVALID,
666 &l->manager->polkit_registry, error);
667 if (r < 0)
668 return r;
669 if (r == 0)
670 return 1; /* Polkit will call us back */
671
1e69eadd
LP
672 bus_client_log(message, "DNSSEC change");
673
d2ec6608
LP
674 link_set_dnssec_mode(l, mode);
675
943ef07c
LP
676 (void) link_save_user(l);
677
0b261ac5
LP
678 log_link_info(l, "Bus client set DNSSEC setting: %s",
679 mode < 0 ? "default" : dnssec_mode_to_string(mode));
680
d2ec6608
LP
681 return sd_bus_reply_method_return(message, NULL);
682}
683
684int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error) {
685 _cleanup_set_free_free_ Set *ns = NULL;
c6d92582 686 _cleanup_strv_free_ char **ntas = NULL;
0b261ac5 687 _cleanup_free_ char *j = NULL;
d2ec6608
LP
688 Link *l = userdata;
689 int r;
690 char **i;
691
692 assert(message);
693 assert(l);
694
04b764bf
LP
695 r = verify_unmanaged_link(l, error);
696 if (r < 0)
697 return r;
698
ab77c879
ZJS
699 ns = set_new(&dns_name_hash_ops);
700 if (!ns)
701 return -ENOMEM;
702
d2ec6608
LP
703 r = sd_bus_message_read_strv(message, &ntas);
704 if (r < 0)
705 return r;
706
707 STRV_FOREACH(i, ntas) {
708 r = dns_name_is_valid(*i);
709 if (r < 0)
710 return r;
711 if (r == 0)
ab77c879
ZJS
712 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS,
713 "Invalid negative trust anchor domain: %s", *i);
d2ec6608 714
be327321 715 r = set_put_strdup(&ns, *i);
d2ec6608
LP
716 if (r < 0)
717 return r;
0b261ac5 718
c2bc710b 719 if (!strextend_with_separator(&j, ", ", *i))
0b261ac5 720 return -ENOMEM;
d2ec6608
LP
721 }
722
52aaef0f
ZJS
723 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
724 "org.freedesktop.resolve1.set-dnssec-negative-trust-anchors",
725 NULL, true, UID_INVALID,
726 &l->manager->polkit_registry, error);
727 if (r < 0)
728 return r;
729 if (r == 0)
730 return 1; /* Polkit will call us back */
731
1e69eadd
LP
732 bus_client_log(message, "DNSSEC NTA change");
733
d2ec6608 734 set_free_free(l->dnssec_negative_trust_anchors);
ae2a15bc 735 l->dnssec_negative_trust_anchors = TAKE_PTR(ns);
d2ec6608 736
943ef07c
LP
737 (void) link_save_user(l);
738
0b261ac5
LP
739 if (j)
740 log_link_info(l, "Bus client set NTA list to: %s", j);
741 else
742 log_link_info(l, "Bus client reset NTA list.");
743
d2ec6608
LP
744 return sd_bus_reply_method_return(message, NULL);
745}
746
747int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error) {
748 Link *l = userdata;
04b764bf 749 int r;
d2ec6608
LP
750
751 assert(message);
752 assert(l);
753
04b764bf
LP
754 r = verify_unmanaged_link(l, error);
755 if (r < 0)
756 return r;
757
52aaef0f
ZJS
758 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
759 "org.freedesktop.resolve1.revert",
760 NULL, true, UID_INVALID,
761 &l->manager->polkit_registry, error);
762 if (r < 0)
763 return r;
764 if (r == 0)
765 return 1; /* Polkit will call us back */
766
1e69eadd
LP
767 bus_client_log(message, "revert");
768
d2ec6608
LP
769 link_flush_settings(l);
770 link_allocate_scopes(l);
771 link_add_rrs(l, false);
772
943ef07c 773 (void) link_save_user(l);
7207052d 774 (void) manager_write_resolv_conf(l->manager);
5f3340ca 775 (void) manager_send_changed(l->manager, "DNS");
7207052d 776
d2ec6608
LP
777 return sd_bus_reply_method_return(message, NULL);
778}
779
8d128089 780static int link_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
3abaabda
LP
781 _cleanup_free_ char *e = NULL;
782 Manager *m = userdata;
3abaabda 783 Link *link;
597da51b 784 int ifindex, r;
3abaabda
LP
785
786 assert(bus);
787 assert(path);
788 assert(interface);
789 assert(found);
790 assert(m);
791
792 r = sd_bus_path_decode(path, "/org/freedesktop/resolve1/link", &e);
793 if (r <= 0)
794 return 0;
795
597da51b
ZJS
796 ifindex = parse_ifindex(e);
797 if (ifindex < 0)
3abaabda
LP
798 return 0;
799
800 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
801 if (!link)
802 return 0;
803
804 *found = link;
805 return 1;
806}
807
0a6c0745
ZJS
808char *link_bus_path(const Link *link) {
809 char *p, ifindex[DECIMAL_STR_MAX(link->ifindex)];
3abaabda
LP
810 int r;
811
812 assert(link);
813
0a6c0745 814 xsprintf(ifindex, "%i", link->ifindex);
3abaabda
LP
815
816 r = sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex, &p);
817 if (r < 0)
818 return NULL;
819
820 return p;
821}
822
8d128089 823static int link_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
3abaabda
LP
824 _cleanup_strv_free_ char **l = NULL;
825 Manager *m = userdata;
826 Link *link;
3abaabda
LP
827 unsigned c = 0;
828
829 assert(bus);
830 assert(path);
831 assert(m);
832 assert(nodes);
833
834 l = new0(char*, hashmap_size(m->links) + 1);
835 if (!l)
836 return -ENOMEM;
837
90e74a66 838 HASHMAP_FOREACH(link, m->links) {
3abaabda
LP
839 char *p;
840
841 p = link_bus_path(link);
842 if (!p)
843 return -ENOMEM;
844
845 l[c++] = p;
846 }
847
848 l[c] = NULL;
ae2a15bc 849 *nodes = TAKE_PTR(l);
3abaabda
LP
850
851 return 1;
852}
8d128089
ZJS
853
854static const sd_bus_vtable link_vtable[] = {
855 SD_BUS_VTABLE_START(0),
856
857 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask, 0, 0),
858 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns, 0, 0),
8e56ea4c 859 SD_BUS_PROPERTY("DNSEx", "a(iayqs)", property_get_dns_ex, 0, 0),
8d128089 860 SD_BUS_PROPERTY("CurrentDNSServer", "(iay)", property_get_current_dns_server, offsetof(Link, current_dns_server), 0),
8e56ea4c 861 SD_BUS_PROPERTY("CurrentDNSServerEx", "(iayqs)", property_get_current_dns_server_ex, offsetof(Link, current_dns_server), 0),
8d128089
ZJS
862 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0),
863 SD_BUS_PROPERTY("DefaultRoute", "b", property_get_default_route, 0, 0),
864 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support, offsetof(Link, llmnr_support), 0),
865 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support, offsetof(Link, mdns_support), 0),
866 SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode, 0, 0),
867 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, 0, 0),
868 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0),
869 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0),
870
ba5a389d
ZJS
871 SD_BUS_METHOD_WITH_ARGS("SetDNS",
872 SD_BUS_ARGS("a(iay)", addresses),
873 SD_BUS_NO_RESULT,
874 bus_link_method_set_dns_servers,
875 SD_BUS_VTABLE_UNPRIVILEGED),
95ce1ba8
YW
876 SD_BUS_METHOD_WITH_ARGS("SetDNSEx",
877 SD_BUS_ARGS("a(iayqs)", addresses),
878 SD_BUS_NO_RESULT,
879 bus_link_method_set_dns_servers_ex,
880 SD_BUS_VTABLE_UNPRIVILEGED),
ba5a389d
ZJS
881 SD_BUS_METHOD_WITH_ARGS("SetDomains",
882 SD_BUS_ARGS("a(sb)", domains),
883 SD_BUS_NO_RESULT,
884 bus_link_method_set_domains,
885 SD_BUS_VTABLE_UNPRIVILEGED),
886 SD_BUS_METHOD_WITH_ARGS("SetDefaultRoute",
887 SD_BUS_ARGS("b", enable),
888 SD_BUS_NO_RESULT,
889 bus_link_method_set_default_route,
890 SD_BUS_VTABLE_UNPRIVILEGED),
891 SD_BUS_METHOD_WITH_ARGS("SetLLMNR",
892 SD_BUS_ARGS("s", mode),
893 SD_BUS_NO_RESULT,
894 bus_link_method_set_llmnr,
895 SD_BUS_VTABLE_UNPRIVILEGED),
896 SD_BUS_METHOD_WITH_ARGS("SetMulticastDNS",
897 SD_BUS_ARGS("s", mode),
898 SD_BUS_NO_RESULT,
899 bus_link_method_set_mdns,
900 SD_BUS_VTABLE_UNPRIVILEGED),
901 SD_BUS_METHOD_WITH_ARGS("SetDNSOverTLS",
902 SD_BUS_ARGS("s", mode),
903 SD_BUS_NO_RESULT,
904 bus_link_method_set_dns_over_tls,
905 SD_BUS_VTABLE_UNPRIVILEGED),
906 SD_BUS_METHOD_WITH_ARGS("SetDNSSEC",
907 SD_BUS_ARGS("s", mode),
908 SD_BUS_NO_RESULT,
909 bus_link_method_set_dnssec,
910 SD_BUS_VTABLE_UNPRIVILEGED),
911 SD_BUS_METHOD_WITH_ARGS("SetDNSSECNegativeTrustAnchors",
912 SD_BUS_ARGS("as", names),
913 SD_BUS_NO_RESULT,
914 bus_link_method_set_dnssec_negative_trust_anchors,
915 SD_BUS_VTABLE_UNPRIVILEGED),
916 SD_BUS_METHOD_WITH_ARGS("Revert",
917 SD_BUS_NO_ARGS,
918 SD_BUS_NO_RESULT,
919 bus_link_method_revert,
920 SD_BUS_VTABLE_UNPRIVILEGED),
8d128089
ZJS
921
922 SD_BUS_VTABLE_END
923};
924
925const BusObjectImplementation link_object = {
926 "/org/freedesktop/resolve1/link",
927 "org.freedesktop.resolve1.Link",
928 .fallback_vtables = BUS_FALLBACK_VTABLES({link_vtable, link_object_find}),
929 .node_enumerator = link_node_enumerator,
930};