1 /* SPDX-License-Identifier: LGPL-2.1+ */
4 #include <netinet/in.h>
5 #include <sys/capability.h>
7 #include "alloc-util.h"
8 #include "bus-common-errors.h"
10 #include "dns-domain.h"
11 #include "networkd-link-bus.h"
12 #include "networkd-link.h"
13 #include "networkd-manager.h"
14 #include "parse-util.h"
15 #include "resolve-util.h"
17 #include "user-util.h"
19 BUS_DEFINE_PROPERTY_GET_ENUM(property_get_operational_state
, link_operstate
, LinkOperationalState
);
20 BUS_DEFINE_PROPERTY_GET_ENUM(property_get_carrier_state
, link_carrier_state
, LinkCarrierState
);
21 BUS_DEFINE_PROPERTY_GET_ENUM(property_get_address_state
, link_address_state
, LinkAddressState
);
22 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_administrative_state
, link_state
, LinkState
);
24 static int property_get_bit_rates(
27 const char *interface
,
29 sd_bus_message
*reply
,
31 sd_bus_error
*error
) {
33 Link
*link
= userdata
;
42 manager
= link
->manager
;
44 if (!manager
->use_speed_meter
||
45 manager
->speed_meter_usec_old
== 0 ||
47 return sd_bus_message_append(reply
, "(tt)", UINT64_MAX
, UINT64_MAX
);
49 assert(manager
->speed_meter_usec_new
> manager
->speed_meter_usec_old
);
50 interval_sec
= (manager
->speed_meter_usec_new
- manager
->speed_meter_usec_old
) / USEC_PER_SEC
;
52 if (link
->stats_new
.tx_bytes
> link
->stats_old
.tx_bytes
)
53 tx
= (uint64_t) ((link
->stats_new
.tx_bytes
- link
->stats_old
.tx_bytes
) / interval_sec
);
55 tx
= (uint64_t) ((UINT64_MAX
- (link
->stats_old
.tx_bytes
- link
->stats_new
.tx_bytes
)) / interval_sec
);
57 if (link
->stats_new
.rx_bytes
> link
->stats_old
.rx_bytes
)
58 rx
= (uint64_t) ((link
->stats_new
.rx_bytes
- link
->stats_old
.rx_bytes
) / interval_sec
);
60 rx
= (uint64_t) ((UINT64_MAX
- (link
->stats_old
.rx_bytes
- link
->stats_new
.rx_bytes
)) / interval_sec
);
62 return sd_bus_message_append(reply
, "(tt)", tx
, rx
);
65 static int verify_managed_link(Link
*l
, sd_bus_error
*error
) {
68 if (l
->flags
& IFF_LOOPBACK
)
69 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is loopback device.", l
->ifname
);
74 int bus_link_method_set_ntp_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
75 _cleanup_strv_free_
char **ntp
= NULL
;
83 r
= verify_managed_link(l
, error
);
87 r
= sd_bus_message_read_strv(message
, &ntp
);
91 STRV_FOREACH(i
, ntp
) {
92 r
= dns_name_is_valid_or_address(*i
);
96 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid NTP server: %s", *i
);
99 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
100 "org.freedesktop.network1.set-ntp-servers",
101 NULL
, true, UID_INVALID
,
102 &l
->manager
->polkit_registry
, error
);
106 return 1; /* Polkit will call us back */
108 strv_free_and_replace(l
->ntp
, ntp
);
110 (void) link_dirty(l
);
112 return sd_bus_reply_method_return(message
, NULL
);
115 int bus_link_method_set_dns_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
116 _cleanup_free_
struct in_addr_data
*dns
= NULL
;
117 size_t allocated
= 0, n
= 0;
124 r
= verify_managed_link(l
, error
);
128 r
= sd_bus_message_enter_container(message
, 'a', "(iay)");
137 assert_cc(sizeof(int) == sizeof(int32_t));
139 r
= sd_bus_message_enter_container(message
, 'r', "iay");
145 r
= sd_bus_message_read(message
, "i", &family
);
149 if (!IN_SET(family
, AF_INET
, AF_INET6
))
150 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown address family %i", family
);
152 r
= sd_bus_message_read_array(message
, 'y', &d
, &sz
);
155 if (sz
!= FAMILY_ADDRESS_SIZE(family
))
156 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid address size");
158 if (!dns_server_address_valid(family
, d
))
159 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNS server address");
161 r
= sd_bus_message_exit_container(message
);
165 if (!GREEDY_REALLOC(dns
, allocated
, n
+1))
168 dns
[n
].family
= family
;
169 memcpy(&dns
[n
].address
, d
, sz
);
173 r
= sd_bus_message_exit_container(message
);
177 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
178 "org.freedesktop.network1.set-dns-servers",
179 NULL
, true, UID_INVALID
,
180 &l
->manager
->polkit_registry
, error
);
184 return 1; /* Polkit will call us back */
186 free_and_replace(l
->dns
, dns
);
189 (void) link_dirty(l
);
191 return sd_bus_reply_method_return(message
, NULL
);
194 int bus_link_method_set_domains(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
195 _cleanup_(ordered_set_freep
) OrderedSet
*search_domains
= NULL
, *route_domains
= NULL
;
202 r
= verify_managed_link(l
, error
);
206 r
= sd_bus_message_enter_container(message
, 'a', "(sb)");
211 _cleanup_free_
char *str
= NULL
;
212 OrderedSet
**domains
;
216 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
222 r
= dns_name_is_valid(name
);
226 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid search domain %s", name
);
227 if (!route_only
&& dns_name_is_root(name
))
228 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Root domain is not suitable as search domain");
230 r
= dns_name_normalize(name
, 0, &str
);
232 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid search domain %s", name
);
234 domains
= route_only
? &route_domains
: &search_domains
;
235 r
= ordered_set_ensure_allocated(domains
, &string_hash_ops
);
239 r
= ordered_set_put(*domains
, str
);
246 r
= sd_bus_message_exit_container(message
);
250 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
251 "org.freedesktop.network1.set-domains",
252 NULL
, true, UID_INVALID
,
253 &l
->manager
->polkit_registry
, error
);
257 return 1; /* Polkit will call us back */
259 ordered_set_free_free(l
->search_domains
);
260 ordered_set_free_free(l
->route_domains
);
261 l
->search_domains
= TAKE_PTR(search_domains
);
262 l
->route_domains
= TAKE_PTR(route_domains
);
264 (void) link_dirty(l
);
266 return sd_bus_reply_method_return(message
, NULL
);
269 int bus_link_method_set_default_route(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
276 r
= verify_managed_link(l
, error
);
280 r
= sd_bus_message_read(message
, "b", &b
);
284 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
285 "org.freedesktop.network1.set-default-route",
286 NULL
, true, UID_INVALID
,
287 &l
->manager
->polkit_registry
, error
);
291 return 1; /* Polkit will call us back */
293 if (l
->dns_default_route
!= b
) {
294 l
->dns_default_route
= b
;
295 (void) link_dirty(l
);
298 return sd_bus_reply_method_return(message
, NULL
);
301 int bus_link_method_set_llmnr(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
310 r
= verify_managed_link(l
, error
);
314 r
= sd_bus_message_read(message
, "s", &llmnr
);
319 mode
= RESOLVE_SUPPORT_YES
;
321 mode
= resolve_support_from_string(llmnr
);
323 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid LLMNR setting: %s", llmnr
);
326 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
327 "org.freedesktop.network1.set-llmnr",
328 NULL
, true, UID_INVALID
,
329 &l
->manager
->polkit_registry
, error
);
333 return 1; /* Polkit will call us back */
335 if (l
->llmnr
!= mode
) {
337 (void) link_dirty(l
);
340 return sd_bus_reply_method_return(message
, NULL
);
343 int bus_link_method_set_mdns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
352 r
= verify_managed_link(l
, error
);
356 r
= sd_bus_message_read(message
, "s", &mdns
);
361 mode
= RESOLVE_SUPPORT_NO
;
363 mode
= resolve_support_from_string(mdns
);
365 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid MulticastDNS setting: %s", mdns
);
368 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
369 "org.freedesktop.network1.set-mdns",
370 NULL
, true, UID_INVALID
,
371 &l
->manager
->polkit_registry
, error
);
375 return 1; /* Polkit will call us back */
377 if (l
->mdns
!= mode
) {
379 (void) link_dirty(l
);
382 return sd_bus_reply_method_return(message
, NULL
);
385 int bus_link_method_set_dns_over_tls(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
387 const char *dns_over_tls
;
394 r
= verify_managed_link(l
, error
);
398 r
= sd_bus_message_read(message
, "s", &dns_over_tls
);
402 if (isempty(dns_over_tls
))
403 mode
= _DNS_OVER_TLS_MODE_INVALID
;
405 mode
= dns_over_tls_mode_from_string(dns_over_tls
);
407 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSOverTLS setting: %s", dns_over_tls
);
410 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
411 "org.freedesktop.network1.set-dns-over-tls",
412 NULL
, true, UID_INVALID
,
413 &l
->manager
->polkit_registry
, error
);
417 return 1; /* Polkit will call us back */
419 if (l
->dns_over_tls_mode
!= mode
) {
420 l
->dns_over_tls_mode
= mode
;
421 (void) link_dirty(l
);
424 return sd_bus_reply_method_return(message
, NULL
);
427 int bus_link_method_set_dnssec(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
436 r
= verify_managed_link(l
, error
);
440 r
= sd_bus_message_read(message
, "s", &dnssec
);
445 mode
= _DNSSEC_MODE_INVALID
;
447 mode
= dnssec_mode_from_string(dnssec
);
449 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSSEC setting: %s", dnssec
);
452 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
453 "org.freedesktop.network1.set-dnssec",
454 NULL
, true, UID_INVALID
,
455 &l
->manager
->polkit_registry
, error
);
459 return 1; /* Polkit will call us back */
461 if (l
->dnssec_mode
!= mode
) {
462 l
->dnssec_mode
= mode
;
463 (void) link_dirty(l
);
466 return sd_bus_reply_method_return(message
, NULL
);
469 int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
470 _cleanup_set_free_free_ Set
*ns
= NULL
;
471 _cleanup_strv_free_
char **ntas
= NULL
;
479 r
= verify_managed_link(l
, error
);
483 r
= sd_bus_message_read_strv(message
, &ntas
);
487 STRV_FOREACH(i
, ntas
) {
488 r
= dns_name_is_valid(*i
);
492 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid negative trust anchor domain: %s", *i
);
495 ns
= set_new(&dns_name_hash_ops
);
499 STRV_FOREACH(i
, ntas
) {
500 r
= set_put_strdup(ns
, *i
);
505 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
506 "org.freedesktop.network1.set-dnssec-negative-trust-anchors",
507 NULL
, true, UID_INVALID
,
508 &l
->manager
->polkit_registry
, error
);
512 return 1; /* Polkit will call us back */
514 set_free_free(l
->dnssec_negative_trust_anchors
);
515 l
->dnssec_negative_trust_anchors
= TAKE_PTR(ns
);
517 (void) link_dirty(l
);
519 return sd_bus_reply_method_return(message
, NULL
);
522 int bus_link_method_revert_ntp(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
529 r
= verify_managed_link(l
, error
);
533 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
534 "org.freedesktop.network1.revert-ntp",
535 NULL
, true, UID_INVALID
,
536 &l
->manager
->polkit_registry
, error
);
540 return 1; /* Polkit will call us back */
542 link_ntp_settings_clear(l
);
543 (void) link_dirty(l
);
545 return sd_bus_reply_method_return(message
, NULL
);
548 int bus_link_method_revert_dns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
555 r
= verify_managed_link(l
, error
);
559 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
560 "org.freedesktop.network1.revert-dns",
561 NULL
, true, UID_INVALID
,
562 &l
->manager
->polkit_registry
, error
);
566 return 1; /* Polkit will call us back */
568 link_dns_settings_clear(l
);
569 (void) link_dirty(l
);
571 return sd_bus_reply_method_return(message
, NULL
);
574 int bus_link_method_renew(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
581 return sd_bus_error_setf(error
, BUS_ERROR_UNMANAGED_INTERFACE
,
582 "Interface %s is not managed by systemd-networkd",
585 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
586 "org.freedesktop.network1.renew",
587 NULL
, true, UID_INVALID
,
588 &l
->manager
->polkit_registry
, error
);
592 return 1; /* Polkit will call us back */
594 if (l
->dhcp_client
) {
595 r
= sd_dhcp_client_send_renew(l
->dhcp_client
);
600 return sd_bus_reply_method_return(message
, NULL
);
603 int bus_link_method_reconfigure(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
610 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
611 "org.freedesktop.network1.reconfigure",
612 NULL
, true, UID_INVALID
,
613 &l
->manager
->polkit_registry
, error
);
617 return 1; /* Polkit will call us back */
619 r
= link_reconfigure(l
, true);
623 return sd_bus_reply_method_return(message
, NULL
);
626 const sd_bus_vtable link_vtable
[] = {
627 SD_BUS_VTABLE_START(0),
629 SD_BUS_PROPERTY("OperationalState", "s", property_get_operational_state
, offsetof(Link
, operstate
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
630 SD_BUS_PROPERTY("CarrierState", "s", property_get_carrier_state
, offsetof(Link
, carrier_state
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
631 SD_BUS_PROPERTY("AddressState", "s", property_get_address_state
, offsetof(Link
, address_state
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
632 SD_BUS_PROPERTY("AdministrativeState", "s", property_get_administrative_state
, offsetof(Link
, state
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
633 SD_BUS_PROPERTY("BitRates", "(tt)", property_get_bit_rates
, 0, 0),
635 SD_BUS_METHOD("SetNTP", "as", NULL
, bus_link_method_set_ntp_servers
, SD_BUS_VTABLE_UNPRIVILEGED
),
636 SD_BUS_METHOD("SetDNS", "a(iay)", NULL
, bus_link_method_set_dns_servers
, SD_BUS_VTABLE_UNPRIVILEGED
),
637 SD_BUS_METHOD("SetDomains", "a(sb)", NULL
, bus_link_method_set_domains
, SD_BUS_VTABLE_UNPRIVILEGED
),
638 SD_BUS_METHOD("SetDefaultRoute", "b", NULL
, bus_link_method_set_default_route
, SD_BUS_VTABLE_UNPRIVILEGED
),
639 SD_BUS_METHOD("SetLLMNR", "s", NULL
, bus_link_method_set_llmnr
, SD_BUS_VTABLE_UNPRIVILEGED
),
640 SD_BUS_METHOD("SetMulticastDNS", "s", NULL
, bus_link_method_set_mdns
, SD_BUS_VTABLE_UNPRIVILEGED
),
641 SD_BUS_METHOD("SetDNSOverTLS", "s", NULL
, bus_link_method_set_dns_over_tls
, SD_BUS_VTABLE_UNPRIVILEGED
),
642 SD_BUS_METHOD("SetDNSSEC", "s", NULL
, bus_link_method_set_dnssec
, SD_BUS_VTABLE_UNPRIVILEGED
),
643 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL
, bus_link_method_set_dnssec_negative_trust_anchors
, SD_BUS_VTABLE_UNPRIVILEGED
),
644 SD_BUS_METHOD("RevertNTP", NULL
, NULL
, bus_link_method_revert_ntp
, SD_BUS_VTABLE_UNPRIVILEGED
),
645 SD_BUS_METHOD("RevertDNS", NULL
, NULL
, bus_link_method_revert_dns
, SD_BUS_VTABLE_UNPRIVILEGED
),
646 SD_BUS_METHOD("Renew", NULL
, NULL
, bus_link_method_renew
, SD_BUS_VTABLE_UNPRIVILEGED
),
647 SD_BUS_METHOD("Reconfigure", NULL
, NULL
, bus_link_method_reconfigure
, SD_BUS_VTABLE_UNPRIVILEGED
),
652 char *link_bus_path(Link
*link
) {
653 _cleanup_free_
char *ifindex
= NULL
;
658 assert(link
->ifindex
> 0);
660 if (asprintf(&ifindex
, "%d", link
->ifindex
) < 0)
663 r
= sd_bus_path_encode("/org/freedesktop/network1/link", ifindex
, &p
);
670 int link_node_enumerator(sd_bus
*bus
, const char *path
, void *userdata
, char ***nodes
, sd_bus_error
*error
) {
671 _cleanup_strv_free_
char **l
= NULL
;
672 Manager
*m
= userdata
;
682 l
= new0(char*, hashmap_size(m
->links
) + 1);
686 HASHMAP_FOREACH(link
, m
->links
, i
) {
689 p
= link_bus_path(link
);
697 *nodes
= TAKE_PTR(l
);
702 int link_object_find(sd_bus
*bus
, const char *path
, const char *interface
, void *userdata
, void **found
, sd_bus_error
*error
) {
703 _cleanup_free_
char *identifier
= NULL
;
704 Manager
*m
= userdata
;
714 r
= sd_bus_path_decode(path
, "/org/freedesktop/network1/link", &identifier
);
718 ifindex
= parse_ifindex(identifier
);
722 r
= link_get(m
, ifindex
, &link
);
731 int link_send_changed_strv(Link
*link
, char **properties
) {
732 _cleanup_free_
char *p
= NULL
;
735 assert(link
->manager
);
738 if (!link
->manager
->bus
)
741 p
= link_bus_path(link
);
745 return sd_bus_emit_properties_changed_strv(
748 "org.freedesktop.network1.Link",
752 int link_send_changed(Link
*link
, const char *property
, ...) {
755 properties
= strv_from_stdarg_alloca(property
);
757 return link_send_changed_strv(link
, properties
);