]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/network/networkd-state-file.c
abd8b5a4ef60c739f22afd19c5dd4b057a4355cd
[thirdparty/systemd.git] / src / network / networkd-state-file.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <net/if.h>
4 #include <netinet/in.h>
5 #include <sys/stat.h>
6 #include <unistd.h>
7
8 #include "sd-dhcp6-lease.h"
9
10 #include "alloc-util.h"
11 #include "dns-domain.h"
12 #include "dns-resolver-internal.h"
13 #include "errno-util.h"
14 #include "escape.h"
15 #include "fd-util.h"
16 #include "fileio.h"
17 #include "fs-util.h"
18 #include "network-internal.h"
19 #include "networkd-dhcp-common.h"
20 #include "networkd-link.h"
21 #include "networkd-manager.h"
22 #include "networkd-manager-bus.h"
23 #include "networkd-network.h"
24 #include "networkd-ntp.h"
25 #include "networkd-state-file.h"
26 #include "ordered-set.h"
27 #include "set.h"
28 #include "string-util.h"
29 #include "strv.h"
30 #include "tmpfile-util.h"
31
32 static int ordered_set_put_dns_servers(OrderedSet **s, int ifindex, struct in_addr_full **dns, unsigned n) {
33 int r;
34
35 assert(s);
36 assert(dns || n == 0);
37
38 FOREACH_ARRAY(a, dns, n) {
39 const char *p;
40
41 if ((*a)->ifindex != 0 && (*a)->ifindex != ifindex)
42 return 0;
43
44 p = in_addr_full_to_string(*a);
45 if (!p)
46 return 0;
47
48 r = ordered_set_put_strdup(s, p);
49 if (r < 0)
50 return r;
51 }
52
53 return 0;
54 }
55
56 static int ordered_set_put_in4_addrv(
57 OrderedSet **s,
58 const struct in_addr *addresses,
59 size_t n,
60 bool (*predicate)(const struct in_addr *addr)) {
61
62 int r;
63
64 assert(s);
65 assert(n == 0 || addresses);
66
67 FOREACH_ARRAY(a, addresses, n) {
68 if (predicate && !predicate(a))
69 continue;
70
71 r = ordered_set_put_strdup(s, IN4_ADDR_TO_STRING(a));
72 if (r < 0)
73 return r;
74 }
75
76 return 0;
77 }
78
79 static int ordered_set_put_in6_addrv(
80 OrderedSet **s,
81 const struct in6_addr *addresses,
82 size_t n) {
83
84 int r;
85
86 assert(s);
87 assert(n == 0 || addresses);
88
89 FOREACH_ARRAY(a, addresses, n) {
90 r = ordered_set_put_strdup(s, IN6_ADDR_TO_STRING(a));
91 if (r < 0)
92 return r;
93 }
94
95 return 0;
96 }
97
98 static int link_put_dns(Link *link, OrderedSet **s) {
99 int r;
100
101 assert(link);
102 assert(link->network);
103 assert(s);
104
105 if (link->n_dns != UINT_MAX)
106 return ordered_set_put_dns_servers(s, link->ifindex, link->dns, link->n_dns);
107
108 r = ordered_set_put_dns_servers(s, link->ifindex, link->network->dns, link->network->n_dns);
109 if (r < 0)
110 return r;
111
112 if (link->dhcp_lease && link_get_use_dns(link, NETWORK_CONFIG_SOURCE_DHCP4)) {
113 const struct in_addr *addresses;
114
115 r = sd_dhcp_lease_get_dns(link->dhcp_lease, &addresses);
116 if (r >= 0) {
117 r = ordered_set_put_in4_addrv(s, addresses, r, in4_addr_is_non_local);
118 if (r < 0)
119 return r;
120 }
121 }
122
123 if (link->dhcp_lease && link_get_use_dnr(link, NETWORK_CONFIG_SOURCE_DHCP4)) {
124 sd_dns_resolver *resolvers;
125
126 r = sd_dhcp_lease_get_dnr(link->dhcp_lease, &resolvers);
127 if (r >= 0) {
128 struct in_addr_full **dot_servers;
129 size_t n = 0;
130 CLEANUP_ARRAY(dot_servers, n, in_addr_full_array_free);
131
132 r = dns_resolvers_to_dot_addrs(resolvers, r, &dot_servers, &n);
133 if (r < 0)
134 return r;
135 r = ordered_set_put_dns_servers(s, link->ifindex, dot_servers, n);
136 if (r < 0)
137 return r;
138 }
139 }
140
141 if (link->dhcp6_lease && link_get_use_dns(link, NETWORK_CONFIG_SOURCE_DHCP6)) {
142 const struct in6_addr *addresses;
143
144 r = sd_dhcp6_lease_get_dns(link->dhcp6_lease, &addresses);
145 if (r >= 0) {
146 r = ordered_set_put_in6_addrv(s, addresses, r);
147 if (r < 0)
148 return r;
149 }
150 }
151
152 if (link->dhcp6_lease && link_get_use_dnr(link, NETWORK_CONFIG_SOURCE_DHCP6)) {
153 sd_dns_resolver *resolvers;
154
155 r = sd_dhcp6_lease_get_dnr(link->dhcp6_lease, &resolvers);
156 if (r >= 0 ) {
157 struct in_addr_full **dot_servers;
158 size_t n = 0;
159 CLEANUP_ARRAY(dot_servers, n, in_addr_full_array_free);
160
161 r = dns_resolvers_to_dot_addrs(resolvers, r, &dot_servers, &n);
162 if (r < 0)
163 return r;
164
165 r = ordered_set_put_dns_servers(s, link->ifindex, dot_servers, n);
166 if (r < 0)
167 return r;
168 }
169 }
170
171 if (link_get_use_dns(link, NETWORK_CONFIG_SOURCE_NDISC)) {
172 NDiscRDNSS *a;
173
174 SET_FOREACH(a, link->ndisc_rdnss) {
175 r = ordered_set_put_in6_addrv(s, &a->address, 1);
176 if (r < 0)
177 return r;
178 }
179 }
180
181 if (link_get_use_dnr(link, NETWORK_CONFIG_SOURCE_NDISC)) {
182 NDiscDNR *a;
183
184 SET_FOREACH(a, link->ndisc_dnr) {
185 struct in_addr_full **dot_servers = NULL;
186 size_t n = 0;
187 CLEANUP_ARRAY(dot_servers, n, in_addr_full_array_free);
188
189 r = dns_resolvers_to_dot_addrs(&a->resolver, 1, &dot_servers, &n);
190 if (r < 0)
191 return r;
192
193 r = ordered_set_put_dns_servers(s, link->ifindex, dot_servers, n);
194 if (r < 0)
195 return r;
196 }
197 }
198
199 return 0;
200 }
201
202 static int link_put_ntp(Link *link, OrderedSet **s) {
203 int r;
204
205 assert(link);
206 assert(link->network);
207 assert(s);
208
209 if (link->ntp)
210 return ordered_set_put_strdupv(s, link->ntp);
211
212 r = ordered_set_put_strdupv(s, link->network->ntp);
213 if (r < 0)
214 return r;
215
216 if (link->dhcp_lease && link_get_use_ntp(link, NETWORK_CONFIG_SOURCE_DHCP4)) {
217 const struct in_addr *addresses;
218
219 r = sd_dhcp_lease_get_ntp(link->dhcp_lease, &addresses);
220 if (r >= 0) {
221 r = ordered_set_put_in4_addrv(s, addresses, r, in4_addr_is_non_local);
222 if (r < 0)
223 return r;
224 }
225 }
226
227 if (link->dhcp6_lease && link_get_use_ntp(link, NETWORK_CONFIG_SOURCE_DHCP6)) {
228 const struct in6_addr *addresses;
229 char **fqdn;
230
231 r = sd_dhcp6_lease_get_ntp_addrs(link->dhcp6_lease, &addresses);
232 if (r >= 0) {
233 r = ordered_set_put_in6_addrv(s, addresses, r);
234 if (r < 0)
235 return r;
236 }
237
238 r = sd_dhcp6_lease_get_ntp_fqdn(link->dhcp6_lease, &fqdn);
239 if (r >= 0) {
240 r = ordered_set_put_strdupv(s, fqdn);
241 if (r < 0)
242 return r;
243 }
244 }
245
246 return 0;
247 }
248
249 static int link_put_sip(Link *link, OrderedSet **s) {
250 int r;
251
252 assert(link);
253 assert(link->network);
254 assert(s);
255
256 if (link->dhcp_lease && link->network->dhcp_use_sip) {
257 const struct in_addr *addresses;
258
259 r = sd_dhcp_lease_get_sip(link->dhcp_lease, &addresses);
260 if (r >= 0) {
261 r = ordered_set_put_in4_addrv(s, addresses, r, in4_addr_is_non_local);
262 if (r < 0)
263 return r;
264 }
265 }
266
267 return 0;
268 }
269
270 static int link_put_domains(Link *link, bool is_route, OrderedSet **s) {
271 OrderedSet *link_domains, *network_domains;
272 UseDomains use_domains;
273 int r;
274
275 assert(link);
276 assert(link->network);
277 assert(s);
278
279 link_domains = is_route ? link->route_domains : link->search_domains;
280 network_domains = is_route ? link->network->route_domains : link->network->search_domains;
281 use_domains = is_route ? USE_DOMAINS_ROUTE : USE_DOMAINS_YES;
282
283 if (link_domains)
284 return ordered_set_put_string_set_full(s, &dns_name_hash_ops_free, link_domains);
285
286 r = ordered_set_put_string_set_full(s, &dns_name_hash_ops_free, network_domains);
287 if (r < 0)
288 return r;
289
290 if (link->dhcp_lease && link_get_use_domains(link, NETWORK_CONFIG_SOURCE_DHCP4) == use_domains) {
291 const char *domainname;
292 char **domains;
293
294 r = sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname);
295 if (r >= 0) {
296 r = ordered_set_put_strdup_full(s, &dns_name_hash_ops_free, domainname);
297 if (r < 0)
298 return r;
299 }
300
301 r = sd_dhcp_lease_get_search_domains(link->dhcp_lease, &domains);
302 if (r >= 0) {
303 r = ordered_set_put_strdupv_full(s, &dns_name_hash_ops_free, domains);
304 if (r < 0)
305 return r;
306 }
307 }
308
309 if (link->dhcp6_lease && link_get_use_domains(link, NETWORK_CONFIG_SOURCE_DHCP6) == use_domains) {
310 char **domains;
311
312 r = sd_dhcp6_lease_get_domains(link->dhcp6_lease, &domains);
313 if (r >= 0) {
314 r = ordered_set_put_strdupv_full(s, &dns_name_hash_ops_free, domains);
315 if (r < 0)
316 return r;
317 }
318 }
319
320 if (link_get_use_domains(link, NETWORK_CONFIG_SOURCE_NDISC) == use_domains) {
321 NDiscDNSSL *a;
322
323 SET_FOREACH(a, link->ndisc_dnssl) {
324 r = ordered_set_put_strdup_full(s, &dns_name_hash_ops_free, ndisc_dnssl_domain(a));
325 if (r < 0)
326 return r;
327 }
328 }
329
330 return 0;
331 }
332
333 int manager_save(Manager *m) {
334 _cleanup_ordered_set_free_ OrderedSet *dns = NULL, *ntp = NULL, *sip = NULL, *search_domains = NULL, *route_domains = NULL;
335 const char *operstate_str, *carrier_state_str, *address_state_str, *ipv4_address_state_str, *ipv6_address_state_str, *online_state_str;
336 LinkOperationalState operstate = LINK_OPERSTATE_OFF;
337 LinkCarrierState carrier_state = LINK_CARRIER_STATE_OFF;
338 LinkAddressState ipv4_address_state = LINK_ADDRESS_STATE_OFF, ipv6_address_state = LINK_ADDRESS_STATE_OFF,
339 address_state = LINK_ADDRESS_STATE_OFF;
340 LinkOnlineState online_state;
341 size_t links_offline = 0, links_online = 0;
342 int r;
343
344 assert(m);
345
346 if (isempty(m->state_file))
347 return 0; /* Do not update state file when running in test mode. */
348
349 Link *link;
350 HASHMAP_FOREACH(link, m->links_by_index) {
351 if (link->flags & IFF_LOOPBACK)
352 continue;
353
354 operstate = MAX(operstate, link->operstate);
355 carrier_state = MAX(carrier_state, link->carrier_state);
356 address_state = MAX(address_state, link->address_state);
357 ipv4_address_state = MAX(ipv4_address_state, link->ipv4_address_state);
358 ipv6_address_state = MAX(ipv6_address_state, link->ipv6_address_state);
359
360 if (!link->network)
361 continue;
362
363 if (link->network->required_for_online) {
364 if (link->online_state == LINK_ONLINE_STATE_OFFLINE)
365 links_offline++;
366 else if (link->online_state == LINK_ONLINE_STATE_ONLINE)
367 links_online++;
368 }
369
370 r = link_put_dns(link, &dns);
371 if (r < 0)
372 return r;
373
374 r = link_put_ntp(link, &ntp);
375 if (r < 0)
376 return r;
377
378 r = link_put_sip(link, &sip);
379 if (r < 0)
380 return r;
381
382 r = link_put_domains(link, /* is_route = */ false, &search_domains);
383 if (r < 0)
384 return r;
385
386 r = link_put_domains(link, /* is_route = */ true, &route_domains);
387 if (r < 0)
388 return r;
389 }
390
391 if (carrier_state >= LINK_CARRIER_STATE_ENSLAVED)
392 carrier_state = LINK_CARRIER_STATE_CARRIER;
393
394 online_state = links_online > 0 ?
395 (links_offline > 0 ? LINK_ONLINE_STATE_PARTIAL : LINK_ONLINE_STATE_ONLINE) :
396 (links_offline > 0 ? LINK_ONLINE_STATE_OFFLINE : _LINK_ONLINE_STATE_INVALID);
397
398 operstate_str = ASSERT_PTR(link_operstate_to_string(operstate));
399 carrier_state_str = ASSERT_PTR(link_carrier_state_to_string(carrier_state));
400 address_state_str = ASSERT_PTR(link_address_state_to_string(address_state));
401 ipv4_address_state_str = ASSERT_PTR(link_address_state_to_string(ipv4_address_state));
402 ipv6_address_state_str = ASSERT_PTR(link_address_state_to_string(ipv6_address_state));
403
404 _cleanup_(unlink_and_freep) char *temp_path = NULL;
405 _cleanup_fclose_ FILE *f = NULL;
406
407 r = fopen_temporary(m->state_file, &f, &temp_path);
408 if (r < 0)
409 return r;
410
411 (void) fchmod(fileno(f), 0644);
412
413 fprintf(f,
414 "# This is private data. Do not parse.\n"
415 "OPER_STATE=%s\n"
416 "CARRIER_STATE=%s\n"
417 "ADDRESS_STATE=%s\n"
418 "IPV4_ADDRESS_STATE=%s\n"
419 "IPV6_ADDRESS_STATE=%s\n",
420 operstate_str, carrier_state_str, address_state_str, ipv4_address_state_str, ipv6_address_state_str);
421
422 online_state_str = link_online_state_to_string(online_state);
423 if (online_state_str)
424 fprintf(f, "ONLINE_STATE=%s\n", online_state_str);
425
426 ordered_set_print(f, "DNS=", dns);
427 ordered_set_print(f, "NTP=", ntp);
428 ordered_set_print(f, "SIP=", sip);
429 ordered_set_print(f, "DOMAINS=", search_domains);
430 ordered_set_print(f, "ROUTE_DOMAINS=", route_domains);
431
432 r = fflush_and_check(f);
433 if (r < 0)
434 return r;
435
436 r = conservative_rename(temp_path, m->state_file);
437 if (r < 0)
438 return r;
439
440 temp_path = mfree(temp_path);
441
442 _cleanup_strv_free_ char **p = NULL;
443
444 if (m->operational_state != operstate) {
445 m->operational_state = operstate;
446 if (strv_extend(&p, "OperationalState") < 0)
447 log_oom();
448 }
449
450 if (m->carrier_state != carrier_state) {
451 m->carrier_state = carrier_state;
452 if (strv_extend(&p, "CarrierState") < 0)
453 log_oom();
454 }
455
456 if (m->address_state != address_state) {
457 m->address_state = address_state;
458 if (strv_extend(&p, "AddressState") < 0)
459 log_oom();
460 }
461
462 if (m->ipv4_address_state != ipv4_address_state) {
463 m->ipv4_address_state = ipv4_address_state;
464 if (strv_extend(&p, "IPv4AddressState") < 0)
465 log_oom();
466 }
467
468 if (m->ipv6_address_state != ipv6_address_state) {
469 m->ipv6_address_state = ipv6_address_state;
470 if (strv_extend(&p, "IPv6AddressState") < 0)
471 log_oom();
472 }
473
474 if (m->online_state != online_state) {
475 m->online_state = online_state;
476 if (strv_extend(&p, "OnlineState") < 0)
477 log_oom();
478 }
479
480 if (p) {
481 r = manager_send_changed_strv(m, p);
482 if (r < 0)
483 log_warning_errno(r, "Could not emit changed properties, ignoring: %m");
484 }
485
486 m->dirty = false;
487
488 return 0;
489 }
490
491 static void print_link_hashmap(FILE *f, const char *prefix, Hashmap* h) {
492 bool space = false;
493 Link *link;
494
495 assert(f);
496 assert(prefix);
497
498 if (hashmap_isempty(h))
499 return;
500
501 fputs(prefix, f);
502 HASHMAP_FOREACH(link, h) {
503 if (space)
504 fputc(' ', f);
505
506 fprintf(f, "%i", link->ifindex);
507 space = true;
508 }
509
510 fputc('\n', f);
511 }
512
513 static void link_save_dns(Link *link, FILE *f, struct in_addr_full **dns, unsigned n_dns, bool *space) {
514 bool _space = false;
515
516 if (!space)
517 space = &_space;
518
519 for (unsigned j = 0; j < n_dns; j++) {
520 const char *str;
521
522 if (dns[j]->ifindex != 0 && dns[j]->ifindex != link->ifindex)
523 continue;
524
525 str = in_addr_full_to_string(dns[j]);
526 if (!str)
527 continue;
528
529 if (*space)
530 fputc(' ', f);
531 fputs(str, f);
532 *space = true;
533 }
534 }
535
536 static void serialize_addresses(
537 FILE *f,
538 const char *lvalue,
539 bool *space,
540 char **addresses,
541 sd_dhcp_lease *lease,
542 bool conditional,
543 sd_dhcp_lease_server_type_t what,
544 sd_dhcp6_lease *lease6,
545 bool conditional6,
546 int (*lease6_get_addr)(sd_dhcp6_lease*, const struct in6_addr**),
547 int (*lease6_get_fqdn)(sd_dhcp6_lease*, char ***)) {
548
549 bool _space = false;
550 int r;
551
552 if (!space)
553 space = &_space;
554
555 if (lvalue)
556 fprintf(f, "%s=", lvalue);
557 fputstrv(f, addresses, NULL, space);
558
559 if (lease && conditional) {
560 const struct in_addr *lease_addresses;
561
562 r = sd_dhcp_lease_get_servers(lease, what, &lease_addresses);
563 if (r > 0)
564 serialize_in_addrs(f, lease_addresses, r, space, in4_addr_is_non_local);
565 }
566
567 if (lease6 && conditional6 && lease6_get_addr) {
568 const struct in6_addr *in6_addrs;
569
570 r = lease6_get_addr(lease6, &in6_addrs);
571 if (r > 0)
572 serialize_in6_addrs(f, in6_addrs, r, space);
573 }
574
575 if (lease6 && conditional6 && lease6_get_fqdn) {
576 char **in6_hosts;
577
578 r = lease6_get_fqdn(lease6, &in6_hosts);
579 if (r > 0)
580 fputstrv(f, in6_hosts, NULL, space);
581 }
582
583 if (lvalue)
584 fputc('\n', f);
585 }
586
587 static void serialize_resolvers(
588 FILE *f,
589 const char *lvalue,
590 bool *space,
591 sd_dhcp_lease *lease,
592 bool conditional,
593 sd_dhcp6_lease *lease6,
594 bool conditional6) {
595
596 bool _space = false;
597 if (!space)
598 space = &_space;
599
600 if (lvalue)
601 fprintf(f, "%s=", lvalue);
602
603 if (lease && conditional) {
604 sd_dns_resolver *resolvers;
605 _cleanup_strv_free_ char **names = NULL;
606 int r;
607
608 r = sd_dhcp_lease_get_dnr(lease, &resolvers);
609 if (r < 0 && r != -ENODATA)
610 log_warning_errno(r, "Failed to get DNR from DHCP lease, ignoring: %m");
611
612 if (r > 0) {
613 r = dns_resolvers_to_dot_strv(resolvers, r, &names);
614 if (r < 0)
615 return (void) log_warning_errno(r, "Failed to get DoT servers from DHCP DNR, ignoring: %m");
616 if (r > 0)
617 fputstrv(f, names, NULL, space);
618 }
619 }
620
621 if (lease6 && conditional6) {
622 sd_dns_resolver *resolvers;
623 _cleanup_strv_free_ char **names = NULL;
624 int r;
625
626 r = sd_dhcp6_lease_get_dnr(lease6, &resolvers);
627 if (r < 0 && r != -ENODATA)
628 log_warning_errno(r, "Failed to get DNR from DHCPv6 lease, ignoring: %m");
629
630 if (r > 0) {
631 r = dns_resolvers_to_dot_strv(resolvers, r, &names);
632 if (r < 0)
633 return (void) log_warning_errno(r, "Failed to get DoT servers from DHCPv6 DNR, ignoring: %m");
634 if (r > 0)
635 fputstrv(f, names, NULL, space);
636 }
637 }
638
639 if (lvalue)
640 fputc('\n', f);
641
642 return;
643 }
644
645 static void link_save_domains(Link *link, FILE *f, OrderedSet *static_domains, UseDomains use_domains) {
646 bool space = false;
647 const char *p;
648
649 assert(link);
650 assert(link->network);
651 assert(f);
652
653 ORDERED_SET_FOREACH(p, static_domains)
654 fputs_with_separator(f, p, NULL, &space);
655
656 if (use_domains == USE_DOMAINS_NO)
657 return;
658
659 if (link->dhcp_lease && link_get_use_domains(link, NETWORK_CONFIG_SOURCE_DHCP4) == use_domains) {
660 const char *domainname;
661 char **domains;
662
663 if (sd_dhcp_lease_get_domainname(link->dhcp_lease, &domainname) >= 0)
664 fputs_with_separator(f, domainname, NULL, &space);
665 if (sd_dhcp_lease_get_search_domains(link->dhcp_lease, &domains) >= 0)
666 fputstrv(f, domains, NULL, &space);
667 }
668
669 if (link->dhcp6_lease && link_get_use_domains(link, NETWORK_CONFIG_SOURCE_DHCP6) == use_domains) {
670 char **domains;
671
672 if (sd_dhcp6_lease_get_domains(link->dhcp6_lease, &domains) >= 0)
673 fputstrv(f, domains, NULL, &space);
674 }
675
676 if (link_get_use_domains(link, NETWORK_CONFIG_SOURCE_NDISC) == use_domains) {
677 NDiscDNSSL *dd;
678
679 SET_FOREACH(dd, link->ndisc_dnssl)
680 fputs_with_separator(f, ndisc_dnssl_domain(dd), NULL, &space);
681 }
682 }
683
684 static int serialize_config_files(FILE *f, const char *prefix, const char *main_config, char * const *dropins) {
685 assert(f);
686 assert(prefix);
687 assert(main_config);
688
689 fprintf(f, "%s_FILE=%s\n", prefix, main_config);
690
691 bool space = false;
692
693 fprintf(f, "%s_FILE_DROPINS=\"", prefix);
694 STRV_FOREACH(d, dropins) {
695 _cleanup_free_ char *escaped = NULL;
696
697 escaped = xescape(*d, ":");
698 if (!escaped)
699 return -ENOMEM;
700
701 fputs_with_separator(f, escaped, ":", &space);
702 }
703 fputs("\"\n", f);
704
705 return 0;
706 }
707
708 static int link_save(Link *link) {
709 const char *admin_state, *oper_state, *carrier_state, *address_state, *ipv4_address_state, *ipv6_address_state;
710 _cleanup_(unlink_and_freep) char *temp_path = NULL;
711 _cleanup_fclose_ FILE *f = NULL;
712 int r;
713
714 assert(link);
715 assert(link->manager);
716
717 if (isempty(link->state_file))
718 return 0; /* Do not update state files when running in test mode. */
719
720 if (link->state == LINK_STATE_LINGER)
721 return 0;
722
723 admin_state = ASSERT_PTR(link_state_to_string(link->state));
724 oper_state = ASSERT_PTR(link_operstate_to_string(link->operstate));
725 carrier_state = ASSERT_PTR(link_carrier_state_to_string(link->carrier_state));
726 address_state = ASSERT_PTR(link_address_state_to_string(link->address_state));
727 ipv4_address_state = ASSERT_PTR(link_address_state_to_string(link->ipv4_address_state));
728 ipv6_address_state = ASSERT_PTR(link_address_state_to_string(link->ipv6_address_state));
729
730 r = fopen_temporary(link->state_file, &f, &temp_path);
731 if (r < 0)
732 return r;
733
734 (void) fchmod(fileno(f), 0644);
735
736 fprintf(f,
737 "# This is private data. Do not parse.\n"
738 "ADMIN_STATE=%s\n"
739 "OPER_STATE=%s\n"
740 "CARRIER_STATE=%s\n"
741 "ADDRESS_STATE=%s\n"
742 "IPV4_ADDRESS_STATE=%s\n"
743 "IPV6_ADDRESS_STATE=%s\n",
744 admin_state, oper_state, carrier_state, address_state, ipv4_address_state, ipv6_address_state);
745
746 if (link->netdev) {
747 r = serialize_config_files(f, "NETDEV", link->netdev->filename, link->netdev->dropins);
748 if (r < 0)
749 return r;
750 }
751
752 if (link->network) {
753 const char *online_state, *captive_portal;
754 bool space = false;
755
756 online_state = link_online_state_to_string(link->online_state);
757 if (online_state)
758 fprintf(f, "ONLINE_STATE=%s\n", online_state);
759
760 fprintf(f, "REQUIRED_FOR_ONLINE=%s\n",
761 yes_no(link->network->required_for_online));
762
763 LinkOperationalStateRange st;
764 link_required_operstate_for_online(link, &st);
765
766 fprintf(f, "REQUIRED_OPER_STATE_FOR_ONLINE=%s:%s\n",
767 link_operstate_to_string(st.min), link_operstate_to_string(st.max));
768
769 fprintf(f, "REQUIRED_FAMILY_FOR_ONLINE=%s\n",
770 link_required_address_family_to_string(link_required_family_for_online(link)));
771
772 fprintf(f, "ACTIVATION_POLICY=%s\n",
773 activation_policy_to_string(link->network->activation_policy));
774
775 r = serialize_config_files(f, "NETWORK", link->network->filename, link->network->dropins);
776 if (r < 0)
777 return r;
778
779 /************************************************************/
780
781 fputs("DNS=", f);
782 if (link->n_dns != UINT_MAX)
783 link_save_dns(link, f, link->dns, link->n_dns, NULL);
784 else {
785 space = false;
786 link_save_dns(link, f, link->network->dns, link->network->n_dns, &space);
787
788 /* DNR resolvers are not required to provide Do53 service, however resolved doesn't
789 * know how to handle such a server so for now Do53 service is required, and
790 * assumed. */
791 serialize_resolvers(f, NULL, &space,
792 link->dhcp_lease,
793 link_get_use_dnr(link, NETWORK_CONFIG_SOURCE_DHCP4),
794 link->dhcp6_lease,
795 link_get_use_dnr(link, NETWORK_CONFIG_SOURCE_DHCP6));
796
797 if (link_get_use_dnr(link, NETWORK_CONFIG_SOURCE_NDISC)) {
798 NDiscDNR *dnr;
799 SET_FOREACH(dnr, link->ndisc_dnr)
800 serialize_dnr(f, &dnr->resolver, 1, &space);
801 }
802
803 serialize_addresses(f, NULL, &space,
804 NULL,
805 link->dhcp_lease,
806 link_get_use_dns(link, NETWORK_CONFIG_SOURCE_DHCP4),
807 SD_DHCP_LEASE_DNS,
808 link->dhcp6_lease,
809 link_get_use_dns(link, NETWORK_CONFIG_SOURCE_DHCP6),
810 sd_dhcp6_lease_get_dns,
811 NULL);
812
813 if (link_get_use_dns(link, NETWORK_CONFIG_SOURCE_NDISC)) {
814 NDiscRDNSS *dd;
815
816 SET_FOREACH(dd, link->ndisc_rdnss)
817 serialize_in6_addrs(f, &dd->address, 1, &space);
818 }
819 }
820
821 fputc('\n', f);
822
823 /************************************************************/
824
825 if (link->ntp) {
826 fputs("NTP=", f);
827 fputstrv(f, link->ntp, NULL, NULL);
828 fputc('\n', f);
829 } else
830 serialize_addresses(f, "NTP", NULL,
831 link->network->ntp,
832 link->dhcp_lease,
833 link_get_use_ntp(link, NETWORK_CONFIG_SOURCE_DHCP4),
834 SD_DHCP_LEASE_NTP,
835 link->dhcp6_lease,
836 link_get_use_ntp(link, NETWORK_CONFIG_SOURCE_DHCP6),
837 sd_dhcp6_lease_get_ntp_addrs,
838 sd_dhcp6_lease_get_ntp_fqdn);
839
840 serialize_addresses(f, "SIP", NULL,
841 NULL,
842 link->dhcp_lease,
843 link->network->dhcp_use_sip,
844 SD_DHCP_LEASE_SIP,
845 NULL, false, NULL, NULL);
846
847 /************************************************************/
848
849 r = link_get_captive_portal(link, &captive_portal);
850 if (r < 0)
851 return r;
852
853 if (captive_portal)
854 fprintf(f, "CAPTIVE_PORTAL=%s\n", captive_portal);
855
856 /************************************************************/
857
858 fputs("DOMAINS=", f);
859 if (link->search_domains)
860 link_save_domains(link, f, link->search_domains, USE_DOMAINS_NO);
861 else
862 link_save_domains(link, f, link->network->search_domains, USE_DOMAINS_YES);
863 fputc('\n', f);
864
865 /************************************************************/
866
867 fputs("ROUTE_DOMAINS=", f);
868 if (link->route_domains)
869 link_save_domains(link, f, link->route_domains, USE_DOMAINS_NO);
870 else
871 link_save_domains(link, f, link->network->route_domains, USE_DOMAINS_ROUTE);
872 fputc('\n', f);
873
874 /************************************************************/
875
876 fprintf(f, "LLMNR=%s\n",
877 resolve_support_to_string(link->llmnr >= 0 ? link->llmnr : link->network->llmnr));
878
879 /************************************************************/
880
881 fprintf(f, "MDNS=%s\n",
882 resolve_support_to_string(link->mdns >= 0 ? link->mdns : link->network->mdns));
883
884 /************************************************************/
885
886 int dns_default_route =
887 link->dns_default_route >= 0 ? link->dns_default_route :
888 link->network->dns_default_route;
889 if (dns_default_route >= 0)
890 fprintf(f, "DNS_DEFAULT_ROUTE=%s\n", yes_no(dns_default_route));
891
892 /************************************************************/
893
894 DnsOverTlsMode dns_over_tls_mode =
895 link->dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID ? link->dns_over_tls_mode :
896 link->network->dns_over_tls_mode;
897 if (dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID)
898 fprintf(f, "DNS_OVER_TLS=%s\n", dns_over_tls_mode_to_string(dns_over_tls_mode));
899
900 /************************************************************/
901
902 DnssecMode dnssec_mode =
903 link->dnssec_mode != _DNSSEC_MODE_INVALID ? link->dnssec_mode :
904 link->network->dnssec_mode;
905 if (dnssec_mode != _DNSSEC_MODE_INVALID)
906 fprintf(f, "DNSSEC=%s\n", dnssec_mode_to_string(dnssec_mode));
907
908 /************************************************************/
909
910 Set *nta_anchors = link->dnssec_negative_trust_anchors;
911 if (set_isempty(nta_anchors))
912 nta_anchors = link->network->dnssec_negative_trust_anchors;
913
914 if (!set_isempty(nta_anchors)) {
915 const char *n;
916
917 space = false;
918
919 fputs("DNSSEC_NTA=", f);
920 SET_FOREACH(n, nta_anchors)
921 fputs_with_separator(f, n, NULL, &space);
922 fputc('\n', f);
923 }
924 }
925
926 print_link_hashmap(f, "CARRIER_BOUND_TO=", link->bound_to_links);
927 print_link_hashmap(f, "CARRIER_BOUND_BY=", link->bound_by_links);
928
929 if (link->dhcp_lease) {
930 r = dhcp_lease_save(link->dhcp_lease, link->lease_file);
931 if (r < 0)
932 return r;
933
934 fprintf(f, "DHCP_LEASE=%s\n", link->lease_file);
935 } else
936 (void) unlink(link->lease_file);
937
938 r = link_serialize_dhcp6_client(link, f);
939 if (r < 0)
940 return r;
941
942 r = fflush_and_check(f);
943 if (r < 0)
944 return r;
945
946 r = conservative_rename(temp_path, link->state_file);
947 if (r < 0)
948 return r;
949
950 temp_path = mfree(temp_path);
951
952 return 0;
953 }
954
955 void link_dirty(Link *link) {
956 assert(link);
957 assert(link->manager);
958
959 /* When the manager is in MANAGER_STOPPED, it is not necessary to update state files anymore, as they
960 * will be removed soon anyway. Moreover, we cannot call link_ref() in that case. */
961 if (link->manager->state == MANAGER_STOPPED)
962 return;
963
964 /* The serialized state in /run is no longer up-to-date. */
965
966 /* Also mark manager dirty as link is dirty */
967 link->manager->dirty = true;
968
969 if (set_ensure_put(&link->manager->dirty_links, &link_hash_ops, link) <= 0)
970 return; /* Ignore allocation errors and don't take another ref if the link was already dirty */
971
972 link_ref(link);
973 }
974
975 void link_clean(Link *link) {
976 assert(link);
977 assert(link->manager);
978
979 /* The serialized state in /run is up-to-date */
980
981 link_unref(set_remove(link->manager->dirty_links, link));
982 }
983
984 int link_save_and_clean_full(Link *link, bool also_save_manager) {
985 int r, k = 0;
986
987 assert(link);
988 assert(link->manager);
989
990 if (also_save_manager)
991 k = manager_save(link->manager);
992
993 r = link_save(link);
994 if (r < 0)
995 return r;
996
997 link_clean(link);
998 return k;
999 }
1000
1001 int manager_clean_all(Manager *manager) {
1002 int r, ret = 0;
1003
1004 assert(manager);
1005
1006 if (manager->dirty) {
1007 r = manager_save(manager);
1008 if (r < 0)
1009 log_warning_errno(r, "Failed to update state file %s, ignoring: %m", manager->state_file);
1010 RET_GATHER(ret, r);
1011 }
1012
1013 Link *link;
1014 SET_FOREACH(link, manager->dirty_links) {
1015 r = link_save_and_clean(link);
1016 if (r < 0)
1017 log_link_warning_errno(link, r, "Failed to update link state file %s, ignoring: %m", link->state_file);
1018 RET_GATHER(ret, r);
1019 }
1020
1021 return ret;
1022 }