2 This file is part of systemd.
4 Copyright 2016 Lennart Poettering
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 #include "alloc-util.h"
21 #include "bus-common-errors.h"
23 #include "parse-util.h"
24 #include "resolve-util.h"
25 #include "resolved-bus.h"
26 #include "resolved-link-bus.h"
27 #include "resolved-resolv-conf.h"
30 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_resolve_support
, resolve_support
, ResolveSupport
);
32 static int property_get_dnssec_mode(
35 const char *interface
,
37 sd_bus_message
*reply
,
39 sd_bus_error
*error
) {
46 return sd_bus_message_append(reply
, "s", dnssec_mode_to_string(link_get_dnssec_mode(l
)));
49 static int property_get_dns(
52 const char *interface
,
54 sd_bus_message
*reply
,
56 sd_bus_error
*error
) {
65 r
= sd_bus_message_open_container(reply
, 'a', "(iay)");
69 LIST_FOREACH(servers
, s
, l
->dns_servers
) {
70 r
= bus_dns_server_append(reply
, s
, false);
75 return sd_bus_message_close_container(reply
);
78 static int property_get_domains(
81 const char *interface
,
83 sd_bus_message
*reply
,
85 sd_bus_error
*error
) {
94 r
= sd_bus_message_open_container(reply
, 'a', "(sb)");
98 LIST_FOREACH(domains
, d
, l
->search_domains
) {
99 r
= sd_bus_message_append(reply
, "(sb)", d
->name
, d
->route_only
);
104 return sd_bus_message_close_container(reply
);
107 static int property_get_scopes_mask(
110 const char *interface
,
111 const char *property
,
112 sd_bus_message
*reply
,
114 sd_bus_error
*error
) {
122 mask
= (l
->unicast_scope
? SD_RESOLVED_DNS
: 0) |
123 (l
->llmnr_ipv4_scope
? SD_RESOLVED_LLMNR_IPV4
: 0) |
124 (l
->llmnr_ipv6_scope
? SD_RESOLVED_LLMNR_IPV6
: 0) |
125 (l
->mdns_ipv4_scope
? SD_RESOLVED_MDNS_IPV4
: 0) |
126 (l
->mdns_ipv6_scope
? SD_RESOLVED_MDNS_IPV6
: 0);
128 return sd_bus_message_append(reply
, "t", mask
);
131 static int property_get_ntas(
134 const char *interface
,
135 const char *property
,
136 sd_bus_message
*reply
,
138 sd_bus_error
*error
) {
148 r
= sd_bus_message_open_container(reply
, 'a', "s");
152 SET_FOREACH(name
, l
->dnssec_negative_trust_anchors
, i
) {
153 r
= sd_bus_message_append(reply
, "s", name
);
158 return sd_bus_message_close_container(reply
);
161 static int property_get_dnssec_supported(
164 const char *interface
,
165 const char *property
,
166 sd_bus_message
*reply
,
168 sd_bus_error
*error
) {
175 return sd_bus_message_append(reply
, "b", link_dnssec_supported(l
));
178 static int verify_unmanaged_link(Link
*l
, sd_bus_error
*error
) {
181 if (l
->flags
& IFF_LOOPBACK
)
182 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is loopback device.", l
->name
);
184 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is managed.", l
->name
);
189 int bus_link_method_set_dns_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
190 _cleanup_free_
struct in_addr_data
*dns
= NULL
;
191 size_t allocated
= 0, n
= 0;
199 r
= verify_unmanaged_link(l
, error
);
203 r
= sd_bus_message_enter_container(message
, 'a', "(iay)");
212 assert_cc(sizeof(int) == sizeof(int32_t));
214 r
= sd_bus_message_enter_container(message
, 'r', "iay");
220 r
= sd_bus_message_read(message
, "i", &family
);
224 if (!IN_SET(family
, AF_INET
, AF_INET6
))
225 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown address family %i", family
);
227 r
= sd_bus_message_read_array(message
, 'y', &d
, &sz
);
230 if (sz
!= FAMILY_ADDRESS_SIZE(family
))
231 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid address size");
233 r
= sd_bus_message_exit_container(message
);
237 if (!GREEDY_REALLOC(dns
, allocated
, n
+1))
240 dns
[n
].family
= family
;
241 memcpy(&dns
[n
].address
, d
, sz
);
245 r
= sd_bus_message_exit_container(message
);
249 dns_server_mark_all(l
->dns_servers
);
251 for (i
= 0; i
< n
; i
++) {
254 s
= dns_server_find(l
->dns_servers
, dns
[i
].family
, &dns
[i
].address
, 0);
256 dns_server_move_back_and_unmark(s
);
258 r
= dns_server_new(l
->manager
, NULL
, DNS_SERVER_LINK
, l
, dns
[i
].family
, &dns
[i
].address
, 0);
265 dns_server_unlink_marked(l
->dns_servers
);
266 link_allocate_scopes(l
);
268 (void) manager_write_resolv_conf(l
->manager
);
270 return sd_bus_reply_method_return(message
, NULL
);
273 dns_server_unlink_all(l
->dns_servers
);
277 int bus_link_method_set_domains(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
284 r
= verify_unmanaged_link(l
, error
);
288 r
= sd_bus_message_enter_container(message
, 'a', "(sb)");
296 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
302 r
= dns_name_is_valid(name
);
306 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid search domain %s", name
);
307 if (!route_only
&& dns_name_is_root(name
))
308 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Root domain is not suitable as search domain");
311 dns_search_domain_mark_all(l
->search_domains
);
313 r
= sd_bus_message_rewind(message
, false);
322 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
328 r
= dns_search_domain_find(l
->search_domains
, name
, &d
);
333 dns_search_domain_move_back_and_unmark(d
);
335 r
= dns_search_domain_new(l
->manager
, &d
, DNS_SEARCH_DOMAIN_LINK
, l
, name
);
340 d
->route_only
= route_only
;
343 r
= sd_bus_message_exit_container(message
);
347 dns_search_domain_unlink_marked(l
->search_domains
);
349 (void) manager_write_resolv_conf(l
->manager
);
351 return sd_bus_reply_method_return(message
, NULL
);
354 dns_search_domain_unlink_all(l
->search_domains
);
358 int bus_link_method_set_llmnr(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
367 r
= verify_unmanaged_link(l
, error
);
371 r
= sd_bus_message_read(message
, "s", &llmnr
);
376 mode
= RESOLVE_SUPPORT_YES
;
378 mode
= resolve_support_from_string(llmnr
);
380 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid LLMNR setting: %s", llmnr
);
383 l
->llmnr_support
= mode
;
384 link_allocate_scopes(l
);
385 link_add_rrs(l
, false);
387 return sd_bus_reply_method_return(message
, NULL
);
390 int bus_link_method_set_mdns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
399 r
= verify_unmanaged_link(l
, error
);
403 r
= sd_bus_message_read(message
, "s", &mdns
);
408 mode
= RESOLVE_SUPPORT_NO
;
410 mode
= resolve_support_from_string(mdns
);
412 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid MulticastDNS setting: %s", mdns
);
415 l
->mdns_support
= mode
;
416 link_allocate_scopes(l
);
417 link_add_rrs(l
, false);
419 return sd_bus_reply_method_return(message
, NULL
);
422 int bus_link_method_set_dnssec(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
431 r
= verify_unmanaged_link(l
, error
);
435 r
= sd_bus_message_read(message
, "s", &dnssec
);
440 mode
= _DNSSEC_MODE_INVALID
;
442 mode
= dnssec_mode_from_string(dnssec
);
444 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSSEC setting: %s", dnssec
);
447 link_set_dnssec_mode(l
, mode
);
449 return sd_bus_reply_method_return(message
, NULL
);
452 int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
453 _cleanup_set_free_free_ Set
*ns
= NULL
;
454 _cleanup_free_
char **ntas
= NULL
;
462 r
= verify_unmanaged_link(l
, error
);
466 r
= sd_bus_message_read_strv(message
, &ntas
);
470 STRV_FOREACH(i
, ntas
) {
471 r
= dns_name_is_valid(*i
);
475 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid negative trust anchor domain: %s", *i
);
478 ns
= set_new(&dns_name_hash_ops
);
482 STRV_FOREACH(i
, ntas
) {
483 r
= set_put_strdup(ns
, *i
);
488 set_free_free(l
->dnssec_negative_trust_anchors
);
489 l
->dnssec_negative_trust_anchors
= ns
;
492 return sd_bus_reply_method_return(message
, NULL
);
495 int bus_link_method_revert(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
502 r
= verify_unmanaged_link(l
, error
);
506 link_flush_settings(l
);
507 link_allocate_scopes(l
);
508 link_add_rrs(l
, false);
510 (void) manager_write_resolv_conf(l
->manager
);
512 return sd_bus_reply_method_return(message
, NULL
);
515 const sd_bus_vtable link_vtable
[] = {
516 SD_BUS_VTABLE_START(0),
518 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask
, 0, 0),
519 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns
, 0, 0),
520 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains
, 0, 0),
521 SD_BUS_PROPERTY("LLMNR", "s", property_get_resolve_support
, offsetof(Link
, llmnr_support
), 0),
522 SD_BUS_PROPERTY("MulticastDNS", "s", property_get_resolve_support
, offsetof(Link
, mdns_support
), 0),
523 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode
, 0, 0),
524 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas
, 0, 0),
525 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported
, 0, 0),
527 SD_BUS_METHOD("SetDNS", "a(iay)", NULL
, bus_link_method_set_dns_servers
, 0),
528 SD_BUS_METHOD("SetDomains", "a(sb)", NULL
, bus_link_method_set_domains
, 0),
529 SD_BUS_METHOD("SetLLMNR", "s", NULL
, bus_link_method_set_llmnr
, 0),
530 SD_BUS_METHOD("SetMulticastDNS", "s", NULL
, bus_link_method_set_mdns
, 0),
531 SD_BUS_METHOD("SetDNSSEC", "s", NULL
, bus_link_method_set_dnssec
, 0),
532 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL
, bus_link_method_set_dnssec_negative_trust_anchors
, 0),
533 SD_BUS_METHOD("Revert", NULL
, NULL
, bus_link_method_revert
, 0),
538 int link_object_find(sd_bus
*bus
, const char *path
, const char *interface
, void *userdata
, void **found
, sd_bus_error
*error
) {
539 _cleanup_free_
char *e
= NULL
;
540 Manager
*m
= userdata
;
551 r
= sd_bus_path_decode(path
, "/org/freedesktop/resolve1/link", &e
);
555 r
= parse_ifindex(e
, &ifindex
);
559 link
= hashmap_get(m
->links
, INT_TO_PTR(ifindex
));
567 char *link_bus_path(Link
*link
) {
568 _cleanup_free_
char *ifindex
= NULL
;
574 if (asprintf(&ifindex
, "%i", link
->ifindex
) < 0)
577 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex
, &p
);
584 int link_node_enumerator(sd_bus
*bus
, const char *path
, void *userdata
, char ***nodes
, sd_bus_error
*error
) {
585 _cleanup_strv_free_
char **l
= NULL
;
586 Manager
*m
= userdata
;
596 l
= new0(char*, hashmap_size(m
->links
) + 1);
600 HASHMAP_FOREACH(link
, m
->links
, i
) {
603 p
= link_bus_path(link
);