1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 #include "alloc-util.h"
4 #include "bus-common-errors.h"
6 #include "parse-util.h"
7 #include "resolve-util.h"
8 #include "resolved-bus.h"
9 #include "resolved-link-bus.h"
10 #include "resolved-resolv-conf.h"
13 static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported
, "b", Link
, link_dnssec_supported
);
14 static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode
, "s", Link
, link_get_dnssec_mode
, dnssec_mode_to_string
);
16 static int property_get_dns_over_tls_mode(
19 const char *interface
,
21 sd_bus_message
*reply
,
23 sd_bus_error
*error
) {
30 return sd_bus_message_append(reply
, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l
)));
33 static int property_get_dns(
36 const char *interface
,
38 sd_bus_message
*reply
,
40 sd_bus_error
*error
) {
49 r
= sd_bus_message_open_container(reply
, 'a', "(iay)");
53 LIST_FOREACH(servers
, s
, l
->dns_servers
) {
54 r
= bus_dns_server_append(reply
, s
, false);
59 return sd_bus_message_close_container(reply
);
62 static int property_get_current_dns_server(
65 const char *interface
,
67 sd_bus_message
*reply
,
69 sd_bus_error
*error
) {
76 s
= *(DnsServer
**) userdata
;
78 return bus_dns_server_append(reply
, s
, false);
81 static int property_get_domains(
84 const char *interface
,
86 sd_bus_message
*reply
,
88 sd_bus_error
*error
) {
97 r
= sd_bus_message_open_container(reply
, 'a', "(sb)");
101 LIST_FOREACH(domains
, d
, l
->search_domains
) {
102 r
= sd_bus_message_append(reply
, "(sb)", d
->name
, d
->route_only
);
107 return sd_bus_message_close_container(reply
);
110 static int property_get_scopes_mask(
113 const char *interface
,
114 const char *property
,
115 sd_bus_message
*reply
,
117 sd_bus_error
*error
) {
125 mask
= (l
->unicast_scope
? SD_RESOLVED_DNS
: 0) |
126 (l
->llmnr_ipv4_scope
? SD_RESOLVED_LLMNR_IPV4
: 0) |
127 (l
->llmnr_ipv6_scope
? SD_RESOLVED_LLMNR_IPV6
: 0) |
128 (l
->mdns_ipv4_scope
? SD_RESOLVED_MDNS_IPV4
: 0) |
129 (l
->mdns_ipv6_scope
? SD_RESOLVED_MDNS_IPV6
: 0);
131 return sd_bus_message_append(reply
, "t", mask
);
134 static int property_get_ntas(
137 const char *interface
,
138 const char *property
,
139 sd_bus_message
*reply
,
141 sd_bus_error
*error
) {
151 r
= sd_bus_message_open_container(reply
, 'a', "s");
155 SET_FOREACH(name
, l
->dnssec_negative_trust_anchors
, i
) {
156 r
= sd_bus_message_append(reply
, "s", name
);
161 return sd_bus_message_close_container(reply
);
164 static int verify_unmanaged_link(Link
*l
, sd_bus_error
*error
) {
167 if (l
->flags
& IFF_LOOPBACK
)
168 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is loopback device.", l
->name
);
170 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is managed.", l
->name
);
175 int bus_link_method_set_dns_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
176 _cleanup_free_
struct in_addr_data
*dns
= NULL
;
177 size_t allocated
= 0, n
= 0;
185 r
= verify_unmanaged_link(l
, error
);
189 r
= sd_bus_message_enter_container(message
, 'a', "(iay)");
198 assert_cc(sizeof(int) == sizeof(int32_t));
200 r
= sd_bus_message_enter_container(message
, 'r', "iay");
206 r
= sd_bus_message_read(message
, "i", &family
);
210 if (!IN_SET(family
, AF_INET
, AF_INET6
))
211 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown address family %i", family
);
213 r
= sd_bus_message_read_array(message
, 'y', &d
, &sz
);
216 if (sz
!= FAMILY_ADDRESS_SIZE(family
))
217 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid address size");
219 if (!dns_server_address_valid(family
, d
))
220 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNS server address");
222 r
= sd_bus_message_exit_container(message
);
226 if (!GREEDY_REALLOC(dns
, allocated
, n
+1))
229 dns
[n
].family
= family
;
230 memcpy(&dns
[n
].address
, d
, sz
);
234 r
= sd_bus_message_exit_container(message
);
238 dns_server_mark_all(l
->dns_servers
);
240 for (i
= 0; i
< n
; i
++) {
243 s
= dns_server_find(l
->dns_servers
, dns
[i
].family
, &dns
[i
].address
, 0);
245 dns_server_move_back_and_unmark(s
);
247 r
= dns_server_new(l
->manager
, NULL
, DNS_SERVER_LINK
, l
, dns
[i
].family
, &dns
[i
].address
, 0);
254 dns_server_unlink_marked(l
->dns_servers
);
255 link_allocate_scopes(l
);
257 (void) link_save_user(l
);
258 (void) manager_write_resolv_conf(l
->manager
);
260 return sd_bus_reply_method_return(message
, NULL
);
263 dns_server_unlink_all(l
->dns_servers
);
267 int bus_link_method_set_domains(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
274 r
= verify_unmanaged_link(l
, error
);
278 r
= sd_bus_message_enter_container(message
, 'a', "(sb)");
286 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
292 r
= dns_name_is_valid(name
);
296 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid search domain %s", name
);
297 if (!route_only
&& dns_name_is_root(name
))
298 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Root domain is not suitable as search domain");
301 dns_search_domain_mark_all(l
->search_domains
);
303 r
= sd_bus_message_rewind(message
, false);
312 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
318 r
= dns_search_domain_find(l
->search_domains
, name
, &d
);
323 dns_search_domain_move_back_and_unmark(d
);
325 r
= dns_search_domain_new(l
->manager
, &d
, DNS_SEARCH_DOMAIN_LINK
, l
, name
);
330 d
->route_only
= route_only
;
333 r
= sd_bus_message_exit_container(message
);
337 dns_search_domain_unlink_marked(l
->search_domains
);
339 (void) link_save_user(l
);
340 (void) manager_write_resolv_conf(l
->manager
);
342 return sd_bus_reply_method_return(message
, NULL
);
345 dns_search_domain_unlink_all(l
->search_domains
);
349 int bus_link_method_set_llmnr(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
358 r
= verify_unmanaged_link(l
, error
);
362 r
= sd_bus_message_read(message
, "s", &llmnr
);
367 mode
= RESOLVE_SUPPORT_YES
;
369 mode
= resolve_support_from_string(llmnr
);
371 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid LLMNR setting: %s", llmnr
);
374 l
->llmnr_support
= mode
;
375 link_allocate_scopes(l
);
376 link_add_rrs(l
, false);
378 (void) link_save_user(l
);
380 return sd_bus_reply_method_return(message
, NULL
);
383 int bus_link_method_set_mdns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
392 r
= verify_unmanaged_link(l
, error
);
396 r
= sd_bus_message_read(message
, "s", &mdns
);
401 mode
= RESOLVE_SUPPORT_NO
;
403 mode
= resolve_support_from_string(mdns
);
405 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid MulticastDNS setting: %s", mdns
);
408 l
->mdns_support
= mode
;
409 link_allocate_scopes(l
);
410 link_add_rrs(l
, false);
412 (void) link_save_user(l
);
414 return sd_bus_reply_method_return(message
, NULL
);
417 int bus_link_method_set_dns_over_tls(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
419 const char *dns_over_tls
;
426 r
= verify_unmanaged_link(l
, error
);
430 r
= sd_bus_message_read(message
, "s", &dns_over_tls
);
434 if (isempty(dns_over_tls
))
435 mode
= _DNS_OVER_TLS_MODE_INVALID
;
437 mode
= dns_over_tls_mode_from_string(dns_over_tls
);
439 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSOverTLS setting: %s", dns_over_tls
);
442 link_set_dns_over_tls_mode(l
, mode
);
444 (void) link_save_user(l
);
446 return sd_bus_reply_method_return(message
, NULL
);
449 int bus_link_method_set_dnssec(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
458 r
= verify_unmanaged_link(l
, error
);
462 r
= sd_bus_message_read(message
, "s", &dnssec
);
467 mode
= _DNSSEC_MODE_INVALID
;
469 mode
= dnssec_mode_from_string(dnssec
);
471 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSSEC setting: %s", dnssec
);
474 link_set_dnssec_mode(l
, mode
);
476 (void) link_save_user(l
);
478 return sd_bus_reply_method_return(message
, NULL
);
481 int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
482 _cleanup_set_free_free_ Set
*ns
= NULL
;
483 _cleanup_strv_free_
char **ntas
= NULL
;
491 r
= verify_unmanaged_link(l
, error
);
495 r
= sd_bus_message_read_strv(message
, &ntas
);
499 STRV_FOREACH(i
, ntas
) {
500 r
= dns_name_is_valid(*i
);
504 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid negative trust anchor domain: %s", *i
);
507 ns
= set_new(&dns_name_hash_ops
);
511 STRV_FOREACH(i
, ntas
) {
512 r
= set_put_strdup(ns
, *i
);
517 set_free_free(l
->dnssec_negative_trust_anchors
);
518 l
->dnssec_negative_trust_anchors
= TAKE_PTR(ns
);
520 (void) link_save_user(l
);
522 return sd_bus_reply_method_return(message
, NULL
);
525 int bus_link_method_revert(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
532 r
= verify_unmanaged_link(l
, error
);
536 link_flush_settings(l
);
537 link_allocate_scopes(l
);
538 link_add_rrs(l
, false);
540 (void) link_save_user(l
);
541 (void) manager_write_resolv_conf(l
->manager
);
543 return sd_bus_reply_method_return(message
, NULL
);
546 const sd_bus_vtable link_vtable
[] = {
547 SD_BUS_VTABLE_START(0),
549 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask
, 0, 0),
550 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns
, 0, 0),
551 SD_BUS_PROPERTY("CurrentDNSServer", "(iay)", property_get_current_dns_server
, offsetof(Link
, current_dns_server
), 0),
552 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains
, 0, 0),
553 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support
, offsetof(Link
, llmnr_support
), 0),
554 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support
, offsetof(Link
, mdns_support
), 0),
555 SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode
, 0, 0),
556 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode
, 0, 0),
557 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas
, 0, 0),
558 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported
, 0, 0),
560 SD_BUS_METHOD("SetDNS", "a(iay)", NULL
, bus_link_method_set_dns_servers
, 0),
561 SD_BUS_METHOD("SetDomains", "a(sb)", NULL
, bus_link_method_set_domains
, 0),
562 SD_BUS_METHOD("SetLLMNR", "s", NULL
, bus_link_method_set_llmnr
, 0),
563 SD_BUS_METHOD("SetMulticastDNS", "s", NULL
, bus_link_method_set_mdns
, 0),
564 SD_BUS_METHOD("SetDNSOverTLS", "s", NULL
, bus_link_method_set_dns_over_tls
, 0),
565 SD_BUS_METHOD("SetDNSSEC", "s", NULL
, bus_link_method_set_dnssec
, 0),
566 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL
, bus_link_method_set_dnssec_negative_trust_anchors
, 0),
567 SD_BUS_METHOD("Revert", NULL
, NULL
, bus_link_method_revert
, 0),
572 int link_object_find(sd_bus
*bus
, const char *path
, const char *interface
, void *userdata
, void **found
, sd_bus_error
*error
) {
573 _cleanup_free_
char *e
= NULL
;
574 Manager
*m
= userdata
;
585 r
= sd_bus_path_decode(path
, "/org/freedesktop/resolve1/link", &e
);
589 r
= parse_ifindex(e
, &ifindex
);
593 link
= hashmap_get(m
->links
, INT_TO_PTR(ifindex
));
601 char *link_bus_path(Link
*link
) {
602 _cleanup_free_
char *ifindex
= NULL
;
608 if (asprintf(&ifindex
, "%i", link
->ifindex
) < 0)
611 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex
, &p
);
618 int link_node_enumerator(sd_bus
*bus
, const char *path
, void *userdata
, char ***nodes
, sd_bus_error
*error
) {
619 _cleanup_strv_free_
char **l
= NULL
;
620 Manager
*m
= userdata
;
630 l
= new0(char*, hashmap_size(m
->links
) + 1);
634 HASHMAP_FOREACH(link
, m
->links
, i
) {
637 p
= link_bus_path(link
);
645 *nodes
= TAKE_PTR(l
);