]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-conf.c
resolved,networkd: unify ResolveSupport enum
[thirdparty/systemd.git] / src / resolve / resolved-conf.c
CommitLineData
4e945a6f
LP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2014 Tom Gundersen <teg@jklm.no>
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
17
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
b5efdb8a 22#include "alloc-util.h"
4e945a6f 23#include "conf-parser.h"
a0f29c76 24#include "def.h"
b5efdb8a 25#include "extract-word.h"
6bedfcbb 26#include "parse-util.h"
4e945a6f 27#include "resolved-conf.h"
6bedfcbb 28#include "string-util.h"
4e945a6f 29
636e813d
LP
30int manager_add_dns_server_by_string(Manager *m, DnsServerType type, const char *word) {
31 union in_addr_union address;
636e813d 32 int family, r;
0eac4623 33 DnsServer *s;
4e945a6f
LP
34
35 assert(m);
636e813d
LP
36 assert(word);
37
38 r = in_addr_from_string_auto(word, &family, &address);
39 if (r < 0)
40 return r;
4e945a6f 41
636e813d 42 /* Filter out duplicates */
4b95f179 43 s = dns_server_find(manager_get_first_dns_server(m, type), family, &address);
636e813d
LP
44 if (s) {
45 /*
46 * Drop the marker. This is used to find the servers
47 * that ceased to exist, see
48 * manager_mark_dns_servers() and
49 * manager_flush_marked_dns_servers().
50 */
0b58db65 51 dns_server_move_back_and_unmark(s);
636e813d
LP
52 return 0;
53 }
54
55 return dns_server_new(m, NULL, type, NULL, family, &address);
56}
57
58int manager_parse_dns_server_string_and_warn(Manager *m, DnsServerType type, const char *string) {
59 int r;
60
61 assert(m);
62 assert(string);
63
880603a1 64 for(;;) {
b5efdb8a 65 _cleanup_free_ char *word = NULL;
880603a1
SS
66
67 r = extract_first_word(&string, &word, NULL, 0);
68 if (r < 0)
636e813d 69 return r;
880603a1
SS
70 if (r == 0)
71 break;
4e945a6f 72
636e813d 73 r = manager_add_dns_server_by_string(m, type, word);
a51c1048 74 if (r < 0)
636e813d 75 log_warning_errno(r, "Failed to add DNS server address '%s', ignoring.", word);
a51c1048
LP
76 }
77
78 return 0;
79}
80
81int manager_add_search_domain_by_string(Manager *m, const char *domain) {
82 DnsSearchDomain *d;
83 int r;
84
85 assert(m);
86 assert(domain);
87
88 r = dns_search_domain_find(m->search_domains, domain, &d);
89 if (r < 0)
90 return r;
91 if (r > 0) {
92 dns_search_domain_move_back_and_unmark(d);
93 return 0;
94 }
95
96 return dns_search_domain_new(m, NULL, DNS_SEARCH_DOMAIN_SYSTEM, NULL, domain);
97}
98
99int manager_parse_search_domains_and_warn(Manager *m, const char *string) {
100 int r;
101
102 assert(m);
103 assert(string);
104
105 for(;;) {
106 _cleanup_free_ char *word = NULL;
107
108 r = extract_first_word(&string, &word, NULL, EXTRACT_QUOTES);
109 if (r < 0)
110 return r;
111 if (r == 0)
112 break;
113
114 r = manager_add_search_domain_by_string(m, word);
115 if (r < 0)
116 log_warning_errno(r, "Failed to add search domain '%s', ignoring.", word);
4e945a6f
LP
117 }
118
119 return 0;
120}
121
636e813d 122int config_parse_dns_servers(
4e945a6f
LP
123 const char *unit,
124 const char *filename,
125 unsigned line,
126 const char *section,
127 unsigned section_line,
128 const char *lvalue,
129 int ltype,
130 const char *rvalue,
131 void *data,
132 void *userdata) {
133
134 Manager *m = userdata;
4e945a6f
LP
135 int r;
136
137 assert(filename);
138 assert(lvalue);
139 assert(rvalue);
140 assert(m);
141
3e684349 142 if (isempty(rvalue))
5cb36f41 143 /* Empty assignment means clear the list */
4b95f179 144 dns_server_unlink_all(manager_get_first_dns_server(m, ltype));
3e684349 145 else {
b938cb90 146 /* Otherwise, add to the list */
636e813d 147 r = manager_parse_dns_server_string_and_warn(m, ltype, rvalue);
5cb36f41 148 if (r < 0) {
12ca818f 149 log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse DNS server string '%s'. Ignoring.", rvalue);
5cb36f41
LP
150 return 0;
151 }
4e945a6f
LP
152 }
153
5cb36f41
LP
154 /* If we have a manual setting, then we stop reading
155 * /etc/resolv.conf */
156 if (ltype == DNS_SERVER_SYSTEM)
157 m->read_resolv_conf = false;
00fa60ae
LP
158 if (ltype == DNS_SERVER_FALLBACK)
159 m->need_builtin_fallbacks = false;
5cb36f41 160
4e945a6f
LP
161 return 0;
162}
163
a51c1048
LP
164int config_parse_search_domains(
165 const char *unit,
166 const char *filename,
167 unsigned line,
168 const char *section,
169 unsigned section_line,
170 const char *lvalue,
171 int ltype,
172 const char *rvalue,
173 void *data,
174 void *userdata) {
175
176 Manager *m = userdata;
177 int r;
178
179 assert(filename);
180 assert(lvalue);
181 assert(rvalue);
182 assert(m);
183
184 if (isempty(rvalue))
185 /* Empty assignment means clear the list */
186 dns_search_domain_unlink_all(m->search_domains);
187 else {
188 /* Otherwise, add to the list */
189 r = manager_parse_search_domains_and_warn(m, rvalue);
190 if (r < 0) {
191 log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse search domains string '%s'. Ignoring.", rvalue);
192 return 0;
193 }
194 }
195
196 /* If we have a manual setting, then we stop reading
197 * /etc/resolv.conf */
198 m->read_resolv_conf = false;
199
200 return 0;
201}
202
24710c48
LP
203int config_parse_dnssec(
204 const char *unit,
205 const char *filename,
206 unsigned line,
207 const char *section,
208 unsigned section_line,
209 const char *lvalue,
210 int ltype,
211 const char *rvalue,
212 void *data,
213 void *userdata) {
214
215 Manager *m = data;
216 DnssecMode mode;
217 int r;
218
219 assert(filename);
220 assert(lvalue);
221 assert(rvalue);
222
223 mode = dnssec_mode_from_string(rvalue);
224 if (mode < 0) {
225 r = parse_boolean(rvalue);
226 if (r < 0) {
227 log_syntax(unit, LOG_ERR, filename, line, r, "Failed to parse DNSSEC mode '%s'. Ignoring.", rvalue);
228 return 0;
229 }
230
231 mode = r ? DNSSEC_YES : DNSSEC_NO;
232 }
233
234 m->unicast_scope->dnssec_mode = mode;
235 return 0;
236}
237
4e945a6f 238int manager_parse_config_file(Manager *m) {
00fa60ae
LP
239 int r;
240
4e945a6f
LP
241 assert(m);
242
00fa60ae
LP
243 r = config_parse_many(PKGSYSCONFDIR "/resolved.conf",
244 CONF_PATHS_NULSTR("systemd/resolved.conf.d"),
245 "Resolve\0",
246 config_item_perf_lookup, resolved_gperf_lookup,
247 false, m);
248 if (r < 0)
249 return r;
250
251 if (m->need_builtin_fallbacks) {
252 r = manager_parse_dns_server_string_and_warn(m, DNS_SERVER_FALLBACK, DNS_SERVERS);
253 if (r < 0)
254 return r;
255 }
256
257 return 0;
258
4e945a6f 259}