]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-link-bus.c
resolved: support IPv6 DNS servers on the local link
[thirdparty/systemd.git] / src / resolve / resolved-link-bus.c
CommitLineData
3abaabda
LP
1/***
2 This file is part of systemd.
3
4 Copyright 2016 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18***/
19
20#include "alloc-util.h"
21#include "bus-util.h"
22#include "parse-util.h"
23#include "resolve-util.h"
24#include "resolved-bus.h"
25#include "resolved-link-bus.h"
26#include "strv.h"
27
28static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_resolve_support, resolve_support, ResolveSupport);
29static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_dnssec_mode, dnssec_mode, DnssecMode);
30
31static int property_get_dns(
32 sd_bus *bus,
33 const char *path,
34 const char *interface,
35 const char *property,
36 sd_bus_message *reply,
37 void *userdata,
38 sd_bus_error *error) {
39
40 Link *l = userdata;
41 DnsServer *s;
42 int r;
43
44 assert(reply);
45 assert(l);
46
47 r = sd_bus_message_open_container(reply, 'a', "(iay)");
48 if (r < 0)
49 return r;
50
51 LIST_FOREACH(servers, s, l->dns_servers) {
52 r = bus_dns_server_append(reply, s, false);
53 if (r < 0)
54 return r;
55 }
56
57 return sd_bus_message_close_container(reply);
58}
59
60static int property_get_domains(
61 sd_bus *bus,
62 const char *path,
63 const char *interface,
64 const char *property,
65 sd_bus_message *reply,
66 void *userdata,
67 sd_bus_error *error) {
68
69 Link *l = userdata;
70 DnsSearchDomain *d;
71 int r;
72
73 assert(reply);
74 assert(l);
75
ad44b56b 76 r = sd_bus_message_open_container(reply, 'a', "(sb)");
3abaabda
LP
77 if (r < 0)
78 return r;
79
80 LIST_FOREACH(domains, d, l->search_domains) {
ad44b56b 81 r = sd_bus_message_append(reply, "(sb)", d->name, d->route_only);
3abaabda
LP
82 if (r < 0)
83 return r;
84 }
85
86 return sd_bus_message_close_container(reply);
87}
88
89static int property_get_scopes_mask(
90 sd_bus *bus,
91 const char *path,
92 const char *interface,
93 const char *property,
94 sd_bus_message *reply,
95 void *userdata,
96 sd_bus_error *error) {
97
98 Link *l = userdata;
99 uint64_t mask;
100
101 assert(reply);
102 assert(l);
103
104 mask = (l->unicast_scope ? SD_RESOLVED_DNS : 0) |
105 (l->llmnr_ipv4_scope ? SD_RESOLVED_LLMNR_IPV4 : 0) |
106 (l->llmnr_ipv6_scope ? SD_RESOLVED_LLMNR_IPV6 : 0) |
107 (l->mdns_ipv4_scope ? SD_RESOLVED_MDNS_IPV4 : 0) |
108 (l->mdns_ipv6_scope ? SD_RESOLVED_MDNS_IPV6 : 0);
109
110 return sd_bus_message_append(reply, "t", mask);
111}
112
113static int property_get_ntas(
114 sd_bus *bus,
115 const char *path,
116 const char *interface,
117 const char *property,
118 sd_bus_message *reply,
119 void *userdata,
120 sd_bus_error *error) {
121
122 Link *l = userdata;
123 const char *name;
124 Iterator i;
125 int r;
126
127 assert(reply);
128 assert(l);
129
130 r = sd_bus_message_open_container(reply, 'a', "s");
131 if (r < 0)
132 return r;
133
134 SET_FOREACH(name, l->dnssec_negative_trust_anchors, i) {
135 r = sd_bus_message_append(reply, "s", name);
136 if (r < 0)
137 return r;
138 }
139
140 return sd_bus_message_close_container(reply);
141}
142
c69fa7e3
LP
143static int property_get_dnssec_supported(
144 sd_bus *bus,
145 const char *path,
146 const char *interface,
147 const char *property,
148 sd_bus_message *reply,
149 void *userdata,
150 sd_bus_error *error) {
151
152 Link *l = userdata;
153
154 assert(reply);
155 assert(l);
156
157 return sd_bus_message_append(reply, "b", link_dnssec_supported(l));
158}
159
d2ec6608
LP
160int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_bus_error *error) {
161 _cleanup_free_ struct in_addr_data *dns = NULL;
162 size_t allocated = 0, n = 0;
163 Link *l = userdata;
164 unsigned i;
165 int r;
166
167 assert(message);
168 assert(l);
169
170 r = sd_bus_message_enter_container(message, 'a', "(iay)");
171 if (r < 0)
172 return r;
173
174 for (;;) {
175 int family;
176 size_t sz;
177 const void *d;
178
179 assert_cc(sizeof(int) == sizeof(int32_t));
180
181 r = sd_bus_message_enter_container(message, 'r', "iay");
182 if (r < 0)
183 return r;
184 if (r == 0)
185 break;
186
187 r = sd_bus_message_read(message, "i", &family);
188 if (r < 0)
189 return r;
190
191 if (!IN_SET(family, AF_INET, AF_INET6))
192 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown address family %i", family);
193
194 r = sd_bus_message_read_array(message, 'y', &d, &sz);
195 if (r < 0)
196 return r;
197 if (sz != FAMILY_ADDRESS_SIZE(family))
198 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid address size");
199
200 r = sd_bus_message_exit_container(message);
201 if (r < 0)
202 return r;
203
204 if (!GREEDY_REALLOC(dns, allocated, n+1))
205 return -ENOMEM;
206
207 dns[n].family = family;
208 memcpy(&dns[n].address, d, sz);
209 n++;
210 }
211
212 r = sd_bus_message_exit_container(message);
213 if (r < 0)
214 return r;
215
216 dns_server_mark_all(l->dns_servers);
217
218 for (i = 0; i < n; i++) {
219 DnsServer *s;
220
2817157b 221 s = dns_server_find(l->dns_servers, dns[i].family, &dns[i].address, 0);
d2ec6608
LP
222 if (s)
223 dns_server_move_back_and_unmark(s);
224 else {
2817157b 225 r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, dns[i].family, &dns[i].address, 0);
d2ec6608
LP
226 if (r < 0)
227 goto clear;
228 }
229
230 }
231
232 dns_server_unlink_marked(l->dns_servers);
233 link_allocate_scopes(l);
234
235 return sd_bus_reply_method_return(message, NULL);
236
237clear:
238 dns_server_unlink_all(l->dns_servers);
239 return r;
240}
241
ee116b54 242int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d2ec6608 243 Link *l = userdata;
d2ec6608
LP
244 int r;
245
246 assert(message);
247 assert(l);
248
ad44b56b 249 r = sd_bus_message_enter_container(message, 'a', "(sb)");
d2ec6608
LP
250 if (r < 0)
251 return r;
252
ad44b56b
LP
253 for (;;) {
254 const char *name;
255 int route_only;
d2ec6608 256
ad44b56b 257 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
d2ec6608
LP
258 if (r < 0)
259 return r;
260 if (r == 0)
ad44b56b
LP
261 break;
262
263 r = dns_name_is_valid(name);
264 if (r < 0)
265 return r;
266 if (r == 0)
267 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid search domain %s", name);
268 if (!route_only && dns_name_is_root(name))
d2ec6608
LP
269 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Root domain is not suitable as search domain");
270 }
271
272 dns_search_domain_mark_all(l->search_domains);
273
ad44b56b
LP
274 r = sd_bus_message_rewind(message, false);
275 if (r < 0)
276 return r;
277
278 for (;;) {
d2ec6608 279 DnsSearchDomain *d;
ad44b56b
LP
280 const char *name;
281 int route_only;
d2ec6608 282
ad44b56b
LP
283 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
284 if (r < 0)
285 goto clear;
286 if (r == 0)
287 break;
288
289 r = dns_search_domain_find(l->search_domains, name, &d);
d2ec6608
LP
290 if (r < 0)
291 goto clear;
292
293 if (r > 0)
294 dns_search_domain_move_back_and_unmark(d);
295 else {
ad44b56b 296 r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name);
d2ec6608
LP
297 if (r < 0)
298 goto clear;
299 }
ad44b56b
LP
300
301 d->route_only = route_only;
d2ec6608
LP
302 }
303
ad44b56b
LP
304 r = sd_bus_message_exit_container(message);
305 if (r < 0)
306 goto clear;
307
d2ec6608
LP
308 dns_search_domain_unlink_marked(l->search_domains);
309 return sd_bus_reply_method_return(message, NULL);
310
311clear:
312 dns_search_domain_unlink_all(l->search_domains);
313 return r;
314}
315
316int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error) {
317 Link *l = userdata;
318 ResolveSupport mode;
319 const char *llmnr;
320 int r;
321
322 assert(message);
323 assert(l);
324
325 r = sd_bus_message_read(message, "s", &llmnr);
326 if (r < 0)
327 return r;
328
329 if (isempty(llmnr))
330 mode = RESOLVE_SUPPORT_YES;
331 else {
332 mode = resolve_support_from_string(llmnr);
333 if (mode < 0)
334 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid LLMNR setting: %s", llmnr);
335 }
336
337 l->llmnr_support = mode;
338 link_allocate_scopes(l);
339 link_add_rrs(l, false);
340
341 return sd_bus_reply_method_return(message, NULL);
342}
343
344int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error) {
345 Link *l = userdata;
346 ResolveSupport mode;
347 const char *mdns;
348 int r;
349
350 assert(message);
351 assert(l);
352
353 r = sd_bus_message_read(message, "s", &mdns);
354 if (r < 0)
355 return r;
356
357 if (isempty(mdns))
358 mode = RESOLVE_SUPPORT_NO;
359 else {
360 mode = resolve_support_from_string(mdns);
361 if (mode < 0)
362 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid MulticastDNS setting: %s", mdns);
363 }
364
365 l->mdns_support = mode;
366 link_allocate_scopes(l);
367 link_add_rrs(l, false);
368
369 return sd_bus_reply_method_return(message, NULL);
370}
371
372int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) {
373 Link *l = userdata;
374 const char *dnssec;
375 DnssecMode mode;
376 int r;
377
378 assert(message);
379 assert(l);
380
381 r = sd_bus_message_read(message, "s", &dnssec);
382 if (r < 0)
383 return r;
384
385 if (isempty(dnssec))
386 mode = _DNSSEC_MODE_INVALID;
387 else {
388 mode = dnssec_mode_from_string(dnssec);
389 if (mode < 0)
390 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSSEC setting: %s", dnssec);
391 }
392
393 link_set_dnssec_mode(l, mode);
394
395 return sd_bus_reply_method_return(message, NULL);
396}
397
398int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error) {
399 _cleanup_set_free_free_ Set *ns = NULL;
400 _cleanup_free_ char **ntas = NULL;
401 Link *l = userdata;
402 int r;
403 char **i;
404
405 assert(message);
406 assert(l);
407
408 r = sd_bus_message_read_strv(message, &ntas);
409 if (r < 0)
410 return r;
411
412 STRV_FOREACH(i, ntas) {
413 r = dns_name_is_valid(*i);
414 if (r < 0)
415 return r;
416 if (r == 0)
55abd6da 417 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid negative trust anchor domain: %s", *i);
d2ec6608
LP
418 }
419
420 ns = set_new(&dns_name_hash_ops);
421 if (!ns)
422 return -ENOMEM;
423
424 STRV_FOREACH(i, ntas) {
425 r = set_put_strdup(ns, *i);
426 if (r < 0)
427 return r;
428 }
429
430 set_free_free(l->dnssec_negative_trust_anchors);
431 l->dnssec_negative_trust_anchors = ns;
432 ns = NULL;
433
434 return sd_bus_reply_method_return(message, NULL);
435}
436
437int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error) {
438 Link *l = userdata;
439
440 assert(message);
441 assert(l);
442
443 link_flush_settings(l);
444 link_allocate_scopes(l);
445 link_add_rrs(l, false);
446
447 return sd_bus_reply_method_return(message, NULL);
448}
449
3abaabda
LP
450const sd_bus_vtable link_vtable[] = {
451 SD_BUS_VTABLE_START(0),
452
453 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask, 0, 0),
454 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns, 0, 0),
ad44b56b 455 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0),
3abaabda
LP
456 SD_BUS_PROPERTY("LLMNR", "s", property_get_resolve_support, offsetof(Link, llmnr_support), 0),
457 SD_BUS_PROPERTY("MulticastDNS", "s", property_get_resolve_support, offsetof(Link, mdns_support), 0),
458 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, offsetof(Link, dnssec_mode), 0),
459 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0),
c2cf6e0b 460 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0),
3abaabda 461
d2ec6608 462 SD_BUS_METHOD("SetDNS", "a(iay)", NULL, bus_link_method_set_dns_servers, 0),
ee116b54 463 SD_BUS_METHOD("SetDomains", "a(sb)", NULL, bus_link_method_set_domains, 0),
d2ec6608
LP
464 SD_BUS_METHOD("SetLLMNR", "s", NULL, bus_link_method_set_llmnr, 0),
465 SD_BUS_METHOD("SetMulticastDNS", "s", NULL, bus_link_method_set_mdns, 0),
466 SD_BUS_METHOD("SetDNSSEC", "s", NULL, bus_link_method_set_dnssec, 0),
467 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL, bus_link_method_set_dnssec_negative_trust_anchors, 0),
468 SD_BUS_METHOD("Revert", NULL, NULL, bus_link_method_revert, 0),
469
3abaabda
LP
470 SD_BUS_VTABLE_END
471};
472
473int link_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
474 _cleanup_free_ char *e = NULL;
475 Manager *m = userdata;
476 int ifindex;
477 Link *link;
478 int r;
479
480 assert(bus);
481 assert(path);
482 assert(interface);
483 assert(found);
484 assert(m);
485
486 r = sd_bus_path_decode(path, "/org/freedesktop/resolve1/link", &e);
487 if (r <= 0)
488 return 0;
489
490 r = parse_ifindex(e, &ifindex);
491 if (r < 0)
492 return 0;
493
494 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
495 if (!link)
496 return 0;
497
498 *found = link;
499 return 1;
500}
501
502char *link_bus_path(Link *link) {
503 _cleanup_free_ char *ifindex = NULL;
504 char *p;
505 int r;
506
507 assert(link);
508
509 if (asprintf(&ifindex, "%i", link->ifindex) < 0)
510 return NULL;
511
512 r = sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex, &p);
513 if (r < 0)
514 return NULL;
515
516 return p;
517}
518
519int link_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
520 _cleanup_strv_free_ char **l = NULL;
521 Manager *m = userdata;
522 Link *link;
523 Iterator i;
524 unsigned c = 0;
525
526 assert(bus);
527 assert(path);
528 assert(m);
529 assert(nodes);
530
531 l = new0(char*, hashmap_size(m->links) + 1);
532 if (!l)
533 return -ENOMEM;
534
535 HASHMAP_FOREACH(link, m->links, i) {
536 char *p;
537
538 p = link_bus_path(link);
539 if (!p)
540 return -ENOMEM;
541
542 l[c++] = p;
543 }
544
545 l[c] = NULL;
546 *nodes = l;
547 l = NULL;
548
549 return 1;
550}