]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-link-bus.c
resolve: add DBus method to set DNS server with port number and SNI
[thirdparty/systemd.git] / src / resolve / resolved-link-bus.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
3abaabda 2
6ff79f76 3#include <net/if.h>
52aaef0f
ZJS
4#include <netinet/in.h>
5#include <sys/capability.h>
6ff79f76 6
3abaabda 7#include "alloc-util.h"
04b764bf 8#include "bus-common-errors.h"
40af3d02 9#include "bus-get-properties.h"
269e4d2d 10#include "bus-polkit.h"
3abaabda
LP
11#include "parse-util.h"
12#include "resolve-util.h"
13#include "resolved-bus.h"
14#include "resolved-link-bus.h"
7207052d 15#include "resolved-resolv-conf.h"
95ce1ba8 16#include "socket-netlink.h"
0a6c0745 17#include "stdio-util.h"
3abaabda 18#include "strv.h"
52aaef0f 19#include "user-util.h"
3abaabda 20
acd380c4
YW
21static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported, "b", Link, link_dnssec_supported);
22static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode, "s", Link, link_get_dnssec_mode, dnssec_mode_to_string);
3abaabda 23
c9299be2 24static int property_get_dns_over_tls_mode(
d050561a
IT
25 sd_bus *bus,
26 const char *path,
27 const char *interface,
28 const char *property,
29 sd_bus_message *reply,
30 void *userdata,
31 sd_bus_error *error) {
32
33 Link *l = userdata;
34
35 assert(reply);
36 assert(l);
37
c9299be2 38 return sd_bus_message_append(reply, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l)));
d050561a
IT
39}
40
3abaabda
LP
41static int property_get_dns(
42 sd_bus *bus,
43 const char *path,
44 const char *interface,
45 const char *property,
46 sd_bus_message *reply,
47 void *userdata,
48 sd_bus_error *error) {
49
50 Link *l = userdata;
51 DnsServer *s;
52 int r;
53
54 assert(reply);
55 assert(l);
56
57 r = sd_bus_message_open_container(reply, 'a', "(iay)");
58 if (r < 0)
59 return r;
60
61 LIST_FOREACH(servers, s, l->dns_servers) {
62 r = bus_dns_server_append(reply, s, false);
63 if (r < 0)
64 return r;
65 }
66
67 return sd_bus_message_close_container(reply);
68}
69
b7ac92cd
YW
70static int property_get_current_dns_server(
71 sd_bus *bus,
72 const char *path,
73 const char *interface,
74 const char *property,
75 sd_bus_message *reply,
76 void *userdata,
77 sd_bus_error *error) {
78
79 DnsServer *s;
80
81 assert(reply);
82 assert(userdata);
83
84 s = *(DnsServer **) userdata;
85
86 return bus_dns_server_append(reply, s, false);
87}
88
3abaabda
LP
89static int property_get_domains(
90 sd_bus *bus,
91 const char *path,
92 const char *interface,
93 const char *property,
94 sd_bus_message *reply,
95 void *userdata,
96 sd_bus_error *error) {
97
98 Link *l = userdata;
99 DnsSearchDomain *d;
100 int r;
101
102 assert(reply);
103 assert(l);
104
ad44b56b 105 r = sd_bus_message_open_container(reply, 'a', "(sb)");
3abaabda
LP
106 if (r < 0)
107 return r;
108
109 LIST_FOREACH(domains, d, l->search_domains) {
ad44b56b 110 r = sd_bus_message_append(reply, "(sb)", d->name, d->route_only);
3abaabda
LP
111 if (r < 0)
112 return r;
113 }
114
115 return sd_bus_message_close_container(reply);
116}
117
77673795
LP
118static int property_get_default_route(
119 sd_bus *bus,
120 const char *path,
121 const char *interface,
122 const char *property,
123 sd_bus_message *reply,
124 void *userdata,
125 sd_bus_error *error) {
126
127 Link *l = userdata;
128
129 assert(reply);
130 assert(l);
131
132 /* Return what is configured, if there's something configured */
133 if (l->default_route >= 0)
134 return sd_bus_message_append(reply, "b", l->default_route);
135
136 /* Otherwise report what is in effect */
137 if (l->unicast_scope)
138 return sd_bus_message_append(reply, "b", dns_scope_is_default_route(l->unicast_scope));
139
140 return sd_bus_message_append(reply, "b", false);
141}
142
3abaabda
LP
143static int property_get_scopes_mask(
144 sd_bus *bus,
145 const char *path,
146 const char *interface,
147 const char *property,
148 sd_bus_message *reply,
149 void *userdata,
150 sd_bus_error *error) {
151
152 Link *l = userdata;
153 uint64_t mask;
154
155 assert(reply);
156 assert(l);
157
158 mask = (l->unicast_scope ? SD_RESOLVED_DNS : 0) |
159 (l->llmnr_ipv4_scope ? SD_RESOLVED_LLMNR_IPV4 : 0) |
160 (l->llmnr_ipv6_scope ? SD_RESOLVED_LLMNR_IPV6 : 0) |
161 (l->mdns_ipv4_scope ? SD_RESOLVED_MDNS_IPV4 : 0) |
162 (l->mdns_ipv6_scope ? SD_RESOLVED_MDNS_IPV6 : 0);
163
164 return sd_bus_message_append(reply, "t", mask);
165}
166
167static int property_get_ntas(
168 sd_bus *bus,
169 const char *path,
170 const char *interface,
171 const char *property,
172 sd_bus_message *reply,
173 void *userdata,
174 sd_bus_error *error) {
175
176 Link *l = userdata;
177 const char *name;
178 Iterator i;
179 int r;
180
181 assert(reply);
182 assert(l);
183
184 r = sd_bus_message_open_container(reply, 'a', "s");
185 if (r < 0)
186 return r;
187
188 SET_FOREACH(name, l->dnssec_negative_trust_anchors, i) {
189 r = sd_bus_message_append(reply, "s", name);
190 if (r < 0)
191 return r;
192 }
193
194 return sd_bus_message_close_container(reply);
195}
196
04b764bf
LP
197static int verify_unmanaged_link(Link *l, sd_bus_error *error) {
198 assert(l);
199
200 if (l->flags & IFF_LOOPBACK)
6ff79f76 201 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is loopback device.", l->ifname);
04b764bf 202 if (l->is_managed)
6ff79f76 203 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is managed.", l->ifname);
04b764bf
LP
204
205 return 0;
206}
207
95ce1ba8
YW
208static int bus_link_method_set_dns_servers_internal(sd_bus_message *message, void *userdata, sd_bus_error *error, bool extended) {
209 struct in_addr_full **dns = NULL;
d2ec6608
LP
210 size_t allocated = 0, n = 0;
211 Link *l = userdata;
d2ec6608
LP
212 int r;
213
214 assert(message);
215 assert(l);
216
04b764bf
LP
217 r = verify_unmanaged_link(l, error);
218 if (r < 0)
219 return r;
220
95ce1ba8 221 r = sd_bus_message_enter_container(message, 'a', extended ? "(iayqs)" : "(iay)");
d2ec6608
LP
222 if (r < 0)
223 return r;
224
225 for (;;) {
95ce1ba8
YW
226 const char *server_name = NULL;
227 union in_addr_union a;
228 uint16_t port = 0;
229 const void *d;
d2ec6608
LP
230 int family;
231 size_t sz;
d2ec6608
LP
232
233 assert_cc(sizeof(int) == sizeof(int32_t));
234
95ce1ba8 235 r = sd_bus_message_enter_container(message, 'r', extended ? "iayqs" : "iay");
d2ec6608 236 if (r < 0)
95ce1ba8 237 goto finalize;
d2ec6608
LP
238 if (r == 0)
239 break;
240
241 r = sd_bus_message_read(message, "i", &family);
242 if (r < 0)
95ce1ba8 243 goto finalize;
d2ec6608 244
95ce1ba8
YW
245 if (!IN_SET(family, AF_INET, AF_INET6)) {
246 r = sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown address family %i", family);
247 goto finalize;
248 }
d2ec6608
LP
249
250 r = sd_bus_message_read_array(message, 'y', &d, &sz);
251 if (r < 0)
95ce1ba8
YW
252 goto finalize;
253 if (sz != FAMILY_ADDRESS_SIZE(family)) {
254 r = sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid address size");
255 goto finalize;
256 }
257
258 if (!dns_server_address_valid(family, d)) {
259 r = sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNS server address");
260 goto finalize;
261 }
262
263 if (extended) {
264 r = sd_bus_message_read(message, "q", &port);
265 if (r < 0)
266 goto finalize;
d2ec6608 267
95ce1ba8
YW
268 if (IN_SET(port, 53, 853))
269 port = 0;
270
271 r = sd_bus_message_read(message, "s", &server_name);
272 if (r < 0)
273 goto finalize;
274 }
b30bf55d 275
d2ec6608
LP
276 r = sd_bus_message_exit_container(message);
277 if (r < 0)
95ce1ba8 278 goto finalize;
d2ec6608 279
95ce1ba8
YW
280 if (!GREEDY_REALLOC(dns, allocated, n+1)) {
281 r = -ENOMEM;
282 goto finalize;
283 }
d2ec6608 284
95ce1ba8
YW
285 memcpy(&a, d, sz);
286 r = in_addr_full_new(family, &a, port, 0, server_name, dns + n);
287 if (r < 0)
288 goto finalize;
d2ec6608
LP
289 n++;
290 }
291
292 r = sd_bus_message_exit_container(message);
293 if (r < 0)
95ce1ba8 294 goto finalize;
d2ec6608 295
52aaef0f
ZJS
296 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
297 "org.freedesktop.resolve1.set-dns-servers",
298 NULL, true, UID_INVALID,
299 &l->manager->polkit_registry, error);
300 if (r < 0)
95ce1ba8
YW
301 goto finalize;
302 if (r == 0) {
303 r = 1; /* Polkit will call us back */
304 goto finalize;
305 }
52aaef0f 306
d2ec6608
LP
307 dns_server_mark_all(l->dns_servers);
308
95ce1ba8 309 for (size_t i = 0; i < n; i++) {
d2ec6608
LP
310 DnsServer *s;
311
95ce1ba8 312 s = dns_server_find(l->dns_servers, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
d2ec6608
LP
313 if (s)
314 dns_server_move_back_and_unmark(s);
315 else {
95ce1ba8
YW
316 r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, dns[i]->family, &dns[i]->address, dns[i]->port, 0, dns[i]->server_name);
317 if (r < 0) {
318 dns_server_unlink_all(l->dns_servers);
319 goto finalize;
320 }
d2ec6608
LP
321 }
322
323 }
324
325 dns_server_unlink_marked(l->dns_servers);
326 link_allocate_scopes(l);
327
943ef07c 328 (void) link_save_user(l);
7207052d 329 (void) manager_write_resolv_conf(l->manager);
5f3340ca 330 (void) manager_send_changed(l->manager, "DNS");
7207052d 331
95ce1ba8
YW
332 r = sd_bus_reply_method_return(message, NULL);
333
334finalize:
335 for (size_t i = 0; i < n; i++)
336 in_addr_full_free(dns[i]);
337 free(dns);
d2ec6608 338
d2ec6608
LP
339 return r;
340}
341
95ce1ba8
YW
342int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_bus_error *error) {
343 return bus_link_method_set_dns_servers_internal(message, userdata, error, false);
344}
345
346int bus_link_method_set_dns_servers_ex(sd_bus_message *message, void *userdata, sd_bus_error *error) {
347 return bus_link_method_set_dns_servers_internal(message, userdata, error, true);
348}
349
ee116b54 350int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d2ec6608 351 Link *l = userdata;
d2ec6608
LP
352 int r;
353
354 assert(message);
355 assert(l);
356
04b764bf
LP
357 r = verify_unmanaged_link(l, error);
358 if (r < 0)
359 return r;
360
ad44b56b 361 r = sd_bus_message_enter_container(message, 'a', "(sb)");
d2ec6608
LP
362 if (r < 0)
363 return r;
364
ad44b56b
LP
365 for (;;) {
366 const char *name;
367 int route_only;
d2ec6608 368
ad44b56b 369 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
d2ec6608
LP
370 if (r < 0)
371 return r;
372 if (r == 0)
ad44b56b
LP
373 break;
374
375 r = dns_name_is_valid(name);
376 if (r < 0)
377 return r;
378 if (r == 0)
379 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid search domain %s", name);
380 if (!route_only && dns_name_is_root(name))
d2ec6608
LP
381 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Root domain is not suitable as search domain");
382 }
383
ad44b56b
LP
384 r = sd_bus_message_rewind(message, false);
385 if (r < 0)
386 return r;
387
52aaef0f
ZJS
388 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
389 "org.freedesktop.resolve1.set-domains",
390 NULL, true, UID_INVALID,
391 &l->manager->polkit_registry, error);
392 if (r < 0)
393 return r;
394 if (r == 0)
395 return 1; /* Polkit will call us back */
396
397 dns_search_domain_mark_all(l->search_domains);
398
ad44b56b 399 for (;;) {
d2ec6608 400 DnsSearchDomain *d;
ad44b56b
LP
401 const char *name;
402 int route_only;
d2ec6608 403
ad44b56b
LP
404 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
405 if (r < 0)
406 goto clear;
407 if (r == 0)
408 break;
409
410 r = dns_search_domain_find(l->search_domains, name, &d);
d2ec6608
LP
411 if (r < 0)
412 goto clear;
413
414 if (r > 0)
415 dns_search_domain_move_back_and_unmark(d);
416 else {
ad44b56b 417 r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name);
d2ec6608
LP
418 if (r < 0)
419 goto clear;
420 }
ad44b56b
LP
421
422 d->route_only = route_only;
d2ec6608
LP
423 }
424
ad44b56b
LP
425 r = sd_bus_message_exit_container(message);
426 if (r < 0)
427 goto clear;
428
d2ec6608 429 dns_search_domain_unlink_marked(l->search_domains);
7207052d 430
943ef07c 431 (void) link_save_user(l);
7207052d
LP
432 (void) manager_write_resolv_conf(l->manager);
433
d2ec6608
LP
434 return sd_bus_reply_method_return(message, NULL);
435
436clear:
437 dns_search_domain_unlink_all(l->search_domains);
438 return r;
439}
440
77673795
LP
441int bus_link_method_set_default_route(sd_bus_message *message, void *userdata, sd_bus_error *error) {
442 Link *l = userdata;
443 int r, b;
444
445 assert(message);
446 assert(l);
447
448 r = verify_unmanaged_link(l, error);
449 if (r < 0)
450 return r;
451
452 r = sd_bus_message_read(message, "b", &b);
453 if (r < 0)
454 return r;
455
52aaef0f
ZJS
456 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
457 "org.freedesktop.resolve1.set-default-route",
458 NULL, true, UID_INVALID,
459 &l->manager->polkit_registry, error);
460 if (r < 0)
461 return r;
462 if (r == 0)
463 return 1; /* Polkit will call us back */
464
77673795
LP
465 if (l->default_route != b) {
466 l->default_route = b;
467
468 (void) link_save_user(l);
469 (void) manager_write_resolv_conf(l->manager);
470 }
471
472 return sd_bus_reply_method_return(message, NULL);
473}
474
d2ec6608
LP
475int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error) {
476 Link *l = userdata;
477 ResolveSupport mode;
478 const char *llmnr;
479 int r;
480
481 assert(message);
482 assert(l);
483
04b764bf
LP
484 r = verify_unmanaged_link(l, error);
485 if (r < 0)
486 return r;
487
d2ec6608
LP
488 r = sd_bus_message_read(message, "s", &llmnr);
489 if (r < 0)
490 return r;
491
492 if (isempty(llmnr))
493 mode = RESOLVE_SUPPORT_YES;
494 else {
495 mode = resolve_support_from_string(llmnr);
496 if (mode < 0)
497 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid LLMNR setting: %s", llmnr);
498 }
499
52aaef0f
ZJS
500 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
501 "org.freedesktop.resolve1.set-llmnr",
502 NULL, true, UID_INVALID,
503 &l->manager->polkit_registry, error);
504 if (r < 0)
505 return r;
506 if (r == 0)
507 return 1; /* Polkit will call us back */
508
d2ec6608
LP
509 l->llmnr_support = mode;
510 link_allocate_scopes(l);
511 link_add_rrs(l, false);
512
943ef07c
LP
513 (void) link_save_user(l);
514
d2ec6608
LP
515 return sd_bus_reply_method_return(message, NULL);
516}
517
518int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error) {
519 Link *l = userdata;
520 ResolveSupport mode;
521 const char *mdns;
522 int r;
523
524 assert(message);
525 assert(l);
526
04b764bf
LP
527 r = verify_unmanaged_link(l, error);
528 if (r < 0)
529 return r;
530
d2ec6608
LP
531 r = sd_bus_message_read(message, "s", &mdns);
532 if (r < 0)
533 return r;
534
535 if (isempty(mdns))
536 mode = RESOLVE_SUPPORT_NO;
537 else {
538 mode = resolve_support_from_string(mdns);
539 if (mode < 0)
540 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid MulticastDNS setting: %s", mdns);
541 }
542
52aaef0f
ZJS
543 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
544 "org.freedesktop.resolve1.set-mdns",
545 NULL, true, UID_INVALID,
546 &l->manager->polkit_registry, error);
547 if (r < 0)
548 return r;
549 if (r == 0)
550 return 1; /* Polkit will call us back */
551
d2ec6608
LP
552 l->mdns_support = mode;
553 link_allocate_scopes(l);
554 link_add_rrs(l, false);
555
943ef07c
LP
556 (void) link_save_user(l);
557
d2ec6608
LP
558 return sd_bus_reply_method_return(message, NULL);
559}
560
c9299be2 561int bus_link_method_set_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d050561a 562 Link *l = userdata;
c9299be2
IT
563 const char *dns_over_tls;
564 DnsOverTlsMode mode;
d050561a
IT
565 int r;
566
567 assert(message);
568 assert(l);
569
570 r = verify_unmanaged_link(l, error);
571 if (r < 0)
572 return r;
573
c9299be2 574 r = sd_bus_message_read(message, "s", &dns_over_tls);
d050561a
IT
575 if (r < 0)
576 return r;
577
c9299be2
IT
578 if (isempty(dns_over_tls))
579 mode = _DNS_OVER_TLS_MODE_INVALID;
d050561a 580 else {
c9299be2 581 mode = dns_over_tls_mode_from_string(dns_over_tls);
d050561a 582 if (mode < 0)
c9299be2 583 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSOverTLS setting: %s", dns_over_tls);
d050561a
IT
584 }
585
52aaef0f
ZJS
586 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
587 "org.freedesktop.resolve1.set-dns-over-tls",
588 NULL, true, UID_INVALID,
589 &l->manager->polkit_registry, error);
590 if (r < 0)
591 return r;
592 if (r == 0)
593 return 1; /* Polkit will call us back */
594
c9299be2 595 link_set_dns_over_tls_mode(l, mode);
d050561a
IT
596
597 (void) link_save_user(l);
598
599 return sd_bus_reply_method_return(message, NULL);
600}
601
d2ec6608
LP
602int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) {
603 Link *l = userdata;
604 const char *dnssec;
605 DnssecMode mode;
606 int r;
607
608 assert(message);
609 assert(l);
610
04b764bf
LP
611 r = verify_unmanaged_link(l, error);
612 if (r < 0)
613 return r;
614
d2ec6608
LP
615 r = sd_bus_message_read(message, "s", &dnssec);
616 if (r < 0)
617 return r;
618
619 if (isempty(dnssec))
620 mode = _DNSSEC_MODE_INVALID;
621 else {
622 mode = dnssec_mode_from_string(dnssec);
623 if (mode < 0)
624 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSSEC setting: %s", dnssec);
625 }
626
52aaef0f
ZJS
627 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
628 "org.freedesktop.resolve1.set-dnssec",
629 NULL, true, UID_INVALID,
630 &l->manager->polkit_registry, error);
631 if (r < 0)
632 return r;
633 if (r == 0)
634 return 1; /* Polkit will call us back */
635
d2ec6608
LP
636 link_set_dnssec_mode(l, mode);
637
943ef07c
LP
638 (void) link_save_user(l);
639
d2ec6608
LP
640 return sd_bus_reply_method_return(message, NULL);
641}
642
643int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error) {
644 _cleanup_set_free_free_ Set *ns = NULL;
c6d92582 645 _cleanup_strv_free_ char **ntas = NULL;
d2ec6608
LP
646 Link *l = userdata;
647 int r;
648 char **i;
649
650 assert(message);
651 assert(l);
652
04b764bf
LP
653 r = verify_unmanaged_link(l, error);
654 if (r < 0)
655 return r;
656
ab77c879
ZJS
657 ns = set_new(&dns_name_hash_ops);
658 if (!ns)
659 return -ENOMEM;
660
d2ec6608
LP
661 r = sd_bus_message_read_strv(message, &ntas);
662 if (r < 0)
663 return r;
664
665 STRV_FOREACH(i, ntas) {
666 r = dns_name_is_valid(*i);
667 if (r < 0)
668 return r;
669 if (r == 0)
ab77c879
ZJS
670 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS,
671 "Invalid negative trust anchor domain: %s", *i);
d2ec6608 672
be327321 673 r = set_put_strdup(&ns, *i);
d2ec6608
LP
674 if (r < 0)
675 return r;
676 }
677
52aaef0f
ZJS
678 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
679 "org.freedesktop.resolve1.set-dnssec-negative-trust-anchors",
680 NULL, true, UID_INVALID,
681 &l->manager->polkit_registry, error);
682 if (r < 0)
683 return r;
684 if (r == 0)
685 return 1; /* Polkit will call us back */
686
d2ec6608 687 set_free_free(l->dnssec_negative_trust_anchors);
ae2a15bc 688 l->dnssec_negative_trust_anchors = TAKE_PTR(ns);
d2ec6608 689
943ef07c
LP
690 (void) link_save_user(l);
691
d2ec6608
LP
692 return sd_bus_reply_method_return(message, NULL);
693}
694
695int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error) {
696 Link *l = userdata;
04b764bf 697 int r;
d2ec6608
LP
698
699 assert(message);
700 assert(l);
701
04b764bf
LP
702 r = verify_unmanaged_link(l, error);
703 if (r < 0)
704 return r;
705
52aaef0f
ZJS
706 r = bus_verify_polkit_async(message, CAP_NET_ADMIN,
707 "org.freedesktop.resolve1.revert",
708 NULL, true, UID_INVALID,
709 &l->manager->polkit_registry, error);
710 if (r < 0)
711 return r;
712 if (r == 0)
713 return 1; /* Polkit will call us back */
714
d2ec6608
LP
715 link_flush_settings(l);
716 link_allocate_scopes(l);
717 link_add_rrs(l, false);
718
943ef07c 719 (void) link_save_user(l);
7207052d 720 (void) manager_write_resolv_conf(l->manager);
5f3340ca 721 (void) manager_send_changed(l->manager, "DNS");
7207052d 722
d2ec6608
LP
723 return sd_bus_reply_method_return(message, NULL);
724}
725
8d128089 726static int link_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
3abaabda
LP
727 _cleanup_free_ char *e = NULL;
728 Manager *m = userdata;
3abaabda 729 Link *link;
597da51b 730 int ifindex, r;
3abaabda
LP
731
732 assert(bus);
733 assert(path);
734 assert(interface);
735 assert(found);
736 assert(m);
737
738 r = sd_bus_path_decode(path, "/org/freedesktop/resolve1/link", &e);
739 if (r <= 0)
740 return 0;
741
597da51b
ZJS
742 ifindex = parse_ifindex(e);
743 if (ifindex < 0)
3abaabda
LP
744 return 0;
745
746 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
747 if (!link)
748 return 0;
749
750 *found = link;
751 return 1;
752}
753
0a6c0745
ZJS
754char *link_bus_path(const Link *link) {
755 char *p, ifindex[DECIMAL_STR_MAX(link->ifindex)];
3abaabda
LP
756 int r;
757
758 assert(link);
759
0a6c0745 760 xsprintf(ifindex, "%i", link->ifindex);
3abaabda
LP
761
762 r = sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex, &p);
763 if (r < 0)
764 return NULL;
765
766 return p;
767}
768
8d128089 769static int link_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
3abaabda
LP
770 _cleanup_strv_free_ char **l = NULL;
771 Manager *m = userdata;
772 Link *link;
773 Iterator i;
774 unsigned c = 0;
775
776 assert(bus);
777 assert(path);
778 assert(m);
779 assert(nodes);
780
781 l = new0(char*, hashmap_size(m->links) + 1);
782 if (!l)
783 return -ENOMEM;
784
785 HASHMAP_FOREACH(link, m->links, i) {
786 char *p;
787
788 p = link_bus_path(link);
789 if (!p)
790 return -ENOMEM;
791
792 l[c++] = p;
793 }
794
795 l[c] = NULL;
ae2a15bc 796 *nodes = TAKE_PTR(l);
3abaabda
LP
797
798 return 1;
799}
8d128089
ZJS
800
801static const sd_bus_vtable link_vtable[] = {
802 SD_BUS_VTABLE_START(0),
803
804 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask, 0, 0),
805 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns, 0, 0),
806 SD_BUS_PROPERTY("CurrentDNSServer", "(iay)", property_get_current_dns_server, offsetof(Link, current_dns_server), 0),
807 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0),
808 SD_BUS_PROPERTY("DefaultRoute", "b", property_get_default_route, 0, 0),
809 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support, offsetof(Link, llmnr_support), 0),
810 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support, offsetof(Link, mdns_support), 0),
811 SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode, 0, 0),
812 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, 0, 0),
813 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0),
814 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0),
815
ba5a389d
ZJS
816 SD_BUS_METHOD_WITH_ARGS("SetDNS",
817 SD_BUS_ARGS("a(iay)", addresses),
818 SD_BUS_NO_RESULT,
819 bus_link_method_set_dns_servers,
820 SD_BUS_VTABLE_UNPRIVILEGED),
95ce1ba8
YW
821 SD_BUS_METHOD_WITH_ARGS("SetDNSEx",
822 SD_BUS_ARGS("a(iayqs)", addresses),
823 SD_BUS_NO_RESULT,
824 bus_link_method_set_dns_servers_ex,
825 SD_BUS_VTABLE_UNPRIVILEGED),
ba5a389d
ZJS
826 SD_BUS_METHOD_WITH_ARGS("SetDomains",
827 SD_BUS_ARGS("a(sb)", domains),
828 SD_BUS_NO_RESULT,
829 bus_link_method_set_domains,
830 SD_BUS_VTABLE_UNPRIVILEGED),
831 SD_BUS_METHOD_WITH_ARGS("SetDefaultRoute",
832 SD_BUS_ARGS("b", enable),
833 SD_BUS_NO_RESULT,
834 bus_link_method_set_default_route,
835 SD_BUS_VTABLE_UNPRIVILEGED),
836 SD_BUS_METHOD_WITH_ARGS("SetLLMNR",
837 SD_BUS_ARGS("s", mode),
838 SD_BUS_NO_RESULT,
839 bus_link_method_set_llmnr,
840 SD_BUS_VTABLE_UNPRIVILEGED),
841 SD_BUS_METHOD_WITH_ARGS("SetMulticastDNS",
842 SD_BUS_ARGS("s", mode),
843 SD_BUS_NO_RESULT,
844 bus_link_method_set_mdns,
845 SD_BUS_VTABLE_UNPRIVILEGED),
846 SD_BUS_METHOD_WITH_ARGS("SetDNSOverTLS",
847 SD_BUS_ARGS("s", mode),
848 SD_BUS_NO_RESULT,
849 bus_link_method_set_dns_over_tls,
850 SD_BUS_VTABLE_UNPRIVILEGED),
851 SD_BUS_METHOD_WITH_ARGS("SetDNSSEC",
852 SD_BUS_ARGS("s", mode),
853 SD_BUS_NO_RESULT,
854 bus_link_method_set_dnssec,
855 SD_BUS_VTABLE_UNPRIVILEGED),
856 SD_BUS_METHOD_WITH_ARGS("SetDNSSECNegativeTrustAnchors",
857 SD_BUS_ARGS("as", names),
858 SD_BUS_NO_RESULT,
859 bus_link_method_set_dnssec_negative_trust_anchors,
860 SD_BUS_VTABLE_UNPRIVILEGED),
861 SD_BUS_METHOD_WITH_ARGS("Revert",
862 SD_BUS_NO_ARGS,
863 SD_BUS_NO_RESULT,
864 bus_link_method_revert,
865 SD_BUS_VTABLE_UNPRIVILEGED),
8d128089
ZJS
866
867 SD_BUS_VTABLE_END
868};
869
870const BusObjectImplementation link_object = {
871 "/org/freedesktop/resolve1/link",
872 "org.freedesktop.resolve1.Link",
873 .fallback_vtables = BUS_FALLBACK_VTABLES({link_vtable, link_object_find}),
874 .node_enumerator = link_node_enumerator,
875};