]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-link-bus.c
resolved: respond to local resolver requests on 127.0.0.53:53
[thirdparty/systemd.git] / src / resolve / resolved-link-bus.c
CommitLineData
3abaabda
LP
1/***
2 This file is part of systemd.
3
4 Copyright 2016 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18***/
19
20#include "alloc-util.h"
04b764bf 21#include "bus-common-errors.h"
3abaabda
LP
22#include "bus-util.h"
23#include "parse-util.h"
24#include "resolve-util.h"
25#include "resolved-bus.h"
26#include "resolved-link-bus.h"
7207052d 27#include "resolved-resolv-conf.h"
3abaabda
LP
28#include "strv.h"
29
30static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_resolve_support, resolve_support, ResolveSupport);
a3712979
LP
31
32static int property_get_dnssec_mode(
33 sd_bus *bus,
34 const char *path,
35 const char *interface,
36 const char *property,
37 sd_bus_message *reply,
38 void *userdata,
39 sd_bus_error *error) {
40
41 Link *l = userdata;
42
43 assert(reply);
44 assert(l);
45
46 return sd_bus_message_append(reply, "s", dnssec_mode_to_string(link_get_dnssec_mode(l)));
47}
3abaabda
LP
48
49static int property_get_dns(
50 sd_bus *bus,
51 const char *path,
52 const char *interface,
53 const char *property,
54 sd_bus_message *reply,
55 void *userdata,
56 sd_bus_error *error) {
57
58 Link *l = userdata;
59 DnsServer *s;
60 int r;
61
62 assert(reply);
63 assert(l);
64
65 r = sd_bus_message_open_container(reply, 'a', "(iay)");
66 if (r < 0)
67 return r;
68
69 LIST_FOREACH(servers, s, l->dns_servers) {
70 r = bus_dns_server_append(reply, s, false);
71 if (r < 0)
72 return r;
73 }
74
75 return sd_bus_message_close_container(reply);
76}
77
78static int property_get_domains(
79 sd_bus *bus,
80 const char *path,
81 const char *interface,
82 const char *property,
83 sd_bus_message *reply,
84 void *userdata,
85 sd_bus_error *error) {
86
87 Link *l = userdata;
88 DnsSearchDomain *d;
89 int r;
90
91 assert(reply);
92 assert(l);
93
ad44b56b 94 r = sd_bus_message_open_container(reply, 'a', "(sb)");
3abaabda
LP
95 if (r < 0)
96 return r;
97
98 LIST_FOREACH(domains, d, l->search_domains) {
ad44b56b 99 r = sd_bus_message_append(reply, "(sb)", d->name, d->route_only);
3abaabda
LP
100 if (r < 0)
101 return r;
102 }
103
104 return sd_bus_message_close_container(reply);
105}
106
107static int property_get_scopes_mask(
108 sd_bus *bus,
109 const char *path,
110 const char *interface,
111 const char *property,
112 sd_bus_message *reply,
113 void *userdata,
114 sd_bus_error *error) {
115
116 Link *l = userdata;
117 uint64_t mask;
118
119 assert(reply);
120 assert(l);
121
122 mask = (l->unicast_scope ? SD_RESOLVED_DNS : 0) |
123 (l->llmnr_ipv4_scope ? SD_RESOLVED_LLMNR_IPV4 : 0) |
124 (l->llmnr_ipv6_scope ? SD_RESOLVED_LLMNR_IPV6 : 0) |
125 (l->mdns_ipv4_scope ? SD_RESOLVED_MDNS_IPV4 : 0) |
126 (l->mdns_ipv6_scope ? SD_RESOLVED_MDNS_IPV6 : 0);
127
128 return sd_bus_message_append(reply, "t", mask);
129}
130
131static int property_get_ntas(
132 sd_bus *bus,
133 const char *path,
134 const char *interface,
135 const char *property,
136 sd_bus_message *reply,
137 void *userdata,
138 sd_bus_error *error) {
139
140 Link *l = userdata;
141 const char *name;
142 Iterator i;
143 int r;
144
145 assert(reply);
146 assert(l);
147
148 r = sd_bus_message_open_container(reply, 'a', "s");
149 if (r < 0)
150 return r;
151
152 SET_FOREACH(name, l->dnssec_negative_trust_anchors, i) {
153 r = sd_bus_message_append(reply, "s", name);
154 if (r < 0)
155 return r;
156 }
157
158 return sd_bus_message_close_container(reply);
159}
160
c69fa7e3
LP
161static int property_get_dnssec_supported(
162 sd_bus *bus,
163 const char *path,
164 const char *interface,
165 const char *property,
166 sd_bus_message *reply,
167 void *userdata,
168 sd_bus_error *error) {
169
170 Link *l = userdata;
171
172 assert(reply);
173 assert(l);
174
175 return sd_bus_message_append(reply, "b", link_dnssec_supported(l));
176}
177
04b764bf
LP
178static int verify_unmanaged_link(Link *l, sd_bus_error *error) {
179 assert(l);
180
181 if (l->flags & IFF_LOOPBACK)
182 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is loopback device.", l->name);
183 if (l->is_managed)
184 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is managed.", l->name);
185
186 return 0;
187}
188
d2ec6608
LP
189int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_bus_error *error) {
190 _cleanup_free_ struct in_addr_data *dns = NULL;
191 size_t allocated = 0, n = 0;
192 Link *l = userdata;
193 unsigned i;
194 int r;
195
196 assert(message);
197 assert(l);
198
04b764bf
LP
199 r = verify_unmanaged_link(l, error);
200 if (r < 0)
201 return r;
202
d2ec6608
LP
203 r = sd_bus_message_enter_container(message, 'a', "(iay)");
204 if (r < 0)
205 return r;
206
207 for (;;) {
208 int family;
209 size_t sz;
210 const void *d;
211
212 assert_cc(sizeof(int) == sizeof(int32_t));
213
214 r = sd_bus_message_enter_container(message, 'r', "iay");
215 if (r < 0)
216 return r;
217 if (r == 0)
218 break;
219
220 r = sd_bus_message_read(message, "i", &family);
221 if (r < 0)
222 return r;
223
224 if (!IN_SET(family, AF_INET, AF_INET6))
225 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown address family %i", family);
226
227 r = sd_bus_message_read_array(message, 'y', &d, &sz);
228 if (r < 0)
229 return r;
230 if (sz != FAMILY_ADDRESS_SIZE(family))
231 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid address size");
232
b30bf55d
LP
233 if (!dns_server_address_valid(family, d))
234 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNS server address");
235
d2ec6608
LP
236 r = sd_bus_message_exit_container(message);
237 if (r < 0)
238 return r;
239
240 if (!GREEDY_REALLOC(dns, allocated, n+1))
241 return -ENOMEM;
242
243 dns[n].family = family;
244 memcpy(&dns[n].address, d, sz);
245 n++;
246 }
247
248 r = sd_bus_message_exit_container(message);
249 if (r < 0)
250 return r;
251
252 dns_server_mark_all(l->dns_servers);
253
254 for (i = 0; i < n; i++) {
255 DnsServer *s;
256
2817157b 257 s = dns_server_find(l->dns_servers, dns[i].family, &dns[i].address, 0);
d2ec6608
LP
258 if (s)
259 dns_server_move_back_and_unmark(s);
260 else {
2817157b 261 r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, dns[i].family, &dns[i].address, 0);
d2ec6608
LP
262 if (r < 0)
263 goto clear;
264 }
265
266 }
267
268 dns_server_unlink_marked(l->dns_servers);
269 link_allocate_scopes(l);
270
943ef07c 271 (void) link_save_user(l);
7207052d
LP
272 (void) manager_write_resolv_conf(l->manager);
273
d2ec6608
LP
274 return sd_bus_reply_method_return(message, NULL);
275
276clear:
277 dns_server_unlink_all(l->dns_servers);
278 return r;
279}
280
ee116b54 281int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d2ec6608 282 Link *l = userdata;
d2ec6608
LP
283 int r;
284
285 assert(message);
286 assert(l);
287
04b764bf
LP
288 r = verify_unmanaged_link(l, error);
289 if (r < 0)
290 return r;
291
ad44b56b 292 r = sd_bus_message_enter_container(message, 'a', "(sb)");
d2ec6608
LP
293 if (r < 0)
294 return r;
295
ad44b56b
LP
296 for (;;) {
297 const char *name;
298 int route_only;
d2ec6608 299
ad44b56b 300 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
d2ec6608
LP
301 if (r < 0)
302 return r;
303 if (r == 0)
ad44b56b
LP
304 break;
305
306 r = dns_name_is_valid(name);
307 if (r < 0)
308 return r;
309 if (r == 0)
310 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid search domain %s", name);
311 if (!route_only && dns_name_is_root(name))
d2ec6608
LP
312 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Root domain is not suitable as search domain");
313 }
314
315 dns_search_domain_mark_all(l->search_domains);
316
ad44b56b
LP
317 r = sd_bus_message_rewind(message, false);
318 if (r < 0)
319 return r;
320
321 for (;;) {
d2ec6608 322 DnsSearchDomain *d;
ad44b56b
LP
323 const char *name;
324 int route_only;
d2ec6608 325
ad44b56b
LP
326 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
327 if (r < 0)
328 goto clear;
329 if (r == 0)
330 break;
331
332 r = dns_search_domain_find(l->search_domains, name, &d);
d2ec6608
LP
333 if (r < 0)
334 goto clear;
335
336 if (r > 0)
337 dns_search_domain_move_back_and_unmark(d);
338 else {
ad44b56b 339 r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name);
d2ec6608
LP
340 if (r < 0)
341 goto clear;
342 }
ad44b56b
LP
343
344 d->route_only = route_only;
d2ec6608
LP
345 }
346
ad44b56b
LP
347 r = sd_bus_message_exit_container(message);
348 if (r < 0)
349 goto clear;
350
d2ec6608 351 dns_search_domain_unlink_marked(l->search_domains);
7207052d 352
943ef07c 353 (void) link_save_user(l);
7207052d
LP
354 (void) manager_write_resolv_conf(l->manager);
355
d2ec6608
LP
356 return sd_bus_reply_method_return(message, NULL);
357
358clear:
359 dns_search_domain_unlink_all(l->search_domains);
360 return r;
361}
362
363int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error) {
364 Link *l = userdata;
365 ResolveSupport mode;
366 const char *llmnr;
367 int r;
368
369 assert(message);
370 assert(l);
371
04b764bf
LP
372 r = verify_unmanaged_link(l, error);
373 if (r < 0)
374 return r;
375
d2ec6608
LP
376 r = sd_bus_message_read(message, "s", &llmnr);
377 if (r < 0)
378 return r;
379
380 if (isempty(llmnr))
381 mode = RESOLVE_SUPPORT_YES;
382 else {
383 mode = resolve_support_from_string(llmnr);
384 if (mode < 0)
385 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid LLMNR setting: %s", llmnr);
386 }
387
388 l->llmnr_support = mode;
389 link_allocate_scopes(l);
390 link_add_rrs(l, false);
391
943ef07c
LP
392 (void) link_save_user(l);
393
d2ec6608
LP
394 return sd_bus_reply_method_return(message, NULL);
395}
396
397int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error) {
398 Link *l = userdata;
399 ResolveSupport mode;
400 const char *mdns;
401 int r;
402
403 assert(message);
404 assert(l);
405
04b764bf
LP
406 r = verify_unmanaged_link(l, error);
407 if (r < 0)
408 return r;
409
d2ec6608
LP
410 r = sd_bus_message_read(message, "s", &mdns);
411 if (r < 0)
412 return r;
413
414 if (isempty(mdns))
415 mode = RESOLVE_SUPPORT_NO;
416 else {
417 mode = resolve_support_from_string(mdns);
418 if (mode < 0)
419 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid MulticastDNS setting: %s", mdns);
420 }
421
422 l->mdns_support = mode;
423 link_allocate_scopes(l);
424 link_add_rrs(l, false);
425
943ef07c
LP
426 (void) link_save_user(l);
427
d2ec6608
LP
428 return sd_bus_reply_method_return(message, NULL);
429}
430
431int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) {
432 Link *l = userdata;
433 const char *dnssec;
434 DnssecMode mode;
435 int r;
436
437 assert(message);
438 assert(l);
439
04b764bf
LP
440 r = verify_unmanaged_link(l, error);
441 if (r < 0)
442 return r;
443
d2ec6608
LP
444 r = sd_bus_message_read(message, "s", &dnssec);
445 if (r < 0)
446 return r;
447
448 if (isempty(dnssec))
449 mode = _DNSSEC_MODE_INVALID;
450 else {
451 mode = dnssec_mode_from_string(dnssec);
452 if (mode < 0)
453 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSSEC setting: %s", dnssec);
454 }
455
456 link_set_dnssec_mode(l, mode);
457
943ef07c
LP
458 (void) link_save_user(l);
459
d2ec6608
LP
460 return sd_bus_reply_method_return(message, NULL);
461}
462
463int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error) {
464 _cleanup_set_free_free_ Set *ns = NULL;
465 _cleanup_free_ char **ntas = NULL;
466 Link *l = userdata;
467 int r;
468 char **i;
469
470 assert(message);
471 assert(l);
472
04b764bf
LP
473 r = verify_unmanaged_link(l, error);
474 if (r < 0)
475 return r;
476
d2ec6608
LP
477 r = sd_bus_message_read_strv(message, &ntas);
478 if (r < 0)
479 return r;
480
481 STRV_FOREACH(i, ntas) {
482 r = dns_name_is_valid(*i);
483 if (r < 0)
484 return r;
485 if (r == 0)
55abd6da 486 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid negative trust anchor domain: %s", *i);
d2ec6608
LP
487 }
488
489 ns = set_new(&dns_name_hash_ops);
490 if (!ns)
491 return -ENOMEM;
492
493 STRV_FOREACH(i, ntas) {
494 r = set_put_strdup(ns, *i);
495 if (r < 0)
496 return r;
497 }
498
499 set_free_free(l->dnssec_negative_trust_anchors);
500 l->dnssec_negative_trust_anchors = ns;
501 ns = NULL;
502
943ef07c
LP
503 (void) link_save_user(l);
504
d2ec6608
LP
505 return sd_bus_reply_method_return(message, NULL);
506}
507
508int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error) {
509 Link *l = userdata;
04b764bf 510 int r;
d2ec6608
LP
511
512 assert(message);
513 assert(l);
514
04b764bf
LP
515 r = verify_unmanaged_link(l, error);
516 if (r < 0)
517 return r;
518
d2ec6608
LP
519 link_flush_settings(l);
520 link_allocate_scopes(l);
521 link_add_rrs(l, false);
522
943ef07c 523 (void) link_save_user(l);
7207052d
LP
524 (void) manager_write_resolv_conf(l->manager);
525
d2ec6608
LP
526 return sd_bus_reply_method_return(message, NULL);
527}
528
3abaabda
LP
529const sd_bus_vtable link_vtable[] = {
530 SD_BUS_VTABLE_START(0),
531
532 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask, 0, 0),
533 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns, 0, 0),
ad44b56b 534 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0),
3abaabda
LP
535 SD_BUS_PROPERTY("LLMNR", "s", property_get_resolve_support, offsetof(Link, llmnr_support), 0),
536 SD_BUS_PROPERTY("MulticastDNS", "s", property_get_resolve_support, offsetof(Link, mdns_support), 0),
a3712979 537 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, 0, 0),
3abaabda 538 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0),
c2cf6e0b 539 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0),
3abaabda 540
d2ec6608 541 SD_BUS_METHOD("SetDNS", "a(iay)", NULL, bus_link_method_set_dns_servers, 0),
ee116b54 542 SD_BUS_METHOD("SetDomains", "a(sb)", NULL, bus_link_method_set_domains, 0),
d2ec6608
LP
543 SD_BUS_METHOD("SetLLMNR", "s", NULL, bus_link_method_set_llmnr, 0),
544 SD_BUS_METHOD("SetMulticastDNS", "s", NULL, bus_link_method_set_mdns, 0),
545 SD_BUS_METHOD("SetDNSSEC", "s", NULL, bus_link_method_set_dnssec, 0),
546 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL, bus_link_method_set_dnssec_negative_trust_anchors, 0),
547 SD_BUS_METHOD("Revert", NULL, NULL, bus_link_method_revert, 0),
548
3abaabda
LP
549 SD_BUS_VTABLE_END
550};
551
552int link_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
553 _cleanup_free_ char *e = NULL;
554 Manager *m = userdata;
555 int ifindex;
556 Link *link;
557 int r;
558
559 assert(bus);
560 assert(path);
561 assert(interface);
562 assert(found);
563 assert(m);
564
565 r = sd_bus_path_decode(path, "/org/freedesktop/resolve1/link", &e);
566 if (r <= 0)
567 return 0;
568
569 r = parse_ifindex(e, &ifindex);
570 if (r < 0)
571 return 0;
572
573 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
574 if (!link)
575 return 0;
576
577 *found = link;
578 return 1;
579}
580
581char *link_bus_path(Link *link) {
582 _cleanup_free_ char *ifindex = NULL;
583 char *p;
584 int r;
585
586 assert(link);
587
588 if (asprintf(&ifindex, "%i", link->ifindex) < 0)
589 return NULL;
590
591 r = sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex, &p);
592 if (r < 0)
593 return NULL;
594
595 return p;
596}
597
598int link_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
599 _cleanup_strv_free_ char **l = NULL;
600 Manager *m = userdata;
601 Link *link;
602 Iterator i;
603 unsigned c = 0;
604
605 assert(bus);
606 assert(path);
607 assert(m);
608 assert(nodes);
609
610 l = new0(char*, hashmap_size(m->links) + 1);
611 if (!l)
612 return -ENOMEM;
613
614 HASHMAP_FOREACH(link, m->links, i) {
615 char *p;
616
617 p = link_bus_path(link);
618 if (!p)
619 return -ENOMEM;
620
621 l[c++] = p;
622 }
623
624 l[c] = NULL;
625 *nodes = l;
626 l = NULL;
627
628 return 1;
629}