1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 #include "alloc-util.h"
4 #include "bus-common-errors.h"
5 #include "bus-polkit.h"
7 #include "dns-domain.h"
8 #include "memory-util.h"
9 #include "missing_capability.h"
10 #include "resolved-bus.h"
11 #include "resolved-def.h"
12 #include "resolved-dns-synthesize.h"
13 #include "resolved-dnssd-bus.h"
14 #include "resolved-dnssd.h"
15 #include "resolved-link-bus.h"
16 #include "socket-netlink.h"
17 #include "stdio-util.h"
19 #include "user-util.h"
22 BUS_DEFINE_PROPERTY_GET_ENUM(bus_property_get_resolve_support
, resolve_support
, ResolveSupport
);
24 static int reply_query_state(DnsQuery
*q
) {
28 case DNS_TRANSACTION_NO_SERVERS
:
29 return sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_NAME_SERVERS
, "No appropriate name servers or networks for name found");
31 case DNS_TRANSACTION_TIMEOUT
:
32 return sd_bus_reply_method_errorf(q
->request
, SD_BUS_ERROR_TIMEOUT
, "Query timed out");
34 case DNS_TRANSACTION_ATTEMPTS_MAX_REACHED
:
35 return sd_bus_reply_method_errorf(q
->request
, SD_BUS_ERROR_TIMEOUT
, "All attempts to contact name servers or networks failed");
37 case DNS_TRANSACTION_INVALID_REPLY
:
38 return sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_INVALID_REPLY
, "Received invalid reply");
40 case DNS_TRANSACTION_ERRNO
:
41 return sd_bus_reply_method_errnof(q
->request
, q
->answer_errno
, "Lookup failed due to system error: %m");
43 case DNS_TRANSACTION_ABORTED
:
44 return sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_ABORTED
, "Query aborted");
46 case DNS_TRANSACTION_DNSSEC_FAILED
:
47 return sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_DNSSEC_FAILED
, "DNSSEC validation failed: %s",
48 dnssec_result_to_string(q
->answer_dnssec_result
));
50 case DNS_TRANSACTION_NO_TRUST_ANCHOR
:
51 return sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_TRUST_ANCHOR
, "No suitable trust anchor known");
53 case DNS_TRANSACTION_RR_TYPE_UNSUPPORTED
:
54 return sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_RR_TYPE_UNSUPPORTED
, "Server does not support requested resource record type");
56 case DNS_TRANSACTION_NETWORK_DOWN
:
57 return sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NETWORK_DOWN
, "Network is down");
59 case DNS_TRANSACTION_NOT_FOUND
:
60 /* We return this as NXDOMAIN. This is only generated when a host doesn't implement LLMNR/TCP, and we
61 * thus quickly know that we cannot resolve an in-addr.arpa or ip6.arpa address. */
62 return sd_bus_reply_method_errorf(q
->request
, _BUS_ERROR_DNS
"NXDOMAIN", "'%s' not found", dns_query_string(q
));
64 case DNS_TRANSACTION_RCODE_FAILURE
: {
65 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
67 if (q
->answer_rcode
== DNS_RCODE_NXDOMAIN
)
68 sd_bus_error_setf(&error
, _BUS_ERROR_DNS
"NXDOMAIN", "'%s' not found", dns_query_string(q
));
71 char p
[DECIMAL_STR_MAX(q
->answer_rcode
)];
73 rc
= dns_rcode_to_string(q
->answer_rcode
);
75 xsprintf(p
, "%i", q
->answer_rcode
);
79 n
= strjoina(_BUS_ERROR_DNS
, rc
);
80 sd_bus_error_setf(&error
, n
, "Could not resolve '%s', server or network returned error %s", dns_query_string(q
), rc
);
83 return sd_bus_reply_method_error(q
->request
, &error
);
86 case DNS_TRANSACTION_NULL
:
87 case DNS_TRANSACTION_PENDING
:
88 case DNS_TRANSACTION_VALIDATING
:
89 case DNS_TRANSACTION_SUCCESS
:
91 assert_not_reached("Impossible state");
95 static int append_address(sd_bus_message
*reply
, DnsResourceRecord
*rr
, int ifindex
) {
101 r
= sd_bus_message_open_container(reply
, 'r', "iiay");
105 r
= sd_bus_message_append(reply
, "i", ifindex
);
109 if (rr
->key
->type
== DNS_TYPE_A
) {
110 r
= sd_bus_message_append(reply
, "i", AF_INET
);
114 r
= sd_bus_message_append_array(reply
, 'y', &rr
->a
.in_addr
, sizeof(struct in_addr
));
116 } else if (rr
->key
->type
== DNS_TYPE_AAAA
) {
117 r
= sd_bus_message_append(reply
, "i", AF_INET6
);
121 r
= sd_bus_message_append_array(reply
, 'y', &rr
->aaaa
.in6_addr
, sizeof(struct in6_addr
));
123 return -EAFNOSUPPORT
;
128 r
= sd_bus_message_close_container(reply
);
135 static void bus_method_resolve_hostname_complete(DnsQuery
*q
) {
136 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*canonical
= NULL
;
137 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
138 _cleanup_free_
char *normalized
= NULL
;
139 DnsResourceRecord
*rr
;
145 if (q
->state
!= DNS_TRANSACTION_SUCCESS
) {
146 r
= reply_query_state(q
);
150 r
= dns_query_process_cname(q
);
152 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_CNAME_LOOP
, "CNAME loop detected, or CNAME resolving disabled on '%s'", dns_query_string(q
));
157 if (r
== DNS_QUERY_RESTARTED
) /* This was a cname, and the query was restarted. */
160 r
= sd_bus_message_new_method_return(q
->request
, &reply
);
164 r
= sd_bus_message_open_container(reply
, 'a', "(iiay)");
168 DNS_ANSWER_FOREACH_IFINDEX(rr
, ifindex
, q
->answer
) {
169 DnsQuestion
*question
;
171 question
= dns_query_question_for_protocol(q
, q
->answer_protocol
);
173 r
= dns_question_matches_rr(question
, rr
, DNS_SEARCH_DOMAIN_NAME(q
->answer_search_domain
));
179 r
= append_address(reply
, rr
, ifindex
);
184 canonical
= dns_resource_record_ref(rr
);
190 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_SUCH_RR
, "'%s' does not have any RR of the requested type", dns_query_string(q
));
194 r
= sd_bus_message_close_container(reply
);
198 /* The key names are not necessarily normalized, make sure that they are when we return them to our bus
200 r
= dns_name_normalize(dns_resource_key_name(canonical
->key
), 0, &normalized
);
204 /* Return the precise spelling and uppercasing and CNAME target reported by the server */
206 r
= sd_bus_message_append(
209 SD_RESOLVED_FLAGS_MAKE(q
->answer_protocol
, q
->answer_family
, dns_query_fully_authenticated(q
)));
213 r
= sd_bus_send(q
->manager
->bus
, reply
, NULL
);
217 log_error_errno(r
, "Failed to send hostname reply: %m");
218 sd_bus_reply_method_errno(q
->request
, r
, NULL
);
224 static int check_ifindex_flags(int ifindex
, uint64_t *flags
, uint64_t ok
, sd_bus_error
*error
) {
228 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid interface index");
230 if (*flags
& ~(SD_RESOLVED_PROTOCOLS_ALL
|SD_RESOLVED_NO_CNAME
|ok
))
231 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid flags parameter");
233 if ((*flags
& SD_RESOLVED_PROTOCOLS_ALL
) == 0) /* If no protocol is enabled, enable all */
234 *flags
|= SD_RESOLVED_PROTOCOLS_ALL
;
239 static int parse_as_address(sd_bus_message
*m
, int ifindex
, const char *hostname
, int family
, uint64_t flags
) {
240 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
241 _cleanup_free_
char *canonical
= NULL
;
242 union in_addr_union parsed
;
243 int r
, ff
, parsed_ifindex
= 0;
245 /* Check if the hostname is actually already an IP address formatted as string. In that case just parse it,
246 * let's not attempt to look it up. */
248 r
= in_addr_ifindex_from_string_auto(hostname
, &ff
, &parsed
, &parsed_ifindex
);
249 if (r
< 0) /* not an address */
252 if (family
!= AF_UNSPEC
&& ff
!= family
)
253 return sd_bus_reply_method_errorf(m
, BUS_ERROR_NO_SUCH_RR
, "The specified address is not of the requested family.");
254 if (ifindex
> 0 && parsed_ifindex
> 0 && parsed_ifindex
!= ifindex
)
255 return sd_bus_reply_method_errorf(m
, BUS_ERROR_NO_SUCH_RR
, "The specified address interface index does not match requested interface.");
257 if (parsed_ifindex
> 0)
258 ifindex
= parsed_ifindex
;
260 r
= sd_bus_message_new_method_return(m
, &reply
);
264 r
= sd_bus_message_open_container(reply
, 'a', "(iiay)");
268 r
= sd_bus_message_open_container(reply
, 'r', "iiay");
272 r
= sd_bus_message_append(reply
, "ii", ifindex
, ff
);
276 r
= sd_bus_message_append_array(reply
, 'y', &parsed
, FAMILY_ADDRESS_SIZE(ff
));
280 r
= sd_bus_message_close_container(reply
);
284 r
= sd_bus_message_close_container(reply
);
288 /* When an IP address is specified we just return it as canonical name, in order to avoid a DNS
289 * look-up. However, we reformat it to make sure it's in a truly canonical form (i.e. on IPv6 the inner
290 * omissions are always done the same way). */
291 r
= in_addr_ifindex_to_string(ff
, &parsed
, ifindex
, &canonical
);
295 r
= sd_bus_message_append(reply
, "st", canonical
,
296 SD_RESOLVED_FLAGS_MAKE(dns_synthesize_protocol(flags
), ff
, true));
300 return sd_bus_send(sd_bus_message_get_bus(m
), reply
, NULL
);
303 static int bus_method_resolve_hostname(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
304 _cleanup_(dns_question_unrefp
) DnsQuestion
*question_idna
= NULL
, *question_utf8
= NULL
;
305 Manager
*m
= userdata
;
306 const char *hostname
;
315 assert_cc(sizeof(int) == sizeof(int32_t));
317 r
= sd_bus_message_read(message
, "isit", &ifindex
, &hostname
, &family
, &flags
);
321 if (!IN_SET(family
, AF_INET
, AF_INET6
, AF_UNSPEC
))
322 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown address family %i", family
);
324 r
= check_ifindex_flags(ifindex
, &flags
, SD_RESOLVED_NO_SEARCH
, error
);
328 r
= parse_as_address(message
, ifindex
, hostname
, family
, flags
);
332 r
= dns_name_is_valid(hostname
);
336 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid hostname '%s'", hostname
);
338 r
= dns_question_new_address(&question_utf8
, family
, hostname
, false);
342 r
= dns_question_new_address(&question_idna
, family
, hostname
, true);
343 if (r
< 0 && r
!= -EALREADY
)
346 r
= dns_query_new(m
, &q
, question_utf8
, question_idna
?: question_utf8
, ifindex
, flags
);
350 q
->request
= sd_bus_message_ref(message
);
351 q
->request_family
= family
;
352 q
->complete
= bus_method_resolve_hostname_complete
;
353 q
->suppress_unroutable_family
= family
== AF_UNSPEC
;
355 r
= dns_query_bus_track(q
, message
);
370 static void bus_method_resolve_address_complete(DnsQuery
*q
) {
371 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
372 DnsQuestion
*question
;
373 DnsResourceRecord
*rr
;
379 if (q
->state
!= DNS_TRANSACTION_SUCCESS
) {
380 r
= reply_query_state(q
);
384 r
= dns_query_process_cname(q
);
386 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_CNAME_LOOP
, "CNAME loop detected, or CNAME resolving disabled on '%s'", dns_query_string(q
));
391 if (r
== DNS_QUERY_RESTARTED
) /* This was a cname, and the query was restarted. */
394 r
= sd_bus_message_new_method_return(q
->request
, &reply
);
398 r
= sd_bus_message_open_container(reply
, 'a', "(is)");
402 question
= dns_query_question_for_protocol(q
, q
->answer_protocol
);
404 DNS_ANSWER_FOREACH_IFINDEX(rr
, ifindex
, q
->answer
) {
405 _cleanup_free_
char *normalized
= NULL
;
407 r
= dns_question_matches_rr(question
, rr
, NULL
);
413 r
= dns_name_normalize(rr
->ptr
.name
, 0, &normalized
);
417 r
= sd_bus_message_append(reply
, "(is)", ifindex
, normalized
);
425 _cleanup_free_
char *ip
= NULL
;
427 (void) in_addr_to_string(q
->request_family
, &q
->request_address
, &ip
);
428 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_SUCH_RR
,
429 "Address '%s' does not have any RR of requested type", strnull(ip
));
433 r
= sd_bus_message_close_container(reply
);
437 r
= sd_bus_message_append(reply
, "t", SD_RESOLVED_FLAGS_MAKE(q
->answer_protocol
, q
->answer_family
, dns_query_fully_authenticated(q
)));
441 r
= sd_bus_send(q
->manager
->bus
, reply
, NULL
);
445 log_error_errno(r
, "Failed to send address reply: %m");
446 sd_bus_reply_method_errno(q
->request
, r
, NULL
);
452 static int bus_method_resolve_address(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
453 _cleanup_(dns_question_unrefp
) DnsQuestion
*question
= NULL
;
454 Manager
*m
= userdata
;
465 assert_cc(sizeof(int) == sizeof(int32_t));
467 r
= sd_bus_message_read(message
, "ii", &ifindex
, &family
);
471 if (!IN_SET(family
, AF_INET
, AF_INET6
))
472 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown address family %i", family
);
474 r
= sd_bus_message_read_array(message
, 'y', &d
, &sz
);
478 if (sz
!= FAMILY_ADDRESS_SIZE(family
))
479 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid address size");
481 r
= sd_bus_message_read(message
, "t", &flags
);
485 r
= check_ifindex_flags(ifindex
, &flags
, 0, error
);
489 r
= dns_question_new_reverse(&question
, family
, d
);
493 r
= dns_query_new(m
, &q
, question
, question
, ifindex
, flags
|SD_RESOLVED_NO_SEARCH
);
497 q
->request
= sd_bus_message_ref(message
);
498 q
->request_family
= family
;
499 memcpy(&q
->request_address
, d
, sz
);
500 q
->complete
= bus_method_resolve_address_complete
;
502 r
= dns_query_bus_track(q
, message
);
517 static int bus_message_append_rr(sd_bus_message
*m
, DnsResourceRecord
*rr
, int ifindex
) {
523 r
= sd_bus_message_open_container(m
, 'r', "iqqay");
527 r
= sd_bus_message_append(m
, "iqq",
534 r
= dns_resource_record_to_wire_format(rr
, false);
538 r
= sd_bus_message_append_array(m
, 'y', rr
->wire_format
, rr
->wire_format_size
);
542 return sd_bus_message_close_container(m
);
545 static void bus_method_resolve_record_complete(DnsQuery
*q
) {
546 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
547 DnsResourceRecord
*rr
;
548 DnsQuestion
*question
;
555 if (q
->state
!= DNS_TRANSACTION_SUCCESS
) {
556 r
= reply_query_state(q
);
560 r
= dns_query_process_cname(q
);
562 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_CNAME_LOOP
, "CNAME loop detected, or CNAME resolving disabled on '%s'", dns_query_string(q
));
567 if (r
== DNS_QUERY_RESTARTED
) /* This was a cname, and the query was restarted. */
570 r
= sd_bus_message_new_method_return(q
->request
, &reply
);
574 r
= sd_bus_message_open_container(reply
, 'a', "(iqqay)");
578 question
= dns_query_question_for_protocol(q
, q
->answer_protocol
);
580 DNS_ANSWER_FOREACH_IFINDEX(rr
, ifindex
, q
->answer
) {
581 r
= dns_question_matches_rr(question
, rr
, NULL
);
587 r
= bus_message_append_rr(reply
, rr
, ifindex
);
595 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_SUCH_RR
, "Name '%s' does not have any RR of the requested type", dns_query_string(q
));
599 r
= sd_bus_message_close_container(reply
);
603 r
= sd_bus_message_append(reply
, "t", SD_RESOLVED_FLAGS_MAKE(q
->answer_protocol
, q
->answer_family
, dns_query_fully_authenticated(q
)));
607 r
= sd_bus_send(q
->manager
->bus
, reply
, NULL
);
611 log_error_errno(r
, "Failed to send record reply: %m");
612 sd_bus_reply_method_errno(q
->request
, r
, NULL
);
618 static int bus_method_resolve_record(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
619 _cleanup_(dns_resource_key_unrefp
) DnsResourceKey
*key
= NULL
;
620 _cleanup_(dns_question_unrefp
) DnsQuestion
*question
= NULL
;
621 Manager
*m
= userdata
;
622 uint16_t class, type
;
631 assert_cc(sizeof(int) == sizeof(int32_t));
633 r
= sd_bus_message_read(message
, "isqqt", &ifindex
, &name
, &class, &type
, &flags
);
637 r
= dns_name_is_valid(name
);
641 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid name '%s'", name
);
643 if (!dns_type_is_valid_query(type
))
644 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Specified resource record type %" PRIu16
" may not be used in a query.", type
);
645 if (dns_type_is_zone_transer(type
))
646 return sd_bus_error_setf(error
, SD_BUS_ERROR_NOT_SUPPORTED
, "Zone transfers not permitted via this programming interface.");
647 if (dns_type_is_obsolete(type
))
648 return sd_bus_error_setf(error
, SD_BUS_ERROR_NOT_SUPPORTED
, "Specified DNS resource record type %" PRIu16
" is obsolete.", type
);
650 r
= check_ifindex_flags(ifindex
, &flags
, 0, error
);
654 question
= dns_question_new(1);
658 key
= dns_resource_key_new(class, type
, name
);
662 r
= dns_question_add(question
, key
);
666 r
= dns_query_new(m
, &q
, question
, question
, ifindex
, flags
|SD_RESOLVED_NO_SEARCH
);
670 /* Let's request that the TTL is fixed up for locally cached entries, after all we return it in the wire format
674 q
->request
= sd_bus_message_ref(message
);
675 q
->complete
= bus_method_resolve_record_complete
;
677 r
= dns_query_bus_track(q
, message
);
692 static int append_srv(DnsQuery
*q
, sd_bus_message
*reply
, DnsResourceRecord
*rr
) {
693 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*canonical
= NULL
;
694 _cleanup_free_
char *normalized
= NULL
;
703 if (rr
->key
->type
!= DNS_TYPE_SRV
)
706 if ((q
->flags
& SD_RESOLVED_NO_ADDRESS
) == 0) {
707 /* First, let's see if we could find an appropriate A or AAAA
708 * record for the SRV record */
709 LIST_FOREACH(auxiliary_queries
, aux
, q
->auxiliary_queries
) {
710 DnsResourceRecord
*zz
;
711 DnsQuestion
*question
;
713 if (aux
->state
!= DNS_TRANSACTION_SUCCESS
)
715 if (aux
->auxiliary_result
!= 0)
718 question
= dns_query_question_for_protocol(aux
, aux
->answer_protocol
);
720 r
= dns_name_equal(dns_question_first_name(question
), rr
->srv
.name
);
726 DNS_ANSWER_FOREACH(zz
, aux
->answer
) {
728 r
= dns_question_matches_rr(question
, zz
, NULL
);
734 canonical
= dns_resource_record_ref(zz
);
742 /* Is there are successful A/AAAA lookup for this SRV RR? If not, don't add it */
747 r
= sd_bus_message_open_container(reply
, 'r', "qqqsa(iiay)s");
751 r
= dns_name_normalize(rr
->srv
.name
, 0, &normalized
);
755 r
= sd_bus_message_append(
758 rr
->srv
.priority
, rr
->srv
.weight
, rr
->srv
.port
, normalized
);
762 r
= sd_bus_message_open_container(reply
, 'a', "(iiay)");
766 if ((q
->flags
& SD_RESOLVED_NO_ADDRESS
) == 0) {
767 LIST_FOREACH(auxiliary_queries
, aux
, q
->auxiliary_queries
) {
768 DnsResourceRecord
*zz
;
769 DnsQuestion
*question
;
772 if (aux
->state
!= DNS_TRANSACTION_SUCCESS
)
774 if (aux
->auxiliary_result
!= 0)
777 question
= dns_query_question_for_protocol(aux
, aux
->answer_protocol
);
779 r
= dns_name_equal(dns_question_first_name(question
), rr
->srv
.name
);
785 DNS_ANSWER_FOREACH_IFINDEX(zz
, ifindex
, aux
->answer
) {
787 r
= dns_question_matches_rr(question
, zz
, NULL
);
793 r
= append_address(reply
, zz
, ifindex
);
800 r
= sd_bus_message_close_container(reply
);
805 normalized
= mfree(normalized
);
807 r
= dns_name_normalize(dns_resource_key_name(canonical
->key
), 0, &normalized
);
812 /* Note that above we appended the hostname as encoded in the
813 * SRV, and here the canonical hostname this maps to. */
814 r
= sd_bus_message_append(reply
, "s", normalized
);
818 r
= sd_bus_message_close_container(reply
);
825 static int append_txt(sd_bus_message
*reply
, DnsResourceRecord
*rr
) {
833 if (rr
->key
->type
!= DNS_TYPE_TXT
)
836 LIST_FOREACH(items
, i
, rr
->txt
.items
) {
841 r
= sd_bus_message_append_array(reply
, 'y', i
->data
, i
->length
);
849 static void resolve_service_all_complete(DnsQuery
*q
) {
850 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*canonical
= NULL
;
851 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
852 _cleanup_free_
char *name
= NULL
, *type
= NULL
, *domain
= NULL
;
853 DnsQuestion
*question
;
854 DnsResourceRecord
*rr
;
861 if (q
->block_all_complete
> 0)
864 if ((q
->flags
& SD_RESOLVED_NO_ADDRESS
) == 0) {
865 DnsQuery
*bad
= NULL
;
866 bool have_success
= false;
868 LIST_FOREACH(auxiliary_queries
, aux
, q
->auxiliary_queries
) {
870 switch (aux
->state
) {
872 case DNS_TRANSACTION_PENDING
:
873 /* If an auxiliary query is still pending, let's wait */
876 case DNS_TRANSACTION_SUCCESS
:
877 if (aux
->auxiliary_result
== 0)
890 /* We can only return one error, hence pick the last error we encountered */
894 if (bad
->state
== DNS_TRANSACTION_SUCCESS
) {
895 assert(bad
->auxiliary_result
!= 0);
897 if (bad
->auxiliary_result
== -ELOOP
) {
898 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_CNAME_LOOP
, "CNAME loop detected, or CNAME resolving disabled on '%s'", dns_query_string(bad
));
902 r
= bad
->auxiliary_result
;
906 r
= reply_query_state(bad
);
911 r
= sd_bus_message_new_method_return(q
->request
, &reply
);
915 r
= sd_bus_message_open_container(reply
, 'a', "(qqqsa(iiay)s)");
919 question
= dns_query_question_for_protocol(q
, q
->answer_protocol
);
920 DNS_ANSWER_FOREACH(rr
, q
->answer
) {
921 r
= dns_question_matches_rr(question
, rr
, NULL
);
927 r
= append_srv(q
, reply
, rr
);
930 if (r
== 0) /* not an SRV record */
934 canonical
= dns_resource_record_ref(rr
);
940 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_SUCH_RR
, "'%s' does not have any RR of the requested type", dns_query_string(q
));
944 r
= sd_bus_message_close_container(reply
);
948 r
= sd_bus_message_open_container(reply
, 'a', "ay");
952 DNS_ANSWER_FOREACH(rr
, q
->answer
) {
953 r
= dns_question_matches_rr(question
, rr
, NULL
);
959 r
= append_txt(reply
, rr
);
964 r
= sd_bus_message_close_container(reply
);
969 r
= dns_service_split(dns_resource_key_name(canonical
->key
), &name
, &type
, &domain
);
973 r
= sd_bus_message_append(
977 SD_RESOLVED_FLAGS_MAKE(q
->answer_protocol
, q
->answer_family
, dns_query_fully_authenticated(q
)));
981 r
= sd_bus_send(q
->manager
->bus
, reply
, NULL
);
985 log_error_errno(r
, "Failed to send service reply: %m");
986 sd_bus_reply_method_errno(q
->request
, r
, NULL
);
992 static void resolve_service_hostname_complete(DnsQuery
*q
) {
996 assert(q
->auxiliary_for
);
998 if (q
->state
!= DNS_TRANSACTION_SUCCESS
) {
999 resolve_service_all_complete(q
->auxiliary_for
);
1003 r
= dns_query_process_cname(q
);
1004 if (r
== DNS_QUERY_RESTARTED
) /* This was a cname, and the query was restarted. */
1007 /* This auxiliary lookup is finished or failed, let's see if all are finished now. */
1008 q
->auxiliary_result
= r
;
1009 resolve_service_all_complete(q
->auxiliary_for
);
1012 static int resolve_service_hostname(DnsQuery
*q
, DnsResourceRecord
*rr
, int ifindex
) {
1013 _cleanup_(dns_question_unrefp
) DnsQuestion
*question
= NULL
;
1020 assert(rr
->key
->type
== DNS_TYPE_SRV
);
1022 /* OK, we found an SRV record for the service. Let's resolve
1023 * the hostname included in it */
1025 r
= dns_question_new_address(&question
, q
->request_family
, rr
->srv
.name
, false);
1029 r
= dns_query_new(q
->manager
, &aux
, question
, question
, ifindex
, q
->flags
|SD_RESOLVED_NO_SEARCH
);
1033 aux
->request_family
= q
->request_family
;
1034 aux
->complete
= resolve_service_hostname_complete
;
1036 r
= dns_query_make_auxiliary(aux
, q
);
1038 /* Too many auxiliary lookups? If so, don't complain,
1039 * let's just not add this one, we already have more
1042 dns_query_free(aux
);
1048 /* Note that auxiliary queries do not track the original bus
1049 * client, only the primary request does that. */
1051 r
= dns_query_go(aux
);
1058 dns_query_free(aux
);
1062 static void bus_method_resolve_service_complete(DnsQuery
*q
) {
1063 bool has_root_domain
= false;
1064 DnsResourceRecord
*rr
;
1065 DnsQuestion
*question
;
1071 if (q
->state
!= DNS_TRANSACTION_SUCCESS
) {
1072 r
= reply_query_state(q
);
1076 r
= dns_query_process_cname(q
);
1078 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_CNAME_LOOP
, "CNAME loop detected, or CNAME resolving disabled on '%s'", dns_query_string(q
));
1083 if (r
== DNS_QUERY_RESTARTED
) /* This was a cname, and the query was restarted. */
1086 question
= dns_query_question_for_protocol(q
, q
->answer_protocol
);
1088 DNS_ANSWER_FOREACH_IFINDEX(rr
, ifindex
, q
->answer
) {
1089 r
= dns_question_matches_rr(question
, rr
, NULL
);
1095 if (rr
->key
->type
!= DNS_TYPE_SRV
)
1098 if (dns_name_is_root(rr
->srv
.name
)) {
1099 has_root_domain
= true;
1103 if ((q
->flags
& SD_RESOLVED_NO_ADDRESS
) == 0) {
1104 q
->block_all_complete
++;
1105 r
= resolve_service_hostname(q
, rr
, ifindex
);
1106 q
->block_all_complete
--;
1115 if (has_root_domain
&& found
<= 0) {
1116 /* If there's exactly one SRV RR and it uses
1117 * the root domain as host name, then the
1118 * service is explicitly not offered on the
1119 * domain. Report this as a recognizable
1120 * error. See RFC 2782, Section "Usage
1122 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_SUCH_SERVICE
, "'%s' does not provide the requested service", dns_query_string(q
));
1127 r
= sd_bus_reply_method_errorf(q
->request
, BUS_ERROR_NO_SUCH_RR
, "'%s' does not have any RR of the requested type", dns_query_string(q
));
1131 /* Maybe we are already finished? check now... */
1132 resolve_service_all_complete(q
);
1137 log_error_errno(r
, "Failed to send service reply: %m");
1138 sd_bus_reply_method_errno(q
->request
, r
, NULL
);
1144 static int bus_method_resolve_service(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1145 _cleanup_(dns_question_unrefp
) DnsQuestion
*question_idna
= NULL
, *question_utf8
= NULL
;
1146 const char *name
, *type
, *domain
;
1147 Manager
*m
= userdata
;
1148 int family
, ifindex
;
1156 assert_cc(sizeof(int) == sizeof(int32_t));
1158 r
= sd_bus_message_read(message
, "isssit", &ifindex
, &name
, &type
, &domain
, &family
, &flags
);
1162 if (!IN_SET(family
, AF_INET
, AF_INET6
, AF_UNSPEC
))
1163 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown address family %i", family
);
1167 else if (!dns_service_name_is_valid(name
))
1168 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid service name '%s'", name
);
1172 else if (!dns_srv_type_is_valid(type
))
1173 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid SRV service type '%s'", type
);
1175 r
= dns_name_is_valid(domain
);
1179 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid domain '%s'", domain
);
1182 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Service name cannot be specified without service type.");
1184 r
= check_ifindex_flags(ifindex
, &flags
, SD_RESOLVED_NO_TXT
|SD_RESOLVED_NO_ADDRESS
, error
);
1188 r
= dns_question_new_service(&question_utf8
, name
, type
, domain
, !(flags
& SD_RESOLVED_NO_TXT
), false);
1192 r
= dns_question_new_service(&question_idna
, name
, type
, domain
, !(flags
& SD_RESOLVED_NO_TXT
), true);
1196 r
= dns_query_new(m
, &q
, question_utf8
, question_idna
, ifindex
, flags
|SD_RESOLVED_NO_SEARCH
);
1200 q
->request
= sd_bus_message_ref(message
);
1201 q
->request_family
= family
;
1202 q
->complete
= bus_method_resolve_service_complete
;
1204 r
= dns_query_bus_track(q
, message
);
1208 r
= dns_query_go(q
);
1219 int bus_dns_server_append(sd_bus_message
*reply
, DnsServer
*s
, bool with_ifindex
) {
1226 return sd_bus_message_append(reply
, "(iiay)", 0, AF_UNSPEC
, 0);
1228 return sd_bus_message_append(reply
, "(iay)", AF_UNSPEC
, 0);
1231 r
= sd_bus_message_open_container(reply
, 'r', with_ifindex
? "iiay" : "iay");
1236 r
= sd_bus_message_append(reply
, "i", dns_server_ifindex(s
));
1241 r
= sd_bus_message_append(reply
, "i", s
->family
);
1245 r
= sd_bus_message_append_array(reply
, 'y', &s
->address
, FAMILY_ADDRESS_SIZE(s
->family
));
1249 return sd_bus_message_close_container(reply
);
1252 static int bus_property_get_dns_servers(
1255 const char *interface
,
1256 const char *property
,
1257 sd_bus_message
*reply
,
1259 sd_bus_error
*error
) {
1261 Manager
*m
= userdata
;
1270 r
= sd_bus_message_open_container(reply
, 'a', "(iiay)");
1274 LIST_FOREACH(servers
, s
, m
->dns_servers
) {
1275 r
= bus_dns_server_append(reply
, s
, true);
1280 HASHMAP_FOREACH(l
, m
->links
, i
)
1281 LIST_FOREACH(servers
, s
, l
->dns_servers
) {
1282 r
= bus_dns_server_append(reply
, s
, true);
1287 return sd_bus_message_close_container(reply
);
1290 static int bus_property_get_fallback_dns_servers(
1293 const char *interface
,
1294 const char *property
,
1295 sd_bus_message
*reply
,
1297 sd_bus_error
*error
) {
1299 DnsServer
*s
, **f
= userdata
;
1305 r
= sd_bus_message_open_container(reply
, 'a', "(iiay)");
1309 LIST_FOREACH(servers
, s
, *f
) {
1310 r
= bus_dns_server_append(reply
, s
, true);
1315 return sd_bus_message_close_container(reply
);
1318 static int bus_property_get_current_dns_server(
1321 const char *interface
,
1322 const char *property
,
1323 sd_bus_message
*reply
,
1325 sd_bus_error
*error
) {
1332 s
= *(DnsServer
**) userdata
;
1334 return bus_dns_server_append(reply
, s
, true);
1337 static int bus_property_get_domains(
1340 const char *interface
,
1341 const char *property
,
1342 sd_bus_message
*reply
,
1344 sd_bus_error
*error
) {
1346 Manager
*m
= userdata
;
1355 r
= sd_bus_message_open_container(reply
, 'a', "(isb)");
1359 LIST_FOREACH(domains
, d
, m
->search_domains
) {
1360 r
= sd_bus_message_append(reply
, "(isb)", 0, d
->name
, d
->route_only
);
1365 HASHMAP_FOREACH(l
, m
->links
, i
) {
1366 LIST_FOREACH(domains
, d
, l
->search_domains
) {
1367 r
= sd_bus_message_append(reply
, "(isb)", l
->ifindex
, d
->name
, d
->route_only
);
1373 return sd_bus_message_close_container(reply
);
1376 static int bus_property_get_transaction_statistics(
1379 const char *interface
,
1380 const char *property
,
1381 sd_bus_message
*reply
,
1383 sd_bus_error
*error
) {
1385 Manager
*m
= userdata
;
1390 return sd_bus_message_append(reply
, "(tt)",
1391 (uint64_t) hashmap_size(m
->dns_transactions
),
1392 (uint64_t) m
->n_transactions_total
);
1395 static int bus_property_get_cache_statistics(
1398 const char *interface
,
1399 const char *property
,
1400 sd_bus_message
*reply
,
1402 sd_bus_error
*error
) {
1404 uint64_t size
= 0, hit
= 0, miss
= 0;
1405 Manager
*m
= userdata
;
1411 LIST_FOREACH(scopes
, s
, m
->dns_scopes
) {
1412 size
+= dns_cache_size(&s
->cache
);
1413 hit
+= s
->cache
.n_hit
;
1414 miss
+= s
->cache
.n_miss
;
1417 return sd_bus_message_append(reply
, "(ttt)", size
, hit
, miss
);
1420 static int bus_property_get_dnssec_statistics(
1423 const char *interface
,
1424 const char *property
,
1425 sd_bus_message
*reply
,
1427 sd_bus_error
*error
) {
1429 Manager
*m
= userdata
;
1434 return sd_bus_message_append(reply
, "(tttt)",
1435 (uint64_t) m
->n_dnssec_verdict
[DNSSEC_SECURE
],
1436 (uint64_t) m
->n_dnssec_verdict
[DNSSEC_INSECURE
],
1437 (uint64_t) m
->n_dnssec_verdict
[DNSSEC_BOGUS
],
1438 (uint64_t) m
->n_dnssec_verdict
[DNSSEC_INDETERMINATE
]);
1441 static int bus_property_get_ntas(
1444 const char *interface
,
1445 const char *property
,
1446 sd_bus_message
*reply
,
1448 sd_bus_error
*error
) {
1450 Manager
*m
= userdata
;
1458 r
= sd_bus_message_open_container(reply
, 'a', "s");
1462 SET_FOREACH(domain
, m
->trust_anchor
.negative_by_name
, i
) {
1463 r
= sd_bus_message_append(reply
, "s", domain
);
1468 return sd_bus_message_close_container(reply
);
1471 static BUS_DEFINE_PROPERTY_GET_ENUM(bus_property_get_dns_stub_listener_mode
, dns_stub_listener_mode
, DnsStubListenerMode
);
1472 static BUS_DEFINE_PROPERTY_GET(bus_property_get_dnssec_supported
, "b", Manager
, manager_dnssec_supported
);
1473 static BUS_DEFINE_PROPERTY_GET2(bus_property_get_dnssec_mode
, "s", Manager
, manager_get_dnssec_mode
, dnssec_mode_to_string
);
1474 static BUS_DEFINE_PROPERTY_GET2(bus_property_get_dns_over_tls_mode
, "s", Manager
, manager_get_dns_over_tls_mode
, dns_over_tls_mode_to_string
);
1476 static int bus_method_reset_statistics(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1477 Manager
*m
= userdata
;
1483 LIST_FOREACH(scopes
, s
, m
->dns_scopes
)
1484 s
->cache
.n_hit
= s
->cache
.n_miss
= 0;
1486 m
->n_transactions_total
= 0;
1487 zero(m
->n_dnssec_verdict
);
1489 return sd_bus_reply_method_return(message
, NULL
);
1492 static int get_any_link(Manager
*m
, int ifindex
, Link
**ret
, sd_bus_error
*error
) {
1499 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid interface index");
1501 l
= hashmap_get(m
->links
, INT_TO_PTR(ifindex
));
1503 return sd_bus_error_setf(error
, BUS_ERROR_NO_SUCH_LINK
, "Link %i not known", ifindex
);
1509 static int call_link_method(Manager
*m
, sd_bus_message
*message
, sd_bus_message_handler_t handler
, sd_bus_error
*error
) {
1517 assert_cc(sizeof(int) == sizeof(int32_t));
1518 r
= sd_bus_message_read(message
, "i", &ifindex
);
1522 r
= get_any_link(m
, ifindex
, &l
, error
);
1526 return handler(message
, l
, error
);
1529 static int bus_method_set_link_dns_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1530 return call_link_method(userdata
, message
, bus_link_method_set_dns_servers
, error
);
1533 static int bus_method_set_link_domains(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1534 return call_link_method(userdata
, message
, bus_link_method_set_domains
, error
);
1537 static int bus_method_set_link_default_route(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1538 return call_link_method(userdata
, message
, bus_link_method_set_default_route
, error
);
1541 static int bus_method_set_link_llmnr(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1542 return call_link_method(userdata
, message
, bus_link_method_set_llmnr
, error
);
1545 static int bus_method_set_link_mdns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1546 return call_link_method(userdata
, message
, bus_link_method_set_mdns
, error
);
1549 static int bus_method_set_link_dns_over_tls(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1550 return call_link_method(userdata
, message
, bus_link_method_set_dns_over_tls
, error
);
1553 static int bus_method_set_link_dnssec(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1554 return call_link_method(userdata
, message
, bus_link_method_set_dnssec
, error
);
1557 static int bus_method_set_link_dnssec_negative_trust_anchors(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1558 return call_link_method(userdata
, message
, bus_link_method_set_dnssec_negative_trust_anchors
, error
);
1561 static int bus_method_revert_link(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1562 return call_link_method(userdata
, message
, bus_link_method_revert
, error
);
1565 static int bus_method_get_link(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1566 _cleanup_free_
char *p
= NULL
;
1567 Manager
*m
= userdata
;
1574 assert_cc(sizeof(int) == sizeof(int32_t));
1575 r
= sd_bus_message_read(message
, "i", &ifindex
);
1579 r
= get_any_link(m
, ifindex
, &l
, error
);
1583 p
= link_bus_path(l
);
1587 return sd_bus_reply_method_return(message
, "o", p
);
1590 static int bus_method_flush_caches(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1591 Manager
*m
= userdata
;
1596 manager_flush_caches(m
);
1598 return sd_bus_reply_method_return(message
, NULL
);
1601 static int bus_method_reset_server_features(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1602 Manager
*m
= userdata
;
1607 manager_reset_server_features(m
);
1609 return sd_bus_reply_method_return(message
, NULL
);
1612 static int on_bus_track(sd_bus_track
*t
, void *userdata
) {
1613 DnssdService
*s
= userdata
;
1618 log_debug("Client of active request vanished, destroying DNS-SD service.");
1619 dnssd_service_free(s
);
1624 static int bus_method_register_service(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1625 _cleanup_(sd_bus_creds_unrefp
) sd_bus_creds
*creds
= NULL
;
1626 _cleanup_(dnssd_service_freep
) DnssdService
*service
= NULL
;
1627 _cleanup_(sd_bus_track_unrefp
) sd_bus_track
*bus_track
= NULL
;
1628 _cleanup_free_
char *path
= NULL
;
1629 _cleanup_free_
char *instance_name
= NULL
;
1630 Manager
*m
= userdata
;
1631 DnssdService
*s
= NULL
;
1633 const char *name_template
;
1641 if (m
->mdns_support
!= RESOLVE_SUPPORT_YES
)
1642 return sd_bus_error_setf(error
, SD_BUS_ERROR_NOT_SUPPORTED
, "Support for MulticastDNS is disabled");
1644 service
= new0(DnssdService
, 1);
1648 r
= sd_bus_query_sender_creds(message
, SD_BUS_CREDS_EUID
, &creds
);
1652 r
= sd_bus_creds_get_euid(creds
, &euid
);
1655 service
->originator
= euid
;
1657 r
= sd_bus_message_read(message
, "sssqqq", &name
, &name_template
, &type
,
1658 &service
->port
, &service
->priority
,
1663 s
= hashmap_get(m
->dnssd_services
, name
);
1665 return sd_bus_error_setf(error
, BUS_ERROR_DNSSD_SERVICE_EXISTS
, "DNS-SD service '%s' exists already", name
);
1667 if (!dnssd_srv_type_is_valid(type
))
1668 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "DNS-SD service type '%s' is invalid", type
);
1670 service
->name
= strdup(name
);
1674 service
->name_template
= strdup(name_template
);
1675 if (!service
->name_template
)
1678 service
->type
= strdup(type
);
1682 r
= dnssd_render_instance_name(service
, &instance_name
);
1686 r
= sd_bus_message_enter_container(message
, SD_BUS_TYPE_ARRAY
, "a{say}");
1690 while ((r
= sd_bus_message_enter_container(message
, SD_BUS_TYPE_ARRAY
, "{say}")) > 0) {
1691 _cleanup_(dnssd_txtdata_freep
) DnssdTxtData
*txt_data
= NULL
;
1692 DnsTxtItem
*last
= NULL
;
1694 txt_data
= new0(DnssdTxtData
, 1);
1698 while ((r
= sd_bus_message_enter_container(message
, SD_BUS_TYPE_DICT_ENTRY
, "say")) > 0) {
1704 r
= sd_bus_message_read(message
, "s", &key
);
1709 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Keys in DNS-SD TXT RRs can't be empty");
1711 if (!ascii_is_valid(key
))
1712 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "TXT key '%s' contains non-ASCII symbols", key
);
1714 r
= sd_bus_message_read_array(message
, 'y', &value
, &size
);
1718 r
= dnssd_txt_item_new_from_data(key
, value
, size
, &i
);
1722 LIST_INSERT_AFTER(items
, txt_data
->txt
, last
, i
);
1725 r
= sd_bus_message_exit_container(message
);
1733 r
= sd_bus_message_exit_container(message
);
1737 if (txt_data
->txt
) {
1738 LIST_PREPEND(items
, service
->txt_data_items
, txt_data
);
1745 r
= sd_bus_message_exit_container(message
);
1749 if (!service
->txt_data_items
) {
1750 _cleanup_(dnssd_txtdata_freep
) DnssdTxtData
*txt_data
= NULL
;
1752 txt_data
= new0(DnssdTxtData
, 1);
1756 r
= dns_txt_item_new_empty(&txt_data
->txt
);
1760 LIST_PREPEND(items
, service
->txt_data_items
, txt_data
);
1764 r
= sd_bus_path_encode("/org/freedesktop/resolve1/dnssd", service
->name
, &path
);
1768 r
= bus_verify_polkit_async(message
, CAP_SYS_ADMIN
,
1769 "org.freedesktop.resolve1.register-service",
1770 NULL
, false, UID_INVALID
,
1771 &m
->polkit_registry
, error
);
1775 return 1; /* Polkit will call us back */
1777 r
= hashmap_ensure_allocated(&m
->dnssd_services
, &string_hash_ops
);
1781 r
= hashmap_put(m
->dnssd_services
, service
->name
, service
);
1785 r
= sd_bus_track_new(sd_bus_message_get_bus(message
), &bus_track
, on_bus_track
, service
);
1789 r
= sd_bus_track_add_sender(bus_track
, message
);
1793 service
->manager
= m
;
1797 manager_refresh_rrs(m
);
1799 return sd_bus_reply_method_return(message
, "o", path
);
1802 static int call_dnssd_method(Manager
*m
, sd_bus_message
*message
, sd_bus_message_handler_t handler
, sd_bus_error
*error
) {
1803 _cleanup_free_
char *name
= NULL
;
1804 DnssdService
*s
= NULL
;
1812 r
= sd_bus_message_read(message
, "o", &path
);
1816 r
= sd_bus_path_decode(path
, "/org/freedesktop/resolve1/dnssd", &name
);
1818 return sd_bus_error_setf(error
, BUS_ERROR_NO_SUCH_DNSSD_SERVICE
, "DNS-SD service with object path '%s' does not exist", path
);
1822 s
= hashmap_get(m
->dnssd_services
, name
);
1824 return sd_bus_error_setf(error
, BUS_ERROR_NO_SUCH_DNSSD_SERVICE
, "DNS-SD service '%s' not known", name
);
1826 return handler(message
, s
, error
);
1829 static int bus_method_unregister_service(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
1830 Manager
*m
= userdata
;
1835 return call_dnssd_method(m
, message
, bus_dnssd_method_unregister
, error
);
1838 static const sd_bus_vtable resolve_vtable
[] = {
1839 SD_BUS_VTABLE_START(0),
1840 SD_BUS_PROPERTY("LLMNRHostname", "s", NULL
, offsetof(Manager
, llmnr_hostname
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
1841 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support
, offsetof(Manager
, llmnr_support
), 0),
1842 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support
, offsetof(Manager
, mdns_support
), 0),
1843 SD_BUS_PROPERTY("DNSOverTLS", "s", bus_property_get_dns_over_tls_mode
, 0, 0),
1844 SD_BUS_PROPERTY("DNS", "a(iiay)", bus_property_get_dns_servers
, 0, SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
1845 SD_BUS_PROPERTY("FallbackDNS", "a(iiay)", bus_property_get_fallback_dns_servers
, offsetof(Manager
, fallback_dns_servers
), SD_BUS_VTABLE_PROPERTY_CONST
),
1846 SD_BUS_PROPERTY("CurrentDNSServer", "(iiay)", bus_property_get_current_dns_server
, offsetof(Manager
, current_dns_server
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
1847 SD_BUS_PROPERTY("Domains", "a(isb)", bus_property_get_domains
, 0, 0),
1848 SD_BUS_PROPERTY("TransactionStatistics", "(tt)", bus_property_get_transaction_statistics
, 0, 0),
1849 SD_BUS_PROPERTY("CacheStatistics", "(ttt)", bus_property_get_cache_statistics
, 0, 0),
1850 SD_BUS_PROPERTY("DNSSEC", "s", bus_property_get_dnssec_mode
, 0, 0),
1851 SD_BUS_PROPERTY("DNSSECStatistics", "(tttt)", bus_property_get_dnssec_statistics
, 0, 0),
1852 SD_BUS_PROPERTY("DNSSECSupported", "b", bus_property_get_dnssec_supported
, 0, 0),
1853 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", bus_property_get_ntas
, 0, 0),
1854 SD_BUS_PROPERTY("DNSStubListener", "s", bus_property_get_dns_stub_listener_mode
, offsetof(Manager
, dns_stub_listener_mode
), 0),
1856 SD_BUS_METHOD("ResolveHostname", "isit", "a(iiay)st", bus_method_resolve_hostname
, SD_BUS_VTABLE_UNPRIVILEGED
),
1857 SD_BUS_METHOD("ResolveAddress", "iiayt", "a(is)t", bus_method_resolve_address
, SD_BUS_VTABLE_UNPRIVILEGED
),
1858 SD_BUS_METHOD("ResolveRecord", "isqqt", "a(iqqay)t", bus_method_resolve_record
, SD_BUS_VTABLE_UNPRIVILEGED
),
1859 SD_BUS_METHOD("ResolveService", "isssit", "a(qqqsa(iiay)s)aayssst", bus_method_resolve_service
, SD_BUS_VTABLE_UNPRIVILEGED
),
1860 SD_BUS_METHOD("ResetStatistics", NULL
, NULL
, bus_method_reset_statistics
, SD_BUS_VTABLE_UNPRIVILEGED
),
1861 SD_BUS_METHOD("FlushCaches", NULL
, NULL
, bus_method_flush_caches
, SD_BUS_VTABLE_UNPRIVILEGED
),
1862 SD_BUS_METHOD("ResetServerFeatures", NULL
, NULL
, bus_method_reset_server_features
, SD_BUS_VTABLE_UNPRIVILEGED
),
1863 SD_BUS_METHOD("GetLink", "i", "o", bus_method_get_link
, SD_BUS_VTABLE_UNPRIVILEGED
),
1864 SD_BUS_METHOD("SetLinkDNS", "ia(iay)", NULL
, bus_method_set_link_dns_servers
, SD_BUS_VTABLE_UNPRIVILEGED
),
1865 SD_BUS_METHOD("SetLinkDomains", "ia(sb)", NULL
, bus_method_set_link_domains
, SD_BUS_VTABLE_UNPRIVILEGED
),
1866 SD_BUS_METHOD("SetLinkDefaultRoute", "ib", NULL
, bus_method_set_link_default_route
, SD_BUS_VTABLE_UNPRIVILEGED
),
1867 SD_BUS_METHOD("SetLinkLLMNR", "is", NULL
, bus_method_set_link_llmnr
, SD_BUS_VTABLE_UNPRIVILEGED
),
1868 SD_BUS_METHOD("SetLinkMulticastDNS", "is", NULL
, bus_method_set_link_mdns
, SD_BUS_VTABLE_UNPRIVILEGED
),
1869 SD_BUS_METHOD("SetLinkDNSOverTLS", "is", NULL
, bus_method_set_link_dns_over_tls
, SD_BUS_VTABLE_UNPRIVILEGED
),
1870 SD_BUS_METHOD("SetLinkDNSSEC", "is", NULL
, bus_method_set_link_dnssec
, SD_BUS_VTABLE_UNPRIVILEGED
),
1871 SD_BUS_METHOD("SetLinkDNSSECNegativeTrustAnchors", "ias", NULL
, bus_method_set_link_dnssec_negative_trust_anchors
, SD_BUS_VTABLE_UNPRIVILEGED
),
1872 SD_BUS_METHOD("RevertLink", "i", NULL
, bus_method_revert_link
, SD_BUS_VTABLE_UNPRIVILEGED
),
1874 SD_BUS_METHOD("RegisterService", "sssqqqaa{say}", "o", bus_method_register_service
, SD_BUS_VTABLE_UNPRIVILEGED
),
1875 SD_BUS_METHOD("UnregisterService", "o", NULL
, bus_method_unregister_service
, SD_BUS_VTABLE_UNPRIVILEGED
),
1879 static int match_prepare_for_sleep(sd_bus_message
*message
, void *userdata
, sd_bus_error
*ret_error
) {
1880 Manager
*m
= userdata
;
1886 r
= sd_bus_message_read(message
, "b", &b
);
1888 log_debug_errno(r
, "Failed to parse PrepareForSleep signal: %m");
1895 log_debug("Coming back from suspend, verifying all RRs...");
1897 manager_verify_all(m
);
1901 int manager_connect_bus(Manager
*m
) {
1909 r
= bus_open_system_watch_bind_with_description(&m
->bus
, "bus-api-resolve");
1911 return log_error_errno(r
, "Failed to connect to system bus: %m");
1913 r
= sd_bus_add_object_vtable(m
->bus
, NULL
, "/org/freedesktop/resolve1", "org.freedesktop.resolve1.Manager", resolve_vtable
, m
);
1915 return log_error_errno(r
, "Failed to register object: %m");
1917 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/resolve1/link", "org.freedesktop.resolve1.Link", link_vtable
, link_object_find
, m
);
1919 return log_error_errno(r
, "Failed to register link objects: %m");
1921 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/resolve1/link", link_node_enumerator
, m
);
1923 return log_error_errno(r
, "Failed to register link enumerator: %m");
1925 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/resolve1/dnssd", "org.freedesktop.resolve1.DnssdService", dnssd_vtable
, dnssd_object_find
, m
);
1927 return log_error_errno(r
, "Failed to register dnssd objects: %m");
1929 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/resolve1/dnssd", dnssd_node_enumerator
, m
);
1931 return log_error_errno(r
, "Failed to register dnssd enumerator: %m");
1933 r
= sd_bus_request_name_async(m
->bus
, NULL
, "org.freedesktop.resolve1", 0, NULL
, NULL
);
1935 return log_error_errno(r
, "Failed to request name: %m");
1937 r
= sd_bus_attach_event(m
->bus
, m
->event
, 0);
1939 return log_error_errno(r
, "Failed to attach bus to event loop: %m");
1941 r
= sd_bus_match_signal_async(
1944 "org.freedesktop.login1",
1945 "/org/freedesktop/login1",
1946 "org.freedesktop.login1.Manager",
1948 match_prepare_for_sleep
,
1952 log_warning_errno(r
, "Failed to request match for PrepareForSleep, ignoring: %m");
1957 int _manager_send_changed(Manager
*manager
, const char *property
, ...) {
1960 char **l
= strv_from_stdarg_alloca(property
);
1962 int r
= sd_bus_emit_properties_changed_strv(
1964 "/org/freedesktop/resolve1",
1965 "org.freedesktop.resolve1.Manager",
1968 log_notice_errno(r
, "Failed to emit notification about changed property %s: %m", property
);