1 /* SPDX-License-Identifier: LGPL-2.1+ */
4 #include <netinet/in.h>
5 #include <sys/capability.h>
7 #include "alloc-util.h"
8 #include "bus-common-errors.h"
9 #include "bus-polkit.h"
11 #include "parse-util.h"
12 #include "resolve-util.h"
13 #include "resolved-bus.h"
14 #include "resolved-link-bus.h"
15 #include "resolved-resolv-conf.h"
16 #include "stdio-util.h"
18 #include "user-util.h"
20 static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported
, "b", Link
, link_dnssec_supported
);
21 static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode
, "s", Link
, link_get_dnssec_mode
, dnssec_mode_to_string
);
23 static int property_get_dns_over_tls_mode(
26 const char *interface
,
28 sd_bus_message
*reply
,
30 sd_bus_error
*error
) {
37 return sd_bus_message_append(reply
, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l
)));
40 static int property_get_dns(
43 const char *interface
,
45 sd_bus_message
*reply
,
47 sd_bus_error
*error
) {
56 r
= sd_bus_message_open_container(reply
, 'a', "(iay)");
60 LIST_FOREACH(servers
, s
, l
->dns_servers
) {
61 r
= bus_dns_server_append(reply
, s
, false);
66 return sd_bus_message_close_container(reply
);
69 static int property_get_current_dns_server(
72 const char *interface
,
74 sd_bus_message
*reply
,
76 sd_bus_error
*error
) {
83 s
= *(DnsServer
**) userdata
;
85 return bus_dns_server_append(reply
, s
, false);
88 static int property_get_domains(
91 const char *interface
,
93 sd_bus_message
*reply
,
95 sd_bus_error
*error
) {
104 r
= sd_bus_message_open_container(reply
, 'a', "(sb)");
108 LIST_FOREACH(domains
, d
, l
->search_domains
) {
109 r
= sd_bus_message_append(reply
, "(sb)", d
->name
, d
->route_only
);
114 return sd_bus_message_close_container(reply
);
117 static int property_get_default_route(
120 const char *interface
,
121 const char *property
,
122 sd_bus_message
*reply
,
124 sd_bus_error
*error
) {
131 /* Return what is configured, if there's something configured */
132 if (l
->default_route
>= 0)
133 return sd_bus_message_append(reply
, "b", l
->default_route
);
135 /* Otherwise report what is in effect */
136 if (l
->unicast_scope
)
137 return sd_bus_message_append(reply
, "b", dns_scope_is_default_route(l
->unicast_scope
));
139 return sd_bus_message_append(reply
, "b", false);
142 static int property_get_scopes_mask(
145 const char *interface
,
146 const char *property
,
147 sd_bus_message
*reply
,
149 sd_bus_error
*error
) {
157 mask
= (l
->unicast_scope
? SD_RESOLVED_DNS
: 0) |
158 (l
->llmnr_ipv4_scope
? SD_RESOLVED_LLMNR_IPV4
: 0) |
159 (l
->llmnr_ipv6_scope
? SD_RESOLVED_LLMNR_IPV6
: 0) |
160 (l
->mdns_ipv4_scope
? SD_RESOLVED_MDNS_IPV4
: 0) |
161 (l
->mdns_ipv6_scope
? SD_RESOLVED_MDNS_IPV6
: 0);
163 return sd_bus_message_append(reply
, "t", mask
);
166 static int property_get_ntas(
169 const char *interface
,
170 const char *property
,
171 sd_bus_message
*reply
,
173 sd_bus_error
*error
) {
183 r
= sd_bus_message_open_container(reply
, 'a', "s");
187 SET_FOREACH(name
, l
->dnssec_negative_trust_anchors
, i
) {
188 r
= sd_bus_message_append(reply
, "s", name
);
193 return sd_bus_message_close_container(reply
);
196 static int verify_unmanaged_link(Link
*l
, sd_bus_error
*error
) {
199 if (l
->flags
& IFF_LOOPBACK
)
200 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is loopback device.", l
->ifname
);
202 return sd_bus_error_setf(error
, BUS_ERROR_LINK_BUSY
, "Link %s is managed.", l
->ifname
);
207 int bus_link_method_set_dns_servers(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
208 _cleanup_free_
struct in_addr_data
*dns
= NULL
;
209 size_t allocated
= 0, n
= 0;
217 r
= verify_unmanaged_link(l
, error
);
221 r
= sd_bus_message_enter_container(message
, 'a', "(iay)");
230 assert_cc(sizeof(int) == sizeof(int32_t));
232 r
= sd_bus_message_enter_container(message
, 'r', "iay");
238 r
= sd_bus_message_read(message
, "i", &family
);
242 if (!IN_SET(family
, AF_INET
, AF_INET6
))
243 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown address family %i", family
);
245 r
= sd_bus_message_read_array(message
, 'y', &d
, &sz
);
248 if (sz
!= FAMILY_ADDRESS_SIZE(family
))
249 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid address size");
251 if (!dns_server_address_valid(family
, d
))
252 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNS server address");
254 r
= sd_bus_message_exit_container(message
);
258 if (!GREEDY_REALLOC(dns
, allocated
, n
+1))
261 dns
[n
].family
= family
;
262 memcpy(&dns
[n
].address
, d
, sz
);
266 r
= sd_bus_message_exit_container(message
);
270 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
271 "org.freedesktop.resolve1.set-dns-servers",
272 NULL
, true, UID_INVALID
,
273 &l
->manager
->polkit_registry
, error
);
277 return 1; /* Polkit will call us back */
279 dns_server_mark_all(l
->dns_servers
);
281 for (i
= 0; i
< n
; i
++) {
284 s
= dns_server_find(l
->dns_servers
, dns
[i
].family
, &dns
[i
].address
, 0);
286 dns_server_move_back_and_unmark(s
);
288 r
= dns_server_new(l
->manager
, NULL
, DNS_SERVER_LINK
, l
, dns
[i
].family
, &dns
[i
].address
, 0, NULL
);
295 dns_server_unlink_marked(l
->dns_servers
);
296 link_allocate_scopes(l
);
298 (void) link_save_user(l
);
299 (void) manager_write_resolv_conf(l
->manager
);
300 (void) manager_send_changed(l
->manager
, "DNS");
302 return sd_bus_reply_method_return(message
, NULL
);
305 dns_server_unlink_all(l
->dns_servers
);
309 int bus_link_method_set_domains(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
316 r
= verify_unmanaged_link(l
, error
);
320 r
= sd_bus_message_enter_container(message
, 'a', "(sb)");
328 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
334 r
= dns_name_is_valid(name
);
338 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid search domain %s", name
);
339 if (!route_only
&& dns_name_is_root(name
))
340 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Root domain is not suitable as search domain");
343 r
= sd_bus_message_rewind(message
, false);
347 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
348 "org.freedesktop.resolve1.set-domains",
349 NULL
, true, UID_INVALID
,
350 &l
->manager
->polkit_registry
, error
);
354 return 1; /* Polkit will call us back */
356 dns_search_domain_mark_all(l
->search_domains
);
363 r
= sd_bus_message_read(message
, "(sb)", &name
, &route_only
);
369 r
= dns_search_domain_find(l
->search_domains
, name
, &d
);
374 dns_search_domain_move_back_and_unmark(d
);
376 r
= dns_search_domain_new(l
->manager
, &d
, DNS_SEARCH_DOMAIN_LINK
, l
, name
);
381 d
->route_only
= route_only
;
384 r
= sd_bus_message_exit_container(message
);
388 dns_search_domain_unlink_marked(l
->search_domains
);
390 (void) link_save_user(l
);
391 (void) manager_write_resolv_conf(l
->manager
);
393 return sd_bus_reply_method_return(message
, NULL
);
396 dns_search_domain_unlink_all(l
->search_domains
);
400 int bus_link_method_set_default_route(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
407 r
= verify_unmanaged_link(l
, error
);
411 r
= sd_bus_message_read(message
, "b", &b
);
415 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
416 "org.freedesktop.resolve1.set-default-route",
417 NULL
, true, UID_INVALID
,
418 &l
->manager
->polkit_registry
, error
);
422 return 1; /* Polkit will call us back */
424 if (l
->default_route
!= b
) {
425 l
->default_route
= b
;
427 (void) link_save_user(l
);
428 (void) manager_write_resolv_conf(l
->manager
);
431 return sd_bus_reply_method_return(message
, NULL
);
434 int bus_link_method_set_llmnr(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
443 r
= verify_unmanaged_link(l
, error
);
447 r
= sd_bus_message_read(message
, "s", &llmnr
);
452 mode
= RESOLVE_SUPPORT_YES
;
454 mode
= resolve_support_from_string(llmnr
);
456 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid LLMNR setting: %s", llmnr
);
459 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
460 "org.freedesktop.resolve1.set-llmnr",
461 NULL
, true, UID_INVALID
,
462 &l
->manager
->polkit_registry
, error
);
466 return 1; /* Polkit will call us back */
468 l
->llmnr_support
= mode
;
469 link_allocate_scopes(l
);
470 link_add_rrs(l
, false);
472 (void) link_save_user(l
);
474 return sd_bus_reply_method_return(message
, NULL
);
477 int bus_link_method_set_mdns(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
486 r
= verify_unmanaged_link(l
, error
);
490 r
= sd_bus_message_read(message
, "s", &mdns
);
495 mode
= RESOLVE_SUPPORT_NO
;
497 mode
= resolve_support_from_string(mdns
);
499 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid MulticastDNS setting: %s", mdns
);
502 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
503 "org.freedesktop.resolve1.set-mdns",
504 NULL
, true, UID_INVALID
,
505 &l
->manager
->polkit_registry
, error
);
509 return 1; /* Polkit will call us back */
511 l
->mdns_support
= mode
;
512 link_allocate_scopes(l
);
513 link_add_rrs(l
, false);
515 (void) link_save_user(l
);
517 return sd_bus_reply_method_return(message
, NULL
);
520 int bus_link_method_set_dns_over_tls(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
522 const char *dns_over_tls
;
529 r
= verify_unmanaged_link(l
, error
);
533 r
= sd_bus_message_read(message
, "s", &dns_over_tls
);
537 if (isempty(dns_over_tls
))
538 mode
= _DNS_OVER_TLS_MODE_INVALID
;
540 mode
= dns_over_tls_mode_from_string(dns_over_tls
);
542 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSOverTLS setting: %s", dns_over_tls
);
545 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
546 "org.freedesktop.resolve1.set-dns-over-tls",
547 NULL
, true, UID_INVALID
,
548 &l
->manager
->polkit_registry
, error
);
552 return 1; /* Polkit will call us back */
554 link_set_dns_over_tls_mode(l
, mode
);
556 (void) link_save_user(l
);
558 return sd_bus_reply_method_return(message
, NULL
);
561 int bus_link_method_set_dnssec(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
570 r
= verify_unmanaged_link(l
, error
);
574 r
= sd_bus_message_read(message
, "s", &dnssec
);
579 mode
= _DNSSEC_MODE_INVALID
;
581 mode
= dnssec_mode_from_string(dnssec
);
583 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid DNSSEC setting: %s", dnssec
);
586 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
587 "org.freedesktop.resolve1.set-dnssec",
588 NULL
, true, UID_INVALID
,
589 &l
->manager
->polkit_registry
, error
);
593 return 1; /* Polkit will call us back */
595 link_set_dnssec_mode(l
, mode
);
597 (void) link_save_user(l
);
599 return sd_bus_reply_method_return(message
, NULL
);
602 int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
603 _cleanup_set_free_free_ Set
*ns
= NULL
;
604 _cleanup_strv_free_
char **ntas
= NULL
;
612 r
= verify_unmanaged_link(l
, error
);
616 ns
= set_new(&dns_name_hash_ops
);
620 r
= sd_bus_message_read_strv(message
, &ntas
);
624 STRV_FOREACH(i
, ntas
) {
625 r
= dns_name_is_valid(*i
);
629 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
,
630 "Invalid negative trust anchor domain: %s", *i
);
632 r
= set_put_strdup(ns
, *i
);
637 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
638 "org.freedesktop.resolve1.set-dnssec-negative-trust-anchors",
639 NULL
, true, UID_INVALID
,
640 &l
->manager
->polkit_registry
, error
);
644 return 1; /* Polkit will call us back */
646 set_free_free(l
->dnssec_negative_trust_anchors
);
647 l
->dnssec_negative_trust_anchors
= TAKE_PTR(ns
);
649 (void) link_save_user(l
);
651 return sd_bus_reply_method_return(message
, NULL
);
654 int bus_link_method_revert(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
661 r
= verify_unmanaged_link(l
, error
);
665 r
= bus_verify_polkit_async(message
, CAP_NET_ADMIN
,
666 "org.freedesktop.resolve1.revert",
667 NULL
, true, UID_INVALID
,
668 &l
->manager
->polkit_registry
, error
);
672 return 1; /* Polkit will call us back */
674 link_flush_settings(l
);
675 link_allocate_scopes(l
);
676 link_add_rrs(l
, false);
678 (void) link_save_user(l
);
679 (void) manager_write_resolv_conf(l
->manager
);
680 (void) manager_send_changed(l
->manager
, "DNS");
682 return sd_bus_reply_method_return(message
, NULL
);
685 const sd_bus_vtable link_vtable
[] = {
686 SD_BUS_VTABLE_START(0),
688 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask
, 0, 0),
689 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns
, 0, 0),
690 SD_BUS_PROPERTY("CurrentDNSServer", "(iay)", property_get_current_dns_server
, offsetof(Link
, current_dns_server
), 0),
691 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains
, 0, 0),
692 SD_BUS_PROPERTY("DefaultRoute", "b", property_get_default_route
, 0, 0),
693 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support
, offsetof(Link
, llmnr_support
), 0),
694 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support
, offsetof(Link
, mdns_support
), 0),
695 SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode
, 0, 0),
696 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode
, 0, 0),
697 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas
, 0, 0),
698 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported
, 0, 0),
700 SD_BUS_METHOD("SetDNS", "a(iay)", NULL
, bus_link_method_set_dns_servers
, SD_BUS_VTABLE_UNPRIVILEGED
),
701 SD_BUS_METHOD("SetDomains", "a(sb)", NULL
, bus_link_method_set_domains
, SD_BUS_VTABLE_UNPRIVILEGED
),
702 SD_BUS_METHOD("SetDefaultRoute", "b", NULL
, bus_link_method_set_default_route
, SD_BUS_VTABLE_UNPRIVILEGED
),
703 SD_BUS_METHOD("SetLLMNR", "s", NULL
, bus_link_method_set_llmnr
, SD_BUS_VTABLE_UNPRIVILEGED
),
704 SD_BUS_METHOD("SetMulticastDNS", "s", NULL
, bus_link_method_set_mdns
, SD_BUS_VTABLE_UNPRIVILEGED
),
705 SD_BUS_METHOD("SetDNSOverTLS", "s", NULL
, bus_link_method_set_dns_over_tls
, SD_BUS_VTABLE_UNPRIVILEGED
),
706 SD_BUS_METHOD("SetDNSSEC", "s", NULL
, bus_link_method_set_dnssec
, SD_BUS_VTABLE_UNPRIVILEGED
),
707 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL
, bus_link_method_set_dnssec_negative_trust_anchors
, SD_BUS_VTABLE_UNPRIVILEGED
),
708 SD_BUS_METHOD("Revert", NULL
, NULL
, bus_link_method_revert
, SD_BUS_VTABLE_UNPRIVILEGED
),
713 int link_object_find(sd_bus
*bus
, const char *path
, const char *interface
, void *userdata
, void **found
, sd_bus_error
*error
) {
714 _cleanup_free_
char *e
= NULL
;
715 Manager
*m
= userdata
;
725 r
= sd_bus_path_decode(path
, "/org/freedesktop/resolve1/link", &e
);
729 ifindex
= parse_ifindex(e
);
733 link
= hashmap_get(m
->links
, INT_TO_PTR(ifindex
));
741 char *link_bus_path(const Link
*link
) {
742 char *p
, ifindex
[DECIMAL_STR_MAX(link
->ifindex
)];
747 xsprintf(ifindex
, "%i", link
->ifindex
);
749 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex
, &p
);
756 int link_node_enumerator(sd_bus
*bus
, const char *path
, void *userdata
, char ***nodes
, sd_bus_error
*error
) {
757 _cleanup_strv_free_
char **l
= NULL
;
758 Manager
*m
= userdata
;
768 l
= new0(char*, hashmap_size(m
->links
) + 1);
772 HASHMAP_FOREACH(link
, m
->links
, i
) {
775 p
= link_bus_path(link
);
783 *nodes
= TAKE_PTR(l
);