2019-09-10 11:19:01 +02:00
|
|
|
// SPDX-License-Identifier: LGPL-2.1+
|
2019-09-25 13:13:40 +02:00
|
|
|
/*
|
|
|
|
|
* Copyright (C) 2018 Red Hat, Inc.
|
2018-10-03 21:50:27 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include "nm-default.h"
|
|
|
|
|
|
2018-12-28 18:11:16 +01:00
|
|
|
#include "nm-sd-utils-shared.h"
|
2018-10-03 21:50:27 +02:00
|
|
|
|
2018-12-28 18:11:16 +01:00
|
|
|
#include "nm-sd-adapt-shared.h"
|
2018-10-03 21:50:27 +02:00
|
|
|
|
2019-06-25 13:53:35 +02:00
|
|
|
#include "dns-domain.h"
|
2019-10-17 17:39:56 +02:00
|
|
|
#include "hexdecoct.h"
|
|
|
|
|
#include "hostname-util.h"
|
|
|
|
|
#include "path-util.h"
|
2020-04-24 09:35:12 +02:00
|
|
|
#include "web-util.h"
|
2018-10-03 21:50:27 +02:00
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
2019-07-26 14:47:35 +02:00
|
|
|
const bool mempool_use_allowed = true;
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
2018-10-03 21:50:27 +02:00
|
|
|
gboolean
|
|
|
|
|
nm_sd_utils_path_equal (const char *a, const char *b)
|
|
|
|
|
{
|
|
|
|
|
return path_equal (a, b);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
char *
|
|
|
|
|
nm_sd_utils_path_simplify (char *path, gboolean kill_dots)
|
|
|
|
|
{
|
|
|
|
|
return path_simplify (path, kill_dots);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const char *
|
|
|
|
|
nm_sd_utils_path_startswith (const char *path, const char *prefix)
|
|
|
|
|
{
|
|
|
|
|
return path_startswith (path, prefix);
|
|
|
|
|
}
|
2018-12-28 19:56:19 +01:00
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
2019-10-17 17:59:24 +02:00
|
|
|
int
|
2018-12-28 19:56:19 +01:00
|
|
|
nm_sd_utils_unbase64char (char ch, gboolean accept_padding_equal)
|
|
|
|
|
{
|
|
|
|
|
if ( ch == '='
|
|
|
|
|
&& accept_padding_equal)
|
|
|
|
|
return G_MAXINT;
|
|
|
|
|
return unbase64char (ch);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* nm_sd_utils_unbase64mem:
|
|
|
|
|
* @p: a valid base64 string. Whitespace is ignored, but invalid encodings
|
|
|
|
|
* will cause the function to fail.
|
|
|
|
|
* @l: the length of @p. @p is not treated as NUL terminated string but
|
|
|
|
|
* merely as a buffer of ascii characters.
|
2019-04-12 07:39:48 +02:00
|
|
|
* @secure: whether the temporary memory will be cleared to avoid leaving
|
|
|
|
|
* secrets in memory (see also nm_explict_bzero()).
|
2018-12-28 19:56:19 +01:00
|
|
|
* @mem: (transfer full): the decoded buffer on success.
|
|
|
|
|
* @len: the length of @mem on success.
|
|
|
|
|
*
|
|
|
|
|
* glib provides g_base64_decode(), but that does not report any errors
|
|
|
|
|
* from invalid encodings. Expose systemd's implementation which does
|
|
|
|
|
* reject invalid inputs.
|
|
|
|
|
*
|
|
|
|
|
* Returns: a non-negative code on success. Invalid encoding let the
|
|
|
|
|
* function fail.
|
|
|
|
|
*/
|
|
|
|
|
int
|
|
|
|
|
nm_sd_utils_unbase64mem (const char *p,
|
|
|
|
|
size_t l,
|
2019-04-12 07:39:48 +02:00
|
|
|
gboolean secure,
|
2018-12-28 19:56:19 +01:00
|
|
|
guint8 **mem,
|
|
|
|
|
size_t *len)
|
|
|
|
|
{
|
2019-04-12 07:39:48 +02:00
|
|
|
return unbase64mem_full (p, l, secure, (void **) mem, len);
|
2018-12-28 19:56:19 +01:00
|
|
|
}
|
2019-06-25 13:53:35 +02:00
|
|
|
|
|
|
|
|
int nm_sd_dns_name_to_wire_format (const char *domain,
|
|
|
|
|
guint8 *buffer,
|
|
|
|
|
size_t len,
|
|
|
|
|
gboolean canonical)
|
|
|
|
|
{
|
|
|
|
|
return dns_name_to_wire_format (domain, buffer, len, canonical);
|
|
|
|
|
}
|
2019-10-17 17:39:56 +02:00
|
|
|
|
|
|
|
|
int nm_sd_dns_name_is_valid (const char *s)
|
|
|
|
|
{
|
|
|
|
|
return dns_name_is_valid (s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
gboolean nm_sd_hostname_is_valid (const char *s, bool allow_trailing_dot)
|
|
|
|
|
{
|
|
|
|
|
return hostname_is_valid (s, allow_trailing_dot);
|
|
|
|
|
}
|
2020-04-24 09:35:12 +02:00
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
|
|
|
|
|
|
|
|
static gboolean
|
|
|
|
|
_http_url_is_valid (const char *url)
|
|
|
|
|
{
|
|
|
|
|
if ( !url
|
|
|
|
|
|| !url[0])
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
if (NM_STR_HAS_PREFIX (url, "http://"))
|
|
|
|
|
url += NM_STRLEN ("http://");
|
|
|
|
|
else if (NM_STR_HAS_PREFIX (url, "https://"))
|
|
|
|
|
url += NM_STRLEN ("https://");
|
|
|
|
|
else
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
if (!url[0])
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
|
|
return !NM_STRCHAR_ANY (url, ch, (guchar) ch >= 128u);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
gboolean
|
|
|
|
|
nm_sd_http_url_is_valid (const char *url)
|
|
|
|
|
{
|
|
|
|
|
gboolean v;
|
|
|
|
|
|
|
|
|
|
/* http_url_is_valid() is part of our API, as we use it to validate connection
|
|
|
|
|
* properties. That means, it's behavior must remain stable (or only change
|
|
|
|
|
* with care).
|
|
|
|
|
*
|
|
|
|
|
* Thus, reimplement it, and make sure that our implementation agrees. */
|
|
|
|
|
v = _http_url_is_valid (url);
|
|
|
|
|
nm_assert (v == http_url_is_valid (url));
|
|
|
|
|
return v;
|
|
|
|
|
}
|