mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-05-02 20:08:04 +02:00
2915 lines
102 KiB
C
2915 lines
102 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
/*
|
|
* Copyright (C) 2004 - 2005 Colin Walters <walters@redhat.com>
|
|
* Copyright (C) 2004 - 2017 Red Hat, Inc.
|
|
* Copyright (C) 2005 - 2008 Novell, Inc.
|
|
*/
|
|
|
|
#include "src/core/nm-default-daemon.h"
|
|
|
|
#include "nm-dns-manager.h"
|
|
|
|
#include <fcntl.h>
|
|
#include <resolv.h>
|
|
#include <stdlib.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/types.h>
|
|
#include <sys/wait.h>
|
|
#include <unistd.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#if WITH_LIBPSL
|
|
#include <libpsl.h>
|
|
#endif
|
|
|
|
#include "libnm-core-intern/nm-core-internal.h"
|
|
#include "libnm-glib-aux/nm-str-buf.h"
|
|
|
|
#include "NetworkManagerUtils.h"
|
|
#include "devices/nm-device.h"
|
|
#include "nm-config.h"
|
|
#include "nm-dbus-object.h"
|
|
#include "nm-dns-dnsmasq.h"
|
|
#include "nm-dns-plugin.h"
|
|
#include "nm-dns-systemd-resolved.h"
|
|
#include "nm-ip-config.h"
|
|
#include "nm-l3-config-data.h"
|
|
#include "nm-manager.h"
|
|
#include "nm-utils.h"
|
|
|
|
#define HASH_LEN NM_UTILS_CHECKSUM_LENGTH_SHA1
|
|
|
|
#ifndef RESOLVCONF_PATH
|
|
#define RESOLVCONF_PATH "/sbin/resolvconf"
|
|
#define HAS_RESOLVCONF 0
|
|
#else
|
|
#define HAS_RESOLVCONF 1
|
|
#endif
|
|
|
|
#ifndef NETCONFIG_PATH
|
|
#define NETCONFIG_PATH "/sbin/netconfig"
|
|
#define HAS_NETCONFIG 0
|
|
#else
|
|
#define HAS_NETCONFIG 1
|
|
#endif
|
|
|
|
#define UPDATE_PENDING_UNBLOCK_TIMEOUT_MSEC 5000
|
|
|
|
/*****************************************************************************/
|
|
|
|
typedef enum { SR_SUCCESS, SR_NOTFOUND, SR_ERROR } SpawnResult;
|
|
|
|
typedef struct {
|
|
GPtrArray *nameservers;
|
|
GPtrArray *searches;
|
|
GPtrArray *options;
|
|
const char *nis_domain;
|
|
GPtrArray *nis_servers;
|
|
NMTernary has_trust_ad;
|
|
} NMResolvConfData;
|
|
|
|
/*****************************************************************************/
|
|
|
|
enum {
|
|
CONFIG_CHANGED,
|
|
|
|
LAST_SIGNAL
|
|
};
|
|
|
|
NM_GOBJECT_PROPERTIES_DEFINE(NMDnsManager,
|
|
PROP_MODE,
|
|
PROP_RC_MANAGER,
|
|
PROP_CONFIGURATION,
|
|
PROP_UPDATE_PENDING, );
|
|
|
|
static guint signals[LAST_SIGNAL] = {0};
|
|
|
|
typedef struct {
|
|
GHashTable *configs_dict;
|
|
CList configs_lst_head;
|
|
|
|
CList ip_data_lst_head;
|
|
GVariant *config_variant;
|
|
|
|
/* A DNS plugin should not be marked as pending indefinitely.
|
|
* We are only blocked if "update_pending" is TRUE and we have
|
|
* "update_pending_unblock" timer ticking. */
|
|
GSource *update_pending_unblock;
|
|
|
|
bool ip_data_lst_need_sort : 1;
|
|
|
|
bool configs_lst_need_sort : 1;
|
|
|
|
bool dns_touched : 1;
|
|
bool is_stopped : 1;
|
|
|
|
bool config_changed : 1;
|
|
|
|
bool update_pending : 1;
|
|
|
|
char *hostdomain;
|
|
guint updates_queue;
|
|
|
|
guint8 hash[HASH_LEN]; /* SHA1 hash of current DNS config */
|
|
guint8 prev_hash[HASH_LEN]; /* Hash when begin_updates() was called */
|
|
|
|
NMDnsManagerResolvConfManager rc_manager;
|
|
char *mode;
|
|
NMDnsPlugin *sd_resolve_plugin;
|
|
NMDnsPlugin *plugin;
|
|
|
|
gulong update_changed_signal_id_sd;
|
|
gulong update_changed_signal_id;
|
|
|
|
NMConfig *config;
|
|
|
|
struct {
|
|
guint64 ts;
|
|
guint num_restarts;
|
|
guint timer;
|
|
} plugin_ratelimit;
|
|
} NMDnsManagerPrivate;
|
|
|
|
struct _NMDnsManager {
|
|
NMDBusObject parent;
|
|
NMDnsManagerPrivate _priv;
|
|
};
|
|
|
|
struct _NMDnsManagerClass {
|
|
NMDBusObjectClass parent;
|
|
};
|
|
|
|
G_DEFINE_TYPE(NMDnsManager, nm_dns_manager, NM_TYPE_DBUS_OBJECT)
|
|
|
|
#define NM_DNS_MANAGER_GET_PRIVATE(self) _NM_GET_PRIVATE(self, NMDnsManager, NM_IS_DNS_MANAGER)
|
|
|
|
NM_DEFINE_SINGLETON_GETTER(NMDnsManager, nm_dns_manager_get, NM_TYPE_DNS_MANAGER);
|
|
|
|
/*****************************************************************************/
|
|
|
|
#define _NMLOG_PREFIX_NAME "dns-mgr"
|
|
#define _NMLOG_DOMAIN LOGD_DNS
|
|
#define _NMLOG(level, ...) \
|
|
G_STMT_START \
|
|
{ \
|
|
const NMLogLevel __level = (level); \
|
|
\
|
|
if (nm_logging_enabled(__level, _NMLOG_DOMAIN)) { \
|
|
_nm_unused const NMDnsManager *const __self = (self); \
|
|
\
|
|
_nm_log(__level, \
|
|
_NMLOG_DOMAIN, \
|
|
0, \
|
|
NULL, \
|
|
NULL, \
|
|
"%s: " _NM_UTILS_MACRO_FIRST(__VA_ARGS__), \
|
|
_NMLOG_PREFIX_NAME _NM_UTILS_MACRO_REST(__VA_ARGS__)); \
|
|
} \
|
|
} \
|
|
G_STMT_END
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
domain_is_valid(const char *domain,
|
|
gboolean reject_public_suffix,
|
|
gboolean assume_any_tld_is_public)
|
|
{
|
|
if (*domain == '\0')
|
|
return FALSE;
|
|
|
|
if (reject_public_suffix) {
|
|
int is_pub;
|
|
|
|
#if !WITH_LIBPSL
|
|
/* Without libpsl, we cannot detect that the domain is a public suffix, we assume
|
|
* the domain is not and valid. */
|
|
is_pub = FALSE;
|
|
#elif defined(PSL_TYPE_NO_STAR_RULE)
|
|
/*
|
|
* If we use PSL_TYPE_ANY, any TLD (top-level domain, i.e., domain
|
|
* with no dots) is considered *public* by the PSL library even if
|
|
* it is *not* on the official suffix list. This is the implicit
|
|
* behavior of the older API function psl_is_public_suffix().
|
|
* To inhibit that and only deem TLDs explicitly listed in the PSL
|
|
* as public, we need to turn off the "prevailing star rule" with
|
|
* PSL_TYPE_NO_STAR_RULE.
|
|
* For documentation on psl_is_public_suffix2(), see:
|
|
* https://rockdaboot.github.io/libpsl/libpsl-Public-Suffix-List-functions.html#psl-is-public-suffix2
|
|
* For more on the public suffix format, including wildcards:
|
|
* https://github.com/publicsuffix/list/wiki/Format#format
|
|
*/
|
|
is_pub =
|
|
psl_is_public_suffix2(psl_builtin(),
|
|
domain,
|
|
assume_any_tld_is_public ? PSL_TYPE_ANY : PSL_TYPE_NO_STAR_RULE);
|
|
#else
|
|
is_pub = psl_is_public_suffix(psl_builtin(), domain);
|
|
#endif
|
|
|
|
if (is_pub)
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
domain_is_routing(const char *domain)
|
|
{
|
|
return domain[0] == '~';
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static NM_UTILS_LOOKUP_STR_DEFINE(
|
|
_rc_manager_to_string,
|
|
NMDnsManagerResolvConfManager,
|
|
NM_UTILS_LOOKUP_DEFAULT_WARN(NULL),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_AUTO, "auto"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_UNKNOWN, "unknown"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED, "unmanaged"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_IMMUTABLE, "immutable"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK, "symlink"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_FILE, "file"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_RESOLVCONF, "resolvconf"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_MANAGER_RESOLV_CONF_MAN_NETCONFIG, "netconfig"), );
|
|
|
|
static NM_UTILS_LOOKUP_STR_DEFINE(
|
|
_config_type_to_string,
|
|
NMDnsIPConfigType,
|
|
NM_UTILS_LOOKUP_DEFAULT_WARN("<unknown>"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_IP_CONFIG_TYPE_REMOVED, "removed"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_IP_CONFIG_TYPE_DEFAULT, "default"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_IP_CONFIG_TYPE_BEST_DEVICE, "best"),
|
|
NM_UTILS_LOOKUP_STR_ITEM(NM_DNS_IP_CONFIG_TYPE_VPN, "vpn"), );
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
_update_pending_detect(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (priv->plugin && nm_dns_plugin_get_update_pending(priv->plugin))
|
|
return TRUE;
|
|
if (priv->sd_resolve_plugin && nm_dns_plugin_get_update_pending(priv->sd_resolve_plugin))
|
|
return TRUE;
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
_update_pending_unblock_cb(gpointer user_data)
|
|
{
|
|
NMDnsManager *self = user_data;
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
nm_assert(priv->update_pending);
|
|
nm_assert(priv->update_pending_unblock);
|
|
nm_assert(_update_pending_detect(self));
|
|
|
|
nm_clear_g_source_inst(&priv->update_pending_unblock);
|
|
|
|
_LOGW(
|
|
"update-pending changed: DNS plugin did not become ready again. Assume something is wrong");
|
|
|
|
_notify(self, PROP_UPDATE_PENDING);
|
|
return G_SOURCE_CONTINUE;
|
|
}
|
|
|
|
static void
|
|
_update_pending_maybe_changed(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
gboolean update_pending;
|
|
|
|
update_pending = _update_pending_detect(self);
|
|
if (priv->update_pending == update_pending)
|
|
return;
|
|
|
|
if (update_pending) {
|
|
nm_assert(!priv->update_pending_unblock);
|
|
priv->update_pending_unblock = nm_g_timeout_add_source(UPDATE_PENDING_UNBLOCK_TIMEOUT_MSEC,
|
|
_update_pending_unblock_cb,
|
|
self);
|
|
} else
|
|
nm_clear_g_source_inst(&priv->update_pending_unblock);
|
|
|
|
priv->update_pending = update_pending;
|
|
_LOGD("update-pending changed: %spending", update_pending ? "" : "not ");
|
|
_notify(self, PROP_UPDATE_PENDING);
|
|
}
|
|
|
|
static void
|
|
_update_pending_changed_cb(NMDnsPlugin *plugin, gboolean update_pending, NMDnsManager *self)
|
|
{
|
|
_update_pending_maybe_changed(self);
|
|
}
|
|
|
|
gboolean
|
|
nm_dns_manager_get_update_pending(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv;
|
|
|
|
g_return_val_if_fail(NM_IS_DNS_MANAGER(self), FALSE);
|
|
|
|
priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
nm_assert(priv->update_pending == _update_pending_detect(self));
|
|
nm_assert(priv->update_pending || !priv->update_pending_unblock);
|
|
|
|
/* update-pending can only be TRUE for a certain time (before we assume
|
|
* something is really wrong with the plugin). That is, as long as
|
|
* update_pending_unblock is ticking. */
|
|
return !!priv->update_pending_unblock;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static int
|
|
_dns_config_ip_data_get_dns_priority1(const NML3ConfigData *l3cd, int addr_family)
|
|
{
|
|
int prio;
|
|
|
|
if (!nm_l3_config_data_get_dns_priority(l3cd, addr_family, &prio))
|
|
return 0;
|
|
|
|
nm_assert(prio != 0);
|
|
return prio;
|
|
}
|
|
|
|
static int
|
|
_dns_config_ip_data_get_dns_priority(const NMDnsConfigIPData *ip_data)
|
|
{
|
|
return _dns_config_ip_data_get_dns_priority1(ip_data->l3cd, ip_data->addr_family);
|
|
}
|
|
|
|
static void
|
|
_ASSERT_dns_config_data(const NMDnsConfigData *data)
|
|
{
|
|
nm_assert(data);
|
|
nm_assert(NM_IS_DNS_MANAGER(data->self));
|
|
nm_assert(data->ifindex > 0);
|
|
}
|
|
|
|
static void
|
|
_ASSERT_dns_config_ip_data(const NMDnsConfigIPData *ip_data)
|
|
{
|
|
nm_assert(ip_data);
|
|
_ASSERT_dns_config_data(ip_data->data);
|
|
nm_assert(NM_IS_L3_CONFIG_DATA(ip_data->l3cd));
|
|
nm_assert(c_list_contains(&ip_data->data->data_lst_head, &ip_data->data_lst));
|
|
nm_assert(ip_data->data->ifindex == nm_l3_config_data_get_ifindex(ip_data->l3cd));
|
|
#if NM_MORE_ASSERTS > 5
|
|
{
|
|
gboolean has_default = FALSE;
|
|
gsize i;
|
|
|
|
for (i = 0; ip_data->domains.search && ip_data->domains.search; i++) {
|
|
const char *d = ip_data->domains.search[i];
|
|
|
|
d = nm_utils_parse_dns_domain(d, NULL);
|
|
nm_assert(d);
|
|
if (d[0] == '\0')
|
|
has_default = TRUE;
|
|
}
|
|
nm_assert(has_default == ip_data->domains.has_default_route_explicit);
|
|
if (ip_data->domains.has_default_route_explicit)
|
|
nm_assert(ip_data->domains.has_default_route_exclusive);
|
|
if (ip_data->domains.has_default_route_exclusive)
|
|
nm_assert(ip_data->domains.has_default_route);
|
|
}
|
|
nm_assert(_dns_config_ip_data_get_dns_priority(ip_data) != 0);
|
|
#endif
|
|
}
|
|
|
|
static NMDnsConfigIPData *
|
|
_dns_config_ip_data_new(NMDnsConfigData *data,
|
|
int addr_family,
|
|
gconstpointer source_tag,
|
|
const NML3ConfigData *l3cd,
|
|
NMDnsIPConfigType ip_config_type)
|
|
{
|
|
NMDnsConfigIPData *ip_data;
|
|
|
|
_ASSERT_dns_config_data(data);
|
|
nm_assert(NM_IS_L3_CONFIG_DATA(l3cd));
|
|
nm_assert(ip_config_type != NM_DNS_IP_CONFIG_TYPE_REMOVED);
|
|
|
|
ip_data = g_slice_new(NMDnsConfigIPData);
|
|
*ip_data = (NMDnsConfigIPData){
|
|
.data = data,
|
|
.source_tag = source_tag,
|
|
.l3cd = nm_l3_config_data_ref_and_seal(l3cd),
|
|
.ip_config_type = ip_config_type,
|
|
.addr_family = addr_family,
|
|
};
|
|
c_list_link_tail(&data->data_lst_head, &ip_data->data_lst);
|
|
c_list_link_tail(&NM_DNS_MANAGER_GET_PRIVATE(data->self)->ip_data_lst_head,
|
|
&ip_data->ip_data_lst);
|
|
|
|
/* We also need to set priv->ip_data_lst_need_sort, but the caller will do that! */
|
|
|
|
_ASSERT_dns_config_ip_data(ip_data);
|
|
return ip_data;
|
|
}
|
|
|
|
static void
|
|
_dns_config_ip_data_free(NMDnsConfigIPData *ip_data)
|
|
{
|
|
_ASSERT_dns_config_ip_data(ip_data);
|
|
|
|
c_list_unlink_stale(&ip_data->data_lst);
|
|
c_list_unlink_stale(&ip_data->ip_data_lst);
|
|
|
|
g_free(ip_data->domains.search);
|
|
g_strfreev(ip_data->domains.reverse);
|
|
|
|
nm_l3_config_data_unref(ip_data->l3cd);
|
|
nm_g_slice_free(ip_data);
|
|
}
|
|
|
|
static void
|
|
_dns_config_data_free(NMDnsConfigData *data)
|
|
{
|
|
_ASSERT_dns_config_data(data);
|
|
|
|
nm_assert(c_list_is_empty(&data->data_lst_head));
|
|
c_list_unlink_stale(&data->configs_lst);
|
|
nm_g_slice_free(data);
|
|
}
|
|
|
|
static int
|
|
_mgr_get_ip_data_lst_cmp(const CList *a_lst, const CList *b_lst, const void *user_data)
|
|
{
|
|
const NMDnsConfigIPData *a = c_list_entry(a_lst, NMDnsConfigIPData, ip_data_lst);
|
|
const NMDnsConfigIPData *b = c_list_entry(b_lst, NMDnsConfigIPData, ip_data_lst);
|
|
|
|
/* Configurations with lower priority value first */
|
|
NM_CMP_DIRECT(_dns_config_ip_data_get_dns_priority(a), _dns_config_ip_data_get_dns_priority(b));
|
|
|
|
/* Sort according to type (descendingly) */
|
|
NM_CMP_FIELD(b, a, ip_config_type);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static CList *
|
|
_mgr_get_ip_data_lst_head(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (G_UNLIKELY(priv->ip_data_lst_need_sort)) {
|
|
priv->ip_data_lst_need_sort = FALSE;
|
|
c_list_sort(&priv->ip_data_lst_head, _mgr_get_ip_data_lst_cmp, NULL);
|
|
}
|
|
|
|
return &priv->ip_data_lst_head;
|
|
}
|
|
|
|
static int
|
|
_mgr_get_configs_lst_cmp(const CList *a_lst, const CList *b_lst, const void *user_data)
|
|
{
|
|
const NMDnsConfigData *a = c_list_entry(a_lst, NMDnsConfigData, configs_lst);
|
|
const NMDnsConfigData *b = c_list_entry(b_lst, NMDnsConfigData, configs_lst);
|
|
|
|
NM_CMP_FIELD(b, a, ifindex);
|
|
return nm_assert_unreachable_val(0);
|
|
}
|
|
|
|
_nm_unused static CList *
|
|
_mgr_get_configs_lst_head(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (G_UNLIKELY(priv->configs_lst_need_sort)) {
|
|
priv->configs_lst_need_sort = FALSE;
|
|
c_list_sort(&priv->configs_lst_head, _mgr_get_configs_lst_cmp, NULL);
|
|
}
|
|
|
|
return &priv->configs_lst_head;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
NMDnsPlugin *
|
|
nm_dns_manager_get_systemd_resolved(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv;
|
|
NMDnsPlugin *plugin = NULL;
|
|
|
|
g_return_val_if_fail(NM_IS_DNS_MANAGER(self), FALSE);
|
|
|
|
priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (priv->sd_resolve_plugin) {
|
|
nm_assert(!NM_IS_DNS_SYSTEMD_RESOLVED(priv->plugin));
|
|
plugin = priv->sd_resolve_plugin;
|
|
} else if (NM_IS_DNS_SYSTEMD_RESOLVED(priv->plugin))
|
|
plugin = priv->plugin;
|
|
|
|
if (plugin && nm_dns_systemd_resolved_is_running(NM_DNS_SYSTEMD_RESOLVED(plugin)))
|
|
return plugin;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
add_string_item(GPtrArray *array, const char *str, gboolean dup)
|
|
{
|
|
int i;
|
|
|
|
g_return_if_fail(array != NULL);
|
|
g_return_if_fail(str != NULL);
|
|
|
|
/* Check for dupes before adding */
|
|
for (i = 0; i < array->len; i++) {
|
|
const char *candidate = g_ptr_array_index(array, i);
|
|
|
|
if (candidate && !strcmp(candidate, str))
|
|
return;
|
|
}
|
|
|
|
/* No dupes, add the new item */
|
|
g_ptr_array_add(array, dup ? g_strdup(str) : (gpointer) str);
|
|
}
|
|
|
|
static void
|
|
add_dns_option_item(GPtrArray *array, const char *str)
|
|
{
|
|
if (_nm_utils_dns_option_find_idx(array, str) < 0)
|
|
g_ptr_array_add(array, g_strdup(str));
|
|
}
|
|
|
|
static void
|
|
add_dns_domains(GPtrArray *array,
|
|
int addr_family,
|
|
const NML3ConfigData *l3cd,
|
|
gboolean include_routing,
|
|
gboolean dup)
|
|
{
|
|
const char *const *domains;
|
|
const char *const *searches;
|
|
guint num_domains;
|
|
guint num_searches;
|
|
guint i;
|
|
const char *str;
|
|
|
|
domains = nm_l3_config_data_get_domains(l3cd, addr_family, &num_domains);
|
|
searches = nm_l3_config_data_get_searches(l3cd, addr_family, &num_searches);
|
|
|
|
for (i = 0; i < num_searches; i++) {
|
|
str = searches[i];
|
|
if (!include_routing && domain_is_routing(str))
|
|
continue;
|
|
if (!domain_is_valid(nm_utils_parse_dns_domain(str, NULL), FALSE, TRUE))
|
|
continue;
|
|
add_string_item(array, str, dup);
|
|
}
|
|
if (num_domains > 1 || num_searches == 0) {
|
|
for (i = 0; i < num_domains; i++) {
|
|
str = domains[i];
|
|
if (!include_routing && domain_is_routing(str))
|
|
continue;
|
|
if (!domain_is_valid(nm_utils_parse_dns_domain(str, NULL), FALSE, TRUE))
|
|
continue;
|
|
add_string_item(array, str, dup);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
merge_one_l3cd(NMResolvConfData *rc, int addr_family, int ifindex, const NML3ConfigData *l3cd)
|
|
{
|
|
char buf[NM_INET_ADDRSTRLEN + 50];
|
|
gboolean has_trust_ad;
|
|
guint num_nameservers;
|
|
guint num;
|
|
guint i;
|
|
const char *const *strarr;
|
|
|
|
nm_assert(ifindex == nm_l3_config_data_get_ifindex(l3cd));
|
|
|
|
strarr = nm_l3_config_data_get_nameservers(l3cd, addr_family, &num_nameservers);
|
|
for (i = 0; i < num_nameservers; i++) {
|
|
NMIPAddr a;
|
|
|
|
if (!nm_utils_dnsname_parse_assert(addr_family, strarr[i], NULL, &a, NULL))
|
|
continue;
|
|
|
|
if (addr_family == AF_INET)
|
|
nm_inet_ntop(addr_family, &a, buf);
|
|
else if (IN6_IS_ADDR_V4MAPPED(&a))
|
|
nm_inet4_ntop(a.addr6.s6_addr32[3], buf);
|
|
else {
|
|
nm_inet6_ntop(&a.addr6, buf);
|
|
if (IN6_IS_ADDR_LINKLOCAL(&a)) {
|
|
const char *ifname;
|
|
|
|
ifname = nm_platform_link_get_name(NM_PLATFORM_GET, ifindex);
|
|
if (ifname) {
|
|
g_strlcat(buf, "%", sizeof(buf));
|
|
g_strlcat(buf, ifname, sizeof(buf));
|
|
}
|
|
}
|
|
}
|
|
|
|
add_string_item(rc->nameservers, buf, TRUE);
|
|
}
|
|
|
|
add_dns_domains(rc->searches, addr_family, l3cd, FALSE, TRUE);
|
|
|
|
has_trust_ad = FALSE;
|
|
strarr = nm_l3_config_data_get_dns_options(l3cd, addr_family, &num);
|
|
for (i = 0; i < num; i++) {
|
|
const char *option = strarr[i];
|
|
|
|
if (nm_streq(option, NM_SETTING_DNS_OPTION_TRUST_AD)) {
|
|
has_trust_ad = TRUE;
|
|
continue;
|
|
}
|
|
add_dns_option_item(rc->options, option);
|
|
}
|
|
|
|
if (num_nameservers == 0) {
|
|
/* If the @l3cd contributes no DNS servers, ignore whether trust-ad is set or unset
|
|
* for this @l3cd. */
|
|
} else if (has_trust_ad) {
|
|
/* We only set has_trust_ad to TRUE, if all IP configs agree (or don't contribute).
|
|
* Once set to FALSE, it doesn't get reset. */
|
|
if (rc->has_trust_ad == NM_TERNARY_DEFAULT)
|
|
rc->has_trust_ad = NM_TERNARY_TRUE;
|
|
} else
|
|
rc->has_trust_ad = NM_TERNARY_FALSE;
|
|
|
|
if (addr_family == AF_INET) {
|
|
const in_addr_t *nis_servers;
|
|
const char *nis_domain;
|
|
|
|
nis_servers = nm_l3_config_data_get_nis_servers(l3cd, &num);
|
|
for (i = 0; i < num; i++)
|
|
add_string_item(rc->nis_servers, nm_inet4_ntop(nis_servers[i], buf), TRUE);
|
|
|
|
if ((nis_domain = nm_l3_config_data_get_nis_domain(l3cd))) {
|
|
/* FIXME: handle multiple domains */
|
|
if (!rc->nis_domain)
|
|
rc->nis_domain = nis_domain;
|
|
}
|
|
}
|
|
}
|
|
|
|
static GPid
|
|
run_netconfig(NMDnsManager *self, GError **error, int *stdin_fd)
|
|
{
|
|
char *argv[5];
|
|
gs_free char *tmp = NULL;
|
|
GPid pid = -1;
|
|
|
|
argv[0] = NETCONFIG_PATH;
|
|
argv[1] = "modify";
|
|
argv[2] = "--service";
|
|
argv[3] = "NetworkManager";
|
|
argv[4] = NULL;
|
|
|
|
_LOGD("spawning '%s'", (tmp = g_strjoinv(" ", argv)));
|
|
|
|
if (!g_spawn_async_with_pipes(NULL,
|
|
argv,
|
|
NULL,
|
|
G_SPAWN_CLOEXEC_PIPES | G_SPAWN_DO_NOT_REAP_CHILD,
|
|
NULL,
|
|
NULL,
|
|
&pid,
|
|
stdin_fd,
|
|
NULL,
|
|
NULL,
|
|
error))
|
|
return -1;
|
|
|
|
return pid;
|
|
}
|
|
|
|
static void
|
|
netconfig_construct_str(NMDnsManager *self, GString *str, const char *key, const char *value)
|
|
{
|
|
if (value) {
|
|
_LOGD("writing to netconfig: %s='%s'", key, value);
|
|
g_string_append_printf(str, "%s='%s'\n", key, value);
|
|
}
|
|
}
|
|
|
|
static void
|
|
netconfig_construct_strv(NMDnsManager *self,
|
|
GString *str,
|
|
const char *key,
|
|
const char *const *values)
|
|
{
|
|
if (values) {
|
|
gs_free char *value = NULL;
|
|
|
|
value = g_strjoinv(" ", (char **) values);
|
|
netconfig_construct_str(self, str, key, value);
|
|
}
|
|
}
|
|
|
|
static SpawnResult
|
|
dispatch_netconfig(NMDnsManager *self,
|
|
const char *const *searches,
|
|
const char *const *nameservers,
|
|
const char *nis_domain,
|
|
const char *const *nis_servers,
|
|
GError **error)
|
|
{
|
|
GPid pid;
|
|
int fd;
|
|
int errsv;
|
|
int status;
|
|
gssize l;
|
|
nm_auto_free_gstring GString *str = NULL;
|
|
|
|
pid = run_netconfig(self, error, &fd);
|
|
if (pid <= 0)
|
|
return SR_NOTFOUND;
|
|
|
|
str = g_string_new("");
|
|
|
|
/* NM is writing already-merged DNS information to netconfig, so it
|
|
* does not apply to a specific network interface.
|
|
*/
|
|
netconfig_construct_str(self, str, "INTERFACE", "NetworkManager");
|
|
netconfig_construct_strv(self, str, "DNSSEARCH", searches);
|
|
netconfig_construct_strv(self, str, "DNSSERVERS", nameservers);
|
|
netconfig_construct_str(self, str, "NISDOMAIN", nis_domain);
|
|
netconfig_construct_strv(self, str, "NISSERVERS", nis_servers);
|
|
|
|
again:
|
|
l = write(fd, str->str, str->len);
|
|
if (l == -1) {
|
|
if (errno == EINTR)
|
|
goto again;
|
|
}
|
|
|
|
nm_close(fd);
|
|
|
|
/* FIXME: don't write to netconfig synchronously. */
|
|
|
|
/* Wait until the process exits */
|
|
if (!nm_utils_kill_child_sync(pid, 0, LOGD_DNS, "netconfig", &status, 1000, 0)) {
|
|
errsv = errno;
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Error waiting for netconfig to exit: %s",
|
|
nm_strerror_native(errsv));
|
|
return SR_ERROR;
|
|
}
|
|
if (!WIFEXITED(status) || WEXITSTATUS(status) != EXIT_SUCCESS) {
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Error calling netconfig: %s %d",
|
|
WIFEXITED(status) ? "exited with status"
|
|
: (WIFSIGNALED(status) ? "exited with signal"
|
|
: "exited with unknown reason"),
|
|
WIFEXITED(status) ? WEXITSTATUS(status)
|
|
: (WIFSIGNALED(status) ? WTERMSIG(status) : status));
|
|
return SR_ERROR;
|
|
}
|
|
return SR_SUCCESS;
|
|
}
|
|
|
|
static char *
|
|
create_resolv_conf(const char *const *searches,
|
|
const char *const *nameservers,
|
|
const char *const *options)
|
|
{
|
|
GString *str;
|
|
gsize i;
|
|
|
|
str = g_string_new_len(NULL, 245);
|
|
|
|
g_string_append(str, "# Generated by NetworkManager\n");
|
|
|
|
if (searches && searches[0]) {
|
|
gsize search_base_idx;
|
|
|
|
g_string_append(str, "search");
|
|
search_base_idx = str->len;
|
|
|
|
for (i = 0; searches[i]; i++) {
|
|
const char *s = searches[i];
|
|
gsize l = strlen(s);
|
|
|
|
if (l == 0 || NM_STRCHAR_ANY(s, ch, NM_IN_SET(ch, ' ', '\t', '\n'))) {
|
|
/* there should be no such characters in the search entry. Also,
|
|
* because glibc parser would treat them as line/word separator.
|
|
*
|
|
* Skip the value silently. */
|
|
continue;
|
|
}
|
|
|
|
if (search_base_idx > 0) {
|
|
if (str->len - search_base_idx + 1 + l > 254) {
|
|
/* this entry crosses the 256 character boundary. Older glibc versions
|
|
* would truncate the entry at this point.
|
|
*
|
|
* Fill the line with spaces to cross the 256 char boundary and continue
|
|
* afterwards. This way, the truncation happens between two search entries. */
|
|
while (str->len - search_base_idx < 257)
|
|
g_string_append_c(str, ' ');
|
|
search_base_idx = 0;
|
|
}
|
|
}
|
|
|
|
g_string_append_c(str, ' ');
|
|
g_string_append_len(str, s, l);
|
|
}
|
|
g_string_append_c(str, '\n');
|
|
}
|
|
|
|
if (nameservers && nameservers[0]) {
|
|
for (i = 0; nameservers[i]; i++) {
|
|
if (i == 3) {
|
|
g_string_append(
|
|
str,
|
|
"# NOTE: the libc resolver may not support more than 3 nameservers.\n");
|
|
g_string_append(str, "# The nameservers listed below may not be recognized.\n");
|
|
}
|
|
g_string_append(str, "nameserver ");
|
|
g_string_append(str, nameservers[i]);
|
|
g_string_append_c(str, '\n');
|
|
}
|
|
}
|
|
|
|
if (options && options[0]) {
|
|
g_string_append(str, "options");
|
|
for (i = 0; options[i]; i++) {
|
|
g_string_append_c(str, ' ');
|
|
g_string_append(str, options[i]);
|
|
}
|
|
g_string_append_c(str, '\n');
|
|
}
|
|
|
|
return g_string_free(str, FALSE);
|
|
}
|
|
|
|
char *
|
|
nmtst_dns_create_resolv_conf(const char *const *searches,
|
|
const char *const *nameservers,
|
|
const char *const *options)
|
|
{
|
|
return create_resolv_conf(searches, nameservers, options);
|
|
}
|
|
|
|
static gboolean
|
|
write_resolv_conf_contents(FILE *f, const char *content, GError **error)
|
|
{
|
|
int errsv;
|
|
|
|
if (fprintf(f, "%s", content) < 0) {
|
|
errsv = errno;
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not write " _PATH_RESCONF ": %s",
|
|
nm_strerror_native(errsv));
|
|
errno = errsv;
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static gboolean
|
|
write_resolv_conf(FILE *f,
|
|
const char *const *searches,
|
|
const char *const *nameservers,
|
|
const char *const *options,
|
|
GError **error)
|
|
{
|
|
gs_free char *content = NULL;
|
|
|
|
content = create_resolv_conf(searches, nameservers, options);
|
|
return write_resolv_conf_contents(f, content, error);
|
|
}
|
|
|
|
static SpawnResult
|
|
dispatch_resolvconf(NMDnsManager *self,
|
|
char **searches,
|
|
char **nameservers,
|
|
char **options,
|
|
GError **error)
|
|
{
|
|
gs_free char *cmd = NULL;
|
|
FILE *f;
|
|
gboolean success = FALSE;
|
|
int errsv;
|
|
int err;
|
|
char *argv[] = {RESOLVCONF_PATH, "-d", "NetworkManager", NULL};
|
|
int status;
|
|
|
|
if (!g_file_test(RESOLVCONF_PATH, G_FILE_TEST_IS_EXECUTABLE)) {
|
|
g_set_error_literal(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
RESOLVCONF_PATH " is not executable");
|
|
return SR_NOTFOUND;
|
|
}
|
|
|
|
if (!searches && !nameservers) {
|
|
_LOGI("Removing DNS information from %s", RESOLVCONF_PATH);
|
|
|
|
if (!g_spawn_sync("/", argv, NULL, 0, NULL, NULL, NULL, NULL, &status, error))
|
|
return SR_ERROR;
|
|
|
|
if (status != 0) {
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"%s returned error code",
|
|
RESOLVCONF_PATH);
|
|
return SR_ERROR;
|
|
}
|
|
|
|
return SR_SUCCESS;
|
|
}
|
|
|
|
_LOGI("Writing DNS information to %s", RESOLVCONF_PATH);
|
|
|
|
/* FIXME: don't write to resolvconf synchronously. */
|
|
|
|
cmd = g_strconcat(RESOLVCONF_PATH, " -a ", "NetworkManager", NULL);
|
|
if ((f = popen(cmd, "w")) == NULL) {
|
|
errsv = errno;
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not write to %s: %s",
|
|
RESOLVCONF_PATH,
|
|
nm_strerror_native(errsv));
|
|
return SR_ERROR;
|
|
}
|
|
|
|
success = write_resolv_conf(f,
|
|
NM_CAST_STRV_CC(searches),
|
|
NM_CAST_STRV_CC(nameservers),
|
|
NM_CAST_STRV_CC(options),
|
|
error);
|
|
err = pclose(f);
|
|
if (err < 0) {
|
|
errsv = errno;
|
|
g_clear_error(error);
|
|
g_set_error(error,
|
|
G_IO_ERROR,
|
|
g_io_error_from_errno(errsv),
|
|
"Failed to close pipe to resolvconf: %d",
|
|
errsv);
|
|
return SR_ERROR;
|
|
} else if (err > 0) {
|
|
_LOGW("resolvconf failed with status %d", err);
|
|
g_clear_error(error);
|
|
g_set_error(error, G_IO_ERROR, G_IO_ERROR_FAILED, "resolvconf failed with status %d", err);
|
|
return SR_ERROR;
|
|
}
|
|
|
|
return success ? SR_SUCCESS : SR_ERROR;
|
|
}
|
|
|
|
static const char *
|
|
_read_link_cached(const char *path, gboolean *is_cached, char **cached)
|
|
{
|
|
nm_assert(is_cached);
|
|
nm_assert(cached);
|
|
|
|
if (*is_cached)
|
|
return *cached;
|
|
|
|
nm_assert(!*cached);
|
|
*is_cached = TRUE;
|
|
return (*cached = g_file_read_link(path, NULL));
|
|
}
|
|
|
|
#define MY_RESOLV_CONF NMRUNDIR "/resolv.conf"
|
|
#define MY_RESOLV_CONF_TMP MY_RESOLV_CONF ".tmp"
|
|
#define RESOLV_CONF_TMP "/etc/.resolv.conf.NetworkManager"
|
|
|
|
#define NO_STUB_RESOLV_CONF NMRUNDIR "/no-stub-resolv.conf"
|
|
|
|
static void
|
|
update_resolv_conf_no_stub(NMDnsManager *self,
|
|
const char *const *searches,
|
|
const char *const *nameservers,
|
|
const char *const *options)
|
|
{
|
|
gs_free char *content = NULL;
|
|
GError *local = NULL;
|
|
|
|
content = create_resolv_conf(searches, nameservers, options);
|
|
|
|
if (!g_file_set_contents(NO_STUB_RESOLV_CONF, content, -1, &local)) {
|
|
_LOGD("update-resolv-no-stub: failure to write file: %s", local->message);
|
|
g_error_free(local);
|
|
return;
|
|
}
|
|
|
|
_LOGT("update-resolv-no-stub: '%s' successfully written", NO_STUB_RESOLV_CONF);
|
|
}
|
|
|
|
static SpawnResult
|
|
update_resolv_conf(NMDnsManager *self,
|
|
const char *const *searches,
|
|
const char *const *nameservers,
|
|
const char *const *options,
|
|
GError **error,
|
|
NMDnsManagerResolvConfManager rc_manager)
|
|
{
|
|
FILE *f;
|
|
gboolean success;
|
|
gs_free char *content = NULL;
|
|
SpawnResult write_file_result = SR_SUCCESS;
|
|
int errsv;
|
|
gboolean resconf_link_cached = FALSE;
|
|
gs_free char *resconf_link = NULL;
|
|
|
|
content = create_resolv_conf(searches, nameservers, options);
|
|
|
|
if (rc_manager == NM_DNS_MANAGER_RESOLV_CONF_MAN_FILE
|
|
|| (rc_manager == NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK
|
|
&& !_read_link_cached(_PATH_RESCONF, &resconf_link_cached, &resconf_link))) {
|
|
gs_free char *rc_path_syml = NULL;
|
|
nm_auto_free char *rc_path_real = NULL;
|
|
const char *rc_path = _PATH_RESCONF;
|
|
GError *local = NULL;
|
|
|
|
if (rc_manager == NM_DNS_MANAGER_RESOLV_CONF_MAN_FILE) {
|
|
rc_path_real = realpath(_PATH_RESCONF, NULL);
|
|
if (rc_path_real)
|
|
rc_path = rc_path_real;
|
|
else {
|
|
/* realpath did not resolve a path-name. That either means,
|
|
* _PATH_RESCONF:
|
|
* - does not exist
|
|
* - is a plain file
|
|
* - is a dangling symlink
|
|
*
|
|
* Handle the case, where it is a dangling symlink... */
|
|
rc_path_syml = nm_utils_read_link_absolute(_PATH_RESCONF, NULL);
|
|
if (rc_path_syml)
|
|
rc_path = rc_path_syml;
|
|
}
|
|
}
|
|
|
|
/* we first write to /etc/resolv.conf directly. If that fails,
|
|
* we still continue to write to runstatedir but remember the
|
|
* error. */
|
|
if (!g_file_set_contents(rc_path, content, -1, &local)) {
|
|
_LOGT("update-resolv-conf: write to %s failed (rc-manager=%s, %s)",
|
|
rc_path,
|
|
_rc_manager_to_string(rc_manager),
|
|
local->message);
|
|
g_propagate_error(error, local);
|
|
/* clear @error, so that we don't try reset it. This is the error
|
|
* we want to propagate to the caller. */
|
|
error = NULL;
|
|
write_file_result = SR_ERROR;
|
|
} else {
|
|
_LOGT("update-resolv-conf: write to %s succeeded (rc-manager=%s)",
|
|
rc_path,
|
|
_rc_manager_to_string(rc_manager));
|
|
}
|
|
}
|
|
|
|
if ((f = fopen(MY_RESOLV_CONF_TMP, "we")) == NULL) {
|
|
errsv = errno;
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not open %s: %s",
|
|
MY_RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
_LOGT("update-resolv-conf: open temporary file %s failed (%s)",
|
|
MY_RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
return SR_ERROR;
|
|
}
|
|
|
|
success = write_resolv_conf_contents(f, content, error);
|
|
if (!success) {
|
|
errsv = errno;
|
|
_LOGT("update-resolv-conf: write temporary file %s failed (%s)",
|
|
MY_RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
}
|
|
|
|
if (fclose(f) < 0) {
|
|
if (success) {
|
|
errsv = errno;
|
|
/* only set an error here if write_resolv_conf() was successful,
|
|
* since its error is more important.
|
|
*/
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not close %s: %s",
|
|
MY_RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
_LOGT("update-resolv-conf: close temporary file %s failed (%s)",
|
|
MY_RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
}
|
|
return SR_ERROR;
|
|
} else if (!success)
|
|
return SR_ERROR;
|
|
|
|
if (rename(MY_RESOLV_CONF_TMP, MY_RESOLV_CONF) < 0) {
|
|
errsv = errno;
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not replace %s: %s",
|
|
MY_RESOLV_CONF,
|
|
nm_strerror_native(errsv));
|
|
_LOGT("update-resolv-conf: failed to rename temporary file %s to %s (%s)",
|
|
MY_RESOLV_CONF_TMP,
|
|
MY_RESOLV_CONF,
|
|
nm_strerror_native(errsv));
|
|
return SR_ERROR;
|
|
}
|
|
|
|
if (rc_manager == NM_DNS_MANAGER_RESOLV_CONF_MAN_FILE) {
|
|
_LOGT("update-resolv-conf: write internal file %s succeeded (rc-manager=%s)",
|
|
MY_RESOLV_CONF,
|
|
_rc_manager_to_string(rc_manager));
|
|
return write_file_result;
|
|
}
|
|
|
|
if (rc_manager != NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK
|
|
|| !_read_link_cached(_PATH_RESCONF, &resconf_link_cached, &resconf_link)) {
|
|
_LOGT("update-resolv-conf: write internal file %s succeeded", MY_RESOLV_CONF);
|
|
return write_file_result;
|
|
}
|
|
|
|
if (!nm_streq0(_read_link_cached(_PATH_RESCONF, &resconf_link_cached, &resconf_link),
|
|
MY_RESOLV_CONF)) {
|
|
_LOGT("update-resolv-conf: write internal file %s succeeded (don't touch symlink %s "
|
|
"linking to %s)",
|
|
MY_RESOLV_CONF,
|
|
_PATH_RESCONF,
|
|
_read_link_cached(_PATH_RESCONF, &resconf_link_cached, &resconf_link));
|
|
return write_file_result;
|
|
}
|
|
|
|
/* By this point, /etc/resolv.conf exists and is a symlink to our internal
|
|
* resolv.conf. We update the symlink so that applications get an inotify
|
|
* notification.
|
|
*/
|
|
if (unlink(RESOLV_CONF_TMP) != 0 && ((errsv = errno) != ENOENT)) {
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not unlink %s: %s",
|
|
RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
_LOGT("update-resolv-conf: write internal file %s succeeded "
|
|
"but cannot delete temporary file %s: %s",
|
|
MY_RESOLV_CONF,
|
|
RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
return SR_ERROR;
|
|
}
|
|
|
|
if (symlink(MY_RESOLV_CONF, RESOLV_CONF_TMP) == -1) {
|
|
errsv = errno;
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not create symlink %s pointing to %s: %s",
|
|
RESOLV_CONF_TMP,
|
|
MY_RESOLV_CONF,
|
|
nm_strerror_native(errsv));
|
|
_LOGT("update-resolv-conf: write internal file %s succeeded "
|
|
"but failed to symlink %s: %s",
|
|
MY_RESOLV_CONF,
|
|
RESOLV_CONF_TMP,
|
|
nm_strerror_native(errsv));
|
|
return SR_ERROR;
|
|
}
|
|
|
|
if (rename(RESOLV_CONF_TMP, _PATH_RESCONF) == -1) {
|
|
errsv = errno;
|
|
g_set_error(error,
|
|
NM_MANAGER_ERROR,
|
|
NM_MANAGER_ERROR_FAILED,
|
|
"Could not rename %s to %s: %s",
|
|
RESOLV_CONF_TMP,
|
|
_PATH_RESCONF,
|
|
nm_strerror_native(errsv));
|
|
_LOGT("update-resolv-conf: write internal file %s succeeded "
|
|
"but failed to rename temporary symlink %s to %s: %s",
|
|
MY_RESOLV_CONF,
|
|
RESOLV_CONF_TMP,
|
|
_PATH_RESCONF,
|
|
nm_strerror_native(errsv));
|
|
return SR_ERROR;
|
|
}
|
|
|
|
_LOGT("update-resolv-conf: write internal file %s succeeded and update symlink %s",
|
|
MY_RESOLV_CONF,
|
|
_PATH_RESCONF);
|
|
return write_file_result;
|
|
}
|
|
|
|
static void
|
|
compute_hash(NMDnsManager *self, const NMGlobalDnsConfig *global, guint8 buffer[static HASH_LEN])
|
|
{
|
|
nm_auto_free_checksum GChecksum *sum = NULL;
|
|
NMDnsConfigIPData *ip_data;
|
|
|
|
sum = g_checksum_new(G_CHECKSUM_SHA1);
|
|
nm_assert(HASH_LEN == g_checksum_type_get_length(G_CHECKSUM_SHA1));
|
|
|
|
if (global)
|
|
nm_global_dns_config_update_checksum(global, sum);
|
|
|
|
if (!global || !nm_global_dns_config_lookup_domain(global, "*")) {
|
|
const CList *head;
|
|
|
|
/* FIXME(ip-config-checksum): this relies on the fact that an IP
|
|
* configuration without DNS parameters gives a zero checksum. */
|
|
head = _mgr_get_ip_data_lst_head(self);
|
|
c_list_for_each_entry (ip_data, head, ip_data_lst) {
|
|
nm_l3_config_data_hash_dns(ip_data->l3cd,
|
|
sum,
|
|
ip_data->addr_family,
|
|
ip_data->ip_config_type);
|
|
}
|
|
}
|
|
|
|
nm_utils_checksum_get_digest_len(sum, buffer, HASH_LEN);
|
|
}
|
|
|
|
static gboolean
|
|
merge_global_dns_config(NMResolvConfData *rc, NMGlobalDnsConfig *global_conf)
|
|
{
|
|
NMGlobalDnsDomain *default_domain;
|
|
const char *const *searches;
|
|
const char *const *options;
|
|
const char *const *servers;
|
|
guint i;
|
|
|
|
if (!global_conf)
|
|
return FALSE;
|
|
|
|
searches = nm_global_dns_config_get_searches(global_conf);
|
|
if (searches) {
|
|
for (i = 0; searches[i]; i++) {
|
|
if (domain_is_routing(searches[i]))
|
|
continue;
|
|
if (!domain_is_valid(searches[i], FALSE, TRUE))
|
|
continue;
|
|
add_string_item(rc->searches, searches[i], TRUE);
|
|
}
|
|
}
|
|
|
|
options = nm_global_dns_config_get_options(global_conf);
|
|
if (options) {
|
|
for (i = 0; options[i]; i++)
|
|
add_string_item(rc->options, options[i], TRUE);
|
|
}
|
|
|
|
default_domain = nm_global_dns_config_lookup_domain(global_conf, "*");
|
|
if (!default_domain)
|
|
return TRUE;
|
|
|
|
servers = nm_global_dns_domain_get_servers(default_domain);
|
|
if (!servers)
|
|
return TRUE;
|
|
|
|
for (i = 0; servers[i]; i++)
|
|
add_string_item(rc->nameservers, servers[i], TRUE);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static const char *
|
|
get_nameserver_list(int addr_family, const NML3ConfigData *l3cd, NMStrBuf *tmp_strbuf)
|
|
{
|
|
char buf[NM_INET_ADDRSTRLEN];
|
|
guint num;
|
|
guint i;
|
|
const char *const *strarr;
|
|
|
|
nm_str_buf_reset(tmp_strbuf);
|
|
|
|
strarr = nm_l3_config_data_get_nameservers(l3cd, addr_family, &num);
|
|
for (i = 0; i < num; i++) {
|
|
NMIPAddr a;
|
|
|
|
if (!nm_utils_dnsname_parse_assert(addr_family, strarr[i], NULL, &a, NULL))
|
|
continue;
|
|
|
|
nm_inet_ntop(addr_family, &a, buf);
|
|
if (i > 0)
|
|
nm_str_buf_append_c(tmp_strbuf, ' ');
|
|
nm_str_buf_append(tmp_strbuf, buf);
|
|
}
|
|
|
|
nm_str_buf_maybe_expand(tmp_strbuf, 1, FALSE);
|
|
return nm_str_buf_get_str(tmp_strbuf);
|
|
}
|
|
|
|
static char **
|
|
_ptrarray_to_strv(GPtrArray *parray)
|
|
{
|
|
if (parray->len > 0)
|
|
g_ptr_array_add(parray, NULL);
|
|
return (char **) g_ptr_array_free(parray, parray->len == 0);
|
|
}
|
|
|
|
static void
|
|
_collect_resolv_conf_data(NMDnsManager *self,
|
|
NMGlobalDnsConfig *global_config,
|
|
char ***out_searches,
|
|
char ***out_options,
|
|
char ***out_nameservers,
|
|
char ***out_nis_servers,
|
|
const char **out_nis_domain)
|
|
{
|
|
NMDnsManagerPrivate *priv;
|
|
NMResolvConfData rc = {
|
|
.nameservers = g_ptr_array_new(),
|
|
.searches = g_ptr_array_new(),
|
|
.options = g_ptr_array_new(),
|
|
.nis_domain = NULL,
|
|
.nis_servers = g_ptr_array_new(),
|
|
.has_trust_ad = NM_TERNARY_DEFAULT,
|
|
};
|
|
|
|
priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (global_config)
|
|
merge_global_dns_config(&rc, global_config);
|
|
|
|
if (!global_config || !nm_global_dns_config_lookup_domain(global_config, "*")) {
|
|
nm_auto_str_buf NMStrBuf tmp_strbuf = NM_STR_BUF_INIT(0, FALSE);
|
|
int first_prio = 0;
|
|
const NMDnsConfigIPData *ip_data;
|
|
const CList *head;
|
|
gboolean is_first = TRUE;
|
|
|
|
head = _mgr_get_ip_data_lst_head(self);
|
|
c_list_for_each_entry (ip_data, head, ip_data_lst) {
|
|
gboolean skip = FALSE;
|
|
int dns_priority;
|
|
|
|
_ASSERT_dns_config_ip_data(ip_data);
|
|
|
|
if (!nm_l3_config_data_get_dns_priority(ip_data->l3cd,
|
|
ip_data->addr_family,
|
|
&dns_priority))
|
|
nm_assert_not_reached();
|
|
|
|
if (is_first) {
|
|
is_first = FALSE;
|
|
first_prio = dns_priority;
|
|
} else if (first_prio < 0 && first_prio != dns_priority)
|
|
skip = TRUE;
|
|
|
|
_LOGT("config: %8d %-7s v%c %-5d %s: %s",
|
|
dns_priority,
|
|
_config_type_to_string(ip_data->ip_config_type),
|
|
nm_utils_addr_family_to_char(ip_data->addr_family),
|
|
ip_data->data->ifindex,
|
|
skip ? "<SKIP>" : "",
|
|
get_nameserver_list(ip_data->addr_family, ip_data->l3cd, &tmp_strbuf));
|
|
|
|
if (!skip)
|
|
merge_one_l3cd(&rc, ip_data->addr_family, ip_data->data->ifindex, ip_data->l3cd);
|
|
}
|
|
}
|
|
|
|
if (priv->hostdomain)
|
|
add_string_item(rc.searches, priv->hostdomain, TRUE);
|
|
|
|
if (rc.has_trust_ad == NM_TERNARY_TRUE)
|
|
g_ptr_array_add(rc.options, g_strdup(NM_SETTING_DNS_OPTION_TRUST_AD));
|
|
|
|
*out_searches = _ptrarray_to_strv(rc.searches);
|
|
*out_options = _ptrarray_to_strv(rc.options);
|
|
*out_nameservers = _ptrarray_to_strv(rc.nameservers);
|
|
*out_nis_servers = _ptrarray_to_strv(rc.nis_servers);
|
|
*out_nis_domain = rc.nis_domain;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static char **
|
|
get_ip_rdns_domains(int addr_family, const NML3ConfigData *l3cd)
|
|
{
|
|
const int IS_IPv4 = NM_IS_IPv4(addr_family);
|
|
char **strv;
|
|
GPtrArray *domains;
|
|
NMDedupMultiIter ipconf_iter;
|
|
const NMPObject *obj;
|
|
|
|
domains = g_ptr_array_sized_new(5);
|
|
|
|
nm_l3_config_data_iter_obj_for_each (&ipconf_iter,
|
|
l3cd,
|
|
&obj,
|
|
NMP_OBJECT_TYPE_IP_ADDRESS(IS_IPv4)) {
|
|
nm_utils_get_reverse_dns_domains_ip(addr_family,
|
|
NMP_OBJECT_CAST_IP_ADDRESS(obj)->address_ptr,
|
|
NMP_OBJECT_CAST_IP_ADDRESS(obj)->plen,
|
|
domains);
|
|
}
|
|
|
|
nm_l3_config_data_iter_obj_for_each (&ipconf_iter,
|
|
l3cd,
|
|
&obj,
|
|
NMP_OBJECT_TYPE_IP_ROUTE(IS_IPv4)) {
|
|
const NMPlatformIPRoute *route = NMP_OBJECT_CAST_IP_ROUTE(obj);
|
|
|
|
if (!NM_PLATFORM_IP_ROUTE_IS_DEFAULT(route)) {
|
|
nm_utils_get_reverse_dns_domains_ip(addr_family,
|
|
route->network_ptr,
|
|
route->plen,
|
|
domains);
|
|
}
|
|
}
|
|
|
|
/* Terminating NULL so we can use g_strfreev() to free it */
|
|
g_ptr_array_add(domains, NULL);
|
|
|
|
/* Free the array and return NULL if the only element was the ending NULL */
|
|
strv = (char **) g_ptr_array_free(domains, (domains->len == 1));
|
|
|
|
return nm_strv_cleanup(strv, FALSE, FALSE, TRUE);
|
|
}
|
|
|
|
static gboolean
|
|
_domain_track_get_priority(GHashTable *ht, const char *domain, int *out_priority)
|
|
{
|
|
gpointer ptr;
|
|
|
|
if (!ht || !g_hash_table_lookup_extended(ht, domain, NULL, &ptr)) {
|
|
*out_priority = 0;
|
|
return FALSE;
|
|
}
|
|
*out_priority = GPOINTER_TO_INT(ptr);
|
|
return TRUE;
|
|
}
|
|
|
|
/* Check if the domain is shadowed by a parent domain with more negative priority */
|
|
static gboolean
|
|
_domain_track_is_shadowed(GHashTable *ht,
|
|
const char *domain,
|
|
int priority,
|
|
const char **out_parent,
|
|
int *out_parent_priority)
|
|
{
|
|
char *parent;
|
|
int parent_priority;
|
|
|
|
if (!ht)
|
|
return FALSE;
|
|
|
|
nm_assert(!g_hash_table_contains(ht, domain));
|
|
|
|
if (_domain_track_get_priority(ht, "", &parent_priority)) {
|
|
nm_assert(parent_priority <= priority);
|
|
if (parent_priority < 0 && parent_priority < priority) {
|
|
*out_parent = "";
|
|
*out_parent_priority = parent_priority;
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
parent = strchr(domain, '.');
|
|
while (parent && parent[1]) {
|
|
parent++;
|
|
if (_domain_track_get_priority(ht, parent, &parent_priority)) {
|
|
nm_assert(parent_priority <= priority);
|
|
if (parent_priority < 0 && parent_priority < priority) {
|
|
*out_parent = parent;
|
|
*out_parent_priority = parent_priority;
|
|
return TRUE;
|
|
}
|
|
}
|
|
parent = strchr(parent, '.');
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
_mgr_configs_data_construct(NMDnsManager *self)
|
|
{
|
|
NMDnsConfigIPData *ip_data;
|
|
gs_unref_hashtable GHashTable *ht = NULL;
|
|
gs_unref_hashtable GHashTable *wildcard_entries = NULL;
|
|
CList *head;
|
|
int prev_priority = G_MININT;
|
|
|
|
head = _mgr_get_ip_data_lst_head(self);
|
|
|
|
#if NM_MORE_ASSERTS
|
|
/* we call _mgr_configs_data_clear() at the end of update. We
|
|
* don't expect any domain settings here. */
|
|
c_list_for_each_entry (ip_data, head, ip_data_lst) {
|
|
nm_assert(!ip_data->domains.search);
|
|
nm_assert(!ip_data->domains.reverse);
|
|
nm_assert(!ip_data->domains.has_default_route_explicit);
|
|
nm_assert(!ip_data->domains.has_default_route_exclusive);
|
|
nm_assert(!ip_data->domains.has_default_route);
|
|
}
|
|
#endif
|
|
|
|
c_list_for_each_entry (ip_data, head, ip_data_lst) {
|
|
gboolean add_wildcard = FALSE;
|
|
guint num;
|
|
|
|
nm_l3_config_data_get_nameservers(ip_data->l3cd, ip_data->addr_family, &num);
|
|
if (num == 0)
|
|
continue;
|
|
if (nm_l3_config_data_get_best_default_route(ip_data->l3cd, ip_data->addr_family)) {
|
|
/* FIXME(l3cfg): the best-default route of a l3cd is not significant! */
|
|
add_wildcard = TRUE;
|
|
} else {
|
|
/* If a VPN has never-default=no but doesn't get a default
|
|
* route (this can happen for example when the server
|
|
* pushes routes with openconnect), and there are no
|
|
* search or routing domains, then the name servers pushed
|
|
* by the server would be unused. It is preferable in this
|
|
* case to use the VPN DNS server for all queries. */
|
|
if (ip_data->ip_config_type == NM_DNS_IP_CONFIG_TYPE_VPN
|
|
&& nm_l3_config_data_get_never_default(ip_data->l3cd, ip_data->addr_family)
|
|
== NM_TERNARY_FALSE
|
|
&& !nm_l3_config_data_get_searches(ip_data->l3cd, ip_data->addr_family, &num)
|
|
&& !nm_l3_config_data_get_domains(ip_data->l3cd, ip_data->addr_family, &num))
|
|
add_wildcard = TRUE;
|
|
}
|
|
|
|
if (add_wildcard) {
|
|
if (!wildcard_entries)
|
|
wildcard_entries = g_hash_table_new(nm_direct_hash, NULL);
|
|
g_hash_table_add(wildcard_entries, ip_data);
|
|
}
|
|
}
|
|
|
|
c_list_for_each_entry (ip_data, head, ip_data_lst) {
|
|
int priority;
|
|
const char **domains;
|
|
const char *const *strv_searches;
|
|
const char *const *strv_domains;
|
|
guint n_searches;
|
|
guint n_domains;
|
|
guint num_dom1;
|
|
guint num_dom2;
|
|
guint n_domains_allocated;
|
|
guint i;
|
|
gboolean has_default_route_maybe = FALSE;
|
|
gboolean has_default_route_explicit = FALSE;
|
|
gboolean has_default_route_auto = FALSE;
|
|
guint num;
|
|
|
|
nm_l3_config_data_get_nameservers(ip_data->l3cd, ip_data->addr_family, &num);
|
|
if (num == 0)
|
|
continue;
|
|
|
|
strv_searches =
|
|
nm_l3_config_data_get_searches(ip_data->l3cd, ip_data->addr_family, &n_searches);
|
|
strv_domains =
|
|
nm_l3_config_data_get_domains(ip_data->l3cd, ip_data->addr_family, &n_domains);
|
|
|
|
priority = _dns_config_ip_data_get_dns_priority(ip_data);
|
|
|
|
nm_assert(prev_priority <= priority);
|
|
prev_priority = priority;
|
|
|
|
/* Add wildcard lookup domain to connections with the default route.
|
|
* If there is no default route, add the wildcard domain to all non-VPN
|
|
* connections */
|
|
if (wildcard_entries) {
|
|
/* FIXME: this heuristic of which device has a default route does
|
|
* not work with policy routing (as used by default with WireGuard).
|
|
* We should have a more stable mechanism where an NMIPConfig indicates
|
|
* whether it is suitable for certain operations (like having an automatically
|
|
* added "~" domain). */
|
|
if (g_hash_table_contains(wildcard_entries, ip_data))
|
|
has_default_route_maybe = TRUE;
|
|
} else {
|
|
if (ip_data->ip_config_type != NM_DNS_IP_CONFIG_TYPE_VPN)
|
|
has_default_route_maybe = TRUE;
|
|
}
|
|
|
|
n_domains_allocated = (n_searches > 0 ? n_searches : n_domains) + 1u;
|
|
domains = g_new(const char *, n_domains_allocated);
|
|
|
|
num_dom1 = 0;
|
|
|
|
/* searches are preferred over domains */
|
|
if (n_searches > 0) {
|
|
for (i = 0; i < n_searches; i++)
|
|
domains[num_dom1++] = strv_searches[i];
|
|
} else {
|
|
for (i = 0; i < n_domains; i++)
|
|
domains[num_dom1++] = strv_domains[i];
|
|
}
|
|
|
|
nm_assert(num_dom1 < n_domains_allocated);
|
|
|
|
num_dom2 = 0;
|
|
for (i = 0; TRUE; i++) {
|
|
const char *domain_full;
|
|
const char *domain_clean;
|
|
const char *parent;
|
|
int old_priority;
|
|
int parent_priority;
|
|
gboolean check_default_route;
|
|
|
|
if (i < num_dom1) {
|
|
check_default_route = FALSE;
|
|
domain_full = domains[i];
|
|
domain_clean = nm_utils_parse_dns_domain(domains[i], NULL);
|
|
} else if (i == num_dom1) {
|
|
if (!has_default_route_maybe)
|
|
continue;
|
|
if (has_default_route_explicit)
|
|
continue;
|
|
check_default_route = TRUE;
|
|
domain_full = "~";
|
|
domain_clean = "";
|
|
} else
|
|
break;
|
|
|
|
/* Remove domains with lower priority */
|
|
if (_domain_track_get_priority(ht, domain_clean, &old_priority)) {
|
|
nm_assert(old_priority <= priority);
|
|
if (old_priority < priority) {
|
|
_LOGT("plugin: drop domain %s%s%s (i=%d, p=%d) because it already exists "
|
|
"with p=%d",
|
|
NM_PRINT_FMT_QUOTED(!check_default_route,
|
|
"'",
|
|
domain_full,
|
|
"'",
|
|
"<auto-default>"),
|
|
ip_data->data->ifindex,
|
|
priority,
|
|
old_priority);
|
|
continue;
|
|
}
|
|
} else if (_domain_track_is_shadowed(ht,
|
|
domain_clean,
|
|
priority,
|
|
&parent,
|
|
&parent_priority)) {
|
|
_LOGT("plugin: drop domain %s%s%s (i=%d, p=%d) shadowed by '%s' (p=%d)",
|
|
NM_PRINT_FMT_QUOTED(!check_default_route,
|
|
"'",
|
|
domain_full,
|
|
"'",
|
|
"<auto-default>"),
|
|
ip_data->data->ifindex,
|
|
priority,
|
|
parent,
|
|
parent_priority);
|
|
continue;
|
|
}
|
|
|
|
_LOGT(
|
|
"plugin: add domain %s%s%s (i=%d, p=%d)",
|
|
NM_PRINT_FMT_QUOTED(!check_default_route, "'", domain_full, "'", "<auto-default>"),
|
|
ip_data->data->ifindex,
|
|
priority);
|
|
|
|
if (!ht)
|
|
ht = g_hash_table_new(nm_str_hash, g_str_equal);
|
|
g_hash_table_insert(ht, (gpointer) domain_clean, GINT_TO_POINTER(priority));
|
|
|
|
if (check_default_route)
|
|
has_default_route_auto = TRUE;
|
|
else {
|
|
nm_assert(num_dom2 <= num_dom1);
|
|
nm_assert(num_dom2 < n_domains_allocated);
|
|
domains[num_dom2++] = domain_full;
|
|
if (domain_clean[0] == '\0')
|
|
has_default_route_explicit = TRUE;
|
|
}
|
|
}
|
|
nm_assert(num_dom2 < n_domains_allocated);
|
|
domains[num_dom2] = NULL;
|
|
|
|
nm_assert(!ip_data->domains.search);
|
|
nm_assert(!ip_data->domains.reverse);
|
|
ip_data->domains.search = domains;
|
|
ip_data->domains.reverse = get_ip_rdns_domains(ip_data->addr_family, ip_data->l3cd);
|
|
ip_data->domains.has_default_route_explicit = has_default_route_explicit;
|
|
ip_data->domains.has_default_route_exclusive =
|
|
has_default_route_explicit || (priority < 0 && has_default_route_auto);
|
|
ip_data->domains.has_default_route =
|
|
ip_data->domains.has_default_route_exclusive || has_default_route_auto;
|
|
|
|
{
|
|
gs_free char *str1 = NULL;
|
|
gs_free char *str2 = NULL;
|
|
|
|
_LOGT("plugin: settings: ifindex=%d, priority=%d, default-route=%d%s, search=%s, "
|
|
"reverse=%s",
|
|
ip_data->data->ifindex,
|
|
priority,
|
|
ip_data->domains.has_default_route,
|
|
ip_data->domains.has_default_route_explicit
|
|
? " (explicit)"
|
|
: (ip_data->domains.has_default_route_exclusive ? " (exclusive)" : ""),
|
|
(str1 = g_strjoinv(",", (char **) ip_data->domains.search)),
|
|
(ip_data->domains.reverse ? (str2 = g_strjoinv(",", ip_data->domains.reverse))
|
|
: ""));
|
|
}
|
|
}
|
|
}
|
|
|
|
static void
|
|
_mgr_configs_data_clear(NMDnsManager *self)
|
|
{
|
|
NMDnsConfigIPData *ip_data;
|
|
CList *head;
|
|
|
|
head = _mgr_get_ip_data_lst_head(self);
|
|
c_list_for_each_entry (ip_data, head, ip_data_lst) {
|
|
nm_clear_g_free(&ip_data->domains.search);
|
|
nm_clear_pointer(&ip_data->domains.reverse, g_strfreev);
|
|
ip_data->domains.has_default_route_explicit = FALSE;
|
|
ip_data->domains.has_default_route_exclusive = FALSE;
|
|
ip_data->domains.has_default_route = FALSE;
|
|
}
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
update_dns(NMDnsManager *self, gboolean no_caching, gboolean force_emit, GError **error)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
const char *nis_domain = NULL;
|
|
gs_strfreev char **searches = NULL;
|
|
gs_strfreev char **options = NULL;
|
|
gs_strfreev char **nameservers = NULL;
|
|
gs_strfreev char **nis_servers = NULL;
|
|
gboolean caching = FALSE;
|
|
gboolean do_update = TRUE;
|
|
gboolean resolv_conf_updated = FALSE;
|
|
SpawnResult result = SR_SUCCESS;
|
|
NMConfigData *data;
|
|
NMGlobalDnsConfig *global_config;
|
|
gs_free_error GError *local_error = NULL;
|
|
GError **const p_local_error = error ? &local_error : NULL;
|
|
|
|
nm_assert(!error || !*error);
|
|
|
|
priv->config_changed = FALSE;
|
|
|
|
if (priv->is_stopped) {
|
|
_LOGD("update-dns: not updating resolv.conf (is stopped)");
|
|
return TRUE;
|
|
}
|
|
|
|
nm_clear_g_source(&priv->plugin_ratelimit.timer);
|
|
|
|
if (NM_IN_SET(priv->rc_manager,
|
|
NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED,
|
|
NM_DNS_MANAGER_RESOLV_CONF_MAN_IMMUTABLE)) {
|
|
do_update = FALSE;
|
|
_LOGD("update-dns: not updating resolv.conf");
|
|
} else {
|
|
priv->dns_touched = TRUE;
|
|
_LOGD("update-dns: updating resolv.conf");
|
|
}
|
|
|
|
data = nm_config_get_data(priv->config);
|
|
global_config = nm_config_data_get_global_dns_config(data);
|
|
|
|
/* Update hash with config we're applying */
|
|
compute_hash(self, global_config, priv->hash);
|
|
|
|
_collect_resolv_conf_data(self,
|
|
global_config,
|
|
&searches,
|
|
&options,
|
|
&nameservers,
|
|
&nis_servers,
|
|
&nis_domain);
|
|
|
|
if (priv->plugin || priv->sd_resolve_plugin)
|
|
_mgr_configs_data_construct(self);
|
|
|
|
if (priv->sd_resolve_plugin) {
|
|
nm_dns_plugin_update(priv->sd_resolve_plugin,
|
|
global_config,
|
|
_mgr_get_ip_data_lst_head(self),
|
|
priv->hostdomain,
|
|
NULL);
|
|
}
|
|
|
|
/* Let any plugins do their thing first */
|
|
if (priv->plugin) {
|
|
NMDnsPlugin *plugin = priv->plugin;
|
|
const char *plugin_name = nm_dns_plugin_get_name(plugin);
|
|
gs_free_error GError *plugin_error = NULL;
|
|
|
|
if (nm_dns_plugin_is_caching(plugin)) {
|
|
if (no_caching) {
|
|
_LOGD("update-dns: plugin %s ignored (caching disabled)", plugin_name);
|
|
goto plugin_skip;
|
|
}
|
|
caching = TRUE;
|
|
}
|
|
|
|
_LOGD("update-dns: updating plugin %s", plugin_name);
|
|
if (!nm_dns_plugin_update(plugin,
|
|
global_config,
|
|
_mgr_get_ip_data_lst_head(self),
|
|
priv->hostdomain,
|
|
&plugin_error)) {
|
|
_LOGW("update-dns: plugin %s update failed: %s", plugin_name, plugin_error->message);
|
|
|
|
/* If the plugin failed to update, we shouldn't write out a local
|
|
* caching DNS configuration to resolv.conf.
|
|
*/
|
|
caching = FALSE;
|
|
}
|
|
|
|
plugin_skip:;
|
|
}
|
|
|
|
/* Clear the generated search list as it points to
|
|
* strings owned by IP configurations and we can't
|
|
* guarantee they stay alive. */
|
|
_mgr_configs_data_clear(self);
|
|
|
|
update_resolv_conf_no_stub(self,
|
|
NM_CAST_STRV_CC(searches),
|
|
NM_CAST_STRV_CC(nameservers),
|
|
NM_CAST_STRV_CC(options));
|
|
|
|
/* If caching was successful, we only send 127.0.0.1 to /etc/resolv.conf
|
|
* to ensure that the glibc resolver doesn't try to round-robin nameservers,
|
|
* but only uses the local caching nameserver.
|
|
*/
|
|
if (caching) {
|
|
const char *lladdr = "127.0.0.1";
|
|
gboolean need_edns0;
|
|
gboolean need_trust;
|
|
|
|
if (NM_IS_DNS_SYSTEMD_RESOLVED(priv->plugin)) {
|
|
/* systemd-resolved uses a different link-local address */
|
|
lladdr = "127.0.0.53";
|
|
}
|
|
|
|
g_strfreev(nameservers);
|
|
nameservers = g_new0(char *, 2);
|
|
nameservers[0] = g_strdup(lladdr);
|
|
|
|
need_edns0 = nm_strv_find_first(options, -1, NM_SETTING_DNS_OPTION_EDNS0) < 0;
|
|
need_trust = nm_strv_find_first(options, -1, NM_SETTING_DNS_OPTION_TRUST_AD) < 0;
|
|
|
|
if (need_edns0 || need_trust) {
|
|
gsize len;
|
|
|
|
len = NM_PTRARRAY_LEN(options);
|
|
options = g_realloc(options, sizeof(char *) * (len + 3u));
|
|
if (need_edns0)
|
|
options[len++] = g_strdup(NM_SETTING_DNS_OPTION_EDNS0);
|
|
if (need_trust)
|
|
options[len++] = g_strdup(NM_SETTING_DNS_OPTION_TRUST_AD);
|
|
options[len] = NULL;
|
|
}
|
|
}
|
|
|
|
if (do_update) {
|
|
switch (priv->rc_manager) {
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK:
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_FILE:
|
|
result = update_resolv_conf(self,
|
|
NM_CAST_STRV_CC(searches),
|
|
NM_CAST_STRV_CC(nameservers),
|
|
NM_CAST_STRV_CC(options),
|
|
p_local_error,
|
|
priv->rc_manager);
|
|
resolv_conf_updated = TRUE;
|
|
/* If we have ended with no nameservers avoid updating again resolv.conf
|
|
* on stop, as some external changes may be applied to it in the meanwhile */
|
|
if (!nameservers && !options)
|
|
priv->dns_touched = FALSE;
|
|
break;
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_RESOLVCONF:
|
|
result = dispatch_resolvconf(self, searches, nameservers, options, p_local_error);
|
|
break;
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_NETCONFIG:
|
|
result = dispatch_netconfig(self,
|
|
(const char *const *) searches,
|
|
(const char *const *) nameservers,
|
|
nis_domain,
|
|
(const char *const *) nis_servers,
|
|
p_local_error);
|
|
break;
|
|
default:
|
|
nm_assert_not_reached();
|
|
}
|
|
|
|
if (result == SR_NOTFOUND) {
|
|
_LOGD("update-dns: program not available, writing to resolv.conf");
|
|
g_clear_error(&local_error);
|
|
result = update_resolv_conf(self,
|
|
NM_CAST_STRV_CC(searches),
|
|
NM_CAST_STRV_CC(nameservers),
|
|
NM_CAST_STRV_CC(options),
|
|
p_local_error,
|
|
NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK);
|
|
resolv_conf_updated = TRUE;
|
|
}
|
|
}
|
|
|
|
/* Unless we've already done it, update private resolv.conf in NMRUNDIR
|
|
* ignoring any errors */
|
|
if (!resolv_conf_updated) {
|
|
update_resolv_conf(self,
|
|
NM_CAST_STRV_CC(searches),
|
|
NM_CAST_STRV_CC(nameservers),
|
|
NM_CAST_STRV_CC(options),
|
|
NULL,
|
|
NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED);
|
|
}
|
|
|
|
/* signal that DNS resolution configs were changed */
|
|
if ((do_update || caching || force_emit) && result == SR_SUCCESS)
|
|
g_signal_emit(self, signals[CONFIG_CHANGED], 0);
|
|
|
|
nm_clear_pointer(&priv->config_variant, g_variant_unref);
|
|
_notify(self, PROP_CONFIGURATION);
|
|
|
|
if (result != SR_SUCCESS) {
|
|
if (error)
|
|
g_propagate_error(error, g_steal_pointer(&local_error));
|
|
return FALSE;
|
|
}
|
|
|
|
nm_assert(!local_error);
|
|
return TRUE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
gboolean
|
|
nm_dns_manager_set_ip_config(NMDnsManager *self,
|
|
int addr_family,
|
|
gconstpointer source_tag,
|
|
const NML3ConfigData *l3cd,
|
|
NMDnsIPConfigType ip_config_type,
|
|
gboolean replace_all)
|
|
{
|
|
NMDnsManagerPrivate *priv;
|
|
NMDnsConfigData *data;
|
|
int ifindex;
|
|
gboolean changed = FALSE;
|
|
NMDnsConfigIPData *ip_data = NULL;
|
|
int dns_priority;
|
|
gboolean any_removed = FALSE;
|
|
|
|
g_return_val_if_fail(NM_IS_DNS_MANAGER(self), FALSE);
|
|
g_return_val_if_fail(!l3cd || NM_IS_L3_CONFIG_DATA(l3cd), FALSE);
|
|
g_return_val_if_fail(source_tag, FALSE);
|
|
|
|
if (addr_family == AF_UNSPEC) {
|
|
/* Setting AF_UNSPEC is a shortcut for calling this function twice for AF_INET and
|
|
* AF_INET6. */
|
|
if (nm_dns_manager_set_ip_config(self,
|
|
AF_INET,
|
|
source_tag,
|
|
l3cd,
|
|
ip_config_type,
|
|
replace_all))
|
|
changed = TRUE;
|
|
if (nm_dns_manager_set_ip_config(self,
|
|
AF_INET6,
|
|
source_tag,
|
|
l3cd,
|
|
ip_config_type,
|
|
replace_all))
|
|
changed = TRUE;
|
|
return changed;
|
|
}
|
|
|
|
nm_assert_addr_family(addr_family);
|
|
|
|
priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
data = NULL;
|
|
if (l3cd) {
|
|
ifindex = nm_l3_config_data_get_ifindex(l3cd);
|
|
nm_assert(ifindex > 0);
|
|
data = g_hash_table_lookup(priv->configs_dict, &ifindex);
|
|
}
|
|
|
|
if (data) {
|
|
NMDnsConfigIPData *ip_data_iter;
|
|
NMDnsConfigIPData *ip_data_safe;
|
|
|
|
c_list_for_each_entry_safe (ip_data_iter, ip_data_safe, &data->data_lst_head, data_lst) {
|
|
_ASSERT_dns_config_ip_data(ip_data_iter);
|
|
|
|
if (ip_data_iter->source_tag != source_tag)
|
|
continue;
|
|
if (ip_data_iter->addr_family != addr_family)
|
|
continue;
|
|
|
|
if (ip_config_type != NM_DNS_IP_CONFIG_TYPE_REMOVED && ip_data_iter->l3cd == l3cd) {
|
|
nm_assert(!ip_data);
|
|
ip_data = ip_data_iter;
|
|
continue;
|
|
}
|
|
|
|
if (!replace_all && l3cd && ip_data_iter->l3cd != l3cd)
|
|
continue;
|
|
|
|
if (!l3cd || ip_config_type == NM_DNS_IP_CONFIG_TYPE_REMOVED
|
|
|| nm_l3_config_data_cmp_full(l3cd,
|
|
ip_data_iter->l3cd,
|
|
NM_L3_CONFIG_CMP_FLAGS_DNS
|
|
| NM_L3_CONFIG_CMP_FLAGS_ROUTES_ID)
|
|
!= 0) {
|
|
changed = TRUE;
|
|
}
|
|
|
|
any_removed = TRUE;
|
|
_dns_config_ip_data_free(ip_data_iter);
|
|
}
|
|
}
|
|
|
|
if (ip_config_type == NM_DNS_IP_CONFIG_TYPE_REMOVED)
|
|
goto done;
|
|
|
|
if (!l3cd)
|
|
goto done;
|
|
|
|
if (ip_data && ip_data->ip_config_type == ip_config_type) {
|
|
/* nothing to do. */
|
|
goto done;
|
|
}
|
|
|
|
dns_priority = _dns_config_ip_data_get_dns_priority1(l3cd, addr_family);
|
|
if (dns_priority == 0) {
|
|
/* no DNS priority for this address family. Skip it! */
|
|
goto done;
|
|
}
|
|
|
|
if (!data) {
|
|
data = g_slice_new(NMDnsConfigData);
|
|
*data = (NMDnsConfigData){
|
|
.ifindex = ifindex,
|
|
.self = self,
|
|
.data_lst_head = C_LIST_INIT(data->data_lst_head),
|
|
};
|
|
_ASSERT_dns_config_data(data);
|
|
g_hash_table_add(priv->configs_dict, data);
|
|
c_list_link_tail(&priv->configs_lst_head, &data->configs_lst);
|
|
priv->configs_lst_need_sort = TRUE;
|
|
}
|
|
|
|
if (!ip_data) {
|
|
ip_data = _dns_config_ip_data_new(data, addr_family, source_tag, l3cd, ip_config_type);
|
|
priv->ip_data_lst_need_sort = TRUE;
|
|
if (!any_removed) {
|
|
/* `any_removed` tracks whether we deleted any ip_data. If that happened,
|
|
* we already compared the old and new l3cds and set `changed` accordingly.
|
|
* Here we only need to set `changed` if we are adding a new ip_data without
|
|
* removing the old one.
|
|
*/
|
|
changed = TRUE;
|
|
}
|
|
} else {
|
|
ip_data->ip_config_type = ip_config_type;
|
|
changed = TRUE;
|
|
}
|
|
|
|
if (changed)
|
|
priv->ip_data_lst_need_sort = TRUE;
|
|
|
|
nm_assert(l3cd);
|
|
nm_assert(ip_config_type != NM_DNS_IP_CONFIG_TYPE_REMOVED);
|
|
nm_assert(ip_data->addr_family == addr_family);
|
|
nm_assert(ip_data->source_tag == source_tag);
|
|
nm_assert(ip_data->l3cd == l3cd);
|
|
nm_assert(ip_data->ip_config_type == ip_config_type);
|
|
|
|
done:
|
|
if (!changed)
|
|
return FALSE;
|
|
|
|
priv->config_changed = TRUE;
|
|
|
|
if (data && c_list_is_empty(&data->data_lst_head))
|
|
g_hash_table_remove(priv->configs_dict, data);
|
|
|
|
if (!priv->updates_queue) {
|
|
gs_free_error GError *error = NULL;
|
|
|
|
if (!update_dns(self, FALSE, FALSE, &error))
|
|
_LOGW("could not commit DNS changes: %s", error->message);
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
void
|
|
nm_dns_manager_set_hostname(NMDnsManager *self, const char *hostname, gboolean skip_update)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
const char *domain = NULL;
|
|
|
|
/* Certain hostnames we don't want to include in resolv.conf 'searches' */
|
|
if (hostname && nm_utils_is_specific_hostname(hostname)
|
|
&& !NM_STR_HAS_SUFFIX(hostname, ".in-addr.arpa")
|
|
&& !nm_inet_is_valid(AF_UNSPEC, hostname)) {
|
|
domain = strchr(hostname, '.');
|
|
if (domain) {
|
|
domain++;
|
|
/* If the hostname is a FQDN ("dcbw.example.com"), then add
|
|
* the domain part of it ("example.com") to the searches list,
|
|
* to ensure that we can still resolve its non-FQ form
|
|
* ("dcbw") too. (Also, if there are no other search domains
|
|
* specified, this makes a good default.) However, if the
|
|
* hostname is the top level of a domain (eg, "example.com"),
|
|
* then use the hostname itself as the search (since the user
|
|
* is unlikely to want "com" as a search domain).
|
|
*
|
|
* Because that logic only applies to public domains, the
|
|
* "assume_any_tld_is_public" parameter is FALSE. For
|
|
* example, it is likely that the user *does* want "local"
|
|
* or "localdomain" as a search domain.
|
|
*/
|
|
if (domain_is_valid(domain, TRUE, FALSE)) {
|
|
/* pass */
|
|
} else if (domain_is_valid(hostname, TRUE, FALSE)) {
|
|
domain = hostname;
|
|
}
|
|
|
|
if (!nm_hostname_is_valid(domain, FALSE))
|
|
domain = NULL;
|
|
}
|
|
}
|
|
|
|
if (!nm_strdup_reset(&priv->hostdomain, domain))
|
|
return;
|
|
|
|
_LOGT("set host domain to %s%s%s", NM_PRINT_FMT_QUOTE_STRING(priv->hostdomain));
|
|
|
|
if (skip_update)
|
|
return;
|
|
|
|
if (!priv->updates_queue) {
|
|
gs_free_error GError *error = NULL;
|
|
|
|
if (!update_dns(self, FALSE, FALSE, &error))
|
|
_LOGW("could not commit DNS changes: %s", error->message);
|
|
}
|
|
}
|
|
|
|
void
|
|
nm_dns_manager_begin_updates(NMDnsManager *self, const char *func)
|
|
{
|
|
NMDnsManagerPrivate *priv;
|
|
|
|
g_return_if_fail(self != NULL);
|
|
|
|
priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
/* Save current hash when starting a new batch */
|
|
if (priv->updates_queue == 0)
|
|
memcpy(priv->prev_hash, priv->hash, sizeof(priv->hash));
|
|
|
|
priv->updates_queue++;
|
|
|
|
_LOGD("(%s): queueing DNS updates (%d)", func, priv->updates_queue);
|
|
}
|
|
|
|
void
|
|
nm_dns_manager_end_updates(NMDnsManager *self, const char *func)
|
|
{
|
|
NMDnsManagerPrivate *priv;
|
|
gs_free_error GError *error = NULL;
|
|
guint8 new[HASH_LEN];
|
|
|
|
g_return_if_fail(self != NULL);
|
|
|
|
priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
g_return_if_fail(priv->updates_queue > 0);
|
|
|
|
compute_hash(self, nm_config_data_get_global_dns_config(nm_config_get_data(priv->config)), new);
|
|
priv->config_changed = (memcmp(new, priv->prev_hash, sizeof(new)) != 0) ? TRUE : FALSE;
|
|
_LOGD("(%s): DNS configuration %s", func, priv->config_changed ? "changed" : "did not change");
|
|
|
|
priv->updates_queue--;
|
|
if ((priv->updates_queue > 0) || !priv->config_changed) {
|
|
_LOGD("(%s): no DNS changes to commit (%d)", func, priv->updates_queue);
|
|
return;
|
|
}
|
|
|
|
/* Commit all the outstanding changes */
|
|
_LOGD("(%s): committing DNS changes (%d)", func, priv->updates_queue);
|
|
if (!update_dns(self, FALSE, FALSE, &error))
|
|
_LOGW("could not commit DNS changes: %s", error->message);
|
|
}
|
|
|
|
void
|
|
nm_dns_manager_stop(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv;
|
|
|
|
priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (priv->is_stopped)
|
|
g_return_if_reached();
|
|
|
|
_LOGT("stopping...");
|
|
|
|
/* If we're quitting, leave a valid resolv.conf in place, not one
|
|
* pointing to 127.0.0.1 if dnsmasq was active. But if we haven't
|
|
* done any DNS updates yet, there's no reason to touch resolv.conf
|
|
* on shutdown.
|
|
*/
|
|
if (priv->dns_touched && priv->plugin && NM_IS_DNS_DNSMASQ(priv->plugin)) {
|
|
gs_free_error GError *error = NULL;
|
|
|
|
if (!update_dns(self, TRUE, FALSE, &error))
|
|
_LOGW("could not commit DNS changes on shutdown: %s", error->message);
|
|
|
|
priv->dns_touched = FALSE;
|
|
}
|
|
|
|
priv->is_stopped = TRUE;
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
|
|
static gboolean
|
|
_clear_plugin(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
priv->plugin_ratelimit.ts = 0;
|
|
nm_clear_g_source(&priv->plugin_ratelimit.timer);
|
|
|
|
if (priv->plugin) {
|
|
nm_clear_g_signal_handler(priv->plugin, &priv->update_changed_signal_id);
|
|
nm_dns_plugin_stop(priv->plugin);
|
|
g_clear_object(&priv->plugin);
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
_clear_sd_resolved_plugin(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (priv->sd_resolve_plugin) {
|
|
nm_clear_g_signal_handler(priv->sd_resolve_plugin, &priv->update_changed_signal_id_sd);
|
|
nm_dns_plugin_stop(priv->sd_resolve_plugin);
|
|
g_clear_object(&priv->sd_resolve_plugin);
|
|
return TRUE;
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
static NMDnsManagerResolvConfManager
|
|
_check_resconf_immutable(NMDnsManagerResolvConfManager rc_manager)
|
|
{
|
|
struct stat st;
|
|
int fd, flags;
|
|
bool immutable = FALSE;
|
|
|
|
switch (rc_manager) {
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_UNKNOWN:
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_IMMUTABLE:
|
|
nm_assert_not_reached();
|
|
/* fall-through */
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED:
|
|
return NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED;
|
|
default:
|
|
|
|
if (lstat(_PATH_RESCONF, &st) != 0)
|
|
return rc_manager;
|
|
|
|
if (S_ISLNK(st.st_mode)) {
|
|
/* only regular files and directories can have extended file attributes. */
|
|
switch (rc_manager) {
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK:
|
|
/* we don't care whether the link-target is immutable.
|
|
* If the symlink points to another file, rc-manager=symlink anyway backs off.
|
|
* Otherwise, we would only check whether our internal resolv.conf is immutable. */
|
|
return NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK;
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_UNKNOWN:
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED:
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_IMMUTABLE:
|
|
nm_assert_not_reached();
|
|
/* fall-through */
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_FILE:
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_RESOLVCONF:
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_NETCONFIG:
|
|
case NM_DNS_MANAGER_RESOLV_CONF_MAN_AUTO:
|
|
break;
|
|
}
|
|
}
|
|
|
|
fd = open(_PATH_RESCONF, O_RDONLY | O_CLOEXEC);
|
|
if (fd != -1) {
|
|
if (ioctl(fd, FS_IOC_GETFLAGS, &flags) != -1)
|
|
immutable = NM_FLAGS_HAS(flags, FS_IMMUTABLE_FL);
|
|
nm_close(fd);
|
|
}
|
|
return immutable ? NM_DNS_MANAGER_RESOLV_CONF_MAN_IMMUTABLE : rc_manager;
|
|
}
|
|
}
|
|
|
|
static gboolean
|
|
_resolvconf_resolved_managed(void)
|
|
{
|
|
static const char *const RESOLVED_PATHS[] = {
|
|
"../run/systemd/resolve/stub-resolv.conf",
|
|
"../run/systemd/resolve/resolv.conf",
|
|
"../lib/systemd/resolv.conf",
|
|
"../usr/lib/systemd/resolv.conf",
|
|
"/run/systemd/resolve/stub-resolv.conf",
|
|
"/run/systemd/resolve/resolv.conf",
|
|
"/lib/systemd/resolv.conf",
|
|
"/usr/lib/systemd/resolv.conf",
|
|
};
|
|
struct stat st, st_test;
|
|
guint i;
|
|
|
|
if (lstat(_PATH_RESCONF, &st) != 0)
|
|
return FALSE;
|
|
|
|
if (S_ISLNK(st.st_mode)) {
|
|
gs_free char *full_path = NULL;
|
|
nm_auto_free char *real_path = NULL;
|
|
|
|
/* see if resolv.conf is a symlink with a target that is
|
|
* exactly like one of the candidates.
|
|
*
|
|
* This check will work for symlinks, even if the target
|
|
* does not exist and realpath() cannot resolve anything.
|
|
*
|
|
* We want to handle that, because systemd-resolved might not
|
|
* have started yet. */
|
|
full_path = g_file_read_link(_PATH_RESCONF, NULL);
|
|
if (nm_strv_find_first(RESOLVED_PATHS, G_N_ELEMENTS(RESOLVED_PATHS), full_path) >= 0)
|
|
return TRUE;
|
|
|
|
/* see if resolv.conf is a symlink that resolves exactly one
|
|
* of the candidate paths.
|
|
*
|
|
* This check will work for symlinks that can be resolved
|
|
* to a realpath, but the actual file might not exist.
|
|
*
|
|
* We want to handle that, because systemd-resolved might not
|
|
* have started yet. */
|
|
real_path = realpath(_PATH_RESCONF, NULL);
|
|
if (nm_strv_find_first(RESOLVED_PATHS, G_N_ELEMENTS(RESOLVED_PATHS), real_path) >= 0)
|
|
return TRUE;
|
|
|
|
/* fall-through and resolve the symlink, to check the file
|
|
* it points to (below).
|
|
*
|
|
* This check is the most reliable, but it only works if
|
|
* systemd-resolved already started and created the file. */
|
|
if (stat(_PATH_RESCONF, &st) != 0)
|
|
return FALSE;
|
|
}
|
|
|
|
/* see if resolv.conf resolves to one of the candidate
|
|
* paths (or whether it is hard-linked). */
|
|
for (i = 0; i < G_N_ELEMENTS(RESOLVED_PATHS); i++) {
|
|
const char *p = RESOLVED_PATHS[i];
|
|
|
|
if (p[0] == '/' && stat(p, &st_test) == 0 && st.st_dev == st_test.st_dev
|
|
&& st.st_ino == st_test.st_ino)
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static void
|
|
init_resolv_conf_mode(NMDnsManager *self, gboolean force_reload_plugin)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
NMDnsManagerResolvConfManager rc_manager;
|
|
const char *mode;
|
|
gboolean systemd_resolved;
|
|
gboolean param_changed = FALSE;
|
|
gboolean plugin_changed = FALSE;
|
|
gboolean systemd_resolved_changed = FALSE;
|
|
gboolean rc_manager_was_auto = FALSE;
|
|
|
|
mode = nm_config_data_get_dns_mode(nm_config_get_data(priv->config));
|
|
systemd_resolved = nm_config_data_get_systemd_resolved(nm_config_get_data(priv->config));
|
|
|
|
if (nm_streq0(mode, "none"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED;
|
|
else {
|
|
const char *man;
|
|
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_UNKNOWN;
|
|
man = nm_config_data_get_rc_manager(nm_config_get_data(priv->config));
|
|
|
|
again:
|
|
if (!man) {
|
|
/* nop */
|
|
} else if (nm_streq(man, "auto"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_AUTO;
|
|
else if (NM_IN_STRSET(man, "symlink", "none"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK;
|
|
else if (nm_streq(man, "file"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_FILE;
|
|
else if (nm_streq(man, "resolvconf"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_RESOLVCONF;
|
|
else if (nm_streq(man, "netconfig"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_NETCONFIG;
|
|
else if (nm_streq(man, "unmanaged"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED;
|
|
|
|
if (rc_manager == NM_DNS_MANAGER_RESOLV_CONF_MAN_UNKNOWN) {
|
|
if (man) {
|
|
_LOGW("init: unknown resolv.conf manager \"%s\", fallback to \"%s\"",
|
|
man,
|
|
"" NM_CONFIG_DEFAULT_MAIN_RC_MANAGER);
|
|
}
|
|
man = "" NM_CONFIG_DEFAULT_MAIN_RC_MANAGER;
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_AUTO;
|
|
goto again;
|
|
}
|
|
}
|
|
|
|
rc_manager = _check_resconf_immutable(rc_manager);
|
|
|
|
if ((!mode && _resolvconf_resolved_managed()) || nm_streq0(mode, "systemd-resolved")) {
|
|
if (force_reload_plugin || !NM_IS_DNS_SYSTEMD_RESOLVED(priv->plugin)) {
|
|
_clear_plugin(self);
|
|
priv->plugin = nm_dns_systemd_resolved_new();
|
|
plugin_changed = TRUE;
|
|
}
|
|
mode = "systemd-resolved";
|
|
systemd_resolved = FALSE;
|
|
} else if (nm_streq0(mode, "dnsmasq")) {
|
|
if (force_reload_plugin || !NM_IS_DNS_DNSMASQ(priv->plugin)) {
|
|
_clear_plugin(self);
|
|
priv->plugin = nm_dns_dnsmasq_new();
|
|
plugin_changed = TRUE;
|
|
}
|
|
} else {
|
|
if (!NM_IN_STRSET(mode, "none", "default")) {
|
|
if (mode) {
|
|
if (nm_streq(mode, "unbound"))
|
|
_LOGW("init: ns mode 'unbound' was removed. Update your configuration");
|
|
else
|
|
_LOGW("init: unknown dns mode '%s'", mode);
|
|
}
|
|
mode = "default";
|
|
}
|
|
if (_clear_plugin(self))
|
|
plugin_changed = TRUE;
|
|
}
|
|
|
|
if (rc_manager == NM_DNS_MANAGER_RESOLV_CONF_MAN_AUTO) {
|
|
rc_manager_was_auto = TRUE;
|
|
if (nm_streq(mode, "systemd-resolved"))
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_UNMANAGED;
|
|
else if (HAS_RESOLVCONF && g_file_test(RESOLVCONF_PATH, G_FILE_TEST_IS_EXECUTABLE)) {
|
|
/* We detect /sbin/resolvconf only at this stage. That means, if you install
|
|
* or uninstall openresolv afterwards, you need to reload the DNS settings
|
|
* (with SIGHUP or `systemctl reload NetworkManager.service`).
|
|
*
|
|
* We only accept resolvconf if NetworkManager was built with --with-resolvconf.
|
|
* For example, on Fedora the systemd package provides a compat resolvconf
|
|
* implementation for systemd-resolved. But using that never makes sense, because
|
|
* there we either use full systemd-resolved mode or not. In no case does it
|
|
* make sense to call that resolvconf implementation. */
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_RESOLVCONF;
|
|
} else if (HAS_NETCONFIG && g_file_test(NETCONFIG_PATH, G_FILE_TEST_IS_EXECUTABLE)) {
|
|
/* Like for resolvconf, we detect only once. We only autoenable this
|
|
* option, if NetworkManager was built with netconfig explicitly enabled. */
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_NETCONFIG;
|
|
} else
|
|
rc_manager = NM_DNS_MANAGER_RESOLV_CONF_MAN_SYMLINK;
|
|
}
|
|
|
|
/* The systemd-resolved plugin is special. We typically always want to keep
|
|
* systemd-resolved up to date even if the configured plugin is different. */
|
|
if (systemd_resolved) {
|
|
if (!priv->sd_resolve_plugin) {
|
|
priv->sd_resolve_plugin = nm_dns_systemd_resolved_new();
|
|
systemd_resolved_changed = TRUE;
|
|
}
|
|
} else if (_clear_sd_resolved_plugin(self))
|
|
systemd_resolved_changed = TRUE;
|
|
|
|
g_object_freeze_notify(G_OBJECT(self));
|
|
|
|
if (!nm_streq0(priv->mode, mode)) {
|
|
g_free(priv->mode);
|
|
priv->mode = g_strdup(mode);
|
|
param_changed = TRUE;
|
|
_notify(self, PROP_MODE);
|
|
}
|
|
|
|
if (priv->rc_manager != rc_manager) {
|
|
priv->rc_manager = rc_manager;
|
|
param_changed = TRUE;
|
|
_notify(self, PROP_RC_MANAGER);
|
|
}
|
|
|
|
if (param_changed || plugin_changed || systemd_resolved_changed) {
|
|
_LOGI("init: dns=%s%s rc-manager=%s%s%s%s%s",
|
|
mode,
|
|
(systemd_resolved ? ",systemd-resolved" : ""),
|
|
_rc_manager_to_string(rc_manager),
|
|
rc_manager_was_auto ? " (auto)" : "",
|
|
NM_PRINT_FMT_QUOTED(priv->plugin,
|
|
", plugin=",
|
|
nm_dns_plugin_get_name(priv->plugin),
|
|
"",
|
|
""));
|
|
}
|
|
|
|
if (plugin_changed && priv->plugin && priv->update_changed_signal_id == 0) {
|
|
priv->update_changed_signal_id = g_signal_connect(priv->plugin,
|
|
NM_DNS_PLUGIN_UPDATE_PENDING_CHANGED,
|
|
G_CALLBACK(_update_pending_changed_cb),
|
|
self);
|
|
}
|
|
|
|
if (systemd_resolved_changed && priv->sd_resolve_plugin
|
|
&& priv->update_changed_signal_id_sd == 0) {
|
|
priv->update_changed_signal_id_sd = g_signal_connect(priv->sd_resolve_plugin,
|
|
NM_DNS_PLUGIN_UPDATE_PENDING_CHANGED,
|
|
G_CALLBACK(_update_pending_changed_cb),
|
|
self);
|
|
}
|
|
|
|
if (!NM_IS_DNS_DNSMASQ(priv->plugin))
|
|
nm_dnsmasq_kill_external();
|
|
|
|
_update_pending_maybe_changed(self);
|
|
|
|
g_object_thaw_notify(G_OBJECT(self));
|
|
}
|
|
|
|
static void
|
|
config_changed_cb(NMConfig *config,
|
|
NMConfigData *config_data,
|
|
NMConfigChangeFlags changes,
|
|
NMConfigData *old_data,
|
|
NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
if (NM_FLAGS_ANY(changes,
|
|
NM_CONFIG_CHANGE_DNS_MODE | NM_CONFIG_CHANGE_RC_MANAGER
|
|
| NM_CONFIG_CHANGE_CAUSE_SIGHUP | NM_CONFIG_CHANGE_CAUSE_DNS_FULL)) {
|
|
/* reload the resolv-conf mode also on SIGHUP (when DNS_MODE didn't change).
|
|
* The reason is, that the configuration also depends on whether resolv.conf
|
|
* is immutable, thus, without the configuration changing, we always want to
|
|
* re-configure the mode. */
|
|
init_resolv_conf_mode(
|
|
self,
|
|
NM_FLAGS_ANY(changes, NM_CONFIG_CHANGE_CAUSE_SIGHUP | NM_CONFIG_CHANGE_CAUSE_DNS_FULL));
|
|
}
|
|
|
|
if (NM_FLAGS_ANY(changes,
|
|
NM_CONFIG_CHANGE_CAUSE_SIGHUP | NM_CONFIG_CHANGE_CAUSE_SIGUSR1
|
|
| NM_CONFIG_CHANGE_CAUSE_DNS_RC | NM_CONFIG_CHANGE_CAUSE_DNS_FULL
|
|
| NM_CONFIG_CHANGE_DNS_MODE | NM_CONFIG_CHANGE_RC_MANAGER
|
|
| NM_CONFIG_CHANGE_GLOBAL_DNS_CONFIG)) {
|
|
gs_free_error GError *error = NULL;
|
|
|
|
priv->config_changed = TRUE;
|
|
if (!update_dns(self, FALSE, TRUE, &error))
|
|
_LOGW("could not commit DNS changes: %s", error->message);
|
|
}
|
|
}
|
|
|
|
static void
|
|
_get_global_config_variant(GVariantBuilder *builder, NMGlobalDnsConfig *global)
|
|
{
|
|
NMGlobalDnsDomain *domain;
|
|
guint i, num;
|
|
|
|
num = nm_global_dns_config_get_num_domains(global);
|
|
for (i = 0; i < num; i++) {
|
|
GVariantBuilder conf_builder;
|
|
GVariantBuilder item_builder;
|
|
const char *domain_name;
|
|
const char *const *servers;
|
|
|
|
g_variant_builder_init(&conf_builder, G_VARIANT_TYPE("a{sv}"));
|
|
|
|
domain = nm_global_dns_config_get_domain(global, i);
|
|
domain_name = nm_global_dns_domain_get_name(domain);
|
|
|
|
if (domain_name && !nm_streq0(domain_name, "*")) {
|
|
g_variant_builder_init(&item_builder, G_VARIANT_TYPE("as"));
|
|
g_variant_builder_add(&item_builder, "s", domain_name);
|
|
g_variant_builder_add(&conf_builder,
|
|
"{sv}",
|
|
"domains",
|
|
g_variant_builder_end(&item_builder));
|
|
}
|
|
|
|
g_variant_builder_init(&item_builder, G_VARIANT_TYPE("as"));
|
|
for (servers = nm_global_dns_domain_get_servers(domain); *servers; servers++) {
|
|
g_variant_builder_add(&item_builder, "s", *servers);
|
|
}
|
|
g_variant_builder_add(&conf_builder,
|
|
"{sv}",
|
|
"nameservers",
|
|
g_variant_builder_end(&item_builder));
|
|
|
|
g_variant_builder_add(&conf_builder,
|
|
"{sv}",
|
|
"priority",
|
|
g_variant_new_int32(NM_DNS_PRIORITY_DEFAULT_NORMAL));
|
|
|
|
g_variant_builder_add(builder, "a{sv}", &conf_builder);
|
|
}
|
|
}
|
|
|
|
static GVariant *
|
|
_get_config_variant(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
NMGlobalDnsConfig *global_config;
|
|
gs_free char *str = NULL;
|
|
GVariantBuilder builder;
|
|
NMDnsConfigIPData *ip_data;
|
|
const CList *head;
|
|
gs_unref_ptrarray GPtrArray *array_domains = NULL;
|
|
|
|
if (priv->config_variant)
|
|
return priv->config_variant;
|
|
|
|
g_variant_builder_init(&builder, G_VARIANT_TYPE("aa{sv}"));
|
|
|
|
global_config = nm_config_data_get_global_dns_config(nm_config_get_data(priv->config));
|
|
if (global_config)
|
|
_get_global_config_variant(&builder, global_config);
|
|
|
|
head = _mgr_get_ip_data_lst_head(self);
|
|
c_list_for_each_entry (ip_data, head, ip_data_lst) {
|
|
GVariantBuilder entry_builder;
|
|
GVariantBuilder strv_builder;
|
|
guint num;
|
|
guint num_domains;
|
|
guint num_searches;
|
|
guint i;
|
|
char buf[NM_INET_ADDRSTRLEN];
|
|
const char *ifname;
|
|
const char *const *strarr;
|
|
|
|
strarr = nm_l3_config_data_get_nameservers(ip_data->l3cd, ip_data->addr_family, &num);
|
|
if (num == 0)
|
|
continue;
|
|
|
|
g_variant_builder_init(&entry_builder, G_VARIANT_TYPE("a{sv}"));
|
|
|
|
g_variant_builder_init(&strv_builder, G_VARIANT_TYPE("as"));
|
|
for (i = 0; i < num; i++) {
|
|
NMIPAddr a;
|
|
|
|
if (!nm_utils_dnsname_parse_assert(ip_data->addr_family, strarr[i], NULL, &a, NULL))
|
|
continue;
|
|
|
|
g_variant_builder_add(&strv_builder, "s", nm_inet_ntop(ip_data->addr_family, &a, buf));
|
|
}
|
|
g_variant_builder_add(&entry_builder,
|
|
"{sv}",
|
|
"nameservers",
|
|
g_variant_builder_end(&strv_builder));
|
|
|
|
nm_l3_config_data_get_domains(ip_data->l3cd, ip_data->addr_family, &num_domains);
|
|
nm_l3_config_data_get_searches(ip_data->l3cd, ip_data->addr_family, &num_searches);
|
|
num = num_domains + num_searches;
|
|
if (num > 0) {
|
|
if (!array_domains)
|
|
array_domains = g_ptr_array_sized_new(num);
|
|
else
|
|
g_ptr_array_set_size(array_domains, 0);
|
|
|
|
add_dns_domains(array_domains, ip_data->addr_family, ip_data->l3cd, TRUE, FALSE);
|
|
if (array_domains->len) {
|
|
g_variant_builder_add(&entry_builder,
|
|
"{sv}",
|
|
"domains",
|
|
g_variant_new_strv((const char *const *) array_domains->pdata,
|
|
array_domains->len));
|
|
}
|
|
}
|
|
|
|
ifname = nm_platform_link_get_name(NM_PLATFORM_GET, ip_data->data->ifindex);
|
|
if (ifname) {
|
|
g_variant_builder_add(&entry_builder,
|
|
"{sv}",
|
|
"interface",
|
|
g_variant_new_string(ifname));
|
|
}
|
|
|
|
g_variant_builder_add(&entry_builder,
|
|
"{sv}",
|
|
"priority",
|
|
g_variant_new_int32(_dns_config_ip_data_get_dns_priority(ip_data)));
|
|
|
|
g_variant_builder_add(
|
|
&entry_builder,
|
|
"{sv}",
|
|
"vpn",
|
|
g_variant_new_boolean(ip_data->ip_config_type == NM_DNS_IP_CONFIG_TYPE_VPN));
|
|
|
|
g_variant_builder_add(&builder, "a{sv}", &entry_builder);
|
|
}
|
|
|
|
priv->config_variant = g_variant_ref_sink(g_variant_builder_end(&builder));
|
|
_LOGT("current configuration: %s", (str = g_variant_print(priv->config_variant, TRUE)));
|
|
|
|
return priv->config_variant;
|
|
}
|
|
|
|
static void
|
|
get_property(GObject *object, guint prop_id, GValue *value, GParamSpec *pspec)
|
|
{
|
|
NMDnsManager *self = NM_DNS_MANAGER(object);
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
switch (prop_id) {
|
|
case PROP_MODE:
|
|
g_value_set_string(value, priv->mode);
|
|
break;
|
|
case PROP_RC_MANAGER:
|
|
g_value_set_string(value, _rc_manager_to_string(priv->rc_manager));
|
|
break;
|
|
case PROP_CONFIGURATION:
|
|
g_value_set_variant(value, _get_config_variant(self));
|
|
break;
|
|
case PROP_UPDATE_PENDING:
|
|
g_value_set_boolean(value, nm_dns_manager_get_update_pending(self));
|
|
break;
|
|
default:
|
|
G_OBJECT_WARN_INVALID_PROPERTY_ID(object, prop_id, pspec);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
nm_dns_manager_init(NMDnsManager *self)
|
|
{
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
_LOGT("creating...");
|
|
|
|
c_list_init(&priv->configs_lst_head);
|
|
c_list_init(&priv->ip_data_lst_head);
|
|
|
|
priv->config = g_object_ref(nm_config_get());
|
|
|
|
G_STATIC_ASSERT_EXPR(G_STRUCT_OFFSET(NMDnsConfigData, ifindex) == 0);
|
|
priv->configs_dict = g_hash_table_new_full(nm_pint_hash,
|
|
nm_pint_equal,
|
|
(GDestroyNotify) _dns_config_data_free,
|
|
NULL);
|
|
|
|
compute_hash(self, NULL, NM_DNS_MANAGER_GET_PRIVATE(self)->hash);
|
|
g_signal_connect(G_OBJECT(priv->config),
|
|
NM_CONFIG_SIGNAL_CONFIG_CHANGED,
|
|
G_CALLBACK(config_changed_cb),
|
|
self);
|
|
init_resolv_conf_mode(self, TRUE);
|
|
}
|
|
|
|
static void
|
|
dispose(GObject *object)
|
|
{
|
|
NMDnsManager *self = NM_DNS_MANAGER(object);
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
NMDnsConfigIPData *ip_data, *ip_data_safe;
|
|
|
|
_LOGT("disposing");
|
|
|
|
if (!priv->is_stopped)
|
|
nm_dns_manager_stop(self);
|
|
|
|
if (priv->config)
|
|
g_signal_handlers_disconnect_by_func(priv->config, config_changed_cb, self);
|
|
|
|
_clear_sd_resolved_plugin(self);
|
|
_clear_plugin(self);
|
|
|
|
nm_clear_g_source_inst(&priv->update_pending_unblock);
|
|
|
|
c_list_for_each_entry_safe (ip_data, ip_data_safe, &priv->ip_data_lst_head, ip_data_lst)
|
|
_dns_config_ip_data_free(ip_data);
|
|
|
|
nm_clear_pointer(&priv->configs_dict, g_hash_table_destroy);
|
|
nm_assert(c_list_is_empty(&priv->configs_lst_head));
|
|
|
|
nm_clear_g_source(&priv->plugin_ratelimit.timer);
|
|
|
|
g_clear_object(&priv->config);
|
|
|
|
G_OBJECT_CLASS(nm_dns_manager_parent_class)->dispose(object);
|
|
|
|
nm_clear_pointer(&priv->config_variant, g_variant_unref);
|
|
}
|
|
|
|
static void
|
|
finalize(GObject *object)
|
|
{
|
|
NMDnsManager *self = NM_DNS_MANAGER(object);
|
|
NMDnsManagerPrivate *priv = NM_DNS_MANAGER_GET_PRIVATE(self);
|
|
|
|
g_free(priv->hostdomain);
|
|
g_free(priv->mode);
|
|
|
|
G_OBJECT_CLASS(nm_dns_manager_parent_class)->finalize(object);
|
|
}
|
|
|
|
static const NMDBusInterfaceInfoExtended interface_info_dns_manager = {
|
|
.parent = NM_DEFINE_GDBUS_INTERFACE_INFO_INIT(
|
|
NM_DBUS_INTERFACE_DNS_MANAGER,
|
|
.properties = NM_DEFINE_GDBUS_PROPERTY_INFOS(
|
|
NM_DEFINE_DBUS_PROPERTY_INFO_EXTENDED_READABLE("Mode", "s", NM_DNS_MANAGER_MODE),
|
|
NM_DEFINE_DBUS_PROPERTY_INFO_EXTENDED_READABLE("RcManager",
|
|
"s",
|
|
NM_DNS_MANAGER_RC_MANAGER),
|
|
NM_DEFINE_DBUS_PROPERTY_INFO_EXTENDED_READABLE("Configuration",
|
|
"aa{sv}",
|
|
NM_DNS_MANAGER_CONFIGURATION), ), ),
|
|
};
|
|
|
|
static void
|
|
nm_dns_manager_class_init(NMDnsManagerClass *klass)
|
|
{
|
|
GObjectClass *object_class = G_OBJECT_CLASS(klass);
|
|
NMDBusObjectClass *dbus_object_class = NM_DBUS_OBJECT_CLASS(klass);
|
|
|
|
object_class->dispose = dispose;
|
|
object_class->finalize = finalize;
|
|
object_class->get_property = get_property;
|
|
|
|
dbus_object_class->export_path = NM_DBUS_EXPORT_PATH_STATIC(NM_DBUS_PATH "/DnsManager");
|
|
dbus_object_class->interface_infos = NM_DBUS_INTERFACE_INFOS(&interface_info_dns_manager);
|
|
dbus_object_class->export_on_construction = TRUE;
|
|
|
|
obj_properties[PROP_MODE] = g_param_spec_string(NM_DNS_MANAGER_MODE,
|
|
"",
|
|
"",
|
|
NULL,
|
|
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
|
|
|
|
obj_properties[PROP_RC_MANAGER] =
|
|
g_param_spec_string(NM_DNS_MANAGER_RC_MANAGER,
|
|
"",
|
|
"",
|
|
NULL,
|
|
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
|
|
|
|
obj_properties[PROP_CONFIGURATION] =
|
|
g_param_spec_variant(NM_DNS_MANAGER_CONFIGURATION,
|
|
"",
|
|
"",
|
|
G_VARIANT_TYPE("aa{sv}"),
|
|
NULL,
|
|
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
|
|
|
|
obj_properties[PROP_UPDATE_PENDING] =
|
|
g_param_spec_boolean(NM_DNS_MANAGER_UPDATE_PENDING,
|
|
"",
|
|
"",
|
|
FALSE,
|
|
G_PARAM_READABLE | G_PARAM_STATIC_STRINGS);
|
|
|
|
g_object_class_install_properties(object_class, _PROPERTY_ENUMS_LAST, obj_properties);
|
|
|
|
signals[CONFIG_CHANGED] = g_signal_new(NM_DNS_MANAGER_CONFIG_CHANGED,
|
|
G_OBJECT_CLASS_TYPE(object_class),
|
|
G_SIGNAL_RUN_FIRST,
|
|
0,
|
|
NULL,
|
|
NULL,
|
|
g_cclosure_marshal_VOID__VOID,
|
|
G_TYPE_NONE,
|
|
0);
|
|
}
|