mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-02-11 20:00:35 +01:00
If your hostname is 'foo.bar.baz' and your DNS server doesn't actually reply to queries for 'foo.bar.baz' you can't just 'ping foo' currently. While that may be somewhat of a misconfigured setup, since we're already adding the domain part of the hostname to /etc/resolv.conf we might as well add the short hostname to /etc/hosts too so that ping works.
400 lines
13 KiB
C
400 lines
13 KiB
C
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
|
|
/* NetworkManager -- Network link manager
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Copyright (C) 2004 - 2010 Red Hat, Inc.
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <netdb.h>
|
|
#include <ctype.h>
|
|
#include <arpa/inet.h>
|
|
|
|
#include "nm-policy-hosts.h"
|
|
#include "nm-logging.h"
|
|
|
|
gboolean
|
|
nm_policy_hosts_find_token (const char *line, const char *token)
|
|
{
|
|
const char *start = line, *p = line;
|
|
|
|
g_return_val_if_fail (line != NULL, FALSE);
|
|
g_return_val_if_fail (token != NULL, FALSE);
|
|
g_return_val_if_fail (strlen (token) > 0, FALSE);
|
|
|
|
/* Walk through the line to find the next whitespace character */
|
|
while (p <= line + strlen (line)) {
|
|
if (isblank (*p) || (*p == '\0')) {
|
|
/* Token starts with 'start' and ends with 'end' */
|
|
if ((p > start) && *start && (p - start == strlen (token)) && !strncmp (start, token, (p - start)))
|
|
return TRUE; /* found */
|
|
|
|
/* not found; advance start and continue looking */
|
|
start = p + 1;
|
|
}
|
|
p++;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
static gboolean
|
|
is_local_mapping (const char *str, gboolean ip6, const char *hostname)
|
|
{
|
|
const char *addr = ip6 ? "::1" : "127.0.0.1";
|
|
const char *fallback = ip6 ? "localhost6" : "localhost";
|
|
|
|
return ( !strncmp (str, addr, strlen (addr))
|
|
&& nm_policy_hosts_find_token (str, hostname ? hostname : fallback));
|
|
}
|
|
|
|
static gboolean
|
|
ip4_addr_matches (const char *str, const char *ip4_addr)
|
|
{
|
|
struct in_addr found, given;
|
|
char buf[INET_ADDRSTRLEN + 2];
|
|
const char *p = str;
|
|
guint32 i = 0;
|
|
|
|
g_return_val_if_fail (ip4_addr != NULL, FALSE);
|
|
|
|
memset (buf, 0, sizeof (buf));
|
|
while (*p && !isblank (*p) && (i < sizeof (buf)))
|
|
buf[i++] = *p++;
|
|
|
|
if (inet_pton (AF_INET, buf, &found) != 1)
|
|
return FALSE;
|
|
if (inet_pton (AF_INET, ip4_addr, &given) != 1)
|
|
return FALSE;
|
|
|
|
return memcmp (&found, &given, sizeof (found)) == 0;
|
|
}
|
|
|
|
static gboolean
|
|
ip6_addr_matches (const char *str, const char *ip6_addr)
|
|
{
|
|
struct in6_addr found, given;
|
|
char buf[INET6_ADDRSTRLEN + 2];
|
|
const char *p = str;
|
|
guint32 i = 0;
|
|
|
|
g_return_val_if_fail (ip6_addr != NULL, FALSE);
|
|
|
|
memset (buf, 0, sizeof (buf));
|
|
while (*p && !isblank (*p) && (i < sizeof (buf)))
|
|
buf[i++] = *p++;
|
|
|
|
if (inet_pton (AF_INET6, buf, &found) != 1)
|
|
return FALSE;
|
|
if (inet_pton (AF_INET6, ip6_addr, &given) != 1)
|
|
return FALSE;
|
|
|
|
return memcmp (&found, &given, sizeof (found)) == 0;
|
|
}
|
|
|
|
#define ADDED_TAG "# Added by NetworkManager"
|
|
|
|
GString *
|
|
nm_policy_get_etc_hosts (const char **lines,
|
|
gsize existing_len,
|
|
const char *hostname,
|
|
const char *fallback_hostname4,
|
|
const char *fallback_hostname6,
|
|
const char *ip4_addr,
|
|
const char *ip6_addr,
|
|
GError **error)
|
|
{
|
|
GString *contents = NULL;
|
|
const char **line;
|
|
gboolean found_localhost4 = FALSE;
|
|
gboolean found_localhost6 = FALSE;
|
|
gboolean found_host4 = FALSE;
|
|
gboolean found_host6 = FALSE;
|
|
gboolean found_user_host4 = FALSE;
|
|
gboolean found_user_host6 = FALSE;
|
|
gboolean initial_comments = TRUE;
|
|
gboolean added = FALSE;
|
|
gboolean hostname4_is_fallback;
|
|
gboolean hostname6_is_fallback;
|
|
gboolean host4_before = FALSE;
|
|
gboolean host6_before = FALSE;
|
|
char *short_hostname = NULL;
|
|
|
|
g_return_val_if_fail (lines != NULL, FALSE);
|
|
g_return_val_if_fail (hostname != NULL, FALSE);
|
|
|
|
hostname4_is_fallback = !strcmp (hostname, fallback_hostname4);
|
|
hostname6_is_fallback = !strcmp (hostname, fallback_hostname6);
|
|
|
|
/* We need the following in /etc/hosts:
|
|
*
|
|
* 1) current hostname mapped to current IPv4 addresses if IPv4 is active
|
|
* 2) current hostname mapped to current IPv6 addresses if IPv6 is active
|
|
* 3) 'localhost' mapped to 127.0.0.1
|
|
* 4) 'localhost6' mapped to ::1
|
|
*
|
|
* If all these things exist we don't need to bother updating the file.
|
|
*/
|
|
|
|
if (!ip4_addr) {
|
|
found_host4 = TRUE;
|
|
host4_before = TRUE;
|
|
}
|
|
if (!ip6_addr) {
|
|
found_host6 = TRUE;
|
|
host6_before = TRUE;
|
|
}
|
|
|
|
/* Look for the four cases from above */
|
|
for (line = lines; lines && *line; line++) {
|
|
if (!strlen (*line) || (*line[0] == '#'))
|
|
continue;
|
|
|
|
if (nm_policy_hosts_find_token (*line, hostname)) {
|
|
/* Found the current hostname on this line */
|
|
if (ip4_addr && ip4_addr_matches (*line, ip4_addr)) {
|
|
found_host4 = TRUE;
|
|
if (strstr (*line, ADDED_TAG)) {
|
|
if (!host4_before)
|
|
host4_before = !found_localhost4;
|
|
} else {
|
|
found_user_host4 = TRUE;
|
|
host4_before = TRUE; /* Ignore if user added mapping manually */
|
|
}
|
|
}
|
|
if (ip6_addr && ip6_addr_matches (*line, ip6_addr)) {
|
|
found_host6 = TRUE;
|
|
if (strstr (*line, ADDED_TAG)) {
|
|
if (!host6_before)
|
|
host6_before = !found_localhost6;
|
|
} else {
|
|
found_user_host6 = TRUE;
|
|
host6_before = TRUE; /* Ignore if user added mapping manually */
|
|
}
|
|
}
|
|
}
|
|
|
|
if (is_local_mapping (*line, FALSE, "localhost")) {
|
|
/* a 127.0.0.1 line containing 'localhost' */
|
|
found_localhost4 = TRUE;
|
|
} else if (is_local_mapping (*line, TRUE, "localhost6")) {
|
|
/* a ::1 line containing 'localhost6' */
|
|
found_localhost6 = TRUE;
|
|
}
|
|
|
|
if (found_localhost4 && found_host4 && found_localhost6 && found_host6 && host4_before && host6_before)
|
|
return NULL; /* No update required */
|
|
}
|
|
|
|
contents = g_string_sized_new (existing_len ? existing_len + 100 : 200);
|
|
if (!contents) {
|
|
g_set_error_literal (error, 0, 0, "not enough memory");
|
|
return NULL;
|
|
}
|
|
|
|
/* Find the short hostname, like 'foo' from 'foo.bar.baz'; we want to
|
|
* make sure that the entries we add for this host also include the short
|
|
* hostname too so that if the resolver does not answer queries for the
|
|
* machine's actual hostname/domain, that stuff like 'ping foo' still works.
|
|
*/
|
|
if (!hostname4_is_fallback || !hostname6_is_fallback) {
|
|
char *dot;
|
|
|
|
short_hostname = g_strdup (hostname);
|
|
dot = strchr (short_hostname, '.');
|
|
if (dot && *(dot+1))
|
|
*dot = '\0';
|
|
else {
|
|
g_free (short_hostname);
|
|
short_hostname = NULL;
|
|
}
|
|
}
|
|
|
|
/* Construct the new hosts file; replace any 127.0.0.1/::1 entry that is
|
|
* at the beginning of the file or right after initial comments and contains
|
|
* the string 'localhost' (for IPv4) or 'localhost6' (for IPv6). If there
|
|
* is no 127.0.0.1 or ::1 entry at the beginning or after initial comments
|
|
* that contains 'localhost' or 'localhost6', add one there
|
|
* and ignore any other 127.0.0.1/::1 entries that contain 'localhost' or
|
|
* 'localhost6'.
|
|
*/
|
|
for (line = lines, initial_comments = TRUE; lines && *line; line++) {
|
|
gboolean add_line = TRUE;
|
|
|
|
/* This is the first line after the initial comments */
|
|
if (strlen (*line) && initial_comments && (*line[0] != '#')) {
|
|
initial_comments = FALSE;
|
|
|
|
/* If the user added their own mapping for the hostname, just make
|
|
* a simple 'localhost' mapping and assume the user knows what they
|
|
* are doing with their manual hostname entry. Otherwise if the
|
|
* hostname wasn't found somewhere else, add it to the localhost
|
|
* mapping line to make sure it's mapped to something.
|
|
*/
|
|
|
|
/* Add the address mappings first so they take precedence */
|
|
if (!hostname4_is_fallback && ip4_addr && !found_user_host4) {
|
|
g_string_append_printf (contents, "%s\t%s", ip4_addr, hostname);
|
|
if (short_hostname)
|
|
g_string_append_printf (contents, "\t%s", short_hostname);
|
|
g_string_append_printf (contents, "\t%s\n", ADDED_TAG);
|
|
}
|
|
if (!hostname6_is_fallback && ip6_addr && !found_user_host6) {
|
|
g_string_append_printf (contents, "%s\t%s", ip6_addr, hostname);
|
|
if (short_hostname)
|
|
g_string_append_printf (contents, "\t%s", short_hostname);
|
|
g_string_append_printf (contents, "\t%s\n", ADDED_TAG);
|
|
}
|
|
|
|
/* IPv4 localhost line */
|
|
g_string_append (contents, "127.0.0.1");
|
|
if (!hostname4_is_fallback && !ip4_addr && !found_user_host4) {
|
|
g_string_append_printf (contents, "\t%s", hostname);
|
|
if (short_hostname)
|
|
g_string_append_printf (contents, "\t%s", short_hostname);
|
|
}
|
|
g_string_append_printf (contents, "\t%s\tlocalhost\n", fallback_hostname4);
|
|
|
|
/* IPv6 localhost line */
|
|
g_string_append (contents, "::1");
|
|
if (!hostname6_is_fallback && !hostname4_is_fallback && !ip6_addr && !found_user_host6) {
|
|
g_string_append_printf (contents, "\t%s", hostname);
|
|
if (short_hostname)
|
|
g_string_append_printf (contents, "\t%s", short_hostname);
|
|
}
|
|
g_string_append_printf (contents, "\t%s\tlocalhost6\n", fallback_hostname6);
|
|
|
|
added = TRUE;
|
|
}
|
|
|
|
/* Don't add the original line if it is a localhost mapping */
|
|
if (is_local_mapping (*line, FALSE, "localhost"))
|
|
add_line = FALSE;
|
|
else if (is_local_mapping (*line, FALSE, fallback_hostname4))
|
|
add_line = FALSE;
|
|
else if (is_local_mapping (*line, FALSE, hostname))
|
|
add_line = FALSE;
|
|
else if (is_local_mapping (*line, TRUE, "localhost6"))
|
|
add_line = FALSE;
|
|
else if (is_local_mapping (*line, TRUE, fallback_hostname6))
|
|
add_line = FALSE;
|
|
else if (is_local_mapping (*line, TRUE, hostname))
|
|
add_line = FALSE;
|
|
|
|
if (add_line && !strstr (*line, ADDED_TAG)) {
|
|
g_string_append (contents, *line);
|
|
/* Only append the new line if this isn't the last line in the file */
|
|
if (*(line+1))
|
|
g_string_append_c (contents, '\n');
|
|
}
|
|
}
|
|
|
|
/* Hmm, /etc/hosts was empty for some reason */
|
|
if (!added) {
|
|
g_string_append (contents, "# Do not remove the following lines, or various programs\n");
|
|
g_string_append (contents, "# that require network functionality will fail.\n");
|
|
|
|
/* Add the address mappings first so they take precedence */
|
|
if (!hostname4_is_fallback && ip4_addr) {
|
|
g_string_append_printf (contents, "%s\t%s", ip4_addr, hostname);
|
|
if (short_hostname)
|
|
g_string_append_printf (contents, "\t%s", short_hostname);
|
|
g_string_append_printf (contents, "\t%s\n", ADDED_TAG);
|
|
}
|
|
if (!hostname6_is_fallback && ip6_addr) {
|
|
g_string_append_printf (contents, "%s\t%s", ip6_addr, hostname);
|
|
if (short_hostname)
|
|
g_string_append_printf (contents, "\t%s", short_hostname);
|
|
g_string_append_printf (contents, "\t%s\n", ADDED_TAG);
|
|
}
|
|
|
|
g_string_append_printf (contents, "127.0.0.1\t%s\tlocalhost\n", fallback_hostname4);
|
|
g_string_append_printf (contents, "::1\t%s\tlocalhost6\n", fallback_hostname6);
|
|
}
|
|
|
|
g_free (short_hostname);
|
|
return contents;
|
|
}
|
|
|
|
gboolean
|
|
nm_policy_hosts_update_etc_hosts (const char *hostname,
|
|
const char *fallback_hostname4,
|
|
const char *fallback_hostname6,
|
|
const char *ip4_addr,
|
|
const char *ip6_addr,
|
|
gboolean *out_changed)
|
|
{
|
|
char *contents = NULL;
|
|
char **lines = NULL;
|
|
GError *error = NULL;
|
|
GString *new_contents = NULL;
|
|
gsize contents_len = 0;
|
|
gboolean success = FALSE;
|
|
|
|
g_return_val_if_fail (hostname != NULL, FALSE);
|
|
g_return_val_if_fail (out_changed != NULL, FALSE);
|
|
|
|
if (!g_file_get_contents (SYSCONFDIR "/hosts", &contents, &contents_len, &error)) {
|
|
nm_log_warn (LOGD_DNS, "couldn't read " SYSCONFDIR "/hosts: (%d) %s",
|
|
error ? error->code : 0,
|
|
(error && error->message) ? error->message : "(unknown)");
|
|
g_clear_error (&error);
|
|
return FALSE;
|
|
}
|
|
|
|
/* Get the new /etc/hosts contents */
|
|
lines = g_strsplit_set (contents, "\n\r", 0);
|
|
new_contents = nm_policy_get_etc_hosts ((const char **) lines,
|
|
contents_len,
|
|
hostname,
|
|
fallback_hostname4,
|
|
fallback_hostname6,
|
|
ip4_addr,
|
|
ip6_addr,
|
|
&error);
|
|
g_strfreev (lines);
|
|
g_free (contents);
|
|
|
|
if (new_contents) {
|
|
nm_log_info (LOGD_DNS, "Updating /etc/hosts with new system hostname");
|
|
|
|
g_clear_error (&error);
|
|
/* And actually update /etc/hosts */
|
|
if (!g_file_set_contents (SYSCONFDIR "/hosts", new_contents->str, -1, &error)) {
|
|
nm_log_warn (LOGD_DNS, "couldn't update " SYSCONFDIR "/hosts: (%d) %s",
|
|
error ? error->code : 0,
|
|
(error && error->message) ? error->message : "(unknown)");
|
|
g_clear_error (&error);
|
|
} else {
|
|
success = TRUE;
|
|
*out_changed = TRUE;
|
|
}
|
|
|
|
g_string_free (new_contents, TRUE);
|
|
} else if (!error) {
|
|
/* No change required */
|
|
success = TRUE;
|
|
} else {
|
|
nm_log_warn (LOGD_DNS, "couldn't read " SYSCONFDIR "/hosts: (%d) %s",
|
|
error->code, error->message ? error->message : "(unknown)");
|
|
g_clear_error (&error);
|
|
}
|
|
|
|
return success;
|
|
}
|
|
|