mirror of
https://github.com/systemd/systemd-stable.git
synced 2024-12-22 13:33:56 +03:00
resolved: add a DNS client stub resolver
Let's turn resolved into a something truly useful: a fully asynchronous DNS stub resolver that subscribes to network changes. (More to come: caching, LLMNR, mDNS/DNS-SD, DNSSEC, IDN, NSS module)
This commit is contained in:
parent
337ede5693
commit
74b2466e14
1
.gitignore
vendored
1
.gitignore
vendored
@ -157,6 +157,7 @@
|
||||
/test-dhcp-option
|
||||
/test-dhcp-server
|
||||
/test-dhcp6-client
|
||||
/test-dns-domain
|
||||
/test-icmp6-rs
|
||||
/test-ellipsize
|
||||
/test-engine
|
||||
|
36
Makefile.am
36
Makefile.am
@ -4536,11 +4536,22 @@ if ENABLE_RESOLVED
|
||||
systemd_resolved_SOURCES = \
|
||||
src/resolve/resolved.h \
|
||||
src/resolve/resolved.c \
|
||||
src/resolve/resolved-manager.c
|
||||
|
||||
systemd_resolved_CFLAGS = \
|
||||
$(AM_CFLAGS) \
|
||||
$(KMOD_CFLAGS)
|
||||
src/resolve/resolved-manager.c \
|
||||
src/resolve/resolved-bus.c \
|
||||
src/resolve/resolved-link.h \
|
||||
src/resolve/resolved-link.c \
|
||||
src/resolve/resolved-dns-domain.h \
|
||||
src/resolve/resolved-dns-domain.c \
|
||||
src/resolve/resolved-dns-packet.h \
|
||||
src/resolve/resolved-dns-packet.c \
|
||||
src/resolve/resolved-dns-query.h \
|
||||
src/resolve/resolved-dns-query.c \
|
||||
src/resolve/resolved-dns-scope.h \
|
||||
src/resolve/resolved-dns-scope.c \
|
||||
src/resolve/resolved-dns-server.h \
|
||||
src/resolve/resolved-dns-server.c \
|
||||
src/resolve/resolved-dns-rr.h \
|
||||
src/resolve/resolved-dns-rr.c
|
||||
|
||||
nodist_systemd_resolved_SOURCES = \
|
||||
src/resolve/resolved-gperf.c
|
||||
@ -4579,6 +4590,21 @@ EXTRA_DIST += \
|
||||
CLEANFILES += \
|
||||
src/resolve/resolved.conf
|
||||
|
||||
tests += \
|
||||
test-dns-domain
|
||||
|
||||
test_dns_domain_SOURCES = \
|
||||
src/resolve/resolved-dns-domain.h \
|
||||
src/resolve/resolved-dns-domain.c \
|
||||
src/resolve/test-dns-domain.c
|
||||
|
||||
test_dns_domain_LDADD = \
|
||||
libsystemd-capability.la \
|
||||
libsystemd-network.la \
|
||||
libsystemd-label.la \
|
||||
libsystemd-internal.la \
|
||||
libsystemd-shared.la
|
||||
|
||||
endif
|
||||
|
||||
# ------------------------------------------------------------------------------
|
||||
|
468
src/resolve/resolved-bus.c
Normal file
468
src/resolve/resolved-bus.c
Normal file
@ -0,0 +1,468 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "bus-errors.h"
|
||||
#include "bus-util.h"
|
||||
|
||||
#include "resolved.h"
|
||||
#include "resolved-dns-domain.h"
|
||||
|
||||
static void bus_method_resolve_hostname_complete(DnsQuery *q) {
|
||||
int r;
|
||||
|
||||
assert(q);
|
||||
|
||||
switch(q->state) {
|
||||
|
||||
case DNS_QUERY_SKIPPED:
|
||||
r = sd_bus_reply_method_errorf(q->request, BUS_ERROR_NO_NAME_SERVERS, "Not appropriate name servers or networks found");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_TIMEOUT:
|
||||
r = sd_bus_reply_method_errorf(q->request, SD_BUS_ERROR_TIMEOUT, "Query timed out");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_ATTEMPTS_MAX:
|
||||
r = sd_bus_reply_method_errorf(q->request, SD_BUS_ERROR_TIMEOUT, "All attempts to contact name servers or networks failed");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_FAILURE: {
|
||||
_cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
|
||||
|
||||
if (q->rcode == DNS_RCODE_NXDOMAIN)
|
||||
sd_bus_error_setf(&error, _BUS_ERROR_DNS "NXDOMAIN", "Hostname %s does not exist", q->request_hostname);
|
||||
else {
|
||||
const char *rc, *n;
|
||||
char p[DECIMAL_STR_MAX(q->rcode)];
|
||||
|
||||
rc = dns_rcode_to_string(q->rcode);
|
||||
if (!rc) {
|
||||
sprintf(p, "%i", q->rcode);
|
||||
rc = p;
|
||||
}
|
||||
|
||||
n = strappenda(_BUS_ERROR_DNS, rc);
|
||||
|
||||
sd_bus_error_setf(&error, n, "Could not resolve hostname %s, server or network returned error %s", q->request_hostname, rc);
|
||||
}
|
||||
|
||||
r = sd_bus_reply_method_error(q->request, &error);
|
||||
break;
|
||||
}
|
||||
|
||||
case DNS_QUERY_SUCCESS: {
|
||||
_cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
|
||||
unsigned i, n, added = 0;
|
||||
|
||||
assert(q->packet);
|
||||
|
||||
r = dns_packet_skip_question(q->packet);
|
||||
if (r < 0)
|
||||
goto parse_fail;
|
||||
|
||||
r = sd_bus_message_new_method_return(q->request, &reply);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_message_open_container(reply, 'a', "(yayi)");
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
n = be16toh(DNS_PACKET_HEADER(q->packet)->ancount) +
|
||||
be16toh(DNS_PACKET_HEADER(q->packet)->nscount) +
|
||||
be16toh(DNS_PACKET_HEADER(q->packet)->arcount);
|
||||
|
||||
for (i = 0; i < n; i++) {
|
||||
_cleanup_(dns_resource_record_unrefp) DnsResourceRecord *rr = NULL;
|
||||
|
||||
r = dns_packet_read_rr(q->packet, &rr, NULL);
|
||||
if (r < 0)
|
||||
goto parse_fail;
|
||||
|
||||
if (rr->key.class != DNS_CLASS_IN)
|
||||
continue;
|
||||
|
||||
if (!(q->request_family != AF_INET6 && rr->key.type == DNS_TYPE_A) &&
|
||||
!(q->request_family != AF_INET && rr->key.type == DNS_TYPE_AAAA))
|
||||
continue;
|
||||
|
||||
if (!dns_name_equal(rr->key.name, q->request_hostname))
|
||||
continue;
|
||||
|
||||
r = sd_bus_message_open_container(reply, 'r', "yayi");
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
if (rr->key.type == DNS_TYPE_A) {
|
||||
r = sd_bus_message_append(reply, "y", AF_INET);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_message_append_array(reply, 'y', &rr->a.in_addr, sizeof(struct in_addr));
|
||||
} else {
|
||||
r = sd_bus_message_append(reply, "y", AF_INET6);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_message_append_array(reply, 'y', &rr->aaaa.in6_addr, sizeof(struct in6_addr));
|
||||
}
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_message_append(reply, "i", q->packet->ifindex);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_message_close_container(reply);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
added ++;
|
||||
}
|
||||
|
||||
if (added <= 0)
|
||||
goto parse_fail;
|
||||
|
||||
r = sd_bus_message_close_container(reply);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_send(q->manager->bus, reply, NULL);
|
||||
break;
|
||||
}
|
||||
|
||||
parse_fail:
|
||||
case DNS_QUERY_INVALID_REPLY:
|
||||
r = sd_bus_reply_method_errorf(q->request, BUS_ERROR_INVALID_REPLY, "Received invalid reply");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_NULL:
|
||||
case DNS_QUERY_SENT:
|
||||
assert_not_reached("Unexpected query state");
|
||||
}
|
||||
|
||||
finish:
|
||||
if (r < 0)
|
||||
log_error("Failed to send bus reply: %s", strerror(-r));
|
||||
|
||||
dns_query_free(q);
|
||||
}
|
||||
|
||||
static int bus_method_resolve_hostname(sd_bus *bus, sd_bus_message *message, void *userdata, sd_bus_error *error) {
|
||||
Manager *m = userdata;
|
||||
const char *hostname;
|
||||
uint8_t family;
|
||||
DnsResourceKey keys[2];
|
||||
DnsQuery *q;
|
||||
unsigned n = 0;
|
||||
int r;
|
||||
|
||||
assert(bus);
|
||||
assert(message);
|
||||
assert(m);
|
||||
|
||||
r = sd_bus_message_read(message, "sy", &hostname, &family);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
if (!IN_SET(family, AF_INET, AF_INET6, AF_UNSPEC))
|
||||
return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown address family %u", family);
|
||||
|
||||
if (!hostname_is_valid(hostname))
|
||||
return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid hostname '%s'", hostname);
|
||||
|
||||
if (family != AF_INET6) {
|
||||
keys[n].class = DNS_CLASS_IN;
|
||||
keys[n].type = DNS_TYPE_A;
|
||||
keys[n].name = (char*) hostname;
|
||||
n++;
|
||||
}
|
||||
|
||||
if (family != AF_INET) {
|
||||
keys[n].class = DNS_CLASS_IN;
|
||||
keys[n].type = DNS_TYPE_AAAA;
|
||||
keys[n].name = (char*) hostname;
|
||||
n++;
|
||||
}
|
||||
|
||||
r = dns_query_new(m, &q, keys, n);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
q->request = sd_bus_message_ref(message);
|
||||
q->request_family = family;
|
||||
q->request_hostname = hostname;
|
||||
q->complete = bus_method_resolve_hostname_complete;
|
||||
|
||||
r = dns_query_start(q);
|
||||
if (r < 0) {
|
||||
dns_query_free(q);
|
||||
return r;
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static void bus_method_resolve_address_complete(DnsQuery *q) {
|
||||
_cleanup_free_ char *ip = NULL;
|
||||
int r;
|
||||
|
||||
assert(q);
|
||||
|
||||
in_addr_to_string(q->request_family, &q->request_address, &ip);
|
||||
|
||||
switch(q->state) {
|
||||
|
||||
case DNS_QUERY_SKIPPED:
|
||||
r = sd_bus_reply_method_errorf(q->request, BUS_ERROR_NO_NAME_SERVERS, "Not appropriate name servers or networks found");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_TIMEOUT:
|
||||
r = sd_bus_reply_method_errorf(q->request, SD_BUS_ERROR_TIMEOUT, "Query timed out");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_ATTEMPTS_MAX:
|
||||
r = sd_bus_reply_method_errorf(q->request, SD_BUS_ERROR_TIMEOUT, "All attempts to contact name servers or networks failed");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_FAILURE: {
|
||||
_cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
|
||||
|
||||
if (q->rcode == DNS_RCODE_NXDOMAIN)
|
||||
sd_bus_error_setf(&error, _BUS_ERROR_DNS "NXDOMAIN", "No hostname known for address %s ", ip);
|
||||
else {
|
||||
const char *rc, *n;
|
||||
char p[DECIMAL_STR_MAX(q->rcode)];
|
||||
|
||||
rc = dns_rcode_to_string(q->rcode);
|
||||
if (!rc) {
|
||||
sprintf(p, "%i", q->rcode);
|
||||
rc = p;
|
||||
}
|
||||
|
||||
n = strappenda(_BUS_ERROR_DNS, rc);
|
||||
|
||||
sd_bus_error_setf(&error, n, "Could not resolve address %s, server or network returned error %s", ip, rc);
|
||||
}
|
||||
|
||||
r = sd_bus_reply_method_error(q->request, &error);
|
||||
break;
|
||||
}
|
||||
|
||||
case DNS_QUERY_SUCCESS: {
|
||||
_cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
|
||||
unsigned i, n, added = 0;
|
||||
_cleanup_free_ char *reverse = NULL;
|
||||
|
||||
assert(q->packet);
|
||||
|
||||
r = dns_name_reverse(q->request_family, &q->request_address, &reverse);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = dns_packet_skip_question(q->packet);
|
||||
if (r < 0)
|
||||
goto parse_fail;
|
||||
|
||||
r = sd_bus_message_new_method_return(q->request, &reply);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_message_open_container(reply, 'a', "s");
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
n = be16toh(DNS_PACKET_HEADER(q->packet)->ancount) +
|
||||
be16toh(DNS_PACKET_HEADER(q->packet)->nscount) +
|
||||
be16toh(DNS_PACKET_HEADER(q->packet)->arcount);
|
||||
|
||||
for (i = 0; i < n; i++) {
|
||||
_cleanup_(dns_resource_record_unrefp) DnsResourceRecord *rr = NULL;
|
||||
|
||||
r = dns_packet_read_rr(q->packet, &rr, NULL);
|
||||
if (r < 0)
|
||||
goto parse_fail;
|
||||
|
||||
if (rr->key.class != DNS_CLASS_IN)
|
||||
continue;
|
||||
if (rr->key.type != DNS_TYPE_PTR)
|
||||
continue;
|
||||
if (!dns_name_equal(rr->key.name, reverse))
|
||||
continue;
|
||||
|
||||
r = sd_bus_message_append(reply, "s", rr->ptr.name);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
added ++;
|
||||
}
|
||||
|
||||
if (added <= 0)
|
||||
goto parse_fail;
|
||||
|
||||
r = sd_bus_message_close_container(reply);
|
||||
if (r < 0)
|
||||
goto finish;
|
||||
|
||||
r = sd_bus_send(q->manager->bus, reply, NULL);
|
||||
break;
|
||||
}
|
||||
|
||||
parse_fail:
|
||||
case DNS_QUERY_INVALID_REPLY:
|
||||
r = sd_bus_reply_method_errorf(q->request, BUS_ERROR_INVALID_REPLY, "Received invalid reply");
|
||||
break;
|
||||
|
||||
case DNS_QUERY_NULL:
|
||||
case DNS_QUERY_SENT:
|
||||
assert_not_reached("Unexpected query state");
|
||||
}
|
||||
|
||||
finish:
|
||||
if (r < 0)
|
||||
log_error("Failed to send bus reply: %s", strerror(-r));
|
||||
|
||||
dns_query_free(q);
|
||||
}
|
||||
|
||||
static int bus_method_resolve_address(sd_bus *bus, sd_bus_message *message, void *userdata, sd_bus_error *error) {
|
||||
_cleanup_(dns_resource_key_free) DnsResourceKey key = {};
|
||||
Manager *m = userdata;
|
||||
uint8_t family;
|
||||
const void *d;
|
||||
int ifindex;
|
||||
DnsQuery *q;
|
||||
size_t sz;
|
||||
int r;
|
||||
|
||||
assert(bus);
|
||||
assert(message);
|
||||
assert(m);
|
||||
|
||||
r = sd_bus_message_read(message, "y", &family);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
if (!IN_SET(family, AF_INET, AF_INET6))
|
||||
return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown address family %u", family);
|
||||
|
||||
r = sd_bus_message_read_array(message, 'y', &d, &sz);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
if ((family == AF_INET && sz != sizeof(struct in_addr)) ||
|
||||
(family == AF_INET6 && sz != sizeof(struct in6_addr)))
|
||||
return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid address size");
|
||||
|
||||
r = sd_bus_message_read(message, "i", &ifindex);
|
||||
if (r < 0)
|
||||
return r;
|
||||
if (ifindex < 0)
|
||||
return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid interface index");
|
||||
|
||||
key.class = DNS_CLASS_IN;
|
||||
key.type = DNS_TYPE_PTR;
|
||||
r = dns_name_reverse(family, d, &key.name);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = dns_query_new(m, &q, &key, 1);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
q->request = sd_bus_message_ref(message);
|
||||
q->request_family = family;
|
||||
memcpy(&q->request_address, d, sz);
|
||||
q->complete = bus_method_resolve_address_complete;
|
||||
|
||||
r = dns_query_start(q);
|
||||
if (r < 0) {
|
||||
dns_query_free(q);
|
||||
return r;
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static const sd_bus_vtable resolve_vtable[] = {
|
||||
SD_BUS_VTABLE_START(0),
|
||||
SD_BUS_METHOD("ResolveHostname", "sy", "a(yayi)", bus_method_resolve_hostname, SD_BUS_VTABLE_UNPRIVILEGED),
|
||||
SD_BUS_METHOD("ResolveAddress", "yayi", "as", bus_method_resolve_address, SD_BUS_VTABLE_UNPRIVILEGED),
|
||||
SD_BUS_VTABLE_END,
|
||||
};
|
||||
|
||||
static int on_bus_retry(sd_event_source *s, usec_t usec, void *userdata) {
|
||||
Manager *m = userdata;
|
||||
|
||||
assert(s);
|
||||
assert(m);
|
||||
|
||||
m->bus_retry_event_source = sd_event_source_unref(m->bus_retry_event_source);
|
||||
|
||||
manager_connect_bus(m);
|
||||
return 0;
|
||||
}
|
||||
|
||||
int manager_connect_bus(Manager *m) {
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
|
||||
if (m->bus)
|
||||
return 0;
|
||||
|
||||
r = sd_bus_default_system(&m->bus);
|
||||
if (r < 0) {
|
||||
/* We failed to connect? Yuck, we must be in early
|
||||
* boot. Let's try in 5s again. As soon as we have
|
||||
* kdbus we can stop doing this... */
|
||||
|
||||
log_debug("Failed to connect to bus, trying again in 5s: %s", strerror(-r));
|
||||
|
||||
r = sd_event_add_time(m->event, &m->bus_retry_event_source, CLOCK_MONOTONIC, now(CLOCK_MONOTONIC) + 5*USEC_PER_SEC, 0, on_bus_retry, m);
|
||||
if (r < 0) {
|
||||
log_error("Failed to install bus reconnect time event: %s", strerror(-r));
|
||||
return r;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/resolve1", "org.freedesktop.resolve1", resolve_vtable, m);
|
||||
if (r < 0) {
|
||||
log_error("Failed to register object: %s", strerror(-r));
|
||||
return r;
|
||||
}
|
||||
|
||||
r = sd_bus_request_name(m->bus, "org.freedesktop.resolve1", 0);
|
||||
if (r < 0) {
|
||||
log_error("Failed to register name: %s", strerror(-r));
|
||||
return r;
|
||||
}
|
||||
|
||||
r = sd_bus_attach_event(m->bus, m->event, 0);
|
||||
if (r < 0) {
|
||||
log_error("Failed to attach bus to event loop: %s", strerror(-r));
|
||||
return r;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
381
src/resolve/resolved-dns-domain.c
Normal file
381
src/resolve/resolved-dns-domain.c
Normal file
@ -0,0 +1,381 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "resolved-dns-domain.h"
|
||||
|
||||
int dns_label_unescape(const char **name, char *dest, size_t sz) {
|
||||
const char *n;
|
||||
char *d;
|
||||
int r = 0;
|
||||
|
||||
assert(name);
|
||||
assert(*name);
|
||||
assert(dest);
|
||||
|
||||
n = *name;
|
||||
d = dest;
|
||||
|
||||
for (;;) {
|
||||
if (*n == '.') {
|
||||
n++;
|
||||
break;
|
||||
}
|
||||
|
||||
if (*n == 0)
|
||||
break;
|
||||
|
||||
if (sz <= 0)
|
||||
return -ENOSPC;
|
||||
|
||||
if (*n == '\\') {
|
||||
/* Escaped character */
|
||||
|
||||
n++;
|
||||
|
||||
if (*n == 0)
|
||||
/* Ending NUL */
|
||||
return -EINVAL;
|
||||
|
||||
else if (*n == '\\' || *n == '.') {
|
||||
/* Escaped backslash or dot */
|
||||
*(d++) = *(n++);
|
||||
sz--;
|
||||
r++;
|
||||
|
||||
} else if (n[0] >= '0' && n[0] <= '9') {
|
||||
unsigned k;
|
||||
|
||||
/* Escaped literal ASCII character */
|
||||
|
||||
if (!(n[1] >= '0' && n[1] <= '9') ||
|
||||
!(n[2] >= '0' && n[2] <= '9'))
|
||||
return -EINVAL;
|
||||
|
||||
k = ((unsigned) (n[0] - '0') * 100) +
|
||||
((unsigned) (n[1] - '0') * 10) +
|
||||
((unsigned) (n[2] - '0'));
|
||||
|
||||
/* Don't allow CC characters or anything that doesn't fit in 8bit */
|
||||
if (k < ' ' || k > 255 || k == 127)
|
||||
return -EINVAL;
|
||||
|
||||
*(d++) = (char) k;
|
||||
sz--;
|
||||
r++;
|
||||
|
||||
n += 3;
|
||||
} else
|
||||
return -EINVAL;
|
||||
|
||||
} else if (*n >= ' ' && *n != 127) {
|
||||
|
||||
/* Normal character */
|
||||
*(d++) = *(n++);
|
||||
sz--;
|
||||
r++;
|
||||
} else
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
/* Empty label that is not at the end? */
|
||||
if (r == 0 && *n)
|
||||
return -EINVAL;
|
||||
|
||||
if (sz >= 1)
|
||||
*d = 0;
|
||||
|
||||
*name = n;
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_label_escape(const char *p, size_t l, char **ret) {
|
||||
_cleanup_free_ char *s = NULL;
|
||||
char *q;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(ret);
|
||||
|
||||
s = malloc(l * 4 + 1);
|
||||
if (!s)
|
||||
return -ENOMEM;
|
||||
|
||||
q = s;
|
||||
while (l > 0) {
|
||||
|
||||
if (*p == '.' || *p == '\\') {
|
||||
|
||||
/* Dot or backslash */
|
||||
*(q++) = '\\';
|
||||
*(q++) = *p;
|
||||
|
||||
} else if (*p == '_' ||
|
||||
*p == '-' ||
|
||||
(*p >= '0' && *p <= '9') ||
|
||||
(*p >= 'a' && *p <= 'z') ||
|
||||
(*p >= 'A' && *p <= 'Z')) {
|
||||
|
||||
/* Proper character */
|
||||
*(q++) = *p;
|
||||
} else if (*p >= ' ' && *p != 127) {
|
||||
|
||||
/* Everything else */
|
||||
*(q++) = '\\';
|
||||
*(q++) = '0' + (char) ((unsigned) *p / 100);
|
||||
*(q++) = '0' + (char) (((unsigned) *p / 10) % 10);
|
||||
*(q++) = '0' + (char) ((unsigned) *p % 10);
|
||||
|
||||
} else
|
||||
return -EINVAL;
|
||||
|
||||
p++;
|
||||
l--;
|
||||
}
|
||||
|
||||
*q = 0;
|
||||
*ret = s;
|
||||
r = q - s;
|
||||
s = NULL;
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_name_normalize(const char *s, char **_ret) {
|
||||
_cleanup_free_ char *ret = NULL;
|
||||
size_t n = 0, allocated = 0;
|
||||
const char *p = s;
|
||||
bool first = true;
|
||||
int r;
|
||||
|
||||
assert(s);
|
||||
assert(_ret);
|
||||
|
||||
for (;;) {
|
||||
_cleanup_free_ char *t = NULL;
|
||||
char label[DNS_LABEL_MAX];
|
||||
|
||||
r = dns_label_unescape(&p, label, sizeof(label));
|
||||
if (r < 0)
|
||||
return r;
|
||||
if (r == 0) {
|
||||
if (*p != 0)
|
||||
return -EINVAL;
|
||||
break;
|
||||
}
|
||||
|
||||
r = dns_label_escape(label, r, &t);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
if (!GREEDY_REALLOC(ret, allocated, n + !first + strlen(t) + 1))
|
||||
return -ENOMEM;
|
||||
|
||||
if (!first)
|
||||
ret[n++] = '.';
|
||||
else
|
||||
first = false;
|
||||
|
||||
memcpy(ret + n, t, r);
|
||||
n += r;
|
||||
}
|
||||
|
||||
if (!GREEDY_REALLOC(ret, allocated, n + 1))
|
||||
return -ENOMEM;
|
||||
|
||||
ret[n] = 0;
|
||||
*_ret = ret;
|
||||
ret = NULL;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
unsigned long dns_name_hash_func(const void *s, const uint8_t hash_key[HASH_KEY_SIZE]) {
|
||||
const char *p = s;
|
||||
unsigned long ul = 0;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
while (*p) {
|
||||
char label[DNS_LABEL_MAX+1];
|
||||
|
||||
r = dns_label_unescape(&p, label, sizeof(label));
|
||||
if (r < 0)
|
||||
break;
|
||||
|
||||
label[r] = 0;
|
||||
ascii_strlower(label);
|
||||
|
||||
ul = hash_key[0] * ul + ul + string_hash_func(label, hash_key);
|
||||
}
|
||||
|
||||
return ul;
|
||||
}
|
||||
|
||||
int dns_name_compare_func(const void *a, const void *b) {
|
||||
const char *x = a, *y = b;
|
||||
int r, q;
|
||||
|
||||
assert(a);
|
||||
assert(b);
|
||||
|
||||
for (;;) {
|
||||
char la[DNS_LABEL_MAX+1], lb[DNS_LABEL_MAX+1];
|
||||
|
||||
if (*x == 0 && *y == 0)
|
||||
return 0;
|
||||
|
||||
r = dns_label_unescape(&x, la, sizeof(la));
|
||||
q = dns_label_unescape(&y, lb, sizeof(lb));
|
||||
if (r < 0 || q < 0)
|
||||
return r - q;
|
||||
|
||||
la[r] = lb[q] = 0;
|
||||
r = strcasecmp(la, lb);
|
||||
if (r != 0)
|
||||
return r;
|
||||
}
|
||||
}
|
||||
|
||||
int dns_name_equal(const char *x, const char *y) {
|
||||
int r, q;
|
||||
|
||||
assert(x);
|
||||
assert(y);
|
||||
|
||||
for (;;) {
|
||||
char la[DNS_LABEL_MAX+1], lb[DNS_LABEL_MAX+1];
|
||||
|
||||
if (*x == 0 && *y == 0)
|
||||
return true;
|
||||
|
||||
r = dns_label_unescape(&x, la, sizeof(la));
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
q = dns_label_unescape(&y, lb, sizeof(lb));
|
||||
if (q < 0)
|
||||
return q;
|
||||
|
||||
la[r] = lb[q] = 0;
|
||||
if (strcasecmp(la, lb))
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
int dns_name_endswith(const char *name, const char *suffix) {
|
||||
const char *n, *s, *saved_n = NULL;
|
||||
int r, q;
|
||||
|
||||
assert(name);
|
||||
assert(suffix);
|
||||
|
||||
n = name;
|
||||
s = suffix;
|
||||
|
||||
for (;;) {
|
||||
char ln[DNS_LABEL_MAX+1], ls[DNS_LABEL_MAX+1];
|
||||
|
||||
r = dns_label_unescape(&n, ln, sizeof(ln));
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
if (!saved_n)
|
||||
saved_n = n;
|
||||
|
||||
q = dns_label_unescape(&s, ls, sizeof(ls));
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
if (r == 0 && q == 0)
|
||||
return true;
|
||||
if (r == 0 && saved_n == n)
|
||||
return false;
|
||||
|
||||
ln[r] = ls[q] = 0;
|
||||
|
||||
if (r != q || strcasecmp(ln, ls)) {
|
||||
|
||||
/* Not the same, let's jump back, and try with the next label again */
|
||||
s = suffix;
|
||||
n = saved_n;
|
||||
saved_n = NULL;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
int dns_name_reverse(int family, const union in_addr_union *a, char **ret) {
|
||||
const uint8_t *p;
|
||||
int r;
|
||||
|
||||
assert(a);
|
||||
assert(ret);
|
||||
|
||||
p = (const uint8_t*) a;
|
||||
|
||||
if (family == AF_INET)
|
||||
r = asprintf(ret, "%u.%u.%u.%u.in-addr.arpa", p[3], p[2], p[1], p[0]);
|
||||
else if (family == AF_INET6)
|
||||
r = asprintf(ret, "%c.%c.%c.%c.%c.%c.%c.%c.%c.%c.%c.%c.%c.%c.%c.%c.ip6.arpa",
|
||||
hexchar(p[15]), hexchar(p[14]), hexchar(p[13]), hexchar(p[12]),
|
||||
hexchar(p[11]), hexchar(p[10]), hexchar(p[ 9]), hexchar(p[ 8]),
|
||||
hexchar(p[ 7]), hexchar(p[ 6]), hexchar(p[ 5]), hexchar(p[ 4]),
|
||||
hexchar(p[ 3]), hexchar(p[ 2]), hexchar(p[ 1]), hexchar(p[ 0]));
|
||||
else
|
||||
return -EAFNOSUPPORT;
|
||||
if (r < 0)
|
||||
return -ENOMEM;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_name_root(const char *name) {
|
||||
char label[DNS_LABEL_MAX+1];
|
||||
int r;
|
||||
|
||||
assert(name);
|
||||
|
||||
r = dns_label_unescape(&name, label, sizeof(label));
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return r == 0 && *name == 0;
|
||||
}
|
||||
|
||||
int dns_name_single_label(const char *name) {
|
||||
char label[DNS_LABEL_MAX+1];
|
||||
int r;
|
||||
|
||||
assert(name);
|
||||
|
||||
r = dns_label_unescape(&name, label, sizeof(label));
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
if (r == 0)
|
||||
return 0;
|
||||
|
||||
r = dns_label_unescape(&name, label, sizeof(label));
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return r == 0 && *name == 0;
|
||||
}
|
43
src/resolve/resolved-dns-domain.h
Normal file
43
src/resolve/resolved-dns-domain.h
Normal file
@ -0,0 +1,43 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include <sys/types.h>
|
||||
|
||||
#include "hashmap.h"
|
||||
#include "in-addr-util.h"
|
||||
|
||||
#define DNS_LABEL_MAX 63
|
||||
|
||||
int dns_label_unescape(const char **name, char *dest, size_t sz);
|
||||
int dns_label_escape(const char *p, size_t l, char **ret);
|
||||
|
||||
int dns_name_normalize(const char *s, char **_ret);
|
||||
|
||||
unsigned long dns_name_hash_func(const void *s, const uint8_t hash_key[HASH_KEY_SIZE]);
|
||||
int dns_name_compare_func(const void *a, const void *b);
|
||||
|
||||
int dns_name_equal(const char *x, const char *y);
|
||||
int dns_name_endswith(const char *name, const char *suffix);
|
||||
|
||||
int dns_name_reverse(int family, const union in_addr_union *a, char **ret);
|
||||
|
||||
int dns_name_root(const char *name);
|
||||
int dns_name_single_label(const char *name);
|
734
src/resolve/resolved-dns-packet.c
Normal file
734
src/resolve/resolved-dns-packet.c
Normal file
@ -0,0 +1,734 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "utf8.h"
|
||||
|
||||
#include "resolved-dns-domain.h"
|
||||
#include "resolved-dns-packet.h"
|
||||
|
||||
int dns_packet_new(DnsPacket **ret, size_t mtu) {
|
||||
DnsPacket *p;
|
||||
size_t a;
|
||||
|
||||
assert(ret);
|
||||
|
||||
if (mtu <= 0)
|
||||
a = DNS_PACKET_SIZE_START;
|
||||
else
|
||||
a = mtu;
|
||||
|
||||
if (a < DNS_PACKET_HEADER_SIZE)
|
||||
a = DNS_PACKET_HEADER_SIZE;
|
||||
|
||||
p = malloc0(ALIGN(sizeof(DnsPacket)) + a);
|
||||
if (!p)
|
||||
return -ENOMEM;
|
||||
|
||||
p->size = p->rindex = DNS_PACKET_HEADER_SIZE;
|
||||
p->allocated = a;
|
||||
p->n_ref = 1;
|
||||
|
||||
*ret = p;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_new_query(DnsPacket **ret, size_t mtu) {
|
||||
DnsPacket *p;
|
||||
DnsPacketHeader *h;
|
||||
int r;
|
||||
|
||||
assert(ret);
|
||||
|
||||
r = dns_packet_new(&p, mtu);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
h = DNS_PACKET_HEADER(p);
|
||||
h->flags = htobe16(DNS_PACKET_MAKE_FLAGS(0, 0, 0, 0, 1, 0, 0, 0, 0));
|
||||
|
||||
*ret = p;
|
||||
return 0;
|
||||
}
|
||||
|
||||
DnsPacket *dns_packet_ref(DnsPacket *p) {
|
||||
|
||||
if (!p)
|
||||
return NULL;
|
||||
|
||||
assert(p->n_ref > 0);
|
||||
p->n_ref++;
|
||||
return p;
|
||||
}
|
||||
|
||||
static void dns_packet_free(DnsPacket *p) {
|
||||
char *s;
|
||||
|
||||
assert(p);
|
||||
|
||||
while ((s = hashmap_steal_first_key(p->names)))
|
||||
free(s);
|
||||
hashmap_free(p->names);
|
||||
|
||||
free(p->data);
|
||||
free(p);
|
||||
}
|
||||
|
||||
DnsPacket *dns_packet_unref(DnsPacket *p) {
|
||||
if (!p)
|
||||
return NULL;
|
||||
|
||||
assert(p->n_ref > 0);
|
||||
|
||||
if (p->n_ref == 1)
|
||||
dns_packet_free(p);
|
||||
else
|
||||
p->n_ref--;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int dns_packet_validate(DnsPacket *p) {
|
||||
assert(p);
|
||||
|
||||
if (p->size < DNS_PACKET_HEADER_SIZE)
|
||||
return -EBADMSG;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_validate_reply(DnsPacket *p) {
|
||||
DnsPacketHeader *h;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
r = dns_packet_validate(p);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
h = DNS_PACKET_HEADER(p);
|
||||
|
||||
/* Check QR field */
|
||||
if ((be16toh(h->flags) & 1) == 0)
|
||||
return -EBADMSG;
|
||||
|
||||
/* Check opcode field */
|
||||
if (((be16toh(h->flags) >> 1) & 15) != 0)
|
||||
return -EBADMSG;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int dns_packet_extend(DnsPacket *p, size_t add, void **ret, size_t *start) {
|
||||
assert(p);
|
||||
|
||||
if (p->size + add > p->allocated)
|
||||
return -ENOMEM;
|
||||
|
||||
if (start)
|
||||
*start = p->size;
|
||||
|
||||
if (ret)
|
||||
*ret = (uint8_t*) DNS_PACKET_DATA(p) + p->size;
|
||||
|
||||
p->size += add;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void dns_packet_truncate(DnsPacket *p, size_t sz) {
|
||||
Iterator i;
|
||||
char *s;
|
||||
void *n;
|
||||
|
||||
assert(p);
|
||||
|
||||
if (p->size <= sz)
|
||||
return;
|
||||
|
||||
HASHMAP_FOREACH_KEY(s, n, p->names, i) {
|
||||
|
||||
if (PTR_TO_SIZE(n) < sz)
|
||||
continue;
|
||||
|
||||
hashmap_remove(p->names, s);
|
||||
free(s);
|
||||
}
|
||||
|
||||
p->size = sz;
|
||||
}
|
||||
|
||||
int dns_packet_append_uint8(DnsPacket *p, uint8_t v, size_t *start) {
|
||||
void *d;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
r = dns_packet_extend(p, sizeof(uint8_t), &d, start);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
((uint8_t*) d)[0] = v;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_append_uint16(DnsPacket *p, uint16_t v, size_t *start) {
|
||||
void *d;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
r = dns_packet_extend(p, sizeof(uint16_t), &d, start);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
((uint8_t*) d)[0] = (uint8_t) (v >> 8);
|
||||
((uint8_t*) d)[1] = (uint8_t) (v & 255);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_append_string(DnsPacket *p, const char *s, size_t *start) {
|
||||
void *d;
|
||||
size_t l;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(s);
|
||||
|
||||
l = strlen(s);
|
||||
if (l > 255)
|
||||
return -E2BIG;
|
||||
|
||||
r = dns_packet_extend(p, 1 + l, &d, start);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
((uint8_t*) d)[0] = (uint8_t) l;
|
||||
memcpy(((uint8_t*) d) + 1, s, l);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_append_label(DnsPacket *p, const char *d, size_t l, size_t *start) {
|
||||
void *w;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(d);
|
||||
|
||||
if (l > DNS_LABEL_MAX)
|
||||
return -E2BIG;
|
||||
|
||||
r = dns_packet_extend(p, 1 + l, &w, start);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
((uint8_t*) w)[0] = (uint8_t) l;
|
||||
memcpy(((uint8_t*) w) + 1, d, l);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_append_name(DnsPacket *p, const char *name, size_t *start) {
|
||||
size_t saved_size;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(name);
|
||||
|
||||
saved_size = p->size;
|
||||
|
||||
while (*name) {
|
||||
_cleanup_free_ char *s = NULL;
|
||||
char label[DNS_LABEL_MAX];
|
||||
size_t n;
|
||||
|
||||
n = PTR_TO_SIZE(hashmap_get(p->names, name));
|
||||
if (n > 0) {
|
||||
assert(n < p->size);
|
||||
|
||||
if (n < 0x4000) {
|
||||
r = dns_packet_append_uint16(p, 0xC000 | n, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
goto done;
|
||||
}
|
||||
}
|
||||
|
||||
s = strdup(name);
|
||||
if (!s) {
|
||||
r = -ENOMEM;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
r = dns_label_unescape(&name, label, sizeof(label));
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_append_label(p, label, r, &n);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = hashmap_ensure_allocated(&p->names, dns_name_hash_func, dns_name_compare_func);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = hashmap_put(p->names, s, SIZE_TO_PTR(n));
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
s = NULL;
|
||||
}
|
||||
|
||||
r = dns_packet_append_uint8(p, 0, NULL);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
done:
|
||||
if (start)
|
||||
*start = saved_size;
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
dns_packet_truncate(p, saved_size);
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_packet_append_key(DnsPacket *p, const DnsResourceKey *k, size_t *start) {
|
||||
size_t saved_size;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(k);
|
||||
|
||||
saved_size = p->size;
|
||||
|
||||
r = dns_packet_append_name(p, k->name, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_append_uint16(p, k->type, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_append_uint16(p, k->class, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
if (start)
|
||||
*start = saved_size;
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
dns_packet_truncate(p, saved_size);
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_packet_read(DnsPacket *p, size_t sz, const void **ret, size_t *start) {
|
||||
assert(p);
|
||||
|
||||
if (p->rindex + sz > p->size)
|
||||
return -EMSGSIZE;
|
||||
|
||||
if (ret)
|
||||
*ret = (uint8_t*) DNS_PACKET_DATA(p) + p->rindex;
|
||||
|
||||
if (start)
|
||||
*start = p->rindex;
|
||||
|
||||
p->rindex += sz;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void dns_packet_rewind(DnsPacket *p, size_t idx) {
|
||||
assert(p);
|
||||
assert(idx <= p->size);
|
||||
assert(idx >= DNS_PACKET_HEADER_SIZE);
|
||||
|
||||
p->rindex = idx;
|
||||
}
|
||||
|
||||
int dns_packet_read_uint8(DnsPacket *p, uint8_t *ret, size_t *start) {
|
||||
const void *d;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
r = dns_packet_read(p, sizeof(uint8_t), &d, start);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
*ret = ((uint8_t*) d)[0];
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_read_uint16(DnsPacket *p, uint16_t *ret, size_t *start) {
|
||||
const void *d;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
r = dns_packet_read(p, sizeof(uint16_t), &d, start);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
*ret = (((uint16_t) ((uint8_t*) d)[0]) << 8) |
|
||||
((uint16_t) ((uint8_t*) d)[1]);
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_read_uint32(DnsPacket *p, uint32_t *ret, size_t *start) {
|
||||
const void *d;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
r = dns_packet_read(p, sizeof(uint32_t), &d, start);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
*ret = (((uint32_t) ((uint8_t*) d)[0]) << 24) |
|
||||
(((uint32_t) ((uint8_t*) d)[1]) << 16) |
|
||||
(((uint32_t) ((uint8_t*) d)[2]) << 8) |
|
||||
((uint32_t) ((uint8_t*) d)[3]);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_packet_read_string(DnsPacket *p, char **ret, size_t *start) {
|
||||
size_t saved_rindex;
|
||||
const void *d;
|
||||
char *t;
|
||||
uint8_t c;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
|
||||
saved_rindex = p->rindex;
|
||||
|
||||
r = dns_packet_read_uint8(p, &c, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_read(p, c, &d, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
if (memchr(d, 0, c)) {
|
||||
r = -EBADMSG;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
t = strndup(d, c);
|
||||
if (!t) {
|
||||
r = -ENOMEM;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
if (!utf8_is_valid(t)) {
|
||||
free(t);
|
||||
r = -EBADMSG;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
*ret = t;
|
||||
|
||||
if (start)
|
||||
*start = saved_rindex;
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
dns_packet_rewind(p, saved_rindex);
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_packet_read_name(DnsPacket *p, char **_ret, size_t *start) {
|
||||
size_t saved_rindex, after_rindex = 0;
|
||||
_cleanup_free_ char *ret = NULL;
|
||||
size_t n = 0, allocated = 0;
|
||||
bool first = true;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(_ret);
|
||||
|
||||
saved_rindex = p->rindex;
|
||||
|
||||
for (;;) {
|
||||
uint8_t c, d;
|
||||
|
||||
r = dns_packet_read_uint8(p, &c, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
if (c == 0)
|
||||
/* End of name */
|
||||
break;
|
||||
else if (c <= 63) {
|
||||
_cleanup_free_ char *t = NULL;
|
||||
const char *label;
|
||||
|
||||
/* Literal label */
|
||||
r = dns_packet_read(p, c, (const void**) &label, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_label_escape(label, c, &t);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
if (!GREEDY_REALLOC(ret, allocated, n + !first + strlen(t) + 1)) {
|
||||
r = -ENOMEM;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
if (!first)
|
||||
ret[n++] = '.';
|
||||
else
|
||||
first = false;
|
||||
|
||||
memcpy(ret + n, t, c);
|
||||
n += r;
|
||||
continue;
|
||||
} else if ((c & 0xc0) == 0xc0) {
|
||||
uint16_t ptr;
|
||||
|
||||
/* Pointer */
|
||||
r = dns_packet_read_uint8(p, &d, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
ptr = (uint16_t) (c & ~0xc0) << 8 | (uint16_t) d;
|
||||
if (ptr < DNS_PACKET_HEADER_SIZE || ptr >= saved_rindex) {
|
||||
r = -EBADMSG;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
if (after_rindex == 0)
|
||||
after_rindex = p->rindex;
|
||||
|
||||
p->rindex = ptr;
|
||||
} else
|
||||
goto fail;
|
||||
}
|
||||
|
||||
if (!GREEDY_REALLOC(ret, allocated, n + 1)) {
|
||||
r = -ENOMEM;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
ret[n] = 0;
|
||||
|
||||
if (after_rindex != 0)
|
||||
p->rindex= after_rindex;
|
||||
|
||||
*_ret = ret;
|
||||
ret = NULL;
|
||||
|
||||
if (start)
|
||||
*start = saved_rindex;
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
dns_packet_rewind(p, saved_rindex);
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_packet_read_key(DnsPacket *p, DnsResourceKey *ret, size_t *start) {
|
||||
_cleanup_(dns_resource_key_free) DnsResourceKey k = {};
|
||||
size_t saved_rindex;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(ret);
|
||||
|
||||
saved_rindex = p->rindex;
|
||||
|
||||
r = dns_packet_read_name(p, &k.name, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_read_uint16(p, &k.type, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_read_uint16(p, &k.class, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
*ret = k;
|
||||
zero(k);
|
||||
|
||||
if (start)
|
||||
*start = saved_rindex;
|
||||
|
||||
return 0;
|
||||
fail:
|
||||
dns_packet_rewind(p, saved_rindex);
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_packet_read_rr(DnsPacket *p, DnsResourceRecord **ret, size_t *start) {
|
||||
_cleanup_(dns_resource_record_unrefp) DnsResourceRecord *rr = NULL;
|
||||
size_t saved_rindex, offset;
|
||||
uint16_t rdlength;
|
||||
const void *d;
|
||||
int r;
|
||||
|
||||
assert(p);
|
||||
assert(ret);
|
||||
|
||||
saved_rindex = p->rindex;
|
||||
|
||||
rr = dns_resource_record_new();
|
||||
if (!rr)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_read_key(p, &rr->key, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_read_uint32(p, &rr->ttl, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_read_uint16(p, &rdlength, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
if (p->rindex + rdlength > p->size) {
|
||||
r = -EBADMSG;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
offset = p->rindex;
|
||||
|
||||
switch (rr->key.type) {
|
||||
|
||||
case DNS_TYPE_PTR:
|
||||
case DNS_TYPE_NS:
|
||||
case DNS_TYPE_CNAME:
|
||||
r = dns_packet_read_name(p, &rr->ptr.name, NULL);
|
||||
break;
|
||||
|
||||
case DNS_TYPE_HINFO:
|
||||
r = dns_packet_read_string(p, &rr->hinfo.cpu, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = dns_packet_read_string(p, &rr->hinfo.os, NULL);
|
||||
break;
|
||||
|
||||
case DNS_TYPE_A:
|
||||
r = dns_packet_read(p, sizeof(struct in_addr), &d, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
memcpy(&rr->a.in_addr, d, sizeof(struct in_addr));
|
||||
break;
|
||||
|
||||
case DNS_TYPE_AAAA:
|
||||
r = dns_packet_read(p, sizeof(struct in6_addr), &d, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
memcpy(&rr->aaaa.in6_addr, d, sizeof(struct in6_addr));
|
||||
break;
|
||||
|
||||
default:
|
||||
r = dns_packet_read(p, rdlength, &d, NULL);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
rr->generic.data = memdup(d, rdlength);
|
||||
if (!rr->generic.data) {
|
||||
r = -ENOMEM;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
rr->generic.size = rdlength;
|
||||
break;
|
||||
}
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
if (p->rindex != offset + rdlength) {
|
||||
r = -EBADMSG;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
*ret = rr;
|
||||
rr = NULL;
|
||||
|
||||
if (start)
|
||||
*start = saved_rindex;
|
||||
|
||||
return 0;
|
||||
fail:
|
||||
dns_packet_rewind(p, saved_rindex);
|
||||
return r;
|
||||
}
|
||||
|
||||
int dns_packet_skip_question(DnsPacket *p) {
|
||||
int r;
|
||||
|
||||
unsigned i, n;
|
||||
assert(p);
|
||||
|
||||
n = be16toh(DNS_PACKET_HEADER(p)->qdcount);
|
||||
for (i = 0; i < n; i++) {
|
||||
_cleanup_(dns_resource_key_free) DnsResourceKey key = {};
|
||||
|
||||
r = dns_packet_read_key(p, &key, NULL);
|
||||
if (r < 0)
|
||||
return r;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static const char* const dns_rcode_table[_DNS_RCODE_MAX_DEFINED] = {
|
||||
[DNS_RCODE_SUCCESS] = "SUCCESS",
|
||||
[DNS_RCODE_FORMERR] = "FORMERR",
|
||||
[DNS_RCODE_SERVFAIL] = "SERVFAIL",
|
||||
[DNS_RCODE_NXDOMAIN] = "NXDOMAIN",
|
||||
[DNS_RCODE_NOTIMP] = "NOTIMP",
|
||||
[DNS_RCODE_REFUSED] = "REFUSED",
|
||||
[DNS_RCODE_YXDOMAIN] = "YXDOMAIN",
|
||||
[DNS_RCODE_YXRRSET] = "YRRSET",
|
||||
[DNS_RCODE_NXRRSET] = "NXRRSET",
|
||||
[DNS_RCODE_NOTAUTH] = "NOTAUTH",
|
||||
[DNS_RCODE_NOTZONE] = "NOTZONE",
|
||||
[DNS_RCODE_BADVERS] = "BADVERS",
|
||||
[DNS_RCODE_BADKEY] = "BADKEY",
|
||||
[DNS_RCODE_BADTIME] = "BADTIME",
|
||||
[DNS_RCODE_BADMODE] = "BADMODE",
|
||||
[DNS_RCODE_BADNAME] = "BADNAME",
|
||||
[DNS_RCODE_BADALG] = "BADALG",
|
||||
[DNS_RCODE_BADTRUNC] = "BADTRUNC",
|
||||
};
|
||||
DEFINE_STRING_TABLE_LOOKUP(dns_rcode, int);
|
132
src/resolve/resolved-dns-packet.h
Normal file
132
src/resolve/resolved-dns-packet.h
Normal file
@ -0,0 +1,132 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
#pragma once
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
typedef struct DnsPacketHeader DnsPacketHeader;
|
||||
typedef struct DnsPacket DnsPacket;
|
||||
|
||||
#include <inttypes.h>
|
||||
|
||||
#include "macro.h"
|
||||
#include "sparse-endian.h"
|
||||
#include "hashmap.h"
|
||||
#include "resolved-dns-rr.h"
|
||||
|
||||
struct DnsPacketHeader {
|
||||
uint16_t id;
|
||||
be16_t flags;
|
||||
be16_t qdcount;
|
||||
be16_t ancount;
|
||||
be16_t nscount;
|
||||
be16_t arcount;
|
||||
};
|
||||
|
||||
#define DNS_PACKET_HEADER_SIZE sizeof(DnsPacketHeader)
|
||||
#define DNS_PACKET_SIZE_START 512
|
||||
|
||||
struct DnsPacket {
|
||||
int n_ref;
|
||||
size_t size, allocated, rindex;
|
||||
Hashmap *names; /* For name compression */
|
||||
void *data;
|
||||
int ifindex;
|
||||
};
|
||||
|
||||
static inline uint8_t* DNS_PACKET_DATA(DnsPacket *p) {
|
||||
if (_unlikely_(!p))
|
||||
return NULL;
|
||||
|
||||
if (p->data)
|
||||
return p->data;
|
||||
|
||||
return ((uint8_t*) p) + ALIGN(sizeof(DnsPacket));
|
||||
}
|
||||
|
||||
#define DNS_PACKET_HEADER(p) ((DnsPacketHeader*) DNS_PACKET_DATA(p))
|
||||
|
||||
int dns_packet_new(DnsPacket **p, size_t mtu);
|
||||
int dns_packet_new_query(DnsPacket **p, size_t mtu);
|
||||
|
||||
DnsPacket *dns_packet_ref(DnsPacket *p);
|
||||
DnsPacket *dns_packet_unref(DnsPacket *p);
|
||||
|
||||
DEFINE_TRIVIAL_CLEANUP_FUNC(DnsPacket*, dns_packet_unref);
|
||||
|
||||
int dns_packet_validate(DnsPacket *p);
|
||||
int dns_packet_validate_reply(DnsPacket *p);
|
||||
|
||||
int dns_packet_append_uint8(DnsPacket *p, uint8_t v, size_t *start);
|
||||
int dns_packet_append_uint16(DnsPacket *p, uint16_t v, size_t *start);
|
||||
int dns_packet_append_string(DnsPacket *p, const char *s, size_t *start);
|
||||
int dns_packet_append_label(DnsPacket *p, const char *s, size_t l, size_t *start);
|
||||
int dns_packet_append_name(DnsPacket *p, const char *name, size_t *start);
|
||||
int dns_packet_append_key(DnsPacket *p, const DnsResourceKey *k, size_t *start);
|
||||
|
||||
int dns_packet_read(DnsPacket *p, size_t sz, const void **ret, size_t *start);
|
||||
int dns_packet_read_uint8(DnsPacket *p, uint8_t *ret, size_t *start);
|
||||
int dns_packet_read_uint16(DnsPacket *p, uint16_t *ret, size_t *start);
|
||||
int dns_packet_read_uint32(DnsPacket *p, uint32_t *ret, size_t *start);
|
||||
int dns_packet_read_string(DnsPacket *p, char **ret, size_t *start);
|
||||
int dns_packet_read_name(DnsPacket *p, char **ret, size_t *start);
|
||||
int dns_packet_read_key(DnsPacket *p, DnsResourceKey *ret, size_t *start);
|
||||
int dns_packet_read_rr(DnsPacket *p, DnsResourceRecord **ret, size_t *start);
|
||||
|
||||
int dns_packet_skip_question(DnsPacket *p);
|
||||
|
||||
#define DNS_PACKET_MAKE_FLAGS(qr, opcode, aa, tc, rd, ra, ad, cd, rcode) \
|
||||
(((uint16_t) !!qr << 15) | \
|
||||
((uint16_t) (opcode & 15) << 11) | \
|
||||
((uint16_t) !!aa << 10) | \
|
||||
((uint16_t) !!tc << 9) | \
|
||||
((uint16_t) !!rd << 8) | \
|
||||
((uint16_t) !!ra << 7) | \
|
||||
((uint16_t) !!ad << 5) | \
|
||||
((uint16_t) !!cd << 4) | \
|
||||
((uint16_t) (rcode & 15)))
|
||||
|
||||
#define DNS_PACKET_RCODE(p) (be16toh(DNS_PACKET_HEADER(p)->flags) & 15)
|
||||
|
||||
enum {
|
||||
DNS_RCODE_SUCCESS = 0,
|
||||
DNS_RCODE_FORMERR = 1,
|
||||
DNS_RCODE_SERVFAIL = 2,
|
||||
DNS_RCODE_NXDOMAIN = 3,
|
||||
DNS_RCODE_NOTIMP = 4,
|
||||
DNS_RCODE_REFUSED = 5,
|
||||
DNS_RCODE_YXDOMAIN = 6,
|
||||
DNS_RCODE_YXRRSET = 7,
|
||||
DNS_RCODE_NXRRSET = 8,
|
||||
DNS_RCODE_NOTAUTH = 9,
|
||||
DNS_RCODE_NOTZONE = 10,
|
||||
DNS_RCODE_BADVERS = 16,
|
||||
DNS_RCODE_BADSIG = 16, /* duplicate value! */
|
||||
DNS_RCODE_BADKEY = 17,
|
||||
DNS_RCODE_BADTIME = 18,
|
||||
DNS_RCODE_BADMODE = 19,
|
||||
DNS_RCODE_BADNAME = 20,
|
||||
DNS_RCODE_BADALG = 21,
|
||||
DNS_RCODE_BADTRUNC = 22,
|
||||
_DNS_RCODE_MAX_DEFINED
|
||||
};
|
||||
|
||||
const char* dns_rcode_to_string(int i) _const_;
|
||||
int dns_rcode_from_string(const char *s) _pure_;
|
408
src/resolve/resolved-dns-query.c
Normal file
408
src/resolve/resolved-dns-query.c
Normal file
@ -0,0 +1,408 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "resolved-dns-query.h"
|
||||
#include "resolved-dns-domain.h"
|
||||
|
||||
#define TRANSACTION_TIMEOUT_USEC (5 * USEC_PER_SEC)
|
||||
#define QUERY_TIMEOUT_USEC (30 * USEC_PER_SEC)
|
||||
#define ATTEMPTS_MAX 8
|
||||
|
||||
DnsQueryTransaction* dns_query_transaction_free(DnsQueryTransaction *t) {
|
||||
if (!t)
|
||||
return NULL;
|
||||
|
||||
sd_event_source_unref(t->timeout_event_source);
|
||||
dns_packet_unref(t->packet);
|
||||
|
||||
if (t->query) {
|
||||
LIST_REMOVE(transactions_by_query, t->query->transactions, t);
|
||||
hashmap_remove(t->query->manager->dns_query_transactions, UINT_TO_PTR(t->id));
|
||||
}
|
||||
|
||||
if (t->scope)
|
||||
LIST_REMOVE(transactions_by_scope, t->scope->transactions, t);
|
||||
|
||||
free(t);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
DEFINE_TRIVIAL_CLEANUP_FUNC(DnsQueryTransaction*, dns_query_transaction_free);
|
||||
|
||||
static int dns_query_transaction_new(DnsQuery *q, DnsQueryTransaction **ret, DnsScope *s) {
|
||||
_cleanup_(dns_query_transaction_freep) DnsQueryTransaction *t = NULL;
|
||||
int r;
|
||||
|
||||
assert(q);
|
||||
assert(s);
|
||||
|
||||
r = hashmap_ensure_allocated(&q->manager->dns_query_transactions, NULL, NULL);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
t = new0(DnsQueryTransaction, 1);
|
||||
if (!t)
|
||||
return -ENOMEM;
|
||||
|
||||
do
|
||||
random_bytes(&t->id, sizeof(t->id));
|
||||
while (t->id == 0 ||
|
||||
hashmap_get(q->manager->dns_query_transactions, UINT_TO_PTR(t->id)));
|
||||
|
||||
r = hashmap_put(q->manager->dns_query_transactions, UINT_TO_PTR(t->id), t);
|
||||
if (r < 0) {
|
||||
t->id = 0;
|
||||
return r;
|
||||
}
|
||||
|
||||
LIST_PREPEND(transactions_by_query, q->transactions, t);
|
||||
t->query = q;
|
||||
|
||||
LIST_PREPEND(transactions_by_scope, s->transactions, t);
|
||||
t->scope = s;
|
||||
|
||||
if (ret)
|
||||
*ret = t;
|
||||
|
||||
t = NULL;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void dns_query_transaction_set_state(DnsQueryTransaction *t, DnsQueryState state) {
|
||||
assert(t);
|
||||
|
||||
if (t->state == state)
|
||||
return;
|
||||
|
||||
t->state = state;
|
||||
|
||||
if (state != DNS_QUERY_SENT)
|
||||
t->timeout_event_source = sd_event_source_unref(t->timeout_event_source);
|
||||
|
||||
dns_query_finish(t->query);
|
||||
}
|
||||
|
||||
int dns_query_transaction_reply(DnsQueryTransaction *t, DnsPacket *p) {
|
||||
assert(t);
|
||||
assert(p);
|
||||
|
||||
t->packet = dns_packet_ref(p);
|
||||
|
||||
if (DNS_PACKET_RCODE(p) == DNS_RCODE_SUCCESS) {
|
||||
if( be16toh(DNS_PACKET_HEADER(p)->ancount) > 0)
|
||||
dns_query_transaction_set_state(t, DNS_QUERY_SUCCESS);
|
||||
else
|
||||
dns_query_transaction_set_state(t, DNS_QUERY_INVALID_REPLY);
|
||||
} else
|
||||
dns_query_transaction_set_state(t, DNS_QUERY_FAILURE);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int on_transaction_timeout(sd_event_source *s, usec_t usec, void *userdata) {
|
||||
DnsQueryTransaction *t = userdata;
|
||||
int r;
|
||||
|
||||
assert(s);
|
||||
assert(t);
|
||||
|
||||
/* Timeout reached? Try again, with a new server */
|
||||
dns_scope_next_dns_server(t->scope);
|
||||
|
||||
r = dns_query_transaction_start(t);
|
||||
if (r < 0)
|
||||
dns_query_transaction_set_state(t, DNS_QUERY_FAILURE);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_query_transaction_start(DnsQueryTransaction *t) {
|
||||
_cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
|
||||
unsigned n;
|
||||
int r;
|
||||
|
||||
assert(t);
|
||||
|
||||
t->timeout_event_source = sd_event_source_unref(t->timeout_event_source);
|
||||
|
||||
if (t->n_attempts >= ATTEMPTS_MAX) {
|
||||
dns_query_transaction_set_state(t, DNS_QUERY_ATTEMPTS_MAX);
|
||||
return 0;
|
||||
}
|
||||
|
||||
t->n_attempts++;
|
||||
|
||||
r = dns_packet_new_query(&p, 0);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
for (n = 0; n < t->query->n_keys; n++) {
|
||||
r = dns_packet_append_key(p, &t->query->keys[n], NULL);
|
||||
if (r < 0)
|
||||
return r;
|
||||
}
|
||||
|
||||
DNS_PACKET_HEADER(p)->qdcount = htobe16(t->query->n_keys);
|
||||
DNS_PACKET_HEADER(p)->id = t->id;
|
||||
|
||||
r = dns_scope_send(t->scope, p);
|
||||
if (r < 0) {
|
||||
/* Couldn't send? Try immediately again, with a new server */
|
||||
dns_scope_next_dns_server(t->scope);
|
||||
|
||||
return dns_query_transaction_start(t);
|
||||
}
|
||||
|
||||
if (r > 0) {
|
||||
int q;
|
||||
|
||||
q = sd_event_add_time(t->query->manager->event, &t->timeout_event_source, CLOCK_MONOTONIC, now(CLOCK_MONOTONIC) + TRANSACTION_TIMEOUT_USEC, 0, on_transaction_timeout, t);
|
||||
if (q < 0)
|
||||
return q;
|
||||
|
||||
dns_query_transaction_set_state(t, DNS_QUERY_SENT);
|
||||
} else
|
||||
dns_query_transaction_set_state(t, DNS_QUERY_SKIPPED);
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
DnsQuery *dns_query_free(DnsQuery *q) {
|
||||
unsigned n;
|
||||
|
||||
if (!q)
|
||||
return NULL;
|
||||
|
||||
sd_bus_message_unref(q->request);
|
||||
dns_packet_unref(q->packet);
|
||||
sd_event_source_unref(q->timeout_event_source);
|
||||
|
||||
while (q->transactions)
|
||||
dns_query_transaction_free(q->transactions);
|
||||
|
||||
if (q->manager)
|
||||
LIST_REMOVE(queries, q->manager->dns_queries, q);
|
||||
|
||||
for (n = 0; n < q->n_keys; n++)
|
||||
free(q->keys[n].name);
|
||||
free(q->keys);
|
||||
free(q);
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int dns_query_new(Manager *m, DnsQuery **ret, DnsResourceKey *keys, unsigned n_keys) {
|
||||
_cleanup_(dns_query_freep) DnsQuery *q = NULL;
|
||||
DnsScope *s, *first = NULL;
|
||||
DnsScopeMatch found = DNS_SCOPE_NO;
|
||||
const char *name = NULL;
|
||||
int n, r;
|
||||
|
||||
assert(m);
|
||||
|
||||
if (n_keys <= 0 || n_keys >= 65535)
|
||||
return -EINVAL;
|
||||
|
||||
assert(keys);
|
||||
|
||||
q = new0(DnsQuery, 1);
|
||||
if (!q)
|
||||
return -ENOMEM;
|
||||
|
||||
q->keys = new(DnsResourceKey, n_keys);
|
||||
if (!q->keys)
|
||||
return -ENOMEM;
|
||||
|
||||
for (q->n_keys = 0; q->n_keys < n_keys; q->n_keys++) {
|
||||
q->keys[q->n_keys].class = keys[q->n_keys].class;
|
||||
q->keys[q->n_keys].type = keys[q->n_keys].type;
|
||||
q->keys[q->n_keys].name = strdup(keys[q->n_keys].name);
|
||||
if (!q->keys[q->n_keys].name)
|
||||
return -ENOMEM;
|
||||
|
||||
if (!name)
|
||||
name = q->keys[q->n_keys].name;
|
||||
else if (!dns_name_equal(name, q->keys[q->n_keys].name))
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
LIST_PREPEND(queries, m->dns_queries, q);
|
||||
q->manager = m;
|
||||
|
||||
LIST_FOREACH(scopes, s, m->dns_scopes) {
|
||||
DnsScopeMatch match;
|
||||
|
||||
match = dns_scope_test(s, name);
|
||||
if (match < 0)
|
||||
return match;
|
||||
|
||||
if (match == DNS_SCOPE_NO)
|
||||
continue;
|
||||
|
||||
found = match;
|
||||
|
||||
if (match == DNS_SCOPE_YES) {
|
||||
first = s;
|
||||
break;
|
||||
} else {
|
||||
assert(match == DNS_SCOPE_MAYBE);
|
||||
|
||||
if (!first)
|
||||
first = s;
|
||||
}
|
||||
}
|
||||
|
||||
if (found == DNS_SCOPE_NO)
|
||||
return -ENETDOWN;
|
||||
|
||||
r = dns_query_transaction_new(q, NULL, first);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
n = 1;
|
||||
LIST_FOREACH(scopes, s, first->scopes_next) {
|
||||
DnsScopeMatch match;
|
||||
|
||||
match = dns_scope_test(s, name);
|
||||
if (match < 0)
|
||||
return match;
|
||||
|
||||
if (match != found)
|
||||
continue;
|
||||
|
||||
r = dns_query_transaction_new(q, NULL, s);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
n++;
|
||||
}
|
||||
|
||||
if (ret)
|
||||
*ret = q;
|
||||
q = NULL;
|
||||
|
||||
return n;
|
||||
}
|
||||
|
||||
static void dns_query_set_state(DnsQuery *q, DnsQueryState state) {
|
||||
assert(q);
|
||||
|
||||
if (q->state == state)
|
||||
return;
|
||||
|
||||
q->state = state;
|
||||
|
||||
if (state == DNS_QUERY_SENT)
|
||||
return;
|
||||
|
||||
q->timeout_event_source = sd_event_source_unref(q->timeout_event_source);
|
||||
|
||||
while (q->transactions)
|
||||
dns_query_transaction_free(q->transactions);
|
||||
|
||||
if (q->complete)
|
||||
q->complete(q);
|
||||
}
|
||||
|
||||
static int on_query_timeout(sd_event_source *s, usec_t usec, void *userdata) {
|
||||
DnsQuery *q = userdata;
|
||||
|
||||
assert(s);
|
||||
assert(q);
|
||||
|
||||
dns_query_set_state(q, DNS_QUERY_TIMEOUT);
|
||||
return 0;
|
||||
}
|
||||
|
||||
int dns_query_start(DnsQuery *q) {
|
||||
DnsQueryTransaction *t;
|
||||
int r;
|
||||
|
||||
assert(q);
|
||||
assert(q->state == DNS_QUERY_NULL);
|
||||
|
||||
if (!q->transactions)
|
||||
return -ENETDOWN;
|
||||
|
||||
r = sd_event_add_time(q->manager->event, &q->timeout_event_source, CLOCK_MONOTONIC, now(CLOCK_MONOTONIC) + QUERY_TIMEOUT_USEC, 0, on_query_timeout, q);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
dns_query_set_state(q, DNS_QUERY_SENT);
|
||||
|
||||
LIST_FOREACH(transactions_by_query, t, q->transactions) {
|
||||
|
||||
r = dns_query_transaction_start(t);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
if (q->state != DNS_QUERY_SENT)
|
||||
break;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
while (q->transactions)
|
||||
dns_query_transaction_free(q->transactions);
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
void dns_query_finish(DnsQuery *q) {
|
||||
DnsQueryTransaction *t;
|
||||
DnsQueryState state = DNS_QUERY_SKIPPED;
|
||||
uint16_t rcode = 0;
|
||||
|
||||
assert(q);
|
||||
|
||||
if (q->state != DNS_QUERY_SENT)
|
||||
return;
|
||||
|
||||
LIST_FOREACH(transactions_by_query, t, q->transactions) {
|
||||
|
||||
/* One of the transactions is still going on, let's wait for it */
|
||||
if (t->state == DNS_QUERY_SENT || t->state == DNS_QUERY_NULL)
|
||||
return;
|
||||
|
||||
/* One of the transactions is sucecssful, let's use it */
|
||||
if (t->state == DNS_QUERY_SUCCESS) {
|
||||
q->packet = dns_packet_ref(t->packet);
|
||||
dns_query_set_state(q, DNS_QUERY_SUCCESS);
|
||||
return;
|
||||
}
|
||||
|
||||
if (t->state == DNS_QUERY_FAILURE) {
|
||||
state = DNS_QUERY_FAILURE;
|
||||
|
||||
if (rcode == 0 && t->packet)
|
||||
rcode = DNS_PACKET_RCODE(t->packet);
|
||||
|
||||
} else if (state == DNS_QUERY_SKIPPED && t->state != DNS_QUERY_SKIPPED)
|
||||
state = t->state;
|
||||
}
|
||||
|
||||
if (state == DNS_QUERY_FAILURE)
|
||||
q->rcode = rcode;
|
||||
|
||||
dns_query_set_state(q, state);
|
||||
}
|
97
src/resolve/resolved-dns-query.h
Normal file
97
src/resolve/resolved-dns-query.h
Normal file
@ -0,0 +1,97 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
#pragma once
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include <inttypes.h>
|
||||
|
||||
#include "sd-bus.h"
|
||||
#include "util.h"
|
||||
|
||||
typedef struct DnsQuery DnsQuery;
|
||||
typedef struct DnsQueryTransaction DnsQueryTransaction;
|
||||
|
||||
#include "resolved.h"
|
||||
#include "resolved-dns-scope.h"
|
||||
#include "resolved-dns-rr.h"
|
||||
#include "resolved-dns-packet.h"
|
||||
|
||||
typedef enum DnsQueryState {
|
||||
DNS_QUERY_NULL,
|
||||
DNS_QUERY_SENT,
|
||||
DNS_QUERY_FAILURE,
|
||||
DNS_QUERY_SUCCESS,
|
||||
DNS_QUERY_SKIPPED,
|
||||
DNS_QUERY_TIMEOUT,
|
||||
DNS_QUERY_ATTEMPTS_MAX,
|
||||
DNS_QUERY_INVALID_REPLY,
|
||||
} DnsQueryState;
|
||||
|
||||
struct DnsQueryTransaction {
|
||||
DnsQuery *query;
|
||||
DnsScope *scope;
|
||||
|
||||
DnsQueryState state;
|
||||
uint16_t id;
|
||||
|
||||
sd_event_source *timeout_event_source;
|
||||
unsigned n_attempts;
|
||||
|
||||
DnsPacket *packet;
|
||||
|
||||
LIST_FIELDS(DnsQueryTransaction, transactions_by_query);
|
||||
LIST_FIELDS(DnsQueryTransaction, transactions_by_scope);
|
||||
};
|
||||
|
||||
struct DnsQuery {
|
||||
Manager *manager;
|
||||
|
||||
DnsResourceKey *keys;
|
||||
unsigned n_keys;
|
||||
|
||||
DnsQueryState state;
|
||||
|
||||
sd_event_source *timeout_event_source;
|
||||
|
||||
uint16_t rcode;
|
||||
DnsPacket *packet;
|
||||
|
||||
sd_bus_message *request;
|
||||
unsigned char request_family;
|
||||
const char *request_hostname;
|
||||
union in_addr_union request_address;
|
||||
|
||||
void (*complete)(DnsQuery* q);
|
||||
|
||||
LIST_HEAD(DnsQueryTransaction, transactions);
|
||||
LIST_FIELDS(DnsQuery, queries);
|
||||
};
|
||||
|
||||
int dns_query_new(Manager *m, DnsQuery **q, DnsResourceKey *keys, unsigned n_keys);
|
||||
DnsQuery *dns_query_free(DnsQuery *q);
|
||||
int dns_query_start(DnsQuery *q);
|
||||
void dns_query_finish(DnsQuery *q);
|
||||
|
||||
DnsQueryTransaction* dns_query_transaction_free(DnsQueryTransaction *t);
|
||||
int dns_query_transaction_start(DnsQueryTransaction *t);
|
||||
int dns_query_transaction_reply(DnsQueryTransaction *t, DnsPacket *p);
|
||||
|
||||
DEFINE_TRIVIAL_CLEANUP_FUNC(DnsQuery*, dns_query_free);
|
76
src/resolve/resolved-dns-rr.c
Normal file
76
src/resolve/resolved-dns-rr.c
Normal file
@ -0,0 +1,76 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "resolved-dns-rr.h"
|
||||
|
||||
void dns_resource_key_free(DnsResourceKey *key) {
|
||||
if (!key)
|
||||
return;
|
||||
|
||||
free(key->name);
|
||||
zero(*key);
|
||||
}
|
||||
|
||||
DnsResourceRecord* dns_resource_record_new(void) {
|
||||
DnsResourceRecord *rr;
|
||||
|
||||
rr = new0(DnsResourceRecord, 1);
|
||||
if (!rr)
|
||||
return NULL;
|
||||
|
||||
rr->n_ref = 1;
|
||||
return rr;
|
||||
}
|
||||
|
||||
DnsResourceRecord* dns_resource_record_ref(DnsResourceRecord *rr) {
|
||||
if (!rr)
|
||||
return NULL;
|
||||
|
||||
assert(rr->n_ref > 0);
|
||||
rr->n_ref++;
|
||||
|
||||
return rr;
|
||||
}
|
||||
|
||||
DnsResourceRecord* dns_resource_record_unref(DnsResourceRecord *rr) {
|
||||
if (!rr)
|
||||
return NULL;
|
||||
|
||||
assert(rr->n_ref > 0);
|
||||
|
||||
if (rr->n_ref > 1) {
|
||||
rr->n_ref--;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (IN_SET(rr->key.type, DNS_TYPE_PTR, DNS_TYPE_NS, DNS_TYPE_CNAME))
|
||||
free(rr->ptr.name);
|
||||
else if (rr->key.type == DNS_TYPE_HINFO) {
|
||||
free(rr->hinfo.cpu);
|
||||
free(rr->hinfo.os);
|
||||
} else if (!IN_SET(rr->key.type, DNS_TYPE_A, DNS_TYPE_AAAA))
|
||||
free(rr->generic.data);
|
||||
|
||||
dns_resource_key_free(&rr->key);
|
||||
free(rr);
|
||||
|
||||
return NULL;
|
||||
}
|
114
src/resolve/resolved-dns-rr.h
Normal file
114
src/resolve/resolved-dns-rr.h
Normal file
@ -0,0 +1,114 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
#pragma once
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include <inttypes.h>
|
||||
#include <netinet/in.h>
|
||||
|
||||
#include "util.h"
|
||||
|
||||
typedef struct DnsResourceKey DnsResourceKey;
|
||||
typedef struct DnsResourceRecord DnsResourceRecord;
|
||||
|
||||
/* DNS record classes, see RFC 1035 */
|
||||
enum {
|
||||
DNS_CLASS_IN = 0x01,
|
||||
};
|
||||
|
||||
/* DNS record types, see RFC 1035 */
|
||||
enum {
|
||||
/* Normal records */
|
||||
DNS_TYPE_A = 0x01,
|
||||
DNS_TYPE_NS = 0x02,
|
||||
DNS_TYPE_CNAME = 0x05,
|
||||
DNS_TYPE_SOA = 0x06,
|
||||
DNS_TYPE_PTR = 0x0C,
|
||||
DNS_TYPE_HINFO = 0x0D,
|
||||
DNS_TYPE_MX = 0x0F,
|
||||
DNS_TYPE_TXT = 0x10,
|
||||
DNS_TYPE_AAAA = 0x1C,
|
||||
DNS_TYPE_SRV = 0x21,
|
||||
|
||||
/* Special records */
|
||||
DNS_TYPE_ANY = 0xFF,
|
||||
DNS_TYPE_OPT = 0x29, /* EDNS0 option */
|
||||
DNS_TYPE_TKEY = 0xF9,
|
||||
DNS_TYPE_TSIG = 0xFA,
|
||||
DNS_TYPE_IXFR = 0xFB,
|
||||
DNS_TYPE_AXFR = 0xFC,
|
||||
};
|
||||
|
||||
struct DnsResourceKey {
|
||||
uint16_t class;
|
||||
uint16_t type;
|
||||
char *name;
|
||||
};
|
||||
|
||||
struct DnsResourceRecord {
|
||||
unsigned n_ref;
|
||||
|
||||
DnsResourceKey key;
|
||||
uint32_t ttl;
|
||||
|
||||
union {
|
||||
struct {
|
||||
void *data;
|
||||
uint16_t size;
|
||||
} generic;
|
||||
|
||||
/* struct { */
|
||||
/* uint16_t priority; */
|
||||
/* uint16_t weight; */
|
||||
/* uint16_t port; */
|
||||
/* char *name; */
|
||||
/* } srv; */
|
||||
|
||||
struct {
|
||||
char *name;
|
||||
} ptr, ns, cname;
|
||||
|
||||
struct {
|
||||
char *cpu;
|
||||
char *os;
|
||||
} hinfo;
|
||||
|
||||
/* struct { */
|
||||
/* char **list; */
|
||||
/* } txt; */
|
||||
|
||||
struct {
|
||||
struct in_addr in_addr;
|
||||
} a;
|
||||
|
||||
struct {
|
||||
struct in6_addr in6_addr;
|
||||
} aaaa;
|
||||
};
|
||||
};
|
||||
|
||||
void dns_resource_key_free(DnsResourceKey *key);
|
||||
|
||||
DnsResourceRecord* dns_resource_record_new(void);
|
||||
DnsResourceRecord* dns_resource_record_ref(DnsResourceRecord *rr);
|
||||
DnsResourceRecord* dns_resource_record_unref(DnsResourceRecord *rr);
|
||||
|
||||
DEFINE_TRIVIAL_CLEANUP_FUNC(DnsResourceRecord*, dns_resource_record_unref);
|
147
src/resolve/resolved-dns-scope.c
Normal file
147
src/resolve/resolved-dns-scope.c
Normal file
@ -0,0 +1,147 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "strv.h"
|
||||
#include "resolved-dns-domain.h"
|
||||
#include "resolved-dns-scope.h"
|
||||
|
||||
#define SEND_TIMEOUT_USEC (2*USEC_PER_SEC)
|
||||
|
||||
int dns_scope_new(Manager *m, DnsScope **ret, DnsScopeType t) {
|
||||
DnsScope *s;
|
||||
|
||||
assert(m);
|
||||
assert(ret);
|
||||
|
||||
s = new0(DnsScope, 1);
|
||||
if (!s)
|
||||
return -ENOMEM;
|
||||
|
||||
s->manager = m;
|
||||
s->type = t;
|
||||
|
||||
LIST_PREPEND(scopes, m->dns_scopes, s);
|
||||
|
||||
*ret = s;
|
||||
return 0;
|
||||
}
|
||||
|
||||
DnsScope* dns_scope_free(DnsScope *s) {
|
||||
if (!s)
|
||||
return NULL;
|
||||
|
||||
while (s->transactions) {
|
||||
DnsQuery *q;
|
||||
|
||||
q = s->transactions->query;
|
||||
dns_query_transaction_free(s->transactions);
|
||||
|
||||
dns_query_finish(q);
|
||||
}
|
||||
|
||||
LIST_REMOVE(scopes, s->manager->dns_scopes, s);
|
||||
strv_free(s->domains);
|
||||
free(s);
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
DnsServer *dns_scope_get_server(DnsScope *s) {
|
||||
assert(s);
|
||||
|
||||
if (s->link)
|
||||
return link_get_dns_server(s->link);
|
||||
else
|
||||
return manager_get_dns_server(s->manager);
|
||||
}
|
||||
|
||||
void dns_scope_next_dns_server(DnsScope *s) {
|
||||
assert(s);
|
||||
|
||||
if (s->link)
|
||||
link_next_dns_server(s->link);
|
||||
else
|
||||
manager_next_dns_server(s->manager);
|
||||
}
|
||||
|
||||
int dns_scope_send(DnsScope *s, DnsPacket *p) {
|
||||
int ifindex = 0;
|
||||
DnsServer *srv;
|
||||
int r;
|
||||
|
||||
assert(s);
|
||||
assert(p);
|
||||
|
||||
srv = dns_scope_get_server(s);
|
||||
if (!srv)
|
||||
return 0;
|
||||
|
||||
if (s->link)
|
||||
ifindex = s->link->ifindex;
|
||||
|
||||
if (srv->family == AF_INET)
|
||||
r = manager_dns_ipv4_send(s->manager, srv, ifindex, p);
|
||||
else if (srv->family == AF_INET6)
|
||||
r = manager_dns_ipv6_send(s->manager, srv, ifindex, p);
|
||||
else
|
||||
return -EAFNOSUPPORT;
|
||||
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
DnsScopeMatch dns_scope_test(DnsScope *s, const char *domain) {
|
||||
char **i;
|
||||
|
||||
assert(s);
|
||||
assert(domain);
|
||||
|
||||
STRV_FOREACH(i, s->domains)
|
||||
if (dns_name_endswith(domain, *i))
|
||||
return DNS_SCOPE_YES;
|
||||
|
||||
if (dns_name_root(domain))
|
||||
return DNS_SCOPE_NO;
|
||||
|
||||
if (s->type == DNS_SCOPE_MDNS) {
|
||||
if (dns_name_endswith(domain, "254.169.in-addr.arpa") ||
|
||||
dns_name_endswith(domain, "0.8.e.f.ip6.arpa"))
|
||||
return DNS_SCOPE_YES;
|
||||
else if (dns_name_endswith(domain, "local") ||
|
||||
!dns_name_single_label(domain))
|
||||
return DNS_SCOPE_MAYBE;
|
||||
|
||||
return DNS_SCOPE_NO;
|
||||
}
|
||||
|
||||
if (s->type == DNS_SCOPE_DNS) {
|
||||
if (dns_name_endswith(domain, "254.169.in-addr.arpa") ||
|
||||
dns_name_endswith(domain, "0.8.e.f.ip6.arpa") ||
|
||||
dns_name_single_label(domain))
|
||||
return DNS_SCOPE_NO;
|
||||
|
||||
return DNS_SCOPE_MAYBE;
|
||||
}
|
||||
|
||||
assert_not_reached("Unknown scope type");
|
||||
}
|
69
src/resolve/resolved-dns-scope.h
Normal file
69
src/resolve/resolved-dns-scope.h
Normal file
@ -0,0 +1,69 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
#pragma once
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "list.h"
|
||||
|
||||
typedef struct DnsScope DnsScope;
|
||||
|
||||
#include "resolved.h"
|
||||
#include "resolved-link.h"
|
||||
#include "resolved-dns-server.h"
|
||||
#include "resolved-dns-packet.h"
|
||||
#include "resolved-dns-query.h"
|
||||
|
||||
typedef enum DnsScopeType {
|
||||
DNS_SCOPE_DNS,
|
||||
DNS_SCOPE_MDNS,
|
||||
} DnsScopeType;
|
||||
|
||||
typedef enum DnsScopeMatch {
|
||||
DNS_SCOPE_NO,
|
||||
DNS_SCOPE_MAYBE,
|
||||
DNS_SCOPE_YES,
|
||||
_DNS_SCOPE_MATCH_MAX,
|
||||
_DNS_SCOPE_INVALID = -1
|
||||
} DnsScopeMatch;
|
||||
|
||||
struct DnsScope {
|
||||
Manager *manager;
|
||||
|
||||
DnsScopeType type;
|
||||
unsigned char family;
|
||||
|
||||
Link *link;
|
||||
|
||||
char **domains;
|
||||
|
||||
LIST_HEAD(DnsQueryTransaction, transactions);
|
||||
|
||||
LIST_FIELDS(DnsScope, scopes);
|
||||
};
|
||||
|
||||
int dns_scope_new(Manager *m, DnsScope **ret, DnsScopeType t);
|
||||
DnsScope* dns_scope_free(DnsScope *s);
|
||||
|
||||
int dns_scope_send(DnsScope *s, DnsPacket *p);
|
||||
DnsScopeMatch dns_scope_test(DnsScope *s, const char *domain);
|
||||
|
||||
DnsServer *dns_scope_get_server(DnsScope *s);
|
||||
void dns_scope_next_dns_server(DnsScope *s);
|
98
src/resolve/resolved-dns-server.c
Normal file
98
src/resolve/resolved-dns-server.c
Normal file
@ -0,0 +1,98 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "resolved-dns-server.h"
|
||||
|
||||
int dns_server_new(
|
||||
Manager *m,
|
||||
DnsServer **ret,
|
||||
DnsServerSource source,
|
||||
Link *l,
|
||||
unsigned char family,
|
||||
union in_addr_union *in_addr) {
|
||||
|
||||
DnsServer *s, *tail;
|
||||
|
||||
assert(m);
|
||||
assert(in_addr);
|
||||
assert(source < _DNS_SERVER_SOURCE_MAX);
|
||||
|
||||
s = new0(DnsServer, 1);
|
||||
if (!s)
|
||||
return -ENOMEM;
|
||||
|
||||
s->source = source;
|
||||
s->family = family;
|
||||
s->address = *in_addr;
|
||||
|
||||
if (source == DNS_SERVER_LINK) {
|
||||
assert(l);
|
||||
LIST_FIND_TAIL(servers, l->link_dns_servers, tail);
|
||||
LIST_INSERT_AFTER(servers, l->link_dns_servers, tail, s);
|
||||
s->link = l;
|
||||
} else if (source == DNS_SERVER_DHCP) {
|
||||
assert(l);
|
||||
LIST_FIND_TAIL(servers, l->dhcp_dns_servers, tail);
|
||||
LIST_INSERT_AFTER(servers, l->dhcp_dns_servers, tail, s);
|
||||
s->link = l;
|
||||
} else {
|
||||
assert(!l);
|
||||
LIST_FIND_TAIL(servers, m->dns_servers, tail);
|
||||
LIST_INSERT_AFTER(servers, m->dns_servers, tail, s);
|
||||
}
|
||||
|
||||
s->manager = m;
|
||||
|
||||
if (ret)
|
||||
*ret = s;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
DnsServer* dns_server_free(DnsServer *s) {
|
||||
if (!s)
|
||||
return NULL;
|
||||
|
||||
if (s->source == DNS_SERVER_LINK) {
|
||||
|
||||
if (s->link)
|
||||
LIST_REMOVE(servers, s->link->link_dns_servers, s);
|
||||
} else if (s->source == DNS_SERVER_DHCP) {
|
||||
|
||||
if (s->link)
|
||||
LIST_REMOVE(servers, s->link->dhcp_dns_servers, s);
|
||||
|
||||
} else if (s->source == DNS_SERVER_SYSTEM) {
|
||||
|
||||
if (s->manager)
|
||||
LIST_REMOVE(servers, s->manager->dns_servers, s);
|
||||
}
|
||||
|
||||
if (s->link && s->link->current_dns_server == s)
|
||||
s->link->current_dns_server = NULL;
|
||||
|
||||
if (s->manager && s->manager->current_dns_server == s)
|
||||
s->manager->current_dns_server = NULL;
|
||||
|
||||
free(s);
|
||||
|
||||
return NULL;
|
||||
}
|
61
src/resolve/resolved-dns-server.h
Normal file
61
src/resolve/resolved-dns-server.h
Normal file
@ -0,0 +1,61 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
#pragma once
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
typedef struct DnsServer DnsServer;
|
||||
typedef enum DnsServerSource DnsServerSource;
|
||||
|
||||
#include "in-addr-util.h"
|
||||
#include "resolved.h"
|
||||
#include "resolved-link.h"
|
||||
#include "resolved-dns-server.h"
|
||||
|
||||
enum DnsServerSource {
|
||||
DNS_SERVER_SYSTEM,
|
||||
DNS_SERVER_LINK,
|
||||
DNS_SERVER_DHCP,
|
||||
_DNS_SERVER_SOURCE_MAX
|
||||
};
|
||||
|
||||
struct DnsServer {
|
||||
Manager *manager;
|
||||
DnsServerSource source;
|
||||
|
||||
unsigned char family;
|
||||
union in_addr_union address;
|
||||
|
||||
bool marked;
|
||||
|
||||
Link *link;
|
||||
|
||||
LIST_FIELDS(DnsServer, servers);
|
||||
};
|
||||
|
||||
int dns_server_new(
|
||||
Manager *m,
|
||||
DnsServer **s,
|
||||
DnsServerSource source,
|
||||
Link *l,
|
||||
unsigned char family,
|
||||
union in_addr_union *in_addr);
|
||||
|
||||
DnsServer* dns_server_free(DnsServer *s);
|
@ -14,4 +14,4 @@ struct ConfigPerfItem;
|
||||
%struct-type
|
||||
%includes
|
||||
%%
|
||||
Resolve.DNS, config_parse_dnsv, 0, offsetof(Manager, fallback_dns)
|
||||
Resolve.DNS, config_parse_dnsv, 0, 0
|
||||
|
378
src/resolve/resolved-link.c
Normal file
378
src/resolve/resolved-link.c
Normal file
@ -0,0 +1,378 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include <net/if.h>
|
||||
|
||||
#include "sd-network.h"
|
||||
#include "dhcp-lease-internal.h"
|
||||
#include "strv.h"
|
||||
#include "resolved-link.h"
|
||||
|
||||
int link_new(Manager *m, Link **ret, int ifindex) {
|
||||
_cleanup_(link_freep) Link *l = NULL;
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
assert(ifindex > 0);
|
||||
|
||||
r = hashmap_ensure_allocated(&m->links, NULL, NULL);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
l = new0(Link, 1);
|
||||
if (!l)
|
||||
return -ENOMEM;
|
||||
|
||||
l->ifindex = ifindex;
|
||||
|
||||
r = hashmap_put(m->links, INT_TO_PTR(ifindex), l);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
l->manager = m;
|
||||
|
||||
if (ret)
|
||||
*ret = l;
|
||||
l = NULL;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
Link *link_free(Link *l) {
|
||||
|
||||
if (!l)
|
||||
return NULL;
|
||||
|
||||
while (l->addresses)
|
||||
link_address_free(l->addresses);
|
||||
|
||||
if (l->manager)
|
||||
hashmap_remove(l->manager->links, INT_TO_PTR(l->ifindex));
|
||||
|
||||
dns_scope_free(l->unicast_scope);
|
||||
dns_scope_free(l->mdns_ipv4_scope);
|
||||
dns_scope_free(l->mdns_ipv6_scope);
|
||||
|
||||
while (l->dhcp_dns_servers)
|
||||
dns_server_free(l->dhcp_dns_servers);
|
||||
|
||||
while (l->link_dns_servers)
|
||||
dns_server_free(l->link_dns_servers);
|
||||
|
||||
free(l);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int link_update_rtnl(Link *l, sd_rtnl_message *m) {
|
||||
int r;
|
||||
|
||||
assert(l);
|
||||
assert(m);
|
||||
|
||||
r = sd_rtnl_message_link_get_flags(m, &l->flags);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int update_dhcp_dns_servers(Link *l) {
|
||||
_cleanup_dhcp_lease_unref_ sd_dhcp_lease *lease = NULL;
|
||||
_cleanup_free_ struct in_addr *nameservers = NULL;
|
||||
DnsServer *s, *nx;
|
||||
unsigned i;
|
||||
size_t n;
|
||||
int r;
|
||||
|
||||
assert(l);
|
||||
|
||||
r = sd_network_dhcp_use_dns(l->ifindex);
|
||||
if (r <= 0)
|
||||
goto clear;
|
||||
|
||||
r = sd_network_get_dhcp_lease(l->ifindex, &lease);
|
||||
if (r < 0)
|
||||
goto clear;
|
||||
|
||||
LIST_FOREACH(servers, s, l->dhcp_dns_servers)
|
||||
s->marked = true;
|
||||
|
||||
r = sd_dhcp_lease_get_dns(lease, &nameservers, &n);
|
||||
if (r < 0)
|
||||
goto clear;
|
||||
|
||||
for (i = 0; i < n; i++) {
|
||||
union in_addr_union a = { .in = nameservers[i] };
|
||||
|
||||
s = link_find_dns_server(l, DNS_SERVER_DHCP, AF_INET, &a);
|
||||
if (s)
|
||||
s->marked = false;
|
||||
else {
|
||||
r = dns_server_new(l->manager, NULL, DNS_SERVER_DHCP, l, AF_INET, &a);
|
||||
if (r < 0)
|
||||
goto clear;
|
||||
}
|
||||
}
|
||||
|
||||
LIST_FOREACH_SAFE(servers, s, nx, l->dhcp_dns_servers)
|
||||
if (s->marked)
|
||||
dns_server_free(s);
|
||||
|
||||
return 0;
|
||||
|
||||
clear:
|
||||
while (l->dhcp_dns_servers)
|
||||
dns_server_free(l->dhcp_dns_servers);
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
static int update_link_dns_servers(Link *l) {
|
||||
_cleanup_free_ struct in_addr *nameservers = NULL;
|
||||
_cleanup_free_ struct in6_addr *nameservers6 = NULL;
|
||||
DnsServer *s, *nx;
|
||||
unsigned i;
|
||||
size_t n;
|
||||
int r;
|
||||
|
||||
assert(l);
|
||||
|
||||
LIST_FOREACH(servers, s, l->link_dns_servers)
|
||||
s->marked = true;
|
||||
|
||||
r = sd_network_get_dns(l->ifindex, &nameservers, &n);
|
||||
if (r < 0)
|
||||
goto clear;
|
||||
|
||||
for (i = 0; i < n; i++) {
|
||||
union in_addr_union a = { .in = nameservers[i] };
|
||||
|
||||
s = link_find_dns_server(l, DNS_SERVER_LINK, AF_INET, &a);
|
||||
if (s)
|
||||
s->marked = false;
|
||||
else {
|
||||
r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, AF_INET, &a);
|
||||
if (r < 0)
|
||||
goto clear;
|
||||
}
|
||||
}
|
||||
|
||||
r = sd_network_get_dns6(l->ifindex, &nameservers6, &n);
|
||||
if (r < 0)
|
||||
goto clear;
|
||||
|
||||
for (i = 0; i < n; i++) {
|
||||
union in_addr_union a = { .in6 = nameservers6[i] };
|
||||
|
||||
s = link_find_dns_server(l, DNS_SERVER_LINK, AF_INET6, &a);
|
||||
if (s)
|
||||
s->marked = false;
|
||||
else {
|
||||
r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, AF_INET6, &a);
|
||||
if (r < 0)
|
||||
goto clear;
|
||||
}
|
||||
}
|
||||
|
||||
LIST_FOREACH_SAFE(servers, s, nx, l->link_dns_servers)
|
||||
if (s->marked)
|
||||
dns_server_free(s);
|
||||
|
||||
return 0;
|
||||
|
||||
clear:
|
||||
while (l->link_dns_servers)
|
||||
dns_server_free(l->link_dns_servers);
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
int link_update_monitor(Link *l) {
|
||||
assert(l);
|
||||
|
||||
free(l->operational_state);
|
||||
l->operational_state = NULL;
|
||||
|
||||
sd_network_get_link_operational_state(l->ifindex, &l->operational_state);
|
||||
|
||||
update_dhcp_dns_servers(l);
|
||||
update_link_dns_servers(l);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
bool link_relevant(Link *l) {
|
||||
LinkAddress *a;
|
||||
|
||||
assert(l);
|
||||
|
||||
/* A link is relevant if it isn't a loopback device and has at
|
||||
* least one relevant IP address */
|
||||
|
||||
if (l->flags & IFF_LOOPBACK)
|
||||
return false;
|
||||
|
||||
if (l->operational_state && !STR_IN_SET(l->operational_state, "unknown", "degraded", "routable"))
|
||||
return false;
|
||||
|
||||
LIST_FOREACH(addresses, a, l->addresses)
|
||||
if (link_address_relevant(a))
|
||||
return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
LinkAddress *link_find_address(Link *l, unsigned char family, union in_addr_union *in_addr) {
|
||||
LinkAddress *a;
|
||||
|
||||
assert(l);
|
||||
|
||||
LIST_FOREACH(addresses, a, l->addresses) {
|
||||
|
||||
if (a->family == family &&
|
||||
in_addr_equal(family, &a->in_addr, in_addr))
|
||||
return a;
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
DnsServer* link_find_dns_server(Link *l, DnsServerSource source, unsigned char family, union in_addr_union *in_addr) {
|
||||
DnsServer *first, *s;
|
||||
|
||||
assert(l);
|
||||
|
||||
first = source == DNS_SERVER_DHCP ? l->dhcp_dns_servers : l->link_dns_servers;
|
||||
|
||||
LIST_FOREACH(servers, s, first) {
|
||||
|
||||
if (s->family == family &&
|
||||
in_addr_equal(family, &s->address, in_addr))
|
||||
return s;
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
DnsServer *link_get_dns_server(Link *l) {
|
||||
assert(l);
|
||||
|
||||
if (!l->current_dns_server)
|
||||
l->current_dns_server = l->link_dns_servers;
|
||||
if (!l->current_dns_server)
|
||||
l->current_dns_server = l->dhcp_dns_servers;
|
||||
|
||||
return l->current_dns_server;
|
||||
}
|
||||
|
||||
void link_next_dns_server(Link *l) {
|
||||
assert(l);
|
||||
|
||||
/* Switch to the next DNS server */
|
||||
|
||||
if (!l->current_dns_server) {
|
||||
l->current_dns_server = l->link_dns_servers;
|
||||
if (l->current_dns_server)
|
||||
return;
|
||||
}
|
||||
|
||||
if (!l->current_dns_server) {
|
||||
l->current_dns_server = l->dhcp_dns_servers;
|
||||
if (l->current_dns_server)
|
||||
return;
|
||||
}
|
||||
|
||||
if (!l->current_dns_server)
|
||||
return;
|
||||
|
||||
if (l->current_dns_server->servers_next) {
|
||||
l->current_dns_server = l->current_dns_server->servers_next;
|
||||
return;
|
||||
}
|
||||
|
||||
if (l->current_dns_server->source == DNS_SERVER_LINK)
|
||||
l->current_dns_server = l->dhcp_dns_servers;
|
||||
else {
|
||||
assert(l->current_dns_server->source == DNS_SERVER_DHCP);
|
||||
l->current_dns_server = l->link_dns_servers;
|
||||
}
|
||||
}
|
||||
|
||||
int link_address_new(Link *l, LinkAddress **ret, unsigned char family, union in_addr_union *in_addr) {
|
||||
LinkAddress *a;
|
||||
|
||||
assert(l);
|
||||
assert(in_addr);
|
||||
|
||||
a = new0(LinkAddress, 1);
|
||||
if (!a)
|
||||
return -ENOMEM;
|
||||
|
||||
a->family = family;
|
||||
a->in_addr = *in_addr;
|
||||
|
||||
a->link = l;
|
||||
LIST_PREPEND(addresses, l->addresses, a);
|
||||
|
||||
if (ret)
|
||||
*ret = a;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
LinkAddress *link_address_free(LinkAddress *a) {
|
||||
if (!a)
|
||||
return NULL;
|
||||
|
||||
if (a->link)
|
||||
LIST_REMOVE(addresses, a->link->addresses, a);
|
||||
|
||||
free(a);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int link_address_update_rtnl(LinkAddress *a, sd_rtnl_message *m) {
|
||||
int r;
|
||||
assert(a);
|
||||
assert(m);
|
||||
|
||||
r = sd_rtnl_message_addr_get_flags(m, &a->flags);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_message_addr_get_scope(m, &a->scope);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
bool link_address_relevant(LinkAddress *a) {
|
||||
assert(a);
|
||||
|
||||
if (a->flags & IFA_F_DEPRECATED)
|
||||
return false;
|
||||
|
||||
if (IN_SET(a->scope, RT_SCOPE_HOST, RT_SCOPE_NOWHERE))
|
||||
return false;
|
||||
|
||||
return true;
|
||||
}
|
84
src/resolve/resolved-link.h
Normal file
84
src/resolve/resolved-link.h
Normal file
@ -0,0 +1,84 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
#pragma once
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "in-addr-util.h"
|
||||
#include "ratelimit.h"
|
||||
|
||||
typedef struct Link Link;
|
||||
typedef struct LinkAddress LinkAddress;
|
||||
|
||||
#include "resolved.h"
|
||||
#include "resolved-dns-server.h"
|
||||
#include "resolved-dns-scope.h"
|
||||
|
||||
struct LinkAddress {
|
||||
Link *link;
|
||||
|
||||
unsigned char family;
|
||||
union in_addr_union in_addr;
|
||||
|
||||
unsigned char flags, scope;
|
||||
|
||||
LIST_FIELDS(LinkAddress, addresses);
|
||||
};
|
||||
|
||||
struct Link {
|
||||
Manager *manager;
|
||||
|
||||
int ifindex;
|
||||
unsigned flags;
|
||||
|
||||
LIST_HEAD(LinkAddress, addresses);
|
||||
|
||||
LIST_HEAD(DnsServer, link_dns_servers);
|
||||
LIST_HEAD(DnsServer, dhcp_dns_servers);
|
||||
DnsServer *current_dns_server;
|
||||
|
||||
DnsScope *unicast_scope;
|
||||
DnsScope *mdns_ipv4_scope;
|
||||
DnsScope *mdns_ipv6_scope;
|
||||
|
||||
size_t mtu;
|
||||
|
||||
char *operational_state;
|
||||
|
||||
RateLimit mdns_ratelimit;
|
||||
};
|
||||
|
||||
int link_new(Manager *m, Link **ret, int ifindex);
|
||||
Link *link_free(Link *l);
|
||||
int link_update_rtnl(Link *l, sd_rtnl_message *m);
|
||||
int link_update_monitor(Link *l);
|
||||
bool link_relevant(Link *l);
|
||||
LinkAddress* link_find_address(Link *l, unsigned char family, union in_addr_union *in_addr);
|
||||
|
||||
DnsServer* link_find_dns_server(Link *l, DnsServerSource source, unsigned char family, union in_addr_union *in_addr);
|
||||
DnsServer* link_get_dns_server(Link *l);
|
||||
void link_next_dns_server(Link *l);
|
||||
|
||||
int link_address_new(Link *l, LinkAddress **ret, unsigned char family, union in_addr_union *in_addr);
|
||||
LinkAddress *link_address_free(LinkAddress *a);
|
||||
int link_address_update_rtnl(LinkAddress *a, sd_rtnl_message *m);
|
||||
bool link_address_relevant(LinkAddress *l);
|
||||
|
||||
DEFINE_TRIVIAL_CLEANUP_FUNC(Link*, link_free);
|
@ -22,16 +22,286 @@
|
||||
#include <arpa/inet.h>
|
||||
#include <resolv.h>
|
||||
#include <linux/if.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <sys/poll.h>
|
||||
#include <netinet/in.h>
|
||||
|
||||
#include "resolved.h"
|
||||
#include "rtnl-util.h"
|
||||
#include "event-util.h"
|
||||
#include "network-util.h"
|
||||
#include "sd-dhcp-lease.h"
|
||||
#include "dhcp-lease-internal.h"
|
||||
#include "network-internal.h"
|
||||
#include "conf-parser.h"
|
||||
#include "socket-util.h"
|
||||
#include "resolved.h"
|
||||
|
||||
static int set_fallback_dns(Manager *m, const char *string) {
|
||||
#define SEND_TIMEOUT_USEC (200 * USEC_PER_MSEC)
|
||||
|
||||
static int manager_process_link(sd_rtnl *rtnl, sd_rtnl_message *mm, void *userdata) {
|
||||
Manager *m = userdata;
|
||||
uint16_t type;
|
||||
Link *l;
|
||||
int ifindex, r;
|
||||
|
||||
assert(rtnl);
|
||||
assert(m);
|
||||
assert(mm);
|
||||
|
||||
r = sd_rtnl_message_get_type(mm, &type);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = sd_rtnl_message_link_get_ifindex(mm, &ifindex);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
l = hashmap_get(m->links, INT_TO_PTR(ifindex));
|
||||
|
||||
switch (type) {
|
||||
|
||||
case RTM_NEWLINK:
|
||||
if (!l) {
|
||||
log_debug("Found link %i", ifindex);
|
||||
|
||||
r = link_new(m, &l, ifindex);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
}
|
||||
|
||||
r = link_update_rtnl(l, mm);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
break;
|
||||
|
||||
case RTM_DELLINK:
|
||||
if (l) {
|
||||
log_debug("Removing link %i", l->ifindex);
|
||||
link_free(l);
|
||||
}
|
||||
|
||||
break;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
log_warning("Failed to process RTNL link message: %s", strerror(-r));
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int manager_process_address(sd_rtnl *rtnl, sd_rtnl_message *mm, void *userdata) {
|
||||
Manager *m = userdata;
|
||||
union in_addr_union address;
|
||||
unsigned char family;
|
||||
uint16_t type;
|
||||
int r, ifindex;
|
||||
LinkAddress *a;
|
||||
Link *l;
|
||||
|
||||
assert(rtnl);
|
||||
assert(mm);
|
||||
assert(m);
|
||||
|
||||
r = sd_rtnl_message_get_type(mm, &type);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
r = sd_rtnl_message_addr_get_ifindex(mm, &ifindex);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
l = hashmap_get(m->links, INT_TO_PTR(ifindex));
|
||||
if (!l)
|
||||
return 0;
|
||||
|
||||
r = sd_rtnl_message_addr_get_family(mm, &family);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
switch (family) {
|
||||
|
||||
case AF_INET:
|
||||
r = sd_rtnl_message_read_in_addr(mm, IFA_LOCAL, &address.in);
|
||||
if (r < 0) {
|
||||
r = sd_rtnl_message_read_in_addr(mm, IFA_ADDRESS, &address.in);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
}
|
||||
|
||||
break;
|
||||
|
||||
case AF_INET6:
|
||||
r = sd_rtnl_message_read_in6_addr(mm, IFA_LOCAL, &address.in6);
|
||||
if (r < 0) {
|
||||
r = sd_rtnl_message_read_in6_addr(mm, IFA_ADDRESS, &address.in6);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
}
|
||||
|
||||
break;
|
||||
|
||||
default:
|
||||
return 0;
|
||||
}
|
||||
|
||||
a = link_find_address(l, family, &address);
|
||||
|
||||
switch (type) {
|
||||
|
||||
case RTM_NEWADDR:
|
||||
|
||||
if (!a) {
|
||||
r = link_address_new(l, &a, family, &address);
|
||||
if (r < 0)
|
||||
return r;
|
||||
}
|
||||
|
||||
r = link_address_update_rtnl(a, mm);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
break;
|
||||
|
||||
case RTM_DELADDR:
|
||||
if (a)
|
||||
link_address_free(a);
|
||||
break;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
log_warning("Failed to process RTNL address message: %s", strerror(-r));
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
static int manager_rtnl_listen(Manager *m) {
|
||||
_cleanup_rtnl_message_unref_ sd_rtnl_message *req = NULL, *reply = NULL;
|
||||
sd_rtnl_message *i;
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
|
||||
/* First, subscibe to interfaces coming and going */
|
||||
r = sd_rtnl_open(&m->rtnl, 3, RTNLGRP_LINK, RTNLGRP_IPV4_IFADDR, RTNLGRP_IPV6_IFADDR);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_attach_event(m->rtnl, m->event, 0);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_add_match(m->rtnl, RTM_NEWLINK, manager_process_link, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_add_match(m->rtnl, RTM_DELLINK, manager_process_link, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_add_match(m->rtnl, RTM_NEWADDR, manager_process_address, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_add_match(m->rtnl, RTM_DELADDR, manager_process_address, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
/* Then, enumerate all links */
|
||||
r = sd_rtnl_message_new_link(m->rtnl, &req, RTM_GETLINK, 0);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_message_request_dump(req, true);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_call(m->rtnl, req, 0, &reply);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
for (i = reply; i; i = sd_rtnl_message_next(i)) {
|
||||
r = manager_process_link(m->rtnl, i, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
}
|
||||
|
||||
req = sd_rtnl_message_unref(req);
|
||||
reply = sd_rtnl_message_unref(reply);
|
||||
|
||||
/* Finally, enumerate all addresses, too */
|
||||
r = sd_rtnl_message_new_addr(m->rtnl, &req, RTM_GETADDR, 0, AF_UNSPEC);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_message_request_dump(req, true);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = sd_rtnl_call(m->rtnl, req, 0, &reply);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
for (i = reply; i; i = sd_rtnl_message_next(i)) {
|
||||
r = manager_process_address(m->rtnl, i, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
}
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
static int on_network_event(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
|
||||
Manager *m = userdata;
|
||||
Iterator i;
|
||||
Link *l;
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
|
||||
sd_network_monitor_flush(m->network_monitor);
|
||||
|
||||
HASHMAP_FOREACH(l, m->links, i) {
|
||||
r = link_update_monitor(l);
|
||||
if (r < 0)
|
||||
log_warning("Failed to update monitor information for %i: %s", l->ifindex, strerror(-r));
|
||||
}
|
||||
|
||||
r = manager_write_resolv_conf(m);
|
||||
if (r < 0)
|
||||
log_warning("Could not update resolv.conf: %s", strerror(-r));
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int manager_network_monitor_listen(Manager *m) {
|
||||
int r, fd, events;
|
||||
|
||||
assert(m);
|
||||
|
||||
r = sd_network_monitor_new(NULL, &m->network_monitor);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
fd = sd_network_monitor_get_fd(m->network_monitor);
|
||||
if (fd < 0)
|
||||
return fd;
|
||||
|
||||
events = sd_network_monitor_get_events(m->network_monitor);
|
||||
if (events < 0)
|
||||
return events;
|
||||
|
||||
r = sd_event_add_io(m->event, &m->network_event_source, fd, events, &on_network_event, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int parse_dns_server_string(Manager *m, const char *string) {
|
||||
char *word, *state;
|
||||
size_t length;
|
||||
int r;
|
||||
@ -40,27 +310,26 @@ static int set_fallback_dns(Manager *m, const char *string) {
|
||||
assert(string);
|
||||
|
||||
FOREACH_WORD_QUOTED(word, length, string, state) {
|
||||
_cleanup_free_ Address *address = NULL;
|
||||
Address *tail;
|
||||
_cleanup_free_ char *addrstr = NULL;
|
||||
char buffer[length+1];
|
||||
unsigned family;
|
||||
union in_addr_union addr;
|
||||
|
||||
address = new0(Address, 1);
|
||||
if (!address)
|
||||
return -ENOMEM;
|
||||
memcpy(buffer, word, length);
|
||||
buffer[length] = 0;
|
||||
|
||||
addrstr = strndup(word, length);
|
||||
if (!addrstr)
|
||||
return -ENOMEM;
|
||||
|
||||
r = net_parse_inaddr(addrstr, &address->family, &address->in_addr);
|
||||
r = in_addr_from_string_auto(buffer, &family, &addr);
|
||||
if (r < 0) {
|
||||
log_debug("Ignoring invalid DNS address '%s'", addrstr);
|
||||
log_warning("Ignoring invalid DNS address '%s'", buffer);
|
||||
continue;
|
||||
}
|
||||
|
||||
LIST_FIND_TAIL(addresses, m->fallback_dns, tail);
|
||||
LIST_INSERT_AFTER(addresses, m->fallback_dns, tail, address);
|
||||
address = NULL;
|
||||
/* filter out duplicates */
|
||||
if (manager_find_dns_server(m, family, &addr))
|
||||
continue;
|
||||
|
||||
r = dns_server_new(m, NULL, DNS_SERVER_SYSTEM, NULL, family, &addr);
|
||||
if (r < 0)
|
||||
return r;
|
||||
}
|
||||
|
||||
return 0;
|
||||
@ -79,39 +348,48 @@ int config_parse_dnsv(
|
||||
void *userdata) {
|
||||
|
||||
Manager *m = userdata;
|
||||
Address *address;
|
||||
int r;
|
||||
|
||||
assert(filename);
|
||||
assert(lvalue);
|
||||
assert(rvalue);
|
||||
assert(m);
|
||||
|
||||
while ((address = m->fallback_dns)) {
|
||||
LIST_REMOVE(addresses, m->fallback_dns, address);
|
||||
free(address);
|
||||
/* Empty assignment means clear the list */
|
||||
if (isempty(rvalue)) {
|
||||
while (m->dns_servers)
|
||||
dns_server_free(m->dns_servers);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
set_fallback_dns(m, rvalue);
|
||||
r = parse_dns_server_string(m, rvalue);
|
||||
if (r < 0) {
|
||||
log_error("Failed to parse DNS server string");
|
||||
return r;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int manager_parse_config_file(Manager *m) {
|
||||
int manager_parse_config_file(Manager *m) {
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
|
||||
r = config_parse(NULL, "/etc/systemd/resolved.conf", NULL,
|
||||
"Resolve\0", config_item_perf_lookup, (void*) resolved_gperf_lookup,
|
||||
r = config_parse(NULL,
|
||||
"/etc/systemd/resolved.conf", NULL,
|
||||
"Resolve\0",
|
||||
config_item_perf_lookup, (void*) resolved_gperf_lookup,
|
||||
false, false, m);
|
||||
if (r < 0)
|
||||
log_warning("Failed to parse configuration file: %s", strerror(-r));
|
||||
|
||||
return r;
|
||||
return 0;
|
||||
}
|
||||
|
||||
int manager_new(Manager **ret) {
|
||||
_cleanup_manager_free_ Manager *m = NULL;
|
||||
_cleanup_(manager_freep) Manager *m = NULL;
|
||||
int r;
|
||||
|
||||
assert(ret);
|
||||
@ -120,11 +398,9 @@ int manager_new(Manager **ret) {
|
||||
if (!m)
|
||||
return -ENOMEM;
|
||||
|
||||
r = set_fallback_dns(m, DNS_SERVERS);
|
||||
if (r < 0)
|
||||
return r;
|
||||
m->dns_ipv4_fd = m->dns_ipv6_fd = -1;
|
||||
|
||||
r = manager_parse_config_file(m);
|
||||
r = parse_dns_server_string(m, /* "172.31.0.125 2001:4860:4860::8888 2001:4860:4860::8889" */ DNS_SERVERS);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
@ -137,61 +413,96 @@ int manager_new(Manager **ret) {
|
||||
|
||||
sd_event_set_watchdog(m->event, true);
|
||||
|
||||
r = dns_scope_new(m, &m->unicast_scope, DNS_SCOPE_DNS);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = manager_network_monitor_listen(m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = manager_rtnl_listen(m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = manager_connect_bus(m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
*ret = m;
|
||||
m = NULL;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void manager_free(Manager *m) {
|
||||
Address *address;
|
||||
Manager *manager_free(Manager *m) {
|
||||
Link *l;
|
||||
|
||||
if (!m)
|
||||
return;
|
||||
return NULL;
|
||||
|
||||
while (m->dns_queries)
|
||||
dns_query_free(m->dns_queries);
|
||||
|
||||
hashmap_free(m->dns_query_transactions);
|
||||
|
||||
while ((l = hashmap_first(m->links)))
|
||||
link_free(l);
|
||||
hashmap_free(m->links);
|
||||
|
||||
dns_scope_free(m->unicast_scope);
|
||||
|
||||
while (m->dns_servers)
|
||||
dns_server_free(m->dns_servers);
|
||||
|
||||
sd_event_source_unref(m->network_event_source);
|
||||
sd_network_monitor_unref(m->network_monitor);
|
||||
|
||||
sd_event_source_unref(m->dns_ipv4_event_source);
|
||||
sd_event_source_unref(m->dns_ipv6_event_source);
|
||||
|
||||
safe_close(m->dns_ipv4_fd);
|
||||
safe_close(m->dns_ipv6_fd);
|
||||
|
||||
sd_event_source_unref(m->bus_retry_event_source);
|
||||
sd_bus_unref(m->bus);
|
||||
|
||||
sd_event_unref(m->event);
|
||||
|
||||
while ((address = m->fallback_dns)) {
|
||||
LIST_REMOVE(addresses, m->fallback_dns, address);
|
||||
free(address);
|
||||
}
|
||||
|
||||
free(m);
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static void append_dns(FILE *f, void *dns, unsigned char family, unsigned *count) {
|
||||
char buf[INET6_ADDRSTRLEN];
|
||||
const char *address;
|
||||
static void write_resolve_conf_server(DnsServer *s, FILE *f, unsigned *count) {
|
||||
_cleanup_free_ char *t = NULL;
|
||||
int r;
|
||||
|
||||
assert(s);
|
||||
assert(f);
|
||||
assert(dns);
|
||||
assert(count);
|
||||
|
||||
address = inet_ntop(family, dns, buf, INET6_ADDRSTRLEN);
|
||||
if (!address) {
|
||||
r = in_addr_to_string(s->family, &s->address, &t);
|
||||
if (r < 0) {
|
||||
log_warning("Invalid DNS address. Ignoring.");
|
||||
return;
|
||||
}
|
||||
|
||||
if (*count == MAXNS)
|
||||
fputs("# Too many DNS servers configured, the following entries "
|
||||
"may be ignored\n", f);
|
||||
|
||||
fprintf(f, "nameserver %s\n", address);
|
||||
fputs("# Too many DNS servers configured, the following entries may be ignored\n", f);
|
||||
|
||||
fprintf(f, "nameserver %s\n", t);
|
||||
(*count) ++;
|
||||
}
|
||||
|
||||
int manager_update_resolv_conf(Manager *m) {
|
||||
int manager_write_resolv_conf(Manager *m) {
|
||||
const char *path = "/run/systemd/resolve/resolv.conf";
|
||||
_cleanup_free_ char *temp_path = NULL;
|
||||
_cleanup_fclose_ FILE *f = NULL;
|
||||
_cleanup_free_ unsigned *indices = NULL;
|
||||
Address *address;
|
||||
unsigned count = 0;
|
||||
int n, r, i;
|
||||
DnsServer *s;
|
||||
Iterator i;
|
||||
Link *l;
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
|
||||
@ -207,108 +518,368 @@ int manager_update_resolv_conf(Manager *m) {
|
||||
"# resolv.conf(5) in a different way, replace the symlink by a\n"
|
||||
"# static file or a different symlink.\n\n", f);
|
||||
|
||||
n = sd_network_get_ifindices(&indices);
|
||||
if (n < 0)
|
||||
n = 0;
|
||||
HASHMAP_FOREACH(l, m->links, i) {
|
||||
LIST_FOREACH(servers, s, l->link_dns_servers)
|
||||
write_resolve_conf_server(s, f, &count);
|
||||
|
||||
for (i = 0; i < n; i++) {
|
||||
_cleanup_dhcp_lease_unref_ sd_dhcp_lease *lease = NULL;
|
||||
struct in_addr *nameservers;
|
||||
struct in6_addr *nameservers6;
|
||||
size_t nameservers_size;
|
||||
|
||||
r = sd_network_dhcp_use_dns(indices[i]);
|
||||
if (r > 0) {
|
||||
r = sd_network_get_dhcp_lease(indices[i], &lease);
|
||||
if (r >= 0) {
|
||||
r = sd_dhcp_lease_get_dns(lease, &nameservers, &nameservers_size);
|
||||
if (r >= 0) {
|
||||
unsigned j;
|
||||
|
||||
for (j = 0; j < nameservers_size; j++)
|
||||
append_dns(f, &nameservers[j], AF_INET, &count);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
r = sd_network_get_dns(indices[i], &nameservers, &nameservers_size);
|
||||
if (r >= 0) {
|
||||
unsigned j;
|
||||
|
||||
for (j = 0; j < nameservers_size; j++)
|
||||
append_dns(f, &nameservers[j], AF_INET, &count);
|
||||
|
||||
free(nameservers);
|
||||
}
|
||||
|
||||
r = sd_network_get_dns6(indices[i], &nameservers6, &nameservers_size);
|
||||
if (r >= 0) {
|
||||
unsigned j;
|
||||
|
||||
for (j = 0; j < nameservers_size; j++)
|
||||
append_dns(f, &nameservers6[j], AF_INET6, &count);
|
||||
|
||||
free(nameservers6);
|
||||
}
|
||||
LIST_FOREACH(servers, s, l->dhcp_dns_servers)
|
||||
write_resolve_conf_server(s, f, &count);
|
||||
}
|
||||
|
||||
LIST_FOREACH(addresses, address, m->fallback_dns)
|
||||
append_dns(f, &address->in_addr, address->family, &count);
|
||||
LIST_FOREACH(servers, s, m->dns_servers)
|
||||
write_resolve_conf_server(s, f, &count);
|
||||
|
||||
fflush(f);
|
||||
r = fflush_and_check(f);
|
||||
if (r < 0)
|
||||
goto fail;
|
||||
|
||||
if (ferror(f) || rename(temp_path, path) < 0) {
|
||||
if (rename(temp_path, path) < 0) {
|
||||
r = -errno;
|
||||
unlink(path);
|
||||
unlink(temp_path);
|
||||
return r;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
return 0;
|
||||
|
||||
fail:
|
||||
unlink(path);
|
||||
unlink(temp_path);
|
||||
return r;
|
||||
}
|
||||
|
||||
static int manager_network_event_handler(sd_event_source *s, int fd, uint32_t revents,
|
||||
void *userdata) {
|
||||
int manager_dns_ipv4_recv(Manager *m, DnsPacket **ret) {
|
||||
_cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
|
||||
struct msghdr mh = {};
|
||||
int fd, ms = 0, r;
|
||||
struct iovec iov;
|
||||
ssize_t l;
|
||||
|
||||
assert(m);
|
||||
assert(ret);
|
||||
|
||||
fd = manager_dns_ipv4_fd(m);
|
||||
if (fd < 0)
|
||||
return fd;
|
||||
|
||||
r = ioctl(fd, FIONREAD, &ms);
|
||||
if (r < 0)
|
||||
return -errno;
|
||||
if (ms < 0)
|
||||
return -EIO;
|
||||
|
||||
r = dns_packet_new(&p, ms);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
iov.iov_base = DNS_PACKET_DATA(p);
|
||||
iov.iov_len = p->allocated;
|
||||
|
||||
mh.msg_iov = &iov;
|
||||
mh.msg_iovlen = 1;
|
||||
|
||||
l = recvmsg(fd, &mh, 0);
|
||||
if (l < 0) {
|
||||
if (errno == EAGAIN)
|
||||
return 0;
|
||||
|
||||
return -errno;
|
||||
}
|
||||
|
||||
if (l <= 0)
|
||||
return -EIO;
|
||||
|
||||
p->size = (size_t) l;
|
||||
|
||||
*ret = p;
|
||||
p = NULL;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int manager_dns_ipv6_recv(Manager *m, DnsPacket **ret) {
|
||||
_cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
|
||||
struct msghdr mh = {};
|
||||
struct iovec iov;
|
||||
int fd, ms = 0, r;
|
||||
ssize_t l;
|
||||
|
||||
assert(m);
|
||||
assert(ret);
|
||||
|
||||
fd = manager_dns_ipv6_fd(m);
|
||||
if (fd < 0)
|
||||
return fd;
|
||||
|
||||
r = ioctl(fd, FIONREAD, &ms);
|
||||
if (r < 0)
|
||||
return -errno;
|
||||
if (ms < 0)
|
||||
return -EIO;
|
||||
|
||||
r = dns_packet_new(&p, ms);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
iov.iov_base = DNS_PACKET_DATA(p);
|
||||
iov.iov_len = p->allocated;
|
||||
|
||||
mh.msg_iov = &iov;
|
||||
mh.msg_iovlen = 1;
|
||||
|
||||
l = recvmsg(fd, &mh, 0);
|
||||
if (l < 0) {
|
||||
if (errno == EAGAIN)
|
||||
return 0;
|
||||
|
||||
return -errno;
|
||||
}
|
||||
|
||||
if (l <= 0)
|
||||
return -EIO;
|
||||
|
||||
p->size = (size_t) l;
|
||||
|
||||
*ret = p;
|
||||
p = NULL;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int on_dns_ipv4_packet(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
|
||||
_cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
|
||||
DnsQueryTransaction *t = NULL;
|
||||
Manager *m = userdata;
|
||||
int r;
|
||||
|
||||
r = manager_dns_ipv4_recv(m, &p);
|
||||
if (r <= 0)
|
||||
return r;
|
||||
|
||||
t = hashmap_get(m->dns_query_transactions, UINT_TO_PTR(DNS_PACKET_HEADER(p)->id));
|
||||
if (!t)
|
||||
return 0;
|
||||
|
||||
return dns_query_transaction_reply(t, p);
|
||||
}
|
||||
|
||||
static int on_dns_ipv6_packet(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
|
||||
_cleanup_(dns_packet_unrefp) DnsPacket *p = NULL;
|
||||
DnsQueryTransaction *t = NULL;
|
||||
Manager *m = userdata;
|
||||
int r;
|
||||
|
||||
r = manager_dns_ipv6_recv(m, &p);
|
||||
if (r <= 0)
|
||||
return r;
|
||||
|
||||
t = hashmap_get(m->dns_query_transactions, UINT_TO_PTR(DNS_PACKET_HEADER(p)->id));
|
||||
if (!t)
|
||||
return 0;
|
||||
|
||||
return dns_query_transaction_reply(t, p);
|
||||
}
|
||||
|
||||
int manager_dns_ipv4_fd(Manager *m) {
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
|
||||
r = manager_update_resolv_conf(m);
|
||||
if (r < 0)
|
||||
log_warning("Could not update resolv.conf: %s", strerror(-r));
|
||||
if (m->dns_ipv4_fd >= 0)
|
||||
return m->dns_ipv4_fd;
|
||||
|
||||
sd_network_monitor_flush(m->network_monitor);
|
||||
m->dns_ipv4_fd = socket(AF_INET, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
||||
if (m->dns_ipv4_fd < 0)
|
||||
return -errno;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int manager_network_monitor_listen(Manager *m) {
|
||||
_cleanup_event_source_unref_ sd_event_source *event_source = NULL;
|
||||
_cleanup_network_monitor_unref_ sd_network_monitor *monitor = NULL;
|
||||
int r, fd, events;
|
||||
|
||||
r = sd_network_monitor_new(NULL, &monitor);
|
||||
r = sd_event_add_io(m->event, &m->dns_ipv4_event_source, m->dns_ipv4_fd, EPOLLIN, on_dns_ipv4_packet, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
fd = sd_network_monitor_get_fd(monitor);
|
||||
return m->dns_ipv4_fd;
|
||||
}
|
||||
|
||||
int manager_dns_ipv6_fd(Manager *m) {
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
|
||||
if (m->dns_ipv6_fd >= 0)
|
||||
return m->dns_ipv6_fd;
|
||||
|
||||
m->dns_ipv6_fd = socket(AF_INET6, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
||||
if (m->dns_ipv6_fd < 0)
|
||||
return -errno;
|
||||
|
||||
r = sd_event_add_io(m->event, &m->dns_ipv6_event_source, m->dns_ipv6_fd, EPOLLIN, on_dns_ipv6_packet, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return m->dns_ipv6_fd;
|
||||
}
|
||||
|
||||
static int sendmsg_loop(int fd, struct msghdr *mh, int flags) {
|
||||
int r;
|
||||
|
||||
assert(fd >= 0);
|
||||
assert(mh);
|
||||
|
||||
for (;;) {
|
||||
if (sendmsg(fd, mh, flags) >= 0)
|
||||
return 0;
|
||||
|
||||
if (errno == EINTR)
|
||||
continue;
|
||||
|
||||
if (errno != EAGAIN)
|
||||
return -errno;
|
||||
|
||||
r = fd_wait_for_event(fd, POLLOUT, SEND_TIMEOUT_USEC);
|
||||
if (r < 0)
|
||||
return r;
|
||||
if (r == 0)
|
||||
return -ETIMEDOUT;
|
||||
}
|
||||
}
|
||||
|
||||
int manager_dns_ipv4_send(Manager *m, DnsServer *srv, int ifindex, DnsPacket *p) {
|
||||
union sockaddr_union sa = {
|
||||
.in.sin_family = AF_INET,
|
||||
.in.sin_port = htobe16(53),
|
||||
};
|
||||
struct msghdr mh = {};
|
||||
struct iovec iov;
|
||||
uint8_t control[CMSG_SPACE(sizeof(struct in_pktinfo))];
|
||||
int fd;
|
||||
|
||||
assert(m);
|
||||
assert(srv);
|
||||
assert(p);
|
||||
|
||||
fd = manager_dns_ipv4_fd(m);
|
||||
if (fd < 0)
|
||||
return fd;
|
||||
|
||||
events = sd_network_monitor_get_events(monitor);
|
||||
if (events < 0)
|
||||
return events;
|
||||
iov.iov_base = DNS_PACKET_DATA(p);
|
||||
iov.iov_len = p->size;
|
||||
|
||||
r = sd_event_add_io(m->event, &event_source, fd, events,
|
||||
&manager_network_event_handler, m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
sa.in.sin_addr = srv->address.in;
|
||||
|
||||
m->network_monitor = monitor;
|
||||
m->network_event_source = event_source;
|
||||
monitor = NULL;
|
||||
event_source = NULL;
|
||||
mh.msg_iov = &iov;
|
||||
mh.msg_iovlen = 1;
|
||||
mh.msg_name = &sa.sa;
|
||||
mh.msg_namelen = sizeof(sa.in);
|
||||
|
||||
return 0;
|
||||
if (ifindex > 0) {
|
||||
struct cmsghdr *cmsg;
|
||||
struct in_pktinfo *pi;
|
||||
|
||||
zero(control);
|
||||
|
||||
mh.msg_control = control;
|
||||
mh.msg_controllen = CMSG_LEN(sizeof(struct in_pktinfo));
|
||||
|
||||
cmsg = CMSG_FIRSTHDR(&mh);
|
||||
cmsg->cmsg_len = mh.msg_controllen;
|
||||
cmsg->cmsg_level = IPPROTO_IP;
|
||||
cmsg->cmsg_type = IP_PKTINFO;
|
||||
|
||||
pi = (struct in_pktinfo*) CMSG_DATA(cmsg);
|
||||
pi->ipi_ifindex = ifindex;
|
||||
}
|
||||
|
||||
return sendmsg_loop(fd, &mh, 0);
|
||||
}
|
||||
|
||||
int manager_dns_ipv6_send(Manager *m, DnsServer *srv, int ifindex, DnsPacket *p) {
|
||||
union sockaddr_union sa = {
|
||||
.in6.sin6_family = AF_INET6,
|
||||
.in6.sin6_port = htobe16(53),
|
||||
};
|
||||
|
||||
struct msghdr mh = {};
|
||||
struct iovec iov;
|
||||
uint8_t control[CMSG_SPACE(sizeof(struct in6_pktinfo))];
|
||||
int fd;
|
||||
|
||||
assert(m);
|
||||
assert(srv);
|
||||
assert(p);
|
||||
|
||||
fd = manager_dns_ipv6_fd(m);
|
||||
if (fd < 0)
|
||||
return fd;
|
||||
|
||||
iov.iov_base = DNS_PACKET_DATA(p);
|
||||
iov.iov_len = p->size;
|
||||
|
||||
sa.in6.sin6_addr = srv->address.in6;
|
||||
sa.in6.sin6_scope_id = ifindex;
|
||||
|
||||
mh.msg_iov = &iov;
|
||||
mh.msg_iovlen = 1;
|
||||
mh.msg_name = &sa.sa;
|
||||
mh.msg_namelen = sizeof(sa.in6);
|
||||
|
||||
if (ifindex > 0) {
|
||||
struct cmsghdr *cmsg;
|
||||
struct in6_pktinfo *pi;
|
||||
|
||||
zero(control);
|
||||
|
||||
mh.msg_control = control;
|
||||
mh.msg_controllen = CMSG_LEN(sizeof(struct in6_pktinfo));
|
||||
|
||||
cmsg = CMSG_FIRSTHDR(&mh);
|
||||
cmsg->cmsg_len = mh.msg_controllen;
|
||||
cmsg->cmsg_level = IPPROTO_IPV6;
|
||||
cmsg->cmsg_type = IPV6_PKTINFO;
|
||||
|
||||
pi = (struct in6_pktinfo*) CMSG_DATA(cmsg);
|
||||
pi->ipi6_ifindex = ifindex;
|
||||
}
|
||||
|
||||
return sendmsg_loop(fd, &mh, 0);
|
||||
}
|
||||
|
||||
DnsServer* manager_find_dns_server(Manager *m, unsigned char family, union in_addr_union *in_addr) {
|
||||
DnsServer *s;
|
||||
|
||||
assert(m);
|
||||
assert(in_addr);
|
||||
|
||||
LIST_FOREACH(servers, s, m->dns_servers) {
|
||||
|
||||
if (s->family == family &&
|
||||
in_addr_equal(family, &s->address, in_addr))
|
||||
return s;
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
DnsServer *manager_get_dns_server(Manager *m) {
|
||||
assert(m);
|
||||
|
||||
if (!m->current_dns_server)
|
||||
m->current_dns_server = m->dns_servers;
|
||||
|
||||
return m->current_dns_server;
|
||||
}
|
||||
|
||||
void manager_next_dns_server(Manager *m) {
|
||||
assert(m);
|
||||
|
||||
if (!m->current_dns_server) {
|
||||
m->current_dns_server = m->dns_servers;
|
||||
return;
|
||||
}
|
||||
|
||||
if (!m->current_dns_server)
|
||||
return;
|
||||
|
||||
if (m->current_dns_server->servers_next) {
|
||||
m->current_dns_server = m->current_dns_server->servers_next;
|
||||
return;
|
||||
}
|
||||
|
||||
m->current_dns_server = m->dns_servers;
|
||||
}
|
||||
|
@ -28,7 +28,7 @@
|
||||
#include "capability.h"
|
||||
|
||||
int main(int argc, char *argv[]) {
|
||||
_cleanup_manager_free_ Manager *m = NULL;
|
||||
_cleanup_(manager_freep) Manager *m = NULL;
|
||||
const char *user = "systemd-resolve";
|
||||
uid_t uid;
|
||||
gid_t gid;
|
||||
@ -43,13 +43,13 @@ int main(int argc, char *argv[]) {
|
||||
if (argc != 1) {
|
||||
log_error("This program takes no arguments.");
|
||||
r = -EINVAL;
|
||||
goto out;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
r = get_user_creds(&user, &uid, &gid, NULL, NULL);
|
||||
if (r < 0) {
|
||||
log_error("Cannot resolve user name %s: %s", user, strerror(-r));
|
||||
goto out;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
/* Always create the directory where resolv.conf will live */
|
||||
@ -57,33 +57,31 @@ int main(int argc, char *argv[]) {
|
||||
if (r < 0) {
|
||||
log_error("Could not create runtime directory: %s",
|
||||
strerror(-r));
|
||||
goto out;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
r = drop_privileges(uid, gid, 0);
|
||||
if (r < 0)
|
||||
goto out;
|
||||
goto finish;
|
||||
|
||||
assert_se(sigprocmask_many(SIG_BLOCK, SIGTERM, SIGINT, -1) == 0);
|
||||
|
||||
r = manager_new(&m);
|
||||
if (r < 0) {
|
||||
log_error("Could not create manager: %s", strerror(-r));
|
||||
goto out;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
r = manager_network_monitor_listen(m);
|
||||
if (r < 0) {
|
||||
log_error("Could not listen for network events: %s", strerror(-r));
|
||||
goto out;
|
||||
}
|
||||
r = manager_parse_config_file(m);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
/* write out default resolv.conf to avoid a
|
||||
* dangling symlink */
|
||||
r = manager_update_resolv_conf(m);
|
||||
/* write finish default resolv.conf to avoid a dangling
|
||||
* symlink */
|
||||
r = manager_write_resolv_conf(m);
|
||||
if (r < 0) {
|
||||
log_error("Could not create resolv.conf: %s", strerror(-r));
|
||||
goto out;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
sd_notify(false,
|
||||
@ -93,12 +91,11 @@ int main(int argc, char *argv[]) {
|
||||
r = sd_event_loop(m->event);
|
||||
if (r < 0) {
|
||||
log_error("Event loop failed: %s", strerror(-r));
|
||||
goto out;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
out:
|
||||
sd_notify(false,
|
||||
"STATUS=Shutting down...");
|
||||
finish:
|
||||
sd_notify(false, "STATUS=Shutting down...");
|
||||
|
||||
return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
|
||||
}
|
||||
|
@ -1,5 +1,7 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
#pragma once
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
@ -19,49 +21,76 @@
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#pragma once
|
||||
|
||||
#include "sd-event.h"
|
||||
#include "sd-network.h"
|
||||
|
||||
#include "sd-rtnl.h"
|
||||
#include "util.h"
|
||||
#include "list.h"
|
||||
#include "in-addr-util.h"
|
||||
#include "hashmap.h"
|
||||
|
||||
typedef struct Address Address;
|
||||
typedef struct Manager Manager;
|
||||
|
||||
struct Address {
|
||||
unsigned char family;
|
||||
|
||||
union in_addr_union in_addr;
|
||||
|
||||
LIST_FIELDS(Address, addresses);
|
||||
};
|
||||
#include "resolved-dns-query.h"
|
||||
#include "resolved-dns-server.h"
|
||||
#include "resolved-dns-scope.h"
|
||||
|
||||
struct Manager {
|
||||
sd_event *event;
|
||||
|
||||
LIST_HEAD(Address, fallback_dns);
|
||||
|
||||
/* network */
|
||||
sd_event_source *network_event_source;
|
||||
Hashmap *links;
|
||||
|
||||
sd_rtnl *rtnl;
|
||||
sd_event_source *rtnl_event_source;
|
||||
|
||||
sd_network_monitor *network_monitor;
|
||||
sd_event_source *network_event_source;
|
||||
|
||||
/* unicast dns */
|
||||
int dns_ipv4_fd;
|
||||
int dns_ipv6_fd;
|
||||
|
||||
sd_event_source *dns_ipv4_event_source;
|
||||
sd_event_source *dns_ipv6_event_source;
|
||||
|
||||
Hashmap *dns_query_transactions;
|
||||
LIST_HEAD(DnsQuery, dns_queries);
|
||||
|
||||
LIST_HEAD(DnsServer, dns_servers);
|
||||
DnsServer *current_dns_server;
|
||||
|
||||
LIST_HEAD(DnsScope, dns_scopes);
|
||||
DnsScope *unicast_scope;
|
||||
|
||||
/* dbus */
|
||||
sd_bus *bus;
|
||||
sd_event_source *bus_retry_event_source;
|
||||
};
|
||||
|
||||
/* Manager */
|
||||
|
||||
int manager_new(Manager **ret);
|
||||
void manager_free(Manager *m);
|
||||
Manager* manager_free(Manager *m);
|
||||
|
||||
int manager_update_resolv_conf(Manager *m);
|
||||
int manager_network_monitor_listen(Manager *m);
|
||||
int manager_parse_config_file(Manager *m);
|
||||
int manager_write_resolv_conf(Manager *m);
|
||||
|
||||
DnsServer* manager_find_dns_server(Manager *m, unsigned char family, union in_addr_union *in_addr);
|
||||
DnsServer *manager_get_dns_server(Manager *m);
|
||||
void manager_next_dns_server(Manager *m);
|
||||
|
||||
int manager_dns_ipv4_fd(Manager *m);
|
||||
int manager_dns_ipv4_send(Manager *m, DnsServer *srv, int ifindex, DnsPacket *p);
|
||||
int manager_dns_ipv4_recv(Manager *m, DnsPacket **ret);
|
||||
|
||||
int manager_dns_ipv6_fd(Manager *m);
|
||||
int manager_dns_ipv6_send(Manager *m, DnsServer *srv, int ifindex, DnsPacket *p);
|
||||
int manager_dns_ipv6_recv(Manager *m, DnsPacket **ret);
|
||||
|
||||
int manager_connect_bus(Manager *m);
|
||||
|
||||
DEFINE_TRIVIAL_CLEANUP_FUNC(Manager*, manager_free);
|
||||
#define _cleanup_manager_free_ _cleanup_(manager_freep)
|
||||
|
||||
const struct ConfigPerfItem* resolved_gperf_lookup(const char *key, unsigned length);
|
||||
|
||||
int config_parse_dnsv(const char *unit, const char *filename, unsigned line,
|
||||
const char *section, unsigned section_line, const char *lvalue,
|
||||
int ltype, const char *rvalue, void *data, void *userdata);
|
||||
int config_parse_dnsv(const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata);
|
||||
|
173
src/resolve/test-dns-domain.c
Normal file
173
src/resolve/test-dns-domain.c
Normal file
@ -0,0 +1,173 @@
|
||||
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
|
||||
|
||||
/***
|
||||
This file is part of systemd.
|
||||
|
||||
Copyright 2014 Lennart Poettering
|
||||
|
||||
systemd is free software; you can redistribute it and/or modify it
|
||||
under the terms of the GNU Lesser General Public License as published by
|
||||
the Free Software Foundation; either version 2.1 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
systemd is distributed in the hope that it will be useful, but
|
||||
WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
Lesser General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU Lesser General Public License
|
||||
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
||||
***/
|
||||
|
||||
#include "log.h"
|
||||
#include "resolved-dns-domain.h"
|
||||
|
||||
static void test_dns_label_unescape_one(const char *what, const char *expect, size_t buffer_sz, int ret) {
|
||||
char buffer[buffer_sz];
|
||||
int r;
|
||||
|
||||
r = dns_label_unescape(&what, buffer, buffer_sz);
|
||||
assert_se(r == ret);
|
||||
|
||||
if (r < 0)
|
||||
return;
|
||||
|
||||
assert_se(streq(buffer, expect));
|
||||
}
|
||||
|
||||
static void test_dns_label_unescape(void) {
|
||||
test_dns_label_unescape_one("hallo", "hallo", 6, 5);
|
||||
test_dns_label_unescape_one("hallo", "hallo", 4, -ENOSPC);
|
||||
test_dns_label_unescape_one("", "", 10, 0);
|
||||
test_dns_label_unescape_one("hallo\\.foobar", "hallo.foobar", 20, 12);
|
||||
test_dns_label_unescape_one("hallo.foobar", "hallo", 10, 5);
|
||||
test_dns_label_unescape_one("hallo\n.foobar", "hallo", 20, -EINVAL);
|
||||
test_dns_label_unescape_one("hallo\\", "hallo", 20, -EINVAL);
|
||||
test_dns_label_unescape_one("hallo\\032 ", "hallo ", 20, 7);
|
||||
test_dns_label_unescape_one(".", "", 20, 0);
|
||||
test_dns_label_unescape_one("..", "", 20, -EINVAL);
|
||||
test_dns_label_unescape_one(".foobar", "", 20, -EINVAL);
|
||||
test_dns_label_unescape_one("foobar.", "foobar", 20, 6);
|
||||
}
|
||||
|
||||
static void test_dns_label_escape_one(const char *what, size_t l, const char *expect, int ret) {
|
||||
_cleanup_free_ char *t = NULL;
|
||||
int r;
|
||||
|
||||
r = dns_label_escape(what, l, &t);
|
||||
assert(r == ret);
|
||||
|
||||
if (r < 0)
|
||||
return;
|
||||
|
||||
assert_se(streq_ptr(expect, t));
|
||||
}
|
||||
|
||||
static void test_dns_label_escape(void) {
|
||||
test_dns_label_escape_one("", 0, "", 0);
|
||||
test_dns_label_escape_one("hallo", 5, "hallo", 5);
|
||||
test_dns_label_escape_one("hallo", 6, NULL, -EINVAL);
|
||||
test_dns_label_escape_one("hallo hallo.foobar,waldi", 24, "hallo\\032hallo\\.foobar\\044waldi", 31);
|
||||
}
|
||||
|
||||
static void test_dns_name_normalize_one(const char *what, const char *expect, int ret) {
|
||||
_cleanup_free_ char *t = NULL;
|
||||
int r;
|
||||
|
||||
r = dns_name_normalize(what, &t);
|
||||
assert_se(r == ret);
|
||||
|
||||
if (r < 0)
|
||||
return;
|
||||
|
||||
assert_se(streq_ptr(expect, t));
|
||||
}
|
||||
|
||||
static void test_dns_name_normalize(void) {
|
||||
test_dns_name_normalize_one("", "", 0);
|
||||
test_dns_name_normalize_one("f", "f", 0);
|
||||
test_dns_name_normalize_one("f.waldi", "f.waldi", 0);
|
||||
test_dns_name_normalize_one("f \\032.waldi", "f\\032\\032.waldi", 0);
|
||||
test_dns_name_normalize_one("\\000", NULL, -EINVAL);
|
||||
test_dns_name_normalize_one("..", NULL, -EINVAL);
|
||||
test_dns_name_normalize_one(".foobar", NULL, -EINVAL);
|
||||
test_dns_name_normalize_one("foobar.", "foobar", 0);
|
||||
test_dns_name_normalize_one(".", "", 0);
|
||||
}
|
||||
|
||||
static void test_dns_name_equal_one(const char *a, const char *b, int ret) {
|
||||
int r;
|
||||
|
||||
r = dns_name_equal(a, b);
|
||||
assert_se(r == ret);
|
||||
|
||||
r = dns_name_equal(b, a);
|
||||
assert_se(r == ret);
|
||||
}
|
||||
|
||||
static void test_dns_name_equal(void) {
|
||||
test_dns_name_equal_one("", "", true);
|
||||
test_dns_name_equal_one("x", "x", true);
|
||||
test_dns_name_equal_one("x", "x.", true);
|
||||
test_dns_name_equal_one("abc.def", "abc.def", true);
|
||||
test_dns_name_equal_one("abc.def", "ABC.def", true);
|
||||
test_dns_name_equal_one("abc.def", "CBA.def", false);
|
||||
test_dns_name_equal_one("", "xxx", false);
|
||||
test_dns_name_equal_one("ab", "a", false);
|
||||
test_dns_name_equal_one("\\000", "xxxx", -EINVAL);
|
||||
test_dns_name_equal_one(".", "", true);
|
||||
test_dns_name_equal_one(".", ".", true);
|
||||
test_dns_name_equal_one("..", "..", -EINVAL);
|
||||
}
|
||||
|
||||
static void test_dns_name_endswith_one(const char *a, const char *b, int ret) {
|
||||
assert_se(dns_name_endswith(a, b) == ret);
|
||||
}
|
||||
|
||||
static void test_dns_name_endswith(void) {
|
||||
test_dns_name_endswith_one("", "", true);
|
||||
test_dns_name_endswith_one("", "xxx", false);
|
||||
test_dns_name_endswith_one("xxx", "", true);
|
||||
test_dns_name_endswith_one("x", "x", true);
|
||||
test_dns_name_endswith_one("x", "y", false);
|
||||
test_dns_name_endswith_one("x.y", "y", true);
|
||||
test_dns_name_endswith_one("x.y", "Y", true);
|
||||
test_dns_name_endswith_one("x.y", "x", false);
|
||||
test_dns_name_endswith_one("x.y.z", "Z", true);
|
||||
test_dns_name_endswith_one("x.y.z", "y.Z", true);
|
||||
test_dns_name_endswith_one("x.y.z", "x.y.Z", true);
|
||||
test_dns_name_endswith_one("x.y.z", "waldo", false);
|
||||
test_dns_name_endswith_one("x.y.z.u.v.w", "y.z", false);
|
||||
test_dns_name_endswith_one("x.y.z.u.v.w", "u.v.w", true);
|
||||
test_dns_name_endswith_one("x.y\001.z", "waldo", -EINVAL);
|
||||
}
|
||||
|
||||
static void test_dns_name_root(void) {
|
||||
assert_se(dns_name_root("") == true);
|
||||
assert_se(dns_name_root(".") == true);
|
||||
assert_se(dns_name_root("xxx") == false);
|
||||
assert_se(dns_name_root("xxx.") == false);
|
||||
assert_se(dns_name_root("..") == -EINVAL);
|
||||
}
|
||||
|
||||
static void test_dns_name_single_label(void) {
|
||||
assert_se(dns_name_single_label("") == false);
|
||||
assert_se(dns_name_single_label(".") == false);
|
||||
assert_se(dns_name_single_label("..") == -EINVAL);
|
||||
assert_se(dns_name_single_label("x") == true);
|
||||
assert_se(dns_name_single_label("x.") == true);
|
||||
assert_se(dns_name_single_label("xx.yy") == false);
|
||||
}
|
||||
|
||||
int main(int argc, char *argv[]) {
|
||||
|
||||
test_dns_label_unescape();
|
||||
test_dns_label_escape();
|
||||
test_dns_name_normalize();
|
||||
test_dns_name_equal();
|
||||
test_dns_name_endswith();
|
||||
test_dns_name_root();
|
||||
test_dns_name_single_label();
|
||||
|
||||
return 0;
|
||||
}
|
@ -59,3 +59,7 @@
|
||||
#define BUS_ERROR_AUTOMATIC_TIME_SYNC_ENABLED "org.freedesktop.timedate1.AutomaticTimeSyncEnabled"
|
||||
|
||||
#define BUS_ERROR_NO_SUCH_PROCESS "org.freedesktop.systemd1.NoSuchProcess"
|
||||
|
||||
#define BUS_ERROR_NO_NAME_SERVERS "org.freedesktop.resolve1.NoNameServers"
|
||||
#define BUS_ERROR_INVALID_REPLY "org.freedesktop.resolve1.InvalidReply"
|
||||
#define _BUS_ERROR_DNS "org.freedesktop.resolve1.DnsError."
|
||||
|
@ -209,3 +209,25 @@ int in_addr_from_string(unsigned family, const char *s, union in_addr_union *ret
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int in_addr_from_string_auto(const char *s, unsigned *family, union in_addr_union *ret) {
|
||||
int r;
|
||||
|
||||
assert(s);
|
||||
assert(family);
|
||||
assert(ret);
|
||||
|
||||
r = in_addr_from_string(AF_INET, s, ret);
|
||||
if (r >= 0) {
|
||||
*family = AF_INET;
|
||||
return 0;
|
||||
}
|
||||
|
||||
r = in_addr_from_string(AF_INET6, s, ret);
|
||||
if (r >= 0) {
|
||||
*family = AF_INET6;
|
||||
return 0;
|
||||
}
|
||||
|
||||
return -EINVAL;
|
||||
}
|
||||
|
@ -37,6 +37,7 @@ int in_addr_prefix_intersect(unsigned family, const union in_addr_union *a, unsi
|
||||
int in_addr_prefix_next(unsigned family, union in_addr_union *u, unsigned prefixlen);
|
||||
int in_addr_to_string(unsigned family, const union in_addr_union *u, char **ret);
|
||||
int in_addr_from_string(unsigned family, const char *s, union in_addr_union *ret);
|
||||
int in_addr_from_string_auto(const char *s, unsigned *family, union in_addr_union *ret);
|
||||
|
||||
static inline size_t PROTO_ADDRESS_SIZE(int proto) {
|
||||
assert(proto == AF_INET || proto == AF_INET6);
|
||||
|
@ -241,6 +241,9 @@ static inline unsigned long ALIGN_POWER2(unsigned long u) {
|
||||
#define PTR_TO_UINT64(p) ((uint64_t) ((uintptr_t) (p)))
|
||||
#define UINT64_TO_PTR(u) ((void *) ((uintptr_t) (u)))
|
||||
|
||||
#define PTR_TO_SIZE(p) ((size_t) ((uintptr_t) (p)))
|
||||
#define SIZE_TO_PTR(u) ((void *) ((uintptr_t) (u)))
|
||||
|
||||
#define memzero(x,l) (memset((x), 0, (l)))
|
||||
#define zero(x) (memzero(&(x), sizeof(x)))
|
||||
|
||||
|
@ -31,6 +31,7 @@ struct sd_dhcp_route;
|
||||
|
||||
sd_dhcp_lease *sd_dhcp_lease_ref(sd_dhcp_lease *lease);
|
||||
sd_dhcp_lease *sd_dhcp_lease_unref(sd_dhcp_lease *lease);
|
||||
|
||||
int sd_dhcp_lease_get_address(sd_dhcp_lease *lease, struct in_addr *addr);
|
||||
int sd_dhcp_lease_get_lifetime(sd_dhcp_lease *lease, uint32_t *lifetime);
|
||||
int sd_dhcp_lease_get_netmask(sd_dhcp_lease *lease, struct in_addr *addr);
|
||||
@ -44,4 +45,5 @@ int sd_dhcp_lease_get_domainname(sd_dhcp_lease *lease, const char **domainname);
|
||||
int sd_dhcp_lease_get_hostname(sd_dhcp_lease *lease, const char **hostname);
|
||||
int sd_dhcp_lease_get_root_path(sd_dhcp_lease *lease, const char **root_path);
|
||||
int sd_dhcp_lease_get_routes(sd_dhcp_lease *lease, struct sd_dhcp_route **routes, size_t *routes_size);
|
||||
|
||||
#endif
|
||||
|
Loading…
Reference in New Issue
Block a user