]> git.proxmox.com Git - systemd.git/blame - src/resolve/resolved-varlink.c
New upstream version 252
[systemd.git] / src / resolve / resolved-varlink.c
CommitLineData
a032b68d
MB
1/* SPDX-License-Identifier: LGPL-2.1-or-later */
2
086111aa 3#include "glyph-util.h"
a032b68d
MB
4#include "in-addr-util.h"
5#include "resolved-dns-synthesize.h"
6#include "resolved-varlink.h"
7#include "socket-netlink.h"
8
9typedef struct LookupParameters {
10 int ifindex;
11 uint64_t flags;
12 int family;
13 union in_addr_union address;
14 size_t address_size;
15 char *name;
16} LookupParameters;
17
18static void lookup_parameters_destroy(LookupParameters *p) {
19 assert(p);
20 free(p->name);
21}
22
23static int reply_query_state(DnsQuery *q) {
24
25 assert(q);
26 assert(q->varlink_request);
27
28 switch (q->state) {
29
30 case DNS_TRANSACTION_NO_SERVERS:
31 return varlink_error(q->varlink_request, "io.systemd.Resolve.NoNameServers", NULL);
32
33 case DNS_TRANSACTION_TIMEOUT:
34 return varlink_error(q->varlink_request, "io.systemd.Resolve.QueryTimedOut", NULL);
35
36 case DNS_TRANSACTION_ATTEMPTS_MAX_REACHED:
37 return varlink_error(q->varlink_request, "io.systemd.Resolve.MaxAttemptsReached", NULL);
38
39 case DNS_TRANSACTION_INVALID_REPLY:
40 return varlink_error(q->varlink_request, "io.systemd.Resolve.InvalidReply", NULL);
41
42 case DNS_TRANSACTION_ERRNO:
43 return varlink_error_errno(q->varlink_request, q->answer_errno);
44
45 case DNS_TRANSACTION_ABORTED:
46 return varlink_error(q->varlink_request, "io.systemd.Resolve.QueryAborted", NULL);
47
48 case DNS_TRANSACTION_DNSSEC_FAILED:
49 return varlink_errorb(q->varlink_request, "io.systemd.Resolve.DNSSECValidationFailed",
50 JSON_BUILD_OBJECT(JSON_BUILD_PAIR("result", JSON_BUILD_STRING(dnssec_result_to_string(q->answer_dnssec_result)))));
51
52 case DNS_TRANSACTION_NO_TRUST_ANCHOR:
53 return varlink_error(q->varlink_request, "io.systemd.Resolve.NoTrustAnchor", NULL);
54
55 case DNS_TRANSACTION_RR_TYPE_UNSUPPORTED:
56 return varlink_error(q->varlink_request, "io.systemd.Resolve.ResourceRecordTypeUnsupported", NULL);
57
58 case DNS_TRANSACTION_NETWORK_DOWN:
59 return varlink_error(q->varlink_request, "io.systemd.Resolve.NetworkDown", NULL);
60
3a6ce677
BR
61 case DNS_TRANSACTION_NO_SOURCE:
62 return varlink_error(q->varlink_request, "io.systemd.Resolve.NoSource", NULL);
63
64 case DNS_TRANSACTION_STUB_LOOP:
65 return varlink_error(q->varlink_request, "io.systemd.Resolve.StubLoop", NULL);
66
a032b68d
MB
67 case DNS_TRANSACTION_NOT_FOUND:
68 /* We return this as NXDOMAIN. This is only generated when a host doesn't implement LLMNR/TCP, and we
69 * thus quickly know that we cannot resolve an in-addr.arpa or ip6.arpa address. */
70 return varlink_errorb(q->varlink_request, "io.systemd.Resolve.DNSError",
71 JSON_BUILD_OBJECT(JSON_BUILD_PAIR("rcode", JSON_BUILD_INTEGER(DNS_RCODE_NXDOMAIN))));
72
73 case DNS_TRANSACTION_RCODE_FAILURE:
74 return varlink_errorb(q->varlink_request, "io.systemd.Resolve.DNSError",
75 JSON_BUILD_OBJECT(JSON_BUILD_PAIR("rcode", JSON_BUILD_INTEGER(q->answer_rcode))));
76
77 case DNS_TRANSACTION_NULL:
78 case DNS_TRANSACTION_PENDING:
79 case DNS_TRANSACTION_VALIDATING:
80 case DNS_TRANSACTION_SUCCESS:
81 default:
ea0999c9 82 assert_not_reached();
a032b68d
MB
83 }
84}
85
86static void vl_on_disconnect(VarlinkServer *s, Varlink *link, void *userdata) {
87 DnsQuery *q;
88
89 assert(s);
90 assert(link);
91
92 q = varlink_get_userdata(link);
93 if (!q)
94 return;
95
96 if (!DNS_TRANSACTION_IS_LIVE(q->state))
97 return;
98
99 log_debug("Client of active query vanished, aborting query.");
100 dns_query_complete(q, DNS_TRANSACTION_ABORTED);
101}
102
086111aa
LB
103static void vl_on_notification_disconnect(VarlinkServer *s, Varlink *link, void *userdata) {
104 Manager *m = ASSERT_PTR(userdata);
105
106 assert(s);
107 assert(link);
108
109 Varlink *removed_link = set_remove(m->varlink_subscription, link);
110 if (removed_link) {
111 varlink_unref(removed_link);
112 log_debug("%u monitor clients remain active", set_size(m->varlink_subscription));
113 }
114}
115
a032b68d
MB
116static bool validate_and_mangle_flags(
117 const char *name,
118 uint64_t *flags,
119 uint64_t ok) {
120
121 assert(flags);
122
123 /* This checks that the specified client-provided flags parameter actually makes sense, and mangles
124 * it slightly. Specifically:
125 *
3a6ce677 126 * 1. We check that only the protocol flags and a bunch of NO_XYZ flags are on at most, plus the
a032b68d
MB
127 * method-specific flags specified in 'ok'.
128 *
129 * 2. If no protocols are enabled we automatically convert that to "all protocols are enabled".
130 *
131 * The second rule means that clients can just pass 0 as flags for the common case, and all supported
132 * protocols are enabled. Moreover it's useful so that client's do not have to be aware of all
133 * protocols implemented in resolved, but can use 0 as protocols flags set as indicator for
134 * "everything".
135 */
136
3a6ce677
BR
137 if (*flags & ~(SD_RESOLVED_PROTOCOLS_ALL|
138 SD_RESOLVED_NO_CNAME|
139 SD_RESOLVED_NO_VALIDATE|
140 SD_RESOLVED_NO_SYNTHESIZE|
141 SD_RESOLVED_NO_CACHE|
142 SD_RESOLVED_NO_ZONE|
143 SD_RESOLVED_NO_TRUST_ANCHOR|
144 SD_RESOLVED_NO_NETWORK|
145 ok))
a032b68d
MB
146 return false;
147
148 if ((*flags & SD_RESOLVED_PROTOCOLS_ALL) == 0) /* If no protocol is enabled, enable all */
149 *flags |= SD_RESOLVED_PROTOCOLS_ALL;
150
151 /* If the SD_RESOLVED_NO_SEARCH flag is acceptable, and the query name is dot-suffixed, turn off
152 * search domains. Note that DNS name normalization drops the dot suffix, hence we propagate this
153 * into the flags field as early as we can. */
154 if (name && FLAGS_SET(ok, SD_RESOLVED_NO_SEARCH) && dns_name_dot_suffixed(name) > 0)
155 *flags |= SD_RESOLVED_NO_SEARCH;
156
157 return true;
158}
159
9cde670f 160static void vl_method_resolve_hostname_complete(DnsQuery *query) {
a032b68d
MB
161 _cleanup_(dns_resource_record_unrefp) DnsResourceRecord *canonical = NULL;
162 _cleanup_(json_variant_unrefp) JsonVariant *array = NULL;
9cde670f 163 _cleanup_(dns_query_freep) DnsQuery *q = query;
a032b68d
MB
164 _cleanup_free_ char *normalized = NULL;
165 DnsResourceRecord *rr;
166 DnsQuestion *question;
167 int ifindex, r;
168
169 assert(q);
170
171 if (q->state != DNS_TRANSACTION_SUCCESS) {
172 r = reply_query_state(q);
173 goto finish;
174 }
175
3a6ce677 176 r = dns_query_process_cname_many(q);
a032b68d
MB
177 if (r == -ELOOP) {
178 r = varlink_error(q->varlink_request, "io.systemd.Resolve.CNAMELoop", NULL);
179 goto finish;
180 }
181 if (r < 0)
182 goto finish;
9cde670f
LB
183 if (r == DNS_QUERY_CNAME) {
184 /* This was a cname, and the query was restarted. */
185 TAKE_PTR(q);
a032b68d 186 return;
9cde670f 187 }
a032b68d
MB
188
189 question = dns_query_question_for_protocol(q, q->answer_protocol);
190
191 DNS_ANSWER_FOREACH_IFINDEX(rr, ifindex, q->answer) {
192 _cleanup_(json_variant_unrefp) JsonVariant *entry = NULL;
193 int family;
194 const void *p;
195
196 r = dns_question_matches_rr(question, rr, DNS_SEARCH_DOMAIN_NAME(q->answer_search_domain));
197 if (r < 0)
198 goto finish;
199 if (r == 0)
200 continue;
201
202 if (rr->key->type == DNS_TYPE_A) {
203 family = AF_INET;
204 p = &rr->a.in_addr;
205 } else if (rr->key->type == DNS_TYPE_AAAA) {
206 family = AF_INET6;
207 p = &rr->aaaa.in6_addr;
208 } else {
209 r = -EAFNOSUPPORT;
210 goto finish;
211 }
212
213 r = json_build(&entry,
214 JSON_BUILD_OBJECT(
3a6ce677 215 JSON_BUILD_PAIR_CONDITION(ifindex > 0, "ifindex", JSON_BUILD_INTEGER(ifindex)),
a032b68d
MB
216 JSON_BUILD_PAIR("family", JSON_BUILD_INTEGER(family)),
217 JSON_BUILD_PAIR("address", JSON_BUILD_BYTE_ARRAY(p, FAMILY_ADDRESS_SIZE(family)))));
218 if (r < 0)
219 goto finish;
220
221 if (!canonical)
222 canonical = dns_resource_record_ref(rr);
223
224 r = json_variant_append_array(&array, entry);
225 if (r < 0)
226 goto finish;
227 }
228
229 if (json_variant_is_blank_object(array)) {
230 r = varlink_error(q->varlink_request, "io.systemd.Resolve.NoSuchResourceRecord", NULL);
231 goto finish;
232 }
233
234 assert(canonical);
235 r = dns_name_normalize(dns_resource_key_name(canonical->key), 0, &normalized);
236 if (r < 0)
237 goto finish;
238
239 r = varlink_replyb(q->varlink_request,
240 JSON_BUILD_OBJECT(
241 JSON_BUILD_PAIR("addresses", JSON_BUILD_VARIANT(array)),
242 JSON_BUILD_PAIR("name", JSON_BUILD_STRING(normalized)),
3a6ce677 243 JSON_BUILD_PAIR("flags", JSON_BUILD_INTEGER(dns_query_reply_flags_make(q)))));
a032b68d
MB
244finish:
245 if (r < 0) {
246 log_error_errno(r, "Failed to send hostname reply: %m");
247 r = varlink_error_errno(q->varlink_request, r);
248 }
a032b68d
MB
249}
250
251static int parse_as_address(Varlink *link, LookupParameters *p) {
252 _cleanup_free_ char *canonical = NULL;
253 int r, ff, parsed_ifindex, ifindex;
254 union in_addr_union parsed;
255
256 assert(link);
257 assert(p);
258
259 /* Check if this parses as literal address. If so, just parse it and return that, do not involve networking */
260 r = in_addr_ifindex_from_string_auto(p->name, &ff, &parsed, &parsed_ifindex);
261 if (r < 0)
262 return 0; /* not a literal address */
263
264 /* Make sure the data we parsed matches what is requested */
265 if ((p->family != AF_UNSPEC && ff != p->family) ||
266 (p->ifindex > 0 && parsed_ifindex > 0 && parsed_ifindex != p->ifindex))
267 return varlink_error(link, "io.systemd.Resolve.NoSuchResourceRecord", NULL);
268
269 ifindex = parsed_ifindex > 0 ? parsed_ifindex : p->ifindex;
270
271 /* Reformat the address as string, to return as canonicalized name */
272 r = in_addr_ifindex_to_string(ff, &parsed, ifindex, &canonical);
273 if (r < 0)
274 return r;
275
276 return varlink_replyb(
277 link,
278 JSON_BUILD_OBJECT(
279 JSON_BUILD_PAIR("addresses",
280 JSON_BUILD_ARRAY(
281 JSON_BUILD_OBJECT(
282 JSON_BUILD_PAIR_CONDITION(ifindex > 0, "ifindex", JSON_BUILD_INTEGER(ifindex)),
283 JSON_BUILD_PAIR("family", JSON_BUILD_INTEGER(ff)),
284 JSON_BUILD_PAIR("address", JSON_BUILD_BYTE_ARRAY(&parsed, FAMILY_ADDRESS_SIZE(ff)))))),
285 JSON_BUILD_PAIR("name", JSON_BUILD_STRING(canonical)),
3a6ce677
BR
286 JSON_BUILD_PAIR("flags", JSON_BUILD_INTEGER(SD_RESOLVED_FLAGS_MAKE(dns_synthesize_protocol(p->flags), ff, true, true)|
287 SD_RESOLVED_SYNTHETIC))));
a032b68d
MB
288}
289
290static int vl_method_resolve_hostname(Varlink *link, JsonVariant *parameters, VarlinkMethodFlags flags, void *userdata) {
291 static const JsonDispatch dispatch_table[] = {
292 { "ifindex", JSON_VARIANT_UNSIGNED, json_dispatch_int, offsetof(LookupParameters, ifindex), 0 },
293 { "name", JSON_VARIANT_STRING, json_dispatch_string, offsetof(LookupParameters, name), JSON_MANDATORY },
294 { "family", JSON_VARIANT_UNSIGNED, json_dispatch_int, offsetof(LookupParameters, family), 0 },
295 { "flags", JSON_VARIANT_UNSIGNED, json_dispatch_uint64, offsetof(LookupParameters, flags), 0 },
296 {}
297 };
298
299 _cleanup_(dns_question_unrefp) DnsQuestion *question_idna = NULL, *question_utf8 = NULL;
300 _cleanup_(lookup_parameters_destroy) LookupParameters p = {
301 .family = AF_UNSPEC,
302 };
9cde670f 303 _cleanup_(dns_query_freep) DnsQuery *q = NULL;
3a6ce677 304 Manager *m;
a032b68d
MB
305 int r;
306
307 assert(link);
3a6ce677
BR
308
309 m = varlink_server_get_userdata(varlink_get_server(link));
a032b68d
MB
310 assert(m);
311
312 if (FLAGS_SET(flags, VARLINK_METHOD_ONEWAY))
313 return -EINVAL;
314
315 r = json_dispatch(parameters, dispatch_table, NULL, 0, &p);
316 if (r < 0)
317 return r;
318
319 if (p.ifindex < 0)
320 return varlink_error_invalid_parameter(link, JSON_VARIANT_STRING_CONST("ifindex"));
321
322 r = dns_name_is_valid(p.name);
323 if (r < 0)
324 return r;
325 if (r == 0)
326 return varlink_error_invalid_parameter(link, JSON_VARIANT_STRING_CONST("name"));
327
328 if (!IN_SET(p.family, AF_UNSPEC, AF_INET, AF_INET6))
329 return varlink_error_invalid_parameter(link, JSON_VARIANT_STRING_CONST("family"));
330
331 if (!validate_and_mangle_flags(p.name, &p.flags, SD_RESOLVED_NO_SEARCH))
332 return varlink_error_invalid_parameter(link, JSON_VARIANT_STRING_CONST("flags"));
333
334 r = parse_as_address(link, &p);
335 if (r != 0)
336 return r;
337
338 r = dns_question_new_address(&question_utf8, p.family, p.name, false);
339 if (r < 0)
340 return r;
341
342 r = dns_question_new_address(&question_idna, p.family, p.name, true);
343 if (r < 0 && r != -EALREADY)
344 return r;
345
3a6ce677 346 r = dns_query_new(m, &q, question_utf8, question_idna ?: question_utf8, NULL, p.ifindex, p.flags);
a032b68d
MB
347 if (r < 0)
348 return r;
349
350 q->varlink_request = varlink_ref(link);
351 varlink_set_userdata(link, q);
352 q->request_family = p.family;
353 q->complete = vl_method_resolve_hostname_complete;
354
355 r = dns_query_go(q);
356 if (r < 0)
9cde670f 357 return r;
a032b68d 358
9cde670f 359 TAKE_PTR(q);
a032b68d 360 return 1;
a032b68d
MB
361}
362
363static int json_dispatch_address(const char *name, JsonVariant *variant, JsonDispatchFlags flags, void *userdata) {
086111aa 364 LookupParameters *p = ASSERT_PTR(userdata);
a032b68d
MB
365 union in_addr_union buf = {};
366 JsonVariant *i;
367 size_t n, k = 0;
368
369 assert(variant);
a032b68d
MB
370
371 if (!json_variant_is_array(variant))
372 return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array.", strna(name));
373
374 n = json_variant_elements(variant);
375 if (!IN_SET(n, 4, 16))
376 return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is array of unexpected size.", strna(name));
377
378 JSON_VARIANT_ARRAY_FOREACH(i, variant) {
ea0999c9 379 int64_t b;
a032b68d
MB
380
381 if (!json_variant_is_integer(i))
382 return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "Element %zu of JSON field '%s' is not an integer.", k, strna(name));
383
384 b = json_variant_integer(i);
385 if (b < 0 || b > 0xff)
086111aa
LB
386 return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL),
387 "Element %zu of JSON field '%s' is out of range 0%s255.",
388 k, strna(name), special_glyph(SPECIAL_GLYPH_ELLIPSIS));
a032b68d
MB
389
390 buf.bytes[k++] = (uint8_t) b;
391 }
392
393 p->address = buf;
394 p->address_size = k;
395
396 return 0;
397}
398
9cde670f 399static void vl_method_resolve_address_complete(DnsQuery *query) {
a032b68d 400 _cleanup_(json_variant_unrefp) JsonVariant *array = NULL;
9cde670f 401 _cleanup_(dns_query_freep) DnsQuery *q = query;
a032b68d
MB
402 DnsQuestion *question;
403 DnsResourceRecord *rr;
404 int ifindex, r;
405
406 assert(q);
407
408 if (q->state != DNS_TRANSACTION_SUCCESS) {
409 r = reply_query_state(q);
410 goto finish;
411 }
412
3a6ce677 413 r = dns_query_process_cname_many(q);
a032b68d
MB
414 if (r == -ELOOP) {
415 r = varlink_error(q->varlink_request, "io.systemd.Resolve.CNAMELoop", NULL);
416 goto finish;
417 }
418 if (r < 0)
419 goto finish;
9cde670f
LB
420 if (r == DNS_QUERY_CNAME) {
421 /* This was a cname, and the query was restarted. */
422 TAKE_PTR(q);
a032b68d 423 return;
9cde670f 424 }
a032b68d
MB
425
426 question = dns_query_question_for_protocol(q, q->answer_protocol);
427
428 DNS_ANSWER_FOREACH_IFINDEX(rr, ifindex, q->answer) {
429 _cleanup_(json_variant_unrefp) JsonVariant *entry = NULL;
430 _cleanup_free_ char *normalized = NULL;
431
432 r = dns_question_matches_rr(question, rr, NULL);
433 if (r < 0)
434 goto finish;
435 if (r == 0)
436 continue;
437
438 r = dns_name_normalize(rr->ptr.name, 0, &normalized);
439 if (r < 0)
440 goto finish;
441
442 r = json_build(&entry,
443 JSON_BUILD_OBJECT(
3a6ce677 444 JSON_BUILD_PAIR_CONDITION(ifindex > 0, "ifindex", JSON_BUILD_INTEGER(ifindex)),
a032b68d
MB
445 JSON_BUILD_PAIR("name", JSON_BUILD_STRING(normalized))));
446 if (r < 0)
447 goto finish;
448
449 r = json_variant_append_array(&array, entry);
450 if (r < 0)
451 goto finish;
452 }
453
454 if (json_variant_is_blank_object(array)) {
455 r = varlink_error(q->varlink_request, "io.systemd.Resolve.NoSuchResourceRecord", NULL);
456 goto finish;
457 }
458
459 r = varlink_replyb(q->varlink_request,
460 JSON_BUILD_OBJECT(
461 JSON_BUILD_PAIR("names", JSON_BUILD_VARIANT(array)),
3a6ce677 462 JSON_BUILD_PAIR("flags", JSON_BUILD_INTEGER(dns_query_reply_flags_make(q)))));
a032b68d
MB
463finish:
464 if (r < 0) {
465 log_error_errno(r, "Failed to send address reply: %m");
466 r = varlink_error_errno(q->varlink_request, r);
467 }
a032b68d
MB
468}
469
470static int vl_method_resolve_address(Varlink *link, JsonVariant *parameters, VarlinkMethodFlags flags, void *userdata) {
471 static const JsonDispatch dispatch_table[] = {
472 { "ifindex", JSON_VARIANT_UNSIGNED, json_dispatch_int, offsetof(LookupParameters, ifindex), 0 },
473 { "family", JSON_VARIANT_UNSIGNED, json_dispatch_int, offsetof(LookupParameters, family), JSON_MANDATORY },
474 { "address", JSON_VARIANT_ARRAY, json_dispatch_address, 0, JSON_MANDATORY },
475 { "flags", JSON_VARIANT_UNSIGNED, json_dispatch_uint64, offsetof(LookupParameters, flags), 0 },
476 {}
477 };
478
479 _cleanup_(dns_question_unrefp) DnsQuestion *question = NULL;
480 _cleanup_(lookup_parameters_destroy) LookupParameters p = {
481 .family = AF_UNSPEC,
482 };
9cde670f 483 _cleanup_(dns_query_freep) DnsQuery *q = NULL;
3a6ce677 484 Manager *m;
a032b68d
MB
485 int r;
486
487 assert(link);
3a6ce677
BR
488
489 m = varlink_server_get_userdata(varlink_get_server(link));
a032b68d
MB
490 assert(m);
491
492 if (FLAGS_SET(flags, VARLINK_METHOD_ONEWAY))
493 return -EINVAL;
494
495 r = json_dispatch(parameters, dispatch_table, NULL, 0, &p);
496 if (r < 0)
497 return r;
498
499 if (p.ifindex < 0)
500 return varlink_error_invalid_parameter(link, JSON_VARIANT_STRING_CONST("ifindex"));
501
9cde670f 502 if (!IN_SET(p.family, AF_INET, AF_INET6))
a032b68d
MB
503 return varlink_error_invalid_parameter(link, JSON_VARIANT_STRING_CONST("family"));
504
505 if (FAMILY_ADDRESS_SIZE(p.family) != p.address_size)
dafa4901 506 return varlink_error(link, "io.systemd.Resolve.BadAddressSize", NULL);
a032b68d
MB
507
508 if (!validate_and_mangle_flags(NULL, &p.flags, 0))
509 return varlink_error_invalid_parameter(link, JSON_VARIANT_STRING_CONST("flags"));
510
511 r = dns_question_new_reverse(&question, p.family, &p.address);
512 if (r < 0)
513 return r;
514
3a6ce677 515 r = dns_query_new(m, &q, question, question, NULL, p.ifindex, p.flags|SD_RESOLVED_NO_SEARCH);
a032b68d
MB
516 if (r < 0)
517 return r;
518
519 q->varlink_request = varlink_ref(link);
520 varlink_set_userdata(link, q);
521
522 q->request_family = p.family;
523 q->request_address = p.address;
524 q->complete = vl_method_resolve_address_complete;
525
526 r = dns_query_go(q);
527 if (r < 0)
9cde670f 528 return r;
a032b68d 529
9cde670f 530 TAKE_PTR(q);
a032b68d 531 return 1;
a032b68d
MB
532}
533
086111aa
LB
534static int vl_method_subscribe_dns_resolves(Varlink *link, JsonVariant *parameters, VarlinkMethodFlags flags, void *userdata) {
535 Manager *m;
536 int r;
537
538 assert(link);
539
540 m = ASSERT_PTR(varlink_server_get_userdata(varlink_get_server(link)));
541
542 /* if the client didn't set the more flag, it is using us incorrectly */
543 if (!FLAGS_SET(flags, VARLINK_METHOD_MORE))
544 return varlink_error_invalid_parameter(link, NULL);
545
546 if (json_variant_elements(parameters) > 0)
547 return varlink_error_invalid_parameter(link, parameters);
548
549 /* Send a ready message to the connecting client, to indicate that we are now listinening, and all
550 * queries issued after the point the client sees this will also be reported to the client. */
551 r = varlink_notifyb(link,
552 JSON_BUILD_OBJECT(JSON_BUILD_PAIR("ready", JSON_BUILD_BOOLEAN(true))));
553 if (r < 0)
554 return log_error_errno(r, "Failed to report monitor to be established: %m");
555
556 r = set_ensure_put(&m->varlink_subscription, NULL, link);
557 if (r < 0)
558 return log_error_errno(r, "Failed to add subscription to set: %m");
559 varlink_ref(link);
560
561 log_debug("%u clients now attached for varlink notifications", set_size(m->varlink_subscription));
562
563 return 1;
564}
565
566static int varlink_monitor_server_init(Manager *m) {
567 _cleanup_(varlink_server_unrefp) VarlinkServer *server = NULL;
568 int r;
569
570 assert(m);
571
572 if (m->varlink_monitor_server)
573 return 0;
574
575 r = varlink_server_new(&server, VARLINK_SERVER_ROOT_ONLY);
576 if (r < 0)
577 return log_error_errno(r, "Failed to allocate varlink server object: %m");
578
579 varlink_server_set_userdata(server, m);
580
581 r = varlink_server_bind_method(
582 server,
583 "io.systemd.Resolve.Monitor.SubscribeQueryResults",
584 vl_method_subscribe_dns_resolves);
585 if (r < 0)
586 return log_error_errno(r, "Failed to register varlink methods: %m");
587
588 r = varlink_server_bind_disconnect(server, vl_on_notification_disconnect);
589 if (r < 0)
590 return log_error_errno(r, "Failed to register varlink disconnect handler: %m");
591
592 r = varlink_server_listen_address(server, "/run/systemd/resolve/io.systemd.Resolve.Monitor", 0600);
593 if (r < 0)
594 return log_error_errno(r, "Failed to bind to varlink socket: %m");
595
596 r = varlink_server_attach_event(server, m->event, SD_EVENT_PRIORITY_NORMAL);
597 if (r < 0)
598 return log_error_errno(r, "Failed to attach varlink connection to event loop: %m");
599
600 m->varlink_monitor_server = TAKE_PTR(server);
601
602 return 0;
603}
604
605static int varlink_main_server_init(Manager *m) {
a032b68d
MB
606 _cleanup_(varlink_server_unrefp) VarlinkServer *s = NULL;
607 int r;
608
609 assert(m);
610
611 if (m->varlink_server)
612 return 0;
613
614 r = varlink_server_new(&s, VARLINK_SERVER_ACCOUNT_UID);
615 if (r < 0)
616 return log_error_errno(r, "Failed to allocate varlink server object: %m");
617
618 varlink_server_set_userdata(s, m);
619
620 r = varlink_server_bind_method_many(
621 s,
622 "io.systemd.Resolve.ResolveHostname", vl_method_resolve_hostname,
623 "io.systemd.Resolve.ResolveAddress", vl_method_resolve_address);
624 if (r < 0)
625 return log_error_errno(r, "Failed to register varlink methods: %m");
626
627 r = varlink_server_bind_disconnect(s, vl_on_disconnect);
628 if (r < 0)
629 return log_error_errno(r, "Failed to register varlink disconnect handler: %m");
630
631 r = varlink_server_listen_address(s, "/run/systemd/resolve/io.systemd.Resolve", 0666);
632 if (r < 0)
633 return log_error_errno(r, "Failed to bind to varlink socket: %m");
634
635 r = varlink_server_attach_event(s, m->event, SD_EVENT_PRIORITY_NORMAL);
636 if (r < 0)
637 return log_error_errno(r, "Failed to attach varlink connection to event loop: %m");
638
639 m->varlink_server = TAKE_PTR(s);
640 return 0;
641}
642
086111aa
LB
643int manager_varlink_init(Manager *m) {
644 int r;
645
646 r = varlink_main_server_init(m);
647 if (r < 0)
648 return r;
649
650 r = varlink_monitor_server_init(m);
651 if (r < 0)
652 return r;
653
654 return 0;
655}
656
a032b68d
MB
657void manager_varlink_done(Manager *m) {
658 assert(m);
659
660 m->varlink_server = varlink_server_unref(m->varlink_server);
086111aa 661 m->varlink_monitor_server = varlink_server_unref(m->varlink_monitor_server);
a032b68d 662}