diff options
author | Iwan Timmer <irtimmer@gmail.com> | 2018-06-13 20:26:24 +0200 |
---|---|---|
committer | Lennart Poettering <lennart@poettering.net> | 2018-06-14 09:57:56 +0200 |
commit | c9299be2f5a634881d6d9053cc93d093df040671 (patch) | |
tree | 2334524eaa17c6b36775ef36a045ea6ed7705a88 /src/resolve | |
parent | Merge pull request #9263 from poettering/log-serialize (diff) | |
download | systemd-c9299be2f5a634881d6d9053cc93d093df040671.tar.gz systemd-c9299be2f5a634881d6d9053cc93d093df040671.tar.bz2 systemd-c9299be2f5a634881d6d9053cc93d093df040671.zip |
resolve: rename PrivateDNS to DNSOverTLS
PrivateDNS is not considered a good name for this option, so rename it to DNSOverTLS
Diffstat (limited to 'src/resolve')
-rw-r--r-- | src/resolve/resolvectl.c | 44 | ||||
-rw-r--r-- | src/resolve/resolved-bus.c | 10 | ||||
-rw-r--r-- | src/resolve/resolved-conf.c | 6 | ||||
-rw-r--r-- | src/resolve/resolved-dns-scope.c | 6 | ||||
-rw-r--r-- | src/resolve/resolved-dns-scope.h | 2 | ||||
-rw-r--r-- | src/resolve/resolved-dns-server.c | 10 | ||||
-rw-r--r-- | src/resolve/resolved-dns-server.h | 2 | ||||
-rw-r--r-- | src/resolve/resolved-gperf.gperf | 2 | ||||
-rw-r--r-- | src/resolve/resolved-link-bus.c | 26 | ||||
-rw-r--r-- | src/resolve/resolved-link-bus.h | 2 | ||||
-rw-r--r-- | src/resolve/resolved-link.c | 34 | ||||
-rw-r--r-- | src/resolve/resolved-link.h | 6 | ||||
-rw-r--r-- | src/resolve/resolved-manager.c | 10 | ||||
-rw-r--r-- | src/resolve/resolved-manager.h | 4 | ||||
-rw-r--r-- | src/resolve/resolved.conf.in | 2 |
15 files changed, 83 insertions, 83 deletions
diff --git a/src/resolve/resolvectl.c b/src/resolve/resolvectl.c index 8517bcc69..f8cc2df81 100644 --- a/src/resolve/resolvectl.c +++ b/src/resolve/resolvectl.c @@ -56,7 +56,7 @@ char **arg_set_dns = NULL; char **arg_set_domain = NULL; static const char *arg_set_llmnr = NULL; static const char *arg_set_mdns = NULL; -static const char *arg_set_private_dns = NULL; +static const char *arg_set_dns_over_tls = NULL; static const char *arg_set_dnssec = NULL; static char **arg_set_nta = NULL; @@ -1339,7 +1339,7 @@ static int status_ifindex(sd_bus *bus, int ifindex, const char *name, StatusMode uint64_t scopes_mask; const char *llmnr; const char *mdns; - const char *private_dns; + const char *dns_over_tls; const char *dnssec; char *current_dns; char **dns; @@ -1355,7 +1355,7 @@ static int status_ifindex(sd_bus *bus, int ifindex, const char *name, StatusMode { "Domains", "a(sb)", map_link_domains, offsetof(struct link_info, domains) }, { "LLMNR", "s", NULL, offsetof(struct link_info, llmnr) }, { "MulticastDNS", "s", NULL, offsetof(struct link_info, mdns) }, - { "PrivateDNS", "s", NULL, offsetof(struct link_info, private_dns) }, + { "DNSOverTLS", "s", NULL, offsetof(struct link_info, dns_over_tls) }, { "DNSSEC", "s", NULL, offsetof(struct link_info, dnssec) }, { "DNSSECNegativeTrustAnchors", "as", NULL, offsetof(struct link_info, ntas) }, { "DNSSECSupported", "b", NULL, offsetof(struct link_info, dnssec_supported) }, @@ -1437,7 +1437,7 @@ static int status_ifindex(sd_bus *bus, int ifindex, const char *name, StatusMode if (mode == STATUS_PRIVATE) { printf("%sLink %i (%s)%s: %s\n", ansi_highlight(), ifindex, name, ansi_normal(), - strna(link_info.private_dns)); + strna(link_info.dns_over_tls)); r = 0; goto finish; @@ -1470,12 +1470,12 @@ static int status_ifindex(sd_bus *bus, int ifindex, const char *name, StatusMode printf(" LLMNR setting: %s\n" "MulticastDNS setting: %s\n" - " PrivateDNS setting: %s\n" + " DNSOverTLS setting: %s\n" " DNSSEC setting: %s\n" " DNSSEC supported: %s\n", strna(link_info.llmnr), strna(link_info.mdns), - strna(link_info.private_dns), + strna(link_info.dns_over_tls), strna(link_info.dnssec), yes_no(link_info.dnssec_supported)); @@ -1617,7 +1617,7 @@ static int status_global(sd_bus *bus, StatusMode mode, bool *empty_line) { char **ntas; const char *llmnr; const char *mdns; - const char *private_dns; + const char *dns_over_tls; const char *dnssec; bool dnssec_supported; } global_info = {}; @@ -1630,7 +1630,7 @@ static int status_global(sd_bus *bus, StatusMode mode, bool *empty_line) { { "DNSSECNegativeTrustAnchors", "as", NULL, offsetof(struct global_info, ntas) }, { "LLMNR", "s", NULL, offsetof(struct global_info, llmnr) }, { "MulticastDNS", "s", NULL, offsetof(struct global_info, mdns) }, - { "PrivateDNS", "s", NULL, offsetof(struct global_info, private_dns) }, + { "DNSOverTLS", "s", NULL, offsetof(struct global_info, dns_over_tls) }, { "DNSSEC", "s", NULL, offsetof(struct global_info, dnssec) }, { "DNSSECSupported", "b", NULL, offsetof(struct global_info, dnssec_supported) }, {} @@ -1692,7 +1692,7 @@ static int status_global(sd_bus *bus, StatusMode mode, bool *empty_line) { if (mode == STATUS_PRIVATE) { printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(), - strna(global_info.private_dns)); + strna(global_info.dns_over_tls)); r = 0; goto finish; @@ -1710,12 +1710,12 @@ static int status_global(sd_bus *bus, StatusMode mode, bool *empty_line) { printf(" LLMNR setting: %s\n" "MulticastDNS setting: %s\n" - " PrivateDNS setting: %s\n" + " DNSOverTLS setting: %s\n" " DNSSEC setting: %s\n" " DNSSEC supported: %s\n", strna(global_info.llmnr), strna(global_info.mdns), - strna(global_info.private_dns), + strna(global_info.dns_over_tls), strna(global_info.dnssec), yes_no(global_info.dnssec_supported)); @@ -2108,7 +2108,7 @@ static int verb_mdns(int argc, char **argv, void *userdata) { return 0; } -static int verb_private_dns(int argc, char **argv, void *userdata) { +static int verb_dns_over_tls(int argc, char **argv, void *userdata) { _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; sd_bus *bus = userdata; int ifindex, r; @@ -2134,7 +2134,7 @@ static int verb_private_dns(int argc, char **argv, void *userdata) { "org.freedesktop.resolve1", "/org/freedesktop/resolve1", "org.freedesktop.resolve1.Manager", - "SetLinkPrivateDNS", + "SetLinkDNSOverTLS", &error, NULL, "is", ifindex, argv[2]); @@ -2146,7 +2146,7 @@ static int verb_private_dns(int argc, char **argv, void *userdata) { sd_bus_error_has_name(&error, BUS_ERROR_NO_SUCH_LINK)) return 0; - return log_error_errno(r, "Failed to set PrivateDNS configuration: %s", bus_error_message(&error, r)); + return log_error_errno(r, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error, r)); } return 0; @@ -2354,7 +2354,7 @@ static void compat_help(void) { " --set-domain=DOMAIN Set per-interface search domain\n" " --set-llmnr=MODE Set per-interface LLMNR mode\n" " --set-mdns=MODE Set per-interface MulticastDNS mode\n" - " --set-privatedns=MODE Set per-interface PrivateDNS mode\n" + " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n" " --set-dnssec=MODE Set per-interface DNSSEC mode\n" " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n" " --revert Revert per-interface configuration\n" @@ -2398,7 +2398,7 @@ static void native_help(void) { " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n" " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n" " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n" - " privatedns [LINK [MODE]] Get/set per-interface PrivateDNS mode\n" + " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n" " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n" " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n" " revert LINK Revert per-interface configuration\n" @@ -2464,7 +2464,7 @@ static int compat_parse_argv(int argc, char *argv[]) { { "set-domain", required_argument, NULL, ARG_SET_DOMAIN }, { "set-llmnr", required_argument, NULL, ARG_SET_LLMNR }, { "set-mdns", required_argument, NULL, ARG_SET_MDNS }, - { "set-privatedns", required_argument, NULL, ARG_SET_PRIVATE }, + { "set-dnsovertls", required_argument, NULL, ARG_SET_PRIVATE }, { "set-dnssec", required_argument, NULL, ARG_SET_DNSSEC }, { "set-nta", required_argument, NULL, ARG_SET_NTA }, { "revert", no_argument, NULL, ARG_REVERT_LINK }, @@ -2684,7 +2684,7 @@ static int compat_parse_argv(int argc, char *argv[]) { break; case ARG_SET_PRIVATE: - arg_set_private_dns = optarg; + arg_set_dns_over_tls = optarg; arg_mode = MODE_SET_LINK; break; @@ -2731,7 +2731,7 @@ static int compat_parse_argv(int argc, char *argv[]) { if (IN_SET(arg_mode, MODE_SET_LINK, MODE_REVERT_LINK)) { if (arg_ifindex <= 0) { - log_error("--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-privatedns=, --set-dnssec=, --set-nta= and --revert require --interface=."); + log_error("--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=."); return -EINVAL; } @@ -2957,7 +2957,7 @@ static int native_main(int argc, char *argv[], sd_bus *bus) { { "domain", VERB_ANY, VERB_ANY, 0, verb_domain }, { "llmnr", VERB_ANY, 3, 0, verb_llmnr }, { "mdns", VERB_ANY, 3, 0, verb_mdns }, - { "privatedns", VERB_ANY, 3, 0, verb_private_dns }, + { "dnsovertls", VERB_ANY, 3, 0, verb_dns_over_tls }, { "dnssec", VERB_ANY, 3, 0, verb_dnssec }, { "nta", VERB_ANY, VERB_ANY, 0, verb_nta }, { "revert", 2, 2, 0, verb_revert_link }, @@ -3050,8 +3050,8 @@ static int compat_main(int argc, char *argv[], sd_bus *bus) { return r; } - if (arg_set_private_dns) { - r = translate("privatedns", arg_ifname, 1, (char **) &arg_set_private_dns, bus); + if (arg_set_dns_over_tls) { + r = translate("dnsovertls", arg_ifname, 1, (char **) &arg_set_dns_over_tls, bus); if (r < 0) return r; } diff --git a/src/resolve/resolved-bus.c b/src/resolve/resolved-bus.c index bead18f82..03a29619f 100644 --- a/src/resolve/resolved-bus.c +++ b/src/resolve/resolved-bus.c @@ -1471,7 +1471,7 @@ static int bus_property_get_ntas( static BUS_DEFINE_PROPERTY_GET_ENUM(bus_property_get_dns_stub_listener_mode, dns_stub_listener_mode, DnsStubListenerMode); static BUS_DEFINE_PROPERTY_GET(bus_property_get_dnssec_supported, "b", Manager, manager_dnssec_supported); static BUS_DEFINE_PROPERTY_GET2(bus_property_get_dnssec_mode, "s", Manager, manager_get_dnssec_mode, dnssec_mode_to_string); -static BUS_DEFINE_PROPERTY_GET2(bus_property_get_private_dns_mode, "s", Manager, manager_get_private_dns_mode, private_dns_mode_to_string); +static BUS_DEFINE_PROPERTY_GET2(bus_property_get_dns_over_tls_mode, "s", Manager, manager_get_dns_over_tls_mode, dns_over_tls_mode_to_string); static int bus_method_reset_statistics(sd_bus_message *message, void *userdata, sd_bus_error *error) { Manager *m = userdata; @@ -1542,8 +1542,8 @@ static int bus_method_set_link_mdns(sd_bus_message *message, void *userdata, sd_ return call_link_method(userdata, message, bus_link_method_set_mdns, error); } -static int bus_method_set_link_private_dns(sd_bus_message *message, void *userdata, sd_bus_error *error) { - return call_link_method(userdata, message, bus_link_method_set_private_dns, error); +static int bus_method_set_link_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error) { + return call_link_method(userdata, message, bus_link_method_set_dns_over_tls, error); } static int bus_method_set_link_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) { @@ -1836,7 +1836,7 @@ static const sd_bus_vtable resolve_vtable[] = { SD_BUS_PROPERTY("LLMNRHostname", "s", NULL, offsetof(Manager, llmnr_hostname), 0), SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support, offsetof(Manager, llmnr_support), 0), SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support, offsetof(Manager, mdns_support), 0), - SD_BUS_PROPERTY("PrivateDNS", "s", bus_property_get_private_dns_mode, 0, 0), + SD_BUS_PROPERTY("DNSOverTLS", "s", bus_property_get_dns_over_tls_mode, 0, 0), SD_BUS_PROPERTY("DNS", "a(iiay)", bus_property_get_dns_servers, 0, 0), SD_BUS_PROPERTY("FallbackDNS", "a(iiay)", bus_property_get_fallback_dns_servers, offsetof(Manager, fallback_dns_servers), SD_BUS_VTABLE_PROPERTY_CONST), SD_BUS_PROPERTY("CurrentDNSServer", "(iiay)", bus_property_get_current_dns_server, offsetof(Manager, current_dns_server), 0), @@ -1861,7 +1861,7 @@ static const sd_bus_vtable resolve_vtable[] = { SD_BUS_METHOD("SetLinkDomains", "ia(sb)", NULL, bus_method_set_link_domains, 0), SD_BUS_METHOD("SetLinkLLMNR", "is", NULL, bus_method_set_link_llmnr, 0), SD_BUS_METHOD("SetLinkMulticastDNS", "is", NULL, bus_method_set_link_mdns, 0), - SD_BUS_METHOD("SetLinkPrivateDNS", "is", NULL, bus_method_set_link_private_dns, 0), + SD_BUS_METHOD("SetLinkDNSOverTLS", "is", NULL, bus_method_set_link_dns_over_tls, 0), SD_BUS_METHOD("SetLinkDNSSEC", "is", NULL, bus_method_set_link_dnssec, 0), SD_BUS_METHOD("SetLinkDNSSECNegativeTrustAnchors", "ias", NULL, bus_method_set_link_dnssec_negative_trust_anchors, 0), SD_BUS_METHOD("RevertLink", "i", NULL, bus_method_revert_link, 0), diff --git a/src/resolve/resolved-conf.c b/src/resolve/resolved-conf.c index 2825d2df1..237e3717f 100644 --- a/src/resolve/resolved-conf.c +++ b/src/resolve/resolved-conf.c @@ -398,9 +398,9 @@ int manager_parse_config_file(Manager *m) { #endif #if ! HAVE_GNUTLS - if (m->private_dns_mode != PRIVATE_DNS_NO) { - log_warning("Private DNS option cannot be set to opportunistic when systemd-resolved is built without gnutls support. Turning off private DNS support."); - m->private_dns_mode = PRIVATE_DNS_NO; + if (m->dns_over_tls_mode != DNS_OVER_TLS_NO) { + log_warning("DNS-over-TLS option cannot be set to opportunistic when systemd-resolved is built without gnutls support. Turning off DNS-over-TLS support."); + m->dns_over_tls_mode = DNS_OVER_TLS_NO; } #endif return 0; diff --git a/src/resolve/resolved-dns-scope.c b/src/resolve/resolved-dns-scope.c index 78e03d812..a056980d0 100644 --- a/src/resolve/resolved-dns-scope.c +++ b/src/resolve/resolved-dns-scope.c @@ -54,15 +54,15 @@ int dns_scope_new(Manager *m, DnsScope **ret, Link *l, DnsProtocol protocol, int if (l) { s->dnssec_mode = link_get_dnssec_mode(l); - s->private_dns_mode = link_get_private_dns_mode(l); + s->dns_over_tls_mode = link_get_dns_over_tls_mode(l); } else { s->dnssec_mode = manager_get_dnssec_mode(m); - s->private_dns_mode = manager_get_private_dns_mode(m); + s->dns_over_tls_mode = manager_get_dns_over_tls_mode(m); } } else { s->dnssec_mode = DNSSEC_NO; - s->private_dns_mode = PRIVATE_DNS_NO; + s->dns_over_tls_mode = DNS_OVER_TLS_NO; } LIST_PREPEND(scopes, m->dns_scopes, s); diff --git a/src/resolve/resolved-dns-scope.h b/src/resolve/resolved-dns-scope.h index 45e6d31c6..989d04424 100644 --- a/src/resolve/resolved-dns-scope.h +++ b/src/resolve/resolved-dns-scope.h @@ -35,7 +35,7 @@ struct DnsScope { DnsProtocol protocol; int family; DnssecMode dnssec_mode; - PrivateDnsMode private_dns_mode; + DnsOverTlsMode dns_over_tls_mode; Link *link; diff --git a/src/resolve/resolved-dns-server.c b/src/resolve/resolved-dns-server.c index d14dfd22e..1b43b8e82 100644 --- a/src/resolve/resolved-dns-server.c +++ b/src/resolve/resolved-dns-server.c @@ -400,11 +400,11 @@ DnsServerFeatureLevel dns_server_possible_feature_level(DnsServer *s) { /* Determine the best feature level we care about. If DNSSEC mode is off there's no point in using anything * better than EDNS0, hence don't even try. */ if (dns_server_get_dnssec_mode(s) != DNSSEC_NO) - best = dns_server_get_private_dns_mode(s) == PRIVATE_DNS_NO ? + best = dns_server_get_dns_over_tls_mode(s) == DNS_OVER_TLS_NO ? DNS_SERVER_FEATURE_LEVEL_LARGE : DNS_SERVER_FEATURE_LEVEL_TLS_DO; else - best = dns_server_get_private_dns_mode(s) == PRIVATE_DNS_NO ? + best = dns_server_get_dns_over_tls_mode(s) == DNS_OVER_TLS_NO ? DNS_SERVER_FEATURE_LEVEL_EDNS0 : DNS_SERVER_FEATURE_LEVEL_TLS_PLAIN; @@ -811,13 +811,13 @@ DnssecMode dns_server_get_dnssec_mode(DnsServer *s) { return manager_get_dnssec_mode(s->manager); } -PrivateDnsMode dns_server_get_private_dns_mode(DnsServer *s) { +DnsOverTlsMode dns_server_get_dns_over_tls_mode(DnsServer *s) { assert(s); if (s->link) - return link_get_private_dns_mode(s->link); + return link_get_dns_over_tls_mode(s->link); - return manager_get_private_dns_mode(s->manager); + return manager_get_dns_over_tls_mode(s->manager); } void dns_server_flush_cache(DnsServer *s) { diff --git a/src/resolve/resolved-dns-server.h b/src/resolve/resolved-dns-server.h index 8972fef63..ecdba25df 100644 --- a/src/resolve/resolved-dns-server.h +++ b/src/resolve/resolved-dns-server.h @@ -144,7 +144,7 @@ void manager_next_dns_server(Manager *m); bool dns_server_address_valid(int family, const union in_addr_union *sa); DnssecMode dns_server_get_dnssec_mode(DnsServer *s); -PrivateDnsMode dns_server_get_private_dns_mode(DnsServer *s); +DnsOverTlsMode dns_server_get_dns_over_tls_mode(DnsServer *s); DEFINE_TRIVIAL_CLEANUP_FUNC(DnsServer*, dns_server_unref); diff --git a/src/resolve/resolved-gperf.gperf b/src/resolve/resolved-gperf.gperf index e076241fb..648ca4d8a 100644 --- a/src/resolve/resolved-gperf.gperf +++ b/src/resolve/resolved-gperf.gperf @@ -23,6 +23,6 @@ Resolve.Domains, config_parse_search_domains, 0, Resolve.LLMNR, config_parse_resolve_support, 0, offsetof(Manager, llmnr_support) Resolve.MulticastDNS, config_parse_resolve_support, 0, offsetof(Manager, mdns_support) Resolve.DNSSEC, config_parse_dnssec_mode, 0, offsetof(Manager, dnssec_mode) -Resolve.PrivateDNS, config_parse_private_dns_mode, 0, offsetof(Manager, private_dns_mode) +Resolve.DNSOverTLS, config_parse_dns_over_tls_mode, 0, offsetof(Manager, dns_over_tls_mode) Resolve.Cache, config_parse_bool, 0, offsetof(Manager, enable_cache) Resolve.DNSStubListener, config_parse_dns_stub_listener_mode, 0, offsetof(Manager, dns_stub_listener_mode) diff --git a/src/resolve/resolved-link-bus.c b/src/resolve/resolved-link-bus.c index 3e06f1fe4..0ef8aebaa 100644 --- a/src/resolve/resolved-link-bus.c +++ b/src/resolve/resolved-link-bus.c @@ -18,7 +18,7 @@ static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported, "b", Link, link_dnssec_supported); static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode, "s", Link, link_get_dnssec_mode, dnssec_mode_to_string); -static int property_get_private_dns_mode( +static int property_get_dns_over_tls_mode( sd_bus *bus, const char *path, const char *interface, @@ -32,7 +32,7 @@ static int property_get_private_dns_mode( assert(reply); assert(l); - return sd_bus_message_append(reply, "s", private_dns_mode_to_string(link_get_private_dns_mode(l))); + return sd_bus_message_append(reply, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l))); } static int property_get_dns( @@ -419,10 +419,10 @@ int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_err return sd_bus_reply_method_return(message, NULL); } -int bus_link_method_set_private_dns(sd_bus_message *message, void *userdata, sd_bus_error *error) { +int bus_link_method_set_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error) { Link *l = userdata; - const char *private_dns; - PrivateDnsMode mode; + const char *dns_over_tls; + DnsOverTlsMode mode; int r; assert(message); @@ -432,19 +432,19 @@ int bus_link_method_set_private_dns(sd_bus_message *message, void *userdata, sd_ if (r < 0) return r; - r = sd_bus_message_read(message, "s", &private_dns); + r = sd_bus_message_read(message, "s", &dns_over_tls); if (r < 0) return r; - if (isempty(private_dns)) - mode = _PRIVATE_DNS_MODE_INVALID; + if (isempty(dns_over_tls)) + mode = _DNS_OVER_TLS_MODE_INVALID; else { - mode = private_dns_mode_from_string(private_dns); + mode = dns_over_tls_mode_from_string(dns_over_tls); if (mode < 0) - return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid PrivateDNS setting: %s", private_dns); + return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSOverTLS setting: %s", dns_over_tls); } - link_set_private_dns_mode(l, mode); + link_set_dns_over_tls_mode(l, mode); (void) link_save_user(l); @@ -557,7 +557,7 @@ const sd_bus_vtable link_vtable[] = { SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0), SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support, offsetof(Link, llmnr_support), 0), SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support, offsetof(Link, mdns_support), 0), - SD_BUS_PROPERTY("PrivateDNS", "s", property_get_private_dns_mode, 0, 0), + SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode, 0, 0), SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, 0, 0), SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0), SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0), @@ -566,7 +566,7 @@ const sd_bus_vtable link_vtable[] = { SD_BUS_METHOD("SetDomains", "a(sb)", NULL, bus_link_method_set_domains, 0), SD_BUS_METHOD("SetLLMNR", "s", NULL, bus_link_method_set_llmnr, 0), SD_BUS_METHOD("SetMulticastDNS", "s", NULL, bus_link_method_set_mdns, 0), - SD_BUS_METHOD("SetPrivateDNS", "s", NULL, bus_link_method_set_private_dns, 0), + SD_BUS_METHOD("SetDNSOverTLS", "s", NULL, bus_link_method_set_dns_over_tls, 0), SD_BUS_METHOD("SetDNSSEC", "s", NULL, bus_link_method_set_dnssec, 0), SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL, bus_link_method_set_dnssec_negative_trust_anchors, 0), SD_BUS_METHOD("Revert", NULL, NULL, bus_link_method_revert, 0), diff --git a/src/resolve/resolved-link-bus.h b/src/resolve/resolved-link-bus.h index 163262123..1383f7959 100644 --- a/src/resolve/resolved-link-bus.h +++ b/src/resolve/resolved-link-bus.h @@ -21,7 +21,7 @@ int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_ int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error); int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error); int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error); -int bus_link_method_set_private_dns(sd_bus_message *message, void *userdata, sd_bus_error *error); +int bus_link_method_set_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error); int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error); int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error); int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error); diff --git a/src/resolve/resolved-link.c b/src/resolve/resolved-link.c index aceea66ed..8e7db29f9 100644 --- a/src/resolve/resolved-link.c +++ b/src/resolve/resolved-link.c @@ -41,7 +41,7 @@ int link_new(Manager *m, Link **ret, int ifindex) { l->llmnr_support = RESOLVE_SUPPORT_YES; l->mdns_support = RESOLVE_SUPPORT_NO; l->dnssec_mode = _DNSSEC_MODE_INVALID; - l->private_dns_mode = _PRIVATE_DNS_MODE_INVALID; + l->dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID; l->operstate = IF_OPER_UNKNOWN; if (asprintf(&l->state_file, "/run/systemd/resolve/netif/%i", ifindex) < 0) @@ -66,7 +66,7 @@ void link_flush_settings(Link *l) { l->llmnr_support = RESOLVE_SUPPORT_YES; l->mdns_support = RESOLVE_SUPPORT_NO; l->dnssec_mode = _DNSSEC_MODE_INVALID; - l->private_dns_mode = _PRIVATE_DNS_MODE_INVALID; + l->dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID; dns_server_unlink_all(l->dns_servers); dns_search_domain_unlink_all(l->search_domains); @@ -354,26 +354,26 @@ clear: return r; } -void link_set_private_dns_mode(Link *l, PrivateDnsMode mode) { +void link_set_dns_over_tls_mode(Link *l, DnsOverTlsMode mode) { assert(l); #if ! HAVE_GNUTLS - if (mode != PRIVATE_DNS_NO) - log_warning("Private DNS option for the link cannot be set to opportunistic when systemd-resolved is built without gnutls support. Turning off Private DNS support."); + if (mode != DNS_OVER_TLS_NO) + log_warning("DNS-over-TLS option for the link cannot be set to opportunistic when systemd-resolved is built without gnutls support. Turning off DNS-over-TLS support."); return; #endif - l->private_dns_mode = mode; + l->dns_over_tls_mode = mode; } -static int link_update_private_dns_mode(Link *l) { +static int link_update_dns_over_tls_mode(Link *l) { _cleanup_free_ char *b = NULL; int r; assert(l); - r = sd_network_link_get_private_dns(l->ifindex, &b); + r = sd_network_link_get_dns_over_tls(l->ifindex, &b); if (r == -ENODATA) { r = 0; goto clear; @@ -381,8 +381,8 @@ static int link_update_private_dns_mode(Link *l) { if (r < 0) goto clear; - l->private_dns_mode = private_dns_mode_from_string(b); - if (l->private_dns_mode < 0) { + l->dns_over_tls_mode = dns_over_tls_mode_from_string(b); + if (l->dns_over_tls_mode < 0) { r = -EINVAL; goto clear; } @@ -390,7 +390,7 @@ static int link_update_private_dns_mode(Link *l) { return 0; clear: - l->private_dns_mode = _PRIVATE_DNS_MODE_INVALID; + l->dns_over_tls_mode = _DNS_OVER_TLS_MODE_INVALID; return r; } @@ -601,9 +601,9 @@ static void link_read_settings(Link *l) { if (r < 0) log_warning_errno(r, "Failed to read mDNS support for interface %s, ignoring: %m", l->name); - r = link_update_private_dns_mode(l); + r = link_update_dns_over_tls_mode(l); if (r < 0) - log_warning_errno(r, "Failed to read Private DNS mode for interface %s, ignoring: %m", l->name); + log_warning_errno(r, "Failed to read DNS-over-TLS mode for interface %s, ignoring: %m", l->name); r = link_update_dnssec_mode(l); if (r < 0) @@ -738,13 +738,13 @@ void link_next_dns_server(Link *l) { link_set_dns_server(l, l->dns_servers); } -PrivateDnsMode link_get_private_dns_mode(Link *l) { +DnsOverTlsMode link_get_dns_over_tls_mode(Link *l) { assert(l); - if (l->private_dns_mode != _PRIVATE_DNS_MODE_INVALID) - return l->private_dns_mode; + if (l->dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID) + return l->dns_over_tls_mode; - return manager_get_private_dns_mode(l->manager); + return manager_get_dns_over_tls_mode(l->manager); } DnssecMode link_get_dnssec_mode(Link *l) { diff --git a/src/resolve/resolved-link.h b/src/resolve/resolved-link.h index cedcdd675..58a9c239b 100644 --- a/src/resolve/resolved-link.h +++ b/src/resolve/resolved-link.h @@ -59,7 +59,7 @@ struct Link { ResolveSupport llmnr_support; ResolveSupport mdns_support; - PrivateDnsMode private_dns_mode; + DnsOverTlsMode dns_over_tls_mode; DnssecMode dnssec_mode; Set *dnssec_negative_trust_anchors; @@ -91,7 +91,7 @@ void link_add_rrs(Link *l, bool force_remove); void link_flush_settings(Link *l); void link_set_dnssec_mode(Link *l, DnssecMode mode); -void link_set_private_dns_mode(Link *l, PrivateDnsMode mode); +void link_set_dns_over_tls_mode(Link *l, DnsOverTlsMode mode); void link_allocate_scopes(Link *l); DnsServer* link_set_dns_server(Link *l, DnsServer *s); @@ -101,7 +101,7 @@ void link_next_dns_server(Link *l); DnssecMode link_get_dnssec_mode(Link *l); bool link_dnssec_supported(Link *l); -PrivateDnsMode link_get_private_dns_mode(Link *l); +DnsOverTlsMode link_get_dns_over_tls_mode(Link *l); int link_save_user(Link *l); int link_load_user(Link *l); diff --git a/src/resolve/resolved-manager.c b/src/resolve/resolved-manager.c index f8d372f9f..39f83f771 100644 --- a/src/resolve/resolved-manager.c +++ b/src/resolve/resolved-manager.c @@ -580,7 +580,7 @@ int manager_new(Manager **ret) { m->llmnr_support = RESOLVE_SUPPORT_YES; m->mdns_support = RESOLVE_SUPPORT_YES; m->dnssec_mode = DEFAULT_DNSSEC_MODE; - m->private_dns_mode = DEFAULT_PRIVATE_DNS_MODE; + m->dns_over_tls_mode = DEFAULT_DNS_OVER_TLS_MODE; m->enable_cache = true; m->dns_stub_listener_mode = DNS_STUB_LISTENER_UDP; m->read_resolv_conf = true; @@ -1385,13 +1385,13 @@ bool manager_dnssec_supported(Manager *m) { return true; } -PrivateDnsMode manager_get_private_dns_mode(Manager *m) { +DnsOverTlsMode manager_get_dns_over_tls_mode(Manager *m) { assert(m); - if (m->private_dns_mode != _PRIVATE_DNS_MODE_INVALID) - return m->private_dns_mode; + if (m->dns_over_tls_mode != _DNS_OVER_TLS_MODE_INVALID) + return m->dns_over_tls_mode; - return PRIVATE_DNS_NO; + return DNS_OVER_TLS_NO; } void manager_dnssec_verdict(Manager *m, DnssecVerdict verdict, const DnsResourceKey *key) { diff --git a/src/resolve/resolved-manager.h b/src/resolve/resolved-manager.h index 4bba8b897..df4f774f4 100644 --- a/src/resolve/resolved-manager.h +++ b/src/resolve/resolved-manager.h @@ -35,7 +35,7 @@ struct Manager { ResolveSupport llmnr_support; ResolveSupport mdns_support; DnssecMode dnssec_mode; - PrivateDnsMode private_dns_mode; + DnsOverTlsMode dns_over_tls_mode; bool enable_cache; DnsStubListenerMode dns_stub_listener_mode; @@ -173,7 +173,7 @@ int manager_compile_search_domains(Manager *m, OrderedSet **domains, int filter_ DnssecMode manager_get_dnssec_mode(Manager *m); bool manager_dnssec_supported(Manager *m); -PrivateDnsMode manager_get_private_dns_mode(Manager *m); +DnsOverTlsMode manager_get_dns_over_tls_mode(Manager *m); void manager_dnssec_verdict(Manager *m, DnssecVerdict verdict, const DnsResourceKey *key); diff --git a/src/resolve/resolved.conf.in b/src/resolve/resolved.conf.in index 60c48087a..2528340f7 100644 --- a/src/resolve/resolved.conf.in +++ b/src/resolve/resolved.conf.in @@ -18,6 +18,6 @@ #LLMNR=yes #MulticastDNS=yes #DNSSEC=@DEFAULT_DNSSEC_MODE@ -#PrivateDNS=@DEFAULT_PRIVATE_DNS_MODE@ +#DNSOverTLS=@DEFAULT_DNS_OVER_TLS_MODE@ #Cache=yes #DNSStubListener=udp |