]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/busctl/busctl.c
hwdb: Add support for HP ZBook Studio G5 keyboard (#17525)
[thirdparty/systemd.git] / src / busctl / busctl.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
de1c301e 2
1f849790
LP
3#include <getopt.h>
4
de1c301e 5#include "sd-bus.h"
3f6fd1ba 6
b5efdb8a 7#include "alloc-util.h"
2b5c5383 8#include "bus-dump.h"
3f6fd1ba 9#include "bus-internal.h"
2de62253 10#include "bus-message.h"
781fa938 11#include "bus-signature.h"
79f34de9 12#include "bus-type.h"
3f6fd1ba 13#include "bus-util.h"
a1ad3767 14#include "busctl-introspect.h"
4f5dd394 15#include "escape.h"
3ffd4af2 16#include "fd-util.h"
6b0f5484 17#include "fileio.h"
81896fa2 18#include "format-table.h"
9cebb234 19#include "json.h"
8752c575 20#include "locale-util.h"
3f6fd1ba 21#include "log.h"
360f3dc2 22#include "main-func.h"
3f6fd1ba 23#include "pager.h"
6bedfcbb 24#include "parse-util.h"
3f6fd1ba 25#include "path-util.h"
294bf0c3 26#include "pretty-print.h"
3f6fd1ba 27#include "set.h"
760877e9 28#include "sort-util.h"
3f6fd1ba 29#include "strv.h"
288a74cc 30#include "terminal-util.h"
b1d4f8e1 31#include "user-util.h"
9bb31a0c 32#include "verbs.h"
de1c301e 33
9cebb234
LP
34static enum {
35 JSON_OFF,
36 JSON_SHORT,
37 JSON_PRETTY,
38} arg_json = JSON_OFF;
0221d68a 39static PagerFlags arg_pager_flags = 0;
17d47d8d 40static bool arg_legend = true;
b683b82f 41static bool arg_full = false;
5e4c5bde 42static const char *arg_address = NULL;
56e61788
LP
43static bool arg_unique = false;
44static bool arg_acquired = false;
45static bool arg_activatable = false;
46static bool arg_show_machine = false;
1f849790 47static char **arg_matches = NULL;
d75edbd6 48static BusTransport arg_transport = BUS_TRANSPORT_LOCAL;
02bf91ee 49static const char *arg_host = NULL;
d75edbd6 50static bool arg_user = false;
1f70b087 51static size_t arg_snaplen = 4096;
d9130355 52static bool arg_list = false;
781fa938 53static bool arg_quiet = false;
1fc55609 54static bool arg_verbose = false;
d5c8d823 55static bool arg_xml_interface = false;
38051578
LP
56static bool arg_expect_reply = true;
57static bool arg_auto_start = true;
58static bool arg_allow_interactive_authorization = true;
40ed1a45 59static bool arg_augment_creds = true;
56d820b6 60static bool arg_watch_bind = false;
a44b1081 61static usec_t arg_timeout = 0;
143aea38 62static const char *arg_destination = NULL;
1f849790 63
360f3dc2
YW
64STATIC_DESTRUCTOR_REGISTER(arg_matches, strv_freep);
65
1d58a1fe
LP
66#define NAME_IS_ACQUIRED INT_TO_PTR(1)
67#define NAME_IS_ACTIVATABLE INT_TO_PTR(2)
68
2de62253
LP
69static int json_transform_message(sd_bus_message *m, JsonVariant **ret);
70static void json_dump_with_flags(JsonVariant *v, FILE *f);
71
9bb31a0c 72static int acquire_bus(bool set_monitor, sd_bus **ret) {
b1a4981a 73 _cleanup_(sd_bus_close_unrefp) sd_bus *bus = NULL;
9bb31a0c
YW
74 int r;
75
76 r = sd_bus_new(&bus);
77 if (r < 0)
78 return log_error_errno(r, "Failed to allocate bus: %m");
79
80 if (set_monitor) {
81 r = sd_bus_set_monitor(bus, true);
82 if (r < 0)
83 return log_error_errno(r, "Failed to set monitor mode: %m");
84
85 r = sd_bus_negotiate_creds(bus, true, _SD_BUS_CREDS_ALL);
86 if (r < 0)
87 return log_error_errno(r, "Failed to enable credentials: %m");
88
89 r = sd_bus_negotiate_timestamp(bus, true);
90 if (r < 0)
91 return log_error_errno(r, "Failed to enable timestamps: %m");
92
93 r = sd_bus_negotiate_fds(bus, true);
94 if (r < 0)
95 return log_error_errno(r, "Failed to enable fds: %m");
96 }
97
98 r = sd_bus_set_bus_client(bus, true);
99 if (r < 0)
100 return log_error_errno(r, "Failed to set bus client: %m");
101
102 r = sd_bus_set_watch_bind(bus, arg_watch_bind);
103 if (r < 0)
16c347b3
ZJS
104 return log_error_errno(r, "Failed to set watch-bind setting to '%s': %m",
105 yes_no(arg_watch_bind));
9bb31a0c
YW
106
107 if (arg_address)
108 r = sd_bus_set_address(bus, arg_address);
109 else {
110 switch (arg_transport) {
111
112 case BUS_TRANSPORT_LOCAL:
062ac2ea 113 if (arg_user)
9bb31a0c 114 r = bus_set_address_user(bus);
062ac2ea 115 else
9bb31a0c 116 r = bus_set_address_system(bus);
9bb31a0c
YW
117 break;
118
119 case BUS_TRANSPORT_REMOTE:
120 r = bus_set_address_system_remote(bus, arg_host);
121 break;
122
123 case BUS_TRANSPORT_MACHINE:
124 r = bus_set_address_system_machine(bus, arg_host);
125 break;
126
127 default:
128 assert_not_reached("Hmm, unknown transport type.");
129 }
130 }
131 if (r < 0)
ab4a88eb 132 return bus_log_address_error(r);
9bb31a0c
YW
133
134 r = sd_bus_start(bus);
135 if (r < 0)
ab4a88eb 136 return bus_log_connect_error(r);
9bb31a0c 137
1cc6c93a 138 *ret = TAKE_PTR(bus);
9bb31a0c
YW
139
140 return 0;
141}
142
143static int list_bus_names(int argc, char **argv, void *userdata) {
71f2ab46 144 _cleanup_strv_free_ char **acquired = NULL, **activatable = NULL;
81896fa2 145 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
5e2f14e6 146 _cleanup_hashmap_free_ Hashmap *names = NULL;
81896fa2 147 _cleanup_(table_unrefp) Table *table = NULL;
81896fa2
LP
148 char **i, *k;
149 void *v;
150 int r;
151
152 enum {
153 COLUMN_ACTIVATABLE,
154 COLUMN_NAME,
155 COLUMN_PID,
156 COLUMN_PROCESS,
157 COLUMN_USER,
158 COLUMN_CONNECTION,
159 COLUMN_UNIT,
160 COLUMN_SESSION,
161 COLUMN_DESCRIPTION,
162 COLUMN_MACHINE,
163 };
de1c301e 164
d9130355
LP
165 if (!arg_unique && !arg_acquired && !arg_activatable)
166 arg_unique = arg_acquired = arg_activatable = true;
167
9bb31a0c
YW
168 r = acquire_bus(false, &bus);
169 if (r < 0)
170 return r;
171
16c347b3
ZJS
172 r = sd_bus_list_names(bus,
173 (arg_acquired || arg_unique) ? &acquired : NULL,
174 arg_activatable ? &activatable : NULL);
23bbb0de
MS
175 if (r < 0)
176 return log_error_errno(r, "Failed to list names: %m");
de1c301e 177
d5099efc 178 names = hashmap_new(&string_hash_ops);
5e2f14e6
LP
179 if (!names)
180 return log_oom();
89ffcd2a 181
5e2f14e6 182 STRV_FOREACH(i, acquired) {
1d58a1fe 183 r = hashmap_put(names, *i, NAME_IS_ACQUIRED);
23bbb0de
MS
184 if (r < 0)
185 return log_error_errno(r, "Failed to add to hashmap: %m");
5e2f14e6
LP
186 }
187
188 STRV_FOREACH(i, activatable) {
1d58a1fe 189 r = hashmap_put(names, *i, NAME_IS_ACTIVATABLE);
23bbb0de
MS
190 if (r < 0 && r != -EEXIST)
191 return log_error_errno(r, "Failed to add to hashmap: %m");
5e2f14e6
LP
192 }
193
16c347b3
ZJS
194 table = table_new("activatable",
195 "name",
196 "pid",
197 "process",
198 "user",
199 "connection",
200 "unit",
201 "session",
202 "description",
203 "machine");
81896fa2 204 if (!table)
cb05d2a5
YW
205 return log_oom();
206
b683b82f
YW
207 if (arg_full)
208 table_set_width(table, 0);
209
81896fa2
LP
210 r = table_set_align_percent(table, table_get_cell(table, 0, COLUMN_PID), 100);
211 if (r < 0)
212 return log_error_errno(r, "Failed to set alignment: %m");
5e2f14e6 213
81896fa2
LP
214 r = table_set_empty_string(table, "-");
215 if (r < 0)
216 return log_error_errno(r, "Failed to set empty string: %m");
5e2f14e6 217
ad5555b4 218 r = table_set_sort(table, (size_t) COLUMN_NAME, (size_t) -1);
81896fa2
LP
219 if (r < 0)
220 return log_error_errno(r, "Failed to set sort column: %m");
89ffcd2a 221
81896fa2 222 if (arg_show_machine)
bec31cf5
AP
223 r = table_set_display(table, (size_t) COLUMN_NAME,
224 (size_t) COLUMN_PID,
225 (size_t) COLUMN_PROCESS,
226 (size_t) COLUMN_USER,
227 (size_t) COLUMN_CONNECTION,
228 (size_t) COLUMN_UNIT,
229 (size_t) COLUMN_SESSION,
230 (size_t) COLUMN_DESCRIPTION,
231 (size_t) COLUMN_MACHINE,
232 (size_t) -1);
81896fa2 233 else
bec31cf5
AP
234 r = table_set_display(table, (size_t) COLUMN_NAME,
235 (size_t) COLUMN_PID,
236 (size_t) COLUMN_PROCESS,
237 (size_t) COLUMN_USER,
238 (size_t) COLUMN_CONNECTION,
239 (size_t) COLUMN_UNIT,
240 (size_t) COLUMN_SESSION,
241 (size_t) COLUMN_DESCRIPTION,
242 (size_t) -1);
243
81896fa2
LP
244 if (r < 0)
245 return log_error_errno(r, "Failed to set columns to display: %m");
a4297f08 246
81896fa2
LP
247 table_set_header(table, arg_legend);
248
90e74a66 249 HASHMAP_FOREACH_KEY(v, k, names) {
4afd3348 250 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
71f2ab46 251
81896fa2
LP
252 if (v == NAME_IS_ACTIVATABLE) {
253 r = table_add_many(
254 table,
255 TABLE_INT, PTR_TO_INT(v),
256 TABLE_STRING, k,
257 TABLE_EMPTY,
258 TABLE_EMPTY,
259 TABLE_EMPTY,
260 TABLE_STRING, "(activatable)", TABLE_SET_COLOR, ansi_grey(),
261 TABLE_EMPTY,
262 TABLE_EMPTY,
263 TABLE_EMPTY,
264 TABLE_EMPTY);
265 if (r < 0)
bd17fa8c 266 return table_log_add_error(r);
71f2ab46 267
71f2ab46 268 continue;
5e2f14e6 269 }
de1c301e 270
81896fa2
LP
271 assert(v == NAME_IS_ACQUIRED);
272
273 if (!arg_unique && k[0] == ':')
56e61788
LP
274 continue;
275
81896fa2 276 if (!arg_acquired && k[0] != ':')
1f849790 277 continue;
89ffcd2a 278
81896fa2
LP
279 r = table_add_many(table,
280 TABLE_INT, PTR_TO_INT(v),
281 TABLE_STRING, k);
282 if (r < 0)
bd17fa8c 283 return table_log_add_error(r);
de1c301e 284
40ed1a45 285 r = sd_bus_get_name_creds(
81896fa2 286 bus, k,
40ed1a45 287 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) |
05bae4a6 288 SD_BUS_CREDS_EUID|SD_BUS_CREDS_PID|SD_BUS_CREDS_COMM|
40ed1a45
LP
289 SD_BUS_CREDS_UNIQUE_NAME|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_SESSION|
290 SD_BUS_CREDS_DESCRIPTION, &creds);
81896fa2
LP
291 if (r < 0) {
292 log_debug_errno(r, "Failed to acquire credentials of service %s, ignoring: %m", k);
293
294 r = table_fill_empty(table, COLUMN_MACHINE);
295 } else {
296 const char *unique = NULL, *session = NULL, *unit = NULL, *cn = NULL;
5b12334d
LP
297 pid_t pid;
298 uid_t uid;
de1c301e 299
5b12334d
LP
300 r = sd_bus_creds_get_pid(creds, &pid);
301 if (r >= 0) {
302 const char *comm = NULL;
de1c301e 303
81896fa2 304 (void) sd_bus_creds_get_comm(creds, &comm);
89ffcd2a 305
81896fa2
LP
306 r = table_add_many(table,
307 TABLE_PID, pid,
308 TABLE_STRING, strna(comm));
5b12334d 309 } else
81896fa2
LP
310 r = table_add_many(table, TABLE_EMPTY, TABLE_EMPTY);
311 if (r < 0)
bd17fa8c 312 return table_log_add_error(r);
89ffcd2a 313
05bae4a6 314 r = sd_bus_creds_get_euid(creds, &uid);
5b12334d
LP
315 if (r >= 0) {
316 _cleanup_free_ char *u = NULL;
89ffcd2a 317
5b12334d
LP
318 u = uid_to_name(uid);
319 if (!u)
320 return log_oom();
89ffcd2a 321
81896fa2 322 r = table_add_cell(table, NULL, TABLE_STRING, u);
5b12334d 323 } else
81896fa2
LP
324 r = table_add_cell(table, NULL, TABLE_EMPTY, NULL);
325 if (r < 0)
bd17fa8c 326 return table_log_add_error(r);
81896fa2
LP
327
328 (void) sd_bus_creds_get_unique_name(creds, &unique);
329 (void) sd_bus_creds_get_unit(creds, &unit);
330 (void) sd_bus_creds_get_session(creds, &session);
331 (void) sd_bus_creds_get_description(creds, &cn);
332
333 r = table_add_many(
334 table,
335 TABLE_STRING, unique,
336 TABLE_STRING, unit,
337 TABLE_STRING, session,
338 TABLE_STRING, cn);
339 }
340 if (r < 0)
bd17fa8c 341 return table_log_add_error(r);
89ffcd2a 342
81896fa2
LP
343 if (arg_show_machine) {
344 sd_id128_t mid;
56e61788 345
81896fa2
LP
346 r = sd_bus_get_name_machine_id(bus, k, &mid);
347 if (r < 0)
348 log_debug_errno(r, "Failed to acquire credentials of service %s, ignoring: %m", k);
349 else {
350 char m[SD_ID128_STRING_MAX];
56e61788 351
81896fa2
LP
352 r = table_add_cell(table, NULL, TABLE_STRING, sd_id128_to_string(mid, m));
353 if (r < 0)
bd17fa8c 354 return table_log_add_error(r);
56e61788 355
81896fa2
LP
356 continue; /* line fully filled, no need to fill the remainder below */
357 }
358 }
56e61788 359
81896fa2
LP
360 r = table_fill_empty(table, 0);
361 if (r < 0)
362 return log_error_errno(r, "Failed to fill line: %m");
363 }
7b0b392f 364
8722b297 365 (void) pager_open(arg_pager_flags);
81896fa2
LP
366
367 if (arg_json)
16c347b3
ZJS
368 r = table_print_json(table, stdout,
369 (arg_json == JSON_PRETTY ? JSON_FORMAT_PRETTY : JSON_FORMAT_NEWLINE) | JSON_FORMAT_COLOR_AUTO);
81896fa2
LP
370 else
371 r = table_print(table, stdout);
372 if (r < 0)
4b6607d9 373 return table_log_print_error(r);
14008e4e 374
1f849790
LP
375 return 0;
376}
377
d9130355
LP
378static void print_subtree(const char *prefix, const char *path, char **l) {
379 const char *vertical, *space;
380 char **n;
381
382 /* We assume the list is sorted. Let's first skip over the
383 * entry we are looking at. */
384 for (;;) {
385 if (!*l)
386 return;
387
388 if (!streq(*l, path))
389 break;
390
391 l++;
392 }
393
9a6f746f
LP
394 vertical = strjoina(prefix, special_glyph(SPECIAL_GLYPH_TREE_VERTICAL));
395 space = strjoina(prefix, special_glyph(SPECIAL_GLYPH_TREE_SPACE));
d9130355
LP
396
397 for (;;) {
398 bool has_more = false;
399
400 if (!*l || !path_startswith(*l, path))
401 break;
402
403 n = l + 1;
404 for (;;) {
405 if (!*n || !path_startswith(*n, path))
406 break;
407
408 if (!path_startswith(*n, *l)) {
409 has_more = true;
410 break;
411 }
412
413 n++;
414 }
415
16c347b3
ZJS
416 printf("%s%s%s\n",
417 prefix,
418 special_glyph(has_more ? SPECIAL_GLYPH_TREE_BRANCH : SPECIAL_GLYPH_TREE_RIGHT),
419 *l);
d9130355
LP
420
421 print_subtree(has_more ? vertical : space, *l, l);
422 l = n;
423 }
424}
425
445bd57e
ZJS
426static void print_tree(char **l) {
427 if (arg_list)
428 strv_print(l);
429 else if (strv_isempty(l))
56c8b52d 430 printf("No objects discovered.\n");
445bd57e 431 else if (streq(l[0], "/") && !l[1])
56c8b52d 432 printf("Only root object discovered.\n");
445bd57e
ZJS
433 else
434 print_subtree("", "/", l);
d9130355
LP
435}
436
a1ad3767
LP
437static int on_path(const char *path, void *userdata) {
438 Set *paths = userdata;
d9130355
LP
439 int r;
440
a1ad3767 441 assert(paths);
d9130355 442
be327321 443 r = set_put_strdup(&paths, path);
a1ad3767
LP
444 if (r < 0)
445 return log_oom();
d9130355 446
a1ad3767 447 return 0;
d9130355
LP
448}
449
50f20d1b 450static int find_nodes(sd_bus *bus, const char *service, const char *path, Set *paths) {
0171da06 451 static const XMLIntrospectOps ops = {
a1ad3767
LP
452 .on_path = on_path,
453 };
454
4afd3348
LP
455 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
456 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
a1ad3767 457 const char *xml;
d9130355
LP
458 int r;
459
16c347b3
ZJS
460 r = sd_bus_call_method(bus, service, path,
461 "org.freedesktop.DBus.Introspectable", "Introspect",
462 &error, &reply, "");
d9130355 463 if (r < 0) {
50f20d1b
ZJS
464 printf("%sFailed to introspect object %s of service %s: %s%s\n",
465 ansi_highlight_red(),
466 path, service, bus_error_message(&error, r),
467 ansi_normal());
d9130355
LP
468 return r;
469 }
470
471 r = sd_bus_message_read(reply, "s", &xml);
472 if (r < 0)
473 return bus_log_parse_error(r);
474
a1ad3767 475 return parse_xml_introspect(path, xml, &ops, paths);
d9130355
LP
476}
477
445bd57e 478static int tree_one(sd_bus *bus, const char *service) {
4c163bf1 479 _cleanup_set_free_ Set *paths = NULL, *done = NULL, *failed = NULL;
d9130355 480 _cleanup_free_ char **l = NULL;
d9130355
LP
481 int r;
482
4c163bf1
ZJS
483 r = set_put_strdup(&paths, "/");
484 if (r < 0)
d9130355
LP
485 return log_oom();
486
4c163bf1 487 done = set_new(&string_hash_ops_free);
d9130355
LP
488 if (!done)
489 return log_oom();
490
4c163bf1 491 failed = set_new(&string_hash_ops_free);
d9130355
LP
492 if (!failed)
493 return log_oom();
494
d9130355
LP
495 for (;;) {
496 _cleanup_free_ char *p = NULL;
497 int q;
498
499 p = set_steal_first(paths);
500 if (!p)
501 break;
502
503 if (set_contains(done, p) ||
504 set_contains(failed, p))
505 continue;
506
50f20d1b 507 q = find_nodes(bus, service, p, paths);
4c163bf1
ZJS
508 if (q < 0 && r >= 0)
509 r = q;
d9130355 510
4c163bf1
ZJS
511 q = set_consume(q < 0 ? failed : done, TAKE_PTR(p));
512 assert(q != 0);
d9130355
LP
513 if (q < 0)
514 return log_oom();
d9130355
LP
515 }
516
0221d68a 517 (void) pager_open(arg_pager_flags);
73fc23c0 518
d9130355
LP
519 l = set_get_strv(done);
520 if (!l)
521 return log_oom();
522
523 strv_sort(l);
445bd57e 524 print_tree(l);
d9130355
LP
525
526 fflush(stdout);
527
528 return r;
529}
530
9bb31a0c
YW
531static int tree(int argc, char **argv, void *userdata) {
532 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
d9130355 533 char **i;
c53aafb7 534 int r;
d9130355 535
50f20d1b
ZJS
536 /* Do superficial verification of arguments before even opening the bus */
537 STRV_FOREACH(i, strv_skip(argv, 1))
538 if (!sd_bus_service_name_is_valid(*i))
539 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
540 "Invalid bus service name: %s", *i);
541
d9130355
LP
542 if (!arg_unique && !arg_acquired)
543 arg_acquired = true;
544
9bb31a0c
YW
545 r = acquire_bus(false, &bus);
546 if (r < 0)
547 return r;
548
549 if (argc <= 1) {
d9130355 550 _cleanup_strv_free_ char **names = NULL;
56c8b52d 551 bool not_first = false;
d9130355
LP
552
553 r = sd_bus_list_names(bus, &names, NULL);
23bbb0de
MS
554 if (r < 0)
555 return log_error_errno(r, "Failed to get name list: %m");
d9130355 556
0221d68a 557 (void) pager_open(arg_pager_flags);
d9130355
LP
558
559 STRV_FOREACH(i, names) {
560 int q;
561
562 if (!arg_unique && (*i)[0] == ':')
563 continue;
564
565 if (!arg_acquired && (*i)[0] == ':')
566 continue;
567
568 if (not_first)
569 printf("\n");
570
1fc464f6 571 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
d9130355 572
445bd57e 573 q = tree_one(bus, *i);
d9130355
LP
574 if (q < 0 && r >= 0)
575 r = q;
576
577 not_first = true;
578 }
50f20d1b
ZJS
579 } else
580 STRV_FOREACH(i, strv_skip(argv, 1)) {
d9130355
LP
581 int q;
582
583 if (i > argv+1)
584 printf("\n");
585
73fc23c0 586 if (argv[2]) {
0221d68a 587 (void) pager_open(arg_pager_flags);
1fc464f6 588 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
73fc23c0 589 }
d9130355 590
445bd57e 591 q = tree_one(bus, *i);
d9130355
LP
592 if (q < 0 && r >= 0)
593 r = q;
594 }
d9130355
LP
595
596 return r;
597}
598
1fc55609
LP
599static int format_cmdline(sd_bus_message *m, FILE *f, bool needs_space) {
600 int r;
601
602 for (;;) {
603 const char *contents = NULL;
604 char type;
605 union {
606 uint8_t u8;
607 uint16_t u16;
608 int16_t s16;
609 uint32_t u32;
610 int32_t s32;
611 uint64_t u64;
612 int64_t s64;
613 double d64;
614 const char *string;
615 int i;
616 } basic;
617
618 r = sd_bus_message_peek_type(m, &type, &contents);
317f2fc9 619 if (r < 0)
1fc55609 620 return r;
317f2fc9
LP
621 if (r == 0)
622 return needs_space;
1fc55609
LP
623
624 if (bus_type_is_container(type) > 0) {
625
626 r = sd_bus_message_enter_container(m, type, contents);
627 if (r < 0)
628 return r;
629
630 if (type == SD_BUS_TYPE_ARRAY) {
631 unsigned n = 0;
632
633 /* count array entries */
634 for (;;) {
635
636 r = sd_bus_message_skip(m, contents);
637 if (r < 0)
638 return r;
639 if (r == 0)
640 break;
641
642 n++;
643 }
644
645 r = sd_bus_message_rewind(m, false);
646 if (r < 0)
647 return r;
648
649 if (needs_space)
650 fputc(' ', f);
651
652 fprintf(f, "%u", n);
317f2fc9
LP
653 needs_space = true;
654
1fc55609
LP
655 } else if (type == SD_BUS_TYPE_VARIANT) {
656
657 if (needs_space)
658 fputc(' ', f);
659
660 fprintf(f, "%s", contents);
317f2fc9 661 needs_space = true;
1fc55609
LP
662 }
663
317f2fc9 664 r = format_cmdline(m, f, needs_space);
1fc55609
LP
665 if (r < 0)
666 return r;
667
317f2fc9
LP
668 needs_space = r > 0;
669
1fc55609
LP
670 r = sd_bus_message_exit_container(m);
671 if (r < 0)
672 return r;
673
674 continue;
675 }
676
677 r = sd_bus_message_read_basic(m, type, &basic);
678 if (r < 0)
679 return r;
680
681 if (needs_space)
682 fputc(' ', f);
683
684 switch (type) {
685 case SD_BUS_TYPE_BYTE:
686 fprintf(f, "%u", basic.u8);
687 break;
688
689 case SD_BUS_TYPE_BOOLEAN:
690 fputs(true_false(basic.i), f);
691 break;
692
693 case SD_BUS_TYPE_INT16:
694 fprintf(f, "%i", basic.s16);
695 break;
696
697 case SD_BUS_TYPE_UINT16:
698 fprintf(f, "%u", basic.u16);
699 break;
700
701 case SD_BUS_TYPE_INT32:
702 fprintf(f, "%i", basic.s32);
703 break;
704
705 case SD_BUS_TYPE_UINT32:
706 fprintf(f, "%u", basic.u32);
707 break;
708
709 case SD_BUS_TYPE_INT64:
710 fprintf(f, "%" PRIi64, basic.s64);
711 break;
712
713 case SD_BUS_TYPE_UINT64:
714 fprintf(f, "%" PRIu64, basic.u64);
715 break;
716
717 case SD_BUS_TYPE_DOUBLE:
718 fprintf(f, "%g", basic.d64);
719 break;
720
721 case SD_BUS_TYPE_STRING:
722 case SD_BUS_TYPE_OBJECT_PATH:
723 case SD_BUS_TYPE_SIGNATURE: {
724 _cleanup_free_ char *b = NULL;
725
726 b = cescape(basic.string);
727 if (!b)
728 return -ENOMEM;
729
730 fprintf(f, "\"%s\"", b);
731 break;
732 }
733
734 case SD_BUS_TYPE_UNIX_FD:
735 fprintf(f, "%i", basic.i);
736 break;
737
738 default:
739 assert_not_reached("Unknown basic type.");
740 }
741
1ed24c61 742 needs_space = true;
1fc55609
LP
743 }
744}
745
0171da06
LP
746typedef struct Member {
747 const char *type;
748 char *interface;
749 char *name;
750 char *signature;
751 char *result;
1fc55609 752 char *value;
0171da06
LP
753 bool writable;
754 uint64_t flags;
755} Member;
756
7a08d314 757static void member_hash_func(const Member *m, struct siphash *state) {
1e2527a6 758 uint64_t arity = 1;
0171da06
LP
759
760 assert(m);
761 assert(m->type);
762
b826ab58 763 string_hash_func(m->type, state);
0171da06 764
1e2527a6
TG
765 arity += !!m->name + !!m->interface;
766
767 uint64_hash_func(&arity, state);
768
0171da06 769 if (m->name)
b826ab58 770 string_hash_func(m->name, state);
0171da06
LP
771
772 if (m->interface)
b826ab58 773 string_hash_func(m->interface, state);
0171da06
LP
774}
775
dc5f9c6f 776static int member_compare_func(const Member *x, const Member *y) {
0171da06
LP
777 int d;
778
779 assert(x);
780 assert(y);
781 assert(x->type);
782 assert(y->type);
783
c030a850
NK
784 d = strcmp_ptr(x->interface, y->interface);
785 if (d != 0)
786 return d;
0171da06
LP
787
788 d = strcmp(x->type, y->type);
789 if (d != 0)
790 return d;
791
c030a850 792 return strcmp_ptr(x->name, y->name);
0171da06
LP
793}
794
93bab288
YW
795static int member_compare_funcp(Member * const *a, Member * const *b) {
796 return member_compare_func(*a, *b);
0171da06
LP
797}
798
799static void member_free(Member *m) {
800 if (!m)
801 return;
802
803 free(m->interface);
804 free(m->name);
805 free(m->signature);
806 free(m->result);
1fc55609 807 free(m->value);
0171da06
LP
808 free(m);
809}
810
811DEFINE_TRIVIAL_CLEANUP_FUNC(Member*, member_free);
812
813static void member_set_free(Set *s) {
224b0e7a 814 set_free_with_destructor(s, member_free);
0171da06
LP
815}
816
817DEFINE_TRIVIAL_CLEANUP_FUNC(Set*, member_set_free);
818
819static int on_interface(const char *interface, uint64_t flags, void *userdata) {
820 _cleanup_(member_freep) Member *m;
821 Set *members = userdata;
822 int r;
823
824 assert(interface);
825 assert(members);
826
9600c27c 827 m = new(Member, 1);
0171da06
LP
828 if (!m)
829 return log_oom();
830
9600c27c
LP
831 *m = (Member) {
832 .type = "interface",
833 .flags = flags,
834 };
0171da06
LP
835
836 r = free_and_strdup(&m->interface, interface);
837 if (r < 0)
838 return log_oom();
839
840 r = set_put(members, m);
f17153a7
LP
841 if (r == -EEXIST)
842 return log_error_errno(r, "Invalid introspection data: duplicate interface '%s'.", interface);
843 if (r < 0)
844 return log_oom();
0171da06
LP
845
846 m = NULL;
847 return 0;
848}
849
850static int on_method(const char *interface, const char *name, const char *signature, const char *result, uint64_t flags, void *userdata) {
851 _cleanup_(member_freep) Member *m;
852 Set *members = userdata;
853 int r;
854
855 assert(interface);
856 assert(name);
857
9600c27c 858 m = new(Member, 1);
0171da06
LP
859 if (!m)
860 return log_oom();
861
9600c27c
LP
862 *m = (Member) {
863 .type = "method",
864 .flags = flags,
865 };
0171da06
LP
866
867 r = free_and_strdup(&m->interface, interface);
868 if (r < 0)
869 return log_oom();
870
871 r = free_and_strdup(&m->name, name);
872 if (r < 0)
873 return log_oom();
874
875 r = free_and_strdup(&m->signature, signature);
876 if (r < 0)
877 return log_oom();
878
879 r = free_and_strdup(&m->result, result);
880 if (r < 0)
881 return log_oom();
882
883 r = set_put(members, m);
f17153a7
LP
884 if (r == -EEXIST)
885 return log_error_errno(r, "Invalid introspection data: duplicate method '%s' on interface '%s'.", name, interface);
886 if (r < 0)
887 return log_oom();
0171da06
LP
888
889 m = NULL;
890 return 0;
891}
892
893static int on_signal(const char *interface, const char *name, const char *signature, uint64_t flags, void *userdata) {
894 _cleanup_(member_freep) Member *m;
895 Set *members = userdata;
896 int r;
897
898 assert(interface);
899 assert(name);
900
9600c27c 901 m = new(Member, 1);
0171da06
LP
902 if (!m)
903 return log_oom();
904
9600c27c
LP
905 *m = (Member) {
906 .type = "signal",
907 .flags = flags,
908 };
0171da06
LP
909
910 r = free_and_strdup(&m->interface, interface);
911 if (r < 0)
912 return log_oom();
913
914 r = free_and_strdup(&m->name, name);
915 if (r < 0)
916 return log_oom();
917
918 r = free_and_strdup(&m->signature, signature);
919 if (r < 0)
920 return log_oom();
921
922 r = set_put(members, m);
f17153a7
LP
923 if (r == -EEXIST)
924 return log_error_errno(r, "Invalid introspection data: duplicate signal '%s' on interface '%s'.", name, interface);
925 if (r < 0)
926 return log_oom();
0171da06
LP
927
928 m = NULL;
929 return 0;
930}
931
932static int on_property(const char *interface, const char *name, const char *signature, bool writable, uint64_t flags, void *userdata) {
933 _cleanup_(member_freep) Member *m;
934 Set *members = userdata;
935 int r;
936
937 assert(interface);
938 assert(name);
939
9600c27c 940 m = new(Member, 1);
0171da06
LP
941 if (!m)
942 return log_oom();
943
9600c27c
LP
944 *m = (Member) {
945 .type = "property",
946 .flags = flags,
947 .writable = writable,
948 };
0171da06
LP
949
950 r = free_and_strdup(&m->interface, interface);
951 if (r < 0)
952 return log_oom();
953
954 r = free_and_strdup(&m->name, name);
955 if (r < 0)
956 return log_oom();
957
958 r = free_and_strdup(&m->signature, signature);
959 if (r < 0)
960 return log_oom();
961
962 r = set_put(members, m);
f17153a7
LP
963 if (r == -EEXIST)
964 return log_error_errno(r, "Invalid introspection data: duplicate property '%s' on interface '%s'.", name, interface);
965 if (r < 0)
966 return log_oom();
0171da06
LP
967
968 m = NULL;
969 return 0;
970}
971
7a08d314 972DEFINE_PRIVATE_HASH_OPS(member_hash_ops, Member, member_hash_func, member_compare_func);
0171da06 973
7a08d314 974static int introspect(int argc, char **argv, void *userdata) {
0171da06
LP
975 static const XMLIntrospectOps ops = {
976 .on_interface = on_interface,
977 .on_method = on_method,
978 .on_signal = on_signal,
979 .on_property = on_property,
980 };
981
9bb31a0c 982 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
9efebb65 983 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply_xml = NULL;
4afd3348 984 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
0171da06 985 _cleanup_(member_set_freep) Set *members = NULL;
9bb31a0c
YW
986 unsigned name_width, type_width, signature_width, result_width, j, k = 0;
987 Member *m, **sorted = NULL;
0171da06
LP
988 const char *xml;
989 int r;
0171da06 990
9bb31a0c
YW
991 r = acquire_bus(false, &bus);
992 if (r < 0)
993 return r;
4f44c03e 994
0171da06
LP
995 members = set_new(&member_hash_ops);
996 if (!members)
997 return log_oom();
998
16c347b3
ZJS
999 r = sd_bus_call_method(bus, argv[1], argv[2],
1000 "org.freedesktop.DBus.Introspectable", "Introspect",
1001 &error, &reply_xml, "");
e51faad3 1002 if (r < 0)
16c347b3
ZJS
1003 return log_error_errno(r, "Failed to introspect object %s of service %s: %s",
1004 argv[2], argv[1], bus_error_message(&error, r));
0171da06 1005
9efebb65 1006 r = sd_bus_message_read(reply_xml, "s", &xml);
0171da06
LP
1007 if (r < 0)
1008 return bus_log_parse_error(r);
1009
d5c8d823
ZJS
1010 if (arg_xml_interface) {
1011 /* Just dump the received XML and finish */
8722b297 1012 (void) pager_open(arg_pager_flags);
d5c8d823
ZJS
1013 puts(xml);
1014 return 0;
1015 }
1016
1fc55609 1017 /* First, get list of all properties */
0171da06
LP
1018 r = parse_xml_introspect(argv[2], xml, &ops, members);
1019 if (r < 0)
1020 return r;
1021
1fc55609 1022 /* Second, find the current values for them */
90e74a66 1023 SET_FOREACH(m, members) {
9efebb65 1024 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1fc55609
LP
1025
1026 if (!streq(m->type, "property"))
1027 continue;
1028
1029 if (m->value)
1030 continue;
1031
4f44c03e
LP
1032 if (argv[3] && !streq(argv[3], m->interface))
1033 continue;
1034
16c347b3
ZJS
1035 r = sd_bus_call_method(bus, argv[1], argv[2],
1036 "org.freedesktop.DBus.Properties", "GetAll",
1037 &error, &reply, "s", m->interface);
e51faad3 1038 if (r < 0)
24a4e7ff
ZJS
1039 return log_error_errno(r, "Failed to get all properties on interface %s: %s",
1040 m->interface, bus_error_message(&error, r));
1fc55609
LP
1041
1042 r = sd_bus_message_enter_container(reply, 'a', "{sv}");
1043 if (r < 0)
1044 return bus_log_parse_error(r);
1045
1046 for (;;) {
1047 Member *z;
1048 _cleanup_free_ char *buf = NULL;
1049 _cleanup_fclose_ FILE *mf = NULL;
1050 size_t sz = 0;
1051 const char *name;
1052
1053 r = sd_bus_message_enter_container(reply, 'e', "sv");
1054 if (r < 0)
1055 return bus_log_parse_error(r);
1056
1057 if (r == 0)
1058 break;
1059
1060 r = sd_bus_message_read(reply, "s", &name);
1061 if (r < 0)
1062 return bus_log_parse_error(r);
1063
1064 r = sd_bus_message_enter_container(reply, 'v', NULL);
1065 if (r < 0)
1066 return bus_log_parse_error(r);
1067
2fe21124 1068 mf = open_memstream_unlocked(&buf, &sz);
1fc55609
LP
1069 if (!mf)
1070 return log_oom();
1071
1072 r = format_cmdline(reply, mf, false);
1073 if (r < 0)
1074 return bus_log_parse_error(r);
1075
8d3b9edc 1076 mf = safe_fclose(mf);
1fc55609
LP
1077
1078 z = set_get(members, &((Member) {
1079 .type = "property",
1080 .interface = m->interface,
1081 .name = (char*) name }));
8d3b9edc
LP
1082 if (z)
1083 free_and_replace(z->value, buf);
1fc55609
LP
1084
1085 r = sd_bus_message_exit_container(reply);
1086 if (r < 0)
1087 return bus_log_parse_error(r);
1088
1089 r = sd_bus_message_exit_container(reply);
1090 if (r < 0)
1091 return bus_log_parse_error(r);
1092 }
1093
1094 r = sd_bus_message_exit_container(reply);
1095 if (r < 0)
1096 return bus_log_parse_error(r);
1097 }
1098
8722b297
ZJS
1099 name_width = strlen("NAME");
1100 type_width = strlen("TYPE");
1101 signature_width = strlen("SIGNATURE");
1102 result_width = strlen("RESULT/VALUE");
0171da06
LP
1103
1104 sorted = newa(Member*, set_size(members));
1105
90e74a66 1106 SET_FOREACH(m, members) {
4f44c03e
LP
1107 if (argv[3] && !streq(argv[3], m->interface))
1108 continue;
1109
0171da06
LP
1110 if (m->interface)
1111 name_width = MAX(name_width, strlen(m->interface));
1112 if (m->name)
1113 name_width = MAX(name_width, strlen(m->name) + 1);
1114 if (m->type)
1115 type_width = MAX(type_width, strlen(m->type));
1116 if (m->signature)
1117 signature_width = MAX(signature_width, strlen(m->signature));
1118 if (m->result)
1119 result_width = MAX(result_width, strlen(m->result));
1fc55609
LP
1120 if (m->value)
1121 result_width = MAX(result_width, strlen(m->value));
0171da06
LP
1122
1123 sorted[k++] = m;
1124 }
1125
1fc55609
LP
1126 if (result_width > 40)
1127 result_width = 40;
1128
93bab288 1129 typesafe_qsort(sorted, k, member_compare_funcp);
0171da06 1130
8722b297
ZJS
1131 (void) pager_open(arg_pager_flags);
1132
d7a0f1f4 1133 if (arg_legend)
1fc55609
LP
1134 printf("%-*s %-*s %-*s %-*s %s\n",
1135 (int) name_width, "NAME",
1136 (int) type_width, "TYPE",
1137 (int) signature_width, "SIGNATURE",
1138 (int) result_width, "RESULT/VALUE",
1139 "FLAGS");
0171da06
LP
1140
1141 for (j = 0; j < k; j++) {
1fc55609
LP
1142 _cleanup_free_ char *ellipsized = NULL;
1143 const char *rv;
0171da06
LP
1144 bool is_interface;
1145
1146 m = sorted[j];
1147
4f44c03e
LP
1148 if (argv[3] && !streq(argv[3], m->interface))
1149 continue;
1150
0171da06
LP
1151 is_interface = streq(m->type, "interface");
1152
4f44c03e
LP
1153 if (argv[3] && is_interface)
1154 continue;
1155
1fc55609
LP
1156 if (m->value) {
1157 ellipsized = ellipsize(m->value, result_width, 100);
1158 if (!ellipsized)
1159 return log_oom();
1160
1161 rv = ellipsized;
1162 } else
c5984fe1 1163 rv = empty_to_dash(m->result);
1fc55609 1164
0171da06
LP
1165 printf("%s%s%-*s%s %-*s %-*s %-*s%s%s%s%s%s%s\n",
1166 is_interface ? ansi_highlight() : "",
1167 is_interface ? "" : ".",
16c347b3
ZJS
1168 - !is_interface + (int) name_width,
1169 empty_to_dash(streq_ptr(m->type, "interface") ? m->interface : m->name),
1fc464f6 1170 is_interface ? ansi_normal() : "",
c5984fe1
YW
1171 (int) type_width, empty_to_dash(m->type),
1172 (int) signature_width, empty_to_dash(m->signature),
1fc55609 1173 (int) result_width, rv,
0171da06
LP
1174 (m->flags & SD_BUS_VTABLE_DEPRECATED) ? " deprecated" : (m->flags || m->writable ? "" : " -"),
1175 (m->flags & SD_BUS_VTABLE_METHOD_NO_REPLY) ? " no-reply" : "",
1176 (m->flags & SD_BUS_VTABLE_PROPERTY_CONST) ? " const" : "",
1177 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE) ? " emits-change" : "",
1178 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION) ? " emits-invalidation" : "",
1179 m->writable ? " writable" : "");
1180 }
1181
1182 return 0;
1183}
1184
1f70b087 1185static int message_dump(sd_bus_message *m, FILE *f) {
2b4a65b6 1186 return sd_bus_message_dump(m, f, SD_BUS_MESSAGE_DUMP_WITH_HEADER);
1f70b087
LP
1187}
1188
1189static int message_pcap(sd_bus_message *m, FILE *f) {
1190 return bus_message_pcap_frame(m, arg_snaplen, f);
1191}
1192
2de62253
LP
1193static int message_json(sd_bus_message *m, FILE *f) {
1194 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL, *w = NULL;
1195 char e[2];
1196 int r;
1197
1198 r = json_transform_message(m, &v);
1199 if (r < 0)
1200 return r;
1201
1202 e[0] = m->header->endian;
1203 e[1] = 0;
1204
1205 r = json_build(&w, JSON_BUILD_OBJECT(
16c347b3
ZJS
1206 JSON_BUILD_PAIR("type", JSON_BUILD_STRING(bus_message_type_to_string(m->header->type))),
1207 JSON_BUILD_PAIR("endian", JSON_BUILD_STRING(e)),
1208 JSON_BUILD_PAIR("flags", JSON_BUILD_INTEGER(m->header->flags)),
1209 JSON_BUILD_PAIR("version", JSON_BUILD_INTEGER(m->header->version)),
1210 JSON_BUILD_PAIR("cookie", JSON_BUILD_INTEGER(BUS_MESSAGE_COOKIE(m))),
1211 JSON_BUILD_PAIR_CONDITION(m->reply_cookie != 0, "reply_cookie", JSON_BUILD_INTEGER(m->reply_cookie)),
1212 JSON_BUILD_PAIR_CONDITION(m->sender, "sender", JSON_BUILD_STRING(m->sender)),
1213 JSON_BUILD_PAIR_CONDITION(m->destination, "destination", JSON_BUILD_STRING(m->destination)),
1214 JSON_BUILD_PAIR_CONDITION(m->path, "path", JSON_BUILD_STRING(m->path)),
1215 JSON_BUILD_PAIR_CONDITION(m->interface, "interface", JSON_BUILD_STRING(m->interface)),
1216 JSON_BUILD_PAIR_CONDITION(m->member, "member", JSON_BUILD_STRING(m->member)),
1217 JSON_BUILD_PAIR_CONDITION(m->monotonic != 0, "monotonic", JSON_BUILD_INTEGER(m->monotonic)),
1218 JSON_BUILD_PAIR_CONDITION(m->realtime != 0, "realtime", JSON_BUILD_INTEGER(m->realtime)),
1219 JSON_BUILD_PAIR_CONDITION(m->seqnum != 0, "seqnum", JSON_BUILD_INTEGER(m->seqnum)),
1220 JSON_BUILD_PAIR_CONDITION(m->error.name, "error_name", JSON_BUILD_STRING(m->error.name)),
1221 JSON_BUILD_PAIR("payload", JSON_BUILD_VARIANT(v))));
2de62253
LP
1222 if (r < 0)
1223 return log_error_errno(r, "Failed to build JSON object: %m");
1224
1225 json_dump_with_flags(w, f);
1226 return 0;
1227}
1228
9bb31a0c
YW
1229static int monitor(int argc, char **argv, int (*dump)(sd_bus_message *m, FILE *f)) {
1230 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
17fd7460
LU
1231 _cleanup_(sd_bus_message_unrefp) sd_bus_message *message = NULL;
1232 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1f849790 1233 char **i;
17fd7460 1234 uint32_t flags = 0;
f5938e8f
TG
1235 const char *unique_name;
1236 bool is_monitor = false;
1f849790
LP
1237 int r;
1238
9bb31a0c
YW
1239 r = acquire_bus(true, &bus);
1240 if (r < 0)
1241 return r;
1242
17fd7460 1243 /* upgrade connection; it's not used for anything else after this call */
24a4e7ff
ZJS
1244 r = sd_bus_message_new_method_call(bus,
1245 &message,
1246 "org.freedesktop.DBus",
1247 "/org/freedesktop/DBus",
1248 "org.freedesktop.DBus.Monitoring",
1249 "BecomeMonitor");
17fd7460
LU
1250 if (r < 0)
1251 return bus_log_create_error(r);
1252
1253 r = sd_bus_message_open_container(message, 'a', "s");
1254 if (r < 0)
1255 return bus_log_create_error(r);
1256
1f849790
LP
1257 STRV_FOREACH(i, argv+1) {
1258 _cleanup_free_ char *m = NULL;
1259
5453a4b1 1260 if (!sd_bus_service_name_is_valid(*i))
0747cde7 1261 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid service name '%s'", *i);
1f849790 1262
605405c6 1263 m = strjoin("sender='", *i, "'");
1f849790
LP
1264 if (!m)
1265 return log_oom();
1266
17fd7460 1267 r = sd_bus_message_append_basic(message, 's', m);
23bbb0de 1268 if (r < 0)
17fd7460 1269 return bus_log_create_error(r);
b51f299a 1270
f6d1e6cb 1271 free(m);
605405c6 1272 m = strjoin("destination='", *i, "'");
f6d1e6cb
LU
1273 if (!m)
1274 return log_oom();
1275
17fd7460 1276 r = sd_bus_message_append_basic(message, 's', m);
f6d1e6cb 1277 if (r < 0)
17fd7460 1278 return bus_log_create_error(r);
1f849790
LP
1279 }
1280
1281 STRV_FOREACH(i, arg_matches) {
17fd7460 1282 r = sd_bus_message_append_basic(message, 's', *i);
23bbb0de 1283 if (r < 0)
17fd7460 1284 return bus_log_create_error(r);
b51f299a
LP
1285 }
1286
17fd7460
LU
1287 r = sd_bus_message_close_container(message);
1288 if (r < 0)
1289 return bus_log_create_error(r);
1290
1291 r = sd_bus_message_append_basic(message, 'u', &flags);
1292 if (r < 0)
1293 return bus_log_create_error(r);
1294
1295 r = sd_bus_call(bus, message, arg_timeout, &error, NULL);
48956c39 1296 if (r < 0)
24a4e7ff
ZJS
1297 return log_error_errno(r, "Call to org.freedesktop.DBus.Monitoring.BecomeMonitor failed: %s",
1298 bus_error_message(&error, r));
1f849790 1299
f5938e8f
TG
1300 r = sd_bus_get_unique_name(bus, &unique_name);
1301 if (r < 0)
1302 return log_error_errno(r, "Failed to get unique name: %m");
1303
92d66625
LP
1304 log_info("Monitoring bus message stream.");
1305
1f849790 1306 for (;;) {
4afd3348 1307 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
1f849790
LP
1308
1309 r = sd_bus_process(bus, &m);
23bbb0de
MS
1310 if (r < 0)
1311 return log_error_errno(r, "Failed to process bus: %m");
1f849790 1312
f5938e8f
TG
1313 if (!is_monitor) {
1314 const char *name;
1315
1316 /* wait until we lose our unique name */
1317 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus", "NameLost") <= 0)
1318 continue;
1319
1320 r = sd_bus_message_read(m, "s", &name);
1321 if (r < 0)
d67b1d18 1322 return bus_log_parse_error(r);
f5938e8f 1323
d27d4637
TG
1324 if (streq(name, unique_name))
1325 is_monitor = true;
f5938e8f 1326
d27d4637 1327 continue;
f5938e8f
TG
1328 }
1329
1f849790 1330 if (m) {
1f70b087 1331 dump(m, stdout);
1d44f758 1332 fflush(stdout);
92d66625
LP
1333
1334 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected") > 0) {
1335 log_info("Connection terminated, exiting.");
1336 return 0;
1337 }
1338
1f849790
LP
1339 continue;
1340 }
1341
1342 if (r > 0)
1343 continue;
1344
1345 r = sd_bus_wait(bus, (uint64_t) -1);
23bbb0de
MS
1346 if (r < 0)
1347 return log_error_errno(r, "Failed to wait for bus: %m");
1f849790 1348 }
95c4fe82 1349}
1f849790 1350
9bb31a0c 1351static int verb_monitor(int argc, char **argv, void *userdata) {
2de62253 1352 return monitor(argc, argv, arg_json != JSON_OFF ? message_json : message_dump);
9bb31a0c
YW
1353}
1354
1355static int verb_capture(int argc, char **argv, void *userdata) {
1f70b087
LP
1356 int r;
1357
baaa35ad
ZJS
1358 if (isatty(fileno(stdout)) > 0)
1359 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1360 "Refusing to write message data to console, please redirect output to a file.");
1f70b087
LP
1361
1362 bus_pcap_header(arg_snaplen, stdout);
1363
9bb31a0c 1364 r = monitor(argc, argv, message_pcap);
1f70b087
LP
1365 if (r < 0)
1366 return r;
1367
6b0f5484
LP
1368 r = fflush_and_check(stdout);
1369 if (r < 0)
1370 return log_error_errno(r, "Couldn't write capture file: %m");
1f70b087
LP
1371
1372 return r;
1373}
1374
9bb31a0c
YW
1375static int status(int argc, char **argv, void *userdata) {
1376 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348 1377 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
95c4fe82
LP
1378 pid_t pid;
1379 int r;
1380
9bb31a0c
YW
1381 r = acquire_bus(false, &bus);
1382 if (r < 0)
1383 return r;
95c4fe82 1384
8722b297
ZJS
1385 (void) pager_open(arg_pager_flags);
1386
9bb31a0c 1387 if (!isempty(argv[1])) {
2e9efd22
LP
1388 r = parse_pid(argv[1], &pid);
1389 if (r < 0)
1390 r = sd_bus_get_name_creds(
1391 bus,
1392 argv[1],
1393 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1394 &creds);
1395 else
1396 r = sd_bus_creds_new_from_pid(
1397 &creds,
1398 pid,
1399 _SD_BUS_CREDS_ALL);
3acc1daf 1400 } else {
5b820358 1401 const char *scope, *address;
5c302692 1402 sd_id128_t bus_id;
3acc1daf 1403
5b820358
LP
1404 r = sd_bus_get_address(bus, &address);
1405 if (r >= 0)
1fc464f6 1406 printf("BusAddress=%s%s%s\n", ansi_highlight(), address, ansi_normal());
5b820358 1407
3acc1daf
LP
1408 r = sd_bus_get_scope(bus, &scope);
1409 if (r >= 0)
1fc464f6 1410 printf("BusScope=%s%s%s\n", ansi_highlight(), scope, ansi_normal());
3acc1daf 1411
5c302692
LP
1412 r = sd_bus_get_bus_id(bus, &bus_id);
1413 if (r >= 0)
16c347b3
ZJS
1414 printf("BusID=%s" SD_ID128_FORMAT_STR "%s\n",
1415 ansi_highlight(), SD_ID128_FORMAT_VAL(bus_id), ansi_normal());
5c302692 1416
2e9efd22 1417 r = sd_bus_get_owner_creds(
40ed1a45 1418 bus,
40ed1a45
LP
1419 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1420 &creds);
3acc1daf 1421 }
95c4fe82 1422
23bbb0de
MS
1423 if (r < 0)
1424 return log_error_errno(r, "Failed to get credentials: %m");
95c4fe82 1425
d0b2babf 1426 bus_creds_dump(creds, NULL, false);
95c4fe82 1427 return 0;
1f849790
LP
1428}
1429
781fa938
LP
1430static int message_append_cmdline(sd_bus_message *m, const char *signature, char ***x) {
1431 char **p;
1432 int r;
1433
1434 assert(m);
1435 assert(signature);
1436 assert(x);
1437
1438 p = *x;
1439
1440 for (;;) {
1441 const char *v;
1442 char t;
1443
1444 t = *signature;
1445 v = *p;
1446
1447 if (t == 0)
1448 break;
baaa35ad
ZJS
1449 if (!v)
1450 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1451 "Too few parameters for signature.");
781fa938
LP
1452
1453 signature++;
1454 p++;
1455
1456 switch (t) {
1457
1458 case SD_BUS_TYPE_BOOLEAN:
1459
1460 r = parse_boolean(v);
48956c39 1461 if (r < 0)
3d9942de 1462 return log_error_errno(r, "Failed to parse '%s' as boolean: %m", v);
781fa938
LP
1463
1464 r = sd_bus_message_append_basic(m, t, &r);
1465 break;
1466
1467 case SD_BUS_TYPE_BYTE: {
1468 uint8_t z;
1469
1470 r = safe_atou8(v, &z);
48956c39 1471 if (r < 0)
3d9942de 1472 return log_error_errno(r, "Failed to parse '%s' as byte (unsigned 8bit integer): %m", v);
781fa938
LP
1473
1474 r = sd_bus_message_append_basic(m, t, &z);
1475 break;
1476 }
1477
1478 case SD_BUS_TYPE_INT16: {
1479 int16_t z;
1480
1481 r = safe_atoi16(v, &z);
48956c39 1482 if (r < 0)
3d9942de 1483 return log_error_errno(r, "Failed to parse '%s' as signed 16bit integer: %m", v);
781fa938
LP
1484
1485 r = sd_bus_message_append_basic(m, t, &z);
1486 break;
1487 }
1488
1489 case SD_BUS_TYPE_UINT16: {
1490 uint16_t z;
1491
1492 r = safe_atou16(v, &z);
48956c39 1493 if (r < 0)
3d9942de 1494 return log_error_errno(r, "Failed to parse '%s' as unsigned 16bit integer: %m", v);
781fa938
LP
1495
1496 r = sd_bus_message_append_basic(m, t, &z);
1497 break;
1498 }
1499
1500 case SD_BUS_TYPE_INT32: {
1501 int32_t z;
1502
1503 r = safe_atoi32(v, &z);
48956c39 1504 if (r < 0)
3d9942de 1505 return log_error_errno(r, "Failed to parse '%s' as signed 32bit integer: %m", v);
781fa938
LP
1506
1507 r = sd_bus_message_append_basic(m, t, &z);
1508 break;
1509 }
1510
1511 case SD_BUS_TYPE_UINT32: {
1512 uint32_t z;
1513
1514 r = safe_atou32(v, &z);
48956c39 1515 if (r < 0)
3d9942de 1516 return log_error_errno(r, "Failed to parse '%s' as unsigned 32bit integer: %m", v);
781fa938
LP
1517
1518 r = sd_bus_message_append_basic(m, t, &z);
1519 break;
1520 }
1521
1522 case SD_BUS_TYPE_INT64: {
1523 int64_t z;
1524
1525 r = safe_atoi64(v, &z);
48956c39 1526 if (r < 0)
3d9942de 1527 return log_error_errno(r, "Failed to parse '%s' as signed 64bit integer: %m", v);
781fa938
LP
1528
1529 r = sd_bus_message_append_basic(m, t, &z);
1530 break;
1531 }
1532
1533 case SD_BUS_TYPE_UINT64: {
1534 uint64_t z;
1535
1536 r = safe_atou64(v, &z);
48956c39 1537 if (r < 0)
3d9942de 1538 return log_error_errno(r, "Failed to parse '%s' as unsigned 64bit integer: %m", v);
781fa938
LP
1539
1540 r = sd_bus_message_append_basic(m, t, &z);
1541 break;
1542 }
1543
781fa938
LP
1544 case SD_BUS_TYPE_DOUBLE: {
1545 double z;
1546
1547 r = safe_atod(v, &z);
48956c39 1548 if (r < 0)
3d9942de 1549 return log_error_errno(r, "Failed to parse '%s' as double precision floating point: %m", v);
781fa938
LP
1550
1551 r = sd_bus_message_append_basic(m, t, &z);
1552 break;
1553 }
1554
1555 case SD_BUS_TYPE_STRING:
1556 case SD_BUS_TYPE_OBJECT_PATH:
1557 case SD_BUS_TYPE_SIGNATURE:
1558
1559 r = sd_bus_message_append_basic(m, t, v);
1560 break;
1561
1562 case SD_BUS_TYPE_ARRAY: {
1563 uint32_t n;
1564 size_t k;
1565
1566 r = safe_atou32(v, &n);
48956c39 1567 if (r < 0)
3d9942de 1568 return log_error_errno(r, "Failed to parse '%s' number of array entries: %m", v);
781fa938
LP
1569
1570 r = signature_element_length(signature, &k);
48956c39 1571 if (r < 0)
3d9942de 1572 return log_error_errno(r, "Invalid array signature: %m");
781fa938
LP
1573
1574 {
781fa938
LP
1575 char s[k + 1];
1576 memcpy(s, signature, k);
1577 s[k] = 0;
1578
1579 r = sd_bus_message_open_container(m, SD_BUS_TYPE_ARRAY, s);
1580 if (r < 0)
1581 return bus_log_create_error(r);
1582
16c347b3 1583 for (unsigned i = 0; i < n; i++) {
781fa938
LP
1584 r = message_append_cmdline(m, s, &p);
1585 if (r < 0)
1586 return r;
1587 }
1588 }
1589
1590 signature += k;
1591
1592 r = sd_bus_message_close_container(m);
1593 break;
1594 }
1595
1596 case SD_BUS_TYPE_VARIANT:
1597 r = sd_bus_message_open_container(m, SD_BUS_TYPE_VARIANT, v);
1598 if (r < 0)
1599 return bus_log_create_error(r);
1600
1601 r = message_append_cmdline(m, v, &p);
1602 if (r < 0)
1603 return r;
1604
1605 r = sd_bus_message_close_container(m);
1606 break;
1607
1608 case SD_BUS_TYPE_STRUCT_BEGIN:
1609 case SD_BUS_TYPE_DICT_ENTRY_BEGIN: {
1610 size_t k;
1611
1612 signature--;
1613 p--;
1614
1615 r = signature_element_length(signature, &k);
48956c39 1616 if (r < 0)
3d9942de 1617 return log_error_errno(r, "Invalid struct/dict entry signature: %m");
781fa938
LP
1618
1619 {
1620 char s[k-1];
1621 memcpy(s, signature + 1, k - 2);
1622 s[k - 2] = 0;
1623
16c347b3
ZJS
1624 const char ctype = t == SD_BUS_TYPE_STRUCT_BEGIN ?
1625 SD_BUS_TYPE_STRUCT : SD_BUS_TYPE_DICT_ENTRY;
1626 r = sd_bus_message_open_container(m, ctype, s);
781fa938
LP
1627 if (r < 0)
1628 return bus_log_create_error(r);
1629
1630 r = message_append_cmdline(m, s, &p);
1631 if (r < 0)
1632 return r;
1633 }
1634
1635 signature += k;
1636
1637 r = sd_bus_message_close_container(m);
1638 break;
1639 }
1640
1641 case SD_BUS_TYPE_UNIX_FD:
baaa35ad
ZJS
1642 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1643 "UNIX file descriptor not supported as type.");
781fa938
LP
1644
1645 default:
baaa35ad
ZJS
1646 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1647 "Unknown signature type %c.", t);
781fa938
LP
1648 }
1649
1650 if (r < 0)
1651 return bus_log_create_error(r);
1652 }
1653
1654 *x = p;
1655 return 0;
1656}
1657
9cebb234
LP
1658static int json_transform_one(sd_bus_message *m, JsonVariant **ret);
1659
1660static int json_transform_array_or_struct(sd_bus_message *m, JsonVariant **ret) {
1661 size_t n_elements = 0, n_allocated = 0;
1662 JsonVariant **elements = NULL;
1663 int r;
1664
1665 assert(m);
1666 assert(ret);
1667
1668 for (;;) {
1669 r = sd_bus_message_at_end(m, false);
1670 if (r < 0) {
1671 bus_log_parse_error(r);
1672 goto finish;
1673 }
1674 if (r > 0)
1675 break;
1676
1677 if (!GREEDY_REALLOC(elements, n_allocated, n_elements + 1)) {
1678 r = log_oom();
1679 goto finish;
1680 }
1681
1682 r = json_transform_one(m, elements + n_elements);
1683 if (r < 0)
1684 goto finish;
1685
1686 n_elements++;
1687 }
1688
1689 r = json_variant_new_array(ret, elements, n_elements);
1690
1691finish:
1692 json_variant_unref_many(elements, n_elements);
1693 free(elements);
1694
1695 return r;
1696}
1697
1698static int json_transform_variant(sd_bus_message *m, const char *contents, JsonVariant **ret) {
172e4806 1699 _cleanup_(json_variant_unrefp) JsonVariant *value = NULL;
9cebb234
LP
1700 int r;
1701
1702 assert(m);
1703 assert(contents);
1704 assert(ret);
1705
1706 r = json_transform_one(m, &value);
1707 if (r < 0)
1708 return r;
1709
1710 r = json_build(ret, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("type", JSON_BUILD_STRING(contents)),
1711 JSON_BUILD_PAIR("data", JSON_BUILD_VARIANT(value))));
1712 if (r < 0)
1713 return log_oom();
1714
1715 return r;
1716}
1717
1718static int json_transform_dict_array(sd_bus_message *m, JsonVariant **ret) {
1719 size_t n_elements = 0, n_allocated = 0;
1720 JsonVariant **elements = NULL;
1721 int r;
1722
1723 assert(m);
1724 assert(ret);
1725
1726 for (;;) {
1727 const char *contents;
1728 char type;
1729
1730 r = sd_bus_message_at_end(m, false);
1731 if (r < 0) {
1732 bus_log_parse_error(r);
1733 goto finish;
1734 }
1735 if (r > 0)
1736 break;
1737
1738 r = sd_bus_message_peek_type(m, &type, &contents);
1739 if (r < 0)
1740 return r;
1741
1742 assert(type == 'e');
1743
1744 if (!GREEDY_REALLOC(elements, n_allocated, n_elements + 2)) {
1745 r = log_oom();
1746 goto finish;
1747 }
1748
1749 r = sd_bus_message_enter_container(m, type, contents);
1750 if (r < 0) {
1751 bus_log_parse_error(r);
1752 goto finish;
1753 }
1754
1755 r = json_transform_one(m, elements + n_elements);
1756 if (r < 0)
1757 goto finish;
1758
1759 n_elements++;
1760
1761 r = json_transform_one(m, elements + n_elements);
1762 if (r < 0)
1763 goto finish;
1764
1765 n_elements++;
1766
1767 r = sd_bus_message_exit_container(m);
1768 if (r < 0) {
1769 bus_log_parse_error(r);
1770 goto finish;
1771 }
1772 }
1773
1774 r = json_variant_new_object(ret, elements, n_elements);
1775
1776finish:
1777 json_variant_unref_many(elements, n_elements);
1778 free(elements);
1779
1780 return r;
1781}
1782
1783static int json_transform_one(sd_bus_message *m, JsonVariant **ret) {
1784 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
1785 const char *contents;
1786 char type;
1787 int r;
1788
1789 assert(m);
1790 assert(ret);
1791
1792 r = sd_bus_message_peek_type(m, &type, &contents);
1793 if (r < 0)
1794 return bus_log_parse_error(r);
1795
1796 switch (type) {
1797
1798 case SD_BUS_TYPE_BYTE: {
1799 uint8_t b;
1800
1801 r = sd_bus_message_read_basic(m, type, &b);
1802 if (r < 0)
1803 return bus_log_parse_error(r);
1804
1805 r = json_variant_new_unsigned(&v, b);
1806 if (r < 0)
1807 return log_error_errno(r, "Failed to transform byte: %m");
1808
1809 break;
1810 }
1811
1812 case SD_BUS_TYPE_BOOLEAN: {
1813 int b;
1814
1815 r = sd_bus_message_read_basic(m, type, &b);
1816 if (r < 0)
1817 return bus_log_parse_error(r);
1818
1819 r = json_variant_new_boolean(&v, b);
1820 if (r < 0)
1821 return log_error_errno(r, "Failed to transform boolean: %m");
1822
1823 break;
1824 }
1825
1826 case SD_BUS_TYPE_INT16: {
1827 int16_t b;
1828
1829 r = sd_bus_message_read_basic(m, type, &b);
1830 if (r < 0)
1831 return bus_log_parse_error(r);
1832
1833 r = json_variant_new_integer(&v, b);
1834 if (r < 0)
1835 return log_error_errno(r, "Failed to transform int16: %m");
1836
1837 break;
1838 }
1839
1840 case SD_BUS_TYPE_UINT16: {
1841 uint16_t b;
1842
1843 r = sd_bus_message_read_basic(m, type, &b);
1844 if (r < 0)
1845 return bus_log_parse_error(r);
1846
1847 r = json_variant_new_unsigned(&v, b);
1848 if (r < 0)
1849 return log_error_errno(r, "Failed to transform uint16: %m");
1850
1851 break;
1852 }
1853
1854 case SD_BUS_TYPE_INT32: {
1855 int32_t b;
1856
1857 r = sd_bus_message_read_basic(m, type, &b);
1858 if (r < 0)
1859 return bus_log_parse_error(r);
1860
1861 r = json_variant_new_integer(&v, b);
1862 if (r < 0)
1863 return log_error_errno(r, "Failed to transform int32: %m");
1864
1865 break;
1866 }
1867
1868 case SD_BUS_TYPE_UINT32: {
1869 uint32_t b;
1870
1871 r = sd_bus_message_read_basic(m, type, &b);
1872 if (r < 0)
1873 return bus_log_parse_error(r);
1874
1875 r = json_variant_new_unsigned(&v, b);
1876 if (r < 0)
1877 return log_error_errno(r, "Failed to transform uint32: %m");
1878
1879 break;
1880 }
1881
1882 case SD_BUS_TYPE_INT64: {
1883 int64_t b;
1884
1885 r = sd_bus_message_read_basic(m, type, &b);
1886 if (r < 0)
1887 return bus_log_parse_error(r);
1888
1889 r = json_variant_new_integer(&v, b);
1890 if (r < 0)
1891 return log_error_errno(r, "Failed to transform int64: %m");
1892
1893 break;
1894 }
1895
1896 case SD_BUS_TYPE_UINT64: {
1897 uint64_t b;
1898
1899 r = sd_bus_message_read_basic(m, type, &b);
1900 if (r < 0)
1901 return bus_log_parse_error(r);
1902
1903 r = json_variant_new_unsigned(&v, b);
1904 if (r < 0)
1905 return log_error_errno(r, "Failed to transform uint64: %m");
1906
1907 break;
1908 }
1909
1910 case SD_BUS_TYPE_DOUBLE: {
1911 double d;
1912
1913 r = sd_bus_message_read_basic(m, type, &d);
1914 if (r < 0)
1915 return bus_log_parse_error(r);
1916
1917 r = json_variant_new_real(&v, d);
1918 if (r < 0)
1919 return log_error_errno(r, "Failed to transform double: %m");
1920
1921 break;
1922 }
1923
1924 case SD_BUS_TYPE_STRING:
1925 case SD_BUS_TYPE_OBJECT_PATH:
1926 case SD_BUS_TYPE_SIGNATURE: {
1927 const char *s;
1928
1929 r = sd_bus_message_read_basic(m, type, &s);
1930 if (r < 0)
1931 return bus_log_parse_error(r);
1932
1933 r = json_variant_new_string(&v, s);
1934 if (r < 0)
1935 return log_error_errno(r, "Failed to transform double: %m");
1936
1937 break;
1938 }
1939
1940 case SD_BUS_TYPE_UNIX_FD:
1941 r = sd_bus_message_read_basic(m, type, NULL);
1942 if (r < 0)
1943 return bus_log_parse_error(r);
1944
1945 r = json_variant_new_null(&v);
1946 if (r < 0)
1947 return log_error_errno(r, "Failed to transform fd: %m");
1948
1949 break;
1950
1951 case SD_BUS_TYPE_ARRAY:
1952 case SD_BUS_TYPE_VARIANT:
1953 case SD_BUS_TYPE_STRUCT:
1954 r = sd_bus_message_enter_container(m, type, contents);
1955 if (r < 0)
1956 return bus_log_parse_error(r);
1957
1958 if (type == SD_BUS_TYPE_VARIANT)
1959 r = json_transform_variant(m, contents, &v);
1960 else if (type == SD_BUS_TYPE_ARRAY && contents[0] == '{')
1961 r = json_transform_dict_array(m, &v);
1962 else
1963 r = json_transform_array_or_struct(m, &v);
1964 if (r < 0)
1965 return r;
1966
1967 r = sd_bus_message_exit_container(m);
1968 if (r < 0)
1969 return bus_log_parse_error(r);
1970
1971 break;
1972
1973 default:
1974 assert_not_reached("Unexpected element type");
1975 }
1976
1977 *ret = TAKE_PTR(v);
1978 return 0;
1979}
1980
1981static int json_transform_message(sd_bus_message *m, JsonVariant **ret) {
1982 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
1983 const char *type;
1984 int r;
1985
1986 assert(m);
1987 assert(ret);
1988
1989 assert_se(type = sd_bus_message_get_signature(m, false));
1990
1991 r = json_transform_array_or_struct(m, &v);
1992 if (r < 0)
1993 return r;
1994
1995 r = json_build(ret, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("type", JSON_BUILD_STRING(type)),
1996 JSON_BUILD_PAIR("data", JSON_BUILD_VARIANT(v))));
1997 if (r < 0)
1998 return log_oom();
1999
2000 return 0;
2001}
2002
2003static void json_dump_with_flags(JsonVariant *v, FILE *f) {
2004
2005 json_variant_dump(v,
2006 (arg_json == JSON_PRETTY ? JSON_FORMAT_PRETTY : JSON_FORMAT_NEWLINE) |
ab91733c 2007 JSON_FORMAT_COLOR_AUTO,
9cebb234
LP
2008 f, NULL);
2009}
2010
9bb31a0c
YW
2011static int call(int argc, char **argv, void *userdata) {
2012 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348
LP
2013 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2014 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL;
781fa938
LP
2015 int r;
2016
9bb31a0c
YW
2017 r = acquire_bus(false, &bus);
2018 if (r < 0)
2019 return r;
781fa938
LP
2020
2021 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], argv[3], argv[4]);
79f34de9
LP
2022 if (r < 0)
2023 return bus_log_create_error(r);
781fa938 2024
38051578
LP
2025 r = sd_bus_message_set_expect_reply(m, arg_expect_reply);
2026 if (r < 0)
2027 return bus_log_create_error(r);
2028
2029 r = sd_bus_message_set_auto_start(m, arg_auto_start);
2030 if (r < 0)
2031 return bus_log_create_error(r);
2032
2033 r = sd_bus_message_set_allow_interactive_authorization(m, arg_allow_interactive_authorization);
2034 if (r < 0)
2035 return bus_log_create_error(r);
2036
781fa938
LP
2037 if (!isempty(argv[5])) {
2038 char **p;
2039
2040 p = argv+6;
2041
2042 r = message_append_cmdline(m, argv[5], &p);
2043 if (r < 0)
2044 return r;
2045
0747cde7 2046 if (*p)
16c347b3
ZJS
2047 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
2048 "Too many parameters for signature.");
781fa938
LP
2049 }
2050
38051578
LP
2051 if (!arg_expect_reply) {
2052 r = sd_bus_send(bus, m, NULL);
48956c39
LP
2053 if (r < 0)
2054 return log_error_errno(r, "Failed to send message: %m");
38051578
LP
2055
2056 return 0;
2057 }
2058
a44b1081 2059 r = sd_bus_call(bus, m, arg_timeout, &error, &reply);
48956c39 2060 if (r < 0)
24a4e7ff 2061 return log_error_errno(r, "Call failed: %s", bus_error_message(&error, r));
781fa938
LP
2062
2063 r = sd_bus_message_is_empty(reply);
2064 if (r < 0)
2065 return bus_log_parse_error(r);
1fc55609 2066
781fa938 2067 if (r == 0 && !arg_quiet) {
1fc55609 2068
9cebb234
LP
2069 if (arg_json != JSON_OFF) {
2070 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
2071
2072 if (arg_json != JSON_SHORT)
0221d68a 2073 (void) pager_open(arg_pager_flags);
9cebb234
LP
2074
2075 r = json_transform_message(reply, &v);
2076 if (r < 0)
2077 return r;
2078
2079 json_dump_with_flags(v, stdout);
2080
2081 } else if (arg_verbose) {
0221d68a 2082 (void) pager_open(arg_pager_flags);
1fc55609 2083
2b4a65b6 2084 r = sd_bus_message_dump(reply, stdout, 0);
1fc55609
LP
2085 if (r < 0)
2086 return r;
2087 } else {
2088
2089 fputs(sd_bus_message_get_signature(reply, true), stdout);
2090 fputc(' ', stdout);
2091
2092 r = format_cmdline(reply, stdout, false);
2093 if (r < 0)
2094 return bus_log_parse_error(r);
2095
2096 fputc('\n', stdout);
2097 }
d55192ad
LP
2098 }
2099
2100 return 0;
2101}
2102
143aea38
YW
2103static int emit_signal(int argc, char **argv, void *userdata) {
2104 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2105 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
2106 int r;
2107
2108 r = acquire_bus(false, &bus);
2109 if (r < 0)
2110 return r;
2111
2112 r = sd_bus_message_new_signal(bus, &m, argv[1], argv[2], argv[3]);
2113 if (r < 0)
2114 return bus_log_create_error(r);
2115
2116 if (arg_destination) {
2117 r = sd_bus_message_set_destination(m, arg_destination);
2118 if (r < 0)
2119 return bus_log_create_error(r);
2120 }
2121
2122 r = sd_bus_message_set_auto_start(m, arg_auto_start);
2123 if (r < 0)
2124 return bus_log_create_error(r);
2125
2126 if (!isempty(argv[4])) {
2127 char **p;
2128
2129 p = argv+5;
2130
2131 r = message_append_cmdline(m, argv[4], &p);
2132 if (r < 0)
2133 return r;
2134
2135 if (*p)
16c347b3
ZJS
2136 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
2137 "Too many parameters for signature.");
143aea38
YW
2138 }
2139
2140 r = sd_bus_send(bus, m, NULL);
2141 if (r < 0)
2142 return log_error_errno(r, "Failed to send signal: %m");
2143
2144 return 0;
2145}
2146
9bb31a0c
YW
2147static int get_property(int argc, char **argv, void *userdata) {
2148 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348 2149 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1fc55609 2150 char **i;
d55192ad
LP
2151 int r;
2152
9bb31a0c
YW
2153 r = acquire_bus(false, &bus);
2154 if (r < 0)
2155 return r;
d55192ad 2156
1fc55609 2157 STRV_FOREACH(i, argv + 4) {
4afd3348 2158 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1fc55609
LP
2159 const char *contents = NULL;
2160 char type;
d55192ad 2161
16c347b3
ZJS
2162 r = sd_bus_call_method(bus, argv[1], argv[2],
2163 "org.freedesktop.DBus.Properties", "Get",
2164 &error, &reply, "ss", argv[3], *i);
48956c39 2165 if (r < 0)
24a4e7ff
ZJS
2166 return log_error_errno(r, "Failed to get property %s on interface %s: %s",
2167 *i, argv[3],
2168 bus_error_message(&error, r));
d55192ad 2169
1fc55609 2170 r = sd_bus_message_peek_type(reply, &type, &contents);
d55192ad
LP
2171 if (r < 0)
2172 return bus_log_parse_error(r);
2173
1fc55609
LP
2174 r = sd_bus_message_enter_container(reply, 'v', contents);
2175 if (r < 0)
2176 return bus_log_parse_error(r);
d55192ad 2177
9cebb234
LP
2178 if (arg_json != JSON_OFF) {
2179 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
2180
2181 if (arg_json != JSON_SHORT)
0221d68a 2182 (void) pager_open(arg_pager_flags);
9cebb234
LP
2183
2184 r = json_transform_variant(reply, contents, &v);
2185 if (r < 0)
2186 return r;
2187
2188 json_dump_with_flags(v, stdout);
2189
2de62253 2190 } else if (arg_verbose) {
0221d68a 2191 (void) pager_open(arg_pager_flags);
d55192ad 2192
2b4a65b6 2193 r = sd_bus_message_dump(reply, stdout, SD_BUS_MESSAGE_DUMP_SUBTREE_ONLY);
d55192ad 2194 if (r < 0)
1fc55609
LP
2195 return r;
2196 } else {
2197 fputs(contents, stdout);
2198 fputc(' ', stdout);
d55192ad 2199
1fc55609 2200 r = format_cmdline(reply, stdout, false);
d55192ad
LP
2201 if (r < 0)
2202 return bus_log_parse_error(r);
2203
1fc55609 2204 fputc('\n', stdout);
d55192ad
LP
2205 }
2206
2207 r = sd_bus_message_exit_container(reply);
2208 if (r < 0)
2209 return bus_log_parse_error(r);
1fc55609 2210 }
d55192ad 2211
1fc55609
LP
2212 return 0;
2213}
d55192ad 2214
9bb31a0c
YW
2215static int set_property(int argc, char **argv, void *userdata) {
2216 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348
LP
2217 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
2218 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1fc55609
LP
2219 char **p;
2220 int r;
d55192ad 2221
9bb31a0c
YW
2222 r = acquire_bus(false, &bus);
2223 if (r < 0)
2224 return r;
d55192ad 2225
16c347b3
ZJS
2226 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2],
2227 "org.freedesktop.DBus.Properties", "Set");
1fc55609
LP
2228 if (r < 0)
2229 return bus_log_create_error(r);
d55192ad 2230
1fc55609
LP
2231 r = sd_bus_message_append(m, "ss", argv[3], argv[4]);
2232 if (r < 0)
2233 return bus_log_create_error(r);
d55192ad 2234
1fc55609
LP
2235 r = sd_bus_message_open_container(m, 'v', argv[5]);
2236 if (r < 0)
2237 return bus_log_create_error(r);
2238
9bb31a0c 2239 p = argv + 6;
1fc55609
LP
2240 r = message_append_cmdline(m, argv[5], &p);
2241 if (r < 0)
2242 return r;
2243
2244 r = sd_bus_message_close_container(m);
2245 if (r < 0)
2246 return bus_log_create_error(r);
2247
0747cde7
YW
2248 if (*p)
2249 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Too many parameters for signature.");
1fc55609 2250
a44b1081 2251 r = sd_bus_call(bus, m, arg_timeout, &error, NULL);
48956c39 2252 if (r < 0)
24a4e7ff
ZJS
2253 return log_error_errno(r, "Failed to set property %s on interface %s: %s",
2254 argv[4], argv[3],
2255 bus_error_message(&error, r));
781fa938
LP
2256
2257 return 0;
2258}
2259
1f849790 2260static int help(void) {
37ec0fdd
LP
2261 _cleanup_free_ char *link = NULL;
2262 int r;
2263
2264 r = terminal_urlify_man("busctl", "1", &link);
2265 if (r < 0)
2266 return log_oom();
2267
353b2baa
LP
2268 printf("%s [OPTIONS...] COMMAND ...\n\n"
2269 "%sIntrospect the D-Bus IPC bus.%s\n"
2270 "\nCommands:\n"
e1fac8a6
ZJS
2271 " list List bus names\n"
2272 " status [SERVICE] Show bus service, process or bus owner credentials\n"
2273 " monitor [SERVICE...] Show bus traffic\n"
2274 " capture [SERVICE...] Capture bus traffic as pcap\n"
2275 " tree [SERVICE...] Show object tree of service\n"
2276 " introspect SERVICE OBJECT [INTERFACE]\n"
2277 " call SERVICE OBJECT INTERFACE METHOD [SIGNATURE [ARGUMENT...]]\n"
2278 " Call a method\n"
2279 " emit OBJECT INTERFACE SIGNAL [SIGNATURE [ARGUMENT...]]\n"
2280 " Emit a signal\n"
2281 " get-property SERVICE OBJECT INTERFACE PROPERTY...\n"
2282 " Get property value\n"
2283 " set-property SERVICE OBJECT INTERFACE PROPERTY SIGNATURE ARGUMENT...\n"
2284 " Set property value\n"
2285 " help Show this help\n"
2286 "\nOptions:\n"
9ecb11f5
YW
2287 " -h --help Show this help\n"
2288 " --version Show package version\n"
2289 " --no-pager Do not pipe output into a pager\n"
2290 " --no-legend Do not show the headers and footers\n"
b683b82f 2291 " -l --full Do not ellipsize output\n"
9ecb11f5
YW
2292 " --system Connect to system bus\n"
2293 " --user Connect to user bus\n"
2294 " -H --host=[USER@]HOST Operate on remote host\n"
2295 " -M --machine=CONTAINER Operate on local container\n"
2296 " --address=ADDRESS Connect to bus specified by address\n"
2297 " --show-machine Show machine ID column in list\n"
2298 " --unique Only show unique names\n"
2299 " --acquired Only show acquired names\n"
2300 " --activatable Only show activatable names\n"
2301 " --match=MATCH Only show matching messages\n"
2302 " --size=SIZE Maximum length of captured packet\n"
2303 " --list Don't show tree, but simple object path list\n"
2304 " -q --quiet Don't show method call reply\n"
2305 " --verbose Show result values in long format\n"
2306 " --json=MODE Output as JSON\n"
2307 " -j Same as --json=pretty on tty, --json=short otherwise\n"
2308 " --expect-reply=BOOL Expect a method call reply\n"
2309 " --auto-start=BOOL Auto-start destination service\n"
38051578 2310 " --allow-interactive-authorization=BOOL\n"
9ecb11f5
YW
2311 " Allow interactive authorization for operation\n"
2312 " --timeout=SECS Maximum time to wait for method call completion\n"
2313 " --augment-creds=BOOL Extend credential data with data read from /proc/$PID\n"
2314 " --watch-bind=BOOL Wait for bus AF_UNIX socket to be bound in the file\n"
2315 " system\n"
143aea38 2316 " --destination=SERVICE Destination service of a signal\n"
37ec0fdd
LP
2317 "\nSee the %s for details.\n"
2318 , program_invocation_short_name
353b2baa 2319 , ansi_highlight()
ce2529b4 2320 , ansi_normal()
37ec0fdd
LP
2321 , link
2322 );
1f849790
LP
2323
2324 return 0;
2325}
2326
9bb31a0c
YW
2327static int verb_help(int argc, char **argv, void *userdata) {
2328 return help();
2329}
2330
1f849790
LP
2331static int parse_argv(int argc, char *argv[]) {
2332
2333 enum {
2334 ARG_VERSION = 0x100,
2335 ARG_NO_PAGER,
17d47d8d 2336 ARG_NO_LEGEND,
1f849790
LP
2337 ARG_SYSTEM,
2338 ARG_USER,
2339 ARG_ADDRESS,
2340 ARG_MATCH,
56e61788
LP
2341 ARG_SHOW_MACHINE,
2342 ARG_UNIQUE,
2343 ARG_ACQUIRED,
1f70b087
LP
2344 ARG_ACTIVATABLE,
2345 ARG_SIZE,
d9130355 2346 ARG_LIST,
1fc55609 2347 ARG_VERBOSE,
d5c8d823 2348 ARG_XML_INTERFACE,
38051578
LP
2349 ARG_EXPECT_REPLY,
2350 ARG_AUTO_START,
2351 ARG_ALLOW_INTERACTIVE_AUTHORIZATION,
a44b1081 2352 ARG_TIMEOUT,
40ed1a45 2353 ARG_AUGMENT_CREDS,
56d820b6 2354 ARG_WATCH_BIND,
9cebb234 2355 ARG_JSON,
143aea38 2356 ARG_DESTINATION,
1f849790
LP
2357 };
2358
2359 static const struct option options[] = {
9cebb234
LP
2360 { "help", no_argument, NULL, 'h' },
2361 { "version", no_argument, NULL, ARG_VERSION },
2362 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
2363 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
b683b82f 2364 { "full", no_argument, NULL, 'l' },
9cebb234
LP
2365 { "system", no_argument, NULL, ARG_SYSTEM },
2366 { "user", no_argument, NULL, ARG_USER },
2367 { "address", required_argument, NULL, ARG_ADDRESS },
2368 { "show-machine", no_argument, NULL, ARG_SHOW_MACHINE },
2369 { "unique", no_argument, NULL, ARG_UNIQUE },
2370 { "acquired", no_argument, NULL, ARG_ACQUIRED },
2371 { "activatable", no_argument, NULL, ARG_ACTIVATABLE },
2372 { "match", required_argument, NULL, ARG_MATCH },
2373 { "host", required_argument, NULL, 'H' },
2374 { "machine", required_argument, NULL, 'M' },
2375 { "size", required_argument, NULL, ARG_SIZE },
2376 { "list", no_argument, NULL, ARG_LIST },
2377 { "quiet", no_argument, NULL, 'q' },
2378 { "verbose", no_argument, NULL, ARG_VERBOSE },
d5c8d823 2379 { "xml-interface", no_argument, NULL, ARG_XML_INTERFACE },
9cebb234
LP
2380 { "expect-reply", required_argument, NULL, ARG_EXPECT_REPLY },
2381 { "auto-start", required_argument, NULL, ARG_AUTO_START },
38051578 2382 { "allow-interactive-authorization", required_argument, NULL, ARG_ALLOW_INTERACTIVE_AUTHORIZATION },
9cebb234
LP
2383 { "timeout", required_argument, NULL, ARG_TIMEOUT },
2384 { "augment-creds", required_argument, NULL, ARG_AUGMENT_CREDS },
2385 { "watch-bind", required_argument, NULL, ARG_WATCH_BIND },
2386 { "json", required_argument, NULL, ARG_JSON },
143aea38 2387 { "destination", required_argument, NULL, ARG_DESTINATION },
eb9da376 2388 {},
1f849790
LP
2389 };
2390
1f70b087 2391 int c, r;
1f849790
LP
2392
2393 assert(argc >= 0);
2394 assert(argv);
2395
150c430f 2396 while ((c = getopt_long(argc, argv, "hH:M:qjl", options, NULL)) >= 0)
1f849790
LP
2397
2398 switch (c) {
2399
2400 case 'h':
2401 return help();
2402
2403 case ARG_VERSION:
3f6fd1ba 2404 return version();
1f849790
LP
2405
2406 case ARG_NO_PAGER:
0221d68a 2407 arg_pager_flags |= PAGER_DISABLE;
1f849790
LP
2408 break;
2409
17d47d8d
TA
2410 case ARG_NO_LEGEND:
2411 arg_legend = false;
2412 break;
2413
b683b82f
YW
2414 case 'l':
2415 arg_full = true;
2416 break;
2417
1f849790
LP
2418 case ARG_USER:
2419 arg_user = true;
2420 break;
2421
2422 case ARG_SYSTEM:
2423 arg_user = false;
2424 break;
2425
2426 case ARG_ADDRESS:
2427 arg_address = optarg;
2428 break;
2429
56e61788
LP
2430 case ARG_SHOW_MACHINE:
2431 arg_show_machine = true;
2432 break;
2433
2434 case ARG_UNIQUE:
2435 arg_unique = true;
1f849790
LP
2436 break;
2437
56e61788
LP
2438 case ARG_ACQUIRED:
2439 arg_acquired = true;
2440 break;
2441
2442 case ARG_ACTIVATABLE:
2443 arg_activatable = true;
a4297f08
LP
2444 break;
2445
1f849790
LP
2446 case ARG_MATCH:
2447 if (strv_extend(&arg_matches, optarg) < 0)
2448 return log_oom();
2449 break;
2450
1f70b087 2451 case ARG_SIZE: {
59f448cf 2452 uint64_t sz;
1f70b087 2453
59f448cf 2454 r = parse_size(optarg, 1024, &sz);
48956c39 2455 if (r < 0)
3d9942de 2456 return log_error_errno(r, "Failed to parse size '%s': %m", optarg);
1f70b087 2457
baaa35ad
ZJS
2458 if ((uint64_t) (size_t) sz != sz)
2459 return log_error_errno(SYNTHETIC_ERRNO(E2BIG),
2460 "Size out of range.");
1f70b087 2461
59f448cf 2462 arg_snaplen = (size_t) sz;
1f70b087
LP
2463 break;
2464 }
2465
d9130355
LP
2466 case ARG_LIST:
2467 arg_list = true;
2468 break;
2469
d75edbd6
LP
2470 case 'H':
2471 arg_transport = BUS_TRANSPORT_REMOTE;
2472 arg_host = optarg;
2473 break;
2474
2475 case 'M':
de33fc62 2476 arg_transport = BUS_TRANSPORT_MACHINE;
d75edbd6
LP
2477 arg_host = optarg;
2478 break;
2479
781fa938
LP
2480 case 'q':
2481 arg_quiet = true;
2482 break;
2483
1fc55609
LP
2484 case ARG_VERBOSE:
2485 arg_verbose = true;
2486 break;
2487
d5c8d823
ZJS
2488 case ARG_XML_INTERFACE:
2489 arg_xml_interface = true;
2490 break;
2491
38051578
LP
2492 case ARG_EXPECT_REPLY:
2493 r = parse_boolean(optarg);
48956c39 2494 if (r < 0)
3d9942de 2495 return log_error_errno(r, "Failed to parse --expect-reply= parameter '%s': %m", optarg);
38051578 2496
5d904a6a 2497 arg_expect_reply = r;
38051578
LP
2498 break;
2499
38051578
LP
2500 case ARG_AUTO_START:
2501 r = parse_boolean(optarg);
48956c39 2502 if (r < 0)
3d9942de 2503 return log_error_errno(r, "Failed to parse --auto-start= parameter '%s': %m", optarg);
38051578 2504
5d904a6a 2505 arg_auto_start = r;
38051578
LP
2506 break;
2507
38051578
LP
2508 case ARG_ALLOW_INTERACTIVE_AUTHORIZATION:
2509 r = parse_boolean(optarg);
48956c39 2510 if (r < 0)
3d9942de 2511 return log_error_errno(r, "Failed to parse --allow-interactive-authorization= parameter '%s': %m", optarg);
38051578 2512
5d904a6a 2513 arg_allow_interactive_authorization = r;
38051578
LP
2514 break;
2515
a44b1081
LP
2516 case ARG_TIMEOUT:
2517 r = parse_sec(optarg, &arg_timeout);
48956c39 2518 if (r < 0)
3d9942de 2519 return log_error_errno(r, "Failed to parse --timeout= parameter '%s': %m", optarg);
a44b1081
LP
2520
2521 break;
2522
40ed1a45
LP
2523 case ARG_AUGMENT_CREDS:
2524 r = parse_boolean(optarg);
48956c39 2525 if (r < 0)
3d9942de 2526 return log_error_errno(r, "Failed to parse --augment-creds= parameter '%s': %m", optarg);
40ed1a45 2527
5d904a6a 2528 arg_augment_creds = r;
40ed1a45
LP
2529 break;
2530
56d820b6
LP
2531 case ARG_WATCH_BIND:
2532 r = parse_boolean(optarg);
48956c39 2533 if (r < 0)
3d9942de 2534 return log_error_errno(r, "Failed to parse --watch-bind= parameter '%s': %m", optarg);
56d820b6 2535
5d904a6a 2536 arg_watch_bind = r;
56d820b6
LP
2537 break;
2538
9cebb234
LP
2539 case 'j':
2540 if (on_tty())
2541 arg_json = JSON_PRETTY;
2542 else
2543 arg_json = JSON_SHORT;
2544 break;
2545
2546 case ARG_JSON:
2547 if (streq(optarg, "short"))
2548 arg_json = JSON_SHORT;
2549 else if (streq(optarg, "pretty"))
2550 arg_json = JSON_PRETTY;
2551 else if (streq(optarg, "help")) {
2552 fputs("short\n"
2553 "pretty\n", stdout);
2554 return 0;
baaa35ad
ZJS
2555 } else
2556 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
2557 "Unknown JSON out mode: %s",
2558 optarg);
9cebb234
LP
2559
2560 break;
2561
143aea38
YW
2562 case ARG_DESTINATION:
2563 arg_destination = optarg;
2564 break;
2565
1f849790
LP
2566 case '?':
2567 return -EINVAL;
2568
2569 default:
eb9da376 2570 assert_not_reached("Unhandled option");
1f849790 2571 }
1f849790
LP
2572
2573 return 1;
2574}
2575
9bb31a0c 2576static int busctl_main(int argc, char *argv[]) {
9bb31a0c
YW
2577 static const Verb verbs[] = {
2578 { "list", VERB_ANY, 1, VERB_DEFAULT, list_bus_names },
2579 { "status", VERB_ANY, 2, 0, status },
2580 { "monitor", VERB_ANY, VERB_ANY, 0, verb_monitor },
2581 { "capture", VERB_ANY, VERB_ANY, 0, verb_capture },
2582 { "tree", VERB_ANY, VERB_ANY, 0, tree },
2583 { "introspect", 3, 4, 0, introspect },
2584 { "call", 5, VERB_ANY, 0, call },
143aea38 2585 { "emit", 4, VERB_ANY, 0, emit_signal },
9bb31a0c
YW
2586 { "get-property", 5, VERB_ANY, 0, get_property },
2587 { "set-property", 6, VERB_ANY, 0, set_property },
2588 { "help", VERB_ANY, VERB_ANY, 0, verb_help },
2589 {}
2590 };
1f849790 2591
9bb31a0c 2592 return dispatch_verb(argc, argv, verbs, NULL);
1f849790
LP
2593}
2594
360f3dc2 2595static int run(int argc, char *argv[]) {
1f849790
LP
2596 int r;
2597
41d1f469 2598 log_setup_cli();
1f849790
LP
2599
2600 r = parse_argv(argc, argv);
2601 if (r <= 0)
360f3dc2 2602 return r;
de1c301e 2603
360f3dc2 2604 return busctl_main(argc, argv);
de1c301e 2605}
360f3dc2
YW
2606
2607DEFINE_MAIN_FUNCTION(run);