]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/libsystemd/sd-bus/busctl.c
busctl: add and use strcmp_ptr()
[thirdparty/systemd.git] / src / libsystemd / sd-bus / busctl.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2013 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
17
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <getopt.h>
23
24 #include "strv.h"
25 #include "util.h"
26 #include "log.h"
27 #include "build.h"
28 #include "pager.h"
29 #include "path-util.h"
30 #include "set.h"
31
32 #include "sd-bus.h"
33 #include "bus-internal.h"
34 #include "bus-util.h"
35 #include "bus-dump.h"
36 #include "bus-signature.h"
37 #include "bus-type.h"
38 #include "busctl-introspect.h"
39 #include "terminal-util.h"
40
41 static bool arg_no_pager = false;
42 static bool arg_legend = true;
43 static char *arg_address = NULL;
44 static bool arg_unique = false;
45 static bool arg_acquired = false;
46 static bool arg_activatable = false;
47 static bool arg_show_machine = false;
48 static char **arg_matches = NULL;
49 static BusTransport arg_transport = BUS_TRANSPORT_LOCAL;
50 static char *arg_host = NULL;
51 static bool arg_user = false;
52 static size_t arg_snaplen = 4096;
53 static bool arg_list = false;
54 static bool arg_quiet = false;
55 static bool arg_verbose = false;
56 static bool arg_expect_reply = true;
57 static bool arg_auto_start = true;
58 static bool arg_allow_interactive_authorization = true;
59 static bool arg_augment_creds = true;
60 static usec_t arg_timeout = 0;
61
62 static void pager_open_if_enabled(void) {
63
64 /* Cache result before we open the pager */
65 if (arg_no_pager)
66 return;
67
68 pager_open(false);
69 }
70
71 #define NAME_IS_ACQUIRED INT_TO_PTR(1)
72 #define NAME_IS_ACTIVATABLE INT_TO_PTR(2)
73
74 static int list_bus_names(sd_bus *bus, char **argv) {
75 _cleanup_strv_free_ char **acquired = NULL, **activatable = NULL;
76 _cleanup_free_ char **merged = NULL;
77 _cleanup_hashmap_free_ Hashmap *names = NULL;
78 char **i;
79 int r;
80 size_t max_i = 0;
81 unsigned n = 0;
82 void *v;
83 char *k;
84 Iterator iterator;
85
86 assert(bus);
87
88 if (!arg_unique && !arg_acquired && !arg_activatable)
89 arg_unique = arg_acquired = arg_activatable = true;
90
91 r = sd_bus_list_names(bus, (arg_acquired || arg_unique) ? &acquired : NULL, arg_activatable ? &activatable : NULL);
92 if (r < 0)
93 return log_error_errno(r, "Failed to list names: %m");
94
95 pager_open_if_enabled();
96
97 names = hashmap_new(&string_hash_ops);
98 if (!names)
99 return log_oom();
100
101 STRV_FOREACH(i, acquired) {
102 max_i = MAX(max_i, strlen(*i));
103
104 r = hashmap_put(names, *i, NAME_IS_ACQUIRED);
105 if (r < 0)
106 return log_error_errno(r, "Failed to add to hashmap: %m");
107 }
108
109 STRV_FOREACH(i, activatable) {
110 max_i = MAX(max_i, strlen(*i));
111
112 r = hashmap_put(names, *i, NAME_IS_ACTIVATABLE);
113 if (r < 0 && r != -EEXIST)
114 return log_error_errno(r, "Failed to add to hashmap: %m");
115 }
116
117 merged = new(char*, hashmap_size(names) + 1);
118 HASHMAP_FOREACH_KEY(v, k, names, iterator)
119 merged[n++] = k;
120
121 merged[n] = NULL;
122 strv_sort(merged);
123
124 if (arg_legend) {
125 printf("%-*s %*s %-*s %-*s %-*s %-*s %-*s %-*s",
126 (int) max_i, "NAME", 10, "PID", 15, "PROCESS", 16, "USER", 13, "CONNECTION", 25, "UNIT", 10, "SESSION", 19, "DESCRIPTION");
127
128 if (arg_show_machine)
129 puts(" MACHINE");
130 else
131 putchar('\n');
132 }
133
134 STRV_FOREACH(i, merged) {
135 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
136 sd_id128_t mid;
137
138 if (hashmap_get(names, *i) == NAME_IS_ACTIVATABLE) {
139 /* Activatable */
140
141 printf("%-*s", (int) max_i, *i);
142 printf(" - - - (activatable) - - ");
143 if (arg_show_machine)
144 puts(" -");
145 else
146 putchar('\n');
147 continue;
148
149 }
150
151 if (!arg_unique && (*i)[0] == ':')
152 continue;
153
154 if (!arg_acquired && (*i)[0] != ':')
155 continue;
156
157 printf("%-*s", (int) max_i, *i);
158
159 r = sd_bus_get_name_creds(
160 bus, *i,
161 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) |
162 SD_BUS_CREDS_EUID|SD_BUS_CREDS_PID|SD_BUS_CREDS_COMM|
163 SD_BUS_CREDS_UNIQUE_NAME|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_SESSION|
164 SD_BUS_CREDS_DESCRIPTION, &creds);
165 if (r >= 0) {
166 const char *unique, *session, *unit, *cn;
167 pid_t pid;
168 uid_t uid;
169
170 r = sd_bus_creds_get_pid(creds, &pid);
171 if (r >= 0) {
172 const char *comm = NULL;
173
174 sd_bus_creds_get_comm(creds, &comm);
175
176 printf(" %10lu %-15s", (unsigned long) pid, strna(comm));
177 } else
178 fputs(" - - ", stdout);
179
180 r = sd_bus_creds_get_euid(creds, &uid);
181 if (r >= 0) {
182 _cleanup_free_ char *u = NULL;
183
184 u = uid_to_name(uid);
185 if (!u)
186 return log_oom();
187
188 if (strlen(u) > 16)
189 u[16] = 0;
190
191 printf(" %-16s", u);
192 } else
193 fputs(" - ", stdout);
194
195 r = sd_bus_creds_get_unique_name(creds, &unique);
196 if (r >= 0)
197 printf(" %-13s", unique);
198 else
199 fputs(" - ", stdout);
200
201 r = sd_bus_creds_get_unit(creds, &unit);
202 if (r >= 0) {
203 _cleanup_free_ char *e;
204
205 e = ellipsize(unit, 25, 100);
206 if (!e)
207 return log_oom();
208
209 printf(" %-25s", e);
210 } else
211 fputs(" - ", stdout);
212
213 r = sd_bus_creds_get_session(creds, &session);
214 if (r >= 0)
215 printf(" %-10s", session);
216 else
217 fputs(" - ", stdout);
218
219 r = sd_bus_creds_get_description(creds, &cn);
220 if (r >= 0)
221 printf(" %-19s", cn);
222 else
223 fputs(" - ", stdout);
224
225 } else
226 printf(" - - - - - - - ");
227
228 if (arg_show_machine) {
229 r = sd_bus_get_name_machine_id(bus, *i, &mid);
230 if (r >= 0) {
231 char m[SD_ID128_STRING_MAX];
232 printf(" %s\n", sd_id128_to_string(mid, m));
233 } else
234 puts(" -");
235 } else
236 putchar('\n');
237 }
238
239 return 0;
240 }
241
242 static void print_subtree(const char *prefix, const char *path, char **l) {
243 const char *vertical, *space;
244 char **n;
245
246 /* We assume the list is sorted. Let's first skip over the
247 * entry we are looking at. */
248 for (;;) {
249 if (!*l)
250 return;
251
252 if (!streq(*l, path))
253 break;
254
255 l++;
256 }
257
258 vertical = strjoina(prefix, draw_special_char(DRAW_TREE_VERTICAL));
259 space = strjoina(prefix, draw_special_char(DRAW_TREE_SPACE));
260
261 for (;;) {
262 bool has_more = false;
263
264 if (!*l || !path_startswith(*l, path))
265 break;
266
267 n = l + 1;
268 for (;;) {
269 if (!*n || !path_startswith(*n, path))
270 break;
271
272 if (!path_startswith(*n, *l)) {
273 has_more = true;
274 break;
275 }
276
277 n++;
278 }
279
280 printf("%s%s%s\n", prefix, draw_special_char(has_more ? DRAW_TREE_BRANCH : DRAW_TREE_RIGHT), *l);
281
282 print_subtree(has_more ? vertical : space, *l, l);
283 l = n;
284 }
285 }
286
287 static void print_tree(const char *prefix, char **l) {
288
289 pager_open_if_enabled();
290
291 prefix = strempty(prefix);
292
293 if (arg_list) {
294 char **i;
295
296 STRV_FOREACH(i, l)
297 printf("%s%s\n", prefix, *i);
298 return;
299 }
300
301 if (strv_isempty(l)) {
302 printf("No objects discovered.\n");
303 return;
304 }
305
306 if (streq(l[0], "/") && !l[1]) {
307 printf("Only root object discovered.\n");
308 return;
309 }
310
311 print_subtree(prefix, "/", l);
312 }
313
314 static int on_path(const char *path, void *userdata) {
315 Set *paths = userdata;
316 int r;
317
318 assert(paths);
319
320 r = set_put_strdup(paths, path);
321 if (r < 0)
322 return log_oom();
323
324 return 0;
325 }
326
327 static int find_nodes(sd_bus *bus, const char *service, const char *path, Set *paths, bool many) {
328 static const XMLIntrospectOps ops = {
329 .on_path = on_path,
330 };
331
332 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
333 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
334 const char *xml;
335 int r;
336
337 r = sd_bus_call_method(bus, service, path, "org.freedesktop.DBus.Introspectable", "Introspect", &error, &reply, "");
338 if (r < 0) {
339 if (many)
340 printf("Failed to introspect object %s of service %s: %s\n", path, service, bus_error_message(&error, r));
341 else
342 log_error("Failed to introspect object %s of service %s: %s", path, service, bus_error_message(&error, r));
343 return r;
344 }
345
346 r = sd_bus_message_read(reply, "s", &xml);
347 if (r < 0)
348 return bus_log_parse_error(r);
349
350 return parse_xml_introspect(path, xml, &ops, paths);
351 }
352
353 static int tree_one(sd_bus *bus, const char *service, const char *prefix, bool many) {
354 _cleanup_set_free_free_ Set *paths = NULL, *done = NULL, *failed = NULL;
355 _cleanup_free_ char **l = NULL;
356 char *m;
357 int r;
358
359 paths = set_new(&string_hash_ops);
360 if (!paths)
361 return log_oom();
362
363 done = set_new(&string_hash_ops);
364 if (!done)
365 return log_oom();
366
367 failed = set_new(&string_hash_ops);
368 if (!failed)
369 return log_oom();
370
371 m = strdup("/");
372 if (!m)
373 return log_oom();
374
375 r = set_put(paths, m);
376 if (r < 0) {
377 free(m);
378 return log_oom();
379 }
380
381 for (;;) {
382 _cleanup_free_ char *p = NULL;
383 int q;
384
385 p = set_steal_first(paths);
386 if (!p)
387 break;
388
389 if (set_contains(done, p) ||
390 set_contains(failed, p))
391 continue;
392
393 q = find_nodes(bus, service, p, paths, many);
394 if (q < 0) {
395 if (r >= 0)
396 r = q;
397
398 q = set_put(failed, p);
399 } else
400 q = set_put(done, p);
401
402 if (q < 0)
403 return log_oom();
404
405 assert(q != 0);
406 p = NULL;
407 }
408
409 pager_open_if_enabled();
410
411 l = set_get_strv(done);
412 if (!l)
413 return log_oom();
414
415 strv_sort(l);
416 print_tree(prefix, l);
417
418 fflush(stdout);
419
420 return r;
421 }
422
423 static int tree(sd_bus *bus, char **argv) {
424 char **i;
425 int r = 0;
426
427 if (!arg_unique && !arg_acquired)
428 arg_acquired = true;
429
430 if (strv_length(argv) <= 1) {
431 _cleanup_strv_free_ char **names = NULL;
432 bool not_first = false;
433
434 r = sd_bus_list_names(bus, &names, NULL);
435 if (r < 0)
436 return log_error_errno(r, "Failed to get name list: %m");
437
438 pager_open_if_enabled();
439
440 STRV_FOREACH(i, names) {
441 int q;
442
443 if (!arg_unique && (*i)[0] == ':')
444 continue;
445
446 if (!arg_acquired && (*i)[0] == ':')
447 continue;
448
449 if (not_first)
450 printf("\n");
451
452 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_highlight_off());
453
454 q = tree_one(bus, *i, NULL, true);
455 if (q < 0 && r >= 0)
456 r = q;
457
458 not_first = true;
459 }
460 } else {
461 STRV_FOREACH(i, argv+1) {
462 int q;
463
464 if (i > argv+1)
465 printf("\n");
466
467 if (argv[2]) {
468 pager_open_if_enabled();
469 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_highlight_off());
470 }
471
472 q = tree_one(bus, *i, NULL, !!argv[2]);
473 if (q < 0 && r >= 0)
474 r = q;
475 }
476 }
477
478 return r;
479 }
480
481 static int format_cmdline(sd_bus_message *m, FILE *f, bool needs_space) {
482 int r;
483
484 for (;;) {
485 const char *contents = NULL;
486 char type;
487 union {
488 uint8_t u8;
489 uint16_t u16;
490 int16_t s16;
491 uint32_t u32;
492 int32_t s32;
493 uint64_t u64;
494 int64_t s64;
495 double d64;
496 const char *string;
497 int i;
498 } basic;
499
500 r = sd_bus_message_peek_type(m, &type, &contents);
501 if (r <= 0)
502 return r;
503
504 if (bus_type_is_container(type) > 0) {
505
506 r = sd_bus_message_enter_container(m, type, contents);
507 if (r < 0)
508 return r;
509
510 if (type == SD_BUS_TYPE_ARRAY) {
511 unsigned n = 0;
512
513 /* count array entries */
514 for (;;) {
515
516 r = sd_bus_message_skip(m, contents);
517 if (r < 0)
518 return r;
519 if (r == 0)
520 break;
521
522 n++;
523 }
524
525 r = sd_bus_message_rewind(m, false);
526 if (r < 0)
527 return r;
528
529 if (needs_space)
530 fputc(' ', f);
531
532 fprintf(f, "%u", n);
533 } else if (type == SD_BUS_TYPE_VARIANT) {
534
535 if (needs_space)
536 fputc(' ', f);
537
538 fprintf(f, "%s", contents);
539 }
540
541 r = format_cmdline(m, f, needs_space || IN_SET(type, SD_BUS_TYPE_ARRAY, SD_BUS_TYPE_VARIANT));
542 if (r < 0)
543 return r;
544
545 r = sd_bus_message_exit_container(m);
546 if (r < 0)
547 return r;
548
549 continue;
550 }
551
552 r = sd_bus_message_read_basic(m, type, &basic);
553 if (r < 0)
554 return r;
555
556 if (needs_space)
557 fputc(' ', f);
558
559 switch (type) {
560 case SD_BUS_TYPE_BYTE:
561 fprintf(f, "%u", basic.u8);
562 break;
563
564 case SD_BUS_TYPE_BOOLEAN:
565 fputs(true_false(basic.i), f);
566 break;
567
568 case SD_BUS_TYPE_INT16:
569 fprintf(f, "%i", basic.s16);
570 break;
571
572 case SD_BUS_TYPE_UINT16:
573 fprintf(f, "%u", basic.u16);
574 break;
575
576 case SD_BUS_TYPE_INT32:
577 fprintf(f, "%i", basic.s32);
578 break;
579
580 case SD_BUS_TYPE_UINT32:
581 fprintf(f, "%u", basic.u32);
582 break;
583
584 case SD_BUS_TYPE_INT64:
585 fprintf(f, "%" PRIi64, basic.s64);
586 break;
587
588 case SD_BUS_TYPE_UINT64:
589 fprintf(f, "%" PRIu64, basic.u64);
590 break;
591
592 case SD_BUS_TYPE_DOUBLE:
593 fprintf(f, "%g", basic.d64);
594 break;
595
596 case SD_BUS_TYPE_STRING:
597 case SD_BUS_TYPE_OBJECT_PATH:
598 case SD_BUS_TYPE_SIGNATURE: {
599 _cleanup_free_ char *b = NULL;
600
601 b = cescape(basic.string);
602 if (!b)
603 return -ENOMEM;
604
605 fprintf(f, "\"%s\"", b);
606 break;
607 }
608
609 case SD_BUS_TYPE_UNIX_FD:
610 fprintf(f, "%i", basic.i);
611 break;
612
613 default:
614 assert_not_reached("Unknown basic type.");
615 }
616
617 needs_space = true;
618 }
619 }
620
621 typedef struct Member {
622 const char *type;
623 char *interface;
624 char *name;
625 char *signature;
626 char *result;
627 char *value;
628 bool writable;
629 uint64_t flags;
630 } Member;
631
632 static unsigned long member_hash_func(const void *p, const uint8_t hash_key[]) {
633 const Member *m = p;
634 unsigned long ul;
635
636 assert(m);
637 assert(m->type);
638
639 ul = string_hash_func(m->type, hash_key);
640
641 if (m->name)
642 ul ^= string_hash_func(m->name, hash_key);
643
644 if (m->interface)
645 ul ^= string_hash_func(m->interface, hash_key);
646
647 return ul;
648 }
649
650 static int member_compare_func(const void *a, const void *b) {
651 const Member *x = a, *y = b;
652 int d;
653
654 assert(x);
655 assert(y);
656 assert(x->type);
657 assert(y->type);
658
659 d = strcmp_ptr(x->interface, y->interface);
660 if (d != 0)
661 return d;
662
663 d = strcmp(x->type, y->type);
664 if (d != 0)
665 return d;
666
667 return strcmp_ptr(x->name, y->name);
668 }
669
670 static int member_compare_funcp(const void *a, const void *b) {
671 const Member *const * x = (const Member *const *) a, * const *y = (const Member *const *) b;
672
673 return member_compare_func(*x, *y);
674 }
675
676 static void member_free(Member *m) {
677 if (!m)
678 return;
679
680 free(m->interface);
681 free(m->name);
682 free(m->signature);
683 free(m->result);
684 free(m->value);
685 free(m);
686 }
687
688 DEFINE_TRIVIAL_CLEANUP_FUNC(Member*, member_free);
689
690 static void member_set_free(Set *s) {
691 Member *m;
692
693 while ((m = set_steal_first(s)))
694 member_free(m);
695
696 set_free(s);
697 }
698
699 DEFINE_TRIVIAL_CLEANUP_FUNC(Set*, member_set_free);
700
701 static int on_interface(const char *interface, uint64_t flags, void *userdata) {
702 _cleanup_(member_freep) Member *m;
703 Set *members = userdata;
704 int r;
705
706 assert(interface);
707 assert(members);
708
709 m = new0(Member, 1);
710 if (!m)
711 return log_oom();
712
713 m->type = "interface";
714 m->flags = flags;
715
716 r = free_and_strdup(&m->interface, interface);
717 if (r < 0)
718 return log_oom();
719
720 r = set_put(members, m);
721 if (r <= 0) {
722 log_error("Duplicate interface");
723 return -EINVAL;
724 }
725
726 m = NULL;
727 return 0;
728 }
729
730 static int on_method(const char *interface, const char *name, const char *signature, const char *result, uint64_t flags, void *userdata) {
731 _cleanup_(member_freep) Member *m;
732 Set *members = userdata;
733 int r;
734
735 assert(interface);
736 assert(name);
737
738 m = new0(Member, 1);
739 if (!m)
740 return log_oom();
741
742 m->type = "method";
743 m->flags = flags;
744
745 r = free_and_strdup(&m->interface, interface);
746 if (r < 0)
747 return log_oom();
748
749 r = free_and_strdup(&m->name, name);
750 if (r < 0)
751 return log_oom();
752
753 r = free_and_strdup(&m->signature, signature);
754 if (r < 0)
755 return log_oom();
756
757 r = free_and_strdup(&m->result, result);
758 if (r < 0)
759 return log_oom();
760
761 r = set_put(members, m);
762 if (r <= 0) {
763 log_error("Duplicate method");
764 return -EINVAL;
765 }
766
767 m = NULL;
768 return 0;
769 }
770
771 static int on_signal(const char *interface, const char *name, const char *signature, uint64_t flags, void *userdata) {
772 _cleanup_(member_freep) Member *m;
773 Set *members = userdata;
774 int r;
775
776 assert(interface);
777 assert(name);
778
779 m = new0(Member, 1);
780 if (!m)
781 return log_oom();
782
783 m->type = "signal";
784 m->flags = flags;
785
786 r = free_and_strdup(&m->interface, interface);
787 if (r < 0)
788 return log_oom();
789
790 r = free_and_strdup(&m->name, name);
791 if (r < 0)
792 return log_oom();
793
794 r = free_and_strdup(&m->signature, signature);
795 if (r < 0)
796 return log_oom();
797
798 r = set_put(members, m);
799 if (r <= 0) {
800 log_error("Duplicate signal");
801 return -EINVAL;
802 }
803
804 m = NULL;
805 return 0;
806 }
807
808 static int on_property(const char *interface, const char *name, const char *signature, bool writable, uint64_t flags, void *userdata) {
809 _cleanup_(member_freep) Member *m;
810 Set *members = userdata;
811 int r;
812
813 assert(interface);
814 assert(name);
815
816 m = new0(Member, 1);
817 if (!m)
818 return log_oom();
819
820 m->type = "property";
821 m->flags = flags;
822 m->writable = writable;
823
824 r = free_and_strdup(&m->interface, interface);
825 if (r < 0)
826 return log_oom();
827
828 r = free_and_strdup(&m->name, name);
829 if (r < 0)
830 return log_oom();
831
832 r = free_and_strdup(&m->signature, signature);
833 if (r < 0)
834 return log_oom();
835
836 r = set_put(members, m);
837 if (r <= 0) {
838 log_error("Duplicate property");
839 return -EINVAL;
840 }
841
842 m = NULL;
843 return 0;
844 }
845
846 static const char *strdash(const char *x) {
847 return isempty(x) ? "-" : x;
848 }
849
850 static int introspect(sd_bus *bus, char **argv) {
851 static const struct hash_ops member_hash_ops = {
852 .hash = member_hash_func,
853 .compare = member_compare_func,
854 };
855
856 static const XMLIntrospectOps ops = {
857 .on_interface = on_interface,
858 .on_method = on_method,
859 .on_signal = on_signal,
860 .on_property = on_property,
861 };
862
863 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
864 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
865 _cleanup_(member_set_freep) Set *members = NULL;
866 Iterator i;
867 Member *m;
868 const char *xml;
869 int r;
870 unsigned name_width, type_width, signature_width, result_width;
871 Member **sorted = NULL;
872 unsigned k = 0, j, n_args;
873
874 n_args = strv_length(argv);
875 if (n_args < 3) {
876 log_error("Requires service and object path argument.");
877 return -EINVAL;
878 }
879
880 if (n_args > 4) {
881 log_error("Too many arguments.");
882 return -EINVAL;
883 }
884
885 members = set_new(&member_hash_ops);
886 if (!members)
887 return log_oom();
888
889 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Introspectable", "Introspect", &error, &reply, "");
890 if (r < 0) {
891 log_error("Failed to introspect object %s of service %s: %s", argv[2], argv[1], bus_error_message(&error, r));
892 return r;
893 }
894
895 r = sd_bus_message_read(reply, "s", &xml);
896 if (r < 0)
897 return bus_log_parse_error(r);
898
899 /* First, get list of all properties */
900 r = parse_xml_introspect(argv[2], xml, &ops, members);
901 if (r < 0)
902 return r;
903
904 /* Second, find the current values for them */
905 SET_FOREACH(m, members, i) {
906
907 if (!streq(m->type, "property"))
908 continue;
909
910 if (m->value)
911 continue;
912
913 if (argv[3] && !streq(argv[3], m->interface))
914 continue;
915
916 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Properties", "GetAll", &error, &reply, "s", m->interface);
917 if (r < 0) {
918 log_error("%s", bus_error_message(&error, r));
919 return r;
920 }
921
922 r = sd_bus_message_enter_container(reply, 'a', "{sv}");
923 if (r < 0)
924 return bus_log_parse_error(r);
925
926 for (;;) {
927 Member *z;
928 _cleanup_free_ char *buf = NULL;
929 _cleanup_fclose_ FILE *mf = NULL;
930 size_t sz = 0;
931 const char *name;
932
933 r = sd_bus_message_enter_container(reply, 'e', "sv");
934 if (r < 0)
935 return bus_log_parse_error(r);
936
937 if (r == 0)
938 break;
939
940 r = sd_bus_message_read(reply, "s", &name);
941 if (r < 0)
942 return bus_log_parse_error(r);
943
944 r = sd_bus_message_enter_container(reply, 'v', NULL);
945 if (r < 0)
946 return bus_log_parse_error(r);
947
948 mf = open_memstream(&buf, &sz);
949 if (!mf)
950 return log_oom();
951
952 r = format_cmdline(reply, mf, false);
953 if (r < 0)
954 return bus_log_parse_error(r);
955
956 fclose(mf);
957 mf = NULL;
958
959 z = set_get(members, &((Member) {
960 .type = "property",
961 .interface = m->interface,
962 .name = (char*) name }));
963 if (z) {
964 free(z->value);
965 z->value = buf;
966 buf = NULL;
967 }
968
969 r = sd_bus_message_exit_container(reply);
970 if (r < 0)
971 return bus_log_parse_error(r);
972
973 r = sd_bus_message_exit_container(reply);
974 if (r < 0)
975 return bus_log_parse_error(r);
976 }
977
978 r = sd_bus_message_exit_container(reply);
979 if (r < 0)
980 return bus_log_parse_error(r);
981 }
982
983 pager_open_if_enabled();
984
985 name_width = strlen("NAME");
986 type_width = strlen("TYPE");
987 signature_width = strlen("SIGNATURE");
988 result_width = strlen("RESULT/VALUE");
989
990 sorted = newa(Member*, set_size(members));
991
992 SET_FOREACH(m, members, i) {
993
994 if (argv[3] && !streq(argv[3], m->interface))
995 continue;
996
997 if (m->interface)
998 name_width = MAX(name_width, strlen(m->interface));
999 if (m->name)
1000 name_width = MAX(name_width, strlen(m->name) + 1);
1001 if (m->type)
1002 type_width = MAX(type_width, strlen(m->type));
1003 if (m->signature)
1004 signature_width = MAX(signature_width, strlen(m->signature));
1005 if (m->result)
1006 result_width = MAX(result_width, strlen(m->result));
1007 if (m->value)
1008 result_width = MAX(result_width, strlen(m->value));
1009
1010 sorted[k++] = m;
1011 }
1012
1013 if (result_width > 40)
1014 result_width = 40;
1015
1016 qsort(sorted, k, sizeof(Member*), member_compare_funcp);
1017
1018 if (arg_legend) {
1019 printf("%-*s %-*s %-*s %-*s %s\n",
1020 (int) name_width, "NAME",
1021 (int) type_width, "TYPE",
1022 (int) signature_width, "SIGNATURE",
1023 (int) result_width, "RESULT/VALUE",
1024 "FLAGS");
1025 }
1026
1027 for (j = 0; j < k; j++) {
1028 _cleanup_free_ char *ellipsized = NULL;
1029 const char *rv;
1030 bool is_interface;
1031
1032 m = sorted[j];
1033
1034 if (argv[3] && !streq(argv[3], m->interface))
1035 continue;
1036
1037 is_interface = streq(m->type, "interface");
1038
1039 if (argv[3] && is_interface)
1040 continue;
1041
1042 if (m->value) {
1043 ellipsized = ellipsize(m->value, result_width, 100);
1044 if (!ellipsized)
1045 return log_oom();
1046
1047 rv = ellipsized;
1048 } else
1049 rv = strdash(m->result);
1050
1051 printf("%s%s%-*s%s %-*s %-*s %-*s%s%s%s%s%s%s\n",
1052 is_interface ? ansi_highlight() : "",
1053 is_interface ? "" : ".",
1054 - !is_interface + (int) name_width, strdash(streq_ptr(m->type, "interface") ? m->interface : m->name),
1055 is_interface ? ansi_highlight_off() : "",
1056 (int) type_width, strdash(m->type),
1057 (int) signature_width, strdash(m->signature),
1058 (int) result_width, rv,
1059 (m->flags & SD_BUS_VTABLE_DEPRECATED) ? " deprecated" : (m->flags || m->writable ? "" : " -"),
1060 (m->flags & SD_BUS_VTABLE_METHOD_NO_REPLY) ? " no-reply" : "",
1061 (m->flags & SD_BUS_VTABLE_PROPERTY_CONST) ? " const" : "",
1062 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE) ? " emits-change" : "",
1063 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION) ? " emits-invalidation" : "",
1064 m->writable ? " writable" : "");
1065 }
1066
1067 return 0;
1068 }
1069
1070 static int message_dump(sd_bus_message *m, FILE *f) {
1071 return bus_message_dump(m, f, BUS_MESSAGE_DUMP_WITH_HEADER);
1072 }
1073
1074 static int message_pcap(sd_bus_message *m, FILE *f) {
1075 return bus_message_pcap_frame(m, arg_snaplen, f);
1076 }
1077
1078 static int monitor(sd_bus *bus, char *argv[], int (*dump)(sd_bus_message *m, FILE *f)) {
1079 bool added_something = false;
1080 char **i;
1081 int r;
1082
1083 STRV_FOREACH(i, argv+1) {
1084 _cleanup_free_ char *m = NULL;
1085
1086 if (!service_name_is_valid(*i)) {
1087 log_error("Invalid service name '%s'", *i);
1088 return -EINVAL;
1089 }
1090
1091 m = strjoin("sender='", *i, "'", NULL);
1092 if (!m)
1093 return log_oom();
1094
1095 r = sd_bus_add_match(bus, NULL, m, NULL, NULL);
1096 if (r < 0)
1097 return log_error_errno(r, "Failed to add match: %m");
1098
1099 added_something = true;
1100 }
1101
1102 STRV_FOREACH(i, arg_matches) {
1103 r = sd_bus_add_match(bus, NULL, *i, NULL, NULL);
1104 if (r < 0)
1105 return log_error_errno(r, "Failed to add match: %m");
1106
1107 added_something = true;
1108 }
1109
1110 if (!added_something) {
1111 r = sd_bus_add_match(bus, NULL, "", NULL, NULL);
1112 if (r < 0)
1113 return log_error_errno(r, "Failed to add match: %m");
1114 }
1115
1116 log_info("Monitoring bus message stream.");
1117
1118 for (;;) {
1119 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
1120
1121 r = sd_bus_process(bus, &m);
1122 if (r < 0)
1123 return log_error_errno(r, "Failed to process bus: %m");
1124
1125 if (m) {
1126 dump(m, stdout);
1127 fflush(stdout);
1128
1129 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected") > 0) {
1130 log_info("Connection terminated, exiting.");
1131 return 0;
1132 }
1133
1134 continue;
1135 }
1136
1137 if (r > 0)
1138 continue;
1139
1140 r = sd_bus_wait(bus, (uint64_t) -1);
1141 if (r < 0)
1142 return log_error_errno(r, "Failed to wait for bus: %m");
1143 }
1144 }
1145
1146 static int capture(sd_bus *bus, char *argv[]) {
1147 int r;
1148
1149 if (isatty(fileno(stdout)) > 0) {
1150 log_error("Refusing to write message data to console, please redirect output to a file.");
1151 return -EINVAL;
1152 }
1153
1154 bus_pcap_header(arg_snaplen, stdout);
1155
1156 r = monitor(bus, argv, message_pcap);
1157 if (r < 0)
1158 return r;
1159
1160 if (ferror(stdout)) {
1161 log_error("Couldn't write capture file.");
1162 return -EIO;
1163 }
1164
1165 return r;
1166 }
1167
1168 static int status(sd_bus *bus, char *argv[]) {
1169 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
1170 pid_t pid;
1171 int r;
1172
1173 assert(bus);
1174
1175 if (strv_length(argv) > 2) {
1176 log_error("Expects no or one argument.");
1177 return -EINVAL;
1178 }
1179
1180 if (argv[1]) {
1181 r = parse_pid(argv[1], &pid);
1182 if (r < 0)
1183 r = sd_bus_get_name_creds(
1184 bus,
1185 argv[1],
1186 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1187 &creds);
1188 else
1189 r = sd_bus_creds_new_from_pid(
1190 &creds,
1191 pid,
1192 _SD_BUS_CREDS_ALL);
1193 } else {
1194 const char *scope, *address;
1195 sd_id128_t bus_id;
1196
1197 r = sd_bus_get_address(bus, &address);
1198 if (r >= 0)
1199 printf("BusAddress=%s%s%s\n", ansi_highlight(), address, ansi_highlight_off());
1200
1201 r = sd_bus_get_scope(bus, &scope);
1202 if (r >= 0)
1203 printf("BusScope=%s%s%s\n", ansi_highlight(), scope, ansi_highlight_off());
1204
1205 r = sd_bus_get_bus_id(bus, &bus_id);
1206 if (r >= 0)
1207 printf("BusID=%s" SD_ID128_FORMAT_STR "%s\n", ansi_highlight(), SD_ID128_FORMAT_VAL(bus_id), ansi_highlight_off());
1208
1209 r = sd_bus_get_owner_creds(
1210 bus,
1211 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1212 &creds);
1213 }
1214
1215 if (r < 0)
1216 return log_error_errno(r, "Failed to get credentials: %m");
1217
1218 bus_creds_dump(creds, NULL, false);
1219 return 0;
1220 }
1221
1222 static int message_append_cmdline(sd_bus_message *m, const char *signature, char ***x) {
1223 char **p;
1224 int r;
1225
1226 assert(m);
1227 assert(signature);
1228 assert(x);
1229
1230 p = *x;
1231
1232 for (;;) {
1233 const char *v;
1234 char t;
1235
1236 t = *signature;
1237 v = *p;
1238
1239 if (t == 0)
1240 break;
1241 if (!v) {
1242 log_error("Too few parameters for signature.");
1243 return -EINVAL;
1244 }
1245
1246 signature++;
1247 p++;
1248
1249 switch (t) {
1250
1251 case SD_BUS_TYPE_BOOLEAN:
1252
1253 r = parse_boolean(v);
1254 if (r < 0) {
1255 log_error("Failed to parse as boolean: %s", v);
1256 return r;
1257 }
1258
1259 r = sd_bus_message_append_basic(m, t, &r);
1260 break;
1261
1262 case SD_BUS_TYPE_BYTE: {
1263 uint8_t z;
1264
1265 r = safe_atou8(v, &z);
1266 if (r < 0) {
1267 log_error("Failed to parse as byte (unsigned 8bit integer): %s", v);
1268 return r;
1269 }
1270
1271 r = sd_bus_message_append_basic(m, t, &z);
1272 break;
1273 }
1274
1275 case SD_BUS_TYPE_INT16: {
1276 int16_t z;
1277
1278 r = safe_atoi16(v, &z);
1279 if (r < 0) {
1280 log_error("Failed to parse as signed 16bit integer: %s", v);
1281 return r;
1282 }
1283
1284 r = sd_bus_message_append_basic(m, t, &z);
1285 break;
1286 }
1287
1288 case SD_BUS_TYPE_UINT16: {
1289 uint16_t z;
1290
1291 r = safe_atou16(v, &z);
1292 if (r < 0) {
1293 log_error("Failed to parse as unsigned 16bit integer: %s", v);
1294 return r;
1295 }
1296
1297 r = sd_bus_message_append_basic(m, t, &z);
1298 break;
1299 }
1300
1301 case SD_BUS_TYPE_INT32: {
1302 int32_t z;
1303
1304 r = safe_atoi32(v, &z);
1305 if (r < 0) {
1306 log_error("Failed to parse as signed 32bit integer: %s", v);
1307 return r;
1308 }
1309
1310 r = sd_bus_message_append_basic(m, t, &z);
1311 break;
1312 }
1313
1314 case SD_BUS_TYPE_UINT32: {
1315 uint32_t z;
1316
1317 r = safe_atou32(v, &z);
1318 if (r < 0) {
1319 log_error("Failed to parse as unsigned 32bit integer: %s", v);
1320 return r;
1321 }
1322
1323 r = sd_bus_message_append_basic(m, t, &z);
1324 break;
1325 }
1326
1327 case SD_BUS_TYPE_INT64: {
1328 int64_t z;
1329
1330 r = safe_atoi64(v, &z);
1331 if (r < 0) {
1332 log_error("Failed to parse as signed 64bit integer: %s", v);
1333 return r;
1334 }
1335
1336 r = sd_bus_message_append_basic(m, t, &z);
1337 break;
1338 }
1339
1340 case SD_BUS_TYPE_UINT64: {
1341 uint64_t z;
1342
1343 r = safe_atou64(v, &z);
1344 if (r < 0) {
1345 log_error("Failed to parse as unsigned 64bit integer: %s", v);
1346 return r;
1347 }
1348
1349 r = sd_bus_message_append_basic(m, t, &z);
1350 break;
1351 }
1352
1353
1354 case SD_BUS_TYPE_DOUBLE: {
1355 double z;
1356
1357 r = safe_atod(v, &z);
1358 if (r < 0) {
1359 log_error("Failed to parse as double precision floating point: %s", v);
1360 return r;
1361 }
1362
1363 r = sd_bus_message_append_basic(m, t, &z);
1364 break;
1365 }
1366
1367 case SD_BUS_TYPE_STRING:
1368 case SD_BUS_TYPE_OBJECT_PATH:
1369 case SD_BUS_TYPE_SIGNATURE:
1370
1371 r = sd_bus_message_append_basic(m, t, v);
1372 break;
1373
1374 case SD_BUS_TYPE_ARRAY: {
1375 uint32_t n;
1376 size_t k;
1377
1378 r = safe_atou32(v, &n);
1379 if (r < 0) {
1380 log_error("Failed to parse number of array entries: %s", v);
1381 return r;
1382 }
1383
1384 r = signature_element_length(signature, &k);
1385 if (r < 0) {
1386 log_error("Invalid array signature.");
1387 return r;
1388 }
1389
1390 {
1391 unsigned i;
1392 char s[k + 1];
1393 memcpy(s, signature, k);
1394 s[k] = 0;
1395
1396 r = sd_bus_message_open_container(m, SD_BUS_TYPE_ARRAY, s);
1397 if (r < 0)
1398 return bus_log_create_error(r);
1399
1400 for (i = 0; i < n; i++) {
1401 r = message_append_cmdline(m, s, &p);
1402 if (r < 0)
1403 return r;
1404 }
1405 }
1406
1407 signature += k;
1408
1409 r = sd_bus_message_close_container(m);
1410 break;
1411 }
1412
1413 case SD_BUS_TYPE_VARIANT:
1414 r = sd_bus_message_open_container(m, SD_BUS_TYPE_VARIANT, v);
1415 if (r < 0)
1416 return bus_log_create_error(r);
1417
1418 r = message_append_cmdline(m, v, &p);
1419 if (r < 0)
1420 return r;
1421
1422 r = sd_bus_message_close_container(m);
1423 break;
1424
1425 case SD_BUS_TYPE_STRUCT_BEGIN:
1426 case SD_BUS_TYPE_DICT_ENTRY_BEGIN: {
1427 size_t k;
1428
1429 signature--;
1430 p--;
1431
1432 r = signature_element_length(signature, &k);
1433 if (r < 0) {
1434 log_error("Invalid struct/dict entry signature.");
1435 return r;
1436 }
1437
1438 {
1439 char s[k-1];
1440 memcpy(s, signature + 1, k - 2);
1441 s[k - 2] = 0;
1442
1443 r = sd_bus_message_open_container(m, t == SD_BUS_TYPE_STRUCT_BEGIN ? SD_BUS_TYPE_STRUCT : SD_BUS_TYPE_DICT_ENTRY, s);
1444 if (r < 0)
1445 return bus_log_create_error(r);
1446
1447 r = message_append_cmdline(m, s, &p);
1448 if (r < 0)
1449 return r;
1450 }
1451
1452 signature += k;
1453
1454 r = sd_bus_message_close_container(m);
1455 break;
1456 }
1457
1458 case SD_BUS_TYPE_UNIX_FD:
1459 log_error("UNIX file descriptor not supported as type.");
1460 return -EINVAL;
1461
1462 default:
1463 log_error("Unknown signature type %c.", t);
1464 return -EINVAL;
1465 }
1466
1467 if (r < 0)
1468 return bus_log_create_error(r);
1469 }
1470
1471 *x = p;
1472 return 0;
1473 }
1474
1475 static int call(sd_bus *bus, char *argv[]) {
1476 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1477 _cleanup_bus_message_unref_ sd_bus_message *m = NULL, *reply = NULL;
1478 int r;
1479
1480 assert(bus);
1481
1482 if (strv_length(argv) < 5) {
1483 log_error("Expects at least four arguments.");
1484 return -EINVAL;
1485 }
1486
1487 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], argv[3], argv[4]);
1488 if (r < 0)
1489 return bus_log_create_error(r);
1490
1491 r = sd_bus_message_set_expect_reply(m, arg_expect_reply);
1492 if (r < 0)
1493 return bus_log_create_error(r);
1494
1495 r = sd_bus_message_set_auto_start(m, arg_auto_start);
1496 if (r < 0)
1497 return bus_log_create_error(r);
1498
1499 r = sd_bus_message_set_allow_interactive_authorization(m, arg_allow_interactive_authorization);
1500 if (r < 0)
1501 return bus_log_create_error(r);
1502
1503 if (!isempty(argv[5])) {
1504 char **p;
1505
1506 p = argv+6;
1507
1508 r = message_append_cmdline(m, argv[5], &p);
1509 if (r < 0)
1510 return r;
1511
1512 if (*p) {
1513 log_error("Too many parameters for signature.");
1514 return -EINVAL;
1515 }
1516 }
1517
1518 if (!arg_expect_reply) {
1519 r = sd_bus_send(bus, m, NULL);
1520 if (r < 0) {
1521 log_error("Failed to send message.");
1522 return r;
1523 }
1524
1525 return 0;
1526 }
1527
1528 r = sd_bus_call(bus, m, arg_timeout, &error, &reply);
1529 if (r < 0) {
1530 log_error("%s", bus_error_message(&error, r));
1531 return r;
1532 }
1533
1534 r = sd_bus_message_is_empty(reply);
1535 if (r < 0)
1536 return bus_log_parse_error(r);
1537
1538 if (r == 0 && !arg_quiet) {
1539
1540 if (arg_verbose) {
1541 pager_open_if_enabled();
1542
1543 r = bus_message_dump(reply, stdout, 0);
1544 if (r < 0)
1545 return r;
1546 } else {
1547
1548 fputs(sd_bus_message_get_signature(reply, true), stdout);
1549 fputc(' ', stdout);
1550
1551 r = format_cmdline(reply, stdout, false);
1552 if (r < 0)
1553 return bus_log_parse_error(r);
1554
1555 fputc('\n', stdout);
1556 }
1557 }
1558
1559 return 0;
1560 }
1561
1562 static int get_property(sd_bus *bus, char *argv[]) {
1563 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1564 unsigned n;
1565 char **i;
1566 int r;
1567
1568 assert(bus);
1569
1570 n = strv_length(argv);
1571 if (n < 5) {
1572 log_error("Expects at least four arguments.");
1573 return -EINVAL;
1574 }
1575
1576 STRV_FOREACH(i, argv + 4) {
1577 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1578 const char *contents = NULL;
1579 char type;
1580
1581 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Properties", "Get", &error, &reply, "ss", argv[3], *i);
1582 if (r < 0) {
1583 log_error("%s", bus_error_message(&error, r));
1584 return r;
1585 }
1586
1587 r = sd_bus_message_peek_type(reply, &type, &contents);
1588 if (r < 0)
1589 return bus_log_parse_error(r);
1590
1591 r = sd_bus_message_enter_container(reply, 'v', contents);
1592 if (r < 0)
1593 return bus_log_parse_error(r);
1594
1595 if (arg_verbose) {
1596 pager_open_if_enabled();
1597
1598 r = bus_message_dump(reply, stdout, BUS_MESSAGE_DUMP_SUBTREE_ONLY);
1599 if (r < 0)
1600 return r;
1601 } else {
1602 fputs(contents, stdout);
1603 fputc(' ', stdout);
1604
1605 r = format_cmdline(reply, stdout, false);
1606 if (r < 0)
1607 return bus_log_parse_error(r);
1608
1609 fputc('\n', stdout);
1610 }
1611
1612 r = sd_bus_message_exit_container(reply);
1613 if (r < 0)
1614 return bus_log_parse_error(r);
1615 }
1616
1617 return 0;
1618 }
1619
1620 static int set_property(sd_bus *bus, char *argv[]) {
1621 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
1622 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1623 unsigned n;
1624 char **p;
1625 int r;
1626
1627 assert(bus);
1628
1629 n = strv_length(argv);
1630 if (n < 6) {
1631 log_error("Expects at least five arguments.");
1632 return -EINVAL;
1633 }
1634
1635 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], "org.freedesktop.DBus.Properties", "Set");
1636 if (r < 0)
1637 return bus_log_create_error(r);
1638
1639 r = sd_bus_message_append(m, "ss", argv[3], argv[4]);
1640 if (r < 0)
1641 return bus_log_create_error(r);
1642
1643 r = sd_bus_message_open_container(m, 'v', argv[5]);
1644 if (r < 0)
1645 return bus_log_create_error(r);
1646
1647 p = argv+6;
1648 r = message_append_cmdline(m, argv[5], &p);
1649 if (r < 0)
1650 return r;
1651
1652 r = sd_bus_message_close_container(m);
1653 if (r < 0)
1654 return bus_log_create_error(r);
1655
1656 if (*p) {
1657 log_error("Too many parameters for signature.");
1658 return -EINVAL;
1659 }
1660
1661 r = sd_bus_call(bus, m, arg_timeout, &error, NULL);
1662 if (r < 0) {
1663 log_error("%s", bus_error_message(&error, r));
1664 return r;
1665 }
1666
1667 return 0;
1668 }
1669
1670 static int help(void) {
1671 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
1672 "Introspect the bus.\n\n"
1673 " -h --help Show this help\n"
1674 " --version Show package version\n"
1675 " --no-pager Do not pipe output into a pager\n"
1676 " --no-legend Do not show the headers and footers\n"
1677 " --system Connect to system bus\n"
1678 " --user Connect to user bus\n"
1679 " -H --host=[USER@]HOST Operate on remote host\n"
1680 " -M --machine=CONTAINER Operate on local container\n"
1681 " --address=ADDRESS Connect to bus specified by address\n"
1682 " --show-machine Show machine ID column in list\n"
1683 " --unique Only show unique names\n"
1684 " --acquired Only show acquired names\n"
1685 " --activatable Only show activatable names\n"
1686 " --match=MATCH Only show matching messages\n"
1687 " --list Don't show tree, but simple object path list\n"
1688 " --quiet Don't show method call reply\n"
1689 " --verbose Show result values in long format\n"
1690 " --expect-reply=BOOL Expect a method call reply\n"
1691 " --auto-start=BOOL Auto-start destination service\n"
1692 " --allow-interactive-authorization=BOOL\n"
1693 " Allow interactive authorization for operation\n"
1694 " --timeout=SECS Maximum time to wait for method call completion\n"
1695 " --augment-creds=BOOL Extend credential data with data read from /proc/$PID\n\n"
1696 "Commands:\n"
1697 " list List bus names\n"
1698 " status [SERVICE] Show bus service, process or bus owner credentials\n"
1699 " monitor [SERVICE...] Show bus traffic\n"
1700 " capture [SERVICE...] Capture bus traffic as pcap\n"
1701 " tree [SERVICE...] Show object tree of service\n"
1702 " introspect SERVICE OBJECT [INTERFACE]\n"
1703 " call SERVICE OBJECT INTERFACE METHOD [SIGNATURE [ARGUMENT...]]\n"
1704 " Call a method\n"
1705 " get-property SERVICE OBJECT INTERFACE PROPERTY...\n"
1706 " Get property value\n"
1707 " set-property SERVICE OBJECT INTERFACE PROPERTY SIGNATURE ARGUMENT...\n"
1708 " Set property value\n"
1709 " help Show this help\n"
1710 , program_invocation_short_name);
1711
1712 return 0;
1713 }
1714
1715 static int parse_argv(int argc, char *argv[]) {
1716
1717 enum {
1718 ARG_VERSION = 0x100,
1719 ARG_NO_PAGER,
1720 ARG_NO_LEGEND,
1721 ARG_SYSTEM,
1722 ARG_USER,
1723 ARG_ADDRESS,
1724 ARG_MATCH,
1725 ARG_SHOW_MACHINE,
1726 ARG_UNIQUE,
1727 ARG_ACQUIRED,
1728 ARG_ACTIVATABLE,
1729 ARG_SIZE,
1730 ARG_LIST,
1731 ARG_VERBOSE,
1732 ARG_EXPECT_REPLY,
1733 ARG_AUTO_START,
1734 ARG_ALLOW_INTERACTIVE_AUTHORIZATION,
1735 ARG_TIMEOUT,
1736 ARG_AUGMENT_CREDS,
1737 };
1738
1739 static const struct option options[] = {
1740 { "help", no_argument, NULL, 'h' },
1741 { "version", no_argument, NULL, ARG_VERSION },
1742 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
1743 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
1744 { "system", no_argument, NULL, ARG_SYSTEM },
1745 { "user", no_argument, NULL, ARG_USER },
1746 { "address", required_argument, NULL, ARG_ADDRESS },
1747 { "show-machine", no_argument, NULL, ARG_SHOW_MACHINE },
1748 { "unique", no_argument, NULL, ARG_UNIQUE },
1749 { "acquired", no_argument, NULL, ARG_ACQUIRED },
1750 { "activatable", no_argument, NULL, ARG_ACTIVATABLE },
1751 { "match", required_argument, NULL, ARG_MATCH },
1752 { "host", required_argument, NULL, 'H' },
1753 { "machine", required_argument, NULL, 'M' },
1754 { "size", required_argument, NULL, ARG_SIZE },
1755 { "list", no_argument, NULL, ARG_LIST },
1756 { "quiet", no_argument, NULL, 'q' },
1757 { "verbose", no_argument, NULL, ARG_VERBOSE },
1758 { "expect-reply", required_argument, NULL, ARG_EXPECT_REPLY },
1759 { "auto-start", required_argument, NULL, ARG_AUTO_START },
1760 { "allow-interactive-authorization", required_argument, NULL, ARG_ALLOW_INTERACTIVE_AUTHORIZATION },
1761 { "timeout", required_argument, NULL, ARG_TIMEOUT },
1762 { "augment-creds",required_argument, NULL, ARG_AUGMENT_CREDS},
1763 {},
1764 };
1765
1766 int c, r;
1767
1768 assert(argc >= 0);
1769 assert(argv);
1770
1771 while ((c = getopt_long(argc, argv, "hH:M:q", options, NULL)) >= 0)
1772
1773 switch (c) {
1774
1775 case 'h':
1776 return help();
1777
1778 case ARG_VERSION:
1779 puts(PACKAGE_STRING);
1780 puts(SYSTEMD_FEATURES);
1781 return 0;
1782
1783 case ARG_NO_PAGER:
1784 arg_no_pager = true;
1785 break;
1786
1787 case ARG_NO_LEGEND:
1788 arg_legend = false;
1789 break;
1790
1791 case ARG_USER:
1792 arg_user = true;
1793 break;
1794
1795 case ARG_SYSTEM:
1796 arg_user = false;
1797 break;
1798
1799 case ARG_ADDRESS:
1800 arg_address = optarg;
1801 break;
1802
1803 case ARG_SHOW_MACHINE:
1804 arg_show_machine = true;
1805 break;
1806
1807 case ARG_UNIQUE:
1808 arg_unique = true;
1809 break;
1810
1811 case ARG_ACQUIRED:
1812 arg_acquired = true;
1813 break;
1814
1815 case ARG_ACTIVATABLE:
1816 arg_activatable = true;
1817 break;
1818
1819 case ARG_MATCH:
1820 if (strv_extend(&arg_matches, optarg) < 0)
1821 return log_oom();
1822 break;
1823
1824 case ARG_SIZE: {
1825 off_t o;
1826
1827 r = parse_size(optarg, 0, &o);
1828 if (r < 0) {
1829 log_error("Failed to parse size: %s", optarg);
1830 return r;
1831 }
1832
1833 if ((off_t) (size_t) o != o) {
1834 log_error("Size out of range.");
1835 return -E2BIG;
1836 }
1837
1838 arg_snaplen = (size_t) o;
1839 break;
1840 }
1841
1842 case ARG_LIST:
1843 arg_list = true;
1844 break;
1845
1846 case 'H':
1847 arg_transport = BUS_TRANSPORT_REMOTE;
1848 arg_host = optarg;
1849 break;
1850
1851 case 'M':
1852 arg_transport = BUS_TRANSPORT_MACHINE;
1853 arg_host = optarg;
1854 break;
1855
1856 case 'q':
1857 arg_quiet = true;
1858 break;
1859
1860 case ARG_VERBOSE:
1861 arg_verbose = true;
1862 break;
1863
1864 case ARG_EXPECT_REPLY:
1865 r = parse_boolean(optarg);
1866 if (r < 0) {
1867 log_error("Failed to parse --expect-reply= parameter.");
1868 return r;
1869 }
1870
1871 arg_expect_reply = !!r;
1872 break;
1873
1874
1875 case ARG_AUTO_START:
1876 r = parse_boolean(optarg);
1877 if (r < 0) {
1878 log_error("Failed to parse --auto-start= parameter.");
1879 return r;
1880 }
1881
1882 arg_auto_start = !!r;
1883 break;
1884
1885
1886 case ARG_ALLOW_INTERACTIVE_AUTHORIZATION:
1887 r = parse_boolean(optarg);
1888 if (r < 0) {
1889 log_error("Failed to parse --allow-interactive-authorization= parameter.");
1890 return r;
1891 }
1892
1893 arg_allow_interactive_authorization = !!r;
1894 break;
1895
1896 case ARG_TIMEOUT:
1897 r = parse_sec(optarg, &arg_timeout);
1898 if (r < 0) {
1899 log_error("Failed to parse --timeout= parameter.");
1900 return r;
1901 }
1902
1903 break;
1904
1905 case ARG_AUGMENT_CREDS:
1906 r = parse_boolean(optarg);
1907 if (r < 0) {
1908 log_error("Failed to parse --augment-creds= parameter.");
1909 return r;
1910 }
1911
1912 arg_augment_creds = !!r;
1913 break;
1914
1915 case '?':
1916 return -EINVAL;
1917
1918 default:
1919 assert_not_reached("Unhandled option");
1920 }
1921
1922 return 1;
1923 }
1924
1925 static int busctl_main(sd_bus *bus, int argc, char *argv[]) {
1926 assert(bus);
1927
1928 if (optind >= argc ||
1929 streq(argv[optind], "list"))
1930 return list_bus_names(bus, argv + optind);
1931
1932 if (streq(argv[optind], "monitor"))
1933 return monitor(bus, argv + optind, message_dump);
1934
1935 if (streq(argv[optind], "capture"))
1936 return capture(bus, argv + optind);
1937
1938 if (streq(argv[optind], "status"))
1939 return status(bus, argv + optind);
1940
1941 if (streq(argv[optind], "tree"))
1942 return tree(bus, argv + optind);
1943
1944 if (streq(argv[optind], "introspect"))
1945 return introspect(bus, argv + optind);
1946
1947 if (streq(argv[optind], "call"))
1948 return call(bus, argv + optind);
1949
1950 if (streq(argv[optind], "get-property"))
1951 return get_property(bus, argv + optind);
1952
1953 if (streq(argv[optind], "set-property"))
1954 return set_property(bus, argv + optind);
1955
1956 if (streq(argv[optind], "help"))
1957 return help();
1958
1959 log_error("Unknown command '%s'", argv[optind]);
1960 return -EINVAL;
1961 }
1962
1963 int main(int argc, char *argv[]) {
1964 _cleanup_bus_flush_close_unref_ sd_bus *bus = NULL;
1965 int r;
1966
1967 log_parse_environment();
1968 log_open();
1969
1970 r = parse_argv(argc, argv);
1971 if (r <= 0)
1972 goto finish;
1973
1974 r = sd_bus_new(&bus);
1975 if (r < 0) {
1976 log_error_errno(r, "Failed to allocate bus: %m");
1977 goto finish;
1978 }
1979
1980 if (streq_ptr(argv[optind], "monitor") ||
1981 streq_ptr(argv[optind], "capture")) {
1982
1983 r = sd_bus_set_monitor(bus, true);
1984 if (r < 0) {
1985 log_error_errno(r, "Failed to set monitor mode: %m");
1986 goto finish;
1987 }
1988
1989 r = sd_bus_negotiate_creds(bus, true, _SD_BUS_CREDS_ALL);
1990 if (r < 0) {
1991 log_error_errno(r, "Failed to enable credentials: %m");
1992 goto finish;
1993 }
1994
1995 r = sd_bus_negotiate_timestamp(bus, true);
1996 if (r < 0) {
1997 log_error_errno(r, "Failed to enable timestamps: %m");
1998 goto finish;
1999 }
2000
2001 r = sd_bus_negotiate_fds(bus, true);
2002 if (r < 0) {
2003 log_error_errno(r, "Failed to enable fds: %m");
2004 goto finish;
2005 }
2006 }
2007
2008 if (arg_address)
2009 r = sd_bus_set_address(bus, arg_address);
2010 else {
2011 r = sd_bus_set_bus_client(bus, true);
2012 if (r < 0) {
2013 log_error_errno(r, "Failed to set bus client: %m");
2014 goto finish;
2015 }
2016
2017 switch (arg_transport) {
2018
2019 case BUS_TRANSPORT_LOCAL:
2020 if (arg_user) {
2021 bus->is_user = true;
2022 r = bus_set_address_user(bus);
2023 } else {
2024 bus->is_system = true;
2025 r = bus_set_address_system(bus);
2026 }
2027 break;
2028
2029 case BUS_TRANSPORT_REMOTE:
2030 r = bus_set_address_system_remote(bus, arg_host);
2031 break;
2032
2033 case BUS_TRANSPORT_MACHINE:
2034 r = bus_set_address_system_machine(bus, arg_host);
2035 break;
2036
2037 default:
2038 assert_not_reached("Hmm, unknown transport type.");
2039 }
2040 }
2041 if (r < 0) {
2042 log_error_errno(r, "Failed to set address: %m");
2043 goto finish;
2044 }
2045
2046 r = sd_bus_start(bus);
2047 if (r < 0) {
2048 log_error_errno(r, "Failed to connect to bus: %m");
2049 goto finish;
2050 }
2051
2052 r = busctl_main(bus, argc, argv);
2053
2054 finish:
2055 pager_close();
2056
2057 strv_free(arg_matches);
2058
2059 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
2060 }