1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
8 #include "sd-netlink.h"
11 #include "alloc-util.h"
12 #include "bus-common-errors.h"
13 #include "bus-error.h"
14 #include "bus-locator.h"
15 #include "bus-map-properties.h"
16 #include "bus-message-util.h"
17 #include "dns-domain.h"
19 #include "format-table.h"
20 #include "format-util.h"
21 #include "gcrypt-util.h"
22 #include "hostname-util.h"
23 #include "main-func.h"
24 #include "missing_network.h"
25 #include "netlink-util.h"
27 #include "parse-argument.h"
28 #include "parse-util.h"
29 #include "pretty-print.h"
30 #include "process-util.h"
31 #include "resolvconf-compat.h"
32 #include "resolvectl.h"
33 #include "resolved-def.h"
34 #include "resolved-dns-packet.h"
35 #include "resolved-util.h"
36 #include "socket-netlink.h"
37 #include "sort-util.h"
38 #include "stdio-util.h"
39 #include "string-table.h"
41 #include "terminal-util.h"
45 static int arg_family
= AF_UNSPEC
;
46 static int arg_ifindex
= 0;
47 static char *arg_ifname
= NULL
;
48 static uint16_t arg_type
= 0;
49 static uint16_t arg_class
= 0;
50 static bool arg_legend
= true;
51 static uint64_t arg_flags
= 0;
52 static PagerFlags arg_pager_flags
= 0;
53 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
54 static const char *arg_service_family
= NULL
;
56 typedef enum RawType
{
61 static RawType arg_raw
= RAW_NONE
;
63 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
65 char **arg_set_dns
= NULL
;
66 char **arg_set_domain
= NULL
;
67 static const char *arg_set_llmnr
= NULL
;
68 static const char *arg_set_mdns
= NULL
;
69 static const char *arg_set_dns_over_tls
= NULL
;
70 static const char *arg_set_dnssec
= NULL
;
71 static char **arg_set_nta
= NULL
;
73 STATIC_DESTRUCTOR_REGISTER(arg_ifname
, freep
);
74 STATIC_DESTRUCTOR_REGISTER(arg_set_dns
, strv_freep
);
75 STATIC_DESTRUCTOR_REGISTER(arg_set_domain
, strv_freep
);
76 STATIC_DESTRUCTOR_REGISTER(arg_set_nta
, strv_freep
);
78 typedef enum StatusMode
{
90 typedef struct InterfaceInfo
{
95 static int interface_info_compare(const InterfaceInfo
*a
, const InterfaceInfo
*b
) {
98 r
= CMP(a
->index
, b
->index
);
102 return strcmp_ptr(a
->name
, b
->name
);
105 int ifname_mangle(const char *s
) {
106 _cleanup_free_
char *iface
= NULL
;
112 dot
= strchr(s
, '.');
114 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
115 iface
= strndup(s
, dot
- s
);
122 ifi
= resolve_interface(NULL
, iface
);
124 if (ifi
== -ENODEV
&& arg_ifindex_permissive
) {
125 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
129 return log_error_errno(ifi
, "Failed to resolve interface \"%s\": %m", iface
);
132 if (arg_ifindex
> 0 && arg_ifindex
!= ifi
)
133 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Specified multiple different interfaces. Refusing.");
136 free_and_replace(arg_ifname
, iface
);
141 static void print_source(uint64_t flags
, usec_t rtt
) {
142 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
150 printf("\n%s-- Information acquired via", ansi_grey());
152 printf(" protocol%s%s%s%s%s",
153 flags
& SD_RESOLVED_DNS
? " DNS" :"",
154 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
155 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
156 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
157 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
159 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
162 "%s-- Data is authenticated: %s; Data was acquired via local or encrypted transport: %s%s\n",
163 rtt_str
, ansi_normal(),
165 yes_no(flags
& SD_RESOLVED_AUTHENTICATED
),
166 yes_no(flags
& SD_RESOLVED_CONFIDENTIAL
),
169 if ((flags
& (SD_RESOLVED_FROM_MASK
|SD_RESOLVED_SYNTHETIC
)) != 0)
170 printf("%s-- Data from:%s%s%s%s%s%s\n",
172 FLAGS_SET(flags
, SD_RESOLVED_SYNTHETIC
) ? " synthetic" : "",
173 FLAGS_SET(flags
, SD_RESOLVED_FROM_CACHE
) ? " cache" : "",
174 FLAGS_SET(flags
, SD_RESOLVED_FROM_ZONE
) ? " zone" : "",
175 FLAGS_SET(flags
, SD_RESOLVED_FROM_TRUST_ANCHOR
) ? " trust-anchor" : "",
176 FLAGS_SET(flags
, SD_RESOLVED_FROM_NETWORK
) ? " network" : "",
180 static void print_ifindex_comment(int printed_so_far
, int ifindex
) {
181 char ifname
[IF_NAMESIZE
+ 1];
186 if (!format_ifname(ifindex
, ifname
))
187 log_warning_errno(errno
, "Failed to resolve interface name for index %i, ignoring: %m", ifindex
);
189 printf("%*s%s-- link: %s%s",
190 60 > printed_so_far
? 60 - printed_so_far
: 0, " ", /* Align comment to the 60th column */
191 ansi_grey(), ifname
, ansi_normal());
194 static int resolve_host(sd_bus
*bus
, const char *name
) {
195 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
196 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
197 const char *canonical
= NULL
;
205 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
207 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveHostname");
209 return bus_log_create_error(r
);
211 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
213 return bus_log_create_error(r
);
215 ts
= now(CLOCK_MONOTONIC
);
217 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
219 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
221 ts
= now(CLOCK_MONOTONIC
) - ts
;
223 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
225 return bus_log_parse_error(r
);
227 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
228 _cleanup_free_
char *pretty
= NULL
;
229 int ifindex
, family
, k
;
230 union in_addr_union a
;
232 assert_cc(sizeof(int) == sizeof(int32_t));
234 r
= sd_bus_message_read(reply
, "i", &ifindex
);
236 return bus_log_parse_error(r
);
238 sd_bus_error_free(&error
);
239 r
= bus_message_read_in_addr_auto(reply
, &error
, &family
, &a
);
240 if (r
< 0 && !sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
))
241 return log_error_errno(r
, "%s: systemd-resolved returned invalid result: %s", name
, bus_error_message(&error
, r
));
243 r
= sd_bus_message_exit_container(reply
);
245 return bus_log_parse_error(r
);
247 if (sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
)) {
248 log_debug_errno(r
, "%s: systemd-resolved returned invalid result, ignoring: %s", name
, bus_error_message(&error
, r
));
252 r
= in_addr_ifindex_to_string(family
, &a
, ifindex
, &pretty
);
254 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
256 k
= printf("%*s%s %s%s%s",
257 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
258 ansi_highlight(), pretty
, ansi_normal());
260 print_ifindex_comment(k
, ifindex
);
266 return bus_log_parse_error(r
);
268 r
= sd_bus_message_exit_container(reply
);
270 return bus_log_parse_error(r
);
272 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
274 return bus_log_parse_error(r
);
276 if (!streq(name
, canonical
))
277 printf("%*s%s (%s)\n",
278 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
282 return log_error_errno(SYNTHETIC_ERRNO(ESRCH
),
283 "%s: no addresses found", name
);
285 print_source(flags
, ts
);
290 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
291 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
292 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
293 _cleanup_free_
char *pretty
= NULL
;
300 assert(IN_SET(family
, AF_INET
, AF_INET6
));
304 ifindex
= arg_ifindex
;
306 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
310 log_debug("Resolving %s.", pretty
);
312 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveAddress");
314 return bus_log_create_error(r
);
316 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
318 return bus_log_create_error(r
);
320 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
322 return bus_log_create_error(r
);
324 r
= sd_bus_message_append(req
, "t", arg_flags
);
326 return bus_log_create_error(r
);
328 ts
= now(CLOCK_MONOTONIC
);
330 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
332 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
334 ts
= now(CLOCK_MONOTONIC
) - ts
;
336 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
338 return bus_log_create_error(r
);
340 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
344 assert_cc(sizeof(int) == sizeof(int32_t));
346 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
350 r
= sd_bus_message_exit_container(reply
);
354 k
= printf("%*s%s %s%s%s",
355 (int) strlen(pretty
), c
== 0 ? pretty
: "",
357 ansi_highlight(), n
, ansi_normal());
359 print_ifindex_comment(k
, ifindex
);
365 return bus_log_parse_error(r
);
367 r
= sd_bus_message_exit_container(reply
);
369 return bus_log_parse_error(r
);
371 r
= sd_bus_message_read(reply
, "t", &flags
);
373 return bus_log_parse_error(r
);
376 return log_error_errno(SYNTHETIC_ERRNO(ESRCH
),
377 "%s: no names found", pretty
);
379 print_source(flags
, ts
);
384 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
385 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
386 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
389 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
393 p
->refuse_compression
= true;
395 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
399 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
401 return log_error_errno(r
, "Failed to parse RR: %m");
403 if (arg_raw
== RAW_PAYLOAD
) {
407 k
= dns_resource_record_payload(rr
, &data
);
409 return log_error_errno(k
, "Cannot dump RR: %m");
410 fwrite(data
, 1, k
, stdout
);
415 s
= dns_resource_record_to_string(rr
);
420 print_ifindex_comment(k
, ifindex
);
427 static int idna_candidate(const char *name
, char **ret
) {
428 _cleanup_free_
char *idnafied
= NULL
;
434 r
= dns_name_apply_idna(name
, &idnafied
);
436 return log_error_errno(r
, "Failed to apply IDNA to name '%s': %m", name
);
437 if (r
> 0 && !streq(name
, idnafied
)) {
438 *ret
= TAKE_PTR(idnafied
);
446 static bool single_label_nonsynthetic(const char *name
) {
447 _cleanup_free_
char *first_label
= NULL
;
450 if (!dns_name_is_single_label(name
))
453 if (is_localhost(name
) || is_gateway_hostname(name
))
456 r
= resolve_system_hostname(NULL
, &first_label
);
458 log_warning_errno(r
, "Failed to determine the hostname: %m");
462 return !streq(name
, first_label
);
465 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
466 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
467 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
468 _cleanup_free_
char *idnafied
= NULL
;
469 bool needs_authentication
= false;
477 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
479 if (dns_name_dot_suffixed(name
) == 0 && single_label_nonsynthetic(name
))
480 log_notice("(Note that search domains are not appended when --type= is specified. "
481 "Please specify fully qualified domain names, or remove --type= switch from invocation in order to request regular hostname resolution.)");
483 r
= idna_candidate(name
, &idnafied
);
487 log_notice("(Note that IDNA translation is not applied when --type= is specified. "
488 "Please specify translated domain names — i.e. '%s' — when resolving raw records, or remove --type= switch from invocation in order to request regular hostname resolution.",
491 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveRecord");
493 return bus_log_create_error(r
);
495 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
497 return bus_log_create_error(r
);
499 ts
= now(CLOCK_MONOTONIC
);
501 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
503 if (warn_missing
|| r
!= -ENXIO
)
504 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
508 ts
= now(CLOCK_MONOTONIC
) - ts
;
510 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
512 return bus_log_parse_error(r
);
514 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
520 assert_cc(sizeof(int) == sizeof(int32_t));
522 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
524 return bus_log_parse_error(r
);
526 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
528 return bus_log_parse_error(r
);
530 r
= sd_bus_message_exit_container(reply
);
532 return bus_log_parse_error(r
);
534 if (arg_raw
== RAW_PACKET
) {
535 uint64_t u64
= htole64(l
);
537 fwrite(&u64
, sizeof(u64
), 1, stdout
);
538 fwrite(d
, 1, l
, stdout
);
540 r
= output_rr_packet(d
, l
, ifindex
);
545 if (dns_type_needs_authentication(t
))
546 needs_authentication
= true;
551 return bus_log_parse_error(r
);
553 r
= sd_bus_message_exit_container(reply
);
555 return bus_log_parse_error(r
);
557 r
= sd_bus_message_read(reply
, "t", &flags
);
559 return bus_log_parse_error(r
);
563 log_error("%s: no records found", name
);
567 print_source(flags
, ts
);
569 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
572 fprintf(stderr
, "\n%s"
573 "WARNING: The resources shown contain cryptographic key data which could not be\n"
574 " authenticated. It is not suitable to authenticate any communication.\n"
575 " This is usually indication that DNSSEC authentication was not enabled\n"
576 " or is not available for the selected protocol or DNS servers.%s\n",
577 ansi_highlight_red(),
584 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
585 uint16_t type
= 0, class = 0;
586 const char *p
, *q
, *n
;
591 assert(startswith(name
, "dns:"));
593 /* Parse RFC 4501 dns: URIs */
603 e
= strchr(p
+ 2, '/');
608 log_warning("DNS authority specification not supported; ignoring specified authority.");
615 n
= strndupa(p
, q
- p
);
621 f
= startswith_no_case(q
, "class=");
623 _cleanup_free_
char *t
= NULL
;
627 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
628 "DNS class specified twice.");
630 e
= strchrnul(f
, ';');
631 t
= strndup(f
, e
- f
);
635 r
= dns_class_from_string(t
);
637 return log_error_errno(r
, "Unknown DNS class %s.", t
);
649 f
= startswith_no_case(q
, "type=");
651 _cleanup_free_
char *t
= NULL
;
655 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
656 "DNS type specified twice.");
658 e
= strchrnul(f
, ';');
659 t
= strndup(f
, e
- f
);
663 r
= dns_type_from_string(t
);
665 return log_error_errno(r
, "Unknown DNS type %s: %m", t
);
683 class = arg_class
?: DNS_CLASS_IN
;
685 type
= arg_type
?: DNS_TYPE_A
;
687 return resolve_record(bus
, n
, class, type
, true);
690 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
691 "Invalid DNS URI: %s", name
);
694 static int verb_query(int argc
, char **argv
, void *userdata
) {
695 sd_bus
*bus
= userdata
;
700 STRV_FOREACH(p
, argv
+ 1) {
701 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
707 STRV_FOREACH(p
, argv
+ 1) {
708 if (startswith(*p
, "dns:"))
709 q
= resolve_rfc4501(bus
, *p
);
712 union in_addr_union a
;
714 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
716 q
= resolve_address(bus
, family
, &a
, ifindex
);
718 q
= resolve_host(bus
, *p
);
727 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
728 const char *canonical_name
, *canonical_type
, *canonical_domain
;
729 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
730 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
741 name
= empty_to_null(name
);
742 type
= empty_to_null(type
);
745 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
747 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
749 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
751 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveService");
753 return bus_log_create_error(r
);
755 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
757 return bus_log_create_error(r
);
759 ts
= now(CLOCK_MONOTONIC
);
761 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
763 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
765 ts
= now(CLOCK_MONOTONIC
) - ts
;
767 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
769 return bus_log_parse_error(r
);
772 (name
? strlen(name
) + 1 : 0) +
773 (type
? strlen(type
) + 1 : 0) +
777 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
778 uint16_t priority
, weight
, port
;
779 const char *hostname
, *canonical
;
781 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
783 return bus_log_parse_error(r
);
786 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
788 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
790 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
791 (int) strlen(domain
), c
== 0 ? domain
: "",
796 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
798 return bus_log_parse_error(r
);
800 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
801 _cleanup_free_
char *pretty
= NULL
;
802 int ifindex
, family
, k
;
803 union in_addr_union a
;;
805 assert_cc(sizeof(int) == sizeof(int32_t));
807 r
= sd_bus_message_read(reply
, "i", &ifindex
);
809 return bus_log_parse_error(r
);
811 sd_bus_error_free(&error
);
812 r
= bus_message_read_in_addr_auto(reply
, &error
, &family
, &a
);
813 if (r
< 0 && !sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
))
814 return log_error_errno(r
, "%s: systemd-resolved returned invalid result: %s", name
, bus_error_message(&error
, r
));
816 r
= sd_bus_message_exit_container(reply
);
818 return bus_log_parse_error(r
);
820 if (sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
)) {
821 log_debug_errno(r
, "%s: systemd-resolved returned invalid result, ignoring: %s", name
, bus_error_message(&error
, r
));
825 r
= in_addr_ifindex_to_string(family
, &a
, ifindex
, &pretty
);
827 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
829 k
= printf("%*s%s", (int) indent
, "", pretty
);
830 print_ifindex_comment(k
, ifindex
);
834 return bus_log_parse_error(r
);
836 r
= sd_bus_message_exit_container(reply
);
838 return bus_log_parse_error(r
);
840 r
= sd_bus_message_read(reply
, "s", &canonical
);
842 return bus_log_parse_error(r
);
844 if (!streq(hostname
, canonical
))
845 printf("%*s(%s)\n", (int) indent
, "", canonical
);
847 r
= sd_bus_message_exit_container(reply
);
849 return bus_log_parse_error(r
);
854 return bus_log_parse_error(r
);
856 r
= sd_bus_message_exit_container(reply
);
858 return bus_log_parse_error(r
);
860 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
862 return bus_log_parse_error(r
);
864 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
865 _cleanup_free_
char *escaped
= NULL
;
867 escaped
= cescape_length(p
, sz
);
871 printf("%*s%s\n", (int) indent
, "", escaped
);
874 return bus_log_parse_error(r
);
876 r
= sd_bus_message_exit_container(reply
);
878 return bus_log_parse_error(r
);
880 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
882 return bus_log_parse_error(r
);
884 canonical_name
= empty_to_null(canonical_name
);
885 canonical_type
= empty_to_null(canonical_type
);
887 if (!streq_ptr(name
, canonical_name
) ||
888 !streq_ptr(type
, canonical_type
) ||
889 !streq_ptr(domain
, canonical_domain
)) {
891 printf("%*s(", (int) indent
, "");
894 printf("%s/", canonical_name
);
896 printf("%s/", canonical_type
);
898 printf("%s)\n", canonical_domain
);
901 print_source(flags
, ts
);
906 static int verb_service(int argc
, char **argv
, void *userdata
) {
907 sd_bus
*bus
= userdata
;
910 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
912 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
914 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
917 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
918 const char *domain
, *full
;
920 _cleanup_free_
char *hashed
= NULL
;
925 domain
= strrchr(address
, '@');
927 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
928 "Address does not contain '@': \"%s\"", address
);
929 if (domain
== address
|| domain
[1] == '\0')
930 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
931 "Address starts or ends with '@': \"%s\"", address
);
934 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
936 return log_error_errno(r
, "Hashing failed: %m");
938 strshorten(hashed
, 56);
940 full
= strjoina(hashed
, "._openpgpkey.", domain
);
941 log_debug("Looking up \"%s\".", full
);
943 r
= resolve_record(bus
, full
,
944 arg_class
?: DNS_CLASS_IN
,
945 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
947 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
948 hashed
= mfree(hashed
);
949 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
951 return log_error_errno(r
, "Hashing failed: %m");
953 full
= strjoina(hashed
, "._openpgpkey.", domain
);
954 log_debug("Looking up \"%s\".", full
);
956 return resolve_record(bus
, full
,
957 arg_class
?: DNS_CLASS_IN
,
958 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
964 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
965 sd_bus
*bus
= userdata
;
969 STRV_FOREACH(p
, argv
+ 1) {
970 q
= resolve_openpgp(bus
, *p
);
978 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
980 uint16_t port_num
= 443;
981 _cleanup_free_
char *full
= NULL
;
987 port
= strrchr(address
, ':');
989 r
= parse_ip_port(port
+ 1, &port_num
);
991 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
993 address
= strndupa(address
, port
- address
);
996 r
= asprintf(&full
, "_%u._%s.%s",
1003 log_debug("Looking up \"%s\".", full
);
1005 return resolve_record(bus
, full
,
1006 arg_class
?: DNS_CLASS_IN
,
1007 arg_type
?: DNS_TYPE_TLSA
, true);
1010 static bool service_family_is_valid(const char *s
) {
1011 return STR_IN_SET(s
, "tcp", "udp", "sctp");
1014 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
1015 sd_bus
*bus
= userdata
;
1016 char **p
, **args
= argv
+ 1;
1017 const char *family
= "tcp";
1020 if (service_family_is_valid(argv
[1])) {
1025 STRV_FOREACH(p
, args
) {
1026 q
= resolve_tlsa(bus
, family
, *p
);
1034 static int show_statistics(int argc
, char **argv
, void *userdata
) {
1035 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1036 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
1037 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1038 sd_bus
*bus
= userdata
;
1039 uint64_t n_current_transactions
, n_total_transactions
,
1040 cache_size
, n_cache_hit
, n_cache_miss
,
1041 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
1042 int r
, dnssec_supported
;
1046 r
= bus_get_property_trivial(bus
, bus_resolve_mgr
, "DNSSECSupported", &error
, 'b', &dnssec_supported
);
1048 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
1050 printf("DNSSEC supported by current servers: %s%s%s\n\n",
1052 yes_no(dnssec_supported
),
1055 r
= bus_get_property(bus
, bus_resolve_mgr
, "TransactionStatistics", &error
, &reply
, "(tt)");
1057 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
1059 r
= sd_bus_message_read(reply
, "(tt)",
1060 &n_current_transactions
,
1061 &n_total_transactions
);
1063 return bus_log_parse_error(r
);
1065 reply
= sd_bus_message_unref(reply
);
1067 r
= bus_get_property(bus
, bus_resolve_mgr
, "CacheStatistics", &error
, &reply
, "(ttt)");
1069 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1071 r
= sd_bus_message_read(reply
, "(ttt)",
1076 return bus_log_parse_error(r
);
1078 reply
= sd_bus_message_unref(reply
);
1080 r
= bus_get_property(bus
, bus_resolve_mgr
, "DNSSECStatistics", &error
, &reply
, "(tttt)");
1082 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1084 r
= sd_bus_message_read(reply
, "(tttt)",
1088 &n_dnssec_indeterminate
);
1090 return bus_log_parse_error(r
);
1092 table
= table_new("key", "value");
1096 table_set_header(table
, false);
1098 r
= table_add_many(table
,
1099 TABLE_STRING
, "Transactions",
1100 TABLE_SET_COLOR
, ansi_highlight(),
1102 TABLE_STRING
, "Current Transactions:",
1103 TABLE_SET_ALIGN_PERCENT
, 100,
1104 TABLE_UINT64
, n_current_transactions
,
1105 TABLE_STRING
, "Total Transactions:",
1106 TABLE_UINT64
, n_total_transactions
,
1107 TABLE_EMPTY
, TABLE_EMPTY
,
1108 TABLE_STRING
, "Cache",
1109 TABLE_SET_COLOR
, ansi_highlight(),
1110 TABLE_SET_ALIGN_PERCENT
, 0,
1112 TABLE_STRING
, "Current Cache Size:",
1113 TABLE_SET_ALIGN_PERCENT
, 100,
1114 TABLE_UINT64
, cache_size
,
1115 TABLE_STRING
, "Cache Hits:",
1116 TABLE_UINT64
, n_cache_hit
,
1117 TABLE_STRING
, "Cache Misses:",
1118 TABLE_UINT64
, n_cache_miss
,
1119 TABLE_EMPTY
, TABLE_EMPTY
,
1120 TABLE_STRING
, "DNSSEC Verdicts",
1121 TABLE_SET_COLOR
, ansi_highlight(),
1122 TABLE_SET_ALIGN_PERCENT
, 0,
1124 TABLE_STRING
, "Secure:",
1125 TABLE_SET_ALIGN_PERCENT
, 100,
1126 TABLE_UINT64
, n_dnssec_secure
,
1127 TABLE_STRING
, "Insecure:",
1128 TABLE_UINT64
, n_dnssec_insecure
,
1129 TABLE_STRING
, "Bogus:",
1130 TABLE_UINT64
, n_dnssec_bogus
,
1131 TABLE_STRING
, "Indeterminate:",
1132 TABLE_UINT64
, n_dnssec_indeterminate
);
1134 table_log_add_error(r
);
1136 r
= table_print(table
, NULL
);
1138 return table_log_print_error(r
);
1143 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1144 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1145 sd_bus
*bus
= userdata
;
1148 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetStatistics", &error
, NULL
, NULL
);
1150 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1155 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1156 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1157 sd_bus
*bus
= userdata
;
1160 r
= bus_call_method(bus
, bus_resolve_mgr
, "FlushCaches", &error
, NULL
, NULL
);
1162 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1167 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1168 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1169 sd_bus
*bus
= userdata
;
1172 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetServerFeatures", &error
, NULL
, NULL
);
1174 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1179 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, bool extended
, char **ret
) {
1180 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1181 _cleanup_free_
char *pretty
= NULL
;
1182 int ifindex
, family
, r
, k
;
1183 union in_addr_union a
;
1184 const char *name
= NULL
;
1190 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? (extended
? "iiayqs" : "iiay") : (extended
? "iayqs" : "iay"));
1195 r
= sd_bus_message_read(m
, "i", &ifindex
);
1200 k
= bus_message_read_in_addr_auto(m
, &error
, &family
, &a
);
1201 if (k
< 0 && !sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
))
1205 r
= sd_bus_message_read(m
, "q", &port
);
1209 r
= sd_bus_message_read(m
, "s", &name
);
1214 r
= sd_bus_message_exit_container(m
);
1219 log_debug("Invalid DNS server, ignoring: %s", bus_error_message(&error
, k
));
1224 if (with_ifindex
&& ifindex
!= 0) {
1225 /* only show the global ones here */
1230 r
= in_addr_port_ifindex_name_to_string(family
, &a
, port
, ifindex
, name
, &pretty
);
1234 *ret
= TAKE_PTR(pretty
);
1239 static int map_link_dns_servers_internal(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
, bool extended
) {
1240 char ***l
= userdata
;
1248 r
= sd_bus_message_enter_container(m
, 'a', extended
? "(iayqs)" : "(iay)");
1253 _cleanup_free_
char *pretty
= NULL
;
1255 r
= read_dns_server_one(m
, false, extended
, &pretty
);
1261 if (isempty(pretty
))
1264 r
= strv_consume(l
, TAKE_PTR(pretty
));
1269 r
= sd_bus_message_exit_container(m
);
1276 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1277 return map_link_dns_servers_internal(bus
, member
, m
, error
, userdata
, false);
1280 static int map_link_dns_servers_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1281 return map_link_dns_servers_internal(bus
, member
, m
, error
, userdata
, true);
1284 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1288 return read_dns_server_one(m
, false, false, userdata
);
1291 static int map_link_current_dns_server_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1295 return read_dns_server_one(m
, false, true, userdata
);
1298 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1299 _cleanup_free_
char *str
= NULL
;
1300 int ifindex
, route_only
, r
;
1307 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1309 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1313 if (with_ifindex
&& ifindex
!= 0) {
1314 /* only show the global ones here */
1320 str
= strjoin("~", domain
);
1322 str
= strdup(domain
);
1326 *ret
= TAKE_PTR(str
);
1331 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1332 char ***l
= userdata
;
1340 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1345 _cleanup_free_
char *pretty
= NULL
;
1347 r
= read_domain_one(m
, false, &pretty
);
1353 if (isempty(pretty
))
1356 r
= strv_consume(l
, TAKE_PTR(pretty
));
1361 r
= sd_bus_message_exit_container(m
);
1370 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1371 const unsigned indent
= strlen("Global: "); /* Use the same indentation everywhere to make things nice */
1375 printf("%s%nLink %i (%s)%n%s:", ansi_highlight(), &pos1
, ifindex
, ifname
, &pos2
, ansi_normal());
1377 printf("%s%nGlobal%n%s:", ansi_highlight(), &pos1
, &pos2
, ansi_normal());
1379 size_t cols
= columns(), position
= pos2
- pos1
+ 2;
1382 STRV_FOREACH(i
, p
) {
1383 size_t our_len
= utf8_console_width(*i
); /* This returns -1 on invalid utf-8 (which shouldn't happen).
1384 * If that happens, we'll just print one item per line. */
1386 if (position
<= indent
|| size_add(size_add(position
, 1), our_len
) < cols
) {
1388 position
= size_add(size_add(position
, 1), our_len
);
1390 printf("\n%*s%s", indent
, "", *i
);
1391 position
= size_add(our_len
, indent
);
1400 static int status_print_strv_global(char **p
) {
1401 return status_print_strv_ifindex(0, NULL
, p
);
1404 typedef struct LinkInfo
{
1405 uint64_t scopes_mask
;
1408 const char *dns_over_tls
;
1411 char *current_dns_ex
;
1416 bool dnssec_supported
;
1420 typedef struct GlobalInfo
{
1422 char *current_dns_ex
;
1425 char **fallback_dns
;
1426 char **fallback_dns_ex
;
1431 const char *dns_over_tls
;
1433 const char *resolv_conf_mode
;
1434 bool dnssec_supported
;
1437 static void link_info_clear(LinkInfo
*p
) {
1438 free(p
->current_dns
);
1439 free(p
->current_dns_ex
);
1441 strv_free(p
->dns_ex
);
1442 strv_free(p
->domains
);
1446 static void global_info_clear(GlobalInfo
*p
) {
1447 free(p
->current_dns
);
1448 free(p
->current_dns_ex
);
1450 strv_free(p
->dns_ex
);
1451 strv_free(p
->fallback_dns
);
1452 strv_free(p
->fallback_dns_ex
);
1453 strv_free(p
->domains
);
1457 static int dump_list(Table
*table
, const char *prefix
, char * const *l
) {
1460 if (strv_isempty(l
))
1463 r
= table_add_many(table
,
1464 TABLE_STRING
, prefix
,
1465 TABLE_STRV_WRAPPED
, l
);
1467 return table_log_add_error(r
);
1472 static int strv_extend_extended_bool(char ***strv
, const char *name
, const char *value
) {
1476 r
= parse_boolean(value
);
1478 return strv_extendf(strv
, "%s%s", plus_minus(r
), name
);
1481 return strv_extendf(strv
, "%s=%s", name
, value
?: "???");
1484 static char** link_protocol_status(const LinkInfo
*info
) {
1485 _cleanup_strv_free_
char **s
= NULL
;
1487 if (strv_extendf(&s
, "%sDefaultRoute", plus_minus(info
->default_route
)) < 0)
1490 if (strv_extend_extended_bool(&s
, "LLMNR", info
->llmnr
) < 0)
1493 if (strv_extend_extended_bool(&s
, "mDNS", info
->mdns
) < 0)
1496 if (strv_extend_extended_bool(&s
, "DNSOverTLS", info
->dns_over_tls
) < 0)
1499 if (strv_extendf(&s
, "DNSSEC=%s/%s",
1500 info
->dnssec
?: "???",
1501 info
->dnssec_supported
? "supported" : "unsupported") < 0)
1507 static char** global_protocol_status(const GlobalInfo
*info
) {
1508 _cleanup_strv_free_
char **s
= NULL
;
1510 if (strv_extend_extended_bool(&s
, "LLMNR", info
->llmnr
) < 0)
1513 if (strv_extend_extended_bool(&s
, "mDNS", info
->mdns
) < 0)
1516 if (strv_extend_extended_bool(&s
, "DNSOverTLS", info
->dns_over_tls
) < 0)
1519 if (strv_extendf(&s
, "DNSSEC=%s/%s",
1520 info
->dnssec
?: "???",
1521 info
->dnssec_supported
? "supported" : "unsupported") < 0)
1527 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1528 static const struct bus_properties_map property_map
[] = {
1529 { "ScopesMask", "t", NULL
, offsetof(LinkInfo
, scopes_mask
) },
1530 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(LinkInfo
, dns
) },
1531 { "DNSEx", "a(iayqs)", map_link_dns_servers_ex
, offsetof(LinkInfo
, dns_ex
) },
1532 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(LinkInfo
, current_dns
) },
1533 { "CurrentDNSServerEx", "(iayqs)", map_link_current_dns_server_ex
, offsetof(LinkInfo
, current_dns_ex
) },
1534 { "Domains", "a(sb)", map_link_domains
, offsetof(LinkInfo
, domains
) },
1535 { "DefaultRoute", "b", NULL
, offsetof(LinkInfo
, default_route
) },
1536 { "LLMNR", "s", NULL
, offsetof(LinkInfo
, llmnr
) },
1537 { "MulticastDNS", "s", NULL
, offsetof(LinkInfo
, mdns
) },
1538 { "DNSOverTLS", "s", NULL
, offsetof(LinkInfo
, dns_over_tls
) },
1539 { "DNSSEC", "s", NULL
, offsetof(LinkInfo
, dnssec
) },
1540 { "DNSSECNegativeTrustAnchors", "as", bus_map_strv_sort
, offsetof(LinkInfo
, ntas
) },
1541 { "DNSSECSupported", "b", NULL
, offsetof(LinkInfo
, dnssec_supported
) },
1544 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1545 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1546 _cleanup_(link_info_clear
) LinkInfo link_info
= {};
1547 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1548 _cleanup_free_
char *p
= NULL
;
1549 char ifi
[DECIMAL_STR_MAX(int)], ifname
[IF_NAMESIZE
+ 1] = "";
1553 assert(ifindex
> 0);
1556 if (!format_ifname(ifindex
, ifname
))
1557 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1562 xsprintf(ifi
, "%i", ifindex
);
1563 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1567 r
= bus_map_all_properties(bus
,
1568 "org.freedesktop.resolve1",
1571 BUS_MAP_BOOLEAN_AS_BOOL
,
1576 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1578 (void) pager_open(arg_pager_flags
);
1580 if (mode
== STATUS_DNS
)
1581 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns_ex
?: link_info
.dns
);
1583 if (mode
== STATUS_DOMAIN
)
1584 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1586 if (mode
== STATUS_NTA
)
1587 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1589 if (mode
== STATUS_DEFAULT_ROUTE
) {
1590 printf("%sLink %i (%s)%s: %s\n",
1591 ansi_highlight(), ifindex
, name
, ansi_normal(),
1592 yes_no(link_info
.default_route
));
1597 if (mode
== STATUS_LLMNR
) {
1598 printf("%sLink %i (%s)%s: %s\n",
1599 ansi_highlight(), ifindex
, name
, ansi_normal(),
1600 strna(link_info
.llmnr
));
1605 if (mode
== STATUS_MDNS
) {
1606 printf("%sLink %i (%s)%s: %s\n",
1607 ansi_highlight(), ifindex
, name
, ansi_normal(),
1608 strna(link_info
.mdns
));
1613 if (mode
== STATUS_PRIVATE
) {
1614 printf("%sLink %i (%s)%s: %s\n",
1615 ansi_highlight(), ifindex
, name
, ansi_normal(),
1616 strna(link_info
.dns_over_tls
));
1621 if (mode
== STATUS_DNSSEC
) {
1622 printf("%sLink %i (%s)%s: %s\n",
1623 ansi_highlight(), ifindex
, name
, ansi_normal(),
1624 strna(link_info
.dnssec
));
1629 if (empty_line
&& *empty_line
)
1630 fputc('\n', stdout
);
1632 printf("%sLink %i (%s)%s\n",
1633 ansi_highlight(), ifindex
, name
, ansi_normal());
1635 table
= table_new("key", "value");
1639 table_set_header(table
, false);
1641 r
= table_add_many(table
,
1642 TABLE_STRING
, "Current Scopes:",
1643 TABLE_SET_ALIGN_PERCENT
, 100);
1645 return table_log_add_error(r
);
1647 if (link_info
.scopes_mask
== 0)
1648 r
= table_add_cell(table
, NULL
, TABLE_STRING
, "none");
1650 _cleanup_free_
char *buf
= NULL
;
1653 if (asprintf(&buf
, "%s%s%s%s%s",
1654 link_info
.scopes_mask
& SD_RESOLVED_DNS
? "DNS " : "",
1655 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? "LLMNR/IPv4 " : "",
1656 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? "LLMNR/IPv6 " : "",
1657 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? "mDNS/IPv4 " : "",
1658 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? "mDNS/IPv6 " : "") < 0)
1663 buf
[len
- 1] = '\0';
1665 r
= table_add_cell(table
, NULL
, TABLE_STRING
, buf
);
1668 return table_log_add_error(r
);
1670 _cleanup_strv_free_
char **pstatus
= link_protocol_status(&link_info
);
1674 r
= table_add_many(table
,
1675 TABLE_STRING
, "Protocols:",
1676 TABLE_STRV_WRAPPED
, pstatus
);
1678 return table_log_add_error(r
);
1680 if (link_info
.current_dns
) {
1681 r
= table_add_many(table
,
1682 TABLE_STRING
, "Current DNS Server:",
1683 TABLE_STRING
, link_info
.current_dns_ex
?: link_info
.current_dns
);
1685 return table_log_add_error(r
);
1688 r
= dump_list(table
, "DNS Servers:", link_info
.dns_ex
?: link_info
.dns
);
1692 r
= dump_list(table
, "DNS Domain:", link_info
.domains
);
1696 r
= table_print(table
, NULL
);
1698 return table_log_print_error(r
);
1706 static int map_global_dns_servers_internal(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
, bool extended
) {
1707 char ***l
= userdata
;
1715 r
= sd_bus_message_enter_container(m
, 'a', extended
? "(iiayqs)" : "(iiay)");
1720 _cleanup_free_
char *pretty
= NULL
;
1722 r
= read_dns_server_one(m
, true, extended
, &pretty
);
1728 if (isempty(pretty
))
1731 r
= strv_consume(l
, TAKE_PTR(pretty
));
1736 r
= sd_bus_message_exit_container(m
);
1743 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1744 return map_global_dns_servers_internal(bus
, member
, m
, error
, userdata
, false);
1747 static int map_global_dns_servers_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1748 return map_global_dns_servers_internal(bus
, member
, m
, error
, userdata
, true);
1751 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1755 return read_dns_server_one(m
, true, false, userdata
);
1758 static int map_global_current_dns_server_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1762 return read_dns_server_one(m
, true, true, userdata
);
1765 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1766 char ***l
= userdata
;
1774 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1779 _cleanup_free_
char *pretty
= NULL
;
1781 r
= read_domain_one(m
, true, &pretty
);
1787 if (isempty(pretty
))
1790 r
= strv_consume(l
, TAKE_PTR(pretty
));
1795 r
= sd_bus_message_exit_container(m
);
1804 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1805 static const struct bus_properties_map property_map
[] = {
1806 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(GlobalInfo
, dns
) },
1807 { "DNSEx", "a(iiayqs)", map_global_dns_servers_ex
, offsetof(GlobalInfo
, dns_ex
) },
1808 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(GlobalInfo
, fallback_dns
) },
1809 { "FallbackDNSEx", "a(iiayqs)", map_global_dns_servers_ex
, offsetof(GlobalInfo
, fallback_dns_ex
) },
1810 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(GlobalInfo
, current_dns
) },
1811 { "CurrentDNSServerEx", "(iiayqs)", map_global_current_dns_server_ex
, offsetof(GlobalInfo
, current_dns_ex
) },
1812 { "Domains", "a(isb)", map_global_domains
, offsetof(GlobalInfo
, domains
) },
1813 { "DNSSECNegativeTrustAnchors", "as", bus_map_strv_sort
, offsetof(GlobalInfo
, ntas
) },
1814 { "LLMNR", "s", NULL
, offsetof(GlobalInfo
, llmnr
) },
1815 { "MulticastDNS", "s", NULL
, offsetof(GlobalInfo
, mdns
) },
1816 { "DNSOverTLS", "s", NULL
, offsetof(GlobalInfo
, dns_over_tls
) },
1817 { "DNSSEC", "s", NULL
, offsetof(GlobalInfo
, dnssec
) },
1818 { "DNSSECSupported", "b", NULL
, offsetof(GlobalInfo
, dnssec_supported
) },
1819 { "ResolvConfMode", "s", NULL
, offsetof(GlobalInfo
, resolv_conf_mode
) },
1822 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1823 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1824 _cleanup_(global_info_clear
) GlobalInfo global_info
= {};
1825 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1831 r
= bus_map_all_properties(bus
,
1832 "org.freedesktop.resolve1",
1833 "/org/freedesktop/resolve1",
1835 BUS_MAP_BOOLEAN_AS_BOOL
,
1840 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1842 (void) pager_open(arg_pager_flags
);
1844 if (mode
== STATUS_DNS
)
1845 return status_print_strv_global(global_info
.dns_ex
?: global_info
.dns
);
1847 if (mode
== STATUS_DOMAIN
)
1848 return status_print_strv_global(global_info
.domains
);
1850 if (mode
== STATUS_NTA
)
1851 return status_print_strv_global(global_info
.ntas
);
1853 if (mode
== STATUS_LLMNR
) {
1854 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1855 strna(global_info
.llmnr
));
1860 if (mode
== STATUS_MDNS
) {
1861 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1862 strna(global_info
.mdns
));
1867 if (mode
== STATUS_PRIVATE
) {
1868 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1869 strna(global_info
.dns_over_tls
));
1874 if (mode
== STATUS_DNSSEC
) {
1875 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1876 strna(global_info
.dnssec
));
1881 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1883 table
= table_new("key", "value");
1887 table_set_header(table
, false);
1889 _cleanup_strv_free_
char **pstatus
= global_protocol_status(&global_info
);
1893 r
= table_add_many(table
,
1894 TABLE_STRING
, "Protocols:",
1895 TABLE_SET_ALIGN_PERCENT
, 100,
1896 TABLE_STRV_WRAPPED
, pstatus
);
1898 return table_log_add_error(r
);
1900 if (global_info
.resolv_conf_mode
) {
1901 r
= table_add_many(table
,
1902 TABLE_STRING
, "resolv.conf mode:",
1903 TABLE_STRING
, global_info
.resolv_conf_mode
);
1905 return table_log_add_error(r
);
1908 if (global_info
.current_dns
) {
1909 r
= table_add_many(table
,
1910 TABLE_STRING
, "Current DNS Server:",
1911 TABLE_STRING
, global_info
.current_dns_ex
?: global_info
.current_dns
);
1913 return table_log_add_error(r
);
1916 r
= dump_list(table
, "DNS Servers:", global_info
.dns_ex
?: global_info
.dns
);
1920 r
= dump_list(table
, "Fallback DNS Servers:", global_info
.fallback_dns_ex
?: global_info
.fallback_dns
);
1924 r
= dump_list(table
, "DNS Domain:", global_info
.domains
);
1928 r
= table_print(table
, NULL
);
1930 return table_log_print_error(r
);
1937 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1938 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1939 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1940 bool empty_line
= false;
1945 r
= status_global(bus
, mode
, &empty_line
);
1949 r
= sd_netlink_open(&rtnl
);
1951 return log_error_errno(r
, "Failed to connect to netlink: %m");
1953 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1955 return rtnl_log_create_error(r
);
1957 r
= sd_netlink_message_request_dump(req
, true);
1959 return rtnl_log_create_error(r
);
1961 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1963 return log_error_errno(r
, "Failed to enumerate links: %m");
1965 _cleanup_free_ InterfaceInfo
*infos
= NULL
;
1966 size_t n_allocated
= 0, n_infos
= 0;
1968 for (sd_netlink_message
*i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1973 r
= sd_netlink_message_get_type(i
, &type
);
1975 return rtnl_log_parse_error(r
);
1977 if (type
!= RTM_NEWLINK
)
1980 r
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1982 return rtnl_log_parse_error(r
);
1984 if (ifindex
== LOOPBACK_IFINDEX
)
1987 r
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1989 return rtnl_log_parse_error(r
);
1991 if (!GREEDY_REALLOC(infos
, n_allocated
, n_infos
+ 1))
1994 infos
[n_infos
++] = (InterfaceInfo
) { ifindex
, name
};
1997 typesafe_qsort(infos
, n_infos
, interface_info_compare
);
2000 for (size_t i
= 0; i
< n_infos
; i
++) {
2001 int q
= status_ifindex(bus
, infos
[i
].index
, infos
[i
].name
, mode
, &empty_line
);
2002 if (q
< 0 && r
>= 0)
2009 static int verb_status(int argc
, char **argv
, void *userdata
) {
2010 sd_bus
*bus
= userdata
;
2011 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
2016 bool empty_line
= false;
2018 STRV_FOREACH(ifname
, argv
+ 1) {
2021 ifindex
= resolve_interface(&rtnl
, *ifname
);
2023 log_warning_errno(ifindex
, "Failed to resolve interface \"%s\", ignoring: %m", *ifname
);
2027 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
2032 r
= status_all(bus
, STATUS_ALL
);
2037 static int call_dns(sd_bus
*bus
, char **dns
, const BusLocator
*locator
, sd_bus_error
*error
, bool extended
) {
2038 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2042 r
= bus_message_new_method_call(bus
, &req
, locator
, extended
? "SetLinkDNSEx" : "SetLinkDNS");
2044 return bus_log_create_error(r
);
2046 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2048 return bus_log_create_error(r
);
2050 r
= sd_bus_message_open_container(req
, 'a', extended
? "(iayqs)" : "(iay)");
2052 return bus_log_create_error(r
);
2054 /* If only argument is the empty string, then call SetLinkDNS() with an
2055 * empty list, which will clear the list of domains for an interface. */
2056 if (!strv_equal(dns
, STRV_MAKE("")))
2057 STRV_FOREACH(p
, dns
) {
2058 _cleanup_free_
char *name
= NULL
;
2059 struct in_addr_data data
;
2063 r
= in_addr_port_ifindex_name_from_string_auto(*p
, &data
.family
, &data
.address
, &port
, &ifindex
, &name
);
2065 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
2067 if (ifindex
!= 0 && ifindex
!= arg_ifindex
)
2068 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Invalid ifindex: %i", ifindex
);
2070 r
= sd_bus_message_open_container(req
, 'r', extended
? "iayqs" : "iay");
2072 return bus_log_create_error(r
);
2074 r
= sd_bus_message_append(req
, "i", data
.family
);
2076 return bus_log_create_error(r
);
2078 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
2080 return bus_log_create_error(r
);
2083 r
= sd_bus_message_append(req
, "q", port
);
2085 return bus_log_create_error(r
);
2087 r
= sd_bus_message_append(req
, "s", name
);
2089 return bus_log_create_error(r
);
2092 r
= sd_bus_message_close_container(req
);
2094 return bus_log_create_error(r
);
2097 r
= sd_bus_message_close_container(req
);
2099 return bus_log_create_error(r
);
2101 r
= sd_bus_call(bus
, req
, 0, error
, NULL
);
2102 if (r
< 0 && extended
&& sd_bus_error_has_name(error
, SD_BUS_ERROR_UNKNOWN_METHOD
)) {
2103 sd_bus_error_free(error
);
2104 return call_dns(bus
, dns
, locator
, error
, false);
2109 static int verb_dns(int argc
, char **argv
, void *userdata
) {
2110 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2111 sd_bus
*bus
= userdata
;
2117 r
= ifname_mangle(argv
[1]);
2122 if (arg_ifindex
<= 0)
2123 return status_all(bus
, STATUS_DNS
);
2126 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
2128 r
= call_dns(bus
, argv
+ 2, bus_resolve_mgr
, &error
, true);
2129 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2130 sd_bus_error_free(&error
);
2132 r
= call_dns(bus
, argv
+ 2, bus_network_mgr
, &error
, true);
2135 if (arg_ifindex_permissive
&&
2136 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2139 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
2145 static int call_domain(sd_bus
*bus
, char **domain
, const BusLocator
*locator
, sd_bus_error
*error
) {
2146 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2150 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDomains");
2152 return bus_log_create_error(r
);
2154 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2156 return bus_log_create_error(r
);
2158 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
2160 return bus_log_create_error(r
);
2162 /* If only argument is the empty string, then call SetLinkDomains() with an
2163 * empty list, which will clear the list of domains for an interface. */
2164 if (!strv_equal(domain
, STRV_MAKE("")))
2165 STRV_FOREACH(p
, domain
) {
2168 n
= **p
== '~' ? *p
+ 1 : *p
;
2170 r
= dns_name_is_valid(n
);
2172 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
2174 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2175 "Domain not valid: %s",
2178 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
2180 return bus_log_create_error(r
);
2183 r
= sd_bus_message_close_container(req
);
2185 return bus_log_create_error(r
);
2187 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2190 static int verb_domain(int argc
, char **argv
, void *userdata
) {
2191 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2192 sd_bus
*bus
= userdata
;
2198 r
= ifname_mangle(argv
[1]);
2203 if (arg_ifindex
<= 0)
2204 return status_all(bus
, STATUS_DOMAIN
);
2207 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
2209 r
= call_domain(bus
, argv
+ 2, bus_resolve_mgr
, &error
);
2210 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2211 sd_bus_error_free(&error
);
2213 r
= call_domain(bus
, argv
+ 2, bus_network_mgr
, &error
);
2216 if (arg_ifindex_permissive
&&
2217 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2220 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2226 static int verb_default_route(int argc
, char **argv
, void *userdata
) {
2227 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2228 sd_bus
*bus
= userdata
;
2234 r
= ifname_mangle(argv
[1]);
2239 if (arg_ifindex
<= 0)
2240 return status_all(bus
, STATUS_DEFAULT_ROUTE
);
2243 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DEFAULT_ROUTE
, NULL
);
2245 b
= parse_boolean(argv
[2]);
2247 return log_error_errno(b
, "Failed to parse boolean argument: %s", argv
[2]);
2249 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2250 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2251 sd_bus_error_free(&error
);
2253 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2256 if (arg_ifindex_permissive
&&
2257 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2260 return log_error_errno(r
, "Failed to set default route configuration: %s", bus_error_message(&error
, r
));
2266 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2267 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2268 sd_bus
*bus
= userdata
;
2274 r
= ifname_mangle(argv
[1]);
2279 if (arg_ifindex
<= 0)
2280 return status_all(bus
, STATUS_LLMNR
);
2283 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2285 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2286 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2287 sd_bus_error_free(&error
);
2289 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2292 if (arg_ifindex_permissive
&&
2293 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2296 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2302 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2303 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2304 sd_bus
*bus
= userdata
;
2310 r
= ifname_mangle(argv
[1]);
2315 if (arg_ifindex
<= 0)
2316 return status_all(bus
, STATUS_MDNS
);
2319 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2321 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkMulticastDNS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2322 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2323 sd_bus_error_free(&error
);
2325 r
= bus_call_method(
2328 "SetLinkMulticastDNS",
2331 "is", arg_ifindex
, argv
[2]);
2334 if (arg_ifindex_permissive
&&
2335 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2338 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2344 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2345 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2346 sd_bus
*bus
= userdata
;
2352 r
= ifname_mangle(argv
[1]);
2357 if (arg_ifindex
<= 0)
2358 return status_all(bus
, STATUS_PRIVATE
);
2361 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2363 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSOverTLS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2364 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2365 sd_bus_error_free(&error
);
2367 r
= bus_call_method(
2370 "SetLinkDNSOverTLS",
2373 "is", arg_ifindex
, argv
[2]);
2376 if (arg_ifindex_permissive
&&
2377 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2380 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2386 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2387 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2388 sd_bus
*bus
= userdata
;
2394 r
= ifname_mangle(argv
[1]);
2399 if (arg_ifindex
<= 0)
2400 return status_all(bus
, STATUS_DNSSEC
);
2403 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2405 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2406 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2407 sd_bus_error_free(&error
);
2409 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2412 if (arg_ifindex_permissive
&&
2413 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2416 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2422 static int call_nta(sd_bus
*bus
, char **nta
, const BusLocator
*locator
, sd_bus_error
*error
) {
2423 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2426 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDNSSECNegativeTrustAnchors");
2428 return bus_log_create_error(r
);
2430 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2432 return bus_log_create_error(r
);
2434 r
= sd_bus_message_append_strv(req
, nta
);
2436 return bus_log_create_error(r
);
2438 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2441 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2442 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2443 sd_bus
*bus
= userdata
;
2451 r
= ifname_mangle(argv
[1]);
2456 if (arg_ifindex
<= 0)
2457 return status_all(bus
, STATUS_NTA
);
2460 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2462 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2463 * with an empty list, which will clear the list of domains for an interface. */
2464 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2467 STRV_FOREACH(p
, argv
+ 2) {
2468 r
= dns_name_is_valid(*p
);
2470 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2472 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2473 "Domain not valid: %s",
2477 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_resolve_mgr
, &error
);
2478 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2479 sd_bus_error_free(&error
);
2481 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_network_mgr
, &error
);
2484 if (arg_ifindex_permissive
&&
2485 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2488 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2494 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2495 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2496 sd_bus
*bus
= userdata
;
2502 r
= ifname_mangle(argv
[1]);
2507 if (arg_ifindex
<= 0)
2508 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Interface argument required.");
2510 r
= bus_call_method(bus
, bus_resolve_mgr
, "RevertLink", &error
, NULL
, "i", arg_ifindex
);
2511 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2512 sd_bus_error_free(&error
);
2514 r
= bus_call_method(bus
, bus_network_mgr
, "RevertLinkDNS", &error
, NULL
, "i", arg_ifindex
);
2517 if (arg_ifindex_permissive
&&
2518 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2521 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2527 static int verb_log_level(int argc
, char *argv
[], void *userdata
) {
2528 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2529 sd_bus
*bus
= userdata
;
2535 _cleanup_free_
char *level
= NULL
;
2537 r
= sd_bus_get_property_string(
2539 "org.freedesktop.resolve1",
2540 "/org/freedesktop/LogControl1",
2541 "org.freedesktop.LogControl1",
2546 return log_error_errno(r
, "Failed to get log level: %s", bus_error_message(&error
, r
));
2553 r
= sd_bus_set_property(
2555 "org.freedesktop.resolve1",
2556 "/org/freedesktop/LogControl1",
2557 "org.freedesktop.LogControl1",
2563 return log_error_errno(r
, "Failed to set log level: %s", bus_error_message(&error
, r
));
2569 static void help_protocol_types(void) {
2571 puts("Known protocol types:");
2572 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2575 static void help_dns_types(void) {
2577 puts("Known DNS RR types:");
2579 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2582 static void help_dns_classes(void) {
2584 puts("Known DNS RR classes:");
2586 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2589 static int compat_help(void) {
2590 _cleanup_free_
char *link
= NULL
;
2593 r
= terminal_urlify_man("resolvectl", "1", &link
);
2597 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2598 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2599 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2600 "%1$s [OPTIONS...] --statistics\n"
2601 "%1$s [OPTIONS...] --reset-statistics\n"
2603 "%2$sResolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%3$s\n\n"
2604 " -h --help Show this help\n"
2605 " --version Show package version\n"
2606 " --no-pager Do not pipe output into a pager\n"
2607 " -4 Resolve IPv4 addresses\n"
2608 " -6 Resolve IPv6 addresses\n"
2609 " -i --interface=INTERFACE Look on interface\n"
2610 " -p --protocol=PROTO|help Look via protocol\n"
2611 " -t --type=TYPE|help Query RR with DNS type\n"
2612 " -c --class=CLASS|help Query RR with DNS class\n"
2613 " --service Resolve service (SRV)\n"
2614 " --service-address=BOOL Resolve address for services (default: yes)\n"
2615 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2616 " --openpgp Query OpenPGP public key\n"
2617 " --tlsa Query TLS public key\n"
2618 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2619 " --search=BOOL Use search domains for single-label names\n"
2621 " --raw[=payload|packet] Dump the answer as binary data\n"
2622 " --legend=BOOL Print headers and additional info (default: yes)\n"
2623 " --statistics Show resolver statistics\n"
2624 " --reset-statistics Reset resolver statistics\n"
2625 " --status Show link and server status\n"
2626 " --flush-caches Flush all local DNS caches\n"
2627 " --reset-server-features\n"
2628 " Forget learnt DNS server feature levels\n"
2629 " --set-dns=SERVER Set per-interface DNS server address\n"
2630 " --set-domain=DOMAIN Set per-interface search domain\n"
2631 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2632 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2633 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2634 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2635 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2636 " --revert Revert per-interface configuration\n"
2637 "\nSee the %4$s for details.\n",
2638 program_invocation_short_name
,
2646 static int native_help(void) {
2647 _cleanup_free_
char *link
= NULL
;
2650 r
= terminal_urlify_man("resolvectl", "1", &link
);
2654 printf("%s [OPTIONS...] COMMAND ...\n"
2656 "%sSend control commands to the network name resolution manager, or%s\n"
2657 "%sresolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%s\n"
2659 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2660 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2661 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2662 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2663 " status [LINK...] Show link and server status\n"
2664 " statistics Show resolver statistics\n"
2665 " reset-statistics Reset resolver statistics\n"
2666 " flush-caches Flush all local DNS caches\n"
2667 " reset-server-features Forget learnt DNS server feature levels\n"
2668 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2669 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2670 " default-route [LINK [BOOL]] Get/set per-interface default route flag\n"
2671 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2672 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2673 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2674 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2675 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2676 " revert LINK Revert per-interface configuration\n"
2677 " log-level [LEVEL] Get/set logging threshold for systemd-resolved\n"
2679 " -h --help Show this help\n"
2680 " --version Show package version\n"
2681 " --no-pager Do not pipe output into a pager\n"
2682 " -4 Resolve IPv4 addresses\n"
2683 " -6 Resolve IPv6 addresses\n"
2684 " -i --interface=INTERFACE Look on interface\n"
2685 " -p --protocol=PROTO|help Look via protocol\n"
2686 " -t --type=TYPE|help Query RR with DNS type\n"
2687 " -c --class=CLASS|help Query RR with DNS class\n"
2688 " --service-address=BOOL Resolve address for services (default: yes)\n"
2689 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2690 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2691 " --validate=BOOL Allow DNSSEC validation (default: yes)\n"
2692 " --synthesize=BOOL Allow synthetic response (default: yes)\n"
2693 " --cache=BOOL Allow response from cache (default: yes)\n"
2694 " --zone=BOOL Allow response from locally registered mDNS/LLMNR\n"
2695 " records (default: yes)\n"
2696 " --trust-anchor=BOOL Allow response from local trust anchor (default: yes)\n"
2697 " --network=BOOL Allow response from network (default: yes)\n"
2698 " --search=BOOL Use search domains for single-label names (default: yes)\n"
2699 " --raw[=payload|packet] Dump the answer as binary data\n"
2700 " --legend=BOOL Print headers and additional info (default: yes)\n"
2701 "\nSee the %s for details.\n",
2702 program_invocation_short_name
,
2712 static int verb_help(int argc
, char **argv
, void *userdata
) {
2713 return native_help();
2716 static int compat_parse_argv(int argc
, char *argv
[]) {
2718 ARG_VERSION
= 0x100,
2722 ARG_SERVICE_ADDRESS
,
2729 ARG_RESET_STATISTICS
,
2732 ARG_RESET_SERVER_FEATURES
,
2744 static const struct option options
[] = {
2745 { "help", no_argument
, NULL
, 'h' },
2746 { "version", no_argument
, NULL
, ARG_VERSION
},
2747 { "type", required_argument
, NULL
, 't' },
2748 { "class", required_argument
, NULL
, 'c' },
2749 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2750 { "interface", required_argument
, NULL
, 'i' },
2751 { "protocol", required_argument
, NULL
, 'p' },
2752 { "cname", required_argument
, NULL
, ARG_CNAME
},
2753 { "service", no_argument
, NULL
, ARG_SERVICE
},
2754 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2755 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2756 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2757 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2758 { "raw", optional_argument
, NULL
, ARG_RAW
},
2759 { "search", required_argument
, NULL
, ARG_SEARCH
},
2760 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2761 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2762 { "status", no_argument
, NULL
, ARG_STATUS
},
2763 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2764 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2765 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2766 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2767 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2768 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2769 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2770 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2771 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2772 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2773 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2782 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2786 return compat_help();
2792 arg_family
= AF_INET
;
2796 arg_family
= AF_INET6
;
2800 r
= ifname_mangle(optarg
);
2806 if (streq(optarg
, "help")) {
2811 r
= dns_type_from_string(optarg
);
2813 return log_error_errno(r
, "Failed to parse RR record type %s: %m", optarg
);
2815 arg_type
= (uint16_t) r
;
2816 assert((int) arg_type
== r
);
2818 arg_mode
= MODE_RESOLVE_RECORD
;
2822 if (streq(optarg
, "help")) {
2827 r
= dns_class_from_string(optarg
);
2829 return log_error_errno(r
, "Failed to parse RR record class %s: %m", optarg
);
2831 arg_class
= (uint16_t) r
;
2832 assert((int) arg_class
== r
);
2837 r
= parse_boolean_argument("--legend=", optarg
, &arg_legend
);
2843 if (streq(optarg
, "help")) {
2844 help_protocol_types();
2846 } else if (streq(optarg
, "dns"))
2847 arg_flags
|= SD_RESOLVED_DNS
;
2848 else if (streq(optarg
, "llmnr"))
2849 arg_flags
|= SD_RESOLVED_LLMNR
;
2850 else if (streq(optarg
, "llmnr-ipv4"))
2851 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2852 else if (streq(optarg
, "llmnr-ipv6"))
2853 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2854 else if (streq(optarg
, "mdns"))
2855 arg_flags
|= SD_RESOLVED_MDNS
;
2856 else if (streq(optarg
, "mdns-ipv4"))
2857 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2858 else if (streq(optarg
, "mdns-ipv6"))
2859 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2861 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2862 "Unknown protocol specifier: %s", optarg
);
2867 arg_mode
= MODE_RESOLVE_SERVICE
;
2871 arg_mode
= MODE_RESOLVE_OPENPGP
;
2875 arg_mode
= MODE_RESOLVE_TLSA
;
2876 if (!optarg
|| service_family_is_valid(optarg
))
2877 arg_service_family
= optarg
;
2879 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2880 "Unknown service family \"%s\".", optarg
);
2885 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2886 "Refusing to write binary data to tty.");
2888 if (optarg
== NULL
|| streq(optarg
, "payload"))
2889 arg_raw
= RAW_PAYLOAD
;
2890 else if (streq(optarg
, "packet"))
2891 arg_raw
= RAW_PACKET
;
2893 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2894 "Unknown --raw specifier \"%s\".",
2901 r
= parse_boolean_argument("--cname=", optarg
, NULL
);
2904 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2907 case ARG_SERVICE_ADDRESS
:
2908 r
= parse_boolean_argument("--service-address=", optarg
, NULL
);
2911 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2914 case ARG_SERVICE_TXT
:
2915 r
= parse_boolean_argument("--service-txt=", optarg
, NULL
);
2918 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2922 r
= parse_boolean_argument("--search=", optarg
, NULL
);
2925 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2928 case ARG_STATISTICS
:
2929 arg_mode
= MODE_STATISTICS
;
2932 case ARG_RESET_STATISTICS
:
2933 arg_mode
= MODE_RESET_STATISTICS
;
2936 case ARG_FLUSH_CACHES
:
2937 arg_mode
= MODE_FLUSH_CACHES
;
2940 case ARG_RESET_SERVER_FEATURES
:
2941 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2945 arg_mode
= MODE_STATUS
;
2949 arg_pager_flags
|= PAGER_DISABLE
;
2953 r
= strv_extend(&arg_set_dns
, optarg
);
2957 arg_mode
= MODE_SET_LINK
;
2960 case ARG_SET_DOMAIN
:
2961 r
= strv_extend(&arg_set_domain
, optarg
);
2965 arg_mode
= MODE_SET_LINK
;
2969 arg_set_llmnr
= optarg
;
2970 arg_mode
= MODE_SET_LINK
;
2974 arg_set_mdns
= optarg
;
2975 arg_mode
= MODE_SET_LINK
;
2978 case ARG_SET_PRIVATE
:
2979 arg_set_dns_over_tls
= optarg
;
2980 arg_mode
= MODE_SET_LINK
;
2983 case ARG_SET_DNSSEC
:
2984 arg_set_dnssec
= optarg
;
2985 arg_mode
= MODE_SET_LINK
;
2989 r
= strv_extend(&arg_set_nta
, optarg
);
2993 arg_mode
= MODE_SET_LINK
;
2996 case ARG_REVERT_LINK
:
2997 arg_mode
= MODE_REVERT_LINK
;
3004 assert_not_reached("Unhandled option");
3007 if (arg_type
== 0 && arg_class
!= 0)
3008 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3009 "--class= may only be used in conjunction with --type=.");
3011 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
)
3012 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3013 "--service and --type= may not be combined.");
3015 if (arg_type
!= 0 && arg_class
== 0)
3016 arg_class
= DNS_CLASS_IN
;
3018 if (arg_class
!= 0 && arg_type
== 0)
3019 arg_type
= DNS_TYPE_A
;
3021 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
3023 if (arg_ifindex
<= 0)
3024 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3025 "--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
3028 return 1 /* work to do */;
3031 static int native_parse_argv(int argc
, char *argv
[]) {
3033 ARG_VERSION
= 0x100,
3042 ARG_SERVICE_ADDRESS
,
3049 static const struct option options
[] = {
3050 { "help", no_argument
, NULL
, 'h' },
3051 { "version", no_argument
, NULL
, ARG_VERSION
},
3052 { "type", required_argument
, NULL
, 't' },
3053 { "class", required_argument
, NULL
, 'c' },
3054 { "legend", required_argument
, NULL
, ARG_LEGEND
},
3055 { "interface", required_argument
, NULL
, 'i' },
3056 { "protocol", required_argument
, NULL
, 'p' },
3057 { "cname", required_argument
, NULL
, ARG_CNAME
},
3058 { "validate", required_argument
, NULL
, ARG_VALIDATE
},
3059 { "synthesize", required_argument
, NULL
, ARG_SYNTHESIZE
},
3060 { "cache", required_argument
, NULL
, ARG_CACHE
},
3061 { "zone", required_argument
, NULL
, ARG_ZONE
},
3062 { "trust-anchor", required_argument
, NULL
, ARG_TRUST_ANCHOR
},
3063 { "network", required_argument
, NULL
, ARG_NETWORK
},
3064 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
3065 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
3066 { "raw", optional_argument
, NULL
, ARG_RAW
},
3067 { "search", required_argument
, NULL
, ARG_SEARCH
},
3068 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
3077 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
3081 return native_help();
3087 arg_family
= AF_INET
;
3091 arg_family
= AF_INET6
;
3095 r
= ifname_mangle(optarg
);
3101 if (streq(optarg
, "help")) {
3106 r
= dns_type_from_string(optarg
);
3108 return log_error_errno(r
, "Failed to parse RR record type %s: %m", optarg
);
3110 arg_type
= (uint16_t) r
;
3111 assert((int) arg_type
== r
);
3116 if (streq(optarg
, "help")) {
3121 r
= dns_class_from_string(optarg
);
3123 return log_error_errno(r
, "Failed to parse RR record class %s: %m", optarg
);
3125 arg_class
= (uint16_t) r
;
3126 assert((int) arg_class
== r
);
3131 r
= parse_boolean_argument("--legend=", optarg
, &arg_legend
);
3137 if (streq(optarg
, "help")) {
3138 help_protocol_types();
3140 } else if (streq(optarg
, "dns"))
3141 arg_flags
|= SD_RESOLVED_DNS
;
3142 else if (streq(optarg
, "llmnr"))
3143 arg_flags
|= SD_RESOLVED_LLMNR
;
3144 else if (streq(optarg
, "llmnr-ipv4"))
3145 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
3146 else if (streq(optarg
, "llmnr-ipv6"))
3147 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
3148 else if (streq(optarg
, "mdns"))
3149 arg_flags
|= SD_RESOLVED_MDNS
;
3150 else if (streq(optarg
, "mdns-ipv4"))
3151 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
3152 else if (streq(optarg
, "mdns-ipv6"))
3153 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
3155 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3156 "Unknown protocol specifier: %s",
3163 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
3164 "Refusing to write binary data to tty.");
3166 if (optarg
== NULL
|| streq(optarg
, "payload"))
3167 arg_raw
= RAW_PAYLOAD
;
3168 else if (streq(optarg
, "packet"))
3169 arg_raw
= RAW_PACKET
;
3171 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3172 "Unknown --raw specifier \"%s\".",
3179 r
= parse_boolean_argument("--cname=", optarg
, NULL
);
3182 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
3186 r
= parse_boolean_argument("--validate=", optarg
, NULL
);
3189 SET_FLAG(arg_flags
, SD_RESOLVED_NO_VALIDATE
, r
== 0);
3192 case ARG_SYNTHESIZE
:
3193 r
= parse_boolean_argument("--synthesize=", optarg
, NULL
);
3196 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SYNTHESIZE
, r
== 0);
3200 r
= parse_boolean_argument("--cache=", optarg
, NULL
);
3203 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CACHE
, r
== 0);
3207 r
= parse_boolean_argument("--zone=", optarg
, NULL
);
3210 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ZONE
, r
== 0);
3213 case ARG_TRUST_ANCHOR
:
3214 r
= parse_boolean_argument("--trust-anchor=", optarg
, NULL
);
3217 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TRUST_ANCHOR
, r
== 0);
3221 r
= parse_boolean_argument("--network=", optarg
, NULL
);
3224 SET_FLAG(arg_flags
, SD_RESOLVED_NO_NETWORK
, r
== 0);
3227 case ARG_SERVICE_ADDRESS
:
3228 r
= parse_boolean_argument("--service-address=", optarg
, NULL
);
3231 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
3234 case ARG_SERVICE_TXT
:
3235 r
= parse_boolean_argument("--service-txt=", optarg
, NULL
);
3238 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
3242 r
= parse_boolean_argument("--search=", optarg
, NULL
);
3245 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
3249 arg_pager_flags
|= PAGER_DISABLE
;
3256 assert_not_reached("Unhandled option");
3259 if (arg_type
== 0 && arg_class
!= 0)
3260 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3261 "--class= may only be used in conjunction with --type=.");
3263 if (arg_type
!= 0 && arg_class
== 0)
3264 arg_class
= DNS_CLASS_IN
;
3266 if (arg_class
!= 0 && arg_type
== 0)
3267 arg_type
= DNS_TYPE_A
;
3269 return 1 /* work to do */;
3272 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
3274 static const Verb verbs
[] = {
3275 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
3276 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
3277 { "query", 2, VERB_ANY
, 0, verb_query
},
3278 { "service", 2, 4, 0, verb_service
},
3279 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
3280 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
3281 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
3282 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
3283 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
3284 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
3285 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
3286 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
3287 { "default-route", VERB_ANY
, 3, 0, verb_default_route
},
3288 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
3289 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
3290 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
3291 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
3292 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
3293 { "revert", VERB_ANY
, 2, 0, verb_revert_link
},
3294 { "log-level", VERB_ANY
, 2, 0, verb_log_level
},
3298 return dispatch_verb(argc
, argv
, verbs
, bus
);
3301 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
3306 assert(num_args
== 0 || args
);
3308 num
= !!single_arg
+ num_args
+ 1;
3310 p
= fake
= newa0(char *, num
+ 1);
3311 *p
++ = (char *) verb
;
3313 *p
++ = (char *) single_arg
;
3314 for (size_t i
= 0; i
< num_args
; i
++)
3318 return native_main((int) num
, fake
, bus
);
3321 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
3325 case MODE_RESOLVE_HOST
:
3326 case MODE_RESOLVE_RECORD
:
3327 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
3329 case MODE_RESOLVE_SERVICE
:
3330 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
3332 case MODE_RESOLVE_OPENPGP
:
3333 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3335 case MODE_RESOLVE_TLSA
:
3336 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3338 case MODE_STATISTICS
:
3339 return translate("statistics", NULL
, 0, NULL
, bus
);
3341 case MODE_RESET_STATISTICS
:
3342 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3344 case MODE_FLUSH_CACHES
:
3345 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3347 case MODE_RESET_SERVER_FEATURES
:
3348 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3351 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3357 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3362 if (arg_set_domain
) {
3363 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3369 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3374 if (arg_set_llmnr
) {
3375 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3381 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3386 if (arg_set_dns_over_tls
) {
3387 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3392 if (arg_set_dnssec
) {
3393 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3400 case MODE_REVERT_LINK
:
3403 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3406 assert_not_reached("invalid mode");
3412 static int run(int argc
, char **argv
) {
3413 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
3416 setlocale(LC_ALL
, "");
3419 if (invoked_as(argv
, "resolvconf"))
3420 r
= resolvconf_parse_argv(argc
, argv
);
3421 else if (invoked_as(argv
, "systemd-resolve"))
3422 r
= compat_parse_argv(argc
, argv
);
3424 r
= native_parse_argv(argc
, argv
);
3428 r
= sd_bus_open_system(&bus
);
3430 return log_error_errno(r
, "sd_bus_open_system: %m");
3432 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3433 return compat_main(argc
, argv
, bus
);
3435 return native_main(argc
, argv
, bus
);
3438 DEFINE_MAIN_FUNCTION(run
);