1 /* SPDX-License-Identifier: LGPL-2.1+ */
8 #include "sd-netlink.h"
11 #include "alloc-util.h"
12 #include "bus-common-errors.h"
13 #include "bus-error.h"
14 #include "bus-locator.h"
15 #include "bus-map-properties.h"
16 #include "dns-domain.h"
18 #include "format-table.h"
19 #include "format-util.h"
20 #include "gcrypt-util.h"
21 #include "main-func.h"
22 #include "missing_network.h"
23 #include "netlink-util.h"
25 #include "parse-util.h"
26 #include "pretty-print.h"
27 #include "resolvconf-compat.h"
28 #include "resolvectl.h"
29 #include "resolved-def.h"
30 #include "resolved-dns-packet.h"
31 #include "socket-netlink.h"
32 #include "sort-util.h"
33 #include "stdio-util.h"
34 #include "string-table.h"
36 #include "terminal-util.h"
39 static int arg_family
= AF_UNSPEC
;
40 static int arg_ifindex
= 0;
41 static char *arg_ifname
= NULL
;
42 static uint16_t arg_type
= 0;
43 static uint16_t arg_class
= 0;
44 static bool arg_legend
= true;
45 static uint64_t arg_flags
= 0;
46 static PagerFlags arg_pager_flags
= 0;
47 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
48 static const char *arg_service_family
= NULL
;
50 typedef enum RawType
{
55 static RawType arg_raw
= RAW_NONE
;
57 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
59 char **arg_set_dns
= NULL
;
60 char **arg_set_domain
= NULL
;
61 static const char *arg_set_llmnr
= NULL
;
62 static const char *arg_set_mdns
= NULL
;
63 static const char *arg_set_dns_over_tls
= NULL
;
64 static const char *arg_set_dnssec
= NULL
;
65 static char **arg_set_nta
= NULL
;
67 STATIC_DESTRUCTOR_REGISTER(arg_ifname
, freep
);
68 STATIC_DESTRUCTOR_REGISTER(arg_set_dns
, strv_freep
);
69 STATIC_DESTRUCTOR_REGISTER(arg_set_domain
, strv_freep
);
70 STATIC_DESTRUCTOR_REGISTER(arg_set_nta
, strv_freep
);
72 typedef enum StatusMode
{
84 typedef struct InterfaceInfo
{
89 static int interface_info_compare(const InterfaceInfo
*a
, const InterfaceInfo
*b
) {
92 r
= CMP(a
->index
, b
->index
);
96 return strcmp_ptr(a
->name
, b
->name
);
99 int ifname_mangle(const char *s
) {
100 _cleanup_free_
char *iface
= NULL
;
106 dot
= strchr(s
, '.');
108 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
109 iface
= strndup(s
, dot
- s
);
116 ifi
= resolve_interface(NULL
, iface
);
118 if (ifi
== -ENODEV
&& arg_ifindex_permissive
) {
119 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
123 return log_error_errno(ifi
, "Failed to resolve interface \"%s\": %m", iface
);
126 if (arg_ifindex
> 0 && arg_ifindex
!= ifi
)
127 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Specified multiple different interfaces. Refusing.");
130 free_and_replace(arg_ifname
, iface
);
135 static void print_source(uint64_t flags
, usec_t rtt
) {
136 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
144 printf("\n%s-- Information acquired via", ansi_grey());
147 printf(" protocol%s%s%s%s%s",
148 flags
& SD_RESOLVED_DNS
? " DNS" :"",
149 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
150 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
151 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
152 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
154 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
157 "%s-- Data is authenticated: %s%s\n",
158 rtt_str
, ansi_normal(),
159 ansi_grey(), yes_no(flags
& SD_RESOLVED_AUTHENTICATED
), ansi_normal());
162 static void print_ifindex_comment(int printed_so_far
, int ifindex
) {
163 char ifname
[IF_NAMESIZE
+ 1];
168 if (!format_ifname(ifindex
, ifname
))
169 log_warning_errno(errno
, "Failed to resolve interface name for index %i, ignoring: %m", ifindex
);
171 printf("%*s%s-- link: %s%s",
172 60 > printed_so_far
? 60 - printed_so_far
: 0, " ", /* Align comment to the 60th column */
173 ansi_grey(), ifname
, ansi_normal());
176 static int resolve_host(sd_bus
*bus
, const char *name
) {
177 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
178 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
179 const char *canonical
= NULL
;
187 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
189 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveHostname");
191 return bus_log_create_error(r
);
193 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
195 return bus_log_create_error(r
);
197 ts
= now(CLOCK_MONOTONIC
);
199 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
201 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
203 ts
= now(CLOCK_MONOTONIC
) - ts
;
205 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
207 return bus_log_parse_error(r
);
209 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
210 _cleanup_free_
char *pretty
= NULL
;
211 int ifindex
, family
, k
;
215 assert_cc(sizeof(int) == sizeof(int32_t));
217 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
219 return bus_log_parse_error(r
);
221 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
223 return bus_log_parse_error(r
);
225 r
= sd_bus_message_exit_container(reply
);
227 return bus_log_parse_error(r
);
229 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
230 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
234 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
235 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
239 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
241 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
243 k
= printf("%*s%s %s%s%s",
244 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
245 ansi_highlight(), pretty
, ansi_normal());
247 print_ifindex_comment(k
, ifindex
);
253 return bus_log_parse_error(r
);
255 r
= sd_bus_message_exit_container(reply
);
257 return bus_log_parse_error(r
);
259 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
261 return bus_log_parse_error(r
);
263 if (!streq(name
, canonical
))
264 printf("%*s%s (%s)\n",
265 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
269 log_error("%s: no addresses found", name
);
273 print_source(flags
, ts
);
278 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
279 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
280 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
281 _cleanup_free_
char *pretty
= NULL
;
288 assert(IN_SET(family
, AF_INET
, AF_INET6
));
292 ifindex
= arg_ifindex
;
294 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
298 log_debug("Resolving %s.", pretty
);
300 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveAddress");
302 return bus_log_create_error(r
);
304 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
306 return bus_log_create_error(r
);
308 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
310 return bus_log_create_error(r
);
312 r
= sd_bus_message_append(req
, "t", arg_flags
);
314 return bus_log_create_error(r
);
316 ts
= now(CLOCK_MONOTONIC
);
318 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
320 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
322 ts
= now(CLOCK_MONOTONIC
) - ts
;
324 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
326 return bus_log_create_error(r
);
328 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
332 assert_cc(sizeof(int) == sizeof(int32_t));
334 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
338 r
= sd_bus_message_exit_container(reply
);
342 k
= printf("%*s%s %s%s%s",
343 (int) strlen(pretty
), c
== 0 ? pretty
: "",
345 ansi_highlight(), n
, ansi_normal());
347 print_ifindex_comment(k
, ifindex
);
353 return bus_log_parse_error(r
);
355 r
= sd_bus_message_exit_container(reply
);
357 return bus_log_parse_error(r
);
359 r
= sd_bus_message_read(reply
, "t", &flags
);
361 return bus_log_parse_error(r
);
364 log_error("%s: no names found", pretty
);
368 print_source(flags
, ts
);
373 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
374 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
375 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
378 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
382 p
->refuse_compression
= true;
384 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
388 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
390 return log_error_errno(r
, "Failed to parse RR: %m");
392 if (arg_raw
== RAW_PAYLOAD
) {
396 k
= dns_resource_record_payload(rr
, &data
);
398 return log_error_errno(k
, "Cannot dump RR: %m");
399 fwrite(data
, 1, k
, stdout
);
404 s
= dns_resource_record_to_string(rr
);
409 print_ifindex_comment(k
, ifindex
);
416 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
417 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
418 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
423 bool needs_authentication
= false;
427 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
429 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveRecord");
431 return bus_log_create_error(r
);
433 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
435 return bus_log_create_error(r
);
437 ts
= now(CLOCK_MONOTONIC
);
439 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
441 if (warn_missing
|| r
!= -ENXIO
)
442 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
446 ts
= now(CLOCK_MONOTONIC
) - ts
;
448 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
450 return bus_log_parse_error(r
);
452 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
458 assert_cc(sizeof(int) == sizeof(int32_t));
460 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
462 return bus_log_parse_error(r
);
464 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
466 return bus_log_parse_error(r
);
468 r
= sd_bus_message_exit_container(reply
);
470 return bus_log_parse_error(r
);
472 if (arg_raw
== RAW_PACKET
) {
473 uint64_t u64
= htole64(l
);
475 fwrite(&u64
, sizeof(u64
), 1, stdout
);
476 fwrite(d
, 1, l
, stdout
);
478 r
= output_rr_packet(d
, l
, ifindex
);
483 if (dns_type_needs_authentication(t
))
484 needs_authentication
= true;
489 return bus_log_parse_error(r
);
491 r
= sd_bus_message_exit_container(reply
);
493 return bus_log_parse_error(r
);
495 r
= sd_bus_message_read(reply
, "t", &flags
);
497 return bus_log_parse_error(r
);
501 log_error("%s: no records found", name
);
505 print_source(flags
, ts
);
507 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
510 fprintf(stderr
, "\n%s"
511 "WARNING: The resources shown contain cryptographic key data which could not be\n"
512 " authenticated. It is not suitable to authenticate any communication.\n"
513 " This is usually indication that DNSSEC authentication was not enabled\n"
514 " or is not available for the selected protocol or DNS servers.%s\n",
515 ansi_highlight_red(),
522 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
523 uint16_t type
= 0, class = 0;
524 const char *p
, *q
, *n
;
529 assert(startswith(name
, "dns:"));
531 /* Parse RFC 4501 dns: URIs */
541 e
= strchr(p
+ 2, '/');
546 log_warning("DNS authority specification not supported; ignoring specified authority.");
553 n
= strndupa(p
, q
- p
);
559 f
= startswith_no_case(q
, "class=");
561 _cleanup_free_
char *t
= NULL
;
565 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
566 "DNS class specified twice.");
568 e
= strchrnul(f
, ';');
569 t
= strndup(f
, e
- f
);
573 r
= dns_class_from_string(t
);
575 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
576 "Unknown DNS class %s.", t
);
588 f
= startswith_no_case(q
, "type=");
590 _cleanup_free_
char *t
= NULL
;
594 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
595 "DNS type specified twice.");
597 e
= strchrnul(f
, ';');
598 t
= strndup(f
, e
- f
);
602 r
= dns_type_from_string(t
);
604 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
605 "Unknown DNS type %s.", t
);
623 class = arg_class
?: DNS_CLASS_IN
;
625 type
= arg_type
?: DNS_TYPE_A
;
627 return resolve_record(bus
, n
, class, type
, true);
630 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
631 "Invalid DNS URI: %s", name
);
634 static int verb_query(int argc
, char **argv
, void *userdata
) {
635 sd_bus
*bus
= userdata
;
640 STRV_FOREACH(p
, argv
+ 1) {
641 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
647 STRV_FOREACH(p
, argv
+ 1) {
648 if (startswith(*p
, "dns:"))
649 q
= resolve_rfc4501(bus
, *p
);
652 union in_addr_union a
;
654 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
656 q
= resolve_address(bus
, family
, &a
, ifindex
);
658 q
= resolve_host(bus
, *p
);
667 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
668 const char *canonical_name
, *canonical_type
, *canonical_domain
;
669 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
670 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
681 name
= empty_to_null(name
);
682 type
= empty_to_null(type
);
685 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
687 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
689 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
691 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveService");
693 return bus_log_create_error(r
);
695 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
697 return bus_log_create_error(r
);
699 ts
= now(CLOCK_MONOTONIC
);
701 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
703 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
705 ts
= now(CLOCK_MONOTONIC
) - ts
;
707 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
709 return bus_log_parse_error(r
);
712 (name
? strlen(name
) + 1 : 0) +
713 (type
? strlen(type
) + 1 : 0) +
717 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
718 uint16_t priority
, weight
, port
;
719 const char *hostname
, *canonical
;
721 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
723 return bus_log_parse_error(r
);
726 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
728 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
730 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
731 (int) strlen(domain
), c
== 0 ? domain
: "",
736 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
738 return bus_log_parse_error(r
);
740 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
741 _cleanup_free_
char *pretty
= NULL
;
742 int ifindex
, family
, k
;
745 assert_cc(sizeof(int) == sizeof(int32_t));
747 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
749 return bus_log_parse_error(r
);
751 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
753 return bus_log_parse_error(r
);
755 r
= sd_bus_message_exit_container(reply
);
757 return bus_log_parse_error(r
);
759 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
760 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
764 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
765 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
769 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
771 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
773 k
= printf("%*s%s", (int) indent
, "", pretty
);
774 print_ifindex_comment(k
, ifindex
);
778 return bus_log_parse_error(r
);
780 r
= sd_bus_message_exit_container(reply
);
782 return bus_log_parse_error(r
);
784 r
= sd_bus_message_read(reply
, "s", &canonical
);
786 return bus_log_parse_error(r
);
788 if (!streq(hostname
, canonical
))
789 printf("%*s(%s)\n", (int) indent
, "", canonical
);
791 r
= sd_bus_message_exit_container(reply
);
793 return bus_log_parse_error(r
);
798 return bus_log_parse_error(r
);
800 r
= sd_bus_message_exit_container(reply
);
802 return bus_log_parse_error(r
);
804 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
806 return bus_log_parse_error(r
);
808 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
809 _cleanup_free_
char *escaped
= NULL
;
811 escaped
= cescape_length(p
, sz
);
815 printf("%*s%s\n", (int) indent
, "", escaped
);
818 return bus_log_parse_error(r
);
820 r
= sd_bus_message_exit_container(reply
);
822 return bus_log_parse_error(r
);
824 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
826 return bus_log_parse_error(r
);
828 canonical_name
= empty_to_null(canonical_name
);
829 canonical_type
= empty_to_null(canonical_type
);
831 if (!streq_ptr(name
, canonical_name
) ||
832 !streq_ptr(type
, canonical_type
) ||
833 !streq_ptr(domain
, canonical_domain
)) {
835 printf("%*s(", (int) indent
, "");
838 printf("%s/", canonical_name
);
840 printf("%s/", canonical_type
);
842 printf("%s)\n", canonical_domain
);
845 print_source(flags
, ts
);
850 static int verb_service(int argc
, char **argv
, void *userdata
) {
851 sd_bus
*bus
= userdata
;
854 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
856 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
858 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
861 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
862 const char *domain
, *full
;
864 _cleanup_free_
char *hashed
= NULL
;
869 domain
= strrchr(address
, '@');
871 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
872 "Address does not contain '@': \"%s\"", address
);
873 if (domain
== address
|| domain
[1] == '\0')
874 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
875 "Address starts or ends with '@': \"%s\"", address
);
878 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
880 return log_error_errno(r
, "Hashing failed: %m");
882 strshorten(hashed
, 56);
884 full
= strjoina(hashed
, "._openpgpkey.", domain
);
885 log_debug("Looking up \"%s\".", full
);
887 r
= resolve_record(bus
, full
,
888 arg_class
?: DNS_CLASS_IN
,
889 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
891 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
892 hashed
= mfree(hashed
);
893 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
895 return log_error_errno(r
, "Hashing failed: %m");
897 full
= strjoina(hashed
, "._openpgpkey.", domain
);
898 log_debug("Looking up \"%s\".", full
);
900 return resolve_record(bus
, full
,
901 arg_class
?: DNS_CLASS_IN
,
902 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
908 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
909 sd_bus
*bus
= userdata
;
913 STRV_FOREACH(p
, argv
+ 1) {
914 q
= resolve_openpgp(bus
, *p
);
922 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
924 uint16_t port_num
= 443;
925 _cleanup_free_
char *full
= NULL
;
931 port
= strrchr(address
, ':');
933 r
= parse_ip_port(port
+ 1, &port_num
);
935 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
937 address
= strndupa(address
, port
- address
);
940 r
= asprintf(&full
, "_%u._%s.%s",
947 log_debug("Looking up \"%s\".", full
);
949 return resolve_record(bus
, full
,
950 arg_class
?: DNS_CLASS_IN
,
951 arg_type
?: DNS_TYPE_TLSA
, true);
954 static bool service_family_is_valid(const char *s
) {
955 return STR_IN_SET(s
, "tcp", "udp", "sctp");
958 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
959 sd_bus
*bus
= userdata
;
960 char **p
, **args
= argv
+ 1;
961 const char *family
= "tcp";
964 if (service_family_is_valid(argv
[1])) {
969 STRV_FOREACH(p
, args
) {
970 q
= resolve_tlsa(bus
, family
, *p
);
978 static int show_statistics(int argc
, char **argv
, void *userdata
) {
979 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
980 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
981 _cleanup_(table_unrefp
) Table
*table
= NULL
;
982 sd_bus
*bus
= userdata
;
983 uint64_t n_current_transactions
, n_total_transactions
,
984 cache_size
, n_cache_hit
, n_cache_miss
,
985 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
986 int r
, dnssec_supported
;
990 r
= bus_get_property_trivial(bus
, bus_resolve_mgr
, "DNSSECSupported", &error
, 'b', &dnssec_supported
);
992 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
994 printf("DNSSEC supported by current servers: %s%s%s\n\n",
996 yes_no(dnssec_supported
),
999 r
= bus_get_property(bus
, bus_resolve_mgr
, "TransactionStatistics", &error
, &reply
, "(tt)");
1001 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
1003 r
= sd_bus_message_read(reply
, "(tt)",
1004 &n_current_transactions
,
1005 &n_total_transactions
);
1007 return bus_log_parse_error(r
);
1009 reply
= sd_bus_message_unref(reply
);
1011 r
= bus_get_property(bus
, bus_resolve_mgr
, "CacheStatistics", &error
, &reply
, "(ttt)");
1013 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1015 r
= sd_bus_message_read(reply
, "(ttt)",
1020 return bus_log_parse_error(r
);
1022 reply
= sd_bus_message_unref(reply
);
1024 r
= bus_get_property(bus
, bus_resolve_mgr
, "DNSSECStatistics", &error
, &reply
, "(tttt)");
1026 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1028 r
= sd_bus_message_read(reply
, "(tttt)",
1032 &n_dnssec_indeterminate
);
1034 return bus_log_parse_error(r
);
1036 table
= table_new("key", "value");
1040 table_set_header(table
, false);
1042 r
= table_add_many(table
,
1043 TABLE_STRING
, "Transactions",
1044 TABLE_SET_COLOR
, ansi_highlight(),
1046 TABLE_STRING
, "Current Transactions:",
1047 TABLE_SET_ALIGN_PERCENT
, 100,
1048 TABLE_UINT64
, n_current_transactions
,
1049 TABLE_STRING
, "Total Transactions:",
1050 TABLE_UINT64
, n_total_transactions
,
1051 TABLE_EMPTY
, TABLE_EMPTY
,
1052 TABLE_STRING
, "Cache",
1053 TABLE_SET_COLOR
, ansi_highlight(),
1054 TABLE_SET_ALIGN_PERCENT
, 0,
1056 TABLE_STRING
, "Current Cache Size:",
1057 TABLE_SET_ALIGN_PERCENT
, 100,
1058 TABLE_UINT64
, cache_size
,
1059 TABLE_STRING
, "Cache Hits:",
1060 TABLE_UINT64
, n_cache_hit
,
1061 TABLE_STRING
, "Cache Misses:",
1062 TABLE_UINT64
, n_cache_miss
,
1063 TABLE_EMPTY
, TABLE_EMPTY
,
1064 TABLE_STRING
, "DNSSEC Verdicts",
1065 TABLE_SET_COLOR
, ansi_highlight(),
1066 TABLE_SET_ALIGN_PERCENT
, 0,
1068 TABLE_STRING
, "Secure:",
1069 TABLE_SET_ALIGN_PERCENT
, 100,
1070 TABLE_UINT64
, n_dnssec_secure
,
1071 TABLE_STRING
, "Insecure:",
1072 TABLE_UINT64
, n_dnssec_insecure
,
1073 TABLE_STRING
, "Bogus:",
1074 TABLE_UINT64
, n_dnssec_bogus
,
1075 TABLE_STRING
, "Indeterminate:",
1076 TABLE_UINT64
, n_dnssec_indeterminate
);
1078 table_log_add_error(r
);
1080 r
= table_print(table
, NULL
);
1082 return log_error_errno(r
, "Failed to print table: %m");
1087 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1088 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1089 sd_bus
*bus
= userdata
;
1092 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetStatistics", &error
, NULL
, NULL
);
1094 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1099 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1100 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1101 sd_bus
*bus
= userdata
;
1104 r
= bus_call_method(bus
, bus_resolve_mgr
, "FlushCaches", &error
, NULL
, NULL
);
1106 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1111 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1112 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1113 sd_bus
*bus
= userdata
;
1116 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetServerFeatures", &error
, NULL
, NULL
);
1118 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1123 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1124 _cleanup_free_
char *pretty
= NULL
;
1125 int ifindex
, family
, r
;
1132 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? "iiay" : "iay");
1137 r
= sd_bus_message_read(m
, "i", &ifindex
);
1142 r
= sd_bus_message_read(m
, "i", &family
);
1146 r
= sd_bus_message_read_array(m
, 'y', &a
, &sz
);
1150 r
= sd_bus_message_exit_container(m
);
1154 if (with_ifindex
&& ifindex
!= 0) {
1155 /* only show the global ones here */
1160 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
1161 log_debug("Unexpected family, ignoring: %i", family
);
1167 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
1168 log_debug("Address size mismatch, ignoring.");
1174 r
= in_addr_to_string(family
, a
, &pretty
);
1178 *ret
= TAKE_PTR(pretty
);
1183 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1184 char ***l
= userdata
;
1192 r
= sd_bus_message_enter_container(m
, 'a', "(iay)");
1197 _cleanup_free_
char *pretty
= NULL
;
1199 r
= read_dns_server_one(m
, false, &pretty
);
1205 if (isempty(pretty
))
1208 r
= strv_consume(l
, TAKE_PTR(pretty
));
1213 r
= sd_bus_message_exit_container(m
);
1220 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1224 return read_dns_server_one(m
, false, userdata
);
1227 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1228 _cleanup_free_
char *str
= NULL
;
1229 int ifindex
, route_only
, r
;
1236 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1238 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1242 if (with_ifindex
&& ifindex
!= 0) {
1243 /* only show the global ones here */
1249 str
= strjoin("~", domain
);
1251 str
= strdup(domain
);
1255 *ret
= TAKE_PTR(str
);
1260 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1261 char ***l
= userdata
;
1269 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1274 _cleanup_free_
char *pretty
= NULL
;
1276 r
= read_domain_one(m
, false, &pretty
);
1282 if (isempty(pretty
))
1285 r
= strv_consume(l
, TAKE_PTR(pretty
));
1290 r
= sd_bus_message_exit_container(m
);
1297 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1300 printf("%sLink %i (%s)%s:",
1301 ansi_highlight(), ifindex
, ifname
, ansi_normal());
1312 uint64_t scopes_mask
;
1315 const char *dns_over_tls
;
1321 bool dnssec_supported
;
1325 static void link_info_clear(struct link_info
*p
) {
1326 free(p
->current_dns
);
1328 strv_free(p
->domains
);
1332 static int dump_list(Table
*table
, const char *prefix
, char * const *l
) {
1335 if (strv_isempty(l
))
1338 r
= table_add_many(table
,
1339 TABLE_STRING
, prefix
,
1342 return table_log_add_error(r
);
1347 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1348 static const struct bus_properties_map property_map
[] = {
1349 { "ScopesMask", "t", NULL
, offsetof(struct link_info
, scopes_mask
) },
1350 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(struct link_info
, dns
) },
1351 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(struct link_info
, current_dns
) },
1352 { "Domains", "a(sb)", map_link_domains
, offsetof(struct link_info
, domains
) },
1353 { "DefaultRoute", "b", NULL
, offsetof(struct link_info
, default_route
) },
1354 { "LLMNR", "s", NULL
, offsetof(struct link_info
, llmnr
) },
1355 { "MulticastDNS", "s", NULL
, offsetof(struct link_info
, mdns
) },
1356 { "DNSOverTLS", "s", NULL
, offsetof(struct link_info
, dns_over_tls
) },
1357 { "DNSSEC", "s", NULL
, offsetof(struct link_info
, dnssec
) },
1358 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct link_info
, ntas
) },
1359 { "DNSSECSupported", "b", NULL
, offsetof(struct link_info
, dnssec_supported
) },
1362 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1363 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1364 _cleanup_(link_info_clear
) struct link_info link_info
= {};
1365 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1366 _cleanup_free_
char *p
= NULL
;
1367 char ifi
[DECIMAL_STR_MAX(int)], ifname
[IF_NAMESIZE
+ 1] = "";
1371 assert(ifindex
> 0);
1374 if (!format_ifname(ifindex
, ifname
))
1375 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1380 xsprintf(ifi
, "%i", ifindex
);
1381 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1385 r
= bus_map_all_properties(bus
,
1386 "org.freedesktop.resolve1",
1389 BUS_MAP_BOOLEAN_AS_BOOL
,
1394 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1396 (void) pager_open(arg_pager_flags
);
1398 if (mode
== STATUS_DNS
)
1399 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns
);
1401 if (mode
== STATUS_DOMAIN
)
1402 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1404 if (mode
== STATUS_NTA
)
1405 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1407 if (mode
== STATUS_DEFAULT_ROUTE
) {
1408 printf("%sLink %i (%s)%s: %s\n",
1409 ansi_highlight(), ifindex
, name
, ansi_normal(),
1410 yes_no(link_info
.default_route
));
1415 if (mode
== STATUS_LLMNR
) {
1416 printf("%sLink %i (%s)%s: %s\n",
1417 ansi_highlight(), ifindex
, name
, ansi_normal(),
1418 strna(link_info
.llmnr
));
1423 if (mode
== STATUS_MDNS
) {
1424 printf("%sLink %i (%s)%s: %s\n",
1425 ansi_highlight(), ifindex
, name
, ansi_normal(),
1426 strna(link_info
.mdns
));
1431 if (mode
== STATUS_PRIVATE
) {
1432 printf("%sLink %i (%s)%s: %s\n",
1433 ansi_highlight(), ifindex
, name
, ansi_normal(),
1434 strna(link_info
.dns_over_tls
));
1439 if (mode
== STATUS_DNSSEC
) {
1440 printf("%sLink %i (%s)%s: %s\n",
1441 ansi_highlight(), ifindex
, name
, ansi_normal(),
1442 strna(link_info
.dnssec
));
1447 if (empty_line
&& *empty_line
)
1448 fputc('\n', stdout
);
1450 printf("%sLink %i (%s)%s\n",
1451 ansi_highlight(), ifindex
, name
, ansi_normal());
1453 table
= table_new("key", "value");
1457 table_set_header(table
, false);
1459 r
= table_add_many(table
,
1460 TABLE_STRING
, "Current Scopes:",
1461 TABLE_SET_ALIGN_PERCENT
, 100);
1463 return table_log_add_error(r
);
1465 if (link_info
.scopes_mask
== 0)
1466 r
= table_add_cell(table
, NULL
, TABLE_STRING
, "none");
1468 _cleanup_free_
char *buf
= NULL
;
1471 if (asprintf(&buf
, "%s%s%s%s%s",
1472 link_info
.scopes_mask
& SD_RESOLVED_DNS
? "DNS " : "",
1473 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? "LLMNR/IPv4 " : "",
1474 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? "LLMNR/IPv6 " : "",
1475 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? "mDNS/IPv4 " : "",
1476 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? "mDNS/IPv6 " : "") < 0)
1481 buf
[len
- 1] = '\0';
1483 r
= table_add_cell(table
, NULL
, TABLE_STRING
, buf
);
1486 return table_log_add_error(r
);
1488 r
= table_add_many(table
,
1489 TABLE_STRING
, "DefaultRoute setting:",
1490 TABLE_BOOLEAN
, link_info
.default_route
,
1491 TABLE_STRING
, "LLMNR setting:",
1492 TABLE_STRING
, strna(link_info
.llmnr
),
1493 TABLE_STRING
, "MulticastDNS setting:",
1494 TABLE_STRING
, strna(link_info
.mdns
),
1495 TABLE_STRING
, "DNSOverTLS setting:",
1496 TABLE_STRING
, strna(link_info
.dns_over_tls
),
1497 TABLE_STRING
, "DNSSEC setting:",
1498 TABLE_STRING
, strna(link_info
.dnssec
),
1499 TABLE_STRING
, "DNSSEC supported:",
1500 TABLE_BOOLEAN
, link_info
.dnssec_supported
);
1502 return table_log_add_error(r
);
1504 if (link_info
.current_dns
) {
1505 r
= table_add_many(table
,
1506 TABLE_STRING
, "Current DNS Server:",
1507 TABLE_STRING
, link_info
.current_dns
);
1509 return table_log_add_error(r
);
1512 r
= dump_list(table
, "DNS Servers:", link_info
.dns
);
1516 r
= dump_list(table
, "DNS Domain:", link_info
.domains
);
1520 r
= table_print(table
, NULL
);
1522 return log_error_errno(r
, "Failed to print table: %m");
1530 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1531 char ***l
= userdata
;
1539 r
= sd_bus_message_enter_container(m
, 'a', "(iiay)");
1544 _cleanup_free_
char *pretty
= NULL
;
1546 r
= read_dns_server_one(m
, true, &pretty
);
1552 if (isempty(pretty
))
1555 r
= strv_consume(l
, TAKE_PTR(pretty
));
1560 r
= sd_bus_message_exit_container(m
);
1567 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1571 return read_dns_server_one(m
, true, userdata
);
1574 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1575 char ***l
= userdata
;
1583 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1588 _cleanup_free_
char *pretty
= NULL
;
1590 r
= read_domain_one(m
, true, &pretty
);
1596 if (isempty(pretty
))
1599 r
= strv_consume(l
, TAKE_PTR(pretty
));
1604 r
= sd_bus_message_exit_container(m
);
1611 static int status_print_strv_global(char **p
) {
1614 printf("%sGlobal%s:", ansi_highlight(), ansi_normal());
1624 struct global_info
{
1627 char **fallback_dns
;
1632 const char *dns_over_tls
;
1634 bool dnssec_supported
;
1637 static void global_info_clear(struct global_info
*p
) {
1638 free(p
->current_dns
);
1640 strv_free(p
->fallback_dns
);
1641 strv_free(p
->domains
);
1645 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1646 static const struct bus_properties_map property_map
[] = {
1647 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, dns
) },
1648 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, fallback_dns
) },
1649 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(struct global_info
, current_dns
) },
1650 { "Domains", "a(isb)", map_global_domains
, offsetof(struct global_info
, domains
) },
1651 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct global_info
, ntas
) },
1652 { "LLMNR", "s", NULL
, offsetof(struct global_info
, llmnr
) },
1653 { "MulticastDNS", "s", NULL
, offsetof(struct global_info
, mdns
) },
1654 { "DNSOverTLS", "s", NULL
, offsetof(struct global_info
, dns_over_tls
) },
1655 { "DNSSEC", "s", NULL
, offsetof(struct global_info
, dnssec
) },
1656 { "DNSSECSupported", "b", NULL
, offsetof(struct global_info
, dnssec_supported
) },
1659 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1660 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1661 _cleanup_(global_info_clear
) struct global_info global_info
= {};
1662 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1668 r
= bus_map_all_properties(bus
,
1669 "org.freedesktop.resolve1",
1670 "/org/freedesktop/resolve1",
1672 BUS_MAP_BOOLEAN_AS_BOOL
,
1677 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1679 (void) pager_open(arg_pager_flags
);
1681 if (mode
== STATUS_DNS
)
1682 return status_print_strv_global(global_info
.dns
);
1684 if (mode
== STATUS_DOMAIN
)
1685 return status_print_strv_global(global_info
.domains
);
1687 if (mode
== STATUS_NTA
)
1688 return status_print_strv_global(global_info
.ntas
);
1690 if (mode
== STATUS_LLMNR
) {
1691 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1692 strna(global_info
.llmnr
));
1697 if (mode
== STATUS_MDNS
) {
1698 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1699 strna(global_info
.mdns
));
1704 if (mode
== STATUS_PRIVATE
) {
1705 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1706 strna(global_info
.dns_over_tls
));
1711 if (mode
== STATUS_DNSSEC
) {
1712 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1713 strna(global_info
.dnssec
));
1718 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1720 table
= table_new("key", "value");
1724 table_set_header(table
, false);
1726 r
= table_add_many(table
,
1727 TABLE_STRING
, "LLMNR setting:",
1728 TABLE_SET_ALIGN_PERCENT
, 100,
1729 TABLE_STRING
, strna(global_info
.llmnr
),
1730 TABLE_STRING
, "MulticastDNS setting:",
1731 TABLE_STRING
, strna(global_info
.mdns
),
1732 TABLE_STRING
, "DNSOverTLS setting:",
1733 TABLE_STRING
, strna(global_info
.dns_over_tls
),
1734 TABLE_STRING
, "DNSSEC setting:",
1735 TABLE_STRING
, strna(global_info
.dnssec
),
1736 TABLE_STRING
, "DNSSEC supported:",
1737 TABLE_BOOLEAN
, global_info
.dnssec_supported
);
1739 return table_log_add_error(r
);
1741 if (global_info
.current_dns
) {
1742 r
= table_add_many(table
,
1743 TABLE_STRING
, "Current DNS Server:",
1744 TABLE_STRING
, global_info
.current_dns
);
1746 return table_log_add_error(r
);
1749 r
= dump_list(table
, "DNS Servers:", global_info
.dns
);
1753 r
= dump_list(table
, "Fallback DNS Servers:", global_info
.fallback_dns
);
1757 r
= dump_list(table
, "DNS Domain:", global_info
.domains
);
1761 r
= table_print(table
, NULL
);
1763 return log_error_errno(r
, "Failed to print table: %m");
1770 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1771 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1772 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1773 bool empty_line
= false;
1778 r
= status_global(bus
, mode
, &empty_line
);
1782 r
= sd_netlink_open(&rtnl
);
1784 return log_error_errno(r
, "Failed to connect to netlink: %m");
1786 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1788 return rtnl_log_create_error(r
);
1790 r
= sd_netlink_message_request_dump(req
, true);
1792 return rtnl_log_create_error(r
);
1794 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1796 return log_error_errno(r
, "Failed to enumerate links: %m");
1798 _cleanup_free_ InterfaceInfo
*infos
= NULL
;
1799 size_t n_allocated
= 0, n_infos
= 0;
1801 for (sd_netlink_message
*i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1806 r
= sd_netlink_message_get_type(i
, &type
);
1808 return rtnl_log_parse_error(r
);
1810 if (type
!= RTM_NEWLINK
)
1813 r
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1815 return rtnl_log_parse_error(r
);
1817 if (ifindex
== LOOPBACK_IFINDEX
)
1820 r
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1822 return rtnl_log_parse_error(r
);
1824 if (!GREEDY_REALLOC(infos
, n_allocated
, n_infos
+ 1))
1827 infos
[n_infos
++] = (InterfaceInfo
) { ifindex
, name
};
1830 typesafe_qsort(infos
, n_infos
, interface_info_compare
);
1833 for (size_t i
= 0; i
< n_infos
; i
++) {
1834 int q
= status_ifindex(bus
, infos
[i
].index
, infos
[i
].name
, mode
, &empty_line
);
1835 if (q
< 0 && r
>= 0)
1842 static int verb_status(int argc
, char **argv
, void *userdata
) {
1843 sd_bus
*bus
= userdata
;
1844 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1849 bool empty_line
= false;
1851 STRV_FOREACH(ifname
, argv
+ 1) {
1854 ifindex
= resolve_interface(&rtnl
, *ifname
);
1856 log_warning_errno(ifindex
, "Failed to resolve interface \"%s\", ignoring: %m", *ifname
);
1860 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1865 r
= status_all(bus
, STATUS_ALL
);
1870 static int call_dns(sd_bus
*bus
, char **dns
, const BusLocator
*locator
, sd_bus_error
*error
) {
1871 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1875 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDNS");
1877 return bus_log_create_error(r
);
1879 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1881 return bus_log_create_error(r
);
1883 r
= sd_bus_message_open_container(req
, 'a', "(iay)");
1885 return bus_log_create_error(r
);
1887 /* If only argument is the empty string, then call SetLinkDNS() with an
1888 * empty list, which will clear the list of domains for an interface. */
1889 if (!strv_equal(dns
, STRV_MAKE("")))
1890 STRV_FOREACH(p
, dns
) {
1891 struct in_addr_data data
;
1893 r
= in_addr_from_string_auto(*p
, &data
.family
, &data
.address
);
1895 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
1897 r
= sd_bus_message_open_container(req
, 'r', "iay");
1899 return bus_log_create_error(r
);
1901 r
= sd_bus_message_append(req
, "i", data
.family
);
1903 return bus_log_create_error(r
);
1905 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
1907 return bus_log_create_error(r
);
1909 r
= sd_bus_message_close_container(req
);
1911 return bus_log_create_error(r
);
1914 r
= sd_bus_message_close_container(req
);
1916 return bus_log_create_error(r
);
1918 return sd_bus_call(bus
, req
, 0, error
, NULL
);
1921 static int verb_dns(int argc
, char **argv
, void *userdata
) {
1922 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1923 sd_bus
*bus
= userdata
;
1929 r
= ifname_mangle(argv
[1]);
1934 if (arg_ifindex
<= 0)
1935 return status_all(bus
, STATUS_DNS
);
1938 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
1940 r
= call_dns(bus
, argv
+ 2, bus_resolve_mgr
, &error
);
1941 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
1942 sd_bus_error_free(&error
);
1944 r
= call_dns(bus
, argv
+ 2, bus_network_mgr
, &error
);
1947 if (arg_ifindex_permissive
&&
1948 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1951 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
1957 static int call_domain(sd_bus
*bus
, char **domain
, const BusLocator
*locator
, sd_bus_error
*error
) {
1958 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1962 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDomains");
1964 return bus_log_create_error(r
);
1966 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1968 return bus_log_create_error(r
);
1970 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
1972 return bus_log_create_error(r
);
1974 /* If only argument is the empty string, then call SetLinkDomains() with an
1975 * empty list, which will clear the list of domains for an interface. */
1976 if (!strv_equal(domain
, STRV_MAKE("")))
1977 STRV_FOREACH(p
, domain
) {
1980 n
= **p
== '~' ? *p
+ 1 : *p
;
1982 r
= dns_name_is_valid(n
);
1984 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
1986 log_error("Domain not valid: %s", n
);
1990 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
1992 return bus_log_create_error(r
);
1995 r
= sd_bus_message_close_container(req
);
1997 return bus_log_create_error(r
);
1999 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2002 static int verb_domain(int argc
, char **argv
, void *userdata
) {
2003 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2004 sd_bus
*bus
= userdata
;
2010 r
= ifname_mangle(argv
[1]);
2015 if (arg_ifindex
<= 0)
2016 return status_all(bus
, STATUS_DOMAIN
);
2019 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
2021 r
= call_domain(bus
, argv
+ 2, bus_resolve_mgr
, &error
);
2022 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2023 sd_bus_error_free(&error
);
2025 r
= call_domain(bus
, argv
+ 2, bus_network_mgr
, &error
);
2028 if (arg_ifindex_permissive
&&
2029 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2032 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2038 static int verb_default_route(int argc
, char **argv
, void *userdata
) {
2039 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2040 sd_bus
*bus
= userdata
;
2046 r
= ifname_mangle(argv
[1]);
2051 if (arg_ifindex
<= 0)
2052 return status_all(bus
, STATUS_DEFAULT_ROUTE
);
2055 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DEFAULT_ROUTE
, NULL
);
2057 b
= parse_boolean(argv
[2]);
2059 return log_error_errno(b
, "Failed to parse boolean argument: %s", argv
[2]);
2061 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2062 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2063 sd_bus_error_free(&error
);
2065 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2068 if (arg_ifindex_permissive
&&
2069 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2072 return log_error_errno(r
, "Failed to set default route configuration: %s", bus_error_message(&error
, r
));
2078 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2079 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2080 sd_bus
*bus
= userdata
;
2086 r
= ifname_mangle(argv
[1]);
2091 if (arg_ifindex
<= 0)
2092 return status_all(bus
, STATUS_LLMNR
);
2095 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2097 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2098 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2099 sd_bus_error_free(&error
);
2101 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2104 if (arg_ifindex_permissive
&&
2105 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2108 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2114 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2115 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2116 sd_bus
*bus
= userdata
;
2122 r
= ifname_mangle(argv
[1]);
2127 if (arg_ifindex
<= 0)
2128 return status_all(bus
, STATUS_MDNS
);
2131 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2133 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkMulticastDNS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2134 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2135 sd_bus_error_free(&error
);
2137 r
= bus_call_method(
2140 "SetLinkMulticastDNS",
2143 "is", arg_ifindex
, argv
[2]);
2146 if (arg_ifindex_permissive
&&
2147 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2150 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2156 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2157 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2158 sd_bus
*bus
= userdata
;
2164 r
= ifname_mangle(argv
[1]);
2169 if (arg_ifindex
<= 0)
2170 return status_all(bus
, STATUS_PRIVATE
);
2173 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2175 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSOverTLS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2176 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2177 sd_bus_error_free(&error
);
2179 r
= bus_call_method(
2182 "SetLinkDNSOverTLS",
2185 "is", arg_ifindex
, argv
[2]);
2188 if (arg_ifindex_permissive
&&
2189 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2192 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2198 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2199 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2200 sd_bus
*bus
= userdata
;
2206 r
= ifname_mangle(argv
[1]);
2211 if (arg_ifindex
<= 0)
2212 return status_all(bus
, STATUS_DNSSEC
);
2215 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2217 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2218 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2219 sd_bus_error_free(&error
);
2221 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2224 if (arg_ifindex_permissive
&&
2225 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2228 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2234 static int call_nta(sd_bus
*bus
, char **nta
, const BusLocator
*locator
, sd_bus_error
*error
) {
2235 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2238 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDNSSECNegativeTrustAnchors");
2240 return bus_log_create_error(r
);
2242 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2244 return bus_log_create_error(r
);
2246 r
= sd_bus_message_append_strv(req
, nta
);
2248 return bus_log_create_error(r
);
2250 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2253 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2254 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2255 sd_bus
*bus
= userdata
;
2263 r
= ifname_mangle(argv
[1]);
2268 if (arg_ifindex
<= 0)
2269 return status_all(bus
, STATUS_NTA
);
2272 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2274 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2275 * with an empty list, which will clear the list of domains for an interface. */
2276 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2279 STRV_FOREACH(p
, argv
+ 2) {
2280 r
= dns_name_is_valid(*p
);
2282 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2284 log_error("Domain not valid: %s", *p
);
2289 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_resolve_mgr
, &error
);
2290 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2291 sd_bus_error_free(&error
);
2293 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_network_mgr
, &error
);
2296 if (arg_ifindex_permissive
&&
2297 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2300 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2306 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2307 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2308 sd_bus
*bus
= userdata
;
2314 r
= ifname_mangle(argv
[1]);
2319 if (arg_ifindex
<= 0)
2320 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Interface argument required.");
2322 r
= bus_call_method(bus
, bus_resolve_mgr
, "RevertLink", &error
, NULL
, "i", arg_ifindex
);
2323 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2324 sd_bus_error_free(&error
);
2326 r
= bus_call_method(bus
, bus_network_mgr
, "RevertLinkDNS", &error
, NULL
, "i", arg_ifindex
);
2329 if (arg_ifindex_permissive
&&
2330 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2333 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2339 static int verb_log_level(int argc
, char *argv
[], void *userdata
) {
2340 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2341 sd_bus
*bus
= userdata
;
2347 _cleanup_free_
char *level
= NULL
;
2349 r
= sd_bus_get_property_string(
2351 "org.freedesktop.resolve1",
2352 "/org/freedesktop/LogControl1",
2353 "org.freedesktop.LogControl1",
2358 return log_error_errno(r
, "Failed to get log level: %s", bus_error_message(&error
, r
));
2365 r
= sd_bus_set_property(
2367 "org.freedesktop.resolve1",
2368 "/org/freedesktop/LogControl1",
2369 "org.freedesktop.LogControl1",
2375 return log_error_errno(r
, "Failed to set log level: %s", bus_error_message(&error
, r
));
2381 static void help_protocol_types(void) {
2383 puts("Known protocol types:");
2384 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2387 static void help_dns_types(void) {
2389 puts("Known DNS RR types:");
2391 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2394 static void help_dns_classes(void) {
2396 puts("Known DNS RR classes:");
2398 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2401 static int compat_help(void) {
2402 _cleanup_free_
char *link
= NULL
;
2405 r
= terminal_urlify_man("resolvectl", "1", &link
);
2409 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2410 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2411 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2412 "%1$s [OPTIONS...] --statistics\n"
2413 "%1$s [OPTIONS...] --reset-statistics\n"
2415 "%2$sResolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%3$s\n\n"
2416 " -h --help Show this help\n"
2417 " --version Show package version\n"
2418 " --no-pager Do not pipe output into a pager\n"
2419 " -4 Resolve IPv4 addresses\n"
2420 " -6 Resolve IPv6 addresses\n"
2421 " -i --interface=INTERFACE Look on interface\n"
2422 " -p --protocol=PROTO|help Look via protocol\n"
2423 " -t --type=TYPE|help Query RR with DNS type\n"
2424 " -c --class=CLASS|help Query RR with DNS class\n"
2425 " --service Resolve service (SRV)\n"
2426 " --service-address=BOOL Resolve address for services (default: yes)\n"
2427 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2428 " --openpgp Query OpenPGP public key\n"
2429 " --tlsa Query TLS public key\n"
2430 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2431 " --search=BOOL Use search domains for single-label names\n"
2433 " --raw[=payload|packet] Dump the answer as binary data\n"
2434 " --legend=BOOL Print headers and additional info (default: yes)\n"
2435 " --statistics Show resolver statistics\n"
2436 " --reset-statistics Reset resolver statistics\n"
2437 " --status Show link and server status\n"
2438 " --flush-caches Flush all local DNS caches\n"
2439 " --reset-server-features\n"
2440 " Forget learnt DNS server feature levels\n"
2441 " --set-dns=SERVER Set per-interface DNS server address\n"
2442 " --set-domain=DOMAIN Set per-interface search domain\n"
2443 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2444 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2445 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2446 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2447 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2448 " --revert Revert per-interface configuration\n"
2449 "\nSee the %4$s for details.\n"
2450 , program_invocation_short_name
2459 static int native_help(void) {
2460 _cleanup_free_
char *link
= NULL
;
2463 r
= terminal_urlify_man("resolvectl", "1", &link
);
2467 printf("%s [OPTIONS...] COMMAND ...\n"
2469 "%sSend control commands to the network name resolution manager, or%s\n"
2470 "%sresolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%s\n"
2472 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2473 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2474 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2475 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2476 " status [LINK...] Show link and server status\n"
2477 " statistics Show resolver statistics\n"
2478 " reset-statistics Reset resolver statistics\n"
2479 " flush-caches Flush all local DNS caches\n"
2480 " reset-server-features Forget learnt DNS server feature levels\n"
2481 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2482 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2483 " default-route [LINK [BOOL]] Get/set per-interface default route flag\n"
2484 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2485 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2486 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2487 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2488 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2489 " revert LINK Revert per-interface configuration\n"
2491 " -h --help Show this help\n"
2492 " --version Show package version\n"
2493 " --no-pager Do not pipe output into a pager\n"
2494 " -4 Resolve IPv4 addresses\n"
2495 " -6 Resolve IPv6 addresses\n"
2496 " -i --interface=INTERFACE Look on interface\n"
2497 " -p --protocol=PROTO|help Look via protocol\n"
2498 " -t --type=TYPE|help Query RR with DNS type\n"
2499 " -c --class=CLASS|help Query RR with DNS class\n"
2500 " --service-address=BOOL Resolve address for services (default: yes)\n"
2501 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2502 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2503 " --search=BOOL Use search domains for single-label names\n"
2505 " --raw[=payload|packet] Dump the answer as binary data\n"
2506 " --legend=BOOL Print headers and additional info (default: yes)\n"
2507 "\nSee the %s for details.\n"
2508 , program_invocation_short_name
2519 static int verb_help(int argc
, char **argv
, void *userdata
) {
2520 return native_help();
2523 static int compat_parse_argv(int argc
, char *argv
[]) {
2525 ARG_VERSION
= 0x100,
2529 ARG_SERVICE_ADDRESS
,
2536 ARG_RESET_STATISTICS
,
2539 ARG_RESET_SERVER_FEATURES
,
2551 static const struct option options
[] = {
2552 { "help", no_argument
, NULL
, 'h' },
2553 { "version", no_argument
, NULL
, ARG_VERSION
},
2554 { "type", required_argument
, NULL
, 't' },
2555 { "class", required_argument
, NULL
, 'c' },
2556 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2557 { "interface", required_argument
, NULL
, 'i' },
2558 { "protocol", required_argument
, NULL
, 'p' },
2559 { "cname", required_argument
, NULL
, ARG_CNAME
},
2560 { "service", no_argument
, NULL
, ARG_SERVICE
},
2561 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2562 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2563 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2564 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2565 { "raw", optional_argument
, NULL
, ARG_RAW
},
2566 { "search", required_argument
, NULL
, ARG_SEARCH
},
2567 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2568 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2569 { "status", no_argument
, NULL
, ARG_STATUS
},
2570 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2571 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2572 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2573 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2574 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2575 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2576 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2577 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2578 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2579 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2580 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2589 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2593 return compat_help();
2599 arg_family
= AF_INET
;
2603 arg_family
= AF_INET6
;
2607 r
= ifname_mangle(optarg
);
2613 if (streq(optarg
, "help")) {
2618 r
= dns_type_from_string(optarg
);
2620 log_error("Failed to parse RR record type %s", optarg
);
2623 arg_type
= (uint16_t) r
;
2624 assert((int) arg_type
== r
);
2626 arg_mode
= MODE_RESOLVE_RECORD
;
2630 if (streq(optarg
, "help")) {
2635 r
= dns_class_from_string(optarg
);
2637 log_error("Failed to parse RR record class %s", optarg
);
2640 arg_class
= (uint16_t) r
;
2641 assert((int) arg_class
== r
);
2646 r
= parse_boolean(optarg
);
2648 return log_error_errno(r
, "Failed to parse --legend= argument");
2654 if (streq(optarg
, "help")) {
2655 help_protocol_types();
2657 } else if (streq(optarg
, "dns"))
2658 arg_flags
|= SD_RESOLVED_DNS
;
2659 else if (streq(optarg
, "llmnr"))
2660 arg_flags
|= SD_RESOLVED_LLMNR
;
2661 else if (streq(optarg
, "llmnr-ipv4"))
2662 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2663 else if (streq(optarg
, "llmnr-ipv6"))
2664 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2665 else if (streq(optarg
, "mdns"))
2666 arg_flags
|= SD_RESOLVED_MDNS
;
2667 else if (streq(optarg
, "mdns-ipv4"))
2668 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2669 else if (streq(optarg
, "mdns-ipv6"))
2670 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2672 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2673 "Unknown protocol specifier: %s", optarg
);
2678 arg_mode
= MODE_RESOLVE_SERVICE
;
2682 arg_mode
= MODE_RESOLVE_OPENPGP
;
2686 arg_mode
= MODE_RESOLVE_TLSA
;
2687 if (!optarg
|| service_family_is_valid(optarg
))
2688 arg_service_family
= optarg
;
2690 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2691 "Unknown service family \"%s\".", optarg
);
2696 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2697 "Refusing to write binary data to tty.");
2699 if (optarg
== NULL
|| streq(optarg
, "payload"))
2700 arg_raw
= RAW_PAYLOAD
;
2701 else if (streq(optarg
, "packet"))
2702 arg_raw
= RAW_PACKET
;
2704 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2705 "Unknown --raw specifier \"%s\".",
2712 r
= parse_boolean(optarg
);
2714 return log_error_errno(r
, "Failed to parse --cname= argument.");
2715 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2718 case ARG_SERVICE_ADDRESS
:
2719 r
= parse_boolean(optarg
);
2721 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2722 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2725 case ARG_SERVICE_TXT
:
2726 r
= parse_boolean(optarg
);
2728 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2729 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2733 r
= parse_boolean(optarg
);
2735 return log_error_errno(r
, "Failed to parse --search argument.");
2736 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2739 case ARG_STATISTICS
:
2740 arg_mode
= MODE_STATISTICS
;
2743 case ARG_RESET_STATISTICS
:
2744 arg_mode
= MODE_RESET_STATISTICS
;
2747 case ARG_FLUSH_CACHES
:
2748 arg_mode
= MODE_FLUSH_CACHES
;
2751 case ARG_RESET_SERVER_FEATURES
:
2752 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2756 arg_mode
= MODE_STATUS
;
2760 arg_pager_flags
|= PAGER_DISABLE
;
2764 r
= strv_extend(&arg_set_dns
, optarg
);
2768 arg_mode
= MODE_SET_LINK
;
2771 case ARG_SET_DOMAIN
:
2772 r
= strv_extend(&arg_set_domain
, optarg
);
2776 arg_mode
= MODE_SET_LINK
;
2780 arg_set_llmnr
= optarg
;
2781 arg_mode
= MODE_SET_LINK
;
2785 arg_set_mdns
= optarg
;
2786 arg_mode
= MODE_SET_LINK
;
2789 case ARG_SET_PRIVATE
:
2790 arg_set_dns_over_tls
= optarg
;
2791 arg_mode
= MODE_SET_LINK
;
2794 case ARG_SET_DNSSEC
:
2795 arg_set_dnssec
= optarg
;
2796 arg_mode
= MODE_SET_LINK
;
2800 r
= strv_extend(&arg_set_nta
, optarg
);
2804 arg_mode
= MODE_SET_LINK
;
2807 case ARG_REVERT_LINK
:
2808 arg_mode
= MODE_REVERT_LINK
;
2815 assert_not_reached("Unhandled option");
2818 if (arg_type
== 0 && arg_class
!= 0)
2819 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2820 "--class= may only be used in conjunction with --type=.");
2822 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
)
2823 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2824 "--service and --type= may not be combined.");
2826 if (arg_type
!= 0 && arg_class
== 0)
2827 arg_class
= DNS_CLASS_IN
;
2829 if (arg_class
!= 0 && arg_type
== 0)
2830 arg_type
= DNS_TYPE_A
;
2832 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2834 if (arg_ifindex
<= 0)
2835 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2836 "--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2839 return 1 /* work to do */;
2842 static int native_parse_argv(int argc
, char *argv
[]) {
2844 ARG_VERSION
= 0x100,
2847 ARG_SERVICE_ADDRESS
,
2854 static const struct option options
[] = {
2855 { "help", no_argument
, NULL
, 'h' },
2856 { "version", no_argument
, NULL
, ARG_VERSION
},
2857 { "type", required_argument
, NULL
, 't' },
2858 { "class", required_argument
, NULL
, 'c' },
2859 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2860 { "interface", required_argument
, NULL
, 'i' },
2861 { "protocol", required_argument
, NULL
, 'p' },
2862 { "cname", required_argument
, NULL
, ARG_CNAME
},
2863 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2864 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2865 { "raw", optional_argument
, NULL
, ARG_RAW
},
2866 { "search", required_argument
, NULL
, ARG_SEARCH
},
2867 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2876 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2880 return native_help();
2886 arg_family
= AF_INET
;
2890 arg_family
= AF_INET6
;
2894 r
= ifname_mangle(optarg
);
2900 if (streq(optarg
, "help")) {
2905 r
= dns_type_from_string(optarg
);
2907 log_error("Failed to parse RR record type %s", optarg
);
2910 arg_type
= (uint16_t) r
;
2911 assert((int) arg_type
== r
);
2916 if (streq(optarg
, "help")) {
2921 r
= dns_class_from_string(optarg
);
2923 log_error("Failed to parse RR record class %s", optarg
);
2926 arg_class
= (uint16_t) r
;
2927 assert((int) arg_class
== r
);
2932 r
= parse_boolean(optarg
);
2934 return log_error_errno(r
, "Failed to parse --legend= argument");
2940 if (streq(optarg
, "help")) {
2941 help_protocol_types();
2943 } else if (streq(optarg
, "dns"))
2944 arg_flags
|= SD_RESOLVED_DNS
;
2945 else if (streq(optarg
, "llmnr"))
2946 arg_flags
|= SD_RESOLVED_LLMNR
;
2947 else if (streq(optarg
, "llmnr-ipv4"))
2948 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2949 else if (streq(optarg
, "llmnr-ipv6"))
2950 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2951 else if (streq(optarg
, "mdns"))
2952 arg_flags
|= SD_RESOLVED_MDNS
;
2953 else if (streq(optarg
, "mdns-ipv4"))
2954 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2955 else if (streq(optarg
, "mdns-ipv6"))
2956 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2958 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2959 "Unknown protocol specifier: %s",
2966 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2967 "Refusing to write binary data to tty.");
2969 if (optarg
== NULL
|| streq(optarg
, "payload"))
2970 arg_raw
= RAW_PAYLOAD
;
2971 else if (streq(optarg
, "packet"))
2972 arg_raw
= RAW_PACKET
;
2974 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2975 "Unknown --raw specifier \"%s\".",
2982 r
= parse_boolean(optarg
);
2984 return log_error_errno(r
, "Failed to parse --cname= argument.");
2985 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2988 case ARG_SERVICE_ADDRESS
:
2989 r
= parse_boolean(optarg
);
2991 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2992 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2995 case ARG_SERVICE_TXT
:
2996 r
= parse_boolean(optarg
);
2998 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2999 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
3003 r
= parse_boolean(optarg
);
3005 return log_error_errno(r
, "Failed to parse --search argument.");
3006 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
3010 arg_pager_flags
|= PAGER_DISABLE
;
3017 assert_not_reached("Unhandled option");
3020 if (arg_type
== 0 && arg_class
!= 0)
3021 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3022 "--class= may only be used in conjunction with --type=.");
3024 if (arg_type
!= 0 && arg_class
== 0)
3025 arg_class
= DNS_CLASS_IN
;
3027 if (arg_class
!= 0 && arg_type
== 0)
3028 arg_type
= DNS_TYPE_A
;
3030 return 1 /* work to do */;
3033 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
3035 static const Verb verbs
[] = {
3036 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
3037 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
3038 { "query", 2, VERB_ANY
, 0, verb_query
},
3039 { "service", 2, 4, 0, verb_service
},
3040 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
3041 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
3042 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
3043 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
3044 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
3045 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
3046 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
3047 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
3048 { "default-route", VERB_ANY
, 3, 0, verb_default_route
},
3049 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
3050 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
3051 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
3052 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
3053 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
3054 { "revert", VERB_ANY
, 2, 0, verb_revert_link
},
3055 { "log-level", VERB_ANY
, 2, 0, verb_log_level
},
3059 return dispatch_verb(argc
, argv
, verbs
, bus
);
3062 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
3067 assert(num_args
== 0 || args
);
3069 num
= !!single_arg
+ num_args
+ 1;
3071 p
= fake
= newa0(char *, num
+ 1);
3072 *p
++ = (char *) verb
;
3074 *p
++ = (char *) single_arg
;
3075 for (size_t i
= 0; i
< num_args
; i
++)
3079 return native_main((int) num
, fake
, bus
);
3082 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
3086 case MODE_RESOLVE_HOST
:
3087 case MODE_RESOLVE_RECORD
:
3088 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
3090 case MODE_RESOLVE_SERVICE
:
3091 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
3093 case MODE_RESOLVE_OPENPGP
:
3094 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3096 case MODE_RESOLVE_TLSA
:
3097 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3099 case MODE_STATISTICS
:
3100 return translate("statistics", NULL
, 0, NULL
, bus
);
3102 case MODE_RESET_STATISTICS
:
3103 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3105 case MODE_FLUSH_CACHES
:
3106 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3108 case MODE_RESET_SERVER_FEATURES
:
3109 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3112 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3118 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3123 if (arg_set_domain
) {
3124 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3130 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3135 if (arg_set_llmnr
) {
3136 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3142 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3147 if (arg_set_dns_over_tls
) {
3148 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3153 if (arg_set_dnssec
) {
3154 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3161 case MODE_REVERT_LINK
:
3164 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3167 assert_not_reached("invalid mode");
3173 static int run(int argc
, char **argv
) {
3174 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
3177 setlocale(LC_ALL
, "");
3180 if (streq(program_invocation_short_name
, "resolvconf"))
3181 r
= resolvconf_parse_argv(argc
, argv
);
3182 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3183 r
= compat_parse_argv(argc
, argv
);
3185 r
= native_parse_argv(argc
, argv
);
3189 r
= sd_bus_open_system(&bus
);
3191 return log_error_errno(r
, "sd_bus_open_system: %m");
3193 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3194 return compat_main(argc
, argv
, bus
);
3196 return native_main(argc
, argv
, bus
);
3199 DEFINE_MAIN_FUNCTION(run
);