1 /* SPDX-License-Identifier: LGPL-2.1+ */
8 #include "sd-netlink.h"
11 #include "alloc-util.h"
12 #include "bus-common-errors.h"
13 #include "bus-error.h"
15 #include "dns-domain.h"
17 #include "format-table.h"
18 #include "format-util.h"
19 #include "gcrypt-util.h"
20 #include "main-func.h"
21 #include "missing_network.h"
22 #include "netlink-util.h"
24 #include "parse-util.h"
25 #include "pretty-print.h"
26 #include "resolvconf-compat.h"
27 #include "resolvectl.h"
28 #include "resolved-def.h"
29 #include "resolved-dns-packet.h"
30 #include "socket-netlink.h"
31 #include "stdio-util.h"
32 #include "string-table.h"
34 #include "terminal-util.h"
37 static int arg_family
= AF_UNSPEC
;
38 static int arg_ifindex
= 0;
39 static char *arg_ifname
= NULL
;
40 static uint16_t arg_type
= 0;
41 static uint16_t arg_class
= 0;
42 static bool arg_legend
= true;
43 static uint64_t arg_flags
= 0;
44 static PagerFlags arg_pager_flags
= 0;
45 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
46 static const char *arg_service_family
= NULL
;
48 typedef enum RawType
{
53 static RawType arg_raw
= RAW_NONE
;
55 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
57 char **arg_set_dns
= NULL
;
58 char **arg_set_domain
= NULL
;
59 static const char *arg_set_llmnr
= NULL
;
60 static const char *arg_set_mdns
= NULL
;
61 static const char *arg_set_dns_over_tls
= NULL
;
62 static const char *arg_set_dnssec
= NULL
;
63 static char **arg_set_nta
= NULL
;
65 STATIC_DESTRUCTOR_REGISTER(arg_ifname
, freep
);
66 STATIC_DESTRUCTOR_REGISTER(arg_set_dns
, strv_freep
);
67 STATIC_DESTRUCTOR_REGISTER(arg_set_domain
, strv_freep
);
68 STATIC_DESTRUCTOR_REGISTER(arg_set_nta
, strv_freep
);
70 typedef enum StatusMode
{
82 int ifname_mangle(const char *s
) {
83 _cleanup_free_
char *iface
= NULL
;
91 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
92 iface
= strndup(s
, dot
- s
);
99 ifi
= resolve_interface(NULL
, iface
);
101 if (ifi
== -ENODEV
&& arg_ifindex_permissive
) {
102 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
106 return log_error_errno(ifi
, "Failed to resolve interface \"%s\": %m", iface
);
109 if (arg_ifindex
> 0 && arg_ifindex
!= ifi
)
110 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Specified multiple different interfaces. Refusing.");
113 free_and_replace(arg_ifname
, iface
);
118 static void print_source(uint64_t flags
, usec_t rtt
) {
119 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
127 printf("\n%s-- Information acquired via", ansi_grey());
130 printf(" protocol%s%s%s%s%s",
131 flags
& SD_RESOLVED_DNS
? " DNS" :"",
132 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
133 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
134 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
135 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
137 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
140 "%s-- Data is authenticated: %s%s\n",
141 rtt_str
, ansi_normal(),
142 ansi_grey(), yes_no(flags
& SD_RESOLVED_AUTHENTICATED
), ansi_normal());
145 static void print_ifindex_comment(int printed_so_far
, int ifindex
) {
146 char ifname
[IF_NAMESIZE
+ 1];
151 if (!format_ifname(ifindex
, ifname
))
152 log_warning_errno(errno
, "Failed to resolve interface name for index %i, ignoring: %m", ifindex
);
154 printf("%*s%s-- link: %s%s",
155 60 > printed_so_far
? 60 - printed_so_far
: 0, " ", /* Align comment to the 60th column */
156 ansi_grey(), ifname
, ansi_normal());
159 static int resolve_host(sd_bus
*bus
, const char *name
) {
160 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
161 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
162 const char *canonical
= NULL
;
170 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
172 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveHostname");
174 return bus_log_create_error(r
);
176 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
178 return bus_log_create_error(r
);
180 ts
= now(CLOCK_MONOTONIC
);
182 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
184 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
186 ts
= now(CLOCK_MONOTONIC
) - ts
;
188 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
190 return bus_log_parse_error(r
);
192 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
193 _cleanup_free_
char *pretty
= NULL
;
194 int ifindex
, family
, k
;
198 assert_cc(sizeof(int) == sizeof(int32_t));
200 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
202 return bus_log_parse_error(r
);
204 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
206 return bus_log_parse_error(r
);
208 r
= sd_bus_message_exit_container(reply
);
210 return bus_log_parse_error(r
);
212 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
213 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
217 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
218 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
222 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
224 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
226 k
= printf("%*s%s %s%s%s",
227 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
228 ansi_highlight(), pretty
, ansi_normal());
230 print_ifindex_comment(k
, ifindex
);
236 return bus_log_parse_error(r
);
238 r
= sd_bus_message_exit_container(reply
);
240 return bus_log_parse_error(r
);
242 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
244 return bus_log_parse_error(r
);
246 if (!streq(name
, canonical
))
247 printf("%*s%s (%s)\n",
248 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
252 log_error("%s: no addresses found", name
);
256 print_source(flags
, ts
);
261 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
262 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
263 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
264 _cleanup_free_
char *pretty
= NULL
;
271 assert(IN_SET(family
, AF_INET
, AF_INET6
));
275 ifindex
= arg_ifindex
;
277 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
281 log_debug("Resolving %s.", pretty
);
283 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveAddress");
285 return bus_log_create_error(r
);
287 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
289 return bus_log_create_error(r
);
291 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
293 return bus_log_create_error(r
);
295 r
= sd_bus_message_append(req
, "t", arg_flags
);
297 return bus_log_create_error(r
);
299 ts
= now(CLOCK_MONOTONIC
);
301 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
303 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
305 ts
= now(CLOCK_MONOTONIC
) - ts
;
307 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
309 return bus_log_create_error(r
);
311 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
315 assert_cc(sizeof(int) == sizeof(int32_t));
317 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
321 r
= sd_bus_message_exit_container(reply
);
325 k
= printf("%*s%s %s%s%s",
326 (int) strlen(pretty
), c
== 0 ? pretty
: "",
328 ansi_highlight(), n
, ansi_normal());
330 print_ifindex_comment(k
, ifindex
);
336 return bus_log_parse_error(r
);
338 r
= sd_bus_message_exit_container(reply
);
340 return bus_log_parse_error(r
);
342 r
= sd_bus_message_read(reply
, "t", &flags
);
344 return bus_log_parse_error(r
);
347 log_error("%s: no names found", pretty
);
351 print_source(flags
, ts
);
356 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
357 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
358 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
361 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
365 p
->refuse_compression
= true;
367 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
371 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
373 return log_error_errno(r
, "Failed to parse RR: %m");
375 if (arg_raw
== RAW_PAYLOAD
) {
379 k
= dns_resource_record_payload(rr
, &data
);
381 return log_error_errno(k
, "Cannot dump RR: %m");
382 fwrite(data
, 1, k
, stdout
);
387 s
= dns_resource_record_to_string(rr
);
392 print_ifindex_comment(k
, ifindex
);
399 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
400 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
401 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
406 bool needs_authentication
= false;
410 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
412 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveRecord");
414 return bus_log_create_error(r
);
416 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
418 return bus_log_create_error(r
);
420 ts
= now(CLOCK_MONOTONIC
);
422 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
424 if (warn_missing
|| r
!= -ENXIO
)
425 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
429 ts
= now(CLOCK_MONOTONIC
) - ts
;
431 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
433 return bus_log_parse_error(r
);
435 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
441 assert_cc(sizeof(int) == sizeof(int32_t));
443 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
445 return bus_log_parse_error(r
);
447 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
449 return bus_log_parse_error(r
);
451 r
= sd_bus_message_exit_container(reply
);
453 return bus_log_parse_error(r
);
455 if (arg_raw
== RAW_PACKET
) {
456 uint64_t u64
= htole64(l
);
458 fwrite(&u64
, sizeof(u64
), 1, stdout
);
459 fwrite(d
, 1, l
, stdout
);
461 r
= output_rr_packet(d
, l
, ifindex
);
466 if (dns_type_needs_authentication(t
))
467 needs_authentication
= true;
472 return bus_log_parse_error(r
);
474 r
= sd_bus_message_exit_container(reply
);
476 return bus_log_parse_error(r
);
478 r
= sd_bus_message_read(reply
, "t", &flags
);
480 return bus_log_parse_error(r
);
484 log_error("%s: no records found", name
);
488 print_source(flags
, ts
);
490 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
493 fprintf(stderr
, "\n%s"
494 "WARNING: The resources shown contain cryptographic key data which could not be\n"
495 " authenticated. It is not suitable to authenticate any communication.\n"
496 " This is usually indication that DNSSEC authentication was not enabled\n"
497 " or is not available for the selected protocol or DNS servers.%s\n",
498 ansi_highlight_red(),
505 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
506 uint16_t type
= 0, class = 0;
507 const char *p
, *q
, *n
;
512 assert(startswith(name
, "dns:"));
514 /* Parse RFC 4501 dns: URIs */
524 e
= strchr(p
+ 2, '/');
529 log_warning("DNS authority specification not supported; ignoring specified authority.");
536 n
= strndupa(p
, q
- p
);
542 f
= startswith_no_case(q
, "class=");
544 _cleanup_free_
char *t
= NULL
;
548 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
549 "DNS class specified twice.");
551 e
= strchrnul(f
, ';');
552 t
= strndup(f
, e
- f
);
556 r
= dns_class_from_string(t
);
558 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
559 "Unknown DNS class %s.", t
);
571 f
= startswith_no_case(q
, "type=");
573 _cleanup_free_
char *t
= NULL
;
577 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
578 "DNS type specified twice.");
580 e
= strchrnul(f
, ';');
581 t
= strndup(f
, e
- f
);
585 r
= dns_type_from_string(t
);
587 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
588 "Unknown DNS type %s.", t
);
606 class = arg_class
?: DNS_CLASS_IN
;
608 type
= arg_type
?: DNS_TYPE_A
;
610 return resolve_record(bus
, n
, class, type
, true);
613 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
614 "Invalid DNS URI: %s", name
);
617 static int verb_query(int argc
, char **argv
, void *userdata
) {
618 sd_bus
*bus
= userdata
;
623 STRV_FOREACH(p
, argv
+ 1) {
624 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
630 STRV_FOREACH(p
, argv
+ 1) {
631 if (startswith(*p
, "dns:"))
632 q
= resolve_rfc4501(bus
, *p
);
635 union in_addr_union a
;
637 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
639 q
= resolve_address(bus
, family
, &a
, ifindex
);
641 q
= resolve_host(bus
, *p
);
650 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
651 const char *canonical_name
, *canonical_type
, *canonical_domain
;
652 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
653 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
664 name
= empty_to_null(name
);
665 type
= empty_to_null(type
);
668 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
670 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
672 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
674 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveService");
676 return bus_log_create_error(r
);
678 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
680 return bus_log_create_error(r
);
682 ts
= now(CLOCK_MONOTONIC
);
684 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
686 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
688 ts
= now(CLOCK_MONOTONIC
) - ts
;
690 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
692 return bus_log_parse_error(r
);
695 (name
? strlen(name
) + 1 : 0) +
696 (type
? strlen(type
) + 1 : 0) +
700 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
701 uint16_t priority
, weight
, port
;
702 const char *hostname
, *canonical
;
704 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
706 return bus_log_parse_error(r
);
709 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
711 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
713 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
714 (int) strlen(domain
), c
== 0 ? domain
: "",
719 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
721 return bus_log_parse_error(r
);
723 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
724 _cleanup_free_
char *pretty
= NULL
;
725 int ifindex
, family
, k
;
728 assert_cc(sizeof(int) == sizeof(int32_t));
730 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
732 return bus_log_parse_error(r
);
734 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
736 return bus_log_parse_error(r
);
738 r
= sd_bus_message_exit_container(reply
);
740 return bus_log_parse_error(r
);
742 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
743 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
747 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
748 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
752 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
754 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
756 k
= printf("%*s%s", (int) indent
, "", pretty
);
757 print_ifindex_comment(k
, ifindex
);
761 return bus_log_parse_error(r
);
763 r
= sd_bus_message_exit_container(reply
);
765 return bus_log_parse_error(r
);
767 r
= sd_bus_message_read(reply
, "s", &canonical
);
769 return bus_log_parse_error(r
);
771 if (!streq(hostname
, canonical
))
772 printf("%*s(%s)\n", (int) indent
, "", canonical
);
774 r
= sd_bus_message_exit_container(reply
);
776 return bus_log_parse_error(r
);
781 return bus_log_parse_error(r
);
783 r
= sd_bus_message_exit_container(reply
);
785 return bus_log_parse_error(r
);
787 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
789 return bus_log_parse_error(r
);
791 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
792 _cleanup_free_
char *escaped
= NULL
;
794 escaped
= cescape_length(p
, sz
);
798 printf("%*s%s\n", (int) indent
, "", escaped
);
801 return bus_log_parse_error(r
);
803 r
= sd_bus_message_exit_container(reply
);
805 return bus_log_parse_error(r
);
807 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
809 return bus_log_parse_error(r
);
811 canonical_name
= empty_to_null(canonical_name
);
812 canonical_type
= empty_to_null(canonical_type
);
814 if (!streq_ptr(name
, canonical_name
) ||
815 !streq_ptr(type
, canonical_type
) ||
816 !streq_ptr(domain
, canonical_domain
)) {
818 printf("%*s(", (int) indent
, "");
821 printf("%s/", canonical_name
);
823 printf("%s/", canonical_type
);
825 printf("%s)\n", canonical_domain
);
828 print_source(flags
, ts
);
833 static int verb_service(int argc
, char **argv
, void *userdata
) {
834 sd_bus
*bus
= userdata
;
837 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
839 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
841 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
844 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
845 const char *domain
, *full
;
847 _cleanup_free_
char *hashed
= NULL
;
852 domain
= strrchr(address
, '@');
854 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
855 "Address does not contain '@': \"%s\"", address
);
856 if (domain
== address
|| domain
[1] == '\0')
857 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
858 "Address starts or ends with '@': \"%s\"", address
);
861 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
863 return log_error_errno(r
, "Hashing failed: %m");
865 strshorten(hashed
, 56);
867 full
= strjoina(hashed
, "._openpgpkey.", domain
);
868 log_debug("Looking up \"%s\".", full
);
870 r
= resolve_record(bus
, full
,
871 arg_class
?: DNS_CLASS_IN
,
872 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
874 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
875 hashed
= mfree(hashed
);
876 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
878 return log_error_errno(r
, "Hashing failed: %m");
880 full
= strjoina(hashed
, "._openpgpkey.", domain
);
881 log_debug("Looking up \"%s\".", full
);
883 return resolve_record(bus
, full
,
884 arg_class
?: DNS_CLASS_IN
,
885 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
891 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
892 sd_bus
*bus
= userdata
;
896 STRV_FOREACH(p
, argv
+ 1) {
897 q
= resolve_openpgp(bus
, *p
);
905 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
907 uint16_t port_num
= 443;
908 _cleanup_free_
char *full
= NULL
;
914 port
= strrchr(address
, ':');
916 r
= parse_ip_port(port
+ 1, &port_num
);
918 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
920 address
= strndupa(address
, port
- address
);
923 r
= asprintf(&full
, "_%u._%s.%s",
930 log_debug("Looking up \"%s\".", full
);
932 return resolve_record(bus
, full
,
933 arg_class
?: DNS_CLASS_IN
,
934 arg_type
?: DNS_TYPE_TLSA
, true);
937 static bool service_family_is_valid(const char *s
) {
938 return STR_IN_SET(s
, "tcp", "udp", "sctp");
941 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
942 sd_bus
*bus
= userdata
;
943 char **p
, **args
= argv
+ 1;
944 const char *family
= "tcp";
947 if (service_family_is_valid(argv
[1])) {
952 STRV_FOREACH(p
, args
) {
953 q
= resolve_tlsa(bus
, family
, *p
);
961 static int show_statistics(int argc
, char **argv
, void *userdata
) {
962 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
963 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
964 _cleanup_(table_unrefp
) Table
*table
= NULL
;
965 sd_bus
*bus
= userdata
;
966 uint64_t n_current_transactions
, n_total_transactions
,
967 cache_size
, n_cache_hit
, n_cache_miss
,
968 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
969 int r
, dnssec_supported
;
973 r
= bus_get_property_trivial(bus
, bus_resolve_mgr
, "DNSSECSupported", &error
, 'b', &dnssec_supported
);
975 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
977 printf("DNSSEC supported by current servers: %s%s%s\n\n",
979 yes_no(dnssec_supported
),
982 r
= bus_get_property(bus
, bus_resolve_mgr
, "TransactionStatistics", &error
, &reply
, "(tt)");
984 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
986 r
= sd_bus_message_read(reply
, "(tt)",
987 &n_current_transactions
,
988 &n_total_transactions
);
990 return bus_log_parse_error(r
);
992 reply
= sd_bus_message_unref(reply
);
994 r
= bus_get_property(bus
, bus_resolve_mgr
, "CacheStatistics", &error
, &reply
, "(ttt)");
996 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
998 r
= sd_bus_message_read(reply
, "(ttt)",
1003 return bus_log_parse_error(r
);
1005 reply
= sd_bus_message_unref(reply
);
1007 r
= bus_get_property(bus
, bus_resolve_mgr
, "DNSSECStatistics", &error
, &reply
, "(tttt)");
1009 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1011 r
= sd_bus_message_read(reply
, "(tttt)",
1015 &n_dnssec_indeterminate
);
1017 return bus_log_parse_error(r
);
1019 table
= table_new("key", "value");
1023 table_set_header(table
, false);
1025 r
= table_add_many(table
,
1026 TABLE_STRING
, "Transactions",
1027 TABLE_SET_COLOR
, ansi_highlight(),
1029 TABLE_STRING
, "Current Transactions:",
1030 TABLE_SET_ALIGN_PERCENT
, 100,
1031 TABLE_UINT64
, n_current_transactions
,
1032 TABLE_STRING
, "Total Transactions:",
1033 TABLE_UINT64
, n_total_transactions
,
1034 TABLE_EMPTY
, TABLE_EMPTY
,
1035 TABLE_STRING
, "Cache",
1036 TABLE_SET_COLOR
, ansi_highlight(),
1037 TABLE_SET_ALIGN_PERCENT
, 0,
1039 TABLE_STRING
, "Current Cache Size:",
1040 TABLE_SET_ALIGN_PERCENT
, 100,
1041 TABLE_UINT64
, cache_size
,
1042 TABLE_STRING
, "Cache Hits:",
1043 TABLE_UINT64
, n_cache_hit
,
1044 TABLE_STRING
, "Cache Misses:",
1045 TABLE_UINT64
, n_cache_miss
,
1046 TABLE_EMPTY
, TABLE_EMPTY
,
1047 TABLE_STRING
, "DNSSEC Verdicts",
1048 TABLE_SET_COLOR
, ansi_highlight(),
1049 TABLE_SET_ALIGN_PERCENT
, 0,
1051 TABLE_STRING
, "Secure:",
1052 TABLE_SET_ALIGN_PERCENT
, 100,
1053 TABLE_UINT64
, n_dnssec_secure
,
1054 TABLE_STRING
, "Insecure:",
1055 TABLE_UINT64
, n_dnssec_insecure
,
1056 TABLE_STRING
, "Bogus:",
1057 TABLE_UINT64
, n_dnssec_bogus
,
1058 TABLE_STRING
, "Indeterminate:",
1059 TABLE_UINT64
, n_dnssec_indeterminate
);
1061 table_log_add_error(r
);
1063 r
= table_print(table
, NULL
);
1065 return log_error_errno(r
, "Failed to print table: %m");
1070 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1071 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1072 sd_bus
*bus
= userdata
;
1075 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetStatistics", &error
, NULL
, NULL
);
1077 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1082 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1083 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1084 sd_bus
*bus
= userdata
;
1087 r
= bus_call_method(bus
, bus_resolve_mgr
, "FlushCaches", &error
, NULL
, NULL
);
1089 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1094 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1095 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1096 sd_bus
*bus
= userdata
;
1099 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetServerFeatures", &error
, NULL
, NULL
);
1101 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1106 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1107 _cleanup_free_
char *pretty
= NULL
;
1108 int ifindex
, family
, r
;
1115 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? "iiay" : "iay");
1120 r
= sd_bus_message_read(m
, "i", &ifindex
);
1125 r
= sd_bus_message_read(m
, "i", &family
);
1129 r
= sd_bus_message_read_array(m
, 'y', &a
, &sz
);
1133 r
= sd_bus_message_exit_container(m
);
1137 if (with_ifindex
&& ifindex
!= 0) {
1138 /* only show the global ones here */
1143 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
1144 log_debug("Unexpected family, ignoring: %i", family
);
1150 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
1151 log_debug("Address size mismatch, ignoring.");
1157 r
= in_addr_to_string(family
, a
, &pretty
);
1161 *ret
= TAKE_PTR(pretty
);
1166 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1167 char ***l
= userdata
;
1175 r
= sd_bus_message_enter_container(m
, 'a', "(iay)");
1180 _cleanup_free_
char *pretty
= NULL
;
1182 r
= read_dns_server_one(m
, false, &pretty
);
1188 if (isempty(pretty
))
1191 r
= strv_consume(l
, TAKE_PTR(pretty
));
1196 r
= sd_bus_message_exit_container(m
);
1203 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1207 return read_dns_server_one(m
, false, userdata
);
1210 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1211 _cleanup_free_
char *str
= NULL
;
1212 int ifindex
, route_only
, r
;
1219 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1221 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1225 if (with_ifindex
&& ifindex
!= 0) {
1226 /* only show the global ones here */
1232 str
= strjoin("~", domain
);
1234 str
= strdup(domain
);
1238 *ret
= TAKE_PTR(str
);
1243 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1244 char ***l
= userdata
;
1252 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1257 _cleanup_free_
char *pretty
= NULL
;
1259 r
= read_domain_one(m
, false, &pretty
);
1265 if (isempty(pretty
))
1268 r
= strv_consume(l
, TAKE_PTR(pretty
));
1273 r
= sd_bus_message_exit_container(m
);
1280 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1283 printf("%sLink %i (%s)%s:",
1284 ansi_highlight(), ifindex
, ifname
, ansi_normal());
1295 uint64_t scopes_mask
;
1298 const char *dns_over_tls
;
1304 bool dnssec_supported
;
1308 static void link_info_clear(struct link_info
*p
) {
1309 free(p
->current_dns
);
1311 strv_free(p
->domains
);
1315 static int dump_list(Table
*table
, const char *prefix
, char * const *l
) {
1318 if (strv_isempty(l
))
1321 r
= table_add_many(table
,
1322 TABLE_STRING
, prefix
,
1325 return table_log_add_error(r
);
1330 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1331 static const struct bus_properties_map property_map
[] = {
1332 { "ScopesMask", "t", NULL
, offsetof(struct link_info
, scopes_mask
) },
1333 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(struct link_info
, dns
) },
1334 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(struct link_info
, current_dns
) },
1335 { "Domains", "a(sb)", map_link_domains
, offsetof(struct link_info
, domains
) },
1336 { "DefaultRoute", "b", NULL
, offsetof(struct link_info
, default_route
) },
1337 { "LLMNR", "s", NULL
, offsetof(struct link_info
, llmnr
) },
1338 { "MulticastDNS", "s", NULL
, offsetof(struct link_info
, mdns
) },
1339 { "DNSOverTLS", "s", NULL
, offsetof(struct link_info
, dns_over_tls
) },
1340 { "DNSSEC", "s", NULL
, offsetof(struct link_info
, dnssec
) },
1341 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct link_info
, ntas
) },
1342 { "DNSSECSupported", "b", NULL
, offsetof(struct link_info
, dnssec_supported
) },
1345 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1346 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1347 _cleanup_(link_info_clear
) struct link_info link_info
= {};
1348 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1349 _cleanup_free_
char *p
= NULL
;
1350 char ifi
[DECIMAL_STR_MAX(int)], ifname
[IF_NAMESIZE
+ 1] = "";
1354 assert(ifindex
> 0);
1357 if (!format_ifname(ifindex
, ifname
))
1358 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1363 xsprintf(ifi
, "%i", ifindex
);
1364 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1368 r
= bus_map_all_properties(bus
,
1369 "org.freedesktop.resolve1",
1372 BUS_MAP_BOOLEAN_AS_BOOL
,
1377 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1379 (void) pager_open(arg_pager_flags
);
1381 if (mode
== STATUS_DNS
)
1382 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns
);
1384 if (mode
== STATUS_DOMAIN
)
1385 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1387 if (mode
== STATUS_NTA
)
1388 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1390 if (mode
== STATUS_DEFAULT_ROUTE
) {
1391 printf("%sLink %i (%s)%s: %s\n",
1392 ansi_highlight(), ifindex
, name
, ansi_normal(),
1393 yes_no(link_info
.default_route
));
1398 if (mode
== STATUS_LLMNR
) {
1399 printf("%sLink %i (%s)%s: %s\n",
1400 ansi_highlight(), ifindex
, name
, ansi_normal(),
1401 strna(link_info
.llmnr
));
1406 if (mode
== STATUS_MDNS
) {
1407 printf("%sLink %i (%s)%s: %s\n",
1408 ansi_highlight(), ifindex
, name
, ansi_normal(),
1409 strna(link_info
.mdns
));
1414 if (mode
== STATUS_PRIVATE
) {
1415 printf("%sLink %i (%s)%s: %s\n",
1416 ansi_highlight(), ifindex
, name
, ansi_normal(),
1417 strna(link_info
.dns_over_tls
));
1422 if (mode
== STATUS_DNSSEC
) {
1423 printf("%sLink %i (%s)%s: %s\n",
1424 ansi_highlight(), ifindex
, name
, ansi_normal(),
1425 strna(link_info
.dnssec
));
1430 if (empty_line
&& *empty_line
)
1431 fputc('\n', stdout
);
1433 printf("%sLink %i (%s)%s\n",
1434 ansi_highlight(), ifindex
, name
, ansi_normal());
1436 table
= table_new("key", "value");
1440 table_set_header(table
, false);
1442 r
= table_add_many(table
,
1443 TABLE_STRING
, "Current Scopes:",
1444 TABLE_SET_ALIGN_PERCENT
, 100);
1446 return table_log_add_error(r
);
1448 if (link_info
.scopes_mask
== 0)
1449 r
= table_add_cell(table
, NULL
, TABLE_STRING
, "none");
1451 _cleanup_free_
char *buf
= NULL
;
1454 if (asprintf(&buf
, "%s%s%s%s%s",
1455 link_info
.scopes_mask
& SD_RESOLVED_DNS
? "DNS " : "",
1456 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? "LLMNR/IPv4 " : "",
1457 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? "LLMNR/IPv6 " : "",
1458 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? "mDNS/IPv4 " : "",
1459 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? "mDNS/IPv6 " : "") < 0)
1464 buf
[len
- 1] = '\0';
1466 r
= table_add_cell(table
, NULL
, TABLE_STRING
, buf
);
1469 return table_log_add_error(r
);
1471 r
= table_add_many(table
,
1472 TABLE_STRING
, "DefaultRoute setting:",
1473 TABLE_BOOLEAN
, link_info
.default_route
,
1474 TABLE_STRING
, "LLMNR setting:",
1475 TABLE_STRING
, strna(link_info
.llmnr
),
1476 TABLE_STRING
, "MulticastDNS setting:",
1477 TABLE_STRING
, strna(link_info
.mdns
),
1478 TABLE_STRING
, "DNSOverTLS setting:",
1479 TABLE_STRING
, strna(link_info
.dns_over_tls
),
1480 TABLE_STRING
, "DNSSEC setting:",
1481 TABLE_STRING
, strna(link_info
.dnssec
),
1482 TABLE_STRING
, "DNSSEC supported:",
1483 TABLE_BOOLEAN
, link_info
.dnssec_supported
);
1485 return table_log_add_error(r
);
1487 if (link_info
.current_dns
) {
1488 r
= table_add_many(table
,
1489 TABLE_STRING
, "Current DNS Server:",
1490 TABLE_STRING
, link_info
.current_dns
);
1492 return table_log_add_error(r
);
1495 r
= dump_list(table
, "DNS Servers:", link_info
.dns
);
1499 r
= dump_list(table
, "DNS Domain:", link_info
.domains
);
1503 r
= dump_list(table
, "DNSSEC NTA:", link_info
.ntas
);
1507 r
= table_print(table
, NULL
);
1509 return log_error_errno(r
, "Failed to print table: %m");
1517 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1518 char ***l
= userdata
;
1526 r
= sd_bus_message_enter_container(m
, 'a', "(iiay)");
1531 _cleanup_free_
char *pretty
= NULL
;
1533 r
= read_dns_server_one(m
, true, &pretty
);
1539 if (isempty(pretty
))
1542 r
= strv_consume(l
, TAKE_PTR(pretty
));
1547 r
= sd_bus_message_exit_container(m
);
1554 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1558 return read_dns_server_one(m
, true, userdata
);
1561 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1562 char ***l
= userdata
;
1570 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1575 _cleanup_free_
char *pretty
= NULL
;
1577 r
= read_domain_one(m
, true, &pretty
);
1583 if (isempty(pretty
))
1586 r
= strv_consume(l
, TAKE_PTR(pretty
));
1591 r
= sd_bus_message_exit_container(m
);
1598 static int status_print_strv_global(char **p
) {
1601 printf("%sGlobal%s:", ansi_highlight(), ansi_normal());
1611 struct global_info
{
1614 char **fallback_dns
;
1619 const char *dns_over_tls
;
1621 bool dnssec_supported
;
1624 static void global_info_clear(struct global_info
*p
) {
1625 free(p
->current_dns
);
1627 strv_free(p
->fallback_dns
);
1628 strv_free(p
->domains
);
1632 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1633 static const struct bus_properties_map property_map
[] = {
1634 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, dns
) },
1635 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, fallback_dns
) },
1636 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(struct global_info
, current_dns
) },
1637 { "Domains", "a(isb)", map_global_domains
, offsetof(struct global_info
, domains
) },
1638 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct global_info
, ntas
) },
1639 { "LLMNR", "s", NULL
, offsetof(struct global_info
, llmnr
) },
1640 { "MulticastDNS", "s", NULL
, offsetof(struct global_info
, mdns
) },
1641 { "DNSOverTLS", "s", NULL
, offsetof(struct global_info
, dns_over_tls
) },
1642 { "DNSSEC", "s", NULL
, offsetof(struct global_info
, dnssec
) },
1643 { "DNSSECSupported", "b", NULL
, offsetof(struct global_info
, dnssec_supported
) },
1646 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1647 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1648 _cleanup_(global_info_clear
) struct global_info global_info
= {};
1649 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1655 r
= bus_map_all_properties(bus
,
1656 "org.freedesktop.resolve1",
1657 "/org/freedesktop/resolve1",
1659 BUS_MAP_BOOLEAN_AS_BOOL
,
1664 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1666 (void) pager_open(arg_pager_flags
);
1668 if (mode
== STATUS_DNS
)
1669 return status_print_strv_global(global_info
.dns
);
1671 if (mode
== STATUS_DOMAIN
)
1672 return status_print_strv_global(global_info
.domains
);
1674 if (mode
== STATUS_NTA
)
1675 return status_print_strv_global(global_info
.ntas
);
1677 if (mode
== STATUS_LLMNR
) {
1678 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1679 strna(global_info
.llmnr
));
1684 if (mode
== STATUS_MDNS
) {
1685 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1686 strna(global_info
.mdns
));
1691 if (mode
== STATUS_PRIVATE
) {
1692 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1693 strna(global_info
.dns_over_tls
));
1698 if (mode
== STATUS_DNSSEC
) {
1699 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1700 strna(global_info
.dnssec
));
1705 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1707 table
= table_new("key", "value");
1711 table_set_header(table
, false);
1713 r
= table_add_many(table
,
1714 TABLE_STRING
, "LLMNR setting:",
1715 TABLE_SET_ALIGN_PERCENT
, 100,
1716 TABLE_STRING
, strna(global_info
.llmnr
),
1717 TABLE_STRING
, "MulticastDNS setting:",
1718 TABLE_STRING
, strna(global_info
.mdns
),
1719 TABLE_STRING
, "DNSOverTLS setting:",
1720 TABLE_STRING
, strna(global_info
.dns_over_tls
),
1721 TABLE_STRING
, "DNSSEC setting:",
1722 TABLE_STRING
, strna(global_info
.dnssec
),
1723 TABLE_STRING
, "DNSSEC supported:",
1724 TABLE_BOOLEAN
, global_info
.dnssec_supported
);
1726 return table_log_add_error(r
);
1728 if (global_info
.current_dns
) {
1729 r
= table_add_many(table
,
1730 TABLE_STRING
, "Current DNS Server:",
1731 TABLE_STRING
, global_info
.current_dns
);
1733 return table_log_add_error(r
);
1736 r
= dump_list(table
, "DNS Servers:", global_info
.dns
);
1740 r
= dump_list(table
, "Fallback DNS Servers:", global_info
.fallback_dns
);
1744 r
= dump_list(table
, "DNS Domain:", global_info
.domains
);
1748 strv_sort(global_info
.ntas
);
1749 r
= dump_list(table
, "DNSSEC NTA:", global_info
.ntas
);
1753 r
= table_print(table
, NULL
);
1755 return log_error_errno(r
, "Failed to print table: %m");
1762 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1763 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1764 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1765 sd_netlink_message
*i
;
1766 bool empty_line
= false;
1771 r
= status_global(bus
, mode
, &empty_line
);
1775 r
= sd_netlink_open(&rtnl
);
1777 return log_error_errno(r
, "Failed to connect to netlink: %m");
1779 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1781 return rtnl_log_create_error(r
);
1783 r
= sd_netlink_message_request_dump(req
, true);
1785 return rtnl_log_create_error(r
);
1787 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1789 return log_error_errno(r
, "Failed to enumerate links: %m");
1792 for (i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1797 q
= sd_netlink_message_get_type(i
, &type
);
1799 return rtnl_log_parse_error(q
);
1801 if (type
!= RTM_NEWLINK
)
1804 q
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1806 return rtnl_log_parse_error(q
);
1808 if (ifindex
== LOOPBACK_IFINDEX
)
1811 q
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1813 return rtnl_log_parse_error(q
);
1815 q
= status_ifindex(bus
, ifindex
, name
, mode
, &empty_line
);
1816 if (q
< 0 && r
>= 0)
1823 static int verb_status(int argc
, char **argv
, void *userdata
) {
1824 sd_bus
*bus
= userdata
;
1825 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1830 bool empty_line
= false;
1832 STRV_FOREACH(ifname
, argv
+ 1) {
1835 ifindex
= resolve_interface(&rtnl
, *ifname
);
1837 log_warning_errno(ifindex
, "Failed to resolve interface \"%s\", ignoring: %m", *ifname
);
1841 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1846 r
= status_all(bus
, STATUS_ALL
);
1851 static int call_dns(sd_bus
*bus
, char **dns
, const BusLocator
*locator
, sd_bus_error
*error
) {
1852 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1856 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDNS");
1858 return bus_log_create_error(r
);
1860 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1862 return bus_log_create_error(r
);
1864 r
= sd_bus_message_open_container(req
, 'a', "(iay)");
1866 return bus_log_create_error(r
);
1868 /* If only argument is the empty string, then call SetLinkDNS() with an
1869 * empty list, which will clear the list of domains for an interface. */
1870 if (!strv_equal(dns
, STRV_MAKE("")))
1871 STRV_FOREACH(p
, dns
) {
1872 struct in_addr_data data
;
1874 r
= in_addr_from_string_auto(*p
, &data
.family
, &data
.address
);
1876 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
1878 r
= sd_bus_message_open_container(req
, 'r', "iay");
1880 return bus_log_create_error(r
);
1882 r
= sd_bus_message_append(req
, "i", data
.family
);
1884 return bus_log_create_error(r
);
1886 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
1888 return bus_log_create_error(r
);
1890 r
= sd_bus_message_close_container(req
);
1892 return bus_log_create_error(r
);
1895 r
= sd_bus_message_close_container(req
);
1897 return bus_log_create_error(r
);
1899 return sd_bus_call(bus
, req
, 0, error
, NULL
);
1902 static int verb_dns(int argc
, char **argv
, void *userdata
) {
1903 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1904 sd_bus
*bus
= userdata
;
1910 r
= ifname_mangle(argv
[1]);
1915 if (arg_ifindex
<= 0)
1916 return status_all(bus
, STATUS_DNS
);
1919 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
1921 r
= call_dns(bus
, argv
+ 2, bus_resolve_mgr
, &error
);
1922 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
1923 sd_bus_error_free(&error
);
1925 r
= call_dns(bus
, argv
+ 2, bus_network_mgr
, &error
);
1928 if (arg_ifindex_permissive
&&
1929 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1932 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
1938 static int call_domain(sd_bus
*bus
, char **domain
, const BusLocator
*locator
, sd_bus_error
*error
) {
1939 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1943 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDomains");
1945 return bus_log_create_error(r
);
1947 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1949 return bus_log_create_error(r
);
1951 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
1953 return bus_log_create_error(r
);
1955 /* If only argument is the empty string, then call SetLinkDomains() with an
1956 * empty list, which will clear the list of domains for an interface. */
1957 if (!strv_equal(domain
, STRV_MAKE("")))
1958 STRV_FOREACH(p
, domain
) {
1961 n
= **p
== '~' ? *p
+ 1 : *p
;
1963 r
= dns_name_is_valid(n
);
1965 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
1967 log_error("Domain not valid: %s", n
);
1971 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
1973 return bus_log_create_error(r
);
1976 r
= sd_bus_message_close_container(req
);
1978 return bus_log_create_error(r
);
1980 return sd_bus_call(bus
, req
, 0, error
, NULL
);
1983 static int verb_domain(int argc
, char **argv
, void *userdata
) {
1984 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1985 sd_bus
*bus
= userdata
;
1991 r
= ifname_mangle(argv
[1]);
1996 if (arg_ifindex
<= 0)
1997 return status_all(bus
, STATUS_DOMAIN
);
2000 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
2002 r
= call_domain(bus
, argv
+ 2, bus_resolve_mgr
, &error
);
2003 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2004 sd_bus_error_free(&error
);
2006 r
= call_domain(bus
, argv
+ 2, bus_network_mgr
, &error
);
2009 if (arg_ifindex_permissive
&&
2010 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2013 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2019 static int verb_default_route(int argc
, char **argv
, void *userdata
) {
2020 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2021 sd_bus
*bus
= userdata
;
2027 r
= ifname_mangle(argv
[1]);
2032 if (arg_ifindex
<= 0)
2033 return status_all(bus
, STATUS_DEFAULT_ROUTE
);
2036 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DEFAULT_ROUTE
, NULL
);
2038 b
= parse_boolean(argv
[2]);
2040 return log_error_errno(b
, "Failed to parse boolean argument: %s", argv
[2]);
2042 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2043 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2044 sd_bus_error_free(&error
);
2046 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2049 if (arg_ifindex_permissive
&&
2050 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2053 return log_error_errno(r
, "Failed to set default route configuration: %s", bus_error_message(&error
, r
));
2059 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2060 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2061 sd_bus
*bus
= userdata
;
2067 r
= ifname_mangle(argv
[1]);
2072 if (arg_ifindex
<= 0)
2073 return status_all(bus
, STATUS_LLMNR
);
2076 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2078 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2079 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2080 sd_bus_error_free(&error
);
2082 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2085 if (arg_ifindex_permissive
&&
2086 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2089 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2095 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2096 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2097 sd_bus
*bus
= userdata
;
2103 r
= ifname_mangle(argv
[1]);
2108 if (arg_ifindex
<= 0)
2109 return status_all(bus
, STATUS_MDNS
);
2112 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2114 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkMulticastDNS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2115 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2116 sd_bus_error_free(&error
);
2118 r
= bus_call_method(
2121 "SetLinkMulticastDNS",
2124 "is", arg_ifindex
, argv
[2]);
2127 if (arg_ifindex_permissive
&&
2128 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2131 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2137 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2138 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2139 sd_bus
*bus
= userdata
;
2145 r
= ifname_mangle(argv
[1]);
2150 if (arg_ifindex
<= 0)
2151 return status_all(bus
, STATUS_PRIVATE
);
2154 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2156 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSOverTLS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2157 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2158 sd_bus_error_free(&error
);
2160 r
= bus_call_method(
2163 "SetLinkDNSOverTLS",
2166 "is", arg_ifindex
, argv
[2]);
2169 if (arg_ifindex_permissive
&&
2170 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2173 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2179 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2180 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2181 sd_bus
*bus
= userdata
;
2187 r
= ifname_mangle(argv
[1]);
2192 if (arg_ifindex
<= 0)
2193 return status_all(bus
, STATUS_DNSSEC
);
2196 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2198 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2199 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2200 sd_bus_error_free(&error
);
2202 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2205 if (arg_ifindex_permissive
&&
2206 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2209 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2215 static int call_nta(sd_bus
*bus
, char **nta
, const BusLocator
*locator
, sd_bus_error
*error
) {
2216 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2219 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDNSSECNegativeTrustAnchors");
2221 return bus_log_create_error(r
);
2223 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2225 return bus_log_create_error(r
);
2227 r
= sd_bus_message_append_strv(req
, nta
);
2229 return bus_log_create_error(r
);
2231 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2234 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2235 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2236 sd_bus
*bus
= userdata
;
2244 r
= ifname_mangle(argv
[1]);
2249 if (arg_ifindex
<= 0)
2250 return status_all(bus
, STATUS_NTA
);
2253 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2255 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2256 * with an empty list, which will clear the list of domains for an interface. */
2257 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2260 STRV_FOREACH(p
, argv
+ 2) {
2261 r
= dns_name_is_valid(*p
);
2263 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2265 log_error("Domain not valid: %s", *p
);
2270 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_resolve_mgr
, &error
);
2271 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2272 sd_bus_error_free(&error
);
2274 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_network_mgr
, &error
);
2277 if (arg_ifindex_permissive
&&
2278 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2281 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2287 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2288 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2289 sd_bus
*bus
= userdata
;
2295 r
= ifname_mangle(argv
[1]);
2300 if (arg_ifindex
<= 0)
2301 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Interface argument required.");
2303 r
= bus_call_method(bus
, bus_resolve_mgr
, "RevertLink", &error
, NULL
, "i", arg_ifindex
);
2304 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2305 sd_bus_error_free(&error
);
2307 r
= bus_call_method(bus
, bus_network_mgr
, "RevertLinkDNS", &error
, NULL
, "i", arg_ifindex
);
2310 if (arg_ifindex_permissive
&&
2311 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2314 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2320 static int verb_log_level(int argc
, char *argv
[], void *userdata
) {
2321 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2322 sd_bus
*bus
= userdata
;
2328 _cleanup_free_
char *level
= NULL
;
2330 r
= sd_bus_get_property_string(
2332 "org.freedesktop.resolve1",
2333 "/org/freedesktop/LogControl1",
2334 "org.freedesktop.LogControl1",
2339 return log_error_errno(r
, "Failed to get log level: %s", bus_error_message(&error
, r
));
2346 r
= sd_bus_set_property(
2348 "org.freedesktop.resolve1",
2349 "/org/freedesktop/LogControl1",
2350 "org.freedesktop.LogControl1",
2356 return log_error_errno(r
, "Failed to set log level: %s", bus_error_message(&error
, r
));
2362 static void help_protocol_types(void) {
2364 puts("Known protocol types:");
2365 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2368 static void help_dns_types(void) {
2370 puts("Known DNS RR types:");
2372 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2375 static void help_dns_classes(void) {
2377 puts("Known DNS RR classes:");
2379 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2382 static int compat_help(void) {
2383 _cleanup_free_
char *link
= NULL
;
2386 r
= terminal_urlify_man("resolvectl", "1", &link
);
2390 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2391 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2392 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2393 "%1$s [OPTIONS...] --statistics\n"
2394 "%1$s [OPTIONS...] --reset-statistics\n"
2396 "%2$sResolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%3$s\n\n"
2397 " -h --help Show this help\n"
2398 " --version Show package version\n"
2399 " --no-pager Do not pipe output into a pager\n"
2400 " -4 Resolve IPv4 addresses\n"
2401 " -6 Resolve IPv6 addresses\n"
2402 " -i --interface=INTERFACE Look on interface\n"
2403 " -p --protocol=PROTO|help Look via protocol\n"
2404 " -t --type=TYPE|help Query RR with DNS type\n"
2405 " -c --class=CLASS|help Query RR with DNS class\n"
2406 " --service Resolve service (SRV)\n"
2407 " --service-address=BOOL Resolve address for services (default: yes)\n"
2408 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2409 " --openpgp Query OpenPGP public key\n"
2410 " --tlsa Query TLS public key\n"
2411 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2412 " --search=BOOL Use search domains for single-label names\n"
2414 " --raw[=payload|packet] Dump the answer as binary data\n"
2415 " --legend=BOOL Print headers and additional info (default: yes)\n"
2416 " --statistics Show resolver statistics\n"
2417 " --reset-statistics Reset resolver statistics\n"
2418 " --status Show link and server status\n"
2419 " --flush-caches Flush all local DNS caches\n"
2420 " --reset-server-features\n"
2421 " Forget learnt DNS server feature levels\n"
2422 " --set-dns=SERVER Set per-interface DNS server address\n"
2423 " --set-domain=DOMAIN Set per-interface search domain\n"
2424 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2425 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2426 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2427 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2428 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2429 " --revert Revert per-interface configuration\n"
2430 "\nSee the %4$s for details.\n"
2431 , program_invocation_short_name
2440 static int native_help(void) {
2441 _cleanup_free_
char *link
= NULL
;
2444 r
= terminal_urlify_man("resolvectl", "1", &link
);
2448 printf("%s [OPTIONS...] COMMAND ...\n"
2450 "%sSend control commands to the network name resolution manager, or%s\n"
2451 "%sresolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%s\n"
2453 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2454 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2455 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2456 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2457 " status [LINK...] Show link and server status\n"
2458 " statistics Show resolver statistics\n"
2459 " reset-statistics Reset resolver statistics\n"
2460 " flush-caches Flush all local DNS caches\n"
2461 " reset-server-features Forget learnt DNS server feature levels\n"
2462 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2463 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2464 " default-route [LINK [BOOL]] Get/set per-interface default route flag\n"
2465 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2466 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2467 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2468 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2469 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2470 " revert LINK Revert per-interface configuration\n"
2472 " -h --help Show this help\n"
2473 " --version Show package version\n"
2474 " --no-pager Do not pipe output into a pager\n"
2475 " -4 Resolve IPv4 addresses\n"
2476 " -6 Resolve IPv6 addresses\n"
2477 " -i --interface=INTERFACE Look on interface\n"
2478 " -p --protocol=PROTO|help Look via protocol\n"
2479 " -t --type=TYPE|help Query RR with DNS type\n"
2480 " -c --class=CLASS|help Query RR with DNS class\n"
2481 " --service-address=BOOL Resolve address for services (default: yes)\n"
2482 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2483 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2484 " --search=BOOL Use search domains for single-label names\n"
2486 " --raw[=payload|packet] Dump the answer as binary data\n"
2487 " --legend=BOOL Print headers and additional info (default: yes)\n"
2488 "\nSee the %s for details.\n"
2489 , program_invocation_short_name
2500 static int verb_help(int argc
, char **argv
, void *userdata
) {
2501 return native_help();
2504 static int compat_parse_argv(int argc
, char *argv
[]) {
2506 ARG_VERSION
= 0x100,
2510 ARG_SERVICE_ADDRESS
,
2517 ARG_RESET_STATISTICS
,
2520 ARG_RESET_SERVER_FEATURES
,
2532 static const struct option options
[] = {
2533 { "help", no_argument
, NULL
, 'h' },
2534 { "version", no_argument
, NULL
, ARG_VERSION
},
2535 { "type", required_argument
, NULL
, 't' },
2536 { "class", required_argument
, NULL
, 'c' },
2537 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2538 { "interface", required_argument
, NULL
, 'i' },
2539 { "protocol", required_argument
, NULL
, 'p' },
2540 { "cname", required_argument
, NULL
, ARG_CNAME
},
2541 { "service", no_argument
, NULL
, ARG_SERVICE
},
2542 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2543 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2544 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2545 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2546 { "raw", optional_argument
, NULL
, ARG_RAW
},
2547 { "search", required_argument
, NULL
, ARG_SEARCH
},
2548 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2549 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2550 { "status", no_argument
, NULL
, ARG_STATUS
},
2551 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2552 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2553 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2554 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2555 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2556 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2557 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2558 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2559 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2560 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2561 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2570 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2574 return compat_help();
2580 arg_family
= AF_INET
;
2584 arg_family
= AF_INET6
;
2588 r
= ifname_mangle(optarg
);
2594 if (streq(optarg
, "help")) {
2599 r
= dns_type_from_string(optarg
);
2601 log_error("Failed to parse RR record type %s", optarg
);
2604 arg_type
= (uint16_t) r
;
2605 assert((int) arg_type
== r
);
2607 arg_mode
= MODE_RESOLVE_RECORD
;
2611 if (streq(optarg
, "help")) {
2616 r
= dns_class_from_string(optarg
);
2618 log_error("Failed to parse RR record class %s", optarg
);
2621 arg_class
= (uint16_t) r
;
2622 assert((int) arg_class
== r
);
2627 r
= parse_boolean(optarg
);
2629 return log_error_errno(r
, "Failed to parse --legend= argument");
2635 if (streq(optarg
, "help")) {
2636 help_protocol_types();
2638 } else if (streq(optarg
, "dns"))
2639 arg_flags
|= SD_RESOLVED_DNS
;
2640 else if (streq(optarg
, "llmnr"))
2641 arg_flags
|= SD_RESOLVED_LLMNR
;
2642 else if (streq(optarg
, "llmnr-ipv4"))
2643 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2644 else if (streq(optarg
, "llmnr-ipv6"))
2645 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2646 else if (streq(optarg
, "mdns"))
2647 arg_flags
|= SD_RESOLVED_MDNS
;
2648 else if (streq(optarg
, "mdns-ipv4"))
2649 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2650 else if (streq(optarg
, "mdns-ipv6"))
2651 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2653 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2654 "Unknown protocol specifier: %s", optarg
);
2659 arg_mode
= MODE_RESOLVE_SERVICE
;
2663 arg_mode
= MODE_RESOLVE_OPENPGP
;
2667 arg_mode
= MODE_RESOLVE_TLSA
;
2668 if (!optarg
|| service_family_is_valid(optarg
))
2669 arg_service_family
= optarg
;
2671 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2672 "Unknown service family \"%s\".", optarg
);
2677 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2678 "Refusing to write binary data to tty.");
2680 if (optarg
== NULL
|| streq(optarg
, "payload"))
2681 arg_raw
= RAW_PAYLOAD
;
2682 else if (streq(optarg
, "packet"))
2683 arg_raw
= RAW_PACKET
;
2685 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2686 "Unknown --raw specifier \"%s\".",
2693 r
= parse_boolean(optarg
);
2695 return log_error_errno(r
, "Failed to parse --cname= argument.");
2696 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2699 case ARG_SERVICE_ADDRESS
:
2700 r
= parse_boolean(optarg
);
2702 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2703 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2706 case ARG_SERVICE_TXT
:
2707 r
= parse_boolean(optarg
);
2709 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2710 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2714 r
= parse_boolean(optarg
);
2716 return log_error_errno(r
, "Failed to parse --search argument.");
2717 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2720 case ARG_STATISTICS
:
2721 arg_mode
= MODE_STATISTICS
;
2724 case ARG_RESET_STATISTICS
:
2725 arg_mode
= MODE_RESET_STATISTICS
;
2728 case ARG_FLUSH_CACHES
:
2729 arg_mode
= MODE_FLUSH_CACHES
;
2732 case ARG_RESET_SERVER_FEATURES
:
2733 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2737 arg_mode
= MODE_STATUS
;
2741 arg_pager_flags
|= PAGER_DISABLE
;
2745 r
= strv_extend(&arg_set_dns
, optarg
);
2749 arg_mode
= MODE_SET_LINK
;
2752 case ARG_SET_DOMAIN
:
2753 r
= strv_extend(&arg_set_domain
, optarg
);
2757 arg_mode
= MODE_SET_LINK
;
2761 arg_set_llmnr
= optarg
;
2762 arg_mode
= MODE_SET_LINK
;
2766 arg_set_mdns
= optarg
;
2767 arg_mode
= MODE_SET_LINK
;
2770 case ARG_SET_PRIVATE
:
2771 arg_set_dns_over_tls
= optarg
;
2772 arg_mode
= MODE_SET_LINK
;
2775 case ARG_SET_DNSSEC
:
2776 arg_set_dnssec
= optarg
;
2777 arg_mode
= MODE_SET_LINK
;
2781 r
= strv_extend(&arg_set_nta
, optarg
);
2785 arg_mode
= MODE_SET_LINK
;
2788 case ARG_REVERT_LINK
:
2789 arg_mode
= MODE_REVERT_LINK
;
2796 assert_not_reached("Unhandled option");
2799 if (arg_type
== 0 && arg_class
!= 0)
2800 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2801 "--class= may only be used in conjunction with --type=.");
2803 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
)
2804 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2805 "--service and --type= may not be combined.");
2807 if (arg_type
!= 0 && arg_class
== 0)
2808 arg_class
= DNS_CLASS_IN
;
2810 if (arg_class
!= 0 && arg_type
== 0)
2811 arg_type
= DNS_TYPE_A
;
2813 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2815 if (arg_ifindex
<= 0)
2816 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2817 "--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2820 return 1 /* work to do */;
2823 static int native_parse_argv(int argc
, char *argv
[]) {
2825 ARG_VERSION
= 0x100,
2828 ARG_SERVICE_ADDRESS
,
2835 static const struct option options
[] = {
2836 { "help", no_argument
, NULL
, 'h' },
2837 { "version", no_argument
, NULL
, ARG_VERSION
},
2838 { "type", required_argument
, NULL
, 't' },
2839 { "class", required_argument
, NULL
, 'c' },
2840 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2841 { "interface", required_argument
, NULL
, 'i' },
2842 { "protocol", required_argument
, NULL
, 'p' },
2843 { "cname", required_argument
, NULL
, ARG_CNAME
},
2844 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2845 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2846 { "raw", optional_argument
, NULL
, ARG_RAW
},
2847 { "search", required_argument
, NULL
, ARG_SEARCH
},
2848 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2857 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2861 return native_help();
2867 arg_family
= AF_INET
;
2871 arg_family
= AF_INET6
;
2875 r
= ifname_mangle(optarg
);
2881 if (streq(optarg
, "help")) {
2886 r
= dns_type_from_string(optarg
);
2888 log_error("Failed to parse RR record type %s", optarg
);
2891 arg_type
= (uint16_t) r
;
2892 assert((int) arg_type
== r
);
2897 if (streq(optarg
, "help")) {
2902 r
= dns_class_from_string(optarg
);
2904 log_error("Failed to parse RR record class %s", optarg
);
2907 arg_class
= (uint16_t) r
;
2908 assert((int) arg_class
== r
);
2913 r
= parse_boolean(optarg
);
2915 return log_error_errno(r
, "Failed to parse --legend= argument");
2921 if (streq(optarg
, "help")) {
2922 help_protocol_types();
2924 } else if (streq(optarg
, "dns"))
2925 arg_flags
|= SD_RESOLVED_DNS
;
2926 else if (streq(optarg
, "llmnr"))
2927 arg_flags
|= SD_RESOLVED_LLMNR
;
2928 else if (streq(optarg
, "llmnr-ipv4"))
2929 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2930 else if (streq(optarg
, "llmnr-ipv6"))
2931 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2932 else if (streq(optarg
, "mdns"))
2933 arg_flags
|= SD_RESOLVED_MDNS
;
2934 else if (streq(optarg
, "mdns-ipv4"))
2935 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2936 else if (streq(optarg
, "mdns-ipv6"))
2937 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2939 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2940 "Unknown protocol specifier: %s",
2947 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2948 "Refusing to write binary data to tty.");
2950 if (optarg
== NULL
|| streq(optarg
, "payload"))
2951 arg_raw
= RAW_PAYLOAD
;
2952 else if (streq(optarg
, "packet"))
2953 arg_raw
= RAW_PACKET
;
2955 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2956 "Unknown --raw specifier \"%s\".",
2963 r
= parse_boolean(optarg
);
2965 return log_error_errno(r
, "Failed to parse --cname= argument.");
2966 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2969 case ARG_SERVICE_ADDRESS
:
2970 r
= parse_boolean(optarg
);
2972 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2973 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2976 case ARG_SERVICE_TXT
:
2977 r
= parse_boolean(optarg
);
2979 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2980 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2984 r
= parse_boolean(optarg
);
2986 return log_error_errno(r
, "Failed to parse --search argument.");
2987 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2991 arg_pager_flags
|= PAGER_DISABLE
;
2998 assert_not_reached("Unhandled option");
3001 if (arg_type
== 0 && arg_class
!= 0)
3002 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3003 "--class= may only be used in conjunction with --type=.");
3005 if (arg_type
!= 0 && arg_class
== 0)
3006 arg_class
= DNS_CLASS_IN
;
3008 if (arg_class
!= 0 && arg_type
== 0)
3009 arg_type
= DNS_TYPE_A
;
3011 return 1 /* work to do */;
3014 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
3016 static const Verb verbs
[] = {
3017 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
3018 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
3019 { "query", 2, VERB_ANY
, 0, verb_query
},
3020 { "service", 2, 4, 0, verb_service
},
3021 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
3022 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
3023 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
3024 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
3025 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
3026 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
3027 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
3028 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
3029 { "default-route", VERB_ANY
, 3, 0, verb_default_route
},
3030 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
3031 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
3032 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
3033 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
3034 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
3035 { "revert", VERB_ANY
, 2, 0, verb_revert_link
},
3036 { "log-level", VERB_ANY
, 2, 0, verb_log_level
},
3040 return dispatch_verb(argc
, argv
, verbs
, bus
);
3043 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
3048 assert(num_args
== 0 || args
);
3050 num
= !!single_arg
+ num_args
+ 1;
3052 p
= fake
= newa0(char *, num
+ 1);
3053 *p
++ = (char *) verb
;
3055 *p
++ = (char *) single_arg
;
3056 for (i
= 0; i
< num_args
; i
++)
3060 return native_main((int) num
, fake
, bus
);
3063 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
3067 case MODE_RESOLVE_HOST
:
3068 case MODE_RESOLVE_RECORD
:
3069 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
3071 case MODE_RESOLVE_SERVICE
:
3072 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
3074 case MODE_RESOLVE_OPENPGP
:
3075 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3077 case MODE_RESOLVE_TLSA
:
3078 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3080 case MODE_STATISTICS
:
3081 return translate("statistics", NULL
, 0, NULL
, bus
);
3083 case MODE_RESET_STATISTICS
:
3084 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3086 case MODE_FLUSH_CACHES
:
3087 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3089 case MODE_RESET_SERVER_FEATURES
:
3090 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3093 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3099 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3104 if (arg_set_domain
) {
3105 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3111 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3116 if (arg_set_llmnr
) {
3117 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3123 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3128 if (arg_set_dns_over_tls
) {
3129 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3134 if (arg_set_dnssec
) {
3135 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3142 case MODE_REVERT_LINK
:
3145 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3148 assert_not_reached("invalid mode");
3154 static int run(int argc
, char **argv
) {
3155 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
3158 setlocale(LC_ALL
, "");
3159 log_show_color(true);
3160 log_parse_environment();
3163 if (streq(program_invocation_short_name
, "resolvconf"))
3164 r
= resolvconf_parse_argv(argc
, argv
);
3165 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3166 r
= compat_parse_argv(argc
, argv
);
3168 r
= native_parse_argv(argc
, argv
);
3172 r
= sd_bus_open_system(&bus
);
3174 return log_error_errno(r
, "sd_bus_open_system: %m");
3176 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3177 return compat_main(argc
, argv
, bus
);
3179 return native_main(argc
, argv
, bus
);
3182 DEFINE_MAIN_FUNCTION(run
);