1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
8 #include "sd-netlink.h"
11 #include "alloc-util.h"
12 #include "bus-common-errors.h"
13 #include "bus-error.h"
14 #include "bus-locator.h"
15 #include "bus-map-properties.h"
16 #include "bus-message-util.h"
17 #include "dns-domain.h"
19 #include "format-table.h"
20 #include "format-util.h"
21 #include "gcrypt-util.h"
22 #include "main-func.h"
23 #include "missing_network.h"
24 #include "netlink-util.h"
26 #include "parse-util.h"
27 #include "pretty-print.h"
28 #include "resolvconf-compat.h"
29 #include "resolvectl.h"
30 #include "resolved-def.h"
31 #include "resolved-dns-packet.h"
32 #include "socket-netlink.h"
33 #include "sort-util.h"
34 #include "stdio-util.h"
35 #include "string-table.h"
37 #include "terminal-util.h"
41 static int arg_family
= AF_UNSPEC
;
42 static int arg_ifindex
= 0;
43 static char *arg_ifname
= NULL
;
44 static uint16_t arg_type
= 0;
45 static uint16_t arg_class
= 0;
46 static bool arg_legend
= true;
47 static uint64_t arg_flags
= 0;
48 static PagerFlags arg_pager_flags
= 0;
49 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
50 static const char *arg_service_family
= NULL
;
52 typedef enum RawType
{
57 static RawType arg_raw
= RAW_NONE
;
59 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
61 char **arg_set_dns
= NULL
;
62 char **arg_set_domain
= NULL
;
63 static const char *arg_set_llmnr
= NULL
;
64 static const char *arg_set_mdns
= NULL
;
65 static const char *arg_set_dns_over_tls
= NULL
;
66 static const char *arg_set_dnssec
= NULL
;
67 static char **arg_set_nta
= NULL
;
69 STATIC_DESTRUCTOR_REGISTER(arg_ifname
, freep
);
70 STATIC_DESTRUCTOR_REGISTER(arg_set_dns
, strv_freep
);
71 STATIC_DESTRUCTOR_REGISTER(arg_set_domain
, strv_freep
);
72 STATIC_DESTRUCTOR_REGISTER(arg_set_nta
, strv_freep
);
74 typedef enum StatusMode
{
86 typedef struct InterfaceInfo
{
91 static int interface_info_compare(const InterfaceInfo
*a
, const InterfaceInfo
*b
) {
94 r
= CMP(a
->index
, b
->index
);
98 return strcmp_ptr(a
->name
, b
->name
);
101 int ifname_mangle(const char *s
) {
102 _cleanup_free_
char *iface
= NULL
;
108 dot
= strchr(s
, '.');
110 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
111 iface
= strndup(s
, dot
- s
);
118 ifi
= resolve_interface(NULL
, iface
);
120 if (ifi
== -ENODEV
&& arg_ifindex_permissive
) {
121 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
125 return log_error_errno(ifi
, "Failed to resolve interface \"%s\": %m", iface
);
128 if (arg_ifindex
> 0 && arg_ifindex
!= ifi
)
129 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Specified multiple different interfaces. Refusing.");
132 free_and_replace(arg_ifname
, iface
);
137 static void print_source(uint64_t flags
, usec_t rtt
) {
138 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
146 printf("\n%s-- Information acquired via", ansi_grey());
149 printf(" protocol%s%s%s%s%s",
150 flags
& SD_RESOLVED_DNS
? " DNS" :"",
151 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
152 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
153 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
154 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
156 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
159 "%s-- Data is authenticated: %s%s\n",
160 rtt_str
, ansi_normal(),
161 ansi_grey(), yes_no(flags
& SD_RESOLVED_AUTHENTICATED
), ansi_normal());
164 static void print_ifindex_comment(int printed_so_far
, int ifindex
) {
165 char ifname
[IF_NAMESIZE
+ 1];
170 if (!format_ifname(ifindex
, ifname
))
171 log_warning_errno(errno
, "Failed to resolve interface name for index %i, ignoring: %m", ifindex
);
173 printf("%*s%s-- link: %s%s",
174 60 > printed_so_far
? 60 - printed_so_far
: 0, " ", /* Align comment to the 60th column */
175 ansi_grey(), ifname
, ansi_normal());
178 static int resolve_host(sd_bus
*bus
, const char *name
) {
179 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
180 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
181 const char *canonical
= NULL
;
189 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
191 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveHostname");
193 return bus_log_create_error(r
);
195 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
197 return bus_log_create_error(r
);
199 ts
= now(CLOCK_MONOTONIC
);
201 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
203 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
205 ts
= now(CLOCK_MONOTONIC
) - ts
;
207 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
209 return bus_log_parse_error(r
);
211 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
212 _cleanup_free_
char *pretty
= NULL
;
213 int ifindex
, family
, k
;
214 union in_addr_union a
;
216 assert_cc(sizeof(int) == sizeof(int32_t));
218 r
= sd_bus_message_read(reply
, "i", &ifindex
);
220 return bus_log_parse_error(r
);
222 sd_bus_error_free(&error
);
223 r
= bus_message_read_in_addr_auto(reply
, &error
, &family
, &a
);
224 if (r
< 0 && !sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
))
225 return log_error_errno(r
, "%s: systemd-resolved returned invalid result: %s", name
, bus_error_message(&error
, r
));
227 r
= sd_bus_message_exit_container(reply
);
229 return bus_log_parse_error(r
);
231 if (sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
)) {
232 log_debug_errno(r
, "%s: systemd-resolved returned invalid result, ignoring: %s", name
, bus_error_message(&error
, r
));
236 r
= in_addr_ifindex_to_string(family
, &a
, ifindex
, &pretty
);
238 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
240 k
= printf("%*s%s %s%s%s",
241 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
242 ansi_highlight(), pretty
, ansi_normal());
244 print_ifindex_comment(k
, ifindex
);
250 return bus_log_parse_error(r
);
252 r
= sd_bus_message_exit_container(reply
);
254 return bus_log_parse_error(r
);
256 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
258 return bus_log_parse_error(r
);
260 if (!streq(name
, canonical
))
261 printf("%*s%s (%s)\n",
262 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
266 return log_error_errno(SYNTHETIC_ERRNO(ESRCH
),
267 "%s: no addresses found", name
);
269 print_source(flags
, ts
);
274 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
275 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
276 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
277 _cleanup_free_
char *pretty
= NULL
;
284 assert(IN_SET(family
, AF_INET
, AF_INET6
));
288 ifindex
= arg_ifindex
;
290 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
294 log_debug("Resolving %s.", pretty
);
296 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveAddress");
298 return bus_log_create_error(r
);
300 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
302 return bus_log_create_error(r
);
304 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
306 return bus_log_create_error(r
);
308 r
= sd_bus_message_append(req
, "t", arg_flags
);
310 return bus_log_create_error(r
);
312 ts
= now(CLOCK_MONOTONIC
);
314 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
316 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
318 ts
= now(CLOCK_MONOTONIC
) - ts
;
320 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
322 return bus_log_create_error(r
);
324 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
328 assert_cc(sizeof(int) == sizeof(int32_t));
330 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
334 r
= sd_bus_message_exit_container(reply
);
338 k
= printf("%*s%s %s%s%s",
339 (int) strlen(pretty
), c
== 0 ? pretty
: "",
341 ansi_highlight(), n
, ansi_normal());
343 print_ifindex_comment(k
, ifindex
);
349 return bus_log_parse_error(r
);
351 r
= sd_bus_message_exit_container(reply
);
353 return bus_log_parse_error(r
);
355 r
= sd_bus_message_read(reply
, "t", &flags
);
357 return bus_log_parse_error(r
);
360 return log_error_errno(SYNTHETIC_ERRNO(ESRCH
),
361 "%s: no names found", pretty
);
363 print_source(flags
, ts
);
368 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
369 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
370 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
373 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
377 p
->refuse_compression
= true;
379 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
383 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
385 return log_error_errno(r
, "Failed to parse RR: %m");
387 if (arg_raw
== RAW_PAYLOAD
) {
391 k
= dns_resource_record_payload(rr
, &data
);
393 return log_error_errno(k
, "Cannot dump RR: %m");
394 fwrite(data
, 1, k
, stdout
);
399 s
= dns_resource_record_to_string(rr
);
404 print_ifindex_comment(k
, ifindex
);
411 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
412 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
413 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
418 bool needs_authentication
= false;
422 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
424 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveRecord");
426 return bus_log_create_error(r
);
428 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
430 return bus_log_create_error(r
);
432 ts
= now(CLOCK_MONOTONIC
);
434 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
436 if (warn_missing
|| r
!= -ENXIO
)
437 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
441 ts
= now(CLOCK_MONOTONIC
) - ts
;
443 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
445 return bus_log_parse_error(r
);
447 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
453 assert_cc(sizeof(int) == sizeof(int32_t));
455 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
457 return bus_log_parse_error(r
);
459 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
461 return bus_log_parse_error(r
);
463 r
= sd_bus_message_exit_container(reply
);
465 return bus_log_parse_error(r
);
467 if (arg_raw
== RAW_PACKET
) {
468 uint64_t u64
= htole64(l
);
470 fwrite(&u64
, sizeof(u64
), 1, stdout
);
471 fwrite(d
, 1, l
, stdout
);
473 r
= output_rr_packet(d
, l
, ifindex
);
478 if (dns_type_needs_authentication(t
))
479 needs_authentication
= true;
484 return bus_log_parse_error(r
);
486 r
= sd_bus_message_exit_container(reply
);
488 return bus_log_parse_error(r
);
490 r
= sd_bus_message_read(reply
, "t", &flags
);
492 return bus_log_parse_error(r
);
496 log_error("%s: no records found", name
);
500 print_source(flags
, ts
);
502 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
505 fprintf(stderr
, "\n%s"
506 "WARNING: The resources shown contain cryptographic key data which could not be\n"
507 " authenticated. It is not suitable to authenticate any communication.\n"
508 " This is usually indication that DNSSEC authentication was not enabled\n"
509 " or is not available for the selected protocol or DNS servers.%s\n",
510 ansi_highlight_red(),
517 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
518 uint16_t type
= 0, class = 0;
519 const char *p
, *q
, *n
;
524 assert(startswith(name
, "dns:"));
526 /* Parse RFC 4501 dns: URIs */
536 e
= strchr(p
+ 2, '/');
541 log_warning("DNS authority specification not supported; ignoring specified authority.");
548 n
= strndupa(p
, q
- p
);
554 f
= startswith_no_case(q
, "class=");
556 _cleanup_free_
char *t
= NULL
;
560 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
561 "DNS class specified twice.");
563 e
= strchrnul(f
, ';');
564 t
= strndup(f
, e
- f
);
568 r
= dns_class_from_string(t
);
570 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
571 "Unknown DNS class %s.", t
);
583 f
= startswith_no_case(q
, "type=");
585 _cleanup_free_
char *t
= NULL
;
589 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
590 "DNS type specified twice.");
592 e
= strchrnul(f
, ';');
593 t
= strndup(f
, e
- f
);
597 r
= dns_type_from_string(t
);
599 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
600 "Unknown DNS type %s.", t
);
618 class = arg_class
?: DNS_CLASS_IN
;
620 type
= arg_type
?: DNS_TYPE_A
;
622 return resolve_record(bus
, n
, class, type
, true);
625 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
626 "Invalid DNS URI: %s", name
);
629 static int verb_query(int argc
, char **argv
, void *userdata
) {
630 sd_bus
*bus
= userdata
;
635 STRV_FOREACH(p
, argv
+ 1) {
636 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
642 STRV_FOREACH(p
, argv
+ 1) {
643 if (startswith(*p
, "dns:"))
644 q
= resolve_rfc4501(bus
, *p
);
647 union in_addr_union a
;
649 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
651 q
= resolve_address(bus
, family
, &a
, ifindex
);
653 q
= resolve_host(bus
, *p
);
662 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
663 const char *canonical_name
, *canonical_type
, *canonical_domain
;
664 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
665 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
676 name
= empty_to_null(name
);
677 type
= empty_to_null(type
);
680 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
682 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
684 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
686 r
= bus_message_new_method_call(bus
, &req
, bus_resolve_mgr
, "ResolveService");
688 return bus_log_create_error(r
);
690 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
692 return bus_log_create_error(r
);
694 ts
= now(CLOCK_MONOTONIC
);
696 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
698 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
700 ts
= now(CLOCK_MONOTONIC
) - ts
;
702 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
704 return bus_log_parse_error(r
);
707 (name
? strlen(name
) + 1 : 0) +
708 (type
? strlen(type
) + 1 : 0) +
712 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
713 uint16_t priority
, weight
, port
;
714 const char *hostname
, *canonical
;
716 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
718 return bus_log_parse_error(r
);
721 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
723 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
725 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
726 (int) strlen(domain
), c
== 0 ? domain
: "",
731 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
733 return bus_log_parse_error(r
);
735 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
736 _cleanup_free_
char *pretty
= NULL
;
737 int ifindex
, family
, k
;
738 union in_addr_union a
;;
740 assert_cc(sizeof(int) == sizeof(int32_t));
742 r
= sd_bus_message_read(reply
, "i", &ifindex
);
744 return bus_log_parse_error(r
);
746 sd_bus_error_free(&error
);
747 r
= bus_message_read_in_addr_auto(reply
, &error
, &family
, &a
);
748 if (r
< 0 && !sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
))
749 return log_error_errno(r
, "%s: systemd-resolved returned invalid result: %s", name
, bus_error_message(&error
, r
));
751 r
= sd_bus_message_exit_container(reply
);
753 return bus_log_parse_error(r
);
755 if (sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
)) {
756 log_debug_errno(r
, "%s: systemd-resolved returned invalid result, ignoring: %s", name
, bus_error_message(&error
, r
));
760 r
= in_addr_ifindex_to_string(family
, &a
, ifindex
, &pretty
);
762 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
764 k
= printf("%*s%s", (int) indent
, "", pretty
);
765 print_ifindex_comment(k
, ifindex
);
769 return bus_log_parse_error(r
);
771 r
= sd_bus_message_exit_container(reply
);
773 return bus_log_parse_error(r
);
775 r
= sd_bus_message_read(reply
, "s", &canonical
);
777 return bus_log_parse_error(r
);
779 if (!streq(hostname
, canonical
))
780 printf("%*s(%s)\n", (int) indent
, "", canonical
);
782 r
= sd_bus_message_exit_container(reply
);
784 return bus_log_parse_error(r
);
789 return bus_log_parse_error(r
);
791 r
= sd_bus_message_exit_container(reply
);
793 return bus_log_parse_error(r
);
795 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
797 return bus_log_parse_error(r
);
799 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
800 _cleanup_free_
char *escaped
= NULL
;
802 escaped
= cescape_length(p
, sz
);
806 printf("%*s%s\n", (int) indent
, "", escaped
);
809 return bus_log_parse_error(r
);
811 r
= sd_bus_message_exit_container(reply
);
813 return bus_log_parse_error(r
);
815 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
817 return bus_log_parse_error(r
);
819 canonical_name
= empty_to_null(canonical_name
);
820 canonical_type
= empty_to_null(canonical_type
);
822 if (!streq_ptr(name
, canonical_name
) ||
823 !streq_ptr(type
, canonical_type
) ||
824 !streq_ptr(domain
, canonical_domain
)) {
826 printf("%*s(", (int) indent
, "");
829 printf("%s/", canonical_name
);
831 printf("%s/", canonical_type
);
833 printf("%s)\n", canonical_domain
);
836 print_source(flags
, ts
);
841 static int verb_service(int argc
, char **argv
, void *userdata
) {
842 sd_bus
*bus
= userdata
;
845 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
847 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
849 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
852 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
853 const char *domain
, *full
;
855 _cleanup_free_
char *hashed
= NULL
;
860 domain
= strrchr(address
, '@');
862 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
863 "Address does not contain '@': \"%s\"", address
);
864 if (domain
== address
|| domain
[1] == '\0')
865 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
866 "Address starts or ends with '@': \"%s\"", address
);
869 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
871 return log_error_errno(r
, "Hashing failed: %m");
873 strshorten(hashed
, 56);
875 full
= strjoina(hashed
, "._openpgpkey.", domain
);
876 log_debug("Looking up \"%s\".", full
);
878 r
= resolve_record(bus
, full
,
879 arg_class
?: DNS_CLASS_IN
,
880 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
882 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
883 hashed
= mfree(hashed
);
884 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
886 return log_error_errno(r
, "Hashing failed: %m");
888 full
= strjoina(hashed
, "._openpgpkey.", domain
);
889 log_debug("Looking up \"%s\".", full
);
891 return resolve_record(bus
, full
,
892 arg_class
?: DNS_CLASS_IN
,
893 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
899 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
900 sd_bus
*bus
= userdata
;
904 STRV_FOREACH(p
, argv
+ 1) {
905 q
= resolve_openpgp(bus
, *p
);
913 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
915 uint16_t port_num
= 443;
916 _cleanup_free_
char *full
= NULL
;
922 port
= strrchr(address
, ':');
924 r
= parse_ip_port(port
+ 1, &port_num
);
926 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
928 address
= strndupa(address
, port
- address
);
931 r
= asprintf(&full
, "_%u._%s.%s",
938 log_debug("Looking up \"%s\".", full
);
940 return resolve_record(bus
, full
,
941 arg_class
?: DNS_CLASS_IN
,
942 arg_type
?: DNS_TYPE_TLSA
, true);
945 static bool service_family_is_valid(const char *s
) {
946 return STR_IN_SET(s
, "tcp", "udp", "sctp");
949 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
950 sd_bus
*bus
= userdata
;
951 char **p
, **args
= argv
+ 1;
952 const char *family
= "tcp";
955 if (service_family_is_valid(argv
[1])) {
960 STRV_FOREACH(p
, args
) {
961 q
= resolve_tlsa(bus
, family
, *p
);
969 static int show_statistics(int argc
, char **argv
, void *userdata
) {
970 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
971 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
972 _cleanup_(table_unrefp
) Table
*table
= NULL
;
973 sd_bus
*bus
= userdata
;
974 uint64_t n_current_transactions
, n_total_transactions
,
975 cache_size
, n_cache_hit
, n_cache_miss
,
976 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
977 int r
, dnssec_supported
;
981 r
= bus_get_property_trivial(bus
, bus_resolve_mgr
, "DNSSECSupported", &error
, 'b', &dnssec_supported
);
983 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
985 printf("DNSSEC supported by current servers: %s%s%s\n\n",
987 yes_no(dnssec_supported
),
990 r
= bus_get_property(bus
, bus_resolve_mgr
, "TransactionStatistics", &error
, &reply
, "(tt)");
992 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
994 r
= sd_bus_message_read(reply
, "(tt)",
995 &n_current_transactions
,
996 &n_total_transactions
);
998 return bus_log_parse_error(r
);
1000 reply
= sd_bus_message_unref(reply
);
1002 r
= bus_get_property(bus
, bus_resolve_mgr
, "CacheStatistics", &error
, &reply
, "(ttt)");
1004 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1006 r
= sd_bus_message_read(reply
, "(ttt)",
1011 return bus_log_parse_error(r
);
1013 reply
= sd_bus_message_unref(reply
);
1015 r
= bus_get_property(bus
, bus_resolve_mgr
, "DNSSECStatistics", &error
, &reply
, "(tttt)");
1017 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1019 r
= sd_bus_message_read(reply
, "(tttt)",
1023 &n_dnssec_indeterminate
);
1025 return bus_log_parse_error(r
);
1027 table
= table_new("key", "value");
1031 table_set_header(table
, false);
1033 r
= table_add_many(table
,
1034 TABLE_STRING
, "Transactions",
1035 TABLE_SET_COLOR
, ansi_highlight(),
1037 TABLE_STRING
, "Current Transactions:",
1038 TABLE_SET_ALIGN_PERCENT
, 100,
1039 TABLE_UINT64
, n_current_transactions
,
1040 TABLE_STRING
, "Total Transactions:",
1041 TABLE_UINT64
, n_total_transactions
,
1042 TABLE_EMPTY
, TABLE_EMPTY
,
1043 TABLE_STRING
, "Cache",
1044 TABLE_SET_COLOR
, ansi_highlight(),
1045 TABLE_SET_ALIGN_PERCENT
, 0,
1047 TABLE_STRING
, "Current Cache Size:",
1048 TABLE_SET_ALIGN_PERCENT
, 100,
1049 TABLE_UINT64
, cache_size
,
1050 TABLE_STRING
, "Cache Hits:",
1051 TABLE_UINT64
, n_cache_hit
,
1052 TABLE_STRING
, "Cache Misses:",
1053 TABLE_UINT64
, n_cache_miss
,
1054 TABLE_EMPTY
, TABLE_EMPTY
,
1055 TABLE_STRING
, "DNSSEC Verdicts",
1056 TABLE_SET_COLOR
, ansi_highlight(),
1057 TABLE_SET_ALIGN_PERCENT
, 0,
1059 TABLE_STRING
, "Secure:",
1060 TABLE_SET_ALIGN_PERCENT
, 100,
1061 TABLE_UINT64
, n_dnssec_secure
,
1062 TABLE_STRING
, "Insecure:",
1063 TABLE_UINT64
, n_dnssec_insecure
,
1064 TABLE_STRING
, "Bogus:",
1065 TABLE_UINT64
, n_dnssec_bogus
,
1066 TABLE_STRING
, "Indeterminate:",
1067 TABLE_UINT64
, n_dnssec_indeterminate
);
1069 table_log_add_error(r
);
1071 r
= table_print(table
, NULL
);
1073 return table_log_print_error(r
);
1078 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1079 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1080 sd_bus
*bus
= userdata
;
1083 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetStatistics", &error
, NULL
, NULL
);
1085 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1090 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1091 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1092 sd_bus
*bus
= userdata
;
1095 r
= bus_call_method(bus
, bus_resolve_mgr
, "FlushCaches", &error
, NULL
, NULL
);
1097 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1102 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1103 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1104 sd_bus
*bus
= userdata
;
1107 r
= bus_call_method(bus
, bus_resolve_mgr
, "ResetServerFeatures", &error
, NULL
, NULL
);
1109 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1114 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, bool extended
, char **ret
) {
1115 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1116 _cleanup_free_
char *pretty
= NULL
;
1117 int ifindex
, family
, r
, k
;
1118 union in_addr_union a
;
1119 const char *name
= NULL
;
1125 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? (extended
? "iiayqs" : "iiay") : (extended
? "iayqs" : "iay"));
1130 r
= sd_bus_message_read(m
, "i", &ifindex
);
1135 k
= bus_message_read_in_addr_auto(m
, &error
, &family
, &a
);
1136 if (k
< 0 && !sd_bus_error_has_name(&error
, SD_BUS_ERROR_INVALID_ARGS
))
1140 r
= sd_bus_message_read(m
, "q", &port
);
1144 r
= sd_bus_message_read(m
, "s", &name
);
1149 r
= sd_bus_message_exit_container(m
);
1154 log_debug("Invalid DNS server, ignoring: %s", bus_error_message(&error
, k
));
1159 if (with_ifindex
&& ifindex
!= 0) {
1160 /* only show the global ones here */
1165 r
= in_addr_port_ifindex_name_to_string(family
, &a
, port
, ifindex
, name
, &pretty
);
1169 *ret
= TAKE_PTR(pretty
);
1174 static int map_link_dns_servers_internal(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
, bool extended
) {
1175 char ***l
= userdata
;
1183 r
= sd_bus_message_enter_container(m
, 'a', extended
? "(iayqs)" : "(iay)");
1188 _cleanup_free_
char *pretty
= NULL
;
1190 r
= read_dns_server_one(m
, false, extended
, &pretty
);
1196 if (isempty(pretty
))
1199 r
= strv_consume(l
, TAKE_PTR(pretty
));
1204 r
= sd_bus_message_exit_container(m
);
1211 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1212 return map_link_dns_servers_internal(bus
, member
, m
, error
, userdata
, false);
1215 static int map_link_dns_servers_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1216 return map_link_dns_servers_internal(bus
, member
, m
, error
, userdata
, true);
1219 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1223 return read_dns_server_one(m
, false, false, userdata
);
1226 static int map_link_current_dns_server_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1230 return read_dns_server_one(m
, false, true, userdata
);
1233 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1234 _cleanup_free_
char *str
= NULL
;
1235 int ifindex
, route_only
, r
;
1242 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1244 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1248 if (with_ifindex
&& ifindex
!= 0) {
1249 /* only show the global ones here */
1255 str
= strjoin("~", domain
);
1257 str
= strdup(domain
);
1261 *ret
= TAKE_PTR(str
);
1266 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1267 char ***l
= userdata
;
1275 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1280 _cleanup_free_
char *pretty
= NULL
;
1282 r
= read_domain_one(m
, false, &pretty
);
1288 if (isempty(pretty
))
1291 r
= strv_consume(l
, TAKE_PTR(pretty
));
1296 r
= sd_bus_message_exit_container(m
);
1305 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1306 const unsigned indent
= strlen("Global: "); /* Use the same indentation everywhere to make things nice */
1310 printf("%s%nLink %i (%s)%n%s:", ansi_highlight(), &pos1
, ifindex
, ifname
, &pos2
, ansi_normal());
1312 printf("%s%nGlobal%n%s:", ansi_highlight(), &pos1
, &pos2
, ansi_normal());
1314 size_t cols
= columns(), position
= pos2
- pos1
+ 2;
1317 STRV_FOREACH(i
, p
) {
1318 size_t our_len
= utf8_console_width(*i
); /* This returns -1 on invalid utf-8 (which shouldn't happen).
1319 * If that happens, we'll just print one item per line. */
1321 if (position
<= indent
|| size_add(size_add(position
, 1), our_len
) < cols
) {
1323 position
= size_add(size_add(position
, 1), our_len
);
1325 printf("\n%*s%s", indent
, "", *i
);
1326 position
= size_add(our_len
, indent
);
1335 static int status_print_strv_global(char **p
) {
1336 return status_print_strv_ifindex(0, NULL
, p
);
1339 typedef struct LinkInfo
{
1340 uint64_t scopes_mask
;
1343 const char *dns_over_tls
;
1346 char *current_dns_ex
;
1351 bool dnssec_supported
;
1355 typedef struct GlobalInfo
{
1357 char *current_dns_ex
;
1360 char **fallback_dns
;
1361 char **fallback_dns_ex
;
1366 const char *dns_over_tls
;
1368 const char *resolv_conf_mode
;
1369 bool dnssec_supported
;
1372 static void link_info_clear(LinkInfo
*p
) {
1373 free(p
->current_dns
);
1374 free(p
->current_dns_ex
);
1376 strv_free(p
->dns_ex
);
1377 strv_free(p
->domains
);
1381 static void global_info_clear(GlobalInfo
*p
) {
1382 free(p
->current_dns
);
1383 free(p
->current_dns_ex
);
1385 strv_free(p
->dns_ex
);
1386 strv_free(p
->fallback_dns
);
1387 strv_free(p
->fallback_dns_ex
);
1388 strv_free(p
->domains
);
1392 static int dump_list(Table
*table
, const char *prefix
, char * const *l
) {
1395 if (strv_isempty(l
))
1398 r
= table_add_many(table
,
1399 TABLE_STRING
, prefix
,
1400 TABLE_STRV_WRAPPED
, l
);
1402 return table_log_add_error(r
);
1407 static int strv_extend_extended_bool(char ***strv
, const char *name
, const char *value
) {
1411 r
= parse_boolean(value
);
1413 return strv_extendf(strv
, "%s%s", plus_minus(r
), name
);
1416 return strv_extendf(strv
, "%s=%s", name
, value
?: "???");
1419 static char** link_protocol_status(const LinkInfo
*info
) {
1420 _cleanup_strv_free_
char **s
= NULL
;
1422 if (strv_extendf(&s
, "%sDefaultRoute", plus_minus(info
->default_route
)) < 0)
1425 if (strv_extend_extended_bool(&s
, "LLMNR", info
->llmnr
) < 0)
1428 if (strv_extend_extended_bool(&s
, "mDNS", info
->mdns
) < 0)
1431 if (strv_extend_extended_bool(&s
, "DNSOverTLS", info
->dns_over_tls
) < 0)
1434 if (strv_extendf(&s
, "DNSSEC=%s/%s",
1435 info
->dnssec
?: "???",
1436 info
->dnssec_supported
? "supported" : "unsupported") < 0)
1442 static char** global_protocol_status(const GlobalInfo
*info
) {
1443 _cleanup_strv_free_
char **s
= NULL
;
1445 if (strv_extend_extended_bool(&s
, "LLMNR", info
->llmnr
) < 0)
1448 if (strv_extend_extended_bool(&s
, "mDNS", info
->mdns
) < 0)
1451 if (strv_extend_extended_bool(&s
, "DNSOverTLS", info
->dns_over_tls
) < 0)
1454 if (strv_extendf(&s
, "DNSSEC=%s/%s",
1455 info
->dnssec
?: "???",
1456 info
->dnssec_supported
? "supported" : "unsupported") < 0)
1462 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1463 static const struct bus_properties_map property_map
[] = {
1464 { "ScopesMask", "t", NULL
, offsetof(LinkInfo
, scopes_mask
) },
1465 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(LinkInfo
, dns
) },
1466 { "DNSEx", "a(iayqs)", map_link_dns_servers_ex
, offsetof(LinkInfo
, dns_ex
) },
1467 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(LinkInfo
, current_dns
) },
1468 { "CurrentDNSServerEx", "(iayqs)", map_link_current_dns_server_ex
, offsetof(LinkInfo
, current_dns_ex
) },
1469 { "Domains", "a(sb)", map_link_domains
, offsetof(LinkInfo
, domains
) },
1470 { "DefaultRoute", "b", NULL
, offsetof(LinkInfo
, default_route
) },
1471 { "LLMNR", "s", NULL
, offsetof(LinkInfo
, llmnr
) },
1472 { "MulticastDNS", "s", NULL
, offsetof(LinkInfo
, mdns
) },
1473 { "DNSOverTLS", "s", NULL
, offsetof(LinkInfo
, dns_over_tls
) },
1474 { "DNSSEC", "s", NULL
, offsetof(LinkInfo
, dnssec
) },
1475 { "DNSSECNegativeTrustAnchors", "as", bus_map_strv_sort
, offsetof(LinkInfo
, ntas
) },
1476 { "DNSSECSupported", "b", NULL
, offsetof(LinkInfo
, dnssec_supported
) },
1479 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1480 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1481 _cleanup_(link_info_clear
) LinkInfo link_info
= {};
1482 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1483 _cleanup_free_
char *p
= NULL
;
1484 char ifi
[DECIMAL_STR_MAX(int)], ifname
[IF_NAMESIZE
+ 1] = "";
1488 assert(ifindex
> 0);
1491 if (!format_ifname(ifindex
, ifname
))
1492 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1497 xsprintf(ifi
, "%i", ifindex
);
1498 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1502 r
= bus_map_all_properties(bus
,
1503 "org.freedesktop.resolve1",
1506 BUS_MAP_BOOLEAN_AS_BOOL
,
1511 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1513 (void) pager_open(arg_pager_flags
);
1515 if (mode
== STATUS_DNS
)
1516 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns_ex
?: link_info
.dns
);
1518 if (mode
== STATUS_DOMAIN
)
1519 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1521 if (mode
== STATUS_NTA
)
1522 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1524 if (mode
== STATUS_DEFAULT_ROUTE
) {
1525 printf("%sLink %i (%s)%s: %s\n",
1526 ansi_highlight(), ifindex
, name
, ansi_normal(),
1527 yes_no(link_info
.default_route
));
1532 if (mode
== STATUS_LLMNR
) {
1533 printf("%sLink %i (%s)%s: %s\n",
1534 ansi_highlight(), ifindex
, name
, ansi_normal(),
1535 strna(link_info
.llmnr
));
1540 if (mode
== STATUS_MDNS
) {
1541 printf("%sLink %i (%s)%s: %s\n",
1542 ansi_highlight(), ifindex
, name
, ansi_normal(),
1543 strna(link_info
.mdns
));
1548 if (mode
== STATUS_PRIVATE
) {
1549 printf("%sLink %i (%s)%s: %s\n",
1550 ansi_highlight(), ifindex
, name
, ansi_normal(),
1551 strna(link_info
.dns_over_tls
));
1556 if (mode
== STATUS_DNSSEC
) {
1557 printf("%sLink %i (%s)%s: %s\n",
1558 ansi_highlight(), ifindex
, name
, ansi_normal(),
1559 strna(link_info
.dnssec
));
1564 if (empty_line
&& *empty_line
)
1565 fputc('\n', stdout
);
1567 printf("%sLink %i (%s)%s\n",
1568 ansi_highlight(), ifindex
, name
, ansi_normal());
1570 table
= table_new("key", "value");
1574 table_set_header(table
, false);
1576 r
= table_add_many(table
,
1577 TABLE_STRING
, "Current Scopes:",
1578 TABLE_SET_ALIGN_PERCENT
, 100);
1580 return table_log_add_error(r
);
1582 if (link_info
.scopes_mask
== 0)
1583 r
= table_add_cell(table
, NULL
, TABLE_STRING
, "none");
1585 _cleanup_free_
char *buf
= NULL
;
1588 if (asprintf(&buf
, "%s%s%s%s%s",
1589 link_info
.scopes_mask
& SD_RESOLVED_DNS
? "DNS " : "",
1590 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? "LLMNR/IPv4 " : "",
1591 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? "LLMNR/IPv6 " : "",
1592 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? "mDNS/IPv4 " : "",
1593 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? "mDNS/IPv6 " : "") < 0)
1598 buf
[len
- 1] = '\0';
1600 r
= table_add_cell(table
, NULL
, TABLE_STRING
, buf
);
1603 return table_log_add_error(r
);
1605 _cleanup_strv_free_
char **pstatus
= link_protocol_status(&link_info
);
1609 r
= table_add_many(table
,
1610 TABLE_STRING
, "Protocols:",
1611 TABLE_STRV_WRAPPED
, pstatus
);
1613 return table_log_add_error(r
);
1615 if (link_info
.current_dns
) {
1616 r
= table_add_many(table
,
1617 TABLE_STRING
, "Current DNS Server:",
1618 TABLE_STRING
, link_info
.current_dns_ex
?: link_info
.current_dns
);
1620 return table_log_add_error(r
);
1623 r
= dump_list(table
, "DNS Servers:", link_info
.dns_ex
?: link_info
.dns
);
1627 r
= dump_list(table
, "DNS Domain:", link_info
.domains
);
1631 r
= table_print(table
, NULL
);
1633 return table_log_print_error(r
);
1641 static int map_global_dns_servers_internal(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
, bool extended
) {
1642 char ***l
= userdata
;
1650 r
= sd_bus_message_enter_container(m
, 'a', extended
? "(iiayqs)" : "(iiay)");
1655 _cleanup_free_
char *pretty
= NULL
;
1657 r
= read_dns_server_one(m
, true, extended
, &pretty
);
1663 if (isempty(pretty
))
1666 r
= strv_consume(l
, TAKE_PTR(pretty
));
1671 r
= sd_bus_message_exit_container(m
);
1678 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1679 return map_global_dns_servers_internal(bus
, member
, m
, error
, userdata
, false);
1682 static int map_global_dns_servers_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1683 return map_global_dns_servers_internal(bus
, member
, m
, error
, userdata
, true);
1686 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1690 return read_dns_server_one(m
, true, false, userdata
);
1693 static int map_global_current_dns_server_ex(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1697 return read_dns_server_one(m
, true, true, userdata
);
1700 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1701 char ***l
= userdata
;
1709 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1714 _cleanup_free_
char *pretty
= NULL
;
1716 r
= read_domain_one(m
, true, &pretty
);
1722 if (isempty(pretty
))
1725 r
= strv_consume(l
, TAKE_PTR(pretty
));
1730 r
= sd_bus_message_exit_container(m
);
1739 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1740 static const struct bus_properties_map property_map
[] = {
1741 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(GlobalInfo
, dns
) },
1742 { "DNSEx", "a(iiayqs)", map_global_dns_servers_ex
, offsetof(GlobalInfo
, dns_ex
) },
1743 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(GlobalInfo
, fallback_dns
) },
1744 { "FallbackDNSEx", "a(iiayqs)", map_global_dns_servers_ex
, offsetof(GlobalInfo
, fallback_dns_ex
) },
1745 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(GlobalInfo
, current_dns
) },
1746 { "CurrentDNSServerEx", "(iiayqs)", map_global_current_dns_server_ex
, offsetof(GlobalInfo
, current_dns_ex
) },
1747 { "Domains", "a(isb)", map_global_domains
, offsetof(GlobalInfo
, domains
) },
1748 { "DNSSECNegativeTrustAnchors", "as", bus_map_strv_sort
, offsetof(GlobalInfo
, ntas
) },
1749 { "LLMNR", "s", NULL
, offsetof(GlobalInfo
, llmnr
) },
1750 { "MulticastDNS", "s", NULL
, offsetof(GlobalInfo
, mdns
) },
1751 { "DNSOverTLS", "s", NULL
, offsetof(GlobalInfo
, dns_over_tls
) },
1752 { "DNSSEC", "s", NULL
, offsetof(GlobalInfo
, dnssec
) },
1753 { "DNSSECSupported", "b", NULL
, offsetof(GlobalInfo
, dnssec_supported
) },
1754 { "ResolvConfMode", "s", NULL
, offsetof(GlobalInfo
, resolv_conf_mode
) },
1757 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1758 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1759 _cleanup_(global_info_clear
) GlobalInfo global_info
= {};
1760 _cleanup_(table_unrefp
) Table
*table
= NULL
;
1766 r
= bus_map_all_properties(bus
,
1767 "org.freedesktop.resolve1",
1768 "/org/freedesktop/resolve1",
1770 BUS_MAP_BOOLEAN_AS_BOOL
,
1775 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1777 (void) pager_open(arg_pager_flags
);
1779 if (mode
== STATUS_DNS
)
1780 return status_print_strv_global(global_info
.dns_ex
?: global_info
.dns
);
1782 if (mode
== STATUS_DOMAIN
)
1783 return status_print_strv_global(global_info
.domains
);
1785 if (mode
== STATUS_NTA
)
1786 return status_print_strv_global(global_info
.ntas
);
1788 if (mode
== STATUS_LLMNR
) {
1789 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1790 strna(global_info
.llmnr
));
1795 if (mode
== STATUS_MDNS
) {
1796 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1797 strna(global_info
.mdns
));
1802 if (mode
== STATUS_PRIVATE
) {
1803 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1804 strna(global_info
.dns_over_tls
));
1809 if (mode
== STATUS_DNSSEC
) {
1810 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1811 strna(global_info
.dnssec
));
1816 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1818 table
= table_new("key", "value");
1822 table_set_header(table
, false);
1824 _cleanup_strv_free_
char **pstatus
= global_protocol_status(&global_info
);
1828 r
= table_add_many(table
,
1829 TABLE_STRING
, "Protocols:",
1830 TABLE_SET_ALIGN_PERCENT
, 100,
1831 TABLE_STRV_WRAPPED
, pstatus
);
1833 return table_log_add_error(r
);
1835 if (global_info
.resolv_conf_mode
) {
1836 r
= table_add_many(table
,
1837 TABLE_STRING
, "resolv.conf mode:",
1838 TABLE_STRING
, global_info
.resolv_conf_mode
);
1840 return table_log_add_error(r
);
1843 if (global_info
.current_dns
) {
1844 r
= table_add_many(table
,
1845 TABLE_STRING
, "Current DNS Server:",
1846 TABLE_STRING
, global_info
.current_dns_ex
?: global_info
.current_dns
);
1848 return table_log_add_error(r
);
1851 r
= dump_list(table
, "DNS Servers:", global_info
.dns_ex
?: global_info
.dns
);
1855 r
= dump_list(table
, "Fallback DNS Servers:", global_info
.fallback_dns_ex
?: global_info
.fallback_dns
);
1859 r
= dump_list(table
, "DNS Domain:", global_info
.domains
);
1863 r
= table_print(table
, NULL
);
1865 return table_log_print_error(r
);
1872 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1873 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1874 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1875 bool empty_line
= false;
1880 r
= status_global(bus
, mode
, &empty_line
);
1884 r
= sd_netlink_open(&rtnl
);
1886 return log_error_errno(r
, "Failed to connect to netlink: %m");
1888 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1890 return rtnl_log_create_error(r
);
1892 r
= sd_netlink_message_request_dump(req
, true);
1894 return rtnl_log_create_error(r
);
1896 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1898 return log_error_errno(r
, "Failed to enumerate links: %m");
1900 _cleanup_free_ InterfaceInfo
*infos
= NULL
;
1901 size_t n_allocated
= 0, n_infos
= 0;
1903 for (sd_netlink_message
*i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1908 r
= sd_netlink_message_get_type(i
, &type
);
1910 return rtnl_log_parse_error(r
);
1912 if (type
!= RTM_NEWLINK
)
1915 r
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1917 return rtnl_log_parse_error(r
);
1919 if (ifindex
== LOOPBACK_IFINDEX
)
1922 r
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1924 return rtnl_log_parse_error(r
);
1926 if (!GREEDY_REALLOC(infos
, n_allocated
, n_infos
+ 1))
1929 infos
[n_infos
++] = (InterfaceInfo
) { ifindex
, name
};
1932 typesafe_qsort(infos
, n_infos
, interface_info_compare
);
1935 for (size_t i
= 0; i
< n_infos
; i
++) {
1936 int q
= status_ifindex(bus
, infos
[i
].index
, infos
[i
].name
, mode
, &empty_line
);
1937 if (q
< 0 && r
>= 0)
1944 static int verb_status(int argc
, char **argv
, void *userdata
) {
1945 sd_bus
*bus
= userdata
;
1946 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1951 bool empty_line
= false;
1953 STRV_FOREACH(ifname
, argv
+ 1) {
1956 ifindex
= resolve_interface(&rtnl
, *ifname
);
1958 log_warning_errno(ifindex
, "Failed to resolve interface \"%s\", ignoring: %m", *ifname
);
1962 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1967 r
= status_all(bus
, STATUS_ALL
);
1972 static int call_dns(sd_bus
*bus
, char **dns
, const BusLocator
*locator
, sd_bus_error
*error
, bool extended
) {
1973 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1977 r
= bus_message_new_method_call(bus
, &req
, locator
, extended
? "SetLinkDNSEx" : "SetLinkDNS");
1979 return bus_log_create_error(r
);
1981 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1983 return bus_log_create_error(r
);
1985 r
= sd_bus_message_open_container(req
, 'a', extended
? "(iayqs)" : "(iay)");
1987 return bus_log_create_error(r
);
1989 /* If only argument is the empty string, then call SetLinkDNS() with an
1990 * empty list, which will clear the list of domains for an interface. */
1991 if (!strv_equal(dns
, STRV_MAKE("")))
1992 STRV_FOREACH(p
, dns
) {
1993 _cleanup_free_
char *name
= NULL
;
1994 struct in_addr_data data
;
1998 r
= in_addr_port_ifindex_name_from_string_auto(*p
, &data
.family
, &data
.address
, &port
, &ifindex
, &name
);
2000 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
2002 if (ifindex
!= 0 && ifindex
!= arg_ifindex
)
2003 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Invalid ifindex: %i", ifindex
);
2005 r
= sd_bus_message_open_container(req
, 'r', extended
? "iayqs" : "iay");
2007 return bus_log_create_error(r
);
2009 r
= sd_bus_message_append(req
, "i", data
.family
);
2011 return bus_log_create_error(r
);
2013 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
2015 return bus_log_create_error(r
);
2018 r
= sd_bus_message_append(req
, "q", port
);
2020 return bus_log_create_error(r
);
2022 r
= sd_bus_message_append(req
, "s", name
);
2024 return bus_log_create_error(r
);
2027 r
= sd_bus_message_close_container(req
);
2029 return bus_log_create_error(r
);
2032 r
= sd_bus_message_close_container(req
);
2034 return bus_log_create_error(r
);
2036 r
= sd_bus_call(bus
, req
, 0, error
, NULL
);
2037 if (r
< 0 && extended
&& sd_bus_error_has_name(error
, SD_BUS_ERROR_UNKNOWN_METHOD
)) {
2038 sd_bus_error_free(error
);
2039 return call_dns(bus
, dns
, locator
, error
, false);
2044 static int verb_dns(int argc
, char **argv
, void *userdata
) {
2045 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2046 sd_bus
*bus
= userdata
;
2052 r
= ifname_mangle(argv
[1]);
2057 if (arg_ifindex
<= 0)
2058 return status_all(bus
, STATUS_DNS
);
2061 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
2063 r
= call_dns(bus
, argv
+ 2, bus_resolve_mgr
, &error
, true);
2064 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2065 sd_bus_error_free(&error
);
2067 r
= call_dns(bus
, argv
+ 2, bus_network_mgr
, &error
, true);
2070 if (arg_ifindex_permissive
&&
2071 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2074 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
2080 static int call_domain(sd_bus
*bus
, char **domain
, const BusLocator
*locator
, sd_bus_error
*error
) {
2081 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2085 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDomains");
2087 return bus_log_create_error(r
);
2089 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2091 return bus_log_create_error(r
);
2093 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
2095 return bus_log_create_error(r
);
2097 /* If only argument is the empty string, then call SetLinkDomains() with an
2098 * empty list, which will clear the list of domains for an interface. */
2099 if (!strv_equal(domain
, STRV_MAKE("")))
2100 STRV_FOREACH(p
, domain
) {
2103 n
= **p
== '~' ? *p
+ 1 : *p
;
2105 r
= dns_name_is_valid(n
);
2107 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
2109 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2110 "Domain not valid: %s",
2113 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
2115 return bus_log_create_error(r
);
2118 r
= sd_bus_message_close_container(req
);
2120 return bus_log_create_error(r
);
2122 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2125 static int verb_domain(int argc
, char **argv
, void *userdata
) {
2126 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2127 sd_bus
*bus
= userdata
;
2133 r
= ifname_mangle(argv
[1]);
2138 if (arg_ifindex
<= 0)
2139 return status_all(bus
, STATUS_DOMAIN
);
2142 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
2144 r
= call_domain(bus
, argv
+ 2, bus_resolve_mgr
, &error
);
2145 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2146 sd_bus_error_free(&error
);
2148 r
= call_domain(bus
, argv
+ 2, bus_network_mgr
, &error
);
2151 if (arg_ifindex_permissive
&&
2152 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2155 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2161 static int verb_default_route(int argc
, char **argv
, void *userdata
) {
2162 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2163 sd_bus
*bus
= userdata
;
2169 r
= ifname_mangle(argv
[1]);
2174 if (arg_ifindex
<= 0)
2175 return status_all(bus
, STATUS_DEFAULT_ROUTE
);
2178 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DEFAULT_ROUTE
, NULL
);
2180 b
= parse_boolean(argv
[2]);
2182 return log_error_errno(b
, "Failed to parse boolean argument: %s", argv
[2]);
2184 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2185 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2186 sd_bus_error_free(&error
);
2188 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDefaultRoute", &error
, NULL
, "ib", arg_ifindex
, b
);
2191 if (arg_ifindex_permissive
&&
2192 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2195 return log_error_errno(r
, "Failed to set default route configuration: %s", bus_error_message(&error
, r
));
2201 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2202 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2203 sd_bus
*bus
= userdata
;
2209 r
= ifname_mangle(argv
[1]);
2214 if (arg_ifindex
<= 0)
2215 return status_all(bus
, STATUS_LLMNR
);
2218 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2220 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2221 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2222 sd_bus_error_free(&error
);
2224 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkLLMNR", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2227 if (arg_ifindex_permissive
&&
2228 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2231 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2237 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2238 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2239 sd_bus
*bus
= userdata
;
2245 r
= ifname_mangle(argv
[1]);
2250 if (arg_ifindex
<= 0)
2251 return status_all(bus
, STATUS_MDNS
);
2254 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2256 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkMulticastDNS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2257 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2258 sd_bus_error_free(&error
);
2260 r
= bus_call_method(
2263 "SetLinkMulticastDNS",
2266 "is", arg_ifindex
, argv
[2]);
2269 if (arg_ifindex_permissive
&&
2270 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2273 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2279 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2280 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2281 sd_bus
*bus
= userdata
;
2287 r
= ifname_mangle(argv
[1]);
2292 if (arg_ifindex
<= 0)
2293 return status_all(bus
, STATUS_PRIVATE
);
2296 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2298 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSOverTLS", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2299 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2300 sd_bus_error_free(&error
);
2302 r
= bus_call_method(
2305 "SetLinkDNSOverTLS",
2308 "is", arg_ifindex
, argv
[2]);
2311 if (arg_ifindex_permissive
&&
2312 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2315 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2321 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2322 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2323 sd_bus
*bus
= userdata
;
2329 r
= ifname_mangle(argv
[1]);
2334 if (arg_ifindex
<= 0)
2335 return status_all(bus
, STATUS_DNSSEC
);
2338 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2340 r
= bus_call_method(bus
, bus_resolve_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2341 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2342 sd_bus_error_free(&error
);
2344 r
= bus_call_method(bus
, bus_network_mgr
, "SetLinkDNSSEC", &error
, NULL
, "is", arg_ifindex
, argv
[2]);
2347 if (arg_ifindex_permissive
&&
2348 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2351 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2357 static int call_nta(sd_bus
*bus
, char **nta
, const BusLocator
*locator
, sd_bus_error
*error
) {
2358 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2361 r
= bus_message_new_method_call(bus
, &req
, locator
, "SetLinkDNSSECNegativeTrustAnchors");
2363 return bus_log_create_error(r
);
2365 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2367 return bus_log_create_error(r
);
2369 r
= sd_bus_message_append_strv(req
, nta
);
2371 return bus_log_create_error(r
);
2373 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2376 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2377 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2378 sd_bus
*bus
= userdata
;
2386 r
= ifname_mangle(argv
[1]);
2391 if (arg_ifindex
<= 0)
2392 return status_all(bus
, STATUS_NTA
);
2395 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2397 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2398 * with an empty list, which will clear the list of domains for an interface. */
2399 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2402 STRV_FOREACH(p
, argv
+ 2) {
2403 r
= dns_name_is_valid(*p
);
2405 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2407 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2408 "Domain not valid: %s",
2412 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_resolve_mgr
, &error
);
2413 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2414 sd_bus_error_free(&error
);
2416 r
= call_nta(bus
, clear
? NULL
: argv
+ 2, bus_network_mgr
, &error
);
2419 if (arg_ifindex_permissive
&&
2420 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2423 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2429 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2430 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2431 sd_bus
*bus
= userdata
;
2437 r
= ifname_mangle(argv
[1]);
2442 if (arg_ifindex
<= 0)
2443 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Interface argument required.");
2445 r
= bus_call_method(bus
, bus_resolve_mgr
, "RevertLink", &error
, NULL
, "i", arg_ifindex
);
2446 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2447 sd_bus_error_free(&error
);
2449 r
= bus_call_method(bus
, bus_network_mgr
, "RevertLinkDNS", &error
, NULL
, "i", arg_ifindex
);
2452 if (arg_ifindex_permissive
&&
2453 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2456 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2462 static int verb_log_level(int argc
, char *argv
[], void *userdata
) {
2463 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2464 sd_bus
*bus
= userdata
;
2470 _cleanup_free_
char *level
= NULL
;
2472 r
= sd_bus_get_property_string(
2474 "org.freedesktop.resolve1",
2475 "/org/freedesktop/LogControl1",
2476 "org.freedesktop.LogControl1",
2481 return log_error_errno(r
, "Failed to get log level: %s", bus_error_message(&error
, r
));
2488 r
= sd_bus_set_property(
2490 "org.freedesktop.resolve1",
2491 "/org/freedesktop/LogControl1",
2492 "org.freedesktop.LogControl1",
2498 return log_error_errno(r
, "Failed to set log level: %s", bus_error_message(&error
, r
));
2504 static void help_protocol_types(void) {
2506 puts("Known protocol types:");
2507 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2510 static void help_dns_types(void) {
2512 puts("Known DNS RR types:");
2514 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2517 static void help_dns_classes(void) {
2519 puts("Known DNS RR classes:");
2521 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2524 static int compat_help(void) {
2525 _cleanup_free_
char *link
= NULL
;
2528 r
= terminal_urlify_man("resolvectl", "1", &link
);
2532 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2533 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2534 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2535 "%1$s [OPTIONS...] --statistics\n"
2536 "%1$s [OPTIONS...] --reset-statistics\n"
2538 "%2$sResolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%3$s\n\n"
2539 " -h --help Show this help\n"
2540 " --version Show package version\n"
2541 " --no-pager Do not pipe output into a pager\n"
2542 " -4 Resolve IPv4 addresses\n"
2543 " -6 Resolve IPv6 addresses\n"
2544 " -i --interface=INTERFACE Look on interface\n"
2545 " -p --protocol=PROTO|help Look via protocol\n"
2546 " -t --type=TYPE|help Query RR with DNS type\n"
2547 " -c --class=CLASS|help Query RR with DNS class\n"
2548 " --service Resolve service (SRV)\n"
2549 " --service-address=BOOL Resolve address for services (default: yes)\n"
2550 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2551 " --openpgp Query OpenPGP public key\n"
2552 " --tlsa Query TLS public key\n"
2553 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2554 " --search=BOOL Use search domains for single-label names\n"
2556 " --raw[=payload|packet] Dump the answer as binary data\n"
2557 " --legend=BOOL Print headers and additional info (default: yes)\n"
2558 " --statistics Show resolver statistics\n"
2559 " --reset-statistics Reset resolver statistics\n"
2560 " --status Show link and server status\n"
2561 " --flush-caches Flush all local DNS caches\n"
2562 " --reset-server-features\n"
2563 " Forget learnt DNS server feature levels\n"
2564 " --set-dns=SERVER Set per-interface DNS server address\n"
2565 " --set-domain=DOMAIN Set per-interface search domain\n"
2566 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2567 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2568 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2569 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2570 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2571 " --revert Revert per-interface configuration\n"
2572 "\nSee the %4$s for details.\n"
2573 , program_invocation_short_name
2582 static int native_help(void) {
2583 _cleanup_free_
char *link
= NULL
;
2586 r
= terminal_urlify_man("resolvectl", "1", &link
);
2590 printf("%s [OPTIONS...] COMMAND ...\n"
2592 "%sSend control commands to the network name resolution manager, or%s\n"
2593 "%sresolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%s\n"
2595 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2596 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2597 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2598 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2599 " status [LINK...] Show link and server status\n"
2600 " statistics Show resolver statistics\n"
2601 " reset-statistics Reset resolver statistics\n"
2602 " flush-caches Flush all local DNS caches\n"
2603 " reset-server-features Forget learnt DNS server feature levels\n"
2604 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2605 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2606 " default-route [LINK [BOOL]] Get/set per-interface default route flag\n"
2607 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2608 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2609 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2610 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2611 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2612 " revert LINK Revert per-interface configuration\n"
2613 " log-level [LEVEL] Get/set logging threshold for systemd-resolved\n"
2615 " -h --help Show this help\n"
2616 " --version Show package version\n"
2617 " --no-pager Do not pipe output into a pager\n"
2618 " -4 Resolve IPv4 addresses\n"
2619 " -6 Resolve IPv6 addresses\n"
2620 " -i --interface=INTERFACE Look on interface\n"
2621 " -p --protocol=PROTO|help Look via protocol\n"
2622 " -t --type=TYPE|help Query RR with DNS type\n"
2623 " -c --class=CLASS|help Query RR with DNS class\n"
2624 " --service-address=BOOL Resolve address for services (default: yes)\n"
2625 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2626 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2627 " --search=BOOL Use search domains for single-label names\n"
2629 " --raw[=payload|packet] Dump the answer as binary data\n"
2630 " --legend=BOOL Print headers and additional info (default: yes)\n"
2631 "\nSee the %s for details.\n"
2632 , program_invocation_short_name
2643 static int verb_help(int argc
, char **argv
, void *userdata
) {
2644 return native_help();
2647 static int compat_parse_argv(int argc
, char *argv
[]) {
2649 ARG_VERSION
= 0x100,
2653 ARG_SERVICE_ADDRESS
,
2660 ARG_RESET_STATISTICS
,
2663 ARG_RESET_SERVER_FEATURES
,
2675 static const struct option options
[] = {
2676 { "help", no_argument
, NULL
, 'h' },
2677 { "version", no_argument
, NULL
, ARG_VERSION
},
2678 { "type", required_argument
, NULL
, 't' },
2679 { "class", required_argument
, NULL
, 'c' },
2680 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2681 { "interface", required_argument
, NULL
, 'i' },
2682 { "protocol", required_argument
, NULL
, 'p' },
2683 { "cname", required_argument
, NULL
, ARG_CNAME
},
2684 { "service", no_argument
, NULL
, ARG_SERVICE
},
2685 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2686 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2687 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2688 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2689 { "raw", optional_argument
, NULL
, ARG_RAW
},
2690 { "search", required_argument
, NULL
, ARG_SEARCH
},
2691 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2692 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2693 { "status", no_argument
, NULL
, ARG_STATUS
},
2694 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2695 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2696 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2697 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2698 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2699 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2700 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2701 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2702 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2703 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2704 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2713 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2717 return compat_help();
2723 arg_family
= AF_INET
;
2727 arg_family
= AF_INET6
;
2731 r
= ifname_mangle(optarg
);
2737 if (streq(optarg
, "help")) {
2742 r
= dns_type_from_string(optarg
);
2744 log_error("Failed to parse RR record type %s", optarg
);
2747 arg_type
= (uint16_t) r
;
2748 assert((int) arg_type
== r
);
2750 arg_mode
= MODE_RESOLVE_RECORD
;
2754 if (streq(optarg
, "help")) {
2759 r
= dns_class_from_string(optarg
);
2761 log_error("Failed to parse RR record class %s", optarg
);
2764 arg_class
= (uint16_t) r
;
2765 assert((int) arg_class
== r
);
2770 r
= parse_boolean(optarg
);
2772 return log_error_errno(r
, "Failed to parse --legend= argument");
2778 if (streq(optarg
, "help")) {
2779 help_protocol_types();
2781 } else if (streq(optarg
, "dns"))
2782 arg_flags
|= SD_RESOLVED_DNS
;
2783 else if (streq(optarg
, "llmnr"))
2784 arg_flags
|= SD_RESOLVED_LLMNR
;
2785 else if (streq(optarg
, "llmnr-ipv4"))
2786 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2787 else if (streq(optarg
, "llmnr-ipv6"))
2788 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2789 else if (streq(optarg
, "mdns"))
2790 arg_flags
|= SD_RESOLVED_MDNS
;
2791 else if (streq(optarg
, "mdns-ipv4"))
2792 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2793 else if (streq(optarg
, "mdns-ipv6"))
2794 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2796 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2797 "Unknown protocol specifier: %s", optarg
);
2802 arg_mode
= MODE_RESOLVE_SERVICE
;
2806 arg_mode
= MODE_RESOLVE_OPENPGP
;
2810 arg_mode
= MODE_RESOLVE_TLSA
;
2811 if (!optarg
|| service_family_is_valid(optarg
))
2812 arg_service_family
= optarg
;
2814 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2815 "Unknown service family \"%s\".", optarg
);
2820 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2821 "Refusing to write binary data to tty.");
2823 if (optarg
== NULL
|| streq(optarg
, "payload"))
2824 arg_raw
= RAW_PAYLOAD
;
2825 else if (streq(optarg
, "packet"))
2826 arg_raw
= RAW_PACKET
;
2828 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2829 "Unknown --raw specifier \"%s\".",
2836 r
= parse_boolean(optarg
);
2838 return log_error_errno(r
, "Failed to parse --cname= argument.");
2839 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2842 case ARG_SERVICE_ADDRESS
:
2843 r
= parse_boolean(optarg
);
2845 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2846 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2849 case ARG_SERVICE_TXT
:
2850 r
= parse_boolean(optarg
);
2852 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2853 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2857 r
= parse_boolean(optarg
);
2859 return log_error_errno(r
, "Failed to parse --search argument.");
2860 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2863 case ARG_STATISTICS
:
2864 arg_mode
= MODE_STATISTICS
;
2867 case ARG_RESET_STATISTICS
:
2868 arg_mode
= MODE_RESET_STATISTICS
;
2871 case ARG_FLUSH_CACHES
:
2872 arg_mode
= MODE_FLUSH_CACHES
;
2875 case ARG_RESET_SERVER_FEATURES
:
2876 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2880 arg_mode
= MODE_STATUS
;
2884 arg_pager_flags
|= PAGER_DISABLE
;
2888 r
= strv_extend(&arg_set_dns
, optarg
);
2892 arg_mode
= MODE_SET_LINK
;
2895 case ARG_SET_DOMAIN
:
2896 r
= strv_extend(&arg_set_domain
, optarg
);
2900 arg_mode
= MODE_SET_LINK
;
2904 arg_set_llmnr
= optarg
;
2905 arg_mode
= MODE_SET_LINK
;
2909 arg_set_mdns
= optarg
;
2910 arg_mode
= MODE_SET_LINK
;
2913 case ARG_SET_PRIVATE
:
2914 arg_set_dns_over_tls
= optarg
;
2915 arg_mode
= MODE_SET_LINK
;
2918 case ARG_SET_DNSSEC
:
2919 arg_set_dnssec
= optarg
;
2920 arg_mode
= MODE_SET_LINK
;
2924 r
= strv_extend(&arg_set_nta
, optarg
);
2928 arg_mode
= MODE_SET_LINK
;
2931 case ARG_REVERT_LINK
:
2932 arg_mode
= MODE_REVERT_LINK
;
2939 assert_not_reached("Unhandled option");
2942 if (arg_type
== 0 && arg_class
!= 0)
2943 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2944 "--class= may only be used in conjunction with --type=.");
2946 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
)
2947 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2948 "--service and --type= may not be combined.");
2950 if (arg_type
!= 0 && arg_class
== 0)
2951 arg_class
= DNS_CLASS_IN
;
2953 if (arg_class
!= 0 && arg_type
== 0)
2954 arg_type
= DNS_TYPE_A
;
2956 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2958 if (arg_ifindex
<= 0)
2959 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2960 "--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2963 return 1 /* work to do */;
2966 static int native_parse_argv(int argc
, char *argv
[]) {
2968 ARG_VERSION
= 0x100,
2971 ARG_SERVICE_ADDRESS
,
2978 static const struct option options
[] = {
2979 { "help", no_argument
, NULL
, 'h' },
2980 { "version", no_argument
, NULL
, ARG_VERSION
},
2981 { "type", required_argument
, NULL
, 't' },
2982 { "class", required_argument
, NULL
, 'c' },
2983 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2984 { "interface", required_argument
, NULL
, 'i' },
2985 { "protocol", required_argument
, NULL
, 'p' },
2986 { "cname", required_argument
, NULL
, ARG_CNAME
},
2987 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2988 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2989 { "raw", optional_argument
, NULL
, ARG_RAW
},
2990 { "search", required_argument
, NULL
, ARG_SEARCH
},
2991 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
3000 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
3004 return native_help();
3010 arg_family
= AF_INET
;
3014 arg_family
= AF_INET6
;
3018 r
= ifname_mangle(optarg
);
3024 if (streq(optarg
, "help")) {
3029 r
= dns_type_from_string(optarg
);
3031 log_error("Failed to parse RR record type %s", optarg
);
3034 arg_type
= (uint16_t) r
;
3035 assert((int) arg_type
== r
);
3040 if (streq(optarg
, "help")) {
3045 r
= dns_class_from_string(optarg
);
3047 log_error("Failed to parse RR record class %s", optarg
);
3050 arg_class
= (uint16_t) r
;
3051 assert((int) arg_class
== r
);
3056 r
= parse_boolean(optarg
);
3058 return log_error_errno(r
, "Failed to parse --legend= argument");
3064 if (streq(optarg
, "help")) {
3065 help_protocol_types();
3067 } else if (streq(optarg
, "dns"))
3068 arg_flags
|= SD_RESOLVED_DNS
;
3069 else if (streq(optarg
, "llmnr"))
3070 arg_flags
|= SD_RESOLVED_LLMNR
;
3071 else if (streq(optarg
, "llmnr-ipv4"))
3072 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
3073 else if (streq(optarg
, "llmnr-ipv6"))
3074 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
3075 else if (streq(optarg
, "mdns"))
3076 arg_flags
|= SD_RESOLVED_MDNS
;
3077 else if (streq(optarg
, "mdns-ipv4"))
3078 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
3079 else if (streq(optarg
, "mdns-ipv6"))
3080 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
3082 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3083 "Unknown protocol specifier: %s",
3090 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
3091 "Refusing to write binary data to tty.");
3093 if (optarg
== NULL
|| streq(optarg
, "payload"))
3094 arg_raw
= RAW_PAYLOAD
;
3095 else if (streq(optarg
, "packet"))
3096 arg_raw
= RAW_PACKET
;
3098 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3099 "Unknown --raw specifier \"%s\".",
3106 r
= parse_boolean(optarg
);
3108 return log_error_errno(r
, "Failed to parse --cname= argument.");
3109 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
3112 case ARG_SERVICE_ADDRESS
:
3113 r
= parse_boolean(optarg
);
3115 return log_error_errno(r
, "Failed to parse --service-address= argument.");
3116 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
3119 case ARG_SERVICE_TXT
:
3120 r
= parse_boolean(optarg
);
3122 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
3123 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
3127 r
= parse_boolean(optarg
);
3129 return log_error_errno(r
, "Failed to parse --search argument.");
3130 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
3134 arg_pager_flags
|= PAGER_DISABLE
;
3141 assert_not_reached("Unhandled option");
3144 if (arg_type
== 0 && arg_class
!= 0)
3145 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3146 "--class= may only be used in conjunction with --type=.");
3148 if (arg_type
!= 0 && arg_class
== 0)
3149 arg_class
= DNS_CLASS_IN
;
3151 if (arg_class
!= 0 && arg_type
== 0)
3152 arg_type
= DNS_TYPE_A
;
3154 return 1 /* work to do */;
3157 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
3159 static const Verb verbs
[] = {
3160 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
3161 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
3162 { "query", 2, VERB_ANY
, 0, verb_query
},
3163 { "service", 2, 4, 0, verb_service
},
3164 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
3165 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
3166 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
3167 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
3168 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
3169 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
3170 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
3171 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
3172 { "default-route", VERB_ANY
, 3, 0, verb_default_route
},
3173 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
3174 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
3175 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
3176 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
3177 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
3178 { "revert", VERB_ANY
, 2, 0, verb_revert_link
},
3179 { "log-level", VERB_ANY
, 2, 0, verb_log_level
},
3183 return dispatch_verb(argc
, argv
, verbs
, bus
);
3186 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
3191 assert(num_args
== 0 || args
);
3193 num
= !!single_arg
+ num_args
+ 1;
3195 p
= fake
= newa0(char *, num
+ 1);
3196 *p
++ = (char *) verb
;
3198 *p
++ = (char *) single_arg
;
3199 for (size_t i
= 0; i
< num_args
; i
++)
3203 return native_main((int) num
, fake
, bus
);
3206 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
3210 case MODE_RESOLVE_HOST
:
3211 case MODE_RESOLVE_RECORD
:
3212 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
3214 case MODE_RESOLVE_SERVICE
:
3215 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
3217 case MODE_RESOLVE_OPENPGP
:
3218 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3220 case MODE_RESOLVE_TLSA
:
3221 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3223 case MODE_STATISTICS
:
3224 return translate("statistics", NULL
, 0, NULL
, bus
);
3226 case MODE_RESET_STATISTICS
:
3227 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3229 case MODE_FLUSH_CACHES
:
3230 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3232 case MODE_RESET_SERVER_FEATURES
:
3233 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3236 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3242 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3247 if (arg_set_domain
) {
3248 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3254 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3259 if (arg_set_llmnr
) {
3260 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3266 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3271 if (arg_set_dns_over_tls
) {
3272 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3277 if (arg_set_dnssec
) {
3278 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3285 case MODE_REVERT_LINK
:
3288 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3291 assert_not_reached("invalid mode");
3297 static int run(int argc
, char **argv
) {
3298 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
3301 setlocale(LC_ALL
, "");
3304 if (streq(program_invocation_short_name
, "resolvconf"))
3305 r
= resolvconf_parse_argv(argc
, argv
);
3306 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3307 r
= compat_parse_argv(argc
, argv
);
3309 r
= native_parse_argv(argc
, argv
);
3313 r
= sd_bus_open_system(&bus
);
3315 return log_error_errno(r
, "sd_bus_open_system: %m");
3317 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3318 return compat_main(argc
, argv
, bus
);
3320 return native_main(argc
, argv
, bus
);
3323 DEFINE_MAIN_FUNCTION(run
);