]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/busctl/busctl.c
tree-wide: define iterator inside of the macro
[thirdparty/systemd.git] / src / busctl / busctl.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
de1c301e 2
1f849790
LP
3#include <getopt.h>
4
de1c301e 5#include "sd-bus.h"
3f6fd1ba 6
b5efdb8a 7#include "alloc-util.h"
2b5c5383 8#include "bus-dump.h"
3f6fd1ba 9#include "bus-internal.h"
2de62253 10#include "bus-message.h"
781fa938 11#include "bus-signature.h"
79f34de9 12#include "bus-type.h"
3f6fd1ba 13#include "bus-util.h"
a1ad3767 14#include "busctl-introspect.h"
4f5dd394 15#include "escape.h"
3ffd4af2 16#include "fd-util.h"
6b0f5484 17#include "fileio.h"
81896fa2 18#include "format-table.h"
9cebb234 19#include "json.h"
8752c575 20#include "locale-util.h"
3f6fd1ba 21#include "log.h"
360f3dc2 22#include "main-func.h"
3f6fd1ba 23#include "pager.h"
6bedfcbb 24#include "parse-util.h"
3f6fd1ba 25#include "path-util.h"
294bf0c3 26#include "pretty-print.h"
3f6fd1ba 27#include "set.h"
760877e9 28#include "sort-util.h"
3f6fd1ba 29#include "strv.h"
288a74cc 30#include "terminal-util.h"
b1d4f8e1 31#include "user-util.h"
9bb31a0c 32#include "verbs.h"
de1c301e 33
9cebb234
LP
34static enum {
35 JSON_OFF,
36 JSON_SHORT,
37 JSON_PRETTY,
38} arg_json = JSON_OFF;
0221d68a 39static PagerFlags arg_pager_flags = 0;
17d47d8d 40static bool arg_legend = true;
b683b82f 41static bool arg_full = false;
5e4c5bde 42static const char *arg_address = NULL;
56e61788
LP
43static bool arg_unique = false;
44static bool arg_acquired = false;
45static bool arg_activatable = false;
46static bool arg_show_machine = false;
1f849790 47static char **arg_matches = NULL;
d75edbd6 48static BusTransport arg_transport = BUS_TRANSPORT_LOCAL;
02bf91ee 49static const char *arg_host = NULL;
d75edbd6 50static bool arg_user = false;
1f70b087 51static size_t arg_snaplen = 4096;
d9130355 52static bool arg_list = false;
781fa938 53static bool arg_quiet = false;
1fc55609 54static bool arg_verbose = false;
d5c8d823 55static bool arg_xml_interface = false;
38051578
LP
56static bool arg_expect_reply = true;
57static bool arg_auto_start = true;
58static bool arg_allow_interactive_authorization = true;
40ed1a45 59static bool arg_augment_creds = true;
56d820b6 60static bool arg_watch_bind = false;
a44b1081 61static usec_t arg_timeout = 0;
143aea38 62static const char *arg_destination = NULL;
1f849790 63
360f3dc2
YW
64STATIC_DESTRUCTOR_REGISTER(arg_matches, strv_freep);
65
1d58a1fe
LP
66#define NAME_IS_ACQUIRED INT_TO_PTR(1)
67#define NAME_IS_ACTIVATABLE INT_TO_PTR(2)
68
2de62253
LP
69static int json_transform_message(sd_bus_message *m, JsonVariant **ret);
70static void json_dump_with_flags(JsonVariant *v, FILE *f);
71
9bb31a0c 72static int acquire_bus(bool set_monitor, sd_bus **ret) {
b1a4981a 73 _cleanup_(sd_bus_close_unrefp) sd_bus *bus = NULL;
9bb31a0c
YW
74 int r;
75
76 r = sd_bus_new(&bus);
77 if (r < 0)
78 return log_error_errno(r, "Failed to allocate bus: %m");
79
80 if (set_monitor) {
81 r = sd_bus_set_monitor(bus, true);
82 if (r < 0)
83 return log_error_errno(r, "Failed to set monitor mode: %m");
84
85 r = sd_bus_negotiate_creds(bus, true, _SD_BUS_CREDS_ALL);
86 if (r < 0)
87 return log_error_errno(r, "Failed to enable credentials: %m");
88
89 r = sd_bus_negotiate_timestamp(bus, true);
90 if (r < 0)
91 return log_error_errno(r, "Failed to enable timestamps: %m");
92
93 r = sd_bus_negotiate_fds(bus, true);
94 if (r < 0)
95 return log_error_errno(r, "Failed to enable fds: %m");
96 }
97
98 r = sd_bus_set_bus_client(bus, true);
99 if (r < 0)
100 return log_error_errno(r, "Failed to set bus client: %m");
101
102 r = sd_bus_set_watch_bind(bus, arg_watch_bind);
103 if (r < 0)
16c347b3
ZJS
104 return log_error_errno(r, "Failed to set watch-bind setting to '%s': %m",
105 yes_no(arg_watch_bind));
9bb31a0c
YW
106
107 if (arg_address)
108 r = sd_bus_set_address(bus, arg_address);
109 else {
110 switch (arg_transport) {
111
112 case BUS_TRANSPORT_LOCAL:
062ac2ea 113 if (arg_user)
9bb31a0c 114 r = bus_set_address_user(bus);
062ac2ea 115 else
9bb31a0c 116 r = bus_set_address_system(bus);
9bb31a0c
YW
117 break;
118
119 case BUS_TRANSPORT_REMOTE:
120 r = bus_set_address_system_remote(bus, arg_host);
121 break;
122
123 case BUS_TRANSPORT_MACHINE:
124 r = bus_set_address_system_machine(bus, arg_host);
125 break;
126
127 default:
128 assert_not_reached("Hmm, unknown transport type.");
129 }
130 }
131 if (r < 0)
132 return log_error_errno(r, "Failed to set address: %m");
133
134 r = sd_bus_start(bus);
135 if (r < 0)
136 return log_error_errno(r, "Failed to connect to bus: %m");
137
1cc6c93a 138 *ret = TAKE_PTR(bus);
9bb31a0c
YW
139
140 return 0;
141}
142
143static int list_bus_names(int argc, char **argv, void *userdata) {
71f2ab46 144 _cleanup_strv_free_ char **acquired = NULL, **activatable = NULL;
81896fa2 145 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
5e2f14e6 146 _cleanup_hashmap_free_ Hashmap *names = NULL;
81896fa2 147 _cleanup_(table_unrefp) Table *table = NULL;
81896fa2
LP
148 char **i, *k;
149 void *v;
150 int r;
151
152 enum {
153 COLUMN_ACTIVATABLE,
154 COLUMN_NAME,
155 COLUMN_PID,
156 COLUMN_PROCESS,
157 COLUMN_USER,
158 COLUMN_CONNECTION,
159 COLUMN_UNIT,
160 COLUMN_SESSION,
161 COLUMN_DESCRIPTION,
162 COLUMN_MACHINE,
163 };
de1c301e 164
d9130355
LP
165 if (!arg_unique && !arg_acquired && !arg_activatable)
166 arg_unique = arg_acquired = arg_activatable = true;
167
9bb31a0c
YW
168 r = acquire_bus(false, &bus);
169 if (r < 0)
170 return r;
171
16c347b3
ZJS
172 r = sd_bus_list_names(bus,
173 (arg_acquired || arg_unique) ? &acquired : NULL,
174 arg_activatable ? &activatable : NULL);
23bbb0de
MS
175 if (r < 0)
176 return log_error_errno(r, "Failed to list names: %m");
de1c301e 177
d5099efc 178 names = hashmap_new(&string_hash_ops);
5e2f14e6
LP
179 if (!names)
180 return log_oom();
89ffcd2a 181
5e2f14e6 182 STRV_FOREACH(i, acquired) {
1d58a1fe 183 r = hashmap_put(names, *i, NAME_IS_ACQUIRED);
23bbb0de
MS
184 if (r < 0)
185 return log_error_errno(r, "Failed to add to hashmap: %m");
5e2f14e6
LP
186 }
187
188 STRV_FOREACH(i, activatable) {
1d58a1fe 189 r = hashmap_put(names, *i, NAME_IS_ACTIVATABLE);
23bbb0de
MS
190 if (r < 0 && r != -EEXIST)
191 return log_error_errno(r, "Failed to add to hashmap: %m");
5e2f14e6
LP
192 }
193
16c347b3
ZJS
194 table = table_new("activatable",
195 "name",
196 "pid",
197 "process",
198 "user",
199 "connection",
200 "unit",
201 "session",
202 "description",
203 "machine");
81896fa2 204 if (!table)
cb05d2a5
YW
205 return log_oom();
206
b683b82f
YW
207 if (arg_full)
208 table_set_width(table, 0);
209
81896fa2
LP
210 r = table_set_align_percent(table, table_get_cell(table, 0, COLUMN_PID), 100);
211 if (r < 0)
212 return log_error_errno(r, "Failed to set alignment: %m");
5e2f14e6 213
81896fa2
LP
214 r = table_set_empty_string(table, "-");
215 if (r < 0)
216 return log_error_errno(r, "Failed to set empty string: %m");
5e2f14e6 217
ad5555b4 218 r = table_set_sort(table, (size_t) COLUMN_NAME, (size_t) -1);
81896fa2
LP
219 if (r < 0)
220 return log_error_errno(r, "Failed to set sort column: %m");
89ffcd2a 221
81896fa2 222 if (arg_show_machine)
bec31cf5
AP
223 r = table_set_display(table, (size_t) COLUMN_NAME,
224 (size_t) COLUMN_PID,
225 (size_t) COLUMN_PROCESS,
226 (size_t) COLUMN_USER,
227 (size_t) COLUMN_CONNECTION,
228 (size_t) COLUMN_UNIT,
229 (size_t) COLUMN_SESSION,
230 (size_t) COLUMN_DESCRIPTION,
231 (size_t) COLUMN_MACHINE,
232 (size_t) -1);
81896fa2 233 else
bec31cf5
AP
234 r = table_set_display(table, (size_t) COLUMN_NAME,
235 (size_t) COLUMN_PID,
236 (size_t) COLUMN_PROCESS,
237 (size_t) COLUMN_USER,
238 (size_t) COLUMN_CONNECTION,
239 (size_t) COLUMN_UNIT,
240 (size_t) COLUMN_SESSION,
241 (size_t) COLUMN_DESCRIPTION,
242 (size_t) -1);
243
81896fa2
LP
244 if (r < 0)
245 return log_error_errno(r, "Failed to set columns to display: %m");
a4297f08 246
81896fa2
LP
247 table_set_header(table, arg_legend);
248
90e74a66 249 HASHMAP_FOREACH_KEY(v, k, names) {
4afd3348 250 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
71f2ab46 251
81896fa2
LP
252 if (v == NAME_IS_ACTIVATABLE) {
253 r = table_add_many(
254 table,
255 TABLE_INT, PTR_TO_INT(v),
256 TABLE_STRING, k,
257 TABLE_EMPTY,
258 TABLE_EMPTY,
259 TABLE_EMPTY,
260 TABLE_STRING, "(activatable)", TABLE_SET_COLOR, ansi_grey(),
261 TABLE_EMPTY,
262 TABLE_EMPTY,
263 TABLE_EMPTY,
264 TABLE_EMPTY);
265 if (r < 0)
bd17fa8c 266 return table_log_add_error(r);
71f2ab46 267
71f2ab46 268 continue;
5e2f14e6 269 }
de1c301e 270
81896fa2
LP
271 assert(v == NAME_IS_ACQUIRED);
272
273 if (!arg_unique && k[0] == ':')
56e61788
LP
274 continue;
275
81896fa2 276 if (!arg_acquired && k[0] != ':')
1f849790 277 continue;
89ffcd2a 278
81896fa2
LP
279 r = table_add_many(table,
280 TABLE_INT, PTR_TO_INT(v),
281 TABLE_STRING, k);
282 if (r < 0)
bd17fa8c 283 return table_log_add_error(r);
de1c301e 284
40ed1a45 285 r = sd_bus_get_name_creds(
81896fa2 286 bus, k,
40ed1a45 287 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) |
05bae4a6 288 SD_BUS_CREDS_EUID|SD_BUS_CREDS_PID|SD_BUS_CREDS_COMM|
40ed1a45
LP
289 SD_BUS_CREDS_UNIQUE_NAME|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_SESSION|
290 SD_BUS_CREDS_DESCRIPTION, &creds);
81896fa2
LP
291 if (r < 0) {
292 log_debug_errno(r, "Failed to acquire credentials of service %s, ignoring: %m", k);
293
294 r = table_fill_empty(table, COLUMN_MACHINE);
295 } else {
296 const char *unique = NULL, *session = NULL, *unit = NULL, *cn = NULL;
5b12334d
LP
297 pid_t pid;
298 uid_t uid;
de1c301e 299
5b12334d
LP
300 r = sd_bus_creds_get_pid(creds, &pid);
301 if (r >= 0) {
302 const char *comm = NULL;
de1c301e 303
81896fa2 304 (void) sd_bus_creds_get_comm(creds, &comm);
89ffcd2a 305
81896fa2
LP
306 r = table_add_many(table,
307 TABLE_PID, pid,
308 TABLE_STRING, strna(comm));
5b12334d 309 } else
81896fa2
LP
310 r = table_add_many(table, TABLE_EMPTY, TABLE_EMPTY);
311 if (r < 0)
bd17fa8c 312 return table_log_add_error(r);
89ffcd2a 313
05bae4a6 314 r = sd_bus_creds_get_euid(creds, &uid);
5b12334d
LP
315 if (r >= 0) {
316 _cleanup_free_ char *u = NULL;
89ffcd2a 317
5b12334d
LP
318 u = uid_to_name(uid);
319 if (!u)
320 return log_oom();
89ffcd2a 321
81896fa2 322 r = table_add_cell(table, NULL, TABLE_STRING, u);
5b12334d 323 } else
81896fa2
LP
324 r = table_add_cell(table, NULL, TABLE_EMPTY, NULL);
325 if (r < 0)
bd17fa8c 326 return table_log_add_error(r);
81896fa2
LP
327
328 (void) sd_bus_creds_get_unique_name(creds, &unique);
329 (void) sd_bus_creds_get_unit(creds, &unit);
330 (void) sd_bus_creds_get_session(creds, &session);
331 (void) sd_bus_creds_get_description(creds, &cn);
332
333 r = table_add_many(
334 table,
335 TABLE_STRING, unique,
336 TABLE_STRING, unit,
337 TABLE_STRING, session,
338 TABLE_STRING, cn);
339 }
340 if (r < 0)
bd17fa8c 341 return table_log_add_error(r);
89ffcd2a 342
81896fa2
LP
343 if (arg_show_machine) {
344 sd_id128_t mid;
56e61788 345
81896fa2
LP
346 r = sd_bus_get_name_machine_id(bus, k, &mid);
347 if (r < 0)
348 log_debug_errno(r, "Failed to acquire credentials of service %s, ignoring: %m", k);
349 else {
350 char m[SD_ID128_STRING_MAX];
56e61788 351
81896fa2
LP
352 r = table_add_cell(table, NULL, TABLE_STRING, sd_id128_to_string(mid, m));
353 if (r < 0)
bd17fa8c 354 return table_log_add_error(r);
56e61788 355
81896fa2
LP
356 continue; /* line fully filled, no need to fill the remainder below */
357 }
358 }
56e61788 359
81896fa2
LP
360 r = table_fill_empty(table, 0);
361 if (r < 0)
362 return log_error_errno(r, "Failed to fill line: %m");
363 }
7b0b392f 364
8722b297 365 (void) pager_open(arg_pager_flags);
81896fa2
LP
366
367 if (arg_json)
16c347b3
ZJS
368 r = table_print_json(table, stdout,
369 (arg_json == JSON_PRETTY ? JSON_FORMAT_PRETTY : JSON_FORMAT_NEWLINE) | JSON_FORMAT_COLOR_AUTO);
81896fa2
LP
370 else
371 r = table_print(table, stdout);
372 if (r < 0)
4b6607d9 373 return table_log_print_error(r);
14008e4e 374
1f849790
LP
375 return 0;
376}
377
d9130355
LP
378static void print_subtree(const char *prefix, const char *path, char **l) {
379 const char *vertical, *space;
380 char **n;
381
382 /* We assume the list is sorted. Let's first skip over the
383 * entry we are looking at. */
384 for (;;) {
385 if (!*l)
386 return;
387
388 if (!streq(*l, path))
389 break;
390
391 l++;
392 }
393
9a6f746f
LP
394 vertical = strjoina(prefix, special_glyph(SPECIAL_GLYPH_TREE_VERTICAL));
395 space = strjoina(prefix, special_glyph(SPECIAL_GLYPH_TREE_SPACE));
d9130355
LP
396
397 for (;;) {
398 bool has_more = false;
399
400 if (!*l || !path_startswith(*l, path))
401 break;
402
403 n = l + 1;
404 for (;;) {
405 if (!*n || !path_startswith(*n, path))
406 break;
407
408 if (!path_startswith(*n, *l)) {
409 has_more = true;
410 break;
411 }
412
413 n++;
414 }
415
16c347b3
ZJS
416 printf("%s%s%s\n",
417 prefix,
418 special_glyph(has_more ? SPECIAL_GLYPH_TREE_BRANCH : SPECIAL_GLYPH_TREE_RIGHT),
419 *l);
d9130355
LP
420
421 print_subtree(has_more ? vertical : space, *l, l);
422 l = n;
423 }
424}
425
445bd57e
ZJS
426static void print_tree(char **l) {
427 if (arg_list)
428 strv_print(l);
429 else if (strv_isempty(l))
56c8b52d 430 printf("No objects discovered.\n");
445bd57e 431 else if (streq(l[0], "/") && !l[1])
56c8b52d 432 printf("Only root object discovered.\n");
445bd57e
ZJS
433 else
434 print_subtree("", "/", l);
d9130355
LP
435}
436
a1ad3767
LP
437static int on_path(const char *path, void *userdata) {
438 Set *paths = userdata;
d9130355
LP
439 int r;
440
a1ad3767 441 assert(paths);
d9130355 442
be327321 443 r = set_put_strdup(&paths, path);
a1ad3767
LP
444 if (r < 0)
445 return log_oom();
d9130355 446
a1ad3767 447 return 0;
d9130355
LP
448}
449
50f20d1b 450static int find_nodes(sd_bus *bus, const char *service, const char *path, Set *paths) {
0171da06 451 static const XMLIntrospectOps ops = {
a1ad3767
LP
452 .on_path = on_path,
453 };
454
4afd3348
LP
455 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
456 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
a1ad3767 457 const char *xml;
d9130355
LP
458 int r;
459
16c347b3
ZJS
460 r = sd_bus_call_method(bus, service, path,
461 "org.freedesktop.DBus.Introspectable", "Introspect",
462 &error, &reply, "");
d9130355 463 if (r < 0) {
50f20d1b
ZJS
464 printf("%sFailed to introspect object %s of service %s: %s%s\n",
465 ansi_highlight_red(),
466 path, service, bus_error_message(&error, r),
467 ansi_normal());
d9130355
LP
468 return r;
469 }
470
471 r = sd_bus_message_read(reply, "s", &xml);
472 if (r < 0)
473 return bus_log_parse_error(r);
474
a1ad3767 475 return parse_xml_introspect(path, xml, &ops, paths);
d9130355
LP
476}
477
445bd57e 478static int tree_one(sd_bus *bus, const char *service) {
4c163bf1 479 _cleanup_set_free_ Set *paths = NULL, *done = NULL, *failed = NULL;
d9130355 480 _cleanup_free_ char **l = NULL;
d9130355
LP
481 int r;
482
4c163bf1
ZJS
483 r = set_put_strdup(&paths, "/");
484 if (r < 0)
d9130355
LP
485 return log_oom();
486
4c163bf1 487 done = set_new(&string_hash_ops_free);
d9130355
LP
488 if (!done)
489 return log_oom();
490
4c163bf1 491 failed = set_new(&string_hash_ops_free);
d9130355
LP
492 if (!failed)
493 return log_oom();
494
d9130355
LP
495 for (;;) {
496 _cleanup_free_ char *p = NULL;
497 int q;
498
499 p = set_steal_first(paths);
500 if (!p)
501 break;
502
503 if (set_contains(done, p) ||
504 set_contains(failed, p))
505 continue;
506
50f20d1b 507 q = find_nodes(bus, service, p, paths);
4c163bf1
ZJS
508 if (q < 0 && r >= 0)
509 r = q;
d9130355 510
4c163bf1
ZJS
511 q = set_consume(q < 0 ? failed : done, TAKE_PTR(p));
512 assert(q != 0);
d9130355
LP
513 if (q < 0)
514 return log_oom();
d9130355
LP
515 }
516
0221d68a 517 (void) pager_open(arg_pager_flags);
73fc23c0 518
d9130355
LP
519 l = set_get_strv(done);
520 if (!l)
521 return log_oom();
522
523 strv_sort(l);
445bd57e 524 print_tree(l);
d9130355
LP
525
526 fflush(stdout);
527
528 return r;
529}
530
9bb31a0c
YW
531static int tree(int argc, char **argv, void *userdata) {
532 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
d9130355 533 char **i;
c53aafb7 534 int r;
d9130355 535
50f20d1b
ZJS
536 /* Do superficial verification of arguments before even opening the bus */
537 STRV_FOREACH(i, strv_skip(argv, 1))
538 if (!sd_bus_service_name_is_valid(*i))
539 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
540 "Invalid bus service name: %s", *i);
541
d9130355
LP
542 if (!arg_unique && !arg_acquired)
543 arg_acquired = true;
544
9bb31a0c
YW
545 r = acquire_bus(false, &bus);
546 if (r < 0)
547 return r;
548
549 if (argc <= 1) {
d9130355 550 _cleanup_strv_free_ char **names = NULL;
56c8b52d 551 bool not_first = false;
d9130355
LP
552
553 r = sd_bus_list_names(bus, &names, NULL);
23bbb0de
MS
554 if (r < 0)
555 return log_error_errno(r, "Failed to get name list: %m");
d9130355 556
0221d68a 557 (void) pager_open(arg_pager_flags);
d9130355
LP
558
559 STRV_FOREACH(i, names) {
560 int q;
561
562 if (!arg_unique && (*i)[0] == ':')
563 continue;
564
565 if (!arg_acquired && (*i)[0] == ':')
566 continue;
567
568 if (not_first)
569 printf("\n");
570
1fc464f6 571 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
d9130355 572
445bd57e 573 q = tree_one(bus, *i);
d9130355
LP
574 if (q < 0 && r >= 0)
575 r = q;
576
577 not_first = true;
578 }
50f20d1b
ZJS
579 } else
580 STRV_FOREACH(i, strv_skip(argv, 1)) {
d9130355
LP
581 int q;
582
583 if (i > argv+1)
584 printf("\n");
585
73fc23c0 586 if (argv[2]) {
0221d68a 587 (void) pager_open(arg_pager_flags);
1fc464f6 588 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
73fc23c0 589 }
d9130355 590
445bd57e 591 q = tree_one(bus, *i);
d9130355
LP
592 if (q < 0 && r >= 0)
593 r = q;
594 }
d9130355
LP
595
596 return r;
597}
598
1fc55609
LP
599static int format_cmdline(sd_bus_message *m, FILE *f, bool needs_space) {
600 int r;
601
602 for (;;) {
603 const char *contents = NULL;
604 char type;
605 union {
606 uint8_t u8;
607 uint16_t u16;
608 int16_t s16;
609 uint32_t u32;
610 int32_t s32;
611 uint64_t u64;
612 int64_t s64;
613 double d64;
614 const char *string;
615 int i;
616 } basic;
617
618 r = sd_bus_message_peek_type(m, &type, &contents);
317f2fc9 619 if (r < 0)
1fc55609 620 return r;
317f2fc9
LP
621 if (r == 0)
622 return needs_space;
1fc55609
LP
623
624 if (bus_type_is_container(type) > 0) {
625
626 r = sd_bus_message_enter_container(m, type, contents);
627 if (r < 0)
628 return r;
629
630 if (type == SD_BUS_TYPE_ARRAY) {
631 unsigned n = 0;
632
633 /* count array entries */
634 for (;;) {
635
636 r = sd_bus_message_skip(m, contents);
637 if (r < 0)
638 return r;
639 if (r == 0)
640 break;
641
642 n++;
643 }
644
645 r = sd_bus_message_rewind(m, false);
646 if (r < 0)
647 return r;
648
649 if (needs_space)
650 fputc(' ', f);
651
652 fprintf(f, "%u", n);
317f2fc9
LP
653 needs_space = true;
654
1fc55609
LP
655 } else if (type == SD_BUS_TYPE_VARIANT) {
656
657 if (needs_space)
658 fputc(' ', f);
659
660 fprintf(f, "%s", contents);
317f2fc9 661 needs_space = true;
1fc55609
LP
662 }
663
317f2fc9 664 r = format_cmdline(m, f, needs_space);
1fc55609
LP
665 if (r < 0)
666 return r;
667
317f2fc9
LP
668 needs_space = r > 0;
669
1fc55609
LP
670 r = sd_bus_message_exit_container(m);
671 if (r < 0)
672 return r;
673
674 continue;
675 }
676
677 r = sd_bus_message_read_basic(m, type, &basic);
678 if (r < 0)
679 return r;
680
681 if (needs_space)
682 fputc(' ', f);
683
684 switch (type) {
685 case SD_BUS_TYPE_BYTE:
686 fprintf(f, "%u", basic.u8);
687 break;
688
689 case SD_BUS_TYPE_BOOLEAN:
690 fputs(true_false(basic.i), f);
691 break;
692
693 case SD_BUS_TYPE_INT16:
694 fprintf(f, "%i", basic.s16);
695 break;
696
697 case SD_BUS_TYPE_UINT16:
698 fprintf(f, "%u", basic.u16);
699 break;
700
701 case SD_BUS_TYPE_INT32:
702 fprintf(f, "%i", basic.s32);
703 break;
704
705 case SD_BUS_TYPE_UINT32:
706 fprintf(f, "%u", basic.u32);
707 break;
708
709 case SD_BUS_TYPE_INT64:
710 fprintf(f, "%" PRIi64, basic.s64);
711 break;
712
713 case SD_BUS_TYPE_UINT64:
714 fprintf(f, "%" PRIu64, basic.u64);
715 break;
716
717 case SD_BUS_TYPE_DOUBLE:
718 fprintf(f, "%g", basic.d64);
719 break;
720
721 case SD_BUS_TYPE_STRING:
722 case SD_BUS_TYPE_OBJECT_PATH:
723 case SD_BUS_TYPE_SIGNATURE: {
724 _cleanup_free_ char *b = NULL;
725
726 b = cescape(basic.string);
727 if (!b)
728 return -ENOMEM;
729
730 fprintf(f, "\"%s\"", b);
731 break;
732 }
733
734 case SD_BUS_TYPE_UNIX_FD:
735 fprintf(f, "%i", basic.i);
736 break;
737
738 default:
739 assert_not_reached("Unknown basic type.");
740 }
741
1ed24c61 742 needs_space = true;
1fc55609
LP
743 }
744}
745
0171da06
LP
746typedef struct Member {
747 const char *type;
748 char *interface;
749 char *name;
750 char *signature;
751 char *result;
1fc55609 752 char *value;
0171da06
LP
753 bool writable;
754 uint64_t flags;
755} Member;
756
7a08d314 757static void member_hash_func(const Member *m, struct siphash *state) {
1e2527a6 758 uint64_t arity = 1;
0171da06
LP
759
760 assert(m);
761 assert(m->type);
762
b826ab58 763 string_hash_func(m->type, state);
0171da06 764
1e2527a6
TG
765 arity += !!m->name + !!m->interface;
766
767 uint64_hash_func(&arity, state);
768
0171da06 769 if (m->name)
b826ab58 770 string_hash_func(m->name, state);
0171da06
LP
771
772 if (m->interface)
b826ab58 773 string_hash_func(m->interface, state);
0171da06
LP
774}
775
dc5f9c6f 776static int member_compare_func(const Member *x, const Member *y) {
0171da06
LP
777 int d;
778
779 assert(x);
780 assert(y);
781 assert(x->type);
782 assert(y->type);
783
c030a850
NK
784 d = strcmp_ptr(x->interface, y->interface);
785 if (d != 0)
786 return d;
0171da06
LP
787
788 d = strcmp(x->type, y->type);
789 if (d != 0)
790 return d;
791
c030a850 792 return strcmp_ptr(x->name, y->name);
0171da06
LP
793}
794
93bab288
YW
795static int member_compare_funcp(Member * const *a, Member * const *b) {
796 return member_compare_func(*a, *b);
0171da06
LP
797}
798
799static void member_free(Member *m) {
800 if (!m)
801 return;
802
803 free(m->interface);
804 free(m->name);
805 free(m->signature);
806 free(m->result);
1fc55609 807 free(m->value);
0171da06
LP
808 free(m);
809}
810
811DEFINE_TRIVIAL_CLEANUP_FUNC(Member*, member_free);
812
813static void member_set_free(Set *s) {
224b0e7a 814 set_free_with_destructor(s, member_free);
0171da06
LP
815}
816
817DEFINE_TRIVIAL_CLEANUP_FUNC(Set*, member_set_free);
818
819static int on_interface(const char *interface, uint64_t flags, void *userdata) {
820 _cleanup_(member_freep) Member *m;
821 Set *members = userdata;
822 int r;
823
824 assert(interface);
825 assert(members);
826
9600c27c 827 m = new(Member, 1);
0171da06
LP
828 if (!m)
829 return log_oom();
830
9600c27c
LP
831 *m = (Member) {
832 .type = "interface",
833 .flags = flags,
834 };
0171da06
LP
835
836 r = free_and_strdup(&m->interface, interface);
837 if (r < 0)
838 return log_oom();
839
840 r = set_put(members, m);
f17153a7
LP
841 if (r == -EEXIST)
842 return log_error_errno(r, "Invalid introspection data: duplicate interface '%s'.", interface);
843 if (r < 0)
844 return log_oom();
0171da06
LP
845
846 m = NULL;
847 return 0;
848}
849
850static int on_method(const char *interface, const char *name, const char *signature, const char *result, uint64_t flags, void *userdata) {
851 _cleanup_(member_freep) Member *m;
852 Set *members = userdata;
853 int r;
854
855 assert(interface);
856 assert(name);
857
9600c27c 858 m = new(Member, 1);
0171da06
LP
859 if (!m)
860 return log_oom();
861
9600c27c
LP
862 *m = (Member) {
863 .type = "method",
864 .flags = flags,
865 };
0171da06
LP
866
867 r = free_and_strdup(&m->interface, interface);
868 if (r < 0)
869 return log_oom();
870
871 r = free_and_strdup(&m->name, name);
872 if (r < 0)
873 return log_oom();
874
875 r = free_and_strdup(&m->signature, signature);
876 if (r < 0)
877 return log_oom();
878
879 r = free_and_strdup(&m->result, result);
880 if (r < 0)
881 return log_oom();
882
883 r = set_put(members, m);
f17153a7
LP
884 if (r == -EEXIST)
885 return log_error_errno(r, "Invalid introspection data: duplicate method '%s' on interface '%s'.", name, interface);
886 if (r < 0)
887 return log_oom();
0171da06
LP
888
889 m = NULL;
890 return 0;
891}
892
893static int on_signal(const char *interface, const char *name, const char *signature, uint64_t flags, void *userdata) {
894 _cleanup_(member_freep) Member *m;
895 Set *members = userdata;
896 int r;
897
898 assert(interface);
899 assert(name);
900
9600c27c 901 m = new(Member, 1);
0171da06
LP
902 if (!m)
903 return log_oom();
904
9600c27c
LP
905 *m = (Member) {
906 .type = "signal",
907 .flags = flags,
908 };
0171da06
LP
909
910 r = free_and_strdup(&m->interface, interface);
911 if (r < 0)
912 return log_oom();
913
914 r = free_and_strdup(&m->name, name);
915 if (r < 0)
916 return log_oom();
917
918 r = free_and_strdup(&m->signature, signature);
919 if (r < 0)
920 return log_oom();
921
922 r = set_put(members, m);
f17153a7
LP
923 if (r == -EEXIST)
924 return log_error_errno(r, "Invalid introspection data: duplicate signal '%s' on interface '%s'.", name, interface);
925 if (r < 0)
926 return log_oom();
0171da06
LP
927
928 m = NULL;
929 return 0;
930}
931
932static int on_property(const char *interface, const char *name, const char *signature, bool writable, uint64_t flags, void *userdata) {
933 _cleanup_(member_freep) Member *m;
934 Set *members = userdata;
935 int r;
936
937 assert(interface);
938 assert(name);
939
9600c27c 940 m = new(Member, 1);
0171da06
LP
941 if (!m)
942 return log_oom();
943
9600c27c
LP
944 *m = (Member) {
945 .type = "property",
946 .flags = flags,
947 .writable = writable,
948 };
0171da06
LP
949
950 r = free_and_strdup(&m->interface, interface);
951 if (r < 0)
952 return log_oom();
953
954 r = free_and_strdup(&m->name, name);
955 if (r < 0)
956 return log_oom();
957
958 r = free_and_strdup(&m->signature, signature);
959 if (r < 0)
960 return log_oom();
961
962 r = set_put(members, m);
f17153a7
LP
963 if (r == -EEXIST)
964 return log_error_errno(r, "Invalid introspection data: duplicate property '%s' on interface '%s'.", name, interface);
965 if (r < 0)
966 return log_oom();
0171da06
LP
967
968 m = NULL;
969 return 0;
970}
971
7a08d314 972DEFINE_PRIVATE_HASH_OPS(member_hash_ops, Member, member_hash_func, member_compare_func);
0171da06 973
7a08d314 974static int introspect(int argc, char **argv, void *userdata) {
0171da06
LP
975 static const XMLIntrospectOps ops = {
976 .on_interface = on_interface,
977 .on_method = on_method,
978 .on_signal = on_signal,
979 .on_property = on_property,
980 };
981
9bb31a0c 982 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
9efebb65 983 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply_xml = NULL;
4afd3348 984 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
0171da06 985 _cleanup_(member_set_freep) Set *members = NULL;
9bb31a0c
YW
986 unsigned name_width, type_width, signature_width, result_width, j, k = 0;
987 Member *m, **sorted = NULL;
0171da06
LP
988 const char *xml;
989 int r;
0171da06 990
9bb31a0c
YW
991 r = acquire_bus(false, &bus);
992 if (r < 0)
993 return r;
4f44c03e 994
0171da06
LP
995 members = set_new(&member_hash_ops);
996 if (!members)
997 return log_oom();
998
16c347b3
ZJS
999 r = sd_bus_call_method(bus, argv[1], argv[2],
1000 "org.freedesktop.DBus.Introspectable", "Introspect",
1001 &error, &reply_xml, "");
e51faad3 1002 if (r < 0)
16c347b3
ZJS
1003 return log_error_errno(r, "Failed to introspect object %s of service %s: %s",
1004 argv[2], argv[1], bus_error_message(&error, r));
0171da06 1005
9efebb65 1006 r = sd_bus_message_read(reply_xml, "s", &xml);
0171da06
LP
1007 if (r < 0)
1008 return bus_log_parse_error(r);
1009
d5c8d823
ZJS
1010 if (arg_xml_interface) {
1011 /* Just dump the received XML and finish */
8722b297 1012 (void) pager_open(arg_pager_flags);
d5c8d823
ZJS
1013 puts(xml);
1014 return 0;
1015 }
1016
1fc55609 1017 /* First, get list of all properties */
0171da06
LP
1018 r = parse_xml_introspect(argv[2], xml, &ops, members);
1019 if (r < 0)
1020 return r;
1021
1fc55609 1022 /* Second, find the current values for them */
90e74a66 1023 SET_FOREACH(m, members) {
9efebb65 1024 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1fc55609
LP
1025
1026 if (!streq(m->type, "property"))
1027 continue;
1028
1029 if (m->value)
1030 continue;
1031
4f44c03e
LP
1032 if (argv[3] && !streq(argv[3], m->interface))
1033 continue;
1034
16c347b3
ZJS
1035 r = sd_bus_call_method(bus, argv[1], argv[2],
1036 "org.freedesktop.DBus.Properties", "GetAll",
1037 &error, &reply, "s", m->interface);
e51faad3 1038 if (r < 0)
24a4e7ff
ZJS
1039 return log_error_errno(r, "Failed to get all properties on interface %s: %s",
1040 m->interface, bus_error_message(&error, r));
1fc55609
LP
1041
1042 r = sd_bus_message_enter_container(reply, 'a', "{sv}");
1043 if (r < 0)
1044 return bus_log_parse_error(r);
1045
1046 for (;;) {
1047 Member *z;
1048 _cleanup_free_ char *buf = NULL;
1049 _cleanup_fclose_ FILE *mf = NULL;
1050 size_t sz = 0;
1051 const char *name;
1052
1053 r = sd_bus_message_enter_container(reply, 'e', "sv");
1054 if (r < 0)
1055 return bus_log_parse_error(r);
1056
1057 if (r == 0)
1058 break;
1059
1060 r = sd_bus_message_read(reply, "s", &name);
1061 if (r < 0)
1062 return bus_log_parse_error(r);
1063
1064 r = sd_bus_message_enter_container(reply, 'v', NULL);
1065 if (r < 0)
1066 return bus_log_parse_error(r);
1067
2fe21124 1068 mf = open_memstream_unlocked(&buf, &sz);
1fc55609
LP
1069 if (!mf)
1070 return log_oom();
1071
1072 r = format_cmdline(reply, mf, false);
1073 if (r < 0)
1074 return bus_log_parse_error(r);
1075
8d3b9edc 1076 mf = safe_fclose(mf);
1fc55609
LP
1077
1078 z = set_get(members, &((Member) {
1079 .type = "property",
1080 .interface = m->interface,
1081 .name = (char*) name }));
8d3b9edc
LP
1082 if (z)
1083 free_and_replace(z->value, buf);
1fc55609
LP
1084
1085 r = sd_bus_message_exit_container(reply);
1086 if (r < 0)
1087 return bus_log_parse_error(r);
1088
1089 r = sd_bus_message_exit_container(reply);
1090 if (r < 0)
1091 return bus_log_parse_error(r);
1092 }
1093
1094 r = sd_bus_message_exit_container(reply);
1095 if (r < 0)
1096 return bus_log_parse_error(r);
1097 }
1098
8722b297
ZJS
1099 name_width = strlen("NAME");
1100 type_width = strlen("TYPE");
1101 signature_width = strlen("SIGNATURE");
1102 result_width = strlen("RESULT/VALUE");
0171da06
LP
1103
1104 sorted = newa(Member*, set_size(members));
1105
90e74a66 1106 SET_FOREACH(m, members) {
4f44c03e
LP
1107 if (argv[3] && !streq(argv[3], m->interface))
1108 continue;
1109
0171da06
LP
1110 if (m->interface)
1111 name_width = MAX(name_width, strlen(m->interface));
1112 if (m->name)
1113 name_width = MAX(name_width, strlen(m->name) + 1);
1114 if (m->type)
1115 type_width = MAX(type_width, strlen(m->type));
1116 if (m->signature)
1117 signature_width = MAX(signature_width, strlen(m->signature));
1118 if (m->result)
1119 result_width = MAX(result_width, strlen(m->result));
1fc55609
LP
1120 if (m->value)
1121 result_width = MAX(result_width, strlen(m->value));
0171da06
LP
1122
1123 sorted[k++] = m;
1124 }
1125
1fc55609
LP
1126 if (result_width > 40)
1127 result_width = 40;
1128
93bab288 1129 typesafe_qsort(sorted, k, member_compare_funcp);
0171da06 1130
8722b297
ZJS
1131 (void) pager_open(arg_pager_flags);
1132
1fc55609
LP
1133 if (arg_legend) {
1134 printf("%-*s %-*s %-*s %-*s %s\n",
1135 (int) name_width, "NAME",
1136 (int) type_width, "TYPE",
1137 (int) signature_width, "SIGNATURE",
1138 (int) result_width, "RESULT/VALUE",
1139 "FLAGS");
1140 }
0171da06
LP
1141
1142 for (j = 0; j < k; j++) {
1fc55609
LP
1143 _cleanup_free_ char *ellipsized = NULL;
1144 const char *rv;
0171da06
LP
1145 bool is_interface;
1146
1147 m = sorted[j];
1148
4f44c03e
LP
1149 if (argv[3] && !streq(argv[3], m->interface))
1150 continue;
1151
0171da06
LP
1152 is_interface = streq(m->type, "interface");
1153
4f44c03e
LP
1154 if (argv[3] && is_interface)
1155 continue;
1156
1fc55609
LP
1157 if (m->value) {
1158 ellipsized = ellipsize(m->value, result_width, 100);
1159 if (!ellipsized)
1160 return log_oom();
1161
1162 rv = ellipsized;
1163 } else
c5984fe1 1164 rv = empty_to_dash(m->result);
1fc55609 1165
0171da06
LP
1166 printf("%s%s%-*s%s %-*s %-*s %-*s%s%s%s%s%s%s\n",
1167 is_interface ? ansi_highlight() : "",
1168 is_interface ? "" : ".",
16c347b3
ZJS
1169 - !is_interface + (int) name_width,
1170 empty_to_dash(streq_ptr(m->type, "interface") ? m->interface : m->name),
1fc464f6 1171 is_interface ? ansi_normal() : "",
c5984fe1
YW
1172 (int) type_width, empty_to_dash(m->type),
1173 (int) signature_width, empty_to_dash(m->signature),
1fc55609 1174 (int) result_width, rv,
0171da06
LP
1175 (m->flags & SD_BUS_VTABLE_DEPRECATED) ? " deprecated" : (m->flags || m->writable ? "" : " -"),
1176 (m->flags & SD_BUS_VTABLE_METHOD_NO_REPLY) ? " no-reply" : "",
1177 (m->flags & SD_BUS_VTABLE_PROPERTY_CONST) ? " const" : "",
1178 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE) ? " emits-change" : "",
1179 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION) ? " emits-invalidation" : "",
1180 m->writable ? " writable" : "");
1181 }
1182
1183 return 0;
1184}
1185
1f70b087 1186static int message_dump(sd_bus_message *m, FILE *f) {
2b4a65b6 1187 return sd_bus_message_dump(m, f, SD_BUS_MESSAGE_DUMP_WITH_HEADER);
1f70b087
LP
1188}
1189
1190static int message_pcap(sd_bus_message *m, FILE *f) {
1191 return bus_message_pcap_frame(m, arg_snaplen, f);
1192}
1193
2de62253
LP
1194static int message_json(sd_bus_message *m, FILE *f) {
1195 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL, *w = NULL;
1196 char e[2];
1197 int r;
1198
1199 r = json_transform_message(m, &v);
1200 if (r < 0)
1201 return r;
1202
1203 e[0] = m->header->endian;
1204 e[1] = 0;
1205
1206 r = json_build(&w, JSON_BUILD_OBJECT(
16c347b3
ZJS
1207 JSON_BUILD_PAIR("type", JSON_BUILD_STRING(bus_message_type_to_string(m->header->type))),
1208 JSON_BUILD_PAIR("endian", JSON_BUILD_STRING(e)),
1209 JSON_BUILD_PAIR("flags", JSON_BUILD_INTEGER(m->header->flags)),
1210 JSON_BUILD_PAIR("version", JSON_BUILD_INTEGER(m->header->version)),
1211 JSON_BUILD_PAIR("cookie", JSON_BUILD_INTEGER(BUS_MESSAGE_COOKIE(m))),
1212 JSON_BUILD_PAIR_CONDITION(m->reply_cookie != 0, "reply_cookie", JSON_BUILD_INTEGER(m->reply_cookie)),
1213 JSON_BUILD_PAIR_CONDITION(m->sender, "sender", JSON_BUILD_STRING(m->sender)),
1214 JSON_BUILD_PAIR_CONDITION(m->destination, "destination", JSON_BUILD_STRING(m->destination)),
1215 JSON_BUILD_PAIR_CONDITION(m->path, "path", JSON_BUILD_STRING(m->path)),
1216 JSON_BUILD_PAIR_CONDITION(m->interface, "interface", JSON_BUILD_STRING(m->interface)),
1217 JSON_BUILD_PAIR_CONDITION(m->member, "member", JSON_BUILD_STRING(m->member)),
1218 JSON_BUILD_PAIR_CONDITION(m->monotonic != 0, "monotonic", JSON_BUILD_INTEGER(m->monotonic)),
1219 JSON_BUILD_PAIR_CONDITION(m->realtime != 0, "realtime", JSON_BUILD_INTEGER(m->realtime)),
1220 JSON_BUILD_PAIR_CONDITION(m->seqnum != 0, "seqnum", JSON_BUILD_INTEGER(m->seqnum)),
1221 JSON_BUILD_PAIR_CONDITION(m->error.name, "error_name", JSON_BUILD_STRING(m->error.name)),
1222 JSON_BUILD_PAIR("payload", JSON_BUILD_VARIANT(v))));
2de62253
LP
1223 if (r < 0)
1224 return log_error_errno(r, "Failed to build JSON object: %m");
1225
1226 json_dump_with_flags(w, f);
1227 return 0;
1228}
1229
9bb31a0c
YW
1230static int monitor(int argc, char **argv, int (*dump)(sd_bus_message *m, FILE *f)) {
1231 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
17fd7460
LU
1232 _cleanup_(sd_bus_message_unrefp) sd_bus_message *message = NULL;
1233 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1f849790 1234 char **i;
17fd7460 1235 uint32_t flags = 0;
f5938e8f
TG
1236 const char *unique_name;
1237 bool is_monitor = false;
1f849790
LP
1238 int r;
1239
9bb31a0c
YW
1240 r = acquire_bus(true, &bus);
1241 if (r < 0)
1242 return r;
1243
17fd7460 1244 /* upgrade connection; it's not used for anything else after this call */
24a4e7ff
ZJS
1245 r = sd_bus_message_new_method_call(bus,
1246 &message,
1247 "org.freedesktop.DBus",
1248 "/org/freedesktop/DBus",
1249 "org.freedesktop.DBus.Monitoring",
1250 "BecomeMonitor");
17fd7460
LU
1251 if (r < 0)
1252 return bus_log_create_error(r);
1253
1254 r = sd_bus_message_open_container(message, 'a', "s");
1255 if (r < 0)
1256 return bus_log_create_error(r);
1257
1f849790
LP
1258 STRV_FOREACH(i, argv+1) {
1259 _cleanup_free_ char *m = NULL;
1260
5453a4b1 1261 if (!sd_bus_service_name_is_valid(*i))
0747cde7 1262 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid service name '%s'", *i);
1f849790 1263
605405c6 1264 m = strjoin("sender='", *i, "'");
1f849790
LP
1265 if (!m)
1266 return log_oom();
1267
17fd7460 1268 r = sd_bus_message_append_basic(message, 's', m);
23bbb0de 1269 if (r < 0)
17fd7460 1270 return bus_log_create_error(r);
b51f299a 1271
f6d1e6cb 1272 free(m);
605405c6 1273 m = strjoin("destination='", *i, "'");
f6d1e6cb
LU
1274 if (!m)
1275 return log_oom();
1276
17fd7460 1277 r = sd_bus_message_append_basic(message, 's', m);
f6d1e6cb 1278 if (r < 0)
17fd7460 1279 return bus_log_create_error(r);
1f849790
LP
1280 }
1281
1282 STRV_FOREACH(i, arg_matches) {
17fd7460 1283 r = sd_bus_message_append_basic(message, 's', *i);
23bbb0de 1284 if (r < 0)
17fd7460 1285 return bus_log_create_error(r);
b51f299a
LP
1286 }
1287
17fd7460
LU
1288 r = sd_bus_message_close_container(message);
1289 if (r < 0)
1290 return bus_log_create_error(r);
1291
1292 r = sd_bus_message_append_basic(message, 'u', &flags);
1293 if (r < 0)
1294 return bus_log_create_error(r);
1295
1296 r = sd_bus_call(bus, message, arg_timeout, &error, NULL);
48956c39 1297 if (r < 0)
24a4e7ff
ZJS
1298 return log_error_errno(r, "Call to org.freedesktop.DBus.Monitoring.BecomeMonitor failed: %s",
1299 bus_error_message(&error, r));
1f849790 1300
f5938e8f
TG
1301 r = sd_bus_get_unique_name(bus, &unique_name);
1302 if (r < 0)
1303 return log_error_errno(r, "Failed to get unique name: %m");
1304
92d66625
LP
1305 log_info("Monitoring bus message stream.");
1306
1f849790 1307 for (;;) {
4afd3348 1308 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
1f849790
LP
1309
1310 r = sd_bus_process(bus, &m);
23bbb0de
MS
1311 if (r < 0)
1312 return log_error_errno(r, "Failed to process bus: %m");
1f849790 1313
f5938e8f
TG
1314 if (!is_monitor) {
1315 const char *name;
1316
1317 /* wait until we lose our unique name */
1318 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus", "NameLost") <= 0)
1319 continue;
1320
1321 r = sd_bus_message_read(m, "s", &name);
1322 if (r < 0)
d67b1d18 1323 return bus_log_parse_error(r);
f5938e8f 1324
d27d4637
TG
1325 if (streq(name, unique_name))
1326 is_monitor = true;
f5938e8f 1327
d27d4637 1328 continue;
f5938e8f
TG
1329 }
1330
1f849790 1331 if (m) {
1f70b087 1332 dump(m, stdout);
1d44f758 1333 fflush(stdout);
92d66625
LP
1334
1335 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected") > 0) {
1336 log_info("Connection terminated, exiting.");
1337 return 0;
1338 }
1339
1f849790
LP
1340 continue;
1341 }
1342
1343 if (r > 0)
1344 continue;
1345
1346 r = sd_bus_wait(bus, (uint64_t) -1);
23bbb0de
MS
1347 if (r < 0)
1348 return log_error_errno(r, "Failed to wait for bus: %m");
1f849790 1349 }
95c4fe82 1350}
1f849790 1351
9bb31a0c 1352static int verb_monitor(int argc, char **argv, void *userdata) {
2de62253 1353 return monitor(argc, argv, arg_json != JSON_OFF ? message_json : message_dump);
9bb31a0c
YW
1354}
1355
1356static int verb_capture(int argc, char **argv, void *userdata) {
1f70b087
LP
1357 int r;
1358
baaa35ad
ZJS
1359 if (isatty(fileno(stdout)) > 0)
1360 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1361 "Refusing to write message data to console, please redirect output to a file.");
1f70b087
LP
1362
1363 bus_pcap_header(arg_snaplen, stdout);
1364
9bb31a0c 1365 r = monitor(argc, argv, message_pcap);
1f70b087
LP
1366 if (r < 0)
1367 return r;
1368
6b0f5484
LP
1369 r = fflush_and_check(stdout);
1370 if (r < 0)
1371 return log_error_errno(r, "Couldn't write capture file: %m");
1f70b087
LP
1372
1373 return r;
1374}
1375
9bb31a0c
YW
1376static int status(int argc, char **argv, void *userdata) {
1377 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348 1378 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
95c4fe82
LP
1379 pid_t pid;
1380 int r;
1381
9bb31a0c
YW
1382 r = acquire_bus(false, &bus);
1383 if (r < 0)
1384 return r;
95c4fe82 1385
8722b297
ZJS
1386 (void) pager_open(arg_pager_flags);
1387
9bb31a0c 1388 if (!isempty(argv[1])) {
2e9efd22
LP
1389 r = parse_pid(argv[1], &pid);
1390 if (r < 0)
1391 r = sd_bus_get_name_creds(
1392 bus,
1393 argv[1],
1394 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1395 &creds);
1396 else
1397 r = sd_bus_creds_new_from_pid(
1398 &creds,
1399 pid,
1400 _SD_BUS_CREDS_ALL);
3acc1daf 1401 } else {
5b820358 1402 const char *scope, *address;
5c302692 1403 sd_id128_t bus_id;
3acc1daf 1404
5b820358
LP
1405 r = sd_bus_get_address(bus, &address);
1406 if (r >= 0)
1fc464f6 1407 printf("BusAddress=%s%s%s\n", ansi_highlight(), address, ansi_normal());
5b820358 1408
3acc1daf
LP
1409 r = sd_bus_get_scope(bus, &scope);
1410 if (r >= 0)
1fc464f6 1411 printf("BusScope=%s%s%s\n", ansi_highlight(), scope, ansi_normal());
3acc1daf 1412
5c302692
LP
1413 r = sd_bus_get_bus_id(bus, &bus_id);
1414 if (r >= 0)
16c347b3
ZJS
1415 printf("BusID=%s" SD_ID128_FORMAT_STR "%s\n",
1416 ansi_highlight(), SD_ID128_FORMAT_VAL(bus_id), ansi_normal());
5c302692 1417
2e9efd22 1418 r = sd_bus_get_owner_creds(
40ed1a45 1419 bus,
40ed1a45
LP
1420 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1421 &creds);
3acc1daf 1422 }
95c4fe82 1423
23bbb0de
MS
1424 if (r < 0)
1425 return log_error_errno(r, "Failed to get credentials: %m");
95c4fe82 1426
d0b2babf 1427 bus_creds_dump(creds, NULL, false);
95c4fe82 1428 return 0;
1f849790
LP
1429}
1430
781fa938
LP
1431static int message_append_cmdline(sd_bus_message *m, const char *signature, char ***x) {
1432 char **p;
1433 int r;
1434
1435 assert(m);
1436 assert(signature);
1437 assert(x);
1438
1439 p = *x;
1440
1441 for (;;) {
1442 const char *v;
1443 char t;
1444
1445 t = *signature;
1446 v = *p;
1447
1448 if (t == 0)
1449 break;
baaa35ad
ZJS
1450 if (!v)
1451 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1452 "Too few parameters for signature.");
781fa938
LP
1453
1454 signature++;
1455 p++;
1456
1457 switch (t) {
1458
1459 case SD_BUS_TYPE_BOOLEAN:
1460
1461 r = parse_boolean(v);
48956c39 1462 if (r < 0)
3d9942de 1463 return log_error_errno(r, "Failed to parse '%s' as boolean: %m", v);
781fa938
LP
1464
1465 r = sd_bus_message_append_basic(m, t, &r);
1466 break;
1467
1468 case SD_BUS_TYPE_BYTE: {
1469 uint8_t z;
1470
1471 r = safe_atou8(v, &z);
48956c39 1472 if (r < 0)
3d9942de 1473 return log_error_errno(r, "Failed to parse '%s' as byte (unsigned 8bit integer): %m", v);
781fa938
LP
1474
1475 r = sd_bus_message_append_basic(m, t, &z);
1476 break;
1477 }
1478
1479 case SD_BUS_TYPE_INT16: {
1480 int16_t z;
1481
1482 r = safe_atoi16(v, &z);
48956c39 1483 if (r < 0)
3d9942de 1484 return log_error_errno(r, "Failed to parse '%s' as signed 16bit integer: %m", v);
781fa938
LP
1485
1486 r = sd_bus_message_append_basic(m, t, &z);
1487 break;
1488 }
1489
1490 case SD_BUS_TYPE_UINT16: {
1491 uint16_t z;
1492
1493 r = safe_atou16(v, &z);
48956c39 1494 if (r < 0)
3d9942de 1495 return log_error_errno(r, "Failed to parse '%s' as unsigned 16bit integer: %m", v);
781fa938
LP
1496
1497 r = sd_bus_message_append_basic(m, t, &z);
1498 break;
1499 }
1500
1501 case SD_BUS_TYPE_INT32: {
1502 int32_t z;
1503
1504 r = safe_atoi32(v, &z);
48956c39 1505 if (r < 0)
3d9942de 1506 return log_error_errno(r, "Failed to parse '%s' as signed 32bit integer: %m", v);
781fa938
LP
1507
1508 r = sd_bus_message_append_basic(m, t, &z);
1509 break;
1510 }
1511
1512 case SD_BUS_TYPE_UINT32: {
1513 uint32_t z;
1514
1515 r = safe_atou32(v, &z);
48956c39 1516 if (r < 0)
3d9942de 1517 return log_error_errno(r, "Failed to parse '%s' as unsigned 32bit integer: %m", v);
781fa938
LP
1518
1519 r = sd_bus_message_append_basic(m, t, &z);
1520 break;
1521 }
1522
1523 case SD_BUS_TYPE_INT64: {
1524 int64_t z;
1525
1526 r = safe_atoi64(v, &z);
48956c39 1527 if (r < 0)
3d9942de 1528 return log_error_errno(r, "Failed to parse '%s' as signed 64bit integer: %m", v);
781fa938
LP
1529
1530 r = sd_bus_message_append_basic(m, t, &z);
1531 break;
1532 }
1533
1534 case SD_BUS_TYPE_UINT64: {
1535 uint64_t z;
1536
1537 r = safe_atou64(v, &z);
48956c39 1538 if (r < 0)
3d9942de 1539 return log_error_errno(r, "Failed to parse '%s' as unsigned 64bit integer: %m", v);
781fa938
LP
1540
1541 r = sd_bus_message_append_basic(m, t, &z);
1542 break;
1543 }
1544
781fa938
LP
1545 case SD_BUS_TYPE_DOUBLE: {
1546 double z;
1547
1548 r = safe_atod(v, &z);
48956c39 1549 if (r < 0)
3d9942de 1550 return log_error_errno(r, "Failed to parse '%s' as double precision floating point: %m", v);
781fa938
LP
1551
1552 r = sd_bus_message_append_basic(m, t, &z);
1553 break;
1554 }
1555
1556 case SD_BUS_TYPE_STRING:
1557 case SD_BUS_TYPE_OBJECT_PATH:
1558 case SD_BUS_TYPE_SIGNATURE:
1559
1560 r = sd_bus_message_append_basic(m, t, v);
1561 break;
1562
1563 case SD_BUS_TYPE_ARRAY: {
1564 uint32_t n;
1565 size_t k;
1566
1567 r = safe_atou32(v, &n);
48956c39 1568 if (r < 0)
3d9942de 1569 return log_error_errno(r, "Failed to parse '%s' number of array entries: %m", v);
781fa938
LP
1570
1571 r = signature_element_length(signature, &k);
48956c39 1572 if (r < 0)
3d9942de 1573 return log_error_errno(r, "Invalid array signature: %m");
781fa938
LP
1574
1575 {
781fa938
LP
1576 char s[k + 1];
1577 memcpy(s, signature, k);
1578 s[k] = 0;
1579
1580 r = sd_bus_message_open_container(m, SD_BUS_TYPE_ARRAY, s);
1581 if (r < 0)
1582 return bus_log_create_error(r);
1583
16c347b3 1584 for (unsigned i = 0; i < n; i++) {
781fa938
LP
1585 r = message_append_cmdline(m, s, &p);
1586 if (r < 0)
1587 return r;
1588 }
1589 }
1590
1591 signature += k;
1592
1593 r = sd_bus_message_close_container(m);
1594 break;
1595 }
1596
1597 case SD_BUS_TYPE_VARIANT:
1598 r = sd_bus_message_open_container(m, SD_BUS_TYPE_VARIANT, v);
1599 if (r < 0)
1600 return bus_log_create_error(r);
1601
1602 r = message_append_cmdline(m, v, &p);
1603 if (r < 0)
1604 return r;
1605
1606 r = sd_bus_message_close_container(m);
1607 break;
1608
1609 case SD_BUS_TYPE_STRUCT_BEGIN:
1610 case SD_BUS_TYPE_DICT_ENTRY_BEGIN: {
1611 size_t k;
1612
1613 signature--;
1614 p--;
1615
1616 r = signature_element_length(signature, &k);
48956c39 1617 if (r < 0)
3d9942de 1618 return log_error_errno(r, "Invalid struct/dict entry signature: %m");
781fa938
LP
1619
1620 {
1621 char s[k-1];
1622 memcpy(s, signature + 1, k - 2);
1623 s[k - 2] = 0;
1624
16c347b3
ZJS
1625 const char ctype = t == SD_BUS_TYPE_STRUCT_BEGIN ?
1626 SD_BUS_TYPE_STRUCT : SD_BUS_TYPE_DICT_ENTRY;
1627 r = sd_bus_message_open_container(m, ctype, s);
781fa938
LP
1628 if (r < 0)
1629 return bus_log_create_error(r);
1630
1631 r = message_append_cmdline(m, s, &p);
1632 if (r < 0)
1633 return r;
1634 }
1635
1636 signature += k;
1637
1638 r = sd_bus_message_close_container(m);
1639 break;
1640 }
1641
1642 case SD_BUS_TYPE_UNIX_FD:
baaa35ad
ZJS
1643 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1644 "UNIX file descriptor not supported as type.");
781fa938
LP
1645
1646 default:
baaa35ad
ZJS
1647 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1648 "Unknown signature type %c.", t);
781fa938
LP
1649 }
1650
1651 if (r < 0)
1652 return bus_log_create_error(r);
1653 }
1654
1655 *x = p;
1656 return 0;
1657}
1658
9cebb234
LP
1659static int json_transform_one(sd_bus_message *m, JsonVariant **ret);
1660
1661static int json_transform_array_or_struct(sd_bus_message *m, JsonVariant **ret) {
1662 size_t n_elements = 0, n_allocated = 0;
1663 JsonVariant **elements = NULL;
1664 int r;
1665
1666 assert(m);
1667 assert(ret);
1668
1669 for (;;) {
1670 r = sd_bus_message_at_end(m, false);
1671 if (r < 0) {
1672 bus_log_parse_error(r);
1673 goto finish;
1674 }
1675 if (r > 0)
1676 break;
1677
1678 if (!GREEDY_REALLOC(elements, n_allocated, n_elements + 1)) {
1679 r = log_oom();
1680 goto finish;
1681 }
1682
1683 r = json_transform_one(m, elements + n_elements);
1684 if (r < 0)
1685 goto finish;
1686
1687 n_elements++;
1688 }
1689
1690 r = json_variant_new_array(ret, elements, n_elements);
1691
1692finish:
1693 json_variant_unref_many(elements, n_elements);
1694 free(elements);
1695
1696 return r;
1697}
1698
1699static int json_transform_variant(sd_bus_message *m, const char *contents, JsonVariant **ret) {
172e4806 1700 _cleanup_(json_variant_unrefp) JsonVariant *value = NULL;
9cebb234
LP
1701 int r;
1702
1703 assert(m);
1704 assert(contents);
1705 assert(ret);
1706
1707 r = json_transform_one(m, &value);
1708 if (r < 0)
1709 return r;
1710
1711 r = json_build(ret, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("type", JSON_BUILD_STRING(contents)),
1712 JSON_BUILD_PAIR("data", JSON_BUILD_VARIANT(value))));
1713 if (r < 0)
1714 return log_oom();
1715
1716 return r;
1717}
1718
1719static int json_transform_dict_array(sd_bus_message *m, JsonVariant **ret) {
1720 size_t n_elements = 0, n_allocated = 0;
1721 JsonVariant **elements = NULL;
1722 int r;
1723
1724 assert(m);
1725 assert(ret);
1726
1727 for (;;) {
1728 const char *contents;
1729 char type;
1730
1731 r = sd_bus_message_at_end(m, false);
1732 if (r < 0) {
1733 bus_log_parse_error(r);
1734 goto finish;
1735 }
1736 if (r > 0)
1737 break;
1738
1739 r = sd_bus_message_peek_type(m, &type, &contents);
1740 if (r < 0)
1741 return r;
1742
1743 assert(type == 'e');
1744
1745 if (!GREEDY_REALLOC(elements, n_allocated, n_elements + 2)) {
1746 r = log_oom();
1747 goto finish;
1748 }
1749
1750 r = sd_bus_message_enter_container(m, type, contents);
1751 if (r < 0) {
1752 bus_log_parse_error(r);
1753 goto finish;
1754 }
1755
1756 r = json_transform_one(m, elements + n_elements);
1757 if (r < 0)
1758 goto finish;
1759
1760 n_elements++;
1761
1762 r = json_transform_one(m, elements + n_elements);
1763 if (r < 0)
1764 goto finish;
1765
1766 n_elements++;
1767
1768 r = sd_bus_message_exit_container(m);
1769 if (r < 0) {
1770 bus_log_parse_error(r);
1771 goto finish;
1772 }
1773 }
1774
1775 r = json_variant_new_object(ret, elements, n_elements);
1776
1777finish:
1778 json_variant_unref_many(elements, n_elements);
1779 free(elements);
1780
1781 return r;
1782}
1783
1784static int json_transform_one(sd_bus_message *m, JsonVariant **ret) {
1785 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
1786 const char *contents;
1787 char type;
1788 int r;
1789
1790 assert(m);
1791 assert(ret);
1792
1793 r = sd_bus_message_peek_type(m, &type, &contents);
1794 if (r < 0)
1795 return bus_log_parse_error(r);
1796
1797 switch (type) {
1798
1799 case SD_BUS_TYPE_BYTE: {
1800 uint8_t b;
1801
1802 r = sd_bus_message_read_basic(m, type, &b);
1803 if (r < 0)
1804 return bus_log_parse_error(r);
1805
1806 r = json_variant_new_unsigned(&v, b);
1807 if (r < 0)
1808 return log_error_errno(r, "Failed to transform byte: %m");
1809
1810 break;
1811 }
1812
1813 case SD_BUS_TYPE_BOOLEAN: {
1814 int b;
1815
1816 r = sd_bus_message_read_basic(m, type, &b);
1817 if (r < 0)
1818 return bus_log_parse_error(r);
1819
1820 r = json_variant_new_boolean(&v, b);
1821 if (r < 0)
1822 return log_error_errno(r, "Failed to transform boolean: %m");
1823
1824 break;
1825 }
1826
1827 case SD_BUS_TYPE_INT16: {
1828 int16_t b;
1829
1830 r = sd_bus_message_read_basic(m, type, &b);
1831 if (r < 0)
1832 return bus_log_parse_error(r);
1833
1834 r = json_variant_new_integer(&v, b);
1835 if (r < 0)
1836 return log_error_errno(r, "Failed to transform int16: %m");
1837
1838 break;
1839 }
1840
1841 case SD_BUS_TYPE_UINT16: {
1842 uint16_t b;
1843
1844 r = sd_bus_message_read_basic(m, type, &b);
1845 if (r < 0)
1846 return bus_log_parse_error(r);
1847
1848 r = json_variant_new_unsigned(&v, b);
1849 if (r < 0)
1850 return log_error_errno(r, "Failed to transform uint16: %m");
1851
1852 break;
1853 }
1854
1855 case SD_BUS_TYPE_INT32: {
1856 int32_t b;
1857
1858 r = sd_bus_message_read_basic(m, type, &b);
1859 if (r < 0)
1860 return bus_log_parse_error(r);
1861
1862 r = json_variant_new_integer(&v, b);
1863 if (r < 0)
1864 return log_error_errno(r, "Failed to transform int32: %m");
1865
1866 break;
1867 }
1868
1869 case SD_BUS_TYPE_UINT32: {
1870 uint32_t b;
1871
1872 r = sd_bus_message_read_basic(m, type, &b);
1873 if (r < 0)
1874 return bus_log_parse_error(r);
1875
1876 r = json_variant_new_unsigned(&v, b);
1877 if (r < 0)
1878 return log_error_errno(r, "Failed to transform uint32: %m");
1879
1880 break;
1881 }
1882
1883 case SD_BUS_TYPE_INT64: {
1884 int64_t b;
1885
1886 r = sd_bus_message_read_basic(m, type, &b);
1887 if (r < 0)
1888 return bus_log_parse_error(r);
1889
1890 r = json_variant_new_integer(&v, b);
1891 if (r < 0)
1892 return log_error_errno(r, "Failed to transform int64: %m");
1893
1894 break;
1895 }
1896
1897 case SD_BUS_TYPE_UINT64: {
1898 uint64_t b;
1899
1900 r = sd_bus_message_read_basic(m, type, &b);
1901 if (r < 0)
1902 return bus_log_parse_error(r);
1903
1904 r = json_variant_new_unsigned(&v, b);
1905 if (r < 0)
1906 return log_error_errno(r, "Failed to transform uint64: %m");
1907
1908 break;
1909 }
1910
1911 case SD_BUS_TYPE_DOUBLE: {
1912 double d;
1913
1914 r = sd_bus_message_read_basic(m, type, &d);
1915 if (r < 0)
1916 return bus_log_parse_error(r);
1917
1918 r = json_variant_new_real(&v, d);
1919 if (r < 0)
1920 return log_error_errno(r, "Failed to transform double: %m");
1921
1922 break;
1923 }
1924
1925 case SD_BUS_TYPE_STRING:
1926 case SD_BUS_TYPE_OBJECT_PATH:
1927 case SD_BUS_TYPE_SIGNATURE: {
1928 const char *s;
1929
1930 r = sd_bus_message_read_basic(m, type, &s);
1931 if (r < 0)
1932 return bus_log_parse_error(r);
1933
1934 r = json_variant_new_string(&v, s);
1935 if (r < 0)
1936 return log_error_errno(r, "Failed to transform double: %m");
1937
1938 break;
1939 }
1940
1941 case SD_BUS_TYPE_UNIX_FD:
1942 r = sd_bus_message_read_basic(m, type, NULL);
1943 if (r < 0)
1944 return bus_log_parse_error(r);
1945
1946 r = json_variant_new_null(&v);
1947 if (r < 0)
1948 return log_error_errno(r, "Failed to transform fd: %m");
1949
1950 break;
1951
1952 case SD_BUS_TYPE_ARRAY:
1953 case SD_BUS_TYPE_VARIANT:
1954 case SD_BUS_TYPE_STRUCT:
1955 r = sd_bus_message_enter_container(m, type, contents);
1956 if (r < 0)
1957 return bus_log_parse_error(r);
1958
1959 if (type == SD_BUS_TYPE_VARIANT)
1960 r = json_transform_variant(m, contents, &v);
1961 else if (type == SD_BUS_TYPE_ARRAY && contents[0] == '{')
1962 r = json_transform_dict_array(m, &v);
1963 else
1964 r = json_transform_array_or_struct(m, &v);
1965 if (r < 0)
1966 return r;
1967
1968 r = sd_bus_message_exit_container(m);
1969 if (r < 0)
1970 return bus_log_parse_error(r);
1971
1972 break;
1973
1974 default:
1975 assert_not_reached("Unexpected element type");
1976 }
1977
1978 *ret = TAKE_PTR(v);
1979 return 0;
1980}
1981
1982static int json_transform_message(sd_bus_message *m, JsonVariant **ret) {
1983 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
1984 const char *type;
1985 int r;
1986
1987 assert(m);
1988 assert(ret);
1989
1990 assert_se(type = sd_bus_message_get_signature(m, false));
1991
1992 r = json_transform_array_or_struct(m, &v);
1993 if (r < 0)
1994 return r;
1995
1996 r = json_build(ret, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("type", JSON_BUILD_STRING(type)),
1997 JSON_BUILD_PAIR("data", JSON_BUILD_VARIANT(v))));
1998 if (r < 0)
1999 return log_oom();
2000
2001 return 0;
2002}
2003
2004static void json_dump_with_flags(JsonVariant *v, FILE *f) {
2005
2006 json_variant_dump(v,
2007 (arg_json == JSON_PRETTY ? JSON_FORMAT_PRETTY : JSON_FORMAT_NEWLINE) |
ab91733c 2008 JSON_FORMAT_COLOR_AUTO,
9cebb234
LP
2009 f, NULL);
2010}
2011
9bb31a0c
YW
2012static int call(int argc, char **argv, void *userdata) {
2013 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348
LP
2014 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2015 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL;
781fa938
LP
2016 int r;
2017
9bb31a0c
YW
2018 r = acquire_bus(false, &bus);
2019 if (r < 0)
2020 return r;
781fa938
LP
2021
2022 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], argv[3], argv[4]);
79f34de9
LP
2023 if (r < 0)
2024 return bus_log_create_error(r);
781fa938 2025
38051578
LP
2026 r = sd_bus_message_set_expect_reply(m, arg_expect_reply);
2027 if (r < 0)
2028 return bus_log_create_error(r);
2029
2030 r = sd_bus_message_set_auto_start(m, arg_auto_start);
2031 if (r < 0)
2032 return bus_log_create_error(r);
2033
2034 r = sd_bus_message_set_allow_interactive_authorization(m, arg_allow_interactive_authorization);
2035 if (r < 0)
2036 return bus_log_create_error(r);
2037
781fa938
LP
2038 if (!isempty(argv[5])) {
2039 char **p;
2040
2041 p = argv+6;
2042
2043 r = message_append_cmdline(m, argv[5], &p);
2044 if (r < 0)
2045 return r;
2046
0747cde7 2047 if (*p)
16c347b3
ZJS
2048 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
2049 "Too many parameters for signature.");
781fa938
LP
2050 }
2051
38051578
LP
2052 if (!arg_expect_reply) {
2053 r = sd_bus_send(bus, m, NULL);
48956c39
LP
2054 if (r < 0)
2055 return log_error_errno(r, "Failed to send message: %m");
38051578
LP
2056
2057 return 0;
2058 }
2059
a44b1081 2060 r = sd_bus_call(bus, m, arg_timeout, &error, &reply);
48956c39 2061 if (r < 0)
24a4e7ff 2062 return log_error_errno(r, "Call failed: %s", bus_error_message(&error, r));
781fa938
LP
2063
2064 r = sd_bus_message_is_empty(reply);
2065 if (r < 0)
2066 return bus_log_parse_error(r);
1fc55609 2067
781fa938 2068 if (r == 0 && !arg_quiet) {
1fc55609 2069
9cebb234
LP
2070 if (arg_json != JSON_OFF) {
2071 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
2072
2073 if (arg_json != JSON_SHORT)
0221d68a 2074 (void) pager_open(arg_pager_flags);
9cebb234
LP
2075
2076 r = json_transform_message(reply, &v);
2077 if (r < 0)
2078 return r;
2079
2080 json_dump_with_flags(v, stdout);
2081
2082 } else if (arg_verbose) {
0221d68a 2083 (void) pager_open(arg_pager_flags);
1fc55609 2084
2b4a65b6 2085 r = sd_bus_message_dump(reply, stdout, 0);
1fc55609
LP
2086 if (r < 0)
2087 return r;
2088 } else {
2089
2090 fputs(sd_bus_message_get_signature(reply, true), stdout);
2091 fputc(' ', stdout);
2092
2093 r = format_cmdline(reply, stdout, false);
2094 if (r < 0)
2095 return bus_log_parse_error(r);
2096
2097 fputc('\n', stdout);
2098 }
d55192ad
LP
2099 }
2100
2101 return 0;
2102}
2103
143aea38
YW
2104static int emit_signal(int argc, char **argv, void *userdata) {
2105 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2106 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
2107 int r;
2108
2109 r = acquire_bus(false, &bus);
2110 if (r < 0)
2111 return r;
2112
2113 r = sd_bus_message_new_signal(bus, &m, argv[1], argv[2], argv[3]);
2114 if (r < 0)
2115 return bus_log_create_error(r);
2116
2117 if (arg_destination) {
2118 r = sd_bus_message_set_destination(m, arg_destination);
2119 if (r < 0)
2120 return bus_log_create_error(r);
2121 }
2122
2123 r = sd_bus_message_set_auto_start(m, arg_auto_start);
2124 if (r < 0)
2125 return bus_log_create_error(r);
2126
2127 if (!isempty(argv[4])) {
2128 char **p;
2129
2130 p = argv+5;
2131
2132 r = message_append_cmdline(m, argv[4], &p);
2133 if (r < 0)
2134 return r;
2135
2136 if (*p)
16c347b3
ZJS
2137 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
2138 "Too many parameters for signature.");
143aea38
YW
2139 }
2140
2141 r = sd_bus_send(bus, m, NULL);
2142 if (r < 0)
2143 return log_error_errno(r, "Failed to send signal: %m");
2144
2145 return 0;
2146}
2147
9bb31a0c
YW
2148static int get_property(int argc, char **argv, void *userdata) {
2149 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348 2150 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1fc55609 2151 char **i;
d55192ad
LP
2152 int r;
2153
9bb31a0c
YW
2154 r = acquire_bus(false, &bus);
2155 if (r < 0)
2156 return r;
d55192ad 2157
1fc55609 2158 STRV_FOREACH(i, argv + 4) {
4afd3348 2159 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1fc55609
LP
2160 const char *contents = NULL;
2161 char type;
d55192ad 2162
16c347b3
ZJS
2163 r = sd_bus_call_method(bus, argv[1], argv[2],
2164 "org.freedesktop.DBus.Properties", "Get",
2165 &error, &reply, "ss", argv[3], *i);
48956c39 2166 if (r < 0)
24a4e7ff
ZJS
2167 return log_error_errno(r, "Failed to get property %s on interface %s: %s",
2168 *i, argv[3],
2169 bus_error_message(&error, r));
d55192ad 2170
1fc55609 2171 r = sd_bus_message_peek_type(reply, &type, &contents);
d55192ad
LP
2172 if (r < 0)
2173 return bus_log_parse_error(r);
2174
1fc55609
LP
2175 r = sd_bus_message_enter_container(reply, 'v', contents);
2176 if (r < 0)
2177 return bus_log_parse_error(r);
d55192ad 2178
9cebb234
LP
2179 if (arg_json != JSON_OFF) {
2180 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
2181
2182 if (arg_json != JSON_SHORT)
0221d68a 2183 (void) pager_open(arg_pager_flags);
9cebb234
LP
2184
2185 r = json_transform_variant(reply, contents, &v);
2186 if (r < 0)
2187 return r;
2188
2189 json_dump_with_flags(v, stdout);
2190
2de62253 2191 } else if (arg_verbose) {
0221d68a 2192 (void) pager_open(arg_pager_flags);
d55192ad 2193
2b4a65b6 2194 r = sd_bus_message_dump(reply, stdout, SD_BUS_MESSAGE_DUMP_SUBTREE_ONLY);
d55192ad 2195 if (r < 0)
1fc55609
LP
2196 return r;
2197 } else {
2198 fputs(contents, stdout);
2199 fputc(' ', stdout);
d55192ad 2200
1fc55609 2201 r = format_cmdline(reply, stdout, false);
d55192ad
LP
2202 if (r < 0)
2203 return bus_log_parse_error(r);
2204
1fc55609 2205 fputc('\n', stdout);
d55192ad
LP
2206 }
2207
2208 r = sd_bus_message_exit_container(reply);
2209 if (r < 0)
2210 return bus_log_parse_error(r);
1fc55609 2211 }
d55192ad 2212
1fc55609
LP
2213 return 0;
2214}
d55192ad 2215
9bb31a0c
YW
2216static int set_property(int argc, char **argv, void *userdata) {
2217 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
4afd3348
LP
2218 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
2219 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1fc55609
LP
2220 char **p;
2221 int r;
d55192ad 2222
9bb31a0c
YW
2223 r = acquire_bus(false, &bus);
2224 if (r < 0)
2225 return r;
d55192ad 2226
16c347b3
ZJS
2227 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2],
2228 "org.freedesktop.DBus.Properties", "Set");
1fc55609
LP
2229 if (r < 0)
2230 return bus_log_create_error(r);
d55192ad 2231
1fc55609
LP
2232 r = sd_bus_message_append(m, "ss", argv[3], argv[4]);
2233 if (r < 0)
2234 return bus_log_create_error(r);
d55192ad 2235
1fc55609
LP
2236 r = sd_bus_message_open_container(m, 'v', argv[5]);
2237 if (r < 0)
2238 return bus_log_create_error(r);
2239
9bb31a0c 2240 p = argv + 6;
1fc55609
LP
2241 r = message_append_cmdline(m, argv[5], &p);
2242 if (r < 0)
2243 return r;
2244
2245 r = sd_bus_message_close_container(m);
2246 if (r < 0)
2247 return bus_log_create_error(r);
2248
0747cde7
YW
2249 if (*p)
2250 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Too many parameters for signature.");
1fc55609 2251
a44b1081 2252 r = sd_bus_call(bus, m, arg_timeout, &error, NULL);
48956c39 2253 if (r < 0)
24a4e7ff
ZJS
2254 return log_error_errno(r, "Failed to set property %s on interface %s: %s",
2255 argv[4], argv[3],
2256 bus_error_message(&error, r));
781fa938
LP
2257
2258 return 0;
2259}
2260
1f849790 2261static int help(void) {
37ec0fdd
LP
2262 _cleanup_free_ char *link = NULL;
2263 int r;
2264
2265 r = terminal_urlify_man("busctl", "1", &link);
2266 if (r < 0)
2267 return log_oom();
2268
353b2baa
LP
2269 printf("%s [OPTIONS...] COMMAND ...\n\n"
2270 "%sIntrospect the D-Bus IPC bus.%s\n"
2271 "\nCommands:\n"
e1fac8a6
ZJS
2272 " list List bus names\n"
2273 " status [SERVICE] Show bus service, process or bus owner credentials\n"
2274 " monitor [SERVICE...] Show bus traffic\n"
2275 " capture [SERVICE...] Capture bus traffic as pcap\n"
2276 " tree [SERVICE...] Show object tree of service\n"
2277 " introspect SERVICE OBJECT [INTERFACE]\n"
2278 " call SERVICE OBJECT INTERFACE METHOD [SIGNATURE [ARGUMENT...]]\n"
2279 " Call a method\n"
2280 " emit OBJECT INTERFACE SIGNAL [SIGNATURE [ARGUMENT...]]\n"
2281 " Emit a signal\n"
2282 " get-property SERVICE OBJECT INTERFACE PROPERTY...\n"
2283 " Get property value\n"
2284 " set-property SERVICE OBJECT INTERFACE PROPERTY SIGNATURE ARGUMENT...\n"
2285 " Set property value\n"
2286 " help Show this help\n"
2287 "\nOptions:\n"
9ecb11f5
YW
2288 " -h --help Show this help\n"
2289 " --version Show package version\n"
2290 " --no-pager Do not pipe output into a pager\n"
2291 " --no-legend Do not show the headers and footers\n"
b683b82f 2292 " -l --full Do not ellipsize output\n"
9ecb11f5
YW
2293 " --system Connect to system bus\n"
2294 " --user Connect to user bus\n"
2295 " -H --host=[USER@]HOST Operate on remote host\n"
2296 " -M --machine=CONTAINER Operate on local container\n"
2297 " --address=ADDRESS Connect to bus specified by address\n"
2298 " --show-machine Show machine ID column in list\n"
2299 " --unique Only show unique names\n"
2300 " --acquired Only show acquired names\n"
2301 " --activatable Only show activatable names\n"
2302 " --match=MATCH Only show matching messages\n"
2303 " --size=SIZE Maximum length of captured packet\n"
2304 " --list Don't show tree, but simple object path list\n"
2305 " -q --quiet Don't show method call reply\n"
2306 " --verbose Show result values in long format\n"
2307 " --json=MODE Output as JSON\n"
2308 " -j Same as --json=pretty on tty, --json=short otherwise\n"
2309 " --expect-reply=BOOL Expect a method call reply\n"
2310 " --auto-start=BOOL Auto-start destination service\n"
38051578 2311 " --allow-interactive-authorization=BOOL\n"
9ecb11f5
YW
2312 " Allow interactive authorization for operation\n"
2313 " --timeout=SECS Maximum time to wait for method call completion\n"
2314 " --augment-creds=BOOL Extend credential data with data read from /proc/$PID\n"
2315 " --watch-bind=BOOL Wait for bus AF_UNIX socket to be bound in the file\n"
2316 " system\n"
143aea38 2317 " --destination=SERVICE Destination service of a signal\n"
37ec0fdd
LP
2318 "\nSee the %s for details.\n"
2319 , program_invocation_short_name
353b2baa 2320 , ansi_highlight()
ce2529b4 2321 , ansi_normal()
37ec0fdd
LP
2322 , link
2323 );
1f849790
LP
2324
2325 return 0;
2326}
2327
9bb31a0c
YW
2328static int verb_help(int argc, char **argv, void *userdata) {
2329 return help();
2330}
2331
1f849790
LP
2332static int parse_argv(int argc, char *argv[]) {
2333
2334 enum {
2335 ARG_VERSION = 0x100,
2336 ARG_NO_PAGER,
17d47d8d 2337 ARG_NO_LEGEND,
1f849790
LP
2338 ARG_SYSTEM,
2339 ARG_USER,
2340 ARG_ADDRESS,
2341 ARG_MATCH,
56e61788
LP
2342 ARG_SHOW_MACHINE,
2343 ARG_UNIQUE,
2344 ARG_ACQUIRED,
1f70b087
LP
2345 ARG_ACTIVATABLE,
2346 ARG_SIZE,
d9130355 2347 ARG_LIST,
1fc55609 2348 ARG_VERBOSE,
d5c8d823 2349 ARG_XML_INTERFACE,
38051578
LP
2350 ARG_EXPECT_REPLY,
2351 ARG_AUTO_START,
2352 ARG_ALLOW_INTERACTIVE_AUTHORIZATION,
a44b1081 2353 ARG_TIMEOUT,
40ed1a45 2354 ARG_AUGMENT_CREDS,
56d820b6 2355 ARG_WATCH_BIND,
9cebb234 2356 ARG_JSON,
143aea38 2357 ARG_DESTINATION,
1f849790
LP
2358 };
2359
2360 static const struct option options[] = {
9cebb234
LP
2361 { "help", no_argument, NULL, 'h' },
2362 { "version", no_argument, NULL, ARG_VERSION },
2363 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
2364 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
b683b82f 2365 { "full", no_argument, NULL, 'l' },
9cebb234
LP
2366 { "system", no_argument, NULL, ARG_SYSTEM },
2367 { "user", no_argument, NULL, ARG_USER },
2368 { "address", required_argument, NULL, ARG_ADDRESS },
2369 { "show-machine", no_argument, NULL, ARG_SHOW_MACHINE },
2370 { "unique", no_argument, NULL, ARG_UNIQUE },
2371 { "acquired", no_argument, NULL, ARG_ACQUIRED },
2372 { "activatable", no_argument, NULL, ARG_ACTIVATABLE },
2373 { "match", required_argument, NULL, ARG_MATCH },
2374 { "host", required_argument, NULL, 'H' },
2375 { "machine", required_argument, NULL, 'M' },
2376 { "size", required_argument, NULL, ARG_SIZE },
2377 { "list", no_argument, NULL, ARG_LIST },
2378 { "quiet", no_argument, NULL, 'q' },
2379 { "verbose", no_argument, NULL, ARG_VERBOSE },
d5c8d823 2380 { "xml-interface", no_argument, NULL, ARG_XML_INTERFACE },
9cebb234
LP
2381 { "expect-reply", required_argument, NULL, ARG_EXPECT_REPLY },
2382 { "auto-start", required_argument, NULL, ARG_AUTO_START },
38051578 2383 { "allow-interactive-authorization", required_argument, NULL, ARG_ALLOW_INTERACTIVE_AUTHORIZATION },
9cebb234
LP
2384 { "timeout", required_argument, NULL, ARG_TIMEOUT },
2385 { "augment-creds", required_argument, NULL, ARG_AUGMENT_CREDS },
2386 { "watch-bind", required_argument, NULL, ARG_WATCH_BIND },
2387 { "json", required_argument, NULL, ARG_JSON },
143aea38 2388 { "destination", required_argument, NULL, ARG_DESTINATION },
eb9da376 2389 {},
1f849790
LP
2390 };
2391
1f70b087 2392 int c, r;
1f849790
LP
2393
2394 assert(argc >= 0);
2395 assert(argv);
2396
9cebb234 2397 while ((c = getopt_long(argc, argv, "hH:M:qj", options, NULL)) >= 0)
1f849790
LP
2398
2399 switch (c) {
2400
2401 case 'h':
2402 return help();
2403
2404 case ARG_VERSION:
3f6fd1ba 2405 return version();
1f849790
LP
2406
2407 case ARG_NO_PAGER:
0221d68a 2408 arg_pager_flags |= PAGER_DISABLE;
1f849790
LP
2409 break;
2410
17d47d8d
TA
2411 case ARG_NO_LEGEND:
2412 arg_legend = false;
2413 break;
2414
b683b82f
YW
2415 case 'l':
2416 arg_full = true;
2417 break;
2418
1f849790
LP
2419 case ARG_USER:
2420 arg_user = true;
2421 break;
2422
2423 case ARG_SYSTEM:
2424 arg_user = false;
2425 break;
2426
2427 case ARG_ADDRESS:
2428 arg_address = optarg;
2429 break;
2430
56e61788
LP
2431 case ARG_SHOW_MACHINE:
2432 arg_show_machine = true;
2433 break;
2434
2435 case ARG_UNIQUE:
2436 arg_unique = true;
1f849790
LP
2437 break;
2438
56e61788
LP
2439 case ARG_ACQUIRED:
2440 arg_acquired = true;
2441 break;
2442
2443 case ARG_ACTIVATABLE:
2444 arg_activatable = true;
a4297f08
LP
2445 break;
2446
1f849790
LP
2447 case ARG_MATCH:
2448 if (strv_extend(&arg_matches, optarg) < 0)
2449 return log_oom();
2450 break;
2451
1f70b087 2452 case ARG_SIZE: {
59f448cf 2453 uint64_t sz;
1f70b087 2454
59f448cf 2455 r = parse_size(optarg, 1024, &sz);
48956c39 2456 if (r < 0)
3d9942de 2457 return log_error_errno(r, "Failed to parse size '%s': %m", optarg);
1f70b087 2458
baaa35ad
ZJS
2459 if ((uint64_t) (size_t) sz != sz)
2460 return log_error_errno(SYNTHETIC_ERRNO(E2BIG),
2461 "Size out of range.");
1f70b087 2462
59f448cf 2463 arg_snaplen = (size_t) sz;
1f70b087
LP
2464 break;
2465 }
2466
d9130355
LP
2467 case ARG_LIST:
2468 arg_list = true;
2469 break;
2470
d75edbd6
LP
2471 case 'H':
2472 arg_transport = BUS_TRANSPORT_REMOTE;
2473 arg_host = optarg;
2474 break;
2475
2476 case 'M':
de33fc62 2477 arg_transport = BUS_TRANSPORT_MACHINE;
d75edbd6
LP
2478 arg_host = optarg;
2479 break;
2480
781fa938
LP
2481 case 'q':
2482 arg_quiet = true;
2483 break;
2484
1fc55609
LP
2485 case ARG_VERBOSE:
2486 arg_verbose = true;
2487 break;
2488
d5c8d823
ZJS
2489 case ARG_XML_INTERFACE:
2490 arg_xml_interface = true;
2491 break;
2492
38051578
LP
2493 case ARG_EXPECT_REPLY:
2494 r = parse_boolean(optarg);
48956c39 2495 if (r < 0)
3d9942de 2496 return log_error_errno(r, "Failed to parse --expect-reply= parameter '%s': %m", optarg);
38051578 2497
5d904a6a 2498 arg_expect_reply = r;
38051578
LP
2499 break;
2500
38051578
LP
2501 case ARG_AUTO_START:
2502 r = parse_boolean(optarg);
48956c39 2503 if (r < 0)
3d9942de 2504 return log_error_errno(r, "Failed to parse --auto-start= parameter '%s': %m", optarg);
38051578 2505
5d904a6a 2506 arg_auto_start = r;
38051578
LP
2507 break;
2508
38051578
LP
2509 case ARG_ALLOW_INTERACTIVE_AUTHORIZATION:
2510 r = parse_boolean(optarg);
48956c39 2511 if (r < 0)
3d9942de 2512 return log_error_errno(r, "Failed to parse --allow-interactive-authorization= parameter '%s': %m", optarg);
38051578 2513
5d904a6a 2514 arg_allow_interactive_authorization = r;
38051578
LP
2515 break;
2516
a44b1081
LP
2517 case ARG_TIMEOUT:
2518 r = parse_sec(optarg, &arg_timeout);
48956c39 2519 if (r < 0)
3d9942de 2520 return log_error_errno(r, "Failed to parse --timeout= parameter '%s': %m", optarg);
a44b1081
LP
2521
2522 break;
2523
40ed1a45
LP
2524 case ARG_AUGMENT_CREDS:
2525 r = parse_boolean(optarg);
48956c39 2526 if (r < 0)
3d9942de 2527 return log_error_errno(r, "Failed to parse --augment-creds= parameter '%s': %m", optarg);
40ed1a45 2528
5d904a6a 2529 arg_augment_creds = r;
40ed1a45
LP
2530 break;
2531
56d820b6
LP
2532 case ARG_WATCH_BIND:
2533 r = parse_boolean(optarg);
48956c39 2534 if (r < 0)
3d9942de 2535 return log_error_errno(r, "Failed to parse --watch-bind= parameter '%s': %m", optarg);
56d820b6 2536
5d904a6a 2537 arg_watch_bind = r;
56d820b6
LP
2538 break;
2539
9cebb234
LP
2540 case 'j':
2541 if (on_tty())
2542 arg_json = JSON_PRETTY;
2543 else
2544 arg_json = JSON_SHORT;
2545 break;
2546
2547 case ARG_JSON:
2548 if (streq(optarg, "short"))
2549 arg_json = JSON_SHORT;
2550 else if (streq(optarg, "pretty"))
2551 arg_json = JSON_PRETTY;
2552 else if (streq(optarg, "help")) {
2553 fputs("short\n"
2554 "pretty\n", stdout);
2555 return 0;
baaa35ad
ZJS
2556 } else
2557 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
2558 "Unknown JSON out mode: %s",
2559 optarg);
9cebb234
LP
2560
2561 break;
2562
143aea38
YW
2563 case ARG_DESTINATION:
2564 arg_destination = optarg;
2565 break;
2566
1f849790
LP
2567 case '?':
2568 return -EINVAL;
2569
2570 default:
eb9da376 2571 assert_not_reached("Unhandled option");
1f849790 2572 }
1f849790
LP
2573
2574 return 1;
2575}
2576
9bb31a0c 2577static int busctl_main(int argc, char *argv[]) {
9bb31a0c
YW
2578 static const Verb verbs[] = {
2579 { "list", VERB_ANY, 1, VERB_DEFAULT, list_bus_names },
2580 { "status", VERB_ANY, 2, 0, status },
2581 { "monitor", VERB_ANY, VERB_ANY, 0, verb_monitor },
2582 { "capture", VERB_ANY, VERB_ANY, 0, verb_capture },
2583 { "tree", VERB_ANY, VERB_ANY, 0, tree },
2584 { "introspect", 3, 4, 0, introspect },
2585 { "call", 5, VERB_ANY, 0, call },
143aea38 2586 { "emit", 4, VERB_ANY, 0, emit_signal },
9bb31a0c
YW
2587 { "get-property", 5, VERB_ANY, 0, get_property },
2588 { "set-property", 6, VERB_ANY, 0, set_property },
2589 { "help", VERB_ANY, VERB_ANY, 0, verb_help },
2590 {}
2591 };
1f849790 2592
9bb31a0c 2593 return dispatch_verb(argc, argv, verbs, NULL);
1f849790
LP
2594}
2595
360f3dc2 2596static int run(int argc, char *argv[]) {
1f849790
LP
2597 int r;
2598
41d1f469 2599 log_setup_cli();
1f849790
LP
2600
2601 r = parse_argv(argc, argv);
2602 if (r <= 0)
360f3dc2 2603 return r;
de1c301e 2604
360f3dc2 2605 return busctl_main(argc, argv);
de1c301e 2606}
360f3dc2
YW
2607
2608DEFINE_MAIN_FUNCTION(run);