1 /* SPDX-License-Identifier: LGPL-2.1+ */
8 #include "sd-netlink.h"
11 #include "alloc-util.h"
12 #include "bus-common-errors.h"
13 #include "bus-error.h"
15 #include "dns-domain.h"
17 #include "format-util.h"
18 #include "gcrypt-util.h"
19 #include "in-addr-util.h"
20 #include "main-func.h"
21 #include "missing_network.h"
22 #include "netlink-util.h"
24 #include "parse-util.h"
25 #include "pretty-print.h"
26 #include "resolvconf-compat.h"
27 #include "resolvectl.h"
28 #include "resolved-def.h"
29 #include "resolved-dns-packet.h"
30 #include "string-table.h"
32 #include "terminal-util.h"
35 static int arg_family
= AF_UNSPEC
;
36 static int arg_ifindex
= 0;
37 static char *arg_ifname
= NULL
;
38 static uint16_t arg_type
= 0;
39 static uint16_t arg_class
= 0;
40 static bool arg_legend
= true;
41 static uint64_t arg_flags
= 0;
42 static PagerFlags arg_pager_flags
= 0;
43 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
44 static const char *arg_service_family
= NULL
;
46 typedef enum RawType
{
51 static RawType arg_raw
= RAW_NONE
;
53 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
55 char **arg_set_dns
= NULL
;
56 char **arg_set_domain
= NULL
;
57 static const char *arg_set_llmnr
= NULL
;
58 static const char *arg_set_mdns
= NULL
;
59 static const char *arg_set_dns_over_tls
= NULL
;
60 static const char *arg_set_dnssec
= NULL
;
61 static char **arg_set_nta
= NULL
;
63 STATIC_DESTRUCTOR_REGISTER(arg_ifname
, freep
);
64 STATIC_DESTRUCTOR_REGISTER(arg_set_dns
, strv_freep
);
65 STATIC_DESTRUCTOR_REGISTER(arg_set_domain
, strv_freep
);
66 STATIC_DESTRUCTOR_REGISTER(arg_set_nta
, strv_freep
);
68 typedef enum StatusMode
{
80 int ifname_mangle(const char *s
) {
81 _cleanup_free_
char *iface
= NULL
;
89 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
90 iface
= strndup(s
, dot
- s
);
97 ifi
= parse_ifindex_or_ifname(iface
);
99 if (ifi
== -ENODEV
&& arg_ifindex_permissive
) {
100 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
104 return log_error_errno(ifi
, "Unknown interface '%s': %m", iface
);
107 if (arg_ifindex
> 0 && arg_ifindex
!= ifi
)
108 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Specified multiple different interfaces. Refusing.");
111 free_and_replace(arg_ifname
, iface
);
116 static void print_source(uint64_t flags
, usec_t rtt
) {
117 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
125 printf("\n%s-- Information acquired via", ansi_grey());
128 printf(" protocol%s%s%s%s%s",
129 flags
& SD_RESOLVED_DNS
? " DNS" :"",
130 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
131 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
132 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
133 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
135 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
138 "%s-- Data is authenticated: %s%s\n",
139 rtt_str
, ansi_normal(),
140 ansi_grey(), yes_no(flags
& SD_RESOLVED_AUTHENTICATED
), ansi_normal());
143 static void print_ifindex_comment(int printed_so_far
, int ifindex
) {
144 char ifname
[IF_NAMESIZE
+ 1];
149 if (!format_ifname(ifindex
, ifname
))
150 log_warning_errno(errno
, "Failed to resolve interface name for index %i, ignoring: %m", ifindex
);
152 printf("%*s%s-- link: %s%s",
153 60 > printed_so_far
? 60 - printed_so_far
: 0, " ", /* Align comment to the 60th column */
154 ansi_grey(), ifname
, ansi_normal());
157 static int resolve_host(sd_bus
*bus
, const char *name
) {
158 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
159 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
160 const char *canonical
= NULL
;
168 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
170 r
= sd_bus_message_new_method_call(
173 "org.freedesktop.resolve1",
174 "/org/freedesktop/resolve1",
175 "org.freedesktop.resolve1.Manager",
178 return bus_log_create_error(r
);
180 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
182 return bus_log_create_error(r
);
184 ts
= now(CLOCK_MONOTONIC
);
186 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
188 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
190 ts
= now(CLOCK_MONOTONIC
) - ts
;
192 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
194 return bus_log_parse_error(r
);
196 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
197 _cleanup_free_
char *pretty
= NULL
;
198 int ifindex
, family
, k
;
202 assert_cc(sizeof(int) == sizeof(int32_t));
204 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
206 return bus_log_parse_error(r
);
208 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
210 return bus_log_parse_error(r
);
212 r
= sd_bus_message_exit_container(reply
);
214 return bus_log_parse_error(r
);
216 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
217 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
221 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
222 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
226 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
228 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
230 k
= printf("%*s%s %s%s%s",
231 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
232 ansi_highlight(), pretty
, ansi_normal());
234 print_ifindex_comment(k
, ifindex
);
240 return bus_log_parse_error(r
);
242 r
= sd_bus_message_exit_container(reply
);
244 return bus_log_parse_error(r
);
246 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
248 return bus_log_parse_error(r
);
250 if (!streq(name
, canonical
))
251 printf("%*s%s (%s)\n",
252 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
256 log_error("%s: no addresses found", name
);
260 print_source(flags
, ts
);
265 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
266 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
267 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
268 _cleanup_free_
char *pretty
= NULL
;
275 assert(IN_SET(family
, AF_INET
, AF_INET6
));
279 ifindex
= arg_ifindex
;
281 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
285 log_debug("Resolving %s.", pretty
);
287 r
= sd_bus_message_new_method_call(
290 "org.freedesktop.resolve1",
291 "/org/freedesktop/resolve1",
292 "org.freedesktop.resolve1.Manager",
295 return bus_log_create_error(r
);
297 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
299 return bus_log_create_error(r
);
301 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
303 return bus_log_create_error(r
);
305 r
= sd_bus_message_append(req
, "t", arg_flags
);
307 return bus_log_create_error(r
);
309 ts
= now(CLOCK_MONOTONIC
);
311 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
313 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
315 ts
= now(CLOCK_MONOTONIC
) - ts
;
317 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
319 return bus_log_create_error(r
);
321 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
325 assert_cc(sizeof(int) == sizeof(int32_t));
327 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
331 r
= sd_bus_message_exit_container(reply
);
335 k
= printf("%*s%s %s%s%s",
336 (int) strlen(pretty
), c
== 0 ? pretty
: "",
338 ansi_highlight(), n
, ansi_normal());
340 print_ifindex_comment(k
, ifindex
);
346 return bus_log_parse_error(r
);
348 r
= sd_bus_message_exit_container(reply
);
350 return bus_log_parse_error(r
);
352 r
= sd_bus_message_read(reply
, "t", &flags
);
354 return bus_log_parse_error(r
);
357 log_error("%s: no names found", pretty
);
361 print_source(flags
, ts
);
366 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
367 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
368 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
371 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
375 p
->refuse_compression
= true;
377 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
381 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
383 return log_error_errno(r
, "Failed to parse RR: %m");
385 if (arg_raw
== RAW_PAYLOAD
) {
389 k
= dns_resource_record_payload(rr
, &data
);
391 return log_error_errno(k
, "Cannot dump RR: %m");
392 fwrite(data
, 1, k
, stdout
);
397 s
= dns_resource_record_to_string(rr
);
402 print_ifindex_comment(k
, ifindex
);
409 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
410 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
411 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
416 bool needs_authentication
= false;
420 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
422 r
= sd_bus_message_new_method_call(
425 "org.freedesktop.resolve1",
426 "/org/freedesktop/resolve1",
427 "org.freedesktop.resolve1.Manager",
430 return bus_log_create_error(r
);
432 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
434 return bus_log_create_error(r
);
436 ts
= now(CLOCK_MONOTONIC
);
438 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
440 if (warn_missing
|| r
!= -ENXIO
)
441 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
445 ts
= now(CLOCK_MONOTONIC
) - ts
;
447 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
449 return bus_log_parse_error(r
);
451 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
457 assert_cc(sizeof(int) == sizeof(int32_t));
459 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
461 return bus_log_parse_error(r
);
463 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
465 return bus_log_parse_error(r
);
467 r
= sd_bus_message_exit_container(reply
);
469 return bus_log_parse_error(r
);
471 if (arg_raw
== RAW_PACKET
) {
472 uint64_t u64
= htole64(l
);
474 fwrite(&u64
, sizeof(u64
), 1, stdout
);
475 fwrite(d
, 1, l
, stdout
);
477 r
= output_rr_packet(d
, l
, ifindex
);
482 if (dns_type_needs_authentication(t
))
483 needs_authentication
= true;
488 return bus_log_parse_error(r
);
490 r
= sd_bus_message_exit_container(reply
);
492 return bus_log_parse_error(r
);
494 r
= sd_bus_message_read(reply
, "t", &flags
);
496 return bus_log_parse_error(r
);
500 log_error("%s: no records found", name
);
504 print_source(flags
, ts
);
506 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
509 fprintf(stderr
, "\n%s"
510 "WARNING: The resources shown contain cryptographic key data which could not be\n"
511 " authenticated. It is not suitable to authenticate any communication.\n"
512 " This is usually indication that DNSSEC authentication was not enabled\n"
513 " or is not available for the selected protocol or DNS servers.%s\n",
514 ansi_highlight_red(),
521 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
522 uint16_t type
= 0, class = 0;
523 const char *p
, *q
, *n
;
528 assert(startswith(name
, "dns:"));
530 /* Parse RFC 4501 dns: URIs */
540 e
= strchr(p
+ 2, '/');
545 log_warning("DNS authority specification not supported; ignoring specified authority.");
552 n
= strndupa(p
, q
- p
);
558 f
= startswith_no_case(q
, "class=");
560 _cleanup_free_
char *t
= NULL
;
564 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
565 "DNS class specified twice.");
567 e
= strchrnul(f
, ';');
568 t
= strndup(f
, e
- f
);
572 r
= dns_class_from_string(t
);
574 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
575 "Unknown DNS class %s.", t
);
587 f
= startswith_no_case(q
, "type=");
589 _cleanup_free_
char *t
= NULL
;
593 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
594 "DNS type specified twice.");
596 e
= strchrnul(f
, ';');
597 t
= strndup(f
, e
- f
);
601 r
= dns_type_from_string(t
);
603 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
604 "Unknown DNS type %s.", t
);
622 class = arg_class
?: DNS_CLASS_IN
;
624 type
= arg_type
?: DNS_TYPE_A
;
626 return resolve_record(bus
, n
, class, type
, true);
629 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
630 "Invalid DNS URI: %s", name
);
633 static int verb_query(int argc
, char **argv
, void *userdata
) {
634 sd_bus
*bus
= userdata
;
639 STRV_FOREACH(p
, argv
+ 1) {
640 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
646 STRV_FOREACH(p
, argv
+ 1) {
647 if (startswith(*p
, "dns:"))
648 q
= resolve_rfc4501(bus
, *p
);
651 union in_addr_union a
;
653 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
655 q
= resolve_address(bus
, family
, &a
, ifindex
);
657 q
= resolve_host(bus
, *p
);
666 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
667 const char *canonical_name
, *canonical_type
, *canonical_domain
;
668 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
669 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
680 name
= empty_to_null(name
);
681 type
= empty_to_null(type
);
684 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
686 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
688 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
690 r
= sd_bus_message_new_method_call(
693 "org.freedesktop.resolve1",
694 "/org/freedesktop/resolve1",
695 "org.freedesktop.resolve1.Manager",
698 return bus_log_create_error(r
);
700 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
702 return bus_log_create_error(r
);
704 ts
= now(CLOCK_MONOTONIC
);
706 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
708 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
710 ts
= now(CLOCK_MONOTONIC
) - ts
;
712 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
714 return bus_log_parse_error(r
);
717 (name
? strlen(name
) + 1 : 0) +
718 (type
? strlen(type
) + 1 : 0) +
722 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
723 uint16_t priority
, weight
, port
;
724 const char *hostname
, *canonical
;
726 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
728 return bus_log_parse_error(r
);
731 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
733 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
735 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
736 (int) strlen(domain
), c
== 0 ? domain
: "",
741 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
743 return bus_log_parse_error(r
);
745 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
746 _cleanup_free_
char *pretty
= NULL
;
747 int ifindex
, family
, k
;
750 assert_cc(sizeof(int) == sizeof(int32_t));
752 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
754 return bus_log_parse_error(r
);
756 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
758 return bus_log_parse_error(r
);
760 r
= sd_bus_message_exit_container(reply
);
762 return bus_log_parse_error(r
);
764 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
765 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
769 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
770 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
774 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
776 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
778 k
= printf("%*s%s", (int) indent
, "", pretty
);
779 print_ifindex_comment(k
, ifindex
);
783 return bus_log_parse_error(r
);
785 r
= sd_bus_message_exit_container(reply
);
787 return bus_log_parse_error(r
);
789 r
= sd_bus_message_read(reply
, "s", &canonical
);
791 return bus_log_parse_error(r
);
793 if (!streq(hostname
, canonical
))
794 printf("%*s(%s)\n", (int) indent
, "", canonical
);
796 r
= sd_bus_message_exit_container(reply
);
798 return bus_log_parse_error(r
);
803 return bus_log_parse_error(r
);
805 r
= sd_bus_message_exit_container(reply
);
807 return bus_log_parse_error(r
);
809 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
811 return bus_log_parse_error(r
);
813 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
814 _cleanup_free_
char *escaped
= NULL
;
816 escaped
= cescape_length(p
, sz
);
820 printf("%*s%s\n", (int) indent
, "", escaped
);
823 return bus_log_parse_error(r
);
825 r
= sd_bus_message_exit_container(reply
);
827 return bus_log_parse_error(r
);
829 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
831 return bus_log_parse_error(r
);
833 canonical_name
= empty_to_null(canonical_name
);
834 canonical_type
= empty_to_null(canonical_type
);
836 if (!streq_ptr(name
, canonical_name
) ||
837 !streq_ptr(type
, canonical_type
) ||
838 !streq_ptr(domain
, canonical_domain
)) {
840 printf("%*s(", (int) indent
, "");
843 printf("%s/", canonical_name
);
845 printf("%s/", canonical_type
);
847 printf("%s)\n", canonical_domain
);
850 print_source(flags
, ts
);
855 static int verb_service(int argc
, char **argv
, void *userdata
) {
856 sd_bus
*bus
= userdata
;
859 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
861 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
863 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
866 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
867 const char *domain
, *full
;
869 _cleanup_free_
char *hashed
= NULL
;
874 domain
= strrchr(address
, '@');
876 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
877 "Address does not contain '@': \"%s\"", address
);
878 if (domain
== address
|| domain
[1] == '\0')
879 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
880 "Address starts or ends with '@': \"%s\"", address
);
883 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
885 return log_error_errno(r
, "Hashing failed: %m");
887 strshorten(hashed
, 56);
889 full
= strjoina(hashed
, "._openpgpkey.", domain
);
890 log_debug("Looking up \"%s\".", full
);
892 r
= resolve_record(bus
, full
,
893 arg_class
?: DNS_CLASS_IN
,
894 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
896 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
897 hashed
= mfree(hashed
);
898 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
900 return log_error_errno(r
, "Hashing failed: %m");
902 full
= strjoina(hashed
, "._openpgpkey.", domain
);
903 log_debug("Looking up \"%s\".", full
);
905 return resolve_record(bus
, full
,
906 arg_class
?: DNS_CLASS_IN
,
907 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
913 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
914 sd_bus
*bus
= userdata
;
918 STRV_FOREACH(p
, argv
+ 1) {
919 q
= resolve_openpgp(bus
, *p
);
927 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
929 uint16_t port_num
= 443;
930 _cleanup_free_
char *full
= NULL
;
936 port
= strrchr(address
, ':');
938 r
= parse_ip_port(port
+ 1, &port_num
);
940 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
942 address
= strndupa(address
, port
- address
);
945 r
= asprintf(&full
, "_%u._%s.%s",
952 log_debug("Looking up \"%s\".", full
);
954 return resolve_record(bus
, full
,
955 arg_class
?: DNS_CLASS_IN
,
956 arg_type
?: DNS_TYPE_TLSA
, true);
959 static bool service_family_is_valid(const char *s
) {
960 return STR_IN_SET(s
, "tcp", "udp", "sctp");
963 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
964 sd_bus
*bus
= userdata
;
965 char **p
, **args
= argv
+ 1;
966 const char *family
= "tcp";
969 if (service_family_is_valid(argv
[1])) {
974 STRV_FOREACH(p
, args
) {
975 q
= resolve_tlsa(bus
, family
, *p
);
983 static int show_statistics(int argc
, char **argv
, void *userdata
) {
984 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
985 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
986 sd_bus
*bus
= userdata
;
987 uint64_t n_current_transactions
, n_total_transactions
,
988 cache_size
, n_cache_hit
, n_cache_miss
,
989 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
990 int r
, dnssec_supported
;
994 r
= sd_bus_get_property_trivial(bus
,
995 "org.freedesktop.resolve1",
996 "/org/freedesktop/resolve1",
997 "org.freedesktop.resolve1.Manager",
1003 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
1005 printf("DNSSEC supported by current servers: %s%s%s\n\n",
1007 yes_no(dnssec_supported
),
1010 r
= sd_bus_get_property(bus
,
1011 "org.freedesktop.resolve1",
1012 "/org/freedesktop/resolve1",
1013 "org.freedesktop.resolve1.Manager",
1014 "TransactionStatistics",
1019 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
1021 r
= sd_bus_message_read(reply
, "(tt)",
1022 &n_current_transactions
,
1023 &n_total_transactions
);
1025 return bus_log_parse_error(r
);
1027 printf("%sTransactions%s\n"
1028 "Current Transactions: %" PRIu64
"\n"
1029 " Total Transactions: %" PRIu64
"\n",
1032 n_current_transactions
,
1033 n_total_transactions
);
1035 reply
= sd_bus_message_unref(reply
);
1037 r
= sd_bus_get_property(bus
,
1038 "org.freedesktop.resolve1",
1039 "/org/freedesktop/resolve1",
1040 "org.freedesktop.resolve1.Manager",
1046 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1048 r
= sd_bus_message_read(reply
, "(ttt)",
1053 return bus_log_parse_error(r
);
1055 printf("\n%sCache%s\n"
1056 " Current Cache Size: %" PRIu64
"\n"
1057 " Cache Hits: %" PRIu64
"\n"
1058 " Cache Misses: %" PRIu64
"\n",
1065 reply
= sd_bus_message_unref(reply
);
1067 r
= sd_bus_get_property(bus
,
1068 "org.freedesktop.resolve1",
1069 "/org/freedesktop/resolve1",
1070 "org.freedesktop.resolve1.Manager",
1076 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1078 r
= sd_bus_message_read(reply
, "(tttt)",
1082 &n_dnssec_indeterminate
);
1084 return bus_log_parse_error(r
);
1086 printf("\n%sDNSSEC Verdicts%s\n"
1087 " Secure: %" PRIu64
"\n"
1088 " Insecure: %" PRIu64
"\n"
1089 " Bogus: %" PRIu64
"\n"
1090 " Indeterminate: %" PRIu64
"\n",
1096 n_dnssec_indeterminate
);
1101 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1102 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1103 sd_bus
*bus
= userdata
;
1106 r
= sd_bus_call_method(bus
,
1107 "org.freedesktop.resolve1",
1108 "/org/freedesktop/resolve1",
1109 "org.freedesktop.resolve1.Manager",
1115 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1120 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1121 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1122 sd_bus
*bus
= userdata
;
1125 r
= sd_bus_call_method(bus
,
1126 "org.freedesktop.resolve1",
1127 "/org/freedesktop/resolve1",
1128 "org.freedesktop.resolve1.Manager",
1134 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1139 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1140 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1141 sd_bus
*bus
= userdata
;
1144 r
= sd_bus_call_method(bus
,
1145 "org.freedesktop.resolve1",
1146 "/org/freedesktop/resolve1",
1147 "org.freedesktop.resolve1.Manager",
1148 "ResetServerFeatures",
1153 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1158 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1159 _cleanup_free_
char *pretty
= NULL
;
1160 int ifindex
, family
, r
;
1167 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? "iiay" : "iay");
1172 r
= sd_bus_message_read(m
, "i", &ifindex
);
1177 r
= sd_bus_message_read(m
, "i", &family
);
1181 r
= sd_bus_message_read_array(m
, 'y', &a
, &sz
);
1185 r
= sd_bus_message_exit_container(m
);
1189 if (with_ifindex
&& ifindex
!= 0) {
1190 /* only show the global ones here */
1195 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
1196 log_debug("Unexpected family, ignoring: %i", family
);
1202 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
1203 log_debug("Address size mismatch, ignoring.");
1209 r
= in_addr_to_string(family
, a
, &pretty
);
1213 *ret
= TAKE_PTR(pretty
);
1218 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1219 char ***l
= userdata
;
1227 r
= sd_bus_message_enter_container(m
, 'a', "(iay)");
1232 _cleanup_free_
char *pretty
= NULL
;
1234 r
= read_dns_server_one(m
, false, &pretty
);
1240 if (isempty(pretty
))
1243 r
= strv_consume(l
, TAKE_PTR(pretty
));
1248 r
= sd_bus_message_exit_container(m
);
1255 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1259 return read_dns_server_one(m
, false, userdata
);
1262 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1263 _cleanup_free_
char *str
= NULL
;
1264 int ifindex
, route_only
, r
;
1271 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1273 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1277 if (with_ifindex
&& ifindex
!= 0) {
1278 /* only show the global ones here */
1284 str
= strjoin("~", domain
);
1286 str
= strdup(domain
);
1290 *ret
= TAKE_PTR(str
);
1295 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1296 char ***l
= userdata
;
1304 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1309 _cleanup_free_
char *pretty
= NULL
;
1311 r
= read_domain_one(m
, false, &pretty
);
1317 if (isempty(pretty
))
1320 r
= strv_consume(l
, TAKE_PTR(pretty
));
1325 r
= sd_bus_message_exit_container(m
);
1332 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1335 printf("%sLink %i (%s)%s:",
1336 ansi_highlight(), ifindex
, ifname
, ansi_normal());
1347 uint64_t scopes_mask
;
1350 const char *dns_over_tls
;
1356 bool dnssec_supported
;
1360 static void link_info_clear(struct link_info
*p
) {
1361 free(p
->current_dns
);
1363 strv_free(p
->domains
);
1367 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1368 static const struct bus_properties_map property_map
[] = {
1369 { "ScopesMask", "t", NULL
, offsetof(struct link_info
, scopes_mask
) },
1370 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(struct link_info
, dns
) },
1371 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(struct link_info
, current_dns
) },
1372 { "Domains", "a(sb)", map_link_domains
, offsetof(struct link_info
, domains
) },
1373 { "DefaultRoute", "b", NULL
, offsetof(struct link_info
, default_route
) },
1374 { "LLMNR", "s", NULL
, offsetof(struct link_info
, llmnr
) },
1375 { "MulticastDNS", "s", NULL
, offsetof(struct link_info
, mdns
) },
1376 { "DNSOverTLS", "s", NULL
, offsetof(struct link_info
, dns_over_tls
) },
1377 { "DNSSEC", "s", NULL
, offsetof(struct link_info
, dnssec
) },
1378 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct link_info
, ntas
) },
1379 { "DNSSECSupported", "b", NULL
, offsetof(struct link_info
, dnssec_supported
) },
1382 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1383 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1384 _cleanup_(link_info_clear
) struct link_info link_info
= {};
1385 _cleanup_free_
char *ifi
= NULL
, *p
= NULL
;
1386 char ifname
[IF_NAMESIZE
+ 1] = "";
1391 assert(ifindex
> 0);
1394 if (!format_ifname(ifindex
, ifname
))
1395 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1400 if (asprintf(&ifi
, "%i", ifindex
) < 0)
1403 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1407 r
= bus_map_all_properties(bus
,
1408 "org.freedesktop.resolve1",
1411 BUS_MAP_BOOLEAN_AS_BOOL
,
1416 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1418 (void) pager_open(arg_pager_flags
);
1420 if (mode
== STATUS_DNS
)
1421 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns
);
1423 if (mode
== STATUS_DOMAIN
)
1424 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1426 if (mode
== STATUS_NTA
)
1427 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1429 if (mode
== STATUS_DEFAULT_ROUTE
) {
1430 printf("%sLink %i (%s)%s: %s\n",
1431 ansi_highlight(), ifindex
, name
, ansi_normal(),
1432 yes_no(link_info
.default_route
));
1437 if (mode
== STATUS_LLMNR
) {
1438 printf("%sLink %i (%s)%s: %s\n",
1439 ansi_highlight(), ifindex
, name
, ansi_normal(),
1440 strna(link_info
.llmnr
));
1445 if (mode
== STATUS_MDNS
) {
1446 printf("%sLink %i (%s)%s: %s\n",
1447 ansi_highlight(), ifindex
, name
, ansi_normal(),
1448 strna(link_info
.mdns
));
1453 if (mode
== STATUS_PRIVATE
) {
1454 printf("%sLink %i (%s)%s: %s\n",
1455 ansi_highlight(), ifindex
, name
, ansi_normal(),
1456 strna(link_info
.dns_over_tls
));
1461 if (mode
== STATUS_DNSSEC
) {
1462 printf("%sLink %i (%s)%s: %s\n",
1463 ansi_highlight(), ifindex
, name
, ansi_normal(),
1464 strna(link_info
.dnssec
));
1469 if (empty_line
&& *empty_line
)
1470 fputc('\n', stdout
);
1472 printf("%sLink %i (%s)%s\n",
1473 ansi_highlight(), ifindex
, name
, ansi_normal());
1475 if (link_info
.scopes_mask
== 0)
1476 printf(" Current Scopes: none\n");
1478 printf(" Current Scopes:%s%s%s%s%s\n",
1479 link_info
.scopes_mask
& SD_RESOLVED_DNS
? " DNS" : "",
1480 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
1481 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
1482 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
1483 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
1485 printf("DefaultRoute setting: %s\n"
1486 " LLMNR setting: %s\n"
1487 "MulticastDNS setting: %s\n"
1488 " DNSOverTLS setting: %s\n"
1489 " DNSSEC setting: %s\n"
1490 " DNSSEC supported: %s\n",
1491 yes_no(link_info
.default_route
),
1492 strna(link_info
.llmnr
),
1493 strna(link_info
.mdns
),
1494 strna(link_info
.dns_over_tls
),
1495 strna(link_info
.dnssec
),
1496 yes_no(link_info
.dnssec_supported
));
1498 if (link_info
.current_dns
)
1499 printf(" Current DNS Server: %s\n", link_info
.current_dns
);
1501 STRV_FOREACH(i
, link_info
.dns
) {
1503 i
== link_info
.dns
? "DNS Servers:" : " ",
1507 STRV_FOREACH(i
, link_info
.domains
) {
1509 i
== link_info
.domains
? "DNS Domain:" : " ",
1513 STRV_FOREACH(i
, link_info
.ntas
) {
1515 i
== link_info
.ntas
? "DNSSEC NTA:" : " ",
1525 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1526 char ***l
= userdata
;
1534 r
= sd_bus_message_enter_container(m
, 'a', "(iiay)");
1539 _cleanup_free_
char *pretty
= NULL
;
1541 r
= read_dns_server_one(m
, true, &pretty
);
1547 if (isempty(pretty
))
1550 r
= strv_consume(l
, TAKE_PTR(pretty
));
1555 r
= sd_bus_message_exit_container(m
);
1562 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1566 return read_dns_server_one(m
, true, userdata
);
1569 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1570 char ***l
= userdata
;
1578 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1583 _cleanup_free_
char *pretty
= NULL
;
1585 r
= read_domain_one(m
, true, &pretty
);
1591 if (isempty(pretty
))
1594 r
= strv_consume(l
, TAKE_PTR(pretty
));
1599 r
= sd_bus_message_exit_container(m
);
1606 static int status_print_strv_global(char **p
) {
1609 printf("%sGlobal%s:", ansi_highlight(), ansi_normal());
1619 struct global_info
{
1622 char **fallback_dns
;
1627 const char *dns_over_tls
;
1629 bool dnssec_supported
;
1632 static void global_info_clear(struct global_info
*p
) {
1633 free(p
->current_dns
);
1635 strv_free(p
->fallback_dns
);
1636 strv_free(p
->domains
);
1640 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1641 static const struct bus_properties_map property_map
[] = {
1642 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, dns
) },
1643 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, fallback_dns
) },
1644 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(struct global_info
, current_dns
) },
1645 { "Domains", "a(isb)", map_global_domains
, offsetof(struct global_info
, domains
) },
1646 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct global_info
, ntas
) },
1647 { "LLMNR", "s", NULL
, offsetof(struct global_info
, llmnr
) },
1648 { "MulticastDNS", "s", NULL
, offsetof(struct global_info
, mdns
) },
1649 { "DNSOverTLS", "s", NULL
, offsetof(struct global_info
, dns_over_tls
) },
1650 { "DNSSEC", "s", NULL
, offsetof(struct global_info
, dnssec
) },
1651 { "DNSSECSupported", "b", NULL
, offsetof(struct global_info
, dnssec_supported
) },
1654 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1655 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1656 _cleanup_(global_info_clear
) struct global_info global_info
= {};
1663 r
= bus_map_all_properties(bus
,
1664 "org.freedesktop.resolve1",
1665 "/org/freedesktop/resolve1",
1667 BUS_MAP_BOOLEAN_AS_BOOL
,
1672 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1674 (void) pager_open(arg_pager_flags
);
1676 if (mode
== STATUS_DNS
)
1677 return status_print_strv_global(global_info
.dns
);
1679 if (mode
== STATUS_DOMAIN
)
1680 return status_print_strv_global(global_info
.domains
);
1682 if (mode
== STATUS_NTA
)
1683 return status_print_strv_global(global_info
.ntas
);
1685 if (mode
== STATUS_LLMNR
) {
1686 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1687 strna(global_info
.llmnr
));
1692 if (mode
== STATUS_MDNS
) {
1693 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1694 strna(global_info
.mdns
));
1699 if (mode
== STATUS_PRIVATE
) {
1700 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1701 strna(global_info
.dns_over_tls
));
1706 if (mode
== STATUS_DNSSEC
) {
1707 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1708 strna(global_info
.dnssec
));
1713 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1715 printf(" LLMNR setting: %s\n"
1716 "MulticastDNS setting: %s\n"
1717 " DNSOverTLS setting: %s\n"
1718 " DNSSEC setting: %s\n"
1719 " DNSSEC supported: %s\n",
1720 strna(global_info
.llmnr
),
1721 strna(global_info
.mdns
),
1722 strna(global_info
.dns_over_tls
),
1723 strna(global_info
.dnssec
),
1724 yes_no(global_info
.dnssec_supported
));
1726 if (global_info
.current_dns
)
1727 printf(" Current DNS Server: %s\n", global_info
.current_dns
);
1729 STRV_FOREACH(i
, global_info
.dns
) {
1731 i
== global_info
.dns
? "DNS Servers:" : " ",
1735 STRV_FOREACH(i
, global_info
.fallback_dns
) {
1737 i
== global_info
.fallback_dns
? "Fallback DNS Servers:" : " ",
1741 STRV_FOREACH(i
, global_info
.domains
) {
1743 i
== global_info
.domains
? "DNS Domain:" : " ",
1747 strv_sort(global_info
.ntas
);
1748 STRV_FOREACH(i
, global_info
.ntas
) {
1750 i
== global_info
.ntas
? "DNSSEC NTA:" : " ",
1759 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1760 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1761 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1762 sd_netlink_message
*i
;
1763 bool empty_line
= false;
1768 r
= status_global(bus
, mode
, &empty_line
);
1772 r
= sd_netlink_open(&rtnl
);
1774 return log_error_errno(r
, "Failed to connect to netlink: %m");
1776 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1778 return rtnl_log_create_error(r
);
1780 r
= sd_netlink_message_request_dump(req
, true);
1782 return rtnl_log_create_error(r
);
1784 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1786 return log_error_errno(r
, "Failed to enumerate links: %m");
1789 for (i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1794 q
= sd_netlink_message_get_type(i
, &type
);
1796 return rtnl_log_parse_error(q
);
1798 if (type
!= RTM_NEWLINK
)
1801 q
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1803 return rtnl_log_parse_error(q
);
1805 if (ifindex
== LOOPBACK_IFINDEX
)
1808 q
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1810 return rtnl_log_parse_error(q
);
1812 q
= status_ifindex(bus
, ifindex
, name
, mode
, &empty_line
);
1813 if (q
< 0 && r
>= 0)
1820 static int verb_status(int argc
, char **argv
, void *userdata
) {
1821 sd_bus
*bus
= userdata
;
1826 bool empty_line
= false;
1828 STRV_FOREACH(ifname
, argv
+ 1) {
1831 ifindex
= parse_ifindex_or_ifname(*ifname
);
1833 log_warning_errno(ifindex
, "Unknown interface '%s', ignoring: %m", *ifname
);
1837 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1842 r
= status_all(bus
, STATUS_ALL
);
1847 static int call_dns(sd_bus
*bus
, char **dns
, const char *destination
, const char *path
, const char *interface
, sd_bus_error
*error
) {
1848 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1852 r
= sd_bus_message_new_method_call(
1860 return bus_log_create_error(r
);
1862 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1864 return bus_log_create_error(r
);
1866 r
= sd_bus_message_open_container(req
, 'a', "(iay)");
1868 return bus_log_create_error(r
);
1870 /* If only argument is the empty string, then call SetLinkDNS() with an
1871 * empty list, which will clear the list of domains for an interface. */
1872 if (!strv_equal(dns
, STRV_MAKE("")))
1873 STRV_FOREACH(p
, dns
) {
1874 struct in_addr_data data
;
1876 r
= in_addr_from_string_auto(*p
, &data
.family
, &data
.address
);
1878 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
1880 r
= sd_bus_message_open_container(req
, 'r', "iay");
1882 return bus_log_create_error(r
);
1884 r
= sd_bus_message_append(req
, "i", data
.family
);
1886 return bus_log_create_error(r
);
1888 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
1890 return bus_log_create_error(r
);
1892 r
= sd_bus_message_close_container(req
);
1894 return bus_log_create_error(r
);
1897 r
= sd_bus_message_close_container(req
);
1899 return bus_log_create_error(r
);
1901 return sd_bus_call(bus
, req
, 0, error
, NULL
);
1904 static int verb_dns(int argc
, char **argv
, void *userdata
) {
1905 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1906 sd_bus
*bus
= userdata
;
1912 r
= ifname_mangle(argv
[1]);
1917 if (arg_ifindex
<= 0)
1918 return status_all(bus
, STATUS_DNS
);
1921 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
1923 r
= call_dns(bus
, argv
+ 2,
1924 "org.freedesktop.resolve1",
1925 "/org/freedesktop/resolve1",
1926 "org.freedesktop.resolve1.Manager",
1928 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
1929 sd_bus_error_free(&error
);
1931 r
= call_dns(bus
, argv
+ 2,
1932 "org.freedesktop.network1",
1933 "/org/freedesktop/network1",
1934 "org.freedesktop.network1.Manager",
1938 if (arg_ifindex_permissive
&&
1939 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1942 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
1948 static int call_domain(sd_bus
*bus
, char **domain
, const char *destination
, const char *path
, const char *interface
, sd_bus_error
*error
) {
1949 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1953 r
= sd_bus_message_new_method_call(
1961 return bus_log_create_error(r
);
1963 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1965 return bus_log_create_error(r
);
1967 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
1969 return bus_log_create_error(r
);
1971 /* If only argument is the empty string, then call SetLinkDomains() with an
1972 * empty list, which will clear the list of domains for an interface. */
1973 if (!strv_equal(domain
, STRV_MAKE("")))
1974 STRV_FOREACH(p
, domain
) {
1977 n
= **p
== '~' ? *p
+ 1 : *p
;
1979 r
= dns_name_is_valid(n
);
1981 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
1983 log_error("Domain not valid: %s", n
);
1987 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
1989 return bus_log_create_error(r
);
1992 r
= sd_bus_message_close_container(req
);
1994 return bus_log_create_error(r
);
1996 return sd_bus_call(bus
, req
, 0, error
, NULL
);
1999 static int verb_domain(int argc
, char **argv
, void *userdata
) {
2000 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2001 sd_bus
*bus
= userdata
;
2007 r
= ifname_mangle(argv
[1]);
2012 if (arg_ifindex
<= 0)
2013 return status_all(bus
, STATUS_DOMAIN
);
2016 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
2018 r
= call_domain(bus
, argv
+ 2,
2019 "org.freedesktop.resolve1",
2020 "/org/freedesktop/resolve1",
2021 "org.freedesktop.resolve1.Manager",
2023 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2024 sd_bus_error_free(&error
);
2026 r
= call_domain(bus
, argv
+ 2,
2027 "org.freedesktop.network1",
2028 "/org/freedesktop/network1",
2029 "org.freedesktop.network1.Manager",
2033 if (arg_ifindex_permissive
&&
2034 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2037 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2043 static int verb_default_route(int argc
, char **argv
, void *userdata
) {
2044 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2045 sd_bus
*bus
= userdata
;
2051 r
= ifname_mangle(argv
[1]);
2056 if (arg_ifindex
<= 0)
2057 return status_all(bus
, STATUS_DEFAULT_ROUTE
);
2060 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DEFAULT_ROUTE
, NULL
);
2062 b
= parse_boolean(argv
[2]);
2064 return log_error_errno(b
, "Failed to parse boolean argument: %s", argv
[2]);
2066 r
= sd_bus_call_method(
2068 "org.freedesktop.resolve1",
2069 "/org/freedesktop/resolve1",
2070 "org.freedesktop.resolve1.Manager",
2071 "SetLinkDefaultRoute",
2074 "ib", arg_ifindex
, b
);
2075 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2076 sd_bus_error_free(&error
);
2078 r
= sd_bus_call_method(
2080 "org.freedesktop.network1",
2081 "/org/freedesktop/network1",
2082 "org.freedesktop.network1.Manager",
2083 "SetLinkDefaultRoute",
2086 "ib", arg_ifindex
, b
);
2089 if (arg_ifindex_permissive
&&
2090 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2093 return log_error_errno(r
, "Failed to set default route configuration: %s", bus_error_message(&error
, r
));
2099 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2100 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2101 sd_bus
*bus
= userdata
;
2107 r
= ifname_mangle(argv
[1]);
2112 if (arg_ifindex
<= 0)
2113 return status_all(bus
, STATUS_LLMNR
);
2116 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2118 r
= sd_bus_call_method(
2120 "org.freedesktop.resolve1",
2121 "/org/freedesktop/resolve1",
2122 "org.freedesktop.resolve1.Manager",
2126 "is", arg_ifindex
, argv
[2]);
2127 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2128 sd_bus_error_free(&error
);
2130 r
= sd_bus_call_method(
2132 "org.freedesktop.network1",
2133 "/org/freedesktop/network1",
2134 "org.freedesktop.network1.Manager",
2138 "is", arg_ifindex
, argv
[2]);
2141 if (arg_ifindex_permissive
&&
2142 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2145 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2151 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2152 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2153 sd_bus
*bus
= userdata
;
2159 r
= ifname_mangle(argv
[1]);
2164 if (arg_ifindex
<= 0)
2165 return status_all(bus
, STATUS_MDNS
);
2168 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2170 r
= sd_bus_call_method(
2172 "org.freedesktop.resolve1",
2173 "/org/freedesktop/resolve1",
2174 "org.freedesktop.resolve1.Manager",
2175 "SetLinkMulticastDNS",
2178 "is", arg_ifindex
, argv
[2]);
2179 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2180 sd_bus_error_free(&error
);
2182 r
= sd_bus_call_method(
2184 "org.freedesktop.network1",
2185 "/org/freedesktop/network1",
2186 "org.freedesktop.network1.Manager",
2187 "SetLinkMulticastDNS",
2190 "is", arg_ifindex
, argv
[2]);
2193 if (arg_ifindex_permissive
&&
2194 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2197 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2203 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2204 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2205 sd_bus
*bus
= userdata
;
2211 r
= ifname_mangle(argv
[1]);
2216 if (arg_ifindex
<= 0)
2217 return status_all(bus
, STATUS_PRIVATE
);
2220 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2222 r
= sd_bus_call_method(
2224 "org.freedesktop.resolve1",
2225 "/org/freedesktop/resolve1",
2226 "org.freedesktop.resolve1.Manager",
2227 "SetLinkDNSOverTLS",
2230 "is", arg_ifindex
, argv
[2]);
2231 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2232 sd_bus_error_free(&error
);
2234 r
= sd_bus_call_method(
2236 "org.freedesktop.network1",
2237 "/org/freedesktop/network1",
2238 "org.freedesktop.network1.Manager",
2239 "SetLinkDNSOverTLS",
2242 "is", arg_ifindex
, argv
[2]);
2245 if (arg_ifindex_permissive
&&
2246 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2249 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2255 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2256 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2257 sd_bus
*bus
= userdata
;
2263 r
= ifname_mangle(argv
[1]);
2268 if (arg_ifindex
<= 0)
2269 return status_all(bus
, STATUS_DNSSEC
);
2272 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2274 r
= sd_bus_call_method(
2276 "org.freedesktop.resolve1",
2277 "/org/freedesktop/resolve1",
2278 "org.freedesktop.resolve1.Manager",
2282 "is", arg_ifindex
, argv
[2]);
2283 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2284 sd_bus_error_free(&error
);
2286 r
= sd_bus_call_method(
2288 "org.freedesktop.network1",
2289 "/org/freedesktop/network1",
2290 "org.freedesktop.network1.Manager",
2294 "is", arg_ifindex
, argv
[2]);
2297 if (arg_ifindex_permissive
&&
2298 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2301 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2307 static int call_nta(sd_bus
*bus
, char **nta
, const char *destination
, const char *path
, const char *interface
, sd_bus_error
*error
) {
2308 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2311 r
= sd_bus_message_new_method_call(
2317 "SetLinkDNSSECNegativeTrustAnchors");
2319 return bus_log_create_error(r
);
2321 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2323 return bus_log_create_error(r
);
2325 r
= sd_bus_message_append_strv(req
, nta
);
2327 return bus_log_create_error(r
);
2329 return sd_bus_call(bus
, req
, 0, error
, NULL
);
2332 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2333 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2334 sd_bus
*bus
= userdata
;
2342 r
= ifname_mangle(argv
[1]);
2347 if (arg_ifindex
<= 0)
2348 return status_all(bus
, STATUS_NTA
);
2351 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2353 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2354 * with an empty list, which will clear the list of domains for an interface. */
2355 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2358 STRV_FOREACH(p
, argv
+ 2) {
2359 r
= dns_name_is_valid(*p
);
2361 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2363 log_error("Domain not valid: %s", *p
);
2368 r
= call_nta(bus
, clear
? NULL
: argv
+ 2,
2369 "org.freedesktop.resolve1",
2370 "/org/freedesktop/resolve1",
2371 "org.freedesktop.resolve1.Manager",
2373 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2374 sd_bus_error_free(&error
);
2376 r
= call_nta(bus
, clear
? NULL
: argv
+ 2,
2377 "org.freedesktop.network1",
2378 "/org/freedesktop/network1",
2379 "org.freedesktop.network1.Manager",
2383 if (arg_ifindex_permissive
&&
2384 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2387 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2393 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2394 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2395 sd_bus
*bus
= userdata
;
2401 r
= ifname_mangle(argv
[1]);
2406 if (arg_ifindex
<= 0)
2407 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Interface argument required.");
2409 r
= sd_bus_call_method(
2411 "org.freedesktop.resolve1",
2412 "/org/freedesktop/resolve1",
2413 "org.freedesktop.resolve1.Manager",
2418 if (r
< 0 && sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
)) {
2419 sd_bus_error_free(&error
);
2421 r
= sd_bus_call_method(
2423 "org.freedesktop.network1",
2424 "/org/freedesktop/network1",
2425 "org.freedesktop.network1.Manager",
2432 if (arg_ifindex_permissive
&&
2433 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2436 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2442 static void help_protocol_types(void) {
2444 puts("Known protocol types:");
2445 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2448 static void help_dns_types(void) {
2450 puts("Known DNS RR types:");
2452 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2455 static void help_dns_classes(void) {
2457 puts("Known DNS RR classes:");
2459 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2462 static int compat_help(void) {
2463 _cleanup_free_
char *link
= NULL
;
2466 r
= terminal_urlify_man("resolvectl", "1", &link
);
2470 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2471 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2472 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2473 "%1$s [OPTIONS...] --statistics\n"
2474 "%1$s [OPTIONS...] --reset-statistics\n"
2476 "%2$sResolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%3$s\n\n"
2477 " -h --help Show this help\n"
2478 " --version Show package version\n"
2479 " --no-pager Do not pipe output into a pager\n"
2480 " -4 Resolve IPv4 addresses\n"
2481 " -6 Resolve IPv6 addresses\n"
2482 " -i --interface=INTERFACE Look on interface\n"
2483 " -p --protocol=PROTO|help Look via protocol\n"
2484 " -t --type=TYPE|help Query RR with DNS type\n"
2485 " -c --class=CLASS|help Query RR with DNS class\n"
2486 " --service Resolve service (SRV)\n"
2487 " --service-address=BOOL Resolve address for services (default: yes)\n"
2488 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2489 " --openpgp Query OpenPGP public key\n"
2490 " --tlsa Query TLS public key\n"
2491 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2492 " --search=BOOL Use search domains for single-label names\n"
2494 " --raw[=payload|packet] Dump the answer as binary data\n"
2495 " --legend=BOOL Print headers and additional info (default: yes)\n"
2496 " --statistics Show resolver statistics\n"
2497 " --reset-statistics Reset resolver statistics\n"
2498 " --status Show link and server status\n"
2499 " --flush-caches Flush all local DNS caches\n"
2500 " --reset-server-features\n"
2501 " Forget learnt DNS server feature levels\n"
2502 " --set-dns=SERVER Set per-interface DNS server address\n"
2503 " --set-domain=DOMAIN Set per-interface search domain\n"
2504 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2505 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2506 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2507 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2508 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2509 " --revert Revert per-interface configuration\n"
2510 "\nSee the %4$s for details.\n"
2511 , program_invocation_short_name
2520 static int native_help(void) {
2521 _cleanup_free_
char *link
= NULL
;
2524 r
= terminal_urlify_man("resolvectl", "1", &link
);
2528 printf("%s [OPTIONS...] COMMAND ...\n"
2530 "%sSend control commands to the network name resolution manager, or%s\n"
2531 "%sresolve domain names, IPv4 and IPv6 addresses, DNS records, and services.%s\n"
2533 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2534 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2535 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2536 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2537 " status [LINK...] Show link and server status\n"
2538 " statistics Show resolver statistics\n"
2539 " reset-statistics Reset resolver statistics\n"
2540 " flush-caches Flush all local DNS caches\n"
2541 " reset-server-features Forget learnt DNS server feature levels\n"
2542 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2543 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2544 " default-route [LINK [BOOL]] Get/set per-interface default route flag\n"
2545 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2546 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2547 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2548 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2549 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2550 " revert LINK Revert per-interface configuration\n"
2552 " -h --help Show this help\n"
2553 " --version Show package version\n"
2554 " --no-pager Do not pipe output into a pager\n"
2555 " -4 Resolve IPv4 addresses\n"
2556 " -6 Resolve IPv6 addresses\n"
2557 " -i --interface=INTERFACE Look on interface\n"
2558 " -p --protocol=PROTO|help Look via protocol\n"
2559 " -t --type=TYPE|help Query RR with DNS type\n"
2560 " -c --class=CLASS|help Query RR with DNS class\n"
2561 " --service-address=BOOL Resolve address for services (default: yes)\n"
2562 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2563 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2564 " --search=BOOL Use search domains for single-label names\n"
2566 " --raw[=payload|packet] Dump the answer as binary data\n"
2567 " --legend=BOOL Print headers and additional info (default: yes)\n"
2568 "\nSee the %s for details.\n"
2569 , program_invocation_short_name
2580 static int verb_help(int argc
, char **argv
, void *userdata
) {
2581 return native_help();
2584 static int compat_parse_argv(int argc
, char *argv
[]) {
2586 ARG_VERSION
= 0x100,
2590 ARG_SERVICE_ADDRESS
,
2597 ARG_RESET_STATISTICS
,
2600 ARG_RESET_SERVER_FEATURES
,
2612 static const struct option options
[] = {
2613 { "help", no_argument
, NULL
, 'h' },
2614 { "version", no_argument
, NULL
, ARG_VERSION
},
2615 { "type", required_argument
, NULL
, 't' },
2616 { "class", required_argument
, NULL
, 'c' },
2617 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2618 { "interface", required_argument
, NULL
, 'i' },
2619 { "protocol", required_argument
, NULL
, 'p' },
2620 { "cname", required_argument
, NULL
, ARG_CNAME
},
2621 { "service", no_argument
, NULL
, ARG_SERVICE
},
2622 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2623 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2624 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2625 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2626 { "raw", optional_argument
, NULL
, ARG_RAW
},
2627 { "search", required_argument
, NULL
, ARG_SEARCH
},
2628 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2629 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2630 { "status", no_argument
, NULL
, ARG_STATUS
},
2631 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2632 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2633 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2634 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2635 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2636 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2637 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2638 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2639 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2640 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2641 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2650 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2654 return compat_help();
2660 arg_family
= AF_INET
;
2664 arg_family
= AF_INET6
;
2668 r
= ifname_mangle(optarg
);
2674 if (streq(optarg
, "help")) {
2679 r
= dns_type_from_string(optarg
);
2681 log_error("Failed to parse RR record type %s", optarg
);
2684 arg_type
= (uint16_t) r
;
2685 assert((int) arg_type
== r
);
2687 arg_mode
= MODE_RESOLVE_RECORD
;
2691 if (streq(optarg
, "help")) {
2696 r
= dns_class_from_string(optarg
);
2698 log_error("Failed to parse RR record class %s", optarg
);
2701 arg_class
= (uint16_t) r
;
2702 assert((int) arg_class
== r
);
2707 r
= parse_boolean(optarg
);
2709 return log_error_errno(r
, "Failed to parse --legend= argument");
2715 if (streq(optarg
, "help")) {
2716 help_protocol_types();
2718 } else if (streq(optarg
, "dns"))
2719 arg_flags
|= SD_RESOLVED_DNS
;
2720 else if (streq(optarg
, "llmnr"))
2721 arg_flags
|= SD_RESOLVED_LLMNR
;
2722 else if (streq(optarg
, "llmnr-ipv4"))
2723 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2724 else if (streq(optarg
, "llmnr-ipv6"))
2725 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2726 else if (streq(optarg
, "mdns"))
2727 arg_flags
|= SD_RESOLVED_MDNS
;
2728 else if (streq(optarg
, "mdns-ipv4"))
2729 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2730 else if (streq(optarg
, "mdns-ipv6"))
2731 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2733 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2734 "Unknown protocol specifier: %s", optarg
);
2739 arg_mode
= MODE_RESOLVE_SERVICE
;
2743 arg_mode
= MODE_RESOLVE_OPENPGP
;
2747 arg_mode
= MODE_RESOLVE_TLSA
;
2748 if (!optarg
|| service_family_is_valid(optarg
))
2749 arg_service_family
= optarg
;
2751 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2752 "Unknown service family \"%s\".", optarg
);
2757 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2758 "Refusing to write binary data to tty.");
2760 if (optarg
== NULL
|| streq(optarg
, "payload"))
2761 arg_raw
= RAW_PAYLOAD
;
2762 else if (streq(optarg
, "packet"))
2763 arg_raw
= RAW_PACKET
;
2765 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2766 "Unknown --raw specifier \"%s\".",
2773 r
= parse_boolean(optarg
);
2775 return log_error_errno(r
, "Failed to parse --cname= argument.");
2776 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2779 case ARG_SERVICE_ADDRESS
:
2780 r
= parse_boolean(optarg
);
2782 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2783 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2786 case ARG_SERVICE_TXT
:
2787 r
= parse_boolean(optarg
);
2789 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2790 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2794 r
= parse_boolean(optarg
);
2796 return log_error_errno(r
, "Failed to parse --search argument.");
2797 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2800 case ARG_STATISTICS
:
2801 arg_mode
= MODE_STATISTICS
;
2804 case ARG_RESET_STATISTICS
:
2805 arg_mode
= MODE_RESET_STATISTICS
;
2808 case ARG_FLUSH_CACHES
:
2809 arg_mode
= MODE_FLUSH_CACHES
;
2812 case ARG_RESET_SERVER_FEATURES
:
2813 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2817 arg_mode
= MODE_STATUS
;
2821 arg_pager_flags
|= PAGER_DISABLE
;
2825 r
= strv_extend(&arg_set_dns
, optarg
);
2829 arg_mode
= MODE_SET_LINK
;
2832 case ARG_SET_DOMAIN
:
2833 r
= strv_extend(&arg_set_domain
, optarg
);
2837 arg_mode
= MODE_SET_LINK
;
2841 arg_set_llmnr
= optarg
;
2842 arg_mode
= MODE_SET_LINK
;
2846 arg_set_mdns
= optarg
;
2847 arg_mode
= MODE_SET_LINK
;
2850 case ARG_SET_PRIVATE
:
2851 arg_set_dns_over_tls
= optarg
;
2852 arg_mode
= MODE_SET_LINK
;
2855 case ARG_SET_DNSSEC
:
2856 arg_set_dnssec
= optarg
;
2857 arg_mode
= MODE_SET_LINK
;
2861 r
= strv_extend(&arg_set_nta
, optarg
);
2865 arg_mode
= MODE_SET_LINK
;
2868 case ARG_REVERT_LINK
:
2869 arg_mode
= MODE_REVERT_LINK
;
2876 assert_not_reached("Unhandled option");
2879 if (arg_type
== 0 && arg_class
!= 0)
2880 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2881 "--class= may only be used in conjunction with --type=.");
2883 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
)
2884 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2885 "--service and --type= may not be combined.");
2887 if (arg_type
!= 0 && arg_class
== 0)
2888 arg_class
= DNS_CLASS_IN
;
2890 if (arg_class
!= 0 && arg_type
== 0)
2891 arg_type
= DNS_TYPE_A
;
2893 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2895 if (arg_ifindex
<= 0)
2896 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2897 "--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2900 return 1 /* work to do */;
2903 static int native_parse_argv(int argc
, char *argv
[]) {
2905 ARG_VERSION
= 0x100,
2908 ARG_SERVICE_ADDRESS
,
2915 static const struct option options
[] = {
2916 { "help", no_argument
, NULL
, 'h' },
2917 { "version", no_argument
, NULL
, ARG_VERSION
},
2918 { "type", required_argument
, NULL
, 't' },
2919 { "class", required_argument
, NULL
, 'c' },
2920 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2921 { "interface", required_argument
, NULL
, 'i' },
2922 { "protocol", required_argument
, NULL
, 'p' },
2923 { "cname", required_argument
, NULL
, ARG_CNAME
},
2924 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2925 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2926 { "raw", optional_argument
, NULL
, ARG_RAW
},
2927 { "search", required_argument
, NULL
, ARG_SEARCH
},
2928 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2937 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2941 return native_help();
2947 arg_family
= AF_INET
;
2951 arg_family
= AF_INET6
;
2955 r
= ifname_mangle(optarg
);
2961 if (streq(optarg
, "help")) {
2966 r
= dns_type_from_string(optarg
);
2968 log_error("Failed to parse RR record type %s", optarg
);
2971 arg_type
= (uint16_t) r
;
2972 assert((int) arg_type
== r
);
2977 if (streq(optarg
, "help")) {
2982 r
= dns_class_from_string(optarg
);
2984 log_error("Failed to parse RR record class %s", optarg
);
2987 arg_class
= (uint16_t) r
;
2988 assert((int) arg_class
== r
);
2993 r
= parse_boolean(optarg
);
2995 return log_error_errno(r
, "Failed to parse --legend= argument");
3001 if (streq(optarg
, "help")) {
3002 help_protocol_types();
3004 } else if (streq(optarg
, "dns"))
3005 arg_flags
|= SD_RESOLVED_DNS
;
3006 else if (streq(optarg
, "llmnr"))
3007 arg_flags
|= SD_RESOLVED_LLMNR
;
3008 else if (streq(optarg
, "llmnr-ipv4"))
3009 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
3010 else if (streq(optarg
, "llmnr-ipv6"))
3011 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
3012 else if (streq(optarg
, "mdns"))
3013 arg_flags
|= SD_RESOLVED_MDNS
;
3014 else if (streq(optarg
, "mdns-ipv4"))
3015 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
3016 else if (streq(optarg
, "mdns-ipv6"))
3017 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
3019 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3020 "Unknown protocol specifier: %s",
3027 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
3028 "Refusing to write binary data to tty.");
3030 if (optarg
== NULL
|| streq(optarg
, "payload"))
3031 arg_raw
= RAW_PAYLOAD
;
3032 else if (streq(optarg
, "packet"))
3033 arg_raw
= RAW_PACKET
;
3035 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3036 "Unknown --raw specifier \"%s\".",
3043 r
= parse_boolean(optarg
);
3045 return log_error_errno(r
, "Failed to parse --cname= argument.");
3046 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
3049 case ARG_SERVICE_ADDRESS
:
3050 r
= parse_boolean(optarg
);
3052 return log_error_errno(r
, "Failed to parse --service-address= argument.");
3053 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
3056 case ARG_SERVICE_TXT
:
3057 r
= parse_boolean(optarg
);
3059 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
3060 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
3064 r
= parse_boolean(optarg
);
3066 return log_error_errno(r
, "Failed to parse --search argument.");
3067 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
3071 arg_pager_flags
|= PAGER_DISABLE
;
3078 assert_not_reached("Unhandled option");
3081 if (arg_type
== 0 && arg_class
!= 0)
3082 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
3083 "--class= may only be used in conjunction with --type=.");
3085 if (arg_type
!= 0 && arg_class
== 0)
3086 arg_class
= DNS_CLASS_IN
;
3088 if (arg_class
!= 0 && arg_type
== 0)
3089 arg_type
= DNS_TYPE_A
;
3091 return 1 /* work to do */;
3094 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
3096 static const Verb verbs
[] = {
3097 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
3098 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
3099 { "query", 2, VERB_ANY
, 0, verb_query
},
3100 { "service", 2, 4, 0, verb_service
},
3101 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
3102 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
3103 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
3104 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
3105 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
3106 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
3107 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
3108 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
3109 { "default-route", VERB_ANY
, 3, 0, verb_default_route
},
3110 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
3111 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
3112 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
3113 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
3114 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
3115 { "revert", VERB_ANY
, 2, 0, verb_revert_link
},
3119 return dispatch_verb(argc
, argv
, verbs
, bus
);
3122 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
3127 assert(num_args
== 0 || args
);
3129 num
= !!single_arg
+ num_args
+ 1;
3131 p
= fake
= newa0(char *, num
+ 1);
3132 *p
++ = (char *) verb
;
3134 *p
++ = (char *) single_arg
;
3135 for (i
= 0; i
< num_args
; i
++)
3139 return native_main((int) num
, fake
, bus
);
3142 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
3146 case MODE_RESOLVE_HOST
:
3147 case MODE_RESOLVE_RECORD
:
3148 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
3150 case MODE_RESOLVE_SERVICE
:
3151 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
3153 case MODE_RESOLVE_OPENPGP
:
3154 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3156 case MODE_RESOLVE_TLSA
:
3157 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3159 case MODE_STATISTICS
:
3160 return translate("statistics", NULL
, 0, NULL
, bus
);
3162 case MODE_RESET_STATISTICS
:
3163 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3165 case MODE_FLUSH_CACHES
:
3166 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3168 case MODE_RESET_SERVER_FEATURES
:
3169 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3172 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3178 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3183 if (arg_set_domain
) {
3184 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3190 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3195 if (arg_set_llmnr
) {
3196 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3202 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3207 if (arg_set_dns_over_tls
) {
3208 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3213 if (arg_set_dnssec
) {
3214 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3221 case MODE_REVERT_LINK
:
3224 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3227 assert_not_reached("invalid mode");
3233 static int run(int argc
, char **argv
) {
3234 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
3237 setlocale(LC_ALL
, "");
3238 log_show_color(true);
3239 log_parse_environment();
3242 if (streq(program_invocation_short_name
, "resolvconf"))
3243 r
= resolvconf_parse_argv(argc
, argv
);
3244 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3245 r
= compat_parse_argv(argc
, argv
);
3247 r
= native_parse_argv(argc
, argv
);
3251 r
= sd_bus_open_system(&bus
);
3253 return log_error_errno(r
, "sd_bus_open_system: %m");
3255 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3256 return compat_main(argc
, argv
, bus
);
3258 return native_main(argc
, argv
, bus
);
3261 DEFINE_MAIN_FUNCTION(run
);