1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 This file is part of systemd.
5 Copyright 2014 Zbigniew Jędrzejewski-Szmek
12 #include "sd-netlink.h"
15 #include "alloc-util.h"
16 #include "bus-common-errors.h"
17 #include "bus-error.h"
19 #include "dns-domain.h"
21 #include "gcrypt-util.h"
22 #include "in-addr-util.h"
23 #include "netlink-util.h"
25 #include "parse-util.h"
26 #include "resolvconf-compat.h"
27 #include "resolvectl.h"
28 #include "resolved-def.h"
29 #include "resolved-dns-packet.h"
31 #include "terminal-util.h"
34 static int arg_family
= AF_UNSPEC
;
36 const char *arg_ifname
= NULL
;
37 static uint16_t arg_type
= 0;
38 static uint16_t arg_class
= 0;
39 static bool arg_legend
= true;
40 static uint64_t arg_flags
= 0;
41 static bool arg_no_pager
= false;
42 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
43 static const char *arg_service_family
= NULL
;
45 typedef enum RawType
{
50 static RawType arg_raw
= RAW_NONE
;
52 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
54 char **arg_set_dns
= NULL
;
55 char **arg_set_domain
= NULL
;
56 static const char *arg_set_llmnr
= NULL
;
57 static const char *arg_set_mdns
= NULL
;
58 static const char *arg_set_dnssec
= NULL
;
59 static char **arg_set_nta
= NULL
;
61 typedef enum StatusMode
{
71 static int parse_ifindex_with_warn(const char *s
) {
76 if (parse_ifindex(s
, &ifi
) < 0) {
77 ifi
= if_nametoindex(s
);
79 return log_error_errno(errno
, "Unknown interface %s: %m", s
);
85 static void print_source(uint64_t flags
, usec_t rtt
) {
86 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
94 fputs("\n-- Information acquired via", stdout
);
97 printf(" protocol%s%s%s%s%s",
98 flags
& SD_RESOLVED_DNS
? " DNS" :"",
99 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
100 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
101 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
102 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
104 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
106 printf(" in %s", rtt_str
);
111 printf("-- Data is authenticated: %s\n", yes_no(flags
& SD_RESOLVED_AUTHENTICATED
));
114 static int resolve_host(sd_bus
*bus
, const char *name
) {
115 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
116 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
117 const char *canonical
= NULL
;
118 char ifname
[IF_NAMESIZE
] = "";
126 if (arg_ifindex
> 0 && !if_indextoname(arg_ifindex
, ifname
))
127 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", arg_ifindex
);
129 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
131 r
= sd_bus_message_new_method_call(
134 "org.freedesktop.resolve1",
135 "/org/freedesktop/resolve1",
136 "org.freedesktop.resolve1.Manager",
139 return bus_log_create_error(r
);
141 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
143 return bus_log_create_error(r
);
145 ts
= now(CLOCK_MONOTONIC
);
147 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
149 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
151 ts
= now(CLOCK_MONOTONIC
) - ts
;
153 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
155 return bus_log_parse_error(r
);
157 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
158 _cleanup_free_
char *pretty
= NULL
;
163 assert_cc(sizeof(int) == sizeof(int32_t));
165 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
167 return bus_log_parse_error(r
);
169 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
171 return bus_log_parse_error(r
);
173 r
= sd_bus_message_exit_container(reply
);
175 return bus_log_parse_error(r
);
177 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
178 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
182 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
183 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
188 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
189 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
191 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
193 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
195 printf("%*s%s %s%s%s\n",
196 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
198 isempty(ifname
) ? "" : "%", ifname
);
203 return bus_log_parse_error(r
);
205 r
= sd_bus_message_exit_container(reply
);
207 return bus_log_parse_error(r
);
209 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
211 return bus_log_parse_error(r
);
213 if (!streq(name
, canonical
))
214 printf("%*s%s (%s)\n",
215 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
219 log_error("%s: no addresses found", name
);
223 print_source(flags
, ts
);
228 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
229 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
230 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
231 _cleanup_free_
char *pretty
= NULL
;
232 char ifname
[IF_NAMESIZE
] = "";
239 assert(IN_SET(family
, AF_INET
, AF_INET6
));
243 ifindex
= arg_ifindex
;
245 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
249 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
250 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
252 log_debug("Resolving %s%s%s.", pretty
, isempty(ifname
) ? "" : "%", ifname
);
254 r
= sd_bus_message_new_method_call(
257 "org.freedesktop.resolve1",
258 "/org/freedesktop/resolve1",
259 "org.freedesktop.resolve1.Manager",
262 return bus_log_create_error(r
);
264 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
266 return bus_log_create_error(r
);
268 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
270 return bus_log_create_error(r
);
272 r
= sd_bus_message_append(req
, "t", arg_flags
);
274 return bus_log_create_error(r
);
276 ts
= now(CLOCK_MONOTONIC
);
278 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
280 log_error("%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
284 ts
= now(CLOCK_MONOTONIC
) - ts
;
286 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
288 return bus_log_create_error(r
);
290 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
293 assert_cc(sizeof(int) == sizeof(int32_t));
295 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
299 r
= sd_bus_message_exit_container(reply
);
304 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
305 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
307 printf("%*s%*s%*s%s %s\n",
308 (int) strlen(pretty
), c
== 0 ? pretty
: "",
309 isempty(ifname
) ? 0 : 1, c
> 0 || isempty(ifname
) ? "" : "%",
310 (int) strlen(ifname
), c
== 0 ? ifname
: "",
317 return bus_log_parse_error(r
);
319 r
= sd_bus_message_exit_container(reply
);
321 return bus_log_parse_error(r
);
323 r
= sd_bus_message_read(reply
, "t", &flags
);
325 return bus_log_parse_error(r
);
328 log_error("%s: no names found", pretty
);
332 print_source(flags
, ts
);
337 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
338 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
339 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
341 char ifname
[IF_NAMESIZE
] = "";
343 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
347 p
->refuse_compression
= true;
349 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
353 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
355 return log_error_errno(r
, "Failed to parse RR: %m");
357 if (arg_raw
== RAW_PAYLOAD
) {
361 k
= dns_resource_record_payload(rr
, &data
);
363 return log_error_errno(k
, "Cannot dump RR: %m");
364 fwrite(data
, 1, k
, stdout
);
368 s
= dns_resource_record_to_string(rr
);
372 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
373 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
375 printf("%s%s%s\n", s
, isempty(ifname
) ? "" : " # interface ", ifname
);
381 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
382 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
383 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
384 char ifname
[IF_NAMESIZE
] = "";
389 bool needs_authentication
= false;
393 if (arg_ifindex
> 0 && !if_indextoname(arg_ifindex
, ifname
))
394 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", arg_ifindex
);
396 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(ifname
) ? "*" : ifname
);
398 r
= sd_bus_message_new_method_call(
401 "org.freedesktop.resolve1",
402 "/org/freedesktop/resolve1",
403 "org.freedesktop.resolve1.Manager",
406 return bus_log_create_error(r
);
408 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
410 return bus_log_create_error(r
);
412 ts
= now(CLOCK_MONOTONIC
);
414 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
416 if (warn_missing
|| r
!= -ENXIO
)
417 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
421 ts
= now(CLOCK_MONOTONIC
) - ts
;
423 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
425 return bus_log_parse_error(r
);
427 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
433 assert_cc(sizeof(int) == sizeof(int32_t));
435 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
437 return bus_log_parse_error(r
);
439 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
441 return bus_log_parse_error(r
);
443 r
= sd_bus_message_exit_container(reply
);
445 return bus_log_parse_error(r
);
447 if (arg_raw
== RAW_PACKET
) {
448 uint64_t u64
= htole64(l
);
450 fwrite(&u64
, sizeof(u64
), 1, stdout
);
451 fwrite(d
, 1, l
, stdout
);
453 r
= output_rr_packet(d
, l
, ifindex
);
458 if (dns_type_needs_authentication(t
))
459 needs_authentication
= true;
464 return bus_log_parse_error(r
);
466 r
= sd_bus_message_exit_container(reply
);
468 return bus_log_parse_error(r
);
470 r
= sd_bus_message_read(reply
, "t", &flags
);
472 return bus_log_parse_error(r
);
476 log_error("%s: no records found", name
);
480 print_source(flags
, ts
);
482 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
485 fprintf(stderr
, "\n%s"
486 "WARNING: The resources shown contain cryptographic key data which could not be\n"
487 " authenticated. It is not suitable to authenticate any communication.\n"
488 " This is usually indication that DNSSEC authentication was not enabled\n"
489 " or is not available for the selected protocol or DNS servers.%s\n",
490 ansi_highlight_red(),
497 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
498 uint16_t type
= 0, class = 0;
499 const char *p
, *q
, *n
;
504 assert(startswith(name
, "dns:"));
506 /* Parse RFC 4501 dns: URIs */
516 e
= strchr(p
+ 2, '/');
521 log_warning("DNS authority specification not supported; ignoring specified authority.");
528 n
= strndupa(p
, q
- p
);
534 f
= startswith_no_case(q
, "class=");
536 _cleanup_free_
char *t
= NULL
;
540 log_error("DNS class specified twice.");
544 e
= strchrnul(f
, ';');
545 t
= strndup(f
, e
- f
);
549 r
= dns_class_from_string(t
);
551 log_error("Unknown DNS class %s.", t
);
565 f
= startswith_no_case(q
, "type=");
567 _cleanup_free_
char *t
= NULL
;
571 log_error("DNS type specified twice.");
575 e
= strchrnul(f
, ';');
576 t
= strndup(f
, e
- f
);
580 r
= dns_type_from_string(t
);
582 log_error("Unknown DNS type %s.", t
);
602 class = arg_class
?: DNS_CLASS_IN
;
604 type
= arg_type
?: DNS_TYPE_A
;
606 return resolve_record(bus
, n
, class, type
, true);
609 log_error("Invalid DNS URI: %s", name
);
613 static int verb_query(int argc
, char **argv
, void *userdata
) {
614 sd_bus
*bus
= userdata
;
619 STRV_FOREACH(p
, argv
+ 1) {
620 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
626 STRV_FOREACH(p
, argv
+ 1) {
627 if (startswith(*p
, "dns:"))
628 q
= resolve_rfc4501(bus
, *p
);
631 union in_addr_union a
;
633 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
635 q
= resolve_address(bus
, family
, &a
, ifindex
);
637 q
= resolve_host(bus
, *p
);
646 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
647 const char *canonical_name
, *canonical_type
, *canonical_domain
;
648 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
649 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
650 char ifname
[IF_NAMESIZE
] = "";
661 name
= empty_to_null(name
);
662 type
= empty_to_null(type
);
664 if (arg_ifindex
> 0 && !if_indextoname(arg_ifindex
, ifname
))
665 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", arg_ifindex
);
668 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
670 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
672 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(ifname
) ? "*" : ifname
);
674 r
= sd_bus_message_new_method_call(
677 "org.freedesktop.resolve1",
678 "/org/freedesktop/resolve1",
679 "org.freedesktop.resolve1.Manager",
682 return bus_log_create_error(r
);
684 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
686 return bus_log_create_error(r
);
688 ts
= now(CLOCK_MONOTONIC
);
690 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
692 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
694 ts
= now(CLOCK_MONOTONIC
) - ts
;
696 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
698 return bus_log_parse_error(r
);
701 (name
? strlen(name
) + 1 : 0) +
702 (type
? strlen(type
) + 1 : 0) +
706 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
707 uint16_t priority
, weight
, port
;
708 const char *hostname
, *canonical
;
710 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
712 return bus_log_parse_error(r
);
715 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
717 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
719 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
720 (int) strlen(domain
), c
== 0 ? domain
: "",
725 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
727 return bus_log_parse_error(r
);
729 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
730 _cleanup_free_
char *pretty
= NULL
;
734 assert_cc(sizeof(int) == sizeof(int32_t));
736 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
738 return bus_log_parse_error(r
);
740 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
742 return bus_log_parse_error(r
);
744 r
= sd_bus_message_exit_container(reply
);
746 return bus_log_parse_error(r
);
748 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
749 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
753 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
754 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
759 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
760 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
762 r
= in_addr_to_string(family
, a
, &pretty
);
764 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
766 printf("%*s%s%s%s\n", (int) indent
, "", pretty
, isempty(ifname
) ? "" : "%s", ifname
);
769 return bus_log_parse_error(r
);
771 r
= sd_bus_message_exit_container(reply
);
773 return bus_log_parse_error(r
);
775 r
= sd_bus_message_read(reply
, "s", &canonical
);
777 return bus_log_parse_error(r
);
779 if (!streq(hostname
, canonical
))
780 printf("%*s(%s)\n", (int) indent
, "", canonical
);
782 r
= sd_bus_message_exit_container(reply
);
784 return bus_log_parse_error(r
);
789 return bus_log_parse_error(r
);
791 r
= sd_bus_message_exit_container(reply
);
793 return bus_log_parse_error(r
);
795 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
797 return bus_log_parse_error(r
);
799 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
800 _cleanup_free_
char *escaped
= NULL
;
802 escaped
= cescape_length(p
, sz
);
806 printf("%*s%s\n", (int) indent
, "", escaped
);
809 return bus_log_parse_error(r
);
811 r
= sd_bus_message_exit_container(reply
);
813 return bus_log_parse_error(r
);
815 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
817 return bus_log_parse_error(r
);
819 canonical_name
= empty_to_null(canonical_name
);
820 canonical_type
= empty_to_null(canonical_type
);
822 if (!streq_ptr(name
, canonical_name
) ||
823 !streq_ptr(type
, canonical_type
) ||
824 !streq_ptr(domain
, canonical_domain
)) {
826 printf("%*s(", (int) indent
, "");
829 printf("%s/", canonical_name
);
831 printf("%s/", canonical_type
);
833 printf("%s)\n", canonical_domain
);
836 print_source(flags
, ts
);
841 static int verb_service(int argc
, char **argv
, void *userdata
) {
842 sd_bus
*bus
= userdata
;
845 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
847 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
849 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
852 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
853 const char *domain
, *full
;
855 _cleanup_free_
char *hashed
= NULL
;
860 domain
= strrchr(address
, '@');
862 log_error("Address does not contain '@': \"%s\"", address
);
864 } else if (domain
== address
|| domain
[1] == '\0') {
865 log_error("Address starts or ends with '@': \"%s\"", address
);
870 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
872 return log_error_errno(r
, "Hashing failed: %m");
874 strshorten(hashed
, 56);
876 full
= strjoina(hashed
, "._openpgpkey.", domain
);
877 log_debug("Looking up \"%s\".", full
);
879 r
= resolve_record(bus
, full
,
880 arg_class
?: DNS_CLASS_IN
,
881 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
883 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
885 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
887 return log_error_errno(r
, "Hashing failed: %m");
889 full
= strjoina(hashed
, "._openpgpkey.", domain
);
890 log_debug("Looking up \"%s\".", full
);
892 return resolve_record(bus
, full
,
893 arg_class
?: DNS_CLASS_IN
,
894 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
900 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
901 sd_bus
*bus
= userdata
;
905 STRV_FOREACH(p
, argv
+ 1) {
906 q
= resolve_openpgp(bus
, *p
);
914 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
916 uint16_t port_num
= 443;
917 _cleanup_free_
char *full
= NULL
;
923 port
= strrchr(address
, ':');
925 r
= parse_ip_port(port
+ 1, &port_num
);
927 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
929 address
= strndupa(address
, port
- address
);
932 r
= asprintf(&full
, "_%u._%s.%s",
939 log_debug("Looking up \"%s\".", full
);
941 return resolve_record(bus
, full
,
942 arg_class
?: DNS_CLASS_IN
,
943 arg_type
?: DNS_TYPE_TLSA
, true);
946 static bool service_family_is_valid(const char *s
) {
947 return STR_IN_SET(s
, "tcp", "udp", "sctp");
950 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
951 sd_bus
*bus
= userdata
;
952 char **p
, **args
= argv
+ 1;
953 const char *family
= "tcp";
956 if (service_family_is_valid(argv
[1])) {
961 STRV_FOREACH(p
, args
) {
962 q
= resolve_tlsa(bus
, family
, *p
);
970 static int show_statistics(int argc
, char **argv
, void *userdata
) {
971 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
972 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
973 sd_bus
*bus
= userdata
;
974 uint64_t n_current_transactions
, n_total_transactions
,
975 cache_size
, n_cache_hit
, n_cache_miss
,
976 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
977 int r
, dnssec_supported
;
981 r
= sd_bus_get_property_trivial(bus
,
982 "org.freedesktop.resolve1",
983 "/org/freedesktop/resolve1",
984 "org.freedesktop.resolve1.Manager",
990 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
992 printf("DNSSEC supported by current servers: %s%s%s\n\n",
994 yes_no(dnssec_supported
),
997 r
= sd_bus_get_property(bus
,
998 "org.freedesktop.resolve1",
999 "/org/freedesktop/resolve1",
1000 "org.freedesktop.resolve1.Manager",
1001 "TransactionStatistics",
1006 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
1008 r
= sd_bus_message_read(reply
, "(tt)",
1009 &n_current_transactions
,
1010 &n_total_transactions
);
1012 return bus_log_parse_error(r
);
1014 printf("%sTransactions%s\n"
1015 "Current Transactions: %" PRIu64
"\n"
1016 " Total Transactions: %" PRIu64
"\n",
1019 n_current_transactions
,
1020 n_total_transactions
);
1022 reply
= sd_bus_message_unref(reply
);
1024 r
= sd_bus_get_property(bus
,
1025 "org.freedesktop.resolve1",
1026 "/org/freedesktop/resolve1",
1027 "org.freedesktop.resolve1.Manager",
1033 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1035 r
= sd_bus_message_read(reply
, "(ttt)",
1040 return bus_log_parse_error(r
);
1042 printf("\n%sCache%s\n"
1043 " Current Cache Size: %" PRIu64
"\n"
1044 " Cache Hits: %" PRIu64
"\n"
1045 " Cache Misses: %" PRIu64
"\n",
1052 reply
= sd_bus_message_unref(reply
);
1054 r
= sd_bus_get_property(bus
,
1055 "org.freedesktop.resolve1",
1056 "/org/freedesktop/resolve1",
1057 "org.freedesktop.resolve1.Manager",
1063 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1065 r
= sd_bus_message_read(reply
, "(tttt)",
1069 &n_dnssec_indeterminate
);
1071 return bus_log_parse_error(r
);
1073 printf("\n%sDNSSEC Verdicts%s\n"
1074 " Secure: %" PRIu64
"\n"
1075 " Insecure: %" PRIu64
"\n"
1076 " Bogus: %" PRIu64
"\n"
1077 " Indeterminate: %" PRIu64
"\n",
1083 n_dnssec_indeterminate
);
1088 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1089 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1090 sd_bus
*bus
= userdata
;
1093 r
= sd_bus_call_method(bus
,
1094 "org.freedesktop.resolve1",
1095 "/org/freedesktop/resolve1",
1096 "org.freedesktop.resolve1.Manager",
1102 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1107 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1108 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1109 sd_bus
*bus
= userdata
;
1112 r
= sd_bus_call_method(bus
,
1113 "org.freedesktop.resolve1",
1114 "/org/freedesktop/resolve1",
1115 "org.freedesktop.resolve1.Manager",
1121 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1126 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1127 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1128 sd_bus
*bus
= userdata
;
1131 r
= sd_bus_call_method(bus
,
1132 "org.freedesktop.resolve1",
1133 "/org/freedesktop/resolve1",
1134 "org.freedesktop.resolve1.Manager",
1135 "ResetServerFeatures",
1140 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1145 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1146 _cleanup_free_
char *pretty
= NULL
;
1147 int ifindex
, family
, r
;
1154 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? "iiay" : "iay");
1159 r
= sd_bus_message_read(m
, "i", &ifindex
);
1164 r
= sd_bus_message_read(m
, "i", &family
);
1168 r
= sd_bus_message_read_array(m
, 'y', &a
, &sz
);
1172 r
= sd_bus_message_exit_container(m
);
1176 if (with_ifindex
&& ifindex
!= 0) {
1177 /* only show the global ones here */
1182 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
1183 log_debug("Unexpected family, ignoring: %i", family
);
1189 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
1190 log_debug("Address size mismatch, ignoring.");
1196 r
= in_addr_to_string(family
, a
, &pretty
);
1200 *ret
= TAKE_PTR(pretty
);
1205 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1206 char ***l
= userdata
;
1214 r
= sd_bus_message_enter_container(m
, 'a', "(iay)");
1219 char *pretty
= NULL
;
1221 r
= read_dns_server_one(m
, false, &pretty
);
1227 if (isempty(pretty
))
1230 r
= strv_consume(l
, pretty
);
1235 r
= sd_bus_message_exit_container(m
);
1242 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1246 return read_dns_server_one(m
, false, userdata
);
1249 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1250 _cleanup_free_
char *str
= NULL
;
1251 int ifindex
, route_only
, r
;
1258 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1260 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1264 if (with_ifindex
&& ifindex
!= 0) {
1265 /* only show the global ones here */
1271 str
= strappend("~", domain
);
1273 str
= strdup(domain
);
1277 *ret
= TAKE_PTR(str
);
1282 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1283 char ***l
= userdata
;
1291 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1296 char *pretty
= NULL
;
1298 r
= read_domain_one(m
, false, &pretty
);
1304 if (isempty(pretty
))
1307 r
= strv_consume(l
, pretty
);
1312 r
= sd_bus_message_exit_container(m
);
1319 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1322 printf("%sLink %i (%s)%s:",
1323 ansi_highlight(), ifindex
, ifname
, ansi_normal());
1333 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1336 uint64_t scopes_mask
;
1344 bool dnssec_supported
;
1347 static const struct bus_properties_map property_map
[] = {
1348 { "ScopesMask", "t", NULL
, offsetof(struct link_info
, scopes_mask
) },
1349 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(struct link_info
, dns
) },
1350 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(struct link_info
, current_dns
) },
1351 { "Domains", "a(sb)", map_link_domains
, offsetof(struct link_info
, domains
) },
1352 { "LLMNR", "s", NULL
, offsetof(struct link_info
, llmnr
) },
1353 { "MulticastDNS", "s", NULL
, offsetof(struct link_info
, mdns
) },
1354 { "DNSSEC", "s", NULL
, offsetof(struct link_info
, dnssec
) },
1355 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct link_info
, ntas
) },
1356 { "DNSSECSupported", "b", NULL
, offsetof(struct link_info
, dnssec_supported
) },
1360 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1361 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1362 _cleanup_free_
char *ifi
= NULL
, *p
= NULL
;
1363 char ifname
[IF_NAMESIZE
] = "";
1368 assert(ifindex
> 0);
1371 if (!if_indextoname(ifindex
, ifname
))
1372 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1377 if (asprintf(&ifi
, "%i", ifindex
) < 0)
1380 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1384 r
= bus_map_all_properties(bus
,
1385 "org.freedesktop.resolve1",
1388 BUS_MAP_BOOLEAN_AS_BOOL
,
1393 log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1397 (void) pager_open(arg_no_pager
, false);
1399 if (mode
== STATUS_DNS
) {
1400 r
= status_print_strv_ifindex(ifindex
, name
, link_info
.dns
);
1404 if (mode
== STATUS_DOMAIN
) {
1405 r
= status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1409 if (mode
== STATUS_NTA
) {
1410 r
= status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1414 if (mode
== STATUS_LLMNR
) {
1415 printf("%sLink %i (%s)%s: %s\n",
1416 ansi_highlight(), ifindex
, name
, ansi_normal(),
1417 strna(link_info
.llmnr
));
1423 if (mode
== STATUS_MDNS
) {
1424 printf("%sLink %i (%s)%s: %s\n",
1425 ansi_highlight(), ifindex
, name
, ansi_normal(),
1426 strna(link_info
.mdns
));
1432 if (mode
== STATUS_DNSSEC
) {
1433 printf("%sLink %i (%s)%s: %s\n",
1434 ansi_highlight(), ifindex
, name
, ansi_normal(),
1435 strna(link_info
.dnssec
));
1441 if (empty_line
&& *empty_line
)
1442 fputc('\n', stdout
);
1444 printf("%sLink %i (%s)%s\n",
1445 ansi_highlight(), ifindex
, name
, ansi_normal());
1447 if (link_info
.scopes_mask
== 0)
1448 printf(" Current Scopes: none\n");
1450 printf(" Current Scopes:%s%s%s%s%s\n",
1451 link_info
.scopes_mask
& SD_RESOLVED_DNS
? " DNS" : "",
1452 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
1453 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
1454 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
1455 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
1457 printf(" LLMNR setting: %s\n"
1458 "MulticastDNS setting: %s\n"
1459 " DNSSEC setting: %s\n"
1460 " DNSSEC supported: %s\n",
1461 strna(link_info
.llmnr
),
1462 strna(link_info
.mdns
),
1463 strna(link_info
.dnssec
),
1464 yes_no(link_info
.dnssec_supported
));
1466 if (link_info
.current_dns
)
1467 printf(" Current DNS Server: %s\n", link_info
.current_dns
);
1469 STRV_FOREACH(i
, link_info
.dns
) {
1471 i
== link_info
.dns
? "DNS Servers:" : " ",
1475 STRV_FOREACH(i
, link_info
.domains
) {
1477 i
== link_info
.domains
? "DNS Domain:" : " ",
1481 STRV_FOREACH(i
, link_info
.ntas
) {
1483 i
== link_info
.ntas
? "DNSSEC NTA:" : " ",
1493 free(link_info
.current_dns
);
1494 strv_free(link_info
.dns
);
1495 strv_free(link_info
.domains
);
1496 strv_free(link_info
.ntas
);
1500 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1501 char ***l
= userdata
;
1509 r
= sd_bus_message_enter_container(m
, 'a', "(iiay)");
1514 char *pretty
= NULL
;
1516 r
= read_dns_server_one(m
, true, &pretty
);
1522 if (isempty(pretty
))
1525 r
= strv_consume(l
, pretty
);
1530 r
= sd_bus_message_exit_container(m
);
1537 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1541 return read_dns_server_one(m
, true, userdata
);
1544 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1545 char ***l
= userdata
;
1553 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1558 char *pretty
= NULL
;
1560 r
= read_domain_one(m
, true, &pretty
);
1566 if (isempty(pretty
))
1569 r
= strv_consume(l
, pretty
);
1574 r
= sd_bus_message_exit_container(m
);
1581 static int status_print_strv_global(char **p
) {
1584 printf("%sGlobal%s:", ansi_highlight(), ansi_normal());
1594 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1596 struct global_info
{
1599 char **fallback_dns
;
1605 bool dnssec_supported
;
1608 static const struct bus_properties_map property_map
[] = {
1609 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, dns
) },
1610 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, fallback_dns
) },
1611 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(struct global_info
, current_dns
) },
1612 { "Domains", "a(isb)", map_global_domains
, offsetof(struct global_info
, domains
) },
1613 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct global_info
, ntas
) },
1614 { "LLMNR", "s", NULL
, offsetof(struct global_info
, llmnr
) },
1615 { "MulticastDNS", "s", NULL
, offsetof(struct global_info
, mdns
) },
1616 { "DNSSEC", "s", NULL
, offsetof(struct global_info
, dnssec
) },
1617 { "DNSSECSupported", "b", NULL
, offsetof(struct global_info
, dnssec_supported
) },
1621 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1622 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1629 r
= bus_map_all_properties(bus
,
1630 "org.freedesktop.resolve1",
1631 "/org/freedesktop/resolve1",
1633 BUS_MAP_BOOLEAN_AS_BOOL
,
1638 log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1642 (void) pager_open(arg_no_pager
, false);
1644 if (mode
== STATUS_DNS
) {
1645 r
= status_print_strv_global(global_info
.dns
);
1649 if (mode
== STATUS_DOMAIN
) {
1650 r
= status_print_strv_global(global_info
.domains
);
1654 if (mode
== STATUS_NTA
) {
1655 r
= status_print_strv_global(global_info
.ntas
);
1659 if (mode
== STATUS_LLMNR
) {
1660 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1661 strna(global_info
.llmnr
));
1667 if (mode
== STATUS_MDNS
) {
1668 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1669 strna(global_info
.mdns
));
1675 if (mode
== STATUS_DNSSEC
) {
1676 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1677 strna(global_info
.dnssec
));
1683 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1685 printf(" LLMNR setting: %s\n"
1686 "MulticastDNS setting: %s\n"
1687 " DNSSEC setting: %s\n"
1688 " DNSSEC supported: %s\n",
1689 strna(global_info
.llmnr
),
1690 strna(global_info
.mdns
),
1691 strna(global_info
.dnssec
),
1692 yes_no(global_info
.dnssec_supported
));
1694 if (global_info
.current_dns
)
1695 printf(" Current DNS Server: %s\n", global_info
.current_dns
);
1697 STRV_FOREACH(i
, global_info
.dns
) {
1699 i
== global_info
.dns
? "DNS Servers:" : " ",
1703 STRV_FOREACH(i
, global_info
.fallback_dns
) {
1705 i
== global_info
.fallback_dns
? "Fallback DNS Servers:" : " ",
1709 STRV_FOREACH(i
, global_info
.domains
) {
1711 i
== global_info
.domains
? "DNS Domain:" : " ",
1715 strv_sort(global_info
.ntas
);
1716 STRV_FOREACH(i
, global_info
.ntas
) {
1718 i
== global_info
.ntas
? "DNSSEC NTA:" : " ",
1727 free(global_info
.current_dns
);
1728 strv_free(global_info
.dns
);
1729 strv_free(global_info
.fallback_dns
);
1730 strv_free(global_info
.domains
);
1731 strv_free(global_info
.ntas
);
1736 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1737 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1738 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1739 sd_netlink_message
*i
;
1740 bool empty_line
= false;
1745 r
= status_global(bus
, mode
, &empty_line
);
1749 r
= sd_netlink_open(&rtnl
);
1751 return log_error_errno(r
, "Failed to connect to netlink: %m");
1753 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1755 return rtnl_log_create_error(r
);
1757 r
= sd_netlink_message_request_dump(req
, true);
1759 return rtnl_log_create_error(r
);
1761 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1763 return log_error_errno(r
, "Failed to enumerate links: %m");
1766 for (i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1771 q
= sd_netlink_message_get_type(i
, &type
);
1773 return rtnl_log_parse_error(q
);
1775 if (type
!= RTM_NEWLINK
)
1778 q
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1780 return rtnl_log_parse_error(q
);
1782 if (ifindex
== LOOPBACK_IFINDEX
)
1785 q
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1787 return rtnl_log_parse_error(q
);
1789 q
= status_ifindex(bus
, ifindex
, name
, mode
, &empty_line
);
1790 if (q
< 0 && r
>= 0)
1797 static int verb_status(int argc
, char **argv
, void *userdata
) {
1798 sd_bus
*bus
= userdata
;
1803 bool empty_line
= false;
1805 STRV_FOREACH(ifname
, argv
+ 1) {
1808 ifindex
= parse_ifindex_with_warn(*ifname
);
1812 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1817 r
= status_all(bus
, STATUS_ALL
);
1822 static int log_interface_is_managed(int r
, int ifindex
) {
1823 char ifname
[IFNAMSIZ
];
1825 return log_error_errno(r
,
1826 "The specified interface %s is managed by systemd-networkd. Operation refused.\n"
1827 "Please configure DNS settings for systemd-networkd managed interfaces directly in their .network files.",
1828 strna(if_indextoname(ifindex
, ifname
)));
1831 static int verb_dns(int argc
, char **argv
, void *userdata
) {
1832 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1833 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1834 sd_bus
*bus
= userdata
;
1841 return status_all(bus
, STATUS_DNS
);
1843 ifindex
= parse_ifindex_with_warn(argv
[1]);
1847 if (ifindex
== LOOPBACK_IFINDEX
) {
1848 log_error("Interface can't be the loopback interface (lo). Sorry.");
1853 return status_ifindex(bus
, ifindex
, NULL
, STATUS_DNS
, NULL
);
1855 r
= sd_bus_message_new_method_call(
1858 "org.freedesktop.resolve1",
1859 "/org/freedesktop/resolve1",
1860 "org.freedesktop.resolve1.Manager",
1863 return bus_log_create_error(r
);
1865 r
= sd_bus_message_append(req
, "i", ifindex
);
1867 return bus_log_create_error(r
);
1869 r
= sd_bus_message_open_container(req
, 'a', "(iay)");
1871 return bus_log_create_error(r
);
1873 STRV_FOREACH(p
, argv
+ 2) {
1874 struct in_addr_data data
;
1876 r
= in_addr_from_string_auto(*p
, &data
.family
, &data
.address
);
1878 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
1880 r
= sd_bus_message_open_container(req
, 'r', "iay");
1882 return bus_log_create_error(r
);
1884 r
= sd_bus_message_append(req
, "i", data
.family
);
1886 return bus_log_create_error(r
);
1888 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
1890 return bus_log_create_error(r
);
1892 r
= sd_bus_message_close_container(req
);
1894 return bus_log_create_error(r
);
1897 r
= sd_bus_message_close_container(req
);
1899 return bus_log_create_error(r
);
1901 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
1903 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
1904 return log_interface_is_managed(r
, ifindex
);
1906 if (arg_ifindex_permissive
&&
1907 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1910 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
1916 static int verb_domain(int argc
, char **argv
, void *userdata
) {
1917 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1918 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1919 sd_bus
*bus
= userdata
;
1926 return status_all(bus
, STATUS_DOMAIN
);
1928 ifindex
= parse_ifindex_with_warn(argv
[1]);
1932 if (ifindex
== LOOPBACK_IFINDEX
) {
1933 log_error("Interface can't be the loopback interface (lo). Sorry.");
1938 return status_ifindex(bus
, ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
1940 r
= sd_bus_message_new_method_call(
1943 "org.freedesktop.resolve1",
1944 "/org/freedesktop/resolve1",
1945 "org.freedesktop.resolve1.Manager",
1948 return bus_log_create_error(r
);
1950 r
= sd_bus_message_append(req
, "i", ifindex
);
1952 return bus_log_create_error(r
);
1954 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
1956 return bus_log_create_error(r
);
1958 STRV_FOREACH(p
, argv
+ 2) {
1961 n
= **p
== '~' ? *p
+ 1 : *p
;
1963 r
= dns_name_is_valid(n
);
1965 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
1967 log_error("Domain not valid: %s", n
);
1971 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
1973 return bus_log_create_error(r
);
1976 r
= sd_bus_message_close_container(req
);
1978 return bus_log_create_error(r
);
1980 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
1982 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
1983 return log_interface_is_managed(r
, ifindex
);
1985 if (arg_ifindex_permissive
&&
1986 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1989 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
1995 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
1996 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1997 sd_bus
*bus
= userdata
;
2003 return status_all(bus
, STATUS_LLMNR
);
2005 ifindex
= parse_ifindex_with_warn(argv
[1]);
2009 if (ifindex
== LOOPBACK_IFINDEX
) {
2010 log_error("Interface can't be the loopback interface (lo). Sorry.");
2015 return status_ifindex(bus
, ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2017 r
= sd_bus_call_method(bus
,
2018 "org.freedesktop.resolve1",
2019 "/org/freedesktop/resolve1",
2020 "org.freedesktop.resolve1.Manager",
2024 "is", ifindex
, argv
[2]);
2026 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2027 return log_interface_is_managed(r
, ifindex
);
2029 if (arg_ifindex_permissive
&&
2030 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2033 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2039 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2040 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2041 sd_bus
*bus
= userdata
;
2047 return status_all(bus
, STATUS_MDNS
);
2049 ifindex
= parse_ifindex_with_warn(argv
[1]);
2053 if (ifindex
== LOOPBACK_IFINDEX
) {
2054 log_error("Interface can't be the loopback interface (lo). Sorry.");
2059 return status_ifindex(bus
, ifindex
, NULL
, STATUS_MDNS
, NULL
);
2061 r
= sd_bus_call_method(bus
,
2062 "org.freedesktop.resolve1",
2063 "/org/freedesktop/resolve1",
2064 "org.freedesktop.resolve1.Manager",
2065 "SetLinkMulticastDNS",
2068 "is", ifindex
, argv
[2]);
2070 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2071 return log_interface_is_managed(r
, ifindex
);
2073 if (arg_ifindex_permissive
&&
2074 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2077 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2083 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2084 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2085 sd_bus
*bus
= userdata
;
2091 return status_all(bus
, STATUS_DNSSEC
);
2093 ifindex
= parse_ifindex_with_warn(argv
[1]);
2097 if (ifindex
== LOOPBACK_IFINDEX
) {
2098 log_error("Interface can't be the loopback interface (lo). Sorry.");
2103 return status_ifindex(bus
, ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2105 r
= sd_bus_call_method(bus
,
2106 "org.freedesktop.resolve1",
2107 "/org/freedesktop/resolve1",
2108 "org.freedesktop.resolve1.Manager",
2112 "is", ifindex
, argv
[2]);
2114 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2115 return log_interface_is_managed(r
, ifindex
);
2117 if (arg_ifindex_permissive
&&
2118 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2121 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2127 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2128 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2129 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2130 sd_bus
*bus
= userdata
;
2136 return status_all(bus
, STATUS_NTA
);
2138 ifindex
= parse_ifindex_with_warn(argv
[1]);
2142 if (ifindex
== LOOPBACK_IFINDEX
) {
2143 log_error("Interface can't be the loopback interface (lo). Sorry.");
2148 return status_ifindex(bus
, ifindex
, NULL
, STATUS_NTA
, NULL
);
2150 for (i
= 2; i
< argc
; i
++) {
2151 r
= dns_name_is_valid(argv
[i
]);
2153 return log_error_errno(r
, "Failed to validate specified domain %s: %m", argv
[i
]);
2155 log_error("Domain not valid: %s", argv
[i
]);
2160 r
= sd_bus_message_new_method_call(
2163 "org.freedesktop.resolve1",
2164 "/org/freedesktop/resolve1",
2165 "org.freedesktop.resolve1.Manager",
2166 "SetLinkDNSSECNegativeTrustAnchors");
2168 return bus_log_create_error(r
);
2170 r
= sd_bus_message_append(req
, "i", ifindex
);
2172 return bus_log_create_error(r
);
2174 r
= sd_bus_message_append_strv(req
, argv
+ 2);
2176 return bus_log_create_error(r
);
2178 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
2180 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2181 return log_interface_is_managed(r
, ifindex
);
2183 if (arg_ifindex_permissive
&&
2184 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2187 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2193 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2194 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2195 sd_bus
*bus
= userdata
;
2200 ifindex
= parse_ifindex_with_warn(argv
[1]);
2204 if (ifindex
== LOOPBACK_IFINDEX
) {
2205 log_error("Interface can't be the loopback interface (lo). Sorry.");
2209 r
= sd_bus_call_method(bus
,
2210 "org.freedesktop.resolve1",
2211 "/org/freedesktop/resolve1",
2212 "org.freedesktop.resolve1.Manager",
2218 if (arg_ifindex_permissive
&&
2219 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2222 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2228 static void help_protocol_types(void) {
2230 puts("Known protocol types:");
2231 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2234 static void help_dns_types(void) {
2239 puts("Known DNS RR types:");
2240 for (i
= 0; i
< _DNS_TYPE_MAX
; i
++) {
2241 t
= dns_type_to_string(i
);
2247 static void help_dns_classes(void) {
2252 puts("Known DNS RR classes:");
2253 for (i
= 0; i
< _DNS_CLASS_MAX
; i
++) {
2254 t
= dns_class_to_string(i
);
2260 static void compat_help(void) {
2261 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2262 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2263 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2264 "%1$s [OPTIONS...] --statistics\n"
2265 "%1$s [OPTIONS...] --reset-statistics\n"
2267 "Resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n\n"
2268 " -h --help Show this help\n"
2269 " --version Show package version\n"
2270 " --no-pager Do not pipe output into a pager\n"
2271 " -4 Resolve IPv4 addresses\n"
2272 " -6 Resolve IPv6 addresses\n"
2273 " -i --interface=INTERFACE Look on interface\n"
2274 " -p --protocol=PROTO|help Look via protocol\n"
2275 " -t --type=TYPE|help Query RR with DNS type\n"
2276 " -c --class=CLASS|help Query RR with DNS class\n"
2277 " --service Resolve service (SRV)\n"
2278 " --service-address=BOOL Resolve address for services (default: yes)\n"
2279 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2280 " --openpgp Query OpenPGP public key\n"
2281 " --tlsa Query TLS public key\n"
2282 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2283 " --search=BOOL Use search domains for single-label names\n"
2285 " --raw[=payload|packet] Dump the answer as binary data\n"
2286 " --legend=BOOL Print headers and additional info (default: yes)\n"
2287 " --statistics Show resolver statistics\n"
2288 " --reset-statistics Reset resolver statistics\n"
2289 " --status Show link and server status\n"
2290 " --flush-caches Flush all local DNS caches\n"
2291 " --reset-server-features\n"
2292 " Forget learnt DNS server feature levels\n"
2293 " --set-dns=SERVER Set per-interface DNS server address\n"
2294 " --set-domain=DOMAIN Set per-interface search domain\n"
2295 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2296 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2297 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2298 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2299 " --revert Revert per-interface configuration\n"
2300 , program_invocation_short_name
);
2303 static void native_help(void) {
2304 printf("%1$s [OPTIONS...] {COMMAND} ...\n"
2306 "Send control commands to the network name resolution manager, or\n"
2307 "resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n"
2309 " -h --help Show this help\n"
2310 " --version Show package version\n"
2311 " --no-pager Do not pipe output into a pager\n"
2312 " -4 Resolve IPv4 addresses\n"
2313 " -6 Resolve IPv6 addresses\n"
2314 " -i --interface=INTERFACE Look on interface\n"
2315 " -p --protocol=PROTO|help Look via protocol\n"
2316 " -t --type=TYPE|help Query RR with DNS type\n"
2317 " -c --class=CLASS|help Query RR with DNS class\n"
2318 " --service-address=BOOL Resolve address for services (default: yes)\n"
2319 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2320 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2321 " --search=BOOL Use search domains for single-label names\n"
2323 " --raw[=payload|packet] Dump the answer as binary data\n"
2324 " --legend=BOOL Print headers and additional info (default: yes)\n"
2327 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2328 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2329 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2330 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2331 " status [LINK...] Show link and server status\n"
2332 " statistics Show resolver statistics\n"
2333 " reset-statistics Reset resolver statistics\n"
2334 " flush-caches Flush all local DNS caches\n"
2335 " reset-server-features Forget learnt DNS server feature levels\n"
2336 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2337 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2338 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2339 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2340 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2341 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2342 " revert LINK Revert per-interface configuration\n"
2343 , program_invocation_short_name
);
2346 static int verb_help(int argc
, char **argv
, void *userdata
) {
2351 static int compat_parse_argv(int argc
, char *argv
[]) {
2353 ARG_VERSION
= 0x100,
2357 ARG_SERVICE_ADDRESS
,
2364 ARG_RESET_STATISTICS
,
2367 ARG_RESET_SERVER_FEATURES
,
2378 static const struct option options
[] = {
2379 { "help", no_argument
, NULL
, 'h' },
2380 { "version", no_argument
, NULL
, ARG_VERSION
},
2381 { "type", required_argument
, NULL
, 't' },
2382 { "class", required_argument
, NULL
, 'c' },
2383 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2384 { "interface", required_argument
, NULL
, 'i' },
2385 { "protocol", required_argument
, NULL
, 'p' },
2386 { "cname", required_argument
, NULL
, ARG_CNAME
},
2387 { "service", no_argument
, NULL
, ARG_SERVICE
},
2388 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2389 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2390 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2391 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2392 { "raw", optional_argument
, NULL
, ARG_RAW
},
2393 { "search", required_argument
, NULL
, ARG_SEARCH
},
2394 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2395 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2396 { "status", no_argument
, NULL
, ARG_STATUS
},
2397 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2398 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2399 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2400 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2401 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2402 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2403 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2404 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2405 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2406 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2415 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2420 return 0; /* done */;
2426 arg_family
= AF_INET
;
2430 arg_family
= AF_INET6
;
2434 r
= parse_ifindex_with_warn(optarg
);
2438 arg_ifname
= optarg
;
2443 if (streq(optarg
, "help")) {
2448 r
= dns_type_from_string(optarg
);
2450 log_error("Failed to parse RR record type %s", optarg
);
2453 arg_type
= (uint16_t) r
;
2454 assert((int) arg_type
== r
);
2456 arg_mode
= MODE_RESOLVE_RECORD
;
2460 if (streq(optarg
, "help")) {
2465 r
= dns_class_from_string(optarg
);
2467 log_error("Failed to parse RR record class %s", optarg
);
2470 arg_class
= (uint16_t) r
;
2471 assert((int) arg_class
== r
);
2476 r
= parse_boolean(optarg
);
2478 return log_error_errno(r
, "Failed to parse --legend= argument");
2484 if (streq(optarg
, "help")) {
2485 help_protocol_types();
2487 } else if (streq(optarg
, "dns"))
2488 arg_flags
|= SD_RESOLVED_DNS
;
2489 else if (streq(optarg
, "llmnr"))
2490 arg_flags
|= SD_RESOLVED_LLMNR
;
2491 else if (streq(optarg
, "llmnr-ipv4"))
2492 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2493 else if (streq(optarg
, "llmnr-ipv6"))
2494 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2495 else if (streq(optarg
, "mdns"))
2496 arg_flags
|= SD_RESOLVED_MDNS
;
2497 else if (streq(optarg
, "mdns-ipv4"))
2498 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2499 else if (streq(optarg
, "mdns-ipv6"))
2500 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2502 log_error("Unknown protocol specifier: %s", optarg
);
2509 arg_mode
= MODE_RESOLVE_SERVICE
;
2513 arg_mode
= MODE_RESOLVE_OPENPGP
;
2517 arg_mode
= MODE_RESOLVE_TLSA
;
2518 if (!optarg
|| service_family_is_valid(optarg
))
2519 arg_service_family
= optarg
;
2521 log_error("Unknown service family \"%s\".", optarg
);
2528 log_error("Refusing to write binary data to tty.");
2532 if (optarg
== NULL
|| streq(optarg
, "payload"))
2533 arg_raw
= RAW_PAYLOAD
;
2534 else if (streq(optarg
, "packet"))
2535 arg_raw
= RAW_PACKET
;
2537 log_error("Unknown --raw specifier \"%s\".", optarg
);
2545 r
= parse_boolean(optarg
);
2547 return log_error_errno(r
, "Failed to parse --cname= argument.");
2548 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2551 case ARG_SERVICE_ADDRESS
:
2552 r
= parse_boolean(optarg
);
2554 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2555 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2558 case ARG_SERVICE_TXT
:
2559 r
= parse_boolean(optarg
);
2561 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2562 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2566 r
= parse_boolean(optarg
);
2568 return log_error_errno(r
, "Failed to parse --search argument.");
2569 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2572 case ARG_STATISTICS
:
2573 arg_mode
= MODE_STATISTICS
;
2576 case ARG_RESET_STATISTICS
:
2577 arg_mode
= MODE_RESET_STATISTICS
;
2580 case ARG_FLUSH_CACHES
:
2581 arg_mode
= MODE_FLUSH_CACHES
;
2584 case ARG_RESET_SERVER_FEATURES
:
2585 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2589 arg_mode
= MODE_STATUS
;
2593 arg_no_pager
= true;
2597 r
= strv_extend(&arg_set_dns
, optarg
);
2601 arg_mode
= MODE_SET_LINK
;
2604 case ARG_SET_DOMAIN
:
2605 r
= strv_extend(&arg_set_domain
, optarg
);
2609 arg_mode
= MODE_SET_LINK
;
2613 arg_set_llmnr
= optarg
;
2614 arg_mode
= MODE_SET_LINK
;
2618 arg_set_mdns
= optarg
;
2619 arg_mode
= MODE_SET_LINK
;
2622 case ARG_SET_DNSSEC
:
2623 arg_set_dnssec
= optarg
;
2624 arg_mode
= MODE_SET_LINK
;
2628 r
= strv_extend(&arg_set_nta
, optarg
);
2632 arg_mode
= MODE_SET_LINK
;
2635 case ARG_REVERT_LINK
:
2636 arg_mode
= MODE_REVERT_LINK
;
2643 assert_not_reached("Unhandled option");
2646 if (arg_type
== 0 && arg_class
!= 0) {
2647 log_error("--class= may only be used in conjunction with --type=.");
2651 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
) {
2652 log_error("--service and --type= may not be combined.");
2656 if (arg_type
!= 0 && arg_class
== 0)
2657 arg_class
= DNS_CLASS_IN
;
2659 if (arg_class
!= 0 && arg_type
== 0)
2660 arg_type
= DNS_TYPE_A
;
2662 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2664 if (arg_ifindex
<= 0) {
2665 log_error("--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2669 if (arg_ifindex
== LOOPBACK_IFINDEX
) {
2670 log_error("Interface can't be the loopback interface (lo). Sorry.");
2675 return 1 /* work to do */;
2678 static int native_parse_argv(int argc
, char *argv
[]) {
2680 ARG_VERSION
= 0x100,
2683 ARG_SERVICE_ADDRESS
,
2690 static const struct option options
[] = {
2691 { "help", no_argument
, NULL
, 'h' },
2692 { "version", no_argument
, NULL
, ARG_VERSION
},
2693 { "type", required_argument
, NULL
, 't' },
2694 { "class", required_argument
, NULL
, 'c' },
2695 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2696 { "interface", required_argument
, NULL
, 'i' },
2697 { "protocol", required_argument
, NULL
, 'p' },
2698 { "cname", required_argument
, NULL
, ARG_CNAME
},
2699 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2700 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2701 { "raw", optional_argument
, NULL
, ARG_RAW
},
2702 { "search", required_argument
, NULL
, ARG_SEARCH
},
2703 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2712 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2717 return 0; /* done */;
2723 arg_family
= AF_INET
;
2727 arg_family
= AF_INET6
;
2731 r
= parse_ifindex_with_warn(optarg
);
2739 if (streq(optarg
, "help")) {
2744 r
= dns_type_from_string(optarg
);
2746 log_error("Failed to parse RR record type %s", optarg
);
2749 arg_type
= (uint16_t) r
;
2750 assert((int) arg_type
== r
);
2755 if (streq(optarg
, "help")) {
2760 r
= dns_class_from_string(optarg
);
2762 log_error("Failed to parse RR record class %s", optarg
);
2765 arg_class
= (uint16_t) r
;
2766 assert((int) arg_class
== r
);
2771 r
= parse_boolean(optarg
);
2773 return log_error_errno(r
, "Failed to parse --legend= argument");
2779 if (streq(optarg
, "help")) {
2780 help_protocol_types();
2782 } else if (streq(optarg
, "dns"))
2783 arg_flags
|= SD_RESOLVED_DNS
;
2784 else if (streq(optarg
, "llmnr"))
2785 arg_flags
|= SD_RESOLVED_LLMNR
;
2786 else if (streq(optarg
, "llmnr-ipv4"))
2787 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2788 else if (streq(optarg
, "llmnr-ipv6"))
2789 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2790 else if (streq(optarg
, "mdns"))
2791 arg_flags
|= SD_RESOLVED_MDNS
;
2792 else if (streq(optarg
, "mdns-ipv4"))
2793 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2794 else if (streq(optarg
, "mdns-ipv6"))
2795 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2797 log_error("Unknown protocol specifier: %s", optarg
);
2805 log_error("Refusing to write binary data to tty.");
2809 if (optarg
== NULL
|| streq(optarg
, "payload"))
2810 arg_raw
= RAW_PAYLOAD
;
2811 else if (streq(optarg
, "packet"))
2812 arg_raw
= RAW_PACKET
;
2814 log_error("Unknown --raw specifier \"%s\".", optarg
);
2822 r
= parse_boolean(optarg
);
2824 return log_error_errno(r
, "Failed to parse --cname= argument.");
2825 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2828 case ARG_SERVICE_ADDRESS
:
2829 r
= parse_boolean(optarg
);
2831 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2832 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2835 case ARG_SERVICE_TXT
:
2836 r
= parse_boolean(optarg
);
2838 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2839 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2843 r
= parse_boolean(optarg
);
2845 return log_error_errno(r
, "Failed to parse --search argument.");
2846 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2850 arg_no_pager
= true;
2857 assert_not_reached("Unhandled option");
2860 if (arg_type
== 0 && arg_class
!= 0) {
2861 log_error("--class= may only be used in conjunction with --type=.");
2865 if (arg_type
!= 0 && arg_class
== 0)
2866 arg_class
= DNS_CLASS_IN
;
2868 if (arg_class
!= 0 && arg_type
== 0)
2869 arg_type
= DNS_TYPE_A
;
2871 return 1 /* work to do */;
2874 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
2876 static const Verb verbs
[] = {
2877 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
2878 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
2879 { "query", 2, VERB_ANY
, 0, verb_query
},
2880 { "service", 2, 4, 0, verb_service
},
2881 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
2882 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
2883 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
2884 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
2885 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
2886 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
2887 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
2888 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
2889 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
2890 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
2891 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
2892 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
2893 { "revert", 2, 2, 0, verb_revert_link
},
2897 return dispatch_verb(argc
, argv
, verbs
, bus
);
2900 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
2905 assert(num_args
== 0 || args
);
2907 num
= !!single_arg
+ num_args
+ 1;
2909 p
= fake
= newa0(char *, num
+ 1);
2910 *p
++ = (char *) verb
;
2912 *p
++ = (char *) single_arg
;
2913 for (i
= 0; i
< num_args
; i
++)
2917 return native_main((int) num
, fake
, bus
);
2920 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
2924 case MODE_RESOLVE_HOST
:
2925 case MODE_RESOLVE_RECORD
:
2926 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
2928 case MODE_RESOLVE_SERVICE
:
2929 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
2931 case MODE_RESOLVE_OPENPGP
:
2932 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
2934 case MODE_RESOLVE_TLSA
:
2935 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
2937 case MODE_STATISTICS
:
2938 return translate("statistics", NULL
, 0, NULL
, bus
);
2940 case MODE_RESET_STATISTICS
:
2941 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
2943 case MODE_FLUSH_CACHES
:
2944 return translate("flush-caches", NULL
, 0, NULL
, bus
);
2946 case MODE_RESET_SERVER_FEATURES
:
2947 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
2950 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
2954 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
2959 if (arg_set_domain
) {
2960 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
2966 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
2971 if (arg_set_llmnr
) {
2972 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
2978 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
2983 if (arg_set_dnssec
) {
2984 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
2991 case MODE_REVERT_LINK
:
2992 return translate("revert", arg_ifname
, 0, NULL
, bus
);
2995 assert_not_reached("invalid mode");
3001 int main(int argc
, char **argv
) {
3005 setlocale(LC_ALL
, "");
3006 log_parse_environment();
3009 if (streq(program_invocation_short_name
, "resolvconf"))
3010 r
= resolvconf_parse_argv(argc
, argv
);
3011 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3012 r
= compat_parse_argv(argc
, argv
);
3014 r
= native_parse_argv(argc
, argv
);
3018 r
= sd_bus_open_system(&bus
);
3020 log_error_errno(r
, "sd_bus_open_system: %m");
3024 if (streq(program_invocation_short_name
, "systemd-resolve"))
3025 r
= compat_main(argc
, argv
, bus
);
3027 r
= native_main(argc
, argv
, bus
);
3030 /* make sure we terminate the bus connection first, and then close the
3031 * pager, see issue #3543 for the details. */
3032 sd_bus_flush_close_unref(bus
);
3035 strv_free(arg_set_dns
);
3036 strv_free(arg_set_domain
);
3037 strv_free(arg_set_nta
);
3039 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;