]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/libsystemd/sd-bus/busctl.c
basic/strv: add STRPTR_IN_SET
[thirdparty/systemd.git] / src / libsystemd / sd-bus / busctl.c
CommitLineData
de1c301e
LP
1/***
2 This file is part of systemd.
3
4 Copyright 2013 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18***/
19
1f849790
LP
20#include <getopt.h>
21
de1c301e 22#include "sd-bus.h"
3f6fd1ba 23
b5efdb8a 24#include "alloc-util.h"
2b5c5383 25#include "bus-dump.h"
3f6fd1ba 26#include "bus-internal.h"
781fa938 27#include "bus-signature.h"
79f34de9 28#include "bus-type.h"
3f6fd1ba 29#include "bus-util.h"
a1ad3767 30#include "busctl-introspect.h"
4f5dd394 31#include "escape.h"
3ffd4af2 32#include "fd-util.h"
8752c575 33#include "locale-util.h"
3f6fd1ba
LP
34#include "log.h"
35#include "pager.h"
6bedfcbb 36#include "parse-util.h"
3f6fd1ba
LP
37#include "path-util.h"
38#include "set.h"
39#include "strv.h"
288a74cc 40#include "terminal-util.h"
b1d4f8e1 41#include "user-util.h"
3f6fd1ba 42#include "util.h"
de1c301e 43
1f849790 44static bool arg_no_pager = false;
17d47d8d 45static bool arg_legend = true;
1f849790 46static char *arg_address = NULL;
56e61788
LP
47static bool arg_unique = false;
48static bool arg_acquired = false;
49static bool arg_activatable = false;
50static bool arg_show_machine = false;
1f849790 51static char **arg_matches = NULL;
d75edbd6
LP
52static BusTransport arg_transport = BUS_TRANSPORT_LOCAL;
53static char *arg_host = NULL;
54static bool arg_user = false;
1f70b087 55static size_t arg_snaplen = 4096;
d9130355 56static bool arg_list = false;
781fa938 57static bool arg_quiet = false;
1fc55609 58static bool arg_verbose = false;
38051578
LP
59static bool arg_expect_reply = true;
60static bool arg_auto_start = true;
61static bool arg_allow_interactive_authorization = true;
40ed1a45 62static bool arg_augment_creds = true;
a44b1081 63static usec_t arg_timeout = 0;
1f849790 64
1d58a1fe
LP
65#define NAME_IS_ACQUIRED INT_TO_PTR(1)
66#define NAME_IS_ACTIVATABLE INT_TO_PTR(2)
67
1f849790 68static int list_bus_names(sd_bus *bus, char **argv) {
71f2ab46 69 _cleanup_strv_free_ char **acquired = NULL, **activatable = NULL;
5e2f14e6
LP
70 _cleanup_free_ char **merged = NULL;
71 _cleanup_hashmap_free_ Hashmap *names = NULL;
de1c301e
LP
72 char **i;
73 int r;
89ffcd2a 74 size_t max_i = 0;
5e2f14e6
LP
75 unsigned n = 0;
76 void *v;
77 char *k;
78 Iterator iterator;
de1c301e 79
1f849790 80 assert(bus);
de1c301e 81
d9130355
LP
82 if (!arg_unique && !arg_acquired && !arg_activatable)
83 arg_unique = arg_acquired = arg_activatable = true;
84
56e61788 85 r = sd_bus_list_names(bus, (arg_acquired || arg_unique) ? &acquired : NULL, arg_activatable ? &activatable : NULL);
23bbb0de
MS
86 if (r < 0)
87 return log_error_errno(r, "Failed to list names: %m");
de1c301e 88
ea4b98e6 89 pager_open(arg_no_pager, false);
1f849790 90
d5099efc 91 names = hashmap_new(&string_hash_ops);
5e2f14e6
LP
92 if (!names)
93 return log_oom();
89ffcd2a 94
5e2f14e6 95 STRV_FOREACH(i, acquired) {
71f2ab46
LP
96 max_i = MAX(max_i, strlen(*i));
97
1d58a1fe 98 r = hashmap_put(names, *i, NAME_IS_ACQUIRED);
23bbb0de
MS
99 if (r < 0)
100 return log_error_errno(r, "Failed to add to hashmap: %m");
5e2f14e6
LP
101 }
102
103 STRV_FOREACH(i, activatable) {
89ffcd2a
LP
104 max_i = MAX(max_i, strlen(*i));
105
1d58a1fe 106 r = hashmap_put(names, *i, NAME_IS_ACTIVATABLE);
23bbb0de
MS
107 if (r < 0 && r != -EEXIST)
108 return log_error_errno(r, "Failed to add to hashmap: %m");
5e2f14e6
LP
109 }
110
111 merged = new(char*, hashmap_size(names) + 1);
112 HASHMAP_FOREACH_KEY(v, k, names, iterator)
113 merged[n++] = k;
114
115 merged[n] = NULL;
116 strv_sort(merged);
117
17d47d8d
TA
118 if (arg_legend) {
119 printf("%-*s %*s %-*s %-*s %-*s %-*s %-*s %-*s",
455971c1 120 (int) max_i, "NAME", 10, "PID", 15, "PROCESS", 16, "USER", 13, "CONNECTION", 25, "UNIT", 10, "SESSION", 19, "DESCRIPTION");
89ffcd2a 121
17d47d8d
TA
122 if (arg_show_machine)
123 puts(" MACHINE");
124 else
125 putchar('\n');
126 }
a4297f08 127
5e2f14e6 128 STRV_FOREACH(i, merged) {
4afd3348 129 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
5e2f14e6 130 sd_id128_t mid;
71f2ab46 131
1d58a1fe 132 if (hashmap_get(names, *i) == NAME_IS_ACTIVATABLE) {
5e2f14e6 133 /* Activatable */
71f2ab46 134
5e2f14e6 135 printf("%-*s", (int) max_i, *i);
56e61788
LP
136 printf(" - - - (activatable) - - ");
137 if (arg_show_machine)
5e2f14e6 138 puts(" -");
56e61788
LP
139 else
140 putchar('\n');
71f2ab46
LP
141 continue;
142
5e2f14e6 143 }
de1c301e 144
56e61788
LP
145 if (!arg_unique && (*i)[0] == ':')
146 continue;
147
148 if (!arg_acquired && (*i)[0] != ':')
1f849790 149 continue;
89ffcd2a
LP
150
151 printf("%-*s", (int) max_i, *i);
de1c301e 152
40ed1a45
LP
153 r = sd_bus_get_name_creds(
154 bus, *i,
155 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) |
05bae4a6 156 SD_BUS_CREDS_EUID|SD_BUS_CREDS_PID|SD_BUS_CREDS_COMM|
40ed1a45
LP
157 SD_BUS_CREDS_UNIQUE_NAME|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_SESSION|
158 SD_BUS_CREDS_DESCRIPTION, &creds);
89ffcd2a 159 if (r >= 0) {
14008e4e 160 const char *unique, *session, *unit, *cn;
5b12334d
LP
161 pid_t pid;
162 uid_t uid;
de1c301e 163
5b12334d
LP
164 r = sd_bus_creds_get_pid(creds, &pid);
165 if (r >= 0) {
166 const char *comm = NULL;
de1c301e 167
5b12334d 168 sd_bus_creds_get_comm(creds, &comm);
89ffcd2a 169
5b12334d
LP
170 printf(" %10lu %-15s", (unsigned long) pid, strna(comm));
171 } else
a4297f08 172 fputs(" - - ", stdout);
89ffcd2a 173
05bae4a6 174 r = sd_bus_creds_get_euid(creds, &uid);
5b12334d
LP
175 if (r >= 0) {
176 _cleanup_free_ char *u = NULL;
89ffcd2a 177
5b12334d
LP
178 u = uid_to_name(uid);
179 if (!u)
180 return log_oom();
89ffcd2a 181
5b12334d
LP
182 if (strlen(u) > 16)
183 u[16] = 0;
184
185 printf(" %-16s", u);
186 } else
a4297f08 187 fputs(" - ", stdout);
89ffcd2a 188
49b832c5
LP
189 r = sd_bus_creds_get_unique_name(creds, &unique);
190 if (r >= 0)
56e61788
LP
191 printf(" %-13s", unique);
192 else
193 fputs(" - ", stdout);
194
195 r = sd_bus_creds_get_unit(creds, &unit);
196 if (r >= 0) {
197 _cleanup_free_ char *e;
198
199 e = ellipsize(unit, 25, 100);
200 if (!e)
201 return log_oom();
202
203 printf(" %-25s", e);
204 } else
205 fputs(" - ", stdout);
206
207 r = sd_bus_creds_get_session(creds, &session);
208 if (r >= 0)
209 printf(" %-10s", session);
a4297f08 210 else
56e61788 211 fputs(" - ", stdout);
7b0b392f 212
455971c1 213 r = sd_bus_creds_get_description(creds, &cn);
14008e4e
LP
214 if (r >= 0)
215 printf(" %-19s", cn);
216 else
217 fputs(" - ", stdout);
218
7b0b392f 219 } else
14008e4e 220 printf(" - - - - - - - ");
a4297f08 221
56e61788 222 if (arg_show_machine) {
056f95d0 223 r = sd_bus_get_name_machine_id(bus, *i, &mid);
a4297f08
LP
224 if (r >= 0) {
225 char m[SD_ID128_STRING_MAX];
226 printf(" %s\n", sd_id128_to_string(mid, m));
227 } else
228 puts(" -");
56e61788
LP
229 } else
230 putchar('\n');
de1c301e
LP
231 }
232
1f849790
LP
233 return 0;
234}
235
d9130355
LP
236static void print_subtree(const char *prefix, const char *path, char **l) {
237 const char *vertical, *space;
238 char **n;
239
240 /* We assume the list is sorted. Let's first skip over the
241 * entry we are looking at. */
242 for (;;) {
243 if (!*l)
244 return;
245
246 if (!streq(*l, path))
247 break;
248
249 l++;
250 }
251
323b7dc9
ZJS
252 vertical = strjoina(prefix, special_glyph(TREE_VERTICAL));
253 space = strjoina(prefix, special_glyph(TREE_SPACE));
d9130355
LP
254
255 for (;;) {
256 bool has_more = false;
257
258 if (!*l || !path_startswith(*l, path))
259 break;
260
261 n = l + 1;
262 for (;;) {
263 if (!*n || !path_startswith(*n, path))
264 break;
265
266 if (!path_startswith(*n, *l)) {
267 has_more = true;
268 break;
269 }
270
271 n++;
272 }
273
323b7dc9 274 printf("%s%s%s\n", prefix, special_glyph(has_more ? TREE_BRANCH : TREE_RIGHT), *l);
d9130355
LP
275
276 print_subtree(has_more ? vertical : space, *l, l);
277 l = n;
278 }
279}
280
281static void print_tree(const char *prefix, char **l) {
282
ea4b98e6 283 pager_open(arg_no_pager, false);
d9130355
LP
284
285 prefix = strempty(prefix);
286
287 if (arg_list) {
288 char **i;
289
290 STRV_FOREACH(i, l)
291 printf("%s%s\n", prefix, *i);
292 return;
293 }
294
56c8b52d
LP
295 if (strv_isempty(l)) {
296 printf("No objects discovered.\n");
297 return;
298 }
299
300 if (streq(l[0], "/") && !l[1]) {
301 printf("Only root object discovered.\n");
302 return;
303 }
d9130355
LP
304
305 print_subtree(prefix, "/", l);
306}
307
a1ad3767
LP
308static int on_path(const char *path, void *userdata) {
309 Set *paths = userdata;
d9130355
LP
310 int r;
311
a1ad3767 312 assert(paths);
d9130355 313
a1ad3767
LP
314 r = set_put_strdup(paths, path);
315 if (r < 0)
316 return log_oom();
d9130355 317
a1ad3767 318 return 0;
d9130355
LP
319}
320
73fc23c0 321static int find_nodes(sd_bus *bus, const char *service, const char *path, Set *paths, bool many) {
0171da06 322 static const XMLIntrospectOps ops = {
a1ad3767
LP
323 .on_path = on_path,
324 };
325
4afd3348
LP
326 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
327 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
a1ad3767 328 const char *xml;
d9130355
LP
329 int r;
330
331 r = sd_bus_call_method(bus, service, path, "org.freedesktop.DBus.Introspectable", "Introspect", &error, &reply, "");
332 if (r < 0) {
73fc23c0
LP
333 if (many)
334 printf("Failed to introspect object %s of service %s: %s\n", path, service, bus_error_message(&error, r));
335 else
336 log_error("Failed to introspect object %s of service %s: %s", path, service, bus_error_message(&error, r));
d9130355
LP
337 return r;
338 }
339
340 r = sd_bus_message_read(reply, "s", &xml);
341 if (r < 0)
342 return bus_log_parse_error(r);
343
a1ad3767 344 return parse_xml_introspect(path, xml, &ops, paths);
d9130355
LP
345}
346
73fc23c0 347static int tree_one(sd_bus *bus, const char *service, const char *prefix, bool many) {
d9130355
LP
348 _cleanup_set_free_free_ Set *paths = NULL, *done = NULL, *failed = NULL;
349 _cleanup_free_ char **l = NULL;
350 char *m;
351 int r;
352
353 paths = set_new(&string_hash_ops);
354 if (!paths)
355 return log_oom();
356
357 done = set_new(&string_hash_ops);
358 if (!done)
359 return log_oom();
360
361 failed = set_new(&string_hash_ops);
362 if (!failed)
363 return log_oom();
364
365 m = strdup("/");
366 if (!m)
367 return log_oom();
368
369 r = set_put(paths, m);
370 if (r < 0) {
371 free(m);
372 return log_oom();
373 }
374
375 for (;;) {
376 _cleanup_free_ char *p = NULL;
377 int q;
378
379 p = set_steal_first(paths);
380 if (!p)
381 break;
382
383 if (set_contains(done, p) ||
384 set_contains(failed, p))
385 continue;
386
73fc23c0 387 q = find_nodes(bus, service, p, paths, many);
d9130355
LP
388 if (q < 0) {
389 if (r >= 0)
390 r = q;
391
392 q = set_put(failed, p);
393 } else
394 q = set_put(done, p);
395
396 if (q < 0)
397 return log_oom();
398
399 assert(q != 0);
400 p = NULL;
401 }
402
ea4b98e6 403 pager_open(arg_no_pager, false);
73fc23c0 404
d9130355
LP
405 l = set_get_strv(done);
406 if (!l)
407 return log_oom();
408
409 strv_sort(l);
410 print_tree(prefix, l);
411
412 fflush(stdout);
413
414 return r;
415}
416
417static int tree(sd_bus *bus, char **argv) {
418 char **i;
419 int r = 0;
420
421 if (!arg_unique && !arg_acquired)
422 arg_acquired = true;
423
424 if (strv_length(argv) <= 1) {
425 _cleanup_strv_free_ char **names = NULL;
56c8b52d 426 bool not_first = false;
d9130355
LP
427
428 r = sd_bus_list_names(bus, &names, NULL);
23bbb0de
MS
429 if (r < 0)
430 return log_error_errno(r, "Failed to get name list: %m");
d9130355 431
ea4b98e6 432 pager_open(arg_no_pager, false);
d9130355
LP
433
434 STRV_FOREACH(i, names) {
435 int q;
436
437 if (!arg_unique && (*i)[0] == ':')
438 continue;
439
440 if (!arg_acquired && (*i)[0] == ':')
441 continue;
442
443 if (not_first)
444 printf("\n");
445
1fc464f6 446 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
d9130355 447
73fc23c0 448 q = tree_one(bus, *i, NULL, true);
d9130355
LP
449 if (q < 0 && r >= 0)
450 r = q;
451
452 not_first = true;
453 }
454 } else {
d9130355
LP
455 STRV_FOREACH(i, argv+1) {
456 int q;
457
458 if (i > argv+1)
459 printf("\n");
460
73fc23c0 461 if (argv[2]) {
ea4b98e6 462 pager_open(arg_no_pager, false);
1fc464f6 463 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
73fc23c0 464 }
d9130355 465
73fc23c0 466 q = tree_one(bus, *i, NULL, !!argv[2]);
d9130355
LP
467 if (q < 0 && r >= 0)
468 r = q;
469 }
470 }
471
472 return r;
473}
474
1fc55609
LP
475static int format_cmdline(sd_bus_message *m, FILE *f, bool needs_space) {
476 int r;
477
478 for (;;) {
479 const char *contents = NULL;
480 char type;
481 union {
482 uint8_t u8;
483 uint16_t u16;
484 int16_t s16;
485 uint32_t u32;
486 int32_t s32;
487 uint64_t u64;
488 int64_t s64;
489 double d64;
490 const char *string;
491 int i;
492 } basic;
493
494 r = sd_bus_message_peek_type(m, &type, &contents);
317f2fc9 495 if (r < 0)
1fc55609 496 return r;
317f2fc9
LP
497 if (r == 0)
498 return needs_space;
1fc55609
LP
499
500 if (bus_type_is_container(type) > 0) {
501
502 r = sd_bus_message_enter_container(m, type, contents);
503 if (r < 0)
504 return r;
505
506 if (type == SD_BUS_TYPE_ARRAY) {
507 unsigned n = 0;
508
509 /* count array entries */
510 for (;;) {
511
512 r = sd_bus_message_skip(m, contents);
513 if (r < 0)
514 return r;
515 if (r == 0)
516 break;
517
518 n++;
519 }
520
521 r = sd_bus_message_rewind(m, false);
522 if (r < 0)
523 return r;
524
525 if (needs_space)
526 fputc(' ', f);
527
528 fprintf(f, "%u", n);
317f2fc9
LP
529 needs_space = true;
530
1fc55609
LP
531 } else if (type == SD_BUS_TYPE_VARIANT) {
532
533 if (needs_space)
534 fputc(' ', f);
535
536 fprintf(f, "%s", contents);
317f2fc9 537 needs_space = true;
1fc55609
LP
538 }
539
317f2fc9 540 r = format_cmdline(m, f, needs_space);
1fc55609
LP
541 if (r < 0)
542 return r;
543
317f2fc9
LP
544 needs_space = r > 0;
545
1fc55609
LP
546 r = sd_bus_message_exit_container(m);
547 if (r < 0)
548 return r;
549
550 continue;
551 }
552
553 r = sd_bus_message_read_basic(m, type, &basic);
554 if (r < 0)
555 return r;
556
557 if (needs_space)
558 fputc(' ', f);
559
560 switch (type) {
561 case SD_BUS_TYPE_BYTE:
562 fprintf(f, "%u", basic.u8);
563 break;
564
565 case SD_BUS_TYPE_BOOLEAN:
566 fputs(true_false(basic.i), f);
567 break;
568
569 case SD_BUS_TYPE_INT16:
570 fprintf(f, "%i", basic.s16);
571 break;
572
573 case SD_BUS_TYPE_UINT16:
574 fprintf(f, "%u", basic.u16);
575 break;
576
577 case SD_BUS_TYPE_INT32:
578 fprintf(f, "%i", basic.s32);
579 break;
580
581 case SD_BUS_TYPE_UINT32:
582 fprintf(f, "%u", basic.u32);
583 break;
584
585 case SD_BUS_TYPE_INT64:
586 fprintf(f, "%" PRIi64, basic.s64);
587 break;
588
589 case SD_BUS_TYPE_UINT64:
590 fprintf(f, "%" PRIu64, basic.u64);
591 break;
592
593 case SD_BUS_TYPE_DOUBLE:
594 fprintf(f, "%g", basic.d64);
595 break;
596
597 case SD_BUS_TYPE_STRING:
598 case SD_BUS_TYPE_OBJECT_PATH:
599 case SD_BUS_TYPE_SIGNATURE: {
600 _cleanup_free_ char *b = NULL;
601
602 b = cescape(basic.string);
603 if (!b)
604 return -ENOMEM;
605
606 fprintf(f, "\"%s\"", b);
607 break;
608 }
609
610 case SD_BUS_TYPE_UNIX_FD:
611 fprintf(f, "%i", basic.i);
612 break;
613
614 default:
615 assert_not_reached("Unknown basic type.");
616 }
617
1ed24c61 618 needs_space = true;
1fc55609
LP
619 }
620}
621
0171da06
LP
622typedef struct Member {
623 const char *type;
624 char *interface;
625 char *name;
626 char *signature;
627 char *result;
1fc55609 628 char *value;
0171da06
LP
629 bool writable;
630 uint64_t flags;
631} Member;
632
b826ab58 633static void member_hash_func(const void *p, struct siphash *state) {
0171da06 634 const Member *m = p;
1e2527a6 635 uint64_t arity = 1;
0171da06
LP
636
637 assert(m);
638 assert(m->type);
639
b826ab58 640 string_hash_func(m->type, state);
0171da06 641
1e2527a6
TG
642 arity += !!m->name + !!m->interface;
643
644 uint64_hash_func(&arity, state);
645
0171da06 646 if (m->name)
b826ab58 647 string_hash_func(m->name, state);
0171da06
LP
648
649 if (m->interface)
b826ab58 650 string_hash_func(m->interface, state);
0171da06
LP
651}
652
653static int member_compare_func(const void *a, const void *b) {
654 const Member *x = a, *y = b;
655 int d;
656
657 assert(x);
658 assert(y);
659 assert(x->type);
660 assert(y->type);
661
c030a850
NK
662 d = strcmp_ptr(x->interface, y->interface);
663 if (d != 0)
664 return d;
0171da06
LP
665
666 d = strcmp(x->type, y->type);
667 if (d != 0)
668 return d;
669
c030a850 670 return strcmp_ptr(x->name, y->name);
0171da06
LP
671}
672
673static int member_compare_funcp(const void *a, const void *b) {
674 const Member *const * x = (const Member *const *) a, * const *y = (const Member *const *) b;
675
676 return member_compare_func(*x, *y);
677}
678
679static void member_free(Member *m) {
680 if (!m)
681 return;
682
683 free(m->interface);
684 free(m->name);
685 free(m->signature);
686 free(m->result);
1fc55609 687 free(m->value);
0171da06
LP
688 free(m);
689}
690
691DEFINE_TRIVIAL_CLEANUP_FUNC(Member*, member_free);
692
693static void member_set_free(Set *s) {
694 Member *m;
695
696 while ((m = set_steal_first(s)))
697 member_free(m);
698
699 set_free(s);
700}
701
702DEFINE_TRIVIAL_CLEANUP_FUNC(Set*, member_set_free);
703
704static int on_interface(const char *interface, uint64_t flags, void *userdata) {
705 _cleanup_(member_freep) Member *m;
706 Set *members = userdata;
707 int r;
708
709 assert(interface);
710 assert(members);
711
712 m = new0(Member, 1);
713 if (!m)
714 return log_oom();
715
716 m->type = "interface";
717 m->flags = flags;
718
719 r = free_and_strdup(&m->interface, interface);
720 if (r < 0)
721 return log_oom();
722
723 r = set_put(members, m);
724 if (r <= 0) {
725 log_error("Duplicate interface");
726 return -EINVAL;
727 }
728
729 m = NULL;
730 return 0;
731}
732
733static int on_method(const char *interface, const char *name, const char *signature, const char *result, uint64_t flags, void *userdata) {
734 _cleanup_(member_freep) Member *m;
735 Set *members = userdata;
736 int r;
737
738 assert(interface);
739 assert(name);
740
741 m = new0(Member, 1);
742 if (!m)
743 return log_oom();
744
745 m->type = "method";
746 m->flags = flags;
747
748 r = free_and_strdup(&m->interface, interface);
749 if (r < 0)
750 return log_oom();
751
752 r = free_and_strdup(&m->name, name);
753 if (r < 0)
754 return log_oom();
755
756 r = free_and_strdup(&m->signature, signature);
757 if (r < 0)
758 return log_oom();
759
760 r = free_and_strdup(&m->result, result);
761 if (r < 0)
762 return log_oom();
763
764 r = set_put(members, m);
765 if (r <= 0) {
766 log_error("Duplicate method");
767 return -EINVAL;
768 }
769
770 m = NULL;
771 return 0;
772}
773
774static int on_signal(const char *interface, const char *name, const char *signature, uint64_t flags, void *userdata) {
775 _cleanup_(member_freep) Member *m;
776 Set *members = userdata;
777 int r;
778
779 assert(interface);
780 assert(name);
781
782 m = new0(Member, 1);
783 if (!m)
784 return log_oom();
785
786 m->type = "signal";
787 m->flags = flags;
788
789 r = free_and_strdup(&m->interface, interface);
790 if (r < 0)
791 return log_oom();
792
793 r = free_and_strdup(&m->name, name);
794 if (r < 0)
795 return log_oom();
796
797 r = free_and_strdup(&m->signature, signature);
798 if (r < 0)
799 return log_oom();
800
801 r = set_put(members, m);
802 if (r <= 0) {
803 log_error("Duplicate signal");
804 return -EINVAL;
805 }
806
807 m = NULL;
808 return 0;
809}
810
811static int on_property(const char *interface, const char *name, const char *signature, bool writable, uint64_t flags, void *userdata) {
812 _cleanup_(member_freep) Member *m;
813 Set *members = userdata;
814 int r;
815
816 assert(interface);
817 assert(name);
818
819 m = new0(Member, 1);
820 if (!m)
821 return log_oom();
822
823 m->type = "property";
824 m->flags = flags;
825 m->writable = writable;
826
827 r = free_and_strdup(&m->interface, interface);
828 if (r < 0)
829 return log_oom();
830
831 r = free_and_strdup(&m->name, name);
832 if (r < 0)
833 return log_oom();
834
835 r = free_and_strdup(&m->signature, signature);
836 if (r < 0)
837 return log_oom();
838
839 r = set_put(members, m);
840 if (r <= 0) {
841 log_error("Duplicate property");
842 return -EINVAL;
843 }
844
845 m = NULL;
846 return 0;
847}
848
849static const char *strdash(const char *x) {
850 return isempty(x) ? "-" : x;
851}
852
853static int introspect(sd_bus *bus, char **argv) {
854 static const struct hash_ops member_hash_ops = {
855 .hash = member_hash_func,
856 .compare = member_compare_func,
857 };
858
859 static const XMLIntrospectOps ops = {
860 .on_interface = on_interface,
861 .on_method = on_method,
862 .on_signal = on_signal,
863 .on_property = on_property,
864 };
865
4afd3348
LP
866 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
867 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
0171da06
LP
868 _cleanup_(member_set_freep) Set *members = NULL;
869 Iterator i;
870 Member *m;
871 const char *xml;
872 int r;
873 unsigned name_width, type_width, signature_width, result_width;
874 Member **sorted = NULL;
4f44c03e 875 unsigned k = 0, j, n_args;
0171da06 876
4f44c03e
LP
877 n_args = strv_length(argv);
878 if (n_args < 3) {
0171da06
LP
879 log_error("Requires service and object path argument.");
880 return -EINVAL;
881 }
882
4f44c03e
LP
883 if (n_args > 4) {
884 log_error("Too many arguments.");
885 return -EINVAL;
886 }
887
0171da06
LP
888 members = set_new(&member_hash_ops);
889 if (!members)
890 return log_oom();
891
892 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Introspectable", "Introspect", &error, &reply, "");
893 if (r < 0) {
894 log_error("Failed to introspect object %s of service %s: %s", argv[2], argv[1], bus_error_message(&error, r));
895 return r;
896 }
897
898 r = sd_bus_message_read(reply, "s", &xml);
899 if (r < 0)
900 return bus_log_parse_error(r);
901
1fc55609 902 /* First, get list of all properties */
0171da06
LP
903 r = parse_xml_introspect(argv[2], xml, &ops, members);
904 if (r < 0)
905 return r;
906
1fc55609
LP
907 /* Second, find the current values for them */
908 SET_FOREACH(m, members, i) {
909
910 if (!streq(m->type, "property"))
911 continue;
912
913 if (m->value)
914 continue;
915
4f44c03e
LP
916 if (argv[3] && !streq(argv[3], m->interface))
917 continue;
918
1fc55609
LP
919 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Properties", "GetAll", &error, &reply, "s", m->interface);
920 if (r < 0) {
921 log_error("%s", bus_error_message(&error, r));
922 return r;
923 }
924
925 r = sd_bus_message_enter_container(reply, 'a', "{sv}");
926 if (r < 0)
927 return bus_log_parse_error(r);
928
929 for (;;) {
930 Member *z;
931 _cleanup_free_ char *buf = NULL;
932 _cleanup_fclose_ FILE *mf = NULL;
933 size_t sz = 0;
934 const char *name;
935
936 r = sd_bus_message_enter_container(reply, 'e', "sv");
937 if (r < 0)
938 return bus_log_parse_error(r);
939
940 if (r == 0)
941 break;
942
943 r = sd_bus_message_read(reply, "s", &name);
944 if (r < 0)
945 return bus_log_parse_error(r);
946
947 r = sd_bus_message_enter_container(reply, 'v', NULL);
948 if (r < 0)
949 return bus_log_parse_error(r);
950
951 mf = open_memstream(&buf, &sz);
952 if (!mf)
953 return log_oom();
954
955 r = format_cmdline(reply, mf, false);
956 if (r < 0)
957 return bus_log_parse_error(r);
958
959 fclose(mf);
960 mf = NULL;
961
962 z = set_get(members, &((Member) {
963 .type = "property",
964 .interface = m->interface,
965 .name = (char*) name }));
966 if (z) {
967 free(z->value);
968 z->value = buf;
969 buf = NULL;
970 }
971
972 r = sd_bus_message_exit_container(reply);
973 if (r < 0)
974 return bus_log_parse_error(r);
975
976 r = sd_bus_message_exit_container(reply);
977 if (r < 0)
978 return bus_log_parse_error(r);
979 }
980
981 r = sd_bus_message_exit_container(reply);
982 if (r < 0)
983 return bus_log_parse_error(r);
984 }
985
ea4b98e6 986 pager_open(arg_no_pager, false);
0171da06
LP
987
988 name_width = strlen("NAME");
989 type_width = strlen("TYPE");
990 signature_width = strlen("SIGNATURE");
1fc55609 991 result_width = strlen("RESULT/VALUE");
0171da06
LP
992
993 sorted = newa(Member*, set_size(members));
994
995 SET_FOREACH(m, members, i) {
4f44c03e
LP
996
997 if (argv[3] && !streq(argv[3], m->interface))
998 continue;
999
0171da06
LP
1000 if (m->interface)
1001 name_width = MAX(name_width, strlen(m->interface));
1002 if (m->name)
1003 name_width = MAX(name_width, strlen(m->name) + 1);
1004 if (m->type)
1005 type_width = MAX(type_width, strlen(m->type));
1006 if (m->signature)
1007 signature_width = MAX(signature_width, strlen(m->signature));
1008 if (m->result)
1009 result_width = MAX(result_width, strlen(m->result));
1fc55609
LP
1010 if (m->value)
1011 result_width = MAX(result_width, strlen(m->value));
0171da06
LP
1012
1013 sorted[k++] = m;
1014 }
1015
1fc55609
LP
1016 if (result_width > 40)
1017 result_width = 40;
1018
0171da06
LP
1019 qsort(sorted, k, sizeof(Member*), member_compare_funcp);
1020
1fc55609
LP
1021 if (arg_legend) {
1022 printf("%-*s %-*s %-*s %-*s %s\n",
1023 (int) name_width, "NAME",
1024 (int) type_width, "TYPE",
1025 (int) signature_width, "SIGNATURE",
1026 (int) result_width, "RESULT/VALUE",
1027 "FLAGS");
1028 }
0171da06
LP
1029
1030 for (j = 0; j < k; j++) {
1fc55609
LP
1031 _cleanup_free_ char *ellipsized = NULL;
1032 const char *rv;
0171da06
LP
1033 bool is_interface;
1034
1035 m = sorted[j];
1036
4f44c03e
LP
1037 if (argv[3] && !streq(argv[3], m->interface))
1038 continue;
1039
0171da06
LP
1040 is_interface = streq(m->type, "interface");
1041
4f44c03e
LP
1042 if (argv[3] && is_interface)
1043 continue;
1044
1fc55609
LP
1045 if (m->value) {
1046 ellipsized = ellipsize(m->value, result_width, 100);
1047 if (!ellipsized)
1048 return log_oom();
1049
1050 rv = ellipsized;
1051 } else
1052 rv = strdash(m->result);
1053
0171da06
LP
1054 printf("%s%s%-*s%s %-*s %-*s %-*s%s%s%s%s%s%s\n",
1055 is_interface ? ansi_highlight() : "",
1056 is_interface ? "" : ".",
1057 - !is_interface + (int) name_width, strdash(streq_ptr(m->type, "interface") ? m->interface : m->name),
1fc464f6 1058 is_interface ? ansi_normal() : "",
0171da06
LP
1059 (int) type_width, strdash(m->type),
1060 (int) signature_width, strdash(m->signature),
1fc55609 1061 (int) result_width, rv,
0171da06
LP
1062 (m->flags & SD_BUS_VTABLE_DEPRECATED) ? " deprecated" : (m->flags || m->writable ? "" : " -"),
1063 (m->flags & SD_BUS_VTABLE_METHOD_NO_REPLY) ? " no-reply" : "",
1064 (m->flags & SD_BUS_VTABLE_PROPERTY_CONST) ? " const" : "",
1065 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE) ? " emits-change" : "",
1066 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION) ? " emits-invalidation" : "",
1067 m->writable ? " writable" : "");
1068 }
1069
1070 return 0;
1071}
1072
1f70b087 1073static int message_dump(sd_bus_message *m, FILE *f) {
d55192ad 1074 return bus_message_dump(m, f, BUS_MESSAGE_DUMP_WITH_HEADER);
1f70b087
LP
1075}
1076
1077static int message_pcap(sd_bus_message *m, FILE *f) {
1078 return bus_message_pcap_frame(m, arg_snaplen, f);
1079}
1080
1081static int monitor(sd_bus *bus, char *argv[], int (*dump)(sd_bus_message *m, FILE *f)) {
17fd7460
LU
1082 _cleanup_(sd_bus_message_unrefp) sd_bus_message *message = NULL;
1083 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1f849790 1084 char **i;
17fd7460 1085 uint32_t flags = 0;
1f849790
LP
1086 int r;
1087
17fd7460
LU
1088 /* upgrade connection; it's not used for anything else after this call */
1089 r = sd_bus_message_new_method_call(bus, &message, "org.freedesktop.DBus", "/org/freedesktop/DBus", "org.freedesktop.DBus.Monitoring", "BecomeMonitor");
1090 if (r < 0)
1091 return bus_log_create_error(r);
1092
1093 r = sd_bus_message_open_container(message, 'a', "s");
1094 if (r < 0)
1095 return bus_log_create_error(r);
1096
1f849790
LP
1097 STRV_FOREACH(i, argv+1) {
1098 _cleanup_free_ char *m = NULL;
1099
1100 if (!service_name_is_valid(*i)) {
1101 log_error("Invalid service name '%s'", *i);
1102 return -EINVAL;
1103 }
1104
1105 m = strjoin("sender='", *i, "'", NULL);
1106 if (!m)
1107 return log_oom();
1108
17fd7460 1109 r = sd_bus_message_append_basic(message, 's', m);
23bbb0de 1110 if (r < 0)
17fd7460 1111 return bus_log_create_error(r);
b51f299a 1112
f6d1e6cb
LU
1113 free(m);
1114 m = strjoin("destination='", *i, "'", NULL);
1115 if (!m)
1116 return log_oom();
1117
17fd7460 1118 r = sd_bus_message_append_basic(message, 's', m);
f6d1e6cb 1119 if (r < 0)
17fd7460 1120 return bus_log_create_error(r);
1f849790
LP
1121 }
1122
1123 STRV_FOREACH(i, arg_matches) {
17fd7460 1124 r = sd_bus_message_append_basic(message, 's', *i);
23bbb0de 1125 if (r < 0)
17fd7460 1126 return bus_log_create_error(r);
b51f299a
LP
1127 }
1128
17fd7460
LU
1129 r = sd_bus_message_close_container(message);
1130 if (r < 0)
1131 return bus_log_create_error(r);
1132
1133 r = sd_bus_message_append_basic(message, 'u', &flags);
1134 if (r < 0)
1135 return bus_log_create_error(r);
1136
1137 r = sd_bus_call(bus, message, arg_timeout, &error, NULL);
1138 if (r < 0) {
1139 log_error("%s", bus_error_message(&error, r));
1140 return r;
1f849790
LP
1141 }
1142
92d66625
LP
1143 log_info("Monitoring bus message stream.");
1144
1f849790 1145 for (;;) {
4afd3348 1146 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
1f849790
LP
1147
1148 r = sd_bus_process(bus, &m);
23bbb0de
MS
1149 if (r < 0)
1150 return log_error_errno(r, "Failed to process bus: %m");
1f849790
LP
1151
1152 if (m) {
1f70b087 1153 dump(m, stdout);
1d44f758 1154 fflush(stdout);
92d66625
LP
1155
1156 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected") > 0) {
1157 log_info("Connection terminated, exiting.");
1158 return 0;
1159 }
1160
1f849790
LP
1161 continue;
1162 }
1163
1164 if (r > 0)
1165 continue;
1166
1167 r = sd_bus_wait(bus, (uint64_t) -1);
23bbb0de
MS
1168 if (r < 0)
1169 return log_error_errno(r, "Failed to wait for bus: %m");
1f849790 1170 }
95c4fe82 1171}
1f849790 1172
1f70b087
LP
1173static int capture(sd_bus *bus, char *argv[]) {
1174 int r;
1175
1176 if (isatty(fileno(stdout)) > 0) {
1177 log_error("Refusing to write message data to console, please redirect output to a file.");
1178 return -EINVAL;
1179 }
1180
1181 bus_pcap_header(arg_snaplen, stdout);
1182
1183 r = monitor(bus, argv, message_pcap);
1184 if (r < 0)
1185 return r;
1186
1187 if (ferror(stdout)) {
1188 log_error("Couldn't write capture file.");
1189 return -EIO;
1190 }
1191
1192 return r;
1193}
1194
95c4fe82 1195static int status(sd_bus *bus, char *argv[]) {
4afd3348 1196 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
95c4fe82
LP
1197 pid_t pid;
1198 int r;
1199
1200 assert(bus);
1201
2e9efd22
LP
1202 if (strv_length(argv) > 2) {
1203 log_error("Expects no or one argument.");
95c4fe82
LP
1204 return -EINVAL;
1205 }
1206
2e9efd22
LP
1207 if (argv[1]) {
1208 r = parse_pid(argv[1], &pid);
1209 if (r < 0)
1210 r = sd_bus_get_name_creds(
1211 bus,
1212 argv[1],
1213 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1214 &creds);
1215 else
1216 r = sd_bus_creds_new_from_pid(
1217 &creds,
1218 pid,
1219 _SD_BUS_CREDS_ALL);
3acc1daf 1220 } else {
5b820358 1221 const char *scope, *address;
5c302692 1222 sd_id128_t bus_id;
3acc1daf 1223
5b820358
LP
1224 r = sd_bus_get_address(bus, &address);
1225 if (r >= 0)
1fc464f6 1226 printf("BusAddress=%s%s%s\n", ansi_highlight(), address, ansi_normal());
5b820358 1227
3acc1daf
LP
1228 r = sd_bus_get_scope(bus, &scope);
1229 if (r >= 0)
1fc464f6 1230 printf("BusScope=%s%s%s\n", ansi_highlight(), scope, ansi_normal());
3acc1daf 1231
5c302692
LP
1232 r = sd_bus_get_bus_id(bus, &bus_id);
1233 if (r >= 0)
1fc464f6 1234 printf("BusID=%s" SD_ID128_FORMAT_STR "%s\n", ansi_highlight(), SD_ID128_FORMAT_VAL(bus_id), ansi_normal());
5c302692 1235
2e9efd22 1236 r = sd_bus_get_owner_creds(
40ed1a45 1237 bus,
40ed1a45
LP
1238 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1239 &creds);
3acc1daf 1240 }
95c4fe82 1241
23bbb0de
MS
1242 if (r < 0)
1243 return log_error_errno(r, "Failed to get credentials: %m");
95c4fe82 1244
d0b2babf 1245 bus_creds_dump(creds, NULL, false);
95c4fe82 1246 return 0;
1f849790
LP
1247}
1248
781fa938
LP
1249static int message_append_cmdline(sd_bus_message *m, const char *signature, char ***x) {
1250 char **p;
1251 int r;
1252
1253 assert(m);
1254 assert(signature);
1255 assert(x);
1256
1257 p = *x;
1258
1259 for (;;) {
1260 const char *v;
1261 char t;
1262
1263 t = *signature;
1264 v = *p;
1265
1266 if (t == 0)
1267 break;
1268 if (!v) {
1269 log_error("Too few parameters for signature.");
1270 return -EINVAL;
1271 }
1272
1273 signature++;
1274 p++;
1275
1276 switch (t) {
1277
1278 case SD_BUS_TYPE_BOOLEAN:
1279
1280 r = parse_boolean(v);
1281 if (r < 0) {
1282 log_error("Failed to parse as boolean: %s", v);
1283 return r;
1284 }
1285
1286 r = sd_bus_message_append_basic(m, t, &r);
1287 break;
1288
1289 case SD_BUS_TYPE_BYTE: {
1290 uint8_t z;
1291
1292 r = safe_atou8(v, &z);
1293 if (r < 0) {
1294 log_error("Failed to parse as byte (unsigned 8bit integer): %s", v);
1295 return r;
1296 }
1297
1298 r = sd_bus_message_append_basic(m, t, &z);
1299 break;
1300 }
1301
1302 case SD_BUS_TYPE_INT16: {
1303 int16_t z;
1304
1305 r = safe_atoi16(v, &z);
1306 if (r < 0) {
1307 log_error("Failed to parse as signed 16bit integer: %s", v);
1308 return r;
1309 }
1310
1311 r = sd_bus_message_append_basic(m, t, &z);
1312 break;
1313 }
1314
1315 case SD_BUS_TYPE_UINT16: {
1316 uint16_t z;
1317
1318 r = safe_atou16(v, &z);
1319 if (r < 0) {
1320 log_error("Failed to parse as unsigned 16bit integer: %s", v);
1321 return r;
1322 }
1323
1324 r = sd_bus_message_append_basic(m, t, &z);
1325 break;
1326 }
1327
1328 case SD_BUS_TYPE_INT32: {
1329 int32_t z;
1330
1331 r = safe_atoi32(v, &z);
1332 if (r < 0) {
1333 log_error("Failed to parse as signed 32bit integer: %s", v);
1334 return r;
1335 }
1336
1337 r = sd_bus_message_append_basic(m, t, &z);
1338 break;
1339 }
1340
1341 case SD_BUS_TYPE_UINT32: {
1342 uint32_t z;
1343
1344 r = safe_atou32(v, &z);
1345 if (r < 0) {
1346 log_error("Failed to parse as unsigned 32bit integer: %s", v);
1347 return r;
1348 }
1349
1350 r = sd_bus_message_append_basic(m, t, &z);
1351 break;
1352 }
1353
1354 case SD_BUS_TYPE_INT64: {
1355 int64_t z;
1356
1357 r = safe_atoi64(v, &z);
1358 if (r < 0) {
1359 log_error("Failed to parse as signed 64bit integer: %s", v);
1360 return r;
1361 }
1362
1363 r = sd_bus_message_append_basic(m, t, &z);
1364 break;
1365 }
1366
1367 case SD_BUS_TYPE_UINT64: {
1368 uint64_t z;
1369
1370 r = safe_atou64(v, &z);
1371 if (r < 0) {
1372 log_error("Failed to parse as unsigned 64bit integer: %s", v);
1373 return r;
1374 }
1375
1376 r = sd_bus_message_append_basic(m, t, &z);
1377 break;
1378 }
1379
1380
1381 case SD_BUS_TYPE_DOUBLE: {
1382 double z;
1383
1384 r = safe_atod(v, &z);
1385 if (r < 0) {
1386 log_error("Failed to parse as double precision floating point: %s", v);
1387 return r;
1388 }
1389
1390 r = sd_bus_message_append_basic(m, t, &z);
1391 break;
1392 }
1393
1394 case SD_BUS_TYPE_STRING:
1395 case SD_BUS_TYPE_OBJECT_PATH:
1396 case SD_BUS_TYPE_SIGNATURE:
1397
1398 r = sd_bus_message_append_basic(m, t, v);
1399 break;
1400
1401 case SD_BUS_TYPE_ARRAY: {
1402 uint32_t n;
1403 size_t k;
1404
1405 r = safe_atou32(v, &n);
1406 if (r < 0) {
1407 log_error("Failed to parse number of array entries: %s", v);
1408 return r;
1409 }
1410
1411 r = signature_element_length(signature, &k);
1412 if (r < 0) {
1413 log_error("Invalid array signature.");
1414 return r;
1415 }
1416
1417 {
1418 unsigned i;
1419 char s[k + 1];
1420 memcpy(s, signature, k);
1421 s[k] = 0;
1422
1423 r = sd_bus_message_open_container(m, SD_BUS_TYPE_ARRAY, s);
1424 if (r < 0)
1425 return bus_log_create_error(r);
1426
1427 for (i = 0; i < n; i++) {
1428 r = message_append_cmdline(m, s, &p);
1429 if (r < 0)
1430 return r;
1431 }
1432 }
1433
1434 signature += k;
1435
1436 r = sd_bus_message_close_container(m);
1437 break;
1438 }
1439
1440 case SD_BUS_TYPE_VARIANT:
1441 r = sd_bus_message_open_container(m, SD_BUS_TYPE_VARIANT, v);
1442 if (r < 0)
1443 return bus_log_create_error(r);
1444
1445 r = message_append_cmdline(m, v, &p);
1446 if (r < 0)
1447 return r;
1448
1449 r = sd_bus_message_close_container(m);
1450 break;
1451
1452 case SD_BUS_TYPE_STRUCT_BEGIN:
1453 case SD_BUS_TYPE_DICT_ENTRY_BEGIN: {
1454 size_t k;
1455
1456 signature--;
1457 p--;
1458
1459 r = signature_element_length(signature, &k);
1460 if (r < 0) {
1461 log_error("Invalid struct/dict entry signature.");
1462 return r;
1463 }
1464
1465 {
1466 char s[k-1];
1467 memcpy(s, signature + 1, k - 2);
1468 s[k - 2] = 0;
1469
1470 r = sd_bus_message_open_container(m, t == SD_BUS_TYPE_STRUCT_BEGIN ? SD_BUS_TYPE_STRUCT : SD_BUS_TYPE_DICT_ENTRY, s);
1471 if (r < 0)
1472 return bus_log_create_error(r);
1473
1474 r = message_append_cmdline(m, s, &p);
1475 if (r < 0)
1476 return r;
1477 }
1478
1479 signature += k;
1480
1481 r = sd_bus_message_close_container(m);
1482 break;
1483 }
1484
1485 case SD_BUS_TYPE_UNIX_FD:
1486 log_error("UNIX file descriptor not supported as type.");
1487 return -EINVAL;
1488
1489 default:
1490 log_error("Unknown signature type %c.", t);
1491 return -EINVAL;
1492 }
1493
1494 if (r < 0)
1495 return bus_log_create_error(r);
1496 }
1497
1498 *x = p;
1499 return 0;
1500}
1501
1502static int call(sd_bus *bus, char *argv[]) {
4afd3348
LP
1503 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1504 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL;
781fa938
LP
1505 int r;
1506
1507 assert(bus);
1508
1509 if (strv_length(argv) < 5) {
1510 log_error("Expects at least four arguments.");
1511 return -EINVAL;
1512 }
1513
1514 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], argv[3], argv[4]);
79f34de9
LP
1515 if (r < 0)
1516 return bus_log_create_error(r);
781fa938 1517
38051578
LP
1518 r = sd_bus_message_set_expect_reply(m, arg_expect_reply);
1519 if (r < 0)
1520 return bus_log_create_error(r);
1521
1522 r = sd_bus_message_set_auto_start(m, arg_auto_start);
1523 if (r < 0)
1524 return bus_log_create_error(r);
1525
1526 r = sd_bus_message_set_allow_interactive_authorization(m, arg_allow_interactive_authorization);
1527 if (r < 0)
1528 return bus_log_create_error(r);
1529
781fa938
LP
1530 if (!isempty(argv[5])) {
1531 char **p;
1532
1533 p = argv+6;
1534
1535 r = message_append_cmdline(m, argv[5], &p);
1536 if (r < 0)
1537 return r;
1538
1539 if (*p) {
1540 log_error("Too many parameters for signature.");
1541 return -EINVAL;
1542 }
1543 }
1544
38051578
LP
1545 if (!arg_expect_reply) {
1546 r = sd_bus_send(bus, m, NULL);
1547 if (r < 0) {
1548 log_error("Failed to send message.");
1549 return r;
1550 }
1551
1552 return 0;
1553 }
1554
a44b1081 1555 r = sd_bus_call(bus, m, arg_timeout, &error, &reply);
781fa938
LP
1556 if (r < 0) {
1557 log_error("%s", bus_error_message(&error, r));
1558 return r;
1559 }
1560
1561 r = sd_bus_message_is_empty(reply);
1562 if (r < 0)
1563 return bus_log_parse_error(r);
1fc55609 1564
781fa938 1565 if (r == 0 && !arg_quiet) {
1fc55609
LP
1566
1567 if (arg_verbose) {
ea4b98e6 1568 pager_open(arg_no_pager, false);
1fc55609
LP
1569
1570 r = bus_message_dump(reply, stdout, 0);
1571 if (r < 0)
1572 return r;
1573 } else {
1574
1575 fputs(sd_bus_message_get_signature(reply, true), stdout);
1576 fputc(' ', stdout);
1577
1578 r = format_cmdline(reply, stdout, false);
1579 if (r < 0)
1580 return bus_log_parse_error(r);
1581
1582 fputc('\n', stdout);
1583 }
d55192ad
LP
1584 }
1585
1586 return 0;
1587}
1588
1589static int get_property(sd_bus *bus, char *argv[]) {
4afd3348 1590 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
d55192ad 1591 unsigned n;
1fc55609 1592 char **i;
d55192ad
LP
1593 int r;
1594
1595 assert(bus);
1596
1597 n = strv_length(argv);
1fc55609
LP
1598 if (n < 5) {
1599 log_error("Expects at least four arguments.");
d55192ad
LP
1600 return -EINVAL;
1601 }
1602
1fc55609 1603 STRV_FOREACH(i, argv + 4) {
4afd3348 1604 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
1fc55609
LP
1605 const char *contents = NULL;
1606 char type;
d55192ad 1607
1fc55609 1608 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Properties", "Get", &error, &reply, "ss", argv[3], *i);
d55192ad
LP
1609 if (r < 0) {
1610 log_error("%s", bus_error_message(&error, r));
1611 return r;
1612 }
1613
1fc55609 1614 r = sd_bus_message_peek_type(reply, &type, &contents);
d55192ad
LP
1615 if (r < 0)
1616 return bus_log_parse_error(r);
1617
1fc55609
LP
1618 r = sd_bus_message_enter_container(reply, 'v', contents);
1619 if (r < 0)
1620 return bus_log_parse_error(r);
d55192ad 1621
1fc55609 1622 if (arg_verbose) {
ea4b98e6 1623 pager_open(arg_no_pager, false);
d55192ad 1624
1fc55609 1625 r = bus_message_dump(reply, stdout, BUS_MESSAGE_DUMP_SUBTREE_ONLY);
d55192ad 1626 if (r < 0)
1fc55609
LP
1627 return r;
1628 } else {
1629 fputs(contents, stdout);
1630 fputc(' ', stdout);
d55192ad 1631
1fc55609 1632 r = format_cmdline(reply, stdout, false);
d55192ad
LP
1633 if (r < 0)
1634 return bus_log_parse_error(r);
1635
1fc55609 1636 fputc('\n', stdout);
d55192ad
LP
1637 }
1638
1639 r = sd_bus_message_exit_container(reply);
1640 if (r < 0)
1641 return bus_log_parse_error(r);
1fc55609 1642 }
d55192ad 1643
1fc55609
LP
1644 return 0;
1645}
d55192ad 1646
1fc55609 1647static int set_property(sd_bus *bus, char *argv[]) {
4afd3348
LP
1648 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
1649 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1fc55609
LP
1650 unsigned n;
1651 char **p;
1652 int r;
d55192ad 1653
1fc55609 1654 assert(bus);
d55192ad 1655
1fc55609
LP
1656 n = strv_length(argv);
1657 if (n < 6) {
1658 log_error("Expects at least five arguments.");
1659 return -EINVAL;
1660 }
d55192ad 1661
1fc55609
LP
1662 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], "org.freedesktop.DBus.Properties", "Set");
1663 if (r < 0)
1664 return bus_log_create_error(r);
d55192ad 1665
1fc55609
LP
1666 r = sd_bus_message_append(m, "ss", argv[3], argv[4]);
1667 if (r < 0)
1668 return bus_log_create_error(r);
d55192ad 1669
1fc55609
LP
1670 r = sd_bus_message_open_container(m, 'v', argv[5]);
1671 if (r < 0)
1672 return bus_log_create_error(r);
1673
1674 p = argv+6;
1675 r = message_append_cmdline(m, argv[5], &p);
1676 if (r < 0)
1677 return r;
1678
1679 r = sd_bus_message_close_container(m);
1680 if (r < 0)
1681 return bus_log_create_error(r);
1682
1683 if (*p) {
1684 log_error("Too many parameters for signature.");
1685 return -EINVAL;
1686 }
1687
a44b1081 1688 r = sd_bus_call(bus, m, arg_timeout, &error, NULL);
1fc55609
LP
1689 if (r < 0) {
1690 log_error("%s", bus_error_message(&error, r));
1691 return r;
781fa938
LP
1692 }
1693
1694 return 0;
1695}
1696
1f849790 1697static int help(void) {
1f849790
LP
1698 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
1699 "Introspect the bus.\n\n"
d75edbd6
LP
1700 " -h --help Show this help\n"
1701 " --version Show package version\n"
a86a47ce 1702 " --no-pager Do not pipe output into a pager\n"
17d47d8d 1703 " --no-legend Do not show the headers and footers\n"
d75edbd6
LP
1704 " --system Connect to system bus\n"
1705 " --user Connect to user bus\n"
1706 " -H --host=[USER@]HOST Operate on remote host\n"
1707 " -M --machine=CONTAINER Operate on local container\n"
1708 " --address=ADDRESS Connect to bus specified by address\n"
56e61788
LP
1709 " --show-machine Show machine ID column in list\n"
1710 " --unique Only show unique names\n"
1711 " --acquired Only show acquired names\n"
1712 " --activatable Only show activatable names\n"
d9130355 1713 " --match=MATCH Only show matching messages\n"
d28ebe27 1714 " --size=SIZE Maximum length of captured packet\n"
781fa938 1715 " --list Don't show tree, but simple object path list\n"
1fc55609 1716 " --quiet Don't show method call reply\n"
38051578
LP
1717 " --verbose Show result values in long format\n"
1718 " --expect-reply=BOOL Expect a method call reply\n"
1719 " --auto-start=BOOL Auto-start destination service\n"
1720 " --allow-interactive-authorization=BOOL\n"
a44b1081 1721 " Allow interactive authorization for operation\n"
40ed1a45
LP
1722 " --timeout=SECS Maximum time to wait for method call completion\n"
1723 " --augment-creds=BOOL Extend credential data with data read from /proc/$PID\n\n"
1f849790 1724 "Commands:\n"
d75edbd6 1725 " list List bus names\n"
2e9efd22 1726 " status [SERVICE] Show bus service, process or bus owner credentials\n"
d94fe1f1 1727 " monitor [SERVICE...] Show bus traffic\n"
1f70b087 1728 " capture [SERVICE...] Capture bus traffic as pcap\n"
0171da06 1729 " tree [SERVICE...] Show object tree of service\n"
4f44c03e 1730 " introspect SERVICE OBJECT [INTERFACE]\n"
0171da06 1731 " call SERVICE OBJECT INTERFACE METHOD [SIGNATURE [ARGUMENT...]]\n"
781fa938 1732 " Call a method\n"
1fc55609 1733 " get-property SERVICE OBJECT INTERFACE PROPERTY...\n"
d55192ad 1734 " Get property value\n"
1fc55609
LP
1735 " set-property SERVICE OBJECT INTERFACE PROPERTY SIGNATURE ARGUMENT...\n"
1736 " Set property value\n"
601185b4
ZJS
1737 " help Show this help\n"
1738 , program_invocation_short_name);
1f849790
LP
1739
1740 return 0;
1741}
1742
1743static int parse_argv(int argc, char *argv[]) {
1744
1745 enum {
1746 ARG_VERSION = 0x100,
1747 ARG_NO_PAGER,
17d47d8d 1748 ARG_NO_LEGEND,
1f849790
LP
1749 ARG_SYSTEM,
1750 ARG_USER,
1751 ARG_ADDRESS,
1752 ARG_MATCH,
56e61788
LP
1753 ARG_SHOW_MACHINE,
1754 ARG_UNIQUE,
1755 ARG_ACQUIRED,
1f70b087
LP
1756 ARG_ACTIVATABLE,
1757 ARG_SIZE,
d9130355 1758 ARG_LIST,
1fc55609 1759 ARG_VERBOSE,
38051578
LP
1760 ARG_EXPECT_REPLY,
1761 ARG_AUTO_START,
1762 ARG_ALLOW_INTERACTIVE_AUTHORIZATION,
a44b1081 1763 ARG_TIMEOUT,
40ed1a45 1764 ARG_AUGMENT_CREDS,
1f849790
LP
1765 };
1766
1767 static const struct option options[] = {
56e61788
LP
1768 { "help", no_argument, NULL, 'h' },
1769 { "version", no_argument, NULL, ARG_VERSION },
1770 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
17d47d8d 1771 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
56e61788
LP
1772 { "system", no_argument, NULL, ARG_SYSTEM },
1773 { "user", no_argument, NULL, ARG_USER },
1774 { "address", required_argument, NULL, ARG_ADDRESS },
1775 { "show-machine", no_argument, NULL, ARG_SHOW_MACHINE },
1776 { "unique", no_argument, NULL, ARG_UNIQUE },
1777 { "acquired", no_argument, NULL, ARG_ACQUIRED },
1778 { "activatable", no_argument, NULL, ARG_ACTIVATABLE },
1779 { "match", required_argument, NULL, ARG_MATCH },
1780 { "host", required_argument, NULL, 'H' },
1781 { "machine", required_argument, NULL, 'M' },
1f70b087 1782 { "size", required_argument, NULL, ARG_SIZE },
d9130355 1783 { "list", no_argument, NULL, ARG_LIST },
781fa938 1784 { "quiet", no_argument, NULL, 'q' },
1fc55609 1785 { "verbose", no_argument, NULL, ARG_VERBOSE },
38051578
LP
1786 { "expect-reply", required_argument, NULL, ARG_EXPECT_REPLY },
1787 { "auto-start", required_argument, NULL, ARG_AUTO_START },
1788 { "allow-interactive-authorization", required_argument, NULL, ARG_ALLOW_INTERACTIVE_AUTHORIZATION },
a44b1081 1789 { "timeout", required_argument, NULL, ARG_TIMEOUT },
40ed1a45 1790 { "augment-creds",required_argument, NULL, ARG_AUGMENT_CREDS},
eb9da376 1791 {},
1f849790
LP
1792 };
1793
1f70b087 1794 int c, r;
1f849790
LP
1795
1796 assert(argc >= 0);
1797 assert(argv);
1798
781fa938 1799 while ((c = getopt_long(argc, argv, "hH:M:q", options, NULL)) >= 0)
1f849790
LP
1800
1801 switch (c) {
1802
1803 case 'h':
1804 return help();
1805
1806 case ARG_VERSION:
3f6fd1ba 1807 return version();
1f849790
LP
1808
1809 case ARG_NO_PAGER:
1810 arg_no_pager = true;
1811 break;
1812
17d47d8d
TA
1813 case ARG_NO_LEGEND:
1814 arg_legend = false;
1815 break;
1816
1f849790
LP
1817 case ARG_USER:
1818 arg_user = true;
1819 break;
1820
1821 case ARG_SYSTEM:
1822 arg_user = false;
1823 break;
1824
1825 case ARG_ADDRESS:
1826 arg_address = optarg;
1827 break;
1828
56e61788
LP
1829 case ARG_SHOW_MACHINE:
1830 arg_show_machine = true;
1831 break;
1832
1833 case ARG_UNIQUE:
1834 arg_unique = true;
1f849790
LP
1835 break;
1836
56e61788
LP
1837 case ARG_ACQUIRED:
1838 arg_acquired = true;
1839 break;
1840
1841 case ARG_ACTIVATABLE:
1842 arg_activatable = true;
a4297f08
LP
1843 break;
1844
1f849790
LP
1845 case ARG_MATCH:
1846 if (strv_extend(&arg_matches, optarg) < 0)
1847 return log_oom();
1848 break;
1849
1f70b087 1850 case ARG_SIZE: {
59f448cf 1851 uint64_t sz;
1f70b087 1852
59f448cf 1853 r = parse_size(optarg, 1024, &sz);
1f70b087
LP
1854 if (r < 0) {
1855 log_error("Failed to parse size: %s", optarg);
1856 return r;
1857 }
1858
59f448cf 1859 if ((uint64_t) (size_t) sz != sz) {
1f70b087
LP
1860 log_error("Size out of range.");
1861 return -E2BIG;
1862 }
1863
59f448cf 1864 arg_snaplen = (size_t) sz;
1f70b087
LP
1865 break;
1866 }
1867
d9130355
LP
1868 case ARG_LIST:
1869 arg_list = true;
1870 break;
1871
d75edbd6
LP
1872 case 'H':
1873 arg_transport = BUS_TRANSPORT_REMOTE;
1874 arg_host = optarg;
1875 break;
1876
1877 case 'M':
de33fc62 1878 arg_transport = BUS_TRANSPORT_MACHINE;
d75edbd6
LP
1879 arg_host = optarg;
1880 break;
1881
781fa938
LP
1882 case 'q':
1883 arg_quiet = true;
1884 break;
1885
1fc55609
LP
1886 case ARG_VERBOSE:
1887 arg_verbose = true;
1888 break;
1889
38051578
LP
1890 case ARG_EXPECT_REPLY:
1891 r = parse_boolean(optarg);
1892 if (r < 0) {
1893 log_error("Failed to parse --expect-reply= parameter.");
1894 return r;
1895 }
1896
1897 arg_expect_reply = !!r;
1898 break;
1899
1900
1901 case ARG_AUTO_START:
1902 r = parse_boolean(optarg);
1903 if (r < 0) {
1904 log_error("Failed to parse --auto-start= parameter.");
1905 return r;
1906 }
1907
1908 arg_auto_start = !!r;
1909 break;
1910
1911
1912 case ARG_ALLOW_INTERACTIVE_AUTHORIZATION:
1913 r = parse_boolean(optarg);
1914 if (r < 0) {
1915 log_error("Failed to parse --allow-interactive-authorization= parameter.");
1916 return r;
1917 }
1918
1919 arg_allow_interactive_authorization = !!r;
1920 break;
1921
a44b1081
LP
1922 case ARG_TIMEOUT:
1923 r = parse_sec(optarg, &arg_timeout);
1924 if (r < 0) {
1925 log_error("Failed to parse --timeout= parameter.");
1926 return r;
1927 }
1928
1929 break;
1930
40ed1a45
LP
1931 case ARG_AUGMENT_CREDS:
1932 r = parse_boolean(optarg);
1933 if (r < 0) {
1934 log_error("Failed to parse --augment-creds= parameter.");
1935 return r;
1936 }
1937
1938 arg_augment_creds = !!r;
1939 break;
1940
1f849790
LP
1941 case '?':
1942 return -EINVAL;
1943
1944 default:
eb9da376 1945 assert_not_reached("Unhandled option");
1f849790 1946 }
1f849790
LP
1947
1948 return 1;
1949}
1950
1951static int busctl_main(sd_bus *bus, int argc, char *argv[]) {
1952 assert(bus);
1953
1954 if (optind >= argc ||
1955 streq(argv[optind], "list"))
1956 return list_bus_names(bus, argv + optind);
1957
1958 if (streq(argv[optind], "monitor"))
1f70b087
LP
1959 return monitor(bus, argv + optind, message_dump);
1960
1961 if (streq(argv[optind], "capture"))
1962 return capture(bus, argv + optind);
1f849790 1963
95c4fe82
LP
1964 if (streq(argv[optind], "status"))
1965 return status(bus, argv + optind);
d9130355
LP
1966
1967 if (streq(argv[optind], "tree"))
1968 return tree(bus, argv + optind);
781fa938 1969
0171da06
LP
1970 if (streq(argv[optind], "introspect"))
1971 return introspect(bus, argv + optind);
1972
781fa938
LP
1973 if (streq(argv[optind], "call"))
1974 return call(bus, argv + optind);
d55192ad
LP
1975
1976 if (streq(argv[optind], "get-property"))
1977 return get_property(bus, argv + optind);
95c4fe82 1978
1fc55609
LP
1979 if (streq(argv[optind], "set-property"))
1980 return set_property(bus, argv + optind);
1981
1f849790
LP
1982 if (streq(argv[optind], "help"))
1983 return help();
1984
1985 log_error("Unknown command '%s'", argv[optind]);
1986 return -EINVAL;
1987}
1988
1989int main(int argc, char *argv[]) {
cf647b69 1990 sd_bus *bus = NULL;
1f849790
LP
1991 int r;
1992
1993 log_parse_environment();
1994 log_open();
1995
1996 r = parse_argv(argc, argv);
1997 if (r <= 0)
1998 goto finish;
1999
09365592
LP
2000 r = sd_bus_new(&bus);
2001 if (r < 0) {
da927ba9 2002 log_error_errno(r, "Failed to allocate bus: %m");
09365592
LP
2003 goto finish;
2004 }
2005
1f70b087
LP
2006 if (streq_ptr(argv[optind], "monitor") ||
2007 streq_ptr(argv[optind], "capture")) {
09365592
LP
2008
2009 r = sd_bus_set_monitor(bus, true);
1f849790 2010 if (r < 0) {
da927ba9 2011 log_error_errno(r, "Failed to set monitor mode: %m");
1f849790
LP
2012 goto finish;
2013 }
d0ce7734 2014
b5dae4c7 2015 r = sd_bus_negotiate_creds(bus, true, _SD_BUS_CREDS_ALL);
d0ce7734 2016 if (r < 0) {
da927ba9 2017 log_error_errno(r, "Failed to enable credentials: %m");
d0ce7734
LP
2018 goto finish;
2019 }
2020
2021 r = sd_bus_negotiate_timestamp(bus, true);
2022 if (r < 0) {
da927ba9 2023 log_error_errno(r, "Failed to enable timestamps: %m");
d0ce7734
LP
2024 goto finish;
2025 }
2026
2027 r = sd_bus_negotiate_fds(bus, true);
2028 if (r < 0) {
da927ba9 2029 log_error_errno(r, "Failed to enable fds: %m");
d0ce7734
LP
2030 goto finish;
2031 }
09365592 2032 }
1f849790 2033
8d87d4a9
DH
2034 r = sd_bus_set_bus_client(bus, true);
2035 if (r < 0) {
2036 log_error_errno(r, "Failed to set bus client: %m");
2037 goto finish;
2038 }
2039
09365592 2040 if (arg_address)
1f849790 2041 r = sd_bus_set_address(bus, arg_address);
09365592
LP
2042 else {
2043 switch (arg_transport) {
1f849790 2044
09365592 2045 case BUS_TRANSPORT_LOCAL:
3acc1daf
LP
2046 if (arg_user) {
2047 bus->is_user = true;
09365592 2048 r = bus_set_address_user(bus);
3acc1daf
LP
2049 } else {
2050 bus->is_system = true;
09365592 2051 r = bus_set_address_system(bus);
3acc1daf 2052 }
09365592
LP
2053 break;
2054
2055 case BUS_TRANSPORT_REMOTE:
2056 r = bus_set_address_system_remote(bus, arg_host);
2057 break;
2058
de33fc62
LP
2059 case BUS_TRANSPORT_MACHINE:
2060 r = bus_set_address_system_machine(bus, arg_host);
09365592
LP
2061 break;
2062
2063 default:
2064 assert_not_reached("Hmm, unknown transport type.");
1f849790 2065 }
09365592
LP
2066 }
2067 if (r < 0) {
da927ba9 2068 log_error_errno(r, "Failed to set address: %m");
09365592
LP
2069 goto finish;
2070 }
1f849790 2071
09365592 2072 r = sd_bus_start(bus);
1f849790 2073 if (r < 0) {
da927ba9 2074 log_error_errno(r, "Failed to connect to bus: %m");
1f849790
LP
2075 goto finish;
2076 }
2077
2078 r = busctl_main(bus, argc, argv);
2079
2080finish:
cf647b69 2081 sd_bus_flush_close_unref(bus);
1f849790 2082 pager_close();
d75edbd6 2083
1f849790 2084 strv_free(arg_matches);
de1c301e 2085
de1c301e
LP
2086 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
2087}