]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/busctl/busctl.c
Merge pull request #11827 from keszybz/pkgconfig-variables
[thirdparty/systemd.git] / src / busctl / busctl.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <getopt.h>
4 #include <stdio_ext.h>
5
6 #include "sd-bus.h"
7
8 #include "alloc-util.h"
9 #include "bus-dump.h"
10 #include "bus-internal.h"
11 #include "bus-message.h"
12 #include "bus-signature.h"
13 #include "bus-type.h"
14 #include "bus-util.h"
15 #include "busctl-introspect.h"
16 #include "escape.h"
17 #include "fd-util.h"
18 #include "fileio.h"
19 #include "json.h"
20 #include "locale-util.h"
21 #include "log.h"
22 #include "main-func.h"
23 #include "pager.h"
24 #include "parse-util.h"
25 #include "path-util.h"
26 #include "pretty-print.h"
27 #include "set.h"
28 #include "strv.h"
29 #include "terminal-util.h"
30 #include "user-util.h"
31 #include "util.h"
32 #include "verbs.h"
33
34 static enum {
35 JSON_OFF,
36 JSON_SHORT,
37 JSON_PRETTY,
38 } arg_json = JSON_OFF;
39 static PagerFlags arg_pager_flags = 0;
40 static bool arg_legend = true;
41 static const char *arg_address = NULL;
42 static bool arg_unique = false;
43 static bool arg_acquired = false;
44 static bool arg_activatable = false;
45 static bool arg_show_machine = false;
46 static char **arg_matches = NULL;
47 static BusTransport arg_transport = BUS_TRANSPORT_LOCAL;
48 static const char *arg_host = NULL;
49 static bool arg_user = false;
50 static size_t arg_snaplen = 4096;
51 static bool arg_list = false;
52 static bool arg_quiet = false;
53 static bool arg_verbose = false;
54 static bool arg_expect_reply = true;
55 static bool arg_auto_start = true;
56 static bool arg_allow_interactive_authorization = true;
57 static bool arg_augment_creds = true;
58 static bool arg_watch_bind = false;
59 static usec_t arg_timeout = 0;
60 static const char *arg_destination = NULL;
61
62 STATIC_DESTRUCTOR_REGISTER(arg_matches, strv_freep);
63
64 #define NAME_IS_ACQUIRED INT_TO_PTR(1)
65 #define NAME_IS_ACTIVATABLE INT_TO_PTR(2)
66
67 static int json_transform_message(sd_bus_message *m, JsonVariant **ret);
68 static void json_dump_with_flags(JsonVariant *v, FILE *f);
69
70 static int acquire_bus(bool set_monitor, sd_bus **ret) {
71 _cleanup_(sd_bus_close_unrefp) sd_bus *bus = NULL;
72 int r;
73
74 r = sd_bus_new(&bus);
75 if (r < 0)
76 return log_error_errno(r, "Failed to allocate bus: %m");
77
78 if (set_monitor) {
79 r = sd_bus_set_monitor(bus, true);
80 if (r < 0)
81 return log_error_errno(r, "Failed to set monitor mode: %m");
82
83 r = sd_bus_negotiate_creds(bus, true, _SD_BUS_CREDS_ALL);
84 if (r < 0)
85 return log_error_errno(r, "Failed to enable credentials: %m");
86
87 r = sd_bus_negotiate_timestamp(bus, true);
88 if (r < 0)
89 return log_error_errno(r, "Failed to enable timestamps: %m");
90
91 r = sd_bus_negotiate_fds(bus, true);
92 if (r < 0)
93 return log_error_errno(r, "Failed to enable fds: %m");
94 }
95
96 r = sd_bus_set_bus_client(bus, true);
97 if (r < 0)
98 return log_error_errno(r, "Failed to set bus client: %m");
99
100 r = sd_bus_set_watch_bind(bus, arg_watch_bind);
101 if (r < 0)
102 return log_error_errno(r, "Failed to set watch-bind setting to '%s': %m", yes_no(arg_watch_bind));
103
104 if (arg_address)
105 r = sd_bus_set_address(bus, arg_address);
106 else {
107 switch (arg_transport) {
108
109 case BUS_TRANSPORT_LOCAL:
110 if (arg_user) {
111 bus->is_user = true;
112 r = bus_set_address_user(bus);
113 } else {
114 bus->is_system = true;
115 r = bus_set_address_system(bus);
116 }
117 break;
118
119 case BUS_TRANSPORT_REMOTE:
120 r = bus_set_address_system_remote(bus, arg_host);
121 break;
122
123 case BUS_TRANSPORT_MACHINE:
124 r = bus_set_address_system_machine(bus, arg_host);
125 break;
126
127 default:
128 assert_not_reached("Hmm, unknown transport type.");
129 }
130 }
131 if (r < 0)
132 return log_error_errno(r, "Failed to set address: %m");
133
134 r = sd_bus_start(bus);
135 if (r < 0)
136 return log_error_errno(r, "Failed to connect to bus: %m");
137
138 *ret = TAKE_PTR(bus);
139
140 return 0;
141 }
142
143 static int list_bus_names(int argc, char **argv, void *userdata) {
144 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
145 _cleanup_strv_free_ char **acquired = NULL, **activatable = NULL;
146 _cleanup_free_ char **merged = NULL;
147 _cleanup_hashmap_free_ Hashmap *names = NULL;
148 char **i;
149 int r;
150 size_t max_i = 0;
151 unsigned n = 0;
152 void *v;
153 char *k;
154 Iterator iterator;
155
156 if (!arg_unique && !arg_acquired && !arg_activatable)
157 arg_unique = arg_acquired = arg_activatable = true;
158
159 r = acquire_bus(false, &bus);
160 if (r < 0)
161 return r;
162
163 r = sd_bus_list_names(bus, (arg_acquired || arg_unique) ? &acquired : NULL, arg_activatable ? &activatable : NULL);
164 if (r < 0)
165 return log_error_errno(r, "Failed to list names: %m");
166
167 (void) pager_open(arg_pager_flags);
168
169 names = hashmap_new(&string_hash_ops);
170 if (!names)
171 return log_oom();
172
173 STRV_FOREACH(i, acquired) {
174 max_i = MAX(max_i, strlen(*i));
175
176 r = hashmap_put(names, *i, NAME_IS_ACQUIRED);
177 if (r < 0)
178 return log_error_errno(r, "Failed to add to hashmap: %m");
179 }
180
181 STRV_FOREACH(i, activatable) {
182 max_i = MAX(max_i, strlen(*i));
183
184 r = hashmap_put(names, *i, NAME_IS_ACTIVATABLE);
185 if (r < 0 && r != -EEXIST)
186 return log_error_errno(r, "Failed to add to hashmap: %m");
187 }
188
189 merged = new(char*, hashmap_size(names) + 1);
190 if (!merged)
191 return log_oom();
192
193 HASHMAP_FOREACH_KEY(v, k, names, iterator)
194 merged[n++] = k;
195
196 merged[n] = NULL;
197 strv_sort(merged);
198
199 if (arg_legend) {
200 printf("%-*s %*s %-*s %-*s %-*s %-*s %-*s %-*s",
201 (int) max_i, "NAME", 10, "PID", 15, "PROCESS", 16, "USER", 13, "CONNECTION", 25, "UNIT", 10, "SESSION", 19, "DESCRIPTION");
202
203 if (arg_show_machine)
204 puts(" MACHINE");
205 else
206 putchar('\n');
207 }
208
209 STRV_FOREACH(i, merged) {
210 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
211 sd_id128_t mid;
212
213 if (hashmap_get(names, *i) == NAME_IS_ACTIVATABLE) {
214 /* Activatable */
215
216 printf("%-*s", (int) max_i, *i);
217 printf(" - - - (activatable) - - ");
218 if (arg_show_machine)
219 puts(" -");
220 else
221 putchar('\n');
222 continue;
223
224 }
225
226 if (!arg_unique && (*i)[0] == ':')
227 continue;
228
229 if (!arg_acquired && (*i)[0] != ':')
230 continue;
231
232 printf("%-*s", (int) max_i, *i);
233
234 r = sd_bus_get_name_creds(
235 bus, *i,
236 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) |
237 SD_BUS_CREDS_EUID|SD_BUS_CREDS_PID|SD_BUS_CREDS_COMM|
238 SD_BUS_CREDS_UNIQUE_NAME|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_SESSION|
239 SD_BUS_CREDS_DESCRIPTION, &creds);
240 if (r >= 0) {
241 const char *unique, *session, *unit, *cn;
242 pid_t pid;
243 uid_t uid;
244
245 r = sd_bus_creds_get_pid(creds, &pid);
246 if (r >= 0) {
247 const char *comm = NULL;
248
249 sd_bus_creds_get_comm(creds, &comm);
250
251 printf(" %10lu %-15s", (unsigned long) pid, strna(comm));
252 } else
253 fputs(" - - ", stdout);
254
255 r = sd_bus_creds_get_euid(creds, &uid);
256 if (r >= 0) {
257 _cleanup_free_ char *u = NULL;
258
259 u = uid_to_name(uid);
260 if (!u)
261 return log_oom();
262
263 if (strlen(u) > 16)
264 u[16] = 0;
265
266 printf(" %-16s", u);
267 } else
268 fputs(" - ", stdout);
269
270 r = sd_bus_creds_get_unique_name(creds, &unique);
271 if (r >= 0)
272 printf(" %-13s", unique);
273 else
274 fputs(" - ", stdout);
275
276 r = sd_bus_creds_get_unit(creds, &unit);
277 if (r >= 0) {
278 _cleanup_free_ char *e;
279
280 e = ellipsize(unit, 25, 100);
281 if (!e)
282 return log_oom();
283
284 printf(" %-25s", e);
285 } else
286 fputs(" - ", stdout);
287
288 r = sd_bus_creds_get_session(creds, &session);
289 if (r >= 0)
290 printf(" %-10s", session);
291 else
292 fputs(" - ", stdout);
293
294 r = sd_bus_creds_get_description(creds, &cn);
295 if (r >= 0)
296 printf(" %-19s", cn);
297 else
298 fputs(" - ", stdout);
299
300 } else
301 printf(" - - - - - - - ");
302
303 if (arg_show_machine) {
304 r = sd_bus_get_name_machine_id(bus, *i, &mid);
305 if (r >= 0) {
306 char m[SD_ID128_STRING_MAX];
307 printf(" %s\n", sd_id128_to_string(mid, m));
308 } else
309 puts(" -");
310 } else
311 putchar('\n');
312 }
313
314 return 0;
315 }
316
317 static void print_subtree(const char *prefix, const char *path, char **l) {
318 const char *vertical, *space;
319 char **n;
320
321 /* We assume the list is sorted. Let's first skip over the
322 * entry we are looking at. */
323 for (;;) {
324 if (!*l)
325 return;
326
327 if (!streq(*l, path))
328 break;
329
330 l++;
331 }
332
333 vertical = strjoina(prefix, special_glyph(SPECIAL_GLYPH_TREE_VERTICAL));
334 space = strjoina(prefix, special_glyph(SPECIAL_GLYPH_TREE_SPACE));
335
336 for (;;) {
337 bool has_more = false;
338
339 if (!*l || !path_startswith(*l, path))
340 break;
341
342 n = l + 1;
343 for (;;) {
344 if (!*n || !path_startswith(*n, path))
345 break;
346
347 if (!path_startswith(*n, *l)) {
348 has_more = true;
349 break;
350 }
351
352 n++;
353 }
354
355 printf("%s%s%s\n", prefix, special_glyph(has_more ? SPECIAL_GLYPH_TREE_BRANCH : SPECIAL_GLYPH_TREE_RIGHT), *l);
356
357 print_subtree(has_more ? vertical : space, *l, l);
358 l = n;
359 }
360 }
361
362 static void print_tree(const char *prefix, char **l) {
363
364 prefix = strempty(prefix);
365
366 if (arg_list) {
367 char **i;
368
369 STRV_FOREACH(i, l)
370 printf("%s%s\n", prefix, *i);
371 return;
372 }
373
374 if (strv_isempty(l)) {
375 printf("No objects discovered.\n");
376 return;
377 }
378
379 if (streq(l[0], "/") && !l[1]) {
380 printf("Only root object discovered.\n");
381 return;
382 }
383
384 print_subtree(prefix, "/", l);
385 }
386
387 static int on_path(const char *path, void *userdata) {
388 Set *paths = userdata;
389 int r;
390
391 assert(paths);
392
393 r = set_put_strdup(paths, path);
394 if (r < 0)
395 return log_oom();
396
397 return 0;
398 }
399
400 static int find_nodes(sd_bus *bus, const char *service, const char *path, Set *paths, bool many) {
401 static const XMLIntrospectOps ops = {
402 .on_path = on_path,
403 };
404
405 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
406 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
407 const char *xml;
408 int r;
409
410 r = sd_bus_call_method(bus, service, path, "org.freedesktop.DBus.Introspectable", "Introspect", &error, &reply, "");
411 if (r < 0) {
412 if (many)
413 printf("Failed to introspect object %s of service %s: %s\n", path, service, bus_error_message(&error, r));
414 else
415 log_error_errno(r, "Failed to introspect object %s of service %s: %s", path, service, bus_error_message(&error, r));
416 return r;
417 }
418
419 r = sd_bus_message_read(reply, "s", &xml);
420 if (r < 0)
421 return bus_log_parse_error(r);
422
423 return parse_xml_introspect(path, xml, &ops, paths);
424 }
425
426 static int tree_one(sd_bus *bus, const char *service, const char *prefix, bool many) {
427 _cleanup_set_free_free_ Set *paths = NULL, *done = NULL, *failed = NULL;
428 _cleanup_free_ char **l = NULL;
429 char *m;
430 int r;
431
432 paths = set_new(&string_hash_ops);
433 if (!paths)
434 return log_oom();
435
436 done = set_new(&string_hash_ops);
437 if (!done)
438 return log_oom();
439
440 failed = set_new(&string_hash_ops);
441 if (!failed)
442 return log_oom();
443
444 m = strdup("/");
445 if (!m)
446 return log_oom();
447
448 r = set_put(paths, m);
449 if (r < 0) {
450 free(m);
451 return log_oom();
452 }
453
454 for (;;) {
455 _cleanup_free_ char *p = NULL;
456 int q;
457
458 p = set_steal_first(paths);
459 if (!p)
460 break;
461
462 if (set_contains(done, p) ||
463 set_contains(failed, p))
464 continue;
465
466 q = find_nodes(bus, service, p, paths, many);
467 if (q < 0) {
468 if (r >= 0)
469 r = q;
470
471 q = set_put(failed, p);
472 } else
473 q = set_put(done, p);
474
475 if (q < 0)
476 return log_oom();
477
478 assert(q != 0);
479 p = NULL;
480 }
481
482 (void) pager_open(arg_pager_flags);
483
484 l = set_get_strv(done);
485 if (!l)
486 return log_oom();
487
488 strv_sort(l);
489 print_tree(prefix, l);
490
491 fflush(stdout);
492
493 return r;
494 }
495
496 static int tree(int argc, char **argv, void *userdata) {
497 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
498 char **i;
499 int r = 0;
500
501 if (!arg_unique && !arg_acquired)
502 arg_acquired = true;
503
504 r = acquire_bus(false, &bus);
505 if (r < 0)
506 return r;
507
508 if (argc <= 1) {
509 _cleanup_strv_free_ char **names = NULL;
510 bool not_first = false;
511
512 r = sd_bus_list_names(bus, &names, NULL);
513 if (r < 0)
514 return log_error_errno(r, "Failed to get name list: %m");
515
516 (void) pager_open(arg_pager_flags);
517
518 STRV_FOREACH(i, names) {
519 int q;
520
521 if (!arg_unique && (*i)[0] == ':')
522 continue;
523
524 if (!arg_acquired && (*i)[0] == ':')
525 continue;
526
527 if (not_first)
528 printf("\n");
529
530 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
531
532 q = tree_one(bus, *i, NULL, true);
533 if (q < 0 && r >= 0)
534 r = q;
535
536 not_first = true;
537 }
538 } else {
539 STRV_FOREACH(i, argv+1) {
540 int q;
541
542 if (i > argv+1)
543 printf("\n");
544
545 if (argv[2]) {
546 (void) pager_open(arg_pager_flags);
547 printf("Service %s%s%s:\n", ansi_highlight(), *i, ansi_normal());
548 }
549
550 q = tree_one(bus, *i, NULL, !!argv[2]);
551 if (q < 0 && r >= 0)
552 r = q;
553 }
554 }
555
556 return r;
557 }
558
559 static int format_cmdline(sd_bus_message *m, FILE *f, bool needs_space) {
560 int r;
561
562 for (;;) {
563 const char *contents = NULL;
564 char type;
565 union {
566 uint8_t u8;
567 uint16_t u16;
568 int16_t s16;
569 uint32_t u32;
570 int32_t s32;
571 uint64_t u64;
572 int64_t s64;
573 double d64;
574 const char *string;
575 int i;
576 } basic;
577
578 r = sd_bus_message_peek_type(m, &type, &contents);
579 if (r < 0)
580 return r;
581 if (r == 0)
582 return needs_space;
583
584 if (bus_type_is_container(type) > 0) {
585
586 r = sd_bus_message_enter_container(m, type, contents);
587 if (r < 0)
588 return r;
589
590 if (type == SD_BUS_TYPE_ARRAY) {
591 unsigned n = 0;
592
593 /* count array entries */
594 for (;;) {
595
596 r = sd_bus_message_skip(m, contents);
597 if (r < 0)
598 return r;
599 if (r == 0)
600 break;
601
602 n++;
603 }
604
605 r = sd_bus_message_rewind(m, false);
606 if (r < 0)
607 return r;
608
609 if (needs_space)
610 fputc(' ', f);
611
612 fprintf(f, "%u", n);
613 needs_space = true;
614
615 } else if (type == SD_BUS_TYPE_VARIANT) {
616
617 if (needs_space)
618 fputc(' ', f);
619
620 fprintf(f, "%s", contents);
621 needs_space = true;
622 }
623
624 r = format_cmdline(m, f, needs_space);
625 if (r < 0)
626 return r;
627
628 needs_space = r > 0;
629
630 r = sd_bus_message_exit_container(m);
631 if (r < 0)
632 return r;
633
634 continue;
635 }
636
637 r = sd_bus_message_read_basic(m, type, &basic);
638 if (r < 0)
639 return r;
640
641 if (needs_space)
642 fputc(' ', f);
643
644 switch (type) {
645 case SD_BUS_TYPE_BYTE:
646 fprintf(f, "%u", basic.u8);
647 break;
648
649 case SD_BUS_TYPE_BOOLEAN:
650 fputs(true_false(basic.i), f);
651 break;
652
653 case SD_BUS_TYPE_INT16:
654 fprintf(f, "%i", basic.s16);
655 break;
656
657 case SD_BUS_TYPE_UINT16:
658 fprintf(f, "%u", basic.u16);
659 break;
660
661 case SD_BUS_TYPE_INT32:
662 fprintf(f, "%i", basic.s32);
663 break;
664
665 case SD_BUS_TYPE_UINT32:
666 fprintf(f, "%u", basic.u32);
667 break;
668
669 case SD_BUS_TYPE_INT64:
670 fprintf(f, "%" PRIi64, basic.s64);
671 break;
672
673 case SD_BUS_TYPE_UINT64:
674 fprintf(f, "%" PRIu64, basic.u64);
675 break;
676
677 case SD_BUS_TYPE_DOUBLE:
678 fprintf(f, "%g", basic.d64);
679 break;
680
681 case SD_BUS_TYPE_STRING:
682 case SD_BUS_TYPE_OBJECT_PATH:
683 case SD_BUS_TYPE_SIGNATURE: {
684 _cleanup_free_ char *b = NULL;
685
686 b = cescape(basic.string);
687 if (!b)
688 return -ENOMEM;
689
690 fprintf(f, "\"%s\"", b);
691 break;
692 }
693
694 case SD_BUS_TYPE_UNIX_FD:
695 fprintf(f, "%i", basic.i);
696 break;
697
698 default:
699 assert_not_reached("Unknown basic type.");
700 }
701
702 needs_space = true;
703 }
704 }
705
706 typedef struct Member {
707 const char *type;
708 char *interface;
709 char *name;
710 char *signature;
711 char *result;
712 char *value;
713 bool writable;
714 uint64_t flags;
715 } Member;
716
717 static void member_hash_func(const Member *m, struct siphash *state) {
718 uint64_t arity = 1;
719
720 assert(m);
721 assert(m->type);
722
723 string_hash_func(m->type, state);
724
725 arity += !!m->name + !!m->interface;
726
727 uint64_hash_func(&arity, state);
728
729 if (m->name)
730 string_hash_func(m->name, state);
731
732 if (m->interface)
733 string_hash_func(m->interface, state);
734 }
735
736 static int member_compare_func(const Member *x, const Member *y) {
737 int d;
738
739 assert(x);
740 assert(y);
741 assert(x->type);
742 assert(y->type);
743
744 d = strcmp_ptr(x->interface, y->interface);
745 if (d != 0)
746 return d;
747
748 d = strcmp(x->type, y->type);
749 if (d != 0)
750 return d;
751
752 return strcmp_ptr(x->name, y->name);
753 }
754
755 static int member_compare_funcp(Member * const *a, Member * const *b) {
756 return member_compare_func(*a, *b);
757 }
758
759 static void member_free(Member *m) {
760 if (!m)
761 return;
762
763 free(m->interface);
764 free(m->name);
765 free(m->signature);
766 free(m->result);
767 free(m->value);
768 free(m);
769 }
770
771 DEFINE_TRIVIAL_CLEANUP_FUNC(Member*, member_free);
772
773 static void member_set_free(Set *s) {
774 set_free_with_destructor(s, member_free);
775 }
776
777 DEFINE_TRIVIAL_CLEANUP_FUNC(Set*, member_set_free);
778
779 static int on_interface(const char *interface, uint64_t flags, void *userdata) {
780 _cleanup_(member_freep) Member *m;
781 Set *members = userdata;
782 int r;
783
784 assert(interface);
785 assert(members);
786
787 m = new0(Member, 1);
788 if (!m)
789 return log_oom();
790
791 m->type = "interface";
792 m->flags = flags;
793
794 r = free_and_strdup(&m->interface, interface);
795 if (r < 0)
796 return log_oom();
797
798 r = set_put(members, m);
799 if (r <= 0)
800 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Duplicate interface");
801
802 m = NULL;
803 return 0;
804 }
805
806 static int on_method(const char *interface, const char *name, const char *signature, const char *result, uint64_t flags, void *userdata) {
807 _cleanup_(member_freep) Member *m;
808 Set *members = userdata;
809 int r;
810
811 assert(interface);
812 assert(name);
813
814 m = new0(Member, 1);
815 if (!m)
816 return log_oom();
817
818 m->type = "method";
819 m->flags = flags;
820
821 r = free_and_strdup(&m->interface, interface);
822 if (r < 0)
823 return log_oom();
824
825 r = free_and_strdup(&m->name, name);
826 if (r < 0)
827 return log_oom();
828
829 r = free_and_strdup(&m->signature, signature);
830 if (r < 0)
831 return log_oom();
832
833 r = free_and_strdup(&m->result, result);
834 if (r < 0)
835 return log_oom();
836
837 r = set_put(members, m);
838 if (r <= 0)
839 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Duplicate method");
840
841 m = NULL;
842 return 0;
843 }
844
845 static int on_signal(const char *interface, const char *name, const char *signature, uint64_t flags, void *userdata) {
846 _cleanup_(member_freep) Member *m;
847 Set *members = userdata;
848 int r;
849
850 assert(interface);
851 assert(name);
852
853 m = new0(Member, 1);
854 if (!m)
855 return log_oom();
856
857 m->type = "signal";
858 m->flags = flags;
859
860 r = free_and_strdup(&m->interface, interface);
861 if (r < 0)
862 return log_oom();
863
864 r = free_and_strdup(&m->name, name);
865 if (r < 0)
866 return log_oom();
867
868 r = free_and_strdup(&m->signature, signature);
869 if (r < 0)
870 return log_oom();
871
872 r = set_put(members, m);
873 if (r <= 0)
874 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Duplicate signal");
875
876 m = NULL;
877 return 0;
878 }
879
880 static int on_property(const char *interface, const char *name, const char *signature, bool writable, uint64_t flags, void *userdata) {
881 _cleanup_(member_freep) Member *m;
882 Set *members = userdata;
883 int r;
884
885 assert(interface);
886 assert(name);
887
888 m = new0(Member, 1);
889 if (!m)
890 return log_oom();
891
892 m->type = "property";
893 m->flags = flags;
894 m->writable = writable;
895
896 r = free_and_strdup(&m->interface, interface);
897 if (r < 0)
898 return log_oom();
899
900 r = free_and_strdup(&m->name, name);
901 if (r < 0)
902 return log_oom();
903
904 r = free_and_strdup(&m->signature, signature);
905 if (r < 0)
906 return log_oom();
907
908 r = set_put(members, m);
909 if (r <= 0)
910 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Duplicate property");
911
912 m = NULL;
913 return 0;
914 }
915
916 DEFINE_PRIVATE_HASH_OPS(member_hash_ops, Member, member_hash_func, member_compare_func);
917
918 static int introspect(int argc, char **argv, void *userdata) {
919 static const XMLIntrospectOps ops = {
920 .on_interface = on_interface,
921 .on_method = on_method,
922 .on_signal = on_signal,
923 .on_property = on_property,
924 };
925
926 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
927 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply_xml = NULL;
928 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
929 _cleanup_(member_set_freep) Set *members = NULL;
930 unsigned name_width, type_width, signature_width, result_width, j, k = 0;
931 Member *m, **sorted = NULL;
932 Iterator i;
933 const char *xml;
934 int r;
935
936 r = acquire_bus(false, &bus);
937 if (r < 0)
938 return r;
939
940 members = set_new(&member_hash_ops);
941 if (!members)
942 return log_oom();
943
944 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Introspectable", "Introspect", &error, &reply_xml, "");
945 if (r < 0)
946 return log_error_errno(r, "Failed to introspect object %s of service %s: %s", argv[2], argv[1], bus_error_message(&error, r));
947
948 r = sd_bus_message_read(reply_xml, "s", &xml);
949 if (r < 0)
950 return bus_log_parse_error(r);
951
952 /* First, get list of all properties */
953 r = parse_xml_introspect(argv[2], xml, &ops, members);
954 if (r < 0)
955 return r;
956
957 /* Second, find the current values for them */
958 SET_FOREACH(m, members, i) {
959 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
960
961 if (!streq(m->type, "property"))
962 continue;
963
964 if (m->value)
965 continue;
966
967 if (argv[3] && !streq(argv[3], m->interface))
968 continue;
969
970 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Properties", "GetAll", &error, &reply, "s", m->interface);
971 if (r < 0)
972 return log_error_errno(r, "%s", bus_error_message(&error, r));
973
974 r = sd_bus_message_enter_container(reply, 'a', "{sv}");
975 if (r < 0)
976 return bus_log_parse_error(r);
977
978 for (;;) {
979 Member *z;
980 _cleanup_free_ char *buf = NULL;
981 _cleanup_fclose_ FILE *mf = NULL;
982 size_t sz = 0;
983 const char *name;
984
985 r = sd_bus_message_enter_container(reply, 'e', "sv");
986 if (r < 0)
987 return bus_log_parse_error(r);
988
989 if (r == 0)
990 break;
991
992 r = sd_bus_message_read(reply, "s", &name);
993 if (r < 0)
994 return bus_log_parse_error(r);
995
996 r = sd_bus_message_enter_container(reply, 'v', NULL);
997 if (r < 0)
998 return bus_log_parse_error(r);
999
1000 mf = open_memstream(&buf, &sz);
1001 if (!mf)
1002 return log_oom();
1003
1004 (void) __fsetlocking(mf, FSETLOCKING_BYCALLER);
1005
1006 r = format_cmdline(reply, mf, false);
1007 if (r < 0)
1008 return bus_log_parse_error(r);
1009
1010 mf = safe_fclose(mf);
1011
1012 z = set_get(members, &((Member) {
1013 .type = "property",
1014 .interface = m->interface,
1015 .name = (char*) name }));
1016 if (z)
1017 free_and_replace(z->value, buf);
1018
1019 r = sd_bus_message_exit_container(reply);
1020 if (r < 0)
1021 return bus_log_parse_error(r);
1022
1023 r = sd_bus_message_exit_container(reply);
1024 if (r < 0)
1025 return bus_log_parse_error(r);
1026 }
1027
1028 r = sd_bus_message_exit_container(reply);
1029 if (r < 0)
1030 return bus_log_parse_error(r);
1031 }
1032
1033 (void) pager_open(arg_pager_flags);
1034
1035 name_width = STRLEN("NAME");
1036 type_width = STRLEN("TYPE");
1037 signature_width = STRLEN("SIGNATURE");
1038 result_width = STRLEN("RESULT/VALUE");
1039
1040 sorted = newa(Member*, set_size(members));
1041
1042 SET_FOREACH(m, members, i) {
1043
1044 if (argv[3] && !streq(argv[3], m->interface))
1045 continue;
1046
1047 if (m->interface)
1048 name_width = MAX(name_width, strlen(m->interface));
1049 if (m->name)
1050 name_width = MAX(name_width, strlen(m->name) + 1);
1051 if (m->type)
1052 type_width = MAX(type_width, strlen(m->type));
1053 if (m->signature)
1054 signature_width = MAX(signature_width, strlen(m->signature));
1055 if (m->result)
1056 result_width = MAX(result_width, strlen(m->result));
1057 if (m->value)
1058 result_width = MAX(result_width, strlen(m->value));
1059
1060 sorted[k++] = m;
1061 }
1062
1063 if (result_width > 40)
1064 result_width = 40;
1065
1066 typesafe_qsort(sorted, k, member_compare_funcp);
1067
1068 if (arg_legend) {
1069 printf("%-*s %-*s %-*s %-*s %s\n",
1070 (int) name_width, "NAME",
1071 (int) type_width, "TYPE",
1072 (int) signature_width, "SIGNATURE",
1073 (int) result_width, "RESULT/VALUE",
1074 "FLAGS");
1075 }
1076
1077 for (j = 0; j < k; j++) {
1078 _cleanup_free_ char *ellipsized = NULL;
1079 const char *rv;
1080 bool is_interface;
1081
1082 m = sorted[j];
1083
1084 if (argv[3] && !streq(argv[3], m->interface))
1085 continue;
1086
1087 is_interface = streq(m->type, "interface");
1088
1089 if (argv[3] && is_interface)
1090 continue;
1091
1092 if (m->value) {
1093 ellipsized = ellipsize(m->value, result_width, 100);
1094 if (!ellipsized)
1095 return log_oom();
1096
1097 rv = ellipsized;
1098 } else
1099 rv = empty_to_dash(m->result);
1100
1101 printf("%s%s%-*s%s %-*s %-*s %-*s%s%s%s%s%s%s\n",
1102 is_interface ? ansi_highlight() : "",
1103 is_interface ? "" : ".",
1104 - !is_interface + (int) name_width, empty_to_dash(streq_ptr(m->type, "interface") ? m->interface : m->name),
1105 is_interface ? ansi_normal() : "",
1106 (int) type_width, empty_to_dash(m->type),
1107 (int) signature_width, empty_to_dash(m->signature),
1108 (int) result_width, rv,
1109 (m->flags & SD_BUS_VTABLE_DEPRECATED) ? " deprecated" : (m->flags || m->writable ? "" : " -"),
1110 (m->flags & SD_BUS_VTABLE_METHOD_NO_REPLY) ? " no-reply" : "",
1111 (m->flags & SD_BUS_VTABLE_PROPERTY_CONST) ? " const" : "",
1112 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE) ? " emits-change" : "",
1113 (m->flags & SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION) ? " emits-invalidation" : "",
1114 m->writable ? " writable" : "");
1115 }
1116
1117 return 0;
1118 }
1119
1120 static int message_dump(sd_bus_message *m, FILE *f) {
1121 return bus_message_dump(m, f, BUS_MESSAGE_DUMP_WITH_HEADER);
1122 }
1123
1124 static int message_pcap(sd_bus_message *m, FILE *f) {
1125 return bus_message_pcap_frame(m, arg_snaplen, f);
1126 }
1127
1128 static int message_json(sd_bus_message *m, FILE *f) {
1129 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL, *w = NULL;
1130 char e[2];
1131 int r;
1132
1133 r = json_transform_message(m, &v);
1134 if (r < 0)
1135 return r;
1136
1137 e[0] = m->header->endian;
1138 e[1] = 0;
1139
1140 r = json_build(&w, JSON_BUILD_OBJECT(
1141 JSON_BUILD_PAIR("type", JSON_BUILD_STRING(bus_message_type_to_string(m->header->type))),
1142 JSON_BUILD_PAIR("endian", JSON_BUILD_STRING(e)),
1143 JSON_BUILD_PAIR("flags", JSON_BUILD_INTEGER(m->header->flags)),
1144 JSON_BUILD_PAIR("version", JSON_BUILD_INTEGER(m->header->version)),
1145 JSON_BUILD_PAIR_CONDITION(m->priority != 0, "priority", JSON_BUILD_INTEGER(m->priority)),
1146 JSON_BUILD_PAIR("cookie", JSON_BUILD_INTEGER(BUS_MESSAGE_COOKIE(m))),
1147 JSON_BUILD_PAIR_CONDITION(m->reply_cookie != 0, "reply_cookie", JSON_BUILD_INTEGER(m->reply_cookie)),
1148 JSON_BUILD_PAIR_CONDITION(m->sender, "sender", JSON_BUILD_STRING(m->sender)),
1149 JSON_BUILD_PAIR_CONDITION(m->destination, "destination", JSON_BUILD_STRING(m->destination)),
1150 JSON_BUILD_PAIR_CONDITION(m->path, "path", JSON_BUILD_STRING(m->path)),
1151 JSON_BUILD_PAIR_CONDITION(m->interface, "interface", JSON_BUILD_STRING(m->interface)),
1152 JSON_BUILD_PAIR_CONDITION(m->member, "member", JSON_BUILD_STRING(m->member)),
1153 JSON_BUILD_PAIR_CONDITION(m->monotonic != 0, "monotonic", JSON_BUILD_INTEGER(m->monotonic)),
1154 JSON_BUILD_PAIR_CONDITION(m->realtime != 0, "realtime", JSON_BUILD_INTEGER(m->realtime)),
1155 JSON_BUILD_PAIR_CONDITION(m->seqnum != 0, "seqnum", JSON_BUILD_INTEGER(m->seqnum)),
1156 JSON_BUILD_PAIR_CONDITION(m->error.name, "error_name", JSON_BUILD_STRING(m->error.name)),
1157 JSON_BUILD_PAIR("payload", JSON_BUILD_VARIANT(v))));
1158 if (r < 0)
1159 return log_error_errno(r, "Failed to build JSON object: %m");
1160
1161 json_dump_with_flags(w, f);
1162 return 0;
1163 }
1164
1165 static int monitor(int argc, char **argv, int (*dump)(sd_bus_message *m, FILE *f)) {
1166 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
1167 _cleanup_(sd_bus_message_unrefp) sd_bus_message *message = NULL;
1168 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1169 char **i;
1170 uint32_t flags = 0;
1171 const char *unique_name;
1172 bool is_monitor = false;
1173 int r;
1174
1175 r = acquire_bus(true, &bus);
1176 if (r < 0)
1177 return r;
1178
1179 /* upgrade connection; it's not used for anything else after this call */
1180 r = sd_bus_message_new_method_call(bus, &message, "org.freedesktop.DBus", "/org/freedesktop/DBus", "org.freedesktop.DBus.Monitoring", "BecomeMonitor");
1181 if (r < 0)
1182 return bus_log_create_error(r);
1183
1184 r = sd_bus_message_open_container(message, 'a', "s");
1185 if (r < 0)
1186 return bus_log_create_error(r);
1187
1188 STRV_FOREACH(i, argv+1) {
1189 _cleanup_free_ char *m = NULL;
1190
1191 if (!service_name_is_valid(*i))
1192 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Invalid service name '%s'", *i);
1193
1194 m = strjoin("sender='", *i, "'");
1195 if (!m)
1196 return log_oom();
1197
1198 r = sd_bus_message_append_basic(message, 's', m);
1199 if (r < 0)
1200 return bus_log_create_error(r);
1201
1202 free(m);
1203 m = strjoin("destination='", *i, "'");
1204 if (!m)
1205 return log_oom();
1206
1207 r = sd_bus_message_append_basic(message, 's', m);
1208 if (r < 0)
1209 return bus_log_create_error(r);
1210 }
1211
1212 STRV_FOREACH(i, arg_matches) {
1213 r = sd_bus_message_append_basic(message, 's', *i);
1214 if (r < 0)
1215 return bus_log_create_error(r);
1216 }
1217
1218 r = sd_bus_message_close_container(message);
1219 if (r < 0)
1220 return bus_log_create_error(r);
1221
1222 r = sd_bus_message_append_basic(message, 'u', &flags);
1223 if (r < 0)
1224 return bus_log_create_error(r);
1225
1226 r = sd_bus_call(bus, message, arg_timeout, &error, NULL);
1227 if (r < 0)
1228 return log_error_errno(r, "%s", bus_error_message(&error, r));
1229
1230 r = sd_bus_get_unique_name(bus, &unique_name);
1231 if (r < 0)
1232 return log_error_errno(r, "Failed to get unique name: %m");
1233
1234 log_info("Monitoring bus message stream.");
1235
1236 for (;;) {
1237 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
1238
1239 r = sd_bus_process(bus, &m);
1240 if (r < 0)
1241 return log_error_errno(r, "Failed to process bus: %m");
1242
1243 if (!is_monitor) {
1244 const char *name;
1245
1246 /* wait until we lose our unique name */
1247 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus", "NameLost") <= 0)
1248 continue;
1249
1250 r = sd_bus_message_read(m, "s", &name);
1251 if (r < 0)
1252 return log_error_errno(r, "Failed to read lost name: %m");
1253
1254 if (streq(name, unique_name))
1255 is_monitor = true;
1256
1257 continue;
1258 }
1259
1260 if (m) {
1261 dump(m, stdout);
1262 fflush(stdout);
1263
1264 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected") > 0) {
1265 log_info("Connection terminated, exiting.");
1266 return 0;
1267 }
1268
1269 continue;
1270 }
1271
1272 if (r > 0)
1273 continue;
1274
1275 r = sd_bus_wait(bus, (uint64_t) -1);
1276 if (r < 0)
1277 return log_error_errno(r, "Failed to wait for bus: %m");
1278 }
1279 }
1280
1281 static int verb_monitor(int argc, char **argv, void *userdata) {
1282 return monitor(argc, argv, arg_json != JSON_OFF ? message_json : message_dump);
1283 }
1284
1285 static int verb_capture(int argc, char **argv, void *userdata) {
1286 int r;
1287
1288 if (isatty(fileno(stdout)) > 0)
1289 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1290 "Refusing to write message data to console, please redirect output to a file.");
1291
1292 bus_pcap_header(arg_snaplen, stdout);
1293
1294 r = monitor(argc, argv, message_pcap);
1295 if (r < 0)
1296 return r;
1297
1298 r = fflush_and_check(stdout);
1299 if (r < 0)
1300 return log_error_errno(r, "Couldn't write capture file: %m");
1301
1302 return r;
1303 }
1304
1305 static int status(int argc, char **argv, void *userdata) {
1306 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
1307 _cleanup_(sd_bus_creds_unrefp) sd_bus_creds *creds = NULL;
1308 pid_t pid;
1309 int r;
1310
1311 r = acquire_bus(false, &bus);
1312 if (r < 0)
1313 return r;
1314
1315 if (!isempty(argv[1])) {
1316 r = parse_pid(argv[1], &pid);
1317 if (r < 0)
1318 r = sd_bus_get_name_creds(
1319 bus,
1320 argv[1],
1321 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1322 &creds);
1323 else
1324 r = sd_bus_creds_new_from_pid(
1325 &creds,
1326 pid,
1327 _SD_BUS_CREDS_ALL);
1328 } else {
1329 const char *scope, *address;
1330 sd_id128_t bus_id;
1331
1332 r = sd_bus_get_address(bus, &address);
1333 if (r >= 0)
1334 printf("BusAddress=%s%s%s\n", ansi_highlight(), address, ansi_normal());
1335
1336 r = sd_bus_get_scope(bus, &scope);
1337 if (r >= 0)
1338 printf("BusScope=%s%s%s\n", ansi_highlight(), scope, ansi_normal());
1339
1340 r = sd_bus_get_bus_id(bus, &bus_id);
1341 if (r >= 0)
1342 printf("BusID=%s" SD_ID128_FORMAT_STR "%s\n", ansi_highlight(), SD_ID128_FORMAT_VAL(bus_id), ansi_normal());
1343
1344 r = sd_bus_get_owner_creds(
1345 bus,
1346 (arg_augment_creds ? SD_BUS_CREDS_AUGMENT : 0) | _SD_BUS_CREDS_ALL,
1347 &creds);
1348 }
1349
1350 if (r < 0)
1351 return log_error_errno(r, "Failed to get credentials: %m");
1352
1353 bus_creds_dump(creds, NULL, false);
1354 return 0;
1355 }
1356
1357 static int message_append_cmdline(sd_bus_message *m, const char *signature, char ***x) {
1358 char **p;
1359 int r;
1360
1361 assert(m);
1362 assert(signature);
1363 assert(x);
1364
1365 p = *x;
1366
1367 for (;;) {
1368 const char *v;
1369 char t;
1370
1371 t = *signature;
1372 v = *p;
1373
1374 if (t == 0)
1375 break;
1376 if (!v)
1377 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1378 "Too few parameters for signature.");
1379
1380 signature++;
1381 p++;
1382
1383 switch (t) {
1384
1385 case SD_BUS_TYPE_BOOLEAN:
1386
1387 r = parse_boolean(v);
1388 if (r < 0)
1389 return log_error_errno(r, "Failed to parse '%s' as boolean: %m", v);
1390
1391 r = sd_bus_message_append_basic(m, t, &r);
1392 break;
1393
1394 case SD_BUS_TYPE_BYTE: {
1395 uint8_t z;
1396
1397 r = safe_atou8(v, &z);
1398 if (r < 0)
1399 return log_error_errno(r, "Failed to parse '%s' as byte (unsigned 8bit integer): %m", v);
1400
1401 r = sd_bus_message_append_basic(m, t, &z);
1402 break;
1403 }
1404
1405 case SD_BUS_TYPE_INT16: {
1406 int16_t z;
1407
1408 r = safe_atoi16(v, &z);
1409 if (r < 0)
1410 return log_error_errno(r, "Failed to parse '%s' as signed 16bit integer: %m", v);
1411
1412 r = sd_bus_message_append_basic(m, t, &z);
1413 break;
1414 }
1415
1416 case SD_BUS_TYPE_UINT16: {
1417 uint16_t z;
1418
1419 r = safe_atou16(v, &z);
1420 if (r < 0)
1421 return log_error_errno(r, "Failed to parse '%s' as unsigned 16bit integer: %m", v);
1422
1423 r = sd_bus_message_append_basic(m, t, &z);
1424 break;
1425 }
1426
1427 case SD_BUS_TYPE_INT32: {
1428 int32_t z;
1429
1430 r = safe_atoi32(v, &z);
1431 if (r < 0)
1432 return log_error_errno(r, "Failed to parse '%s' as signed 32bit integer: %m", v);
1433
1434 r = sd_bus_message_append_basic(m, t, &z);
1435 break;
1436 }
1437
1438 case SD_BUS_TYPE_UINT32: {
1439 uint32_t z;
1440
1441 r = safe_atou32(v, &z);
1442 if (r < 0)
1443 return log_error_errno(r, "Failed to parse '%s' as unsigned 32bit integer: %m", v);
1444
1445 r = sd_bus_message_append_basic(m, t, &z);
1446 break;
1447 }
1448
1449 case SD_BUS_TYPE_INT64: {
1450 int64_t z;
1451
1452 r = safe_atoi64(v, &z);
1453 if (r < 0)
1454 return log_error_errno(r, "Failed to parse '%s' as signed 64bit integer: %m", v);
1455
1456 r = sd_bus_message_append_basic(m, t, &z);
1457 break;
1458 }
1459
1460 case SD_BUS_TYPE_UINT64: {
1461 uint64_t z;
1462
1463 r = safe_atou64(v, &z);
1464 if (r < 0)
1465 return log_error_errno(r, "Failed to parse '%s' as unsigned 64bit integer: %m", v);
1466
1467 r = sd_bus_message_append_basic(m, t, &z);
1468 break;
1469 }
1470
1471 case SD_BUS_TYPE_DOUBLE: {
1472 double z;
1473
1474 r = safe_atod(v, &z);
1475 if (r < 0)
1476 return log_error_errno(r, "Failed to parse '%s' as double precision floating point: %m", v);
1477
1478 r = sd_bus_message_append_basic(m, t, &z);
1479 break;
1480 }
1481
1482 case SD_BUS_TYPE_STRING:
1483 case SD_BUS_TYPE_OBJECT_PATH:
1484 case SD_BUS_TYPE_SIGNATURE:
1485
1486 r = sd_bus_message_append_basic(m, t, v);
1487 break;
1488
1489 case SD_BUS_TYPE_ARRAY: {
1490 uint32_t n;
1491 size_t k;
1492
1493 r = safe_atou32(v, &n);
1494 if (r < 0)
1495 return log_error_errno(r, "Failed to parse '%s' number of array entries: %m", v);
1496
1497 r = signature_element_length(signature, &k);
1498 if (r < 0)
1499 return log_error_errno(r, "Invalid array signature: %m");
1500
1501 {
1502 unsigned i;
1503 char s[k + 1];
1504 memcpy(s, signature, k);
1505 s[k] = 0;
1506
1507 r = sd_bus_message_open_container(m, SD_BUS_TYPE_ARRAY, s);
1508 if (r < 0)
1509 return bus_log_create_error(r);
1510
1511 for (i = 0; i < n; i++) {
1512 r = message_append_cmdline(m, s, &p);
1513 if (r < 0)
1514 return r;
1515 }
1516 }
1517
1518 signature += k;
1519
1520 r = sd_bus_message_close_container(m);
1521 break;
1522 }
1523
1524 case SD_BUS_TYPE_VARIANT:
1525 r = sd_bus_message_open_container(m, SD_BUS_TYPE_VARIANT, v);
1526 if (r < 0)
1527 return bus_log_create_error(r);
1528
1529 r = message_append_cmdline(m, v, &p);
1530 if (r < 0)
1531 return r;
1532
1533 r = sd_bus_message_close_container(m);
1534 break;
1535
1536 case SD_BUS_TYPE_STRUCT_BEGIN:
1537 case SD_BUS_TYPE_DICT_ENTRY_BEGIN: {
1538 size_t k;
1539
1540 signature--;
1541 p--;
1542
1543 r = signature_element_length(signature, &k);
1544 if (r < 0)
1545 return log_error_errno(r, "Invalid struct/dict entry signature: %m");
1546
1547 {
1548 char s[k-1];
1549 memcpy(s, signature + 1, k - 2);
1550 s[k - 2] = 0;
1551
1552 r = sd_bus_message_open_container(m, t == SD_BUS_TYPE_STRUCT_BEGIN ? SD_BUS_TYPE_STRUCT : SD_BUS_TYPE_DICT_ENTRY, s);
1553 if (r < 0)
1554 return bus_log_create_error(r);
1555
1556 r = message_append_cmdline(m, s, &p);
1557 if (r < 0)
1558 return r;
1559 }
1560
1561 signature += k;
1562
1563 r = sd_bus_message_close_container(m);
1564 break;
1565 }
1566
1567 case SD_BUS_TYPE_UNIX_FD:
1568 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1569 "UNIX file descriptor not supported as type.");
1570
1571 default:
1572 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
1573 "Unknown signature type %c.", t);
1574 }
1575
1576 if (r < 0)
1577 return bus_log_create_error(r);
1578 }
1579
1580 *x = p;
1581 return 0;
1582 }
1583
1584 static int json_transform_one(sd_bus_message *m, JsonVariant **ret);
1585
1586 static int json_transform_array_or_struct(sd_bus_message *m, JsonVariant **ret) {
1587 size_t n_elements = 0, n_allocated = 0;
1588 JsonVariant **elements = NULL;
1589 int r;
1590
1591 assert(m);
1592 assert(ret);
1593
1594 for (;;) {
1595 r = sd_bus_message_at_end(m, false);
1596 if (r < 0) {
1597 bus_log_parse_error(r);
1598 goto finish;
1599 }
1600 if (r > 0)
1601 break;
1602
1603 if (!GREEDY_REALLOC(elements, n_allocated, n_elements + 1)) {
1604 r = log_oom();
1605 goto finish;
1606 }
1607
1608 r = json_transform_one(m, elements + n_elements);
1609 if (r < 0)
1610 goto finish;
1611
1612 n_elements++;
1613 }
1614
1615 r = json_variant_new_array(ret, elements, n_elements);
1616
1617 finish:
1618 json_variant_unref_many(elements, n_elements);
1619 free(elements);
1620
1621 return r;
1622 }
1623
1624 static int json_transform_variant(sd_bus_message *m, const char *contents, JsonVariant **ret) {
1625 _cleanup_(json_variant_unrefp) JsonVariant *value = NULL;
1626 int r;
1627
1628 assert(m);
1629 assert(contents);
1630 assert(ret);
1631
1632 r = json_transform_one(m, &value);
1633 if (r < 0)
1634 return r;
1635
1636 r = json_build(ret, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("type", JSON_BUILD_STRING(contents)),
1637 JSON_BUILD_PAIR("data", JSON_BUILD_VARIANT(value))));
1638 if (r < 0)
1639 return log_oom();
1640
1641 return r;
1642 }
1643
1644 static int json_transform_dict_array(sd_bus_message *m, JsonVariant **ret) {
1645 size_t n_elements = 0, n_allocated = 0;
1646 JsonVariant **elements = NULL;
1647 int r;
1648
1649 assert(m);
1650 assert(ret);
1651
1652 for (;;) {
1653 const char *contents;
1654 char type;
1655
1656 r = sd_bus_message_at_end(m, false);
1657 if (r < 0) {
1658 bus_log_parse_error(r);
1659 goto finish;
1660 }
1661 if (r > 0)
1662 break;
1663
1664 r = sd_bus_message_peek_type(m, &type, &contents);
1665 if (r < 0)
1666 return r;
1667
1668 assert(type == 'e');
1669
1670 if (!GREEDY_REALLOC(elements, n_allocated, n_elements + 2)) {
1671 r = log_oom();
1672 goto finish;
1673 }
1674
1675 r = sd_bus_message_enter_container(m, type, contents);
1676 if (r < 0) {
1677 bus_log_parse_error(r);
1678 goto finish;
1679 }
1680
1681 r = json_transform_one(m, elements + n_elements);
1682 if (r < 0)
1683 goto finish;
1684
1685 n_elements++;
1686
1687 r = json_transform_one(m, elements + n_elements);
1688 if (r < 0)
1689 goto finish;
1690
1691 n_elements++;
1692
1693 r = sd_bus_message_exit_container(m);
1694 if (r < 0) {
1695 bus_log_parse_error(r);
1696 goto finish;
1697 }
1698 }
1699
1700 r = json_variant_new_object(ret, elements, n_elements);
1701
1702 finish:
1703 json_variant_unref_many(elements, n_elements);
1704 free(elements);
1705
1706 return r;
1707 }
1708
1709 static int json_transform_one(sd_bus_message *m, JsonVariant **ret) {
1710 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
1711 const char *contents;
1712 char type;
1713 int r;
1714
1715 assert(m);
1716 assert(ret);
1717
1718 r = sd_bus_message_peek_type(m, &type, &contents);
1719 if (r < 0)
1720 return bus_log_parse_error(r);
1721
1722 switch (type) {
1723
1724 case SD_BUS_TYPE_BYTE: {
1725 uint8_t b;
1726
1727 r = sd_bus_message_read_basic(m, type, &b);
1728 if (r < 0)
1729 return bus_log_parse_error(r);
1730
1731 r = json_variant_new_unsigned(&v, b);
1732 if (r < 0)
1733 return log_error_errno(r, "Failed to transform byte: %m");
1734
1735 break;
1736 }
1737
1738 case SD_BUS_TYPE_BOOLEAN: {
1739 int b;
1740
1741 r = sd_bus_message_read_basic(m, type, &b);
1742 if (r < 0)
1743 return bus_log_parse_error(r);
1744
1745 r = json_variant_new_boolean(&v, b);
1746 if (r < 0)
1747 return log_error_errno(r, "Failed to transform boolean: %m");
1748
1749 break;
1750 }
1751
1752 case SD_BUS_TYPE_INT16: {
1753 int16_t b;
1754
1755 r = sd_bus_message_read_basic(m, type, &b);
1756 if (r < 0)
1757 return bus_log_parse_error(r);
1758
1759 r = json_variant_new_integer(&v, b);
1760 if (r < 0)
1761 return log_error_errno(r, "Failed to transform int16: %m");
1762
1763 break;
1764 }
1765
1766 case SD_BUS_TYPE_UINT16: {
1767 uint16_t b;
1768
1769 r = sd_bus_message_read_basic(m, type, &b);
1770 if (r < 0)
1771 return bus_log_parse_error(r);
1772
1773 r = json_variant_new_unsigned(&v, b);
1774 if (r < 0)
1775 return log_error_errno(r, "Failed to transform uint16: %m");
1776
1777 break;
1778 }
1779
1780 case SD_BUS_TYPE_INT32: {
1781 int32_t b;
1782
1783 r = sd_bus_message_read_basic(m, type, &b);
1784 if (r < 0)
1785 return bus_log_parse_error(r);
1786
1787 r = json_variant_new_integer(&v, b);
1788 if (r < 0)
1789 return log_error_errno(r, "Failed to transform int32: %m");
1790
1791 break;
1792 }
1793
1794 case SD_BUS_TYPE_UINT32: {
1795 uint32_t b;
1796
1797 r = sd_bus_message_read_basic(m, type, &b);
1798 if (r < 0)
1799 return bus_log_parse_error(r);
1800
1801 r = json_variant_new_unsigned(&v, b);
1802 if (r < 0)
1803 return log_error_errno(r, "Failed to transform uint32: %m");
1804
1805 break;
1806 }
1807
1808 case SD_BUS_TYPE_INT64: {
1809 int64_t b;
1810
1811 r = sd_bus_message_read_basic(m, type, &b);
1812 if (r < 0)
1813 return bus_log_parse_error(r);
1814
1815 r = json_variant_new_integer(&v, b);
1816 if (r < 0)
1817 return log_error_errno(r, "Failed to transform int64: %m");
1818
1819 break;
1820 }
1821
1822 case SD_BUS_TYPE_UINT64: {
1823 uint64_t b;
1824
1825 r = sd_bus_message_read_basic(m, type, &b);
1826 if (r < 0)
1827 return bus_log_parse_error(r);
1828
1829 r = json_variant_new_unsigned(&v, b);
1830 if (r < 0)
1831 return log_error_errno(r, "Failed to transform uint64: %m");
1832
1833 break;
1834 }
1835
1836 case SD_BUS_TYPE_DOUBLE: {
1837 double d;
1838
1839 r = sd_bus_message_read_basic(m, type, &d);
1840 if (r < 0)
1841 return bus_log_parse_error(r);
1842
1843 r = json_variant_new_real(&v, d);
1844 if (r < 0)
1845 return log_error_errno(r, "Failed to transform double: %m");
1846
1847 break;
1848 }
1849
1850 case SD_BUS_TYPE_STRING:
1851 case SD_BUS_TYPE_OBJECT_PATH:
1852 case SD_BUS_TYPE_SIGNATURE: {
1853 const char *s;
1854
1855 r = sd_bus_message_read_basic(m, type, &s);
1856 if (r < 0)
1857 return bus_log_parse_error(r);
1858
1859 r = json_variant_new_string(&v, s);
1860 if (r < 0)
1861 return log_error_errno(r, "Failed to transform double: %m");
1862
1863 break;
1864 }
1865
1866 case SD_BUS_TYPE_UNIX_FD:
1867 r = sd_bus_message_read_basic(m, type, NULL);
1868 if (r < 0)
1869 return bus_log_parse_error(r);
1870
1871 r = json_variant_new_null(&v);
1872 if (r < 0)
1873 return log_error_errno(r, "Failed to transform fd: %m");
1874
1875 break;
1876
1877 case SD_BUS_TYPE_ARRAY:
1878 case SD_BUS_TYPE_VARIANT:
1879 case SD_BUS_TYPE_STRUCT:
1880 r = sd_bus_message_enter_container(m, type, contents);
1881 if (r < 0)
1882 return bus_log_parse_error(r);
1883
1884 if (type == SD_BUS_TYPE_VARIANT)
1885 r = json_transform_variant(m, contents, &v);
1886 else if (type == SD_BUS_TYPE_ARRAY && contents[0] == '{')
1887 r = json_transform_dict_array(m, &v);
1888 else
1889 r = json_transform_array_or_struct(m, &v);
1890 if (r < 0)
1891 return r;
1892
1893 r = sd_bus_message_exit_container(m);
1894 if (r < 0)
1895 return bus_log_parse_error(r);
1896
1897 break;
1898
1899 default:
1900 assert_not_reached("Unexpected element type");
1901 }
1902
1903 *ret = TAKE_PTR(v);
1904 return 0;
1905 }
1906
1907 static int json_transform_message(sd_bus_message *m, JsonVariant **ret) {
1908 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
1909 const char *type;
1910 int r;
1911
1912 assert(m);
1913 assert(ret);
1914
1915 assert_se(type = sd_bus_message_get_signature(m, false));
1916
1917 r = json_transform_array_or_struct(m, &v);
1918 if (r < 0)
1919 return r;
1920
1921 r = json_build(ret, JSON_BUILD_OBJECT(JSON_BUILD_PAIR("type", JSON_BUILD_STRING(type)),
1922 JSON_BUILD_PAIR("data", JSON_BUILD_VARIANT(v))));
1923 if (r < 0)
1924 return log_oom();
1925
1926 return 0;
1927 }
1928
1929 static void json_dump_with_flags(JsonVariant *v, FILE *f) {
1930
1931 json_variant_dump(v,
1932 (arg_json == JSON_PRETTY ? JSON_FORMAT_PRETTY : JSON_FORMAT_NEWLINE) |
1933 JSON_FORMAT_COLOR_AUTO,
1934 f, NULL);
1935 }
1936
1937 static int call(int argc, char **argv, void *userdata) {
1938 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
1939 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1940 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL;
1941 int r;
1942
1943 r = acquire_bus(false, &bus);
1944 if (r < 0)
1945 return r;
1946
1947 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], argv[3], argv[4]);
1948 if (r < 0)
1949 return bus_log_create_error(r);
1950
1951 r = sd_bus_message_set_expect_reply(m, arg_expect_reply);
1952 if (r < 0)
1953 return bus_log_create_error(r);
1954
1955 r = sd_bus_message_set_auto_start(m, arg_auto_start);
1956 if (r < 0)
1957 return bus_log_create_error(r);
1958
1959 r = sd_bus_message_set_allow_interactive_authorization(m, arg_allow_interactive_authorization);
1960 if (r < 0)
1961 return bus_log_create_error(r);
1962
1963 if (!isempty(argv[5])) {
1964 char **p;
1965
1966 p = argv+6;
1967
1968 r = message_append_cmdline(m, argv[5], &p);
1969 if (r < 0)
1970 return r;
1971
1972 if (*p)
1973 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Too many parameters for signature.");
1974 }
1975
1976 if (!arg_expect_reply) {
1977 r = sd_bus_send(bus, m, NULL);
1978 if (r < 0)
1979 return log_error_errno(r, "Failed to send message: %m");
1980
1981 return 0;
1982 }
1983
1984 r = sd_bus_call(bus, m, arg_timeout, &error, &reply);
1985 if (r < 0)
1986 return log_error_errno(r, "%s", bus_error_message(&error, r));
1987
1988 r = sd_bus_message_is_empty(reply);
1989 if (r < 0)
1990 return bus_log_parse_error(r);
1991
1992 if (r == 0 && !arg_quiet) {
1993
1994 if (arg_json != JSON_OFF) {
1995 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
1996
1997 if (arg_json != JSON_SHORT)
1998 (void) pager_open(arg_pager_flags);
1999
2000 r = json_transform_message(reply, &v);
2001 if (r < 0)
2002 return r;
2003
2004 json_dump_with_flags(v, stdout);
2005
2006 } else if (arg_verbose) {
2007 (void) pager_open(arg_pager_flags);
2008
2009 r = bus_message_dump(reply, stdout, 0);
2010 if (r < 0)
2011 return r;
2012 } else {
2013
2014 fputs(sd_bus_message_get_signature(reply, true), stdout);
2015 fputc(' ', stdout);
2016
2017 r = format_cmdline(reply, stdout, false);
2018 if (r < 0)
2019 return bus_log_parse_error(r);
2020
2021 fputc('\n', stdout);
2022 }
2023 }
2024
2025 return 0;
2026 }
2027
2028 static int emit_signal(int argc, char **argv, void *userdata) {
2029 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2030 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
2031 int r;
2032
2033 r = acquire_bus(false, &bus);
2034 if (r < 0)
2035 return r;
2036
2037 r = sd_bus_message_new_signal(bus, &m, argv[1], argv[2], argv[3]);
2038 if (r < 0)
2039 return bus_log_create_error(r);
2040
2041 if (arg_destination) {
2042 r = sd_bus_message_set_destination(m, arg_destination);
2043 if (r < 0)
2044 return bus_log_create_error(r);
2045 }
2046
2047 r = sd_bus_message_set_auto_start(m, arg_auto_start);
2048 if (r < 0)
2049 return bus_log_create_error(r);
2050
2051 if (!isempty(argv[4])) {
2052 char **p;
2053
2054 p = argv+5;
2055
2056 r = message_append_cmdline(m, argv[4], &p);
2057 if (r < 0)
2058 return r;
2059
2060 if (*p)
2061 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Too many parameters for signature.");
2062 }
2063
2064 r = sd_bus_send(bus, m, NULL);
2065 if (r < 0)
2066 return log_error_errno(r, "Failed to send signal: %m");
2067
2068 return 0;
2069 }
2070
2071 static int get_property(int argc, char **argv, void *userdata) {
2072 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2073 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2074 char **i;
2075 int r;
2076
2077 r = acquire_bus(false, &bus);
2078 if (r < 0)
2079 return r;
2080
2081 STRV_FOREACH(i, argv + 4) {
2082 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
2083 const char *contents = NULL;
2084 char type;
2085
2086 r = sd_bus_call_method(bus, argv[1], argv[2], "org.freedesktop.DBus.Properties", "Get", &error, &reply, "ss", argv[3], *i);
2087 if (r < 0)
2088 return log_error_errno(r, "%s", bus_error_message(&error, r));
2089
2090 r = sd_bus_message_peek_type(reply, &type, &contents);
2091 if (r < 0)
2092 return bus_log_parse_error(r);
2093
2094 r = sd_bus_message_enter_container(reply, 'v', contents);
2095 if (r < 0)
2096 return bus_log_parse_error(r);
2097
2098 if (arg_json != JSON_OFF) {
2099 _cleanup_(json_variant_unrefp) JsonVariant *v = NULL;
2100
2101 if (arg_json != JSON_SHORT)
2102 (void) pager_open(arg_pager_flags);
2103
2104 r = json_transform_variant(reply, contents, &v);
2105 if (r < 0)
2106 return r;
2107
2108 json_dump_with_flags(v, stdout);
2109
2110 } else if (arg_verbose) {
2111 (void) pager_open(arg_pager_flags);
2112
2113 r = bus_message_dump(reply, stdout, BUS_MESSAGE_DUMP_SUBTREE_ONLY);
2114 if (r < 0)
2115 return r;
2116 } else {
2117 fputs(contents, stdout);
2118 fputc(' ', stdout);
2119
2120 r = format_cmdline(reply, stdout, false);
2121 if (r < 0)
2122 return bus_log_parse_error(r);
2123
2124 fputc('\n', stdout);
2125 }
2126
2127 r = sd_bus_message_exit_container(reply);
2128 if (r < 0)
2129 return bus_log_parse_error(r);
2130 }
2131
2132 return 0;
2133 }
2134
2135 static int set_property(int argc, char **argv, void *userdata) {
2136 _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL;
2137 _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL;
2138 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
2139 char **p;
2140 int r;
2141
2142 r = acquire_bus(false, &bus);
2143 if (r < 0)
2144 return r;
2145
2146 r = sd_bus_message_new_method_call(bus, &m, argv[1], argv[2], "org.freedesktop.DBus.Properties", "Set");
2147 if (r < 0)
2148 return bus_log_create_error(r);
2149
2150 r = sd_bus_message_append(m, "ss", argv[3], argv[4]);
2151 if (r < 0)
2152 return bus_log_create_error(r);
2153
2154 r = sd_bus_message_open_container(m, 'v', argv[5]);
2155 if (r < 0)
2156 return bus_log_create_error(r);
2157
2158 p = argv + 6;
2159 r = message_append_cmdline(m, argv[5], &p);
2160 if (r < 0)
2161 return r;
2162
2163 r = sd_bus_message_close_container(m);
2164 if (r < 0)
2165 return bus_log_create_error(r);
2166
2167 if (*p)
2168 return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Too many parameters for signature.");
2169
2170 r = sd_bus_call(bus, m, arg_timeout, &error, NULL);
2171 if (r < 0)
2172 return log_error_errno(r, "%s", bus_error_message(&error, r));
2173
2174 return 0;
2175 }
2176
2177 static int help(void) {
2178 _cleanup_free_ char *link = NULL;
2179 int r;
2180
2181 r = terminal_urlify_man("busctl", "1", &link);
2182 if (r < 0)
2183 return log_oom();
2184
2185 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
2186 "Introspect the bus.\n\n"
2187 " -h --help Show this help\n"
2188 " --version Show package version\n"
2189 " --no-pager Do not pipe output into a pager\n"
2190 " --no-legend Do not show the headers and footers\n"
2191 " --system Connect to system bus\n"
2192 " --user Connect to user bus\n"
2193 " -H --host=[USER@]HOST Operate on remote host\n"
2194 " -M --machine=CONTAINER Operate on local container\n"
2195 " --address=ADDRESS Connect to bus specified by address\n"
2196 " --show-machine Show machine ID column in list\n"
2197 " --unique Only show unique names\n"
2198 " --acquired Only show acquired names\n"
2199 " --activatable Only show activatable names\n"
2200 " --match=MATCH Only show matching messages\n"
2201 " --size=SIZE Maximum length of captured packet\n"
2202 " --list Don't show tree, but simple object path list\n"
2203 " -q --quiet Don't show method call reply\n"
2204 " --verbose Show result values in long format\n"
2205 " --json=MODE Output as JSON\n"
2206 " -j Same as --json=pretty on tty, --json=short otherwise\n"
2207 " --expect-reply=BOOL Expect a method call reply\n"
2208 " --auto-start=BOOL Auto-start destination service\n"
2209 " --allow-interactive-authorization=BOOL\n"
2210 " Allow interactive authorization for operation\n"
2211 " --timeout=SECS Maximum time to wait for method call completion\n"
2212 " --augment-creds=BOOL Extend credential data with data read from /proc/$PID\n"
2213 " --watch-bind=BOOL Wait for bus AF_UNIX socket to be bound in the file\n"
2214 " system\n"
2215 " --destination=SERVICE Destination service of a signal\n"
2216 "\nCommands:\n"
2217 " list List bus names\n"
2218 " status [SERVICE] Show bus service, process or bus owner credentials\n"
2219 " monitor [SERVICE...] Show bus traffic\n"
2220 " capture [SERVICE...] Capture bus traffic as pcap\n"
2221 " tree [SERVICE...] Show object tree of service\n"
2222 " introspect SERVICE OBJECT [INTERFACE]\n"
2223 " call SERVICE OBJECT INTERFACE METHOD [SIGNATURE [ARGUMENT...]]\n"
2224 " Call a method\n"
2225 " emit OBJECT INTERFACE SIGNAL [SIGNATURE [ARGUMENT...]]\n"
2226 " Emit a signal\n"
2227 " get-property SERVICE OBJECT INTERFACE PROPERTY...\n"
2228 " Get property value\n"
2229 " set-property SERVICE OBJECT INTERFACE PROPERTY SIGNATURE ARGUMENT...\n"
2230 " Set property value\n"
2231 " help Show this help\n"
2232 "\nSee the %s for details.\n"
2233 , program_invocation_short_name
2234 , link
2235 );
2236
2237 return 0;
2238 }
2239
2240 static int verb_help(int argc, char **argv, void *userdata) {
2241 return help();
2242 }
2243
2244 static int parse_argv(int argc, char *argv[]) {
2245
2246 enum {
2247 ARG_VERSION = 0x100,
2248 ARG_NO_PAGER,
2249 ARG_NO_LEGEND,
2250 ARG_SYSTEM,
2251 ARG_USER,
2252 ARG_ADDRESS,
2253 ARG_MATCH,
2254 ARG_SHOW_MACHINE,
2255 ARG_UNIQUE,
2256 ARG_ACQUIRED,
2257 ARG_ACTIVATABLE,
2258 ARG_SIZE,
2259 ARG_LIST,
2260 ARG_VERBOSE,
2261 ARG_EXPECT_REPLY,
2262 ARG_AUTO_START,
2263 ARG_ALLOW_INTERACTIVE_AUTHORIZATION,
2264 ARG_TIMEOUT,
2265 ARG_AUGMENT_CREDS,
2266 ARG_WATCH_BIND,
2267 ARG_JSON,
2268 ARG_DESTINATION,
2269 };
2270
2271 static const struct option options[] = {
2272 { "help", no_argument, NULL, 'h' },
2273 { "version", no_argument, NULL, ARG_VERSION },
2274 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
2275 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
2276 { "system", no_argument, NULL, ARG_SYSTEM },
2277 { "user", no_argument, NULL, ARG_USER },
2278 { "address", required_argument, NULL, ARG_ADDRESS },
2279 { "show-machine", no_argument, NULL, ARG_SHOW_MACHINE },
2280 { "unique", no_argument, NULL, ARG_UNIQUE },
2281 { "acquired", no_argument, NULL, ARG_ACQUIRED },
2282 { "activatable", no_argument, NULL, ARG_ACTIVATABLE },
2283 { "match", required_argument, NULL, ARG_MATCH },
2284 { "host", required_argument, NULL, 'H' },
2285 { "machine", required_argument, NULL, 'M' },
2286 { "size", required_argument, NULL, ARG_SIZE },
2287 { "list", no_argument, NULL, ARG_LIST },
2288 { "quiet", no_argument, NULL, 'q' },
2289 { "verbose", no_argument, NULL, ARG_VERBOSE },
2290 { "expect-reply", required_argument, NULL, ARG_EXPECT_REPLY },
2291 { "auto-start", required_argument, NULL, ARG_AUTO_START },
2292 { "allow-interactive-authorization", required_argument, NULL, ARG_ALLOW_INTERACTIVE_AUTHORIZATION },
2293 { "timeout", required_argument, NULL, ARG_TIMEOUT },
2294 { "augment-creds", required_argument, NULL, ARG_AUGMENT_CREDS },
2295 { "watch-bind", required_argument, NULL, ARG_WATCH_BIND },
2296 { "json", required_argument, NULL, ARG_JSON },
2297 { "destination", required_argument, NULL, ARG_DESTINATION },
2298 {},
2299 };
2300
2301 int c, r;
2302
2303 assert(argc >= 0);
2304 assert(argv);
2305
2306 while ((c = getopt_long(argc, argv, "hH:M:qj", options, NULL)) >= 0)
2307
2308 switch (c) {
2309
2310 case 'h':
2311 return help();
2312
2313 case ARG_VERSION:
2314 return version();
2315
2316 case ARG_NO_PAGER:
2317 arg_pager_flags |= PAGER_DISABLE;
2318 break;
2319
2320 case ARG_NO_LEGEND:
2321 arg_legend = false;
2322 break;
2323
2324 case ARG_USER:
2325 arg_user = true;
2326 break;
2327
2328 case ARG_SYSTEM:
2329 arg_user = false;
2330 break;
2331
2332 case ARG_ADDRESS:
2333 arg_address = optarg;
2334 break;
2335
2336 case ARG_SHOW_MACHINE:
2337 arg_show_machine = true;
2338 break;
2339
2340 case ARG_UNIQUE:
2341 arg_unique = true;
2342 break;
2343
2344 case ARG_ACQUIRED:
2345 arg_acquired = true;
2346 break;
2347
2348 case ARG_ACTIVATABLE:
2349 arg_activatable = true;
2350 break;
2351
2352 case ARG_MATCH:
2353 if (strv_extend(&arg_matches, optarg) < 0)
2354 return log_oom();
2355 break;
2356
2357 case ARG_SIZE: {
2358 uint64_t sz;
2359
2360 r = parse_size(optarg, 1024, &sz);
2361 if (r < 0)
2362 return log_error_errno(r, "Failed to parse size '%s': %m", optarg);
2363
2364 if ((uint64_t) (size_t) sz != sz)
2365 return log_error_errno(SYNTHETIC_ERRNO(E2BIG),
2366 "Size out of range.");
2367
2368 arg_snaplen = (size_t) sz;
2369 break;
2370 }
2371
2372 case ARG_LIST:
2373 arg_list = true;
2374 break;
2375
2376 case 'H':
2377 arg_transport = BUS_TRANSPORT_REMOTE;
2378 arg_host = optarg;
2379 break;
2380
2381 case 'M':
2382 arg_transport = BUS_TRANSPORT_MACHINE;
2383 arg_host = optarg;
2384 break;
2385
2386 case 'q':
2387 arg_quiet = true;
2388 break;
2389
2390 case ARG_VERBOSE:
2391 arg_verbose = true;
2392 break;
2393
2394 case ARG_EXPECT_REPLY:
2395 r = parse_boolean(optarg);
2396 if (r < 0)
2397 return log_error_errno(r, "Failed to parse --expect-reply= parameter '%s': %m", optarg);
2398
2399 arg_expect_reply = r;
2400 break;
2401
2402 case ARG_AUTO_START:
2403 r = parse_boolean(optarg);
2404 if (r < 0)
2405 return log_error_errno(r, "Failed to parse --auto-start= parameter '%s': %m", optarg);
2406
2407 arg_auto_start = r;
2408 break;
2409
2410 case ARG_ALLOW_INTERACTIVE_AUTHORIZATION:
2411 r = parse_boolean(optarg);
2412 if (r < 0)
2413 return log_error_errno(r, "Failed to parse --allow-interactive-authorization= parameter '%s': %m", optarg);
2414
2415 arg_allow_interactive_authorization = r;
2416 break;
2417
2418 case ARG_TIMEOUT:
2419 r = parse_sec(optarg, &arg_timeout);
2420 if (r < 0)
2421 return log_error_errno(r, "Failed to parse --timeout= parameter '%s': %m", optarg);
2422
2423 break;
2424
2425 case ARG_AUGMENT_CREDS:
2426 r = parse_boolean(optarg);
2427 if (r < 0)
2428 return log_error_errno(r, "Failed to parse --augment-creds= parameter '%s': %m", optarg);
2429
2430 arg_augment_creds = r;
2431 break;
2432
2433 case ARG_WATCH_BIND:
2434 r = parse_boolean(optarg);
2435 if (r < 0)
2436 return log_error_errno(r, "Failed to parse --watch-bind= parameter '%s': %m", optarg);
2437
2438 arg_watch_bind = r;
2439 break;
2440
2441 case 'j':
2442 if (on_tty())
2443 arg_json = JSON_PRETTY;
2444 else
2445 arg_json = JSON_SHORT;
2446 break;
2447
2448 case ARG_JSON:
2449 if (streq(optarg, "short"))
2450 arg_json = JSON_SHORT;
2451 else if (streq(optarg, "pretty"))
2452 arg_json = JSON_PRETTY;
2453 else if (streq(optarg, "help")) {
2454 fputs("short\n"
2455 "pretty\n", stdout);
2456 return 0;
2457 } else
2458 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
2459 "Unknown JSON out mode: %s",
2460 optarg);
2461
2462 break;
2463
2464 case ARG_DESTINATION:
2465 arg_destination = optarg;
2466 break;
2467
2468 case '?':
2469 return -EINVAL;
2470
2471 default:
2472 assert_not_reached("Unhandled option");
2473 }
2474
2475 return 1;
2476 }
2477
2478 static int busctl_main(int argc, char *argv[]) {
2479
2480 static const Verb verbs[] = {
2481 { "list", VERB_ANY, 1, VERB_DEFAULT, list_bus_names },
2482 { "status", VERB_ANY, 2, 0, status },
2483 { "monitor", VERB_ANY, VERB_ANY, 0, verb_monitor },
2484 { "capture", VERB_ANY, VERB_ANY, 0, verb_capture },
2485 { "tree", VERB_ANY, VERB_ANY, 0, tree },
2486 { "introspect", 3, 4, 0, introspect },
2487 { "call", 5, VERB_ANY, 0, call },
2488 { "emit", 4, VERB_ANY, 0, emit_signal },
2489 { "get-property", 5, VERB_ANY, 0, get_property },
2490 { "set-property", 6, VERB_ANY, 0, set_property },
2491 { "help", VERB_ANY, VERB_ANY, 0, verb_help },
2492 {}
2493 };
2494
2495 return dispatch_verb(argc, argv, verbs, NULL);
2496 }
2497
2498 static int run(int argc, char *argv[]) {
2499 int r;
2500
2501 log_parse_environment();
2502 log_open();
2503
2504 r = parse_argv(argc, argv);
2505 if (r <= 0)
2506 return r;
2507
2508 return busctl_main(argc, argv);
2509 }
2510
2511 DEFINE_MAIN_FUNCTION(run);