1 /* SPDX-License-Identifier: LGPL-2.1+ */
7 #include "sd-netlink.h"
10 #include "alloc-util.h"
11 #include "bus-common-errors.h"
12 #include "bus-error.h"
14 #include "dns-domain.h"
16 #include "gcrypt-util.h"
17 #include "in-addr-util.h"
18 #include "main-func.h"
20 #include "netlink-util.h"
22 #include "parse-util.h"
23 #include "pretty-print.h"
24 #include "resolvconf-compat.h"
25 #include "resolvectl.h"
26 #include "resolved-def.h"
27 #include "resolved-dns-packet.h"
28 #include "string-table.h"
30 #include "terminal-util.h"
33 static int arg_family
= AF_UNSPEC
;
34 static int arg_ifindex
= 0;
35 static char *arg_ifname
= NULL
;
36 static uint16_t arg_type
= 0;
37 static uint16_t arg_class
= 0;
38 static bool arg_legend
= true;
39 static uint64_t arg_flags
= 0;
40 static PagerFlags arg_pager_flags
= 0;
41 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
42 static const char *arg_service_family
= NULL
;
44 typedef enum RawType
{
49 static RawType arg_raw
= RAW_NONE
;
51 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
53 char **arg_set_dns
= NULL
;
54 char **arg_set_domain
= NULL
;
55 static const char *arg_set_llmnr
= NULL
;
56 static const char *arg_set_mdns
= NULL
;
57 static const char *arg_set_dns_over_tls
= NULL
;
58 static const char *arg_set_dnssec
= NULL
;
59 static char **arg_set_nta
= NULL
;
61 STATIC_DESTRUCTOR_REGISTER(arg_ifname
, freep
);
62 STATIC_DESTRUCTOR_REGISTER(arg_set_dns
, strv_freep
);
63 STATIC_DESTRUCTOR_REGISTER(arg_set_domain
, strv_freep
);
64 STATIC_DESTRUCTOR_REGISTER(arg_set_nta
, strv_freep
);
66 typedef enum StatusMode
{
77 static int parse_ifindex_and_warn(const char *s
) {
82 if (parse_ifindex(s
, &ifi
) < 0) {
83 ifi
= if_nametoindex(s
);
85 return log_error_errno(errno
, "Unknown interface '%s': %m", s
);
91 int ifname_mangle(const char *s
) {
92 _cleanup_free_
char *iface
= NULL
;
100 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
101 iface
= strndup(s
, dot
- s
);
108 if (parse_ifindex(iface
, &ifi
) < 0) {
109 ifi
= if_nametoindex(iface
);
111 if (errno
== ENODEV
&& arg_ifindex_permissive
) {
112 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
116 return log_error_errno(errno
, "Unknown interface '%s': %m", iface
);
120 if (arg_ifindex
> 0 && arg_ifindex
!= ifi
) {
121 log_error("Specified multiple different interfaces. Refusing.");
126 free_and_replace(arg_ifname
, iface
);
131 static void print_source(uint64_t flags
, usec_t rtt
) {
132 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
140 fputs("\n-- Information acquired via", stdout
);
143 printf(" protocol%s%s%s%s%s",
144 flags
& SD_RESOLVED_DNS
? " DNS" :"",
145 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
146 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
147 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
148 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
150 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
152 printf(" in %s", rtt_str
);
157 printf("-- Data is authenticated: %s\n", yes_no(flags
& SD_RESOLVED_AUTHENTICATED
));
160 static void print_ifindex_comment(int printed_so_far
, int ifindex
) {
161 char ifname
[IF_NAMESIZE
];
166 if (!if_indextoname(ifindex
, ifname
))
167 log_warning_errno(errno
, "Failed to resolve interface name for index %i, ignoring: %m", ifindex
);
169 printf("%*s-- link: %s",
170 60 > printed_so_far
? 60 - printed_so_far
: 0, " ", /* Align comment to the 60th column */
174 static int resolve_host(sd_bus
*bus
, const char *name
) {
175 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
176 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
177 const char *canonical
= NULL
;
185 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
187 r
= sd_bus_message_new_method_call(
190 "org.freedesktop.resolve1",
191 "/org/freedesktop/resolve1",
192 "org.freedesktop.resolve1.Manager",
195 return bus_log_create_error(r
);
197 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
199 return bus_log_create_error(r
);
201 ts
= now(CLOCK_MONOTONIC
);
203 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
205 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
207 ts
= now(CLOCK_MONOTONIC
) - ts
;
209 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
211 return bus_log_parse_error(r
);
213 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
214 _cleanup_free_
char *pretty
= NULL
;
215 int ifindex
, family
, k
;
219 assert_cc(sizeof(int) == sizeof(int32_t));
221 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
223 return bus_log_parse_error(r
);
225 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
227 return bus_log_parse_error(r
);
229 r
= sd_bus_message_exit_container(reply
);
231 return bus_log_parse_error(r
);
233 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
234 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
238 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
239 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
243 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
245 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
247 k
= printf("%*s%s %s",
248 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
251 print_ifindex_comment(k
, ifindex
);
257 return bus_log_parse_error(r
);
259 r
= sd_bus_message_exit_container(reply
);
261 return bus_log_parse_error(r
);
263 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
265 return bus_log_parse_error(r
);
267 if (!streq(name
, canonical
))
268 printf("%*s%s (%s)\n",
269 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
273 log_error("%s: no addresses found", name
);
277 print_source(flags
, ts
);
282 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
283 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
284 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
285 _cleanup_free_
char *pretty
= NULL
;
292 assert(IN_SET(family
, AF_INET
, AF_INET6
));
296 ifindex
= arg_ifindex
;
298 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
302 log_debug("Resolving %s.", pretty
);
304 r
= sd_bus_message_new_method_call(
307 "org.freedesktop.resolve1",
308 "/org/freedesktop/resolve1",
309 "org.freedesktop.resolve1.Manager",
312 return bus_log_create_error(r
);
314 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
316 return bus_log_create_error(r
);
318 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
320 return bus_log_create_error(r
);
322 r
= sd_bus_message_append(req
, "t", arg_flags
);
324 return bus_log_create_error(r
);
326 ts
= now(CLOCK_MONOTONIC
);
328 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
330 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
332 ts
= now(CLOCK_MONOTONIC
) - ts
;
334 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
336 return bus_log_create_error(r
);
338 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
342 assert_cc(sizeof(int) == sizeof(int32_t));
344 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
348 r
= sd_bus_message_exit_container(reply
);
352 k
= printf("%*s%s %s",
353 (int) strlen(pretty
), c
== 0 ? pretty
: "",
357 print_ifindex_comment(k
, ifindex
);
363 return bus_log_parse_error(r
);
365 r
= sd_bus_message_exit_container(reply
);
367 return bus_log_parse_error(r
);
369 r
= sd_bus_message_read(reply
, "t", &flags
);
371 return bus_log_parse_error(r
);
374 log_error("%s: no names found", pretty
);
378 print_source(flags
, ts
);
383 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
384 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
385 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
388 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
392 p
->refuse_compression
= true;
394 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
398 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
400 return log_error_errno(r
, "Failed to parse RR: %m");
402 if (arg_raw
== RAW_PAYLOAD
) {
406 k
= dns_resource_record_payload(rr
, &data
);
408 return log_error_errno(k
, "Cannot dump RR: %m");
409 fwrite(data
, 1, k
, stdout
);
414 s
= dns_resource_record_to_string(rr
);
419 print_ifindex_comment(k
, ifindex
);
426 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
427 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
428 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
433 bool needs_authentication
= false;
437 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
439 r
= sd_bus_message_new_method_call(
442 "org.freedesktop.resolve1",
443 "/org/freedesktop/resolve1",
444 "org.freedesktop.resolve1.Manager",
447 return bus_log_create_error(r
);
449 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
451 return bus_log_create_error(r
);
453 ts
= now(CLOCK_MONOTONIC
);
455 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
457 if (warn_missing
|| r
!= -ENXIO
)
458 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
462 ts
= now(CLOCK_MONOTONIC
) - ts
;
464 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
466 return bus_log_parse_error(r
);
468 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
474 assert_cc(sizeof(int) == sizeof(int32_t));
476 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
478 return bus_log_parse_error(r
);
480 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
482 return bus_log_parse_error(r
);
484 r
= sd_bus_message_exit_container(reply
);
486 return bus_log_parse_error(r
);
488 if (arg_raw
== RAW_PACKET
) {
489 uint64_t u64
= htole64(l
);
491 fwrite(&u64
, sizeof(u64
), 1, stdout
);
492 fwrite(d
, 1, l
, stdout
);
494 r
= output_rr_packet(d
, l
, ifindex
);
499 if (dns_type_needs_authentication(t
))
500 needs_authentication
= true;
505 return bus_log_parse_error(r
);
507 r
= sd_bus_message_exit_container(reply
);
509 return bus_log_parse_error(r
);
511 r
= sd_bus_message_read(reply
, "t", &flags
);
513 return bus_log_parse_error(r
);
517 log_error("%s: no records found", name
);
521 print_source(flags
, ts
);
523 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
526 fprintf(stderr
, "\n%s"
527 "WARNING: The resources shown contain cryptographic key data which could not be\n"
528 " authenticated. It is not suitable to authenticate any communication.\n"
529 " This is usually indication that DNSSEC authentication was not enabled\n"
530 " or is not available for the selected protocol or DNS servers.%s\n",
531 ansi_highlight_red(),
538 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
539 uint16_t type
= 0, class = 0;
540 const char *p
, *q
, *n
;
545 assert(startswith(name
, "dns:"));
547 /* Parse RFC 4501 dns: URIs */
557 e
= strchr(p
+ 2, '/');
562 log_warning("DNS authority specification not supported; ignoring specified authority.");
569 n
= strndupa(p
, q
- p
);
575 f
= startswith_no_case(q
, "class=");
577 _cleanup_free_
char *t
= NULL
;
581 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
582 "DNS class specified twice.");
584 e
= strchrnul(f
, ';');
585 t
= strndup(f
, e
- f
);
589 r
= dns_class_from_string(t
);
591 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
592 "Unknown DNS class %s.", t
);
604 f
= startswith_no_case(q
, "type=");
606 _cleanup_free_
char *t
= NULL
;
610 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
611 "DNS type specified twice.");
613 e
= strchrnul(f
, ';');
614 t
= strndup(f
, e
- f
);
618 r
= dns_type_from_string(t
);
620 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
621 "Unknown DNS type %s.", t
);
639 class = arg_class
?: DNS_CLASS_IN
;
641 type
= arg_type
?: DNS_TYPE_A
;
643 return resolve_record(bus
, n
, class, type
, true);
646 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
647 "Invalid DNS URI: %s", name
);
650 static int verb_query(int argc
, char **argv
, void *userdata
) {
651 sd_bus
*bus
= userdata
;
656 STRV_FOREACH(p
, argv
+ 1) {
657 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
663 STRV_FOREACH(p
, argv
+ 1) {
664 if (startswith(*p
, "dns:"))
665 q
= resolve_rfc4501(bus
, *p
);
668 union in_addr_union a
;
670 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
672 q
= resolve_address(bus
, family
, &a
, ifindex
);
674 q
= resolve_host(bus
, *p
);
683 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
684 const char *canonical_name
, *canonical_type
, *canonical_domain
;
685 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
686 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
697 name
= empty_to_null(name
);
698 type
= empty_to_null(type
);
701 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
703 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
705 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
707 r
= sd_bus_message_new_method_call(
710 "org.freedesktop.resolve1",
711 "/org/freedesktop/resolve1",
712 "org.freedesktop.resolve1.Manager",
715 return bus_log_create_error(r
);
717 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
719 return bus_log_create_error(r
);
721 ts
= now(CLOCK_MONOTONIC
);
723 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
725 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
727 ts
= now(CLOCK_MONOTONIC
) - ts
;
729 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
731 return bus_log_parse_error(r
);
734 (name
? strlen(name
) + 1 : 0) +
735 (type
? strlen(type
) + 1 : 0) +
739 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
740 uint16_t priority
, weight
, port
;
741 const char *hostname
, *canonical
;
743 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
745 return bus_log_parse_error(r
);
748 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
750 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
752 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
753 (int) strlen(domain
), c
== 0 ? domain
: "",
758 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
760 return bus_log_parse_error(r
);
762 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
763 _cleanup_free_
char *pretty
= NULL
;
764 int ifindex
, family
, k
;
767 assert_cc(sizeof(int) == sizeof(int32_t));
769 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
771 return bus_log_parse_error(r
);
773 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
775 return bus_log_parse_error(r
);
777 r
= sd_bus_message_exit_container(reply
);
779 return bus_log_parse_error(r
);
781 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
782 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
786 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
787 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
791 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
793 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
795 k
= printf("%*s%s", (int) indent
, "", pretty
);
796 print_ifindex_comment(k
, ifindex
);
800 return bus_log_parse_error(r
);
802 r
= sd_bus_message_exit_container(reply
);
804 return bus_log_parse_error(r
);
806 r
= sd_bus_message_read(reply
, "s", &canonical
);
808 return bus_log_parse_error(r
);
810 if (!streq(hostname
, canonical
))
811 printf("%*s(%s)\n", (int) indent
, "", canonical
);
813 r
= sd_bus_message_exit_container(reply
);
815 return bus_log_parse_error(r
);
820 return bus_log_parse_error(r
);
822 r
= sd_bus_message_exit_container(reply
);
824 return bus_log_parse_error(r
);
826 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
828 return bus_log_parse_error(r
);
830 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
831 _cleanup_free_
char *escaped
= NULL
;
833 escaped
= cescape_length(p
, sz
);
837 printf("%*s%s\n", (int) indent
, "", escaped
);
840 return bus_log_parse_error(r
);
842 r
= sd_bus_message_exit_container(reply
);
844 return bus_log_parse_error(r
);
846 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
848 return bus_log_parse_error(r
);
850 canonical_name
= empty_to_null(canonical_name
);
851 canonical_type
= empty_to_null(canonical_type
);
853 if (!streq_ptr(name
, canonical_name
) ||
854 !streq_ptr(type
, canonical_type
) ||
855 !streq_ptr(domain
, canonical_domain
)) {
857 printf("%*s(", (int) indent
, "");
860 printf("%s/", canonical_name
);
862 printf("%s/", canonical_type
);
864 printf("%s)\n", canonical_domain
);
867 print_source(flags
, ts
);
872 static int verb_service(int argc
, char **argv
, void *userdata
) {
873 sd_bus
*bus
= userdata
;
876 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
878 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
880 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
883 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
884 const char *domain
, *full
;
886 _cleanup_free_
char *hashed
= NULL
;
891 domain
= strrchr(address
, '@');
893 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
894 "Address does not contain '@': \"%s\"", address
);
895 if (domain
== address
|| domain
[1] == '\0')
896 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
897 "Address starts or ends with '@': \"%s\"", address
);
900 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
902 return log_error_errno(r
, "Hashing failed: %m");
904 strshorten(hashed
, 56);
906 full
= strjoina(hashed
, "._openpgpkey.", domain
);
907 log_debug("Looking up \"%s\".", full
);
909 r
= resolve_record(bus
, full
,
910 arg_class
?: DNS_CLASS_IN
,
911 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
913 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
914 hashed
= mfree(hashed
);
915 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
917 return log_error_errno(r
, "Hashing failed: %m");
919 full
= strjoina(hashed
, "._openpgpkey.", domain
);
920 log_debug("Looking up \"%s\".", full
);
922 return resolve_record(bus
, full
,
923 arg_class
?: DNS_CLASS_IN
,
924 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
930 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
931 sd_bus
*bus
= userdata
;
935 STRV_FOREACH(p
, argv
+ 1) {
936 q
= resolve_openpgp(bus
, *p
);
944 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
946 uint16_t port_num
= 443;
947 _cleanup_free_
char *full
= NULL
;
953 port
= strrchr(address
, ':');
955 r
= parse_ip_port(port
+ 1, &port_num
);
957 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
959 address
= strndupa(address
, port
- address
);
962 r
= asprintf(&full
, "_%u._%s.%s",
969 log_debug("Looking up \"%s\".", full
);
971 return resolve_record(bus
, full
,
972 arg_class
?: DNS_CLASS_IN
,
973 arg_type
?: DNS_TYPE_TLSA
, true);
976 static bool service_family_is_valid(const char *s
) {
977 return STR_IN_SET(s
, "tcp", "udp", "sctp");
980 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
981 sd_bus
*bus
= userdata
;
982 char **p
, **args
= argv
+ 1;
983 const char *family
= "tcp";
986 if (service_family_is_valid(argv
[1])) {
991 STRV_FOREACH(p
, args
) {
992 q
= resolve_tlsa(bus
, family
, *p
);
1000 static int show_statistics(int argc
, char **argv
, void *userdata
) {
1001 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1002 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
1003 sd_bus
*bus
= userdata
;
1004 uint64_t n_current_transactions
, n_total_transactions
,
1005 cache_size
, n_cache_hit
, n_cache_miss
,
1006 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
1007 int r
, dnssec_supported
;
1011 r
= sd_bus_get_property_trivial(bus
,
1012 "org.freedesktop.resolve1",
1013 "/org/freedesktop/resolve1",
1014 "org.freedesktop.resolve1.Manager",
1020 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
1022 printf("DNSSEC supported by current servers: %s%s%s\n\n",
1024 yes_no(dnssec_supported
),
1027 r
= sd_bus_get_property(bus
,
1028 "org.freedesktop.resolve1",
1029 "/org/freedesktop/resolve1",
1030 "org.freedesktop.resolve1.Manager",
1031 "TransactionStatistics",
1036 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
1038 r
= sd_bus_message_read(reply
, "(tt)",
1039 &n_current_transactions
,
1040 &n_total_transactions
);
1042 return bus_log_parse_error(r
);
1044 printf("%sTransactions%s\n"
1045 "Current Transactions: %" PRIu64
"\n"
1046 " Total Transactions: %" PRIu64
"\n",
1049 n_current_transactions
,
1050 n_total_transactions
);
1052 reply
= sd_bus_message_unref(reply
);
1054 r
= sd_bus_get_property(bus
,
1055 "org.freedesktop.resolve1",
1056 "/org/freedesktop/resolve1",
1057 "org.freedesktop.resolve1.Manager",
1063 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1065 r
= sd_bus_message_read(reply
, "(ttt)",
1070 return bus_log_parse_error(r
);
1072 printf("\n%sCache%s\n"
1073 " Current Cache Size: %" PRIu64
"\n"
1074 " Cache Hits: %" PRIu64
"\n"
1075 " Cache Misses: %" PRIu64
"\n",
1082 reply
= sd_bus_message_unref(reply
);
1084 r
= sd_bus_get_property(bus
,
1085 "org.freedesktop.resolve1",
1086 "/org/freedesktop/resolve1",
1087 "org.freedesktop.resolve1.Manager",
1093 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1095 r
= sd_bus_message_read(reply
, "(tttt)",
1099 &n_dnssec_indeterminate
);
1101 return bus_log_parse_error(r
);
1103 printf("\n%sDNSSEC Verdicts%s\n"
1104 " Secure: %" PRIu64
"\n"
1105 " Insecure: %" PRIu64
"\n"
1106 " Bogus: %" PRIu64
"\n"
1107 " Indeterminate: %" PRIu64
"\n",
1113 n_dnssec_indeterminate
);
1118 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1119 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1120 sd_bus
*bus
= userdata
;
1123 r
= sd_bus_call_method(bus
,
1124 "org.freedesktop.resolve1",
1125 "/org/freedesktop/resolve1",
1126 "org.freedesktop.resolve1.Manager",
1132 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1137 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1138 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1139 sd_bus
*bus
= userdata
;
1142 r
= sd_bus_call_method(bus
,
1143 "org.freedesktop.resolve1",
1144 "/org/freedesktop/resolve1",
1145 "org.freedesktop.resolve1.Manager",
1151 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1156 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1157 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1158 sd_bus
*bus
= userdata
;
1161 r
= sd_bus_call_method(bus
,
1162 "org.freedesktop.resolve1",
1163 "/org/freedesktop/resolve1",
1164 "org.freedesktop.resolve1.Manager",
1165 "ResetServerFeatures",
1170 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1175 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1176 _cleanup_free_
char *pretty
= NULL
;
1177 int ifindex
, family
, r
;
1184 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? "iiay" : "iay");
1189 r
= sd_bus_message_read(m
, "i", &ifindex
);
1194 r
= sd_bus_message_read(m
, "i", &family
);
1198 r
= sd_bus_message_read_array(m
, 'y', &a
, &sz
);
1202 r
= sd_bus_message_exit_container(m
);
1206 if (with_ifindex
&& ifindex
!= 0) {
1207 /* only show the global ones here */
1212 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
1213 log_debug("Unexpected family, ignoring: %i", family
);
1219 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
1220 log_debug("Address size mismatch, ignoring.");
1226 r
= in_addr_to_string(family
, a
, &pretty
);
1230 *ret
= TAKE_PTR(pretty
);
1235 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1236 char ***l
= userdata
;
1244 r
= sd_bus_message_enter_container(m
, 'a', "(iay)");
1249 char *pretty
= NULL
;
1251 r
= read_dns_server_one(m
, false, &pretty
);
1257 if (isempty(pretty
))
1260 r
= strv_consume(l
, pretty
);
1265 r
= sd_bus_message_exit_container(m
);
1272 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1276 return read_dns_server_one(m
, false, userdata
);
1279 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1280 _cleanup_free_
char *str
= NULL
;
1281 int ifindex
, route_only
, r
;
1288 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1290 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1294 if (with_ifindex
&& ifindex
!= 0) {
1295 /* only show the global ones here */
1301 str
= strappend("~", domain
);
1303 str
= strdup(domain
);
1307 *ret
= TAKE_PTR(str
);
1312 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1313 char ***l
= userdata
;
1321 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1326 char *pretty
= NULL
;
1328 r
= read_domain_one(m
, false, &pretty
);
1334 if (isempty(pretty
))
1337 r
= strv_consume(l
, pretty
);
1342 r
= sd_bus_message_exit_container(m
);
1349 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1352 printf("%sLink %i (%s)%s:",
1353 ansi_highlight(), ifindex
, ifname
, ansi_normal());
1364 uint64_t scopes_mask
;
1367 const char *dns_over_tls
;
1373 bool dnssec_supported
;
1376 static void link_info_clear(struct link_info
*p
) {
1377 free(p
->current_dns
);
1379 strv_free(p
->domains
);
1383 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1384 static const struct bus_properties_map property_map
[] = {
1385 { "ScopesMask", "t", NULL
, offsetof(struct link_info
, scopes_mask
) },
1386 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(struct link_info
, dns
) },
1387 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(struct link_info
, current_dns
) },
1388 { "Domains", "a(sb)", map_link_domains
, offsetof(struct link_info
, domains
) },
1389 { "LLMNR", "s", NULL
, offsetof(struct link_info
, llmnr
) },
1390 { "MulticastDNS", "s", NULL
, offsetof(struct link_info
, mdns
) },
1391 { "DNSOverTLS", "s", NULL
, offsetof(struct link_info
, dns_over_tls
) },
1392 { "DNSSEC", "s", NULL
, offsetof(struct link_info
, dnssec
) },
1393 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct link_info
, ntas
) },
1394 { "DNSSECSupported", "b", NULL
, offsetof(struct link_info
, dnssec_supported
) },
1397 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1398 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1399 _cleanup_(link_info_clear
) struct link_info link_info
= {};
1400 _cleanup_free_
char *ifi
= NULL
, *p
= NULL
;
1401 char ifname
[IF_NAMESIZE
] = "";
1406 assert(ifindex
> 0);
1409 if (!if_indextoname(ifindex
, ifname
))
1410 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1415 if (asprintf(&ifi
, "%i", ifindex
) < 0)
1418 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1422 r
= bus_map_all_properties(bus
,
1423 "org.freedesktop.resolve1",
1426 BUS_MAP_BOOLEAN_AS_BOOL
,
1431 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1433 (void) pager_open(arg_pager_flags
);
1435 if (mode
== STATUS_DNS
)
1436 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns
);
1438 if (mode
== STATUS_DOMAIN
)
1439 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1441 if (mode
== STATUS_NTA
)
1442 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1444 if (mode
== STATUS_LLMNR
) {
1445 printf("%sLink %i (%s)%s: %s\n",
1446 ansi_highlight(), ifindex
, name
, ansi_normal(),
1447 strna(link_info
.llmnr
));
1452 if (mode
== STATUS_MDNS
) {
1453 printf("%sLink %i (%s)%s: %s\n",
1454 ansi_highlight(), ifindex
, name
, ansi_normal(),
1455 strna(link_info
.mdns
));
1460 if (mode
== STATUS_PRIVATE
) {
1461 printf("%sLink %i (%s)%s: %s\n",
1462 ansi_highlight(), ifindex
, name
, ansi_normal(),
1463 strna(link_info
.dns_over_tls
));
1468 if (mode
== STATUS_DNSSEC
) {
1469 printf("%sLink %i (%s)%s: %s\n",
1470 ansi_highlight(), ifindex
, name
, ansi_normal(),
1471 strna(link_info
.dnssec
));
1476 if (empty_line
&& *empty_line
)
1477 fputc('\n', stdout
);
1479 printf("%sLink %i (%s)%s\n",
1480 ansi_highlight(), ifindex
, name
, ansi_normal());
1482 if (link_info
.scopes_mask
== 0)
1483 printf(" Current Scopes: none\n");
1485 printf(" Current Scopes:%s%s%s%s%s\n",
1486 link_info
.scopes_mask
& SD_RESOLVED_DNS
? " DNS" : "",
1487 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
1488 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
1489 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
1490 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
1492 printf(" LLMNR setting: %s\n"
1493 "MulticastDNS setting: %s\n"
1494 " DNSOverTLS setting: %s\n"
1495 " DNSSEC setting: %s\n"
1496 " DNSSEC supported: %s\n",
1497 strna(link_info
.llmnr
),
1498 strna(link_info
.mdns
),
1499 strna(link_info
.dns_over_tls
),
1500 strna(link_info
.dnssec
),
1501 yes_no(link_info
.dnssec_supported
));
1503 if (link_info
.current_dns
)
1504 printf(" Current DNS Server: %s\n", link_info
.current_dns
);
1506 STRV_FOREACH(i
, link_info
.dns
) {
1508 i
== link_info
.dns
? "DNS Servers:" : " ",
1512 STRV_FOREACH(i
, link_info
.domains
) {
1514 i
== link_info
.domains
? "DNS Domain:" : " ",
1518 STRV_FOREACH(i
, link_info
.ntas
) {
1520 i
== link_info
.ntas
? "DNSSEC NTA:" : " ",
1530 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1531 char ***l
= userdata
;
1539 r
= sd_bus_message_enter_container(m
, 'a', "(iiay)");
1544 char *pretty
= NULL
;
1546 r
= read_dns_server_one(m
, true, &pretty
);
1552 if (isempty(pretty
))
1555 r
= strv_consume(l
, pretty
);
1560 r
= sd_bus_message_exit_container(m
);
1567 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1571 return read_dns_server_one(m
, true, userdata
);
1574 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1575 char ***l
= userdata
;
1583 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1588 char *pretty
= NULL
;
1590 r
= read_domain_one(m
, true, &pretty
);
1596 if (isempty(pretty
))
1599 r
= strv_consume(l
, pretty
);
1604 r
= sd_bus_message_exit_container(m
);
1611 static int status_print_strv_global(char **p
) {
1614 printf("%sGlobal%s:", ansi_highlight(), ansi_normal());
1624 struct global_info
{
1627 char **fallback_dns
;
1632 const char *dns_over_tls
;
1634 bool dnssec_supported
;
1637 static void global_info_clear(struct global_info
*p
) {
1638 free(p
->current_dns
);
1640 strv_free(p
->fallback_dns
);
1641 strv_free(p
->domains
);
1645 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1646 static const struct bus_properties_map property_map
[] = {
1647 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, dns
) },
1648 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, fallback_dns
) },
1649 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(struct global_info
, current_dns
) },
1650 { "Domains", "a(isb)", map_global_domains
, offsetof(struct global_info
, domains
) },
1651 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct global_info
, ntas
) },
1652 { "LLMNR", "s", NULL
, offsetof(struct global_info
, llmnr
) },
1653 { "MulticastDNS", "s", NULL
, offsetof(struct global_info
, mdns
) },
1654 { "DNSOverTLS", "s", NULL
, offsetof(struct global_info
, dns_over_tls
) },
1655 { "DNSSEC", "s", NULL
, offsetof(struct global_info
, dnssec
) },
1656 { "DNSSECSupported", "b", NULL
, offsetof(struct global_info
, dnssec_supported
) },
1659 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1660 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1661 _cleanup_(global_info_clear
) struct global_info global_info
= {};
1668 r
= bus_map_all_properties(bus
,
1669 "org.freedesktop.resolve1",
1670 "/org/freedesktop/resolve1",
1672 BUS_MAP_BOOLEAN_AS_BOOL
,
1677 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1679 (void) pager_open(arg_pager_flags
);
1681 if (mode
== STATUS_DNS
)
1682 return status_print_strv_global(global_info
.dns
);
1684 if (mode
== STATUS_DOMAIN
)
1685 return status_print_strv_global(global_info
.domains
);
1687 if (mode
== STATUS_NTA
)
1688 return status_print_strv_global(global_info
.ntas
);
1690 if (mode
== STATUS_LLMNR
) {
1691 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1692 strna(global_info
.llmnr
));
1697 if (mode
== STATUS_MDNS
) {
1698 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1699 strna(global_info
.mdns
));
1704 if (mode
== STATUS_PRIVATE
) {
1705 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1706 strna(global_info
.dns_over_tls
));
1711 if (mode
== STATUS_DNSSEC
) {
1712 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1713 strna(global_info
.dnssec
));
1718 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1720 printf(" LLMNR setting: %s\n"
1721 "MulticastDNS setting: %s\n"
1722 " DNSOverTLS setting: %s\n"
1723 " DNSSEC setting: %s\n"
1724 " DNSSEC supported: %s\n",
1725 strna(global_info
.llmnr
),
1726 strna(global_info
.mdns
),
1727 strna(global_info
.dns_over_tls
),
1728 strna(global_info
.dnssec
),
1729 yes_no(global_info
.dnssec_supported
));
1731 if (global_info
.current_dns
)
1732 printf(" Current DNS Server: %s\n", global_info
.current_dns
);
1734 STRV_FOREACH(i
, global_info
.dns
) {
1736 i
== global_info
.dns
? "DNS Servers:" : " ",
1740 STRV_FOREACH(i
, global_info
.fallback_dns
) {
1742 i
== global_info
.fallback_dns
? "Fallback DNS Servers:" : " ",
1746 STRV_FOREACH(i
, global_info
.domains
) {
1748 i
== global_info
.domains
? "DNS Domain:" : " ",
1752 strv_sort(global_info
.ntas
);
1753 STRV_FOREACH(i
, global_info
.ntas
) {
1755 i
== global_info
.ntas
? "DNSSEC NTA:" : " ",
1764 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1765 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1766 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1767 sd_netlink_message
*i
;
1768 bool empty_line
= false;
1773 r
= status_global(bus
, mode
, &empty_line
);
1777 r
= sd_netlink_open(&rtnl
);
1779 return log_error_errno(r
, "Failed to connect to netlink: %m");
1781 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1783 return rtnl_log_create_error(r
);
1785 r
= sd_netlink_message_request_dump(req
, true);
1787 return rtnl_log_create_error(r
);
1789 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1791 return log_error_errno(r
, "Failed to enumerate links: %m");
1794 for (i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1799 q
= sd_netlink_message_get_type(i
, &type
);
1801 return rtnl_log_parse_error(q
);
1803 if (type
!= RTM_NEWLINK
)
1806 q
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1808 return rtnl_log_parse_error(q
);
1810 if (ifindex
== LOOPBACK_IFINDEX
)
1813 q
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1815 return rtnl_log_parse_error(q
);
1817 q
= status_ifindex(bus
, ifindex
, name
, mode
, &empty_line
);
1818 if (q
< 0 && r
>= 0)
1825 static int verb_status(int argc
, char **argv
, void *userdata
) {
1826 sd_bus
*bus
= userdata
;
1831 bool empty_line
= false;
1833 STRV_FOREACH(ifname
, argv
+ 1) {
1836 ifindex
= parse_ifindex_and_warn(*ifname
);
1840 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1845 r
= status_all(bus
, STATUS_ALL
);
1850 static int log_interface_is_managed(int r
, int ifindex
) {
1851 char ifname
[IFNAMSIZ
];
1853 return log_error_errno(r
,
1854 "The specified interface %s is managed by systemd-networkd. Operation refused.\n"
1855 "Please configure DNS settings for systemd-networkd managed interfaces directly in their .network files.",
1856 strna(if_indextoname(ifindex
, ifname
)));
1859 static int verb_dns(int argc
, char **argv
, void *userdata
) {
1860 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1861 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1862 sd_bus
*bus
= userdata
;
1869 r
= ifname_mangle(argv
[1]);
1874 if (arg_ifindex
<= 0)
1875 return status_all(bus
, STATUS_DNS
);
1878 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
1880 r
= sd_bus_message_new_method_call(
1883 "org.freedesktop.resolve1",
1884 "/org/freedesktop/resolve1",
1885 "org.freedesktop.resolve1.Manager",
1888 return bus_log_create_error(r
);
1890 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1892 return bus_log_create_error(r
);
1894 r
= sd_bus_message_open_container(req
, 'a', "(iay)");
1896 return bus_log_create_error(r
);
1898 /* If only argument is the empty string, then call SetLinkDNS() with an
1899 * empty list, which will clear the list of domains for an interface. */
1900 if (!strv_equal(argv
+ 2, STRV_MAKE(""))) {
1901 STRV_FOREACH(p
, argv
+ 2) {
1902 struct in_addr_data data
;
1904 r
= in_addr_from_string_auto(*p
, &data
.family
, &data
.address
);
1906 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
1908 r
= sd_bus_message_open_container(req
, 'r', "iay");
1910 return bus_log_create_error(r
);
1912 r
= sd_bus_message_append(req
, "i", data
.family
);
1914 return bus_log_create_error(r
);
1916 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
1918 return bus_log_create_error(r
);
1920 r
= sd_bus_message_close_container(req
);
1922 return bus_log_create_error(r
);
1926 r
= sd_bus_message_close_container(req
);
1928 return bus_log_create_error(r
);
1930 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
1932 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
1933 return log_interface_is_managed(r
, arg_ifindex
);
1935 if (arg_ifindex_permissive
&&
1936 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1939 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
1945 static int verb_domain(int argc
, char **argv
, void *userdata
) {
1946 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1947 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1948 sd_bus
*bus
= userdata
;
1955 r
= ifname_mangle(argv
[1]);
1960 if (arg_ifindex
<= 0)
1961 return status_all(bus
, STATUS_DOMAIN
);
1964 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
1966 r
= sd_bus_message_new_method_call(
1969 "org.freedesktop.resolve1",
1970 "/org/freedesktop/resolve1",
1971 "org.freedesktop.resolve1.Manager",
1974 return bus_log_create_error(r
);
1976 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1978 return bus_log_create_error(r
);
1980 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
1982 return bus_log_create_error(r
);
1984 /* If only argument is the empty string, then call SetLinkDomains() with an
1985 * empty list, which will clear the list of domains for an interface. */
1986 if (!strv_equal(argv
+ 2, STRV_MAKE(""))) {
1987 STRV_FOREACH(p
, argv
+ 2) {
1990 n
= **p
== '~' ? *p
+ 1 : *p
;
1992 r
= dns_name_is_valid(n
);
1994 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
1996 log_error("Domain not valid: %s", n
);
2000 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
2002 return bus_log_create_error(r
);
2006 r
= sd_bus_message_close_container(req
);
2008 return bus_log_create_error(r
);
2010 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
2012 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2013 return log_interface_is_managed(r
, arg_ifindex
);
2015 if (arg_ifindex_permissive
&&
2016 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2019 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2025 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2026 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2027 sd_bus
*bus
= userdata
;
2033 r
= ifname_mangle(argv
[1]);
2038 if (arg_ifindex
<= 0)
2039 return status_all(bus
, STATUS_LLMNR
);
2042 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2044 r
= sd_bus_call_method(bus
,
2045 "org.freedesktop.resolve1",
2046 "/org/freedesktop/resolve1",
2047 "org.freedesktop.resolve1.Manager",
2051 "is", arg_ifindex
, argv
[2]);
2053 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2054 return log_interface_is_managed(r
, arg_ifindex
);
2056 if (arg_ifindex_permissive
&&
2057 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2060 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2066 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2067 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2068 sd_bus
*bus
= userdata
;
2074 r
= ifname_mangle(argv
[1]);
2079 if (arg_ifindex
<= 0)
2080 return status_all(bus
, STATUS_MDNS
);
2083 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2085 r
= sd_bus_call_method(bus
,
2086 "org.freedesktop.resolve1",
2087 "/org/freedesktop/resolve1",
2088 "org.freedesktop.resolve1.Manager",
2089 "SetLinkMulticastDNS",
2092 "is", arg_ifindex
, argv
[2]);
2094 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2095 return log_interface_is_managed(r
, arg_ifindex
);
2097 if (arg_ifindex_permissive
&&
2098 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2101 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2107 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2108 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2109 sd_bus
*bus
= userdata
;
2115 r
= ifname_mangle(argv
[1]);
2120 if (arg_ifindex
<= 0)
2121 return status_all(bus
, STATUS_PRIVATE
);
2124 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2126 r
= sd_bus_call_method(bus
,
2127 "org.freedesktop.resolve1",
2128 "/org/freedesktop/resolve1",
2129 "org.freedesktop.resolve1.Manager",
2130 "SetLinkDNSOverTLS",
2133 "is", arg_ifindex
, argv
[2]);
2135 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2136 return log_interface_is_managed(r
, arg_ifindex
);
2138 if (arg_ifindex_permissive
&&
2139 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2142 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2148 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2149 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2150 sd_bus
*bus
= userdata
;
2156 r
= ifname_mangle(argv
[1]);
2161 if (arg_ifindex
<= 0)
2162 return status_all(bus
, STATUS_DNSSEC
);
2165 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2167 r
= sd_bus_call_method(bus
,
2168 "org.freedesktop.resolve1",
2169 "/org/freedesktop/resolve1",
2170 "org.freedesktop.resolve1.Manager",
2174 "is", arg_ifindex
, argv
[2]);
2176 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2177 return log_interface_is_managed(r
, arg_ifindex
);
2179 if (arg_ifindex_permissive
&&
2180 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2183 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2189 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2190 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2191 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2192 sd_bus
*bus
= userdata
;
2200 r
= ifname_mangle(argv
[1]);
2205 if (arg_ifindex
<= 0)
2206 return status_all(bus
, STATUS_NTA
);
2209 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2211 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2212 * with an empty list, which will clear the list of domains for an interface. */
2213 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2216 STRV_FOREACH(p
, argv
+ 2) {
2217 r
= dns_name_is_valid(*p
);
2219 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2221 log_error("Domain not valid: %s", *p
);
2226 r
= sd_bus_message_new_method_call(
2229 "org.freedesktop.resolve1",
2230 "/org/freedesktop/resolve1",
2231 "org.freedesktop.resolve1.Manager",
2232 "SetLinkDNSSECNegativeTrustAnchors");
2234 return bus_log_create_error(r
);
2236 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2238 return bus_log_create_error(r
);
2240 r
= sd_bus_message_append_strv(req
, clear
? NULL
: argv
+ 2);
2242 return bus_log_create_error(r
);
2244 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
2246 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2247 return log_interface_is_managed(r
, arg_ifindex
);
2249 if (arg_ifindex_permissive
&&
2250 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2253 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2259 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2260 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2261 sd_bus
*bus
= userdata
;
2267 r
= ifname_mangle(argv
[1]);
2272 if (arg_ifindex
<= 0)
2273 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Interface argument required.");
2275 r
= sd_bus_call_method(bus
,
2276 "org.freedesktop.resolve1",
2277 "/org/freedesktop/resolve1",
2278 "org.freedesktop.resolve1.Manager",
2284 if (arg_ifindex_permissive
&&
2285 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2288 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2294 static void help_protocol_types(void) {
2296 puts("Known protocol types:");
2297 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2300 static void help_dns_types(void) {
2302 puts("Known DNS RR types:");
2304 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2307 static void help_dns_classes(void) {
2309 puts("Known DNS RR classes:");
2311 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2314 static int compat_help(void) {
2315 _cleanup_free_
char *link
= NULL
;
2318 r
= terminal_urlify_man("resolvectl", "1", &link
);
2322 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2323 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2324 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2325 "%1$s [OPTIONS...] --statistics\n"
2326 "%1$s [OPTIONS...] --reset-statistics\n"
2328 "Resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n\n"
2329 " -h --help Show this help\n"
2330 " --version Show package version\n"
2331 " --no-pager Do not pipe output into a pager\n"
2332 " -4 Resolve IPv4 addresses\n"
2333 " -6 Resolve IPv6 addresses\n"
2334 " -i --interface=INTERFACE Look on interface\n"
2335 " -p --protocol=PROTO|help Look via protocol\n"
2336 " -t --type=TYPE|help Query RR with DNS type\n"
2337 " -c --class=CLASS|help Query RR with DNS class\n"
2338 " --service Resolve service (SRV)\n"
2339 " --service-address=BOOL Resolve address for services (default: yes)\n"
2340 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2341 " --openpgp Query OpenPGP public key\n"
2342 " --tlsa Query TLS public key\n"
2343 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2344 " --search=BOOL Use search domains for single-label names\n"
2346 " --raw[=payload|packet] Dump the answer as binary data\n"
2347 " --legend=BOOL Print headers and additional info (default: yes)\n"
2348 " --statistics Show resolver statistics\n"
2349 " --reset-statistics Reset resolver statistics\n"
2350 " --status Show link and server status\n"
2351 " --flush-caches Flush all local DNS caches\n"
2352 " --reset-server-features\n"
2353 " Forget learnt DNS server feature levels\n"
2354 " --set-dns=SERVER Set per-interface DNS server address\n"
2355 " --set-domain=DOMAIN Set per-interface search domain\n"
2356 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2357 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2358 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2359 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2360 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2361 " --revert Revert per-interface configuration\n"
2362 "\nSee the %2$s for details.\n"
2363 , program_invocation_short_name
2370 static int native_help(void) {
2371 _cleanup_free_
char *link
= NULL
;
2374 r
= terminal_urlify_man("resolvectl", "1", &link
);
2378 printf("%1$s [OPTIONS...] {COMMAND} ...\n"
2380 "Send control commands to the network name resolution manager, or\n"
2381 "resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n"
2383 " -h --help Show this help\n"
2384 " --version Show package version\n"
2385 " --no-pager Do not pipe output into a pager\n"
2386 " -4 Resolve IPv4 addresses\n"
2387 " -6 Resolve IPv6 addresses\n"
2388 " -i --interface=INTERFACE Look on interface\n"
2389 " -p --protocol=PROTO|help Look via protocol\n"
2390 " -t --type=TYPE|help Query RR with DNS type\n"
2391 " -c --class=CLASS|help Query RR with DNS class\n"
2392 " --service-address=BOOL Resolve address for services (default: yes)\n"
2393 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2394 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2395 " --search=BOOL Use search domains for single-label names\n"
2397 " --raw[=payload|packet] Dump the answer as binary data\n"
2398 " --legend=BOOL Print headers and additional info (default: yes)\n"
2401 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2402 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2403 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2404 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2405 " status [LINK...] Show link and server status\n"
2406 " statistics Show resolver statistics\n"
2407 " reset-statistics Reset resolver statistics\n"
2408 " flush-caches Flush all local DNS caches\n"
2409 " reset-server-features Forget learnt DNS server feature levels\n"
2410 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2411 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2412 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2413 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2414 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2415 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2416 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2417 " revert LINK Revert per-interface configuration\n"
2418 "\nSee the %2$s for details.\n"
2419 , program_invocation_short_name
2426 static int verb_help(int argc
, char **argv
, void *userdata
) {
2427 return native_help();
2430 static int compat_parse_argv(int argc
, char *argv
[]) {
2432 ARG_VERSION
= 0x100,
2436 ARG_SERVICE_ADDRESS
,
2443 ARG_RESET_STATISTICS
,
2446 ARG_RESET_SERVER_FEATURES
,
2458 static const struct option options
[] = {
2459 { "help", no_argument
, NULL
, 'h' },
2460 { "version", no_argument
, NULL
, ARG_VERSION
},
2461 { "type", required_argument
, NULL
, 't' },
2462 { "class", required_argument
, NULL
, 'c' },
2463 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2464 { "interface", required_argument
, NULL
, 'i' },
2465 { "protocol", required_argument
, NULL
, 'p' },
2466 { "cname", required_argument
, NULL
, ARG_CNAME
},
2467 { "service", no_argument
, NULL
, ARG_SERVICE
},
2468 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2469 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2470 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2471 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2472 { "raw", optional_argument
, NULL
, ARG_RAW
},
2473 { "search", required_argument
, NULL
, ARG_SEARCH
},
2474 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2475 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2476 { "status", no_argument
, NULL
, ARG_STATUS
},
2477 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2478 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2479 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2480 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2481 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2482 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2483 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2484 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2485 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2486 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2487 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2496 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2500 return compat_help();
2506 arg_family
= AF_INET
;
2510 arg_family
= AF_INET6
;
2514 r
= ifname_mangle(optarg
);
2520 if (streq(optarg
, "help")) {
2525 r
= dns_type_from_string(optarg
);
2527 log_error("Failed to parse RR record type %s", optarg
);
2530 arg_type
= (uint16_t) r
;
2531 assert((int) arg_type
== r
);
2533 arg_mode
= MODE_RESOLVE_RECORD
;
2537 if (streq(optarg
, "help")) {
2542 r
= dns_class_from_string(optarg
);
2544 log_error("Failed to parse RR record class %s", optarg
);
2547 arg_class
= (uint16_t) r
;
2548 assert((int) arg_class
== r
);
2553 r
= parse_boolean(optarg
);
2555 return log_error_errno(r
, "Failed to parse --legend= argument");
2561 if (streq(optarg
, "help")) {
2562 help_protocol_types();
2564 } else if (streq(optarg
, "dns"))
2565 arg_flags
|= SD_RESOLVED_DNS
;
2566 else if (streq(optarg
, "llmnr"))
2567 arg_flags
|= SD_RESOLVED_LLMNR
;
2568 else if (streq(optarg
, "llmnr-ipv4"))
2569 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2570 else if (streq(optarg
, "llmnr-ipv6"))
2571 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2572 else if (streq(optarg
, "mdns"))
2573 arg_flags
|= SD_RESOLVED_MDNS
;
2574 else if (streq(optarg
, "mdns-ipv4"))
2575 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2576 else if (streq(optarg
, "mdns-ipv6"))
2577 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2579 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2580 "Unknown protocol specifier: %s", optarg
);
2585 arg_mode
= MODE_RESOLVE_SERVICE
;
2589 arg_mode
= MODE_RESOLVE_OPENPGP
;
2593 arg_mode
= MODE_RESOLVE_TLSA
;
2594 if (!optarg
|| service_family_is_valid(optarg
))
2595 arg_service_family
= optarg
;
2597 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2598 "Unknown service family \"%s\".", optarg
);
2603 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2604 "Refusing to write binary data to tty.");
2606 if (optarg
== NULL
|| streq(optarg
, "payload"))
2607 arg_raw
= RAW_PAYLOAD
;
2608 else if (streq(optarg
, "packet"))
2609 arg_raw
= RAW_PACKET
;
2611 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2612 "Unknown --raw specifier \"%s\".",
2619 r
= parse_boolean(optarg
);
2621 return log_error_errno(r
, "Failed to parse --cname= argument.");
2622 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2625 case ARG_SERVICE_ADDRESS
:
2626 r
= parse_boolean(optarg
);
2628 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2629 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2632 case ARG_SERVICE_TXT
:
2633 r
= parse_boolean(optarg
);
2635 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2636 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2640 r
= parse_boolean(optarg
);
2642 return log_error_errno(r
, "Failed to parse --search argument.");
2643 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2646 case ARG_STATISTICS
:
2647 arg_mode
= MODE_STATISTICS
;
2650 case ARG_RESET_STATISTICS
:
2651 arg_mode
= MODE_RESET_STATISTICS
;
2654 case ARG_FLUSH_CACHES
:
2655 arg_mode
= MODE_FLUSH_CACHES
;
2658 case ARG_RESET_SERVER_FEATURES
:
2659 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2663 arg_mode
= MODE_STATUS
;
2667 arg_pager_flags
|= PAGER_DISABLE
;
2671 r
= strv_extend(&arg_set_dns
, optarg
);
2675 arg_mode
= MODE_SET_LINK
;
2678 case ARG_SET_DOMAIN
:
2679 r
= strv_extend(&arg_set_domain
, optarg
);
2683 arg_mode
= MODE_SET_LINK
;
2687 arg_set_llmnr
= optarg
;
2688 arg_mode
= MODE_SET_LINK
;
2692 arg_set_mdns
= optarg
;
2693 arg_mode
= MODE_SET_LINK
;
2696 case ARG_SET_PRIVATE
:
2697 arg_set_dns_over_tls
= optarg
;
2698 arg_mode
= MODE_SET_LINK
;
2701 case ARG_SET_DNSSEC
:
2702 arg_set_dnssec
= optarg
;
2703 arg_mode
= MODE_SET_LINK
;
2707 r
= strv_extend(&arg_set_nta
, optarg
);
2711 arg_mode
= MODE_SET_LINK
;
2714 case ARG_REVERT_LINK
:
2715 arg_mode
= MODE_REVERT_LINK
;
2722 assert_not_reached("Unhandled option");
2725 if (arg_type
== 0 && arg_class
!= 0)
2726 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2727 "--class= may only be used in conjunction with --type=.");
2729 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
)
2730 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2731 "--service and --type= may not be combined.");
2733 if (arg_type
!= 0 && arg_class
== 0)
2734 arg_class
= DNS_CLASS_IN
;
2736 if (arg_class
!= 0 && arg_type
== 0)
2737 arg_type
= DNS_TYPE_A
;
2739 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2741 if (arg_ifindex
<= 0)
2742 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2743 "--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2746 return 1 /* work to do */;
2749 static int native_parse_argv(int argc
, char *argv
[]) {
2751 ARG_VERSION
= 0x100,
2754 ARG_SERVICE_ADDRESS
,
2761 static const struct option options
[] = {
2762 { "help", no_argument
, NULL
, 'h' },
2763 { "version", no_argument
, NULL
, ARG_VERSION
},
2764 { "type", required_argument
, NULL
, 't' },
2765 { "class", required_argument
, NULL
, 'c' },
2766 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2767 { "interface", required_argument
, NULL
, 'i' },
2768 { "protocol", required_argument
, NULL
, 'p' },
2769 { "cname", required_argument
, NULL
, ARG_CNAME
},
2770 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2771 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2772 { "raw", optional_argument
, NULL
, ARG_RAW
},
2773 { "search", required_argument
, NULL
, ARG_SEARCH
},
2774 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2783 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2787 return native_help();
2793 arg_family
= AF_INET
;
2797 arg_family
= AF_INET6
;
2801 r
= ifname_mangle(optarg
);
2807 if (streq(optarg
, "help")) {
2812 r
= dns_type_from_string(optarg
);
2814 log_error("Failed to parse RR record type %s", optarg
);
2817 arg_type
= (uint16_t) r
;
2818 assert((int) arg_type
== r
);
2823 if (streq(optarg
, "help")) {
2828 r
= dns_class_from_string(optarg
);
2830 log_error("Failed to parse RR record class %s", optarg
);
2833 arg_class
= (uint16_t) r
;
2834 assert((int) arg_class
== r
);
2839 r
= parse_boolean(optarg
);
2841 return log_error_errno(r
, "Failed to parse --legend= argument");
2847 if (streq(optarg
, "help")) {
2848 help_protocol_types();
2850 } else if (streq(optarg
, "dns"))
2851 arg_flags
|= SD_RESOLVED_DNS
;
2852 else if (streq(optarg
, "llmnr"))
2853 arg_flags
|= SD_RESOLVED_LLMNR
;
2854 else if (streq(optarg
, "llmnr-ipv4"))
2855 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2856 else if (streq(optarg
, "llmnr-ipv6"))
2857 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2858 else if (streq(optarg
, "mdns"))
2859 arg_flags
|= SD_RESOLVED_MDNS
;
2860 else if (streq(optarg
, "mdns-ipv4"))
2861 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2862 else if (streq(optarg
, "mdns-ipv6"))
2863 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2865 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2866 "Unknown protocol specifier: %s",
2873 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2874 "Refusing to write binary data to tty.");
2876 if (optarg
== NULL
|| streq(optarg
, "payload"))
2877 arg_raw
= RAW_PAYLOAD
;
2878 else if (streq(optarg
, "packet"))
2879 arg_raw
= RAW_PACKET
;
2881 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2882 "Unknown --raw specifier \"%s\".",
2889 r
= parse_boolean(optarg
);
2891 return log_error_errno(r
, "Failed to parse --cname= argument.");
2892 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2895 case ARG_SERVICE_ADDRESS
:
2896 r
= parse_boolean(optarg
);
2898 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2899 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2902 case ARG_SERVICE_TXT
:
2903 r
= parse_boolean(optarg
);
2905 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2906 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2910 r
= parse_boolean(optarg
);
2912 return log_error_errno(r
, "Failed to parse --search argument.");
2913 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2917 arg_pager_flags
|= PAGER_DISABLE
;
2924 assert_not_reached("Unhandled option");
2927 if (arg_type
== 0 && arg_class
!= 0)
2928 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2929 "--class= may only be used in conjunction with --type=.");
2931 if (arg_type
!= 0 && arg_class
== 0)
2932 arg_class
= DNS_CLASS_IN
;
2934 if (arg_class
!= 0 && arg_type
== 0)
2935 arg_type
= DNS_TYPE_A
;
2937 return 1 /* work to do */;
2940 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
2942 static const Verb verbs
[] = {
2943 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
2944 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
2945 { "query", 2, VERB_ANY
, 0, verb_query
},
2946 { "service", 2, 4, 0, verb_service
},
2947 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
2948 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
2949 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
2950 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
2951 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
2952 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
2953 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
2954 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
2955 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
2956 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
2957 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
2958 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
2959 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
2960 { "revert", VERB_ANY
, 2, 0, verb_revert_link
},
2964 return dispatch_verb(argc
, argv
, verbs
, bus
);
2967 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
2972 assert(num_args
== 0 || args
);
2974 num
= !!single_arg
+ num_args
+ 1;
2976 p
= fake
= newa0(char *, num
+ 1);
2977 *p
++ = (char *) verb
;
2979 *p
++ = (char *) single_arg
;
2980 for (i
= 0; i
< num_args
; i
++)
2984 return native_main((int) num
, fake
, bus
);
2987 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
2991 case MODE_RESOLVE_HOST
:
2992 case MODE_RESOLVE_RECORD
:
2993 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
2995 case MODE_RESOLVE_SERVICE
:
2996 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
2998 case MODE_RESOLVE_OPENPGP
:
2999 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3001 case MODE_RESOLVE_TLSA
:
3002 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3004 case MODE_STATISTICS
:
3005 return translate("statistics", NULL
, 0, NULL
, bus
);
3007 case MODE_RESET_STATISTICS
:
3008 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3010 case MODE_FLUSH_CACHES
:
3011 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3013 case MODE_RESET_SERVER_FEATURES
:
3014 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3017 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3023 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3028 if (arg_set_domain
) {
3029 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3035 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3040 if (arg_set_llmnr
) {
3041 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3047 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3052 if (arg_set_dns_over_tls
) {
3053 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3058 if (arg_set_dnssec
) {
3059 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3066 case MODE_REVERT_LINK
:
3069 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3072 assert_not_reached("invalid mode");
3078 static int run(int argc
, char **argv
) {
3079 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
3082 setlocale(LC_ALL
, "");
3083 log_parse_environment();
3086 if (streq(program_invocation_short_name
, "resolvconf"))
3087 r
= resolvconf_parse_argv(argc
, argv
);
3088 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3089 r
= compat_parse_argv(argc
, argv
);
3091 r
= native_parse_argv(argc
, argv
);
3095 r
= sd_bus_open_system(&bus
);
3097 return log_error_errno(r
, "sd_bus_open_system: %m");
3099 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3100 return compat_main(argc
, argv
, bus
);
3102 return native_main(argc
, argv
, bus
);
3105 DEFINE_MAIN_FUNCTION(run
);