1 /* SPDX-License-Identifier: LGPL-2.1+ */
8 #include "sd-netlink.h"
11 #include "alloc-util.h"
12 #include "bus-common-errors.h"
13 #include "bus-error.h"
15 #include "dns-domain.h"
17 #include "gcrypt-util.h"
18 #include "in-addr-util.h"
19 #include "main-func.h"
20 #include "missing_network.h"
21 #include "netlink-util.h"
23 #include "parse-util.h"
24 #include "pretty-print.h"
25 #include "resolvconf-compat.h"
26 #include "resolvectl.h"
27 #include "resolved-def.h"
28 #include "resolved-dns-packet.h"
29 #include "string-table.h"
31 #include "terminal-util.h"
34 static int arg_family
= AF_UNSPEC
;
35 static int arg_ifindex
= 0;
36 static char *arg_ifname
= NULL
;
37 static uint16_t arg_type
= 0;
38 static uint16_t arg_class
= 0;
39 static bool arg_legend
= true;
40 static uint64_t arg_flags
= 0;
41 static PagerFlags arg_pager_flags
= 0;
42 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
43 static const char *arg_service_family
= NULL
;
45 typedef enum RawType
{
50 static RawType arg_raw
= RAW_NONE
;
52 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
54 char **arg_set_dns
= NULL
;
55 char **arg_set_domain
= NULL
;
56 static const char *arg_set_llmnr
= NULL
;
57 static const char *arg_set_mdns
= NULL
;
58 static const char *arg_set_dns_over_tls
= NULL
;
59 static const char *arg_set_dnssec
= NULL
;
60 static char **arg_set_nta
= NULL
;
62 STATIC_DESTRUCTOR_REGISTER(arg_ifname
, freep
);
63 STATIC_DESTRUCTOR_REGISTER(arg_set_dns
, strv_freep
);
64 STATIC_DESTRUCTOR_REGISTER(arg_set_domain
, strv_freep
);
65 STATIC_DESTRUCTOR_REGISTER(arg_set_nta
, strv_freep
);
67 typedef enum StatusMode
{
79 int ifname_mangle(const char *s
) {
80 _cleanup_free_
char *iface
= NULL
;
88 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
89 iface
= strndup(s
, dot
- s
);
96 r
= parse_ifindex_or_ifname(iface
, &ifi
);
98 if (r
== -ENODEV
&& arg_ifindex_permissive
) {
99 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
103 return log_error_errno(r
, "Unknown interface '%s': %m", iface
);
106 if (arg_ifindex
> 0 && arg_ifindex
!= ifi
)
107 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Specified multiple different interfaces. Refusing.");
110 free_and_replace(arg_ifname
, iface
);
115 static void print_source(uint64_t flags
, usec_t rtt
) {
116 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
124 printf("\n%s-- Information acquired via", ansi_grey());
127 printf(" protocol%s%s%s%s%s",
128 flags
& SD_RESOLVED_DNS
? " DNS" :"",
129 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
130 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
131 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
132 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
134 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
137 "%s-- Data is authenticated: %s%s\n",
138 rtt_str
, ansi_normal(),
139 ansi_grey(), yes_no(flags
& SD_RESOLVED_AUTHENTICATED
), ansi_normal());
142 static void print_ifindex_comment(int printed_so_far
, int ifindex
) {
143 char ifname
[IF_NAMESIZE
];
148 if (!if_indextoname(ifindex
, ifname
))
149 log_warning_errno(errno
, "Failed to resolve interface name for index %i, ignoring: %m", ifindex
);
151 printf("%*s%s-- link: %s%s",
152 60 > printed_so_far
? 60 - printed_so_far
: 0, " ", /* Align comment to the 60th column */
153 ansi_grey(), ifname
, ansi_normal());
156 static int resolve_host(sd_bus
*bus
, const char *name
) {
157 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
158 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
159 const char *canonical
= NULL
;
167 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
169 r
= sd_bus_message_new_method_call(
172 "org.freedesktop.resolve1",
173 "/org/freedesktop/resolve1",
174 "org.freedesktop.resolve1.Manager",
177 return bus_log_create_error(r
);
179 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
181 return bus_log_create_error(r
);
183 ts
= now(CLOCK_MONOTONIC
);
185 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
187 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
189 ts
= now(CLOCK_MONOTONIC
) - ts
;
191 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
193 return bus_log_parse_error(r
);
195 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
196 _cleanup_free_
char *pretty
= NULL
;
197 int ifindex
, family
, k
;
201 assert_cc(sizeof(int) == sizeof(int32_t));
203 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
205 return bus_log_parse_error(r
);
207 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
209 return bus_log_parse_error(r
);
211 r
= sd_bus_message_exit_container(reply
);
213 return bus_log_parse_error(r
);
215 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
216 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
220 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
221 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
225 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
227 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
229 k
= printf("%*s%s %s%s%s",
230 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
231 ansi_highlight(), pretty
, ansi_normal());
233 print_ifindex_comment(k
, ifindex
);
239 return bus_log_parse_error(r
);
241 r
= sd_bus_message_exit_container(reply
);
243 return bus_log_parse_error(r
);
245 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
247 return bus_log_parse_error(r
);
249 if (!streq(name
, canonical
))
250 printf("%*s%s (%s)\n",
251 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
255 log_error("%s: no addresses found", name
);
259 print_source(flags
, ts
);
264 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
265 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
266 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
267 _cleanup_free_
char *pretty
= NULL
;
274 assert(IN_SET(family
, AF_INET
, AF_INET6
));
278 ifindex
= arg_ifindex
;
280 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
284 log_debug("Resolving %s.", pretty
);
286 r
= sd_bus_message_new_method_call(
289 "org.freedesktop.resolve1",
290 "/org/freedesktop/resolve1",
291 "org.freedesktop.resolve1.Manager",
294 return bus_log_create_error(r
);
296 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
298 return bus_log_create_error(r
);
300 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
302 return bus_log_create_error(r
);
304 r
= sd_bus_message_append(req
, "t", arg_flags
);
306 return bus_log_create_error(r
);
308 ts
= now(CLOCK_MONOTONIC
);
310 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
312 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
314 ts
= now(CLOCK_MONOTONIC
) - ts
;
316 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
318 return bus_log_create_error(r
);
320 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
324 assert_cc(sizeof(int) == sizeof(int32_t));
326 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
330 r
= sd_bus_message_exit_container(reply
);
334 k
= printf("%*s%s %s%s%s",
335 (int) strlen(pretty
), c
== 0 ? pretty
: "",
337 ansi_highlight(), n
, ansi_normal());
339 print_ifindex_comment(k
, ifindex
);
345 return bus_log_parse_error(r
);
347 r
= sd_bus_message_exit_container(reply
);
349 return bus_log_parse_error(r
);
351 r
= sd_bus_message_read(reply
, "t", &flags
);
353 return bus_log_parse_error(r
);
356 log_error("%s: no names found", pretty
);
360 print_source(flags
, ts
);
365 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
366 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
367 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
370 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
374 p
->refuse_compression
= true;
376 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
380 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
382 return log_error_errno(r
, "Failed to parse RR: %m");
384 if (arg_raw
== RAW_PAYLOAD
) {
388 k
= dns_resource_record_payload(rr
, &data
);
390 return log_error_errno(k
, "Cannot dump RR: %m");
391 fwrite(data
, 1, k
, stdout
);
396 s
= dns_resource_record_to_string(rr
);
401 print_ifindex_comment(k
, ifindex
);
408 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
409 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
410 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
415 bool needs_authentication
= false;
419 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
421 r
= sd_bus_message_new_method_call(
424 "org.freedesktop.resolve1",
425 "/org/freedesktop/resolve1",
426 "org.freedesktop.resolve1.Manager",
429 return bus_log_create_error(r
);
431 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
433 return bus_log_create_error(r
);
435 ts
= now(CLOCK_MONOTONIC
);
437 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
439 if (warn_missing
|| r
!= -ENXIO
)
440 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
444 ts
= now(CLOCK_MONOTONIC
) - ts
;
446 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
448 return bus_log_parse_error(r
);
450 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
456 assert_cc(sizeof(int) == sizeof(int32_t));
458 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
460 return bus_log_parse_error(r
);
462 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
464 return bus_log_parse_error(r
);
466 r
= sd_bus_message_exit_container(reply
);
468 return bus_log_parse_error(r
);
470 if (arg_raw
== RAW_PACKET
) {
471 uint64_t u64
= htole64(l
);
473 fwrite(&u64
, sizeof(u64
), 1, stdout
);
474 fwrite(d
, 1, l
, stdout
);
476 r
= output_rr_packet(d
, l
, ifindex
);
481 if (dns_type_needs_authentication(t
))
482 needs_authentication
= true;
487 return bus_log_parse_error(r
);
489 r
= sd_bus_message_exit_container(reply
);
491 return bus_log_parse_error(r
);
493 r
= sd_bus_message_read(reply
, "t", &flags
);
495 return bus_log_parse_error(r
);
499 log_error("%s: no records found", name
);
503 print_source(flags
, ts
);
505 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
508 fprintf(stderr
, "\n%s"
509 "WARNING: The resources shown contain cryptographic key data which could not be\n"
510 " authenticated. It is not suitable to authenticate any communication.\n"
511 " This is usually indication that DNSSEC authentication was not enabled\n"
512 " or is not available for the selected protocol or DNS servers.%s\n",
513 ansi_highlight_red(),
520 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
521 uint16_t type
= 0, class = 0;
522 const char *p
, *q
, *n
;
527 assert(startswith(name
, "dns:"));
529 /* Parse RFC 4501 dns: URIs */
539 e
= strchr(p
+ 2, '/');
544 log_warning("DNS authority specification not supported; ignoring specified authority.");
551 n
= strndupa(p
, q
- p
);
557 f
= startswith_no_case(q
, "class=");
559 _cleanup_free_
char *t
= NULL
;
563 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
564 "DNS class specified twice.");
566 e
= strchrnul(f
, ';');
567 t
= strndup(f
, e
- f
);
571 r
= dns_class_from_string(t
);
573 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
574 "Unknown DNS class %s.", t
);
586 f
= startswith_no_case(q
, "type=");
588 _cleanup_free_
char *t
= NULL
;
592 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
593 "DNS type specified twice.");
595 e
= strchrnul(f
, ';');
596 t
= strndup(f
, e
- f
);
600 r
= dns_type_from_string(t
);
602 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
603 "Unknown DNS type %s.", t
);
621 class = arg_class
?: DNS_CLASS_IN
;
623 type
= arg_type
?: DNS_TYPE_A
;
625 return resolve_record(bus
, n
, class, type
, true);
628 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
629 "Invalid DNS URI: %s", name
);
632 static int verb_query(int argc
, char **argv
, void *userdata
) {
633 sd_bus
*bus
= userdata
;
638 STRV_FOREACH(p
, argv
+ 1) {
639 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
645 STRV_FOREACH(p
, argv
+ 1) {
646 if (startswith(*p
, "dns:"))
647 q
= resolve_rfc4501(bus
, *p
);
650 union in_addr_union a
;
652 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
654 q
= resolve_address(bus
, family
, &a
, ifindex
);
656 q
= resolve_host(bus
, *p
);
665 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
666 const char *canonical_name
, *canonical_type
, *canonical_domain
;
667 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
668 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
679 name
= empty_to_null(name
);
680 type
= empty_to_null(type
);
683 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
685 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
687 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
689 r
= sd_bus_message_new_method_call(
692 "org.freedesktop.resolve1",
693 "/org/freedesktop/resolve1",
694 "org.freedesktop.resolve1.Manager",
697 return bus_log_create_error(r
);
699 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
701 return bus_log_create_error(r
);
703 ts
= now(CLOCK_MONOTONIC
);
705 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
707 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
709 ts
= now(CLOCK_MONOTONIC
) - ts
;
711 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
713 return bus_log_parse_error(r
);
716 (name
? strlen(name
) + 1 : 0) +
717 (type
? strlen(type
) + 1 : 0) +
721 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
722 uint16_t priority
, weight
, port
;
723 const char *hostname
, *canonical
;
725 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
727 return bus_log_parse_error(r
);
730 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
732 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
734 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
735 (int) strlen(domain
), c
== 0 ? domain
: "",
740 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
742 return bus_log_parse_error(r
);
744 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
745 _cleanup_free_
char *pretty
= NULL
;
746 int ifindex
, family
, k
;
749 assert_cc(sizeof(int) == sizeof(int32_t));
751 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
753 return bus_log_parse_error(r
);
755 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
757 return bus_log_parse_error(r
);
759 r
= sd_bus_message_exit_container(reply
);
761 return bus_log_parse_error(r
);
763 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
764 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
768 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
769 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
773 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
775 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
777 k
= printf("%*s%s", (int) indent
, "", pretty
);
778 print_ifindex_comment(k
, ifindex
);
782 return bus_log_parse_error(r
);
784 r
= sd_bus_message_exit_container(reply
);
786 return bus_log_parse_error(r
);
788 r
= sd_bus_message_read(reply
, "s", &canonical
);
790 return bus_log_parse_error(r
);
792 if (!streq(hostname
, canonical
))
793 printf("%*s(%s)\n", (int) indent
, "", canonical
);
795 r
= sd_bus_message_exit_container(reply
);
797 return bus_log_parse_error(r
);
802 return bus_log_parse_error(r
);
804 r
= sd_bus_message_exit_container(reply
);
806 return bus_log_parse_error(r
);
808 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
810 return bus_log_parse_error(r
);
812 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
813 _cleanup_free_
char *escaped
= NULL
;
815 escaped
= cescape_length(p
, sz
);
819 printf("%*s%s\n", (int) indent
, "", escaped
);
822 return bus_log_parse_error(r
);
824 r
= sd_bus_message_exit_container(reply
);
826 return bus_log_parse_error(r
);
828 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
830 return bus_log_parse_error(r
);
832 canonical_name
= empty_to_null(canonical_name
);
833 canonical_type
= empty_to_null(canonical_type
);
835 if (!streq_ptr(name
, canonical_name
) ||
836 !streq_ptr(type
, canonical_type
) ||
837 !streq_ptr(domain
, canonical_domain
)) {
839 printf("%*s(", (int) indent
, "");
842 printf("%s/", canonical_name
);
844 printf("%s/", canonical_type
);
846 printf("%s)\n", canonical_domain
);
849 print_source(flags
, ts
);
854 static int verb_service(int argc
, char **argv
, void *userdata
) {
855 sd_bus
*bus
= userdata
;
858 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
860 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
862 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
865 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
866 const char *domain
, *full
;
868 _cleanup_free_
char *hashed
= NULL
;
873 domain
= strrchr(address
, '@');
875 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
876 "Address does not contain '@': \"%s\"", address
);
877 if (domain
== address
|| domain
[1] == '\0')
878 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
879 "Address starts or ends with '@': \"%s\"", address
);
882 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
884 return log_error_errno(r
, "Hashing failed: %m");
886 strshorten(hashed
, 56);
888 full
= strjoina(hashed
, "._openpgpkey.", domain
);
889 log_debug("Looking up \"%s\".", full
);
891 r
= resolve_record(bus
, full
,
892 arg_class
?: DNS_CLASS_IN
,
893 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
895 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
896 hashed
= mfree(hashed
);
897 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
899 return log_error_errno(r
, "Hashing failed: %m");
901 full
= strjoina(hashed
, "._openpgpkey.", domain
);
902 log_debug("Looking up \"%s\".", full
);
904 return resolve_record(bus
, full
,
905 arg_class
?: DNS_CLASS_IN
,
906 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
912 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
913 sd_bus
*bus
= userdata
;
917 STRV_FOREACH(p
, argv
+ 1) {
918 q
= resolve_openpgp(bus
, *p
);
926 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
928 uint16_t port_num
= 443;
929 _cleanup_free_
char *full
= NULL
;
935 port
= strrchr(address
, ':');
937 r
= parse_ip_port(port
+ 1, &port_num
);
939 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
941 address
= strndupa(address
, port
- address
);
944 r
= asprintf(&full
, "_%u._%s.%s",
951 log_debug("Looking up \"%s\".", full
);
953 return resolve_record(bus
, full
,
954 arg_class
?: DNS_CLASS_IN
,
955 arg_type
?: DNS_TYPE_TLSA
, true);
958 static bool service_family_is_valid(const char *s
) {
959 return STR_IN_SET(s
, "tcp", "udp", "sctp");
962 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
963 sd_bus
*bus
= userdata
;
964 char **p
, **args
= argv
+ 1;
965 const char *family
= "tcp";
968 if (service_family_is_valid(argv
[1])) {
973 STRV_FOREACH(p
, args
) {
974 q
= resolve_tlsa(bus
, family
, *p
);
982 static int show_statistics(int argc
, char **argv
, void *userdata
) {
983 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
984 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
985 sd_bus
*bus
= userdata
;
986 uint64_t n_current_transactions
, n_total_transactions
,
987 cache_size
, n_cache_hit
, n_cache_miss
,
988 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
989 int r
, dnssec_supported
;
993 r
= sd_bus_get_property_trivial(bus
,
994 "org.freedesktop.resolve1",
995 "/org/freedesktop/resolve1",
996 "org.freedesktop.resolve1.Manager",
1002 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
1004 printf("DNSSEC supported by current servers: %s%s%s\n\n",
1006 yes_no(dnssec_supported
),
1009 r
= sd_bus_get_property(bus
,
1010 "org.freedesktop.resolve1",
1011 "/org/freedesktop/resolve1",
1012 "org.freedesktop.resolve1.Manager",
1013 "TransactionStatistics",
1018 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
1020 r
= sd_bus_message_read(reply
, "(tt)",
1021 &n_current_transactions
,
1022 &n_total_transactions
);
1024 return bus_log_parse_error(r
);
1026 printf("%sTransactions%s\n"
1027 "Current Transactions: %" PRIu64
"\n"
1028 " Total Transactions: %" PRIu64
"\n",
1031 n_current_transactions
,
1032 n_total_transactions
);
1034 reply
= sd_bus_message_unref(reply
);
1036 r
= sd_bus_get_property(bus
,
1037 "org.freedesktop.resolve1",
1038 "/org/freedesktop/resolve1",
1039 "org.freedesktop.resolve1.Manager",
1045 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1047 r
= sd_bus_message_read(reply
, "(ttt)",
1052 return bus_log_parse_error(r
);
1054 printf("\n%sCache%s\n"
1055 " Current Cache Size: %" PRIu64
"\n"
1056 " Cache Hits: %" PRIu64
"\n"
1057 " Cache Misses: %" PRIu64
"\n",
1064 reply
= sd_bus_message_unref(reply
);
1066 r
= sd_bus_get_property(bus
,
1067 "org.freedesktop.resolve1",
1068 "/org/freedesktop/resolve1",
1069 "org.freedesktop.resolve1.Manager",
1075 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1077 r
= sd_bus_message_read(reply
, "(tttt)",
1081 &n_dnssec_indeterminate
);
1083 return bus_log_parse_error(r
);
1085 printf("\n%sDNSSEC Verdicts%s\n"
1086 " Secure: %" PRIu64
"\n"
1087 " Insecure: %" PRIu64
"\n"
1088 " Bogus: %" PRIu64
"\n"
1089 " Indeterminate: %" PRIu64
"\n",
1095 n_dnssec_indeterminate
);
1100 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1101 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1102 sd_bus
*bus
= userdata
;
1105 r
= sd_bus_call_method(bus
,
1106 "org.freedesktop.resolve1",
1107 "/org/freedesktop/resolve1",
1108 "org.freedesktop.resolve1.Manager",
1114 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1119 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1120 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1121 sd_bus
*bus
= userdata
;
1124 r
= sd_bus_call_method(bus
,
1125 "org.freedesktop.resolve1",
1126 "/org/freedesktop/resolve1",
1127 "org.freedesktop.resolve1.Manager",
1133 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1138 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1139 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1140 sd_bus
*bus
= userdata
;
1143 r
= sd_bus_call_method(bus
,
1144 "org.freedesktop.resolve1",
1145 "/org/freedesktop/resolve1",
1146 "org.freedesktop.resolve1.Manager",
1147 "ResetServerFeatures",
1152 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1157 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1158 _cleanup_free_
char *pretty
= NULL
;
1159 int ifindex
, family
, r
;
1166 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? "iiay" : "iay");
1171 r
= sd_bus_message_read(m
, "i", &ifindex
);
1176 r
= sd_bus_message_read(m
, "i", &family
);
1180 r
= sd_bus_message_read_array(m
, 'y', &a
, &sz
);
1184 r
= sd_bus_message_exit_container(m
);
1188 if (with_ifindex
&& ifindex
!= 0) {
1189 /* only show the global ones here */
1194 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
1195 log_debug("Unexpected family, ignoring: %i", family
);
1201 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
1202 log_debug("Address size mismatch, ignoring.");
1208 r
= in_addr_to_string(family
, a
, &pretty
);
1212 *ret
= TAKE_PTR(pretty
);
1217 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1218 char ***l
= userdata
;
1226 r
= sd_bus_message_enter_container(m
, 'a', "(iay)");
1231 char *pretty
= NULL
;
1233 r
= read_dns_server_one(m
, false, &pretty
);
1239 if (isempty(pretty
))
1242 r
= strv_consume(l
, pretty
);
1247 r
= sd_bus_message_exit_container(m
);
1254 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1258 return read_dns_server_one(m
, false, userdata
);
1261 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1262 _cleanup_free_
char *str
= NULL
;
1263 int ifindex
, route_only
, r
;
1270 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1272 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1276 if (with_ifindex
&& ifindex
!= 0) {
1277 /* only show the global ones here */
1283 str
= strappend("~", domain
);
1285 str
= strdup(domain
);
1289 *ret
= TAKE_PTR(str
);
1294 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1295 char ***l
= userdata
;
1303 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1308 char *pretty
= NULL
;
1310 r
= read_domain_one(m
, false, &pretty
);
1316 if (isempty(pretty
))
1319 r
= strv_consume(l
, pretty
);
1324 r
= sd_bus_message_exit_container(m
);
1331 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1334 printf("%sLink %i (%s)%s:",
1335 ansi_highlight(), ifindex
, ifname
, ansi_normal());
1346 uint64_t scopes_mask
;
1349 const char *dns_over_tls
;
1355 bool dnssec_supported
;
1359 static void link_info_clear(struct link_info
*p
) {
1360 free(p
->current_dns
);
1362 strv_free(p
->domains
);
1366 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1367 static const struct bus_properties_map property_map
[] = {
1368 { "ScopesMask", "t", NULL
, offsetof(struct link_info
, scopes_mask
) },
1369 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(struct link_info
, dns
) },
1370 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(struct link_info
, current_dns
) },
1371 { "Domains", "a(sb)", map_link_domains
, offsetof(struct link_info
, domains
) },
1372 { "DefaultRoute", "b", NULL
, offsetof(struct link_info
, default_route
) },
1373 { "LLMNR", "s", NULL
, offsetof(struct link_info
, llmnr
) },
1374 { "MulticastDNS", "s", NULL
, offsetof(struct link_info
, mdns
) },
1375 { "DNSOverTLS", "s", NULL
, offsetof(struct link_info
, dns_over_tls
) },
1376 { "DNSSEC", "s", NULL
, offsetof(struct link_info
, dnssec
) },
1377 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct link_info
, ntas
) },
1378 { "DNSSECSupported", "b", NULL
, offsetof(struct link_info
, dnssec_supported
) },
1381 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1382 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1383 _cleanup_(link_info_clear
) struct link_info link_info
= {};
1384 _cleanup_free_
char *ifi
= NULL
, *p
= NULL
;
1385 char ifname
[IF_NAMESIZE
] = "";
1390 assert(ifindex
> 0);
1393 if (!if_indextoname(ifindex
, ifname
))
1394 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1399 if (asprintf(&ifi
, "%i", ifindex
) < 0)
1402 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1406 r
= bus_map_all_properties(bus
,
1407 "org.freedesktop.resolve1",
1410 BUS_MAP_BOOLEAN_AS_BOOL
,
1415 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1417 (void) pager_open(arg_pager_flags
);
1419 if (mode
== STATUS_DNS
)
1420 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns
);
1422 if (mode
== STATUS_DOMAIN
)
1423 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1425 if (mode
== STATUS_NTA
)
1426 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1428 if (mode
== STATUS_DEFAULT_ROUTE
) {
1429 printf("%sLink %i (%s)%s: %s\n",
1430 ansi_highlight(), ifindex
, name
, ansi_normal(),
1431 yes_no(link_info
.default_route
));
1436 if (mode
== STATUS_LLMNR
) {
1437 printf("%sLink %i (%s)%s: %s\n",
1438 ansi_highlight(), ifindex
, name
, ansi_normal(),
1439 strna(link_info
.llmnr
));
1444 if (mode
== STATUS_MDNS
) {
1445 printf("%sLink %i (%s)%s: %s\n",
1446 ansi_highlight(), ifindex
, name
, ansi_normal(),
1447 strna(link_info
.mdns
));
1452 if (mode
== STATUS_PRIVATE
) {
1453 printf("%sLink %i (%s)%s: %s\n",
1454 ansi_highlight(), ifindex
, name
, ansi_normal(),
1455 strna(link_info
.dns_over_tls
));
1460 if (mode
== STATUS_DNSSEC
) {
1461 printf("%sLink %i (%s)%s: %s\n",
1462 ansi_highlight(), ifindex
, name
, ansi_normal(),
1463 strna(link_info
.dnssec
));
1468 if (empty_line
&& *empty_line
)
1469 fputc('\n', stdout
);
1471 printf("%sLink %i (%s)%s\n",
1472 ansi_highlight(), ifindex
, name
, ansi_normal());
1474 if (link_info
.scopes_mask
== 0)
1475 printf(" Current Scopes: none\n");
1477 printf(" Current Scopes:%s%s%s%s%s\n",
1478 link_info
.scopes_mask
& SD_RESOLVED_DNS
? " DNS" : "",
1479 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
1480 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
1481 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
1482 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
1484 printf("DefaultRoute setting: %s\n"
1485 " LLMNR setting: %s\n"
1486 "MulticastDNS setting: %s\n"
1487 " DNSOverTLS setting: %s\n"
1488 " DNSSEC setting: %s\n"
1489 " DNSSEC supported: %s\n",
1490 yes_no(link_info
.default_route
),
1491 strna(link_info
.llmnr
),
1492 strna(link_info
.mdns
),
1493 strna(link_info
.dns_over_tls
),
1494 strna(link_info
.dnssec
),
1495 yes_no(link_info
.dnssec_supported
));
1497 if (link_info
.current_dns
)
1498 printf(" Current DNS Server: %s\n", link_info
.current_dns
);
1500 STRV_FOREACH(i
, link_info
.dns
) {
1502 i
== link_info
.dns
? "DNS Servers:" : " ",
1506 STRV_FOREACH(i
, link_info
.domains
) {
1508 i
== link_info
.domains
? "DNS Domain:" : " ",
1512 STRV_FOREACH(i
, link_info
.ntas
) {
1514 i
== link_info
.ntas
? "DNSSEC NTA:" : " ",
1524 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1525 char ***l
= userdata
;
1533 r
= sd_bus_message_enter_container(m
, 'a', "(iiay)");
1538 char *pretty
= NULL
;
1540 r
= read_dns_server_one(m
, true, &pretty
);
1546 if (isempty(pretty
))
1549 r
= strv_consume(l
, pretty
);
1554 r
= sd_bus_message_exit_container(m
);
1561 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1565 return read_dns_server_one(m
, true, userdata
);
1568 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1569 char ***l
= userdata
;
1577 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1582 char *pretty
= NULL
;
1584 r
= read_domain_one(m
, true, &pretty
);
1590 if (isempty(pretty
))
1593 r
= strv_consume(l
, pretty
);
1598 r
= sd_bus_message_exit_container(m
);
1605 static int status_print_strv_global(char **p
) {
1608 printf("%sGlobal%s:", ansi_highlight(), ansi_normal());
1618 struct global_info
{
1621 char **fallback_dns
;
1626 const char *dns_over_tls
;
1628 bool dnssec_supported
;
1631 static void global_info_clear(struct global_info
*p
) {
1632 free(p
->current_dns
);
1634 strv_free(p
->fallback_dns
);
1635 strv_free(p
->domains
);
1639 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1640 static const struct bus_properties_map property_map
[] = {
1641 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, dns
) },
1642 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, fallback_dns
) },
1643 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(struct global_info
, current_dns
) },
1644 { "Domains", "a(isb)", map_global_domains
, offsetof(struct global_info
, domains
) },
1645 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct global_info
, ntas
) },
1646 { "LLMNR", "s", NULL
, offsetof(struct global_info
, llmnr
) },
1647 { "MulticastDNS", "s", NULL
, offsetof(struct global_info
, mdns
) },
1648 { "DNSOverTLS", "s", NULL
, offsetof(struct global_info
, dns_over_tls
) },
1649 { "DNSSEC", "s", NULL
, offsetof(struct global_info
, dnssec
) },
1650 { "DNSSECSupported", "b", NULL
, offsetof(struct global_info
, dnssec_supported
) },
1653 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1654 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1655 _cleanup_(global_info_clear
) struct global_info global_info
= {};
1662 r
= bus_map_all_properties(bus
,
1663 "org.freedesktop.resolve1",
1664 "/org/freedesktop/resolve1",
1666 BUS_MAP_BOOLEAN_AS_BOOL
,
1671 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1673 (void) pager_open(arg_pager_flags
);
1675 if (mode
== STATUS_DNS
)
1676 return status_print_strv_global(global_info
.dns
);
1678 if (mode
== STATUS_DOMAIN
)
1679 return status_print_strv_global(global_info
.domains
);
1681 if (mode
== STATUS_NTA
)
1682 return status_print_strv_global(global_info
.ntas
);
1684 if (mode
== STATUS_LLMNR
) {
1685 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1686 strna(global_info
.llmnr
));
1691 if (mode
== STATUS_MDNS
) {
1692 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1693 strna(global_info
.mdns
));
1698 if (mode
== STATUS_PRIVATE
) {
1699 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1700 strna(global_info
.dns_over_tls
));
1705 if (mode
== STATUS_DNSSEC
) {
1706 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1707 strna(global_info
.dnssec
));
1712 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1714 printf(" LLMNR setting: %s\n"
1715 "MulticastDNS setting: %s\n"
1716 " DNSOverTLS setting: %s\n"
1717 " DNSSEC setting: %s\n"
1718 " DNSSEC supported: %s\n",
1719 strna(global_info
.llmnr
),
1720 strna(global_info
.mdns
),
1721 strna(global_info
.dns_over_tls
),
1722 strna(global_info
.dnssec
),
1723 yes_no(global_info
.dnssec_supported
));
1725 if (global_info
.current_dns
)
1726 printf(" Current DNS Server: %s\n", global_info
.current_dns
);
1728 STRV_FOREACH(i
, global_info
.dns
) {
1730 i
== global_info
.dns
? "DNS Servers:" : " ",
1734 STRV_FOREACH(i
, global_info
.fallback_dns
) {
1736 i
== global_info
.fallback_dns
? "Fallback DNS Servers:" : " ",
1740 STRV_FOREACH(i
, global_info
.domains
) {
1742 i
== global_info
.domains
? "DNS Domain:" : " ",
1746 strv_sort(global_info
.ntas
);
1747 STRV_FOREACH(i
, global_info
.ntas
) {
1749 i
== global_info
.ntas
? "DNSSEC NTA:" : " ",
1758 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1759 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1760 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1761 sd_netlink_message
*i
;
1762 bool empty_line
= false;
1767 r
= status_global(bus
, mode
, &empty_line
);
1771 r
= sd_netlink_open(&rtnl
);
1773 return log_error_errno(r
, "Failed to connect to netlink: %m");
1775 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1777 return rtnl_log_create_error(r
);
1779 r
= sd_netlink_message_request_dump(req
, true);
1781 return rtnl_log_create_error(r
);
1783 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1785 return log_error_errno(r
, "Failed to enumerate links: %m");
1788 for (i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1793 q
= sd_netlink_message_get_type(i
, &type
);
1795 return rtnl_log_parse_error(q
);
1797 if (type
!= RTM_NEWLINK
)
1800 q
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1802 return rtnl_log_parse_error(q
);
1804 if (ifindex
== LOOPBACK_IFINDEX
)
1807 q
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1809 return rtnl_log_parse_error(q
);
1811 q
= status_ifindex(bus
, ifindex
, name
, mode
, &empty_line
);
1812 if (q
< 0 && r
>= 0)
1819 static int verb_status(int argc
, char **argv
, void *userdata
) {
1820 sd_bus
*bus
= userdata
;
1825 bool empty_line
= false;
1827 STRV_FOREACH(ifname
, argv
+ 1) {
1830 q
= parse_ifindex_or_ifname(*ifname
, &ifindex
);
1832 log_error_errno(q
, "Unknown interface '%s', ignoring: %m", *ifname
);
1836 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1841 r
= status_all(bus
, STATUS_ALL
);
1846 static int log_interface_is_managed(int r
, int ifindex
) {
1847 char ifname
[IFNAMSIZ
];
1849 return log_error_errno(r
,
1850 "The specified interface %s is managed by systemd-networkd. Operation refused.\n"
1851 "Please configure DNS settings for systemd-networkd managed interfaces directly in their .network files.",
1852 strna(if_indextoname(ifindex
, ifname
)));
1855 static int verb_dns(int argc
, char **argv
, void *userdata
) {
1856 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1857 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1858 sd_bus
*bus
= userdata
;
1865 r
= ifname_mangle(argv
[1]);
1870 if (arg_ifindex
<= 0)
1871 return status_all(bus
, STATUS_DNS
);
1874 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
1876 r
= sd_bus_message_new_method_call(
1879 "org.freedesktop.resolve1",
1880 "/org/freedesktop/resolve1",
1881 "org.freedesktop.resolve1.Manager",
1884 return bus_log_create_error(r
);
1886 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1888 return bus_log_create_error(r
);
1890 r
= sd_bus_message_open_container(req
, 'a', "(iay)");
1892 return bus_log_create_error(r
);
1894 /* If only argument is the empty string, then call SetLinkDNS() with an
1895 * empty list, which will clear the list of domains for an interface. */
1896 if (!strv_equal(argv
+ 2, STRV_MAKE(""))) {
1897 STRV_FOREACH(p
, argv
+ 2) {
1898 struct in_addr_data data
;
1900 r
= in_addr_from_string_auto(*p
, &data
.family
, &data
.address
);
1902 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
1904 r
= sd_bus_message_open_container(req
, 'r', "iay");
1906 return bus_log_create_error(r
);
1908 r
= sd_bus_message_append(req
, "i", data
.family
);
1910 return bus_log_create_error(r
);
1912 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
1914 return bus_log_create_error(r
);
1916 r
= sd_bus_message_close_container(req
);
1918 return bus_log_create_error(r
);
1922 r
= sd_bus_message_close_container(req
);
1924 return bus_log_create_error(r
);
1926 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
1928 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
1929 return log_interface_is_managed(r
, arg_ifindex
);
1931 if (arg_ifindex_permissive
&&
1932 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1935 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
1941 static int verb_domain(int argc
, char **argv
, void *userdata
) {
1942 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1943 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1944 sd_bus
*bus
= userdata
;
1951 r
= ifname_mangle(argv
[1]);
1956 if (arg_ifindex
<= 0)
1957 return status_all(bus
, STATUS_DOMAIN
);
1960 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
1962 r
= sd_bus_message_new_method_call(
1965 "org.freedesktop.resolve1",
1966 "/org/freedesktop/resolve1",
1967 "org.freedesktop.resolve1.Manager",
1970 return bus_log_create_error(r
);
1972 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1974 return bus_log_create_error(r
);
1976 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
1978 return bus_log_create_error(r
);
1980 /* If only argument is the empty string, then call SetLinkDomains() with an
1981 * empty list, which will clear the list of domains for an interface. */
1982 if (!strv_equal(argv
+ 2, STRV_MAKE(""))) {
1983 STRV_FOREACH(p
, argv
+ 2) {
1986 n
= **p
== '~' ? *p
+ 1 : *p
;
1988 r
= dns_name_is_valid(n
);
1990 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
1992 log_error("Domain not valid: %s", n
);
1996 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
1998 return bus_log_create_error(r
);
2002 r
= sd_bus_message_close_container(req
);
2004 return bus_log_create_error(r
);
2006 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
2008 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2009 return log_interface_is_managed(r
, arg_ifindex
);
2011 if (arg_ifindex_permissive
&&
2012 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2015 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2021 static int verb_default_route(int argc
, char **argv
, void *userdata
) {
2022 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2023 sd_bus
*bus
= userdata
;
2029 r
= ifname_mangle(argv
[1]);
2034 if (arg_ifindex
<= 0)
2035 return status_all(bus
, STATUS_DEFAULT_ROUTE
);
2038 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DEFAULT_ROUTE
, NULL
);
2040 b
= parse_boolean(argv
[2]);
2042 return log_error_errno(b
, "Failed to parse boolean argument: %s", argv
[2]);
2044 r
= sd_bus_call_method(bus
,
2045 "org.freedesktop.resolve1",
2046 "/org/freedesktop/resolve1",
2047 "org.freedesktop.resolve1.Manager",
2048 "SetLinkDefaultRoute",
2051 "ib", arg_ifindex
, b
);
2053 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2054 return log_interface_is_managed(r
, arg_ifindex
);
2056 if (arg_ifindex_permissive
&&
2057 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2060 return log_error_errno(r
, "Failed to set default route configuration: %s", bus_error_message(&error
, r
));
2066 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2067 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2068 sd_bus
*bus
= userdata
;
2074 r
= ifname_mangle(argv
[1]);
2079 if (arg_ifindex
<= 0)
2080 return status_all(bus
, STATUS_LLMNR
);
2083 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2085 r
= sd_bus_call_method(bus
,
2086 "org.freedesktop.resolve1",
2087 "/org/freedesktop/resolve1",
2088 "org.freedesktop.resolve1.Manager",
2092 "is", arg_ifindex
, argv
[2]);
2094 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2095 return log_interface_is_managed(r
, arg_ifindex
);
2097 if (arg_ifindex_permissive
&&
2098 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2101 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2107 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2108 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2109 sd_bus
*bus
= userdata
;
2115 r
= ifname_mangle(argv
[1]);
2120 if (arg_ifindex
<= 0)
2121 return status_all(bus
, STATUS_MDNS
);
2124 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2126 r
= sd_bus_call_method(bus
,
2127 "org.freedesktop.resolve1",
2128 "/org/freedesktop/resolve1",
2129 "org.freedesktop.resolve1.Manager",
2130 "SetLinkMulticastDNS",
2133 "is", arg_ifindex
, argv
[2]);
2135 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2136 return log_interface_is_managed(r
, arg_ifindex
);
2138 if (arg_ifindex_permissive
&&
2139 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2142 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2148 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2149 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2150 sd_bus
*bus
= userdata
;
2156 r
= ifname_mangle(argv
[1]);
2161 if (arg_ifindex
<= 0)
2162 return status_all(bus
, STATUS_PRIVATE
);
2165 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2167 r
= sd_bus_call_method(bus
,
2168 "org.freedesktop.resolve1",
2169 "/org/freedesktop/resolve1",
2170 "org.freedesktop.resolve1.Manager",
2171 "SetLinkDNSOverTLS",
2174 "is", arg_ifindex
, argv
[2]);
2176 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2177 return log_interface_is_managed(r
, arg_ifindex
);
2179 if (arg_ifindex_permissive
&&
2180 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2183 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2189 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2190 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2191 sd_bus
*bus
= userdata
;
2197 r
= ifname_mangle(argv
[1]);
2202 if (arg_ifindex
<= 0)
2203 return status_all(bus
, STATUS_DNSSEC
);
2206 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2208 r
= sd_bus_call_method(bus
,
2209 "org.freedesktop.resolve1",
2210 "/org/freedesktop/resolve1",
2211 "org.freedesktop.resolve1.Manager",
2215 "is", arg_ifindex
, argv
[2]);
2217 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2218 return log_interface_is_managed(r
, arg_ifindex
);
2220 if (arg_ifindex_permissive
&&
2221 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2224 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2230 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2231 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2232 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2233 sd_bus
*bus
= userdata
;
2241 r
= ifname_mangle(argv
[1]);
2246 if (arg_ifindex
<= 0)
2247 return status_all(bus
, STATUS_NTA
);
2250 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2252 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2253 * with an empty list, which will clear the list of domains for an interface. */
2254 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2257 STRV_FOREACH(p
, argv
+ 2) {
2258 r
= dns_name_is_valid(*p
);
2260 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2262 log_error("Domain not valid: %s", *p
);
2267 r
= sd_bus_message_new_method_call(
2270 "org.freedesktop.resolve1",
2271 "/org/freedesktop/resolve1",
2272 "org.freedesktop.resolve1.Manager",
2273 "SetLinkDNSSECNegativeTrustAnchors");
2275 return bus_log_create_error(r
);
2277 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2279 return bus_log_create_error(r
);
2281 r
= sd_bus_message_append_strv(req
, clear
? NULL
: argv
+ 2);
2283 return bus_log_create_error(r
);
2285 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
2287 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2288 return log_interface_is_managed(r
, arg_ifindex
);
2290 if (arg_ifindex_permissive
&&
2291 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2294 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2300 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2301 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2302 sd_bus
*bus
= userdata
;
2308 r
= ifname_mangle(argv
[1]);
2313 if (arg_ifindex
<= 0)
2314 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
), "Interface argument required.");
2316 r
= sd_bus_call_method(bus
,
2317 "org.freedesktop.resolve1",
2318 "/org/freedesktop/resolve1",
2319 "org.freedesktop.resolve1.Manager",
2325 if (arg_ifindex_permissive
&&
2326 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2329 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2335 static void help_protocol_types(void) {
2337 puts("Known protocol types:");
2338 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2341 static void help_dns_types(void) {
2343 puts("Known DNS RR types:");
2345 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2348 static void help_dns_classes(void) {
2350 puts("Known DNS RR classes:");
2352 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2355 static int compat_help(void) {
2356 _cleanup_free_
char *link
= NULL
;
2359 r
= terminal_urlify_man("resolvectl", "1", &link
);
2363 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2364 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2365 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2366 "%1$s [OPTIONS...] --statistics\n"
2367 "%1$s [OPTIONS...] --reset-statistics\n"
2369 "Resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n\n"
2370 " -h --help Show this help\n"
2371 " --version Show package version\n"
2372 " --no-pager Do not pipe output into a pager\n"
2373 " -4 Resolve IPv4 addresses\n"
2374 " -6 Resolve IPv6 addresses\n"
2375 " -i --interface=INTERFACE Look on interface\n"
2376 " -p --protocol=PROTO|help Look via protocol\n"
2377 " -t --type=TYPE|help Query RR with DNS type\n"
2378 " -c --class=CLASS|help Query RR with DNS class\n"
2379 " --service Resolve service (SRV)\n"
2380 " --service-address=BOOL Resolve address for services (default: yes)\n"
2381 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2382 " --openpgp Query OpenPGP public key\n"
2383 " --tlsa Query TLS public key\n"
2384 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2385 " --search=BOOL Use search domains for single-label names\n"
2387 " --raw[=payload|packet] Dump the answer as binary data\n"
2388 " --legend=BOOL Print headers and additional info (default: yes)\n"
2389 " --statistics Show resolver statistics\n"
2390 " --reset-statistics Reset resolver statistics\n"
2391 " --status Show link and server status\n"
2392 " --flush-caches Flush all local DNS caches\n"
2393 " --reset-server-features\n"
2394 " Forget learnt DNS server feature levels\n"
2395 " --set-dns=SERVER Set per-interface DNS server address\n"
2396 " --set-domain=DOMAIN Set per-interface search domain\n"
2397 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2398 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2399 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2400 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2401 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2402 " --revert Revert per-interface configuration\n"
2403 "\nSee the %2$s for details.\n"
2404 , program_invocation_short_name
2411 static int native_help(void) {
2412 _cleanup_free_
char *link
= NULL
;
2415 r
= terminal_urlify_man("resolvectl", "1", &link
);
2419 printf("%1$s [OPTIONS...] {COMMAND} ...\n"
2421 "Send control commands to the network name resolution manager, or\n"
2422 "resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n"
2424 " -h --help Show this help\n"
2425 " --version Show package version\n"
2426 " --no-pager Do not pipe output into a pager\n"
2427 " -4 Resolve IPv4 addresses\n"
2428 " -6 Resolve IPv6 addresses\n"
2429 " -i --interface=INTERFACE Look on interface\n"
2430 " -p --protocol=PROTO|help Look via protocol\n"
2431 " -t --type=TYPE|help Query RR with DNS type\n"
2432 " -c --class=CLASS|help Query RR with DNS class\n"
2433 " --service-address=BOOL Resolve address for services (default: yes)\n"
2434 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2435 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2436 " --search=BOOL Use search domains for single-label names\n"
2438 " --raw[=payload|packet] Dump the answer as binary data\n"
2439 " --legend=BOOL Print headers and additional info (default: yes)\n"
2442 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2443 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2444 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2445 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2446 " status [LINK...] Show link and server status\n"
2447 " statistics Show resolver statistics\n"
2448 " reset-statistics Reset resolver statistics\n"
2449 " flush-caches Flush all local DNS caches\n"
2450 " reset-server-features Forget learnt DNS server feature levels\n"
2451 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2452 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2453 " default-route [LINK [BOOL]] Get/set per-interface default route flag\n"
2454 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2455 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2456 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2457 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2458 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2459 " revert LINK Revert per-interface configuration\n"
2460 "\nSee the %2$s for details.\n"
2461 , program_invocation_short_name
2468 static int verb_help(int argc
, char **argv
, void *userdata
) {
2469 return native_help();
2472 static int compat_parse_argv(int argc
, char *argv
[]) {
2474 ARG_VERSION
= 0x100,
2478 ARG_SERVICE_ADDRESS
,
2485 ARG_RESET_STATISTICS
,
2488 ARG_RESET_SERVER_FEATURES
,
2500 static const struct option options
[] = {
2501 { "help", no_argument
, NULL
, 'h' },
2502 { "version", no_argument
, NULL
, ARG_VERSION
},
2503 { "type", required_argument
, NULL
, 't' },
2504 { "class", required_argument
, NULL
, 'c' },
2505 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2506 { "interface", required_argument
, NULL
, 'i' },
2507 { "protocol", required_argument
, NULL
, 'p' },
2508 { "cname", required_argument
, NULL
, ARG_CNAME
},
2509 { "service", no_argument
, NULL
, ARG_SERVICE
},
2510 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2511 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2512 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2513 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2514 { "raw", optional_argument
, NULL
, ARG_RAW
},
2515 { "search", required_argument
, NULL
, ARG_SEARCH
},
2516 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2517 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2518 { "status", no_argument
, NULL
, ARG_STATUS
},
2519 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2520 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2521 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2522 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2523 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2524 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2525 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2526 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2527 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2528 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2529 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2538 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2542 return compat_help();
2548 arg_family
= AF_INET
;
2552 arg_family
= AF_INET6
;
2556 r
= ifname_mangle(optarg
);
2562 if (streq(optarg
, "help")) {
2567 r
= dns_type_from_string(optarg
);
2569 log_error("Failed to parse RR record type %s", optarg
);
2572 arg_type
= (uint16_t) r
;
2573 assert((int) arg_type
== r
);
2575 arg_mode
= MODE_RESOLVE_RECORD
;
2579 if (streq(optarg
, "help")) {
2584 r
= dns_class_from_string(optarg
);
2586 log_error("Failed to parse RR record class %s", optarg
);
2589 arg_class
= (uint16_t) r
;
2590 assert((int) arg_class
== r
);
2595 r
= parse_boolean(optarg
);
2597 return log_error_errno(r
, "Failed to parse --legend= argument");
2603 if (streq(optarg
, "help")) {
2604 help_protocol_types();
2606 } else if (streq(optarg
, "dns"))
2607 arg_flags
|= SD_RESOLVED_DNS
;
2608 else if (streq(optarg
, "llmnr"))
2609 arg_flags
|= SD_RESOLVED_LLMNR
;
2610 else if (streq(optarg
, "llmnr-ipv4"))
2611 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2612 else if (streq(optarg
, "llmnr-ipv6"))
2613 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2614 else if (streq(optarg
, "mdns"))
2615 arg_flags
|= SD_RESOLVED_MDNS
;
2616 else if (streq(optarg
, "mdns-ipv4"))
2617 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2618 else if (streq(optarg
, "mdns-ipv6"))
2619 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2621 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2622 "Unknown protocol specifier: %s", optarg
);
2627 arg_mode
= MODE_RESOLVE_SERVICE
;
2631 arg_mode
= MODE_RESOLVE_OPENPGP
;
2635 arg_mode
= MODE_RESOLVE_TLSA
;
2636 if (!optarg
|| service_family_is_valid(optarg
))
2637 arg_service_family
= optarg
;
2639 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2640 "Unknown service family \"%s\".", optarg
);
2645 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2646 "Refusing to write binary data to tty.");
2648 if (optarg
== NULL
|| streq(optarg
, "payload"))
2649 arg_raw
= RAW_PAYLOAD
;
2650 else if (streq(optarg
, "packet"))
2651 arg_raw
= RAW_PACKET
;
2653 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2654 "Unknown --raw specifier \"%s\".",
2661 r
= parse_boolean(optarg
);
2663 return log_error_errno(r
, "Failed to parse --cname= argument.");
2664 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2667 case ARG_SERVICE_ADDRESS
:
2668 r
= parse_boolean(optarg
);
2670 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2671 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2674 case ARG_SERVICE_TXT
:
2675 r
= parse_boolean(optarg
);
2677 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2678 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2682 r
= parse_boolean(optarg
);
2684 return log_error_errno(r
, "Failed to parse --search argument.");
2685 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2688 case ARG_STATISTICS
:
2689 arg_mode
= MODE_STATISTICS
;
2692 case ARG_RESET_STATISTICS
:
2693 arg_mode
= MODE_RESET_STATISTICS
;
2696 case ARG_FLUSH_CACHES
:
2697 arg_mode
= MODE_FLUSH_CACHES
;
2700 case ARG_RESET_SERVER_FEATURES
:
2701 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2705 arg_mode
= MODE_STATUS
;
2709 arg_pager_flags
|= PAGER_DISABLE
;
2713 r
= strv_extend(&arg_set_dns
, optarg
);
2717 arg_mode
= MODE_SET_LINK
;
2720 case ARG_SET_DOMAIN
:
2721 r
= strv_extend(&arg_set_domain
, optarg
);
2725 arg_mode
= MODE_SET_LINK
;
2729 arg_set_llmnr
= optarg
;
2730 arg_mode
= MODE_SET_LINK
;
2734 arg_set_mdns
= optarg
;
2735 arg_mode
= MODE_SET_LINK
;
2738 case ARG_SET_PRIVATE
:
2739 arg_set_dns_over_tls
= optarg
;
2740 arg_mode
= MODE_SET_LINK
;
2743 case ARG_SET_DNSSEC
:
2744 arg_set_dnssec
= optarg
;
2745 arg_mode
= MODE_SET_LINK
;
2749 r
= strv_extend(&arg_set_nta
, optarg
);
2753 arg_mode
= MODE_SET_LINK
;
2756 case ARG_REVERT_LINK
:
2757 arg_mode
= MODE_REVERT_LINK
;
2764 assert_not_reached("Unhandled option");
2767 if (arg_type
== 0 && arg_class
!= 0)
2768 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2769 "--class= may only be used in conjunction with --type=.");
2771 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
)
2772 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2773 "--service and --type= may not be combined.");
2775 if (arg_type
!= 0 && arg_class
== 0)
2776 arg_class
= DNS_CLASS_IN
;
2778 if (arg_class
!= 0 && arg_type
== 0)
2779 arg_type
= DNS_TYPE_A
;
2781 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2783 if (arg_ifindex
<= 0)
2784 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2785 "--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2788 return 1 /* work to do */;
2791 static int native_parse_argv(int argc
, char *argv
[]) {
2793 ARG_VERSION
= 0x100,
2796 ARG_SERVICE_ADDRESS
,
2803 static const struct option options
[] = {
2804 { "help", no_argument
, NULL
, 'h' },
2805 { "version", no_argument
, NULL
, ARG_VERSION
},
2806 { "type", required_argument
, NULL
, 't' },
2807 { "class", required_argument
, NULL
, 'c' },
2808 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2809 { "interface", required_argument
, NULL
, 'i' },
2810 { "protocol", required_argument
, NULL
, 'p' },
2811 { "cname", required_argument
, NULL
, ARG_CNAME
},
2812 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2813 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2814 { "raw", optional_argument
, NULL
, ARG_RAW
},
2815 { "search", required_argument
, NULL
, ARG_SEARCH
},
2816 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2825 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2829 return native_help();
2835 arg_family
= AF_INET
;
2839 arg_family
= AF_INET6
;
2843 r
= ifname_mangle(optarg
);
2849 if (streq(optarg
, "help")) {
2854 r
= dns_type_from_string(optarg
);
2856 log_error("Failed to parse RR record type %s", optarg
);
2859 arg_type
= (uint16_t) r
;
2860 assert((int) arg_type
== r
);
2865 if (streq(optarg
, "help")) {
2870 r
= dns_class_from_string(optarg
);
2872 log_error("Failed to parse RR record class %s", optarg
);
2875 arg_class
= (uint16_t) r
;
2876 assert((int) arg_class
== r
);
2881 r
= parse_boolean(optarg
);
2883 return log_error_errno(r
, "Failed to parse --legend= argument");
2889 if (streq(optarg
, "help")) {
2890 help_protocol_types();
2892 } else if (streq(optarg
, "dns"))
2893 arg_flags
|= SD_RESOLVED_DNS
;
2894 else if (streq(optarg
, "llmnr"))
2895 arg_flags
|= SD_RESOLVED_LLMNR
;
2896 else if (streq(optarg
, "llmnr-ipv4"))
2897 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2898 else if (streq(optarg
, "llmnr-ipv6"))
2899 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2900 else if (streq(optarg
, "mdns"))
2901 arg_flags
|= SD_RESOLVED_MDNS
;
2902 else if (streq(optarg
, "mdns-ipv4"))
2903 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2904 else if (streq(optarg
, "mdns-ipv6"))
2905 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2907 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2908 "Unknown protocol specifier: %s",
2915 return log_error_errno(SYNTHETIC_ERRNO(ENOTTY
),
2916 "Refusing to write binary data to tty.");
2918 if (optarg
== NULL
|| streq(optarg
, "payload"))
2919 arg_raw
= RAW_PAYLOAD
;
2920 else if (streq(optarg
, "packet"))
2921 arg_raw
= RAW_PACKET
;
2923 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2924 "Unknown --raw specifier \"%s\".",
2931 r
= parse_boolean(optarg
);
2933 return log_error_errno(r
, "Failed to parse --cname= argument.");
2934 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2937 case ARG_SERVICE_ADDRESS
:
2938 r
= parse_boolean(optarg
);
2940 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2941 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2944 case ARG_SERVICE_TXT
:
2945 r
= parse_boolean(optarg
);
2947 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2948 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2952 r
= parse_boolean(optarg
);
2954 return log_error_errno(r
, "Failed to parse --search argument.");
2955 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2959 arg_pager_flags
|= PAGER_DISABLE
;
2966 assert_not_reached("Unhandled option");
2969 if (arg_type
== 0 && arg_class
!= 0)
2970 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
2971 "--class= may only be used in conjunction with --type=.");
2973 if (arg_type
!= 0 && arg_class
== 0)
2974 arg_class
= DNS_CLASS_IN
;
2976 if (arg_class
!= 0 && arg_type
== 0)
2977 arg_type
= DNS_TYPE_A
;
2979 return 1 /* work to do */;
2982 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
2984 static const Verb verbs
[] = {
2985 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
2986 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
2987 { "query", 2, VERB_ANY
, 0, verb_query
},
2988 { "service", 2, 4, 0, verb_service
},
2989 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
2990 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
2991 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
2992 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
2993 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
2994 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
2995 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
2996 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
2997 { "default-route", VERB_ANY
, 3, 0, verb_default_route
},
2998 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
2999 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
3000 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
3001 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
3002 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
3003 { "revert", VERB_ANY
, 2, 0, verb_revert_link
},
3007 return dispatch_verb(argc
, argv
, verbs
, bus
);
3010 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
3015 assert(num_args
== 0 || args
);
3017 num
= !!single_arg
+ num_args
+ 1;
3019 p
= fake
= newa0(char *, num
+ 1);
3020 *p
++ = (char *) verb
;
3022 *p
++ = (char *) single_arg
;
3023 for (i
= 0; i
< num_args
; i
++)
3027 return native_main((int) num
, fake
, bus
);
3030 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
3034 case MODE_RESOLVE_HOST
:
3035 case MODE_RESOLVE_RECORD
:
3036 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
3038 case MODE_RESOLVE_SERVICE
:
3039 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
3041 case MODE_RESOLVE_OPENPGP
:
3042 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3044 case MODE_RESOLVE_TLSA
:
3045 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3047 case MODE_STATISTICS
:
3048 return translate("statistics", NULL
, 0, NULL
, bus
);
3050 case MODE_RESET_STATISTICS
:
3051 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3053 case MODE_FLUSH_CACHES
:
3054 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3056 case MODE_RESET_SERVER_FEATURES
:
3057 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3060 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3066 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3071 if (arg_set_domain
) {
3072 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3078 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3083 if (arg_set_llmnr
) {
3084 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3090 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3095 if (arg_set_dns_over_tls
) {
3096 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3101 if (arg_set_dnssec
) {
3102 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3109 case MODE_REVERT_LINK
:
3112 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3115 assert_not_reached("invalid mode");
3121 static int run(int argc
, char **argv
) {
3122 _cleanup_(sd_bus_flush_close_unrefp
) sd_bus
*bus
= NULL
;
3125 setlocale(LC_ALL
, "");
3126 log_show_color(true);
3127 log_parse_environment();
3130 if (streq(program_invocation_short_name
, "resolvconf"))
3131 r
= resolvconf_parse_argv(argc
, argv
);
3132 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3133 r
= compat_parse_argv(argc
, argv
);
3135 r
= native_parse_argv(argc
, argv
);
3139 r
= sd_bus_open_system(&bus
);
3141 return log_error_errno(r
, "sd_bus_open_system: %m");
3143 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3144 return compat_main(argc
, argv
, bus
);
3146 return native_main(argc
, argv
, bus
);
3149 DEFINE_MAIN_FUNCTION(run
);