1 /* SPDX-License-Identifier: LGPL-2.1+ */
7 #include "sd-netlink.h"
10 #include "alloc-util.h"
11 #include "bus-common-errors.h"
12 #include "bus-error.h"
14 #include "dns-domain.h"
16 #include "gcrypt-util.h"
17 #include "in-addr-util.h"
18 #include "netlink-util.h"
20 #include "parse-util.h"
21 #include "pretty-print.h"
22 #include "resolvconf-compat.h"
23 #include "resolvectl.h"
24 #include "resolved-def.h"
25 #include "resolved-dns-packet.h"
26 #include "string-table.h"
28 #include "terminal-util.h"
31 static int arg_family
= AF_UNSPEC
;
32 static int arg_ifindex
= 0;
33 static char *arg_ifname
= NULL
;
34 static uint16_t arg_type
= 0;
35 static uint16_t arg_class
= 0;
36 static bool arg_legend
= true;
37 static uint64_t arg_flags
= 0;
38 static PagerFlags arg_pager_flags
= 0;
39 bool arg_ifindex_permissive
= false; /* If true, don't generate an error if the specified interface index doesn't exist */
40 static const char *arg_service_family
= NULL
;
42 typedef enum RawType
{
47 static RawType arg_raw
= RAW_NONE
;
49 ExecutionMode arg_mode
= MODE_RESOLVE_HOST
;
51 char **arg_set_dns
= NULL
;
52 char **arg_set_domain
= NULL
;
53 static const char *arg_set_llmnr
= NULL
;
54 static const char *arg_set_mdns
= NULL
;
55 static const char *arg_set_dns_over_tls
= NULL
;
56 static const char *arg_set_dnssec
= NULL
;
57 static char **arg_set_nta
= NULL
;
59 typedef enum StatusMode
{
70 static int parse_ifindex_and_warn(const char *s
) {
75 if (parse_ifindex(s
, &ifi
) < 0) {
76 ifi
= if_nametoindex(s
);
78 return log_error_errno(errno
, "Unknown interface '%s': %m", s
);
84 int ifname_mangle(const char *s
, bool allow_loopback
) {
85 _cleanup_free_
char *iface
= NULL
;
92 assert(arg_ifindex
>= 0);
94 if (!allow_loopback
&& arg_ifindex
== LOOPBACK_IFINDEX
) {
95 log_error("Interface can't be the loopback interface (lo). Sorry.");
102 dot
= strchr(s
, '.');
104 iface
= strndup(s
, dot
- s
);
108 log_debug("Ignoring protocol specifier '%s'.", dot
+ 1);
115 if (parse_ifindex(iface
, &r
) < 0) {
116 r
= if_nametoindex(iface
);
118 if (errno
== ENODEV
&& arg_ifindex_permissive
) {
119 log_debug("Interface '%s' not found, but -f specified, ignoring.", iface
);
123 return log_error_errno(errno
, "Unknown interface '%s': %m", iface
);
127 if (!allow_loopback
&& r
== LOOPBACK_IFINDEX
) {
128 log_error("Interface can't be the loopback interface (lo). Sorry.");
133 arg_ifname
= TAKE_PTR(iface
);
138 static void print_source(uint64_t flags
, usec_t rtt
) {
139 char rtt_str
[FORMAT_TIMESTAMP_MAX
];
147 fputs("\n-- Information acquired via", stdout
);
150 printf(" protocol%s%s%s%s%s",
151 flags
& SD_RESOLVED_DNS
? " DNS" :"",
152 flags
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
153 flags
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
154 flags
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
155 flags
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
157 assert_se(format_timespan(rtt_str
, sizeof(rtt_str
), rtt
, 100));
159 printf(" in %s", rtt_str
);
164 printf("-- Data is authenticated: %s\n", yes_no(flags
& SD_RESOLVED_AUTHENTICATED
));
167 static int resolve_host(sd_bus
*bus
, const char *name
) {
168 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
169 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
170 const char *canonical
= NULL
;
178 log_debug("Resolving %s (family %s, interface %s).", name
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
180 r
= sd_bus_message_new_method_call(
183 "org.freedesktop.resolve1",
184 "/org/freedesktop/resolve1",
185 "org.freedesktop.resolve1.Manager",
188 return bus_log_create_error(r
);
190 r
= sd_bus_message_append(req
, "isit", arg_ifindex
, name
, arg_family
, arg_flags
);
192 return bus_log_create_error(r
);
194 ts
= now(CLOCK_MONOTONIC
);
196 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
198 return log_error_errno(r
, "%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
200 ts
= now(CLOCK_MONOTONIC
) - ts
;
202 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
204 return bus_log_parse_error(r
);
206 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
207 _cleanup_free_
char *pretty
= NULL
;
208 char ifname
[IF_NAMESIZE
] = "";
213 assert_cc(sizeof(int) == sizeof(int32_t));
215 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
217 return bus_log_parse_error(r
);
219 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
221 return bus_log_parse_error(r
);
223 r
= sd_bus_message_exit_container(reply
);
225 return bus_log_parse_error(r
);
227 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
228 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
232 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
233 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
237 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
238 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
240 r
= in_addr_ifindex_to_string(family
, a
, ifindex
, &pretty
);
242 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
244 printf("%*s%s %s%s%s\n",
245 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
247 isempty(ifname
) ? "" : "%", ifname
);
252 return bus_log_parse_error(r
);
254 r
= sd_bus_message_exit_container(reply
);
256 return bus_log_parse_error(r
);
258 r
= sd_bus_message_read(reply
, "st", &canonical
, &flags
);
260 return bus_log_parse_error(r
);
262 if (!streq(name
, canonical
))
263 printf("%*s%s (%s)\n",
264 (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? ":" : " ",
268 log_error("%s: no addresses found", name
);
272 print_source(flags
, ts
);
277 static int resolve_address(sd_bus
*bus
, int family
, const union in_addr_union
*address
, int ifindex
) {
278 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
279 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
280 _cleanup_free_
char *pretty
= NULL
;
281 char ifname
[IF_NAMESIZE
] = "";
288 assert(IN_SET(family
, AF_INET
, AF_INET6
));
292 ifindex
= arg_ifindex
;
294 r
= in_addr_ifindex_to_string(family
, address
, ifindex
, &pretty
);
298 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
299 return log_error_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
301 log_debug("Resolving %s%s%s.", pretty
, isempty(ifname
) ? "" : "%", ifname
);
303 r
= sd_bus_message_new_method_call(
306 "org.freedesktop.resolve1",
307 "/org/freedesktop/resolve1",
308 "org.freedesktop.resolve1.Manager",
311 return bus_log_create_error(r
);
313 r
= sd_bus_message_append(req
, "ii", ifindex
, family
);
315 return bus_log_create_error(r
);
317 r
= sd_bus_message_append_array(req
, 'y', address
, FAMILY_ADDRESS_SIZE(family
));
319 return bus_log_create_error(r
);
321 r
= sd_bus_message_append(req
, "t", arg_flags
);
323 return bus_log_create_error(r
);
325 ts
= now(CLOCK_MONOTONIC
);
327 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
329 return log_error_errno(r
, "%s: resolve call failed: %s", pretty
, bus_error_message(&error
, r
));
331 ts
= now(CLOCK_MONOTONIC
) - ts
;
333 r
= sd_bus_message_enter_container(reply
, 'a', "(is)");
335 return bus_log_create_error(r
);
337 while ((r
= sd_bus_message_enter_container(reply
, 'r', "is")) > 0) {
340 assert_cc(sizeof(int) == sizeof(int32_t));
342 r
= sd_bus_message_read(reply
, "is", &ifindex
, &n
);
346 r
= sd_bus_message_exit_container(reply
);
351 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
352 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
354 printf("%*s%*s%*s%s %s\n",
355 (int) strlen(pretty
), c
== 0 ? pretty
: "",
356 isempty(ifname
) ? 0 : 1, c
> 0 || isempty(ifname
) ? "" : "%",
357 (int) strlen(ifname
), c
== 0 ? ifname
: "",
364 return bus_log_parse_error(r
);
366 r
= sd_bus_message_exit_container(reply
);
368 return bus_log_parse_error(r
);
370 r
= sd_bus_message_read(reply
, "t", &flags
);
372 return bus_log_parse_error(r
);
375 log_error("%s: no names found", pretty
);
379 print_source(flags
, ts
);
384 static int output_rr_packet(const void *d
, size_t l
, int ifindex
) {
385 _cleanup_(dns_resource_record_unrefp
) DnsResourceRecord
*rr
= NULL
;
386 _cleanup_(dns_packet_unrefp
) DnsPacket
*p
= NULL
;
388 char ifname
[IF_NAMESIZE
] = "";
390 r
= dns_packet_new(&p
, DNS_PROTOCOL_DNS
, 0, DNS_PACKET_SIZE_MAX
);
394 p
->refuse_compression
= true;
396 r
= dns_packet_append_blob(p
, d
, l
, NULL
);
400 r
= dns_packet_read_rr(p
, &rr
, NULL
, NULL
);
402 return log_error_errno(r
, "Failed to parse RR: %m");
404 if (arg_raw
== RAW_PAYLOAD
) {
408 k
= dns_resource_record_payload(rr
, &data
);
410 return log_error_errno(k
, "Cannot dump RR: %m");
411 fwrite(data
, 1, k
, stdout
);
415 s
= dns_resource_record_to_string(rr
);
419 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
420 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
422 printf("%s%s%s\n", s
, isempty(ifname
) ? "" : " # interface ", ifname
);
428 static int resolve_record(sd_bus
*bus
, const char *name
, uint16_t class, uint16_t type
, bool warn_missing
) {
429 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
430 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
435 bool needs_authentication
= false;
439 log_debug("Resolving %s %s %s (interface %s).", name
, dns_class_to_string(class), dns_type_to_string(type
), isempty(arg_ifname
) ? "*" : arg_ifname
);
441 r
= sd_bus_message_new_method_call(
444 "org.freedesktop.resolve1",
445 "/org/freedesktop/resolve1",
446 "org.freedesktop.resolve1.Manager",
449 return bus_log_create_error(r
);
451 r
= sd_bus_message_append(req
, "isqqt", arg_ifindex
, name
, class, type
, arg_flags
);
453 return bus_log_create_error(r
);
455 ts
= now(CLOCK_MONOTONIC
);
457 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
459 if (warn_missing
|| r
!= -ENXIO
)
460 log_error("%s: resolve call failed: %s", name
, bus_error_message(&error
, r
));
464 ts
= now(CLOCK_MONOTONIC
) - ts
;
466 r
= sd_bus_message_enter_container(reply
, 'a', "(iqqay)");
468 return bus_log_parse_error(r
);
470 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iqqay")) > 0) {
476 assert_cc(sizeof(int) == sizeof(int32_t));
478 r
= sd_bus_message_read(reply
, "iqq", &ifindex
, &c
, &t
);
480 return bus_log_parse_error(r
);
482 r
= sd_bus_message_read_array(reply
, 'y', &d
, &l
);
484 return bus_log_parse_error(r
);
486 r
= sd_bus_message_exit_container(reply
);
488 return bus_log_parse_error(r
);
490 if (arg_raw
== RAW_PACKET
) {
491 uint64_t u64
= htole64(l
);
493 fwrite(&u64
, sizeof(u64
), 1, stdout
);
494 fwrite(d
, 1, l
, stdout
);
496 r
= output_rr_packet(d
, l
, ifindex
);
501 if (dns_type_needs_authentication(t
))
502 needs_authentication
= true;
507 return bus_log_parse_error(r
);
509 r
= sd_bus_message_exit_container(reply
);
511 return bus_log_parse_error(r
);
513 r
= sd_bus_message_read(reply
, "t", &flags
);
515 return bus_log_parse_error(r
);
519 log_error("%s: no records found", name
);
523 print_source(flags
, ts
);
525 if ((flags
& SD_RESOLVED_AUTHENTICATED
) == 0 && needs_authentication
) {
528 fprintf(stderr
, "\n%s"
529 "WARNING: The resources shown contain cryptographic key data which could not be\n"
530 " authenticated. It is not suitable to authenticate any communication.\n"
531 " This is usually indication that DNSSEC authentication was not enabled\n"
532 " or is not available for the selected protocol or DNS servers.%s\n",
533 ansi_highlight_red(),
540 static int resolve_rfc4501(sd_bus
*bus
, const char *name
) {
541 uint16_t type
= 0, class = 0;
542 const char *p
, *q
, *n
;
547 assert(startswith(name
, "dns:"));
549 /* Parse RFC 4501 dns: URIs */
559 e
= strchr(p
+ 2, '/');
564 log_warning("DNS authority specification not supported; ignoring specified authority.");
571 n
= strndupa(p
, q
- p
);
577 f
= startswith_no_case(q
, "class=");
579 _cleanup_free_
char *t
= NULL
;
583 log_error("DNS class specified twice.");
587 e
= strchrnul(f
, ';');
588 t
= strndup(f
, e
- f
);
592 r
= dns_class_from_string(t
);
594 log_error("Unknown DNS class %s.", t
);
608 f
= startswith_no_case(q
, "type=");
610 _cleanup_free_
char *t
= NULL
;
614 log_error("DNS type specified twice.");
618 e
= strchrnul(f
, ';');
619 t
= strndup(f
, e
- f
);
623 r
= dns_type_from_string(t
);
625 log_error("Unknown DNS type %s.", t
);
645 class = arg_class
?: DNS_CLASS_IN
;
647 type
= arg_type
?: DNS_TYPE_A
;
649 return resolve_record(bus
, n
, class, type
, true);
652 log_error("Invalid DNS URI: %s", name
);
656 static int verb_query(int argc
, char **argv
, void *userdata
) {
657 sd_bus
*bus
= userdata
;
662 STRV_FOREACH(p
, argv
+ 1) {
663 q
= resolve_record(bus
, *p
, arg_class
, arg_type
, true);
669 STRV_FOREACH(p
, argv
+ 1) {
670 if (startswith(*p
, "dns:"))
671 q
= resolve_rfc4501(bus
, *p
);
674 union in_addr_union a
;
676 q
= in_addr_ifindex_from_string_auto(*p
, &family
, &a
, &ifindex
);
678 q
= resolve_address(bus
, family
, &a
, ifindex
);
680 q
= resolve_host(bus
, *p
);
689 static int resolve_service(sd_bus
*bus
, const char *name
, const char *type
, const char *domain
) {
690 const char *canonical_name
, *canonical_type
, *canonical_domain
;
691 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
, *reply
= NULL
;
692 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
703 name
= empty_to_null(name
);
704 type
= empty_to_null(type
);
707 log_debug("Resolving service \"%s\" of type %s in %s (family %s, interface %s).", name
, type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
709 log_debug("Resolving service type %s of %s (family %s, interface %s).", type
, domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
711 log_debug("Resolving service type %s (family %s, interface %s).", domain
, af_to_name(arg_family
) ?: "*", isempty(arg_ifname
) ? "*" : arg_ifname
);
713 r
= sd_bus_message_new_method_call(
716 "org.freedesktop.resolve1",
717 "/org/freedesktop/resolve1",
718 "org.freedesktop.resolve1.Manager",
721 return bus_log_create_error(r
);
723 r
= sd_bus_message_append(req
, "isssit", arg_ifindex
, name
, type
, domain
, arg_family
, arg_flags
);
725 return bus_log_create_error(r
);
727 ts
= now(CLOCK_MONOTONIC
);
729 r
= sd_bus_call(bus
, req
, SD_RESOLVED_QUERY_TIMEOUT_USEC
, &error
, &reply
);
731 return log_error_errno(r
, "Resolve call failed: %s", bus_error_message(&error
, r
));
733 ts
= now(CLOCK_MONOTONIC
) - ts
;
735 r
= sd_bus_message_enter_container(reply
, 'a', "(qqqsa(iiay)s)");
737 return bus_log_parse_error(r
);
740 (name
? strlen(name
) + 1 : 0) +
741 (type
? strlen(type
) + 1 : 0) +
745 while ((r
= sd_bus_message_enter_container(reply
, 'r', "qqqsa(iiay)s")) > 0) {
746 uint16_t priority
, weight
, port
;
747 const char *hostname
, *canonical
;
749 r
= sd_bus_message_read(reply
, "qqqs", &priority
, &weight
, &port
, &hostname
);
751 return bus_log_parse_error(r
);
754 printf("%*s%s", (int) strlen(name
), c
== 0 ? name
: "", c
== 0 ? "/" : " ");
756 printf("%*s%s", (int) strlen(type
), c
== 0 ? type
: "", c
== 0 ? "/" : " ");
758 printf("%*s%s %s:%u [priority=%u, weight=%u]\n",
759 (int) strlen(domain
), c
== 0 ? domain
: "",
764 r
= sd_bus_message_enter_container(reply
, 'a', "(iiay)");
766 return bus_log_parse_error(r
);
768 while ((r
= sd_bus_message_enter_container(reply
, 'r', "iiay")) > 0) {
769 _cleanup_free_
char *pretty
= NULL
;
770 char ifname
[IF_NAMESIZE
] = "";
774 assert_cc(sizeof(int) == sizeof(int32_t));
776 r
= sd_bus_message_read(reply
, "ii", &ifindex
, &family
);
778 return bus_log_parse_error(r
);
780 r
= sd_bus_message_read_array(reply
, 'y', &a
, &sz
);
782 return bus_log_parse_error(r
);
784 r
= sd_bus_message_exit_container(reply
);
786 return bus_log_parse_error(r
);
788 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
789 log_debug("%s: skipping entry with family %d (%s)", name
, family
, af_to_name(family
) ?: "unknown");
793 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
794 log_error("%s: systemd-resolved returned address of invalid size %zu for family %s", name
, sz
, af_to_name(family
) ?: "unknown");
798 if (ifindex
> 0 && !if_indextoname(ifindex
, ifname
))
799 log_warning_errno(errno
, "Failed to resolve interface name for index %i: %m", ifindex
);
801 r
= in_addr_to_string(family
, a
, &pretty
);
803 return log_error_errno(r
, "Failed to print address for %s: %m", name
);
805 printf("%*s%s%s%s\n", (int) indent
, "", pretty
, isempty(ifname
) ? "" : "%s", ifname
);
808 return bus_log_parse_error(r
);
810 r
= sd_bus_message_exit_container(reply
);
812 return bus_log_parse_error(r
);
814 r
= sd_bus_message_read(reply
, "s", &canonical
);
816 return bus_log_parse_error(r
);
818 if (!streq(hostname
, canonical
))
819 printf("%*s(%s)\n", (int) indent
, "", canonical
);
821 r
= sd_bus_message_exit_container(reply
);
823 return bus_log_parse_error(r
);
828 return bus_log_parse_error(r
);
830 r
= sd_bus_message_exit_container(reply
);
832 return bus_log_parse_error(r
);
834 r
= sd_bus_message_enter_container(reply
, 'a', "ay");
836 return bus_log_parse_error(r
);
838 while ((r
= sd_bus_message_read_array(reply
, 'y', (const void**) &p
, &sz
)) > 0) {
839 _cleanup_free_
char *escaped
= NULL
;
841 escaped
= cescape_length(p
, sz
);
845 printf("%*s%s\n", (int) indent
, "", escaped
);
848 return bus_log_parse_error(r
);
850 r
= sd_bus_message_exit_container(reply
);
852 return bus_log_parse_error(r
);
854 r
= sd_bus_message_read(reply
, "ssst", &canonical_name
, &canonical_type
, &canonical_domain
, &flags
);
856 return bus_log_parse_error(r
);
858 canonical_name
= empty_to_null(canonical_name
);
859 canonical_type
= empty_to_null(canonical_type
);
861 if (!streq_ptr(name
, canonical_name
) ||
862 !streq_ptr(type
, canonical_type
) ||
863 !streq_ptr(domain
, canonical_domain
)) {
865 printf("%*s(", (int) indent
, "");
868 printf("%s/", canonical_name
);
870 printf("%s/", canonical_type
);
872 printf("%s)\n", canonical_domain
);
875 print_source(flags
, ts
);
880 static int verb_service(int argc
, char **argv
, void *userdata
) {
881 sd_bus
*bus
= userdata
;
884 return resolve_service(bus
, NULL
, NULL
, argv
[1]);
886 return resolve_service(bus
, NULL
, argv
[1], argv
[2]);
888 return resolve_service(bus
, argv
[1], argv
[2], argv
[3]);
891 static int resolve_openpgp(sd_bus
*bus
, const char *address
) {
892 const char *domain
, *full
;
894 _cleanup_free_
char *hashed
= NULL
;
899 domain
= strrchr(address
, '@');
901 log_error("Address does not contain '@': \"%s\"", address
);
903 } else if (domain
== address
|| domain
[1] == '\0') {
904 log_error("Address starts or ends with '@': \"%s\"", address
);
909 r
= string_hashsum_sha256(address
, domain
- 1 - address
, &hashed
);
911 return log_error_errno(r
, "Hashing failed: %m");
913 strshorten(hashed
, 56);
915 full
= strjoina(hashed
, "._openpgpkey.", domain
);
916 log_debug("Looking up \"%s\".", full
);
918 r
= resolve_record(bus
, full
,
919 arg_class
?: DNS_CLASS_IN
,
920 arg_type
?: DNS_TYPE_OPENPGPKEY
, false);
922 if (IN_SET(r
, -ENXIO
, -ESRCH
)) { /* NXDOMAIN or NODATA? */
923 hashed
= mfree(hashed
);
924 r
= string_hashsum_sha224(address
, domain
- 1 - address
, &hashed
);
926 return log_error_errno(r
, "Hashing failed: %m");
928 full
= strjoina(hashed
, "._openpgpkey.", domain
);
929 log_debug("Looking up \"%s\".", full
);
931 return resolve_record(bus
, full
,
932 arg_class
?: DNS_CLASS_IN
,
933 arg_type
?: DNS_TYPE_OPENPGPKEY
, true);
939 static int verb_openpgp(int argc
, char **argv
, void *userdata
) {
940 sd_bus
*bus
= userdata
;
944 STRV_FOREACH(p
, argv
+ 1) {
945 q
= resolve_openpgp(bus
, *p
);
953 static int resolve_tlsa(sd_bus
*bus
, const char *family
, const char *address
) {
955 uint16_t port_num
= 443;
956 _cleanup_free_
char *full
= NULL
;
962 port
= strrchr(address
, ':');
964 r
= parse_ip_port(port
+ 1, &port_num
);
966 return log_error_errno(r
, "Invalid port \"%s\".", port
+ 1);
968 address
= strndupa(address
, port
- address
);
971 r
= asprintf(&full
, "_%u._%s.%s",
978 log_debug("Looking up \"%s\".", full
);
980 return resolve_record(bus
, full
,
981 arg_class
?: DNS_CLASS_IN
,
982 arg_type
?: DNS_TYPE_TLSA
, true);
985 static bool service_family_is_valid(const char *s
) {
986 return STR_IN_SET(s
, "tcp", "udp", "sctp");
989 static int verb_tlsa(int argc
, char **argv
, void *userdata
) {
990 sd_bus
*bus
= userdata
;
991 char **p
, **args
= argv
+ 1;
992 const char *family
= "tcp";
995 if (service_family_is_valid(argv
[1])) {
1000 STRV_FOREACH(p
, args
) {
1001 q
= resolve_tlsa(bus
, family
, *p
);
1009 static int show_statistics(int argc
, char **argv
, void *userdata
) {
1010 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1011 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
1012 sd_bus
*bus
= userdata
;
1013 uint64_t n_current_transactions
, n_total_transactions
,
1014 cache_size
, n_cache_hit
, n_cache_miss
,
1015 n_dnssec_secure
, n_dnssec_insecure
, n_dnssec_bogus
, n_dnssec_indeterminate
;
1016 int r
, dnssec_supported
;
1020 r
= sd_bus_get_property_trivial(bus
,
1021 "org.freedesktop.resolve1",
1022 "/org/freedesktop/resolve1",
1023 "org.freedesktop.resolve1.Manager",
1029 return log_error_errno(r
, "Failed to get DNSSEC supported state: %s", bus_error_message(&error
, r
));
1031 printf("DNSSEC supported by current servers: %s%s%s\n\n",
1033 yes_no(dnssec_supported
),
1036 r
= sd_bus_get_property(bus
,
1037 "org.freedesktop.resolve1",
1038 "/org/freedesktop/resolve1",
1039 "org.freedesktop.resolve1.Manager",
1040 "TransactionStatistics",
1045 return log_error_errno(r
, "Failed to get transaction statistics: %s", bus_error_message(&error
, r
));
1047 r
= sd_bus_message_read(reply
, "(tt)",
1048 &n_current_transactions
,
1049 &n_total_transactions
);
1051 return bus_log_parse_error(r
);
1053 printf("%sTransactions%s\n"
1054 "Current Transactions: %" PRIu64
"\n"
1055 " Total Transactions: %" PRIu64
"\n",
1058 n_current_transactions
,
1059 n_total_transactions
);
1061 reply
= sd_bus_message_unref(reply
);
1063 r
= sd_bus_get_property(bus
,
1064 "org.freedesktop.resolve1",
1065 "/org/freedesktop/resolve1",
1066 "org.freedesktop.resolve1.Manager",
1072 return log_error_errno(r
, "Failed to get cache statistics: %s", bus_error_message(&error
, r
));
1074 r
= sd_bus_message_read(reply
, "(ttt)",
1079 return bus_log_parse_error(r
);
1081 printf("\n%sCache%s\n"
1082 " Current Cache Size: %" PRIu64
"\n"
1083 " Cache Hits: %" PRIu64
"\n"
1084 " Cache Misses: %" PRIu64
"\n",
1091 reply
= sd_bus_message_unref(reply
);
1093 r
= sd_bus_get_property(bus
,
1094 "org.freedesktop.resolve1",
1095 "/org/freedesktop/resolve1",
1096 "org.freedesktop.resolve1.Manager",
1102 return log_error_errno(r
, "Failed to get DNSSEC statistics: %s", bus_error_message(&error
, r
));
1104 r
= sd_bus_message_read(reply
, "(tttt)",
1108 &n_dnssec_indeterminate
);
1110 return bus_log_parse_error(r
);
1112 printf("\n%sDNSSEC Verdicts%s\n"
1113 " Secure: %" PRIu64
"\n"
1114 " Insecure: %" PRIu64
"\n"
1115 " Bogus: %" PRIu64
"\n"
1116 " Indeterminate: %" PRIu64
"\n",
1122 n_dnssec_indeterminate
);
1127 static int reset_statistics(int argc
, char **argv
, void *userdata
) {
1128 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1129 sd_bus
*bus
= userdata
;
1132 r
= sd_bus_call_method(bus
,
1133 "org.freedesktop.resolve1",
1134 "/org/freedesktop/resolve1",
1135 "org.freedesktop.resolve1.Manager",
1141 return log_error_errno(r
, "Failed to reset statistics: %s", bus_error_message(&error
, r
));
1146 static int flush_caches(int argc
, char **argv
, void *userdata
) {
1147 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1148 sd_bus
*bus
= userdata
;
1151 r
= sd_bus_call_method(bus
,
1152 "org.freedesktop.resolve1",
1153 "/org/freedesktop/resolve1",
1154 "org.freedesktop.resolve1.Manager",
1160 return log_error_errno(r
, "Failed to flush caches: %s", bus_error_message(&error
, r
));
1165 static int reset_server_features(int argc
, char **argv
, void *userdata
) {
1166 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1167 sd_bus
*bus
= userdata
;
1170 r
= sd_bus_call_method(bus
,
1171 "org.freedesktop.resolve1",
1172 "/org/freedesktop/resolve1",
1173 "org.freedesktop.resolve1.Manager",
1174 "ResetServerFeatures",
1179 return log_error_errno(r
, "Failed to reset server features: %s", bus_error_message(&error
, r
));
1184 static int read_dns_server_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1185 _cleanup_free_
char *pretty
= NULL
;
1186 int ifindex
, family
, r
;
1193 r
= sd_bus_message_enter_container(m
, 'r', with_ifindex
? "iiay" : "iay");
1198 r
= sd_bus_message_read(m
, "i", &ifindex
);
1203 r
= sd_bus_message_read(m
, "i", &family
);
1207 r
= sd_bus_message_read_array(m
, 'y', &a
, &sz
);
1211 r
= sd_bus_message_exit_container(m
);
1215 if (with_ifindex
&& ifindex
!= 0) {
1216 /* only show the global ones here */
1221 if (!IN_SET(family
, AF_INET
, AF_INET6
)) {
1222 log_debug("Unexpected family, ignoring: %i", family
);
1228 if (sz
!= FAMILY_ADDRESS_SIZE(family
)) {
1229 log_debug("Address size mismatch, ignoring.");
1235 r
= in_addr_to_string(family
, a
, &pretty
);
1239 *ret
= TAKE_PTR(pretty
);
1244 static int map_link_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1245 char ***l
= userdata
;
1253 r
= sd_bus_message_enter_container(m
, 'a', "(iay)");
1258 char *pretty
= NULL
;
1260 r
= read_dns_server_one(m
, false, &pretty
);
1266 if (isempty(pretty
))
1269 r
= strv_consume(l
, pretty
);
1274 r
= sd_bus_message_exit_container(m
);
1281 static int map_link_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1285 return read_dns_server_one(m
, false, userdata
);
1288 static int read_domain_one(sd_bus_message
*m
, bool with_ifindex
, char **ret
) {
1289 _cleanup_free_
char *str
= NULL
;
1290 int ifindex
, route_only
, r
;
1297 r
= sd_bus_message_read(m
, "(isb)", &ifindex
, &domain
, &route_only
);
1299 r
= sd_bus_message_read(m
, "(sb)", &domain
, &route_only
);
1303 if (with_ifindex
&& ifindex
!= 0) {
1304 /* only show the global ones here */
1310 str
= strappend("~", domain
);
1312 str
= strdup(domain
);
1316 *ret
= TAKE_PTR(str
);
1321 static int map_link_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1322 char ***l
= userdata
;
1330 r
= sd_bus_message_enter_container(m
, 'a', "(sb)");
1335 char *pretty
= NULL
;
1337 r
= read_domain_one(m
, false, &pretty
);
1343 if (isempty(pretty
))
1346 r
= strv_consume(l
, pretty
);
1351 r
= sd_bus_message_exit_container(m
);
1358 static int status_print_strv_ifindex(int ifindex
, const char *ifname
, char **p
) {
1361 printf("%sLink %i (%s)%s:",
1362 ansi_highlight(), ifindex
, ifname
, ansi_normal());
1373 uint64_t scopes_mask
;
1376 const char *dns_over_tls
;
1382 bool dnssec_supported
;
1385 static void link_info_clear(struct link_info
*p
) {
1386 free(p
->current_dns
);
1388 strv_free(p
->domains
);
1392 static int status_ifindex(sd_bus
*bus
, int ifindex
, const char *name
, StatusMode mode
, bool *empty_line
) {
1393 static const struct bus_properties_map property_map
[] = {
1394 { "ScopesMask", "t", NULL
, offsetof(struct link_info
, scopes_mask
) },
1395 { "DNS", "a(iay)", map_link_dns_servers
, offsetof(struct link_info
, dns
) },
1396 { "CurrentDNSServer", "(iay)", map_link_current_dns_server
, offsetof(struct link_info
, current_dns
) },
1397 { "Domains", "a(sb)", map_link_domains
, offsetof(struct link_info
, domains
) },
1398 { "LLMNR", "s", NULL
, offsetof(struct link_info
, llmnr
) },
1399 { "MulticastDNS", "s", NULL
, offsetof(struct link_info
, mdns
) },
1400 { "DNSOverTLS", "s", NULL
, offsetof(struct link_info
, dns_over_tls
) },
1401 { "DNSSEC", "s", NULL
, offsetof(struct link_info
, dnssec
) },
1402 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct link_info
, ntas
) },
1403 { "DNSSECSupported", "b", NULL
, offsetof(struct link_info
, dnssec_supported
) },
1406 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1407 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1408 _cleanup_(link_info_clear
) struct link_info link_info
= {};
1409 _cleanup_free_
char *ifi
= NULL
, *p
= NULL
;
1410 char ifname
[IF_NAMESIZE
] = "";
1415 assert(ifindex
> 0);
1418 if (!if_indextoname(ifindex
, ifname
))
1419 return log_error_errno(errno
, "Failed to resolve interface name for %i: %m", ifindex
);
1424 if (asprintf(&ifi
, "%i", ifindex
) < 0)
1427 r
= sd_bus_path_encode("/org/freedesktop/resolve1/link", ifi
, &p
);
1431 r
= bus_map_all_properties(bus
,
1432 "org.freedesktop.resolve1",
1435 BUS_MAP_BOOLEAN_AS_BOOL
,
1440 return log_error_errno(r
, "Failed to get link data for %i: %s", ifindex
, bus_error_message(&error
, r
));
1442 (void) pager_open(arg_pager_flags
);
1444 if (mode
== STATUS_DNS
)
1445 return status_print_strv_ifindex(ifindex
, name
, link_info
.dns
);
1447 if (mode
== STATUS_DOMAIN
)
1448 return status_print_strv_ifindex(ifindex
, name
, link_info
.domains
);
1450 if (mode
== STATUS_NTA
)
1451 return status_print_strv_ifindex(ifindex
, name
, link_info
.ntas
);
1453 if (mode
== STATUS_LLMNR
) {
1454 printf("%sLink %i (%s)%s: %s\n",
1455 ansi_highlight(), ifindex
, name
, ansi_normal(),
1456 strna(link_info
.llmnr
));
1461 if (mode
== STATUS_MDNS
) {
1462 printf("%sLink %i (%s)%s: %s\n",
1463 ansi_highlight(), ifindex
, name
, ansi_normal(),
1464 strna(link_info
.mdns
));
1469 if (mode
== STATUS_PRIVATE
) {
1470 printf("%sLink %i (%s)%s: %s\n",
1471 ansi_highlight(), ifindex
, name
, ansi_normal(),
1472 strna(link_info
.dns_over_tls
));
1477 if (mode
== STATUS_DNSSEC
) {
1478 printf("%sLink %i (%s)%s: %s\n",
1479 ansi_highlight(), ifindex
, name
, ansi_normal(),
1480 strna(link_info
.dnssec
));
1485 if (empty_line
&& *empty_line
)
1486 fputc('\n', stdout
);
1488 printf("%sLink %i (%s)%s\n",
1489 ansi_highlight(), ifindex
, name
, ansi_normal());
1491 if (link_info
.scopes_mask
== 0)
1492 printf(" Current Scopes: none\n");
1494 printf(" Current Scopes:%s%s%s%s%s\n",
1495 link_info
.scopes_mask
& SD_RESOLVED_DNS
? " DNS" : "",
1496 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV4
? " LLMNR/IPv4" : "",
1497 link_info
.scopes_mask
& SD_RESOLVED_LLMNR_IPV6
? " LLMNR/IPv6" : "",
1498 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV4
? " mDNS/IPv4" : "",
1499 link_info
.scopes_mask
& SD_RESOLVED_MDNS_IPV6
? " mDNS/IPv6" : "");
1501 printf(" LLMNR setting: %s\n"
1502 "MulticastDNS setting: %s\n"
1503 " DNSOverTLS setting: %s\n"
1504 " DNSSEC setting: %s\n"
1505 " DNSSEC supported: %s\n",
1506 strna(link_info
.llmnr
),
1507 strna(link_info
.mdns
),
1508 strna(link_info
.dns_over_tls
),
1509 strna(link_info
.dnssec
),
1510 yes_no(link_info
.dnssec_supported
));
1512 if (link_info
.current_dns
)
1513 printf(" Current DNS Server: %s\n", link_info
.current_dns
);
1515 STRV_FOREACH(i
, link_info
.dns
) {
1517 i
== link_info
.dns
? "DNS Servers:" : " ",
1521 STRV_FOREACH(i
, link_info
.domains
) {
1523 i
== link_info
.domains
? "DNS Domain:" : " ",
1527 STRV_FOREACH(i
, link_info
.ntas
) {
1529 i
== link_info
.ntas
? "DNSSEC NTA:" : " ",
1539 static int map_global_dns_servers(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1540 char ***l
= userdata
;
1548 r
= sd_bus_message_enter_container(m
, 'a', "(iiay)");
1553 char *pretty
= NULL
;
1555 r
= read_dns_server_one(m
, true, &pretty
);
1561 if (isempty(pretty
))
1564 r
= strv_consume(l
, pretty
);
1569 r
= sd_bus_message_exit_container(m
);
1576 static int map_global_current_dns_server(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1580 return read_dns_server_one(m
, true, userdata
);
1583 static int map_global_domains(sd_bus
*bus
, const char *member
, sd_bus_message
*m
, sd_bus_error
*error
, void *userdata
) {
1584 char ***l
= userdata
;
1592 r
= sd_bus_message_enter_container(m
, 'a', "(isb)");
1597 char *pretty
= NULL
;
1599 r
= read_domain_one(m
, true, &pretty
);
1605 if (isempty(pretty
))
1608 r
= strv_consume(l
, pretty
);
1613 r
= sd_bus_message_exit_container(m
);
1620 static int status_print_strv_global(char **p
) {
1623 printf("%sGlobal%s:", ansi_highlight(), ansi_normal());
1633 struct global_info
{
1636 char **fallback_dns
;
1641 const char *dns_over_tls
;
1643 bool dnssec_supported
;
1646 static void global_info_clear(struct global_info
*p
) {
1647 free(p
->current_dns
);
1649 strv_free(p
->fallback_dns
);
1650 strv_free(p
->domains
);
1654 static int status_global(sd_bus
*bus
, StatusMode mode
, bool *empty_line
) {
1655 static const struct bus_properties_map property_map
[] = {
1656 { "DNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, dns
) },
1657 { "FallbackDNS", "a(iiay)", map_global_dns_servers
, offsetof(struct global_info
, fallback_dns
) },
1658 { "CurrentDNSServer", "(iiay)", map_global_current_dns_server
, offsetof(struct global_info
, current_dns
) },
1659 { "Domains", "a(isb)", map_global_domains
, offsetof(struct global_info
, domains
) },
1660 { "DNSSECNegativeTrustAnchors", "as", NULL
, offsetof(struct global_info
, ntas
) },
1661 { "LLMNR", "s", NULL
, offsetof(struct global_info
, llmnr
) },
1662 { "MulticastDNS", "s", NULL
, offsetof(struct global_info
, mdns
) },
1663 { "DNSOverTLS", "s", NULL
, offsetof(struct global_info
, dns_over_tls
) },
1664 { "DNSSEC", "s", NULL
, offsetof(struct global_info
, dnssec
) },
1665 { "DNSSECSupported", "b", NULL
, offsetof(struct global_info
, dnssec_supported
) },
1668 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1669 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
1670 _cleanup_(global_info_clear
) struct global_info global_info
= {};
1677 r
= bus_map_all_properties(bus
,
1678 "org.freedesktop.resolve1",
1679 "/org/freedesktop/resolve1",
1681 BUS_MAP_BOOLEAN_AS_BOOL
,
1686 return log_error_errno(r
, "Failed to get global data: %s", bus_error_message(&error
, r
));
1688 (void) pager_open(arg_pager_flags
);
1690 if (mode
== STATUS_DNS
)
1691 return status_print_strv_global(global_info
.dns
);
1693 if (mode
== STATUS_DOMAIN
)
1694 return status_print_strv_global(global_info
.domains
);
1696 if (mode
== STATUS_NTA
)
1697 return status_print_strv_global(global_info
.ntas
);
1699 if (mode
== STATUS_LLMNR
) {
1700 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1701 strna(global_info
.llmnr
));
1706 if (mode
== STATUS_MDNS
) {
1707 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1708 strna(global_info
.mdns
));
1713 if (mode
== STATUS_PRIVATE
) {
1714 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1715 strna(global_info
.dns_over_tls
));
1720 if (mode
== STATUS_DNSSEC
) {
1721 printf("%sGlobal%s: %s\n", ansi_highlight(), ansi_normal(),
1722 strna(global_info
.dnssec
));
1727 printf("%sGlobal%s\n", ansi_highlight(), ansi_normal());
1729 printf(" LLMNR setting: %s\n"
1730 "MulticastDNS setting: %s\n"
1731 " DNSOverTLS setting: %s\n"
1732 " DNSSEC setting: %s\n"
1733 " DNSSEC supported: %s\n",
1734 strna(global_info
.llmnr
),
1735 strna(global_info
.mdns
),
1736 strna(global_info
.dns_over_tls
),
1737 strna(global_info
.dnssec
),
1738 yes_no(global_info
.dnssec_supported
));
1740 if (global_info
.current_dns
)
1741 printf(" Current DNS Server: %s\n", global_info
.current_dns
);
1743 STRV_FOREACH(i
, global_info
.dns
) {
1745 i
== global_info
.dns
? "DNS Servers:" : " ",
1749 STRV_FOREACH(i
, global_info
.fallback_dns
) {
1751 i
== global_info
.fallback_dns
? "Fallback DNS Servers:" : " ",
1755 STRV_FOREACH(i
, global_info
.domains
) {
1757 i
== global_info
.domains
? "DNS Domain:" : " ",
1761 strv_sort(global_info
.ntas
);
1762 STRV_FOREACH(i
, global_info
.ntas
) {
1764 i
== global_info
.ntas
? "DNSSEC NTA:" : " ",
1773 static int status_all(sd_bus
*bus
, StatusMode mode
) {
1774 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
, *reply
= NULL
;
1775 _cleanup_(sd_netlink_unrefp
) sd_netlink
*rtnl
= NULL
;
1776 sd_netlink_message
*i
;
1777 bool empty_line
= false;
1782 r
= status_global(bus
, mode
, &empty_line
);
1786 r
= sd_netlink_open(&rtnl
);
1788 return log_error_errno(r
, "Failed to connect to netlink: %m");
1790 r
= sd_rtnl_message_new_link(rtnl
, &req
, RTM_GETLINK
, 0);
1792 return rtnl_log_create_error(r
);
1794 r
= sd_netlink_message_request_dump(req
, true);
1796 return rtnl_log_create_error(r
);
1798 r
= sd_netlink_call(rtnl
, req
, 0, &reply
);
1800 return log_error_errno(r
, "Failed to enumerate links: %m");
1803 for (i
= reply
; i
; i
= sd_netlink_message_next(i
)) {
1808 q
= sd_netlink_message_get_type(i
, &type
);
1810 return rtnl_log_parse_error(q
);
1812 if (type
!= RTM_NEWLINK
)
1815 q
= sd_rtnl_message_link_get_ifindex(i
, &ifindex
);
1817 return rtnl_log_parse_error(q
);
1819 if (ifindex
== LOOPBACK_IFINDEX
)
1822 q
= sd_netlink_message_read_string(i
, IFLA_IFNAME
, &name
);
1824 return rtnl_log_parse_error(q
);
1826 q
= status_ifindex(bus
, ifindex
, name
, mode
, &empty_line
);
1827 if (q
< 0 && r
>= 0)
1834 static int verb_status(int argc
, char **argv
, void *userdata
) {
1835 sd_bus
*bus
= userdata
;
1840 bool empty_line
= false;
1842 STRV_FOREACH(ifname
, argv
+ 1) {
1845 ifindex
= parse_ifindex_and_warn(*ifname
);
1849 q
= status_ifindex(bus
, ifindex
, NULL
, STATUS_ALL
, &empty_line
);
1854 r
= status_all(bus
, STATUS_ALL
);
1859 static int log_interface_is_managed(int r
, int ifindex
) {
1860 char ifname
[IFNAMSIZ
];
1862 return log_error_errno(r
,
1863 "The specified interface %s is managed by systemd-networkd. Operation refused.\n"
1864 "Please configure DNS settings for systemd-networkd managed interfaces directly in their .network files.",
1865 strna(if_indextoname(ifindex
, ifname
)));
1868 static int verb_dns(int argc
, char **argv
, void *userdata
) {
1869 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1870 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1871 sd_bus
*bus
= userdata
;
1878 return status_all(bus
, STATUS_DNS
);
1880 r
= ifname_mangle(argv
[1], false);
1885 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNS
, NULL
);
1887 r
= sd_bus_message_new_method_call(
1890 "org.freedesktop.resolve1",
1891 "/org/freedesktop/resolve1",
1892 "org.freedesktop.resolve1.Manager",
1895 return bus_log_create_error(r
);
1897 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1899 return bus_log_create_error(r
);
1901 r
= sd_bus_message_open_container(req
, 'a', "(iay)");
1903 return bus_log_create_error(r
);
1905 /* If only argument is the empty string, then call SetLinkDNS() with an
1906 * empty list, which will clear the list of domains for an interface. */
1907 if (!strv_equal(argv
+ 2, STRV_MAKE(""))) {
1908 STRV_FOREACH(p
, argv
+ 2) {
1909 struct in_addr_data data
;
1911 r
= in_addr_from_string_auto(*p
, &data
.family
, &data
.address
);
1913 return log_error_errno(r
, "Failed to parse DNS server address: %s", *p
);
1915 r
= sd_bus_message_open_container(req
, 'r', "iay");
1917 return bus_log_create_error(r
);
1919 r
= sd_bus_message_append(req
, "i", data
.family
);
1921 return bus_log_create_error(r
);
1923 r
= sd_bus_message_append_array(req
, 'y', &data
.address
, FAMILY_ADDRESS_SIZE(data
.family
));
1925 return bus_log_create_error(r
);
1927 r
= sd_bus_message_close_container(req
);
1929 return bus_log_create_error(r
);
1933 r
= sd_bus_message_close_container(req
);
1935 return bus_log_create_error(r
);
1937 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
1939 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
1940 return log_interface_is_managed(r
, arg_ifindex
);
1942 if (arg_ifindex_permissive
&&
1943 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
1946 return log_error_errno(r
, "Failed to set DNS configuration: %s", bus_error_message(&error
, r
));
1952 static int verb_domain(int argc
, char **argv
, void *userdata
) {
1953 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
1954 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
1955 sd_bus
*bus
= userdata
;
1962 return status_all(bus
, STATUS_DOMAIN
);
1964 r
= ifname_mangle(argv
[1], false);
1969 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DOMAIN
, NULL
);
1971 r
= sd_bus_message_new_method_call(
1974 "org.freedesktop.resolve1",
1975 "/org/freedesktop/resolve1",
1976 "org.freedesktop.resolve1.Manager",
1979 return bus_log_create_error(r
);
1981 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
1983 return bus_log_create_error(r
);
1985 r
= sd_bus_message_open_container(req
, 'a', "(sb)");
1987 return bus_log_create_error(r
);
1989 /* If only argument is the empty string, then call SetLinkDomains() with an
1990 * empty list, which will clear the list of domains for an interface. */
1991 if (!strv_equal(argv
+ 2, STRV_MAKE(""))) {
1992 STRV_FOREACH(p
, argv
+ 2) {
1995 n
= **p
== '~' ? *p
+ 1 : *p
;
1997 r
= dns_name_is_valid(n
);
1999 return log_error_errno(r
, "Failed to validate specified domain %s: %m", n
);
2001 log_error("Domain not valid: %s", n
);
2005 r
= sd_bus_message_append(req
, "(sb)", n
, **p
== '~');
2007 return bus_log_create_error(r
);
2011 r
= sd_bus_message_close_container(req
);
2013 return bus_log_create_error(r
);
2015 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
2017 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2018 return log_interface_is_managed(r
, arg_ifindex
);
2020 if (arg_ifindex_permissive
&&
2021 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2024 return log_error_errno(r
, "Failed to set domain configuration: %s", bus_error_message(&error
, r
));
2030 static int verb_llmnr(int argc
, char **argv
, void *userdata
) {
2031 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2032 sd_bus
*bus
= userdata
;
2038 return status_all(bus
, STATUS_LLMNR
);
2040 r
= ifname_mangle(argv
[1], false);
2045 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_LLMNR
, NULL
);
2047 r
= sd_bus_call_method(bus
,
2048 "org.freedesktop.resolve1",
2049 "/org/freedesktop/resolve1",
2050 "org.freedesktop.resolve1.Manager",
2054 "is", arg_ifindex
, argv
[2]);
2056 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2057 return log_interface_is_managed(r
, arg_ifindex
);
2059 if (arg_ifindex_permissive
&&
2060 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2063 return log_error_errno(r
, "Failed to set LLMNR configuration: %s", bus_error_message(&error
, r
));
2069 static int verb_mdns(int argc
, char **argv
, void *userdata
) {
2070 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2071 sd_bus
*bus
= userdata
;
2077 return status_all(bus
, STATUS_MDNS
);
2079 r
= ifname_mangle(argv
[1], false);
2084 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_MDNS
, NULL
);
2086 r
= sd_bus_call_method(bus
,
2087 "org.freedesktop.resolve1",
2088 "/org/freedesktop/resolve1",
2089 "org.freedesktop.resolve1.Manager",
2090 "SetLinkMulticastDNS",
2093 "is", arg_ifindex
, argv
[2]);
2095 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2096 return log_interface_is_managed(r
, arg_ifindex
);
2098 if (arg_ifindex_permissive
&&
2099 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2102 return log_error_errno(r
, "Failed to set MulticastDNS configuration: %s", bus_error_message(&error
, r
));
2108 static int verb_dns_over_tls(int argc
, char **argv
, void *userdata
) {
2109 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2110 sd_bus
*bus
= userdata
;
2116 return status_all(bus
, STATUS_PRIVATE
);
2118 r
= ifname_mangle(argv
[1], false);
2123 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_PRIVATE
, NULL
);
2125 r
= sd_bus_call_method(bus
,
2126 "org.freedesktop.resolve1",
2127 "/org/freedesktop/resolve1",
2128 "org.freedesktop.resolve1.Manager",
2129 "SetLinkDNSOverTLS",
2132 "is", arg_ifindex
, argv
[2]);
2134 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2135 return log_interface_is_managed(r
, arg_ifindex
);
2137 if (arg_ifindex_permissive
&&
2138 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2141 return log_error_errno(r
, "Failed to set DNSOverTLS configuration: %s", bus_error_message(&error
, r
));
2147 static int verb_dnssec(int argc
, char **argv
, void *userdata
) {
2148 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2149 sd_bus
*bus
= userdata
;
2155 return status_all(bus
, STATUS_DNSSEC
);
2157 r
= ifname_mangle(argv
[1], false);
2162 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_DNSSEC
, NULL
);
2164 r
= sd_bus_call_method(bus
,
2165 "org.freedesktop.resolve1",
2166 "/org/freedesktop/resolve1",
2167 "org.freedesktop.resolve1.Manager",
2171 "is", arg_ifindex
, argv
[2]);
2173 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2174 return log_interface_is_managed(r
, arg_ifindex
);
2176 if (arg_ifindex_permissive
&&
2177 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2180 return log_error_errno(r
, "Failed to set DNSSEC configuration: %s", bus_error_message(&error
, r
));
2186 static int verb_nta(int argc
, char **argv
, void *userdata
) {
2187 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2188 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*req
= NULL
;
2189 sd_bus
*bus
= userdata
;
2197 return status_all(bus
, STATUS_NTA
);
2199 r
= ifname_mangle(argv
[1], false);
2204 return status_ifindex(bus
, arg_ifindex
, NULL
, STATUS_NTA
, NULL
);
2206 /* If only argument is the empty string, then call SetLinkDNSSECNegativeTrustAnchors()
2207 * with an empty list, which will clear the list of domains for an interface. */
2208 clear
= strv_equal(argv
+ 2, STRV_MAKE(""));
2211 STRV_FOREACH(p
, argv
+ 2) {
2212 r
= dns_name_is_valid(*p
);
2214 return log_error_errno(r
, "Failed to validate specified domain %s: %m", *p
);
2216 log_error("Domain not valid: %s", *p
);
2221 r
= sd_bus_message_new_method_call(
2224 "org.freedesktop.resolve1",
2225 "/org/freedesktop/resolve1",
2226 "org.freedesktop.resolve1.Manager",
2227 "SetLinkDNSSECNegativeTrustAnchors");
2229 return bus_log_create_error(r
);
2231 r
= sd_bus_message_append(req
, "i", arg_ifindex
);
2233 return bus_log_create_error(r
);
2235 r
= sd_bus_message_append_strv(req
, clear
? NULL
: argv
+ 2);
2237 return bus_log_create_error(r
);
2239 r
= sd_bus_call(bus
, req
, 0, &error
, NULL
);
2241 if (sd_bus_error_has_name(&error
, BUS_ERROR_LINK_BUSY
))
2242 return log_interface_is_managed(r
, arg_ifindex
);
2244 if (arg_ifindex_permissive
&&
2245 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2248 return log_error_errno(r
, "Failed to set DNSSEC NTA configuration: %s", bus_error_message(&error
, r
));
2254 static int verb_revert_link(int argc
, char **argv
, void *userdata
) {
2255 _cleanup_(sd_bus_error_free
) sd_bus_error error
= SD_BUS_ERROR_NULL
;
2256 sd_bus
*bus
= userdata
;
2261 r
= ifname_mangle(argv
[1], false);
2265 r
= sd_bus_call_method(bus
,
2266 "org.freedesktop.resolve1",
2267 "/org/freedesktop/resolve1",
2268 "org.freedesktop.resolve1.Manager",
2274 if (arg_ifindex_permissive
&&
2275 sd_bus_error_has_name(&error
, BUS_ERROR_NO_SUCH_LINK
))
2278 return log_error_errno(r
, "Failed to revert interface configuration: %s", bus_error_message(&error
, r
));
2284 static void help_protocol_types(void) {
2286 puts("Known protocol types:");
2287 puts("dns\nllmnr\nllmnr-ipv4\nllmnr-ipv6\nmdns\nmdns-ipv4\nmdns-ipv6");
2290 static void help_dns_types(void) {
2292 puts("Known DNS RR types:");
2294 DUMP_STRING_TABLE(dns_type
, int, _DNS_TYPE_MAX
);
2297 static void help_dns_classes(void) {
2299 puts("Known DNS RR classes:");
2301 DUMP_STRING_TABLE(dns_class
, int, _DNS_CLASS_MAX
);
2304 static int compat_help(void) {
2305 _cleanup_free_
char *link
= NULL
;
2308 r
= terminal_urlify_man("resolvectl", "1", &link
);
2312 printf("%1$s [OPTIONS...] HOSTNAME|ADDRESS...\n"
2313 "%1$s [OPTIONS...] --service [[NAME] TYPE] DOMAIN\n"
2314 "%1$s [OPTIONS...] --openpgp EMAIL@DOMAIN...\n"
2315 "%1$s [OPTIONS...] --statistics\n"
2316 "%1$s [OPTIONS...] --reset-statistics\n"
2318 "Resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n\n"
2319 " -h --help Show this help\n"
2320 " --version Show package version\n"
2321 " --no-pager Do not pipe output into a pager\n"
2322 " -4 Resolve IPv4 addresses\n"
2323 " -6 Resolve IPv6 addresses\n"
2324 " -i --interface=INTERFACE Look on interface\n"
2325 " -p --protocol=PROTO|help Look via protocol\n"
2326 " -t --type=TYPE|help Query RR with DNS type\n"
2327 " -c --class=CLASS|help Query RR with DNS class\n"
2328 " --service Resolve service (SRV)\n"
2329 " --service-address=BOOL Resolve address for services (default: yes)\n"
2330 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2331 " --openpgp Query OpenPGP public key\n"
2332 " --tlsa Query TLS public key\n"
2333 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2334 " --search=BOOL Use search domains for single-label names\n"
2336 " --raw[=payload|packet] Dump the answer as binary data\n"
2337 " --legend=BOOL Print headers and additional info (default: yes)\n"
2338 " --statistics Show resolver statistics\n"
2339 " --reset-statistics Reset resolver statistics\n"
2340 " --status Show link and server status\n"
2341 " --flush-caches Flush all local DNS caches\n"
2342 " --reset-server-features\n"
2343 " Forget learnt DNS server feature levels\n"
2344 " --set-dns=SERVER Set per-interface DNS server address\n"
2345 " --set-domain=DOMAIN Set per-interface search domain\n"
2346 " --set-llmnr=MODE Set per-interface LLMNR mode\n"
2347 " --set-mdns=MODE Set per-interface MulticastDNS mode\n"
2348 " --set-dnsovertls=MODE Set per-interface DNS-over-TLS mode\n"
2349 " --set-dnssec=MODE Set per-interface DNSSEC mode\n"
2350 " --set-nta=DOMAIN Set per-interface DNSSEC NTA\n"
2351 " --revert Revert per-interface configuration\n"
2352 "\nSee the %2$s for details.\n"
2353 , program_invocation_short_name
2360 static int native_help(void) {
2361 _cleanup_free_
char *link
= NULL
;
2364 r
= terminal_urlify_man("resolvectl", "1", &link
);
2368 printf("%1$s [OPTIONS...] {COMMAND} ...\n"
2370 "Send control commands to the network name resolution manager, or\n"
2371 "resolve domain names, IPv4 and IPv6 addresses, DNS records, and services.\n"
2373 " -h --help Show this help\n"
2374 " --version Show package version\n"
2375 " --no-pager Do not pipe output into a pager\n"
2376 " -4 Resolve IPv4 addresses\n"
2377 " -6 Resolve IPv6 addresses\n"
2378 " -i --interface=INTERFACE Look on interface\n"
2379 " -p --protocol=PROTO|help Look via protocol\n"
2380 " -t --type=TYPE|help Query RR with DNS type\n"
2381 " -c --class=CLASS|help Query RR with DNS class\n"
2382 " --service-address=BOOL Resolve address for services (default: yes)\n"
2383 " --service-txt=BOOL Resolve TXT records for services (default: yes)\n"
2384 " --cname=BOOL Follow CNAME redirects (default: yes)\n"
2385 " --search=BOOL Use search domains for single-label names\n"
2387 " --raw[=payload|packet] Dump the answer as binary data\n"
2388 " --legend=BOOL Print headers and additional info (default: yes)\n"
2391 " query HOSTNAME|ADDRESS... Resolve domain names, IPv4 and IPv6 addresses\n"
2392 " service [[NAME] TYPE] DOMAIN Resolve service (SRV)\n"
2393 " openpgp EMAIL@DOMAIN... Query OpenPGP public key\n"
2394 " tlsa DOMAIN[:PORT]... Query TLS public key\n"
2395 " status [LINK...] Show link and server status\n"
2396 " statistics Show resolver statistics\n"
2397 " reset-statistics Reset resolver statistics\n"
2398 " flush-caches Flush all local DNS caches\n"
2399 " reset-server-features Forget learnt DNS server feature levels\n"
2400 " dns [LINK [SERVER...]] Get/set per-interface DNS server address\n"
2401 " domain [LINK [DOMAIN...]] Get/set per-interface search domain\n"
2402 " llmnr [LINK [MODE]] Get/set per-interface LLMNR mode\n"
2403 " mdns [LINK [MODE]] Get/set per-interface MulticastDNS mode\n"
2404 " dnsovertls [LINK [MODE]] Get/set per-interface DNS-over-TLS mode\n"
2405 " dnssec [LINK [MODE]] Get/set per-interface DNSSEC mode\n"
2406 " nta [LINK [DOMAIN...]] Get/set per-interface DNSSEC NTA\n"
2407 " revert LINK Revert per-interface configuration\n"
2408 "\nSee the %2$s for details.\n"
2409 , program_invocation_short_name
2416 static int verb_help(int argc
, char **argv
, void *userdata
) {
2417 return native_help();
2420 static int compat_parse_argv(int argc
, char *argv
[]) {
2422 ARG_VERSION
= 0x100,
2426 ARG_SERVICE_ADDRESS
,
2433 ARG_RESET_STATISTICS
,
2436 ARG_RESET_SERVER_FEATURES
,
2448 static const struct option options
[] = {
2449 { "help", no_argument
, NULL
, 'h' },
2450 { "version", no_argument
, NULL
, ARG_VERSION
},
2451 { "type", required_argument
, NULL
, 't' },
2452 { "class", required_argument
, NULL
, 'c' },
2453 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2454 { "interface", required_argument
, NULL
, 'i' },
2455 { "protocol", required_argument
, NULL
, 'p' },
2456 { "cname", required_argument
, NULL
, ARG_CNAME
},
2457 { "service", no_argument
, NULL
, ARG_SERVICE
},
2458 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2459 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2460 { "openpgp", no_argument
, NULL
, ARG_OPENPGP
},
2461 { "tlsa", optional_argument
, NULL
, ARG_TLSA
},
2462 { "raw", optional_argument
, NULL
, ARG_RAW
},
2463 { "search", required_argument
, NULL
, ARG_SEARCH
},
2464 { "statistics", no_argument
, NULL
, ARG_STATISTICS
, },
2465 { "reset-statistics", no_argument
, NULL
, ARG_RESET_STATISTICS
},
2466 { "status", no_argument
, NULL
, ARG_STATUS
},
2467 { "flush-caches", no_argument
, NULL
, ARG_FLUSH_CACHES
},
2468 { "reset-server-features", no_argument
, NULL
, ARG_RESET_SERVER_FEATURES
},
2469 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2470 { "set-dns", required_argument
, NULL
, ARG_SET_DNS
},
2471 { "set-domain", required_argument
, NULL
, ARG_SET_DOMAIN
},
2472 { "set-llmnr", required_argument
, NULL
, ARG_SET_LLMNR
},
2473 { "set-mdns", required_argument
, NULL
, ARG_SET_MDNS
},
2474 { "set-dnsovertls", required_argument
, NULL
, ARG_SET_PRIVATE
},
2475 { "set-dnssec", required_argument
, NULL
, ARG_SET_DNSSEC
},
2476 { "set-nta", required_argument
, NULL
, ARG_SET_NTA
},
2477 { "revert", no_argument
, NULL
, ARG_REVERT_LINK
},
2486 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2490 return compat_help();
2496 arg_family
= AF_INET
;
2500 arg_family
= AF_INET6
;
2504 arg_ifname
= mfree(arg_ifname
);
2505 r
= ifname_mangle(optarg
, true);
2511 if (streq(optarg
, "help")) {
2516 r
= dns_type_from_string(optarg
);
2518 log_error("Failed to parse RR record type %s", optarg
);
2521 arg_type
= (uint16_t) r
;
2522 assert((int) arg_type
== r
);
2524 arg_mode
= MODE_RESOLVE_RECORD
;
2528 if (streq(optarg
, "help")) {
2533 r
= dns_class_from_string(optarg
);
2535 log_error("Failed to parse RR record class %s", optarg
);
2538 arg_class
= (uint16_t) r
;
2539 assert((int) arg_class
== r
);
2544 r
= parse_boolean(optarg
);
2546 return log_error_errno(r
, "Failed to parse --legend= argument");
2552 if (streq(optarg
, "help")) {
2553 help_protocol_types();
2555 } else if (streq(optarg
, "dns"))
2556 arg_flags
|= SD_RESOLVED_DNS
;
2557 else if (streq(optarg
, "llmnr"))
2558 arg_flags
|= SD_RESOLVED_LLMNR
;
2559 else if (streq(optarg
, "llmnr-ipv4"))
2560 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2561 else if (streq(optarg
, "llmnr-ipv6"))
2562 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2563 else if (streq(optarg
, "mdns"))
2564 arg_flags
|= SD_RESOLVED_MDNS
;
2565 else if (streq(optarg
, "mdns-ipv4"))
2566 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2567 else if (streq(optarg
, "mdns-ipv6"))
2568 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2570 log_error("Unknown protocol specifier: %s", optarg
);
2577 arg_mode
= MODE_RESOLVE_SERVICE
;
2581 arg_mode
= MODE_RESOLVE_OPENPGP
;
2585 arg_mode
= MODE_RESOLVE_TLSA
;
2586 if (!optarg
|| service_family_is_valid(optarg
))
2587 arg_service_family
= optarg
;
2589 log_error("Unknown service family \"%s\".", optarg
);
2596 log_error("Refusing to write binary data to tty.");
2600 if (optarg
== NULL
|| streq(optarg
, "payload"))
2601 arg_raw
= RAW_PAYLOAD
;
2602 else if (streq(optarg
, "packet"))
2603 arg_raw
= RAW_PACKET
;
2605 log_error("Unknown --raw specifier \"%s\".", optarg
);
2613 r
= parse_boolean(optarg
);
2615 return log_error_errno(r
, "Failed to parse --cname= argument.");
2616 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2619 case ARG_SERVICE_ADDRESS
:
2620 r
= parse_boolean(optarg
);
2622 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2623 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2626 case ARG_SERVICE_TXT
:
2627 r
= parse_boolean(optarg
);
2629 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2630 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2634 r
= parse_boolean(optarg
);
2636 return log_error_errno(r
, "Failed to parse --search argument.");
2637 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2640 case ARG_STATISTICS
:
2641 arg_mode
= MODE_STATISTICS
;
2644 case ARG_RESET_STATISTICS
:
2645 arg_mode
= MODE_RESET_STATISTICS
;
2648 case ARG_FLUSH_CACHES
:
2649 arg_mode
= MODE_FLUSH_CACHES
;
2652 case ARG_RESET_SERVER_FEATURES
:
2653 arg_mode
= MODE_RESET_SERVER_FEATURES
;
2657 arg_mode
= MODE_STATUS
;
2661 arg_pager_flags
|= PAGER_DISABLE
;
2665 r
= strv_extend(&arg_set_dns
, optarg
);
2669 arg_mode
= MODE_SET_LINK
;
2672 case ARG_SET_DOMAIN
:
2673 r
= strv_extend(&arg_set_domain
, optarg
);
2677 arg_mode
= MODE_SET_LINK
;
2681 arg_set_llmnr
= optarg
;
2682 arg_mode
= MODE_SET_LINK
;
2686 arg_set_mdns
= optarg
;
2687 arg_mode
= MODE_SET_LINK
;
2690 case ARG_SET_PRIVATE
:
2691 arg_set_dns_over_tls
= optarg
;
2692 arg_mode
= MODE_SET_LINK
;
2695 case ARG_SET_DNSSEC
:
2696 arg_set_dnssec
= optarg
;
2697 arg_mode
= MODE_SET_LINK
;
2701 r
= strv_extend(&arg_set_nta
, optarg
);
2705 arg_mode
= MODE_SET_LINK
;
2708 case ARG_REVERT_LINK
:
2709 arg_mode
= MODE_REVERT_LINK
;
2716 assert_not_reached("Unhandled option");
2719 if (arg_type
== 0 && arg_class
!= 0) {
2720 log_error("--class= may only be used in conjunction with --type=.");
2724 if (arg_type
!= 0 && arg_mode
== MODE_RESOLVE_SERVICE
) {
2725 log_error("--service and --type= may not be combined.");
2729 if (arg_type
!= 0 && arg_class
== 0)
2730 arg_class
= DNS_CLASS_IN
;
2732 if (arg_class
!= 0 && arg_type
== 0)
2733 arg_type
= DNS_TYPE_A
;
2735 if (IN_SET(arg_mode
, MODE_SET_LINK
, MODE_REVERT_LINK
)) {
2737 if (arg_ifindex
<= 0) {
2738 log_error("--set-dns=, --set-domain=, --set-llmnr=, --set-mdns=, --set-dnsovertls=, --set-dnssec=, --set-nta= and --revert require --interface=.");
2742 if (arg_ifindex
== LOOPBACK_IFINDEX
) {
2743 log_error("Interface can't be the loopback interface (lo). Sorry.");
2748 return 1 /* work to do */;
2751 static int native_parse_argv(int argc
, char *argv
[]) {
2753 ARG_VERSION
= 0x100,
2756 ARG_SERVICE_ADDRESS
,
2763 static const struct option options
[] = {
2764 { "help", no_argument
, NULL
, 'h' },
2765 { "version", no_argument
, NULL
, ARG_VERSION
},
2766 { "type", required_argument
, NULL
, 't' },
2767 { "class", required_argument
, NULL
, 'c' },
2768 { "legend", required_argument
, NULL
, ARG_LEGEND
},
2769 { "interface", required_argument
, NULL
, 'i' },
2770 { "protocol", required_argument
, NULL
, 'p' },
2771 { "cname", required_argument
, NULL
, ARG_CNAME
},
2772 { "service-address", required_argument
, NULL
, ARG_SERVICE_ADDRESS
},
2773 { "service-txt", required_argument
, NULL
, ARG_SERVICE_TXT
},
2774 { "raw", optional_argument
, NULL
, ARG_RAW
},
2775 { "search", required_argument
, NULL
, ARG_SEARCH
},
2776 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
2785 while ((c
= getopt_long(argc
, argv
, "h46i:t:c:p:", options
, NULL
)) >= 0)
2789 return native_help();
2795 arg_family
= AF_INET
;
2799 arg_family
= AF_INET6
;
2803 arg_ifname
= mfree(arg_ifname
);
2804 r
= ifname_mangle(optarg
, true);
2810 if (streq(optarg
, "help")) {
2815 r
= dns_type_from_string(optarg
);
2817 log_error("Failed to parse RR record type %s", optarg
);
2820 arg_type
= (uint16_t) r
;
2821 assert((int) arg_type
== r
);
2826 if (streq(optarg
, "help")) {
2831 r
= dns_class_from_string(optarg
);
2833 log_error("Failed to parse RR record class %s", optarg
);
2836 arg_class
= (uint16_t) r
;
2837 assert((int) arg_class
== r
);
2842 r
= parse_boolean(optarg
);
2844 return log_error_errno(r
, "Failed to parse --legend= argument");
2850 if (streq(optarg
, "help")) {
2851 help_protocol_types();
2853 } else if (streq(optarg
, "dns"))
2854 arg_flags
|= SD_RESOLVED_DNS
;
2855 else if (streq(optarg
, "llmnr"))
2856 arg_flags
|= SD_RESOLVED_LLMNR
;
2857 else if (streq(optarg
, "llmnr-ipv4"))
2858 arg_flags
|= SD_RESOLVED_LLMNR_IPV4
;
2859 else if (streq(optarg
, "llmnr-ipv6"))
2860 arg_flags
|= SD_RESOLVED_LLMNR_IPV6
;
2861 else if (streq(optarg
, "mdns"))
2862 arg_flags
|= SD_RESOLVED_MDNS
;
2863 else if (streq(optarg
, "mdns-ipv4"))
2864 arg_flags
|= SD_RESOLVED_MDNS_IPV4
;
2865 else if (streq(optarg
, "mdns-ipv6"))
2866 arg_flags
|= SD_RESOLVED_MDNS_IPV6
;
2868 log_error("Unknown protocol specifier: %s", optarg
);
2876 log_error("Refusing to write binary data to tty.");
2880 if (optarg
== NULL
|| streq(optarg
, "payload"))
2881 arg_raw
= RAW_PAYLOAD
;
2882 else if (streq(optarg
, "packet"))
2883 arg_raw
= RAW_PACKET
;
2885 log_error("Unknown --raw specifier \"%s\".", optarg
);
2893 r
= parse_boolean(optarg
);
2895 return log_error_errno(r
, "Failed to parse --cname= argument.");
2896 SET_FLAG(arg_flags
, SD_RESOLVED_NO_CNAME
, r
== 0);
2899 case ARG_SERVICE_ADDRESS
:
2900 r
= parse_boolean(optarg
);
2902 return log_error_errno(r
, "Failed to parse --service-address= argument.");
2903 SET_FLAG(arg_flags
, SD_RESOLVED_NO_ADDRESS
, r
== 0);
2906 case ARG_SERVICE_TXT
:
2907 r
= parse_boolean(optarg
);
2909 return log_error_errno(r
, "Failed to parse --service-txt= argument.");
2910 SET_FLAG(arg_flags
, SD_RESOLVED_NO_TXT
, r
== 0);
2914 r
= parse_boolean(optarg
);
2916 return log_error_errno(r
, "Failed to parse --search argument.");
2917 SET_FLAG(arg_flags
, SD_RESOLVED_NO_SEARCH
, r
== 0);
2921 arg_pager_flags
|= PAGER_DISABLE
;
2928 assert_not_reached("Unhandled option");
2931 if (arg_type
== 0 && arg_class
!= 0) {
2932 log_error("--class= may only be used in conjunction with --type=.");
2936 if (arg_type
!= 0 && arg_class
== 0)
2937 arg_class
= DNS_CLASS_IN
;
2939 if (arg_class
!= 0 && arg_type
== 0)
2940 arg_type
= DNS_TYPE_A
;
2942 return 1 /* work to do */;
2945 static int native_main(int argc
, char *argv
[], sd_bus
*bus
) {
2947 static const Verb verbs
[] = {
2948 { "help", VERB_ANY
, VERB_ANY
, 0, verb_help
},
2949 { "status", VERB_ANY
, VERB_ANY
, VERB_DEFAULT
, verb_status
},
2950 { "query", 2, VERB_ANY
, 0, verb_query
},
2951 { "service", 2, 4, 0, verb_service
},
2952 { "openpgp", 2, VERB_ANY
, 0, verb_openpgp
},
2953 { "tlsa", 2, VERB_ANY
, 0, verb_tlsa
},
2954 { "statistics", VERB_ANY
, 1, 0, show_statistics
},
2955 { "reset-statistics", VERB_ANY
, 1, 0, reset_statistics
},
2956 { "flush-caches", VERB_ANY
, 1, 0, flush_caches
},
2957 { "reset-server-features", VERB_ANY
, 1, 0, reset_server_features
},
2958 { "dns", VERB_ANY
, VERB_ANY
, 0, verb_dns
},
2959 { "domain", VERB_ANY
, VERB_ANY
, 0, verb_domain
},
2960 { "llmnr", VERB_ANY
, 3, 0, verb_llmnr
},
2961 { "mdns", VERB_ANY
, 3, 0, verb_mdns
},
2962 { "dnsovertls", VERB_ANY
, 3, 0, verb_dns_over_tls
},
2963 { "dnssec", VERB_ANY
, 3, 0, verb_dnssec
},
2964 { "nta", VERB_ANY
, VERB_ANY
, 0, verb_nta
},
2965 { "revert", 2, 2, 0, verb_revert_link
},
2969 return dispatch_verb(argc
, argv
, verbs
, bus
);
2972 static int translate(const char *verb
, const char *single_arg
, size_t num_args
, char **args
, sd_bus
*bus
) {
2977 assert(num_args
== 0 || args
);
2979 num
= !!single_arg
+ num_args
+ 1;
2981 p
= fake
= newa0(char *, num
+ 1);
2982 *p
++ = (char *) verb
;
2984 *p
++ = (char *) single_arg
;
2985 for (i
= 0; i
< num_args
; i
++)
2989 return native_main((int) num
, fake
, bus
);
2992 static int compat_main(int argc
, char *argv
[], sd_bus
*bus
) {
2996 case MODE_RESOLVE_HOST
:
2997 case MODE_RESOLVE_RECORD
:
2998 return translate("query", NULL
, argc
- optind
, argv
+ optind
, bus
);
3000 case MODE_RESOLVE_SERVICE
:
3001 return translate("service", NULL
, argc
- optind
, argv
+ optind
, bus
);
3003 case MODE_RESOLVE_OPENPGP
:
3004 return translate("openpgp", NULL
, argc
- optind
, argv
+ optind
, bus
);
3006 case MODE_RESOLVE_TLSA
:
3007 return translate("tlsa", arg_service_family
, argc
- optind
, argv
+ optind
, bus
);
3009 case MODE_STATISTICS
:
3010 return translate("statistics", NULL
, 0, NULL
, bus
);
3012 case MODE_RESET_STATISTICS
:
3013 return translate("reset-statistics", NULL
, 0, NULL
, bus
);
3015 case MODE_FLUSH_CACHES
:
3016 return translate("flush-caches", NULL
, 0, NULL
, bus
);
3018 case MODE_RESET_SERVER_FEATURES
:
3019 return translate("reset-server-features", NULL
, 0, NULL
, bus
);
3022 return translate("status", NULL
, argc
- optind
, argv
+ optind
, bus
);
3028 r
= translate("dns", arg_ifname
, strv_length(arg_set_dns
), arg_set_dns
, bus
);
3033 if (arg_set_domain
) {
3034 r
= translate("domain", arg_ifname
, strv_length(arg_set_domain
), arg_set_domain
, bus
);
3040 r
= translate("nta", arg_ifname
, strv_length(arg_set_nta
), arg_set_nta
, bus
);
3045 if (arg_set_llmnr
) {
3046 r
= translate("llmnr", arg_ifname
, 1, (char **) &arg_set_llmnr
, bus
);
3052 r
= translate("mdns", arg_ifname
, 1, (char **) &arg_set_mdns
, bus
);
3057 if (arg_set_dns_over_tls
) {
3058 r
= translate("dnsovertls", arg_ifname
, 1, (char **) &arg_set_dns_over_tls
, bus
);
3063 if (arg_set_dnssec
) {
3064 r
= translate("dnssec", arg_ifname
, 1, (char **) &arg_set_dnssec
, bus
);
3071 case MODE_REVERT_LINK
:
3074 return translate("revert", arg_ifname
, 0, NULL
, bus
);
3077 assert_not_reached("invalid mode");
3083 int main(int argc
, char **argv
) {
3087 setlocale(LC_ALL
, "");
3088 log_parse_environment();
3091 if (streq(program_invocation_short_name
, "resolvconf"))
3092 r
= resolvconf_parse_argv(argc
, argv
);
3093 else if (streq(program_invocation_short_name
, "systemd-resolve"))
3094 r
= compat_parse_argv(argc
, argv
);
3096 r
= native_parse_argv(argc
, argv
);
3100 r
= sd_bus_open_system(&bus
);
3102 log_error_errno(r
, "sd_bus_open_system: %m");
3106 if (STR_IN_SET(program_invocation_short_name
, "systemd-resolve", "resolvconf"))
3107 r
= compat_main(argc
, argv
, bus
);
3109 r
= native_main(argc
, argv
, bus
);
3112 /* make sure we terminate the bus connection first, and then close the
3113 * pager, see issue #3543 for the details. */
3114 sd_bus_flush_close_unref(bus
);
3118 strv_free(arg_set_dns
);
3119 strv_free(arg_set_domain
);
3120 strv_free(arg_set_nta
);
3122 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;