2 * Copyright (c) 2014 Ian Sutton <ian@kremlin.cc>
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21 #include <sys/types.h>
28 #include <glib/gprintf.h>
29 #include <glib-unix.h>
30 #include <glib/gstdio.h>
31 #include <polkit/polkit.h>
33 #include "timedated-gen.h"
34 #include "timedated.h"
36 #include "../../util.h"
38 #define TZNAME_MAX PATH_MAX
40 GPtrArray
*timedated_freeable
;
41 Timedate1
*timedated_interf
;
43 GMainLoop
*timedated_loop
;
46 gboolean dbus_interface_exported
; /* reliable because of gdbus operational guarantees */
48 const gchar
*OS_LOCALTIME
= "/etc/localtime"; /* current timezone file */
49 const gchar
*OS_TIMEZONE_PATH
= "/usr/share/zoneinfo"; /* path to system timezone files */
51 struct timezone_checksum_pair
{
59 static struct timezone_checksum_pair tz_table
[5000];
61 /* --- begin method/property/dbus signal code --- */
64 on_handle_set_time(Timedate1
*td1_passed_interf
,
65 GDBusMethodInvocation
*invoc
,
70 gint64 proposed_time
, cur_time
;
71 const gchar
*bus_name
;
72 gboolean policykit_auth
;
73 check_auth_result is_authed
;
74 gboolean relative
; /* relative if passed time_t is meant to be added to current time */
75 struct timespec
*new_time
;
77 params
= g_dbus_method_invocation_get_parameters(invoc
);
78 g_variant_get(params
, "(xbb)", &proposed_time
, &relative
, &policykit_auth
);
79 bus_name
= g_dbus_method_invocation_get_sender(invoc
);
81 is_authed
= polkit_try_auth(bus_name
, "org.freedesktop.timedate1.set-time", policykit_auth
);
85 case AUTHORIZED_NATIVELY
:
86 case AUTHORIZED_BY_PROMPT
:
89 case UNAUTHORIZED_NATIVELY
:
90 case UNAUTHORIZED_FAILED_PROMPT
:
91 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set system time.");
95 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
99 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
104 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
110 timedate1_complete_set_time(td1_passed_interf
, invoc
);
113 } else if(relative
) {
115 cur_time
= g_get_real_time();
117 if(proposed_time
< 0 && cur_time
+ proposed_time
> cur_time
) {
119 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
122 } else if(proposed_time
> 0 && cur_time
+ proposed_time
< cur_time
) {
124 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
128 new_time
= mktimespec(proposed_time
);
130 if(!clock_settime(CLOCK_REALTIME
, new_time
)) {
132 timedate1_complete_set_time(td1_passed_interf
, invoc
);
137 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
141 } else if(proposed_time
> 0) {
144 new_time
= mktimespec(proposed_time
);
146 if(!clock_settime(CLOCK_REALTIME
, new_time
)) {
148 timedate1_complete_set_time(td1_passed_interf
, invoc
);
153 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
159 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
165 on_handle_set_timezone(Timedate1
*td1_passed_interf
,
166 GDBusMethodInvocation
*invoc
,
172 const gchar
*bus_name
;
173 gboolean policykit_auth
;
174 check_auth_result is_authed
;
176 gchar
*tz_target_path
;
177 struct stat
*statbuf
;
180 params
= g_dbus_method_invocation_get_parameters(invoc
);
181 g_variant_get(params
, "(sb)", &proposed_tz
, &policykit_auth
);
182 bus_name
= g_dbus_method_invocation_get_sender(invoc
);
184 is_authed
= polkit_try_auth(bus_name
, "org.freedesktop.timedate1.set-timezone", policykit_auth
);
188 case AUTHORIZED_NATIVELY
:
189 case AUTHORIZED_BY_PROMPT
:
192 case UNAUTHORIZED_NATIVELY
:
193 case UNAUTHORIZED_FAILED_PROMPT
:
194 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set timezone.");
198 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
201 case ERROR_BADACTION
:
202 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
207 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set timezone for unknown reasons.");
211 statbuf
= (struct stat
*) calloc(1, sizeof(struct stat
));
212 tz_target_path
= (gchar
*) calloc(1, TZNAME_MAX
);
214 g_ptr_array_add(timedated_freeable
, statbuf
);
215 g_ptr_array_add(timedated_freeable
, tz_target_path
);
217 strlcat(tz_target_path
, OS_TIMEZONE_PATH
, TZNAME_MAX
);
218 strlcat(tz_target_path
, "/", TZNAME_MAX
);
219 strlcat(tz_target_path
, proposed_tz
, TZNAME_MAX
);
221 if(strstr(tz_target_path
, "../")) {
223 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EBADF", "Provided timezone is invalid.");
230 if(lstat(tz_target_path
, statbuf
)) {
235 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.ENOENT", "Specified timezone does not exist.");
239 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EBADF", "Specified timezone is invalid.");
246 if(!S_ISREG(statbuf
->st_mode
)) {
248 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EBADF", "Specified path is of an inappropriate type.");
252 memset(statbuf
, 0, sizeof statbuf
);
254 if(!lstat(OS_LOCALTIME
, statbuf
))
255 if(remove(OS_LOCALTIME
))
258 if(symlink(tz_target_path
, OS_LOCALTIME
))
262 timedate1_complete_set_timezone(td1_passed_interf
, invoc
);
268 on_handle_set_local_rtc(Timedate1
*td1_passed_interf
,
269 GDBusMethodInvocation
*invoc
,
273 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.ENODEV", "Unix RTC must be in UTC.");
278 on_handle_set_ntp(Timedate1
*td1_passed_interf
,
279 GDBusMethodInvocation
*invoc
,
284 const gchar
*bus_name
;
285 gboolean policykit_auth
;
286 check_auth_result is_authed
;
288 /* revert to rcctl when 5.7 rolls around */
289 gint ntpd_notrunning
, ntpd_notenabled
; /* this logic flip is due to rcctl returning 0 on success,
290 * in this case an error means ntpd is not running or not enabled */
291 gboolean proposed_ntpstate
;
296 params
= g_dbus_method_invocation_get_parameters(invoc
);
297 g_variant_get(params
, "(bb)", &proposed_ntpstate
, &policykit_auth
);
298 bus_name
= g_dbus_method_invocation_get_sender(invoc
);
300 is_authed
= polkit_try_auth(bus_name
, "org.freedesktop.timedate1.set-ntp", policykit_auth
);
304 case AUTHORIZED_NATIVELY
:
305 case AUTHORIZED_BY_PROMPT
:
308 case UNAUTHORIZED_NATIVELY
:
309 case UNAUTHORIZED_FAILED_PROMPT
:
310 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to toggle the NTP daemon.");
314 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
317 case ERROR_BADACTION
:
318 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
323 g_dbus_method_invocation_return_dbus_error(invoc
, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to toggle the NTP daemon for unknown reasons.");
327 ntpd_notrunning
= 0; /* GLib does not bother asserting the passed return value int to zero */
328 ntpd_notenabled
= 0; /* if the program's exit status is also zero, hence this decl. */
330 if((ntpd_notrunning
= system("/etc/rc.d/ntpd check > /dev/null 2>&1")) == -1)
333 if((ntpd_notenabled
= system("/etc/rc.d/ntpd status > /dev/null 2>&1")) == -1)
336 if(proposed_ntpstate
) {
339 system("/etc/rc.d/ntpd -f start > /dev/null 2>&1");
342 system("/etc/rc.d/ntpd enable > /dev/null 2>&1");
347 system("/etc/rc.d/ntpd stop > /dev/null 2>&1");
350 system("/etc/rc.d/ntpd disable > /dev/null 2>&1");
353 timedate1_complete_set_ntp(td1_passed_interf
, invoc
);
357 /* NOTE: you should be using gobject->set_property() for these ! */
361 GStatBuf
*stat_zoneinfo
;
362 gchar
*find_cmd
, *readlink_path
, *ret
, *argvp
, *hash_to_match
;
365 struct timezone_checksum_pair tmp
;
367 find_cmd
= (gchar
*) g_malloc0(2048);
368 stat_zoneinfo
= (GStatBuf
*) g_malloc0(8192);
369 err
= (GError
*) g_malloc0(2048);
371 if(g_stat(OS_LOCALTIME
, stat_zoneinfo
)) {
373 g_printf("could not read from %s! please symlink or copy a timezone file from %s to %s!\n", OS_LOCALTIME
, OS_TIMEZONE_PATH
, OS_LOCALTIME
);
376 } else if(g_file_test(OS_LOCALTIME
, G_FILE_TEST_IS_SYMLINK
)) {
378 readlink_path
= g_file_read_link(OS_LOCALTIME
, &err
);
380 gchar
*split
[2] = { readlink_path
, "" };
381 tmp
= parse_timezone_path(split
);
386 g_free(readlink_path
);
390 g_printf("%s is not a symlink! attempting to match checksums in %s...\n", OS_LOCALTIME
, OS_TIMEZONE_PATH
);
391 hash_to_match
= get_file_sha256(OS_LOCALTIME
);
393 /* ret = lookup_hash(hash_to_match); */
394 return FALSE
; /* TODO fix me for real */
397 g_free(hash_to_match
);
403 /* Unix time is in UTC. */
405 our_get_local_rtc() {
413 /* ntpd is part of the default install */
423 system_ret
= system("/etc/rc.d/ntpd check > /dev/null 2>&1");
431 /* undocumented feature present in systemd */
433 our_get_ntpsynchronized() {
441 /* undocumented feature present in systemd */
443 our_get_time_usec() {
450 /* undocumented feature present in systemd */
452 our_get_rtc_time_usec() {
459 /* --- end method/property/dbus signal code, begin bus/name handlers --- */
461 static void timedated_on_bus_acquired(GDBusConnection
*conn
,
463 gpointer user_data
) {
465 g_printf("got bus/name, exporting %s's interface...\n", name
);
467 timedated_interf
= timedate1_skeleton_new();
469 /* attach function pointers to generated struct's method handlers */
470 g_signal_connect(timedated_interf
, "handle-set-time", G_CALLBACK(on_handle_set_time
), NULL
);
471 g_signal_connect(timedated_interf
, "handle-set-timezone", G_CALLBACK(on_handle_set_timezone
), NULL
);
472 g_signal_connect(timedated_interf
, "handle-set-local-rtc", G_CALLBACK(on_handle_set_local_rtc
), NULL
);
473 g_signal_connect(timedated_interf
, "handle-set-ntp", G_CALLBACK(on_handle_set_ntp
), NULL
);
475 /* set our properties before export */
477 timedate1_set_timezone(timedated_interf
, our_get_timezone());
478 timedate1_set_local_rtc(timedated_interf
, our_get_local_rtc());
479 timedate1_set_can_ntp(timedated_interf
, our_get_can_ntp());
480 timedate1_set_ntp(timedated_interf
, our_get_ntp());
481 timedate1_set_ntpsynchronized(timedated_interf
, our_get_ntpsynchronized());
482 timedate1_set_time_usec(timedated_interf
, our_get_time_usec());
483 timedate1_set_rtctime_usec(timedated_interf
, our_get_rtc_time_usec());
487 timedated_interf->get_timezone = our_get_timezone();
488 timedated_interf->get_local_rtc = our_get_local_rtc();
489 timedated_interf->get_can_ntp = our_get_can_ntp();
490 timedated_interf->get_ntp = our_get_ntp();
491 timedated_interf->get_ntpsynchronized = our_get_ntpsynchronized();
492 timedated_interf->get_time_usec = our_get_time_usec();
493 timedated_interf->get_rtctime_usec = our_get_rtc_time_usec(); */
495 if(!g_dbus_interface_skeleton_export(G_DBUS_INTERFACE_SKELETON(timedated_interf
),
497 "/org/freedesktop/timedate1",
500 g_printf("failed to export %s's interface!\n", name
);
501 timedated_mem_clean();
505 dbus_interface_exported
= TRUE
;
506 g_printf("exported %s's interface on the system bus...\n", name
);
510 static void timedated_on_name_acquired(GDBusConnection
*conn
,
512 gpointer user_data
) {
514 g_printf("success!\n");
517 static void timedated_on_name_lost(GDBusConnection
*conn
,
519 gpointer user_data
) {
523 g_printf("failed to connect to the system bus while trying to acquire name '%s': either dbus-daemon isn't running or we don't have permission to push names and/or their interfaces to it.\n", name
);
524 timedated_mem_clean();
527 g_print("lost name %s, exiting...\n", name
);
529 timedated_mem_clean();
532 /* --- end bus/name handlers, begin misc unix functions --- */
534 /* safe call to clean and then exit
535 * this stops our GMainLoop safely before letting main() return */
536 void timedated_mem_clean() {
538 g_printf("exiting...\n");
540 if(dbus_interface_exported
)
541 g_dbus_interface_skeleton_unexport(G_DBUS_INTERFACE_SKELETON(timedated_interf
));
543 if(g_main_loop_is_running(timedated_loop
))
544 g_main_loop_quit(timedated_loop
);
548 /* wrapper for glib's unix signal handling; called only once if terminating signal is raised against us */
549 gboolean
unix_sig_terminate_handler(gpointer data
) {
551 g_printf("caught SIGINT/HUP/TERM, exiting\n");
553 timedated_mem_clean();
554 return G_SOURCE_REMOVE
;
557 void set_signal_handlers() {
559 /* we don't care about its descriptor, we never need to unregister these */
560 g_unix_signal_add(SIGINT
, unix_sig_terminate_handler
, NULL
);
561 g_unix_signal_add(SIGHUP
, unix_sig_terminate_handler
, NULL
);
562 g_unix_signal_add(SIGTERM
, unix_sig_terminate_handler
, NULL
);
567 set_signal_handlers();
569 /*if(!build_lookup_table())
572 timedated_loop
= g_main_loop_new(NULL
, TRUE
);
573 timedated_freeable
= g_ptr_array_new();
575 bus_descriptor
= g_bus_own_name(G_BUS_TYPE_SYSTEM
,
576 "org.freedesktop.timedate1",
577 G_BUS_NAME_OWNER_FLAGS_NONE
,
578 timedated_on_bus_acquired
,
579 timedated_on_name_acquired
,
580 timedated_on_name_lost
,
584 g_main_loop_run(timedated_loop
);
585 /* runs until single g_main_loop_quit() call is raised inside <interface>_mem_clean() */
586 g_main_loop_unref(timedated_loop
);
588 /* guaranteed unownable */
589 g_bus_unown_name(bus_descriptor
);
591 /* at this point no operations can occur with our data, it is safe to free it + its container */
592 g_ptr_array_free(timedated_freeable
, TRUE
);
597 static struct timezone_checksum_pair
parse_timezone_path(gchar
**pair
) {
599 gchar
*prefix_pattern
, *right_prefix_pattern
, *posix_prefix_pattern
, *lean_path
;
600 GRegex
*prefix
, *posix
, *right
;
602 struct timezone_checksum_pair ret
= { NULL
, NULL
, FALSE
, FALSE
};
607 prefix_pattern
= (gchar
*) g_malloc0(4096);
608 right_prefix_pattern
= (gchar
*) g_malloc0(4096);
609 posix_prefix_pattern
= (gchar
*) g_malloc0(4096);
611 g_sprintf(prefix_pattern
, "%s/", OS_TIMEZONE_PATH
);
612 g_sprintf(posix_prefix_pattern
, "%s/posix/", OS_TIMEZONE_PATH
);
613 g_sprintf(right_prefix_pattern
, "%s/right/", OS_TIMEZONE_PATH
);
615 prefix
= g_regex_new(prefix_pattern
, 0, 0, &err
);
616 posix
= g_regex_new(posix_prefix_pattern
, 0, 0, &err
);
617 right
= g_regex_new(right_prefix_pattern
, 0, 0, &err
);
619 if(g_regex_match_full(posix
, pair
[0], -1, 0, G_REGEX_MATCH_NOTEMPTY
, NULL
, NULL
)) {
622 lean_path
= g_regex_replace_literal(posix
, pair
[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY
, NULL
);
624 } else if(g_regex_match_full(right
, pair
[0], -1, 0, G_REGEX_MATCH_NOTEMPTY
, NULL
, NULL
)) {
627 lean_path
= g_regex_replace_literal(right
, pair
[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY
, NULL
);
630 lean_path
= g_regex_replace_literal(prefix
, pair
[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY
, NULL
);
632 ret
.path
= lean_path
;
634 ret
.sum
= g_malloc0(256);
635 g_strlcpy(ret
.sum
, pair
[1], 66);
637 g_regex_unref(prefix
);
638 g_regex_unref(right
);
639 g_regex_unref(posix
);
644 /* TODO need to deconstruct tz_table on exit
645 static gboolean build_lookup_table() {
647 gchar *find_cmd, **map_pairs, *find_output, *path_buf, *sum_buf, **entry_buf;
656 find_cmd = (gchar *) g_malloc0(4096);
657 find_output = (gchar *) g_malloc0(1000000);
659 g_sprintf(find_cmd, "/bin/sh -c \"find %s -type f -exec cksum -a sha256 {} \\; | sed -E 's/SHA256 \\(//g' | sed -E 's/\\) = /=/g'\"", OS_TIMEZONE_PATH);
661 if(!g_spawn_command_line_sync(find_cmd, &find_output, NULL, NULL, &err)) {
663 g_printf("error running `%s`\n", find_cmd);
667 map_pairs = g_strsplit(find_output, "\n", INT_MAX);
669 while(map_pairs[i] && (entry_buf = g_strsplit(map_pairs[i], "=", INT_MAX))) {
671 tz_table[i] = parse_timezone_path(entry_buf);
673 g_strfreev(entry_buf);
684 static gchar *lookup_hash(gchar *hash) {
688 while(tz_table[i].sum)
689 if(!g_strcmp0(tz_table[i].sum, hash))
690 return tz_table[i].path;
697 /* takes number of microseconds since epoch and returns a
698 * ptr to a timespec suitable to be passed to clock_settime(3)
700 static struct timespec
* mktimespec(gint64 us
) {
705 gint64 div_buf_remainder
, div_buf_s
, div_buf_ns
;
706 struct timespec
*ret
;
708 div_buf_s
= (us
/ 1000000); /* us / 10^6 = s */
709 div_buf_remainder
= (us
% 1000000); /* fraction of second lost from prev. line */
710 div_buf_ns
= div_buf_remainder
* 1000; /* us * 10^3 = ns */
712 seconds
= (time_t) div_buf_s
; /* porting note: most systems use 32 bit time, adjust accordingly */
713 nanoseconds
= (long) div_buf_ns
;
715 ret
= (struct timespec
*) calloc(1, sizeof(struct timespec
));
717 ret
->tv_sec
= seconds
;
718 ret
->tv_nsec
= nanoseconds
;
720 g_ptr_array_add(timedated_freeable
, ret
);