#include <signal.h>
#include <sys/types.h>
+#include <sys/time.h>
+#include <sys/stat.h>
+#include <errno.h>
#include <time.h>
#include <string.h>
#include "../../util.h"
+#define TZNAME_MAX PATH_MAX
+
GPtrArray *timedated_freeable;
Timedate1 *timedated_interf;
/* --- begin method/property/dbus signal code --- */
static gboolean
-on_handle_set_time(Timedate1 *hn1_passed_interf,
+on_handle_set_time(Timedate1 *td1_passed_interf,
GDBusMethodInvocation *invoc,
const gchar *greet,
gpointer data) {
- return FALSE;
+
+ GVariant *params;
+ gint64 proposed_time, cur_time;
+ const gchar *bus_name;
+ gboolean policykit_auth;
+ check_auth_result is_authed;
+ gboolean relative; /* relative if passed time_t is meant to be added to current time */
+ struct timespec *new_time;
+
+ params = g_dbus_method_invocation_get_parameters(invoc);
+ g_variant_get(params, "(xbb)", &proposed_time, &relative, &policykit_auth);
+ bus_name = g_dbus_method_invocation_get_sender(invoc);
+
+ is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-time", policykit_auth);
+
+ switch(is_authed) {
+
+ case AUTHORIZED_NATIVELY:
+ case AUTHORIZED_BY_PROMPT:
+ break;
+
+ case UNAUTHORIZED_NATIVELY:
+ case UNAUTHORIZED_FAILED_PROMPT:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set system time.");
+ return FALSE;
+
+ case ERROR_BADBUS:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
+ return FALSE;
+
+ case ERROR_BADACTION:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
+ return FALSE;
+
+ case ERROR_GENERIC:
+ default:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+ return FALSE;
+ }
+
+ if(!proposed_time) {
+
+ timedate1_complete_set_time(td1_passed_interf, invoc);
+ return TRUE;
+
+ } else if(relative) {
+
+ cur_time = g_get_real_time();
+
+ if(proposed_time < 0 && cur_time + proposed_time > cur_time) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+ return FALSE;
+
+ } else if(proposed_time > 0 && cur_time + proposed_time < cur_time) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+ return FALSE;
+ }
+
+ new_time = mktimespec(proposed_time);
+
+ if(!clock_settime(CLOCK_REALTIME, new_time)) {
+
+ timedate1_complete_set_time(td1_passed_interf, invoc);
+ return TRUE;
+
+ } else {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+ return FALSE;
+ }
+
+ } else if(proposed_time > 0) {
+
+
+ new_time = mktimespec(proposed_time);
+
+ if(!clock_settime(CLOCK_REALTIME, new_time)) {
+
+ timedate1_complete_set_time(td1_passed_interf, invoc);
+ return TRUE;
+
+ } else {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+ return FALSE;
+ }
+
+ } else {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+ return FALSE;
+ }
}
static gboolean
-on_handle_set_timezone(Timedate1 *hn1_passed_interf,
+on_handle_set_timezone(Timedate1 *td1_passed_interf,
GDBusMethodInvocation *invoc,
const gchar *greet,
gpointer data) {
- return FALSE;
+
+ GVariant *params;
+ gchar *proposed_tz;
+ const gchar *bus_name;
+ gboolean policykit_auth;
+ check_auth_result is_authed;
+
+ gchar *tz_target_path;
+ struct stat *statbuf;
+ extern int errno;
+
+ params = g_dbus_method_invocation_get_parameters(invoc);
+ g_variant_get(params, "(sb)", &proposed_tz, &policykit_auth);
+ bus_name = g_dbus_method_invocation_get_sender(invoc);
+
+ is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-timezone", policykit_auth);
+
+ switch(is_authed) {
+
+ case AUTHORIZED_NATIVELY:
+ case AUTHORIZED_BY_PROMPT:
+ break;
+
+ case UNAUTHORIZED_NATIVELY:
+ case UNAUTHORIZED_FAILED_PROMPT:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set timezone.");
+ return FALSE;
+
+ case ERROR_BADBUS:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
+ return FALSE;
+
+ case ERROR_BADACTION:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
+ return FALSE;
+
+ case ERROR_GENERIC:
+ default:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set timezone for unknown reasons.");
+ return FALSE;
+ }
+
+ statbuf = (struct stat*) calloc(1, sizeof(struct stat));
+ tz_target_path = (gchar *) calloc(1, TZNAME_MAX);
+
+ g_ptr_array_add(timedated_freeable, statbuf);
+ g_ptr_array_add(timedated_freeable, tz_target_path);
+
+ strlcat(tz_target_path, OS_TIMEZONE_PATH, TZNAME_MAX);
+ strlcat(tz_target_path, "/", TZNAME_MAX);
+ strlcat(tz_target_path, proposed_tz, TZNAME_MAX);
+
+ if(strstr(tz_target_path, "../")) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Provided timezone is invalid.");
+ return FALSE;
+ }
+
+ if(!statbuf)
+ return FALSE;
+
+ if(lstat(tz_target_path, statbuf)) {
+
+ switch(errno) {
+
+ case ENOENT:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENOENT", "Specified timezone does not exist.");
+ break;
+
+ default:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified timezone is invalid.");
+ break;
+ }
+
+ return FALSE;
+ }
+
+ if(!S_ISREG(statbuf->st_mode)) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified path is of an inappropriate type.");
+ return FALSE;
+ }
+
+ memset(statbuf, 0, sizeof statbuf);
+
+ if(!lstat(OS_LOCALTIME, statbuf))
+ if(remove(OS_LOCALTIME))
+ return FALSE;
+
+ if(symlink(tz_target_path, OS_LOCALTIME))
+ return FALSE;
+
+
+ timedate1_complete_set_timezone(td1_passed_interf, invoc);
+
+ return TRUE;
}
static gboolean
-on_handle_set_local_rtc(Timedate1 *hn1_passed_interf,
+on_handle_set_local_rtc(Timedate1 *td1_passed_interf,
GDBusMethodInvocation *invoc,
const gchar *greet,
gpointer data) {
- return FALSE;
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENODEV", "Unix RTC must be in UTC.");
+ return TRUE;
}
static gboolean
-on_handle_set_ntp(Timedate1 *hn1_passed_interf,
+on_handle_set_ntp(Timedate1 *td1_passed_interf,
GDBusMethodInvocation *invoc,
const gchar *greet,
gpointer data) {
- return FALSE;
-}
+ GVariant *params;
+ const gchar *bus_name;
+ gboolean policykit_auth;
+ check_auth_result is_authed;
+
+ /* revert to rcctl when 5.7 rolls around */
+ gint ntpd_notrunning, ntpd_notenabled; /* this logic flip is due to rcctl returning 0 on success,
+ * in this case an error means ntpd is not running or not enabled */
+ gboolean proposed_ntpstate;
+ GError *sh_errors;
+
+ extern int errno;
+
+ params = g_dbus_method_invocation_get_parameters(invoc);
+ g_variant_get(params, "(bb)", &proposed_ntpstate, &policykit_auth);
+ bus_name = g_dbus_method_invocation_get_sender(invoc);
+
+ is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-ntp", policykit_auth);
+
+ switch(is_authed) {
+
+ case AUTHORIZED_NATIVELY:
+ case AUTHORIZED_BY_PROMPT:
+ break;
+
+ case UNAUTHORIZED_NATIVELY:
+ case UNAUTHORIZED_FAILED_PROMPT:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to toggle the NTP daemon.");
+ return FALSE;
+
+ case ERROR_BADBUS:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
+ return FALSE;
+
+ case ERROR_BADACTION:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
+ return FALSE;
+
+ case ERROR_GENERIC:
+ default:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to toggle the NTP daemon for unknown reasons.");
+ return FALSE;
+ }
+
+ ntpd_notrunning = 0; /* GLib does not bother asserting the passed return value int to zero */
+ ntpd_notenabled = 0; /* if the program's exit status is also zero, hence this decl. */
+
+ if((ntpd_notrunning = system("/etc/rc.d/ntpd check > /dev/null 2>&1")) == -1)
+ return FALSE;
+
+ if((ntpd_notenabled = system("/etc/rc.d/ntpd status > /dev/null 2>&1")) == -1)
+ return FALSE;
+
+ if(proposed_ntpstate) {
+
+ if(ntpd_notrunning)
+ system("/etc/rc.d/ntpd -f start > /dev/null 2>&1");
+
+ if(ntpd_notenabled)
+ system("/etc/rc.d/ntpd enable > /dev/null 2>&1");
+
+ } else {
+
+ if(!ntpd_notrunning)
+ system("/etc/rc.d/ntpd stop > /dev/null 2>&1");
+
+ if(!ntpd_notenabled)
+ system("/etc/rc.d/ntpd disable > /dev/null 2>&1");
+ }
+
+ timedate1_complete_set_ntp(td1_passed_interf, invoc);
+
+ return TRUE;
+}
+/* NOTE: you should be using gobject->set_property() for these ! */
const gchar *
our_get_timezone() {
g_printf("%s is not a symlink! attempting to match checksums in %s...\n", OS_LOCALTIME, OS_TIMEZONE_PATH);
hash_to_match = get_file_sha256(OS_LOCALTIME);
- ret = lookup_hash(hash_to_match);
+ /* ret = lookup_hash(hash_to_match); */
+ return FALSE; /* TODO fix me for real */
if(hash_to_match)
g_free(hash_to_match);
}
-
+
return ret;
}
+/* Unix time is in UTC. */
gboolean
our_get_local_rtc() {
- gboolean ret = FALSE;
-
- return ret;
+ return FALSE;
}
gboolean
our_get_can_ntp() {
- const gboolean ret = FALSE;
+ /* ntpd is part of the default install */
- return ret;
+ return TRUE;
}
gboolean
our_get_ntp() {
- const gboolean ret = FALSE;
+ int system_ret;
- return ret;
+ system_ret = system("/etc/rc.d/ntpd check > /dev/null 2>&1");
+
+ if(system_ret)
+ return FALSE;
+
+ return TRUE;
}
+/* undocumented feature present in systemd */
gboolean
our_get_ntpsynchronized() {
- const gboolean ret = FALSE;
+ gboolean ntp;
+ ntp = our_get_ntp();
- return ret;
+ return ntp;
}
+/* undocumented feature present in systemd */
guint64
our_get_time_usec() {
return ret;
}
+/* undocumented feature present in systemd */
guint64
our_get_rtc_time_usec() {
g_signal_connect(timedated_interf, "handle-set-ntp", G_CALLBACK(on_handle_set_ntp), NULL);
/* set our properties before export */
+
timedate1_set_timezone(timedated_interf, our_get_timezone());
timedate1_set_local_rtc(timedated_interf, our_get_local_rtc());
timedate1_set_can_ntp(timedated_interf, our_get_can_ntp());
timedate1_set_time_usec(timedated_interf, our_get_time_usec());
timedate1_set_rtctime_usec(timedated_interf, our_get_rtc_time_usec());
+ /* WIP
+
+ timedated_interf->get_timezone = our_get_timezone();
+ timedated_interf->get_local_rtc = our_get_local_rtc();
+ timedated_interf->get_can_ntp = our_get_can_ntp();
+ timedated_interf->get_ntp = our_get_ntp();
+ timedated_interf->get_ntpsynchronized = our_get_ntpsynchronized();
+ timedated_interf->get_time_usec = our_get_time_usec();
+ timedated_interf->get_rtctime_usec = our_get_rtc_time_usec(); */
+
if(!g_dbus_interface_skeleton_export(G_DBUS_INTERFACE_SKELETON(timedated_interf),
conn,
"/org/freedesktop/timedate1",
set_signal_handlers();
- if(!build_lookup_table())
- return 1;
+ /*if(!build_lookup_table())
+ return 1; */
timedated_loop = g_main_loop_new(NULL, TRUE);
timedated_freeable = g_ptr_array_new();
return ret;
}
-/* TODO need to deconstruct tz_table on exit */
+/* TODO need to deconstruct tz_table on exit
static gboolean build_lookup_table() {
gchar *find_cmd, **map_pairs, *find_output, *path_buf, *sum_buf, **entry_buf;
i++;
return NULL;
+}*/
+
+/* takes number of microseconds since epoch and returns a
+ * ptr to a timespec suitable to be passed to clock_settime(3)
+ */
+static struct timespec* mktimespec(gint64 us) {
+
+ long nanoseconds;
+ time_t seconds;
+
+ gint64 div_buf_remainder, div_buf_s, div_buf_ns;
+ struct timespec *ret;
+
+ div_buf_s = (us / 1000000); /* us / 10^6 = s */
+ div_buf_remainder = (us % 1000000); /* fraction of second lost from prev. line */
+ div_buf_ns = div_buf_remainder * 1000; /* us * 10^3 = ns */
+
+ seconds = (time_t) div_buf_s; /* porting note: most systems use 32 bit time, adjust accordingly */
+ nanoseconds = (long) div_buf_ns;
+
+ ret = (struct timespec *) calloc(1, sizeof(struct timespec));
+
+ ret->tv_sec = seconds;
+ ret->tv_nsec = nanoseconds;
+
+ g_ptr_array_add(timedated_freeable, ret);
+
+ return ret;
}