3b82e3c1 |
1 | /* |
2 | * Copyright (c) 2014 Ian Sutton <ian@kremlin.cc> |
3 | * |
4 | * Permission to use, copy, modify, and distribute this software for any |
5 | * purpose with or without fee is hereby granted, provided that the above |
6 | * copyright notice and this permission notice appear in all copies. |
7 | * |
8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
11 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
13 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
14 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
15 | */ |
16 | |
b6ad18ad |
17 | #include <unistd.h> |
18 | #include <limits.h> |
c12c41f4 |
19 | #include <signal.h> |
b6ad18ad |
20 | |
a3d2e50f |
21 | #include <sys/types.h> |
a8f71719 |
22 | #include <sys/time.h> |
c8a3e18e |
23 | #include <sys/stat.h> |
24 | #include <errno.h> |
a3d2e50f |
25 | #include <time.h> |
b6ad18ad |
26 | #include <string.h> |
27 | |
28 | #include <glib/gprintf.h> |
8caf1f61 |
29 | #include <glib-unix.h> |
1066bd36 |
30 | #include <glib/gstdio.h> |
904d744d |
31 | #include <polkit/polkit.h> |
b6ad18ad |
32 | |
1e8c7c88 |
33 | #include "timedated-gen.h" |
a33bcdfa |
34 | #include "timedated.h" |
1e8c7c88 |
35 | |
ed4cf3c8 |
36 | #include "../../util.h" |
483e90b7 |
37 | |
c8a3e18e |
38 | #define TZNAME_MAX PATH_MAX |
39 | |
b6ad18ad |
40 | GPtrArray *timedated_freeable; |
41 | Timedate1 *timedated_interf; |
42 | |
c12c41f4 |
43 | GMainLoop *timedated_loop; |
44 | |
45 | guint bus_descriptor; |
46 | gboolean dbus_interface_exported; /* reliable because of gdbus operational guarantees */ |
47 | |
03f12ac7 |
48 | const gchar *OS_LOCALTIME = "/etc/localtime"; /* current timezone file */ |
49 | const gchar *OS_TIMEZONE_PATH = "/usr/share/zoneinfo"; /* path to system timezone files */ |
50 | |
51 | struct timezone_checksum_pair { |
52 | |
53 | gchar *path; |
54 | gchar *sum; |
55 | gboolean posix; |
56 | gboolean right; |
57 | }; |
58 | |
59 | static struct timezone_checksum_pair tz_table[5000]; |
1066bd36 |
60 | |
1ce41045 |
61 | /* --- begin method/property/dbus signal code --- */ |
b6ad18ad |
62 | |
28b86015 |
63 | static gboolean |
a8f71719 |
64 | on_handle_set_time(Timedate1 *td1_passed_interf, |
28b86015 |
65 | GDBusMethodInvocation *invoc, |
66 | const gchar *greet, |
67 | gpointer data) { |
a8f71719 |
68 | |
69 | GVariant *params; |
70 | gint64 proposed_time, cur_time; |
71 | const gchar *bus_name; |
72 | gboolean policykit_auth; |
73 | check_auth_result is_authed; |
74 | gboolean relative; /* relative if passed time_t is meant to be added to current time */ |
644bae40 |
75 | struct timespec *new_time; |
a8f71719 |
76 | |
77 | params = g_dbus_method_invocation_get_parameters(invoc); |
78 | g_variant_get(params, "(xbb)", &proposed_time, &relative, &policykit_auth); |
79 | bus_name = g_dbus_method_invocation_get_sender(invoc); |
80 | |
81 | is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-time", policykit_auth); |
82 | |
83 | switch(is_authed) { |
84 | |
85 | case AUTHORIZED_NATIVELY: |
86 | case AUTHORIZED_BY_PROMPT: |
87 | break; |
88 | |
89 | case UNAUTHORIZED_NATIVELY: |
90 | case UNAUTHORIZED_FAILED_PROMPT: |
91 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set system time."); |
92 | return FALSE; |
93 | |
94 | case ERROR_BADBUS: |
95 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid."); |
96 | return FALSE; |
97 | |
98 | case ERROR_BADACTION: |
99 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid."); |
100 | return FALSE; |
101 | |
102 | case ERROR_GENERIC: |
103 | default: |
104 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); |
105 | return FALSE; |
106 | } |
107 | |
fe959043 |
108 | if(!proposed_time) { |
109 | |
110 | timedate1_complete_set_time(td1_passed_interf, invoc); |
111 | return TRUE; |
a8f71719 |
112 | |
fe959043 |
113 | } else if(relative) { |
a8f71719 |
114 | |
115 | cur_time = g_get_real_time(); |
fe959043 |
116 | |
10ddceeb |
117 | if(proposed_time < 0 && cur_time + proposed_time > cur_time) { |
fe959043 |
118 | |
119 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); |
120 | return FALSE; |
121 | |
10ddceeb |
122 | } else if(proposed_time > 0 && cur_time + proposed_time < cur_time) { |
fe959043 |
123 | |
124 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); |
125 | return FALSE; |
126 | } |
127 | |
644bae40 |
128 | new_time = mktimespec(proposed_time); |
fe959043 |
129 | |
644bae40 |
130 | if(!clock_settime(CLOCK_REALTIME, new_time)) { |
fe959043 |
131 | |
132 | timedate1_complete_set_time(td1_passed_interf, invoc); |
133 | return TRUE; |
134 | |
135 | } else { |
136 | |
137 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); |
138 | return FALSE; |
139 | } |
140 | |
10ddceeb |
141 | } else if(proposed_time > 0) { |
a8f71719 |
142 | |
a8f71719 |
143 | |
644bae40 |
144 | new_time = mktimespec(proposed_time); |
145 | |
146 | if(!clock_settime(CLOCK_REALTIME, new_time)) { |
a8f71719 |
147 | |
148 | timedate1_complete_set_time(td1_passed_interf, invoc); |
149 | return TRUE; |
150 | |
151 | } else { |
152 | |
153 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); |
154 | return FALSE; |
155 | } |
fe959043 |
156 | |
a8f71719 |
157 | } else { |
158 | |
fe959043 |
159 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); |
a8f71719 |
160 | return FALSE; |
161 | } |
28b86015 |
162 | } |
b6ad18ad |
163 | |
28b86015 |
164 | static gboolean |
a8f71719 |
165 | on_handle_set_timezone(Timedate1 *td1_passed_interf, |
28b86015 |
166 | GDBusMethodInvocation *invoc, |
167 | const gchar *greet, |
168 | gpointer data) { |
c8a3e18e |
169 | |
170 | GVariant *params; |
171 | gchar *proposed_tz; |
172 | const gchar *bus_name; |
173 | gboolean policykit_auth; |
174 | check_auth_result is_authed; |
175 | |
176 | gchar *tz_target_path; |
177 | struct stat *statbuf; |
178 | extern int errno; |
179 | |
180 | params = g_dbus_method_invocation_get_parameters(invoc); |
181 | g_variant_get(params, "(sb)", &proposed_tz, &policykit_auth); |
182 | bus_name = g_dbus_method_invocation_get_sender(invoc); |
183 | |
184 | is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-timezone", policykit_auth); |
185 | |
186 | switch(is_authed) { |
187 | |
188 | case AUTHORIZED_NATIVELY: |
189 | case AUTHORIZED_BY_PROMPT: |
190 | break; |
191 | |
192 | case UNAUTHORIZED_NATIVELY: |
193 | case UNAUTHORIZED_FAILED_PROMPT: |
194 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set timezone."); |
195 | return FALSE; |
196 | |
197 | case ERROR_BADBUS: |
198 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid."); |
199 | return FALSE; |
200 | |
201 | case ERROR_BADACTION: |
202 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid."); |
203 | return FALSE; |
204 | |
205 | case ERROR_GENERIC: |
206 | default: |
207 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set timezone for unknown reasons."); |
208 | return FALSE; |
209 | } |
210 | |
211 | statbuf = (struct stat*) calloc(1, sizeof(struct stat)); |
212 | tz_target_path = (gchar *) calloc(1, TZNAME_MAX); |
213 | |
214 | g_ptr_array_add(timedated_freeable, statbuf); |
215 | g_ptr_array_add(timedated_freeable, tz_target_path); |
216 | |
7a7c9176 |
217 | strlcat(tz_target_path, OS_TIMEZONE_PATH, TZNAME_MAX); |
c8a3e18e |
218 | strlcat(tz_target_path, "/", TZNAME_MAX); |
219 | strlcat(tz_target_path, proposed_tz, TZNAME_MAX); |
220 | |
0b7afeee |
221 | if(strstr(tz_target_path, "../")) { |
222 | |
223 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Provided timezone is invalid."); |
224 | return FALSE; |
225 | } |
c8a3e18e |
226 | |
227 | if(!statbuf) |
228 | return FALSE; |
229 | |
230 | if(lstat(tz_target_path, statbuf)) { |
231 | |
232 | switch(errno) { |
233 | |
234 | case ENOENT: |
235 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENOENT", "Specified timezone does not exist."); |
236 | break; |
237 | |
238 | default: |
239 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified timezone is invalid."); |
240 | break; |
241 | } |
242 | |
243 | return FALSE; |
244 | } |
245 | |
246 | if(!S_ISREG(statbuf->st_mode)) { |
247 | |
248 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified path is of an inappropriate type."); |
249 | return FALSE; |
250 | } |
251 | |
252 | memset(statbuf, 0, sizeof statbuf); |
253 | |
7a7c9176 |
254 | if(!lstat(OS_LOCALTIME, statbuf)) |
255 | if(remove(OS_LOCALTIME)) |
c8a3e18e |
256 | return FALSE; |
257 | |
7a7c9176 |
258 | if(symlink(tz_target_path, OS_LOCALTIME)) |
c8a3e18e |
259 | return FALSE; |
260 | |
261 | |
262 | timedate1_complete_set_timezone(td1_passed_interf, invoc); |
263 | |
264 | return TRUE; |
28b86015 |
265 | } |
266 | |
267 | static gboolean |
a8f71719 |
268 | on_handle_set_local_rtc(Timedate1 *td1_passed_interf, |
28b86015 |
269 | GDBusMethodInvocation *invoc, |
270 | const gchar *greet, |
271 | gpointer data) { |
0b7afeee |
272 | |
06407d3e |
273 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENODEV", "Unix RTC must be in UTC."); |
0b7afeee |
274 | return TRUE; |
28b86015 |
275 | } |
276 | |
277 | static gboolean |
a8f71719 |
278 | on_handle_set_ntp(Timedate1 *td1_passed_interf, |
28b86015 |
279 | GDBusMethodInvocation *invoc, |
280 | const gchar *greet, |
281 | gpointer data) { |
0280f7d2 |
282 | |
283 | GVariant *params; |
284 | const gchar *bus_name; |
285 | gboolean policykit_auth; |
286 | check_auth_result is_authed; |
287 | |
0e955e92 |
288 | /* revert to rcctl when 5.7 rolls around */ |
0280f7d2 |
289 | gint ntpd_notrunning, ntpd_notenabled; /* this logic flip is due to rcctl returning 0 on success, |
290 | * in this case an error means ntpd is not running or not enabled */ |
291 | gboolean proposed_ntpstate; |
292 | GError *sh_errors; |
293 | |
294 | extern int errno; |
295 | |
296 | params = g_dbus_method_invocation_get_parameters(invoc); |
297 | g_variant_get(params, "(bb)", &proposed_ntpstate, &policykit_auth); |
298 | bus_name = g_dbus_method_invocation_get_sender(invoc); |
299 | |
300 | is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-ntp", policykit_auth); |
301 | |
302 | switch(is_authed) { |
303 | |
304 | case AUTHORIZED_NATIVELY: |
305 | case AUTHORIZED_BY_PROMPT: |
306 | break; |
307 | |
308 | case UNAUTHORIZED_NATIVELY: |
309 | case UNAUTHORIZED_FAILED_PROMPT: |
310 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to toggle the NTP daemon."); |
311 | return FALSE; |
312 | |
313 | case ERROR_BADBUS: |
314 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid."); |
315 | return FALSE; |
316 | |
317 | case ERROR_BADACTION: |
318 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid."); |
319 | return FALSE; |
320 | |
321 | case ERROR_GENERIC: |
322 | default: |
323 | g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to toggle the NTP daemon for unknown reasons."); |
324 | return FALSE; |
325 | } |
326 | |
327 | ntpd_notrunning = 0; /* GLib does not bother asserting the passed return value int to zero */ |
328 | ntpd_notenabled = 0; /* if the program's exit status is also zero, hence this decl. */ |
329 | |
0e955e92 |
330 | if((ntpd_notrunning = system("/etc/rc.d/ntpd check > /dev/null 2>&1")) == -1) |
0280f7d2 |
331 | return FALSE; |
332 | |
0e955e92 |
333 | if((ntpd_notenabled = system("/etc/rc.d/ntpd status > /dev/null 2>&1")) == -1) |
0280f7d2 |
334 | return FALSE; |
335 | |
336 | if(proposed_ntpstate) { |
337 | |
338 | if(ntpd_notrunning) |
0e955e92 |
339 | system("/etc/rc.d/ntpd -f start > /dev/null 2>&1"); |
0280f7d2 |
340 | |
341 | if(ntpd_notenabled) |
0e955e92 |
342 | system("/etc/rc.d/ntpd enable > /dev/null 2>&1"); |
0280f7d2 |
343 | |
344 | } else { |
345 | |
346 | if(!ntpd_notrunning) |
0e955e92 |
347 | system("/etc/rc.d/ntpd stop > /dev/null 2>&1"); |
0280f7d2 |
348 | |
349 | if(!ntpd_notenabled) |
0e955e92 |
350 | system("/etc/rc.d/ntpd disable > /dev/null 2>&1"); |
0280f7d2 |
351 | } |
352 | |
353 | timedate1_complete_set_ntp(td1_passed_interf, invoc); |
354 | |
355 | return TRUE; |
28b86015 |
356 | } |
5b56a1e8 |
357 | /* NOTE: you should be using gobject->set_property() for these ! */ |
28b86015 |
358 | const gchar * |
359 | our_get_timezone() { |
360 | |
1066bd36 |
361 | GStatBuf *stat_zoneinfo; |
03f12ac7 |
362 | gchar *find_cmd, *readlink_path, *ret, *argvp, *hash_to_match; |
363 | gint argcp; |
364 | GError *err; |
365 | struct timezone_checksum_pair tmp; |
1066bd36 |
366 | |
03f12ac7 |
367 | find_cmd = (gchar *) g_malloc0(2048); |
368 | stat_zoneinfo = (GStatBuf *) g_malloc0(8192); |
369 | err = (GError *) g_malloc0(2048); |
1066bd36 |
370 | |
371 | if(g_stat(OS_LOCALTIME, stat_zoneinfo)) { |
372 | |
373 | g_printf("could not read from %s! please symlink or copy a timezone file from %s to %s!\n", OS_LOCALTIME, OS_TIMEZONE_PATH, OS_LOCALTIME); |
374 | ret = NULL; |
375 | |
376 | } else if(g_file_test(OS_LOCALTIME, G_FILE_TEST_IS_SYMLINK)) { |
377 | |
378 | readlink_path = g_file_read_link(OS_LOCALTIME, &err); |
03f12ac7 |
379 | |
380 | gchar *split[2] = { readlink_path, "" }; |
381 | tmp = parse_timezone_path(split); |
382 | |
383 | ret = tmp.path; |
1066bd36 |
384 | |
385 | if(readlink_path) |
386 | g_free(readlink_path); |
387 | |
388 | } else { |
389 | |
390 | g_printf("%s is not a symlink! attempting to match checksums in %s...\n", OS_LOCALTIME, OS_TIMEZONE_PATH); |
03f12ac7 |
391 | hash_to_match = get_file_sha256(OS_LOCALTIME); |
392 | |
644bae40 |
393 | /* ret = lookup_hash(hash_to_match); */ |
394 | return FALSE; /* TODO fix me for real */ |
03f12ac7 |
395 | |
396 | if(hash_to_match) |
397 | g_free(hash_to_match); |
1066bd36 |
398 | } |
1a383289 |
399 | |
1066bd36 |
400 | return ret; |
28b86015 |
401 | } |
402 | |
5b56a1e8 |
403 | /* Unix time is in UTC. */ |
28b86015 |
404 | gboolean |
405 | our_get_local_rtc() { |
406 | |
5b56a1e8 |
407 | return FALSE; |
28b86015 |
408 | } |
409 | |
410 | gboolean |
411 | our_get_can_ntp() { |
412 | |
5b56a1e8 |
413 | /* ntpd is part of the default install */ |
28b86015 |
414 | |
5b56a1e8 |
415 | return TRUE; |
28b86015 |
416 | } |
417 | |
418 | gboolean |
419 | our_get_ntp() { |
420 | |
1a383289 |
421 | int system_ret; |
28b86015 |
422 | |
5b56a1e8 |
423 | system_ret = system("/etc/rc.d/ntpd check > /dev/null 2>&1"); |
1a383289 |
424 | |
425 | if(system_ret) |
426 | return FALSE; |
427 | |
428 | return TRUE; |
28b86015 |
429 | } |
b6ad18ad |
430 | |
5b56a1e8 |
431 | /* undocumented feature present in systemd */ |
28b86015 |
432 | gboolean |
433 | our_get_ntpsynchronized() { |
434 | |
5b56a1e8 |
435 | gboolean ntp; |
436 | ntp = our_get_ntp(); |
b6ad18ad |
437 | |
5b56a1e8 |
438 | return ntp; |
28b86015 |
439 | } |
b6ad18ad |
440 | |
5b56a1e8 |
441 | /* undocumented feature present in systemd */ |
28b86015 |
442 | guint64 |
443 | our_get_time_usec() { |
b6ad18ad |
444 | |
28b86015 |
445 | guint64 ret = 0; |
b6ad18ad |
446 | |
28b86015 |
447 | return ret; |
448 | } |
449 | |
5b56a1e8 |
450 | /* undocumented feature present in systemd */ |
28b86015 |
451 | guint64 |
452 | our_get_rtc_time_usec() { |
453 | |
454 | guint64 ret = 0; |
455 | |
456 | return ret; |
457 | } |
b6ad18ad |
458 | |
1ce41045 |
459 | /* --- end method/property/dbus signal code, begin bus/name handlers --- */ |
b6ad18ad |
460 | |
461 | static void timedated_on_bus_acquired(GDBusConnection *conn, |
462 | const gchar *name, |
463 | gpointer user_data) { |
464 | |
254ceec0 |
465 | g_printf("got bus/name, exporting %s's interface...\n", name); |
b6ad18ad |
466 | |
467 | timedated_interf = timedate1_skeleton_new(); |
468 | |
28b86015 |
469 | /* attach function pointers to generated struct's method handlers */ |
470 | g_signal_connect(timedated_interf, "handle-set-time", G_CALLBACK(on_handle_set_time), NULL); |
471 | g_signal_connect(timedated_interf, "handle-set-timezone", G_CALLBACK(on_handle_set_timezone), NULL); |
472 | g_signal_connect(timedated_interf, "handle-set-local-rtc", G_CALLBACK(on_handle_set_local_rtc), NULL); |
473 | g_signal_connect(timedated_interf, "handle-set-ntp", G_CALLBACK(on_handle_set_ntp), NULL); |
03f12ac7 |
474 | |
28b86015 |
475 | /* set our properties before export */ |
5b56a1e8 |
476 | |
28b86015 |
477 | timedate1_set_timezone(timedated_interf, our_get_timezone()); |
478 | timedate1_set_local_rtc(timedated_interf, our_get_local_rtc()); |
479 | timedate1_set_can_ntp(timedated_interf, our_get_can_ntp()); |
480 | timedate1_set_ntp(timedated_interf, our_get_ntp()); |
481 | timedate1_set_ntpsynchronized(timedated_interf, our_get_ntpsynchronized()); |
482 | timedate1_set_time_usec(timedated_interf, our_get_time_usec()); |
483 | timedate1_set_rtctime_usec(timedated_interf, our_get_rtc_time_usec()); |
484 | |
5b56a1e8 |
485 | /* WIP |
486 | |
487 | timedated_interf->get_timezone = our_get_timezone(); |
488 | timedated_interf->get_local_rtc = our_get_local_rtc(); |
489 | timedated_interf->get_can_ntp = our_get_can_ntp(); |
490 | timedated_interf->get_ntp = our_get_ntp(); |
491 | timedated_interf->get_ntpsynchronized = our_get_ntpsynchronized(); |
492 | timedated_interf->get_time_usec = our_get_time_usec(); |
493 | timedated_interf->get_rtctime_usec = our_get_rtc_time_usec(); */ |
494 | |
b6ad18ad |
495 | if(!g_dbus_interface_skeleton_export(G_DBUS_INTERFACE_SKELETON(timedated_interf), |
496 | conn, |
497 | "/org/freedesktop/timedate1", |
498 | NULL)) { |
499 | |
509599f0 |
500 | g_printf("failed to export %s's interface!\n", name); |
501 | timedated_mem_clean(); |
502 | |
503 | } else { |
504 | |
505 | dbus_interface_exported = TRUE; |
506 | g_printf("exported %s's interface on the system bus...\n", name); |
b6ad18ad |
507 | } |
509599f0 |
508 | } |
509 | |
510 | static void timedated_on_name_acquired(GDBusConnection *conn, |
90f54407 |
511 | const gchar *name, |
509599f0 |
512 | gpointer user_data) { |
b6ad18ad |
513 | |
509599f0 |
514 | g_printf("success!\n"); |
b6ad18ad |
515 | } |
516 | |
b6ad18ad |
517 | static void timedated_on_name_lost(GDBusConnection *conn, |
518 | const gchar *name, |
519 | gpointer user_data) { |
520 | |
509599f0 |
521 | if(!conn) { |
b6ad18ad |
522 | |
509599f0 |
523 | g_printf("failed to connect to the system bus while trying to acquire name '%s': either dbus-daemon isn't running or we don't have permission to push names and/or their interfaces to it.\n", name); |
524 | timedated_mem_clean(); |
525 | } |
b6ad18ad |
526 | |
509599f0 |
527 | g_print("lost name %s, exiting...\n", name); |
528 | |
529 | timedated_mem_clean(); |
b6ad18ad |
530 | } |
531 | |
b70beb08 |
532 | /* --- end bus/name handlers, begin misc unix functions --- */ |
533 | |
509599f0 |
534 | /* safe call to clean and then exit |
535 | * this stops our GMainLoop safely before letting main() return */ |
b70beb08 |
536 | void timedated_mem_clean() { |
537 | |
341587db |
538 | g_printf("exiting...\n"); |
539 | |
540 | if(dbus_interface_exported) |
541 | g_dbus_interface_skeleton_unexport(G_DBUS_INTERFACE_SKELETON(timedated_interf)); |
542 | |
543 | if(g_main_loop_is_running(timedated_loop)) |
544 | g_main_loop_quit(timedated_loop); |
545 | |
b70beb08 |
546 | } |
547 | |
712eb329 |
548 | /* wrapper for glib's unix signal handling; called only once if terminating signal is raised against us */ |
549 | gboolean unix_sig_terminate_handler(gpointer data) { |
550 | |
551 | g_printf("caught SIGINT/HUP/TERM, exiting\n"); |
552 | |
553 | timedated_mem_clean(); |
554 | return G_SOURCE_REMOVE; |
555 | } |
556 | |
2ef2cfe1 |
557 | void set_signal_handlers() { |
558 | |
559 | /* we don't care about its descriptor, we never need to unregister these */ |
560 | g_unix_signal_add(SIGINT, unix_sig_terminate_handler, NULL); |
561 | g_unix_signal_add(SIGHUP, unix_sig_terminate_handler, NULL); |
562 | g_unix_signal_add(SIGTERM, unix_sig_terminate_handler, NULL); |
563 | } |
564 | |
1e8c7c88 |
565 | int main() { |
b6ad18ad |
566 | |
9728ae1f |
567 | set_signal_handlers(); |
568 | |
644bae40 |
569 | /*if(!build_lookup_table()) |
570 | return 1; */ |
03f12ac7 |
571 | |
90f54407 |
572 | timedated_loop = g_main_loop_new(NULL, TRUE); |
573 | timedated_freeable = g_ptr_array_new(); |
b6ad18ad |
574 | |
90f54407 |
575 | bus_descriptor = g_bus_own_name(G_BUS_TYPE_SYSTEM, |
b6ad18ad |
576 | "org.freedesktop.timedate1", |
577 | G_BUS_NAME_OWNER_FLAGS_NONE, |
578 | timedated_on_bus_acquired, |
579 | timedated_on_name_acquired, |
580 | timedated_on_name_lost, |
581 | NULL, |
582 | NULL); |
583 | |
90f54407 |
584 | g_main_loop_run(timedated_loop); |
9728ae1f |
585 | /* runs until single g_main_loop_quit() call is raised inside <interface>_mem_clean() */ |
90f54407 |
586 | g_main_loop_unref(timedated_loop); |
b6ad18ad |
587 | |
9728ae1f |
588 | /* guaranteed unownable */ |
90f54407 |
589 | g_bus_unown_name(bus_descriptor); |
b6ad18ad |
590 | |
9728ae1f |
591 | /* at this point no operations can occur with our data, it is safe to free it + its container */ |
592 | g_ptr_array_free(timedated_freeable, TRUE); |
b6ad18ad |
593 | |
90f54407 |
594 | return 0; |
1e8c7c88 |
595 | } |
1066bd36 |
596 | |
03f12ac7 |
597 | static struct timezone_checksum_pair parse_timezone_path(gchar **pair) { |
1066bd36 |
598 | |
03f12ac7 |
599 | gchar *prefix_pattern, *right_prefix_pattern, *posix_prefix_pattern, *lean_path; |
1066bd36 |
600 | GRegex *prefix, *posix, *right; |
601 | GError *err = NULL; |
03f12ac7 |
602 | struct timezone_checksum_pair ret = { NULL, NULL, FALSE, FALSE }; |
1066bd36 |
603 | |
03f12ac7 |
604 | if(!pair[0]) |
605 | return ret; |
1066bd36 |
606 | |
607 | prefix_pattern = (gchar *) g_malloc0(4096); |
03f12ac7 |
608 | right_prefix_pattern = (gchar *) g_malloc0(4096); |
609 | posix_prefix_pattern = (gchar *) g_malloc0(4096); |
610 | |
611 | g_sprintf(prefix_pattern, "%s/", OS_TIMEZONE_PATH); |
612 | g_sprintf(posix_prefix_pattern, "%s/posix/", OS_TIMEZONE_PATH); |
613 | g_sprintf(right_prefix_pattern, "%s/right/", OS_TIMEZONE_PATH); |
1066bd36 |
614 | |
615 | prefix = g_regex_new(prefix_pattern, 0, 0, &err); |
03f12ac7 |
616 | posix = g_regex_new(posix_prefix_pattern, 0, 0, &err); |
617 | right = g_regex_new(right_prefix_pattern, 0, 0, &err); |
618 | |
619 | if(g_regex_match_full(posix, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) { |
620 | |
621 | ret.posix = TRUE; |
622 | lean_path = g_regex_replace_literal(posix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); |
623 | |
624 | } else if(g_regex_match_full(right, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) { |
625 | |
626 | ret.right = TRUE; |
627 | lean_path = g_regex_replace_literal(right, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); |
628 | |
629 | } else |
630 | lean_path = g_regex_replace_literal(prefix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); |
631 | |
632 | ret.path = lean_path; |
633 | |
634 | ret.sum = g_malloc0(256); |
635 | g_strlcpy(ret.sum, pair[1], 66); |
1066bd36 |
636 | |
637 | g_regex_unref(prefix); |
638 | g_regex_unref(right); |
639 | g_regex_unref(posix); |
640 | |
03f12ac7 |
641 | return ret; |
642 | } |
643 | |
644bae40 |
644 | /* TODO need to deconstruct tz_table on exit |
03f12ac7 |
645 | static gboolean build_lookup_table() { |
646 | |
647 | gchar *find_cmd, **map_pairs, *find_output, *path_buf, *sum_buf, **entry_buf; |
648 | GError *err; |
649 | gboolean ret; |
650 | gint i; |
651 | |
652 | i = 0; |
653 | err = NULL; |
654 | ret = TRUE; |
655 | |
656 | find_cmd = (gchar *) g_malloc0(4096); |
657 | find_output = (gchar *) g_malloc0(1000000); |
658 | |
659 | g_sprintf(find_cmd, "/bin/sh -c \"find %s -type f -exec cksum -a sha256 {} \\; | sed -E 's/SHA256 \\(//g' | sed -E 's/\\) = /=/g'\"", OS_TIMEZONE_PATH); |
660 | |
661 | if(!g_spawn_command_line_sync(find_cmd, &find_output, NULL, NULL, &err)) { |
662 | |
663 | g_printf("error running `%s`\n", find_cmd); |
664 | ret = FALSE; |
665 | } |
666 | |
667 | map_pairs = g_strsplit(find_output, "\n", INT_MAX); |
668 | |
669 | while(map_pairs[i] && (entry_buf = g_strsplit(map_pairs[i], "=", INT_MAX))) { |
670 | |
671 | tz_table[i] = parse_timezone_path(entry_buf); |
672 | |
673 | g_strfreev(entry_buf); |
674 | i++; |
675 | } |
676 | |
677 | g_free(find_output); |
678 | g_free(find_cmd); |
679 | g_free(map_pairs); |
680 | |
681 | return ret; |
682 | } |
683 | |
684 | static gchar *lookup_hash(gchar *hash) { |
685 | |
686 | gint i = 0; |
687 | |
688 | while(tz_table[i].sum) |
689 | if(!g_strcmp0(tz_table[i].sum, hash)) |
690 | return tz_table[i].path; |
691 | else |
692 | i++; |
693 | |
694 | return NULL; |
644bae40 |
695 | }*/ |
696 | |
697 | /* takes number of microseconds since epoch and returns a |
698 | * ptr to a timespec suitable to be passed to clock_settime(3) |
699 | */ |
700 | static struct timespec* mktimespec(gint64 us) { |
701 | |
702 | long nanoseconds; |
703 | time_t seconds; |
704 | |
705 | gint64 div_buf_remainder, div_buf_s, div_buf_ns; |
706 | struct timespec *ret; |
707 | |
708 | div_buf_s = (us / 1000000); /* us / 10^6 = s */ |
709 | div_buf_remainder = (us % 1000000); /* fraction of second lost from prev. line */ |
710 | div_buf_ns = div_buf_remainder * 1000; /* us * 10^3 = ns */ |
711 | |
712 | seconds = (time_t) div_buf_s; /* porting note: most systems use 32 bit time, adjust accordingly */ |
713 | nanoseconds = (long) div_buf_ns; |
714 | |
715 | ret = (struct timespec *) calloc(1, sizeof(struct timespec)); |
716 | |
717 | ret->tv_sec = seconds; |
718 | ret->tv_nsec = nanoseconds; |
719 | |
720 | g_ptr_array_add(timedated_freeable, ret); |
721 | |
722 | return ret; |
1066bd36 |
723 | } |