fixing merge conflicts
[systembsd.git] / src / config.c
1 /*
2 * Copyright (c) 2014 Ian Sutton <ian@kremlin.cc>
3 *
4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
16
17 #include <unistd.h>
18 #include <fcntl.h>
19 #include <gio/gio.h>
20
21 static GKeyFile *config;
22 static int config_descr;
23
24 static gchar *data_dir;
25
26 /*static int hostnamed_ispect_xml_descr, hostnamed_dbus_xml_descr;
27 static int localed_ispect_xml_descr, localed_dbus_xml_descr;
28 static int timedated_ispect_xml_descr, timedated_dbus_xml_descr;
29 static int logind_ispect_xml_descr, logind_dbus_xml_descr;
30
31 /*TODO depending on builtin xml flag, these should be matched to checksums */ /*
32 static gchar **hostnamed_ispect_xml, hostnamed_dbus_xml;
33 static gchar **localed_ispect_xml, localed_dbus_xml;
34 static gchar **timedated_ispect_xml, timedated_dbus_xml;
35 static gchar **logind_ispect_xml, logind_dbus_xml; */
36
37 static const gchar *CONFIG_KEYS[] = {
38 "PrettyHostname",
39 "IconName",
40 "ChassisType"
41 };
42
43 /* NULL if key doesn't exist */
44 gchar *get_option(gchar *key, gchar *group) {
45
46 if(!group)
47 group = "default";
48
49 return g_key_file_get_string(config, group, key, NULL);
50 }
51
52 /* false if key isn't already defined or value is invalid */
53 gboolean set_option(gchar *key, gchar *value, gchar *group) {
54
55 if(!group)
56 group = "default";
57
58 if(!g_key_file_get_string(config, group, key, NULL))
59 return FALSE;
60
61 //TODO safteycheck value
62 g_key_file_set_string(config, group, key, value);
63 return TRUE;
64 }
65
66 /* initial load/check */
67 gboolean config_init() {
68
69 if(config)
70 return TRUE; //already init'd
71
72 config = g_key_file_new();
73
74 const gchar *config_path;
75 GStatBuf *config_lstat;
76
77 config_path = "/etc/systemd_compat.conf";
78
79 /* does conf exist? */
80 if(g_lstat(config_path, config_lstat)) {
81
82 /* if not, can we write it */
83 if(g_access("/etc/", W_OK)) {
84 g_printf("%s\n", "no write permissions for /etc/! exiting..");
85 return FALSE;
86 }
87
88 int config_descr;
89 config_descr = g_open(config_path, O_CREAT, 644);
90
91 gchar *posix_hostname;
92 posix_hostname = g_malloc(HOST_NAME_MAX);
93
94 gethostname(posix_hostname, HOST_NAME_MAX);
95
96 g_key_file_set_string(config, "hostnamed", "Hostname", posix_hostname);
97 g_key_file_set_string(config, "hostnamed", "PrettyHostname", "");
98 g_key_file_set_string(config, "hostnamed", "IconName", "Computer");
99 g_key_file_set_string(config, "hostnamed", "ChassisType", "laptop"); //TODO set these correctly
100
101 if(!g_key_file_save_to_file(config, config_path, NULL)) {
102 g_printf("failed to write config to %s!\n", config_path);
103 g_free(posix_hostname);
104 return FALSE;
105 }
106
107 g_printf("wrote config to %s\n", config_path);
108
109 g_free(posix_hostname);
110
111 return TRUE;
112
113 /* it does exist, read it */
114 } else {
115
116 if(!g_access(config_path, W_OK)) {
117 g_printf("%s\n", "no write permissions for /etc/! exiting..");
118 return FALSE;
119 } else if(g_key_file_load_from_file(config, config_path, G_KEY_FILE_KEEP_COMMENTS, NULL))
120 return TRUE;
121
122 g_printf("could not read config at %s! exiting..", config_path);
123 return FALSE;
124 }
125
126 gboolean init_xml() {
127
128 const gchar * const *data_dir_prefix;
129
130 data_dir_prefix = g_get_system_data_dirs();
131 data_dir = g_strconcat(data_dir_prefix[0], "systemd_compat", NULL);
132
133 GStatBuf *xml_lstat;
134
135 /* does xml dir exist? */
136 if(g_lstat(data_dir, xml_lstat)) {
137
138 /* if not, can we write it? */
139 if(g_access(data_dir_prefix[0], W_OK)) {
140 g_printf("no write permissions for %s! exiting...\n", data_dir_prefix[0]);
141 return FALSE;
142 }
143
144 g_printf("creating xml data directory %s...\n", data_dir);
145 if(g_mkdir(data_dir, 644)) {
146 g_printf("failed to create dir %s...\n", data_dir);
147 return FALSE;
148 }
149
150 //set_xml_descriptors();
151 return TRUE; //kill me!
152 }
153 }
154 }
155 //LEFTOFF
156
157 /* gchar *posix_hostname;
158 posix_hostname = g_malloc(255);
159
160 gethostname(posix_hostname, 255);
161
162 g_key_file_set_string(config, "hostnamed", "Hostname", posix_hostname);
163 g_key_file_set_string(config, "hostnamed", "PrettyHostname", "");
164 g_key_file_set_string(config, "hostnamed", "IconName", "Computer");
165 g_key_file_set_string(config, "hostnamed", "ChassisType", "laptop"); //TODO set these correctly
166
167 if(!g_key_file_save_to_file(config, config_path, NULL)) {
168 g_printf("failed to write config to %s!\n", config_path);
169 g_free(posix_hostname);
170 return FALSE;
171 }
172
173 g_printf("wrote config to %s\n", config_path);
174
175 g_free(posix_hostname);
176
177 return TRUE;
178
179 /* it does exist, read it */ /*
180 } else {
181
182 if(!g_access(config_path, W_OK)) {
183 g_printf("%s\n", "no write permissions for /etc/! exiting..");
184 return FALSE;
185 } else if(g_key_file_load_from_file(config, config_path, G_KEY_FILE_KEEP_COMMENTS, NULL)) {
186 config_descr = g_open(config_path, O_RDWR, 644);
187 return TRUE;
188 }
189
190 g_printf("could not read config at %s! exiting..", config_path);
191 return FALSE;
192 }
193
194
195 return TRUE;
196 } */
197
198 /*static void set_xml_descriptors() {
199
200 }
201
202 void clean_config() {
203
204 //TODO g_ptr_array all of this
205 g_free(config);
206 g_free(data_dir);
207 g_close(config_descr, NULL);
208 }*/