+#include "timedated.h"
+
+#include "../../util.h"
+
+#define TZNAME_MAX PATH_MAX
+
+GPtrArray *timedated_freeable;
+Timedate1 *timedated_interf;
+
+GMainLoop *timedated_loop;
+
+guint bus_descriptor;
+gboolean dbus_interface_exported; /* reliable because of gdbus operational guarantees */
+
+const gchar *OS_LOCALTIME = "/etc/localtime"; /* current timezone file */
+const gchar *OS_TIMEZONE_PATH = "/usr/share/zoneinfo"; /* path to system timezone files */
+
+struct timezone_checksum_pair {
+
+ gchar *path;
+ gchar *sum;
+ gboolean posix;
+ gboolean right;
+};
+
+static struct timezone_checksum_pair tz_table[5000];
+
+/* --- begin method/property/dbus signal code --- */
+
+static gboolean
+on_handle_set_time(Timedate1 *td1_passed_interf,
+ GDBusMethodInvocation *invoc,
+ const gchar *greet,
+ gpointer data) {
+
+ GVariant *params;
+ gint64 proposed_time, cur_time;
+ const gchar *bus_name;
+ gboolean policykit_auth;
+ check_auth_result is_authed;
+ gboolean relative; /* relative if passed time_t is meant to be added to current time */
+ struct timespec *new_time;
+
+ params = g_dbus_method_invocation_get_parameters(invoc);
+ g_variant_get(params, "(xbb)", &proposed_time, &relative, &policykit_auth);
+ bus_name = g_dbus_method_invocation_get_sender(invoc);
+
+ is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-time", policykit_auth);
+
+ switch(is_authed) {
+
+ case AUTHORIZED_NATIVELY:
+ case AUTHORIZED_BY_PROMPT:
+ break;
+
+ case UNAUTHORIZED_NATIVELY:
+ case UNAUTHORIZED_FAILED_PROMPT:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set system time.");
+ return FALSE;
+
+ case ERROR_BADBUS:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
+ return FALSE;
+
+ case ERROR_BADACTION:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
+ return FALSE;
+
+ case ERROR_GENERIC:
+ default:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+ return FALSE;
+ }
+
+ if(!proposed_time) {
+
+ timedate1_complete_set_time(td1_passed_interf, invoc);
+ return TRUE;
+
+ } else if(relative) {
+
+ cur_time = g_get_real_time();
+
+ if(proposed_time < 0 && cur_time + proposed_time > cur_time) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+ return FALSE;
+
+ } else if(proposed_time > 0 && cur_time + proposed_time < cur_time) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+ return FALSE;
+ }
+
+ new_time = mktimespec(proposed_time);
+
+ if(!clock_settime(CLOCK_REALTIME, new_time)) {
+
+ timedate1_complete_set_time(td1_passed_interf, invoc);
+ return TRUE;
+
+ } else {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+ return FALSE;
+ }
+
+ } else if(proposed_time > 0) {
+
+
+ new_time = mktimespec(proposed_time);
+
+ if(!clock_settime(CLOCK_REALTIME, new_time)) {
+
+ timedate1_complete_set_time(td1_passed_interf, invoc);
+ return TRUE;
+
+ } else {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+ return FALSE;
+ }
+
+ } else {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+ return FALSE;
+ }
+}
+
+static gboolean
+on_handle_set_timezone(Timedate1 *td1_passed_interf,
+ GDBusMethodInvocation *invoc,
+ const gchar *greet,
+ gpointer data) {
+
+ GVariant *params;
+ gchar *proposed_tz;
+ const gchar *bus_name;
+ gboolean policykit_auth;
+ check_auth_result is_authed;
+
+ gchar *tz_target_path;
+ struct stat *statbuf;
+ extern int errno;
+
+ params = g_dbus_method_invocation_get_parameters(invoc);
+ g_variant_get(params, "(sb)", &proposed_tz, &policykit_auth);
+ bus_name = g_dbus_method_invocation_get_sender(invoc);
+
+ is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-timezone", policykit_auth);
+
+ switch(is_authed) {
+
+ case AUTHORIZED_NATIVELY:
+ case AUTHORIZED_BY_PROMPT:
+ break;
+
+ case UNAUTHORIZED_NATIVELY:
+ case UNAUTHORIZED_FAILED_PROMPT:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set timezone.");
+ return FALSE;
+
+ case ERROR_BADBUS:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
+ return FALSE;
+
+ case ERROR_BADACTION:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
+ return FALSE;
+
+ case ERROR_GENERIC:
+ default:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set timezone for unknown reasons.");
+ return FALSE;
+ }
+
+ statbuf = (struct stat*) calloc(1, sizeof(struct stat));
+ tz_target_path = (gchar *) calloc(1, TZNAME_MAX);
+
+ g_ptr_array_add(timedated_freeable, statbuf);
+ g_ptr_array_add(timedated_freeable, tz_target_path);
+
+ strlcat(tz_target_path, TZDIR, TZNAME_MAX);
+ strlcat(tz_target_path, "/", TZNAME_MAX);
+ strlcat(tz_target_path, proposed_tz, TZNAME_MAX);
+
+ if(strstr(tz_target_path, "../")) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Provided timezone is invalid.");
+ return FALSE;
+ }
+
+ if(!statbuf)
+ return FALSE;
+
+ if(lstat(tz_target_path, statbuf)) {
+
+ switch(errno) {
+
+ case ENOENT:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENOENT", "Specified timezone does not exist.");
+ break;
+
+ default:
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified timezone is invalid.");
+ break;
+ }
+
+ return FALSE;
+ }
+
+ if(!S_ISREG(statbuf->st_mode)) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified path is of an inappropriate type.");
+ return FALSE;
+ }
+
+ memset(statbuf, 0, sizeof statbuf);
+
+ if(!lstat(TZDEFAULT, statbuf))
+ if(remove(TZDEFAULT))
+ return FALSE;
+
+ if(symlink(tz_target_path, TZDEFAULT))
+ return FALSE;
+
+
+ timedate1_complete_set_timezone(td1_passed_interf, invoc);
+
+ return TRUE;
+}
+
+static gboolean
+on_handle_set_local_rtc(Timedate1 *td1_passed_interf,
+ GDBusMethodInvocation *invoc,
+ const gchar *greet,
+ gpointer data) {
+
+ g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENODEV", "Unix RTC must be in UTC.");
+ return TRUE;
+}
+
+static gboolean
+on_handle_set_ntp(Timedate1 *td1_passed_interf,
+ GDBusMethodInvocation *invoc,
+ const gchar *greet,
+ gpointer data) {
+ return FALSE;
+}
+
+const gchar *
+our_get_timezone() {
+
+ GStatBuf *stat_zoneinfo;
+ gchar *find_cmd, *readlink_path, *ret, *argvp, *hash_to_match;
+ gint argcp;
+ GError *err;
+ struct timezone_checksum_pair tmp;
+
+ find_cmd = (gchar *) g_malloc0(2048);
+ stat_zoneinfo = (GStatBuf *) g_malloc0(8192);
+ err = (GError *) g_malloc0(2048);
+
+ if(g_stat(OS_LOCALTIME, stat_zoneinfo)) {
+
+ g_printf("could not read from %s! please symlink or copy a timezone file from %s to %s!\n", OS_LOCALTIME, OS_TIMEZONE_PATH, OS_LOCALTIME);
+ ret = NULL;
+
+ } else if(g_file_test(OS_LOCALTIME, G_FILE_TEST_IS_SYMLINK)) {
+
+ readlink_path = g_file_read_link(OS_LOCALTIME, &err);
+
+ gchar *split[2] = { readlink_path, "" };
+ tmp = parse_timezone_path(split);
+
+ ret = tmp.path;
+
+ if(readlink_path)
+ g_free(readlink_path);
+
+ } else {
+
+ g_printf("%s is not a symlink! attempting to match checksums in %s...\n", OS_LOCALTIME, OS_TIMEZONE_PATH);
+ hash_to_match = get_file_sha256(OS_LOCALTIME);
+
+ /* ret = lookup_hash(hash_to_match); */
+ return FALSE; /* TODO fix me for real */
+
+ if(hash_to_match)
+ g_free(hash_to_match);
+ }
+
+
+
+ return ret;
+}
+
+/* Unix time must be in UTC. */
+gboolean
+our_get_local_rtc() {
+
+ gboolean ret = FALSE;
+
+ return ret;
+}
+
+gboolean
+our_get_can_ntp() {
+
+ const gboolean ret = FALSE;
+
+ return ret;
+}
+
+gboolean
+our_get_ntp() {
+
+ const gboolean ret = FALSE;
+
+ return ret;
+}
+
+gboolean
+our_get_ntpsynchronized() {
+
+ const gboolean ret = FALSE;
+
+ return ret;
+}
+
+guint64
+our_get_time_usec() {
+
+ guint64 ret = 0;
+
+ return ret;
+}
+
+guint64
+our_get_rtc_time_usec() {
+
+ guint64 ret = 0;
+
+ return ret;
+}
+
+/* --- end method/property/dbus signal code, begin bus/name handlers --- */
+
+static void timedated_on_bus_acquired(GDBusConnection *conn,
+ const gchar *name,
+ gpointer user_data) {
+
+ g_printf("got bus/name, exporting %s's interface...\n", name);
+
+ timedated_interf = timedate1_skeleton_new();
+
+ /* attach function pointers to generated struct's method handlers */
+ g_signal_connect(timedated_interf, "handle-set-time", G_CALLBACK(on_handle_set_time), NULL);
+ g_signal_connect(timedated_interf, "handle-set-timezone", G_CALLBACK(on_handle_set_timezone), NULL);
+ g_signal_connect(timedated_interf, "handle-set-local-rtc", G_CALLBACK(on_handle_set_local_rtc), NULL);
+ g_signal_connect(timedated_interf, "handle-set-ntp", G_CALLBACK(on_handle_set_ntp), NULL);
+
+ /* set our properties before export */
+ timedate1_set_timezone(timedated_interf, our_get_timezone());
+ timedate1_set_local_rtc(timedated_interf, our_get_local_rtc());
+ timedate1_set_can_ntp(timedated_interf, our_get_can_ntp());
+ timedate1_set_ntp(timedated_interf, our_get_ntp());
+ timedate1_set_ntpsynchronized(timedated_interf, our_get_ntpsynchronized());
+ timedate1_set_time_usec(timedated_interf, our_get_time_usec());
+ timedate1_set_rtctime_usec(timedated_interf, our_get_rtc_time_usec());
+
+ if(!g_dbus_interface_skeleton_export(G_DBUS_INTERFACE_SKELETON(timedated_interf),
+ conn,
+ "/org/freedesktop/timedate1",
+ NULL)) {
+
+ g_printf("failed to export %s's interface!\n", name);
+ timedated_mem_clean();
+
+ } else {
+
+ dbus_interface_exported = TRUE;
+ g_printf("exported %s's interface on the system bus...\n", name);
+ }
+}
+
+static void timedated_on_name_acquired(GDBusConnection *conn,
+ const gchar *name,
+ gpointer user_data) {
+
+ g_printf("success!\n");
+}
+
+static void timedated_on_name_lost(GDBusConnection *conn,
+ const gchar *name,
+ gpointer user_data) {
+
+ if(!conn) {
+
+ g_printf("failed to connect to the system bus while trying to acquire name '%s': either dbus-daemon isn't running or we don't have permission to push names and/or their interfaces to it.\n", name);
+ timedated_mem_clean();
+ }
+
+ g_print("lost name %s, exiting...\n", name);
+
+ timedated_mem_clean();
+}
+
+/* --- end bus/name handlers, begin misc unix functions --- */
+
+/* safe call to clean and then exit
+ * this stops our GMainLoop safely before letting main() return */
+void timedated_mem_clean() {
+
+ g_printf("exiting...\n");
+
+ if(dbus_interface_exported)
+ g_dbus_interface_skeleton_unexport(G_DBUS_INTERFACE_SKELETON(timedated_interf));
+
+ if(g_main_loop_is_running(timedated_loop))
+ g_main_loop_quit(timedated_loop);
+
+}
+
+/* wrapper for glib's unix signal handling; called only once if terminating signal is raised against us */
+gboolean unix_sig_terminate_handler(gpointer data) {
+
+ g_printf("caught SIGINT/HUP/TERM, exiting\n");
+
+ timedated_mem_clean();
+ return G_SOURCE_REMOVE;
+}
+
+void set_signal_handlers() {
+
+ /* we don't care about its descriptor, we never need to unregister these */
+ g_unix_signal_add(SIGINT, unix_sig_terminate_handler, NULL);
+ g_unix_signal_add(SIGHUP, unix_sig_terminate_handler, NULL);
+ g_unix_signal_add(SIGTERM, unix_sig_terminate_handler, NULL);
+}