fixed logic/math bugs in set-time, still broken with GNOME tools
[systembsd.git] / src / interfaces / timedated / timedated.c
index cf9b3f9a97db1cb4114d3eefdc18af3a3267f355..d5da851d59a05f9f495b02d6685f9a75f8569614 100644 (file)
  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  */
 
+#include <unistd.h>
+#include <limits.h>
+#include <signal.h>
+
+#include <sys/types.h>
+#include <sys/time.h>
+#include <time.h>
+#include <string.h>
+
+#include <glib/gprintf.h>
+#include <glib-unix.h>
+#include <glib/gstdio.h>
+#include <polkit/polkit.h>
+
+#include "timedated-gen.h"
+#include "timedated.h"
+
+#include "../../util.h"
+
+GPtrArray *timedated_freeable;
+Timedate1 *timedated_interf;
+
+GMainLoop *timedated_loop;
+
+guint bus_descriptor;
+gboolean dbus_interface_exported; /* reliable because of gdbus operational guarantees */
+
+const gchar *OS_LOCALTIME       = "/etc/localtime";      /* current timezone file */
+const gchar *OS_TIMEZONE_PATH   = "/usr/share/zoneinfo"; /* path to system timezone files */
+
+struct timezone_checksum_pair {
+
+    gchar *path;
+    gchar *sum;
+    gboolean posix;
+    gboolean right;
+};
+
+static struct timezone_checksum_pair tz_table[5000];
+
+/* --- begin method/property/dbus signal code --- */
+
+static gboolean
+on_handle_set_time(Timedate1 *td1_passed_interf,
+                   GDBusMethodInvocation *invoc,
+                   const gchar *greet,
+                   gpointer data) {
+
+    GVariant *params;
+    gint64 proposed_time, cur_time;
+    const gchar *bus_name;
+    gboolean policykit_auth;
+    check_auth_result is_authed;
+    gboolean relative; /* relative if passed time_t is meant to be added to current time */
+    struct timespec new_time;
+
+    params = g_dbus_method_invocation_get_parameters(invoc);
+    g_variant_get(params, "(xbb)", &proposed_time, &relative, &policykit_auth);
+    bus_name = g_dbus_method_invocation_get_sender(invoc);
+
+    is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-time", policykit_auth);
+
+    switch(is_authed) {
+
+        case AUTHORIZED_NATIVELY:
+        case AUTHORIZED_BY_PROMPT:
+            break;
+
+        case UNAUTHORIZED_NATIVELY:
+        case UNAUTHORIZED_FAILED_PROMPT:
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set system time.");
+            return FALSE;
+
+        case ERROR_BADBUS:
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid.");
+            return FALSE;
+
+        case ERROR_BADACTION:
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid.");
+            return FALSE;
+
+        case ERROR_GENERIC:
+        default:
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+            return FALSE;
+    }
+
+    if(!proposed_time) {
+        
+        timedate1_complete_set_time(td1_passed_interf, invoc);
+        return TRUE;
+
+    } else if(relative) {
+
+        cur_time = g_get_real_time();
+
+        if(proposed_time < 0 && cur_time + proposed_time > cur_time) {
+
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+            return FALSE;
+
+        } else if(proposed_time > 0 && cur_time + proposed_time < cur_time) {
+
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+            return FALSE;
+        }
+
+        new_time.tv_sec  = (cur_time + proposed_time) / 1000000;
+        new_time.tv_nsec = CLAMP((((cur_time + proposed_time) % 1000000) * 1000), 0, 1000000000);
+
+        if(!clock_settime(CLOCK_REALTIME, &new_time)) {
+
+            timedate1_complete_set_time(td1_passed_interf, invoc);
+            return TRUE;
+
+        } else {
+
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+            return FALSE;
+        }
+
+    } else if(proposed_time > 0) {
+
+        new_time.tv_sec  = (cur_time + proposed_time) / 1000000;
+        new_time.tv_nsec = CLAMP((((cur_time + proposed_time) % 1000000) * 1000), 0, 1000000000);
+
+        if(!clock_settime(CLOCK_REALTIME, &new_time)) {
+
+            timedate1_complete_set_time(td1_passed_interf, invoc);
+            return TRUE;
+
+        } else {
+
+            g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons.");
+            return FALSE;
+        }
+
+    } else {
+
+        g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds.");
+        return FALSE;
+    }
+}
+
+static gboolean
+on_handle_set_timezone(Timedate1 *td1_passed_interf,
+                   GDBusMethodInvocation *invoc,
+                   const gchar *greet,
+                   gpointer data) {
+    return FALSE;
+}
+
+static gboolean
+on_handle_set_local_rtc(Timedate1 *td1_passed_interf,
+                        GDBusMethodInvocation *invoc,
+                        const gchar *greet,
+                        gpointer data) {
+    return FALSE;
+}
+
+static gboolean
+on_handle_set_ntp(Timedate1 *td1_passed_interf,
+                  GDBusMethodInvocation *invoc,
+                  const gchar *greet,
+                  gpointer data) {
+    return FALSE;
+}
+
+const gchar *
+our_get_timezone() {
+
+    GStatBuf *stat_zoneinfo;
+    gchar *find_cmd, *readlink_path, *ret, *argvp, *hash_to_match;
+    gint argcp;
+    GError *err;
+    struct timezone_checksum_pair tmp;
+
+    find_cmd      = (gchar *)    g_malloc0(2048);
+    stat_zoneinfo = (GStatBuf *) g_malloc0(8192);
+    err           = (GError *)   g_malloc0(2048);
+
+    if(g_stat(OS_LOCALTIME, stat_zoneinfo)) {
+
+        g_printf("could not read from %s! please symlink or copy a timezone file from %s to %s!\n", OS_LOCALTIME, OS_TIMEZONE_PATH, OS_LOCALTIME);
+        ret = NULL;
+
+    } else if(g_file_test(OS_LOCALTIME, G_FILE_TEST_IS_SYMLINK)) {
+
+        readlink_path = g_file_read_link(OS_LOCALTIME, &err);
+
+        gchar *split[2] = { readlink_path, "" };
+        tmp = parse_timezone_path(split);
+
+        ret = tmp.path;
+
+        if(readlink_path)
+            g_free(readlink_path);
+
+    } else {
+
+        g_printf("%s is not a symlink! attempting to match checksums in %s...\n", OS_LOCALTIME, OS_TIMEZONE_PATH);
+        hash_to_match = get_file_sha256(OS_LOCALTIME);
+
+        ret = lookup_hash(hash_to_match);
+
+        if(hash_to_match)
+            g_free(hash_to_match);
+    }
+
+    return ret;
+}
+
+gboolean
+our_get_local_rtc() { 
+
+    gboolean ret = FALSE;
+
+    return ret;
+}
+
+gboolean
+our_get_can_ntp() {
+    const gboolean ret = FALSE;
+
+    return ret;
+}
+
+gboolean
+our_get_ntp() {
+    const gboolean ret = FALSE;
+
+    return ret;
+}
+
+gboolean
+our_get_ntpsynchronized() {
+    const gboolean ret = FALSE;
+
+    return ret;
+}
+
+guint64
+our_get_time_usec() {
+
+    guint64 ret = 0;
+
+    return ret;
+}
+
+guint64
+our_get_rtc_time_usec() {
+
+    guint64 ret = 0;
+
+    return ret;
+}
+
+/* --- end method/property/dbus signal code, begin bus/name handlers --- */
+
+static void timedated_on_bus_acquired(GDBusConnection *conn,
+                                      const gchar *name,
+                                      gpointer user_data) {
+
+    g_printf("got bus/name, exporting %s's interface...\n", name);
+
+    timedated_interf = timedate1_skeleton_new();
+
+    /* attach function pointers to generated struct's method handlers */
+    g_signal_connect(timedated_interf, "handle-set-time",     G_CALLBACK(on_handle_set_time),     NULL);
+    g_signal_connect(timedated_interf, "handle-set-timezone", G_CALLBACK(on_handle_set_timezone), NULL);
+    g_signal_connect(timedated_interf, "handle-set-local-rtc", G_CALLBACK(on_handle_set_local_rtc), NULL);
+    g_signal_connect(timedated_interf, "handle-set-ntp",      G_CALLBACK(on_handle_set_ntp),      NULL);
+
+    /* set our properties before export */
+    timedate1_set_timezone(timedated_interf, our_get_timezone());
+    timedate1_set_local_rtc(timedated_interf, our_get_local_rtc());
+    timedate1_set_can_ntp(timedated_interf, our_get_can_ntp());
+    timedate1_set_ntp(timedated_interf, our_get_ntp());
+    timedate1_set_ntpsynchronized(timedated_interf, our_get_ntpsynchronized());
+    timedate1_set_time_usec(timedated_interf, our_get_time_usec());
+    timedate1_set_rtctime_usec(timedated_interf, our_get_rtc_time_usec());
+    
+    if(!g_dbus_interface_skeleton_export(G_DBUS_INTERFACE_SKELETON(timedated_interf),
+                                         conn,
+                                         "/org/freedesktop/timedate1",
+                                         NULL)) {
+
+        g_printf("failed to export %s's interface!\n", name);
+        timedated_mem_clean();
+
+    } else {
+
+        dbus_interface_exported = TRUE;
+        g_printf("exported %s's interface on the system bus...\n", name);
+    }
+}
+
+static void timedated_on_name_acquired(GDBusConnection *conn,
+                                       const gchar *name,
+                                       gpointer user_data) {
+
+   g_printf("success!\n"); 
+}
+
+static void timedated_on_name_lost(GDBusConnection *conn,
+                                   const gchar *name,
+                                   gpointer user_data) {
+
+    if(!conn) {
+
+        g_printf("failed to connect to the system bus while trying to acquire name '%s': either dbus-daemon isn't running or we don't have permission to push names and/or their interfaces to it.\n", name);
+        timedated_mem_clean();
+    }
+
+    g_print("lost name %s, exiting...\n", name);
+
+    timedated_mem_clean();
+}
+
+/* --- end bus/name handlers, begin misc unix functions --- */
+
+/* safe call to clean and then exit
+ * this stops our GMainLoop safely before letting main() return */
+void timedated_mem_clean() {
+
+    g_printf("exiting...\n");
+
+    if(dbus_interface_exported)
+        g_dbus_interface_skeleton_unexport(G_DBUS_INTERFACE_SKELETON(timedated_interf));
+
+     if(g_main_loop_is_running(timedated_loop))
+        g_main_loop_quit(timedated_loop);
+
+}
+
+/* wrapper for glib's unix signal handling; called only once if terminating signal is raised against us */
+gboolean unix_sig_terminate_handler(gpointer data) {
+
+    g_printf("caught SIGINT/HUP/TERM, exiting\n");
+
+    timedated_mem_clean();
+    return G_SOURCE_REMOVE;
+}
+
+void set_signal_handlers() {
+
+    /* we don't care about its descriptor, we never need to unregister these */
+    g_unix_signal_add(SIGINT,  unix_sig_terminate_handler, NULL);
+    g_unix_signal_add(SIGHUP,  unix_sig_terminate_handler, NULL);
+    g_unix_signal_add(SIGTERM, unix_sig_terminate_handler, NULL);
+}
+
+int main() {
+
+    set_signal_handlers();
+
+    if(!build_lookup_table())
+        return 1;
+
+    timedated_loop = g_main_loop_new(NULL, TRUE);
+    timedated_freeable = g_ptr_array_new();
+
+     bus_descriptor = g_bus_own_name(G_BUS_TYPE_SYSTEM,
+                                    "org.freedesktop.timedate1",
+                                    G_BUS_NAME_OWNER_FLAGS_NONE,
+                                    timedated_on_bus_acquired,
+                                    timedated_on_name_acquired,
+                                    timedated_on_name_lost,
+                                    NULL,
+                                    NULL);
+
+    g_main_loop_run(timedated_loop);
+    /* runs until single g_main_loop_quit() call is raised inside <interface>_mem_clean() */
+    g_main_loop_unref(timedated_loop);
+
+    /* guaranteed unownable */
+    g_bus_unown_name(bus_descriptor);
+
+    /* at this point no operations can occur with our data, it is safe to free it + its container */
+    g_ptr_array_free(timedated_freeable, TRUE);
+
+    return 0;
+}
+
+static struct timezone_checksum_pair parse_timezone_path(gchar **pair) {
+
+    gchar *prefix_pattern, *right_prefix_pattern, *posix_prefix_pattern, *lean_path;
+    GRegex *prefix, *posix, *right;
+    GError *err = NULL;
+    struct timezone_checksum_pair ret = { NULL, NULL, FALSE, FALSE };
+
+    if(!pair[0])
+        return ret;
+
+    prefix_pattern = (gchar *) g_malloc0(4096);
+    right_prefix_pattern = (gchar *) g_malloc0(4096);
+    posix_prefix_pattern = (gchar *) g_malloc0(4096);
+
+    g_sprintf(prefix_pattern, "%s/", OS_TIMEZONE_PATH);
+    g_sprintf(posix_prefix_pattern, "%s/posix/", OS_TIMEZONE_PATH);
+    g_sprintf(right_prefix_pattern, "%s/right/", OS_TIMEZONE_PATH);
+
+    prefix = g_regex_new(prefix_pattern, 0, 0, &err);
+    posix  = g_regex_new(posix_prefix_pattern, 0, 0, &err);
+    right  = g_regex_new(right_prefix_pattern, 0, 0, &err);
+
+    if(g_regex_match_full(posix, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) {
+
+        ret.posix = TRUE;
+        lean_path = g_regex_replace_literal(posix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL);
+
+    } else if(g_regex_match_full(right, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) {
+       ret.right = TRUE;
+       lean_path = g_regex_replace_literal(right, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL);
+
+    } else
+        lean_path = g_regex_replace_literal(prefix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL);
+
+    ret.path = lean_path;
+
+    ret.sum = g_malloc0(256);
+    g_strlcpy(ret.sum, pair[1], 66);
+
+    g_regex_unref(prefix);
+    g_regex_unref(right);
+    g_regex_unref(posix);
+
+    return ret;
+}
+
+/* TODO need to deconstruct tz_table on exit */
+static gboolean build_lookup_table() {
+
+        gchar *find_cmd, **map_pairs, *find_output, *path_buf, *sum_buf, **entry_buf;
+        GError *err;
+        gboolean ret;
+        gint i;
+
+        i   = 0;
+        err = NULL;
+        ret = TRUE;
+
+        find_cmd    = (gchar *) g_malloc0(4096);
+        find_output = (gchar *) g_malloc0(1000000);
+
+        g_sprintf(find_cmd, "/bin/sh -c \"find %s -type f -exec cksum -a sha256 {} \\; | sed -E 's/SHA256 \\(//g' | sed -E 's/\\) = /=/g'\"", OS_TIMEZONE_PATH);
+
+        if(!g_spawn_command_line_sync(find_cmd, &find_output, NULL, NULL, &err)) {
+
+            g_printf("error running `%s`\n", find_cmd);
+            ret = FALSE;
+        }
+
+        map_pairs = g_strsplit(find_output, "\n", INT_MAX);
+
+        while(map_pairs[i] && (entry_buf = g_strsplit(map_pairs[i], "=", INT_MAX))) {
+
+            tz_table[i] = parse_timezone_path(entry_buf);
+
+            g_strfreev(entry_buf);
+            i++;
+        }
+
+        g_free(find_output);
+        g_free(find_cmd);
+        g_free(map_pairs);
+
+        return ret;
+}
+
+static gchar *lookup_hash(gchar *hash) {
+
+    gint i = 0;
+
+    while(tz_table[i].sum)
+        if(!g_strcmp0(tz_table[i].sum, hash))
+            return tz_table[i].path;
+        else
+            i++;
+
+    return NULL;
+}