X-Git-Url: https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=blobdiff_plain;f=src%2Finterfaces%2Ftimedated%2Ftimedated.c;h=cba6138bada05a77383bbb42ec5d34f626091e2b;hp=8f30d01310630482fd0386a3ddf3c6dc6134f0d1;hb=06407d3ed6ecd095261823d3c488d1947c9a19c3;hpb=c12c41f4eac2e4d7c3244af3c49735aeffd78e2d diff --git a/src/interfaces/timedated/timedated.c b/src/interfaces/timedated/timedated.c index 8f30d01..cba6138 100644 --- a/src/interfaces/timedated/timedated.c +++ b/src/interfaces/timedated/timedated.c @@ -18,15 +18,26 @@ #include #include -#include +#include +#include +#include +#include +#include #include +#include #include #include +#include +#include #include "timedated-gen.h" #include "timedated.h" +#include "../../util.h" + +#define TZNAME_MAX PATH_MAX + GPtrArray *timedated_freeable; Timedate1 *timedated_interf; @@ -35,95 +46,445 @@ GMainLoop *timedated_loop; guint bus_descriptor; gboolean dbus_interface_exported; /* reliable because of gdbus operational guarantees */ +const gchar *OS_LOCALTIME = "/etc/localtime"; /* current timezone file */ +const gchar *OS_TIMEZONE_PATH = "/usr/share/zoneinfo"; /* path to system timezone files */ + +struct timezone_checksum_pair { + + gchar *path; + gchar *sum; + gboolean posix; + gboolean right; +}; + +static struct timezone_checksum_pair tz_table[5000]; + /* --- begin method/property/dbus signal code --- */ -/*static gboolean -on_handle_set_hostname(Timedate1 *hn1_passed_interf, - GDBusMethodInvocation *invoc, - const gchar *greet, - gpointer data) { +static gboolean +on_handle_set_time(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { + + GVariant *params; + gint64 proposed_time, cur_time; + const gchar *bus_name; + gboolean policykit_auth; + check_auth_result is_authed; + gboolean relative; /* relative if passed time_t is meant to be added to current time */ + struct timespec *new_time; + + params = g_dbus_method_invocation_get_parameters(invoc); + g_variant_get(params, "(xbb)", &proposed_time, &relative, &policykit_auth); + bus_name = g_dbus_method_invocation_get_sender(invoc); + + is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-time", policykit_auth); + + switch(is_authed) { + + case AUTHORIZED_NATIVELY: + case AUTHORIZED_BY_PROMPT: + break; + + case UNAUTHORIZED_NATIVELY: + case UNAUTHORIZED_FAILED_PROMPT: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set system time."); + return FALSE; + + case ERROR_BADBUS: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid."); + return FALSE; + + case ERROR_BADACTION: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid."); + return FALSE; + + case ERROR_GENERIC: + default: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); + return FALSE; + } + + if(!proposed_time) { + + timedate1_complete_set_time(td1_passed_interf, invoc); + return TRUE; + + } else if(relative) { + + cur_time = g_get_real_time(); + + if(proposed_time < 0 && cur_time + proposed_time > cur_time) { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); + return FALSE; + + } else if(proposed_time > 0 && cur_time + proposed_time < cur_time) { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); + return FALSE; + } + + new_time = mktimespec(proposed_time); + + if(!clock_settime(CLOCK_REALTIME, new_time)) { + + timedate1_complete_set_time(td1_passed_interf, invoc); + return TRUE; + + } else { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); + return FALSE; + } + + } else if(proposed_time > 0) { + + + new_time = mktimespec(proposed_time); + + if(!clock_settime(CLOCK_REALTIME, new_time)) { + + timedate1_complete_set_time(td1_passed_interf, invoc); + return TRUE; + + } else { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); + return FALSE; + } + + } else { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); + return FALSE; + } +} + +static gboolean +on_handle_set_timezone(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { + + GVariant *params; + gchar *proposed_tz; + const gchar *bus_name; + gboolean policykit_auth; + check_auth_result is_authed; + + gchar *tz_target_path; + struct stat *statbuf; + extern int errno; + + params = g_dbus_method_invocation_get_parameters(invoc); + g_variant_get(params, "(sb)", &proposed_tz, &policykit_auth); + bus_name = g_dbus_method_invocation_get_sender(invoc); + + is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-timezone", policykit_auth); + + switch(is_authed) { + + case AUTHORIZED_NATIVELY: + case AUTHORIZED_BY_PROMPT: + break; + + case UNAUTHORIZED_NATIVELY: + case UNAUTHORIZED_FAILED_PROMPT: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set timezone."); + return FALSE; + + case ERROR_BADBUS: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid."); + return FALSE; + + case ERROR_BADACTION: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid."); + return FALSE; + + case ERROR_GENERIC: + default: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set timezone for unknown reasons."); + return FALSE; + } + + statbuf = (struct stat*) calloc(1, sizeof(struct stat)); + tz_target_path = (gchar *) calloc(1, TZNAME_MAX); + + g_ptr_array_add(timedated_freeable, statbuf); + g_ptr_array_add(timedated_freeable, tz_target_path); + + strlcat(tz_target_path, TZDIR, TZNAME_MAX); + strlcat(tz_target_path, "/", TZNAME_MAX); + strlcat(tz_target_path, proposed_tz, TZNAME_MAX); + + if(strstr(tz_target_path, "../")) { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Provided timezone is invalid."); + return FALSE; + } + + if(!statbuf) + return FALSE; + + if(lstat(tz_target_path, statbuf)) { + + switch(errno) { + + case ENOENT: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENOENT", "Specified timezone does not exist."); + break; + + default: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified timezone is invalid."); + break; + } + + return FALSE; + } + + if(!S_ISREG(statbuf->st_mode)) { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EBADF", "Specified path is of an inappropriate type."); + return FALSE; + } + + memset(statbuf, 0, sizeof statbuf); + + if(!lstat(TZDEFAULT, statbuf)) + if(remove(TZDEFAULT)) + return FALSE; + + if(symlink(tz_target_path, TZDEFAULT)) + return FALSE; + + + timedate1_complete_set_timezone(td1_passed_interf, invoc); + + return TRUE; +} + +static gboolean +on_handle_set_local_rtc(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ENODEV", "Unix RTC must be in UTC."); + return TRUE; +} + +static gboolean +on_handle_set_ntp(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { return FALSE; -}*/ +} -/*const gchar * -our_get_hostname() { +const gchar * +our_get_timezone() { - gchar *hostname_buf, *ret; - size_t hostname_divider; + GStatBuf *stat_zoneinfo; + gchar *find_cmd, *readlink_path, *ret, *argvp, *hash_to_match; + gint argcp; + GError *err; + struct timezone_checksum_pair tmp; - hostname_buf = (gchar*) g_malloc0(MAXHOSTNAMELEN); - ret = (gchar*) g_malloc0(MAXHOSTNAMELEN); - g_ptr_array_add(timedated_freeable, hostname_buf); - g_ptr_array_add(timedated_freeable, ret); + find_cmd = (gchar *) g_malloc0(2048); + stat_zoneinfo = (GStatBuf *) g_malloc0(8192); + err = (GError *) g_malloc0(2048); - if(gethostname(hostname_buf, MAXHOSTNAMELEN)) - return ""; + if(g_stat(OS_LOCALTIME, stat_zoneinfo)) { - hostname_divider = strcspn(hostname_buf, "."); + g_printf("could not read from %s! please symlink or copy a timezone file from %s to %s!\n", OS_LOCALTIME, OS_TIMEZONE_PATH, OS_LOCALTIME); + ret = NULL; - return strncpy(ret, hostname_buf, hostname_divider); -}*/ + } else if(g_file_test(OS_LOCALTIME, G_FILE_TEST_IS_SYMLINK)) { -/* --- end method/property/dbus signal code, begin bus/name handlers --- */ + readlink_path = g_file_read_link(OS_LOCALTIME, &err); -static void timedated_on_bus_acquired(GDBusConnection *conn, - const gchar *name, - gpointer user_data) { + gchar *split[2] = { readlink_path, "" }; + tmp = parse_timezone_path(split); + + ret = tmp.path; + + if(readlink_path) + g_free(readlink_path); + + } else { + + g_printf("%s is not a symlink! attempting to match checksums in %s...\n", OS_LOCALTIME, OS_TIMEZONE_PATH); + hash_to_match = get_file_sha256(OS_LOCALTIME); + + /* ret = lookup_hash(hash_to_match); */ + return FALSE; /* TODO fix me for real */ + + if(hash_to_match) + g_free(hash_to_match); + } - g_print("got bus, name: %s\n", name); + + return ret; } -static void timedated_on_name_acquired(GDBusConnection *conn, - const gchar *name, - gpointer user_data) { +/* Unix time must be in UTC. */ +gboolean +our_get_local_rtc() { - g_print("got '%s' on system bus\n", name); + gboolean ret = FALSE; - timedated_interf = timedate1_skeleton_new(); + return ret; +} - /* attach function pointers to generated struct's method handlers - g_signal_connect(timedated_interf, "handle-set-hostname", G_CALLBACK(on_handle_set_hostname), NULL);*/ +gboolean +our_get_can_ntp() { + + const gboolean ret = FALSE; - /* set our properties before export - timedate1_set_hostname(timedated_interf, our_get_hostname()); */ + return ret; +} + +gboolean +our_get_ntp() { + const gboolean ret = FALSE; + + return ret; +} + +gboolean +our_get_ntpsynchronized() { + + const gboolean ret = FALSE; + + return ret; +} + +guint64 +our_get_time_usec() { + + guint64 ret = 0; + + return ret; +} + +guint64 +our_get_rtc_time_usec() { + + guint64 ret = 0; + + return ret; +} + +/* --- end method/property/dbus signal code, begin bus/name handlers --- */ + +static void timedated_on_bus_acquired(GDBusConnection *conn, + const gchar *name, + gpointer user_data) { + + g_printf("got bus/name, exporting %s's interface...\n", name); + + timedated_interf = timedate1_skeleton_new(); + + /* attach function pointers to generated struct's method handlers */ + g_signal_connect(timedated_interf, "handle-set-time", G_CALLBACK(on_handle_set_time), NULL); + g_signal_connect(timedated_interf, "handle-set-timezone", G_CALLBACK(on_handle_set_timezone), NULL); + g_signal_connect(timedated_interf, "handle-set-local-rtc", G_CALLBACK(on_handle_set_local_rtc), NULL); + g_signal_connect(timedated_interf, "handle-set-ntp", G_CALLBACK(on_handle_set_ntp), NULL); + + /* set our properties before export */ + timedate1_set_timezone(timedated_interf, our_get_timezone()); + timedate1_set_local_rtc(timedated_interf, our_get_local_rtc()); + timedate1_set_can_ntp(timedated_interf, our_get_can_ntp()); + timedate1_set_ntp(timedated_interf, our_get_ntp()); + timedate1_set_ntpsynchronized(timedated_interf, our_get_ntpsynchronized()); + timedate1_set_time_usec(timedated_interf, our_get_time_usec()); + timedate1_set_rtctime_usec(timedated_interf, our_get_rtc_time_usec()); + if(!g_dbus_interface_skeleton_export(G_DBUS_INTERFACE_SKELETON(timedated_interf), conn, "/org/freedesktop/timedate1", NULL)) { - g_printf("Failed to export Timedate1's interface!"); + g_printf("failed to export %s's interface!\n", name); + timedated_mem_clean(); + + } else { + + dbus_interface_exported = TRUE; + g_printf("exported %s's interface on the system bus...\n", name); } +} + +static void timedated_on_name_acquired(GDBusConnection *conn, + const gchar *name, + gpointer user_data) { + g_printf("success!\n"); } static void timedated_on_name_lost(GDBusConnection *conn, const gchar *name, gpointer user_data) { - g_print("lost name %s, exiting...", name); + if(!conn) { - timedated_mem_clean(); - g_dbus_interface_skeleton_unexport(G_DBUS_INTERFACE_SKELETON(timedated_interf)); + g_printf("failed to connect to the system bus while trying to acquire name '%s': either dbus-daemon isn't running or we don't have permission to push names and/or their interfaces to it.\n", name); + timedated_mem_clean(); + } + g_print("lost name %s, exiting...\n", name); + + timedated_mem_clean(); } /* --- end bus/name handlers, begin misc unix functions --- */ -/* free()'s */ +/* safe call to clean and then exit + * this stops our GMainLoop safely before letting main() return */ void timedated_mem_clean() { - g_ptr_array_foreach(timedated_freeable, (GFunc) g_free, NULL); - g_ptr_array_free(timedated_freeable, TRUE); + g_printf("exiting...\n"); + + if(dbus_interface_exported) + g_dbus_interface_skeleton_unexport(G_DBUS_INTERFACE_SKELETON(timedated_interf)); + + if(g_main_loop_is_running(timedated_loop)) + g_main_loop_quit(timedated_loop); + +} + +/* wrapper for glib's unix signal handling; called only once if terminating signal is raised against us */ +gboolean unix_sig_terminate_handler(gpointer data) { + + g_printf("caught SIGINT/HUP/TERM, exiting\n"); + + timedated_mem_clean(); + return G_SOURCE_REMOVE; +} + +void set_signal_handlers() { + + /* we don't care about its descriptor, we never need to unregister these */ + g_unix_signal_add(SIGINT, unix_sig_terminate_handler, NULL); + g_unix_signal_add(SIGHUP, unix_sig_terminate_handler, NULL); + g_unix_signal_add(SIGTERM, unix_sig_terminate_handler, NULL); } int main() { - timedated_loop = g_main_loop_new(NULL, TRUE); - timedated_freeable = g_ptr_array_new(); + set_signal_handlers(); + + /*if(!build_lookup_table()) + return 1; */ - bus_descriptor = g_bus_own_name(G_BUS_TYPE_SYSTEM, + timedated_loop = g_main_loop_new(NULL, TRUE); + timedated_freeable = g_ptr_array_new(); + + bus_descriptor = g_bus_own_name(G_BUS_TYPE_SYSTEM, "org.freedesktop.timedate1", G_BUS_NAME_OWNER_FLAGS_NONE, timedated_on_bus_acquired, @@ -132,12 +493,143 @@ int main() { NULL, NULL); - g_main_loop_run(timedated_loop); - g_main_loop_unref(timedated_loop); + g_main_loop_run(timedated_loop); + /* runs until single g_main_loop_quit() call is raised inside _mem_clean() */ + g_main_loop_unref(timedated_loop); + + /* guaranteed unownable */ + g_bus_unown_name(bus_descriptor); + + /* at this point no operations can occur with our data, it is safe to free it + its container */ + g_ptr_array_free(timedated_freeable, TRUE); + + return 0; +} + +static struct timezone_checksum_pair parse_timezone_path(gchar **pair) { + + gchar *prefix_pattern, *right_prefix_pattern, *posix_prefix_pattern, *lean_path; + GRegex *prefix, *posix, *right; + GError *err = NULL; + struct timezone_checksum_pair ret = { NULL, NULL, FALSE, FALSE }; + + if(!pair[0]) + return ret; + + prefix_pattern = (gchar *) g_malloc0(4096); + right_prefix_pattern = (gchar *) g_malloc0(4096); + posix_prefix_pattern = (gchar *) g_malloc0(4096); + + g_sprintf(prefix_pattern, "%s/", OS_TIMEZONE_PATH); + g_sprintf(posix_prefix_pattern, "%s/posix/", OS_TIMEZONE_PATH); + g_sprintf(right_prefix_pattern, "%s/right/", OS_TIMEZONE_PATH); + + prefix = g_regex_new(prefix_pattern, 0, 0, &err); + posix = g_regex_new(posix_prefix_pattern, 0, 0, &err); + right = g_regex_new(right_prefix_pattern, 0, 0, &err); + + if(g_regex_match_full(posix, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) { + + ret.posix = TRUE; + lean_path = g_regex_replace_literal(posix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); + + } else if(g_regex_match_full(right, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) { + + ret.right = TRUE; + lean_path = g_regex_replace_literal(right, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); + + } else + lean_path = g_regex_replace_literal(prefix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); + + ret.path = lean_path; + + ret.sum = g_malloc0(256); + g_strlcpy(ret.sum, pair[1], 66); + + g_regex_unref(prefix); + g_regex_unref(right); + g_regex_unref(posix); + + return ret; +} + +/* TODO need to deconstruct tz_table on exit +static gboolean build_lookup_table() { + + gchar *find_cmd, **map_pairs, *find_output, *path_buf, *sum_buf, **entry_buf; + GError *err; + gboolean ret; + gint i; + + i = 0; + err = NULL; + ret = TRUE; + + find_cmd = (gchar *) g_malloc0(4096); + find_output = (gchar *) g_malloc0(1000000); + + g_sprintf(find_cmd, "/bin/sh -c \"find %s -type f -exec cksum -a sha256 {} \\; | sed -E 's/SHA256 \\(//g' | sed -E 's/\\) = /=/g'\"", OS_TIMEZONE_PATH); + + if(!g_spawn_command_line_sync(find_cmd, &find_output, NULL, NULL, &err)) { + + g_printf("error running `%s`\n", find_cmd); + ret = FALSE; + } + + map_pairs = g_strsplit(find_output, "\n", INT_MAX); + + while(map_pairs[i] && (entry_buf = g_strsplit(map_pairs[i], "=", INT_MAX))) { + + tz_table[i] = parse_timezone_path(entry_buf); + + g_strfreev(entry_buf); + i++; + } + + g_free(find_output); + g_free(find_cmd); + g_free(map_pairs); + + return ret; +} + +static gchar *lookup_hash(gchar *hash) { + + gint i = 0; + + while(tz_table[i].sum) + if(!g_strcmp0(tz_table[i].sum, hash)) + return tz_table[i].path; + else + i++; + + return NULL; +}*/ + +/* takes number of microseconds since epoch and returns a + * ptr to a timespec suitable to be passed to clock_settime(3) + */ +static struct timespec* mktimespec(gint64 us) { + + long nanoseconds; + time_t seconds; + + gint64 div_buf_remainder, div_buf_s, div_buf_ns; + struct timespec *ret; + + div_buf_s = (us / 1000000); /* us / 10^6 = s */ + div_buf_remainder = (us % 1000000); /* fraction of second lost from prev. line */ + div_buf_ns = div_buf_remainder * 1000; /* us * 10^3 = ns */ + + seconds = (time_t) div_buf_s; /* porting note: most systems use 32 bit time, adjust accordingly */ + nanoseconds = (long) div_buf_ns; + + ret = (struct timespec *) calloc(1, sizeof(struct timespec)); - g_bus_unown_name(bus_descriptor); + ret->tv_sec = seconds; + ret->tv_nsec = nanoseconds; - timedated_mem_clean(); + g_ptr_array_add(timedated_freeable, ret); - return 0; + return ret; }