X-Git-Url: https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=blobdiff_plain;f=src%2Finterfaces%2Ftimedated%2Ftimedated.c;h=d5da851d59a05f9f495b02d6685f9a75f8569614;hp=cf9b3f9a97db1cb4114d3eefdc18af3a3267f355;hb=10ddceeb98322259fc13e3022ceeafc2191bb89d;hpb=3b82e3c1701831a4cc48a42a992997610bdd6266 diff --git a/src/interfaces/timedated/timedated.c b/src/interfaces/timedated/timedated.c index cf9b3f9..d5da851 100644 --- a/src/interfaces/timedated/timedated.c +++ b/src/interfaces/timedated/timedated.c @@ -14,3 +14,489 @@ * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ +#include +#include +#include + +#include +#include +#include +#include + +#include +#include +#include +#include + +#include "timedated-gen.h" +#include "timedated.h" + +#include "../../util.h" + +GPtrArray *timedated_freeable; +Timedate1 *timedated_interf; + +GMainLoop *timedated_loop; + +guint bus_descriptor; +gboolean dbus_interface_exported; /* reliable because of gdbus operational guarantees */ + +const gchar *OS_LOCALTIME = "/etc/localtime"; /* current timezone file */ +const gchar *OS_TIMEZONE_PATH = "/usr/share/zoneinfo"; /* path to system timezone files */ + +struct timezone_checksum_pair { + + gchar *path; + gchar *sum; + gboolean posix; + gboolean right; +}; + +static struct timezone_checksum_pair tz_table[5000]; + +/* --- begin method/property/dbus signal code --- */ + +static gboolean +on_handle_set_time(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { + + GVariant *params; + gint64 proposed_time, cur_time; + const gchar *bus_name; + gboolean policykit_auth; + check_auth_result is_authed; + gboolean relative; /* relative if passed time_t is meant to be added to current time */ + struct timespec new_time; + + params = g_dbus_method_invocation_get_parameters(invoc); + g_variant_get(params, "(xbb)", &proposed_time, &relative, &policykit_auth); + bus_name = g_dbus_method_invocation_get_sender(invoc); + + is_authed = polkit_try_auth(bus_name, "org.freedesktop.timedate1.set-time", policykit_auth); + + switch(is_authed) { + + case AUTHORIZED_NATIVELY: + case AUTHORIZED_BY_PROMPT: + break; + + case UNAUTHORIZED_NATIVELY: + case UNAUTHORIZED_FAILED_PROMPT: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EACCES", "Insufficient permissions to set system time."); + return FALSE; + + case ERROR_BADBUS: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided bus name is invalid."); + return FALSE; + + case ERROR_BADACTION: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EFAULT", "Provided action ID is invalid."); + return FALSE; + + case ERROR_GENERIC: + default: + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); + return FALSE; + } + + if(!proposed_time) { + + timedate1_complete_set_time(td1_passed_interf, invoc); + return TRUE; + + } else if(relative) { + + cur_time = g_get_real_time(); + + if(proposed_time < 0 && cur_time + proposed_time > cur_time) { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); + return FALSE; + + } else if(proposed_time > 0 && cur_time + proposed_time < cur_time) { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); + return FALSE; + } + + new_time.tv_sec = (cur_time + proposed_time) / 1000000; + new_time.tv_nsec = CLAMP((((cur_time + proposed_time) % 1000000) * 1000), 0, 1000000000); + + if(!clock_settime(CLOCK_REALTIME, &new_time)) { + + timedate1_complete_set_time(td1_passed_interf, invoc); + return TRUE; + + } else { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); + return FALSE; + } + + } else if(proposed_time > 0) { + + new_time.tv_sec = (cur_time + proposed_time) / 1000000; + new_time.tv_nsec = CLAMP((((cur_time + proposed_time) % 1000000) * 1000), 0, 1000000000); + + if(!clock_settime(CLOCK_REALTIME, &new_time)) { + + timedate1_complete_set_time(td1_passed_interf, invoc); + return TRUE; + + } else { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.ECANCELED", "Failed to set system time for unknown reasons."); + return FALSE; + } + + } else { + + g_dbus_method_invocation_return_dbus_error(invoc, "org.freedesktop.timedate1.Error.EINVAL", "Resultant time out of bounds."); + return FALSE; + } +} + +static gboolean +on_handle_set_timezone(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { + return FALSE; +} + +static gboolean +on_handle_set_local_rtc(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { + return FALSE; +} + +static gboolean +on_handle_set_ntp(Timedate1 *td1_passed_interf, + GDBusMethodInvocation *invoc, + const gchar *greet, + gpointer data) { + return FALSE; +} + +const gchar * +our_get_timezone() { + + GStatBuf *stat_zoneinfo; + gchar *find_cmd, *readlink_path, *ret, *argvp, *hash_to_match; + gint argcp; + GError *err; + struct timezone_checksum_pair tmp; + + find_cmd = (gchar *) g_malloc0(2048); + stat_zoneinfo = (GStatBuf *) g_malloc0(8192); + err = (GError *) g_malloc0(2048); + + if(g_stat(OS_LOCALTIME, stat_zoneinfo)) { + + g_printf("could not read from %s! please symlink or copy a timezone file from %s to %s!\n", OS_LOCALTIME, OS_TIMEZONE_PATH, OS_LOCALTIME); + ret = NULL; + + } else if(g_file_test(OS_LOCALTIME, G_FILE_TEST_IS_SYMLINK)) { + + readlink_path = g_file_read_link(OS_LOCALTIME, &err); + + gchar *split[2] = { readlink_path, "" }; + tmp = parse_timezone_path(split); + + ret = tmp.path; + + if(readlink_path) + g_free(readlink_path); + + } else { + + g_printf("%s is not a symlink! attempting to match checksums in %s...\n", OS_LOCALTIME, OS_TIMEZONE_PATH); + hash_to_match = get_file_sha256(OS_LOCALTIME); + + ret = lookup_hash(hash_to_match); + + if(hash_to_match) + g_free(hash_to_match); + } + + return ret; +} + +gboolean +our_get_local_rtc() { + + gboolean ret = FALSE; + + return ret; +} + +gboolean +our_get_can_ntp() { + + const gboolean ret = FALSE; + + return ret; +} + +gboolean +our_get_ntp() { + + const gboolean ret = FALSE; + + return ret; +} + +gboolean +our_get_ntpsynchronized() { + + const gboolean ret = FALSE; + + return ret; +} + +guint64 +our_get_time_usec() { + + guint64 ret = 0; + + return ret; +} + +guint64 +our_get_rtc_time_usec() { + + guint64 ret = 0; + + return ret; +} + +/* --- end method/property/dbus signal code, begin bus/name handlers --- */ + +static void timedated_on_bus_acquired(GDBusConnection *conn, + const gchar *name, + gpointer user_data) { + + g_printf("got bus/name, exporting %s's interface...\n", name); + + timedated_interf = timedate1_skeleton_new(); + + /* attach function pointers to generated struct's method handlers */ + g_signal_connect(timedated_interf, "handle-set-time", G_CALLBACK(on_handle_set_time), NULL); + g_signal_connect(timedated_interf, "handle-set-timezone", G_CALLBACK(on_handle_set_timezone), NULL); + g_signal_connect(timedated_interf, "handle-set-local-rtc", G_CALLBACK(on_handle_set_local_rtc), NULL); + g_signal_connect(timedated_interf, "handle-set-ntp", G_CALLBACK(on_handle_set_ntp), NULL); + + /* set our properties before export */ + timedate1_set_timezone(timedated_interf, our_get_timezone()); + timedate1_set_local_rtc(timedated_interf, our_get_local_rtc()); + timedate1_set_can_ntp(timedated_interf, our_get_can_ntp()); + timedate1_set_ntp(timedated_interf, our_get_ntp()); + timedate1_set_ntpsynchronized(timedated_interf, our_get_ntpsynchronized()); + timedate1_set_time_usec(timedated_interf, our_get_time_usec()); + timedate1_set_rtctime_usec(timedated_interf, our_get_rtc_time_usec()); + + if(!g_dbus_interface_skeleton_export(G_DBUS_INTERFACE_SKELETON(timedated_interf), + conn, + "/org/freedesktop/timedate1", + NULL)) { + + g_printf("failed to export %s's interface!\n", name); + timedated_mem_clean(); + + } else { + + dbus_interface_exported = TRUE; + g_printf("exported %s's interface on the system bus...\n", name); + } +} + +static void timedated_on_name_acquired(GDBusConnection *conn, + const gchar *name, + gpointer user_data) { + + g_printf("success!\n"); +} + +static void timedated_on_name_lost(GDBusConnection *conn, + const gchar *name, + gpointer user_data) { + + if(!conn) { + + g_printf("failed to connect to the system bus while trying to acquire name '%s': either dbus-daemon isn't running or we don't have permission to push names and/or their interfaces to it.\n", name); + timedated_mem_clean(); + } + + g_print("lost name %s, exiting...\n", name); + + timedated_mem_clean(); +} + +/* --- end bus/name handlers, begin misc unix functions --- */ + +/* safe call to clean and then exit + * this stops our GMainLoop safely before letting main() return */ +void timedated_mem_clean() { + + g_printf("exiting...\n"); + + if(dbus_interface_exported) + g_dbus_interface_skeleton_unexport(G_DBUS_INTERFACE_SKELETON(timedated_interf)); + + if(g_main_loop_is_running(timedated_loop)) + g_main_loop_quit(timedated_loop); + +} + +/* wrapper for glib's unix signal handling; called only once if terminating signal is raised against us */ +gboolean unix_sig_terminate_handler(gpointer data) { + + g_printf("caught SIGINT/HUP/TERM, exiting\n"); + + timedated_mem_clean(); + return G_SOURCE_REMOVE; +} + +void set_signal_handlers() { + + /* we don't care about its descriptor, we never need to unregister these */ + g_unix_signal_add(SIGINT, unix_sig_terminate_handler, NULL); + g_unix_signal_add(SIGHUP, unix_sig_terminate_handler, NULL); + g_unix_signal_add(SIGTERM, unix_sig_terminate_handler, NULL); +} + +int main() { + + set_signal_handlers(); + + if(!build_lookup_table()) + return 1; + + timedated_loop = g_main_loop_new(NULL, TRUE); + timedated_freeable = g_ptr_array_new(); + + bus_descriptor = g_bus_own_name(G_BUS_TYPE_SYSTEM, + "org.freedesktop.timedate1", + G_BUS_NAME_OWNER_FLAGS_NONE, + timedated_on_bus_acquired, + timedated_on_name_acquired, + timedated_on_name_lost, + NULL, + NULL); + + g_main_loop_run(timedated_loop); + /* runs until single g_main_loop_quit() call is raised inside _mem_clean() */ + g_main_loop_unref(timedated_loop); + + /* guaranteed unownable */ + g_bus_unown_name(bus_descriptor); + + /* at this point no operations can occur with our data, it is safe to free it + its container */ + g_ptr_array_free(timedated_freeable, TRUE); + + return 0; +} + +static struct timezone_checksum_pair parse_timezone_path(gchar **pair) { + + gchar *prefix_pattern, *right_prefix_pattern, *posix_prefix_pattern, *lean_path; + GRegex *prefix, *posix, *right; + GError *err = NULL; + struct timezone_checksum_pair ret = { NULL, NULL, FALSE, FALSE }; + + if(!pair[0]) + return ret; + + prefix_pattern = (gchar *) g_malloc0(4096); + right_prefix_pattern = (gchar *) g_malloc0(4096); + posix_prefix_pattern = (gchar *) g_malloc0(4096); + + g_sprintf(prefix_pattern, "%s/", OS_TIMEZONE_PATH); + g_sprintf(posix_prefix_pattern, "%s/posix/", OS_TIMEZONE_PATH); + g_sprintf(right_prefix_pattern, "%s/right/", OS_TIMEZONE_PATH); + + prefix = g_regex_new(prefix_pattern, 0, 0, &err); + posix = g_regex_new(posix_prefix_pattern, 0, 0, &err); + right = g_regex_new(right_prefix_pattern, 0, 0, &err); + + if(g_regex_match_full(posix, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) { + + ret.posix = TRUE; + lean_path = g_regex_replace_literal(posix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); + + } else if(g_regex_match_full(right, pair[0], -1, 0, G_REGEX_MATCH_NOTEMPTY, NULL, NULL)) { + + ret.right = TRUE; + lean_path = g_regex_replace_literal(right, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); + + } else + lean_path = g_regex_replace_literal(prefix, pair[0], -1, 0, "", G_REGEX_MATCH_NOTEMPTY, NULL); + + ret.path = lean_path; + + ret.sum = g_malloc0(256); + g_strlcpy(ret.sum, pair[1], 66); + + g_regex_unref(prefix); + g_regex_unref(right); + g_regex_unref(posix); + + return ret; +} + +/* TODO need to deconstruct tz_table on exit */ +static gboolean build_lookup_table() { + + gchar *find_cmd, **map_pairs, *find_output, *path_buf, *sum_buf, **entry_buf; + GError *err; + gboolean ret; + gint i; + + i = 0; + err = NULL; + ret = TRUE; + + find_cmd = (gchar *) g_malloc0(4096); + find_output = (gchar *) g_malloc0(1000000); + + g_sprintf(find_cmd, "/bin/sh -c \"find %s -type f -exec cksum -a sha256 {} \\; | sed -E 's/SHA256 \\(//g' | sed -E 's/\\) = /=/g'\"", OS_TIMEZONE_PATH); + + if(!g_spawn_command_line_sync(find_cmd, &find_output, NULL, NULL, &err)) { + + g_printf("error running `%s`\n", find_cmd); + ret = FALSE; + } + + map_pairs = g_strsplit(find_output, "\n", INT_MAX); + + while(map_pairs[i] && (entry_buf = g_strsplit(map_pairs[i], "=", INT_MAX))) { + + tz_table[i] = parse_timezone_path(entry_buf); + + g_strfreev(entry_buf); + i++; + } + + g_free(find_output); + g_free(find_cmd); + g_free(map_pairs); + + return ret; +} + +static gchar *lookup_hash(gchar *hash) { + + gint i = 0; + + while(tz_table[i].sum) + if(!g_strcmp0(tz_table[i].sum, hash)) + return tz_table[i].path; + else + i++; + + return NULL; +}