c7db1984d0
We only need three bits from the old kdbus flags cruft, hence let's make them proper booleans.
754 lines
27 KiB
C
754 lines
27 KiB
C
/* SPDX-License-Identifier: LGPL-2.1+ */
|
|
/***
|
|
This file is part of systemd.
|
|
|
|
Copyright 2013 Lennart Poettering
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
(at your option) any later version.
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#if HAVE_VALGRIND_MEMCHECK_H
|
|
#include <valgrind/memcheck.h>
|
|
#endif
|
|
|
|
#include <errno.h>
|
|
#include <stddef.h>
|
|
|
|
#include "sd-bus.h"
|
|
|
|
#include "alloc-util.h"
|
|
#include "bus-bloom.h"
|
|
#include "bus-control.h"
|
|
#include "bus-internal.h"
|
|
#include "bus-message.h"
|
|
#include "bus-util.h"
|
|
#include "capability-util.h"
|
|
#include "stdio-util.h"
|
|
#include "string-util.h"
|
|
#include "strv.h"
|
|
#include "user-util.h"
|
|
|
|
_public_ int sd_bus_get_unique_name(sd_bus *bus, const char **unique) {
|
|
int r;
|
|
|
|
assert_return(bus, -EINVAL);
|
|
assert_return(unique, -EINVAL);
|
|
assert_return(!bus_pid_changed(bus), -ECHILD);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
r = bus_ensure_running(bus);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
*unique = bus->unique_name;
|
|
return 0;
|
|
}
|
|
|
|
static int bus_request_name_dbus1(sd_bus *bus, const char *name, uint64_t flags) {
|
|
_cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
|
|
uint32_t ret, param = 0;
|
|
int r;
|
|
|
|
assert(bus);
|
|
assert(name);
|
|
|
|
if (flags & SD_BUS_NAME_ALLOW_REPLACEMENT)
|
|
param |= BUS_NAME_ALLOW_REPLACEMENT;
|
|
if (flags & SD_BUS_NAME_REPLACE_EXISTING)
|
|
param |= BUS_NAME_REPLACE_EXISTING;
|
|
if (!(flags & SD_BUS_NAME_QUEUE))
|
|
param |= BUS_NAME_DO_NOT_QUEUE;
|
|
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"RequestName",
|
|
NULL,
|
|
&reply,
|
|
"su",
|
|
name,
|
|
param);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read(reply, "u", &ret);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (ret == BUS_NAME_ALREADY_OWNER)
|
|
return -EALREADY;
|
|
else if (ret == BUS_NAME_EXISTS)
|
|
return -EEXIST;
|
|
else if (ret == BUS_NAME_IN_QUEUE)
|
|
return 0;
|
|
else if (ret == BUS_NAME_PRIMARY_OWNER)
|
|
return 1;
|
|
|
|
return -EIO;
|
|
}
|
|
|
|
_public_ int sd_bus_request_name(sd_bus *bus, const char *name, uint64_t flags) {
|
|
assert_return(bus, -EINVAL);
|
|
assert_return(name, -EINVAL);
|
|
assert_return(!bus_pid_changed(bus), -ECHILD);
|
|
assert_return(!(flags & ~(SD_BUS_NAME_ALLOW_REPLACEMENT|SD_BUS_NAME_REPLACE_EXISTING|SD_BUS_NAME_QUEUE)), -EINVAL);
|
|
assert_return(service_name_is_valid(name), -EINVAL);
|
|
assert_return(name[0] != ':', -EINVAL);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
/* Don't allow requesting the special driver and local names */
|
|
if (STR_IN_SET(name, "org.freedesktop.DBus", "org.freedesktop.DBus.Local"))
|
|
return -EINVAL;
|
|
|
|
if (!BUS_IS_OPEN(bus->state))
|
|
return -ENOTCONN;
|
|
|
|
return bus_request_name_dbus1(bus, name, flags);
|
|
}
|
|
|
|
static int bus_release_name_dbus1(sd_bus *bus, const char *name) {
|
|
_cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
|
|
uint32_t ret;
|
|
int r;
|
|
|
|
assert(bus);
|
|
assert(name);
|
|
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"ReleaseName",
|
|
NULL,
|
|
&reply,
|
|
"s",
|
|
name);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read(reply, "u", &ret);
|
|
if (r < 0)
|
|
return r;
|
|
if (ret == BUS_NAME_NON_EXISTENT)
|
|
return -ESRCH;
|
|
if (ret == BUS_NAME_NOT_OWNER)
|
|
return -EADDRINUSE;
|
|
if (ret == BUS_NAME_RELEASED)
|
|
return 0;
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
_public_ int sd_bus_release_name(sd_bus *bus, const char *name) {
|
|
assert_return(bus, -EINVAL);
|
|
assert_return(name, -EINVAL);
|
|
assert_return(!bus_pid_changed(bus), -ECHILD);
|
|
assert_return(service_name_is_valid(name), -EINVAL);
|
|
assert_return(name[0] != ':', -EINVAL);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
/* Don't allow releasing the special driver and local names */
|
|
if (STR_IN_SET(name, "org.freedesktop.DBus", "org.freedesktop.DBus.Local"))
|
|
return -EINVAL;
|
|
|
|
if (!BUS_IS_OPEN(bus->state))
|
|
return -ENOTCONN;
|
|
|
|
return bus_release_name_dbus1(bus, name);
|
|
}
|
|
|
|
static int bus_list_names_dbus1(sd_bus *bus, char ***acquired, char ***activatable) {
|
|
_cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
|
|
_cleanup_strv_free_ char **x = NULL, **y = NULL;
|
|
int r;
|
|
|
|
if (acquired) {
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"ListNames",
|
|
NULL,
|
|
&reply,
|
|
NULL);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read_strv(reply, &x);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
reply = sd_bus_message_unref(reply);
|
|
}
|
|
|
|
if (activatable) {
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"ListActivatableNames",
|
|
NULL,
|
|
&reply,
|
|
NULL);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read_strv(reply, &y);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
*activatable = y;
|
|
y = NULL;
|
|
}
|
|
|
|
if (acquired) {
|
|
*acquired = x;
|
|
x = NULL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
_public_ int sd_bus_list_names(sd_bus *bus, char ***acquired, char ***activatable) {
|
|
assert_return(bus, -EINVAL);
|
|
assert_return(acquired || activatable, -EINVAL);
|
|
assert_return(!bus_pid_changed(bus), -ECHILD);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
if (!BUS_IS_OPEN(bus->state))
|
|
return -ENOTCONN;
|
|
|
|
return bus_list_names_dbus1(bus, acquired, activatable);
|
|
}
|
|
|
|
static int bus_get_name_creds_dbus1(
|
|
sd_bus *bus,
|
|
const char *name,
|
|
uint64_t mask,
|
|
sd_bus_creds **creds) {
|
|
|
|
_cleanup_(sd_bus_message_unrefp) sd_bus_message *reply_unique = NULL, *reply = NULL;
|
|
_cleanup_(sd_bus_creds_unrefp) sd_bus_creds *c = NULL;
|
|
const char *unique = NULL;
|
|
pid_t pid = 0;
|
|
int r;
|
|
|
|
/* Only query the owner if the caller wants to know it or if
|
|
* the caller just wants to check whether a name exists */
|
|
if ((mask & SD_BUS_CREDS_UNIQUE_NAME) || mask == 0) {
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"GetNameOwner",
|
|
NULL,
|
|
&reply_unique,
|
|
"s",
|
|
name);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read(reply_unique, "s", &unique);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
if (mask != 0) {
|
|
_cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
|
|
bool need_pid, need_uid, need_selinux, need_separate_calls;
|
|
c = bus_creds_new();
|
|
if (!c)
|
|
return -ENOMEM;
|
|
|
|
if ((mask & SD_BUS_CREDS_UNIQUE_NAME) && unique) {
|
|
c->unique_name = strdup(unique);
|
|
if (!c->unique_name)
|
|
return -ENOMEM;
|
|
|
|
c->mask |= SD_BUS_CREDS_UNIQUE_NAME;
|
|
}
|
|
|
|
need_pid = (mask & SD_BUS_CREDS_PID) ||
|
|
((mask & SD_BUS_CREDS_AUGMENT) &&
|
|
(mask & (SD_BUS_CREDS_UID|SD_BUS_CREDS_SUID|SD_BUS_CREDS_FSUID|
|
|
SD_BUS_CREDS_GID|SD_BUS_CREDS_EGID|SD_BUS_CREDS_SGID|SD_BUS_CREDS_FSGID|
|
|
SD_BUS_CREDS_SUPPLEMENTARY_GIDS|
|
|
SD_BUS_CREDS_COMM|SD_BUS_CREDS_EXE|SD_BUS_CREDS_CMDLINE|
|
|
SD_BUS_CREDS_CGROUP|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_USER_UNIT|SD_BUS_CREDS_SLICE|SD_BUS_CREDS_SESSION|SD_BUS_CREDS_OWNER_UID|
|
|
SD_BUS_CREDS_EFFECTIVE_CAPS|SD_BUS_CREDS_PERMITTED_CAPS|SD_BUS_CREDS_INHERITABLE_CAPS|SD_BUS_CREDS_BOUNDING_CAPS|
|
|
SD_BUS_CREDS_SELINUX_CONTEXT|
|
|
SD_BUS_CREDS_AUDIT_SESSION_ID|SD_BUS_CREDS_AUDIT_LOGIN_UID)));
|
|
need_uid = mask & SD_BUS_CREDS_EUID;
|
|
need_selinux = mask & SD_BUS_CREDS_SELINUX_CONTEXT;
|
|
|
|
if (need_pid + need_uid + need_selinux > 1) {
|
|
|
|
/* If we need more than one of the credentials, then use GetConnectionCredentials() */
|
|
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"GetConnectionCredentials",
|
|
&error,
|
|
&reply,
|
|
"s",
|
|
unique ?: name);
|
|
|
|
if (r < 0) {
|
|
|
|
if (!sd_bus_error_has_name(&error, SD_BUS_ERROR_UNKNOWN_METHOD))
|
|
return r;
|
|
|
|
/* If we got an unknown method error, fall back to the invidual calls... */
|
|
need_separate_calls = true;
|
|
sd_bus_error_free(&error);
|
|
|
|
} else {
|
|
need_separate_calls = false;
|
|
|
|
r = sd_bus_message_enter_container(reply, 'a', "{sv}");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
for (;;) {
|
|
const char *m;
|
|
|
|
r = sd_bus_message_enter_container(reply, 'e', "sv");
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
break;
|
|
|
|
r = sd_bus_message_read(reply, "s", &m);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (need_uid && streq(m, "UnixUserID")) {
|
|
uint32_t u;
|
|
|
|
r = sd_bus_message_read(reply, "v", "u", &u);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
c->euid = u;
|
|
c->mask |= SD_BUS_CREDS_EUID;
|
|
|
|
} else if (need_pid && streq(m, "ProcessID")) {
|
|
uint32_t p;
|
|
|
|
r = sd_bus_message_read(reply, "v", "u", &p);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
pid = p;
|
|
if (mask & SD_BUS_CREDS_PID) {
|
|
c->pid = p;
|
|
c->mask |= SD_BUS_CREDS_PID;
|
|
}
|
|
|
|
} else if (need_selinux && streq(m, "LinuxSecurityLabel")) {
|
|
const void *p = NULL;
|
|
size_t sz = 0;
|
|
|
|
r = sd_bus_message_enter_container(reply, 'v', "ay");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read_array(reply, 'y', &p, &sz);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
free(c->label);
|
|
c->label = strndup(p, sz);
|
|
if (!c->label)
|
|
return -ENOMEM;
|
|
|
|
c->mask |= SD_BUS_CREDS_SELINUX_CONTEXT;
|
|
|
|
r = sd_bus_message_exit_container(reply);
|
|
if (r < 0)
|
|
return r;
|
|
} else {
|
|
r = sd_bus_message_skip(reply, "v");
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
r = sd_bus_message_exit_container(reply);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
r = sd_bus_message_exit_container(reply);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (need_pid && pid == 0)
|
|
return -EPROTO;
|
|
}
|
|
|
|
} else /* When we only need a single field, then let's use separate calls */
|
|
need_separate_calls = true;
|
|
|
|
if (need_separate_calls) {
|
|
if (need_pid) {
|
|
uint32_t u;
|
|
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"GetConnectionUnixProcessID",
|
|
NULL,
|
|
&reply,
|
|
"s",
|
|
unique ?: name);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read(reply, "u", &u);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
pid = u;
|
|
if (mask & SD_BUS_CREDS_PID) {
|
|
c->pid = u;
|
|
c->mask |= SD_BUS_CREDS_PID;
|
|
}
|
|
|
|
reply = sd_bus_message_unref(reply);
|
|
}
|
|
|
|
if (need_uid) {
|
|
uint32_t u;
|
|
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"GetConnectionUnixUser",
|
|
NULL,
|
|
&reply,
|
|
"s",
|
|
unique ? unique : name);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read(reply, "u", &u);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
c->euid = u;
|
|
c->mask |= SD_BUS_CREDS_EUID;
|
|
|
|
reply = sd_bus_message_unref(reply);
|
|
}
|
|
|
|
if (need_selinux) {
|
|
const void *p = NULL;
|
|
size_t sz = 0;
|
|
|
|
r = sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"GetConnectionSELinuxSecurityContext",
|
|
&error,
|
|
&reply,
|
|
"s",
|
|
unique ? unique : name);
|
|
if (r < 0) {
|
|
if (!sd_bus_error_has_name(&error, "org.freedesktop.DBus.Error.SELinuxSecurityContextUnknown"))
|
|
return r;
|
|
|
|
/* no data is fine */
|
|
} else {
|
|
r = sd_bus_message_read_array(reply, 'y', &p, &sz);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
c->label = strndup(p, sz);
|
|
if (!c->label)
|
|
return -ENOMEM;
|
|
|
|
c->mask |= SD_BUS_CREDS_SELINUX_CONTEXT;
|
|
}
|
|
}
|
|
}
|
|
|
|
r = bus_creds_add_more(c, mask, pid, 0);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
if (creds) {
|
|
*creds = c;
|
|
c = NULL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
_public_ int sd_bus_get_name_creds(
|
|
sd_bus *bus,
|
|
const char *name,
|
|
uint64_t mask,
|
|
sd_bus_creds **creds) {
|
|
|
|
assert_return(bus, -EINVAL);
|
|
assert_return(name, -EINVAL);
|
|
assert_return((mask & ~SD_BUS_CREDS_AUGMENT) <= _SD_BUS_CREDS_ALL, -EOPNOTSUPP);
|
|
assert_return(mask == 0 || creds, -EINVAL);
|
|
assert_return(!bus_pid_changed(bus), -ECHILD);
|
|
assert_return(service_name_is_valid(name), -EINVAL);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
/* Turn off augmenting if this isn't a local connection. If the connection is not local, then /proc is not
|
|
* going to match. */
|
|
if (!bus->is_local)
|
|
mask &= ~SD_BUS_CREDS_AUGMENT;
|
|
|
|
if (streq(name, "org.freedesktop.DBus.Local"))
|
|
return -EINVAL;
|
|
|
|
if (streq(name, "org.freedesktop.DBus"))
|
|
return sd_bus_get_owner_creds(bus, mask, creds);
|
|
|
|
if (!BUS_IS_OPEN(bus->state))
|
|
return -ENOTCONN;
|
|
|
|
return bus_get_name_creds_dbus1(bus, name, mask, creds);
|
|
}
|
|
|
|
static int bus_get_owner_creds_dbus1(sd_bus *bus, uint64_t mask, sd_bus_creds **ret) {
|
|
_cleanup_(sd_bus_creds_unrefp) sd_bus_creds *c = NULL;
|
|
pid_t pid = 0;
|
|
bool do_label, do_groups;
|
|
int r;
|
|
|
|
assert(bus);
|
|
|
|
do_label = bus->label && (mask & SD_BUS_CREDS_SELINUX_CONTEXT);
|
|
do_groups = bus->n_groups != (size_t) -1 && (mask & SD_BUS_CREDS_SUPPLEMENTARY_GIDS);
|
|
|
|
/* Avoid allocating anything if we have no chance of returning useful data */
|
|
if (!bus->ucred_valid && !do_label && !do_groups)
|
|
return -ENODATA;
|
|
|
|
c = bus_creds_new();
|
|
if (!c)
|
|
return -ENOMEM;
|
|
|
|
if (bus->ucred_valid) {
|
|
if (pid_is_valid(bus->ucred.pid)) {
|
|
pid = c->pid = bus->ucred.pid;
|
|
c->mask |= SD_BUS_CREDS_PID & mask;
|
|
}
|
|
|
|
if (uid_is_valid(bus->ucred.uid)) {
|
|
c->euid = bus->ucred.uid;
|
|
c->mask |= SD_BUS_CREDS_EUID & mask;
|
|
}
|
|
|
|
if (gid_is_valid(bus->ucred.gid)) {
|
|
c->egid = bus->ucred.gid;
|
|
c->mask |= SD_BUS_CREDS_EGID & mask;
|
|
}
|
|
}
|
|
|
|
if (do_label) {
|
|
c->label = strdup(bus->label);
|
|
if (!c->label)
|
|
return -ENOMEM;
|
|
|
|
c->mask |= SD_BUS_CREDS_SELINUX_CONTEXT;
|
|
}
|
|
|
|
if (do_groups) {
|
|
c->supplementary_gids = newdup(gid_t, bus->groups, bus->n_groups);
|
|
if (!c->supplementary_gids)
|
|
return -ENOMEM;
|
|
|
|
c->n_supplementary_gids = bus->n_groups;
|
|
|
|
c->mask |= SD_BUS_CREDS_SUPPLEMENTARY_GIDS;
|
|
}
|
|
|
|
r = bus_creds_add_more(c, mask, pid, 0);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
*ret = c;
|
|
c = NULL;
|
|
return 0;
|
|
}
|
|
|
|
_public_ int sd_bus_get_owner_creds(sd_bus *bus, uint64_t mask, sd_bus_creds **ret) {
|
|
assert_return(bus, -EINVAL);
|
|
assert_return((mask & ~SD_BUS_CREDS_AUGMENT) <= _SD_BUS_CREDS_ALL, -EOPNOTSUPP);
|
|
assert_return(ret, -EINVAL);
|
|
assert_return(!bus_pid_changed(bus), -ECHILD);
|
|
|
|
if (!BUS_IS_OPEN(bus->state))
|
|
return -ENOTCONN;
|
|
|
|
if (!bus->is_local)
|
|
mask &= ~SD_BUS_CREDS_AUGMENT;
|
|
|
|
return bus_get_owner_creds_dbus1(bus, mask, ret);
|
|
}
|
|
|
|
#define internal_match(bus, m) \
|
|
((bus)->is_monitor \
|
|
? (isempty(m) ? "eavesdrop='true'" : strjoina((m), ",eavesdrop='true'")) \
|
|
: (m))
|
|
|
|
static int bus_add_match_internal_dbus1(
|
|
sd_bus *bus,
|
|
const char *match) {
|
|
|
|
const char *e;
|
|
|
|
assert(bus);
|
|
assert(match);
|
|
|
|
e = internal_match(bus, match);
|
|
|
|
return sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"AddMatch",
|
|
NULL,
|
|
NULL,
|
|
"s",
|
|
e);
|
|
}
|
|
|
|
int bus_add_match_internal(
|
|
sd_bus *bus,
|
|
const char *match,
|
|
struct bus_match_component *components,
|
|
unsigned n_components) {
|
|
|
|
assert(bus);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
return bus_add_match_internal_dbus1(bus, match);
|
|
}
|
|
|
|
static int bus_remove_match_internal_dbus1(
|
|
sd_bus *bus,
|
|
const char *match) {
|
|
|
|
const char *e;
|
|
|
|
assert(bus);
|
|
assert(match);
|
|
|
|
e = internal_match(bus, match);
|
|
|
|
return sd_bus_call_method(
|
|
bus,
|
|
"org.freedesktop.DBus",
|
|
"/org/freedesktop/DBus",
|
|
"org.freedesktop.DBus",
|
|
"RemoveMatch",
|
|
NULL,
|
|
NULL,
|
|
"s",
|
|
e);
|
|
}
|
|
|
|
int bus_remove_match_internal(
|
|
sd_bus *bus,
|
|
const char *match) {
|
|
|
|
assert(bus);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
return bus_remove_match_internal_dbus1(bus, match);
|
|
}
|
|
|
|
_public_ int sd_bus_get_name_machine_id(sd_bus *bus, const char *name, sd_id128_t *machine) {
|
|
_cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL, *m = NULL;
|
|
const char *mid;
|
|
int r;
|
|
|
|
assert_return(bus, -EINVAL);
|
|
assert_return(name, -EINVAL);
|
|
assert_return(machine, -EINVAL);
|
|
assert_return(!bus_pid_changed(bus), -ECHILD);
|
|
assert_return(service_name_is_valid(name), -EINVAL);
|
|
|
|
if (!bus->bus_client)
|
|
return -EINVAL;
|
|
|
|
if (!BUS_IS_OPEN(bus->state))
|
|
return -ENOTCONN;
|
|
|
|
if (streq_ptr(name, bus->unique_name))
|
|
return sd_id128_get_machine(machine);
|
|
|
|
r = sd_bus_message_new_method_call(
|
|
bus,
|
|
&m,
|
|
name,
|
|
"/",
|
|
"org.freedesktop.DBus.Peer",
|
|
"GetMachineId");
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_set_auto_start(m, false);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_call(bus, m, 0, NULL, &reply);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_bus_message_read(reply, "s", &mid);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
return sd_id128_from_string(mid, machine);
|
|
}
|