]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/core/dbus-service.c
Merge pull request #24628 from medhefgo/boot-sections
[thirdparty/systemd.git] / src / core / dbus-service.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <fcntl.h>
4
5 #include "alloc-util.h"
6 #include "async.h"
7 #include "bus-get-properties.h"
8 #include "dbus-cgroup.h"
9 #include "dbus-execute.h"
10 #include "dbus-kill.h"
11 #include "dbus-manager.h"
12 #include "dbus-service.h"
13 #include "dbus-util.h"
14 #include "execute.h"
15 #include "exit-status.h"
16 #include "fd-util.h"
17 #include "fileio.h"
18 #include "locale-util.h"
19 #include "mount-util.h"
20 #include "parse-util.h"
21 #include "path-util.h"
22 #include "selinux-access.h"
23 #include "service.h"
24 #include "signal-util.h"
25 #include "string-util.h"
26 #include "strv.h"
27 #include "unit.h"
28
29 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type, service_type, ServiceType);
30 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_exit_type, service_exit_type, ServiceExitType);
31 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_result, service_result, ServiceResult);
32 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_restart, service_restart, ServiceRestart);
33 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_notify_access, notify_access, NotifyAccess);
34 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_emergency_action, emergency_action, EmergencyAction);
35 static BUS_DEFINE_PROPERTY_GET(property_get_timeout_abort_usec, "t", Service, service_timeout_abort_usec);
36 static BUS_DEFINE_PROPERTY_GET(property_get_watchdog_usec, "t", Service, service_get_watchdog_usec);
37 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_timeout_failure_mode, service_timeout_failure_mode, ServiceTimeoutFailureMode);
38
39 static int property_get_exit_status_set(
40 sd_bus *bus,
41 const char *path,
42 const char *interface,
43 const char *property,
44 sd_bus_message *reply,
45 void *userdata,
46 sd_bus_error *error) {
47
48 const ExitStatusSet *status_set = ASSERT_PTR(userdata);
49 unsigned n;
50 int r;
51
52 assert(bus);
53 assert(reply);
54
55 r = sd_bus_message_open_container(reply, 'r', "aiai");
56 if (r < 0)
57 return r;
58
59 r = sd_bus_message_open_container(reply, 'a', "i");
60 if (r < 0)
61 return r;
62
63 BITMAP_FOREACH(n, &status_set->status) {
64 assert(n < 256);
65
66 r = sd_bus_message_append_basic(reply, 'i', &n);
67 if (r < 0)
68 return r;
69 }
70
71 r = sd_bus_message_close_container(reply);
72 if (r < 0)
73 return r;
74
75 r = sd_bus_message_open_container(reply, 'a', "i");
76 if (r < 0)
77 return r;
78
79 BITMAP_FOREACH(n, &status_set->signal) {
80 const char *str;
81
82 str = signal_to_string(n);
83 if (!str)
84 continue;
85
86 r = sd_bus_message_append_basic(reply, 'i', &n);
87 if (r < 0)
88 return r;
89 }
90
91 r = sd_bus_message_close_container(reply);
92 if (r < 0)
93 return r;
94
95 return sd_bus_message_close_container(reply);
96 }
97
98 static int bus_service_method_mount(sd_bus_message *message, void *userdata, sd_bus_error *error, bool is_image) {
99 _cleanup_(mount_options_free_allp) MountOptions *options = NULL;
100 const char *dest, *src, *propagate_directory;
101 int read_only, make_file_or_directory;
102 Unit *u = ASSERT_PTR(userdata);
103 ExecContext *c;
104 pid_t unit_pid;
105 int r;
106
107 assert(message);
108
109 if (!MANAGER_IS_SYSTEM(u->manager))
110 return sd_bus_error_set(error, SD_BUS_ERROR_NOT_SUPPORTED, "Adding bind mounts at runtime is only supported for system managers.");
111
112 r = mac_selinux_unit_access_check(u, message, "start", error);
113 if (r < 0)
114 return r;
115
116 r = sd_bus_message_read(message, "ssbb", &src, &dest, &read_only, &make_file_or_directory);
117 if (r < 0)
118 return r;
119
120 if (!path_is_absolute(src) || !path_is_normalized(src))
121 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Source path must be absolute and normalized.");
122
123 if (!is_image && isempty(dest))
124 dest = src;
125 else if (!path_is_absolute(dest) || !path_is_normalized(dest))
126 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Destination path must be absolute and normalized.");
127
128 if (is_image) {
129 r = bus_read_mount_options(message, error, &options, NULL, "");
130 if (r < 0)
131 return r;
132 }
133
134 r = bus_verify_manage_units_async_full(
135 u,
136 is_image ? "mount-image" : "bind-mount",
137 CAP_SYS_ADMIN,
138 N_("Authentication is required to mount on '$(unit)'."),
139 true,
140 message,
141 error);
142 if (r < 0)
143 return r;
144 if (r == 0)
145 return 1; /* No authorization for now, but the async polkit stuff will call us again when it has it */
146
147 if (u->type != UNIT_SERVICE)
148 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Unit is not of type .service");
149
150 /* If it would be dropped at startup time, return an error. The context should always be available, but
151 * there's an assert in exec_needs_mount_namespace, so double-check just in case. */
152 c = unit_get_exec_context(u);
153 if (!c)
154 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Cannot access unit execution context");
155 if (path_startswith_strv(dest, c->inaccessible_paths))
156 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "%s is not accessible to this unit", dest);
157
158 /* Ensure that the unit was started in a private mount namespace */
159 if (!exec_needs_mount_namespace(c, NULL, unit_get_exec_runtime(u)))
160 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Unit not running in private mount namespace, cannot activate bind mount");
161
162 unit_pid = unit_main_pid(u);
163 if (unit_pid == 0 || !UNIT_IS_ACTIVE_OR_RELOADING(unit_active_state(u)))
164 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "Unit is not running");
165
166 propagate_directory = strjoina("/run/systemd/propagate/", u->id);
167 if (is_image)
168 r = mount_image_in_namespace(unit_pid,
169 propagate_directory,
170 "/run/systemd/incoming/",
171 src, dest, read_only, make_file_or_directory, options);
172 else
173 r = bind_mount_in_namespace(unit_pid,
174 propagate_directory,
175 "/run/systemd/incoming/",
176 src, dest, read_only, make_file_or_directory);
177 if (r < 0)
178 return sd_bus_error_set_errnof(error, r, "Failed to mount %s on %s in unit's namespace: %m", src, dest);
179
180 return sd_bus_reply_method_return(message, NULL);
181 }
182
183 int bus_service_method_bind_mount(sd_bus_message *message, void *userdata, sd_bus_error *error) {
184 return bus_service_method_mount(message, userdata, error, false);
185 }
186
187 int bus_service_method_mount_image(sd_bus_message *message, void *userdata, sd_bus_error *error) {
188 return bus_service_method_mount(message, userdata, error, true);
189 }
190
191 const sd_bus_vtable bus_service_vtable[] = {
192 SD_BUS_VTABLE_START(0),
193 SD_BUS_PROPERTY("Type", "s", property_get_type, offsetof(Service, type), SD_BUS_VTABLE_PROPERTY_CONST),
194 SD_BUS_PROPERTY("ExitType", "s", property_get_exit_type, offsetof(Service, exit_type), SD_BUS_VTABLE_PROPERTY_CONST),
195 SD_BUS_PROPERTY("Restart", "s", property_get_restart, offsetof(Service, restart), SD_BUS_VTABLE_PROPERTY_CONST),
196 SD_BUS_PROPERTY("PIDFile", "s", NULL, offsetof(Service, pid_file), SD_BUS_VTABLE_PROPERTY_CONST),
197 SD_BUS_PROPERTY("NotifyAccess", "s", property_get_notify_access, offsetof(Service, notify_access), SD_BUS_VTABLE_PROPERTY_CONST),
198 SD_BUS_PROPERTY("RestartUSec", "t", bus_property_get_usec, offsetof(Service, restart_usec), SD_BUS_VTABLE_PROPERTY_CONST),
199 SD_BUS_PROPERTY("TimeoutStartUSec", "t", bus_property_get_usec, offsetof(Service, timeout_start_usec), SD_BUS_VTABLE_PROPERTY_CONST),
200 SD_BUS_PROPERTY("TimeoutStopUSec", "t", bus_property_get_usec, offsetof(Service, timeout_stop_usec), SD_BUS_VTABLE_PROPERTY_CONST),
201 SD_BUS_PROPERTY("TimeoutAbortUSec", "t", property_get_timeout_abort_usec, 0, 0),
202 SD_BUS_PROPERTY("TimeoutStartFailureMode", "s", property_get_timeout_failure_mode, offsetof(Service, timeout_start_failure_mode), SD_BUS_VTABLE_PROPERTY_CONST),
203 SD_BUS_PROPERTY("TimeoutStopFailureMode", "s", property_get_timeout_failure_mode, offsetof(Service, timeout_stop_failure_mode), SD_BUS_VTABLE_PROPERTY_CONST),
204 SD_BUS_PROPERTY("RuntimeMaxUSec", "t", bus_property_get_usec, offsetof(Service, runtime_max_usec), SD_BUS_VTABLE_PROPERTY_CONST),
205 SD_BUS_PROPERTY("RuntimeRandomizedExtraUSec", "t", bus_property_get_usec, offsetof(Service, runtime_rand_extra_usec), SD_BUS_VTABLE_PROPERTY_CONST),
206 SD_BUS_PROPERTY("WatchdogUSec", "t", property_get_watchdog_usec, 0, 0),
207 BUS_PROPERTY_DUAL_TIMESTAMP("WatchdogTimestamp", offsetof(Service, watchdog_timestamp), 0),
208 SD_BUS_PROPERTY("PermissionsStartOnly", "b", bus_property_get_bool, offsetof(Service, permissions_start_only), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN), /* 😷 deprecated */
209 SD_BUS_PROPERTY("RootDirectoryStartOnly", "b", bus_property_get_bool, offsetof(Service, root_directory_start_only), SD_BUS_VTABLE_PROPERTY_CONST),
210 SD_BUS_PROPERTY("RemainAfterExit", "b", bus_property_get_bool, offsetof(Service, remain_after_exit), SD_BUS_VTABLE_PROPERTY_CONST),
211 SD_BUS_PROPERTY("GuessMainPID", "b", bus_property_get_bool, offsetof(Service, guess_main_pid), SD_BUS_VTABLE_PROPERTY_CONST),
212 SD_BUS_PROPERTY("RestartPreventExitStatus", "(aiai)", property_get_exit_status_set, offsetof(Service, restart_prevent_status), SD_BUS_VTABLE_PROPERTY_CONST),
213 SD_BUS_PROPERTY("RestartForceExitStatus", "(aiai)", property_get_exit_status_set, offsetof(Service, restart_force_status), SD_BUS_VTABLE_PROPERTY_CONST),
214 SD_BUS_PROPERTY("SuccessExitStatus", "(aiai)", property_get_exit_status_set, offsetof(Service, success_status), SD_BUS_VTABLE_PROPERTY_CONST),
215 SD_BUS_PROPERTY("MainPID", "u", bus_property_get_pid, offsetof(Service, main_pid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
216 SD_BUS_PROPERTY("ControlPID", "u", bus_property_get_pid, offsetof(Service, control_pid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
217 SD_BUS_PROPERTY("BusName", "s", NULL, offsetof(Service, bus_name), SD_BUS_VTABLE_PROPERTY_CONST),
218 SD_BUS_PROPERTY("FileDescriptorStoreMax", "u", bus_property_get_unsigned, offsetof(Service, n_fd_store_max), SD_BUS_VTABLE_PROPERTY_CONST),
219 SD_BUS_PROPERTY("NFileDescriptorStore", "u", bus_property_get_unsigned, offsetof(Service, n_fd_store), 0),
220 SD_BUS_PROPERTY("StatusText", "s", NULL, offsetof(Service, status_text), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
221 SD_BUS_PROPERTY("StatusErrno", "i", bus_property_get_int, offsetof(Service, status_errno), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
222 SD_BUS_PROPERTY("Result", "s", property_get_result, offsetof(Service, result), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
223 SD_BUS_PROPERTY("ReloadResult", "s", property_get_result, offsetof(Service, reload_result), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
224 SD_BUS_PROPERTY("CleanResult", "s", property_get_result, offsetof(Service, clean_result), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
225 SD_BUS_PROPERTY("USBFunctionDescriptors", "s", NULL, offsetof(Service, usb_function_descriptors), SD_BUS_VTABLE_PROPERTY_CONST),
226 SD_BUS_PROPERTY("USBFunctionStrings", "s", NULL, offsetof(Service, usb_function_strings), SD_BUS_VTABLE_PROPERTY_CONST),
227 SD_BUS_PROPERTY("UID", "u", bus_property_get_uid, offsetof(Unit, ref_uid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
228 SD_BUS_PROPERTY("GID", "u", bus_property_get_gid, offsetof(Unit, ref_gid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
229 SD_BUS_PROPERTY("NRestarts", "u", bus_property_get_unsigned, offsetof(Service, n_restarts), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
230 SD_BUS_PROPERTY("OOMPolicy", "s", bus_property_get_oom_policy, offsetof(Service, oom_policy), SD_BUS_VTABLE_PROPERTY_CONST),
231
232 BUS_EXEC_STATUS_VTABLE("ExecMain", offsetof(Service, main_exec_status), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
233 BUS_EXEC_COMMAND_LIST_VTABLE("ExecCondition", offsetof(Service, exec_command[SERVICE_EXEC_CONDITION]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
234 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecConditionEx", offsetof(Service, exec_command[SERVICE_EXEC_CONDITION]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
235 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStartPre", offsetof(Service, exec_command[SERVICE_EXEC_START_PRE]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
236 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartPreEx", offsetof(Service, exec_command[SERVICE_EXEC_START_PRE]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
237 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStart", offsetof(Service, exec_command[SERVICE_EXEC_START]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
238 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartEx", offsetof(Service, exec_command[SERVICE_EXEC_START]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
239 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStartPost", offsetof(Service, exec_command[SERVICE_EXEC_START_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
240 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartPostEx", offsetof(Service, exec_command[SERVICE_EXEC_START_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
241 BUS_EXEC_COMMAND_LIST_VTABLE("ExecReload", offsetof(Service, exec_command[SERVICE_EXEC_RELOAD]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
242 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecReloadEx", offsetof(Service, exec_command[SERVICE_EXEC_RELOAD]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
243 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStop", offsetof(Service, exec_command[SERVICE_EXEC_STOP]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
244 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStopEx", offsetof(Service, exec_command[SERVICE_EXEC_STOP]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
245 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStopPost", offsetof(Service, exec_command[SERVICE_EXEC_STOP_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
246 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStopPostEx", offsetof(Service, exec_command[SERVICE_EXEC_STOP_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
247
248 SD_BUS_METHOD_WITH_ARGS("BindMount",
249 SD_BUS_ARGS("s", source, "s", destination, "b", read_only, "b", mkdir),
250 SD_BUS_NO_RESULT,
251 bus_service_method_bind_mount,
252 SD_BUS_VTABLE_UNPRIVILEGED),
253
254 SD_BUS_METHOD_WITH_ARGS("MountImage",
255 SD_BUS_ARGS("s", source, "s", destination, "b", read_only, "b", mkdir, "a(ss)", options),
256 SD_BUS_NO_RESULT,
257 bus_service_method_mount_image,
258 SD_BUS_VTABLE_UNPRIVILEGED),
259
260 /* The following four are obsolete, and thus marked hidden here. They moved into the Unit interface */
261 SD_BUS_PROPERTY("StartLimitInterval", "t", bus_property_get_usec, offsetof(Unit, start_ratelimit.interval), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
262 SD_BUS_PROPERTY("StartLimitBurst", "u", bus_property_get_unsigned, offsetof(Unit, start_ratelimit.burst), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
263 SD_BUS_PROPERTY("StartLimitAction", "s", property_get_emergency_action, offsetof(Unit, start_limit_action), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
264 SD_BUS_PROPERTY("FailureAction", "s", property_get_emergency_action, offsetof(Unit, failure_action), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
265 SD_BUS_PROPERTY("RebootArgument", "s", NULL, offsetof(Unit, reboot_arg), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
266 SD_BUS_VTABLE_END
267 };
268
269 static int bus_set_transient_exit_status(
270 Unit *u,
271 const char *name,
272 ExitStatusSet *status_set,
273 sd_bus_message *message,
274 UnitWriteFlags flags,
275 sd_bus_error *error) {
276
277 const int32_t *status, *signal;
278 size_t n_status, n_signal, i;
279 int r;
280
281 r = sd_bus_message_enter_container(message, 'r', "aiai");
282 if (r < 0)
283 return r;
284
285 r = sd_bus_message_read_array(message, 'i', (const void **) &status, &n_status);
286 if (r < 0)
287 return r;
288
289 r = sd_bus_message_read_array(message, 'i', (const void **) &signal, &n_signal);
290 if (r < 0)
291 return r;
292
293 r = sd_bus_message_exit_container(message);
294 if (r < 0)
295 return r;
296
297 n_status /= sizeof(int32_t);
298 n_signal /= sizeof(int32_t);
299
300 if (n_status == 0 && n_signal == 0 && !UNIT_WRITE_FLAGS_NOOP(flags)) {
301 exit_status_set_free(status_set);
302 unit_write_settingf(u, flags, name, "%s=", name);
303 return 1;
304 }
305
306 for (i = 0; i < n_status; i++) {
307 if (status[i] < 0 || status[i] > 255)
308 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid status code in %s: %"PRIi32, name, status[i]);
309
310 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
311 r = bitmap_set(&status_set->status, status[i]);
312 if (r < 0)
313 return r;
314
315 unit_write_settingf(u, flags, name, "%s=%"PRIi32, name, status[i]);
316 }
317 }
318
319 for (i = 0; i < n_signal; i++) {
320 const char *str;
321
322 str = signal_to_string((int) signal[i]);
323 if (!str)
324 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid signal in %s: %"PRIi32, name, signal[i]);
325
326 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
327 r = bitmap_set(&status_set->signal, signal[i]);
328 if (r < 0)
329 return r;
330
331 unit_write_settingf(u, flags, name, "%s=%s", name, str);
332 }
333 }
334
335 return 1;
336 }
337
338 static int bus_set_transient_std_fd(
339 Unit *u,
340 const char *name,
341 int *p,
342 bool *b,
343 sd_bus_message *message,
344 UnitWriteFlags flags,
345 sd_bus_error *error) {
346
347 int fd, r;
348
349 assert(p);
350 assert(b);
351
352 r = sd_bus_message_read(message, "h", &fd);
353 if (r < 0)
354 return r;
355
356 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
357 int copy;
358
359 copy = fcntl(fd, F_DUPFD_CLOEXEC, 3);
360 if (copy < 0)
361 return -errno;
362
363 asynchronous_close(*p);
364 *p = copy;
365 *b = true;
366 }
367
368 return 1;
369 }
370 static BUS_DEFINE_SET_TRANSIENT_PARSE(notify_access, NotifyAccess, notify_access_from_string);
371 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_type, ServiceType, service_type_from_string);
372 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_exit_type, ServiceExitType, service_exit_type_from_string);
373 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_restart, ServiceRestart, service_restart_from_string);
374 static BUS_DEFINE_SET_TRANSIENT_PARSE(oom_policy, OOMPolicy, oom_policy_from_string);
375 static BUS_DEFINE_SET_TRANSIENT_STRING_WITH_CHECK(bus_name, sd_bus_service_name_is_valid);
376 static BUS_DEFINE_SET_TRANSIENT_PARSE(timeout_failure_mode, ServiceTimeoutFailureMode, service_timeout_failure_mode_from_string);
377
378 static int bus_service_set_transient_property(
379 Service *s,
380 const char *name,
381 sd_bus_message *message,
382 UnitWriteFlags flags,
383 sd_bus_error *error) {
384
385 Unit *u = UNIT(s);
386 ServiceExecCommand ci;
387 int r;
388
389 assert(s);
390 assert(name);
391 assert(message);
392
393 flags |= UNIT_PRIVATE;
394
395 if (streq(name, "PermissionsStartOnly"))
396 return bus_set_transient_bool(u, name, &s->permissions_start_only, message, flags, error);
397
398 if (streq(name, "RootDirectoryStartOnly"))
399 return bus_set_transient_bool(u, name, &s->root_directory_start_only, message, flags, error);
400
401 if (streq(name, "RemainAfterExit"))
402 return bus_set_transient_bool(u, name, &s->remain_after_exit, message, flags, error);
403
404 if (streq(name, "GuessMainPID"))
405 return bus_set_transient_bool(u, name, &s->guess_main_pid, message, flags, error);
406
407 if (streq(name, "Type"))
408 return bus_set_transient_service_type(u, name, &s->type, message, flags, error);
409
410 if (streq(name, "ExitType"))
411 return bus_set_transient_service_exit_type(u, name, &s->exit_type, message, flags, error);
412
413 if (streq(name, "OOMPolicy"))
414 return bus_set_transient_oom_policy(u, name, &s->oom_policy, message, flags, error);
415
416 if (streq(name, "RestartUSec"))
417 return bus_set_transient_usec(u, name, &s->restart_usec, message, flags, error);
418
419 if (streq(name, "TimeoutStartUSec")) {
420 r = bus_set_transient_usec(u, name, &s->timeout_start_usec, message, flags, error);
421 if (r >= 0 && !UNIT_WRITE_FLAGS_NOOP(flags))
422 s->start_timeout_defined = true;
423
424 return r;
425 }
426
427 if (streq(name, "TimeoutStopUSec"))
428 return bus_set_transient_usec(u, name, &s->timeout_stop_usec, message, flags, error);
429
430 if (streq(name, "TimeoutAbortUSec")) {
431 r = bus_set_transient_usec(u, name, &s->timeout_abort_usec, message, flags, error);
432 if (r >= 0 && !UNIT_WRITE_FLAGS_NOOP(flags))
433 s->timeout_abort_set = true;
434 return r;
435 }
436
437 if (streq(name, "TimeoutStartFailureMode"))
438 return bus_set_transient_timeout_failure_mode(u, name, &s->timeout_start_failure_mode, message, flags, error);
439
440 if (streq(name, "TimeoutStopFailureMode"))
441 return bus_set_transient_timeout_failure_mode(u, name, &s->timeout_stop_failure_mode, message, flags, error);
442
443 if (streq(name, "RuntimeMaxUSec"))
444 return bus_set_transient_usec(u, name, &s->runtime_max_usec, message, flags, error);
445
446 if (streq(name, "RuntimeRandomizedExtraUSec"))
447 return bus_set_transient_usec(u, name, &s->runtime_rand_extra_usec, message, flags, error);
448
449 if (streq(name, "WatchdogUSec"))
450 return bus_set_transient_usec(u, name, &s->watchdog_usec, message, flags, error);
451
452 if (streq(name, "FileDescriptorStoreMax"))
453 return bus_set_transient_unsigned(u, name, &s->n_fd_store_max, message, flags, error);
454
455 if (streq(name, "NotifyAccess"))
456 return bus_set_transient_notify_access(u, name, &s->notify_access, message, flags, error);
457
458 if (streq(name, "PIDFile")) {
459 _cleanup_free_ char *n = NULL;
460 const char *v, *e;
461
462 r = sd_bus_message_read(message, "s", &v);
463 if (r < 0)
464 return r;
465
466 if (!isempty(v)) {
467 n = path_make_absolute(v, u->manager->prefix[EXEC_DIRECTORY_RUNTIME]);
468 if (!n)
469 return -ENOMEM;
470
471 path_simplify(n);
472
473 if (!path_is_normalized(n))
474 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "PIDFile= path '%s' is not valid", n);
475
476 e = path_startswith(n, "/var/run/");
477 if (e) {
478 char *z;
479
480 z = path_join("/run", e);
481 if (!z)
482 return log_oom();
483
484 if (!UNIT_WRITE_FLAGS_NOOP(flags))
485 log_unit_notice(u, "Transient unit's PIDFile= property references path below legacy directory /var/run, updating %s %s %s; please update client accordingly.",
486 n, special_glyph(SPECIAL_GLYPH_ARROW_RIGHT), z);
487
488 free_and_replace(n, z);
489 }
490 }
491
492 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
493 free_and_replace(s->pid_file, n);
494 unit_write_settingf(u, flags, name, "%s=%s", name, strempty(s->pid_file));
495 }
496
497 return 1;
498 }
499
500 if (streq(name, "USBFunctionDescriptors"))
501 return bus_set_transient_path(u, name, &s->usb_function_descriptors, message, flags, error);
502
503 if (streq(name, "USBFunctionStrings"))
504 return bus_set_transient_path(u, name, &s->usb_function_strings, message, flags, error);
505
506 if (streq(name, "BusName"))
507 return bus_set_transient_bus_name(u, name, &s->bus_name, message, flags, error);
508
509 if (streq(name, "Restart"))
510 return bus_set_transient_service_restart(u, name, &s->restart, message, flags, error);
511
512 if (streq(name, "RestartPreventExitStatus"))
513 return bus_set_transient_exit_status(u, name, &s->restart_prevent_status, message, flags, error);
514
515 if (streq(name, "RestartForceExitStatus"))
516 return bus_set_transient_exit_status(u, name, &s->restart_force_status, message, flags, error);
517
518 if (streq(name, "SuccessExitStatus"))
519 return bus_set_transient_exit_status(u, name, &s->success_status, message, flags, error);
520
521 ci = service_exec_command_from_string(name);
522 ci = (ci >= 0) ? ci : service_exec_ex_command_from_string(name);
523 if (ci >= 0)
524 return bus_set_transient_exec_command(u, name, &s->exec_command[ci], message, flags, error);
525
526 if (streq(name, "StandardInputFileDescriptor"))
527 return bus_set_transient_std_fd(u, name, &s->stdin_fd, &s->exec_context.stdio_as_fds, message, flags, error);
528
529 if (streq(name, "StandardOutputFileDescriptor"))
530 return bus_set_transient_std_fd(u, name, &s->stdout_fd, &s->exec_context.stdio_as_fds, message, flags, error);
531
532 if (streq(name, "StandardErrorFileDescriptor"))
533 return bus_set_transient_std_fd(u, name, &s->stderr_fd, &s->exec_context.stdio_as_fds, message, flags, error);
534
535 return 0;
536 }
537
538 int bus_service_set_property(
539 Unit *u,
540 const char *name,
541 sd_bus_message *message,
542 UnitWriteFlags flags,
543 sd_bus_error *error) {
544
545 Service *s = SERVICE(u);
546 int r;
547
548 assert(s);
549 assert(name);
550 assert(message);
551
552 r = bus_cgroup_set_property(u, &s->cgroup_context, name, message, flags, error);
553 if (r != 0)
554 return r;
555
556 if (u->transient && u->load_state == UNIT_STUB) {
557 /* This is a transient unit, let's load a little more */
558
559 r = bus_service_set_transient_property(s, name, message, flags, error);
560 if (r != 0)
561 return r;
562
563 r = bus_exec_context_set_transient_property(u, &s->exec_context, name, message, flags, error);
564 if (r != 0)
565 return r;
566
567 r = bus_kill_context_set_transient_property(u, &s->kill_context, name, message, flags, error);
568 if (r != 0)
569 return r;
570 }
571
572 return 0;
573 }
574
575 int bus_service_commit_properties(Unit *u) {
576 assert(u);
577
578 unit_realize_cgroup(u);
579
580 return 0;
581 }