1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
5 #include "alloc-util.h"
7 #include "bus-get-properties.h"
8 #include "dbus-cgroup.h"
9 #include "dbus-execute.h"
10 #include "dbus-kill.h"
11 #include "dbus-manager.h"
12 #include "dbus-service.h"
13 #include "dbus-util.h"
15 #include "exit-status.h"
18 #include "locale-util.h"
19 #include "mount-util.h"
20 #include "parse-util.h"
21 #include "path-util.h"
22 #include "selinux-access.h"
24 #include "signal-util.h"
25 #include "string-util.h"
29 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type
, service_type
, ServiceType
);
30 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_exit_type
, service_exit_type
, ServiceExitType
);
31 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_result
, service_result
, ServiceResult
);
32 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_restart
, service_restart
, ServiceRestart
);
33 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_notify_access
, notify_access
, NotifyAccess
);
34 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_emergency_action
, emergency_action
, EmergencyAction
);
35 static BUS_DEFINE_PROPERTY_GET(property_get_timeout_abort_usec
, "t", Service
, service_timeout_abort_usec
);
36 static BUS_DEFINE_PROPERTY_GET(property_get_watchdog_usec
, "t", Service
, service_get_watchdog_usec
);
37 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_timeout_failure_mode
, service_timeout_failure_mode
, ServiceTimeoutFailureMode
);
39 static int property_get_exit_status_set(
42 const char *interface
,
44 sd_bus_message
*reply
,
46 sd_bus_error
*error
) {
48 const ExitStatusSet
*status_set
= userdata
;
56 r
= sd_bus_message_open_container(reply
, 'r', "aiai");
60 r
= sd_bus_message_open_container(reply
, 'a', "i");
64 BITMAP_FOREACH(n
, &status_set
->status
) {
67 r
= sd_bus_message_append_basic(reply
, 'i', &n
);
72 r
= sd_bus_message_close_container(reply
);
76 r
= sd_bus_message_open_container(reply
, 'a', "i");
80 BITMAP_FOREACH(n
, &status_set
->signal
) {
83 str
= signal_to_string(n
);
87 r
= sd_bus_message_append_basic(reply
, 'i', &n
);
92 r
= sd_bus_message_close_container(reply
);
96 return sd_bus_message_close_container(reply
);
99 static int bus_service_method_mount(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
, bool is_image
) {
100 _cleanup_(mount_options_free_allp
) MountOptions
*options
= NULL
;
101 const char *dest
, *src
, *propagate_directory
;
102 int read_only
, make_file_or_directory
;
111 if (!MANAGER_IS_SYSTEM(u
->manager
))
112 return sd_bus_error_setf(error
, SD_BUS_ERROR_NOT_SUPPORTED
, "Adding bind mounts at runtime is only supported for system managers.");
114 r
= mac_selinux_unit_access_check(u
, message
, "start", error
);
118 r
= sd_bus_message_read(message
, "ssbb", &src
, &dest
, &read_only
, &make_file_or_directory
);
122 if (!path_is_absolute(src
) || !path_is_normalized(src
))
123 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Source path must be absolute and normalized.");
125 if (!is_image
&& isempty(dest
))
127 else if (!path_is_absolute(dest
) || !path_is_normalized(dest
))
128 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Destination path must be absolute and normalized.");
131 r
= bus_read_mount_options(message
, error
, &options
, NULL
, "");
136 r
= bus_verify_manage_units_async_full(
138 is_image
? "mount-image" : "bind-mount",
140 N_("Authentication is required to mount on '$(unit)'."),
147 return 1; /* No authorization for now, but the async polkit stuff will call us again when it has it */
149 if (u
->type
!= UNIT_SERVICE
)
150 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unit is not of type .service");
152 /* If it would be dropped at startup time, return an error. The context should always be available, but
153 * there's an assert in exec_needs_mount_namespace, so double-check just in case. */
154 c
= unit_get_exec_context(u
);
156 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Cannot access unit execution context");
157 if (path_startswith_strv(dest
, c
->inaccessible_paths
))
158 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "%s is not accessible to this unit", dest
);
160 /* Ensure that the unit was started in a private mount namespace */
161 if (!exec_needs_mount_namespace(c
, NULL
, unit_get_exec_runtime(u
)))
162 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unit not running in private mount namespace, cannot activate bind mount");
164 unit_pid
= unit_main_pid(u
);
165 if (unit_pid
== 0 || !UNIT_IS_ACTIVE_OR_RELOADING(unit_active_state(u
)))
166 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unit is not running");
168 propagate_directory
= strjoina("/run/systemd/propagate/", u
->id
);
170 r
= mount_image_in_namespace(unit_pid
,
172 "/run/systemd/incoming/",
173 src
, dest
, read_only
, make_file_or_directory
, options
);
175 r
= bind_mount_in_namespace(unit_pid
,
177 "/run/systemd/incoming/",
178 src
, dest
, read_only
, make_file_or_directory
);
180 return sd_bus_error_set_errnof(error
, r
, "Failed to mount %s on %s in unit's namespace: %m", src
, dest
);
182 return sd_bus_reply_method_return(message
, NULL
);
185 int bus_service_method_bind_mount(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
186 return bus_service_method_mount(message
, userdata
, error
, false);
189 int bus_service_method_mount_image(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
190 return bus_service_method_mount(message
, userdata
, error
, true);
193 const sd_bus_vtable bus_service_vtable
[] = {
194 SD_BUS_VTABLE_START(0),
195 SD_BUS_PROPERTY("Type", "s", property_get_type
, offsetof(Service
, type
), SD_BUS_VTABLE_PROPERTY_CONST
),
196 SD_BUS_PROPERTY("ExitType", "s", property_get_exit_type
, offsetof(Service
, exit_type
), SD_BUS_VTABLE_PROPERTY_CONST
),
197 SD_BUS_PROPERTY("Restart", "s", property_get_restart
, offsetof(Service
, restart
), SD_BUS_VTABLE_PROPERTY_CONST
),
198 SD_BUS_PROPERTY("PIDFile", "s", NULL
, offsetof(Service
, pid_file
), SD_BUS_VTABLE_PROPERTY_CONST
),
199 SD_BUS_PROPERTY("NotifyAccess", "s", property_get_notify_access
, offsetof(Service
, notify_access
), SD_BUS_VTABLE_PROPERTY_CONST
),
200 SD_BUS_PROPERTY("RestartUSec", "t", bus_property_get_usec
, offsetof(Service
, restart_usec
), SD_BUS_VTABLE_PROPERTY_CONST
),
201 SD_BUS_PROPERTY("TimeoutStartUSec", "t", bus_property_get_usec
, offsetof(Service
, timeout_start_usec
), SD_BUS_VTABLE_PROPERTY_CONST
),
202 SD_BUS_PROPERTY("TimeoutStopUSec", "t", bus_property_get_usec
, offsetof(Service
, timeout_stop_usec
), SD_BUS_VTABLE_PROPERTY_CONST
),
203 SD_BUS_PROPERTY("TimeoutAbortUSec", "t", property_get_timeout_abort_usec
, 0, 0),
204 SD_BUS_PROPERTY("TimeoutStartFailureMode", "s", property_get_timeout_failure_mode
, offsetof(Service
, timeout_start_failure_mode
), SD_BUS_VTABLE_PROPERTY_CONST
),
205 SD_BUS_PROPERTY("TimeoutStopFailureMode", "s", property_get_timeout_failure_mode
, offsetof(Service
, timeout_stop_failure_mode
), SD_BUS_VTABLE_PROPERTY_CONST
),
206 SD_BUS_PROPERTY("RuntimeMaxUSec", "t", bus_property_get_usec
, offsetof(Service
, runtime_max_usec
), SD_BUS_VTABLE_PROPERTY_CONST
),
207 SD_BUS_PROPERTY("WatchdogUSec", "t", property_get_watchdog_usec
, 0, 0),
208 BUS_PROPERTY_DUAL_TIMESTAMP("WatchdogTimestamp", offsetof(Service
, watchdog_timestamp
), 0),
209 SD_BUS_PROPERTY("PermissionsStartOnly", "b", bus_property_get_bool
, offsetof(Service
, permissions_start_only
), SD_BUS_VTABLE_PROPERTY_CONST
|SD_BUS_VTABLE_HIDDEN
), /* 😷 deprecated */
210 SD_BUS_PROPERTY("RootDirectoryStartOnly", "b", bus_property_get_bool
, offsetof(Service
, root_directory_start_only
), SD_BUS_VTABLE_PROPERTY_CONST
),
211 SD_BUS_PROPERTY("RemainAfterExit", "b", bus_property_get_bool
, offsetof(Service
, remain_after_exit
), SD_BUS_VTABLE_PROPERTY_CONST
),
212 SD_BUS_PROPERTY("GuessMainPID", "b", bus_property_get_bool
, offsetof(Service
, guess_main_pid
), SD_BUS_VTABLE_PROPERTY_CONST
),
213 SD_BUS_PROPERTY("RestartPreventExitStatus", "(aiai)", property_get_exit_status_set
, offsetof(Service
, restart_prevent_status
), SD_BUS_VTABLE_PROPERTY_CONST
),
214 SD_BUS_PROPERTY("RestartForceExitStatus", "(aiai)", property_get_exit_status_set
, offsetof(Service
, restart_force_status
), SD_BUS_VTABLE_PROPERTY_CONST
),
215 SD_BUS_PROPERTY("SuccessExitStatus", "(aiai)", property_get_exit_status_set
, offsetof(Service
, success_status
), SD_BUS_VTABLE_PROPERTY_CONST
),
216 SD_BUS_PROPERTY("MainPID", "u", bus_property_get_pid
, offsetof(Service
, main_pid
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
217 SD_BUS_PROPERTY("ControlPID", "u", bus_property_get_pid
, offsetof(Service
, control_pid
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
218 SD_BUS_PROPERTY("BusName", "s", NULL
, offsetof(Service
, bus_name
), SD_BUS_VTABLE_PROPERTY_CONST
),
219 SD_BUS_PROPERTY("FileDescriptorStoreMax", "u", bus_property_get_unsigned
, offsetof(Service
, n_fd_store_max
), SD_BUS_VTABLE_PROPERTY_CONST
),
220 SD_BUS_PROPERTY("NFileDescriptorStore", "u", bus_property_get_unsigned
, offsetof(Service
, n_fd_store
), 0),
221 SD_BUS_PROPERTY("StatusText", "s", NULL
, offsetof(Service
, status_text
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
222 SD_BUS_PROPERTY("StatusErrno", "i", bus_property_get_int
, offsetof(Service
, status_errno
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
223 SD_BUS_PROPERTY("Result", "s", property_get_result
, offsetof(Service
, result
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
224 SD_BUS_PROPERTY("ReloadResult", "s", property_get_result
, offsetof(Service
, reload_result
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
225 SD_BUS_PROPERTY("CleanResult", "s", property_get_result
, offsetof(Service
, clean_result
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
226 SD_BUS_PROPERTY("USBFunctionDescriptors", "s", NULL
, offsetof(Service
, usb_function_descriptors
), SD_BUS_VTABLE_PROPERTY_CONST
),
227 SD_BUS_PROPERTY("USBFunctionStrings", "s", NULL
, offsetof(Service
, usb_function_strings
), SD_BUS_VTABLE_PROPERTY_CONST
),
228 SD_BUS_PROPERTY("UID", "u", bus_property_get_uid
, offsetof(Unit
, ref_uid
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
229 SD_BUS_PROPERTY("GID", "u", bus_property_get_gid
, offsetof(Unit
, ref_gid
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
230 SD_BUS_PROPERTY("NRestarts", "u", bus_property_get_unsigned
, offsetof(Service
, n_restarts
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
231 SD_BUS_PROPERTY("OOMPolicy", "s", bus_property_get_oom_policy
, offsetof(Service
, oom_policy
), SD_BUS_VTABLE_PROPERTY_CONST
),
233 BUS_EXEC_STATUS_VTABLE("ExecMain", offsetof(Service
, main_exec_status
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
234 BUS_EXEC_COMMAND_LIST_VTABLE("ExecCondition", offsetof(Service
, exec_command
[SERVICE_EXEC_CONDITION
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
235 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecConditionEx", offsetof(Service
, exec_command
[SERVICE_EXEC_CONDITION
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
236 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStartPre", offsetof(Service
, exec_command
[SERVICE_EXEC_START_PRE
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
237 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartPreEx", offsetof(Service
, exec_command
[SERVICE_EXEC_START_PRE
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
238 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStart", offsetof(Service
, exec_command
[SERVICE_EXEC_START
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
239 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartEx", offsetof(Service
, exec_command
[SERVICE_EXEC_START
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
240 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStartPost", offsetof(Service
, exec_command
[SERVICE_EXEC_START_POST
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
241 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartPostEx", offsetof(Service
, exec_command
[SERVICE_EXEC_START_POST
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
242 BUS_EXEC_COMMAND_LIST_VTABLE("ExecReload", offsetof(Service
, exec_command
[SERVICE_EXEC_RELOAD
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
243 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecReloadEx", offsetof(Service
, exec_command
[SERVICE_EXEC_RELOAD
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
244 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStop", offsetof(Service
, exec_command
[SERVICE_EXEC_STOP
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
245 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStopEx", offsetof(Service
, exec_command
[SERVICE_EXEC_STOP
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
246 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStopPost", offsetof(Service
, exec_command
[SERVICE_EXEC_STOP_POST
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
247 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStopPostEx", offsetof(Service
, exec_command
[SERVICE_EXEC_STOP_POST
]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION
),
249 SD_BUS_METHOD_WITH_NAMES("BindMount",
252 SD_BUS_PARAM(destination
)
253 SD_BUS_PARAM(read_only
)
256 bus_service_method_bind_mount
,
257 SD_BUS_VTABLE_UNPRIVILEGED
),
259 SD_BUS_METHOD_WITH_NAMES("MountImage",
262 SD_BUS_PARAM(destination
)
263 SD_BUS_PARAM(read_only
)
265 SD_BUS_PARAM(options
),
267 bus_service_method_mount_image
,
268 SD_BUS_VTABLE_UNPRIVILEGED
),
270 /* The following four are obsolete, and thus marked hidden here. They moved into the Unit interface */
271 SD_BUS_PROPERTY("StartLimitInterval", "t", bus_property_get_usec
, offsetof(Unit
, start_ratelimit
.interval
), SD_BUS_VTABLE_PROPERTY_CONST
|SD_BUS_VTABLE_HIDDEN
),
272 SD_BUS_PROPERTY("StartLimitBurst", "u", bus_property_get_unsigned
, offsetof(Unit
, start_ratelimit
.burst
), SD_BUS_VTABLE_PROPERTY_CONST
|SD_BUS_VTABLE_HIDDEN
),
273 SD_BUS_PROPERTY("StartLimitAction", "s", property_get_emergency_action
, offsetof(Unit
, start_limit_action
), SD_BUS_VTABLE_PROPERTY_CONST
|SD_BUS_VTABLE_HIDDEN
),
274 SD_BUS_PROPERTY("FailureAction", "s", property_get_emergency_action
, offsetof(Unit
, failure_action
), SD_BUS_VTABLE_PROPERTY_CONST
|SD_BUS_VTABLE_HIDDEN
),
275 SD_BUS_PROPERTY("RebootArgument", "s", NULL
, offsetof(Unit
, reboot_arg
), SD_BUS_VTABLE_PROPERTY_CONST
|SD_BUS_VTABLE_HIDDEN
),
279 static int bus_set_transient_exit_status(
282 ExitStatusSet
*status_set
,
283 sd_bus_message
*message
,
284 UnitWriteFlags flags
,
285 sd_bus_error
*error
) {
287 const int32_t *status
, *signal
;
288 size_t n_status
, n_signal
, i
;
291 r
= sd_bus_message_enter_container(message
, 'r', "aiai");
295 r
= sd_bus_message_read_array(message
, 'i', (const void **) &status
, &n_status
);
299 r
= sd_bus_message_read_array(message
, 'i', (const void **) &signal
, &n_signal
);
303 r
= sd_bus_message_exit_container(message
);
307 n_status
/= sizeof(int32_t);
308 n_signal
/= sizeof(int32_t);
310 if (n_status
== 0 && n_signal
== 0 && !UNIT_WRITE_FLAGS_NOOP(flags
)) {
311 exit_status_set_free(status_set
);
312 unit_write_settingf(u
, flags
, name
, "%s=", name
);
316 for (i
= 0; i
< n_status
; i
++) {
317 if (status
[i
] < 0 || status
[i
] > 255)
318 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid status code in %s: %"PRIi32
, name
, status
[i
]);
320 if (!UNIT_WRITE_FLAGS_NOOP(flags
)) {
321 r
= bitmap_set(&status_set
->status
, status
[i
]);
325 unit_write_settingf(u
, flags
, name
, "%s=%"PRIi32
, name
, status
[i
]);
329 for (i
= 0; i
< n_signal
; i
++) {
332 str
= signal_to_string((int) signal
[i
]);
334 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid signal in %s: %"PRIi32
, name
, signal
[i
]);
336 if (!UNIT_WRITE_FLAGS_NOOP(flags
)) {
337 r
= bitmap_set(&status_set
->signal
, signal
[i
]);
341 unit_write_settingf(u
, flags
, name
, "%s=%s", name
, str
);
348 static int bus_set_transient_std_fd(
353 sd_bus_message
*message
,
354 UnitWriteFlags flags
,
355 sd_bus_error
*error
) {
362 r
= sd_bus_message_read(message
, "h", &fd
);
366 if (!UNIT_WRITE_FLAGS_NOOP(flags
)) {
369 copy
= fcntl(fd
, F_DUPFD_CLOEXEC
, 3);
373 asynchronous_close(*p
);
380 static BUS_DEFINE_SET_TRANSIENT_PARSE(notify_access
, NotifyAccess
, notify_access_from_string
);
381 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_type
, ServiceType
, service_type_from_string
);
382 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_exit_type
, ServiceExitType
, service_exit_type_from_string
);
383 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_restart
, ServiceRestart
, service_restart_from_string
);
384 static BUS_DEFINE_SET_TRANSIENT_PARSE(oom_policy
, OOMPolicy
, oom_policy_from_string
);
385 static BUS_DEFINE_SET_TRANSIENT_STRING_WITH_CHECK(bus_name
, sd_bus_service_name_is_valid
);
386 static BUS_DEFINE_SET_TRANSIENT_PARSE(timeout_failure_mode
, ServiceTimeoutFailureMode
, service_timeout_failure_mode_from_string
);
388 static int bus_service_set_transient_property(
391 sd_bus_message
*message
,
392 UnitWriteFlags flags
,
393 sd_bus_error
*error
) {
396 ServiceExecCommand ci
;
403 flags
|= UNIT_PRIVATE
;
405 if (streq(name
, "PermissionsStartOnly"))
406 return bus_set_transient_bool(u
, name
, &s
->permissions_start_only
, message
, flags
, error
);
408 if (streq(name
, "RootDirectoryStartOnly"))
409 return bus_set_transient_bool(u
, name
, &s
->root_directory_start_only
, message
, flags
, error
);
411 if (streq(name
, "RemainAfterExit"))
412 return bus_set_transient_bool(u
, name
, &s
->remain_after_exit
, message
, flags
, error
);
414 if (streq(name
, "GuessMainPID"))
415 return bus_set_transient_bool(u
, name
, &s
->guess_main_pid
, message
, flags
, error
);
417 if (streq(name
, "Type"))
418 return bus_set_transient_service_type(u
, name
, &s
->type
, message
, flags
, error
);
420 if (streq(name
, "ExitType"))
421 return bus_set_transient_service_exit_type(u
, name
, &s
->exit_type
, message
, flags
, error
);
423 if (streq(name
, "OOMPolicy"))
424 return bus_set_transient_oom_policy(u
, name
, &s
->oom_policy
, message
, flags
, error
);
426 if (streq(name
, "RestartUSec"))
427 return bus_set_transient_usec(u
, name
, &s
->restart_usec
, message
, flags
, error
);
429 if (streq(name
, "TimeoutStartUSec")) {
430 r
= bus_set_transient_usec(u
, name
, &s
->timeout_start_usec
, message
, flags
, error
);
431 if (r
>= 0 && !UNIT_WRITE_FLAGS_NOOP(flags
))
432 s
->start_timeout_defined
= true;
437 if (streq(name
, "TimeoutStopUSec"))
438 return bus_set_transient_usec(u
, name
, &s
->timeout_stop_usec
, message
, flags
, error
);
440 if (streq(name
, "TimeoutAbortUSec")) {
441 r
= bus_set_transient_usec(u
, name
, &s
->timeout_abort_usec
, message
, flags
, error
);
442 if (r
>= 0 && !UNIT_WRITE_FLAGS_NOOP(flags
))
443 s
->timeout_abort_set
= true;
447 if (streq(name
, "TimeoutStartFailureMode"))
448 return bus_set_transient_timeout_failure_mode(u
, name
, &s
->timeout_start_failure_mode
, message
, flags
, error
);
450 if (streq(name
, "TimeoutStopFailureMode"))
451 return bus_set_transient_timeout_failure_mode(u
, name
, &s
->timeout_stop_failure_mode
, message
, flags
, error
);
453 if (streq(name
, "RuntimeMaxUSec"))
454 return bus_set_transient_usec(u
, name
, &s
->runtime_max_usec
, message
, flags
, error
);
456 if (streq(name
, "WatchdogUSec"))
457 return bus_set_transient_usec(u
, name
, &s
->watchdog_usec
, message
, flags
, error
);
459 if (streq(name
, "FileDescriptorStoreMax"))
460 return bus_set_transient_unsigned(u
, name
, &s
->n_fd_store_max
, message
, flags
, error
);
462 if (streq(name
, "NotifyAccess"))
463 return bus_set_transient_notify_access(u
, name
, &s
->notify_access
, message
, flags
, error
);
465 if (streq(name
, "PIDFile")) {
466 _cleanup_free_
char *n
= NULL
;
469 r
= sd_bus_message_read(message
, "s", &v
);
474 n
= path_make_absolute(v
, u
->manager
->prefix
[EXEC_DIRECTORY_RUNTIME
]);
478 path_simplify(n
, true);
480 if (!path_is_normalized(n
))
481 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "PIDFile= path '%s' is not valid", n
);
483 e
= path_startswith(n
, "/var/run/");
487 z
= path_join("/run", e
);
491 if (!UNIT_WRITE_FLAGS_NOOP(flags
))
492 log_unit_notice(u
, "Transient unit's PIDFile= property references path below legacy directory /var/run, updating %s → %s; please update client accordingly.", n
, z
);
494 free_and_replace(n
, z
);
498 if (!UNIT_WRITE_FLAGS_NOOP(flags
)) {
499 free_and_replace(s
->pid_file
, n
);
500 unit_write_settingf(u
, flags
, name
, "%s=%s", name
, strempty(s
->pid_file
));
506 if (streq(name
, "USBFunctionDescriptors"))
507 return bus_set_transient_path(u
, name
, &s
->usb_function_descriptors
, message
, flags
, error
);
509 if (streq(name
, "USBFunctionStrings"))
510 return bus_set_transient_path(u
, name
, &s
->usb_function_strings
, message
, flags
, error
);
512 if (streq(name
, "BusName"))
513 return bus_set_transient_bus_name(u
, name
, &s
->bus_name
, message
, flags
, error
);
515 if (streq(name
, "Restart"))
516 return bus_set_transient_service_restart(u
, name
, &s
->restart
, message
, flags
, error
);
518 if (streq(name
, "RestartPreventExitStatus"))
519 return bus_set_transient_exit_status(u
, name
, &s
->restart_prevent_status
, message
, flags
, error
);
521 if (streq(name
, "RestartForceExitStatus"))
522 return bus_set_transient_exit_status(u
, name
, &s
->restart_force_status
, message
, flags
, error
);
524 if (streq(name
, "SuccessExitStatus"))
525 return bus_set_transient_exit_status(u
, name
, &s
->success_status
, message
, flags
, error
);
527 ci
= service_exec_command_from_string(name
);
528 ci
= (ci
>= 0) ? ci
: service_exec_ex_command_from_string(name
);
530 return bus_set_transient_exec_command(u
, name
, &s
->exec_command
[ci
], message
, flags
, error
);
532 if (streq(name
, "StandardInputFileDescriptor"))
533 return bus_set_transient_std_fd(u
, name
, &s
->stdin_fd
, &s
->exec_context
.stdio_as_fds
, message
, flags
, error
);
535 if (streq(name
, "StandardOutputFileDescriptor"))
536 return bus_set_transient_std_fd(u
, name
, &s
->stdout_fd
, &s
->exec_context
.stdio_as_fds
, message
, flags
, error
);
538 if (streq(name
, "StandardErrorFileDescriptor"))
539 return bus_set_transient_std_fd(u
, name
, &s
->stderr_fd
, &s
->exec_context
.stdio_as_fds
, message
, flags
, error
);
544 int bus_service_set_property(
547 sd_bus_message
*message
,
548 UnitWriteFlags flags
,
549 sd_bus_error
*error
) {
551 Service
*s
= SERVICE(u
);
558 r
= bus_cgroup_set_property(u
, &s
->cgroup_context
, name
, message
, flags
, error
);
562 if (u
->transient
&& u
->load_state
== UNIT_STUB
) {
563 /* This is a transient unit, let's load a little more */
565 r
= bus_service_set_transient_property(s
, name
, message
, flags
, error
);
569 r
= bus_exec_context_set_transient_property(u
, &s
->exec_context
, name
, message
, flags
, error
);
573 r
= bus_kill_context_set_transient_property(u
, &s
->kill_context
, name
, message
, flags
, error
);
581 int bus_service_commit_properties(Unit
*u
) {
584 unit_realize_cgroup(u
);