1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
8 #include "alloc-util.h"
9 #include "bus-common-errors.h"
10 #include "bus-get-properties.h"
11 #include "bus-log-control-api.h"
12 #include "bus-polkit.h"
16 #include "hostname-util.h"
17 #include "import-util.h"
18 #include "machine-pool.h"
19 #include "main-func.h"
20 #include "missing_capability.h"
22 #include "parse-util.h"
23 #include "path-util.h"
24 #include "process-util.h"
25 #include "service-util.h"
26 #include "signal-util.h"
27 #include "socket-util.h"
28 #include "stat-util.h"
29 #include "string-table.h"
31 #include "syslog-util.h"
32 #include "user-util.h"
36 typedef struct Transfer Transfer
;
37 typedef struct Manager Manager
;
39 typedef enum TransferType
{
48 _TRANSFER_TYPE_INVALID
= -1,
71 char log_message
[LINE_MAX
];
72 size_t log_message_size
;
74 sd_event_source
*pid_event_source
;
75 sd_event_source
*log_event_source
;
78 unsigned progress_percent
;
88 uint32_t current_transfer_id
;
91 Hashmap
*polkit_registry
;
95 sd_event_source
*notify_event_source
;
98 #define TRANSFERS_MAX 64
100 static const char* const transfer_type_table
[_TRANSFER_TYPE_MAX
] = {
101 [TRANSFER_IMPORT_TAR
] = "import-tar",
102 [TRANSFER_IMPORT_RAW
] = "import-raw",
103 [TRANSFER_IMPORT_FS
] = "import-fs",
104 [TRANSFER_EXPORT_TAR
] = "export-tar",
105 [TRANSFER_EXPORT_RAW
] = "export-raw",
106 [TRANSFER_PULL_TAR
] = "pull-tar",
107 [TRANSFER_PULL_RAW
] = "pull-raw",
110 DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(transfer_type
, TransferType
);
112 static Transfer
*transfer_unref(Transfer
*t
) {
117 hashmap_remove(t
->manager
->transfers
, UINT32_TO_PTR(t
->id
));
119 sd_event_source_unref(t
->pid_event_source
);
120 sd_event_source_unref(t
->log_event_source
);
125 free(t
->object_path
);
128 (void) kill_and_sigcont(t
->pid
, SIGKILL
);
129 (void) wait_for_terminate(t
->pid
, NULL
);
132 safe_close(t
->log_fd
);
133 safe_close(t
->stdin_fd
);
134 safe_close(t
->stdout_fd
);
139 DEFINE_TRIVIAL_CLEANUP_FUNC(Transfer
*, transfer_unref
);
141 static int transfer_new(Manager
*m
, Transfer
**ret
) {
142 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
149 if (hashmap_size(m
->transfers
) >= TRANSFERS_MAX
)
152 r
= hashmap_ensure_allocated(&m
->transfers
, &trivial_hash_ops
);
156 t
= new(Transfer
, 1);
161 .type
= _TRANSFER_TYPE_INVALID
,
165 .verify
= _IMPORT_VERIFY_INVALID
,
166 .progress_percent
= (unsigned) -1,
169 id
= m
->current_transfer_id
+ 1;
171 if (asprintf(&t
->object_path
, "/org/freedesktop/import1/transfer/_%" PRIu32
, id
) < 0)
174 r
= hashmap_put(m
->transfers
, UINT32_TO_PTR(id
), t
);
178 m
->current_transfer_id
= id
;
188 static double transfer_percent_as_double(Transfer
*t
) {
191 if (t
->progress_percent
== (unsigned) -1)
194 return (double) t
->progress_percent
/ 100.0;
197 static void transfer_send_log_line(Transfer
*t
, const char *line
) {
198 int r
, priority
= LOG_INFO
;
203 syslog_parse_priority(&line
, &priority
, true);
205 log_full(priority
, "(transfer%" PRIu32
") %s", t
->id
, line
);
207 r
= sd_bus_emit_signal(
210 "org.freedesktop.import1.Transfer",
216 log_warning_errno(r
, "Cannot emit log message signal, ignoring: %m");
219 static void transfer_send_logs(Transfer
*t
, bool flush
) {
222 /* Try to send out all log messages, if we can. But if we
223 * can't we remove the messages from the buffer, but don't
226 while (t
->log_message_size
> 0) {
227 _cleanup_free_
char *n
= NULL
;
230 if (t
->log_message_size
>= sizeof(t
->log_message
))
231 e
= t
->log_message
+ sizeof(t
->log_message
);
235 a
= memchr(t
->log_message
, 0, t
->log_message_size
);
236 b
= memchr(t
->log_message
, '\n', t
->log_message_size
);
250 e
= t
->log_message
+ t
->log_message_size
;
253 n
= strndup(t
->log_message
, e
- t
->log_message
);
255 /* Skip over NUL and newlines */
256 while (e
< t
->log_message
+ t
->log_message_size
&& IN_SET(*e
, 0, '\n'))
259 memmove(t
->log_message
, e
, t
->log_message
+ sizeof(t
->log_message
) - e
);
260 t
->log_message_size
-= e
- t
->log_message
;
270 transfer_send_log_line(t
, n
);
274 static int transfer_finalize(Transfer
*t
, bool success
) {
279 transfer_send_logs(t
, true);
281 r
= sd_bus_emit_signal(
283 "/org/freedesktop/import1",
284 "org.freedesktop.import1.Manager",
290 t
->n_canceled
> 0 ? "canceled" : "failed");
293 log_error_errno(r
, "Cannot emit message: %m");
299 static int transfer_cancel(Transfer
*t
) {
304 r
= kill_and_sigcont(t
->pid
, t
->n_canceled
< 3 ? SIGTERM
: SIGKILL
);
312 static int transfer_on_pid(sd_event_source
*s
, const siginfo_t
*si
, void *userdata
) {
313 Transfer
*t
= userdata
;
314 bool success
= false;
319 if (si
->si_code
== CLD_EXITED
) {
320 if (si
->si_status
!= 0)
321 log_error("Transfer process failed with exit code %i.", si
->si_status
);
323 log_debug("Transfer process succeeded.");
327 } else if (IN_SET(si
->si_code
, CLD_KILLED
, CLD_DUMPED
))
328 log_error("Transfer process terminated by signal %s.", signal_to_string(si
->si_status
));
330 log_error("Transfer process failed due to unknown reason.");
334 return transfer_finalize(t
, success
);
337 static int transfer_on_log(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
338 Transfer
*t
= userdata
;
344 l
= read(fd
, t
->log_message
+ t
->log_message_size
, sizeof(t
->log_message
) - t
->log_message_size
);
346 log_error_errno(errno
, "Failed to read log message: %m");
348 /* EOF/read error. We just close the pipe here, and
349 * close the watch, waiting for the SIGCHLD to arrive,
350 * before we do anything else. */
351 t
->log_event_source
= sd_event_source_unref(t
->log_event_source
);
355 t
->log_message_size
+= l
;
357 transfer_send_logs(t
, false);
362 static int transfer_start(Transfer
*t
) {
363 _cleanup_close_pair_
int pipefd
[2] = { -1, -1 };
369 if (pipe2(pipefd
, O_CLOEXEC
) < 0)
372 r
= safe_fork("(sd-transfer)", FORK_RESET_SIGNALS
|FORK_DEATHSIG
, &t
->pid
);
376 const char *cmd
[] = {
377 NULL
, /* systemd-import, systemd-import-fs, systemd-export or systemd-pull */
379 NULL
, /* --verify= */
380 NULL
, /* verify argument */
381 NULL
, /* maybe --force */
382 NULL
, /* maybe --read-only */
383 NULL
, /* if so: the actual URL */
384 NULL
, /* maybe --format= */
385 NULL
, /* if so: the actual format */
394 pipefd
[0] = safe_close(pipefd
[0]);
396 r
= rearrange_stdio(t
->stdin_fd
,
397 t
->stdout_fd
< 0 ? pipefd
[1] : t
->stdout_fd
,
400 log_error_errno(r
, "Failed to set stdin/stdout/stderr: %m");
404 if (setenv("SYSTEMD_LOG_TARGET", "console-prefixed", 1) < 0 ||
405 setenv("NOTIFY_SOCKET", "/run/systemd/import/notify", 1) < 0) {
406 log_error_errno(errno
, "setenv() failed: %m");
412 case TRANSFER_IMPORT_TAR
:
413 case TRANSFER_IMPORT_RAW
:
414 cmd
[k
++] = SYSTEMD_IMPORT_PATH
;
417 case TRANSFER_IMPORT_FS
:
418 cmd
[k
++] = SYSTEMD_IMPORT_FS_PATH
;
421 case TRANSFER_EXPORT_TAR
:
422 case TRANSFER_EXPORT_RAW
:
423 cmd
[k
++] = SYSTEMD_EXPORT_PATH
;
426 case TRANSFER_PULL_TAR
:
427 case TRANSFER_PULL_RAW
:
428 cmd
[k
++] = SYSTEMD_PULL_PATH
;
432 assert_not_reached("Unexpected transfer type");
437 case TRANSFER_IMPORT_TAR
:
438 case TRANSFER_EXPORT_TAR
:
439 case TRANSFER_PULL_TAR
:
443 case TRANSFER_IMPORT_RAW
:
444 case TRANSFER_EXPORT_RAW
:
445 case TRANSFER_PULL_RAW
:
449 case TRANSFER_IMPORT_FS
:
457 if (t
->verify
!= _IMPORT_VERIFY_INVALID
) {
458 cmd
[k
++] = "--verify";
459 cmd
[k
++] = import_verify_to_string(t
->verify
);
463 cmd
[k
++] = "--force";
465 cmd
[k
++] = "--read-only";
468 cmd
[k
++] = "--format";
469 cmd
[k
++] = t
->format
;
472 if (!IN_SET(t
->type
, TRANSFER_EXPORT_TAR
, TRANSFER_EXPORT_RAW
)) {
474 cmd
[k
++] = t
->remote
;
483 execv(cmd
[0], (char * const *) cmd
);
484 log_error_errno(errno
, "Failed to execute %s tool: %m", cmd
[0]);
488 pipefd
[1] = safe_close(pipefd
[1]);
489 t
->log_fd
= TAKE_FD(pipefd
[0]);
491 t
->stdin_fd
= safe_close(t
->stdin_fd
);
493 r
= sd_event_add_child(t
->manager
->event
, &t
->pid_event_source
,
494 t
->pid
, WEXITED
, transfer_on_pid
, t
);
498 r
= sd_event_add_io(t
->manager
->event
, &t
->log_event_source
,
499 t
->log_fd
, EPOLLIN
, transfer_on_log
, t
);
503 /* Make sure always process logging before SIGCHLD */
504 r
= sd_event_source_set_priority(t
->log_event_source
, SD_EVENT_PRIORITY_NORMAL
-5);
508 r
= sd_bus_emit_signal(
510 "/org/freedesktop/import1",
511 "org.freedesktop.import1.Manager",
522 static Manager
*manager_unref(Manager
*m
) {
528 sd_event_source_unref(m
->notify_event_source
);
529 safe_close(m
->notify_fd
);
531 while ((t
= hashmap_first(m
->transfers
)))
534 hashmap_free(m
->transfers
);
536 bus_verify_polkit_async_registry_free(m
->polkit_registry
);
538 m
->bus
= sd_bus_flush_close_unref(m
->bus
);
539 sd_event_unref(m
->event
);
544 DEFINE_TRIVIAL_CLEANUP_FUNC(Manager
*, manager_unref
);
546 static int manager_on_notify(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
548 char buf
[NOTIFY_BUFFER_MAX
+1];
549 struct iovec iovec
= {
551 .iov_len
= sizeof(buf
)-1,
553 CMSG_BUFFER_TYPE(CMSG_SPACE(sizeof(struct ucred
)) +
554 CMSG_SPACE(sizeof(int) * NOTIFY_FD_MAX
)) control
;
555 struct msghdr msghdr
= {
558 .msg_control
= &control
,
559 .msg_controllen
= sizeof(control
),
562 Manager
*m
= userdata
;
568 n
= recvmsg_safe(fd
, &msghdr
, MSG_DONTWAIT
|MSG_CMSG_CLOEXEC
);
569 if (IN_SET(n
, -EAGAIN
, -EINTR
))
574 cmsg_close_all(&msghdr
);
576 if (msghdr
.msg_flags
& MSG_TRUNC
) {
577 log_warning("Got overly long notification datagram, ignoring.");
581 ucred
= CMSG_FIND_DATA(&msghdr
, SOL_SOCKET
, SCM_CREDENTIALS
, struct ucred
);
582 if (!ucred
|| ucred
->pid
<= 0) {
583 log_warning("Got notification datagram lacking credential information, ignoring.");
587 HASHMAP_FOREACH(t
, m
->transfers
)
588 if (ucred
->pid
== t
->pid
)
592 log_warning("Got notification datagram from unexpected peer, ignoring.");
598 p
= startswith(buf
, "X_IMPORT_PROGRESS=");
600 p
= strstr(buf
, "\nX_IMPORT_PROGRESS=");
607 e
= strchrnul(p
, '\n');
610 r
= parse_percent(p
);
612 log_warning("Got invalid percent value, ignoring.");
616 t
->progress_percent
= (unsigned) r
;
618 log_debug("Got percentage from client: %u%%", t
->progress_percent
);
622 static int manager_new(Manager
**ret
) {
623 _cleanup_(manager_unrefp
) Manager
*m
= NULL
;
624 static const union sockaddr_union sa
= {
625 .un
.sun_family
= AF_UNIX
,
626 .un
.sun_path
= "/run/systemd/import/notify",
632 m
= new0(Manager
, 1);
636 r
= sd_event_default(&m
->event
);
640 sd_event_set_watchdog(m
->event
, true);
642 r
= sd_bus_default_system(&m
->bus
);
646 m
->notify_fd
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
647 if (m
->notify_fd
< 0)
650 (void) mkdir_parents_label(sa
.un
.sun_path
, 0755);
651 (void) sockaddr_un_unlink(&sa
.un
);
653 if (bind(m
->notify_fd
, &sa
.sa
, SOCKADDR_UN_LEN(sa
.un
)) < 0)
656 r
= setsockopt_int(m
->notify_fd
, SOL_SOCKET
, SO_PASSCRED
, true);
660 r
= sd_event_add_io(m
->event
, &m
->notify_event_source
,
661 m
->notify_fd
, EPOLLIN
, manager_on_notify
, m
);
670 static Transfer
*manager_find(Manager
*m
, TransferType type
, const char *remote
) {
675 assert(type
< _TRANSFER_TYPE_MAX
);
677 HASHMAP_FOREACH(t
, m
->transfers
)
678 if (t
->type
== type
&& streq_ptr(t
->remote
, remote
))
684 static int method_import_tar_or_raw(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
685 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
686 int fd
, force
, read_only
, r
;
687 const char *local
, *object
;
688 Manager
*m
= userdata
;
696 r
= bus_verify_polkit_async(
699 "org.freedesktop.import1.import",
708 return 1; /* Will call us back */
710 r
= sd_bus_message_read(msg
, "hsbb", &fd
, &local
, &force
, &read_only
);
714 if (fstat(fd
, &st
) < 0)
717 if (!S_ISREG(st
.st_mode
) && !S_ISFIFO(st
.st_mode
))
720 if (!machine_name_is_valid(local
))
721 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
,
722 "Local name %s is invalid", local
);
724 r
= setup_machine_directory(error
);
728 type
= streq_ptr(sd_bus_message_get_member(msg
), "ImportTar") ?
729 TRANSFER_IMPORT_TAR
: TRANSFER_IMPORT_RAW
;
731 r
= transfer_new(m
, &t
);
736 t
->force_local
= force
;
737 t
->read_only
= read_only
;
739 t
->local
= strdup(local
);
743 t
->stdin_fd
= fcntl(fd
, F_DUPFD_CLOEXEC
, 3);
747 r
= transfer_start(t
);
751 object
= t
->object_path
;
755 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
758 static int method_import_fs(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
759 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
760 int fd
, force
, read_only
, r
;
761 const char *local
, *object
;
762 Manager
*m
= userdata
;
768 r
= bus_verify_polkit_async(
771 "org.freedesktop.import1.import",
780 return 1; /* Will call us back */
782 r
= sd_bus_message_read(msg
, "hsbb", &fd
, &local
, &force
, &read_only
);
786 r
= fd_verify_directory(fd
);
790 if (!machine_name_is_valid(local
))
791 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
,
792 "Local name %s is invalid", local
);
794 r
= setup_machine_directory(error
);
798 r
= transfer_new(m
, &t
);
802 t
->type
= TRANSFER_IMPORT_FS
;
803 t
->force_local
= force
;
804 t
->read_only
= read_only
;
806 t
->local
= strdup(local
);
810 t
->stdin_fd
= fcntl(fd
, F_DUPFD_CLOEXEC
, 3);
814 r
= transfer_start(t
);
818 object
= t
->object_path
;
822 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
825 static int method_export_tar_or_raw(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
826 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
828 const char *local
, *object
, *format
;
829 Manager
*m
= userdata
;
837 r
= bus_verify_polkit_async(
840 "org.freedesktop.import1.export",
849 return 1; /* Will call us back */
851 r
= sd_bus_message_read(msg
, "shs", &local
, &fd
, &format
);
855 if (!machine_name_is_valid(local
))
856 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
,
857 "Local name %s is invalid", local
);
859 if (fstat(fd
, &st
) < 0)
862 if (!S_ISREG(st
.st_mode
) && !S_ISFIFO(st
.st_mode
))
865 type
= streq_ptr(sd_bus_message_get_member(msg
), "ExportTar") ?
866 TRANSFER_EXPORT_TAR
: TRANSFER_EXPORT_RAW
;
868 r
= transfer_new(m
, &t
);
874 if (!isempty(format
)) {
875 t
->format
= strdup(format
);
880 t
->local
= strdup(local
);
884 t
->stdout_fd
= fcntl(fd
, F_DUPFD_CLOEXEC
, 3);
885 if (t
->stdout_fd
< 0)
888 r
= transfer_start(t
);
892 object
= t
->object_path
;
896 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
899 static int method_pull_tar_or_raw(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
900 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
901 const char *remote
, *local
, *verify
, *object
;
902 Manager
*m
= userdata
;
911 r
= bus_verify_polkit_async(
914 "org.freedesktop.import1.pull",
923 return 1; /* Will call us back */
925 r
= sd_bus_message_read(msg
, "sssb", &remote
, &local
, &verify
, &force
);
929 if (!http_url_is_valid(remote
))
930 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
,
931 "URL %s is invalid", remote
);
935 else if (!machine_name_is_valid(local
))
936 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
,
937 "Local name %s is invalid", local
);
940 v
= IMPORT_VERIFY_SIGNATURE
;
942 v
= import_verify_from_string(verify
);
944 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
,
945 "Unknown verification mode %s", verify
);
947 r
= setup_machine_directory(error
);
951 type
= streq_ptr(sd_bus_message_get_member(msg
), "PullTar") ?
952 TRANSFER_PULL_TAR
: TRANSFER_PULL_RAW
;
954 if (manager_find(m
, type
, remote
))
955 return sd_bus_error_setf(error
, BUS_ERROR_TRANSFER_IN_PROGRESS
,
956 "Transfer for %s already in progress.", remote
);
958 r
= transfer_new(m
, &t
);
964 t
->force_local
= force
;
966 t
->remote
= strdup(remote
);
971 t
->local
= strdup(local
);
976 r
= transfer_start(t
);
980 object
= t
->object_path
;
984 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
987 static int method_list_transfers(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
988 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
989 Manager
*m
= userdata
;
996 r
= sd_bus_message_new_method_return(msg
, &reply
);
1000 r
= sd_bus_message_open_container(reply
, 'a', "(usssdo)");
1004 HASHMAP_FOREACH(t
, m
->transfers
) {
1006 r
= sd_bus_message_append(
1010 transfer_type_to_string(t
->type
),
1013 transfer_percent_as_double(t
),
1019 r
= sd_bus_message_close_container(reply
);
1023 return sd_bus_send(NULL
, reply
, NULL
);
1026 static int method_cancel(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
1027 Transfer
*t
= userdata
;
1033 r
= bus_verify_polkit_async(
1036 "org.freedesktop.import1.pull",
1040 &t
->manager
->polkit_registry
,
1045 return 1; /* Will call us back */
1047 r
= transfer_cancel(t
);
1051 return sd_bus_reply_method_return(msg
, NULL
);
1054 static int method_cancel_transfer(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
1055 Manager
*m
= userdata
;
1063 r
= bus_verify_polkit_async(
1066 "org.freedesktop.import1.pull",
1070 &m
->polkit_registry
,
1075 return 1; /* Will call us back */
1077 r
= sd_bus_message_read(msg
, "u", &id
);
1081 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid transfer id");
1083 t
= hashmap_get(m
->transfers
, UINT32_TO_PTR(id
));
1085 return sd_bus_error_setf(error
, BUS_ERROR_NO_SUCH_TRANSFER
, "No transfer by id %" PRIu32
, id
);
1087 r
= transfer_cancel(t
);
1091 return sd_bus_reply_method_return(msg
, NULL
);
1094 static int property_get_progress(
1097 const char *interface
,
1098 const char *property
,
1099 sd_bus_message
*reply
,
1101 sd_bus_error
*error
) {
1103 Transfer
*t
= userdata
;
1109 return sd_bus_message_append(reply
, "d", transfer_percent_as_double(t
));
1112 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type
, transfer_type
, TransferType
);
1113 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_verify
, import_verify
, ImportVerify
);
1115 static int transfer_object_find(
1118 const char *interface
,
1121 sd_bus_error
*error
) {
1123 Manager
*m
= userdata
;
1135 p
= startswith(path
, "/org/freedesktop/import1/transfer/_");
1139 r
= safe_atou32(p
, &id
);
1140 if (r
< 0 || id
== 0)
1143 t
= hashmap_get(m
->transfers
, UINT32_TO_PTR(id
));
1151 static int transfer_node_enumerator(
1156 sd_bus_error
*error
) {
1158 _cleanup_strv_free_
char **l
= NULL
;
1159 Manager
*m
= userdata
;
1163 l
= new0(char*, hashmap_size(m
->transfers
) + 1);
1167 HASHMAP_FOREACH(t
, m
->transfers
) {
1169 l
[k
] = strdup(t
->object_path
);
1176 *nodes
= TAKE_PTR(l
);
1181 static const sd_bus_vtable transfer_vtable
[] = {
1182 SD_BUS_VTABLE_START(0),
1184 SD_BUS_PROPERTY("Id", "u", NULL
, offsetof(Transfer
, id
), SD_BUS_VTABLE_PROPERTY_CONST
),
1185 SD_BUS_PROPERTY("Local", "s", NULL
, offsetof(Transfer
, local
), SD_BUS_VTABLE_PROPERTY_CONST
),
1186 SD_BUS_PROPERTY("Remote", "s", NULL
, offsetof(Transfer
, remote
), SD_BUS_VTABLE_PROPERTY_CONST
),
1187 SD_BUS_PROPERTY("Type", "s", property_get_type
, offsetof(Transfer
, type
), SD_BUS_VTABLE_PROPERTY_CONST
),
1188 SD_BUS_PROPERTY("Verify", "s", property_get_verify
, offsetof(Transfer
, verify
), SD_BUS_VTABLE_PROPERTY_CONST
),
1189 SD_BUS_PROPERTY("Progress", "d", property_get_progress
, 0, 0),
1191 SD_BUS_METHOD("Cancel", NULL
, NULL
, method_cancel
, SD_BUS_VTABLE_UNPRIVILEGED
),
1193 SD_BUS_SIGNAL_WITH_NAMES("LogMessage",
1195 SD_BUS_PARAM(priority
)
1202 static const BusObjectImplementation transfer_object
= {
1203 "/org/freedesktop/import1/transfer",
1204 "org.freedesktop.import1.Transfer",
1205 .fallback_vtables
= BUS_FALLBACK_VTABLES({transfer_vtable
, transfer_object_find
}),
1206 .node_enumerator
= transfer_node_enumerator
,
1209 static const sd_bus_vtable manager_vtable
[] = {
1210 SD_BUS_VTABLE_START(0),
1212 SD_BUS_METHOD_WITH_NAMES("ImportTar",
1215 SD_BUS_PARAM(local_name
)
1217 SD_BUS_PARAM(read_only
),
1219 SD_BUS_PARAM(transfer_id
)
1220 SD_BUS_PARAM(transfer_path
),
1221 method_import_tar_or_raw
,
1222 SD_BUS_VTABLE_UNPRIVILEGED
),
1223 SD_BUS_METHOD_WITH_NAMES("ImportRaw",
1226 SD_BUS_PARAM(local_name
)
1228 SD_BUS_PARAM(read_only
),
1230 SD_BUS_PARAM(transfer_id
)
1231 SD_BUS_PARAM(transfer_path
),
1232 method_import_tar_or_raw
,
1233 SD_BUS_VTABLE_UNPRIVILEGED
),
1234 SD_BUS_METHOD_WITH_NAMES("ImportFileSystem",
1237 SD_BUS_PARAM(local_name
)
1239 SD_BUS_PARAM(read_only
),
1241 SD_BUS_PARAM(transfer_id
)
1242 SD_BUS_PARAM(transfer_path
),
1244 SD_BUS_VTABLE_UNPRIVILEGED
),
1245 SD_BUS_METHOD_WITH_NAMES("ExportTar",
1247 SD_BUS_PARAM(local_name
)
1249 SD_BUS_PARAM(format
),
1251 SD_BUS_PARAM(transfer_id
)
1252 SD_BUS_PARAM(transfer_path
),
1253 method_export_tar_or_raw
,
1254 SD_BUS_VTABLE_UNPRIVILEGED
),
1255 SD_BUS_METHOD_WITH_NAMES("ExportRaw",
1257 SD_BUS_PARAM(local_name
)
1259 SD_BUS_PARAM(format
),
1261 SD_BUS_PARAM(transfer_id
)
1262 SD_BUS_PARAM(transfer_path
),
1263 method_export_tar_or_raw
,
1264 SD_BUS_VTABLE_UNPRIVILEGED
),
1265 SD_BUS_METHOD_WITH_NAMES("PullTar",
1268 SD_BUS_PARAM(local_name
)
1269 SD_BUS_PARAM(verify_mode
)
1270 SD_BUS_PARAM(force
),
1272 SD_BUS_PARAM(transfer_id
)
1273 SD_BUS_PARAM(transfer_path
),
1274 method_pull_tar_or_raw
,
1275 SD_BUS_VTABLE_UNPRIVILEGED
),
1276 SD_BUS_METHOD_WITH_NAMES("PullRaw",
1279 SD_BUS_PARAM(local_name
)
1280 SD_BUS_PARAM(verify_mode
)
1281 SD_BUS_PARAM(force
),
1283 SD_BUS_PARAM(transfer_id
)
1284 SD_BUS_PARAM(transfer_path
),
1285 method_pull_tar_or_raw
,
1286 SD_BUS_VTABLE_UNPRIVILEGED
),
1287 SD_BUS_METHOD_WITH_NAMES("ListTransfers",
1290 SD_BUS_PARAM(transfers
),
1291 method_list_transfers
,
1292 SD_BUS_VTABLE_UNPRIVILEGED
),
1293 SD_BUS_METHOD_WITH_NAMES("CancelTransfer",
1295 SD_BUS_PARAM(transfer_id
),
1297 method_cancel_transfer
,
1298 SD_BUS_VTABLE_UNPRIVILEGED
),
1300 SD_BUS_SIGNAL_WITH_NAMES("TransferNew",
1302 SD_BUS_PARAM(transfer_id
)
1303 SD_BUS_PARAM(transfer_path
),
1305 SD_BUS_SIGNAL_WITH_NAMES("TransferRemoved",
1307 SD_BUS_PARAM(transfer_id
)
1308 SD_BUS_PARAM(transfer_path
)
1309 SD_BUS_PARAM(result
),
1315 static const BusObjectImplementation manager_object
= {
1316 "/org/freedesktop/import1",
1317 "org.freedesktop.import1.Manager",
1318 .vtables
= BUS_VTABLES(manager_vtable
),
1319 .children
= BUS_IMPLEMENTATIONS(&transfer_object
),
1322 static int manager_add_bus_objects(Manager
*m
) {
1327 r
= bus_add_implementation(m
->bus
, &manager_object
, m
);
1331 r
= bus_log_control_api_register(m
->bus
);
1335 r
= sd_bus_request_name_async(m
->bus
, NULL
, "org.freedesktop.import1", 0, NULL
, NULL
);
1337 return log_error_errno(r
, "Failed to request name: %m");
1339 r
= sd_bus_attach_event(m
->bus
, m
->event
, 0);
1341 return log_error_errno(r
, "Failed to attach bus to event loop: %m");
1346 static bool manager_check_idle(void *userdata
) {
1347 Manager
*m
= userdata
;
1349 return hashmap_isempty(m
->transfers
);
1352 static int manager_run(Manager
*m
) {
1355 return bus_event_loop_with_idle(
1358 "org.freedesktop.import1",
1364 static int run(int argc
, char *argv
[]) {
1365 _cleanup_(manager_unrefp
) Manager
*m
= NULL
;
1368 log_setup_service();
1370 r
= service_parse_argv("systemd-importd.service",
1371 "VM and container image import and export service.",
1372 BUS_IMPLEMENTATIONS(&manager_object
,
1373 &log_control_object
),
1380 assert_se(sigprocmask_many(SIG_BLOCK
, NULL
, SIGCHLD
, -1) >= 0);
1382 r
= manager_new(&m
);
1384 return log_error_errno(r
, "Failed to allocate manager object: %m");
1386 r
= manager_add_bus_objects(m
);
1392 return log_error_errno(r
, "Failed to run event loop: %m");
1397 DEFINE_MAIN_FUNCTION(run
);