]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/machine/image-dbus.c
polkit: simplify bus_verify_polkit_async() + drop auth-by-cap dbus feature
[thirdparty/systemd.git] / src / machine / image-dbus.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
ebeccf9e 2
fe993888 3#include <sys/file.h>
9153b02b
LP
4#include <sys/mount.h>
5
b5efdb8a 6#include "alloc-util.h"
40af3d02 7#include "bus-get-properties.h"
ebeccf9e 8#include "bus-label.h"
269e4d2d 9#include "bus-polkit.h"
9153b02b 10#include "copy.h"
57f1b61b 11#include "discover-image.h"
9153b02b 12#include "dissect-image.h"
56599585 13#include "fd-util.h"
9153b02b
LP
14#include "fileio.h"
15#include "fs-util.h"
003dffde 16#include "image-dbus.h"
a90fb858 17#include "io-util.h"
9153b02b 18#include "loop-util.h"
204f52e3 19#include "missing_capability.h"
9153b02b 20#include "mount-util.h"
6ef06723 21#include "os-util.h"
56599585 22#include "process-util.h"
9153b02b 23#include "raw-clone.h"
ee104e11
LP
24#include "strv.h"
25#include "user-util.h"
ebeccf9e 26
1ddb263d 27static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type, image_type, ImageType);
ebeccf9e 28
1ddb263d 29int bus_image_method_remove(
08682124
LP
30 sd_bus_message *message,
31 void *userdata,
32 sd_bus_error *error) {
33
71136404 34 _cleanup_close_pair_ int errno_pipe_fd[2] = EBADF_PAIR;
99534007 35 Image *image = ASSERT_PTR(userdata);
70244d1d 36 Manager *m = image->userdata;
5d2036b5 37 pid_t child;
08682124
LP
38 int r;
39
08682124 40 assert(message);
08682124 41
5d2036b5 42 if (m->n_operations >= OPERATIONS_MAX)
1b09b81c 43 return sd_bus_error_set(error, SD_BUS_ERROR_LIMITS_EXCEEDED, "Too many ongoing operations.");
5d2036b5 44
8dd3f6a3
LN
45 const char *details[] = {
46 "image", image->name,
47 "verb", "remove",
48 NULL
49 };
50
70244d1d
LP
51 r = bus_verify_polkit_async(
52 message,
70244d1d 53 "org.freedesktop.machine1.manage-images",
8dd3f6a3 54 details,
70244d1d
LP
55 &m->polkit_registry,
56 error);
57 if (r < 0)
58 return r;
59 if (r == 0)
60 return 1; /* Will call us back */
61
5d2036b5
LP
62 if (pipe2(errno_pipe_fd, O_CLOEXEC|O_NONBLOCK) < 0)
63 return sd_bus_error_set_errnof(error, errno, "Failed to create pipe: %m");
64
4c253ed1
LP
65 r = safe_fork("(sd-imgrm)", FORK_RESET_SIGNALS, &child);
66 if (r < 0)
67 return sd_bus_error_set_errnof(error, r, "Failed to fork(): %m");
68 if (r == 0) {
5d2036b5
LP
69 errno_pipe_fd[0] = safe_close(errno_pipe_fd[0]);
70
71 r = image_remove(image);
72 if (r < 0) {
73 (void) write(errno_pipe_fd[1], &r, sizeof(r));
74 _exit(EXIT_FAILURE);
75 }
76
77 _exit(EXIT_SUCCESS);
78 }
79
80 errno_pipe_fd[1] = safe_close(errno_pipe_fd[1]);
81
03c2b288 82 r = operation_new(m, NULL, child, message, errno_pipe_fd[0], NULL);
5d2036b5
LP
83 if (r < 0) {
84 (void) sigkill_wait(child);
08682124 85 return r;
5d2036b5
LP
86 }
87
254d1313 88 errno_pipe_fd[0] = -EBADF;
08682124 89
5d2036b5 90 return 1;
08682124
LP
91}
92
1ddb263d 93int bus_image_method_rename(
ebd93cb6
LP
94 sd_bus_message *message,
95 void *userdata,
96 sd_bus_error *error) {
97
99534007 98 Image *image = ASSERT_PTR(userdata);
70244d1d 99 Manager *m = image->userdata;
ebd93cb6
LP
100 const char *new_name;
101 int r;
102
ebd93cb6 103 assert(message);
ebd93cb6
LP
104
105 r = sd_bus_message_read(message, "s", &new_name);
106 if (r < 0)
107 return r;
108
109 if (!image_name_is_valid(new_name))
110 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Image name '%s' is invalid.", new_name);
111
8dd3f6a3
LN
112 const char *details[] = {
113 "image", image->name,
114 "verb", "rename",
115 "new_name", new_name,
116 NULL
117 };
118
70244d1d
LP
119 r = bus_verify_polkit_async(
120 message,
70244d1d 121 "org.freedesktop.machine1.manage-images",
8dd3f6a3 122 details,
70244d1d
LP
123 &m->polkit_registry,
124 error);
125 if (r < 0)
126 return r;
127 if (r == 0)
128 return 1; /* Will call us back */
129
ebd93cb6
LP
130 r = image_rename(image, new_name);
131 if (r < 0)
132 return r;
133
134 return sd_bus_reply_method_return(message, NULL);
135}
136
1ddb263d 137int bus_image_method_clone(
ebd93cb6
LP
138 sd_bus_message *message,
139 void *userdata,
140 sd_bus_error *error) {
141
71136404 142 _cleanup_close_pair_ int errno_pipe_fd[2] = EBADF_PAIR;
99534007
DT
143 Image *image = ASSERT_PTR(userdata);
144 Manager *m = ASSERT_PTR(image->userdata);
ebd93cb6
LP
145 const char *new_name;
146 int r, read_only;
56599585 147 pid_t child;
ebd93cb6 148
ebd93cb6 149 assert(message);
56599585
LP
150
151 if (m->n_operations >= OPERATIONS_MAX)
1b09b81c 152 return sd_bus_error_set(error, SD_BUS_ERROR_LIMITS_EXCEEDED, "Too many ongoing operations.");
ebd93cb6
LP
153
154 r = sd_bus_message_read(message, "sb", &new_name, &read_only);
155 if (r < 0)
156 return r;
157
158 if (!image_name_is_valid(new_name))
159 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Image name '%s' is invalid.", new_name);
160
8dd3f6a3
LN
161 const char *details[] = {
162 "image", image->name,
163 "verb", "clone",
164 "new_name", new_name,
165 NULL
166 };
167
70244d1d
LP
168 r = bus_verify_polkit_async(
169 message,
70244d1d 170 "org.freedesktop.machine1.manage-images",
8dd3f6a3 171 details,
70244d1d
LP
172 &m->polkit_registry,
173 error);
174 if (r < 0)
175 return r;
176 if (r == 0)
177 return 1; /* Will call us back */
178
56599585
LP
179 if (pipe2(errno_pipe_fd, O_CLOEXEC|O_NONBLOCK) < 0)
180 return sd_bus_error_set_errnof(error, errno, "Failed to create pipe: %m");
181
f2747bf5 182 r = safe_fork("(sd-imgclone)", FORK_RESET_SIGNALS, &child);
4c253ed1
LP
183 if (r < 0)
184 return sd_bus_error_set_errnof(error, r, "Failed to fork(): %m");
185 if (r == 0) {
56599585
LP
186 errno_pipe_fd[0] = safe_close(errno_pipe_fd[0]);
187
188 r = image_clone(image, new_name, read_only);
189 if (r < 0) {
190 (void) write(errno_pipe_fd[1], &r, sizeof(r));
191 _exit(EXIT_FAILURE);
192 }
193
194 _exit(EXIT_SUCCESS);
195 }
196
197 errno_pipe_fd[1] = safe_close(errno_pipe_fd[1]);
198
03c2b288 199 r = operation_new(m, NULL, child, message, errno_pipe_fd[0], NULL);
56599585 200 if (r < 0) {
89c9030d 201 (void) sigkill_wait(child);
ebd93cb6 202 return r;
56599585 203 }
ebd93cb6 204
254d1313 205 errno_pipe_fd[0] = -EBADF;
56599585
LP
206
207 return 1;
ebd93cb6
LP
208}
209
1ddb263d 210int bus_image_method_mark_read_only(
ebd93cb6
LP
211 sd_bus_message *message,
212 void *userdata,
213 sd_bus_error *error) {
214
1ddb263d 215 Image *image = userdata;
70244d1d 216 Manager *m = image->userdata;
2e1ae325 217 int read_only, r;
ebd93cb6 218
ebd93cb6
LP
219 assert(message);
220
ebd93cb6
LP
221 r = sd_bus_message_read(message, "b", &read_only);
222 if (r < 0)
223 return r;
224
8dd3f6a3
LN
225 const char *details[] = {
226 "image", image->name,
227 "verb", "mark_read_only",
2c7bcdd5 228 "read_only", one_zero(read_only),
8dd3f6a3
LN
229 NULL
230 };
231
70244d1d
LP
232 r = bus_verify_polkit_async(
233 message,
70244d1d 234 "org.freedesktop.machine1.manage-images",
8dd3f6a3 235 details,
70244d1d
LP
236 &m->polkit_registry,
237 error);
238 if (r < 0)
239 return r;
240 if (r == 0)
241 return 1; /* Will call us back */
242
ebd93cb6
LP
243 r = image_read_only(image, read_only);
244 if (r < 0)
245 return r;
246
247 return sd_bus_reply_method_return(message, NULL);
248}
249
d6ce17c7 250int bus_image_method_set_limit(
d6ce17c7
LP
251 sd_bus_message *message,
252 void *userdata,
253 sd_bus_error *error) {
254
255 Image *image = userdata;
256 Manager *m = image->userdata;
257 uint64_t limit;
258 int r;
259
d6ce17c7
LP
260 assert(message);
261
262 r = sd_bus_message_read(message, "t", &limit);
263 if (r < 0)
264 return r;
a90fb858 265 if (!FILE_SIZE_VALID_OR_INFINITY(limit))
1b09b81c 266 return sd_bus_error_set(error, SD_BUS_ERROR_INVALID_ARGS, "New limit out of range");
d6ce17c7 267
8dd3f6a3
LN
268 const char *details[] = {
269 "machine", image->name,
270 "verb", "set_limit",
271 NULL
272 };
273
d6ce17c7
LP
274 r = bus_verify_polkit_async(
275 message,
d6ce17c7 276 "org.freedesktop.machine1.manage-images",
8dd3f6a3 277 details,
d6ce17c7
LP
278 &m->polkit_registry,
279 error);
280 if (r < 0)
281 return r;
282 if (r == 0)
283 return 1; /* Will call us back */
284
285 r = image_set_limit(image, limit);
286 if (r < 0)
287 return r;
288
289 return sd_bus_reply_method_return(message, NULL);
290}
291
cf30a8c1
LP
292int bus_image_method_get_hostname(
293 sd_bus_message *message,
294 void *userdata,
295 sd_bus_error *error) {
9153b02b 296
cf30a8c1 297 Image *image = userdata;
9153b02b
LP
298 int r;
299
cf30a8c1 300 if (!image->metadata_valid) {
84be0c71 301 r = image_read_metadata(image, &image_policy_container);
cf30a8c1
LP
302 if (r < 0)
303 return sd_bus_error_set_errnof(error, r, "Failed to read image metadata: %m");
304 }
9153b02b 305
cf30a8c1 306 return sd_bus_reply_method_return(message, "s", image->hostname);
9153b02b
LP
307}
308
cf30a8c1
LP
309int bus_image_method_get_machine_id(
310 sd_bus_message *message,
311 void *userdata,
312 sd_bus_error *error) {
9153b02b 313
cf30a8c1
LP
314 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
315 Image *image = userdata;
316 int r;
9153b02b 317
cf30a8c1 318 if (!image->metadata_valid) {
84be0c71 319 r = image_read_metadata(image, &image_policy_container);
9153b02b 320 if (r < 0)
cf30a8c1 321 return sd_bus_error_set_errnof(error, r, "Failed to read image metadata: %m");
9153b02b
LP
322 }
323
cf30a8c1 324 r = sd_bus_message_new_method_return(message, &reply);
9153b02b
LP
325 if (r < 0)
326 return r;
327
cf30a8c1
LP
328 if (sd_id128_is_null(image->machine_id)) /* Add an empty array if the ID is zero */
329 r = sd_bus_message_append(reply, "ay", 0);
330 else
331 r = sd_bus_message_append_array(reply, 'y', image->machine_id.bytes, 16);
9153b02b 332 if (r < 0)
cf30a8c1 333 return r;
9153b02b 334
cf30a8c1 335 return sd_bus_send(NULL, reply, NULL);
9153b02b
LP
336}
337
cf30a8c1 338int bus_image_method_get_machine_info(
9153b02b
LP
339 sd_bus_message *message,
340 void *userdata,
341 sd_bus_error *error) {
342
9153b02b
LP
343 Image *image = userdata;
344 int r;
345
cf30a8c1 346 if (!image->metadata_valid) {
84be0c71 347 r = image_read_metadata(image, &image_policy_container);
cf30a8c1
LP
348 if (r < 0)
349 return sd_bus_error_set_errnof(error, r, "Failed to read image metadata: %m");
350 }
9153b02b 351
cf30a8c1
LP
352 return bus_reply_pair_array(message, image->machine_info);
353}
9153b02b 354
cf30a8c1
LP
355int bus_image_method_get_os_release(
356 sd_bus_message *message,
357 void *userdata,
358 sd_bus_error *error) {
9153b02b 359
cf30a8c1
LP
360 Image *image = userdata;
361 int r;
9153b02b 362
cf30a8c1 363 if (!image->metadata_valid) {
84be0c71 364 r = image_read_metadata(image, &image_policy_container);
cf30a8c1
LP
365 if (r < 0)
366 return sd_bus_error_set_errnof(error, r, "Failed to read image metadata: %m");
9153b02b 367 }
9153b02b 368
cf30a8c1 369 return bus_reply_pair_array(message, image->os_release);
9153b02b
LP
370}
371
1ddb263d 372static int image_flush_cache(sd_event_source *s, void *userdata) {
99534007 373 Manager *m = ASSERT_PTR(userdata);
1ddb263d
LP
374
375 assert(s);
1ddb263d 376
b07ec5a1 377 hashmap_clear(m->image_cache);
1ddb263d
LP
378 return 0;
379}
380
4faa530c 381static int image_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
1ddb263d
LP
382 _cleanup_free_ char *e = NULL;
383 Manager *m = userdata;
384 Image *image = NULL;
385 const char *p;
ebeccf9e
LP
386 int r;
387
388 assert(bus);
389 assert(path);
390 assert(interface);
391 assert(found);
392
1ddb263d
LP
393 p = startswith(path, "/org/freedesktop/machine1/image/");
394 if (!p)
395 return 0;
396
397 e = bus_label_unescape(p);
398 if (!e)
399 return -ENOMEM;
400
401 image = hashmap_get(m->image_cache, e);
402 if (image) {
403 *found = image;
404 return 1;
405 }
406
1ddb263d
LP
407 if (!m->image_cache_defer_event) {
408 r = sd_event_add_defer(m->event, &m->image_cache_defer_event, image_flush_cache, m);
409 if (r < 0)
410 return r;
411
412 r = sd_event_source_set_priority(m->image_cache_defer_event, SD_EVENT_PRIORITY_IDLE);
413 if (r < 0)
414 return r;
415 }
416
417 r = sd_event_source_set_enabled(m->image_cache_defer_event, SD_EVENT_ONESHOT);
418 if (r < 0)
419 return r;
420
d577d4a4 421 r = image_find(IMAGE_MACHINE, e, NULL, &image);
3a6ce860
LP
422 if (r == -ENOENT)
423 return 0;
424 if (r < 0)
ebeccf9e
LP
425 return r;
426
70244d1d
LP
427 image->userdata = m;
428
32ae5db6 429 r = hashmap_ensure_put(&m->image_cache, &image_hash_ops, image->name, image);
1ddb263d
LP
430 if (r < 0) {
431 image_unref(image);
432 return r;
433 }
434
435 *found = image;
ebeccf9e
LP
436 return 1;
437}
438
439char *image_bus_path(const char *name) {
440 _cleanup_free_ char *e = NULL;
441
442 assert(name);
443
444 e = bus_label_escape(name);
445 if (!e)
446 return NULL;
447
b910cc72 448 return strjoin("/org/freedesktop/machine1/image/", e);
ebeccf9e
LP
449}
450
4faa530c 451static int image_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
b07ec5a1 452 _cleanup_hashmap_free_ Hashmap *images = NULL;
ebeccf9e
LP
453 _cleanup_strv_free_ char **l = NULL;
454 Image *image;
ebeccf9e
LP
455 int r;
456
457 assert(bus);
458 assert(path);
459 assert(nodes);
460
b07ec5a1 461 images = hashmap_new(&image_hash_ops);
ebeccf9e
LP
462 if (!images)
463 return -ENOMEM;
464
d577d4a4 465 r = image_discover(IMAGE_MACHINE, NULL, images);
ebeccf9e
LP
466 if (r < 0)
467 return r;
468
90e74a66 469 HASHMAP_FOREACH(image, images) {
ebeccf9e
LP
470 char *p;
471
472 p = image_bus_path(image->name);
473 if (!p)
474 return -ENOMEM;
475
476 r = strv_consume(&l, p);
477 if (r < 0)
478 return r;
479 }
480
1cc6c93a 481 *nodes = TAKE_PTR(l);
ebeccf9e
LP
482
483 return 1;
484}
4faa530c
ZJS
485
486const sd_bus_vtable image_vtable[] = {
487 SD_BUS_VTABLE_START(0),
488 SD_BUS_PROPERTY("Name", "s", NULL, offsetof(Image, name), 0),
489 SD_BUS_PROPERTY("Path", "s", NULL, offsetof(Image, path), 0),
490 SD_BUS_PROPERTY("Type", "s", property_get_type, offsetof(Image, type), 0),
491 SD_BUS_PROPERTY("ReadOnly", "b", bus_property_get_bool, offsetof(Image, read_only), 0),
492 SD_BUS_PROPERTY("CreationTimestamp", "t", NULL, offsetof(Image, crtime), 0),
493 SD_BUS_PROPERTY("ModificationTimestamp", "t", NULL, offsetof(Image, mtime), 0),
494 SD_BUS_PROPERTY("Usage", "t", NULL, offsetof(Image, usage), 0),
495 SD_BUS_PROPERTY("Limit", "t", NULL, offsetof(Image, limit), 0),
496 SD_BUS_PROPERTY("UsageExclusive", "t", NULL, offsetof(Image, usage_exclusive), 0),
497 SD_BUS_PROPERTY("LimitExclusive", "t", NULL, offsetof(Image, limit_exclusive), 0),
498 SD_BUS_METHOD("Remove", NULL, NULL, bus_image_method_remove, SD_BUS_VTABLE_UNPRIVILEGED),
499 SD_BUS_METHOD("Rename", "s", NULL, bus_image_method_rename, SD_BUS_VTABLE_UNPRIVILEGED),
500 SD_BUS_METHOD("Clone", "sb", NULL, bus_image_method_clone, SD_BUS_VTABLE_UNPRIVILEGED),
501 SD_BUS_METHOD("MarkReadOnly", "b", NULL, bus_image_method_mark_read_only, SD_BUS_VTABLE_UNPRIVILEGED),
502 SD_BUS_METHOD("SetLimit", "t", NULL, bus_image_method_set_limit, SD_BUS_VTABLE_UNPRIVILEGED),
503 SD_BUS_METHOD("GetHostname", NULL, "s", bus_image_method_get_hostname, SD_BUS_VTABLE_UNPRIVILEGED),
504 SD_BUS_METHOD("GetMachineID", NULL, "ay", bus_image_method_get_machine_id, SD_BUS_VTABLE_UNPRIVILEGED),
505 SD_BUS_METHOD("GetMachineInfo", NULL, "a{ss}", bus_image_method_get_machine_info, SD_BUS_VTABLE_UNPRIVILEGED),
506 SD_BUS_METHOD("GetOSRelease", NULL, "a{ss}", bus_image_method_get_os_release, SD_BUS_VTABLE_UNPRIVILEGED),
507 SD_BUS_VTABLE_END
508};
509
510const BusObjectImplementation image_object = {
511 "/org/freedesktop/machine1/image",
512 "org.freedesktop.machine1.Image",
513 .fallback_vtables = BUS_FALLBACK_VTABLES({image_vtable, image_object_find}),
514 .node_enumerator = image_node_enumerator,
515};