]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/core/dbus-service.c
shared: split out property get helpers
[thirdparty/systemd.git] / src / core / dbus-service.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <fcntl.h>
4
5 #include "alloc-util.h"
6 #include "async.h"
7 #include "bus-get-properties.h"
8 #include "dbus-cgroup.h"
9 #include "dbus-execute.h"
10 #include "dbus-kill.h"
11 #include "dbus-manager.h"
12 #include "dbus-service.h"
13 #include "dbus-util.h"
14 #include "exit-status.h"
15 #include "fd-util.h"
16 #include "fileio.h"
17 #include "parse-util.h"
18 #include "path-util.h"
19 #include "service.h"
20 #include "signal-util.h"
21 #include "string-util.h"
22 #include "strv.h"
23 #include "unit.h"
24
25 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type, service_type, ServiceType);
26 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_result, service_result, ServiceResult);
27 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_restart, service_restart, ServiceRestart);
28 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_notify_access, notify_access, NotifyAccess);
29 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_emergency_action, emergency_action, EmergencyAction);
30 static BUS_DEFINE_PROPERTY_GET(property_get_timeout_abort_usec, "t", Service, service_timeout_abort_usec);
31 static BUS_DEFINE_PROPERTY_GET(property_get_watchdog_usec, "t", Service, service_get_watchdog_usec);
32 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_timeout_failure_mode, service_timeout_failure_mode, ServiceTimeoutFailureMode);
33
34 static int property_get_exit_status_set(
35 sd_bus *bus,
36 const char *path,
37 const char *interface,
38 const char *property,
39 sd_bus_message *reply,
40 void *userdata,
41 sd_bus_error *error) {
42
43 const ExitStatusSet *status_set = userdata;
44 unsigned n;
45 Iterator i;
46 int r;
47
48 assert(bus);
49 assert(reply);
50 assert(status_set);
51
52 r = sd_bus_message_open_container(reply, 'r', "aiai");
53 if (r < 0)
54 return r;
55
56 r = sd_bus_message_open_container(reply, 'a', "i");
57 if (r < 0)
58 return r;
59
60 BITMAP_FOREACH(n, &status_set->status, i) {
61 assert(n < 256);
62
63 r = sd_bus_message_append_basic(reply, 'i', &n);
64 if (r < 0)
65 return r;
66 }
67
68 r = sd_bus_message_close_container(reply);
69 if (r < 0)
70 return r;
71
72 r = sd_bus_message_open_container(reply, 'a', "i");
73 if (r < 0)
74 return r;
75
76 BITMAP_FOREACH(n, &status_set->signal, i) {
77 const char *str;
78
79 str = signal_to_string(n);
80 if (!str)
81 continue;
82
83 r = sd_bus_message_append_basic(reply, 'i', &n);
84 if (r < 0)
85 return r;
86 }
87
88 r = sd_bus_message_close_container(reply);
89 if (r < 0)
90 return r;
91
92 return sd_bus_message_close_container(reply);
93 }
94
95 const sd_bus_vtable bus_service_vtable[] = {
96 SD_BUS_VTABLE_START(0),
97 SD_BUS_PROPERTY("Type", "s", property_get_type, offsetof(Service, type), SD_BUS_VTABLE_PROPERTY_CONST),
98 SD_BUS_PROPERTY("Restart", "s", property_get_restart, offsetof(Service, restart), SD_BUS_VTABLE_PROPERTY_CONST),
99 SD_BUS_PROPERTY("PIDFile", "s", NULL, offsetof(Service, pid_file), SD_BUS_VTABLE_PROPERTY_CONST),
100 SD_BUS_PROPERTY("NotifyAccess", "s", property_get_notify_access, offsetof(Service, notify_access), SD_BUS_VTABLE_PROPERTY_CONST),
101 SD_BUS_PROPERTY("RestartUSec", "t", bus_property_get_usec, offsetof(Service, restart_usec), SD_BUS_VTABLE_PROPERTY_CONST),
102 SD_BUS_PROPERTY("TimeoutStartUSec", "t", bus_property_get_usec, offsetof(Service, timeout_start_usec), SD_BUS_VTABLE_PROPERTY_CONST),
103 SD_BUS_PROPERTY("TimeoutStopUSec", "t", bus_property_get_usec, offsetof(Service, timeout_stop_usec), SD_BUS_VTABLE_PROPERTY_CONST),
104 SD_BUS_PROPERTY("TimeoutAbortUSec", "t", property_get_timeout_abort_usec, 0, 0),
105 SD_BUS_PROPERTY("TimeoutStartFailureMode", "s", property_get_timeout_failure_mode, offsetof(Service, timeout_start_failure_mode), SD_BUS_VTABLE_PROPERTY_CONST),
106 SD_BUS_PROPERTY("TimeoutStopFailureMode", "s", property_get_timeout_failure_mode, offsetof(Service, timeout_stop_failure_mode), SD_BUS_VTABLE_PROPERTY_CONST),
107 SD_BUS_PROPERTY("RuntimeMaxUSec", "t", bus_property_get_usec, offsetof(Service, runtime_max_usec), SD_BUS_VTABLE_PROPERTY_CONST),
108 SD_BUS_PROPERTY("WatchdogUSec", "t", property_get_watchdog_usec, 0, 0),
109 BUS_PROPERTY_DUAL_TIMESTAMP("WatchdogTimestamp", offsetof(Service, watchdog_timestamp), 0),
110 SD_BUS_PROPERTY("PermissionsStartOnly", "b", bus_property_get_bool, offsetof(Service, permissions_start_only), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN), /* 😷 deprecated */
111 SD_BUS_PROPERTY("RootDirectoryStartOnly", "b", bus_property_get_bool, offsetof(Service, root_directory_start_only), SD_BUS_VTABLE_PROPERTY_CONST),
112 SD_BUS_PROPERTY("RemainAfterExit", "b", bus_property_get_bool, offsetof(Service, remain_after_exit), SD_BUS_VTABLE_PROPERTY_CONST),
113 SD_BUS_PROPERTY("GuessMainPID", "b", bus_property_get_bool, offsetof(Service, guess_main_pid), SD_BUS_VTABLE_PROPERTY_CONST),
114 SD_BUS_PROPERTY("RestartPreventExitStatus", "(aiai)", property_get_exit_status_set, offsetof(Service, restart_prevent_status), SD_BUS_VTABLE_PROPERTY_CONST),
115 SD_BUS_PROPERTY("RestartForceExitStatus", "(aiai)", property_get_exit_status_set, offsetof(Service, restart_force_status), SD_BUS_VTABLE_PROPERTY_CONST),
116 SD_BUS_PROPERTY("SuccessExitStatus", "(aiai)", property_get_exit_status_set, offsetof(Service, success_status), SD_BUS_VTABLE_PROPERTY_CONST),
117 SD_BUS_PROPERTY("MainPID", "u", bus_property_get_pid, offsetof(Service, main_pid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
118 SD_BUS_PROPERTY("ControlPID", "u", bus_property_get_pid, offsetof(Service, control_pid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
119 SD_BUS_PROPERTY("BusName", "s", NULL, offsetof(Service, bus_name), SD_BUS_VTABLE_PROPERTY_CONST),
120 SD_BUS_PROPERTY("FileDescriptorStoreMax", "u", bus_property_get_unsigned, offsetof(Service, n_fd_store_max), SD_BUS_VTABLE_PROPERTY_CONST),
121 SD_BUS_PROPERTY("NFileDescriptorStore", "u", bus_property_get_unsigned, offsetof(Service, n_fd_store), 0),
122 SD_BUS_PROPERTY("StatusText", "s", NULL, offsetof(Service, status_text), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
123 SD_BUS_PROPERTY("StatusErrno", "i", bus_property_get_int, offsetof(Service, status_errno), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
124 SD_BUS_PROPERTY("Result", "s", property_get_result, offsetof(Service, result), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
125 SD_BUS_PROPERTY("ReloadResult", "s", property_get_result, offsetof(Service, reload_result), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
126 SD_BUS_PROPERTY("CleanResult", "s", property_get_result, offsetof(Service, clean_result), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
127 SD_BUS_PROPERTY("USBFunctionDescriptors", "s", NULL, offsetof(Service, usb_function_descriptors), SD_BUS_VTABLE_PROPERTY_CONST),
128 SD_BUS_PROPERTY("USBFunctionStrings", "s", NULL, offsetof(Service, usb_function_strings), SD_BUS_VTABLE_PROPERTY_CONST),
129 SD_BUS_PROPERTY("UID", "u", bus_property_get_uid, offsetof(Unit, ref_uid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
130 SD_BUS_PROPERTY("GID", "u", bus_property_get_gid, offsetof(Unit, ref_gid), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
131 SD_BUS_PROPERTY("NRestarts", "u", bus_property_get_unsigned, offsetof(Service, n_restarts), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
132 SD_BUS_PROPERTY("OOMPolicy", "s", bus_property_get_oom_policy, offsetof(Service, oom_policy), SD_BUS_VTABLE_PROPERTY_CONST),
133
134 BUS_EXEC_STATUS_VTABLE("ExecMain", offsetof(Service, main_exec_status), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
135 BUS_EXEC_COMMAND_LIST_VTABLE("ExecCondition", offsetof(Service, exec_command[SERVICE_EXEC_CONDITION]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
136 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecConditionEx", offsetof(Service, exec_command[SERVICE_EXEC_CONDITION]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
137 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStartPre", offsetof(Service, exec_command[SERVICE_EXEC_START_PRE]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
138 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartPreEx", offsetof(Service, exec_command[SERVICE_EXEC_START_PRE]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
139 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStart", offsetof(Service, exec_command[SERVICE_EXEC_START]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
140 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartEx", offsetof(Service, exec_command[SERVICE_EXEC_START]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
141 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStartPost", offsetof(Service, exec_command[SERVICE_EXEC_START_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
142 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStartPostEx", offsetof(Service, exec_command[SERVICE_EXEC_START_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
143 BUS_EXEC_COMMAND_LIST_VTABLE("ExecReload", offsetof(Service, exec_command[SERVICE_EXEC_RELOAD]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
144 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecReloadEx", offsetof(Service, exec_command[SERVICE_EXEC_RELOAD]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
145 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStop", offsetof(Service, exec_command[SERVICE_EXEC_STOP]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
146 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStopEx", offsetof(Service, exec_command[SERVICE_EXEC_STOP]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
147 BUS_EXEC_COMMAND_LIST_VTABLE("ExecStopPost", offsetof(Service, exec_command[SERVICE_EXEC_STOP_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
148 BUS_EXEC_EX_COMMAND_LIST_VTABLE("ExecStopPostEx", offsetof(Service, exec_command[SERVICE_EXEC_STOP_POST]), SD_BUS_VTABLE_PROPERTY_EMITS_INVALIDATION),
149
150 /* The following four are obsolete, and thus marked hidden here. They moved into the Unit interface */
151 SD_BUS_PROPERTY("StartLimitInterval", "t", bus_property_get_usec, offsetof(Unit, start_ratelimit.interval), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
152 SD_BUS_PROPERTY("StartLimitBurst", "u", bus_property_get_unsigned, offsetof(Unit, start_ratelimit.burst), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
153 SD_BUS_PROPERTY("StartLimitAction", "s", property_get_emergency_action, offsetof(Unit, start_limit_action), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
154 SD_BUS_PROPERTY("FailureAction", "s", property_get_emergency_action, offsetof(Unit, failure_action), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
155 SD_BUS_PROPERTY("RebootArgument", "s", NULL, offsetof(Unit, reboot_arg), SD_BUS_VTABLE_PROPERTY_CONST|SD_BUS_VTABLE_HIDDEN),
156 SD_BUS_VTABLE_END
157 };
158
159 static int bus_set_transient_exit_status(
160 Unit *u,
161 const char *name,
162 ExitStatusSet *status_set,
163 sd_bus_message *message,
164 UnitWriteFlags flags,
165 sd_bus_error *error) {
166
167 const int32_t *status, *signal;
168 size_t n_status, n_signal, i;
169 int r;
170
171 r = sd_bus_message_enter_container(message, 'r', "aiai");
172 if (r < 0)
173 return r;
174
175 r = sd_bus_message_read_array(message, 'i', (const void **) &status, &n_status);
176 if (r < 0)
177 return r;
178
179 r = sd_bus_message_read_array(message, 'i', (const void **) &signal, &n_signal);
180 if (r < 0)
181 return r;
182
183 r = sd_bus_message_exit_container(message);
184 if (r < 0)
185 return r;
186
187 n_status /= sizeof(int32_t);
188 n_signal /= sizeof(int32_t);
189
190 if (n_status == 0 && n_signal == 0 && !UNIT_WRITE_FLAGS_NOOP(flags)) {
191 exit_status_set_free(status_set);
192 unit_write_settingf(u, flags, name, "%s=", name);
193 return 1;
194 }
195
196 for (i = 0; i < n_status; i++) {
197 if (status[i] < 0 || status[i] > 255)
198 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid status code in %s: %"PRIi32, name, status[i]);
199
200 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
201 r = bitmap_set(&status_set->status, status[i]);
202 if (r < 0)
203 return r;
204
205 unit_write_settingf(u, flags, name, "%s=%"PRIi32, name, status[i]);
206 }
207 }
208
209 for (i = 0; i < n_signal; i++) {
210 const char *str;
211
212 str = signal_to_string((int) signal[i]);
213 if (!str)
214 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid signal in %s: %"PRIi32, name, signal[i]);
215
216 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
217 r = bitmap_set(&status_set->signal, signal[i]);
218 if (r < 0)
219 return r;
220
221 unit_write_settingf(u, flags, name, "%s=%s", name, str);
222 }
223 }
224
225 return 1;
226 }
227
228 static int bus_set_transient_std_fd(
229 Unit *u,
230 const char *name,
231 int *p,
232 bool *b,
233 sd_bus_message *message,
234 UnitWriteFlags flags,
235 sd_bus_error *error) {
236
237 int fd, r;
238
239 assert(p);
240 assert(b);
241
242 r = sd_bus_message_read(message, "h", &fd);
243 if (r < 0)
244 return r;
245
246 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
247 int copy;
248
249 copy = fcntl(fd, F_DUPFD_CLOEXEC, 3);
250 if (copy < 0)
251 return -errno;
252
253 asynchronous_close(*p);
254 *p = copy;
255 *b = true;
256 }
257
258 return 1;
259 }
260 static BUS_DEFINE_SET_TRANSIENT_PARSE(notify_access, NotifyAccess, notify_access_from_string);
261 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_type, ServiceType, service_type_from_string);
262 static BUS_DEFINE_SET_TRANSIENT_PARSE(service_restart, ServiceRestart, service_restart_from_string);
263 static BUS_DEFINE_SET_TRANSIENT_PARSE(oom_policy, OOMPolicy, oom_policy_from_string);
264 static BUS_DEFINE_SET_TRANSIENT_STRING_WITH_CHECK(bus_name, sd_bus_service_name_is_valid);
265 static BUS_DEFINE_SET_TRANSIENT_PARSE(timeout_failure_mode, ServiceTimeoutFailureMode, service_timeout_failure_mode_from_string);
266
267 static int bus_service_set_transient_property(
268 Service *s,
269 const char *name,
270 sd_bus_message *message,
271 UnitWriteFlags flags,
272 sd_bus_error *error) {
273
274 Unit *u = UNIT(s);
275 ServiceExecCommand ci;
276 int r;
277
278 assert(s);
279 assert(name);
280 assert(message);
281
282 flags |= UNIT_PRIVATE;
283
284 if (streq(name, "PermissionsStartOnly"))
285 return bus_set_transient_bool(u, name, &s->permissions_start_only, message, flags, error);
286
287 if (streq(name, "RootDirectoryStartOnly"))
288 return bus_set_transient_bool(u, name, &s->root_directory_start_only, message, flags, error);
289
290 if (streq(name, "RemainAfterExit"))
291 return bus_set_transient_bool(u, name, &s->remain_after_exit, message, flags, error);
292
293 if (streq(name, "GuessMainPID"))
294 return bus_set_transient_bool(u, name, &s->guess_main_pid, message, flags, error);
295
296 if (streq(name, "Type"))
297 return bus_set_transient_service_type(u, name, &s->type, message, flags, error);
298
299 if (streq(name, "OOMPolicy"))
300 return bus_set_transient_oom_policy(u, name, &s->oom_policy, message, flags, error);
301
302 if (streq(name, "RestartUSec"))
303 return bus_set_transient_usec(u, name, &s->restart_usec, message, flags, error);
304
305 if (streq(name, "TimeoutStartUSec")) {
306 r = bus_set_transient_usec(u, name, &s->timeout_start_usec, message, flags, error);
307 if (r >= 0 && !UNIT_WRITE_FLAGS_NOOP(flags))
308 s->start_timeout_defined = true;
309
310 return r;
311 }
312
313 if (streq(name, "TimeoutStopUSec"))
314 return bus_set_transient_usec(u, name, &s->timeout_stop_usec, message, flags, error);
315
316 if (streq(name, "TimeoutAbortUSec")) {
317 r = bus_set_transient_usec(u, name, &s->timeout_abort_usec, message, flags, error);
318 if (r >= 0 && !UNIT_WRITE_FLAGS_NOOP(flags))
319 s->timeout_abort_set = true;
320 return r;
321 }
322
323 if (streq(name, "TimeoutStartFailureMode"))
324 return bus_set_transient_timeout_failure_mode(u, name, &s->timeout_start_failure_mode, message, flags, error);
325
326 if (streq(name, "TimeoutStopFailureMode"))
327 return bus_set_transient_timeout_failure_mode(u, name, &s->timeout_stop_failure_mode, message, flags, error);
328
329 if (streq(name, "RuntimeMaxUSec"))
330 return bus_set_transient_usec(u, name, &s->runtime_max_usec, message, flags, error);
331
332 if (streq(name, "WatchdogUSec"))
333 return bus_set_transient_usec(u, name, &s->watchdog_usec, message, flags, error);
334
335 if (streq(name, "FileDescriptorStoreMax"))
336 return bus_set_transient_unsigned(u, name, &s->n_fd_store_max, message, flags, error);
337
338 if (streq(name, "NotifyAccess"))
339 return bus_set_transient_notify_access(u, name, &s->notify_access, message, flags, error);
340
341 if (streq(name, "PIDFile")) {
342 _cleanup_free_ char *n = NULL;
343 const char *v, *e;
344
345 r = sd_bus_message_read(message, "s", &v);
346 if (r < 0)
347 return r;
348
349 if (!isempty(v)) {
350 n = path_make_absolute(v, u->manager->prefix[EXEC_DIRECTORY_RUNTIME]);
351 if (!n)
352 return -ENOMEM;
353
354 path_simplify(n, true);
355
356 if (!path_is_normalized(n))
357 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "PIDFile= path '%s' is not valid", n);
358
359 e = path_startswith(n, "/var/run/");
360 if (e) {
361 char *z;
362
363 z = path_join("/run", e);
364 if (!z)
365 return log_oom();
366
367 if (!UNIT_WRITE_FLAGS_NOOP(flags))
368 log_unit_notice(u, "Transient unit's PIDFile= property references path below legacy directory /var/run, updating %s → %s; please update client accordingly.", n, z);
369
370 free_and_replace(n, z);
371 }
372 }
373
374 if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
375 free_and_replace(s->pid_file, n);
376 unit_write_settingf(u, flags, name, "%s=%s", name, strempty(s->pid_file));
377 }
378
379 return 1;
380 }
381
382 if (streq(name, "USBFunctionDescriptors"))
383 return bus_set_transient_path(u, name, &s->usb_function_descriptors, message, flags, error);
384
385 if (streq(name, "USBFunctionStrings"))
386 return bus_set_transient_path(u, name, &s->usb_function_strings, message, flags, error);
387
388 if (streq(name, "BusName"))
389 return bus_set_transient_bus_name(u, name, &s->bus_name, message, flags, error);
390
391 if (streq(name, "Restart"))
392 return bus_set_transient_service_restart(u, name, &s->restart, message, flags, error);
393
394 if (streq(name, "RestartPreventExitStatus"))
395 return bus_set_transient_exit_status(u, name, &s->restart_prevent_status, message, flags, error);
396
397 if (streq(name, "RestartForceExitStatus"))
398 return bus_set_transient_exit_status(u, name, &s->restart_force_status, message, flags, error);
399
400 if (streq(name, "SuccessExitStatus"))
401 return bus_set_transient_exit_status(u, name, &s->success_status, message, flags, error);
402
403 ci = service_exec_command_from_string(name);
404 ci = (ci >= 0) ? ci : service_exec_ex_command_from_string(name);
405 if (ci >= 0)
406 return bus_set_transient_exec_command(u, name, &s->exec_command[ci], message, flags, error);
407
408 if (streq(name, "StandardInputFileDescriptor"))
409 return bus_set_transient_std_fd(u, name, &s->stdin_fd, &s->exec_context.stdio_as_fds, message, flags, error);
410
411 if (streq(name, "StandardOutputFileDescriptor"))
412 return bus_set_transient_std_fd(u, name, &s->stdout_fd, &s->exec_context.stdio_as_fds, message, flags, error);
413
414 if (streq(name, "StandardErrorFileDescriptor"))
415 return bus_set_transient_std_fd(u, name, &s->stderr_fd, &s->exec_context.stdio_as_fds, message, flags, error);
416
417 return 0;
418 }
419
420 int bus_service_set_property(
421 Unit *u,
422 const char *name,
423 sd_bus_message *message,
424 UnitWriteFlags flags,
425 sd_bus_error *error) {
426
427 Service *s = SERVICE(u);
428 int r;
429
430 assert(s);
431 assert(name);
432 assert(message);
433
434 r = bus_cgroup_set_property(u, &s->cgroup_context, name, message, flags, error);
435 if (r != 0)
436 return r;
437
438 if (u->transient && u->load_state == UNIT_STUB) {
439 /* This is a transient unit, let's load a little more */
440
441 r = bus_service_set_transient_property(s, name, message, flags, error);
442 if (r != 0)
443 return r;
444
445 r = bus_exec_context_set_transient_property(u, &s->exec_context, name, message, flags, error);
446 if (r != 0)
447 return r;
448
449 r = bus_kill_context_set_transient_property(u, &s->kill_context, name, message, flags, error);
450 if (r != 0)
451 return r;
452 }
453
454 return 0;
455 }
456
457 int bus_service_commit_properties(Unit *u) {
458 assert(u);
459
460 unit_invalidate_cgroup_members_masks(u);
461 unit_realize_cgroup(u);
462
463 return 0;
464 }