]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/import/importd.c
tree-wide: drop license boilerplate
[thirdparty/systemd.git] / src / import / importd.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
3d7415f4
LP
2/***
3 This file is part of systemd.
4
5 Copyright 2015 Lennart Poettering
3d7415f4
LP
6***/
7
8#include <sys/prctl.h>
d7e454ba 9#include <sys/wait.h>
3d7415f4
LP
10
11#include "sd-bus.h"
3ffd4af2 12
b5efdb8a 13#include "alloc-util.h"
3d7415f4 14#include "bus-common-errors.h"
3ffd4af2 15#include "bus-util.h"
a97dcc12 16#include "def.h"
3ffd4af2
LP
17#include "fd-util.h"
18#include "hostname-util.h"
19#include "import-util.h"
432cea00 20#include "machine-pool.h"
3ffd4af2
LP
21#include "missing.h"
22#include "mkdir.h"
6bedfcbb 23#include "parse-util.h"
113b3fc1 24#include "path-util.h"
0b452006 25#include "process-util.h"
24882e06 26#include "signal-util.h"
3ffd4af2 27#include "socket-util.h"
8b43440b 28#include "string-table.h"
3ffd4af2 29#include "strv.h"
7ccbd1ae 30#include "syslog-util.h"
ee104e11 31#include "user-util.h"
3ffd4af2 32#include "util.h"
49cf4170 33#include "web-util.h"
3d7415f4
LP
34
35typedef struct Transfer Transfer;
36typedef struct Manager Manager;
37
38typedef enum TransferType {
b6e676ce
LP
39 TRANSFER_IMPORT_TAR,
40 TRANSFER_IMPORT_RAW,
587fec42
LP
41 TRANSFER_EXPORT_TAR,
42 TRANSFER_EXPORT_RAW,
b6e676ce
LP
43 TRANSFER_PULL_TAR,
44 TRANSFER_PULL_RAW,
3d7415f4
LP
45 _TRANSFER_TYPE_MAX,
46 _TRANSFER_TYPE_INVALID = -1,
47} TransferType;
48
49struct Transfer {
50 Manager *manager;
51
52 uint32_t id;
53 char *object_path;
54
55 TransferType type;
56 ImportVerify verify;
57
58 char *remote;
59 char *local;
60 bool force_local;
b6e676ce 61 bool read_only;
3d7415f4 62
587fec42 63 char *format;
3d7415f4
LP
64
65 pid_t pid;
66
67 int log_fd;
68
69 char log_message[LINE_MAX];
70 size_t log_message_size;
71
72 sd_event_source *pid_event_source;
73 sd_event_source *log_event_source;
74
75 unsigned n_canceled;
7079cfef 76 unsigned progress_percent;
b6e676ce
LP
77
78 int stdin_fd;
587fec42 79 int stdout_fd;
3d7415f4
LP
80};
81
82struct Manager {
83 sd_event *event;
84 sd_bus *bus;
85
86 uint32_t current_transfer_id;
87 Hashmap *transfers;
88
89 Hashmap *polkit_registry;
7079cfef
LP
90
91 int notify_fd;
92
93 sd_event_source *notify_event_source;
3d7415f4
LP
94};
95
96#define TRANSFERS_MAX 64
97
98static const char* const transfer_type_table[_TRANSFER_TYPE_MAX] = {
b6e676ce
LP
99 [TRANSFER_IMPORT_TAR] = "import-tar",
100 [TRANSFER_IMPORT_RAW] = "import-raw",
587fec42
LP
101 [TRANSFER_EXPORT_TAR] = "export-tar",
102 [TRANSFER_EXPORT_RAW] = "export-raw",
b6e676ce
LP
103 [TRANSFER_PULL_TAR] = "pull-tar",
104 [TRANSFER_PULL_RAW] = "pull-raw",
3d7415f4
LP
105};
106
b9a5f858 107DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(transfer_type, TransferType);
3d7415f4
LP
108
109static Transfer *transfer_unref(Transfer *t) {
110 if (!t)
111 return NULL;
112
113 if (t->manager)
114 hashmap_remove(t->manager->transfers, UINT32_TO_PTR(t->id));
115
116 sd_event_source_unref(t->pid_event_source);
117 sd_event_source_unref(t->log_event_source);
118
119 free(t->remote);
120 free(t->local);
587fec42 121 free(t->format);
3d7415f4
LP
122 free(t->object_path);
123
124 if (t->pid > 0) {
125 (void) kill_and_sigcont(t->pid, SIGKILL);
126 (void) wait_for_terminate(t->pid, NULL);
127 }
128
129 safe_close(t->log_fd);
b6e676ce 130 safe_close(t->stdin_fd);
587fec42 131 safe_close(t->stdout_fd);
3d7415f4 132
6b430fdb 133 return mfree(t);
3d7415f4
LP
134}
135
136DEFINE_TRIVIAL_CLEANUP_FUNC(Transfer*, transfer_unref);
137
138static int transfer_new(Manager *m, Transfer **ret) {
139 _cleanup_(transfer_unrefp) Transfer *t = NULL;
140 uint32_t id;
141 int r;
142
143 assert(m);
144 assert(ret);
145
146 if (hashmap_size(m->transfers) >= TRANSFERS_MAX)
147 return -E2BIG;
148
149 r = hashmap_ensure_allocated(&m->transfers, &trivial_hash_ops);
150 if (r < 0)
151 return r;
152
153 t = new0(Transfer, 1);
154 if (!t)
155 return -ENOMEM;
156
157 t->type = _TRANSFER_TYPE_INVALID;
158 t->log_fd = -1;
b6e676ce 159 t->stdin_fd = -1;
3be78ab2 160 t->stdout_fd = -1;
b6e676ce 161 t->verify = _IMPORT_VERIFY_INVALID;
3d7415f4
LP
162
163 id = m->current_transfer_id + 1;
164
165 if (asprintf(&t->object_path, "/org/freedesktop/import1/transfer/_%" PRIu32, id) < 0)
166 return -ENOMEM;
167
168 r = hashmap_put(m->transfers, UINT32_TO_PTR(id), t);
169 if (r < 0)
170 return r;
171
172 m->current_transfer_id = id;
173
174 t->manager = m;
175 t->id = id;
176
1cc6c93a 177 *ret = TAKE_PTR(t);
3d7415f4
LP
178
179 return 0;
180}
181
182static void transfer_send_log_line(Transfer *t, const char *line) {
183 int r, priority = LOG_INFO;
184
185 assert(t);
186 assert(line);
187
188 syslog_parse_priority(&line, &priority, true);
189
09d46cfd 190 log_full(priority, "(transfer%" PRIu32 ") %s", t->id, line);
3d7415f4
LP
191
192 r = sd_bus_emit_signal(
193 t->manager->bus,
194 t->object_path,
195 "org.freedesktop.import1.Transfer",
196 "LogMessage",
197 "us",
198 priority,
199 line);
200 if (r < 0)
201 log_error_errno(r, "Cannot emit message: %m");
202 }
203
204static void transfer_send_logs(Transfer *t, bool flush) {
205 assert(t);
206
207 /* Try to send out all log messages, if we can. But if we
208 * can't we remove the messages from the buffer, but don't
209 * fail */
210
211 while (t->log_message_size > 0) {
212 _cleanup_free_ char *n = NULL;
213 char *e;
214
215 if (t->log_message_size >= sizeof(t->log_message))
216 e = t->log_message + sizeof(t->log_message);
217 else {
218 char *a, *b;
219
220 a = memchr(t->log_message, 0, t->log_message_size);
221 b = memchr(t->log_message, '\n', t->log_message_size);
222
223 if (a && b)
224 e = a < b ? a : b;
225 else if (a)
226 e = a;
227 else
228 e = b;
229 }
230
231 if (!e) {
232 if (!flush)
233 return;
234
235 e = t->log_message + t->log_message_size;
236 }
237
238 n = strndup(t->log_message, e - t->log_message);
239
240 /* Skip over NUL and newlines */
3dad3203 241 while (e < t->log_message + t->log_message_size && (*e == 0 || *e == '\n'))
3d7415f4
LP
242 e++;
243
244 memmove(t->log_message, e, t->log_message + sizeof(t->log_message) - e);
245 t->log_message_size -= e - t->log_message;
246
247 if (!n) {
248 log_oom();
249 continue;
250 }
251
252 if (isempty(n))
253 continue;
254
255 transfer_send_log_line(t, n);
256 }
257}
258
259static int transfer_finalize(Transfer *t, bool success) {
260 int r;
261
262 assert(t);
263
264 transfer_send_logs(t, true);
265
266 r = sd_bus_emit_signal(
267 t->manager->bus,
268 "/org/freedesktop/import1",
269 "org.freedesktop.import1.Manager",
270 "TransferRemoved",
271 "uos",
272 t->id,
273 t->object_path,
274 success ? "done" :
275 t->n_canceled > 0 ? "canceled" : "failed");
276
277 if (r < 0)
278 log_error_errno(r, "Cannot emit message: %m");
279
280 transfer_unref(t);
281 return 0;
282}
283
284static int transfer_cancel(Transfer *t) {
285 int r;
286
287 assert(t);
288
289 r = kill_and_sigcont(t->pid, t->n_canceled < 3 ? SIGTERM : SIGKILL);
290 if (r < 0)
291 return r;
292
293 t->n_canceled++;
294 return 0;
295}
296
297static int transfer_on_pid(sd_event_source *s, const siginfo_t *si, void *userdata) {
298 Transfer *t = userdata;
299 bool success = false;
300
301 assert(s);
302 assert(t);
303
304 if (si->si_code == CLD_EXITED) {
305 if (si->si_status != 0)
306 log_error("Import process failed with exit code %i.", si->si_status);
307 else {
308 log_debug("Import process succeeded.");
309 success = true;
310 }
311
3742095b 312 } else if (IN_SET(si->si_code, CLD_KILLED, CLD_DUMPED))
3d7415f4
LP
313
314 log_error("Import process terminated by signal %s.", signal_to_string(si->si_status));
315 else
316 log_error("Import process failed due to unknown reason.");
317
318 t->pid = 0;
319
320 return transfer_finalize(t, success);
321}
322
323static int transfer_on_log(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
324 Transfer *t = userdata;
325 ssize_t l;
326
327 assert(s);
328 assert(t);
329
330 l = read(fd, t->log_message + t->log_message_size, sizeof(t->log_message) - t->log_message_size);
331 if (l <= 0) {
332 /* EOF/read error. We just close the pipe here, and
333 * close the watch, waiting for the SIGCHLD to arrive,
334 * before we do anything else. */
335
336 if (l < 0)
337 log_error_errno(errno, "Failed to read log message: %m");
338
339 t->log_event_source = sd_event_source_unref(t->log_event_source);
340 return 0;
341 }
342
343 t->log_message_size += l;
344
345 transfer_send_logs(t, false);
346
347 return 0;
348}
349
350static int transfer_start(Transfer *t) {
351 _cleanup_close_pair_ int pipefd[2] = { -1, -1 };
352 int r;
353
354 assert(t);
355 assert(t->pid <= 0);
356
357 if (pipe2(pipefd, O_CLOEXEC) < 0)
358 return -errno;
359
4c253ed1
LP
360 r = safe_fork("(sd-transfer)", FORK_RESET_SIGNALS|FORK_DEATHSIG, &t->pid);
361 if (r < 0)
362 return r;
363 if (r == 0) {
3d7415f4 364 const char *cmd[] = {
587fec42 365 NULL, /* systemd-import, systemd-export or systemd-pull */
b43d75c3 366 NULL, /* tar, raw */
b6e676ce 367 NULL, /* --verify= */
3d7415f4
LP
368 NULL, /* verify argument */
369 NULL, /* maybe --force */
b6e676ce 370 NULL, /* maybe --read-only */
587fec42
LP
371 NULL, /* if so: the actual URL */
372 NULL, /* maybe --format= */
373 NULL, /* if so: the actual format */
3d7415f4
LP
374 NULL, /* remote */
375 NULL, /* local */
376 NULL
377 };
b6e676ce 378 unsigned k = 0;
3d7415f4
LP
379
380 /* Child */
381
3d7415f4
LP
382 pipefd[0] = safe_close(pipefd[0]);
383
2b33ab09
LP
384 r = rearrange_stdio(t->stdin_fd,
385 t->stdout_fd < 0 ? pipefd[1] : t->stdout_fd,
386 pipefd[1]);
387 if (r < 0) {
388 log_error_errno(r, "Failed to set stdin/stdout/stderr: %m");
3d7415f4
LP
389 _exit(EXIT_FAILURE);
390 }
391
df8067ef
ZJS
392 if (setenv("SYSTEMD_LOG_TARGET", "console-prefixed", 1) < 0 ||
393 setenv("NOTIFY_SOCKET", "/run/systemd/import/notify", 1) < 0) {
394 log_error_errno(errno, "setenv() failed: %m");
395 _exit(EXIT_FAILURE);
396 }
3d7415f4 397
b6e676ce
LP
398 if (IN_SET(t->type, TRANSFER_IMPORT_TAR, TRANSFER_IMPORT_RAW))
399 cmd[k++] = SYSTEMD_IMPORT_PATH;
587fec42
LP
400 else if (IN_SET(t->type, TRANSFER_EXPORT_TAR, TRANSFER_EXPORT_RAW))
401 cmd[k++] = SYSTEMD_EXPORT_PATH;
b6e676ce
LP
402 else
403 cmd[k++] = SYSTEMD_PULL_PATH;
404
587fec42 405 if (IN_SET(t->type, TRANSFER_IMPORT_TAR, TRANSFER_EXPORT_TAR, TRANSFER_PULL_TAR))
b6e676ce 406 cmd[k++] = "tar";
b6e676ce 407 else
b43d75c3 408 cmd[k++] = "raw";
b6e676ce
LP
409
410 if (t->verify != _IMPORT_VERIFY_INVALID) {
411 cmd[k++] = "--verify";
412 cmd[k++] = import_verify_to_string(t->verify);
413 }
414
3d7415f4
LP
415 if (t->force_local)
416 cmd[k++] = "--force";
b6e676ce
LP
417 if (t->read_only)
418 cmd[k++] = "--read-only";
3d7415f4 419
587fec42
LP
420 if (t->format) {
421 cmd[k++] = "--format";
422 cmd[k++] = t->format;
423 }
424
425 if (!IN_SET(t->type, TRANSFER_EXPORT_TAR, TRANSFER_EXPORT_RAW)) {
426 if (t->remote)
427 cmd[k++] = t->remote;
428 else
429 cmd[k++] = "-";
430 }
b6e676ce 431
3d7415f4
LP
432 if (t->local)
433 cmd[k++] = t->local;
434 cmd[k] = NULL;
435
b6e676ce
LP
436 execv(cmd[0], (char * const *) cmd);
437 log_error_errno(errno, "Failed to execute %s tool: %m", cmd[0]);
3d7415f4
LP
438 _exit(EXIT_FAILURE);
439 }
440
441 pipefd[1] = safe_close(pipefd[1]);
c10d6bdb 442 t->log_fd = TAKE_FD(pipefd[0]);
3d7415f4 443
b6e676ce
LP
444 t->stdin_fd = safe_close(t->stdin_fd);
445
3d7415f4
LP
446 r = sd_event_add_child(t->manager->event, &t->pid_event_source, t->pid, WEXITED, transfer_on_pid, t);
447 if (r < 0)
448 return r;
449
450 r = sd_event_add_io(t->manager->event, &t->log_event_source, t->log_fd, EPOLLIN, transfer_on_log, t);
451 if (r < 0)
452 return r;
453
454 /* Make sure always process logging before SIGCHLD */
455 r = sd_event_source_set_priority(t->log_event_source, SD_EVENT_PRIORITY_NORMAL -5);
456 if (r < 0)
457 return r;
458
459 r = sd_bus_emit_signal(
460 t->manager->bus,
461 "/org/freedesktop/import1",
462 "org.freedesktop.import1.Manager",
463 "TransferNew",
464 "uo",
465 t->id,
466 t->object_path);
467 if (r < 0)
468 return r;
469
470 return 0;
471}
472
473static Manager *manager_unref(Manager *m) {
474 Transfer *t;
475
476 if (!m)
477 return NULL;
478
7079cfef
LP
479 sd_event_source_unref(m->notify_event_source);
480 safe_close(m->notify_fd);
481
3d7415f4
LP
482 while ((t = hashmap_first(m->transfers)))
483 transfer_unref(t);
484
485 hashmap_free(m->transfers);
486
487 bus_verify_polkit_async_registry_free(m->polkit_registry);
488
03976f7b 489 m->bus = sd_bus_flush_close_unref(m->bus);
3d7415f4
LP
490 sd_event_unref(m->event);
491
6b430fdb 492 return mfree(m);
3d7415f4
LP
493}
494
495DEFINE_TRIVIAL_CLEANUP_FUNC(Manager*, manager_unref);
496
7079cfef
LP
497static int manager_on_notify(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
498
499 char buf[NOTIFY_BUFFER_MAX+1];
500 struct iovec iovec = {
501 .iov_base = buf,
502 .iov_len = sizeof(buf)-1,
503 };
504 union {
505 struct cmsghdr cmsghdr;
506 uint8_t buf[CMSG_SPACE(sizeof(struct ucred)) +
507 CMSG_SPACE(sizeof(int) * NOTIFY_FD_MAX)];
508 } control = {};
509 struct msghdr msghdr = {
510 .msg_iov = &iovec,
511 .msg_iovlen = 1,
512 .msg_control = &control,
513 .msg_controllen = sizeof(control),
514 };
515 struct ucred *ucred = NULL;
516 Manager *m = userdata;
517 struct cmsghdr *cmsg;
518 unsigned percent;
519 char *p, *e;
520 Transfer *t;
521 Iterator i;
522 ssize_t n;
523 int r;
524
525 n = recvmsg(fd, &msghdr, MSG_DONTWAIT|MSG_CMSG_CLOEXEC);
526 if (n < 0) {
3742095b 527 if (IN_SET(errno, EAGAIN, EINTR))
7079cfef
LP
528 return 0;
529
530 return -errno;
531 }
532
1c8da044
LP
533 cmsg_close_all(&msghdr);
534
3ee897d6
LP
535 CMSG_FOREACH(cmsg, &msghdr)
536 if (cmsg->cmsg_level == SOL_SOCKET &&
537 cmsg->cmsg_type == SCM_CREDENTIALS &&
538 cmsg->cmsg_len == CMSG_LEN(sizeof(struct ucred)))
7079cfef 539 ucred = (struct ucred*) CMSG_DATA(cmsg);
7079cfef
LP
540
541 if (msghdr.msg_flags & MSG_TRUNC) {
542 log_warning("Got overly long notification datagram, ignoring.");
543 return 0;
544 }
545
546 if (!ucred || ucred->pid <= 0) {
547 log_warning("Got notification datagram lacking credential information, ignoring.");
548 return 0;
549 }
550
551 HASHMAP_FOREACH(t, m->transfers, i)
552 if (ucred->pid == t->pid)
553 break;
554
555 if (!t) {
556 log_warning("Got notification datagram from unexpected peer, ignoring.");
557 return 0;
558 }
559
560 buf[n] = 0;
561
562 p = startswith(buf, "X_IMPORT_PROGRESS=");
563 if (!p) {
564 p = strstr(buf, "\nX_IMPORT_PROGRESS=");
565 if (!p)
566 return 0;
567
568 p += 19;
569 }
570
571 e = strchrnul(p, '\n');
572 *e = 0;
573
574 r = safe_atou(p, &percent);
575 if (r < 0 || percent > 100) {
576 log_warning("Got invalid percent value, ignoring.");
577 return 0;
578 }
579
580 t->progress_percent = percent;
581
582 log_debug("Got percentage from client: %u%%", percent);
583 return 0;
584}
585
3d7415f4
LP
586static int manager_new(Manager **ret) {
587 _cleanup_(manager_unrefp) Manager *m = NULL;
7079cfef
LP
588 static const union sockaddr_union sa = {
589 .un.sun_family = AF_UNIX,
590 .un.sun_path = "/run/systemd/import/notify",
591 };
592 static const int one = 1;
3d7415f4
LP
593 int r;
594
595 assert(ret);
596
597 m = new0(Manager, 1);
598 if (!m)
599 return -ENOMEM;
600
601 r = sd_event_default(&m->event);
602 if (r < 0)
603 return r;
604
605 sd_event_set_watchdog(m->event, true);
606
607 r = sd_bus_default_system(&m->bus);
608 if (r < 0)
609 return r;
610
7079cfef
LP
611 m->notify_fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
612 if (m->notify_fd < 0)
613 return -errno;
614
615 (void) mkdir_parents_label(sa.un.sun_path, 0755);
616 (void) unlink(sa.un.sun_path);
617
fc2fffe7 618 if (bind(m->notify_fd, &sa.sa, SOCKADDR_UN_LEN(sa.un)) < 0)
7079cfef
LP
619 return -errno;
620
621 if (setsockopt(m->notify_fd, SOL_SOCKET, SO_PASSCRED, &one, sizeof(one)) < 0)
622 return -errno;
623
624 r = sd_event_add_io(m->event, &m->notify_event_source, m->notify_fd, EPOLLIN, manager_on_notify, m);
625 if (r < 0)
626 return r;
627
1cc6c93a 628 *ret = TAKE_PTR(m);
3d7415f4
LP
629
630 return 0;
631}
632
b43d75c3 633static Transfer *manager_find(Manager *m, TransferType type, const char *remote) {
3d7415f4
LP
634 Transfer *t;
635 Iterator i;
636
637 assert(m);
638 assert(type >= 0);
639 assert(type < _TRANSFER_TYPE_MAX);
640
641 HASHMAP_FOREACH(t, m->transfers, i) {
642
643 if (t->type == type &&
b43d75c3 644 streq_ptr(t->remote, remote))
3d7415f4
LP
645 return t;
646 }
647
648 return NULL;
649}
650
19070062 651static int method_import_tar_or_raw(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
b6e676ce
LP
652 _cleanup_(transfer_unrefp) Transfer *t = NULL;
653 int fd, force, read_only, r;
654 const char *local, *object;
655 Manager *m = userdata;
656 TransferType type;
657 uint32_t id;
658
19070062
LP
659 assert(msg);
660 assert(m);
661
b6e676ce
LP
662 r = bus_verify_polkit_async(
663 msg,
664 CAP_SYS_ADMIN,
665 "org.freedesktop.import1.import",
403ed0e5 666 NULL,
b6e676ce
LP
667 false,
668 UID_INVALID,
669 &m->polkit_registry,
670 error);
671 if (r < 0)
672 return r;
673 if (r == 0)
674 return 1; /* Will call us back */
675
676 r = sd_bus_message_read(msg, "hsbb", &fd, &local, &force, &read_only);
677 if (r < 0)
678 return r;
679
680 if (!machine_name_is_valid(local))
681 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Local name %s is invalid", local);
682
683 r = setup_machine_directory((uint64_t) -1, error);
684 if (r < 0)
685 return r;
686
687 type = streq_ptr(sd_bus_message_get_member(msg), "ImportTar") ? TRANSFER_IMPORT_TAR : TRANSFER_IMPORT_RAW;
688
689 r = transfer_new(m, &t);
690 if (r < 0)
691 return r;
692
693 t->type = type;
694 t->force_local = force;
695 t->read_only = read_only;
696
697 t->local = strdup(local);
698 if (!t->local)
699 return -ENOMEM;
700
701 t->stdin_fd = fcntl(fd, F_DUPFD_CLOEXEC, 3);
702 if (t->stdin_fd < 0)
703 return -errno;
704
705 r = transfer_start(t);
706 if (r < 0)
707 return r;
708
709 object = t->object_path;
710 id = t->id;
711 t = NULL;
712
713 return sd_bus_reply_method_return(msg, "uo", id, object);
714}
715
19070062 716static int method_export_tar_or_raw(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
587fec42
LP
717 _cleanup_(transfer_unrefp) Transfer *t = NULL;
718 int fd, r;
719 const char *local, *object, *format;
720 Manager *m = userdata;
721 TransferType type;
722 uint32_t id;
723
19070062
LP
724 assert(msg);
725 assert(m);
726
587fec42
LP
727 r = bus_verify_polkit_async(
728 msg,
729 CAP_SYS_ADMIN,
730 "org.freedesktop.import1.export",
403ed0e5 731 NULL,
587fec42
LP
732 false,
733 UID_INVALID,
734 &m->polkit_registry,
735 error);
736 if (r < 0)
737 return r;
738 if (r == 0)
739 return 1; /* Will call us back */
740
741 r = sd_bus_message_read(msg, "shs", &local, &fd, &format);
742 if (r < 0)
743 return r;
744
745 if (!machine_name_is_valid(local))
746 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Local name %s is invalid", local);
747
748 type = streq_ptr(sd_bus_message_get_member(msg), "ExportTar") ? TRANSFER_EXPORT_TAR : TRANSFER_EXPORT_RAW;
749
750 r = transfer_new(m, &t);
751 if (r < 0)
752 return r;
753
754 t->type = type;
755
756 if (!isempty(format)) {
757 t->format = strdup(format);
758 if (!t->format)
759 return -ENOMEM;
760 }
761
762 t->local = strdup(local);
763 if (!t->local)
764 return -ENOMEM;
765
766 t->stdout_fd = fcntl(fd, F_DUPFD_CLOEXEC, 3);
767 if (t->stdout_fd < 0)
768 return -errno;
769
770 r = transfer_start(t);
771 if (r < 0)
772 return r;
773
774 object = t->object_path;
775 id = t->id;
776 t = NULL;
777
778 return sd_bus_reply_method_return(msg, "uo", id, object);
779}
780
19070062 781static int method_pull_tar_or_raw(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
3d7415f4
LP
782 _cleanup_(transfer_unrefp) Transfer *t = NULL;
783 const char *remote, *local, *verify, *object;
784 Manager *m = userdata;
785 ImportVerify v;
786 TransferType type;
787 int force, r;
788 uint32_t id;
789
3d7415f4
LP
790 assert(msg);
791 assert(m);
792
793 r = bus_verify_polkit_async(
794 msg,
795 CAP_SYS_ADMIN,
796 "org.freedesktop.import1.pull",
403ed0e5 797 NULL,
3d7415f4 798 false,
c529695e 799 UID_INVALID,
3d7415f4
LP
800 &m->polkit_registry,
801 error);
802 if (r < 0)
803 return r;
804 if (r == 0)
805 return 1; /* Will call us back */
806
807 r = sd_bus_message_read(msg, "sssb", &remote, &local, &verify, &force);
808 if (r < 0)
809 return r;
810
811 if (!http_url_is_valid(remote))
812 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "URL %s is invalid", remote);
813
814 if (isempty(local))
815 local = NULL;
816 else if (!machine_name_is_valid(local))
817 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Local name %s is invalid", local);
818
819 if (isempty(verify))
820 v = IMPORT_VERIFY_SIGNATURE;
821 else
822 v = import_verify_from_string(verify);
823 if (v < 0)
824 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown verification mode %s", verify);
825
4cee5eed 826 r = setup_machine_directory((uint64_t) -1, error);
ce06fdfb
LP
827 if (r < 0)
828 return r;
829
b6e676ce 830 type = streq_ptr(sd_bus_message_get_member(msg), "PullTar") ? TRANSFER_PULL_TAR : TRANSFER_PULL_RAW;
3d7415f4 831
b43d75c3 832 if (manager_find(m, type, remote))
3d7415f4
LP
833 return sd_bus_error_setf(error, BUS_ERROR_TRANSFER_IN_PROGRESS, "Transfer for %s already in progress.", remote);
834
835 r = transfer_new(m, &t);
836 if (r < 0)
837 return r;
838
839 t->type = type;
840 t->verify = v;
841 t->force_local = force;
842
843 t->remote = strdup(remote);
844 if (!t->remote)
845 return -ENOMEM;
846
b6e676ce
LP
847 if (local) {
848 t->local = strdup(local);
849 if (!t->local)
850 return -ENOMEM;
851 }
3d7415f4
LP
852
853 r = transfer_start(t);
854 if (r < 0)
855 return r;
856
857 object = t->object_path;
858 id = t->id;
859 t = NULL;
860
861 return sd_bus_reply_method_return(msg, "uo", id, object);
862}
863
19070062 864static int method_list_transfers(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
4afd3348 865 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
3d7415f4
LP
866 Manager *m = userdata;
867 Transfer *t;
868 Iterator i;
869 int r;
870
3d7415f4
LP
871 assert(msg);
872 assert(m);
873
874 r = sd_bus_message_new_method_return(msg, &reply);
875 if (r < 0)
876 return r;
877
7079cfef 878 r = sd_bus_message_open_container(reply, 'a', "(usssdo)");
3d7415f4
LP
879 if (r < 0)
880 return r;
881
882 HASHMAP_FOREACH(t, m->transfers, i) {
883
884 r = sd_bus_message_append(
885 reply,
7079cfef 886 "(usssdo)",
3d7415f4
LP
887 t->id,
888 transfer_type_to_string(t->type),
889 t->remote,
890 t->local,
7079cfef 891 (double) t->progress_percent / 100.0,
3d7415f4
LP
892 t->object_path);
893 if (r < 0)
894 return r;
895 }
896
897 r = sd_bus_message_close_container(reply);
898 if (r < 0)
899 return r;
900
9030ca46 901 return sd_bus_send(NULL, reply, NULL);
3d7415f4
LP
902}
903
19070062 904static int method_cancel(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
3d7415f4
LP
905 Transfer *t = userdata;
906 int r;
907
3d7415f4
LP
908 assert(msg);
909 assert(t);
910
911 r = bus_verify_polkit_async(
912 msg,
913 CAP_SYS_ADMIN,
914 "org.freedesktop.import1.pull",
403ed0e5 915 NULL,
3d7415f4 916 false,
c529695e 917 UID_INVALID,
3d7415f4
LP
918 &t->manager->polkit_registry,
919 error);
920 if (r < 0)
921 return r;
922 if (r == 0)
923 return 1; /* Will call us back */
924
925 r = transfer_cancel(t);
926 if (r < 0)
927 return r;
928
929 return sd_bus_reply_method_return(msg, NULL);
930}
931
19070062 932static int method_cancel_transfer(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
3d7415f4
LP
933 Manager *m = userdata;
934 Transfer *t;
935 uint32_t id;
936 int r;
937
3d7415f4
LP
938 assert(msg);
939 assert(m);
940
941 r = bus_verify_polkit_async(
942 msg,
943 CAP_SYS_ADMIN,
944 "org.freedesktop.import1.pull",
403ed0e5 945 NULL,
3d7415f4 946 false,
c529695e 947 UID_INVALID,
3d7415f4
LP
948 &m->polkit_registry,
949 error);
950 if (r < 0)
951 return r;
952 if (r == 0)
953 return 1; /* Will call us back */
954
955 r = sd_bus_message_read(msg, "u", &id);
956 if (r < 0)
957 return r;
958 if (id <= 0)
959 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid transfer id");
960
961 t = hashmap_get(m->transfers, UINT32_TO_PTR(id));
962 if (!t)
09d46cfd 963 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_TRANSFER, "No transfer by id %" PRIu32, id);
3d7415f4
LP
964
965 r = transfer_cancel(t);
966 if (r < 0)
967 return r;
968
969 return sd_bus_reply_method_return(msg, NULL);
970}
971
7079cfef
LP
972static int property_get_progress(
973 sd_bus *bus,
974 const char *path,
975 const char *interface,
976 const char *property,
977 sd_bus_message *reply,
978 void *userdata,
979 sd_bus_error *error) {
980
981 Transfer *t = userdata;
982
983 assert(bus);
984 assert(reply);
985 assert(t);
986
987 return sd_bus_message_append(reply, "d", (double) t->progress_percent / 100.0);
988}
989
3d7415f4
LP
990static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type, transfer_type, TransferType);
991static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_verify, import_verify, ImportVerify);
992
993static const sd_bus_vtable transfer_vtable[] = {
994 SD_BUS_VTABLE_START(0),
995 SD_BUS_PROPERTY("Id", "u", NULL, offsetof(Transfer, id), SD_BUS_VTABLE_PROPERTY_CONST),
996 SD_BUS_PROPERTY("Local", "s", NULL, offsetof(Transfer, local), SD_BUS_VTABLE_PROPERTY_CONST),
997 SD_BUS_PROPERTY("Remote", "s", NULL, offsetof(Transfer, remote), SD_BUS_VTABLE_PROPERTY_CONST),
998 SD_BUS_PROPERTY("Type", "s", property_get_type, offsetof(Transfer, type), SD_BUS_VTABLE_PROPERTY_CONST),
999 SD_BUS_PROPERTY("Verify", "s", property_get_verify, offsetof(Transfer, verify), SD_BUS_VTABLE_PROPERTY_CONST),
7079cfef 1000 SD_BUS_PROPERTY("Progress", "d", property_get_progress, 0, 0),
3d7415f4
LP
1001 SD_BUS_METHOD("Cancel", NULL, NULL, method_cancel, SD_BUS_VTABLE_UNPRIVILEGED),
1002 SD_BUS_SIGNAL("LogMessage", "us", 0),
1003 SD_BUS_VTABLE_END,
1004};
1005
1006static const sd_bus_vtable manager_vtable[] = {
1007 SD_BUS_VTABLE_START(0),
b6e676ce
LP
1008 SD_BUS_METHOD("ImportTar", "hsbb", "uo", method_import_tar_or_raw, SD_BUS_VTABLE_UNPRIVILEGED),
1009 SD_BUS_METHOD("ImportRaw", "hsbb", "uo", method_import_tar_or_raw, SD_BUS_VTABLE_UNPRIVILEGED),
587fec42
LP
1010 SD_BUS_METHOD("ExportTar", "shs", "uo", method_export_tar_or_raw, SD_BUS_VTABLE_UNPRIVILEGED),
1011 SD_BUS_METHOD("ExportRaw", "shs", "uo", method_export_tar_or_raw, SD_BUS_VTABLE_UNPRIVILEGED),
3d7415f4
LP
1012 SD_BUS_METHOD("PullTar", "sssb", "uo", method_pull_tar_or_raw, SD_BUS_VTABLE_UNPRIVILEGED),
1013 SD_BUS_METHOD("PullRaw", "sssb", "uo", method_pull_tar_or_raw, SD_BUS_VTABLE_UNPRIVILEGED),
7079cfef 1014 SD_BUS_METHOD("ListTransfers", NULL, "a(usssdo)", method_list_transfers, SD_BUS_VTABLE_UNPRIVILEGED),
3d7415f4
LP
1015 SD_BUS_METHOD("CancelTransfer", "u", NULL, method_cancel_transfer, SD_BUS_VTABLE_UNPRIVILEGED),
1016 SD_BUS_SIGNAL("TransferNew", "uo", 0),
1017 SD_BUS_SIGNAL("TransferRemoved", "uos", 0),
1018 SD_BUS_VTABLE_END,
1019};
1020
1021static int transfer_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
1022 Manager *m = userdata;
1023 Transfer *t;
1024 const char *p;
1025 uint32_t id;
1026 int r;
1027
1028 assert(bus);
1029 assert(path);
1030 assert(interface);
1031 assert(found);
1032 assert(m);
1033
1034 p = startswith(path, "/org/freedesktop/import1/transfer/_");
1035 if (!p)
1036 return 0;
1037
1038 r = safe_atou32(p, &id);
1039 if (r < 0 || id == 0)
1040 return 0;
1041
1042 t = hashmap_get(m->transfers, UINT32_TO_PTR(id));
1043 if (!t)
1044 return 0;
1045
1046 *found = t;
1047 return 1;
1048}
1049
1050static int transfer_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
1051 _cleanup_strv_free_ char **l = NULL;
1052 Manager *m = userdata;
1053 Transfer *t;
1054 unsigned k = 0;
1055 Iterator i;
1056
1057 l = new0(char*, hashmap_size(m->transfers) + 1);
1058 if (!l)
1059 return -ENOMEM;
1060
1061 HASHMAP_FOREACH(t, m->transfers, i) {
1062
1063 l[k] = strdup(t->object_path);
1064 if (!l[k])
1065 return -ENOMEM;
1066
1067 k++;
1068 }
1069
ae2a15bc 1070 *nodes = TAKE_PTR(l);
3d7415f4
LP
1071
1072 return 1;
1073}
1074
1075static int manager_add_bus_objects(Manager *m) {
1076 int r;
1077
1078 assert(m);
1079
1080 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/import1", "org.freedesktop.import1.Manager", manager_vtable, m);
1081 if (r < 0)
1082 return log_error_errno(r, "Failed to register object: %m");
1083
1084 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/import1/transfer", "org.freedesktop.import1.Transfer", transfer_vtable, transfer_object_find, m);
1085 if (r < 0)
1086 return log_error_errno(r, "Failed to register object: %m");
1087
1088 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/import1/transfer", transfer_node_enumerator, m);
1089 if (r < 0)
1090 return log_error_errno(r, "Failed to add transfer enumerator: %m");
1091
0c0b9306 1092 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.import1", 0, NULL, NULL);
3d7415f4 1093 if (r < 0)
0c0b9306 1094 return log_error_errno(r, "Failed to request name: %m");
3d7415f4
LP
1095
1096 r = sd_bus_attach_event(m->bus, m->event, 0);
1097 if (r < 0)
1098 return log_error_errno(r, "Failed to attach bus to event loop: %m");
1099
1100 return 0;
1101}
1102
1103static bool manager_check_idle(void *userdata) {
1104 Manager *m = userdata;
1105
1106 return hashmap_isempty(m->transfers);
1107}
1108
1109static int manager_run(Manager *m) {
1110 assert(m);
1111
1112 return bus_event_loop_with_idle(
1113 m->event,
1114 m->bus,
1115 "org.freedesktop.import1",
1116 DEFAULT_EXIT_USEC,
1117 manager_check_idle,
1118 m);
1119}
1120
1121int main(int argc, char *argv[]) {
1122 _cleanup_(manager_unrefp) Manager *m = NULL;
1123 int r;
1124
1125 log_set_target(LOG_TARGET_AUTO);
1126 log_parse_environment();
1127 log_open();
1128
1129 umask(0022);
1130
1131 if (argc != 1) {
1132 log_error("This program takes no arguments.");
1133 r = -EINVAL;
1134 goto finish;
1135 }
1136
72c0a2c2 1137 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGCHLD, -1) >= 0);
3d7415f4
LP
1138
1139 r = manager_new(&m);
1140 if (r < 0) {
1141 log_error_errno(r, "Failed to allocate manager object: %m");
1142 goto finish;
1143 }
1144
1145 r = manager_add_bus_objects(m);
1146 if (r < 0)
1147 goto finish;
1148
1149 r = manager_run(m);
1150 if (r < 0) {
1151 log_error_errno(r, "Failed to run event loop: %m");
1152 goto finish;
1153 }
1154
1155finish:
1156 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1157}