1 /* SPDX-License-Identifier: LGPL-2.1+ */
5 #include "alloc-util.h"
10 #include "selinux-access.h"
11 #include "string-util.h"
13 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type
, job_type
, JobType
);
14 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_state
, job_state
, JobState
);
16 static int property_get_unit(
19 const char *interface
,
21 sd_bus_message
*reply
,
23 sd_bus_error
*error
) {
25 _cleanup_free_
char *p
= NULL
;
32 p
= unit_dbus_path(j
->unit
);
36 return sd_bus_message_append(reply
, "(so)", j
->unit
->id
, p
);
39 int bus_job_method_cancel(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
46 r
= mac_selinux_unit_access_check(j
->unit
, message
, "stop", error
);
50 /* Access is granted to the job owner */
51 if (!sd_bus_track_contains(j
->bus_track
, sd_bus_message_get_sender(message
))) {
53 /* And for everybody else consult PolicyKit */
54 r
= bus_verify_manage_units_async(j
->unit
->manager
, message
, error
);
58 return 1; /* No authorization for now, but the async polkit stuff will call us again when it has it */
61 job_finish_and_invalidate(j
, JOB_CANCELED
, true, false);
63 return sd_bus_reply_method_return(message
, NULL
);
66 int bus_job_method_get_waiting_jobs(sd_bus_message
*message
, void *userdata
, sd_bus_error
*error
) {
67 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
68 _cleanup_free_ Job
**list
= NULL
;
72 if (strstr(sd_bus_message_get_member(message
), "After"))
73 n
= job_get_after(j
, &list
);
75 n
= job_get_before(j
, &list
);
79 r
= sd_bus_message_new_method_return(message
, &reply
);
83 r
= sd_bus_message_open_container(reply
, 'a', "(usssoo)");
87 for (i
= 0; i
< n
; i
++) {
88 _cleanup_free_
char *unit_path
= NULL
, *job_path
= NULL
;
90 job_path
= job_dbus_path(list
[i
]);
94 unit_path
= unit_dbus_path(list
[i
]->unit
);
98 r
= sd_bus_message_append(reply
, "(usssoo)",
101 job_type_to_string(list
[i
]->type
),
102 job_state_to_string(list
[i
]->state
),
109 r
= sd_bus_message_close_container(reply
);
113 return sd_bus_send(NULL
, reply
, NULL
);
116 const sd_bus_vtable bus_job_vtable
[] = {
117 SD_BUS_VTABLE_START(0),
118 SD_BUS_METHOD("Cancel", NULL
, NULL
, bus_job_method_cancel
, SD_BUS_VTABLE_UNPRIVILEGED
),
119 SD_BUS_METHOD("GetAfter", NULL
, "a(usssoo)", bus_job_method_get_waiting_jobs
, SD_BUS_VTABLE_UNPRIVILEGED
),
120 SD_BUS_METHOD("GetBefore", NULL
, "a(usssoo)", bus_job_method_get_waiting_jobs
, SD_BUS_VTABLE_UNPRIVILEGED
),
121 SD_BUS_PROPERTY("Id", "u", NULL
, offsetof(Job
, id
), SD_BUS_VTABLE_PROPERTY_CONST
),
122 SD_BUS_PROPERTY("Unit", "(so)", property_get_unit
, 0, SD_BUS_VTABLE_PROPERTY_CONST
),
123 SD_BUS_PROPERTY("JobType", "s", property_get_type
, offsetof(Job
, type
), SD_BUS_VTABLE_PROPERTY_CONST
),
124 SD_BUS_PROPERTY("State", "s", property_get_state
, offsetof(Job
, state
), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE
),
128 static int send_new_signal(sd_bus
*bus
, void *userdata
) {
129 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
130 _cleanup_free_
char *p
= NULL
;
137 p
= job_dbus_path(j
);
141 r
= sd_bus_message_new_signal(
144 "/org/freedesktop/systemd1",
145 "org.freedesktop.systemd1.Manager",
150 r
= sd_bus_message_append(m
, "uos", j
->id
, p
, j
->unit
->id
);
154 return sd_bus_send(bus
, m
, NULL
);
157 static int send_changed_signal(sd_bus
*bus
, void *userdata
) {
158 _cleanup_free_
char *p
= NULL
;
164 p
= job_dbus_path(j
);
168 return sd_bus_emit_properties_changed(bus
, p
, "org.freedesktop.systemd1.Job", "State", NULL
);
171 void bus_job_send_change_signal(Job
*j
) {
176 if (j
->in_dbus_queue
) {
177 LIST_REMOVE(dbus_queue
, j
->manager
->dbus_job_queue
, j
);
178 j
->in_dbus_queue
= false;
181 r
= bus_foreach_bus(j
->manager
, j
->bus_track
, j
->sent_dbus_new_signal
? send_changed_signal
: send_new_signal
, j
);
183 log_debug_errno(r
, "Failed to send job change signal for %u: %m", j
->id
);
185 j
->sent_dbus_new_signal
= true;
188 static int send_removed_signal(sd_bus
*bus
, void *userdata
) {
189 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*m
= NULL
;
190 _cleanup_free_
char *p
= NULL
;
197 p
= job_dbus_path(j
);
201 r
= sd_bus_message_new_signal(
204 "/org/freedesktop/systemd1",
205 "org.freedesktop.systemd1.Manager",
210 r
= sd_bus_message_append(m
, "uoss", j
->id
, p
, j
->unit
->id
, job_result_to_string(j
->result
));
214 return sd_bus_send(bus
, m
, NULL
);
217 void bus_job_send_removed_signal(Job
*j
) {
222 if (!j
->sent_dbus_new_signal
)
223 bus_job_send_change_signal(j
);
225 r
= bus_foreach_bus(j
->manager
, j
->bus_track
, send_removed_signal
, j
);
227 log_debug_errno(r
, "Failed to send job remove signal for %u: %m", j
->id
);
230 static int bus_job_track_handler(sd_bus_track
*t
, void *userdata
) {
236 j
->bus_track
= sd_bus_track_unref(j
->bus_track
); /* make sure we aren't called again */
238 /* Last client dropped off the bus, maybe we should GC this now? */
239 job_add_to_gc_queue(j
);
243 static int bus_job_allocate_bus_track(Job
*j
) {
250 return sd_bus_track_new(j
->unit
->manager
->api_bus
, &j
->bus_track
, bus_job_track_handler
, j
);
253 int bus_job_coldplug_bus_track(Job
*j
) {
255 _cleanup_strv_free_
char **deserialized_clients
= NULL
;
259 deserialized_clients
= TAKE_PTR(j
->deserialized_clients
);
261 if (strv_isempty(deserialized_clients
))
264 if (!j
->manager
->api_bus
)
267 r
= bus_job_allocate_bus_track(j
);
271 return bus_track_add_name_many(j
->bus_track
, deserialized_clients
);
274 int bus_job_track_sender(Job
*j
, sd_bus_message
*m
) {
280 if (sd_bus_message_get_bus(m
) != j
->unit
->manager
->api_bus
) {
281 j
->ref_by_private_bus
= true;
285 r
= bus_job_allocate_bus_track(j
);
289 return sd_bus_track_add_sender(j
->bus_track
, m
);