1 /* SPDX-License-Identifier: LGPL-2.1+ */
8 #include "alloc-util.h"
9 #include "bus-common-errors.h"
10 #include "bus-log-control-api.h"
11 #include "bus-polkit.h"
15 #include "hostname-util.h"
16 #include "import-util.h"
17 #include "machine-pool.h"
18 #include "main-func.h"
19 #include "missing_capability.h"
21 #include "parse-util.h"
22 #include "path-util.h"
23 #include "process-util.h"
24 #include "signal-util.h"
25 #include "socket-util.h"
26 #include "stat-util.h"
27 #include "string-table.h"
29 #include "syslog-util.h"
30 #include "user-util.h"
34 typedef struct Transfer Transfer
;
35 typedef struct Manager Manager
;
37 typedef enum TransferType
{
46 _TRANSFER_TYPE_INVALID
= -1,
69 char log_message
[LINE_MAX
];
70 size_t log_message_size
;
72 sd_event_source
*pid_event_source
;
73 sd_event_source
*log_event_source
;
76 unsigned progress_percent
;
86 uint32_t current_transfer_id
;
89 Hashmap
*polkit_registry
;
93 sd_event_source
*notify_event_source
;
96 #define TRANSFERS_MAX 64
98 static const char* const transfer_type_table
[_TRANSFER_TYPE_MAX
] = {
99 [TRANSFER_IMPORT_TAR
] = "import-tar",
100 [TRANSFER_IMPORT_RAW
] = "import-raw",
101 [TRANSFER_IMPORT_FS
] = "import-fs",
102 [TRANSFER_EXPORT_TAR
] = "export-tar",
103 [TRANSFER_EXPORT_RAW
] = "export-raw",
104 [TRANSFER_PULL_TAR
] = "pull-tar",
105 [TRANSFER_PULL_RAW
] = "pull-raw",
108 DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(transfer_type
, TransferType
);
110 static Transfer
*transfer_unref(Transfer
*t
) {
115 hashmap_remove(t
->manager
->transfers
, UINT32_TO_PTR(t
->id
));
117 sd_event_source_unref(t
->pid_event_source
);
118 sd_event_source_unref(t
->log_event_source
);
123 free(t
->object_path
);
126 (void) kill_and_sigcont(t
->pid
, SIGKILL
);
127 (void) wait_for_terminate(t
->pid
, NULL
);
130 safe_close(t
->log_fd
);
131 safe_close(t
->stdin_fd
);
132 safe_close(t
->stdout_fd
);
137 DEFINE_TRIVIAL_CLEANUP_FUNC(Transfer
*, transfer_unref
);
139 static int transfer_new(Manager
*m
, Transfer
**ret
) {
140 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
147 if (hashmap_size(m
->transfers
) >= TRANSFERS_MAX
)
150 r
= hashmap_ensure_allocated(&m
->transfers
, &trivial_hash_ops
);
154 t
= new(Transfer
, 1);
159 .type
= _TRANSFER_TYPE_INVALID
,
163 .verify
= _IMPORT_VERIFY_INVALID
,
164 .progress_percent
= (unsigned) -1,
167 id
= m
->current_transfer_id
+ 1;
169 if (asprintf(&t
->object_path
, "/org/freedesktop/import1/transfer/_%" PRIu32
, id
) < 0)
172 r
= hashmap_put(m
->transfers
, UINT32_TO_PTR(id
), t
);
176 m
->current_transfer_id
= id
;
186 static double transfer_percent_as_double(Transfer
*t
) {
189 if (t
->progress_percent
== (unsigned) -1)
192 return (double) t
->progress_percent
/ 100.0;
195 static void transfer_send_log_line(Transfer
*t
, const char *line
) {
196 int r
, priority
= LOG_INFO
;
201 syslog_parse_priority(&line
, &priority
, true);
203 log_full(priority
, "(transfer%" PRIu32
") %s", t
->id
, line
);
205 r
= sd_bus_emit_signal(
208 "org.freedesktop.import1.Transfer",
214 log_warning_errno(r
, "Cannot emit log message signal, ignoring: %m");
217 static void transfer_send_logs(Transfer
*t
, bool flush
) {
220 /* Try to send out all log messages, if we can. But if we
221 * can't we remove the messages from the buffer, but don't
224 while (t
->log_message_size
> 0) {
225 _cleanup_free_
char *n
= NULL
;
228 if (t
->log_message_size
>= sizeof(t
->log_message
))
229 e
= t
->log_message
+ sizeof(t
->log_message
);
233 a
= memchr(t
->log_message
, 0, t
->log_message_size
);
234 b
= memchr(t
->log_message
, '\n', t
->log_message_size
);
248 e
= t
->log_message
+ t
->log_message_size
;
251 n
= strndup(t
->log_message
, e
- t
->log_message
);
253 /* Skip over NUL and newlines */
254 while (e
< t
->log_message
+ t
->log_message_size
&& IN_SET(*e
, 0, '\n'))
257 memmove(t
->log_message
, e
, t
->log_message
+ sizeof(t
->log_message
) - e
);
258 t
->log_message_size
-= e
- t
->log_message
;
268 transfer_send_log_line(t
, n
);
272 static int transfer_finalize(Transfer
*t
, bool success
) {
277 transfer_send_logs(t
, true);
279 r
= sd_bus_emit_signal(
281 "/org/freedesktop/import1",
282 "org.freedesktop.import1.Manager",
288 t
->n_canceled
> 0 ? "canceled" : "failed");
291 log_error_errno(r
, "Cannot emit message: %m");
297 static int transfer_cancel(Transfer
*t
) {
302 r
= kill_and_sigcont(t
->pid
, t
->n_canceled
< 3 ? SIGTERM
: SIGKILL
);
310 static int transfer_on_pid(sd_event_source
*s
, const siginfo_t
*si
, void *userdata
) {
311 Transfer
*t
= userdata
;
312 bool success
= false;
317 if (si
->si_code
== CLD_EXITED
) {
318 if (si
->si_status
!= 0)
319 log_error("Transfer process failed with exit code %i.", si
->si_status
);
321 log_debug("Transfer process succeeded.");
325 } else if (IN_SET(si
->si_code
, CLD_KILLED
, CLD_DUMPED
))
326 log_error("Transfer process terminated by signal %s.", signal_to_string(si
->si_status
));
328 log_error("Transfer process failed due to unknown reason.");
332 return transfer_finalize(t
, success
);
335 static int transfer_on_log(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
336 Transfer
*t
= userdata
;
342 l
= read(fd
, t
->log_message
+ t
->log_message_size
, sizeof(t
->log_message
) - t
->log_message_size
);
344 log_error_errno(errno
, "Failed to read log message: %m");
346 /* EOF/read error. We just close the pipe here, and
347 * close the watch, waiting for the SIGCHLD to arrive,
348 * before we do anything else. */
349 t
->log_event_source
= sd_event_source_unref(t
->log_event_source
);
353 t
->log_message_size
+= l
;
355 transfer_send_logs(t
, false);
360 static int transfer_start(Transfer
*t
) {
361 _cleanup_close_pair_
int pipefd
[2] = { -1, -1 };
367 if (pipe2(pipefd
, O_CLOEXEC
) < 0)
370 r
= safe_fork("(sd-transfer)", FORK_RESET_SIGNALS
|FORK_DEATHSIG
, &t
->pid
);
374 const char *cmd
[] = {
375 NULL
, /* systemd-import, systemd-import-fs, systemd-export or systemd-pull */
377 NULL
, /* --verify= */
378 NULL
, /* verify argument */
379 NULL
, /* maybe --force */
380 NULL
, /* maybe --read-only */
381 NULL
, /* if so: the actual URL */
382 NULL
, /* maybe --format= */
383 NULL
, /* if so: the actual format */
392 pipefd
[0] = safe_close(pipefd
[0]);
394 r
= rearrange_stdio(t
->stdin_fd
,
395 t
->stdout_fd
< 0 ? pipefd
[1] : t
->stdout_fd
,
398 log_error_errno(r
, "Failed to set stdin/stdout/stderr: %m");
402 if (setenv("SYSTEMD_LOG_TARGET", "console-prefixed", 1) < 0 ||
403 setenv("NOTIFY_SOCKET", "/run/systemd/import/notify", 1) < 0) {
404 log_error_errno(errno
, "setenv() failed: %m");
410 case TRANSFER_IMPORT_TAR
:
411 case TRANSFER_IMPORT_RAW
:
412 cmd
[k
++] = SYSTEMD_IMPORT_PATH
;
415 case TRANSFER_IMPORT_FS
:
416 cmd
[k
++] = SYSTEMD_IMPORT_FS_PATH
;
419 case TRANSFER_EXPORT_TAR
:
420 case TRANSFER_EXPORT_RAW
:
421 cmd
[k
++] = SYSTEMD_EXPORT_PATH
;
424 case TRANSFER_PULL_TAR
:
425 case TRANSFER_PULL_RAW
:
426 cmd
[k
++] = SYSTEMD_PULL_PATH
;
430 assert_not_reached("Unexpected transfer type");
435 case TRANSFER_IMPORT_TAR
:
436 case TRANSFER_EXPORT_TAR
:
437 case TRANSFER_PULL_TAR
:
441 case TRANSFER_IMPORT_RAW
:
442 case TRANSFER_EXPORT_RAW
:
443 case TRANSFER_PULL_RAW
:
447 case TRANSFER_IMPORT_FS
:
455 if (t
->verify
!= _IMPORT_VERIFY_INVALID
) {
456 cmd
[k
++] = "--verify";
457 cmd
[k
++] = import_verify_to_string(t
->verify
);
461 cmd
[k
++] = "--force";
463 cmd
[k
++] = "--read-only";
466 cmd
[k
++] = "--format";
467 cmd
[k
++] = t
->format
;
470 if (!IN_SET(t
->type
, TRANSFER_EXPORT_TAR
, TRANSFER_EXPORT_RAW
)) {
472 cmd
[k
++] = t
->remote
;
481 execv(cmd
[0], (char * const *) cmd
);
482 log_error_errno(errno
, "Failed to execute %s tool: %m", cmd
[0]);
486 pipefd
[1] = safe_close(pipefd
[1]);
487 t
->log_fd
= TAKE_FD(pipefd
[0]);
489 t
->stdin_fd
= safe_close(t
->stdin_fd
);
491 r
= sd_event_add_child(t
->manager
->event
, &t
->pid_event_source
, t
->pid
, WEXITED
, transfer_on_pid
, t
);
495 r
= sd_event_add_io(t
->manager
->event
, &t
->log_event_source
, t
->log_fd
, EPOLLIN
, transfer_on_log
, t
);
499 /* Make sure always process logging before SIGCHLD */
500 r
= sd_event_source_set_priority(t
->log_event_source
, SD_EVENT_PRIORITY_NORMAL
-5);
504 r
= sd_bus_emit_signal(
506 "/org/freedesktop/import1",
507 "org.freedesktop.import1.Manager",
518 static Manager
*manager_unref(Manager
*m
) {
524 sd_event_source_unref(m
->notify_event_source
);
525 safe_close(m
->notify_fd
);
527 while ((t
= hashmap_first(m
->transfers
)))
530 hashmap_free(m
->transfers
);
532 bus_verify_polkit_async_registry_free(m
->polkit_registry
);
534 m
->bus
= sd_bus_flush_close_unref(m
->bus
);
535 sd_event_unref(m
->event
);
540 DEFINE_TRIVIAL_CLEANUP_FUNC(Manager
*, manager_unref
);
542 static int manager_on_notify(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
544 char buf
[NOTIFY_BUFFER_MAX
+1];
545 struct iovec iovec
= {
547 .iov_len
= sizeof(buf
)-1,
550 struct cmsghdr cmsghdr
;
551 uint8_t buf
[CMSG_SPACE(sizeof(struct ucred
)) +
552 CMSG_SPACE(sizeof(int) * NOTIFY_FD_MAX
)];
554 struct msghdr msghdr
= {
557 .msg_control
= &control
,
558 .msg_controllen
= sizeof(control
),
560 struct ucred
*ucred
= NULL
;
561 Manager
*m
= userdata
;
562 struct cmsghdr
*cmsg
;
569 n
= recvmsg(fd
, &msghdr
, MSG_DONTWAIT
|MSG_CMSG_CLOEXEC
);
571 if (IN_SET(errno
, EAGAIN
, EINTR
))
577 cmsg_close_all(&msghdr
);
579 CMSG_FOREACH(cmsg
, &msghdr
)
580 if (cmsg
->cmsg_level
== SOL_SOCKET
&&
581 cmsg
->cmsg_type
== SCM_CREDENTIALS
&&
582 cmsg
->cmsg_len
== CMSG_LEN(sizeof(struct ucred
)))
583 ucred
= (struct ucred
*) CMSG_DATA(cmsg
);
585 if (msghdr
.msg_flags
& MSG_TRUNC
) {
586 log_warning("Got overly long notification datagram, ignoring.");
590 if (!ucred
|| ucred
->pid
<= 0) {
591 log_warning("Got notification datagram lacking credential information, ignoring.");
595 HASHMAP_FOREACH(t
, m
->transfers
, i
)
596 if (ucred
->pid
== t
->pid
)
600 log_warning("Got notification datagram from unexpected peer, ignoring.");
606 p
= startswith(buf
, "X_IMPORT_PROGRESS=");
608 p
= strstr(buf
, "\nX_IMPORT_PROGRESS=");
615 e
= strchrnul(p
, '\n');
618 r
= parse_percent(p
);
620 log_warning("Got invalid percent value, ignoring.");
624 t
->progress_percent
= (unsigned) r
;
626 log_debug("Got percentage from client: %u%%", t
->progress_percent
);
630 static int manager_new(Manager
**ret
) {
631 _cleanup_(manager_unrefp
) Manager
*m
= NULL
;
632 static const union sockaddr_union sa
= {
633 .un
.sun_family
= AF_UNIX
,
634 .un
.sun_path
= "/run/systemd/import/notify",
640 m
= new0(Manager
, 1);
644 r
= sd_event_default(&m
->event
);
648 sd_event_set_watchdog(m
->event
, true);
650 r
= sd_bus_default_system(&m
->bus
);
654 m
->notify_fd
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
655 if (m
->notify_fd
< 0)
658 (void) mkdir_parents_label(sa
.un
.sun_path
, 0755);
659 (void) sockaddr_un_unlink(&sa
.un
);
661 if (bind(m
->notify_fd
, &sa
.sa
, SOCKADDR_UN_LEN(sa
.un
)) < 0)
664 r
= setsockopt_int(m
->notify_fd
, SOL_SOCKET
, SO_PASSCRED
, true);
668 r
= sd_event_add_io(m
->event
, &m
->notify_event_source
, m
->notify_fd
, EPOLLIN
, manager_on_notify
, m
);
677 static Transfer
*manager_find(Manager
*m
, TransferType type
, const char *remote
) {
683 assert(type
< _TRANSFER_TYPE_MAX
);
685 HASHMAP_FOREACH(t
, m
->transfers
, i
)
686 if (t
->type
== type
&& streq_ptr(t
->remote
, remote
))
692 static int method_import_tar_or_raw(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
693 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
694 int fd
, force
, read_only
, r
;
695 const char *local
, *object
;
696 Manager
*m
= userdata
;
704 r
= bus_verify_polkit_async(
707 "org.freedesktop.import1.import",
716 return 1; /* Will call us back */
718 r
= sd_bus_message_read(msg
, "hsbb", &fd
, &local
, &force
, &read_only
);
722 if (fstat(fd
, &st
) < 0)
725 if (!S_ISREG(st
.st_mode
) && !S_ISFIFO(st
.st_mode
))
728 if (!machine_name_is_valid(local
))
729 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Local name %s is invalid", local
);
731 r
= setup_machine_directory(error
);
735 type
= streq_ptr(sd_bus_message_get_member(msg
), "ImportTar") ? TRANSFER_IMPORT_TAR
: TRANSFER_IMPORT_RAW
;
737 r
= transfer_new(m
, &t
);
742 t
->force_local
= force
;
743 t
->read_only
= read_only
;
745 t
->local
= strdup(local
);
749 t
->stdin_fd
= fcntl(fd
, F_DUPFD_CLOEXEC
, 3);
753 r
= transfer_start(t
);
757 object
= t
->object_path
;
761 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
764 static int method_import_fs(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
765 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
766 int fd
, force
, read_only
, r
;
767 const char *local
, *object
;
768 Manager
*m
= userdata
;
774 r
= bus_verify_polkit_async(
777 "org.freedesktop.import1.import",
786 return 1; /* Will call us back */
788 r
= sd_bus_message_read(msg
, "hsbb", &fd
, &local
, &force
, &read_only
);
792 r
= fd_verify_directory(fd
);
796 if (!machine_name_is_valid(local
))
797 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Local name %s is invalid", local
);
799 r
= setup_machine_directory(error
);
803 r
= transfer_new(m
, &t
);
807 t
->type
= TRANSFER_IMPORT_FS
;
808 t
->force_local
= force
;
809 t
->read_only
= read_only
;
811 t
->local
= strdup(local
);
815 t
->stdin_fd
= fcntl(fd
, F_DUPFD_CLOEXEC
, 3);
819 r
= transfer_start(t
);
823 object
= t
->object_path
;
827 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
830 static int method_export_tar_or_raw(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
831 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
833 const char *local
, *object
, *format
;
834 Manager
*m
= userdata
;
842 r
= bus_verify_polkit_async(
845 "org.freedesktop.import1.export",
854 return 1; /* Will call us back */
856 r
= sd_bus_message_read(msg
, "shs", &local
, &fd
, &format
);
860 if (!machine_name_is_valid(local
))
861 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Local name %s is invalid", local
);
863 if (fstat(fd
, &st
) < 0)
866 if (!S_ISREG(st
.st_mode
) && !S_ISFIFO(st
.st_mode
))
869 type
= streq_ptr(sd_bus_message_get_member(msg
), "ExportTar") ? TRANSFER_EXPORT_TAR
: TRANSFER_EXPORT_RAW
;
871 r
= transfer_new(m
, &t
);
877 if (!isempty(format
)) {
878 t
->format
= strdup(format
);
883 t
->local
= strdup(local
);
887 t
->stdout_fd
= fcntl(fd
, F_DUPFD_CLOEXEC
, 3);
888 if (t
->stdout_fd
< 0)
891 r
= transfer_start(t
);
895 object
= t
->object_path
;
899 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
902 static int method_pull_tar_or_raw(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
903 _cleanup_(transfer_unrefp
) Transfer
*t
= NULL
;
904 const char *remote
, *local
, *verify
, *object
;
905 Manager
*m
= userdata
;
914 r
= bus_verify_polkit_async(
917 "org.freedesktop.import1.pull",
926 return 1; /* Will call us back */
928 r
= sd_bus_message_read(msg
, "sssb", &remote
, &local
, &verify
, &force
);
932 if (!http_url_is_valid(remote
))
933 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "URL %s is invalid", remote
);
937 else if (!machine_name_is_valid(local
))
938 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Local name %s is invalid", local
);
941 v
= IMPORT_VERIFY_SIGNATURE
;
943 v
= import_verify_from_string(verify
);
945 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Unknown verification mode %s", verify
);
947 r
= setup_machine_directory(error
);
951 type
= streq_ptr(sd_bus_message_get_member(msg
), "PullTar") ? TRANSFER_PULL_TAR
: TRANSFER_PULL_RAW
;
953 if (manager_find(m
, type
, remote
))
954 return sd_bus_error_setf(error
, BUS_ERROR_TRANSFER_IN_PROGRESS
, "Transfer for %s already in progress.", remote
);
956 r
= transfer_new(m
, &t
);
962 t
->force_local
= force
;
964 t
->remote
= strdup(remote
);
969 t
->local
= strdup(local
);
974 r
= transfer_start(t
);
978 object
= t
->object_path
;
982 return sd_bus_reply_method_return(msg
, "uo", id
, object
);
985 static int method_list_transfers(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
986 _cleanup_(sd_bus_message_unrefp
) sd_bus_message
*reply
= NULL
;
987 Manager
*m
= userdata
;
995 r
= sd_bus_message_new_method_return(msg
, &reply
);
999 r
= sd_bus_message_open_container(reply
, 'a', "(usssdo)");
1003 HASHMAP_FOREACH(t
, m
->transfers
, i
) {
1005 r
= sd_bus_message_append(
1009 transfer_type_to_string(t
->type
),
1012 transfer_percent_as_double(t
),
1018 r
= sd_bus_message_close_container(reply
);
1022 return sd_bus_send(NULL
, reply
, NULL
);
1025 static int method_cancel(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
1026 Transfer
*t
= userdata
;
1032 r
= bus_verify_polkit_async(
1035 "org.freedesktop.import1.pull",
1039 &t
->manager
->polkit_registry
,
1044 return 1; /* Will call us back */
1046 r
= transfer_cancel(t
);
1050 return sd_bus_reply_method_return(msg
, NULL
);
1053 static int method_cancel_transfer(sd_bus_message
*msg
, void *userdata
, sd_bus_error
*error
) {
1054 Manager
*m
= userdata
;
1062 r
= bus_verify_polkit_async(
1065 "org.freedesktop.import1.pull",
1069 &m
->polkit_registry
,
1074 return 1; /* Will call us back */
1076 r
= sd_bus_message_read(msg
, "u", &id
);
1080 return sd_bus_error_setf(error
, SD_BUS_ERROR_INVALID_ARGS
, "Invalid transfer id");
1082 t
= hashmap_get(m
->transfers
, UINT32_TO_PTR(id
));
1084 return sd_bus_error_setf(error
, BUS_ERROR_NO_SUCH_TRANSFER
, "No transfer by id %" PRIu32
, id
);
1086 r
= transfer_cancel(t
);
1090 return sd_bus_reply_method_return(msg
, NULL
);
1093 static int property_get_progress(
1096 const char *interface
,
1097 const char *property
,
1098 sd_bus_message
*reply
,
1100 sd_bus_error
*error
) {
1102 Transfer
*t
= userdata
;
1108 return sd_bus_message_append(reply
, "d", transfer_percent_as_double(t
));
1111 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_type
, transfer_type
, TransferType
);
1112 static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_verify
, import_verify
, ImportVerify
);
1114 static const sd_bus_vtable transfer_vtable
[] = {
1115 SD_BUS_VTABLE_START(0),
1117 SD_BUS_PROPERTY("Id", "u", NULL
, offsetof(Transfer
, id
), SD_BUS_VTABLE_PROPERTY_CONST
),
1118 SD_BUS_PROPERTY("Local", "s", NULL
, offsetof(Transfer
, local
), SD_BUS_VTABLE_PROPERTY_CONST
),
1119 SD_BUS_PROPERTY("Remote", "s", NULL
, offsetof(Transfer
, remote
), SD_BUS_VTABLE_PROPERTY_CONST
),
1120 SD_BUS_PROPERTY("Type", "s", property_get_type
, offsetof(Transfer
, type
), SD_BUS_VTABLE_PROPERTY_CONST
),
1121 SD_BUS_PROPERTY("Verify", "s", property_get_verify
, offsetof(Transfer
, verify
), SD_BUS_VTABLE_PROPERTY_CONST
),
1122 SD_BUS_PROPERTY("Progress", "d", property_get_progress
, 0, 0),
1124 SD_BUS_METHOD("Cancel", NULL
, NULL
, method_cancel
, SD_BUS_VTABLE_UNPRIVILEGED
),
1126 SD_BUS_SIGNAL_WITH_NAMES("LogMessage",
1128 SD_BUS_PARAM(priority
)
1135 static const sd_bus_vtable manager_vtable
[] = {
1136 SD_BUS_VTABLE_START(0),
1138 SD_BUS_METHOD_WITH_NAMES("ImportTar",
1141 SD_BUS_PARAM(local_name
)
1143 SD_BUS_PARAM(read_only
),
1145 SD_BUS_PARAM(transfer_id
)
1146 SD_BUS_PARAM(transfer_path
),
1147 method_import_tar_or_raw
,
1148 SD_BUS_VTABLE_UNPRIVILEGED
),
1149 SD_BUS_METHOD_WITH_NAMES("ImportRaw",
1152 SD_BUS_PARAM(local_name
)
1154 SD_BUS_PARAM(read_only
),
1156 SD_BUS_PARAM(transfer_id
)
1157 SD_BUS_PARAM(transfer_path
),
1158 method_import_tar_or_raw
,
1159 SD_BUS_VTABLE_UNPRIVILEGED
),
1160 SD_BUS_METHOD_WITH_NAMES("ImportFileSystem",
1163 SD_BUS_PARAM(local_name
)
1165 SD_BUS_PARAM(read_only
),
1167 SD_BUS_PARAM(transfer_id
)
1168 SD_BUS_PARAM(transfer_path
),
1170 SD_BUS_VTABLE_UNPRIVILEGED
),
1171 SD_BUS_METHOD_WITH_NAMES("ExportTar",
1173 SD_BUS_PARAM(local_name
)
1175 SD_BUS_PARAM(format
),
1177 SD_BUS_PARAM(transfer_id
)
1178 SD_BUS_PARAM(transfer_path
),
1179 method_export_tar_or_raw
,
1180 SD_BUS_VTABLE_UNPRIVILEGED
),
1181 SD_BUS_METHOD_WITH_NAMES("ExportRaw",
1183 SD_BUS_PARAM(local_name
)
1185 SD_BUS_PARAM(format
),
1187 SD_BUS_PARAM(transfer_id
)
1188 SD_BUS_PARAM(transfer_path
),
1189 method_export_tar_or_raw
,
1190 SD_BUS_VTABLE_UNPRIVILEGED
),
1191 SD_BUS_METHOD_WITH_NAMES("PullTar",
1194 SD_BUS_PARAM(local_name
)
1195 SD_BUS_PARAM(verify_mode
)
1196 SD_BUS_PARAM(force
),
1198 SD_BUS_PARAM(transfer_id
)
1199 SD_BUS_PARAM(transfer_path
),
1200 method_pull_tar_or_raw
,
1201 SD_BUS_VTABLE_UNPRIVILEGED
),
1202 SD_BUS_METHOD_WITH_NAMES("PullRaw",
1205 SD_BUS_PARAM(local_name
)
1206 SD_BUS_PARAM(verify_mode
)
1207 SD_BUS_PARAM(force
),
1209 SD_BUS_PARAM(transfer_id
)
1210 SD_BUS_PARAM(transfer_path
),
1211 method_pull_tar_or_raw
,
1212 SD_BUS_VTABLE_UNPRIVILEGED
),
1213 SD_BUS_METHOD_WITH_NAMES("ListTransfers",
1216 SD_BUS_PARAM(transfers
),
1217 method_list_transfers
,
1218 SD_BUS_VTABLE_UNPRIVILEGED
),
1219 SD_BUS_METHOD_WITH_NAMES("CancelTransfer",
1221 SD_BUS_PARAM(transfer_id
),
1223 method_cancel_transfer
,
1224 SD_BUS_VTABLE_UNPRIVILEGED
),
1226 SD_BUS_SIGNAL_WITH_NAMES("TransferNew",
1228 SD_BUS_PARAM(transfer_id
)
1229 SD_BUS_PARAM(transfer_path
),
1231 SD_BUS_SIGNAL_WITH_NAMES("TransferRemoved",
1233 SD_BUS_PARAM(transfer_id
)
1234 SD_BUS_PARAM(transfer_path
)
1235 SD_BUS_PARAM(result
),
1241 static int transfer_object_find(sd_bus
*bus
, const char *path
, const char *interface
, void *userdata
, void **found
, sd_bus_error
*error
) {
1242 Manager
*m
= userdata
;
1254 p
= startswith(path
, "/org/freedesktop/import1/transfer/_");
1258 r
= safe_atou32(p
, &id
);
1259 if (r
< 0 || id
== 0)
1262 t
= hashmap_get(m
->transfers
, UINT32_TO_PTR(id
));
1270 static int transfer_node_enumerator(sd_bus
*bus
, const char *path
, void *userdata
, char ***nodes
, sd_bus_error
*error
) {
1271 _cleanup_strv_free_
char **l
= NULL
;
1272 Manager
*m
= userdata
;
1277 l
= new0(char*, hashmap_size(m
->transfers
) + 1);
1281 HASHMAP_FOREACH(t
, m
->transfers
, i
) {
1283 l
[k
] = strdup(t
->object_path
);
1290 *nodes
= TAKE_PTR(l
);
1295 static int manager_add_bus_objects(Manager
*m
) {
1300 r
= sd_bus_add_object_vtable(m
->bus
, NULL
, "/org/freedesktop/import1", "org.freedesktop.import1.Manager", manager_vtable
, m
);
1302 return log_error_errno(r
, "Failed to register object: %m");
1304 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/import1/transfer", "org.freedesktop.import1.Transfer", transfer_vtable
, transfer_object_find
, m
);
1306 return log_error_errno(r
, "Failed to register object: %m");
1308 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/import1/transfer", transfer_node_enumerator
, m
);
1310 return log_error_errno(r
, "Failed to add transfer enumerator: %m");
1312 r
= bus_log_control_api_register(m
->bus
);
1316 r
= sd_bus_request_name_async(m
->bus
, NULL
, "org.freedesktop.import1", 0, NULL
, NULL
);
1318 return log_error_errno(r
, "Failed to request name: %m");
1320 r
= sd_bus_attach_event(m
->bus
, m
->event
, 0);
1322 return log_error_errno(r
, "Failed to attach bus to event loop: %m");
1327 static bool manager_check_idle(void *userdata
) {
1328 Manager
*m
= userdata
;
1330 return hashmap_isempty(m
->transfers
);
1333 static int manager_run(Manager
*m
) {
1336 return bus_event_loop_with_idle(
1339 "org.freedesktop.import1",
1345 static int run(int argc
, char *argv
[]) {
1346 _cleanup_(manager_unrefp
) Manager
*m
= NULL
;
1349 log_setup_service();
1354 log_error("This program takes no arguments.");
1358 assert_se(sigprocmask_many(SIG_BLOCK
, NULL
, SIGCHLD
, -1) >= 0);
1360 r
= manager_new(&m
);
1362 return log_error_errno(r
, "Failed to allocate manager object: %m");
1364 r
= manager_add_bus_objects(m
);
1370 return log_error_errno(r
, "Failed to run event loop: %m");
1375 DEFINE_MAIN_FUNCTION(run
);