1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
23 #include <sys/socket.h>
28 #include <dbus/dbus.h>
31 #include "dbus-common.h"
34 int bus_check_peercred(DBusConnection *c) {
41 assert_se(dbus_connection_get_unix_fd(c, &fd));
43 l = sizeof(struct ucred);
44 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0) {
45 log_error("SO_PEERCRED failed: %m");
49 if (l != sizeof(struct ucred)) {
50 log_error("SO_PEERCRED returned wrong size.");
60 #define TIMEOUT_USEC (60*USEC_PER_SEC)
62 static int sync_auth(DBusConnection *bus, DBusError *error) {
67 /* This complexity should probably move into D-Bus itself:
69 * https://bugs.freedesktop.org/show_bug.cgi?id=35189 */
71 begin = tstamp = now(CLOCK_MONOTONIC);
74 if (tstamp > begin + TIMEOUT_USEC)
77 if (dbus_connection_get_is_authenticated(bus))
80 if (!dbus_connection_read_write_dispatch(bus, ((begin + TIMEOUT_USEC - tstamp) + USEC_PER_MSEC - 1) / USEC_PER_MSEC))
83 tstamp = now(CLOCK_MONOTONIC);
86 if (!dbus_connection_get_is_connected(bus)) {
87 dbus_set_error_const(error, DBUS_ERROR_NO_SERVER, "Connection terminated during authentication.");
91 if (!dbus_connection_get_is_authenticated(bus)) {
92 dbus_set_error_const(error, DBUS_ERROR_TIMEOUT, "Failed to authenticate in time.");
99 int bus_connect(DBusBusType t, DBusConnection **_bus, bool *private, DBusError *error) {
105 /* If we are root, then let's not go via the bus */
106 if (geteuid() == 0 && t == DBUS_BUS_SYSTEM) {
108 if (!(bus = dbus_connection_open_private("unix:path=/dev/.run/systemd/private", error))) {
110 dbus_error_free(error);
112 /* Retry with the pre v21 socket name, to ease upgrades */
113 if (!(bus = dbus_connection_open_private("unix:abstract=/org/freedesktop/systemd1/private", error)))
118 dbus_connection_set_exit_on_disconnect(bus, FALSE);
120 if (bus_check_peercred(bus) < 0) {
121 dbus_connection_close(bus);
122 dbus_connection_unref(bus);
124 dbus_set_error_const(error, DBUS_ERROR_ACCESS_DENIED, "Failed to verify owner of bus.");
132 if (!(bus = dbus_bus_get_private(t, error)))
135 dbus_connection_set_exit_on_disconnect(bus, FALSE);
141 if ((r = sync_auth(bus, error)) < 0) {
142 dbus_connection_close(bus);
143 dbus_connection_unref(bus);
151 int bus_connect_system_ssh(const char *user, const char *host, DBusConnection **_bus, DBusError *error) {
157 assert(user || host);
160 asprintf(&p, "exec:path=ssh,argv1=-xT,argv2=%s@%s,argv3=systemd-stdio-bridge", user, host);
162 asprintf(&p, "exec:path=ssh,argv1=-xT,argv2=%s@localhost,argv3=systemd-stdio-bridge", user);
164 asprintf(&p, "exec:path=ssh,argv1=-xT,argv2=%s,argv3=systemd-stdio-bridge", host);
167 dbus_set_error_const(error, DBUS_ERROR_NO_MEMORY, NULL);
171 bus = dbus_connection_open_private(p, error);
177 dbus_connection_set_exit_on_disconnect(bus, FALSE);
179 if ((r = sync_auth(bus, error)) < 0) {
180 dbus_connection_close(bus);
181 dbus_connection_unref(bus);
185 if (!dbus_bus_register(bus, error)) {
186 dbus_connection_close(bus);
187 dbus_connection_unref(bus);
195 int bus_connect_system_polkit(DBusConnection **_bus, DBusError *error) {
201 /* Don't bother with PolicyKit if we are root */
203 return bus_connect(DBUS_BUS_SYSTEM, _bus, NULL, error);
205 if (!(bus = dbus_connection_open_private("exec:path=pkexec,argv1=" SYSTEMD_STDIO_BRIDGE_BINARY_PATH, error)))
208 dbus_connection_set_exit_on_disconnect(bus, FALSE);
210 if ((r = sync_auth(bus, error)) < 0) {
211 dbus_connection_close(bus);
212 dbus_connection_unref(bus);
216 if (!dbus_bus_register(bus, error)) {
217 dbus_connection_close(bus);
218 dbus_connection_unref(bus);
226 const char *bus_error_message(const DBusError *error) {
229 /* Sometimes the D-Bus server is a little bit too verbose with
230 * its error messages, so let's override them here */
231 if (dbus_error_has_name(error, DBUS_ERROR_ACCESS_DENIED))
232 return "Access denied";
234 return error->message;