1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2011 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
25 #include <sys/inotify.h>
29 #include "cgroup-util.h"
33 #include "login-shared.h"
36 _public_ int sd_pid_get_session(pid_t pid, char **session) {
38 assert_return(pid >= 0, -EINVAL);
39 assert_return(session, -EINVAL);
41 return cg_pid_get_session(pid, session);
44 _public_ int sd_pid_get_unit(pid_t pid, char **unit) {
46 assert_return(pid >= 0, -EINVAL);
47 assert_return(unit, -EINVAL);
49 return cg_pid_get_unit(pid, unit);
52 _public_ int sd_pid_get_user_unit(pid_t pid, char **unit) {
54 assert_return(pid >= 0, -EINVAL);
55 assert_return(unit, -EINVAL);
57 return cg_pid_get_user_unit(pid, unit);
60 _public_ int sd_pid_get_machine_name(pid_t pid, char **name) {
62 assert_return(pid >= 0, -EINVAL);
63 assert_return(name, -EINVAL);
65 return cg_pid_get_machine_name(pid, name);
68 _public_ int sd_pid_get_slice(pid_t pid, char **slice) {
70 assert_return(pid >= 0, -EINVAL);
71 assert_return(slice, -EINVAL);
73 return cg_pid_get_slice(pid, slice);
76 _public_ int sd_pid_get_owner_uid(pid_t pid, uid_t *uid) {
78 assert_return(pid >= 0, -EINVAL);
79 assert_return(uid, -EINVAL);
81 return cg_pid_get_owner_uid(pid, uid);
84 _public_ int sd_peer_get_session(int fd, char **session) {
88 assert_return(fd >= 0, -EINVAL);
89 assert_return(session, -EINVAL);
91 r = getpeercred(fd, &ucred);
95 return cg_pid_get_session(ucred.pid, session);
98 _public_ int sd_peer_get_owner_uid(int fd, uid_t *uid) {
102 assert_return(fd >= 0, -EINVAL);
103 assert_return(uid, -EINVAL);
105 r = getpeercred(fd, &ucred);
109 return cg_pid_get_owner_uid(ucred.pid, uid);
112 _public_ int sd_peer_get_unit(int fd, char **unit) {
116 assert_return(fd >= 0, -EINVAL);
117 assert_return(unit, -EINVAL);
119 r = getpeercred(fd, &ucred);
123 return cg_pid_get_unit(ucred.pid, unit);
126 _public_ int sd_peer_get_user_unit(int fd, char **unit) {
130 assert_return(fd >= 0, -EINVAL);
131 assert_return(unit, -EINVAL);
133 r = getpeercred(fd, &ucred);
137 return cg_pid_get_user_unit(ucred.pid, unit);
140 _public_ int sd_peer_get_machine_name(int fd, char **machine) {
144 assert_return(fd >= 0, -EINVAL);
145 assert_return(machine, -EINVAL);
147 r = getpeercred(fd, &ucred);
151 return cg_pid_get_machine_name(ucred.pid, machine);
154 _public_ int sd_peer_get_slice(int fd, char **slice) {
158 assert_return(fd >= 0, -EINVAL);
159 assert_return(slice, -EINVAL);
161 r = getpeercred(fd, &ucred);
165 return cg_pid_get_slice(ucred.pid, slice);
168 static int file_of_uid(uid_t uid, char **p) {
171 if (asprintf(p, "/run/systemd/users/" UID_FMT, uid) < 0)
177 _public_ int sd_uid_get_state(uid_t uid, char**state) {
178 _cleanup_free_ char *p = NULL;
182 assert_return(state, -EINVAL);
184 r = file_of_uid(uid, &p);
188 r = parse_env_file(p, NEWLINE, "STATE", &s, NULL);
191 s = strdup("offline");
205 _public_ int sd_uid_get_display(uid_t uid, char **session) {
206 _cleanup_free_ char *p = NULL, *s = NULL;
209 assert_return(session, -EINVAL);
211 r = file_of_uid(uid, &p);
215 r = parse_env_file(p, NEWLINE, "DISPLAY", &s, NULL);
228 _public_ int sd_uid_is_on_seat(uid_t uid, int require_active, const char *seat) {
230 _cleanup_free_ char *t = NULL, *s = NULL, *p = NULL;
233 const char *variable;
235 assert_return(seat, -EINVAL);
237 variable = require_active ? "ACTIVE_UID" : "UIDS";
239 p = strappend("/run/systemd/seats/", seat);
243 r = parse_env_file(p, NEWLINE, variable, &s, NULL);
251 if (asprintf(&t, UID_FMT, uid) < 0)
254 FOREACH_WORD(w, l, s, state) {
262 static int uid_get_array(uid_t uid, const char *variable, char ***array) {
263 _cleanup_free_ char *p = NULL, *s = NULL;
267 r = file_of_uid(uid, &p);
271 r = parse_env_file(p, NEWLINE,
290 a = strv_split(s, " ");
306 _public_ int sd_uid_get_sessions(uid_t uid, int require_active, char ***sessions) {
307 return uid_get_array(
309 require_active == 0 ? "ONLINE_SESSIONS" :
310 require_active > 0 ? "ACTIVE_SESSIONS" :
315 _public_ int sd_uid_get_seats(uid_t uid, int require_active, char ***seats) {
316 return uid_get_array(
318 require_active == 0 ? "ONLINE_SEATS" :
319 require_active > 0 ? "ACTIVE_SEATS" :
324 static int file_of_session(const char *session, char **_p) {
331 if (!session_id_valid(session))
334 p = strappend("/run/systemd/sessions/", session);
336 _cleanup_free_ char *buf = NULL;
338 r = sd_pid_get_session(0, &buf);
342 p = strappend("/run/systemd/sessions/", buf);
352 _public_ int sd_session_is_active(const char *session) {
354 _cleanup_free_ char *p = NULL, *s = NULL;
356 r = file_of_session(session, &p);
360 r = parse_env_file(p, NEWLINE, "ACTIVE", &s, NULL);
367 return parse_boolean(s);
370 _public_ int sd_session_is_remote(const char *session) {
372 _cleanup_free_ char *p = NULL, *s = NULL;
374 r = file_of_session(session, &p);
378 r = parse_env_file(p, NEWLINE, "REMOTE", &s, NULL);
385 return parse_boolean(s);
388 _public_ int sd_session_get_state(const char *session, char **state) {
389 _cleanup_free_ char *p = NULL, *s = NULL;
392 assert_return(state, -EINVAL);
394 r = file_of_session(session, &p);
398 r = parse_env_file(p, NEWLINE, "STATE", &s, NULL);
410 _public_ int sd_session_get_uid(const char *session, uid_t *uid) {
412 _cleanup_free_ char *p = NULL, *s = NULL;
414 assert_return(uid, -EINVAL);
416 r = file_of_session(session, &p);
420 r = parse_env_file(p, NEWLINE, "UID", &s, NULL);
427 return parse_uid(s, uid);
430 static int session_get_string(const char *session, const char *field, char **value) {
431 _cleanup_free_ char *p = NULL, *s = NULL;
434 assert_return(value, -EINVAL);
436 r = file_of_session(session, &p);
440 r = parse_env_file(p, NEWLINE, field, &s, NULL);
452 _public_ int sd_session_get_seat(const char *session, char **seat) {
453 return session_get_string(session, "SEAT", seat);
456 _public_ int sd_session_get_tty(const char *session, char **tty) {
457 return session_get_string(session, "TTY", tty);
460 _public_ int sd_session_get_vt(const char *session, unsigned *vtnr) {
461 _cleanup_free_ char *vtnr_string = NULL;
465 r = session_get_string(session, "VTNR", &vtnr_string);
469 r = safe_atou(vtnr_string, &u);
477 _public_ int sd_session_get_service(const char *session, char **service) {
478 return session_get_string(session, "SERVICE", service);
481 _public_ int sd_session_get_type(const char *session, char **type) {
482 return session_get_string(session, "TYPE", type);
485 _public_ int sd_session_get_class(const char *session, char **class) {
486 return session_get_string(session, "CLASS", class);
489 _public_ int sd_session_get_display(const char *session, char **display) {
490 return session_get_string(session, "DISPLAY", display);
493 _public_ int sd_session_get_remote_user(const char *session, char **remote_user) {
494 return session_get_string(session, "REMOTE_USER", remote_user);
497 _public_ int sd_session_get_remote_host(const char *session, char **remote_host) {
498 return session_get_string(session, "REMOTE_HOST", remote_host);
501 static int file_of_seat(const char *seat, char **_p) {
508 p = strappend("/run/systemd/seats/", seat);
510 _cleanup_free_ char *buf = NULL;
512 r = sd_session_get_seat(NULL, &buf);
516 p = strappend("/run/systemd/seats/", buf);
527 _public_ int sd_seat_get_active(const char *seat, char **session, uid_t *uid) {
528 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
531 assert_return(session || uid, -EINVAL);
533 r = file_of_seat(seat, &p);
537 r = parse_env_file(p, NEWLINE,
551 r = parse_uid(t, uid);
564 _public_ int sd_seat_get_sessions(const char *seat, char ***sessions, uid_t **uids, unsigned *n_uids) {
565 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
566 _cleanup_strv_free_ char **a = NULL;
567 _cleanup_free_ uid_t *b = NULL;
571 r = file_of_seat(seat, &p);
575 r = parse_env_file(p, NEWLINE,
577 "ACTIVE_SESSIONS", &t,
584 a = strv_split(s, " ");
593 FOREACH_WORD(w, l, t, state)
603 FOREACH_WORD(w, l, t, state) {
604 _cleanup_free_ char *k = NULL;
610 r = parse_uid(k, b + i);
638 static int seat_get_can(const char *seat, const char *variable) {
639 _cleanup_free_ char *p = NULL, *s = NULL;
642 assert_return(variable, -EINVAL);
644 r = file_of_seat(seat, &p);
648 r = parse_env_file(p, NEWLINE,
656 return parse_boolean(s);
659 _public_ int sd_seat_can_multi_session(const char *seat) {
660 return seat_get_can(seat, "CAN_MULTI_SESSION");
663 _public_ int sd_seat_can_tty(const char *seat) {
664 return seat_get_can(seat, "CAN_TTY");
667 _public_ int sd_seat_can_graphical(const char *seat) {
668 return seat_get_can(seat, "CAN_GRAPHICAL");
671 _public_ int sd_get_seats(char ***seats) {
672 return get_files_in_directory("/run/systemd/seats/", seats);
675 _public_ int sd_get_sessions(char ***sessions) {
676 return get_files_in_directory("/run/systemd/sessions/", sessions);
679 _public_ int sd_get_uids(uid_t **users) {
680 _cleanup_closedir_ DIR *d;
683 _cleanup_free_ uid_t *l = NULL;
685 d = opendir("/run/systemd/users/");
696 if (!de && errno != 0)
702 dirent_ensure_type(d, de);
704 if (!dirent_is_file(de))
707 k = parse_uid(de->d_name, &uid);
712 if ((unsigned) r >= n) {
716 t = realloc(l, sizeof(uid_t) * n);
723 assert((unsigned) r < n);
737 _public_ int sd_get_machine_names(char ***machines) {
738 char **l = NULL, **a, **b;
741 assert_return(machines, -EINVAL);
743 r = get_files_in_directory("/run/systemd/machines/", &l);
750 /* Filter out the unit: symlinks */
751 for (a = l, b = l; *a; a++) {
752 if (startswith(*a, "unit:"))
768 _public_ int sd_machine_get_class(const char *machine, char **class) {
769 _cleanup_free_ char *c = NULL;
773 assert_return(filename_is_safe(machine), -EINVAL);
774 assert_return(class, -EINVAL);
776 p = strappenda("/run/systemd/machines/", machine);
777 r = parse_env_file(p, NEWLINE, "CLASS", &c, NULL);
789 static inline int MONITOR_TO_FD(sd_login_monitor *m) {
790 return (int) (unsigned long) m - 1;
793 static inline sd_login_monitor* FD_TO_MONITOR(int fd) {
794 return (sd_login_monitor*) (unsigned long) (fd + 1);
797 _public_ int sd_login_monitor_new(const char *category, sd_login_monitor **m) {
801 assert_return(m, -EINVAL);
803 fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
807 if (!category || streq(category, "seat")) {
808 k = inotify_add_watch(fd, "/run/systemd/seats/", IN_MOVED_TO|IN_DELETE);
817 if (!category || streq(category, "session")) {
818 k = inotify_add_watch(fd, "/run/systemd/sessions/", IN_MOVED_TO|IN_DELETE);
827 if (!category || streq(category, "uid")) {
828 k = inotify_add_watch(fd, "/run/systemd/users/", IN_MOVED_TO|IN_DELETE);
837 if (!category || streq(category, "machine")) {
838 k = inotify_add_watch(fd, "/run/systemd/machines/", IN_MOVED_TO|IN_DELETE);
852 *m = FD_TO_MONITOR(fd);
856 _public_ sd_login_monitor* sd_login_monitor_unref(sd_login_monitor *m) {
859 assert_return(m, NULL);
861 fd = MONITOR_TO_FD(m);
867 _public_ int sd_login_monitor_flush(sd_login_monitor *m) {
869 assert_return(m, -EINVAL);
871 return flush_fd(MONITOR_TO_FD(m));
874 _public_ int sd_login_monitor_get_fd(sd_login_monitor *m) {
876 assert_return(m, -EINVAL);
878 return MONITOR_TO_FD(m);
881 _public_ int sd_login_monitor_get_events(sd_login_monitor *m) {
883 assert_return(m, -EINVAL);
885 /* For now we will only return POLLIN here, since we don't
886 * need anything else ever for inotify. However, let's have
887 * this API to keep our options open should we later on need
892 _public_ int sd_login_monitor_get_timeout(sd_login_monitor *m, uint64_t *timeout_usec) {
894 assert_return(m, -EINVAL);
895 assert_return(timeout_usec, -EINVAL);
897 /* For now we will only return (uint64_t) -1, since we don't
898 * need any timeout. However, let's have this API to keep our
899 * options open should we later on need it. */
900 *timeout_usec = (uint64_t) -1;