• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

systemd / systemd / 20401947236

20 Dec 2025 09:56PM UTC coverage: 72.701% (+0.1%) from 72.578%
20401947236

push

github

DaanDeMeyer
core/socket: modernize listen/accept_in_cgroup

4 of 9 new or added lines in 1 file covered. (44.44%)

7723 existing lines in 114 files now uncovered.

309972 of 426363 relevant lines covered (72.7%)

1133403.64 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

61.26
/src/sysupdate/sysupdated.c
1
/* SPDX-License-Identifier: LGPL-2.1-or-later */
2

3
#include <stdlib.h>
4
#include <sys/stat.h>
5
#include <unistd.h>
6

7
#include "sd-bus.h"
8
#include "sd-json.h"
9

10
#include "build-path.h"
11
#include "bus-common-errors.h"
12
#include "bus-error.h"
13
#include "bus-get-properties.h"
14
#include "bus-label.h"
15
#include "bus-log-control-api.h"
16
#include "bus-object.h"
17
#include "bus-polkit.h"
18
#include "bus-util.h"
19
#include "common-signal.h"
20
#include "constants.h"
21
#include "discover-image.h"
22
#include "dropin.h"
23
#include "env-util.h"
24
#include "escape.h"
25
#include "event-util.h"
26
#include "fd-util.h"
27
#include "fileio.h"
28
#include "format-util.h"
29
#include "hashmap.h"
30
#include "log.h"
31
#include "main-func.h"
32
#include "memfd-util.h"
33
#include "notify-recv.h"
34
#include "os-util.h"
35
#include "parse-util.h"
36
#include "path-util.h"
37
#include "pidref.h"
38
#include "process-util.h"
39
#include "runtime-scope.h"
40
#include "service-util.h"
41
#include "signal-util.h"
42
#include "string-table.h"
43
#include "strv.h"
44
#include "sysupdate-util.h"
45
#include "utf8.h"
46

47
#define FEATURES_DROPIN_NAME "systemd-sysupdate-enabled"
48

49
typedef struct Manager {
50
        sd_event *event;
51
        sd_bus *bus;
52

53
        Hashmap *targets;
54

55
        uint64_t last_job_id;
56
        Hashmap *jobs;
57

58
        Hashmap *polkit_registry;
59

60
        char *notify_socket_path;
61

62
        RuntimeScope runtime_scope; /* For now only RUNTIME_SCOPE_SYSTEM */
63
} Manager;
64

65
/* Forward declare so that jobs can call it on exit */
66
static void manager_check_idle(Manager *m);
67

68
typedef enum TargetClass {
69
        /* These should try to match ImageClass from src/basic/os-util.h */
70
        TARGET_MACHINE  = IMAGE_MACHINE,
71
        TARGET_PORTABLE = IMAGE_PORTABLE,
72
        TARGET_SYSEXT   = IMAGE_SYSEXT,
73
        TARGET_CONFEXT  = IMAGE_CONFEXT,
74
        _TARGET_CLASS_IS_IMAGE_CLASS_MAX,
75

76
        /* sysupdate-specific classes */
77
        TARGET_HOST = _TARGET_CLASS_IS_IMAGE_CLASS_MAX,
78
        TARGET_COMPONENT,
79

80
        _TARGET_CLASS_MAX,
81
        _TARGET_CLASS_INVALID = -EINVAL,
82
} TargetClass;
83

84
/* Let's ensure when the number of classes is updated things are updated here too */
85
assert_cc((int) _IMAGE_CLASS_MAX == (int) _TARGET_CLASS_IS_IMAGE_CLASS_MAX);
86

87
typedef struct Target {
88
        Manager *manager;
89

90
        TargetClass class;
91
        char *name;
92
        char *path;
93

94
        char *id;
95
        ImageType image_type;
96
        bool busy;
97
} Target;
98

99
typedef enum JobType {
100
        JOB_LIST,
101
        JOB_DESCRIBE,
102
        JOB_CHECK_NEW,
103
        JOB_UPDATE,
104
        JOB_VACUUM,
105
        JOB_DESCRIBE_FEATURE,
106
        _JOB_TYPE_MAX,
107
        _JOB_TYPE_INVALID = -EINVAL,
108
} JobType;
109

110
typedef struct Job Job;
111

112
typedef int (*JobReady)(sd_bus_message *msg, const Job *job);
113
typedef int (*JobComplete)(sd_bus_message *msg, const Job *job, sd_json_variant *response, sd_bus_error *error);
114

115
struct Job {
116
        Manager *manager;
117
        Target *target;
118

119
        uint64_t id;
120
        char *object_path;
121

122
        JobType type;
123
        bool offline;
124
        char *version; /* Passed into sysupdate for JOB_DESCRIBE and JOB_UPDATE */
125
        char *feature; /* Passed into sysupdate for JOB_DESCRIBE_FEATURE */
126

127
        unsigned progress_percent;
128

129
        sd_event_source *child;
130
        int stdout_fd;
131
        int status_errno;
132
        unsigned n_cancelled;
133

134
        sd_json_variant *json;
135

136
        JobComplete complete_cb; /* Callback called on job exit */
137
        sd_bus_message *dbus_msg;
138
        JobReady detach_cb; /* Callback called when job has started.  Detaches the job to run in the background */
139
};
140

141
static const char* const target_class_table[_TARGET_CLASS_MAX] = {
142
        [TARGET_MACHINE]   = "machine",
143
        [TARGET_PORTABLE]  = "portable",
144
        [TARGET_SYSEXT]    = "sysext",
145
        [TARGET_CONFEXT]   = "confext",
146
        [TARGET_COMPONENT] = "component",
147
        [TARGET_HOST]      = "host",
148
};
149

150
DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(target_class, TargetClass);
38✔
151

152
static const char* const job_type_table[_JOB_TYPE_MAX] = {
153
        [JOB_LIST]             = "list",
154
        [JOB_DESCRIBE]         = "describe",
155
        [JOB_CHECK_NEW]        = "check-new",
156
        [JOB_UPDATE]           = "update",
157
        [JOB_VACUUM]           = "vacuum",
158
        [JOB_DESCRIBE_FEATURE] = "describe-feature",
159
};
160

161
DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(job_type, JobType);
×
162

163
static Job *job_free(Job *j) {
20✔
164
        if (!j)
20✔
165
                return NULL;
166

167
        if (j->manager)
20✔
168
                assert_se(hashmap_remove(j->manager->jobs, &j->id) == j);
20✔
169

170
        free(j->object_path);
20✔
171
        free(j->version);
20✔
172
        free(j->feature);
20✔
173

174
        sd_json_variant_unref(j->json);
20✔
175

176
        sd_bus_message_unref(j->dbus_msg);
20✔
177

178
        sd_event_source_disable_unref(j->child);
20✔
179
        safe_close(j->stdout_fd);
20✔
180

181
        return mfree(j);
20✔
182
}
183

184
DEFINE_TRIVIAL_CLEANUP_FUNC(Job*, job_free);
40✔
185
DEFINE_HASH_OPS_WITH_VALUE_DESTRUCTOR(job_hash_ops, uint64_t, uint64_hash_func, uint64_compare_func,
×
186
                                      Job, job_free);
187

188
static int job_new(JobType type, Target *t, sd_bus_message *msg, JobComplete complete_cb, Job **ret) {
20✔
189
        _cleanup_(job_freep) Job *j = NULL;
20✔
190
        int r;
20✔
191

192
        assert(t);
20✔
193
        assert(ret);
20✔
194

195
        j = new(Job, 1);
20✔
196
        if (!j)
20✔
197
                return -ENOMEM;
198

199
        *j = (Job) {
40✔
200
                .type = type,
201
                .target = t,
202
                .id = t->manager->last_job_id + 1,
20✔
203
                .stdout_fd = -EBADF,
204
                .complete_cb = complete_cb,
205
                .dbus_msg = sd_bus_message_ref(msg),
20✔
206
        };
207

208
        if (asprintf(&j->object_path, "/org/freedesktop/sysupdate1/job/_%" PRIu64, j->id) < 0)
20✔
209
                return -ENOMEM;
210

211
        r = hashmap_ensure_put(&t->manager->jobs, &job_hash_ops, &j->id, j);
20✔
212
        if (r < 0)
20✔
213
                return r;
214

215
        j->manager = t->manager;
20✔
216

217
        t->manager->last_job_id = j->id;
20✔
218

219
        *ret = TAKE_PTR(j);
20✔
220
        return 0;
20✔
221
}
222

223
static int job_parse_child_output(int _fd, sd_json_variant **ret) {
20✔
224
        _cleanup_close_ int fd = ASSERT_FD(_fd); /* Take ownership of the passed fd */
40✔
225
        _cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
20✔
226
        struct stat st;
20✔
227
        int r;
20✔
228

229
        assert(ret);
20✔
230

231
        if (fstat(fd, &st) < 0)
20✔
232
                return log_debug_errno(errno, "Failed to stat stdout fd: %m");
×
233

234
        assert(S_ISREG(st.st_mode));
20✔
235

236
        if (st.st_size == 0) {
20✔
237
                log_warning("No output from child job, ignoring");
×
238
                return 0;
×
239
        }
240

241
        r = sd_json_parse_file_at(/* f= */ NULL, fd, /* path= */ NULL, /* flags= */ 0,
20✔
242
                                  &v, /* reterr_line= */ NULL, /* reterr_column= */ NULL);
243
        if (r < 0)
20✔
244
                return log_debug_errno(r, "Failed to parse child output as JSON: %m");
×
245

246
        *ret = TAKE_PTR(v);
20✔
247
        return 0;
20✔
248
}
249

250
static void job_on_ready(Job *j) {
2✔
251
        _cleanup_(sd_bus_message_unrefp) sd_bus_message *msg = NULL;
2✔
252
        int r;
2✔
253

254
        assert(j);
2✔
255

256
        /* Some jobs run in the background as we return the job ID to the dbus caller (i.e. for the Update
257
         * method). However, the worker will perform some sanity-checks on startup which would be valuable
258
         * as dbus errors. So, we wait for the worker to signal via READY=1 that it has completed its sanity
259
         * checks and we should continue the job in the background. */
260

261
        if (!j->detach_cb)
2✔
262
                return;
263

264
        log_debug("Got READY=1 from job %" PRIu64", detaching.", j->id);
2✔
265

266
        assert(j->dbus_msg);
2✔
267
        msg = TAKE_PTR(j->dbus_msg);
2✔
268

269
        j->complete_cb = NULL;
2✔
270

271
        r = j->detach_cb(msg, j);
2✔
272
        if (r < 0)
2✔
273
                log_warning_errno(r, "Failed to detach job %" PRIu64 ", ignoring: %m", j->id);
2✔
274
}
275

276
static void job_on_errno(Job *j, const char *buf) {
×
277
        int r;
×
278

279
        assert(j);
×
280
        assert(buf);
×
281

282
        r = parse_errno(buf);
×
283
        if (r < 0) {
×
284
                log_warning_errno(r, "Got invalid errno value from job %" PRIu64 ", ignoring: %m", j->id);
×
285
                return;
×
286
        }
287

288
        j->status_errno = r;
×
289

290
        log_debug_errno(r, "Got errno from job %" PRIu64 ": %i (%m)", j->id, r);
×
291
}
292

293
static void job_on_progress(Job *j, const char *buf) {
5✔
294
        unsigned progress;
5✔
295
        int r;
5✔
296

297
        assert(j);
5✔
298
        assert(buf);
5✔
299

300
        r = safe_atou(buf, &progress);
5✔
301
        if (r < 0 || progress > 100) {
5✔
302
                log_warning("Got invalid percent value, ignoring.");
×
303
                return;
×
304
        }
305

306
        j->progress_percent = progress;
5✔
307
        (void) sd_bus_emit_properties_changed(j->manager->bus, j->object_path,
5✔
308
                                              "org.freedesktop.sysupdate1.Job",
309
                                              "Progress", NULL);
310

311
        log_debug("Got percentage from job %" PRIu64 ": %u%%", j->id, j->progress_percent);
5✔
312
}
313

314
static void job_on_version(Job *j, const char *version) {
2✔
315
        assert(j);
2✔
316
        assert(version);
2✔
317

318
        if (free_and_strdup_warn(&j->version, version) < 0)
2✔
319
                return;
320

321
        log_debug("Got version from job %" PRIu64 ": %s ", j->id, j->version);
2✔
322
}
323

324
static int job_on_exit(sd_event_source *s, const siginfo_t *si, void *userdata) {
20✔
325
        Job *j = ASSERT_PTR(userdata);
20✔
326
        _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
×
327
        _cleanup_(sd_json_variant_unrefp) sd_json_variant *json = NULL;
20✔
328
        Manager *manager = j->manager;
20✔
329
        int r;
20✔
330

331
        assert(j);
20✔
332
        assert(s);
20✔
333
        assert(si);
20✔
334

335
        if (IN_SET(j->type, JOB_UPDATE, JOB_VACUUM)) {
20✔
336
                assert(j->target->busy);
2✔
337
                j->target->busy = false;
2✔
338
        }
339

340
        if (si->si_code != CLD_EXITED) {
20✔
341
                assert(IN_SET(si->si_code, CLD_KILLED, CLD_DUMPED));
×
342
                sd_bus_error_setf(&error, SD_BUS_ERROR_FAILED,
×
343
                                  "Job terminated abnormally with signal %s.",
344
                                  signal_to_string(si->si_status));
×
345
        } else if (si->si_status != EXIT_SUCCESS)
20✔
346
                if (j->status_errno != 0)
×
347
                        sd_bus_error_set_errno(&error, j->status_errno);
×
348
                else
349
                        sd_bus_error_setf(&error, SD_BUS_ERROR_FAILED,
×
350
                                          "Job failed with exit code %i.", si->si_status);
351
        else {
352
                r = job_parse_child_output(TAKE_FD(j->stdout_fd), &json);
20✔
353
                if (r < 0)
20✔
354
                        sd_bus_error_set_errnof(&error, r, "Failed to parse job worker output: %m");
×
355
        }
356

357
        /* Only send notification of exit if the job was actually detached */
358
        if (j->detach_cb) {
20✔
359
                r = sd_bus_emit_signal(
2✔
360
                                j->manager->bus,
2✔
361
                                "/org/freedesktop/sysupdate1",
362
                                "org.freedesktop.sysupdate1.Manager",
363
                                "JobRemoved",
364
                                "toi",
365
                                j->id,
366
                                j->object_path,
367
                                j->status_errno != 0 ? -j->status_errno : si->si_status);
2✔
368
                if (r < 0)
2✔
369
                        log_warning_errno(r,
×
370
                                          "Cannot emit JobRemoved message for job %" PRIu64 ", ignoring: %m",
371
                                          j->id);
372
        }
373

374
        if (j->dbus_msg && j->complete_cb) {
20✔
375
                if (sd_bus_error_is_set(&error)) {
18✔
376
                        log_warning("Job %" PRIu64 " failed with bus error, ignoring callback: %s",
×
377
                                    j->id, error.message);
378
                        sd_bus_reply_method_error(j->dbus_msg, &error);
×
379
                } else {
380
                        r = j->complete_cb(j->dbus_msg, j, json, &error);
18✔
381
                        if (r < 0) {
18✔
382
                                log_warning_errno(r,
×
383
                                                  "Error during execution of job callback for job %" PRIu64 ": %s",
384
                                                  j->id,
385
                                                  bus_error_message(&error, r));
386
                                sd_bus_reply_method_errno(j->dbus_msg, r, &error);
×
387
                        }
388
                }
389
        }
390

391
        job_free(j);
20✔
392

393
        if (manager)
20✔
394
                manager_check_idle(manager);
20✔
395

396
        return 0;
40✔
397
}
398

399
static inline const char* sysupdate_binary_path(void) {
34✔
400
        return secure_getenv("SYSTEMD_SYSUPDATE_PATH") ?: SYSTEMD_SYSUPDATE_PATH;
34✔
401
}
402

403
static int target_get_argument(Target *t, char **ret) {
24✔
404
        _cleanup_free_ char *target_arg = NULL;
48✔
405

406
        assert(t);
24✔
407
        assert(ret);
24✔
408

409
        if (t->class != TARGET_HOST) {
24✔
410
                if (t->class == TARGET_COMPONENT)
4✔
411
                        target_arg = strjoin("--component=", t->name);
4✔
412
                else if (IN_SET(t->image_type, IMAGE_DIRECTORY, IMAGE_SUBVOLUME))
×
413
                        target_arg = strjoin("--root=", t->path);
×
414
                else if (IN_SET(t->image_type, IMAGE_RAW, IMAGE_BLOCK))
×
415
                        target_arg = strjoin("--image=", t->path);
×
416
                else
417
                        assert_not_reached();
×
418
                if (!target_arg)
4✔
419
                        return -ENOMEM;
420
        }
421

422
        *ret = TAKE_PTR(target_arg);
24✔
423
        return 0;
24✔
424
}
425

426
static int job_start(Job *j) {
20✔
427
        _cleanup_close_ int stdout_fd = -EBADF;
20✔
428
        _cleanup_(pidref_done_sigkill_wait) PidRef pid = PIDREF_NULL;
20✔
429
        int r;
20✔
430

431
        assert(j);
20✔
432

433
        if (IN_SET(j->type, JOB_UPDATE, JOB_VACUUM) && j->target->busy)
20✔
434
                return log_notice_errno(SYNTHETIC_ERRNO(EBUSY), "Target %s busy, ignoring job.", j->target->name);
×
435

436
        stdout_fd = memfd_new("sysupdate-stdout");
20✔
437
        if (stdout_fd < 0)
20✔
438
                return log_error_errno(stdout_fd, "Failed to create memfd: %m");
×
439

440
        r = pidref_safe_fork_full("(sd-sysupdate)",
60✔
441
                                  (int[]) { -EBADF, stdout_fd, STDERR_FILENO }, NULL, 0,
20✔
442
                                  FORK_RESET_SIGNALS|FORK_CLOSE_ALL_FDS|FORK_DEATHSIG_SIGTERM|
443
                                  FORK_REARRANGE_STDIO|FORK_LOG|FORK_REOPEN_LOG, &pid);
444
        if (r < 0)
40✔
445
                return r; /* FORK_LOG means pidref_safe_fork_full will handle the logging */
446
        if (r == 0) {
40✔
447
                /* Child */
448

449
                _cleanup_free_ char *target_arg = NULL;
×
450
                const char *cmd[] = {
20✔
451
                        "systemd-sysupdate",
452
                        "--json=short",
453
                        NULL, /* maybe --verify=no */
454
                        NULL, /* maybe --component=, --root=, or --image= */
455
                        NULL, /* maybe --offline */
456
                        NULL, /* list, check-new, update, vacuum, features */
457
                        NULL, /* maybe version (for list, update), maybe feature (features) */
458
                        NULL
459
                };
460
                size_t k = 2;
20✔
461

462
                if (setenv("NOTIFY_SOCKET", j->manager->notify_socket_path, /* overwrite= */ 1) < 0) {
20✔
463
                        log_error_errno(errno, "setenv() failed: %m");
×
464
                        _exit(EXIT_FAILURE);
×
465
                }
466

467
                if (getenv_bool("SYSTEMD_SYSUPDATE_NO_VERIFY") > 0)
20✔
468
                        cmd[k++] = "--verify=no"; /* For testing */
20✔
469

470
                r = setenv_systemd_exec_pid(true);
20✔
471
                if (r < 0)
20✔
472
                        log_warning_errno(r, "Failed to update $SYSTEMD_EXEC_PID, ignoring: %m");
×
473

474
                r = target_get_argument(j->target, &target_arg);
20✔
475
                if (r < 0) {
20✔
476
                        log_oom();
×
477
                        _exit(EXIT_FAILURE);
×
478
                }
479
                if (target_arg)
20✔
480
                        cmd[k++] = target_arg;
2✔
481

482
                if (j->offline)
20✔
483
                        cmd[k++] = "--offline";
×
484

485
                switch (j->type) {
20✔
486
                case JOB_LIST:
2✔
487
                        cmd[k++] = "list";
2✔
488
                        break;
2✔
489

490
                case JOB_DESCRIBE:
12✔
491
                        cmd[k++] = "list";
12✔
492
                        assert(!isempty(j->version));
12✔
493
                        cmd[k++] = j->version;
12✔
494
                        break;
12✔
495

496
                case JOB_CHECK_NEW:
4✔
497
                        cmd[k++] = "check-new";
4✔
498
                        break;
4✔
499

500
                case JOB_UPDATE:
2✔
501
                        cmd[k++] = "update";
2✔
502
                        cmd[k++] = empty_to_null(j->version);
4✔
503
                        break;
2✔
504

505
                case JOB_VACUUM:
×
506
                        cmd[k++] = "vacuum";
×
507
                        break;
×
508

509
                case JOB_DESCRIBE_FEATURE:
×
510
                        cmd[k++] = "features";
×
511
                        assert(!isempty(j->feature));
×
512
                        cmd[k++] = j->feature;
×
513
                        break;
×
514

515
                default:
×
516
                        assert_not_reached();
×
517
                }
518

519
                if (DEBUG_LOGGING) {
20✔
520
                        _cleanup_free_ char *s = NULL;
20✔
521

522
                        s = quote_command_line((char**) cmd, SHELL_ESCAPE_EMPTY);
20✔
523
                        if (!s) {
20✔
524
                                log_oom();
×
525
                                _exit(EXIT_FAILURE);
×
526
                        }
527

528
                        log_debug("Spawning worker for job %" PRIu64 ": %s", j->id, s);
20✔
529
                }
530

531
                r = invoke_callout_binary(sysupdate_binary_path(), (char *const *) cmd);
40✔
532
                log_error_errno(r, "Failed to execute systemd-sysupdate: %m");
×
533
                _exit(EXIT_FAILURE);
×
534
        }
535

536
        log_info("Started job %" PRIu64 " with worker PID " PID_FMT,
20✔
537
                 j->id, pid.pid);
538

539
        r = event_add_child_pidref(j->manager->event, &j->child, &pid, WEXITED, job_on_exit, j);
20✔
540
        if (r < 0)
20✔
541
                return log_error_errno(r, "Failed to add child process to event loop: %m");
×
542

543
        r = sd_event_source_set_child_process_own(j->child, true);
20✔
544
        if (r < 0)
20✔
545
                return log_error_errno(r, "Event loop failed to take ownership of child process: %m");
×
546
        TAKE_PIDREF(pid);
20✔
547

548
        j->stdout_fd = TAKE_FD(stdout_fd);
20✔
549

550
        if (IN_SET(j->type, JOB_UPDATE, JOB_VACUUM))
20✔
551
                j->target->busy = true;
2✔
552

553
        return 0;
554
}
555

556
static int job_cancel(Job *j) {
×
557
        int r;
×
558

559
        assert(j);
×
560

561
        r = sd_event_source_send_child_signal(j->child, j->n_cancelled < 3 ? SIGTERM : SIGKILL,
×
562
                                              NULL, 0);
563
        if (r < 0)
×
564
                return r;
565

566
        j->n_cancelled++;
×
567
        return 0;
×
568
}
569

570
static int job_method_cancel(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
571
        Job *j = ASSERT_PTR(userdata);
×
572
        const char *action;
×
573
        int r;
×
574

575
        assert(msg);
×
576

577
        switch (j->type) {
×
578
        case JOB_LIST:
579
        case JOB_DESCRIBE:
580
        case JOB_CHECK_NEW:
581
                action = "org.freedesktop.sysupdate1.check";
582
                break;
583

584
        case JOB_UPDATE:
×
585
                if (j->version)
×
586
                        action = "org.freedesktop.sysupdate1.update-to-version";
587
                else
588
                        action = "org.freedesktop.sysupdate1.update";
×
589
                break;
590

591
        case JOB_VACUUM:
592
                action = "org.freedesktop.sysupdate1.vacuum";
×
593
                break;
×
594

595
        case JOB_DESCRIBE_FEATURE:
596
                action = NULL;
597
                break;
598

599
        default:
×
600
                assert_not_reached();
×
601
        }
602

603
        if (action) {
×
604
                r = bus_verify_polkit_async(
×
605
                                msg,
606
                                action,
607
                                /* details= */ NULL,
608
                                &j->manager->polkit_registry,
×
609
                                error);
610
                if (r < 0)
×
611
                        return r;
612
                if (r == 0)
×
613
                        return 1; /* Will call us back */
614
        }
615

616
        r = job_cancel(j);
×
617
        if (r < 0)
×
618
                return r;
619

620
        return sd_bus_reply_method_return(msg, NULL);
×
621
}
622

623
static BUS_DEFINE_PROPERTY_GET_ENUM(job_property_get_type, job_type, JobType);
×
624

625
static int job_object_find(
5✔
626
                sd_bus *bus,
627
                const char *path,
628
                const char *iface,
629
                void *userdata,
630
                void **ret,
631
                sd_bus_error *error) {
632

633
        Manager *m = ASSERT_PTR(userdata);
5✔
634
        Job *j;
5✔
635
        const char *p;
5✔
636
        uint64_t id;
5✔
637
        int r;
5✔
638

639
        assert(bus);
5✔
640
        assert(path);
5✔
641
        assert(ret);
5✔
642

643
        p = startswith(path, "/org/freedesktop/sysupdate1/job/_");
5✔
644
        if (!p)
5✔
645
                return 0;
5✔
646

647
        r = safe_atou64(p, &id);
5✔
648
        if (r < 0 || id == 0)
5✔
649
                return 0;
650

651
        j = hashmap_get(m->jobs, &id);
5✔
652
        if (!j)
5✔
653
                return 0;
654

655
        *ret = j;
5✔
656
        return 1;
5✔
657
}
658

659
static int job_node_enumerator(
×
660
                sd_bus *bus,
661
                const char *path,
662
                void *userdata,
663
                char ***nodes,
664
                sd_bus_error *error) {
665

666
        _cleanup_strv_free_ char **l = NULL;
×
667
        Manager *m = ASSERT_PTR(userdata);
×
668
        Job *j;
×
669
        unsigned k = 0;
×
670

671
        l = new0(char*, hashmap_size(m->jobs) + 1);
×
672
        if (!l)
×
673
                return -ENOMEM;
674

675
        HASHMAP_FOREACH(j, m->jobs) {
×
676
                l[k] = strdup(j->object_path);
×
677
                if (!l[k])
×
678
                        return -ENOMEM;
×
679
                k++;
×
680
        }
681

682
        *nodes = TAKE_PTR(l);
×
683
        return 1;
×
684
}
685

686
static const sd_bus_vtable job_vtable[] = {
687
        SD_BUS_VTABLE_START(0),
688

689
        SD_BUS_PROPERTY("Id", "t", NULL, offsetof(Job, id), SD_BUS_VTABLE_PROPERTY_CONST),
690
        SD_BUS_PROPERTY("Type", "s", job_property_get_type, offsetof(Job, type), SD_BUS_VTABLE_PROPERTY_CONST),
691
        SD_BUS_PROPERTY("Offline", "b", bus_property_get_bool, offsetof(Job, offline), SD_BUS_VTABLE_PROPERTY_CONST),
692
        SD_BUS_PROPERTY("Progress", "u", bus_property_get_unsigned, offsetof(Job, progress_percent), SD_BUS_VTABLE_PROPERTY_EMITS_CHANGE),
693

694
        SD_BUS_METHOD("Cancel", NULL, NULL, job_method_cancel, SD_BUS_VTABLE_UNPRIVILEGED),
695

696
        SD_BUS_VTABLE_END
697
};
698

699
static const BusObjectImplementation job_object = {
700
        "/org/freedesktop/sysupdate1/job",
701
        "org.freedesktop.sysupdate1.Job",
702
        .fallback_vtables = BUS_FALLBACK_VTABLES({job_vtable, job_object_find}),
703
        .node_enumerator = job_node_enumerator,
704
};
705

706
static Target *target_free(Target *t) {
18✔
707
        if (!t)
18✔
708
                return NULL;
709

710
        free(t->name);
18✔
711
        free(t->path);
18✔
712
        free(t->id);
18✔
713

714
        return mfree(t);
18✔
715
}
716

717
DEFINE_TRIVIAL_CLEANUP_FUNC(Target*, target_free);
46✔
718
DEFINE_HASH_OPS_WITH_VALUE_DESTRUCTOR(target_hash_ops, char, string_hash_func, string_compare_func,
18✔
719
                                      Target, target_free);
720

721
static int target_new(Manager *m, TargetClass class, const char *name, const char *path, Target **ret) {
18✔
722
        _cleanup_(target_freep) Target *t = NULL;
18✔
723

724
        assert(m);
18✔
725
        assert(ret);
18✔
726

727
        t = new(Target, 1);
18✔
728
        if (!t)
18✔
729
                return -ENOMEM;
730

731
        *t = (Target) {
18✔
732
                .manager = m,
733
                .class = class,
734
                .image_type = _IMAGE_TYPE_INVALID,
735
        };
736

737
        t->name = strdup(name);
18✔
738
        if (!t->name)
18✔
739
                return -ENOMEM;
740

741
        t->path = strdup(path);
18✔
742
        if (!t->path)
18✔
743
                return -ENOMEM;
744

745
        if (class == TARGET_HOST)
18✔
746
                t->id = strdup("host"); /* This is what appears in the object path */
10✔
747
        else
748
                t->id = strjoin(target_class_to_string(class), ":", name);
8✔
749
        if (!t->id)
18✔
750
                return -ENOMEM;
751

752
        *ret = TAKE_PTR(t);
18✔
753
        return 0;
18✔
754
}
755

756
static int sysupdate_run_simple(sd_json_variant **ret, Target *t, ...) {
14✔
757
        _cleanup_close_pair_ int pipe[2] = EBADF_PAIR;
14✔
758
        _cleanup_(pidref_done_sigkill_wait) PidRef pid = PIDREF_NULL;
×
759
        _cleanup_fclose_ FILE *f = NULL;
14✔
760
        _cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
14✔
761
        _cleanup_free_ char *target_arg = NULL;
14✔
762
        int r;
14✔
763

764
        if (t) {
14✔
765
                r = target_get_argument(t, &target_arg);
4✔
766
                if (r < 0)
4✔
767
                        return r;
768
        }
769

770
        r = pipe2(pipe, O_CLOEXEC);
14✔
771
        if (r < 0)
14✔
772
                return -errno;
×
773

774
        r = pidref_safe_fork_full("(sd-sysupdate)",
42✔
775
                                  (int[]) { -EBADF, pipe[1], STDERR_FILENO },
14✔
776
                                  NULL, 0,
777
                                  FORK_RESET_SIGNALS|FORK_CLOSE_ALL_FDS|FORK_DEATHSIG_SIGTERM|
778
                                  FORK_REARRANGE_STDIO|FORK_LOG|FORK_REOPEN_LOG,
779
                                  &pid);
780
        if (r < 0)
28✔
781
                return r;
782
        if (r == 0) {
28✔
783
                /* Child */
784
                va_list ap;
14✔
785
                char *arg;
14✔
786
                _cleanup_strv_free_ char **args = NULL;
×
787

788
                if (strv_extend(&args, "systemd-sysupdate") < 0) {
14✔
789
                        log_oom();
×
790
                        _exit(EXIT_FAILURE);
×
791
                }
792

793
                if (strv_extend(&args, "--json=short") < 0) {
14✔
794
                        log_oom();
×
795
                        _exit(EXIT_FAILURE);
×
796
                }
797

798
                if (target_arg && strv_extend(&args, target_arg) < 0) {
14✔
799
                        log_oom();
×
800
                        _exit(EXIT_FAILURE);
×
801
                }
802

803
                va_start(ap, t);
14✔
804
                while ((arg = va_arg(ap, char*))) {
32✔
805
                        r = strv_extend(&args, arg);
18✔
806
                        if (r < 0)
18✔
807
                                break;
808
                }
809
                va_end(ap);
14✔
810
                if (r < 0) {
14✔
811
                        log_oom();
×
812
                        _exit(EXIT_FAILURE);
×
813
                }
814

815
                if (DEBUG_LOGGING) {
14✔
816
                        _cleanup_free_ char *s = NULL;
14✔
817

818
                        s = quote_command_line(args, SHELL_ESCAPE_EMPTY);
14✔
819
                        if (!s) {
14✔
820
                                log_oom();
×
821
                                _exit(EXIT_FAILURE);
×
822
                        }
823

824
                        log_debug("Spawning sysupdate: %s", s);
14✔
825
                }
826

827
                r = invoke_callout_binary(sysupdate_binary_path(), args);
28✔
828
                log_error_errno(r, "Failed to execute systemd-sysupdate: %m");
×
829
                _exit(EXIT_FAILURE);
×
830
        }
831

832
        pipe[1] = safe_close(pipe[1]);
14✔
833
        f = take_fdopen(&pipe[0], "r");
14✔
834
        if (!f)
14✔
835
                return -errno;
×
836

837
        r = sd_json_parse_file(f, "stdout", 0, &v, NULL, NULL);
14✔
838
        if (r < 0)
14✔
839
                return log_debug_errno(r, "Failed to parse JSON: %m");
×
840

841
        *ret = TAKE_PTR(v);
14✔
842
        return 0;
14✔
843
}
844

845
static BUS_DEFINE_PROPERTY_GET_ENUM(target_property_get_class, target_class, TargetClass);
×
846

847
#define log_sysupdate_bad_json_full(lvl, r, verb, msg) \
848
        log_full_errno((lvl), (r), "Invalid JSON response from 'systemd-sysupdate %s': %s", (verb), (msg))
849
#define log_sysupdate_bad_json(r, verb, msg) \
850
        log_sysupdate_bad_json_full(LOG_ERR, (r), (verb), (msg))
851
#define log_sysupdate_bad_json_debug(r, verb, msg) \
852
        log_sysupdate_bad_json_full(LOG_DEBUG, (r), (verb), (msg))
853

854
static int target_method_list_finish(
2✔
855
                sd_bus_message *msg,
856
                const Job *j,
857
                sd_json_variant *json,
858
                sd_bus_error *error) {
859

860
        sd_json_variant *v;
2✔
861
        _cleanup_strv_free_ char **versions = NULL;
×
862
        _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
2✔
863
        int r;
2✔
864

865
        assert(json);
2✔
866

867
        v = sd_json_variant_by_key(json, "all");
2✔
868
        if (!v)
2✔
869
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "list", "Missing key 'all'");
×
870

871
        r = sd_json_variant_strv(v, &versions);
2✔
872
        if (r < 0)
2✔
873
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "list", "Key 'all' should be strv");
×
874

875
        r = sd_bus_message_new_method_return(msg, &reply);
2✔
876
        if (r < 0)
2✔
877
                return r;
878

879
        r = sd_bus_message_append_strv(reply, versions);
2✔
880
        if (r < 0)
2✔
881
                return r;
882

883
        return sd_bus_message_send(reply);
2✔
884
}
885

886
static int target_method_list(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
2✔
887
        Target *t = ASSERT_PTR(userdata);
2✔
888
        _cleanup_(job_freep) Job *j = NULL;
2✔
889
        uint64_t flags;
2✔
890
        int r;
2✔
891

892
        assert(msg);
2✔
893

894
        r = sd_bus_message_read(msg, "t", &flags);
2✔
895
        if (r < 0)
2✔
896
                return r;
897

898
        if ((flags & ~SD_SYSUPDATE_FLAGS_ALL) != 0)
2✔
899
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid flags specified");
×
900

901
        const char *details[] = {
6✔
902
                "class", target_class_to_string(t->class),
2✔
903
                "name", t->name,
2✔
904
                "offline", one_zero(FLAGS_SET(flags, SD_SYSUPDATE_OFFLINE)),
2✔
905
                NULL
906
        };
907

908
        r = bus_verify_polkit_async(
4✔
909
                msg,
910
                "org.freedesktop.sysupdate1.check",
911
                details,
912
                &t->manager->polkit_registry,
2✔
913
                error);
914
        if (r < 0)
2✔
915
                return r;
916
        if (r == 0)
2✔
917
                return 1; /* Will call us back */
918

919
        r = job_new(JOB_LIST, t, msg, target_method_list_finish, &j);
2✔
920
        if (r < 0)
2✔
921
                return r;
922

923
        j->offline = FLAGS_SET(flags, SD_SYSUPDATE_OFFLINE);
2✔
924

925
        r = job_start(j);
2✔
926
        if (r < 0)
2✔
927
                return sd_bus_error_set_errnof(error, r, "Failed to start job: %m");
×
928
        TAKE_PTR(j); /* Avoid job from being killed & freed */
2✔
929

930
        return 1;
2✔
931
}
932

933
static int target_method_describe_finish(
12✔
934
                sd_bus_message *msg,
935
                const Job *j,
936
                sd_json_variant *json,
937
                sd_bus_error *error) {
938
        _cleanup_free_ char *text = NULL;
12✔
939
        int r;
12✔
940

941
        /* NOTE: This is also reused by target_method_describe_feature */
942

943
        assert(json);
12✔
944

945
        r = sd_json_variant_format(json, 0, &text);
12✔
946
        if (r < 0)
12✔
947
                return r;
948

949
        return sd_bus_reply_method_return(msg, "s", text);
12✔
950
}
951

952
static int target_method_describe(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
12✔
953
        Target *t = ASSERT_PTR(userdata);
12✔
954
        _cleanup_(job_freep) Job *j = NULL;
12✔
955
        const char *version;
12✔
956
        uint64_t flags;
12✔
957
        int r;
12✔
958

959
        assert(msg);
12✔
960

961
        r = sd_bus_message_read(msg, "st", &version, &flags);
12✔
962
        if (r < 0)
12✔
963
                return r;
964

965
        if (isempty(version))
12✔
966
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Version must be specified");
×
967

968
        if ((flags & ~SD_SYSUPDATE_FLAGS_ALL) != 0)
12✔
969
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid flags specified");
×
970

971
        const char *details[] = {
36✔
972
                "class", target_class_to_string(t->class),
12✔
973
                "name", t->name,
12✔
974
                "version", version,
975
                "offline", one_zero(FLAGS_SET(flags, SD_SYSUPDATE_OFFLINE)),
12✔
976
                NULL
977
        };
978

979
        r = bus_verify_polkit_async(
24✔
980
                msg,
981
                "org.freedesktop.sysupdate1.check",
982
                details,
983
                &t->manager->polkit_registry,
12✔
984
                error);
985
        if (r < 0)
12✔
986
                return r;
987
        if (r == 0)
12✔
988
                return 1; /* Will call us back */
989

990
        r = job_new(JOB_DESCRIBE, t, msg, target_method_describe_finish, &j);
12✔
991
        if (r < 0)
12✔
992
                return r;
993

994
        j->version = strdup(version);
12✔
995
        if (!j->version)
12✔
996
                return log_oom();
×
997

998
        j->offline = FLAGS_SET(flags, SD_SYSUPDATE_OFFLINE);
12✔
999

1000
        r = job_start(j);
12✔
1001
        if (r < 0)
12✔
1002
                return sd_bus_error_set_errnof(error, r, "Failed to start job: %m");
×
1003
        TAKE_PTR(j); /* Avoid job from being killed & freed */
12✔
1004

1005
        return 1;
12✔
1006
}
1007

1008
static int target_method_check_new_finish(
4✔
1009
                sd_bus_message *msg,
1010
                const Job *j,
1011
                sd_json_variant *json,
1012
                sd_bus_error *error) {
1013
        const char *reply;
4✔
1014

1015
        assert(json);
4✔
1016

1017
        sd_json_variant *v = sd_json_variant_by_key(json, "available");
4✔
1018
        if (!v)
4✔
1019
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "check-new", "Missing key 'available'");
×
1020

1021
        if (sd_json_variant_is_null(v))
4✔
1022
                reply = "";
1023
        else
1024
                reply = sd_json_variant_string(v);
×
1025
        if (!reply)
×
1026
                return -EINVAL;
1027

1028
        return sd_bus_reply_method_return(msg, "s", reply);
4✔
1029
}
1030

1031
static int target_method_check_new(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
4✔
1032
        Target *t = ASSERT_PTR(userdata);
4✔
1033
        _cleanup_(job_freep) Job *j = NULL;
4✔
1034
        int r;
4✔
1035

1036
        assert(msg);
4✔
1037

1038
        const char *details[] = {
8✔
1039
                "class", target_class_to_string(t->class),
4✔
1040
                "name", t->name,
4✔
1041
                "offline", "0",
1042
                NULL
1043
        };
1044

1045
        r = bus_verify_polkit_async(
8✔
1046
                        msg,
1047
                        "org.freedesktop.sysupdate1.check",
1048
                        details,
1049
                        &t->manager->polkit_registry,
4✔
1050
                        error);
1051
        if (r < 0)
4✔
1052
                return r;
1053
        if (r == 0)
4✔
1054
                return 1; /* Will call us back */
1055

1056
        r = job_new(JOB_CHECK_NEW, t, msg, target_method_check_new_finish, &j);
4✔
1057
        if (r < 0)
4✔
1058
                return r;
1059

1060
        r = job_start(j);
4✔
1061
        if (r < 0)
4✔
1062
                return sd_bus_error_set_errnof(error, r, "Failed to start job: %m");
×
1063
        TAKE_PTR(j); /* Avoid job from being killed & freed */
4✔
1064

1065
        return 1;
4✔
1066
}
1067

1068
static int target_method_update_finished_early(
×
1069
                sd_bus_message *msg,
1070
                const Job *j,
1071
                sd_json_variant *json,
1072
                sd_bus_error *error) {
1073

1074
        /* Called when job finishes w/ a successful exit code, but before any work begins.
1075
         * This happens when there is no candidate (i.e. we're already up-to-date), or
1076
         * specified update is already installed. */
1077
        return sd_bus_error_setf(error, BUS_ERROR_NO_UPDATE_CANDIDATE,
×
1078
                                 "Job exited successfully with no work to do, assume already updated");
1079
}
1080

1081
static int target_method_update_detach(sd_bus_message *msg, const Job *j) {
2✔
1082
        int r;
2✔
1083

1084
        assert(msg);
2✔
1085
        assert(j);
2✔
1086

1087
        r = sd_bus_reply_method_return(msg, "sto", j->version, j->id, j->object_path);
2✔
1088
        if (r < 0)
2✔
1089
                return bus_log_parse_error(r);
×
1090

1091
        return 0;
1092
}
1093

1094
static int target_method_update(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
2✔
1095
        Target *t = ASSERT_PTR(userdata);
2✔
1096
        _cleanup_(job_freep) Job *j = NULL;
2✔
1097
        const char *version, *action;
2✔
1098
        uint64_t flags;
2✔
1099
        int r;
2✔
1100

1101
        assert(msg);
2✔
1102

1103
        r = sd_bus_message_read(msg, "st", &version, &flags);
2✔
1104
        if (r < 0)
2✔
1105
                return r;
1106

1107
        if (flags != 0)
2✔
1108
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Flags must be 0");
×
1109

1110
        if (isempty(version))
4✔
1111
                action = "org.freedesktop.sysupdate1.update";
1112
        else
1113
                action = "org.freedesktop.sysupdate1.update-to-version";
1114

1115
        const char *details[] = {
4✔
1116
                "class", target_class_to_string(t->class),
2✔
1117
                "name", t->name,
2✔
1118
                "version", version,
1119
                NULL
1120
        };
1121

1122
        r = bus_verify_polkit_async(
4✔
1123
                        msg,
1124
                        action,
1125
                        details,
1126
                        &t->manager->polkit_registry,
2✔
1127
                        error);
1128
        if (r < 0)
2✔
1129
                return r;
1130
        if (r == 0)
2✔
1131
                return 1; /* Will call us back */
1132

1133
        r = job_new(JOB_UPDATE, t, msg, target_method_update_finished_early, &j);
2✔
1134
        if (r < 0)
2✔
1135
                return r;
1136
        j->detach_cb = target_method_update_detach;
2✔
1137

1138
        j->version = strdup(version);
2✔
1139
        if (!j->version)
2✔
1140
                return -ENOMEM;
1141

1142
        r = job_start(j);
2✔
1143
        if (r < 0)
2✔
1144
                return sd_bus_error_set_errnof(error, r, "Failed to start job: %m");
×
1145
        TAKE_PTR(j);
2✔
1146

1147
        return 1;
2✔
1148
}
1149

1150
static int target_method_vacuum_finish(
×
1151
                sd_bus_message *msg,
1152
                const Job *j,
1153
                sd_json_variant *json,
1154
                sd_bus_error *error) {
1155

1156
        sd_json_variant *v;
×
1157
        uint64_t instances, disabled;
×
1158

1159
        assert(json);
×
1160

1161
        v = sd_json_variant_by_key(json, "removed");
×
1162
        if (!v)
×
1163
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "vacuum", "Missing key 'removed'");
×
1164
        if (!sd_json_variant_is_unsigned(v))
×
1165
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "vacuum", "Key 'removed' should be an unsigned int");
×
1166
        instances = sd_json_variant_unsigned(v);
×
1167
        assert(instances <= UINT32_MAX);
×
1168

1169
        v = sd_json_variant_by_key(json, "disabledTransfers");
×
1170
        if (!v)
×
1171
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "vacuum", "Missing key 'disabledTransfers'");
×
1172
        if (!sd_json_variant_is_unsigned(v))
×
1173
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "vacuum", "Key 'disabledTransfers' should be an unsigned int");
×
1174
        disabled = sd_json_variant_unsigned(v);
×
1175
        assert(disabled <= UINT32_MAX);
×
1176

1177
        return sd_bus_reply_method_return(msg, "uu", (uint32_t) instances, (uint32_t) disabled);
×
1178
}
1179

1180
static int target_method_vacuum(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
1181
        Target *t = ASSERT_PTR(userdata);
×
1182
        _cleanup_(job_freep) Job *j = NULL;
×
1183
        int r;
×
1184

1185
        assert(msg);
×
1186

1187
        const char *details[] = {
×
1188
                "class", target_class_to_string(t->class),
×
1189
                "name", t->name,
×
1190
                NULL
1191
        };
1192

1193
        r = bus_verify_polkit_async(
×
1194
                msg,
1195
                "org.freedesktop.sysupdate1.vacuum",
1196
                details,
1197
                &t->manager->polkit_registry,
×
1198
                error);
1199
        if (r < 0)
×
1200
                return r;
1201
        if (r == 0)
×
1202
                return 1; /* Will call us back */
1203

1204
        r = job_new(JOB_VACUUM, t, msg, target_method_vacuum_finish, &j);
×
1205
        if (r < 0)
×
1206
                return r;
1207

1208
        r = job_start(j);
×
1209
        if (r < 0)
×
1210
                return sd_bus_error_set_errnof(error, r, "Failed to start job: %m");
×
1211
        TAKE_PTR(j); /* Avoid job from being killed & freed */
×
1212

1213
        return 1;
×
1214
}
1215

1216
static int target_method_get_version(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
4✔
1217
        Target *t = ASSERT_PTR(userdata);
4✔
1218
        _cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
4✔
1219
        sd_json_variant *version_json;
4✔
1220
        int r;
4✔
1221

1222
        r = sysupdate_run_simple(&v, t, "--offline", "list", NULL);
4✔
1223
        if (r < 0)
4✔
1224
                return log_error_errno(r, "Failed to run 'systemd-sysupdate list': %m");
×
1225

1226
        version_json = sd_json_variant_by_key(v, "current");
4✔
1227
        if (!version_json)
4✔
1228
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "list", "Missing key 'current'");
×
1229

1230
        if (sd_json_variant_is_null(version_json))
4✔
1231
                return sd_bus_reply_method_return(msg, "s", "");
×
1232

1233
        if (!sd_json_variant_is_string(version_json))
4✔
1234
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "list", "Key 'current' should be a string");
×
1235

1236
        return sd_bus_reply_method_return(msg, "s", sd_json_variant_string(version_json));
4✔
1237
}
1238

1239
static int target_get_appstream(Target *t, char ***ret) {
×
1240
        _cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
×
1241
        sd_json_variant *appstream_url_json;
×
1242
        int r;
×
1243

1244
        r = sysupdate_run_simple(&v, t, "--offline", "list", NULL);
×
1245
        if (r < 0)
×
1246
                return log_error_errno(r, "Failed to run 'systemd-sysupdate list': %m");
×
1247

1248
        appstream_url_json = sd_json_variant_by_key(v, "appstreamUrls");
×
1249
        if (!appstream_url_json)
×
1250
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "list", "Missing key 'appstreamUrls'");
×
1251

1252
        r = sd_json_variant_strv(appstream_url_json, ret);
×
1253
        if (r < 0)
×
1254
                return log_sysupdate_bad_json(SYNTHETIC_ERRNO(EPROTO), "list", "Key 'appstreamUrls' should be strv");
×
1255

1256
        return 0;
1257
}
1258

1259
static int target_method_get_appstream(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
1260
        Target *t = ASSERT_PTR(userdata);
×
1261
        _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
×
1262
        _cleanup_strv_free_ char **appstream_urls = NULL;
×
1263
        int r;
×
1264

1265
        r = target_get_appstream(t, &appstream_urls);
×
1266
        if (r < 0)
×
1267
                return r;
1268

1269
        r = sd_bus_message_new_method_return(msg, &reply);
×
1270
        if (r < 0)
×
1271
                return r;
1272

1273
        r = sd_bus_message_append_strv(reply, appstream_urls);
×
1274
        if (r < 0)
×
1275
                return r;
1276

1277
        return sd_bus_message_send(reply);
×
1278
}
1279

1280
static int target_method_list_features(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
1281
        _cleanup_(sd_json_variant_unrefp) sd_json_variant *json = NULL;
×
1282
        _cleanup_strv_free_ char **features = NULL;
×
1283
        _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
×
1284
        Target *t = ASSERT_PTR(userdata);
×
1285
        sd_json_variant *v;
×
1286
        uint64_t flags;
×
1287
        int r;
×
1288

1289
        assert(msg);
×
1290

1291
        r = sd_bus_message_read(msg, "t", &flags);
×
1292
        if (r < 0)
×
1293
                return r;
1294
        if (flags != 0)
×
1295
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Flags must be 0");
×
1296

1297
        r = sysupdate_run_simple(&json, t, "features", NULL);
×
1298
        if (r < 0)
×
1299
                return r;
1300

1301
        v = sd_json_variant_by_key(json, "features");
×
1302
        if (!v)
×
1303
                return -EINVAL;
1304
        r = sd_json_variant_strv(v, &features);
×
1305
        if (r < 0)
×
1306
                return r;
1307

1308
        r = sd_bus_message_new_method_return(msg, &reply);
×
1309
        if (r < 0)
×
1310
                return r;
1311

1312
        r = sd_bus_message_append_strv(reply, features);
×
1313
        if (r < 0)
×
1314
                return r;
1315

1316
        return sd_bus_message_send(reply);
×
1317
}
1318

1319
static int target_method_describe_feature(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
1320
        Target *t = ASSERT_PTR(userdata);
×
1321
        _cleanup_(job_freep) Job *j = NULL;
×
1322
        const char *feature;
×
1323
        uint64_t flags;
×
1324
        int r;
×
1325

1326
        assert(msg);
×
1327

1328
        r = sd_bus_message_read(msg, "st", &feature, &flags);
×
1329
        if (r < 0)
×
1330
                return r;
1331

1332
        if (isempty(feature))
×
1333
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Feature must be specified");
×
1334

1335
        if (flags != 0)
×
1336
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Flags must be 0");
×
1337

1338
        r = job_new(JOB_DESCRIBE_FEATURE, t, msg, target_method_describe_finish, &j);
×
1339
        if (r < 0)
×
1340
                return r;
1341

1342
        j->feature = strdup(feature);
×
1343
        if (!j->feature)
×
1344
                return log_oom();
×
1345

1346
        r = job_start(j);
×
1347
        if (r < 0)
×
1348
                return sd_bus_error_set_errnof(error, r, "Failed to start job: %m");
×
1349
        TAKE_PTR(j); /* Avoid job from being killed & freed */
×
1350

1351
        return 1;
×
1352
}
1353

1354
static bool feature_name_is_valid(const char *name) {
×
1355
        if (isempty(name))
×
1356
                return false;
1357

1358
        if (!ascii_is_valid(name))
×
1359
                return false;
1360

1361
        if (!filename_is_valid(strjoina(name, ".feature.d")))
×
1362
                return false;
×
1363

1364
        return true;
1365
}
1366

1367
static int target_method_set_feature_enabled(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
1368
        _cleanup_free_ char *feature_ext = NULL;
×
1369
        Target *t = ASSERT_PTR(userdata);
×
1370
        const char *feature;
×
1371
        uint64_t flags;
×
1372
        int32_t enabled;
×
1373
        int r;
×
1374

1375
        assert(msg);
×
1376

1377
        if (t->class != TARGET_HOST)
×
1378
                return sd_bus_reply_method_errorf(msg,
×
1379
                                                  SD_BUS_ERROR_NOT_SUPPORTED,
1380
                                                  "For now, features can only be managed on the host system.");
1381

1382
        r = sd_bus_message_read(msg, "sit", &feature, &enabled, &flags);
×
1383
        if (r < 0)
×
1384
                return r;
1385
        if (!feature_name_is_valid(feature))
×
1386
                return sd_bus_reply_method_errorf(msg,
×
1387
                                                  SD_BUS_ERROR_INVALID_ARGS,
1388
                                                  "The specified feature is invalid");
1389
        if (flags != 0)
×
1390
                return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Flags must be 0");
×
1391

1392
        if (!endswith(feature, ".feature")) {
×
1393
                feature_ext = strjoin(feature, ".feature");
×
1394
                if (!feature_ext)
×
1395
                        return -ENOMEM;
1396
                feature = feature_ext;
×
1397
        }
1398

1399
        const char *details[] = {
×
1400
                "class", target_class_to_string(t->class),
×
1401
                "name", t->name,
×
1402
                "feature", feature,
1403
                "enabled", enabled >= 0 ? true_false(enabled) : "unset",
×
1404
                NULL
1405
        };
1406

1407
        r = bus_verify_polkit_async(
×
1408
                msg,
1409
                "org.freedesktop.sysupdate1.manage-features",
1410
                details,
1411
                &t->manager->polkit_registry,
×
1412
                error);
1413
        if (r < 0)
×
1414
                return r;
1415
        if (r == 0)
×
1416
                return 1; /* Will call us back */
1417

1418
        /* We assume that no sysadmin will name their config 50-systemd-sysupdate-enabled.conf */
1419
        if (enabled < 0) { /* Reset -> delete the drop-in file */
×
1420
                _cleanup_free_ char *path = NULL;
×
1421

1422
                r = drop_in_file(SYSCONF_DIR "/sysupdate.d", feature, 50, FEATURES_DROPIN_NAME, NULL, &path);
×
1423
                if (r < 0)
×
1424
                        return r;
1425

1426
                if (unlink(path) < 0)
×
1427
                        return -errno;
×
1428
        } else { /* otherwise, create the drop-in with the right settings */
1429
                r = write_drop_in_format(SYSCONF_DIR "/sysupdate.d", feature, 50, FEATURES_DROPIN_NAME,
×
1430
                                         "# Generated via org.freedesktop.sysupdate1 D-Bus interface\n\n"
1431
                                         "[Feature]\n"
1432
                                         "Enabled=%s\n",
1433
                                         yes_no(enabled));
1434
                if (r < 0)
×
1435
                        return r;
1436
        }
1437

1438
        return sd_bus_reply_method_return(msg, NULL);
×
1439
}
1440

1441
static int target_list_components(Target *t, char ***ret_components, bool *ret_have_default) {
10✔
1442
        _cleanup_(sd_json_variant_unrefp) sd_json_variant *json = NULL;
10✔
1443
        _cleanup_strv_free_ char **components = NULL;
10✔
1444
        sd_json_variant *v;
10✔
1445
        bool have_default;
10✔
1446
        int r;
10✔
1447

1448
        r = sysupdate_run_simple(&json, t, "components", NULL);
10✔
1449
        if (r < 0)
10✔
1450
                return log_debug_errno(r, "Failed to run 'systemd-sysupdate components': %m");
×
1451

1452
        v = sd_json_variant_by_key(json, "default");
10✔
1453
        if (!v)
10✔
1454
                return log_sysupdate_bad_json_debug(SYNTHETIC_ERRNO(EPROTO), "components", "Missing key 'default'");
×
1455
        have_default = sd_json_variant_boolean(v);
10✔
1456

1457
        v = sd_json_variant_by_key(json, "components");
10✔
1458
        if (!v)
10✔
1459
                return log_sysupdate_bad_json_debug(SYNTHETIC_ERRNO(EPROTO), "components", "Missing key 'components'");
×
1460
        r = sd_json_variant_strv(v, &components);
10✔
1461
        if (r < 0)
10✔
1462
                return log_sysupdate_bad_json_debug(SYNTHETIC_ERRNO(EPROTO), "components", "Key 'components' should be a strv");
×
1463

1464
        if (ret_components)
10✔
1465
                *ret_components = TAKE_PTR(components);
10✔
1466
        if (ret_have_default)
10✔
1467
                *ret_have_default = have_default;
10✔
1468
        return 0;
1469
}
1470

1471
static int manager_ensure_targets(Manager *m);
1472

1473
static int target_object_find(
28✔
1474
                sd_bus *bus,
1475
                const char *path,
1476
                const char *iface,
1477
                void *userdata,
1478
                void **found,
1479
                sd_bus_error *error) {
1480

1481
        Manager *m = ASSERT_PTR(userdata);
28✔
1482
        Target *t;
28✔
1483
        _cleanup_free_ char *e = NULL;
28✔
1484
        const char *p;
28✔
1485
        int r;
28✔
1486

1487
        assert(bus);
28✔
1488
        assert(path);
28✔
1489
        assert(found);
28✔
1490

1491
        p = startswith(path, "/org/freedesktop/sysupdate1/target/");
28✔
1492
        if (!p)
28✔
1493
                return 0;
1494

1495
        e = bus_label_unescape(p);
28✔
1496
        if (!e)
28✔
1497
                return -ENOMEM;
1498

1499
        r = manager_ensure_targets(m);
28✔
1500
        if (r < 0)
28✔
1501
                return r;
1502

1503
        t = hashmap_get(m->targets, e);
28✔
1504
        if (!t)
28✔
1505
                return 0;
1506

1507
        *found = t;
28✔
1508
        return 1;
28✔
1509
}
1510

1511
static char *target_bus_path(Target *t) {
10✔
1512
        _cleanup_free_ char *e = NULL;
10✔
1513

1514
        assert(t);
10✔
1515

1516
        e = bus_label_escape(t->id);
10✔
1517
        if (!e)
10✔
1518
                return NULL;
1519

1520
        return strjoin("/org/freedesktop/sysupdate1/target/", e);
10✔
1521
}
1522

1523
static int target_node_enumerator(
×
1524
                sd_bus *bus,
1525
                const char *path,
1526
                void *userdata,
1527
                char ***nodes,
1528
                sd_bus_error *error) {
1529

1530
        _cleanup_strv_free_ char **l = NULL;
×
1531
        Manager *m = ASSERT_PTR(userdata);
×
1532
        Target *t;
×
1533
        unsigned k = 0;
×
1534
        int r;
×
1535

1536
        r = manager_ensure_targets(m);
×
1537
        if (r < 0)
×
1538
                return r;
1539

1540
        l = new0(char*, hashmap_size(m->targets) + 1);
×
1541
        if (!l)
×
1542
                return -ENOMEM;
1543

1544
        HASHMAP_FOREACH(t, m->targets) {
×
1545
                l[k] = target_bus_path(t);
×
1546
                if (!l[k])
×
1547
                        return -ENOMEM;
×
1548
                k++;
×
1549
        }
1550

1551
        *nodes = TAKE_PTR(l);
×
1552
        return 1;
×
1553
}
1554

1555
static const sd_bus_vtable target_vtable[] = {
1556
        SD_BUS_VTABLE_START(0),
1557

1558
        SD_BUS_PROPERTY("Class", "s", target_property_get_class,
1559
                        offsetof(Target, class), SD_BUS_VTABLE_PROPERTY_CONST),
1560
        SD_BUS_PROPERTY("Name", "s", NULL, offsetof(Target, name),
1561
                        SD_BUS_VTABLE_PROPERTY_CONST),
1562
        SD_BUS_PROPERTY("Path", "s", NULL, offsetof(Target, path),
1563
                        SD_BUS_VTABLE_PROPERTY_CONST),
1564

1565
        SD_BUS_METHOD_WITH_ARGS("List",
1566
                                SD_BUS_ARGS("t", flags),
1567
                                SD_BUS_RESULT("as", versions),
1568
                                target_method_list,
1569
                                SD_BUS_VTABLE_UNPRIVILEGED),
1570

1571
        SD_BUS_METHOD_WITH_ARGS("Describe",
1572
                                SD_BUS_ARGS("s", version, "t", flags),
1573
                                SD_BUS_RESULT("s", json),
1574
                                target_method_describe,
1575
                                SD_BUS_VTABLE_UNPRIVILEGED),
1576

1577
        SD_BUS_METHOD_WITH_ARGS("CheckNew",
1578
                                SD_BUS_NO_ARGS,
1579
                                SD_BUS_RESULT("s", new_version),
1580
                                target_method_check_new,
1581
                                SD_BUS_VTABLE_UNPRIVILEGED),
1582

1583
        SD_BUS_METHOD_WITH_ARGS("Update",
1584
                                SD_BUS_ARGS("s", new_version, "t", flags),
1585
                                SD_BUS_RESULT("s", new_version, "t", job_id, "o", job_path),
1586
                                target_method_update,
1587
                                SD_BUS_VTABLE_UNPRIVILEGED),
1588

1589
        SD_BUS_METHOD_WITH_ARGS("Vacuum",
1590
                                SD_BUS_NO_ARGS,
1591
                                SD_BUS_RESULT("u", instances, "u", disabled_transfers),
1592
                                target_method_vacuum,
1593
                                SD_BUS_VTABLE_UNPRIVILEGED),
1594

1595
        SD_BUS_METHOD_WITH_ARGS("GetAppStream",
1596
                                SD_BUS_NO_ARGS,
1597
                                SD_BUS_RESULT("as", appstream),
1598
                                target_method_get_appstream,
1599
                                SD_BUS_VTABLE_UNPRIVILEGED),
1600

1601
        SD_BUS_METHOD_WITH_ARGS("GetVersion",
1602
                                SD_BUS_NO_ARGS,
1603
                                SD_BUS_RESULT("s", version),
1604
                                target_method_get_version,
1605
                                SD_BUS_VTABLE_UNPRIVILEGED),
1606

1607
        SD_BUS_METHOD_WITH_ARGS("ListFeatures",
1608
                                SD_BUS_ARGS("t", flags),
1609
                                SD_BUS_RESULT("as", features),
1610
                                target_method_list_features,
1611
                                SD_BUS_VTABLE_UNPRIVILEGED),
1612

1613
        SD_BUS_METHOD_WITH_ARGS("DescribeFeature",
1614
                                SD_BUS_ARGS("s", feature, "t", flags),
1615
                                SD_BUS_RESULT("s", json),
1616
                                target_method_describe_feature,
1617
                                SD_BUS_VTABLE_UNPRIVILEGED),
1618

1619
        SD_BUS_METHOD_WITH_ARGS("SetFeatureEnabled",
1620
                                SD_BUS_ARGS("s", feature, "i", enabled, "t", flags),
1621
                                SD_BUS_NO_RESULT,
1622
                                target_method_set_feature_enabled,
1623
                                SD_BUS_VTABLE_UNPRIVILEGED),
1624

1625
        SD_BUS_VTABLE_END
1626
};
1627

1628
static const BusObjectImplementation target_object = {
1629
        "/org/freedesktop/sysupdate1/target",
1630
        "org.freedesktop.sysupdate1.Target",
1631
        .fallback_vtables = BUS_FALLBACK_VTABLES({target_vtable, target_object_find}),
1632
        .node_enumerator = target_node_enumerator,
1633
};
1634

1635
static Manager *manager_free(Manager *m) {
1✔
1636
        if (!m)
1✔
1637
                return NULL;
1638

1639
        hashmap_free(m->targets);
1✔
1640
        hashmap_free(m->jobs);
1✔
1641

1642
        m->bus = sd_bus_flush_close_unref(m->bus);
1✔
1643
        free(m->notify_socket_path);
1✔
1644
        sd_event_unref(m->event);
1✔
1645

1646
        return mfree(m);
1✔
1647
}
1648

1649
DEFINE_TRIVIAL_CLEANUP_FUNC(Manager *, manager_free);
2✔
1650

1651
static int manager_on_notify(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
33✔
1652
        Manager *m = ASSERT_PTR(userdata);
33✔
1653
        int r;
33✔
1654

1655
        assert(fd >= 0);
33✔
1656

1657
        _cleanup_(pidref_done) PidRef sender_pidref = PIDREF_NULL;
×
1658
        _cleanup_free_ char *buf = NULL;
33✔
1659
        r = notify_recv(fd, &buf, /* ret_ucred= */ NULL, &sender_pidref);
33✔
1660
        if (r == -EAGAIN)
33✔
1661
                return 0;
1662
        if (r < 0)
33✔
1663
                return r;
1664

1665
        Job *j;
33✔
1666
        HASHMAP_FOREACH(j, m->jobs) {
55✔
1667
                PidRef child_pidref = PIDREF_NULL;
55✔
1668

1669
                r = event_source_get_child_pidref(j->child, &child_pidref);
55✔
1670
                if (r < 0)
55✔
1671
                        return log_warning_errno(r, "Failed to get child pidref: %m");
×
1672

1673
                if (pidref_equal(&sender_pidref, &child_pidref))
55✔
1674
                        break;
1675
        }
1676
        if (!j) {
33✔
1677
                log_warning("Got notification datagram from unexpected peer, ignoring.");
×
1678
                return 0;
×
1679
        }
1680

1681
        char *version = find_line_startswith(buf, "X_SYSUPDATE_VERSION=");
33✔
1682
        char *progress = find_line_startswith(buf, "X_SYSUPDATE_PROGRESS=");
33✔
1683
        char *errno_str = find_line_startswith(buf, "ERRNO=");
33✔
1684
        const char *ready = find_line_startswith(buf, "READY=1");
33✔
1685

1686
        if (version)
33✔
1687
                job_on_version(j, truncate_nl(version));
2✔
1688

1689
        if (progress)
33✔
1690
                job_on_progress(j, truncate_nl(progress));
5✔
1691

1692
        if (errno_str)
33✔
1693
                job_on_errno(j, truncate_nl(errno_str));
×
1694

1695
        /* Should come last, since this might actually detach the job */
1696
        if (ready)
33✔
1697
                job_on_ready(j);
2✔
1698

1699
        return 0;
1700
}
1701

1702
static int manager_new(Manager **ret) {
1✔
1703
        _cleanup_(manager_freep) Manager *m = NULL;
1✔
1704
        int r;
1✔
1705

1706
        assert(ret);
1✔
1707

1708
        m = new(Manager, 1);
1✔
1709
        if (!m)
1✔
1710
                return -ENOMEM;
1711

1712
        *m = (Manager) {
1✔
1713
                .runtime_scope = RUNTIME_SCOPE_SYSTEM,
1714
        };
1715

1716
        r = sd_event_default(&m->event);
1✔
1717
        if (r < 0)
1✔
1718
                return r;
1719

1720
        (void) sd_event_set_watchdog(m->event, true);
1✔
1721

1722
        r = sd_event_set_signal_exit(m->event, true);
1✔
1723
        if (r < 0)
1✔
1724
                return r;
1725

1726
        r = sd_event_add_signal(m->event, NULL, (SIGRTMIN+18) | SD_EVENT_SIGNAL_PROCMASK,
1✔
1727
                                sigrtmin18_handler, NULL);
1728
        if (r < 0)
1✔
1729
                return r;
1730

1731
        r = sd_event_add_memory_pressure(m->event, NULL, NULL, NULL);
1✔
1732
        if (r < 0)
1✔
1733
                log_debug_errno(r, "Failed to allocate memory pressure event source, ignoring: %m");
×
1734

1735
        r = sd_bus_default_system(&m->bus);
1✔
1736
        if (r < 0)
1✔
1737
                return r;
1738

1739
        r = notify_socket_prepare(
2✔
1740
                        m->event,
1741
                        SD_EVENT_PRIORITY_NORMAL - 1, /* Make this processed before worker exit. */
1742
                        manager_on_notify,
1743
                        m,
1744
                        &m->notify_socket_path);
1✔
1745
        if (r < 0)
1✔
1746
                return r;
1747

1748
        *ret = TAKE_PTR(m);
1✔
1749
        return 0;
1✔
1750
}
1751

1752
static int manager_enumerate_image_class(Manager *m, TargetClass class) {
40✔
1753
        _cleanup_hashmap_free_ Hashmap *images = NULL;
40✔
1754
        Image *image;
40✔
1755
        int r;
40✔
1756

1757
        r = image_discover(m->runtime_scope, (ImageClass) class, NULL, &images);
40✔
1758
        if (r < 0)
40✔
1759
                return r;
1760

1761
        HASHMAP_FOREACH(image, images) {
50✔
1762
                _cleanup_(target_freep) Target *t = NULL;
10✔
1763
                bool have = false;
10✔
1764

1765
                if (image_is_host(image))
10✔
1766
                        continue; /* We already enroll the host ourselves */
10✔
1767

1768
                r = target_new(m, class, image->name, image->path, &t);
×
1769
                if (r < 0)
×
1770
                        return r;
1771
                t->image_type = image->type;
×
1772

1773
                r = target_list_components(t, NULL, &have);
×
1774
                if (r < 0)
×
1775
                        return r;
1776
                if (!have) {
×
1777
                        log_debug("Skipping %s because it has no default component", image->path);
×
1778
                        continue;
×
1779
                }
1780

1781
                r = hashmap_ensure_put(&m->targets, &target_hash_ops, t->id, t);
×
1782
                if (r < 0)
×
1783
                        return r;
1784
                TAKE_PTR(t);
×
1785
        }
1786

1787
        return 0;
40✔
1788
}
1789

1790
static int manager_enumerate_components(Manager *m) {
10✔
1791
        _cleanup_strv_free_ char **components = NULL;
10✔
1792
        bool have_default;
10✔
1793
        int r;
10✔
1794

1795
        r = target_list_components(NULL, &components, &have_default);
10✔
1796
        if (r < 0)
10✔
1797
                return r;
1798

1799
        if (have_default) {
10✔
1800
                _cleanup_(target_freep) Target *t = NULL;
×
1801

1802
                r = target_new(m, TARGET_HOST, "host", "sysupdate.d", &t);
10✔
1803
                if (r < 0)
10✔
1804
                        return r;
1805

1806
                r = hashmap_ensure_put(&m->targets, &target_hash_ops, t->id, t);
10✔
1807
                if (r < 0)
10✔
1808
                        return r;
1809
                TAKE_PTR(t);
10✔
1810
        }
1811

1812
        STRV_FOREACH(component, components) {
18✔
1813
                _cleanup_free_ char *path = NULL;
8✔
1814
                _cleanup_(target_freep) Target *t = NULL;
8✔
1815

1816
                path = strjoin("sysupdate.", *component, ".d");
8✔
1817
                if (!path)
8✔
1818
                        return -ENOMEM;
1819

1820
                r = target_new(m, TARGET_COMPONENT, *component, path, &t);
8✔
1821
                if (r < 0)
8✔
1822
                        return r;
1823

1824
                r = hashmap_ensure_put(&m->targets, &target_hash_ops, t->id, t);
8✔
1825
                if (r < 0)
8✔
1826
                        return r;
1827
                TAKE_PTR(t);
8✔
1828
        }
1829

1830
        return 0;
1831
}
1832

1833
static int manager_enumerate_targets(Manager *m) {
10✔
1834
        static const TargetClass discoverable_classes[] = {
10✔
1835
                TARGET_MACHINE,
1836
                TARGET_PORTABLE,
1837
                TARGET_SYSEXT,
1838
                TARGET_CONFEXT,
1839
        };
1840
        int r;
10✔
1841

1842
        assert(m);
10✔
1843

1844
        FOREACH_ARRAY(class, discoverable_classes, ELEMENTSOF(discoverable_classes)) {
50✔
1845
                r = manager_enumerate_image_class(m, *class);
40✔
1846
                if (r < 0)
40✔
1847
                        log_warning_errno(r, "Failed to enumerate %ss, ignoring: %m",
40✔
1848
                                          target_class_to_string(*class));
1849
        }
1850

1851
        r = manager_enumerate_components(m);
10✔
1852
        if (r < 0)
10✔
1853
                log_warning_errno(r, "Failed to enumerate components, ignoring: %m");
×
1854

1855
        return 0;
10✔
1856
}
1857

1858
static int manager_ensure_targets(Manager *m) {
34✔
1859
        assert(m);
34✔
1860

1861
        if (!hashmap_isempty(m->targets))
34✔
1862
                return 0;
1863

1864
        return manager_enumerate_targets(m);
10✔
1865
}
1866

1867
static int method_list_targets(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
6✔
1868
        _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
6✔
1869
        Manager *m = ASSERT_PTR(userdata);
6✔
1870
        Target *t;
6✔
1871
        int r;
6✔
1872

1873
        assert(msg);
6✔
1874

1875
        r = manager_ensure_targets(m);
6✔
1876
        if (r < 0)
6✔
1877
                return r;
1878

1879
        r = sd_bus_message_new_method_return(msg, &reply);
6✔
1880
        if (r < 0)
6✔
1881
                return r;
1882

1883
        r = sd_bus_message_open_container(reply, 'a', "(sso)");
6✔
1884
        if (r < 0)
6✔
1885
                return r;
1886

1887
        HASHMAP_FOREACH(t, m->targets) {
16✔
1888
                _cleanup_free_ char *bus_path = NULL;
10✔
1889

1890
                bus_path = target_bus_path(t);
10✔
1891
                if (!bus_path)
10✔
1892
                        return -ENOMEM;
1893

1894
                r = sd_bus_message_append(reply, "(sso)",
10✔
1895
                                          target_class_to_string(t->class),
1896
                                          t->name,
10✔
1897
                                          bus_path);
1898
                if (r < 0)
10✔
1899
                        return r;
1900
        }
1901

1902
        r = sd_bus_message_close_container(reply);
6✔
1903
        if (r < 0)
6✔
1904
                return r;
1905

1906
        return sd_bus_message_send(reply);
6✔
1907
}
1908

1909
static int method_list_jobs(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
1910
        _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
×
1911
        Manager *m = ASSERT_PTR(userdata);
×
1912
        Job *j;
×
1913
        int r;
×
1914

1915
        assert(msg);
×
1916

1917
        r = sd_bus_message_new_method_return(msg, &reply);
×
1918
        if (r < 0)
×
1919
                return r;
1920

1921
        r = sd_bus_message_open_container(reply, 'a', "(tsuo)");
×
1922
        if (r < 0)
×
1923
                return r;
1924

1925
        HASHMAP_FOREACH(j, m->jobs) {
×
1926
                r = sd_bus_message_append(reply, "(tsuo)",
×
1927
                                          j->id,
1928
                                          job_type_to_string(j->type),
1929
                                          j->progress_percent,
1930
                                          j->object_path);
×
1931
                if (r < 0)
×
1932
                        return r;
×
1933
        }
1934

1935
        r = sd_bus_message_close_container(reply);
×
1936
        if (r < 0)
×
1937
                return r;
1938

1939
        return sd_bus_message_send(reply);
×
1940
}
1941

1942
static int method_list_appstream(sd_bus_message *msg, void *userdata, sd_bus_error *error) {
×
1943
        _cleanup_strv_free_ char **urls = NULL;
×
1944
        _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
×
1945
        Manager *m = ASSERT_PTR(userdata);
×
1946
        Target *t;
×
1947
        int r;
×
1948

1949
        assert(msg);
×
1950

1951
        r = manager_ensure_targets(m);
×
1952
        if (r < 0)
×
1953
                return r;
1954

1955
        HASHMAP_FOREACH(t, m->targets) {
×
1956
                char **target_appstream;
×
1957

1958
                r = target_get_appstream(t, &target_appstream);
×
1959
                if (r < 0)
×
1960
                        return r;
×
1961

1962
                r = strv_extend_strv_consume(&urls, target_appstream, /* filter_duplicates= */ true);
×
1963
                if (r < 0)
×
1964
                        return r;
1965
        }
1966

1967
        r = sd_bus_message_new_method_return(msg, &reply);
×
1968
        if (r < 0)
×
1969
                return r;
1970

1971
        r = sd_bus_message_append_strv(reply, urls);
×
1972
        if (r < 0)
×
1973
                return r;
1974

1975
        return sd_bus_message_send(reply);
×
1976
}
1977

1978
static const sd_bus_vtable manager_vtable[] = {
1979
        SD_BUS_VTABLE_START(0),
1980

1981
        SD_BUS_METHOD_WITH_ARGS("ListTargets",
1982
                                SD_BUS_NO_ARGS,
1983
                                SD_BUS_RESULT("a(sso)", targets),
1984
                                method_list_targets,
1985
                                SD_BUS_VTABLE_UNPRIVILEGED),
1986

1987
        SD_BUS_METHOD_WITH_ARGS("ListJobs",
1988
                                SD_BUS_NO_ARGS,
1989
                                SD_BUS_RESULT("a(tsuo)", jobs),
1990
                                method_list_jobs,
1991
                                SD_BUS_VTABLE_UNPRIVILEGED),
1992

1993
        SD_BUS_METHOD_WITH_ARGS("ListAppStream",
1994
                                SD_BUS_NO_ARGS,
1995
                                SD_BUS_RESULT("as", urls),
1996
                                method_list_appstream,
1997
                                SD_BUS_VTABLE_UNPRIVILEGED),
1998

1999
        SD_BUS_SIGNAL_WITH_ARGS("JobRemoved",
2000
                                SD_BUS_ARGS("t", id, "o", path, "i", status),
2001
                                0),
2002

2003
        SD_BUS_VTABLE_END
2004
};
2005

2006
static const BusObjectImplementation manager_object = {
2007
        "/org/freedesktop/sysupdate1",
2008
        "org.freedesktop.sysupdate1.Manager",
2009
        .vtables = BUS_VTABLES(manager_vtable),
2010
        .children = BUS_IMPLEMENTATIONS(&job_object, &target_object),
2011
};
2012

2013
static int manager_add_bus_objects(Manager *m) {
1✔
2014
        int r;
1✔
2015

2016
        assert(m);
1✔
2017

2018
        r = bus_add_implementation(m->bus, &manager_object, m);
1✔
2019
        if (r < 0)
1✔
2020
                return r;
2021

2022
        r = bus_log_control_api_register(m->bus);
1✔
2023
        if (r < 0)
1✔
2024
                return r;
2025

2026
        r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.sysupdate1", 0, NULL, NULL);
1✔
2027
        if (r < 0)
1✔
2028
                return log_error_errno(r, "Failed to request name: %m");
×
2029

2030
        r = sd_bus_attach_event(m->bus, m->event, 0);
1✔
2031
        if (r < 0)
1✔
2032
                return log_error_errno(r, "Failed to attach bus to event loop: %m");
×
2033

2034
        return 0;
2035
}
2036

2037
static bool manager_is_idle(void *userdata) {
90✔
2038
        Manager *m = ASSERT_PTR(userdata);
90✔
2039

2040
        return hashmap_isempty(m->jobs);
90✔
2041
}
2042

2043
static void manager_check_idle(Manager *m) {
20✔
2044
        assert(m);
20✔
2045

2046
        if (!hashmap_isempty(m->jobs))
20✔
2047
                return;
2048

2049
        hashmap_clear(m->targets);
10✔
2050
        log_debug("Cleared target cache");
10✔
2051
}
2052

2053
static int manager_run(Manager *m) {
1✔
2054
        assert(m);
1✔
2055

2056
        return bus_event_loop_with_idle(m->event,
1✔
2057
                                        m->bus,
2058
                                        "org.freedesktop.sysupdate1",
2059
                                        DEFAULT_EXIT_USEC,
2060
                                        manager_is_idle,
2061
                                        m);
2062
}
2063

2064
static int run(int argc, char *argv[]) {
1✔
2065
        _cleanup_(manager_freep) Manager *m = NULL;
1✔
2066
        int r;
1✔
2067

2068
        log_setup();
1✔
2069

2070
        r = service_parse_argv("systemd-sysupdated.service",
2✔
2071
                               "System update management service.",
2072
                               BUS_IMPLEMENTATIONS(&manager_object,
1✔
2073
                                                   &log_control_object),
2074
                               /* runtime_scope= */ NULL,
2075
                               argc, argv);
2076
        if (r <= 0)
1✔
2077
                return r;
2078

2079
        umask(0022);
1✔
2080

2081
        r = manager_new(&m);
1✔
2082
        if (r < 0)
1✔
UNCOV
2083
                return log_error_errno(r, "Failed to allocate manager object: %m");
×
2084

2085
        r = manager_add_bus_objects(m);
1✔
2086
        if (r < 0)
1✔
UNCOV
2087
                return log_error_errno(r, "Failed to add bus objects: %m");
×
2088

2089
        r = manager_run(m);
1✔
2090
        if (r < 0)
1✔
UNCOV
2091
                return log_error_errno(r, "Failed to run event loop: %m");
×
2092

2093
        return 0;
2094
}
2095

2096
DEFINE_MAIN_FUNCTION(run);
1✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc