bus.c 12.9 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
/* -*- mode: C; c-file-style: "gnu" -*- */
/* bus.c  message bus context object
 *
 * Copyright (C) 2003 Red Hat, Inc.
 *
 * Licensed under the Academic Free License version 1.2
 * 
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 * 
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 *
 */

#include "bus.h"
#include "loop.h"
#include "activation.h"
#include "connection.h"
#include "services.h"
#include "utils.h"
30 31 32
#include "policy.h"
#include <dbus/dbus-list.h>
#include <dbus/dbus-hash.h>
33 34 35 36 37
#include <dbus/dbus-internals.h>

struct BusContext
{
  int refcount;
38
  char *address;
39 40 41 42
  DBusServer *server;
  BusConnections *connections;
  BusActivation *activation;
  BusRegistry *registry;
43
  DBusList *default_rules;      /**< Default policy rules */
44
  DBusList *mandatory_rules;    /**< Mandatory policy rules */
45 46
  DBusHashTable *rules_by_uid;  /**< per-UID policy rules */
  DBusHashTable *rules_by_gid;  /**< per-GID policy rules */
47 48
};

49
static dbus_bool_t
50 51 52 53 54 55
server_watch_callback (DBusWatch     *watch,
                       unsigned int   condition,
                       void          *data)
{
  BusContext *context = data;

56
  return dbus_server_handle_watch (context->server, watch, condition);
57 58
}

59
static dbus_bool_t
60 61 62
add_server_watch (DBusWatch  *watch,
                  BusContext *context)
{
63 64
  return bus_loop_add_watch (watch, server_watch_callback, context,
                             NULL);
65 66 67 68 69 70 71 72 73
}

static void
remove_server_watch (DBusWatch  *watch,
                     BusContext *context)
{
  bus_loop_remove_watch (watch, server_watch_callback, context);
}

74

75 76 77 78
static void
server_timeout_callback (DBusTimeout   *timeout,
                         void          *data)
{
79
  /* can return FALSE on OOM but we just let it fire again later */
80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
  dbus_timeout_handle (timeout);
}

static dbus_bool_t
add_server_timeout (DBusTimeout *timeout,
                    BusContext  *context)
{
  return bus_loop_add_timeout (timeout, server_timeout_callback, context, NULL);
}

static void
remove_server_timeout (DBusTimeout *timeout,
                       BusContext  *context)
{
  bus_loop_remove_timeout (timeout, server_timeout_callback, context);
}

97 98 99 100 101 102 103 104
static void
new_connection_callback (DBusServer     *server,
                         DBusConnection *new_connection,
                         void           *data)
{
  BusContext *context = data;
  
  if (!bus_connections_setup_connection (context->connections, new_connection))
105 106
    {
      _dbus_verbose ("No memory to setup new connection\n");
107

108 109 110 111 112 113 114 115
      /* if we don't do this, it will get unref'd without
       * being disconnected... kind of strange really
       * that we have to do this, people won't get it right
       * in general.
       */
      dbus_connection_disconnect (new_connection);
    }
  
116
  /* on OOM, we won't have ref'd the connection so it will die. */
117 118
}

119
static void
120 121
free_rule_func (void *data,
                void *user_data)
122 123 124 125 126 127
{
  BusPolicyRule *rule = data;

  bus_policy_rule_unref (rule);
}

128 129 130 131 132 133 134 135 136 137 138 139
static void
free_rule_list_func (void *data)
{
  DBusList **list = data;

  _dbus_list_foreach (list, free_rule_func, NULL);
  
  _dbus_list_clear (list);

  dbus_free (list);
}

140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162
BusContext*
bus_context_new (const char  *address,
                 const char **service_dirs,
                 DBusError   *error)
{
  BusContext *context;
  
  context = dbus_new0 (BusContext, 1);
  if (context == NULL)
    {
      BUS_SET_OOM (error);
      return NULL;
    }
  
  context->refcount = 1;

  context->address = _dbus_strdup (address);
  if (context->address == NULL)
    {
      BUS_SET_OOM (error);
      goto failed;
    }
  
163
  context->server = dbus_server_listen (address, error);
164
  if (context->server == NULL)
165
    goto failed;
166

167
  context->activation = bus_activation_new (context, address, service_dirs,
168 169 170 171 172 173 174 175 176 177 178 179 180 181
                                            error);
  if (context->activation == NULL)
    {
      _DBUS_ASSERT_ERROR_IS_SET (error);
      goto failed;
    }

  context->connections = bus_connections_new (context);
  if (context->connections == NULL)
    {
      BUS_SET_OOM (error);
      goto failed;
    }

182
  context->registry = bus_registry_new (context);
183 184 185 186 187 188
  if (context->registry == NULL)
    {
      BUS_SET_OOM (error);
      goto failed;
    }
  
189
  context->rules_by_uid = _dbus_hash_table_new (DBUS_HASH_ULONG,
190
                                                NULL,
191
                                                free_rule_list_func);
192 193 194 195 196 197
  if (context->rules_by_uid == NULL)
    {
      BUS_SET_OOM (error);
      goto failed;
    }

198
  context->rules_by_gid = _dbus_hash_table_new (DBUS_HASH_ULONG,
199
                                                NULL,
200
                                                free_rule_list_func);
201 202 203 204 205 206
  if (context->rules_by_gid == NULL)
    {
      BUS_SET_OOM (error);
      goto failed;
    }
  
207 208 209 210
  dbus_server_set_new_connection_function (context->server,
                                           new_connection_callback,
                                           context, NULL);
  
211 212 213
  if (!dbus_server_set_watch_functions (context->server,
                                        (DBusAddWatchFunction) add_server_watch,
                                        (DBusRemoveWatchFunction) remove_server_watch,
214
                                        NULL,
215 216 217 218 219 220 221 222 223 224
                                        context,
                                        NULL))
    {
      BUS_SET_OOM (error);
      goto failed;
    }

  if (!dbus_server_set_timeout_functions (context->server,
                                          (DBusAddTimeoutFunction) add_server_timeout,
                                          (DBusRemoveTimeoutFunction) remove_server_timeout,
225
                                          NULL,
226 227 228 229 230
                                          context, NULL))
    {
      BUS_SET_OOM (error);
      goto failed;
    }
231 232 233 234 235 236 237 238 239 240 241
  
  return context;
  
 failed:
  bus_context_unref (context);
  return NULL;
}

void
bus_context_shutdown (BusContext  *context)
{
242 243 244 245 246
  if (context->server == NULL ||
      !dbus_server_get_is_connected (context->server))
    return;
  
  if (!dbus_server_set_watch_functions (context->server,
247
                                        NULL, NULL, NULL,
248 249 250 251 252
                                        context,
                                        NULL))
    _dbus_assert_not_reached ("setting watch functions to NULL failed");
  
  if (!dbus_server_set_timeout_functions (context->server,
253
                                          NULL, NULL, NULL,
254 255 256 257
                                          context,
                                          NULL))
    _dbus_assert_not_reached ("setting timeout functions to NULL failed");
  
258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275
  dbus_server_disconnect (context->server);
}

void
bus_context_ref (BusContext *context)
{
  _dbus_assert (context->refcount > 0);
  context->refcount += 1;
}

void
bus_context_unref (BusContext *context)
{
  _dbus_assert (context->refcount > 0);
  context->refcount -= 1;

  if (context->refcount == 0)
    {
276 277
      _dbus_verbose ("Finalizing bus context %p\n", context);
      
278
      bus_context_shutdown (context);
279 280 281 282 283 284

      if (context->connections)
        {
          bus_connections_unref (context->connections);
          context->connections = NULL;
        }
285
      
286
      if (context->registry)
287 288 289 290 291
        {
          bus_registry_unref (context->registry);
          context->registry = NULL;
        }
      
292
      if (context->activation)
293 294 295 296 297
        {
          bus_activation_unref (context->activation);
          context->activation = NULL;
        }
      
298
      if (context->server)
299 300 301 302
        {
          dbus_server_unref (context->server);
          context->server = NULL;
        }
303 304 305 306 307 308 309 310 311 312 313 314

      if (context->rules_by_uid)
        {
          _dbus_hash_table_unref (context->rules_by_uid);
          context->rules_by_uid = NULL;
        }

      if (context->rules_by_gid)
        {
          _dbus_hash_table_unref (context->rules_by_gid);
          context->rules_by_gid = NULL;
        }
315
      
316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337
      dbus_free (context->address);
      dbus_free (context);
    }
}

BusRegistry*
bus_context_get_registry (BusContext  *context)
{
  return context->registry;
}

BusConnections*
bus_context_get_connections (BusContext  *context)
{
  return context->connections;
}

BusActivation*
bus_context_get_activation (BusContext  *context)
{
  return context->activation;
}
338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517

static dbus_bool_t
list_allows_user (dbus_bool_t           def,
                  DBusList            **list,
                  unsigned long         uid,
                  const unsigned long  *group_ids,
                  int                   n_group_ids)
{
  DBusList *link;
  dbus_bool_t allowed;
  
  allowed = def;

  link = _dbus_list_get_first_link (list);
  while (link != NULL)
    {
      BusPolicyRule *rule = link->data;
      link = _dbus_list_get_next_link (list, link);
      
      if (rule->type == BUS_POLICY_RULE_USER)
        {
          if (rule->d.user.uid != uid)
            continue;
        }
      else if (rule->type == BUS_POLICY_RULE_GROUP)
        {
          int i;

          i = 0;
          while (i < n_group_ids)
            {
              if (rule->d.group.gid == group_ids[i])
                break;
              ++i;
            }

          if (i == n_group_ids)
            continue;
        }
      else
        continue;

      allowed = rule->allow;
    }
  
  return allowed;
}

dbus_bool_t
bus_context_allow_user (BusContext   *context,
                        unsigned long uid)
{
  dbus_bool_t allowed;
  unsigned long *group_ids;
  int n_group_ids;

  /* On OOM or error we always reject the user */
  if (!_dbus_get_groups (uid, &group_ids, &n_group_ids))
    {
      _dbus_verbose ("Did not get any groups for UID %lu\n",
                     uid);
      return FALSE;
    }
  
  allowed = FALSE;

  allowed = list_allows_user (allowed,
                              &context->default_rules,
                              uid,
                              group_ids, n_group_ids);

  allowed = list_allows_user (allowed,
                              &context->mandatory_rules,
                              uid,
                              group_ids, n_group_ids);

  dbus_free (group_ids);

  return allowed;
}

static dbus_bool_t
add_list_to_policy (DBusList       **list,
                    BusPolicy       *policy)
{
  DBusList *link;

  link = _dbus_list_get_first_link (list);
  while (link != NULL)
    {
      BusPolicyRule *rule = link->data;
      link = _dbus_list_get_next_link (list, link);

      switch (rule->type)
        {
        case BUS_POLICY_RULE_USER:
        case BUS_POLICY_RULE_GROUP:
          /* These aren't per-connection policies */
          break;

        case BUS_POLICY_RULE_OWN:
        case BUS_POLICY_RULE_SEND:
        case BUS_POLICY_RULE_RECEIVE:
          /* These are per-connection */
          if (!bus_policy_append_rule (policy, rule))
            return FALSE;
          break;
        }
    }
  
  return TRUE;
}

BusPolicy*
bus_context_create_connection_policy (BusContext      *context,
                                      DBusConnection  *connection)
{
  BusPolicy *policy;
  unsigned long uid;
  DBusList **list;

  _dbus_assert (dbus_connection_get_is_authenticated (connection));
  
  policy = bus_policy_new ();
  if (policy == NULL)
    return NULL;

  if (!add_list_to_policy (&context->default_rules,
                                      policy))
    goto failed;

  /* we avoid the overhead of looking up user's groups
   * if we don't have any group rules anyway
   */
  if (_dbus_hash_table_get_n_entries (context->rules_by_gid) > 0)
    {
      const unsigned long *groups;
      int n_groups;
      int i;
      
      if (!bus_connection_get_groups (connection, &groups, &n_groups))
        goto failed;
      
      i = 0;
      while (i < n_groups)
        {
          list = _dbus_hash_table_lookup_ulong (context->rules_by_gid,
                                                groups[i]);
          
          if (list != NULL)
            {
              if (!add_list_to_policy (list, policy))
                goto failed;
            }
          
          ++i;
        }
    }

  if (!dbus_connection_get_unix_user (connection, &uid))
    goto failed;

  list = _dbus_hash_table_lookup_ulong (context->rules_by_uid,
                                        uid);

  if (!add_list_to_policy (list, policy))
    goto failed;
  
  if (!add_list_to_policy (&context->mandatory_rules,
                           policy))
    goto failed;

  bus_policy_optimize (policy);
  
  return policy;
  
 failed:
  bus_policy_unref (policy);
  return NULL;
}