1 <?xml version="1.0" standalone="no"?>
2 <!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"
3 "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd"
9 <title>D-BUS Specification</title>
10 <releaseinfo>Version 0.10</releaseinfo>
11 <date>28 January 2005</date>
14 <firstname>Havoc</firstname>
15 <surname>Pennington</surname>
17 <orgname>Red Hat, Inc.</orgname>
19 <email>hp@pobox.com</email>
24 <firstname>Anders</firstname>
25 <surname>Carlsson</surname>
27 <orgname>CodeFactory AB</orgname>
29 <email>andersca@codefactory.se</email>
34 <firstname>Alexander</firstname>
35 <surname>Larsson</surname>
37 <orgname>Red Hat, Inc.</orgname>
39 <email>alexl@redhat.com</email>
46 <sect1 id="introduction">
47 <title>Introduction</title>
49 D-BUS is a system for low-latency, low-overhead, easy to use
50 interprocess communication (IPC). In more detail:
54 D-BUS is <emphasis>low-latency</emphasis> because it is designed
55 to avoid round trips and allow asynchronous operation, much like
61 D-BUS is <emphasis>low-overhead</emphasis> because it uses a
62 binary protocol, and does not have to convert to and from a text
63 format such as XML. Because D-BUS is intended for potentially
64 high-resolution same-machine IPC, not primarily for Internet IPC,
65 this is an interesting optimization.
70 D-BUS is <emphasis>easy to use</emphasis> because it works in terms
71 of <firstterm>messages</firstterm> rather than byte streams, and
72 automatically handles a lot of the hard IPC issues. Also, the D-BUS
73 library is designed to be wrapped in a way that lets developers use
74 their framework's existing object/type system, rather than learning
75 a new one specifically for IPC.
82 The base D-BUS protocol is a one-to-one (peer-to-peer or client-server)
83 protocol, specified in <xref linkend="message-protocol"/>. That is, it is
84 a system for one application to talk to a single other
85 application. However, the primary intended application of the protocol is the
86 D-BUS <firstterm>message bus</firstterm>, specified in <xref
87 linkend="message-bus"/>. The message bus is a special application that
88 accepts connections from multiple other applications, and forwards
93 Uses of D-BUS include notification of system changes (notification of when
94 a camera is plugged in to a computer, or a new version of some software
95 has been installed), or desktop interoperability, for example a file
96 monitoring service or a configuration service.
100 D-BUS is designed for two specific use cases:
104 A "system bus" for notifications from the system to user sessions,
105 and to allow the system to request input from user sessions.
110 A "session bus" used to implement desktop environments such as
115 D-BUS is not intended to be a generic IPC system for any possible
116 application, and intentionally omits many features found in other
117 IPC systems for this reason. D-BUS may turn out to be useful
118 in unanticipated applications, but future versions of this
119 spec and the reference implementation probably will not
120 incorporate features that interfere with the core use cases.
125 <sect1 id="message-protocol">
126 <title>Message Protocol</title>
129 A <firstterm>message</firstterm> consists of a
130 <firstterm>header</firstterm> and a <firstterm>body</firstterm>. If you
131 think of a message as a package, the header is the address, and the body
132 contains the package contents. The message delivery system uses the header
133 information to figure out where to send the message and how to interpret
134 it; the recipient inteprets the body of the message.
138 The body of the message is made up of zero or more
139 <firstterm>arguments</firstterm>, which are typed values, such as an
140 integer or a byte array.
144 Both header and body use the same type system and format for
145 serializing data. Each type of value has a wire format.
146 Converting a value from some other representation into the wire
147 format is called <firstterm>marshaling</firstterm> and converting
148 it back from the wire format is <firstterm>unmarshaling</firstterm>.
151 <sect2 id="message-protocol-signatures">
152 <title>Type Signatures</title>
155 The D-BUS protocol does not include type tags in the marshaled data; a
156 block of marshaled values must have a known <firstterm>type
157 signature</firstterm>. The type signature is made up of <firstterm>type
158 codes</firstterm>. A type code is an ASCII character representing the
159 type of a value. Because ASCII characters are used, the type signature
160 will always form a valid ASCII string. A simple string compare
161 determines whether two type signatures are equivalent.
165 As a simple example, the type code for 32-bit integer (<literal>INT32</literal>) is
166 the ASCII character 'i'. So the signature for a block of values
167 containing a single <literal>INT32</literal> would be:
171 A block of values containing two <literal>INT32</literal> would have this signature:
178 All <firstterm>basic</firstterm> types work like
179 <literal>INT32</literal> in this example. To marshal and unmarshal
180 basic types, you simply read one value from the data
181 block corresponding to each type code in the signature.
182 In addition to basic types, there are four <firstterm>container</firstterm>
183 types: <literal>STRUCT</literal>, <literal>ARRAY</literal>, <literal>VARIANT</literal>,
184 and <literal>DICT_ENTRY</literal>.
188 <literal>STRUCT</literal> has a type code, ASCII character 'r', but this type
189 code does not appear in signatures. Instead, ASCII characters
190 '(' and ')' are used to mark the beginning and end of the struct.
191 So for example, a struct containing two integers would have this
196 Structs can be nested, so for example a struct containing
197 an integer and another struct:
201 The value block storing that struct would contain three integers; the
202 type signature allows you to distinguish "(i(ii))" from "((ii)i)" or
207 The <literal>STRUCT</literal> type code 'r' is not currently used in the D-BUS protocol,
208 but is useful in code that implements the protocol. This type code
209 is specified to allow such code to interoperate in non-protocol contexts.
213 <literal>ARRAY</literal> has ASCII character 'a' as type code. The array type code must be
214 followed by a <firstterm>single complete type</firstterm>. The single
215 complete type following the array is the type of each array element. So
216 the simple example is:
220 which is an array of 32-bit integers. But an array can be of any type,
221 such as this array-of-struct-with-two-int32-fields:
225 Or this array of array of integer:
232 The phrase <firstterm>single complete type</firstterm> deserves some
233 definition. A single complete type is a basic type code, a variant type code,
234 an array with its element type, or a struct with its fields.
235 So the following signatures are not single complete types:
245 And the following signatures contain multiple complete types:
255 Note however that a single complete type may <emphasis>contain</emphasis>
256 multiple other single complete types.
260 <literal>VARIANT</literal> has ASCII character 'v' as its type code. A marshaled value of
261 type <literal>VARIANT</literal> will have the signature of a single complete type as part
262 of the <emphasis>value</emphasis>. This signature will be followed by a
263 marshaled value of that type.
267 A <literal>DICT_ENTRY</literal> works exactly like a struct, but rather
268 than parentheses it uses curly braces, and it has more restrictions.
269 The restrictions are: it occurs only as an array element type; and it
270 has exactly two single complete types inside the curly
271 braces. Implementations must not accept dict entries outside of arrays,
272 and must not accept dict entries with zero, one, or more than two
273 fields. A dict entry is always a key-value pair.
277 The first field in the <literal>DICT_ENTRY</literal> is always the key.
278 A message is considered corrupt if the same key occurs twice in the same
279 array of <literal>DICT_ENTRY</literal>. However, for performance reasons
280 implementations are not required to reject dicts with duplicate keys.
284 In most languages, an array of dict entry would be represented as a
285 map, hash table, or dict object.
289 The following table summarizes the D-BUS types.
294 <entry>Conventional Name</entry>
296 <entry>Description</entry>
301 <entry><literal>INVALID</literal></entry>
302 <entry>0 (ASCII NUL)</entry>
303 <entry>Not a valid type code, used to terminate signatures</entry>
305 <entry><literal>BYTE</literal></entry>
306 <entry>121 (ASCII 'y')</entry>
307 <entry>8-bit unsigned integer</entry>
309 <entry><literal>BOOLEAN</literal></entry>
310 <entry>98 (ASCII 'b')</entry>
311 <entry>Boolean value, 0 is <literal>FALSE</literal> and 1 is <literal>TRUE</literal>. Everything else is invalid.</entry>
313 <entry><literal>INT16</literal></entry>
314 <entry>110 (ASCII 'n')</entry>
315 <entry>16-bit signed integer</entry>
317 <entry><literal>UINT16</literal></entry>
318 <entry>113 (ASCII 'q')</entry>
319 <entry>16-bit unsigned integer</entry>
321 <entry><literal>INT32</literal></entry>
322 <entry>105 (ASCII 'i')</entry>
323 <entry>32-bit signed integer</entry>
325 <entry><literal>UINT32</literal></entry>
326 <entry>117 (ASCII 'u')</entry>
327 <entry>32-bit unsigned integer</entry>
329 <entry><literal>INT64</literal></entry>
330 <entry>120 (ASCII 'x')</entry>
331 <entry>64-bit signed integer</entry>
333 <entry><literal>UINT64</literal></entry>
334 <entry>116 (ASCII 't')</entry>
335 <entry>64-bit unsigned integer</entry>
337 <entry><literal>DOUBLE</literal></entry>
338 <entry>100 (ASCII 'd')</entry>
339 <entry>IEEE 754 double</entry>
341 <entry><literal>STRING</literal></entry>
342 <entry>115 (ASCII 's')</entry>
343 <entry>UTF-8 string (<emphasis>must</emphasis> be valid UTF-8). Must be nul terminated.</entry>
345 <entry><literal>OBJECT_PATH</literal></entry>
346 <entry>111 (ASCII 'o')</entry>
347 <entry>Name of an object instance</entry>
349 <entry><literal>SIGNATURE</literal></entry>
350 <entry>103 (ASCII 'g')</entry>
351 <entry>A type signature</entry>
353 <entry><literal>ARRAY</literal></entry>
354 <entry>97 (ASCII 'a')</entry>
357 <entry><literal>STRUCT</literal></entry>
358 <entry>114 (ASCII 'r'), 40 (ASCII '('), 41 (ASCII ')')</entry>
359 <entry>Struct</entry>
361 <entry><literal>VARIANT</literal></entry>
362 <entry>118 (ASCII 'v') </entry>
363 <entry>Variant type (the type of the value is part of the value itself)</entry>
365 <entry><literal>DICT_ENTRY</literal></entry>
366 <entry>101 (ASCII 'e'), 123 (ASCII '{'), 125 (ASCII '}') </entry>
367 <entry>Entry in a dict or map (array of key-value pairs)</entry>
376 <sect2 id="message-protocol-marshaling">
377 <title>Marshaling (Wire Format)</title>
380 Given a type signature, a block of bytes can be converted into typed
381 values. This section describes the format of the block of bytes. Byte
382 order and alignment issues are handled uniformly for all D-BUS types.
386 A block of bytes has an associated byte order. The byte order
387 has to be discovered in some way; for D-BUS messages, the
388 byte order is part of the message header as described in
389 <xref linkend="message-protocol-messages"/>. For now, assume
390 that the byte order is known to be either little endian or big
395 Each value in a block of bytes is aligned "naturally," for example
396 4-byte values are aligned to a 4-byte boundary, and 8-byte values to an
397 8-byte boundary. To properly align a value, <firstterm>alignment
398 padding</firstterm> may be necessary. The alignment padding must always
399 be the minimum required padding to properly align the following value;
400 and it must always be made up of nul bytes. The alignment padding must
401 not be left uninitialized (it can't contain garbage), and more padding
402 than required must not be used.
406 Given all this, the types are marshaled on the wire as follows:
411 <entry>Conventional Name</entry>
412 <entry>Encoding</entry>
413 <entry>Alignment</entry>
418 <entry><literal>INVALID</literal></entry>
419 <entry>Not applicable; cannot be marshaled.</entry>
422 <entry><literal>BYTE</literal></entry>
423 <entry>A single 8-bit byte.</entry>
426 <entry><literal>BOOLEAN</literal></entry>
427 <entry>As for <literal>UINT32</literal>, but only 0 and 1 are valid values.</entry>
430 <entry><literal>INT16</literal></entry>
431 <entry>16-bit signed integer in the message's byte order.</entry>
434 <entry><literal>UINT16</literal></entry>
435 <entry>16-bit unsigned integer in the message's byte order.</entry>
438 <entry><literal>INT32</literal></entry>
439 <entry>32-bit signed integer in the message's byte order.</entry>
442 <entry><literal>UINT32</literal></entry>
443 <entry>32-bit unsigned integer in the message's byte order.</entry>
446 <entry><literal>INT64</literal></entry>
447 <entry>64-bit signed integer in the message's byte order.</entry>
450 <entry><literal>UINT64</literal></entry>
451 <entry>64-bit unsigned integer in the message's byte order.</entry>
454 <entry><literal>DOUBLE</literal></entry>
455 <entry>64-bit IEEE 754 double in the message's byte order.</entry>
458 <entry><literal>STRING</literal></entry>
459 <entry>A <literal>UINT32</literal> indicating the string's
460 length in bytes excluding its terminating nul, followed by
461 string data of the given length, followed by a terminating nul
468 <entry><literal>OBJECT_PATH</literal></entry>
469 <entry>Exactly the same as <literal>STRING</literal> except the
470 content must be a valid object path (see below).
476 <entry><literal>SIGNATURE</literal></entry>
477 <entry>The same as <literal>STRING</literal> except the length is a single
478 byte (thus signatures have a maximum length of 255)
479 and the content must be a valid signature (see below).
485 <entry><literal>ARRAY</literal></entry>
487 A <literal>UINT32</literal> giving the length of the array data in bytes, followed by
488 alignment padding to the alignment boundary of the array element type,
489 followed by each array element. The array length is from the
490 end of the alignment padding to the end of the last element,
491 i.e. it does not include the padding after the length,
492 or any padding after the last element.
493 Arrays have a maximum length defined to be 2 to the 26th power or
494 67108864. Implementations must not send or accept arrays exceeding this
501 <entry><literal>STRUCT</literal></entry>
503 A struct must start on an 8-byte boundary regardless of the
504 type of the struct fields. The struct value consists of each
505 field marshaled in sequence starting from that 8-byte
512 <entry><literal>VARIANT</literal></entry>
514 A variant type has a marshaled <literal>SIGNATURE</literal>
515 followed by a marshaled value with the type
516 given in the signature.
517 Unlike a message signature, the variant signature
518 can contain only a single complete type.
519 So "i" is OK, "ii" is not.
522 1 (alignment of the signature)
525 <entry><literal>DICT_ENTRY</literal></entry>
538 <sect3 id="message-protocol-marshaling-object-path">
539 <title>Valid Object Paths</title>
542 An object path is a name used to refer to an object instance.
543 Conceptually, each participant in a D-BUS message exchange may have
544 any number of object instances (think of C++ or Java objects) and each
545 such instance will have a path. Like a filesystem, the object
546 instances in an application form a hierarchical tree.
550 The following rules define a valid object path. Implementations must
551 not send or accept messages with invalid object paths.
555 The path may be of any length.
560 The path must begin with an ASCII '/' (integer 47) character,
561 and must consist of elements separated by slash characters.
566 Each element must only contain the ASCII characters
572 No element may be the empty string.
577 Multiple '/' characters cannot occur in sequence.
582 A trailing '/' character is not allowed unless the
583 path is the root path (a single '/' character).
592 <sect3 id="message-protocol-marshaling-signature">
593 <title>Valid Signatures</title>
595 An implementation must not send or accept invalid signatures.
596 Valid signatures will conform to the following rules:
600 The signature ends with a nul byte.
605 The signature is a list of single complete types.
606 Arrays must have element types, and structs must
607 have both open and close parentheses.
612 Only type codes and open and close parentheses are
613 allowed in the signature. The <literal>STRUCT</literal> type code
614 is not allowed in signatures, because parentheses
620 The maximum depth of container type nesting is 32 array type
621 codes and 32 open parentheses. This implies that the maximum
622 total depth of recursion is 64, for an "array of array of array
623 of ... struct of struct of struct of ..." where there are 32
629 The maximum length of a signature is 255.
634 Signatures must be nul-terminated.
643 <sect2 id="message-protocol-messages">
644 <title>Message Format</title>
647 A message consists of a header and a body. The header is a block of
648 values with a fixed signature and meaning. The body is a separate block
649 of values, with a signature specified in the header.
653 The length of the header must be a multiple of 8, allowing the body to
654 begin on an 8-byte boundary when storing the entire message in a single
655 buffer. If the header does not naturally end on an 8-byte boundary
656 up to 7 bytes of nul-initialized alignment padding must be added.
660 The message body need not end on an 8-byte boundary.
664 The maximum length of a message, including header, header alignment padding,
665 and body is 2 to the 27th power or 134217728. Implementations must not
666 send or accept messages exceeding this size.
670 The signature of the header is:
674 Written out more readably, this is:
676 BYTE, BYTE, BYTE, BYTE, UINT32, UINT32, ARRAY of STRUCT of (BYTE,VARIANT)
681 These values have the following meanings:
687 <entry>Description</entry>
692 <entry>1st <literal>BYTE</literal></entry>
693 <entry>Endianness flag; ASCII 'l' for little-endian
694 or ASCII 'B' for big-endian. Both header and body are
695 in this endianness.</entry>
698 <entry>2nd <literal>BYTE</literal></entry>
699 <entry><firstterm>Message type</firstterm>. Unknown types MUST be ignored.
700 Currently-defined types are described below.
704 <entry>3rd <literal>BYTE</literal></entry>
705 <entry>Bitwise OR of flags. Unknown flags
706 MUST be ignored. Currently-defined flags are described below.
710 <entry>4th <literal>BYTE</literal></entry>
711 <entry>Major protocol version of the sending application. If
712 the major protocol version of the receiving application does not
713 match, the applications will not be able to communicate and the
714 D-BUS connection MUST be disconnected. The major protocol
715 version for this version of the specification is 0.
716 FIXME this field is stupid and pointless to put in
721 <entry>1st <literal>UINT32</literal></entry>
722 <entry>Length in bytes of the message body, starting
723 from the end of the header. The header ends after
724 its alignment padding to an 8-boundary.
728 <entry>2nd <literal>UINT32</literal></entry>
729 <entry>The serial of this message, used as a cookie
730 by the sender to identify the reply corresponding
735 <entry><literal>ARRAY</literal> of <literal>STRUCT</literal> of (<literal>BYTE</literal>,<literal>VARIANT</literal>)</entry>
736 <entry>An array of zero or more <firstterm>header
737 fields</firstterm> where the byte is the field code, and the
738 variant is the field value. The message type determines
739 which fields are required.
747 <firstterm>Message types</firstterm> that can appear in the second byte
753 <entry>Conventional name</entry>
754 <entry>Decimal value</entry>
755 <entry>Description</entry>
760 <entry><literal>INVALID</literal></entry>
762 <entry>This is an invalid type, if seen in a message
763 the connection should be dropped immediately.</entry>
766 <entry><literal>METHOD_CALL</literal></entry>
768 <entry>Method call.</entry>
771 <entry><literal>METHOD_RETURN</literal></entry>
773 <entry>Method reply with returned data.</entry>
776 <entry><literal>ERROR</literal></entry>
778 <entry>Error reply. If the first argument exists and is a
779 string, it is an error message.</entry>
782 <entry><literal>SIGNAL</literal></entry>
784 <entry>Signal emission.</entry>
791 Flags that can appear in the third byte of the header:
796 <entry>Conventional name</entry>
797 <entry>Hex value</entry>
798 <entry>Description</entry>
803 <entry><literal>NO_REPLY_EXPECTED</literal></entry>
805 <entry>This message does not expect method return replies or
806 error replies; the reply can be omitted as an
807 optimization. However, it is compliant with this specification
808 to return the reply despite this flag.</entry>
811 <entry><literal>NO_AUTO_START</literal></entry>
813 <entry>This message should not automatically launch an owner
814 for the destination name.
822 <sect3 id="message-protocol-header-fields">
823 <title>Header Fields</title>
826 The array at the end of the header contains <firstterm>header
827 fields</firstterm>, where each field is a 1-byte field code followed
828 by a field value. A header must contain the required header fields for
829 its message type, and zero or more of any optional header
830 fields. Future versions of this protocol specification may add new
831 fields. Implementations must ignore fields they do not
832 understand. Implementations must not invent their own header fields;
833 only changes to this specification may introduce new header fields.
837 Again, if an implementation sees a header field code that it does not
838 expect, it MUST ignore that field, as it will be part of a new
839 (but compatible) version of this specification. This also applies
840 to known header fields appearing in unexpected messages, for
841 example if a signal has a reply serial that should be ignored
842 even though it has no meaning as of this version of the spec.
846 However, implementations must not send or accept known header fields
847 with the wrong type stored in the field value. So for example
848 a message with an <literal>INTERFACE</literal> field of type <literal>UINT32</literal> would be considered
853 Here are the currently-defined header fields:
858 <entry>Conventional Name</entry>
859 <entry>Decimal Code</entry>
861 <entry>Required In</entry>
862 <entry>Description</entry>
867 <entry><literal>INVALID</literal></entry>
870 <entry>not allowed</entry>
871 <entry>Not a valid field name (error if it appears in a message)</entry>
874 <entry><literal>PATH</literal></entry>
876 <entry><literal>OBJECT_PATH</literal></entry>
877 <entry><literal>METHOD_CALL</literal>, <literal>SIGNAL</literal></entry>
878 <entry>The object to send a call to,
879 or the object a signal is emitted from.
883 <entry><literal>INTERFACE</literal></entry>
885 <entry><literal>STRING</literal></entry>
886 <entry><literal>SIGNAL</literal></entry>
888 The interface to invoke a method call on, or
889 that a signal is emitted from. Optional for
890 method calls, required for signals.
894 <entry><literal>MEMBER</literal></entry>
896 <entry><literal>STRING</literal></entry>
897 <entry><literal>METHOD_CALL</literal>, <literal>SIGNAL</literal></entry>
898 <entry>The member, either the method name or signal name.</entry>
901 <entry><literal>ERROR_NAME</literal></entry>
903 <entry><literal>STRING</literal></entry>
904 <entry><literal>ERROR</literal></entry>
905 <entry>The name of the error that occurred, for errors</entry>
908 <entry><literal>REPLY_SERIAL</literal></entry>
910 <entry><literal>UINT32</literal></entry>
911 <entry><literal>ERROR</literal>, <literal>METHOD_RETURN</literal></entry>
912 <entry>The serial number of the message this message is a reply
913 to. (The serial number is the second <literal>UINT32</literal> in the header.)</entry>
916 <entry><literal>DESTINATION</literal></entry>
918 <entry><literal>STRING</literal></entry>
919 <entry>optional</entry>
920 <entry>The name of the connection this message should be routed to.
921 Only used in combination with the message bus, see
922 <xref linkend="message-bus"/>.</entry>
925 <entry><literal>SENDER</literal></entry>
927 <entry><literal>STRING</literal></entry>
928 <entry>optional</entry>
929 <entry>Unique name of the sending connection.
930 The message bus fills in this field so it is reliable; the field is
931 only meaningful in combination with the message bus.</entry>
934 <entry><literal>SIGNATURE</literal></entry>
936 <entry><literal>SIGNATURE</literal></entry>
937 <entry>optional</entry>
938 <entry>The signature of the message body.
939 If omitted, it is assumed to be the
940 empty signature "" (i.e. the body must be 0-length).</entry>
949 <sect2 id="message-protocol-names">
950 <title>Valid Names</title>
952 The various names in D-BUS messages have some restrictions.
955 There is a <firstterm>maximum name length</firstterm>
956 of 255 which applies to bus names, interfaces, and members.
958 <sect3 id="message-protocol-names-interface">
959 <title>Interface names</title>
961 Interfaces have names with type <literal>STRING</literal>, meaning that
962 they must be valid UTF-8. However, there are also some
963 additional restrictions that apply to interface names
966 <listitem><para>They are composed of 1 or more elements separated by
967 a period ('.') character. All elements must contain at least
971 <listitem><para>Each element must only contain the ASCII characters
972 "[A-Z][a-z][0-9]_" and must not begin with a digit.
976 <listitem><para>They must contain at least one '.' (period)
977 character (and thus at least two elements).
980 <listitem><para>They must not begin with a '.' (period) character.</para></listitem>
981 <listitem><para>They must not exceed the maximum name length.</para></listitem>
985 <sect3 id="message-protocol-names-bus">
986 <title>Bus names</title>
988 Bus names have the same restrictions as interface names, with a
989 special exception for unique connection names. A unique name's first
990 element must start with a colon (':') character. After the colon, any
991 characters in "[A-Z][a-z][0-9]_" may appear. Elements after
992 the first must follow the usual rules, except that they may start with
993 a digit. Bus names not starting with a colon have none of these
994 exceptions and follow the same rules as interface names.
997 <sect3 id="message-protocol-names-member">
998 <title>Member names</title>
1000 Member (i.e. method or signal) names:
1002 <listitem><para>Must only contain the ASCII characters
1003 "[A-Z][a-z][0-9]_" and may not begin with a
1004 digit.</para></listitem>
1005 <listitem><para>Must not contain the '.' (period) character.</para></listitem>
1006 <listitem><para>Must not exceed the maximum name length.</para></listitem>
1007 <listitem><para>Must be at least 1 byte in length.</para></listitem>
1011 <sect3 id="message-protocol-names-error">
1012 <title>Error names</title>
1014 Error names have the same restrictions as interface names.
1019 <sect2 id="message-protocol-types">
1020 <title>Message Types</title>
1022 Each of the message types (<literal>METHOD_CALL</literal>, <literal>METHOD_RETURN</literal>, <literal>ERROR</literal>, and
1023 <literal>SIGNAL</literal>) has its own expected usage conventions and header fields.
1024 This section describes these conventions.
1026 <sect3 id="message-protocol-types-method">
1027 <title>Method Calls</title>
1029 Some messages invoke an operation on a remote object. These are
1030 called method call messages and have the type tag <literal>METHOD_CALL</literal>. Such
1031 messages map naturally to methods on objects in a typical program.
1034 A method call message is expected to have a <literal>MEMBER</literal> header field
1035 indicating the name of the method. Optionally, the message has an
1036 <literal>INTERFACE</literal> field giving the interface the method is a part of. In the
1037 absence of an <literal>INTERFACE</literal> field, if two interfaces on the same object have
1038 a method with the same name, it is undefined which of the two methods
1039 will be invoked. Implementations may also choose to return an error in
1040 this ambiguous case. However, if a method name is unique
1041 implementations must not require an interface field.
1044 Method call messages also include a <literal>PATH</literal> field
1045 indicating the object to invoke the method on. If the call is passing
1046 through a message bus, the message will also have a
1047 <literal>DESTINATION</literal> field giving the name of the connection
1048 to receive the message.
1051 When an application handles a method call message, it is expected to
1052 return a reply. The reply is identified by a <literal>REPLY_SERIAL</literal> header field
1053 indicating the serial number of the <literal>METHOD_CALL</literal> being replied to. The
1054 reply can have one of two types; either <literal>METHOD_RETURN</literal> or <literal>ERROR</literal>.
1057 If the reply has type <literal>METHOD_RETURN</literal>, the arguments to the reply message
1058 are the return value(s) or "out parameters" of the method call.
1059 If the reply has type <literal>ERROR</literal>, then an "exception" has been thrown,
1060 and the call fails; no return value will be provided. It makes
1061 no sense to send multiple replies to the same method call.
1064 Even if a method call has no return values, a <literal>METHOD_RETURN</literal>
1065 reply is expected, so the caller will know the method
1066 was successfully processed.
1069 The <literal>METHOD_RETURN</literal> or <literal>ERROR</literal> reply message must have the <literal>REPLY_SERIAL</literal>
1073 If a <literal>METHOD_CALL</literal> message has the flag <literal>NO_REPLY_EXPECTED</literal>,
1074 then as an optimization the application receiving the method
1075 call may choose to omit the reply message (regardless of
1076 whether the reply would have been <literal>METHOD_RETURN</literal> or <literal>ERROR</literal>).
1077 However, it is also acceptable to ignore the <literal>NO_REPLY_EXPECTED</literal>
1078 flag and reply anyway.
1081 Unless a message has the flag <literal>NO_AUTO_START</literal>, if the
1082 destination name does not exist then a program to own the destination
1083 name will be started before the message is delivered. The message
1084 will be held until the new program is successfully started or has
1085 failed to start; in case of failure, an error will be returned. This
1086 flag is only relevant in the context of a message bus, it is ignored
1087 during one-to-one communication with no intermediate bus.
1089 <sect4 id="message-protocol-types-method-apis">
1090 <title>Mapping method calls to native APIs</title>
1092 APIs for D-BUS may map method calls to a method call in a specific
1093 programming language, such as C++, or may map a method call written
1094 in an IDL to a D-BUS message.
1097 In APIs of this nature, arguments to a method are often termed "in"
1098 (which implies sent in the <literal>METHOD_CALL</literal>), or "out" (which implies
1099 returned in the <literal>METHOD_RETURN</literal>). Some APIs such as CORBA also have
1100 "inout" arguments, which are both sent and received, i.e. the caller
1101 passes in a value which is modified. Mapped to D-BUS, an "inout"
1102 argument is equivalent to an "in" argument, followed by an "out"
1103 argument. You can't pass things "by reference" over the wire, so
1104 "inout" is purely an illusion of the in-process API.
1107 Given a method with zero or one return values, followed by zero or more
1108 arguments, where each argument may be "in", "out", or "inout", the
1109 caller constructs a message by appending each "in" or "inout" argument,
1110 in order. "out" arguments are not represented in the caller's message.
1113 The recipient constructs a reply by appending first the return value
1114 if any, then each "out" or "inout" argument, in order.
1115 "in" arguments are not represented in the reply message.
1118 Error replies are normally mapped to exceptions in languages that have
1122 This specification doesn't require anything of native API bindings;
1123 the preceding is only a suggested convention for consistency
1130 <sect3 id="message-protocol-types-signal">
1131 <title>Signal Emission</title>
1133 Unlike method calls, signal emissions have no replies.
1134 A signal emission is simply a single message of type <literal>SIGNAL</literal>.
1135 It must have three header fields: <literal>PATH</literal> giving the object
1136 the signal was emitted from, plus <literal>INTERFACE</literal> and <literal>MEMBER</literal> giving
1137 the fully-qualified name of the signal.
1141 <sect3 id="message-protocol-types-errors">
1142 <title>Errors</title>
1144 Messages of type <literal>ERROR</literal> are most commonly replies
1145 to a <literal>METHOD_CALL</literal>, but may be returned in reply
1146 to any kind of message. The message bus for example
1147 will return an <literal>ERROR</literal> in reply to a signal emission if
1148 the bus does not have enough memory to send the signal.
1151 An <literal>ERROR</literal> may have any arguments, but if the first
1152 argument is a <literal>STRING</literal>, it must be an error message.
1153 The error message may be logged or shown to the user
1158 <sect3 id="message-protocol-types-notation">
1159 <title>Notation in this document</title>
1161 This document uses a simple pseudo-IDL to describe particular method
1162 calls and signals. Here is an example of a method call:
1164 org.freedesktop.DBus.StartServiceByName (in STRING name, in UINT32 flags,
1165 out UINT32 resultcode)
1167 This means <literal>INTERFACE</literal> = org.freedesktop.DBus, <literal>MEMBER</literal> = StartServiceByName,
1168 <literal>METHOD_CALL</literal> arguments are <literal>STRING</literal> and <literal>UINT32</literal>, <literal>METHOD_RETURN</literal> argument
1169 is <literal>UINT32</literal>. Remember that the <literal>MEMBER</literal> field can't contain any '.' (period)
1170 characters so it's known that the last part of the name in
1171 the "IDL" is the member name.
1174 In C++ that might end up looking like this:
1176 unsigned int org::freedesktop::DBus::StartServiceByName (const char *name,
1177 unsigned int flags);
1179 or equally valid, the return value could be done as an argument:
1181 void org::freedesktop::DBus::StartServiceByName (const char *name,
1183 unsigned int *resultcode);
1185 It's really up to the API designer how they want to make
1186 this look. You could design an API where the namespace wasn't used
1187 in C++, using STL or Qt, using varargs, or whatever you wanted.
1190 Signals are written as follows:
1192 org.freedesktop.DBus.NameLost (STRING name)
1194 Signals don't specify "in" vs. "out" because only
1195 a single direction is possible.
1198 It isn't especially encouraged to use this lame pseudo-IDL in actual
1199 API implementations; you might use the native notation for the
1200 language you're using, or you might use COM or CORBA IDL, for example.
1207 <sect1 id="auth-protocol">
1208 <title>Authentication Protocol</title>
1210 Before the flow of messages begins, two applications must
1211 authenticate. A simple plain-text protocol is used for
1212 authentication; this protocol is a SASL profile, and maps fairly
1213 directly from the SASL specification. The message encoding is
1214 NOT used here, only plain text messages.
1217 In examples, "C:" and "S:" indicate lines sent by the client and
1218 server respectively.
1220 <sect2 id="auth-protocol-overview">
1221 <title>Protocol Overview</title>
1223 The protocol is a line-based protocol, where each line ends with
1224 \r\n. Each line begins with an all-caps ASCII command name containing
1225 only the character range [A-Z], a space, then any arguments for the
1226 command, then the \r\n ending the line. The protocol is
1227 case-sensitive. All bytes must be in the ASCII character set.
1229 Commands from the client to the server are as follows:
1232 <listitem><para>AUTH [mechanism] [initial-response]</para></listitem>
1233 <listitem><para>CANCEL</para></listitem>
1234 <listitem><para>BEGIN</para></listitem>
1235 <listitem><para>DATA <data in hex encoding></para></listitem>
1236 <listitem><para>ERROR [human-readable error explanation]</para></listitem>
1239 From server to client are as follows:
1242 <listitem><para>REJECTED <space-separated list of mechanism names></para></listitem>
1243 <listitem><para>OK</para></listitem>
1244 <listitem><para>DATA <data in hex encoding></para></listitem>
1245 <listitem><para>ERROR</para></listitem>
1249 <sect2 id="auth-nul-byte">
1250 <title>Special credentials-passing nul byte</title>
1252 Immediately after connecting to the server, the client must send a
1253 single nul byte. This byte may be accompanied by credentials
1254 information on some operating systems that use sendmsg() with
1255 SCM_CREDS or SCM_CREDENTIALS to pass credentials over UNIX domain
1256 sockets. However, the nul byte MUST be sent even on other kinds of
1257 socket, and even on operating systems that do not require a byte to be
1258 sent in order to transmit credentials. The text protocol described in
1259 this document begins after the single nul byte. If the first byte
1260 received from the client is not a nul byte, the server may disconnect
1264 A nul byte in any context other than the initial byte is an error;
1265 the protocol is ASCII-only.
1268 The credentials sent along with the nul byte may be used with the
1269 SASL mechanism EXTERNAL.
1272 <sect2 id="auth-command-auth">
1273 <title>AUTH command</title>
1275 If an AUTH command has no arguments, it is a request to list
1276 available mechanisms. The server SHOULD respond with a REJECTED
1277 command listing the mechanisms it understands.
1280 If an AUTH command specifies a mechanism, and the server supports
1281 said mechanism, the server SHOULD begin exchanging SASL
1282 challenge-response data with the client using DATA commands.
1285 If the server does not support the mechanism given in the AUTH
1286 command, it SHOULD send a REJECTED command listing the mechanisms
1290 If the [initial-response] argument is provided, it is intended for
1291 use with mechanisms that have no initial challenge (or an empty
1292 initial challenge), as if it were the argument to an initial DATA
1293 command. If the selected mechanism has an initial challenge, the
1294 server should reject authentication by sending REJECTED.
1297 If authentication succeeds after exchanging DATA commands,
1298 an OK command should be sent to the client.
1301 The first octet received by the client after the \r\n of the OK
1302 command MUST be the first octet of the authenticated/encrypted
1303 stream of D-BUS messages.
1306 The first octet received by the server after the \r\n of the BEGIN
1307 command from the client MUST be the first octet of the
1308 authenticated/encrypted stream of D-BUS messages.
1311 <sect2 id="auth-command-cancel">
1312 <title>CANCEL Command</title>
1314 At any time up to sending the BEGIN command, the client may send a
1315 CANCEL command. On receiving the CANCEL command, the server MUST
1316 send a REJECTED command and abort the current authentication
1320 <sect2 id="auth-command-data">
1321 <title>DATA Command</title>
1323 The DATA command may come from either client or server, and simply
1324 contains a hex-encoded block of data to be interpreted
1325 according to the SASL mechanism in use.
1328 Some SASL mechanisms support sending an "empty string";
1329 FIXME we need some way to do this.
1332 <sect2 id="auth-command-begin">
1333 <title>BEGIN Command</title>
1335 The BEGIN command acknowledges that the client has received an
1336 OK command from the server, and that the stream of messages
1340 The first octet received by the server after the \r\n of the BEGIN
1341 command from the client MUST be the first octet of the
1342 authenticated/encrypted stream of D-BUS messages.
1345 <sect2 id="auth-command-rejected">
1346 <title>REJECTED Command</title>
1348 The REJECTED command indicates that the current authentication
1349 exchange has failed, and further exchange of DATA is inappropriate.
1350 The client would normally try another mechanism, or try providing
1351 different responses to challenges.
1353 Optionally, the REJECTED command has a space-separated list of
1354 available auth mechanisms as arguments. If a server ever provides
1355 a list of supported mechanisms, it MUST provide the same list
1356 each time it sends a REJECTED message. Clients are free to
1357 ignore all lists received after the first.
1360 <sect2 id="auth-command-ok">
1361 <title>OK Command</title>
1363 The OK command indicates that the client has been authenticated,
1364 and that further communication will be a stream of D-BUS messages
1365 (optionally encrypted, as negotiated) rather than this protocol.
1368 The first octet received by the client after the \r\n of the OK
1369 command MUST be the first octet of the authenticated/encrypted
1370 stream of D-BUS messages.
1373 The client MUST respond to the OK command by sending a BEGIN
1374 command, followed by its stream of messages, or by disconnecting.
1375 The server MUST NOT accept additional commands using this protocol
1376 after the OK command has been sent.
1379 <sect2 id="auth-command-error">
1380 <title>ERROR Command</title>
1382 The ERROR command indicates that either server or client did not
1383 know a command, does not accept the given command in the current
1384 context, or did not understand the arguments to the command. This
1385 allows the protocol to be extended; a client or server can send a
1386 command present or permitted only in new protocol versions, and if
1387 an ERROR is received instead of an appropriate response, fall back
1388 to using some other technique.
1391 If an ERROR is sent, the server or client that sent the
1392 error MUST continue as if the command causing the ERROR had never been
1393 received. However, the the server or client receiving the error
1394 should try something other than whatever caused the error;
1395 if only canceling/rejecting the authentication.
1398 <sect2 id="auth-examples">
1399 <title>Authentication examples</title>
1403 <title>Example of successful magic cookie authentication</title>
1405 (MAGIC_COOKIE is a made up mechanism)
1407 C: AUTH MAGIC_COOKIE 3138363935333137393635383634
1413 <title>Example of finding out mechanisms then picking one</title>
1416 S: REJECTED KERBEROS_V4 SKEY
1417 C: AUTH SKEY 7ab83f32ee
1418 S: DATA 8799cabb2ea93e
1419 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1425 <title>Example of client sends unknown command then falls back to regular auth</title>
1429 C: AUTH MAGIC_COOKIE 3736343435313230333039
1435 <title>Example of server doesn't support initial auth mechanism</title>
1437 C: AUTH MAGIC_COOKIE 3736343435313230333039
1438 S: REJECTED KERBEROS_V4 SKEY
1439 C: AUTH SKEY 7ab83f32ee
1440 S: DATA 8799cabb2ea93e
1441 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1447 <title>Example of wrong password or the like followed by successful retry</title>
1449 C: AUTH MAGIC_COOKIE 3736343435313230333039
1450 S: REJECTED KERBEROS_V4 SKEY
1451 C: AUTH SKEY 7ab83f32ee
1452 S: DATA 8799cabb2ea93e
1453 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1455 C: AUTH SKEY 7ab83f32ee
1456 S: DATA 8799cabb2ea93e
1457 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1463 <title>Example of skey cancelled and restarted</title>
1465 C: AUTH MAGIC_COOKIE 3736343435313230333039
1466 S: REJECTED KERBEROS_V4 SKEY
1467 C: AUTH SKEY 7ab83f32ee
1468 S: DATA 8799cabb2ea93e
1471 C: AUTH SKEY 7ab83f32ee
1472 S: DATA 8799cabb2ea93e
1473 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1480 <sect2 id="auth-states">
1481 <title>Authentication state diagrams</title>
1484 This section documents the auth protocol in terms of
1485 a state machine for the client and the server. This is
1486 probably the most robust way to implement the protocol.
1489 <sect3 id="auth-states-client">
1490 <title>Client states</title>
1493 To more precisely describe the interaction between the
1494 protocol state machine and the authentication mechanisms the
1495 following notation is used: MECH(CHALL) means that the
1496 server challenge CHALL was fed to the mechanism MECH, which
1502 CONTINUE(RESP) means continue the auth conversation
1503 and send RESP as the response to the server;
1509 OK(RESP) means that after sending RESP to the server
1510 the client side of the auth conversation is finished
1511 and the server should return "OK";
1517 ERROR means that CHALL was invalid and could not be
1523 Both RESP and CHALL may be empty.
1527 The Client starts by getting an initial response from the
1528 default mechanism and sends AUTH MECH RESP, or AUTH MECH if
1529 the mechanism did not provide an initial response. If the
1530 mechanism returns CONTINUE, the client starts in state
1531 <emphasis>WaitingForData</emphasis>, if the mechanism
1532 returns OK the client starts in state
1533 <emphasis>WaitingForOK</emphasis>.
1537 The client should keep track of available mechanisms and
1538 which it mechanisms it has already attempted. This list is
1539 used to decide which AUTH command to send. When the list is
1540 exhausted, the client should give up and close the
1545 <title><emphasis>WaitingForData</emphasis></title>
1553 MECH(CHALL) returns CONTINUE(RESP) → send
1555 <emphasis>WaitingForData</emphasis>
1559 MECH(CHALL) returns OK(RESP) → send DATA
1560 RESP, goto <emphasis>WaitingForOK</emphasis>
1564 MECH(CHALL) returns ERROR → send ERROR
1565 [msg], goto <emphasis>WaitingForData</emphasis>
1573 Receive REJECTED [mechs] →
1574 send AUTH [next mech], goto
1575 WaitingForData or <emphasis>WaitingForOK</emphasis>
1580 Receive ERROR → send
1582 <emphasis>WaitingForReject</emphasis>
1587 Receive OK → send
1588 BEGIN, terminate auth
1589 conversation, authenticated
1594 Receive anything else → send
1596 <emphasis>WaitingForData</emphasis>
1604 <title><emphasis>WaitingForOK</emphasis></title>
1609 Receive OK → send BEGIN, terminate auth
1610 conversation, <emphasis>authenticated</emphasis>
1615 Receive REJECT [mechs] → send AUTH [next mech],
1616 goto <emphasis>WaitingForData</emphasis> or
1617 <emphasis>WaitingForOK</emphasis>
1623 Receive DATA → send CANCEL, goto
1624 <emphasis>WaitingForReject</emphasis>
1630 Receive ERROR → send CANCEL, goto
1631 <emphasis>WaitingForReject</emphasis>
1637 Receive anything else → send ERROR, goto
1638 <emphasis>WaitingForOK</emphasis>
1646 <title><emphasis>WaitingForReject</emphasis></title>
1651 Receive REJECT [mechs] → send AUTH [next mech],
1652 goto <emphasis>WaitingForData</emphasis> or
1653 <emphasis>WaitingForOK</emphasis>
1659 Receive anything else → terminate auth
1660 conversation, disconnect
1669 <sect3 id="auth-states-server">
1670 <title>Server states</title>
1673 For the server MECH(RESP) means that the client response
1674 RESP was fed to the the mechanism MECH, which returns one of
1679 CONTINUE(CHALL) means continue the auth conversation and
1680 send CHALL as the challenge to the client;
1686 OK means that the client has been successfully
1693 REJECT means that the client failed to authenticate or
1694 there was an error in RESP.
1699 The server starts out in state
1700 <emphasis>WaitingForAuth</emphasis>. If the client is
1701 rejected too many times the server must disconnect the
1706 <title><emphasis>WaitingForAuth</emphasis></title>
1712 Receive AUTH → send REJECTED [mechs], goto
1713 <emphasis>WaitingForAuth</emphasis>
1719 Receive AUTH MECH RESP
1723 MECH not valid mechanism → send REJECTED
1725 <emphasis>WaitingForAuth</emphasis>
1729 MECH(RESP) returns CONTINUE(CHALL) → send
1731 <emphasis>WaitingForData</emphasis>
1735 MECH(RESP) returns OK → send OK, goto
1736 <emphasis>WaitingForBegin</emphasis>
1740 MECH(RESP) returns REJECT → send REJECTED
1742 <emphasis>WaitingForAuth</emphasis>
1750 Receive BEGIN → terminate
1751 auth conversation, disconnect
1757 Receive ERROR → send REJECTED [mechs], goto
1758 <emphasis>WaitingForAuth</emphasis>
1764 Receive anything else → send
1766 <emphasis>WaitingForAuth</emphasis>
1775 <title><emphasis>WaitingForData</emphasis></title>
1783 MECH(RESP) returns CONTINUE(CHALL) → send
1785 <emphasis>WaitingForData</emphasis>
1789 MECH(RESP) returns OK → send OK, goto
1790 <emphasis>WaitingForBegin</emphasis>
1794 MECH(RESP) returns REJECT → send REJECTED
1796 <emphasis>WaitingForAuth</emphasis>
1804 Receive BEGIN → terminate auth conversation,
1811 Receive CANCEL → send REJECTED [mechs], goto
1812 <emphasis>WaitingForAuth</emphasis>
1818 Receive ERROR → send REJECTED [mechs], goto
1819 <emphasis>WaitingForAuth</emphasis>
1825 Receive anything else → send ERROR, goto
1826 <emphasis>WaitingForData</emphasis>
1834 <title><emphasis>WaitingForBegin</emphasis></title>
1839 Receive BEGIN → terminate auth conversation,
1840 client authenticated
1846 Receive CANCEL → send REJECTED [mechs], goto
1847 <emphasis>WaitingForAuth</emphasis>
1853 Receive ERROR → send REJECTED [mechs], goto
1854 <emphasis>WaitingForAuth</emphasis>
1860 Receive anything else → send ERROR, goto
1861 <emphasis>WaitingForBegin</emphasis>
1871 <sect2 id="auth-mechanisms">
1872 <title>Authentication mechanisms</title>
1874 This section describes some new authentication mechanisms.
1875 D-BUS also allows any standard SASL mechanism of course.
1877 <sect3 id="auth-mechanisms-sha">
1878 <title>DBUS_COOKIE_SHA1</title>
1880 The DBUS_COOKIE_SHA1 mechanism is designed to establish that a client
1881 has the ability to read a private file owned by the user being
1882 authenticated. If the client can prove that it has access to a secret
1883 cookie stored in this file, then the client is authenticated.
1884 Thus the security of DBUS_COOKIE_SHA1 depends on a secure home
1888 Authentication proceeds as follows:
1892 The client sends the username it would like to authenticate
1898 The server sends the name of its "cookie context" (see below); a
1899 space character; the integer ID of the secret cookie the client
1900 must demonstrate knowledge of; a space character; then a
1901 hex-encoded randomly-generated challenge string.
1906 The client locates the cookie, and generates its own hex-encoded
1907 randomly-generated challenge string. The client then
1908 concatentates the server's hex-encoded challenge, a ":"
1909 character, its own hex-encoded challenge, another ":" character,
1910 and the hex-encoded cookie. It computes the SHA-1 hash of this
1911 composite string. It sends back to the server the client's
1912 hex-encoded challenge string, a space character, and the SHA-1
1918 The server generates the same concatenated string used by the
1919 client and computes its SHA-1 hash. It compares the hash with
1920 the hash received from the client; if the two hashes match, the
1921 client is authenticated.
1927 Each server has a "cookie context," which is a name that identifies a
1928 set of cookies that apply to that server. A sample context might be
1929 "org_freedesktop_session_bus". Context names must be valid ASCII,
1930 nonzero length, and may not contain the characters slash ("/"),
1931 backslash ("\"), space (" "), newline ("\n"), carriage return ("\r"),
1932 tab ("\t"), or period ("."). There is a default context,
1933 "org_freedesktop_global" that's used by servers that do not specify
1937 Cookies are stored in a user's home directory, in the directory
1938 <filename>~/.dbus-keyrings/</filename>. This directory must
1939 not be readable or writable by other users. If it is,
1940 clients and servers must ignore it. The directory
1941 contains cookie files named after the cookie context.
1944 A cookie file contains one cookie per line. Each line
1945 has three space-separated fields:
1949 The cookie ID number, which must be a non-negative integer and
1950 may not be used twice in the same file.
1955 The cookie's creation time, in UNIX seconds-since-the-epoch
1961 The cookie itself, a hex-encoded random block of bytes.
1967 Only server processes modify the cookie file.
1968 They must do so with this procedure:
1972 Create a lockfile name by appending ".lock" to the name of the
1973 cookie file. The server should attempt to create this file
1974 using <literal>O_CREAT | O_EXCL</literal>. If file creation
1975 fails, the lock fails. Servers should retry for a reasonable
1976 period of time, then they may choose to delete an existing lock
1977 to keep users from having to manually delete a stale
1978 lock. <footnote><para>Lockfiles are used instead of real file
1979 locking <literal>fcntl()</literal> because real locking
1980 implementations are still flaky on network
1981 filesystems.</para></footnote>
1986 Once the lockfile has been created, the server loads the cookie
1987 file. It should then delete any cookies that are old (the
1988 timeout can be fairly short), or more than a reasonable
1989 time in the future (so that cookies never accidentally
1990 become permanent, if the clock was set far into the future
1991 at some point). If no recent keys remain, the
1992 server may generate a new key.
1997 The pruned and possibly added-to cookie file
1998 must be resaved atomically (using a temporary
1999 file which is rename()'d).
2004 The lock must be dropped by deleting the lockfile.
2010 Clients need not lock the file in order to load it,
2011 because servers are required to save the file atomically.
2016 <sect1 id="addresses">
2017 <title>Server Addresses</title>
2019 Server addresses consist of a transport name followed by a colon, and
2020 then an optional, comma-separated list of keys and values in the form key=value.
2021 [FIXME how do you escape colon, comma, and semicolon in the values of the key=value pairs?]
2025 <programlisting>unix:path=/tmp/dbus-test</programlisting>
2026 Which is the address to a unix socket with the path /tmp/dbus-test.
2029 [FIXME clarify if attempting to connect to each is a requirement
2030 or just a suggestion]
2031 When connecting to a server, multiple server addresses can be
2032 separated by a semi-colon. The library will then try to connect
2033 to the first address and if that fails, it'll try to connect to
2034 the next one specified, and so forth. For example
2035 <programlisting>unix:path=/tmp/dbus-test;unix:path=/tmp/dbus-test2</programlisting>
2038 [FIXME we need to specify in detail each transport and its possible arguments]
2039 Current transports include: unix domain sockets (including
2040 abstract namespace on linux), TCP/IP, and a debug/testing transport using
2041 in-process pipes. Future possible transports include one that
2042 tunnels over X11 protocol.
2046 <sect1 id="standard-messages">
2047 <title>Standard One-to-One Messages</title>
2049 See <xref linkend="message-protocol-types-notation"/> for details on
2050 the notation used in this section.
2052 <sect2 id="standard-messages-ping">
2053 <title><literal>org.freedesktop.Peer.Ping</literal></title>
2056 org.freedesktop.Peer.Ping ()
2060 On receipt of the <literal>METHOD_CALL</literal>
2061 message <literal>org.freedesktop.Peer.Ping</literal>, an application
2062 should do nothing other than reply with a <literal>METHOD_RETURN</literal> as usual.
2068 <sect1 id="message-bus">
2069 <title>Message Bus Specification</title>
2070 <sect2 id="message-bus-overview">
2071 <title>Message Bus Overview</title>
2073 The message bus accepts connections from one or more applications.
2074 Once connected, applications can exchange messages with other
2075 applications that are also connected to the bus.
2078 In order to route messages among connections, the message bus keeps a
2079 mapping from names to connections. Each connection has one
2080 unique-for-the-lifetime-of-the-bus name automatically assigned.
2081 Applications may request additional names for a connection. Additional
2082 names are usually "well-known names" such as
2083 "org.freedesktop.TextEditor". When a name is bound to a connection,
2084 that connection is said to <firstterm>own</firstterm> the name.
2087 The bus itself owns a special name, <literal>org.freedesktop.DBus</literal>.
2088 This name routes messages to the bus, allowing applications to make
2089 administrative requests. For example, applications can ask the bus
2090 to assign a name to a connection.
2093 Each name may have <firstterm>queued owners</firstterm>. When an
2094 application requests a name for a connection and the name is already in
2095 use, the bus will optionally add the connection to a queue waiting for
2096 the name. If the current owner of the name disconnects or releases
2097 the name, the next connection in the queue will become the new owner.
2101 This feature causes the right thing to happen if you start two text
2102 editors for example; the first one may request "org.freedesktop.TextEditor",
2103 and the second will be queued as a possible owner of that name. When
2104 the first exits, the second will take over.
2108 Messages may have a <literal>DESTINATION</literal> field (see <xref
2109 linkend="message-protocol-header-fields"/>). If the
2110 <literal>DESTINATION</literal> field is present, it specifies a message
2111 recipient by name. Method calls and replies normally specify this field.
2115 Signals normally do not specify a destination; they are sent to all
2116 applications with <firstterm>message matching rules</firstterm> that
2121 When the message bus receives a method call, if the
2122 <literal>DESTINATION</literal> field is absent, the call is taken to be
2123 a standard one-to-one message and interpreted by the message bus
2124 itself. For example, sending an
2125 <literal>org.freedesktop.Peer.Ping</literal> message with no
2126 <literal>DESTINATION</literal> will cause the message bus itself to
2127 reply to the ping immediately; the message bus will not make this
2128 message visible to other applications.
2132 Continuing the <literal>org.freedesktop.Peer.Ping</literal> example, if
2133 the ping message were sent with a <literal>DESTINATION</literal> name of
2134 <literal>com.yoyodyne.Screensaver</literal>, then the ping would be
2135 forwarded, and the Yoyodyne Corporation screensaver application would be
2136 expected to reply to the ping.
2140 <sect2 id="message-bus-names">
2141 <title>Message Bus Names</title>
2143 Each connection has at least one name, assigned at connection time and
2144 returned in response to the
2145 <literal>org.freedesktop.DBus.Hello</literal> method call. This
2146 automatically-assigned name is called the connection's <firstterm>unique
2147 name</firstterm>. Unique names are never reused for two different
2148 connections to the same bus.
2151 Ownership of a unique name is a prerequisite for interaction with
2152 the message bus. It logically follows that the unique name is always
2153 the first name that an application comes to own, and the last
2154 one that it loses ownership of.
2157 Unique connection names must begin with the character ':' (ASCII colon
2158 character); bus names that are not unique names must not begin
2159 with this character. (The bus must reject any attempt by an application
2160 to manually request a name beginning with ':'.) This restriction
2161 categorically prevents "spoofing"; messages sent to a unique name
2162 will always go to the expected connection.
2165 When a connection is closed, all the names that it owns are deleted (or
2166 transferred to the next connection in the queue if any).
2169 A connection can request additional names to be associated with it using
2170 the <literal>org.freedesktop.DBus.RequestName</literal> message. <xref
2171 linkend="message-protocol-names-bus"/> describes the format of a valid
2175 <sect3 id="bus-messages-request-name">
2176 <title><literal>org.freedesktop.DBus.RequestName</literal></title>
2180 UINT32 RequestName (in STRING name, in UINT32 flags)
2187 <entry>Argument</entry>
2189 <entry>Description</entry>
2195 <entry>STRING</entry>
2196 <entry>Name to request</entry>
2200 <entry>UINT32</entry>
2201 <entry>Flags</entry>
2211 <entry>Argument</entry>
2213 <entry>Description</entry>
2219 <entry>UINT32</entry>
2220 <entry>Return value</entry>
2227 This method call should be sent to
2228 <literal>org.freedesktop.DBus</literal> and asks the message bus to
2229 assign the given name to the method caller. The flags argument
2230 contains any of the following values logically ORed together:
2236 <entry>Conventional Name</entry>
2237 <entry>Value</entry>
2238 <entry>Description</entry>
2243 <entry>DBUS_NAME_FLAG_PROHIBIT_REPLACEMENT</entry>
2246 If the application succeeds in becoming the owner of the specified name,
2247 then ownership of the name can't be transferred until the application
2248 disconnects. If this flag is not set, then any application trying to become
2249 the owner of the name will succeed and the previous owner will be
2250 sent a <literal>org.freedesktop.DBus.NameOwnerChanged</literal> signal.
2254 <entry>DBUS_NAME_FLAG_REPLACE_EXISTING</entry>
2257 Try to replace the current owner if there is one. If this
2258 flag is not set the application will only become the owner of
2259 the name if there is no current owner.
2266 The return code can be one of the following values:
2272 <entry>Conventional Name</entry>
2273 <entry>Value</entry>
2274 <entry>Description</entry>
2279 <entry>DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER</entry>
2280 <entry>1</entry> <entry>The caller is now the primary owner of
2281 the name, replacing any previous owner. Either the name had no
2282 owner before, or the caller specified
2283 DBUS_NAME_FLAG_REPLACE_EXISTING and the current owner did not
2284 specify DBUS_NAME_FLAG_PROHIBIT_REPLACEMENT.</entry>
2287 <entry>DBUS_REQUEST_NAME_REPLY_IN_QUEUE</entry>
2289 <entry>The name already had an owner, DBUS_NAME_FLAG_REPLACE_EXISTING was not specified, and the current owner specified DBUS_NAME_FLAG_PROHIBIT_REPLACEMENT.</entry>
2292 <entry>DBUS_REQUEST_NAME_REPLY_EXISTS</entry>
2294 <entry>The name already has an owner, and DBUS_NAME_FLAG_REPLACE_EXISTING was not specified.</entry>
2297 <entry>DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER</entry>
2299 <entry>The application trying to request ownership of a name is already the owner of it.</entry>
2308 <sect2 id="message-bus-routing">
2309 <title>Message Bus Message Routing</title>
2314 <sect2 id="message-bus-starting-services">
2315 <title>Message Bus Starting Services</title>
2317 The message bus can start applications on behalf of other applications.
2318 In CORBA terms, this would be called <firstterm>activation</firstterm>.
2319 An application that can be started in this way is called a
2320 <firstterm>service</firstterm>.
2323 With D-BUS, starting a service is normally done by name. That is,
2324 applications ask the message bus to start some program that will own a
2325 well-known name, such as <literal>org.freedesktop.TextEditor</literal>.
2326 This implies a contract documented along with the name
2327 <literal>org.freedesktop.TextEditor</literal> for which objects
2328 the owner of that name will provide, and what interfaces those
2332 To find an executable corresponding to a particular name, the bus daemon
2333 looks for <firstterm>service description files</firstterm>. Service
2334 description files define a mapping from names to executables. Different
2335 kinds of message bus will look for these files in different places, see
2336 <xref linkend="message-bus-types"/>.
2339 [FIXME the file format should be much better specified than "similar to
2340 .desktop entries" esp. since desktop entries are already
2341 badly-specified. ;-)] Service description files have the ".service" file
2342 extension. The message bus will only load service description files
2343 ending with .service; all other files will be ignored. The file format
2344 is similar to that of <ulink
2345 url="http://www.freedesktop.org/standards/desktop-entry-spec/desktop-entry-spec.html">desktop
2346 entries</ulink>. All service description files must be in UTF-8
2347 encoding. To ensure that there will be no name collisions, service files
2348 must be namespaced using the same mechanism as messages and service
2352 <title>Example service description file</title>
2354 # Sample service description file
2356 Names=org.freedesktop.ConfigurationDatabase;org.gnome.GConf;
2357 Exec=/usr/libexec/gconfd-2
2362 When an application asks to start a service by name, the bus daemon tries to
2363 find a service that will own that name. It then tries to spawn the
2364 executable associated with it. If this fails, it will report an
2365 error. [FIXME what happens if two .service files offer the same service;
2366 what kind of error is reported, should we have a way for the client to
2370 The executable launched will have the environment variable
2371 <literal>DBUS_STARTER_ADDRESS</literal> set to the address of the
2372 message bus so it can connect and request the appropriate names.
2375 The executable being launched may want to know whether the message bus
2376 starting it is one of the well-known message buses (see <xref
2377 linkend="message-bus-types"/>). To facilitate this, the bus MUST also set
2378 the <literal>DBUS_STARTER_BUS_TYPE</literal> environment variable if it is one
2379 of the well-known buses. The currently-defined values for this variable
2380 are <literal>system</literal> for the systemwide message bus,
2381 and <literal>session</literal> for the per-login-session message
2382 bus. The new executable must still connect to the address given
2383 in <literal>DBUS_STARTER_ADDRESS</literal>, but may assume that the
2384 resulting connection is to the well-known bus.
2387 [FIXME there should be a timeout somewhere, either specified
2388 in the .service file, by the client, or just a global value
2389 and if the client being activated fails to connect within that
2390 timeout, an error should be sent back.]
2394 <sect2 id="message-bus-types">
2395 <title>Well-known Message Bus Instances</title>
2397 Two standard message bus instances are defined here, along with how
2398 to locate them and where their service files live.
2400 <sect3 id="message-bus-types-login">
2401 <title>Login session message bus</title>
2403 Each time a user logs in, a <firstterm>login session message
2404 bus</firstterm> may be started. All applications in the user's login
2405 session may interact with one another using this message bus.
2408 The address of the login session message bus is given
2409 in the <literal>DBUS_SESSION_BUS_ADDRESS</literal> environment
2410 variable. If that variable is not set, applications may
2411 also try to read the address from the X Window System root
2412 window property <literal>_DBUS_SESSION_BUS_ADDRESS</literal>.
2413 The root window property must have type <literal>STRING</literal>.
2414 The environment variable should have precedence over the
2415 root window property.
2418 [FIXME specify location of .service files, probably using
2419 DESKTOP_DIRS etc. from basedir specification, though login session
2420 bus is not really desktop-specific]
2423 <sect3 id="message-bus-types-system">
2424 <title>System message bus</title>
2426 A computer may have a <firstterm>system message bus</firstterm>,
2427 accessible to all applications on the system. This message bus may be
2428 used to broadcast system events, such as adding new hardware devices,
2429 changes in the printer queue, and so forth.
2432 The address of the system message bus is given
2433 in the <literal>DBUS_SYSTEM_BUS_ADDRESS</literal> environment
2434 variable. If that variable is not set, applications should try
2435 to connect to the well-known address
2436 <literal>unix:path=/var/run/dbus/system_bus_socket</literal>.
2439 The D-BUS reference implementation actually honors the
2440 <literal>$(localstatedir)</literal> configure option
2441 for this address, on both client and server side.
2446 [FIXME specify location of system bus .service files]
2451 <sect2 id="message-bus-messages">
2452 <title>Message Bus Messages</title>
2454 The special message bus name <literal>org.freedesktop.DBus</literal>
2455 responds to a number of additional messages.
2458 <sect3 id="bus-messages-hello">
2459 <title><literal>org.freedesktop.DBus.Hello</literal></title>
2470 <entry>Argument</entry>
2472 <entry>Description</entry>
2478 <entry>STRING</entry>
2479 <entry>Unique name assigned to the connection</entry>
2486 Before an application is able to send messages to other applications
2487 it must send the <literal>org.freedesktop.DBus.Hello</literal> message
2488 to the message bus to obtain a unique name. If an application without
2489 a unique name tries to send a message to another application, or a
2490 message to the message bus itself that isn't the
2491 <literal>org.freedesktop.DBus.Hello</literal> message, it will be
2492 disconnected from the bus.
2495 There is no corresponding "disconnect" request; if a client wishes to
2496 disconnect from the bus, it simply closes the socket (or other
2497 communication channel).
2500 <sect3 id="bus-messages-list-names">
2501 <title><literal>org.freedesktop.DBus.ListNames</literal></title>
2505 ARRAY of STRING ListNames ()
2512 <entry>Argument</entry>
2514 <entry>Description</entry>
2520 <entry>ARRAY of STRING</entry>
2521 <entry>Array of strings where each string is a bus name</entry>
2528 Returns a list of all currently-owned names on the bus.
2531 <sect3 id="bus-messages-name-exists">
2532 <title><literal>org.freedesktop.DBus.NameHasOwner</literal></title>
2536 BOOLEAN NameHasOwner (in STRING name)
2543 <entry>Argument</entry>
2545 <entry>Description</entry>
2551 <entry>STRING</entry>
2552 <entry>Name to check</entry>
2562 <entry>Argument</entry>
2564 <entry>Description</entry>
2570 <entry>BOOLEAN</entry>
2571 <entry>Return value, true if the name exists</entry>
2578 Checks if the specified name exists (currently has an owner).
2582 <sect3 id="bus-messages-name-owner-changed">
2583 <title><literal>org.freedesktop.DBus.NameOwnerChanged</literal></title>
2587 NameOwnerChanged (STRING name, STRING old_owner, STRING new_owner)
2594 <entry>Argument</entry>
2596 <entry>Description</entry>
2602 <entry>STRING</entry>
2603 <entry>Name with a new owner</entry>
2607 <entry>STRING</entry>
2608 <entry>Old owner or empty string if none</entry>
2612 <entry>STRING</entry>
2613 <entry>New owner or empty string if none</entry>
2620 This signal indicates that the owner of a name has changed.
2621 It's also the signal to use to detect the appearance of
2622 new names on the bus.
2625 <sect3 id="bus-messages-name-lost">
2626 <title><literal>org.freedesktop.DBus.NameLost</literal></title>
2630 NameLost (STRING name)
2637 <entry>Argument</entry>
2639 <entry>Description</entry>
2645 <entry>STRING</entry>
2646 <entry>Name which was lost</entry>
2653 This signal is sent to a specific application when it loses
2654 ownership of a name.
2658 <sect3 id="bus-messages-name-acquired">
2659 <title><literal>org.freedesktop.DBus.NameAcquired</literal></title>
2663 NameAcquired (STRING name)
2670 <entry>Argument</entry>
2672 <entry>Description</entry>
2678 <entry>STRING</entry>
2679 <entry>Name which was acquired</entry>
2686 This signal is sent to a specific application when it gains
2687 ownership of a name.
2691 <sect3 id="bus-messages-start-service-by-name">
2692 <title><literal>org.freedesktop.DBus.StartServiceByName</literal></title>
2696 UINT32 StartServiceByName (in STRING name, in UINT32 flags)
2703 <entry>Argument</entry>
2705 <entry>Description</entry>
2711 <entry>STRING</entry>
2712 <entry>Name of the service to start</entry>
2716 <entry>UINT32</entry>
2717 <entry>Flags (currently not used)</entry>
2727 <entry>Argument</entry>
2729 <entry>Description</entry>
2735 <entry>UINT32</entry>
2736 <entry>Return value</entry>
2741 Tries to launch the executable associated with a name. For more information, see <xref linkend="message-bus-starting-services"/>.
2745 The return value can be one of the following values:
2750 <entry>Identifier</entry>
2751 <entry>Value</entry>
2752 <entry>Description</entry>
2757 <entry>DBUS_START_REPLY_SUCCESS</entry>
2759 <entry>The service was successfully started.</entry>
2762 <entry>DBUS_START_REPLY_ALREADY_RUNNING</entry>
2764 <entry>A connection already owns the given name.</entry>
2773 <sect3 id="bus-messages-get-name-owner">
2774 <title><literal>org.freedesktop.DBus.GetNameOwner</literal></title>
2778 STRING GetNameOwner (in STRING name)
2785 <entry>Argument</entry>
2787 <entry>Description</entry>
2793 <entry>STRING</entry>
2794 <entry>Name to get the owner of</entry>
2804 <entry>Argument</entry>
2806 <entry>Description</entry>
2812 <entry>STRING</entry>
2813 <entry>Return value, a unique connection name</entry>
2818 Returns the unique connection name of the primary owner of the name
2819 given. If the requested name doesn't have an owner, returns a
2820 <literal>org.freedesktop.DBus.Error.NameHasNoOwner</literal> error.
2824 <sect3 id="bus-messages-get-connection-unix-user">
2825 <title><literal>org.freedesktop.DBus.GetConnectionUnixUser</literal></title>
2829 UINT32 GetConnectionUnixUser (in STRING connection_name)
2836 <entry>Argument</entry>
2838 <entry>Description</entry>
2844 <entry>STRING</entry>
2845 <entry>Name of the connection to query</entry>
2855 <entry>Argument</entry>
2857 <entry>Description</entry>
2863 <entry>UINT32</entry>
2864 <entry>unix user id</entry>
2869 Returns the unix uid of the process connected to the server. If unable to
2870 determine it, a <literal>org.freedesktop.DBus.Error.Failed</literal>
2879 <appendix id="implementation-notes">
2880 <title>Implementation notes</title>
2881 <sect1 id="implementation-notes-subsection">
2889 <glossary><title>Glossary</title>
2891 This glossary defines some of the terms used in this specification.
2894 <glossentry id="term-bus-name"><glossterm>Bus Name</glossterm>
2897 The message bus maintains an association between names and
2898 connections. (Normally, there's one connection per application.) A
2899 bus name is simply an identifier used to locate connections. For
2900 example, the hypothetical <literal>com.yoyodyne.Screensaver</literal>
2901 name might be used to send a message to a screensaver from Yoyodyne
2902 Corporation. An application is said to <firstterm>own</firstterm> a
2903 name if the message bus has associated the application's connection
2904 with the name. Names may also have <firstterm>queued
2905 owners</firstterm> (see <xref linkend="term-queued-owner"/>).
2906 The bus assigns a unique name to each connection,
2907 see <xref linkend="term-unique-name"/>. Other names
2908 can be thought of as "well-known names" and are
2909 used to find applications that offer specific functionality.
2914 <glossentry id="term-message"><glossterm>Message</glossterm>
2917 A message is the atomic unit of communication via the D-BUS
2918 protocol. It consists of a <firstterm>header</firstterm> and a
2919 <firstterm>body</firstterm>; the body is made up of
2920 <firstterm>arguments</firstterm>.
2925 <glossentry id="term-message-bus"><glossterm>Message Bus</glossterm>
2928 The message bus is a special application that forwards
2929 or routes messages between a group of applications
2930 connected to the message bus. It also manages
2931 <firstterm>names</firstterm> used for routing
2937 <glossentry id="term-name"><glossterm>Name</glossterm>
2940 See <xref linkend="term-bus-name"/>. "Name" may
2941 also be used to refer to some of the other names
2942 in D-BUS, such as interface names.
2947 <glossentry id="namespace"><glossterm>Namespace</glossterm>
2950 Used to prevent collisions when defining new interfaces or bus
2951 names. The convention used is the same one Java uses for defining
2952 classes: a reversed domain name.
2957 <glossentry id="term-object"><glossterm>Object</glossterm>
2960 Each application contains <firstterm>objects</firstterm>, which have
2961 <firstterm>interfaces</firstterm> and
2962 <firstterm>methods</firstterm>. Objects are referred to by a name,
2963 called a <firstterm>path</firstterm>.
2968 <glossentry id="one-to-one"><glossterm>One-to-One</glossterm>
2971 An application talking directly to another application, without going
2972 through a message bus. One-to-one connections may be "peer to peer" or
2973 "client to server." The D-BUS protocol has no concept of client
2974 vs. server after a connection has authenticated; the flow of messages
2975 is symmetrical (full duplex).
2980 <glossentry id="term-path"><glossterm>Path</glossterm>
2983 Object references (object names) in D-BUS are organized into a
2984 filesystem-style hierarchy, so each object is named by a path. As in
2985 LDAP, there's no difference between "files" and "directories"; a path
2986 can refer to an object, while still having child objects below it.
2991 <glossentry id="term-queued-owner"><glossterm>Queued Name Owner</glossterm>
2994 Each bus name has a primary owner; messages sent to the name go to the
2995 primary owner. However, certain names also maintain a queue of
2996 secondary owners "waiting in the wings." If the primary owner releases
2997 the name, then the first secondary owner in the queue automatically
2998 becomes the new owner of the name.
3003 <glossentry id="term-service"><glossterm>Service</glossterm>
3006 A service is an executable that can be launched by the bus daemon.
3007 Services normally guarantee some particular features, for example they
3008 may guarantee that they will request a specific name such as
3009 "org.freedesktop.Screensaver", have a singleton object
3010 "/org/freedesktop/Application", and that object will implement the
3011 interface "org.freedesktop.ScreensaverControl".
3016 <glossentry id="term-service-description-files"><glossterm>Service Description Files</glossterm>
3019 ".service files" tell the bus about service applications that can be
3020 launched (see <xref linkend="term-service"/>). Most importantly they
3021 provide a mapping from bus names to services that will request those
3022 names when they start up.
3027 <glossentry id="term-unique-name"><glossterm>Unique Connection Name</glossterm>
3030 The special name automatically assigned to each connection by the
3031 message bus. This name will never change owner, and will be unique
3032 (never reused during the lifetime of the message bus).
3033 It will begin with a ':' character.