server: set permission and group to tdm-socket when it is added
[platform/core/uifw/libtdm.git] / src / tdm_server.c
index f025365..9363768 100644 (file)
@@ -81,10 +81,44 @@ typedef struct _tdm_server_wait_info {
        unsigned int req_id;
 } tdm_server_wait_info;
 
+typedef struct _tdm_server_client_info {
+       struct list_head link;
+       pid_t pid;
+       char name[TDM_NAME_LEN];
+} tdm_server_client_info;
+
 static tdm_private_server *keep_private_server;
+static struct list_head client_list;
 
 static void destroy_wait(tdm_server_wait_info *wait_info);
 
+static void
+_tdm_server_get_process_name(pid_t pid, char *name, unsigned int size)
+{
+       char proc[TDM_NAME_LEN], pname[TDM_NAME_LEN];
+       FILE *h;
+       size_t len;
+
+       snprintf(name, size, "Unknown");
+
+       snprintf(proc, TDM_NAME_LEN, "/proc/%d/cmdline", pid);
+       h = fopen(proc, "r");
+       if (!h)
+               return;
+
+       len = fread(pname, sizeof(char), TDM_NAME_LEN, h);
+       if (len == 0) {
+               char *p = strncpy(pname, "NO NAME", sizeof(pname) - 1);
+               len = p - pname;
+       }
+       pname[len - 1] = '\0';
+
+       strncpy(name, pname, size - 1);
+       name[size - 1] = '\0';
+
+       fclose(h);
+}
+
 static tdm_output*
 _tdm_server_find_output(tdm_private_server *private_server, const char *name)
 {
@@ -544,10 +578,32 @@ static const struct wl_tdm_interface tdm_implementation = {
 };
 
 static void
+destroy_client(struct wl_resource *resource)
+{
+       tdm_server_client_info *c = NULL, *cc = NULL;
+       struct wl_client *client;
+       pid_t pid = -1;
+
+       client = wl_resource_get_client(resource);
+       TDM_RETURN_IF_FAIL(client != NULL);
+
+       wl_client_get_credentials(client, &pid, NULL, NULL);
+
+       LIST_FOR_EACH_ENTRY_SAFE(c, cc, &client_list, link) {
+               if (c->pid == pid) {
+                       LIST_DEL(&c->link);
+                       free(c);
+                       return;
+               }
+       }
+}
+
+static void
 _tdm_server_bind(struct wl_client *client, void *data,
                                 uint32_t version, uint32_t id)
 {
        struct wl_resource *resource;
+       tdm_server_client_info *cinfo;
 
        resource = wl_resource_create(client, &wl_tdm_interface, version, id);
        if (!resource) {
@@ -555,7 +611,121 @@ _tdm_server_bind(struct wl_client *client, void *data,
                return;
        }
 
-       wl_resource_set_implementation(resource, &tdm_implementation, data, NULL);
+       cinfo = calloc(1, sizeof(tdm_server_client_info));
+       if (!cinfo) {
+               wl_client_post_no_memory(client);
+               wl_resource_destroy(resource);
+               return;
+       }
+
+       LIST_ADDTAIL(&cinfo->link, &client_list);
+       wl_client_get_credentials(client, &cinfo->pid, NULL, NULL);
+       _tdm_server_get_process_name(cinfo->pid, cinfo->name, TDM_NAME_LEN);
+
+       wl_resource_set_implementation(resource, &tdm_implementation, data, destroy_client);
+}
+
+static int
+_tdm_getgrnam_r(const char *name)
+{
+       struct group *grp = NULL;
+       struct group *grp_res = NULL;
+       char* buf = NULL;
+       size_t buf_len;
+       int ret;
+       int id;
+
+       buf_len = sysconf(_SC_GETGR_R_SIZE_MAX);
+       if (buf_len == -1)
+               buf_len = 2048;
+
+       buf = calloc(1, buf_len * sizeof(char));
+       if (!buf) {
+               TDM_ERR("creating buffer failed");
+               goto failed;
+       }
+
+       grp = calloc(1, sizeof(struct group));
+       if (!grp) {
+               TDM_ERR("creating group failed");
+               goto failed;
+       }
+
+       ret = getgrnam_r(name, grp, buf, buf_len, &grp_res);
+       if (ret < 0) {
+               TDM_ERR("getgrnam_r failed errno:%d(%m)", ret);
+               goto failed;
+       }
+
+       if (grp_res == NULL) {
+               TDM_ERR("finding name:%s group failed", name);
+               goto failed;
+       }
+
+       id = grp->gr_gid;
+       free(buf);
+       free(grp);
+
+       return id;
+
+failed:
+       if (buf)
+               free(buf);
+       if (grp)
+               free(grp);
+
+       return -1;
+}
+
+static int
+_tdm_socket_init(tdm_private_loop *private_loop)
+{
+       const char *dir = NULL;
+       char socket_path[128];
+       int ret = -1;
+       uid_t uid;
+       gid_t gid;
+
+       if (wl_display_add_socket(private_loop->wl_display, "tdm-socket")) {
+               TDM_ERR("createing a tdm-socket failed");
+               return 0;
+       }
+
+       dir = getenv("XDG_RUNTIME_DIR");
+       if (!dir) {
+               TDM_ERR("getting XDG_RUNTIME_DIR failed");
+               return 0;
+       }
+
+       snprintf(socket_path, sizeof(socket_path), "%s/%s", dir, "tdm-socket");
+
+       ret = chmod(socket_path, 509);
+       if (ret < 0) {
+               TDM_ERR("changing modes of socket file failed:%s (%m)", socket_path);
+               return 0;
+       }
+
+       ret = _tdm_getgrnam_r("root");
+       if (ret < 0) {
+               TDM_ERR("getting uid failed");
+               return 0;
+       }
+       uid = ret;
+
+       ret = _tdm_getgrnam_r("display");
+       if (ret < 0) {
+               TDM_ERR("getting gid failed");
+               return 0;
+       }
+       gid = ret;
+
+       ret = chown(socket_path, uid, gid);
+       if (ret < 0) {
+               TDM_ERR("changing owner of socket file failed:%s (%m)", socket_path);
+               return 0;
+       }
+
+       return 1;
 }
 
 INTERN tdm_error
@@ -569,8 +739,8 @@ tdm_server_init(tdm_private_loop *private_loop)
        if (private_loop->private_server)
                return TDM_ERROR_NONE;
 
-       if (wl_display_add_socket(private_loop->wl_display, "tdm-socket")) {
-               TDM_ERR("createing a tdm-socket failed");
+       if (!_tdm_socket_init(private_loop)) {
+               TDM_ERR("initializing tdm-socket failed");
                return TDM_ERROR_OPERATION_FAILED;
        }
 
@@ -594,6 +764,8 @@ tdm_server_init(tdm_private_loop *private_loop)
        private_loop->private_server = private_server;
        keep_private_server = private_server;
 
+       LIST_INITHEAD(&client_list);
+
        return TDM_ERROR_NONE;
 }
 
@@ -602,6 +774,7 @@ tdm_server_deinit(tdm_private_loop *private_loop)
 {
        tdm_server_output_info *o = NULL, *oo = NULL;
        tdm_server_wait_info *w = NULL, *ww = NULL;
+       tdm_server_client_info *c = NULL, *cc = NULL;
        tdm_private_server *private_server;
 
        if (!private_loop->private_server)
@@ -620,5 +793,22 @@ tdm_server_deinit(tdm_private_loop *private_loop)
        free(private_server);
        private_loop->private_server = NULL;
        keep_private_server = NULL;
+
+       LIST_FOR_EACH_ENTRY_SAFE(c, cc, &client_list, link) {
+               LIST_DEL(&c->link);
+               free(c);
+       }
 }
 
+INTERN const char*
+tdm_server_get_client_name(pid_t pid)
+{
+       tdm_server_client_info *c = NULL;
+
+       LIST_FOR_EACH_ENTRY(c, &client_list, link) {
+               if (c->pid == pid)
+                       return (const char*)c->name;
+       }
+
+       return NULL;
+}