2020-05-18 16:30:09 +02:00
|
|
|
/* PipeWire
|
|
|
|
|
*
|
2020-07-16 17:54:18 +02:00
|
|
|
* Copyright © 2020 Wim Taymans
|
2020-05-18 16:30:09 +02:00
|
|
|
*
|
2020-07-16 17:54:18 +02:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
|
|
|
|
* copy of this software and associated documentation files (the "Software"),
|
|
|
|
|
* to deal in the Software without restriction, including without limitation
|
|
|
|
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
|
|
|
* and/or sell copies of the Software, and to permit persons to whom the
|
|
|
|
|
* Software is furnished to do so, subject to the following conditions:
|
2020-05-18 16:30:09 +02:00
|
|
|
*
|
2020-07-16 17:54:18 +02:00
|
|
|
* The above copyright notice and this permission notice (including the next
|
|
|
|
|
* paragraph) shall be included in all copies or substantial portions of the
|
|
|
|
|
* Software.
|
|
|
|
|
*
|
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
|
|
|
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
|
|
|
* DEALINGS IN THE SOFTWARE.
|
2020-05-18 16:30:09 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <errno.h>
|
2020-07-16 17:54:18 +02:00
|
|
|
#include <math.h>
|
|
|
|
|
#include <time.h>
|
2020-05-18 16:30:09 +02:00
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
|
|
#include <dbus/dbus.h>
|
|
|
|
|
|
2021-05-18 11:36:13 +10:00
|
|
|
#include <spa/utils/string.h>
|
2020-05-18 16:30:09 +02:00
|
|
|
#include <spa/support/dbus.h>
|
2020-07-16 17:54:18 +02:00
|
|
|
#include <spa/debug/dict.h>
|
|
|
|
|
|
|
|
|
|
#include "pipewire/pipewire.h"
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
#include "media-session.h"
|
|
|
|
|
|
|
|
|
|
#define NAME "access-portal"
|
|
|
|
|
#define SESSION_KEY "access-portal"
|
2020-05-18 16:30:09 +02:00
|
|
|
|
|
|
|
|
enum media_role {
|
|
|
|
|
MEDIA_ROLE_INVALID = -1,
|
|
|
|
|
MEDIA_ROLE_NONE = 0,
|
|
|
|
|
MEDIA_ROLE_CAMERA = 1 << 0,
|
|
|
|
|
};
|
|
|
|
|
#define MEDIA_ROLE_ALL (MEDIA_ROLE_CAMERA)
|
|
|
|
|
|
|
|
|
|
struct impl {
|
2020-07-16 17:54:18 +02:00
|
|
|
struct sm_media_session *session;
|
|
|
|
|
struct spa_hook listener;
|
2020-05-18 16:30:09 +02:00
|
|
|
|
|
|
|
|
struct spa_list client_list;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
DBusConnection *bus;
|
2020-05-18 16:30:09 +02:00
|
|
|
};
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
struct client {
|
2020-05-18 16:30:09 +02:00
|
|
|
struct impl *impl;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
struct sm_client *obj;
|
|
|
|
|
struct spa_hook listener;
|
|
|
|
|
|
|
|
|
|
struct spa_list link; /**< link in impl client_list */
|
|
|
|
|
|
|
|
|
|
uint32_t id;
|
|
|
|
|
unsigned int portal_managed:1;
|
|
|
|
|
unsigned int setup_complete:1;
|
|
|
|
|
unsigned int is_portal:1;
|
2020-05-18 16:30:09 +02:00
|
|
|
char *app_id;
|
|
|
|
|
enum media_role media_roles;
|
|
|
|
|
enum media_role allowed_media_roles;
|
|
|
|
|
};
|
|
|
|
|
|
2021-05-17 15:17:54 +02:00
|
|
|
static DBusConnection *get_dbus_connection(struct impl *impl);
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
static void client_info_changed(struct client *client, const struct pw_client_info *info);
|
2020-05-18 16:30:09 +02:00
|
|
|
|
|
|
|
|
static enum media_role media_role_from_string(const char *media_role_str)
|
|
|
|
|
{
|
2021-05-18 11:36:13 +10:00
|
|
|
if (spa_streq(media_role_str, "Camera"))
|
2020-05-18 16:30:09 +02:00
|
|
|
return MEDIA_ROLE_CAMERA;
|
|
|
|
|
else
|
|
|
|
|
return MEDIA_ROLE_INVALID;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static enum media_role parse_media_roles(const char *media_types_str)
|
|
|
|
|
{
|
|
|
|
|
enum media_role media_roles = 0;
|
|
|
|
|
char *buf_orig;
|
|
|
|
|
char *buf;
|
|
|
|
|
|
|
|
|
|
buf_orig = strdup(media_types_str);
|
|
|
|
|
buf = buf_orig;
|
|
|
|
|
while (buf) {
|
|
|
|
|
char *media_role_str;
|
|
|
|
|
enum media_role media_role;
|
|
|
|
|
|
|
|
|
|
media_role_str = buf;
|
|
|
|
|
strsep(&buf, ",");
|
|
|
|
|
|
|
|
|
|
media_role = media_role_from_string(media_role_str);
|
|
|
|
|
if (media_role != MEDIA_ROLE_INVALID) {
|
|
|
|
|
media_roles |= MEDIA_ROLE_CAMERA;
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
pw_log_debug("Client specified unknown media role '%s'",
|
|
|
|
|
media_role_str);
|
|
|
|
|
}
|
|
|
|
|
}
|
2020-06-05 13:51:20 +02:00
|
|
|
free(buf_orig);
|
2020-05-18 16:30:09 +02:00
|
|
|
|
|
|
|
|
return media_roles;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static enum media_role media_role_from_properties(const struct pw_properties *props)
|
|
|
|
|
{
|
|
|
|
|
const char *media_class_str;
|
|
|
|
|
const char *media_role_str;
|
|
|
|
|
|
|
|
|
|
media_class_str = pw_properties_get(props, "media.class");
|
|
|
|
|
media_role_str = pw_properties_get(props, "media.role");
|
|
|
|
|
|
|
|
|
|
if (media_class_str == NULL)
|
|
|
|
|
return MEDIA_ROLE_INVALID;
|
|
|
|
|
|
|
|
|
|
if (media_role_str == NULL)
|
|
|
|
|
return MEDIA_ROLE_INVALID;
|
|
|
|
|
|
2021-05-18 11:43:49 +10:00
|
|
|
if (!spa_streq(media_class_str, "Video/Source"))
|
2020-05-18 16:30:09 +02:00
|
|
|
return MEDIA_ROLE_INVALID;
|
|
|
|
|
|
|
|
|
|
return media_role_from_string(media_role_str);
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
static void object_update(void *data)
|
2020-05-18 16:30:09 +02:00
|
|
|
{
|
2020-07-16 17:54:18 +02:00
|
|
|
struct client *client = data;
|
|
|
|
|
struct impl *impl = client->impl;
|
|
|
|
|
|
|
|
|
|
pw_log_debug(NAME" %p: client %p %08x", impl, client, client->obj->obj.changed);
|
|
|
|
|
|
|
|
|
|
if (client->obj->obj.avail & SM_CLIENT_CHANGE_MASK_INFO)
|
|
|
|
|
client_info_changed(client, client->obj->info);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct sm_object_events object_events = {
|
|
|
|
|
SM_VERSION_OBJECT_EVENTS,
|
|
|
|
|
.update = object_update
|
|
|
|
|
};
|
|
|
|
|
|
2020-05-18 16:30:09 +02:00
|
|
|
static int
|
2020-07-16 17:54:18 +02:00
|
|
|
handle_client(struct impl *impl, struct sm_object *object)
|
2020-05-18 16:30:09 +02:00
|
|
|
{
|
2020-07-16 17:54:18 +02:00
|
|
|
struct client *client;
|
2020-07-17 14:14:26 +02:00
|
|
|
const char *str;
|
2020-07-16 17:54:18 +02:00
|
|
|
|
2020-10-09 13:27:18 +02:00
|
|
|
pw_log_debug(NAME" %p: client %u", impl, object->id);
|
2020-07-16 17:54:18 +02:00
|
|
|
|
|
|
|
|
client = sm_object_add_data(object, SESSION_KEY, sizeof(struct client));
|
|
|
|
|
client->obj = (struct sm_client*)object;
|
|
|
|
|
client->id = object->id;
|
|
|
|
|
client->impl = impl;
|
|
|
|
|
spa_list_append(&impl->client_list, &client->link);
|
|
|
|
|
|
|
|
|
|
client->obj->obj.mask |= SM_CLIENT_CHANGE_MASK_INFO;
|
|
|
|
|
sm_object_add_listener(&client->obj->obj, &client->listener, &object_events, client);
|
|
|
|
|
|
2020-10-09 13:27:18 +02:00
|
|
|
if (((str = pw_properties_get(client->obj->obj.props, PW_KEY_ACCESS)) != NULL ||
|
|
|
|
|
(str = pw_properties_get(client->obj->obj.props, PW_KEY_CLIENT_ACCESS)) != NULL) &&
|
2021-05-18 11:36:13 +10:00
|
|
|
spa_streq(str, "portal")) {
|
2020-07-17 14:14:26 +02:00
|
|
|
client->portal_managed = true;
|
|
|
|
|
pw_log_info(NAME " %p: portal managed client %d added",
|
|
|
|
|
impl, client->id);
|
|
|
|
|
}
|
2020-07-16 17:54:18 +02:00
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
|
set_global_permissions(void *data, struct sm_object *object)
|
|
|
|
|
{
|
|
|
|
|
struct client *client = data;
|
|
|
|
|
struct impl *impl = client->impl;
|
2020-05-18 16:30:09 +02:00
|
|
|
struct pw_permission permissions[1];
|
2020-07-16 17:54:18 +02:00
|
|
|
const struct pw_properties *props;
|
2020-05-18 16:30:09 +02:00
|
|
|
int n_permissions = 0;
|
|
|
|
|
bool set_permission;
|
|
|
|
|
bool allowed = false;
|
|
|
|
|
|
2020-07-17 14:14:26 +02:00
|
|
|
if ((props = object->props) == NULL)
|
|
|
|
|
return 0;
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
pw_log_debug(NAME" %p: object %d type:%s", impl, object->id, object->type);
|
|
|
|
|
|
2021-05-18 11:36:13 +10:00
|
|
|
if (spa_streq(object->type, PW_TYPE_INTERFACE_Client)) {
|
2020-07-16 17:54:18 +02:00
|
|
|
set_permission = allowed = object->id == client->id;
|
2021-05-18 11:36:13 +10:00
|
|
|
} else if (spa_streq(object->type, PW_TYPE_INTERFACE_Node)) {
|
2020-07-17 14:14:26 +02:00
|
|
|
enum media_role media_role;
|
|
|
|
|
|
|
|
|
|
media_role = media_role_from_properties(props);
|
|
|
|
|
|
|
|
|
|
if (media_role == MEDIA_ROLE_INVALID) {
|
|
|
|
|
set_permission = false;
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
2020-07-17 14:14:26 +02:00
|
|
|
else if (client->allowed_media_roles & media_role) {
|
|
|
|
|
set_permission = true;
|
|
|
|
|
allowed = true;
|
|
|
|
|
}
|
|
|
|
|
else if (client->media_roles & media_role) {
|
|
|
|
|
set_permission = true;
|
|
|
|
|
allowed = false;
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
set_permission = false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
set_permission = false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (set_permission) {
|
|
|
|
|
permissions[n_permissions++] =
|
2020-07-30 16:26:29 +02:00
|
|
|
PW_PERMISSION_INIT(object->id, allowed ? PW_PERM_ALL : 0);
|
2020-07-17 14:14:26 +02:00
|
|
|
pw_log_info(NAME" %p: object %d allowed:%d", impl, object->id, allowed);
|
2020-07-16 17:54:18 +02:00
|
|
|
pw_client_update_permissions(client->obj->obj.proxy,
|
|
|
|
|
n_permissions, permissions);
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
static void session_create(void *data, struct sm_object *object)
|
|
|
|
|
{
|
|
|
|
|
struct impl *impl = data;
|
|
|
|
|
|
|
|
|
|
pw_log_debug(NAME " %p: create global '%d'", impl, object->id);
|
|
|
|
|
|
2021-05-18 11:36:13 +10:00
|
|
|
if (spa_streq(object->type, PW_TYPE_INTERFACE_Client)) {
|
2020-07-16 17:54:18 +02:00
|
|
|
handle_client(impl, object);
|
|
|
|
|
} else {
|
|
|
|
|
struct client *client;
|
|
|
|
|
|
|
|
|
|
spa_list_for_each(client, &impl->client_list, link) {
|
|
|
|
|
if (client->portal_managed &&
|
|
|
|
|
!client->is_portal)
|
|
|
|
|
set_global_permissions(client, object);
|
|
|
|
|
}
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
2020-07-16 17:54:18 +02:00
|
|
|
}
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
static void destroy_client(struct impl *impl, struct client *client)
|
|
|
|
|
{
|
|
|
|
|
spa_list_remove(&client->link);
|
|
|
|
|
spa_hook_remove(&client->listener);
|
|
|
|
|
free(client->app_id);
|
|
|
|
|
sm_object_remove_data((struct sm_object*)client->obj, SESSION_KEY);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void session_remove(void *data, struct sm_object *object)
|
|
|
|
|
{
|
|
|
|
|
struct impl *impl = data;
|
|
|
|
|
pw_log_debug(NAME " %p: remove global '%d'", impl, object->id);
|
|
|
|
|
|
2021-05-18 11:36:13 +10:00
|
|
|
if (spa_streq(object->type, PW_TYPE_INTERFACE_Client)) {
|
2020-07-16 17:54:18 +02:00
|
|
|
struct client *client;
|
|
|
|
|
|
|
|
|
|
if ((client = sm_object_get_data(object, SESSION_KEY)) != NULL)
|
|
|
|
|
destroy_client(impl, client);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void session_destroy(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct impl *impl = data;
|
|
|
|
|
struct client *client;
|
|
|
|
|
|
|
|
|
|
spa_list_consume(client, &impl->client_list, link)
|
|
|
|
|
destroy_client(impl, client);
|
|
|
|
|
|
|
|
|
|
spa_hook_remove(&impl->listener);
|
|
|
|
|
free(impl);
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
|
|
|
|
|
2021-05-17 15:17:54 +02:00
|
|
|
static void session_dbus_disconnected(void *data)
|
|
|
|
|
{
|
|
|
|
|
struct impl *impl = data;
|
|
|
|
|
dbus_connection_unref(impl->bus);
|
|
|
|
|
impl->bus = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
static const struct sm_media_session_events session_events = {
|
|
|
|
|
SM_VERSION_MEDIA_SESSION_EVENTS,
|
|
|
|
|
.create = session_create,
|
|
|
|
|
.remove = session_remove,
|
|
|
|
|
.destroy = session_destroy,
|
2021-05-17 15:17:54 +02:00
|
|
|
.dbus_disconnected = session_dbus_disconnected,
|
2020-07-16 17:54:18 +02:00
|
|
|
};
|
|
|
|
|
|
2020-05-18 16:30:09 +02:00
|
|
|
static bool
|
|
|
|
|
check_permission_allowed(DBusMessageIter *iter)
|
|
|
|
|
{
|
|
|
|
|
bool allowed = false;
|
|
|
|
|
|
|
|
|
|
while (dbus_message_iter_get_arg_type (iter) != DBUS_TYPE_INVALID) {
|
|
|
|
|
const char *permission_value;
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_get_basic(iter, &permission_value);
|
|
|
|
|
|
2021-05-18 11:36:13 +10:00
|
|
|
if (spa_streq(permission_value, "yes")) {
|
2020-05-18 16:30:09 +02:00
|
|
|
allowed = true;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
dbus_message_iter_next(iter);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return allowed;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
static void do_permission_store_check(struct client *client)
|
2020-05-18 16:30:09 +02:00
|
|
|
{
|
2020-07-16 17:54:18 +02:00
|
|
|
struct impl *impl = client->impl;
|
2020-05-18 16:30:09 +02:00
|
|
|
DBusMessage *m = NULL, *r = NULL;
|
|
|
|
|
DBusError error;
|
|
|
|
|
DBusMessageIter msg_iter;
|
|
|
|
|
const char *table;
|
|
|
|
|
const char *id;
|
|
|
|
|
DBusMessageIter r_iter;
|
|
|
|
|
DBusMessageIter permissions_iter;
|
2021-05-17 15:17:54 +02:00
|
|
|
DBusConnection *bus;
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if (client->app_id == NULL) {
|
2020-05-18 16:30:09 +02:00
|
|
|
pw_log_debug("Ignoring portal check for broken portal managed client %p",
|
|
|
|
|
client);
|
|
|
|
|
goto err_not_allowed;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if (client->media_roles == 0) {
|
2020-05-18 16:30:09 +02:00
|
|
|
pw_log_debug("Ignoring portal check for portal client %p with static permissions",
|
|
|
|
|
client);
|
2020-07-16 17:54:18 +02:00
|
|
|
sm_media_session_for_each_object(impl->session,
|
2020-05-18 16:30:09 +02:00
|
|
|
set_global_permissions,
|
2020-07-16 17:54:18 +02:00
|
|
|
client);
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-18 11:36:13 +10:00
|
|
|
if (spa_streq(client->app_id, "")) {
|
2020-05-18 16:30:09 +02:00
|
|
|
pw_log_debug("Ignoring portal check for non-sandboxed portal client %p",
|
|
|
|
|
client);
|
2020-07-16 17:54:18 +02:00
|
|
|
client->allowed_media_roles = MEDIA_ROLE_ALL;
|
|
|
|
|
sm_media_session_for_each_object(impl->session,
|
2020-05-18 16:30:09 +02:00
|
|
|
set_global_permissions,
|
2020-07-16 17:54:18 +02:00
|
|
|
client);
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
}
|
2021-05-17 15:17:54 +02:00
|
|
|
bus = get_dbus_connection(impl);
|
|
|
|
|
if (bus == NULL) {
|
|
|
|
|
pw_log_debug("Ignoring portal check for client %p: no dbus",
|
2021-02-12 17:55:56 +01:00
|
|
|
client);
|
|
|
|
|
client->allowed_media_roles = MEDIA_ROLE_ALL;
|
|
|
|
|
sm_media_session_for_each_object(impl->session,
|
|
|
|
|
set_global_permissions,
|
|
|
|
|
client);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
client->allowed_media_roles = MEDIA_ROLE_NONE;
|
2020-05-18 16:30:09 +02:00
|
|
|
|
|
|
|
|
dbus_error_init(&error);
|
|
|
|
|
|
|
|
|
|
m = dbus_message_new_method_call("org.freedesktop.impl.portal.PermissionStore",
|
|
|
|
|
"/org/freedesktop/impl/portal/PermissionStore",
|
|
|
|
|
"org.freedesktop.impl.portal.PermissionStore",
|
|
|
|
|
"Lookup");
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_init_append(m, &msg_iter);
|
|
|
|
|
table = "devices";
|
|
|
|
|
dbus_message_iter_append_basic(&msg_iter, DBUS_TYPE_STRING, &table);
|
|
|
|
|
id = "camera";
|
|
|
|
|
dbus_message_iter_append_basic(&msg_iter, DBUS_TYPE_STRING, &id);
|
|
|
|
|
|
2021-05-17 15:17:54 +02:00
|
|
|
if (!(r = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
|
2020-05-18 16:30:09 +02:00
|
|
|
pw_log_error("Failed to call permission store: %s", error.message);
|
|
|
|
|
dbus_error_free(&error);
|
|
|
|
|
goto err_not_allowed;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dbus_message_unref(m);
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_init(r, &r_iter);
|
|
|
|
|
dbus_message_iter_recurse(&r_iter, &permissions_iter);
|
|
|
|
|
while (dbus_message_iter_get_arg_type(&permissions_iter) !=
|
|
|
|
|
DBUS_TYPE_INVALID) {
|
|
|
|
|
DBusMessageIter permissions_entry_iter;
|
|
|
|
|
const char *app_id;
|
|
|
|
|
DBusMessageIter permission_values_iter;
|
|
|
|
|
bool camera_allowed;
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_recurse(&permissions_iter,
|
|
|
|
|
&permissions_entry_iter);
|
|
|
|
|
dbus_message_iter_get_basic(&permissions_entry_iter, &app_id);
|
|
|
|
|
|
|
|
|
|
pw_log_info("permissions %s", app_id);
|
2021-05-18 11:43:49 +10:00
|
|
|
if (!spa_streq(app_id, client->app_id)) {
|
2020-05-18 16:30:09 +02:00
|
|
|
dbus_message_iter_next(&permissions_iter);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_next(&permissions_entry_iter);
|
|
|
|
|
dbus_message_iter_recurse(&permissions_entry_iter,
|
|
|
|
|
&permission_values_iter);
|
|
|
|
|
|
|
|
|
|
camera_allowed = check_permission_allowed(&permission_values_iter);
|
|
|
|
|
pw_log_info("allowed %d", camera_allowed);
|
2020-07-16 17:54:18 +02:00
|
|
|
client->allowed_media_roles |=
|
2020-05-18 16:30:09 +02:00
|
|
|
camera_allowed ? MEDIA_ROLE_CAMERA : MEDIA_ROLE_NONE;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
sm_media_session_for_each_object(impl->session,
|
|
|
|
|
set_global_permissions,
|
|
|
|
|
client);
|
2020-05-18 16:30:09 +02:00
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dbus_message_unref(r);
|
|
|
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
err_not_allowed:
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
static void client_info_changed(struct client *client, const struct pw_client_info *info)
|
2020-05-18 16:30:09 +02:00
|
|
|
{
|
2020-07-16 17:54:18 +02:00
|
|
|
struct impl *impl = client->impl;
|
|
|
|
|
const struct spa_dict *props;
|
2020-05-18 16:30:09 +02:00
|
|
|
const char *is_portal;
|
|
|
|
|
const char *app_id;
|
|
|
|
|
const char *media_roles;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if (!client->portal_managed || client->is_portal)
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if (client->setup_complete)
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if ((props = info->props) == NULL) {
|
2020-05-18 16:30:09 +02:00
|
|
|
pw_log_error("Portal managed client didn't have any properties");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
is_portal = spa_dict_lookup(props, "pipewire.access.portal.is_portal");
|
2020-05-18 16:30:09 +02:00
|
|
|
if (is_portal != NULL &&
|
2021-05-18 11:36:13 +10:00
|
|
|
(spa_streq(is_portal, "yes") || pw_properties_parse_bool(is_portal))) {
|
2020-07-17 14:14:26 +02:00
|
|
|
pw_log_info(NAME " %p: client %d is the portal itself",
|
2020-07-16 17:54:18 +02:00
|
|
|
impl, client->id);
|
|
|
|
|
client->is_portal = true;
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
};
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
app_id = spa_dict_lookup(props, "pipewire.access.portal.app_id");
|
2020-05-18 16:30:09 +02:00
|
|
|
if (app_id == NULL) {
|
2020-07-16 17:54:18 +02:00
|
|
|
pw_log_error(NAME" %p: Portal managed client %d didn't set app_id",
|
|
|
|
|
impl, client->id);
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
}
|
2020-07-16 17:54:18 +02:00
|
|
|
media_roles = spa_dict_lookup(props, "pipewire.access.portal.media_roles");
|
2020-05-18 16:30:09 +02:00
|
|
|
if (media_roles == NULL) {
|
2020-07-16 17:54:18 +02:00
|
|
|
pw_log_error(NAME" %p: Portal managed client %d didn't set media_roles",
|
|
|
|
|
impl, client->id);
|
2020-05-18 16:30:09 +02:00
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
client->app_id = strdup(app_id);
|
|
|
|
|
client->media_roles = parse_media_roles(media_roles);
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
pw_log_info(NAME" %p: client %d with app_id '%s' set to portal access",
|
|
|
|
|
impl, client->id, client->app_id);
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
do_permission_store_check(client);
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
client->setup_complete = true;
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static DBusHandlerResult permission_store_changed_handler(DBusConnection *connection,
|
|
|
|
|
DBusMessage *message,
|
|
|
|
|
void *user_data)
|
|
|
|
|
{
|
|
|
|
|
struct impl *impl = user_data;
|
2020-07-16 17:54:18 +02:00
|
|
|
struct client *client;
|
2020-05-18 16:30:09 +02:00
|
|
|
DBusMessageIter iter;
|
|
|
|
|
const char *table;
|
|
|
|
|
const char *id;
|
|
|
|
|
dbus_bool_t deleted;
|
|
|
|
|
DBusMessageIter permissions_iter;
|
|
|
|
|
|
|
|
|
|
if (!dbus_message_is_signal(message, "org.freedesktop.impl.portal.PermissionStore",
|
|
|
|
|
"Changed"))
|
|
|
|
|
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
spa_list_for_each(client, &impl->client_list, link) {
|
|
|
|
|
if (!client->portal_managed)
|
2020-05-18 16:30:09 +02:00
|
|
|
continue;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
client->allowed_media_roles = MEDIA_ROLE_NONE;
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_init(message, &iter);
|
|
|
|
|
dbus_message_iter_get_basic(&iter, &table);
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_next(&iter);
|
|
|
|
|
dbus_message_iter_get_basic(&iter, &id);
|
|
|
|
|
|
2021-05-18 11:43:49 +10:00
|
|
|
if (!spa_streq(table, "devices") || !spa_streq(id, "camera"))
|
2020-05-18 16:30:09 +02:00
|
|
|
return DBUS_HANDLER_RESULT_HANDLED;
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_next(&iter);
|
|
|
|
|
dbus_message_iter_get_basic(&iter, &deleted);
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_next(&iter);
|
|
|
|
|
/* data variant (ignored) */
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_next(&iter);
|
|
|
|
|
dbus_message_iter_recurse(&iter, &permissions_iter);
|
|
|
|
|
while (dbus_message_iter_get_arg_type(&permissions_iter) !=
|
|
|
|
|
DBUS_TYPE_INVALID) {
|
|
|
|
|
DBusMessageIter permissions_entry_iter;
|
|
|
|
|
const char *app_id;
|
|
|
|
|
DBusMessageIter permission_values_iter;
|
|
|
|
|
bool camera_allowed;
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_recurse(&permissions_iter,
|
|
|
|
|
&permissions_entry_iter);
|
|
|
|
|
dbus_message_iter_get_basic(&permissions_entry_iter, &app_id);
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_next(&permissions_entry_iter);
|
|
|
|
|
dbus_message_iter_recurse(&permissions_entry_iter,
|
|
|
|
|
&permission_values_iter);
|
|
|
|
|
|
|
|
|
|
camera_allowed = check_permission_allowed(&permission_values_iter);
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
spa_list_for_each(client, &impl->client_list, link) {
|
|
|
|
|
if (!client->portal_managed)
|
2020-05-18 16:30:09 +02:00
|
|
|
continue;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if (client->is_portal)
|
2020-05-18 16:30:09 +02:00
|
|
|
continue;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if (client->app_id == NULL ||
|
2021-05-18 11:43:49 +10:00
|
|
|
!spa_streq(client->app_id, app_id))
|
2020-05-18 16:30:09 +02:00
|
|
|
continue;
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
if (!(client->media_roles & MEDIA_ROLE_CAMERA))
|
2020-05-18 16:30:09 +02:00
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
if (camera_allowed)
|
2020-07-16 17:54:18 +02:00
|
|
|
client->allowed_media_roles |= MEDIA_ROLE_CAMERA;
|
|
|
|
|
|
|
|
|
|
sm_media_session_for_each_object(impl->session,
|
2020-05-18 16:30:09 +02:00
|
|
|
set_global_permissions,
|
2020-07-16 17:54:18 +02:00
|
|
|
client);
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dbus_message_iter_next(&permissions_iter);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return DBUS_HANDLER_RESULT_HANDLED;
|
|
|
|
|
}
|
|
|
|
|
|
2021-05-17 15:17:54 +02:00
|
|
|
static DBusConnection *get_dbus_connection(struct impl *impl)
|
2020-05-18 16:30:09 +02:00
|
|
|
{
|
2021-05-17 15:17:54 +02:00
|
|
|
struct sm_media_session *session = impl->session;
|
2020-05-18 16:30:09 +02:00
|
|
|
DBusError error;
|
|
|
|
|
|
2021-05-17 15:17:54 +02:00
|
|
|
if (impl->bus)
|
|
|
|
|
return impl->bus;
|
|
|
|
|
|
|
|
|
|
if (session->dbus_connection)
|
|
|
|
|
impl->bus = spa_dbus_connection_get(session->dbus_connection);
|
|
|
|
|
if (impl->bus == NULL) {
|
|
|
|
|
pw_log_warn("no dbus connection, portal access disabled");
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
pw_log_debug("got dbus connection %p", impl->bus);
|
2021-02-12 17:55:56 +01:00
|
|
|
|
2020-05-18 16:30:09 +02:00
|
|
|
dbus_error_init(&error);
|
|
|
|
|
|
|
|
|
|
dbus_bus_add_match(impl->bus,
|
|
|
|
|
"type='signal',\
|
|
|
|
|
sender='org.freedesktop.impl.portal.PermissionStore',\
|
|
|
|
|
interface='org.freedesktop.impl.portal.PermissionStore',\
|
|
|
|
|
member='Changed'",
|
|
|
|
|
&error);
|
|
|
|
|
if (dbus_error_is_set(&error)) {
|
|
|
|
|
pw_log_error("Failed to add permission store changed listener: %s",
|
|
|
|
|
error.message);
|
|
|
|
|
dbus_error_free(&error);
|
2021-05-17 15:17:54 +02:00
|
|
|
impl->bus = NULL;
|
|
|
|
|
return NULL;
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
2021-05-17 15:17:54 +02:00
|
|
|
dbus_connection_ref(impl->bus);
|
2020-05-18 16:30:09 +02:00
|
|
|
dbus_connection_add_filter(impl->bus, permission_store_changed_handler,
|
|
|
|
|
impl, NULL);
|
2021-05-17 15:17:54 +02:00
|
|
|
return impl->bus;
|
2020-05-18 16:30:09 +02:00
|
|
|
}
|
|
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
int sm_access_portal_start(struct sm_media_session *session)
|
2020-05-18 16:30:09 +02:00
|
|
|
{
|
|
|
|
|
struct impl *impl;
|
|
|
|
|
|
|
|
|
|
impl = calloc(1, sizeof(struct impl));
|
|
|
|
|
if (impl == NULL)
|
2020-07-16 17:54:18 +02:00
|
|
|
return -errno;
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
spa_list_init(&impl->client_list);
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
impl->session = session;
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2021-05-17 15:17:54 +02:00
|
|
|
get_dbus_connection(impl);
|
2020-05-18 16:30:09 +02:00
|
|
|
|
2020-07-16 17:54:18 +02:00
|
|
|
sm_media_session_add_listener(impl->session,
|
|
|
|
|
&impl->listener,
|
|
|
|
|
&session_events, impl);
|
2020-05-18 16:30:09 +02:00
|
|
|
return 0;
|
|
|
|
|
}
|