2 * rpcd - UBUS RPC server
4 * Copyright (C) 2013-2014 Jo-Philipp Wich <jow@openwrt.org>
6 * Permission to use, copy, modify, and/or distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22 #include <libubox/blobmsg.h>
23 #include <libubox/blobmsg_json.h>
26 #include <rpcd/exec.h>
27 #include <rpcd/session.h>
29 static struct blob_buf buf;
30 static struct uci_context *cursor;
31 static struct uloop_timeout apply_timer;
32 static struct ubus_context *apply_ctx;
34 char apply_sid[RPC_SID_LEN + 1];
46 static const struct blobmsg_policy rpc_uci_get_policy[__RPC_G_MAX] = {
47 [RPC_G_CONFIG] = { .name = "config", .type = BLOBMSG_TYPE_STRING },
48 [RPC_G_SECTION] = { .name = "section", .type = BLOBMSG_TYPE_STRING },
49 [RPC_G_OPTION] = { .name = "option", .type = BLOBMSG_TYPE_STRING },
50 [RPC_G_TYPE] = { .name = "type", .type = BLOBMSG_TYPE_STRING },
51 [RPC_G_MATCH] = { .name = "match", .type = BLOBMSG_TYPE_TABLE },
52 [RPC_G_SESSION] = { .name = "ubus_rpc_session",
53 .type = BLOBMSG_TYPE_STRING },
65 static const struct blobmsg_policy rpc_uci_add_policy[__RPC_A_MAX] = {
66 [RPC_A_CONFIG] = { .name = "config", .type = BLOBMSG_TYPE_STRING },
67 [RPC_A_TYPE] = { .name = "type", .type = BLOBMSG_TYPE_STRING },
68 [RPC_A_NAME] = { .name = "name", .type = BLOBMSG_TYPE_STRING },
69 [RPC_A_VALUES] = { .name = "values", .type = BLOBMSG_TYPE_TABLE },
70 [RPC_A_SESSION] = { .name = "ubus_rpc_session",
71 .type = BLOBMSG_TYPE_STRING },
84 static const struct blobmsg_policy rpc_uci_set_policy[__RPC_S_MAX] = {
85 [RPC_S_CONFIG] = { .name = "config", .type = BLOBMSG_TYPE_STRING },
86 [RPC_S_SECTION] = { .name = "section", .type = BLOBMSG_TYPE_STRING },
87 [RPC_S_TYPE] = { .name = "type", .type = BLOBMSG_TYPE_STRING },
88 [RPC_S_MATCH] = { .name = "match", .type = BLOBMSG_TYPE_TABLE },
89 [RPC_S_VALUES] = { .name = "values", .type = BLOBMSG_TYPE_TABLE },
90 [RPC_S_SESSION] = { .name = "ubus_rpc_session",
91 .type = BLOBMSG_TYPE_STRING },
105 static const struct blobmsg_policy rpc_uci_delete_policy[__RPC_D_MAX] = {
106 [RPC_D_CONFIG] = { .name = "config", .type = BLOBMSG_TYPE_STRING },
107 [RPC_D_SECTION] = { .name = "section", .type = BLOBMSG_TYPE_STRING },
108 [RPC_D_TYPE] = { .name = "type", .type = BLOBMSG_TYPE_STRING },
109 [RPC_D_MATCH] = { .name = "match", .type = BLOBMSG_TYPE_TABLE },
110 [RPC_D_OPTION] = { .name = "option", .type = BLOBMSG_TYPE_STRING },
111 [RPC_D_OPTIONS] = { .name = "options", .type = BLOBMSG_TYPE_ARRAY },
112 [RPC_D_SESSION] = { .name = "ubus_rpc_session",
113 .type = BLOBMSG_TYPE_STRING },
125 static const struct blobmsg_policy rpc_uci_rename_policy[__RPC_R_MAX] = {
126 [RPC_R_CONFIG] = { .name = "config", .type = BLOBMSG_TYPE_STRING },
127 [RPC_R_SECTION] = { .name = "section", .type = BLOBMSG_TYPE_STRING },
128 [RPC_R_OPTION] = { .name = "option", .type = BLOBMSG_TYPE_STRING },
129 [RPC_R_NAME] = { .name = "name", .type = BLOBMSG_TYPE_STRING },
130 [RPC_R_SESSION] = { .name = "ubus_rpc_session",
131 .type = BLOBMSG_TYPE_STRING },
141 static const struct blobmsg_policy rpc_uci_order_policy[__RPC_O_MAX] = {
142 [RPC_O_CONFIG] = { .name = "config", .type = BLOBMSG_TYPE_STRING },
143 [RPC_O_SECTIONS] = { .name = "sections", .type = BLOBMSG_TYPE_ARRAY },
144 [RPC_O_SESSION] = { .name = "ubus_rpc_session",
145 .type = BLOBMSG_TYPE_STRING },
154 static const struct blobmsg_policy rpc_uci_config_policy[__RPC_C_MAX] = {
155 [RPC_C_CONFIG] = { .name = "config", .type = BLOBMSG_TYPE_STRING },
156 [RPC_C_SESSION] = { .name = "ubus_rpc_session",
157 .type = BLOBMSG_TYPE_STRING },
167 static const struct blobmsg_policy rpc_uci_apply_policy[__RPC_T_MAX] = {
168 [RPC_T_ROLLBACK] = { .name = "rollback", .type = BLOBMSG_TYPE_BOOL },
169 [RPC_T_TIMEOUT] = { .name = "timeout", .type = BLOBMSG_TYPE_INT32 },
170 [RPC_T_SESSION] = { .name = "ubus_rpc_session",
171 .type = BLOBMSG_TYPE_STRING },
179 static const struct blobmsg_policy rpc_uci_rollback_policy[__RPC_B_MAX] = {
180 [RPC_B_SESSION] = { .name = "ubus_rpc_session",
181 .type = BLOBMSG_TYPE_STRING },
185 * Validate a uci name
188 rpc_uci_verify_str(const char *name, bool extended, bool type)
196 if (extended && *name != '@')
199 for (c = name + extended; *c; c++)
200 if (!isalnum(*c) && *c != '_' && ((!type && !extended) || *c != '-'))
209 return (e > c && *e == ']' && *(e+1) == 0);
216 * Check that string is a valid, shell compatible uci name
218 static bool rpc_uci_verify_name(const char *name) {
219 return rpc_uci_verify_str(name, false, false);
223 * Check that string is a valid section type name
225 static bool rpc_uci_verify_type(const char *type) {
226 return rpc_uci_verify_str(type, false, true);
230 * Check that the string is a valid section id, optionally in extended
233 static bool rpc_uci_verify_section(const char *section) {
234 return rpc_uci_verify_str(section, true, false);
239 * Turn uci error state into ubus return code
247 return UBUS_STATUS_OK;
250 return UBUS_STATUS_INVALID_ARGUMENT;
252 case UCI_ERR_NOTFOUND:
253 return UBUS_STATUS_NOT_FOUND;
256 return UBUS_STATUS_UNKNOWN_ERROR;
261 * Clear all save directories from the uci cursor and append the given path
262 * as new save directory.
265 rpc_uci_replace_savedir(const char *path)
267 struct uci_element *e, *tmp;
269 uci_foreach_element_safe(&cursor->delta_path, tmp, e) {
276 cursor->delta_path.prev = &cursor->delta_path;
277 cursor->delta_path.next = &cursor->delta_path;
280 uci_set_savedir(cursor, path);
284 * Setup per-session delta save directory. If the passed "sid" blob attribute
285 * pointer is NULL then the precedure was not invoked through the ubus-rpc so
286 * we do not perform session isolation and use the default save directory.
289 rpc_uci_set_savedir(struct blob_attr *sid)
295 rpc_uci_replace_savedir("/tmp/.uci");
299 snprintf(path, sizeof(path) - 1,
300 RPC_UCI_SAVEDIR_PREFIX "%s", blobmsg_get_string(sid));
302 rpc_uci_replace_savedir(path);
306 * Test read access to given config. If the passed "sid" blob attribute pointer
307 * is NULL then the precedure was not invoked through the ubus-rpc so we do not
308 * perform access control and always assume true.
311 rpc_uci_read_access(struct blob_attr *sid, struct blob_attr *config)
313 rpc_uci_set_savedir(sid);
318 return rpc_session_access(blobmsg_data(sid), "uci",
319 blobmsg_data(config), "read");
323 * Test write access to given config. If the passed "sid" blob attribute pointer
324 * is NULL then the precedure was not invoked through the ubus-rpc so we do not
325 * perform access control and always assume true.
328 rpc_uci_write_access(struct blob_attr *sid, struct blob_attr *config)
330 rpc_uci_set_savedir(sid);
335 return rpc_session_access(blobmsg_data(sid), "uci",
336 blobmsg_data(config), "write");
340 * Format applicable blob value as string and place a pointer to the string
341 * buffer in "p". Uses a static string buffer.
344 rpc_uci_format_blob(struct blob_attr *v, const char **p)
350 switch (blobmsg_type(v))
352 case BLOBMSG_TYPE_STRING:
353 *p = blobmsg_data(v);
356 case BLOBMSG_TYPE_INT64:
357 snprintf(buf, sizeof(buf), "%"PRIu64, blobmsg_get_u64(v));
361 case BLOBMSG_TYPE_INT32:
362 snprintf(buf, sizeof(buf), "%u", blobmsg_get_u32(v));
366 case BLOBMSG_TYPE_INT16:
367 snprintf(buf, sizeof(buf), "%u", blobmsg_get_u16(v));
371 case BLOBMSG_TYPE_INT8:
372 snprintf(buf, sizeof(buf), "%u", !!blobmsg_get_u8(v));
384 * Lookup the given uci_ptr and enable extended lookup format if the .section
385 * value of the uci_ptr looks like extended syntax. Uses an internal copy
386 * of the given uci_ptr to perform the lookup as failing extended section
387 * lookup operations in libuci will zero our the uci_ptr struct.
388 * Copies the internal uci_ptr back to given the uci_ptr on success.
391 rpc_uci_lookup(struct uci_ptr *ptr)
394 struct uci_ptr lookup = *ptr;
396 if (!lookup.s && lookup.section && *lookup.section == '@')
397 lookup.flags |= UCI_LOOKUP_EXTENDED;
399 rv = uci_lookup_ptr(cursor, &lookup, NULL, true);
408 * Checks whether the given uci_option object matches the given string value.
409 * 1) If the uci_option is of type list, check whether any of the list elements
410 * equals to the given string
411 * 2) If the uci_option is of type string, parse it into space separated tokens
412 * and check if any of the tokens equals to the given string.
413 * Returns true if a list element or token matched the given string.
416 rpc_uci_match_option(struct uci_option *o, const char *cmp)
418 struct uci_element *e;
421 if (o->type == UCI_TYPE_LIST)
423 uci_foreach_element(&o->v.list, e)
424 if (e->name && !strcmp(e->name, cmp))
433 s = strdup(o->v.string);
438 for (p = strtok(s, " \t"); p; p = strtok(NULL, " \t"))
452 * Checks whether the given uci_section matches the type and value blob attrs.
453 * 1) Returns false if "type" is given and the section type does not match
454 * the value specified in the "type" string blob attribute, else continue.
455 * 2) Tests whether any key in the "matches" table blob attribute exists in
456 * the given uci_section and whether each value is contained in the
457 * corresponding uci option value (see rpc_uci_match_option()).
458 * 3) A missing or empty "matches" table blob attribute is always considered
460 * Returns true if "type" matches or is NULL and "matches" matches or is NULL.
463 rpc_uci_match_section(struct uci_section *s,
464 struct blob_attr *type, struct blob_attr *matches)
466 struct uci_element *e;
467 struct blob_attr *cur;
473 if (type && strcmp(s->type, blobmsg_data(type)))
479 blobmsg_for_each_attr(cur, matches, rem)
481 if (!rpc_uci_format_blob(cur, &cmp))
484 uci_foreach_element(&s->options, e)
486 if (strcmp(e->name, blobmsg_name(cur)))
489 if (!rpc_uci_match_option(uci_to_option(e), cmp))
498 return (empty || match);
502 * Dump the given uci_option value into the global blobmsg buffer and use
503 * given "name" as key.
504 * 1) If the uci_option is of type list, put a table into the blob buffer and
505 * add each list item as string to it.
506 * 2) If the uci_option is of type string, put its value directly into the blob
510 rpc_uci_dump_option(struct uci_option *o, const char *name)
513 struct uci_element *e;
517 case UCI_TYPE_STRING:
518 blobmsg_add_string(&buf, name, o->v.string);
522 c = blobmsg_open_array(&buf, name);
524 uci_foreach_element(&o->v.list, e)
525 blobmsg_add_string(&buf, NULL, e->name);
527 blobmsg_close_array(&buf, c);
536 * Dump the given uci_section object into the global blobmsg buffer and use
537 * given "name" as key.
538 * Puts a table into the blob buffer and puts each section option member value
539 * as value into the table using the option name as key.
540 * Adds three special keys ".anonymous", ".type" and ".name" which specify the
541 * corresponding section properties.
544 rpc_uci_dump_section(struct uci_section *s, const char *name, int index)
547 struct uci_option *o;
548 struct uci_element *e;
550 c = blobmsg_open_table(&buf, name);
552 blobmsg_add_u8(&buf, ".anonymous", s->anonymous);
553 blobmsg_add_string(&buf, ".type", s->type);
554 blobmsg_add_string(&buf, ".name", s->e.name);
557 blobmsg_add_u32(&buf, ".index", index);
559 uci_foreach_element(&s->options, e)
561 o = uci_to_option(e);
562 rpc_uci_dump_option(o, o->e.name);
565 blobmsg_close_table(&buf, c);
569 * Dump the given uci_package object into the global blobmsg buffer and use
570 * given "name" as key.
571 * Puts a table into the blob buffer and puts each package section member as
572 * value into the table using the section name as key.
573 * Only dumps sections matching the given "type" and "matches", see explaination
574 * of rpc_uci_match_section() for details.
577 rpc_uci_dump_package(struct uci_package *p, const char *name,
578 struct blob_attr *type, struct blob_attr *matches)
581 struct uci_element *e;
584 c = blobmsg_open_table(&buf, name);
586 uci_foreach_element(&p->sections, e)
590 if (!rpc_uci_match_section(uci_to_section(e), type, matches))
593 rpc_uci_dump_section(uci_to_section(e), e->name, i);
596 blobmsg_close_table(&buf, c);
601 rpc_uci_getcommon(struct ubus_context *ctx, struct ubus_request_data *req,
602 struct blob_attr *msg, bool use_state)
604 struct blob_attr *tb[__RPC_G_MAX];
605 struct uci_package *p = NULL;
606 struct uci_ptr ptr = { 0 };
608 blobmsg_parse(rpc_uci_get_policy, __RPC_G_MAX, tb,
609 blob_data(msg), blob_len(msg));
611 if (!tb[RPC_G_CONFIG])
612 return UBUS_STATUS_INVALID_ARGUMENT;
614 if (!rpc_uci_read_access(tb[RPC_G_SESSION], tb[RPC_G_CONFIG]))
615 return UBUS_STATUS_PERMISSION_DENIED;
617 ptr.package = blobmsg_data(tb[RPC_G_CONFIG]);
620 uci_set_savedir(cursor, "/var/state");
622 if (uci_load(cursor, ptr.package, &p))
623 return rpc_uci_status();
625 if (tb[RPC_G_SECTION])
627 ptr.section = blobmsg_data(tb[RPC_G_SECTION]);
629 if (tb[RPC_G_OPTION])
630 ptr.option = blobmsg_data(tb[RPC_G_OPTION]);
633 if (rpc_uci_lookup(&ptr) || !(ptr.flags & UCI_LOOKUP_COMPLETE))
636 blob_buf_init(&buf, 0);
638 switch (ptr.last->type)
640 case UCI_TYPE_PACKAGE:
641 rpc_uci_dump_package(ptr.p, "values", tb[RPC_G_TYPE], tb[RPC_G_MATCH]);
644 case UCI_TYPE_SECTION:
645 rpc_uci_dump_section(ptr.s, "values", -1);
648 case UCI_TYPE_OPTION:
649 rpc_uci_dump_option(ptr.o, "value");
656 ubus_send_reply(ctx, req, buf.head);
659 uci_unload(cursor, p);
661 return rpc_uci_status();
665 rpc_uci_get(struct ubus_context *ctx, struct ubus_object *obj,
666 struct ubus_request_data *req, const char *method,
667 struct blob_attr *msg)
669 return rpc_uci_getcommon(ctx, req, msg, false);
673 rpc_uci_state(struct ubus_context *ctx, struct ubus_object *obj,
674 struct ubus_request_data *req, const char *method,
675 struct blob_attr *msg)
677 return rpc_uci_getcommon(ctx, req, msg, true);
681 rpc_uci_add(struct ubus_context *ctx, struct ubus_object *obj,
682 struct ubus_request_data *req, const char *method,
683 struct blob_attr *msg)
685 struct blob_attr *tb[__RPC_A_MAX];
686 struct blob_attr *cur, *elem;
687 struct uci_package *p = NULL;
688 struct uci_section *s;
689 struct uci_ptr ptr = { 0 };
690 int rem, rem2, err = 0;
692 blobmsg_parse(rpc_uci_add_policy, __RPC_A_MAX, tb,
693 blob_data(msg), blob_len(msg));
695 if (!tb[RPC_A_CONFIG] || !tb[RPC_A_TYPE])
696 return UBUS_STATUS_INVALID_ARGUMENT;
698 if (!rpc_uci_write_access(tb[RPC_A_SESSION], tb[RPC_A_CONFIG]))
699 return UBUS_STATUS_PERMISSION_DENIED;
701 if (!rpc_uci_verify_type(blobmsg_data(tb[RPC_A_TYPE])))
702 return UBUS_STATUS_INVALID_ARGUMENT;
704 if (tb[RPC_A_NAME] &&
705 !rpc_uci_verify_name(blobmsg_data(tb[RPC_A_NAME])))
706 return UBUS_STATUS_INVALID_ARGUMENT;
708 ptr.package = blobmsg_data(tb[RPC_A_CONFIG]);
710 if (uci_load(cursor, ptr.package, &p))
711 return rpc_uci_status();
713 /* add named section */
716 ptr.section = blobmsg_data(tb[RPC_A_NAME]);
717 ptr.value = blobmsg_data(tb[RPC_A_TYPE]);
720 if (rpc_uci_lookup(&ptr) || uci_set(cursor, &ptr))
724 /* add anon section */
727 if (uci_add_section(cursor, p, blobmsg_data(tb[RPC_A_TYPE]), &s) || !s)
730 ptr.section = s->e.name;
733 if (tb[RPC_A_VALUES])
735 blobmsg_for_each_attr(cur, tb[RPC_A_VALUES], rem)
739 ptr.option = blobmsg_name(cur);
741 if (!rpc_uci_verify_name(ptr.option))
744 err = UBUS_STATUS_INVALID_ARGUMENT;
749 if (rpc_uci_lookup(&ptr) || !ptr.s)
752 err = UBUS_STATUS_NOT_FOUND;
757 switch (blobmsg_type(cur))
759 case BLOBMSG_TYPE_ARRAY:
760 blobmsg_for_each_attr(elem, cur, rem2)
762 if (!rpc_uci_format_blob(elem, &ptr.value))
765 err = UBUS_STATUS_INVALID_ARGUMENT;
770 uci_add_list(cursor, &ptr);
776 if (!rpc_uci_format_blob(cur, &ptr.value))
779 err = UBUS_STATUS_INVALID_ARGUMENT;
783 uci_set(cursor, &ptr);
795 blob_buf_init(&buf, 0);
796 blobmsg_add_string(&buf, "section", ptr.section);
797 ubus_send_reply(ctx, req, buf.head);
801 uci_unload(cursor, p);
803 return err ? err : rpc_uci_status();
807 * Turn value from a blob attribute into uci set operation
808 * 1) if the blob is of type array, delete existing option (if any) and
809 * emit uci add_list operations for each element
810 * 2) if the blob is not an array but an option of type list exists,
811 * delete existing list and emit uci set operation for the blob value
812 * 3) in all other cases only emit a set operation if there is no existing
813 * option of if the existing options value differs from the blob value
816 rpc_uci_merge_set(struct blob_attr *opt, struct uci_ptr *ptr)
818 struct blob_attr *cur;
823 ptr->option = blobmsg_name(opt);
826 if (!rpc_uci_verify_name(ptr->option))
827 return UBUS_STATUS_INVALID_ARGUMENT;
829 if (rpc_uci_lookup(ptr) || !ptr->s)
830 return UBUS_STATUS_NOT_FOUND;
832 if (blobmsg_type(opt) == BLOBMSG_TYPE_ARRAY)
835 uci_delete(cursor, ptr);
837 rv = UBUS_STATUS_INVALID_ARGUMENT;
839 blobmsg_for_each_attr(cur, opt, rem)
841 if (!rpc_uci_format_blob(cur, &ptr->value))
844 uci_add_list(cursor, ptr);
850 else if (ptr->o && ptr->o->type == UCI_TYPE_LIST)
852 uci_delete(cursor, ptr);
854 if (!rpc_uci_format_blob(opt, &ptr->value))
855 return UBUS_STATUS_INVALID_ARGUMENT;
857 uci_set(cursor, ptr);
861 if (!rpc_uci_format_blob(opt, &ptr->value))
862 return UBUS_STATUS_INVALID_ARGUMENT;
864 if (!ptr->o || !ptr->o->v.string || strcmp(ptr->o->v.string, ptr->value))
865 uci_set(cursor, ptr);
872 rpc_uci_set(struct ubus_context *ctx, struct ubus_object *obj,
873 struct ubus_request_data *req, const char *method,
874 struct blob_attr *msg)
876 struct blob_attr *tb[__RPC_S_MAX];
877 struct blob_attr *cur;
878 struct uci_package *p = NULL;
879 struct uci_element *e;
880 struct uci_ptr ptr = { 0 };
881 int rem, rv, err = 0;
883 blobmsg_parse(rpc_uci_set_policy, __RPC_S_MAX, tb,
884 blob_data(msg), blob_len(msg));
886 if (!tb[RPC_S_CONFIG] || !tb[RPC_S_VALUES] ||
887 (!tb[RPC_S_SECTION] && !tb[RPC_S_TYPE] && !tb[RPC_S_MATCH]))
888 return UBUS_STATUS_INVALID_ARGUMENT;
890 if (!rpc_uci_write_access(tb[RPC_S_SESSION], tb[RPC_S_CONFIG]))
891 return UBUS_STATUS_PERMISSION_DENIED;
893 if (tb[RPC_S_SECTION] &&
894 !rpc_uci_verify_section(blobmsg_data(tb[RPC_S_SECTION])))
895 return UBUS_STATUS_INVALID_ARGUMENT;
897 ptr.package = blobmsg_data(tb[RPC_S_CONFIG]);
899 if (uci_load(cursor, ptr.package, &p))
900 return rpc_uci_status();
902 if (tb[RPC_S_SECTION])
904 ptr.section = blobmsg_data(tb[RPC_S_SECTION]);
905 blobmsg_for_each_attr(cur, tb[RPC_S_VALUES], rem)
907 rv = rpc_uci_merge_set(cur, &ptr);
915 uci_foreach_element(&p->sections, e)
917 if (!rpc_uci_match_section(uci_to_section(e),
918 tb[RPC_S_TYPE], tb[RPC_S_MATCH]))
922 ptr.section = e->name;
924 blobmsg_for_each_attr(cur, tb[RPC_S_VALUES], rem)
926 rv = rpc_uci_merge_set(cur, &ptr);
935 err = UBUS_STATUS_NOT_FOUND;
940 uci_unload(cursor, p);
942 return err ? err : rpc_uci_status();
946 * Delete option or section from uci specified by given blob attribute pointer
947 * 1) if the blob is of type array, delete any option named after each element
948 * 2) if the blob is of type string, delete the option named after its value
949 * 3) if the blob is NULL, delete entire section
952 rpc_uci_merge_delete(struct blob_attr *opt, struct uci_ptr *ptr)
954 struct blob_attr *cur;
957 if (rpc_uci_lookup(ptr) || !ptr->s)
958 return UBUS_STATUS_NOT_FOUND;
965 uci_delete(cursor, ptr);
968 else if (blobmsg_type(opt) == BLOBMSG_TYPE_ARRAY)
970 rv = UBUS_STATUS_NOT_FOUND;
972 blobmsg_for_each_attr(cur, opt, rem)
974 if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING)
978 ptr->option = blobmsg_data(cur);
980 if (rpc_uci_lookup(ptr) || !ptr->o)
983 uci_delete(cursor, ptr);
989 else if (blobmsg_type(opt) == BLOBMSG_TYPE_STRING)
992 ptr->option = blobmsg_data(opt);
994 if (rpc_uci_lookup(ptr) || !ptr->o)
995 return UBUS_STATUS_NOT_FOUND;
997 uci_delete(cursor, ptr);
1001 return UBUS_STATUS_INVALID_ARGUMENT;
1005 rpc_uci_delete(struct ubus_context *ctx, struct ubus_object *obj,
1006 struct ubus_request_data *req, const char *method,
1007 struct blob_attr *msg)
1009 struct blob_attr *tb[__RPC_D_MAX];
1010 struct uci_package *p = NULL;
1011 struct uci_element *e, *tmp;
1012 struct uci_ptr ptr = { 0 };
1015 blobmsg_parse(rpc_uci_delete_policy, __RPC_D_MAX, tb,
1016 blob_data(msg), blob_len(msg));
1018 if (!tb[RPC_D_CONFIG] ||
1019 (!tb[RPC_D_SECTION] && !tb[RPC_D_TYPE] && !tb[RPC_D_MATCH]))
1020 return UBUS_STATUS_INVALID_ARGUMENT;
1022 if (!rpc_uci_write_access(tb[RPC_D_SESSION], tb[RPC_D_CONFIG]))
1023 return UBUS_STATUS_PERMISSION_DENIED;
1025 if (tb[RPC_D_TYPE] &&
1026 !rpc_uci_verify_type(blobmsg_data(tb[RPC_D_TYPE])))
1027 return UBUS_STATUS_INVALID_ARGUMENT;
1029 if (tb[RPC_D_SECTION] &&
1030 !rpc_uci_verify_section(blobmsg_data(tb[RPC_D_SECTION])))
1031 return UBUS_STATUS_INVALID_ARGUMENT;
1033 ptr.package = blobmsg_data(tb[RPC_D_CONFIG]);
1035 if (uci_load(cursor, ptr.package, &p))
1036 return rpc_uci_status();
1038 if (tb[RPC_D_SECTION])
1040 ptr.section = blobmsg_data(tb[RPC_D_SECTION]);
1042 if (tb[RPC_D_OPTIONS])
1043 err = rpc_uci_merge_delete(tb[RPC_D_OPTIONS], &ptr);
1045 err = rpc_uci_merge_delete(tb[RPC_D_OPTION], &ptr);
1049 uci_foreach_element_safe(&p->sections, tmp, e)
1051 if (!rpc_uci_match_section(uci_to_section(e),
1052 tb[RPC_D_TYPE], tb[RPC_D_MATCH]))
1056 ptr.section = e->name;
1058 if (tb[RPC_D_OPTIONS])
1059 err = rpc_uci_merge_delete(tb[RPC_D_OPTIONS], &ptr);
1061 err = rpc_uci_merge_delete(tb[RPC_D_OPTION], &ptr);
1064 if (!err && !ptr.section)
1065 err = UBUS_STATUS_NOT_FOUND;
1069 uci_save(cursor, p);
1071 uci_unload(cursor, p);
1073 return err ? err : rpc_uci_status();
1077 rpc_uci_rename(struct ubus_context *ctx, struct ubus_object *obj,
1078 struct ubus_request_data *req, const char *method,
1079 struct blob_attr *msg)
1081 struct blob_attr *tb[__RPC_R_MAX];
1082 struct uci_package *p = NULL;
1083 struct uci_ptr ptr = { 0 };
1085 blobmsg_parse(rpc_uci_rename_policy, __RPC_R_MAX, tb,
1086 blob_data(msg), blob_len(msg));
1088 if (!tb[RPC_R_CONFIG] || !tb[RPC_R_SECTION] || !tb[RPC_R_NAME])
1089 return UBUS_STATUS_INVALID_ARGUMENT;
1091 if (!rpc_uci_write_access(tb[RPC_R_SESSION], tb[RPC_R_CONFIG]))
1092 return UBUS_STATUS_PERMISSION_DENIED;
1094 ptr.package = blobmsg_data(tb[RPC_R_CONFIG]);
1095 ptr.section = blobmsg_data(tb[RPC_R_SECTION]);
1096 ptr.value = blobmsg_data(tb[RPC_R_NAME]);
1098 if (!rpc_uci_verify_name(ptr.value))
1099 return UBUS_STATUS_INVALID_ARGUMENT;
1101 if (tb[RPC_R_OPTION])
1102 ptr.option = blobmsg_data(tb[RPC_R_OPTION]);
1104 if (uci_load(cursor, ptr.package, &p))
1105 return rpc_uci_status();
1107 if (uci_lookup_ptr(cursor, &ptr, NULL, true))
1110 if ((ptr.option && !ptr.o) || !ptr.s)
1112 cursor->err = UCI_ERR_NOTFOUND;
1116 if (uci_rename(cursor, &ptr))
1119 uci_save(cursor, p);
1122 uci_unload(cursor, p);
1124 return rpc_uci_status();
1128 rpc_uci_order(struct ubus_context *ctx, struct ubus_object *obj,
1129 struct ubus_request_data *req, const char *method,
1130 struct blob_attr *msg)
1132 struct blob_attr *tb[__RPC_O_MAX];
1133 struct blob_attr *cur;
1134 struct uci_package *p = NULL;
1135 struct uci_ptr ptr = { 0 };
1136 int rem, i = 0, err = 0;
1138 blobmsg_parse(rpc_uci_order_policy, __RPC_O_MAX, tb,
1139 blob_data(msg), blob_len(msg));
1141 if (!tb[RPC_O_CONFIG] || !tb[RPC_O_SECTIONS])
1142 return UBUS_STATUS_INVALID_ARGUMENT;
1144 if (!rpc_uci_write_access(tb[RPC_O_SESSION], tb[RPC_O_CONFIG]))
1145 return UBUS_STATUS_PERMISSION_DENIED;
1147 ptr.package = blobmsg_data(tb[RPC_O_CONFIG]);
1149 if (uci_load(cursor, ptr.package, &p))
1150 return rpc_uci_status();
1152 blobmsg_for_each_attr(cur, tb[RPC_O_SECTIONS], rem)
1154 if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING)
1157 err = UBUS_STATUS_INVALID_ARGUMENT;
1163 ptr.section = blobmsg_data(cur);
1165 if (uci_lookup_ptr(cursor, &ptr, NULL, true) || !ptr.s)
1168 err = UBUS_STATUS_NOT_FOUND;
1173 uci_reorder_section(cursor, ptr.s, i++);
1177 uci_save(cursor, p);
1179 uci_unload(cursor, p);
1181 return err ? err : rpc_uci_status();
1185 rpc_uci_dump_change(struct uci_delta *d)
1188 const char *types[] = {
1189 [UCI_CMD_REORDER] = "order",
1190 [UCI_CMD_REMOVE] = "remove",
1191 [UCI_CMD_RENAME] = "rename",
1192 [UCI_CMD_ADD] = "add",
1193 [UCI_CMD_LIST_ADD] = "list-add",
1194 [UCI_CMD_LIST_DEL] = "list-del",
1195 [UCI_CMD_CHANGE] = "set",
1201 c = blobmsg_open_array(&buf, NULL);
1203 blobmsg_add_string(&buf, NULL, types[d->cmd]);
1204 blobmsg_add_string(&buf, NULL, d->section);
1207 blobmsg_add_string(&buf, NULL, d->e.name);
1211 if (d->cmd == UCI_CMD_REORDER)
1212 blobmsg_add_u32(&buf, NULL, strtoul(d->value, NULL, 10));
1214 blobmsg_add_string(&buf, NULL, d->value);
1217 blobmsg_close_array(&buf, c);
1221 rpc_uci_changes(struct ubus_context *ctx, struct ubus_object *obj,
1222 struct ubus_request_data *req, const char *method,
1223 struct blob_attr *msg)
1225 struct blob_attr *tb[__RPC_C_MAX];
1226 struct uci_package *p = NULL;
1227 struct uci_element *e;
1232 blobmsg_parse(rpc_uci_config_policy, __RPC_C_MAX, tb,
1233 blob_data(msg), blob_len(msg));
1235 if (tb[RPC_C_CONFIG])
1237 if (!rpc_uci_read_access(tb[RPC_C_SESSION], tb[RPC_C_CONFIG]))
1238 return UBUS_STATUS_PERMISSION_DENIED;
1240 if (uci_load(cursor, blobmsg_data(tb[RPC_C_CONFIG]), &p))
1241 return rpc_uci_status();
1243 blob_buf_init(&buf, 0);
1244 c = blobmsg_open_array(&buf, "changes");
1246 uci_foreach_element(&p->saved_delta, e)
1247 rpc_uci_dump_change(uci_to_delta(e));
1249 blobmsg_close_array(&buf, c);
1251 uci_unload(cursor, p);
1253 ubus_send_reply(ctx, req, buf.head);
1255 return rpc_uci_status();
1258 rpc_uci_set_savedir(tb[RPC_C_SESSION]);
1260 if (uci_list_configs(cursor, &configs))
1261 return rpc_uci_status();
1263 blob_buf_init(&buf, 0);
1265 c = blobmsg_open_table(&buf, "changes");
1267 for (i = 0; configs[i]; i++)
1269 if (tb[RPC_C_SESSION] &&
1270 !rpc_session_access(blobmsg_data(tb[RPC_C_SESSION]), "uci",
1271 configs[i], "read"))
1274 if (uci_load(cursor, configs[i], &p))
1277 if (!uci_list_empty(&p->saved_delta))
1279 d = blobmsg_open_array(&buf, configs[i]);
1281 uci_foreach_element(&p->saved_delta, e)
1282 rpc_uci_dump_change(uci_to_delta(e));
1284 blobmsg_close_array(&buf, d);
1287 uci_unload(cursor, p);
1292 blobmsg_close_table(&buf, c);
1294 ubus_send_reply(ctx, req, buf.head);
1300 rpc_uci_trigger_event(struct ubus_context *ctx, const char *config)
1302 char *pkg = strdup(config);
1303 static struct blob_buf b;
1306 if (!ubus_lookup_id(ctx, "service", &id)) {
1309 blob_buf_init(&b, 0);
1310 blobmsg_add_string(&b, "type", "config.change");
1311 c = blobmsg_open_table(&b, "data");
1312 blobmsg_add_string(&b, "package", pkg);
1313 blobmsg_close_table(&b, c);
1314 ubus_invoke(ctx, id, "event", b.head, NULL, 0, 1000);
1320 rpc_uci_revert_commit(struct ubus_context *ctx, struct blob_attr *msg, bool commit)
1322 struct blob_attr *tb[__RPC_C_MAX];
1323 struct uci_package *p = NULL;
1324 struct uci_ptr ptr = { 0 };
1327 return UBUS_STATUS_PERMISSION_DENIED;
1329 blobmsg_parse(rpc_uci_config_policy, __RPC_C_MAX, tb,
1330 blob_data(msg), blob_len(msg));
1332 if (!tb[RPC_C_CONFIG])
1333 return UBUS_STATUS_INVALID_ARGUMENT;
1335 if (!rpc_uci_write_access(tb[RPC_C_SESSION], tb[RPC_C_CONFIG]))
1336 return UBUS_STATUS_PERMISSION_DENIED;
1338 ptr.package = blobmsg_data(tb[RPC_C_CONFIG]);
1342 if (!uci_load(cursor, ptr.package, &p))
1344 uci_commit(cursor, &p, false);
1345 uci_unload(cursor, p);
1346 rpc_uci_trigger_event(ctx, blobmsg_get_string(tb[RPC_C_CONFIG]));
1351 if (!uci_lookup_ptr(cursor, &ptr, NULL, true) && ptr.p)
1353 uci_revert(cursor, &ptr);
1354 uci_unload(cursor, ptr.p);
1358 return rpc_uci_status();
1362 rpc_uci_revert(struct ubus_context *ctx, struct ubus_object *obj,
1363 struct ubus_request_data *req, const char *method,
1364 struct blob_attr *msg)
1366 return rpc_uci_revert_commit(ctx, msg, false);
1370 rpc_uci_commit(struct ubus_context *ctx, struct ubus_object *obj,
1371 struct ubus_request_data *req, const char *method,
1372 struct blob_attr *msg)
1374 return rpc_uci_revert_commit(ctx, msg, true);
1378 rpc_uci_configs(struct ubus_context *ctx, struct ubus_object *obj,
1379 struct ubus_request_data *req, const char *method,
1380 struct blob_attr *msg)
1386 if (uci_list_configs(cursor, &configs))
1389 blob_buf_init(&buf, 0);
1391 c = blobmsg_open_array(&buf, "configs");
1393 for (i = 0; configs[i]; i++)
1394 blobmsg_add_string(&buf, NULL, configs[i]);
1398 blobmsg_close_array(&buf, c);
1400 ubus_send_reply(ctx, req, buf.head);
1403 return rpc_uci_status();
1408 * Remove given delta save directory (if any).
1411 rpc_uci_purge_dir(const char *path)
1416 char file[PATH_MAX];
1418 if (stat(path, &s) || !S_ISDIR(s.st_mode))
1421 if ((d = opendir(path)) != NULL)
1423 while ((e = readdir(d)) != NULL)
1425 snprintf(file, sizeof(file) - 1, "%s/%s", path, e->d_name);
1427 if (stat(file, &s) || !S_ISREG(s.st_mode))
1440 rpc_uci_apply_config(struct ubus_context *ctx, char *config)
1442 struct uci_package *p = NULL;
1444 if (!uci_load(cursor, config, &p)) {
1445 uci_commit(cursor, &p, false);
1446 uci_unload(cursor, p);
1448 rpc_uci_trigger_event(ctx, config);
1454 rpc_uci_copy_file(const char *src, const char *target, const char *file)
1459 snprintf(tmp, sizeof(tmp), "%s%s", src, file);
1460 in = fopen(tmp, "rb");
1461 snprintf(tmp, sizeof(tmp), "%s%s", target, file);
1462 out = fopen(tmp, "wb+");
1465 int len = fread(tmp, 1, sizeof(tmp), in);
1468 fwrite(tmp, 1, len, out);
1477 rpc_uci_apply_access(const char *sid, glob_t *gl)
1482 if (gl->gl_pathc < 3)
1483 return UBUS_STATUS_NO_DATA;
1485 for (i = 0; i < gl->gl_pathc; i++) {
1486 char *config = basename(gl->gl_pathv[i]);
1490 if (stat(gl->gl_pathv[i], &s) || !s.st_size)
1492 if (!rpc_session_access(sid, "uci", config, "write"))
1493 return UBUS_STATUS_PERMISSION_DENIED;
1498 return UBUS_STATUS_NO_DATA;
1504 rpc_uci_do_rollback(struct ubus_context *ctx, glob_t *gl)
1509 /* Test apply permission to see if the initiator session still exists.
1510 * If it does, restore the delta files as well, else just restore the
1511 * main configuration files. */
1513 ? rpc_uci_apply_access(apply_sid, gl) : UBUS_STATUS_NOT_FOUND;
1516 snprintf(tmp, sizeof(tmp), RPC_UCI_SAVEDIR_PREFIX "%s/", apply_sid);
1520 /* avoid merging unrelated uci changes when restoring old configs */
1521 rpc_uci_replace_savedir("/dev/null");
1523 for (i = 0; i < gl->gl_pathc; i++) {
1524 char *config = basename(gl->gl_pathv[i]);
1529 rpc_uci_copy_file(RPC_SNAPSHOT_FILES, RPC_UCI_DIR, config);
1530 rpc_uci_apply_config(ctx, config);
1535 rpc_uci_copy_file(RPC_SNAPSHOT_DELTA, tmp, config);
1538 rpc_uci_purge_dir(RPC_SNAPSHOT_FILES);
1539 rpc_uci_purge_dir(RPC_SNAPSHOT_DELTA);
1541 uloop_timeout_cancel(&apply_timer);
1542 memset(apply_sid, 0, sizeof(apply_sid));
1547 rpc_uci_apply_timeout(struct uloop_timeout *t)
1552 snprintf(tmp, sizeof(tmp), "%s/*", RPC_SNAPSHOT_FILES);
1553 if (glob(tmp, GLOB_PERIOD, NULL, &gl) < 0)
1556 rpc_uci_do_rollback(apply_ctx, &gl);
1562 rpc_uci_apply(struct ubus_context *ctx, struct ubus_object *obj,
1563 struct ubus_request_data *req, const char *method,
1564 struct blob_attr *msg)
1566 struct blob_attr *tb[__RPC_T_MAX];
1567 int timeout = RPC_APPLY_TIMEOUT;
1569 bool rollback = false;
1574 blobmsg_parse(rpc_uci_apply_policy, __RPC_T_MAX, tb,
1575 blob_data(msg), blob_len(msg));
1577 if (tb[RPC_T_ROLLBACK])
1578 rollback = blobmsg_get_bool(tb[RPC_T_ROLLBACK]);
1580 if (apply_sid[0] && rollback)
1581 return UBUS_STATUS_PERMISSION_DENIED;
1583 if (!tb[RPC_T_SESSION])
1584 return UBUS_STATUS_INVALID_ARGUMENT;
1586 sid = blobmsg_data(tb[RPC_T_SESSION]);
1588 if (tb[RPC_T_TIMEOUT])
1589 timeout = blobmsg_get_u32(tb[RPC_T_TIMEOUT]);
1591 rpc_uci_purge_dir(RPC_SNAPSHOT_FILES);
1592 rpc_uci_purge_dir(RPC_SNAPSHOT_DELTA);
1594 if (!apply_sid[0]) {
1595 rpc_uci_set_savedir(tb[RPC_T_SESSION]);
1597 mkdir(RPC_SNAPSHOT_FILES, 0700);
1598 mkdir(RPC_SNAPSHOT_DELTA, 0700);
1600 snprintf(tmp, sizeof(tmp), RPC_UCI_SAVEDIR_PREFIX "%s/*", sid);
1601 if (glob(tmp, GLOB_PERIOD, NULL, &gl) < 0)
1602 return UBUS_STATUS_NOT_FOUND;
1604 snprintf(tmp, sizeof(tmp), RPC_UCI_SAVEDIR_PREFIX "%s/", sid);
1606 ret = rpc_uci_apply_access(sid, &gl);
1612 /* copy SID early because rpc_uci_apply_config() will clobber buf */
1614 strncpy(apply_sid, sid, RPC_SID_LEN);
1616 for (i = 0; i < gl.gl_pathc; i++) {
1617 char *config = basename(gl.gl_pathv[i]);
1623 if (stat(gl.gl_pathv[i], &s) || !s.st_size)
1626 rpc_uci_copy_file(RPC_UCI_DIR, RPC_SNAPSHOT_FILES, config);
1627 rpc_uci_copy_file(tmp, RPC_SNAPSHOT_DELTA, config);
1628 rpc_uci_apply_config(ctx, config);
1634 apply_timer.cb = rpc_uci_apply_timeout;
1635 uloop_timeout_set(&apply_timer, timeout * 1000);
1644 rpc_uci_confirm(struct ubus_context *ctx, struct ubus_object *obj,
1645 struct ubus_request_data *req, const char *method,
1646 struct blob_attr *msg)
1648 struct blob_attr *tb[__RPC_B_MAX];
1651 blobmsg_parse(rpc_uci_rollback_policy, __RPC_B_MAX, tb,
1652 blob_data(msg), blob_len(msg));
1654 if (!tb[RPC_B_SESSION])
1655 return UBUS_STATUS_INVALID_ARGUMENT;
1657 sid = blobmsg_data(tb[RPC_B_SESSION]);
1660 return UBUS_STATUS_NO_DATA;
1662 if (strcmp(apply_sid, sid))
1663 return UBUS_STATUS_PERMISSION_DENIED;
1665 rpc_uci_purge_dir(RPC_SNAPSHOT_FILES);
1666 rpc_uci_purge_dir(RPC_SNAPSHOT_DELTA);
1668 uloop_timeout_cancel(&apply_timer);
1669 memset(apply_sid, 0, sizeof(apply_sid));
1676 rpc_uci_rollback(struct ubus_context *ctx, struct ubus_object *obj,
1677 struct ubus_request_data *req, const char *method,
1678 struct blob_attr *msg)
1680 struct blob_attr *tb[__RPC_B_MAX];
1685 blobmsg_parse(rpc_uci_rollback_policy, __RPC_B_MAX, tb,
1686 blob_data(msg), blob_len(msg));
1689 return UBUS_STATUS_NO_DATA;
1691 if (!tb[RPC_B_SESSION])
1692 return UBUS_STATUS_INVALID_ARGUMENT;
1694 sid = blobmsg_data(tb[RPC_B_SESSION]);
1696 if (strcmp(apply_sid, sid))
1697 return UBUS_STATUS_PERMISSION_DENIED;
1699 snprintf(tmp, sizeof(tmp), "%s/*", RPC_SNAPSHOT_FILES);
1700 if (glob(tmp, GLOB_PERIOD, NULL, &gl) < 0)
1701 return UBUS_STATUS_NOT_FOUND;
1703 rpc_uci_do_rollback(ctx, &gl);
1711 rpc_uci_reload(struct ubus_context *ctx, struct ubus_object *obj,
1712 struct ubus_request_data *req, const char *method,
1713 struct blob_attr *msg)
1715 char * const cmd[2] = { "/sbin/reload_config", NULL };
1718 /* wait for the RPC call to complete */
1720 return execv(cmd[0], cmd);
1727 * Session destroy callback to purge associated delta directory.
1730 rpc_uci_purge_savedir_cb(struct rpc_session *ses, void *priv)
1732 char path[PATH_MAX];
1734 snprintf(path, sizeof(path) - 1, RPC_UCI_SAVEDIR_PREFIX "%s", ses->id);
1735 rpc_uci_purge_dir(path);
1739 * Removes all delta directories which match the RPC_UCI_SAVEDIR_PREFIX.
1740 * This is used to clean up garbage when starting rpcd.
1742 void rpc_uci_purge_savedirs(void)
1747 if (!glob(RPC_UCI_SAVEDIR_PREFIX "*", 0, NULL, &gl))
1749 for (i = 0; i < gl.gl_pathc; i++)
1750 rpc_uci_purge_dir(gl.gl_pathv[i]);
1756 int rpc_uci_api_init(struct ubus_context *ctx)
1758 static const struct ubus_method uci_methods[] = {
1759 { .name = "configs", .handler = rpc_uci_configs },
1760 UBUS_METHOD("get", rpc_uci_get, rpc_uci_get_policy),
1761 UBUS_METHOD("state", rpc_uci_state, rpc_uci_get_policy),
1762 UBUS_METHOD("add", rpc_uci_add, rpc_uci_add_policy),
1763 UBUS_METHOD("set", rpc_uci_set, rpc_uci_set_policy),
1764 UBUS_METHOD("delete", rpc_uci_delete, rpc_uci_delete_policy),
1765 UBUS_METHOD("rename", rpc_uci_rename, rpc_uci_rename_policy),
1766 UBUS_METHOD("order", rpc_uci_order, rpc_uci_order_policy),
1767 UBUS_METHOD("changes", rpc_uci_changes, rpc_uci_config_policy),
1768 UBUS_METHOD("revert", rpc_uci_revert, rpc_uci_config_policy),
1769 UBUS_METHOD("commit", rpc_uci_commit, rpc_uci_config_policy),
1770 UBUS_METHOD("apply", rpc_uci_apply, rpc_uci_apply_policy),
1771 UBUS_METHOD("confirm", rpc_uci_confirm, rpc_uci_rollback_policy),
1772 UBUS_METHOD("rollback", rpc_uci_rollback, rpc_uci_rollback_policy),
1773 UBUS_METHOD_NOARG("reload_config", rpc_uci_reload),
1776 static struct ubus_object_type uci_type =
1777 UBUS_OBJECT_TYPE("luci-rpc-uci", uci_methods);
1779 static struct ubus_object obj = {
1782 .methods = uci_methods,
1783 .n_methods = ARRAY_SIZE(uci_methods),
1786 static struct rpc_session_cb cb = {
1787 .cb = rpc_uci_purge_savedir_cb
1790 cursor = uci_alloc_context();
1793 return UBUS_STATUS_UNKNOWN_ERROR;
1795 rpc_session_destroy_cb(&cb);
1797 return ubus_add_object(ctx, &obj);