···
use anyhow::{anyhow, bail, Context, Result};
blocking::{stdintf::org_freedesktop_dbus::Properties, LocalConnection, Proxy},
+
strings::{BusName, Interface, Member},
···
+
#![allow(non_upper_case_globals)]
+
#![allow(non_camel_case_types)]
+
#![allow(non_snake_case)]
+
include!(concat!(env!("OUT_DIR"), "/fdo_dbus.rs"));
#![allow(non_upper_case_globals)]
#![allow(non_camel_case_types)]
···
include!(concat!(env!("OUT_DIR"), "/logind_manager.rs"));
+
fdo_dbus::OrgFreedesktopDBusNameOwnerChanged, systemd_manager::OrgFreedesktopSystemd1Manager,
logind_manager::OrgFreedesktopLogin1Manager,
···
+
fn fdo_dbus_proxy(conn: &LocalConnection) -> Proxy<'_, &LocalConnection> {
+
"org.freedesktop.DBus",
+
"/org/freedesktop/DBus",
+
Duration::from_millis(500),
+
fn systemd1_proxy(conn: &LocalConnection) -> Proxy<'_, &LocalConnection> {
+
"org.freedesktop.systemd1",
+
"/org/freedesktop/systemd1",
+
Duration::from_millis(10000),
+
fn login1_proxy(conn: &LocalConnection) -> Proxy<'_, &LocalConnection> {
+
"org.freedesktop.login1",
+
"/org/freedesktop/login1",
+
Duration::from_millis(10000),
···
+
fn reexecute_systemd_manager(
+
dbus_conn: &LocalConnection,
+
fdo_dbus: &Proxy<'_, &LocalConnection>,
+
) -> anyhow::Result<()> {
+
let reexecute_done = Rc::new(RefCell::new(false));
+
let _reexecute_done = reexecute_done.clone();
+
let owner_changed_token = fdo_dbus
+
move |signal: OrgFreedesktopDBusNameOwnerChanged, _: &LocalConnection, _: &Message| {
+
if signal.name.as_str() == "org.freedesktop.systemd1" {
+
*_reexecute_done.borrow_mut() = true;
+
.context("Failed to add signal match for DBus name owner changes")?;
+
let bus_name = BusName::from("org.freedesktop.systemd1");
+
let object_path = dbus::Path::from("/org/freedesktop/systemd1");
+
let interface = Interface::new("org.freedesktop.systemd1.Manager")
+
.expect("the org.freedesktop.systemd1.Manager interface name should be valid");
+
let method_name = Member::new("Reexecute").expect("the Reexecute method name should be valid");
+
// Systemd does not reply to the Reexecute method.
+
let _serial = dbus_conn
+
.send(Message::method_call(
+
.map_err(|_err| anyhow!("Failed to send org.freedesktop.systemd1.Manager.Reexecute"))?;
+
log::debug!("waiting for systemd to finish reexecuting");
+
while !*reexecute_done.borrow() {
+
.process(Duration::from_secs(500))
+
.context("Failed to process dbus messages")?;
+
.remove_match(owner_changed_token)
+
.context("Failed to remove jobs token")?;
/// Performs switch-to-configuration functionality for a single non-root user
fn do_user_switch(parent_exe: String) -> anyhow::Result<()> {
if Path::new(&parent_exe)
···
let dbus_conn = LocalConnection::new_session().context("Failed to open dbus connection")?;
+
let fdo_dbus = fdo_dbus_proxy(&dbus_conn);
+
let systemd = systemd1_proxy(&dbus_conn);
+
reexecute_systemd_manager(&dbus_conn, &fdo_dbus)?;
let nixos_activation_done = Rc::new(RefCell::new(false));
let _nixos_activation_done = nixos_activation_done.clone();
···
.context("Failed to add signal match for systemd removed jobs")?;
.restart_unit("nixos-activation.service", "replace")
···
let mut units_to_reload = map_from_list_file(RELOAD_LIST_FILE);
let dbus_conn = LocalConnection::new_system().context("Failed to open dbus connection")?;
+
let fdo_dbus = fdo_dbus_proxy(&dbus_conn);
+
let systemd = systemd1_proxy(&dbus_conn);
+
let logind = login1_proxy(&dbus_conn);
let submitted_jobs = Rc::new(RefCell::new(HashMap::new()));
let finished_jobs = Rc::new(RefCell::new(HashMap::new()));
···
// just in case the new one has trouble communicating with the running pid 1.
eprintln!("restarting systemd...");
+
reexecute_systemd_manager(&dbus_conn, &fdo_dbus)?;
log::debug!("waiting for systemd restart to finish");
while !*systemd_reload_status.borrow() {