Blame SOURCES/0001-lib-save-os-when-creating-user.patch

c6c770
From 5124220f12a157ff285072a4f786db2c94c3ca8a Mon Sep 17 00:00:00 2001
c6c770
From: Ray Strode <rstrode@redhat.com>
c6c770
Date: Thu, 14 Jan 2021 15:07:34 -0500
c6c770
Subject: [PATCH] lib: save os when creating user
c6c770
c6c770
In order to identify that a user has upgraded from rhel 7 to
c6c770
rhel 8, we need to know what os they were using when created.
c6c770
c6c770
This commit saves that information using a red hat specific
c6c770
extension to accountsservice.
c6c770
---
c6c770
 .../com.redhat.AccountsServiceUser.System.xml |  10 ++
c6c770
 data/meson.build                              |   1 +
c6c770
 meson.build                                   |   1 +
c6c770
 meson_post_install.py                         |  15 +++
c6c770
 src/libaccountsservice/act-user-manager.c     | 123 ++++++++++++++++++
c6c770
 src/libaccountsservice/meson.build            |   7 +
c6c770
 6 files changed, 157 insertions(+)
c6c770
 create mode 100644 data/com.redhat.AccountsServiceUser.System.xml
c6c770
c6c770
diff --git a/data/com.redhat.AccountsServiceUser.System.xml b/data/com.redhat.AccountsServiceUser.System.xml
c6c770
new file mode 100644
c6c770
index 0000000..67f5f30
c6c770
--- /dev/null
c6c770
+++ b/data/com.redhat.AccountsServiceUser.System.xml
c6c770
@@ -0,0 +1,10 @@
c6c770
+<node>
c6c770
+  <interface name="com.redhat.AccountsServiceUser.System">
c6c770
+
c6c770
+    <annotation name="org.freedesktop.Accounts.VendorExtension" value="true"/>
c6c770
+
c6c770
+    <property name="id" type="s" access="readwrite"/>
c6c770
+    <property name="version-id" type="s" access="readwrite"/>
c6c770
+
c6c770
+  </interface>
c6c770
+</node>
c6c770
diff --git a/data/meson.build b/data/meson.build
c6c770
index 4987937..2dc57c2 100644
c6c770
--- a/data/meson.build
c6c770
+++ b/data/meson.build
c6c770
@@ -1,33 +1,34 @@
c6c770
 ifaces = files(
c6c770
   act_namespace + '.xml',
c6c770
   act_namespace + '.User.xml',
c6c770
+  'com.redhat.AccountsServiceUser.System.xml',
c6c770
 )
c6c770
 
c6c770
 install_data(
c6c770
   ifaces,
c6c770
   install_dir: dbus_ifaces_dir,
c6c770
 )
c6c770
 
c6c770
 install_data(
c6c770
   act_namespace + '.conf',
c6c770
   install_dir: dbus_conf_dir,
c6c770
 )
c6c770
 
c6c770
 service_conf = configuration_data()
c6c770
 service_conf.set('libexecdir', act_libexecdir)
c6c770
 
c6c770
 service = act_namespace + '.service'
c6c770
 
c6c770
 configure_file(
c6c770
   input: service + '.in',
c6c770
   output: service,
c6c770
   configuration: service_conf,
c6c770
   install: true,
c6c770
   install_dir: dbus_sys_dir,
c6c770
 )
c6c770
 
c6c770
 policy = act_namespace.to_lower() + '.policy'
c6c770
 
c6c770
 i18n.merge_file(
c6c770
   policy,
c6c770
   input: policy + '.in',
c6c770
diff --git a/meson.build b/meson.build
c6c770
index 4465a26..e37c451 100644
c6c770
--- a/meson.build
c6c770
+++ b/meson.build
c6c770
@@ -174,38 +174,39 @@ assert(not enable_systemd or not enable_elogind, 'systemd and elogind support re
c6c770
 if enable_systemd
c6c770
   logind_dep = dependency('libsystemd', version: '>= 186')
c6c770
 endif
c6c770
 
c6c770
 if enable_elogind
c6c770
   logind_dep = dependency('libelogind', version: '>= 229.4')
c6c770
 endif
c6c770
 config_h.set('WITH_SYSTEMD', enable_systemd or enable_elogind)
c6c770
 
c6c770
 subdir('data')
c6c770
 subdir('src')
c6c770
 subdir('po')
c6c770
 
c6c770
 enable_docbook = get_option('docbook')
c6c770
 if enable_docbook
c6c770
   subdir('doc/dbus')
c6c770
 endif
c6c770
 
c6c770
 if get_option('gtk_doc')
c6c770
   subdir('doc/libaccountsservice')
c6c770
 endif
c6c770
 
c6c770
 configure_file(
c6c770
   output: 'config.h',
c6c770
   configuration: config_h,
c6c770
 )
c6c770
 
c6c770
 meson.add_install_script(
c6c770
   'meson_post_install.py',
c6c770
   act_localstatedir,
c6c770
+  act_datadir,
c6c770
 )
c6c770
 
c6c770
 output = '\n' + meson.project_name() + ' was configured with the following options:\n'
c6c770
 output += '** DocBook documentation build: ' + enable_docbook.to_string() + '\n'
c6c770
 output += '** Administrator group: ' + admin_group + '\n'
c6c770
 output += '** Extra administrator groups: ' + extra_admin_groups + '\n'
c6c770
 output += '** GDM configuration: ' + gdm_conf_file
c6c770
 message(output)
c6c770
diff --git a/meson_post_install.py b/meson_post_install.py
c6c770
index 5cc2dc4..e1d5a71 100644
c6c770
--- a/meson_post_install.py
c6c770
+++ b/meson_post_install.py
c6c770
@@ -1,18 +1,33 @@
c6c770
 #!/usr/bin/env python3
c6c770
 
c6c770
 import os
c6c770
 import sys
c6c770
 
c6c770
 destdir = os.environ.get('DESTDIR', '')
c6c770
 localstatedir = os.path.normpath(destdir + os.sep + sys.argv[1])
c6c770
+datadir = os.path.normpath(destdir + os.sep + sys.argv[2])
c6c770
+interfacedir = os.path.join(datadir, 'accountsservice', 'interfaces')
c6c770
 
c6c770
 # FIXME: meson will not track the creation of these directories
c6c770
 #        https://github.com/mesonbuild/meson/blob/master/mesonbuild/scripts/uninstall.py#L39
c6c770
 dst_dirs = [
c6c770
   (os.path.join(localstatedir, 'lib', 'AccountsService', 'icons'), 0o775),
c6c770
   (os.path.join(localstatedir, 'lib', 'AccountsService', 'users'), 0o700),
c6c770
+  (interfacedir, 0o775),
c6c770
 ]
c6c770
 
c6c770
 for (dst_dir, dst_dir_mode) in dst_dirs:
c6c770
   if not os.path.exists(dst_dir):
c6c770
     os.makedirs(dst_dir, mode=dst_dir_mode)
c6c770
+
c6c770
+interface_files = [
c6c770
+  'com.redhat.AccountsServiceUser.System.xml',
c6c770
+]
c6c770
+
c6c770
+for interface_file in interface_files:
c6c770
+    src_path = os.path.join('../../dbus-1/interfaces', interface_file)
c6c770
+    dst_path = os.path.join(interfacedir, interface_file)
c6c770
+    if not os.path.exists(dst_path):
c6c770
+        os.symlink(src_path, dst_path)
c6c770
+
c6c770
+
c6c770
diff --git a/src/libaccountsservice/act-user-manager.c b/src/libaccountsservice/act-user-manager.c
c6c770
index 1b5298d..f4598c4 100644
c6c770
--- a/src/libaccountsservice/act-user-manager.c
c6c770
+++ b/src/libaccountsservice/act-user-manager.c
c6c770
@@ -27,60 +27,61 @@
c6c770
 #include <string.h>
c6c770
 #include <signal.h>
c6c770
 #include <errno.h>
c6c770
 #include <sys/stat.h>
c6c770
 #include <sys/types.h>
c6c770
 
c6c770
 #ifdef HAVE_PATHS_H
c6c770
 #include <paths.h>
c6c770
 #endif /* HAVE_PATHS_H */
c6c770
 
c6c770
 #include <glib.h>
c6c770
 #include <glib/gi18n-lib.h>
c6c770
 #include <glib/gstdio.h>
c6c770
 #include <glib-object.h>
c6c770
 #include <gio/gio.h>
c6c770
 #include <gio/gunixinputstream.h>
c6c770
 
c6c770
 #ifdef WITH_SYSTEMD
c6c770
 #include <systemd/sd-login.h>
c6c770
 
c6c770
 /* check if logind is running */
c6c770
 #define LOGIND_RUNNING() (access("/run/systemd/seats/", F_OK) >= 0)
c6c770
 #endif
c6c770
 
c6c770
 #include "act-user-manager.h"
c6c770
 #include "act-user-private.h"
c6c770
 #include "accounts-generated.h"
c6c770
 #include "ck-manager-generated.h"
c6c770
 #include "ck-seat-generated.h"
c6c770
 #include "ck-session-generated.h"
c6c770
+#include "com.redhat.AccountsServiceUser.System.h"
c6c770
 
c6c770
 /**
c6c770
  * SECTION:act-user-manager
c6c770
  * @title: ActUserManager
c6c770
  * @short_description: manages ActUser objects
c6c770
  *
c6c770
  * ActUserManager is a manager object that gives access to user
c6c770
  * creation, deletion, enumeration, etc.
c6c770
  *
c6c770
  * There is typically a singleton ActUserManager object, which
c6c770
  * can be obtained by act_user_manager_get_default().
c6c770
  */
c6c770
 
c6c770
 /**
c6c770
  * ActUserManager:
c6c770
  *
c6c770
  * A user manager object.
c6c770
  */
c6c770
 
c6c770
 /**
c6c770
  * ACT_USER_MANAGER_ERROR:
c6c770
  *
c6c770
  * The GError domain for #ActUserManagerError errors
c6c770
  */
c6c770
 
c6c770
 /**
c6c770
  * ActUserManagerError:
c6c770
  * @ACT_USER_MANAGER_ERROR_FAILED: Generic failure
c6c770
  * @ACT_USER_MANAGER_ERROR_USER_EXISTS: The user already exists
c6c770
  * @ACT_USER_MANAGER_ERROR_USER_DOES_NOT_EXIST: The user does not exist
c6c770
@@ -165,60 +166,63 @@ typedef struct
c6c770
         ActUser                    *user;
c6c770
         ActUserManagerFetchUserRequestType type;
c6c770
         union {
c6c770
                 char               *username;
c6c770
                 uid_t               uid;
c6c770
         };
c6c770
         char                       *object_path;
c6c770
         char                       *description;
c6c770
 } ActUserManagerFetchUserRequest;
c6c770
 
c6c770
 typedef struct
c6c770
 {
c6c770
         GHashTable            *normal_users_by_name;
c6c770
         GHashTable            *system_users_by_name;
c6c770
         GHashTable            *users_by_object_path;
c6c770
         GHashTable            *sessions;
c6c770
         GDBusConnection       *connection;
c6c770
         AccountsAccounts      *accounts_proxy;
c6c770
         ConsoleKitManager     *ck_manager_proxy;
c6c770
 
c6c770
         ActUserManagerSeat     seat;
c6c770
 
c6c770
         GSList                *new_sessions;
c6c770
         GSList                *new_users;
c6c770
         GSList                *new_users_inhibiting_load;
c6c770
         GSList                *fetch_user_requests;
c6c770
 
c6c770
         GSList                *exclude_usernames;
c6c770
         GSList                *include_usernames;
c6c770
 
c6c770
+        char                  *os_id;
c6c770
+        char                  *os_version_id;
c6c770
+
c6c770
         guint                  load_id;
c6c770
 
c6c770
         gboolean               is_loaded;
c6c770
         gboolean               has_multiple_users;
c6c770
         gboolean               getting_sessions;
c6c770
         gboolean               list_cached_users_done;
c6c770
 } ActUserManagerPrivate;
c6c770
 
c6c770
 enum {
c6c770
         PROP_0,
c6c770
         PROP_INCLUDE_USERNAMES_LIST,
c6c770
         PROP_EXCLUDE_USERNAMES_LIST,
c6c770
         PROP_IS_LOADED,
c6c770
         PROP_HAS_MULTIPLE_USERS
c6c770
 };
c6c770
 
c6c770
 enum {
c6c770
         USER_ADDED,
c6c770
         USER_REMOVED,
c6c770
         USER_IS_LOGGED_IN_CHANGED,
c6c770
         USER_CHANGED,
c6c770
         LAST_SIGNAL
c6c770
 };
c6c770
 
c6c770
 static guint signals [LAST_SIGNAL] = { 0, };
c6c770
 
c6c770
 static void     act_user_manager_class_init (ActUserManagerClass *klass);
c6c770
 static void     act_user_manager_init       (ActUserManager      *user_manager);
c6c770
 static void     act_user_manager_finalize   (GObject             *object);
c6c770
 
c6c770
@@ -2942,100 +2946,173 @@ ensure_accounts_proxy (ActUserManager *manager)
c6c770
                                                                  G_DBUS_PROXY_FLAGS_NONE,
c6c770
                                                                  ACCOUNTS_NAME,
c6c770
                                                                  ACCOUNTS_PATH,
c6c770
                                                                  NULL,
c6c770
                                                                  &error);
c6c770
         if (error != NULL) {
c6c770
                 g_debug ("ActUserManager: getting account proxy failed: %s", error->message);
c6c770
                 return FALSE;
c6c770
         }
c6c770
 
c6c770
         g_dbus_proxy_set_default_timeout (G_DBUS_PROXY (priv->accounts_proxy), G_MAXINT);
c6c770
 
c6c770
         g_object_bind_property (G_OBJECT (priv->accounts_proxy),
c6c770
                                 "has-multiple-users",
c6c770
                                 G_OBJECT (manager),
c6c770
                                 "has-multiple-users",
c6c770
                                 G_BINDING_SYNC_CREATE);
c6c770
 
c6c770
         g_signal_connect (priv->accounts_proxy,
c6c770
                           "user-added",
c6c770
                           G_CALLBACK (on_new_user_in_accounts_service),
c6c770
                           manager);
c6c770
         g_signal_connect (priv->accounts_proxy,
c6c770
                           "user-deleted",
c6c770
                           G_CALLBACK (on_user_removed_in_accounts_service),
c6c770
                           manager);
c6c770
 
c6c770
         return TRUE;
c6c770
 }
c6c770
 
c6c770
+static inline gboolean
c6c770
+is_valid_char (gchar    c,
c6c770
+               gboolean first)
c6c770
+{
c6c770
+        return (!first && g_ascii_isdigit (c)) ||
c6c770
+                c == '_' ||
c6c770
+                g_ascii_isalpha (c);
c6c770
+}
c6c770
+
c6c770
+static void
c6c770
+load_os_release (ActUserManager *manager)
c6c770
+{
c6c770
+        ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
+        g_autoptr(GFile) file = NULL;
c6c770
+        g_autoptr(GError) error = NULL;
c6c770
+        g_autofree char *contents = NULL;
c6c770
+        g_auto(GStrv) lines = NULL;
c6c770
+        size_t i;
c6c770
+
c6c770
+        file = g_file_new_for_path ("/etc/os-release");
c6c770
+
c6c770
+        if (!g_file_load_contents (file, NULL, &contents, NULL, NULL, &error)) {
c6c770
+                g_debug ("ActUserManager: couldn't load /etc/os-release: %s", error->message);
c6c770
+                return;
c6c770
+        }
c6c770
+
c6c770
+        lines = g_strsplit (contents, "\n", -1);
c6c770
+        for (i = 0; lines[i] != NULL; i++) {
c6c770
+                char *p, *name, *name_end, *value, *value_end;
c6c770
+
c6c770
+                p = lines[i];
c6c770
+
c6c770
+                while (g_ascii_isspace (*p))
c6c770
+                        p++;
c6c770
+
c6c770
+                if (*p == '#' || *p == '\0')
c6c770
+                        continue;
c6c770
+                name = p;
c6c770
+                while (is_valid_char (*p, p == name))
c6c770
+                        p++;
c6c770
+                name_end = p;
c6c770
+                while (g_ascii_isspace (*p))
c6c770
+                        p++;
c6c770
+                if (name == name_end || *p != '=') {
c6c770
+                        continue;
c6c770
+                }
c6c770
+                *name_end = '\0';
c6c770
+
c6c770
+                p++;
c6c770
+
c6c770
+                while (g_ascii_isspace (*p))
c6c770
+                        p++;
c6c770
+
c6c770
+                value = p;
c6c770
+                value_end = value + strlen (value) - 1;
c6c770
+
c6c770
+                if (value != value_end && *value == '"' && *value_end == '"') {
c6c770
+                        value++;
c6c770
+                        *value_end = '\0';
c6c770
+                }
c6c770
+
c6c770
+                if (strcmp (name, "ID") == 0) {
c6c770
+                        g_debug ("ActUserManager: system OS is '%s'", value);
c6c770
+                        priv->os_id = g_strdup (value);
c6c770
+                } else if (strcmp (name, "VERSION_ID") == 0) {
c6c770
+                        g_debug ("ActUserManager: system OS version is '%s'", value);
c6c770
+                        priv->os_version_id = g_strdup (value);
c6c770
+                }
c6c770
+        }
c6c770
+}
c6c770
+
c6c770
 static void
c6c770
 act_user_manager_init (ActUserManager *manager)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
         g_autoptr(GError) error = NULL;
c6c770
 
c6c770
         act_user_manager_error_quark (); /* register dbus errors */
c6c770
 
c6c770
         /* sessions */
c6c770
         priv->sessions = g_hash_table_new_full (g_str_hash,
c6c770
                                                 g_str_equal,
c6c770
                                                 g_free,
c6c770
                                                 g_object_unref);
c6c770
 
c6c770
         /* users */
c6c770
         priv->normal_users_by_name = g_hash_table_new_full (g_str_hash,
c6c770
                                                             g_str_equal,
c6c770
                                                             g_free,
c6c770
                                                             g_object_unref);
c6c770
         priv->system_users_by_name = g_hash_table_new_full (g_str_hash,
c6c770
                                                             g_str_equal,
c6c770
                                                             g_free,
c6c770
                                                             g_object_unref);
c6c770
         priv->users_by_object_path = g_hash_table_new_full (g_str_hash,
c6c770
                                                             g_str_equal,
c6c770
                                                             NULL,
c6c770
                                                             g_object_unref);
c6c770
 
c6c770
         priv->connection = g_bus_get_sync (G_BUS_TYPE_SYSTEM, NULL, &error);
c6c770
         if (priv->connection == NULL) {
c6c770
                 if (error != NULL) {
c6c770
                         g_warning ("Failed to connect to the D-Bus daemon: %s", error->message);
c6c770
                 } else {
c6c770
                         g_warning ("Failed to connect to the D-Bus daemon");
c6c770
                 }
c6c770
                 return;
c6c770
         }
c6c770
 
c6c770
         ensure_accounts_proxy (manager);
c6c770
 
c6c770
+        load_os_release (manager);
c6c770
+
c6c770
         priv->seat.state = ACT_USER_MANAGER_SEAT_STATE_UNLOADED;
c6c770
 }
c6c770
 
c6c770
 static void
c6c770
 act_user_manager_finalize (GObject *object)
c6c770
 {
c6c770
         ActUserManager *manager = ACT_USER_MANAGER (object);
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
         GSList         *node;
c6c770
 
c6c770
         g_debug ("ActUserManager: finalizing user manager");
c6c770
 
c6c770
         g_slist_foreach (priv->new_sessions,
c6c770
                          (GFunc) unload_new_session, NULL);
c6c770
         g_slist_free (priv->new_sessions);
c6c770
 
c6c770
         g_slist_foreach (priv->fetch_user_requests,
c6c770
                          (GFunc) free_fetch_user_request, NULL);
c6c770
         g_slist_free (priv->fetch_user_requests);
c6c770
 
c6c770
         g_slist_free (priv->new_users_inhibiting_load);
c6c770
 
c6c770
         node = priv->new_users;
c6c770
         while (node != NULL) {
c6c770
                 ActUser *user;
c6c770
                 GSList  *next_node;
c6c770
 
c6c770
                 user = ACT_USER (node->data);
c6c770
                 next_node = node->next;
c6c770
 
c6c770
@@ -3071,143 +3148,181 @@ act_user_manager_finalize (GObject *object)
c6c770
 
c6c770
 #ifdef WITH_SYSTEMD
c6c770
         if (priv->seat.session_monitor != NULL) {
c6c770
                 sd_login_monitor_unref (priv->seat.session_monitor);
c6c770
         }
c6c770
 
c6c770
         if (priv->seat.session_monitor_stream != NULL) {
c6c770
                 g_object_unref (priv->seat.session_monitor_stream);
c6c770
         }
c6c770
 
c6c770
         if (priv->seat.session_monitor_source_id != 0) {
c6c770
                 g_source_remove (priv->seat.session_monitor_source_id);
c6c770
         }
c6c770
 #endif
c6c770
 
c6c770
         if (priv->accounts_proxy != NULL) {
c6c770
                 g_object_unref (priv->accounts_proxy);
c6c770
         }
c6c770
 
c6c770
         if (priv->load_id > 0) {
c6c770
                 g_source_remove (priv->load_id);
c6c770
                 priv->load_id = 0;
c6c770
         }
c6c770
 
c6c770
         g_hash_table_destroy (priv->sessions);
c6c770
 
c6c770
         g_hash_table_destroy (priv->normal_users_by_name);
c6c770
         g_hash_table_destroy (priv->system_users_by_name);
c6c770
         g_hash_table_destroy (priv->users_by_object_path);
c6c770
 
c6c770
+        g_free (priv->os_id);
c6c770
+        g_free (priv->os_version_id);
c6c770
+
c6c770
         G_OBJECT_CLASS (act_user_manager_parent_class)->finalize (object);
c6c770
 }
c6c770
 
c6c770
 /**
c6c770
  * act_user_manager_get_default:
c6c770
  *
c6c770
  * Returns the user manager singleton instance.  Calling this function will
c6c770
  * automatically being loading the user list if it isn't loaded already.
c6c770
  * The #ActUserManager:is-loaded property will be set to %TRUE when the users
c6c770
  * are finished loading and then act_user_manager_list_users() can be called.
c6c770
  *
c6c770
  * Returns: (transfer none): user manager object
c6c770
  */
c6c770
 ActUserManager *
c6c770
 act_user_manager_get_default (void)
c6c770
 {
c6c770
         if (user_manager_object == NULL) {
c6c770
                 user_manager_object = g_object_new (ACT_TYPE_USER_MANAGER, NULL);
c6c770
                 g_object_add_weak_pointer (user_manager_object,
c6c770
                                            (gpointer *) &user_manager_object);
c6c770
                 act_user_manager_queue_load (user_manager_object);
c6c770
         }
c6c770
 
c6c770
         return ACT_USER_MANAGER (user_manager_object);
c6c770
 }
c6c770
 
c6c770
 /**
c6c770
  * act_user_manager_no_service:
c6c770
  * @manager: a #ActUserManager
c6c770
  *
c6c770
  * Check whether or not the accounts service is running.
c6c770
  *
c6c770
  * Returns: whether or not accounts service is running
c6c770
  */
c6c770
 gboolean
c6c770
 act_user_manager_no_service (ActUserManager *manager)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
         return priv->accounts_proxy == NULL;
c6c770
 }
c6c770
 
c6c770
+static void
c6c770
+save_system_info (ActUserManager *manager,
c6c770
+                  const char     *user_path)
c6c770
+{
c6c770
+        ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
+        ActUserSystem *user_system_proxy = NULL;
c6c770
+        g_autoptr(GError) error = NULL;
c6c770
+
c6c770
+        if (priv->os_id == NULL && priv->os_version_id == NULL)
c6c770
+                return;
c6c770
+
c6c770
+        user_system_proxy = act_user_system_proxy_new_sync (priv->connection,
c6c770
+                                                            G_DBUS_PROXY_FLAGS_NONE,
c6c770
+                                                            ACCOUNTS_NAME,
c6c770
+                                                            user_path,
c6c770
+                                                            NULL,
c6c770
+                                                            &error);
c6c770
+        if (user_system_proxy != NULL) {
c6c770
+                if (priv->os_id != NULL)
c6c770
+                        act_user_system_set_id (user_system_proxy, priv->os_id);
c6c770
+
c6c770
+                if (priv->os_version_id != NULL)
c6c770
+                        act_user_system_set_version_id (user_system_proxy, priv->os_version_id);
c6c770
+        } else {
c6c770
+                /* probably means accountsservice and lib are out of sync */
c6c770
+                g_debug ("ActUserManager: failed to create user system proxy: %s",
c6c770
+                         error? error->message: "");
c6c770
+                g_clear_error (&error);
c6c770
+        }
c6c770
+
c6c770
+        g_clear_object (&user_system_proxy);
c6c770
+}
c6c770
+
c6c770
 /**
c6c770
  * act_user_manager_create_user:
c6c770
  * @manager: a #ActUserManager
c6c770
  * @username: a unix user name
c6c770
  * @fullname: a unix GECOS value
c6c770
  * @accounttype: a #ActUserAccountType
c6c770
  * @error: a #GError
c6c770
  *
c6c770
  * Creates a user account on the system.
c6c770
  *
c6c770
  * Returns: (transfer full): user object
c6c770
  */
c6c770
 ActUser *
c6c770
 act_user_manager_create_user (ActUserManager      *manager,
c6c770
                               const char          *username,
c6c770
                               const char          *fullname,
c6c770
                               ActUserAccountType   accounttype,
c6c770
                               GError             **error)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
         GError *local_error = NULL;
c6c770
         gboolean res;
c6c770
         g_autofree gchar *path = NULL;
c6c770
         ActUser *user;
c6c770
 
c6c770
         g_debug ("ActUserManager: Creating user '%s', '%s', %d",
c6c770
                  username, fullname, accounttype);
c6c770
 
c6c770
         g_assert (priv->accounts_proxy != NULL);
c6c770
 
c6c770
         res = accounts_accounts_call_create_user_sync (priv->accounts_proxy,
c6c770
                                                        username,
c6c770
                                                        fullname,
c6c770
                                                        accounttype,
c6c770
                                                        &path,
c6c770
                                                        NULL,
c6c770
                                                        &local_error);
c6c770
         if (!res) {
c6c770
                 g_propagate_error (error, local_error);
c6c770
                 return NULL;
c6c770
         }
c6c770
 
c6c770
+        save_system_info (manager, path);
c6c770
+
c6c770
         user = add_new_user_for_object_path (path, manager);
c6c770
 
c6c770
         return user;
c6c770
 }
c6c770
 
c6c770
 static void
c6c770
 act_user_manager_async_complete_handler (GObject      *source,
c6c770
                                          GAsyncResult *result,
c6c770
                                          gpointer      user_data)
c6c770
 {
c6c770
         GTask *task = user_data;
c6c770
 
c6c770
         g_task_return_pointer (task, g_object_ref (result), g_object_unref);
c6c770
         g_object_unref (task);
c6c770
 }
c6c770
 
c6c770
 /**
c6c770
  * act_user_manager_create_user_async:
c6c770
  * @manager: a #ActUserManager
c6c770
  * @username: a unix user name
c6c770
  * @fullname: a unix GECOS value
c6c770
  * @accounttype: a #ActUserAccountType
c6c770
  * @cancellable: (allow-none): optional #GCancellable object,
c6c770
  *     %NULL to ignore
c6c770
  * @callback: (scope async): a #GAsyncReadyCallback to call
c6c770
  *     when the request is satisfied
c6c770
  * @user_data: (closure): the data to pass to @callback
c6c770
  *
c6c770
  * Asynchronously creates a user account on the system.
c6c770
  *
c6c770
@@ -3253,106 +3368,111 @@ act_user_manager_create_user_async (ActUserManager      *manager,
c6c770
  * @manager: a #ActUserManager
c6c770
  * @result: a #GAsyncResult
c6c770
  * @error: a #GError
c6c770
  *
c6c770
  * Finishes an asynchronous user creation.
c6c770
  *
c6c770
  * See act_user_manager_create_user_async().
c6c770
  *
c6c770
  * Returns: (transfer full): user object
c6c770
  *
c6c770
  * Since: 0.6.27
c6c770
  */
c6c770
 ActUser *
c6c770
 act_user_manager_create_user_finish (ActUserManager  *manager,
c6c770
                                      GAsyncResult    *result,
c6c770
                                      GError         **error)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
         GAsyncResult *inner_result;
c6c770
         ActUser *user = NULL;
c6c770
         g_autofree gchar *path = NULL;
c6c770
         GError *remote_error = NULL;
c6c770
 
c6c770
         inner_result = g_task_propagate_pointer (G_TASK (result), error);
c6c770
         if (inner_result == NULL) {
c6c770
                 return FALSE;
c6c770
         }
c6c770
 
c6c770
         if (accounts_accounts_call_create_user_finish (priv->accounts_proxy,
c6c770
                                                        &path, inner_result, &remote_error)) {
c6c770
+
c6c770
+                save_system_info (manager, path);
c6c770
+
c6c770
                 user = add_new_user_for_object_path (path, manager);
c6c770
         }
c6c770
 
c6c770
         if (remote_error) {
c6c770
                 g_dbus_error_strip_remote_error (remote_error);
c6c770
                 g_propagate_error (error, remote_error);
c6c770
         }
c6c770
 
c6c770
         return user;
c6c770
 }
c6c770
 
c6c770
 /**
c6c770
  * act_user_manager_cache_user:
c6c770
  * @manager: a #ActUserManager
c6c770
  * @username: a user name
c6c770
  * @error: a #GError
c6c770
  *
c6c770
  * Caches a user account so it shows up via act_user_manager_list_users().
c6c770
  *
c6c770
  * Returns: (transfer full): user object
c6c770
  */
c6c770
 ActUser *
c6c770
 act_user_manager_cache_user (ActUserManager     *manager,
c6c770
                              const char         *username,
c6c770
                              GError            **error)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
         GError *local_error = NULL;
c6c770
         gboolean res;
c6c770
         g_autofree gchar *path = NULL;
c6c770
 
c6c770
         g_debug ("ActUserManager: Caching user '%s'",
c6c770
                  username);
c6c770
 
c6c770
         g_assert (priv->accounts_proxy != NULL);
c6c770
 
c6c770
         res = accounts_accounts_call_cache_user_sync (priv->accounts_proxy,
c6c770
                                                       username,
c6c770
                                                       &path,
c6c770
                                                       NULL,
c6c770
                                                       &local_error);
c6c770
         if (!res) {
c6c770
                 g_propagate_error (error, local_error);
c6c770
                 return NULL;
c6c770
         }
c6c770
 
c6c770
+        save_system_info (manager, path);
c6c770
+
c6c770
         return add_new_user_for_object_path (path, manager);
c6c770
 }
c6c770
 
c6c770
 
c6c770
 /**
c6c770
  * act_user_manager_cache_user_async:
c6c770
  * @manager: a #ActUserManager
c6c770
  * @username: a unix user name
c6c770
  * @cancellable: (allow-none): optional #GCancellable object,
c6c770
  *     %NULL to ignore
c6c770
  * @callback: (scope async): a #GAsyncReadyCallback to call
c6c770
  *     when the request is satisfied
c6c770
  * @user_data: (closure): the data to pass to @callback
c6c770
  *
c6c770
  * Asynchronously caches a user account so it shows up via
c6c770
  * act_user_manager_list_users().
c6c770
  *
c6c770
  * For more details, see act_user_manager_cache_user(), which
c6c770
  * is the synchronous version of this call.
c6c770
  *
c6c770
  * Since: 0.6.27
c6c770
  */
c6c770
 void
c6c770
 act_user_manager_cache_user_async (ActUserManager      *manager,
c6c770
                                    const char          *username,
c6c770
                                    GCancellable        *cancellable,
c6c770
                                    GAsyncReadyCallback  callback,
c6c770
                                    gpointer             user_data)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
@@ -3378,60 +3498,63 @@ act_user_manager_cache_user_async (ActUserManager      *manager,
c6c770
  * @manager: a #ActUserManager
c6c770
  * @result: a #GAsyncResult
c6c770
  * @error: a #GError
c6c770
  *
c6c770
  * Finishes an asynchronous user caching.
c6c770
  *
c6c770
  * See act_user_manager_cache_user_async().
c6c770
  *
c6c770
  * Returns: (transfer full): user object
c6c770
  *
c6c770
  * Since: 0.6.27
c6c770
  */
c6c770
 ActUser *
c6c770
 act_user_manager_cache_user_finish (ActUserManager  *manager,
c6c770
                                     GAsyncResult    *result,
c6c770
                                     GError         **error)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
         GAsyncResult *inner_result;
c6c770
         ActUser *user = NULL;
c6c770
         g_autofree gchar *path = NULL;
c6c770
         GError *remote_error = NULL;
c6c770
 
c6c770
         inner_result = g_task_propagate_pointer (G_TASK (result), error);
c6c770
         if (inner_result == NULL) {
c6c770
                 return FALSE;
c6c770
         }
c6c770
 
c6c770
         if (accounts_accounts_call_cache_user_finish (priv->accounts_proxy,
c6c770
                                                       &path, inner_result, &remote_error)) {
c6c770
+
c6c770
+                save_system_info (manager, path);
c6c770
+
c6c770
                 user = add_new_user_for_object_path (path, manager);
c6c770
         }
c6c770
 
c6c770
         if (remote_error) {
c6c770
                 g_dbus_error_strip_remote_error (remote_error);
c6c770
                 g_propagate_error (error, remote_error);
c6c770
         }
c6c770
 
c6c770
         return user;
c6c770
 }
c6c770
 
c6c770
 /**
c6c770
  * act_user_manager_uncache_user:
c6c770
  * @manager: a #ActUserManager
c6c770
  * @username: a user name
c6c770
  * @error: a #GError
c6c770
  *
c6c770
  * Releases all metadata about a user account, including icon,
c6c770
  * language and session. If the user account is from a remote
c6c770
  * server and the user has never logged in before, then that
c6c770
  * account will no longer show up in ListCachedUsers() output.
c6c770
  *
c6c770
  * Returns: %TRUE if successful, otherwise %FALSE
c6c770
  */
c6c770
 gboolean
c6c770
 act_user_manager_uncache_user (ActUserManager     *manager,
c6c770
                                const char         *username,
c6c770
                                GError            **error)
c6c770
 {
c6c770
         ActUserManagerPrivate *priv = act_user_manager_get_instance_private (manager);
c6c770
diff --git a/src/libaccountsservice/meson.build b/src/libaccountsservice/meson.build
c6c770
index 4e134db..9e85bba 100644
c6c770
--- a/src/libaccountsservice/meson.build
c6c770
+++ b/src/libaccountsservice/meson.build
c6c770
@@ -21,60 +21,67 @@ enum_types = 'act-user-enum-types'
c6c770
 
c6c770
 enum_sources = gnome.mkenums(
c6c770
   enum_types,
c6c770
   sources: headers,
c6c770
   c_template: enum_types + '.c.template',
c6c770
   h_template: enum_types + '.h.template',
c6c770
   install_header: true,
c6c770
   install_dir: join_paths(act_pkgincludedir, subdir),
c6c770
 )
c6c770
 
c6c770
 dbus_sources = []
c6c770
 
c6c770
 ifaces = [
c6c770
   'Manager',
c6c770
   'Seat',
c6c770
   'Session',
c6c770
 ]
c6c770
 
c6c770
 namespace = 'ConsoleKit'
c6c770
 prefix = 'org.freedesktop.' + namespace
c6c770
 
c6c770
 foreach iface: ifaces
c6c770
   dbus_sources += gnome.gdbus_codegen(
c6c770
     'ck-@0@-generated'.format(iface.to_lower()),
c6c770
     '@0@.@1@.xml'.format(prefix, iface),
c6c770
     interface_prefix: prefix,
c6c770
     namespace: namespace,
c6c770
   )
c6c770
 endforeach
c6c770
 
c6c770
+dbus_sources += gnome.gdbus_codegen(
c6c770
+   'com.redhat.AccountsServiceUser.System',
c6c770
+   join_paths(data_dir, 'com.redhat.AccountsServiceUser.System.xml'),
c6c770
+   interface_prefix: 'com.redhat.AccountsService',
c6c770
+   namespace: 'Act',
c6c770
+)
c6c770
+
c6c770
 deps = [
c6c770
   crypt_dep,
c6c770
   gio_unix_dep,
c6c770
   glib_dep,
c6c770
   libaccounts_generated_dep,
c6c770
 ]
c6c770
 
c6c770
 symbol_map = join_paths(meson.current_source_dir(), 'symbol.map')
c6c770
 ldflags = cc.get_supported_link_arguments('-Wl,--version-script,@0@'.format(symbol_map))
c6c770
 
c6c770
 if enable_systemd or enable_elogind
c6c770
   deps += logind_dep
c6c770
 endif
c6c770
 
c6c770
 libaccountsservice = shared_library(
c6c770
   act_name,
c6c770
   sources: sources + enum_sources + dbus_sources,
c6c770
   version: libversion,
c6c770
   include_directories: top_inc,
c6c770
   dependencies: deps,
c6c770
   c_args: '-DG_LOG_DOMAIN="@0@"'.format(meson.project_name()),
c6c770
   link_args: ldflags,
c6c770
   link_depends: symbol_map,
c6c770
   install: true,
c6c770
 )
c6c770
 
c6c770
 libaccountsservice_dep = declare_dependency(
c6c770
   sources: enum_sources[1],
c6c770
   include_directories: include_directories('.'),
c6c770
   dependencies: [gio_dep, glib_dep],
c6c770
-- 
c6c770
2.27.0
c6c770