1 <?xml version="1.0" standalone="no"?>
2 <!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"
3 "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd"
9 <title>D-Bus Specification</title>
10 <releaseinfo>Version 0.12</releaseinfo>
11 <date>7 November 2006</date>
14 <firstname>Havoc</firstname>
15 <surname>Pennington</surname>
17 <orgname>Red Hat, Inc.</orgname>
19 <email>hp@pobox.com</email>
24 <firstname>Anders</firstname>
25 <surname>Carlsson</surname>
27 <orgname>CodeFactory AB</orgname>
29 <email>andersca@codefactory.se</email>
34 <firstname>Alexander</firstname>
35 <surname>Larsson</surname>
37 <orgname>Red Hat, Inc.</orgname>
39 <email>alexl@redhat.com</email>
46 <sect1 id="introduction">
47 <title>Introduction</title>
49 D-Bus is a system for low-latency, low-overhead, easy to use
50 interprocess communication (IPC). In more detail:
54 D-Bus is <emphasis>low-latency</emphasis> because it is designed
55 to avoid round trips and allow asynchronous operation, much like
61 D-Bus is <emphasis>low-overhead</emphasis> because it uses a
62 binary protocol, and does not have to convert to and from a text
63 format such as XML. Because D-Bus is intended for potentially
64 high-resolution same-machine IPC, not primarily for Internet IPC,
65 this is an interesting optimization.
70 D-Bus is <emphasis>easy to use</emphasis> because it works in terms
71 of <firstterm>messages</firstterm> rather than byte streams, and
72 automatically handles a lot of the hard IPC issues. Also, the D-Bus
73 library is designed to be wrapped in a way that lets developers use
74 their framework's existing object/type system, rather than learning
75 a new one specifically for IPC.
82 The base D-Bus protocol is a one-to-one (peer-to-peer or client-server)
83 protocol, specified in <xref linkend="message-protocol"/>. That is, it is
84 a system for one application to talk to a single other
85 application. However, the primary intended application of the protocol is the
86 D-Bus <firstterm>message bus</firstterm>, specified in <xref
87 linkend="message-bus"/>. The message bus is a special application that
88 accepts connections from multiple other applications, and forwards
93 Uses of D-Bus include notification of system changes (notification of when
94 a camera is plugged in to a computer, or a new version of some software
95 has been installed), or desktop interoperability, for example a file
96 monitoring service or a configuration service.
100 D-Bus is designed for two specific use cases:
104 A "system bus" for notifications from the system to user sessions,
105 and to allow the system to request input from user sessions.
110 A "session bus" used to implement desktop environments such as
115 D-Bus is not intended to be a generic IPC system for any possible
116 application, and intentionally omits many features found in other
117 IPC systems for this reason.
121 At the same time, the bus daemons offer a number of features not found in
122 other IPC systems, such as single-owner "bus names" (similar to X
123 selections), on-demand startup of services, and security policies.
124 In many ways, these features are the primary motivation for developing
125 D-Bus; other systems would have sufficed if IPC were the only goal.
129 D-Bus may turn out to be useful in unanticipated applications, but future
130 versions of this spec and the reference implementation probably will not
131 incorporate features that interfere with the core use cases.
135 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
136 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
137 document are to be interpreted as described in RFC 2119. However, the
138 document could use a serious audit to be sure it makes sense to do
139 so. Also, they are not capitalized.
142 <sect2 id="stability">
143 <title>Protocol and Specification Stability</title>
145 The D-Bus protocol is frozen (only compatible extensions are allowed) as
146 of November 8, 2006. However, this specification could still use a fair
147 bit of work to make interoperable reimplementation possible without
148 reference to the D-Bus reference implementation. Thus, this
149 specification is not marked 1.0. To mark it 1.0, we'd like to see
150 someone invest significant effort in clarifying the specification
151 language, and growing the specification to cover more aspects of the
152 reference implementation's behavior.
155 Until this work is complete, any attempt to reimplement D-Bus will
156 probably require looking at the reference implementation and/or asking
157 questions on the D-Bus mailing list about intended behavior.
158 Questions on the list are very welcome.
161 Nonetheless, this document should be a useful starting point and is
162 to our knowledge accurate, though incomplete.
168 <sect1 id="message-protocol">
169 <title>Message Protocol</title>
172 A <firstterm>message</firstterm> consists of a
173 <firstterm>header</firstterm> and a <firstterm>body</firstterm>. If you
174 think of a message as a package, the header is the address, and the body
175 contains the package contents. The message delivery system uses the header
176 information to figure out where to send the message and how to interpret
177 it; the recipient interprets the body of the message.
181 The body of the message is made up of zero or more
182 <firstterm>arguments</firstterm>, which are typed values, such as an
183 integer or a byte array.
187 Both header and body use the same type system and format for
188 serializing data. Each type of value has a wire format.
189 Converting a value from some other representation into the wire
190 format is called <firstterm>marshaling</firstterm> and converting
191 it back from the wire format is <firstterm>unmarshaling</firstterm>.
194 <sect2 id="message-protocol-signatures">
195 <title>Type Signatures</title>
198 The D-Bus protocol does not include type tags in the marshaled data; a
199 block of marshaled values must have a known <firstterm>type
200 signature</firstterm>. The type signature is made up of <firstterm>type
201 codes</firstterm>. A type code is an ASCII character representing the
202 type of a value. Because ASCII characters are used, the type signature
203 will always form a valid ASCII string. A simple string compare
204 determines whether two type signatures are equivalent.
208 As a simple example, the type code for 32-bit integer (<literal>INT32</literal>) is
209 the ASCII character 'i'. So the signature for a block of values
210 containing a single <literal>INT32</literal> would be:
214 A block of values containing two <literal>INT32</literal> would have this signature:
221 All <firstterm>basic</firstterm> types work like
222 <literal>INT32</literal> in this example. To marshal and unmarshal
223 basic types, you simply read one value from the data
224 block corresponding to each type code in the signature.
225 In addition to basic types, there are four <firstterm>container</firstterm>
226 types: <literal>STRUCT</literal>, <literal>ARRAY</literal>, <literal>VARIANT</literal>,
227 and <literal>DICT_ENTRY</literal>.
231 <literal>STRUCT</literal> has a type code, ASCII character 'r', but this type
232 code does not appear in signatures. Instead, ASCII characters
233 '(' and ')' are used to mark the beginning and end of the struct.
234 So for example, a struct containing two integers would have this
239 Structs can be nested, so for example a struct containing
240 an integer and another struct:
244 The value block storing that struct would contain three integers; the
245 type signature allows you to distinguish "(i(ii))" from "((ii)i)" or
250 The <literal>STRUCT</literal> type code 'r' is not currently used in the D-Bus protocol,
251 but is useful in code that implements the protocol. This type code
252 is specified to allow such code to interoperate in non-protocol contexts.
256 Empty structures are not allowed; there must be at least one
257 type code between the parentheses.
261 <literal>ARRAY</literal> has ASCII character 'a' as type code. The array type code must be
262 followed by a <firstterm>single complete type</firstterm>. The single
263 complete type following the array is the type of each array element. So
264 the simple example is:
268 which is an array of 32-bit integers. But an array can be of any type,
269 such as this array-of-struct-with-two-int32-fields:
273 Or this array of array of integer:
280 The phrase <firstterm>single complete type</firstterm> deserves some
281 definition. A single complete type is a basic type code, a variant type code,
282 an array with its element type, or a struct with its fields.
283 So the following signatures are not single complete types:
293 And the following signatures contain multiple complete types:
303 Note however that a single complete type may <emphasis>contain</emphasis>
304 multiple other single complete types.
308 <literal>VARIANT</literal> has ASCII character 'v' as its type code. A marshaled value of
309 type <literal>VARIANT</literal> will have the signature of a single complete type as part
310 of the <emphasis>value</emphasis>. This signature will be followed by a
311 marshaled value of that type.
315 A <literal>DICT_ENTRY</literal> works exactly like a struct, but rather
316 than parentheses it uses curly braces, and it has more restrictions.
317 The restrictions are: it occurs only as an array element type; it has
318 exactly two single complete types inside the curly braces; the first
319 single complete type (the "key") must be a basic type rather than a
320 container type. Implementations must not accept dict entries outside of
321 arrays, must not accept dict entries with zero, one, or more than two
322 fields, and must not accept dict entries with non-basic-typed keys. A
323 dict entry is always a key-value pair.
327 The first field in the <literal>DICT_ENTRY</literal> is always the key.
328 A message is considered corrupt if the same key occurs twice in the same
329 array of <literal>DICT_ENTRY</literal>. However, for performance reasons
330 implementations are not required to reject dicts with duplicate keys.
334 In most languages, an array of dict entry would be represented as a
335 map, hash table, or dict object.
339 The following table summarizes the D-Bus types.
344 <entry>Conventional Name</entry>
346 <entry>Description</entry>
351 <entry><literal>INVALID</literal></entry>
352 <entry>0 (ASCII NUL)</entry>
353 <entry>Not a valid type code, used to terminate signatures</entry>
355 <entry><literal>BYTE</literal></entry>
356 <entry>121 (ASCII 'y')</entry>
357 <entry>8-bit unsigned integer</entry>
359 <entry><literal>BOOLEAN</literal></entry>
360 <entry>98 (ASCII 'b')</entry>
361 <entry>Boolean value, 0 is <literal>FALSE</literal> and 1 is <literal>TRUE</literal>. Everything else is invalid.</entry>
363 <entry><literal>INT16</literal></entry>
364 <entry>110 (ASCII 'n')</entry>
365 <entry>16-bit signed integer</entry>
367 <entry><literal>UINT16</literal></entry>
368 <entry>113 (ASCII 'q')</entry>
369 <entry>16-bit unsigned integer</entry>
371 <entry><literal>INT32</literal></entry>
372 <entry>105 (ASCII 'i')</entry>
373 <entry>32-bit signed integer</entry>
375 <entry><literal>UINT32</literal></entry>
376 <entry>117 (ASCII 'u')</entry>
377 <entry>32-bit unsigned integer</entry>
379 <entry><literal>INT64</literal></entry>
380 <entry>120 (ASCII 'x')</entry>
381 <entry>64-bit signed integer</entry>
383 <entry><literal>UINT64</literal></entry>
384 <entry>116 (ASCII 't')</entry>
385 <entry>64-bit unsigned integer</entry>
387 <entry><literal>DOUBLE</literal></entry>
388 <entry>100 (ASCII 'd')</entry>
389 <entry>IEEE 754 double</entry>
391 <entry><literal>STRING</literal></entry>
392 <entry>115 (ASCII 's')</entry>
393 <entry>UTF-8 string (<emphasis>must</emphasis> be valid UTF-8). Must be nul terminated and contain no other nul bytes.</entry>
395 <entry><literal>OBJECT_PATH</literal></entry>
396 <entry>111 (ASCII 'o')</entry>
397 <entry>Name of an object instance</entry>
399 <entry><literal>SIGNATURE</literal></entry>
400 <entry>103 (ASCII 'g')</entry>
401 <entry>A type signature</entry>
403 <entry><literal>ARRAY</literal></entry>
404 <entry>97 (ASCII 'a')</entry>
407 <entry><literal>STRUCT</literal></entry>
408 <entry>114 (ASCII 'r'), 40 (ASCII '('), 41 (ASCII ')')</entry>
409 <entry>Struct</entry>
411 <entry><literal>VARIANT</literal></entry>
412 <entry>118 (ASCII 'v') </entry>
413 <entry>Variant type (the type of the value is part of the value itself)</entry>
415 <entry><literal>DICT_ENTRY</literal></entry>
416 <entry>101 (ASCII 'e'), 123 (ASCII '{'), 125 (ASCII '}') </entry>
417 <entry>Entry in a dict or map (array of key-value pairs)</entry>
426 <sect2 id="message-protocol-marshaling">
427 <title>Marshaling (Wire Format)</title>
430 Given a type signature, a block of bytes can be converted into typed
431 values. This section describes the format of the block of bytes. Byte
432 order and alignment issues are handled uniformly for all D-Bus types.
436 A block of bytes has an associated byte order. The byte order
437 has to be discovered in some way; for D-Bus messages, the
438 byte order is part of the message header as described in
439 <xref linkend="message-protocol-messages"/>. For now, assume
440 that the byte order is known to be either little endian or big
445 Each value in a block of bytes is aligned "naturally," for example
446 4-byte values are aligned to a 4-byte boundary, and 8-byte values to an
447 8-byte boundary. To properly align a value, <firstterm>alignment
448 padding</firstterm> may be necessary. The alignment padding must always
449 be the minimum required padding to properly align the following value;
450 and it must always be made up of nul bytes. The alignment padding must
451 not be left uninitialized (it can't contain garbage), and more padding
452 than required must not be used.
456 Given all this, the types are marshaled on the wire as follows:
461 <entry>Conventional Name</entry>
462 <entry>Encoding</entry>
463 <entry>Alignment</entry>
468 <entry><literal>INVALID</literal></entry>
469 <entry>Not applicable; cannot be marshaled.</entry>
472 <entry><literal>BYTE</literal></entry>
473 <entry>A single 8-bit byte.</entry>
476 <entry><literal>BOOLEAN</literal></entry>
477 <entry>As for <literal>UINT32</literal>, but only 0 and 1 are valid values.</entry>
480 <entry><literal>INT16</literal></entry>
481 <entry>16-bit signed integer in the message's byte order.</entry>
484 <entry><literal>UINT16</literal></entry>
485 <entry>16-bit unsigned integer in the message's byte order.</entry>
488 <entry><literal>INT32</literal></entry>
489 <entry>32-bit signed integer in the message's byte order.</entry>
492 <entry><literal>UINT32</literal></entry>
493 <entry>32-bit unsigned integer in the message's byte order.</entry>
496 <entry><literal>INT64</literal></entry>
497 <entry>64-bit signed integer in the message's byte order.</entry>
500 <entry><literal>UINT64</literal></entry>
501 <entry>64-bit unsigned integer in the message's byte order.</entry>
504 <entry><literal>DOUBLE</literal></entry>
505 <entry>64-bit IEEE 754 double in the message's byte order.</entry>
508 <entry><literal>STRING</literal></entry>
509 <entry>A <literal>UINT32</literal> indicating the string's
510 length in bytes excluding its terminating nul, followed by
511 non-nul string data of the given length, followed by a terminating nul
518 <entry><literal>OBJECT_PATH</literal></entry>
519 <entry>Exactly the same as <literal>STRING</literal> except the
520 content must be a valid object path (see below).
526 <entry><literal>SIGNATURE</literal></entry>
527 <entry>The same as <literal>STRING</literal> except the length is a single
528 byte (thus signatures have a maximum length of 255)
529 and the content must be a valid signature (see below).
535 <entry><literal>ARRAY</literal></entry>
537 A <literal>UINT32</literal> giving the length of the array data in bytes, followed by
538 alignment padding to the alignment boundary of the array element type,
539 followed by each array element. The array length is from the
540 end of the alignment padding to the end of the last element,
541 i.e. it does not include the padding after the length,
542 or any padding after the last element.
543 Arrays have a maximum length defined to be 2 to the 26th power or
544 67108864. Implementations must not send or accept arrays exceeding this
551 <entry><literal>STRUCT</literal></entry>
553 A struct must start on an 8-byte boundary regardless of the
554 type of the struct fields. The struct value consists of each
555 field marshaled in sequence starting from that 8-byte
562 <entry><literal>VARIANT</literal></entry>
564 A variant type has a marshaled <literal>SIGNATURE</literal>
565 followed by a marshaled value with the type
566 given in the signature.
567 Unlike a message signature, the variant signature
568 can contain only a single complete type.
569 So "i", "ai" or "(ii)" is OK, but "ii" is not.
572 1 (alignment of the signature)
575 <entry><literal>DICT_ENTRY</literal></entry>
588 <sect3 id="message-protocol-marshaling-object-path">
589 <title>Valid Object Paths</title>
592 An object path is a name used to refer to an object instance.
593 Conceptually, each participant in a D-Bus message exchange may have
594 any number of object instances (think of C++ or Java objects) and each
595 such instance will have a path. Like a filesystem, the object
596 instances in an application form a hierarchical tree.
600 The following rules define a valid object path. Implementations must
601 not send or accept messages with invalid object paths.
605 The path may be of any length.
610 The path must begin with an ASCII '/' (integer 47) character,
611 and must consist of elements separated by slash characters.
616 Each element must only contain the ASCII characters
622 No element may be the empty string.
627 Multiple '/' characters cannot occur in sequence.
632 A trailing '/' character is not allowed unless the
633 path is the root path (a single '/' character).
642 <sect3 id="message-protocol-marshaling-signature">
643 <title>Valid Signatures</title>
645 An implementation must not send or accept invalid signatures.
646 Valid signatures will conform to the following rules:
650 The signature ends with a nul byte.
655 The signature is a list of single complete types.
656 Arrays must have element types, and structs must
657 have both open and close parentheses.
662 Only type codes and open and close parentheses are
663 allowed in the signature. The <literal>STRUCT</literal> type code
664 is not allowed in signatures, because parentheses
670 The maximum depth of container type nesting is 32 array type
671 codes and 32 open parentheses. This implies that the maximum
672 total depth of recursion is 64, for an "array of array of array
673 of ... struct of struct of struct of ..." where there are 32
679 The maximum length of a signature is 255.
684 Signatures must be nul-terminated.
693 <sect2 id="message-protocol-messages">
694 <title>Message Format</title>
697 A message consists of a header and a body. The header is a block of
698 values with a fixed signature and meaning. The body is a separate block
699 of values, with a signature specified in the header.
703 The length of the header must be a multiple of 8, allowing the body to
704 begin on an 8-byte boundary when storing the entire message in a single
705 buffer. If the header does not naturally end on an 8-byte boundary
706 up to 7 bytes of nul-initialized alignment padding must be added.
710 The message body need not end on an 8-byte boundary.
714 The maximum length of a message, including header, header alignment padding,
715 and body is 2 to the 27th power or 134217728. Implementations must not
716 send or accept messages exceeding this size.
720 The signature of the header is:
724 Written out more readably, this is:
726 BYTE, BYTE, BYTE, BYTE, UINT32, UINT32, ARRAY of STRUCT of (BYTE,VARIANT)
731 These values have the following meanings:
737 <entry>Description</entry>
742 <entry>1st <literal>BYTE</literal></entry>
743 <entry>Endianness flag; ASCII 'l' for little-endian
744 or ASCII 'B' for big-endian. Both header and body are
745 in this endianness.</entry>
748 <entry>2nd <literal>BYTE</literal></entry>
749 <entry><firstterm>Message type</firstterm>. Unknown types must be ignored.
750 Currently-defined types are described below.
754 <entry>3rd <literal>BYTE</literal></entry>
755 <entry>Bitwise OR of flags. Unknown flags
756 must be ignored. Currently-defined flags are described below.
760 <entry>4th <literal>BYTE</literal></entry>
761 <entry>Major protocol version of the sending application. If
762 the major protocol version of the receiving application does not
763 match, the applications will not be able to communicate and the
764 D-Bus connection must be disconnected. The major protocol
765 version for this version of the specification is 1.
769 <entry>1st <literal>UINT32</literal></entry>
770 <entry>Length in bytes of the message body, starting
771 from the end of the header. The header ends after
772 its alignment padding to an 8-boundary.
776 <entry>2nd <literal>UINT32</literal></entry>
777 <entry>The serial of this message, used as a cookie
778 by the sender to identify the reply corresponding
783 <entry><literal>ARRAY</literal> of <literal>STRUCT</literal> of (<literal>BYTE</literal>,<literal>VARIANT</literal>)</entry>
784 <entry>An array of zero or more <firstterm>header
785 fields</firstterm> where the byte is the field code, and the
786 variant is the field value. The message type determines
787 which fields are required.
795 <firstterm>Message types</firstterm> that can appear in the second byte
801 <entry>Conventional name</entry>
802 <entry>Decimal value</entry>
803 <entry>Description</entry>
808 <entry><literal>INVALID</literal></entry>
810 <entry>This is an invalid type.</entry>
813 <entry><literal>METHOD_CALL</literal></entry>
815 <entry>Method call.</entry>
818 <entry><literal>METHOD_RETURN</literal></entry>
820 <entry>Method reply with returned data.</entry>
823 <entry><literal>ERROR</literal></entry>
825 <entry>Error reply. If the first argument exists and is a
826 string, it is an error message.</entry>
829 <entry><literal>SIGNAL</literal></entry>
831 <entry>Signal emission.</entry>
838 Flags that can appear in the third byte of the header:
843 <entry>Conventional name</entry>
844 <entry>Hex value</entry>
845 <entry>Description</entry>
850 <entry><literal>NO_REPLY_EXPECTED</literal></entry>
852 <entry>This message does not expect method return replies or
853 error replies; the reply can be omitted as an
854 optimization. However, it is compliant with this specification
855 to return the reply despite this flag and the only harm
856 from doing so is extra network traffic.
860 <entry><literal>NO_AUTO_START</literal></entry>
862 <entry>The bus must not launch an owner
863 for the destination name in response to this message.
871 <sect3 id="message-protocol-header-fields">
872 <title>Header Fields</title>
875 The array at the end of the header contains <firstterm>header
876 fields</firstterm>, where each field is a 1-byte field code followed
877 by a field value. A header must contain the required header fields for
878 its message type, and zero or more of any optional header
879 fields. Future versions of this protocol specification may add new
880 fields. Implementations must ignore fields they do not
881 understand. Implementations must not invent their own header fields;
882 only changes to this specification may introduce new header fields.
886 Again, if an implementation sees a header field code that it does not
887 expect, it must ignore that field, as it will be part of a new
888 (but compatible) version of this specification. This also applies
889 to known header fields appearing in unexpected messages, for
890 example: if a signal has a reply serial it must be ignored
891 even though it has no meaning as of this version of the spec.
895 However, implementations must not send or accept known header fields
896 with the wrong type stored in the field value. So for example a
897 message with an <literal>INTERFACE</literal> field of type
898 <literal>UINT32</literal> would be considered corrupt.
902 Here are the currently-defined header fields:
907 <entry>Conventional Name</entry>
908 <entry>Decimal Code</entry>
910 <entry>Required In</entry>
911 <entry>Description</entry>
916 <entry><literal>INVALID</literal></entry>
919 <entry>not allowed</entry>
920 <entry>Not a valid field name (error if it appears in a message)</entry>
923 <entry><literal>PATH</literal></entry>
925 <entry><literal>OBJECT_PATH</literal></entry>
926 <entry><literal>METHOD_CALL</literal>, <literal>SIGNAL</literal></entry>
927 <entry>The object to send a call to,
928 or the object a signal is emitted from.
930 <literal>/org/freedesktop/DBus/Local</literal> is reserved;
931 implementations should not send messages with this path,
932 and the reference implementation of the bus daemon will
933 disconnect any application that attempts to do so.
937 <entry><literal>INTERFACE</literal></entry>
939 <entry><literal>STRING</literal></entry>
940 <entry><literal>SIGNAL</literal></entry>
942 The interface to invoke a method call on, or
943 that a signal is emitted from. Optional for
944 method calls, required for signals.
945 The special interface
946 <literal>org.freedesktop.DBus.Local</literal> is reserved;
947 implementations should not send messages with this
948 interface, and the reference implementation of the bus
949 daemon will disconnect any application that attempts to
954 <entry><literal>MEMBER</literal></entry>
956 <entry><literal>STRING</literal></entry>
957 <entry><literal>METHOD_CALL</literal>, <literal>SIGNAL</literal></entry>
958 <entry>The member, either the method name or signal name.</entry>
961 <entry><literal>ERROR_NAME</literal></entry>
963 <entry><literal>STRING</literal></entry>
964 <entry><literal>ERROR</literal></entry>
965 <entry>The name of the error that occurred, for errors</entry>
968 <entry><literal>REPLY_SERIAL</literal></entry>
970 <entry><literal>UINT32</literal></entry>
971 <entry><literal>ERROR</literal>, <literal>METHOD_RETURN</literal></entry>
972 <entry>The serial number of the message this message is a reply
973 to. (The serial number is the second <literal>UINT32</literal> in the header.)</entry>
976 <entry><literal>DESTINATION</literal></entry>
978 <entry><literal>STRING</literal></entry>
979 <entry>optional</entry>
980 <entry>The name of the connection this message is intended for.
981 Only used in combination with the message bus, see
982 <xref linkend="message-bus"/>.</entry>
985 <entry><literal>SENDER</literal></entry>
987 <entry><literal>STRING</literal></entry>
988 <entry>optional</entry>
989 <entry>Unique name of the sending connection.
990 The message bus fills in this field so it is reliable; the field is
991 only meaningful in combination with the message bus.</entry>
994 <entry><literal>SIGNATURE</literal></entry>
996 <entry><literal>SIGNATURE</literal></entry>
997 <entry>optional</entry>
998 <entry>The signature of the message body.
999 If omitted, it is assumed to be the
1000 empty signature "" (i.e. the body must be 0-length).</entry>
1009 <sect2 id="message-protocol-names">
1010 <title>Valid Names</title>
1012 The various names in D-Bus messages have some restrictions.
1015 There is a <firstterm>maximum name length</firstterm>
1016 of 255 which applies to bus names, interfaces, and members.
1018 <sect3 id="message-protocol-names-interface">
1019 <title>Interface names</title>
1021 Interfaces have names with type <literal>STRING</literal>, meaning that
1022 they must be valid UTF-8. However, there are also some
1023 additional restrictions that apply to interface names
1026 <listitem><para>Interface names are composed of 1 or more elements separated by
1027 a period ('.') character. All elements must contain at least
1031 <listitem><para>Each element must only contain the ASCII characters
1032 "[A-Z][a-z][0-9]_" and must not begin with a digit.
1036 <listitem><para>Interface names must contain at least one '.' (period)
1037 character (and thus at least two elements).
1040 <listitem><para>Interface names must not begin with a '.' (period) character.</para></listitem>
1041 <listitem><para>Interface names must not exceed the maximum name length.</para></listitem>
1045 <sect3 id="message-protocol-names-bus">
1046 <title>Bus names</title>
1048 Connections have one or more bus names associated with them.
1049 A connection has exactly one bus name that is a unique connection
1050 name. The unique connection name remains with the connection for
1051 its entire lifetime.
1052 A bus name is of type <literal>STRING</literal>,
1053 meaning that it must be valid UTF-8. However, there are also
1054 some additional restrictions that apply to bus names
1057 <listitem><para>Bus names that start with a colon (':')
1058 character are unique connection names.
1061 <listitem><para>Bus names are composed of 1 or more elements separated by
1062 a period ('.') character. All elements must contain at least
1066 <listitem><para>Each element must only contain the ASCII characters
1067 "[A-Z][a-z][0-9]_-". Only elements that are part of a unique
1068 connection name may begin with a digit, elements in
1069 other bus names must not begin with a digit.
1073 <listitem><para>Bus names must contain at least one '.' (period)
1074 character (and thus at least two elements).
1077 <listitem><para>Bus names must not begin with a '.' (period) character.</para></listitem>
1078 <listitem><para>Bus names must not exceed the maximum name length.</para></listitem>
1082 Note that the hyphen ('-') character is allowed in bus names but
1083 not in interface names.
1086 <sect3 id="message-protocol-names-member">
1087 <title>Member names</title>
1089 Member (i.e. method or signal) names:
1091 <listitem><para>Must only contain the ASCII characters
1092 "[A-Z][a-z][0-9]_" and may not begin with a
1093 digit.</para></listitem>
1094 <listitem><para>Must not contain the '.' (period) character.</para></listitem>
1095 <listitem><para>Must not exceed the maximum name length.</para></listitem>
1096 <listitem><para>Must be at least 1 byte in length.</para></listitem>
1100 <sect3 id="message-protocol-names-error">
1101 <title>Error names</title>
1103 Error names have the same restrictions as interface names.
1108 <sect2 id="message-protocol-types">
1109 <title>Message Types</title>
1111 Each of the message types (<literal>METHOD_CALL</literal>, <literal>METHOD_RETURN</literal>, <literal>ERROR</literal>, and
1112 <literal>SIGNAL</literal>) has its own expected usage conventions and header fields.
1113 This section describes these conventions.
1115 <sect3 id="message-protocol-types-method">
1116 <title>Method Calls</title>
1118 Some messages invoke an operation on a remote object. These are
1119 called method call messages and have the type tag <literal>METHOD_CALL</literal>. Such
1120 messages map naturally to methods on objects in a typical program.
1123 A method call message is required to have a <literal>MEMBER</literal> header field
1124 indicating the name of the method. Optionally, the message has an
1125 <literal>INTERFACE</literal> field giving the interface the method is a part of. In the
1126 absence of an <literal>INTERFACE</literal> field, if two interfaces on the same object have
1127 a method with the same name, it is undefined which of the two methods
1128 will be invoked. Implementations may also choose to return an error in
1129 this ambiguous case. However, if a method name is unique
1130 implementations must not require an interface field.
1133 Method call messages also include a <literal>PATH</literal> field
1134 indicating the object to invoke the method on. If the call is passing
1135 through a message bus, the message will also have a
1136 <literal>DESTINATION</literal> field giving the name of the connection
1137 to receive the message.
1140 When an application handles a method call message, it is required to
1141 return a reply. The reply is identified by a <literal>REPLY_SERIAL</literal> header field
1142 indicating the serial number of the <literal>METHOD_CALL</literal> being replied to. The
1143 reply can have one of two types; either <literal>METHOD_RETURN</literal> or <literal>ERROR</literal>.
1146 If the reply has type <literal>METHOD_RETURN</literal>, the arguments to the reply message
1147 are the return value(s) or "out parameters" of the method call.
1148 If the reply has type <literal>ERROR</literal>, then an "exception" has been thrown,
1149 and the call fails; no return value will be provided. It makes
1150 no sense to send multiple replies to the same method call.
1153 Even if a method call has no return values, a <literal>METHOD_RETURN</literal>
1154 reply is required, so the caller will know the method
1155 was successfully processed.
1158 The <literal>METHOD_RETURN</literal> or <literal>ERROR</literal> reply message must have the <literal>REPLY_SERIAL</literal>
1162 If a <literal>METHOD_CALL</literal> message has the flag <literal>NO_REPLY_EXPECTED</literal>,
1163 then as an optimization the application receiving the method
1164 call may choose to omit the reply message (regardless of
1165 whether the reply would have been <literal>METHOD_RETURN</literal> or <literal>ERROR</literal>).
1166 However, it is also acceptable to ignore the <literal>NO_REPLY_EXPECTED</literal>
1167 flag and reply anyway.
1170 Unless a message has the flag <literal>NO_AUTO_START</literal>, if the
1171 destination name does not exist then a program to own the destination
1172 name will be started before the message is delivered. The message
1173 will be held until the new program is successfully started or has
1174 failed to start; in case of failure, an error will be returned. This
1175 flag is only relevant in the context of a message bus, it is ignored
1176 during one-to-one communication with no intermediate bus.
1178 <sect4 id="message-protocol-types-method-apis">
1179 <title>Mapping method calls to native APIs</title>
1181 APIs for D-Bus may map method calls to a method call in a specific
1182 programming language, such as C++, or may map a method call written
1183 in an IDL to a D-Bus message.
1186 In APIs of this nature, arguments to a method are often termed "in"
1187 (which implies sent in the <literal>METHOD_CALL</literal>), or "out" (which implies
1188 returned in the <literal>METHOD_RETURN</literal>). Some APIs such as CORBA also have
1189 "inout" arguments, which are both sent and received, i.e. the caller
1190 passes in a value which is modified. Mapped to D-Bus, an "inout"
1191 argument is equivalent to an "in" argument, followed by an "out"
1192 argument. You can't pass things "by reference" over the wire, so
1193 "inout" is purely an illusion of the in-process API.
1196 Given a method with zero or one return values, followed by zero or more
1197 arguments, where each argument may be "in", "out", or "inout", the
1198 caller constructs a message by appending each "in" or "inout" argument,
1199 in order. "out" arguments are not represented in the caller's message.
1202 The recipient constructs a reply by appending first the return value
1203 if any, then each "out" or "inout" argument, in order.
1204 "in" arguments are not represented in the reply message.
1207 Error replies are normally mapped to exceptions in languages that have
1211 In converting from native APIs to D-Bus, it is perhaps nice to
1212 map D-Bus naming conventions ("FooBar") to native conventions
1213 such as "fooBar" or "foo_bar" automatically. This is OK
1214 as long as you can say that the native API is one that
1215 was specifically written for D-Bus. It makes the most sense
1216 when writing object implementations that will be exported
1217 over the bus. Object proxies used to invoke remote D-Bus
1218 objects probably need the ability to call any D-Bus method,
1219 and thus a magic name mapping like this could be a problem.
1222 This specification doesn't require anything of native API bindings;
1223 the preceding is only a suggested convention for consistency
1229 <sect3 id="message-protocol-types-signal">
1230 <title>Signal Emission</title>
1232 Unlike method calls, signal emissions have no replies.
1233 A signal emission is simply a single message of type <literal>SIGNAL</literal>.
1234 It must have three header fields: <literal>PATH</literal> giving the object
1235 the signal was emitted from, plus <literal>INTERFACE</literal> and <literal>MEMBER</literal> giving
1236 the fully-qualified name of the signal. The <literal>INTERFACE</literal> header is required
1237 for signals, though it is optional for method calls.
1241 <sect3 id="message-protocol-types-errors">
1242 <title>Errors</title>
1244 Messages of type <literal>ERROR</literal> are most commonly replies
1245 to a <literal>METHOD_CALL</literal>, but may be returned in reply
1246 to any kind of message. The message bus for example
1247 will return an <literal>ERROR</literal> in reply to a signal emission if
1248 the bus does not have enough memory to send the signal.
1251 An <literal>ERROR</literal> may have any arguments, but if the first
1252 argument is a <literal>STRING</literal>, it must be an error message.
1253 The error message may be logged or shown to the user
1258 <sect3 id="message-protocol-types-notation">
1259 <title>Notation in this document</title>
1261 This document uses a simple pseudo-IDL to describe particular method
1262 calls and signals. Here is an example of a method call:
1264 org.freedesktop.DBus.StartServiceByName (in STRING name, in UINT32 flags,
1265 out UINT32 resultcode)
1267 This means <literal>INTERFACE</literal> = org.freedesktop.DBus, <literal>MEMBER</literal> = StartServiceByName,
1268 <literal>METHOD_CALL</literal> arguments are <literal>STRING</literal> and <literal>UINT32</literal>, <literal>METHOD_RETURN</literal> argument
1269 is <literal>UINT32</literal>. Remember that the <literal>MEMBER</literal> field can't contain any '.' (period)
1270 characters so it's known that the last part of the name in
1271 the "IDL" is the member name.
1274 In C++ that might end up looking like this:
1276 unsigned int org::freedesktop::DBus::StartServiceByName (const char *name,
1277 unsigned int flags);
1279 or equally valid, the return value could be done as an argument:
1281 void org::freedesktop::DBus::StartServiceByName (const char *name,
1283 unsigned int *resultcode);
1285 It's really up to the API designer how they want to make
1286 this look. You could design an API where the namespace wasn't used
1287 in C++, using STL or Qt, using varargs, or whatever you wanted.
1290 Signals are written as follows:
1292 org.freedesktop.DBus.NameLost (STRING name)
1294 Signals don't specify "in" vs. "out" because only
1295 a single direction is possible.
1298 It isn't especially encouraged to use this lame pseudo-IDL in actual
1299 API implementations; you might use the native notation for the
1300 language you're using, or you might use COM or CORBA IDL, for example.
1305 <sect2 id="message-protocol-handling-invalid">
1306 <title>Invalid Protocol and Spec Extensions</title>
1309 For security reasons, the D-Bus protocol should be strictly parsed and
1310 validated, with the exception of defined extension points. Any invalid
1311 protocol or spec violations should result in immediately dropping the
1312 connection without notice to the other end. Exceptions should be
1313 carefully considered, e.g. an exception may be warranted for a
1314 well-understood idiosyncrasy of a widely-deployed implementation. In
1315 cases where the other end of a connection is 100% trusted and known to
1316 be friendly, skipping validation for performance reasons could also make
1317 sense in certain cases.
1321 Generally speaking violations of the "must" requirements in this spec
1322 should be considered possible attempts to exploit security, and violations
1323 of the "should" suggestions should be considered legitimate (though perhaps
1324 they should generate an error in some cases).
1328 The following extension points are built in to D-Bus on purpose and must
1329 not be treated as invalid protocol. The extension points are intended
1330 for use by future versions of this spec, they are not intended for third
1331 parties. At the moment, the only way a third party could extend D-Bus
1332 without breaking interoperability would be to introduce a way to negotiate new
1333 feature support as part of the auth protocol, using EXTENSION_-prefixed
1334 commands. There is not yet a standard way to negotiate features.
1338 In the authentication protocol (see <xref linkend="auth-protocol"/>) unknown
1339 commands result in an ERROR rather than a disconnect. This enables
1340 future extensions to the protocol. Commands starting with EXTENSION_ are
1341 reserved for third parties.
1346 The authentication protocol supports pluggable auth mechanisms.
1351 The address format (see <xref linkend="addresses"/>) supports new
1357 Messages with an unknown type (something other than
1358 <literal>METHOD_CALL</literal>, <literal>METHOD_RETURN</literal>,
1359 <literal>ERROR</literal>, <literal>SIGNAL</literal>) are ignored.
1360 Unknown-type messages must still be well-formed in the same way
1361 as the known messages, however. They still have the normal
1367 Header fields with an unknown or unexpected field code must be ignored,
1368 though again they must still be well-formed.
1373 New standard interfaces (with new methods and signals) can of course be added.
1383 <sect1 id="auth-protocol">
1384 <title>Authentication Protocol</title>
1386 Before the flow of messages begins, two applications must
1387 authenticate. A simple plain-text protocol is used for
1388 authentication; this protocol is a SASL profile, and maps fairly
1389 directly from the SASL specification. The message encoding is
1390 NOT used here, only plain text messages.
1393 In examples, "C:" and "S:" indicate lines sent by the client and
1394 server respectively.
1396 <sect2 id="auth-protocol-overview">
1397 <title>Protocol Overview</title>
1399 The protocol is a line-based protocol, where each line ends with
1400 \r\n. Each line begins with an all-caps ASCII command name containing
1401 only the character range [A-Z_], a space, then any arguments for the
1402 command, then the \r\n ending the line. The protocol is
1403 case-sensitive. All bytes must be in the ASCII character set.
1405 Commands from the client to the server are as follows:
1408 <listitem><para>AUTH [mechanism] [initial-response]</para></listitem>
1409 <listitem><para>CANCEL</para></listitem>
1410 <listitem><para>BEGIN</para></listitem>
1411 <listitem><para>DATA <data in hex encoding></para></listitem>
1412 <listitem><para>ERROR [human-readable error explanation]</para></listitem>
1415 From server to client are as follows:
1418 <listitem><para>REJECTED <space-separated list of mechanism names></para></listitem>
1419 <listitem><para>OK <GUID in hex></para></listitem>
1420 <listitem><para>DATA <data in hex encoding></para></listitem>
1421 <listitem><para>ERROR</para></listitem>
1425 Unofficial extensions to the command set must begin with the letters
1426 "EXTENSION_", to avoid conflicts with future official commands.
1427 For example, "EXTENSION_COM_MYDOMAIN_DO_STUFF".
1430 <sect2 id="auth-nul-byte">
1431 <title>Special credentials-passing nul byte</title>
1433 Immediately after connecting to the server, the client must send a
1434 single nul byte. This byte may be accompanied by credentials
1435 information on some operating systems that use sendmsg() with
1436 SCM_CREDS or SCM_CREDENTIALS to pass credentials over UNIX domain
1437 sockets. However, the nul byte must be sent even on other kinds of
1438 socket, and even on operating systems that do not require a byte to be
1439 sent in order to transmit credentials. The text protocol described in
1440 this document begins after the single nul byte. If the first byte
1441 received from the client is not a nul byte, the server may disconnect
1445 A nul byte in any context other than the initial byte is an error;
1446 the protocol is ASCII-only.
1449 The credentials sent along with the nul byte may be used with the
1450 SASL mechanism EXTERNAL.
1453 <sect2 id="auth-command-auth">
1454 <title>AUTH command</title>
1456 If an AUTH command has no arguments, it is a request to list
1457 available mechanisms. The server must respond with a REJECTED
1458 command listing the mechanisms it understands, or with an error.
1461 If an AUTH command specifies a mechanism, and the server supports
1462 said mechanism, the server should begin exchanging SASL
1463 challenge-response data with the client using DATA commands.
1466 If the server does not support the mechanism given in the AUTH
1467 command, it must send either a REJECTED command listing the mechanisms
1468 it does support, or an error.
1471 If the [initial-response] argument is provided, it is intended for use
1472 with mechanisms that have no initial challenge (or an empty initial
1473 challenge), as if it were the argument to an initial DATA command. If
1474 the selected mechanism has an initial challenge and [initial-response]
1475 was provided, the server should reject authentication by sending
1479 If authentication succeeds after exchanging DATA commands,
1480 an OK command must be sent to the client.
1483 The first octet received by the client after the \r\n of the OK
1484 command must be the first octet of the authenticated/encrypted
1485 stream of D-Bus messages.
1488 The first octet received by the server after the \r\n of the BEGIN
1489 command from the client must be the first octet of the
1490 authenticated/encrypted stream of D-Bus messages.
1493 <sect2 id="auth-command-cancel">
1494 <title>CANCEL Command</title>
1496 At any time up to sending the BEGIN command, the client may send a
1497 CANCEL command. On receiving the CANCEL command, the server must
1498 send a REJECTED command and abort the current authentication
1502 <sect2 id="auth-command-data">
1503 <title>DATA Command</title>
1505 The DATA command may come from either client or server, and simply
1506 contains a hex-encoded block of data to be interpreted
1507 according to the SASL mechanism in use.
1510 Some SASL mechanisms support sending an "empty string";
1511 FIXME we need some way to do this.
1514 <sect2 id="auth-command-begin">
1515 <title>BEGIN Command</title>
1517 The BEGIN command acknowledges that the client has received an
1518 OK command from the server, and that the stream of messages
1522 The first octet received by the server after the \r\n of the BEGIN
1523 command from the client must be the first octet of the
1524 authenticated/encrypted stream of D-Bus messages.
1527 <sect2 id="auth-command-rejected">
1528 <title>REJECTED Command</title>
1530 The REJECTED command indicates that the current authentication
1531 exchange has failed, and further exchange of DATA is inappropriate.
1532 The client would normally try another mechanism, or try providing
1533 different responses to challenges.
1535 Optionally, the REJECTED command has a space-separated list of
1536 available auth mechanisms as arguments. If a server ever provides
1537 a list of supported mechanisms, it must provide the same list
1538 each time it sends a REJECTED message. Clients are free to
1539 ignore all lists received after the first.
1542 <sect2 id="auth-command-ok">
1543 <title>OK Command</title>
1545 The OK command indicates that the client has been authenticated,
1546 and that further communication will be a stream of D-Bus messages
1547 (optionally encrypted, as negotiated) rather than this protocol.
1550 The first octet received by the client after the \r\n of the OK
1551 command must be the first octet of the authenticated/encrypted
1552 stream of D-Bus messages.
1555 The client must respond to the OK command by sending a BEGIN
1556 command, followed by its stream of messages, or by disconnecting.
1557 The server must not accept additional commands using this protocol
1558 after the OK command has been sent.
1561 The OK command has one argument, which is the GUID of the server.
1562 See <xref linkend="addresses"/> for more on server GUIDs.
1565 <sect2 id="auth-command-error">
1566 <title>ERROR Command</title>
1568 The ERROR command indicates that either server or client did not
1569 know a command, does not accept the given command in the current
1570 context, or did not understand the arguments to the command. This
1571 allows the protocol to be extended; a client or server can send a
1572 command present or permitted only in new protocol versions, and if
1573 an ERROR is received instead of an appropriate response, fall back
1574 to using some other technique.
1577 If an ERROR is sent, the server or client that sent the
1578 error must continue as if the command causing the ERROR had never been
1579 received. However, the the server or client receiving the error
1580 should try something other than whatever caused the error;
1581 if only canceling/rejecting the authentication.
1584 If the D-Bus protocol changes incompatibly at some future time,
1585 applications implementing the new protocol would probably be able to
1586 check for support of the new protocol by sending a new command and
1587 receiving an ERROR from applications that don't understand it. Thus the
1588 ERROR feature of the auth protocol is an escape hatch that lets us
1589 negotiate extensions or changes to the D-Bus protocol in the future.
1592 <sect2 id="auth-examples">
1593 <title>Authentication examples</title>
1597 <title>Example of successful magic cookie authentication</title>
1599 (MAGIC_COOKIE is a made up mechanism)
1601 C: AUTH MAGIC_COOKIE 3138363935333137393635383634
1607 <title>Example of finding out mechanisms then picking one</title>
1610 S: REJECTED KERBEROS_V4 SKEY
1611 C: AUTH SKEY 7ab83f32ee
1612 S: DATA 8799cabb2ea93e
1613 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1619 <title>Example of client sends unknown command then falls back to regular auth</title>
1623 C: AUTH MAGIC_COOKIE 3736343435313230333039
1629 <title>Example of server doesn't support initial auth mechanism</title>
1631 C: AUTH MAGIC_COOKIE 3736343435313230333039
1632 S: REJECTED KERBEROS_V4 SKEY
1633 C: AUTH SKEY 7ab83f32ee
1634 S: DATA 8799cabb2ea93e
1635 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1641 <title>Example of wrong password or the like followed by successful retry</title>
1643 C: AUTH MAGIC_COOKIE 3736343435313230333039
1644 S: REJECTED KERBEROS_V4 SKEY
1645 C: AUTH SKEY 7ab83f32ee
1646 S: DATA 8799cabb2ea93e
1647 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1649 C: AUTH SKEY 7ab83f32ee
1650 S: DATA 8799cabb2ea93e
1651 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1657 <title>Example of skey cancelled and restarted</title>
1659 C: AUTH MAGIC_COOKIE 3736343435313230333039
1660 S: REJECTED KERBEROS_V4 SKEY
1661 C: AUTH SKEY 7ab83f32ee
1662 S: DATA 8799cabb2ea93e
1665 C: AUTH SKEY 7ab83f32ee
1666 S: DATA 8799cabb2ea93e
1667 C: DATA 8ac876e8f68ee9809bfa876e6f9876g8fa8e76e98f
1674 <sect2 id="auth-states">
1675 <title>Authentication state diagrams</title>
1678 This section documents the auth protocol in terms of
1679 a state machine for the client and the server. This is
1680 probably the most robust way to implement the protocol.
1683 <sect3 id="auth-states-client">
1684 <title>Client states</title>
1687 To more precisely describe the interaction between the
1688 protocol state machine and the authentication mechanisms the
1689 following notation is used: MECH(CHALL) means that the
1690 server challenge CHALL was fed to the mechanism MECH, which
1696 CONTINUE(RESP) means continue the auth conversation
1697 and send RESP as the response to the server;
1703 OK(RESP) means that after sending RESP to the server
1704 the client side of the auth conversation is finished
1705 and the server should return "OK";
1711 ERROR means that CHALL was invalid and could not be
1717 Both RESP and CHALL may be empty.
1721 The Client starts by getting an initial response from the
1722 default mechanism and sends AUTH MECH RESP, or AUTH MECH if
1723 the mechanism did not provide an initial response. If the
1724 mechanism returns CONTINUE, the client starts in state
1725 <emphasis>WaitingForData</emphasis>, if the mechanism
1726 returns OK the client starts in state
1727 <emphasis>WaitingForOK</emphasis>.
1731 The client should keep track of available mechanisms and
1732 which it mechanisms it has already attempted. This list is
1733 used to decide which AUTH command to send. When the list is
1734 exhausted, the client should give up and close the
1739 <title><emphasis>WaitingForData</emphasis></title>
1747 MECH(CHALL) returns CONTINUE(RESP) → send
1749 <emphasis>WaitingForData</emphasis>
1753 MECH(CHALL) returns OK(RESP) → send DATA
1754 RESP, goto <emphasis>WaitingForOK</emphasis>
1758 MECH(CHALL) returns ERROR → send ERROR
1759 [msg], goto <emphasis>WaitingForData</emphasis>
1767 Receive REJECTED [mechs] →
1768 send AUTH [next mech], goto
1769 WaitingForData or <emphasis>WaitingForOK</emphasis>
1774 Receive ERROR → send
1776 <emphasis>WaitingForReject</emphasis>
1781 Receive OK → send
1782 BEGIN, terminate auth
1783 conversation, authenticated
1788 Receive anything else → send
1790 <emphasis>WaitingForData</emphasis>
1798 <title><emphasis>WaitingForOK</emphasis></title>
1803 Receive OK → send BEGIN, terminate auth
1804 conversation, <emphasis>authenticated</emphasis>
1809 Receive REJECT [mechs] → send AUTH [next mech],
1810 goto <emphasis>WaitingForData</emphasis> or
1811 <emphasis>WaitingForOK</emphasis>
1817 Receive DATA → send CANCEL, goto
1818 <emphasis>WaitingForReject</emphasis>
1824 Receive ERROR → send CANCEL, goto
1825 <emphasis>WaitingForReject</emphasis>
1831 Receive anything else → send ERROR, goto
1832 <emphasis>WaitingForOK</emphasis>
1840 <title><emphasis>WaitingForReject</emphasis></title>
1845 Receive REJECT [mechs] → send AUTH [next mech],
1846 goto <emphasis>WaitingForData</emphasis> or
1847 <emphasis>WaitingForOK</emphasis>
1853 Receive anything else → terminate auth
1854 conversation, disconnect
1863 <sect3 id="auth-states-server">
1864 <title>Server states</title>
1867 For the server MECH(RESP) means that the client response
1868 RESP was fed to the the mechanism MECH, which returns one of
1873 CONTINUE(CHALL) means continue the auth conversation and
1874 send CHALL as the challenge to the client;
1880 OK means that the client has been successfully
1887 REJECT means that the client failed to authenticate or
1888 there was an error in RESP.
1893 The server starts out in state
1894 <emphasis>WaitingForAuth</emphasis>. If the client is
1895 rejected too many times the server must disconnect the
1900 <title><emphasis>WaitingForAuth</emphasis></title>
1906 Receive AUTH → send REJECTED [mechs], goto
1907 <emphasis>WaitingForAuth</emphasis>
1913 Receive AUTH MECH RESP
1917 MECH not valid mechanism → send REJECTED
1919 <emphasis>WaitingForAuth</emphasis>
1923 MECH(RESP) returns CONTINUE(CHALL) → send
1925 <emphasis>WaitingForData</emphasis>
1929 MECH(RESP) returns OK → send OK, goto
1930 <emphasis>WaitingForBegin</emphasis>
1934 MECH(RESP) returns REJECT → send REJECTED
1936 <emphasis>WaitingForAuth</emphasis>
1944 Receive BEGIN → terminate
1945 auth conversation, disconnect
1951 Receive ERROR → send REJECTED [mechs], goto
1952 <emphasis>WaitingForAuth</emphasis>
1958 Receive anything else → send
1960 <emphasis>WaitingForAuth</emphasis>
1969 <title><emphasis>WaitingForData</emphasis></title>
1977 MECH(RESP) returns CONTINUE(CHALL) → send
1979 <emphasis>WaitingForData</emphasis>
1983 MECH(RESP) returns OK → send OK, goto
1984 <emphasis>WaitingForBegin</emphasis>
1988 MECH(RESP) returns REJECT → send REJECTED
1990 <emphasis>WaitingForAuth</emphasis>
1998 Receive BEGIN → terminate auth conversation,
2005 Receive CANCEL → send REJECTED [mechs], goto
2006 <emphasis>WaitingForAuth</emphasis>
2012 Receive ERROR → send REJECTED [mechs], goto
2013 <emphasis>WaitingForAuth</emphasis>
2019 Receive anything else → send ERROR, goto
2020 <emphasis>WaitingForData</emphasis>
2028 <title><emphasis>WaitingForBegin</emphasis></title>
2033 Receive BEGIN → terminate auth conversation,
2034 client authenticated
2040 Receive CANCEL → send REJECTED [mechs], goto
2041 <emphasis>WaitingForAuth</emphasis>
2047 Receive ERROR → send REJECTED [mechs], goto
2048 <emphasis>WaitingForAuth</emphasis>
2054 Receive anything else → send ERROR, goto
2055 <emphasis>WaitingForBegin</emphasis>
2065 <sect2 id="auth-mechanisms">
2066 <title>Authentication mechanisms</title>
2068 This section describes some new authentication mechanisms.
2069 D-Bus also allows any standard SASL mechanism of course.
2071 <sect3 id="auth-mechanisms-sha">
2072 <title>DBUS_COOKIE_SHA1</title>
2074 The DBUS_COOKIE_SHA1 mechanism is designed to establish that a client
2075 has the ability to read a private file owned by the user being
2076 authenticated. If the client can prove that it has access to a secret
2077 cookie stored in this file, then the client is authenticated.
2078 Thus the security of DBUS_COOKIE_SHA1 depends on a secure home
2082 Authentication proceeds as follows:
2086 The client sends the username it would like to authenticate
2092 The server sends the name of its "cookie context" (see below); a
2093 space character; the integer ID of the secret cookie the client
2094 must demonstrate knowledge of; a space character; then a
2095 randomly-generated challenge string, all of this hex-encoded into
2101 The client locates the cookie and generates its own
2102 randomly-generated challenge string. The client then concatenates
2103 the server's decoded challenge, a ":" character, its own challenge,
2104 another ":" character, and the cookie. It computes the SHA-1 hash
2105 of this composite string as a hex digest. It concatenates the
2106 client's challenge string, a space character, and the SHA-1 hex
2107 digest, hex-encodes the result and sends it back to the server.
2112 The server generates the same concatenated string used by the
2113 client and computes its SHA-1 hash. It compares the hash with
2114 the hash received from the client; if the two hashes match, the
2115 client is authenticated.
2121 Each server has a "cookie context," which is a name that identifies a
2122 set of cookies that apply to that server. A sample context might be
2123 "org_freedesktop_session_bus". Context names must be valid ASCII,
2124 nonzero length, and may not contain the characters slash ("/"),
2125 backslash ("\"), space (" "), newline ("\n"), carriage return ("\r"),
2126 tab ("\t"), or period ("."). There is a default context,
2127 "org_freedesktop_general" that's used by servers that do not specify
2131 Cookies are stored in a user's home directory, in the directory
2132 <filename>~/.dbus-keyrings/</filename>. This directory must
2133 not be readable or writable by other users. If it is,
2134 clients and servers must ignore it. The directory
2135 contains cookie files named after the cookie context.
2138 A cookie file contains one cookie per line. Each line
2139 has three space-separated fields:
2143 The cookie ID number, which must be a non-negative integer and
2144 may not be used twice in the same file.
2149 The cookie's creation time, in UNIX seconds-since-the-epoch
2155 The cookie itself, a hex-encoded random block of bytes. The cookie
2156 may be of any length, though obviously security increases
2157 as the length increases.
2163 Only server processes modify the cookie file.
2164 They must do so with this procedure:
2168 Create a lockfile name by appending ".lock" to the name of the
2169 cookie file. The server should attempt to create this file
2170 using <literal>O_CREAT | O_EXCL</literal>. If file creation
2171 fails, the lock fails. Servers should retry for a reasonable
2172 period of time, then they may choose to delete an existing lock
2173 to keep users from having to manually delete a stale
2174 lock. <footnote><para>Lockfiles are used instead of real file
2175 locking <literal>fcntl()</literal> because real locking
2176 implementations are still flaky on network
2177 filesystems.</para></footnote>
2182 Once the lockfile has been created, the server loads the cookie
2183 file. It should then delete any cookies that are old (the
2184 timeout can be fairly short), or more than a reasonable
2185 time in the future (so that cookies never accidentally
2186 become permanent, if the clock was set far into the future
2187 at some point). If no recent keys remain, the
2188 server may generate a new key.
2193 The pruned and possibly added-to cookie file
2194 must be resaved atomically (using a temporary
2195 file which is rename()'d).
2200 The lock must be dropped by deleting the lockfile.
2206 Clients need not lock the file in order to load it,
2207 because servers are required to save the file atomically.
2212 <sect1 id="addresses">
2213 <title>Server Addresses</title>
2215 Server addresses consist of a transport name followed by a colon, and
2216 then an optional, comma-separated list of keys and values in the form key=value.
2217 Each value is escaped.
2221 <programlisting>unix:path=/tmp/dbus-test</programlisting>
2222 Which is the address to a unix socket with the path /tmp/dbus-test.
2225 Value escaping is similar to URI escaping but simpler.
2229 The set of optionally-escaped bytes is:
2230 <literal>[0-9A-Za-z_-/.\]</literal>. To escape, each
2231 <emphasis>byte</emphasis> (note, not character) which is not in the
2232 set of optionally-escaped bytes must be replaced with an ASCII
2233 percent (<literal>%</literal>) and the value of the byte in hex.
2234 The hex value must always be two digits, even if the first digit is
2235 zero. The optionally-escaped bytes may be escaped if desired.
2240 To unescape, append each byte in the value; if a byte is an ASCII
2241 percent (<literal>%</literal>) character then append the following
2242 hex value instead. It is an error if a <literal>%</literal> byte
2243 does not have two hex digits following. It is an error if a
2244 non-optionally-escaped byte is seen unescaped.
2248 The set of optionally-escaped bytes is intended to preserve address
2249 readability and convenience.
2253 A server may specify a key-value pair with the key <literal>guid</literal>
2254 and the value a hex-encoded 16-byte sequence. <xref linkend="uuids"/>
2255 describes the format of the <literal>guid</literal> field. If present,
2256 this UUID may be used to distinguish one server address from another. A
2257 server should use a different UUID for each address it listens on. For
2258 example, if a message bus daemon offers both UNIX domain socket and TCP
2259 connections, but treats clients the same regardless of how they connect,
2260 those two connections are equivalent post-connection but should have
2261 distinct UUIDs to distinguish the kinds of connection.
2265 The intent of the address UUID feature is to allow a client to avoid
2266 opening multiple identical connections to the same server, by allowing the
2267 client to check whether an address corresponds to an already-existing
2268 connection. Comparing two addresses is insufficient, because addresses
2269 can be recycled by distinct servers, and equivalent addresses may look
2270 different if simply compared as strings (for example, the host in a TCP
2271 address can be given as an IP address or as a hostname).
2275 Note that the address key is <literal>guid</literal> even though the
2276 rest of the API and documentation says "UUID," for historical reasons.
2280 [FIXME clarify if attempting to connect to each is a requirement
2281 or just a suggestion]
2282 When connecting to a server, multiple server addresses can be
2283 separated by a semi-colon. The library will then try to connect
2284 to the first address and if that fails, it'll try to connect to
2285 the next one specified, and so forth. For example
2286 <programlisting>unix:path=/tmp/dbus-test;unix:path=/tmp/dbus-test2</programlisting>
2291 <sect1 id="transports">
2292 <title>Transports</title>
2294 [FIXME we need to specify in detail each transport and its possible arguments]
2296 Current transports include: unix domain sockets (including
2297 abstract namespace on linux), TCP/IP, and a debug/testing transport using
2298 in-process pipes. Future possible transports include one that
2299 tunnels over X11 protocol.
2302 <sect2 id="transports-unix-domain-sockets">
2303 <title>Unix Domain Sockets</title>
2305 Unix domain sockets can be either paths in the file system or on Linux
2306 kernels, they can be abstract which are similar to paths but
2307 do not show up in the file system.
2311 When a socket is opened by the D-Bus library it truncates the path
2312 name right before the first trailing Nul byte. This is true for both
2313 normal paths and abstract paths. Note that this is a departure from
2314 previous versions of D-Bus that would create sockets with a fixed
2315 length path name. Names which were shorter than the fixed length
2316 would be padded by Nul bytes.
2319 <sect2 id="transports-nonce-tcp-sockets">
2320 <title>Nonce-secured TCP Sockets</title>
2322 The nonce-tcp transport provides a secured TCP transport, using a
2323 simple authentication mechanism to ensure that only clients with read
2324 access to a certain location in the filesystem can connect to the server.
2325 The server writes a secret, the nonce, to a file and an incoming client
2326 connection is only accepted if the client sends the nonce right after
2327 the connect. The nonce mechanism requires no setup and is orthogonal to
2328 the higher-level authentication mechanisms described in the
2329 Authentication section.
2333 On start, the server generates a random 16 byte nonce and writes it
2334 to a file in the user's temporary directory. The nonce file location
2335 is published as part of the server's D-Bus address using the
2336 "noncefile" query item.
2338 After an accept, the server reads 16 bytes from the socket. If the
2339 read bytes do not match the nonce stored in the nonce file, the
2340 server MUST immediately drop the connection.
2341 If the nonce match the received byte sequence, the client is accepted
2342 and the transport behaves like an unsecured tcp transport.
2345 After a successful connect to the server socket, the client must send
2346 the nonce from the file published by the server via the noncefile=
2347 query item and send it over the socket. After that, communication the
2348 transport behaves like an unsecured tcp transport.
2353 <sect1 id="naming-conventions">
2354 <title>Naming Conventions</title>
2357 D-Bus namespaces are all lowercase and correspond to reversed domain
2358 names, as with Java. e.g. "org.freedesktop"
2361 Interface, signal, method, and property names are "WindowsStyleCaps", note
2362 that the first letter is capitalized, unlike Java.
2365 Object paths are normally all lowercase with underscores used rather than
2371 <title>UUIDs</title>
2373 A working D-Bus implementation uses universally-unique IDs in two places.
2374 First, each server address has a UUID identifying the address,
2375 as described in <xref linkend="addresses"/>. Second, each operating
2376 system kernel instance running a D-Bus client or server has a UUID
2377 identifying that kernel, retrieved by invoking the method
2378 org.freedesktop.DBus.Peer.GetMachineId() (see <xref
2379 linkend="standard-interfaces-peer"/>).
2382 The term "UUID" in this document is intended literally, i.e. an
2383 identifier that is universally unique. It is not intended to refer to
2384 RFC4122, and in fact the D-Bus UUID is not compatible with that RFC.
2387 The UUID must contain 128 bits of data and be hex-encoded. The
2388 hex-encoded string may not contain hyphens or other non-hex-digit
2389 characters, and it must be exactly 32 characters long. To generate a
2390 UUID, the current reference implementation concatenates 96 bits of random
2391 data followed by the 32-bit time in seconds since the UNIX epoch (in big
2395 It would also be acceptable and probably better to simply generate 128
2396 bits of random data, as long as the random number generator is of high
2397 quality. The timestamp could conceivably help if the random bits are not
2398 very random. With a quality random number generator, collisions are
2399 extremely unlikely even with only 96 bits, so it's somewhat academic.
2402 Implementations should, however, stick to random data for the first 96 bits
2407 <sect1 id="standard-interfaces">
2408 <title>Standard Interfaces</title>
2410 See <xref linkend="message-protocol-types-notation"/> for details on
2411 the notation used in this section. There are some standard interfaces
2412 that may be useful across various D-Bus applications.
2414 <sect2 id="standard-interfaces-peer">
2415 <title><literal>org.freedesktop.DBus.Peer</literal></title>
2417 The <literal>org.freedesktop.DBus.Peer</literal> interface
2420 org.freedesktop.DBus.Peer.Ping ()
2421 org.freedesktop.DBus.Peer.GetMachineId (out STRING machine_uuid)
2425 On receipt of the <literal>METHOD_CALL</literal> message
2426 <literal>org.freedesktop.DBus.Peer.Ping</literal>, an application should do
2427 nothing other than reply with a <literal>METHOD_RETURN</literal> as
2428 usual. It does not matter which object path a ping is sent to. The
2429 reference implementation handles this method automatically.
2432 On receipt of the <literal>METHOD_CALL</literal> message
2433 <literal>org.freedesktop.DBus.Peer.GetMachineId</literal>, an application should
2434 reply with a <literal>METHOD_RETURN</literal> containing a hex-encoded
2435 UUID representing the identity of the machine the process is running on.
2436 This UUID must be the same for all processes on a single system at least
2437 until that system next reboots. It should be the same across reboots
2438 if possible, but this is not always possible to implement and is not
2440 It does not matter which object path a GetMachineId is sent to. The
2441 reference implementation handles this method automatically.
2444 The UUID is intended to be per-instance-of-the-operating-system, so may represent
2445 a virtual machine running on a hypervisor, rather than a physical machine.
2446 Basically if two processes see the same UUID, they should also see the same
2447 shared memory, UNIX domain sockets, process IDs, and other features that require
2448 a running OS kernel in common between the processes.
2451 The UUID is often used where other programs might use a hostname. Hostnames
2452 can change without rebooting, however, or just be "localhost" - so the UUID
2456 <xref linkend="uuids"/> explains the format of the UUID.
2460 <sect2 id="standard-interfaces-introspectable">
2461 <title><literal>org.freedesktop.DBus.Introspectable</literal></title>
2463 This interface has one method:
2465 org.freedesktop.DBus.Introspectable.Introspect (out STRING xml_data)
2469 Objects instances may implement
2470 <literal>Introspect</literal> which returns an XML description of
2471 the object, including its interfaces (with signals and methods), objects
2472 below it in the object path tree, and its properties.
2475 <xref linkend="introspection-format"/> describes the format of this XML string.
2478 <sect2 id="standard-interfaces-properties">
2479 <title><literal>org.freedesktop.DBus.Properties</literal></title>
2481 Many native APIs will have a concept of object <firstterm>properties</firstterm>
2482 or <firstterm>attributes</firstterm>. These can be exposed via the
2483 <literal>org.freedesktop.DBus.Properties</literal> interface.
2487 org.freedesktop.DBus.Properties.Get (in STRING interface_name,
2488 in STRING property_name,
2490 org.freedesktop.DBus.Properties.Set (in STRING interface_name,
2491 in STRING property_name,
2493 org.freedesktop.DBus.Properties.GetAll (in STRING interface_name,
2494 out DICT<STRING,VARIANT> props);
2498 The available properties and whether they are writable can be determined
2499 by calling <literal>org.freedesktop.DBus.Introspectable.Introspect</literal>,
2500 see <xref linkend="standard-interfaces-introspectable"/>.
2503 An empty string may be provided for the interface name; in this case,
2504 if there are multiple properties on an object with the same name,
2505 the results are undefined (picking one by according to an arbitrary
2506 deterministic rule, or returning an error, are the reasonable
2512 <sect1 id="introspection-format">
2513 <title>Introspection Data Format</title>
2515 As described in <xref linkend="standard-interfaces-introspectable"/>,
2516 objects may be introspected at runtime, returning an XML string
2517 that describes the object. The same XML format may be used in
2518 other contexts as well, for example as an "IDL" for generating
2519 static language bindings.
2522 Here is an example of introspection data:
2524 <!DOCTYPE node PUBLIC "-//freedesktop//DTD D-BUS Object Introspection 1.0//EN"
2525 "http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd">
2526 <node name="/org/freedesktop/sample_object">
2527 <interface name="org.freedesktop.SampleInterface">
2528 <method name="Frobate">
2529 <arg name="foo" type="i" direction="in"/>
2530 <arg name="bar" type="s" direction="out"/>
2531 <arg name="baz" type="a{us}" direction="out"/>
2532 <annotation name="org.freedesktop.DBus.Deprecated" value="true"/>
2534 <method name="Bazify">
2535 <arg name="bar" type="(iiu)" direction="in"/>
2536 <arg name="bar" type="v" direction="out"/>
2538 <method name="Mogrify">
2539 <arg name="bar" type="(iiav)" direction="in"/>
2541 <signal name="Changed">
2542 <arg name="new_value" type="b"/>
2544 <property name="Bar" type="y" access="readwrite"/>
2546 <node name="child_of_sample_object"/>
2547 <node name="another_child_of_sample_object"/>
2552 A more formal DTD and spec needs writing, but here are some quick notes.
2556 Only the root <node> element can omit the node name, as it's
2557 known to be the object that was introspected. If the root
2558 <node> does have a name attribute, it must be an absolute
2559 object path. If child <node> have object paths, they must be
2565 If a child <node> has any sub-elements, then they
2566 must represent a complete introspection of the child.
2567 If a child <node> is empty, then it may or may
2568 not have sub-elements; the child must be introspected
2569 in order to find out. The intent is that if an object
2570 knows that its children are "fast" to introspect
2571 it can go ahead and return their information, but
2572 otherwise it can omit it.
2577 The direction element on <arg> may be omitted,
2578 in which case it defaults to "in" for method calls
2579 and "out" for signals. Signals only allow "out"
2580 so while direction may be specified, it's pointless.
2585 The possible directions are "in" and "out",
2586 unlike CORBA there is no "inout"
2591 The possible property access flags are
2592 "readwrite", "read", and "write"
2597 Multiple interfaces can of course be listed for
2603 The "name" attribute on arguments is optional.
2609 Method, interface, property, and signal elements may have
2610 "annotations", which are generic key/value pairs of metadata.
2611 They are similar conceptually to Java's annotations and C# attributes.
2612 Well-known annotations:
2619 <entry>Values (separated by ,)</entry>
2620 <entry>Description</entry>
2625 <entry>org.freedesktop.DBus.Deprecated</entry>
2626 <entry>true,false</entry>
2627 <entry>Whether or not the entity is deprecated; defaults to false</entry>
2630 <entry>org.freedesktop.DBus.GLib.CSymbol</entry>
2631 <entry>(string)</entry>
2632 <entry>The C symbol; may be used for methods and interfaces</entry>
2635 <entry>org.freedesktop.DBus.Method.NoReply</entry>
2636 <entry>true,false</entry>
2637 <entry>If set, don't expect a reply to the method call; defaults to false.</entry>
2643 <sect1 id="message-bus">
2644 <title>Message Bus Specification</title>
2645 <sect2 id="message-bus-overview">
2646 <title>Message Bus Overview</title>
2648 The message bus accepts connections from one or more applications.
2649 Once connected, applications can exchange messages with other
2650 applications that are also connected to the bus.
2653 In order to route messages among connections, the message bus keeps a
2654 mapping from names to connections. Each connection has one
2655 unique-for-the-lifetime-of-the-bus name automatically assigned.
2656 Applications may request additional names for a connection. Additional
2657 names are usually "well-known names" such as
2658 "org.freedesktop.TextEditor". When a name is bound to a connection,
2659 that connection is said to <firstterm>own</firstterm> the name.
2662 The bus itself owns a special name, <literal>org.freedesktop.DBus</literal>.
2663 This name routes messages to the bus, allowing applications to make
2664 administrative requests. For example, applications can ask the bus
2665 to assign a name to a connection.
2668 Each name may have <firstterm>queued owners</firstterm>. When an
2669 application requests a name for a connection and the name is already in
2670 use, the bus will optionally add the connection to a queue waiting for
2671 the name. If the current owner of the name disconnects or releases
2672 the name, the next connection in the queue will become the new owner.
2676 This feature causes the right thing to happen if you start two text
2677 editors for example; the first one may request "org.freedesktop.TextEditor",
2678 and the second will be queued as a possible owner of that name. When
2679 the first exits, the second will take over.
2683 Messages may have a <literal>DESTINATION</literal> field (see <xref
2684 linkend="message-protocol-header-fields"/>). If the
2685 <literal>DESTINATION</literal> field is present, it specifies a message
2686 recipient by name. Method calls and replies normally specify this field.
2690 Signals normally do not specify a destination; they are sent to all
2691 applications with <firstterm>message matching rules</firstterm> that
2696 When the message bus receives a method call, if the
2697 <literal>DESTINATION</literal> field is absent, the call is taken to be
2698 a standard one-to-one message and interpreted by the message bus
2699 itself. For example, sending an
2700 <literal>org.freedesktop.DBus.Peer.Ping</literal> message with no
2701 <literal>DESTINATION</literal> will cause the message bus itself to
2702 reply to the ping immediately; the message bus will not make this
2703 message visible to other applications.
2707 Continuing the <literal>org.freedesktop.DBus.Peer.Ping</literal> example, if
2708 the ping message were sent with a <literal>DESTINATION</literal> name of
2709 <literal>com.yoyodyne.Screensaver</literal>, then the ping would be
2710 forwarded, and the Yoyodyne Corporation screensaver application would be
2711 expected to reply to the ping.
2715 <sect2 id="message-bus-names">
2716 <title>Message Bus Names</title>
2718 Each connection has at least one name, assigned at connection time and
2719 returned in response to the
2720 <literal>org.freedesktop.DBus.Hello</literal> method call. This
2721 automatically-assigned name is called the connection's <firstterm>unique
2722 name</firstterm>. Unique names are never reused for two different
2723 connections to the same bus.
2726 Ownership of a unique name is a prerequisite for interaction with
2727 the message bus. It logically follows that the unique name is always
2728 the first name that an application comes to own, and the last
2729 one that it loses ownership of.
2732 Unique connection names must begin with the character ':' (ASCII colon
2733 character); bus names that are not unique names must not begin
2734 with this character. (The bus must reject any attempt by an application
2735 to manually request a name beginning with ':'.) This restriction
2736 categorically prevents "spoofing"; messages sent to a unique name
2737 will always go to the expected connection.
2740 When a connection is closed, all the names that it owns are deleted (or
2741 transferred to the next connection in the queue if any).
2744 A connection can request additional names to be associated with it using
2745 the <literal>org.freedesktop.DBus.RequestName</literal> message. <xref
2746 linkend="message-protocol-names-bus"/> describes the format of a valid
2747 name. These names can be released again using the
2748 <literal>org.freedesktop.DBus.ReleaseName</literal> message.
2751 <sect3 id="bus-messages-request-name">
2752 <title><literal>org.freedesktop.DBus.RequestName</literal></title>
2756 UINT32 RequestName (in STRING name, in UINT32 flags)
2763 <entry>Argument</entry>
2765 <entry>Description</entry>
2771 <entry>STRING</entry>
2772 <entry>Name to request</entry>
2776 <entry>UINT32</entry>
2777 <entry>Flags</entry>
2787 <entry>Argument</entry>
2789 <entry>Description</entry>
2795 <entry>UINT32</entry>
2796 <entry>Return value</entry>
2803 This method call should be sent to
2804 <literal>org.freedesktop.DBus</literal> and asks the message bus to
2805 assign the given name to the method caller. Each name maintains a
2806 queue of possible owners, where the head of the queue is the primary
2807 or current owner of the name. Each potential owner in the queue
2808 maintains the DBUS_NAME_FLAG_ALLOW_REPLACEMENT and
2809 DBUS_NAME_FLAG_DO_NOT_QUEUE settings from its latest RequestName
2810 call. When RequestName is invoked the following occurs:
2814 If the method caller is currently the primary owner of the name,
2815 the DBUS_NAME_FLAG_ALLOW_REPLACEMENT and DBUS_NAME_FLAG_DO_NOT_QUEUE
2816 values are updated with the values from the new RequestName call,
2817 and nothing further happens.
2823 If the current primary owner (head of the queue) has
2824 DBUS_NAME_FLAG_ALLOW_REPLACEMENT set, and the RequestName
2825 invocation has the DBUS_NAME_FLAG_REPLACE_EXISTING flag, then
2826 the caller of RequestName replaces the current primary owner at
2827 the head of the queue and the current primary owner moves to the
2828 second position in the queue. If the caller of RequestName was
2829 in the queue previously its flags are updated with the values from
2830 the new RequestName in addition to moving it to the head of the queue.
2836 If replacement is not possible, and the method caller is
2837 currently in the queue but not the primary owner, its flags are
2838 updated with the values from the new RequestName call.
2844 If replacement is not possible, and the method caller is
2845 currently not in the queue, the method caller is appended to the
2852 If any connection in the queue has DBUS_NAME_FLAG_DO_NOT_QUEUE
2853 set and is not the primary owner, it is removed from the
2854 queue. This can apply to the previous primary owner (if it
2855 was replaced) or the method caller (if it updated the
2856 DBUS_NAME_FLAG_DO_NOT_QUEUE flag while still stuck in the
2857 queue, or if it was just added to the queue with that flag set).
2863 Note that DBUS_NAME_FLAG_REPLACE_EXISTING results in "jumping the
2864 queue," even if another application already in the queue had specified
2865 DBUS_NAME_FLAG_REPLACE_EXISTING. This comes up if a primary owner
2866 that does not allow replacement goes away, and the next primary owner
2867 does allow replacement. In this case, queued items that specified
2868 DBUS_NAME_FLAG_REPLACE_EXISTING <emphasis>do not</emphasis>
2869 automatically replace the new primary owner. In other words,
2870 DBUS_NAME_FLAG_REPLACE_EXISTING is not saved, it is only used at the
2871 time RequestName is called. This is deliberate to avoid an infinite loop
2872 anytime two applications are both DBUS_NAME_FLAG_ALLOW_REPLACEMENT
2873 and DBUS_NAME_FLAG_REPLACE_EXISTING.
2876 The flags argument contains any of the following values logically ORed
2883 <entry>Conventional Name</entry>
2884 <entry>Value</entry>
2885 <entry>Description</entry>
2890 <entry>DBUS_NAME_FLAG_ALLOW_REPLACEMENT</entry>
2894 If an application A specifies this flag and succeeds in
2895 becoming the owner of the name, and another application B
2896 later calls RequestName with the
2897 DBUS_NAME_FLAG_REPLACE_EXISTING flag, then application A
2898 will lose ownership and receive a
2899 <literal>org.freedesktop.DBus.NameLost</literal> signal, and
2900 application B will become the new owner. If DBUS_NAME_FLAG_ALLOW_REPLACEMENT
2901 is not specified by application A, or DBUS_NAME_FLAG_REPLACE_EXISTING
2902 is not specified by application B, then application B will not replace
2903 application A as the owner.
2908 <entry>DBUS_NAME_FLAG_REPLACE_EXISTING</entry>
2912 Try to replace the current owner if there is one. If this
2913 flag is not set the application will only become the owner of
2914 the name if there is no current owner. If this flag is set,
2915 the application will replace the current owner if
2916 the current owner specified DBUS_NAME_FLAG_ALLOW_REPLACEMENT.
2921 <entry>DBUS_NAME_FLAG_DO_NOT_QUEUE</entry>
2925 Without this flag, if an application requests a name that is
2926 already owned, the application will be placed in a queue to
2927 own the name when the current owner gives it up. If this
2928 flag is given, the application will not be placed in the
2929 queue, the request for the name will simply fail. This flag
2930 also affects behavior when an application is replaced as
2931 name owner; by default the application moves back into the
2932 waiting queue, unless this flag was provided when the application
2933 became the name owner.
2941 The return code can be one of the following values:
2947 <entry>Conventional Name</entry>
2948 <entry>Value</entry>
2949 <entry>Description</entry>
2954 <entry>DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER</entry>
2955 <entry>1</entry> <entry>The caller is now the primary owner of
2956 the name, replacing any previous owner. Either the name had no
2957 owner before, or the caller specified
2958 DBUS_NAME_FLAG_REPLACE_EXISTING and the current owner specified
2959 DBUS_NAME_FLAG_ALLOW_REPLACEMENT.</entry>
2962 <entry>DBUS_REQUEST_NAME_REPLY_IN_QUEUE</entry>
2965 <entry>The name already had an owner,
2966 DBUS_NAME_FLAG_DO_NOT_QUEUE was not specified, and either
2967 the current owner did not specify
2968 DBUS_NAME_FLAG_ALLOW_REPLACEMENT or the requesting
2969 application did not specify DBUS_NAME_FLAG_REPLACE_EXISTING.
2973 <entry>DBUS_REQUEST_NAME_REPLY_EXISTS</entry> <entry>3</entry>
2974 <entry>The name already has an owner,
2975 DBUS_NAME_FLAG_DO_NOT_QUEUE was specified, and either
2976 DBUS_NAME_FLAG_ALLOW_REPLACEMENT was not specified by the
2977 current owner, or DBUS_NAME_FLAG_REPLACE_EXISTING was not
2978 specified by the requesting application.</entry>
2981 <entry>DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER</entry>
2983 <entry>The application trying to request ownership of a name is already the owner of it.</entry>
2991 <sect3 id="bus-messages-release-name">
2992 <title><literal>org.freedesktop.DBus.ReleaseName</literal></title>
2996 UINT32 ReleaseName (in STRING name)
3003 <entry>Argument</entry>
3005 <entry>Description</entry>
3011 <entry>STRING</entry>
3012 <entry>Name to release</entry>
3022 <entry>Argument</entry>
3024 <entry>Description</entry>
3030 <entry>UINT32</entry>
3031 <entry>Return value</entry>
3038 This method call should be sent to
3039 <literal>org.freedesktop.DBus</literal> and asks the message bus to
3040 release the method caller's claim to the given name. If the caller is
3041 the primary owner, a new primary owner will be selected from the
3042 queue if any other owners are waiting. If the caller is waiting in
3043 the queue for the name, the caller will removed from the queue and
3044 will not be made an owner of the name if it later becomes available.
3045 If there are no other owners in the queue for the name, it will be
3046 removed from the bus entirely.
3048 The return code can be one of the following values:
3054 <entry>Conventional Name</entry>
3055 <entry>Value</entry>
3056 <entry>Description</entry>
3061 <entry>DBUS_RELEASE_NAME_REPLY_RELEASED</entry>
3062 <entry>1</entry> <entry>The caller has released his claim on
3063 the given name. Either the caller was the primary owner of
3064 the name, and the name is now unused or taken by somebody
3065 waiting in the queue for the name, or the caller was waiting
3066 in the queue for the name and has now been removed from the
3070 <entry>DBUS_RELEASE_NAME_REPLY_NON_EXISTENT</entry>
3072 <entry>The given name does not exist on this bus.</entry>
3075 <entry>DBUS_RELEASE_NAME_REPLY_NOT_OWNER</entry>
3077 <entry>The caller was not the primary owner of this name,
3078 and was also not waiting in the queue to own this name.</entry>
3087 <sect2 id="message-bus-routing">
3088 <title>Message Bus Message Routing</title>
3092 <sect3 id="message-bus-routing-match-rules">
3093 <title>Match Rules</title>
3095 An important part of the message bus routing protocol is match
3096 rules. Match rules describe what messages can be sent to a client
3097 based on the contents of the message. When a message is routed
3098 through the bus it is compared to clients' match rules. If any
3099 of the rules match, the message is dispatched to the client.
3100 If none of the rules match the message never leaves the bus. This
3101 is an effective way to control traffic over the bus and to make sure
3102 only relevant message need to be processed by the client.
3105 Match rules are added using the AddMatch bus method
3106 (see xref linkend="bus-messages-add-match"/>). Rules are
3107 specified as a string of comma separated key/value pairs.
3108 Excluding a key from the rule indicates a wildcard match.
3109 For instance excluding the the member from a match rule but
3110 adding a sender would let all messages from that sender through.
3111 An example of a complete rule would be
3112 "type='signal',sender='org.freedesktop.DBus',interface='org.freedesktop.DBus',member='Foo',path='/bar/foo',destination=':452345.34',arg2='bar'"
3115 The following table describes the keys that can be used to create
3117 The following table summarizes the D-Bus types.
3123 <entry>Possible Values</entry>
3124 <entry>Description</entry>
3129 <entry><literal>type</literal></entry>
3130 <entry>'signal', 'method_call', 'method_return', 'error'</entry>
3131 <entry>Match on the message type. An example of a type match is type='signal'</entry>
3134 <entry><literal>sender</literal></entry>
3135 <entry>A bus or unique name (see <xref linkend="term-bus-name"/>
3136 and <xref linkend="term-unique-name"/> respectively)
3138 <entry>Match messages sent by a particular sender. An example of a sender match
3139 is sender='org.freedesktop.Hal'</entry>
3142 <entry><literal>interface</literal></entry>
3143 <entry>An interface name (see <xref linkend="message-protocol-names-interface"/>)</entry>
3144 <entry>Match messages sent over or to a particular interface. An example of an
3145 interface match is interface='org.freedesktop.Hal.Manager'.
3146 If a message omits the interface header, it must not match any rule
3147 that specifies this key.</entry>
3150 <entry><literal>member</literal></entry>
3151 <entry>Any valid method or signal name</entry>
3152 <entry>Matches messages which have the give method or signal name. An example of
3153 a member match is member='NameOwnerChanged'</entry>
3156 <entry><literal>path</literal></entry>
3157 <entry>An object path (see <xref linkend="message-protocol-marshaling-object-path"/>)</entry>
3158 <entry>Matches messages which are sent from or to the given object. An example of a
3159 path match is path='/org/freedesktop/Hal/Manager'</entry>
3162 <entry><literal>destination</literal></entry>
3163 <entry>A unique name (see <xref linkend="term-unique-name"/>)</entry>
3164 <entry>Matches messages which are being sent to the given unique name. An
3165 example of a destination match is destination=':1.0'</entry>
3168 <entry><literal>arg[0, 1, 2, 3, ...]</literal></entry>
3169 <entry>Any string</entry>
3170 <entry>Arg matches are special and are used for further restricting the
3171 match based on the arguments in the body of a message. As of this time
3172 only string arguments can be matched. An example of an argument match
3173 would be arg3='Foo'. Only argument indexes from 0 to 63 should be
3177 <entry><literal>arg[0, 1, 2, 3, ...]path</literal></entry>
3178 <entry>Any string</entry>
3179 <entry>Argument path matches provide a specialised form of wildcard
3180 matching for path-like namespaces. As with normal argument matches,
3181 if the argument is exactly equal to the string given in the match
3182 rule then the rule is satisfied. Additionally, there is also a
3183 match when either the string given in the match rule or the
3184 appropriate message argument ends with '/' and is a prefix of the
3185 other. An example argument path match is arg0path='/aa/bb/'. This
3186 would match messages with first arguments of '/', '/aa/',
3187 '/aa/bb/', '/aa/bb/cc/' and '/aa/bb/cc'. It would not match
3188 messages with first arguments of '/aa/b', '/aa' or even '/aa/bb'.</entry>
3196 <sect2 id="message-bus-starting-services">
3197 <title>Message Bus Starting Services</title>
3199 The message bus can start applications on behalf of other applications.
3200 In CORBA terms, this would be called <firstterm>activation</firstterm>.
3201 An application that can be started in this way is called a
3202 <firstterm>service</firstterm>.
3205 With D-Bus, starting a service is normally done by name. That is,
3206 applications ask the message bus to start some program that will own a
3207 well-known name, such as <literal>org.freedesktop.TextEditor</literal>.
3208 This implies a contract documented along with the name
3209 <literal>org.freedesktop.TextEditor</literal> for which objects
3210 the owner of that name will provide, and what interfaces those
3214 To find an executable corresponding to a particular name, the bus daemon
3215 looks for <firstterm>service description files</firstterm>. Service
3216 description files define a mapping from names to executables. Different
3217 kinds of message bus will look for these files in different places, see
3218 <xref linkend="message-bus-types"/>.
3221 [FIXME the file format should be much better specified than "similar to
3222 .desktop entries" esp. since desktop entries are already
3223 badly-specified. ;-)] Service description files have the ".service" file
3224 extension. The message bus will only load service description files
3225 ending with .service; all other files will be ignored. The file format
3226 is similar to that of <ulink
3227 url="http://www.freedesktop.org/standards/desktop-entry-spec/desktop-entry-spec.html">desktop
3228 entries</ulink>. All service description files must be in UTF-8
3229 encoding. To ensure that there will be no name collisions, service files
3230 must be namespaced using the same mechanism as messages and service
3234 <title>Example service description file</title>
3236 # Sample service description file
3238 Names=org.freedesktop.ConfigurationDatabase;org.gnome.GConf;
3239 Exec=/usr/libexec/gconfd-2
3244 When an application asks to start a service by name, the bus daemon tries to
3245 find a service that will own that name. It then tries to spawn the
3246 executable associated with it. If this fails, it will report an
3247 error. [FIXME what happens if two .service files offer the same service;
3248 what kind of error is reported, should we have a way for the client to
3252 The executable launched will have the environment variable
3253 <literal>DBUS_STARTER_ADDRESS</literal> set to the address of the
3254 message bus so it can connect and request the appropriate names.
3257 The executable being launched may want to know whether the message bus
3258 starting it is one of the well-known message buses (see <xref
3259 linkend="message-bus-types"/>). To facilitate this, the bus must also set
3260 the <literal>DBUS_STARTER_BUS_TYPE</literal> environment variable if it is one
3261 of the well-known buses. The currently-defined values for this variable
3262 are <literal>system</literal> for the systemwide message bus,
3263 and <literal>session</literal> for the per-login-session message
3264 bus. The new executable must still connect to the address given
3265 in <literal>DBUS_STARTER_ADDRESS</literal>, but may assume that the
3266 resulting connection is to the well-known bus.
3269 [FIXME there should be a timeout somewhere, either specified
3270 in the .service file, by the client, or just a global value
3271 and if the client being activated fails to connect within that
3272 timeout, an error should be sent back.]
3275 <sect3 id="message-bus-starting-services-scope">
3276 <title>Message Bus Service Scope</title>
3278 The "scope" of a service is its "per-", such as per-session,
3279 per-machine, per-home-directory, or per-display. The reference
3280 implementation doesn't yet support starting services in a different
3281 scope from the message bus itself. So e.g. if you start a service
3282 on the session bus its scope is per-session.
3285 We could add an optional scope to a bus name. For example, for
3286 per-(display,session pair), we could have a unique ID for each display
3287 generated automatically at login and set on screen 0 by executing a
3288 special "set display ID" binary. The ID would be stored in a
3289 <literal>_DBUS_DISPLAY_ID</literal> property and would be a string of
3290 random bytes. This ID would then be used to scope names.
3291 Starting/locating a service could be done by ID-name pair rather than
3295 Contrast this with a per-display scope. To achieve that, we would
3296 want a single bus spanning all sessions using a given display.
3297 So we might set a <literal>_DBUS_DISPLAY_BUS_ADDRESS</literal>
3298 property on screen 0 of the display, pointing to this bus.
3303 <sect2 id="message-bus-types">
3304 <title>Well-known Message Bus Instances</title>
3306 Two standard message bus instances are defined here, along with how
3307 to locate them and where their service files live.
3309 <sect3 id="message-bus-types-login">
3310 <title>Login session message bus</title>
3312 Each time a user logs in, a <firstterm>login session message
3313 bus</firstterm> may be started. All applications in the user's login
3314 session may interact with one another using this message bus.
3317 The address of the login session message bus is given
3318 in the <literal>DBUS_SESSION_BUS_ADDRESS</literal> environment
3319 variable. If that variable is not set, applications may
3320 also try to read the address from the X Window System root
3321 window property <literal>_DBUS_SESSION_BUS_ADDRESS</literal>.
3322 The root window property must have type <literal>STRING</literal>.
3323 The environment variable should have precedence over the
3324 root window property.
3327 [FIXME specify location of .service files, probably using
3328 DESKTOP_DIRS etc. from basedir specification, though login session
3329 bus is not really desktop-specific]
3332 <sect3 id="message-bus-types-system">
3333 <title>System message bus</title>
3335 A computer may have a <firstterm>system message bus</firstterm>,
3336 accessible to all applications on the system. This message bus may be
3337 used to broadcast system events, such as adding new hardware devices,
3338 changes in the printer queue, and so forth.
3341 The address of the system message bus is given
3342 in the <literal>DBUS_SYSTEM_BUS_ADDRESS</literal> environment
3343 variable. If that variable is not set, applications should try
3344 to connect to the well-known address
3345 <literal>unix:path=/var/run/dbus/system_bus_socket</literal>.
3348 The D-Bus reference implementation actually honors the
3349 <literal>$(localstatedir)</literal> configure option
3350 for this address, on both client and server side.
3355 [FIXME specify location of system bus .service files]
3360 <sect2 id="message-bus-messages">
3361 <title>Message Bus Messages</title>
3363 The special message bus name <literal>org.freedesktop.DBus</literal>
3364 responds to a number of additional messages.
3367 <sect3 id="bus-messages-hello">
3368 <title><literal>org.freedesktop.DBus.Hello</literal></title>
3379 <entry>Argument</entry>
3381 <entry>Description</entry>
3387 <entry>STRING</entry>
3388 <entry>Unique name assigned to the connection</entry>
3395 Before an application is able to send messages to other applications
3396 it must send the <literal>org.freedesktop.DBus.Hello</literal> message
3397 to the message bus to obtain a unique name. If an application without
3398 a unique name tries to send a message to another application, or a
3399 message to the message bus itself that isn't the
3400 <literal>org.freedesktop.DBus.Hello</literal> message, it will be
3401 disconnected from the bus.
3404 There is no corresponding "disconnect" request; if a client wishes to
3405 disconnect from the bus, it simply closes the socket (or other
3406 communication channel).
3409 <sect3 id="bus-messages-list-names">
3410 <title><literal>org.freedesktop.DBus.ListNames</literal></title>
3414 ARRAY of STRING ListNames ()
3421 <entry>Argument</entry>
3423 <entry>Description</entry>
3429 <entry>ARRAY of STRING</entry>
3430 <entry>Array of strings where each string is a bus name</entry>
3437 Returns a list of all currently-owned names on the bus.
3440 <sect3 id="bus-messages-list-activatable-names">
3441 <title><literal>org.freedesktop.DBus.ListActivatableNames</literal></title>
3445 ARRAY of STRING ListActivatableNames ()
3452 <entry>Argument</entry>
3454 <entry>Description</entry>
3460 <entry>ARRAY of STRING</entry>
3461 <entry>Array of strings where each string is a bus name</entry>
3468 Returns a list of all names that can be activated on the bus.
3471 <sect3 id="bus-messages-name-exists">
3472 <title><literal>org.freedesktop.DBus.NameHasOwner</literal></title>
3476 BOOLEAN NameHasOwner (in STRING name)
3483 <entry>Argument</entry>
3485 <entry>Description</entry>
3491 <entry>STRING</entry>
3492 <entry>Name to check</entry>
3502 <entry>Argument</entry>
3504 <entry>Description</entry>
3510 <entry>BOOLEAN</entry>
3511 <entry>Return value, true if the name exists</entry>
3518 Checks if the specified name exists (currently has an owner).
3522 <sect3 id="bus-messages-name-owner-changed">
3523 <title><literal>org.freedesktop.DBus.NameOwnerChanged</literal></title>
3527 NameOwnerChanged (STRING name, STRING old_owner, STRING new_owner)
3534 <entry>Argument</entry>
3536 <entry>Description</entry>
3542 <entry>STRING</entry>
3543 <entry>Name with a new owner</entry>
3547 <entry>STRING</entry>
3548 <entry>Old owner or empty string if none</entry>
3552 <entry>STRING</entry>
3553 <entry>New owner or empty string if none</entry>
3560 This signal indicates that the owner of a name has changed.
3561 It's also the signal to use to detect the appearance of
3562 new names on the bus.
3565 <sect3 id="bus-messages-name-lost">
3566 <title><literal>org.freedesktop.DBus.NameLost</literal></title>
3570 NameLost (STRING name)
3577 <entry>Argument</entry>
3579 <entry>Description</entry>
3585 <entry>STRING</entry>
3586 <entry>Name which was lost</entry>
3593 This signal is sent to a specific application when it loses
3594 ownership of a name.
3598 <sect3 id="bus-messages-name-acquired">
3599 <title><literal>org.freedesktop.DBus.NameAcquired</literal></title>
3603 NameAcquired (STRING name)
3610 <entry>Argument</entry>
3612 <entry>Description</entry>
3618 <entry>STRING</entry>
3619 <entry>Name which was acquired</entry>
3626 This signal is sent to a specific application when it gains
3627 ownership of a name.
3631 <sect3 id="bus-messages-start-service-by-name">
3632 <title><literal>org.freedesktop.DBus.StartServiceByName</literal></title>
3636 UINT32 StartServiceByName (in STRING name, in UINT32 flags)
3643 <entry>Argument</entry>
3645 <entry>Description</entry>
3651 <entry>STRING</entry>
3652 <entry>Name of the service to start</entry>
3656 <entry>UINT32</entry>
3657 <entry>Flags (currently not used)</entry>
3667 <entry>Argument</entry>
3669 <entry>Description</entry>
3675 <entry>UINT32</entry>
3676 <entry>Return value</entry>
3681 Tries to launch the executable associated with a name. For more information, see <xref linkend="message-bus-starting-services"/>.
3685 The return value can be one of the following values:
3690 <entry>Identifier</entry>
3691 <entry>Value</entry>
3692 <entry>Description</entry>
3697 <entry>DBUS_START_REPLY_SUCCESS</entry>
3699 <entry>The service was successfully started.</entry>
3702 <entry>DBUS_START_REPLY_ALREADY_RUNNING</entry>
3704 <entry>A connection already owns the given name.</entry>
3713 <sect3 id="bus-messages-update-activation-environment">
3714 <title><literal>org.freedesktop.DBus.UpdateActivationEnvironment</literal></title>
3718 UpdateActivationEnvironment (in ARRAY of DICT<STRING,STRING> environment)
3725 <entry>Argument</entry>
3727 <entry>Description</entry>
3733 <entry>ARRAY of DICT<STRING,STRING></entry>
3734 <entry>Environment to add or update</entry>
3739 Normally, session bus activated services inherit the environment of the bus daemon. This method adds to or modifies that environment when activating services.
3742 Some bus instances, such as the standard system bus, may disable access to this method for some or all callers.
3747 <sect3 id="bus-messages-get-name-owner">
3748 <title><literal>org.freedesktop.DBus.GetNameOwner</literal></title>
3752 STRING GetNameOwner (in STRING name)
3759 <entry>Argument</entry>
3761 <entry>Description</entry>
3767 <entry>STRING</entry>
3768 <entry>Name to get the owner of</entry>
3778 <entry>Argument</entry>
3780 <entry>Description</entry>
3786 <entry>STRING</entry>
3787 <entry>Return value, a unique connection name</entry>
3792 Returns the unique connection name of the primary owner of the name
3793 given. If the requested name doesn't have an owner, returns a
3794 <literal>org.freedesktop.DBus.Error.NameHasNoOwner</literal> error.
3798 <sect3 id="bus-messages-get-connection-unix-user">
3799 <title><literal>org.freedesktop.DBus.GetConnectionUnixUser</literal></title>
3803 UINT32 GetConnectionUnixUser (in STRING connection_name)
3810 <entry>Argument</entry>
3812 <entry>Description</entry>
3818 <entry>STRING</entry>
3819 <entry>Name of the connection to query</entry>
3829 <entry>Argument</entry>
3831 <entry>Description</entry>
3837 <entry>UINT32</entry>
3838 <entry>unix user id</entry>
3843 Returns the unix uid of the process connected to the server. If unable to
3844 determine it, a <literal>org.freedesktop.DBus.Error.Failed</literal>
3849 <sect3 id="bus-messages-add-match">
3850 <title><literal>org.freedesktop.DBus.AddMatch</literal></title>
3854 AddMatch (in STRING rule)
3861 <entry>Argument</entry>
3863 <entry>Description</entry>
3869 <entry>STRING</entry>
3870 <entry>Match rule to add to the connection</entry>
3875 Adds a match rule to match messages going through the message bus (see <xref linkend='message-bus-routing-match-rules'/>).
3876 If the bus does not have enough resources the <literal>org.freedesktop.DBus.Error.OOM</literal>
3880 <sect3 id="bus-messages-remove-match">
3881 <title><literal>org.freedesktop.DBus.RemoveMatch</literal></title>
3885 RemoveMatch (in STRING rule)
3892 <entry>Argument</entry>
3894 <entry>Description</entry>
3900 <entry>STRING</entry>
3901 <entry>Match rule to remove from the connection</entry>
3906 Removes the first rule that matches (see <xref linkend='message-bus-routing-match-rules'/>).
3907 If the rule is not found the <literal>org.freedesktop.DBus.Error.MatchRuleNotFound</literal>
3912 <sect3 id="bus-messages-get-id">
3913 <title><literal>org.freedesktop.DBus.GetId</literal></title>
3917 GetId (out STRING id)
3924 <entry>Argument</entry>
3926 <entry>Description</entry>
3932 <entry>STRING</entry>
3933 <entry>Unique ID identifying the bus daemon</entry>
3938 Gets the unique ID of the bus. The unique ID here is shared among all addresses the
3939 bus daemon is listening on (TCP, UNIX domain socket, etc.) and its format is described in
3940 <xref linkend="uuids"/>. Each address the bus is listening on also has its own unique
3941 ID, as described in <xref linkend="addresses"/>. The per-bus and per-address IDs are not related.
3942 There is also a per-machine ID, described in <xref linkend="standard-interfaces-peer"/> and returned
3943 by org.freedesktop.DBus.Peer.GetMachineId().
3944 For a desktop session bus, the bus ID can be used as a way to uniquely identify a user's session.
3952 <appendix id="implementation-notes">
3953 <title>Implementation notes</title>
3954 <sect1 id="implementation-notes-subsection">
3962 <glossary><title>Glossary</title>
3964 This glossary defines some of the terms used in this specification.
3967 <glossentry id="term-bus-name"><glossterm>Bus Name</glossterm>
3970 The message bus maintains an association between names and
3971 connections. (Normally, there's one connection per application.) A
3972 bus name is simply an identifier used to locate connections. For
3973 example, the hypothetical <literal>com.yoyodyne.Screensaver</literal>
3974 name might be used to send a message to a screensaver from Yoyodyne
3975 Corporation. An application is said to <firstterm>own</firstterm> a
3976 name if the message bus has associated the application's connection
3977 with the name. Names may also have <firstterm>queued
3978 owners</firstterm> (see <xref linkend="term-queued-owner"/>).
3979 The bus assigns a unique name to each connection,
3980 see <xref linkend="term-unique-name"/>. Other names
3981 can be thought of as "well-known names" and are
3982 used to find applications that offer specific functionality.
3987 <glossentry id="term-message"><glossterm>Message</glossterm>
3990 A message is the atomic unit of communication via the D-Bus
3991 protocol. It consists of a <firstterm>header</firstterm> and a
3992 <firstterm>body</firstterm>; the body is made up of
3993 <firstterm>arguments</firstterm>.
3998 <glossentry id="term-message-bus"><glossterm>Message Bus</glossterm>
4001 The message bus is a special application that forwards
4002 or routes messages between a group of applications
4003 connected to the message bus. It also manages
4004 <firstterm>names</firstterm> used for routing
4010 <glossentry id="term-name"><glossterm>Name</glossterm>
4013 See <xref linkend="term-bus-name"/>. "Name" may
4014 also be used to refer to some of the other names
4015 in D-Bus, such as interface names.
4020 <glossentry id="namespace"><glossterm>Namespace</glossterm>
4023 Used to prevent collisions when defining new interfaces or bus
4024 names. The convention used is the same one Java uses for defining
4025 classes: a reversed domain name.
4030 <glossentry id="term-object"><glossterm>Object</glossterm>
4033 Each application contains <firstterm>objects</firstterm>, which have
4034 <firstterm>interfaces</firstterm> and
4035 <firstterm>methods</firstterm>. Objects are referred to by a name,
4036 called a <firstterm>path</firstterm>.
4041 <glossentry id="one-to-one"><glossterm>One-to-One</glossterm>
4044 An application talking directly to another application, without going
4045 through a message bus. One-to-one connections may be "peer to peer" or
4046 "client to server." The D-Bus protocol has no concept of client
4047 vs. server after a connection has authenticated; the flow of messages
4048 is symmetrical (full duplex).
4053 <glossentry id="term-path"><glossterm>Path</glossterm>
4056 Object references (object names) in D-Bus are organized into a
4057 filesystem-style hierarchy, so each object is named by a path. As in
4058 LDAP, there's no difference between "files" and "directories"; a path
4059 can refer to an object, while still having child objects below it.
4064 <glossentry id="term-queued-owner"><glossterm>Queued Name Owner</glossterm>
4067 Each bus name has a primary owner; messages sent to the name go to the
4068 primary owner. However, certain names also maintain a queue of
4069 secondary owners "waiting in the wings." If the primary owner releases
4070 the name, then the first secondary owner in the queue automatically
4071 becomes the new owner of the name.
4076 <glossentry id="term-service"><glossterm>Service</glossterm>
4079 A service is an executable that can be launched by the bus daemon.
4080 Services normally guarantee some particular features, for example they
4081 may guarantee that they will request a specific name such as
4082 "org.freedesktop.Screensaver", have a singleton object
4083 "/org/freedesktop/Application", and that object will implement the
4084 interface "org.freedesktop.ScreensaverControl".
4089 <glossentry id="term-service-description-files"><glossterm>Service Description Files</glossterm>
4092 ".service files" tell the bus about service applications that can be
4093 launched (see <xref linkend="term-service"/>). Most importantly they
4094 provide a mapping from bus names to services that will request those
4095 names when they start up.
4100 <glossentry id="term-unique-name"><glossterm>Unique Connection Name</glossterm>
4103 The special name automatically assigned to each connection by the
4104 message bus. This name will never change owner, and will be unique
4105 (never reused during the lifetime of the message bus).
4106 It will begin with a ':' character.