mirror of
https://github.com/AuxXxilium/eudev.git
synced 2024-12-25 03:49:00 +07:00
util: make use of get_user_creds() and get_group_creds() wherever applicable
This commit is contained in:
parent
e6a6b40679
commit
4b67834e9f
@ -549,36 +549,6 @@ static int restore_confirm_stdio(const ExecContext *context,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int get_group_creds(const char *groupname, gid_t *gid) {
|
||||
struct group *g;
|
||||
gid_t id;
|
||||
|
||||
assert(groupname);
|
||||
assert(gid);
|
||||
|
||||
/* We enforce some special rules for gid=0: in order to avoid
|
||||
* NSS lookups for root we hardcode its data. */
|
||||
|
||||
if (streq(groupname, "root") || streq(groupname, "0")) {
|
||||
*gid = 0;
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (parse_gid(groupname, &id) >= 0) {
|
||||
errno = 0;
|
||||
g = getgrgid(id);
|
||||
} else {
|
||||
errno = 0;
|
||||
g = getgrnam(groupname);
|
||||
}
|
||||
|
||||
if (!g)
|
||||
return errno != 0 ? -errno : -ESRCH;
|
||||
|
||||
*gid = g->gr_gid;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int enforce_groups(const ExecContext *context, const char *username, gid_t gid) {
|
||||
bool keep_groups = false;
|
||||
int r;
|
||||
@ -590,9 +560,12 @@ static int enforce_groups(const ExecContext *context, const char *username, gid_
|
||||
|
||||
if (context->group || username) {
|
||||
|
||||
if (context->group)
|
||||
if ((r = get_group_creds(context->group, &gid)) < 0)
|
||||
if (context->group) {
|
||||
const char *g = context->group;
|
||||
|
||||
if ((r = get_group_creds(&g, &gid)) < 0)
|
||||
return r;
|
||||
}
|
||||
|
||||
/* First step, initialize groups from /etc/groups */
|
||||
if (username && gid != 0) {
|
||||
@ -627,13 +600,16 @@ static int enforce_groups(const ExecContext *context, const char *username, gid_
|
||||
k = 0;
|
||||
|
||||
STRV_FOREACH(i, context->supplementary_groups) {
|
||||
const char *g;
|
||||
|
||||
if (k >= ngroups_max) {
|
||||
free(gids);
|
||||
return -E2BIG;
|
||||
}
|
||||
|
||||
if ((r = get_group_creds(*i, gids+k)) < 0) {
|
||||
g = *i;
|
||||
r = get_group_creds(&g, gids+k);
|
||||
if (r < 0) {
|
||||
free(gids);
|
||||
return r;
|
||||
}
|
||||
|
@ -1061,19 +1061,13 @@ static int show(DBusConnection *bus, char **args, unsigned n) {
|
||||
uid_t uid;
|
||||
uint32_t u;
|
||||
|
||||
if (parse_uid(args[i], &uid) < 0) {
|
||||
struct passwd *pw;
|
||||
|
||||
pw = getpwnam(args[i]);
|
||||
if (!pw) {
|
||||
r = get_user_creds((const char**) (args+i), &uid, NULL, NULL);
|
||||
if (r < 0) {
|
||||
log_error("User %s unknown.", args[i]);
|
||||
ret = -ENOENT;
|
||||
r = -ENOENT;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
uid = pw->pw_uid;
|
||||
}
|
||||
|
||||
m = dbus_message_new_method_call(
|
||||
"org.freedesktop.login1",
|
||||
"/org/freedesktop/login1",
|
||||
@ -1298,20 +1292,12 @@ static int enable_linger(DBusConnection *bus, char **args, unsigned n) {
|
||||
goto finish;
|
||||
}
|
||||
|
||||
if (parse_uid(args[i], &uid) < 0) {
|
||||
struct passwd *pw;
|
||||
|
||||
errno = 0;
|
||||
pw = getpwnam(args[i]);
|
||||
if (!pw) {
|
||||
ret = errno ? -errno : -ENOENT;
|
||||
ret = get_user_creds((const char**) (args+i), &uid, NULL, NULL);
|
||||
if (ret < 0) {
|
||||
log_error("Failed to resolve user %s: %s", args[i], strerror(-ret));
|
||||
goto finish;
|
||||
}
|
||||
|
||||
uid = pw->pw_uid;
|
||||
}
|
||||
|
||||
u = (uint32_t) uid;
|
||||
if (!dbus_message_append_args(m,
|
||||
DBUS_TYPE_UINT32, &u,
|
||||
@ -1335,6 +1321,8 @@ static int enable_linger(DBusConnection *bus, char **args, unsigned n) {
|
||||
m = reply = NULL;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
|
||||
finish:
|
||||
if (m)
|
||||
dbus_message_unref(m);
|
||||
@ -1373,20 +1361,12 @@ static int terminate_user(DBusConnection *bus, char **args, unsigned n) {
|
||||
goto finish;
|
||||
}
|
||||
|
||||
if (parse_uid(args[i], &uid) < 0) {
|
||||
struct passwd *pw;
|
||||
|
||||
errno = 0;
|
||||
pw = getpwnam(args[i]);
|
||||
if (!pw) {
|
||||
ret = errno ? -errno : -ENOENT;
|
||||
ret = get_user_creds((const char**) (args+i), &uid, NULL, NULL);
|
||||
if (ret < 0) {
|
||||
log_error("Failed to look up user %s: %s", args[i], strerror(-ret));
|
||||
goto finish;
|
||||
}
|
||||
|
||||
uid = pw->pw_uid;
|
||||
}
|
||||
|
||||
u = (uint32_t) uid;
|
||||
if (!dbus_message_append_args(m,
|
||||
DBUS_TYPE_UINT32, &u,
|
||||
@ -1408,6 +1388,8 @@ static int terminate_user(DBusConnection *bus, char **args, unsigned n) {
|
||||
m = reply = NULL;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
|
||||
finish:
|
||||
if (m)
|
||||
dbus_message_unref(m);
|
||||
@ -1449,20 +1431,12 @@ static int kill_user(DBusConnection *bus, char **args, unsigned n) {
|
||||
goto finish;
|
||||
}
|
||||
|
||||
if (parse_uid(args[i], &uid) < 0) {
|
||||
struct passwd *pw;
|
||||
|
||||
errno = 0;
|
||||
pw = getpwnam(args[i]);
|
||||
if (!pw) {
|
||||
ret = errno ? -errno : -ENOENT;
|
||||
ret = get_user_creds((const char**) (args+i), &uid, NULL, NULL);
|
||||
if (ret < 0) {
|
||||
log_error("Failed to look up user %s: %s", args[i], strerror(-ret));
|
||||
goto finish;
|
||||
}
|
||||
|
||||
uid = pw->pw_uid;
|
||||
}
|
||||
|
||||
u = (uint32_t) uid;
|
||||
if (!dbus_message_append_args(m,
|
||||
DBUS_TYPE_UINT32, &u,
|
||||
@ -1485,6 +1459,8 @@ static int kill_user(DBusConnection *bus, char **args, unsigned n) {
|
||||
m = reply = NULL;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
|
||||
finish:
|
||||
if (m)
|
||||
dbus_message_unref(m);
|
||||
|
13
src/logind.c
13
src/logind.c
@ -239,17 +239,18 @@ int manager_add_user(Manager *m, uid_t uid, gid_t gid, const char *name, User **
|
||||
}
|
||||
|
||||
int manager_add_user_by_name(Manager *m, const char *name, User **_user) {
|
||||
struct passwd *p;
|
||||
uid_t uid;
|
||||
gid_t gid;
|
||||
int r;
|
||||
|
||||
assert(m);
|
||||
assert(name);
|
||||
|
||||
errno = 0;
|
||||
p = getpwnam(name);
|
||||
if (!p)
|
||||
return errno ? -errno : -ENOENT;
|
||||
r = get_user_creds(&name, &uid, &gid, NULL);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return manager_add_user(m, p->pw_uid, p->pw_gid, name, _user);
|
||||
return manager_add_user(m, uid, gid, name, _user);
|
||||
}
|
||||
|
||||
int manager_add_user_by_uid(Manager *m, uid_t uid, User **_user) {
|
||||
|
@ -757,18 +757,11 @@ static int parse_line(const char *fname, unsigned line, const char *buffer) {
|
||||
}
|
||||
|
||||
if (user && !streq(user, "-")) {
|
||||
uid_t uid;
|
||||
struct passwd *p;
|
||||
const char *u = user;
|
||||
|
||||
if (streq(user, "root") || streq(user, "0"))
|
||||
i->uid = 0;
|
||||
else if (parse_uid(user, &uid) >= 0)
|
||||
i->uid = uid;
|
||||
else if ((p = getpwnam(user)))
|
||||
i->uid = p->pw_uid;
|
||||
else {
|
||||
r = get_user_creds(&u, &i->uid, NULL, NULL);
|
||||
if (r < 0) {
|
||||
log_error("[%s:%u] Unknown user '%s'.", fname, line, user);
|
||||
r = -ENOENT;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
@ -776,18 +769,11 @@ static int parse_line(const char *fname, unsigned line, const char *buffer) {
|
||||
}
|
||||
|
||||
if (group && !streq(group, "-")) {
|
||||
gid_t gid;
|
||||
struct group *g;
|
||||
const char *g = group;
|
||||
|
||||
if (streq(group, "root") || streq(group, "0"))
|
||||
i->gid = 0;
|
||||
else if (parse_gid(group, &gid) >= 0)
|
||||
i->gid = gid;
|
||||
else if ((g = getgrnam(group)))
|
||||
i->gid = g->gr_gid;
|
||||
else {
|
||||
r = get_group_creds(&g, &i->gid);
|
||||
if (r < 0) {
|
||||
log_error("[%s:%u] Unknown group '%s'.", fname, line, group);
|
||||
r = -ENOENT;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
|
54
src/util.c
54
src/util.c
@ -54,6 +54,7 @@
|
||||
#include <sys/time.h>
|
||||
#include <linux/rtc.h>
|
||||
#include <glob.h>
|
||||
#include <grp.h>
|
||||
|
||||
#include "macro.h"
|
||||
#include "util.h"
|
||||
@ -5266,17 +5267,20 @@ int get_user_creds(const char **username, uid_t *uid, gid_t *gid, const char **h
|
||||
|
||||
assert(username);
|
||||
assert(*username);
|
||||
assert(uid);
|
||||
assert(gid);
|
||||
assert(home);
|
||||
|
||||
/* We enforce some special rules for uid=0: in order to avoid
|
||||
* NSS lookups for root we hardcode its data. */
|
||||
|
||||
if (streq(*username, "root") || streq(*username, "0")) {
|
||||
*username = "root";
|
||||
|
||||
if (uid)
|
||||
*uid = 0;
|
||||
|
||||
if (gid)
|
||||
*gid = 0;
|
||||
|
||||
if (home)
|
||||
*home = "/root";
|
||||
return 0;
|
||||
}
|
||||
@ -5300,9 +5304,53 @@ int get_user_creds(const char **username, uid_t *uid, gid_t *gid, const char **h
|
||||
if (!p)
|
||||
return errno != 0 ? -errno : -ESRCH;
|
||||
|
||||
if (uid)
|
||||
*uid = p->pw_uid;
|
||||
|
||||
if (gid)
|
||||
*gid = p->pw_gid;
|
||||
|
||||
if (home)
|
||||
*home = p->pw_dir;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int get_group_creds(const char **groupname, gid_t *gid) {
|
||||
struct group *g;
|
||||
gid_t id;
|
||||
|
||||
assert(groupname);
|
||||
|
||||
/* We enforce some special rules for gid=0: in order to avoid
|
||||
* NSS lookups for root we hardcode its data. */
|
||||
|
||||
if (streq(*groupname, "root") || streq(*groupname, "0")) {
|
||||
*groupname = "root";
|
||||
|
||||
if (gid)
|
||||
*gid = 0;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (parse_gid(*groupname, &id) >= 0) {
|
||||
errno = 0;
|
||||
g = getgrgid(id);
|
||||
|
||||
if (g)
|
||||
*groupname = g->gr_name;
|
||||
} else {
|
||||
errno = 0;
|
||||
g = getgrnam(*groupname);
|
||||
}
|
||||
|
||||
if (!g)
|
||||
return errno != 0 ? -errno : -ESRCH;
|
||||
|
||||
if (gid)
|
||||
*gid = g->gr_gid;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -449,6 +449,7 @@ bool display_is_local(const char *display);
|
||||
int socket_from_display(const char *display, char **path);
|
||||
|
||||
int get_user_creds(const char **username, uid_t *uid, gid_t *gid, const char **home);
|
||||
int get_group_creds(const char **groupname, gid_t *gid);
|
||||
|
||||
int glob_exists(const char *path);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user