sudo/plugins/sudoers/group_plugin.c

314 lines
7.9 KiB
C

/*
* SPDX-License-Identifier: ISC
*
* Copyright (c) 2010-2020, 2022 Todd C. Miller <Todd.Miller@sudo.ws>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
/*
* This is an open source non-commercial project. Dear PVS-Studio, please check it.
* PVS-Studio Static Code Analyzer for C, C++ and C#: http://www.viva64.com
*/
#include <config.h>
#include <sys/stat.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <ctype.h>
#include <errno.h>
#include <sudoers.h>
#include <sudo_dso.h>
#if defined(HAVE_DLOPEN) || defined(HAVE_SHL_LOAD)
static void *group_handle;
static struct sudoers_group_plugin *group_plugin;
/*
* Check for a fallback path when the original group plugin is not loadable.
* Returns true on success, rewriting path and filling in sb, else false.
*/
static bool
group_plugin_fallback(char *path, size_t pathsize)
{
#if defined(__LP64__)
char newpath[PATH_MAX];
bool ret = false;
struct stat sb;
int len;
debug_decl(group_plugin_fallback, SUDOERS_DEBUG_UTIL);
# if defined(__sun__) || defined(__linux__)
/*
* Solaris uses /lib/64 and /usr/lib/64 for 64-bit libraries.
* Linux may use /lib64 and /usr/lib64 for 64-bit libraries.
* If dirname(path) ends in /lib, try /lib/64 (Solaris) or /lib64 (Linux).
*/
# if defined(__sun__)
const char *lib64 = "lib/64";
# else
const char *lib64 = "lib64";
# endif
const char *base, *slash;
int dirlen;
slash = strrchr(path, '/');
if (slash == NULL) {
goto done;
}
base = slash + 1;
/* Collapse consecutive slashes. */
while (slash > path && slash[-1] == '/') {
slash--;
}
/* If directory ends in /lib/, try again with /lib/64/ or /lib64/. */
dirlen = (int)(slash - path);
if (dirlen < 4 || strncmp(slash - 4, "/lib", 4) != 0) {
goto done;
}
dirlen -= 4;
len = snprintf(newpath, sizeof(newpath), "%.*s/%s/%s", dirlen, path, lib64,
base);
# else /* !__sun__ && !__linux__ */
/*
* Multilib not supported, check for a path of the form libfoo64.so.
*/
const char *dot;
int plen;
dot = strrchr(path, '.');
if (dot == NULL) {
goto done;
}
plen = (int)(dot - path);
/* If basename(path) doesn't match libfoo64.so, try adding the 64. */
if (plen >= 2 && strncmp(dot - 2, "64", 2) == 0) {
goto done;
}
len = snprintf(newpath, sizeof(newpath), "%.*s64%s", plen, path, dot);
# endif /* __sun__ || __linux__ */
if (len < 0 || len >= ssizeof(newpath)) {
errno = ENAMETOOLONG;
goto done;
}
if (stat(newpath, &sb) == -1) {
goto done;
}
if (strlcpy(path, newpath, pathsize) >= pathsize) {
errno = ENAMETOOLONG;
goto done;
}
ret = true;
done:
debug_return_bool(ret);
#else
return false;
#endif /* __LP64__ */
}
/*
* Load the specified plugin and run its init function.
* Returns -1 if unable to open the plugin, else it returns
* the value from the plugin's init function.
*/
static int
group_plugin_load(const struct sudoers_context *ctx, const char *plugin_info)
{
const char *plugin_dir = ctx->settings.plugin_dir;
char *args, path[PATH_MAX];
char **argv = NULL;
int len, rc = -1;
bool retry = true;
debug_decl(group_plugin_load, SUDOERS_DEBUG_UTIL);
/*
* Fill in .so path and split out args (if any).
*/
if ((args = strpbrk(plugin_info, " \t")) != NULL) {
len = snprintf(path, sizeof(path), "%s%.*s",
(*plugin_info != '/') ? plugin_dir : "",
(int)(args - plugin_info), plugin_info);
args++;
} else {
len = snprintf(path, sizeof(path), "%s%s",
(*plugin_info != '/') ? plugin_dir : "", plugin_info);
}
if (len < 0 || len >= ssizeof(path)) {
errno = ENAMETOOLONG;
sudo_warn("%s%s",
(*plugin_info != '/') ? plugin_dir : "", plugin_info);
goto done;
}
for (;;) {
group_handle = sudo_dso_load(path, SUDO_DSO_LAZY|SUDO_DSO_GLOBAL);
if (group_handle != NULL) {
break;
}
if (!retry || !group_plugin_fallback(path, sizeof(path))) {
const char *errstr = sudo_dso_strerror();
sudo_warnx(U_("unable to load %s: %s"), path,
errstr ? errstr : "unknown error");
goto done;
}
/* Retry once with the fallback path. */
retry = false;
}
/* Map in symbol from group plugin. */
group_plugin = sudo_dso_findsym(group_handle, "group_plugin");
if (group_plugin == NULL) {
sudo_warnx(U_("unable to find symbol \"group_plugin\" in %s"), path);
goto done;
}
if (SUDO_API_VERSION_GET_MAJOR(group_plugin->version) != GROUP_API_VERSION_MAJOR) {
sudo_warnx(U_("%s: incompatible group plugin major version %d, expected %d"),
path, SUDO_API_VERSION_GET_MAJOR(group_plugin->version),
GROUP_API_VERSION_MAJOR);
goto done;
}
/*
* Split args into a vector if specified.
*/
if (args != NULL) {
int ac = 0;
bool wasblank = true;
char *cp, *last;
for (cp = args; *cp != '\0'; cp++) {
if (isblank((unsigned char)*cp)) {
wasblank = true;
} else if (wasblank) {
wasblank = false;
ac++;
}
}
if (ac != 0) {
argv = reallocarray(NULL, (size_t)ac + 1, sizeof(char *));
if (argv == NULL) {
sudo_warnx(U_("%s: %s"), __func__,
U_("unable to allocate memory"));
goto done;
}
ac = 0;
cp = strtok_r(args, " \t", &last);
while (cp != NULL) {
argv[ac++] = cp;
cp = strtok_r(NULL, " \t", &last);
}
argv[ac] = NULL;
}
}
rc = (group_plugin->init)(GROUP_API_VERSION, sudo_printf, argv);
done:
free(argv);
if (rc != true) {
if (group_handle != NULL) {
sudo_dso_unload(group_handle);
group_handle = NULL;
group_plugin = NULL;
}
}
debug_return_int(rc);
}
void
group_plugin_unload(void)
{
debug_decl(group_plugin_unload, SUDOERS_DEBUG_UTIL);
if (group_plugin != NULL) {
(group_plugin->cleanup)();
group_plugin = NULL;
}
if (group_handle != NULL) {
sudo_dso_unload(group_handle);
group_handle = NULL;
}
debug_return;
}
int
group_plugin_query(const char *user, const char *group,
const struct passwd *pwd)
{
debug_decl(group_plugin_query, SUDOERS_DEBUG_UTIL);
if (group_plugin == NULL)
debug_return_int(false);
debug_return_int((group_plugin->query)(user, group, pwd));
}
#else /* !HAVE_DLOPEN && !HAVE_SHL_LOAD */
/*
* No loadable shared object support.
*/
static int
group_plugin_load(const struct sudoers_context *ctx, const char *plugin_info)
{
debug_decl(group_plugin_load, SUDOERS_DEBUG_UTIL);
debug_return_int(false);
}
void
group_plugin_unload(void)
{
debug_decl(group_plugin_unload, SUDOERS_DEBUG_UTIL);
debug_return;
}
int
group_plugin_query(const char *user, const char *group,
const struct passwd *pwd)
{
debug_decl(group_plugin_query, SUDOERS_DEBUG_UTIL);
debug_return_int(false);
}
#endif /* HAVE_DLOPEN || HAVE_SHL_LOAD */
/*
* Group plugin sudoers callback.
*/
bool
cb_group_plugin(struct sudoers_context *ctx, const char *file,
int line, int column, const union sudo_defs_val *sd_un, int op)
{
bool rc = true;
debug_decl(cb_group_plugin, SUDOERS_DEBUG_PLUGIN);
/* Unload any existing group plugin before loading a new one. */
group_plugin_unload();
if (sd_un->str != NULL)
rc = group_plugin_load(ctx, sd_un->str);
debug_return_bool(rc);
}