This commit is contained in:
JerziKaminsky 2017-05-18 09:58:13 +00:00 committed by GitHub
commit 28f3790207
5 changed files with 52 additions and 45 deletions

View file

@ -208,6 +208,7 @@ enum secure_feature {
struct feature_policy {
char *program;
uint32_t features;
bool validated;
};
enum ipc_feature {
@ -235,6 +236,7 @@ enum ipc_feature {
struct ipc_policy {
char *program;
uint32_t features;
bool validated;
};
/**

View file

@ -15,4 +15,5 @@ struct feature_policy *alloc_feature_policy(const char *program);
struct ipc_policy *alloc_ipc_policy(const char *program);
struct command_policy *alloc_command_policy(const char *command);
char *resolve_ipc_path(const char* program);
#endif

View file

@ -18,26 +18,26 @@ struct cmd_results *cmd_ipc(int argc, char **argv) {
if ((error = check_security_config())) {
return error;
}
char *program = NULL;
if (!strcmp(argv[0], "*")) {
program = strdup(argv[0]);
} else if (!(program = resolve_path(argv[0]))) {
return cmd_results_new(
CMD_INVALID, "ipc", "Unable to resolve IPC Policy target.");
}
if (config->reading && strcmp("{", argv[1]) != 0) {
return cmd_results_new(CMD_INVALID, "ipc",
"Expected '{' at start of IPC config definition.");
}
if (!config->reading) {
return cmd_results_new(CMD_FAILURE, "ipc", "Can only be used in config file.");
}
current_policy = alloc_ipc_policy(program);
list_add(config->ipc_policies, current_policy);
char *program = NULL;
if (!(program = resolve_ipc_path(argv[0]))) {
return cmd_results_new(
CMD_FAILURE, "ipc", "Memory allocation error occured.");
}
if ((current_policy = alloc_ipc_policy(program))) {
list_add(config->ipc_policies, current_policy);
} else {
return cmd_results_new(
CMD_FAILURE, "ipc", "Failed to allocate security policy.");
}
free(program);
return cmd_results_new(CMD_BLOCK_IPC, NULL, NULL);

View file

@ -49,27 +49,20 @@ struct cmd_results *cmd_permit(int argc, char **argv) {
return error;
}
bool assign_perms = true;
char *program = NULL;
if (!strcmp(argv[0], "*")) {
program = strdup(argv[0]);
} else {
program = resolve_path(argv[0]);
}
if (!program) {
sway_assert(program, "Unable to resolve IPC permit target '%s'."
" will issue empty policy", argv[0]);
assign_perms = false;
program = strdup(argv[0]);
if (!(program = resolve_ipc_path(argv[0]))) {
sway_abort("memory allocation failed");
}
struct feature_policy *policy = get_feature_policy(program);
if (assign_perms) {
if (policy->validated) {
policy->features |= get_features(argc, argv, &error);
sway_log(L_DEBUG, "Permissions granted to %s for features %d",
policy->program, policy->features);
} else {
sway_log(L_ERROR, "Unable to validate IPC permit target '%s'."
" will issue empty policy", argv[0]);
}
sway_log(L_DEBUG, "Permissions granted to %s for features %d",
policy->program, policy->features);
free(program);
return cmd_results_new(CMD_SUCCESS, NULL, NULL);
@ -85,19 +78,15 @@ struct cmd_results *cmd_reject(int argc, char **argv) {
}
char *program = NULL;
if (!strcmp(argv[0], "*")) {
program = strdup(argv[0]);
} else {
program = resolve_path(argv[0]);
}
if (!program) {
// Punt
sway_log(L_INFO, "Unable to resolve IPC reject target '%s'."
" Will use provided path", argv[0]);
program = strdup(argv[0]);
if (!(program = resolve_ipc_path(argv[0]))) {
sway_abort("memory allocation failed");
}
struct feature_policy *policy = get_feature_policy(program);
if (!policy->validated) {
sway_log(L_ERROR, "Unable to validate IPC reject target '%s'."
" Allowing `reject` directive anyway", argv[0]);
}
policy->features &= ~get_features(argc, argv, &error);
sway_log(L_DEBUG, "Permissions granted to %s for features %d",

View file

@ -6,6 +6,7 @@
#include <stdio.h>
#include "sway/config.h"
#include "sway/security.h"
#include "util.h"
#include "log.h"
static bool validate_ipc_target(const char *program) {
@ -21,7 +22,7 @@ static bool validate_ipc_target(const char *program) {
}
if (!S_ISREG(sb.st_mode)) {
sway_log(L_ERROR,
"IPC target '%s' MUST be/point at an existing regular file",
"IPC target '%s' MUST point at an existing file",
program);
return false;
}
@ -30,7 +31,7 @@ static bool validate_ipc_target(const char *program) {
sway_log(L_ERROR, "IPC target '%s' MUST be owned by root", program);
return false;
#else
sway_log(L_INFO, "IPC target '%s' MUST be owned by root (waived for debug build)", program);
sway_log(L_ERROR, "IPC target '%s' MUST be owned by root (waived for debug build)", program);
return true;
#endif
}
@ -45,9 +46,6 @@ static bool validate_ipc_target(const char *program) {
struct feature_policy *alloc_feature_policy(const char *program) {
uint32_t default_policy = 0;
if (!validate_ipc_target(program)) {
return NULL;
}
for (int i = 0; i < config->feature_policies->length; ++i) {
struct feature_policy *policy = config->feature_policies->items[i];
if (strcmp(policy->program, "*") == 0) {
@ -60,6 +58,7 @@ struct feature_policy *alloc_feature_policy(const char *program) {
if (!policy) {
return NULL;
}
policy->validated = validate_ipc_target (program);
policy->program = strdup(program);
if (!policy->program) {
free(policy);
@ -73,9 +72,6 @@ struct feature_policy *alloc_feature_policy(const char *program) {
struct ipc_policy *alloc_ipc_policy(const char *program) {
uint32_t default_policy = 0;
if (!validate_ipc_target(program)) {
return NULL;
}
for (int i = 0; i < config->ipc_policies->length; ++i) {
struct ipc_policy *policy = config->ipc_policies->items[i];
if (strcmp(policy->program, "*") == 0) {
@ -88,6 +84,7 @@ struct ipc_policy *alloc_ipc_policy(const char *program) {
if (!policy) {
return NULL;
}
policy->validated = validate_ipc_target (program);
policy->program = strdup(program);
if (!policy->program) {
free(policy);
@ -226,3 +223,21 @@ const char *command_policy_str(enum command_context context) {
return "unknown";
}
}
/**
* An IPC-specific version of util.c:resolve_path()
* Always returns the "best" path It can unless an ENOMEM occurs ,
* in which case it returns NULL.
*/
char *resolve_ipc_path(const char* name) {
char *program = NULL;
if (!strcmp(name, "*")) {
program = strdup(name);
} else {
program = resolve_path(name);
if (!program) {
program = strdup(name);
}
}
return program;
}