21
21
* Contact the authors at <mandos@fukt.bsnet.se>.
24
#define _GNU_SOURCE /* TEMP_FAILURE_RETRY() */
24
#define _GNU_SOURCE /* TEMP_FAILURE_RETRY(), getline(),
26
26
#include <stddef.h> /* size_t, NULL */
27
27
#include <stdlib.h> /* malloc(), exit(), EXIT_FAILURE,
28
28
EXIT_SUCCESS, realloc() */
52
52
#include <fcntl.h> /* fcntl(), F_GETFD, F_SETFD,
54
#include <string.h> /* strsep, strlen(), strcpy(),
54
#include <string.h> /* strsep, strlen(), asprintf() */
56
55
#include <errno.h> /* errno */
57
56
#include <argp.h> /* struct argp_option, struct
58
57
argp_state, struct argp,
65
64
#include <errno.h> /* errno, EBADF */
67
66
#define BUFFER_SIZE 256
68
#define CONFFILE "/conf/conf.d/mandos/client.conf"
67
#define ARGFILE "/conf/conf.d/mandos/plugin-runner.conf"
70
const char *argp_program_version = "mandos-client 1.0";
69
const char *argp_program_version = "plugin-runner 1.0";
71
70
const char *argp_program_bug_address = "<mandos@fukt.bsnet.se>";
102
103
/* Create a new plugin */
103
104
plugin *new_plugin = malloc(sizeof(plugin));
104
105
if (new_plugin == NULL){
108
new_plugin->name = name;
108
char *copy_name = NULL;
110
copy_name = strdup(name);
111
if(copy_name == NULL){
116
*new_plugin = (plugin) { .name = copy_name,
120
.next = *plugin_list };
109
122
new_plugin->argv = malloc(sizeof(char *) * 2);
110
123
if (new_plugin->argv == NULL){
114
new_plugin->argv[0] = name;
128
new_plugin->argv[0] = copy_name;
115
129
new_plugin->argv[1] = NULL;
116
new_plugin->argc = 1;
117
new_plugin->disabled = false;
118
new_plugin->next = *plugin_list;
131
new_plugin->environ = malloc(sizeof(char *));
132
if(new_plugin->environ == NULL){
134
free(new_plugin->argv);
138
new_plugin->environ[0] = NULL;
119
139
/* Append the new plugin to the list */
120
140
*plugin_list = new_plugin;
121
141
return new_plugin;
124
static void addargument(plugin *p, char *arg){
125
p->argv[p->argc] = arg;
126
p->argv = realloc(p->argv, sizeof(char *) * (size_t)(p->argc + 2));
127
if (p->argv == NULL){
132
p->argv[p->argc] = NULL;
144
/* Helper function for add_argument and add_environment */
145
static bool add_to_char_array(const char *new, char ***array,
147
/* Resize the pointed-to array to hold one more pointer */
148
*array = realloc(*array, sizeof(char *)
149
* (size_t) ((*len) + 2));
154
/* Make a copy of the new string */
155
char *copy = strdup(new);
159
/* Insert the copy */
160
(*array)[*len] = copy;
162
/* Add a new terminating NULL pointer to the last element */
163
(*array)[*len] = NULL;
167
/* Add to a plugin's argument vector */
168
static bool add_argument(plugin *p, const char *arg){
172
return add_to_char_array(arg, &(p->argv), &(p->argc));
175
/* Add to a plugin's environment */
176
static bool add_environment(plugin *p, const char *def){
180
return add_to_char_array(def, &(p->environ), &(p->envc));
136
185
* Based on the example in the GNU LibC manual chapter 13.13 "File
189
char ** addcustomargument(char **argv, int *argc, char *arg){
238
char **add_to_argv(char **argv, int *argc, char *arg){
191
239
if (argv == NULL){
193
241
argv = malloc(sizeof(char*) * 2);
206
254
argv[*argc-1] = arg;
259
static void free_plugin_list(plugin *plugin_list){
260
for(plugin *next; plugin_list != NULL; plugin_list = next){
261
next = plugin_list->next;
262
for(char **arg = plugin_list->argv; *arg != NULL; arg++){
265
free(plugin_list->argv);
266
for(char **env = plugin_list->environ; *env != NULL; env++){
269
free(plugin_list->environ);
211
274
int main(int argc, char *argv[]){
212
const char *plugindir = "/conf/conf.d/mandos/plugins.d";
213
const char *conffile = CONFFILE;
275
const char *plugindir = "/lib/mandos/plugins.d";
276
const char *argfile = ARGFILE;
215
278
size_t d_name_len;
231
294
/* Establish a signal handler */
232
295
sigemptyset(&sigchld_action.sa_mask);
233
296
ret = sigaddset(&sigchld_action.sa_mask, SIGCHLD);
235
298
perror("sigaddset");
299
exitstatus = EXIT_FAILURE;
238
302
ret = sigaction(SIGCHLD, &sigchld_action, &old_sigchld_action);
240
304
perror("sigaction");
305
exitstatus = EXIT_FAILURE;
244
309
/* The options we understand. */
246
311
{ .name = "global-options", .key = 'g',
247
312
.arg = "OPTION[,OPTION[,...]]",
248
313
.doc = "Options passed to all plugins" },
314
{ .name = "global-envs", .key = 'e',
316
.doc = "Environment variable passed to all plugins" },
249
317
{ .name = "options-for", .key = 'o',
250
318
.arg = "PLUGIN:OPTION[,OPTION[,...]]",
251
319
.doc = "Options passed only to specified plugin" },
320
{ .name = "envs-for", .key = 'f',
321
.arg = "PLUGIN:ENV=value",
322
.doc = "Environment variable passed to specified plugin" },
252
323
{ .name = "disable", .key = 'd',
254
325
.doc = "Disable a specific plugin", .group = 1 },
278
349
if(p[0] == '\0'){
281
addargument(getplugin(NULL, plugins), p);
352
if(not add_argument(getplugin(NULL, plugins), p)){
353
perror("add_argument");
354
return ARGP_ERR_UNKNOWN;
364
char *envdef = strdup(arg);
368
if(not add_environment(getplugin(NULL, plugins), envdef)){
369
perror("add_environment");
286
374
if (arg != NULL){
287
char *name = strsep(&arg, ":");
375
char *p_name = strsep(&arg, ":");
376
if(p_name[0] == '\0'){
291
379
char *opt = strsep(&arg, ":");
298
386
if(p[0] == '\0'){
301
addargument(getplugin(name, plugins), p);
389
if(not add_argument(getplugin(p_name, plugins), p)){
390
perror("add_argument");
391
return ARGP_ERR_UNKNOWN;
402
char *envdef = strchr(arg, ':');
406
char *p_name = strndup(arg, (size_t) (envdef-arg));
411
if(not add_environment(getplugin(p_name, plugins), envdef)){
412
perror("add_environment");
307
417
if (arg != NULL){
308
getplugin(arg, plugins)->disabled = true;
418
plugin *p = getplugin(arg, plugins);
420
return ARGP_ERR_UNKNOWN;
341
455
if (ret == ARGP_ERR_UNKNOWN){
342
456
fprintf(stderr, "Unknown error while parsing arguments\n");
343
457
exitstatus = EXIT_FAILURE;
347
conffp = fopen(conffile, "r");
461
conffp = fopen(argfile, "r");
348
462
if(conffp != NULL){
349
463
char *org_line = NULL;
464
char *p, *arg, *new_arg, *line;
352
char *p, *arg, *new_arg, *line;
353
467
const char whitespace_delims[] = " \r\t\f\v\n";
354
468
const char comment_delim[] = "#";
368
482
new_arg = strdup(p);
369
custom_argv = addcustomargument(custom_argv, &custom_argc, new_arg);
483
custom_argv = add_to_argv(custom_argv, &custom_argc, new_arg);
370
484
if (custom_argv == NULL){
371
perror("addcustomargument");
485
perror("add_to_argv");
372
486
exitstatus = EXIT_FAILURE;
379
/* check for harmfull errors */
493
/* Check for harmful errors and go to fallback. Other errors might
494
not affect opening plugins */
380
495
if (errno == EMFILE or errno == ENFILE or errno == ENOMEM){
382
497
exitstatus = EXIT_FAILURE;
401
516
for(char **a = p->argv; *a != NULL; a++){
402
517
fprintf(stderr, "\tArg: %s\n", *a);
519
fprintf(stderr, "...and %u environment variables\n", p->envc);
520
for(char **a = p->environ; *a != NULL; a++){
521
fprintf(stderr, "\t%s\n", *a);
499
char *filename = malloc(d_name_len + strlen(plugindir) + 2);
500
if (filename == NULL){
619
ret = asprintf(&filename, "%s/%s", plugindir, dirst->d_name);
504
strcpy(filename, plugindir); /* Spurious warning */
505
strcat(filename, "/"); /* Spurious warning */
506
strcat(filename, dirst->d_name); /* Spurious warning */
508
625
ret = stat(filename, &st);
523
if(getplugin(dirst->d_name, &plugin_list)->disabled){
640
plugin *p = getplugin(dirst->d_name, &plugin_list);
525
648
fprintf(stderr, "Ignoring disabled plugin \"%s\"\n",
531
plugin *p = getplugin(dirst->d_name, &plugin_list);
533
655
/* Add global arguments to argument list for this plugin */
534
656
plugin *g = getplugin(NULL, &plugin_list);
535
for(char **a = g->argv + 1; *a != NULL; a++){
658
for(char **a = g->argv + 1; *a != NULL; a++){
659
if(not add_argument(p, *a)){
660
perror("add_argument");
663
/* Add global environment variables */
664
for(char **e = g->environ; *e != NULL; e++){
665
if(not add_environment(p, *e)){
666
perror("add_environment");
671
/* If this plugin has any environment variables, we will call
672
using execve and need to duplicate the environment from this
674
if(p->environ[0] != NULL){
675
for(char **e = environ; *e != NULL; e++){
676
char *copy = strdup(*e);
681
if(not add_environment(p, copy)){
682
perror("add_environment");
540
688
ret = pipe(pipefd);
543
691
exitstatus = EXIT_FAILURE;
546
694
ret = set_cloexec_flag(pipefd[0]);
548
696
perror("set_cloexec_flag");
549
697
exitstatus = EXIT_FAILURE;
552
700
ret = set_cloexec_flag(pipefd[1]);
554
702
perror("set_cloexec_flag");
555
703
exitstatus = EXIT_FAILURE;
558
706
/* Block SIGCHLD until process is safely in process list */
559
707
ret = sigprocmask (SIG_BLOCK, &sigchld_action.sa_mask, NULL);
561
709
perror("sigprocmask");
562
710
exitstatus = EXIT_FAILURE;
565
713
// Starting a new process to be watched
566
714
pid_t pid = fork();
569
717
exitstatus = EXIT_FAILURE;
573
721
/* this is the child process */
593
741
above and must now close it manually here. */
596
if(execv(filename, p->argv) < 0){
744
if(p->environ[0] == NULL){
745
if(execv(filename, p->argv) < 0){
750
if(execve(filename, p->argv, p->environ) < 0){
723
874
perror("print_out_password");
724
875
exitstatus = EXIT_FAILURE;
728
879
/* This process has not completed. Does it have any output? */
729
880
if(proc->eof or not FD_ISSET(proc->fd, &rfds)){
770
921
perror("print_out_password");
771
922
exitstatus = EXIT_FAILURE;
776
926
/* Restore old signal handler */
777
sigaction(SIGCHLD, &old_sigchld_action, NULL);
781
/* Free the plugin list */
782
for(plugin *next; plugin_list != NULL; plugin_list = next){
783
next = plugin_list->next;
784
free(plugin_list->argv);
927
ret = sigaction(SIGCHLD, &old_sigchld_action, NULL);
930
exitstatus = EXIT_FAILURE;
933
if(custom_argv != NULL){
934
for(char **arg = custom_argv; *arg != NULL; arg++){
939
free_plugin_list(plugin_list);