3
3
* Mandos password agent - Simple password agent to run Mandos client
5
* Copyright © 2019 Teddy Hogeborn
6
* Copyright © 2019 Björn Påhlsson
5
* Copyright © 2019-2020 Teddy Hogeborn
6
* Copyright © 2019-2020 Björn Påhlsson
8
8
* This file is part of Mandos.
49
49
#include <sysexits.h> /* EX_USAGE, EX_OSERR, EX_OSFILE */
50
50
#include <errno.h> /* errno, error_t, EACCES,
51
51
ENAMETOOLONG, ENOENT, ENOTDIR,
52
EEXIST, ECHILD, EPERM, ENOMEM,
52
ENOMEM, EEXIST, ECHILD, EPERM,
53
53
EAGAIN, EINTR, ENOBUFS, EADDRINUSE,
54
54
ECONNREFUSED, ECONNRESET,
55
55
ETOOMANYREFS, EMSGSIZE, EBADF,
73
73
ARGP_ERR_UNKNOWN, ARGP_KEY_ARGS,
74
74
struct argp, argp_parse(),
76
#include <stdint.h> /* SIZE_MAX */
76
77
#include <unistd.h> /* uid_t, gid_t, close(), pipe2(),
77
78
fork(), _exit(), dup2(),
78
79
STDOUT_FILENO, setresgid(),
95
96
IN_EXCL_UNLINK, IN_ONLYDIR,
96
97
struct inotify_event */
97
98
#include <fnmatch.h> /* fnmatch(), FNM_FILE_NAME */
98
#include <stdio.h> /* asprintf(), FILE, fopen(),
99
getline(), sscanf(), feof(),
100
ferror(), fclose(), stderr,
101
rename(), fdopen(), fprintf(),
99
#include <stdio.h> /* asprintf(), FILE, stderr, fopen(),
100
fclose(), getline(), sscanf(),
101
feof(), ferror(), rename(),
102
fdopen(), fprintf(), fscanf() */
103
103
#include <glib.h> /* GKeyFile, g_key_file_free(), g_key_file_new(),
104
104
GError, g_key_file_load_from_file(),
105
105
G_KEY_FILE_NONE, TRUE, G_FILE_ERROR_NOENT,
148
148
mono_microsecs next_run;
149
149
} __attribute__((designated_init)) task_queue;
151
/* "func_type" - A function type for task functions
151
/* "task_func" - A function type for task functions
153
153
I.e. functions for the code which runs when a task is run, all have
652
652
__attribute__((nonnull, warn_unused_result))
653
653
bool add_to_queue(task_queue *const queue, const task_context task){
654
if((queue->length + 1) > (SIZE_MAX / sizeof(task_context))){
656
error(0, ENOMEM, "Failed to allocate %" PRIuMAX
657
" tasks for queue->tasks", (uintmax_t)(queue->length + 1));
654
661
const size_t needed_size = sizeof(task_context)*(queue->length + 1);
655
662
if(needed_size > (queue->allocated)){
656
663
task_context *const new_tasks = realloc(queue->tasks,
862
869
close(pipefds[1]);
872
error(0, errno, "Failed to fork()");
864
877
if(not add_to_queue(queue, (task_context){
865
878
.func=wait_for_mandos_client_exit,
1180
1193
bool *const password_is_read = task.password_is_read;
1182
1195
/* We use the GLib "Key-value file parser" functions to parse the
1183
question file. See <https://www.freedesktop.org/wiki/Software
1184
/systemd/PasswordAgents/> for specification of contents */
1196
question file. See <https://systemd.io/PASSWORD_AGENTS/> for
1197
specification of contents */
1185
1198
__attribute__((nonnull))
1186
1199
void cleanup_g_key_file(GKeyFile **key_file){
1187
1200
if(*key_file != NULL){
1477
1490
not. You may but don't have to include a final NUL byte in
1480
— <https://www.freedesktop.org/wiki/Software/systemd/
1481
PasswordAgents/> (Wed 08 Oct 2014 02:14:28 AM UTC)
1493
— <https://systemd.io/PASSWORD_AGENTS/> (Tue, 15 Sep 2020
1483
1496
send_buffer[0] = '+'; /* Prefix with "+" */
1484
1497
/* Always add an extra NUL */
1884
1897
g_assert_true(queue->tasks[0].func == dummy_func);
1900
static void test_add_to_queue_overflow(__attribute__((unused))
1901
test_fixture *fixture,
1902
__attribute__((unused))
1903
gconstpointer user_data){
1904
__attribute__((cleanup(cleanup_queue)))
1905
task_queue *queue = create_queue();
1906
g_assert_nonnull(queue);
1907
g_assert_true(queue->length == 0);
1908
queue->length = SIZE_MAX / sizeof(task_context); /* fake max size */
1910
FILE *real_stderr = stderr;
1911
FILE *devnull = fopen("/dev/null", "we");
1912
g_assert_nonnull(devnull);
1914
const bool ret = add_to_queue(queue,
1915
(task_context){ .func=dummy_func });
1916
g_assert_true(errno == ENOMEM);
1917
g_assert_false(ret);
1918
stderr = real_stderr;
1919
g_assert_cmpint(fclose(devnull), ==, 0);
1920
queue->length = 0; /* Restore real size */
1887
1923
static void dummy_func(__attribute__((unused))
1888
1924
const task_context task,
1889
1925
__attribute__((unused))
2161
2197
exit(EXIT_SUCCESS);
2200
error(EXIT_FAILURE, errno, "Failed to fork()");
2164
2204
waitpid(pid, &status, 0);
2165
2205
if(WIFEXITED(status) and (WEXITSTATUS(status) == EXIT_SUCCESS)){
5767
5807
char write_data[PIPE_BUF];
5769
5809
/* Construct test password buffer */
5770
/* Start with + since that is what the real procotol uses */
5810
/* Start with + since that is what the real protocol uses */
5771
5811
write_data[0] = '+';
5772
5812
/* Set a special character at string end just to mark the end */
5773
5813
write_data[sizeof(write_data)-2] = 'y';
5918
5958
test_fixture *fixture,
5919
5959
__attribute__((unused))
5920
5960
gconstpointer user_data){
5962
g_test_skip("Skipping EMSGSIZE test on non-AMD64 platform");
5921
5964
__attribute__((cleanup(cleanup_close)))
5922
5965
const int epoll_fd = epoll_create1(EPOLL_CLOEXEC);
5923
5966
g_assert_cmpint(epoll_fd, >=, 0);
5937
5980
g_assert_true(errno == EPERM or errno == ENOMEM);
5939
5982
/* Construct test password buffer */
5940
/* Start with + since that is what the real procotol uses */
5983
/* Start with + since that is what the real protocol uses */
5941
5984
password.data[0] = '+';
5942
5985
/* Set a special character at string end just to mark the end */
5943
5986
password.data[oversized-3] = 'y';
5976
6019
g_assert_cmpuint((unsigned int)queue->length, ==, 0);
5977
6020
g_assert_true(string_set_contains(cancelled_filenames,
5978
6021
question_filename));
5981
6025
static void test_send_password_to_socket_retry(__attribute__((unused))
7862
7906
test_add("/parse_arguments/mixed", test_parse_arguments_mixed);
7863
7907
test_add("/queue/create", test_create_queue);
7864
7908
test_add("/queue/add", test_add_to_queue);
7909
test_add("/queue/add/overflow", test_add_to_queue_overflow);
7865
7910
test_add("/queue/has_question/empty",
7866
7911
test_queue_has_question_empty);
7867
7912
test_add("/queue/has_question/false",
8092
8137
g_option_context_set_help_enabled(context, FALSE);
8093
8138
g_option_context_set_ignore_unknown_options(context, TRUE);
8095
gboolean run_tests = FALSE;
8140
gboolean should_run_tests = FALSE;
8096
8141
GOptionEntry entries[] = {
8097
8142
{ "test", 0, 0, G_OPTION_ARG_NONE,
8098
&run_tests, "Run tests", NULL },
8143
&should_run_tests, "Run tests", NULL },
8101
8146
g_option_context_add_main_entries(context, entries, NULL);