2013-08-22 13:27:19 +00:00
|
|
|
/*
|
|
|
|
* virpolkit.c: helpers for using polkit APIs
|
|
|
|
*
|
2016-01-14 19:34:28 +00:00
|
|
|
* Copyright (C) 2013, 2014, 2016 Red Hat, Inc.
|
2013-08-22 13:27:19 +00:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library. If not, see
|
|
|
|
* <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
2016-02-09 15:09:44 +00:00
|
|
|
#include <poll.h>
|
2013-08-22 13:27:19 +00:00
|
|
|
|
|
|
|
#if WITH_POLKIT0
|
|
|
|
# include <polkit/polkit.h>
|
|
|
|
# include <polkit-dbus/polkit-dbus.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "virpolkit.h"
|
|
|
|
#include "virerror.h"
|
|
|
|
#include "virlog.h"
|
|
|
|
#include "virstring.h"
|
|
|
|
#include "virprocess.h"
|
|
|
|
#include "viralloc.h"
|
|
|
|
#include "virdbus.h"
|
2016-02-09 15:09:44 +00:00
|
|
|
#include "virfile.h"
|
2013-08-22 13:27:19 +00:00
|
|
|
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_POLKIT
|
|
|
|
|
|
|
|
VIR_LOG_INIT("util.polkit");
|
|
|
|
|
|
|
|
#if WITH_POLKIT1
|
2016-02-09 15:09:44 +00:00
|
|
|
|
|
|
|
struct _virPolkitAgent {
|
|
|
|
virCommandPtr cmd;
|
|
|
|
};
|
|
|
|
|
2013-08-22 13:27:19 +00:00
|
|
|
/*
|
|
|
|
* virPolkitCheckAuth:
|
|
|
|
* @actionid: permission to check
|
|
|
|
* @pid: client process ID
|
|
|
|
* @startTime: process start time, or 0
|
|
|
|
* @uid: client process user ID
|
|
|
|
* @details: NULL terminated (key, value) pair list
|
|
|
|
* @allowInteraction: true if auth prompts are allowed
|
|
|
|
*
|
|
|
|
* Check if a client is authenticated with polkit
|
|
|
|
*
|
|
|
|
* Returns 0 on success, -1 on failure, -2 on auth denied
|
|
|
|
*/
|
|
|
|
int virPolkitCheckAuth(const char *actionid,
|
|
|
|
pid_t pid,
|
|
|
|
unsigned long long startTime,
|
|
|
|
uid_t uid,
|
|
|
|
const char **details,
|
|
|
|
bool allowInteraction)
|
|
|
|
{
|
2014-09-10 13:52:48 +00:00
|
|
|
DBusConnection *sysbus;
|
|
|
|
DBusMessage *reply = NULL;
|
|
|
|
char **retdetails = NULL;
|
|
|
|
size_t nretdetails = 0;
|
2014-11-18 00:18:58 +00:00
|
|
|
bool is_authorized;
|
|
|
|
bool is_challenge;
|
2014-09-10 13:52:48 +00:00
|
|
|
bool is_dismissed = false;
|
|
|
|
size_t i;
|
2013-08-22 13:27:19 +00:00
|
|
|
int ret = -1;
|
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
if (!(sysbus = virDBusGetSystemBus()))
|
|
|
|
goto cleanup;
|
2013-08-22 13:27:19 +00:00
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
VIR_INFO("Checking PID %lld running as %d",
|
|
|
|
(long long) pid, uid);
|
2013-08-22 13:27:19 +00:00
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
if (virDBusCallMethod(sysbus,
|
|
|
|
&reply,
|
|
|
|
NULL,
|
|
|
|
"org.freedesktop.PolicyKit1",
|
|
|
|
"/org/freedesktop/PolicyKit1/Authority",
|
|
|
|
"org.freedesktop.PolicyKit1.Authority",
|
|
|
|
"CheckAuthorization",
|
|
|
|
"(sa{sv})sa&{ss}us",
|
|
|
|
"unix-process",
|
|
|
|
3,
|
|
|
|
"pid", "u", (unsigned int)pid,
|
|
|
|
"start-time", "t", startTime,
|
|
|
|
"uid", "i", (int)uid,
|
|
|
|
actionid,
|
2016-02-09 15:01:33 +00:00
|
|
|
virStringListLength(details) / 2,
|
2014-09-10 13:52:48 +00:00
|
|
|
details,
|
|
|
|
allowInteraction,
|
|
|
|
"" /* cancellation ID */) < 0)
|
2013-08-22 13:27:19 +00:00
|
|
|
goto cleanup;
|
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
if (virDBusMessageRead(reply,
|
|
|
|
"(bba&{ss})",
|
|
|
|
&is_authorized,
|
|
|
|
&is_challenge,
|
|
|
|
&nretdetails,
|
|
|
|
&retdetails) < 0)
|
2013-08-22 13:27:19 +00:00
|
|
|
goto cleanup;
|
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
for (i = 0; i < (nretdetails / 2); i++) {
|
|
|
|
if (STREQ(retdetails[(i * 2)], "polkit.dismissed") &&
|
|
|
|
STREQ(retdetails[(i * 2) + 1], "true"))
|
|
|
|
is_dismissed = true;
|
|
|
|
}
|
2013-08-22 13:27:19 +00:00
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
VIR_DEBUG("is auth %d is challenge %d",
|
|
|
|
is_authorized, is_challenge);
|
2013-08-22 13:27:19 +00:00
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
if (is_authorized) {
|
|
|
|
ret = 0;
|
|
|
|
} else {
|
|
|
|
ret = -2;
|
|
|
|
if (is_dismissed)
|
2013-08-22 13:27:19 +00:00
|
|
|
virReportError(VIR_ERR_AUTH_CANCELLED, "%s",
|
2014-09-10 13:52:48 +00:00
|
|
|
_("user cancelled authentication process"));
|
|
|
|
else if (is_challenge)
|
2016-01-14 19:34:28 +00:00
|
|
|
virReportError(VIR_ERR_AUTH_UNAVAILABLE,
|
|
|
|
_("no polkit agent available to authenticate "
|
|
|
|
"action '%s'"),
|
|
|
|
actionid);
|
2014-09-10 13:52:48 +00:00
|
|
|
else
|
|
|
|
virReportError(VIR_ERR_AUTH_FAILED, "%s",
|
|
|
|
_("access denied by policy"));
|
2013-08-22 13:27:19 +00:00
|
|
|
}
|
|
|
|
|
2014-09-10 13:52:48 +00:00
|
|
|
cleanup:
|
2016-11-25 08:18:35 +00:00
|
|
|
virStringListFreeCount(retdetails, nretdetails);
|
2013-08-22 13:27:19 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-02-09 15:09:44 +00:00
|
|
|
/* virPolkitAgentDestroy:
|
|
|
|
* @cmd: Pointer to the virCommandPtr created during virPolkitAgentCreate
|
|
|
|
*
|
|
|
|
* Destroy resources used by Polkit Agent
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
virPolkitAgentDestroy(virPolkitAgentPtr agent)
|
|
|
|
{
|
|
|
|
if (!agent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
virCommandFree(agent->cmd);
|
|
|
|
VIR_FREE(agent);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* virPolkitAgentCreate:
|
|
|
|
*
|
|
|
|
* Allocate and setup a polkit agent
|
|
|
|
*
|
|
|
|
* Returns a virCommandPtr on success and NULL on failure
|
|
|
|
*/
|
|
|
|
virPolkitAgentPtr
|
|
|
|
virPolkitAgentCreate(void)
|
|
|
|
{
|
2016-03-02 00:36:37 +00:00
|
|
|
virPolkitAgentPtr agent = NULL;
|
2016-02-09 15:09:44 +00:00
|
|
|
int pipe_fd[2] = {-1, -1};
|
|
|
|
struct pollfd pollfd;
|
|
|
|
int outfd = STDOUT_FILENO;
|
|
|
|
int errfd = STDERR_FILENO;
|
|
|
|
|
|
|
|
if (!isatty(STDIN_FILENO))
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
if (pipe2(pipe_fd, 0) < 0)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
if (VIR_ALLOC(agent) < 0)
|
|
|
|
goto error;
|
2016-05-09 09:02:51 +00:00
|
|
|
|
|
|
|
agent->cmd = virCommandNewArgList(PKTTYAGENT, "--process", NULL);
|
|
|
|
|
|
|
|
virCommandAddArgFormat(agent->cmd, "%lld", (long long int) getpid());
|
|
|
|
virCommandAddArg(agent->cmd, "--notify-fd");
|
|
|
|
virCommandAddArgFormat(agent->cmd, "%d", pipe_fd[1]);
|
|
|
|
virCommandAddArg(agent->cmd, "--fallback");
|
|
|
|
virCommandSetInputFD(agent->cmd, STDIN_FILENO);
|
|
|
|
virCommandSetOutputFD(agent->cmd, &outfd);
|
|
|
|
virCommandSetErrorFD(agent->cmd, &errfd);
|
|
|
|
virCommandPassFD(agent->cmd, pipe_fd[1], VIR_COMMAND_PASS_FD_CLOSE_PARENT);
|
|
|
|
if (virCommandRunAsync(agent->cmd, NULL) < 0)
|
2016-02-09 15:09:44 +00:00
|
|
|
goto error;
|
|
|
|
|
|
|
|
pollfd.fd = pipe_fd[0];
|
|
|
|
pollfd.events = POLLHUP;
|
|
|
|
|
|
|
|
if (poll(&pollfd, 1, -1) < 0)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
return agent;
|
|
|
|
|
|
|
|
error:
|
|
|
|
VIR_FORCE_CLOSE(pipe_fd[0]);
|
|
|
|
VIR_FORCE_CLOSE(pipe_fd[1]);
|
|
|
|
virPolkitAgentDestroy(agent);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-08-22 13:27:19 +00:00
|
|
|
#elif WITH_POLKIT0
|
|
|
|
int virPolkitCheckAuth(const char *actionid,
|
|
|
|
pid_t pid,
|
|
|
|
unsigned long long startTime ATTRIBUTE_UNUSED,
|
|
|
|
uid_t uid,
|
|
|
|
const char **details,
|
|
|
|
bool allowInteraction ATTRIBUTE_UNUSED)
|
|
|
|
{
|
|
|
|
PolKitCaller *pkcaller = NULL;
|
|
|
|
PolKitAction *pkaction = NULL;
|
|
|
|
PolKitContext *pkcontext = NULL;
|
|
|
|
PolKitError *pkerr = NULL;
|
|
|
|
PolKitResult pkresult;
|
|
|
|
DBusError err;
|
|
|
|
DBusConnection *sysbus;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
if (details) {
|
|
|
|
virReportError(VIR_ERR_AUTH_FAILED, "%s",
|
|
|
|
_("Details not supported with polkit v0"));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(sysbus = virDBusGetSystemBus()))
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
VIR_INFO("Checking PID %lld running as %d",
|
|
|
|
(long long) pid, uid);
|
|
|
|
dbus_error_init(&err);
|
|
|
|
if (!(pkcaller = polkit_caller_new_from_pid(sysbus,
|
|
|
|
pid, &err))) {
|
|
|
|
VIR_DEBUG("Failed to lookup policy kit caller: %s", err.message);
|
|
|
|
dbus_error_free(&err);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(pkaction = polkit_action_new())) {
|
|
|
|
char ebuf[1024];
|
|
|
|
VIR_DEBUG("Failed to create polkit action %s",
|
|
|
|
virStrerror(errno, ebuf, sizeof(ebuf)));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
polkit_action_set_action_id(pkaction, actionid);
|
|
|
|
|
|
|
|
if (!(pkcontext = polkit_context_new()) ||
|
|
|
|
!polkit_context_init(pkcontext, &pkerr)) {
|
|
|
|
char ebuf[1024];
|
|
|
|
VIR_DEBUG("Failed to create polkit context %s",
|
|
|
|
(pkerr ? polkit_error_get_error_message(pkerr)
|
|
|
|
: virStrerror(errno, ebuf, sizeof(ebuf))));
|
|
|
|
if (pkerr)
|
|
|
|
polkit_error_free(pkerr);
|
|
|
|
dbus_error_free(&err);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
# if HAVE_POLKIT_CONTEXT_IS_CALLER_AUTHORIZED
|
|
|
|
pkresult = polkit_context_is_caller_authorized(pkcontext,
|
|
|
|
pkaction,
|
|
|
|
pkcaller,
|
|
|
|
0,
|
|
|
|
&pkerr);
|
|
|
|
if (pkerr && polkit_error_is_set(pkerr)) {
|
|
|
|
VIR_DEBUG("Policy kit failed to check authorization %d %s",
|
|
|
|
polkit_error_get_error_code(pkerr),
|
|
|
|
polkit_error_get_error_message(pkerr));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
# else
|
|
|
|
pkresult = polkit_context_can_caller_do_action(pkcontext,
|
|
|
|
pkaction,
|
|
|
|
pkcaller);
|
|
|
|
# endif
|
|
|
|
if (pkresult != POLKIT_RESULT_YES) {
|
|
|
|
VIR_DEBUG("Policy kit denied action %s from pid %lld, uid %d, result: %s",
|
|
|
|
actionid, (long long) pid, uid,
|
|
|
|
polkit_result_to_string_representation(pkresult));
|
|
|
|
ret = -2;
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
VIR_DEBUG("Policy allowed action %s from pid %lld, uid %d",
|
|
|
|
actionid, (long long)pid, (int)uid);
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
if (ret < 0) {
|
|
|
|
virResetLastError();
|
|
|
|
virReportError(VIR_ERR_AUTH_FAILED, "%s",
|
|
|
|
_("authentication failed"));
|
|
|
|
}
|
|
|
|
if (pkcontext)
|
|
|
|
polkit_context_unref(pkcontext);
|
|
|
|
if (pkcaller)
|
|
|
|
polkit_caller_unref(pkcaller);
|
|
|
|
if (pkaction)
|
|
|
|
polkit_action_unref(pkaction);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#else /* ! WITH_POLKIT1 && ! WITH_POLKIT0 */
|
|
|
|
|
2014-09-25 08:57:24 +00:00
|
|
|
int virPolkitCheckAuth(const char *actionid ATTRIBUTE_UNUSED,
|
|
|
|
pid_t pid ATTRIBUTE_UNUSED,
|
|
|
|
unsigned long long startTime ATTRIBUTE_UNUSED,
|
|
|
|
uid_t uid ATTRIBUTE_UNUSED,
|
|
|
|
const char **details ATTRIBUTE_UNUSED,
|
|
|
|
bool allowInteraction ATTRIBUTE_UNUSED)
|
2013-08-22 13:27:19 +00:00
|
|
|
{
|
|
|
|
VIR_ERROR(_("Polkit auth attempted, even though polkit is not available"));
|
|
|
|
virReportError(VIR_ERR_AUTH_FAILED, "%s",
|
|
|
|
_("authentication failed"));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-02-09 15:09:44 +00:00
|
|
|
void
|
2016-03-01 14:51:37 +00:00
|
|
|
virPolkitAgentDestroy(virPolkitAgentPtr agent ATTRIBUTE_UNUSED)
|
2016-02-09 15:09:44 +00:00
|
|
|
{
|
|
|
|
return; /* do nothing */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-03-01 14:51:37 +00:00
|
|
|
virPolkitAgentPtr
|
2016-02-09 15:09:44 +00:00
|
|
|
virPolkitAgentCreate(void)
|
|
|
|
{
|
|
|
|
virReportError(VIR_ERR_AUTH_FAILED, "%s",
|
|
|
|
_("polkit text authentication agent unavailable"));
|
|
|
|
return NULL;
|
|
|
|
}
|
2013-08-22 13:27:19 +00:00
|
|
|
#endif /* WITH_POLKIT1 */
|