summaryrefslogtreecommitdiffstats
path: root/src/common/secret.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-21 11:54:28 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-21 11:54:28 +0000
commite6918187568dbd01842d8d1d2c808ce16a894239 (patch)
tree64f88b554b444a49f656b6c656111a145cbbaa28 /src/common/secret.c
parentInitial commit. (diff)
downloadceph-e6918187568dbd01842d8d1d2c808ce16a894239.tar.xz
ceph-e6918187568dbd01842d8d1d2c808ce16a894239.zip
Adding upstream version 18.2.2.upstream/18.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/common/secret.c')
-rw-r--r--src/common/secret.c86
1 files changed, 86 insertions, 0 deletions
diff --git a/src/common/secret.c b/src/common/secret.c
new file mode 100644
index 000000000..fe34efdff
--- /dev/null
+++ b/src/common/secret.c
@@ -0,0 +1,86 @@
+// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
+// vim: ts=8 sw=2 smarttab
+/*
+ * Ceph - scalable distributed file system
+ *
+ * Copyright (C) 2011 New Dream Network
+ *
+ * This is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License version 2.1, as published by the Free Software
+ * Foundation. See file COPYING.
+ *
+ */
+
+#include <string.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <keyutils.h>
+
+#include "include/compat.h"
+#include "common/armor.h"
+#include "common/safe_io.h"
+
+int read_secret_from_file(const char *filename, char *secret, size_t max_len)
+{
+ char *end;
+ int fd;
+ int len;
+
+ fd = open(filename, O_RDONLY);
+ if (fd < 0) {
+ perror("unable to read secretfile");
+ return -errno;
+ }
+ len = safe_read(fd, secret, max_len);
+ if (len <= 0) {
+ perror("unable to read secret from file");
+ close(fd);
+ return len ? len : -ENODATA;
+ }
+ end = secret;
+ while (end < secret + len && *end && *end != '\n' && *end != '\r')
+ end++;
+ *end = '\0';
+ close(fd);
+
+ return 0;
+}
+
+int set_kernel_secret(const char *secret, const char *key_name)
+{
+ /* try to submit key to kernel via the keys api */
+ key_serial_t serial;
+ int ret;
+ int secret_len = strlen(secret);
+ char payload[((secret_len * 3) / 4) + 4];
+
+ if (!secret_len) {
+ fprintf(stderr, "secret is empty.\n");
+ return -EINVAL;
+ }
+
+ ret = ceph_unarmor(payload, payload+sizeof(payload), secret, secret+secret_len);
+ if (ret < 0) {
+ char error_buf[80];
+ fprintf(stderr, "secret is not valid base64: %s.\n",
+ ceph_strerror_r(-ret, error_buf, sizeof(error_buf)));
+ return ret;
+ }
+
+ serial = add_key("ceph", key_name, payload, ret, KEY_SPEC_PROCESS_KEYRING);
+ if (serial == -1) {
+ ret = -errno;
+ }
+
+ return ret;
+}
+
+int is_kernel_secret(const char *key_name)
+{
+ key_serial_t serial;
+ serial = request_key("ceph", key_name, NULL, KEY_SPEC_USER_KEYRING);
+ return serial != -1;
+}