summaryrefslogtreecommitdiffstats
path: root/plugins/sudoers/logging.h
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-15 13:14:46 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-15 13:14:46 +0000
commit025c439e829e0db9ac511cd9c1b8d5fd53475ead (patch)
treefa6986b4690f991613ffb97cea1f6942427baf5d /plugins/sudoers/logging.h
parentInitial commit. (diff)
downloadsudo-upstream/1.9.15p5.tar.xz
sudo-upstream/1.9.15p5.zip
Adding upstream version 1.9.15p5.upstream/1.9.15p5upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'plugins/sudoers/logging.h')
-rw-r--r--plugins/sudoers/logging.h94
1 files changed, 94 insertions, 0 deletions
diff --git a/plugins/sudoers/logging.h b/plugins/sudoers/logging.h
new file mode 100644
index 0000000..647fd28
--- /dev/null
+++ b/plugins/sudoers/logging.h
@@ -0,0 +1,94 @@
+/*
+ * SPDX-License-Identifier: ISC
+ *
+ * Copyright (c) 1999-2005, 2009-2022
+ * Todd C. Miller <Todd.Miller@sudo.ws>
+ *
+ * Permission to use, copy, modify, and distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+ * copyright notice and this permission notice appear in all copies.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
+ * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
+ * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
+ * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
+ */
+
+#ifndef SUDOERS_LOGGING_H
+#define SUDOERS_LOGGING_H
+
+#include <stdarg.h>
+
+struct sudoers_str_list;
+struct log_details {
+ struct eventlog *evlog;
+ struct sudoers_str_list *log_servers;
+ struct timespec server_timeout;
+# if defined(HAVE_OPENSSL)
+ char *ca_bundle;
+ char *cert_file;
+ char *key_file;
+# endif /* HAVE_OPENSSL */
+ bool keepalive;
+ bool verify_server;
+ bool ignore_log_errors;
+};
+
+/*
+ * Values for sudoers_setlocale()
+ */
+#define SUDOERS_LOCALE_USER 0
+#define SUDOERS_LOCALE_SUDOERS 1
+
+/* Logging types */
+#define SLOG_SYSLOG 0x01
+#define SLOG_FILE 0x02
+#define SLOG_BOTH 0x03
+
+/* Flags for log_warning()/log_warningx() */
+#define SLOG_USE_ERRNO 0x01 /* internal use only */
+#define SLOG_GAI_ERRNO 0x02 /* internal use only */
+#define SLOG_RAW_MSG 0x04 /* do not format msg before logging */
+#define SLOG_SEND_MAIL 0x08 /* log via mail */
+#define SLOG_NO_STDERR 0x10 /* do not log via stderr */
+#define SLOG_NO_LOG 0x20 /* do not log via file or syslog */
+#define SLOG_AUDIT 0x40 /* send message to audit as well */
+#define SLOG_PARSE_ERROR 0x80 /* format as a parse error */
+
+struct sudoers_context;
+typedef bool (*sudoers_logger_t)(const struct sudoers_context *ctx, const char *file, int line, int column, const char * restrict fmt, va_list args);
+
+/* XXX - needed for auditing */
+extern char *audit_msg;
+
+union sudo_defs_val;
+struct sudo_plugin_event;
+struct log_details;
+
+bool sudoers_warn_setlocale(bool restore, int *cookie);
+bool sudoers_setlocale(int locale_type, int *prev_locale);
+int sudoers_getlocale(void);
+int audit_failure(const struct sudoers_context *ctx, char *const argv[], char const * restrict const fmt, ...) sudo_printflike(3, 4);
+int vaudit_failure(const struct sudoers_context *ctx, char *const argv[], char const * restrict const fmt, va_list ap) sudo_printflike(3, 0);
+bool log_allowed(const struct sudoers_context *ctx, struct eventlog *evlog);
+bool log_exit_status(const struct sudoers_context *ctx, int exit_status);
+bool log_auth_failure(const struct sudoers_context *ctx, unsigned int status, unsigned int tries);
+bool log_denial(const struct sudoers_context *ctx, unsigned int status, bool inform_user);
+bool log_failure(const struct sudoers_context *ctx, unsigned int status, int flags);
+bool log_server_alert(const struct sudoers_context *ctx, struct eventlog *evlog, struct timespec *now, const char *message, const char *errstr);
+bool log_server_reject(const struct sudoers_context *ctx, struct eventlog *evlog, const char *message);
+bool log_warning(const struct sudoers_context *ctx, unsigned int flags, const char * restrict fmt, ...) sudo_printflike(3, 4);
+bool log_warningx(const struct sudoers_context *ctx, unsigned int flags, const char * restrict fmt, ...) sudo_printflike(3, 4);
+bool gai_log_warning(const struct sudoers_context *ctx, unsigned int flags, int errnum, const char * restrict fmt, ...) sudo_printflike(4, 5);
+bool sudoers_initlocale(const char *ulocale, const char *slocale);
+bool sudoers_locale_callback(struct sudoers_context *ctx, const char *file, int line, int column, const union sudo_defs_val *sd_un, int op);
+void sudoers_to_eventlog(const struct sudoers_context *ctx, struct eventlog *evlog, const char *cmnd, char * const runargv[], char *const runenv[], const char *uuid_str);
+void init_eventlog_config(void);
+bool init_log_details(struct log_details *details, struct eventlog *evlog);
+bool log_parse_error(const struct sudoers_context *ctx, const char *file, int line, int column, const char * restrict fmt, va_list ap) sudo_printf0like(5, 0);
+bool mail_parse_errors(const struct sudoers_context *ctx);
+
+#endif /* SUDOERS_LOGGING_H */