summaryrefslogtreecommitdiffstats
path: root/plugins/sudoers/iolog_path_escapes.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--plugins/sudoers/iolog_path_escapes.c170
1 files changed, 170 insertions, 0 deletions
diff --git a/plugins/sudoers/iolog_path_escapes.c b/plugins/sudoers/iolog_path_escapes.c
new file mode 100644
index 0000000..d234c55
--- /dev/null
+++ b/plugins/sudoers/iolog_path_escapes.c
@@ -0,0 +1,170 @@
+/*
+ * SPDX-License-Identifier: ISC
+ *
+ * Copyright (c) 2011-2015 Todd C. Miller <Todd.Miller@sudo.ws>
+ *
+ * Permission to use, copy, modify, and distribute this software for any
+ * purpose with or without fee is hereby granted, provided that the above
+ * copyright notice and this permission notice appear in all copies.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
+ * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
+ * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
+ * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
+ */
+
+/*
+ * This is an open source non-commercial project. Dear PVS-Studio, please check it.
+ * PVS-Studio Static Code Analyzer for C, C++ and C#: http://www.viva64.com
+ */
+
+#include <config.h>
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <pwd.h>
+#include <grp.h>
+#include <unistd.h>
+
+#include <sudoers.h>
+#include <sudo_iolog.h>
+
+/*
+ * Like strlcpy(3) but replaces '/' with '_'.
+ */
+static size_t
+strlcpy_no_slash(char *dst, const char *src, size_t size)
+{
+ size_t len = 0;
+ char ch;
+ debug_decl(strlcpy_no_slash, SUDOERS_DEBUG_UTIL);
+
+ while ((ch = *src++) != '\0') {
+ if (size > 1) {
+ /* Replace '/' with '_' */
+ if (ch == '/')
+ ch = '_';
+ *dst++ = ch;
+ size--;
+ }
+ len++;
+ }
+ if (size > 0)
+ *dst = '\0';
+
+ debug_return_size_t(len);
+}
+
+static size_t
+fill_seq(char *str, size_t strsize, void *v)
+{
+#ifdef SUDOERS_NO_SEQ
+ debug_decl(fill_seq, SUDOERS_DEBUG_UTIL);
+ debug_return_size_t(strlcpy(str, "%{seq}", strsize));
+#else
+ struct sudoers_context *ctx = v;
+ static char sessid[7];
+ int len;
+ debug_decl(fill_seq, SUDOERS_DEBUG_UTIL);
+
+ if (sessid[0] == '\0') {
+ if (!iolog_nextid(ctx->iolog_dir, sessid))
+ debug_return_size_t((size_t)-1);
+ }
+
+ /* Path is of the form /var/log/sudo-io/00/00/01. */
+ len = snprintf(str, strsize, "%c%c/%c%c/%c%c", sessid[0],
+ sessid[1], sessid[2], sessid[3], sessid[4], sessid[5]);
+ if (len < 0)
+ debug_return_size_t(strsize); /* handle non-standard snprintf() */
+ debug_return_size_t((size_t)len);
+#endif /* SUDOERS_NO_SEQ */
+}
+
+static size_t
+fill_user(char *str, size_t strsize, void *v)
+{
+ struct sudoers_context *ctx = v;
+ debug_decl(fill_user, SUDOERS_DEBUG_UTIL);
+ debug_return_size_t(strlcpy_no_slash(str, ctx->user.name, strsize));
+}
+
+static size_t
+fill_group(char *str, size_t strsize, void *v)
+{
+ struct sudoers_context *ctx = v;
+ struct group *grp;
+ size_t len;
+ debug_decl(fill_group, SUDOERS_DEBUG_UTIL);
+
+ if ((grp = sudo_getgrgid(ctx->user.gid)) != NULL) {
+ len = strlcpy_no_slash(str, grp->gr_name, strsize);
+ sudo_gr_delref(grp);
+ } else {
+ len = (size_t)snprintf(str, strsize, "#%u", (unsigned int)ctx->user.gid);
+ }
+ debug_return_size_t(len);
+}
+
+static size_t
+fill_runas_user(char *str, size_t strsize, void *v)
+{
+ struct sudoers_context *ctx = v;
+ debug_decl(fill_runas_user, SUDOERS_DEBUG_UTIL);
+ debug_return_size_t(strlcpy_no_slash(str, ctx->runas.pw->pw_name, strsize));
+}
+
+static size_t
+fill_runas_group(char *str, size_t strsize, void *v)
+{
+ struct sudoers_context *ctx = v;
+ struct group *grp;
+ size_t len;
+ debug_decl(fill_runas_group, SUDOERS_DEBUG_UTIL);
+
+ if (ctx->runas.gr != NULL) {
+ len = strlcpy_no_slash(str, ctx->runas.gr->gr_name, strsize);
+ } else {
+ if ((grp = sudo_getgrgid(ctx->runas.pw->pw_gid)) != NULL) {
+ len = strlcpy_no_slash(str, grp->gr_name, strsize);
+ sudo_gr_delref(grp);
+ } else {
+ len = (size_t)snprintf(str, strsize, "#%u",
+ (unsigned int)ctx->runas.pw->pw_gid);
+ }
+ }
+ debug_return_size_t(len);
+}
+
+static size_t
+fill_hostname(char *str, size_t strsize, void *v)
+{
+ struct sudoers_context *ctx = v;
+ debug_decl(fill_hostname, SUDOERS_DEBUG_UTIL);
+ debug_return_size_t(strlcpy_no_slash(str, ctx->user.shost, strsize));
+}
+
+static size_t
+fill_command(char *str, size_t strsize, void *v)
+{
+ struct sudoers_context *ctx = v;
+ debug_decl(fill_command, SUDOERS_DEBUG_UTIL);
+ debug_return_size_t(strlcpy_no_slash(str, ctx->user.cmnd_base, strsize));
+}
+
+/* Note: "seq" must be first in the list. */
+static const struct iolog_path_escape path_escapes[] = {
+ { "seq", fill_seq },
+ { "user", fill_user },
+ { "group", fill_group },
+ { "runas_user", fill_runas_user },
+ { "runas_group", fill_runas_group },
+ { "hostname", fill_hostname },
+ { "command", fill_command },
+ { NULL, NULL }
+};
+const struct iolog_path_escape *sudoers_iolog_path_escapes = path_escapes;