summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--Makefile.in1
-rw-r--r--shell.c3
-rw-r--r--vyatta-restricted.c363
-rw-r--r--vyatta-restricted.h14
4 files changed, 271 insertions, 110 deletions
diff --git a/Makefile.in b/Makefile.in
index d4dbc00..28af658 100644
--- a/Makefile.in
+++ b/Makefile.in
@@ -936,7 +936,6 @@ shell.o: make_cmd.h subst.h sig.h pathnames.h externs.h
shell.o: flags.h trap.h mailcheck.h builtins.h $(DEFSRC)/common.h
shell.o: jobs.h siglist.h input.h execute_cmd.h findcmd.h bashhist.h
shell.o: ${GLOB_LIBSRC}/strmatch.h ${BASHINCDIR}/posixtime.h
-shell.o: vyatta-restricted.h
sig.o: config.h bashtypes.h
sig.o: shell.h syntax.h config.h bashjmp.h ${BASHINCDIR}/posixjmp.h command.h ${BASHINCDIR}/stdc.h error.h
sig.o: general.h xmalloc.h bashtypes.h variables.h arrayfunc.h conftypes.h array.h hashlib.h
diff --git a/shell.c b/shell.c
index 36a9c66..b8dcf32 100644
--- a/shell.c
+++ b/shell.c
@@ -528,9 +528,6 @@ main (argc, argv, env)
if (shopt_alist)
run_shopt_alist ();
- /* check and set the default vyatta restricted mode */
- set_vyatta_restricted_mode ();
-
/* From here on in, the shell must be a normal functioning shell.
Variables from the environment are expected to be set, etc. */
shell_initialize ();
diff --git a/vyatta-restricted.c b/vyatta-restricted.c
index fc9ea6d..e23e25e 100644
--- a/vyatta-restricted.c
+++ b/vyatta-restricted.c
@@ -22,6 +22,25 @@
#include "shell.h"
#include "vyatta-restricted.h"
+#define FILENAME_MODE "restricted-mode"
+#define FILENAME_OP "allowed-op"
+#define FILENAME_CFG "allowed-cfg"
+#define FILENAME_PIPE "allowed-pipe"
+
+static char *prev_cmdline = NULL;
+
+/* allowed commands lists */
+static char **allowed_op_cmds = NULL;
+static char **allowed_cfg_cmds = NULL;
+static char **allowed_pipe_cmds = NULL;
+static int *pipe_cmd_args = NULL;
+
+static char *vyatta_user_level_dir = NULL;
+
+/* default restricted mode */
+static int vyatta_default_output_restricted = 0;
+static int vyatta_default_full_restricted = 0;
+
static int
is_in_command_list(const char *cmd, char *cmds[])
{
@@ -37,12 +56,20 @@ is_in_command_list(const char *cmd, char *cmds[])
static int
is_vyatta_restricted_pipe_command(WORD_LIST *words)
{
- char *allowed_commands[] = { "more", NULL };
+ WORD_LIST *w = words;
+ int count = 1;
+ while (w = w->next) {
+ count++;
+ }
if (words) {
- if (!words->next) {
- /* only 1 word */
- if (is_in_command_list(words->word->word, allowed_commands)) {
- /* allowed */
+ int i = 0;
+ if (!allowed_pipe_cmds) {
+ /* no restriction */
+ return 1;
+ }
+ for (i = 0; allowed_pipe_cmds[i]; i++) {
+ if (strcmp(words->word->word, allowed_pipe_cmds[i]) == 0
+ && count == pipe_cmd_args[i]) {
return 1;
}
}
@@ -148,49 +175,23 @@ is_vyatta_restricted_command(COMMAND *cmd)
static int
is_vyatta_cfg_command(const char *cmd)
{
- char *valid_commands[] = { "set", "delete", "commit", "save", "load",
- "show", "exit", "edit", "run", NULL };
- return is_in_command_list(cmd, valid_commands);
+ if (!allowed_cfg_cmds) {
+ /* no restriction */
+ return 1;
+ }
+ return is_in_command_list(cmd, allowed_cfg_cmds);
}
static int
is_vyatta_op_command(const char *cmd)
{
- char *dir = getenv("vyatta_op_templates");
- DIR *dp = NULL;
- struct dirent *dent = NULL;
- char *restrict_exclude_commands[]
- = { "clear", "configure", "init-floppy", "install-system", "no",
- "reboot", "set", "telnet", NULL };
- char *other_commands[] = { "exit", NULL };
- int ret = 0;
-
- if (dir == NULL || (dp = opendir(dir)) == NULL) {
- return 0;
- }
-
- /* FIXME this assumes FULL == "users" */
- if (in_vyatta_restricted_mode(FULL)
- && is_in_command_list(cmd, restrict_exclude_commands)) {
- /* command not allowed in "full" restricted mode */
- return 0;
- }
-
- while (dent = readdir(dp)) {
- if (strncmp(dent->d_name, ".", 1) == 0) {
- continue;
- }
- if (strcmp(dent->d_name, cmd) == 0) {
- ret = 1;
- break;
- }
+ if (!allowed_op_cmds) {
+ /* no restriction */
+ return 1;
}
- closedir(dp);
- return (ret) ? 1 : is_in_command_list(cmd, other_commands);
+ return is_in_command_list(cmd, allowed_op_cmds);
}
-static char *prev_cmdline = NULL;
-
int
is_vyatta_command(char *cmdline, COMMAND *cmd)
{
@@ -243,90 +244,264 @@ is_vyatta_command(char *cmdline, COMMAND *cmd)
return ret;
}
-static int
-vyatta_user_in_group(uid_t ruid, char *grp_name)
+static FILE *
+fopen_level_file(char *file_name)
{
- int ret = 0;
- struct passwd pw;
- struct passwd *pwp = NULL;
- struct group grp;
- struct group *grpp = NULL;
- char *pbuf = NULL, *gbuf = NULL;
- long psize = 0, gsize = 0;
-
- if (!grp_name) {
- return 0;
+ FILE *f = NULL;
+#define BUF_SIZE 1024
+ char *buf = (char *) xmalloc(BUF_SIZE);
+ if (!buf) {
+ return NULL;
}
do {
- psize = sysconf(_SC_GETPW_R_SIZE_MAX);
- pbuf = (char *) xmalloc(psize);
- if (!pbuf) {
+ int r = snprintf(buf, BUF_SIZE, "%s/%s", vyatta_user_level_dir, file_name);
+ if (r >= BUF_SIZE) {
break;
}
- gsize = sysconf(_SC_GETGR_R_SIZE_MAX);
- gbuf = (char *) xmalloc(gsize);
- if (!gbuf) {
- break;
+ f = fopen(buf, "r");
+ } while (0);
+
+ free(buf);
+ return f;
+}
+
+static char *
+fgets_level_file(char *buf, int size, FILE *lfile)
+{
+ if (fgets(buf, size, lfile)) {
+ int end = 0;
+ while (buf[end] && isprint(buf[end]) && !isspace(buf[end])) {
+ end++;
}
+ buf[end] = 0;
+ return buf;
+ } else {
+ return NULL;
+ }
+}
- ret = getpwuid_r(ruid, &pw, pbuf, psize, &pwp);
- if (!pwp) {
+static void
+set_default_mode()
+{
+ FILE *lfile = NULL;
+ char *line = NULL;
+ char buf[256];
+
+ /* default to full restricted */
+ vyatta_default_output_restricted = 0;
+ vyatta_default_full_restricted = 1;
+
+ if (!(lfile = fopen_level_file(FILENAME_MODE))) {
+ return;
+ }
+ while (line = fgets_level_file(buf, 256, lfile)) {
+ if (strcmp(line, "output") == 0) {
+ vyatta_default_output_restricted = 1;
+ vyatta_default_full_restricted = 0;
break;
}
-
- ret = getgrnam_r(grp_name, &grp, gbuf, gsize, &grpp);
- if (!grpp) {
+ if (strcmp(line, "full") == 0) {
+ vyatta_default_output_restricted = 0;
+ vyatta_default_full_restricted = 1;
break;
}
+ }
+ fclose(lfile);
+ return;
+}
- {
- int i = 0;
- for (i = 0; grp.gr_mem[i]; i++) {
- if (strcmp(pw.pw_name, grp.gr_mem[i]) == 0) {
- ret = 1;
- break;
- }
- }
- }
- } while (0);
+static void
+set_allowed_op_cmds()
+{
+ FILE *lfile = NULL;
+ char *line = NULL;
+ char buf[256];
+ int count = 1;
- if (pbuf) {
- free(pbuf);
+ if (allowed_op_cmds) {
+ return;
}
- if (gbuf) {
- free(gbuf);
+
+ if (!(lfile = fopen_level_file(FILENAME_OP))) {
+ return;
}
- return ret;
+ while (line = fgets_level_file(buf, 256, lfile)) {
+ count++;
+ }
+ fclose(lfile);
+
+ /* count is 1 more than number of lines */
+ allowed_op_cmds = (char **) xmalloc(sizeof(char *) * count);
+ memset(allowed_op_cmds, 0, sizeof(char *) * count);
+
+ if (!(lfile = fopen_level_file(FILENAME_OP))) {
+ return;
+ }
+ count = 0;
+ while (line = fgets_level_file(buf, 256, lfile)) {
+ allowed_op_cmds[count] = strdup(line);
+ count++;
+ }
+ fclose(lfile);
+ return;
}
-static int vyatta_default_output_restricted = 0;
-static int vyatta_default_full_restricted = 0;
+static void
+set_allowed_cfg_cmds()
+{
+ FILE *lfile = NULL;
+ char *line = NULL;
+ char buf[256];
+ int count = 1;
-#define VYATTA_OUTPUT_RESTRICTED_GROUP "vyattacfg"
+ if (allowed_cfg_cmds) {
+ return;
+ }
+
+ if (!(lfile = fopen_level_file(FILENAME_CFG))) {
+ return;
+ }
+ while (line = fgets_level_file(buf, 256, lfile)) {
+ count++;
+ }
+ fclose(lfile);
-void
-set_vyatta_restricted_mode()
+ /* count is 1 more than number of lines */
+ allowed_cfg_cmds = (char **) xmalloc(sizeof(char *) * count);
+ memset(allowed_cfg_cmds, 0, sizeof(char *) * count);
+
+ if (!(lfile = fopen_level_file(FILENAME_CFG))) {
+ return;
+ }
+ count = 0;
+ while (line = fgets_level_file(buf, 256, lfile)) {
+ allowed_cfg_cmds[count] = strdup(line);
+ count++;
+ }
+ fclose(lfile);
+ return;
+}
+
+static void
+set_allowed_pipe_cmds()
{
- uid_t ruid = getuid();
- if (vyatta_user_in_group(ruid, VYATTA_OUTPUT_RESTRICTED_GROUP)) {
- vyatta_default_output_restricted = 1;
- vyatta_default_full_restricted = 0;
- } else {
- /* if not in the output restricted group, default to full */
- vyatta_default_output_restricted = 0;
- vyatta_default_full_restricted = 1;
+ FILE *lfile = NULL;
+ char *line = NULL;
+ char buf[256];
+ int count = 0;
+
+ if (allowed_pipe_cmds) {
+ return;
+ }
+
+ if (!(lfile = fopen_level_file(FILENAME_PIPE))) {
+ return;
}
+ while (line = fgets_level_file(buf, 256, lfile)) {
+ count++;
+ }
+ fclose(lfile);
+
+ count = (count / 2) + 2;
+ /* count is 1 more than entries */
+ allowed_pipe_cmds = (char **) xmalloc(sizeof(char *) * count);
+ memset(allowed_pipe_cmds, 0, sizeof(char *) * count);
+ pipe_cmd_args = (int *) xmalloc(sizeof(int *) * count);
+ memset(pipe_cmd_args, 0, sizeof(int *) * count);
+
+ if (!(lfile = fopen_level_file(FILENAME_PIPE))) {
+ return;
+ }
+ count = 0;
+ while (line = fgets_level_file(buf, 256, lfile)) {
+ allowed_pipe_cmds[count] = strdup(line);
+ if (!(line = fgets_level_file(buf, 256, lfile))) {
+ free(allowed_pipe_cmds[count]);
+ allowed_pipe_cmds[count] = NULL;
+ break;
+ }
+ pipe_cmd_args[count] = atoi(line);
+ /* limit to between 1 and 256 */
+ if (pipe_cmd_args[count] < 1 || pipe_cmd_args[count] > 256) {
+ free(allowed_pipe_cmds[count]);
+ allowed_pipe_cmds[count] = NULL;
+ pipe_cmd_args[count] = 0;
+ break;
+ }
+ count++;
+ }
+ fclose(lfile);
+ return;
+}
+
+static int
+init_vyatta_restricted_mode()
+{
+ if (!(vyatta_user_level_dir = getenv("VYATTA_USER_LEVEL_DIR"))) {
+ /* level dir not set, return failure */
+ return 0;
+ }
+
+ /* set the default restricted mode based on level */
+ set_default_mode();
+
+ /* set the allowed commands */
+ set_allowed_op_cmds();
+ set_allowed_cfg_cmds();
+ set_allowed_pipe_cmds();
+
+ if (0) {
+ int i = 0;
+ printf("\nlevel_dir={%s}\n", vyatta_user_level_dir);
+ printf("default output=%d full=%d\n", vyatta_default_output_restricted,
+ vyatta_default_full_restricted);
+ printf("op:\n");
+ if (allowed_op_cmds) {
+ for (i = 0; allowed_op_cmds[i]; i++) {
+ printf(" %d: {%s}\n", i, allowed_op_cmds[i]);
+ }
+ } else {
+ printf(" <unlimited>\n");
+ }
+ printf("cfg:\n");
+ if (allowed_cfg_cmds) {
+ for (i = 0; allowed_cfg_cmds[i]; i++) {
+ printf(" %d: {%s}\n", i, allowed_cfg_cmds[i]);
+ }
+ } else {
+ printf(" <unlimited>\n");
+ }
+ printf("pipe:\n");
+ if (allowed_pipe_cmds) {
+ for (i = 0; allowed_pipe_cmds[i]; i++) {
+ printf(" %d: {%s}(%d)\n", i, allowed_pipe_cmds[i], pipe_cmd_args[i]);
+ }
+ } else {
+ printf(" <unlimited>\n");
+ }
+ printf("\n");
+ }
+
+ return 1;
}
int
in_vyatta_restricted_mode(enum vyatta_restricted_type type)
{
char *rval = getenv("VYATTA_RESTRICTED_MODE");
- int output = vyatta_default_output_restricted;
- int full = vyatta_default_full_restricted;
+ int output = 0;
+ int full = 0;
+
+ if (!vyatta_user_level_dir && !init_vyatta_restricted_mode()) {
+ /* init failed, return false (not restricted) */
+ return 0;
+ }
+ output = vyatta_default_output_restricted;
+ full = vyatta_default_full_restricted;
+
/* environment var overrides default */
if (rval) {
output = (strcmp(rval, "output") == 0);
diff --git a/vyatta-restricted.h b/vyatta-restricted.h
index beda140..32888c8 100644
--- a/vyatta-restricted.h
+++ b/vyatta-restricted.h
@@ -19,23 +19,13 @@
This code was originally developed by Vyatta, Inc.
Portions created by Vyatta are Copyright (C) 2007 Vyatta, Inc. */
-#include "command.h"
-
#if !defined(_VYATTA_RESTRICTED_H_)
#define _VYATTA_RESTRICTED_H_
-#if defined(HAVE_UNISTD_H)
-# include <unistd.h>
-#endif
+#include <stdio.h>
-#include <pwd.h>
-#include <dirent.h>
-
-#if defined(HAVE_GRP_H)
-# include <grp.h>
-#endif
+#include "command.h"
-extern void set_vyatta_restricted_mode __P((void));
enum vyatta_restricted_type { OUTPUT, FULL };
extern int in_vyatta_restricted_mode __P((enum vyatta_restricted_type));
extern int is_vyatta_command __P((char *, COMMAND *));