Add sudo command, add effective UID and GID, and groups file
This commit is contained in:
parent
f38426e458
commit
cb5d1fbc58
7
Makefile
7
Makefile
|
@ -29,9 +29,12 @@ clean:
|
||||||
cargo clean --manifest-path drivers/pcid/Cargo.toml
|
cargo clean --manifest-path drivers/pcid/Cargo.toml
|
||||||
cargo clean --manifest-path drivers/vesad/Cargo.toml
|
cargo clean --manifest-path drivers/vesad/Cargo.toml
|
||||||
cargo clean --manifest-path programs/getty/Cargo.toml
|
cargo clean --manifest-path programs/getty/Cargo.toml
|
||||||
|
cargo clean --manifest-path programs/id/Cargo.toml
|
||||||
cargo clean --manifest-path programs/init/Cargo.toml
|
cargo clean --manifest-path programs/init/Cargo.toml
|
||||||
|
cargo clean --manifest-path programs/sudo/Cargo.toml
|
||||||
cargo clean --manifest-path programs/ion/Cargo.toml
|
cargo clean --manifest-path programs/ion/Cargo.toml
|
||||||
cargo clean --manifest-path programs/login/Cargo.toml
|
cargo clean --manifest-path programs/login/Cargo.toml
|
||||||
|
cargo clean --manifest-path programs/sudo/Cargo.toml
|
||||||
cargo clean --manifest-path programs/coreutils/Cargo.toml
|
cargo clean --manifest-path programs/coreutils/Cargo.toml
|
||||||
cargo clean --manifest-path programs/extrautils/Cargo.toml
|
cargo clean --manifest-path programs/extrautils/Cargo.toml
|
||||||
cargo clean --manifest-path programs/smith/Cargo.toml
|
cargo clean --manifest-path programs/smith/Cargo.toml
|
||||||
|
@ -279,7 +282,8 @@ $(BUILD)/filesystem.bin: \
|
||||||
filesystem/bin/id \
|
filesystem/bin/id \
|
||||||
filesystem/bin/ion \
|
filesystem/bin/ion \
|
||||||
filesystem/bin/login \
|
filesystem/bin/login \
|
||||||
filesystem/bin/smith
|
filesystem/bin/smith \
|
||||||
|
filesystem/bin/sudo
|
||||||
rm -rf $@ $(BUILD)/filesystem/
|
rm -rf $@ $(BUILD)/filesystem/
|
||||||
echo exit | cargo run --manifest-path schemes/redoxfs/Cargo.toml --bin redoxfs-utility $@ 8
|
echo exit | cargo run --manifest-path schemes/redoxfs/Cargo.toml --bin redoxfs-utility $@ 8
|
||||||
mkdir -p $(BUILD)/filesystem/
|
mkdir -p $(BUILD)/filesystem/
|
||||||
|
@ -290,6 +294,7 @@ $(BUILD)/filesystem.bin: \
|
||||||
-chown -R 1000:1000 $(BUILD)/filesystem/home/user/
|
-chown -R 1000:1000 $(BUILD)/filesystem/home/user/
|
||||||
-chmod 700 $(BUILD)/filesystem/root/
|
-chmod 700 $(BUILD)/filesystem/root/
|
||||||
-chmod 700 $(BUILD)/filesystem/home/user/
|
-chmod 700 $(BUILD)/filesystem/home/user/
|
||||||
|
-chmod +s $(BUILD)/filesystem/bin/sudo
|
||||||
sync
|
sync
|
||||||
-fusermount -u $(BUILD)/filesystem/
|
-fusermount -u $(BUILD)/filesystem/
|
||||||
rm -rf $(BUILD)/filesystem/
|
rm -rf $(BUILD)/filesystem/
|
||||||
|
|
1
filesystem/etc/group
Normal file
1
filesystem/etc/group
Normal file
|
@ -0,0 +1 @@
|
||||||
|
sudo;1;user
|
|
@ -22,10 +22,14 @@ pub struct Context {
|
||||||
pub id: usize,
|
pub id: usize,
|
||||||
/// The ID of the parent context
|
/// The ID of the parent context
|
||||||
pub ppid: usize,
|
pub ppid: usize,
|
||||||
/// The user id
|
/// The real user id
|
||||||
pub uid: u32,
|
pub ruid: u32,
|
||||||
/// The group id
|
/// The real group id
|
||||||
pub gid: u32,
|
pub rgid: u32,
|
||||||
|
/// The effective user id
|
||||||
|
pub euid: u32,
|
||||||
|
/// The effective group id
|
||||||
|
pub egid: u32,
|
||||||
/// Status of context
|
/// Status of context
|
||||||
pub status: Status,
|
pub status: Status,
|
||||||
/// Context running or not
|
/// Context running or not
|
||||||
|
@ -62,8 +66,10 @@ impl Context {
|
||||||
Context {
|
Context {
|
||||||
id: id,
|
id: id,
|
||||||
ppid: 0,
|
ppid: 0,
|
||||||
uid: 0,
|
ruid: 0,
|
||||||
gid: 0,
|
rgid: 0,
|
||||||
|
euid: 0,
|
||||||
|
egid: 0,
|
||||||
status: Status::Blocked,
|
status: Status::Blocked,
|
||||||
running: false,
|
running: false,
|
||||||
vfork: false,
|
vfork: false,
|
||||||
|
|
|
@ -38,7 +38,7 @@ impl UserInner {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
(context.id, context.uid, context.gid)
|
(context.id, context.euid, context.egid)
|
||||||
};
|
};
|
||||||
|
|
||||||
let id = self.next_id.fetch_add(1, Ordering::SeqCst);
|
let id = self.next_id.fetch_add(1, Ordering::SeqCst);
|
||||||
|
|
|
@ -11,7 +11,7 @@ pub fn file_op(a: usize, fd: usize, c: usize, d: usize) -> Result<usize> {
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
let file = context.get_file(fd).ok_or(Error::new(EBADF))?;
|
let file = context.get_file(fd).ok_or(Error::new(EBADF))?;
|
||||||
(file, context.id, context.uid, context.gid)
|
(file, context.id, context.euid, context.egid)
|
||||||
};
|
};
|
||||||
|
|
||||||
let scheme = {
|
let scheme = {
|
||||||
|
@ -74,7 +74,7 @@ pub fn open(path: &[u8], flags: usize) -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
(context.canonicalize(path), context.uid, context.gid)
|
(context.canonicalize(path), context.euid, context.egid)
|
||||||
};
|
};
|
||||||
|
|
||||||
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
||||||
|
@ -107,7 +107,7 @@ pub fn mkdir(path: &[u8], mode: u16) -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
(context.canonicalize(path), context.uid, context.gid)
|
(context.canonicalize(path), context.euid, context.egid)
|
||||||
};
|
};
|
||||||
|
|
||||||
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
||||||
|
@ -129,7 +129,7 @@ pub fn rmdir(path: &[u8]) -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
(context.canonicalize(path), context.uid, context.gid)
|
(context.canonicalize(path), context.euid, context.egid)
|
||||||
};
|
};
|
||||||
|
|
||||||
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
||||||
|
@ -151,7 +151,7 @@ pub fn unlink(path: &[u8]) -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
(context.canonicalize(path), context.uid, context.gid)
|
(context.canonicalize(path), context.euid, context.egid)
|
||||||
};
|
};
|
||||||
|
|
||||||
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
let mut parts = path_canon.splitn(2, |&b| b == b':');
|
||||||
|
|
|
@ -55,6 +55,8 @@ pub extern fn syscall(a: usize, b: usize, c: usize, d: usize, e: usize, f: usize
|
||||||
SYS_GETCWD => getcwd(validate_slice_mut(b as *mut u8, c)?),
|
SYS_GETCWD => getcwd(validate_slice_mut(b as *mut u8, c)?),
|
||||||
SYS_GETUID => getuid(),
|
SYS_GETUID => getuid(),
|
||||||
SYS_GETGID => getgid(),
|
SYS_GETGID => getgid(),
|
||||||
|
SYS_GETEUID => geteuid(),
|
||||||
|
SYS_GETEGID => getegid(),
|
||||||
SYS_SETUID => setuid(b as u32),
|
SYS_SETUID => setuid(b as u32),
|
||||||
SYS_SETGID => setgid(b as u32),
|
SYS_SETGID => setgid(b as u32),
|
||||||
SYS_PHYSALLOC => physalloc(b),
|
SYS_PHYSALLOC => physalloc(b),
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
///! Process syscalls
|
///! Process syscalls
|
||||||
use alloc::arc::Arc;
|
use alloc::arc::Arc;
|
||||||
use alloc::boxed::Box;
|
use alloc::boxed::Box;
|
||||||
use collections::Vec;
|
use collections::{BTreeMap, Vec};
|
||||||
use core::mem;
|
use core::mem;
|
||||||
use core::str;
|
use core::str;
|
||||||
use spin::Mutex;
|
use spin::Mutex;
|
||||||
|
@ -58,8 +58,10 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
|
||||||
let ppid;
|
let ppid;
|
||||||
let pid;
|
let pid;
|
||||||
{
|
{
|
||||||
let uid;
|
let ruid;
|
||||||
let gid;
|
let rgid;
|
||||||
|
let euid;
|
||||||
|
let egid;
|
||||||
let arch;
|
let arch;
|
||||||
let vfork;
|
let vfork;
|
||||||
let mut kfx_option = None;
|
let mut kfx_option = None;
|
||||||
|
@ -80,8 +82,10 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
|
|
||||||
ppid = context.id;
|
ppid = context.id;
|
||||||
uid = context.uid;
|
ruid = context.ruid;
|
||||||
gid = context.gid;
|
rgid = context.rgid;
|
||||||
|
euid = context.euid;
|
||||||
|
egid = context.egid;
|
||||||
|
|
||||||
arch = context.arch.clone();
|
arch = context.arch.clone();
|
||||||
|
|
||||||
|
@ -191,7 +195,11 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
|
||||||
if flags & CLONE_VM == CLONE_VM {
|
if flags & CLONE_VM == CLONE_VM {
|
||||||
env = context.env.clone();
|
env = context.env.clone();
|
||||||
} else {
|
} else {
|
||||||
env = Arc::new(Mutex::new(context.env.lock().clone()));
|
let mut new_env = BTreeMap::new();
|
||||||
|
for item in context.env.lock().iter() {
|
||||||
|
new_env.insert(item.0.clone(), Arc::new(Mutex::new(item.1.lock().clone())));
|
||||||
|
}
|
||||||
|
env = Arc::new(Mutex::new(new_env));
|
||||||
}
|
}
|
||||||
|
|
||||||
if flags & CLONE_FILES == CLONE_FILES {
|
if flags & CLONE_FILES == CLONE_FILES {
|
||||||
|
@ -253,8 +261,10 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
|
||||||
pid = context.id;
|
pid = context.id;
|
||||||
|
|
||||||
context.ppid = ppid;
|
context.ppid = ppid;
|
||||||
context.uid = uid;
|
context.ruid = ruid;
|
||||||
context.gid = gid;
|
context.rgid = rgid;
|
||||||
|
context.euid = euid;
|
||||||
|
context.egid = egid;
|
||||||
|
|
||||||
context.status = context::Status::Runnable;
|
context.status = context::Status::Runnable;
|
||||||
|
|
||||||
|
@ -436,7 +446,7 @@ pub fn exec(path: &[u8], arg_ptrs: &[[usize; 2]]) -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
(context.uid, context.gid)
|
(context.euid, context.egid)
|
||||||
};
|
};
|
||||||
|
|
||||||
let file = syscall::open(path, 0)?;
|
let file = syscall::open(path, 0)?;
|
||||||
|
@ -483,11 +493,11 @@ pub fn exec(path: &[u8], arg_ptrs: &[[usize; 2]]) -> Result<usize> {
|
||||||
context.grants = Arc::new(Mutex::new(Vec::new()));
|
context.grants = Arc::new(Mutex::new(Vec::new()));
|
||||||
|
|
||||||
if stat.st_mode & syscall::flag::MODE_SETUID == syscall::flag::MODE_SETUID {
|
if stat.st_mode & syscall::flag::MODE_SETUID == syscall::flag::MODE_SETUID {
|
||||||
context.uid = stat.st_uid;
|
context.euid = stat.st_uid;
|
||||||
}
|
}
|
||||||
|
|
||||||
if stat.st_mode & syscall::flag::MODE_SETGID == syscall::flag::MODE_SETGID {
|
if stat.st_mode & syscall::flag::MODE_SETGID == syscall::flag::MODE_SETGID {
|
||||||
context.gid = stat.st_gid;
|
context.egid = stat.st_gid;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Map and copy new segments
|
// Map and copy new segments
|
||||||
|
@ -612,11 +622,25 @@ pub fn exec(path: &[u8], arg_ptrs: &[[usize; 2]]) -> Result<usize> {
|
||||||
unsafe { usermode(entry, sp); }
|
unsafe { usermode(entry, sp); }
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn getegid() -> Result<usize> {
|
||||||
|
let contexts = context::contexts();
|
||||||
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
|
let context = context_lock.read();
|
||||||
|
Ok(context.egid as usize)
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn geteuid() -> Result<usize> {
|
||||||
|
let contexts = context::contexts();
|
||||||
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
|
let context = context_lock.read();
|
||||||
|
Ok(context.euid as usize)
|
||||||
|
}
|
||||||
|
|
||||||
pub fn getgid() -> Result<usize> {
|
pub fn getgid() -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
Ok(context.gid as usize)
|
Ok(context.rgid as usize)
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn getpid() -> Result<usize> {
|
pub fn getpid() -> Result<usize> {
|
||||||
|
@ -630,7 +654,7 @@ pub fn getuid() -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let context = context_lock.read();
|
let context = context_lock.read();
|
||||||
Ok(context.uid as usize)
|
Ok(context.ruid as usize)
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn iopl(_level: usize) -> Result<usize> {
|
pub fn iopl(_level: usize) -> Result<usize> {
|
||||||
|
@ -734,10 +758,9 @@ pub fn setgid(gid: u32) -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let mut context = context_lock.write();
|
let mut context = context_lock.write();
|
||||||
if context.gid == 0 {
|
if context.egid == 0 {
|
||||||
context.gid = gid;
|
context.rgid = gid;
|
||||||
Ok(0)
|
context.egid = gid;
|
||||||
} else if context.gid == gid {
|
|
||||||
Ok(0)
|
Ok(0)
|
||||||
} else {
|
} else {
|
||||||
Err(Error::new(EPERM))
|
Err(Error::new(EPERM))
|
||||||
|
@ -748,10 +771,9 @@ pub fn setuid(uid: u32) -> Result<usize> {
|
||||||
let contexts = context::contexts();
|
let contexts = context::contexts();
|
||||||
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
|
||||||
let mut context = context_lock.write();
|
let mut context = context_lock.write();
|
||||||
if context.uid == 0 {
|
if context.euid == 0 {
|
||||||
context.uid = uid;
|
context.ruid = uid;
|
||||||
Ok(0)
|
context.euid = uid;
|
||||||
} else if context.uid == uid {
|
|
||||||
Ok(0)
|
Ok(0)
|
||||||
} else {
|
} else {
|
||||||
Err(Error::new(EPERM))
|
Err(Error::new(EPERM))
|
||||||
|
|
2
libstd
2
libstd
|
@ -1 +1 @@
|
||||||
Subproject commit 0484051024316956c9e658ed7c3211f76a30a2f9
|
Subproject commit 07d687dedcb9a8d76830fd54f6b992cbc3e49aa4
|
|
@ -1,5 +1,3 @@
|
||||||
#![feature(question_mark)]
|
|
||||||
|
|
||||||
extern crate syscall;
|
extern crate syscall;
|
||||||
|
|
||||||
use std::env;
|
use std::env;
|
||||||
|
|
|
@ -6,9 +6,10 @@ extern crate termion;
|
||||||
use octavo::octavo_digest::Digest;
|
use octavo::octavo_digest::Digest;
|
||||||
use octavo::octavo_digest::sha3::Sha512;
|
use octavo::octavo_digest::sha3::Sha512;
|
||||||
use std::fs::File;
|
use std::fs::File;
|
||||||
use std::io::{Read, Write};
|
use std::io::{self, Read, Write};
|
||||||
use std::process::{Command, CommandExt};
|
use std::os::unix::process::CommandExt;
|
||||||
use std::{io, str};
|
use std::process::Command;
|
||||||
|
use std::str;
|
||||||
use termion::input::TermRead;
|
use termion::input::TermRead;
|
||||||
|
|
||||||
pub struct Passwd<'a> {
|
pub struct Passwd<'a> {
|
||||||
|
|
6
programs/sudo/Cargo.toml
Normal file
6
programs/sudo/Cargo.toml
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
[package]
|
||||||
|
name = "sudo"
|
||||||
|
version = "0.1.0"
|
||||||
|
|
||||||
|
[dependencies]
|
||||||
|
syscall = { path = "../../syscall/" }
|
123
programs/sudo/src/main.rs
Normal file
123
programs/sudo/src/main.rs
Normal file
|
@ -0,0 +1,123 @@
|
||||||
|
#![feature(question_mark)]
|
||||||
|
|
||||||
|
extern crate syscall;
|
||||||
|
|
||||||
|
use std::env;
|
||||||
|
use std::fs::File;
|
||||||
|
use std::io::Read;
|
||||||
|
use std::os::unix::process::CommandExt;
|
||||||
|
use std::process::{self, Command};
|
||||||
|
|
||||||
|
pub struct Passwd<'a> {
|
||||||
|
user: &'a str,
|
||||||
|
hash: &'a str,
|
||||||
|
uid: u32,
|
||||||
|
gid: u32,
|
||||||
|
name: &'a str,
|
||||||
|
home: &'a str,
|
||||||
|
shell: &'a str
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<'a> Passwd<'a> {
|
||||||
|
pub fn parse(line: &'a str) -> Result<Passwd<'a>, ()> {
|
||||||
|
let mut parts = line.split(';');
|
||||||
|
|
||||||
|
let user = parts.next().ok_or(())?;
|
||||||
|
let hash = parts.next().ok_or(())?;
|
||||||
|
let uid = parts.next().ok_or(())?.parse::<u32>().or(Err(()))?;
|
||||||
|
let gid = parts.next().ok_or(())?.parse::<u32>().or(Err(()))?;
|
||||||
|
let name = parts.next().ok_or(())?;
|
||||||
|
let home = parts.next().ok_or(())?;
|
||||||
|
let shell = parts.next().ok_or(())?;
|
||||||
|
|
||||||
|
Ok(Passwd {
|
||||||
|
user: user,
|
||||||
|
hash: hash,
|
||||||
|
uid: uid,
|
||||||
|
gid: gid,
|
||||||
|
name: name,
|
||||||
|
home: home,
|
||||||
|
shell: shell
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub struct Group<'a> {
|
||||||
|
group: &'a str,
|
||||||
|
gid: u32,
|
||||||
|
users: &'a str,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<'a> Group<'a> {
|
||||||
|
pub fn parse(line: &'a str) -> Result<Group<'a>, ()> {
|
||||||
|
let mut parts = line.split(';');
|
||||||
|
|
||||||
|
let group = parts.next().ok_or(())?;
|
||||||
|
let gid = parts.next().ok_or(())?.parse::<u32>().or(Err(()))?;
|
||||||
|
let users = parts.next().ok_or(())?;
|
||||||
|
|
||||||
|
Ok(Group {
|
||||||
|
group: group,
|
||||||
|
gid: gid,
|
||||||
|
users: users
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn main() {
|
||||||
|
let mut args = env::args().skip(1);
|
||||||
|
let cmd = args.next().expect("sudo: no command provided");
|
||||||
|
|
||||||
|
let uid = syscall::getuid().unwrap() as u32;
|
||||||
|
|
||||||
|
if uid != 0 {
|
||||||
|
let mut passwd_string = String::new();
|
||||||
|
File::open("file:etc/passwd").unwrap().read_to_string(&mut passwd_string).unwrap();
|
||||||
|
|
||||||
|
let mut passwd_option = None;
|
||||||
|
for line in passwd_string.lines() {
|
||||||
|
if let Ok(passwd) = Passwd::parse(line) {
|
||||||
|
if uid == passwd.uid {
|
||||||
|
passwd_option = Some(passwd);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
let passwd = passwd_option.expect("sudo: user not found in passwd");
|
||||||
|
|
||||||
|
let mut group_string = String::new();
|
||||||
|
File::open("file:etc/group").unwrap().read_to_string(&mut group_string).unwrap();
|
||||||
|
|
||||||
|
let mut group_option = None;
|
||||||
|
for line in group_string.lines() {
|
||||||
|
if let Ok(group) = Group::parse(line) {
|
||||||
|
if group.group == "sudo" && group.users.split(',').any(|name| name == passwd.user) {
|
||||||
|
group_option = Some(group);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if group_option.is_none() {
|
||||||
|
panic!("sudo: '{}' not in sudo group", passwd.user);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
let mut command = Command::new(&cmd);
|
||||||
|
for arg in args {
|
||||||
|
command.arg(&arg);
|
||||||
|
}
|
||||||
|
|
||||||
|
command.uid(0);
|
||||||
|
command.gid(0);
|
||||||
|
command.env("USER", "root");
|
||||||
|
|
||||||
|
match command.spawn() {
|
||||||
|
Ok(mut child) => match child.wait() {
|
||||||
|
Ok(status) => process::exit(status.code().unwrap_or(0)),
|
||||||
|
Err(err) => panic!("sudo: failed to wait for {}: {}", cmd, err)
|
||||||
|
},
|
||||||
|
Err(err) => panic!("sudo: failed to execute {}: {}", cmd, err)
|
||||||
|
}
|
||||||
|
}
|
|
@ -88,6 +88,14 @@ pub fn getcwd(buf: &mut [u8]) -> Result<usize> {
|
||||||
unsafe { syscall2(SYS_GETCWD, buf.as_mut_ptr() as usize, buf.len()) }
|
unsafe { syscall2(SYS_GETCWD, buf.as_mut_ptr() as usize, buf.len()) }
|
||||||
}
|
}
|
||||||
|
|
||||||
|
pub fn getegid() -> Result<usize> {
|
||||||
|
unsafe { syscall0(SYS_GETEGID) }
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn geteuid() -> Result<usize> {
|
||||||
|
unsafe { syscall0(SYS_GETEUID) }
|
||||||
|
}
|
||||||
|
|
||||||
pub fn getgid() -> Result<usize> {
|
pub fn getgid() -> Result<usize> {
|
||||||
unsafe { syscall0(SYS_GETGID) }
|
unsafe { syscall0(SYS_GETGID) }
|
||||||
}
|
}
|
||||||
|
|
|
@ -35,6 +35,8 @@ pub const SYS_EXECVE: usize = 11;
|
||||||
pub const SYS_EXIT: usize = 1;
|
pub const SYS_EXIT: usize = 1;
|
||||||
pub const SYS_FUTEX: usize = 240;
|
pub const SYS_FUTEX: usize = 240;
|
||||||
pub const SYS_GETCWD: usize = 183;
|
pub const SYS_GETCWD: usize = 183;
|
||||||
|
pub const SYS_GETEGID: usize = 202;
|
||||||
|
pub const SYS_GETEUID: usize = 201;
|
||||||
pub const SYS_GETGID: usize = 200;
|
pub const SYS_GETGID: usize = 200;
|
||||||
pub const SYS_GETPID: usize = 20;
|
pub const SYS_GETPID: usize = 20;
|
||||||
pub const SYS_GETUID: usize = 199;
|
pub const SYS_GETUID: usize = 199;
|
||||||
|
|
Loading…
Reference in a new issue