Add sudo command, add effective UID and GID, and groups file
This commit is contained in:
		
							parent
							
								
									f38426e458
								
							
						
					
					
						commit
						cb5d1fbc58
					
				
					 14 changed files with 214 additions and 40 deletions
				
			
		
							
								
								
									
										7
									
								
								Makefile
									
										
									
									
									
								
							
							
						
						
									
										7
									
								
								Makefile
									
										
									
									
									
								
							| 
						 | 
				
			
			@ -29,9 +29,12 @@ clean:
 | 
			
		|||
	cargo clean --manifest-path drivers/pcid/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path drivers/vesad/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/getty/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/id/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/init/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/sudo/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/ion/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/login/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/sudo/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/coreutils/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/extrautils/Cargo.toml
 | 
			
		||||
	cargo clean --manifest-path programs/smith/Cargo.toml
 | 
			
		||||
| 
						 | 
				
			
			@ -279,7 +282,8 @@ $(BUILD)/filesystem.bin: \
 | 
			
		|||
		filesystem/bin/id \
 | 
			
		||||
		filesystem/bin/ion \
 | 
			
		||||
		filesystem/bin/login \
 | 
			
		||||
		filesystem/bin/smith
 | 
			
		||||
		filesystem/bin/smith \
 | 
			
		||||
		filesystem/bin/sudo
 | 
			
		||||
	rm -rf $@ $(BUILD)/filesystem/
 | 
			
		||||
	echo exit | cargo run --manifest-path schemes/redoxfs/Cargo.toml --bin redoxfs-utility $@ 8
 | 
			
		||||
	mkdir -p $(BUILD)/filesystem/
 | 
			
		||||
| 
						 | 
				
			
			@ -290,6 +294,7 @@ $(BUILD)/filesystem.bin: \
 | 
			
		|||
	-chown -R 1000:1000 $(BUILD)/filesystem/home/user/
 | 
			
		||||
	-chmod 700 $(BUILD)/filesystem/root/
 | 
			
		||||
	-chmod 700 $(BUILD)/filesystem/home/user/
 | 
			
		||||
	-chmod +s $(BUILD)/filesystem/bin/sudo
 | 
			
		||||
	sync
 | 
			
		||||
	-fusermount -u $(BUILD)/filesystem/
 | 
			
		||||
	rm -rf $(BUILD)/filesystem/
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										1
									
								
								filesystem/etc/group
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								filesystem/etc/group
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1 @@
 | 
			
		|||
sudo;1;user
 | 
			
		||||
| 
						 | 
				
			
			@ -22,10 +22,14 @@ pub struct Context {
 | 
			
		|||
    pub id: usize,
 | 
			
		||||
    /// The ID of the parent context
 | 
			
		||||
    pub ppid: usize,
 | 
			
		||||
    /// The user id
 | 
			
		||||
    pub uid: u32,
 | 
			
		||||
    /// The group id
 | 
			
		||||
    pub gid: u32,
 | 
			
		||||
    /// The real user id
 | 
			
		||||
    pub ruid: u32,
 | 
			
		||||
    /// The real group id
 | 
			
		||||
    pub rgid: u32,
 | 
			
		||||
    /// The effective user id
 | 
			
		||||
    pub euid: u32,
 | 
			
		||||
    /// The effective group id
 | 
			
		||||
    pub egid: u32,
 | 
			
		||||
    /// Status of context
 | 
			
		||||
    pub status: Status,
 | 
			
		||||
    /// Context running or not
 | 
			
		||||
| 
						 | 
				
			
			@ -62,8 +66,10 @@ impl Context {
 | 
			
		|||
        Context {
 | 
			
		||||
            id: id,
 | 
			
		||||
            ppid: 0,
 | 
			
		||||
            uid: 0,
 | 
			
		||||
            gid: 0,
 | 
			
		||||
            ruid: 0,
 | 
			
		||||
            rgid: 0,
 | 
			
		||||
            euid: 0,
 | 
			
		||||
            egid: 0,
 | 
			
		||||
            status: Status::Blocked,
 | 
			
		||||
            running: false,
 | 
			
		||||
            vfork: false,
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -38,7 +38,7 @@ impl UserInner {
 | 
			
		|||
            let contexts = context::contexts();
 | 
			
		||||
            let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
            let context = context_lock.read();
 | 
			
		||||
            (context.id, context.uid, context.gid)
 | 
			
		||||
            (context.id, context.euid, context.egid)
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        let id = self.next_id.fetch_add(1, Ordering::SeqCst);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -11,7 +11,7 @@ pub fn file_op(a: usize, fd: usize, c: usize, d: usize) -> Result<usize> {
 | 
			
		|||
        let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
        let context = context_lock.read();
 | 
			
		||||
        let file = context.get_file(fd).ok_or(Error::new(EBADF))?;
 | 
			
		||||
        (file, context.id, context.uid, context.gid)
 | 
			
		||||
        (file, context.id, context.euid, context.egid)
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let scheme = {
 | 
			
		||||
| 
						 | 
				
			
			@ -74,7 +74,7 @@ pub fn open(path: &[u8], flags: usize) -> Result<usize> {
 | 
			
		|||
        let contexts = context::contexts();
 | 
			
		||||
        let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
        let context = context_lock.read();
 | 
			
		||||
        (context.canonicalize(path), context.uid, context.gid)
 | 
			
		||||
        (context.canonicalize(path), context.euid, context.egid)
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let mut parts = path_canon.splitn(2, |&b| b == b':');
 | 
			
		||||
| 
						 | 
				
			
			@ -107,7 +107,7 @@ pub fn mkdir(path: &[u8], mode: u16) -> Result<usize> {
 | 
			
		|||
        let contexts = context::contexts();
 | 
			
		||||
        let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
        let context = context_lock.read();
 | 
			
		||||
        (context.canonicalize(path), context.uid, context.gid)
 | 
			
		||||
        (context.canonicalize(path), context.euid, context.egid)
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let mut parts = path_canon.splitn(2, |&b| b == b':');
 | 
			
		||||
| 
						 | 
				
			
			@ -129,7 +129,7 @@ pub fn rmdir(path: &[u8]) -> Result<usize> {
 | 
			
		|||
        let contexts = context::contexts();
 | 
			
		||||
        let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
        let context = context_lock.read();
 | 
			
		||||
        (context.canonicalize(path), context.uid, context.gid)
 | 
			
		||||
        (context.canonicalize(path), context.euid, context.egid)
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let mut parts = path_canon.splitn(2, |&b| b == b':');
 | 
			
		||||
| 
						 | 
				
			
			@ -151,7 +151,7 @@ pub fn unlink(path: &[u8]) -> Result<usize> {
 | 
			
		|||
        let contexts = context::contexts();
 | 
			
		||||
        let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
        let context = context_lock.read();
 | 
			
		||||
        (context.canonicalize(path), context.uid, context.gid)
 | 
			
		||||
        (context.canonicalize(path), context.euid, context.egid)
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let mut parts = path_canon.splitn(2, |&b| b == b':');
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -55,6 +55,8 @@ pub extern fn syscall(a: usize, b: usize, c: usize, d: usize, e: usize, f: usize
 | 
			
		|||
                SYS_GETCWD => getcwd(validate_slice_mut(b as *mut u8, c)?),
 | 
			
		||||
                SYS_GETUID => getuid(),
 | 
			
		||||
                SYS_GETGID => getgid(),
 | 
			
		||||
                SYS_GETEUID => geteuid(),
 | 
			
		||||
                SYS_GETEGID => getegid(),
 | 
			
		||||
                SYS_SETUID => setuid(b as u32),
 | 
			
		||||
                SYS_SETGID => setgid(b as u32),
 | 
			
		||||
                SYS_PHYSALLOC => physalloc(b),
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,7 +1,7 @@
 | 
			
		|||
///! Process syscalls
 | 
			
		||||
use alloc::arc::Arc;
 | 
			
		||||
use alloc::boxed::Box;
 | 
			
		||||
use collections::Vec;
 | 
			
		||||
use collections::{BTreeMap, Vec};
 | 
			
		||||
use core::mem;
 | 
			
		||||
use core::str;
 | 
			
		||||
use spin::Mutex;
 | 
			
		||||
| 
						 | 
				
			
			@ -58,8 +58,10 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
 | 
			
		|||
    let ppid;
 | 
			
		||||
    let pid;
 | 
			
		||||
    {
 | 
			
		||||
        let uid;
 | 
			
		||||
        let gid;
 | 
			
		||||
        let ruid;
 | 
			
		||||
        let rgid;
 | 
			
		||||
        let euid;
 | 
			
		||||
        let egid;
 | 
			
		||||
        let arch;
 | 
			
		||||
        let vfork;
 | 
			
		||||
        let mut kfx_option = None;
 | 
			
		||||
| 
						 | 
				
			
			@ -80,8 +82,10 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
 | 
			
		|||
            let context = context_lock.read();
 | 
			
		||||
 | 
			
		||||
            ppid = context.id;
 | 
			
		||||
            uid = context.uid;
 | 
			
		||||
            gid = context.gid;
 | 
			
		||||
            ruid = context.ruid;
 | 
			
		||||
            rgid = context.rgid;
 | 
			
		||||
            euid = context.euid;
 | 
			
		||||
            egid = context.egid;
 | 
			
		||||
 | 
			
		||||
            arch = context.arch.clone();
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -191,7 +195,11 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
 | 
			
		|||
            if flags & CLONE_VM == CLONE_VM {
 | 
			
		||||
                env = context.env.clone();
 | 
			
		||||
            } else {
 | 
			
		||||
                env = Arc::new(Mutex::new(context.env.lock().clone()));
 | 
			
		||||
                let mut new_env = BTreeMap::new();
 | 
			
		||||
                for item in context.env.lock().iter() {
 | 
			
		||||
                    new_env.insert(item.0.clone(), Arc::new(Mutex::new(item.1.lock().clone())));
 | 
			
		||||
                }
 | 
			
		||||
                env = Arc::new(Mutex::new(new_env));
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            if flags & CLONE_FILES == CLONE_FILES {
 | 
			
		||||
| 
						 | 
				
			
			@ -253,8 +261,10 @@ pub fn clone(flags: usize, stack_base: usize) -> Result<usize> {
 | 
			
		|||
            pid = context.id;
 | 
			
		||||
 | 
			
		||||
            context.ppid = ppid;
 | 
			
		||||
            context.uid = uid;
 | 
			
		||||
            context.gid = gid;
 | 
			
		||||
            context.ruid = ruid;
 | 
			
		||||
            context.rgid = rgid;
 | 
			
		||||
            context.euid = euid;
 | 
			
		||||
            context.egid = egid;
 | 
			
		||||
 | 
			
		||||
            context.status = context::Status::Runnable;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -436,7 +446,7 @@ pub fn exec(path: &[u8], arg_ptrs: &[[usize; 2]]) -> Result<usize> {
 | 
			
		|||
            let contexts = context::contexts();
 | 
			
		||||
            let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
            let context = context_lock.read();
 | 
			
		||||
            (context.uid, context.gid)
 | 
			
		||||
            (context.euid, context.egid)
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        let file = syscall::open(path, 0)?;
 | 
			
		||||
| 
						 | 
				
			
			@ -483,11 +493,11 @@ pub fn exec(path: &[u8], arg_ptrs: &[[usize; 2]]) -> Result<usize> {
 | 
			
		|||
                    context.grants = Arc::new(Mutex::new(Vec::new()));
 | 
			
		||||
 | 
			
		||||
                    if stat.st_mode & syscall::flag::MODE_SETUID == syscall::flag::MODE_SETUID {
 | 
			
		||||
                        context.uid = stat.st_uid;
 | 
			
		||||
                        context.euid = stat.st_uid;
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    if stat.st_mode & syscall::flag::MODE_SETGID == syscall::flag::MODE_SETGID {
 | 
			
		||||
                        context.gid = stat.st_gid;
 | 
			
		||||
                        context.egid = stat.st_gid;
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    // Map and copy new segments
 | 
			
		||||
| 
						 | 
				
			
			@ -612,11 +622,25 @@ pub fn exec(path: &[u8], arg_ptrs: &[[usize; 2]]) -> Result<usize> {
 | 
			
		|||
    unsafe { usermode(entry, sp); }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn getegid() -> Result<usize> {
 | 
			
		||||
    let contexts = context::contexts();
 | 
			
		||||
    let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
    let context = context_lock.read();
 | 
			
		||||
    Ok(context.egid as usize)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn geteuid() -> Result<usize> {
 | 
			
		||||
    let contexts = context::contexts();
 | 
			
		||||
    let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
    let context = context_lock.read();
 | 
			
		||||
    Ok(context.euid as usize)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn getgid() -> Result<usize> {
 | 
			
		||||
    let contexts = context::contexts();
 | 
			
		||||
    let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
    let context = context_lock.read();
 | 
			
		||||
    Ok(context.gid as usize)
 | 
			
		||||
    Ok(context.rgid as usize)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn getpid() -> Result<usize> {
 | 
			
		||||
| 
						 | 
				
			
			@ -630,7 +654,7 @@ pub fn getuid() -> Result<usize> {
 | 
			
		|||
    let contexts = context::contexts();
 | 
			
		||||
    let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
    let context = context_lock.read();
 | 
			
		||||
    Ok(context.uid as usize)
 | 
			
		||||
    Ok(context.ruid as usize)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn iopl(_level: usize) -> Result<usize> {
 | 
			
		||||
| 
						 | 
				
			
			@ -734,10 +758,9 @@ pub fn setgid(gid: u32) -> Result<usize> {
 | 
			
		|||
    let contexts = context::contexts();
 | 
			
		||||
    let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
    let mut context = context_lock.write();
 | 
			
		||||
    if context.gid == 0 {
 | 
			
		||||
        context.gid = gid;
 | 
			
		||||
        Ok(0)
 | 
			
		||||
    } else if context.gid == gid {
 | 
			
		||||
    if context.egid == 0 {
 | 
			
		||||
        context.rgid = gid;
 | 
			
		||||
        context.egid = gid;
 | 
			
		||||
        Ok(0)
 | 
			
		||||
    } else {
 | 
			
		||||
        Err(Error::new(EPERM))
 | 
			
		||||
| 
						 | 
				
			
			@ -748,10 +771,9 @@ pub fn setuid(uid: u32) -> Result<usize> {
 | 
			
		|||
    let contexts = context::contexts();
 | 
			
		||||
    let context_lock = contexts.current().ok_or(Error::new(ESRCH))?;
 | 
			
		||||
    let mut context = context_lock.write();
 | 
			
		||||
    if context.uid == 0 {
 | 
			
		||||
        context.uid = uid;
 | 
			
		||||
        Ok(0)
 | 
			
		||||
    } else if context.uid == uid {
 | 
			
		||||
    if context.euid == 0 {
 | 
			
		||||
        context.ruid = uid;
 | 
			
		||||
        context.euid = uid;
 | 
			
		||||
        Ok(0)
 | 
			
		||||
    } else {
 | 
			
		||||
        Err(Error::new(EPERM))
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										2
									
								
								libstd
									
										
									
									
									
								
							
							
						
						
									
										2
									
								
								libstd
									
										
									
									
									
								
							| 
						 | 
				
			
			@ -1 +1 @@
 | 
			
		|||
Subproject commit 0484051024316956c9e658ed7c3211f76a30a2f9
 | 
			
		||||
Subproject commit 07d687dedcb9a8d76830fd54f6b992cbc3e49aa4
 | 
			
		||||
| 
						 | 
				
			
			@ -1,5 +1,3 @@
 | 
			
		|||
#![feature(question_mark)]
 | 
			
		||||
 | 
			
		||||
extern crate syscall;
 | 
			
		||||
 | 
			
		||||
use std::env;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -6,9 +6,10 @@ extern crate termion;
 | 
			
		|||
use octavo::octavo_digest::Digest;
 | 
			
		||||
use octavo::octavo_digest::sha3::Sha512;
 | 
			
		||||
use std::fs::File;
 | 
			
		||||
use std::io::{Read, Write};
 | 
			
		||||
use std::process::{Command, CommandExt};
 | 
			
		||||
use std::{io, str};
 | 
			
		||||
use std::io::{self, Read, Write};
 | 
			
		||||
use std::os::unix::process::CommandExt;
 | 
			
		||||
use std::process::Command;
 | 
			
		||||
use std::str;
 | 
			
		||||
use termion::input::TermRead;
 | 
			
		||||
 | 
			
		||||
pub struct Passwd<'a> {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										6
									
								
								programs/sudo/Cargo.toml
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										6
									
								
								programs/sudo/Cargo.toml
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,6 @@
 | 
			
		|||
[package]
 | 
			
		||||
name = "sudo"
 | 
			
		||||
version = "0.1.0"
 | 
			
		||||
 | 
			
		||||
[dependencies]
 | 
			
		||||
syscall = { path = "../../syscall/" }
 | 
			
		||||
							
								
								
									
										123
									
								
								programs/sudo/src/main.rs
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										123
									
								
								programs/sudo/src/main.rs
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,123 @@
 | 
			
		|||
#![feature(question_mark)]
 | 
			
		||||
 | 
			
		||||
extern crate syscall;
 | 
			
		||||
 | 
			
		||||
use std::env;
 | 
			
		||||
use std::fs::File;
 | 
			
		||||
use std::io::Read;
 | 
			
		||||
use std::os::unix::process::CommandExt;
 | 
			
		||||
use std::process::{self, Command};
 | 
			
		||||
 | 
			
		||||
pub struct Passwd<'a> {
 | 
			
		||||
    user: &'a str,
 | 
			
		||||
    hash: &'a str,
 | 
			
		||||
    uid: u32,
 | 
			
		||||
    gid: u32,
 | 
			
		||||
    name: &'a str,
 | 
			
		||||
    home: &'a str,
 | 
			
		||||
    shell: &'a str
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
impl<'a> Passwd<'a> {
 | 
			
		||||
    pub fn parse(line: &'a str) -> Result<Passwd<'a>, ()> {
 | 
			
		||||
        let mut parts = line.split(';');
 | 
			
		||||
 | 
			
		||||
        let user = parts.next().ok_or(())?;
 | 
			
		||||
        let hash = parts.next().ok_or(())?;
 | 
			
		||||
        let uid = parts.next().ok_or(())?.parse::<u32>().or(Err(()))?;
 | 
			
		||||
        let gid = parts.next().ok_or(())?.parse::<u32>().or(Err(()))?;
 | 
			
		||||
        let name = parts.next().ok_or(())?;
 | 
			
		||||
        let home = parts.next().ok_or(())?;
 | 
			
		||||
        let shell = parts.next().ok_or(())?;
 | 
			
		||||
 | 
			
		||||
        Ok(Passwd {
 | 
			
		||||
            user: user,
 | 
			
		||||
            hash: hash,
 | 
			
		||||
            uid: uid,
 | 
			
		||||
            gid: gid,
 | 
			
		||||
            name: name,
 | 
			
		||||
            home: home,
 | 
			
		||||
            shell: shell
 | 
			
		||||
        })
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub struct Group<'a> {
 | 
			
		||||
    group: &'a str,
 | 
			
		||||
    gid: u32,
 | 
			
		||||
    users: &'a str,
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
impl<'a> Group<'a> {
 | 
			
		||||
    pub fn parse(line: &'a str) -> Result<Group<'a>, ()> {
 | 
			
		||||
        let mut parts = line.split(';');
 | 
			
		||||
 | 
			
		||||
        let group = parts.next().ok_or(())?;
 | 
			
		||||
        let gid = parts.next().ok_or(())?.parse::<u32>().or(Err(()))?;
 | 
			
		||||
        let users = parts.next().ok_or(())?;
 | 
			
		||||
 | 
			
		||||
        Ok(Group {
 | 
			
		||||
            group: group,
 | 
			
		||||
            gid: gid,
 | 
			
		||||
            users: users
 | 
			
		||||
        })
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn main() {
 | 
			
		||||
    let mut args = env::args().skip(1);
 | 
			
		||||
    let cmd = args.next().expect("sudo: no command provided");
 | 
			
		||||
 | 
			
		||||
    let uid = syscall::getuid().unwrap() as u32;
 | 
			
		||||
 | 
			
		||||
    if uid != 0 {
 | 
			
		||||
        let mut passwd_string = String::new();
 | 
			
		||||
        File::open("file:etc/passwd").unwrap().read_to_string(&mut passwd_string).unwrap();
 | 
			
		||||
 | 
			
		||||
        let mut passwd_option = None;
 | 
			
		||||
        for line in passwd_string.lines() {
 | 
			
		||||
            if let Ok(passwd) = Passwd::parse(line) {
 | 
			
		||||
                if uid == passwd.uid {
 | 
			
		||||
                    passwd_option = Some(passwd);
 | 
			
		||||
                    break;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        let passwd = passwd_option.expect("sudo: user not found in passwd");
 | 
			
		||||
 | 
			
		||||
        let mut group_string = String::new();
 | 
			
		||||
        File::open("file:etc/group").unwrap().read_to_string(&mut group_string).unwrap();
 | 
			
		||||
 | 
			
		||||
        let mut group_option = None;
 | 
			
		||||
        for line in group_string.lines() {
 | 
			
		||||
            if let Ok(group) = Group::parse(line) {
 | 
			
		||||
                if group.group == "sudo" && group.users.split(',').any(|name| name == passwd.user) {
 | 
			
		||||
                    group_option = Some(group);
 | 
			
		||||
                    break;
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        if group_option.is_none() {
 | 
			
		||||
            panic!("sudo: '{}' not in sudo group", passwd.user);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut command = Command::new(&cmd);
 | 
			
		||||
    for arg in args {
 | 
			
		||||
        command.arg(&arg);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    command.uid(0);
 | 
			
		||||
    command.gid(0);
 | 
			
		||||
    command.env("USER", "root");
 | 
			
		||||
 | 
			
		||||
    match command.spawn() {
 | 
			
		||||
        Ok(mut child) => match child.wait() {
 | 
			
		||||
            Ok(status) => process::exit(status.code().unwrap_or(0)),
 | 
			
		||||
            Err(err) => panic!("sudo: failed to wait for {}: {}", cmd, err)
 | 
			
		||||
        },
 | 
			
		||||
        Err(err) => panic!("sudo: failed to execute {}: {}", cmd, err)
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -88,6 +88,14 @@ pub fn getcwd(buf: &mut [u8]) -> Result<usize> {
 | 
			
		|||
    unsafe { syscall2(SYS_GETCWD, buf.as_mut_ptr() as usize, buf.len()) }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn getegid() -> Result<usize> {
 | 
			
		||||
    unsafe { syscall0(SYS_GETEGID) }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn geteuid() -> Result<usize> {
 | 
			
		||||
    unsafe { syscall0(SYS_GETEUID) }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn getgid() -> Result<usize> {
 | 
			
		||||
    unsafe { syscall0(SYS_GETGID) }
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -35,6 +35,8 @@ pub const SYS_EXECVE: usize =   11;
 | 
			
		|||
pub const SYS_EXIT: usize =     1;
 | 
			
		||||
pub const SYS_FUTEX: usize =    240;
 | 
			
		||||
pub const SYS_GETCWD: usize =   183;
 | 
			
		||||
pub const SYS_GETEGID: usize =  202;
 | 
			
		||||
pub const SYS_GETEUID: usize =  201;
 | 
			
		||||
pub const SYS_GETGID: usize =   200;
 | 
			
		||||
pub const SYS_GETPID: usize =   20;
 | 
			
		||||
pub const SYS_GETUID: usize =   199;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue