2011-02-03 13:37:45 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2011 Martin Willi
|
|
|
|
* Copyright (C) 2011 revosec AG
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License as published by the
|
|
|
|
* Free Software Foundation; either version 2 of the License, or (at your
|
|
|
|
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
|
|
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
|
|
* for more details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "whitelist_control.h"
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/un.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
#include <daemon.h>
|
|
|
|
#include <threading/thread.h>
|
|
|
|
#include <processing/jobs/callback_job.h>
|
|
|
|
|
|
|
|
#include "whitelist_msg.h"
|
|
|
|
|
|
|
|
typedef struct private_whitelist_control_t private_whitelist_control_t;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Private data of an whitelist_control_t object.
|
|
|
|
*/
|
|
|
|
struct private_whitelist_control_t {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Public whitelist_control_t interface.
|
|
|
|
*/
|
|
|
|
whitelist_control_t public;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whitelist
|
|
|
|
*/
|
|
|
|
whitelist_listener_t *listener;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Whitelist unix socket file descriptor
|
|
|
|
*/
|
|
|
|
int socket;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Open whitelist unix socket
|
|
|
|
*/
|
|
|
|
static bool open_socket(private_whitelist_control_t *this)
|
|
|
|
{
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
mode_t old;
|
|
|
|
|
|
|
|
addr.sun_family = AF_UNIX;
|
|
|
|
strcpy(addr.sun_path, WHITELIST_SOCKET);
|
|
|
|
|
|
|
|
this->socket = socket(AF_UNIX, SOCK_SEQPACKET, 0);
|
|
|
|
if (this->socket == -1)
|
|
|
|
{
|
|
|
|
DBG1(DBG_CFG, "creating whitelist socket failed");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
unlink(addr.sun_path);
|
|
|
|
old = umask(~(S_IRWXU | S_IRWXG));
|
|
|
|
if (bind(this->socket, (struct sockaddr*)&addr, sizeof(addr)) < 0)
|
|
|
|
{
|
|
|
|
DBG1(DBG_CFG, "binding whitelist socket failed: %s", strerror(errno));
|
|
|
|
close(this->socket);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
umask(old);
|
2013-06-25 05:25:18 +00:00
|
|
|
if (chown(addr.sun_path, lib->caps->get_uid(lib->caps),
|
|
|
|
lib->caps->get_gid(lib->caps)) != 0)
|
2011-02-03 13:37:45 +00:00
|
|
|
{
|
|
|
|
DBG1(DBG_CFG, "changing whitelist socket permissions failed: %s",
|
|
|
|
strerror(errno));
|
|
|
|
}
|
|
|
|
if (listen(this->socket, 10) < 0)
|
|
|
|
{
|
|
|
|
DBG1(DBG_CFG, "listening on whitelist socket failed: %s", strerror(errno));
|
|
|
|
close(this->socket);
|
|
|
|
unlink(addr.sun_path);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Dispatch a received message
|
|
|
|
*/
|
|
|
|
static void dispatch(private_whitelist_control_t *this,
|
|
|
|
int fd, whitelist_msg_t *msg)
|
|
|
|
{
|
|
|
|
identification_t *id, *current;
|
|
|
|
enumerator_t *enumerator;
|
|
|
|
|
|
|
|
msg->id[sizeof(msg->id)-1] = 0;
|
|
|
|
id = identification_create_from_string(msg->id);
|
|
|
|
switch (msg->type)
|
|
|
|
{
|
|
|
|
case WHITELIST_ADD:
|
|
|
|
this->listener->add(this->listener, id);
|
|
|
|
break;
|
|
|
|
case WHITELIST_REMOVE:
|
|
|
|
this->listener->remove(this->listener, id);
|
|
|
|
break;
|
|
|
|
case WHITELIST_LIST:
|
|
|
|
enumerator = this->listener->create_enumerator(this->listener);
|
|
|
|
while (enumerator->enumerate(enumerator, ¤t))
|
|
|
|
{
|
|
|
|
if (current->matches(current, id))
|
|
|
|
{
|
|
|
|
snprintf(msg->id, sizeof(msg->id), "%Y", current);
|
|
|
|
if (send(fd, msg, sizeof(*msg), 0) != sizeof(*msg))
|
|
|
|
{
|
|
|
|
DBG1(DBG_CFG, "listing whitelist failed");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
enumerator->destroy(enumerator);
|
|
|
|
msg->type = WHITELIST_END;
|
|
|
|
memset(msg->id, 0, sizeof(msg->id));
|
|
|
|
send(fd, msg, sizeof(*msg), 0);
|
|
|
|
break;
|
|
|
|
case WHITELIST_FLUSH:
|
|
|
|
this->listener->flush(this->listener, id);
|
|
|
|
break;
|
2011-03-17 16:15:16 +00:00
|
|
|
case WHITELIST_ENABLE:
|
|
|
|
this->listener->set_active(this->listener, TRUE);
|
|
|
|
break;
|
|
|
|
case WHITELIST_DISABLE:
|
|
|
|
this->listener->set_active(this->listener, FALSE);
|
|
|
|
break;
|
2011-02-03 13:37:45 +00:00
|
|
|
default:
|
|
|
|
DBG1(DBG_CFG, "received unknown whitelist command");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
id->destroy(id);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Accept whitelist control connections, dispatch
|
|
|
|
*/
|
|
|
|
static job_requeue_t receive(private_whitelist_control_t *this)
|
|
|
|
{
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
int fd, len = sizeof(addr);
|
|
|
|
whitelist_msg_t msg;
|
|
|
|
bool oldstate;
|
|
|
|
|
|
|
|
oldstate = thread_cancelability(TRUE);
|
|
|
|
fd = accept(this->socket, (struct sockaddr*)&addr, &len);
|
|
|
|
thread_cancelability(oldstate);
|
|
|
|
|
|
|
|
if (fd != -1)
|
|
|
|
{
|
|
|
|
while (TRUE)
|
|
|
|
{
|
|
|
|
oldstate = thread_cancelability(TRUE);
|
|
|
|
len = recv(fd, &msg, sizeof(msg), 0);
|
|
|
|
thread_cancelability(oldstate);
|
|
|
|
|
|
|
|
if (len == sizeof(msg))
|
|
|
|
{
|
|
|
|
dispatch(this, fd, &msg);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (len != 0)
|
|
|
|
{
|
|
|
|
DBG1(DBG_CFG, "receiving whitelist msg failed: %s",
|
|
|
|
strerror(errno));
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
DBG1(DBG_CFG, "accepting whitelist connection failed: %s",
|
|
|
|
strerror(errno));
|
|
|
|
}
|
|
|
|
return JOB_REQUEUE_FAIR;
|
|
|
|
}
|
|
|
|
|
|
|
|
METHOD(whitelist_control_t, destroy, void,
|
|
|
|
private_whitelist_control_t *this)
|
|
|
|
{
|
|
|
|
close(this->socket);
|
|
|
|
free(this);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* See header
|
|
|
|
*/
|
|
|
|
whitelist_control_t *whitelist_control_create(whitelist_listener_t *listener)
|
|
|
|
{
|
|
|
|
private_whitelist_control_t *this;
|
|
|
|
|
|
|
|
INIT(this,
|
|
|
|
.public = {
|
|
|
|
.destroy = _destroy,
|
|
|
|
},
|
|
|
|
.listener = listener,
|
|
|
|
);
|
|
|
|
|
|
|
|
if (!open_socket(this))
|
|
|
|
{
|
|
|
|
free(this);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2012-06-19 11:29:09 +00:00
|
|
|
lib->processor->queue_job(lib->processor,
|
|
|
|
(job_t*)callback_job_create_with_prio((callback_job_cb_t)receive, this,
|
|
|
|
NULL, (callback_job_cancel_t)return_false, JOB_PRIO_CRITICAL));
|
2011-02-03 13:37:45 +00:00
|
|
|
|
|
|
|
return &this->public;
|
|
|
|
}
|