#ifdef __TANDEM
# include <floss.h>
#endif
#include <config.h>
#include <sys/wait.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <errno.h>
#include <signal.h>
#include <fcntl.h>
#include <sudo.h>
#include <sudo_plugin.h>
enum tgetpass_errval {
TGP_ERRVAL_NOERROR,
TGP_ERRVAL_TIMEOUT,
TGP_ERRVAL_NOPASSWORD,
TGP_ERRVAL_READERROR
};
static volatile sig_atomic_t signo[NSIG];
static void tgetpass_handler(int);
static char *getln(int, char *, size_t, bool, enum tgetpass_errval *);
static char *sudo_askpass(const char *, const char *);
static int
suspend(int sig, struct sudo_conv_callback *callback)
{
int ret = 0;
debug_decl(suspend, SUDO_DEBUG_CONV);
if (callback != NULL && SUDO_API_VERSION_GET_MAJOR(callback->version) != SUDO_CONV_CALLBACK_VERSION_MAJOR) {
sudo_debug_printf(SUDO_DEBUG_WARN|SUDO_DEBUG_LINENO,
"callback major version mismatch, expected %u, got %u",
SUDO_CONV_CALLBACK_VERSION_MAJOR,
SUDO_API_VERSION_GET_MAJOR(callback->version));
callback = NULL;
}
if (callback != NULL && callback->on_suspend != NULL) {
if (callback->on_suspend(sig, callback->closure) == -1)
ret = -1;
}
kill(getpid(), sig);
if (callback != NULL && callback->on_resume != NULL) {
if (callback->on_resume(sig, callback->closure) == -1)
ret = -1;
}
debug_return_int(ret);
}
static void
tgetpass_display_error(enum tgetpass_errval errval)
{
debug_decl(tgetpass_display_error, SUDO_DEBUG_CONV);
switch (errval) {
case TGP_ERRVAL_NOERROR:
break;
case TGP_ERRVAL_TIMEOUT:
sudo_warnx("%s", U_("timed out reading password"));
break;
case TGP_ERRVAL_NOPASSWORD:
sudo_warnx("%s", U_("no password was provided"));
break;
case TGP_ERRVAL_READERROR:
sudo_warn("%s", U_("unable to read password"));
break;
}
debug_return;
}
char *
tgetpass(const char *prompt, int timeout, unsigned int flags,
struct sudo_conv_callback *callback)
{
struct sigaction sa, savealrm, saveint, savehup, savequit, saveterm;
struct sigaction savetstp, savettin, savettou;
char *pass;
static const char *askpass;
static char buf[SUDO_CONV_REPL_MAX + 1];
int i, input, output, save_errno, ttyfd;
bool feedback, need_restart, neednl;
enum tgetpass_errval errval;
debug_decl(tgetpass, SUDO_DEBUG_CONV);
(void) fflush(stdout);
if (askpass == NULL) {
askpass = getenv_unhooked("SUDO_ASKPASS");
if (askpass == NULL || *askpass == '\0')
askpass = sudo_conf_askpass_path();
}
restart:
ttyfd = -1;
if (!ISSET(flags, TGP_STDIN|TGP_ASKPASS)) {
ttyfd = open(_PATH_TTY, O_RDWR);
if (ttyfd == -1 && !ISSET(flags, TGP_ECHO|TGP_NOECHO_TRY)) {
if (askpass == NULL || getenv_unhooked("DISPLAY") == NULL) {
if (getenv_unhooked("SSH_CONNECTION") != NULL && getenv_unhooked("SSH_TTY") == NULL) {
sudo_warnx("%s",
U_("a terminal is required to read the password; either use ssh's -t option or configure an askpass helper"));
} else {
sudo_warnx("%s",
U_("a terminal is required to read the password; either use the -S option to read from standard input or configure an askpass helper"));
}
debug_return_str(NULL);
}
SET(flags, TGP_ASKPASS);
}
}
if (ISSET(flags, TGP_ASKPASS)) {
if (askpass == NULL || *askpass == '\0')
sudo_fatalx("%s",
U_("no askpass program specified, try setting SUDO_ASKPASS"));
debug_return_str_masked(sudo_askpass(askpass, prompt));
}
for (i = 0; i < NSIG; i++)
signo[i] = 0;
pass = NULL;
save_errno = 0;
neednl = false;
need_restart = false;
feedback = false;
if (ttyfd == -1) {
input = STDIN_FILENO;
output = STDERR_FILENO;
CLR(flags, TGP_MASK);
} else {
input = ttyfd;
output = ttyfd;
}
if (!ISSET(flags, TGP_ECHO)) {
for (;;) {
if (ISSET(flags, TGP_MASK))
neednl = feedback = sudo_term_cbreak(input, true);
else
neednl = sudo_term_noecho(input);
if (neednl || errno != EINTR)
break;
if (suspend(SIGTTOU, callback) == -1) {
if (ttyfd != -1)
(void) close(ttyfd);
debug_return_ptr(NULL);
}
}
}
memset(&sa, 0, sizeof(sa));
sigemptyset(&sa.sa_mask);
sa.sa_flags = 0;
sa.sa_handler = tgetpass_handler;
(void) sigaction(SIGALRM, &sa, &savealrm);
(void) sigaction(SIGINT, &sa, &saveint);
(void) sigaction(SIGHUP, &sa, &savehup);
(void) sigaction(SIGQUIT, &sa, &savequit);
(void) sigaction(SIGTERM, &sa, &saveterm);
(void) sigaction(SIGTSTP, &sa, &savetstp);
(void) sigaction(SIGTTIN, &sa, &savettin);
(void) sigaction(SIGTTOU, &sa, &savettou);
if (ISSET(flags, TGP_BELL) && output != STDERR_FILENO) {
if (write(output, "\a", 1) != 1)
goto restore;
}
if (prompt) {
if (write(output, prompt, strlen(prompt)) < 0)
goto restore;
}
if (timeout > 0)
alarm((unsigned int)timeout);
pass = getln(input, buf, sizeof(buf), feedback, &errval);
alarm(0);
save_errno = errno;
if (neednl || pass == NULL) {
if (write(output, "\n", 1) != 1)
goto restore;
}
tgetpass_display_error(errval);
restore:
(void) sigaction(SIGALRM, &savealrm, NULL);
(void) sigaction(SIGINT, &saveint, NULL);
(void) sigaction(SIGHUP, &savehup, NULL);
(void) sigaction(SIGQUIT, &savequit, NULL);
(void) sigaction(SIGTERM, &saveterm, NULL);
(void) sigaction(SIGTSTP, &savetstp, NULL);
(void) sigaction(SIGTTIN, &savettin, NULL);
(void) sigaction(SIGTTOU, &savettou, NULL);
if (!ISSET(flags, TGP_ECHO)) {
if (!sudo_term_restore(input, true))
sudo_warn("%s", U_("unable to restore terminal settings"));
}
if (ttyfd != -1)
(void) close(ttyfd);
for (i = 0; i < NSIG; i++) {
if (signo[i]) {
switch (i) {
case SIGALRM:
break;
case SIGTSTP:
case SIGTTIN:
case SIGTTOU:
if (suspend(i, callback) == 0)
need_restart = true;
break;
default:
kill(getpid(), i);
break;
}
}
}
if (need_restart)
goto restart;
if (save_errno)
errno = save_errno;
debug_return_str_masked(pass);
}
static char *
sudo_askpass(const char *askpass, const char *prompt)
{
static char buf[SUDO_CONV_REPL_MAX + 1], *pass;
const struct sudo_cred *cred = sudo_askpass_cred(NULL);
sigset_t chldmask;
enum tgetpass_errval errval;
int pfd[2], status;
pid_t child;
debug_decl(sudo_askpass, SUDO_DEBUG_CONV);
sigemptyset(&chldmask);
sigaddset(&chldmask, SIGCHLD);
(void)sigprocmask(SIG_BLOCK, &chldmask, NULL);
if (pipe2(pfd, O_CLOEXEC) == -1)
sudo_fatal("%s", U_("unable to create pipe"));
child = sudo_debug_fork();
if (child == -1)
sudo_fatal("%s", U_("unable to fork"));
if (child == 0) {
if (dup3(pfd[1], STDOUT_FILENO, 0) == -1) {
sudo_warn("dup3");
_exit(255);
}
if (setuid(ROOT_UID) == -1)
sudo_warn("setuid(%d)", ROOT_UID);
closefrom(STDERR_FILENO + 1);
restore_limits();
unlimit_nproc();
if (setgid(cred->gid)) {
sudo_warn(U_("unable to set gid to %u"), (unsigned int)cred->gid);
_exit(255);
}
if (cred->ngroups != -1) {
if (sudo_setgroups(cred->ngroups, cred->groups) == -1) {
sudo_warn("%s", U_("unable to set supplementary group IDs"));
_exit(255);
}
}
if (setuid(cred->uid)) {
sudo_warn(U_("unable to set uid to %u"), (unsigned int)cred->uid);
_exit(255);
}
restore_nproc();
execl(askpass, askpass, prompt, (char *)NULL);
sudo_warn(U_("unable to run %s"), askpass);
_exit(255);
}
(void) close(pfd[1]);
pass = getln(pfd[0], buf, sizeof(buf), 0, &errval);
(void) close(pfd[0]);
tgetpass_display_error(errval);
for (;;) {
pid_t rv = waitpid(child, &status, 0);
if (rv == -1 && errno != EINTR)
break;
if (rv != -1 && !WIFSTOPPED(status))
break;
}
if (pass == NULL)
errno = EINTR;
(void)sigprocmask(SIG_UNBLOCK, &chldmask, NULL);
debug_return_str_masked(pass);
}
extern int sudo_term_eof, sudo_term_erase, sudo_term_kill;
static char *
getln(int fd, char *buf, size_t bufsiz, bool feedback,
enum tgetpass_errval *errval)
{
ssize_t nr = -1;
const char *ep;
char *cp = buf;
char c = '\0';
debug_decl(getln, SUDO_DEBUG_CONV);
*errval = TGP_ERRVAL_NOERROR;
if (bufsiz == 0) {
*errval = TGP_ERRVAL_READERROR;
errno = EINVAL;
debug_return_str(NULL);
}
ep = buf + bufsiz - 1;
while (cp < ep) {
nr = read(fd, &c, 1);
if (nr != 1 || c == '\n' || c == '\r')
break;
if (feedback) {
if (c == sudo_term_eof) {
nr = 0;
break;
} else if (c == sudo_term_kill) {
while (cp > buf) {
if (write(fd, "\b \b", 3) != 3)
break;
cp--;
}
cp = buf;
continue;
} else if (c == sudo_term_erase) {
if (cp > buf) {
ignore_result(write(fd, "\b \b", 3));
cp--;
}
continue;
}
ignore_result(write(fd, "*", 1));
}
*cp++ = c;
}
*cp = '\0';
if (feedback) {
while (cp > buf) {
if (write(fd, "\b \b", 3) != 3)
break;
cp--;
}
}
switch (nr) {
case -1:
if (errno == EINTR) {
if (signo[SIGALRM] == 1)
*errval = TGP_ERRVAL_TIMEOUT;
} else {
*errval = TGP_ERRVAL_READERROR;
}
debug_return_str(NULL);
case 0:
if (buf[0] == '\0') {
*errval = TGP_ERRVAL_NOPASSWORD;
debug_return_str(NULL);
}
FALLTHROUGH;
default:
debug_return_str_masked(buf);
}
}
static void
tgetpass_handler(int s)
{
signo[s] = 1;
}
const struct sudo_cred *
sudo_askpass_cred(const struct sudo_cred *cred)
{
static const struct sudo_cred *saved_cred;
if (cred != NULL)
saved_cred = cred;
return saved_cred;
}