rpcd/file.c

1019 lines
22 KiB
C
Raw Permalink Normal View History

2013-01-26 15:29:09 +01:00
/*
2013-09-02 17:09:57 +02:00
* rpcd - UBUS RPC server
2013-01-26 15:29:09 +01:00
*
2014-01-12 13:48:58 +01:00
* Copyright (C) 2013-2014 Jo-Philipp Wich <jow@openwrt.org>
* Copyright (C) 2016 Luka Perkov <luka@openwrt.org>
2013-01-26 15:29:09 +01:00
*
* Permission to use, copy, modify, and/or distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#define _GNU_SOURCE
#include <fcntl.h>
#include <errno.h>
#include <unistd.h>
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <limits.h>
#include <dirent.h>
#include <sys/stat.h>
#include <sys/wait.h>
#include <libubus.h>
#include <libubox/blobmsg.h>
#include <libubox/md5.h>
#include <libubox/ustream.h>
#include <libubox/utils.h>
2013-09-04 12:46:11 +02:00
#include <rpcd/plugin.h>
2013-01-26 15:29:09 +01:00
/* limit of sys & proc files */
#define RPC_FILE_MIN_SIZE (4096)
/* limit of regular files and command output data */
#define RPC_FILE_MAX_SIZE (4096 * 64)
/* limit of command line length for exec acl checks */
#define RPC_CMDLINE_MAX_SIZE (1024)
#define ustream_for_each_read_buffer(stream, ptr, len) \
for (ptr = ustream_get_read_buf(stream, &len); \
ptr != NULL && len > 0; \
ustream_consume(stream, len), ptr = ustream_get_read_buf(stream, &len))
#define ustream_declare(us, fd, name) \
us.stream.string_data = true; \
us.stream.r.buffer_len = 4096; \
us.stream.r.max_buffers = RPC_FILE_MAX_SIZE / 4096; \
us.stream.notify_read = rpc_file_##name##_read_cb; \
us.stream.notify_state = rpc_file_##name##_state_cb; \
ustream_fd_init(&us, fd);
static const struct rpc_daemon_ops *ops;
struct rpc_file_exec_context {
struct ubus_context *context;
struct ubus_request_data request;
struct uloop_timeout timeout;
struct uloop_process process;
struct ustream_fd opipe;
struct ustream_fd epipe;
int stat;
};
2013-01-26 15:29:09 +01:00
static struct blob_buf buf;
static char *canonpath;
static char cmdstr[RPC_CMDLINE_MAX_SIZE];
2013-01-26 15:29:09 +01:00
enum {
RPC_F_R_PATH,
RPC_F_R_SESSION,
__RPC_F_R_MAX,
2013-01-26 15:29:09 +01:00
};
static const struct blobmsg_policy rpc_file_R_policy[__RPC_F_R_MAX] = {
[RPC_F_R_PATH] = { .name = "path", .type = BLOBMSG_TYPE_STRING },
[RPC_F_R_SESSION] = { .name = "ubus_rpc_session",
.type = BLOBMSG_TYPE_STRING },
};
enum {
RPC_F_RB_PATH,
RPC_F_RB_BASE64,
RPC_F_RB_SESSION,
__RPC_F_RB_MAX,
};
static const struct blobmsg_policy rpc_file_RB_policy[__RPC_F_RB_MAX] = {
[RPC_F_RB_PATH] = { .name = "path", .type = BLOBMSG_TYPE_STRING },
[RPC_F_RB_BASE64] = { .name = "base64", .type = BLOBMSG_TYPE_BOOL },
[RPC_F_RB_SESSION] = { .name = "ubus_rpc_session",
.type = BLOBMSG_TYPE_STRING },
};
enum {
RPC_F_RW_PATH,
RPC_F_RW_DATA,
RPC_F_RW_APPEND,
RPC_F_RW_MODE,
RPC_F_RW_BASE64,
RPC_F_RW_SESSION,
__RPC_F_RW_MAX,
};
static const struct blobmsg_policy rpc_file_RW_policy[__RPC_F_RW_MAX] = {
[RPC_F_RW_PATH] = { .name = "path", .type = BLOBMSG_TYPE_STRING },
[RPC_F_RW_DATA] = { .name = "data", .type = BLOBMSG_TYPE_STRING },
[RPC_F_RW_APPEND] = { .name = "append", .type = BLOBMSG_TYPE_BOOL },
[RPC_F_RW_MODE] = { .name = "mode", .type = BLOBMSG_TYPE_INT32 },
[RPC_F_RW_BASE64] = { .name = "base64", .type = BLOBMSG_TYPE_BOOL },
[RPC_F_RW_SESSION] = { .name = "ubus_rpc_session",
.type = BLOBMSG_TYPE_STRING },
2013-01-26 15:29:09 +01:00
};
enum {
RPC_E_CMD,
RPC_E_PARM,
RPC_E_ENV,
RPC_E_SESSION,
__RPC_E_MAX,
};
static const struct blobmsg_policy rpc_exec_policy[__RPC_E_MAX] = {
[RPC_E_CMD] = { .name = "command", .type = BLOBMSG_TYPE_STRING },
[RPC_E_PARM] = { .name = "params", .type = BLOBMSG_TYPE_ARRAY },
[RPC_E_ENV] = { .name = "env", .type = BLOBMSG_TYPE_TABLE },
[RPC_E_SESSION] = { .name = "ubus_rpc_session",
.type = BLOBMSG_TYPE_STRING },
};
2013-01-26 15:29:09 +01:00
static const char *d_types[] = {
[DT_BLK] = "block",
[DT_CHR] = "char",
[DT_DIR] = "directory",
[DT_FIFO] = "fifo",
[DT_LNK] = "symlink",
[DT_REG] = "file",
[DT_SOCK] = "socket",
[DT_UNKNOWN] = "unknown",
};
static int
rpc_errno_status(void)
{
switch (errno)
{
case EACCES:
return UBUS_STATUS_PERMISSION_DENIED;
case ENOTDIR:
return UBUS_STATUS_INVALID_ARGUMENT;
case ENOENT:
return UBUS_STATUS_NOT_FOUND;
case EINVAL:
return UBUS_STATUS_INVALID_ARGUMENT;
default:
return UBUS_STATUS_UNKNOWN_ERROR;
}
}
static bool
rpc_file_access(const struct blob_attr *sid,
const char *path, const char *perm)
{
if (!sid)
return true;
return ops->session_access(blobmsg_data(sid), "file", path, perm);
}
static char *
rpc_canonicalize_path(const char *path)
{
char *cp;
const char *p;
if (path == NULL || *path == '\0')
return NULL;
if (canonpath != NULL)
free(canonpath);
canonpath = strdup(path);
if (canonpath == NULL)
return NULL;
/* normalize */
for (cp = canonpath, p = path; *p != '\0'; ) {
if (*p != '/')
goto next;
/* skip repeating / */
if (p[1] == '/') {
p++;
continue;
}
/* /./ or /../ */
if (p[1] == '.') {
/* skip /./ */
if ((p[2] == '\0') || (p[2] == '/')) {
p += 2;
continue;
}
/* collapse /x/../ */
if ((p[2] == '.') && ((p[3] == '\0') || (p[3] == '/'))) {
while ((cp > canonpath) && (*--cp != '/'))
;
p += 3;
continue;
}
}
next:
*cp++ = *p++;
}
/* remove trailing slash if not root / */
if ((cp > canonpath + 1) && (cp[-1] == '/'))
cp--;
else if (cp == canonpath)
*cp++ = '/';
*cp = '\0';
return canonpath;
}
2013-01-26 15:29:09 +01:00
static struct blob_attr **
__rpc_check_path(const struct blobmsg_policy *policy, size_t policy_len,
int policy_path_idx, int policy_sid_idx, const char *perm,
struct blob_attr *msg, char **path, struct stat *s)
2013-01-26 15:29:09 +01:00
{
static struct blob_attr *tb[__RPC_F_RW_MAX]; /* largest _MAX constant */
2013-01-26 15:29:09 +01:00
blobmsg_parse(policy, policy_len, tb, blob_data(msg), blob_len(msg));
2013-01-26 15:29:09 +01:00
if (!tb[policy_path_idx])
2013-01-26 15:29:09 +01:00
{
errno = EINVAL;
return NULL;
}
*path = rpc_canonicalize_path(blobmsg_get_string(tb[policy_path_idx]));
if (*path == NULL)
{
errno = ENOMEM;
return NULL;
}
if (!rpc_file_access(tb[policy_sid_idx], *path, perm))
{
errno = EACCES;
return NULL;
}
2013-01-26 15:29:09 +01:00
if (s != NULL && stat(*path, s) != 0)
2013-01-26 15:29:09 +01:00
return NULL;
return tb;
}
#define rpc_check_path(msg, policy_selector, perm, path, s) \
__rpc_check_path(rpc_file_ ## policy_selector ## _policy, \
ARRAY_SIZE(rpc_file_ ## policy_selector ## _policy), \
RPC_F_ ## policy_selector ## _PATH, \
RPC_F_ ## policy_selector ## _SESSION, \
perm, msg, path, s)
2013-01-26 15:29:09 +01:00
static int
rpc_file_read(struct ubus_context *ctx, struct ubus_object *obj,
struct ubus_request_data *req, const char *method,
struct blob_attr *msg)
2013-01-26 15:29:09 +01:00
{
struct blob_attr **tb;
bool base64 = false;
int fd, rv;
ssize_t len;
2013-01-26 15:29:09 +01:00
char *path;
struct stat s;
char *wbuf;
2013-01-26 15:29:09 +01:00
tb = rpc_check_path(msg, RB, "read", &path, &s);
if (tb == NULL)
2013-01-26 15:29:09 +01:00
return rpc_errno_status();
if (s.st_size >= RPC_FILE_MAX_SIZE)
return UBUS_STATUS_NOT_SUPPORTED;
if ((fd = open(path, O_RDONLY)) < 0)
return rpc_errno_status();
/* some sysfs files do not report a length */
if (s.st_size == 0)
s.st_size = RPC_FILE_MIN_SIZE;
2013-01-26 15:29:09 +01:00
blob_buf_init(&buf, 0);
2013-01-26 15:29:09 +01:00
if (tb[RPC_F_RB_BASE64])
base64 = blobmsg_get_bool(tb[RPC_F_RB_BASE64]);
len = s.st_size + 1;
if (base64)
len = B64_ENCODE_LEN(s.st_size);
wbuf = blobmsg_alloc_string_buffer(&buf, "data", len);
if (!wbuf)
{
rv = UBUS_STATUS_UNKNOWN_ERROR;
goto out;
}
if ((len = read(fd, wbuf, s.st_size)) <= 0)
{
rv = UBUS_STATUS_NO_DATA;
goto out;
}
if (base64)
{
uint8_t *data = calloc(len, sizeof(uint8_t));
if (!data)
{
rv = UBUS_STATUS_UNKNOWN_ERROR;
goto out;
}
memcpy(data, wbuf, len);
len = b64_encode(data, len, wbuf, B64_ENCODE_LEN(len));
free(data);
if (len < 0)
{
rv = UBUS_STATUS_UNKNOWN_ERROR;
goto out;
}
}
*(wbuf + len) = '\0';
blobmsg_add_string_buffer(&buf);
2013-01-26 15:29:09 +01:00
ubus_send_reply(ctx, req, buf.head);
rv = UBUS_STATUS_OK;
2013-01-26 15:29:09 +01:00
out:
blob_buf_free(&buf);
close(fd);
return rv;
2013-01-26 15:29:09 +01:00
}
static int
rpc_file_write(struct ubus_context *ctx, struct ubus_object *obj,
struct ubus_request_data *req, const char *method,
struct blob_attr *msg)
2013-01-26 15:29:09 +01:00
{
struct blob_attr **tb;
int append = O_TRUNC;
mode_t prev_mode, mode = 0666;
int fd, rv = 0;
char *path = NULL;
void *data = NULL;
ssize_t data_len = 0;
2013-01-26 15:29:09 +01:00
tb = rpc_check_path(msg, RW, "write", &path, NULL);
if (tb == NULL)
return rpc_errno_status();
if (!tb[RPC_F_RW_DATA])
return UBUS_STATUS_INVALID_ARGUMENT;
data = blobmsg_data(tb[RPC_F_RW_DATA]);
data_len = blobmsg_data_len(tb[RPC_F_RW_DATA]) - 1;
if (tb[RPC_F_RW_APPEND] && blobmsg_get_bool(tb[RPC_F_RW_APPEND]))
append = O_APPEND;
if (tb[RPC_F_RW_MODE])
mode = blobmsg_get_u32(tb[RPC_F_RW_MODE]);
prev_mode = umask(0);
fd = open(path, O_CREAT | O_WRONLY | append, mode);
umask(prev_mode);
if (fd < 0)
2013-01-26 15:29:09 +01:00
return rpc_errno_status();
if (tb[RPC_F_RW_BASE64] && blobmsg_get_bool(tb[RPC_F_RW_BASE64]))
{
data_len = b64_decode(data, data, data_len);
if (data_len < 0)
{
rv = UBUS_STATUS_UNKNOWN_ERROR;
goto out;
}
}
if (write(fd, data, data_len) < 0)
rv = -1;
out:
if (fsync(fd) < 0)
rv = -1;
2013-01-26 15:29:09 +01:00
close(fd);
sync();
2013-01-26 15:29:09 +01:00
if (rv)
return rpc_errno_status();
2013-01-26 15:29:09 +01:00
return 0;
}
static int
rpc_file_md5(struct ubus_context *ctx, struct ubus_object *obj,
struct ubus_request_data *req, const char *method,
struct blob_attr *msg)
{
int rv, i;
char *path;
struct stat s;
uint8_t md5[16];
char *wbuf;
if (!rpc_check_path(msg, R, "read", &path, &s))
return rpc_errno_status();
if (!S_ISREG(s.st_mode))
return UBUS_STATUS_NOT_SUPPORTED;
if ((rv = md5sum(path, md5)) <= 0)
return rpc_errno_status();
blob_buf_init(&buf, 0);
wbuf = blobmsg_alloc_string_buffer(&buf, "md5", 33);
for (i = 0; i < 16; i++)
sprintf(wbuf + (i * 2), "%02x", (uint8_t) md5[i]);
blobmsg_add_string_buffer(&buf);
ubus_send_reply(ctx, req, buf.head);
blob_buf_free(&buf);
return UBUS_STATUS_OK;
}
static void
_rpc_file_add_stat(struct stat *s)
{
int type;
type = S_ISREG(s->st_mode) ? DT_REG :
S_ISDIR(s->st_mode) ? DT_DIR :
S_ISCHR(s->st_mode) ? DT_CHR :
S_ISBLK(s->st_mode) ? DT_BLK :
S_ISFIFO(s->st_mode) ? DT_FIFO :
S_ISLNK(s->st_mode) ? DT_LNK :
S_ISSOCK(s->st_mode) ? DT_SOCK :
DT_UNKNOWN;
blobmsg_add_string(&buf, "type", d_types[type]);
blobmsg_add_u32(&buf, "size", s->st_size);
blobmsg_add_u32(&buf, "mode", s->st_mode);
blobmsg_add_u32(&buf, "atime", s->st_atime);
blobmsg_add_u32(&buf, "mtime", s->st_mtime);
blobmsg_add_u32(&buf, "ctime", s->st_ctime);
blobmsg_add_u32(&buf, "inode", s->st_ino);
blobmsg_add_u32(&buf, "uid", s->st_uid);
blobmsg_add_u32(&buf, "gid", s->st_gid);
}
2013-01-26 15:29:09 +01:00
static int
rpc_file_list(struct ubus_context *ctx, struct ubus_object *obj,
struct ubus_request_data *req, const char *method,
struct blob_attr *msg)
2013-01-26 15:29:09 +01:00
{
DIR *fd;
void *c, *d;
struct stat s;
struct dirent *e;
char *path, *entrypath;
2013-01-26 15:29:09 +01:00
if (!rpc_check_path(msg, R, "list", &path, NULL))
2013-01-26 15:29:09 +01:00
return rpc_errno_status();
if ((fd = opendir(path)) == NULL)
return rpc_errno_status();
blob_buf_init(&buf, 0);
c = blobmsg_open_array(&buf, "entries");
while ((e = readdir(fd)) != NULL)
{
if (!strcmp(e->d_name, ".") || !strcmp(e->d_name, ".."))
continue;
if (asprintf(&entrypath, "%s/%s", path, e->d_name) < 0)
continue;
if (!stat(entrypath, &s))
{
d = blobmsg_open_table(&buf, NULL);
blobmsg_add_string(&buf, "name", e->d_name);
_rpc_file_add_stat(&s);
blobmsg_close_table(&buf, d);
}
free(entrypath);
2013-01-26 15:29:09 +01:00
}
closedir(fd);
2013-01-26 15:29:09 +01:00
blobmsg_close_array(&buf, c);
ubus_send_reply(ctx, req, buf.head);
blob_buf_free(&buf);
2013-01-26 15:29:09 +01:00
return 0;
}
static int
rpc_file_stat(struct ubus_context *ctx, struct ubus_object *obj,
struct ubus_request_data *req, const char *method,
struct blob_attr *msg)
2013-01-26 15:29:09 +01:00
{
char *path;
struct stat s;
if (!rpc_check_path(msg, R, "list", &path, &s))
2013-01-26 15:29:09 +01:00
return rpc_errno_status();
blob_buf_init(&buf, 0);
blobmsg_add_string(&buf, "path", path);
_rpc_file_add_stat(&s);
2013-01-26 15:29:09 +01:00
ubus_send_reply(ctx, req, buf.head);
blob_buf_free(&buf);
2013-01-26 15:29:09 +01:00
return 0;
}
static int
rpc_file_remove_recursive(const char *path);
static int
rpc_file_remove_recursive(const char *path)
{
DIR *fd;
int err = 0;
struct stat s;
struct dirent *e;
char *entrypath;
if ((fd = opendir(path)) == NULL)
return rpc_errno_status();
for (e = readdir(fd); e != NULL && err == 0; e = readdir(fd))
{
if (!strcmp(e->d_name, ".") || !strcmp(e->d_name, ".."))
continue;
if (asprintf(&entrypath, "%s/%s", path, e->d_name) >= 0)
{
if (!lstat(entrypath, &s))
{
if (S_ISDIR(s.st_mode))
err = rpc_file_remove_recursive(entrypath);
else if (unlink(entrypath))
err = rpc_errno_status();
}
free(entrypath);
}
else
{
err = UBUS_STATUS_UNKNOWN_ERROR;
}
}
closedir(fd);
if (!err && rmdir(path))
return rpc_errno_status();
return err;
}
static int
rpc_file_remove(struct ubus_context *ctx, struct ubus_object *obj,
struct ubus_request_data *req, const char *method,
struct blob_attr *msg)
{
struct stat s;
char *path = NULL;
if (!rpc_check_path(msg, R, "write", &path, NULL))
return rpc_errno_status();
if (lstat(path, &s))
return rpc_errno_status();
if (S_ISDIR(s.st_mode))
return rpc_file_remove_recursive(path);
if (unlink(path))
return rpc_errno_status();
return 0;
}
static const char *
rpc_file_exec_lookup(const char *cmd)
{
struct stat s;
int plen = 0, clen = strlen(cmd) + 1;
char *search, *p;
static char path[PATH_MAX];
if (!stat(cmd, &s) && S_ISREG(s.st_mode))
return cmd;
search = getenv("PATH");
if (!search)
search = "/bin:/usr/bin:/sbin:/usr/sbin";
p = search;
do
{
if (*p != ':' && *p != '\0')
continue;
plen = p - search;
if ((plen + clen) >= sizeof(path))
continue;
strncpy(path, search, plen);
sprintf(path + plen, "/%s", cmd);
if (!stat(path, &s) && S_ISREG(s.st_mode))
return path;
search = p + 1;
}
while (*p++);
return NULL;
}
static void
rpc_ustream_to_blobmsg(struct ustream *s, const char *name)
{
int len;
char *rbuf, *wbuf;
if ((len = ustream_pending_data(s, false)) > 0)
{
wbuf = blobmsg_alloc_string_buffer(&buf, name, len + 1);
if (!wbuf)
return;
ustream_for_each_read_buffer(s, rbuf, len)
{
memcpy(wbuf, rbuf, len);
wbuf += len;
}
*wbuf = 0;
blobmsg_add_string_buffer(&buf);
}
}
static void
rpc_file_exec_reply(struct rpc_file_exec_context *c, int rv)
{
uloop_timeout_cancel(&c->timeout);
uloop_process_delete(&c->process);
if (rv == UBUS_STATUS_OK)
{
blob_buf_init(&buf, 0);
blobmsg_add_u32(&buf, "code", WEXITSTATUS(c->stat));
rpc_ustream_to_blobmsg(&c->opipe.stream, "stdout");
rpc_ustream_to_blobmsg(&c->epipe.stream, "stderr");
ubus_send_reply(c->context, &c->request, buf.head);
blob_buf_free(&buf);
}
ubus_complete_deferred_request(c->context, &c->request, rv);
ustream_free(&c->opipe.stream);
ustream_free(&c->epipe.stream);
close(c->opipe.fd.fd);
close(c->epipe.fd.fd);
free(c);
}
static void
rpc_file_exec_timeout_cb(struct uloop_timeout *t)
{
struct rpc_file_exec_context *c =
container_of(t, struct rpc_file_exec_context, timeout);
kill(c->process.pid, SIGKILL);
rpc_file_exec_reply(c, UBUS_STATUS_TIMEOUT);
}
static void
rpc_file_exec_process_cb(struct uloop_process *p, int stat)
{
struct rpc_file_exec_context *c =
container_of(p, struct rpc_file_exec_context, process);
c->stat = stat;
ustream_poll(&c->opipe.stream);
ustream_poll(&c->epipe.stream);
}
static void
rpc_file_exec_opipe_read_cb(struct ustream *s, int bytes)
{
struct rpc_file_exec_context *c =
container_of(s, struct rpc_file_exec_context, opipe.stream);
if (ustream_read_buf_full(s))
rpc_file_exec_reply(c, UBUS_STATUS_NOT_SUPPORTED);
}
static void
rpc_file_exec_epipe_read_cb(struct ustream *s, int bytes)
{
struct rpc_file_exec_context *c =
container_of(s, struct rpc_file_exec_context, epipe.stream);
if (ustream_read_buf_full(s))
rpc_file_exec_reply(c, UBUS_STATUS_NOT_SUPPORTED);
}
static void
rpc_file_exec_opipe_state_cb(struct ustream *s)
{
struct rpc_file_exec_context *c =
container_of(s, struct rpc_file_exec_context, opipe.stream);
if (c->opipe.stream.eof && c->epipe.stream.eof)
rpc_file_exec_reply(c, UBUS_STATUS_OK);
}
static void
rpc_file_exec_epipe_state_cb(struct ustream *s)
{
struct rpc_file_exec_context *c =
container_of(s, struct rpc_file_exec_context, epipe.stream);
if (c->opipe.stream.eof && c->epipe.stream.eof)
rpc_file_exec_reply(c, UBUS_STATUS_OK);
}
static void
rpc_fdclose(int fd)
{
if (fd > 2)
close(fd);
}
static int
rpc_file_exec_run(const char *cmd, const struct blob_attr *sid,
const struct blob_attr *arg, const struct blob_attr *env,
struct ubus_context *ctx, struct ubus_request_data *req)
{
pid_t pid;
int devnull;
int opipe[2];
int epipe[2];
int rem;
struct blob_attr *cur;
uint8_t arglen;
char *executable, **args, **tmp, *p;
struct rpc_file_exec_context *c;
if (sid && env)
return UBUS_STATUS_PERMISSION_DENIED;
cmd = rpc_file_exec_lookup(cmd);
if (!cmd)
return UBUS_STATUS_NOT_FOUND;
executable = rpc_canonicalize_path(cmd);
if (executable == NULL)
return UBUS_STATUS_UNKNOWN_ERROR;
if (!rpc_file_access(sid, executable, "exec"))
{
if (arg == NULL || strlen(executable) >= sizeof(cmdstr))
return UBUS_STATUS_PERMISSION_DENIED;
arglen = 2;
p = cmdstr + sprintf(cmdstr, "%s", executable);
blobmsg_for_each_attr(cur, arg, rem)
{
if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING)
continue;
if (arglen == 255 ||
p + blobmsg_data_len(cur) >= cmdstr + sizeof(cmdstr))
return UBUS_STATUS_PERMISSION_DENIED;
p += sprintf(p, " %s", blobmsg_get_string(cur));
arglen++;
}
if (!rpc_file_access(sid, cmdstr, "exec"))
return UBUS_STATUS_PERMISSION_DENIED;
}
c = malloc(sizeof(*c));
if (!c)
return UBUS_STATUS_UNKNOWN_ERROR;
if (pipe(opipe))
goto fail_opipe;
if (pipe(epipe))
goto fail_epipe;
switch ((pid = fork()))
{
case -1:
goto fail_fork;
case 0:
uloop_done();
devnull = open("/dev/null", O_RDWR);
if (devnull == -1)
return UBUS_STATUS_UNKNOWN_ERROR;
dup2(devnull, 0);
dup2(opipe[1], 1);
dup2(epipe[1], 2);
rpc_fdclose(devnull);
rpc_fdclose(opipe[0]);
rpc_fdclose(opipe[1]);
rpc_fdclose(epipe[0]);
rpc_fdclose(epipe[1]);
arglen = 2;
args = malloc(sizeof(char *) * arglen);
if (!args)
return UBUS_STATUS_UNKNOWN_ERROR;
args[0] = (char *)executable;
args[1] = NULL;
if (arg)
{
blobmsg_for_each_attr(cur, arg, rem)
{
if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING)
continue;
if (arglen == 255)
{
free(args);
return UBUS_STATUS_INVALID_ARGUMENT;
}
arglen++;
tmp = realloc(args, sizeof(char *) * arglen);
if (!tmp)
{
free(args);
return UBUS_STATUS_UNKNOWN_ERROR;
}
args = tmp;
args[arglen-2] = blobmsg_data(cur);
args[arglen-1] = NULL;
}
}
if (env)
{
blobmsg_for_each_attr(cur, env, rem)
{
if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING)
continue;
setenv(blobmsg_name(cur), blobmsg_data(cur), 1);
}
}
if (execv(executable, args))
return rpc_errno_status();
default:
memset(c, 0, sizeof(*c));
ustream_declare(c->opipe, opipe[0], exec_opipe);
ustream_declare(c->epipe, epipe[0], exec_epipe);
c->process.pid = pid;
c->process.cb = rpc_file_exec_process_cb;
uloop_process_add(&c->process);
c->timeout.cb = rpc_file_exec_timeout_cb;
uloop_timeout_set(&c->timeout, *ops->exec_timeout);
close(opipe[1]);
close(epipe[1]);
c->context = ctx;
ubus_defer_request(ctx, req, &c->request);
}
return UBUS_STATUS_OK;
fail_fork:
close(epipe[0]);
close(epipe[1]);
fail_epipe:
close(opipe[0]);
close(opipe[1]);
fail_opipe:
free(c);
return rpc_errno_status();
}
static int
rpc_file_exec(struct ubus_context *ctx, struct ubus_object *obj,
struct ubus_request_data *req, const char *method,
struct blob_attr *msg)
{
struct blob_attr *tb[__RPC_E_MAX];
blobmsg_parse(rpc_exec_policy, __RPC_E_MAX, tb,
blob_data(msg), blob_len(msg));
if (!tb[RPC_E_CMD])
return UBUS_STATUS_INVALID_ARGUMENT;
return rpc_file_exec_run(blobmsg_data(tb[RPC_E_CMD]), tb[RPC_E_SESSION],
tb[RPC_E_PARM], tb[RPC_E_ENV], ctx, req);
}
2013-01-26 15:29:09 +01:00
2013-09-02 14:52:37 +02:00
static int
rpc_file_api_init(const struct rpc_daemon_ops *o, struct ubus_context *ctx)
2013-01-26 15:29:09 +01:00
{
static const struct ubus_method file_methods[] = {
UBUS_METHOD("read", rpc_file_read, rpc_file_RB_policy),
UBUS_METHOD("write", rpc_file_write, rpc_file_RW_policy),
UBUS_METHOD("list", rpc_file_list, rpc_file_R_policy),
UBUS_METHOD("stat", rpc_file_stat, rpc_file_R_policy),
UBUS_METHOD("md5", rpc_file_md5, rpc_file_R_policy),
UBUS_METHOD("remove", rpc_file_remove, rpc_file_R_policy),
UBUS_METHOD("exec", rpc_file_exec, rpc_exec_policy),
2013-01-26 15:29:09 +01:00
};
static struct ubus_object_type file_type =
UBUS_OBJECT_TYPE("rpcd-plugin-file", file_methods);
2013-01-26 15:29:09 +01:00
static struct ubus_object obj = {
.name = "file",
.type = &file_type,
.methods = file_methods,
.n_methods = ARRAY_SIZE(file_methods),
};
ops = o;
2013-01-26 15:29:09 +01:00
return ubus_add_object(ctx, &obj);
}
2013-09-02 14:52:37 +02:00
struct rpc_plugin rpc_plugin = {
2013-09-02 14:52:37 +02:00
.init = rpc_file_api_init
};