aboutsummaryrefslogtreecommitdiff
path: root/sway/commands/permit.c
diff options
context:
space:
mode:
authorDrew DeVault <sir@cmpwn.com>2017-04-16 10:17:43 -0400
committerGitHub <noreply@github.com>2017-04-16 10:17:43 -0400
commit7494a48378bff3b11304ba4077bda5a84ed10087 (patch)
tree21abe14fe200099fffe5de9b7770cf2ca921e371 /sway/commands/permit.c
parentedb8075ae0c0986fb168b464b05e0b54537f8f30 (diff)
parent2ad8850398693cb572152e6d97c59de371996273 (diff)
Merge pull request #1173 from JerziKaminsky/security_resolve_symlink
FOR_REVIEW: IPC security - Allow policy targets to be symlinks
Diffstat (limited to 'sway/commands/permit.c')
-rw-r--r--sway/commands/permit.c58
1 files changed, 36 insertions, 22 deletions
diff --git a/sway/commands/permit.c b/sway/commands/permit.c
index e2bec2e2..66fa4e2a 100644
--- a/sway/commands/permit.c
+++ b/sway/commands/permit.c
@@ -1,7 +1,9 @@
+#define _XOPEN_SOURCE 500
#include <string.h>
#include "sway/commands.h"
#include "sway/config.h"
#include "sway/security.h"
+#include "util.h"
#include "log.h"
static enum secure_feature get_features(int argc, char **argv,
@@ -38,25 +40,6 @@ static enum secure_feature get_features(int argc, char **argv,
return features;
}
-static struct feature_policy *get_policy(const char *name) {
- struct feature_policy *policy = NULL;
- for (int i = 0; i < config->feature_policies->length; ++i) {
- struct feature_policy *p = config->feature_policies->items[i];
- if (strcmp(p->program, name) == 0) {
- policy = p;
- break;
- }
- }
- if (!policy) {
- policy = alloc_feature_policy(name);
- if (!policy) {
- sway_abort("Unable to allocate security policy");
- }
- list_add(config->feature_policies, policy);
- }
- return policy;
-}
-
struct cmd_results *cmd_permit(int argc, char **argv) {
struct cmd_results *error = NULL;
if ((error = checkarg(argc, "permit", EXPECTED_MORE_THAN, 1))) {
@@ -66,12 +49,29 @@ struct cmd_results *cmd_permit(int argc, char **argv) {
return error;
}
- struct feature_policy *policy = get_policy(argv[0]);
- policy->features |= get_features(argc, argv, &error);
+ bool assign_perms = true;
+ char *program = NULL;
+ if (!strcmp(argv[0], "*")) {
+ program = strdup(argv[0]);
+ } else {
+ program = resolve_path(argv[0]);
+ }
+ if (!program) {
+ sway_assert(program, "Unable to resolve IPC permit target '%s'."
+ " will issue empty policy", argv[0]);
+ assign_perms = false;
+ program = strdup(argv[0]);
+ }
+
+ struct feature_policy *policy = get_feature_policy(program);
+ if (assign_perms) {
+ policy->features |= get_features(argc, argv, &error);
+ }
sway_log(L_DEBUG, "Permissions granted to %s for features %d",
policy->program, policy->features);
+ free(program);
return cmd_results_new(CMD_SUCCESS, NULL, NULL);
}
@@ -84,11 +84,25 @@ struct cmd_results *cmd_reject(int argc, char **argv) {
return error;
}
- struct feature_policy *policy = get_policy(argv[0]);
+ char *program = NULL;
+ if (!strcmp(argv[0], "*")) {
+ program = strdup(argv[0]);
+ } else {
+ program = resolve_path(argv[0]);
+ }
+ if (!program) {
+ // Punt
+ sway_log(L_INFO, "Unable to resolve IPC reject target '%s'."
+ " Will use provided path", argv[0]);
+ program = strdup(argv[0]);
+ }
+
+ struct feature_policy *policy = get_feature_policy(program);
policy->features &= ~get_features(argc, argv, &error);
sway_log(L_DEBUG, "Permissions granted to %s for features %d",
policy->program, policy->features);
+ free(program);
return cmd_results_new(CMD_SUCCESS, NULL, NULL);
}