sudo代码主干分支回退

Signed-off-by: chenbo <chenbo18@huawei.com>
This commit is contained in:
chenbo 2024-07-29 11:25:41 +08:00
parent 68f5fd51a3
commit 742bb2dc27
7 changed files with 4 additions and 595 deletions

View File

@ -12,9 +12,6 @@
"component": {
"name": "hdc",
"subsystem": "developtools",
"features": [
"hdc_feature_support_sudo"
],
"adapted_system_type": [
"standard"
],
@ -37,10 +34,7 @@
"selinux",
"openssl",
"libusb",
"libuv",
"os_account",
"user_auth_framework",
"pin_auth"
"libuv"
],
"third_party": []
},
@ -50,8 +44,7 @@
"//developtools/hdc/hdcd_user_permit:hdcd_user_permit",
"//developtools/hdc:hdc_register",
"//developtools/hdc:hdcd_updater",
"//developtools/hdc:hdc_updater",
"//developtools/hdc/sudo:sudo"
"//developtools/hdc:hdc_updater"
],
"inner_kits": [
{

View File

@ -23,7 +23,6 @@ declare_args() {
js_jdwp_connect = true
hdc_version_check = false
support_hdcd_user_permit = false
hdc_feature_support_sudo = false
if (defined(global_parts_info)) {
if (defined(global_parts_info.ability_ability_base)) {

View File

@ -78,10 +78,7 @@
"ohos.permission.PUBLISH_SYSTEM_COMMON_EVENT",
"ohos.permission.CLEAN_APPLICATION_DATA",
"ohos.permission.START_SYSTEM_DIALOG",
"ohos.permission.GET_RUNNING_INFO",
"ohos.permission.MANAGE_USER_IDM",
"ohos.permission.ACCESS_PIN_AUTH",
"ohos.permission.ACCESS_USER_AUTH_INTERNAL"
"ohos.permission.GET_RUNNING_INFO"
],
"permission_acls" : [
"ohos.permission.CHANGE_ABILITY_ENABLED_STATE",
@ -96,10 +93,7 @@
"ohos.permission.PUBLISH_SYSTEM_COMMON_EVENT",
"ohos.permission.CLEAN_APPLICATION_DATA",
"ohos.permission.START_SYSTEM_DIALOG",
"ohos.permission.GET_RUNNING_INFO",
"ohos.permission.MANAGE_USER_IDM",
"ohos.permission.ACCESS_PIN_AUTH",
"ohos.permission.ACCESS_USER_AUTH_INTERNAL"
"ohos.permission.GET_RUNNING_INFO"
],
"sandbox" : 0,
"start-mode" : "condition",

View File

@ -1,51 +0,0 @@
# Copyright (C) 2024 Huawei Device Co., Ltd.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import("//build/ohos.gni")
import("//developtools/hdc/hdc.gni")
ohos_executable("exec_sudo") {
if (hdc_feature_support_sudo) {
sources = [
"src/main.cpp",
"src/sudo_iam.cpp",
]
deps = []
external_deps = [
"c_utils:utils",
"ipc:ipc_single",
"os_account:account_iam_innerkits",
"os_account:os_account_innerkits",
"pin_auth:pinauth_framework",
"user_auth_framework:userauth_client",
]
defines = [ "HAS_PIN_AUTH_PART" ]
if (build_selinux) {
external_deps += [ "selinux:libselinux" ]
defines += [ "SURPPORT_SELINUX" ]
}
subsystem_name = "developtools"
output_name = "sudo"
part_name = "hdc"
}
}
group("sudo") {
if (hdc_feature_support_sudo) {
deps = [ ":exec_sudo" ]
}
}

View File

@ -1,388 +0,0 @@
/*
* Copyright (C) 2024 Huawei Device Co., Ltd.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <termios.h>
#include <cstring>
#include <unistd.h>
#include <climits>
#include <sys/types.h>
#include <sys/wait.h>
#include <sys/stat.h>
#include <securec.h>
#if defined(SURPPORT_SELINUX)
#include "selinux/selinux.h"
#endif
#include "account_iam_client.h"
#include "os_account_manager.h"
#include "sudo_iam.h"
#define PWD_BUF_LEN 128
#define DEFAULT_PATH "/system/bin"
#define DEFAULT_BASH "/system/bin/sh"
using namespace OHOS::UserIam;
using namespace OHOS::AccountSA;
static FILE *g_ttyFp = nullptr;
static const char *OUT_OF_MEM = "[E0001] out of memory\n";
static const char *COMMAND_NOT_FOUND = "[E0002] command not found\n";
static const char *USER_VERIFY_FAILED = "[E0003] Sorry, try again. If screen lock password not set, set it first.\n";
static void WriteStdErr(const char *str)
{
(void)fwrite(str, 1, strlen(str), stderr);
fflush(stderr);
}
static void WriteTty(const char *str)
{
if (g_ttyFp != nullptr) {
(void)fwrite(str, 1, strlen(str), g_ttyFp);
fflush(g_ttyFp);
} else {
g_ttyFp = fopen("/dev/tty", "w");
if (g_ttyFp != nullptr) {
(void)fwrite(str, 1, strlen(str), g_ttyFp);
fflush(g_ttyFp);
return;
}
WriteStdErr("open /dev/tty for write failed\n");
}
}
static void CloseTty(void)
{
if (g_ttyFp != nullptr) {
fclose(g_ttyFp);
}
g_ttyFp = nullptr;
}
static char *StrDup(const char *str)
{
int ret;
char *result = new(std::nothrow)char[strlen(str) + 1];
if (result == nullptr) {
WriteStdErr(OUT_OF_MEM);
exit(1);
}
ret = strcpy_s(result, strlen(str) + 1, str);
if (ret != 0) {
WriteStdErr(OUT_OF_MEM);
exit(1);
}
return result;
}
static void FreeArgvNew(char **argvNew)
{
char **p = nullptr;
for (p = argvNew; *p != nullptr; p++) {
delete [] *p;
}
delete [] argvNew;
}
/*
* Find cmd from PATH
*/
static bool GetCmdInPath(char *cmd, int cmdBufLen, char *envp[])
{
struct stat st;
char *path = nullptr;
char *pathBak = nullptr;
char **ep = nullptr;
char *cp = nullptr;
char pathBuf[PATH_MAX + 1] = {0};
bool findSuccess = false;
int ret;
if (strchr(cmd, '/') != nullptr) {
return true;
}
for (ep = envp; *ep != nullptr; ep++) {
if (strcmp(*ep, "PATH=") == 0) {
path = *ep + strlen("PATH=");
break;
}
}
path = StrDup((path != nullptr && *path != '\0') ? path : DEFAULT_PATH);
pathBak = path;
do {
if ((cp = strchr(path, ':')) != nullptr) {
*cp = '\0';
}
ret = sprintf_s(pathBuf, sizeof(pathBuf), "%s/%s", *path ? path : ".", cmd);
if (ret > 0 && stat(pathBuf, &st) == 0 && S_ISREG(st.st_mode)) {
findSuccess = true;
break;
}
path = cp + 1;
} while (cp != nullptr);
free(pathBak);
if (!findSuccess) {
WriteTty(COMMAND_NOT_FOUND);
return false;
}
return (sprintf_s(cmd, cmdBufLen, "%s", pathBuf) < 0) ? false : true;
}
static char **ParseCmd(int argc, char* argv[], char* env[], char *cmd, int cmdLen)
{
int startCopyArgvIndex = 1;
int argvNewIndex = 0;
char **argvTmp = nullptr;
bool isShc = false;
int ret;
/*
* Here, we construct the command and its argv
* sudo sh -c xxx yyy -----> sh -c xxx yyy
* sudo xxx yyy -----> xxx yyy
*/
if (argc <= 0) {
return nullptr;
}
argvTmp = new(std::nothrow) char* [argc];
if (argvTmp == nullptr) {
WriteStdErr(OUT_OF_MEM);
return nullptr;
}
(void)memset_s(argvTmp, sizeof(char*) * argc, 0, sizeof(char*) * argc);
/*
* sudo sh -c xxxx
*/
if (argc >= 3) { //3:argc of main
if (strcmp(argv[1], "sh") == 0 && strcmp(argv[2], "-c") == 0) { //2:argv 2 of main
// argvNew[0] is "/system/bin/sh"
argvTmp[argvNewIndex++] = StrDup(DEFAULT_BASH);
// argvNew[1] is "-c"
argvTmp[argvNewIndex++] = StrDup("-c");
ret = sprintf_s(cmd, cmdLen, "%s", DEFAULT_BASH);
if (ret < 0) {
FreeArgvNew(argvTmp);
return nullptr;
}
startCopyArgvIndex = 3; //3:start copy index of argv
isShc = true;
}
}
/*
* if not "sudo sh -c xxxx", just as "sudo xxxx"
*/
if (!isShc) {
ret = sprintf_s(cmd, cmdLen, "%s", argv[1]);
if (ret < 0 || !GetCmdInPath(cmd, cmdLen, env)) {
FreeArgvNew(argvTmp);
return nullptr;
}
argvTmp[argvNewIndex++] = StrDup(cmd);
startCopyArgvIndex = 2; //2:start copy index of argv
}
for (int i = startCopyArgvIndex; i < argc; i++) {
argvTmp[argvNewIndex++] = StrDup(argv[i]);
}
argvTmp[argvNewIndex] = nullptr;
return argvTmp;
}
static void GetUserPwd(char *pwdBuf, int bufLen)
{
const char *prompts = "[sudo] password for current user:";
const char *newline = "\n";
struct termios oldTerm;
struct termios newTerm;
WriteTty(prompts);
tcgetattr(STDIN_FILENO, &oldTerm);
newTerm = oldTerm;
newTerm.c_lflag &= ~(ECHO);
tcsetattr(STDIN_FILENO, TCSANOW, &newTerm);
(void)fgets(pwdBuf, bufLen, stdin);
if (pwdBuf[strlen(pwdBuf) - 1] == '\n') {
pwdBuf[strlen(pwdBuf) - 1] = '\0';
}
tcsetattr(STDIN_FILENO, TCSANOW, &oldTerm);
WriteTty(newline);
}
static bool SetUidGid(void)
{
if (setuid(0) != 0) {
return false;
}
if (setegid(0) != 0) {
return false;
}
if (setgid(0) != 0) {
return false;
}
return true;
}
static void WaitForAuth(void)
{
std::unique_lock<std::mutex> lock(g_mutexForAuth);
g_condVarForAuth.wait(lock, [] { return g_authFinish; });
}
static bool VerifyAccount(int32_t userId)
{
OHOS::ErrCode err;
std::vector<uint8_t> challenge;
AuthOptions authOptions;
bool verifyResult = false;
AccountIAMClient &sudoIAMClient = AccountIAMClient::GetInstance();
err = sudoIAMClient.OpenSession(userId, challenge);
if (err != 0) {
WriteStdErr("open session failed\n");
return false;
}
std::shared_ptr<IDMCallback> callback = std::make_shared<SudoIDMCallback>();
authOptions.accountId = userId;
sudoIAMClient.AuthUser(authOptions, challenge, AuthType::PIN, AuthTrustLevel::ATL1, callback);
std::shared_ptr<SudoIDMCallback> sudoCallback = std::static_pointer_cast<SudoIDMCallback>(callback);
WaitForAuth();
verifyResult = sudoCallback->GetVerifyResult();
sudoIAMClient.CloseSession(userId);
return verifyResult;
}
static bool UserAccountVerify(char *pwd, int pwdLen)
{
int32_t userId = -1;
std::shared_ptr<PinAuth::IInputer> inputer = nullptr;
OHOS::ErrCode err;
int verifyResult = 0;
pid_t pid;
int fds[2];
if (pipe(fds) != 0) {
WriteStdErr("exec pipe failed\n");
return false;
}
pid = fork();
if (pid == -1) {
WriteStdErr("exec fork failed\n");
return false;
}
if (pid == 0) {
close(fds[0]);
err = OsAccountManager::GetForegroundOsAccountLocalId(userId);
if (err != 0) {
WriteStdErr("get os account local id failed\n");
exit(1);
}
inputer = std::make_shared<PinAuth::SudoIInputer>();
std::shared_ptr<PinAuth::SudoIInputer> sudoInputer = std::static_pointer_cast<PinAuth::SudoIInputer>(inputer);
sudoInputer->SetPasswd(pwd, pwdLen);
err = AccountIAMClient::GetInstance().RegisterPINInputer(inputer);
if (err != 0) {
WriteStdErr("register pin inputer failed\n");
exit(1);
}
if (VerifyAccount(userId)) {
verifyResult = 1;
}
AccountIAMClient::GetInstance().UnregisterPINInputer();
write(fds[1], &verifyResult, sizeof(verifyResult));
close(fds[1]);
exit(0);
} else {
close(fds[1]);
waitpid(pid, nullptr, 0);
read(fds[0], &verifyResult, sizeof(verifyResult));
close(fds[0]);
return (verifyResult == 1);
}
}
static bool VerifyUserPin(void)
{
char passwd[PWD_BUF_LEN] = {0};
bool pwdVerifyResult = false;
if (getuid() == 0) {
return true;
}
GetUserPwd(passwd, PWD_BUF_LEN);
pwdVerifyResult = UserAccountVerify(passwd, strnlen(passwd, PWD_BUF_LEN));
memset_s(passwd, sizeof(passwd), 0, sizeof(passwd));
if (!pwdVerifyResult) {
WriteTty(USER_VERIFY_FAILED);
}
return pwdVerifyResult;
}
int main(int argc, char* argv[], char* env[])
{
char execCmd[PATH_MAX + 1] = {0};
char **argvNew = nullptr;
const char *help = "sudo - execute command as root\n\n"
"usage: sudo command ...\n"
"usage: sudo sh -c command ...\n";
if (argc < 2) { //2:argc check number
WriteStdErr(help);
return 1;
}
/*
* Get and verify user pwd
*/
if (!VerifyUserPin()) {
return 1;
}
/*
* Make exec cmd and the args
*/
argvNew = ParseCmd(argc, argv, env, execCmd, PATH_MAX + 1);
if (argvNew == nullptr) {
return 1;
}
CloseTty();
/*
* set uid, gid, egid
*/
if (!SetUidGid()) {
FreeArgvNew(argvNew);
WriteStdErr("setuid failed\n");
return 1;
}
#if defined(SURPPORT_SELINUX)
setcon("u:r:privilege_app:s0");
#endif
execvp(execCmd, argvNew);
WriteStdErr("execvp failed\n");
return 1;
}

View File

@ -1,79 +0,0 @@
/*
* Copyright (C) 2024 Huawei Device Co., Ltd.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "sudo_iam.h"
#include "account_iam_client.h"
#include "account_iam_info.h"
#include "account_iam_client_callback.h"
#include "i_inputer.h"
std::condition_variable g_condVarForAuth;
bool g_authFinish;
std::mutex g_mutexForAuth;
namespace OHOS {
namespace UserIam {
namespace PinAuth {
void SudoIInputer::OnGetData(int32_t authSubType, std::vector<uint8_t> challenge,
std::shared_ptr<IInputerData> inputerData)
{
inputerData->OnSetData(authSubType, passwd_);
}
void SudoIInputer::SetPasswd(char *pwd, int len)
{
passwd_.resize(len);
for (int i = 0; i < len; i++) {
passwd_[i] = *pwd++;
}
}
SudoIInputer::~SudoIInputer()
{
for (int i = 0; i < (int)passwd_.size(); i++) {
passwd_[i] = 0;
}
}
} //PinAuth
} //UserIam
namespace AccountSA {
void SudoIDMCallback::OnAcquireInfo(int32_t module, uint32_t acquireInfo, const Attributes &extraInfo)
{
return;
}
void SudoIDMCallback::OnResult(int32_t result, const Attributes &extraInfo)
{
verifyResult_ = false;
if (result == 0) {
verifyResult_ = true;
}
std::unique_lock<std::mutex> lock { g_mutexForAuth };
g_authFinish = true;
g_condVarForAuth.notify_all();
}
bool SudoIDMCallback::GetVerifyResult(void)
{
return verifyResult_;
}
} // AccountSA
} //OHOS

View File

@ -1,59 +0,0 @@
/*
* Copyright (C) 2024 Huawei Device Co., Ltd.
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef SUDO_IAM_H
#define SUDO_IAM_H
#include <condition_variable>
#include <mutex>
#include "account_iam_client.h"
#include "account_iam_info.h"
#include "account_iam_client_callback.h"
#include "i_inputer.h"
extern std::condition_variable g_condVarForAuth;
extern bool g_authFinish;
extern std::mutex g_mutexForAuth;
namespace OHOS {
namespace UserIam {
namespace PinAuth {
class SudoIInputer : public IInputer {
public:
virtual ~SudoIInputer();
void OnGetData(int32_t authSubType, std::vector<uint8_t> challenge,
std::shared_ptr<IInputerData> inputerData) override;
void SetPasswd(char *pwd, int len);
private:
std::vector<uint8_t> passwd_;
};
} //PinAuth
} //UserIam
namespace AccountSA {
class SudoIDMCallback : public IDMCallback {
public:
virtual ~SudoIDMCallback() = default;
void OnAcquireInfo(int32_t module, uint32_t acquireInfo, const Attributes &extraInfo) override;
void OnResult(int32_t result, const Attributes &extraInfo) override;
bool GetVerifyResult(void);
private:
bool verifyResult_;
};
} // AccountSA
} //OHOS
#endif //SUDO_IAM_H