xref: /netbsd-src/external/bsd/tmux/dist/server-acl.c (revision 6db267571823ee3b0a1d61478df085a087f2e990)
1*6db26757Swiz /* $OpenBSD$ */
2*6db26757Swiz 
3*6db26757Swiz /*
4*6db26757Swiz  * Copyright (c) 2021 Holland Schutte, Jayson Morberg
5*6db26757Swiz  * Copyright (c) 2021 Dallas Lyons <dallasdlyons@gmail.com>
6*6db26757Swiz  *
7*6db26757Swiz  * Permission to use, copy, modify, and distribute this software for any
8*6db26757Swiz  * purpose with or without fee is hereby granted, provided that the above
9*6db26757Swiz  * copyright notice and this permission notice appear in all copies.
10*6db26757Swiz  *
11*6db26757Swiz  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12*6db26757Swiz  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13*6db26757Swiz  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14*6db26757Swiz  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15*6db26757Swiz  * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER
16*6db26757Swiz  * IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
17*6db26757Swiz  * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18*6db26757Swiz  */
19*6db26757Swiz 
20*6db26757Swiz #include <sys/types.h>
21*6db26757Swiz #include <sys/stat.h>
22*6db26757Swiz #include <sys/socket.h>
23*6db26757Swiz 
24*6db26757Swiz #include <ctype.h>
25*6db26757Swiz #include <pwd.h>
26*6db26757Swiz #include <stdlib.h>
27*6db26757Swiz #include <string.h>
28*6db26757Swiz #include <unistd.h>
29*6db26757Swiz 
30*6db26757Swiz #include "tmux.h"
31*6db26757Swiz 
32*6db26757Swiz struct server_acl_user {
33*6db26757Swiz 	uid_t				uid;
34*6db26757Swiz 
35*6db26757Swiz 	int				flags;
36*6db26757Swiz #define SERVER_ACL_READONLY 0x1
37*6db26757Swiz 
38*6db26757Swiz 	RB_ENTRY(server_acl_user)	entry;
39*6db26757Swiz };
40*6db26757Swiz 
41*6db26757Swiz static int
server_acl_cmp(struct server_acl_user * user1,struct server_acl_user * user2)42*6db26757Swiz server_acl_cmp(struct server_acl_user *user1, struct server_acl_user *user2)
43*6db26757Swiz {
44*6db26757Swiz 	if (user1->uid < user2->uid)
45*6db26757Swiz 		return (-1);
46*6db26757Swiz 	return (user1->uid > user2->uid);
47*6db26757Swiz }
48*6db26757Swiz 
49*6db26757Swiz RB_HEAD(server_acl_entries, server_acl_user) server_acl_entries;
50*6db26757Swiz RB_GENERATE_STATIC(server_acl_entries, server_acl_user, entry, server_acl_cmp);
51*6db26757Swiz 
52*6db26757Swiz /* Initialize server_acl tree. */
53*6db26757Swiz void
server_acl_init(void)54*6db26757Swiz server_acl_init(void)
55*6db26757Swiz {
56*6db26757Swiz 	RB_INIT(&server_acl_entries);
57*6db26757Swiz 
58*6db26757Swiz 	if (getuid() != 0)
59*6db26757Swiz 		server_acl_user_allow(0);
60*6db26757Swiz 	server_acl_user_allow(getuid());
61*6db26757Swiz }
62*6db26757Swiz 
63*6db26757Swiz /* Find user entry. */
64*6db26757Swiz struct server_acl_user*
server_acl_user_find(uid_t uid)65*6db26757Swiz server_acl_user_find(uid_t uid)
66*6db26757Swiz {
67*6db26757Swiz 	struct server_acl_user	find = { .uid = uid };
68*6db26757Swiz 
69*6db26757Swiz 	return (RB_FIND(server_acl_entries, &server_acl_entries, &find));
70*6db26757Swiz }
71*6db26757Swiz 
72*6db26757Swiz /* Display the tree. */
73*6db26757Swiz void
server_acl_display(struct cmdq_item * item)74*6db26757Swiz server_acl_display(struct cmdq_item *item)
75*6db26757Swiz {
76*6db26757Swiz 	struct server_acl_user	*loop;
77*6db26757Swiz 	struct passwd		*pw;
78*6db26757Swiz 	const char		*name;
79*6db26757Swiz 
80*6db26757Swiz 	RB_FOREACH(loop, server_acl_entries, &server_acl_entries) {
81*6db26757Swiz 		if (loop->uid == 0)
82*6db26757Swiz 			continue;
83*6db26757Swiz 		if ((pw = getpwuid(loop->uid)) != NULL)
84*6db26757Swiz 			name = pw->pw_name;
85*6db26757Swiz 		else
86*6db26757Swiz 			name = "unknown";
87*6db26757Swiz 		if (loop->flags == SERVER_ACL_READONLY)
88*6db26757Swiz 			cmdq_print(item, "%s (R)", name);
89*6db26757Swiz 		else
90*6db26757Swiz 			cmdq_print(item, "%s (W)", name);
91*6db26757Swiz 	}
92*6db26757Swiz }
93*6db26757Swiz 
94*6db26757Swiz /* Allow a user. */
95*6db26757Swiz void
server_acl_user_allow(uid_t uid)96*6db26757Swiz server_acl_user_allow(uid_t uid)
97*6db26757Swiz {
98*6db26757Swiz 	struct server_acl_user	*user;
99*6db26757Swiz 
100*6db26757Swiz 	user = server_acl_user_find(uid);
101*6db26757Swiz 	if (user == NULL) {
102*6db26757Swiz 		user = xcalloc(1, sizeof *user);
103*6db26757Swiz 		user->uid = uid;
104*6db26757Swiz 		RB_INSERT(server_acl_entries, &server_acl_entries, user);
105*6db26757Swiz 	}
106*6db26757Swiz }
107*6db26757Swiz 
108*6db26757Swiz /* Deny a user (remove from the tree). */
109*6db26757Swiz void
server_acl_user_deny(uid_t uid)110*6db26757Swiz server_acl_user_deny(uid_t uid)
111*6db26757Swiz {
112*6db26757Swiz 	struct server_acl_user	*user;
113*6db26757Swiz 
114*6db26757Swiz 	user = server_acl_user_find(uid);
115*6db26757Swiz 	if (user != NULL) {
116*6db26757Swiz 		RB_REMOVE(server_acl_entries, &server_acl_entries, user);
117*6db26757Swiz 		free(user);
118*6db26757Swiz 	}
119*6db26757Swiz }
120*6db26757Swiz 
121*6db26757Swiz /* Allow this user write access. */
122*6db26757Swiz void
server_acl_user_allow_write(uid_t uid)123*6db26757Swiz server_acl_user_allow_write(uid_t uid)
124*6db26757Swiz {
125*6db26757Swiz 	struct server_acl_user	*user;
126*6db26757Swiz 	struct client		*c;
127*6db26757Swiz 
128*6db26757Swiz 	user = server_acl_user_find(uid);
129*6db26757Swiz 	if (user == NULL)
130*6db26757Swiz 		return;
131*6db26757Swiz 	user->flags &= ~SERVER_ACL_READONLY;
132*6db26757Swiz 
133*6db26757Swiz 	TAILQ_FOREACH(c, &clients, entry) {
134*6db26757Swiz 		uid = proc_get_peer_uid(c->peer);
135*6db26757Swiz 		if (uid != (uid_t)-1 && uid == user->uid)
136*6db26757Swiz 			c->flags &= ~CLIENT_READONLY;
137*6db26757Swiz 	}
138*6db26757Swiz }
139*6db26757Swiz 
140*6db26757Swiz /* Deny this user write access. */
141*6db26757Swiz void
server_acl_user_deny_write(uid_t uid)142*6db26757Swiz server_acl_user_deny_write(uid_t uid)
143*6db26757Swiz {
144*6db26757Swiz 	struct server_acl_user	*user;
145*6db26757Swiz 	struct client		*c;
146*6db26757Swiz 
147*6db26757Swiz 	user = server_acl_user_find(uid);
148*6db26757Swiz 	if (user == NULL)
149*6db26757Swiz 		return;
150*6db26757Swiz 	user->flags |= SERVER_ACL_READONLY;
151*6db26757Swiz 
152*6db26757Swiz 	TAILQ_FOREACH(c, &clients, entry) {
153*6db26757Swiz 		uid = proc_get_peer_uid(c->peer);
154*6db26757Swiz 		if (uid != (uid_t)-1 && uid == user->uid)
155*6db26757Swiz 			c->flags |= CLIENT_READONLY;
156*6db26757Swiz 	}
157*6db26757Swiz }
158*6db26757Swiz 
159*6db26757Swiz /*
160*6db26757Swiz  * Check if the client's UID exists in the ACL list and if so, set as read only
161*6db26757Swiz  * if needed. Return false if the user does not exist.
162*6db26757Swiz  */
163*6db26757Swiz int
server_acl_join(struct client * c)164*6db26757Swiz server_acl_join(struct client *c)
165*6db26757Swiz {
166*6db26757Swiz 	struct server_acl_user	*user;
167*6db26757Swiz 	uid_t			 uid;
168*6db26757Swiz 
169*6db26757Swiz 	uid = proc_get_peer_uid(c->peer);
170*6db26757Swiz 	if (uid == (uid_t)-1)
171*6db26757Swiz 		return (0);
172*6db26757Swiz 
173*6db26757Swiz 	user = server_acl_user_find(uid);
174*6db26757Swiz 	if (user == NULL)
175*6db26757Swiz 		return (0);
176*6db26757Swiz 	if (user->flags & SERVER_ACL_READONLY)
177*6db26757Swiz 		c->flags |= CLIENT_READONLY;
178*6db26757Swiz 	return (1);
179*6db26757Swiz }
180*6db26757Swiz 
181*6db26757Swiz /* Get UID for user entry. */
182*6db26757Swiz uid_t
server_acl_get_uid(struct server_acl_user * user)183*6db26757Swiz server_acl_get_uid(struct server_acl_user *user)
184*6db26757Swiz {
185*6db26757Swiz 	return (user->uid);
186*6db26757Swiz }
187