X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=src%2Ftty-ask-password-agent.c;h=1d17e2289ec7a185342019b81aa7cd24948283a5;hp=5b429398c091a008a6306ede14120c55f42ea8fb;hb=7af53310dd9154ba76be7808292d9a046b849e43;hpb=0ddf1d3aa5e96b752ad62be48f99d7850a3d8542 diff --git a/src/tty-ask-password-agent.c b/src/tty-ask-password-agent.c index 5b429398c..1d17e2289 100644 --- a/src/tty-ask-password-agent.c +++ b/src/tty-ask-password-agent.c @@ -29,11 +29,14 @@ #include #include #include +#include +#include #include "util.h" #include "conf-parser.h" #include "utmp-wtmp.h" #include "socket-util.h" +#include "ask-password-api.h" static enum { ACTION_LIST, @@ -211,6 +214,7 @@ static int parse_password(const char *filename, char **wall) { { "NotAfter", config_parse_uint64, ¬_after, "Ask" }, { "Message", config_parse_string, &message, "Ask" }, { "PID", config_parse_unsigned, &pid, "Ask" }, + { NULL, NULL, NULL, NULL } }; FILE *f; @@ -228,7 +232,7 @@ static int parse_password(const char *filename, char **wall) { return -errno; } - if ((r = config_parse(filename, f, NULL, items, false, NULL)) < 0) { + if ((r = config_parse(filename, f, NULL, items, true, NULL)) < 0) { log_error("Failed to parse password file %s: %s", filename, strerror(-r)); goto finish; } @@ -252,7 +256,7 @@ static int parse_password(const char *filename, char **wall) { if (asprintf(&_wall, "%s%sPassword entry required for \'%s\' (PID %u).\r\n" - "Please enter password with the systemd-tty-password-agent tool!", + "Please enter password with the systemd-tty-ask-password-agent tool!", *wall ? *wall : "", *wall ? "\r\n\r\n" : "", message, @@ -332,6 +336,55 @@ finish: return r; } +static int tty_block(void) { + char *p; + const char *t; + int fd; + + if (!(t = ttyname(STDIN_FILENO))) + return -errno; + + if (asprintf(&p, "/dev/.systemd/ask-password-block/%s", file_name_from_path(t)) < 0) + return -ENOMEM; + + mkdir_parents(p, 0700); + mkfifo(p, 0600); + + fd = open(p, O_RDONLY|O_CLOEXEC|O_NONBLOCK|O_NOCTTY); + free(p); + + if (fd < 0) + return -errno; + + return fd; +} + +static bool tty_match(const char *path) { + int fd; + char *p; + + /* We use named pipes to ensure that wall messages suggesting + * password entry are not printed over password prompts + * already shown. We use the fact here that opening a pipe in + * non-blocking mode for write-only will succeed only if + * there's some writer behind it. Using pipes has the + * advantage that the block will automatically go away if the + * process dies. */ + + if (asprintf(&p, "/dev/.systemd/ask-password-block/%s", file_name_from_path(path)) < 0) + return true; + + fd = open(p, O_WRONLY|O_CLOEXEC|O_NONBLOCK|O_NOCTTY); + free(p); + + if (fd < 0) + return true; + + /* What, we managed to open the pipe? Then this tty is filtered. */ + close_nointr_nofail(fd); + return false; +} + static int show_passwords(void) { DIR *d; struct dirent *de; @@ -372,7 +425,7 @@ static int show_passwords(void) { free(p); if (wall) { - utmp_wall(wall); + utmp_wall(wall, tty_match); free(wall); } } @@ -385,10 +438,19 @@ finish: } static int watch_passwords(void) { - int notify; - struct pollfd pollfd; + enum { + FD_INOTIFY, + FD_SIGNAL, + _FD_MAX + }; + + int notify = -1, signal_fd = -1, tty_block_fd = -1; + struct pollfd pollfd[_FD_MAX]; + sigset_t mask; int r; + tty_block_fd = tty_block(); + mkdir_p("/dev/.systemd/ask-password", 0755); if ((notify = inotify_init1(IN_CLOEXEC)) < 0) { @@ -401,15 +463,27 @@ static int watch_passwords(void) { goto finish; } + assert_se(sigemptyset(&mask) == 0); + sigset_add_many(&mask, SIGINT, SIGTERM, -1); + assert_se(sigprocmask(SIG_SETMASK, &mask, NULL) == 0); + + if ((signal_fd = signalfd(-1, &mask, SFD_NONBLOCK|SFD_CLOEXEC)) < 0) { + log_error("signalfd(): %m"); + r = -errno; + goto finish; + } + zero(pollfd); - pollfd.fd = notify; - pollfd.events = POLLIN; + pollfd[FD_INOTIFY].fd = notify; + pollfd[FD_INOTIFY].events = POLLIN; + pollfd[FD_SIGNAL].fd = signal_fd; + pollfd[FD_SIGNAL].events = POLLIN; for (;;) { if ((r = show_passwords()) < 0) break; - if (poll(&pollfd, 1, -1) < 0) { + if (poll(pollfd, _FD_MAX, -1) < 0) { if (errno == EINTR) continue; @@ -418,8 +492,11 @@ static int watch_passwords(void) { goto finish; } - if (pollfd.revents != 0) + if (pollfd[FD_INOTIFY].revents != 0) flush_fd(notify); + + if (pollfd[FD_SIGNAL].revents != 0) + break; } r = 0; @@ -428,6 +505,12 @@ finish: if (notify >= 0) close_nointr_nofail(notify); + if (signal_fd >= 0) + close_nointr_nofail(signal_fd); + + if (tty_block_fd >= 0) + close_nointr_nofail(tty_block_fd); + return r; }