qubes-core-admin-linux/dom0-updates/qfile-dom0-unpacker.c
Marek Marczykowski-Górecki aa0fda1984 Fix -Wextra warnings
2014-02-16 10:29:06 +01:00

83 lines
1.7 KiB
C

#define _GNU_SOURCE
#include <grp.h>
#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>
#include <pwd.h>
#include <sys/stat.h>
#include <string.h>
#include <unistd.h>
#include <sys/fsuid.h>
#include <errno.h>
#include <libqubes-rpc-filecopy.h>
#define DEFAULT_MAX_UPDATES_BYTES (2LL<<30)
#define DEFAULT_MAX_UPDATES_FILES 2048
int prepare_creds_return_uid(const char *username)
{
struct passwd *pwd;
// First try name
pwd = getpwnam(username);
if (!pwd) {
// Then try UID
pwd = getpwuid(atoi(username));
if (!pwd) {
perror("getpwuid");
exit(1);
}
}
setenv("HOME", pwd->pw_dir, 1);
setenv("USER", pwd->pw_name, 1);
if (setgid(pwd->pw_gid) < 0) {
perror("setgid");
exit(1);
}
initgroups(pwd->pw_name, pwd->pw_gid);
if (setfsuid(pwd->pw_uid) < 0) {
perror("setfsuid");
exit(1);
}
return pwd->pw_uid;
}
int main(int argc, char ** argv)
{
const char *incoming_dir;
int uid;
char *var;
long long files_limit = DEFAULT_MAX_UPDATES_FILES;
long long bytes_limit = DEFAULT_MAX_UPDATES_BYTES;
if (argc < 3) {
fprintf(stderr, "Invalid parameters, usage: %s user dir [-v]\n", argv[0]);
exit(1);
}
if ((var=getenv("UPDATES_MAX_BYTES")))
bytes_limit = atoll(var);
if ((var=getenv("UPDATES_MAX_FILES")))
files_limit = atoll(var);
uid = prepare_creds_return_uid(argv[1]);
incoming_dir = argv[2];
mkdir(incoming_dir, 0700);
if (chdir(incoming_dir)) {
fprintf(stderr, "Error chdir to %s\n", incoming_dir);
exit(1);
}
if (chroot(incoming_dir)) {//impossible
fprintf(stderr, "Error chroot to %s\n", incoming_dir);
exit(1);
}
if (setuid(uid) < 0) {
perror("setuid");
exit(1);
}
set_size_limit(bytes_limit, files_limit);
if (argc > 3 && strcmp(argv[3],"-v")==0)
set_verbose(1);
return do_unpack();
}