/src/systemd/src/basic/user-util.h
Line | Count | Source (jump to first uncovered line) |
1 | | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
2 | | #pragma once |
3 | | |
4 | | #include <grp.h> |
5 | | #if ENABLE_GSHADOW |
6 | | # include <gshadow.h> |
7 | | #endif |
8 | | #include <pwd.h> |
9 | | #include <shadow.h> |
10 | | #include <stdbool.h> |
11 | | #include <stdint.h> |
12 | | #include <sys/types.h> |
13 | | #include <unistd.h> |
14 | | |
15 | | /* Users managed by systemd-homed. See https://systemd.io/UIDS-GIDS for details how this range fits into the rest of the world */ |
16 | | #define HOME_UID_MIN ((uid_t) 60001) |
17 | | #define HOME_UID_MAX ((uid_t) 60513) |
18 | | |
19 | | /* Users mapped from host into a container */ |
20 | | #define MAP_UID_MIN ((uid_t) 60514) |
21 | | #define MAP_UID_MAX ((uid_t) 60577) |
22 | | |
23 | | bool uid_is_valid(uid_t uid); |
24 | | |
25 | 0 | static inline bool gid_is_valid(gid_t gid) { |
26 | 0 | return uid_is_valid((uid_t) gid); |
27 | 0 | } |
28 | | |
29 | | int parse_uid(const char *s, uid_t* ret_uid); |
30 | | int parse_uid_range(const char *s, uid_t *ret_lower, uid_t *ret_upper); |
31 | | |
32 | 0 | static inline int parse_gid(const char *s, gid_t *ret_gid) { |
33 | 0 | return parse_uid(s, (uid_t*) ret_gid); |
34 | 0 | } |
35 | | |
36 | | char* getlogname_malloc(void); |
37 | | char* getusername_malloc(void); |
38 | | |
39 | | typedef enum UserCredsFlags { |
40 | | USER_CREDS_PREFER_NSS = 1 << 0, /* if set, only synthesize user records if database lacks them. Normally we bypass the userdb entirely for the records we can synthesize */ |
41 | | USER_CREDS_ALLOW_MISSING = 1 << 1, /* if a numeric UID string is resolved, be OK if there's no record for it */ |
42 | | USER_CREDS_CLEAN = 1 << 2, /* try to clean up shell and home fields with invalid data */ |
43 | | } UserCredsFlags; |
44 | | |
45 | | int get_user_creds(const char **username, uid_t *uid, gid_t *gid, const char **home, const char **shell, UserCredsFlags flags); |
46 | | int get_group_creds(const char **groupname, gid_t *gid, UserCredsFlags flags); |
47 | | |
48 | | char* uid_to_name(uid_t uid); |
49 | | char* gid_to_name(gid_t gid); |
50 | | |
51 | | int in_gid(gid_t gid); |
52 | | int in_group(const char *name); |
53 | | |
54 | | int merge_gid_lists(const gid_t *list1, size_t size1, const gid_t *list2, size_t size2, gid_t **result); |
55 | | int getgroups_alloc(gid_t** gids); |
56 | | |
57 | | int get_home_dir(char **ret); |
58 | | int get_shell(char **ret); |
59 | | |
60 | | int reset_uid_gid(void); |
61 | | |
62 | | int take_etc_passwd_lock(const char *root); |
63 | | |
64 | | #define UID_INVALID ((uid_t) -1) |
65 | | #define GID_INVALID ((gid_t) -1) |
66 | | |
67 | | #define UID_NOBODY ((uid_t) 65534U) |
68 | | #define GID_NOBODY ((gid_t) 65534U) |
69 | | |
70 | | /* If REMOUNT_IDMAPPING_HOST_ROOT is set for remount_idmap() we'll include a mapping here that maps the host |
71 | | * root user accessing the idmapped mount to the this user ID on the backing fs. This is the last valid UID in |
72 | | * the *signed* 32bit range. You might wonder why precisely use this specific UID for this purpose? Well, we |
73 | | * definitely cannot use the first 0…65536 UIDs for that, since in most cases that's precisely the file range |
74 | | * we intend to map to some high UID range, and since UID mappings have to be bijective we thus cannot use |
75 | | * them at all. Furthermore the UID range beyond INT32_MAX (i.e. the range above the signed 32bit range) is |
76 | | * icky, since many APIs cannot use it (example: setfsuid() returns the old UID as signed integer). Following |
77 | | * our usual logic of assigning a 16bit UID range to each container, so that the upper 16bit of a 32bit UID |
78 | | * value indicate kind of a "container ID" and the lower 16bit map directly to the intended user you can read |
79 | | * this specific UID as the "nobody" user of the container with ID 0x7FFF, which is kinda nice. */ |
80 | | #define UID_MAPPED_ROOT ((uid_t) (INT32_MAX-1)) |
81 | | #define GID_MAPPED_ROOT ((gid_t) (INT32_MAX-1)) |
82 | | |
83 | | #define ETC_PASSWD_LOCK_PATH "/etc/.pwd.lock" |
84 | | |
85 | | /* The following macros add 1 when converting things, since UID 0 is a valid UID, while the pointer |
86 | | * NULL is special */ |
87 | | #define PTR_TO_UID(p) ((uid_t) (((uintptr_t) (p))-1)) |
88 | | #define UID_TO_PTR(u) ((void*) (((uintptr_t) (u))+1)) |
89 | | |
90 | | #define PTR_TO_GID(p) ((gid_t) (((uintptr_t) (p))-1)) |
91 | | #define GID_TO_PTR(u) ((void*) (((uintptr_t) (u))+1)) |
92 | | |
93 | 0 | static inline bool userns_supported(void) { |
94 | 0 | return access("/proc/self/uid_map", F_OK) >= 0; |
95 | 0 | } |
96 | | |
97 | | typedef enum ValidUserFlags { |
98 | | VALID_USER_RELAX = 1 << 0, |
99 | | VALID_USER_WARN = 1 << 1, |
100 | | VALID_USER_ALLOW_NUMERIC = 1 << 2, |
101 | | } ValidUserFlags; |
102 | | |
103 | | bool valid_user_group_name(const char *u, ValidUserFlags flags); |
104 | | bool valid_gecos(const char *d); |
105 | | char *mangle_gecos(const char *d); |
106 | | bool valid_home(const char *p); |
107 | | |
108 | 0 | static inline bool valid_shell(const char *p) { |
109 | 0 | /* We have the same requirements, so just piggy-back on the home check. |
110 | 0 | * |
111 | 0 | * Let's ignore /etc/shells because this is only applicable to real and |
112 | 0 | * not system users. It is also incompatible with the idea of empty /etc. |
113 | 0 | */ |
114 | 0 | return valid_home(p); |
115 | 0 | } |
116 | | |
117 | | int maybe_setgroups(size_t size, const gid_t *list); |
118 | | |
119 | | bool synthesize_nobody(void); |
120 | | |
121 | | int fgetpwent_sane(FILE *stream, struct passwd **pw); |
122 | | int fgetspent_sane(FILE *stream, struct spwd **sp); |
123 | | int fgetgrent_sane(FILE *stream, struct group **gr); |
124 | | int putpwent_sane(const struct passwd *pw, FILE *stream); |
125 | | int putspent_sane(const struct spwd *sp, FILE *stream); |
126 | | int putgrent_sane(const struct group *gr, FILE *stream); |
127 | | #if ENABLE_GSHADOW |
128 | | int fgetsgent_sane(FILE *stream, struct sgrp **sg); |
129 | | int putsgent_sane(const struct sgrp *sg, FILE *stream); |
130 | | #endif |
131 | | |
132 | | bool is_nologin_shell(const char *shell); |
133 | | const char* default_root_shell(const char *root); |
134 | | |
135 | | int is_this_me(const char *username); |
136 | | |
137 | | const char *get_home_root(void); |
138 | | |
139 | 0 | static inline bool hashed_password_is_locked_or_invalid(const char *password) { |
140 | 0 | return password && password[0] != '$'; |
141 | 0 | } |
142 | | |
143 | | /* A locked *and* invalid password for "struct spwd"'s .sp_pwdp and "struct passwd"'s .pw_passwd field */ |
144 | | #define PASSWORD_LOCKED_AND_INVALID "!*" |
145 | | |
146 | | /* A password indicating "look in shadow file, please!" for "struct passwd"'s .pw_passwd */ |
147 | | #define PASSWORD_SEE_SHADOW "x" |
148 | | |
149 | | /* A password indicating "hey, no password required for login" */ |
150 | | #define PASSWORD_NONE "" |