glib/gio/gvfs.c

498 lines
13 KiB
C
Raw Normal View History

/* GIO - GLib Input, Output and Streaming Library
2012-06-04 03:37:32 +02:00
*
* Copyright (C) 2006-2007 Red Hat, Inc.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General
2014-01-23 12:58:29 +01:00
* Public License along with this library; if not, see <http://www.gnu.org/licenses/>.
*
* Author: Alexander Larsson <alexl@redhat.com>
*/
#include "config.h"
#include <string.h>
#include "gvfs.h"
CVE-2012-3524: Hardening for being run in a setuid environment Some programs attempt to use libglib (or even libgio) when setuid. For a long time, GTK+ simply aborted if launched in this configuration, but we never had a real policy for GLib. I'm not sure whether we should advertise such support. However, given that there are real-world programs that do this currently, we can make them safer with not too much effort. Better to fix a problem caused by an interaction between two components in *both* places if possible. This patch adds a private function g_check_setuid() which is used to first ensure we don't run an external dbus-launch binary if DBUS_SESSION_BUS_ADDRESS isn't set. Second, we also ensure the local VFS is used in this case. The gdaemonvfs extension point will end up talking to the session bus which is typically undesirable in a setuid context. Implementing g_check_setuid() is interesting - whether or not we're running in a privilege-escalated path is operating system specific. Note that GTK+'s code to check euid versus uid worked historically on Unix, more modern systems have filesystem capabilities and SELinux domain transitions, neither of which are captured by the uid comparison. On Linux/glibc, the way this works is that the kernel sets an AT_SECURE flag in the ELF auxiliary vector, and glibc looks for it on startup. If found, then glibc sets a public-but-undocumented __libc_enable_secure variable which we can use. Unfortunately, while it *previously* worked to check this variable, a combination of newer binutils and RPM break it: http://www.openwall.com/lists/owl-dev/2012/08/14/1 So for now on Linux/glibc, we fall back to the historical Unix version until we get glibc fixed. On some BSD variants, there is a issetugid() function. On other Unix variants, we fall back to what GTK+ has been doing. Reported-By: Sebastian Krahmer <krahmer@suse.de> Signed-off-by: Colin Walters <walters@verbum.org>
2012-08-22 20:26:11 +02:00
#include "glib-private.h"
#include "glocalvfs.h"
2011-12-21 23:37:56 +01:00
#include "gresourcefile.h"
#include "giomodule-priv.h"
#include "glibintl.h"
/**
* SECTION:gvfs
2012-06-04 03:37:32 +02:00
* @short_description: Virtual File System
* @include: gio/gio.h
2012-06-04 03:37:32 +02:00
*
* Entry point for using GIO functionality.
*
2012-06-04 03:37:32 +02:00
*/
static GRWLock additional_schemes_lock;
typedef struct _GVfsPrivate {
GHashTable *additional_schemes;
char const **supported_schemes;
} GVfsPrivate;
typedef struct {
GVfsFileLookupFunc uri_func;
gpointer uri_data;
GDestroyNotify uri_destroy;
GVfsFileLookupFunc parse_name_func;
gpointer parse_name_data;
GDestroyNotify parse_name_destroy;
} GVfsURISchemeData;
G_DEFINE_TYPE_WITH_PRIVATE (GVfs, g_vfs, G_TYPE_OBJECT);
static void
g_vfs_dispose (GObject *object)
{
GVfs *vfs = G_VFS (object);
GVfsPrivate *priv = g_vfs_get_instance_private (vfs);
g_clear_pointer (&priv->additional_schemes, g_hash_table_destroy);
g_clear_pointer (&priv->supported_schemes, g_free);
G_OBJECT_CLASS (g_vfs_parent_class)->dispose (object);
}
static void
g_vfs_class_init (GVfsClass *klass)
{
GObjectClass *object_class = G_OBJECT_CLASS (klass);
object_class->dispose = g_vfs_dispose;
}
static GFile *
resource_parse_name (GVfs *vfs,
const char *parse_name,
gpointer user_data)
{
if (g_str_has_prefix (parse_name, "resource:"))
return _g_resource_file_new (parse_name);
return NULL;
}
static GFile *
resource_get_file_for_uri (GVfs *vfs,
const char *uri,
gpointer user_data)
{
return _g_resource_file_new (uri);
}
static void
g_vfs_uri_lookup_func_closure_free (gpointer data)
{
GVfsURISchemeData *closure = data;
if (closure->uri_destroy)
closure->uri_destroy (closure->uri_data);
if (closure->parse_name_destroy)
closure->parse_name_destroy (closure->parse_name_data);
g_free (closure);
}
static void
g_vfs_init (GVfs *vfs)
{
GVfsPrivate *priv = g_vfs_get_instance_private (vfs);
priv->additional_schemes =
g_hash_table_new_full (g_str_hash, g_str_equal,
g_free, g_vfs_uri_lookup_func_closure_free);
g_vfs_register_uri_scheme (vfs, "resource",
resource_get_file_for_uri, NULL, NULL,
resource_parse_name, NULL, NULL);
}
/**
* g_vfs_is_active:
* @vfs: a #GVfs.
2012-06-04 03:37:32 +02:00
*
* Checks if the VFS is active.
2012-06-04 03:37:32 +02:00
*
* Returns: %TRUE if construction of the @vfs was successful
* and it is now active.
*/
gboolean
g_vfs_is_active (GVfs *vfs)
{
GVfsClass *class;
g_return_val_if_fail (G_IS_VFS (vfs), FALSE);
class = G_VFS_GET_CLASS (vfs);
return (* class->is_active) (vfs);
}
/**
* g_vfs_get_file_for_path:
* @vfs: a #GVfs.
* @path: a string containing a VFS path.
2012-06-04 03:37:32 +02:00
*
* Gets a #GFile for @path.
2012-06-04 03:37:32 +02:00
*
* Returns: (transfer full): a #GFile.
* Free the returned object with g_object_unref().
2012-06-04 03:37:32 +02:00
*/
GFile *
g_vfs_get_file_for_path (GVfs *vfs,
2012-06-04 03:37:32 +02:00
const char *path)
{
GVfsClass *class;
2012-06-04 03:37:32 +02:00
g_return_val_if_fail (G_IS_VFS (vfs), NULL);
g_return_val_if_fail (path != NULL, NULL);
class = G_VFS_GET_CLASS (vfs);
return (* class->get_file_for_path) (vfs, path);
}
static GFile *
parse_name_internal (GVfs *vfs,
const char *parse_name)
{
GVfsPrivate *priv = g_vfs_get_instance_private (vfs);
GHashTableIter iter;
GVfsURISchemeData *closure;
GFile *ret = NULL;
g_rw_lock_reader_lock (&additional_schemes_lock);
g_hash_table_iter_init (&iter, priv->additional_schemes);
while (g_hash_table_iter_next (&iter, NULL, (gpointer *) &closure))
{
ret = closure->parse_name_func (vfs, parse_name,
closure->parse_name_data);
if (ret)
break;
}
g_rw_lock_reader_unlock (&additional_schemes_lock);
return ret;
}
static GFile *
get_file_for_uri_internal (GVfs *vfs,
const char *uri)
{
GVfsPrivate *priv = g_vfs_get_instance_private (vfs);
GFile *ret = NULL;
char *scheme;
GVfsURISchemeData *closure;
scheme = g_uri_parse_scheme (uri);
if (scheme == NULL)
return NULL;
g_rw_lock_reader_lock (&additional_schemes_lock);
closure = g_hash_table_lookup (priv->additional_schemes, scheme);
if (closure)
ret = closure->uri_func (vfs, uri, closure->uri_data);
g_rw_lock_reader_unlock (&additional_schemes_lock);
g_free (scheme);
return ret;
}
/**
* g_vfs_get_file_for_uri:
* @vfs: a#GVfs.
2012-06-04 03:37:32 +02:00
* @uri: a string containing a URI
*
* Gets a #GFile for @uri.
2012-06-04 03:37:32 +02:00
*
* This operation never fails, but the returned object
2012-06-04 03:37:32 +02:00
* might not support any I/O operation if the URI
* is malformed or if the URI scheme is not supported.
2012-06-04 03:37:32 +02:00
*
* Returns: (transfer full): a #GFile.
* Free the returned object with g_object_unref().
2012-06-04 03:37:32 +02:00
*/
GFile *
g_vfs_get_file_for_uri (GVfs *vfs,
2012-06-04 03:37:32 +02:00
const char *uri)
{
GVfsClass *class;
GFile *ret;
2012-06-04 03:37:32 +02:00
g_return_val_if_fail (G_IS_VFS (vfs), NULL);
g_return_val_if_fail (uri != NULL, NULL);
class = G_VFS_GET_CLASS (vfs);
ret = get_file_for_uri_internal (vfs, uri);
if (ret)
return ret;
2011-12-21 23:37:56 +01:00
return (* class->get_file_for_uri) (vfs, uri);
}
/**
* g_vfs_get_supported_uri_schemes:
* @vfs: a #GVfs.
2012-06-04 03:37:32 +02:00
*
* Gets a list of URI schemes supported by @vfs.
2012-06-04 03:37:32 +02:00
*
2010-09-24 23:24:41 +02:00
* Returns: (transfer none): a %NULL-terminated array of strings.
2012-06-04 03:37:32 +02:00
* The returned array belongs to GIO and must
* not be freed or modified.
2012-06-04 03:37:32 +02:00
*/
const gchar * const *
g_vfs_get_supported_uri_schemes (GVfs *vfs)
{
GVfsPrivate *priv;
2012-06-04 03:37:32 +02:00
g_return_val_if_fail (G_IS_VFS (vfs), NULL);
priv = g_vfs_get_instance_private (vfs);
if (!priv->supported_schemes)
{
GVfsClass *class;
const char * const *default_schemes;
const char *additional_scheme;
GPtrArray *supported_schemes;
GHashTableIter iter;
int idx;
class = G_VFS_GET_CLASS (vfs);
default_schemes = (* class->get_supported_uri_schemes) (vfs);
supported_schemes = g_ptr_array_new ();
for (idx = 0; idx < G_N_ELEMENTS (default_schemes); idx++)
g_ptr_array_add (supported_schemes, (gpointer) default_schemes[idx]);
g_rw_lock_reader_lock (&additional_schemes_lock);
g_hash_table_iter_init (&iter, priv->additional_schemes);
while (g_hash_table_iter_next
(&iter, (gpointer *) &additional_scheme, NULL))
g_ptr_array_add (supported_schemes, (gpointer) additional_scheme);
g_rw_lock_reader_unlock (&additional_schemes_lock);
g_ptr_array_add (supported_schemes, NULL);
g_free (priv->supported_schemes);
priv->supported_schemes =
(char const **) g_ptr_array_free (supported_schemes, FALSE);
}
return priv->supported_schemes;
}
/**
* g_vfs_parse_name:
* @vfs: a #GVfs.
* @parse_name: a string to be parsed by the VFS module.
2012-06-04 03:37:32 +02:00
*
* This operation never fails, but the returned object might
* not support any I/O operations if the @parse_name cannot
* be parsed by the #GVfs module.
2012-06-04 03:37:32 +02:00
*
2010-09-24 23:24:41 +02:00
* Returns: (transfer full): a #GFile for the given @parse_name.
* Free the returned object with g_object_unref().
2012-06-04 03:37:32 +02:00
*/
GFile *
g_vfs_parse_name (GVfs *vfs,
2012-06-04 03:37:32 +02:00
const char *parse_name)
{
GVfsClass *class;
GFile *ret;
2012-06-04 03:37:32 +02:00
g_return_val_if_fail (G_IS_VFS (vfs), NULL);
g_return_val_if_fail (parse_name != NULL, NULL);
class = G_VFS_GET_CLASS (vfs);
ret = parse_name_internal (vfs, parse_name);
if (ret)
return ret;
2011-12-21 23:37:56 +01:00
return (* class->parse_name) (vfs, parse_name);
}
/**
* g_vfs_get_default:
2012-06-04 03:37:32 +02:00
*
* Gets the default #GVfs for the system.
2012-06-04 03:37:32 +02:00
*
* Returns: (transfer none): a #GVfs.
*/
GVfs *
g_vfs_get_default (void)
{
CVE-2012-3524: Hardening for being run in a setuid environment Some programs attempt to use libglib (or even libgio) when setuid. For a long time, GTK+ simply aborted if launched in this configuration, but we never had a real policy for GLib. I'm not sure whether we should advertise such support. However, given that there are real-world programs that do this currently, we can make them safer with not too much effort. Better to fix a problem caused by an interaction between two components in *both* places if possible. This patch adds a private function g_check_setuid() which is used to first ensure we don't run an external dbus-launch binary if DBUS_SESSION_BUS_ADDRESS isn't set. Second, we also ensure the local VFS is used in this case. The gdaemonvfs extension point will end up talking to the session bus which is typically undesirable in a setuid context. Implementing g_check_setuid() is interesting - whether or not we're running in a privilege-escalated path is operating system specific. Note that GTK+'s code to check euid versus uid worked historically on Unix, more modern systems have filesystem capabilities and SELinux domain transitions, neither of which are captured by the uid comparison. On Linux/glibc, the way this works is that the kernel sets an AT_SECURE flag in the ELF auxiliary vector, and glibc looks for it on startup. If found, then glibc sets a public-but-undocumented __libc_enable_secure variable which we can use. Unfortunately, while it *previously* worked to check this variable, a combination of newer binutils and RPM break it: http://www.openwall.com/lists/owl-dev/2012/08/14/1 So for now on Linux/glibc, we fall back to the historical Unix version until we get glibc fixed. On some BSD variants, there is a issetugid() function. On other Unix variants, we fall back to what GTK+ has been doing. Reported-By: Sebastian Krahmer <krahmer@suse.de> Signed-off-by: Colin Walters <walters@verbum.org>
2012-08-22 20:26:11 +02:00
if (GLIB_PRIVATE_CALL (g_check_setuid) ())
return g_vfs_get_local ();
return _g_io_module_get_default (G_VFS_EXTENSION_POINT_NAME,
2012-06-04 03:37:32 +02:00
"GIO_USE_VFS",
(GIOModuleVerifyFunc)g_vfs_is_active);
}
/**
* g_vfs_get_local:
2012-06-04 03:37:32 +02:00
*
* Gets the local #GVfs for the system.
2012-06-04 03:37:32 +02:00
*
2010-09-24 23:24:41 +02:00
* Returns: (transfer none): a #GVfs.
2012-06-04 03:37:32 +02:00
*/
GVfs *
g_vfs_get_local (void)
{
static gsize vfs = 0;
if (g_once_init_enter (&vfs))
g_once_init_leave (&vfs, (gsize)_g_local_vfs_new ());
return G_VFS (vfs);
}
/**
* g_vfs_register_uri_scheme:
* @vfs: a #GVfs
* @scheme: an URI scheme, e.g. "http"
* @uri_func: (scope notified) (nullable): a #GVfsFileLookupFunc
* @uri_data: (nullable): custom data passed to be passed to @uri_func, or %NULL
* @uri_destroy: (nullable): function to be called when unregistering the
* URI scheme, or when @vfs is disposed, to free the resources used
* by the URI lookup function
* @parse_name_func: (scope notified) (nullable): a #GVfsFileLookupFunc
* @parse_name_data: (nullable): custom data passed to be passed to
* @parse_name_func, or %NULL
* @parse_name_destroy: (nullable): function to be called when unregistering the
* URI scheme, or when @vfs is disposed, to free the resources used
* by the parse name lookup function
*
* Registers @uri_func and @parse_name_func as the #GFile URI and parse name
* lookup functions for URIs with a scheme matching @scheme.
* Note that @scheme is registered only within the running application, as
* opposed to desktop-wide as it happens with GVfs backends.
*
* When a #GFile is requested with an URI containing @scheme (e.g. through
* g_file_new_for_uri()), @uri_func will be called to allow a custom
* constructor. The implementation of @uri_func should not be blocking, and
* must not call g_vfs_register_uri_scheme() or g_vfs_unregister_uri_scheme().
*
* When g_file_parse_name() is called with a parse name obtained from such file,
* @parse_name_func will be called to allow the #GFile to be created again. In
* that case, it's responsibility of @parse_name_func to make sure the parse
* name matches what the custom #GFile implementation returned when
* g_file_get_parse_name() was previously called. The implementation of
* @parse_name_func should not be blocking, and must not call
* g_vfs_register_uri_scheme() or g_vfs_unregister_uri_scheme().
*
* It's an error to call this function twice with the same scheme. To unregister
* a custom URI scheme, use g_vfs_unregister_uri_scheme().
*
* Returns: %TRUE if @scheme was successfully registered, or %FALSE if a handler
* for @scheme already exists.
*
* Since: 2.50
*/
gboolean
g_vfs_register_uri_scheme (GVfs *vfs,
const char *scheme,
GVfsFileLookupFunc uri_func,
gpointer uri_data,
GDestroyNotify uri_destroy,
GVfsFileLookupFunc parse_name_func,
gpointer parse_name_data,
GDestroyNotify parse_name_destroy)
{
GVfsPrivate *priv;
GVfsURISchemeData *closure;
g_return_val_if_fail (G_IS_VFS (vfs), FALSE);
g_return_val_if_fail (scheme != NULL, FALSE);
priv = g_vfs_get_instance_private (vfs);
g_rw_lock_reader_lock (&additional_schemes_lock);
closure = g_hash_table_lookup (priv->additional_schemes, scheme);
g_rw_lock_reader_unlock (&additional_schemes_lock);
if (closure != NULL)
return FALSE;
closure = g_new0 (GVfsURISchemeData, 1);
closure->uri_func = uri_func;
closure->uri_data = uri_data;
closure->uri_destroy = uri_destroy;
closure->parse_name_func = parse_name_func;
closure->parse_name_data = parse_name_data;
closure->parse_name_destroy = parse_name_destroy;
g_rw_lock_writer_lock (&additional_schemes_lock);
g_hash_table_insert (priv->additional_schemes, g_strdup (scheme), closure);
g_rw_lock_writer_unlock (&additional_schemes_lock);
/* Invalidate supported schemes */
g_clear_pointer (&priv->supported_schemes, g_free);
return TRUE;
}
/**
* g_vfs_unregister_uri_scheme:
* @vfs: a #GVfs
* @scheme: an URI scheme, e.g. "http"
*
* Unregisters the URI handler for @scheme previously registered with
* g_vfs_register_uri_scheme().
*
* Returns: %TRUE if @scheme was successfully unregistered, or %FALSE if a
* handler for @scheme does not exist.
*
* Since: 2.50
*/
gboolean
g_vfs_unregister_uri_scheme (GVfs *vfs,
const char *scheme)
{
GVfsPrivate *priv;
gboolean res;
g_return_val_if_fail (G_IS_VFS (vfs), FALSE);
g_return_val_if_fail (scheme != NULL, FALSE);
priv = g_vfs_get_instance_private (vfs);
g_rw_lock_writer_lock (&additional_schemes_lock);
res = g_hash_table_remove (priv->additional_schemes, scheme);
g_rw_lock_writer_unlock (&additional_schemes_lock);
if (res)
{
/* Invalidate supported schemes */
g_clear_pointer (&priv->supported_schemes, g_free);
return TRUE;
}
return FALSE;
}