mirror of
https://github.com/morgan9e/systemd
synced 2026-04-14 00:14:32 +09:00
In multi-seat scenarios, a display manager might need to start multiple greeter sessions. But systemd allows at most one graphical session per user. So, display managers now have a range of UIDs to dynamically allocate users for their greeter sessions.
2917 lines
135 KiB
C
2917 lines
135 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include "alloc-util.h"
|
|
#include "bitfield.h"
|
|
#include "cap-list.h"
|
|
#include "cgroup-util.h"
|
|
#include "dns-domain.h"
|
|
#include "glyph-util.h"
|
|
#include "hashmap.h"
|
|
#include "hostname-setup.h"
|
|
#include "json-util.h"
|
|
#include "locale-util.h"
|
|
#include "log.h"
|
|
#include "memory-util.h"
|
|
#include "path-util.h"
|
|
#include "percent-util.h"
|
|
#include "pkcs11-util.h"
|
|
#include "rlimit-util.h"
|
|
#include "sha256.h"
|
|
#include "string-table.h"
|
|
#include "string-util.h"
|
|
#include "strv.h"
|
|
#include "time-util.h"
|
|
#include "uid-classification.h"
|
|
#include "user-record.h"
|
|
#include "user-util.h"
|
|
|
|
#define DEFAULT_RATELIMIT_BURST 30
|
|
#define DEFAULT_RATELIMIT_INTERVAL_USEC (1*USEC_PER_MINUTE)
|
|
|
|
UserRecord* user_record_new(void) {
|
|
UserRecord *h;
|
|
|
|
h = new(UserRecord, 1);
|
|
if (!h)
|
|
return NULL;
|
|
|
|
*h = (UserRecord) {
|
|
.n_ref = 1,
|
|
.disposition = _USER_DISPOSITION_INVALID,
|
|
.last_change_usec = UINT64_MAX,
|
|
.last_password_change_usec = UINT64_MAX,
|
|
.umask = MODE_INVALID,
|
|
.nice_level = INT_MAX,
|
|
.not_before_usec = UINT64_MAX,
|
|
.not_after_usec = UINT64_MAX,
|
|
.locked = -1,
|
|
.storage = _USER_STORAGE_INVALID,
|
|
.access_mode = MODE_INVALID,
|
|
.disk_size = UINT64_MAX,
|
|
.disk_size_relative = UINT64_MAX,
|
|
.tasks_max = UINT64_MAX,
|
|
.memory_high = UINT64_MAX,
|
|
.memory_max = UINT64_MAX,
|
|
.cpu_weight = UINT64_MAX,
|
|
.io_weight = UINT64_MAX,
|
|
.uid = UID_INVALID,
|
|
.gid = GID_INVALID,
|
|
.nodev = true,
|
|
.nosuid = true,
|
|
.luks_discard = -1,
|
|
.luks_offline_discard = -1,
|
|
.luks_volume_key_size = UINT64_MAX,
|
|
.luks_pbkdf_force_iterations = UINT64_MAX,
|
|
.luks_pbkdf_time_cost_usec = UINT64_MAX,
|
|
.luks_pbkdf_memory_cost = UINT64_MAX,
|
|
.luks_pbkdf_parallel_threads = UINT64_MAX,
|
|
.luks_sector_size = UINT64_MAX,
|
|
.disk_usage = UINT64_MAX,
|
|
.disk_free = UINT64_MAX,
|
|
.disk_ceiling = UINT64_MAX,
|
|
.disk_floor = UINT64_MAX,
|
|
.signed_locally = -1,
|
|
.good_authentication_counter = UINT64_MAX,
|
|
.bad_authentication_counter = UINT64_MAX,
|
|
.last_good_authentication_usec = UINT64_MAX,
|
|
.last_bad_authentication_usec = UINT64_MAX,
|
|
.ratelimit_begin_usec = UINT64_MAX,
|
|
.ratelimit_count = UINT64_MAX,
|
|
.ratelimit_interval_usec = UINT64_MAX,
|
|
.ratelimit_burst = UINT64_MAX,
|
|
.removable = -1,
|
|
.enforce_password_policy = -1,
|
|
.auto_login = -1,
|
|
.stop_delay_usec = UINT64_MAX,
|
|
.kill_processes = -1,
|
|
.password_change_min_usec = UINT64_MAX,
|
|
.password_change_max_usec = UINT64_MAX,
|
|
.password_change_warn_usec = UINT64_MAX,
|
|
.password_change_inactive_usec = UINT64_MAX,
|
|
.password_change_now = -1,
|
|
.pkcs11_protected_authentication_path_permitted = -1,
|
|
.fido2_user_presence_permitted = -1,
|
|
.fido2_user_verification_permitted = -1,
|
|
.drop_caches = -1,
|
|
.auto_resize_mode = _AUTO_RESIZE_MODE_INVALID,
|
|
.rebalance_weight = REBALANCE_WEIGHT_UNSET,
|
|
.tmp_limit = TMPFS_LIMIT_NULL,
|
|
.dev_shm_limit = TMPFS_LIMIT_NULL,
|
|
};
|
|
|
|
return h;
|
|
}
|
|
|
|
sd_json_dispatch_flags_t USER_RECORD_LOAD_FLAGS_TO_JSON_DISPATCH_FLAGS(UserRecordLoadFlags flags) {
|
|
return (FLAGS_SET(flags, USER_RECORD_LOG) ? SD_JSON_LOG : 0) |
|
|
(FLAGS_SET(flags, USER_RECORD_PERMISSIVE) ? SD_JSON_PERMISSIVE : 0);
|
|
}
|
|
|
|
static void pkcs11_encrypted_key_done(Pkcs11EncryptedKey *k) {
|
|
if (!k)
|
|
return;
|
|
|
|
free(k->uri);
|
|
erase_and_free(k->data);
|
|
erase_and_free(k->hashed_password);
|
|
}
|
|
|
|
static void fido2_hmac_credential_done(Fido2HmacCredential *c) {
|
|
if (!c)
|
|
return;
|
|
|
|
free(c->id);
|
|
}
|
|
|
|
static void fido2_hmac_salt_done(Fido2HmacSalt *s) {
|
|
if (!s)
|
|
return;
|
|
|
|
fido2_hmac_credential_done(&s->credential);
|
|
erase_and_free(s->salt);
|
|
erase_and_free(s->hashed_password);
|
|
}
|
|
|
|
static void recovery_key_done(RecoveryKey *k) {
|
|
if (!k)
|
|
return;
|
|
|
|
free(k->type);
|
|
erase_and_free(k->hashed_password);
|
|
}
|
|
|
|
static UserRecord* user_record_free(UserRecord *h) {
|
|
if (!h)
|
|
return NULL;
|
|
|
|
free(h->user_name);
|
|
free(h->realm);
|
|
free(h->user_name_and_realm_auto);
|
|
strv_free(h->aliases);
|
|
free(h->real_name);
|
|
free(h->email_address);
|
|
erase_and_free(h->password_hint);
|
|
free(h->location);
|
|
free(h->icon_name);
|
|
|
|
free(h->blob_directory);
|
|
hashmap_free(h->blob_manifest);
|
|
|
|
free(h->shell);
|
|
|
|
strv_free(h->environment);
|
|
free(h->time_zone);
|
|
free(h->preferred_language);
|
|
strv_free(h->additional_languages);
|
|
rlimit_free_all(h->rlimits);
|
|
|
|
free(h->skeleton_directory);
|
|
|
|
strv_free_erase(h->hashed_password);
|
|
strv_free_erase(h->ssh_authorized_keys);
|
|
strv_free_erase(h->password);
|
|
strv_free_erase(h->token_pin);
|
|
|
|
free(h->cifs_service);
|
|
free(h->cifs_user_name);
|
|
free(h->cifs_domain);
|
|
free(h->cifs_extra_mount_options);
|
|
|
|
free(h->image_path);
|
|
free(h->image_path_auto);
|
|
free(h->home_directory);
|
|
free(h->home_directory_auto);
|
|
|
|
free(h->fallback_shell);
|
|
free(h->fallback_home_directory);
|
|
|
|
strv_free(h->member_of);
|
|
strv_free(h->capability_bounding_set);
|
|
strv_free(h->capability_ambient_set);
|
|
|
|
free(h->file_system_type);
|
|
free(h->luks_cipher);
|
|
free(h->luks_cipher_mode);
|
|
free(h->luks_pbkdf_hash_algorithm);
|
|
free(h->luks_pbkdf_type);
|
|
free(h->luks_extra_mount_options);
|
|
|
|
free(h->state);
|
|
free(h->service);
|
|
|
|
free(h->preferred_session_type);
|
|
free(h->preferred_session_launcher);
|
|
|
|
strv_free(h->pkcs11_token_uri);
|
|
for (size_t i = 0; i < h->n_pkcs11_encrypted_key; i++)
|
|
pkcs11_encrypted_key_done(h->pkcs11_encrypted_key + i);
|
|
free(h->pkcs11_encrypted_key);
|
|
|
|
for (size_t i = 0; i < h->n_fido2_hmac_credential; i++)
|
|
fido2_hmac_credential_done(h->fido2_hmac_credential + i);
|
|
for (size_t i = 0; i < h->n_fido2_hmac_salt; i++)
|
|
fido2_hmac_salt_done(h->fido2_hmac_salt + i);
|
|
|
|
strv_free(h->recovery_key_type);
|
|
for (size_t i = 0; i < h->n_recovery_key; i++)
|
|
recovery_key_done(h->recovery_key + i);
|
|
|
|
strv_free(h->self_modifiable_fields);
|
|
strv_free(h->self_modifiable_blobs);
|
|
strv_free(h->self_modifiable_privileged);
|
|
|
|
free(h->default_area);
|
|
|
|
sd_json_variant_unref(h->json);
|
|
|
|
return mfree(h);
|
|
}
|
|
|
|
DEFINE_TRIVIAL_REF_UNREF_FUNC(UserRecord, user_record, user_record_free);
|
|
|
|
int json_dispatch_realm(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char **s = userdata;
|
|
const char *n;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*s = mfree(*s);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
n = sd_json_variant_string(variant);
|
|
r = dns_name_is_valid(n);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to check if JSON field '%s' is a valid DNS domain.", strna(name));
|
|
if (r == 0)
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid DNS domain.", strna(name));
|
|
|
|
r = free_and_strdup(s, n);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to allocate string: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
int json_dispatch_gecos(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char **s = userdata;
|
|
const char *n;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*s = mfree(*s);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
n = sd_json_variant_string(variant);
|
|
if (valid_gecos(n)) {
|
|
if (free_and_strdup(s, n) < 0)
|
|
return json_log_oom(variant, flags);
|
|
} else {
|
|
_cleanup_free_ char *m = NULL;
|
|
|
|
json_log(variant, flags|SD_JSON_DEBUG, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid GECOS compatible string, mangling.", strna(name));
|
|
|
|
m = mangle_gecos(n);
|
|
if (!m)
|
|
return json_log_oom(variant, flags);
|
|
|
|
free_and_replace(*s, m);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_nice(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
int *nl = userdata;
|
|
int64_t m;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*nl = INT_MAX;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_integer(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
m = sd_json_variant_integer(variant);
|
|
if (m < PRIO_MIN || m >= PRIO_MAX)
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(ERANGE), "JSON field '%s' is not a valid nice level.", strna(name));
|
|
|
|
*nl = m;
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_rlimit_value(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
rlim_t *ret = userdata;
|
|
|
|
if (sd_json_variant_is_null(variant))
|
|
*ret = RLIM_INFINITY;
|
|
else if (sd_json_variant_is_unsigned(variant)) {
|
|
uint64_t w;
|
|
|
|
w = sd_json_variant_unsigned(variant);
|
|
if (w == RLIM_INFINITY || (uint64_t) w != sd_json_variant_unsigned(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(ERANGE), "Resource limit value '%s' is out of range.", name);
|
|
|
|
*ret = (rlim_t) w;
|
|
} else
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "Resource limit value '%s' is not an unsigned integer.", name);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_rlimits(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
struct rlimit** limits = userdata;
|
|
sd_json_variant *value;
|
|
const char *key;
|
|
int r;
|
|
|
|
assert_se(limits);
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
rlimit_free_all(limits);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_object(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an object.", strna(name));
|
|
|
|
JSON_VARIANT_OBJECT_FOREACH(key, value, variant) {
|
|
sd_json_variant *jcur, *jmax;
|
|
struct rlimit rl;
|
|
const char *p;
|
|
int l;
|
|
|
|
p = startswith(key, "RLIMIT_");
|
|
if (!p)
|
|
l = -SYNTHETIC_ERRNO(EINVAL);
|
|
else
|
|
l = rlimit_from_string(p);
|
|
if (l < 0)
|
|
return json_log(variant, flags, l, "Resource limit '%s' not known.", key);
|
|
|
|
if (!sd_json_variant_is_object(value))
|
|
return json_log(value, flags, SYNTHETIC_ERRNO(EINVAL), "Resource limit '%s' has invalid value.", key);
|
|
|
|
if (sd_json_variant_elements(value) != 4)
|
|
return json_log(value, flags, SYNTHETIC_ERRNO(EINVAL), "Resource limit '%s' value is does not have two fields as expected.", key);
|
|
|
|
jcur = sd_json_variant_by_key(value, "cur");
|
|
if (!jcur)
|
|
return json_log(value, flags, SYNTHETIC_ERRNO(EINVAL), "Resource limit '%s' lacks 'cur' field.", key);
|
|
r = json_dispatch_rlimit_value("cur", jcur, flags, &rl.rlim_cur);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
jmax = sd_json_variant_by_key(value, "max");
|
|
if (!jmax)
|
|
return json_log(value, flags, SYNTHETIC_ERRNO(EINVAL), "Resource limit '%s' lacks 'max' field.", key);
|
|
r = json_dispatch_rlimit_value("max", jmax, flags, &rl.rlim_max);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (limits[l])
|
|
*(limits[l]) = rl;
|
|
else {
|
|
limits[l] = newdup(struct rlimit, &rl, 1);
|
|
if (!limits[l])
|
|
return log_oom();
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_filename_or_path(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char **s = ASSERT_PTR(userdata);
|
|
const char *n;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*s = mfree(*s);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
n = sd_json_variant_string(variant);
|
|
if (!filename_is_valid(n) && !path_is_normalized(n))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid file name or normalized path.", strna(name));
|
|
|
|
r = free_and_strdup(s, n);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to allocate string: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_home_directory(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char **s = userdata;
|
|
const char *n;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*s = mfree(*s);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
n = sd_json_variant_string(variant);
|
|
if (!valid_home(n))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid home directory path.", strna(name));
|
|
|
|
r = free_and_strdup(s, n);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to allocate string: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_image_path(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char **s = userdata;
|
|
const char *n;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*s = mfree(*s);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
n = sd_json_variant_string(variant);
|
|
if (empty_or_root(n) || !path_is_valid(n) || !path_is_absolute(n))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid image path.", strna(name));
|
|
|
|
r = free_and_strdup(s, n);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to allocate string: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_umask(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
mode_t *m = userdata;
|
|
uint64_t k;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*m = MODE_INVALID;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_unsigned(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a number.", strna(name));
|
|
|
|
k = sd_json_variant_unsigned(variant);
|
|
if (k > 0777)
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL),
|
|
"JSON field '%s' outside of valid range 0%s0777.",
|
|
strna(name), glyph(GLYPH_ELLIPSIS));
|
|
|
|
*m = (mode_t) k;
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_access_mode(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
mode_t *m = userdata;
|
|
uint64_t k;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*m = MODE_INVALID;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_unsigned(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a number.", strna(name));
|
|
|
|
k = sd_json_variant_unsigned(variant);
|
|
if (k > 07777)
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL),
|
|
"JSON field '%s' outside of valid range 0%s07777.",
|
|
strna(name), glyph(GLYPH_ELLIPSIS));
|
|
|
|
*m = (mode_t) k;
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_locale(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char **s = userdata;
|
|
const char *n;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*s = mfree(*s);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
n = sd_json_variant_string(variant);
|
|
|
|
if (!locale_is_valid(n))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid locale.", strna(name));
|
|
|
|
r = free_and_strdup(s, n);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to allocate string: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_locales(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
_cleanup_strv_free_ char **n = NULL;
|
|
char ***l = userdata;
|
|
const char *locale;
|
|
sd_json_variant *e;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*l = strv_free(*l);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of strings.", strna(name));
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
if (!sd_json_variant_is_string(e))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of strings.", strna(name));
|
|
|
|
locale = sd_json_variant_string(e);
|
|
if (!locale_is_valid(locale))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of valid locales.", strna(name));
|
|
|
|
r = strv_extend(&n, locale);
|
|
if (r < 0)
|
|
return json_log_oom(variant, flags);
|
|
}
|
|
|
|
return strv_free_and_replace(*l, n);
|
|
}
|
|
|
|
JSON_DISPATCH_ENUM_DEFINE(json_dispatch_user_disposition, UserDisposition, user_disposition_from_string);
|
|
static JSON_DISPATCH_ENUM_DEFINE(json_dispatch_user_storage, UserStorage, user_storage_from_string);
|
|
|
|
static int json_dispatch_tasks_or_memory_max(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
uint64_t *limit = userdata, k;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*limit = UINT64_MAX;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_unsigned(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an integer.", strna(name));
|
|
|
|
k = sd_json_variant_unsigned(variant);
|
|
if (k <= 0 || k >= UINT64_MAX)
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(ERANGE),
|
|
"JSON field '%s' is not in valid range %" PRIu64 "%s%" PRIu64 ".",
|
|
strna(name), (uint64_t) 1, glyph(GLYPH_ELLIPSIS), UINT64_MAX-1);
|
|
|
|
*limit = k;
|
|
return 0;
|
|
}
|
|
|
|
static int json_dispatch_weight(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
uint64_t *weight = userdata, k;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*weight = UINT64_MAX;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_unsigned(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an integer.", strna(name));
|
|
|
|
k = sd_json_variant_unsigned(variant);
|
|
if (k <= CGROUP_WEIGHT_MIN || k >= CGROUP_WEIGHT_MAX)
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(ERANGE),
|
|
"JSON field '%s' is not in valid range %" PRIu64 "%s%" PRIu64 ".",
|
|
strna(name), (uint64_t) CGROUP_WEIGHT_MIN,
|
|
glyph(GLYPH_ELLIPSIS), (uint64_t) CGROUP_WEIGHT_MAX);
|
|
|
|
*weight = k;
|
|
return 0;
|
|
}
|
|
|
|
int json_dispatch_user_group_list(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char ***list = ASSERT_PTR(userdata);
|
|
_cleanup_strv_free_ char **l = NULL;
|
|
int r;
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of strings.", strna(name));
|
|
|
|
sd_json_variant *e;
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
if (!sd_json_variant_is_string(e))
|
|
return json_log(e, flags, SYNTHETIC_ERRNO(EINVAL), "JSON array element is not a string.");
|
|
|
|
if (!valid_user_group_name(sd_json_variant_string(e), FLAGS_SET(flags, SD_JSON_RELAX) ? VALID_USER_RELAX : 0))
|
|
return json_log(e, flags, SYNTHETIC_ERRNO(EINVAL), "JSON array element is not a valid user/group name: %s", sd_json_variant_string(e));
|
|
|
|
r = strv_extend(&l, sd_json_variant_string(e));
|
|
if (r < 0)
|
|
return json_log(e, flags, r, "Failed to append array element: %m");
|
|
}
|
|
|
|
r = strv_extend_strv_consume(list, TAKE_PTR(l), /* filter_duplicates = */ true);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to merge user/group arrays: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_secret(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
|
|
static const sd_json_dispatch_field secret_dispatch_table[] = {
|
|
{ "password", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_strv, offsetof(UserRecord, password), 0 },
|
|
{ "tokenPin", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_strv, offsetof(UserRecord, token_pin), 0 },
|
|
{ "pkcs11Pin", /* legacy alias */ _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_strv, offsetof(UserRecord, token_pin), 0 },
|
|
{ "pkcs11ProtectedAuthenticationPathPermitted", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, pkcs11_protected_authentication_path_permitted), 0 },
|
|
{ "fido2UserPresencePermitted", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, fido2_user_presence_permitted), 0 },
|
|
{ "fido2UserVerificationPermitted", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, fido2_user_verification_permitted), 0 },
|
|
{},
|
|
};
|
|
|
|
return sd_json_dispatch(variant, secret_dispatch_table, flags, userdata);
|
|
}
|
|
|
|
static int dispatch_pkcs11_uri(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
char **s = userdata;
|
|
const char *n;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*s = mfree(*s);
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string.", strna(name));
|
|
|
|
n = sd_json_variant_string(variant);
|
|
if (!pkcs11_uri_valid(n))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid RFC7512 PKCS#11 URI.", strna(name));
|
|
|
|
r = free_and_strdup(s, n);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to allocate string: %m");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_pkcs11_uri_array(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
_cleanup_strv_free_ char **z = NULL;
|
|
char ***l = userdata;
|
|
sd_json_variant *e;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*l = strv_free(*l);
|
|
return 0;
|
|
}
|
|
|
|
if (sd_json_variant_is_string(variant)) {
|
|
const char *n;
|
|
|
|
n = sd_json_variant_string(variant);
|
|
if (!pkcs11_uri_valid(n))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid RFC7512 PKCS#11 URI.", strna(name));
|
|
|
|
z = strv_new(n);
|
|
if (!z)
|
|
return log_oom();
|
|
|
|
} else {
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string or array of strings.", strna(name));
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
const char *n;
|
|
|
|
if (!sd_json_variant_is_string(e))
|
|
return json_log(e, flags, SYNTHETIC_ERRNO(EINVAL), "JSON array element is not a string.");
|
|
|
|
n = sd_json_variant_string(e);
|
|
if (!pkcs11_uri_valid(n))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON array element in '%s' is not a valid RFC7512 PKCS#11 URI: %s", strna(name), n);
|
|
|
|
r = strv_extend(&z, n);
|
|
if (r < 0)
|
|
return log_oom();
|
|
}
|
|
}
|
|
|
|
strv_free_and_replace(*l, z);
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_pkcs11_key_data(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
Pkcs11EncryptedKey *k = userdata;
|
|
size_t l;
|
|
void *b;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
k->data = erase_and_free(k->data);
|
|
k->size = 0;
|
|
return 0;
|
|
}
|
|
|
|
r = sd_json_variant_unbase64(variant, &b, &l);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to decode encrypted PKCS#11 key: %m");
|
|
|
|
erase_and_free(k->data);
|
|
k->data = b;
|
|
k->size = l;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_pkcs11_key(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
UserRecord *h = userdata;
|
|
sd_json_variant *e;
|
|
int r;
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of objects.", strna(name));
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
static const sd_json_dispatch_field pkcs11_key_dispatch_table[] = {
|
|
{ "uri", SD_JSON_VARIANT_STRING, dispatch_pkcs11_uri, offsetof(Pkcs11EncryptedKey, uri), SD_JSON_MANDATORY },
|
|
{ "data", SD_JSON_VARIANT_STRING, dispatch_pkcs11_key_data, 0, SD_JSON_MANDATORY },
|
|
{ "hashedPassword", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(Pkcs11EncryptedKey, hashed_password), SD_JSON_MANDATORY },
|
|
{},
|
|
};
|
|
|
|
if (!sd_json_variant_is_object(e))
|
|
return json_log(e, flags, SYNTHETIC_ERRNO(EINVAL), "JSON array element is not an object.");
|
|
|
|
if (!GREEDY_REALLOC(h->pkcs11_encrypted_key, h->n_pkcs11_encrypted_key + 1))
|
|
return log_oom();
|
|
|
|
Pkcs11EncryptedKey *k = h->pkcs11_encrypted_key + h->n_pkcs11_encrypted_key;
|
|
*k = (Pkcs11EncryptedKey) {};
|
|
|
|
r = sd_json_dispatch(e, pkcs11_key_dispatch_table, flags, k);
|
|
if (r < 0) {
|
|
pkcs11_encrypted_key_done(k);
|
|
return r;
|
|
}
|
|
|
|
h->n_pkcs11_encrypted_key++;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_fido2_hmac_credential(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
Fido2HmacCredential *k = userdata;
|
|
size_t l;
|
|
void *b;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
k->id = mfree(k->id);
|
|
k->size = 0;
|
|
return 0;
|
|
}
|
|
|
|
r = sd_json_variant_unbase64(variant, &b, &l);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to decode FIDO2 credential ID: %m");
|
|
|
|
free_and_replace(k->id, b);
|
|
k->size = l;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_fido2_hmac_credential_array(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
UserRecord *h = userdata;
|
|
sd_json_variant *e;
|
|
int r;
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of strings.", strna(name));
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
size_t l;
|
|
void *b;
|
|
|
|
if (!GREEDY_REALLOC(h->fido2_hmac_credential, h->n_fido2_hmac_credential + 1))
|
|
return log_oom();
|
|
|
|
r = sd_json_variant_unbase64(e, &b, &l);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to decode FIDO2 credential ID: %m");
|
|
|
|
h->fido2_hmac_credential[h->n_fido2_hmac_credential++] = (Fido2HmacCredential) {
|
|
.id = b,
|
|
.size = l,
|
|
};
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_fido2_hmac_salt_value(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
Fido2HmacSalt *k = userdata;
|
|
size_t l;
|
|
void *b;
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
k->salt = erase_and_free(k->salt);
|
|
k->salt_size = 0;
|
|
return 0;
|
|
}
|
|
|
|
r = sd_json_variant_unbase64(variant, &b, &l);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to decode FIDO2 salt: %m");
|
|
|
|
erase_and_free(k->salt);
|
|
k->salt = b;
|
|
k->salt_size = l;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_fido2_hmac_salt(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
UserRecord *h = userdata;
|
|
sd_json_variant *e;
|
|
int r;
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of objects.", strna(name));
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
static const sd_json_dispatch_field fido2_hmac_salt_dispatch_table[] = {
|
|
{ "credential", SD_JSON_VARIANT_STRING, dispatch_fido2_hmac_credential, offsetof(Fido2HmacSalt, credential), SD_JSON_MANDATORY },
|
|
{ "salt", SD_JSON_VARIANT_STRING, dispatch_fido2_hmac_salt_value, 0, SD_JSON_MANDATORY },
|
|
{ "hashedPassword", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(Fido2HmacSalt, hashed_password), SD_JSON_MANDATORY },
|
|
{ "up", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(Fido2HmacSalt, up), 0 },
|
|
{ "uv", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(Fido2HmacSalt, uv), 0 },
|
|
{ "clientPin", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(Fido2HmacSalt, client_pin), 0 },
|
|
{},
|
|
};
|
|
|
|
if (!sd_json_variant_is_object(e))
|
|
return json_log(e, flags, SYNTHETIC_ERRNO(EINVAL), "JSON array element is not an object.");
|
|
|
|
if (!GREEDY_REALLOC(h->fido2_hmac_salt, h->n_fido2_hmac_salt + 1))
|
|
return log_oom();
|
|
|
|
Fido2HmacSalt *k = h->fido2_hmac_salt + h->n_fido2_hmac_salt;
|
|
*k = (Fido2HmacSalt) {
|
|
.uv = -1,
|
|
.up = -1,
|
|
.client_pin = -1,
|
|
};
|
|
|
|
r = sd_json_dispatch(e, fido2_hmac_salt_dispatch_table, flags, k);
|
|
if (r < 0) {
|
|
fido2_hmac_salt_done(k);
|
|
return r;
|
|
}
|
|
|
|
h->n_fido2_hmac_salt++;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_recovery_key(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
UserRecord *h = userdata;
|
|
sd_json_variant *e;
|
|
int r;
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of objects.", strna(name));
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
static const sd_json_dispatch_field recovery_key_dispatch_table[] = {
|
|
{ "type", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, 0, SD_JSON_MANDATORY },
|
|
{ "hashedPassword", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(RecoveryKey, hashed_password), SD_JSON_MANDATORY },
|
|
{},
|
|
};
|
|
|
|
if (!sd_json_variant_is_object(e))
|
|
return json_log(e, flags, SYNTHETIC_ERRNO(EINVAL), "JSON array element is not an object.");
|
|
|
|
if (!GREEDY_REALLOC(h->recovery_key, h->n_recovery_key + 1))
|
|
return log_oom();
|
|
|
|
RecoveryKey *k = h->recovery_key + h->n_recovery_key;
|
|
*k = (RecoveryKey) {};
|
|
|
|
r = sd_json_dispatch(e, recovery_key_dispatch_table, flags, k);
|
|
if (r < 0) {
|
|
recovery_key_done(k);
|
|
return r;
|
|
}
|
|
|
|
h->n_recovery_key++;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_auto_resize_mode(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
AutoResizeMode *mode = userdata, m;
|
|
|
|
assert_se(mode);
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*mode = _AUTO_RESIZE_MODE_INVALID;
|
|
return 0;
|
|
}
|
|
|
|
if (sd_json_variant_is_boolean(variant)) {
|
|
*mode = sd_json_variant_boolean(variant) ? AUTO_RESIZE_SHRINK_AND_GROW : AUTO_RESIZE_OFF;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_string(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a string, boolean or null.", strna(name));
|
|
|
|
m = auto_resize_mode_from_string(sd_json_variant_string(variant));
|
|
if (m < 0)
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not a valid automatic resize mode.", strna(name));
|
|
|
|
*mode = m;
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_rebalance_weight(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
uint64_t *rebalance_weight = userdata;
|
|
uintmax_t u;
|
|
|
|
assert_se(rebalance_weight);
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*rebalance_weight = REBALANCE_WEIGHT_UNSET;
|
|
return 0;
|
|
}
|
|
|
|
if (sd_json_variant_is_boolean(variant)) {
|
|
*rebalance_weight = sd_json_variant_boolean(variant) ? REBALANCE_WEIGHT_DEFAULT : REBALANCE_WEIGHT_OFF;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_unsigned(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an unsigned integer, boolean or null.", strna(name));
|
|
|
|
u = sd_json_variant_unsigned(variant);
|
|
if (u >= REBALANCE_WEIGHT_MIN && u <= REBALANCE_WEIGHT_MAX)
|
|
*rebalance_weight = (uint64_t) u;
|
|
else if (u == 0)
|
|
*rebalance_weight = REBALANCE_WEIGHT_OFF;
|
|
else
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(ERANGE),
|
|
"Rebalance weight is out of valid range %" PRIu64 "%s%" PRIu64 ".",
|
|
REBALANCE_WEIGHT_MIN, glyph(GLYPH_ELLIPSIS), REBALANCE_WEIGHT_MAX);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_tmpfs_limit(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
TmpfsLimit *limit = ASSERT_PTR(userdata);
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*limit = TMPFS_LIMIT_NULL;
|
|
return 0;
|
|
}
|
|
|
|
r = sd_json_dispatch_uint64(name, variant, flags, &limit->limit);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
limit->is_set = true;
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_tmpfs_limit_scale(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
TmpfsLimit *limit = ASSERT_PTR(userdata);
|
|
int r;
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*limit = TMPFS_LIMIT_NULL;
|
|
return 0;
|
|
}
|
|
|
|
r = sd_json_dispatch_uint32(name, variant, flags, &limit->limit_scale);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
limit->is_set = true;
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_privileged(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
|
|
static const sd_json_dispatch_field privileged_dispatch_table[] = {
|
|
{ "passwordHint", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, password_hint), 0 },
|
|
{ "hashedPassword", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_strv, offsetof(UserRecord, hashed_password), SD_JSON_STRICT },
|
|
{ "sshAuthorizedKeys", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_strv, offsetof(UserRecord, ssh_authorized_keys), 0 },
|
|
{ "pkcs11EncryptedKey", SD_JSON_VARIANT_ARRAY, dispatch_pkcs11_key, 0, 0 },
|
|
{ "fido2HmacSalt", SD_JSON_VARIANT_ARRAY, dispatch_fido2_hmac_salt, 0, 0 },
|
|
{ "recoveryKey", SD_JSON_VARIANT_ARRAY, dispatch_recovery_key, 0, 0 },
|
|
{},
|
|
};
|
|
|
|
return sd_json_dispatch(variant, privileged_dispatch_table, flags, userdata);
|
|
}
|
|
|
|
static int dispatch_binding(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
|
|
static const sd_json_dispatch_field binding_dispatch_table[] = {
|
|
{ "blobDirectory", SD_JSON_VARIANT_STRING, json_dispatch_path, offsetof(UserRecord, blob_directory), SD_JSON_STRICT },
|
|
{ "imagePath", SD_JSON_VARIANT_STRING, json_dispatch_image_path, offsetof(UserRecord, image_path), 0 },
|
|
{ "homeDirectory", SD_JSON_VARIANT_STRING, json_dispatch_home_directory, offsetof(UserRecord, home_directory), 0 },
|
|
{ "partitionUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, partition_uuid), 0 },
|
|
{ "luksUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, luks_uuid), 0 },
|
|
{ "fileSystemUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, file_system_uuid), 0 },
|
|
{ "uid", SD_JSON_VARIANT_UNSIGNED, sd_json_dispatch_uid_gid, offsetof(UserRecord, uid), 0 },
|
|
{ "gid", SD_JSON_VARIANT_UNSIGNED, sd_json_dispatch_uid_gid, offsetof(UserRecord, gid), 0 },
|
|
{ "storage", SD_JSON_VARIANT_STRING, json_dispatch_user_storage, offsetof(UserRecord, storage), 0 },
|
|
{ "fileSystemType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, file_system_type), SD_JSON_STRICT },
|
|
{ "luksCipher", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_cipher), SD_JSON_STRICT },
|
|
{ "luksCipherMode", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_cipher_mode), SD_JSON_STRICT },
|
|
{ "luksVolumeKeySize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_volume_key_size), 0 },
|
|
{},
|
|
};
|
|
|
|
sd_json_variant *m;
|
|
sd_id128_t mid;
|
|
int r;
|
|
|
|
if (!variant)
|
|
return 0;
|
|
|
|
if (!sd_json_variant_is_object(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an object.", strna(name));
|
|
|
|
r = sd_id128_get_machine(&mid);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to determine machine ID: %m");
|
|
|
|
m = sd_json_variant_by_key(variant, SD_ID128_TO_STRING(mid));
|
|
if (!m)
|
|
return 0;
|
|
|
|
return sd_json_dispatch(m, binding_dispatch_table, flags, userdata);
|
|
}
|
|
|
|
static int dispatch_blob_manifest(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
_cleanup_hashmap_free_ Hashmap *manifest = NULL;
|
|
Hashmap **ret = ASSERT_PTR(userdata);
|
|
sd_json_variant *value;
|
|
const char *key;
|
|
int r;
|
|
|
|
if (!variant)
|
|
return 0;
|
|
|
|
if (!sd_json_variant_is_object(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an object.", strna(name));
|
|
|
|
JSON_VARIANT_OBJECT_FOREACH(key, value, variant) {
|
|
_cleanup_free_ char *filename = NULL;
|
|
_cleanup_free_ uint8_t *hash = NULL;
|
|
|
|
if (!sd_json_variant_is_string(value))
|
|
return json_log(value, flags, SYNTHETIC_ERRNO(EINVAL), "Blob entry '%s' has invalid hash.", key);
|
|
|
|
if (!suitable_blob_filename(key))
|
|
return json_log(value, flags, SYNTHETIC_ERRNO(EINVAL), "Blob entry '%s' has invalid filename.", key);
|
|
|
|
filename = strdup(key);
|
|
if (!filename)
|
|
return json_log_oom(value, flags);
|
|
|
|
hash = malloc(SHA256_DIGEST_SIZE);
|
|
if (!hash)
|
|
return json_log_oom(value, flags);
|
|
|
|
r = parse_sha256(sd_json_variant_string(value), hash);
|
|
if (r < 0)
|
|
return json_log(value, flags, r, "Blob entry '%s' has invalid hash: %s", filename, sd_json_variant_string(value));
|
|
|
|
r = hashmap_ensure_put(&manifest, &path_hash_ops_free_free, filename, hash);
|
|
if (r < 0)
|
|
return json_log(value, flags, r, "Failed to insert blob manifest entry '%s': %m", filename);
|
|
TAKE_PTR(filename); /* Ownership transfers to hashmap */
|
|
TAKE_PTR(hash);
|
|
}
|
|
|
|
hashmap_free_and_replace(*ret, manifest);
|
|
return 0;
|
|
}
|
|
|
|
int per_machine_id_match(sd_json_variant *ids, sd_json_dispatch_flags_t flags) {
|
|
sd_id128_t mid;
|
|
int r;
|
|
|
|
assert(ids);
|
|
|
|
r = sd_id128_get_machine(&mid);
|
|
if (r < 0)
|
|
return json_log(ids, flags, r, "Failed to acquire machine ID: %m");
|
|
|
|
if (sd_json_variant_is_string(ids)) {
|
|
sd_id128_t k;
|
|
|
|
r = sd_id128_from_string(sd_json_variant_string(ids), &k);
|
|
if (r < 0) {
|
|
json_log(ids, flags, r, "%s is not a valid machine ID, ignoring: %m", sd_json_variant_string(ids));
|
|
return 0;
|
|
}
|
|
|
|
return sd_id128_equal(mid, k);
|
|
}
|
|
|
|
if (sd_json_variant_is_array(ids)) {
|
|
sd_json_variant *e;
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, ids) {
|
|
sd_id128_t k;
|
|
|
|
if (!sd_json_variant_is_string(e)) {
|
|
json_log(e, flags, 0, "Machine ID is not a string, ignoring: %m");
|
|
continue;
|
|
}
|
|
|
|
r = sd_id128_from_string(sd_json_variant_string(e), &k);
|
|
if (r < 0) {
|
|
json_log(e, flags, r, "%s is not a valid machine ID, ignoring: %m", sd_json_variant_string(e));
|
|
continue;
|
|
}
|
|
|
|
if (sd_id128_equal(mid, k))
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
json_log(ids, flags, 0, "Machine ID is not a string or array of strings, ignoring: %m");
|
|
return false;
|
|
}
|
|
|
|
int per_machine_hostname_match(sd_json_variant *hns, sd_json_dispatch_flags_t flags) {
|
|
_cleanup_free_ char *hn = NULL;
|
|
int r;
|
|
|
|
assert(hns);
|
|
|
|
r = gethostname_strict(&hn);
|
|
if (r == -ENXIO) {
|
|
json_log(hns, flags, r, "No hostname set, not matching perMachine hostname record: %m");
|
|
return false;
|
|
}
|
|
if (r < 0)
|
|
return json_log(hns, flags, r, "Failed to acquire hostname: %m");
|
|
|
|
if (sd_json_variant_is_string(hns))
|
|
return streq(sd_json_variant_string(hns), hn);
|
|
|
|
if (sd_json_variant_is_array(hns)) {
|
|
sd_json_variant *e;
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, hns) {
|
|
|
|
if (!sd_json_variant_is_string(e)) {
|
|
json_log(e, flags, 0, "Hostname is not a string, ignoring: %m");
|
|
continue;
|
|
}
|
|
|
|
if (streq(sd_json_variant_string(hns), hn))
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
json_log(hns, flags, 0, "Hostname is not a string or array of strings, ignoring: %m");
|
|
return false;
|
|
}
|
|
|
|
int per_machine_match(sd_json_variant *entry, sd_json_dispatch_flags_t flags) {
|
|
sd_json_variant *m;
|
|
int r;
|
|
|
|
assert(sd_json_variant_is_object(entry));
|
|
|
|
m = sd_json_variant_by_key(entry, "matchMachineId");
|
|
if (m) {
|
|
r = per_machine_id_match(m, flags);
|
|
if (r < 0)
|
|
return r;
|
|
if (r > 0)
|
|
return true;
|
|
}
|
|
|
|
m = sd_json_variant_by_key(entry, "matchNotMachineId");
|
|
if (m) {
|
|
r = per_machine_id_match(m, flags);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
return true;
|
|
}
|
|
|
|
m = sd_json_variant_by_key(entry, "matchHostname");
|
|
if (m) {
|
|
r = per_machine_hostname_match(m, flags);
|
|
if (r < 0)
|
|
return r;
|
|
if (r > 0)
|
|
return true;
|
|
}
|
|
|
|
m = sd_json_variant_by_key(entry, "matchNotHostname");
|
|
if (m) {
|
|
r = per_machine_hostname_match(m, flags);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static int dispatch_per_machine(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
|
|
static const sd_json_dispatch_field per_machine_dispatch_table[] = {
|
|
{ "matchMachineId", _SD_JSON_VARIANT_TYPE_INVALID, NULL, 0, 0 },
|
|
{ "matchNotMachineId", _SD_JSON_VARIANT_TYPE_INVALID, NULL, 0, 0 },
|
|
{ "matchHostname", _SD_JSON_VARIANT_TYPE_INVALID, NULL, 0, 0 },
|
|
{ "matchNotHostname", _SD_JSON_VARIANT_TYPE_INVALID, NULL, 0, 0 },
|
|
{ "blobDirectory", SD_JSON_VARIANT_STRING, json_dispatch_path, offsetof(UserRecord, blob_directory), SD_JSON_STRICT },
|
|
{ "blobManifest", SD_JSON_VARIANT_OBJECT, dispatch_blob_manifest, offsetof(UserRecord, blob_manifest), 0 },
|
|
{ "iconName", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, icon_name), SD_JSON_STRICT },
|
|
{ "location", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, location), 0 },
|
|
{ "shell", SD_JSON_VARIANT_STRING, json_dispatch_filename_or_path, offsetof(UserRecord, shell), 0 },
|
|
{ "umask", SD_JSON_VARIANT_UNSIGNED, json_dispatch_umask, offsetof(UserRecord, umask), 0 },
|
|
{ "environment", SD_JSON_VARIANT_ARRAY, json_dispatch_strv_environment, offsetof(UserRecord, environment), 0 },
|
|
{ "timeZone", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, time_zone), SD_JSON_STRICT },
|
|
{ "preferredLanguage", SD_JSON_VARIANT_STRING, json_dispatch_locale, offsetof(UserRecord, preferred_language), 0 },
|
|
{ "additionalLanguages", SD_JSON_VARIANT_ARRAY, json_dispatch_locales, offsetof(UserRecord, additional_languages), 0 },
|
|
{ "niceLevel", _SD_JSON_VARIANT_TYPE_INVALID, json_dispatch_nice, offsetof(UserRecord, nice_level), 0 },
|
|
{ "resourceLimits", _SD_JSON_VARIANT_TYPE_INVALID, json_dispatch_rlimits, offsetof(UserRecord, rlimits), 0 },
|
|
{ "locked", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, locked), 0 },
|
|
{ "notBeforeUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, not_before_usec), 0 },
|
|
{ "notAfterUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, not_after_usec), 0 },
|
|
{ "storage", SD_JSON_VARIANT_STRING, json_dispatch_user_storage, offsetof(UserRecord, storage), 0 },
|
|
{ "diskSize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_size), 0 },
|
|
{ "diskSizeRelative", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_size_relative), 0 },
|
|
{ "skeletonDirectory", SD_JSON_VARIANT_STRING, json_dispatch_path, offsetof(UserRecord, skeleton_directory), SD_JSON_STRICT },
|
|
{ "accessMode", SD_JSON_VARIANT_UNSIGNED, json_dispatch_access_mode, offsetof(UserRecord, access_mode), 0 },
|
|
{ "tasksMax", SD_JSON_VARIANT_UNSIGNED, json_dispatch_tasks_or_memory_max, offsetof(UserRecord, tasks_max), 0 },
|
|
{ "memoryHigh", SD_JSON_VARIANT_UNSIGNED, json_dispatch_tasks_or_memory_max, offsetof(UserRecord, memory_high), 0 },
|
|
{ "memoryMax", SD_JSON_VARIANT_UNSIGNED, json_dispatch_tasks_or_memory_max, offsetof(UserRecord, memory_max), 0 },
|
|
{ "cpuWeight", SD_JSON_VARIANT_UNSIGNED, json_dispatch_weight, offsetof(UserRecord, cpu_weight), 0 },
|
|
{ "ioWeight", SD_JSON_VARIANT_UNSIGNED, json_dispatch_weight, offsetof(UserRecord, io_weight), 0 },
|
|
{ "mountNoDevices", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_stdbool, offsetof(UserRecord, nodev), 0 },
|
|
{ "mountNoSuid", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_stdbool, offsetof(UserRecord, nosuid), 0 },
|
|
{ "mountNoExecute", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_stdbool, offsetof(UserRecord, noexec), 0 },
|
|
{ "cifsDomain", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_domain), SD_JSON_STRICT },
|
|
{ "cifsUserName", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_user_name), SD_JSON_STRICT },
|
|
{ "cifsService", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_service), SD_JSON_STRICT },
|
|
{ "cifsExtraMountOptions", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_extra_mount_options), 0 },
|
|
{ "imagePath", SD_JSON_VARIANT_STRING, json_dispatch_path, offsetof(UserRecord, image_path), SD_JSON_STRICT },
|
|
{ "uid", SD_JSON_VARIANT_UNSIGNED, sd_json_dispatch_uid_gid, offsetof(UserRecord, uid), 0 },
|
|
{ "gid", SD_JSON_VARIANT_UNSIGNED, sd_json_dispatch_uid_gid, offsetof(UserRecord, gid), 0 },
|
|
{ "memberOf", SD_JSON_VARIANT_ARRAY, json_dispatch_user_group_list, offsetof(UserRecord, member_of), SD_JSON_RELAX },
|
|
{ "capabilityBoundingSet", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, capability_bounding_set), SD_JSON_STRICT },
|
|
{ "capabilityAmbientSet", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, capability_ambient_set), SD_JSON_STRICT },
|
|
{ "fileSystemType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, file_system_type), SD_JSON_STRICT },
|
|
{ "partitionUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, partition_uuid), 0 },
|
|
{ "luksUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, luks_uuid), 0 },
|
|
{ "fileSystemUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, file_system_uuid), 0 },
|
|
{ "luksDiscard", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_tristate, offsetof(UserRecord, luks_discard), 0, },
|
|
{ "luksOfflineDiscard", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_tristate, offsetof(UserRecord, luks_offline_discard), 0, },
|
|
{ "luksCipher", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_cipher), SD_JSON_STRICT },
|
|
{ "luksCipherMode", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_cipher_mode), SD_JSON_STRICT },
|
|
{ "luksVolumeKeySize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_volume_key_size), 0 },
|
|
{ "luksPbkdfHashAlgorithm", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_pbkdf_hash_algorithm), SD_JSON_STRICT },
|
|
{ "luksPbkdfType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_pbkdf_type), SD_JSON_STRICT },
|
|
{ "luksPbkdfForceIterations", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_force_iterations), 0 },
|
|
{ "luksPbkdfTimeCostUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_time_cost_usec), 0 },
|
|
{ "luksPbkdfMemoryCost", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_memory_cost), 0 },
|
|
{ "luksPbkdfParallelThreads", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_parallel_threads), 0 },
|
|
{ "luksSectorSize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_sector_size), 0 },
|
|
{ "luksExtraMountOptions", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_extra_mount_options), 0 },
|
|
{ "dropCaches", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, drop_caches), 0 },
|
|
{ "autoResizeMode", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_auto_resize_mode, offsetof(UserRecord, auto_resize_mode), 0 },
|
|
{ "rebalanceWeight", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_rebalance_weight, offsetof(UserRecord, rebalance_weight), 0 },
|
|
{ "rateLimitIntervalUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, ratelimit_interval_usec), 0 },
|
|
{ "rateLimitBurst", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, ratelimit_burst), 0 },
|
|
{ "enforcePasswordPolicy", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, enforce_password_policy), 0 },
|
|
{ "autoLogin", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, auto_login), 0 },
|
|
{ "preferredSessionType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, preferred_session_type), SD_JSON_STRICT },
|
|
{ "preferredSessionLauncher", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, preferred_session_launcher), SD_JSON_STRICT },
|
|
{ "stopDelayUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, stop_delay_usec), 0 },
|
|
{ "killProcesses", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, kill_processes), 0 },
|
|
{ "passwordChangeMinUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_min_usec), 0 },
|
|
{ "passwordChangeMaxUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_max_usec), 0 },
|
|
{ "passwordChangeWarnUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_warn_usec), 0 },
|
|
{ "passwordChangeInactiveUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_inactive_usec), 0 },
|
|
{ "passwordChangeNow", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, password_change_now), 0 },
|
|
{ "pkcs11TokenUri", SD_JSON_VARIANT_ARRAY, dispatch_pkcs11_uri_array, offsetof(UserRecord, pkcs11_token_uri), 0 },
|
|
{ "fido2HmacCredential", SD_JSON_VARIANT_ARRAY, dispatch_fido2_hmac_credential_array, 0, 0 },
|
|
{ "selfModifiableFields", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, self_modifiable_fields), SD_JSON_STRICT },
|
|
{ "selfModifiableBlobs", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, self_modifiable_blobs), SD_JSON_STRICT },
|
|
{ "selfModifiablePrivileged", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, self_modifiable_privileged), SD_JSON_STRICT },
|
|
{ "tmpLimit", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit, offsetof(UserRecord, tmp_limit), 0, },
|
|
{ "tmpLimitScale", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit_scale, offsetof(UserRecord, tmp_limit), 0, },
|
|
{ "devShmLimit", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit, offsetof(UserRecord, dev_shm_limit), 0, },
|
|
{ "devShmLimitScale", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit_scale, offsetof(UserRecord, dev_shm_limit), 0, },
|
|
{ "defaultArea", SD_JSON_VARIANT_STRING, json_dispatch_filename, offsetof(UserRecord, default_area), 0 },
|
|
{},
|
|
};
|
|
|
|
sd_json_variant *e;
|
|
int r;
|
|
|
|
if (!variant)
|
|
return 0;
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array.", strna(name));
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, variant) {
|
|
if (!sd_json_variant_is_object(e))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of objects.", strna(name));
|
|
|
|
r = per_machine_match(e, flags);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0)
|
|
continue;
|
|
|
|
r = sd_json_dispatch(e, per_machine_dispatch_table, flags, userdata);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int dispatch_status(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
|
|
static const sd_json_dispatch_field status_dispatch_table[] = {
|
|
{ "diskUsage", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_usage), 0 },
|
|
{ "diskFree", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_free), 0 },
|
|
{ "diskSize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_size), 0 },
|
|
{ "diskCeiling", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_ceiling), 0 },
|
|
{ "diskFloor", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_floor), 0 },
|
|
{ "state", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, state), SD_JSON_STRICT },
|
|
{ "service", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, service), SD_JSON_STRICT },
|
|
{ "signedLocally", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_tristate, offsetof(UserRecord, signed_locally), 0 },
|
|
{ "goodAuthenticationCounter", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, good_authentication_counter), 0 },
|
|
{ "badAuthenticationCounter", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, bad_authentication_counter), 0 },
|
|
{ "lastGoodAuthenticationUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, last_good_authentication_usec), 0 },
|
|
{ "lastBadAuthenticationUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, last_bad_authentication_usec), 0 },
|
|
{ "rateLimitBeginUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, ratelimit_begin_usec), 0 },
|
|
{ "rateLimitCount", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, ratelimit_count), 0 },
|
|
{ "removable", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, removable), 0 },
|
|
{ "accessMode", SD_JSON_VARIANT_UNSIGNED, json_dispatch_access_mode, offsetof(UserRecord, access_mode), 0 },
|
|
{ "fileSystemType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, file_system_type), SD_JSON_STRICT },
|
|
{ "fallbackShell", SD_JSON_VARIANT_STRING, json_dispatch_filename_or_path, offsetof(UserRecord, fallback_shell), 0 },
|
|
{ "fallbackHomeDirectory", SD_JSON_VARIANT_STRING, json_dispatch_home_directory, offsetof(UserRecord, fallback_home_directory), 0 },
|
|
{ "useFallback", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_stdbool, offsetof(UserRecord, use_fallback), 0 },
|
|
{ "defaultArea", SD_JSON_VARIANT_STRING, json_dispatch_filename, offsetof(UserRecord, default_area), 0 },
|
|
{},
|
|
};
|
|
|
|
sd_json_variant *m;
|
|
sd_id128_t mid;
|
|
int r;
|
|
|
|
if (!variant)
|
|
return 0;
|
|
|
|
if (!sd_json_variant_is_object(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an object.", strna(name));
|
|
|
|
r = sd_id128_get_machine(&mid);
|
|
if (r < 0)
|
|
return json_log(variant, flags, r, "Failed to determine machine ID: %m");
|
|
|
|
m = sd_json_variant_by_key(variant, SD_ID128_TO_STRING(mid));
|
|
if (!m)
|
|
return 0;
|
|
|
|
return sd_json_dispatch(m, status_dispatch_table, flags, userdata);
|
|
}
|
|
|
|
int user_record_build_image_path(UserStorage storage, const char *user_name_and_realm, char **ret) {
|
|
const char *suffix;
|
|
char *z;
|
|
|
|
assert(storage >= 0);
|
|
assert(user_name_and_realm);
|
|
assert(ret);
|
|
|
|
if (storage == USER_LUKS)
|
|
suffix = ".home";
|
|
else if (IN_SET(storage, USER_DIRECTORY, USER_SUBVOLUME, USER_FSCRYPT))
|
|
suffix = ".homedir";
|
|
else {
|
|
*ret = NULL;
|
|
return 0;
|
|
}
|
|
|
|
z = strjoin(get_home_root(), "/", user_name_and_realm, suffix);
|
|
if (!z)
|
|
return -ENOMEM;
|
|
|
|
*ret = path_simplify(z);
|
|
return 1;
|
|
}
|
|
|
|
static int user_record_augment(UserRecord *h, sd_json_dispatch_flags_t json_flags) {
|
|
int r;
|
|
|
|
assert(h);
|
|
|
|
if (!FLAGS_SET(h->mask, USER_RECORD_REGULAR))
|
|
return 0;
|
|
|
|
assert(h->user_name);
|
|
|
|
if (!h->user_name_and_realm_auto && h->realm) {
|
|
h->user_name_and_realm_auto = strjoin(h->user_name, "@", h->realm);
|
|
if (!h->user_name_and_realm_auto)
|
|
return json_log_oom(h->json, json_flags);
|
|
}
|
|
|
|
/* Let's add in the following automatisms only for regular users, they don't make sense for any others */
|
|
if (user_record_disposition(h) != USER_REGULAR)
|
|
return 0;
|
|
|
|
if (!h->home_directory && !h->home_directory_auto) {
|
|
h->home_directory_auto = path_join(get_home_root(), h->user_name);
|
|
if (!h->home_directory_auto)
|
|
return json_log_oom(h->json, json_flags);
|
|
}
|
|
|
|
if (!h->image_path && !h->image_path_auto) {
|
|
r = user_record_build_image_path(user_record_storage(h), user_record_user_name_and_realm(h), &h->image_path_auto);
|
|
if (r < 0)
|
|
return json_log(h->json, json_flags, r, "Failed to determine default image path: %m");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int user_group_record_mangle(
|
|
sd_json_variant *v,
|
|
UserRecordLoadFlags load_flags,
|
|
sd_json_variant **ret_variant,
|
|
UserRecordMask *ret_mask) {
|
|
|
|
static const struct {
|
|
UserRecordMask mask;
|
|
const char *name;
|
|
} mask_field[] = {
|
|
{ USER_RECORD_PRIVILEGED, "privileged" },
|
|
{ USER_RECORD_SECRET, "secret" },
|
|
{ USER_RECORD_BINDING, "binding" },
|
|
{ USER_RECORD_PER_MACHINE, "perMachine" },
|
|
{ USER_RECORD_STATUS, "status" },
|
|
{ USER_RECORD_SIGNATURE, "signature" },
|
|
};
|
|
|
|
sd_json_dispatch_flags_t json_flags = USER_RECORD_LOAD_FLAGS_TO_JSON_DISPATCH_FLAGS(load_flags);
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *w = NULL;
|
|
sd_json_variant *array[ELEMENTSOF(mask_field) * 2];
|
|
size_t n_retain = 0;
|
|
UserRecordMask m = 0;
|
|
int r;
|
|
|
|
assert((load_flags & _USER_RECORD_MASK_MAX) == 0); /* detect mistakes when accidentally passing
|
|
* UserRecordMask bit masks as UserRecordLoadFlags
|
|
* value */
|
|
|
|
assert(v);
|
|
assert(ret_variant);
|
|
|
|
/* Note that this function is shared with the group record parser, hence we try to be generic in our
|
|
* log message wording here, to cover both cases. */
|
|
|
|
if (!sd_json_variant_is_object(v))
|
|
return json_log(v, json_flags, SYNTHETIC_ERRNO(EBADMSG), "Record is not a JSON object, refusing.");
|
|
|
|
if (USER_RECORD_ALLOW_MASK(load_flags) == 0) /* allow nothing? */
|
|
return json_log(v, json_flags, SYNTHETIC_ERRNO(EINVAL), "Nothing allowed in record, refusing.");
|
|
|
|
if (USER_RECORD_STRIP_MASK(load_flags) == _USER_RECORD_MASK_MAX) /* strip everything? */
|
|
return json_log(v, json_flags, SYNTHETIC_ERRNO(EINVAL), "Stripping everything from record, refusing.");
|
|
|
|
/* Check if we have the special sections and if they match our flags set */
|
|
FOREACH_ELEMENT(i, mask_field) {
|
|
sd_json_variant *e, *k;
|
|
|
|
if (FLAGS_SET(USER_RECORD_STRIP_MASK(load_flags), i->mask)) {
|
|
if (!w)
|
|
w = sd_json_variant_ref(v);
|
|
|
|
r = sd_json_variant_filter(&w, STRV_MAKE(i->name));
|
|
if (r < 0)
|
|
return json_log(w, json_flags, r, "Failed to remove field from variant: %m");
|
|
|
|
continue;
|
|
}
|
|
|
|
e = sd_json_variant_by_key_full(v, i->name, &k);
|
|
if (e) {
|
|
if (!FLAGS_SET(USER_RECORD_ALLOW_MASK(load_flags), i->mask))
|
|
return json_log(e, json_flags, SYNTHETIC_ERRNO(EBADMSG), "Record contains '%s' field, which is not allowed.", i->name);
|
|
|
|
if (FLAGS_SET(load_flags, USER_RECORD_STRIP_REGULAR)) {
|
|
array[n_retain++] = k;
|
|
array[n_retain++] = e;
|
|
}
|
|
|
|
m |= i->mask;
|
|
} else {
|
|
if (FLAGS_SET(USER_RECORD_REQUIRE_MASK(load_flags), i->mask))
|
|
return json_log(v, json_flags, SYNTHETIC_ERRNO(EBADMSG), "Record lacks '%s' field, which is required.", i->name);
|
|
}
|
|
}
|
|
|
|
if (FLAGS_SET(load_flags, USER_RECORD_STRIP_REGULAR)) {
|
|
/* If we are supposed to strip regular items, then let's instead just allocate a new object
|
|
* with just the stuff we need. */
|
|
|
|
w = sd_json_variant_unref(w);
|
|
r = sd_json_variant_new_object(&w, array, n_retain);
|
|
if (r < 0)
|
|
return json_log(v, json_flags, r, "Failed to allocate new object: %m");
|
|
} else
|
|
/* And now check if there's anything else in the record */
|
|
for (size_t i = 0; i < sd_json_variant_elements(v); i += 2) {
|
|
const char *f;
|
|
bool special = false;
|
|
|
|
assert_se(f = sd_json_variant_string(sd_json_variant_by_index(v, i)));
|
|
|
|
FOREACH_ELEMENT(j, mask_field)
|
|
if (streq(f, j->name)) { /* already covered in the loop above */
|
|
special = true;
|
|
continue;
|
|
}
|
|
|
|
if (!special) {
|
|
if ((load_flags & (USER_RECORD_ALLOW_REGULAR|USER_RECORD_REQUIRE_REGULAR)) == 0)
|
|
return json_log(v, json_flags, SYNTHETIC_ERRNO(EBADMSG), "Record contains '%s' field, which is not allowed.", f);
|
|
|
|
m |= USER_RECORD_REGULAR;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (FLAGS_SET(load_flags, USER_RECORD_REQUIRE_REGULAR) && !FLAGS_SET(m, USER_RECORD_REGULAR))
|
|
return json_log(v, json_flags, SYNTHETIC_ERRNO(EBADMSG), "Record lacks basic identity fields, which are required.");
|
|
|
|
if (!FLAGS_SET(load_flags, USER_RECORD_EMPTY_OK) && m == 0)
|
|
return json_log(v, json_flags, SYNTHETIC_ERRNO(EBADMSG), "Record is empty.");
|
|
|
|
if (w)
|
|
*ret_variant = TAKE_PTR(w);
|
|
else
|
|
*ret_variant = sd_json_variant_ref(v);
|
|
|
|
if (ret_mask)
|
|
*ret_mask = m;
|
|
return 0;
|
|
}
|
|
|
|
int user_record_load(UserRecord *h, sd_json_variant *v, UserRecordLoadFlags load_flags) {
|
|
|
|
static const sd_json_dispatch_field user_dispatch_table[] = {
|
|
{ "userName", SD_JSON_VARIANT_STRING, json_dispatch_user_group_name, offsetof(UserRecord, user_name), SD_JSON_RELAX },
|
|
{ "aliases", SD_JSON_VARIANT_ARRAY, json_dispatch_user_group_list, offsetof(UserRecord, aliases), SD_JSON_RELAX },
|
|
{ "realm", SD_JSON_VARIANT_STRING, json_dispatch_realm, offsetof(UserRecord, realm), 0 },
|
|
{ "uuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, uuid), 0 },
|
|
{ "blobDirectory", SD_JSON_VARIANT_STRING, json_dispatch_path, offsetof(UserRecord, blob_directory), SD_JSON_STRICT },
|
|
{ "blobManifest", SD_JSON_VARIANT_OBJECT, dispatch_blob_manifest, offsetof(UserRecord, blob_manifest), 0 },
|
|
{ "realName", SD_JSON_VARIANT_STRING, json_dispatch_gecos, offsetof(UserRecord, real_name), 0 },
|
|
{ "emailAddress", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, email_address), SD_JSON_STRICT },
|
|
{ "iconName", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, icon_name), SD_JSON_STRICT },
|
|
{ "location", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, location), 0 },
|
|
{ "disposition", SD_JSON_VARIANT_STRING, json_dispatch_user_disposition, offsetof(UserRecord, disposition), 0 },
|
|
{ "lastChangeUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, last_change_usec), 0 },
|
|
{ "lastPasswordChangeUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, last_password_change_usec), 0 },
|
|
{ "shell", SD_JSON_VARIANT_STRING, json_dispatch_filename_or_path, offsetof(UserRecord, shell), 0 },
|
|
{ "umask", SD_JSON_VARIANT_UNSIGNED, json_dispatch_umask, offsetof(UserRecord, umask), 0 },
|
|
{ "environment", SD_JSON_VARIANT_ARRAY, json_dispatch_strv_environment, offsetof(UserRecord, environment), 0 },
|
|
{ "timeZone", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, time_zone), SD_JSON_STRICT },
|
|
{ "preferredLanguage", SD_JSON_VARIANT_STRING, json_dispatch_locale, offsetof(UserRecord, preferred_language), 0 },
|
|
{ "additionalLanguages", SD_JSON_VARIANT_ARRAY, json_dispatch_locales, offsetof(UserRecord, additional_languages), 0 },
|
|
{ "niceLevel", _SD_JSON_VARIANT_TYPE_INVALID, json_dispatch_nice, offsetof(UserRecord, nice_level), 0 },
|
|
{ "resourceLimits", _SD_JSON_VARIANT_TYPE_INVALID, json_dispatch_rlimits, offsetof(UserRecord, rlimits), 0 },
|
|
{ "locked", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, locked), 0 },
|
|
{ "notBeforeUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, not_before_usec), 0 },
|
|
{ "notAfterUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, not_after_usec), 0 },
|
|
{ "storage", SD_JSON_VARIANT_STRING, json_dispatch_user_storage, offsetof(UserRecord, storage), 0 },
|
|
{ "diskSize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_size), 0 },
|
|
{ "diskSizeRelative", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, disk_size_relative), 0 },
|
|
{ "skeletonDirectory", SD_JSON_VARIANT_STRING, json_dispatch_path, offsetof(UserRecord, skeleton_directory), SD_JSON_STRICT },
|
|
{ "accessMode", SD_JSON_VARIANT_UNSIGNED, json_dispatch_access_mode, offsetof(UserRecord, access_mode), 0 },
|
|
{ "tasksMax", SD_JSON_VARIANT_UNSIGNED, json_dispatch_tasks_or_memory_max, offsetof(UserRecord, tasks_max), 0 },
|
|
{ "memoryHigh", SD_JSON_VARIANT_UNSIGNED, json_dispatch_tasks_or_memory_max, offsetof(UserRecord, memory_high), 0 },
|
|
{ "memoryMax", SD_JSON_VARIANT_UNSIGNED, json_dispatch_tasks_or_memory_max, offsetof(UserRecord, memory_max), 0 },
|
|
{ "cpuWeight", SD_JSON_VARIANT_UNSIGNED, json_dispatch_weight, offsetof(UserRecord, cpu_weight), 0 },
|
|
{ "ioWeight", SD_JSON_VARIANT_UNSIGNED, json_dispatch_weight, offsetof(UserRecord, io_weight), 0 },
|
|
{ "mountNoDevices", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_stdbool, offsetof(UserRecord, nodev), 0 },
|
|
{ "mountNoSuid", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_stdbool, offsetof(UserRecord, nosuid), 0 },
|
|
{ "mountNoExecute", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_stdbool, offsetof(UserRecord, noexec), 0 },
|
|
{ "cifsDomain", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_domain), SD_JSON_STRICT },
|
|
{ "cifsUserName", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_user_name), SD_JSON_STRICT },
|
|
{ "cifsService", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_service), SD_JSON_STRICT },
|
|
{ "cifsExtraMountOptions", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, cifs_extra_mount_options), 0 },
|
|
{ "imagePath", SD_JSON_VARIANT_STRING, json_dispatch_path, offsetof(UserRecord, image_path), SD_JSON_STRICT },
|
|
{ "homeDirectory", SD_JSON_VARIANT_STRING, json_dispatch_home_directory, offsetof(UserRecord, home_directory), 0 },
|
|
{ "uid", SD_JSON_VARIANT_UNSIGNED, sd_json_dispatch_uid_gid, offsetof(UserRecord, uid), 0 },
|
|
{ "gid", SD_JSON_VARIANT_UNSIGNED, sd_json_dispatch_uid_gid, offsetof(UserRecord, gid), 0 },
|
|
{ "memberOf", SD_JSON_VARIANT_ARRAY, json_dispatch_user_group_list, offsetof(UserRecord, member_of), SD_JSON_RELAX },
|
|
{ "capabilityBoundingSet", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, capability_bounding_set), SD_JSON_STRICT },
|
|
{ "capabilityAmbientSet", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, capability_ambient_set), SD_JSON_STRICT },
|
|
{ "fileSystemType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, file_system_type), SD_JSON_STRICT },
|
|
{ "partitionUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, partition_uuid), 0 },
|
|
{ "luksUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, luks_uuid), 0 },
|
|
{ "fileSystemUuid", SD_JSON_VARIANT_STRING, sd_json_dispatch_id128, offsetof(UserRecord, file_system_uuid), 0 },
|
|
{ "luksDiscard", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_tristate, offsetof(UserRecord, luks_discard), 0 },
|
|
{ "luksOfflineDiscard", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_tristate, offsetof(UserRecord, luks_offline_discard), 0 },
|
|
{ "luksCipher", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_cipher), SD_JSON_STRICT },
|
|
{ "luksCipherMode", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_cipher_mode), SD_JSON_STRICT },
|
|
{ "luksVolumeKeySize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_volume_key_size), 0 },
|
|
{ "luksPbkdfHashAlgorithm", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_pbkdf_hash_algorithm), SD_JSON_STRICT },
|
|
{ "luksPbkdfType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_pbkdf_type), SD_JSON_STRICT },
|
|
{ "luksPbkdfForceIterations", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_force_iterations), 0 },
|
|
{ "luksPbkdfTimeCostUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_time_cost_usec), 0 },
|
|
{ "luksPbkdfMemoryCost", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_memory_cost), 0 },
|
|
{ "luksPbkdfParallelThreads", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_pbkdf_parallel_threads), 0 },
|
|
{ "luksSectorSize", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, luks_sector_size), 0 },
|
|
{ "luksExtraMountOptions", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, luks_extra_mount_options), 0 },
|
|
{ "dropCaches", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, drop_caches), 0 },
|
|
{ "autoResizeMode", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_auto_resize_mode, offsetof(UserRecord, auto_resize_mode), 0 },
|
|
{ "rebalanceWeight", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_rebalance_weight, offsetof(UserRecord, rebalance_weight), 0 },
|
|
{ "service", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, service), SD_JSON_STRICT },
|
|
{ "rateLimitIntervalUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, ratelimit_interval_usec), 0 },
|
|
{ "rateLimitBurst", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, ratelimit_burst), 0 },
|
|
{ "enforcePasswordPolicy", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, enforce_password_policy), 0 },
|
|
{ "autoLogin", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, auto_login), 0 },
|
|
{ "preferredSessionType", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, preferred_session_type), SD_JSON_STRICT },
|
|
{ "preferredSessionLauncher", SD_JSON_VARIANT_STRING, sd_json_dispatch_string, offsetof(UserRecord, preferred_session_launcher), SD_JSON_STRICT },
|
|
{ "stopDelayUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, stop_delay_usec), 0 },
|
|
{ "killProcesses", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, kill_processes), 0 },
|
|
{ "passwordChangeMinUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_min_usec), 0 },
|
|
{ "passwordChangeMaxUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_max_usec), 0 },
|
|
{ "passwordChangeWarnUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_warn_usec), 0 },
|
|
{ "passwordChangeInactiveUSec", _SD_JSON_VARIANT_TYPE_INVALID, sd_json_dispatch_uint64, offsetof(UserRecord, password_change_inactive_usec), 0 },
|
|
{ "passwordChangeNow", SD_JSON_VARIANT_BOOLEAN, sd_json_dispatch_tristate, offsetof(UserRecord, password_change_now), 0 },
|
|
{ "pkcs11TokenUri", SD_JSON_VARIANT_ARRAY, dispatch_pkcs11_uri_array, offsetof(UserRecord, pkcs11_token_uri), 0 },
|
|
{ "fido2HmacCredential", SD_JSON_VARIANT_ARRAY, dispatch_fido2_hmac_credential_array, 0, 0 },
|
|
{ "recoveryKeyType", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, recovery_key_type), 0 },
|
|
{ "selfModifiableFields", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, self_modifiable_fields), SD_JSON_STRICT },
|
|
{ "selfModifiableBlobs", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, self_modifiable_blobs), SD_JSON_STRICT },
|
|
{ "selfModifiablePrivileged", SD_JSON_VARIANT_ARRAY, sd_json_dispatch_strv, offsetof(UserRecord, self_modifiable_privileged), SD_JSON_STRICT },
|
|
{ "tmpLimit", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit, offsetof(UserRecord, tmp_limit), 0, },
|
|
{ "tmpLimitScale", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit_scale, offsetof(UserRecord, tmp_limit), 0, },
|
|
{ "devShmLimit", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit, offsetof(UserRecord, dev_shm_limit), 0, },
|
|
{ "devShmLimitScale", _SD_JSON_VARIANT_TYPE_INVALID, dispatch_tmpfs_limit_scale, offsetof(UserRecord, dev_shm_limit), 0, },
|
|
{ "defaultArea", SD_JSON_VARIANT_STRING, json_dispatch_filename, offsetof(UserRecord, default_area), 0 },
|
|
|
|
{ "secret", SD_JSON_VARIANT_OBJECT, dispatch_secret, 0, 0 },
|
|
{ "privileged", SD_JSON_VARIANT_OBJECT, dispatch_privileged, 0, 0 },
|
|
|
|
/* Ignore the perMachine, binding, status stuff here, and process it later, so that it overrides whatever is set above */
|
|
{ "perMachine", SD_JSON_VARIANT_ARRAY, NULL, 0, 0 },
|
|
{ "binding", SD_JSON_VARIANT_OBJECT, NULL, 0, 0 },
|
|
{ "status", SD_JSON_VARIANT_OBJECT, NULL, 0, 0 },
|
|
|
|
/* Ignore 'signature', we check it with explicit accessors instead */
|
|
{ "signature", SD_JSON_VARIANT_ARRAY, NULL, 0, 0 },
|
|
{},
|
|
};
|
|
|
|
sd_json_dispatch_flags_t json_flags = USER_RECORD_LOAD_FLAGS_TO_JSON_DISPATCH_FLAGS(load_flags);
|
|
int r;
|
|
|
|
assert(h);
|
|
assert(!h->json);
|
|
|
|
/* Note that this call will leave a half-initialized record around on failure! */
|
|
|
|
r = user_group_record_mangle(v, load_flags, &h->json, &h->mask);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_json_dispatch(h->json, user_dispatch_table, json_flags | SD_JSON_ALLOW_EXTENSIONS, h);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* During the parsing operation above we ignored the 'perMachine', 'binding' and 'status' fields,
|
|
* since we want them to override the global options. Let's process them now. */
|
|
|
|
r = dispatch_per_machine("perMachine", sd_json_variant_by_key(h->json, "perMachine"), json_flags, h);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = dispatch_binding("binding", sd_json_variant_by_key(h->json, "binding"), json_flags, h);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = dispatch_status("status", sd_json_variant_by_key(h->json, "status"), json_flags, h);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (FLAGS_SET(h->mask, USER_RECORD_REGULAR) && !h->user_name)
|
|
return json_log(h->json, json_flags, SYNTHETIC_ERRNO(EINVAL), "User name field missing, refusing.");
|
|
|
|
r = user_record_augment(h, json_flags);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int user_record_build(UserRecord **ret, ...) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL;
|
|
_cleanup_(user_record_unrefp) UserRecord *u = NULL;
|
|
va_list ap;
|
|
int r;
|
|
|
|
assert(ret);
|
|
|
|
va_start(ap, ret);
|
|
r = sd_json_buildv(&v, ap);
|
|
va_end(ap);
|
|
|
|
if (r < 0)
|
|
return r;
|
|
|
|
u = user_record_new();
|
|
if (!u)
|
|
return -ENOMEM;
|
|
|
|
r = user_record_load(u, v, USER_RECORD_LOAD_FULL);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
*ret = TAKE_PTR(u);
|
|
return 0;
|
|
}
|
|
|
|
const char* user_record_user_name_and_realm(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* Return the pre-initialized joined string if it is defined */
|
|
if (h->user_name_and_realm_auto)
|
|
return h->user_name_and_realm_auto;
|
|
|
|
/* If it's not defined then we cannot have a realm */
|
|
assert(!h->realm);
|
|
return h->user_name;
|
|
}
|
|
|
|
UserStorage user_record_storage(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->storage >= 0)
|
|
return h->storage;
|
|
|
|
return USER_CLASSIC;
|
|
}
|
|
|
|
const char* user_record_file_system_type(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->file_system_type ?: "btrfs";
|
|
}
|
|
|
|
const char* user_record_skeleton_directory(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->skeleton_directory ?: "/etc/skel";
|
|
}
|
|
|
|
mode_t user_record_access_mode(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->access_mode != MODE_INVALID ? h->access_mode : 0700;
|
|
}
|
|
|
|
static const char *user_record_home_directory_real(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->home_directory)
|
|
return h->home_directory;
|
|
if (h->home_directory_auto)
|
|
return h->home_directory_auto;
|
|
|
|
/* The root user is special, hence be special about it */
|
|
if (user_record_is_root(h))
|
|
return "/root";
|
|
|
|
return "/";
|
|
}
|
|
|
|
const char* user_record_home_directory(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->use_fallback && h->fallback_home_directory)
|
|
return h->fallback_home_directory;
|
|
|
|
return user_record_home_directory_real(h);
|
|
}
|
|
|
|
const char* user_record_image_path(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->image_path)
|
|
return h->image_path;
|
|
if (h->image_path_auto)
|
|
return h->image_path_auto;
|
|
|
|
/* For some storage types the image is the home directory itself. (But let's ignore the fallback logic for it) */
|
|
return IN_SET(user_record_storage(h), USER_CLASSIC, USER_DIRECTORY, USER_SUBVOLUME, USER_FSCRYPT) ?
|
|
user_record_home_directory_real(h) : NULL;
|
|
}
|
|
|
|
const char* user_record_cifs_user_name(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->cifs_user_name ?: h->user_name;
|
|
}
|
|
|
|
unsigned long user_record_mount_flags(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return (h->nosuid ? MS_NOSUID : 0) |
|
|
(h->noexec ? MS_NOEXEC : 0) |
|
|
(h->nodev ? MS_NODEV : 0);
|
|
}
|
|
|
|
static const char *user_record_shell_real(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->shell)
|
|
return h->shell;
|
|
|
|
if (user_record_is_root(h))
|
|
return "/bin/sh";
|
|
|
|
if (user_record_disposition(h) == USER_REGULAR)
|
|
return DEFAULT_USER_SHELL;
|
|
|
|
return NOLOGIN;
|
|
}
|
|
|
|
const char* user_record_shell(UserRecord *h) {
|
|
const char *shell;
|
|
|
|
assert(h);
|
|
|
|
shell = user_record_shell_real(h);
|
|
|
|
/* Return fallback shall if we are told so — except if the primary shell is already a nologin shell,
|
|
* then let's not risk anything. */
|
|
if (h->use_fallback && h->fallback_shell)
|
|
return is_nologin_shell(shell) ? NOLOGIN : h->fallback_shell;
|
|
|
|
return shell;
|
|
}
|
|
|
|
const char* user_record_real_name(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->real_name ?: h->user_name;
|
|
}
|
|
|
|
bool user_record_luks_discard(UserRecord *h) {
|
|
const char *ip;
|
|
|
|
assert(h);
|
|
|
|
if (h->luks_discard >= 0)
|
|
return h->luks_discard;
|
|
|
|
ip = user_record_image_path(h);
|
|
if (!ip)
|
|
return false;
|
|
|
|
/* Use discard by default if we are referring to a real block device, but not when operating on a
|
|
* loopback device. We want to optimize for SSD and flash storage after all, but we should be careful
|
|
* when storing stuff on top of regular file systems in loopback files as doing discard then would
|
|
* mean thin provisioning and we should not do that willy-nilly since it means we'll risk EIO later
|
|
* on should the disk space to back our file systems not be available. */
|
|
|
|
return path_startswith(ip, "/dev/");
|
|
}
|
|
|
|
bool user_record_luks_offline_discard(UserRecord *h) {
|
|
const char *ip;
|
|
|
|
assert(h);
|
|
|
|
if (h->luks_offline_discard >= 0)
|
|
return h->luks_offline_discard;
|
|
|
|
/* Discard while we are logged out should generally be a good idea, except when operating directly on
|
|
* physical media, where we should just bind it to the online discard mode. */
|
|
|
|
ip = user_record_image_path(h);
|
|
if (!ip)
|
|
return false;
|
|
|
|
if (path_startswith(ip, "/dev/"))
|
|
return user_record_luks_discard(h);
|
|
|
|
return true;
|
|
}
|
|
|
|
const char* user_record_luks_cipher(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->luks_cipher ?: "aes";
|
|
}
|
|
|
|
const char* user_record_luks_cipher_mode(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->luks_cipher_mode ?: "xts-plain64";
|
|
}
|
|
|
|
uint64_t user_record_luks_volume_key_size(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* We return a value here that can be cast without loss into size_t which is what libcrypsetup expects */
|
|
|
|
if (h->luks_volume_key_size == UINT64_MAX)
|
|
return 256 / 8;
|
|
|
|
return MIN(h->luks_volume_key_size, SIZE_MAX);
|
|
}
|
|
|
|
const char* user_record_luks_pbkdf_type(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->luks_pbkdf_type ?: "argon2id";
|
|
}
|
|
|
|
uint64_t user_record_luks_pbkdf_force_iterations(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* propagate default "benchmark" mode as itself */
|
|
if (h->luks_pbkdf_force_iterations == UINT64_MAX)
|
|
return UINT64_MAX;
|
|
|
|
/* clamp everything else to actually accepted number of iterations of libcryptsetup */
|
|
return CLAMP(h->luks_pbkdf_force_iterations, 1U, UINT32_MAX);
|
|
}
|
|
|
|
uint64_t user_record_luks_pbkdf_time_cost_usec(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* Returns a value with ms granularity, since that's what libcryptsetup expects */
|
|
|
|
if (h->luks_pbkdf_time_cost_usec == UINT64_MAX)
|
|
return 500 * USEC_PER_MSEC; /* We default to 500ms, in contrast to libcryptsetup's 2s, which is just awfully slow on every login */
|
|
|
|
return MIN(DIV_ROUND_UP(h->luks_pbkdf_time_cost_usec, USEC_PER_MSEC), UINT32_MAX) * USEC_PER_MSEC;
|
|
}
|
|
|
|
uint64_t user_record_luks_pbkdf_memory_cost(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* Returns a value with kb granularity, since that's what libcryptsetup expects */
|
|
if (h->luks_pbkdf_memory_cost == UINT64_MAX)
|
|
return streq(user_record_luks_pbkdf_type(h), "pbkdf2") ? 0 : /* doesn't apply for simple pbkdf2 */
|
|
64*1024*1024; /* We default to 64M, since this should work on smaller systems too */
|
|
|
|
return MIN(DIV_ROUND_UP(h->luks_pbkdf_memory_cost, 1024), UINT32_MAX) * 1024;
|
|
}
|
|
|
|
uint64_t user_record_luks_pbkdf_parallel_threads(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->luks_pbkdf_parallel_threads == UINT64_MAX)
|
|
return streq(user_record_luks_pbkdf_type(h), "pbkdf2") ? 0 : /* doesn't apply for simple pbkdf2 */
|
|
1; /* We default to 1, since this should work on smaller systems too */
|
|
|
|
return MIN(h->luks_pbkdf_parallel_threads, UINT32_MAX);
|
|
}
|
|
|
|
uint64_t user_record_luks_sector_size(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->luks_sector_size == UINT64_MAX)
|
|
return 512;
|
|
|
|
/* Allow up to 4K due to dm-crypt support and 4K alignment by the homed LUKS backend */
|
|
return CLAMP(UINT64_C(1) << (63 - __builtin_clzl(h->luks_sector_size)), 512U, 4096U);
|
|
}
|
|
|
|
const char* user_record_luks_pbkdf_hash_algorithm(UserRecord *h) {
|
|
assert(h);
|
|
|
|
return h->luks_pbkdf_hash_algorithm ?: "sha512";
|
|
}
|
|
|
|
gid_t user_record_gid(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (gid_is_valid(h->gid))
|
|
return h->gid;
|
|
|
|
return (gid_t) h->uid;
|
|
}
|
|
|
|
UserDisposition user_record_disposition(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->disposition >= 0)
|
|
return h->disposition;
|
|
|
|
/* If not declared, derive from UID */
|
|
|
|
if (!uid_is_valid(h->uid))
|
|
return _USER_DISPOSITION_INVALID;
|
|
|
|
if (user_record_is_root(h) || user_record_is_nobody(h))
|
|
return USER_INTRINSIC;
|
|
|
|
if (uid_is_system(h->uid))
|
|
return USER_SYSTEM;
|
|
|
|
if (uid_is_dynamic(h->uid) || uid_is_greeter(h->uid))
|
|
return USER_DYNAMIC;
|
|
|
|
if (uid_is_container(h->uid))
|
|
return USER_CONTAINER;
|
|
|
|
if (uid_is_foreign(h->uid))
|
|
return USER_FOREIGN;
|
|
|
|
if (h->uid > INT32_MAX)
|
|
return USER_RESERVED;
|
|
|
|
return USER_REGULAR;
|
|
}
|
|
|
|
int user_record_removable(UserRecord *h) {
|
|
UserStorage storage;
|
|
assert(h);
|
|
|
|
if (h->removable >= 0)
|
|
return h->removable;
|
|
|
|
/* Refuse to decide for classic records */
|
|
storage = user_record_storage(h);
|
|
if (h->storage < 0 || h->storage == USER_CLASSIC)
|
|
return -1;
|
|
|
|
/* For now consider only LUKS home directories with a reference by path as removable */
|
|
return storage == USER_LUKS && path_startswith(user_record_image_path(h), "/dev/");
|
|
}
|
|
|
|
uint64_t user_record_ratelimit_interval_usec(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->ratelimit_interval_usec == UINT64_MAX)
|
|
return DEFAULT_RATELIMIT_INTERVAL_USEC;
|
|
|
|
return h->ratelimit_interval_usec;
|
|
}
|
|
|
|
uint64_t user_record_ratelimit_burst(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->ratelimit_burst == UINT64_MAX)
|
|
return DEFAULT_RATELIMIT_BURST;
|
|
|
|
return h->ratelimit_burst;
|
|
}
|
|
|
|
bool user_record_can_authenticate(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* Returns true if there's some form of property configured that the user can authenticate against */
|
|
|
|
if (h->n_pkcs11_encrypted_key > 0)
|
|
return true;
|
|
|
|
if (h->n_fido2_hmac_salt > 0)
|
|
return true;
|
|
|
|
return !strv_isempty(h->hashed_password);
|
|
}
|
|
|
|
bool user_record_drop_caches(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->drop_caches >= 0)
|
|
return h->drop_caches;
|
|
|
|
/* By default drop caches on fscrypt, not otherwise. */
|
|
return user_record_storage(h) == USER_FSCRYPT;
|
|
}
|
|
|
|
AutoResizeMode user_record_auto_resize_mode(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->auto_resize_mode >= 0)
|
|
return h->auto_resize_mode;
|
|
|
|
return user_record_storage(h) == USER_LUKS ? AUTO_RESIZE_SHRINK_AND_GROW : AUTO_RESIZE_OFF;
|
|
}
|
|
|
|
uint64_t user_record_rebalance_weight(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->rebalance_weight == REBALANCE_WEIGHT_UNSET)
|
|
return REBALANCE_WEIGHT_DEFAULT;
|
|
|
|
return h->rebalance_weight;
|
|
}
|
|
|
|
static uint64_t parse_caps_strv(char **l) {
|
|
uint64_t c = 0;
|
|
int r;
|
|
|
|
STRV_FOREACH(i, l) {
|
|
r = capability_from_name(*i);
|
|
if (r < 0)
|
|
log_debug_errno(r, "Don't know capability '%s', ignoring: %m", *i);
|
|
else
|
|
c |= UINT64_C(1) << r;
|
|
}
|
|
|
|
return c;
|
|
}
|
|
|
|
uint64_t user_record_capability_bounding_set(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* Returns UINT64_MAX if no bounding set is configured (!) */
|
|
|
|
if (!h->capability_bounding_set)
|
|
return UINT64_MAX;
|
|
|
|
return parse_caps_strv(h->capability_bounding_set);
|
|
}
|
|
|
|
uint64_t user_record_capability_ambient_set(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* Returns UINT64_MAX if no ambient set is configured (!) */
|
|
|
|
if (!h->capability_ambient_set)
|
|
return UINT64_MAX;
|
|
|
|
return parse_caps_strv(h->capability_ambient_set) & user_record_capability_bounding_set(h);
|
|
}
|
|
|
|
int user_record_languages(UserRecord *h, char ***ret) {
|
|
_cleanup_strv_free_ char **l = NULL;
|
|
int r;
|
|
|
|
assert(h);
|
|
assert(ret);
|
|
|
|
if (h->preferred_language) {
|
|
l = strv_new(h->preferred_language);
|
|
if (!l)
|
|
return -ENOMEM;
|
|
}
|
|
|
|
r = strv_extend_strv(&l, h->additional_languages, /* filter_duplicates= */ true);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
*ret = TAKE_PTR(l);
|
|
return 0;
|
|
}
|
|
|
|
uint32_t user_record_tmp_limit_scale(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->tmp_limit.is_set)
|
|
return h->tmp_limit.limit_scale;
|
|
|
|
/* By default grant regular users only 80% quota */
|
|
if (user_record_disposition(h) == USER_REGULAR)
|
|
return UINT32_SCALE_FROM_PERCENT(80);
|
|
|
|
return UINT32_MAX;
|
|
}
|
|
|
|
uint32_t user_record_dev_shm_limit_scale(UserRecord *h) {
|
|
assert(h);
|
|
|
|
if (h->dev_shm_limit.is_set)
|
|
return h->dev_shm_limit.limit_scale;
|
|
|
|
/* By default grant regular users only 80% quota */
|
|
if (user_record_disposition(h) == USER_REGULAR)
|
|
return UINT32_SCALE_FROM_PERCENT(80);
|
|
|
|
return UINT32_MAX;
|
|
}
|
|
|
|
const char** user_record_self_modifiable_fields(UserRecord *h) {
|
|
/* As a rule of thumb: a setting is safe if it cannot be used by a
|
|
* user to give themselves some unfair advantage over other users on
|
|
* a given system. */
|
|
static const char *const default_fields[] = {
|
|
/* For display purposes */
|
|
"realName",
|
|
"emailAddress", /* Just the $EMAIL env var */
|
|
"iconName",
|
|
"location",
|
|
|
|
/* Basic account settings */
|
|
"shell",
|
|
"umask",
|
|
"environment",
|
|
"timeZone",
|
|
"preferredLanguage",
|
|
"additionalLanguages",
|
|
"preferredSessionLauncher",
|
|
"preferredSessionType",
|
|
"defaultArea",
|
|
|
|
/* Authentication methods */
|
|
"pkcs11TokenUri",
|
|
"fido2HmacCredential",
|
|
"recoveryKeyType",
|
|
|
|
"lastChangeUSec", /* Necessary to be able to change record at all */
|
|
"lastPasswordChangeUSec", /* Ditto, but for authentication methods */
|
|
NULL
|
|
};
|
|
|
|
assert(h);
|
|
|
|
/* Note: if the self_modifiable_fields field in UserRecord is NULL we'll apply a default, if we have
|
|
* one. If it is a non-NULL empty strv, we'll report it as explicit empty list. When the field is
|
|
* NULL and we have no default list we'll return NULL. */
|
|
|
|
/* Note that we intentionally distinguish between NULL and an empty array here */
|
|
if (h->self_modifiable_fields)
|
|
return (const char**) h->self_modifiable_fields;
|
|
|
|
return user_record_disposition(h) == USER_REGULAR ? (const char**) default_fields : NULL;
|
|
}
|
|
|
|
const char** user_record_self_modifiable_blobs(UserRecord *h) {
|
|
static const char *const default_blobs[] = {
|
|
/* For display purposes */
|
|
"avatar",
|
|
"login-background",
|
|
NULL
|
|
};
|
|
|
|
assert(h);
|
|
|
|
/* Note that we intentionally distinguish between NULL and an empty array here */
|
|
if (h->self_modifiable_blobs)
|
|
return (const char**) h->self_modifiable_blobs;
|
|
|
|
return user_record_disposition(h) == USER_REGULAR ? (const char**) default_blobs : NULL;
|
|
}
|
|
|
|
const char** user_record_self_modifiable_privileged(UserRecord *h) {
|
|
static const char *const default_fields[] = {
|
|
/* For display purposes */
|
|
"passwordHint",
|
|
|
|
/* Authentication methods */
|
|
"hashedPassword",
|
|
"pkcs11EncryptedKey",
|
|
"fido2HmacSalt",
|
|
"recoveryKey",
|
|
|
|
"sshAuthorizedKeys", /* Basically just ~/.ssh/authorized_keys */
|
|
NULL
|
|
};
|
|
|
|
assert(h);
|
|
|
|
/* Note that we intentionally distinguish between NULL and an empty array here */
|
|
if (h->self_modifiable_privileged)
|
|
return (const char**) h->self_modifiable_privileged;
|
|
|
|
return user_record_disposition(h) == USER_REGULAR ? (const char**) default_fields : NULL;
|
|
}
|
|
|
|
static int remove_self_modifiable_json_fields_common(UserRecord *current, sd_json_variant **target) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL, *blobs = NULL;
|
|
char **allowed;
|
|
int r;
|
|
|
|
assert(current);
|
|
assert(target);
|
|
|
|
if (!sd_json_variant_is_object(*target))
|
|
return -EINVAL;
|
|
|
|
v = sd_json_variant_ref(*target);
|
|
|
|
/* Handle basic fields */
|
|
allowed = (char**) user_record_self_modifiable_fields(current);
|
|
r = sd_json_variant_filter(&v, allowed);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* Handle blobs */
|
|
blobs = sd_json_variant_ref(sd_json_variant_by_key(v, "blobManifest"));
|
|
if (blobs) {
|
|
/* The blobManifest contains the sha256 hashes of the blobs,
|
|
* which are enforced by the service managing the user. So, by
|
|
* comparing the blob manifests like this, we're actually comparing
|
|
* the contents of the blob directories & files */
|
|
|
|
allowed = (char**) user_record_self_modifiable_blobs(current);
|
|
r = sd_json_variant_filter(&blobs, allowed);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (sd_json_variant_is_blank_object(blobs))
|
|
r = sd_json_variant_filter(&v, STRV_MAKE("blobManifest"));
|
|
else
|
|
r = sd_json_variant_set_field(&v, "blobManifest", blobs);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
JSON_VARIANT_REPLACE(*target, TAKE_PTR(v));
|
|
return 0;
|
|
}
|
|
|
|
static int remove_self_modifiable_json_fields(UserRecord *current, UserRecord *h, sd_json_variant **ret) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *v = NULL, *privileged = NULL;
|
|
sd_json_variant *per_machine;
|
|
char **allowed;
|
|
int r;
|
|
|
|
assert(current);
|
|
assert(h);
|
|
assert(ret);
|
|
|
|
r = user_group_record_mangle(h->json, USER_RECORD_EXTRACT_SIGNABLE|USER_RECORD_PERMISSIVE, &v, NULL);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* Handle the regular section */
|
|
r = remove_self_modifiable_json_fields_common(current, &v);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* Handle the perMachine section */
|
|
per_machine = sd_json_variant_by_key(v, "perMachine");
|
|
if (per_machine) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *new_per_machine = NULL;
|
|
sd_json_variant *e;
|
|
|
|
if (!sd_json_variant_is_array(per_machine))
|
|
return -EINVAL;
|
|
|
|
JSON_VARIANT_ARRAY_FOREACH(e, per_machine) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *z = NULL;
|
|
|
|
if (!sd_json_variant_is_object(e))
|
|
return -EINVAL;
|
|
|
|
r = per_machine_match(e, 0);
|
|
if (r < 0)
|
|
return r;
|
|
if (r == 0) {
|
|
/* It's only permissible to change anything inside of matching perMachine sections */
|
|
r = sd_json_variant_append_array(&new_per_machine, e);
|
|
if (r < 0)
|
|
return r;
|
|
continue;
|
|
}
|
|
|
|
z = sd_json_variant_ref(e);
|
|
|
|
r = remove_self_modifiable_json_fields_common(current, &z);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (!sd_json_variant_is_blank_object(z)) {
|
|
r = sd_json_variant_append_array(&new_per_machine, z);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
}
|
|
|
|
if (sd_json_variant_is_blank_array(new_per_machine))
|
|
r = sd_json_variant_filter(&v, STRV_MAKE("perMachine"));
|
|
else
|
|
r = sd_json_variant_set_field(&v, "perMachine", new_per_machine);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
/* Handle the privileged section */
|
|
privileged = sd_json_variant_ref(sd_json_variant_by_key(v, "privileged"));
|
|
if (privileged) {
|
|
allowed = (char**) user_record_self_modifiable_privileged(current);
|
|
r = sd_json_variant_filter(&privileged, allowed);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (sd_json_variant_is_blank_object(privileged))
|
|
r = sd_json_variant_filter(&v, STRV_MAKE("privileged"));
|
|
else
|
|
r = sd_json_variant_set_field(&v, "privileged", privileged);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
JSON_VARIANT_REPLACE(*ret, TAKE_PTR(v));
|
|
return 0;
|
|
}
|
|
|
|
int user_record_self_changes_allowed(UserRecord *current, UserRecord *incoming) {
|
|
_cleanup_(sd_json_variant_unrefp) sd_json_variant *vc = NULL, *vi = NULL;
|
|
int r;
|
|
|
|
assert(current);
|
|
assert(incoming);
|
|
|
|
/* We remove the fields that the user is allowed to change and then
|
|
* compare the resulting JSON records. If they are not equal, that
|
|
* means a disallowed field has been changed and thus we should
|
|
* require administrator permission to apply the changes. */
|
|
|
|
r = remove_self_modifiable_json_fields(current, current, &vc);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
/* Note that we use `current` as the source of the allowlist, and not
|
|
* `incoming`. This prevents the user from adding fields. Consider a
|
|
* scenario that would've been possible if we had messed up this check:
|
|
*
|
|
* 1) A user starts out with no group memberships and no custom allowlist.
|
|
* Thus, this user is not an administrator, and the `memberOf` and
|
|
* `selfModifiableFields` fields are unset in their record.
|
|
* 2) This user crafts a request to add the following to their record:
|
|
* { "memberOf": ["wheel"], "selfModifiableFields": ["memberOf", "selfModifiableFields"] }
|
|
* 3) We remove the `mebmerOf` and `selfModifiabileFields` fields from `incoming`
|
|
* 4) `current` and `incoming` compare as equal, so we let the change happen
|
|
* 5) the user has granted themselves administrator privileges
|
|
*/
|
|
r = remove_self_modifiable_json_fields(current, incoming, &vi);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
return sd_json_variant_equal(vc, vi);
|
|
}
|
|
|
|
uint64_t user_record_ratelimit_next_try(UserRecord *h) {
|
|
assert(h);
|
|
|
|
/* Calculates when the it's possible to login next. Returns:
|
|
*
|
|
* UINT64_MAX → Nothing known
|
|
* 0 → Right away
|
|
* Any other → Next time in CLOCK_REALTIME in usec (which could be in the past)
|
|
*/
|
|
|
|
if (h->ratelimit_begin_usec == UINT64_MAX ||
|
|
h->ratelimit_count == UINT64_MAX)
|
|
return UINT64_MAX;
|
|
|
|
if (h->ratelimit_begin_usec > now(CLOCK_REALTIME)) /* If the ratelimit time is in the future, then
|
|
* the local clock is probably incorrect. Let's
|
|
* not refuse login then. */
|
|
return UINT64_MAX;
|
|
|
|
if (h->ratelimit_count < user_record_ratelimit_burst(h))
|
|
return 0;
|
|
|
|
return usec_add(h->ratelimit_begin_usec, user_record_ratelimit_interval_usec(h));
|
|
}
|
|
|
|
bool user_record_equal(UserRecord *a, UserRecord *b) {
|
|
assert(a);
|
|
assert(b);
|
|
|
|
/* We assume that when a record is modified its JSON data is updated at the same time, hence it's
|
|
* sufficient to compare the JSON data. */
|
|
|
|
return sd_json_variant_equal(a->json, b->json);
|
|
}
|
|
|
|
bool user_record_compatible(UserRecord *a, UserRecord *b) {
|
|
assert(a);
|
|
assert(b);
|
|
|
|
/* If either lacks the regular section, we can't really decide, let's hence say they are
|
|
* incompatible. */
|
|
if (!(a->mask & b->mask & USER_RECORD_REGULAR))
|
|
return false;
|
|
|
|
return streq_ptr(a->user_name, b->user_name) &&
|
|
streq_ptr(a->realm, b->realm);
|
|
}
|
|
|
|
int user_record_compare_last_change(UserRecord *a, UserRecord *b) {
|
|
assert(a);
|
|
assert(b);
|
|
|
|
if (a->last_change_usec == b->last_change_usec)
|
|
return 0;
|
|
|
|
/* Always consider a record with a timestamp newer than one without */
|
|
if (a->last_change_usec == UINT64_MAX)
|
|
return -1;
|
|
if (b->last_change_usec == UINT64_MAX)
|
|
return 1;
|
|
|
|
return CMP(a->last_change_usec, b->last_change_usec);
|
|
}
|
|
|
|
int user_record_clone(UserRecord *h, UserRecordLoadFlags flags, UserRecord **ret) {
|
|
_cleanup_(user_record_unrefp) UserRecord *c = NULL;
|
|
int r;
|
|
|
|
assert(h);
|
|
assert(ret);
|
|
|
|
c = user_record_new();
|
|
if (!c)
|
|
return -ENOMEM;
|
|
|
|
r = user_record_load(c, h->json, flags);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
*ret = TAKE_PTR(c);
|
|
return 0;
|
|
}
|
|
|
|
int user_record_masked_equal(UserRecord *a, UserRecord *b, UserRecordMask mask) {
|
|
_cleanup_(user_record_unrefp) UserRecord *x = NULL, *y = NULL;
|
|
int r;
|
|
|
|
assert(a);
|
|
assert(b);
|
|
|
|
/* Compares the two records, but ignores anything not listed in the specified mask */
|
|
|
|
if ((a->mask & ~mask) != 0) {
|
|
r = user_record_clone(a, USER_RECORD_ALLOW(mask) | USER_RECORD_STRIP(~mask & _USER_RECORD_MASK_MAX) | USER_RECORD_PERMISSIVE, &x);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
a = x;
|
|
}
|
|
|
|
if ((b->mask & ~mask) != 0) {
|
|
r = user_record_clone(b, USER_RECORD_ALLOW(mask) | USER_RECORD_STRIP(~mask & _USER_RECORD_MASK_MAX) | USER_RECORD_PERMISSIVE, &y);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
b = y;
|
|
}
|
|
|
|
return user_record_equal(a, b);
|
|
}
|
|
|
|
int user_record_test_blocked(UserRecord *h) {
|
|
usec_t n;
|
|
|
|
/* Checks whether access to the specified user shall be allowed at the moment. Returns:
|
|
*
|
|
* -ESTALE: Record is from the future
|
|
* -ENOLCK: Record is blocked
|
|
* -EL2HLT: Record is not valid yet
|
|
* -EL3HLT: Record is not valid anymore
|
|
*
|
|
*/
|
|
|
|
assert(h);
|
|
|
|
if (h->locked > 0)
|
|
return -ENOLCK;
|
|
|
|
n = now(CLOCK_REALTIME);
|
|
|
|
if (h->not_before_usec != UINT64_MAX && n < h->not_before_usec)
|
|
return -EL2HLT;
|
|
if (h->not_after_usec != UINT64_MAX && n > h->not_after_usec)
|
|
return -EL3HLT;
|
|
|
|
if (h->last_change_usec != UINT64_MAX &&
|
|
h->last_change_usec > n) /* Complain during log-ins when the record is from the future */
|
|
return -ESTALE;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int user_record_test_password_change_required(UserRecord *h) {
|
|
bool change_permitted;
|
|
usec_t n;
|
|
|
|
assert(h);
|
|
|
|
/* Checks whether the user must change the password when logging in
|
|
|
|
-EKEYREVOKED: Change password now because admin said so
|
|
-EOWNERDEAD: Change password now because it expired
|
|
-EKEYREJECTED: Password is expired, no changing is allowed
|
|
-EKEYEXPIRED: Password is about to expire, warn user
|
|
-ENETDOWN: Record has expiration info but no password change timestamp
|
|
-EROFS: No password change required nor permitted
|
|
-ESTALE: RTC likely incorrect, last password change is in the future
|
|
0: No password change required, but permitted
|
|
*/
|
|
|
|
/* If a password change request has been set explicitly, it overrides everything */
|
|
if (h->password_change_now > 0)
|
|
return -EKEYREVOKED;
|
|
|
|
n = now(CLOCK_REALTIME);
|
|
|
|
/* Password change in the future? Then our RTC is likely incorrect */
|
|
if (h->last_password_change_usec != UINT64_MAX &&
|
|
h->last_password_change_usec > n &&
|
|
(h->password_change_min_usec != UINT64_MAX ||
|
|
h->password_change_max_usec != UINT64_MAX ||
|
|
h->password_change_inactive_usec != UINT64_MAX))
|
|
return -ESTALE;
|
|
|
|
/* Then, let's check if password changing is currently allowed at all */
|
|
if (h->password_change_min_usec != UINT64_MAX) {
|
|
|
|
/* Expiry configured but no password change timestamp known? */
|
|
if (h->last_password_change_usec == UINT64_MAX)
|
|
return -ENETDOWN;
|
|
|
|
if (h->password_change_min_usec >= UINT64_MAX - h->last_password_change_usec)
|
|
change_permitted = false;
|
|
else
|
|
change_permitted = n >= h->last_password_change_usec + h->password_change_min_usec;
|
|
|
|
} else
|
|
change_permitted = true;
|
|
|
|
/* Let's check whether the password has expired. */
|
|
if (!(h->password_change_max_usec == UINT64_MAX ||
|
|
h->password_change_max_usec >= UINT64_MAX - h->last_password_change_usec)) {
|
|
|
|
uint64_t change_before;
|
|
|
|
/* Expiry configured but no password change timestamp known? */
|
|
if (h->last_password_change_usec == UINT64_MAX)
|
|
return -ENETDOWN;
|
|
|
|
/* Password is in inactive phase? */
|
|
if (h->password_change_inactive_usec != UINT64_MAX &&
|
|
h->password_change_inactive_usec < UINT64_MAX - h->password_change_max_usec) {
|
|
usec_t added;
|
|
|
|
added = h->password_change_inactive_usec + h->password_change_max_usec;
|
|
if (added < UINT64_MAX - h->last_password_change_usec &&
|
|
n >= h->last_password_change_usec + added)
|
|
return -EKEYREJECTED;
|
|
}
|
|
|
|
/* Password needs to be changed now? */
|
|
change_before = h->last_password_change_usec + h->password_change_max_usec;
|
|
if (n >= change_before)
|
|
return change_permitted ? -EOWNERDEAD : -EKEYREJECTED;
|
|
|
|
/* Warn user? */
|
|
if (h->password_change_warn_usec != UINT64_MAX &&
|
|
(change_before < h->password_change_warn_usec ||
|
|
n >= change_before - h->password_change_warn_usec))
|
|
return change_permitted ? -EKEYEXPIRED : -EROFS;
|
|
}
|
|
|
|
/* No password changing necessary */
|
|
return change_permitted ? 0 : -EROFS;
|
|
}
|
|
|
|
bool user_record_is_root(const UserRecord *u) {
|
|
assert(u);
|
|
|
|
return u->uid == 0 || streq_ptr(u->user_name, "root");
|
|
}
|
|
|
|
bool user_record_is_nobody(const UserRecord *u) {
|
|
assert(u);
|
|
|
|
return u->uid == UID_NOBODY || STRPTR_IN_SET(u->user_name, NOBODY_USER_NAME, "nobody");
|
|
}
|
|
|
|
bool user_record_matches_user_name(const UserRecord *u, const char *user_name) {
|
|
assert(u);
|
|
assert(user_name);
|
|
|
|
if (streq_ptr(u->user_name, user_name))
|
|
return true;
|
|
|
|
if (streq_ptr(u->user_name_and_realm_auto, user_name))
|
|
return true;
|
|
|
|
if (strv_contains(u->aliases, user_name))
|
|
return true;
|
|
|
|
const char *realm = strrchr(user_name, '@');
|
|
if (realm && streq_ptr(realm+1, u->realm))
|
|
STRV_FOREACH(a, u->aliases)
|
|
if (startswith(user_name, *a) == realm)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
int suitable_blob_filename(const char *name) {
|
|
/* Enforces filename requirements as described in docs/USER_RECORD_BULK_DIRS.md */
|
|
return filename_is_valid(name) &&
|
|
in_charset(name, URI_UNRESERVED) &&
|
|
name[0] != '.';
|
|
}
|
|
|
|
bool userdb_match_is_set(const UserDBMatch *match) {
|
|
if (!match)
|
|
return false;
|
|
|
|
return !strv_isempty(match->fuzzy_names) ||
|
|
!FLAGS_SET(match->disposition_mask, USER_DISPOSITION_MASK_ALL) ||
|
|
match->uid_min > 0 ||
|
|
match->uid_max < UID_INVALID-1;
|
|
}
|
|
|
|
void userdb_match_done(UserDBMatch *match) {
|
|
assert(match);
|
|
strv_free(match->fuzzy_names);
|
|
}
|
|
|
|
bool user_name_fuzzy_match(const char *names[], size_t n_names, char **matches) {
|
|
assert(names || n_names == 0);
|
|
|
|
/* Checks if any of the user record strings in the names[] array matches any of the search strings in
|
|
* the matches** strv fuzzily. */
|
|
|
|
FOREACH_ARRAY(n, names, n_names) {
|
|
if (!*n)
|
|
continue;
|
|
|
|
_cleanup_free_ char *lcn = strdup(*n);
|
|
if (!lcn)
|
|
return -ENOMEM;
|
|
|
|
ascii_strlower(lcn);
|
|
|
|
STRV_FOREACH(i, matches) {
|
|
_cleanup_free_ char *lc = strdup(*i);
|
|
if (!lc)
|
|
return -ENOMEM;
|
|
|
|
ascii_strlower(lc);
|
|
|
|
/* First do substring check */
|
|
if (strstr(lcn, lc))
|
|
return true;
|
|
|
|
/* Then do some fuzzy string comparison (but only if the needle is non-trivially long) */
|
|
if (strlen(lc) >= 5 && strlevenshtein(lcn, lc) < 3)
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
bool user_record_match(UserRecord *u, const UserDBMatch *match) {
|
|
assert(u);
|
|
|
|
if (!match)
|
|
return true;
|
|
|
|
if (!uid_is_valid(u->uid))
|
|
return false;
|
|
|
|
if (u->uid < match->uid_min || u->uid > match->uid_max)
|
|
return false;
|
|
|
|
if (!BIT_SET(match->disposition_mask, user_record_disposition(u)))
|
|
return false;
|
|
|
|
if (!strv_isempty(match->fuzzy_names)) {
|
|
|
|
/* Note this array of names is sparse, i.e. various entries listed in it will be
|
|
* NULL. Because of that we are not using a NULL terminated strv here, but a regular
|
|
* array. */
|
|
const char* names[] = {
|
|
u->user_name,
|
|
user_record_user_name_and_realm(u),
|
|
u->real_name,
|
|
u->email_address,
|
|
u->cifs_user_name,
|
|
};
|
|
|
|
if (!user_name_fuzzy_match(names, ELEMENTSOF(names), match->fuzzy_names) &&
|
|
!user_name_fuzzy_match((const char**) u->aliases, strv_length(u->aliases), match->fuzzy_names))
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
int json_dispatch_dispositions_mask(const char *name, sd_json_variant *variant, sd_json_dispatch_flags_t flags, void *userdata) {
|
|
uint64_t *mask = ASSERT_PTR(userdata);
|
|
|
|
if (sd_json_variant_is_null(variant)) {
|
|
*mask = UINT64_MAX;
|
|
return 0;
|
|
}
|
|
|
|
if (!sd_json_variant_is_array(variant))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array.", strna(name));
|
|
|
|
uint64_t m = 0;
|
|
for (size_t i = 0; i < sd_json_variant_elements(variant); i++) {
|
|
sd_json_variant *e;
|
|
const char *a;
|
|
|
|
e = sd_json_variant_by_index(variant, i);
|
|
if (!sd_json_variant_is_string(e))
|
|
return json_log(variant, flags, SYNTHETIC_ERRNO(EINVAL), "JSON field '%s' is not an array of strings.", strna(name));
|
|
|
|
assert_se(a = sd_json_variant_string(e));
|
|
|
|
UserDisposition d = user_disposition_from_string(a);
|
|
if (d < 0)
|
|
return json_log(e, flags, d, "JSON field '%s' contains an invalid user disposition type: %s", strna(name), a);
|
|
|
|
m |= INDEX_TO_MASK(uint64_t, d);
|
|
}
|
|
|
|
*mask = m;
|
|
return 0;
|
|
}
|
|
|
|
static const char* const user_storage_table[_USER_STORAGE_MAX] = {
|
|
[USER_CLASSIC] = "classic",
|
|
[USER_LUKS] = "luks",
|
|
[USER_DIRECTORY] = "directory",
|
|
[USER_SUBVOLUME] = "subvolume",
|
|
[USER_FSCRYPT] = "fscrypt",
|
|
[USER_CIFS] = "cifs",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP(user_storage, UserStorage);
|
|
|
|
static const char* const user_disposition_table[_USER_DISPOSITION_MAX] = {
|
|
[USER_INTRINSIC] = "intrinsic",
|
|
[USER_SYSTEM] = "system",
|
|
[USER_DYNAMIC] = "dynamic",
|
|
[USER_REGULAR] = "regular",
|
|
[USER_CONTAINER] = "container",
|
|
[USER_FOREIGN] = "foreign",
|
|
[USER_RESERVED] = "reserved",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP(user_disposition, UserDisposition);
|
|
|
|
static const char* const auto_resize_mode_table[_AUTO_RESIZE_MODE_MAX] = {
|
|
[AUTO_RESIZE_OFF] = "off",
|
|
[AUTO_RESIZE_GROW] = "grow",
|
|
[AUTO_RESIZE_SHRINK_AND_GROW] = "shrink-and-grow",
|
|
};
|
|
|
|
DEFINE_STRING_TABLE_LOOKUP(auto_resize_mode, AutoResizeMode);
|