polkit.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. *
  4. * D-Bus helper library
  5. *
  6. * Copyright (C) 2004-2011 Marcel Holtmann <marcel@holtmann.org>
  7. *
  8. *
  9. */
  10. #ifdef HAVE_CONFIG_H
  11. #include <config.h>
  12. #endif
  13. #include <errno.h>
  14. #include <dbus/dbus.h>
  15. #include <glib.h>
  16. int polkit_check_authorization(DBusConnection *conn,
  17. const char *action, gboolean interaction,
  18. void (*function) (dbus_bool_t authorized,
  19. void *user_data),
  20. void *user_data, int timeout);
  21. static void add_dict_with_string_value(DBusMessageIter *iter,
  22. const char *key, const char *str)
  23. {
  24. DBusMessageIter dict, entry, value;
  25. dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
  26. DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
  27. DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
  28. DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
  29. dbus_message_iter_open_container(&dict, DBUS_TYPE_DICT_ENTRY,
  30. NULL, &entry);
  31. dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
  32. dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
  33. DBUS_TYPE_STRING_AS_STRING, &value);
  34. dbus_message_iter_append_basic(&value, DBUS_TYPE_STRING, &str);
  35. dbus_message_iter_close_container(&entry, &value);
  36. dbus_message_iter_close_container(&dict, &entry);
  37. dbus_message_iter_close_container(iter, &dict);
  38. }
  39. static void add_empty_string_dict(DBusMessageIter *iter)
  40. {
  41. DBusMessageIter dict;
  42. dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
  43. DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
  44. DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_STRING_AS_STRING
  45. DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
  46. dbus_message_iter_close_container(iter, &dict);
  47. }
  48. static void add_arguments(DBusConnection *conn, DBusMessageIter *iter,
  49. const char *action, dbus_uint32_t flags)
  50. {
  51. const char *busname = dbus_bus_get_unique_name(conn);
  52. const char *kind = "system-bus-name";
  53. const char *cancel = "";
  54. DBusMessageIter subject;
  55. dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT,
  56. NULL, &subject);
  57. dbus_message_iter_append_basic(&subject, DBUS_TYPE_STRING, &kind);
  58. add_dict_with_string_value(&subject, "name", busname);
  59. dbus_message_iter_close_container(iter, &subject);
  60. dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &action);
  61. add_empty_string_dict(iter);
  62. dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &flags);
  63. dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &cancel);
  64. }
  65. static dbus_bool_t parse_result(DBusMessageIter *iter)
  66. {
  67. DBusMessageIter result;
  68. dbus_bool_t authorized, challenge;
  69. dbus_message_iter_recurse(iter, &result);
  70. dbus_message_iter_get_basic(&result, &authorized);
  71. dbus_message_iter_get_basic(&result, &challenge);
  72. return authorized;
  73. }
  74. struct authorization_data {
  75. void (*function) (dbus_bool_t authorized, void *user_data);
  76. void *user_data;
  77. };
  78. static void authorization_reply(DBusPendingCall *call, void *user_data)
  79. {
  80. struct authorization_data *data = user_data;
  81. DBusMessage *reply;
  82. DBusMessageIter iter;
  83. dbus_bool_t authorized = FALSE;
  84. reply = dbus_pending_call_steal_reply(call);
  85. if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
  86. goto done;
  87. if (dbus_message_has_signature(reply, "(bba{ss})") == FALSE)
  88. goto done;
  89. dbus_message_iter_init(reply, &iter);
  90. authorized = parse_result(&iter);
  91. done:
  92. if (data->function != NULL)
  93. data->function(authorized, data->user_data);
  94. dbus_message_unref(reply);
  95. dbus_pending_call_unref(call);
  96. }
  97. #define AUTHORITY_DBUS "org.freedesktop.PolicyKit1"
  98. #define AUTHORITY_INTF "org.freedesktop.PolicyKit1.Authority"
  99. #define AUTHORITY_PATH "/org/freedesktop/PolicyKit1/Authority"
  100. int polkit_check_authorization(DBusConnection *conn,
  101. const char *action, gboolean interaction,
  102. void (*function) (dbus_bool_t authorized,
  103. void *user_data),
  104. void *user_data, int timeout)
  105. {
  106. struct authorization_data *data;
  107. DBusMessage *msg;
  108. DBusMessageIter iter;
  109. DBusPendingCall *call;
  110. dbus_uint32_t flags = 0x00000000;
  111. if (conn == NULL)
  112. return -EINVAL;
  113. data = dbus_malloc0(sizeof(*data));
  114. if (data == NULL)
  115. return -ENOMEM;
  116. msg = dbus_message_new_method_call(AUTHORITY_DBUS, AUTHORITY_PATH,
  117. AUTHORITY_INTF, "CheckAuthorization");
  118. if (msg == NULL) {
  119. dbus_free(data);
  120. return -ENOMEM;
  121. }
  122. if (interaction == TRUE)
  123. flags |= 0x00000001;
  124. if (action == NULL)
  125. action = "org.freedesktop.policykit.exec";
  126. dbus_message_iter_init_append(msg, &iter);
  127. add_arguments(conn, &iter, action, flags);
  128. if (dbus_connection_send_with_reply(conn, msg,
  129. &call, timeout) == FALSE) {
  130. dbus_message_unref(msg);
  131. dbus_free(data);
  132. return -EIO;
  133. }
  134. if (call == NULL) {
  135. dbus_message_unref(msg);
  136. dbus_free(data);
  137. return -EIO;
  138. }
  139. data->function = function;
  140. data->user_data = user_data;
  141. dbus_pending_call_set_notify(call, authorization_reply,
  142. data, dbus_free);
  143. dbus_message_unref(msg);
  144. return 0;
  145. }