summaryrefslogtreecommitdiffstats
path: root/src/shared/bus-polkit.c
diff options
context:
space:
mode:
authorDavid Tardon <dtardon@redhat.com>2023-02-03 14:05:46 +0100
committerDavid Tardon <dtardon@redhat.com>2023-06-19 12:32:26 +0200
commitd2c50a176d038d10bff9823ece07db153f36a147 (patch)
tree1d73214198e691dc3720dc7be8526af80805fb30 /src/shared/bus-polkit.c
parentbus-polkit: return NULL from _free function (diff)
downloadsystemd-d2c50a176d038d10bff9823ece07db153f36a147.tar.xz
systemd-d2c50a176d038d10bff9823ece07db153f36a147.zip
bus-polkit: move verification to a separate function
Diffstat (limited to 'src/shared/bus-polkit.c')
-rw-r--r--src/shared/bus-polkit.c100
1 files changed, 58 insertions, 42 deletions
diff --git a/src/shared/bus-polkit.c b/src/shared/bus-polkit.c
index db2801d7a4..de87771bcd 100644
--- a/src/shared/bus-polkit.c
+++ b/src/shared/bus-polkit.c
@@ -246,6 +246,60 @@ fail:
return r;
}
+static int process_polkit_response(
+ AsyncPolkitQuery *q,
+ sd_bus_message *call,
+ const char *action,
+ const char **details,
+ Hashmap **registry,
+ sd_bus_error *ret_error) {
+
+ int authorized, challenge, r;
+
+ assert(q);
+ assert(call);
+ assert(action);
+ assert(registry);
+ assert(ret_error);
+
+ assert(q->action);
+ assert(q->reply);
+
+ /* If the operation we want to authenticate changed between the first and the second time,
+ * let's not use this authentication, it might be out of date as the object and context we
+ * operate on might have changed. */
+ if (!streq(q->action, action) || !strv_equal(q->details, (char**) details))
+ return -ESTALE;
+
+ if (sd_bus_message_is_method_error(q->reply, NULL)) {
+ const sd_bus_error *e;
+
+ e = sd_bus_message_get_error(q->reply);
+
+ /* Treat no PK available as access denied */
+ if (bus_error_is_unknown_service(e))
+ return -EACCES;
+
+ /* Copy error from polkit reply */
+ sd_bus_error_copy(ret_error, e);
+ return -sd_bus_error_get_errno(e);
+ }
+
+ r = sd_bus_message_enter_container(q->reply, 'r', "bba{ss}");
+ if (r >= 0)
+ r = sd_bus_message_read(q->reply, "bb", &authorized, &challenge);
+ if (r < 0)
+ return r;
+
+ if (authorized)
+ return 1;
+
+ if (challenge)
+ return sd_bus_error_set(ret_error, SD_BUS_ERROR_INTERACTIVE_AUTHORIZATION_REQUIRED, "Interactive authentication required.");
+
+ return -EACCES;
+}
+
#endif
int bus_verify_polkit_async(
@@ -271,48 +325,10 @@ int bus_verify_polkit_async(
#if ENABLE_POLKIT
AsyncPolkitQuery *q = hashmap_get(*registry, call);
- if (q) {
- int authorized, challenge;
-
- /* This is the second invocation of this function, and there's already a response from
- * polkit, let's process it */
- assert(q->reply);
-
- /* If the operation we want to authenticate changed between the first and the second time,
- * let's not use this authentication, it might be out of date as the object and context we
- * operate on might have changed. */
- if (!streq(q->action, action) ||
- !strv_equal(q->details, (char**) details))
- return -ESTALE;
-
- if (sd_bus_message_is_method_error(q->reply, NULL)) {
- const sd_bus_error *e;
-
- e = sd_bus_message_get_error(q->reply);
-
- /* Treat no PK available as access denied */
- if (bus_error_is_unknown_service(e))
- return -EACCES;
-
- /* Copy error from polkit reply */
- sd_bus_error_copy(ret_error, e);
- return -sd_bus_error_get_errno(e);
- }
-
- r = sd_bus_message_enter_container(q->reply, 'r', "bba{ss}");
- if (r >= 0)
- r = sd_bus_message_read(q->reply, "bb", &authorized, &challenge);
- if (r < 0)
- return r;
-
- if (authorized)
- return 1;
-
- if (challenge)
- return sd_bus_error_set(ret_error, SD_BUS_ERROR_INTERACTIVE_AUTHORIZATION_REQUIRED, "Interactive authentication required.");
-
- return -EACCES;
- }
+ /* This is the second invocation of this function, and there's already a response from
+ * polkit, let's process it */
+ if (q)
+ return process_polkit_response(q, call, action, details, registry, ret_error);
#endif
r = sd_bus_query_sender_privilege(call, capability);