1*42e22086SApple OSS Distributions #include <darwintest.h>
2*42e22086SApple OSS Distributions
3*42e22086SApple OSS Distributions #include <TargetConditionals.h>
4*42e22086SApple OSS Distributions #include <limits.h>
5*42e22086SApple OSS Distributions #include <stdio.h>
6*42e22086SApple OSS Distributions #include <stdlib.h>
7*42e22086SApple OSS Distributions #include <string.h>
8*42e22086SApple OSS Distributions #include <sys/errno.h>
9*42e22086SApple OSS Distributions #include <unistd.h>
10*42e22086SApple OSS Distributions
11*42e22086SApple OSS Distributions #if !TARGET_OS_OSX
12*42e22086SApple OSS Distributions #include <pwd.h>
13*42e22086SApple OSS Distributions #include <sys/types.h>
14*42e22086SApple OSS Distributions #include <uuid/uuid.h>
15*42e22086SApple OSS Distributions #endif
16*42e22086SApple OSS Distributions
17*42e22086SApple OSS Distributions #include "drop_priv.h"
18*42e22086SApple OSS Distributions
19*42e22086SApple OSS Distributions #if TARGET_OS_OSX
20*42e22086SApple OSS Distributions #define INVOKER_UID "SUDO_UID"
21*42e22086SApple OSS Distributions #define INVOKER_GID "SUDO_GID"
22*42e22086SApple OSS Distributions #define ID_MAX (unsigned long)UINT_MAX
23*42e22086SApple OSS Distributions static unsigned
_get_sudo_invoker(const char * var)24*42e22086SApple OSS Distributions _get_sudo_invoker(const char *var)
25*42e22086SApple OSS Distributions {
26*42e22086SApple OSS Distributions char *value_str = getenv(var);
27*42e22086SApple OSS Distributions T_QUIET; T_WITH_ERRNO; T_ASSERT_NOTNULL(value_str,
28*42e22086SApple OSS Distributions "Not running under sudo, getenv(\"%s\") failed", var);
29*42e22086SApple OSS Distributions T_QUIET; T_ASSERT_NE_CHAR(*value_str, '\0',
30*42e22086SApple OSS Distributions "getenv(\"%s\") returned an empty string", var);
31*42e22086SApple OSS Distributions
32*42e22086SApple OSS Distributions char *endp;
33*42e22086SApple OSS Distributions unsigned long value = strtoul(value_str, &endp, 10);
34*42e22086SApple OSS Distributions T_QUIET; T_WITH_ERRNO; T_ASSERT_EQ_CHAR(*endp, '\0',
35*42e22086SApple OSS Distributions "strtoul(\"%s\") not called on a valid number", value_str);
36*42e22086SApple OSS Distributions T_QUIET; T_WITH_ERRNO; T_ASSERT_NE_ULONG(value, ULONG_MAX,
37*42e22086SApple OSS Distributions "strtoul(\"%s\") overflow", value_str);
38*42e22086SApple OSS Distributions
39*42e22086SApple OSS Distributions T_QUIET; T_ASSERT_NE_ULONG(value, 0ul, "%s invalid", var);
40*42e22086SApple OSS Distributions T_QUIET; T_ASSERT_LT_ULONG(value, ID_MAX, "%s invalid", var);
41*42e22086SApple OSS Distributions return (unsigned)value;
42*42e22086SApple OSS Distributions }
43*42e22086SApple OSS Distributions #endif /* TARGET_OS_OSX */
44*42e22086SApple OSS Distributions
45*42e22086SApple OSS Distributions void
drop_priv(void)46*42e22086SApple OSS Distributions drop_priv(void)
47*42e22086SApple OSS Distributions {
48*42e22086SApple OSS Distributions #if TARGET_OS_OSX
49*42e22086SApple OSS Distributions uid_t lower_uid = _get_sudo_invoker(INVOKER_UID);
50*42e22086SApple OSS Distributions gid_t lower_gid = _get_sudo_invoker(INVOKER_GID);
51*42e22086SApple OSS Distributions #else
52*42e22086SApple OSS Distributions struct passwd *pw = getpwnam("mobile");
53*42e22086SApple OSS Distributions T_QUIET; T_WITH_ERRNO; T_ASSERT_NOTNULL(pw, "getpwnam(\"mobile\")");
54*42e22086SApple OSS Distributions uid_t lower_uid = pw->pw_uid;
55*42e22086SApple OSS Distributions gid_t lower_gid = pw->pw_gid;
56*42e22086SApple OSS Distributions #endif
57*42e22086SApple OSS Distributions T_ASSERT_POSIX_SUCCESS(setgid(lower_gid), "Change group to %u", lower_gid);
58*42e22086SApple OSS Distributions T_ASSERT_POSIX_SUCCESS(setuid(lower_uid), "Change user to %u", lower_uid);
59*42e22086SApple OSS Distributions }
60*42e22086SApple OSS Distributions
61*42e22086SApple OSS Distributions bool
running_as_root(void)62*42e22086SApple OSS Distributions running_as_root(void)
63*42e22086SApple OSS Distributions {
64*42e22086SApple OSS Distributions return geteuid() == 0;
65*42e22086SApple OSS Distributions }
66