1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
|
#include <stdio.h>
#include <ctype.h>
#include <pwd.h>
#include <stdlib.h>
#include <unistd.h>
/*
Launches Retrace Server worker (worker.py) with root permissions.
Binary needs to be owned by root and needs to set SUID bit.
*/
int main(int argc, char **argv)
{
char command[256];
FILE *pipe;
int i;
struct passwd *apache_user;
const char *apache_username = "apache";
if (argc != 2)
{
fprintf(stderr, "Usage: %s task_id\n", argv[0]);
return 1;
}
if (setuid(0) != 0)
{
fprintf(stderr, "You must run %s with root permissions.\n", argv[0]);
return 2;
}
for (i = 0; argv[1][i]; ++i)
if (!isdigit(argv[1][i]))
{
fputs("Task ID may only contain digits.", stderr);
return 3;
}
apache_user = getpwnam(apache_username);
if (!apache_user)
{
fprintf(stderr, "User \"%s\" not found.\n", apache_username);
return 4;
}
sprintf(command, "%d", apache_user->pw_uid);
setenv("SUDO_USER", apache_username, 1);
setenv("SUDO_UID", command, 1);
/* required by mock to be able to write into result directory */
setenv("SUDO_GID", "0", 1);
/* launch worker.py */
sprintf(command, "/usr/bin/python /usr/share/abrt-retrace/worker.py \"%s\"", argv[1]);
pipe = popen(command, "r");
if (pipe == NULL)
{
fputs("Unable to run 'worker.py'.", stderr);
return 5;
}
return pclose(pipe) >> 8;
}
|