1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
|
/*
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
*
* SPDX-License-Identifier: BSD-2-Clause
*/
#include <AK/ScopeGuard.h>
#include <LibCore/Account.h>
#include <LibCore/ArgsParser.h>
#include <LibCore/GetPassword.h>
#include <stdio.h>
#include <unistd.h>
extern "C" int main(int, char**);
int main(int argc, char** argv)
{
if (pledge("stdio rpath tty exec id", nullptr) < 0) {
perror("pledge");
return 1;
}
if (!isatty(STDIN_FILENO)) {
warnln("{}: standard in is not a terminal", argv[0]);
return 1;
}
const char* user = nullptr;
Core::ArgsParser args_parser;
args_parser.add_positional_argument(user, "User to switch to (defaults to user with UID 0)", "user", Core::ArgsParser::Required::No);
args_parser.parse(argc, argv);
if (geteuid() != 0) {
warnln("Not running as root :(");
return 1;
}
auto account_or_error = (user)
? Core::Account::from_name(user)
: Core::Account::from_uid(0);
if (account_or_error.is_error()) {
warnln("Core::Account::from_name: {}", account_or_error.error());
return 1;
}
if (pledge("stdio tty exec id", nullptr) < 0) {
perror("pledge");
return 1;
}
const auto& account = account_or_error.value();
if (getuid() != 0 && account.has_password()) {
auto password = Core::get_password();
if (password.is_error()) {
warnln("{}", password.error());
return 1;
}
if (!account.authenticate(password.value())) {
warnln("Incorrect or disabled password.");
return 1;
}
}
if (pledge("stdio exec id", nullptr) < 0) {
perror("pledge");
return 1;
}
if (!account.login()) {
perror("Core::Account::login");
return 1;
}
if (pledge("stdio exec", nullptr) < 0) {
perror("pledge");
return 1;
}
execl(account.shell().characters(), account.shell().characters(), nullptr);
perror("execl");
return 1;
}
|