1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
|
// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
// vim: ts=8 sw=2 smarttab
/*
* Ceph - scalable distributed file system
*
* Copyright (C) 2011 New Dream Network
*
* This is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License version 2.1, as published by the Free Software
* Foundation. See file COPYING.
*
*/
#include <string.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <fcntl.h>
#include <keyutils.h>
#include <sys/types.h>
#include "common/armor.h"
#include "common/safe_io.h"
int read_secret_from_file(const char *filename, char *secret, size_t max_len)
{
char *end;
int fd;
int len;
fd = open(filename, O_RDONLY);
if (fd < 0) {
perror("unable to read secretfile");
return -1;
}
len = safe_read(fd, secret, max_len);
if (len <= 0) {
perror("unable to read secret from file");
return -1;
}
end = secret;
while (end < secret + len && *end && *end != '\n' && *end != '\r')
end++;
*end = '\0';
close(fd);
return 0;
}
static int add_secret_to_kernel(const char *secret, const char *key_name)
{
/* try to submit key to kernel via the keys api */
key_serial_t serial;
int ret;
int secret_len = strlen(secret);
char payload[((secret_len * 3) / 4) + 4];
ret = ceph_unarmor(payload, payload+sizeof(payload), secret, secret+secret_len);
if (ret < 0) {
fprintf(stderr, "secret is not valid base64: %s.\n", strerror(-ret));
return ret;
}
serial = add_key("ceph", key_name, payload, sizeof(payload), KEY_SPEC_USER_KEYRING);
if (serial < 0) {
ret = -errno;
fprintf(stderr, "error adding secret to kernel, key name %s: %s.\n", key_name, strerror(-ret));
}
return ret;
}
int get_secret_option(const char *secret, const char *key_name, char *secret_option, size_t max_len)
{
int ret;
int olen = strlen(secret) + strlen(key_name) + 7;
char option[olen+1];
option[olen] = '\0';
ret = add_secret_to_kernel(secret, key_name);
if (ret < 0) {
if (ret == -ENODEV || ret == -ENOSYS) {
/* running against older kernel; fall back to secret= in options */
snprintf(option, olen, "secret=%s", secret);
ret = 0;
} else {
fprintf(stderr, "adding ceph secret key to kernel failed: %s.\n", strerror(-ret));
return ret;
}
} else {
/* add key= option to identify key to use */
snprintf(option, olen, "key=%s", key_name);
}
if (strlen(option) + 1 > max_len) {
ret = -ERANGE;
} else {
secret_option[max_len-1] = '\0';
strncpy(secret_option, option, max_len-1);
}
return ret;
}
|