diff options
author | amw <none@none> | 2007-10-25 16:34:29 -0700 |
---|---|---|
committer | amw <none@none> | 2007-10-25 16:34:29 -0700 |
commit | da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0 (patch) | |
tree | 65be91fb78a6a66183197595333f2e8aafb4640a /usr/src/lib/smbsrv/libsmb/common/smb_domain.c | |
parent | e845e33dd0d1aea22db7edaa8c7d43955d24609b (diff) | |
download | illumos-gate-da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0.tar.gz |
PSARC/2007/218 caller_context_t in all VOPs
PSARC/2007/227 VFS Feature Registration and ACL on Create
PSARC/2007/244 ZFS Case-insensitive support
PSARC/2007/315 Extensible Attribute Interfaces
PSARC/2007/394 ls(1) new command line options '-/' and '-%': CIFS system attributes support
PSARC/2007/403 Modified Access Checks for CIFS
PSARC/2007/410 Add system attribute support to chmod(1)
PSARC/2007/432 CIFS system attributes support for cp(1), pack(1), unpack(1), compress(1) and uncompress(1)
PSARC/2007/444 Rescind SETTABLE Attribute
PSARC/2007/459 CIFS system attributes support for cpio(1), pax(1), tar(1)
PSARC/2007/546 Update utilities to match CIFS system attributes changes.
PSARC/2007/560 ZFS sharesmb property
4890717 want append-only files
6417428 Case-insensitive file system name lookup to support CIFS
6417435 DOS attributes and additional timestamps to support for CIFS
6417442 File system quarantined and modified attributes to support an integrated Anti-Virus service
6417453 FS boolean property for rejecting/allowing invalid UTF-8 sequences in file names
6473733 RFE: Need support for open-deny modes
6473755 RFE: Need ability to reconcile oplock and delegation conflicts
6494624 sharemgr needs to support CIFS shares better
6546705 All vnode operations need to pass caller_context_t
6546706 Need VOP_SETATTR/VOP_GETATTR to support new, optional attributes
6546893 Solaris system attribute support
6550962 ZFS ACL inheritance needs to be enhanced to support Automatic Inheritance
6553589 RFE: VFS Feature Registration facility
6553770 RFE: ZFS support for ACL-on-CREATE (PSARC 2007/227)
6565581 ls(1) should support file system attributes proposed in PSARC/2007/315
6566784 NTFS streams are not copied along with the files.
6576205 cp(1), pack(1) and compress(1) should support file system attributes proposed in PSARC/2007/315
6578875 RFE: kernel interfaces for nbmand need improvement
6578883 RFE: VOP_SHRLOCK needs additional access types
6578885 chmod(1) should support file system attributes proposed in PSARC/2007/315
6578886 RFE: disallow nbmand state to change on remount
6583349 ACL parser needs to support audit/alarm ACE types
6590347 tar(1) should support filesystem attributes proposed in PSARC/2007/315
6597357 *tar* xv@ doesn't show the hidden directory even though it is restored
6597360 *tar* should re-init xattr info if openat() fails during extraction of and extended attribute
6597368 *tar* cannot restore hard linked extended attributes
6597374 *tar* doesn't display "x " when hard linked attributes are restored
6597375 *tar* extended attribute header off by one
6614861 *cpio* incorrectly archives extended system attributes with -@
6614896 *pax* incorrectly archives extended system attributes with -@
6615225 *tar* incorrectly archives extended system attributes with -@
6617183 CIFS Service - PSARC 2006/715
Diffstat (limited to 'usr/src/lib/smbsrv/libsmb/common/smb_domain.c')
-rw-r--r-- | usr/src/lib/smbsrv/libsmb/common/smb_domain.c | 394 |
1 files changed, 394 insertions, 0 deletions
diff --git a/usr/src/lib/smbsrv/libsmb/common/smb_domain.c b/usr/src/lib/smbsrv/libsmb/common/smb_domain.c new file mode 100644 index 0000000000..22ea5e61fb --- /dev/null +++ b/usr/src/lib/smbsrv/libsmb/common/smb_domain.c @@ -0,0 +1,394 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License (the "License"). + * You may not use this file except in compliance with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright 2007 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +/* + * This file defines the NT domain environment values and the domain + * database interface. The database is a single linked list of + * structures containing domain type, name and SID information. + */ + +#include <strings.h> +#include <unistd.h> +#include <netdb.h> +#include <syslog.h> +#include <synch.h> + +#include <smbsrv/smbinfo.h> +#include <smbsrv/string.h> +#include <smbsrv/ntsid.h> +#include <smbsrv/alloc.h> + +#include <smbsrv/libsmb.h> + + +static void nt_domain_unlist(nt_domain_t *); + +/* + * Valid domain type identifiers as text. This table must be kept + * in step with the nt_domain_type_t enum in ntdomain.h. + */ +static char *nt_domain_type_name[NT_DOMAIN_NUM_TYPES] = { + "null", + "builtin", + "local", + "primary", + "account", + "trusted", + "untrusted" +}; + + +static rwlock_t nt_domain_lock; +static nt_domain_t *nt_domain_list; + +/* + * nt_domain_init + * + * NT domain database one time initialization. This function should + * be called during module installation. + * + * Returns 0 on successful domain initialization. Less than zero otherwise. + */ +int +nt_domain_init(char *resource_domain, uint32_t secmode) +{ + nt_domain_t *domain; + nt_sid_t *sid; + char *sidstr; + char *lsidstr; + char hostname[MAXHOSTNAMELEN]; + + if (rwlock_init(&nt_domain_lock, USYNC_THREAD, NULL)) + return (SMB_DOMAIN_NODOMAIN_SID); + + if (smb_gethostname(hostname, MAXHOSTNAMELEN, 1) != 0) { + (void) rwlock_destroy(&nt_domain_lock); + return (SMB_DOMAIN_NOMACHINE_SID); + } + + lsidstr = smb_config_get_localsid(); + + if (lsidstr) { + sid = nt_sid_strtosid(lsidstr); + + if (sid) { + domain = nt_domain_new(NT_DOMAIN_LOCAL, hostname, sid); + (void) nt_domain_add(domain); + free(sid); + } + free(lsidstr); + } else { + (void) rwlock_destroy(&nt_domain_lock); + return (SMB_DOMAIN_NOMACHINE_SID); + } + + if (secmode == SMB_SECMODE_DOMAIN) { + sid = nt_sid_strtosid(NT_BUILTIN_DOMAIN_SIDSTR); + domain = nt_domain_new(NT_DOMAIN_BUILTIN, "BUILTIN", sid); + (void) nt_domain_add(domain); + free(sid); + + smb_config_rdlock(); + sidstr = smb_config_get(SMB_CI_DOMAIN_SID); + if (sidstr) { + sid = nt_sid_strtosid(sidstr); + smb_config_unlock(); + domain = nt_domain_new(NT_DOMAIN_PRIMARY, + resource_domain, sid); + (void) nt_domain_add(domain); + free(sid); + } else { + smb_config_unlock(); + (void) rwlock_destroy(&nt_domain_lock); + return (SMB_DOMAIN_NODOMAIN_SID); + } + + } + return (0); +} + +/* + * nt_domain_new + * + * Allocate and initialize a new domain structure. On success, a pointer to + * the new domain structure is returned. Otherwise a null pointer is returned. + */ +nt_domain_t * +nt_domain_new(nt_domain_type_t type, char *name, nt_sid_t *sid) +{ + nt_domain_t *new_domain; + + if ((name == NULL) || (sid == NULL)) + return (NULL); + + if (type == NT_DOMAIN_NULL || type >= NT_DOMAIN_NUM_TYPES) + return (NULL); + + if ((new_domain = malloc(sizeof (nt_domain_t))) == NULL) + return (NULL); + + bzero(new_domain, sizeof (nt_domain_t)); + new_domain->type = type; + new_domain->name = strdup(name); + new_domain->sid = nt_sid_dup(sid); + + return (new_domain); +} + +/* + * nt_domain_delete + * + * Free the memory used by the specified domain structure. + */ +void +nt_domain_delete(nt_domain_t *domain) +{ + if (domain) { + free(domain->name); + free(domain->sid); + free(domain); + } +} + + +/* + * nt_domain_add + * + * Add a domain structure to the global list. There is no checking + * for duplicates. If it's the primary domain, we save the SID in the + * environment. Returns a pointer to the new domain entry on success. + * Otherwise a null pointer is returned. + */ +nt_domain_t * +nt_domain_add(nt_domain_t *new_domain) +{ + char *sidstr; + + if (new_domain == NULL) + return (NULL); + + (void) rw_wrlock(&nt_domain_lock); + + new_domain->next = nt_domain_list; + nt_domain_list = new_domain; + + if (new_domain->type == NT_DOMAIN_PRIMARY) { + sidstr = nt_sid_format(new_domain->sid); + smb_config_wrlock(); + (void) smb_config_set(SMB_CI_DOMAIN_SID, sidstr); + smb_config_unlock(); + free(sidstr); + } + (void) rw_unlock(&nt_domain_lock); + + return (new_domain); +} + + +/* + * nt_domain_remove + * + * Remove a domain from the global list. The memory + * used by the structure is not freed. + */ +void +nt_domain_remove(nt_domain_t *domain) +{ + (void) rw_wrlock(&nt_domain_lock); + nt_domain_unlist(domain); + (void) rw_unlock(&nt_domain_lock); +} + + +/* + * nt_domain_flush + * + * Flush all domains of the specified type from the list. This is + * useful for things like updating the list of trusted domains. + */ +void +nt_domain_flush(nt_domain_type_t domain_type) +{ + nt_domain_t *domain = nt_domain_list; + + (void) rw_wrlock(&nt_domain_lock); + while (domain) { + if (domain->type == domain_type) { + nt_domain_unlist(domain); + nt_domain_delete(domain); + domain = nt_domain_list; + continue; + } + domain = domain->next; + } + (void) rw_unlock(&nt_domain_lock); +} + +/* + * nt_domain_xlat_type + * + * Translate a domain type into a text string. + */ +char * +nt_domain_xlat_type(nt_domain_type_t domain_type) +{ + if (domain_type < NT_DOMAIN_NUM_TYPES) + return (nt_domain_type_name[domain_type]); + else + return ("unknown"); +} + + +/* + * nt_domain_xlat_type_name + * + * Translate a domain type test string into a domain type. + */ +nt_domain_type_t +nt_domain_xlat_type_name(char *type_name) +{ + int i; + + for (i = 0; i < NT_DOMAIN_NUM_TYPES; ++i) + if (utf8_strcasecmp(nt_domain_type_name[i], type_name) == 0) + return (i); + + return (NT_DOMAIN_NUM_TYPES); +} + + +/* + * nt_domain_lookup_name + * + * Lookup a domain by its domain name. If the domain is in the list, + * a pointer to it is returned. Otherwise a null pointer is returned. + */ +nt_domain_t * +nt_domain_lookup_name(char *domain_name) +{ + nt_domain_t *domain = nt_domain_list; + + (void) rw_rdlock(&nt_domain_lock); + while (domain) { + if (utf8_strcasecmp(domain->name, domain_name) == 0) + break; + + domain = domain->next; + } + (void) rw_unlock(&nt_domain_lock); + + return (domain); +} + + +/* + * nt_domain_lookup_sid + * + * Lookup a domain by its domain SID. If the domain is in the list, + * a pointer to it is returned. Otherwise a null pointer is returned. + */ +nt_domain_t * +nt_domain_lookup_sid(nt_sid_t *domain_sid) +{ + nt_domain_t *domain = nt_domain_list; + + (void) rw_rdlock(&nt_domain_lock); + while (domain) { + if (nt_sid_is_equal(domain->sid, domain_sid)) + break; + + domain = domain->next; + } + (void) rw_unlock(&nt_domain_lock); + + return (domain); +} + + +/* + * nt_domain_lookupbytype + * + * Lookup a domain by its type. The first matching entry in the list + * is returned. Otherwise a null pointer is returned. + */ +nt_domain_t * +nt_domain_lookupbytype(nt_domain_type_t type) +{ + nt_domain_t *domain = nt_domain_list; + + (void) rw_rdlock(&nt_domain_lock); + while (domain) { + if (domain->type == type) + break; + + domain = domain->next; + } + (void) rw_unlock(&nt_domain_lock); + + return (domain); +} + + +/* + * nt_domain_local_sid + * + * Return a pointer to the local domain SID. Each system has a SID that + * represents the local domain, which is named after the local hostname. + * The local domain SID must exist. + */ +nt_sid_t * +nt_domain_local_sid(void) +{ + nt_domain_t *domain = nt_domain_list; + + (void) rw_rdlock(&nt_domain_lock); + while (domain) { + if (domain->type == NT_DOMAIN_LOCAL) + break; + + domain = domain->next; + } + (void) rw_unlock(&nt_domain_lock); + + return (domain->sid); +} + + +static void +nt_domain_unlist(nt_domain_t *domain) +{ + nt_domain_t **ppdomain = &nt_domain_list; + + while (*ppdomain) { + if (*ppdomain == domain) { + *ppdomain = domain->next; + domain->next = NULL; + return; + } + ppdomain = &(*ppdomain)->next; + } +} |