diff options
Diffstat (limited to 'usr/src/lib/nsswitch/ldap/common/getgrent.c')
| -rw-r--r-- | usr/src/lib/nsswitch/ldap/common/getgrent.c | 445 |
1 files changed, 445 insertions, 0 deletions
diff --git a/usr/src/lib/nsswitch/ldap/common/getgrent.c b/usr/src/lib/nsswitch/ldap/common/getgrent.c new file mode 100644 index 0000000000..1533ad8b3b --- /dev/null +++ b/usr/src/lib/nsswitch/ldap/common/getgrent.c @@ -0,0 +1,445 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License, Version 1.0 only + * (the "License"). You may not use this file except in compliance + * with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright 2003 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +#include <grp.h> +#include "ldap_common.h" + +/* String which may need to be removed from beginning of group password */ +#define _CRYPT "{CRYPT}" +#define _NO_PASSWD_VAL "" + +/* Group attributes filters */ +#define _G_NAME "cn" +#define _G_GID "gidnumber" +#define _G_PASSWD "userpassword" +#define _G_MEM "memberuid" + +#define _F_GETGRNAM "(&(objectClass=posixGroup)(cn=%s))" +#define _F_GETGRNAM_SSD "(&(%%s)(cn=%s))" +#define _F_GETGRGID "(&(objectClass=posixGroup)(gidNumber=%ld))" +#define _F_GETGRGID_SSD "(&(%%s)(gidNumber=%ld))" +#define _F_GETGRMEM "(&(objectClass=posixGroup)(memberUid=%s))" +#define _F_GETGRMEM_SSD "(&(%%s)(memberUid=%s))" + +static const char *gr_attrs[] = { + _G_NAME, + _G_GID, + _G_PASSWD, + _G_MEM, + (char *)NULL +}; + + +/* + * _nss_ldap_group2ent is the data marshaling method for the group getXbyY + * (e.g., getgrnam(), getgrgid(), getgrent()) backend processes. This method + * is called after a successful ldap search has been performed. This method + * will parse the ldap search values into struct group = argp->buf.buffer + * which the frontend process expects. Three error conditions are expected + * and returned to nsswitch. + */ + +static int +_nss_ldap_group2ent(ldap_backend_ptr be, nss_XbyY_args_t *argp) +{ + int i, j; + int nss_result; + int buflen = (int)0; + int firstime = (int)1; + unsigned long len = 0L; + char **mp = NULL; + char *val = (char *)NULL; + char *buffer = (char *)NULL; + char *ceiling = (char *)NULL; + struct group *grp = (struct group *)NULL; + ns_ldap_result_t *result = be->result; + ns_ldap_attr_t *attrptr; + + buffer = argp->buf.buffer; + buflen = (size_t)argp->buf.buflen; + if (!argp->buf.result) { + nss_result = (int)NSS_STR_PARSE_ERANGE; + goto result_grp2ent; + } + grp = (struct group *)argp->buf.result; + ceiling = buffer + buflen; + mp = grp->gr_mem = (char **)NULL; + + /* initialize no group password */ + grp->gr_passwd = (char *)NULL; + nss_result = (int)NSS_STR_PARSE_SUCCESS; + (void) memset(argp->buf.buffer, 0, buflen); + + attrptr = getattr(result, 0); + if (attrptr == NULL) { + nss_result = (int)NSS_STR_PARSE_PARSE; + goto result_grp2ent; + } + + for (i = 0; i < result->entry->attr_count; i++) { + attrptr = getattr(result, i); + if (attrptr == NULL) { + nss_result = (int)NSS_STR_PARSE_PARSE; + goto result_grp2ent; + } + if (strcasecmp(attrptr->attrname, _G_NAME) == 0) { + if ((attrptr->attrvalue[0] == NULL) || + (len = strlen(attrptr->attrvalue[0])) < 1) { + nss_result = (int)NSS_STR_PARSE_PARSE; + goto result_grp2ent; + } + grp->gr_name = buffer; + buffer += len + 1; + if (buffer > ceiling) { + nss_result = (int)NSS_STR_PARSE_ERANGE; + goto result_grp2ent; + } + (void) strcpy(grp->gr_name, attrptr->attrvalue[0]); + continue; + } + if (strcasecmp(attrptr->attrname, _G_PASSWD) == 0) { + val = attrptr->attrvalue[0]; + /* + * Preen "{crypt}" if necessary. + * If the password does not include the {crypt} prefix + * then the password may be plain text. And thus + * perhaps crypt(3c) should be used to encrypt it. + * Currently the password is copied verbatim. + */ + if (strncasecmp(val, _CRYPT, + (sizeof (_CRYPT) - 1)) == 0) + val += (sizeof (_CRYPT) - 1); + len = strlen(val); + grp->gr_passwd = buffer; + buffer += len + 1; + if (buffer > ceiling) { + nss_result = (int)NSS_STR_PARSE_ERANGE; + goto result_grp2ent; + } + (void) strcpy(grp->gr_passwd, val); + continue; + } + if (strcasecmp(attrptr->attrname, _G_GID) == 0) { + if (strlen(attrptr->attrvalue[0]) == 0) { + nss_result = (int)NSS_STR_PARSE_PARSE; + goto result_grp2ent; + } + errno = 0; + grp->gr_gid = (gid_t)strtol(attrptr->attrvalue[0], + (char **)NULL, 10); + if (errno != 0) { + nss_result = (int)NSS_STR_PARSE_PARSE; + goto result_grp2ent; + } + continue; + } + if (strcasecmp(attrptr->attrname, _G_MEM) == 0) { + for (j = 0; j < attrptr->value_count; j++) { + if (firstime) { + mp = grp->gr_mem = + (char **)ROUND_UP(buffer, + sizeof (char **)); + buffer = (char *)grp->gr_mem + + sizeof (char *) * + (attrptr->value_count + 1); + buffer = (char *)ROUND_UP(buffer, + sizeof (char **)); + if (buffer > ceiling) { + nss_result = + (int)NSS_STR_PARSE_ERANGE; + goto result_grp2ent; + } + firstime = (int)0; + } + if (attrptr->attrvalue[j] == NULL) { + nss_result = (int)NSS_STR_PARSE_PARSE; + goto result_grp2ent; + } + len = strlen(attrptr->attrvalue[j]); + if (len == 0) + continue; + *mp = buffer; + buffer += len + 1; + if (buffer > ceiling) { + nss_result = (int)NSS_STR_PARSE_ERANGE; + goto result_grp2ent; + } + (void) strcpy(*mp++, attrptr->attrvalue[j]); + continue; + } + } + } + /* Don't leave password as null */ + if (grp->gr_passwd == (char *)NULL) { + /* + * The password may be missing; rfc2307bis defines + * the 'posixGroup' attributes 'authPassword' and + * 'userPassword' as being optional. Or a directory + * access control may be preventing us from reading + * the password. Currently we don't know which it is. + * If it's an access problem then perhaps the password + * should be set to "*NP*". But for now a simple empty + * string is returned. + */ + grp->gr_passwd = buffer; + buffer += sizeof (_NO_PASSWD_VAL); + if (buffer > ceiling) { + nss_result = (int)NSS_STR_PARSE_ERANGE; + goto result_grp2ent; + } + (void) strcpy(grp->gr_passwd, _NO_PASSWD_VAL); + } + if (mp == NULL) { + mp = grp->gr_mem = (char **)ROUND_UP(buffer, sizeof (char **)); + buffer = (char *)grp->gr_mem + sizeof (char *); + buffer = (char *)ROUND_UP(buffer, sizeof (char **)); + if (buffer > ceiling) { + nss_result = (int)NSS_STR_PARSE_ERANGE; + goto result_grp2ent; + } + } + *mp = NULL; + +#ifdef DEBUG + (void) fprintf(stdout, "\n[getgrent.c: _nss_ldap_group2ent]\n"); + (void) fprintf(stdout, " gr_name: [%s]\n", grp->gr_name); + if (grp->gr_passwd != (char *)NULL) + (void) fprintf(stdout, " gr_passwd: [%s]\n", + grp->gr_passwd); + (void) fprintf(stdout, " gr_gid: [%ld]\n", grp->gr_gid); + if (mp != NULL) { + for (mp = grp->gr_mem; *mp != NULL; mp++) + (void) fprintf(stdout, " gr_mem: [%s]\n", *mp); + } +#endif /* DEBUG */ + +result_grp2ent: + + (void) __ns_ldap_freeResult(&be->result); + return ((int)nss_result); +} + + +/* + * getbynam gets a group entry by name. This function constructs an ldap + * search filter using the name invocation parameter and the getgrnam search + * filter defined. Once the filter is constructed, we searche for a matching + * entry and marshal the data results into struct group for the frontend + * process. The function _nss_ldap_group2ent performs the data marshaling. + */ + +static nss_status_t +getbynam(ldap_backend_ptr be, void *a) +{ + nss_XbyY_args_t *argp = (nss_XbyY_args_t *)a; + char searchfilter[SEARCHFILTERLEN]; + char userdata[SEARCHFILTERLEN]; + char groupname[SEARCHFILTERLEN]; + int ret; + +#ifdef DEBUG + (void) fprintf(stdout, "\n[getgrent.c: getbyname]\n"); +#endif /* DBEUG */ + if (_ldap_filter_name(groupname, argp->key.name, sizeof (groupname)) + != 0) + return ((nss_status_t)NSS_NOTFOUND); + + ret = snprintf(searchfilter, sizeof (searchfilter), + _F_GETGRNAM, groupname); + if (ret >= sizeof (searchfilter) || ret < 0) + return ((nss_status_t)NSS_NOTFOUND); + + ret = snprintf(userdata, sizeof (userdata), _F_GETGRNAM_SSD, groupname); + if (ret >= sizeof (userdata) || ret < 0) + return ((nss_status_t)NSS_NOTFOUND); + + return ((nss_status_t)_nss_ldap_lookup(be, argp, + _GROUP, searchfilter, NULL, + _merge_SSD_filter, userdata)); +} + + +/* + * getbygid gets a group entry by number. This function constructs an ldap + * search filter using the name invocation parameter and the getgrgid search + * filter defined. Once the filter is constructed, we searche for a matching + * entry and marshal the data results into struct group for the frontend + * process. The function _nss_ldap_group2ent performs the data marshaling. + */ + +static nss_status_t +getbygid(ldap_backend_ptr be, void *a) +{ + nss_XbyY_args_t *argp = (nss_XbyY_args_t *)a; + char searchfilter[SEARCHFILTERLEN]; + char userdata[SEARCHFILTERLEN]; + int ret; + +#ifdef DEBUG + (void) fprintf(stdout, "\n[getgrent.c: getbygid]\n"); +#endif /* DBEUG */ + ret = snprintf(searchfilter, sizeof (searchfilter), + _F_GETGRGID, (long)argp->key.uid); + if (ret >= sizeof (searchfilter) || ret < 0) + return ((nss_status_t)NSS_NOTFOUND); + + ret = snprintf(userdata, sizeof (userdata), + _F_GETGRGID_SSD, (long)argp->key.uid); + if (ret >= sizeof (userdata) || ret < 0) + return ((nss_status_t)NSS_NOTFOUND); + + return ((nss_status_t)_nss_ldap_lookup(be, argp, + _GROUP, searchfilter, NULL, + _merge_SSD_filter, userdata)); + +} + + +/* + * getbymember returns all groups a user is defined in. This function + * uses different architectural procedures than the other group backend + * system calls because it's a private interface. This function constructs + * an ldap search filter using the name invocation parameter. Once the + * filter is constructed, we search for all matching groups counting + * and storing each group name, gid, etc. Data marshaling is used for + * group processing. The function _nss_ldap_group2ent() performs the + * data marshaling. + * + * (const char *)argp->username; (size_t)strlen(argp->username); + * (gid_t)argp->gid_array; (int)argp->maxgids; + * (int)argp->numgids; + */ + +static nss_status_t +getbymember(ldap_backend_ptr be, void *a) +{ + int i, j, k; + int gcnt = (int)0; + char **groupvalue, **membervalue; + nss_status_t lstat; + nss_XbyY_args_t argb; + static nss_XbyY_buf_t *gb; + struct nss_groupsbymem *argp = (struct nss_groupsbymem *)a; + char searchfilter[SEARCHFILTERLEN]; + char userdata[SEARCHFILTERLEN]; + char name[SEARCHFILTERLEN]; + ns_ldap_result_t *result; + ns_ldap_entry_t *curEntry; + char *username; + gid_t gid; + int ret; + +#ifdef DEBUG + (void) fprintf(stdout, "\n[getgrent.c: getbymember]\n"); +#endif /* DBEUG */ + + NSS_XbyY_ALLOC(&gb, sizeof (struct group), NSS_BUFLEN_GROUP); + NSS_XbyY_INIT(&argb, gb->result, gb->buffer, gb->buflen, 0); + + if (strcmp(argp->username, "") == 0 || + strcmp(argp->username, "root") == 0) + return ((nss_status_t)NSS_NOTFOUND); + + if (_ldap_filter_name(name, argp->username, sizeof (name)) != 0) + return ((nss_status_t)NSS_NOTFOUND); + + ret = snprintf(searchfilter, sizeof (searchfilter), _F_GETGRMEM, name); + if (ret >= sizeof (searchfilter) || ret < 0) + return ((nss_status_t)NSS_NOTFOUND); + + ret = snprintf(userdata, sizeof (userdata), _F_GETGRMEM_SSD, name); + if (ret >= sizeof (userdata) || ret < 0) + return ((nss_status_t)NSS_NOTFOUND); + + gcnt = (int)argp->numgids; + lstat = (nss_status_t)_nss_ldap_nocb_lookup(be, &argb, + _GROUP, searchfilter, NULL, + _merge_SSD_filter, userdata); + if (lstat != (nss_status_t)NS_LDAP_SUCCESS) + return ((nss_status_t)lstat); + if (be->result == NULL) + return (NSS_NOTFOUND); + username = (char *)argp->username; + result = (ns_ldap_result_t *)be->result; + curEntry = (ns_ldap_entry_t *)result->entry; + for (i = 0; i < result->entries_count; i++) { + membervalue = __ns_ldap_getAttr(curEntry, "memberUid"); + if (membervalue) { + for (j = 0; membervalue[j]; j++) { + if (strcmp(membervalue[j], username) == NULL) { + groupvalue = __ns_ldap_getAttr(curEntry, + "gidnumber"); + gid = (gid_t)strtol(groupvalue[0], + (char **)NULL, 10); + if (argp->numgids < argp->maxgids) { + for (k = 0; k < argp->numgids; + k++) { + if (argp->gid_array[k] == gid) + /* already exists */ + break; + } + if (k == argp->numgids) + argp->gid_array[argp->numgids++] + = gid; + } + break; + } + } + } + curEntry = curEntry->next; + } + + __ns_ldap_freeResult((ns_ldap_result_t **)&be->result); + NSS_XbyY_FREE(&gb); + if (gcnt == argp->numgids) + return ((nss_status_t)NSS_NOTFOUND); + + return ((nss_status_t)NSS_SUCCESS); +} + +static ldap_backend_op_t gr_ops[] = { + _nss_ldap_destr, + _nss_ldap_endent, + _nss_ldap_setent, + _nss_ldap_getent, + getbynam, + getbygid, + getbymember +}; + + +/*ARGSUSED0*/ +nss_backend_t * +_nss_ldap_group_constr(const char *dummy1, const char *dummy2, + const char *dummy3) +{ + + return ((nss_backend_t *)_nss_ldap_constr(gr_ops, + sizeof (gr_ops)/sizeof (gr_ops[0]), _GROUP, gr_attrs, + _nss_ldap_group2ent)); +} |
