/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2009 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#include "metad_local.h"
#include <metad.h>
#include <grp.h>
#include <pwd.h>
#include <synch.h>
#include <netdir.h>
#include <netdb.h>
#include <sdssc.h>
/*ARGSUSED*/
void
{
}
/*
* check for trusted host and user
*/
static int
)
{
int i;
/* check for root */
/*LINTED*/
goto out;
/* get hostnames */
md_eprintf("transp->xp_netid == NULL\n");
goto out;
}
#ifdef DEBUG
nc_perror("getnetconfigent(transp->xp_netid)");
#endif
goto out;
}
!= 0) || (hservlistp == NULL)) {
#ifdef DEBUG
netdir_perror("netdir_getbyaddr(transp->xp_rtaddr)");
#endif
goto out;
}
/* check hostnames */
for (i = 0; (i < hservlistp->h_cnt); ++i) {
/* localhost is OK */
rval = 0;
goto out;
}
/* check for remote root access */
rval = 0;
goto out;
}
/*
* If the names are now different it indicates
* that hostname was converted to a nodeid. This
* will only occur if hostname is part of the same
* cluster that the current node is in.
* If the machine is not running in a cluster than
* sdssc_cm_nm2nid is a noop which leaves inplace
* alone.
*/
rval = 0;
goto out;
}
}
/* cleanup, return success */
out:
if (inplace)
if (hservlistp != NULL)
return (rval);
}
/*
* check for user in local group 14
*/
static int
)
{
char **namep;
/* get user info, check default GID */
return (-1);
return (0);
/* check in group */
return (-1);
++namep) {
return (0);
}
return (-1);
}
/*
* check AUTH_SYS
*/
static int
int amode, /* R_OK | W_OK */
)
{
/* for read, anything is OK */
return (0);
/* single thread (not really needed if daemon stays single threaded) */
(void) mutex_lock(&mx);
/* check for remote root or METAD_GID */
/*LINTED*/
(check_host(rqstp) == 0)) {
(void) mutex_unlock(&mx);
return (0);
}
/* return failure */
(void) mutex_unlock(&mx);
}
/*
* setup RPC service
*
* if can't authenticate return < 0
* any other error return > 0
*/
int
int amode, /* R_OK | W_OK */
)
{
if (sdssc_bind_library() == SDSSC_ERROR) {
return (1);
}
/*
* if we have no rpc service info, we must have been
* called recursively from within the daemon
*/
mdclrerror(ep);
return (0); /* OK */
}
/*
* initialize
*/
*ep = mdnullerror;
/*
* check credentials
*/
/* UNIX flavor */
case AUTH_SYS:
{
return (1); /* error */
break;
}
/* can't authenticate anything else */
default:
return (-1); /* weak authentication */
}
/*
* (re)initialize
*/
return (1); /* error */
return (1);
sr_validate();
/* success */
return (0);
}
/*ARGSUSED*/
int
{
return (0);
}
int
int amode, /* R_OK | W_OK */
)
{
return (0);
/* The set is not locked */
return (1);
}
return (0);
}
/* The set is locked, do we have the key? */
return (0);
return (1);
}