/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright (c) 2008, 2011, Oracle and/or its affiliates. All rights reserved.
*/
#include <stdlib.h>
#include <strings.h>
#include <unistd.h>
#include <syslog.h>
#include <thread.h>
#include <synch.h>
#include <grp.h>
#include <assert.h>
#include <libintl.h>
#include <smbsrv/libsmb.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/param.h>
#include <sqlite3.h>
#define SMB_LGRP_POSIX_IDX 0
#define SMB_LGRP_BUILTIN_IDX 1
#define SMB_LGRP_DB_NAME "/var/smb/smbgroup_v3.db"
#define SMB_LGRP_DB_TIMEOUT 3000 /* in millisecond */
#define SMB_LGRP_DB_VERMAJOR 1
#define SMB_LGRP_DB_VERMINOR 0
#define SMB_LGRP_DB_MAGIC 0x4C475250 /* LGRP */
#define SMB_LGRP_DB_ORD SQLITE_OPEN_READONLY
#define SMB_LGRP_DB_ORW SQLITE_OPEN_READWRITE
#define SMB_LGRP_DB_ORWC SQLITE_OPEN_READWRITE | SQLITE_OPEN_CREATE
#define SMB_LGRP_DB_ADDMEMBER 1
#define SMB_LGRP_DB_DELMEMBER 2
/*
* members column of the groups table is an array of
* member structure smb_lgmid_t defined below.
*
* privs column of the groups table is an array of bytes
* where each byte is the id of an enable privilege
*/
#define SMB_LGRP_DB_SQL \
"CREATE TABLE db_info (" \
" ver_major INTEGER," \
" ver_minor INTEGER," \
" magic INTEGER" \
");" \
"" \
"CREATE TABLE domains (" \
" dom_idx INTEGER PRIMARY KEY," \
" dom_sid TEXT UNIQUE," \
" dom_cnt INTEGER" \
");" \
"" \
"CREATE UNIQUE INDEX domsid_idx ON domains (dom_sid);" \
"" \
"CREATE TABLE groups (" \
" name TEXT PRIMARY KEY," \
" sid_idx INTEGER," \
" sid_rid INTEGER," \
" sid_type INTEGER," \
" sid_attrs INTEGER," \
" comment TEXT," \
" n_privs INTEGER," \
" privs BLOB," \
" n_members INTEGER," \
" members BLOB" \
");" \
"" \
"CREATE INDEX grprid_idx ON groups (sid_rid);"
/*
* Number of groups table columns
*/
#define SMB_LGRP_GTBL_NCOL 10
#define SMB_LGRP_GTBL_NAME 0
#define SMB_LGRP_GTBL_SIDIDX 1
#define SMB_LGRP_GTBL_SIDRID 2
#define SMB_LGRP_GTBL_SIDTYP 3
#define SMB_LGRP_GTBL_SIDATR 4
#define SMB_LGRP_GTBL_CMNT 5
#define SMB_LGRP_GTBL_NPRIVS 6
#define SMB_LGRP_GTBL_PRIVS 7
#define SMB_LGRP_GTBL_NMEMBS 8
#define SMB_LGRP_GTBL_MEMBS 9
#define SMB_LGRP_INFO_NONE 0x00
#define SMB_LGRP_INFO_NAME 0x01
#define SMB_LGRP_INFO_CMNT 0x02
#define SMB_LGRP_INFO_SID 0x04
#define SMB_LGRP_INFO_PRIV 0x08
#define SMB_LGRP_INFO_MEMB 0x10
#define SMB_LGRP_INFO_ALL 0x1F
#define SMB_LGRP_PGRP_GRPTMP "/etc/gtmp"
#define SMB_LGRP_PGRP_GRPBUFSIZ 5120
#define SMB_LGRP_PGRP_GROUP "/etc/group"
#define SMB_LGRP_PGRP_MAXGLEN 9 /* max length of group name */
#define SMB_LGRP_PGRP_DEFRID 99 /* max reserved id */
#define SMB_LGRP_PGRP_NOTUNIQUE 0
#define SMB_LGRP_PGRP_RESERVED 1
#define SMB_LGRP_PGRP_UNIQUE 2
#define SMB_LGRP_PGRP_TOOBIG 3
#define SMB_LGRP_PGRP_INVALID 4
#define NULL_MSGCHK(msg) ((msg) ? (msg) : "NULL")
/* Member ID */
typedef struct smb_lgmid {
uint32_t m_idx;
uint32_t m_rid;
uint16_t m_type;
} smb_lgmid_t;
#define SMB_LGRP_MID_HEXSZ 32
/* Member list */
typedef struct smb_lgmlist {
uint32_t m_cnt;
char *m_ids;
} smb_lgmlist_t;
/* Privilege ID */
typedef uint8_t smb_lgpid_t;
/* Privilege list */
typedef struct smb_lgplist {
uint32_t p_cnt;
smb_lgpid_t *p_ids;
} smb_lgplist_t;
/* Local group iterator */
struct smb_giter {
sqlite3_stmt *sgi_vm;
sqlite3 *sgi_db;
uint32_t sgi_nerr;
};
static struct {
int errnum;
char *errmsg;
} errtab[] = {
{ SMB_LGRP_SUCCESS, "success" },
{ SMB_LGRP_INVALID_ARG, "invalid argument" },
{ SMB_LGRP_INVALID_MEMBER, "invalid member type" },
{ SMB_LGRP_INVALID_NAME, "invalid name" },
{ SMB_LGRP_NOT_FOUND, "group not found" },
{ SMB_LGRP_EXISTS, "group exists" },
{ SMB_LGRP_NO_SID, "cannot obtain a SID" },
{ SMB_LGRP_NO_LOCAL_SID, "cannot get the machine SID" },
{ SMB_LGRP_SID_NOTLOCAL, "local account has non-local SID" },
{ SMB_LGRP_WKSID,
"operation not permitted on well-known account" },
{ SMB_LGRP_NO_MEMORY, "not enough memory" },
{ SMB_LGRP_DB_ERROR, "database operation error" },
{ SMB_LGRP_DBINIT_ERROR, "database initialization error" },
{ SMB_LGRP_INTERNAL_ERROR, "internal error" },
{ SMB_LGRP_MEMBER_IN_GROUP, "member already in group" },
{ SMB_LGRP_MEMBER_NOT_IN_GROUP, "not a member" },
{ SMB_LGRP_NO_SUCH_PRIV, "no such privilege" },
{ SMB_LGRP_NO_SUCH_DOMAIN, "no such domain SID" },
{ SMB_LGRP_PRIV_HELD, "privilege already held" },
{ SMB_LGRP_PRIV_NOT_HELD, "privilege not held" },
{ SMB_LGRP_BAD_DATA, "bad data" },
{ SMB_LGRP_NO_MORE, "no more groups" },
{ SMB_LGRP_DBOPEN_FAILED, "database open failed" },
{ SMB_LGRP_DBEXEC_FAILED, "database operation failed" },
{ SMB_LGRP_DBINIT_FAILED, "database initialization failed" },
{ SMB_LGRP_DOMLKP_FAILED, "domain SID lookup failed" },
{ SMB_LGRP_DOMINS_FAILED, "domain SID insert failed" },
{ SMB_LGRP_INSERT_FAILED, "group insert failed" },
{ SMB_LGRP_DELETE_FAILED, "group delete failed" },
{ SMB_LGRP_UPDATE_FAILED, "group update failed" },
{ SMB_LGRP_LOOKUP_FAILED, "group lookup failed" },
{ SMB_LGRP_OFFLINE, "local group service is offline" },
{ SMB_LGRP_POSIXCREATE_FAILED, "posix group create failed" }
};
/*
* Serialization for the local group API.
*/
typedef struct {
mutex_t lg_mutex;
cond_t lg_cv;
boolean_t lg_online;
uint32_t lg_refcnt;
smb_sid_t *lg_machine_sid;
} smb_localgrp_t;
static smb_localgrp_t smb_localgrp;
static boolean_t smb_lgrp_enter(void);
static void smb_lgrp_exit(void);
static int smb_lgrp_db_init(void);
static sqlite3 *smb_lgrp_db_open(int);
static void smb_lgrp_db_close(sqlite3 *);
static int smb_lgrp_db_setinfo(sqlite3 *);
static boolean_t smb_lgrp_gtbl_exists(sqlite3 *, char *);
static int smb_lgrp_gtbl_lookup(sqlite3 *, int, smb_group_t *, int, ...);
static int smb_lgrp_gtbl_insert(sqlite3 *, smb_group_t *);
static int smb_lgrp_gtbl_update(sqlite3 *, char *, smb_group_t *, int);
static int smb_lgrp_gtbl_delete(sqlite3 *, char *);
static int smb_lgrp_gtbl_update_mlist(sqlite3 *, char *, smb_gsid_t *, int);
static int smb_lgrp_gtbl_update_plist(sqlite3 *, char *, uint8_t, boolean_t);
static int smb_lgrp_gtbl_count(sqlite3 *, int, int *);
static int smb_lgrp_dtbl_insert(sqlite3 *, char *, uint32_t *);
static int smb_lgrp_dtbl_fuid(sqlite3 *, smb_sid_t *, uint16_t,
uint32_t *, uint32_t *);
static int smb_lgrp_dtbl_getsid(sqlite3 *, uint32_t, smb_sid_t **);
static int smb_lgrp_mlist_add(smb_lgmlist_t *, smb_lgmid_t *, smb_lgmlist_t *);
static int smb_lgrp_mlist_del(smb_lgmlist_t *, smb_lgmid_t *, smb_lgmlist_t *);
static int smb_lgrp_plist_add(smb_lgplist_t *, smb_lgpid_t, smb_lgplist_t *);
static int smb_lgrp_plist_del(smb_lgplist_t *, smb_lgpid_t, smb_lgplist_t *);
static void smb_lgrp_encode_privset(smb_group_t *, smb_lgplist_t *);
static int smb_lgrp_decode(smb_group_t *, char **, int, sqlite3 *);
static int smb_lgrp_decode_privset(smb_group_t *, char *, char *);
static int smb_lgrp_decode_members(smb_group_t *, char *, char *, sqlite3 *);
static void smb_lgrp_set_default_privs(smb_group_t *);
static boolean_t smb_lgrp_normalize_name(char *);
static boolean_t smb_lgrp_chkmember(uint16_t);
static int smb_lgrp_getsid(int, uint32_t *, uint16_t, sqlite3 *, smb_sid_t **);
static int smb_lgrp_getgid(uint32_t rid, gid_t *gid);
static boolean_t smb_lgrp_exists(char *);
static int smb_lgrp_pgrp_add(char *);
static void smb_lgrp_free_columns(int, char **);
/*
* smb_lgrp_add
*
* Create a local group with the given name and comment.
* This new group doesn't have any members and no enabled
* privileges.
*
* No well-known accounts can be added other than Administators,
* Backup Operators and Power Users. These built-in groups
* won't have any members when created but a set of default
* privileges will be enabled for them.
*/
int
smb_lgrp_add(char *name, char *cmnt)
{
smb_wka_t *wka;
struct group *pxgrp;
smb_group_t grp;
smb_sid_t *sid = NULL;
sqlite3 *db;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if (cmnt && (strlen(cmnt) > SMB_LGRP_COMMENT_MAX))
return (SMB_LGRP_INVALID_ARG);
bzero(&grp, sizeof (grp));
grp.sg_name = smb_strlwr(gname);
grp.sg_cmnt = cmnt;
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
wka = smb_wka_lookup_name(gname);
if (wka == NULL) {
if ((pxgrp = getgrnam(gname)) == NULL) {
if (smb_lgrp_pgrp_add(gname) != 0) {
smb_lgrp_exit();
return (SMB_LGRP_POSIXCREATE_FAILED);
}
if ((pxgrp = getgrnam(gname)) == NULL) {
smb_lgrp_exit();
return (SMB_LGRP_NOT_FOUND);
}
}
/*
* Make sure a local SID can be obtained
*/
if (smb_idmap_getsid(pxgrp->gr_gid, SMB_IDMAP_GROUP, &sid)
!= IDMAP_SUCCESS) {
smb_lgrp_exit();
return (SMB_LGRP_NO_SID);
}
if (!smb_sid_indomain(smb_localgrp.lg_machine_sid, sid)) {
free(sid);
smb_lgrp_exit();
return (SMB_LGRP_SID_NOTLOCAL);
}
free(sid);
grp.sg_id.gs_type = SidTypeAlias;
grp.sg_domain = SMB_DOMAIN_LOCAL;
grp.sg_rid = pxgrp->gr_gid;
} else {
if ((wka->wka_flags & SMB_WKAFLG_LGRP_ENABLE) == 0) {
/* cannot add well-known accounts */
smb_lgrp_exit();
return (SMB_LGRP_WKSID);
}
grp.sg_id.gs_type = wka->wka_type;
if ((sid = smb_sid_fromstr(wka->wka_sid)) == NULL) {
smb_lgrp_exit();
return (SMB_LGRP_NO_MEMORY);
}
(void) smb_sid_getrid(sid, &grp.sg_rid);
free(sid);
grp.sg_domain = SMB_DOMAIN_BUILTIN;
grp.sg_privs = smb_privset_new();
smb_lgrp_set_default_privs(&grp);
}
if (smb_lgrp_exists(grp.sg_name)) {
smb_lgrp_exit();
return (SMB_LGRP_EXISTS);
}
grp.sg_attr = SE_GROUP_MANDATORY | SE_GROUP_ENABLED_BY_DEFAULT |
SE_GROUP_ENABLED;
db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
rc = smb_lgrp_gtbl_insert(db, &grp);
smb_lgrp_db_close(db);
smb_privset_free(grp.sg_privs);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_rename
*
* Renames the given group
*/
int
smb_lgrp_rename(char *name, char *new_name)
{
smb_group_t grp;
sqlite3 *db;
int rc;
char gname[MAXNAMELEN], new_gname[MAXNAMELEN];
if (name == NULL || new_name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(new_gname, new_name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(new_gname))
return (SMB_LGRP_INVALID_NAME);
if (smb_strcasecmp(gname, new_gname, 0) == 0)
return (SMB_LGRP_SUCCESS);
/* Cannot rename well-known groups */
if (smb_wka_lookup_name(gname) != NULL)
return (SMB_LGRP_WKSID);
/* Cannot rename to a well-known groups */
if (smb_wka_lookup_name(new_gname) != NULL)
return (SMB_LGRP_WKSID);
grp.sg_name = new_gname;
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
if (getgrnam(new_gname) == NULL) {
if (smb_lgrp_pgrp_add(new_gname) != 0) {
smb_lgrp_exit();
return (SMB_LGRP_POSIXCREATE_FAILED);
}
if (getgrnam(new_gname) == NULL) {
smb_lgrp_exit();
return (SMB_LGRP_NOT_FOUND);
}
}
db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
rc = smb_lgrp_gtbl_update(db, gname, &grp, SMB_LGRP_GTBL_NAME);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_delete
*
* Deletes the specified local group.
*/
int
smb_lgrp_delete(char *name)
{
sqlite3 *db;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
/* Cannot remove a built-in group */
if (smb_wka_lookup_name(gname) != NULL)
return (SMB_LGRP_WKSID);
if (!smb_lgrp_exists(gname))
return (SMB_LGRP_NOT_FOUND);
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
rc = smb_lgrp_gtbl_delete(db, gname);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_setcmnt
*
* Sets the description for the given group
*/
int
smb_lgrp_setcmnt(char *name, char *cmnt)
{
smb_group_t grp;
sqlite3 *db;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if (cmnt && (strlen(cmnt) > SMB_LGRP_COMMENT_MAX))
return (SMB_LGRP_INVALID_ARG);
grp.sg_cmnt = cmnt;
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
rc = smb_lgrp_gtbl_update(db, gname, &grp, SMB_LGRP_GTBL_CMNT);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_getcmnt
*
* Obtain the description of the specified group
*/
int
smb_lgrp_getcmnt(char *name, char **cmnt)
{
smb_group_t grp;
sqlite3 *db;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if (cmnt == NULL)
return (SMB_LGRP_INVALID_ARG);
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_NAME, &grp,
SMB_LGRP_INFO_CMNT, gname);
smb_lgrp_db_close(db);
smb_lgrp_exit();
if (rc == SMB_LGRP_SUCCESS) {
*cmnt = grp.sg_cmnt;
grp.sg_cmnt = NULL;
smb_lgrp_free(&grp);
}
return (rc);
}
/*
* smb_lgrp_setpriv
*
* Enable/disable the specified privilge for the group
*/
int
smb_lgrp_setpriv(char *name, uint8_t priv_lid, boolean_t enable)
{
sqlite3 *db;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if ((priv_lid < SE_MIN_LUID) || (priv_lid > SE_MAX_LUID))
return (SMB_LGRP_NO_SUCH_PRIV);
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
rc = smb_lgrp_gtbl_update_plist(db, gname, priv_lid, enable);
smb_lgrp_db_close(db);
smb_lgrp_exit();
if (enable) {
if (rc == SMB_LGRP_PRIV_HELD)
rc = SMB_LGRP_SUCCESS;
} else {
if (rc == SMB_LGRP_PRIV_NOT_HELD)
rc = SMB_LGRP_SUCCESS;
}
return (rc);
}
/*
* smb_lgrp_getpriv
*
* Obtain the status of the specified privilge for the group
*/
int
smb_lgrp_getpriv(char *name, uint8_t priv_lid, boolean_t *enable)
{
sqlite3 *db;
smb_group_t grp;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if ((priv_lid < SE_MIN_LUID) || (priv_lid > SE_MAX_LUID))
return (SMB_LGRP_NO_SUCH_PRIV);
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_NAME, &grp,
SMB_LGRP_INFO_PRIV, gname);
smb_lgrp_db_close(db);
smb_lgrp_exit();
if (rc == SMB_LGRP_SUCCESS) {
*enable = (smb_privset_query(grp.sg_privs, priv_lid) == 1);
smb_lgrp_free(&grp);
}
return (rc);
}
/*
* smb_lgrp_add_member
*
* Add the given account to the specified group as its member.
*/
int
smb_lgrp_add_member(char *name, smb_sid_t *msid, uint16_t sid_type)
{
sqlite3 *db;
smb_gsid_t mid;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if (!smb_sid_isvalid(msid))
return (SMB_LGRP_INVALID_ARG);
if (!smb_lgrp_chkmember(sid_type))
return (SMB_LGRP_INVALID_MEMBER);
mid.gs_sid = msid;
mid.gs_type = sid_type;
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
rc = smb_lgrp_gtbl_update_mlist(db, gname, &mid, SMB_LGRP_DB_ADDMEMBER);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_del_member
*
* Delete the specified member from the given group.
*/
int
smb_lgrp_del_member(char *name, smb_sid_t *msid, uint16_t sid_type)
{
sqlite3 *db;
smb_gsid_t mid;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if (!smb_sid_isvalid(msid))
return (SMB_LGRP_INVALID_ARG);
mid.gs_sid = msid;
mid.gs_type = sid_type;
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORW);
rc = smb_lgrp_gtbl_update_mlist(db, gname, &mid, SMB_LGRP_DB_DELMEMBER);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_getbyname
*
* Retrieves the information of the group specified by
* the given name.
*
* Note that this function doesn't allocate the group
* structure itself only the fields, so the given grp
* pointer has to point to a group structure.
* Caller must free the allocated memories for the fields
* by calling smb_lgrp_free().
*/
int
smb_lgrp_getbyname(char *name, smb_group_t *grp)
{
sqlite3 *db;
int rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (SMB_LGRP_INVALID_NAME);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (SMB_LGRP_INVALID_NAME);
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_NAME, grp,
SMB_LGRP_INFO_ALL, gname);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_getbyrid
*
* Retrieves the information of the group specified by
* the given RID and domain type.
*
* Note that this function doesn't allocate the group
* structure itself only the fields, so the given grp
* pointer has to point to a group structure.
* Caller must free the allocated memories for the fields
* by calling smb_lgrp_free().
*
* If grp is NULL no information would be returned. The
* return value of SMB_LGRP_SUCCESS will indicate that a
* group with the given information exists.
*/
int
smb_lgrp_getbyrid(uint32_t rid, smb_domain_type_t domtype, smb_group_t *grp)
{
smb_group_t tmpgrp;
sqlite3 *db;
int infolvl = SMB_LGRP_INFO_ALL;
int rc;
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
if (grp == NULL) {
grp = &tmpgrp;
infolvl = SMB_LGRP_INFO_NONE;
}
db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
rc = smb_lgrp_gtbl_lookup(db, SMB_LGRP_GTBL_SIDRID, grp, infolvl,
rid, domtype);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* Returns the number of groups in the given domain in the
* arg 'count'. Local groups are either in BUILTIN domain
* or in machine/local domain. Groups in the machine domain
* MUST have a corresponding Solaris group at the time they
* are created, which means there is a valid GID mapping for
* their SID, therefore SMB_LGRP_POSIX_IDX is used to lookup
* groups in the machine domain.
*/
int
smb_lgrp_numbydomain(smb_domain_type_t dom_type, int *count)
{
sqlite3 *db;
int dom_idx;
int rc;
switch (dom_type) {
case SMB_DOMAIN_LOCAL:
dom_idx = SMB_LGRP_POSIX_IDX;
break;
case SMB_DOMAIN_BUILTIN:
dom_idx = SMB_LGRP_BUILTIN_IDX;
break;
default:
*count = 0;
return (SMB_LGRP_INVALID_ARG);
}
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
rc = smb_lgrp_gtbl_count(db, dom_idx, count);
smb_lgrp_db_close(db);
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_free
*
* Frees the allocated memory for the fields of the given
* group structure. Note that this function doesn't free
* the group itself.
*/
void
smb_lgrp_free(smb_group_t *grp)
{
int i;
if (grp == NULL)
return;
free(grp->sg_name);
free(grp->sg_cmnt);
smb_sid_free(grp->sg_id.gs_sid);
smb_privset_free(grp->sg_privs);
for (i = 0; i < grp->sg_nmembers; i++)
smb_sid_free(grp->sg_members[i].gs_sid);
free(grp->sg_members);
}
/*
* smb_lgrp_iteropen
*
* Allocates memory and initializes the given group iterator by opening
* the group database and creating a virtual machine
* for iteration.
*/
int
smb_lgrp_iteropen(smb_giter_t **iterator)
{
char *sql;
int rc;
struct smb_giter *iter;
assert(iterator);
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
iter = calloc(1, sizeof (struct smb_giter));
if (iter == NULL) {
smb_lgrp_exit();
return (SMB_LGRP_NO_MEMORY);
}
sql = sqlite3_mprintf("SELECT * FROM groups");
if (sql == NULL) {
free(iter);
smb_lgrp_exit();
return (SMB_LGRP_NO_MEMORY);
}
iter->sgi_db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
if (iter->sgi_db == NULL) {
sqlite3_free(sql);
free(iter);
smb_lgrp_exit();
return (SMB_LGRP_DBOPEN_FAILED);
}
rc = sqlite3_prepare_v2(iter->sgi_db, sql, -1, &iter->sgi_vm, NULL);
sqlite3_free(sql);
if (rc != SQLITE_OK || iter->sgi_vm == NULL) {
syslog(LOG_DEBUG, "failed to create a prepared statement (%s)",
NULL_MSGCHK(sqlite3_errmsg(iter->sgi_db)));
smb_lgrp_db_close(iter->sgi_db);
free(iter);
smb_lgrp_exit();
return (SMB_LGRP_DB_ERROR);
}
*iterator = iter;
smb_lgrp_exit();
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_iterclose
*
* Closes the given group iterator and frees the memory associated with it.
*/
void
smb_lgrp_iterclose(smb_giter_t *iter)
{
int rc;
assert(iter);
if (!smb_lgrp_enter())
return;
rc = sqlite3_finalize(iter->sgi_vm);
if (rc != SQLITE_OK)
syslog(LOG_DEBUG, "failed to destroy a VM (%s)",
NULL_MSGCHK(sqlite3_errmsg(iter->sgi_db)));
smb_lgrp_db_close(iter->sgi_db);
free(iter);
smb_lgrp_exit();
}
/*
* Returns B_TRUE if there has been an error during
* iteration. The passed iterator needs to be valid.
*/
boolean_t
smb_lgrp_itererror(smb_giter_t *iter)
{
if (iter == NULL)
return (B_TRUE);
return (iter->sgi_nerr != 0);
}
/*
* smb_lgrp_iterate
*
* Iterate through group database. Valid group iterator structure,
* created via smb_lgrp_iteropen(), must be passed here.
* Group information is returned in provided group structure.
*
* Note that this function doesn't allocate the group structure itself,
* only the fields, so the given grp pointer has to point to a group structure.
* Caller must free the allocated memories for the fields by calling
* smb_lgrp_free(). Successive calls to smb_lgrp_iterate() will process the
* next row of data, until there is no more information to be processed or
* an error occurs.
*
* When the iterator finishes iterating through all the data or if there is
* an error stepping through the data, the current iterator must be closed via
* smb_lgrp_iterclose(). A new iterator must be obtained via smb_lgrp_iteropen()
* before calling smb_lgrp_iterate() again. An iterator cannot be reused without
* being reset. Currently the intended usage is that the iterator be opened,
* used and closed; thus reset is not supported.
*/
int
smb_lgrp_iterate(smb_giter_t *iter, smb_group_t *grp)
{
char **values;
char *val;
int ncol;
int rc;
int i;
if (iter == NULL || iter->sgi_vm == NULL || iter->sgi_db == NULL)
return (SMB_LGRP_INVALID_ARG);
if (!smb_lgrp_enter())
return (SMB_LGRP_OFFLINE);
for (;;) {
bzero(grp, sizeof (smb_group_t));
rc = sqlite3_step(iter->sgi_vm);
if (rc == SQLITE_DONE) {
smb_lgrp_exit();
return (SMB_LGRP_NO_MORE);
}
if (rc != SQLITE_ROW) {
smb_lgrp_exit();
return (SMB_LGRP_DBEXEC_FAILED);
}
ncol = sqlite3_column_count(iter->sgi_vm);
if (ncol != SMB_LGRP_GTBL_NCOL) {
smb_lgrp_exit();
return (SMB_LGRP_DB_ERROR);
}
if ((values = calloc(ncol, sizeof (char *))) == NULL) {
smb_lgrp_exit();
return (SMB_LGRP_NO_MEMORY);
}
for (i = 0; i < ncol; i++) {
val = (char *)sqlite3_column_text(iter->sgi_vm, i);
if ((val == NULL) ||
((values[i] = strdup(val)) == NULL)) {
smb_lgrp_free_columns(i, values);
smb_lgrp_exit();
return (SMB_LGRP_NO_MEMORY);
}
}
rc = smb_lgrp_decode(grp, values, SMB_LGRP_INFO_ALL,
iter->sgi_db);
smb_lgrp_free_columns(ncol, values);
if (rc == SMB_LGRP_SUCCESS)
break;
iter->sgi_nerr++;
syslog(LOG_ERR, "smb_lgrp_iterate: %s", smb_lgrp_strerror(rc));
}
smb_lgrp_exit();
return (rc);
}
/*
* smb_lgrp_is_member
*
* Check to see if the specified account is a member of
* the given group.
*/
boolean_t
smb_lgrp_is_member(smb_group_t *grp, smb_sid_t *sid)
{
int i;
if (grp == NULL || grp->sg_members == NULL || sid == NULL)
return (B_FALSE);
for (i = 0; i < grp->sg_nmembers; i++) {
if (smb_sid_cmp(grp->sg_members[i].gs_sid, sid))
return (B_TRUE);
}
return (B_FALSE);
}
/*
* smb_lgrp_strerror
*
* Returns a text for the given group error code.
*/
char *
smb_lgrp_strerror(int errnum)
{
int i;
int nerr = (sizeof (errtab) / sizeof (errtab[0]));
for (i = 0; i < nerr; ++i) {
if (errnum == errtab[i].errnum)
return (errtab[i].errmsg);
}
return ("unknown local group error");
}
/*
* smb_lgrp_err_to_ntstatus
*
* This routine maps Local group operation errors to NT Status error codes.
*/
uint32_t
smb_lgrp_err_to_ntstatus(uint32_t lgrp_err)
{
int i;
static struct err_map {
uint32_t lgrp_err;
uint32_t nt_status;
} err_map[] = {
{ SMB_LGRP_SUCCESS, NT_STATUS_SUCCESS },
{ SMB_LGRP_INVALID_ARG, NT_STATUS_INVALID_PARAMETER },
{ SMB_LGRP_INVALID_MEMBER, NT_STATUS_INVALID_MEMBER },
{ SMB_LGRP_INVALID_NAME, NT_STATUS_INVALID_PARAMETER },
{ SMB_LGRP_NOT_FOUND, NT_STATUS_NO_SUCH_ALIAS },
{ SMB_LGRP_EXISTS, NT_STATUS_ALIAS_EXISTS },
{ SMB_LGRP_NO_SID, NT_STATUS_INVALID_SID },
{ SMB_LGRP_NO_LOCAL_SID, NT_STATUS_INVALID_SID },
{ SMB_LGRP_SID_NOTLOCAL, NT_STATUS_INVALID_SID },
{ SMB_LGRP_WKSID, NT_STATUS_INVALID_SID },
{ SMB_LGRP_NO_MEMORY, NT_STATUS_NO_MEMORY },
{ SMB_LGRP_DB_ERROR, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_DBINIT_ERROR, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_INTERNAL_ERROR, NT_STATUS_INTERNAL_ERROR },
{ SMB_LGRP_MEMBER_IN_GROUP, NT_STATUS_MEMBER_IN_ALIAS },
{ SMB_LGRP_MEMBER_NOT_IN_GROUP, NT_STATUS_MEMBER_NOT_IN_ALIAS },
{ SMB_LGRP_NO_SUCH_PRIV, NT_STATUS_NO_SUCH_PRIVILEGE },
{ SMB_LGRP_NO_SUCH_DOMAIN, NT_STATUS_NO_SUCH_DOMAIN },
{ SMB_LGRP_PRIV_HELD, NT_STATUS_SUCCESS },
{ SMB_LGRP_PRIV_NOT_HELD, NT_STATUS_PRIVILEGE_NOT_HELD },
{ SMB_LGRP_BAD_DATA, NT_STATUS_DATA_ERROR },
{ SMB_LGRP_NO_MORE, NT_STATUS_NO_MORE_ENTRIES },
{ SMB_LGRP_DBOPEN_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_DBEXEC_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_DBINIT_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_DOMLKP_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_DOMINS_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_INSERT_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_DELETE_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_UPDATE_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_LOOKUP_FAILED, NT_STATUS_INTERNAL_DB_ERROR },
{ SMB_LGRP_NOT_SUPPORTED, NT_STATUS_NOT_SUPPORTED },
{ SMB_LGRP_OFFLINE, NT_STATUS_INTERNAL_ERROR },
{ SMB_LGRP_POSIXCREATE_FAILED, NT_STATUS_UNSUCCESSFUL }
};
for (i = 0; i < sizeof (err_map)/sizeof (err_map[0]); ++i) {
if (err_map[i].lgrp_err == lgrp_err)
return (err_map[i].nt_status);
}
return (NT_STATUS_INTERNAL_ERROR);
}
/*
* smb_lgrp_chkmember
*
* Determines valid account types for being member of
* a local group.
*
* Currently, we just support users as valid members.
*/
static boolean_t
smb_lgrp_chkmember(uint16_t sid_type)
{
return (sid_type == SidTypeUser);
}
/*
* smb_lgrp_start
*
* Initializes the library private global variables.
* Create the database, if it doesn't exist, and add
* the predefined builtin groups.
*/
int
smb_lgrp_start(void)
{
static char *builtin[] = {
"Administrators",
"Backup Operators",
"Power Users"
};
smb_wka_t *wka;
char *localsid;
int i, rc;
int ngrp = sizeof (builtin) / sizeof (builtin[0]);
(void) mutex_lock(&smb_localgrp.lg_mutex);
if ((localsid = smb_config_get_localsid()) == NULL) {
(void) mutex_unlock(&smb_localgrp.lg_mutex);
return (SMB_LGRP_NO_LOCAL_SID);
}
smb_localgrp.lg_machine_sid = smb_sid_fromstr(localsid);
free(localsid);
if (!smb_sid_isvalid(smb_localgrp.lg_machine_sid)) {
free(smb_localgrp.lg_machine_sid);
smb_localgrp.lg_machine_sid = NULL;
(void) mutex_unlock(&smb_localgrp.lg_mutex);
return (SMB_LGRP_NO_LOCAL_SID);
}
rc = smb_lgrp_db_init();
if (rc != SMB_LGRP_SUCCESS) {
free(smb_localgrp.lg_machine_sid);
smb_localgrp.lg_machine_sid = NULL;
(void) mutex_unlock(&smb_localgrp.lg_mutex);
return (rc);
}
smb_localgrp.lg_online = B_TRUE;
(void) mutex_unlock(&smb_localgrp.lg_mutex);
for (i = 0; i < ngrp; i++) {
if ((wka = smb_wka_lookup_name(builtin[i])) == NULL)
continue;
if (!smb_lgrp_exists(wka->wka_name)) {
rc = smb_lgrp_add(wka->wka_name, wka->wka_desc);
if (rc != SMB_LGRP_SUCCESS)
syslog(LOG_DEBUG, "failed to add %s group",
wka->wka_name);
}
}
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_stop
*
* Unintialize the library global private variables.
*/
void
smb_lgrp_stop(void)
{
(void) mutex_lock(&smb_localgrp.lg_mutex);
if (!smb_localgrp.lg_online)
return;
smb_localgrp.lg_online = B_FALSE;
while (smb_localgrp.lg_refcnt > 0)
(void) cond_wait(&smb_localgrp.lg_cv, &smb_localgrp.lg_mutex);
free(smb_localgrp.lg_machine_sid);
smb_localgrp.lg_machine_sid = NULL;
(void) mutex_unlock(&smb_localgrp.lg_mutex);
}
static boolean_t
smb_lgrp_enter(void)
{
boolean_t status;
(void) mutex_lock(&smb_localgrp.lg_mutex);
status = smb_localgrp.lg_online;
if (smb_localgrp.lg_online)
++smb_localgrp.lg_refcnt;
(void) mutex_unlock(&smb_localgrp.lg_mutex);
return (status);
}
static void
smb_lgrp_exit(void)
{
(void) mutex_lock(&smb_localgrp.lg_mutex);
assert(smb_localgrp.lg_refcnt > 0);
if ((--smb_localgrp.lg_refcnt) == 0)
(void) cond_signal(&smb_localgrp.lg_cv);
(void) mutex_unlock(&smb_localgrp.lg_mutex);
}
/*
* smb_lgrp_db_open
*
* Opens group database with the given mode.
*/
static sqlite3 *
smb_lgrp_db_open(int mode)
{
sqlite3 *db;
int err;
err = sqlite3_open_v2(SMB_LGRP_DB_NAME, &db, mode, NULL);
if (db == NULL || err != SQLITE_OK) {
syslog(LOG_ERR, "failed to open group database (%s)",
NULL_MSGCHK(sqlite3_errmsg(db)));
(void) sqlite3_close(db);
}
return (db);
}
/*
* smb_lgrp_db_close
*
* Closes the given database handle
*/
static void
smb_lgrp_db_close(sqlite3 *db)
{
if (db) {
(void) sqlite3_close(db);
}
}
/*
* smb_lgrp_db_init
*
* Creates the group database based on the defined SQL statement.
* It also initializes db_info and domain tables.
*/
static int
smb_lgrp_db_init(void)
{
int dbrc = SQLITE_OK;
int rc = SMB_LGRP_SUCCESS;
sqlite3 *db = NULL;
char *errmsg = NULL;
int err;
err = sqlite3_open_v2(SMB_LGRP_DB_NAME, &db, SMB_LGRP_DB_ORWC, NULL);
if (db == NULL || err != SQLITE_OK) {
syslog(LOG_ERR, "failed to create group database (%s)",
NULL_MSGCHK(sqlite3_errmsg(db)));
(void) sqlite3_close(db);
return (SMB_LGRP_DBOPEN_FAILED);
}
(void) sqlite3_busy_timeout(db, SMB_LGRP_DB_TIMEOUT);
dbrc = sqlite3_exec(db, "BEGIN TRANSACTION;", NULL, NULL, &errmsg);
if (dbrc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to begin database transaction (%s)",
NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
(void) sqlite3_close(db);
return (SMB_LGRP_DBEXEC_FAILED);
}
switch (sqlite3_exec(db, SMB_LGRP_DB_SQL, NULL, NULL, &errmsg)) {
case SQLITE_ERROR:
/*
* This is the normal situation: CREATE probably failed because
* tables already exist. It may indicate an error in SQL as well
* but we cannot tell.
*/
sqlite3_free(errmsg);
dbrc = sqlite3_exec(db, "ROLLBACK TRANSACTION", NULL, NULL,
&errmsg);
rc = SMB_LGRP_SUCCESS;
break;
case SQLITE_OK:
dbrc = sqlite3_exec(db, "COMMIT TRANSACTION", NULL, NULL,
&errmsg);
if (dbrc != SQLITE_OK)
break;
rc = smb_lgrp_dtbl_insert(db, NT_BUILTIN_DOMAIN_SIDSTR,
NULL);
if (rc == SMB_LGRP_SUCCESS)
rc = smb_lgrp_db_setinfo(db);
if (rc != SMB_LGRP_SUCCESS) {
(void) sqlite3_close(db);
(void) unlink(SMB_LGRP_DB_NAME);
return (rc);
}
break;
default:
syslog(LOG_ERR,
"failed to initialize group database (%s)", errmsg);
sqlite3_free(errmsg);
dbrc = sqlite3_exec(db, "ROLLBACK TRANSACTION", NULL, NULL,
&errmsg);
rc = SMB_LGRP_DBINIT_FAILED;
break;
}
if (dbrc != SQLITE_OK) {
/* this is bad - database may be left in a locked state */
syslog(LOG_DEBUG, "failed to close a transaction (%s)",
NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
}
(void) sqlite3_close(db);
return (rc);
}
/*
* smb_lgrp_gtbl_lookup
*
* This is a flexible lookup function for the group database.
* The key type can be specified by the 'key' arg and the actual key
* values can be passed after the 'infolvl' arg. 'infolvl' arg specifies
* what information items for the specified group is needed.
*
* Note that the function assumes the given key is unique and only
* specifies one or 0 group. The keys that are supported now are
* the group name and the group SID
*
* Note that this function doesn't allocate the group
* structure itself only the fields, so the given grp
* pointer has to point to a group structure.
* Caller must free the allocated memories for the fields
* by calling smb_lgrp_free().
*/
static int
smb_lgrp_gtbl_lookup(sqlite3 *db, int key, smb_group_t *grp, int infolvl, ...)
{
char *errmsg = NULL;
char *sql;
char **result;
int nrow, ncol;
int rc, dom_idx;
smb_group_t grpkey;
va_list ap;
if (db == NULL)
return (SMB_LGRP_DBOPEN_FAILED);
bzero(grp, sizeof (smb_group_t));
va_start(ap, infolvl);
switch (key) {
case SMB_LGRP_GTBL_NAME:
grpkey.sg_name = va_arg(ap, char *);
sql = sqlite3_mprintf("SELECT * FROM groups WHERE name = '%s'",
grpkey.sg_name);
break;
case SMB_LGRP_GTBL_SIDRID:
grpkey.sg_rid = va_arg(ap, uint32_t);
grpkey.sg_domain = va_arg(ap, smb_domain_type_t);
if (grpkey.sg_domain == SMB_DOMAIN_LOCAL) {
dom_idx = SMB_LGRP_POSIX_IDX;
/* need to map the given rid to a gid */
rc = smb_lgrp_getgid(grpkey.sg_rid,
(gid_t *)&grpkey.sg_rid);
if (rc != SMB_LGRP_SUCCESS) {
va_end(ap);
return (rc);
}
} else {
dom_idx = SMB_LGRP_BUILTIN_IDX;
}
sql = sqlite3_mprintf("SELECT * FROM groups "
"WHERE (sid_idx = %d) AND (sid_rid = %u)",
dom_idx, grpkey.sg_rid);
break;
default:
va_end(ap);
return (SMB_LGRP_INVALID_ARG);
}
va_end(ap);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to lookup (%s)", NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (SMB_LGRP_LOOKUP_FAILED);
}
if (nrow == 0) {
/* group not found */
sqlite3_free_table(result);
return (SMB_LGRP_NOT_FOUND);
}
if (nrow != 1 || ncol != SMB_LGRP_GTBL_NCOL) {
sqlite3_free_table(result);
return (SMB_LGRP_DB_ERROR);
}
rc = smb_lgrp_decode(grp, &result[SMB_LGRP_GTBL_NCOL], infolvl, db);
sqlite3_free_table(result);
return (rc);
}
/*
* smb_lgrp_gtbl_exists
*
* Checks to see if the given group exists or not.
*/
static boolean_t
smb_lgrp_gtbl_exists(sqlite3 *db, char *gname)
{
char *errmsg = NULL;
char *sql;
char **result;
int nrow, ncol;
int rc;
if (db == NULL)
return (B_FALSE);
sql = sqlite3_mprintf("SELECT name FROM groups WHERE name = '%s'",
gname);
if (sql == NULL)
return (B_FALSE);
rc = sqlite3_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to lookup %s (%s)",
gname, NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (B_FALSE);
}
sqlite3_free_table(result);
return (nrow != 0);
}
/*
* smb_lgrp_gtbl_count
*
* Counts the number of groups in the domain specified by
* 'dom_idx'
*/
static int
smb_lgrp_gtbl_count(sqlite3 *db, int dom_idx, int *count)
{
char *errmsg = NULL;
char *sql;
char **result;
int nrow, ncol;
int rc;
*count = 0;
if (db == NULL)
return (SMB_LGRP_DBOPEN_FAILED);
sql = sqlite3_mprintf("SELECT sid_idx FROM groups WHERE sid_idx = %d",
dom_idx);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to count (%s)", NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (SMB_LGRP_LOOKUP_FAILED);
}
sqlite3_free_table(result);
if (ncol > 1)
return (SMB_LGRP_DB_ERROR);
*count = nrow;
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_gtbl_insert
*
* Insert a record for the given group in the group database.
*
* NOTE: this function assumes that this group has no members
* at this time.
*/
static int
smb_lgrp_gtbl_insert(sqlite3 *db, smb_group_t *grp)
{
smb_lgpid_t privs[SE_MAX_LUID + 1];
smb_lgplist_t plist;
char *errmsg = NULL;
char *sql;
int dom_idx;
int rc;
if (db == NULL)
return (SMB_LGRP_DBOPEN_FAILED);
dom_idx = (grp->sg_domain == SMB_DOMAIN_LOCAL)
? SMB_LGRP_POSIX_IDX : SMB_LGRP_BUILTIN_IDX;
plist.p_cnt = SE_MAX_LUID;
plist.p_ids = privs;
smb_lgrp_encode_privset(grp, &plist);
sql = sqlite3_mprintf("INSERT INTO groups "
"(name, sid_idx, sid_rid, sid_type, sid_attrs, comment, "
"n_privs, privs, n_members, members) "
"VALUES('%s', %u, %u, %u, %u, '%q', %u, '%q', %u, '%q')",
grp->sg_name, dom_idx, grp->sg_rid, grp->sg_id.gs_type,
grp->sg_attr, (grp->sg_cmnt) ? grp->sg_cmnt : "",
plist.p_cnt, (char *)plist.p_ids, 0, "");
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_exec(db, sql, NULL, NULL, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to insert %s (%s)",
grp->sg_name, NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
rc = SMB_LGRP_INSERT_FAILED;
} else {
rc = SMB_LGRP_SUCCESS;
}
return (rc);
}
/*
* smb_lgrp_gtbl_delete
*
* Removes the specified group from the database
*/
static int
smb_lgrp_gtbl_delete(sqlite3 *db, char *gname)
{
char *errmsg = NULL;
char *sql;
int rc;
if (db == NULL)
return (SMB_LGRP_DBOPEN_FAILED);
sql = sqlite3_mprintf("DELETE FROM groups WHERE name = '%s'", gname);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_exec(db, sql, NULL, NULL, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to delete %s (%s)",
gname, NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
rc = SMB_LGRP_DELETE_FAILED;
} else {
rc = SMB_LGRP_SUCCESS;
}
return (rc);
}
/*
* smb_lgrp_gtbl_update
*
* Updates the specified group information, the supported items
* are group name and comment
*/
static int
smb_lgrp_gtbl_update(sqlite3 *db, char *gname, smb_group_t *grp, int col_id)
{
char *errmsg = NULL;
char *sql;
int rc;
if (db == NULL)
return (SMB_LGRP_DBOPEN_FAILED);
/* UPDATE doesn't fail if gname doesn't exist */
if (!smb_lgrp_gtbl_exists(db, gname))
return (SMB_LGRP_NOT_FOUND);
switch (col_id) {
case SMB_LGRP_GTBL_NAME:
if (smb_lgrp_gtbl_exists(db, grp->sg_name))
return (SMB_LGRP_EXISTS);
sql = sqlite3_mprintf("UPDATE groups SET name = '%s' "
"WHERE name = '%s'", grp->sg_name, gname);
break;
case SMB_LGRP_GTBL_CMNT:
sql = sqlite3_mprintf("UPDATE groups SET comment = '%q' "
"WHERE name = '%s'", grp->sg_cmnt, gname);
break;
default:
return (SMB_LGRP_INVALID_ARG);
}
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_exec(db, sql, NULL, NULL, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to update %s (%s)",
gname, NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
rc = SMB_LGRP_UPDATE_FAILED;
} else {
rc = SMB_LGRP_SUCCESS;
}
return (rc);
}
/*
* smb_lgrp_gtbl_update_mlist
*
* Adds/removes the specified member from the member list of the
* given group
*/
static int
smb_lgrp_gtbl_update_mlist(sqlite3 *db, char *gname, smb_gsid_t *member,
int flags)
{
smb_lgmlist_t new_members;
smb_lgmlist_t members;
smb_lgmid_t mid;
char *errmsg = NULL;
char *sql;
char **result;
int nrow, ncol;
int rc;
if (db == NULL)
return (SMB_LGRP_DBOPEN_FAILED);
sql = sqlite3_mprintf("SELECT n_members, members FROM groups "
"WHERE name = '%s'", gname);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to lookup %s (%s)",
gname, NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (SMB_LGRP_LOOKUP_FAILED);
}
if (nrow == 0) {
/* group not found */
sqlite3_free_table(result);
return (SMB_LGRP_NOT_FOUND);
}
if (nrow != 1 || ncol != 2) {
sqlite3_free_table(result);
return (SMB_LGRP_DB_ERROR);
}
bzero(&mid, sizeof (mid));
mid.m_type = member->gs_type;
rc = smb_lgrp_dtbl_fuid(db, member->gs_sid, mid.m_type,
&mid.m_idx, &mid.m_rid);
if (rc != SMB_LGRP_SUCCESS) {
sqlite3_free_table(result);
return (rc);
}
members.m_cnt = atoi(result[2]);
members.m_ids = result[3];
switch (flags) {
case SMB_LGRP_DB_ADDMEMBER:
rc = smb_lgrp_mlist_add(&members, &mid, &new_members);
break;
case SMB_LGRP_DB_DELMEMBER:
rc = smb_lgrp_mlist_del(&members, &mid, &new_members);
break;
default:
rc = SMB_LGRP_INVALID_ARG;
}
sqlite3_free_table(result);
if (rc != SMB_LGRP_SUCCESS)
return (rc);
sql = sqlite3_mprintf("UPDATE groups SET n_members = %u, members = '%s'"
" WHERE name = '%s'", new_members.m_cnt, new_members.m_ids, gname);
free(new_members.m_ids);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_exec(db, sql, NULL, NULL, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to update %s (%s)", gname,
NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
rc = SMB_LGRP_UPDATE_FAILED;
} else {
rc = SMB_LGRP_SUCCESS;
}
return (rc);
}
/*
* smb_lgrp_gtbl_update_plist
*
* Adds/removes the specified privilege from the privilege list of the
* given group
*/
static int
smb_lgrp_gtbl_update_plist(sqlite3 *db, char *gname, uint8_t priv_id,
boolean_t enable)
{
char *sql;
char *errmsg = NULL;
char **result;
int nrow, ncol;
int rc;
smb_lgplist_t privs;
smb_lgplist_t new_privs;
if (db == NULL)
return (SMB_LGRP_DBOPEN_FAILED);
sql = sqlite3_mprintf("SELECT n_privs, privs FROM groups "
"WHERE name = '%s'", gname);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to lookup %s (%s)",
gname, NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (SMB_LGRP_LOOKUP_FAILED);
}
if (nrow == 0) {
/* group not found */
sqlite3_free_table(result);
return (SMB_LGRP_NOT_FOUND);
}
if (nrow != 1 || ncol != 2) {
sqlite3_free_table(result);
return (SMB_LGRP_DB_ERROR);
}
privs.p_cnt = atoi(result[2]);
privs.p_ids = (smb_lgpid_t *)result[3];
if (enable)
rc = smb_lgrp_plist_add(&privs, priv_id, &new_privs);
else
rc = smb_lgrp_plist_del(&privs, priv_id, &new_privs);
sqlite3_free_table(result);
if (rc != SMB_LGRP_SUCCESS)
return (rc);
sql = sqlite3_mprintf("UPDATE groups SET n_privs = %u, privs = '%q'"
" WHERE name = '%s'", new_privs.p_cnt, (char *)new_privs.p_ids,
gname);
free(new_privs.p_ids);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_exec(db, sql, NULL, NULL, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to update %s (%s)",
gname, NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
rc = SMB_LGRP_UPDATE_FAILED;
} else {
rc = SMB_LGRP_SUCCESS;
}
return (rc);
}
/*
* smb_lgrp_dtbl_insert
*
* Inserts the specified domain SID in the dmain table.
* Upon successful insert the index will be returned in
* 'dom_idx' arg.
*/
static int
smb_lgrp_dtbl_insert(sqlite3 *db, char *dom_sid, uint32_t *dom_idx)
{
char *errmsg = NULL;
char *sql;
int rc;
sql = sqlite3_mprintf("INSERT INTO domains (dom_sid, dom_cnt)"
" VALUES('%s', 1);", dom_sid);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_exec(db, sql, NULL, NULL, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to insert domain SID (%s)",
NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (SMB_LGRP_DOMINS_FAILED);
}
if (dom_idx)
*dom_idx = sqlite3_last_insert_rowid(db);
return (SMB_LGRP_SUCCESS);
}
/*
* Returns the FUID for the given member SID. FUID's upper
* part is returned in 'dom_idx' and the lower part in 'rid'.
*
* If the given SID is mapped to a valid UID/GID then
* dom_idx = 0
* rid = UID/GID
*
* otherwise the given SID is split into a domain SID and
* a RID. The RID is returned in 'rid'. dom_idx will be the
* index of the domain SID in the domain table whether it's
* already there or it's inserted if it doesn't exist.
*/
static int
smb_lgrp_dtbl_fuid(sqlite3 *db, smb_sid_t *sid, uint16_t sid_type,
uint32_t *dom_idx, uint32_t *rid)
{
char sidstr[SMB_SID_STRSZ];
smb_sid_t *dom_sid;
char **result;
int nrow, ncol;
char *errmsg = NULL;
char *sql;
int rc, id_type;
id_type = (sid_type == SidTypeUser) ? SMB_IDMAP_USER : SMB_IDMAP_GROUP;
if (smb_idmap_getid(sid, rid, &id_type) == IDMAP_SUCCESS) {
if (!IDMAP_ID_IS_EPHEMERAL(*rid)) {
*dom_idx = SMB_LGRP_POSIX_IDX;
return (SMB_LGRP_SUCCESS);
}
}
if ((dom_sid = smb_sid_split(sid, rid)) == NULL)
return (SMB_LGRP_NO_MEMORY);
smb_sid_tostr(dom_sid, sidstr);
free(dom_sid);
sql = sqlite3_mprintf(
"SELECT dom_idx FROM domains WHERE dom_sid = '%s'", sidstr);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to lookup domain SID (%s)",
NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (SMB_LGRP_DOMLKP_FAILED);
}
switch (nrow) {
case 0:
/* new domain SID; insert it into the domains table */
sqlite3_free_table(result);
return (smb_lgrp_dtbl_insert(db, sidstr, dom_idx));
case 1:
*dom_idx = atoi(result[1]);
sqlite3_free_table(result);
return (SMB_LGRP_SUCCESS);
}
sqlite3_free_table(result);
return (SMB_LGRP_DB_ERROR);
}
/*
* smb_lgrp_dtbl_getsid
*
* Searchs the domain table for the given domain index.
* Converts the found domain SID to binary format and
* returns it in the 'sid' arg.
*
* Caller must free the returned SID by calling free().
*/
static int
smb_lgrp_dtbl_getsid(sqlite3 *db, uint32_t dom_idx, smb_sid_t **sid)
{
char **result;
int nrow, ncol;
char *errmsg = NULL;
char *sql;
int rc;
sql = sqlite3_mprintf("SELECT dom_sid FROM domains WHERE dom_idx = %u",
dom_idx);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_get_table(db, sql, &result, &nrow, &ncol, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to lookup domain index (%s)",
NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
return (SMB_LGRP_DOMLKP_FAILED);
}
switch (nrow) {
case 0:
rc = SMB_LGRP_NO_SUCH_DOMAIN;
break;
case 1:
*sid = smb_sid_fromstr(result[1]);
rc = (*sid == NULL)
? SMB_LGRP_INTERNAL_ERROR : SMB_LGRP_SUCCESS;
break;
default:
rc = SMB_LGRP_DB_ERROR;
break;
}
sqlite3_free_table(result);
return (rc);
}
/*
* smb_lgrp_db_setinfo
*
* Initializes the db_info table upon database creation.
*/
static int
smb_lgrp_db_setinfo(sqlite3 *db)
{
char *errmsg = NULL;
char *sql;
int rc;
sql = sqlite3_mprintf("INSERT INTO db_info (ver_major, ver_minor,"
" magic) VALUES (%d, %d, %u)", SMB_LGRP_DB_VERMAJOR,
SMB_LGRP_DB_VERMINOR, SMB_LGRP_DB_MAGIC);
if (sql == NULL)
return (SMB_LGRP_NO_MEMORY);
rc = sqlite3_exec(db, sql, NULL, NULL, &errmsg);
sqlite3_free(sql);
if (rc != SQLITE_OK) {
syslog(LOG_DEBUG, "failed to insert database information (%s)",
NULL_MSGCHK(errmsg));
sqlite3_free(errmsg);
rc = SMB_LGRP_DBINIT_ERROR;
} else {
rc = SMB_LGRP_SUCCESS;
}
return (rc);
}
/*
* smb_lgrp_mlist_add
*
* Adds the given member (newm) to the input member list (in_members)
* if it's not already there. The result list will be returned in
* out_members. The caller must free the allocated memory for
* out_members by calling free().
*
* in_members and out_members are hex strings.
*/
static int
smb_lgrp_mlist_add(smb_lgmlist_t *in_members, smb_lgmid_t *newm,
smb_lgmlist_t *out_members)
{
char mid_hex[SMB_LGRP_MID_HEXSZ];
char *in_list;
char *out_list;
int in_size;
int out_size;
int mid_hexsz;
int i;
out_members->m_cnt = 0;
out_members->m_ids = NULL;
bzero(mid_hex, sizeof (mid_hex));
mid_hexsz = bintohex((const char *)newm, sizeof (smb_lgmid_t),
mid_hex, sizeof (mid_hex));
/*
* Check to see if this is already a group member
*/
in_list = in_members->m_ids;
for (i = 0; i < in_members->m_cnt; i++) {
if (strncmp(in_list, mid_hex, mid_hexsz) == 0)
return (SMB_LGRP_MEMBER_IN_GROUP);
in_list += mid_hexsz;
}
in_size = (in_members->m_ids) ? strlen(in_members->m_ids) : 0;
out_size = in_size + sizeof (mid_hex) + 1;
out_list = malloc(out_size);
if (out_list == NULL)
return (SMB_LGRP_NO_MEMORY);
bzero(out_list, out_size);
if (in_members->m_ids)
(void) strlcpy(out_list, in_members->m_ids, out_size);
(void) strcat(out_list, mid_hex);
out_members->m_cnt = in_members->m_cnt + 1;
out_members->m_ids = out_list;
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_mlist_del
*
* Removes the given member (msid) from the input member list
* (in_members) if it's already there. The result list will b
* returned in out_members. The caller must free the allocated
* memory for out_members by calling free().
*
* in_members and out_members are hex strings.
*/
static int
smb_lgrp_mlist_del(smb_lgmlist_t *in_members, smb_lgmid_t *mid,
smb_lgmlist_t *out_members)
{
char mid_hex[SMB_LGRP_MID_HEXSZ];
char *in_list;
char *out_list;
int in_size;
int out_size;
int mid_hexsz;
int out_cnt;
int i;
out_members->m_cnt = 0;
out_members->m_ids = NULL;
if ((in_members == NULL) || (in_members->m_cnt == 0))
return (SMB_LGRP_MEMBER_NOT_IN_GROUP);
in_size = strlen(in_members->m_ids);
out_size = in_size + sizeof (mid_hex) + 1;
out_list = malloc(out_size);
if (out_list == NULL)
return (SMB_LGRP_NO_MEMORY);
*out_list = '\0';
bzero(mid_hex, sizeof (mid_hex));
mid_hexsz = bintohex((const char *)mid, sizeof (smb_lgmid_t),
mid_hex, sizeof (mid_hex));
in_list = in_members->m_ids;
for (i = 0, out_cnt = 0; i < in_members->m_cnt; i++) {
if (strncmp(in_list, mid_hex, mid_hexsz)) {
(void) strncat(out_list, in_list, mid_hexsz);
out_cnt++;
}
in_list += mid_hexsz;
}
if (out_cnt == in_members->m_cnt) {
free(out_list);
return (SMB_LGRP_MEMBER_NOT_IN_GROUP);
}
out_members->m_cnt = out_cnt;
out_members->m_ids = out_list;
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_plist_add
*
* Adds the given privilege to the input list (in_privs)
* if it's not already there. The result list is returned
* in out_privs. The caller must free the allocated memory
* for out_privs by calling free().
*/
static int
smb_lgrp_plist_add(smb_lgplist_t *in_privs, smb_lgpid_t priv_id,
smb_lgplist_t *out_privs)
{
int i, size;
smb_lgpid_t *pbuf;
out_privs->p_cnt = 0;
out_privs->p_ids = NULL;
for (i = 0; i < in_privs->p_cnt; i++) {
if (in_privs->p_ids[i] == priv_id)
return (SMB_LGRP_PRIV_HELD);
}
size = (in_privs->p_cnt + 1) * sizeof (smb_lgpid_t) + 1;
pbuf = malloc(size);
if (pbuf == NULL)
return (SMB_LGRP_NO_MEMORY);
bzero(pbuf, size);
bcopy(in_privs->p_ids, pbuf, in_privs->p_cnt * sizeof (smb_lgpid_t));
pbuf[in_privs->p_cnt] = priv_id;
out_privs->p_cnt = in_privs->p_cnt + 1;
out_privs->p_ids = pbuf;
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_plist_del
*
* Removes the given privilege from the input list (in_privs)
* if it's already there. The result list is returned
* in out_privs. The caller must free the allocated memory
* for out_privs by calling free().
*/
static int
smb_lgrp_plist_del(smb_lgplist_t *in_privs, smb_lgpid_t priv_id,
smb_lgplist_t *out_privs)
{
int i, size;
out_privs->p_cnt = 0;
out_privs->p_ids = NULL;
if ((in_privs == NULL) || (in_privs->p_cnt == 0))
return (SMB_LGRP_PRIV_NOT_HELD);
size = (in_privs->p_cnt - 1) * sizeof (smb_lgpid_t) + 1;
out_privs->p_ids = malloc(size);
if (out_privs->p_ids == NULL)
return (SMB_LGRP_NO_MEMORY);
bzero(out_privs->p_ids, size);
for (i = 0; i < in_privs->p_cnt; i++) {
if (in_privs->p_ids[i] != priv_id)
out_privs->p_ids[out_privs->p_cnt++] =
in_privs->p_ids[i];
}
if (out_privs->p_cnt == in_privs->p_cnt) {
free(out_privs->p_ids);
out_privs->p_cnt = 0;
out_privs->p_ids = NULL;
return (SMB_LGRP_PRIV_NOT_HELD);
}
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_encode_privset
*
* Encodes given privilege set into a buffer to be stored in the group
* database. Each entry of the encoded buffer contains the privilege ID
* of an enable privilege. The returned buffer is null-terminated.
*/
static void
smb_lgrp_encode_privset(smb_group_t *grp, smb_lgplist_t *plist)
{
smb_privset_t *privs;
uint32_t pcnt = plist->p_cnt;
int i;
bzero(plist->p_ids, sizeof (smb_lgpid_t) * plist->p_cnt);
plist->p_cnt = 0;
privs = grp->sg_privs;
if ((privs == NULL) || (privs->priv_cnt == 0))
return;
if (pcnt < privs->priv_cnt) {
assert(0);
}
for (i = 0; i < privs->priv_cnt; i++) {
if (privs->priv[i].attrs == SE_PRIVILEGE_ENABLED) {
plist->p_ids[plist->p_cnt++] =
(uint8_t)privs->priv[i].luid.lo_part;
}
}
}
/*
* smb_lgrp_decode_privset
*
* Decodes the privilege information read from group table
* (nprivs, privs) into a binray format specified by the
* privilege field of smb_group_t
*/
static int
smb_lgrp_decode_privset(smb_group_t *grp, char *nprivs, char *privs)
{
smb_lgplist_t plist;
int i;
plist.p_cnt = atoi(nprivs);
if (strlen(privs) != plist.p_cnt)
return (SMB_LGRP_BAD_DATA);
plist.p_ids = (smb_lgpid_t *)privs;
grp->sg_privs = smb_privset_new();
if (grp->sg_privs == NULL)
return (SMB_LGRP_NO_MEMORY);
for (i = 0; i < plist.p_cnt; i++)
smb_privset_enable(grp->sg_privs, plist.p_ids[i]);
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_decode_members
*
* Decodes the members information read from group table
* (nmembers, members) into a binary format specified by the
* member fields of smb_group_t
*/
static int
smb_lgrp_decode_members(smb_group_t *grp, char *nmembers, char *members,
sqlite3 *db)
{
smb_lgmid_t *m_id;
smb_lgmid_t *m_ids;
smb_gsid_t *m_sid;
smb_gsid_t *m_sids;
int m_num;
size_t mids_size;
int i, rc;
grp->sg_nmembers = 0;
grp->sg_members = NULL;
m_num = atoi(nmembers);
m_ids = calloc(m_num, sizeof (smb_lgmid_t));
if (m_ids == NULL)
return (SMB_LGRP_NO_MEMORY);
m_sids = calloc(m_num, sizeof (smb_gsid_t));
if (m_sids == NULL) {
free(m_ids);
return (SMB_LGRP_NO_MEMORY);
}
mids_size = m_num * sizeof (smb_lgmid_t);
(void) hextobin(members, strlen(members), (char *)m_ids, mids_size);
m_id = m_ids;
m_sid = m_sids;
for (i = 0; i < m_num; i++, m_id++, m_sid++) {
rc = smb_lgrp_getsid(m_id->m_idx, &m_id->m_rid, m_id->m_type,
db, &m_sid->gs_sid);
if (rc != SMB_LGRP_SUCCESS) {
free(m_ids);
for (m_sid = m_sids; m_sid->gs_sid != NULL; m_sid++)
smb_sid_free(m_sid->gs_sid);
free(m_sids);
return (rc);
}
m_sid->gs_type = m_id->m_type;
}
free(m_ids);
grp->sg_nmembers = m_num;
grp->sg_members = m_sids;
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_decode
*
* Fills out the fields of the given group (grp) based in the
* string information read from the group table. infolvl determines
* which fields are requested and need to be decoded.
*
* Allocated memories must be freed by calling smb_lgrp_free()
* upon successful return.
*/
static int
smb_lgrp_decode(smb_group_t *grp, char **values, int infolvl, sqlite3 *db)
{
uint32_t sid_idx;
int rc;
if (infolvl == SMB_LGRP_INFO_NONE)
return (SMB_LGRP_SUCCESS);
if (infolvl & SMB_LGRP_INFO_NAME) {
grp->sg_name = strdup(values[SMB_LGRP_GTBL_NAME]);
if (grp->sg_name == NULL)
return (SMB_LGRP_NO_MEMORY);
}
if (infolvl & SMB_LGRP_INFO_CMNT) {
grp->sg_cmnt = strdup(values[SMB_LGRP_GTBL_CMNT]);
if (grp->sg_cmnt == NULL) {
smb_lgrp_free(grp);
return (SMB_LGRP_NO_MEMORY);
}
}
if (infolvl & SMB_LGRP_INFO_SID) {
sid_idx = atoi(values[SMB_LGRP_GTBL_SIDIDX]);
grp->sg_rid = atoi(values[SMB_LGRP_GTBL_SIDRID]);
grp->sg_attr = atoi(values[SMB_LGRP_GTBL_SIDATR]);
grp->sg_id.gs_type = atoi(values[SMB_LGRP_GTBL_SIDTYP]);
rc = smb_lgrp_getsid(sid_idx, &grp->sg_rid, grp->sg_id.gs_type,
db, &grp->sg_id.gs_sid);
if (rc != SMB_LGRP_SUCCESS) {
smb_lgrp_free(grp);
return (rc);
}
grp->sg_domain = (sid_idx == SMB_LGRP_POSIX_IDX)
? SMB_DOMAIN_LOCAL : SMB_DOMAIN_BUILTIN;
}
if (infolvl & SMB_LGRP_INFO_PRIV) {
rc = smb_lgrp_decode_privset(grp, values[SMB_LGRP_GTBL_NPRIVS],
values[SMB_LGRP_GTBL_PRIVS]);
if (rc != SMB_LGRP_SUCCESS) {
smb_lgrp_free(grp);
return (rc);
}
}
if (infolvl & SMB_LGRP_INFO_MEMB) {
rc = smb_lgrp_decode_members(grp, values[SMB_LGRP_GTBL_NMEMBS],
values[SMB_LGRP_GTBL_MEMBS], db);
if (rc != SMB_LGRP_SUCCESS) {
smb_lgrp_free(grp);
return (rc);
}
}
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_normalize_name
*
* Trim whitespace, validate the group name and convert it to lowercase.
*/
static boolean_t
smb_lgrp_normalize_name(char *name)
{
(void) trim_whitespace(name);
if (smb_name_validate_account(name) != ERROR_SUCCESS)
return (B_FALSE);
(void) smb_strlwr(name);
return (B_TRUE);
}
/*
* smb_lgrp_set_default_privs
*
* set default privileges for Administrators and Backup Operators
*/
static void
smb_lgrp_set_default_privs(smb_group_t *grp)
{
if (smb_strcasecmp(grp->sg_name, "Administrators", 0) == 0) {
smb_privset_enable(grp->sg_privs, SE_TAKE_OWNERSHIP_LUID);
return;
}
if (smb_strcasecmp(grp->sg_name, "Backup Operators", 0) == 0) {
smb_privset_enable(grp->sg_privs, SE_BACKUP_LUID);
smb_privset_enable(grp->sg_privs, SE_RESTORE_LUID);
return;
}
}
/*
* smb_lgrp_getsid
*
* Returns a SID based on the provided information
* If dom_idx is 0, it means 'rid' contains a UID/GID and the
* returned SID will be a local SID. If dom_idx is not 0 then
* the domain SID will be fetched from the domain table.
*/
static int
smb_lgrp_getsid(int dom_idx, uint32_t *rid, uint16_t sid_type,
sqlite3 *db, smb_sid_t **sid)
{
smb_sid_t *dom_sid = NULL;
smb_sid_t *res_sid = NULL;
char strsid[SMB_SID_STRSZ];
idmap_stat stat;
int id_type;
int rc;
*sid = NULL;
if (dom_idx == SMB_LGRP_POSIX_IDX) {
id_type = (sid_type == SidTypeUser)
? SMB_IDMAP_USER : SMB_IDMAP_GROUP;
stat = smb_idmap_getsid(*rid, id_type, &res_sid);
if (stat != IDMAP_SUCCESS) {
syslog(LOG_ERR, "smb_lgrp_getsid: "
"failed to get a SID for %s id=%u (%d)",
(id_type == SMB_IDMAP_USER) ? "user" : "group",
*rid, stat);
return (SMB_LGRP_NO_SID);
}
/*
* Make sure the returned SID is local if the SID is of type
* Alias
*/
if ((sid_type == SidTypeAlias) &&
!smb_sid_indomain(smb_localgrp.lg_machine_sid, res_sid)) {
smb_sid_tostr(res_sid, strsid);
syslog(LOG_ERR, "smb_lgrp_getsid: "
"local group is mapped to a non-local SID: %d->%s",
*rid, strsid);
smb_sid_free(res_sid);
return (SMB_LGRP_SID_NOTLOCAL);
}
(void) smb_sid_getrid(res_sid, rid);
*sid = res_sid;
return (SMB_LGRP_SUCCESS);
}
rc = smb_lgrp_dtbl_getsid(db, dom_idx, &dom_sid);
if (rc != SMB_LGRP_SUCCESS) {
syslog(LOG_ERR, "smb_lgrp_getsid: %s", smb_lgrp_strerror(rc));
return (SMB_LGRP_DB_ERROR);
}
res_sid = smb_sid_splice(dom_sid, *rid);
smb_sid_free(dom_sid);
if (res_sid == NULL) {
syslog(LOG_ERR, "smb_lgrp_getsid: %s", smb_lgrp_strerror(rc));
return (SMB_LGRP_NO_MEMORY);
}
*sid = res_sid;
return (SMB_LGRP_SUCCESS);
}
/*
* smb_lgrp_getgid
*
* Converts given local RID to a local gid since for user
* defined local groups, gid is stored in the table.
*/
static int
smb_lgrp_getgid(uint32_t rid, gid_t *gid)
{
smb_sid_t *sid;
int idtype;
int rc;
if ((sid = smb_sid_splice(smb_localgrp.lg_machine_sid, rid)) == NULL)
return (SMB_LGRP_NO_MEMORY);
idtype = SMB_IDMAP_GROUP;
rc = smb_idmap_getid(sid, gid, &idtype);
smb_sid_free(sid);
return ((rc == IDMAP_SUCCESS) ? SMB_LGRP_SUCCESS : SMB_LGRP_NOT_FOUND);
}
/*
* smb_lgrp_exists
*
* Returns B_TRUE if the local group with the given name exists.
* Otherwise, returns B_FALSE.
*/
static boolean_t
smb_lgrp_exists(char *name)
{
sqlite3 *db;
boolean_t rc;
char gname[MAXNAMELEN];
if (name == NULL)
return (B_FALSE);
(void) strlcpy(gname, name, MAXNAMELEN);
if (!smb_lgrp_normalize_name(gname))
return (B_FALSE);
db = smb_lgrp_db_open(SMB_LGRP_DB_ORD);
if (db == NULL)
return (B_FALSE);
rc = smb_lgrp_gtbl_exists(db, gname);
smb_lgrp_db_close(db);
return (rc);
}
/*
* smb_lgrp_pgrp_valid_gname
*
* Validate posix group name string.
*/
static int
smb_lgrp_pgrp_valid_gname(char *group)
{
char *ptr = group;
char c;
int len = 0;
int badchar = 0;
if (!group || !*group)
return (SMB_LGRP_PGRP_INVALID);
for (c = *ptr; c != NULL; ptr++, c = *ptr) {
len++;
if (!isprint(c) || (c == ':') || (c == '\n'))
return (SMB_LGRP_PGRP_INVALID);
if (!(islower(c) || isdigit(c)))
badchar++;
}
if ((len > SMB_LGRP_PGRP_MAXGLEN - 1) || (badchar != 0))
return (SMB_LGRP_PGRP_INVALID);
if (getgrnam(group) != NULL)
return (SMB_LGRP_PGRP_NOTUNIQUE);
return (SMB_LGRP_PGRP_UNIQUE);
}
/*
* smb_lgrp_pgrp_valid_gid
*
* Check to see that the gid is not a reserved gid
* -- nobody (60001), noaccess (60002) or nogroup (65534)
*/
static int
smb_lgrp_pgrp_valid_gid(gid_t gid)
{
return (gid != 60001 && gid != 60002 && gid != 65534);
}
/*
* smb_lgrp_pgrp_findnextgid(void)
*
* This method finds the next valid GID.
* It iterates through the group database(s) by using the getgrent_r()
* enumeration. The enumeration list is sorted to obtain MAXUSED GID.
* The value of MAXUSED GID is incremented by 1 to obtain the highest unused
* GID. This GID value, if valid, is returned to the caller.
*
* In cases where the MAXUSED GID is less than SMB_LGRP_PGRP_DEFRID,
* SMB_LGRP_PGRP_DEFRID + 1 is returned as GID.
*
* On failure, -1 is returned. On success, a valid GID is returned.
*/
static int
smb_lgrp_pgrp_findnextgid(void)
{
struct group grp, *grpp;
gid_t max_used_gid = 0;
gid_t next, gid;
char *buf;
uint32_t len;
len = sysconf(_SC_GETGR_R_SIZE_MAX);
if ((buf = malloc(len)) == NULL)
return (-1);
errno = 0;
setgrent();
while ((grpp = getgrent_r(&grp, buf, len)) != NULL) {
next = grpp->gr_gid;
if (max_used_gid < next)
max_used_gid = next;
}
endgrent();
free(buf);
if (errno != 0)
return (-1);
gid = max_used_gid + 1;
if (gid < SMB_LGRP_PGRP_DEFRID)
gid = SMB_LGRP_PGRP_DEFRID + 1;
for (;;) {
if (gid > MAXUID)
return (-1);
if (smb_lgrp_pgrp_valid_gid(gid))
break;
gid++;
}
return (gid);
}
/*
* smb_lgrp_pgrp_add
*
* Create a posix group with the given name.
* This group will be added to the /etc/group file.
*/
static int
smb_lgrp_pgrp_add(char *group)
{
FILE *etcgrp;
FILE *etctmp;
int o_mask, gret;
int newdone = 0;
struct stat sb;
char buf[SMB_LGRP_PGRP_GRPBUFSIZ];
gid_t gid;
int rc = 0;
rc = smb_lgrp_pgrp_valid_gname(group);
if ((rc == SMB_LGRP_PGRP_INVALID) || (rc == SMB_LGRP_PGRP_NOTUNIQUE))
return (-1);
if ((gret = smb_lgrp_pgrp_findnextgid()) < 0)
return (-1);
gid = gret;
if ((etcgrp = fopen(SMB_LGRP_PGRP_GROUP, "r")) == NULL)
return (-1);
if (fstat(fileno(etcgrp), &sb) < 0)
sb.st_mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH;
o_mask = umask(077);
etctmp = fopen(SMB_LGRP_PGRP_GRPTMP, "w+");
(void) umask(o_mask);
if (etctmp == NULL) {
(void) fclose(etcgrp);
return (-1);
}
if (lockf(fileno(etctmp), F_LOCK, 0) != 0) {
(void) fclose(etcgrp);
(void) fclose(etctmp);
(void) unlink(SMB_LGRP_PGRP_GRPTMP);
return (-1);
}
if (fchmod(fileno(etctmp), sb.st_mode) != 0 ||
fchown(fileno(etctmp), sb.st_uid, sb.st_gid) != 0) {
(void) lockf(fileno(etctmp), F_ULOCK, 0);
(void) fclose(etcgrp);
(void) fclose(etctmp);
(void) unlink(SMB_LGRP_PGRP_GRPTMP);
return (-1);
}
while (fgets(buf, SMB_LGRP_PGRP_GRPBUFSIZ, etcgrp) != NULL) {
/* Check for NameService reference */
if (!newdone && (buf[0] == '+' || buf[0] == '-')) {
(void) fprintf(etctmp, "%s::%u:\n", group, gid);
newdone = 1;
}
(void) fputs(buf, etctmp);
}
(void) fclose(etcgrp);
if (!newdone)
(void) fprintf(etctmp, "%s::%u:\n", group, gid);
if (rename(SMB_LGRP_PGRP_GRPTMP, SMB_LGRP_PGRP_GROUP) < 0) {
(void) lockf(fileno(etctmp), F_ULOCK, 0);
(void) fclose(etctmp);
(void) unlink(SMB_LGRP_PGRP_GRPTMP);
return (-1);
}
(void) lockf(fileno(etctmp), F_ULOCK, 0);
(void) fclose(etctmp);
return (0);
}
/*
* This method frees up the space allocated for columns(ncols) and their
* respective values in a single row.
*/
static void
smb_lgrp_free_columns(int ncol, char **values)
{
int i;
for (i = 0; i < ncol; i++)
free(values[i]);
free(values);
}