s3-modules: fix get_acl_blob in the acl_tdb VFS module.
[abartlet/samba.git/.git] / source3 / modules / vfs_acl_tdb.c
1 /*
2  * Store Windows ACLs in a tdb.
3  *
4  * Copyright (C) Volker Lendecke, 2008
5  * Copyright (C) Jeremy Allison, 2008
6  *
7  * This program is free software; you can redistribute it and/or modify
8  * it under the terms of the GNU General Public License as published by
9  * the Free Software Foundation; either version 3 of the License, or
10  * (at your option) any later version.
11  *
12  * This program is distributed in the hope that it will be useful,
13  * but WITHOUT ANY WARRANTY; without even the implied warranty of
14  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15  * GNU General Public License for more details.
16  *
17  * You should have received a copy of the GNU General Public License
18  * along with this program; if not, see <http://www.gnu.org/licenses/>.
19  */
20
21 /* NOTE: This is an experimental module, not yet finished. JRA. */
22
23 #include "includes.h"
24 #include "librpc/gen_ndr/xattr.h"
25 #include "librpc/gen_ndr/ndr_xattr.h"
26 #include "../lib/crypto/crypto.h"
27
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_VFS
30
31 #include "modules/vfs_acl_common.c"
32
33 static unsigned int ref_count;
34 static struct db_context *acl_db;
35
36 /*******************************************************************
37  Open acl_db if not already open, increment ref count.
38 *******************************************************************/
39
40 static bool acl_tdb_init(struct db_context **pp_db)
41 {
42         char *dbname;
43
44         if (acl_db) {
45                 *pp_db = acl_db;
46                 ref_count++;
47                 return true;
48         }
49
50         dbname = state_path("file_ntacls.tdb");
51
52         if (dbname == NULL) {
53                 errno = ENOSYS;
54                 return false;
55         }
56
57         become_root();
58         *pp_db = db_open(NULL, dbname, 0, TDB_DEFAULT, O_RDWR|O_CREAT, 0600);
59         unbecome_root();
60
61         if (*pp_db == NULL) {
62 #if defined(ENOTSUP)
63                 errno = ENOTSUP;
64 #else
65                 errno = ENOSYS;
66 #endif
67                 TALLOC_FREE(dbname);
68                 return false;
69         }
70
71         ref_count++;
72         TALLOC_FREE(dbname);
73         return true;
74 }
75
76 /*******************************************************************
77  Lower ref count and close acl_db if zero.
78 *******************************************************************/
79
80 static void free_acl_tdb_data(void **pptr)
81 {
82         struct db_context **pp_db = (struct db_context **)pptr;
83
84         ref_count--;
85         if (ref_count == 0) {
86                 TALLOC_FREE(*pp_db);
87                 acl_db = NULL;
88         }
89 }
90
91 /*******************************************************************
92  Fetch_lock the tdb acl record for a file
93 *******************************************************************/
94
95 static struct db_record *acl_tdb_lock(TALLOC_CTX *mem_ctx,
96                                         struct db_context *db,
97                                         const struct file_id *id)
98 {
99         uint8 id_buf[16];
100
101         /* For backwards compatibility only store the dev/inode. */
102         push_file_id_16((char *)id_buf, id);
103         return db->fetch_locked(db,
104                                 mem_ctx,
105                                 make_tdb_data(id_buf,
106                                         sizeof(id_buf)));
107 }
108
109 /*******************************************************************
110  Delete the tdb acl record for a file
111 *******************************************************************/
112
113 static NTSTATUS acl_tdb_delete(vfs_handle_struct *handle,
114                                 struct db_context *db,
115                                 SMB_STRUCT_STAT *psbuf)
116 {
117         NTSTATUS status;
118         struct file_id id = vfs_file_id_from_sbuf(handle->conn, psbuf);
119         struct db_record *rec = acl_tdb_lock(talloc_tos(), db, &id);
120
121         /*
122          * If rec == NULL there's not much we can do about it
123          */
124
125         if (rec == NULL) {
126                 DEBUG(10,("acl_tdb_delete: rec == NULL\n"));
127                 TALLOC_FREE(rec);
128                 return NT_STATUS_OK;
129         }
130
131         status = rec->delete_rec(rec);
132         TALLOC_FREE(rec);
133         return status;
134 }
135
136 /*******************************************************************
137  Pull a security descriptor into a DATA_BLOB from a tdb store.
138 *******************************************************************/
139
140 static NTSTATUS get_acl_blob(TALLOC_CTX *ctx,
141                         vfs_handle_struct *handle,
142                         files_struct *fsp,
143                         const char *name,
144                         DATA_BLOB *pblob)
145 {
146         uint8 id_buf[16];
147         TDB_DATA data;
148         struct file_id id;
149         struct db_context *db;
150         NTSTATUS status = NT_STATUS_OK;
151         SMB_STRUCT_STAT sbuf;
152
153         SMB_VFS_HANDLE_GET_DATA(handle, db, struct db_context,
154                 return NT_STATUS_INTERNAL_DB_CORRUPTION);
155
156         ZERO_STRUCT(sbuf);
157
158         if (fsp) {
159                 status = vfs_stat_fsp(fsp);
160                 sbuf = fsp->fsp_name->st;
161         } else {
162                 int ret = vfs_stat_smb_fname(handle->conn, name, &sbuf);
163                 if (ret == -1) {
164                         status = map_nt_error_from_unix(errno);
165                 }
166         }
167
168         if (!NT_STATUS_IS_OK(status)) {
169                 return status;
170         }
171
172         id = vfs_file_id_from_sbuf(handle->conn, &sbuf);
173
174         /* For backwards compatibility only store the dev/inode. */
175         push_file_id_16((char *)id_buf, &id);
176
177         if (db->fetch(db,
178                         ctx,
179                         make_tdb_data(id_buf, sizeof(id_buf)),
180                         &data) == -1) {
181                 return NT_STATUS_INTERNAL_DB_CORRUPTION;
182         }
183
184         pblob->data = data.dptr;
185         pblob->length = data.dsize;
186
187         DEBUG(10,("get_acl_blob: returned %u bytes from file %s\n",
188                 (unsigned int)data.dsize, name ));
189
190         if (pblob->length == 0 || pblob->data == NULL) {
191                 return NT_STATUS_NOT_FOUND;
192         }
193         return NT_STATUS_OK;
194 }
195
196 /*******************************************************************
197  Store a DATA_BLOB into a tdb record given an fsp pointer.
198 *******************************************************************/
199
200 static NTSTATUS store_acl_blob_fsp(vfs_handle_struct *handle,
201                                 files_struct *fsp,
202                                 DATA_BLOB *pblob)
203 {
204         uint8 id_buf[16];
205         struct file_id id;
206         TDB_DATA data;
207         struct db_context *db;
208         struct db_record *rec;
209         NTSTATUS status;
210
211         DEBUG(10,("store_acl_blob_fsp: storing blob length %u on file %s\n",
212                   (unsigned int)pblob->length, fsp_str_dbg(fsp)));
213
214         SMB_VFS_HANDLE_GET_DATA(handle, db, struct db_context,
215                 return NT_STATUS_INTERNAL_DB_CORRUPTION);
216
217         status = vfs_stat_fsp(fsp);
218         if (!NT_STATUS_IS_OK(status)) {
219                 return status;
220         }
221
222         id = vfs_file_id_from_sbuf(handle->conn, &fsp->fsp_name->st);
223
224         /* For backwards compatibility only store the dev/inode. */
225         push_file_id_16((char *)id_buf, &id);
226         rec = db->fetch_locked(db, talloc_tos(),
227                                 make_tdb_data(id_buf,
228                                         sizeof(id_buf)));
229         if (rec == NULL) {
230                 DEBUG(0, ("store_acl_blob_fsp_tdb: fetch_lock failed\n"));
231                 return NT_STATUS_INTERNAL_DB_CORRUPTION;
232         }
233         data.dptr = pblob->data;
234         data.dsize = pblob->length;
235         return rec->store(rec, data, 0);
236 }
237
238 /*********************************************************************
239  On unlink we need to delete the tdb record (if using tdb).
240 *********************************************************************/
241
242 static int unlink_acl_tdb(vfs_handle_struct *handle,
243                           const struct smb_filename *smb_fname)
244 {
245         struct smb_filename *smb_fname_tmp = NULL;
246         struct db_context *db;
247         NTSTATUS status;
248         int ret = -1;
249
250         SMB_VFS_HANDLE_GET_DATA(handle, db, struct db_context, return -1);
251
252         status = copy_smb_filename(talloc_tos(), smb_fname, &smb_fname_tmp);
253         if (!NT_STATUS_IS_OK(status)) {
254                 errno = map_errno_from_nt_status(status);
255                 goto out;
256         }
257
258         if (lp_posix_pathnames()) {
259                 ret = SMB_VFS_LSTAT(handle->conn, smb_fname_tmp);
260         } else {
261                 ret = SMB_VFS_STAT(handle->conn, smb_fname_tmp);
262         }
263
264         if (ret == -1) {
265                 goto out;
266         }
267
268         ret = unlink_acl_common(handle, smb_fname_tmp);
269
270         if (ret == -1) {
271                 goto out;
272         }
273
274         acl_tdb_delete(handle, db, &smb_fname_tmp->st);
275  out:
276         return ret;
277 }
278
279 /*********************************************************************
280  On rmdir we need to delete the tdb record (if using tdb).
281 *********************************************************************/
282
283 static int rmdir_acl_tdb(vfs_handle_struct *handle, const char *path)
284 {
285
286         SMB_STRUCT_STAT sbuf;
287         struct db_context *db;
288         int ret = -1;
289
290         SMB_VFS_HANDLE_GET_DATA(handle, db, struct db_context, return -1);
291
292         if (lp_posix_pathnames()) {
293                 ret = vfs_lstat_smb_fname(handle->conn, path, &sbuf);
294         } else {
295                 ret = vfs_stat_smb_fname(handle->conn, path, &sbuf);
296         }
297
298         if (ret == -1) {
299                 return -1;
300         }
301
302         ret = rmdir_acl_common(handle, path);
303         if (ret == -1) {
304                 return -1;
305         }
306
307         acl_tdb_delete(handle, db, &sbuf);
308         return 0;
309 }
310
311 /*******************************************************************
312  Handle opening the storage tdb if so configured.
313 *******************************************************************/
314
315 static int connect_acl_tdb(struct vfs_handle_struct *handle,
316                                 const char *service,
317                                 const char *user)
318 {
319         struct db_context *db;
320         int ret = SMB_VFS_NEXT_CONNECT(handle, service, user);
321
322         if (ret < 0) {
323                 return ret;
324         }
325
326         if (!acl_tdb_init(&db)) {
327                 SMB_VFS_NEXT_DISCONNECT(handle);
328                 return -1;
329         }
330
331         SMB_VFS_HANDLE_SET_DATA(handle, db, free_acl_tdb_data,
332                                 struct db_context, return -1);
333
334         /* Ensure we have "inherit acls = yes" if we're
335          * using this module. */
336         DEBUG(2,("connect_acl_tdb: setting 'inherit acls = true' "
337                 "and 'dos filemode = true' for service %s\n",
338                 service ));
339         lp_do_parameter(SNUM(handle->conn), "inherit acls", "true");
340         lp_do_parameter(SNUM(handle->conn), "dos filemode", "true");
341
342         return 0;
343 }
344
345 /*********************************************************************
346  Remove a Windows ACL - we're setting the underlying POSIX ACL.
347 *********************************************************************/
348
349 static int sys_acl_set_file_tdb(vfs_handle_struct *handle,
350                               const char *path,
351                               SMB_ACL_TYPE_T type,
352                               SMB_ACL_T theacl)
353 {
354         SMB_STRUCT_STAT sbuf;
355         struct db_context *db;
356         int ret = -1;
357
358         SMB_VFS_HANDLE_GET_DATA(handle, db, struct db_context, return -1);
359
360         if (lp_posix_pathnames()) {
361                 ret = vfs_lstat_smb_fname(handle->conn, path, &sbuf);
362         } else {
363                 ret = vfs_stat_smb_fname(handle->conn, path, &sbuf);
364         }
365
366         if (ret == -1) {
367                 return -1;
368         }
369
370         ret = SMB_VFS_NEXT_SYS_ACL_SET_FILE(handle,
371                                                 path,
372                                                 type,
373                                                 theacl);
374         if (ret == -1) {
375                 return -1;
376         }
377
378         acl_tdb_delete(handle, db, &sbuf);
379         return 0;
380 }
381
382 /*********************************************************************
383  Remove a Windows ACL - we're setting the underlying POSIX ACL.
384 *********************************************************************/
385
386 static int sys_acl_set_fd_tdb(vfs_handle_struct *handle,
387                             files_struct *fsp,
388                             SMB_ACL_T theacl)
389 {
390         struct db_context *db;
391         NTSTATUS status;
392         int ret;
393
394         SMB_VFS_HANDLE_GET_DATA(handle, db, struct db_context, return -1);
395
396         status = vfs_stat_fsp(fsp);
397         if (!NT_STATUS_IS_OK(status)) {
398                 return -1;
399         }
400
401         ret = SMB_VFS_NEXT_SYS_ACL_SET_FD(handle,
402                                                 fsp,
403                                                 theacl);
404         if (ret == -1) {
405                 return -1;
406         }
407
408         acl_tdb_delete(handle, db, &fsp->fsp_name->st);
409         return 0;
410 }
411
412 static struct vfs_fn_pointers vfs_acl_tdb_fns = {
413         .connect_fn = connect_acl_tdb,
414         .opendir = opendir_acl_common,
415         .mkdir = mkdir_acl_common,
416         .open = open_acl_common,
417         .create_file = create_file_acl_common,
418         .unlink = unlink_acl_tdb,
419         .rmdir = rmdir_acl_tdb,
420         .fget_nt_acl = fget_nt_acl_common,
421         .get_nt_acl = get_nt_acl_common,
422         .fset_nt_acl = fset_nt_acl_common,
423         .sys_acl_set_file = sys_acl_set_file_tdb,
424         .sys_acl_set_fd = sys_acl_set_fd_tdb
425 };
426
427 NTSTATUS vfs_acl_tdb_init(void)
428 {
429         return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "acl_tdb",
430                                 &vfs_acl_tdb_fns);
431 }