2000-02-17 20:38:33 +01:00
|
|
|
/* uinfo.cc: user info (uid, gid, etc...)
|
|
|
|
|
2007-02-22 12:17:01 +01:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
|
2008-04-01 15:22:47 +02:00
|
|
|
2006, 2007, 2008 Red Hat, Inc.
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
|
|
|
#include "winsup.h"
|
2000-07-29 18:24:59 +02:00
|
|
|
#include <unistd.h>
|
2001-04-30 20:21:48 +02:00
|
|
|
#include <wininet.h>
|
2000-02-17 20:38:33 +01:00
|
|
|
#include <stdlib.h>
|
2008-07-24 20:25:52 +02:00
|
|
|
#include <wchar.h>
|
2000-02-17 20:38:33 +01:00
|
|
|
#include <lm.h>
|
2008-07-11 12:00:36 +02:00
|
|
|
#include <iptypes.h>
|
2000-11-16 10:53:26 +01:00
|
|
|
#include <sys/cygwin.h>
|
2005-01-12 23:40:46 +01:00
|
|
|
#include "cygerrno.h"
|
2000-08-12 07:35:42 +02:00
|
|
|
#include "pinfo.h"
|
2001-10-01 06:10:07 +02:00
|
|
|
#include "path.h"
|
* devices.cc: New file.
* devices.gperf: New file.
* devices.shilka: New file.
* cygwin-gperf: New file.
* cygwin-shilka: New file.
* fhandler_fifo.cc: New file.
* fhandler_nodevice.cc : New file. Reorganize headers so that path.h precedes
fhandler.h throughout. Remove device argument and unit arguments from fhandler
constructors throughout. Remove pc arguments to fhandler functions and use
internal pc element instead, throughout. Use dev element in pc throughout.
Use major/minor elements rather than units and device numbers previously in
fhandler class. Use correct methods for fhandler file names rather than
directly accessing file name variables, throughout.
* Makefile.in (DLL_OFILES): Add devices.o, fhandler_fifo.o
* dcrt0.cc (dll_crt0_1): Call device::init.
* devices.h: Renumber devices based on more Linux-like major/minor numbers.
Add more devices. Declare standard device storage.
(device): Declare struct.
* dir.cc (opendir): Use new 'build_fh_name' to construct a fhandler_* type.
* dtable.cc (dtable::get_debugger_info): Ditto.
(cygwin_attach_handle_to_fd): Ditto.
(dtable::release): Remove special FH_SOCKET case in favor of generic
"need_fixup_before" test.
(dtable::init_std_file_from_handle): Use either build_fh_dev or build_fh_name
to build standard fhandler.
(dtable::build_fh_name): Renamed from dtable::build_fhandler_from_name. Move
out of dtable class. Don't accept a path_conv argument. Just build it here
and pass it to:
(build_fh_pc): Renamed from dtable::build_fhandler. Move out of dtable class.
Use intrinsic device type in path_conv to create new fhandler.
(build_fh_dev): Renamed from dtable::build_fhandler. Move out of dtable class.
Simplify arguments to just take new 'device' type and a name. Just return
pointer to fhandler rather than trying to insert into dtable.
(dtable::dup_worker): Accommodate above build_fh name changes.
(dtable::find_fifo): New (currently broken) function.
(handle_to_fn): Use strechr for efficiency.
* dtable.h: Reflect above build_fh name changes and argument differences.
(fhandler_base *&operator []): Return self rather than copy of self.
* fhandler.cc (fhandler_base::operator =): Use pc element to set normalized
path.
(fhandler_base::set_name): Ditto.
(fhandler_base::raw_read): Use method to access name.
(fhandler_base::write): Correctly use get_output_handle rather than get_handle.
(handler_base::device_access_denied): New function.
(fhandler_base::open): Eliminate pc argument and use pc element of
fhandler_base throughout.
(fhandler_base::fstat): Detect if device is based in filesystem and use
fstat_fs to calculate stat, if so.
(fhandler_base::fhandler_base): Eliminate handling of file names and, instead,
just free appropriate component from pc.
(fhandler_base::opendir): Remove path_conv parameter.
* fhandler.h: Remove all device flags.
(fhandler_base::pc): New element.
(fhandler_base::set_name): Change argument to path_conv.
(fhandler_base::error): New function.
(fhandler_base::exists): New function.
(fhandler_base::pc_binmode): New function.
(fhandler_base::dev): New function.
(fhandler_base::open_fs): New function.
(fhandler_base::fstat_fs): New function.
(fhandler_base::fstat_by_name): New function.
(fhandler_base::fstat_by_handle): New function.
(fhandler_base::isfifo): New function.
(fhandler_base::is_slow): New function.
(fhandler_base::is_auto_device): New function.
(fhandler_base::is_fs_special): New function.
(fhandler_base::device_access_denied): New function.
(fhandler_base::operator DWORD&): New operator.
(fhandler_base::get_name): Return normalized path from pc.
(fhandler_base::get_win32_name): Return windows path from pc.
(fhandler_base::isdevice): Renamed from is_device.
(fhandler_base::get_native_name): Return device format.
(fhandler_fifo): New class.
(fhandler_nodevice): New class.
(select_stuff::device_specific): Remove array.
(select_stuff::device_specific_pipe): New class element.
(select_stuff::device_specific_socket): New class element.
(select_stuff::device_specific_serial): New class element.
(select_stuff::select_stuff): Initialize new elements.
* fhandler_disk_file.cc (fhandler_base::fstat_by_handle): Move to base class
from fhandler_disk_file.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_disk_file::open): Move most functionality into
fhandler_base::open_fs.
(fhandler_base::open_fs): New function.
(fhandler_disk_file::close): Move most functionality into
fhandler_base::close_fs.
(fhandler_base::close_fs): New function.
* fhandler_mem.cc (fhandler_dev_mem::open): Use device name in debugging
output.
* fhandler_socket.cc (fhandler_socket::set_connect_secret): Copy standard
urandom device into appropriate place.
(fhandler_socket::accept): Reflect change in fdsock return value.
* fhandler_tty.cc: See "throughouts" above.
* net.cc: Accommodate fdsock change throughout.
(fdsock): Return success or failure, accept fd argument and device argument.
* path.cc (symlink_info::major): New element.
(symlink_info::minor): New element.
(symlink_info::parse_device): Declare new function.
(fs_info::update): Accommodate changes in path_conv class.
(path_conv::fillin): Ditto.
(path_conv::return_and_clear_normalized_path): Eliminate.
(path_conv::set_normalized_path): New function.
(path_conv::path_conv): Set info in dev element. Use path_conv methods Check
for FH_FS rather than FH_BAD to indicate when to fill in filesystem stuff.
where appropriate rather than direct access. Use set_normalized_path to set
normalized path.
(windows_device_names): Eliminate.
(get_dev): Ditto.
(get_raw_device_number): Ditto.
(get_device_number): Ditto.
(win32_device_name): Call new device name parser to do most of the heavy
lifting.
(mount_info::conv_to_win32_path): Fill in dev field as appropriate.
(symlink_worker): Handle new device files.
(symlink_info::check): Ditto.
(symlink_info::parse_device): Define new function.
* path.h (executable_states): Move here from fhandler.h.
(fs_info): Rename variables to *_storage and create methods for accessing same.
(path_conv): Add dev element, remove devn and unit and adjust inline methods to
accommodate.
(set_normalized_path): Declare new function.
* pinfo.cc (_pinfo::commune_recv): Add broken support for handling fifos.
(_pinfo::commune_send): Ditto.
* pipe.cc (fhandler_pipe::close): check for existence of handle before closing
it.
(handler_pipe::create): Rename from make_pipe. Change arguments to accept
fhandler_pipe array. Accommodate fifos.
(pipe): Rework to deal with fhandler_pipe::create changes.
(_pipe): Ditto.
* select.cc: Use individual device_specific types throughout rather than
indexing with obsolete device number.
(set_bits): Use is_socket call rather than checking device number.
* shared_info.h (CURR_MOUNT_MAGIC): Update.
(conv_to_win32_path): Reflect addition of device argument.
* syscalls.cc (mknod_worker): New function.
(open): Use build_fh_name to build fhandler.
(chown_worker): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(chmod_device): New function.
(chmod): Detect if this is an 'auto' device rather than an on-filesystem device
and handle appropriately. Use chmod_device to set mode of in-filesystem
devices.
(stat_worker): Eliminate path_conv argument. Call build_fh_name to construct
fhandler. Use fh->error() rather than pc->error to detect errors in fhandler
construction.
(access_worker): New function pulled from access. Accommodate in-filesystem
devices.
(access): Use access_worker.
(fpathconf): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(mknod_worker): New function.
(mknod32): New function.
(chroot): Free normalized path -- assuming it was actually cmalloced.
* tty.cc (create_tty_master): Tweak for new device class.
(tty::common_init): Ditto.
* winsup.h (stat_worker): Remove.
(symlink_worker): Declare.
* exceptions.cc (set_process_mask): Just call sig_dispatch_pending and don't
worry about pending_signals since sig_dispatch_pending should always do the
right thing now.
(sig_handle): Reorganize SIGCONT handling to more closely conform to SUSv3.
* pinfo.h: Move __SIG enum to sigproc.h.
(PICOM_FIFO): New enum element.
(_pinfo): Remove 'thread2signal' stuff throughout class.
(_pinfo::commune_send): Make varargs.
(_pinfo::sigtodo): Eliminate.
(_pinfo::thread2signal): Ditto.
* signal.cc (kill_worker): Eliminate call to setthread2signal.
* sigproc.cc (local_sigtodo): Eliminate.
(getlocal_sigtodo): Ditto.
(sigelem): New class.
(pending_signals): New class.
(sigqueue): New variable, start of sigqueue linked list.
(sigcatch_nonmain): Eliminate.
(sigcatch_main): Eliminate.
(sigcatch_nosync): Eliminate.
(sigcomplete_nonmain): Eliminate.
(pending_signals): Eliminate.
(sig_clear): Call signal thread to clear pending signals, unless already in
signal thread.
(sigpending): Call signal thread to get pending signals.
(sig_dispatch_pending): Eliminate use of pending_signals and just check
sigqueue.
(sigproc_terminate): Eliminate all of the obsolete semaphore stuff. Close
signal pipe handle.
(sig_send): Eliminate all of the obsolete semaphore stuff and use pipe to send
signals.
(getevent): Eliminate.
(pending_signals::add): New function.
(pending_signals::del): New function.
(pending_signals::next): New function.
(wait_sig): Eliminate all of the obsolete semaphore stuff. Use pipe to
communicate and maintain a linked list of signals.
* sigproc.h: Move __SIG defines here. Add __SIGPENDING.
(sig_dispatch_pending): Remove "C" specifier.
(sig_handle): Accept a mask argument.
* thread.cc: Remove signal handling considerations throughout.
2003-09-25 02:37:18 +02:00
|
|
|
#include "fhandler.h"
|
2001-04-18 23:10:15 +02:00
|
|
|
#include "dtable.h"
|
2000-11-15 01:13:09 +01:00
|
|
|
#include "cygheap.h"
|
2008-07-24 20:25:52 +02:00
|
|
|
#include "shared_info.h"
|
2000-09-08 04:56:55 +02:00
|
|
|
#include "registry.h"
|
2002-06-14 20:01:21 +02:00
|
|
|
#include "child_info.h"
|
2002-06-29 04:36:08 +02:00
|
|
|
#include "environ.h"
|
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* pwdgrp.h (pwdgrp_check::pwdgrp_state): Replace by
pwdgrp_check::isinitializing ().
(pwdgrp_check::isinitializing): Create.
* passwd.cc (grab_int): Change type to unsigned, use strtoul and
set the pointer content to 0 if the field is invalid.
(parse_pwd): Move validity test after getting pw_gid.
(read_etc_passwd): Replace "passwd_state <= " by
passwd_state::isinitializing ().
(internal_getpwuid): Ditto.
(internal_getpwnam): Ditto.
(getpwent): Ditto.
(getpass): Ditto.
* grp.cc (parse_grp): Use strtoul for gr_gid and verify the validity.
(read_etc_group): Replace "group_state <= " by
group_state::isinitializing ().
(internal_getgrgid): Ditto.
(getgrent32): Ditto.
(internal_getgrent): Ditto.
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* security.h: Move declarations of internal_getgrent,
internal_getpwsid and internal_getgrsid to pwdgrp.h.
* pwdgrp.h: Declare internal_getpwsid, internal_getpwnam,
internal_getpwuid, internal_getgrsid, internal_getgrgid,
internal_getgrnam, internal_getgrent and internal_getgroups.
Delete "emulated" from enum pwdgrp_state.
(pwdgrp_check::isuninitialized): Create.
(pwdgrp_check::pwdgrp_state): Change state to initializing
rather than to uninitialized.
(pwdgrp_read::gets): Remove trailing CRs.
* passwd.cc (grab_string): Don't look for NLs.
(grab_int): Ditto.
(parse_pwd): Don't look for CRs. Return 0 if entry is too short.
(search_for): Delete.
(read_etc_passwd): Simplify tests to actually read the file.
Set state to loaded before making internal_getpwXX calls.
Replace search_for calls by equivalent internal_pwgetXX calls.
(internal_getpwsid): Use passwd_state.isuninitialized to decide
to call read_etc_passwd.
(internal_getpwuid): Create.
(internal_getpwnam): Create.
(getpwuid32): Simply call internal_getpwuid.
(getpwuid_r32): Call internal_getpwuid.
(getpwnam): Simply call internal_getpwnam.
(getpwnam_r): Call internal_getpwnam.
* grp.cc (parse_grp): Don't look for CRs. Adjust blank space.
(add_grp_line): Adjust blank space.
(class group_lock): Ditto.
(read_etc_group): Simplify tests to actually read the file.
Set state to loaded before making internal_getgrXX calls.
Replace getgrXX calls by equivalent internal calls.
(internal_getgrsid): Use group_state.isuninitialized to decide
to call read_etc_group.
(internal_getgrgid): Create.
(internal_getgrnam): Create.
(getgroups32): Simply call internal_getgrgid.
(getgrnam32): Simply call internal_getgrnam.
(internal_getgrent): Call group_state.isuninitialized.
(internal_getgroups): Create from the former getgroups32, using
two of the four arguments. Set gid to myself->gid and username
to cygheap->user.name ().
(getgroups32): Simply call internal_getgroup.
(getgroups): Call internal_getgroup instead of getgroups32.
(setgroups32): Call internal versions of get{pw,gr}XX.
* sec_helper.cc: Include pwdgrp.h.
(is_grp_member): Call internal versions of get{pw,gr}XX.
* security.cc: Include pwdgrp.h.
(alloc_sd): Call internal versions of get{pw,gr}XX.
* syscalls.cc: Include pwdgrp.h.
(seteuid32): Call internal versions of get{pw,gr}XX.
(setegid32): Ditto.
* uinfo.cc: Include pwdgrp.h.
(internal_getlogin): Call internal versions of get{pw,gr}XX.
(cygheap_user::ontherange): Ditto.
* sec_acl.cc: Include pwdgrp.h.
(setacl): Call internal versions of get{pw,gr}XX.
(acl_access): Ditto and simplify logic.
(aclfromtext): Ditto.
2002-12-10 13:43:49 +01:00
|
|
|
#include "pwdgrp.h"
|
2008-03-12 13:41:50 +01:00
|
|
|
#include "tls_pbuf.h"
|
2007-07-19 10:36:32 +02:00
|
|
|
#include "ntdll.h"
|
2000-02-17 20:38:33 +01:00
|
|
|
|
2003-09-10 23:01:40 +02:00
|
|
|
/* Initialize the part of cygheap_user that does not depend on files.
|
|
|
|
The information is used in shared.cc for the user shared.
|
|
|
|
Final initialization occurs in uinfo_init */
|
2002-06-14 20:01:21 +02:00
|
|
|
void
|
2003-11-28 21:55:59 +01:00
|
|
|
cygheap_user::init ()
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2003-09-10 23:01:40 +02:00
|
|
|
char user_name[UNLEN + 1];
|
|
|
|
DWORD user_name_len = UNLEN + 1;
|
|
|
|
|
|
|
|
set_name (GetUserName (user_name, &user_name_len) ? user_name : "unknown");
|
2000-11-15 01:13:09 +01:00
|
|
|
|
2003-09-27 03:56:36 +02:00
|
|
|
DWORD siz;
|
2004-02-06 11:37:37 +01:00
|
|
|
PSECURITY_DESCRIPTOR psd;
|
2003-09-27 03:56:36 +02:00
|
|
|
|
2005-04-03 15:06:43 +02:00
|
|
|
if (!GetTokenInformation (hProcToken, TokenPrimaryGroup,
|
2003-09-27 03:56:36 +02:00
|
|
|
&groups.pgsid, sizeof (cygsid), &siz))
|
2004-09-03 03:53:12 +02:00
|
|
|
system_printf ("GetTokenInformation (TokenPrimaryGroup), %E");
|
2003-09-27 03:56:36 +02:00
|
|
|
|
|
|
|
/* Get the SID from current process and store it in effec_cygsid */
|
2005-04-03 15:06:43 +02:00
|
|
|
if (!GetTokenInformation (hProcToken, TokenUser, &effec_cygsid,
|
|
|
|
sizeof (cygsid), &siz))
|
2003-09-27 03:56:36 +02:00
|
|
|
{
|
2004-09-03 03:53:12 +02:00
|
|
|
system_printf ("GetTokenInformation (TokenUser), %E");
|
2005-04-03 15:06:43 +02:00
|
|
|
return;
|
2003-09-27 03:56:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Set token owner to the same value as token user */
|
2005-04-03 15:06:43 +02:00
|
|
|
if (!SetTokenInformation (hProcToken, TokenOwner, &effec_cygsid,
|
|
|
|
sizeof (cygsid)))
|
2004-09-03 03:53:12 +02:00
|
|
|
debug_printf ("SetTokenInformation(TokenOwner), %E");
|
2003-09-27 03:56:36 +02:00
|
|
|
|
2004-02-06 11:37:37 +01:00
|
|
|
/* Standard way to build a security descriptor with the usual DACL */
|
2005-06-07 21:31:42 +02:00
|
|
|
PSECURITY_ATTRIBUTES sa_buf = (PSECURITY_ATTRIBUTES) alloca (1024);
|
2005-04-03 15:06:43 +02:00
|
|
|
psd = (PSECURITY_DESCRIPTOR)
|
|
|
|
(sec_user_nih (sa_buf, sid()))->lpSecurityDescriptor;
|
2003-09-27 03:56:36 +02:00
|
|
|
|
2004-02-06 11:37:37 +01:00
|
|
|
BOOL acl_exists, dummy;
|
|
|
|
TOKEN_DEFAULT_DACL dacl;
|
2005-04-03 15:06:43 +02:00
|
|
|
if (GetSecurityDescriptorDacl (psd, &acl_exists, &dacl.DefaultDacl, &dummy)
|
2004-02-06 11:37:37 +01:00
|
|
|
&& acl_exists && dacl.DefaultDacl)
|
|
|
|
{
|
2007-07-19 10:36:32 +02:00
|
|
|
NTSTATUS status;
|
|
|
|
|
2004-02-06 11:37:37 +01:00
|
|
|
/* Set the default DACL and the process DACL */
|
2005-04-03 15:06:43 +02:00
|
|
|
if (!SetTokenInformation (hProcToken, TokenDefaultDacl, &dacl,
|
|
|
|
sizeof (dacl)))
|
2004-09-03 03:53:12 +02:00
|
|
|
system_printf ("SetTokenInformation (TokenDefaultDacl), %E");
|
2009-12-18 21:32:04 +01:00
|
|
|
if ((status = NtSetSecurityObject (NtCurrentProcess (),
|
|
|
|
DACL_SECURITY_INFORMATION, psd)))
|
2007-07-19 10:36:32 +02:00
|
|
|
system_printf ("NtSetSecurityObject, %lx", status);
|
2003-09-10 23:01:40 +02:00
|
|
|
}
|
2004-02-06 11:37:37 +01:00
|
|
|
else
|
2004-09-03 03:53:12 +02:00
|
|
|
system_printf("Cannot get dacl, %E");
|
2003-09-10 23:01:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
internal_getlogin (cygheap_user &user)
|
|
|
|
{
|
|
|
|
struct passwd *pw = NULL;
|
|
|
|
|
2007-02-23 16:15:50 +01:00
|
|
|
cygpsid psid = user.sid ();
|
|
|
|
pw = internal_getpwsid (psid);
|
2002-02-10 12:15:56 +01:00
|
|
|
|
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* pwdgrp.h (pwdgrp_check::pwdgrp_state): Replace by
pwdgrp_check::isinitializing ().
(pwdgrp_check::isinitializing): Create.
* passwd.cc (grab_int): Change type to unsigned, use strtoul and
set the pointer content to 0 if the field is invalid.
(parse_pwd): Move validity test after getting pw_gid.
(read_etc_passwd): Replace "passwd_state <= " by
passwd_state::isinitializing ().
(internal_getpwuid): Ditto.
(internal_getpwnam): Ditto.
(getpwent): Ditto.
(getpass): Ditto.
* grp.cc (parse_grp): Use strtoul for gr_gid and verify the validity.
(read_etc_group): Replace "group_state <= " by
group_state::isinitializing ().
(internal_getgrgid): Ditto.
(getgrent32): Ditto.
(internal_getgrent): Ditto.
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* security.h: Move declarations of internal_getgrent,
internal_getpwsid and internal_getgrsid to pwdgrp.h.
* pwdgrp.h: Declare internal_getpwsid, internal_getpwnam,
internal_getpwuid, internal_getgrsid, internal_getgrgid,
internal_getgrnam, internal_getgrent and internal_getgroups.
Delete "emulated" from enum pwdgrp_state.
(pwdgrp_check::isuninitialized): Create.
(pwdgrp_check::pwdgrp_state): Change state to initializing
rather than to uninitialized.
(pwdgrp_read::gets): Remove trailing CRs.
* passwd.cc (grab_string): Don't look for NLs.
(grab_int): Ditto.
(parse_pwd): Don't look for CRs. Return 0 if entry is too short.
(search_for): Delete.
(read_etc_passwd): Simplify tests to actually read the file.
Set state to loaded before making internal_getpwXX calls.
Replace search_for calls by equivalent internal_pwgetXX calls.
(internal_getpwsid): Use passwd_state.isuninitialized to decide
to call read_etc_passwd.
(internal_getpwuid): Create.
(internal_getpwnam): Create.
(getpwuid32): Simply call internal_getpwuid.
(getpwuid_r32): Call internal_getpwuid.
(getpwnam): Simply call internal_getpwnam.
(getpwnam_r): Call internal_getpwnam.
* grp.cc (parse_grp): Don't look for CRs. Adjust blank space.
(add_grp_line): Adjust blank space.
(class group_lock): Ditto.
(read_etc_group): Simplify tests to actually read the file.
Set state to loaded before making internal_getgrXX calls.
Replace getgrXX calls by equivalent internal calls.
(internal_getgrsid): Use group_state.isuninitialized to decide
to call read_etc_group.
(internal_getgrgid): Create.
(internal_getgrnam): Create.
(getgroups32): Simply call internal_getgrgid.
(getgrnam32): Simply call internal_getgrnam.
(internal_getgrent): Call group_state.isuninitialized.
(internal_getgroups): Create from the former getgroups32, using
two of the four arguments. Set gid to myself->gid and username
to cygheap->user.name ().
(getgroups32): Simply call internal_getgroup.
(getgroups): Call internal_getgroup instead of getgroups32.
(setgroups32): Call internal versions of get{pw,gr}XX.
* sec_helper.cc: Include pwdgrp.h.
(is_grp_member): Call internal versions of get{pw,gr}XX.
* security.cc: Include pwdgrp.h.
(alloc_sd): Call internal versions of get{pw,gr}XX.
* syscalls.cc: Include pwdgrp.h.
(seteuid32): Call internal versions of get{pw,gr}XX.
(setegid32): Ditto.
* uinfo.cc: Include pwdgrp.h.
(internal_getlogin): Call internal versions of get{pw,gr}XX.
(cygheap_user::ontherange): Ditto.
* sec_acl.cc: Include pwdgrp.h.
(setacl): Call internal versions of get{pw,gr}XX.
(acl_access): Ditto and simplify logic.
(aclfromtext): Ditto.
2002-12-10 13:43:49 +01:00
|
|
|
if (!pw && !(pw = internal_getpwnam (user.name ()))
|
|
|
|
&& !(pw = internal_getpwuid (DEFAULT_UID)))
|
2003-11-28 21:55:59 +01:00
|
|
|
debug_printf ("user not found in augmented /etc/passwd");
|
2002-11-20 18:10:05 +01:00
|
|
|
else
|
2002-06-14 20:01:21 +02:00
|
|
|
{
|
2007-02-23 16:15:50 +01:00
|
|
|
cygsid gsid;
|
|
|
|
|
2002-06-24 17:40:57 +02:00
|
|
|
myself->uid = pw->pw_uid;
|
|
|
|
myself->gid = pw->pw_gid;
|
2002-11-25 16:11:39 +01:00
|
|
|
user.set_name (pw->pw_name);
|
2007-02-23 16:15:50 +01:00
|
|
|
if (gsid.getfromgr (internal_getgrgid (pw->pw_gid)))
|
2002-11-27 03:26:44 +01:00
|
|
|
{
|
2007-02-23 16:15:50 +01:00
|
|
|
if (gsid != user.groups.pgsid)
|
2002-11-20 18:10:05 +01:00
|
|
|
{
|
2007-02-23 16:15:50 +01:00
|
|
|
/* Set primary group to the group in /etc/passwd. */
|
|
|
|
if (!SetTokenInformation (hProcToken, TokenPrimaryGroup,
|
|
|
|
&gsid, sizeof gsid))
|
|
|
|
debug_printf ("SetTokenInformation(TokenPrimaryGroup), %E");
|
|
|
|
else
|
|
|
|
user.groups.pgsid = gsid;
|
|
|
|
clear_procimptoken ();
|
2002-11-20 18:10:05 +01:00
|
|
|
}
|
|
|
|
}
|
2007-02-23 16:15:50 +01:00
|
|
|
else
|
|
|
|
debug_printf ("gsid not found in augmented /etc/group");
|
2002-06-14 20:01:21 +02:00
|
|
|
}
|
2005-07-06 22:05:03 +02:00
|
|
|
cygheap->user.ontherange (CH_HOME, pw);
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
uinfo_init ()
|
|
|
|
{
|
2003-06-30 15:07:36 +02:00
|
|
|
if (child_proc_info && !cygheap->user.has_impersonation_tokens ())
|
2003-06-09 15:29:12 +02:00
|
|
|
return;
|
|
|
|
|
|
|
|
if (!child_proc_info)
|
|
|
|
internal_getlogin (cygheap->user); /* Set the cygheap->user. */
|
|
|
|
/* Conditions must match those in spawn to allow starting child
|
|
|
|
processes with ruid != euid and rgid != egid. */
|
|
|
|
else if (cygheap->user.issetuid ()
|
2004-05-28 21:50:07 +02:00
|
|
|
&& cygheap->user.saved_uid == cygheap->user.real_uid
|
2003-09-16 11:24:52 +02:00
|
|
|
&& cygheap->user.saved_gid == cygheap->user.real_gid
|
2009-10-13 12:23:31 +02:00
|
|
|
&& !cygheap->user.groups.issetgroups ()
|
|
|
|
&& !cygheap->user.setuid_to_restricted)
|
2003-01-25 11:36:46 +01:00
|
|
|
{
|
2003-06-30 15:07:36 +02:00
|
|
|
cygheap->user.reimpersonate ();
|
2003-06-09 15:29:12 +02:00
|
|
|
return;
|
2003-01-25 11:36:46 +01:00
|
|
|
}
|
2003-06-09 15:29:12 +02:00
|
|
|
else
|
2003-06-30 15:07:36 +02:00
|
|
|
cygheap->user.close_impersonation_tokens ();
|
2003-06-09 15:29:12 +02:00
|
|
|
|
2003-09-16 11:24:52 +02:00
|
|
|
cygheap->user.saved_uid = cygheap->user.real_uid = myself->uid;
|
|
|
|
cygheap->user.saved_gid = cygheap->user.real_gid = myself->gid;
|
2004-10-28 03:46:01 +02:00
|
|
|
cygheap->user.external_token = NO_IMPERSONATION;
|
|
|
|
cygheap->user.internal_token = NO_IMPERSONATION;
|
2005-04-03 15:06:43 +02:00
|
|
|
cygheap->user.curr_primary_token = NO_IMPERSONATION;
|
2007-07-16 22:01:15 +02:00
|
|
|
cygheap->user.curr_imp_token = NO_IMPERSONATION;
|
2009-10-13 12:23:31 +02:00
|
|
|
cygheap->user.ext_token_is_restricted = false;
|
|
|
|
cygheap->user.curr_token_is_restricted = false;
|
|
|
|
cygheap->user.setuid_to_restricted = false;
|
2003-09-16 11:24:52 +02:00
|
|
|
cygheap->user.set_saved_sid (); /* Update the original sid */
|
2009-10-18 11:07:13 +02:00
|
|
|
cygheap->user.deimpersonate ();
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2004-05-17 18:06:02 +02:00
|
|
|
extern "C" int
|
|
|
|
getlogin_r (char *name, size_t namesize)
|
|
|
|
{
|
|
|
|
char *login = getlogin ();
|
|
|
|
size_t len = strlen (login) + 1;
|
|
|
|
if (len > namesize)
|
|
|
|
return ERANGE;
|
2005-07-03 04:40:30 +02:00
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted ())
|
|
|
|
return EFAULT;
|
2004-05-17 18:06:02 +02:00
|
|
|
strncpy (name, login, len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-02-17 20:38:33 +01:00
|
|
|
extern "C" char *
|
|
|
|
getlogin (void)
|
|
|
|
{
|
2003-12-23 17:26:31 +01:00
|
|
|
return strcpy (_my_tls.locals.username, cygheap->user.name ());
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2002-05-29 17:04:29 +02:00
|
|
|
extern "C" __uid32_t
|
|
|
|
getuid32 (void)
|
|
|
|
{
|
|
|
|
return cygheap->user.real_uid;
|
|
|
|
}
|
|
|
|
|
* (child_info.h, cygheap.h, dcrt0.cc, dir.cc, fhandler.cc, fhandler.h,
fhandler_clipboard.cc, fhandler_disk_file.cc, fhandler_dsp.cc,
fhandler_floppy.cc, fhandler_mem.cc, fhandler_random.cc,
fhandler_tape.cc, fhandler_zero.cc, grp.cc, mmap.cc, passwd.cc,
pinfo.cc, pinfo.h, pipe.cc, sec_acl.cc, sec_helper.cc, security.cc,
security.h, spawn.cc, syscalls.cc, thread.h, uinfo.cc, winsup.h):
Change usage of uid_t to __uid16_t, gid_t to __gid16_t and
off_t to __off32_t throughout. Use INVALID_UID, INVALID_GID and
INVALID_SEEK instead casting -1 to the appropriate type.
* winsup.h: Define INVALID_UID, INVALID_GID and INVALID_SEEK.
* include/cygwin/acl.h: Define internal __aclent16_t and __aclent32_t
types. Don't declare acl functions when compiling Cygwin.
* include/cygwin/grp.h: Declare getgrgid() and getgrnam() with
correct types for internal usage.
2002-02-10 14:38:51 +01:00
|
|
|
extern "C" __uid16_t
|
2000-02-17 20:38:33 +01:00
|
|
|
getuid (void)
|
|
|
|
{
|
2000-11-15 01:13:09 +01:00
|
|
|
return cygheap->user.real_uid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 16:10:55 +02:00
|
|
|
extern "C" __gid32_t
|
|
|
|
getgid32 (void)
|
|
|
|
{
|
|
|
|
return cygheap->user.real_gid;
|
|
|
|
}
|
|
|
|
|
* (child_info.h, cygheap.h, dcrt0.cc, dir.cc, fhandler.cc, fhandler.h,
fhandler_clipboard.cc, fhandler_disk_file.cc, fhandler_dsp.cc,
fhandler_floppy.cc, fhandler_mem.cc, fhandler_random.cc,
fhandler_tape.cc, fhandler_zero.cc, grp.cc, mmap.cc, passwd.cc,
pinfo.cc, pinfo.h, pipe.cc, sec_acl.cc, sec_helper.cc, security.cc,
security.h, spawn.cc, syscalls.cc, thread.h, uinfo.cc, winsup.h):
Change usage of uid_t to __uid16_t, gid_t to __gid16_t and
off_t to __off32_t throughout. Use INVALID_UID, INVALID_GID and
INVALID_SEEK instead casting -1 to the appropriate type.
* winsup.h: Define INVALID_UID, INVALID_GID and INVALID_SEEK.
* include/cygwin/acl.h: Define internal __aclent16_t and __aclent32_t
types. Don't declare acl functions when compiling Cygwin.
* include/cygwin/grp.h: Declare getgrgid() and getgrnam() with
correct types for internal usage.
2002-02-10 14:38:51 +01:00
|
|
|
extern "C" __gid16_t
|
2000-02-17 20:38:33 +01:00
|
|
|
getgid (void)
|
|
|
|
{
|
2000-11-15 01:13:09 +01:00
|
|
|
return cygheap->user.real_gid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
2002-05-29 17:04:29 +02:00
|
|
|
extern "C" __uid32_t
|
|
|
|
geteuid32 (void)
|
|
|
|
{
|
|
|
|
return myself->uid;
|
|
|
|
}
|
|
|
|
|
* (child_info.h, cygheap.h, dcrt0.cc, dir.cc, fhandler.cc, fhandler.h,
fhandler_clipboard.cc, fhandler_disk_file.cc, fhandler_dsp.cc,
fhandler_floppy.cc, fhandler_mem.cc, fhandler_random.cc,
fhandler_tape.cc, fhandler_zero.cc, grp.cc, mmap.cc, passwd.cc,
pinfo.cc, pinfo.h, pipe.cc, sec_acl.cc, sec_helper.cc, security.cc,
security.h, spawn.cc, syscalls.cc, thread.h, uinfo.cc, winsup.h):
Change usage of uid_t to __uid16_t, gid_t to __gid16_t and
off_t to __off32_t throughout. Use INVALID_UID, INVALID_GID and
INVALID_SEEK instead casting -1 to the appropriate type.
* winsup.h: Define INVALID_UID, INVALID_GID and INVALID_SEEK.
* include/cygwin/acl.h: Define internal __aclent16_t and __aclent32_t
types. Don't declare acl functions when compiling Cygwin.
* include/cygwin/grp.h: Declare getgrgid() and getgrnam() with
correct types for internal usage.
2002-02-10 14:38:51 +01:00
|
|
|
extern "C" __uid16_t
|
2000-02-17 20:38:33 +01:00
|
|
|
geteuid (void)
|
|
|
|
{
|
2000-06-16 21:36:07 +02:00
|
|
|
return myself->uid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
Change internal gid datatype from __gid16_t to __gid32_t
throughout.
* cygwin.din: Export new symbols chown32, fchown32, getegid32,
getgid32, getgrgid32, getgrnam32, getgroups32, initgroups32, lchown32,
setgid32, setegid32, getgrent32.
* grp.cc (grp32togrp16): New static function.
(getgrgid32): New function.
(getgrnam32): Ditto.
(getgrent32): Ditto.
(getgroups32): Change name of internal function from getgroups.
(getgroups32): New function.
(initgroups32): Ditto.
* syscalls.cc (chown32): Ditto.
(lchown32): Ditto.
(fchown32): Ditto.
(setegid32): Ditto.
(setgid32): Ditto.
* uinfo.cc (getgid32): Ditto.
(getegid32): Ditto.
* include/cygwin/grp.h: Remove declaration of getgrgid() and getgrnam().
Declare getgrgid32() and getgrnam32() instead. Declare getgid32().
2002-05-28 16:10:55 +02:00
|
|
|
extern "C" __gid32_t
|
|
|
|
getegid32 (void)
|
|
|
|
{
|
|
|
|
return myself->gid;
|
|
|
|
}
|
|
|
|
|
* (child_info.h, cygheap.h, dcrt0.cc, dir.cc, fhandler.cc, fhandler.h,
fhandler_clipboard.cc, fhandler_disk_file.cc, fhandler_dsp.cc,
fhandler_floppy.cc, fhandler_mem.cc, fhandler_random.cc,
fhandler_tape.cc, fhandler_zero.cc, grp.cc, mmap.cc, passwd.cc,
pinfo.cc, pinfo.h, pipe.cc, sec_acl.cc, sec_helper.cc, security.cc,
security.h, spawn.cc, syscalls.cc, thread.h, uinfo.cc, winsup.h):
Change usage of uid_t to __uid16_t, gid_t to __gid16_t and
off_t to __off32_t throughout. Use INVALID_UID, INVALID_GID and
INVALID_SEEK instead casting -1 to the appropriate type.
* winsup.h: Define INVALID_UID, INVALID_GID and INVALID_SEEK.
* include/cygwin/acl.h: Define internal __aclent16_t and __aclent32_t
types. Don't declare acl functions when compiling Cygwin.
* include/cygwin/grp.h: Declare getgrgid() and getgrnam() with
correct types for internal usage.
2002-02-10 14:38:51 +01:00
|
|
|
extern "C" __gid16_t
|
2000-02-17 20:38:33 +01:00
|
|
|
getegid (void)
|
|
|
|
{
|
2000-06-16 21:36:07 +02:00
|
|
|
return myself->gid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Not quite right - cuserid can change, getlogin can't */
|
|
|
|
extern "C" char *
|
|
|
|
cuserid (char *src)
|
|
|
|
{
|
2002-06-12 07:13:54 +02:00
|
|
|
if (!src)
|
|
|
|
return getlogin ();
|
|
|
|
|
|
|
|
strcpy (src, getlogin ());
|
|
|
|
return src;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
cygheap_user::ontherange (homebodies what, struct passwd *pw)
|
|
|
|
{
|
|
|
|
LPUSER_INFO_3 ui = NULL;
|
|
|
|
WCHAR wuser[UNLEN + 1];
|
|
|
|
NET_API_STATUS ret;
|
2002-06-27 22:44:27 +02:00
|
|
|
char homedrive_env_buf[3];
|
|
|
|
char *newhomedrive = NULL;
|
|
|
|
char *newhomepath = NULL;
|
2008-03-12 13:41:50 +01:00
|
|
|
tmp_pathbuf tp;
|
2002-06-12 07:13:54 +02:00
|
|
|
|
2002-06-29 04:36:08 +02:00
|
|
|
debug_printf ("what %d, pw %p", what, pw);
|
2002-06-12 07:13:54 +02:00
|
|
|
if (what == CH_HOME)
|
|
|
|
{
|
|
|
|
char *p;
|
2002-06-16 07:26:14 +02:00
|
|
|
|
2002-06-12 07:13:54 +02:00
|
|
|
if ((p = getenv ("HOME")))
|
|
|
|
debug_printf ("HOME is already in the environment %s", p);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (pw && pw->pw_dir && *pw->pw_dir)
|
|
|
|
{
|
|
|
|
debug_printf ("Set HOME (from /etc/passwd) to %s", pw->pw_dir);
|
2002-07-01 05:57:17 +02:00
|
|
|
setenv ("HOME", pw->pw_dir, 1);
|
2002-06-12 07:13:54 +02:00
|
|
|
}
|
2002-07-01 05:57:17 +02:00
|
|
|
else
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
2009-05-06 13:52:20 +02:00
|
|
|
char home[strlen (name ()) + 8];
|
|
|
|
|
|
|
|
debug_printf ("Set HOME to default /home/USER");
|
|
|
|
__small_sprintf (home, "/home/%s", name ());
|
2002-07-01 05:57:17 +02:00
|
|
|
setenv ("HOME", home, 1);
|
2002-06-12 07:13:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2002-06-29 04:36:08 +02:00
|
|
|
if (what != CH_HOME && homepath == NULL && newhomepath == NULL)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2008-03-12 13:41:50 +01:00
|
|
|
char *homepath_env_buf = tp.c_get ();
|
2002-06-12 07:13:54 +02:00
|
|
|
if (!pw)
|
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* pwdgrp.h (pwdgrp_check::pwdgrp_state): Replace by
pwdgrp_check::isinitializing ().
(pwdgrp_check::isinitializing): Create.
* passwd.cc (grab_int): Change type to unsigned, use strtoul and
set the pointer content to 0 if the field is invalid.
(parse_pwd): Move validity test after getting pw_gid.
(read_etc_passwd): Replace "passwd_state <= " by
passwd_state::isinitializing ().
(internal_getpwuid): Ditto.
(internal_getpwnam): Ditto.
(getpwent): Ditto.
(getpass): Ditto.
* grp.cc (parse_grp): Use strtoul for gr_gid and verify the validity.
(read_etc_group): Replace "group_state <= " by
group_state::isinitializing ().
(internal_getgrgid): Ditto.
(getgrent32): Ditto.
(internal_getgrent): Ditto.
2002-12-10 Pierre Humblet <pierre.humblet@ieee.org>
* security.h: Move declarations of internal_getgrent,
internal_getpwsid and internal_getgrsid to pwdgrp.h.
* pwdgrp.h: Declare internal_getpwsid, internal_getpwnam,
internal_getpwuid, internal_getgrsid, internal_getgrgid,
internal_getgrnam, internal_getgrent and internal_getgroups.
Delete "emulated" from enum pwdgrp_state.
(pwdgrp_check::isuninitialized): Create.
(pwdgrp_check::pwdgrp_state): Change state to initializing
rather than to uninitialized.
(pwdgrp_read::gets): Remove trailing CRs.
* passwd.cc (grab_string): Don't look for NLs.
(grab_int): Ditto.
(parse_pwd): Don't look for CRs. Return 0 if entry is too short.
(search_for): Delete.
(read_etc_passwd): Simplify tests to actually read the file.
Set state to loaded before making internal_getpwXX calls.
Replace search_for calls by equivalent internal_pwgetXX calls.
(internal_getpwsid): Use passwd_state.isuninitialized to decide
to call read_etc_passwd.
(internal_getpwuid): Create.
(internal_getpwnam): Create.
(getpwuid32): Simply call internal_getpwuid.
(getpwuid_r32): Call internal_getpwuid.
(getpwnam): Simply call internal_getpwnam.
(getpwnam_r): Call internal_getpwnam.
* grp.cc (parse_grp): Don't look for CRs. Adjust blank space.
(add_grp_line): Adjust blank space.
(class group_lock): Ditto.
(read_etc_group): Simplify tests to actually read the file.
Set state to loaded before making internal_getgrXX calls.
Replace getgrXX calls by equivalent internal calls.
(internal_getgrsid): Use group_state.isuninitialized to decide
to call read_etc_group.
(internal_getgrgid): Create.
(internal_getgrnam): Create.
(getgroups32): Simply call internal_getgrgid.
(getgrnam32): Simply call internal_getgrnam.
(internal_getgrent): Call group_state.isuninitialized.
(internal_getgroups): Create from the former getgroups32, using
two of the four arguments. Set gid to myself->gid and username
to cygheap->user.name ().
(getgroups32): Simply call internal_getgroup.
(getgroups): Call internal_getgroup instead of getgroups32.
(setgroups32): Call internal versions of get{pw,gr}XX.
* sec_helper.cc: Include pwdgrp.h.
(is_grp_member): Call internal versions of get{pw,gr}XX.
* security.cc: Include pwdgrp.h.
(alloc_sd): Call internal versions of get{pw,gr}XX.
* syscalls.cc: Include pwdgrp.h.
(seteuid32): Call internal versions of get{pw,gr}XX.
(setegid32): Ditto.
* uinfo.cc: Include pwdgrp.h.
(internal_getlogin): Call internal versions of get{pw,gr}XX.
(cygheap_user::ontherange): Ditto.
* sec_acl.cc: Include pwdgrp.h.
(setacl): Call internal versions of get{pw,gr}XX.
(acl_access): Ditto and simplify logic.
(aclfromtext): Ditto.
2002-12-10 13:43:49 +01:00
|
|
|
pw = internal_getpwnam (name ());
|
2002-06-12 07:13:54 +02:00
|
|
|
if (pw && pw->pw_dir && *pw->pw_dir)
|
2008-03-12 13:41:50 +01:00
|
|
|
cygwin_conv_path (CCP_POSIX_TO_WIN_A, pw->pw_dir, homepath_env_buf,
|
|
|
|
NT_MAX_PATH);
|
2002-06-12 07:13:54 +02:00
|
|
|
else
|
|
|
|
{
|
2002-06-27 22:44:27 +02:00
|
|
|
homepath_env_buf[0] = homepath_env_buf[1] = '\0';
|
2002-06-29 04:36:08 +02:00
|
|
|
if (logsrv ())
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
2002-06-19 15:56:34 +02:00
|
|
|
WCHAR wlogsrv[INTERNET_MAX_HOST_NAME_LENGTH + 3];
|
2008-02-25 19:32:23 +01:00
|
|
|
sys_mbstowcs (wlogsrv, sizeof (wlogsrv) / sizeof (*wlogsrv),
|
|
|
|
logsrv ());
|
|
|
|
sys_mbstowcs (wuser, sizeof (wuser) / sizeof (*wuser), winname ());
|
2003-11-28 21:55:59 +01:00
|
|
|
if (!(ret = NetUserGetInfo (wlogsrv, wuser, 3, (LPBYTE *) &ui)))
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
2008-03-12 13:41:50 +01:00
|
|
|
sys_wcstombs (homepath_env_buf, NT_MAX_PATH,
|
2006-02-07 16:49:08 +01:00
|
|
|
ui->usri3_home_dir);
|
2002-06-19 15:56:34 +02:00
|
|
|
if (!homepath_env_buf[0])
|
|
|
|
{
|
2008-03-12 13:41:50 +01:00
|
|
|
sys_wcstombs (homepath_env_buf, NT_MAX_PATH,
|
2006-02-07 16:49:08 +01:00
|
|
|
ui->usri3_home_dir_drive);
|
2002-06-19 15:56:34 +02:00
|
|
|
if (homepath_env_buf[0])
|
|
|
|
strcat (homepath_env_buf, "\\");
|
2002-07-01 17:50:02 +02:00
|
|
|
else
|
2008-03-12 13:41:50 +01:00
|
|
|
cygwin_conv_path (CCP_POSIX_TO_WIN_A | CCP_ABSOLUTE,
|
|
|
|
"/", homepath_env_buf, NT_MAX_PATH);
|
2002-06-19 15:56:34 +02:00
|
|
|
}
|
2002-06-12 07:13:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ui)
|
|
|
|
NetApiBufferFree (ui);
|
|
|
|
}
|
|
|
|
|
2002-06-14 22:36:42 +02:00
|
|
|
if (homepath_env_buf[1] != ':')
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
2002-06-27 22:44:27 +02:00
|
|
|
newhomedrive = almost_null;
|
|
|
|
newhomepath = homepath_env_buf;
|
2002-06-12 07:13:54 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2002-06-14 22:36:42 +02:00
|
|
|
homedrive_env_buf[0] = homepath_env_buf[0];
|
|
|
|
homedrive_env_buf[1] = homepath_env_buf[1];
|
2002-06-27 22:44:27 +02:00
|
|
|
homedrive_env_buf[2] = '\0';
|
|
|
|
newhomedrive = homedrive_env_buf;
|
|
|
|
newhomepath = homepath_env_buf + 2;
|
2002-06-12 07:13:54 +02:00
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
2002-06-12 07:13:54 +02:00
|
|
|
|
2002-07-01 05:57:17 +02:00
|
|
|
if (newhomedrive && newhomedrive != homedrive)
|
2002-06-27 22:44:27 +02:00
|
|
|
cfree_and_set (homedrive, (newhomedrive == almost_null)
|
2002-09-19 05:30:20 +02:00
|
|
|
? almost_null : cstrdup (newhomedrive));
|
2002-06-27 22:44:27 +02:00
|
|
|
|
2002-07-01 05:57:17 +02:00
|
|
|
if (newhomepath && newhomepath != homepath)
|
2002-06-27 22:44:27 +02:00
|
|
|
cfree_and_set (homepath, cstrdup (newhomepath));
|
|
|
|
|
2002-06-12 07:13:54 +02:00
|
|
|
switch (what)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
2002-06-12 07:13:54 +02:00
|
|
|
case CH_HOMEDRIVE:
|
|
|
|
return homedrive;
|
|
|
|
case CH_HOMEPATH:
|
|
|
|
return homepath;
|
|
|
|
default:
|
|
|
|
return homepath;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
}
|
2002-06-12 07:13:54 +02:00
|
|
|
|
|
|
|
const char *
|
2002-06-29 04:36:08 +02:00
|
|
|
cygheap_user::test_uid (char *&what, const char *name, size_t namelen)
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
2002-07-01 05:57:17 +02:00
|
|
|
if (!what && !issetuid ())
|
2002-06-29 08:50:17 +02:00
|
|
|
what = getwinenveq (name, namelen, HEAP_STR);
|
2002-06-29 04:36:08 +02:00
|
|
|
return what;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
cygheap_user::env_logsrv (const char *name, size_t namelen)
|
|
|
|
{
|
|
|
|
if (test_uid (plogsrv, name, namelen))
|
2002-06-14 20:01:21 +02:00
|
|
|
return plogsrv;
|
2002-06-12 07:13:54 +02:00
|
|
|
|
2002-06-30 00:05:30 +02:00
|
|
|
const char *mydomain = domain ();
|
|
|
|
const char *myname = winname ();
|
2008-02-01 13:37:51 +01:00
|
|
|
if (!mydomain || ascii_strcasematch (myname, "SYSTEM"))
|
2002-06-29 05:14:12 +02:00
|
|
|
return almost_null;
|
2002-06-16 07:26:14 +02:00
|
|
|
|
2008-07-11 12:00:36 +02:00
|
|
|
WCHAR wdomain[MAX_DOMAIN_NAME_LEN + 1];
|
2008-07-09 13:58:38 +02:00
|
|
|
WCHAR wlogsrv[INTERNET_MAX_HOST_NAME_LENGTH + 3];
|
2008-07-11 12:00:36 +02:00
|
|
|
sys_mbstowcs (wdomain, MAX_DOMAIN_NAME_LEN + 1, mydomain);
|
2002-06-27 22:44:27 +02:00
|
|
|
cfree_and_set (plogsrv, almost_null);
|
2008-07-09 13:58:38 +02:00
|
|
|
if (get_logon_server (wdomain, wlogsrv, false))
|
|
|
|
sys_wcstombs_alloc (&plogsrv, HEAP_STR, wlogsrv);
|
2002-06-27 22:44:27 +02:00
|
|
|
return plogsrv;
|
2002-06-14 20:01:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
2002-06-29 04:36:08 +02:00
|
|
|
cygheap_user::env_domain (const char *name, size_t namelen)
|
2002-06-14 20:01:21 +02:00
|
|
|
{
|
2002-06-29 08:50:17 +02:00
|
|
|
if (pwinname && test_uid (pdomain, name, namelen))
|
2002-06-14 20:01:21 +02:00
|
|
|
return pdomain;
|
|
|
|
|
|
|
|
char username[UNLEN + 1];
|
|
|
|
DWORD ulen = sizeof (username);
|
|
|
|
char userdomain[DNLEN + 1];
|
|
|
|
DWORD dlen = sizeof (userdomain);
|
|
|
|
SID_NAME_USE use;
|
|
|
|
|
2002-06-29 04:36:08 +02:00
|
|
|
cfree_and_set (pwinname, almost_null);
|
2002-06-27 22:44:27 +02:00
|
|
|
cfree_and_set (pdomain, almost_null);
|
2002-06-14 20:01:21 +02:00
|
|
|
if (!LookupAccountSid (NULL, sid (), username, &ulen,
|
|
|
|
userdomain, &dlen, &use))
|
2002-06-27 22:44:27 +02:00
|
|
|
__seterrno ();
|
|
|
|
else
|
2002-06-14 20:01:21 +02:00
|
|
|
{
|
2002-06-29 04:36:08 +02:00
|
|
|
pwinname = cstrdup (username);
|
2002-06-27 22:44:27 +02:00
|
|
|
pdomain = cstrdup (userdomain);
|
2002-06-14 20:01:21 +02:00
|
|
|
}
|
2002-06-27 22:44:27 +02:00
|
|
|
return pdomain;
|
2002-06-12 07:13:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
2002-06-29 04:36:08 +02:00
|
|
|
cygheap_user::env_userprofile (const char *name, size_t namelen)
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
2002-06-29 04:36:08 +02:00
|
|
|
if (test_uid (puserprof, name, namelen))
|
|
|
|
return puserprof;
|
|
|
|
|
2008-02-14 17:47:11 +01:00
|
|
|
WCHAR userprofile_env_buf[NT_MAX_PATH];
|
|
|
|
WCHAR win_id[UNLEN + 1]; /* Large enough for SID */
|
2004-11-20 20:09:19 +01:00
|
|
|
|
2002-06-27 22:44:27 +02:00
|
|
|
cfree_and_set (puserprof, almost_null);
|
2004-11-20 20:09:19 +01:00
|
|
|
if (get_registry_hive_path (get_windows_id (win_id), userprofile_env_buf))
|
2008-02-14 17:47:11 +01:00
|
|
|
sys_wcstombs_alloc (&puserprof, HEAP_STR, userprofile_env_buf);
|
2002-06-16 07:26:14 +02:00
|
|
|
|
2002-06-27 22:44:27 +02:00
|
|
|
return puserprof;
|
2002-06-12 07:13:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
2002-06-29 04:36:08 +02:00
|
|
|
cygheap_user::env_homepath (const char *name, size_t namelen)
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
|
|
|
return ontherange (CH_HOMEPATH);
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
2002-06-29 04:36:08 +02:00
|
|
|
cygheap_user::env_homedrive (const char *name, size_t namelen)
|
2002-06-12 07:13:54 +02:00
|
|
|
{
|
|
|
|
return ontherange (CH_HOMEDRIVE);
|
|
|
|
}
|
2002-06-14 20:01:21 +02:00
|
|
|
|
|
|
|
const char *
|
2002-06-29 04:36:08 +02:00
|
|
|
cygheap_user::env_name (const char *name, size_t namelen)
|
2002-06-14 20:01:21 +02:00
|
|
|
{
|
2002-06-29 04:36:08 +02:00
|
|
|
if (!test_uid (pwinname, name, namelen))
|
2005-07-06 22:05:03 +02:00
|
|
|
domain ();
|
2002-06-29 04:36:08 +02:00
|
|
|
return pwinname;
|
2002-06-14 20:01:21 +02:00
|
|
|
}
|
2003-01-17 06:18:30 +01:00
|
|
|
|
2004-10-07 23:28:57 +02:00
|
|
|
const char *
|
|
|
|
cygheap_user::env_systemroot (const char *name, size_t namelen)
|
|
|
|
{
|
|
|
|
if (!psystemroot)
|
|
|
|
{
|
|
|
|
int size = GetWindowsDirectory (NULL, 0);
|
|
|
|
if (size > 0)
|
2005-05-02 05:50:11 +02:00
|
|
|
{
|
2007-11-26 22:30:49 +01:00
|
|
|
psystemroot = (char *) cmalloc_abort (HEAP_STR, ++size);
|
2004-10-07 23:28:57 +02:00
|
|
|
size = GetWindowsDirectory (psystemroot, size);
|
|
|
|
if (size <= 0)
|
|
|
|
{
|
|
|
|
cfree (psystemroot);
|
|
|
|
psystemroot = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (size <= 0)
|
2005-05-02 05:50:11 +02:00
|
|
|
debug_printf ("GetWindowsDirectory(), %E");
|
2004-10-07 23:28:57 +02:00
|
|
|
}
|
|
|
|
return psystemroot;
|
|
|
|
}
|
|
|
|
|
2003-01-20 03:57:54 +01:00
|
|
|
char *
|
2003-01-24 04:53:46 +01:00
|
|
|
pwdgrp::next_str (char c)
|
2003-01-17 06:18:30 +01:00
|
|
|
{
|
2003-01-24 04:53:46 +01:00
|
|
|
char *res = lptr;
|
2003-01-27 01:16:01 +01:00
|
|
|
lptr = strechr (lptr, c);
|
|
|
|
if (*lptr)
|
|
|
|
*lptr++ = '\0';
|
2003-01-24 04:53:46 +01:00
|
|
|
return res;
|
2003-01-20 03:57:54 +01:00
|
|
|
}
|
2003-01-17 06:18:30 +01:00
|
|
|
|
2003-01-26 06:38:38 +01:00
|
|
|
bool
|
|
|
|
pwdgrp::next_num (unsigned long& n)
|
2003-01-24 04:53:46 +01:00
|
|
|
{
|
2003-01-27 01:16:01 +01:00
|
|
|
char *p = next_str (':');
|
2003-01-24 04:53:46 +01:00
|
|
|
char *cp;
|
2003-01-26 06:38:38 +01:00
|
|
|
n = strtoul (p, &cp, 10);
|
|
|
|
return p != cp && !*cp;
|
2003-01-24 04:53:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
pwdgrp::add_line (char *eptr)
|
2003-01-20 03:57:54 +01:00
|
|
|
{
|
2003-01-24 04:53:46 +01:00
|
|
|
if (eptr)
|
2003-01-20 03:57:54 +01:00
|
|
|
{
|
2003-01-24 04:53:46 +01:00
|
|
|
lptr = eptr;
|
2003-01-27 01:31:30 +01:00
|
|
|
eptr = strchr (lptr, '\n');
|
|
|
|
if (eptr)
|
2003-01-24 04:53:46 +01:00
|
|
|
{
|
|
|
|
if (eptr > lptr && eptr[-1] == '\r')
|
2003-01-27 01:16:01 +01:00
|
|
|
eptr[-1] = '\0';
|
|
|
|
else
|
|
|
|
*eptr = '\0';
|
2003-01-24 04:53:46 +01:00
|
|
|
eptr++;
|
|
|
|
}
|
|
|
|
if (curr_lines >= max_lines)
|
|
|
|
{
|
|
|
|
max_lines += 10;
|
|
|
|
*pwdgrp_buf = realloc (*pwdgrp_buf, max_lines * pwdgrp_buf_elem_size);
|
|
|
|
}
|
2003-01-26 06:38:38 +01:00
|
|
|
if ((this->*parse) ())
|
|
|
|
curr_lines++;
|
2003-01-20 03:57:54 +01:00
|
|
|
}
|
2003-01-24 04:53:46 +01:00
|
|
|
return eptr;
|
2003-01-17 06:18:30 +01:00
|
|
|
}
|
|
|
|
|
2003-01-26 06:38:38 +01:00
|
|
|
void
|
2008-07-24 20:25:52 +02:00
|
|
|
pwdgrp::load (const wchar_t *rel_path)
|
2003-01-17 06:18:30 +01:00
|
|
|
{
|
2003-01-26 06:38:38 +01:00
|
|
|
static const char failed[] = "failed";
|
|
|
|
static const char succeeded[] = "succeeded";
|
2007-08-21 19:38:27 +02:00
|
|
|
const char *res = failed;
|
|
|
|
HANDLE fh = NULL;
|
|
|
|
|
|
|
|
NTSTATUS status;
|
|
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
FILE_STANDARD_INFORMATION fsi;
|
2003-01-26 06:38:38 +01:00
|
|
|
|
2003-01-20 03:57:54 +01:00
|
|
|
if (buf)
|
|
|
|
free (buf);
|
|
|
|
buf = NULL;
|
2003-08-17 19:50:40 +02:00
|
|
|
curr_lines = 0;
|
2003-01-20 03:57:54 +01:00
|
|
|
|
2008-07-24 20:25:52 +02:00
|
|
|
if (!path &&
|
2009-10-31 14:24:06 +01:00
|
|
|
!(path = (PWCHAR) malloc ((wcslen (installation_root)
|
2008-07-24 20:25:52 +02:00
|
|
|
+ wcslen (rel_path) + 1) * sizeof (WCHAR))))
|
2003-01-26 06:38:38 +01:00
|
|
|
{
|
2008-07-24 20:25:52 +02:00
|
|
|
paranoid_printf ("malloc (%W) failed", rel_path);
|
2007-08-21 19:38:27 +02:00
|
|
|
goto out;
|
2003-01-26 06:38:38 +01:00
|
|
|
}
|
2009-10-31 14:24:06 +01:00
|
|
|
wcpcpy (wcpcpy (path, installation_root), rel_path);
|
2008-07-24 20:25:52 +02:00
|
|
|
RtlInitUnicodeString (&upath, path);
|
|
|
|
|
|
|
|
InitializeObjectAttributes (&attr, &upath, OBJ_CASE_INSENSITIVE, NULL, NULL);
|
|
|
|
etc_ix = etc::init (etc_ix, &attr);
|
|
|
|
|
|
|
|
paranoid_printf ("%S", &upath);
|
|
|
|
|
2008-12-20 10:35:18 +01:00
|
|
|
status = NtOpenFile (&fh, SYNCHRONIZE | FILE_READ_DATA, &attr, &io,
|
2009-01-26 14:03:49 +01:00
|
|
|
FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT);
|
2007-08-21 19:38:27 +02:00
|
|
|
if (!NT_SUCCESS (status))
|
2003-01-20 03:57:54 +01:00
|
|
|
{
|
2008-07-24 20:25:52 +02:00
|
|
|
paranoid_printf ("NtOpenFile(%S) failed, status %p", &upath, status);
|
2007-08-21 19:38:27 +02:00
|
|
|
goto out;
|
2003-01-17 06:18:30 +01:00
|
|
|
}
|
2007-08-21 19:38:27 +02:00
|
|
|
status = NtQueryInformationFile (fh, &io, &fsi, sizeof fsi,
|
|
|
|
FileStandardInformation);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
paranoid_printf ("NtQueryInformationFile(%S) failed, status %p",
|
2008-07-24 20:25:52 +02:00
|
|
|
&upath, status);
|
2007-08-21 19:38:27 +02:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* FIXME: Should we test for HighPart set? If so, the
|
|
|
|
passwd or group file is way beyond what we can handle. */
|
|
|
|
/* FIXME 2: It's still ugly that we keep the file in memory.
|
|
|
|
Big organizations have naturally large passwd files. */
|
|
|
|
buf = (char *) malloc (fsi.EndOfFile.LowPart + 1);
|
|
|
|
if (!buf)
|
|
|
|
{
|
|
|
|
paranoid_printf ("malloc (%d) failed", fsi.EndOfFile.LowPart);
|
|
|
|
goto out;
|
|
|
|
}
|
2008-12-20 10:35:18 +01:00
|
|
|
status = NtReadFile (fh, NULL, NULL, NULL, &io, buf, fsi.EndOfFile.LowPart,
|
|
|
|
NULL, NULL);
|
2007-08-21 19:38:27 +02:00
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
2008-07-24 20:25:52 +02:00
|
|
|
paranoid_printf ("NtReadFile(%S) failed, status %p", &upath, status);
|
2007-08-21 19:38:27 +02:00
|
|
|
free (buf);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
buf[fsi.EndOfFile.LowPart] = '\0';
|
2008-09-11 06:34:24 +02:00
|
|
|
for (char *eptr = buf; (eptr = add_line (eptr)); )
|
2007-08-21 19:38:27 +02:00
|
|
|
continue;
|
2008-07-24 20:25:52 +02:00
|
|
|
debug_printf ("%W curr_lines %d", rel_path, curr_lines);
|
2007-08-21 19:38:27 +02:00
|
|
|
res = succeeded;
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (fh)
|
|
|
|
NtClose (fh);
|
2008-07-24 20:25:52 +02:00
|
|
|
debug_printf ("%W load %s", rel_path, res);
|
2003-01-21 07:58:11 +01:00
|
|
|
initialized = true;
|
2003-01-17 06:18:30 +01:00
|
|
|
}
|