2000-02-17 20:38:33 +01:00
|
|
|
/* uinfo.cc: user info (uid, gid, etc...)
|
|
|
|
|
|
|
|
Copyright 1996, 1997, 1998 Cygnus Solutions.
|
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
|
|
|
#include "winsup.h"
|
2000-08-02 18:28:18 +02:00
|
|
|
#include <pwd.h>
|
2000-07-29 18:24:59 +02:00
|
|
|
#include <unistd.h>
|
2000-07-27 19:30:51 +02:00
|
|
|
#include <winnls.h>
|
2000-02-17 20:38:33 +01:00
|
|
|
#include <utmp.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <wchar.h>
|
|
|
|
#include <lm.h>
|
2000-08-22 07:10:20 +02:00
|
|
|
#include "sync.h"
|
|
|
|
#include "sigproc.h"
|
2000-08-12 07:35:42 +02:00
|
|
|
#include "pinfo.h"
|
2000-09-08 04:56:55 +02:00
|
|
|
#include "registry.h"
|
|
|
|
#include "security.h"
|
2000-02-17 20:38:33 +01:00
|
|
|
|
|
|
|
char *
|
2000-07-29 18:24:59 +02:00
|
|
|
internal_getlogin (_pinfo *pi)
|
2000-02-17 20:38:33 +01:00
|
|
|
{
|
|
|
|
if (! pi)
|
|
|
|
api_fatal ("pinfo pointer is NULL!\n");
|
|
|
|
|
2000-06-19 19:36:30 +02:00
|
|
|
DWORD username_len = MAX_USER_NAME;
|
|
|
|
if (! GetUserName (pi->username, &username_len))
|
|
|
|
strcpy (pi->username, "unknown");
|
2000-02-17 20:38:33 +01:00
|
|
|
if (os_being_run == winNT)
|
|
|
|
{
|
2000-06-19 19:36:30 +02:00
|
|
|
LPWKSTA_USER_INFO_1 wui;
|
2000-07-22 18:43:54 +02:00
|
|
|
char buf[MAX_PATH], *env;
|
|
|
|
char *un = NULL;
|
2000-06-19 19:36:30 +02:00
|
|
|
|
|
|
|
/* First trying to get logon info from environment */
|
|
|
|
if ((env = getenv ("USERNAME")) != NULL)
|
2000-09-03 06:16:35 +02:00
|
|
|
un = env;
|
2000-06-19 19:36:30 +02:00
|
|
|
if ((env = getenv ("LOGONSERVER")) != NULL)
|
2000-09-03 06:16:35 +02:00
|
|
|
strcpy (pi->logsrv, env + 2); /* filter leading double backslashes */
|
2000-06-19 19:36:30 +02:00
|
|
|
if ((env = getenv ("USERDOMAIN")) != NULL)
|
2000-09-03 06:16:35 +02:00
|
|
|
strcpy (pi->domain, env);
|
2000-06-19 19:36:30 +02:00
|
|
|
/* Trust only if usernames are identical */
|
2000-07-22 18:43:54 +02:00
|
|
|
if (un && strcasematch (pi->username, un)
|
2000-09-03 06:16:35 +02:00
|
|
|
&& pi->domain[0] && pi->logsrv[0])
|
|
|
|
debug_printf ("Domain: %s, Logon Server: %s", pi->domain, pi->logsrv);
|
2000-06-19 19:36:30 +02:00
|
|
|
/* If that failed, try to get that info from NetBIOS */
|
|
|
|
else if (!NetWkstaUserGetInfo (NULL, 1, (LPBYTE *)&wui))
|
2000-09-03 06:16:35 +02:00
|
|
|
{
|
|
|
|
sys_wcstombs (pi->username, wui->wkui1_username, MAX_USER_NAME);
|
|
|
|
sys_wcstombs (pi->logsrv, wui->wkui1_logon_server, MAX_HOST_NAME);
|
|
|
|
sys_wcstombs (pi->domain, wui->wkui1_logon_domain,
|
|
|
|
MAX_COMPUTERNAME_LENGTH + 1);
|
|
|
|
/* Save values in environment */
|
|
|
|
if (!strcasematch (pi->username, "SYSTEM")
|
|
|
|
&& pi->domain[0] && pi->logsrv[0])
|
|
|
|
{
|
|
|
|
LPUSER_INFO_3 ui = NULL;
|
|
|
|
WCHAR wbuf[MAX_HOST_NAME + 2];
|
|
|
|
|
|
|
|
strcat (strcpy (buf, "\\\\"), pi->logsrv);
|
|
|
|
setenv ("USERNAME", pi->username, 1);
|
|
|
|
setenv ("LOGONSERVER", buf, 1);
|
|
|
|
setenv ("USERDOMAIN", pi->domain, 1);
|
|
|
|
/* HOMEDRIVE and HOMEPATH are wrong most of the time, too,
|
|
|
|
after changing user context! */
|
|
|
|
sys_mbstowcs (wbuf, buf, MAX_HOST_NAME + 2);
|
|
|
|
if (!NetUserGetInfo (NULL, wui->wkui1_username, 3, (LPBYTE *)&ui)
|
|
|
|
|| !NetUserGetInfo (wbuf,wui->wkui1_username,3,(LPBYTE *)&ui))
|
|
|
|
{
|
|
|
|
sys_wcstombs (buf, ui->usri3_home_dir, MAX_PATH);
|
|
|
|
if (!buf[0])
|
|
|
|
{
|
|
|
|
sys_wcstombs (buf, ui->usri3_home_dir_drive, MAX_PATH);
|
|
|
|
if (buf[0])
|
|
|
|
strcat (buf, "\\");
|
|
|
|
else
|
|
|
|
{
|
|
|
|
env = getenv ("SYSTEMDRIVE");
|
|
|
|
if (env && *env)
|
|
|
|
strcat (strcpy (buf, env), "\\");
|
|
|
|
else
|
|
|
|
GetSystemDirectoryA (buf, MAX_PATH);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
setenv ("HOMEPATH", buf + 2, 1);
|
|
|
|
buf[2] = '\0';
|
|
|
|
setenv ("HOMEDRIVE", buf, 1);
|
|
|
|
NetApiBufferFree (ui);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
debug_printf ("Domain: %s, Logon Server: %s, Windows Username: %s",
|
|
|
|
pi->domain, pi->logsrv, pi->username);
|
|
|
|
NetApiBufferFree (wui);
|
|
|
|
}
|
2000-06-19 19:36:30 +02:00
|
|
|
if (allow_ntsec)
|
2000-09-03 06:16:35 +02:00
|
|
|
{
|
|
|
|
HANDLE ptok = pi->token; /* Which is INVALID_HANDLE_VALUE if no
|
|
|
|
impersonation took place. */
|
|
|
|
DWORD siz;
|
|
|
|
char tu[1024];
|
|
|
|
int ret = 0;
|
2000-10-28 07:41:44 +02:00
|
|
|
|
2000-09-03 06:16:35 +02:00
|
|
|
/* Try to get the SID either from already impersonated token
|
|
|
|
or from current process first. To differ that two cases is
|
|
|
|
important, because you can't rely on the user information
|
|
|
|
in a process token of a currently impersonated process. */
|
|
|
|
if (ptok == INVALID_HANDLE_VALUE
|
|
|
|
&& !OpenProcessToken (GetCurrentProcess (), TOKEN_QUERY, &ptok))
|
|
|
|
debug_printf ("OpenProcessToken(): %E\n");
|
|
|
|
else if (!GetTokenInformation (ptok, TokenUser, (LPVOID) &tu,
|
|
|
|
sizeof tu, &siz))
|
|
|
|
debug_printf ("GetTokenInformation(): %E");
|
|
|
|
else if (!(ret = CopySid (MAX_SID_LEN, (PSID) pi->psid,
|
|
|
|
((TOKEN_USER *) &tu)->User.Sid)))
|
|
|
|
debug_printf ("Couldn't retrieve SID from access token!");
|
|
|
|
/* Close token only if it's a result from OpenProcessToken(). */
|
|
|
|
if (ptok != INVALID_HANDLE_VALUE && pi->token == INVALID_HANDLE_VALUE)
|
|
|
|
CloseHandle (ptok);
|
|
|
|
|
|
|
|
/* If that failes, try to get the SID from localhost. This can only
|
|
|
|
be done if a domain is given because there's a chance that a local
|
|
|
|
and a domain user may have the same name. */
|
|
|
|
if (!ret && pi->domain[0])
|
|
|
|
{
|
|
|
|
/* Concat DOMAIN\USERNAME for the next lookup */
|
|
|
|
strcat (strcat (strcpy (buf, pi->domain), "\\"), pi->username);
|
|
|
|
if (!(ret = lookup_name (buf, NULL, (PSID) pi->psid)))
|
|
|
|
debug_printf ("Couldn't retrieve SID locally!");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If that failes, too, as a last resort try to get the SID from
|
|
|
|
the logon server. */
|
|
|
|
if (!ret && !(ret = lookup_name(pi->username, pi->logsrv,
|
|
|
|
(PSID)pi->psid)))
|
|
|
|
debug_printf ("Couldn't retrieve SID from '%s'!", pi->logsrv);
|
|
|
|
|
|
|
|
/* If we have a SID, try to get the corresponding Cygwin user name
|
|
|
|
which can be different from the Windows user name. */
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
struct passwd *pw;
|
|
|
|
char psidbuf[MAX_SID_LEN];
|
|
|
|
PSID psid = (PSID) psidbuf;
|
|
|
|
|
|
|
|
pi->use_psid = 1;
|
|
|
|
if (!strcasematch (pi->username, "SYSTEM")
|
|
|
|
&& pi->domain[0] && pi->logsrv[0])
|
|
|
|
{
|
|
|
|
if (get_registry_hive_path (pi->psid, buf))
|
|
|
|
setenv ("USERPROFILE", buf, 1);
|
|
|
|
}
|
|
|
|
while ((pw = getpwent ()) != NULL)
|
|
|
|
if (get_pw_sid (psid, pw) && EqualSid (pi->psid, psid))
|
|
|
|
{
|
|
|
|
strcpy (pi->username, pw->pw_name);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
endpwent ();
|
|
|
|
}
|
|
|
|
}
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
2000-06-19 19:36:30 +02:00
|
|
|
debug_printf ("Cygwins Username: %s", pi->username);
|
2000-02-17 20:38:33 +01:00
|
|
|
return pi->username;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
uinfo_init ()
|
|
|
|
{
|
2000-06-19 19:36:30 +02:00
|
|
|
char *username;
|
2000-02-17 20:38:33 +01:00
|
|
|
struct passwd *p;
|
|
|
|
|
2000-06-28 19:42:28 +02:00
|
|
|
/* Initialize to non impersonated values.
|
|
|
|
Setting `impersonated' to TRUE seems to be wrong but it
|
|
|
|
isn't. Impersonated is thought as "Current User and `token'
|
|
|
|
are coincident". See seteuid() for the mechanism behind that. */
|
|
|
|
myself->token = INVALID_HANDLE_VALUE;
|
|
|
|
myself->impersonated = TRUE;
|
|
|
|
|
2000-07-02 12:17:44 +02:00
|
|
|
/* If uid is USHRT_MAX, the process is started from a non cygwin
|
|
|
|
process or the user context was changed in spawn.cc */
|
|
|
|
if (myself->uid == USHRT_MAX)
|
2000-07-02 02:00:17 +02:00
|
|
|
if ((p = getpwnam (username = internal_getlogin (myself))) != NULL)
|
|
|
|
{
|
2000-09-03 06:16:35 +02:00
|
|
|
myself->uid = p->pw_uid;
|
|
|
|
myself->gid = p->pw_gid;
|
2000-07-02 02:00:17 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2000-09-03 06:16:35 +02:00
|
|
|
myself->uid = DEFAULT_UID;
|
|
|
|
myself->gid = DEFAULT_GID;
|
2000-07-02 02:00:17 +02:00
|
|
|
}
|
2000-06-28 19:42:28 +02:00
|
|
|
/* Real and effective uid/gid are always identical on process start up.
|
|
|
|
This is at least true for NT/W2K. */
|
2000-06-16 21:36:07 +02:00
|
|
|
myself->orig_uid = myself->real_uid = myself->uid;
|
|
|
|
myself->orig_gid = myself->real_gid = myself->gid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" char *
|
|
|
|
getlogin (void)
|
|
|
|
{
|
|
|
|
#ifdef _MT_SAFE
|
|
|
|
char *this_username=_reent_winsup()->_username;
|
|
|
|
#else
|
|
|
|
static NO_COPY char this_username[MAX_USER_NAME];
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return strcpy (this_username, myself->username);
|
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" uid_t
|
|
|
|
getuid (void)
|
|
|
|
{
|
2000-06-16 21:36:07 +02:00
|
|
|
return myself->real_uid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" gid_t
|
|
|
|
getgid (void)
|
|
|
|
{
|
2000-06-16 21:36:07 +02:00
|
|
|
return myself->real_gid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" uid_t
|
|
|
|
geteuid (void)
|
|
|
|
{
|
2000-06-16 21:36:07 +02:00
|
|
|
return myself->uid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
extern "C" gid_t
|
|
|
|
getegid (void)
|
|
|
|
{
|
2000-06-16 21:36:07 +02:00
|
|
|
return myself->gid;
|
2000-02-17 20:38:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Not quite right - cuserid can change, getlogin can't */
|
|
|
|
extern "C" char *
|
|
|
|
cuserid (char *src)
|
|
|
|
{
|
|
|
|
if (src)
|
|
|
|
{
|
|
|
|
strcpy (src, getlogin ());
|
|
|
|
return src;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
return getlogin ();
|
|
|
|
}
|
|
|
|
}
|