1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-27 03:21:53 +03:00

Sync with default perm changes in 2.2.

Jeremy.
This commit is contained in:
Jeremy Allison 0001-01-01 00:00:00 +00:00
parent 1c13110873
commit f02e67a096

View File

@ -458,20 +458,61 @@ static BOOL unpack_nt_owners(SMB_STRUCT_STAT *psbuf, uid_t *puser, gid_t *pgrp,
return True;
}
/****************************************************************************
Ensure the enforced permissions for this share apply.
****************************************************************************/
static mode_t apply_default_perms(files_struct *fsp, mode_t perms, mode_t type)
{
int snum = SNUM(fsp->conn);
mode_t and_bits = (mode_t)0;
mode_t or_bits = (mode_t)0;
/* Get the initial bits to apply. */
if (fsp->is_directory) {
and_bits = lp_dir_mask(snum);
or_bits = lp_force_dir_mode(snum);
} else {
and_bits = lp_create_mask(snum);
or_bits = lp_force_create_mode(snum);
}
/* Now bounce them into the S_USR space. */
switch(type) {
case S_IRUSR:
and_bits = unix_perms_to_acl_perms(and_bits, S_IRUSR, S_IWUSR, S_IXUSR);
or_bits = unix_perms_to_acl_perms(or_bits, S_IRUSR, S_IWUSR, S_IXUSR);
break;
case S_IRGRP:
and_bits = unix_perms_to_acl_perms(and_bits, S_IRGRP, S_IWGRP, S_IXGRP);
or_bits = unix_perms_to_acl_perms(or_bits, S_IRGRP, S_IWGRP, S_IXGRP);
break;
case S_IROTH:
and_bits = unix_perms_to_acl_perms(and_bits, S_IROTH, S_IWOTH, S_IXOTH);
or_bits = unix_perms_to_acl_perms(or_bits, S_IROTH, S_IWOTH, S_IXOTH);
break;
}
return ((perms & and_bits)|or_bits);
}
/****************************************************************************
A well formed POSIX file or default ACL has at least 3 entries, a
SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, SMB_ACL_OTHER_OBJ.
In addition, the owner must always have at least read access.
When using this call on get_acl, the pst struct is valid and contains
the mode of the file. When using this call on set_acl, the pst struct has
been modified to have a mode of r--------.
been modified to have a mode containing the default for this file or directory
type.
****************************************************************************/
static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
files_struct *fsp,
DOM_SID *pfile_owner_sid,
DOM_SID *pfile_grp_sid,
SMB_STRUCT_STAT *pst)
SMB_STRUCT_STAT *pst,
BOOL setting_acl)
{
extern DOM_SID global_sid_World;
canon_ace *pace;
@ -481,14 +522,42 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
for (pace = *pp_ace; pace; pace = pace->next) {
if (pace->type == SMB_ACL_USER_OBJ) {
/* Ensure owner has read access. */
if (pace->perms == (mode_t)0)
pace->perms = S_IRUSR;
if (setting_acl) {
if (pace->perms == (mode_t)0) {
/* Ensure owner has read access. */
pace->perms = S_IRUSR;
if (fsp->is_directory)
pace->perms |= (S_IWUSR|S_IXUSR);
}
/*
* Ensure create mask/force create mode is respected on set.
*/
pace->perms = apply_default_perms(fsp, pace->perms, S_IRUSR);
}
got_user = True;
} else if (pace->type == SMB_ACL_GROUP_OBJ)
} else if (pace->type == SMB_ACL_GROUP_OBJ) {
/*
* Ensure create mask/force create mode is respected on set.
*/
if (setting_acl)
pace->perms = apply_default_perms(fsp, pace->perms, S_IRGRP);
got_grp = True;
else if (pace->type == SMB_ACL_OTHER)
} else if (pace->type == SMB_ACL_OTHER) {
/*
* Ensure create mask/force create mode is respected on set.
*/
if (setting_acl)
pace->perms = apply_default_perms(fsp, pace->perms, S_IROTH);
got_other = True;
}
}
if (!got_user) {
@ -502,10 +571,7 @@ static BOOL ensure_canon_entry_valid(canon_ace **pp_ace,
pace->owner_type = UID_ACE;
pace->unix_ug.uid = pst->st_uid;
pace->sid = *pfile_owner_sid;
/* Ensure owner has read access. */
pace->perms = unix_perms_to_acl_perms(pst->st_mode, S_IRUSR, S_IWUSR, S_IXUSR);
if (pace->perms == (mode_t)0)
pace->perms = S_IRUSR;
pace->attr = ALLOW_ACE;
DLIST_ADD(*pp_ace, pace);
@ -652,14 +718,17 @@ static BOOL create_canon_ace_lists(files_struct *fsp,
*/
if(sid_equal(&current_ace->sid, pfile_owner_sid)) {
/* Note we should apply the default mode/mask here.... FIXME ! JRA */
current_ace->type = SMB_ACL_USER_OBJ;
} else if( sid_equal(&current_ace->sid, pfile_grp_sid)) {
/* Note we should apply the default mode/mask here.... FIXME ! JRA */
current_ace->type = SMB_ACL_GROUP_OBJ;
} else if( sid_equal(&current_ace->sid, &global_sid_World)) {
/* Note we should apply the default mode/mask here.... FIXME ! JRA */
current_ace->type = SMB_ACL_OTHER;
} else {
/*
* Could be a SMB_ACL_USER or SMB_ACL_GROUP. Check by
@ -1089,6 +1158,37 @@ static void process_deny_list( canon_ace **pp_ace_list )
*pp_ace_list = ace_list;
}
/****************************************************************************
Create a default mode that will be used if a security descriptor entry has
no user/group/world entries.
****************************************************************************/
static mode_t create_default_mode(files_struct *fsp, BOOL interitable_mode)
{
int snum = SNUM(fsp->conn);
mode_t and_bits = (mode_t)0;
mode_t or_bits = (mode_t)0;
mode_t mode = interitable_mode ? unix_mode( fsp->conn, FILE_ATTRIBUTE_ARCHIVE, fsp->fsp_name) : S_IRUSR;
if (fsp->is_directory)
mode |= (S_IWUSR|S_IXUSR);
/*
* Now AND with the create mode/directory mode bits then OR with the
* force create mode/force directory mode bits.
*/
if (fsp->is_directory) {
and_bits = lp_dir_mask(snum);
or_bits = lp_force_dir_mode(snum);
} else {
and_bits = lp_create_mask(snum);
or_bits = lp_force_create_mode(snum);
}
return ((mode & and_bits)|or_bits);
}
/****************************************************************************
Unpack a SEC_DESC into two canonical ace lists. We don't depend on this
succeeding.
@ -1166,14 +1266,12 @@ static BOOL unpack_canon_ace(files_struct *fsp,
/*
* A default 3 element mode entry for a file should be r-- --- ---.
* A default 3 element mode entry for a directory should be r-x --- ---.
* A default 3 element mode entry for a directory should be rwx --- ---.
*/
pst->st_mode = S_IRUSR;
if (fsp->is_directory)
pst->st_mode |= S_IXUSR;
pst->st_mode = create_default_mode(fsp, False);
if (!ensure_canon_entry_valid(&file_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst)) {
if (!ensure_canon_entry_valid(&file_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
free_canon_ace_list(file_ace);
free_canon_ace_list(dir_ace);
return False;
@ -1183,15 +1281,13 @@ static BOOL unpack_canon_ace(files_struct *fsp,
/*
* A default inheritable 3 element mode entry for a directory should be the
* mode Samba will use to create a file within. Ensure user x bit is set if
* mode Samba will use to create a file within. Ensure user rwx bits are set if
* it's a directory.
*/
pst->st_mode = unix_mode( fsp->conn, FILE_ATTRIBUTE_ARCHIVE, fsp->fsp_name);
if (fsp->is_directory)
pst->st_mode |= S_IXUSR;
pst->st_mode = create_default_mode(fsp, True);
if (!ensure_canon_entry_valid(&dir_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst)) {
if (!ensure_canon_entry_valid(&dir_ace, fsp, pfile_owner_sid, pfile_grp_sid, pst, True)) {
free_canon_ace_list(file_ace);
free_canon_ace_list(dir_ace);
return False;
@ -1206,7 +1302,6 @@ static BOOL unpack_canon_ace(files_struct *fsp,
}
/******************************************************************************
When returning permissions, try and fit NT display
semantics if possible. Note the the canon_entries here must have been malloced.
@ -1377,7 +1472,7 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
* This next call will ensure we have at least a user/group/world set.
*/
if (!ensure_canon_entry_valid(&list_head, fsp, powner, pgroup, psbuf))
if (!ensure_canon_entry_valid(&list_head, fsp, powner, pgroup, psbuf, False))
goto fail;
arrange_posix_perms(fsp->fsp_name,&list_head );
@ -1387,7 +1482,7 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
* acl_mask. Ensure all DENY Entries are at the start of the list.
*/
DEBUG(10,("canonicalize_acl: ace entries before arrange :\n"));
DEBUG(10,("canonicalise_acl: ace entries before arrange :\n"));
for ( ace_count = 0, ace = list_head; ace; ace = next_ace, ace_count++) {
next_ace = ace->next;
@ -1405,7 +1500,7 @@ static canon_ace *canonicalise_acl( files_struct *fsp, SMB_ACL_T posix_acl, SMB_
}
}
print_canon_ace_list( "canonicalize_acl: ace entries after arrange", list_head );
print_canon_ace_list( "canonicalise_acl: ace entries after arrange", list_head );
return list_head;