mirror of
https://github.com/samba-team/samba.git
synced 2025-12-14 20:23:54 +03:00
event_context for the socket_connect() call, so that when things that
use dcerpc are running alongside anything else it doesn't block the
whole process during a connect.
Then of course I needed to change any code that created a dcerpc
connection (such as the auth code) to also take an event context, and
anything that called that and so on .... thus the size of the patch.
There were 3 places where I punted:
- abartlet wanted me to add a gensec_set_event_context() call
instead of adding it to the gensec init calls. Andrew, my
apologies for not doing this. I didn't do it as adding a new
parameter allowed me to catch all the callers with the
compiler. Now that its done, we could go back and use
gensec_set_event_context()
- the ejs code calls auth initialisation, which means it should pass
in the event context from the web server. I punted on that. Needs fixing.
- I used a NULL event context in dcom_get_pipe(). This is equivalent
to what we did already, but should be fixed to use a callers event
context. Jelmer, can you think of a clean way to do that?
I also cleaned up a couple of things:
- libnet_context_destroy() makes no sense. I removed it.
- removed some unused vars in various places
413 lines
9.2 KiB
C
413 lines
9.2 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
provide hooks into smbd C calls from ejs scripts
|
|
|
|
Copyright (C) Tim Potter 2005
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "lib/ejs/ejs.h"
|
|
#include "librpc/gen_ndr/ndr_nbt.h"
|
|
#include "libcli/raw/libcliraw.h"
|
|
#include "libcli/composite/composite.h"
|
|
|
|
/* Connect to a server */
|
|
|
|
static int ejs_cli_connect(MprVarHandle eid, int argc, char **argv)
|
|
{
|
|
struct smbcli_socket *sock;
|
|
struct smbcli_transport *transport;
|
|
struct nbt_name calling, called;
|
|
NTSTATUS result;
|
|
|
|
if (argc != 1) {
|
|
ejsSetErrorMsg(eid, "connect invalid arguments");
|
|
return -1;
|
|
}
|
|
|
|
/* Socket connect */
|
|
|
|
sock = smbcli_sock_init(NULL, NULL);
|
|
|
|
if (!sock) {
|
|
ejsSetErrorMsg(eid, "socket initialisation failed");
|
|
return -1;
|
|
}
|
|
|
|
if (!smbcli_sock_connect_byname(sock, argv[0], 0)) {
|
|
ejsSetErrorMsg(eid, "socket connect failed");
|
|
return -1;
|
|
}
|
|
|
|
transport = smbcli_transport_init(sock, sock, False);
|
|
|
|
if (!transport) {
|
|
ejsSetErrorMsg(eid, "transport init failed");
|
|
return -1;
|
|
}
|
|
|
|
/* Send a netbios session request */
|
|
|
|
make_nbt_name_client(&calling, lp_netbios_name());
|
|
|
|
nbt_choose_called_name(NULL, &called, argv[0], NBT_NAME_SERVER);
|
|
|
|
if (!smbcli_transport_connect(transport, &calling, &called)) {
|
|
ejsSetErrorMsg(eid, "transport establishment failed");
|
|
return -1;
|
|
}
|
|
|
|
result = smb_raw_negotiate(transport, lp_maxprotocol());
|
|
|
|
if (!NT_STATUS_IS_OK(result)) {
|
|
ejsSetReturnValue(eid, mprNTSTATUS(result));
|
|
return 0;
|
|
}
|
|
|
|
/* Return a socket object */
|
|
|
|
ejsSetReturnValue(eid, mprCreatePtrVar(transport,
|
|
talloc_get_name(transport)));
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Perform a session setup:
|
|
|
|
session_setup(conn, "DOMAIN\\USERNAME%PASSWORD");
|
|
session_setup(conn, USERNAME, PASSWORD);
|
|
session_setup(conn, DOMAIN, USERNAME, PASSWORD);
|
|
session_setup(conn); // anonymous
|
|
|
|
*/
|
|
|
|
static int ejs_cli_ssetup(MprVarHandle eid, int argc, MprVar **argv)
|
|
{
|
|
struct smbcli_transport *transport;
|
|
struct smbcli_session *session;
|
|
struct smb_composite_sesssetup setup;
|
|
struct cli_credentials *creds;
|
|
NTSTATUS status;
|
|
int result = -1;
|
|
|
|
/* Argument parsing */
|
|
|
|
if (argc < 1 || argc > 4) {
|
|
ejsSetErrorMsg(eid, "session_setup invalid arguments");
|
|
return -1;
|
|
}
|
|
|
|
if (!mprVarIsPtr(argv[0]->type)) {
|
|
ejsSetErrorMsg(eid, "first arg is not a connect handle");
|
|
return -1;
|
|
}
|
|
|
|
transport = argv[0]->ptr;
|
|
creds = cli_credentials_init(transport);
|
|
cli_credentials_set_conf(creds);
|
|
|
|
if (argc == 4) {
|
|
|
|
/* DOMAIN, USERNAME, PASSWORD form */
|
|
|
|
if (!mprVarIsString(argv[1]->type)) {
|
|
ejsSetErrorMsg(eid, "arg 1 must be a string");
|
|
goto done;
|
|
}
|
|
|
|
cli_credentials_set_domain(creds, argv[1]->string,
|
|
CRED_SPECIFIED);
|
|
|
|
if (!mprVarIsString(argv[2]->type)) {
|
|
ejsSetErrorMsg(eid, "arg 2 must be a string");
|
|
goto done;
|
|
}
|
|
|
|
cli_credentials_set_username(creds, argv[2]->string,
|
|
CRED_SPECIFIED);
|
|
|
|
if (!mprVarIsString(argv[3]->type)) {
|
|
ejsSetErrorMsg(eid, "arg 3 must be a string");
|
|
goto done;
|
|
}
|
|
|
|
cli_credentials_set_password(creds, argv[3]->string,
|
|
CRED_SPECIFIED);
|
|
|
|
} else if (argc == 3) {
|
|
|
|
/* USERNAME, PASSWORD form */
|
|
|
|
if (!mprVarIsString(argv[1]->type)) {
|
|
ejsSetErrorMsg(eid, "arg1 must be a string");
|
|
goto done;
|
|
}
|
|
|
|
cli_credentials_set_username(creds, argv[1]->string,
|
|
CRED_SPECIFIED);
|
|
|
|
if (!mprVarIsString(argv[2]->type)) {
|
|
|
|
ejsSetErrorMsg(eid, "arg2 must be a string");
|
|
goto done;
|
|
}
|
|
|
|
cli_credentials_set_password(creds, argv[2]->string,
|
|
CRED_SPECIFIED);
|
|
|
|
} else if (argc == 2) {
|
|
|
|
/* DOMAIN/USERNAME%PASSWORD form */
|
|
|
|
cli_credentials_parse_string(creds, argv[1]->string,
|
|
CRED_SPECIFIED);
|
|
|
|
} else {
|
|
|
|
/* Anonymous connection */
|
|
|
|
cli_credentials_set_anonymous(creds);
|
|
}
|
|
|
|
/* Do session setup */
|
|
|
|
session = smbcli_session_init(transport, transport, False);
|
|
|
|
if (!session) {
|
|
ejsSetErrorMsg(eid, "session init failed");
|
|
return -1;
|
|
}
|
|
|
|
setup.in.sesskey = transport->negotiate.sesskey;
|
|
setup.in.capabilities = transport->negotiate.capabilities;
|
|
setup.in.credentials = creds;
|
|
setup.in.workgroup = lp_workgroup();
|
|
|
|
status = smb_composite_sesssetup(session, &setup);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
ejsSetErrorMsg(eid, "session_setup: %s", nt_errstr(status));
|
|
return -1;
|
|
}
|
|
|
|
session->vuid = setup.out.vuid;
|
|
|
|
/* Return a session object */
|
|
|
|
ejsSetReturnValue(eid, mprCreatePtrVar(session,
|
|
talloc_get_name(session)));
|
|
|
|
result = 0;
|
|
|
|
done:
|
|
talloc_free(creds);
|
|
return result;
|
|
}
|
|
|
|
/* Perform a tree connect
|
|
|
|
tree_connect(session, SHARE);
|
|
|
|
*/
|
|
|
|
static int ejs_cli_tree_connect(MprVarHandle eid, int argc, MprVar **argv)
|
|
{
|
|
struct smbcli_session *session;
|
|
struct smbcli_tree *tree;
|
|
union smb_tcon tcon;
|
|
TALLOC_CTX *mem_ctx;
|
|
NTSTATUS status;
|
|
const char *password = "";
|
|
|
|
/* Argument parsing */
|
|
|
|
if (argc != 2) {
|
|
ejsSetErrorMsg(eid, "tree_connect invalid arguments");
|
|
return -1;
|
|
}
|
|
|
|
if (!mprVarIsPtr(argv[0]->type)) {
|
|
ejsSetErrorMsg(eid, "first arg is not a session handle");
|
|
return -1;
|
|
}
|
|
|
|
session = argv[0]->ptr;
|
|
tree = smbcli_tree_init(session, session, False);
|
|
|
|
if (!tree) {
|
|
ejsSetErrorMsg(eid, "tree init failed");
|
|
return -1;
|
|
}
|
|
|
|
mem_ctx = talloc_init("tcon");
|
|
if (!mem_ctx) {
|
|
ejsSetErrorMsg(eid, "talloc_init failed");
|
|
return -1;
|
|
}
|
|
|
|
/* Do tree connect */
|
|
|
|
tcon.generic.level = RAW_TCON_TCONX;
|
|
tcon.tconx.in.flags = 0;
|
|
|
|
if (session->transport->negotiate.sec_mode & NEGOTIATE_SECURITY_USER_LEVEL) {
|
|
tcon.tconx.in.password = data_blob(NULL, 0);
|
|
} else if (session->transport->negotiate.sec_mode & NEGOTIATE_SECURITY_CHALLENGE_RESPONSE) {
|
|
tcon.tconx.in.password = data_blob_talloc(mem_ctx, NULL, 24);
|
|
if (session->transport->negotiate.secblob.length < 8) {
|
|
ejsSetErrorMsg(eid, "invalid security blob");
|
|
return -1;
|
|
}
|
|
SMBencrypt(password, session->transport->negotiate.secblob.data, tcon.tconx.in.password.data);
|
|
} else {
|
|
tcon.tconx.in.password = data_blob_talloc(mem_ctx, password, strlen(password)+1);
|
|
}
|
|
|
|
tcon.tconx.in.path = argv[1]->string;
|
|
tcon.tconx.in.device = "?????";
|
|
|
|
status = smb_tree_connect(tree, mem_ctx, &tcon);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
ejsSetErrorMsg(eid, "tree_connect: %s", nt_errstr(status));
|
|
return -1;
|
|
}
|
|
|
|
tree->tid = tcon.tconx.out.tid;
|
|
|
|
talloc_free(mem_ctx);
|
|
|
|
ejsSetReturnValue(eid, mprCreatePtrVar(tree,
|
|
talloc_get_name(tree)));
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Perform a tree disconnect
|
|
|
|
tree_disconnect(tree);
|
|
|
|
*/
|
|
static int ejs_cli_tree_disconnect(MprVarHandle eid, int argc, MprVar **argv)
|
|
{
|
|
struct smbcli_tree *tree;
|
|
NTSTATUS status;
|
|
|
|
/* Argument parsing */
|
|
|
|
if (argc != 1) {
|
|
ejsSetErrorMsg(eid, "tree_disconnect invalid arguments");
|
|
return -1;
|
|
}
|
|
|
|
if (!mprVarIsPtr(argv[0]->type)) {
|
|
ejsSetErrorMsg(eid, "first arg is not a tree handle");
|
|
return -1;
|
|
}
|
|
|
|
tree = argv[0]->ptr;
|
|
|
|
status = smb_tree_disconnect(tree);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
ejsSetErrorMsg(eid, "tree_disconnect: %s", nt_errstr(status));
|
|
return -1;
|
|
}
|
|
|
|
talloc_free(tree);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Perform a ulogoff
|
|
|
|
session_logoff(session);
|
|
|
|
*/
|
|
static int ejs_cli_session_logoff(MprVarHandle eid, int argc, MprVar **argv)
|
|
{
|
|
struct smbcli_session *session;
|
|
NTSTATUS status;
|
|
|
|
/* Argument parsing */
|
|
|
|
if (argc != 1) {
|
|
ejsSetErrorMsg(eid, "session_logoff invalid arguments");
|
|
return -1;
|
|
}
|
|
|
|
if (!mprVarIsPtr(argv[0]->type)) {
|
|
ejsSetErrorMsg(eid, "first arg is not a session handle");
|
|
return -1;
|
|
}
|
|
|
|
session = argv[0]->ptr;
|
|
|
|
status = smb_raw_ulogoff(session);
|
|
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
ejsSetErrorMsg(eid, "session_logoff: %s", nt_errstr(status));
|
|
return -1;
|
|
}
|
|
|
|
talloc_free(session);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Perform a connection close
|
|
|
|
disconnect(conn);
|
|
|
|
*/
|
|
static int ejs_cli_disconnect(MprVarHandle eid, int argc, MprVar **argv)
|
|
{
|
|
struct smbcli_sock *sock;
|
|
|
|
/* Argument parsing */
|
|
|
|
if (argc != 1) {
|
|
ejsSetErrorMsg(eid, "disconnect invalid arguments");
|
|
return -1;
|
|
}
|
|
|
|
if (!mprVarIsPtr(argv[0]->type)) {
|
|
ejsSetErrorMsg(eid, "first arg is not a connect handle");
|
|
return -1;
|
|
}
|
|
|
|
sock = argv[0]->ptr;
|
|
|
|
talloc_free(sock);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
setup C functions that be called from ejs
|
|
*/
|
|
void smb_setup_ejs_cli(void)
|
|
{
|
|
ejsDefineStringCFunction(-1, "connect", ejs_cli_connect, NULL, MPR_VAR_SCRIPT_HANDLE);
|
|
ejsDefineCFunction(-1, "session_setup", ejs_cli_ssetup, NULL, MPR_VAR_SCRIPT_HANDLE);
|
|
ejsDefineCFunction(-1, "tree_connect", ejs_cli_tree_connect, NULL, MPR_VAR_SCRIPT_HANDLE);
|
|
ejsDefineCFunction(-1, "tree_disconnect", ejs_cli_tree_disconnect, NULL, MPR_VAR_SCRIPT_HANDLE);
|
|
ejsDefineCFunction(-1, "session_logoff", ejs_cli_session_logoff, NULL, MPR_VAR_SCRIPT_HANDLE);
|
|
ejsDefineCFunction(-1, "disconnect", ejs_cli_disconnect, NULL, MPR_VAR_SCRIPT_HANDLE);
|
|
}
|