1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-24 21:34:56 +03:00
samba-mirror/source3/modules/vfs_fake_perms.c
Andrew Bartlett 6d741e918f s3-auth Use *unix_token rather than utok in struct auth3_session_info
This brings this structure one step closer to the struct auth_session_info.

A few SMB_ASSERT calls are added in some key places to ensure that
this pointer is initialised, to make tracing any bugs here easier in
future.

NOTE: Many of the users of this structure should be reviewed, as unix
and NT access checks are mixed in a way that should just be done using
the NT ACL.  This patch has not changed this behaviour however.

Andrew Bartlett

Signed-off-by: Andrew Tridgell <tridge@samba.org>
2011-07-20 09:17:10 +10:00

79 lines
2.3 KiB
C

/*
* Fake Perms VFS module. Implements passthrough operation of all VFS
* calls to disk functions, except for file permissions, which are now
* mode 0700 for the current uid/gid.
*
* Copyright (C) Tim Potter, 1999-2000
* Copyright (C) Alexander Bokovoy, 2002
* Copyright (C) Andrew Bartlett, 2002
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "smbd/smbd.h"
#include "system/filesys.h"
#include "auth.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_VFS
static int fake_perms_stat(vfs_handle_struct *handle,
struct smb_filename *smb_fname)
{
int ret = -1;
ret = SMB_VFS_NEXT_STAT(handle, smb_fname);
if (ret == 0) {
if (S_ISDIR(smb_fname->st.st_ex_mode)) {
smb_fname->st.st_ex_mode = S_IFDIR | S_IRWXU;
} else {
smb_fname->st.st_ex_mode = S_IRWXU;
}
smb_fname->st.st_ex_uid = handle->conn->session_info->unix_token->uid;
smb_fname->st.st_ex_gid = handle->conn->session_info->unix_token->gid;
}
return ret;
}
static int fake_perms_fstat(vfs_handle_struct *handle, files_struct *fsp, SMB_STRUCT_STAT *sbuf)
{
int ret = -1;
ret = SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
if (ret == 0) {
if (S_ISDIR(sbuf->st_ex_mode)) {
sbuf->st_ex_mode = S_IFDIR | S_IRWXU;
} else {
sbuf->st_ex_mode = S_IRWXU;
}
sbuf->st_ex_uid = handle->conn->session_info->unix_token->uid;
sbuf->st_ex_gid = handle->conn->session_info->unix_token->gid;
}
return ret;
}
static struct vfs_fn_pointers vfs_fake_perms_fns = {
.stat = fake_perms_stat,
.fstat = fake_perms_fstat
};
NTSTATUS vfs_fake_perms_init(void);
NTSTATUS vfs_fake_perms_init(void)
{
return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "fake_perms",
&vfs_fake_perms_fns);
}