2020-01-01 00:14:33 +00:00
|
|
|
/* Copyright (C) 1998-2020 Free Software Foundation, Inc.
|
1998-06-19 13:01:35 +00:00
|
|
|
This file is part of the GNU C Library.
|
2000-03-17 18:34:30 +00:00
|
|
|
Contributed by Thorsten Kukuk <kukuk@suse.de>, 1998.
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
2001-07-06 04:58:11 +00:00
|
|
|
modify it under the terms of the GNU Lesser General Public
|
|
|
|
License as published by the Free Software Foundation; either
|
|
|
|
version 2.1 of the License, or (at your option) any later version.
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
2001-07-06 04:58:11 +00:00
|
|
|
Lesser General Public License for more details.
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2001-07-06 04:58:11 +00:00
|
|
|
You should have received a copy of the GNU Lesser General Public
|
2012-02-09 23:18:22 +00:00
|
|
|
License along with the GNU C Library; if not, see
|
Prefer https to http for gnu.org and fsf.org URLs
Also, change sources.redhat.com to sourceware.org.
This patch was automatically generated by running the following shell
script, which uses GNU sed, and which avoids modifying files imported
from upstream:
sed -ri '
s,(http|ftp)(://(.*\.)?(gnu|fsf|sourceware)\.org($|[^.]|\.[^a-z])),https\2,g
s,(http|ftp)(://(.*\.)?)sources\.redhat\.com($|[^.]|\.[^a-z]),https\2sourceware.org\4,g
' \
$(find $(git ls-files) -prune -type f \
! -name '*.po' \
! -name 'ChangeLog*' \
! -path COPYING ! -path COPYING.LIB \
! -path manual/fdl-1.3.texi ! -path manual/lgpl-2.1.texi \
! -path manual/texinfo.tex ! -path scripts/config.guess \
! -path scripts/config.sub ! -path scripts/install-sh \
! -path scripts/mkinstalldirs ! -path scripts/move-if-change \
! -path INSTALL ! -path locale/programs/charmap-kw.h \
! -path po/libc.pot ! -path sysdeps/gnu/errlist.c \
! '(' -name configure \
-execdir test -f configure.ac -o -f configure.in ';' ')' \
! '(' -name preconfigure \
-execdir test -f preconfigure.ac ';' ')' \
-print)
and then by running 'make dist-prepare' to regenerate files built
from the altered files, and then executing the following to cleanup:
chmod a+x sysdeps/unix/sysv/linux/riscv/configure
# Omit irrelevant whitespace and comment-only changes,
# perhaps from a slightly-different Autoconf version.
git checkout -f \
sysdeps/csky/configure \
sysdeps/hppa/configure \
sysdeps/riscv/configure \
sysdeps/unix/sysv/linux/csky/configure
# Omit changes that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/powerpc/powerpc64/ppc-mcount.S: trailing lines
git checkout -f \
sysdeps/powerpc/powerpc64/ppc-mcount.S \
sysdeps/unix/sysv/linux/s390/s390-64/syscall.S
# Omit change that caused a pre-commit check to fail like this:
# remote: *** error: sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S: last line does not end in newline
git checkout -f sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S
2019-09-07 05:40:42 +00:00
|
|
|
<https://www.gnu.org/licenses/>. */
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
#include <ctype.h>
|
1998-06-19 13:01:35 +00:00
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <grp.h>
|
2003-06-28 07:57:21 +00:00
|
|
|
#include <nss.h>
|
|
|
|
#include <stdio_ext.h>
|
1998-06-19 13:01:35 +00:00
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
2000-07-24 05:41:25 +00:00
|
|
|
#include <sys/param.h>
|
1998-06-19 13:01:35 +00:00
|
|
|
#include <nsswitch.h>
|
2015-09-08 21:11:03 +00:00
|
|
|
#include <libc-lock.h>
|
2007-07-22 18:38:37 +00:00
|
|
|
#include <kernel-features.h>
|
2015-04-08 18:55:02 +00:00
|
|
|
#include <scratch_buffer.h>
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2020-02-12 10:47:13 +00:00
|
|
|
NSS_DECLARE_MODULE_FUNCTIONS (compat)
|
|
|
|
|
2001-04-26 14:11:35 +00:00
|
|
|
static service_user *ni;
|
2020-02-12 10:30:06 +00:00
|
|
|
static enum nss_status (*initgroups_dyn_impl) (const char *, gid_t,
|
|
|
|
long int *, long int *,
|
|
|
|
gid_t **, long int, int *);
|
|
|
|
static enum nss_status (*getgrnam_r_impl) (const char *name,
|
|
|
|
struct group * grp, char *buffer,
|
|
|
|
size_t buflen, int *errnop);
|
|
|
|
static enum nss_status (*getgrgid_r_impl) (gid_t gid, struct group * grp,
|
|
|
|
char *buffer, size_t buflen,
|
|
|
|
int *errnop);
|
|
|
|
static enum nss_status (*setgrent_impl) (int stayopen);
|
|
|
|
static enum nss_status (*getgrent_r_impl) (struct group * grp, char *buffer,
|
|
|
|
size_t buflen, int *errnop);
|
|
|
|
static enum nss_status (*endgrent_impl) (void);
|
2003-06-28 07:57:21 +00:00
|
|
|
|
|
|
|
/* Protect global state against multiple changers. */
|
|
|
|
__libc_lock_define_initialized (static, lock)
|
|
|
|
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
/* Get the declaration of the parser function. */
|
|
|
|
#define ENTNAME grent
|
|
|
|
#define STRUCTURE group
|
|
|
|
#define EXTERN_PARSER
|
|
|
|
#include <nss/nss_files/files-parse.c>
|
|
|
|
|
|
|
|
/* Structure for remembering -group members ... */
|
|
|
|
#define BLACKLIST_INITIAL_SIZE 512
|
|
|
|
#define BLACKLIST_INCREMENT 256
|
|
|
|
struct blacklist_t
|
1998-08-21 17:28:41 +00:00
|
|
|
{
|
2003-06-28 07:57:21 +00:00
|
|
|
char *data;
|
|
|
|
int current;
|
|
|
|
int size;
|
1998-08-21 17:28:41 +00:00
|
|
|
};
|
|
|
|
|
1998-06-19 13:01:35 +00:00
|
|
|
struct ent_t
|
2003-06-28 07:57:21 +00:00
|
|
|
{
|
2009-06-21 03:39:19 +00:00
|
|
|
bool files;
|
|
|
|
bool need_endgrent;
|
|
|
|
bool skip_initgroups_dyn;
|
2003-06-28 07:57:21 +00:00
|
|
|
FILE *stream;
|
|
|
|
struct blacklist_t blacklist;
|
1998-06-19 13:01:35 +00:00
|
|
|
};
|
|
|
|
typedef struct ent_t ent_t;
|
|
|
|
|
|
|
|
/* Prototypes for local functions. */
|
|
|
|
static void blacklist_store_name (const char *, ent_t *);
|
2017-10-02 12:30:46 +00:00
|
|
|
static bool in_blacklist (const char *, int, ent_t *);
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
/* Initialize the NSS interface/functions. The calling function must
|
|
|
|
hold the lock. */
|
|
|
|
static void
|
|
|
|
init_nss_interface (void)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2003-06-28 07:57:21 +00:00
|
|
|
__libc_lock_lock (lock);
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
/* Retest. */
|
|
|
|
if (ni == NULL
|
2019-05-15 11:51:35 +00:00
|
|
|
&& __nss_database_lookup2 ("group_compat", NULL, "nis", &ni) >= 0)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2020-02-12 10:30:06 +00:00
|
|
|
initgroups_dyn_impl = __nss_lookup_function (ni, "initgroups_dyn");
|
|
|
|
getgrnam_r_impl = __nss_lookup_function (ni, "getgrnam_r");
|
|
|
|
getgrgid_r_impl = __nss_lookup_function (ni, "getgrgid_r");
|
|
|
|
setgrent_impl = __nss_lookup_function (ni, "setgrent");
|
|
|
|
getgrent_r_impl = __nss_lookup_function (ni, "getgrent_r");
|
|
|
|
endgrent_impl = __nss_lookup_function (ni, "endgrent");
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
__libc_lock_unlock (lock);
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static enum nss_status
|
|
|
|
internal_setgrent (ent_t *ent)
|
|
|
|
{
|
|
|
|
enum nss_status status = NSS_STATUS_SUCCESS;
|
|
|
|
|
2009-06-21 03:39:19 +00:00
|
|
|
ent->files = true;
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
if (ni == NULL)
|
|
|
|
init_nss_interface ();
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
if (ent->blacklist.data != NULL)
|
|
|
|
{
|
|
|
|
ent->blacklist.current = 1;
|
|
|
|
ent->blacklist.data[0] = '|';
|
|
|
|
ent->blacklist.data[1] = '\0';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ent->blacklist.current = 0;
|
|
|
|
|
2007-07-22 18:38:37 +00:00
|
|
|
ent->stream = fopen ("/etc/group", "rme");
|
2003-06-28 07:57:21 +00:00
|
|
|
|
1998-06-19 13:01:35 +00:00
|
|
|
if (ent->stream == NULL)
|
2003-06-28 07:57:21 +00:00
|
|
|
status = errno == EAGAIN ? NSS_STATUS_TRYAGAIN : NSS_STATUS_UNAVAIL;
|
|
|
|
else
|
2017-04-18 12:56:51 +00:00
|
|
|
/* We take care of locking ourself. */
|
|
|
|
__fsetlocking (ent->stream, FSETLOCKING_BYCALLER);
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-05-19 12:09:38 +00:00
|
|
|
static enum nss_status __attribute_warn_unused_result__
|
1998-06-19 13:01:35 +00:00
|
|
|
internal_endgrent (ent_t *ent)
|
|
|
|
{
|
|
|
|
if (ent->stream != NULL)
|
|
|
|
{
|
|
|
|
fclose (ent->stream);
|
|
|
|
ent->stream = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ent->blacklist.data != NULL)
|
|
|
|
{
|
|
|
|
ent->blacklist.current = 1;
|
|
|
|
ent->blacklist.data[0] = '|';
|
|
|
|
ent->blacklist.data[1] = '\0';
|
|
|
|
}
|
|
|
|
else
|
|
|
|
ent->blacklist.current = 0;
|
|
|
|
|
2020-02-12 10:30:06 +00:00
|
|
|
if (ent->need_endgrent && endgrent_impl != NULL)
|
|
|
|
endgrent_impl ();
|
2009-06-21 03:39:19 +00:00
|
|
|
|
1998-06-19 13:01:35 +00:00
|
|
|
return NSS_STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2020-05-19 12:09:38 +00:00
|
|
|
/* Like internal_endgrent, but preserve errno in all cases. */
|
|
|
|
static void
|
|
|
|
internal_endgrent_noerror (ent_t *ent)
|
|
|
|
{
|
|
|
|
int saved_errno = errno;
|
|
|
|
enum nss_status unused __attribute__ ((unused)) = internal_endgrent (ent);
|
|
|
|
__set_errno (saved_errno);
|
|
|
|
}
|
|
|
|
|
2009-06-21 03:39:19 +00:00
|
|
|
/* Add new group record. */
|
2003-06-28 07:57:21 +00:00
|
|
|
static void
|
2009-06-21 03:39:19 +00:00
|
|
|
add_group (long int *start, long int *size, gid_t **groupsp, long int limit,
|
|
|
|
gid_t gid)
|
|
|
|
{
|
|
|
|
gid_t *groups = *groupsp;
|
|
|
|
|
|
|
|
/* Matches user. Insert this group. */
|
2014-02-10 13:45:42 +00:00
|
|
|
if (__glibc_unlikely (*start == *size))
|
2009-06-21 03:39:19 +00:00
|
|
|
{
|
|
|
|
/* Need a bigger buffer. */
|
|
|
|
gid_t *newgroups;
|
|
|
|
long int newsize;
|
|
|
|
|
|
|
|
if (limit > 0 && *size == limit)
|
|
|
|
/* We reached the maximum. */
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (limit <= 0)
|
|
|
|
newsize = 2 * *size;
|
|
|
|
else
|
|
|
|
newsize = MIN (limit, 2 * *size);
|
|
|
|
|
|
|
|
newgroups = realloc (groups, newsize * sizeof (*groups));
|
|
|
|
if (newgroups == NULL)
|
|
|
|
return;
|
|
|
|
*groupsp = groups = newgroups;
|
|
|
|
*size = newsize;
|
|
|
|
}
|
|
|
|
|
|
|
|
groups[*start] = gid;
|
|
|
|
*start += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This function checks, if the user is a member of this group and if
|
|
|
|
yes, add the group id to the list. Return nonzero is we couldn't
|
|
|
|
handle the group because the user is not in the member list. */
|
|
|
|
static int
|
2003-06-28 07:57:21 +00:00
|
|
|
check_and_add_group (const char *user, gid_t group, long int *start,
|
|
|
|
long int *size, gid_t **groupsp, long int limit,
|
|
|
|
struct group *grp)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2003-06-28 07:57:21 +00:00
|
|
|
char **member;
|
|
|
|
|
|
|
|
/* Don't add main group to list of groups. */
|
|
|
|
if (grp->gr_gid == group)
|
2009-06-21 03:39:19 +00:00
|
|
|
return 0;
|
2003-06-28 07:57:21 +00:00
|
|
|
|
|
|
|
for (member = grp->gr_mem; *member != NULL; ++member)
|
|
|
|
if (strcmp (*member, user) == 0)
|
|
|
|
{
|
2009-06-21 03:39:19 +00:00
|
|
|
add_group (start, size, groupsp, limit, grp->gr_gid);
|
|
|
|
return 0;
|
2003-06-28 07:57:21 +00:00
|
|
|
}
|
2009-06-21 03:39:19 +00:00
|
|
|
|
|
|
|
return 1;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
|
2004-07-23 06:27:05 +00:00
|
|
|
/* Get the next group from NSS (+ entry). If the NSS module supports
|
2003-06-28 07:57:21 +00:00
|
|
|
initgroups_dyn, get all entries at once. */
|
1998-06-19 13:01:35 +00:00
|
|
|
static enum nss_status
|
2003-06-28 07:57:21 +00:00
|
|
|
getgrent_next_nss (ent_t *ent, char *buffer, size_t buflen, const char *user,
|
|
|
|
gid_t group, long int *start, long int *size,
|
|
|
|
gid_t **groupsp, long int limit, int *errnop)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2003-06-28 07:57:21 +00:00
|
|
|
enum nss_status status;
|
|
|
|
struct group grpbuf;
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
/* Try nss_initgroups_dyn if supported. We also need getgrgid_r.
|
|
|
|
If this function is not supported, step through the whole group
|
|
|
|
database with getgrent_r. */
|
2009-06-21 03:39:19 +00:00
|
|
|
if (! ent->skip_initgroups_dyn)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2004-07-23 06:27:05 +00:00
|
|
|
long int mystart = 0;
|
2004-08-19 21:03:12 +00:00
|
|
|
long int mysize = limit <= 0 ? *size : limit;
|
2004-08-19 21:39:39 +00:00
|
|
|
gid_t *mygroups = malloc (mysize * sizeof (gid_t));
|
2004-07-23 06:27:05 +00:00
|
|
|
|
2004-08-19 21:39:39 +00:00
|
|
|
if (mygroups == NULL)
|
2004-07-23 06:27:05 +00:00
|
|
|
return NSS_STATUS_TRYAGAIN;
|
2003-06-28 07:57:21 +00:00
|
|
|
|
|
|
|
/* For every gid in the list we get from the NSS module,
|
2010-11-22 16:15:08 +00:00
|
|
|
get the whole group entry. We need to do this, since we
|
|
|
|
need the group name to check if it is in the blacklist.
|
|
|
|
In worst case, this is as twice as slow as stepping with
|
|
|
|
getgrent_r through the whole group database. But for large
|
|
|
|
group databases this is faster, since the user can only be
|
|
|
|
in a limited number of groups. */
|
2020-02-12 10:30:06 +00:00
|
|
|
if (initgroups_dyn_impl (user, group, &mystart, &mysize, &mygroups,
|
|
|
|
limit, errnop) == NSS_STATUS_SUCCESS)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2012-03-29 15:56:27 +00:00
|
|
|
status = NSS_STATUS_NOTFOUND;
|
|
|
|
|
2009-06-21 03:39:19 +00:00
|
|
|
/* If there is no blacklist we can trust the underlying
|
|
|
|
initgroups implementation. */
|
|
|
|
if (ent->blacklist.current <= 1)
|
|
|
|
for (int i = 0; i < mystart; i++)
|
|
|
|
add_group (start, size, groupsp, limit, mygroups[i]);
|
|
|
|
else
|
2003-06-28 07:57:21 +00:00
|
|
|
{
|
2009-06-21 03:39:19 +00:00
|
|
|
/* A temporary buffer. We use the normal buffer, until we find
|
|
|
|
an entry, for which this buffer is to small. In this case, we
|
|
|
|
overwrite the pointer with one to a bigger buffer. */
|
|
|
|
char *tmpbuf = buffer;
|
|
|
|
size_t tmplen = buflen;
|
|
|
|
|
|
|
|
for (int i = 0; i < mystart; i++)
|
2007-11-23 02:36:37 +00:00
|
|
|
{
|
2020-02-12 10:30:06 +00:00
|
|
|
while ((status = getgrgid_r_impl (mygroups[i], &grpbuf,
|
|
|
|
tmpbuf, tmplen, errnop))
|
2009-06-21 03:39:19 +00:00
|
|
|
== NSS_STATUS_TRYAGAIN
|
|
|
|
&& *errnop == ERANGE)
|
2012-03-29 15:56:27 +00:00
|
|
|
{
|
2018-06-25 16:56:42 +00:00
|
|
|
/* Check for overflow. */
|
|
|
|
if (__glibc_unlikely (tmplen * 2 < tmplen))
|
|
|
|
{
|
|
|
|
__set_errno (ENOMEM);
|
|
|
|
status = NSS_STATUS_TRYAGAIN;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
/* Increase the size. Make sure that we retry
|
|
|
|
with a reasonable size. */
|
|
|
|
tmplen *= 2;
|
|
|
|
if (tmplen < 1024)
|
|
|
|
tmplen = 1024;
|
|
|
|
if (tmpbuf != buffer)
|
|
|
|
free (tmpbuf);
|
|
|
|
tmpbuf = malloc (tmplen);
|
|
|
|
if (__glibc_unlikely (tmpbuf == NULL))
|
|
|
|
{
|
|
|
|
status = NSS_STATUS_TRYAGAIN;
|
|
|
|
goto done;
|
|
|
|
}
|
2012-03-29 15:56:27 +00:00
|
|
|
}
|
2009-06-21 03:39:19 +00:00
|
|
|
|
|
|
|
if (__builtin_expect (status != NSS_STATUS_NOTFOUND, 1))
|
2007-11-23 02:36:37 +00:00
|
|
|
{
|
2009-06-21 03:39:19 +00:00
|
|
|
if (__builtin_expect (status != NSS_STATUS_SUCCESS, 0))
|
2012-03-29 15:56:27 +00:00
|
|
|
goto done;
|
2009-06-21 03:39:19 +00:00
|
|
|
|
|
|
|
if (!in_blacklist (grpbuf.gr_name,
|
|
|
|
strlen (grpbuf.gr_name), ent)
|
|
|
|
&& check_and_add_group (user, group, start, size,
|
|
|
|
groupsp, limit, &grpbuf))
|
|
|
|
{
|
2020-02-12 10:30:06 +00:00
|
|
|
if (setgrent_impl != NULL)
|
2009-06-21 03:39:19 +00:00
|
|
|
{
|
2020-02-12 10:30:06 +00:00
|
|
|
setgrent_impl (1);
|
2009-06-21 03:39:19 +00:00
|
|
|
ent->need_endgrent = true;
|
|
|
|
}
|
|
|
|
ent->skip_initgroups_dyn = true;
|
|
|
|
|
|
|
|
goto iter;
|
|
|
|
}
|
2007-11-23 02:36:37 +00:00
|
|
|
}
|
|
|
|
}
|
2012-03-29 15:56:27 +00:00
|
|
|
|
|
|
|
status = NSS_STATUS_NOTFOUND;
|
|
|
|
|
|
|
|
done:
|
2018-06-25 16:56:42 +00:00
|
|
|
if (tmpbuf != buffer)
|
2012-03-29 15:56:27 +00:00
|
|
|
free (tmpbuf);
|
2003-06-28 07:57:21 +00:00
|
|
|
}
|
2004-07-23 06:27:05 +00:00
|
|
|
|
2004-08-19 21:39:39 +00:00
|
|
|
free (mygroups);
|
2004-07-23 06:27:05 +00:00
|
|
|
|
2012-03-29 15:56:27 +00:00
|
|
|
return status;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
2004-07-23 06:27:05 +00:00
|
|
|
|
2004-08-19 21:39:39 +00:00
|
|
|
free (mygroups);
|
2003-06-28 07:57:21 +00:00
|
|
|
}
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
/* If we come here, the NSS module does not support initgroups_dyn
|
2009-06-21 03:39:19 +00:00
|
|
|
or we were confronted with a split group. In these cases we have
|
|
|
|
to step through the whole list ourself. */
|
|
|
|
iter:
|
2003-06-28 07:57:21 +00:00
|
|
|
do
|
|
|
|
{
|
2020-02-12 10:30:06 +00:00
|
|
|
if ((status = getgrent_r_impl (&grpbuf, buffer, buflen, errnop))
|
2019-02-25 13:19:19 +00:00
|
|
|
!= NSS_STATUS_SUCCESS)
|
2009-06-21 03:39:19 +00:00
|
|
|
break;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
2003-06-28 07:57:21 +00:00
|
|
|
while (in_blacklist (grpbuf.gr_name, strlen (grpbuf.gr_name), ent));
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2009-06-21 03:39:19 +00:00
|
|
|
if (status == NSS_STATUS_SUCCESS)
|
|
|
|
check_and_add_group (user, group, start, size, groupsp, limit, &grpbuf);
|
|
|
|
|
|
|
|
return status;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static enum nss_status
|
2003-06-28 07:57:21 +00:00
|
|
|
internal_getgrent_r (ent_t *ent, char *buffer, size_t buflen, const char *user,
|
|
|
|
gid_t group, long int *start, long int *size,
|
|
|
|
gid_t **groupsp, long int limit, int *errnop)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
|
|
|
struct parser_data *data = (void *) buffer;
|
2003-06-28 07:57:21 +00:00
|
|
|
struct group grpbuf;
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
if (!ent->files)
|
|
|
|
return getgrent_next_nss (ent, buffer, buflen, user, group,
|
|
|
|
start, size, groupsp, limit, errnop);
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
fpos_t pos;
|
|
|
|
int parse_res = 0;
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
do
|
|
|
|
{
|
2004-09-12 20:38:38 +00:00
|
|
|
/* We need at least 3 characters for one line. */
|
2014-02-10 13:45:42 +00:00
|
|
|
if (__glibc_unlikely (buflen < 3))
|
2004-09-12 20:38:38 +00:00
|
|
|
{
|
|
|
|
erange:
|
|
|
|
*errnop = ERANGE;
|
|
|
|
return NSS_STATUS_TRYAGAIN;
|
|
|
|
}
|
|
|
|
|
1998-06-19 13:01:35 +00:00
|
|
|
fgetpos (ent->stream, &pos);
|
|
|
|
buffer[buflen - 1] = '\xff';
|
2003-06-28 07:57:21 +00:00
|
|
|
p = fgets_unlocked (buffer, buflen, ent->stream);
|
|
|
|
if (p == NULL && feof_unlocked (ent->stream))
|
2002-08-26 07:06:57 +00:00
|
|
|
return NSS_STATUS_NOTFOUND;
|
|
|
|
|
2004-09-12 20:38:38 +00:00
|
|
|
if (p == NULL || __builtin_expect (buffer[buflen - 1] != '\xff', 0))
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2004-09-12 20:38:38 +00:00
|
|
|
erange_reset:
|
1998-06-19 13:01:35 +00:00
|
|
|
fsetpos (ent->stream, &pos);
|
2004-09-12 20:38:38 +00:00
|
|
|
goto erange;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Terminate the line for any case. */
|
|
|
|
buffer[buflen - 1] = '\0';
|
|
|
|
|
|
|
|
/* Skip leading blanks. */
|
|
|
|
while (isspace (*p))
|
|
|
|
++p;
|
|
|
|
}
|
2019-02-25 13:19:19 +00:00
|
|
|
while (*p == '\0' || *p == '#' /* Ignore empty and comment lines. */
|
2003-06-28 07:57:21 +00:00
|
|
|
/* Parse the line. If it is invalid, loop to
|
2010-11-22 16:15:08 +00:00
|
|
|
get the next line of the file to parse. */
|
2019-02-25 13:19:19 +00:00
|
|
|
|| !(parse_res = _nss_files_parse_grent (p, &grpbuf, data, buflen,
|
|
|
|
errnop)));
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2014-02-10 13:45:42 +00:00
|
|
|
if (__glibc_unlikely (parse_res == -1))
|
2004-09-12 20:38:38 +00:00
|
|
|
/* The parser ran out of space. */
|
|
|
|
goto erange_reset;
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
if (grpbuf.gr_name[0] != '+' && grpbuf.gr_name[0] != '-')
|
1998-06-19 13:01:35 +00:00
|
|
|
/* This is a real entry. */
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* -group */
|
2003-06-28 07:57:21 +00:00
|
|
|
if (grpbuf.gr_name[0] == '-' && grpbuf.gr_name[1] != '\0'
|
|
|
|
&& grpbuf.gr_name[1] != '@')
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2003-06-28 07:57:21 +00:00
|
|
|
blacklist_store_name (&grpbuf.gr_name[1], ent);
|
1998-06-19 13:01:35 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* +group */
|
2003-06-28 07:57:21 +00:00
|
|
|
if (grpbuf.gr_name[0] == '+' && grpbuf.gr_name[1] != '\0'
|
|
|
|
&& grpbuf.gr_name[1] != '@')
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2003-06-28 07:57:21 +00:00
|
|
|
if (in_blacklist (&grpbuf.gr_name[1],
|
|
|
|
strlen (&grpbuf.gr_name[1]), ent))
|
|
|
|
continue;
|
|
|
|
/* Store the group in the blacklist for the "+" at the end of
|
1998-06-19 13:01:35 +00:00
|
|
|
/etc/group */
|
2003-06-28 07:57:21 +00:00
|
|
|
blacklist_store_name (&grpbuf.gr_name[1], ent);
|
2020-02-12 10:30:06 +00:00
|
|
|
if (getgrnam_r_impl == NULL)
|
2003-06-28 07:57:21 +00:00
|
|
|
return NSS_STATUS_UNAVAIL;
|
2020-02-12 10:30:06 +00:00
|
|
|
else if (getgrnam_r_impl (&grpbuf.gr_name[1], &grpbuf, buffer,
|
|
|
|
buflen, errnop) != NSS_STATUS_SUCCESS)
|
2003-06-28 07:57:21 +00:00
|
|
|
continue;
|
|
|
|
|
|
|
|
check_and_add_group (user, group, start, size, groupsp,
|
|
|
|
limit, &grpbuf);
|
|
|
|
|
|
|
|
return NSS_STATUS_SUCCESS;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* +:... */
|
2003-06-28 07:57:21 +00:00
|
|
|
if (grpbuf.gr_name[0] == '+' && grpbuf.gr_name[1] == '\0')
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
2009-06-21 03:39:19 +00:00
|
|
|
/* If the selected module does not support getgrent_r or
|
|
|
|
initgroups_dyn, abort. We cannot find the needed group
|
|
|
|
entries. */
|
2020-02-12 10:30:06 +00:00
|
|
|
if (initgroups_dyn_impl == NULL || getgrgid_r_impl == NULL)
|
2010-11-22 16:11:24 +00:00
|
|
|
{
|
2020-02-12 10:30:06 +00:00
|
|
|
if (setgrent_impl != NULL)
|
2010-11-22 16:15:08 +00:00
|
|
|
{
|
2020-02-12 10:30:06 +00:00
|
|
|
setgrent_impl (1);
|
2010-11-22 16:11:24 +00:00
|
|
|
ent->need_endgrent = true;
|
|
|
|
}
|
|
|
|
ent->skip_initgroups_dyn = true;
|
|
|
|
|
2020-02-12 10:30:06 +00:00
|
|
|
if (getgrent_r_impl == NULL)
|
2010-11-22 16:15:08 +00:00
|
|
|
return NSS_STATUS_UNAVAIL;
|
|
|
|
}
|
2009-06-21 03:39:19 +00:00
|
|
|
|
|
|
|
ent->files = false;
|
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
return getgrent_next_nss (ent, buffer, buflen, user, group,
|
|
|
|
start, size, groupsp, limit, errnop);
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
check_and_add_group (user, group, start, size, groupsp, limit, &grpbuf);
|
|
|
|
|
1998-06-19 13:01:35 +00:00
|
|
|
return NSS_STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
enum nss_status
|
2000-07-24 01:26:01 +00:00
|
|
|
_nss_compat_initgroups_dyn (const char *user, gid_t group, long int *start,
|
2000-07-24 05:41:25 +00:00
|
|
|
long int *size, gid_t **groupsp, long int limit,
|
|
|
|
int *errnop)
|
1998-06-19 13:01:35 +00:00
|
|
|
{
|
|
|
|
enum nss_status status;
|
2009-06-21 03:39:19 +00:00
|
|
|
ent_t intern = { true, false, false, NULL, {NULL, 0, 0} };
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
status = internal_setgrent (&intern);
|
|
|
|
if (status != NSS_STATUS_SUCCESS)
|
|
|
|
return status;
|
|
|
|
|
2015-04-08 18:55:02 +00:00
|
|
|
struct scratch_buffer tmpbuf;
|
|
|
|
scratch_buffer_init (&tmpbuf);
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
do
|
|
|
|
{
|
2015-04-08 18:55:02 +00:00
|
|
|
while ((status = internal_getgrent_r (&intern, tmpbuf.data, tmpbuf.length,
|
2003-06-28 07:57:21 +00:00
|
|
|
user, group, start, size,
|
|
|
|
groupsp, limit, errnop))
|
|
|
|
== NSS_STATUS_TRYAGAIN && *errnop == ERANGE)
|
2015-04-08 18:55:02 +00:00
|
|
|
if (!scratch_buffer_grow (&tmpbuf))
|
|
|
|
goto done;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
while (status == NSS_STATUS_SUCCESS);
|
|
|
|
|
2012-03-29 15:56:27 +00:00
|
|
|
status = NSS_STATUS_SUCCESS;
|
|
|
|
|
|
|
|
done:
|
2015-04-08 18:55:02 +00:00
|
|
|
scratch_buffer_free (&tmpbuf);
|
2012-03-29 15:56:27 +00:00
|
|
|
|
2020-05-19 12:09:38 +00:00
|
|
|
internal_endgrent_noerror (&intern);
|
1998-06-19 13:01:35 +00:00
|
|
|
|
2012-03-29 15:56:27 +00:00
|
|
|
return status;
|
1998-06-19 13:01:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* Support routines for remembering -@netgroup and -user entries.
|
|
|
|
The names are stored in a single string with `|' as separator. */
|
|
|
|
static void
|
|
|
|
blacklist_store_name (const char *name, ent_t *ent)
|
|
|
|
{
|
|
|
|
int namelen = strlen (name);
|
|
|
|
char *tmp;
|
|
|
|
|
2003-06-28 07:57:21 +00:00
|
|
|
/* First call, setup cache. */
|
1998-06-19 13:01:35 +00:00
|
|
|
if (ent->blacklist.size == 0)
|
|
|
|
{
|
|
|
|
ent->blacklist.size = MAX (BLACKLIST_INITIAL_SIZE, 2 * namelen);
|
|
|
|
ent->blacklist.data = malloc (ent->blacklist.size);
|
|
|
|
if (ent->blacklist.data == NULL)
|
|
|
|
return;
|
|
|
|
ent->blacklist.data[0] = '|';
|
|
|
|
ent->blacklist.data[1] = '\0';
|
|
|
|
ent->blacklist.current = 1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (in_blacklist (name, namelen, ent))
|
|
|
|
return; /* no duplicates */
|
|
|
|
|
|
|
|
if (ent->blacklist.current + namelen + 1 >= ent->blacklist.size)
|
|
|
|
{
|
|
|
|
ent->blacklist.size += MAX (BLACKLIST_INCREMENT, 2 * namelen);
|
|
|
|
tmp = realloc (ent->blacklist.data, ent->blacklist.size);
|
|
|
|
if (tmp == NULL)
|
|
|
|
{
|
|
|
|
free (ent->blacklist.data);
|
|
|
|
ent->blacklist.size = 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ent->blacklist.data = tmp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
tmp = stpcpy (ent->blacklist.data + ent->blacklist.current, name);
|
|
|
|
*tmp++ = '|';
|
|
|
|
*tmp = '\0';
|
|
|
|
ent->blacklist.current += namelen + 1;
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-10-02 12:30:46 +00:00
|
|
|
/* Return whether ent->blacklist contains name. */
|
|
|
|
static bool
|
1998-06-19 13:01:35 +00:00
|
|
|
in_blacklist (const char *name, int namelen, ent_t *ent)
|
|
|
|
{
|
|
|
|
char buf[namelen + 3];
|
|
|
|
char *cp;
|
|
|
|
|
|
|
|
if (ent->blacklist.data == NULL)
|
2017-10-02 12:30:46 +00:00
|
|
|
return false;
|
1998-06-19 13:01:35 +00:00
|
|
|
|
|
|
|
buf[0] = '|';
|
|
|
|
cp = stpcpy (&buf[1], name);
|
2003-06-28 07:57:21 +00:00
|
|
|
*cp++ = '|';
|
1998-06-19 13:01:35 +00:00
|
|
|
*cp = '\0';
|
|
|
|
return strstr (ent->blacklist.data, buf) != NULL;
|
|
|
|
}
|