diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 17:54:12 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 17:54:12 +0000 |
commit | b527294153be3b79563c82c66102adc0004736c0 (patch) | |
tree | 9b423a224848441885190b5ea7cf0feb23510c9d /servers/slapd/user.c | |
parent | Initial commit. (diff) | |
download | openldap-b527294153be3b79563c82c66102adc0004736c0.tar.xz openldap-b527294153be3b79563c82c66102adc0004736c0.zip |
Adding upstream version 2.6.7+dfsg.upstream/2.6.7+dfsg
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'servers/slapd/user.c')
-rw-r--r-- | servers/slapd/user.c | 171 |
1 files changed, 171 insertions, 0 deletions
diff --git a/servers/slapd/user.c b/servers/slapd/user.c new file mode 100644 index 0000000..8adee4f --- /dev/null +++ b/servers/slapd/user.c @@ -0,0 +1,171 @@ +/* user.c - set user id, group id and group access list */ +/* $OpenLDAP$ */ +/* This work is part of OpenLDAP Software <http://www.openldap.org/>. + * + * Copyright 1998-2022 The OpenLDAP Foundation. + * Portions Copyright 1999 PM Lashley. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * <http://www.OpenLDAP.org/license.html>. + */ + +#include "portable.h" + +#if defined(HAVE_SETUID) && defined(HAVE_SETGID) + +#include <stdio.h> + +#include <ac/stdlib.h> + +#ifdef HAVE_PWD_H +#include <pwd.h> +#endif +#ifdef HAVE_GRP_H +#include <grp.h> +#endif + +#include <ac/ctype.h> +#include <ac/unistd.h> + +#include "slap.h" +#include "lutil.h" + +/* + * Set real and effective user id and group id, and group access list + */ + +void +slap_init_user( char *user, char *group ) +{ + uid_t uid = 0; + gid_t gid = 0; + int got_uid = 0, got_gid = 0; + + if ( user ) { + struct passwd *pwd; + if ( isdigit( (unsigned char) *user ) ) { + unsigned u; + + got_uid = 1; + if ( lutil_atou( &u, user ) != 0 ) { + Debug( LDAP_DEBUG_ANY, "Unble to parse user %s\n", + user ); + + exit( EXIT_FAILURE ); + } + uid = (uid_t)u; +#ifdef HAVE_GETPWUID + pwd = getpwuid( uid ); + goto did_getpw; +#else + user = NULL; +#endif + } else { + pwd = getpwnam( user ); + did_getpw: + if ( pwd == NULL ) { + Debug( LDAP_DEBUG_ANY, "No passwd entry for user %s\n", + user ); + + exit( EXIT_FAILURE ); + } + if ( got_uid ) { + user = (pwd != NULL ? pwd->pw_name : NULL); + } else { + got_uid = 1; + uid = pwd->pw_uid; + } + got_gid = 1; + gid = pwd->pw_gid; +#ifdef HAVE_ENDPWENT + endpwent(); +#endif + } + } + + if ( group ) { + struct group *grp; + if ( isdigit( (unsigned char) *group )) { + unsigned g; + + if ( lutil_atou( &g, group ) != 0 ) { + Debug( LDAP_DEBUG_ANY, "Unble to parse group %s\n", + group ); + + exit( EXIT_FAILURE ); + } + gid = (uid_t)g; +#ifdef HAVE_GETGRGID + grp = getgrgid( gid ); + goto did_group; +#endif + } else { + grp = getgrnam( group ); + if ( grp != NULL ) + gid = grp->gr_gid; + did_group: + if ( grp == NULL ) { + Debug( LDAP_DEBUG_ANY, "No group entry for group %s\n", + group ); + + exit( EXIT_FAILURE ); + } + } + got_gid = 1; + } + + if ( user ) { + if ( getuid() == 0 && initgroups( user, gid ) != 0 ) { + Debug( LDAP_DEBUG_ANY, + "Could not set the group access (gid) list\n" ); + + exit( EXIT_FAILURE ); + } + } + +#ifdef HAVE_ENDGRENT + endgrent(); +#endif + + if ( got_gid ) { + if ( setgid( gid ) != 0 ) { + Debug( LDAP_DEBUG_ANY, "Could not set real group id to %d\n", + (int) gid ); + + exit( EXIT_FAILURE ); + } +#ifdef HAVE_SETEGID + if ( setegid( gid ) != 0 ) { + Debug( LDAP_DEBUG_ANY, "Could not set effective group id to %d\n", + (int) gid ); + + exit( EXIT_FAILURE ); + } +#endif + } + + if ( got_uid ) { + if ( setuid( uid ) != 0 ) { + Debug( LDAP_DEBUG_ANY, "Could not set real user id to %d\n", + (int) uid ); + + exit( EXIT_FAILURE ); + } +#ifdef HAVE_SETEUID + if ( seteuid( uid ) != 0 ) { + Debug( LDAP_DEBUG_ANY, "Could not set effective user id to %d\n", + (int) uid ); + + exit( EXIT_FAILURE ); + } +#endif + } +} + +#endif /* HAVE_PWD_H && HAVE_GRP_H */ |