summaryrefslogtreecommitdiffstats
path: root/source3/modules/vfs_fake_perms.c
blob: 0089186be1a10381825d75fb5165f40dac47243a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
/* 
 * Fake Perms VFS module.  Implements passthrough operation of all VFS
 * calls to disk functions, except for file permissions, which are now
 * mode 0700 for the current uid/gid.
 *
 * Copyright (C) Tim Potter, 1999-2000
 * Copyright (C) Alexander Bokovoy, 2002
 * Copyright (C) Andrew Bartlett, 2002
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 3 of the License, or
 * (at your option) any later version.
 *  
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *  
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see <http://www.gnu.org/licenses/>.
 */

#include "includes.h"
#include "smbd/smbd.h"
#include "system/filesys.h"
#include "auth.h"

#undef DBGC_CLASS
#define DBGC_CLASS DBGC_VFS

static int fake_perms_stat(vfs_handle_struct *handle,
			   struct smb_filename *smb_fname)
{
	int ret;

	ret = SMB_VFS_NEXT_STAT(handle, smb_fname);
	if (ret != 0) {
		return ret;
	}

	if (S_ISDIR(smb_fname->st.st_ex_mode)) {
		smb_fname->st.st_ex_mode = S_IFDIR | S_IRWXU;
	} else {
		smb_fname->st.st_ex_mode = S_IRWXU;
	}

	if (handle->conn->session_info != NULL) {
		struct security_unix_token *utok;

		utok = handle->conn->session_info->unix_token;
		smb_fname->st.st_ex_uid = utok->uid;
		smb_fname->st.st_ex_gid = utok->gid;
	} else {
		/*
		 * We have an artificial connection for dfs for example. It
		 * sucks, but the current uid/gid is the best we have.
		 */
		smb_fname->st.st_ex_uid = geteuid();
		smb_fname->st.st_ex_gid = getegid();
	}

	return ret;
}

static int fake_perms_fstat(vfs_handle_struct *handle, files_struct *fsp, SMB_STRUCT_STAT *sbuf)
{
	int ret;

	ret = SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
	if (ret != 0) {
		return ret;
	}

	if (S_ISDIR(sbuf->st_ex_mode)) {
		sbuf->st_ex_mode = S_IFDIR | S_IRWXU;
	} else {
		sbuf->st_ex_mode = S_IRWXU;
	}
	if (handle->conn->session_info != NULL) {
		struct security_unix_token *utok;

		utok = handle->conn->session_info->unix_token;
		sbuf->st_ex_uid = utok->uid;
		sbuf->st_ex_gid = utok->gid;
	} else {
		/*
		 * We have an artificial connection for dfs for example. It
		 * sucks, but the current uid/gid is the best we have.
		 */
		sbuf->st_ex_uid = geteuid();
		sbuf->st_ex_gid = getegid();
	}

	return ret;
}

static struct vfs_fn_pointers vfs_fake_perms_fns = {
	.stat_fn = fake_perms_stat,
	.fstat_fn = fake_perms_fstat
};

static_decl_vfs;
NTSTATUS vfs_fake_perms_init(TALLOC_CTX *ctx)
{
	return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "fake_perms",
				&vfs_fake_perms_fns);
}