diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 05:31:45 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 05:31:45 +0000 |
commit | 74aa0bc6779af38018a03fd2cf4419fe85917904 (patch) | |
tree | 9cb0681aac9a94a49c153d5823e7a55d1513d91f /src/responder/nss/nss_protocol_hostent.c | |
parent | Initial commit. (diff) | |
download | sssd-74aa0bc6779af38018a03fd2cf4419fe85917904.tar.xz sssd-74aa0bc6779af38018a03fd2cf4419fe85917904.zip |
Adding upstream version 2.9.4.upstream/2.9.4
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/responder/nss/nss_protocol_hostent.c')
-rw-r--r-- | src/responder/nss/nss_protocol_hostent.c | 299 |
1 files changed, 299 insertions, 0 deletions
diff --git a/src/responder/nss/nss_protocol_hostent.c b/src/responder/nss/nss_protocol_hostent.c new file mode 100644 index 0000000..687baad --- /dev/null +++ b/src/responder/nss/nss_protocol_hostent.c @@ -0,0 +1,299 @@ +/* + SSSD + + Authors: + Samuel Cabrero <scabrero@suse.com> + + Copyright (C) 2019 SUSE LINUX GmbH, Nuernberg, Germany. + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include "db/sysdb.h" +#include "db/sysdb_iphosts.h" +#include "responder/nss/nss_protocol.h" + +static errno_t +sss_nss_get_hostent(TALLOC_CTX *mem_ctx, + struct sss_domain_info *domain, + struct ldb_message *msg, + struct sized_string *_name) +{ + TALLOC_CTX *tmp_ctx; + const char *name; + errno_t ret; + + tmp_ctx = talloc_new(NULL); + if (tmp_ctx == NULL) { + return ENOMEM; + } + + /* Get name */ + name = ldb_msg_find_attr_as_string(msg, SYSDB_NAME, NULL); + if (name == NULL) { + ret = ERR_INTERNAL; + goto done; + } + + name = sss_get_cased_name(tmp_ctx, name, domain->case_preserve); + if (name == NULL) { + ret = ENOMEM; + goto done; + } + + /* Set output variables */ + + talloc_steal(mem_ctx, name); + + to_sized_string(_name, name); + + ret = EOK; + +done: + talloc_free(tmp_ctx); + + return ret; +} + +static errno_t +sss_nss_get_host_aliases(TALLOC_CTX *mem_ctx, + struct sss_domain_info *domain, + struct ldb_message *msg, + const char *name, + struct sized_string **_aliases, + uint32_t *_num_aliases) +{ + struct ldb_message_element *el; + struct sized_string *aliases = NULL; + uint32_t num_aliases; + const char *alias; + errno_t ret; + int i; + + el = ldb_msg_find_element(msg, SYSDB_NAME_ALIAS); + if (el == NULL) { + *_num_aliases = 0; + *_aliases = NULL; + ret = EOK; + goto done; + } + + aliases = talloc_zero_array(mem_ctx, struct sized_string, + el->num_values + 1); + if (aliases == NULL) { + ret = ENOMEM; + goto done; + } + + num_aliases = 0; + for (i = 0; i < el->num_values; i++) { + alias = (const char *)el->values[i].data; + + if (sss_string_equal(domain->case_sensitive, alias, name)) { + continue; + } + + /* Element value remains in the message, we don't need to strdup it. */ + to_sized_string(&aliases[num_aliases], alias); + num_aliases++; + } + + *_aliases = aliases; + *_num_aliases = num_aliases; + + ret = EOK; + +done: + if (ret != EOK) { + talloc_free(aliases); + } + + return ret; +} + +static errno_t +sss_nss_get_host_addresses(TALLOC_CTX *mem_ctx, + struct sss_domain_info *domain, + struct ldb_message *msg, + const char *name, + struct sized_string **_addresses, + uint32_t *_num_addresses) +{ + struct ldb_message_element *el; + struct sized_string *addresses = NULL; + uint32_t num_addresses; + const char *addr; + errno_t ret; + int i; + + el = ldb_msg_find_element(msg, SYSDB_IP_HOST_ATTR_ADDRESS); + if (el == NULL) { + *_num_addresses = 0; + *_addresses = NULL; + ret = EOK; + goto done; + } + + addresses = talloc_zero_array(mem_ctx, struct sized_string, + el->num_values + 1); + if (addresses == NULL) { + ret = ENOMEM; + goto done; + } + + num_addresses = 0; + for (i = 0; i < el->num_values; i++) { + addr = (const char *)el->values[i].data; + + /* Element value remains in the message, we don't need to strdup it. */ + to_sized_string(&addresses[num_addresses], addr); + num_addresses++; + } + + *_addresses = addresses; + *_num_addresses = num_addresses; + + ret = EOK; + +done: + if (ret != EOK) { + talloc_free(addresses); + } + + return ret; +} + +errno_t +sss_nss_protocol_fill_hostent(struct sss_nss_ctx *nss_ctx, + struct sss_nss_cmd_ctx *cmd_ctx, + struct sss_packet *packet, + struct cache_req_result *result) +{ + TALLOC_CTX *tmp_ctx; + struct ldb_message *msg; + struct sized_string name; + struct sized_string *aliases; + struct sized_string *addresses; + uint32_t num_aliases; + uint32_t num_addresses; + uint32_t num_results; + size_t rp; + size_t body_len; + uint8_t *body; + int i; + int j; + errno_t ret; + + tmp_ctx = talloc_new(NULL); + if (tmp_ctx == NULL) { + return ENOMEM; + } + + /* First two fields (length and reserved), filled up later. */ + ret = sss_packet_grow(packet, 2 * sizeof(uint32_t)); + if (ret != EOK) { + return ret; + } + + rp = 2 * sizeof(uint32_t); + + num_results = 0; + for (i = 0; i < result->count; i++) { + talloc_free_children(tmp_ctx); + msg = result->msgs[i]; + + ret = sss_nss_get_hostent(tmp_ctx, result->domain, msg, &name); + if (ret != EOK) { + DEBUG(SSSDBG_MINOR_FAILURE, + "Unable to get host information, skipping... [%d]: %s\n", + ret, sss_strerror(ret)); + continue; + } + + ret = sss_nss_get_host_aliases(tmp_ctx, result->domain, msg, name.str, + &aliases, &num_aliases); + if (ret != EOK) { + DEBUG(SSSDBG_MINOR_FAILURE, + "Unable to get host aliases, skipping... [%d]: %s\n", + ret, sss_strerror(ret)); + continue; + } + + ret = sss_nss_get_host_addresses(tmp_ctx, result->domain, msg, name.str, + &addresses, &num_addresses); + if (ret != EOK) { + DEBUG(SSSDBG_MINOR_FAILURE, + "Unable to get host addresses, skipping... [%d]: %s\n", + ret, sss_strerror(ret)); + continue; + } + + /* Adjust packet size */ + + ret = sss_packet_grow(packet, 2 * sizeof(uint32_t) + name.len); + if (ret != EOK) { + goto done; + } + + sss_packet_get_body(packet, &body, &body_len); + + /* Fill packet */ + + SAFEALIGN_SET_UINT32(&body[rp], num_aliases, &rp); + SAFEALIGN_SET_UINT32(&body[rp], num_addresses, &rp); + SAFEALIGN_SET_STRING(&body[rp], name.str, name.len, &rp); + + /* Store aliases */ + for (j = 0; j < num_aliases; j++) { + ret = sss_packet_grow(packet, aliases[j].len); + if (ret != EOK) { + goto done; + } + sss_packet_get_body(packet, &body, &body_len); + + SAFEALIGN_SET_STRING(&body[rp], aliases[j].str, aliases[j].len, + &rp); + } + + /* Store addresses */ + for (j = 0; j < num_addresses; j++) { + ret = sss_packet_grow(packet, addresses[j].len); + if (ret != EOK) { + goto done; + } + sss_packet_get_body(packet, &body, &body_len); + + SAFEALIGN_SET_STRING(&body[rp], addresses[j].str, addresses[j].len, + &rp); + } + + num_results++; + } + + ret = EOK; + +done: + talloc_free(tmp_ctx); + + if (ret != EOK) { + sss_packet_set_size(packet, 0); + return ret; + } + + sss_packet_get_body(packet, &body, &body_len); + SAFEALIGN_COPY_UINT32(body, &num_results, NULL); + SAFEALIGN_SETMEM_UINT32(body + sizeof(uint32_t), 0, NULL); /* reserved */ + + return EOK; +} |