add support for patterns of principals

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@8350 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Assar Westerlund
2000-06-07 11:11:44 +00:00
parent 30fcaa8cc4
commit 46f0769f2d

View File

@@ -1,5 +1,5 @@
/*
* Copyright (c) 1997, 1999 Kungliga Tekniska H<>gskolan
* Copyright (c) 1997 - 2000 Kungliga Tekniska H<>gskolan
* (Royal Institute of Technology, Stockholm, Sweden).
* All rights reserved.
*
@@ -68,16 +68,89 @@ _kadm5_privs_to_string(u_int32_t privs, char *string, size_t len)
return 0;
}
/*
* retrieve the right for the current caller on `princ' (NULL means all)
* and store them in `flags'
* return 0 or an error.
*/
static kadm5_ret_t
fetch_acl (kadm5_server_context *context,
krb5_const_principal princ,
unsigned *ret_flags)
{
unsigned flags = -1;
FILE *f = fopen(context->config.acl_file, "r");
krb5_error_code ret = 0;
if(f != NULL){
char buf[256];
char princ_name[256];
if (princ != NULL)
krb5_unparse_name_fixed (context->context, princ,
princ_name, sizeof(princ_name));
while(fgets(buf, sizeof(buf), f) != NULL){
char *foo = NULL, *p;
krb5_principal this_princ;
p = strtok_r(buf, " \t\n", &foo);
if(p == NULL)
continue;
ret = krb5_parse_name(context->context, p, &this_princ);
if(ret)
continue;
if(!krb5_principal_compare(context->context,
context->caller, this_princ)) {
krb5_free_principal(context->context, this_princ);
continue;
}
krb5_free_principal(context->context, this_princ);
p = strtok_r(NULL, " \t\n", &foo);
if(p == NULL)
continue;
ret = _kadm5_string_to_privs(p, &flags);
if (ret)
break;
p = strtok_r(NULL, "\n", &foo);
if (p == NULL) {
if (princ == NULL) {
ret = 0;
break;
} else {
continue;
}
}
if(princ != NULL
&& fnmatch (p, princ_name, FNM_PATHNAME) == 0) {
ret = _kadm5_string_to_privs(p, &flags);
break;
}
}
fclose(f);
}
if(flags == -1)
flags = 0;
if (ret == 0)
*ret_flags = flags;
return ret;
}
/*
* set global acl flags in `context' for the current caller.
* return 0 on success or an error
*/
kadm5_ret_t
_kadm5_acl_init(kadm5_server_context *context)
{
FILE *f;
char buf[128];
krb5_principal princ;
int flags;
krb5_error_code ret;
krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
if (ret)
return ret;
ret = krb5_principal_compare(context->context, context->caller, princ);
krb5_free_principal(context->context, princ);
if(ret != 0) {
@@ -85,41 +158,20 @@ _kadm5_acl_init(kadm5_server_context *context)
return 0;
}
flags = -1;
f = fopen(context->config.acl_file, "r");
if(f){
while(fgets(buf, sizeof(buf), f)){
char *foo = NULL, *p;
p = strtok_r(buf, " \t\n", &foo);
if(p == NULL)
continue;
ret = krb5_parse_name(context->context, p, &princ);
if(ret)
continue;
if(!krb5_principal_compare(context->context,
context->caller, princ)){
krb5_free_principal(context->context, princ);
continue;
}
krb5_free_principal(context->context, princ);
p = strtok_r(NULL, "\n", &foo);
if(p == NULL)
continue;
ret = _kadm5_string_to_privs(p, &flags);
break;
}
fclose(f);
}
if(flags == -1)
flags = 0;
context->acl_flags = flags;
return 0;
return fetch_acl (context, NULL, &context->acl_flags);
}
kadm5_ret_t
_kadm5_acl_check_permission(kadm5_server_context *context, unsigned op)
/*
* check if `flags' allows `op'
* return 0 if OK or an error
*/
static kadm5_ret_t
check_flags (unsigned op,
unsigned flags)
{
unsigned res = ~context->acl_flags & op;
unsigned res = ~flags & op;
if(res & KADM5_PRIV_GET)
return KADM5_AUTH_GET;
if(res & KADM5_PRIV_ADD)
@@ -136,3 +188,26 @@ _kadm5_acl_check_permission(kadm5_server_context *context, unsigned op)
return KADM5_AUTH_INSUFFICIENT;
return 0;
}
/*
* return 0 if the current caller in `context' is allowed to perform
* `op' on `princ' and otherwise an error
* princ == NULL if it's not relevant.
*/
kadm5_ret_t
_kadm5_acl_check_permission(kadm5_server_context *context,
unsigned op,
krb5_const_principal princ)
{
kadm5_ret_t ret;
unsigned princ_flags;
ret = check_flags (op, context->acl_flags);
if (ret == 0)
return ret;
ret = fetch_acl (context, princ, &princ_flags);
if (ret)
return ret;
return check_flags (op, princ_flags);
}