1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3 * 4 * Copyright (c) 1999, 2000, 2001 Robert N. M. Watson 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26 * SUCH DAMAGE. 27 */ 28 /* 29 * acl_from_text: Convert a text-form ACL from a string to an acl_t. 30 */ 31 32 #include <sys/cdefs.h> 33 __FBSDID("$FreeBSD$"); 34 35 #include <sys/types.h> 36 #include "namespace.h" 37 #include <sys/acl.h> 38 #include "un-namespace.h" 39 #include <sys/errno.h> 40 #include <grp.h> 41 #include <pwd.h> 42 #include <stdio.h> 43 #include <stdlib.h> 44 #include <string.h> 45 #include <assert.h> 46 47 #include "acl_support.h" 48 49 static acl_tag_t acl_string_to_tag(char *tag, char *qualifier); 50 51 int _nfs4_acl_entry_from_text(acl_t aclp, char *entry); 52 int _text_could_be_nfs4_acl(const char *entry); 53 54 static acl_tag_t 55 acl_string_to_tag(char *tag, char *qualifier) 56 { 57 58 if (*qualifier == '\0') { 59 if ((!strcmp(tag, "user")) || (!strcmp(tag, "u"))) { 60 return (ACL_USER_OBJ); 61 } else 62 if ((!strcmp(tag, "group")) || (!strcmp(tag, "g"))) { 63 return (ACL_GROUP_OBJ); 64 } else 65 if ((!strcmp(tag, "mask")) || (!strcmp(tag, "m"))) { 66 return (ACL_MASK); 67 } else 68 if ((!strcmp(tag, "other")) || (!strcmp(tag, "o"))) { 69 return (ACL_OTHER); 70 } else 71 return(-1); 72 } else { 73 if ((!strcmp(tag, "user")) || (!strcmp(tag, "u"))) { 74 return(ACL_USER); 75 } else 76 if ((!strcmp(tag, "group")) || (!strcmp(tag, "g"))) { 77 return(ACL_GROUP); 78 } else 79 return(-1); 80 } 81 } 82 83 static int 84 _posix1e_acl_entry_from_text(acl_t aclp, char *entry) 85 { 86 acl_tag_t t; 87 acl_perm_t p; 88 char *tag, *qualifier, *permission; 89 uid_t id; 90 int error; 91 92 assert(_acl_brand(aclp) == ACL_BRAND_POSIX); 93 94 /* Split into three ':' delimited fields. */ 95 tag = strsep(&entry, ":"); 96 if (tag == NULL) { 97 errno = EINVAL; 98 return (-1); 99 } 100 tag = string_skip_whitespace(tag); 101 if ((*tag == '\0') && (!entry)) { 102 /* 103 * Is an entirely comment line, skip to next 104 * comma. 105 */ 106 return (0); 107 } 108 string_trim_trailing_whitespace(tag); 109 110 qualifier = strsep(&entry, ":"); 111 if (qualifier == NULL) { 112 errno = EINVAL; 113 return (-1); 114 } 115 qualifier = string_skip_whitespace(qualifier); 116 string_trim_trailing_whitespace(qualifier); 117 118 permission = strsep(&entry, ":"); 119 if (permission == NULL || entry) { 120 errno = EINVAL; 121 return (-1); 122 } 123 permission = string_skip_whitespace(permission); 124 string_trim_trailing_whitespace(permission); 125 126 t = acl_string_to_tag(tag, qualifier); 127 if (t == -1) { 128 errno = EINVAL; 129 return (-1); 130 } 131 132 error = _posix1e_acl_string_to_perm(permission, &p); 133 if (error == -1) { 134 errno = EINVAL; 135 return (-1); 136 } 137 138 switch(t) { 139 case ACL_USER_OBJ: 140 case ACL_GROUP_OBJ: 141 case ACL_MASK: 142 case ACL_OTHER: 143 if (*qualifier != '\0') { 144 errno = EINVAL; 145 return (-1); 146 } 147 id = 0; 148 break; 149 150 case ACL_USER: 151 case ACL_GROUP: 152 error = _acl_name_to_id(t, qualifier, &id); 153 if (error == -1) 154 return (-1); 155 break; 156 157 default: 158 errno = EINVAL; 159 return (-1); 160 } 161 162 error = _posix1e_acl_add_entry(aclp, t, id, p); 163 if (error == -1) 164 return (-1); 165 166 return (0); 167 } 168 169 static int 170 _text_is_nfs4_entry(const char *entry) 171 { 172 int count = 0; 173 174 assert(strlen(entry) > 0); 175 176 while (*entry != '\0') { 177 if (*entry == ':' || *entry == '@') 178 count++; 179 entry++; 180 } 181 182 if (count <= 2) 183 return (0); 184 185 return (1); 186 } 187 188 /* 189 * acl_from_text -- Convert a string into an ACL. 190 * Postpone most validity checking until the end and call acl_valid() to do 191 * that. 192 */ 193 acl_t 194 acl_from_text(const char *buf_p) 195 { 196 acl_t acl; 197 char *mybuf_p, *line, *cur, *notcomment, *comment, *entry; 198 int error; 199 200 /* Local copy we can mess up. */ 201 mybuf_p = strdup(buf_p); 202 if (mybuf_p == NULL) 203 return(NULL); 204 205 acl = acl_init(3); /* XXX: WTF, 3? */ 206 if (acl == NULL) { 207 free(mybuf_p); 208 return(NULL); 209 } 210 211 /* Outer loop: delimit at \n boundaries. */ 212 cur = mybuf_p; 213 while ((line = strsep(&cur, "\n"))) { 214 /* Now split the line on the first # to strip out comments. */ 215 comment = line; 216 notcomment = strsep(&comment, "#"); 217 218 /* Inner loop: delimit at ',' boundaries. */ 219 while ((entry = strsep(¬comment, ","))) { 220 221 /* Skip empty lines. */ 222 if (strlen(string_skip_whitespace(entry)) == 0) 223 continue; 224 225 if (_acl_brand(acl) == ACL_BRAND_UNKNOWN) { 226 if (_text_is_nfs4_entry(entry)) 227 _acl_brand_as(acl, ACL_BRAND_NFS4); 228 else 229 _acl_brand_as(acl, ACL_BRAND_POSIX); 230 } 231 232 switch (_acl_brand(acl)) { 233 case ACL_BRAND_NFS4: 234 error = _nfs4_acl_entry_from_text(acl, entry); 235 break; 236 237 case ACL_BRAND_POSIX: 238 error = _posix1e_acl_entry_from_text(acl, entry); 239 break; 240 241 default: 242 error = EINVAL; 243 break; 244 } 245 246 if (error) 247 goto error_label; 248 } 249 } 250 251 #if 0 252 /* XXX Should we only return ACLs valid according to acl_valid? */ 253 /* Verify validity of the ACL we read in. */ 254 if (acl_valid(acl) == -1) { 255 errno = EINVAL; 256 goto error_label; 257 } 258 #endif 259 260 free(mybuf_p); 261 return(acl); 262 263 error_label: 264 acl_free(acl); 265 free(mybuf_p); 266 return(NULL); 267 } 268 269 /* 270 * Given a username/groupname from a text form of an ACL, return the uid/gid 271 * XXX NOT THREAD SAFE, RELIES ON GETPWNAM, GETGRNAM 272 * XXX USES *PW* AND *GR* WHICH ARE STATEFUL AND THEREFORE THIS ROUTINE 273 * MAY HAVE SIDE-EFFECTS 274 */ 275 int 276 _acl_name_to_id(acl_tag_t tag, char *name, uid_t *id) 277 { 278 struct group *g; 279 struct passwd *p; 280 unsigned long l; 281 char *endp; 282 283 switch(tag) { 284 case ACL_USER: 285 p = getpwnam(name); 286 if (p == NULL) { 287 l = strtoul(name, &endp, 0); 288 if (*endp != '\0' || l != (unsigned long)(uid_t)l) { 289 errno = EINVAL; 290 return (-1); 291 } 292 *id = (uid_t)l; 293 return (0); 294 } 295 *id = p->pw_uid; 296 return (0); 297 298 case ACL_GROUP: 299 g = getgrnam(name); 300 if (g == NULL) { 301 l = strtoul(name, &endp, 0); 302 if (*endp != '\0' || l != (unsigned long)(gid_t)l) { 303 errno = EINVAL; 304 return (-1); 305 } 306 *id = (gid_t)l; 307 return (0); 308 } 309 *id = g->gr_gid; 310 return (0); 311 312 default: 313 return (EINVAL); 314 } 315 } 316