1 /*
   2  * CDDL HEADER START
   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License (the "License").
   6  * You may not use this file except in compliance with the License.
   7  *
   8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
   9  * or http://www.opensolaris.org/os/licensing.
  10  * See the License for the specific language governing permissions
  11  * and limitations under the License.
  12  *
  13  * When distributing Covered Code, include this CDDL HEADER in each
  14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15  * If applicable, add the following below this CDDL HEADER, with the
  16  * fields enclosed by brackets "[]" replaced with your own identifying
  17  * information: Portions Copyright [yyyy] [name of copyright owner]
  18  *
  19  * CDDL HEADER END
  20  */
  21 
  22 /*
  23  * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
  24  * Use is subject to license terms.
  25  */
  26 
  27 /*
  28  * This is the smbfs/chacl command.
  29  * (just for testing - not installed)
  30  *
  31  * Works like chmod(1), but only supporting A=... forms.
  32  * i.e. chacl A=everyone@:full_set:fd:allow /mnt/foo
  33  *
  34  * Some more test cases:
  35  *      /usr/lib/fs/smbfs/chacl -v
  36  *      A=user:2147483649:rwxpdDaARWcCos::allow,
  37  *      user:2147483653:raRcs::allow,
  38  *      everyone@:raRcs::allow
  39  */
  40 
  41 #include <sys/types.h>
  42 #include <sys/errno.h>
  43 #include <sys/stat.h>
  44 #include <sys/acl.h>
  45 #include <sys/acl_impl.h>
  46 
  47 #include <fcntl.h>
  48 #include <stdio.h>
  49 #include <stdlib.h>
  50 #include <unistd.h>
  51 #include <string.h>
  52 #include <aclutils.h>
  53 
  54 #include <netsmb/smbfs_acl.h>
  55 
  56 char *progname;
  57 int Vflag;
  58 
  59 void chacl(char *, uint32_t, uid_t, gid_t, acl_t *);
  60 
  61 static const char Usage[] =
  62         "Usage: %s [-v] [-u UID] [-g GID] A=ACL... file ...\n"
  63         "\twhere A=ACL is like chmod(1)\n";
  64 
  65 void
  66 usage(void)
  67 {
  68         fprintf(stderr, Usage, progname);
  69         exit(1);
  70 }
  71 
  72 int
  73 main(int argc, char **argv)
  74 {
  75         uid_t uid = (uid_t)-1;
  76         gid_t gid = (gid_t)-1;
  77         acl_t *acl = NULL;
  78         char *acl_arg;
  79         ulong_t tl;
  80         int c, error;
  81         uint32_t selector;
  82 
  83         progname = argv[0];
  84 
  85         while ((c = getopt(argc, argv, "vu:g:")) != -1) {
  86                 switch (c) {
  87                 case 'v':
  88                         Vflag++;
  89                         break;
  90                 case 'u':
  91                         tl = strtoul(optarg, NULL, 10);
  92                         if (tl == 0)
  93                                 goto badopt;
  94                         uid = (uid_t)tl;
  95                         break;
  96                 case 'g':
  97                         tl = strtoul(optarg, NULL, 10);
  98                         if (tl == 0)
  99                                 goto badopt;
 100                         gid = (gid_t)tl;
 101                         break;
 102                 case ':':
 103                         fprintf(stderr, "%s: option %c requires arg\n",
 104                             progname, c);
 105                         usage();
 106                         break;
 107 
 108                 badopt:
 109                 default:
 110                         fprintf(stderr, "%s: bad option: %c\n",
 111                             progname, c);
 112                         usage();
 113                         break;
 114                 }
 115         }
 116 
 117         if (optind + 1 > argc)
 118                 usage();
 119         acl_arg = argv[optind++];
 120 
 121         /*
 122          * Ask libsec to parse the ACL arg.
 123          */
 124         if (strncmp(acl_arg, "A=", 2) != 0)
 125                 usage();
 126         error = acl_parse(acl_arg + 2, &acl);
 127         if (error) {
 128                 fprintf(stderr, "%s: can not parse ACL: %s\n",
 129                     progname, acl_arg);
 130                 exit(1);
 131         }
 132         if (acl->acl_type != ACE_T) {
 133                 fprintf(stderr, "%s: ACL not ACE_T type: %s\n",
 134                     progname, acl_arg);
 135                 exit(1);
 136         }
 137 
 138         /*
 139          * Which parts of the SD are being modified?
 140          */
 141         selector = 0;
 142         if (acl)
 143                 selector |= DACL_SECURITY_INFORMATION;
 144         if (uid != (uid_t)-1)
 145                 selector |= OWNER_SECURITY_INFORMATION;
 146         if (gid != (gid_t)-1)
 147                 selector |= GROUP_SECURITY_INFORMATION;
 148 
 149         if (optind == argc)
 150                 usage();
 151         for (; optind < argc; optind++)
 152                 chacl(argv[optind], selector, uid, gid, acl);
 153 
 154 done:
 155         acl_free(acl);
 156         return (0);
 157 }
 158 
 159 void
 160 chacl(char *file, uint32_t selector, uid_t uid, gid_t gid, acl_t *acl)
 161 {
 162         struct stat st;
 163         struct i_ntsd *sd = NULL;
 164         int error, fd;
 165 
 166         /*
 167          * OK, try setting the ACL (via ioctl).  Open
 168          * read-only because we're NOT writing data.
 169          * The driver will re-open with the necessary
 170          * access rights to set the ACL.
 171          */
 172         fd = open(file, O_RDONLY, 0);
 173         if (fd < 0) {
 174                 perror(file);
 175                 exit(1);
 176         }
 177 
 178         if (uid == (uid_t)-1 || gid == (gid_t)-1) {
 179                 /*
 180                  * If not setting owner or group, we need the
 181                  * current owner and group for translating
 182                  * references via owner@ or group@ ACEs.
 183                  */
 184                 if (fstat(fd, &st) != 0) {
 185                         perror(file);
 186                         exit(1);
 187                 }
 188                 if (uid == (uid_t)-1)
 189                         uid = st.st_uid;
 190                 if (gid == (gid_t)-1)
 191                         gid = st.st_gid;
 192         }
 193 
 194         /*
 195          * Convert the ZFS ACL to an NT SD.
 196          */
 197         error = smbfs_acl_zfs2sd(acl, uid, gid, selector, &sd);
 198         if (error) {
 199                 fprintf(stderr, "%s: failed to convert ACL\n", progname);
 200                 exit(1);
 201         }
 202 
 203         if (Vflag) {
 204 
 205                 /*
 206                  * Print the SD in ZFS form.
 207                  */
 208                 printf("Solaris security data:\n");
 209                 if (uid == (uid_t)-1)
 210                         printf("owner: -1\n");
 211                 else
 212                         printf("owner: %u\n", uid);
 213                 if (gid == (gid_t)-1)
 214                         printf("group: -1\n");
 215                 else
 216                         printf("group: %u\n", gid);
 217                 acl_printacl(acl, 80, 1);
 218                 printf("\n");
 219 
 220                 /*
 221                  * Print the SD in Windows form.
 222                  */
 223                 printf("CIFS security data:\n");
 224                 smbfs_acl_print_sd(stdout, sd);
 225                 printf("\n");
 226         }
 227 
 228         error = smbfs_acl_setsd(fd, selector, sd);
 229         (void) close(fd);
 230 
 231         if (error) {
 232                 fprintf(stderr, "%s: ACL set failed, %s\n",
 233                     file, strerror(error));
 234                 exit(1);
 235         }
 236 
 237         smbfs_acl_free_sd(sd);
 238 }