diff options
author | Pavel Březina <pbrezina@redhat.com> | 2012-05-11 14:15:38 +0200 |
---|---|---|
committer | Stephen Gallagher <sgallagh@redhat.com> | 2012-06-29 11:37:18 -0400 |
commit | 010c35e66398bbeb82fb1b31fc619b1a9eaf2d3d (patch) | |
tree | 6c31088a5922fac81ca62d0a599b822b093658ca /src | |
parent | e5b34f0166ae61468e53f369578e691ddb09cdd0 (diff) | |
download | sssd-010c35e66398bbeb82fb1b31fc619b1a9eaf2d3d.tar.gz sssd-010c35e66398bbeb82fb1b31fc619b1a9eaf2d3d.tar.bz2 sssd-010c35e66398bbeb82fb1b31fc619b1a9eaf2d3d.zip |
sudo responder: refresh expired rules
Diffstat (limited to 'src')
-rw-r--r-- | src/responder/sudo/sudosrv_get_sudorules.c | 137 |
1 files changed, 106 insertions, 31 deletions
diff --git a/src/responder/sudo/sudosrv_get_sudorules.c b/src/responder/sudo/sudosrv_get_sudorules.c index 6b8ee369..c38c4da4 100644 --- a/src/responder/sudo/sudosrv_get_sudorules.c +++ b/src/responder/sudo/sudosrv_get_sudorules.c @@ -308,10 +308,41 @@ sudosrv_get_sudorules_dp_callback(uint16_t err_maj, uint32_t err_min, static void sudosrv_dp_req_done(struct tevent_req *req); +static errno_t sudosrv_get_sudorules_query_cache(TALLOC_CTX *mem_ctx, + struct sysdb_ctx *sysdb, + enum sss_dp_sudo_type type, + const char **attrs, + unsigned int flags, + const char *username, + uid_t uid, + char **groupnames, + struct sysdb_attrs ***_rules, + size_t *_count); + errno_t sudosrv_get_rules(struct sudo_cmd_ctx *cmd_ctx) { - struct tevent_req *dpreq; + TALLOC_CTX *tmp_ctx = NULL; + struct tevent_req *dpreq = NULL; struct dp_callback_ctx *cb_ctx = NULL; + struct sysdb_ctx *sysdb = cmd_ctx->domain->sysdb; + char **groupnames = NULL; + size_t expired_rules_num = 0; + struct sysdb_attrs **expired_rules = NULL; + errno_t ret; + unsigned int flags = SYSDB_SUDO_FILTER_NONE; + const char *attrs[] = { SYSDB_NAME, + NULL }; + + if (cmd_ctx->domain == NULL) { + DEBUG(SSSDBG_CRIT_FAILURE, ("Domain is not set!\n")); + return EFAULT; + } + + tmp_ctx = talloc_new(NULL); + if (tmp_ctx == NULL) { + DEBUG(SSSDBG_CRIT_FAILURE, ("talloc_new() failed\n")); + return ENOMEM; + } switch (cmd_ctx->type) { case SSS_SUDO_DEFAULTS: @@ -326,31 +357,86 @@ errno_t sudosrv_get_rules(struct sudo_cmd_ctx *cmd_ctx) break; } - dpreq = sss_dp_get_sudoers_send(cmd_ctx->cli_ctx, - cmd_ctx->cli_ctx->rctx, - cmd_ctx->domain, false, - cmd_ctx->type, - cmd_ctx->orig_username, - 0, NULL); - if (dpreq == NULL) { + /* Fetch all expired rules: + * sudo asks sssd twice - for defaults and for rules. If we refresh all + * expired rules for this user and defaults at once we will save one + * provider call + */ + ret = sysdb_get_sudo_user_info(tmp_ctx, cmd_ctx->orig_username, sysdb, + NULL, &groupnames); + if (ret != EOK) { DEBUG(SSSDBG_CRIT_FAILURE, - ("Cannot issue DP request.\n")); - return EIO; + ("Unable to retrieve user info [%d]: %s\n", strerror(ret))); + goto done; } - cb_ctx = talloc_zero(cmd_ctx, struct dp_callback_ctx); - if (!cb_ctx) { - talloc_zfree(dpreq); - return ENOMEM; + flags = SYSDB_SUDO_FILTER_INCLUDE_ALL + | SYSDB_SUDO_FILTER_INCLUDE_DFL + | SYSDB_SUDO_FILTER_ONLY_EXPIRED + | SYSDB_SUDO_FILTER_USERINFO; + ret = sudosrv_get_sudorules_query_cache(tmp_ctx, sysdb, cmd_ctx->type, + attrs, flags, cmd_ctx->orig_username, + cmd_ctx->uid, groupnames, + &expired_rules, &expired_rules_num); + if (ret != EOK) { + DEBUG(SSSDBG_CRIT_FAILURE, + ("Unable to retrieve expired sudo rules [%d]: %s\n", strerror(ret))); + goto done; } - cb_ctx->callback = sudosrv_get_sudorules_dp_callback; - cb_ctx->ptr = cmd_ctx; - cb_ctx->cctx = cmd_ctx->cli_ctx; - cb_ctx->mem_ctx = cmd_ctx; + if (expired_rules_num > 0) { + /* refresh expired rules then continue */ + DEBUG(SSSDBG_TRACE_INTERNAL, ("Refreshing expired rules\n")); + dpreq = sss_dp_get_sudoers_send(tmp_ctx, cmd_ctx->cli_ctx->rctx, + cmd_ctx->domain, false, + SSS_DP_SUDO_REFRESH_RULES, + cmd_ctx->orig_username, + expired_rules_num, expired_rules); + if (dpreq == NULL) { + DEBUG(SSSDBG_CRIT_FAILURE, + ("Cannot issue DP request.\n")); + ret = EIO; + goto done; + } + + cb_ctx = talloc_zero(tmp_ctx, struct dp_callback_ctx); + if (!cb_ctx) { + talloc_zfree(dpreq); + ret = ENOMEM; + goto done; + } + + cb_ctx->callback = sudosrv_get_sudorules_dp_callback; + cb_ctx->ptr = cmd_ctx; + cb_ctx->cctx = cmd_ctx->cli_ctx; + cb_ctx->mem_ctx = cmd_ctx; + + tevent_req_set_callback(dpreq, sudosrv_dp_req_done, cb_ctx); + ret = EAGAIN; - tevent_req_set_callback(dpreq, sudosrv_dp_req_done, cb_ctx); - return EAGAIN; + } else { + /* nothing is expired return what we have in the cache */ + DEBUG(SSSDBG_TRACE_INTERNAL, ("About to get sudo rules from cache\n")); + ret = sudosrv_get_sudorules_from_cache(cmd_ctx); + if (ret != EOK) { + DEBUG(SSSDBG_OP_FAILURE, + ("Failed to make a request to our cache [%d]: %s\n", + ret, strerror(ret))); + goto done; + } + } + + if (dpreq != NULL) { + talloc_steal(cmd_ctx->cli_ctx, dpreq); + } + + if (cb_ctx != NULL) { + talloc_steal(cmd_ctx, cb_ctx); + } + +done: + talloc_free(tmp_ctx); + return ret; } static void @@ -406,17 +492,6 @@ sudosrv_get_sudorules_dp_callback(uint16_t err_maj, uint32_t err_min, sudosrv_cmd_done(cmd_ctx, ret); } -static errno_t sudosrv_get_sudorules_query_cache(TALLOC_CTX *mem_ctx, - struct sysdb_ctx *sysdb, - enum sss_dp_sudo_type type, - const char **attrs, - unsigned int flags, - const char *username, - uid_t uid, - char **groupnames, - struct sysdb_attrs ***_rules, - size_t *_count); - static errno_t sudosrv_get_sudorules_from_cache(struct sudo_cmd_ctx *cmd_ctx) { TALLOC_CTX *tmp_ctx; |