1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
|
/*
SSSD
Data Provider, private header file
Copyright (C) Simo Sorce <ssorce@redhat.com> 2008
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#ifndef __DATA_PROVIDER_H__
#define __DATA_PROVIDER_H__
#include "config.h"
#include <stdint.h>
#include <sys/un.h>
#include <errno.h>
#include <stdbool.h>
#ifdef USE_KEYRING
#include <sys/types.h>
#include <keyutils.h>
#endif
#include "talloc.h"
#include "tevent.h"
#include "ldb.h"
#include "util/util.h"
#include "confdb/confdb.h"
#include "dbus/dbus.h"
#include "sbus/sssd_dbus.h"
#include "sbus/sbus_client.h"
#include "sss_client/sss_cli.h"
#define DATA_PROVIDER_VERSION 0x0001
#define DATA_PROVIDER_PIPE "private/sbus-dp"
#define DP_INTERFACE "org.freedesktop.sssd.dataprovider"
#define DP_PATH "/org/freedesktop/sssd/dataprovider"
#define DP_METHOD_REGISTER "RegisterService"
#define DP_METHOD_GETACCTINFO "getAccountInfo"
#define DP_METHOD_SUDOHANDLER "sudoHandler"
#define DP_METHOD_AUTOFSHANDLER "autofsHandler"
#define DP_METHOD_HOSTHANDLER "hostHandler"
#define DP_METHOD_GETDOMAINS "getDomains"
/* this is a reverse method sent from providers to
* the nss responder to tell it to update the mmap
* cache */
#define DP_REV_METHOD_UPDATE_CACHE "updateCache"
#define DP_REV_METHOD_INITGR_CHECK "initgrCheck"
/**
* @defgroup pamHandler PAM DBUS request
* @ingroup sss_pam
*
* The PAM responder send all the data it has received from the PAM client to
* the authentication backend with a DBUS message.
*
* As a response it expects a PAM return value (see pam(3) for details).
* The backend may send any number of additional messages (see ...) which are
* forwarded by the PAM responder to the PAM client.
* @{
*/
/** Then pamHandler Request
*
* The following two functions can help you to pack and unpack the DBUS
* message for a PAM request. If it is necessary to create the DBUS message by
* hand it must have the following elements:
*
* @param DBUS_TYPE_INT32 PAM Command, see #sss_cli_command for allowed values
* @param DBUS_TYPE_STRING User name, this value is send by the PAM client and
* contains the value of the PAM item PAM_USER
* @param DBUS_TYPE_STRING Service name, this value is send by the PAM client
* and contains the value of the PAM item PAM_SERVICE
* @param DBUS_TYPE_STRING TTY name this value is send by the PAM client and
* contains the value of the PAM item PAM_TTY
* @param DBUS_TYPE_STRING Remote user, this value is send by the PAM client
* and contains the value of the PAM item PAM_RUSER
* @param DBUS_TYPE_STRING Remote host, this value is send by the PAM client
* and contains the value of the PAM item PAM_RHOST
* @param DBUS_TYPE_UINT32 Type of the authentication token, see #sss_authtok_type
* for allowed values
* @param DBUS_TYPE_ARRAY__(BYTE) Authentication token, DBUS array which
* contains the authentication token, it is not required that passwords have a
* trailing \\0, this value is send by the PAM client and contains the value of
* the PAM item PAM_AUTHTOK or PAM_OLDAUTHTOK if the PAM command is
* #SSS_PAM_CHAUTHTOK or #SSS_PAM_CHAUTHTOK_PRELIM
* @param DBUS_TYPE_UINT32 Type of the new authentication token, see
* #sss_authtok_type for allowed values
* @param DBUS_TYPE_ARRAY__(BYTE) New authentication token, DBUS array which
* contains the new authentication token for a password change, it is not
* required that passwords have a trailing \\0, this value is send by the PAM
* client and contains the value of the PAM item PAM_AUTHTOK if the PAM
* command is #SSS_PAM_CHAUTHTOK or #SSS_PAM_CHAUTHTOK_PRELIM
* @param DBUS_TYPE_INT32 Privileged flag is set to a non-zero value if the
* PAM client connected to the PAM responder via the privileged pipe, i.e. if
* the PAM client is running with root privileges
* @param DBUS_TYPE_UINT32
*
* @retval DBUS_TYPE_UINT32 PAM return value, PAM_AUTHINFO_UNAVAIL is used to
* indicate that the provider is offline and that the PAM responder should try
* a chached authentication, for all other return value see the man pages for
* the corresponding PAM service functions
* @retval DBUS_TYPE_ARRAY__(STRUCT) Zero or more additional getAccountInfo
* messages, here the DBUS_TYPE_STRUCT is build of a DBUS_TYPE_UINT32 holding
* an identifier (see #response_type) and DBUS_TYPE_G_BYTE_ARRAY with the data
* of the message.
*/
#define DP_METHOD_PAMHANDLER "pamHandler"
/**
* @}
*/ /* end of group pamHandler */
#define DP_ERR_OK 0
#define DP_ERR_OFFLINE 1
#define DP_ERR_TIMEOUT 2
#define DP_ERR_FATAL 3
#define BE_ATTR_CORE 1
#define BE_ATTR_MEM 2
#define BE_ATTR_ALL 3
#define BE_FILTER_NAME 1
#define BE_FILTER_IDNUM 2
#define BE_FILTER_ENUM 3
#define BE_REQ_USER 0x0001
#define BE_REQ_GROUP 0x0002
#define BE_REQ_INITGROUPS 0x0003
#define BE_REQ_NETGROUP 0x0004
#define BE_REQ_SERVICES 0x0005
#define BE_REQ_SUDO_FULL 0x0006
#define BE_REQ_SUDO_RULES 0x0007
#define BE_REQ_AUTOFS 0x0009
#define BE_REQ_HOST 0x0010
#define BE_REQ_TYPE_MASK 0x00FF
#define BE_REQ_FAST 0x1000
/* AUTH related common data and functions */
#define DEBUG_PAM_DATA(level, pd) do { \
if (DEBUG_IS_SET(debug_get_level(level))) pam_print_data(level, pd); \
} while(0)
struct response_data {
int32_t type;
int32_t len;
uint8_t *data;
bool do_not_send_to_client;
struct response_data *next;
};
struct pam_data {
int cmd;
uint32_t authtok_type;
uint32_t authtok_size;
uint32_t newauthtok_type;
uint32_t newauthtok_size;
char *domain;
char *user;
char *service;
char *tty;
char *ruser;
char *rhost;
uint8_t *authtok;
uint8_t *newauthtok;
uint32_t cli_pid;
int pam_status;
int response_delay;
struct response_data *resp_list;
bool offline_auth;
bool last_auth_saved;
int priv;
#ifdef USE_KEYRING
key_serial_t key_serial;
#endif
};
/* from dp_auth_util.c */
#define SSS_SERVER_INFO 0x80000000
#define SSS_KRB5_INFO 0x40000000
#define SSS_LDAP_INFO 0x20000000
#define SSS_PROXY_INFO 0x10000000
#define SSS_KRB5_INFO_TGT_LIFETIME (SSS_SERVER_INFO|SSS_KRB5_INFO|0x01)
#define SSS_KRB5_INFO_UPN (SSS_SERVER_INFO|SSS_KRB5_INFO|0x02)
errno_t copy_pam_data(TALLOC_CTX *mem_ctx, struct pam_data *old_pd,
struct pam_data **new_pd);
void pam_print_data(int l, struct pam_data *pd);
int pam_add_response(struct pam_data *pd,
enum response_type type,
int len, const uint8_t *data);
bool dp_pack_pam_request(DBusMessage *msg, struct pam_data *pd);
bool dp_unpack_pam_request(DBusMessage *msg, TALLOC_CTX *mem_ctx,
struct pam_data **new_pd, DBusError *dbus_error);
bool dp_pack_pam_response(DBusMessage *msg, struct pam_data *pd);
bool dp_unpack_pam_response(DBusMessage *msg, struct pam_data *pd,
DBusError *dbus_error);
int dp_common_send_id(struct sbus_connection *conn, uint16_t version,
const char *name);
void dp_id_callback(DBusPendingCall *pending, void *ptr);
/* from dp_sbus.c */
int dp_get_sbus_address(TALLOC_CTX *mem_ctx,
char **address, const char *domain_name);
/* Helpers */
#define NULL_STRING { .string = NULL }
#define NULL_BLOB { .blob = { NULL, 0 } }
#define NULL_NUMBER { .number = 0 }
#define BOOL_FALSE { .boolean = false }
#define BOOL_TRUE { .boolean = true }
enum dp_opt_type {
DP_OPT_STRING,
DP_OPT_BLOB,
DP_OPT_NUMBER,
DP_OPT_BOOL
};
struct dp_opt_blob {
uint8_t *data;
size_t length;
};
union dp_opt_value {
const char *cstring;
char *string;
struct dp_opt_blob blob;
int number;
bool boolean;
};
struct dp_option {
const char *opt_name;
enum dp_opt_type type;
union dp_opt_value def_val;
union dp_opt_value val;
};
#define DP_OPTION_TERMINATOR { NULL, 0, NULL_STRING, NULL_STRING }
int dp_get_options(TALLOC_CTX *memctx,
struct confdb_ctx *cdb,
const char *conf_path,
struct dp_option *def_opts,
int num_opts,
struct dp_option **_opts);
int dp_copy_options(TALLOC_CTX *memctx,
struct dp_option *src_opts,
int num_opts,
struct dp_option **_opts);
const char *_dp_opt_get_cstring(struct dp_option *opts,
int id, const char *location);
char *_dp_opt_get_string(struct dp_option *opts,
int id, const char *location);
struct dp_opt_blob _dp_opt_get_blob(struct dp_option *opts,
int id, const char *location);
int _dp_opt_get_int(struct dp_option *opts,
int id, const char *location);
bool _dp_opt_get_bool(struct dp_option *opts,
int id, const char *location);
#define dp_opt_get_cstring(o, i) _dp_opt_get_cstring(o, i, __FUNCTION__)
#define dp_opt_get_string(o, i) _dp_opt_get_string(o, i, __FUNCTION__)
#define dp_opt_get_blob(o, i) _dp_opt_get_blob(o, i, __FUNCTION__)
#define dp_opt_get_int(o, i) _dp_opt_get_int(o, i, __FUNCTION__)
#define dp_opt_get_bool(o, i) _dp_opt_get_bool(o, i, __FUNCTION__)
int _dp_opt_set_string(struct dp_option *opts, int id,
const char *s, const char *location);
int _dp_opt_set_blob(struct dp_option *opts, int id,
struct dp_opt_blob b, const char *location);
int _dp_opt_set_int(struct dp_option *opts, int id,
int i, const char *location);
int _dp_opt_set_bool(struct dp_option *opts, int id,
bool b, const char *location);
#define dp_opt_set_string(o, i, v) _dp_opt_set_string(o, i, v, __FUNCTION__)
#define dp_opt_set_blob(o, i, v) _dp_opt_set_blob(o, i, v, __FUNCTION__)
#define dp_opt_set_int(o, i, v) _dp_opt_set_int(o, i, v, __FUNCTION__)
#define dp_opt_set_bool(o, i, v) _dp_opt_set_bool(o, i, v, __FUNCTION__)
#endif /* __DATA_PROVIDER_ */
|