1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
|
/*
Authors:
Pavel Březina <pbrezina@redhat.com>
Copyright (C) 2011 Red Hat
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#ifndef _SUDOSRV_PRIVATE_H_
#define _SUDOSRV_PRIVATE_H_
#include <stdint.h>
#include <talloc.h>
#include "src/db/sysdb.h"
#include "responder/common/responder.h"
#define SSS_SUDO_ERROR_OK 0
#define SSS_SUDO_SBUS_SERVICE_VERSION 0x0001
#define SSS_SUDO_SBUS_SERVICE_NAME "sudo"
enum sss_dp_sudo_type {
SSS_DP_SUDO_DEFAULTS,
SSS_DP_SUDO_USER
};
struct sudo_ctx {
struct resp_ctx *rctx;
};
struct sudo_cmd_ctx {
struct cli_ctx *cli_ctx;
enum sss_dp_sudo_type type;
char *username;
bool check_next;
};
struct sudo_dom_ctx {
struct sudo_cmd_ctx *cmd_ctx;
struct sss_domain_info *domain;
bool check_provider;
/* cache results */
struct ldb_result *user;
struct sysdb_attrs **res;
size_t res_count;
};
struct sudo_dp_request {
struct cli_ctx *cctx;
struct sss_domain_info *domain;
};
struct sss_cmd_table *get_sudo_cmds(void);
errno_t sudosrv_cmd_done(struct sudo_dom_ctx *dctx, int ret);
errno_t sudosrv_get_sudorules(struct sudo_dom_ctx *dctx);
errno_t sudosrv_get_rules(struct sudo_dom_ctx *dctx);
char * sudosrv_get_sudorules_parse_query(TALLOC_CTX *mem_ctx,
const char *query_body,
int query_len);
int sudosrv_get_sudorules_build_response(TALLOC_CTX *mem_ctx,
uint32_t error,
int rules_num,
struct sysdb_attrs **rules,
uint8_t **_response_body,
size_t *_response_len);
int sudosrv_response_append_string(TALLOC_CTX *mem_ctx,
const char *str,
size_t str_len,
uint8_t **_response_body,
size_t *_response_len);
int sudosrv_response_append_uint32(TALLOC_CTX *mem_ctx,
uint32_t number,
uint8_t **_response_body,
size_t *_response_len);
int sudosrv_response_append_rule(TALLOC_CTX *mem_ctx,
int attrs_num,
struct ldb_message_element *attrs,
uint8_t **_response_body,
size_t *_response_len);
int sudosrv_response_append_attr(TALLOC_CTX *mem_ctx,
const char *name,
unsigned int values_num,
struct ldb_val *values,
uint8_t **_response_body,
size_t *_response_len);
struct tevent_req *
sss_dp_get_sudoers_send(TALLOC_CTX *mem_ctx,
struct resp_ctx *rctx,
struct sss_domain_info *dom,
bool fast_reply,
enum sss_dp_sudo_type type,
const char *name);
errno_t
sss_dp_get_sudoers_recv(TALLOC_CTX *mem_ctx,
struct tevent_req *req,
dbus_uint16_t *err_maj,
dbus_uint32_t *err_min,
char **err_msg);
#endif /* _SUDOSRV_PRIVATE_H_ */
|