2008-11-20 20:01:55 +00:00
|
|
|
/*
|
|
|
|
* CDDL HEADER START
|
|
|
|
*
|
|
|
|
* The contents of this file are subject to the terms of the
|
|
|
|
* Common Development and Distribution License (the "License").
|
|
|
|
* You may not use this file except in compliance with the License.
|
|
|
|
*
|
|
|
|
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
|
|
|
|
* or http://www.opensolaris.org/os/licensing.
|
|
|
|
* See the License for the specific language governing permissions
|
|
|
|
* and limitations under the License.
|
|
|
|
*
|
|
|
|
* When distributing Covered Code, include this CDDL HEADER in each
|
|
|
|
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
|
|
|
|
* If applicable, add the following below this CDDL HEADER, with the
|
|
|
|
* fields enclosed by brackets "[]" replaced with your own identifying
|
|
|
|
* information: Portions Copyright [yyyy] [name of copyright owner]
|
|
|
|
*
|
|
|
|
* CDDL HEADER END
|
|
|
|
*/
|
|
|
|
/*
|
2009-07-02 22:44:48 +00:00
|
|
|
* Copyright 2009 Sun Microsystems, Inc. All rights reserved.
|
2008-11-20 20:01:55 +00:00
|
|
|
* Use is subject to license terms.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if defined(_KERNEL)
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/sunddi.h>
|
|
|
|
#include <sys/ctype.h>
|
|
|
|
#else
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <strings.h>
|
|
|
|
#include <libnvpair.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#endif
|
|
|
|
/* XXX includes zfs_context.h, so why bother with the above? */
|
|
|
|
#include <sys/dsl_deleg.h>
|
|
|
|
#include "zfs_prop.h"
|
|
|
|
#include "zfs_deleg.h"
|
|
|
|
#include "zfs_namecheck.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* permission table
|
|
|
|
*
|
|
|
|
* Keep this table in sorted order
|
|
|
|
*
|
|
|
|
* This table is used for displaying all permissions for
|
|
|
|
* zfs allow
|
|
|
|
*/
|
|
|
|
|
|
|
|
zfs_deleg_perm_tab_t zfs_deleg_perm_tab[] = {
|
|
|
|
{ZFS_DELEG_PERM_ALLOW, ZFS_DELEG_NOTE_ALLOW},
|
|
|
|
{ZFS_DELEG_PERM_CLONE, ZFS_DELEG_NOTE_CLONE },
|
|
|
|
{ZFS_DELEG_PERM_CREATE, ZFS_DELEG_NOTE_CREATE },
|
|
|
|
{ZFS_DELEG_PERM_DESTROY, ZFS_DELEG_NOTE_DESTROY },
|
|
|
|
{ZFS_DELEG_PERM_MOUNT, ZFS_DELEG_NOTE_MOUNT },
|
|
|
|
{ZFS_DELEG_PERM_PROMOTE, ZFS_DELEG_NOTE_PROMOTE },
|
|
|
|
{ZFS_DELEG_PERM_RECEIVE, ZFS_DELEG_NOTE_RECEIVE },
|
|
|
|
{ZFS_DELEG_PERM_RENAME, ZFS_DELEG_NOTE_RENAME },
|
|
|
|
{ZFS_DELEG_PERM_ROLLBACK, ZFS_DELEG_NOTE_ROLLBACK },
|
|
|
|
{ZFS_DELEG_PERM_SNAPSHOT, ZFS_DELEG_NOTE_SNAPSHOT },
|
|
|
|
{ZFS_DELEG_PERM_SHARE, ZFS_DELEG_NOTE_SHARE },
|
|
|
|
{ZFS_DELEG_PERM_SEND, ZFS_DELEG_NOTE_NONE },
|
|
|
|
{ZFS_DELEG_PERM_USERPROP, ZFS_DELEG_NOTE_USERPROP },
|
2009-07-02 22:44:48 +00:00
|
|
|
{ZFS_DELEG_PERM_USERQUOTA, ZFS_DELEG_NOTE_USERQUOTA },
|
|
|
|
{ZFS_DELEG_PERM_GROUPQUOTA, ZFS_DELEG_NOTE_GROUPQUOTA },
|
|
|
|
{ZFS_DELEG_PERM_USERUSED, ZFS_DELEG_NOTE_USERUSED },
|
|
|
|
{ZFS_DELEG_PERM_GROUPUSED, ZFS_DELEG_NOTE_GROUPUSED },
|
2009-08-18 18:43:27 +00:00
|
|
|
{ZFS_DELEG_PERM_HOLD, ZFS_DELEG_NOTE_HOLD },
|
|
|
|
{ZFS_DELEG_PERM_RELEASE, ZFS_DELEG_NOTE_RELEASE },
|
2008-11-20 20:01:55 +00:00
|
|
|
{NULL, ZFS_DELEG_NOTE_NONE }
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
|
|
|
zfs_valid_permission_name(const char *perm)
|
|
|
|
{
|
|
|
|
if (zfs_deleg_canonicalize_perm(perm))
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
return (permset_namecheck(perm, NULL, NULL));
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
zfs_deleg_canonicalize_perm(const char *perm)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
zfs_prop_t prop;
|
|
|
|
|
|
|
|
for (i = 0; zfs_deleg_perm_tab[i].z_perm != NULL; i++) {
|
|
|
|
if (strcmp(perm, zfs_deleg_perm_tab[i].z_perm) == 0)
|
|
|
|
return (perm);
|
|
|
|
}
|
|
|
|
|
|
|
|
prop = zfs_name_to_prop(perm);
|
|
|
|
if (prop != ZPROP_INVAL && zfs_prop_delegatable(prop))
|
|
|
|
return (zfs_prop_to_name(prop));
|
|
|
|
return (NULL);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
zfs_validate_who(char *who)
|
|
|
|
{
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
if (who[2] != ZFS_DELEG_FIELD_SEP_CHR)
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
switch (who[0]) {
|
|
|
|
case ZFS_DELEG_USER:
|
|
|
|
case ZFS_DELEG_GROUP:
|
|
|
|
case ZFS_DELEG_USER_SETS:
|
|
|
|
case ZFS_DELEG_GROUP_SETS:
|
|
|
|
if (who[1] != ZFS_DELEG_LOCAL && who[1] != ZFS_DELEG_DESCENDENT)
|
|
|
|
return (-1);
|
|
|
|
for (p = &who[3]; *p; p++)
|
|
|
|
if (!isdigit(*p))
|
|
|
|
return (-1);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ZFS_DELEG_NAMED_SET:
|
|
|
|
case ZFS_DELEG_NAMED_SET_SETS:
|
|
|
|
if (who[1] != ZFS_DELEG_NA)
|
|
|
|
return (-1);
|
|
|
|
return (permset_namecheck(&who[3], NULL, NULL));
|
|
|
|
|
|
|
|
case ZFS_DELEG_CREATE:
|
|
|
|
case ZFS_DELEG_CREATE_SETS:
|
|
|
|
if (who[1] != ZFS_DELEG_NA)
|
|
|
|
return (-1);
|
|
|
|
if (who[3] != '\0')
|
|
|
|
return (-1);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case ZFS_DELEG_EVERYONE:
|
|
|
|
case ZFS_DELEG_EVERYONE_SETS:
|
|
|
|
if (who[1] != ZFS_DELEG_LOCAL && who[1] != ZFS_DELEG_DESCENDENT)
|
|
|
|
return (-1);
|
|
|
|
if (who[3] != '\0')
|
|
|
|
return (-1);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
zfs_deleg_verify_nvlist(nvlist_t *nvp)
|
|
|
|
{
|
|
|
|
nvpair_t *who, *perm_name;
|
|
|
|
nvlist_t *perms;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (nvp == NULL)
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
who = nvlist_next_nvpair(nvp, NULL);
|
|
|
|
if (who == NULL)
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
do {
|
|
|
|
if (zfs_validate_who(nvpair_name(who)))
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
error = nvlist_lookup_nvlist(nvp, nvpair_name(who), &perms);
|
|
|
|
|
|
|
|
if (error && error != ENOENT)
|
|
|
|
return (-1);
|
|
|
|
if (error == ENOENT)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
perm_name = nvlist_next_nvpair(perms, NULL);
|
|
|
|
if (perm_name == NULL) {
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
do {
|
|
|
|
error = zfs_valid_permission_name(
|
|
|
|
nvpair_name(perm_name));
|
|
|
|
if (error)
|
|
|
|
return (-1);
|
|
|
|
} while (perm_name = nvlist_next_nvpair(perms, perm_name));
|
|
|
|
} while (who = nvlist_next_nvpair(nvp, who));
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Construct the base attribute name. The base attribute names
|
|
|
|
* are the "key" to locate the jump objects which contain the actual
|
|
|
|
* permissions. The base attribute names are encoded based on
|
|
|
|
* type of entry and whether it is a local or descendent permission.
|
|
|
|
*
|
|
|
|
* Arguments:
|
|
|
|
* attr - attribute name return string, attribute is assumed to be
|
|
|
|
* ZFS_MAX_DELEG_NAME long.
|
|
|
|
* type - type of entry to construct
|
|
|
|
* inheritchr - inheritance type (local,descendent, or NA for create and
|
|
|
|
* permission set definitions
|
|
|
|
* data - is either a permission set name or a 64 bit uid/gid.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
zfs_deleg_whokey(char *attr, zfs_deleg_who_type_t type,
|
|
|
|
char inheritchr, void *data)
|
|
|
|
{
|
|
|
|
int len = ZFS_MAX_DELEG_NAME;
|
|
|
|
uint64_t *id = data;
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case ZFS_DELEG_USER:
|
|
|
|
case ZFS_DELEG_GROUP:
|
|
|
|
case ZFS_DELEG_USER_SETS:
|
|
|
|
case ZFS_DELEG_GROUP_SETS:
|
|
|
|
(void) snprintf(attr, len, "%c%c%c%lld", type, inheritchr,
|
|
|
|
ZFS_DELEG_FIELD_SEP_CHR, (longlong_t)*id);
|
|
|
|
break;
|
|
|
|
case ZFS_DELEG_NAMED_SET_SETS:
|
|
|
|
case ZFS_DELEG_NAMED_SET:
|
|
|
|
(void) snprintf(attr, len, "%c-%c%s", type,
|
|
|
|
ZFS_DELEG_FIELD_SEP_CHR, (char *)data);
|
|
|
|
break;
|
|
|
|
case ZFS_DELEG_CREATE:
|
|
|
|
case ZFS_DELEG_CREATE_SETS:
|
|
|
|
(void) snprintf(attr, len, "%c-%c", type,
|
|
|
|
ZFS_DELEG_FIELD_SEP_CHR);
|
|
|
|
break;
|
|
|
|
case ZFS_DELEG_EVERYONE:
|
|
|
|
case ZFS_DELEG_EVERYONE_SETS:
|
|
|
|
(void) snprintf(attr, len, "%c%c%c", type, inheritchr,
|
|
|
|
ZFS_DELEG_FIELD_SEP_CHR);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ASSERT(!"bad zfs_deleg_who_type_t");
|
|
|
|
}
|
|
|
|
}
|