return MR_SUCCESS;
}
+int access_update_user(struct query *q, char *argv[], client *cl)
+{
+ EXEC SQL BEGIN DECLARE SECTION;
+ int users_id, unix_uid, status, comments, secure;
+ char login[USERS_LOGIN_SIZE], shell[USERS_SHELL_SIZE];
+ char winconsoleshell[USERS_WINCONSOLESHELL_SIZE], last[USERS_LAST_SIZE];
+ char first[USERS_FIRST_SIZE], middle[USERS_MIDDLE_SIZE];
+ char clearid[USERS_CLEARID_SIZE], type[USERS_TYPE_SIZE];
+ char signature[USERS_SIGNATURE_SIZE];
+ EXEC SQL END DECLARE SECTION;
+ /* The two fields we let users update themselves didn't appear until
+ * version 11.
+ */
+ if (q->version < 11)
+ return MR_PERM;
+
+ if (cl->users_id != *(int *)argv[0])
+ return MR_PERM;
+
+ users_id = *(int *)argv[0];
+
+ EXEC SQL SELECT u.login, u.unix_uid, u.shell, u.winconsoleshell, u.last,
+ u.first, u.middle, u.status, u.clearid, u.type, u.comments, u.signature,
+ u.secure INTO :login, :unix_uid, :shell, :winconsoleshell, :last, :first,
+ :middle, :status, :clearid, :type, :comments, :signature, :secure
+ FROM USERS u WHERE u.users_id = :users_id;
+
+ /* None of these things can have changed. */
+ if (strcmp(argv[1], strtrim(login)) ||
+ (unix_uid != atoi(argv[2])) ||
+ strcmp(argv[3], strtrim(shell)) ||
+ strcmp(argv[4], strtrim(winconsoleshell)) ||
+ strcmp(argv[5], strtrim(last)) ||
+ strcmp(argv[6], strtrim(first)) ||
+ strcmp(argv[7], strtrim(middle)) ||
+ (status != atoi(argv[8])) ||
+ strcmp(argv[9], strtrim(clearid)) ||
+ strcmp(argv[10], strtrim(type)) ||
+ (comments != *(int *)argv[11]) ||
+ strcmp(argv[12], strtrim(signature)) ||
+ (secure != atoi(argv[13])))
+ return MR_PERM;
+
+ return MR_SUCCESS;
+}
/* access_login - verify that client name equals specified login name
*
{
EXEC SQL BEGIN DECLARE SECTION;
int list_id, acl_id, flags, gid, users_id, member_id, member_acl_id;
- int memacl_id;
+ int memacl_id, mailman, mailman_id;
char acl_type[LIST_ACL_TYPE_SIZE], name[LIST_NAME_SIZE], *newname;
char member_acl_type[LIST_ACL_TYPE_SIZE], memacl_type[LIST_ACL_TYPE_SIZE];
EXEC SQL END DECLARE SECTION;
- int status;
+ int status, cnt;
list_id = *(int *)argv[0];
member_id = *(int *)argv[2];
EXEC SQL SELECT acl_id, acl_type, memacl_id, memacl_type,
- gid, publicflg, name
+ gid, publicflg, name, mailman, mailman_id
INTO :acl_id, :acl_type, :memacl_id, :memacl_type,
- :gid, :flags, :name
+ :gid, :flags, :name, :mailman, :mailman_id
FROM list
WHERE list_id = :list_id;
newname = argv[1];
- if (!strcmp("ulis", q->shortname))
- {
- /* Check that it doesn't conflict with the Grouper namespace. */
- if (strlen(newname) > 4 && isdigit(newname[2]) &&
- isdigit(newname[3]) && newname[4] == '-')
- {
- if (!strncasecmp(newname, "fa", 2) ||
- !strncasecmp(newname, "sp", 2) ||
- !strncasecmp(newname, "su", 2) ||
- !strncasecmp(newname, "ja", 2))
- return MR_RESERVED;
- }
-
- /* Don't let anyone take owner-foo list names. They interact
- * weirdly with the aliases automatically generated by
- * mailhub.gen.
- */
- if (!strncasecmp(newname, "owner-", 6))
- return MR_RESERVED;
- }
-
+ /* Check that it doesn't conflict with the Grouper namespace. */
+ if (strlen(newname) > 4 && isdigit(newname[2]) &&
+ isdigit(newname[3]) && newname[4] == '-')
+ {
+ if (!strncasecmp(newname, "fa", 2) ||
+ !strncasecmp(newname, "sp", 2) ||
+ !strncasecmp(newname, "su", 2) ||
+ !strncasecmp(newname, "ja", 2))
+ return MR_RESERVED;
+ }
+
+ /* Don't let anyone take owner-foo list names. They interact
+ * weirdly with the aliases automatically generated by
+ * mailhub.gen.
+ */
+ if (!strncasecmp(newname, "owner-", 6))
+ return MR_RESERVED;
+
EXEC SQL SELECT users_id INTO :users_id FROM users
WHERE login = :newname;
if ((sqlca.sqlcode != SQL_NO_MATCH) && strcmp(strtrim(name), newname) &&
(users_id != cl->users_id))
return MR_PERM;
+
+ /* For modern enough clients, don't allow ordinary users to toggle
+ * the mailman bit or change the server.
+ */
+ if (q->version >= 10)
+ {
+ if (mailman != atoi(argv[9]))
+ return MR_PERM;
+
+ if (mailman_id != *(int *)argv[10])
+ return MR_PERM;
+ }
}
/* check for client in access control list and return success right
/* If not amtl, atml, or dmfl, we lose. */
if (strcmp(q->shortname, "amtl") && strcmp(q->shortname, "atml") &&
- strcmp(q->shortname, "dmfl"))
+ strcmp(q->shortname, "dmfl") && strcmp(q->shortname, "tmol"))
return MR_PERM;
if (find_member(memacl_type, memacl_id, cl))
int access_vis_list_by_name(struct query *q, char *argv[], client *cl)
{
EXEC SQL BEGIN DECLARE SECTION;
- int acl_id, memacl_id, flags, rowcount;
+ int acl_id, memacl_id, flags, rowcount, list_id;
char acl_type[LIST_ACL_TYPE_SIZE], memacl_type[LIST_ACL_TYPE_SIZE];
char *listname;
EXEC SQL END DECLARE SECTION;
int status;
listname = argv[0];
- EXEC SQL SELECT hidden, acl_id, acl_type, memacl_id, memacl_type
- INTO :flags, :acl_id, :acl_type, :memacl_id, :memacl_type
+ EXEC SQL SELECT hidden, acl_id, acl_type, memacl_id, memacl_type, list_id
+ INTO :flags, :acl_id, :acl_type, :memacl_id, :memacl_type, :list_id
FROM list
WHERE name = :listname;
if (!flags)
return MR_SUCCESS;
- /* check for client in access control list */
+ /* If the user is a member of the acl, memacl, or the list itself,
+ * accept them.
+ */
status = find_member(acl_type, acl_id, cl);
if (!status)
- {
- status = find_member(memacl_type, memacl_id, cl);
- if (!status)
- return MR_PERM;
- }
+ status = find_member(memacl_type, memacl_id, cl);
+ if (!status)
+ status = find_member("LIST", list_id, cl);
+ if (!status)
+ return MR_PERM;
+
return MR_SUCCESS;
}
/* access_member - allow user to access member of type "USER" and name matches
* username, or to access member of type "KERBEROS" and the principal matches
* the user, or to access member of type "LIST" and list is one that user is
- * on the acl of, or the list is visible.
+ * on the acl of, or the list is visible. Allow anyone to look up list
+ * memberships of MACHINEs.
*/
int access_member(struct query *q, char *argv[], client *cl)
return MR_SUCCESS;
}
+ if (!strcmp(argv[0], "MACHINE") || !strcmp(argv[0], "RMACHINE"))
+ return MR_SUCCESS;
+
return MR_PERM;
}
int access_host(struct query *q, char *argv[], client *cl)
{
EXEC SQL BEGIN DECLARE SECTION;
- int mid, sid, id;
+ int mid, sid, id, subnet_status;
char mtype[MACHINE_OWNER_TYPE_SIZE], stype[SUBNET_OWNER_TYPE_SIZE];
+ char *account_number;
EXEC SQL END DECLARE SECTION;
int status, idx;
if (q->version < 6)
idx = 0;
- else
+ else if (q->version >= 6 && q->version < 8)
idx = 1;
-
+ else
+ idx = 2;
+
if (q->type == RETRIEVE)
{
if (strcmp(argv[0], "*") || strcmp(argv[1], "*") ||
return MR_BAD_CHAR;
id = *(int *)argv[8 + idx];
- EXEC SQL SELECT s.owner_type, s.owner_id
- INTO :stype, :sid FROM subnet s
+ EXEC SQL SELECT s.owner_type, s.owner_id, s.status
+ INTO :stype, :sid, :subnet_status FROM subnet s
WHERE s.snet_id = :id;
mid = 0;
+ /* Non query owner must provide valid billing information. */
+ if (q->version >= 8)
+ {
+ if (subnet_status == SNET_STATUS_BILLABLE)
+ {
+ account_number = argv[7];
+ EXEC SQL SELECT account_number FROM accountnumbers
+ WHERE account_number = :account_number;
+ if (sqlca.sqlcode == SQL_NO_MATCH)
+ return MR_ACCOUNT_NUMBER;
+ }
+ }
+
if (find_member(stype, sid, cl))
return MR_SUCCESS;
else
id = *(int *)argv[0];
EXEC SQL SELECT m.name, m.use, m.contact, m.billing_contact, m.status,
m.address, m.owner_type, m.owner_id, m.acomment, m.ocomment, m.snet_id,
- s.owner_type, s.owner_id INTO :name, :use, :contact, :billing_contact,
- :status, :address, :mtype, :mid, :acomment, :ocomment, :snid, :stype,
- :sid
+ s.owner_type, s.owner_id, s.status INTO :name, :use, :contact,
+ :billing_contact, :status, :address, :mtype, :mid, :acomment,
+ :ocomment, :snid, :stype, :sid, :subnet_status
FROM machine m, subnet s
WHERE m.mach_id = :id AND s.snet_id = m.snet_id;
if (dbms_errno)
return mr_errcode;
+ /* Non query owner must provide valid billing information. */
+ if (q->version >= 8)
+ {
+ if ((subnet_status == SNET_STATUS_BILLABLE) &&
+ (atoi(argv[10]) != 3))
+ {
+ account_number = argv[8];
+ EXEC SQL SELECT account_number FROM accountnumbers
+ WHERE account_number = :account_number;
+ if (sqlca.sqlcode == SQL_NO_MATCH)
+ return MR_ACCOUNT_NUMBER;
+ }
+ }
+
/* non-query-owner cannot change use or ocomment */
if ((use != atoi(argv[7 + idx])) || (ocomment != *(int *)argv[14 + idx]))
return MR_PERM;
{
/* host owner also cannot change contact, status, address,
owner, or acomment */
- if (strcmp(argv[6 + idx], strtrim(contact)) ||
+ if (strcmp(argv[6], strtrim(contact)) ||
(status != atoi(argv[8 + idx])) ||
strcmp(argv[10 + idx], strtrim(address)) ||
strcmp(argv[11 + idx], strtrim(mtype)) ||
return MR_PERM;
/* Billing contact field didn't appear until version 6 */
if (q->version >= 6)
- if (strcmp(argv[8], strtrim(billing_contact)))
+ if (strcmp(argv[7], strtrim(billing_contact)))
return MR_PERM;
}
else
return MR_PERM;
}
+/* access_container - check access for most container operations
+ *
+ * Inputs: argv[0] - cnt_id
+ * q - query name
+ * cl - client name
+ *
+ * - check if that client is a member of the access control list
+ * - OR, if the query is add_machine_to_container or delete_machine_from_container
+ * check if the client is a memeber of the mem_acl list
+ * - if the query is update_container and the container is to be renamed and
+ * it is a top-level container, only priviledged users can do it
+ */
+
+int access_container(struct query *q, char *argv[], client *cl)
+{
+ EXEC SQL BEGIN DECLARE SECTION;
+ int cnt_id, acl_id, memacl_id, mach_id, machine_owner_id, flag;
+ char acl_type[CONTAINERS_ACL_TYPE_SIZE], memacl_type[CONTAINERS_ACL_TYPE_SIZE];
+ char name[CONTAINERS_NAME_SIZE], *newname;
+ char machine_owner_type[MACHINE_OWNER_TYPE_SIZE];
+ EXEC SQL END DECLARE SECTION;
+ int status;
+
+ cnt_id = *(int *)argv[0];
+
+ /* if amcn or dmcn, container id is the second argument */
+ if (strcmp(q->shortname, "amcn") == 0 || strcmp(q->shortname, "dmcn") == 0)
+ {
+ mach_id = *(int *)argv[0];
+ cnt_id = *(int *)argv[1];
+ }
+
+ EXEC SQL SELECT acl_id, acl_type, memacl_id, memacl_type, name, publicflg
+ INTO :acl_id, :acl_type, :memacl_id, :memacl_type, :name, :flag
+ FROM containers
+ WHERE cnt_id = :cnt_id;
+
+ if (sqlca.sqlerrd[2] != 1)
+ return MR_INTERNAL;
+
+ /* trim off the trailing spaces */
+ strcpy(name, strtrim(name));
+
+ /* if the query is update_container and the containers is to be renamed
+ * and it is a top-level container, only dbadmin can do it */
+ if (!strcmp(q->shortname, "ucon"))
+ {
+ newname = argv[1];
+ if (strcmp(name, newname) && strchr(name, '/') == NULL)
+ return MR_PERM;
+ }
+
+ /* check for client in access control list and return success right
+ * away if it's there. */
+ if (find_member(acl_type, acl_id, cl))
+ return MR_SUCCESS;
+
+ /* If not amcn, dmcn, we lose. */
+ if (strcmp(q->shortname, "amcn") && strcmp(q->shortname, "dmcn"))
+ return MR_PERM;
+
+ if (find_member(memacl_type, memacl_id, cl))
+ return MR_SUCCESS;
+
+ /* if the container is public or the query is delete, grant access if client
+ * is on owner list */
+ if (flag || q->type == DELETE)
+ {
+ EXEC SQL SELECT owner_type, owner_id INTO :machine_owner_type,
+ :machine_owner_id
+ FROM machine
+ WHERE mach_id = :mach_id;
+
+ if (sqlca.sqlerrd[2] == 1 && strcmp("NONE", machine_owner_type) &&
+ find_member(machine_owner_type, machine_owner_id, cl))
+ return MR_SUCCESS;
+ }
+ /* Otherwise fail. */
+ return MR_PERM;
+}