summaryrefslogtreecommitdiffstats
path: root/winsup/cygwin/uinfo.cc
blob: b024396e88f76c0908fb64b55d9e894842df8fb2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
/* uinfo.cc: user info (uid, gid, etc...)

   Copyright 1996, 1997, 1998 Cygnus Solutions.

This file is part of Cygwin.

This software is a copyrighted work licensed under the terms of the
Cygwin license.  Please consult the file "CYGWIN_LICENSE" for
details. */

#include "winsup.h"
#include <pwd.h>
#include <unistd.h>
#include <winnls.h>
#include <wininet.h>
#include <utmp.h>
#include <limits.h>
#include <stdlib.h>
#include <lm.h>
#include <sys/cygwin.h>
#include "sync.h"
#include "sigproc.h"
#include "pinfo.h"
#include "fhandler.h"
#include "dtable.h"
#include "cygheap.h"
#include "registry.h"
#include "security.h"

struct passwd *
internal_getlogin (cygheap_user &user)
{
  char username[UNLEN + 1];
  DWORD ulen = UNLEN + 1;
  struct passwd *pw = NULL;

  if (!GetUserName (username, &ulen))
    user.set_name ("unknown");
  else
    user.set_name (username);

  if (os_being_run == winNT)
    {
      HANDLE ptok = user.token; /* Which is INVALID_HANDLE_VALUE if no
				   impersonation took place. */
      DWORD siz;
      cygsid tu;
      NET_API_STATUS ret = 0;
      char domain[INTERNET_MAX_HOST_NAME_LENGTH + 1];
      DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
      SID_NAME_USE use;
      char buf[MAX_PATH];

      /* Try to get the SID either from already impersonated token
	 or from current process first. To differ that two cases is
	 important, because you can't rely on the user information
	 in a process token of a currently impersonated process. */
      user.set_sid (NO_SID);
      if (ptok == INVALID_HANDLE_VALUE
	  && !OpenProcessToken (GetCurrentProcess (),
				TOKEN_ADJUST_DEFAULT | TOKEN_QUERY,
				&ptok))
	debug_printf ("OpenProcessToken(): %E");
      else if (!GetTokenInformation (ptok, TokenUser, &tu, sizeof tu, &siz))
	debug_printf ("GetTokenInformation(): %E");
      else if (!(ret = user.set_sid (tu)))
	debug_printf ("Couldn't retrieve SID from access token!");
      else if (!LookupAccountSid (NULL, user.sid (), username, &ulen,
				  domain, &dlen, &use))
	debug_printf ("LookupAccountSid (): %E");
      else
	{
	  user.set_name (username);
	  user.set_domain (domain);
	}
      if (get_logon_server_and_user_domain (domain, NULL))
	user.set_logsrv (domain + 2);
      setenv ("USERNAME", user.name (), 1);
      setenv ("LOGONSERVER", user.logsrv (), 1);
      setenv ("USERDOMAIN", user.domain (), 1);

      LPUSER_INFO_3 ui;
      WCHAR wlogsrv[INTERNET_MAX_HOST_NAME_LENGTH + 1];
      WCHAR wuser[UNLEN + 1];
      sys_mbstowcs (wlogsrv, user.logsrv (), INTERNET_MAX_HOST_NAME_LENGTH + 1);
      sys_mbstowcs (wuser, user.name (), UNLEN + 1);
      if (!NetUserGetInfo (wlogsrv, wuser, 3, (LPBYTE *)&ui) ||
          !NetUserGetInfo (NULL, wuser, 3, (LPBYTE *)&ui))
	{
	  sys_wcstombs (buf, ui->usri3_home_dir, MAX_PATH);
	  if (!buf[0])
	    {
	      sys_wcstombs (buf, ui->usri3_home_dir_drive, MAX_PATH);
	      if (buf[0])
		strcat (buf, "\\");
	      else
		{
		  char *env = getenv ("SYSTEMDRIVE");
		  if (env && *env)
		    strcat (strcpy (buf, env), "\\");
		  else
		    GetSystemDirectoryA (buf, MAX_PATH);
		}
	    }
	  setenv ("HOMEPATH", buf + 2, 1);
	  buf[2] = '\0';
	  setenv ("HOMEDRIVE", buf, 1);
	  NetApiBufferFree (ui);
	}

      /* If we have a SID, try to get the corresponding Cygwin user name
	 which can be different from the Windows user name. */
      cygsid gsid (NO_SID);
      if (user.sid ())
	{
	  cygsid psid;

	  for (int pidx = 0; (pw = internal_getpwent (pidx)); ++pidx)
	    if (psid.getfrompw (pw) && EqualSid (user.sid (), psid))
	      {
		user.set_name (pw->pw_name);
		struct group *gr = getgrgid (pw->pw_gid);
		if (gr && !gsid.getfromgr (gr))
		  gsid = NO_SID;
	      }
	  if (!strcasematch (user.name (), "SYSTEM"))
	    if (get_registry_hive_path (user.sid (), buf))
	      setenv ("USERPROFILE", buf, 1);
	    else
	      unsetenv ("USERPROFILE");
	}

      /* If this process is started from a non Cygwin process,
	 set token owner to the same value as token user and
	 primary group to the group which is set as primary group
	 in /etc/passwd. */
      if (ptok != INVALID_HANDLE_VALUE && myself->ppid == 1)
	{
	  if (!SetTokenInformation (ptok, TokenOwner, &tu, sizeof tu))
	    debug_printf ("SetTokenInformation(TokenOwner): %E");
	  if (gsid && !SetTokenInformation (ptok, TokenPrimaryGroup,
					    &gsid, sizeof gsid))
	    debug_printf ("SetTokenInformation(TokenPrimaryGroup): %E");
	}

      /* Close token only if it's a result from OpenProcessToken(). */
      if (ptok != INVALID_HANDLE_VALUE
	  && user.token == INVALID_HANDLE_VALUE)
	CloseHandle (ptok);
    }
  debug_printf ("Cygwins Username: %s", user.name ());
  return pw ?: getpwnam(user.name ());
}

void
uinfo_init ()
{
  struct passwd *p;

  /* Initialize to non impersonated values.
     Setting `impersonated' to TRUE seems to be wrong but it
     isn't. Impersonated is thought as "Current User and `token'
     are coincident". See seteuid() for the mechanism behind that. */
  cygheap->user.token = INVALID_HANDLE_VALUE;
  cygheap->user.impersonated = TRUE;

  /* If uid is USHRT_MAX, the process is started from a non cygwin
     process or the user context was changed in spawn.cc */
  if (myself->uid == USHRT_MAX)
    if ((p = internal_getlogin (cygheap->user)) != NULL)
      {
	myself->uid = p->pw_uid;
	/* Set primary group only if ntsec is off or the process has been
	   started from a non cygwin process. */
	if (!allow_ntsec || myself->ppid == 1)
	  myself->gid = p->pw_gid;
      }
    else
      {
	myself->uid = DEFAULT_UID;
	myself->gid = DEFAULT_GID;
      }
  /* Real and effective uid/gid are always identical on process start up.
     This is at least true for NT/W2K. */
  cygheap->user.orig_uid = cygheap->user.real_uid = myself->uid;
  cygheap->user.orig_gid = cygheap->user.real_gid = myself->gid;
}

extern "C" char *
getlogin (void)
{
#ifdef _MT_SAFE
  char *this_username=_reent_winsup ()->_username;
#else
  static NO_COPY char this_username[UNLEN + 1];
#endif

  return strcpy (this_username, cygheap->user.name ());
}

extern "C" uid_t
getuid (void)
{
  return cygheap->user.real_uid;
}

extern "C" gid_t
getgid (void)
{
  return cygheap->user.real_gid;
}

extern "C" uid_t
geteuid (void)
{
  return myself->uid;
}

extern "C" gid_t
getegid (void)
{
  return myself->gid;
}

/* Not quite right - cuserid can change, getlogin can't */
extern "C" char *
cuserid (char *src)
{
  if (src)
    {
      strcpy (src, getlogin ());
      return src;
    }
  else
    {
      return getlogin ();
    }
}