version 1.33, 2003/11/12 18:21:34
|
version 1.88, 2010/07/05 08:58:36
|
|
|
//%2003//////////////////////////////////////////////////////////////////////// |
//%LICENSE//////////////////////////////////////////////////////////////// |
// | // |
// Copyright (c) 2000, 2001, 2002 BMC Software, Hewlett-Packard Development |
// Licensed to The Open Group (TOG) under one or more contributor license |
// Company, L. P., IBM Corp., The Open Group, Tivoli Systems. |
// agreements. Refer to the OpenPegasusNOTICE.txt file distributed with |
// Copyright (c) 2003 BMC Software; Hewlett-Packard Development Company, L. P.; |
// this work for additional information regarding copyright ownership. |
// IBM Corp.; EMC Corporation, The Open Group. |
// Each contributor licenses this file to you under the OpenPegasus Open |
// |
// Source License; you may not use this file except in compliance with the |
// Permission is hereby granted, free of charge, to any person obtaining a copy |
// License. |
// of this software and associated documentation files (the "Software"), to |
|
// deal in the Software without restriction, including without limitation the |
|
// rights to use, copy, modify, merge, publish, distribute, sublicense, and/or |
|
// sell copies of the Software, and to permit persons to whom the Software is |
|
// furnished to do so, subject to the following conditions: |
|
// |
|
// THE ABOVE COPYRIGHT NOTICE AND THIS PERMISSION NOTICE SHALL BE INCLUDED IN |
|
// ALL COPIES OR SUBSTANTIAL PORTIONS OF THE SOFTWARE. THE SOFTWARE IS PROVIDED |
|
// "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT |
|
// LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR |
|
// PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT |
|
// HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN |
|
// ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION |
|
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
|
// |
|
//============================================================================== |
|
// | // |
// Author: Mike Brasher (mbrasher@bmc.com) |
// Permission is hereby granted, free of charge, to any person obtaining a |
|
// copy of this software and associated documentation files (the "Software"), |
|
// to deal in the Software without restriction, including without limitation |
|
// the rights to use, copy, modify, merge, publish, distribute, sublicense, |
|
// and/or sell copies of the Software, and to permit persons to whom the |
|
// Software is furnished to do so, subject to the following conditions: |
// | // |
// Modified By: Sushma Fernandes (sushma_fernandes@hp.com) |
// The above copyright notice and this permission notice shall be included |
|
// in all copies or substantial portions of the Software. |
// | // |
// Nag Boranna, Hewlett-Packard Company (nagaraja_boranna@hp.com) |
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
|
// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. |
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY |
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, |
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE |
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
// | // |
// Modified By: Dave Rosckes (rosckes@us.ibm.com) |
////////////////////////////////////////////////////////////////////////// |
// | // |
//%///////////////////////////////////////////////////////////////////////////// | //%///////////////////////////////////////////////////////////////////////////// |
| |
#include "System.h" | #include "System.h" |
| |
PEGASUS_NAMESPACE_BEGIN |
#include "Network.h" |
|
#include "Mutex.h" |
#include <windows.h> |
|
#ifndef _WINSOCKAPI_ |
|
#include <winsock2.h> |
|
#endif |
|
#include <fcntl.h> | #include <fcntl.h> |
#include <sys/types.h> | #include <sys/types.h> |
#include <time.h> | #include <time.h> |
|
|
#include <io.h> | #include <io.h> |
#include <conio.h> | #include <conio.h> |
#include <direct.h> | #include <direct.h> |
#include <sys/stat.h> |
|
#include <sys/types.h> | #include <sys/types.h> |
#include <windows.h> | #include <windows.h> |
#include <process.h> | #include <process.h> |
|
#include <lm.h> |
|
#include <Pegasus/Common/Tracer.h> |
|
|
|
#define SECURITY_WIN32 |
|
#include <security.h> |
| |
#define ACCESS_EXISTS 0 |
PEGASUS_NAMESPACE_BEGIN |
#define ACCESS_WRITE 2 |
|
#define ACCESS_READ 4 |
#define PEGASUS_ACCESS_EXISTS 0 |
#define ACCESS_READ_AND_WRITE 6 |
#define PEGASUS_ACCESS_WRITE 2 |
|
#define PEGASUS_ACCESS_READ 4 |
|
#define PEGASUS_ACCESS_READ_AND_WRITE 6 |
| |
#define PW_BUFF_LEN 65 | #define PW_BUFF_LEN 65 |
| |
|
|
milliseconds = milliseconds / 1000; | milliseconds = milliseconds / 1000; |
} | } |
| |
|
void System::getCurrentTimeUsec(Uint32& seconds, Uint32& microseconds) |
|
{ |
|
FILETIME ft; |
|
GetSystemTimeAsFileTime(&ft); |
|
ULARGE_INTEGER largeInt = { ft.dwLowDateTime, ft.dwHighDateTime }; |
|
largeInt.QuadPart -= 0x19db1ded53e8000; |
|
seconds = long(largeInt.QuadPart / (10000 * 1000)); |
|
microseconds = long((largeInt.QuadPart % (10000 * 1000)) / 10); |
|
} |
|
|
|
Uint64 System::getCurrentTimeUsec() |
|
{ |
|
FILETIME ft; |
|
GetSystemTimeAsFileTime(&ft); |
|
ULARGE_INTEGER largeInt = { ft.dwLowDateTime, ft.dwHighDateTime }; |
|
largeInt.QuadPart -= 0x19db1ded53e8000; |
|
|
|
return Uint64(largeInt.QuadPart / 10); |
|
} |
|
|
String System::getCurrentASCIITime() | String System::getCurrentASCIITime() |
{ | { |
char tmpbuf[128]; | char tmpbuf[128]; |
|
|
| |
Boolean System::exists(const char* path) | Boolean System::exists(const char* path) |
{ | { |
return _access(path, ACCESS_EXISTS) == 0; |
return _access(path, PEGASUS_ACCESS_EXISTS) == 0; |
} | } |
| |
Boolean System::canRead(const char* path) | Boolean System::canRead(const char* path) |
{ | { |
return _access(path, ACCESS_READ) == 0; |
return _access(path, PEGASUS_ACCESS_READ) == 0; |
} | } |
| |
Boolean System::canWrite(const char* path) | Boolean System::canWrite(const char* path) |
{ | { |
return _access(path, ACCESS_WRITE) == 0; |
return _access(path, PEGASUS_ACCESS_WRITE) == 0; |
} | } |
| |
Boolean System::getCurrentDirectory(char* path, Uint32 size) | Boolean System::getCurrentDirectory(char* path, Uint32 size) |
|
|
| |
Boolean System::renameFile(const char* oldPath, const char* newPath) | Boolean System::renameFile(const char* oldPath, const char* newPath) |
{ | { |
return rename(oldPath, newPath) == 0; |
if (exists(oldPath)) |
} |
|
|
|
DynamicLibraryHandle System::loadDynamicLibrary(const char* fileName) |
|
{ | { |
return DynamicLibraryHandle(LoadLibrary(fileName)); |
removeFile(newPath); |
} |
|
|
|
void System::unloadDynamicLibrary(DynamicLibraryHandle libraryHandle) |
|
{ |
|
FreeLibrary(HINSTANCE(libraryHandle)); |
|
} |
|
|
|
String System::dynamicLoadError(void) { |
|
return String(); |
|
} | } |
|
return rename(oldPath, newPath) == 0; |
DynamicSymbolHandle System::loadDynamicSymbol( |
|
DynamicLibraryHandle libraryHandle, |
|
const char* symbolName) |
|
{ |
|
return DynamicSymbolHandle(GetProcAddress( |
|
(HINSTANCE)libraryHandle, symbolName)); |
|
} |
|
|
|
String System::getHostName() |
|
{ |
|
static char hostname[64]; |
|
|
|
if (!*hostname) |
|
gethostname(hostname, sizeof(hostname)); |
|
|
|
return hostname; |
|
} |
|
|
|
String System::getFullyQualifiedHostName () |
|
{ |
|
// |
|
// ATTN: Implement this method to return the fully qualified host name |
|
// |
|
return String::EMPTY; |
|
} | } |
| |
String System::getSystemCreationClassName () | String System::getSystemCreationClassName () |
{ | { |
// |
return "CIM_ComputerSystem"; |
// ATTN: Implement this method to return the system creation class name |
|
// |
|
return String::EMPTY; |
|
} | } |
| |
Uint32 System::lookupPort( | Uint32 System::lookupPort( |
|
|
struct servent *serv; | struct servent *serv; |
| |
// | // |
// Get wbem-local port from /etc/services |
// Get the port number. |
// | // |
if ( (serv = getservbyname(serviceName, TCP)) != NULL ) | if ( (serv = getservbyname(serviceName, TCP)) != NULL ) |
{ | { |
localPort = serv->s_port; |
localPort = ntohs(serv->s_port); |
} | } |
else | else |
{ | { |
|
|
| |
String System::getEffectiveUserName() | String System::getEffectiveUserName() |
{ | { |
|
#if (_MSC_VER >= 1300) || defined(PEGASUS_WINDOWS_SDK_HOME) |
|
|
|
//Bug 3076 fix |
|
wchar_t fullUserName[UNLEN+1]; |
|
DWORD userNameSize = sizeof(fullUserName)/sizeof(fullUserName[0]); |
|
wchar_t computerName[MAX_COMPUTERNAME_LENGTH+1]; |
|
DWORD computerNameSize = sizeof(computerName)/sizeof(computerName[0]); |
|
wchar_t userName[UNLEN+1]; |
|
wchar_t userDomain[UNLEN+1]; |
|
String userId; |
|
|
|
if (!GetUserNameExW(NameSamCompatible, fullUserName, &userNameSize)) |
|
{ |
|
return String(); |
|
} |
|
|
|
wchar_t* index = wcschr(fullUserName, '\\'); |
|
*index = 0; |
|
wcscpy(userDomain, fullUserName); |
|
wcscpy(userName, index + 1); |
|
|
|
//The above function will return the system name as the domain if |
|
//the user is not on a real domain. Strip this out so that the rest of |
|
//our windows user functions work. What if the system name and the domain |
|
//name are the same? |
|
GetComputerNameW(computerName, &computerNameSize); |
|
|
|
if (wcscmp(computerName, userDomain) != 0) |
|
{ |
|
//userId.append(userDomain); |
|
Uint32 n = (Uint32)wcslen(userDomain); |
|
for (unsigned long i = 0; i < n; i++) |
|
{ |
|
userId.append(Char16(userDomain[i])); |
|
} |
|
userId.append("\\"); |
|
//userId.append(userName); |
|
n = (Uint32)wcslen(userName); |
|
for (unsigned long i = 0; i < n; i++) |
|
{ |
|
userId.append(Char16(userName[i])); |
|
} |
|
|
|
} |
|
else |
|
{ |
|
//userId.append(userName); |
|
Uint32 n = (Uint32)wcslen(userName); |
|
for (unsigned long i = 0; i < n; i++) |
|
{ |
|
userId.append(Char16(userName[i])); |
|
} |
|
|
|
} |
|
|
|
return userId; |
|
|
|
#else //original getEffectiveUserName function |
|
|
int retcode = 0; | int retcode = 0; |
| |
// UNLEN (256) is the limit, not including null | // UNLEN (256) is the limit, not including null |
char pUserName[256+1] = {0}; |
wchar_t pUserName[256+1] = {0}; |
DWORD nSize = sizeof(pUserName); |
DWORD nSize = sizeof(pUserName)/sizeof(pUserName[0]); |
| |
retcode = GetUserName(pUserName, &nSize); |
retcode = GetUserNameW(pUserName, &nSize); |
if (retcode == 0) | if (retcode == 0) |
{ | { |
// zero is failure | // zero is failure |
return String(); | return String(); |
} | } |
|
String userId; |
|
Uint32 n = wcslen(pUserName); |
|
for (unsigned long i = 0; i < n; i++) |
|
{ |
|
userId.append(Char16(pUserName[i])); |
|
} |
| |
return String(pUserName); |
return userId; |
|
#endif |
} | } |
| |
String System::encryptPassword(const char* password, const char* salt) | String System::encryptPassword(const char* password, const char* salt) |
|
|
char pcSalt[3] = {0}; | char pcSalt[3] = {0}; |
| |
strncpy(pcSalt, salt, 2); | strncpy(pcSalt, salt, 2); |
dwByteCount = strlen(password); |
dwByteCount = (DWORD)strlen(password); |
memcpy(pbBuffer, password, dwByteCount); | memcpy(pbBuffer, password, dwByteCount); |
for (DWORD i=0; (i<dwByteCount) || (i>=PW_BUFF_LEN); i++) | for (DWORD i=0; (i<dwByteCount) || (i>=PW_BUFF_LEN); i++) |
(i%2 == 0) ? pbBuffer[i] ^= pcSalt[1] : pbBuffer[i] ^= pcSalt[0]; | (i%2 == 0) ? pbBuffer[i] ^= pcSalt[1] : pbBuffer[i] ^= pcSalt[0]; |
|
|
return String(pcSalt) + String((char *)pbBuffer); | return String(pcSalt) + String((char *)pbBuffer); |
} | } |
| |
|
String processUserName; |
|
Mutex processUserNameMut; |
|
|
Boolean System::isSystemUser(const char* userName) | Boolean System::isSystemUser(const char* userName) |
{ | { |
//ATTN: Implement this method to verify if user is vaild on the local system |
if (processUserName.size() == 0) |
// This is used in User Manager |
{ |
|
// Lock and recheck the processUserName length in case two threads |
|
// enter this block simultaneously |
|
AutoMutex mut(processUserNameMut); |
|
if (processUserName.size() == 0) |
|
{ |
|
processUserName = getEffectiveUserName(); |
|
} |
|
} |
|
if (processUserName == userName) |
|
{ |
return true; | return true; |
} | } |
| |
Boolean System::isPrivilegedUser(const String userName) |
Boolean isSystemUser = false; |
|
|
|
char mUserName[UNLEN+1]; |
|
char mDomainName[UNLEN+1]; |
|
char tUserName[UNLEN+1]; |
|
wchar_t wUserName[UNLEN+1]; |
|
wchar_t wDomainName[UNLEN+1]; |
|
char* pbs; |
|
bool usingDomain = false; |
|
|
|
LPBYTE pComputerName=NULL; |
|
DWORD dwLevel = 1; |
|
LPUSER_INFO_1 pUserInfo = NULL; |
|
NET_API_STATUS nStatus = NULL; |
|
|
|
// Make a copy of the specified username, it cannot be used directly |
|
// because it's declared as const and strchr() may modify the string. |
|
strncpy(tUserName, userName, sizeof(tUserName) - 1); |
|
tUserName[sizeof(tUserName)- 1] = '\0'; |
|
|
|
//separate the domain and user name if both are present. |
|
if (NULL != (pbs = strchr(tUserName, '\\'))) |
|
{ |
|
*pbs = '\0'; |
|
strcpy(mDomainName, tUserName); |
|
strcpy(mUserName, pbs+1); |
|
usingDomain = true; |
|
|
|
} |
|
else if ((NULL != (pbs = (strchr(tUserName, '@')))) || |
|
(NULL != (pbs = (strchr(tUserName, '.'))))) |
|
{ |
|
*pbs = '\0'; |
|
strcpy(mDomainName, pbs+1); |
|
strcpy(mUserName, tUserName); |
|
usingDomain = true; |
|
|
|
} |
|
else |
{ | { |
// ATTN: Implement this method to verify if user executing the current |
strcpy(mDomainName, "."); |
// command is a priviliged user, when user name is not passed as |
strcpy(mUserName, tUserName); |
// as argument. If user name is passed the function checks |
} |
// whether the given user is a priviliged user. |
|
// This is used in cimuser CLI and CIMOperationRequestAuthorizer |
//convert domain name to unicode |
return true; |
if (!MultiByteToWideChar( |
|
CP_ACP, 0, mDomainName, -1, wDomainName, |
|
(int)(strlen(mDomainName) + 1))) |
|
{ |
|
return false; |
|
} |
|
|
|
//convert username to unicode |
|
if (!MultiByteToWideChar( |
|
CP_ACP, 0, mUserName, -1, wUserName, (int)(strlen(mUserName) + 1))) |
|
{ |
|
return false; |
|
} |
|
|
|
if (usingDomain) |
|
{ |
|
//get domain controller |
|
DWORD rc = NetGetDCName(NULL, wDomainName, &pComputerName); |
|
if (rc == NERR_Success) |
|
{ |
|
// this is automatically prefixed with "\\" |
|
wcscpy(wDomainName, (LPWSTR) pComputerName); |
|
} |
|
/* |
|
else |
|
{ |
|
// failover |
|
// ATTN: This is commented out until there is resolution on |
|
// Bugzilla 2236. -hns 2/2005 |
|
// This needs to be more thoroughly tested when we uncomment it out. |
|
|
|
PDOMAIN_CONTROLLER_INFO DomainControllerInfo = NULL; |
|
|
|
//this function does not take wide strings |
|
rc = DsGetDcName(NULL, |
|
mDomainName, |
|
NULL, |
|
NULL, |
|
//not sure what flags we want here |
|
DS_DIRECTORY_SERVICE_REQUIRED, |
|
&DomainControllerInfo); |
|
|
|
if (rc == ERROR_SUCCESS && DomainControllerInfo) |
|
{ |
|
strcpy(mDomainName, DomainControllerInfo->DomainName); |
|
NetApiBufferFree(DomainControllerInfo); |
|
|
|
if (!MultiByteToWideChar( |
|
CP_ACP, 0, mDomainName, -1, wDomainName, |
|
strlen(mDomainName) + 1)) |
|
{ |
|
return false; |
|
} |
|
} |
|
} |
|
*/ |
|
} |
|
|
|
//get user info |
|
nStatus = NetUserGetInfo(wDomainName, |
|
wUserName, |
|
dwLevel, |
|
(LPBYTE *)&pUserInfo); |
|
|
|
if (nStatus == NERR_Success) |
|
{ |
|
isSystemUser = true; |
|
} |
|
|
|
if (pComputerName != NULL) |
|
{ |
|
NetApiBufferFree(pComputerName); |
|
} |
|
|
|
if (pUserInfo != NULL) |
|
{ |
|
NetApiBufferFree(pUserInfo); |
|
} |
|
|
|
return isSystemUser; |
|
} |
|
|
|
|
|
Boolean System::isPrivilegedUser(const String& userName) |
|
{ |
|
Boolean isPrivileged = false; |
|
|
|
char mUserName[UNLEN+1]; |
|
char mDomainName[UNLEN+1]; |
|
wchar_t wUserName[UNLEN+1]; |
|
wchar_t wDomainName[UNLEN+1]; |
|
char* pbs; |
|
char userStr[UNLEN+1]; |
|
bool usingDomain = false; |
|
|
|
LPBYTE pComputerName=NULL; |
|
DWORD dwLevel = 1; |
|
LPUSER_INFO_1 pUserInfo = NULL; |
|
NET_API_STATUS nStatus = NULL; |
|
|
|
//get the username in the correct format |
|
strcpy(userStr, (const char*)userName.getCString()); |
|
|
|
//separate the domain and user name if both are present. |
|
if (NULL != (pbs = strchr(userStr, '\\'))) |
|
{ |
|
*pbs = '\0'; |
|
strcpy(mDomainName, userStr); |
|
strcpy(mUserName, pbs+1); |
|
usingDomain = true; |
|
|
|
} |
|
else if ((NULL != (pbs = (strchr(userStr, '@')))) || |
|
(NULL != (pbs = (strchr(userStr, '.'))))) |
|
{ |
|
*pbs = '\0'; |
|
strcpy(mDomainName, pbs+1); |
|
strcpy(mUserName, userStr); |
|
usingDomain = true; |
|
|
|
} |
|
else |
|
{ |
|
strcpy(mDomainName, "."); |
|
strcpy(mUserName, userStr); |
|
} |
|
|
|
//convert domain name to unicode |
|
if (!MultiByteToWideChar( |
|
CP_ACP, 0, mDomainName, -1, wDomainName, |
|
(int)(strlen(mDomainName) + 1))) |
|
{ |
|
return false; |
|
} |
|
|
|
//convert username to unicode |
|
if (!MultiByteToWideChar( |
|
CP_ACP, 0, mUserName, -1, wUserName, (int)(strlen(mUserName) + 1))) |
|
{ |
|
return false; |
|
} |
|
|
|
if (usingDomain) |
|
{ |
|
//get domain controller |
|
DWORD rc = NetGetDCName(NULL, wDomainName, &pComputerName); |
|
if (rc == NERR_Success) |
|
{ |
|
// this is automatically prefixed with "\\" |
|
wcscpy(wDomainName, (LPWSTR) pComputerName); |
|
} |
|
/* |
|
else |
|
{ |
|
// failover |
|
// ATTN: This is commented out until there is resolution on |
|
// Bugzilla 2236. -hns 2/2005 |
|
// This needs to be more thoroughly tested when we uncomment it out. |
|
|
|
PDOMAIN_CONTROLLER_INFO DomainControllerInfo = NULL; |
|
|
|
//this function does not take wide strings |
|
rc = DsGetDcName(NULL, |
|
mDomainName, |
|
NULL, |
|
NULL, |
|
// not sure what flags we want here |
|
DS_DIRECTORY_SERVICE_REQUIRED, |
|
&DomainControllerInfo); |
|
|
|
if (rc == ERROR_SUCCESS && DomainControllerInfo) |
|
{ |
|
strcpy(mDomainName, DomainControllerInfo->DomainName); |
|
NetApiBufferFree(DomainControllerInfo); |
|
|
|
if (!MultiByteToWideChar( |
|
CP_ACP, 0, mDomainName, -1, wDomainName, |
|
strlen(mDomainName) + 1)) |
|
{ |
|
return false; |
|
} |
|
} |
|
} |
|
*/ |
|
} |
|
|
|
//get privileges |
|
nStatus = NetUserGetInfo(wDomainName, |
|
wUserName, |
|
dwLevel, |
|
(LPBYTE *)&pUserInfo); |
|
|
|
if ((nStatus == NERR_Success) && |
|
(pUserInfo != NULL) && |
|
(pUserInfo->usri1_priv == USER_PRIV_ADMIN)) |
|
{ |
|
isPrivileged = true; |
|
} |
|
|
|
if (pComputerName != NULL) |
|
{ |
|
NetApiBufferFree(pComputerName); |
|
} |
|
|
|
if (pUserInfo != NULL) |
|
{ |
|
NetApiBufferFree(pUserInfo); |
|
} |
|
|
|
return isPrivileged; |
} | } |
| |
String System::getPrivilegedUserName() | String System::getPrivilegedUserName() |
|
|
// ATTN-NB-03-20000304: Implement better way to get the privileged | // ATTN-NB-03-20000304: Implement better way to get the privileged |
// user on the system. | // user on the system. |
| |
return (String("Administrator")); |
return String("Administrator"); |
|
} |
|
|
|
Boolean System::isGroupMember(const char* userName, const char* groupName) |
|
{ |
|
Boolean retVal = false; |
|
|
|
LPLOCALGROUP_USERS_INFO_0 pBuf = NULL; |
|
DWORD dwLevel = 0; |
|
DWORD dwFlags = LG_INCLUDE_INDIRECT ; |
|
DWORD dwPrefMaxLen = MAX_PREFERRED_LENGTH; |
|
DWORD dwEntriesRead = 0; |
|
DWORD dwTotalEntries = 0; |
|
NET_API_STATUS nStatus; |
|
wchar_t wcUserName[UNLEN+1]; |
|
wchar_t wcGroupName[UNLEN+1]; |
|
|
|
//Convert user name to unicode |
|
if (!MultiByteToWideChar(CP_ACP,0,userName, -1, wcUserName, |
|
strlen(userName)+1)) |
|
{ |
|
return false; |
|
} |
|
|
|
//Convert group name to unicode |
|
if (!MultiByteToWideChar(CP_ACP, 0, groupName, -1, wcGroupName, |
|
strlen(groupName)+1)) |
|
{ |
|
return false; |
|
} |
|
|
|
// |
|
// Call the NetUserGetLocalGroups function |
|
// specifying information level 0. |
|
// |
|
// The LG_INCLUDE_INDIRECT flag specifies that the |
|
// function should also return the names of the local |
|
// groups in which the user is indirectly a member. |
|
// |
|
nStatus = NetUserGetLocalGroups( |
|
NULL, |
|
(LPCWSTR)wcUserName, |
|
dwLevel, |
|
dwFlags, |
|
(LPBYTE *) &pBuf, |
|
dwPrefMaxLen, |
|
&dwEntriesRead, |
|
&dwTotalEntries); |
|
|
|
// |
|
// If the call succeeds, |
|
// |
|
if (nStatus == NERR_Success) |
|
{ |
|
LPLOCALGROUP_USERS_INFO_0 pTmpBuf; |
|
DWORD i; |
|
DWORD dwTotalCount = 0; |
|
|
|
if ((pTmpBuf = pBuf) != NULL) |
|
{ |
|
// |
|
// Loop through the local groups that the user belongs |
|
// and find the matching group name. |
|
// |
|
for (i = 0; i < dwEntriesRead; i++) |
|
{ |
|
// |
|
// Compare the user's group name to groupName. |
|
// |
|
|
|
if (wcscmp(pTmpBuf->lgrui0_name, wcGroupName) == 0) |
|
{ |
|
// User is a member of the group. |
|
retVal = true; |
|
break; |
|
} |
|
|
|
pTmpBuf++; |
|
dwTotalCount++; |
|
} |
|
} |
|
} |
|
|
|
// |
|
// Free the allocated memory. |
|
// |
|
if (pBuf != NULL) |
|
NetApiBufferFree(pBuf); |
|
|
|
// |
|
// If the given user and group are not found in the local group |
|
// then try on the global groups. |
|
// |
|
if (!retVal) |
|
{ |
|
LPGROUP_USERS_INFO_0 pBuf = NULL; |
|
dwLevel = 0; |
|
dwPrefMaxLen = MAX_PREFERRED_LENGTH; |
|
dwEntriesRead = 0; |
|
dwTotalEntries = 0; |
|
|
|
// |
|
// Call the NetUserGetGroups function, specifying level 0. |
|
// |
|
nStatus = NetUserGetGroups( |
|
NULL, |
|
(LPCWSTR)wcUserName, |
|
dwLevel, |
|
(LPBYTE*)&pBuf, |
|
dwPrefMaxLen, |
|
&dwEntriesRead, |
|
&dwTotalEntries); |
|
|
|
// |
|
// If the call succeeds, |
|
// |
|
if (nStatus == NERR_Success) |
|
{ |
|
LPGROUP_USERS_INFO_0 pTmpBuf; |
|
DWORD i; |
|
DWORD dwTotalCount = 0; |
|
|
|
if ((pTmpBuf = pBuf) != NULL) |
|
{ |
|
// |
|
// Loop through the global groups to which the user belongs |
|
// and find the matching group name. |
|
// |
|
for (i = 0; i < dwEntriesRead; i++) |
|
{ |
|
// |
|
// Compare the user's group name to groupName. |
|
// |
|
if (wcscmp(pTmpBuf->grui0_name, wcGroupName) == 0) |
|
{ |
|
// User is a member of the group. |
|
retVal = true; |
|
break; |
|
} |
|
|
|
pTmpBuf++; |
|
dwTotalCount++; |
|
} |
|
} |
|
} |
|
|
|
// |
|
// Free the allocated buffer. |
|
// |
|
if (pBuf != NULL) |
|
NetApiBufferFree(pBuf); |
|
} |
|
|
|
return retVal; |
|
} |
|
|
|
Boolean System::lookupUserId( |
|
const char* userName, |
|
PEGASUS_UID_T& uid, |
|
PEGASUS_GID_T& gid) |
|
{ |
|
// ATTN: Implement this method to look up the specified user |
|
return false; |
|
} |
|
|
|
Boolean System::changeUserContext_SingleThreaded( |
|
const char* userName, |
|
const PEGASUS_UID_T& uid, |
|
const PEGASUS_GID_T& gid) |
|
{ |
|
// ATTN: Implement this method to change the process user context to the |
|
// specified user |
|
return false; |
} | } |
| |
Uint32 System::getPID() | Uint32 System::getPID() |
|
|
const char* path, | const char* path, |
size_t newSize) | size_t newSize) |
{ | { |
int fd = open(path, O_RDWR); |
|
| |
if (fd == -1) |
Boolean rv = false; |
return false; |
int fd = open(path, O_RDWR); |
|
if (fd != -1) |
if (chsize(fd, newSize) != 0) |
{ |
return false; |
if (chsize(fd, (long)newSize) == 0) |
|
{ |
|
rv = true; |
|
} |
| |
close(fd); | close(fd); |
return true; |
} |
|
|
|
return rv; |
} | } |
| |
// Is absolute path? | // Is absolute path? |
|
|
path_slash[_MAX_PATH-1] = '\0'; | path_slash[_MAX_PATH-1] = '\0'; |
| |
for(p = path_slash; p < path_slash + strlen(path_slash); p++) | for(p = path_slash; p < path_slash + strlen(path_slash); p++) |
if (*p == '/') *p = '\\'; |
if (*p == '/') |
|
*p = '\\'; |
| |
return (strcasecmp(_fullpath( full, path_slash, _MAX_PATH ), path_slash) == 0) ? true : false; |
return (strcasecmp( |
|
_fullpath(full, path_slash, _MAX_PATH), path_slash) == 0); |
} | } |
| |
void System::openlog(const String ident) |
// Changes file permissions on the given file. |
|
Boolean System::changeFilePermissions(const char* path, mode_t mode) |
{ | { |
return; |
// ATTN: File permissions are not currently defined in Windows |
|
return true; |
} | } |
| |
void System::syslog(Uint32 severity, const char *data) |
Boolean System::verifyFileOwnership(const char* path) |
{ | { |
return; |
// ATTN: Implement this to check that the owner of the specified file is |
|
// the same as the effective user for this process. |
|
return true; |
|
} |
|
|
|
void System::syslog(const String& ident, Uint32 severity, const char* message) |
|
{ |
|
// Not implemented |
|
} |
|
|
|
void System::openlog(const char *ident, int logopt, int facility) |
|
{ |
|
// Not implemented |
} | } |
| |
void System::closelog() | void System::closelog() |
{ | { |
return; |
// Not implemented |
} | } |
| |
|
|
|
|
// System ID constants for Logger::put and Logger::trace | // System ID constants for Logger::put and Logger::trace |
const String System::CIMSERVER = "cimserver"; // Server system ID | const String System::CIMSERVER = "cimserver"; // Server system ID |
| |
|
// check if a given IP address is defined on the local network interfaces |
|
Boolean System::isIpOnNetworkInterface(Uint32 inIP) |
|
{ |
|
SOCKET sock; |
|
int interfaces = 0; |
|
int errcode; |
|
|
|
if ( SOCKET_ERROR != ( sock = WSASocket(AF_INET, |
|
SOCK_RAW, 0, NULL, 0, 0) ) ) |
|
{ |
|
unsigned long *bytes_returned=0; |
|
char *output_buf = (char *)calloc(1, 256); |
|
int buf_size = 256; |
|
|
|
if ( 0 == (errcode = WSAIoctl(sock, |
|
SIO_ADDRESS_LIST_QUERY, |
|
NULL, |
|
0, |
|
output_buf, |
|
256, |
|
bytes_returned, |
|
NULL, |
|
NULL)) ) |
|
{ |
|
SOCKET_ADDRESS_LIST *addr_list; |
|
SOCKET_ADDRESS *addr; |
|
Uint32 ip; |
|
struct sockaddr_in *sin; |
|
|
|
addr_list = (SOCKET_ADDRESS_LIST *)output_buf; |
|
addr = addr_list->Address; |
|
|
|
sin = (struct sockaddr_in *)addr->lpSockaddr; |
|
|
|
for ( ; interfaces < addr_list->iAddressCount; interfaces++) |
|
{ |
|
ip = sin->sin_addr.s_addr; |
|
addr++; |
|
sin = (struct sockaddr_in *)addr->lpSockaddr; |
|
if (ip == inIP) |
|
{ |
|
free(output_buf); |
|
closesocket(sock); |
|
return true; |
|
} |
|
} |
|
} |
|
else |
|
{ |
|
free(output_buf); |
|
return false; |
|
} |
|
free(output_buf); |
|
closesocket(sock); |
|
} |
|
return false; |
|
} |
|
|
|
#ifdef PEGASUS_ENABLE_IPV6 |
|
void _getInterfaceAddrs(Array<String> &ips, int af) |
|
{ |
|
SOCKET sock; |
|
|
|
if (INVALID_SOCKET != (sock = WSASocket(af, SOCK_RAW, |
|
0, NULL, 0, 0))) |
|
{ |
|
DWORD bytesReturned; |
|
char buf[2048]; |
|
int interfaces = 0; |
|
char str[PEGASUS_INET6_ADDRSTR_LEN]; |
|
void *p; |
|
if (0 == WSAIoctl(sock, SIO_ADDRESS_LIST_QUERY, NULL, 0, |
|
buf, 2048, &bytesReturned, NULL, |
|
NULL)) |
|
{ |
|
|
|
SOCKET_ADDRESS_LIST *addr_list; |
|
SOCKET_ADDRESS *addr; |
|
struct sockaddr *sin; |
|
addr_list = (SOCKET_ADDRESS_LIST *)buf; |
|
addr = addr_list->Address; |
|
for (sin = (struct sockaddr *) addr->lpSockaddr ; |
|
interfaces < addr_list->iAddressCount; |
|
interfaces++) |
|
{ |
|
if (af == AF_INET) |
|
{ |
|
p = &((struct sockaddr_in*)sin)->sin_addr; |
|
} |
|
else |
|
{ |
|
p = &((struct sockaddr_in6*)sin)->sin6_addr; |
|
} |
|
// Don't gather loopback addrs |
|
if (!System::isLoopBack(af, p)) |
|
{ |
|
HostAddress::convertBinaryToText(af, p, str, sizeof(str)); |
|
ips.append(str); |
|
} |
|
addr++; |
|
sin = (struct sockaddr*)addr->lpSockaddr; |
|
} |
|
} |
|
} |
|
} |
|
#endif |
|
|
|
Array<String> System::getInterfaceAddrs() |
|
{ |
|
Array<String> ips; |
|
|
|
#ifdef PEGASUS_ENABLE_IPV6 |
|
_getInterfaceAddrs(ips, AF_INET); |
|
_getInterfaceAddrs(ips, AF_INET6); |
|
#endif |
|
|
|
return ips; |
|
} |
|
|
|
String System::getErrorMSG_NLS(int errorCode,int errorCode2) |
|
{ |
|
LPVOID winErrorMsg = NULL; |
|
|
|
if (FormatMessage( |
|
FORMAT_MESSAGE_ALLOCATE_BUFFER | |
|
FORMAT_MESSAGE_FROM_SYSTEM | |
|
FORMAT_MESSAGE_IGNORE_INSERTS, |
|
NULL, |
|
errorCode, |
|
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), |
|
(LPTSTR)&winErrorMsg, |
|
0, |
|
NULL)) |
|
{ |
|
MessageLoaderParms parms( |
|
"Common.System.ERROR_MESSAGE.STANDARD", |
|
"$0 (error code $1)",(char*)winErrorMsg,errorCode); |
|
LocalFree(winErrorMsg); |
|
return MessageLoader::getMessage(parms); |
|
} |
|
|
|
MessageLoaderParms parms( |
|
"Common.System.ERROR_MESSAGE.STANDARD", |
|
"$0 (error code $1)","",errorCode); |
|
return MessageLoader::getMessage(parms); |
|
|
|
} |
|
|
|
String System::getErrorMSG(int errorCode,int errorCode2) |
|
{ |
|
|
|
String buffer; |
|
LPVOID winErrorMsg = NULL; |
|
|
|
char strErrorCode[32]; |
|
sprintf(strErrorCode, "%d", errorCode); |
|
|
|
if (FormatMessage( |
|
FORMAT_MESSAGE_ALLOCATE_BUFFER | |
|
FORMAT_MESSAGE_FROM_SYSTEM | |
|
FORMAT_MESSAGE_IGNORE_INSERTS, |
|
NULL, |
|
errorCode, |
|
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), |
|
(LPTSTR)&winErrorMsg, |
|
0, |
|
NULL)) |
|
{ |
|
buffer.append((char*)winErrorMsg); |
|
LocalFree(winErrorMsg); |
|
} |
|
|
|
buffer.append(" (error code "); |
|
buffer.append(strErrorCode); |
|
buffer.append(")"); |
|
|
|
return buffer; |
|
} |
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////// |
|
// AutoFileLock class |
|
/////////////////////////////////////////////////////////////////////////////// |
|
|
|
AutoFileLock::AutoFileLock(const char* fileName) |
|
{ |
|
// Repeat createFile, if there is a sharing violation. |
|
do |
|
{ |
|
_hFile = CreateFile (fileName, GENERIC_READ | GENERIC_WRITE, 0, NULL, |
|
OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL); |
|
}while ((GetLastError() == ERROR_SHARING_VIOLATION)); |
|
|
|
// If this conditon succeeds, There is an error opening the file. Hence |
|
// returning from here as Lock can not be acquired. |
|
if((_hFile == INVALID_HANDLE_VALUE) |
|
&& (GetLastError() != ERROR_ALREADY_EXISTS) |
|
&& (GetLastError() != ERROR_SUCCESS)) |
|
{ |
|
PEG_TRACE((TRC_DISCARDED_DATA, Tracer::LEVEL1, |
|
"AutoFileLock: Failed to open lock file '%s', error code %d.", |
|
fileName, GetLastError())); |
|
return; |
|
} |
|
|
|
OVERLAPPED l={0,0,0,0,0}; |
|
if(LockFileEx(_hFile,LOCKFILE_EXCLUSIVE_LOCK, 0, 0, 0, &l) == 0) |
|
{ |
|
PEG_TRACE((TRC_DISCARDED_DATA, Tracer::LEVEL1, |
|
"AutoFileLock: Failed to Acquire lock on file %s, error code %d.", |
|
fileName, GetLastError())); |
|
CloseHandle(_hFile); |
|
_hFile = INVALID_HANDLE_VALUE; |
|
} |
|
} |
|
|
|
AutoFileLock::~AutoFileLock() |
|
{ |
|
if(_hFile != INVALID_HANDLE_VALUE) |
|
{ |
|
OVERLAPPED l={0,0,0,0,0}; |
|
if(UnlockFileEx (_hFile, 0, 0, 0, &l) == 0) |
|
{ |
|
PEG_TRACE((TRC_DISCARDED_DATA, Tracer::LEVEL2, |
|
"AutoFileLock: Failed to unlock file, error code %d.", |
|
GetLastError())); |
|
} |
|
CloseHandle(_hFile); |
|
} |
|
} |
|
|
|
|
PEGASUS_NAMESPACE_END | PEGASUS_NAMESPACE_END |