diff options
author | Jan Cholasta <jcholast@redhat.com> | 2012-09-25 04:27:38 -0400 |
---|---|---|
committer | Jakub Hrozek <jhrozek@redhat.com> | 2012-10-05 10:51:54 +0200 |
commit | 2d6836a90bd326391782a5753f70e8ba666b5def (patch) | |
tree | b69421bd93196be2779fe58684c5f6b8a1a90496 /src/responder/ssh | |
parent | 67ca9e7c006d8619f446c018eabf29eab1368ba5 (diff) | |
download | sssd-2d6836a90bd326391782a5753f70e8ba666b5def.tar.gz sssd-2d6836a90bd326391782a5753f70e8ba666b5def.tar.xz sssd-2d6836a90bd326391782a5753f70e8ba666b5def.zip |
SSH: Refactor sysdb and related code
Diffstat (limited to 'src/responder/ssh')
-rw-r--r-- | src/responder/ssh/sshsrv_cmd.c | 122 | ||||
-rw-r--r-- | src/responder/ssh/sshsrv_private.h | 3 |
2 files changed, 52 insertions, 73 deletions
diff --git a/src/responder/ssh/sshsrv_cmd.c b/src/responder/ssh/sshsrv_cmd.c index 6c10967e2..a47894bfe 100644 --- a/src/responder/ssh/sshsrv_cmd.c +++ b/src/responder/ssh/sshsrv_cmd.c @@ -235,17 +235,14 @@ ssh_user_pubkeys_search_next(struct ssh_cmd_ctx *cmd_ctx) return EIO; } - cmd_ctx->results = res->msgs; - cmd_ctx->results_len = res->count; - - if (cmd_ctx->results_len > 1) { + if (res->count > 1) { DEBUG(SSSDBG_FATAL_FAILURE, ("User search by name (%s) returned > 1 results!\n", cmd_ctx->name)); - return ENOENT; + return EINVAL; } - if (cmd_ctx->results_len == 0) { + if (!res->count) { /* if a multidomain search, try with next */ if (cmd_ctx->check_next) { cmd_ctx->domain = cmd_ctx->domain->next; @@ -258,6 +255,8 @@ ssh_user_pubkeys_search_next(struct ssh_cmd_ctx *cmd_ctx) return ENOENT; } + cmd_ctx->result = res->msgs[0]; + /* one result found */ return EOK; } @@ -360,23 +359,15 @@ ssh_host_pubkeys_search_next(struct ssh_cmd_ctx *cmd_ctx) return EFAULT; } - ret = sysdb_search_ssh_hosts(cmd_ctx, sysdb, - cmd_ctx->name, attrs, - &cmd_ctx->results, &cmd_ctx->results_len); + ret = sysdb_get_ssh_host(cmd_ctx, sysdb, cmd_ctx->name, attrs, + &cmd_ctx->result); if (ret != EOK && ret != ENOENT) { DEBUG(SSSDBG_CRIT_FAILURE, ("Failed to make request to our cache!\n")); return EIO; } - if (cmd_ctx->results_len > 1) { - DEBUG(SSSDBG_FATAL_FAILURE, - ("Host search by name (%s) returned > 1 results!\n", - cmd_ctx->name)); - return ENOENT; - } - - if (cmd_ctx->results_len == 0) { + if (ret == ENOENT) { /* if a multidomain search, try with next */ if (cmd_ctx->check_next) { cmd_ctx->domain = cmd_ctx->domain->next; @@ -601,8 +592,8 @@ ssh_host_pubkeys_update_known_hosts(struct ssh_cmd_ctx *cmd_ctx) goto done; } - ret = sysdb_search_ssh_hosts(tmp_ctx, sysdb, "*", attrs, - &hosts, &num_hosts); + ret = sysdb_get_ssh_known_hosts(tmp_ctx, sysdb, attrs, + &hosts, &num_hosts); if (ret != EOK) { if (ret != ENOENT) { DEBUG(SSSDBG_OP_FAILURE, @@ -741,8 +732,7 @@ ssh_cmd_build_reply(struct ssh_cmd_ctx *cmd_ctx) uint8_t *body; size_t body_len; size_t c = 0; - size_t i; - unsigned int j; + unsigned int i; struct ldb_message_element *el; uint32_t count = 0; const char *name; @@ -758,14 +748,9 @@ ssh_cmd_build_reply(struct ssh_cmd_ctx *cmd_ctx) return ret; } - /* count number of results */ - for (i = 0; i < cmd_ctx->results_len; i++) { - el = ldb_msg_find_element(cmd_ctx->results[i], SYSDB_SSH_PUBKEY); - if (!el) { - continue; - } - - count += el->num_values; + el = ldb_msg_find_element(cmd_ctx->result, SYSDB_SSH_PUBKEY); + if (el) { + count = el->num_values; } ret = sss_packet_grow(cctx->creq->out, 2*sizeof(uint32_t)); @@ -777,55 +762,50 @@ ssh_cmd_build_reply(struct ssh_cmd_ctx *cmd_ctx) SAFEALIGN_SET_UINT32(body+c, count, &c); SAFEALIGN_SET_UINT32(body+c, 0, &c); - for (i = 0; i < cmd_ctx->results_len; i++) { - name = ldb_msg_find_attr_as_string(cmd_ctx->results[i], - SYSDB_NAME, NULL); - if (!name) { - DEBUG(SSSDBG_OP_FAILURE, - ("Got unnamed result for [%s@%s]\n", - cmd_ctx->name, cmd_ctx->domain->name)); - return ENOENT; - } - - fqname = talloc_asprintf(cmd_ctx, "%s@%s", - name, cmd_ctx->domain->name); - if (!fqname) { - return ENOMEM; - } - - fqname_len = strlen(fqname)+1; + if (!el) { + return EOK; + } - el = ldb_msg_find_element(cmd_ctx->results[i], SYSDB_SSH_PUBKEY); - if (!el) { - /* this object has no SSH public keys */ - continue; - } + name = ldb_msg_find_attr_as_string(cmd_ctx->result, SYSDB_NAME, NULL); + if (!name) { + DEBUG(SSSDBG_OP_FAILURE, + ("Got unnamed result for [%s@%s]\n", + cmd_ctx->name, cmd_ctx->domain->name)); + return ENOENT; + } - for (j = 0; j < el->num_values; j++) { - key = sss_base64_decode(cmd_ctx, - (const char *)el->values[j].data, - &key_len); - if (!key) { - return ENOMEM; - } + fqname = talloc_asprintf(cmd_ctx, "%s@%s", + name, cmd_ctx->domain->name); + if (!fqname) { + return ENOMEM; + } - ret = sss_packet_grow(cctx->creq->out, - 3*sizeof(uint32_t) + key_len + fqname_len); - if (ret != EOK) { - talloc_free(key); - return ret; - } - sss_packet_get_body(cctx->creq->out, &body, &body_len); + fqname_len = strlen(fqname)+1; - SAFEALIGN_SET_UINT32(body+c, 0, &c); - SAFEALIGN_SET_UINT32(body+c, fqname_len, &c); - safealign_memcpy(body+c, fqname, fqname_len, &c); - SAFEALIGN_SET_UINT32(body+c, key_len, &c); - safealign_memcpy(body+c, key, key_len, &c); + for (i = 0; i < el->num_values; i++) { + key = sss_base64_decode(cmd_ctx, + (const char *)el->values[i].data, + &key_len); + if (!key) { + return ENOMEM; + } + ret = sss_packet_grow(cctx->creq->out, + 3*sizeof(uint32_t) + key_len + fqname_len); + if (ret != EOK) { talloc_free(key); - count++; + return ret; } + sss_packet_get_body(cctx->creq->out, &body, &body_len); + + SAFEALIGN_SET_UINT32(body+c, 0, &c); + SAFEALIGN_SET_UINT32(body+c, fqname_len, &c); + safealign_memcpy(body+c, fqname, fqname_len, &c); + SAFEALIGN_SET_UINT32(body+c, key_len, &c); + safealign_memcpy(body+c, key, key_len, &c); + + talloc_free(key); + count++; } return EOK; diff --git a/src/responder/ssh/sshsrv_private.h b/src/responder/ssh/sshsrv_private.h index e63a3105c..e228af4ad 100644 --- a/src/responder/ssh/sshsrv_private.h +++ b/src/responder/ssh/sshsrv_private.h @@ -44,8 +44,7 @@ struct ssh_cmd_ctx { struct sss_domain_info *domain; bool check_next; - struct ldb_message **results; - size_t results_len; + struct ldb_message *result; }; struct sss_cmd_table *get_ssh_cmds(void); |