2 Unix SMB/Netbios implementation.
4 MSDfs services for Samba
5 Copyright (C) Shirish Kalele 2000
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #define DBGC_CLASS DBGC_MSDFS
26 extern uint32 global_client_caps;
28 /**********************************************************************
29 Parse the pathname of the form \hostname\service\reqpath
30 into the dfs_path structure
31 **********************************************************************/
33 static BOOL parse_dfs_path(const char *pathname, struct dfs_path *pdp)
35 pstring pathname_local;
38 pstrcpy(pathname_local,pathname);
39 p = temp = pathname_local;
43 trim_char(temp,'\\','\\');
44 DEBUG(10,("temp in parse_dfs_path: .%s. after trimming \\'s\n",temp));
47 /* parse out hostname */
48 p = strchr_m(temp,'\\');
53 pstrcpy(pdp->hostname,temp);
54 DEBUG(10,("parse_dfs_path: hostname: %s\n",pdp->hostname));
56 /* parse out servicename */
58 p = strchr_m(temp,'\\');
60 pstrcpy(pdp->servicename,temp);
61 pdp->reqpath[0] = '\0';
65 pstrcpy(pdp->servicename,temp);
66 DEBUG(10,("parse_dfs_path: servicename: %s\n",pdp->servicename));
69 check_path_syntax(pdp->reqpath, p+1);
71 DEBUG(10,("parse_dfs_path: rest of the path: %s\n",pdp->reqpath));
75 /**********************************************************************
76 Parse the pathname of the form /hostname/service/reqpath
77 into the dfs_path structure
78 This code is dependent on the fact that check_path_syntax() will
79 convert '\\' characters to '/'.
80 When POSIX pathnames have been selected this doesn't happen, so we
81 must look for the unaltered separator of '\\' instead of the modified '/'.
83 **********************************************************************/
85 static BOOL parse_processed_dfs_path(char* pathname, struct dfs_path *pdp, BOOL allow_wcards)
87 pstring pathname_local;
89 const char sepchar = lp_posix_pathnames() ? '\\' : '/';
91 pstrcpy(pathname_local,pathname);
92 p = temp = pathname_local;
96 trim_char(temp,sepchar,sepchar);
97 DEBUG(10,("temp in parse_processed_dfs_path: .%s. after trimming \\'s\n",temp));
100 /* parse out hostname */
101 p = strchr_m(temp,sepchar);
106 pstrcpy(pdp->hostname,temp);
107 DEBUG(10,("parse_processed_dfs_path: hostname: %s\n",pdp->hostname));
109 /* parse out servicename */
111 p = strchr_m(temp,sepchar);
113 pstrcpy(pdp->servicename,temp);
114 pdp->reqpath[0] = '\0';
118 pstrcpy(pdp->servicename,temp);
119 DEBUG(10,("parse_processed_dfs_path: servicename: %s\n",pdp->servicename));
121 /* rest is reqpath */
123 BOOL path_contains_wcard;
124 check_path_syntax_wcard(pdp->reqpath, p+1, &path_contains_wcard);
126 check_path_syntax(pdp->reqpath, p+1);
129 DEBUG(10,("parse_processed_dfs_path: rest of the path: %s\n",pdp->reqpath));
133 /********************************************************
134 Fake up a connection struct for the VFS layer.
135 Note this CHANGES CWD !!!! JRA.
136 *********************************************************/
138 static BOOL create_conn_struct(connection_struct *conn, int snum, char *path)
144 pstrcpy(connpath, path);
145 pstring_sub(connpath , "%S", lp_servicename(snum));
147 /* needed for smbd_vfs_init() */
149 if ( (conn->mem_ctx=talloc_init("connection_struct")) == NULL ) {
150 DEBUG(0,("talloc_init(connection_struct) failed!\n"));
154 if (!(conn->params = TALLOC_P(conn->mem_ctx, struct share_params))) {
155 DEBUG(0, ("TALLOC failed\n"));
159 conn->params->service = snum;
161 set_conn_connectpath(conn, connpath);
163 if (!smbd_vfs_init(conn)) {
164 DEBUG(0,("create_conn_struct: smbd_vfs_init failed.\n"));
165 conn_free_internal(conn);
170 * Windows seems to insist on doing trans2getdfsreferral() calls on the IPC$
171 * share as the anonymous user. If we try to chdir as that user we will
172 * fail.... WTF ? JRA.
175 if (vfs_ChDir(conn,conn->connectpath) != 0) {
176 DEBUG(3,("create_conn_struct: Can't ChDir to new conn path %s. Error was %s\n",
177 conn->connectpath, strerror(errno) ));
178 conn_free_internal(conn);
185 /**********************************************************************
186 Parse the contents of a symlink to verify if it is an msdfs referral
187 A valid referral is of the form: msdfs:server1\share1,server2\share2
188 talloc CTX can be NULL here if preflist and refcount pointers are null.
189 **********************************************************************/
191 static BOOL parse_symlink(TALLOC_CTX *ctx, char *buf, struct referral **preflist, int *refcount)
195 char *alt_path[MAX_REFERRAL_COUNT];
197 struct referral *reflist;
201 prot = strtok(temp,":");
203 if (!strequal(prot, "msdfs")) {
207 /* No referral list requested. Just yes/no. */
213 DEBUG(0,("parse_symlink: logic error. TALLOC_CTX should not be null.\n"));
217 /* parse out the alternate paths */
218 while((count<MAX_REFERRAL_COUNT) &&
219 ((alt_path[count] = strtok(NULL,",")) != NULL)) {
223 DEBUG(10,("parse_symlink: count=%d\n", count));
225 reflist = *preflist = TALLOC_ARRAY(ctx, struct referral, count);
226 if(reflist == NULL) {
227 DEBUG(0,("parse_symlink: talloc failed!\n"));
231 for(i=0;i<count;i++) {
234 /* replace all /'s in the alternate path by a \ */
235 for(p = alt_path[i]; *p && ((p = strchr_m(p,'/'))!=NULL); p++) {
239 /* Remove leading '\\'s */
241 while (*p && (*p == '\\')) {
245 pstrcpy(reflist[i].alternate_path, "\\");
246 pstrcat(reflist[i].alternate_path, p);
247 reflist[i].proximity = 0;
248 reflist[i].ttl = REFERRAL_TTL;
249 DEBUG(10, ("parse_symlink: Created alt path: %s\n", reflist[i].alternate_path));
259 /**********************************************************************
260 Returns true if the unix path is a valid msdfs symlink
261 talloc CTX can be NULL here if reflistp and refcnt pointers are null.
262 **********************************************************************/
264 BOOL is_msdfs_link(TALLOC_CTX *ctx, connection_struct *conn, char *path,
265 struct referral **reflistp, int *refcnt,
266 SMB_STRUCT_STAT *sbufp)
270 int referral_len = 0;
272 if (!path || !conn) {
280 if (SMB_VFS_LSTAT(conn, path, sbufp) != 0) {
281 DEBUG(5,("is_msdfs_link: %s does not exist.\n",path));
285 if (S_ISLNK(sbufp->st_mode)) {
286 /* open the link and read it */
287 referral_len = SMB_VFS_READLINK(conn, path, referral, sizeof(pstring)-1);
288 if (referral_len == -1) {
289 DEBUG(0,("is_msdfs_link: Error reading msdfs link %s: %s\n", path, strerror(errno)));
293 referral[referral_len] = '\0';
294 DEBUG(5,("is_msdfs_link: %s -> %s\n",path,referral));
295 if (parse_symlink(ctx, referral, reflistp, refcnt)) {
302 /*****************************************************************
303 Used by other functions to decide if a dfs path is remote,
304 and to get the list of referred locations for that remote path.
306 findfirst_flag: For findfirsts, dfs links themselves are not
307 redirected, but paths beyond the links are. For normal smb calls,
308 even dfs links need to be redirected.
310 self_referralp: clients expect a dfs referral for the same share when
311 they request referrals for dfs roots on a server.
313 consumedcntp: how much of the dfs path is being redirected. the client
314 should try the remaining path on the redirected server.
316 TALLOC_CTX can be NULL here if struct referral **reflistpp, int *refcntp
318 *****************************************************************/
320 static BOOL resolve_dfs_path(TALLOC_CTX *ctx, const char *dfspath,
322 connection_struct *conn, BOOL search_flag,
323 struct referral **reflistpp, int *refcntp,
324 BOOL *self_referralp, int *consumedcntp)
327 int consumed_level = 1;
329 SMB_STRUCT_STAT sbuf;
334 DEBUG(1,("resolve_dfs_path: NULL dfs_path* or NULL connection_struct*!\n"));
338 if (!ctx && (reflistpp || refcntp)) {
339 DEBUG(0,("resolve_dfs_path: logic error. TALLOC_CTX must not be NULL.\n"));
342 if (dp->reqpath[0] == '\0') {
343 if (self_referralp) {
344 DEBUG(6,("resolve_dfs_path: self-referral. returning False\n"));
345 *self_referralp = True;
350 DEBUG(10,("resolve_dfs_path: Conn path = %s req_path = %s\n", conn->connectpath, dp->reqpath));
352 status = unix_convert(conn, dp->reqpath, False, NULL, &sbuf);
353 /* Should we terminate on status != NT_STATUS_OK ???? */
355 /* JRA... should we strlower the last component here.... ? */
356 pstrcpy(localpath, dp->reqpath);
358 /* check if need to redirect */
359 if (is_msdfs_link(ctx, conn, localpath, reflistpp, refcntp, NULL)) {
361 DEBUG(6,("resolve_dfs_path (FindFirst) No redirection "
362 "for dfs link %s.\n", dfspath));
366 DEBUG(6,("resolve_dfs_path: %s resolves to a valid Dfs link.\n", dfspath));
368 *consumedcntp = strlen(dfspath);
373 /* redirect if any component in the path is a link */
374 pstrcpy(reqpath, dp->reqpath);
375 p = strrchr_m(reqpath, '/');
378 pstrcpy(localpath, reqpath);
379 if (is_msdfs_link(ctx, conn, localpath, reflistpp, refcntp, NULL)) {
380 DEBUG(4, ("resolve_dfs_path: Redirecting %s because parent %s is dfs link\n", dfspath, localpath));
382 /* To find the path consumed, we truncate the original
383 DFS pathname passed to use to remove the last
384 component. The length of the resulting string is
391 pstrcpy(buf, dfspath);
392 trim_char(buf, '\0', '\\');
393 for (; consumed_level; consumed_level--) {
394 q = strrchr_m(buf, '\\');
399 *consumedcntp = strlen(buf);
400 DEBUG(10, ("resolve_dfs_path: Path consumed: %s (%d)\n", buf, *consumedcntp));
405 p = strrchr_m(reqpath, '/');
412 /*****************************************************************
413 Decides if a dfs pathname should be redirected or not.
414 If not, the pathname is converted to a tcon-relative local unix path
416 search_wcard_flag: this flag performs 2 functions bother related
417 to searches. See resolve_dfs_path() and parse_processed_dfs_path()
419 *****************************************************************/
421 BOOL dfs_redirect( pstring pathname, connection_struct *conn, BOOL search_wcard_flag )
425 if (!conn || !pathname) {
429 parse_processed_dfs_path(pathname, &dp, search_wcard_flag);
431 /* if dfs pathname for a non-dfs share, convert to tcon-relative
432 path and return false */
433 if (!lp_msdfs_root(SNUM(conn))) {
434 pstrcpy(pathname, dp.reqpath);
438 if ( !( strequal(dp.servicename, lp_servicename(SNUM(conn)))
439 || ( strequal(dp.servicename, HOMES_NAME)
440 && strequal(lp_servicename(SNUM(conn)), get_current_username()) )) )
445 if (resolve_dfs_path(NULL, pathname, &dp, conn, search_wcard_flag,
446 NULL, NULL, NULL, NULL)) {
447 DEBUG(3,("dfs_redirect: Redirecting %s\n", pathname));
450 DEBUG(3,("dfs_redirect: Not redirecting %s.\n", pathname));
452 /* Form non-dfs tcon-relative path */
453 pstrcpy(pathname, dp.reqpath);
454 DEBUG(3,("dfs_redirect: Path converted to non-dfs path %s\n", pathname));
461 /**********************************************************************
462 Return a self referral.
463 **********************************************************************/
465 static BOOL self_ref(TALLOC_CTX *ctx, const char *pathname, struct junction_map *jucn,
466 int *consumedcntp, BOOL *self_referralp)
468 struct referral *ref;
470 if (self_referralp != NULL) {
471 *self_referralp = True;
474 jucn->referral_count = 1;
475 if((ref = TALLOC_P(ctx, struct referral)) == NULL) {
476 DEBUG(0,("self_ref: malloc failed for referral\n"));
480 pstrcpy(ref->alternate_path,pathname);
482 ref->ttl = REFERRAL_TTL;
483 jucn->referral_list = ref;
485 *consumedcntp = strlen(pathname);
491 /**********************************************************************
492 Gets valid referrals for a dfs path and fills up the
493 junction_map structure.
494 **********************************************************************/
496 BOOL get_referred_path(TALLOC_CTX *ctx, const char *pathname, struct junction_map *jucn,
497 int *consumedcntp, BOOL *self_referralp)
501 struct connection_struct conns;
502 struct connection_struct *conn = &conns;
506 BOOL self_referral = False;
508 if (!pathname || !jucn) {
514 if (self_referralp) {
515 *self_referralp = False;
517 self_referralp = &self_referral;
520 parse_dfs_path(pathname, &dp);
522 /* Verify hostname in path */
523 if (!is_myname_or_ipaddr(dp.hostname)) {
524 DEBUG(3, ("get_referred_path: Invalid hostname %s in path %s\n",
525 dp.hostname, pathname));
529 pstrcpy(jucn->service_name, dp.servicename);
530 pstrcpy(jucn->volume_name, dp.reqpath);
532 /* Verify the share is a dfs root */
533 snum = lp_servicenumber(jucn->service_name);
535 if ((snum = find_service(jucn->service_name)) < 0) {
540 if (!lp_msdfs_root(snum)) {
541 DEBUG(3,("get_referred_path: .%s. in dfs path %s is not a dfs root.\n",
542 dp.servicename, pathname));
547 * Self referrals are tested with a anonymous IPC connection and
548 * a GET_DFS_REFERRAL call to \\server\share. (which means dp.reqpath[0] points
549 * to an empty string). create_conn_struct cd's into the directory and will
550 * fail if it cannot (as the anonymous user). Cope with this.
553 if (dp.reqpath[0] == '\0') {
555 struct referral* ref;
557 if (*lp_msdfs_proxy(snum) == '\0') {
558 return self_ref(ctx, pathname, jucn, consumedcntp, self_referralp);
561 jucn->referral_count = 1;
562 if ((ref = TALLOC_P(ctx, struct referral)) == NULL) {
563 DEBUG(0, ("malloc failed for referral\n"));
567 pstrcpy(ref->alternate_path, lp_msdfs_proxy(snum));
568 if (dp.reqpath[0] != '\0') {
569 pstrcat(ref->alternate_path, dp.reqpath);
572 ref->ttl = REFERRAL_TTL;
573 jucn->referral_list = ref;
575 *consumedcntp = strlen(pathname);
581 pstrcpy(conn_path, lp_pathname(snum));
582 if (!create_conn_struct(conn, snum, conn_path)) {
586 /* If not remote & not a self referral, return False */
587 if (!resolve_dfs_path(ctx, pathname, &dp, conn, False,
588 &jucn->referral_list, &jucn->referral_count,
589 self_referralp, consumedcntp)) {
590 if (!*self_referralp) {
591 DEBUG(3,("get_referred_path: No valid referrals for path %s\n", pathname));
596 /* if self_referral, fill up the junction map */
597 if (*self_referralp) {
598 if (self_ref(ctx, pathname, jucn, consumedcntp, self_referralp) == False) {
607 conn_free_internal(conn);
611 static int setup_ver2_dfs_referral(char *pathname, char **ppdata,
612 struct junction_map *junction,
616 char* pdata = *ppdata;
618 unsigned char uni_requestedpath[1024];
619 int uni_reqpathoffset1,uni_reqpathoffset2;
621 int requestedpathlen=0;
626 DEBUG(10,("setting up version2 referral\nRequested path:\n"));
628 requestedpathlen = rpcstr_push(uni_requestedpath, pathname, sizeof(pstring),
632 dump_data(0, (const char *) uni_requestedpath,requestedpathlen);
635 DEBUG(10,("ref count = %u\n",junction->referral_count));
637 uni_reqpathoffset1 = REFERRAL_HEADER_SIZE +
638 VERSION2_REFERRAL_SIZE * junction->referral_count;
640 uni_reqpathoffset2 = uni_reqpathoffset1 + requestedpathlen;
642 uni_curroffset = uni_reqpathoffset2 + requestedpathlen;
644 reply_size = REFERRAL_HEADER_SIZE + VERSION2_REFERRAL_SIZE*junction->referral_count +
645 2 * requestedpathlen;
646 DEBUG(10,("reply_size: %u\n",reply_size));
648 /* add up the unicode lengths of all the referral paths */
649 for(i=0;i<junction->referral_count;i++) {
650 DEBUG(10,("referral %u : %s\n",i,junction->referral_list[i].alternate_path));
651 reply_size += (strlen(junction->referral_list[i].alternate_path)+1)*2;
654 DEBUG(10,("reply_size = %u\n",reply_size));
655 /* add the unexplained 0x16 bytes */
658 pdata = (char *)SMB_REALLOC(pdata,reply_size);
660 DEBUG(0,("malloc failed for Realloc!\n"));
665 /* copy in the dfs requested paths.. required for offset calculations */
666 memcpy(pdata+uni_reqpathoffset1,uni_requestedpath,requestedpathlen);
667 memcpy(pdata+uni_reqpathoffset2,uni_requestedpath,requestedpathlen);
669 /* create the header */
670 SSVAL(pdata,0,consumedcnt * 2); /* path consumed */
671 SSVAL(pdata,2,junction->referral_count); /* number of referral in this pkt */
673 SIVAL(pdata,4,DFSREF_REFERRAL_SERVER | DFSREF_STORAGE_SERVER);
675 SIVAL(pdata,4,DFSREF_STORAGE_SERVER);
679 /* add the referral elements */
680 for(i=0;i<junction->referral_count;i++) {
681 struct referral* ref = &junction->referral_list[i];
684 SSVAL(pdata,offset,2); /* version 2 */
685 SSVAL(pdata,offset+2,VERSION2_REFERRAL_SIZE);
687 SSVAL(pdata,offset+4,1);
689 SSVAL(pdata,offset+4,0);
691 SSVAL(pdata,offset+6,0); /* ref_flags :use path_consumed bytes? */
692 SIVAL(pdata,offset+8,ref->proximity);
693 SIVAL(pdata,offset+12,ref->ttl);
695 SSVAL(pdata,offset+16,uni_reqpathoffset1-offset);
696 SSVAL(pdata,offset+18,uni_reqpathoffset2-offset);
697 /* copy referred path into current offset */
698 unilen = rpcstr_push(pdata+uni_curroffset, ref->alternate_path,
699 sizeof(pstring), STR_UNICODE);
701 SSVAL(pdata,offset+20,uni_curroffset-offset);
703 uni_curroffset += unilen;
704 offset += VERSION2_REFERRAL_SIZE;
706 /* add in the unexplained 22 (0x16) bytes at the end */
707 memset(pdata+uni_curroffset,'\0',0x16);
711 static int setup_ver3_dfs_referral(char *pathname, char **ppdata,
712 struct junction_map *junction,
716 char* pdata = *ppdata;
718 unsigned char uni_reqpath[1024];
719 int uni_reqpathoffset1, uni_reqpathoffset2;
726 DEBUG(10,("setting up version3 referral\n"));
728 reqpathlen = rpcstr_push(uni_reqpath, pathname, sizeof(pstring), STR_TERMINATE);
731 dump_data(0, (char *) uni_reqpath,reqpathlen);
734 uni_reqpathoffset1 = REFERRAL_HEADER_SIZE + VERSION3_REFERRAL_SIZE * junction->referral_count;
735 uni_reqpathoffset2 = uni_reqpathoffset1 + reqpathlen;
736 reply_size = uni_curroffset = uni_reqpathoffset2 + reqpathlen;
738 for(i=0;i<junction->referral_count;i++) {
739 DEBUG(10,("referral %u : %s\n",i,junction->referral_list[i].alternate_path));
740 reply_size += (strlen(junction->referral_list[i].alternate_path)+1)*2;
743 pdata = (char *)SMB_REALLOC(pdata,reply_size);
745 DEBUG(0,("version3 referral setup: malloc failed for Realloc!\n"));
750 /* create the header */
751 SSVAL(pdata,0,consumedcnt * 2); /* path consumed */
752 SSVAL(pdata,2,junction->referral_count); /* number of referral */
754 SIVAL(pdata,4,DFSREF_REFERRAL_SERVER | DFSREF_STORAGE_SERVER);
756 SIVAL(pdata,4,DFSREF_STORAGE_SERVER);
759 /* copy in the reqpaths */
760 memcpy(pdata+uni_reqpathoffset1,uni_reqpath,reqpathlen);
761 memcpy(pdata+uni_reqpathoffset2,uni_reqpath,reqpathlen);
764 for(i=0;i<junction->referral_count;i++) {
765 struct referral* ref = &(junction->referral_list[i]);
768 SSVAL(pdata,offset,3); /* version 3 */
769 SSVAL(pdata,offset+2,VERSION3_REFERRAL_SIZE);
771 SSVAL(pdata,offset+4,1);
773 SSVAL(pdata,offset+4,0);
776 SSVAL(pdata,offset+6,0); /* ref_flags :use path_consumed bytes? */
777 SIVAL(pdata,offset+8,ref->ttl);
779 SSVAL(pdata,offset+12,uni_reqpathoffset1-offset);
780 SSVAL(pdata,offset+14,uni_reqpathoffset2-offset);
781 /* copy referred path into current offset */
782 unilen = rpcstr_push(pdata+uni_curroffset,ref->alternate_path,
783 sizeof(pstring), STR_UNICODE | STR_TERMINATE);
784 SSVAL(pdata,offset+16,uni_curroffset-offset);
785 /* copy 0x10 bytes of 00's in the ServiceSite GUID */
786 memset(pdata+offset+18,'\0',16);
788 uni_curroffset += unilen;
789 offset += VERSION3_REFERRAL_SIZE;
794 /******************************************************************
795 Set up the Dfs referral for the dfs pathname
796 ******************************************************************/
798 int setup_dfs_referral(connection_struct *orig_conn, char *pathname, int max_referral_level, char **ppdata)
800 struct junction_map junction;
802 BOOL self_referral = False;
805 char *pathnamep = pathname;
808 if (!(ctx=talloc_init("setup_dfs_referral"))) {
812 ZERO_STRUCT(junction);
814 /* get the junction entry */
820 /* Trim pathname sent by client so it begins with only one backslash.
821 Two backslashes confuse some dfs clients
823 while (pathnamep[0] == '\\' && pathnamep[1] == '\\') {
827 pstrcpy(buf, pathnamep);
828 /* The following call can change cwd. */
829 if (!get_referred_path(ctx, buf, &junction, &consumedcnt, &self_referral)) {
830 vfs_ChDir(orig_conn,orig_conn->connectpath);
834 vfs_ChDir(orig_conn,orig_conn->connectpath);
836 if (!self_referral) {
837 pathnamep[consumedcnt] = '\0';
839 if( DEBUGLVL( 3 ) ) {
841 dbgtext("setup_dfs_referral: Path %s to alternate path(s):",pathnamep);
842 for(i=0;i<junction.referral_count;i++)
843 dbgtext(" %s",junction.referral_list[i].alternate_path);
848 /* create the referral depeding on version */
849 DEBUG(10,("max_referral_level :%d\n",max_referral_level));
850 if(max_referral_level<2 || max_referral_level>3) {
851 max_referral_level = 2;
854 switch(max_referral_level) {
856 reply_size = setup_ver2_dfs_referral(pathnamep, ppdata, &junction,
857 consumedcnt, self_referral);
860 reply_size = setup_ver3_dfs_referral(pathnamep, ppdata, &junction,
861 consumedcnt, self_referral);
864 DEBUG(0,("setup_dfs_referral: Invalid dfs referral version: %d\n", max_referral_level));
870 DEBUGADD(0,("DFS Referral pdata:\n"));
871 dump_data(0,*ppdata,reply_size);
878 /**********************************************************************
879 The following functions are called by the NETDFS RPC pipe functions
880 **********************************************************************/
882 /*********************************************************************
883 Creates a junction structure from a Dfs pathname
884 **********************************************************************/
886 BOOL create_junction(const char *pathname, struct junction_map *jucn)
890 parse_dfs_path(pathname,&dp);
892 /* check if path is dfs : validate first token */
893 if (!is_myname_or_ipaddr(dp.hostname)) {
894 DEBUG(4,("create_junction: Invalid hostname %s in dfs path %s\n",
895 dp.hostname, pathname));
899 /* Check for a non-DFS share */
900 if(!lp_msdfs_root(lp_servicenumber(dp.servicename))) {
901 DEBUG(4,("create_junction: %s is not an msdfs root.\n", dp.servicename));
905 pstrcpy(jucn->service_name,dp.servicename);
906 pstrcpy(jucn->volume_name,dp.reqpath);
907 pstrcpy(jucn->comment, lp_comment(lp_servicenumber(dp.servicename)));
911 /**********************************************************************
912 Forms a valid Unix pathname from the junction
913 **********************************************************************/
915 static BOOL junction_to_local_path(struct junction_map *jucn, char *path,
916 int max_pathlen, connection_struct *conn)
925 snum = lp_servicenumber(jucn->service_name);
930 safe_strcpy(path, lp_pathname(snum), max_pathlen-1);
931 safe_strcat(path, "/", max_pathlen-1);
932 safe_strcat(path, jucn->volume_name, max_pathlen-1);
934 pstrcpy(conn_path, lp_pathname(snum));
935 if (!create_conn_struct(conn, snum, conn_path)) {
942 BOOL create_msdfs_link(struct junction_map *jucn, BOOL exists)
946 connection_struct conns;
947 connection_struct *conn = &conns;
949 BOOL insert_comma = False;
954 if(!junction_to_local_path(jucn, path, sizeof(path), conn)) {
958 /* form the msdfs_link contents */
959 pstrcpy(msdfs_link, "msdfs:");
960 for(i=0; i<jucn->referral_count; i++) {
961 char* refpath = jucn->referral_list[i].alternate_path;
963 trim_char(refpath, '\\', '\\');
964 if(*refpath == '\0') {
966 insert_comma = False;
970 if (i > 0 && insert_comma) {
971 pstrcat(msdfs_link, ",");
974 pstrcat(msdfs_link, refpath);
980 DEBUG(5,("create_msdfs_link: Creating new msdfs link: %s -> %s\n", path, msdfs_link));
983 if(SMB_VFS_UNLINK(conn,path)!=0) {
988 if(SMB_VFS_SYMLINK(conn, msdfs_link, path) < 0) {
989 DEBUG(1,("create_msdfs_link: symlink failed %s -> %s\nError: %s\n",
990 path, msdfs_link, strerror(errno)));
999 conn_free_internal(conn);
1003 BOOL remove_msdfs_link(struct junction_map *jucn)
1006 connection_struct conns;
1007 connection_struct *conn = &conns;
1012 if( junction_to_local_path(jucn, path, sizeof(path), conn) ) {
1013 if( SMB_VFS_UNLINK(conn, path) == 0 ) {
1016 talloc_destroy( conn->mem_ctx );
1019 conn_free_internal(conn);
1023 static int form_junctions(TALLOC_CTX *ctx, int snum, struct junction_map *jucn, int jn_remain)
1026 SMB_STRUCT_DIR *dirp;
1028 pstring connect_path;
1029 char* service_name = lp_servicename(snum);
1030 connection_struct conn;
1031 struct referral *ref = NULL;
1035 if (jn_remain <= 0) {
1039 pstrcpy(connect_path,lp_pathname(snum));
1041 if(*connect_path == '\0') {
1046 * Fake up a connection struct for the VFS layer.
1049 if (!create_conn_struct(&conn, snum, connect_path)) {
1053 /* form a junction for the msdfs root - convention
1054 DO NOT REMOVE THIS: NT clients will not work with us
1055 if this is not present
1057 pstrcpy(jucn[cnt].service_name, service_name);
1058 jucn[cnt].volume_name[0] = '\0';
1059 jucn[cnt].referral_count = 1;
1061 ref = jucn[cnt].referral_list = TALLOC_P(ctx, struct referral);
1062 if (jucn[cnt].referral_list == NULL) {
1063 DEBUG(0, ("Malloc failed!\n"));
1068 ref->ttl = REFERRAL_TTL;
1069 if (*lp_msdfs_proxy(snum) != '\0') {
1070 pstrcpy(ref->alternate_path, lp_msdfs_proxy(snum));
1075 slprintf(ref->alternate_path, sizeof(pstring)-1,
1076 "\\\\%s\\%s", get_local_machine_name(), service_name);
1079 /* Now enumerate all dfs links */
1080 dirp = SMB_VFS_OPENDIR(&conn, ".", NULL, 0);
1085 while ((dname = vfs_readdirname(&conn, dirp)) != NULL) {
1086 if (cnt >= jn_remain) {
1087 SMB_VFS_CLOSEDIR(&conn,dirp);
1088 DEBUG(2, ("ran out of MSDFS junction slots"));
1091 if (is_msdfs_link(ctx, &conn, dname, &jucn[cnt].referral_list,
1092 &jucn[cnt].referral_count, NULL)) {
1093 pstrcpy(jucn[cnt].service_name, service_name);
1094 pstrcpy(jucn[cnt].volume_name, dname);
1099 SMB_VFS_CLOSEDIR(&conn,dirp);
1103 conn_free_internal(&conn);
1107 int enum_msdfs_links(TALLOC_CTX *ctx, struct junction_map *jucn, int jn_max)
1113 if(!lp_host_msdfs()) {
1117 /* Ensure all the usershares are loaded. */
1119 load_registry_shares();
1120 sharecount = load_usershare_shares();
1123 for(i=0;i < sharecount && (jn_max - jn_count) > 0;i++) {
1124 if(lp_msdfs_root(i)) {
1125 jn_count += form_junctions(ctx, i,jucn,jn_max - jn_count);