blob: 5ed502912427946e696605acf3b9a2aadaa51c47 [file] [log] [blame]
// Take a look at the license at the top of the repository in the LICENSE file.
use std::{fmt::Display, str::FromStr};
use windows::core::{PCWSTR, PWSTR};
use windows::Win32::Foundation::{LocalFree, ERROR_INSUFFICIENT_BUFFER, HLOCAL, PSID};
use windows::Win32::Security::Authorization::{ConvertSidToStringSidW, ConvertStringSidToSidW};
use windows::Win32::Security::{
CopySid, GetLengthSid, IsValidSid, LookupAccountSidW, SidTypeUnknown,
};
use crate::sys::utils::to_str;
#[doc = include_str!("../../md_doc/sid.md")]
#[derive(Clone, Debug, PartialEq, Eq, PartialOrd, Ord, Hash)]
pub struct Sid {
sid: Vec<u8>,
}
impl Sid {
/// Creates an `Sid` by making a copy of the given raw SID.
pub(crate) unsafe fn from_psid(psid: PSID) -> Option<Self> {
if psid.is_invalid() {
return None;
}
if !IsValidSid(psid).as_bool() {
return None;
}
let length = GetLengthSid(psid);
let mut sid = vec![0; length as usize];
if CopySid(length, PSID(sid.as_mut_ptr().cast()), psid).is_err() {
sysinfo_debug!("CopySid failed: {:?}", std::io::Error::last_os_error());
return None;
}
// We are making assumptions about the SID internal structure,
// and these only hold if the revision is 1
// https://learn.microsoft.com/en-us/windows/win32/api/winnt/ns-winnt-sid
// Namely:
// 1. SIDs can be compared directly (memcmp).
// 2. Following from this, to hash a SID we can just hash its bytes.
// These are the basis for deriving PartialEq, Eq, and Hash.
// And since we also need PartialOrd and Ord, we might as well derive them
// too. The default implementation will be consistent with Eq,
// and we don't care about the actual order, just that there is one.
// So it should all work out.
// Why bother with this? Because it makes the implementation that
// much simpler :)
assert_eq!(sid[0], 1, "Expected SID revision to be 1");
Some(Self { sid })
}
/// Retrieves the account name of this SID.
pub(crate) fn account_name(&self) -> Option<String> {
unsafe {
let mut name_len = 0;
let mut domain_len = 0;
let mut name_use = SidTypeUnknown;
let sid = PSID((self.sid.as_ptr() as *mut u8).cast());
if let Err(err) = LookupAccountSidW(
PCWSTR::null(),
sid,
PWSTR::null(),
&mut name_len,
PWSTR::null(),
&mut domain_len,
&mut name_use,
) {
if err.code() != ERROR_INSUFFICIENT_BUFFER.to_hresult() {
sysinfo_debug!("LookupAccountSidW failed: {:?}", err);
return None;
}
}
let mut name = vec![0; name_len as usize];
// Reset length to 0 since we're still passing a NULL pointer
// for the domain.
domain_len = 0;
if LookupAccountSidW(
PCWSTR::null(),
sid,
PWSTR::from_raw(name.as_mut_ptr()),
&mut name_len,
PWSTR::null(),
&mut domain_len,
&mut name_use,
)
.is_err()
{
sysinfo_debug!(
"LookupAccountSidW failed: {:?}",
std::io::Error::last_os_error()
);
return None;
}
Some(to_str(PWSTR::from_raw(name.as_mut_ptr())))
}
}
}
impl Display for Sid {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
unsafe fn convert_sid_to_string_sid(sid: PSID) -> Option<String> {
let mut string_sid = PWSTR::null();
if let Err(_err) = ConvertSidToStringSidW(sid, &mut string_sid) {
sysinfo_debug!("ConvertSidToStringSidW failed: {:?}", _err);
return None;
}
let result = to_str(string_sid);
let _err = LocalFree(HLOCAL(string_sid.0 as _));
Some(result)
}
let string_sid =
unsafe { convert_sid_to_string_sid(PSID((self.sid.as_ptr() as *mut u8).cast())) };
let string_sid = string_sid.ok_or(std::fmt::Error)?;
write!(f, "{string_sid}")
}
}
impl FromStr for Sid {
type Err = String;
fn from_str(s: &str) -> Result<Self, Self::Err> {
unsafe {
let mut string_sid: Vec<u16> = s.encode_utf16().collect();
string_sid.push(0);
let mut psid = PSID::default();
if let Err(err) =
ConvertStringSidToSidW(PCWSTR::from_raw(string_sid.as_ptr()), &mut psid)
{
return Err(format!("ConvertStringSidToSidW failed: {:?}", err));
}
let sid = Self::from_psid(psid);
let _err = LocalFree(HLOCAL(psid.0 as _));
// Unwrapping because ConvertStringSidToSidW should've performed
// all the necessary validations. If it returned an invalid SID,
// we better fail fast.
Ok(sid.unwrap())
}
}
}