r6369: update release notes
[Samba.git] / source / nsswitch / winbindd_passdb.c
blob23a56e4ea637a2c8b1451acb6f5ca26854b87081
1 /*
2 Unix SMB/CIFS implementation.
4 Winbind rpc backend functions
6 Copyright (C) Tim Potter 2000-2001,2003
7 Copyright (C) Simo Sorce 2003
8 Copyright (C) Volker Lendecke 2004
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 #include "includes.h"
26 #include "winbindd.h"
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_WINBIND
31 static void
32 add_member(const char *domain, const char *user,
33 char **members, int *num_members)
35 fstring name;
37 fill_domain_username(name, domain, user);
38 safe_strcat(name, ",", sizeof(name)-1);
39 string_append(members, name);
40 *num_members += 1;
43 /**********************************************************************
44 Add member users resulting from sid. Expand if it is a domain group.
45 **********************************************************************/
47 static void
48 add_expanded_sid(const DOM_SID *sid, char **members, int *num_members)
50 DOM_SID dom_sid;
51 uint32 rid;
52 struct winbindd_domain *domain;
53 int i;
55 char *domain_name = NULL;
56 char *name = NULL;
57 enum SID_NAME_USE type;
59 uint32 num_names;
60 DOM_SID **sid_mem;
61 char **names;
62 uint32 *types;
64 NTSTATUS result;
66 TALLOC_CTX *mem_ctx = talloc_init("add_expanded_sid");
68 if (mem_ctx == NULL) {
69 DEBUG(1, ("talloc_init failed\n"));
70 return;
73 sid_copy(&dom_sid, sid);
74 sid_split_rid(&dom_sid, &rid);
76 domain = find_lookup_domain_from_sid(sid);
78 if (domain == NULL) {
79 DEBUG(3, ("Could not find domain for sid %s\n",
80 sid_string_static(sid)));
81 goto done;
84 result = domain->methods->sid_to_name(domain, mem_ctx, sid,
85 &domain_name, &name, &type);
87 if (!NT_STATUS_IS_OK(result)) {
88 DEBUG(3, ("sid_to_name failed for sid %s\n",
89 sid_string_static(sid)));
90 goto done;
93 DEBUG(10, ("Found name %s, type %d\n", name, type));
95 if (type == SID_NAME_USER) {
96 add_member(domain_name, name, members, num_members);
97 goto done;
100 if (type != SID_NAME_DOM_GRP) {
101 DEBUG(10, ("Alias member %s neither user nor group, ignore\n",
102 name));
103 goto done;
106 /* Expand the domain group, this must be done via the target domain */
108 domain = find_domain_from_sid(sid);
110 if (domain == NULL) {
111 DEBUG(3, ("Could not find domain from SID %s\n",
112 sid_string_static(sid)));
113 goto done;
116 result = domain->methods->lookup_groupmem(domain, mem_ctx,
117 sid, &num_names,
118 &sid_mem, &names,
119 &types);
121 if (!NT_STATUS_IS_OK(result)) {
122 DEBUG(10, ("Could not lookup group members for %s: %s\n",
123 name, nt_errstr(result)));
124 goto done;
127 for (i=0; i<num_names; i++) {
128 DEBUG(10, ("Adding group member SID %s\n",
129 sid_string_static(sid_mem[i])));
131 if (types[i] != SID_NAME_USER) {
132 DEBUG(1, ("Hmmm. Member %s of group %s is no user. "
133 "Ignoring.\n", names[i], name));
134 continue;
137 add_member(domain->name, names[i], members, num_members);
140 done:
141 talloc_destroy(mem_ctx);
142 return;
145 BOOL fill_passdb_alias_grmem(struct winbindd_domain *domain,
146 DOM_SID *group_sid,
147 int *num_gr_mem, char **gr_mem, int *gr_mem_len)
149 DOM_SID *members;
150 int i, num_members;
152 *num_gr_mem = 0;
153 *gr_mem = NULL;
154 *gr_mem_len = 0;
156 if (!pdb_enum_aliasmem(group_sid, &members, &num_members))
157 return True;
159 for (i=0; i<num_members; i++) {
160 add_expanded_sid(&members[i], gr_mem, num_gr_mem);
163 SAFE_FREE(members);
165 if (*gr_mem != NULL) {
166 int len;
168 /* We have at least one member, strip off the last "," */
169 len = strlen(*gr_mem);
170 (*gr_mem)[len-1] = '\0';
171 *gr_mem_len = len;
174 return True;
177 /* Query display info for a domain. This returns enough information plus a
178 bit extra to give an overview of domain users for the User Manager
179 application. */
180 static NTSTATUS query_user_list(struct winbindd_domain *domain,
181 TALLOC_CTX *mem_ctx,
182 uint32 *num_entries,
183 WINBIND_USERINFO **info)
185 /* We don't have users */
186 *num_entries = 0;
187 *info = NULL;
188 return NT_STATUS_OK;
191 /* list all domain groups */
192 static NTSTATUS enum_dom_groups(struct winbindd_domain *domain,
193 TALLOC_CTX *mem_ctx,
194 uint32 *num_entries,
195 struct acct_info **info)
197 /* We don't have domain groups */
198 *num_entries = 0;
199 *info = NULL;
200 return NT_STATUS_OK;
203 /* List all domain groups */
205 static NTSTATUS enum_local_groups(struct winbindd_domain *domain,
206 TALLOC_CTX *mem_ctx,
207 uint32 *num_entries,
208 struct acct_info **info)
210 struct pdb_search *search;
211 struct samr_displayentry *aliases;
212 int i;
213 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
215 search = pdb_search_aliases(&domain->sid);
216 if (search == NULL) goto done;
218 *num_entries = pdb_search_entries(search, 0, 0xffffffff, &aliases);
219 if (*num_entries == 0) goto done;
221 *info = TALLOC_ARRAY(mem_ctx, struct acct_info, *num_entries);
222 if (*info == NULL) {
223 result = NT_STATUS_NO_MEMORY;
224 goto done;
227 for (i=0; i<*num_entries; i++) {
228 fstrcpy((*info)[i].acct_name, aliases[i].account_name);
229 fstrcpy((*info)[i].acct_desc, aliases[i].description);
230 (*info)[i].rid = aliases[i].rid;
233 result = NT_STATUS_OK;
234 done:
235 pdb_search_destroy(search);
236 return result;
239 /* convert a single name to a sid in a domain */
240 static NTSTATUS name_to_sid(struct winbindd_domain *domain,
241 TALLOC_CTX *mem_ctx,
242 const char *domain_name,
243 const char *name,
244 DOM_SID *sid,
245 enum SID_NAME_USE *type)
247 DEBUG(10, ("Finding name %s\n", name));
249 if (!pdb_find_alias(name, sid))
250 return NT_STATUS_NONE_MAPPED;
252 if (sid_check_is_in_builtin(sid))
253 *type = SID_NAME_WKN_GRP;
254 else
255 *type = SID_NAME_ALIAS;
257 return NT_STATUS_OK;
261 convert a domain SID to a user or group name
263 static NTSTATUS sid_to_name(struct winbindd_domain *domain,
264 TALLOC_CTX *mem_ctx,
265 const DOM_SID *sid,
266 char **domain_name,
267 char **name,
268 enum SID_NAME_USE *type)
270 struct acct_info info;
272 DEBUG(10, ("Converting SID %s\n", sid_string_static(sid)));
274 if (!pdb_get_aliasinfo(sid, &info))
275 return NT_STATUS_NONE_MAPPED;
277 *domain_name = talloc_strdup(mem_ctx, domain->name);
278 *name = talloc_strdup(mem_ctx, info.acct_name);
279 if (sid_check_is_in_builtin(sid))
280 *type = SID_NAME_WKN_GRP;
281 else
282 *type = SID_NAME_ALIAS;
284 return NT_STATUS_OK;
287 /* Lookup user information from a rid or username. */
288 static NTSTATUS query_user(struct winbindd_domain *domain,
289 TALLOC_CTX *mem_ctx,
290 const DOM_SID *user_sid,
291 WINBIND_USERINFO *user_info)
293 return NT_STATUS_NO_SUCH_USER;
296 /* Lookup groups a user is a member of. I wish Unix had a call like this! */
297 static NTSTATUS lookup_usergroups(struct winbindd_domain *domain,
298 TALLOC_CTX *mem_ctx,
299 const DOM_SID *user_sid,
300 uint32 *num_groups, DOM_SID ***user_gids)
302 return NT_STATUS_NO_SUCH_USER;
305 static NTSTATUS lookup_useraliases(struct winbindd_domain *domain,
306 TALLOC_CTX *mem_ctx,
307 uint32 num_sids, DOM_SID **sids,
308 uint32 *num_aliases, uint32 **aliases)
310 return NT_STATUS_NO_SUCH_USER;
313 /* Lookup group membership given a rid. */
314 static NTSTATUS lookup_groupmem(struct winbindd_domain *domain,
315 TALLOC_CTX *mem_ctx,
316 const DOM_SID *group_sid, uint32 *num_names,
317 DOM_SID ***sid_mem, char ***names,
318 uint32 **name_types)
320 return NT_STATUS_OK;
323 /* find the sequence number for a domain */
324 static NTSTATUS sequence_number(struct winbindd_domain *domain, uint32 *seq)
326 *seq = 1;
327 return NT_STATUS_OK;
330 /* get a list of trusted domains */
331 static NTSTATUS trusted_domains(struct winbindd_domain *domain,
332 TALLOC_CTX *mem_ctx,
333 uint32 *num_domains,
334 char ***names,
335 char ***alt_names,
336 DOM_SID **dom_sids)
338 NTSTATUS nt_status;
339 int enum_ctx = 0;
340 int num_sec_domains;
341 TRUSTDOM **domains;
342 *num_domains = 0;
343 *names = NULL;
344 *alt_names = NULL;
345 *dom_sids = NULL;
346 do {
347 int i;
348 nt_status = secrets_get_trusted_domains(mem_ctx, &enum_ctx, 1,
349 &num_sec_domains,
350 &domains);
351 *names = TALLOC_REALLOC_ARRAY(mem_ctx, *names, char *,
352 num_sec_domains + *num_domains);
353 *alt_names = TALLOC_REALLOC_ARRAY(mem_ctx, *alt_names, char *,
354 num_sec_domains + *num_domains);
355 *dom_sids = TALLOC_REALLOC_ARRAY(mem_ctx, *dom_sids, DOM_SID,
356 num_sec_domains + *num_domains);
358 for (i=0; i< num_sec_domains; i++) {
359 if (pull_ucs2_talloc(mem_ctx, &(*names)[*num_domains],
360 domains[i]->name) == -1) {
361 return NT_STATUS_NO_MEMORY;
363 (*alt_names)[*num_domains] = NULL;
364 (*dom_sids)[*num_domains] = domains[i]->sid;
365 (*num_domains)++;
368 } while (NT_STATUS_EQUAL(nt_status, STATUS_MORE_ENTRIES));
370 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_NO_MORE_ENTRIES)) {
371 return NT_STATUS_OK;
373 return nt_status;
376 /* find the domain sid for a domain */
377 static NTSTATUS domain_sid(struct winbindd_domain *domain, DOM_SID *sid)
379 sid_copy(sid, &domain->sid);
380 return NT_STATUS_OK;
383 /* find alternate names list for the domain
384 * should we look for netbios aliases??
385 SSS */
386 static NTSTATUS alternate_name(struct winbindd_domain *domain)
388 DEBUG(3,("pdb: alternate_name\n"));
390 return NT_STATUS_OK;
394 /* the rpc backend methods are exposed via this structure */
395 struct winbindd_methods passdb_methods = {
396 False,
397 query_user_list,
398 enum_dom_groups,
399 enum_local_groups,
400 name_to_sid,
401 sid_to_name,
402 query_user,
403 lookup_usergroups,
404 lookup_useraliases,
405 lookup_groupmem,
406 sequence_number,
407 trusted_domains,
408 domain_sid,
409 alternate_name