s3: Fix bug #9085.
[Samba.git] / source3 / utils / net_idmap.c
blob32680e0deeda7ce68ca8315c86b31d6249ba663e
1 /*
2 Samba Unix/Linux SMB client library
3 Distributed SMB/CIFS Server Management Utility
4 Copyright (C) 2003 Andrew Bartlett (abartlet@samba.org)
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 #define FOO(x) (x)
21 #include "includes.h"
22 #include "utils/net.h"
24 #define ALLOC_CHECK(mem) do { \
25 if (!mem) { \
26 d_fprintf(stderr, _("Out of memory!\n")); \
27 talloc_free(ctx); \
28 return -1; \
29 } } while(0)
31 /***********************************************************
32 Helper function for net_idmap_dump. Dump one entry.
33 **********************************************************/
34 static int net_idmap_dump_one_entry(TDB_CONTEXT *tdb,
35 TDB_DATA key,
36 TDB_DATA data,
37 void *unused)
39 if (strcmp((char *)key.dptr, "USER HWM") == 0) {
40 printf(_("USER HWM %d\n"), IVAL(data.dptr,0));
41 return 0;
44 if (strcmp((char *)key.dptr, "GROUP HWM") == 0) {
45 printf(_("GROUP HWM %d\n"), IVAL(data.dptr,0));
46 return 0;
49 if (strncmp((char *)key.dptr, "S-", 2) != 0)
50 return 0;
52 printf("%s %s\n", data.dptr, key.dptr);
53 return 0;
56 /***********************************************************
57 Dump the current idmap
58 **********************************************************/
59 static int net_idmap_dump(struct net_context *c, int argc, const char **argv)
61 TDB_CONTEXT *idmap_tdb;
63 if ( argc != 1 || c->display_usage) {
64 d_printf("%s\n%s",
65 _("Usage:"),
66 _("net idmap dump <inputfile>\n"
67 " Dump current ID mapping.\n"
68 " inputfile\tTDB file to read mappings from.\n"));
69 return c->display_usage?0:-1;
72 idmap_tdb = tdb_open_log(argv[0], 0, TDB_DEFAULT, O_RDONLY, 0);
74 if (idmap_tdb == NULL) {
75 d_fprintf(stderr, _("Could not open idmap: %s\n"), argv[0]);
76 return -1;
79 tdb_traverse(idmap_tdb, net_idmap_dump_one_entry, NULL);
81 tdb_close(idmap_tdb);
83 return 0;
86 /***********************************************************
87 Write entries from stdin to current local idmap
88 **********************************************************/
90 static int net_idmap_restore(struct net_context *c, int argc, const char **argv)
92 TALLOC_CTX *ctx;
93 FILE *input;
95 if (c->display_usage) {
96 d_printf("%s\n%s",
97 _("Usage:"),
98 _("net idmap restore [inputfile]\n"
99 " Restore ID mappings from file\n"
100 " inputfile\tFile to load ID mappings from. If "
101 "not given, load data from stdin.\n"));
102 return 0;
105 if (! winbind_ping()) {
106 d_fprintf(stderr,
107 _("To use net idmap Winbindd must be running.\n"));
108 return -1;
111 ctx = talloc_new(NULL);
112 ALLOC_CHECK(ctx);
114 if (argc == 1) {
115 input = fopen(argv[0], "r");
116 } else {
117 input = stdin;
120 while (!feof(input)) {
121 char line[128], sid_string[128];
122 int len;
123 struct wbcDomainSid sid;
124 enum id_type type = ID_TYPE_NOT_SPECIFIED;
125 unsigned long idval;
126 wbcErr wbc_status;
128 if (fgets(line, 127, input) == NULL)
129 break;
131 len = strlen(line);
133 if ( (len > 0) && (line[len-1] == '\n') )
134 line[len-1] = '\0';
136 if (sscanf(line, "GID %lu %128s", &idval, sid_string) == 2) {
137 type = ID_TYPE_GID;
138 } else if (sscanf(line, "UID %lu %128s", &idval, sid_string) == 2) {
139 type = ID_TYPE_UID;
140 } else if (sscanf(line, "USER HWM %lu", &idval) == 1) {
141 /* set uid hwm */
142 wbc_status = wbcSetUidHwm(idval);
143 if (!WBC_ERROR_IS_OK(wbc_status)) {
144 d_fprintf(stderr,
145 _("Could not set USER HWM: %s\n"),
146 wbcErrorString(wbc_status));
148 continue;
149 } else if (sscanf(line, "GROUP HWM %lu", &idval) == 1) {
150 /* set gid hwm */
151 wbc_status = wbcSetGidHwm(idval);
152 if (!WBC_ERROR_IS_OK(wbc_status)) {
153 d_fprintf(stderr,
154 _("Could not set GROUP HWM: %s\n"),
155 wbcErrorString(wbc_status));
157 continue;
158 } else {
159 d_fprintf(stderr, _("ignoring invalid line [%s]\n"),
160 line);
161 continue;
164 wbc_status = wbcStringToSid(sid_string, &sid);
165 if (!WBC_ERROR_IS_OK(wbc_status)) {
166 d_fprintf(stderr, _("ignoring invalid sid [%s]: %s\n"),
167 sid_string, wbcErrorString(wbc_status));
168 continue;
171 if (type == ID_TYPE_UID) {
172 wbc_status = wbcSetUidMapping(idval, &sid);
173 } else {
174 wbc_status = wbcSetGidMapping(idval, &sid);
176 if (!WBC_ERROR_IS_OK(wbc_status)) {
177 d_fprintf(stderr,
178 _("Could not set mapping of %s %lu to sid %s: %s\n"),
179 (type == ID_TYPE_GID) ? "GID" : "UID",
180 idval, sid_string,
181 wbcErrorString(wbc_status));
182 continue;
186 if (input != stdin) {
187 fclose(input);
190 talloc_free(ctx);
191 return 0;
194 /***********************************************************
195 Delete a SID mapping from a winbindd_idmap.tdb
196 **********************************************************/
197 static int net_idmap_delete(struct net_context *c, int argc, const char **argv)
199 d_printf("%s\n", _("Not implemented yet"));
200 return -1;
203 static int net_idmap_set(struct net_context *c, int argc, const char **argv)
205 d_printf("%s\n", _("Not implemented yet"));
206 return -1;
208 bool idmap_store_secret(const char *backend, bool alloc,
209 const char *domain, const char *identity,
210 const char *secret)
212 char *tmp;
213 int r;
214 bool ret;
216 if (alloc) {
217 r = asprintf(&tmp, "IDMAP_ALLOC_%s", backend);
218 } else {
219 r = asprintf(&tmp, "IDMAP_%s_%s", backend, domain);
222 if (r < 0) return false;
224 strupper_m(tmp); /* make sure the key is case insensitive */
225 ret = secrets_store_generic(tmp, identity, secret);
227 free(tmp);
228 return ret;
232 static int net_idmap_secret(struct net_context *c, int argc, const char **argv)
234 TALLOC_CTX *ctx;
235 const char *secret;
236 const char *dn;
237 char *domain;
238 char *backend;
239 char *opt = NULL;
240 bool ret;
242 if (argc != 2 || c->display_usage) {
243 d_printf("%s\n%s",
244 _("Usage:"),
245 _("net idmap secret {<DOMAIN>|alloc} <secret>\n"
246 " Set the secret for the specified domain "
247 "(or alloc module)\n"
248 " DOMAIN\tDomain to set secret for.\n"
249 " alloc\tSet secret for the alloc module\n"
250 " secret\tNew secret to set.\n"));
251 return c->display_usage?0:-1;
254 secret = argv[1];
256 ctx = talloc_new(NULL);
257 ALLOC_CHECK(ctx);
259 if (strcmp(argv[0], "alloc") == 0) {
260 domain = NULL;
261 backend = lp_idmap_alloc_backend();
262 } else {
263 domain = talloc_strdup(ctx, argv[0]);
264 ALLOC_CHECK(domain);
266 opt = talloc_asprintf(ctx, "idmap config %s", domain);
267 ALLOC_CHECK(opt);
269 backend = talloc_strdup(ctx, lp_parm_const_string(-1, opt, "backend", "tdb"));
270 ALLOC_CHECK(backend);
273 if ( ( ! backend) || ( ! strequal(backend, "ldap"))) {
274 d_fprintf(stderr,
275 _("The only currently supported backend is LDAP\n"));
276 talloc_free(ctx);
277 return -1;
280 if (domain) {
282 dn = lp_parm_const_string(-1, opt, "ldap_user_dn", NULL);
283 if ( ! dn) {
284 d_fprintf(stderr,
285 _("Missing ldap_user_dn option for domain "
286 "%s\n"), domain);
287 talloc_free(ctx);
288 return -1;
291 ret = idmap_store_secret("ldap", false, domain, dn, secret);
292 } else {
293 dn = lp_parm_const_string(-1, "idmap alloc config", "ldap_user_dn", NULL);
294 if ( ! dn) {
295 d_fprintf(stderr,
296 _("Missing ldap_user_dn option for alloc "
297 "backend\n"));
298 talloc_free(ctx);
299 return -1;
302 ret = idmap_store_secret("ldap", true, NULL, dn, secret);
305 if ( ! ret) {
306 d_fprintf(stderr, _("Failed to store secret\n"));
307 talloc_free(ctx);
308 return -1;
311 d_printf(_("Secret stored\n"));
312 return 0;
315 int net_help_idmap(struct net_context *c, int argc, const char **argv)
317 d_printf(_("net idmap dump <inputfile>\n"
318 " Dump current id mapping\n"));
320 d_printf(_("net idmap restore\n"
321 " Restore entries from stdin\n"));
323 /* Deliberately *not* document net idmap delete */
325 d_printf(_("net idmap secret <DOMAIN>|alloc <secret>\n"
326 " Set the secret for the specified DOMAIN (or the alloc "
327 "module)\n"));
329 return -1;
332 static int net_idmap_aclmapset(struct net_context *c, int argc, const char **argv)
334 TALLOC_CTX *mem_ctx;
335 int result = -1;
336 DOM_SID src_sid, dst_sid;
337 char *src, *dst;
338 struct db_context *db;
339 struct db_record *rec;
340 NTSTATUS status;
342 if (argc != 3 || c->display_usage) {
343 d_fprintf(stderr, "%s net idmap aclmapset <tdb> "
344 "<src-sid> <dst-sid>\n", _("Usage:"));
345 return -1;
348 if (!(mem_ctx = talloc_init("net idmap aclmapset"))) {
349 d_fprintf(stderr, _("talloc_init failed\n"));
350 return -1;
353 if (!(db = db_open(mem_ctx, argv[0], 0, TDB_DEFAULT,
354 O_RDWR|O_CREAT, 0600))) {
355 d_fprintf(stderr, _("db_open failed: %s\n"), strerror(errno));
356 goto fail;
359 if (!string_to_sid(&src_sid, argv[1])) {
360 d_fprintf(stderr, _("%s is not a valid sid\n"), argv[1]);
361 goto fail;
364 if (!string_to_sid(&dst_sid, argv[2])) {
365 d_fprintf(stderr, _("%s is not a valid sid\n"), argv[2]);
366 goto fail;
369 if (!(src = sid_string_talloc(mem_ctx, &src_sid))
370 || !(dst = sid_string_talloc(mem_ctx, &dst_sid))) {
371 d_fprintf(stderr, _("talloc_strdup failed\n"));
372 goto fail;
375 if (!(rec = db->fetch_locked(
376 db, mem_ctx, string_term_tdb_data(src)))) {
377 d_fprintf(stderr, _("could not fetch db record\n"));
378 goto fail;
381 status = rec->store(rec, string_term_tdb_data(dst), 0);
382 TALLOC_FREE(rec);
384 if (!NT_STATUS_IS_OK(status)) {
385 d_fprintf(stderr, _("could not store record: %s\n"),
386 nt_errstr(status));
387 goto fail;
390 result = 0;
391 fail:
392 TALLOC_FREE(mem_ctx);
393 return result;
396 /***********************************************************
397 Look at the current idmap
398 **********************************************************/
399 int net_idmap(struct net_context *c, int argc, const char **argv)
401 struct functable func[] = {
403 "dump",
404 net_idmap_dump,
405 NET_TRANSPORT_LOCAL,
406 N_("Dump the current ID mappings"),
407 N_("net idmap dump\n"
408 " Dump the current ID mappings")
411 "restore",
412 net_idmap_restore,
413 NET_TRANSPORT_LOCAL,
414 N_("Restore entries from stdin"),
415 N_("net idmap restore\n"
416 " Restore entries from stdin")
419 "setmap",
420 net_idmap_set,
421 NET_TRANSPORT_LOCAL,
422 N_("Not implemented yet"),
423 N_("net idmap setmap\n"
424 " Not implemented yet")
427 "delete",
428 net_idmap_delete,
429 NET_TRANSPORT_LOCAL,
430 N_("Not implemented yet"),
431 N_("net idmap delete\n"
432 " Not implemented yet")
435 "secret",
436 net_idmap_secret,
437 NET_TRANSPORT_LOCAL,
438 N_("Set secret for specified domain"),
439 N_("net idmap secret {<DOMAIN>|alloc} <secret>\n"
440 " Set secret for specified domain or alloc module")
443 "aclmapset",
444 net_idmap_aclmapset,
445 NET_TRANSPORT_LOCAL,
446 N_("Set acl map"),
447 N_("net idmap aclmapset\n"
448 " Set acl map")
450 {NULL, NULL, 0, NULL, NULL}
453 return net_run_function(c, argc, argv, "net idmap", func);