r14421: This does two things
[Samba.git] / source / nsswitch / winbindd_passdb.c
blob6c8dafa11808cbfbbe077ff6a34a2eed29400394
1 /*
2 Unix SMB/CIFS implementation.
4 Winbind rpc backend functions
6 Copyright (C) Tim Potter 2000-2001,2003
7 Copyright (C) Simo Sorce 2003
8 Copyright (C) Volker Lendecke 2004
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 #include "includes.h"
26 #include "winbindd.h"
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_WINBIND
31 static void add_member(const char *domain, const char *user,
32 char **pp_members, size_t *p_num_members)
34 fstring name;
36 fill_domain_username(name, domain, user, True);
37 safe_strcat(name, ",", sizeof(name)-1);
38 string_append(pp_members, name);
39 *p_num_members += 1;
42 /**********************************************************************
43 Add member users resulting from sid. Expand if it is a domain group.
44 **********************************************************************/
46 static void add_expanded_sid(const DOM_SID *sid, char **pp_members, size_t *p_num_members)
48 DOM_SID dom_sid;
49 uint32 rid;
50 struct winbindd_domain *domain;
51 size_t i;
53 char *domain_name = NULL;
54 char *name = NULL;
55 enum SID_NAME_USE type;
57 uint32 num_names;
58 DOM_SID *sid_mem;
59 char **names;
60 uint32 *types;
62 NTSTATUS result;
64 TALLOC_CTX *mem_ctx = talloc_init("add_expanded_sid");
66 if (mem_ctx == NULL) {
67 DEBUG(1, ("talloc_init failed\n"));
68 return;
71 sid_copy(&dom_sid, sid);
72 sid_split_rid(&dom_sid, &rid);
74 domain = find_lookup_domain_from_sid(sid);
76 if (domain == NULL) {
77 DEBUG(3, ("Could not find domain for sid %s\n",
78 sid_string_static(sid)));
79 goto done;
82 result = domain->methods->sid_to_name(domain, mem_ctx, sid,
83 &domain_name, &name, &type);
85 if (!NT_STATUS_IS_OK(result)) {
86 DEBUG(3, ("sid_to_name failed for sid %s\n",
87 sid_string_static(sid)));
88 goto done;
91 DEBUG(10, ("Found name %s, type %d\n", name, type));
93 if (type == SID_NAME_USER) {
94 add_member(domain_name, name, pp_members, p_num_members);
95 goto done;
98 if (type != SID_NAME_DOM_GRP) {
99 DEBUG(10, ("Alias member %s neither user nor group, ignore\n",
100 name));
101 goto done;
104 /* Expand the domain group, this must be done via the target domain */
106 domain = find_domain_from_sid(sid);
108 if (domain == NULL) {
109 DEBUG(3, ("Could not find domain from SID %s\n",
110 sid_string_static(sid)));
111 goto done;
114 result = domain->methods->lookup_groupmem(domain, mem_ctx,
115 sid, &num_names,
116 &sid_mem, &names,
117 &types);
119 if (!NT_STATUS_IS_OK(result)) {
120 DEBUG(10, ("Could not lookup group members for %s: %s\n",
121 name, nt_errstr(result)));
122 goto done;
125 for (i=0; i<num_names; i++) {
126 DEBUG(10, ("Adding group member SID %s\n",
127 sid_string_static(&sid_mem[i])));
129 if (types[i] != SID_NAME_USER) {
130 DEBUG(1, ("Hmmm. Member %s of group %s is no user. "
131 "Ignoring.\n", names[i], name));
132 continue;
135 add_member(domain->name, names[i], pp_members, p_num_members);
138 done:
139 talloc_destroy(mem_ctx);
140 return;
143 BOOL fill_passdb_alias_grmem(struct winbindd_domain *domain,
144 DOM_SID *group_sid,
145 size_t *num_gr_mem, char **gr_mem, size_t *gr_mem_len)
147 DOM_SID *members;
148 size_t i, num_members;
150 *num_gr_mem = 0;
151 *gr_mem = NULL;
152 *gr_mem_len = 0;
154 if (!NT_STATUS_IS_OK(pdb_enum_aliasmem(group_sid, &members,
155 &num_members)))
156 return True;
158 for (i=0; i<num_members; i++) {
159 add_expanded_sid(&members[i], gr_mem, num_gr_mem);
162 SAFE_FREE(members);
164 if (*gr_mem != NULL) {
165 size_t len;
167 /* We have at least one member, strip off the last "," */
168 len = strlen(*gr_mem);
169 (*gr_mem)[len-1] = '\0';
170 *gr_mem_len = len;
173 return True;
176 /* Query display info for a domain. This returns enough information plus a
177 bit extra to give an overview of domain users for the User Manager
178 application. */
179 static NTSTATUS query_user_list(struct winbindd_domain *domain,
180 TALLOC_CTX *mem_ctx,
181 uint32 *num_entries,
182 WINBIND_USERINFO **info)
184 /* We don't have users */
185 *num_entries = 0;
186 *info = NULL;
187 return NT_STATUS_OK;
190 /* list all domain groups */
191 static NTSTATUS enum_dom_groups(struct winbindd_domain *domain,
192 TALLOC_CTX *mem_ctx,
193 uint32 *num_entries,
194 struct acct_info **info)
196 /* We don't have domain groups */
197 *num_entries = 0;
198 *info = NULL;
199 return NT_STATUS_OK;
202 /* List all domain groups */
204 static NTSTATUS enum_local_groups(struct winbindd_domain *domain,
205 TALLOC_CTX *mem_ctx,
206 uint32 *num_entries,
207 struct acct_info **info)
209 struct pdb_search *search;
210 struct samr_displayentry *aliases;
211 int i;
212 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
214 search = pdb_search_aliases(&domain->sid);
215 if (search == NULL) goto done;
217 *num_entries = pdb_search_entries(search, 0, 0xffffffff, &aliases);
218 if (*num_entries == 0) goto done;
220 *info = TALLOC_ARRAY(mem_ctx, struct acct_info, *num_entries);
221 if (*info == NULL) {
222 result = NT_STATUS_NO_MEMORY;
223 goto done;
226 for (i=0; i<*num_entries; i++) {
227 fstrcpy((*info)[i].acct_name, aliases[i].account_name);
228 fstrcpy((*info)[i].acct_desc, aliases[i].description);
229 (*info)[i].rid = aliases[i].rid;
232 result = NT_STATUS_OK;
233 done:
234 pdb_search_destroy(search);
235 return result;
238 /* convert a single name to a sid in a domain */
239 static NTSTATUS name_to_sid(struct winbindd_domain *domain,
240 TALLOC_CTX *mem_ctx,
241 const char *domain_name,
242 const char *name,
243 DOM_SID *sid,
244 enum SID_NAME_USE *type)
246 DEBUG(10, ("Finding name %s\n", name));
248 if ( !lookup_name( mem_ctx, name, LOOKUP_NAME_ALL,
249 NULL, NULL, sid, type ) )
251 return NT_STATUS_NONE_MAPPED;
254 return NT_STATUS_OK;
258 convert a domain SID to a user or group name
260 static NTSTATUS sid_to_name(struct winbindd_domain *domain,
261 TALLOC_CTX *mem_ctx,
262 const DOM_SID *sid,
263 char **domain_name,
264 char **name,
265 enum SID_NAME_USE *type)
267 const char *dom, *nam;
269 DEBUG(10, ("Converting SID %s\n", sid_string_static(sid)));
271 /* Paranoia check */
272 if (!sid_check_is_in_builtin(sid) &&
273 !sid_check_is_in_our_domain(sid)) {
274 DEBUG(0, ("Possible deadlock: Trying to lookup SID %s with "
275 "passdb backend\n", sid_string_static(sid)));
276 return NT_STATUS_NONE_MAPPED;
279 if (!lookup_sid(mem_ctx, sid, &dom, &nam, type)) {
280 return NT_STATUS_NONE_MAPPED;
283 *domain_name = talloc_strdup(mem_ctx, dom);
284 *name = talloc_strdup(mem_ctx, nam);
286 return NT_STATUS_OK;
289 /* Lookup user information from a rid or username. */
290 static NTSTATUS query_user(struct winbindd_domain *domain,
291 TALLOC_CTX *mem_ctx,
292 const DOM_SID *user_sid,
293 WINBIND_USERINFO *user_info)
295 return NT_STATUS_NO_SUCH_USER;
298 /* Lookup groups a user is a member of. I wish Unix had a call like this! */
299 static NTSTATUS lookup_usergroups(struct winbindd_domain *domain,
300 TALLOC_CTX *mem_ctx,
301 const DOM_SID *user_sid,
302 uint32 *num_groups, DOM_SID **user_gids)
304 return NT_STATUS_NO_SUCH_USER;
307 static NTSTATUS lookup_useraliases(struct winbindd_domain *domain,
308 TALLOC_CTX *mem_ctx,
309 uint32 num_sids, const DOM_SID *sids,
310 uint32 *p_num_aliases, uint32 **rids)
312 NTSTATUS result;
313 size_t num_aliases = 0;
315 result = pdb_enum_alias_memberships(mem_ctx, &domain->sid,
316 sids, num_sids, rids, &num_aliases);
318 *p_num_aliases = num_aliases;
319 return result;
322 /* Lookup group membership given a rid. */
323 static NTSTATUS lookup_groupmem(struct winbindd_domain *domain,
324 TALLOC_CTX *mem_ctx,
325 const DOM_SID *group_sid, uint32 *num_names,
326 DOM_SID **sid_mem, char ***names,
327 uint32 **name_types)
329 size_t i, num_members, num_mapped;
330 uint32 *rids;
331 NTSTATUS result;
332 const DOM_SID **sids;
333 struct lsa_dom_info *lsa_domains;
334 struct lsa_name_info *lsa_names;
336 if (!sid_check_is_in_our_domain(group_sid)) {
337 /* There's no groups, only aliases in BUILTIN */
338 return NT_STATUS_NO_SUCH_GROUP;
341 result = pdb_enum_group_members(mem_ctx, group_sid, &rids,
342 &num_members);
343 if (!NT_STATUS_IS_OK(result)) {
344 return result;
347 if (num_members == 0) {
348 *num_names = 0;
349 *sid_mem = NULL;
350 *names = NULL;
351 *name_types = NULL;
352 return NT_STATUS_OK;
355 *sid_mem = TALLOC_ARRAY(mem_ctx, DOM_SID, num_members);
356 *names = TALLOC_ARRAY(mem_ctx, char *, num_members);
357 *name_types = TALLOC_ARRAY(mem_ctx, uint32, num_members);
358 sids = TALLOC_ARRAY(mem_ctx, const DOM_SID *, num_members);
360 if (((*sid_mem) == NULL) || ((*names) == NULL) ||
361 ((*name_types) == NULL) || (sids == NULL)) {
362 return NT_STATUS_NO_MEMORY;
365 for (i=0; i<num_members; i++) {
366 DOM_SID *sid = &((*sid_mem)[i]);
367 sid_copy(sid, &domain->sid);
368 sid_append_rid(sid, rids[i]);
369 sids[i] = sid;
372 result = lookup_sids(mem_ctx, num_members, sids, 1,
373 &lsa_domains, &lsa_names);
374 if (!NT_STATUS_IS_OK(result)) {
375 return result;
378 num_mapped = 0;
379 for (i=0; i<num_members; i++) {
380 if (lsa_names[i].type != SID_NAME_USER) {
381 DEBUG(2, ("Got %s as group member -- ignoring\n",
382 sid_type_lookup(lsa_names[i].type)));
383 continue;
385 (*names)[i] = talloc_steal((*names),
386 lsa_names[i].name);
387 (*name_types)[i] = lsa_names[i].type;
389 num_mapped += 1;
392 *num_names = num_mapped;
394 return NT_STATUS_OK;
397 /* find the sequence number for a domain */
398 static NTSTATUS sequence_number(struct winbindd_domain *domain, uint32 *seq)
400 BOOL result;
401 time_t seq_num;
403 result = pdb_get_seq_num(&seq_num);
404 if (!result) {
405 *seq = 1;
408 *seq = (int) seq_num;
409 /* *seq = 1; */
410 return NT_STATUS_OK;
413 static NTSTATUS lockout_policy(struct winbindd_domain *domain,
414 TALLOC_CTX *mem_ctx,
415 SAM_UNK_INFO_12 *lockout_policy)
417 /* actually we have that */
418 return NT_STATUS_NOT_IMPLEMENTED;
421 static NTSTATUS password_policy(struct winbindd_domain *domain,
422 TALLOC_CTX *mem_ctx,
423 SAM_UNK_INFO_1 *password_policy)
425 /* actually we have that */
426 return NT_STATUS_NOT_IMPLEMENTED;
429 /* get a list of trusted domains */
430 static NTSTATUS trusted_domains(struct winbindd_domain *domain,
431 TALLOC_CTX *mem_ctx,
432 uint32 *num_domains,
433 char ***names,
434 char ***alt_names,
435 DOM_SID **dom_sids)
437 NTSTATUS nt_status;
438 struct trustdom_info **domains;
439 int i;
441 *num_domains = 0;
442 *names = NULL;
443 *alt_names = NULL;
444 *dom_sids = NULL;
446 nt_status = secrets_trusted_domains(mem_ctx, num_domains,
447 &domains);
448 if (!NT_STATUS_IS_OK(nt_status)) {
449 return nt_status;
452 *names = TALLOC_ARRAY(mem_ctx, char *, *num_domains);
453 *alt_names = TALLOC_ARRAY(mem_ctx, char *, *num_domains);
454 *dom_sids = TALLOC_ARRAY(mem_ctx, DOM_SID, *num_domains);
456 if ((*alt_names == NULL) || (*names == NULL) || (*dom_sids == NULL)) {
457 return NT_STATUS_NO_MEMORY;
460 for (i=0; i<*num_domains; i++) {
461 (*alt_names)[i] = NULL;
462 (*names)[i] = talloc_steal((*names), domains[i]->name);
463 sid_copy(&(*dom_sids)[i], &domains[i]->sid);
466 return NT_STATUS_OK;
469 /* the rpc backend methods are exposed via this structure */
470 struct winbindd_methods passdb_methods = {
471 False,
472 query_user_list,
473 enum_dom_groups,
474 enum_local_groups,
475 name_to_sid,
476 sid_to_name,
477 query_user,
478 lookup_usergroups,
479 lookup_useraliases,
480 lookup_groupmem,
481 sequence_number,
482 lockout_policy,
483 password_policy,
484 trusted_domains,