libsmb: Use clistr_smb2_extract_snapshot_token() in cli_smb2_create_fnum_send()
[Samba.git] / source3 / winbindd / idmap_nss.c
blob2729a0de3f3133bc9316c6e12d84810460d91f9f
1 /*
2 Unix SMB/CIFS implementation.
4 idmap NSS backend
6 Copyright (C) Simo Sorce 2006
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "system/passwd.h"
24 #include "winbindd.h"
25 #include "nsswitch/winbind_client.h"
26 #include "idmap.h"
27 #include "lib/winbind_util.h"
28 #include "libcli/security/dom_sid.h"
30 #undef DBGC_CLASS
31 #define DBGC_CLASS DBGC_IDMAP
33 /*****************************
34 Initialise idmap database.
35 *****************************/
37 static NTSTATUS idmap_nss_int_init(struct idmap_domain *dom)
39 return NT_STATUS_OK;
42 /**********************************
43 lookup a set of unix ids.
44 **********************************/
46 static NTSTATUS idmap_nss_unixids_to_sids(struct idmap_domain *dom, struct id_map **ids)
48 int i;
50 /* initialize the status to avoid suprise */
51 for (i = 0; ids[i]; i++) {
52 ids[i]->status = ID_UNKNOWN;
55 for (i = 0; ids[i]; i++) {
56 struct passwd *pw;
57 struct group *gr;
58 const char *name;
59 struct dom_sid sid;
60 enum lsa_SidType type;
61 bool ret;
63 switch (ids[i]->xid.type) {
64 case ID_TYPE_UID:
65 pw = getpwuid((uid_t)ids[i]->xid.id);
67 if (!pw) {
68 ids[i]->status = ID_UNMAPPED;
69 continue;
71 name = pw->pw_name;
72 break;
73 case ID_TYPE_GID:
74 gr = getgrgid((gid_t)ids[i]->xid.id);
76 if (!gr) {
77 ids[i]->status = ID_UNMAPPED;
78 continue;
80 name = gr->gr_name;
81 break;
82 default: /* ?? */
83 ids[i]->status = ID_UNKNOWN;
84 continue;
87 /* by default calls to winbindd are disabled
88 the following call will not recurse so this is safe */
89 (void)winbind_on();
90 /* Lookup name from PDC using lsa_lookup_names() */
91 ret = winbind_lookup_name(dom->name, name, &sid, &type);
92 (void)winbind_off();
94 if (!ret) {
95 /* TODO: how do we know if the name is really not mapped,
96 * or something just failed ? */
97 ids[i]->status = ID_UNMAPPED;
98 continue;
101 switch (type) {
102 case SID_NAME_USER:
103 if (ids[i]->xid.type == ID_TYPE_UID) {
104 sid_copy(ids[i]->sid, &sid);
105 ids[i]->status = ID_MAPPED;
107 break;
109 case SID_NAME_DOM_GRP:
110 case SID_NAME_ALIAS:
111 case SID_NAME_WKN_GRP:
112 if (ids[i]->xid.type == ID_TYPE_GID) {
113 sid_copy(ids[i]->sid, &sid);
114 ids[i]->status = ID_MAPPED;
116 break;
118 default:
119 ids[i]->status = ID_UNKNOWN;
120 break;
123 return NT_STATUS_OK;
126 /**********************************
127 lookup a set of sids.
128 **********************************/
130 static NTSTATUS idmap_nss_sids_to_unixids(struct idmap_domain *dom, struct id_map **ids)
132 int i;
134 /* initialize the status to avoid suprise */
135 for (i = 0; ids[i]; i++) {
136 ids[i]->status = ID_UNKNOWN;
139 for (i = 0; ids[i]; i++) {
140 struct group *gr;
141 enum lsa_SidType type;
142 const char *_domain = NULL;
143 const char *_name = NULL;
144 char *domain = NULL;
145 char *name = NULL;
146 bool ret;
148 /* by default calls to winbindd are disabled
149 the following call will not recurse so this is safe */
150 (void)winbind_on();
151 ret = winbind_lookup_sid(talloc_tos(),
152 ids[i]->sid,
153 &_domain,
154 &_name,
155 &type);
156 (void)winbind_off();
157 if (!ret) {
158 /* TODO: how do we know if the name is really not mapped,
159 * or something just failed ? */
160 ids[i]->status = ID_UNMAPPED;
161 continue;
164 domain = discard_const_p(char, _domain);
165 name = discard_const_p(char, _name);
167 if (!strequal(domain, dom->name)) {
168 struct dom_sid_buf buf;
169 DBG_ERR("DOMAIN[%s] ignoring SID[%s] belongs to %s [%s\\%s]\n",
170 dom->name, dom_sid_str_buf(ids[i]->sid, &buf),
171 sid_type_lookup(type), domain, name);
172 ids[i]->status = ID_UNMAPPED;
173 continue;
176 switch (type) {
177 case SID_NAME_USER: {
178 struct passwd *pw;
180 /* this will find also all lower case name and use username level */
182 pw = Get_Pwnam_alloc(talloc_tos(), name);
183 if (pw) {
184 ids[i]->xid.id = pw->pw_uid;
185 ids[i]->xid.type = ID_TYPE_UID;
186 ids[i]->status = ID_MAPPED;
188 TALLOC_FREE(pw);
189 break;
192 case SID_NAME_DOM_GRP:
193 case SID_NAME_ALIAS:
194 case SID_NAME_WKN_GRP:
196 gr = getgrnam(name);
197 if (gr) {
198 ids[i]->xid.id = gr->gr_gid;
199 ids[i]->xid.type = ID_TYPE_GID;
200 ids[i]->status = ID_MAPPED;
202 break;
204 default:
205 ids[i]->status = ID_UNKNOWN;
206 break;
208 TALLOC_FREE(domain);
209 TALLOC_FREE(name);
211 return NT_STATUS_OK;
214 /**********************************
215 Close the idmap tdb instance
216 **********************************/
218 static const struct idmap_methods nss_methods = {
219 .init = idmap_nss_int_init,
220 .unixids_to_sids = idmap_nss_unixids_to_sids,
221 .sids_to_unixids = idmap_nss_sids_to_unixids,
224 NTSTATUS idmap_nss_init(TALLOC_CTX *mem_ctx)
226 return smb_register_idmap(SMB_IDMAP_INTERFACE_VERSION, "nss", &nss_methods);