2 Unix SMB/CIFS implementation.
4 Winbind daemon - sid related functions
6 Copyright (C) Tim Potter 2000
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 #define DBGC_CLASS DBGC_WINBIND
29 /* Convert a string */
31 static void lookupsid_recv(void *private_data
, BOOL success
,
32 const char *dom_name
, const char *name
,
33 enum lsa_SidType type
);
35 void winbindd_lookupsid(struct winbindd_cli_state
*state
)
39 /* Ensure null termination */
40 state
->request
.data
.sid
[sizeof(state
->request
.data
.sid
)-1]='\0';
42 DEBUG(3, ("[%5lu]: lookupsid %s\n", (unsigned long)state
->pid
,
43 state
->request
.data
.sid
));
45 if (!string_to_sid(&sid
, state
->request
.data
.sid
)) {
46 DEBUG(5, ("%s not a SID\n", state
->request
.data
.sid
));
51 winbindd_lookupsid_async(state
->mem_ctx
, &sid
, lookupsid_recv
, state
);
54 static void lookupsid_recv(void *private_data
, BOOL success
,
55 const char *dom_name
, const char *name
,
56 enum lsa_SidType type
)
58 struct winbindd_cli_state
*state
=
59 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
62 DEBUG(5, ("lookupsid returned an error\n"));
67 fstrcpy(state
->response
.data
.name
.dom_name
, dom_name
);
68 fstrcpy(state
->response
.data
.name
.name
, name
);
69 state
->response
.data
.name
.type
= type
;
74 * Look up the SID for a qualified name.
77 static void lookupname_recv(void *private_data
, BOOL success
,
78 const DOM_SID
*sid
, enum lsa_SidType type
);
80 void winbindd_lookupname(struct winbindd_cli_state
*state
)
82 char *name_domain
, *name_user
;
85 /* Ensure null termination */
86 state
->request
.data
.name
.dom_name
[sizeof(state
->request
.data
.name
.dom_name
)-1]='\0';
88 /* Ensure null termination */
89 state
->request
.data
.name
.name
[sizeof(state
->request
.data
.name
.name
)-1]='\0';
91 /* cope with the name being a fully qualified name */
92 p
= strstr(state
->request
.data
.name
.name
, lp_winbind_separator());
95 name_domain
= state
->request
.data
.name
.name
;
98 name_domain
= state
->request
.data
.name
.dom_name
;
99 name_user
= state
->request
.data
.name
.name
;
102 DEBUG(3, ("[%5lu]: lookupname %s%s%s\n", (unsigned long)state
->pid
,
103 name_domain
, lp_winbind_separator(), name_user
));
105 winbindd_lookupname_async(state
->mem_ctx
, name_domain
, name_user
,
106 lookupname_recv
, state
);
109 static void lookupname_recv(void *private_data
, BOOL success
,
110 const DOM_SID
*sid
, enum lsa_SidType type
)
112 struct winbindd_cli_state
*state
=
113 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
116 DEBUG(5, ("lookupname returned an error\n"));
117 request_error(state
);
121 sid_to_string(state
->response
.data
.sid
.sid
, sid
);
122 state
->response
.data
.sid
.type
= type
;
127 void winbindd_lookuprids(struct winbindd_cli_state
*state
)
129 struct winbindd_domain
*domain
;
132 /* Ensure null termination */
133 state
->request
.data
.sid
[sizeof(state
->request
.data
.sid
)-1]='\0';
135 DEBUG(10, ("lookup_rids: %s\n", state
->request
.data
.sid
));
137 if (!string_to_sid(&domain_sid
, state
->request
.data
.sid
)) {
138 DEBUG(5, ("Could not convert %s to SID\n",
139 state
->request
.data
.sid
));
140 request_error(state
);
144 domain
= find_lookup_domain_from_sid(&domain_sid
);
145 if (domain
== NULL
) {
146 DEBUG(10, ("Could not find domain for name %s\n",
147 state
->request
.domain_name
));
148 request_error(state
);
152 sendto_domain(state
, domain
);
155 static struct winbindd_child static_idmap_child
;
157 void init_idmap_child(void)
159 setup_domain_child(NULL
, &static_idmap_child
, "idmap");
162 struct winbindd_child
*idmap_child(void)
164 return &static_idmap_child
;
167 /* Convert a sid to a uid. We assume we only have one rid attached to the
170 static void sid2uid_recv(void *private_data
, BOOL success
, uid_t uid
)
172 struct winbindd_cli_state
*state
=
173 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
176 DEBUG(5, ("Could not convert sid %s\n",
177 state
->request
.data
.sid
));
178 request_error(state
);
182 state
->response
.data
.uid
= uid
;
186 static void sid2uid_lookupsid_recv( void *private_data
, BOOL success
,
187 const char *domain_name
,
189 enum lsa_SidType type
)
191 struct winbindd_cli_state
*state
=
192 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
196 DEBUG(5, ("sid2uid_lookupsid_recv Could not convert get sid type for %s\n",
197 state
->request
.data
.sid
));
198 request_error(state
);
202 if ( (type
!=SID_NAME_USER
) && (type
!=SID_NAME_COMPUTER
) ) {
203 DEBUG(5,("sid2uid_lookupsid_recv: Sid %s is not a user or a computer.\n",
204 state
->request
.data
.sid
));
205 request_error(state
);
209 if (!string_to_sid(&sid
, state
->request
.data
.sid
)) {
210 DEBUG(1, ("sid2uid_lookupsid_recv: Could not get convert sid %s from string\n",
211 state
->request
.data
.sid
));
212 request_error(state
);
216 /* always use the async interface (may block) */
217 winbindd_sid2uid_async(state
->mem_ctx
, &sid
, sid2uid_recv
, state
);
220 void winbindd_sid_to_uid(struct winbindd_cli_state
*state
)
224 /* Ensure null termination */
225 state
->request
.data
.sid
[sizeof(state
->request
.data
.sid
)-1]='\0';
227 DEBUG(3, ("[%5lu]: sid to uid %s\n", (unsigned long)state
->pid
,
228 state
->request
.data
.sid
));
230 if (!string_to_sid(&sid
, state
->request
.data
.sid
)) {
231 DEBUG(1, ("Could not get convert sid %s from string\n",
232 state
->request
.data
.sid
));
233 request_error(state
);
237 /* Validate the SID as a user. Hopefully this will hit cache.
238 Needed to prevent DoS by exhausting the uid allocation
239 range from random SIDs. */
241 winbindd_lookupsid_async( state
->mem_ctx
, &sid
, sid2uid_lookupsid_recv
, state
);
244 /* Convert a sid to a gid. We assume we only have one rid attached to the
247 static void sid2gid_recv(void *private_data
, BOOL success
, gid_t gid
)
249 struct winbindd_cli_state
*state
=
250 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
253 DEBUG(5, ("Could not convert sid %s\n",
254 state
->request
.data
.sid
));
255 request_error(state
);
259 state
->response
.data
.gid
= gid
;
263 static void sid2gid_lookupsid_recv( void *private_data
, BOOL success
,
264 const char *domain_name
,
266 enum lsa_SidType type
)
268 struct winbindd_cli_state
*state
=
269 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
273 DEBUG(5, ("sid2gid_lookupsid_recv: Could not convert get sid type for %s\n",
274 state
->request
.data
.sid
));
275 request_error(state
);
279 if ( (type
!=SID_NAME_DOM_GRP
) &&
280 (type
!=SID_NAME_ALIAS
) &&
281 (type
!=SID_NAME_WKN_GRP
) )
283 DEBUG(5,("sid2gid_lookupsid_recv: Sid %s is not a group.\n",
284 state
->request
.data
.sid
));
285 request_error(state
);
289 if (!string_to_sid(&sid
, state
->request
.data
.sid
)) {
290 DEBUG(1, ("sid2gid_lookupsid_recv: Could not get convert sid %s from string\n",
291 state
->request
.data
.sid
));
292 request_error(state
);
296 /* always use the async interface (may block) */
297 winbindd_sid2gid_async(state
->mem_ctx
, &sid
, sid2gid_recv
, state
);
300 void winbindd_sid_to_gid(struct winbindd_cli_state
*state
)
304 /* Ensure null termination */
305 state
->request
.data
.sid
[sizeof(state
->request
.data
.sid
)-1]='\0';
307 DEBUG(3, ("[%5lu]: sid to gid %s\n", (unsigned long)state
->pid
,
308 state
->request
.data
.sid
));
310 if (!string_to_sid(&sid
, state
->request
.data
.sid
)) {
311 DEBUG(1, ("Could not get convert sid %s from string\n",
312 state
->request
.data
.sid
));
313 request_error(state
);
317 /* Validate the SID as a group. Hopefully this will hit cache.
318 Needed to prevent DoS by exhausting the uid allocation
319 range from random SIDs. */
321 winbindd_lookupsid_async( state
->mem_ctx
, &sid
, sid2gid_lookupsid_recv
, state
);
324 static void sids2xids_recv(void *private_data
, BOOL success
, void *data
, int len
)
326 struct winbindd_cli_state
*state
=
327 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
330 DEBUG(5, ("Could not convert sids to xids\n"));
331 request_error(state
);
335 state
->response
.extra_data
.data
= data
;
336 state
->response
.length
= sizeof(state
->response
) + len
;
340 void winbindd_sids_to_unixids(struct winbindd_cli_state
*state
)
342 DEBUG(3, ("[%5lu]: sids to xids\n", (unsigned long)state
->pid
));
344 winbindd_sids2xids_async(state
->mem_ctx
,
345 state
->request
.extra_data
.data
,
346 state
->request
.extra_len
,
347 sids2xids_recv
, state
);
350 static void set_mapping_recv(void *private_data
, BOOL success
)
352 struct winbindd_cli_state
*state
=
353 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
356 DEBUG(5, ("Could not set sid mapping\n"));
357 request_error(state
);
364 void winbindd_set_mapping(struct winbindd_cli_state
*state
)
369 DEBUG(3, ("[%5lu]: set id map\n", (unsigned long)state
->pid
));
371 if ( ! state
->privileged
) {
372 DEBUG(0, ("Only root is allowed to set mappings!\n"));
373 request_error(state
);
377 if (!string_to_sid(&sid
, state
->request
.data
.dual_idmapset
.sid
)) {
378 DEBUG(1, ("Could not get convert sid %s from string\n",
379 state
->request
.data
.sid
));
380 request_error(state
);
385 map
.xid
.id
= state
->request
.data
.dual_idmapset
.id
;
386 map
.xid
.type
= state
->request
.data
.dual_idmapset
.type
;
388 winbindd_set_mapping_async(state
->mem_ctx
, &map
,
389 set_mapping_recv
, state
);
392 static void set_hwm_recv(void *private_data
, BOOL success
)
394 struct winbindd_cli_state
*state
=
395 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
398 DEBUG(5, ("Could not set sid mapping\n"));
399 request_error(state
);
406 void winbindd_set_hwm(struct winbindd_cli_state
*state
)
410 DEBUG(3, ("[%5lu]: set hwm\n", (unsigned long)state
->pid
));
412 if ( ! state
->privileged
) {
413 DEBUG(0, ("Only root is allowed to set mappings!\n"));
414 request_error(state
);
418 xid
.id
= state
->request
.data
.dual_idmapset
.id
;
419 xid
.type
= state
->request
.data
.dual_idmapset
.type
;
421 winbindd_set_hwm_async(state
->mem_ctx
, &xid
, set_hwm_recv
, state
);
424 /* Convert a uid to a sid */
426 static void uid2sid_recv(void *private_data
, BOOL success
, const char *sid
)
428 struct winbindd_cli_state
*state
=
429 (struct winbindd_cli_state
*)private_data
;
432 DEBUG(10,("uid2sid: uid %lu has sid %s\n",
433 (unsigned long)(state
->request
.data
.uid
), sid
));
434 fstrcpy(state
->response
.data
.sid
.sid
, sid
);
435 state
->response
.data
.sid
.type
= SID_NAME_USER
;
440 request_error(state
);
444 void winbindd_uid_to_sid(struct winbindd_cli_state
*state
)
446 DEBUG(3, ("[%5lu]: uid to sid %lu\n", (unsigned long)state
->pid
,
447 (unsigned long)state
->request
.data
.uid
));
449 /* always go via the async interface (may block) */
450 winbindd_uid2sid_async(state
->mem_ctx
, state
->request
.data
.uid
, uid2sid_recv
, state
);
453 /* Convert a gid to a sid */
455 static void gid2sid_recv(void *private_data
, BOOL success
, const char *sid
)
457 struct winbindd_cli_state
*state
=
458 (struct winbindd_cli_state
*)private_data
;
461 DEBUG(10,("gid2sid: gid %lu has sid %s\n",
462 (unsigned long)(state
->request
.data
.gid
), sid
));
463 fstrcpy(state
->response
.data
.sid
.sid
, sid
);
464 state
->response
.data
.sid
.type
= SID_NAME_DOM_GRP
;
469 request_error(state
);
474 void winbindd_gid_to_sid(struct winbindd_cli_state
*state
)
476 DEBUG(3, ("[%5lu]: gid to sid %lu\n", (unsigned long)state
->pid
,
477 (unsigned long)state
->request
.data
.gid
));
479 /* always use async calls (may block) */
480 winbindd_gid2sid_async(state
->mem_ctx
, state
->request
.data
.gid
, gid2sid_recv
, state
);
483 void winbindd_allocate_uid(struct winbindd_cli_state
*state
)
485 if ( !state
->privileged
) {
486 DEBUG(2, ("winbindd_allocate_uid: non-privileged access "
488 request_error(state
);
492 sendto_child(state
, idmap_child());
495 enum winbindd_result
winbindd_dual_allocate_uid(struct winbindd_domain
*domain
,
496 struct winbindd_cli_state
*state
)
500 if (!NT_STATUS_IS_OK(idmap_allocate_uid(&xid
))) {
501 return WINBINDD_ERROR
;
503 state
->response
.data
.uid
= xid
.id
;
507 void winbindd_allocate_gid(struct winbindd_cli_state
*state
)
509 if ( !state
->privileged
) {
510 DEBUG(2, ("winbindd_allocate_gid: non-privileged access "
512 request_error(state
);
516 sendto_child(state
, idmap_child());
519 enum winbindd_result
winbindd_dual_allocate_gid(struct winbindd_domain
*domain
,
520 struct winbindd_cli_state
*state
)
524 if (!NT_STATUS_IS_OK(idmap_allocate_gid(&xid
))) {
525 return WINBINDD_ERROR
;
527 state
->response
.data
.gid
= xid
.id
;
531 static void dump_maps_recv(void *private_data
, BOOL success
)
533 struct winbindd_cli_state
*state
=
534 talloc_get_type_abort(private_data
, struct winbindd_cli_state
);
537 DEBUG(5, ("Could not dump maps\n"));
538 request_error(state
);
545 void winbindd_dump_maps(struct winbindd_cli_state
*state
)
547 if ( ! state
->privileged
) {
548 DEBUG(0, ("Only root is allowed to ask for an idmap dump!\n"));
549 request_error(state
);
553 DEBUG(3, ("[%5lu]: dump maps\n", (unsigned long)state
->pid
));
555 winbindd_dump_maps_async(state
->mem_ctx
,
556 state
->request
.extra_data
.data
,
557 state
->request
.extra_len
,
558 dump_maps_recv
, state
);