2 Unix SMB/CIFS implementation.
3 Password and authentication handling
4 Copyright (C) Andrew Bartlett 2002
5 Copyright (C) Jelmer Vernooij 2002
6 Copyright (C) Simo Sorce 2003
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 #define DBGC_CLASS DBGC_PASSDB
28 static struct pdb_init_function_entry
*backends
= NULL
;
30 static void lazy_initialize_passdb(void)
32 static BOOL initialized
= False
;
33 if(initialized
)return;
38 static struct pdb_init_function_entry
*pdb_find_backend_entry(const char *name
);
40 /*******************************************************************
41 Clean up uninitialised passwords. The only way to tell
42 that these values are not 'real' is that they do not
43 have a valid last set time. Instead, the value is fixed at 0.
44 Therefore we use that as the key for 'is this a valid password'.
45 However, it is perfectly valid to have a 'default' last change
46 time, such LDAP with a missing attribute would produce.
47 ********************************************************************/
49 static void pdb_force_pw_initialization(SAM_ACCOUNT
*pass
)
51 const uint8
*lm_pwd
, *nt_pwd
;
53 /* only reset a password if the last set time has been
54 explicitly been set to zero. A default last set time
57 if ( (pdb_get_init_flags(pass
, PDB_PASSLASTSET
) != PDB_DEFAULT
)
58 && (pdb_get_pass_last_set_time(pass
) == 0) )
61 if (pdb_get_init_flags(pass
, PDB_LMPASSWD
) != PDB_DEFAULT
)
63 lm_pwd
= pdb_get_lanman_passwd(pass
);
65 pdb_set_lanman_passwd(pass
, NULL
, PDB_CHANGED
);
67 if (pdb_get_init_flags(pass
, PDB_NTPASSWD
) != PDB_DEFAULT
)
69 nt_pwd
= pdb_get_nt_passwd(pass
);
71 pdb_set_nt_passwd(pass
, NULL
, PDB_CHANGED
);
78 NTSTATUS
smb_register_passdb(int version
, const char *name
, pdb_init_function init
)
80 struct pdb_init_function_entry
*entry
= backends
;
82 if(version
!= PASSDB_INTERFACE_VERSION
) {
83 DEBUG(0,("Can't register passdb backend!\n"
84 "You tried to register a passdb module with PASSDB_INTERFACE_VERSION %d, "
85 "while this version of samba uses version %d\n",
86 version
,PASSDB_INTERFACE_VERSION
));
87 return NT_STATUS_OBJECT_TYPE_MISMATCH
;
91 return NT_STATUS_INVALID_PARAMETER
;
94 DEBUG(5,("Attempting to register passdb backend %s\n", name
));
96 /* Check for duplicates */
97 if (pdb_find_backend_entry(name
)) {
98 DEBUG(0,("There already is a passdb backend registered with the name %s!\n", name
));
99 return NT_STATUS_OBJECT_NAME_COLLISION
;
102 entry
= SMB_XMALLOC_P(struct pdb_init_function_entry
);
103 entry
->name
= smb_xstrdup(name
);
106 DLIST_ADD(backends
, entry
);
107 DEBUG(5,("Successfully added passdb backend '%s'\n", name
));
111 static struct pdb_init_function_entry
*pdb_find_backend_entry(const char *name
)
113 struct pdb_init_function_entry
*entry
= backends
;
116 if (strcmp(entry
->name
, name
)==0) return entry
;
123 static NTSTATUS
context_setsampwent(struct pdb_context
*context
, BOOL update
, uint16 acb_mask
)
125 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
128 DEBUG(0, ("invalid pdb_context specified!\n"));
132 context
->pwent_methods
= context
->pdb_methods
;
134 if (!context
->pwent_methods
) {
135 /* No passdbs at all */
139 while (NT_STATUS_IS_ERR(ret
= context
->pwent_methods
->setsampwent(context
->pwent_methods
, update
, acb_mask
))) {
140 context
->pwent_methods
= context
->pwent_methods
->next
;
141 if (context
->pwent_methods
== NULL
)
142 return NT_STATUS_UNSUCCESSFUL
;
147 static void context_endsampwent(struct pdb_context
*context
)
150 DEBUG(0, ("invalid pdb_context specified!\n"));
154 if (context
->pwent_methods
&& context
->pwent_methods
->endsampwent
)
155 context
->pwent_methods
->endsampwent(context
->pwent_methods
);
157 /* So we won't get strange data when calling getsampwent now */
158 context
->pwent_methods
= NULL
;
161 static NTSTATUS
context_getsampwent(struct pdb_context
*context
, SAM_ACCOUNT
*user
)
163 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
165 if ((!context
) || (!context
->pwent_methods
)) {
166 DEBUG(0, ("invalid pdb_context specified!\n"));
169 /* Loop until we find something useful */
170 while (NT_STATUS_IS_ERR(ret
= context
->pwent_methods
->getsampwent(context
->pwent_methods
, user
))) {
172 context
->pwent_methods
->endsampwent(context
->pwent_methods
);
174 context
->pwent_methods
= context
->pwent_methods
->next
;
176 /* All methods are checked now. There are no more entries */
177 if (context
->pwent_methods
== NULL
)
180 context
->pwent_methods
->setsampwent(context
->pwent_methods
, False
, 0);
182 user
->methods
= context
->pwent_methods
;
183 pdb_force_pw_initialization(user
);
187 static NTSTATUS
context_getsampwnam(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
, const char *username
)
189 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
191 struct pdb_methods
*curmethods
;
193 DEBUG(0, ("invalid pdb_context specified!\n"));
196 curmethods
= context
->pdb_methods
;
198 if (NT_STATUS_IS_OK(ret
= curmethods
->getsampwnam(curmethods
, sam_acct
, username
))) {
199 pdb_force_pw_initialization(sam_acct
);
200 sam_acct
->methods
= curmethods
;
203 curmethods
= curmethods
->next
;
209 static NTSTATUS
context_getsampwsid(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
, const DOM_SID
*sid
)
211 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
213 struct pdb_methods
*curmethods
;
215 DEBUG(0, ("invalid pdb_context specified!\n"));
219 curmethods
= context
->pdb_methods
;
222 if (NT_STATUS_IS_OK(ret
= curmethods
->getsampwsid(curmethods
, sam_acct
, sid
))) {
223 pdb_force_pw_initialization(sam_acct
);
224 sam_acct
->methods
= curmethods
;
227 curmethods
= curmethods
->next
;
233 static NTSTATUS
context_add_sam_account(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
)
235 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
236 const uint8
*lm_pw
, *nt_pw
;
239 if ((!context
) || (!context
->pdb_methods
)) {
240 DEBUG(0, ("invalid pdb_context specified!\n"));
244 /* disable acccounts with no passwords (that has not
245 been allowed by the ACB_PWNOTREQ bit */
247 lm_pw
= pdb_get_lanman_passwd( sam_acct
);
248 nt_pw
= pdb_get_nt_passwd( sam_acct
);
249 acb_flags
= pdb_get_acct_ctrl( sam_acct
);
250 if ( !lm_pw
&& !nt_pw
&& !(acb_flags
&ACB_PWNOTREQ
) ) {
251 acb_flags
|= ACB_DISABLED
;
252 pdb_set_acct_ctrl( sam_acct
, acb_flags
, PDB_CHANGED
);
255 /** @todo This is where a 're-read on add' should be done */
256 /* We now add a new account to the first database listed.
259 return context
->pdb_methods
->add_sam_account(context
->pdb_methods
, sam_acct
);
262 static NTSTATUS
context_update_sam_account(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
)
264 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
265 const uint8
*lm_pw
, *nt_pw
;
269 DEBUG(0, ("invalid pdb_context specified!\n"));
273 if (!sam_acct
|| !sam_acct
->methods
){
274 DEBUG(0, ("invalid sam_acct specified\n"));
278 /* disable acccounts with no passwords (that has not
279 been allowed by the ACB_PWNOTREQ bit */
281 lm_pw
= pdb_get_lanman_passwd( sam_acct
);
282 nt_pw
= pdb_get_nt_passwd( sam_acct
);
283 acb_flags
= pdb_get_acct_ctrl( sam_acct
);
284 if ( !lm_pw
&& !nt_pw
&& !(acb_flags
&ACB_PWNOTREQ
) ) {
285 acb_flags
|= ACB_DISABLED
;
286 pdb_set_acct_ctrl( sam_acct
, acb_flags
, PDB_CHANGED
);
289 /** @todo This is where a 're-read on update' should be done */
291 return sam_acct
->methods
->update_sam_account(sam_acct
->methods
, sam_acct
);
294 static NTSTATUS
context_delete_sam_account(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
)
296 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
298 struct pdb_methods
*pdb_selected
;
300 DEBUG(0, ("invalid pdb_context specified!\n"));
304 if (!sam_acct
->methods
){
305 pdb_selected
= context
->pdb_methods
;
306 /* There's no passdb backend specified for this account.
307 * Try to delete it in every passdb available
308 * Needed to delete accounts in smbpasswd that are not
311 while (pdb_selected
){
312 if (NT_STATUS_IS_OK(ret
= pdb_selected
->delete_sam_account(pdb_selected
, sam_acct
))) {
315 pdb_selected
= pdb_selected
->next
;
320 if (!sam_acct
->methods
->delete_sam_account
){
321 DEBUG(0,("invalid sam_acct->methods->delete_sam_account\n"));
325 return sam_acct
->methods
->delete_sam_account(sam_acct
->methods
, sam_acct
);
328 static NTSTATUS
context_rename_sam_account(struct pdb_context
*context
, SAM_ACCOUNT
*oldname
, const char *newname
)
330 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
332 struct pdb_methods
*pdb_selected
;
334 DEBUG(0, ("invalid pdb_context specified!\n"));
338 if (!oldname
->methods
){
339 pdb_selected
= context
->pdb_methods
;
340 /* There's no passdb backend specified for this account.
341 * Try to delete it in every passdb available
342 * Needed to delete accounts in smbpasswd that are not
345 while (pdb_selected
){
346 if (NT_STATUS_IS_OK(ret
= pdb_selected
->rename_sam_account(pdb_selected
, oldname
, newname
))) {
349 pdb_selected
= pdb_selected
->next
;
354 if (!oldname
->methods
->rename_sam_account
){
355 DEBUG(0,("invalid oldname->methods->rename_sam_account\n"));
359 return oldname
->methods
->rename_sam_account(oldname
->methods
, oldname
, newname
);
363 static NTSTATUS
context_update_login_attempts(struct pdb_context
*context
,
364 SAM_ACCOUNT
*sam_acct
, BOOL success
)
366 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
369 DEBUG(0, ("invalid pdb_context specified!\n"));
373 if (!sam_acct
|| !sam_acct
->methods
){
374 DEBUG(0, ("invalid sam_acct specified\n"));
378 return sam_acct
->methods
->update_login_attempts(sam_acct
->methods
, sam_acct
, success
);
381 static NTSTATUS
context_getgrsid(struct pdb_context
*context
,
382 GROUP_MAP
*map
, DOM_SID sid
)
384 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
386 struct pdb_methods
*curmethods
;
388 DEBUG(0, ("invalid pdb_context specified!\n"));
391 curmethods
= context
->pdb_methods
;
393 ret
= curmethods
->getgrsid(curmethods
, map
, sid
);
394 if (NT_STATUS_IS_OK(ret
)) {
395 map
->methods
= curmethods
;
398 curmethods
= curmethods
->next
;
404 static NTSTATUS
context_getgrgid(struct pdb_context
*context
,
405 GROUP_MAP
*map
, gid_t gid
)
407 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
409 struct pdb_methods
*curmethods
;
411 DEBUG(0, ("invalid pdb_context specified!\n"));
414 curmethods
= context
->pdb_methods
;
416 ret
= curmethods
->getgrgid(curmethods
, map
, gid
);
417 if (NT_STATUS_IS_OK(ret
)) {
418 map
->methods
= curmethods
;
421 curmethods
= curmethods
->next
;
427 static NTSTATUS
context_getgrnam(struct pdb_context
*context
,
428 GROUP_MAP
*map
, const char *name
)
430 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
432 struct pdb_methods
*curmethods
;
434 DEBUG(0, ("invalid pdb_context specified!\n"));
437 curmethods
= context
->pdb_methods
;
439 ret
= curmethods
->getgrnam(curmethods
, map
, name
);
440 if (NT_STATUS_IS_OK(ret
)) {
441 map
->methods
= curmethods
;
444 curmethods
= curmethods
->next
;
450 static NTSTATUS
context_add_group_mapping_entry(struct pdb_context
*context
,
453 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
455 if ((!context
) || (!context
->pdb_methods
)) {
456 DEBUG(0, ("invalid pdb_context specified!\n"));
460 return context
->pdb_methods
->add_group_mapping_entry(context
->pdb_methods
,
464 static NTSTATUS
context_update_group_mapping_entry(struct pdb_context
*context
,
467 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
469 if ((!context
) || (!context
->pdb_methods
)) {
470 DEBUG(0, ("invalid pdb_context specified!\n"));
475 pdb_methods
->update_group_mapping_entry(context
->pdb_methods
, map
);
478 static NTSTATUS
context_delete_group_mapping_entry(struct pdb_context
*context
,
481 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
483 if ((!context
) || (!context
->pdb_methods
)) {
484 DEBUG(0, ("invalid pdb_context specified!\n"));
489 pdb_methods
->delete_group_mapping_entry(context
->pdb_methods
, sid
);
492 static NTSTATUS
context_enum_group_mapping(struct pdb_context
*context
,
493 enum SID_NAME_USE sid_name_use
,
494 GROUP_MAP
**pp_rmap
, size_t *p_num_entries
,
497 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
499 if ((!context
) || (!context
->pdb_methods
)) {
500 DEBUG(0, ("invalid pdb_context specified!\n"));
504 return context
->pdb_methods
->enum_group_mapping(context
->pdb_methods
,
505 sid_name_use
, pp_rmap
,
506 p_num_entries
, unix_only
);
509 static NTSTATUS
context_enum_group_members(struct pdb_context
*context
,
511 const DOM_SID
*group
,
512 uint32
**pp_member_rids
,
513 size_t *p_num_members
)
515 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
517 if ((!context
) || (!context
->pdb_methods
)) {
518 DEBUG(0, ("invalid pdb_context specified!\n"));
522 return context
->pdb_methods
->enum_group_members(context
->pdb_methods
,
528 static NTSTATUS
context_enum_group_memberships(struct pdb_context
*context
,
529 const char *username
,
531 DOM_SID
**pp_sids
, gid_t
**pp_gids
,
532 size_t *p_num_groups
)
534 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
536 if ((!context
) || (!context
->pdb_methods
)) {
537 DEBUG(0, ("invalid pdb_context specified!\n"));
541 return context
->pdb_methods
->
542 enum_group_memberships(context
->pdb_methods
, username
,
543 primary_gid
, pp_sids
, pp_gids
, p_num_groups
);
546 static NTSTATUS
context_find_alias(struct pdb_context
*context
,
547 const char *name
, DOM_SID
*sid
)
549 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
551 if ((!context
) || (!context
->pdb_methods
)) {
552 DEBUG(0, ("invalid pdb_context specified!\n"));
556 return context
->pdb_methods
->find_alias(context
->pdb_methods
,
560 static NTSTATUS
context_create_alias(struct pdb_context
*context
,
561 const char *name
, uint32
*rid
)
563 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
565 if ((!context
) || (!context
->pdb_methods
)) {
566 DEBUG(0, ("invalid pdb_context specified!\n"));
570 return context
->pdb_methods
->create_alias(context
->pdb_methods
,
574 static NTSTATUS
context_delete_alias(struct pdb_context
*context
,
577 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
579 if ((!context
) || (!context
->pdb_methods
)) {
580 DEBUG(0, ("invalid pdb_context specified!\n"));
584 return context
->pdb_methods
->delete_alias(context
->pdb_methods
, sid
);
587 static NTSTATUS
context_get_aliasinfo(struct pdb_context
*context
,
589 struct acct_info
*info
)
591 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
593 if ((!context
) || (!context
->pdb_methods
)) {
594 DEBUG(0, ("invalid pdb_context specified!\n"));
598 return context
->pdb_methods
->get_aliasinfo(context
->pdb_methods
,
602 static NTSTATUS
context_set_aliasinfo(struct pdb_context
*context
,
604 struct acct_info
*info
)
606 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
608 if ((!context
) || (!context
->pdb_methods
)) {
609 DEBUG(0, ("invalid pdb_context specified!\n"));
613 return context
->pdb_methods
->set_aliasinfo(context
->pdb_methods
,
617 static NTSTATUS
context_add_aliasmem(struct pdb_context
*context
,
618 const DOM_SID
*alias
,
619 const DOM_SID
*member
)
621 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
623 if ((!context
) || (!context
->pdb_methods
)) {
624 DEBUG(0, ("invalid pdb_context specified!\n"));
628 return context
->pdb_methods
->add_aliasmem(context
->pdb_methods
,
632 static NTSTATUS
context_del_aliasmem(struct pdb_context
*context
,
633 const DOM_SID
*alias
,
634 const DOM_SID
*member
)
636 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
638 if ((!context
) || (!context
->pdb_methods
)) {
639 DEBUG(0, ("invalid pdb_context specified!\n"));
643 return context
->pdb_methods
->del_aliasmem(context
->pdb_methods
,
647 static NTSTATUS
context_enum_aliasmem(struct pdb_context
*context
,
648 const DOM_SID
*alias
, DOM_SID
**pp_members
,
651 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
653 if ((!context
) || (!context
->pdb_methods
)) {
654 DEBUG(0, ("invalid pdb_context specified!\n"));
658 return context
->pdb_methods
->enum_aliasmem(context
->pdb_methods
,
659 alias
, pp_members
, p_num
);
662 static NTSTATUS
context_enum_alias_memberships(struct pdb_context
*context
,
664 const DOM_SID
*domain_sid
,
665 const DOM_SID
*members
,
667 uint32
**pp_alias_rids
,
668 size_t *p_num_alias_rids
)
670 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
672 if ((!context
) || (!context
->pdb_methods
)) {
673 DEBUG(0, ("invalid pdb_context specified!\n"));
677 return context
->pdb_methods
->
678 enum_alias_memberships(context
->pdb_methods
, mem_ctx
,
679 domain_sid
, members
, num_members
,
680 pp_alias_rids
, p_num_alias_rids
);
683 static NTSTATUS
context_lookup_rids(struct pdb_context
*context
,
685 const DOM_SID
*domain_sid
,
688 const char ***pp_names
,
691 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
693 if ((!context
) || (!context
->pdb_methods
)) {
694 DEBUG(0, ("invalid pdb_context specified!\n"));
698 return context
->pdb_methods
->lookup_rids(context
->pdb_methods
,
699 mem_ctx
, domain_sid
, num_rids
,
700 rids
, pp_names
, pp_attrs
);
703 static NTSTATUS
context_get_account_policy(struct pdb_context
*context
,
704 int policy_index
, uint32
*value
)
706 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
708 if ((!context
) || (!context
->pdb_methods
)) {
709 DEBUG(0, ("invalid pdb_context specified!\n"));
713 return context
->pdb_methods
->get_account_policy(context
->pdb_methods
,
714 policy_index
, value
);
717 static NTSTATUS
context_set_account_policy(struct pdb_context
*context
,
718 int policy_index
, uint32 value
)
720 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
722 if ((!context
) || (!context
->pdb_methods
)) {
723 DEBUG(0, ("invalid pdb_context specified!\n"));
727 return context
->pdb_methods
->set_account_policy(context
->pdb_methods
,
728 policy_index
, value
);
731 static NTSTATUS
context_get_seq_num(struct pdb_context
*context
, time_t *seq_num
)
733 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
735 if ((!context
) || (!context
->pdb_methods
)) {
736 DEBUG(0, ("invalid pdb_context specified!\n"));
740 return context
->pdb_methods
->get_seq_num(context
->pdb_methods
, seq_num
);
743 /******************************************************************
744 Free and cleanup a pdb context, any associated data and anything
745 that the attached modules might have associated.
746 *******************************************************************/
748 static void free_pdb_context(struct pdb_context
**context
)
750 struct pdb_methods
*pdb_selected
= (*context
)->pdb_methods
;
752 while (pdb_selected
){
753 if(pdb_selected
->free_private_data
)
754 pdb_selected
->free_private_data(&(pdb_selected
->private_data
));
755 pdb_selected
= pdb_selected
->next
;
758 talloc_destroy((*context
)->mem_ctx
);
762 static BOOL
context_search_users(struct pdb_context
*context
,
763 struct pdb_search
*search
, uint16 acct_flags
)
765 if ((!context
) || (!context
->pdb_methods
)) {
766 DEBUG(0, ("invalid pdb_context specified!\n"));
770 return context
->pdb_methods
->search_users(context
->pdb_methods
,
774 static BOOL
context_search_groups(struct pdb_context
*context
,
775 struct pdb_search
*search
)
777 if ((!context
) || (!context
->pdb_methods
)) {
778 DEBUG(0, ("invalid pdb_context specified!\n"));
782 return context
->pdb_methods
->search_groups(context
->pdb_methods
,
786 static BOOL
context_search_aliases(struct pdb_context
*context
,
787 struct pdb_search
*search
,
790 if ((!context
) || (!context
->pdb_methods
)) {
791 DEBUG(0, ("invalid pdb_context specified!\n"));
795 return context
->pdb_methods
->search_aliases(context
->pdb_methods
,
799 /******************************************************************
800 Make a pdb_methods from scratch
801 *******************************************************************/
803 static NTSTATUS
make_pdb_methods_name(struct pdb_methods
**methods
, struct pdb_context
*context
, const char *selected
)
805 char *module_name
= smb_xstrdup(selected
);
806 char *module_location
= NULL
, *p
;
807 struct pdb_init_function_entry
*entry
;
808 NTSTATUS nt_status
= NT_STATUS_UNSUCCESSFUL
;
810 lazy_initialize_passdb();
812 p
= strchr(module_name
, ':');
816 module_location
= p
+1;
817 trim_char(module_location
, ' ', ' ');
820 trim_char(module_name
, ' ', ' ');
823 DEBUG(5,("Attempting to find an passdb backend to match %s (%s)\n", selected
, module_name
));
825 entry
= pdb_find_backend_entry(module_name
);
827 /* Try to find a module that contains this module */
829 DEBUG(2,("No builtin backend found, trying to load plugin\n"));
830 if(NT_STATUS_IS_OK(smb_probe_module("pdb", module_name
)) && !(entry
= pdb_find_backend_entry(module_name
))) {
831 DEBUG(0,("Plugin is available, but doesn't register passdb backend %s\n", module_name
));
832 SAFE_FREE(module_name
);
833 return NT_STATUS_UNSUCCESSFUL
;
837 /* No such backend found */
839 DEBUG(0,("No builtin nor plugin backend for %s found\n", module_name
));
840 SAFE_FREE(module_name
);
841 return NT_STATUS_INVALID_PARAMETER
;
844 DEBUG(5,("Found pdb backend %s\n", module_name
));
845 nt_status
= entry
->init(context
, methods
, module_location
);
846 if (NT_STATUS_IS_OK(nt_status
)) {
847 DEBUG(5,("pdb backend %s has a valid init\n", selected
));
849 DEBUG(0,("pdb backend %s did not correctly init (error was %s)\n", selected
, nt_errstr(nt_status
)));
851 SAFE_FREE(module_name
);
855 /******************************************************************
856 Make a pdb_context from scratch.
857 *******************************************************************/
859 static NTSTATUS
make_pdb_context(struct pdb_context
**context
)
863 mem_ctx
= talloc_init("pdb_context internal allocation context");
866 DEBUG(0, ("make_pdb_context: talloc init failed!\n"));
867 return NT_STATUS_NO_MEMORY
;
870 *context
= TALLOC_P(mem_ctx
, struct pdb_context
);
872 DEBUG(0, ("make_pdb_context: talloc failed!\n"));
873 return NT_STATUS_NO_MEMORY
;
876 ZERO_STRUCTP(*context
);
878 (*context
)->mem_ctx
= mem_ctx
;
880 (*context
)->pdb_setsampwent
= context_setsampwent
;
881 (*context
)->pdb_endsampwent
= context_endsampwent
;
882 (*context
)->pdb_getsampwent
= context_getsampwent
;
883 (*context
)->pdb_getsampwnam
= context_getsampwnam
;
884 (*context
)->pdb_getsampwsid
= context_getsampwsid
;
885 (*context
)->pdb_add_sam_account
= context_add_sam_account
;
886 (*context
)->pdb_update_sam_account
= context_update_sam_account
;
887 (*context
)->pdb_delete_sam_account
= context_delete_sam_account
;
888 (*context
)->pdb_rename_sam_account
= context_rename_sam_account
;
889 (*context
)->pdb_update_login_attempts
= context_update_login_attempts
;
890 (*context
)->pdb_getgrsid
= context_getgrsid
;
891 (*context
)->pdb_getgrgid
= context_getgrgid
;
892 (*context
)->pdb_getgrnam
= context_getgrnam
;
893 (*context
)->pdb_add_group_mapping_entry
= context_add_group_mapping_entry
;
894 (*context
)->pdb_update_group_mapping_entry
= context_update_group_mapping_entry
;
895 (*context
)->pdb_delete_group_mapping_entry
= context_delete_group_mapping_entry
;
896 (*context
)->pdb_enum_group_mapping
= context_enum_group_mapping
;
897 (*context
)->pdb_enum_group_members
= context_enum_group_members
;
898 (*context
)->pdb_enum_group_memberships
= context_enum_group_memberships
;
900 (*context
)->pdb_find_alias
= context_find_alias
;
901 (*context
)->pdb_create_alias
= context_create_alias
;
902 (*context
)->pdb_delete_alias
= context_delete_alias
;
903 (*context
)->pdb_get_aliasinfo
= context_get_aliasinfo
;
904 (*context
)->pdb_set_aliasinfo
= context_set_aliasinfo
;
905 (*context
)->pdb_add_aliasmem
= context_add_aliasmem
;
906 (*context
)->pdb_del_aliasmem
= context_del_aliasmem
;
907 (*context
)->pdb_enum_aliasmem
= context_enum_aliasmem
;
908 (*context
)->pdb_enum_alias_memberships
= context_enum_alias_memberships
;
909 (*context
)->pdb_lookup_rids
= context_lookup_rids
;
911 (*context
)->pdb_get_account_policy
= context_get_account_policy
;
912 (*context
)->pdb_set_account_policy
= context_set_account_policy
;
914 (*context
)->pdb_get_seq_num
= context_get_seq_num
;
916 (*context
)->pdb_search_users
= context_search_users
;
917 (*context
)->pdb_search_groups
= context_search_groups
;
918 (*context
)->pdb_search_aliases
= context_search_aliases
;
920 (*context
)->free_fn
= free_pdb_context
;
926 /******************************************************************
927 Make a pdb_context, given an array of strings
928 *******************************************************************/
930 NTSTATUS
make_pdb_context_list(struct pdb_context
**context
, const char **selected
)
933 struct pdb_methods
*curmethods
, *tmpmethods
;
934 NTSTATUS nt_status
= NT_STATUS_UNSUCCESSFUL
;
935 BOOL have_guest
= False
;
937 if (!NT_STATUS_IS_OK(nt_status
= make_pdb_context(context
))) {
942 DEBUG(0, ("ERROR: empty passdb backend list!\n"));
947 if (strcmp(selected
[i
], "guest") == 0) {
950 /* Try to initialise pdb */
951 DEBUG(5,("Trying to load: %s\n", selected
[i
]));
952 if (!NT_STATUS_IS_OK(nt_status
= make_pdb_methods_name(&curmethods
, *context
, selected
[i
]))) {
953 DEBUG(1, ("Loading %s failed!\n", selected
[i
]));
954 free_pdb_context(context
);
957 curmethods
->parent
= *context
;
958 DLIST_ADD_END((*context
)->pdb_methods
, curmethods
, tmpmethods
);
965 if ( (lp_guestaccount() == NULL
) ||
966 (*lp_guestaccount() == '\0') ) {
967 /* We explicitly don't want guest access. No idea what
968 else that breaks, but be it that way. */
972 if (!NT_STATUS_IS_OK(nt_status
= make_pdb_methods_name(&curmethods
,
975 DEBUG(1, ("Loading guest module failed!\n"));
976 free_pdb_context(context
);
980 curmethods
->parent
= *context
;
981 DLIST_ADD_END((*context
)->pdb_methods
, curmethods
, tmpmethods
);
986 /******************************************************************
987 Make a pdb_context, given a text string.
988 *******************************************************************/
990 NTSTATUS
make_pdb_context_string(struct pdb_context
**context
, const char *selected
)
993 char **newsel
= str_list_make(selected
, NULL
);
994 ret
= make_pdb_context_list(context
, (const char **)newsel
);
995 str_list_free(&newsel
);
999 /******************************************************************
1000 Return an already initialised pdb_context, to facilitate backward
1001 compatibility (see functions below).
1002 *******************************************************************/
1004 static struct pdb_context
*pdb_get_static_context(BOOL reload
)
1006 static struct pdb_context
*pdb_context
= NULL
;
1008 if ((pdb_context
) && (reload
)) {
1009 pdb_context
->free_fn(&pdb_context
);
1010 if (!NT_STATUS_IS_OK(make_pdb_context_list(&pdb_context
, lp_passdb_backend()))) {
1016 if (!NT_STATUS_IS_OK(make_pdb_context_list(&pdb_context
, lp_passdb_backend()))) {
1024 /******************************************************************
1025 Backward compatibility functions for the original passdb interface
1026 *******************************************************************/
1028 BOOL
pdb_setsampwent(BOOL update
, uint16 acb_mask
)
1030 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1036 return NT_STATUS_IS_OK(pdb_context
->pdb_setsampwent(pdb_context
, update
, acb_mask
));
1039 void pdb_endsampwent(void)
1041 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1047 pdb_context
->pdb_endsampwent(pdb_context
);
1050 BOOL
pdb_getsampwent(SAM_ACCOUNT
*user
)
1052 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1058 return NT_STATUS_IS_OK(pdb_context
->pdb_getsampwent(pdb_context
, user
));
1061 static SAM_ACCOUNT
*sam_account_cache
= NULL
;
1063 BOOL
pdb_getsampwnam(SAM_ACCOUNT
*sam_acct
, const char *username
)
1065 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1071 if (!NT_STATUS_IS_OK(pdb_context
->pdb_getsampwnam(pdb_context
,
1072 sam_acct
, username
)))
1075 if (sam_account_cache
!= NULL
) {
1076 pdb_free_sam(&sam_account_cache
);
1077 sam_account_cache
= NULL
;
1080 pdb_copy_sam_account(sam_acct
, &sam_account_cache
);
1084 BOOL
pdb_getsampwsid(SAM_ACCOUNT
*sam_acct
, const DOM_SID
*sid
)
1086 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1092 if ((sam_account_cache
!= NULL
) &&
1093 (sid_equal(sid
, pdb_get_user_sid(sam_account_cache
))))
1094 return pdb_copy_sam_account(sam_account_cache
, &sam_acct
);
1096 return NT_STATUS_IS_OK(pdb_context
->pdb_getsampwsid(pdb_context
, sam_acct
, sid
));
1099 BOOL
pdb_add_sam_account(SAM_ACCOUNT
*sam_acct
)
1101 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1107 return NT_STATUS_IS_OK(pdb_context
->pdb_add_sam_account(pdb_context
, sam_acct
));
1110 BOOL
pdb_update_sam_account(SAM_ACCOUNT
*sam_acct
)
1112 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1118 if (sam_account_cache
!= NULL
) {
1119 pdb_free_sam(&sam_account_cache
);
1120 sam_account_cache
= NULL
;
1123 return NT_STATUS_IS_OK(pdb_context
->pdb_update_sam_account(pdb_context
, sam_acct
));
1126 BOOL
pdb_delete_sam_account(SAM_ACCOUNT
*sam_acct
)
1128 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1134 if (sam_account_cache
!= NULL
) {
1135 pdb_free_sam(&sam_account_cache
);
1136 sam_account_cache
= NULL
;
1139 return NT_STATUS_IS_OK(pdb_context
->pdb_delete_sam_account(pdb_context
, sam_acct
));
1142 NTSTATUS
pdb_rename_sam_account(SAM_ACCOUNT
*oldname
, const char *newname
)
1144 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1147 return NT_STATUS_NOT_IMPLEMENTED
;
1150 if (sam_account_cache
!= NULL
) {
1151 pdb_free_sam(&sam_account_cache
);
1152 sam_account_cache
= NULL
;
1155 return pdb_context
->pdb_rename_sam_account(pdb_context
, oldname
, newname
);
1158 NTSTATUS
pdb_update_login_attempts(SAM_ACCOUNT
*sam_acct
, BOOL success
)
1160 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1163 return NT_STATUS_NOT_IMPLEMENTED
;
1166 return pdb_context
->pdb_update_login_attempts(pdb_context
, sam_acct
, success
);
1169 BOOL
pdb_getgrsid(GROUP_MAP
*map
, DOM_SID sid
)
1171 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1177 return NT_STATUS_IS_OK(pdb_context
->
1178 pdb_getgrsid(pdb_context
, map
, sid
));
1181 BOOL
pdb_getgrgid(GROUP_MAP
*map
, gid_t gid
)
1183 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1189 return NT_STATUS_IS_OK(pdb_context
->
1190 pdb_getgrgid(pdb_context
, map
, gid
));
1193 BOOL
pdb_getgrnam(GROUP_MAP
*map
, const char *name
)
1195 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1201 return NT_STATUS_IS_OK(pdb_context
->
1202 pdb_getgrnam(pdb_context
, map
, name
));
1205 BOOL
pdb_add_group_mapping_entry(GROUP_MAP
*map
)
1207 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1213 return NT_STATUS_IS_OK(pdb_context
->
1214 pdb_add_group_mapping_entry(pdb_context
, map
));
1217 BOOL
pdb_update_group_mapping_entry(GROUP_MAP
*map
)
1219 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1225 return NT_STATUS_IS_OK(pdb_context
->
1226 pdb_update_group_mapping_entry(pdb_context
, map
));
1229 BOOL
pdb_delete_group_mapping_entry(DOM_SID sid
)
1231 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1237 return NT_STATUS_IS_OK(pdb_context
->
1238 pdb_delete_group_mapping_entry(pdb_context
, sid
));
1241 BOOL
pdb_enum_group_mapping(enum SID_NAME_USE sid_name_use
, GROUP_MAP
**pp_rmap
,
1242 size_t *p_num_entries
, BOOL unix_only
)
1244 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1250 return NT_STATUS_IS_OK(pdb_context
->
1251 pdb_enum_group_mapping(pdb_context
, sid_name_use
,
1252 pp_rmap
, p_num_entries
, unix_only
));
1255 NTSTATUS
pdb_enum_group_members(TALLOC_CTX
*mem_ctx
,
1257 uint32
**pp_member_rids
,
1258 size_t *p_num_members
)
1260 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1263 return NT_STATUS_UNSUCCESSFUL
;
1266 return pdb_context
->pdb_enum_group_members(pdb_context
, mem_ctx
, sid
,
1267 pp_member_rids
, p_num_members
);
1270 NTSTATUS
pdb_enum_group_memberships(const char *username
, gid_t primary_gid
,
1271 DOM_SID
**pp_sids
, gid_t
**pp_gids
,
1272 size_t *p_num_groups
)
1274 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1277 return NT_STATUS_UNSUCCESSFUL
;
1280 return pdb_context
->pdb_enum_group_memberships(pdb_context
, username
,
1281 primary_gid
, pp_sids
, pp_gids
,
1285 BOOL
pdb_find_alias(const char *name
, DOM_SID
*sid
)
1287 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1293 return NT_STATUS_IS_OK(pdb_context
->pdb_find_alias(pdb_context
,
1297 NTSTATUS
pdb_create_alias(const char *name
, uint32
*rid
)
1299 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1302 return NT_STATUS_NOT_IMPLEMENTED
;
1305 return pdb_context
->pdb_create_alias(pdb_context
, name
, rid
);
1308 BOOL
pdb_delete_alias(const DOM_SID
*sid
)
1310 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1316 return NT_STATUS_IS_OK(pdb_context
->pdb_delete_alias(pdb_context
,
1321 BOOL
pdb_get_aliasinfo(const DOM_SID
*sid
, struct acct_info
*info
)
1323 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1329 return NT_STATUS_IS_OK(pdb_context
->pdb_get_aliasinfo(pdb_context
, sid
,
1333 BOOL
pdb_set_aliasinfo(const DOM_SID
*sid
, struct acct_info
*info
)
1335 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1341 return NT_STATUS_IS_OK(pdb_context
->pdb_set_aliasinfo(pdb_context
, sid
,
1345 BOOL
pdb_add_aliasmem(const DOM_SID
*alias
, const DOM_SID
*member
)
1347 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1353 return NT_STATUS_IS_OK(pdb_context
->
1354 pdb_add_aliasmem(pdb_context
, alias
, member
));
1357 BOOL
pdb_del_aliasmem(const DOM_SID
*alias
, const DOM_SID
*member
)
1359 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1365 return NT_STATUS_IS_OK(pdb_context
->
1366 pdb_del_aliasmem(pdb_context
, alias
, member
));
1369 BOOL
pdb_enum_aliasmem(const DOM_SID
*alias
,
1370 DOM_SID
**pp_members
, size_t *p_num_members
)
1372 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1378 return NT_STATUS_IS_OK(pdb_context
->
1379 pdb_enum_aliasmem(pdb_context
, alias
,
1380 pp_members
, p_num_members
));
1383 BOOL
pdb_enum_alias_memberships(TALLOC_CTX
*mem_ctx
, const DOM_SID
*domain_sid
,
1384 const DOM_SID
*members
, size_t num_members
,
1385 uint32
**pp_alias_rids
, size_t *p_num_alias_rids
)
1387 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1393 return NT_STATUS_IS_OK(pdb_context
->
1394 pdb_enum_alias_memberships(pdb_context
, mem_ctx
,
1396 members
, num_members
,
1401 NTSTATUS
pdb_lookup_rids(TALLOC_CTX
*mem_ctx
,
1402 const DOM_SID
*domain_sid
,
1405 const char ***names
,
1408 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1411 return NT_STATUS_NOT_IMPLEMENTED
;
1414 return pdb_context
->pdb_lookup_rids(pdb_context
, mem_ctx
, domain_sid
,
1415 num_rids
, rids
, names
, attrs
);
1418 BOOL
pdb_get_account_policy(int policy_index
, uint32
*value
)
1420 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1426 return NT_STATUS_IS_OK(pdb_context
->
1427 pdb_get_account_policy(pdb_context
, policy_index
, value
));
1430 BOOL
pdb_set_account_policy(int policy_index
, uint32 value
)
1432 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1438 return NT_STATUS_IS_OK(pdb_context
->
1439 pdb_set_account_policy(pdb_context
, policy_index
, value
));
1442 BOOL
pdb_get_seq_num(time_t *seq_num
)
1444 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1450 return NT_STATUS_IS_OK(pdb_context
->
1451 pdb_get_seq_num(pdb_context
, seq_num
));
1453 /***************************************************************
1454 Initialize the static context (at smbd startup etc).
1456 If uninitialised, context will auto-init on first use.
1457 ***************************************************************/
1459 BOOL
initialize_password_db(BOOL reload
)
1461 return (pdb_get_static_context(reload
) != NULL
);
1465 /***************************************************************************
1466 Default implementations of some functions.
1467 ****************************************************************************/
1469 static NTSTATUS
pdb_default_getsampwnam (struct pdb_methods
*methods
, SAM_ACCOUNT
*user
, const char *sname
)
1471 return NT_STATUS_NO_SUCH_USER
;
1474 static NTSTATUS
pdb_default_getsampwsid(struct pdb_methods
*my_methods
, SAM_ACCOUNT
* user
, const DOM_SID
*sid
)
1476 return NT_STATUS_NO_SUCH_USER
;
1479 static NTSTATUS
pdb_default_add_sam_account (struct pdb_methods
*methods
, SAM_ACCOUNT
*newpwd
)
1481 DEBUG(0,("this backend (%s) should not be listed as the first passdb backend! You can't add users to it.\n", methods
->name
));
1482 return NT_STATUS_NOT_IMPLEMENTED
;
1485 static NTSTATUS
pdb_default_update_sam_account (struct pdb_methods
*methods
, SAM_ACCOUNT
*newpwd
)
1487 return NT_STATUS_NOT_IMPLEMENTED
;
1490 static NTSTATUS
pdb_default_delete_sam_account (struct pdb_methods
*methods
, SAM_ACCOUNT
*pwd
)
1492 return NT_STATUS_NOT_IMPLEMENTED
;
1495 static NTSTATUS
pdb_default_rename_sam_account (struct pdb_methods
*methods
, SAM_ACCOUNT
*pwd
, const char *newname
)
1497 return NT_STATUS_NOT_IMPLEMENTED
;
1500 static NTSTATUS
pdb_default_update_login_attempts (struct pdb_methods
*methods
, SAM_ACCOUNT
*newpwd
, BOOL success
)
1502 return NT_STATUS_OK
;
1505 static NTSTATUS
pdb_default_setsampwent(struct pdb_methods
*methods
, BOOL update
, uint16 acb_mask
)
1507 return NT_STATUS_NOT_IMPLEMENTED
;
1510 static NTSTATUS
pdb_default_getsampwent(struct pdb_methods
*methods
, SAM_ACCOUNT
*user
)
1512 return NT_STATUS_NOT_IMPLEMENTED
;
1515 static void pdb_default_endsampwent(struct pdb_methods
*methods
)
1517 return; /* NT_STATUS_NOT_IMPLEMENTED; */
1520 static NTSTATUS
pdb_default_get_account_policy(struct pdb_methods
*methods
, int policy_index
, uint32
*value
)
1522 return account_policy_get(policy_index
, value
) ? NT_STATUS_OK
: NT_STATUS_UNSUCCESSFUL
;
1525 static NTSTATUS
pdb_default_set_account_policy(struct pdb_methods
*methods
, int policy_index
, uint32 value
)
1527 return account_policy_set(policy_index
, value
) ? NT_STATUS_OK
: NT_STATUS_UNSUCCESSFUL
;
1530 static NTSTATUS
pdb_default_get_seq_num(struct pdb_methods
*methods
, time_t *seq_num
)
1532 *seq_num
= time(NULL
);
1533 return NT_STATUS_OK
;
1536 static void add_uid_to_array_unique(TALLOC_CTX
*mem_ctx
,
1537 uid_t uid
, uid_t
**pp_uids
, size_t *p_num
)
1541 for (i
=0; i
<*p_num
; i
++) {
1542 if ((*pp_uids
)[i
] == uid
)
1546 *pp_uids
= TALLOC_REALLOC_ARRAY(mem_ctx
, *pp_uids
, uid_t
, *p_num
+1);
1548 if (*pp_uids
== NULL
)
1551 (*pp_uids
)[*p_num
] = uid
;
1555 static BOOL
get_memberuids(TALLOC_CTX
*mem_ctx
, gid_t gid
, uid_t
**pp_uids
, size_t *p_num
)
1559 struct sys_pwent
*userlist
, *user
;
1564 /* We only look at our own sam, so don't care about imported stuff */
1568 if ((grp
= getgrgid(gid
)) == NULL
) {
1573 /* Primary group members */
1575 userlist
= getpwent_list();
1577 for (user
= userlist
; user
!= NULL
; user
= user
->next
) {
1578 if (user
->pw_gid
!= gid
)
1580 add_uid_to_array_unique(mem_ctx
, user
->pw_uid
, pp_uids
, p_num
);
1583 pwent_free(userlist
);
1585 /* Secondary group members */
1587 for (gr
= grp
->gr_mem
; (*gr
!= NULL
) && ((*gr
)[0] != '\0'); gr
+= 1) {
1588 struct passwd
*pw
= getpwnam(*gr
);
1592 add_uid_to_array_unique(mem_ctx
, pw
->pw_uid
, pp_uids
, p_num
);
1600 NTSTATUS
pdb_default_enum_group_members(struct pdb_methods
*methods
,
1601 TALLOC_CTX
*mem_ctx
,
1602 const DOM_SID
*group
,
1603 uint32
**pp_member_rids
,
1604 size_t *p_num_members
)
1610 *pp_member_rids
= NULL
;
1613 if (!NT_STATUS_IS_OK(sid_to_gid(group
, &gid
)))
1614 return NT_STATUS_NO_SUCH_GROUP
;
1616 if(!get_memberuids(mem_ctx
, gid
, &uids
, &num_uids
))
1617 return NT_STATUS_NO_SUCH_GROUP
;
1620 return NT_STATUS_OK
;
1622 *pp_member_rids
= TALLOC_ZERO_ARRAY(mem_ctx
, uint32
, num_uids
);
1624 for (i
=0; i
<num_uids
; i
++) {
1627 if (!NT_STATUS_IS_OK(uid_to_sid(&sid
, uids
[i
]))) {
1628 DEBUG(1, ("Could not map member uid to SID\n"));
1632 if (!sid_check_is_in_our_domain(&sid
)) {
1633 DEBUG(1, ("Inconsistent SAM -- group member uid not "
1634 "in our domain\n"));
1638 sid_peek_rid(&sid
, &(*pp_member_rids
)[*p_num_members
]);
1639 *p_num_members
+= 1;
1642 return NT_STATUS_OK
;
1645 NTSTATUS
pdb_default_lookup_rids(struct pdb_methods
*methods
,
1646 TALLOC_CTX
*mem_ctx
,
1647 const DOM_SID
*domain_sid
,
1650 const char ***names
,
1655 BOOL have_mapped
= False
;
1656 BOOL have_unmapped
= False
;
1658 (*names
) = TALLOC_ZERO_ARRAY(mem_ctx
, const char *, num_rids
);
1659 (*attrs
) = TALLOC_ZERO_ARRAY(mem_ctx
, uint32
, num_rids
);
1661 if ((num_rids
!= 0) && (((*names
) == NULL
) || ((*attrs
) == NULL
)))
1662 return NT_STATUS_NO_MEMORY
;
1664 if (!sid_equal(domain_sid
, get_global_sam_sid())) {
1665 /* TODO: Sooner or later we need to look up BUILTIN rids as
1670 for (i
= 0; i
< num_rids
; i
++) {
1674 enum SID_NAME_USE type
;
1676 (*attrs
)[i
] = SID_NAME_UNKNOWN
;
1678 sid_copy(&sid
, domain_sid
);
1679 sid_append_rid(&sid
, rids
[i
]);
1681 if (lookup_sid(&sid
, domname
, tmpname
, &type
)) {
1682 (*attrs
)[i
] = (uint32
)type
;
1683 (*names
)[i
] = talloc_strdup(mem_ctx
, tmpname
);
1684 if ((*names
)[i
] == NULL
)
1685 return NT_STATUS_NO_MEMORY
;
1686 DEBUG(5,("lookup_rids: %s:%d\n", (*names
)[i
],
1690 have_unmapped
= True
;
1696 result
= NT_STATUS_NONE_MAPPED
;
1699 result
= have_unmapped
? STATUS_SOME_UNMAPPED
: NT_STATUS_OK
;
1704 static struct pdb_search
*pdb_search_init(enum pdb_search_type type
)
1706 TALLOC_CTX
*mem_ctx
;
1707 struct pdb_search
*result
;
1709 mem_ctx
= talloc_init("pdb_search");
1710 if (mem_ctx
== NULL
) {
1711 DEBUG(0, ("talloc_init failed\n"));
1715 result
= TALLOC_P(mem_ctx
, struct pdb_search
);
1716 if (result
== NULL
) {
1717 DEBUG(0, ("talloc failed\n"));
1721 result
->mem_ctx
= mem_ctx
;
1722 result
->type
= type
;
1723 result
->cache
= NULL
;
1724 result
->num_entries
= 0;
1725 result
->cache_size
= 0;
1726 result
->search_ended
= False
;
1728 /* Segfault appropriately if not initialized */
1729 result
->next_entry
= NULL
;
1730 result
->search_end
= NULL
;
1735 static void fill_displayentry(TALLOC_CTX
*mem_ctx
, uint32 rid
,
1737 const char *account_name
,
1738 const char *fullname
,
1739 const char *description
,
1740 struct samr_displayentry
*entry
)
1743 entry
->acct_flags
= acct_flags
;
1745 if (account_name
!= NULL
)
1746 entry
->account_name
= talloc_strdup(mem_ctx
, account_name
);
1748 entry
->account_name
= "";
1750 if (fullname
!= NULL
)
1751 entry
->fullname
= talloc_strdup(mem_ctx
, fullname
);
1753 entry
->fullname
= "";
1755 if (description
!= NULL
)
1756 entry
->description
= talloc_strdup(mem_ctx
, description
);
1758 entry
->description
= "";
1761 static BOOL user_search_in_progress
= False
;
1762 struct user_search
{
1766 static BOOL
next_entry_users(struct pdb_search
*s
,
1767 struct samr_displayentry
*entry
)
1769 struct user_search
*state
= s
->private_data
;
1770 SAM_ACCOUNT
*user
= NULL
;
1774 status
= pdb_init_sam(&user
);
1775 if (!NT_STATUS_IS_OK(status
)) {
1776 DEBUG(0, ("Could not pdb_init_sam\n"));
1780 if (!pdb_getsampwent(user
)) {
1781 pdb_free_sam(&user
);
1785 if ((state
->acct_flags
!= 0) &&
1786 ((pdb_get_acct_ctrl(user
) & state
->acct_flags
) == 0)) {
1787 pdb_free_sam(&user
);
1791 fill_displayentry(s
->mem_ctx
, pdb_get_user_rid(user
),
1792 pdb_get_acct_ctrl(user
), pdb_get_username(user
),
1793 pdb_get_fullname(user
), pdb_get_acct_desc(user
),
1796 pdb_free_sam(&user
);
1800 static void search_end_users(struct pdb_search
*search
)
1803 user_search_in_progress
= False
;
1806 static BOOL
pdb_default_search_users(struct pdb_methods
*methods
,
1807 struct pdb_search
*search
,
1810 struct user_search
*state
;
1812 if (user_search_in_progress
) {
1813 DEBUG(1, ("user search in progress\n"));
1817 if (!pdb_setsampwent(False
, acct_flags
)) {
1818 DEBUG(5, ("Could not start search\n"));
1822 user_search_in_progress
= True
;
1824 state
= TALLOC_P(search
->mem_ctx
, struct user_search
);
1825 if (state
== NULL
) {
1826 DEBUG(0, ("talloc failed\n"));
1830 state
->acct_flags
= acct_flags
;
1832 search
->private_data
= state
;
1833 search
->next_entry
= next_entry_users
;
1834 search
->search_end
= search_end_users
;
1838 struct group_search
{
1840 size_t num_groups
, current_group
;
1843 static BOOL
next_entry_groups(struct pdb_search
*s
,
1844 struct samr_displayentry
*entry
)
1846 struct group_search
*state
= s
->private_data
;
1848 GROUP_MAP
*map
= &state
->groups
[state
->current_group
];
1850 if (state
->current_group
== state
->num_groups
)
1853 sid_peek_rid(&map
->sid
, &rid
);
1855 fill_displayentry(s
->mem_ctx
, rid
, 0, map
->nt_name
, NULL
, map
->comment
,
1858 state
->current_group
+= 1;
1862 static void search_end_groups(struct pdb_search
*search
)
1864 struct group_search
*state
= search
->private_data
;
1865 SAFE_FREE(state
->groups
);
1868 static BOOL
pdb_search_grouptype(struct pdb_search
*search
,
1869 enum SID_NAME_USE type
)
1871 struct group_search
*state
;
1873 state
= TALLOC_P(search
->mem_ctx
, struct group_search
);
1874 if (state
== NULL
) {
1875 DEBUG(0, ("talloc failed\n"));
1879 if (!pdb_enum_group_mapping(type
, &state
->groups
, &state
->num_groups
,
1881 DEBUG(0, ("Could not enum groups\n"));
1885 state
->current_group
= 0;
1886 search
->private_data
= state
;
1887 search
->next_entry
= next_entry_groups
;
1888 search
->search_end
= search_end_groups
;
1892 static BOOL
pdb_default_search_groups(struct pdb_methods
*methods
,
1893 struct pdb_search
*search
)
1895 return pdb_search_grouptype(search
, SID_NAME_DOM_GRP
);
1898 static BOOL
pdb_default_search_aliases(struct pdb_methods
*methods
,
1899 struct pdb_search
*search
,
1903 if (sid_equal(sid
, get_global_sam_sid()))
1904 return pdb_search_grouptype(search
, SID_NAME_ALIAS
);
1906 if (sid_equal(sid
, &global_sid_Builtin
))
1907 return pdb_search_grouptype(search
, SID_NAME_WKN_GRP
);
1909 DEBUG(3, ("unknown domain sid: %s\n", sid_string_static(sid
)));
1913 static struct samr_displayentry
*pdb_search_getentry(struct pdb_search
*search
,
1916 if (idx
< search
->num_entries
)
1917 return &search
->cache
[idx
];
1919 if (search
->search_ended
)
1922 while (idx
>= search
->num_entries
) {
1923 struct samr_displayentry entry
;
1925 if (!search
->next_entry(search
, &entry
)) {
1926 search
->search_end(search
);
1927 search
->search_ended
= True
;
1931 ADD_TO_LARGE_ARRAY(search
->mem_ctx
, struct samr_displayentry
,
1932 entry
, &search
->cache
, &search
->num_entries
,
1933 &search
->cache_size
);
1936 return (search
->num_entries
> idx
) ? &search
->cache
[idx
] : NULL
;
1939 struct pdb_search
*pdb_search_users(uint16 acct_flags
)
1941 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1942 struct pdb_search
*result
;
1944 if (pdb_context
== NULL
) return NULL
;
1946 result
= pdb_search_init(PDB_USER_SEARCH
);
1947 if (result
== NULL
) return NULL
;
1949 if (!pdb_context
->pdb_search_users(pdb_context
, result
, acct_flags
)) {
1950 talloc_destroy(result
->mem_ctx
);
1956 struct pdb_search
*pdb_search_groups(void)
1958 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1959 struct pdb_search
*result
;
1961 if (pdb_context
== NULL
) return NULL
;
1963 result
= pdb_search_init(PDB_GROUP_SEARCH
);
1964 if (result
== NULL
) return NULL
;
1966 if (!pdb_context
->pdb_search_groups(pdb_context
, result
)) {
1967 talloc_destroy(result
->mem_ctx
);
1973 struct pdb_search
*pdb_search_aliases(const DOM_SID
*sid
)
1975 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1976 struct pdb_search
*result
;
1978 if (pdb_context
== NULL
) return NULL
;
1980 result
= pdb_search_init(PDB_ALIAS_SEARCH
);
1981 if (result
== NULL
) return NULL
;
1983 if (!pdb_context
->pdb_search_aliases(pdb_context
, result
, sid
)) {
1984 talloc_destroy(result
->mem_ctx
);
1990 uint32
pdb_search_entries(struct pdb_search
*search
,
1991 uint32 start_idx
, uint32 max_entries
,
1992 struct samr_displayentry
**result
)
1994 struct samr_displayentry
*end_entry
;
1995 uint32 end_idx
= start_idx
+max_entries
-1;
1997 /* The first entry needs to be searched after the last. Otherwise the
1998 * first entry might have moved due to a realloc during the search for
1999 * the last entry. */
2001 end_entry
= pdb_search_getentry(search
, end_idx
);
2002 *result
= pdb_search_getentry(search
, start_idx
);
2004 if (end_entry
!= NULL
)
2007 if (start_idx
>= search
->num_entries
)
2010 return search
->num_entries
- start_idx
;
2013 void pdb_search_destroy(struct pdb_search
*search
)
2018 if (!search
->search_ended
)
2019 search
->search_end(search
);
2021 talloc_destroy(search
->mem_ctx
);
2024 NTSTATUS
make_pdb_methods(TALLOC_CTX
*mem_ctx
, PDB_METHODS
**methods
)
2026 *methods
= TALLOC_P(mem_ctx
, struct pdb_methods
);
2029 return NT_STATUS_NO_MEMORY
;
2032 ZERO_STRUCTP(*methods
);
2034 (*methods
)->setsampwent
= pdb_default_setsampwent
;
2035 (*methods
)->endsampwent
= pdb_default_endsampwent
;
2036 (*methods
)->getsampwent
= pdb_default_getsampwent
;
2037 (*methods
)->getsampwnam
= pdb_default_getsampwnam
;
2038 (*methods
)->getsampwsid
= pdb_default_getsampwsid
;
2039 (*methods
)->add_sam_account
= pdb_default_add_sam_account
;
2040 (*methods
)->update_sam_account
= pdb_default_update_sam_account
;
2041 (*methods
)->delete_sam_account
= pdb_default_delete_sam_account
;
2042 (*methods
)->rename_sam_account
= pdb_default_rename_sam_account
;
2043 (*methods
)->update_login_attempts
= pdb_default_update_login_attempts
;
2045 (*methods
)->getgrsid
= pdb_default_getgrsid
;
2046 (*methods
)->getgrgid
= pdb_default_getgrgid
;
2047 (*methods
)->getgrnam
= pdb_default_getgrnam
;
2048 (*methods
)->add_group_mapping_entry
= pdb_default_add_group_mapping_entry
;
2049 (*methods
)->update_group_mapping_entry
= pdb_default_update_group_mapping_entry
;
2050 (*methods
)->delete_group_mapping_entry
= pdb_default_delete_group_mapping_entry
;
2051 (*methods
)->enum_group_mapping
= pdb_default_enum_group_mapping
;
2052 (*methods
)->enum_group_members
= pdb_default_enum_group_members
;
2053 (*methods
)->enum_group_memberships
= pdb_default_enum_group_memberships
;
2054 (*methods
)->find_alias
= pdb_default_find_alias
;
2055 (*methods
)->create_alias
= pdb_default_create_alias
;
2056 (*methods
)->delete_alias
= pdb_default_delete_alias
;
2057 (*methods
)->get_aliasinfo
= pdb_default_get_aliasinfo
;
2058 (*methods
)->set_aliasinfo
= pdb_default_set_aliasinfo
;
2059 (*methods
)->add_aliasmem
= pdb_default_add_aliasmem
;
2060 (*methods
)->del_aliasmem
= pdb_default_del_aliasmem
;
2061 (*methods
)->enum_aliasmem
= pdb_default_enum_aliasmem
;
2062 (*methods
)->enum_alias_memberships
= pdb_default_alias_memberships
;
2063 (*methods
)->lookup_rids
= pdb_default_lookup_rids
;
2064 (*methods
)->get_account_policy
= pdb_default_get_account_policy
;
2065 (*methods
)->set_account_policy
= pdb_default_set_account_policy
;
2066 (*methods
)->get_seq_num
= pdb_default_get_seq_num
;
2068 (*methods
)->search_users
= pdb_default_search_users
;
2069 (*methods
)->search_groups
= pdb_default_search_groups
;
2070 (*methods
)->search_aliases
= pdb_default_search_aliases
;
2072 return NT_STATUS_OK
;