s4:winbind: add a netlogon_queue (tevent_queue)
[Samba/gebeck_regimport.git] / source3 / utils / netlookup.c
blobb66c34e61dced8e4a16fa4f9624bb397de0b55fe
1 /*
2 Unix SMB/CIFS implementation.
4 Name lookup.
6 Copyright (C) Jeremy Allison 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "utils/net.h"
24 #include "rpc_client/cli_pipe.h"
25 #include "../librpc/gen_ndr/ndr_lsa.h"
26 #include "rpc_client/cli_lsarpc.h"
27 #include "libsmb/libsmb.h"
29 /********************************************************
30 Connection cachine struct. Goes away when ctx destroyed.
31 ********************************************************/
33 struct con_struct {
34 bool failed_connect;
35 NTSTATUS err;
36 struct cli_state *cli;
37 struct rpc_pipe_client *lsapipe;
38 struct policy_handle pol;
41 static struct con_struct *cs;
43 /********************************************************
44 Close connection on context destruction.
45 ********************************************************/
47 static int cs_destructor(struct con_struct *p)
49 if (cs->cli) {
50 cli_shutdown(cs->cli);
52 cs = NULL;
53 return 0;
56 /********************************************************
57 Create the connection to localhost.
58 ********************************************************/
60 static struct con_struct *create_cs(struct net_context *c,
61 TALLOC_CTX *ctx, NTSTATUS *perr)
63 NTSTATUS nt_status;
64 struct sockaddr_storage loopback_ss;
66 *perr = NT_STATUS_OK;
68 if (!interpret_string_addr(&loopback_ss, "127.0.0.1", AI_NUMERICHOST)) {
69 *perr = NT_STATUS_INVALID_PARAMETER;
70 return NULL;
73 if (cs) {
74 if (cs->failed_connect) {
75 *perr = cs->err;
76 return NULL;
78 return cs;
81 cs = talloc(ctx, struct con_struct);
82 if (!cs) {
83 *perr = NT_STATUS_NO_MEMORY;
84 return NULL;
87 ZERO_STRUCTP(cs);
88 talloc_set_destructor(cs, cs_destructor);
90 /* Connect to localhost with given username/password. */
91 /* JRA. Pretty sure we can just do this anonymously.... */
92 #if 0
93 if (!opt_password && !opt_machine_pass) {
94 char *pass = getpass("Password:");
95 if (pass) {
96 opt_password = SMB_STRDUP(pass);
99 #endif
101 nt_status = cli_full_connection(&cs->cli, lp_netbios_name(), lp_netbios_name(),
102 &loopback_ss, 0,
103 "IPC$", "IPC",
104 #if 0
105 c->opt_user_name,
106 c->opt_workgroup,
107 c->opt_password,
108 #else
110 c->opt_workgroup,
112 #endif
114 SMB_SIGNING_DEFAULT);
116 if (!NT_STATUS_IS_OK(nt_status)) {
117 DEBUG(2,("create_cs: Connect failed. Error was %s\n", nt_errstr(nt_status)));
118 cs->failed_connect = true;
119 cs->err = nt_status;
120 *perr = nt_status;
121 return NULL;
124 nt_status = cli_rpc_pipe_open_noauth(cs->cli,
125 &ndr_table_lsarpc.syntax_id,
126 &cs->lsapipe);
128 if (!NT_STATUS_IS_OK(nt_status)) {
129 DEBUG(2,("create_cs: open LSA pipe failed. Error was %s\n", nt_errstr(nt_status)));
130 cs->failed_connect = true;
131 cs->err = nt_status;
132 *perr = nt_status;
133 return NULL;
136 nt_status = rpccli_lsa_open_policy(cs->lsapipe, ctx, true,
137 SEC_FLAG_MAXIMUM_ALLOWED,
138 &cs->pol);
140 if (!NT_STATUS_IS_OK(nt_status)) {
141 DEBUG(2,("create_cs: rpccli_lsa_open_policy failed. Error was %s\n", nt_errstr(nt_status)));
142 cs->failed_connect = true;
143 cs->err = nt_status;
144 *perr = nt_status;
145 return NULL;
148 return cs;
151 /********************************************************
152 Do a lookup_sids call to localhost.
153 Check if the local machine is authoritative for this sid. We can't
154 check if this is our SID as that's stored in the root-read-only
155 secrets.tdb.
156 The local smbd will also ask winbindd for us, so we don't have to.
157 ********************************************************/
159 NTSTATUS net_lookup_name_from_sid(struct net_context *c,
160 TALLOC_CTX *ctx,
161 struct dom_sid *psid,
162 const char **ppdomain,
163 const char **ppname)
165 NTSTATUS nt_status;
166 struct con_struct *csp = NULL;
167 char **domains;
168 char **names;
169 enum lsa_SidType *types;
171 *ppdomain = NULL;
172 *ppname = NULL;
174 csp = create_cs(c, ctx, &nt_status);
175 if (csp == NULL) {
176 return nt_status;
179 nt_status = rpccli_lsa_lookup_sids(csp->lsapipe, ctx,
180 &csp->pol,
181 1, psid,
182 &domains,
183 &names,
184 &types);
186 if (!NT_STATUS_IS_OK(nt_status)) {
187 return nt_status;
190 *ppdomain = domains[0];
191 *ppname = names[0];
192 /* Don't care about type here. */
194 /* Converted OK */
195 return NT_STATUS_OK;
198 /********************************************************
199 Do a lookup_names call to localhost.
200 ********************************************************/
202 NTSTATUS net_lookup_sid_from_name(struct net_context *c, TALLOC_CTX *ctx,
203 const char *full_name, struct dom_sid *pret_sid)
205 NTSTATUS nt_status;
206 struct con_struct *csp = NULL;
207 struct dom_sid *sids = NULL;
208 enum lsa_SidType *types = NULL;
210 csp = create_cs(c, ctx, &nt_status);
211 if (csp == NULL) {
212 return nt_status;
215 nt_status = rpccli_lsa_lookup_names(csp->lsapipe, ctx,
216 &csp->pol,
218 &full_name,
219 NULL, 1,
220 &sids, &types);
222 if (!NT_STATUS_IS_OK(nt_status)) {
223 return nt_status;
226 *pret_sid = sids[0];
228 /* Converted OK */
229 return NT_STATUS_OK;