2 Solaris NSS wrapper for winbind
5 Based on Luke Howard's ldap_nss module for Solaris
9 Copyright (C) 1997-2003 Luke Howard.
10 This file is part of the nss_ldap library.
12 The nss_ldap library is free software; you can redistribute it and/or
13 modify it under the terms of the GNU Lesser General Public License as
14 published by the Free Software Foundation; either version 3 of the
15 License, or (at your option) any later version.
17 The nss_ldap library is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
20 Library General Public License for more details.
22 You should have received a copy of the GNU Lesser General Public
23 License along with the nss_ldap library; see the file COPYING.LIB. If not,
24 see <http://www.gnu.org/licenses/>.
29 #include "winbind_client.h"
31 #include <sys/types.h>
32 #include <sys/param.h>
38 #include <sys/syslog.h>
41 #if defined(HAVE_NSS_COMMON_H) || defined(HPUX)
46 #define NSS_DEBUG(str) syslog(LOG_DEBUG, "nss_winbind: %s", str);
48 #define NSS_DEBUG(str) ;
51 #define NSS_ARGS(args) ((nss_XbyY_args_t *)args)
56 * HP-UX 11 has no definiton of the nss_groupsbymem structure. This
57 * definition is taken from the nss_ldap project at:
58 * http://www.padl.com/OSS/nss_ldap.html
61 struct nss_groupsbymem
{
66 int (*str2ent
)(const char *instr
, int instr_len
, void *ent
,
67 char *buffer
, int buflen
);
68 nss_status_t (*process_cstr
)(const char *instr
, int instr_len
,
69 struct nss_groupsbymem
*);
75 #define make_pwent_str(dest, src) \
77 if((dest = get_static(buffer, buflen, strlen(src)+1)) == NULL) \
80 NSS_DEBUG("ERANGE error"); \
81 return NSS_STATUS_TRYAGAIN; \
86 static NSS_STATUS
_nss_winbind_setpwent_solwrap (nss_backend_t
* be
, void* args
)
88 NSS_DEBUG("_nss_winbind_setpwent_solwrap");
89 return _nss_winbind_setpwent();
93 _nss_winbind_endpwent_solwrap (nss_backend_t
* be
, void *args
)
95 NSS_DEBUG("_nss_winbind_endpwent_solwrap");
96 return _nss_winbind_endpwent();
100 _nss_winbind_getpwent_solwrap (nss_backend_t
* be
, void *args
)
103 char* buffer
= NSS_ARGS(args
)->buf
.buffer
;
104 int buflen
= NSS_ARGS(args
)->buf
.buflen
;
105 struct passwd
* result
= (struct passwd
*) NSS_ARGS(args
)->buf
.result
;
106 int* errnop
= &NSS_ARGS(args
)->erange
;
109 ret
= _nss_winbind_getpwent_r(result
, buffer
,
112 if(ret
== NSS_STATUS_SUCCESS
)
114 snprintf(logmsg
, 79, "_nss_winbind_getpwent_solwrap: Returning user: %s\n",
117 NSS_ARGS(args
)->returnval
= (void*) result
;
119 snprintf(logmsg
, 79, "_nss_winbind_getpwent_solwrap: Returning error: %d.\n",ret
);
127 _nss_winbind_getpwnam_solwrap (nss_backend_t
* be
, void* args
)
130 struct passwd
* result
= (struct passwd
*) NSS_ARGS(args
)->buf
.result
;
132 NSS_DEBUG("_nss_winbind_getpwnam_solwrap");
134 ret
= _nss_winbind_getpwnam_r (NSS_ARGS(args
)->key
.name
,
136 NSS_ARGS(args
)->buf
.buffer
,
137 NSS_ARGS(args
)->buf
.buflen
,
138 &NSS_ARGS(args
)->erange
);
139 if(ret
== NSS_STATUS_SUCCESS
)
140 NSS_ARGS(args
)->returnval
= (void*) result
;
146 _nss_winbind_getpwuid_solwrap(nss_backend_t
* be
, void* args
)
149 struct passwd
* result
= (struct passwd
*) NSS_ARGS(args
)->buf
.result
;
151 NSS_DEBUG("_nss_winbind_getpwuid_solwrap");
152 ret
= _nss_winbind_getpwuid_r (NSS_ARGS(args
)->key
.uid
,
154 NSS_ARGS(args
)->buf
.buffer
,
155 NSS_ARGS(args
)->buf
.buflen
,
156 &NSS_ARGS(args
)->erange
);
157 if(ret
== NSS_STATUS_SUCCESS
)
158 NSS_ARGS(args
)->returnval
= (void*) result
;
163 static NSS_STATUS
_nss_winbind_passwd_destr (nss_backend_t
* be
, void *args
)
166 NSS_DEBUG("_nss_winbind_passwd_destr");
167 return NSS_STATUS_SUCCESS
;
170 static nss_backend_op_t passwd_ops
[] =
172 _nss_winbind_passwd_destr
,
173 _nss_winbind_endpwent_solwrap
, /* NSS_DBOP_ENDENT */
174 _nss_winbind_setpwent_solwrap
, /* NSS_DBOP_SETENT */
175 _nss_winbind_getpwent_solwrap
, /* NSS_DBOP_GETENT */
176 _nss_winbind_getpwnam_solwrap
, /* NSS_DBOP_PASSWD_BYNAME */
177 _nss_winbind_getpwuid_solwrap
/* NSS_DBOP_PASSWD_BYUID */
181 _nss_winbind_passwd_constr (const char* db_name
,
182 const char* src_name
,
183 const char* cfg_args
)
187 if(!(be
= SMB_MALLOC_P(nss_backend_t
)) )
190 be
->ops
= passwd_ops
;
191 be
->n_ops
= sizeof(passwd_ops
) / sizeof(nss_backend_op_t
);
193 NSS_DEBUG("Initialized nss_winbind passwd backend");
197 /*****************************************************************
198 GROUP database backend
199 *****************************************************************/
201 static NSS_STATUS
_nss_winbind_setgrent_solwrap (nss_backend_t
* be
, void* args
)
203 NSS_DEBUG("_nss_winbind_setgrent_solwrap");
204 return _nss_winbind_setgrent();
208 _nss_winbind_endgrent_solwrap (nss_backend_t
* be
, void *args
)
210 NSS_DEBUG("_nss_winbind_endgrent_solwrap");
211 return _nss_winbind_endgrent();
215 _nss_winbind_getgrent_solwrap(nss_backend_t
* be
, void* args
)
218 char* buffer
= NSS_ARGS(args
)->buf
.buffer
;
219 int buflen
= NSS_ARGS(args
)->buf
.buflen
;
220 struct group
* result
= (struct group
*) NSS_ARGS(args
)->buf
.result
;
221 int* errnop
= &NSS_ARGS(args
)->erange
;
224 ret
= _nss_winbind_getgrent_r(result
, buffer
,
227 if(ret
== NSS_STATUS_SUCCESS
)
229 snprintf(logmsg
, 79, "_nss_winbind_getgrent_solwrap: Returning group: %s\n", result
->gr_name
);
231 NSS_ARGS(args
)->returnval
= (void*) result
;
233 snprintf(logmsg
, 79, "_nss_winbind_getgrent_solwrap: Returning error: %d.\n", ret
);
242 _nss_winbind_getgrnam_solwrap(nss_backend_t
* be
, void* args
)
245 struct group
* result
= (struct group
*) NSS_ARGS(args
)->buf
.result
;
247 NSS_DEBUG("_nss_winbind_getgrnam_solwrap");
248 ret
= _nss_winbind_getgrnam_r(NSS_ARGS(args
)->key
.name
,
250 NSS_ARGS(args
)->buf
.buffer
,
251 NSS_ARGS(args
)->buf
.buflen
,
252 &NSS_ARGS(args
)->erange
);
254 if(ret
== NSS_STATUS_SUCCESS
)
255 NSS_ARGS(args
)->returnval
= (void*) result
;
261 _nss_winbind_getgrgid_solwrap(nss_backend_t
* be
, void* args
)
264 struct group
* result
= (struct group
*) NSS_ARGS(args
)->buf
.result
;
266 NSS_DEBUG("_nss_winbind_getgrgid_solwrap");
267 ret
= _nss_winbind_getgrgid_r (NSS_ARGS(args
)->key
.gid
,
269 NSS_ARGS(args
)->buf
.buffer
,
270 NSS_ARGS(args
)->buf
.buflen
,
271 &NSS_ARGS(args
)->erange
);
273 if(ret
== NSS_STATUS_SUCCESS
)
274 NSS_ARGS(args
)->returnval
= (void*) result
;
280 _nss_winbind_getgroupsbymember_solwrap(nss_backend_t
* be
, void* args
)
283 struct nss_groupsbymem
*gmem
= (struct nss_groupsbymem
*)args
;
284 long int numgids
= gmem
->numgids
;
285 long int maxgids
= gmem
->maxgids
;
287 NSS_DEBUG("_nss_winbind_getgroupsbymember");
289 _nss_winbind_initgroups_dyn(gmem
->username
,
290 gmem
->gid_array
[0], /* Primary Group */
297 gmem
->numgids
= numgids
;
298 gmem
->maxgids
= maxgids
;
301 * If the maximum number of gids have been found, return
302 * SUCCESS so the switch engine will stop searching. Otherwise
303 * return NOTFOUND so nsswitch will continue to get groups
304 * from the remaining database backends specified in the
305 * nsswitch.conf file.
307 return (gmem
->numgids
== gmem
->maxgids
? NSS_STATUS_SUCCESS
: NSS_STATUS_NOTFOUND
);
311 _nss_winbind_group_destr (nss_backend_t
* be
, void* args
)
314 NSS_DEBUG("_nss_winbind_group_destr");
315 return NSS_STATUS_SUCCESS
;
318 static nss_backend_op_t group_ops
[] =
320 _nss_winbind_group_destr
,
321 _nss_winbind_endgrent_solwrap
,
322 _nss_winbind_setgrent_solwrap
,
323 _nss_winbind_getgrent_solwrap
,
324 _nss_winbind_getgrnam_solwrap
,
325 _nss_winbind_getgrgid_solwrap
,
326 _nss_winbind_getgroupsbymember_solwrap
330 _nss_winbind_group_constr (const char* db_name
,
331 const char* src_name
,
332 const char* cfg_args
)
336 if(!(be
= SMB_MALLOC_P(nss_backend_t
)) )
340 be
->n_ops
= sizeof(group_ops
) / sizeof(nss_backend_op_t
);
342 NSS_DEBUG("Initialized nss_winbind group backend");
346 /*****************************************************************
347 hosts and ipnodes backend
348 *****************************************************************/
349 #if defined(SUNOS5) /* not compatible with HP-UX */
351 /* this parser is shared between get*byname and get*byaddr, as key type
352 in request is stored in different locations, I had to provide the
353 address family as an argument, caller must free the winbind response. */
356 parse_response(int af
, nss_XbyY_args_t
* argp
, struct winbindd_response
*response
)
358 struct hostent
*he
= (struct hostent
*)argp
->buf
.result
;
359 char *buffer
= argp
->buf
.buffer
;
360 int buflen
= argp
->buf
.buflen
;
366 struct in_addr
*addrp
;
367 #if defined(AF_INET6)
368 struct in6_addr
*addrp6
;
372 /* response is tab separated list of ip addresses with hostname
373 and newline at the end. so at first we will strip newline
374 then construct list of addresses for hostent.
376 p
= strchr(response
->data
.winsresp
, '\n');
378 else {/* it must be broken */
379 argp
->h_errno
= NO_DATA
;
380 return NSS_STATUS_UNAVAIL
;
383 for(; p
!= response
->data
.winsresp
; p
--) {
384 if(*p
== '\t') addrcount
++;
387 if(addrcount
== 0) {/* it must be broken */
388 argp
->h_errno
= NO_DATA
;
389 return NSS_STATUS_UNAVAIL
;
392 /* allocate space for addresses and h_addr_list */
394 if( he
->h_addrtype
== AF_INET
) {
395 he
->h_length
= sizeof(struct in_addr
);
396 addrp
= (struct in_addr
*)ROUND_DOWN(buffer
+ buflen
,
397 sizeof(struct in_addr
));
399 he
->h_addr_list
= (char **)ROUND_DOWN(addrp
, sizeof (char*));
400 he
->h_addr_list
-= addrcount
+1;
402 #if defined(AF_INET6)
404 he
->h_length
= sizeof(struct in6_addr
);
405 addrp6
= (struct in6_addr
*)ROUND_DOWN(buffer
+ buflen
,
406 sizeof(struct in6_addr
));
408 he
->h_addr_list
= (char **)ROUND_DOWN(addrp6
, sizeof (char*));
409 he
->h_addr_list
-= addrcount
+1;
413 /* buffer too small?! */
414 if((char *)he
->h_addr_list
< buffer
) {
416 return NSS_STR_PARSE_ERANGE
;
419 data
= response
->data
.winsresp
;
420 for( i
= 0; i
< addrcount
; i
++) {
421 p
= strchr(data
, '\t');
422 if(p
== NULL
) break; /* just in case... */
424 *p
= '\0'; /* terminate the string */
425 if(he
->h_addrtype
== AF_INET
) {
426 he
->h_addr_list
[i
] = (char *)&addrp
[i
];
427 if ((addrp
[i
].s_addr
= inet_addr(data
)) == -1) {
429 return NSS_STR_PARSE_ERANGE
;
432 #if defined(AF_INET6)
434 he
->h_addr_list
[i
] = (char *)&addrp6
[i
];
435 if (strchr(data
, ':') != 0) {
436 if (inet_pton(AF_INET6
, data
, &addrp6
[i
]) != 1) {
438 return NSS_STR_PARSE_ERANGE
;
442 if ((in4
.s_addr
= inet_addr(data
)) == -1) {
444 return NSS_STR_PARSE_ERANGE
;
446 IN6_INADDR_TO_V4MAPPED(&in4
, &addrp6
[i
]);
453 he
->h_addr_list
[i
] = (char *)NULL
;
456 if(len
> he
->h_addr_list
- (char**)argp
->buf
.buffer
) {
458 return NSS_STR_PARSE_ERANGE
;
461 /* this is a bit overkill to use _nss_netdb_aliases here since
462 there seems to be no aliases but it will create all data for us */
463 he
->h_aliases
= _nss_netdb_aliases(data
, len
, buffer
,
464 ((char*) he
->h_addr_list
) - buffer
);
465 if(he
->h_aliases
== NULL
) {
467 ret
= NSS_STR_PARSE_ERANGE
;
469 he
->h_name
= he
->h_aliases
[0];
471 ret
= NSS_STR_PARSE_SUCCESS
;
474 argp
->returnval
= (void*)he
;
479 _nss_winbind_ipnodes_getbyname(nss_backend_t
* be
, void *args
)
481 nss_XbyY_args_t
*argp
= (nss_XbyY_args_t
*) args
;
482 struct winbindd_response response
;
483 struct winbindd_request request
;
487 ZERO_STRUCT(response
);
488 ZERO_STRUCT(request
);
490 /* I assume there that AI_ADDRCONFIG cases are handled in nss
491 frontend code, at least it seems done so in solaris...
493 we will give NO_DATA for pure IPv6; IPv4 will be returned for
494 AF_INET or for AF_INET6 and AI_ALL|AI_V4MAPPED we have to map
497 #if defined(AF_INET6)
498 #ifdef HAVE_NSS_XBYY_KEY_IPNODE
499 af
= argp
->key
.ipnode
.af_family
;
500 if(af
== AF_INET6
&& argp
->key
.ipnode
.flags
== 0) {
501 argp
->h_errno
= NO_DATA
;
502 return NSS_STATUS_UNAVAIL
;
505 /* I'm not that sure if this is correct, but... */
510 strncpy(request
.data
.winsreq
, argp
->key
.name
, sizeof(request
.data
.winsreq
) - 1);
511 request
.data
.winsreq
[sizeof(request
.data
.winsreq
) - 1] = '\0';
513 if( (ret
= winbindd_request_response(WINBINDD_WINS_BYNAME
, &request
, &response
))
514 == NSS_STATUS_SUCCESS
) {
515 ret
= parse_response(af
, argp
, &response
);
518 winbindd_free_response(&response
);
523 _nss_winbind_hosts_getbyname(nss_backend_t
* be
, void *args
)
525 nss_XbyY_args_t
*argp
= (nss_XbyY_args_t
*) args
;
526 struct winbindd_response response
;
527 struct winbindd_request request
;
530 ZERO_STRUCT(response
);
531 ZERO_STRUCT(request
);
533 strncpy(request
.data
.winsreq
, argp
->key
.name
, sizeof(request
.data
.winsreq
) - 1);
534 request
.data
.winsreq
[sizeof(request
.data
.winsreq
) - 1] = '\0';
536 if( (ret
= winbindd_request_response(WINBINDD_WINS_BYNAME
, &request
, &response
))
537 == NSS_STATUS_SUCCESS
) {
538 ret
= parse_response(AF_INET
, argp
, &response
);
541 winbindd_free_response(&response
);
546 _nss_winbind_hosts_getbyaddr(nss_backend_t
* be
, void *args
)
549 struct winbindd_response response
;
550 struct winbindd_request request
;
551 nss_XbyY_args_t
*argp
= (nss_XbyY_args_t
*)args
;
554 ZERO_STRUCT(response
);
555 ZERO_STRUCT(request
);
557 #if defined(AF_INET6)
558 /* winbindd currently does not resolve IPv6 */
559 if(argp
->key
.hostaddr
.type
== AF_INET6
) {
560 argp
->h_errno
= NO_DATA
;
561 return NSS_STATUS_UNAVAIL
;
564 p
= inet_ntop(argp
->key
.hostaddr
.type
, argp
->key
.hostaddr
.addr
,
565 request
.data
.winsreq
, sizeof request
.data
.winsreq
);
567 snprintf(request
.data
.winsreq
, sizeof request
.data
.winsreq
,
569 ((unsigned char *)argp
->key
.hostaddr
.addr
)[0],
570 ((unsigned char *)argp
->key
.hostaddr
.addr
)[1],
571 ((unsigned char *)argp
->key
.hostaddr
.addr
)[2],
572 ((unsigned char *)argp
->key
.hostaddr
.addr
)[3]);
575 ret
= winbindd_request_response(WINBINDD_WINS_BYIP
, &request
, &response
);
577 if( ret
== NSS_STATUS_SUCCESS
) {
578 parse_response(argp
->key
.hostaddr
.type
, argp
, &response
);
580 winbindd_free_response(&response
);
584 /* winbind does not provide setent, getent, endent for wins */
586 _nss_winbind_common_endent(nss_backend_t
* be
, void *args
)
588 return (NSS_STATUS_UNAVAIL
);
592 _nss_winbind_common_setent(nss_backend_t
* be
, void *args
)
594 return (NSS_STATUS_UNAVAIL
);
598 _nss_winbind_common_getent(nss_backend_t
* be
, void *args
)
600 return (NSS_STATUS_UNAVAIL
);
603 static nss_backend_t
*
604 _nss_winbind_common_constr (nss_backend_op_t ops
[], int n_ops
)
608 if(!(be
= SMB_MALLOC_P(nss_backend_t
)) )
618 _nss_winbind_common_destr (nss_backend_t
* be
, void* args
)
621 return NSS_STATUS_SUCCESS
;
624 static nss_backend_op_t ipnodes_ops
[] = {
625 _nss_winbind_common_destr
,
626 _nss_winbind_common_endent
,
627 _nss_winbind_common_setent
,
628 _nss_winbind_common_getent
,
629 _nss_winbind_ipnodes_getbyname
,
630 _nss_winbind_hosts_getbyaddr
,
634 _nss_winbind_ipnodes_constr(dummy1
, dummy2
, dummy3
)
635 const char *dummy1
, *dummy2
, *dummy3
;
637 return (_nss_winbind_common_constr(ipnodes_ops
,
638 sizeof (ipnodes_ops
) / sizeof (ipnodes_ops
[0])));
641 static nss_backend_op_t host_ops
[] = {
642 _nss_winbind_common_destr
,
643 _nss_winbind_common_endent
,
644 _nss_winbind_common_setent
,
645 _nss_winbind_common_getent
,
646 _nss_winbind_hosts_getbyname
,
647 _nss_winbind_hosts_getbyaddr
,
651 _nss_winbind_hosts_constr(dummy1
, dummy2
, dummy3
)
652 const char *dummy1
, *dummy2
, *dummy3
;
654 return (_nss_winbind_common_constr(host_ops
,
655 sizeof (host_ops
) / sizeof (host_ops
[0])));
658 #endif /* defined(SUNOS5) */
659 #endif /* defined(HAVE_NSS_COMMON_H) || defined(HPUX) */