mirror of
https://github.com/samba-team/samba.git
synced 2024-12-27 03:21:53 +03:00
82fd07793f
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14539 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Gary Lockyer <gary@catalyst.net.nz>
390 lines
10 KiB
C
390 lines
10 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
async queryuser
|
|
Copyright (C) Volker Lendecke 2009
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "winbindd.h"
|
|
#include "librpc/gen_ndr/ndr_winbind_c.h"
|
|
#include "../libcli/security/security.h"
|
|
#include "libsmb/samlogon_cache.h"
|
|
|
|
struct wb_queryuser_state {
|
|
struct tevent_context *ev;
|
|
struct wbint_userinfo *info;
|
|
bool tried_dclookup;
|
|
};
|
|
|
|
static void wb_queryuser_got_uid(struct tevent_req *subreq);
|
|
static void wb_queryuser_got_domain(struct tevent_req *subreq);
|
|
static void wb_queryuser_got_dc(struct tevent_req *subreq);
|
|
static void wb_queryuser_got_gid(struct tevent_req *subreq);
|
|
static void wb_queryuser_got_group_name(struct tevent_req *subreq);
|
|
static void wb_queryuser_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *wb_queryuser_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
const struct dom_sid *user_sid)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct wb_queryuser_state *state;
|
|
struct wbint_userinfo *info;
|
|
|
|
req = tevent_req_create(mem_ctx, &state, struct wb_queryuser_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->ev = ev;
|
|
|
|
state->info = talloc_zero(state, struct wbint_userinfo);
|
|
if (tevent_req_nomem(state->info, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
info = state->info;
|
|
|
|
info->primary_gid = (gid_t)-1;
|
|
|
|
sid_copy(&info->user_sid, user_sid);
|
|
|
|
subreq = wb_sids2xids_send(
|
|
state, state->ev, &state->info->user_sid, 1);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_got_uid, req);
|
|
return req;
|
|
}
|
|
|
|
static void wb_queryuser_got_uid(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct wb_queryuser_state *state = tevent_req_data(
|
|
req, struct wb_queryuser_state);
|
|
struct wbint_userinfo *info = state->info;
|
|
struct netr_SamInfo3 *info3;
|
|
struct dcerpc_binding_handle *child_binding_handle = NULL;
|
|
struct unixid xid;
|
|
NTSTATUS status;
|
|
|
|
status = wb_sids2xids_recv(subreq, &xid, 1);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
if ((xid.type != ID_TYPE_UID) && (xid.type != ID_TYPE_BOTH)) {
|
|
tevent_req_nterror(req, NT_STATUS_NO_SUCH_USER);
|
|
return;
|
|
}
|
|
|
|
info->uid = xid.id;
|
|
|
|
/*
|
|
* Default the group sid to "Domain Users" in the user's
|
|
* domain. The samlogon cache or the query_user call later on
|
|
* can override this.
|
|
*/
|
|
sid_copy(&info->group_sid, &info->user_sid);
|
|
sid_split_rid(&info->group_sid, NULL);
|
|
sid_append_rid(&info->group_sid, DOMAIN_RID_USERS);
|
|
|
|
info->homedir = talloc_strdup(info, lp_template_homedir());
|
|
if (tevent_req_nomem(info->homedir, req)) {
|
|
return;
|
|
}
|
|
|
|
info->shell = talloc_strdup(info, lp_template_shell());
|
|
if (tevent_req_nomem(info->shell, req)) {
|
|
return;
|
|
}
|
|
|
|
info3 = netsamlogon_cache_get(state, &info->user_sid);
|
|
if (info3 != NULL) {
|
|
|
|
sid_compose(&info->group_sid, info3->base.domain_sid,
|
|
info3->base.primary_gid);
|
|
info->acct_name = talloc_move(
|
|
info, &info3->base.account_name.string);
|
|
info->full_name = talloc_move(
|
|
info, &info3->base.full_name.string);
|
|
|
|
info->domain_name = talloc_move(
|
|
state, &info3->base.logon_domain.string);
|
|
|
|
TALLOC_FREE(info3);
|
|
}
|
|
|
|
if (info->domain_name == NULL) {
|
|
subreq = wb_lookupsid_send(state, state->ev, &info->user_sid);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_got_domain, req);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Note wb_sids2xids_send/recv was called before,
|
|
* so we're sure that wb_parent_idmap_setup_send/recv
|
|
* was already called.
|
|
*/
|
|
child_binding_handle = idmap_child_handle();
|
|
subreq = dcerpc_wbint_GetNssInfo_send(
|
|
state, state->ev, child_binding_handle, info);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_done, req);
|
|
}
|
|
|
|
static void wb_queryuser_got_domain(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct wb_queryuser_state *state = tevent_req_data(
|
|
req, struct wb_queryuser_state);
|
|
struct wbint_userinfo *info = state->info;
|
|
enum lsa_SidType type;
|
|
struct dcerpc_binding_handle *child_binding_handle = NULL;
|
|
NTSTATUS status;
|
|
|
|
status = wb_lookupsid_recv(subreq, state, &type,
|
|
&info->domain_name, &info->acct_name);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
switch (type) {
|
|
case SID_NAME_USER:
|
|
case SID_NAME_COMPUTER:
|
|
/*
|
|
* user case: we only need the account name from lookup_sids
|
|
*/
|
|
break;
|
|
case SID_NAME_DOM_GRP:
|
|
case SID_NAME_ALIAS:
|
|
case SID_NAME_WKN_GRP:
|
|
/*
|
|
* also treat group-type SIDs (they might map to ID_TYPE_BOTH)
|
|
*/
|
|
sid_copy(&info->group_sid, &info->user_sid);
|
|
break;
|
|
default:
|
|
tevent_req_nterror(req, NT_STATUS_NO_SUCH_USER);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Note wb_sids2xids_send/recv was called before,
|
|
* so we're sure that wb_parent_idmap_setup_send/recv
|
|
* was already called.
|
|
*/
|
|
child_binding_handle = idmap_child_handle();
|
|
subreq = dcerpc_wbint_GetNssInfo_send(
|
|
state, state->ev, child_binding_handle, info);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_done, req);
|
|
}
|
|
|
|
static void wb_queryuser_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct wb_queryuser_state *state = tevent_req_data(
|
|
req, struct wb_queryuser_state);
|
|
struct wbint_userinfo *info = state->info;
|
|
NTSTATUS status, result;
|
|
bool need_group_name = false;
|
|
const char *tmpl = NULL;
|
|
|
|
status = dcerpc_wbint_GetNssInfo_recv(subreq, info, &result);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
if (NT_STATUS_EQUAL(result, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND) &&
|
|
!state->tried_dclookup) {
|
|
subreq = wb_dsgetdcname_send(
|
|
state, state->ev, state->info->domain_name, NULL, NULL,
|
|
DS_RETURN_DNS_NAME);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_got_dc, req);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Ignore failure in "result" here. We'll try to fill in stuff
|
|
* that misses further down.
|
|
*/
|
|
|
|
if (state->info->primary_gid == (gid_t)-1) {
|
|
subreq = wb_sids2xids_send(
|
|
state, state->ev, &info->group_sid, 1);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_got_gid, req);
|
|
return;
|
|
}
|
|
|
|
tmpl = lp_template_homedir();
|
|
if(strstr_m(tmpl, "%g") || strstr_m(tmpl, "%G")) {
|
|
need_group_name = true;
|
|
}
|
|
tmpl = lp_template_shell();
|
|
if(strstr_m(tmpl, "%g") || strstr_m(tmpl, "%G")) {
|
|
need_group_name = true;
|
|
}
|
|
|
|
if (need_group_name && state->info->primary_group_name == NULL) {
|
|
subreq = wb_lookupsid_send(state, state->ev, &info->group_sid);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_got_group_name,
|
|
req);
|
|
return;
|
|
}
|
|
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static void wb_queryuser_got_dc(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct wb_queryuser_state *state = tevent_req_data(
|
|
req, struct wb_queryuser_state);
|
|
struct wbint_userinfo *info = state->info;
|
|
struct netr_DsRGetDCNameInfo *dcinfo;
|
|
struct dcerpc_binding_handle *child_binding_handle = NULL;
|
|
NTSTATUS status;
|
|
|
|
status = wb_dsgetdcname_recv(subreq, state, &dcinfo);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
state->tried_dclookup = true;
|
|
|
|
status = wb_dsgetdcname_gencache_set(info->domain_name, dcinfo);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Note wb_sids2xids_send/recv was called before,
|
|
* so we're sure that wb_parent_idmap_setup_send/recv
|
|
* was already called.
|
|
*/
|
|
child_binding_handle = idmap_child_handle();
|
|
subreq = dcerpc_wbint_GetNssInfo_send(
|
|
state, state->ev, child_binding_handle, info);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_done, req);
|
|
}
|
|
|
|
static void wb_queryuser_got_gid(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct wb_queryuser_state *state = tevent_req_data(
|
|
req, struct wb_queryuser_state);
|
|
struct unixid xid;
|
|
NTSTATUS status;
|
|
bool need_group_name = false;
|
|
const char *tmpl = NULL;
|
|
|
|
status = wb_sids2xids_recv(subreq, &xid, 1);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
|
|
if ((xid.type != ID_TYPE_GID) && (xid.type != ID_TYPE_BOTH)) {
|
|
tevent_req_nterror(req, NT_STATUS_NO_SUCH_USER);
|
|
return;
|
|
}
|
|
|
|
state->info->primary_gid = xid.id;
|
|
|
|
tmpl = lp_template_homedir();
|
|
if(strstr_m(tmpl, "%g") || strstr_m(tmpl, "%G")) {
|
|
need_group_name = true;
|
|
}
|
|
tmpl = lp_template_shell();
|
|
if(strstr_m(tmpl, "%g") || strstr_m(tmpl, "%G")) {
|
|
need_group_name = true;
|
|
}
|
|
|
|
if (need_group_name && state->info->primary_group_name == NULL) {
|
|
subreq = wb_lookupsid_send(state, state->ev,
|
|
&state->info->group_sid);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return;
|
|
}
|
|
tevent_req_set_callback(subreq, wb_queryuser_got_group_name,
|
|
req);
|
|
return;
|
|
}
|
|
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
static void wb_queryuser_got_group_name(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct wb_queryuser_state *state = tevent_req_data(
|
|
req, struct wb_queryuser_state);
|
|
enum lsa_SidType type;
|
|
NTSTATUS status;
|
|
const char *domain_name;
|
|
|
|
status = wb_lookupsid_recv(subreq, state->info, &type, &domain_name,
|
|
&state->info->primary_group_name);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS wb_queryuser_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx,
|
|
struct wbint_userinfo **pinfo)
|
|
{
|
|
struct wb_queryuser_state *state = tevent_req_data(
|
|
req, struct wb_queryuser_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
return status;
|
|
}
|
|
*pinfo = talloc_move(mem_ctx, &state->info);
|
|
return NT_STATUS_OK;
|
|
}
|