1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/source3/smbd/msg_idmap.c
Volker Lendecke 303962e370 s3: Fix smbcontrol smbd idmap kill S-1-5-21-...
The calls to sid_to_gid and sid_to_uid create id mapping entries themselves,
which makes it pretty difficult to reliably delete id mapping entries
everywhere just using a SID.

Autobuild-User: Volker Lendecke <vlendec@samba.org>
Autobuild-Date: Mon Sep  5 16:30:41 CEST 2011 on sn-devel-104
2011-09-05 16:30:41 +02:00

133 lines
3.0 KiB
C

/*
* Samba Unix/Linux SMB client library
*
* Copyright (C) Gregor Beck 2011
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "smbd/globals.h"
#include "smbd/smbd.h"
#include "../libcli/security/dom_sid.h"
#include "../libcli/security/security_token.h"
#include "idmap_cache.h"
#include "passdb/lookup_sid.h"
#include "auth.h"
#include "messages.h"
#include "lib/id_cache.h"
static bool uid_in_use(const struct user_struct *user, uid_t uid)
{
while (user) {
if (user->session_info &&
(user->session_info->unix_token->uid == uid)) {
return true;
}
user = user->next;
}
return false;
}
static bool gid_in_use(const struct user_struct *user, gid_t gid)
{
while (user) {
if (user->session_info != NULL) {
int i;
struct security_unix_token *utok;
utok = user->session_info->unix_token;
if (utok->gid == gid) {
return true;
}
for(i=0; i<utok->ngroups; i++) {
if (utok->groups[i] == gid) {
return true;
}
}
}
user = user->next;
}
return false;
}
static bool sid_in_use(const struct user_struct *user,
const struct dom_sid *psid)
{
while (user) {
struct security_token *tok;
if (user->session_info == NULL) {
continue;
}
tok = user->session_info->security_token;
if (tok == NULL) {
/*
* Not sure session_info->security_token can
* ever be NULL. This check might be not
* necessary.
*/
continue;
}
if (security_token_has_sid(tok, psid)) {
return true;
}
user = user->next;
}
return false;
}
static bool id_in_use(const struct user_struct *user,
const struct id_cache_ref *id)
{
switch(id->type) {
case UID:
return uid_in_use(user, id->id.uid);
case GID:
return gid_in_use(user, id->id.gid);
case SID:
return sid_in_use(user, &id->id.sid);
default:
break;
}
return false;
}
static void id_cache_kill(struct messaging_context *msg_ctx,
void *private_data,
uint32_t msg_type,
struct server_id server_id,
DATA_BLOB* data)
{
const char *msg = (data && data->data)
? (const char *)data->data : "<NULL>";
struct user_struct *validated_users =
smbd_server_conn->smb1.sessions.validated_users;
struct id_cache_ref id;
if (!id_cache_ref_parse(msg, &id)) {
DEBUG(0, ("Invalid ?ID: %s\n", msg));
return;
}
if (id_in_use(validated_users, &id)) {
exit_server_cleanly(msg);
}
}
void id_cache_register_kill_msg(struct messaging_context *ctx)
{
messaging_register(ctx, NULL, ID_CACHE_KILL, id_cache_kill);
}