1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-28 07:21:54 +03:00
samba-mirror/source3/passdb/pdb_util.c
Christian Ambach ad86e2a599 s3:passdb/pdb_util make pdb_create_builtin consider whether backend deals with BUILTIN
when creating a BUILTIN group, make the strategy dependent on passdb backend behavior
1. if passdb is responsible for BUILTIN (normal case), call pdb_create_builtin_alias with gid=0 argument
so it asks winbindd for a gid to be used
2. if passdb is not responsible, ask for a mapping for the group first and let pdb_create_builtin_alias
create the mapping based on the gid that was determined in the mapping request

Pair-Programmed-With: Michael Adam <obnox@samba.org>

Signed-off-by: Christian Ambach <ambi@samba.org>
Signed-off-by: Michael Adam <obnox@samba.org>

Autobuild-User(master): Michael Adam <obnox@samba.org>
Autobuild-Date(master): Fri Jun 21 12:49:10 CEST 2013 on sn-devel-104
2013-06-21 12:49:10 +02:00

188 lines
5.1 KiB
C

/*
* Unix SMB/CIFS implementation.
* Authentication utility functions
* Copyright (C) Andrew Tridgell 1992-1998
* Copyright (C) Andrew Bartlett 2001
* Copyright (C) Jeremy Allison 2000-2001
* Copyright (C) Rafal Szczesniak 2002
* Copyright (C) Volker Lendecke 2006
* Copyright (C) Michael Adam 2007
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "../libcli/security/security.h"
#include "passdb.h"
#include "lib/winbind_util.h"
#include "../librpc/gen_ndr/idmap.h"
/**
* Add sid as a member of builtin_sid.
*
* @param[in] builtin_sid An existing builtin group.
* @param[in] dom_sid sid to add as a member of builtin_sid.
* @return Normal NTSTATUS return
*/
static NTSTATUS add_sid_to_builtin(const struct dom_sid *builtin_sid,
const struct dom_sid *dom_sid)
{
NTSTATUS status = NT_STATUS_OK;
if (!dom_sid || !builtin_sid) {
return NT_STATUS_INVALID_PARAMETER;
}
status = pdb_add_aliasmem(builtin_sid, dom_sid);
if (NT_STATUS_EQUAL(status, NT_STATUS_MEMBER_IN_ALIAS)) {
DEBUG(5, ("add_sid_to_builtin %s is already a member of %s\n",
sid_string_dbg(dom_sid),
sid_string_dbg(builtin_sid)));
return NT_STATUS_OK;
}
if (!NT_STATUS_IS_OK(status)) {
DEBUG(4, ("add_sid_to_builtin %s could not be added to %s: "
"%s\n", sid_string_dbg(dom_sid),
sid_string_dbg(builtin_sid), nt_errstr(status)));
}
return status;
}
/**
* Create the requested BUILTIN if it doesn't already exist. This requires
* winbindd to be running.
*
* @param[in] rid BUILTIN rid to create
* @return Normal NTSTATUS return.
*/
NTSTATUS pdb_create_builtin(uint32_t rid)
{
NTSTATUS status = NT_STATUS_OK;
struct dom_sid sid;
gid_t gid;
bool mapresult;
if (!sid_compose(&sid, &global_sid_Builtin, rid)) {
return NT_STATUS_NO_SUCH_ALIAS;
}
if (!pdb_is_responsible_for_builtin()) {
/*
* if this backend is not responsible for BUILTIN
*
* Use the gid from the mapping request for entry.
* If the mapping fails, bail out
*/
mapresult = sid_to_gid(&sid, &gid);
if (!mapresult) {
status = NT_STATUS_NO_SUCH_GROUP;
} else {
status = pdb_create_builtin_alias(rid, gid);
}
} else {
/*
* this backend is responsible for BUILTIN
*
* a failed mapping result means that the entry
* does not exist yet, so create it
*
* we use pdb_sid_to_id intentionally here to
* directly query the passdb backend (sid_to_gid
* would finally do the same)
*/
struct unixid id;
mapresult = pdb_sid_to_id(&sid, &id);
if (!mapresult) {
if (!lp_winbind_nested_groups() || !winbind_ping()) {
return NT_STATUS_PROTOCOL_UNREACHABLE;
}
status = pdb_create_builtin_alias(rid, 0);
}
}
return status;
}
/*******************************************************************
*******************************************************************/
NTSTATUS create_builtin_users(const struct dom_sid *dom_sid)
{
NTSTATUS status;
struct dom_sid dom_users;
status = pdb_create_builtin(BUILTIN_RID_USERS);
if ( !NT_STATUS_IS_OK(status) ) {
DEBUG(5,("create_builtin_users: Failed to create Users\n"));
return status;
}
/* add domain users */
if ((IS_DC || (lp_server_role() == ROLE_DOMAIN_MEMBER))
&& sid_compose(&dom_users, dom_sid, DOMAIN_RID_USERS))
{
status = add_sid_to_builtin(&global_sid_Builtin_Users,
&dom_users);
}
return status;
}
/*******************************************************************
*******************************************************************/
NTSTATUS create_builtin_administrators(const struct dom_sid *dom_sid)
{
NTSTATUS status;
struct dom_sid dom_admins, root_sid;
fstring root_name;
enum lsa_SidType type;
TALLOC_CTX *ctx;
bool ret;
status = pdb_create_builtin(BUILTIN_RID_ADMINISTRATORS);
if ( !NT_STATUS_IS_OK(status) ) {
DEBUG(5,("create_builtin_administrators: Failed to create Administrators\n"));
return status;
}
/* add domain admins */
if ((IS_DC || (lp_server_role() == ROLE_DOMAIN_MEMBER))
&& sid_compose(&dom_admins, dom_sid, DOMAIN_RID_ADMINS))
{
status = add_sid_to_builtin(&global_sid_Builtin_Administrators,
&dom_admins);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
}
/* add root */
if ( (ctx = talloc_init("create_builtin_administrators")) == NULL ) {
return NT_STATUS_NO_MEMORY;
}
fstr_sprintf( root_name, "%s\\root", get_global_sam_name() );
ret = lookup_name(ctx, root_name, LOOKUP_NAME_DOMAIN, NULL, NULL,
&root_sid, &type);
TALLOC_FREE( ctx );
if ( ret ) {
status = add_sid_to_builtin(&global_sid_Builtin_Administrators,
&root_sid);
}
return status;
}