mirror of
https://github.com/samba-team/samba.git
synced 2024-12-27 03:21:53 +03:00
221 lines
5.2 KiB
C
221 lines
5.2 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
Winbind daemon - sid related functions
|
|
|
|
Copyright (C) Tim Potter 2000
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "winbindd.h"
|
|
|
|
#undef DBGC_CLASS
|
|
#define DBGC_CLASS DBGC_WINBIND
|
|
|
|
/* Convert a string */
|
|
|
|
void winbindd_lookuprids(struct winbindd_cli_state *state)
|
|
{
|
|
struct winbindd_domain *domain;
|
|
DOM_SID domain_sid;
|
|
|
|
/* Ensure null termination */
|
|
state->request->data.sid[sizeof(state->request->data.sid)-1]='\0';
|
|
|
|
DEBUG(10, ("lookup_rids: %s\n", state->request->data.sid));
|
|
|
|
if (!string_to_sid(&domain_sid, state->request->data.sid)) {
|
|
DEBUG(5, ("Could not convert %s to SID\n",
|
|
state->request->data.sid));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
domain = find_lookup_domain_from_sid(&domain_sid);
|
|
if (domain == NULL) {
|
|
DEBUG(10, ("Could not find domain for name %s\n",
|
|
state->request->domain_name));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
sendto_domain(state, domain);
|
|
}
|
|
|
|
static void set_mapping_recv(void *private_data, bool success)
|
|
{
|
|
struct winbindd_cli_state *state =
|
|
talloc_get_type_abort(private_data, struct winbindd_cli_state);
|
|
|
|
if (!success) {
|
|
DEBUG(5, ("Could not set sid mapping\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
request_ok(state);
|
|
}
|
|
|
|
void winbindd_set_mapping(struct winbindd_cli_state *state)
|
|
{
|
|
struct id_map map;
|
|
DOM_SID sid;
|
|
|
|
DEBUG(3, ("[%5lu]: set id map\n", (unsigned long)state->pid));
|
|
|
|
if ( ! state->privileged) {
|
|
DEBUG(0, ("Only root is allowed to set mappings!\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
if (!string_to_sid(&sid, state->request->data.dual_idmapset.sid)) {
|
|
DEBUG(1, ("Could not get convert sid %s from string\n",
|
|
state->request->data.sid));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
map.sid = &sid;
|
|
map.xid.id = state->request->data.dual_idmapset.id;
|
|
map.xid.type = state->request->data.dual_idmapset.type;
|
|
|
|
winbindd_set_mapping_async(state->mem_ctx, &map,
|
|
set_mapping_recv, state);
|
|
}
|
|
|
|
static void remove_mapping_recv(void *private_data, bool success)
|
|
{
|
|
struct winbindd_cli_state *state =
|
|
talloc_get_type_abort(private_data, struct winbindd_cli_state);
|
|
|
|
if (!success) {
|
|
DEBUG(5, ("Could not remove sid mapping\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
request_ok(state);
|
|
}
|
|
|
|
void winbindd_remove_mapping(struct winbindd_cli_state *state)
|
|
{
|
|
struct id_map map;
|
|
DOM_SID sid;
|
|
|
|
DEBUG(3, ("[%5lu]: remove id map\n", (unsigned long)state->pid));
|
|
|
|
if ( ! state->privileged) {
|
|
DEBUG(0, ("Only root is allowed to remove mappings!\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
if (!string_to_sid(&sid, state->request->data.dual_idmapset.sid)) {
|
|
DEBUG(1, ("Could not get convert sid %s from string\n",
|
|
state->request->data.sid));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
map.sid = &sid;
|
|
map.xid.id = state->request->data.dual_idmapset.id;
|
|
map.xid.type = state->request->data.dual_idmapset.type;
|
|
|
|
winbindd_remove_mapping_async(state->mem_ctx, &map,
|
|
remove_mapping_recv, state);
|
|
}
|
|
|
|
static void set_hwm_recv(void *private_data, bool success)
|
|
{
|
|
struct winbindd_cli_state *state =
|
|
talloc_get_type_abort(private_data, struct winbindd_cli_state);
|
|
|
|
if (!success) {
|
|
DEBUG(5, ("Could not set sid mapping\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
request_ok(state);
|
|
}
|
|
|
|
void winbindd_set_hwm(struct winbindd_cli_state *state)
|
|
{
|
|
struct unixid xid;
|
|
|
|
DEBUG(3, ("[%5lu]: set hwm\n", (unsigned long)state->pid));
|
|
|
|
if ( ! state->privileged) {
|
|
DEBUG(0, ("Only root is allowed to set mappings!\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
xid.id = state->request->data.dual_idmapset.id;
|
|
xid.type = state->request->data.dual_idmapset.type;
|
|
|
|
winbindd_set_hwm_async(state->mem_ctx, &xid, set_hwm_recv, state);
|
|
}
|
|
|
|
void winbindd_allocate_uid(struct winbindd_cli_state *state)
|
|
{
|
|
if ( !state->privileged ) {
|
|
DEBUG(2, ("winbindd_allocate_uid: non-privileged access "
|
|
"denied!\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
sendto_child(state, idmap_child());
|
|
}
|
|
|
|
enum winbindd_result winbindd_dual_allocate_uid(struct winbindd_domain *domain,
|
|
struct winbindd_cli_state *state)
|
|
{
|
|
struct unixid xid;
|
|
|
|
if (!NT_STATUS_IS_OK(idmap_allocate_uid(&xid))) {
|
|
return WINBINDD_ERROR;
|
|
}
|
|
state->response->data.uid = xid.id;
|
|
return WINBINDD_OK;
|
|
}
|
|
|
|
void winbindd_allocate_gid(struct winbindd_cli_state *state)
|
|
{
|
|
if ( !state->privileged ) {
|
|
DEBUG(2, ("winbindd_allocate_gid: non-privileged access "
|
|
"denied!\n"));
|
|
request_error(state);
|
|
return;
|
|
}
|
|
|
|
sendto_child(state, idmap_child());
|
|
}
|
|
|
|
enum winbindd_result winbindd_dual_allocate_gid(struct winbindd_domain *domain,
|
|
struct winbindd_cli_state *state)
|
|
{
|
|
struct unixid xid;
|
|
|
|
if (!NT_STATUS_IS_OK(idmap_allocate_gid(&xid))) {
|
|
return WINBINDD_ERROR;
|
|
}
|
|
state->response->data.gid = xid.id;
|
|
return WINBINDD_OK;
|
|
}
|