winbindd_sid.c
来自「samba-3.0.22.tar.gz 编译smb服务器的源码」· C语言 代码 · 共 575 行
C
575 行
/* Unix SMB/CIFS implementation. Winbind daemon - sid related functions Copyright (C) Tim Potter 2000 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/#include "includes.h"#include "winbindd.h"#undef DBGC_CLASS#define DBGC_CLASS DBGC_WINBIND/* Convert a string */static void lookupsid_recv(void *private_data, BOOL success, const char *dom_name, const char *name, enum SID_NAME_USE type);void winbindd_lookupsid(struct winbindd_cli_state *state){ DOM_SID sid; /* Ensure null termination */ state->request.data.sid[sizeof(state->request.data.sid)-1]='\0'; DEBUG(3, ("[%5lu]: lookupsid %s\n", (unsigned long)state->pid, state->request.data.sid)); if (!string_to_sid(&sid, state->request.data.sid)) { DEBUG(5, ("%s not a SID\n", state->request.data.sid)); request_error(state); return; } winbindd_lookupsid_async(state->mem_ctx, &sid, lookupsid_recv, state);}static void lookupsid_recv(void *private_data, BOOL success, const char *dom_name, const char *name, enum SID_NAME_USE type){ struct winbindd_cli_state *state = talloc_get_type_abort(private_data, struct winbindd_cli_state); if (!success) { DEBUG(5, ("lookupsid returned an error\n")); request_error(state); return; } fstrcpy(state->response.data.name.dom_name, dom_name); fstrcpy(state->response.data.name.name, name); state->response.data.name.type = type; request_ok(state);}/** * Look up the SID for a qualified name. **/static void lookupname_recv(void *private_data, BOOL success, const DOM_SID *sid, enum SID_NAME_USE type);void winbindd_lookupname(struct winbindd_cli_state *state){ char *name_domain, *name_user; char *p; /* Ensure null termination */ state->request.data.sid[sizeof(state->request.data.name.dom_name)-1]='\0'; /* Ensure null termination */ state->request.data.sid[sizeof(state->request.data.name.name)-1]='\0'; /* cope with the name being a fully qualified name */ p = strstr(state->request.data.name.name, lp_winbind_separator()); if (p) { *p = 0; name_domain = state->request.data.name.name; name_user = p+1; } else { name_domain = state->request.data.name.dom_name; name_user = state->request.data.name.name; } DEBUG(3, ("[%5lu]: lookupname %s%s%s\n", (unsigned long)state->pid, name_domain, lp_winbind_separator(), name_user)); winbindd_lookupname_async(state->mem_ctx, name_domain, name_user, lookupname_recv, state);}static void lookupname_recv(void *private_data, BOOL success, const DOM_SID *sid, enum SID_NAME_USE type){ struct winbindd_cli_state *state = talloc_get_type_abort(private_data, struct winbindd_cli_state); if (!success) { DEBUG(5, ("lookupname returned an error\n")); request_error(state); return; } sid_to_string(state->response.data.sid.sid, sid); state->response.data.sid.type = type; request_ok(state); return;}static struct winbindd_child static_idmap_child;void init_idmap_child(void){ setup_domain_child(NULL, &static_idmap_child, "idmap");}struct winbindd_child *idmap_child(void){ return &static_idmap_child;}/* Convert a sid to a uid. We assume we only have one rid attached to the sid. */static void sid2uid_recv(void *private_data, BOOL success, uid_t uid);void winbindd_sid_to_uid(struct winbindd_cli_state *state){ DOM_SID sid; NTSTATUS result; /* Ensure null termination */ state->request.data.sid[sizeof(state->request.data.sid)-1]='\0'; DEBUG(3, ("[%5lu]: sid to uid %s\n", (unsigned long)state->pid, state->request.data.sid)); if (idmap_proxyonly()) { DEBUG(8, ("IDMAP proxy only\n")); request_error(state); return; } if (!string_to_sid(&sid, state->request.data.sid)) { DEBUG(1, ("Could not get convert sid %s from string\n", state->request.data.sid)); request_error(state); return; } /* Query only the local tdb, everything else might possibly block */ result = idmap_sid_to_uid(&sid, &(state->response.data.uid), ID_QUERY_ONLY|ID_CACHE_ONLY); if (NT_STATUS_IS_OK(result)) { request_ok(state); return; } winbindd_sid2uid_async(state->mem_ctx, &sid, sid2uid_recv, state);}static void sid2uid_recv(void *private_data, BOOL success, uid_t uid){ struct winbindd_cli_state *state = talloc_get_type_abort(private_data, struct winbindd_cli_state); if (!success) { DEBUG(5, ("Could not convert sid %s\n", state->request.data.sid)); request_error(state); return; } state->response.data.uid = uid; request_ok(state);}/* Convert a sid to a gid. We assume we only have one rid attached to the sid.*/static void sid2gid_recv(void *private_data, BOOL success, gid_t gid);void winbindd_sid_to_gid(struct winbindd_cli_state *state){ DOM_SID sid; NTSTATUS result; /* Ensure null termination */ state->request.data.sid[sizeof(state->request.data.sid)-1]='\0'; DEBUG(3, ("[%5lu]: sid to gid %s\n", (unsigned long)state->pid, state->request.data.sid)); if (idmap_proxyonly()) { DEBUG(8, ("IDMAP proxy only\n")); request_error(state); return; } if (!string_to_sid(&sid, state->request.data.sid)) { DEBUG(1, ("Could not get convert sid %s from string\n", state->request.data.sid)); request_error(state); return; } /* Query only the local tdb, everything else might possibly block */ result = idmap_sid_to_gid(&sid, &(state->response.data.gid), ID_QUERY_ONLY|ID_CACHE_ONLY); if (NT_STATUS_IS_OK(result)) { request_ok(state); return; } winbindd_sid2gid_async(state->mem_ctx, &sid, sid2gid_recv, state);}static void sid2gid_recv(void *private_data, BOOL success, gid_t gid){ struct winbindd_cli_state *state = talloc_get_type_abort(private_data, struct winbindd_cli_state); if (!success) { DEBUG(5, ("Could not convert sid %s\n", state->request.data.sid)); request_error(state); return; } state->response.data.gid = gid; request_ok(state);}/* Convert a uid to a sid */struct uid2sid_state { struct winbindd_cli_state *cli_state; uid_t uid; fstring name; DOM_SID sid; enum SID_NAME_USE type;};static void uid2sid_uid2name_recv(void *private_data, BOOL success, const char *username);static void uid2sid_lookupname_recv(void *private_data, BOOL success, const DOM_SID *sid, enum SID_NAME_USE type);static void uid2sid_idmap_set_mapping_recv(void *private_data, BOOL success);void winbindd_uid_to_sid(struct winbindd_cli_state *state){ DOM_SID sid; NTSTATUS status; struct uid2sid_state *uid2sid_state; DEBUG(3, ("[%5lu]: uid to sid %lu\n", (unsigned long)state->pid, (unsigned long)state->request.data.uid)); if (idmap_proxyonly()) { DEBUG(8, ("IDMAP proxy only\n")); request_error(state); return; } status = idmap_uid_to_sid(&sid, state->request.data.uid, ID_QUERY_ONLY | ID_CACHE_ONLY); if (NT_STATUS_IS_OK(status)) { sid_to_string(state->response.data.sid.sid, &sid); state->response.data.sid.type = SID_NAME_USER; request_ok(state); return; } if (is_in_uid_range(state->request.data.uid)) { /* This is winbind's, so we should better have succeeded * above. */ request_error(state); return; } /* The only chance that this is correct is that winbind trusted * domains only = yes, and the user exists in nss and the domain. */ if (!lp_winbind_trusted_domains_only()) { request_error(state); return; } /* The only chance that this is correct is that winbind trusted * domains only = yes, and the user exists in nss and the domain. */ uid2sid_state = TALLOC_ZERO_P(state->mem_ctx, struct uid2sid_state); if (uid2sid_state == NULL) { DEBUG(0, ("talloc failed\n")); request_error(state); return; } uid2sid_state->cli_state = state; uid2sid_state->uid = state->request.data.uid; winbindd_uid2name_async(state->mem_ctx, state->request.data.uid, uid2sid_uid2name_recv, uid2sid_state);}static void uid2sid_uid2name_recv(void *private_data, BOOL success, const char *username){ struct uid2sid_state *state = talloc_get_type_abort(private_data, struct uid2sid_state); DEBUG(10, ("uid2sid: uid %lu has name %s\n", (unsigned long)state->uid, username)); fstrcpy(state->name, username); if (!success) { request_error(state->cli_state); return; } winbindd_lookupname_async(state->cli_state->mem_ctx, find_our_domain()->name, username, uid2sid_lookupname_recv, state);}static void uid2sid_lookupname_recv(void *private_data, BOOL success, const DOM_SID *sid, enum SID_NAME_USE type){ struct uid2sid_state *state = talloc_get_type_abort(private_data, struct uid2sid_state); unid_t id; if ((!success) || (type != SID_NAME_USER)) { request_error(state->cli_state); return; } state->sid = *sid; state->type = type; id.uid = state->uid; idmap_set_mapping_async(state->cli_state->mem_ctx, sid, id, ID_USERID, uid2sid_idmap_set_mapping_recv, state );}static void uid2sid_idmap_set_mapping_recv(void *private_data, BOOL success){ struct uid2sid_state *state = talloc_get_type_abort(private_data, struct uid2sid_state); /* don't fail if we can't store it */ sid_to_string(state->cli_state->response.data.sid.sid, &state->sid); state->cli_state->response.data.sid.type = state->type; request_ok(state->cli_state);}/* Convert a gid to a sid */struct gid2sid_state { struct winbindd_cli_state *cli_state; gid_t gid; fstring name; DOM_SID sid; enum SID_NAME_USE type;};static void gid2sid_gid2name_recv(void *private_data, BOOL success, const char *groupname);static void gid2sid_lookupname_recv(void *private_data, BOOL success, const DOM_SID *sid, enum SID_NAME_USE type);static void gid2sid_idmap_set_mapping_recv(void *private_data, BOOL success);void winbindd_gid_to_sid(struct winbindd_cli_state *state){ DOM_SID sid; NTSTATUS status; struct gid2sid_state *gid2sid_state; DEBUG(3, ("[%5lu]: gid to sid %lu\n", (unsigned long)state->pid, (unsigned long)state->request.data.gid)); if (idmap_proxyonly()) { DEBUG(8, ("IDMAP proxy only\n")); request_error(state); return; } status = idmap_gid_to_sid(&sid, state->request.data.gid, ID_QUERY_ONLY | ID_CACHE_ONLY); if (NT_STATUS_IS_OK(status)) { sid_to_string(state->response.data.sid.sid, &sid); state->response.data.sid.type = SID_NAME_USER; request_ok(state); return; } if (is_in_gid_range(state->request.data.gid)) { /* This is winbind's, so we should better have succeeded * above. */ request_error(state); return; } /* The only chance that this is correct is that winbind trusted * domains only = yes, and the user exists in nss and the domain. */ if (!lp_winbind_trusted_domains_only()) { request_error(state); return; } /* The only chance that this is correct is that winbind trusted * domains only = yes, and the user exists in nss and the domain. */ gid2sid_state = TALLOC_ZERO_P(state->mem_ctx, struct gid2sid_state); if (gid2sid_state == NULL) { DEBUG(0, ("talloc failed\n")); request_error(state); return; } gid2sid_state->cli_state = state; gid2sid_state->gid = state->request.data.gid; winbindd_gid2name_async(state->mem_ctx, state->request.data.gid, gid2sid_gid2name_recv, gid2sid_state);}static void gid2sid_gid2name_recv(void *private_data, BOOL success, const char *username){ struct gid2sid_state *state = talloc_get_type_abort(private_data, struct gid2sid_state); DEBUG(10, ("gid2sid: gid %lu has name %s\n", (unsigned long)state->gid, username)); fstrcpy(state->name, username); if (!success) { request_error(state->cli_state); return; } winbindd_lookupname_async(state->cli_state->mem_ctx, find_our_domain()->name, username, gid2sid_lookupname_recv, state);}static void gid2sid_lookupname_recv(void *private_data, BOOL success, const DOM_SID *sid, enum SID_NAME_USE type){ struct gid2sid_state *state = talloc_get_type_abort(private_data, struct gid2sid_state); unid_t id; if ((!success) || ((type != SID_NAME_DOM_GRP) && (type!=SID_NAME_ALIAS))) { request_error(state->cli_state); return; } state->sid = *sid; state->type = type; id.gid = state->gid; idmap_set_mapping_async(state->cli_state->mem_ctx, sid, id, ID_GROUPID, gid2sid_idmap_set_mapping_recv, state );}static void gid2sid_idmap_set_mapping_recv(void *private_data, BOOL success){ struct gid2sid_state *state = private_data; /* don't fail if we can't store it */ sid_to_string(state->cli_state->response.data.sid.sid, &state->sid); state->cli_state->response.data.sid.type = state->type; request_ok(state->cli_state);}void winbindd_allocate_rid(struct winbindd_cli_state *state){ if ( !state->privileged ) { DEBUG(2, ("winbindd_allocate_rid: non-privileged access " "denied!\n")); request_error(state); return; } sendto_child(state, idmap_child());}enum winbindd_result winbindd_dual_allocate_rid(struct winbindd_domain *domain, struct winbindd_cli_state *state){ /* We tell idmap to always allocate a user RID. There might be a good * reason to keep RID allocation for users to even and groups to * odd. This needs discussion I think. For now only allocate user * rids. */ if (!NT_STATUS_IS_OK(idmap_allocate_rid(&state->response.data.rid, USER_RID_TYPE))) return WINBINDD_ERROR; return WINBINDD_OK;}void winbindd_allocate_rid_and_gid(struct winbindd_cli_state *state){ if ( !state->privileged ) { DEBUG(2, ("winbindd_allocate_rid: non-privileged access " "denied!\n")); request_error(state); return; } sendto_child(state, idmap_child());}enum winbindd_result winbindd_dual_allocate_rid_and_gid(struct winbindd_domain *domain, struct winbindd_cli_state *state){ NTSTATUS result; DOM_SID sid; /* We tell idmap to always allocate a user RID. This is really * historic and needs to be fixed. I *think* this has to do with the * way winbind determines its free RID space. */ result = idmap_allocate_rid(&state->response.data.rid_and_gid.rid, USER_RID_TYPE); if (!NT_STATUS_IS_OK(result)) return WINBINDD_ERROR; sid_copy(&sid, get_global_sam_sid()); sid_append_rid(&sid, state->response.data.rid_and_gid.rid); result = idmap_sid_to_gid(&sid, &state->response.data.rid_and_gid.gid, 0); if (!NT_STATUS_IS_OK(result)) return WINBINDD_ERROR; return WINBINDD_OK;}
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?