winbindd_sid.c

来自「samba-3.0.22.tar.gz 编译smb服务器的源码」· C语言 代码 · 共 575 行

C
575
字号
/*    Unix SMB/CIFS implementation.   Winbind daemon - sid related functions   Copyright (C) Tim Potter 2000      This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 2 of the License, or   (at your option) any later version.      This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.      You should have received a copy of the GNU General Public License   along with this program; if not, write to the Free Software   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/#include "includes.h"#include "winbindd.h"#undef DBGC_CLASS#define DBGC_CLASS DBGC_WINBIND/* Convert a string  */static void lookupsid_recv(void *private_data, BOOL success,			   const char *dom_name, const char *name,			   enum SID_NAME_USE type);void winbindd_lookupsid(struct winbindd_cli_state *state){	DOM_SID sid;	/* Ensure null termination */	state->request.data.sid[sizeof(state->request.data.sid)-1]='\0';	DEBUG(3, ("[%5lu]: lookupsid %s\n", (unsigned long)state->pid, 		  state->request.data.sid));	if (!string_to_sid(&sid, state->request.data.sid)) {		DEBUG(5, ("%s not a SID\n", state->request.data.sid));		request_error(state);		return;	}	winbindd_lookupsid_async(state->mem_ctx, &sid, lookupsid_recv, state);}static void lookupsid_recv(void *private_data, BOOL success,			   const char *dom_name, const char *name,			   enum SID_NAME_USE type){	struct winbindd_cli_state *state =		talloc_get_type_abort(private_data, struct winbindd_cli_state);	if (!success) {		DEBUG(5, ("lookupsid returned an error\n"));		request_error(state);		return;	}	fstrcpy(state->response.data.name.dom_name, dom_name);	fstrcpy(state->response.data.name.name, name);	state->response.data.name.type = type;	request_ok(state);}/** * Look up the SID for a qualified name.   **/static void lookupname_recv(void *private_data, BOOL success,			    const DOM_SID *sid, enum SID_NAME_USE type);void winbindd_lookupname(struct winbindd_cli_state *state){	char *name_domain, *name_user;	char *p;	/* Ensure null termination */	state->request.data.sid[sizeof(state->request.data.name.dom_name)-1]='\0';	/* Ensure null termination */	state->request.data.sid[sizeof(state->request.data.name.name)-1]='\0';	/* cope with the name being a fully qualified name */	p = strstr(state->request.data.name.name, lp_winbind_separator());	if (p) {		*p = 0;		name_domain = state->request.data.name.name;		name_user = p+1;	} else {		name_domain = state->request.data.name.dom_name;		name_user = state->request.data.name.name;	}	DEBUG(3, ("[%5lu]: lookupname %s%s%s\n", (unsigned long)state->pid,		  name_domain, lp_winbind_separator(), name_user));	winbindd_lookupname_async(state->mem_ctx, name_domain, name_user,				  lookupname_recv, state);}static void lookupname_recv(void *private_data, BOOL success,			    const DOM_SID *sid, enum SID_NAME_USE type){	struct winbindd_cli_state *state =		talloc_get_type_abort(private_data, struct winbindd_cli_state);	if (!success) {		DEBUG(5, ("lookupname returned an error\n"));		request_error(state);		return;	}	sid_to_string(state->response.data.sid.sid, sid);	state->response.data.sid.type = type;	request_ok(state);	return;}static struct winbindd_child static_idmap_child;void init_idmap_child(void){	setup_domain_child(NULL, &static_idmap_child, "idmap");}struct winbindd_child *idmap_child(void){	return &static_idmap_child;}/* Convert a sid to a uid.  We assume we only have one rid attached to the   sid. */static void sid2uid_recv(void *private_data, BOOL success, uid_t uid);void winbindd_sid_to_uid(struct winbindd_cli_state *state){	DOM_SID sid;	NTSTATUS result;	/* Ensure null termination */	state->request.data.sid[sizeof(state->request.data.sid)-1]='\0';	DEBUG(3, ("[%5lu]: sid to uid %s\n", (unsigned long)state->pid,		  state->request.data.sid));	if (idmap_proxyonly()) {		DEBUG(8, ("IDMAP proxy only\n"));		request_error(state);		return;	}	if (!string_to_sid(&sid, state->request.data.sid)) {		DEBUG(1, ("Could not get convert sid %s from string\n",			  state->request.data.sid));		request_error(state);		return;	}	/* Query only the local tdb, everything else might possibly block */	result = idmap_sid_to_uid(&sid, &(state->response.data.uid),				  ID_QUERY_ONLY|ID_CACHE_ONLY);	if (NT_STATUS_IS_OK(result)) {		request_ok(state);		return;	}	winbindd_sid2uid_async(state->mem_ctx, &sid, sid2uid_recv, state);}static void sid2uid_recv(void *private_data, BOOL success, uid_t uid){	struct winbindd_cli_state *state =		talloc_get_type_abort(private_data, struct winbindd_cli_state);	if (!success) {		DEBUG(5, ("Could not convert sid %s\n",			  state->request.data.sid));		request_error(state);		return;	}	state->response.data.uid = uid;	request_ok(state);}/* Convert a sid to a gid.  We assume we only have one rid attached to the   sid.*/static void sid2gid_recv(void *private_data, BOOL success, gid_t gid);void winbindd_sid_to_gid(struct winbindd_cli_state *state){	DOM_SID sid;	NTSTATUS result;	/* Ensure null termination */	state->request.data.sid[sizeof(state->request.data.sid)-1]='\0';	DEBUG(3, ("[%5lu]: sid to gid %s\n", (unsigned long)state->pid,		  state->request.data.sid));	if (idmap_proxyonly()) {		DEBUG(8, ("IDMAP proxy only\n"));		request_error(state);		return;	}	if (!string_to_sid(&sid, state->request.data.sid)) {		DEBUG(1, ("Could not get convert sid %s from string\n",			  state->request.data.sid));		request_error(state);		return;	}	/* Query only the local tdb, everything else might possibly block */	result = idmap_sid_to_gid(&sid, &(state->response.data.gid),				  ID_QUERY_ONLY|ID_CACHE_ONLY);	if (NT_STATUS_IS_OK(result)) {		request_ok(state);		return;	}	winbindd_sid2gid_async(state->mem_ctx, &sid, sid2gid_recv, state);}static void sid2gid_recv(void *private_data, BOOL success, gid_t gid){	struct winbindd_cli_state *state =		talloc_get_type_abort(private_data, struct winbindd_cli_state);	if (!success) {		DEBUG(5, ("Could not convert sid %s\n",			  state->request.data.sid));		request_error(state);		return;	}	state->response.data.gid = gid;	request_ok(state);}/* Convert a uid to a sid */struct uid2sid_state {	struct winbindd_cli_state *cli_state;	uid_t uid;	fstring name;	DOM_SID sid;	enum SID_NAME_USE type;};static void uid2sid_uid2name_recv(void *private_data, BOOL success,				  const char *username);static void uid2sid_lookupname_recv(void *private_data, BOOL success,				    const DOM_SID *sid,				    enum SID_NAME_USE type);static void uid2sid_idmap_set_mapping_recv(void *private_data, BOOL success);void winbindd_uid_to_sid(struct winbindd_cli_state *state){	DOM_SID sid;	NTSTATUS status;	struct uid2sid_state *uid2sid_state;	DEBUG(3, ("[%5lu]: uid to sid %lu\n", (unsigned long)state->pid, 		  (unsigned long)state->request.data.uid));	if (idmap_proxyonly()) {		DEBUG(8, ("IDMAP proxy only\n"));		request_error(state);		return;	}	status = idmap_uid_to_sid(&sid, state->request.data.uid,				  ID_QUERY_ONLY | ID_CACHE_ONLY);	if (NT_STATUS_IS_OK(status)) {		sid_to_string(state->response.data.sid.sid, &sid);		state->response.data.sid.type = SID_NAME_USER;		request_ok(state);		return;	}	if (is_in_uid_range(state->request.data.uid)) {		/* This is winbind's, so we should better have succeeded		 * above. */		request_error(state);		return;	}	/* The only chance that this is correct is that winbind trusted	 * domains only = yes, and the user exists in nss and the domain. */	if (!lp_winbind_trusted_domains_only()) {		request_error(state);		return;	}	/* The only chance that this is correct is that winbind trusted	 * domains only = yes, and the user exists in nss and the domain. */	uid2sid_state = TALLOC_ZERO_P(state->mem_ctx, struct uid2sid_state);	if (uid2sid_state == NULL) {		DEBUG(0, ("talloc failed\n"));		request_error(state);		return;	}	uid2sid_state->cli_state = state;	uid2sid_state->uid = state->request.data.uid;	winbindd_uid2name_async(state->mem_ctx, state->request.data.uid,				uid2sid_uid2name_recv, uid2sid_state);}static void uid2sid_uid2name_recv(void *private_data, BOOL success,				  const char *username){	struct uid2sid_state *state =		talloc_get_type_abort(private_data, struct uid2sid_state);	DEBUG(10, ("uid2sid: uid %lu has name %s\n",		   (unsigned long)state->uid, username));	fstrcpy(state->name, username);	if (!success) {		request_error(state->cli_state);		return;	}	winbindd_lookupname_async(state->cli_state->mem_ctx,				  find_our_domain()->name, username,				  uid2sid_lookupname_recv, state);}static void uid2sid_lookupname_recv(void *private_data, BOOL success,				    const DOM_SID *sid, enum SID_NAME_USE type){	struct uid2sid_state *state =		talloc_get_type_abort(private_data, struct uid2sid_state);	unid_t id;	if ((!success) || (type != SID_NAME_USER)) {		request_error(state->cli_state);		return;	}	state->sid = *sid;	state->type = type;	id.uid = state->uid;	idmap_set_mapping_async(state->cli_state->mem_ctx, sid, id, ID_USERID,				uid2sid_idmap_set_mapping_recv, state );}static void uid2sid_idmap_set_mapping_recv(void *private_data, BOOL success){	struct uid2sid_state *state =		talloc_get_type_abort(private_data, struct uid2sid_state);	/* don't fail if we can't store it */	sid_to_string(state->cli_state->response.data.sid.sid, &state->sid);	state->cli_state->response.data.sid.type = state->type;	request_ok(state->cli_state);}/* Convert a gid to a sid */struct gid2sid_state {	struct winbindd_cli_state *cli_state;	gid_t gid;	fstring name;	DOM_SID sid;	enum SID_NAME_USE type;};static void gid2sid_gid2name_recv(void *private_data, BOOL success,				  const char *groupname);static void gid2sid_lookupname_recv(void *private_data, BOOL success,				    const DOM_SID *sid,				    enum SID_NAME_USE type);static void gid2sid_idmap_set_mapping_recv(void *private_data, BOOL success);void winbindd_gid_to_sid(struct winbindd_cli_state *state){	DOM_SID sid;	NTSTATUS status;	struct gid2sid_state *gid2sid_state;	DEBUG(3, ("[%5lu]: gid to sid %lu\n", (unsigned long)state->pid, 		  (unsigned long)state->request.data.gid));	if (idmap_proxyonly()) {		DEBUG(8, ("IDMAP proxy only\n"));		request_error(state);		return;	}	status = idmap_gid_to_sid(&sid, state->request.data.gid,				  ID_QUERY_ONLY | ID_CACHE_ONLY);	if (NT_STATUS_IS_OK(status)) {		sid_to_string(state->response.data.sid.sid, &sid);		state->response.data.sid.type = SID_NAME_USER;		request_ok(state);		return;	}	if (is_in_gid_range(state->request.data.gid)) {		/* This is winbind's, so we should better have succeeded		 * above. */		request_error(state);		return;	}	/* The only chance that this is correct is that winbind trusted	 * domains only = yes, and the user exists in nss and the domain. */	if (!lp_winbind_trusted_domains_only()) {		request_error(state);		return;	}	/* The only chance that this is correct is that winbind trusted	 * domains only = yes, and the user exists in nss and the domain. */	gid2sid_state = TALLOC_ZERO_P(state->mem_ctx, struct gid2sid_state);	if (gid2sid_state == NULL) {		DEBUG(0, ("talloc failed\n"));		request_error(state);		return;	}	gid2sid_state->cli_state = state;	gid2sid_state->gid = state->request.data.gid;	winbindd_gid2name_async(state->mem_ctx, state->request.data.gid,				gid2sid_gid2name_recv, gid2sid_state);}static void gid2sid_gid2name_recv(void *private_data, BOOL success,				  const char *username){	struct gid2sid_state *state =		talloc_get_type_abort(private_data, struct gid2sid_state);	DEBUG(10, ("gid2sid: gid %lu has name %s\n",		   (unsigned long)state->gid, username));	fstrcpy(state->name, username);	if (!success) {		request_error(state->cli_state);		return;	}	winbindd_lookupname_async(state->cli_state->mem_ctx,				  find_our_domain()->name, username,				  gid2sid_lookupname_recv, state);}static void gid2sid_lookupname_recv(void *private_data, BOOL success,				    const DOM_SID *sid, enum SID_NAME_USE type){	struct gid2sid_state *state =		talloc_get_type_abort(private_data, struct gid2sid_state);	unid_t id;	if ((!success) ||	    ((type != SID_NAME_DOM_GRP) && (type!=SID_NAME_ALIAS))) {		request_error(state->cli_state);		return;	}	state->sid = *sid;	state->type = type;	id.gid = state->gid;	idmap_set_mapping_async(state->cli_state->mem_ctx, sid, id, ID_GROUPID,				gid2sid_idmap_set_mapping_recv, state );}static void gid2sid_idmap_set_mapping_recv(void *private_data, BOOL success){	struct gid2sid_state *state = private_data;	/* don't fail if we can't store it */	sid_to_string(state->cli_state->response.data.sid.sid, &state->sid);	state->cli_state->response.data.sid.type = state->type;	request_ok(state->cli_state);}void winbindd_allocate_rid(struct winbindd_cli_state *state){	if ( !state->privileged ) {		DEBUG(2, ("winbindd_allocate_rid: non-privileged access "			  "denied!\n"));		request_error(state);		return;	}	sendto_child(state, idmap_child());}enum winbindd_result winbindd_dual_allocate_rid(struct winbindd_domain *domain,						struct winbindd_cli_state *state){	/* We tell idmap to always allocate a user RID. There might be a good	 * reason to keep RID allocation for users to even and groups to	 * odd. This needs discussion I think. For now only allocate user	 * rids. */	if (!NT_STATUS_IS_OK(idmap_allocate_rid(&state->response.data.rid,						USER_RID_TYPE)))		return WINBINDD_ERROR;	return WINBINDD_OK;}void winbindd_allocate_rid_and_gid(struct winbindd_cli_state *state){	if ( !state->privileged ) {		DEBUG(2, ("winbindd_allocate_rid: non-privileged access "			  "denied!\n"));		request_error(state);		return;	}	sendto_child(state, idmap_child());}enum winbindd_result winbindd_dual_allocate_rid_and_gid(struct winbindd_domain *domain,							struct winbindd_cli_state *state){	NTSTATUS result;	DOM_SID sid;	/* We tell idmap to always allocate a user RID. This is really	 * historic and needs to be fixed. I *think* this has to do with the	 * way winbind determines its free RID space. */	result = idmap_allocate_rid(&state->response.data.rid_and_gid.rid,				    USER_RID_TYPE);	if (!NT_STATUS_IS_OK(result))		return WINBINDD_ERROR;	sid_copy(&sid, get_global_sam_sid());	sid_append_rid(&sid, state->response.data.rid_and_gid.rid);	result = idmap_sid_to_gid(&sid, &state->response.data.rid_and_gid.gid,				  0);	if (!NT_STATUS_IS_OK(result))		return WINBINDD_ERROR;	return WINBINDD_OK;}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?