waf: Only build pam_wrapper if we build with pam
[samba.git] / source3 / winbindd / wb_sids2xids.c
1 /*
2    Unix SMB/CIFS implementation.
3    async sids2xids
4    Copyright (C) Volker Lendecke 2011
5    Copyright (C) Michael Adam 2012
6
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22 #include "winbindd.h"
23 #include "../libcli/security/security.h"
24 #include "idmap_cache.h"
25 #include "librpc/gen_ndr/ndr_winbind_c.h"
26 #include "librpc/gen_ndr/ndr_netlogon.h"
27 #include "lsa.h"
28
29 struct wb_sids2xids_state {
30         struct tevent_context *ev;
31
32         struct dom_sid *sids;
33         uint32_t num_sids;
34
35         struct id_map *cached;
36
37         struct dom_sid *non_cached;
38         uint32_t num_non_cached;
39
40         /*
41          * Domain array to use for the idmap call. The output from
42          * lookupsids cannot be used directly since for migrated
43          * objects the returned domain SID can be different than the
44          * original one. The new domain SID cannot be combined with
45          * the RID from the previous domain.
46          *
47          * The proper way would be asking for the correct RID in the
48          * new domain, but this approach avoids id mappings for
49          * invalid SIDs.
50          */
51         struct lsa_RefDomainList idmap_doms;
52
53         uint32_t dom_index;
54         struct wbint_TransIDArray *dom_ids;
55         struct lsa_RefDomainList idmap_dom;
56         bool tried_dclookup;
57
58         struct wbint_TransIDArray ids;
59 };
60
61
62 static bool wb_sids2xids_in_cache(struct dom_sid *sid, struct id_map *map);
63 static void wb_sids2xids_lookupsids_done(struct tevent_req *subreq);
64 static void wb_sids2xids_done(struct tevent_req *subreq);
65 static void wb_sids2xids_gotdc(struct tevent_req *subreq);
66
67 struct tevent_req *wb_sids2xids_send(TALLOC_CTX *mem_ctx,
68                                      struct tevent_context *ev,
69                                      const struct dom_sid *sids,
70                                      const uint32_t num_sids)
71 {
72         struct tevent_req *req, *subreq;
73         struct wb_sids2xids_state *state;
74         uint32_t i;
75
76         req = tevent_req_create(mem_ctx, &state,
77                                 struct wb_sids2xids_state);
78         if (req == NULL) {
79                 return NULL;
80         }
81
82         state->ev = ev;
83
84         state->num_sids = num_sids;
85
86         state->sids = talloc_zero_array(state, struct dom_sid, num_sids);
87         if (tevent_req_nomem(state->sids, req)) {
88                 return tevent_req_post(req, ev);
89         }
90
91         for (i = 0; i < num_sids; i++) {
92                 sid_copy(&state->sids[i], &sids[i]);
93         }
94
95         state->cached = talloc_zero_array(state, struct id_map, num_sids);
96         if (tevent_req_nomem(state->cached, req)) {
97                 return tevent_req_post(req, ev);
98         }
99
100         state->non_cached = talloc_array(state, struct dom_sid, num_sids);
101         if (tevent_req_nomem(state->non_cached, req)) {
102                 return tevent_req_post(req, ev);
103         }
104
105         /*
106          * Extract those sids that can not be resolved from cache
107          * into a separate list to be handed to id mapping, keeping
108          * the same index.
109          */
110         for (i=0; i<state->num_sids; i++) {
111
112                 DEBUG(10, ("SID %d: %s\n", (int)i,
113                            sid_string_dbg(&state->sids[i])));
114
115                 if (wb_sids2xids_in_cache(&state->sids[i], &state->cached[i])) {
116                         continue;
117                 }
118                 sid_copy(&state->non_cached[state->num_non_cached],
119                          &state->sids[i]);
120                 state->num_non_cached += 1;
121         }
122
123         if (state->num_non_cached == 0) {
124                 tevent_req_done(req);
125                 return tevent_req_post(req, ev);
126         }
127
128         subreq = wb_lookupsids_send(state, ev, state->non_cached,
129                                     state->num_non_cached);
130         if (tevent_req_nomem(subreq, req)) {
131                 return tevent_req_post(req, ev);
132         }
133         tevent_req_set_callback(subreq, wb_sids2xids_lookupsids_done, req);
134         return req;
135 }
136
137 static bool wb_sids2xids_in_cache(struct dom_sid *sid, struct id_map *map)
138 {
139         struct unixid id;
140         bool expired;
141
142         if (!winbindd_use_idmap_cache()) {
143                 return false;
144         }
145         if (idmap_cache_find_sid2unixid(sid, &id, &expired)) {
146                 if (expired && is_domain_online(find_our_domain())) {
147                         return false;
148                 }
149                 map->sid = sid;
150                 map->xid = id;
151                 map->status = ID_MAPPED;
152                 return true;
153         }
154         return false;
155 }
156
157 static enum id_type lsa_SidType_to_id_type(const enum lsa_SidType sid_type);
158 static struct wbint_TransIDArray *wb_sids2xids_extract_for_domain_index(
159         TALLOC_CTX *mem_ctx, const struct wbint_TransIDArray *src,
160         uint32_t domain_index);
161
162 static void wb_sids2xids_lookupsids_done(struct tevent_req *subreq)
163 {
164         struct tevent_req *req = tevent_req_callback_data(
165                 subreq, struct tevent_req);
166         struct wb_sids2xids_state *state = tevent_req_data(
167                 req, struct wb_sids2xids_state);
168         struct lsa_RefDomainList *domains = NULL;
169         struct lsa_TransNameArray *names = NULL;
170         struct winbindd_child *child;
171         NTSTATUS status;
172         int i;
173
174         status = wb_lookupsids_recv(subreq, state, &domains, &names);
175         TALLOC_FREE(subreq);
176         if (tevent_req_nterror(req, status)) {
177                 return;
178         }
179
180         state->ids.num_ids = state->num_non_cached;
181         state->ids.ids = talloc_array(state, struct wbint_TransID,
182                                       state->num_non_cached);
183         if (tevent_req_nomem(state->ids.ids, req)) {
184                 return;
185         }
186
187         for (i=0; i<state->num_non_cached; i++) {
188                 const struct dom_sid *sid = &state->non_cached[i];
189                 struct dom_sid dom_sid;
190                 struct lsa_TranslatedName *n = &names->names[i];
191                 struct wbint_TransID *t = &state->ids.ids[i];
192                 int domain_index;
193                 const char *domain_name = NULL;
194
195                 if (n->sid_index != UINT32_MAX) {
196                         const struct lsa_DomainInfo *info;
197
198                         info = &domains->domains[n->sid_index];
199                         domain_name = info->name.string;
200                 }
201                 if (domain_name == NULL) {
202                         struct winbindd_domain *wb_domain = NULL;
203
204                         /*
205                          * This is needed to handle Samba DCs
206                          * which always return sid_index == UINT32_MAX for
207                          * unknown sids.
208                          */
209                         wb_domain = find_domain_from_sid_noinit(sid);
210                         if (wb_domain != NULL) {
211                                 domain_name = wb_domain->name;
212                         }
213                 }
214                 if (domain_name == NULL) {
215                         domain_name = "";
216                 }
217
218                 sid_copy(&dom_sid, sid);
219                 sid_split_rid(&dom_sid, &t->rid);
220                 t->type = lsa_SidType_to_id_type(n->sid_type);
221                 domain_index = init_lsa_ref_domain_list(
222                         state, &state->idmap_doms, domain_name, &dom_sid);
223                 if (domain_index == -1) {
224                         tevent_req_oom(req);
225                         return;
226                 }
227                 t->domain_index = domain_index;
228
229                 t->xid.id = UINT32_MAX;
230                 t->xid.type = t->type;
231         }
232
233         TALLOC_FREE(names);
234         TALLOC_FREE(domains);
235
236         child = idmap_child();
237
238         state->dom_ids = wb_sids2xids_extract_for_domain_index(
239                 state, &state->ids, state->dom_index);
240         if (tevent_req_nomem(state->dom_ids, req)) {
241                 return;
242         }
243
244         state->idmap_dom = (struct lsa_RefDomainList) {
245                 .count = 1,
246                 .domains = &state->idmap_doms.domains[state->dom_index],
247                 .max_size = 1
248         };
249
250         subreq = dcerpc_wbint_Sids2UnixIDs_send(
251                 state, state->ev, child->binding_handle, &state->idmap_dom,
252                 state->dom_ids);
253         if (tevent_req_nomem(subreq, req)) {
254                 return;
255         }
256         tevent_req_set_callback(subreq, wb_sids2xids_done, req);
257 }
258
259 static enum id_type lsa_SidType_to_id_type(const enum lsa_SidType sid_type)
260 {
261         enum id_type type;
262
263         switch(sid_type) {
264         case SID_NAME_COMPUTER:
265         case SID_NAME_USER:
266                 type = ID_TYPE_UID;
267                 break;
268         case SID_NAME_DOM_GRP:
269         case SID_NAME_ALIAS:
270         case SID_NAME_WKN_GRP:
271                 type = ID_TYPE_GID;
272                 break;
273         default:
274                 type = ID_TYPE_NOT_SPECIFIED;
275                 break;
276         }
277
278         return type;
279 }
280
281 static void wb_sids2xids_done(struct tevent_req *subreq)
282 {
283         struct tevent_req *req = tevent_req_callback_data(
284                 subreq, struct tevent_req);
285         struct wb_sids2xids_state *state = tevent_req_data(
286                 req, struct wb_sids2xids_state);
287         NTSTATUS status, result;
288         struct winbindd_child *child;
289
290         struct wbint_TransIDArray *src, *dst;
291         uint32_t i, src_idx;
292
293         status = dcerpc_wbint_Sids2UnixIDs_recv(subreq, state, &result);
294         TALLOC_FREE(subreq);
295
296         if (tevent_req_nterror(req, status)) {
297                 return;
298         }
299
300         if (NT_STATUS_EQUAL(result, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND) &&
301             !state->tried_dclookup) {
302
303                 struct lsa_DomainInfo *d;
304
305                 d = &state->idmap_doms.domains[state->dom_index];
306
307                 subreq = wb_dsgetdcname_send(
308                         state, state->ev, d->name.string, NULL, NULL,
309                         DS_RETURN_DNS_NAME);
310                 if (tevent_req_nomem(subreq, req)) {
311                         return;
312                 }
313                 tevent_req_set_callback(subreq, wb_sids2xids_gotdc, req);
314                 return;
315         }
316
317         src = state->dom_ids;
318         src_idx = 0;
319         dst = &state->ids;
320
321         if (any_nt_status_not_ok(status, result, &status)) {
322                 DBG_DEBUG("status=%s, result=%s\n", nt_errstr(status),
323                           nt_errstr(result));
324
325                 /*
326                  * All we can do here is to report "not mapped"
327                  */
328                 for (i=0; i<src->num_ids; i++) {
329                         src->ids[i].xid.type = ID_TYPE_NOT_SPECIFIED;
330                 }
331         }
332
333         for (i=0; i<dst->num_ids; i++) {
334                 if (dst->ids[i].domain_index == state->dom_index) {
335                         dst->ids[i].type = src->ids[src_idx].type;
336                         dst->ids[i].xid  = src->ids[src_idx].xid;
337                         src_idx += 1;
338                 }
339         }
340
341         TALLOC_FREE(state->dom_ids);
342
343         state->dom_index += 1;
344         state->tried_dclookup = false;
345
346         if (state->dom_index == state->idmap_doms.count) {
347                 tevent_req_done(req);
348                 return;
349         }
350
351         child = idmap_child();
352
353         state->dom_ids = wb_sids2xids_extract_for_domain_index(
354                 state, &state->ids, state->dom_index);
355         if (tevent_req_nomem(state->dom_ids, req)) {
356                 return;
357         }
358
359         state->idmap_dom = (struct lsa_RefDomainList) {
360                 .count = 1,
361                 .domains = &state->idmap_doms.domains[state->dom_index],
362                 .max_size = 1
363         };
364
365         subreq = dcerpc_wbint_Sids2UnixIDs_send(
366                 state, state->ev, child->binding_handle, &state->idmap_dom,
367                 state->dom_ids);
368         if (tevent_req_nomem(subreq, req)) {
369                 return;
370         }
371         tevent_req_set_callback(subreq, wb_sids2xids_done, req);
372 }
373
374 static void wb_sids2xids_gotdc(struct tevent_req *subreq)
375 {
376         struct tevent_req *req = tevent_req_callback_data(
377                 subreq, struct tevent_req);
378         struct wb_sids2xids_state *state = tevent_req_data(
379                 req, struct wb_sids2xids_state);
380         struct winbindd_child *child = idmap_child();
381         struct netr_DsRGetDCNameInfo *dcinfo;
382         NTSTATUS status;
383
384         status = wb_dsgetdcname_recv(subreq, state, &dcinfo);
385         TALLOC_FREE(subreq);
386         if (tevent_req_nterror(req, status)) {
387                 return;
388         }
389
390         state->tried_dclookup = true;
391
392         {
393                 struct lsa_DomainInfo *d =
394                         &state->idmap_doms.domains[state->dom_index];
395                 const char *dom_name = d->name.string;
396
397                 status = wb_dsgetdcname_gencache_set(dom_name, dcinfo);
398                 if (tevent_req_nterror(req, status)) {
399                         return;
400                 }
401         }
402
403         subreq = dcerpc_wbint_Sids2UnixIDs_send(
404                 state, state->ev, child->binding_handle, &state->idmap_dom,
405                 state->dom_ids);
406         if (tevent_req_nomem(subreq, req)) {
407                 return;
408         }
409         tevent_req_set_callback(subreq, wb_sids2xids_done, req);
410 }
411
412 NTSTATUS wb_sids2xids_recv(struct tevent_req *req,
413                            struct unixid xids[], uint32_t num_xids)
414 {
415         struct wb_sids2xids_state *state = tevent_req_data(
416                 req, struct wb_sids2xids_state);
417         NTSTATUS status;
418         uint32_t i, num_non_cached;
419
420         if (tevent_req_is_nterror(req, &status)) {
421                 DEBUG(5, ("wb_sids_to_xids failed: %s\n", nt_errstr(status)));
422                 return status;
423         }
424
425         if (num_xids != state->num_sids) {
426                 DEBUG(1, ("%s: Have %u xids, caller wants %u\n", __func__,
427                           (unsigned)state->num_sids, num_xids));
428                 return NT_STATUS_INTERNAL_ERROR;
429         }
430
431         num_non_cached = 0;
432
433         for (i=0; i<state->num_sids; i++) {
434                 struct unixid xid;
435
436                 xid.id = UINT32_MAX;
437
438                 if (state->cached[i].sid != NULL) {
439                         xid = state->cached[i].xid;
440                 } else {
441                         xid = state->ids.ids[num_non_cached].xid;
442
443                         idmap_cache_set_sid2unixid(
444                                 &state->non_cached[num_non_cached],
445                                 &xid);
446
447                         num_non_cached += 1;
448                 }
449
450                 xids[i] = xid;
451         }
452
453         return NT_STATUS_OK;
454 }
455
456 static struct wbint_TransIDArray *wb_sids2xids_extract_for_domain_index(
457         TALLOC_CTX *mem_ctx, const struct wbint_TransIDArray *src,
458         uint32_t domain_index)
459 {
460         struct wbint_TransIDArray *ret;
461         uint32_t i;
462
463         ret = talloc_zero(mem_ctx, struct wbint_TransIDArray);
464         if (ret == NULL) {
465                 return NULL;
466         }
467         ret->ids = talloc_array(ret, struct wbint_TransID, src->num_ids);
468         if (ret->ids == NULL) {
469                 TALLOC_FREE(ret);
470                 return NULL;
471         }
472
473         for (i=0; i<src->num_ids; i++) {
474                 if (src->ids[i].domain_index == domain_index) {
475                         ret->ids[ret->num_ids] = src->ids[i];
476                         ret->ids[ret->num_ids].domain_index = 0;
477                         ret->num_ids += 1;
478                 }
479         }
480
481         return ret;
482 }