Correctly check for errors in strlower_m() returns.
[samba.git] / source3 / winbindd / wb_fill_pwent.c
1 /*
2    Unix SMB/CIFS implementation.
3    async fill_pwent
4    Copyright (C) Volker Lendecke 2009
5
6    This program is free software; you can redistribute it and/or modify
7    it under the terms of the GNU General Public License as published by
8    the Free Software Foundation; either version 3 of the License, or
9    (at your option) any later version.
10
11    This program is distributed in the hope that it will be useful,
12    but WITHOUT ANY WARRANTY; without even the implied warranty of
13    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14    GNU General Public License for more details.
15
16    You should have received a copy of the GNU General Public License
17    along with this program.  If not, see <http://www.gnu.org/licenses/>.
18 */
19
20 #include "includes.h"
21 #include "winbindd.h"
22 #include "librpc/gen_ndr/ndr_wbint_c.h"
23
24 struct wb_fill_pwent_state {
25         struct tevent_context *ev;
26         struct wbint_userinfo *info;
27         struct winbindd_pw *pw;
28 };
29
30 static bool fillup_pw_field(const char *lp_template,
31                             const char *username,
32                             const char *domname,
33                             uid_t uid,
34                             gid_t gid,
35                             const char *in,
36                             fstring out);
37
38 static void wb_fill_pwent_sid2uid_done(struct tevent_req *subreq);
39 static void wb_fill_pwent_sid2gid_done(struct tevent_req *subreq);
40
41 struct tevent_req *wb_fill_pwent_send(TALLOC_CTX *mem_ctx,
42                                       struct tevent_context *ev,
43                                       struct wbint_userinfo *info,
44                                       struct winbindd_pw *pw)
45 {
46         struct tevent_req *req, *subreq;
47         struct wb_fill_pwent_state *state;
48
49         req = tevent_req_create(mem_ctx, &state, struct wb_fill_pwent_state);
50         if (req == NULL) {
51                 return NULL;
52         }
53         state->ev = ev;
54         state->info = info;
55         state->pw = pw;
56
57         subreq = wb_sid2uid_send(state, state->ev, &state->info->user_sid);
58         if (tevent_req_nomem(subreq, req)) {
59                 return tevent_req_post(req, ev);
60         }
61         tevent_req_set_callback(subreq, wb_fill_pwent_sid2uid_done, req);
62         return req;
63 }
64
65 static void wb_fill_pwent_sid2uid_done(struct tevent_req *subreq)
66 {
67         struct tevent_req *req = tevent_req_callback_data(
68                 subreq, struct tevent_req);
69         struct wb_fill_pwent_state *state = tevent_req_data(
70                 req, struct wb_fill_pwent_state);
71         NTSTATUS status;
72
73         status = wb_sid2uid_recv(subreq, &state->pw->pw_uid);
74         TALLOC_FREE(subreq);
75         if (tevent_req_nterror(req, status)) {
76                 return;
77         }
78
79         subreq = wb_sid2gid_send(state, state->ev, &state->info->group_sid);
80         if (tevent_req_nomem(subreq, req)) {
81                 return;
82         }
83         tevent_req_set_callback(subreq, wb_fill_pwent_sid2gid_done, req);
84 }
85
86 static void wb_fill_pwent_sid2gid_done(struct tevent_req *subreq)
87 {
88         struct tevent_req *req = tevent_req_callback_data(
89                 subreq, struct tevent_req);
90         struct wb_fill_pwent_state *state = tevent_req_data(
91                 req, struct wb_fill_pwent_state);
92         struct winbindd_domain *domain;
93         char *dom_name;
94         fstring user_name, output_username;
95         char *mapped_name = NULL;
96         NTSTATUS status;
97
98         status = wb_sid2gid_recv(subreq, &state->pw->pw_gid);
99         TALLOC_FREE(subreq);
100         if (tevent_req_nterror(req, status)) {
101                 return;
102         }
103
104         domain = find_domain_from_sid_noinit(&state->info->user_sid);
105         if (domain == NULL) {
106                 tevent_req_nterror(req, NT_STATUS_NO_SUCH_USER);
107                 return;
108         }
109         dom_name = domain->name;
110
111         /* Username */
112
113         fstrcpy(user_name, state->info->acct_name);
114         if (!strlower_m(user_name)) {
115                 tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER);
116                 return;
117         }
118         status = normalize_name_map(state, domain, user_name, &mapped_name);
119
120         /* Basic removal of whitespace */
121         if (NT_STATUS_IS_OK(status)) {
122                 fill_domain_username(output_username, dom_name, mapped_name,
123                                      true);
124         }
125         /* Complete name replacement */
126         else if (NT_STATUS_EQUAL(status, NT_STATUS_FILE_RENAMED)) {
127                 fstrcpy(output_username, mapped_name);
128         }
129         /* No change at all */
130         else {
131                 fill_domain_username(output_username, dom_name, user_name,
132                                      true);
133         }
134
135         strlcpy(state->pw->pw_name,
136                 output_username,
137                 sizeof(state->pw->pw_name));
138         fstrcpy(state->pw->pw_gecos, state->info->full_name);
139
140         /* Home directory and shell */
141
142         if (!fillup_pw_field(lp_template_homedir(), user_name, dom_name,
143                              state->pw->pw_uid, state->pw->pw_gid,
144                              state->info->homedir, state->pw->pw_dir)) {
145                 tevent_req_nterror(req, NT_STATUS_NO_SUCH_USER);
146                 return;
147         }
148
149         if (!fillup_pw_field(lp_template_shell(), user_name, dom_name,
150                              state->pw->pw_uid, state->pw->pw_gid,
151                              state->info->shell, state->pw->pw_shell)) {
152                 tevent_req_nterror(req, NT_STATUS_NO_SUCH_USER);
153                 return;
154         }
155
156         /* Password - set to "*" as we can't generate anything useful here.
157            Authentication can be done using the pam_winbind module. */
158
159         fstrcpy(state->pw->pw_passwd, "*");
160         tevent_req_done(req);
161 }
162
163 NTSTATUS wb_fill_pwent_recv(struct tevent_req *req)
164 {
165         return tevent_req_simple_recv_ntstatus(req);
166 }
167
168 static bool fillup_pw_field(const char *lp_template,
169                             const char *username,
170                             const char *domname,
171                             uid_t uid,
172                             gid_t gid,
173                             const char *in,
174                             fstring out)
175 {
176         char *templ;
177
178         if (out == NULL)
179                 return False;
180
181         /* The substitution of %U and %D in the 'template
182            homedir' is done by talloc_sub_specified() below.
183            If we have an in string (which means the value has already
184            been set in the nss_info backend), then use that.
185            Otherwise use the template value passed in. */
186
187         if ((in != NULL) && (in[0] != '\0') && (lp_security() == SEC_ADS)) {
188                 templ = talloc_sub_specified(talloc_tos(), in,
189                                              username, domname,
190                                              uid, gid);
191         } else {
192                 templ = talloc_sub_specified(talloc_tos(), lp_template,
193                                              username, domname,
194                                              uid, gid);
195         }
196
197         if (!templ)
198                 return False;
199
200         strlcpy(out, templ, sizeof(fstring));
201         TALLOC_FREE(templ);
202
203         return True;
204
205 }