/* * Unix SMB/CIFS implementation. * Local SAM access routines * Copyright (C) Volker Lendecke 2006 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see . */ #include "includes.h" #include "system/passwd.h" #include "utils/net.h" #include "../librpc/gen_ndr/samr.h" #include "smbldap.h" #include "../libcli/security/security.h" #include "lib/winbind_util.h" #include "passdb.h" #include "passdb/pdb_ldap_util.h" #include "lib/privileges.h" /* * Set a user's data */ static int net_sam_userset(struct net_context *c, int argc, const char **argv, const char *field, bool (*fn)(struct samu *, const char *, enum pdb_value_state)) { struct samu *sam_acct = NULL; struct dom_sid sid; enum lsa_SidType type; const char *dom, *name; NTSTATUS status; if (argc != 2 || c->display_usage) { d_fprintf(stderr, "%s\n", _("Usage:")); d_fprintf(stderr, _("net sam set %s \n"), field); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find name %s\n"), argv[0]); return -1; } if (type != SID_NAME_USER) { d_fprintf(stderr, _("%s is a %s, not a user\n"), argv[0], sid_type_lookup(type)); return -1; } if ( !(sam_acct = samu_new( NULL )) ) { d_fprintf(stderr, _("Internal error\n")); return -1; } if (!pdb_getsampwsid(sam_acct, &sid)) { d_fprintf(stderr, _("Loading user %s failed\n"), argv[0]); return -1; } if (!fn(sam_acct, argv[1], PDB_CHANGED)) { d_fprintf(stderr, _("Internal error\n")); return -1; } status = pdb_update_sam_account(sam_acct); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Updating sam account %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } TALLOC_FREE(sam_acct); d_printf(_("Updated %s for %s\\%s to %s\n"), field, dom, name, argv[1]); return 0; } static int net_sam_set_fullname(struct net_context *c, int argc, const char **argv) { return net_sam_userset(c, argc, argv, "fullname", pdb_set_fullname); } static int net_sam_set_logonscript(struct net_context *c, int argc, const char **argv) { return net_sam_userset(c, argc, argv, "logonscript", pdb_set_logon_script); } static int net_sam_set_profilepath(struct net_context *c, int argc, const char **argv) { return net_sam_userset(c, argc, argv, "profilepath", pdb_set_profile_path); } static int net_sam_set_homedrive(struct net_context *c, int argc, const char **argv) { return net_sam_userset(c, argc, argv, "homedrive", pdb_set_dir_drive); } static int net_sam_set_homedir(struct net_context *c, int argc, const char **argv) { return net_sam_userset(c, argc, argv, "homedir", pdb_set_homedir); } static int net_sam_set_workstations(struct net_context *c, int argc, const char **argv) { return net_sam_userset(c, argc, argv, "workstations", pdb_set_workstations); } /* * Set account flags */ static int net_sam_set_userflag(struct net_context *c, int argc, const char **argv, const char *field, uint16 flag) { struct samu *sam_acct = NULL; struct dom_sid sid; enum lsa_SidType type; const char *dom, *name; NTSTATUS status; uint32_t acct_flags; if ((argc != 2) || c->display_usage || (!strequal(argv[1], "yes") && !strequal(argv[1], "no"))) { d_fprintf(stderr, "%s\n", _("Usage:")); d_fprintf(stderr, _("net sam set %s [yes|no]\n"), field); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find name %s\n"), argv[0]); return -1; } if (type != SID_NAME_USER) { d_fprintf(stderr, _("%s is a %s, not a user\n"), argv[0], sid_type_lookup(type)); return -1; } if ( !(sam_acct = samu_new( NULL )) ) { d_fprintf(stderr, _("Internal error\n")); return -1; } if (!pdb_getsampwsid(sam_acct, &sid)) { d_fprintf(stderr, _("Loading user %s failed\n"), argv[0]); return -1; } acct_flags = pdb_get_acct_ctrl(sam_acct); if (strequal(argv[1], "yes")) { acct_flags |= flag; } else { acct_flags &= ~flag; } pdb_set_acct_ctrl(sam_acct, acct_flags, PDB_CHANGED); status = pdb_update_sam_account(sam_acct); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Updating sam account %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } TALLOC_FREE(sam_acct); d_fprintf(stderr, _("Updated flag %s for %s\\%s to %s\n"), field, dom, name, argv[1]); return 0; } static int net_sam_set_disabled(struct net_context *c, int argc, const char **argv) { return net_sam_set_userflag(c, argc, argv, "disabled", ACB_DISABLED); } static int net_sam_set_pwnotreq(struct net_context *c, int argc, const char **argv) { return net_sam_set_userflag(c, argc, argv, "pwnotreq", ACB_PWNOTREQ); } static int net_sam_set_autolock(struct net_context *c, int argc, const char **argv) { return net_sam_set_userflag(c, argc, argv, "autolock", ACB_AUTOLOCK); } static int net_sam_set_pwnoexp(struct net_context *c, int argc, const char **argv) { return net_sam_set_userflag(c, argc, argv, "pwnoexp", ACB_PWNOEXP); } /* * Set pass last change time, based on force pass change now */ static int net_sam_set_pwdmustchangenow(struct net_context *c, int argc, const char **argv) { struct samu *sam_acct = NULL; struct dom_sid sid; enum lsa_SidType type; const char *dom, *name; NTSTATUS status; if ((argc != 2) || c->display_usage || (!strequal(argv[1], "yes") && !strequal(argv[1], "no"))) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam set pwdmustchangenow [yes|no]\n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find name %s\n"), argv[0]); return -1; } if (type != SID_NAME_USER) { d_fprintf(stderr, _("%s is a %s, not a user\n"), argv[0], sid_type_lookup(type)); return -1; } if ( !(sam_acct = samu_new( NULL )) ) { d_fprintf(stderr, _("Internal error\n")); return -1; } if (!pdb_getsampwsid(sam_acct, &sid)) { d_fprintf(stderr, _("Loading user %s failed\n"), argv[0]); return -1; } if (strequal(argv[1], "yes")) { pdb_set_pass_last_set_time(sam_acct, 0, PDB_CHANGED); } else { pdb_set_pass_last_set_time(sam_acct, time(NULL), PDB_CHANGED); } status = pdb_update_sam_account(sam_acct); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Updating sam account %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } TALLOC_FREE(sam_acct); d_fprintf(stderr, _("Updated 'user must change password at next logon' " "for %s\\%s to %s\n"), dom, name, argv[1]); return 0; } /* * Set a user's or a group's comment */ static int net_sam_set_comment(struct net_context *c, int argc, const char **argv) { GROUP_MAP *map; struct dom_sid sid; enum lsa_SidType type; const char *dom, *name; NTSTATUS status; if (argc != 2 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam set comment \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find name %s\n"), argv[0]); return -1; } if (type == SID_NAME_USER) { return net_sam_userset(c, argc, argv, "comment", pdb_set_acct_desc); } if ((type != SID_NAME_DOM_GRP) && (type != SID_NAME_ALIAS) && (type != SID_NAME_WKN_GRP)) { d_fprintf(stderr, _("%s is a %s, not a group\n"), argv[0], sid_type_lookup(type)); return -1; } map = talloc_zero(talloc_tos(), GROUP_MAP); if (!map) { d_fprintf(stderr, _("Out of memory!\n")); return -1; } if (!pdb_getgrsid(map, sid)) { d_fprintf(stderr, _("Could not load group %s\n"), argv[0]); return -1; } map->comment = talloc_strdup(map, argv[1]); if (!map->comment) { d_fprintf(stderr, _("Out of memory!\n")); return -1; } status = pdb_update_group_mapping_entry(map); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Updating group mapping entry failed with " "%s\n"), nt_errstr(status)); return -1; } d_printf("Updated comment of group %s\\%s to %s\n", dom, name, argv[1]); TALLOC_FREE(map); return 0; } static int net_sam_set(struct net_context *c, int argc, const char **argv) { struct functable func[] = { { "homedir", net_sam_set_homedir, NET_TRANSPORT_LOCAL, N_("Change a user's home directory"), N_("net sam set homedir\n" " Change a user's home directory") }, { "profilepath", net_sam_set_profilepath, NET_TRANSPORT_LOCAL, N_("Change a user's profile path"), N_("net sam set profilepath\n" " Change a user's profile path") }, { "comment", net_sam_set_comment, NET_TRANSPORT_LOCAL, N_("Change a users or groups description"), N_("net sam set comment\n" " Change a users or groups description") }, { "fullname", net_sam_set_fullname, NET_TRANSPORT_LOCAL, N_("Change a user's full name"), N_("net sam set fullname\n" " Change a user's full name") }, { "logonscript", net_sam_set_logonscript, NET_TRANSPORT_LOCAL, N_("Change a user's logon script"), N_("net sam set logonscript\n" " Change a user's logon script") }, { "homedrive", net_sam_set_homedrive, NET_TRANSPORT_LOCAL, N_("Change a user's home drive"), N_("net sam set homedrive\n" " Change a user's home drive") }, { "workstations", net_sam_set_workstations, NET_TRANSPORT_LOCAL, N_("Change a user's allowed workstations"), N_("net sam set workstations\n" " Change a user's allowed workstations") }, { "disabled", net_sam_set_disabled, NET_TRANSPORT_LOCAL, N_("Disable/Enable a user"), N_("net sam set disable\n" " Disable/Enable a user") }, { "pwnotreq", net_sam_set_pwnotreq, NET_TRANSPORT_LOCAL, N_("Disable/Enable the password not required flag"), N_("net sam set pwnotreq\n" " Disable/Enable the password not required flag") }, { "autolock", net_sam_set_autolock, NET_TRANSPORT_LOCAL, N_("Disable/Enable a user's lockout flag"), N_("net sam set autolock\n" " Disable/Enable a user's lockout flag") }, { "pwnoexp", net_sam_set_pwnoexp, NET_TRANSPORT_LOCAL, N_("Disable/Enable whether a user's pw does not " "expire"), N_("net sam set pwnoexp\n" " Disable/Enable whether a user's pw does not " "expire") }, { "pwdmustchangenow", net_sam_set_pwdmustchangenow, NET_TRANSPORT_LOCAL, N_("Force users password must change at next logon"), N_("net sam set pwdmustchangenow\n" " Force users password must change at next logon") }, {NULL, NULL, 0, NULL, NULL} }; return net_run_function(c, argc, argv, "net sam set", func); } /* * Manage account policies */ static int net_sam_policy_set(struct net_context *c, int argc, const char **argv) { const char *account_policy = NULL; uint32 value = 0; uint32 old_value = 0; enum pdb_policy_type field; char *endptr; if (argc != 2 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam policy set \"\" \n")); return -1; } account_policy = argv[0]; field = account_policy_name_to_typenum(account_policy); if (strequal(argv[1], "forever") || strequal(argv[1], "never") || strequal(argv[1], "off")) { value = -1; } else { value = strtoul(argv[1], &endptr, 10); if ((endptr == argv[1]) || (endptr[0] != '\0')) { d_printf(_("Unable to set policy \"%s\"! Invalid value " "\"%s\".\n"), account_policy, argv[1]); return -1; } } if (field == 0) { const char **names; int i, count; account_policy_names_list(talloc_tos(), &names, &count); d_fprintf(stderr, _("No account policy \"%s\"!\n\n"), argv[0]); d_fprintf(stderr, _("Valid account policies are:\n")); for (i=0; idisplay_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam policy show \"\"\n")); return -1; } account_policy = argv[0]; field = account_policy_name_to_typenum(account_policy); if (field == 0) { const char **names; int count; int i; account_policy_names_list(talloc_tos(), &names, &count); d_fprintf(stderr, _("No account policy by that name!\n")); if (count != 0) { d_fprintf(stderr, _("Valid account policies " "are:\n")); for (i=0; idisplay_usage) { d_printf( "%s\n" "net sam policy list\n" " %s\n", _("Usage:"), _("List account policies")); return 0; } account_policy_names_list(talloc_tos(), &names, &count); if (count != 0) { d_fprintf(stderr, _("Valid account policies " "are:\n")); for (i = 0; i < count ; i++) { d_fprintf(stderr, "%s\n", names[i]); } } TALLOC_FREE(names); return -1; } static int net_sam_policy(struct net_context *c, int argc, const char **argv) { struct functable func[] = { { "list", net_sam_policy_list, NET_TRANSPORT_LOCAL, N_("List account policies"), N_("net sam policy list\n" " List account policies") }, { "show", net_sam_policy_show, NET_TRANSPORT_LOCAL, N_("Show account policies"), N_("net sam policy show\n" " Show account policies") }, { "set", net_sam_policy_set, NET_TRANSPORT_LOCAL, N_("Change account policies"), N_("net sam policy set\n" " Change account policies") }, {NULL, NULL, 0, NULL, NULL} }; return net_run_function(c, argc, argv, "net sam policy", func); } static int net_sam_rights_list(struct net_context *c, int argc, const char **argv) { enum sec_privilege privilege; if (argc > 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam rights list [privilege name]\n")); return -1; } if (argc == 0) { int i; int num = num_privileges_in_short_list(); for (i=0; idisplay_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam rights grant ...\n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find name %s\n"), argv[0]); return -1; } for (i=1; i < argc; i++) { enum sec_privilege privilege = sec_privilege_id(argv[i]); if (privilege == SEC_PRIV_INVALID) { d_fprintf(stderr, _("%s unknown\n"), argv[i]); return -1; } if (!grant_privilege_by_name(&sid, argv[i])) { d_fprintf(stderr, _("Could not grant privilege\n")); return -1; } d_printf(_("Granted %s to %s\\%s\n"), argv[i], dom, name); } return 0; } static int net_sam_rights_revoke(struct net_context *c, int argc, const char **argv) { struct dom_sid sid; enum lsa_SidType type; const char *dom, *name; int i; if (argc < 2 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam rights revoke \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find name %s\n"), argv[0]); return -1; } for (i=1; i < argc; i++) { enum sec_privilege privilege = sec_privilege_id(argv[i]); if (privilege == SEC_PRIV_INVALID) { d_fprintf(stderr, _("%s unknown\n"), argv[i]); return -1; } if (!revoke_privilege_by_name(&sid, argv[i])) { d_fprintf(stderr, _("Could not revoke privilege\n")); return -1; } d_printf(_("Revoked %s from %s\\%s\n"), argv[i], dom, name); } return 0; } static int net_sam_rights(struct net_context *c, int argc, const char **argv) { struct functable func[] = { { "list", net_sam_rights_list, NET_TRANSPORT_LOCAL, N_("List possible user rights"), N_("net sam rights list\n" " List possible user rights") }, { "grant", net_sam_rights_grant, NET_TRANSPORT_LOCAL, N_("Grant right(s)"), N_("net sam rights grant\n" " Grant right(s)") }, { "revoke", net_sam_rights_revoke, NET_TRANSPORT_LOCAL, N_("Revoke right(s)"), N_("net sam rights revoke\n" " Revoke right(s)") }, {NULL, NULL, 0, NULL, NULL} }; return net_run_function(c, argc, argv, "net sam rights", func); } /* * Map a unix group to a domain group */ static NTSTATUS map_unix_group(const struct group *grp, GROUP_MAP *map) { const char *dom, *name; uint32 rid; if (pdb_getgrgid(map, grp->gr_gid)) { return NT_STATUS_GROUP_EXISTS; } map->gid = grp->gr_gid; if (lookup_name(talloc_tos(), grp->gr_name, LOOKUP_NAME_LOCAL, &dom, &name, NULL, NULL)) { map->nt_name = talloc_asprintf(map, "Unix Group %s", grp->gr_name); DEBUG(5, ("%s exists as %s\\%s, retrying as \"%s\"\n", grp->gr_name, dom, name, map->nt_name)); } if (lookup_name(talloc_tos(), grp->gr_name, LOOKUP_NAME_LOCAL, NULL, NULL, NULL, NULL)) { DEBUG(3, ("\"%s\" exists, can't map it\n", grp->gr_name)); return NT_STATUS_GROUP_EXISTS; } if (pdb_capabilities() & PDB_CAP_STORE_RIDS) { if (!pdb_new_rid(&rid)) { DEBUG(3, ("Could not get a new RID for %s\n", grp->gr_name)); return NT_STATUS_ACCESS_DENIED; } } else { rid = algorithmic_pdb_gid_to_group_rid( grp->gr_gid ); } sid_compose(&map->sid, get_global_sam_sid(), rid); map->sid_name_use = SID_NAME_DOM_GRP; map->comment = talloc_asprintf(map, "Unix Group %s", grp->gr_name); return pdb_add_group_mapping_entry(map); } static int net_sam_mapunixgroup(struct net_context *c, int argc, const char **argv) { NTSTATUS status; GROUP_MAP *map; struct group *grp; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam mapunixgroup \n")); return -1; } grp = getgrnam(argv[0]); if (grp == NULL) { d_fprintf(stderr, _("Could not find group %s\n"), argv[0]); return -1; } map = talloc_zero(talloc_tos(), GROUP_MAP); if (!map) { d_fprintf(stderr, _("Out of memory!\n")); return -1; } status = map_unix_group(grp, map); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Mapping group %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } d_printf(_("Mapped unix group %s to SID %s\n"), argv[0], sid_string_tos(&map->sid)); TALLOC_FREE(map); return 0; } /* * Remove a group mapping */ static NTSTATUS unmap_unix_group(const struct group *grp) { struct dom_sid dom_sid; if (!lookup_name(talloc_tos(), grp->gr_name, LOOKUP_NAME_LOCAL, NULL, NULL, NULL, NULL)) { DEBUG(3, ("\"%s\" does not exist, can't unmap it\n", grp->gr_name)); return NT_STATUS_NO_SUCH_GROUP; } if (!pdb_gid_to_sid(grp->gr_gid, &dom_sid)) { return NT_STATUS_UNSUCCESSFUL; } return pdb_delete_group_mapping_entry(dom_sid); } static int net_sam_unmapunixgroup(struct net_context *c, int argc, const char **argv) { NTSTATUS status; struct group *grp; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam unmapunixgroup \n")); return -1; } grp = getgrnam(argv[0]); if (grp == NULL) { d_fprintf(stderr, _("Could not find mapping for group %s.\n"), argv[0]); return -1; } status = unmap_unix_group(grp); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Unmapping group %s failed with %s.\n"), argv[0], nt_errstr(status)); return -1; } d_printf(_("Unmapped unix group %s.\n"), argv[0]); return 0; } /* * Create a domain group */ static int net_sam_createdomaingroup(struct net_context *c, int argc, const char **argv) { NTSTATUS status; uint32 rid; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam createdomaingroup \n")); return -1; } status = pdb_create_dom_group(talloc_tos(), argv[0], &rid); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Creating %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } d_printf(_("Created domain group %s with RID %d\n"), argv[0], rid); return 0; } /* * Delete a domain group */ static int net_sam_deletedomaingroup(struct net_context *c, int argc, const char **argv) { struct dom_sid sid; uint32_t rid; enum lsa_SidType type; const char *dom, *name; NTSTATUS status; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam deletelocalgroup \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find %s.\n"), argv[0]); return -1; } if (type != SID_NAME_DOM_GRP) { d_fprintf(stderr, _("%s is a %s, not a domain group.\n"), argv[0], sid_type_lookup(type)); return -1; } sid_peek_rid(&sid, &rid); status = pdb_delete_dom_group(talloc_tos(), rid); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr,_("Deleting domain group %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } d_printf(_("Deleted domain group %s.\n"), argv[0]); return 0; } /* * Create a local group */ static int net_sam_createlocalgroup(struct net_context *c, int argc, const char **argv) { NTSTATUS status; uint32 rid; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam createlocalgroup \n")); return -1; } if (!winbind_ping()) { d_fprintf(stderr, _("winbind seems not to run. " "createlocalgroup only works when winbind runs.\n")); return -1; } status = pdb_create_alias(argv[0], &rid); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Creating %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } d_printf(_("Created local group %s with RID %d\n"), argv[0], rid); return 0; } /* * Delete a local group */ static int net_sam_deletelocalgroup(struct net_context *c, int argc, const char **argv) { struct dom_sid sid; enum lsa_SidType type; const char *dom, *name; NTSTATUS status; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam deletelocalgroup \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr,_("Could not find %s.\n"), argv[0]); return -1; } if (type != SID_NAME_ALIAS) { d_fprintf(stderr, _("%s is a %s, not a local group.\n"),argv[0], sid_type_lookup(type)); return -1; } status = pdb_delete_alias(&sid); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Deleting local group %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } d_printf(_("Deleted local group %s.\n"), argv[0]); return 0; } /* * Create a builtin group */ static int net_sam_createbuiltingroup(struct net_context *c, int argc, const char **argv) { NTSTATUS status; uint32 rid; enum lsa_SidType type; fstring groupname; struct dom_sid sid; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam createbuiltingroup \n")); return -1; } if (!winbind_ping()) { d_fprintf(stderr, _("winbind seems not to run. " "createbuiltingroup only works when winbind " "runs.\n")); return -1; } /* validate the name and get the group */ fstrcpy( groupname, "BUILTIN\\" ); fstrcat( groupname, argv[0] ); if ( !lookup_name(talloc_tos(), groupname, LOOKUP_NAME_ALL, NULL, NULL, &sid, &type)) { d_fprintf(stderr, _("%s is not a BUILTIN group\n"), argv[0]); return -1; } if ( !sid_peek_rid( &sid, &rid ) ) { d_fprintf(stderr, _("Failed to get RID for %s\n"), argv[0]); return -1; } status = pdb_create_builtin_alias( rid ); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Creating %s failed with %s\n"), argv[0], nt_errstr(status)); return -1; } d_printf(_("Created BUILTIN group %s with RID %d\n"), argv[0], rid); return 0; } /* * Add a group member */ static int net_sam_addmem(struct net_context *c, int argc, const char **argv) { const char *groupdomain, *groupname, *memberdomain, *membername; struct dom_sid group, member; enum lsa_SidType grouptype, membertype; NTSTATUS status; if (argc != 2 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam addmem \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &groupdomain, &groupname, &group, &grouptype)) { d_fprintf(stderr, _("Could not find group %s\n"), argv[0]); return -1; } /* check to see if the member to be added is a name or a SID */ if (!lookup_name(talloc_tos(), argv[1], LOOKUP_NAME_LOCAL, &memberdomain, &membername, &member, &membertype)) { /* try it as a SID */ if ( !string_to_sid( &member, argv[1] ) ) { d_fprintf(stderr, _("Could not find member %s\n"), argv[1]); return -1; } if ( !lookup_sid(talloc_tos(), &member, &memberdomain, &membername, &membertype) ) { d_fprintf(stderr, _("Could not resolve SID %s\n"), argv[1]); return -1; } } if ((grouptype == SID_NAME_ALIAS) || (grouptype == SID_NAME_WKN_GRP)) { if ((membertype != SID_NAME_USER) && (membertype != SID_NAME_DOM_GRP)) { d_fprintf(stderr, _("%s is a local group, only users " "and domain groups can be added.\n" "%s is a %s\n"), argv[0], argv[1], sid_type_lookup(membertype)); return -1; } status = pdb_add_aliasmem(&group, &member); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Adding local group member failed " "with %s\n"), nt_errstr(status)); return -1; } } else if (grouptype == SID_NAME_DOM_GRP) { uint32_t grouprid, memberrid; sid_peek_rid(&group, &grouprid); sid_peek_rid(&member, &memberrid); status = pdb_add_groupmem(talloc_tos(), grouprid, memberrid); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Adding domain group member failed " "with %s\n"), nt_errstr(status)); return -1; } } else { d_fprintf(stderr, _("Can only add members to local groups so " "far, %s is a %s\n"), argv[0], sid_type_lookup(grouptype)); return -1; } d_printf(_("Added %s\\%s to %s\\%s\n"), memberdomain, membername, groupdomain, groupname); return 0; } /* * Delete a group member */ static int net_sam_delmem(struct net_context *c, int argc, const char **argv) { const char *groupdomain, *groupname; const char *memberdomain = NULL; const char *membername = NULL; struct dom_sid group, member; enum lsa_SidType grouptype; NTSTATUS status; if (argc != 2 || c->display_usage) { d_fprintf(stderr,"%s\n%s", _("Usage:"), _("net sam delmem \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &groupdomain, &groupname, &group, &grouptype)) { d_fprintf(stderr, _("Could not find group %s\n"), argv[0]); return -1; } if (!lookup_name(talloc_tos(), argv[1], LOOKUP_NAME_LOCAL, &memberdomain, &membername, &member, NULL)) { if (!string_to_sid(&member, argv[1])) { d_fprintf(stderr, _("Could not find member %s\n"), argv[1]); return -1; } } if ((grouptype == SID_NAME_ALIAS) || (grouptype == SID_NAME_WKN_GRP)) { status = pdb_del_aliasmem(&group, &member); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr,_("Deleting local group member failed " "with %s\n"), nt_errstr(status)); return -1; } } else if (grouptype == SID_NAME_DOM_GRP) { uint32_t grouprid, memberrid; sid_peek_rid(&group, &grouprid); sid_peek_rid(&member, &memberrid); status = pdb_del_groupmem(talloc_tos(), grouprid, memberrid); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Deleting domain group member " "failed with %s\n"), nt_errstr(status)); return -1; } } else { d_fprintf(stderr, _("Can only delete members from local groups " "so far, %s is a %s\n"), argv[0], sid_type_lookup(grouptype)); return -1; } if (membername != NULL) { d_printf(_("Deleted %s\\%s from %s\\%s\n"), memberdomain, membername, groupdomain, groupname); } else { d_printf(_("Deleted %s from %s\\%s\n"), sid_string_tos(&member), groupdomain, groupname); } return 0; } /* * List group members */ static int net_sam_listmem(struct net_context *c, int argc, const char **argv) { const char *groupdomain, *groupname; struct dom_sid group; struct dom_sid *members = NULL; size_t i, num_members = 0; enum lsa_SidType grouptype; NTSTATUS status; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam listmem \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &groupdomain, &groupname, &group, &grouptype)) { d_fprintf(stderr, _("Could not find group %s\n"), argv[0]); return -1; } if ((grouptype == SID_NAME_ALIAS) || (grouptype == SID_NAME_WKN_GRP)) { status = pdb_enum_aliasmem(&group, talloc_tos(), &members, &num_members); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Listing group members failed with " "%s\n"), nt_errstr(status)); return -1; } } else if (grouptype == SID_NAME_DOM_GRP) { uint32_t *rids; status = pdb_enum_group_members(talloc_tos(), &group, &rids, &num_members); if (!NT_STATUS_IS_OK(status)) { d_fprintf(stderr, _("Listing group members failed with " "%s\n"), nt_errstr(status)); return -1; } members = talloc_array(talloc_tos(), struct dom_sid, num_members); if (members == NULL) { TALLOC_FREE(rids); return -1; } for (i=0; i 1) || c->display_usage || ((argc == 1) && !strequal(argv[0], "verbose"))) { d_fprintf(stderr, "%s\n", _("Usage:")); d_fprintf(stderr, _("net sam list %s [verbose]\n"), what); return -1; } if (search == NULL) { d_fprintf(stderr, _("Could not start search\n")); return -1; } while (true) { struct samr_displayentry entry; if (!search->next_entry(search, &entry)) { break; } if (verbose) { d_printf("%s:%d:%s\n", entry.account_name, entry.rid, entry.description); } else { d_printf("%s\n", entry.account_name); } } TALLOC_FREE(search); return 0; } static int net_sam_list_users(struct net_context *c, int argc, const char **argv) { return net_sam_do_list(c, argc, argv, pdb_search_users(talloc_tos(), ACB_NORMAL), "users"); } static int net_sam_list_groups(struct net_context *c, int argc, const char **argv) { return net_sam_do_list(c, argc, argv, pdb_search_groups(talloc_tos()), "groups"); } static int net_sam_list_localgroups(struct net_context *c, int argc, const char **argv) { return net_sam_do_list(c, argc, argv, pdb_search_aliases(talloc_tos(), get_global_sam_sid()), "localgroups"); } static int net_sam_list_builtin(struct net_context *c, int argc, const char **argv) { return net_sam_do_list(c, argc, argv, pdb_search_aliases(talloc_tos(), &global_sid_Builtin), "builtin"); } static int net_sam_list_workstations(struct net_context *c, int argc, const char **argv) { return net_sam_do_list(c, argc, argv, pdb_search_users(talloc_tos(), ACB_WSTRUST), "workstations"); } /* * List stuff */ static int net_sam_list(struct net_context *c, int argc, const char **argv) { struct functable func[] = { { "users", net_sam_list_users, NET_TRANSPORT_LOCAL, N_("List SAM users"), N_("net sam list users\n" " List SAM users") }, { "groups", net_sam_list_groups, NET_TRANSPORT_LOCAL, N_("List SAM groups"), N_("net sam list groups\n" " List SAM groups") }, { "localgroups", net_sam_list_localgroups, NET_TRANSPORT_LOCAL, N_("List SAM local groups"), N_("net sam list localgroups\n" " List SAM local groups") }, { "builtin", net_sam_list_builtin, NET_TRANSPORT_LOCAL, N_("List builtin groups"), N_("net sam list builtin\n" " List builtin groups") }, { "workstations", net_sam_list_workstations, NET_TRANSPORT_LOCAL, N_("List domain member workstations"), N_("net sam list workstations\n" " List domain member workstations") }, {NULL, NULL, 0, NULL, NULL} }; return net_run_function(c, argc, argv, "net sam list", func); } /* * Show details of SAM entries */ static int net_sam_show(struct net_context *c, int argc, const char **argv) { struct dom_sid sid; enum lsa_SidType type; const char *dom, *name; if (argc != 1 || c->display_usage) { d_fprintf(stderr, "%s\n%s", _("Usage:"), _("net sam show \n")); return -1; } if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_LOCAL, &dom, &name, &sid, &type)) { d_fprintf(stderr, _("Could not find name %s\n"), argv[0]); return -1; } d_printf(_("%s\\%s is a %s with SID %s\n"), dom, name, sid_type_lookup(type), sid_string_tos(&sid)); return 0; } #ifdef HAVE_LDAP /* * Init an LDAP tree with default users and Groups * if ldapsam:editposix is enabled */ static int net_sam_provision(struct net_context *c, int argc, const char **argv) { TALLOC_CTX *tc; char *ldap_bk; char *ldap_uri = NULL; char *p; struct smbldap_state *ls; GROUP_MAP *gmap = NULL; struct dom_sid gsid; gid_t domusers_gid = -1; gid_t domadmins_gid = -1; struct samu *samuser; struct passwd *pwd; bool is_ipa = false; if (c->display_usage) { d_printf( "%s\n" "net sam provision\n" " %s\n", _("Usage:"), _("Init an LDAP tree with default users/groups")); return 0; } tc = talloc_new(NULL); if (!tc) { d_fprintf(stderr, _("Out of Memory!\n")); return -1; } if ((ldap_bk = talloc_strdup(tc, lp_passdb_backend())) == NULL) { d_fprintf(stderr, _("talloc failed\n")); talloc_free(tc); return -1; } p = strchr(ldap_bk, ':'); if (p) { *p = 0; ldap_uri = talloc_strdup(tc, p+1); trim_char(ldap_uri, ' ', ' '); } trim_char(ldap_bk, ' ', ' '); if (strcmp(ldap_bk, "IPA_ldapsam") == 0 ) { is_ipa = true; } if (strcmp(ldap_bk, "ldapsam") != 0 && !is_ipa ) { d_fprintf(stderr, _("Provisioning works only with ldapsam backend\n")); goto failed; } if (!lp_parm_bool(-1, "ldapsam", "trusted", false) || !lp_parm_bool(-1, "ldapsam", "editposix", false)) { d_fprintf(stderr, _("Provisioning works only if ldapsam:trusted" " and ldapsam:editposix are enabled.\n")); goto failed; } if (!is_ipa && !winbind_ping()) { d_fprintf(stderr, _("winbind seems not to run. Provisioning " "LDAP only works when winbind runs.\n")); goto failed; } if (!NT_STATUS_IS_OK(smbldap_init(tc, NULL, ldap_uri, &ls))) { d_fprintf(stderr, _("Unable to connect to the LDAP server.\n")); goto failed; } d_printf(_("Checking for Domain Users group.\n")); sid_compose(&gsid, get_global_sam_sid(), DOMAIN_RID_USERS); gmap = talloc_zero(tc, GROUP_MAP); if (!gmap) { d_printf(_("Out of memory!\n")); goto failed; } if (!pdb_getgrsid(gmap, gsid)) { LDAPMod **mods = NULL; char *dn; char *uname; char *wname; char *gidstr; char *gtype; int rc; d_printf(_("Adding the Domain Users group.\n")); /* lets allocate a new groupid for this group */ if (is_ipa) { domusers_gid = 999; } else { if (!winbind_allocate_gid(&domusers_gid)) { d_fprintf(stderr, _("Unable to allocate a new gid to " "create Domain Users group!\n")); goto domu_done; } } uname = talloc_strdup(tc, "domusers"); wname = talloc_strdup(tc, "Domain Users"); dn = talloc_asprintf(tc, "cn=%s,%s", "domusers", lp_ldap_group_suffix()); gidstr = talloc_asprintf(tc, "%u", (unsigned int)domusers_gid); gtype = talloc_asprintf(tc, "%d", SID_NAME_DOM_GRP); if (!uname || !wname || !dn || !gidstr || !gtype) { d_fprintf(stderr, "Out of Memory!\n"); goto failed; } smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_POSIXGROUP); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_GROUPMAP); if (is_ipa) { smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "groupofnames"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "nestedgroup"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "ipausergroup"); } smbldap_set_mod(&mods, LDAP_MOD_ADD, "cn", uname); smbldap_set_mod(&mods, LDAP_MOD_ADD, "displayName", wname); smbldap_set_mod(&mods, LDAP_MOD_ADD, "gidNumber", gidstr); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaSid", sid_string_talloc(tc, &gsid)); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaGroupType", gtype); talloc_autofree_ldapmod(tc, mods); rc = smbldap_add(ls, dn, mods); if (rc != LDAP_SUCCESS) { d_fprintf(stderr, _("Failed to add Domain Users group " "to ldap directory\n")); } if (is_ipa) { if (!pdb_getgrsid(gmap, gsid)) { d_fprintf(stderr, _("Failed to read just " "created domain group.\n")); goto failed; } else { domusers_gid = gmap->gid; } } } else { domusers_gid = gmap->gid; d_printf(_("found!\n")); } domu_done: d_printf(_("Checking for Domain Admins group.\n")); sid_compose(&gsid, get_global_sam_sid(), DOMAIN_RID_ADMINS); if (!pdb_getgrsid(gmap, gsid)) { LDAPMod **mods = NULL; char *dn; char *uname; char *wname; char *gidstr; char *gtype; int rc; d_printf(_("Adding the Domain Admins group.\n")); /* lets allocate a new groupid for this group */ if (is_ipa) { domadmins_gid = 999; } else { if (!winbind_allocate_gid(&domadmins_gid)) { d_fprintf(stderr, _("Unable to allocate a new gid to " "create Domain Admins group!\n")); goto doma_done; } } uname = talloc_strdup(tc, "domadmins"); wname = talloc_strdup(tc, "Domain Admins"); dn = talloc_asprintf(tc, "cn=%s,%s", "domadmins", lp_ldap_group_suffix()); gidstr = talloc_asprintf(tc, "%u", (unsigned int)domadmins_gid); gtype = talloc_asprintf(tc, "%d", SID_NAME_DOM_GRP); if (!uname || !wname || !dn || !gidstr || !gtype) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_POSIXGROUP); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_GROUPMAP); if (is_ipa) { smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "groupofnames"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "nestedgroup"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "ipausergroup"); } smbldap_set_mod(&mods, LDAP_MOD_ADD, "cn", uname); smbldap_set_mod(&mods, LDAP_MOD_ADD, "displayName", wname); smbldap_set_mod(&mods, LDAP_MOD_ADD, "gidNumber", gidstr); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaSid", sid_string_talloc(tc, &gsid)); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaGroupType", gtype); talloc_autofree_ldapmod(tc, mods); rc = smbldap_add(ls, dn, mods); if (rc != LDAP_SUCCESS) { d_fprintf(stderr, _("Failed to add Domain Admins group " "to ldap directory\n")); } if (is_ipa) { if (!pdb_getgrsid(gmap, gsid)) { d_fprintf(stderr, _("Failed to read just " "created domain group.\n")); goto failed; } else { domadmins_gid = gmap->gid; } } } else { domadmins_gid = gmap->gid; d_printf(_("found!\n")); } doma_done: d_printf(_("Check for Administrator account.\n")); samuser = samu_new(tc); if (!samuser) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } if (!pdb_getsampwnam(samuser, "Administrator")) { LDAPMod **mods = NULL; struct dom_sid sid; char *dn; char *name; char *uidstr; char *gidstr; char *shell; char *dir; char *princ; uid_t uid; int rc; d_printf(_("Adding the Administrator user.\n")); if (domadmins_gid == -1) { d_fprintf(stderr, _("Can't create Administrator user, Domain " "Admins group not available!\n")); goto done; } if (is_ipa) { uid = 999; } else { if (!winbind_allocate_uid(&uid)) { d_fprintf(stderr, _("Unable to allocate a new uid to create " "the Administrator user!\n")); goto done; } } name = talloc_strdup(tc, "Administrator"); dn = talloc_asprintf(tc, "uid=Administrator,%s", lp_ldap_user_suffix()); uidstr = talloc_asprintf(tc, "%u", (unsigned int)uid); gidstr = talloc_asprintf(tc, "%u", (unsigned int)domadmins_gid); dir = talloc_sub_specified(tc, lp_template_homedir(), "Administrator", get_global_sam_name(), uid, domadmins_gid); shell = talloc_sub_specified(tc, lp_template_shell(), "Administrator", get_global_sam_name(), uid, domadmins_gid); if (!name || !dn || !uidstr || !gidstr || !dir || !shell) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } sid_compose(&sid, get_global_sam_sid(), DOMAIN_RID_ADMINISTRATOR); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_ACCOUNT); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_POSIXACCOUNT); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_SAMBASAMACCOUNT); if (is_ipa) { smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "person"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "organizationalperson"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "inetorgperson"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "inetuser"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "krbprincipalaux"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "krbticketpolicyaux"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sn", name); princ = talloc_asprintf(tc, "%s@%s", name, lp_realm()); if (!princ) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } smbldap_set_mod(&mods, LDAP_MOD_ADD, "krbPrincipalName", princ); } smbldap_set_mod(&mods, LDAP_MOD_ADD, "uid", name); smbldap_set_mod(&mods, LDAP_MOD_ADD, "cn", name); smbldap_set_mod(&mods, LDAP_MOD_ADD, "displayName", name); smbldap_set_mod(&mods, LDAP_MOD_ADD, "uidNumber", uidstr); smbldap_set_mod(&mods, LDAP_MOD_ADD, "gidNumber", gidstr); smbldap_set_mod(&mods, LDAP_MOD_ADD, "homeDirectory", dir); smbldap_set_mod(&mods, LDAP_MOD_ADD, "loginShell", shell); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaSID", sid_string_talloc(tc, &sid)); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaAcctFlags", pdb_encode_acct_ctrl(ACB_NORMAL|ACB_DISABLED, NEW_PW_FORMAT_SPACE_PADDED_LEN)); talloc_autofree_ldapmod(tc, mods); rc = smbldap_add(ls, dn, mods); if (rc != LDAP_SUCCESS) { d_fprintf(stderr, _("Failed to add Administrator user " "to ldap directory\n")); } if (is_ipa) { if (!pdb_getsampwnam(samuser, "Administrator")) { d_fprintf(stderr, _("Failed to read just " "created user.\n")); goto failed; } } } else { d_printf(_("found!\n")); } d_printf(_("Checking for Guest user.\n")); samuser = samu_new(tc); if (!samuser) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } if (!pdb_getsampwnam(samuser, lp_guestaccount())) { LDAPMod **mods = NULL; struct dom_sid sid; char *dn; char *uidstr; char *gidstr; int rc; d_printf(_("Adding the Guest user.\n")); sid_compose(&sid, get_global_sam_sid(), DOMAIN_RID_GUEST); pwd = Get_Pwnam_alloc(tc, lp_guestaccount()); if (!pwd) { if (domusers_gid == -1) { d_fprintf(stderr, _("Can't create Guest user, Domain " "Users group not available!\n")); goto done; } if ((pwd = talloc(tc, struct passwd)) == NULL) { d_fprintf(stderr, _("talloc failed\n")); goto done; } pwd->pw_name = talloc_strdup(pwd, lp_guestaccount()); if (is_ipa) { pwd->pw_uid = 999; } else { if (!winbind_allocate_uid(&(pwd->pw_uid))) { d_fprintf(stderr, _("Unable to allocate a new uid to " "create the Guest user!\n")); goto done; } } pwd->pw_gid = domusers_gid; pwd->pw_dir = talloc_strdup(tc, "/"); pwd->pw_shell = talloc_strdup(tc, "/bin/false"); if (!pwd->pw_dir || !pwd->pw_shell) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } } dn = talloc_asprintf(tc, "uid=%s,%s", pwd->pw_name, lp_ldap_user_suffix ()); uidstr = talloc_asprintf(tc, "%u", (unsigned int)pwd->pw_uid); gidstr = talloc_asprintf(tc, "%u", (unsigned int)pwd->pw_gid); if (!dn || !uidstr || !gidstr) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_ACCOUNT); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_POSIXACCOUNT); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_SAMBASAMACCOUNT); if (is_ipa) { smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "person"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "organizationalperson"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "inetorgperson"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "inetuser"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "krbprincipalaux"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "krbticketpolicyaux"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sn", pwd->pw_name); } smbldap_set_mod(&mods, LDAP_MOD_ADD, "uid", pwd->pw_name); smbldap_set_mod(&mods, LDAP_MOD_ADD, "cn", pwd->pw_name); smbldap_set_mod(&mods, LDAP_MOD_ADD, "displayName", pwd->pw_name); smbldap_set_mod(&mods, LDAP_MOD_ADD, "uidNumber", uidstr); smbldap_set_mod(&mods, LDAP_MOD_ADD, "gidNumber", gidstr); if ((pwd->pw_dir != NULL) && (pwd->pw_dir[0] != '\0')) { smbldap_set_mod(&mods, LDAP_MOD_ADD, "homeDirectory", pwd->pw_dir); } if ((pwd->pw_shell != NULL) && (pwd->pw_shell[0] != '\0')) { smbldap_set_mod(&mods, LDAP_MOD_ADD, "loginShell", pwd->pw_shell); } smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaSID", sid_string_talloc(tc, &sid)); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaAcctFlags", pdb_encode_acct_ctrl(ACB_NORMAL|ACB_DISABLED, NEW_PW_FORMAT_SPACE_PADDED_LEN)); talloc_autofree_ldapmod(tc, mods); rc = smbldap_add(ls, dn, mods); if (rc != LDAP_SUCCESS) { d_fprintf(stderr, _("Failed to add Guest user to " "ldap directory\n")); } if (is_ipa) { if (!pdb_getsampwnam(samuser, lp_guestaccount())) { d_fprintf(stderr, _("Failed to read just " "created user.\n")); goto failed; } } } else { d_printf(_("found!\n")); } d_printf(_("Checking Guest's group.\n")); pwd = Get_Pwnam_alloc(tc, lp_guestaccount()); if (!pwd) { d_fprintf(stderr, _("Failed to find just created Guest account!\n" " Is nss properly configured?!\n")); goto failed; } if (pwd->pw_gid == domusers_gid) { d_printf(_("found!\n")); goto done; } if (!pdb_getgrgid(gmap, pwd->pw_gid)) { LDAPMod **mods = NULL; char *dn; char *uname; char *wname; char *gidstr; char *gtype; int rc; d_printf(_("Adding the Domain Guests group.\n")); uname = talloc_strdup(tc, "domguests"); wname = talloc_strdup(tc, "Domain Guests"); dn = talloc_asprintf(tc, "cn=%s,%s", "domguests", lp_ldap_group_suffix()); gidstr = talloc_asprintf(tc, "%u", (unsigned int)pwd->pw_gid); gtype = talloc_asprintf(tc, "%d", SID_NAME_DOM_GRP); if (!uname || !wname || !dn || !gidstr || !gtype) { d_fprintf(stderr, _("Out of Memory!\n")); goto failed; } sid_compose(&gsid, get_global_sam_sid(), DOMAIN_RID_GUESTS); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_POSIXGROUP); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_GROUPMAP); if (is_ipa) { smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "groupofnames"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "nestedgroup"); smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectClass", "ipausergroup"); } smbldap_set_mod(&mods, LDAP_MOD_ADD, "cn", uname); smbldap_set_mod(&mods, LDAP_MOD_ADD, "displayName", wname); smbldap_set_mod(&mods, LDAP_MOD_ADD, "gidNumber", gidstr); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaSid", sid_string_talloc(tc, &gsid)); smbldap_set_mod(&mods, LDAP_MOD_ADD, "sambaGroupType", gtype); talloc_autofree_ldapmod(tc, mods); rc = smbldap_add(ls, dn, mods); if (rc != LDAP_SUCCESS) { d_fprintf(stderr, _("Failed to add Domain Guests group to ldap " "directory\n")); } } else { d_printf(_("found!\n")); } done: talloc_free(tc); return 0; failed: talloc_free(tc); return -1; } #endif /*********************************************************** migrated functionality from smbgroupedit **********************************************************/ int net_sam(struct net_context *c, int argc, const char **argv) { struct functable func[] = { { "createbuiltingroup", net_sam_createbuiltingroup, NET_TRANSPORT_LOCAL, N_("Create a new BUILTIN group"), N_("net sam createbuiltingroup\n" " Create a new BUILTIN group") }, { "createlocalgroup", net_sam_createlocalgroup, NET_TRANSPORT_LOCAL, N_("Create a new local group"), N_("net sam createlocalgroup\n" " Create a new local group") }, { "createdomaingroup", net_sam_createdomaingroup, NET_TRANSPORT_LOCAL, N_("Create a new group"), N_("net sam createdomaingroup\n" " Create a new group") }, { "deletelocalgroup", net_sam_deletelocalgroup, NET_TRANSPORT_LOCAL, N_("Delete an existing local group"), N_("net sam deletelocalgroup\n" " Delete an existing local group") }, { "deletedomaingroup", net_sam_deletedomaingroup, NET_TRANSPORT_LOCAL, N_("Delete a domain group"), N_("net sam deletedomaingroup\n" " Delete a group") }, { "mapunixgroup", net_sam_mapunixgroup, NET_TRANSPORT_LOCAL, N_("Map a unix group to a domain group"), N_("net sam mapunixgroup\n" " Map a unix group to a domain group") }, { "unmapunixgroup", net_sam_unmapunixgroup, NET_TRANSPORT_LOCAL, N_("Remove a group mapping of an unix group to a " "domain group"), N_("net sam unmapunixgroup\n" " Remove a group mapping of an unix group to a " "domain group") }, { "addmem", net_sam_addmem, NET_TRANSPORT_LOCAL, N_("Add a member to a group"), N_("net sam addmem\n" " Add a member to a group") }, { "delmem", net_sam_delmem, NET_TRANSPORT_LOCAL, N_("Delete a member from a group"), N_("net sam delmem\n" " Delete a member from a group") }, { "listmem", net_sam_listmem, NET_TRANSPORT_LOCAL, N_("List group members"), N_("net sam listmem\n" " List group members") }, { "list", net_sam_list, NET_TRANSPORT_LOCAL, N_("List users, groups and local groups"), N_("net sam list\n" " List users, groups and local groups") }, { "show", net_sam_show, NET_TRANSPORT_LOCAL, N_("Show details of a SAM entry"), N_("net sam show\n" " Show details of a SAM entry") }, { "set", net_sam_set, NET_TRANSPORT_LOCAL, N_("Set details of a SAM account"), N_("net sam set\n" " Set details of a SAM account") }, { "policy", net_sam_policy, NET_TRANSPORT_LOCAL, N_("Set account policies"), N_("net sam policy\n" " Set account policies") }, { "rights", net_sam_rights, NET_TRANSPORT_LOCAL, N_("Manipulate user privileges"), N_("net sam rights\n" " Manipulate user privileges") }, #ifdef HAVE_LDAP { "provision", net_sam_provision, NET_TRANSPORT_LOCAL, N_("Provision a clean user database"), N_("net sam privison\n" " Provision a clear user database") }, #endif {NULL, NULL, 0, NULL, NULL} }; if (getuid() != 0) { d_fprintf(stderr, _("You are not root, most things won't " "work\n")); } return net_run_function(c, argc, argv, "net sam", func); }