summaryrefslogtreecommitdiffstats
path: root/source/auth
diff options
context:
space:
mode:
authorVolker Lendecke <vlendec@samba.org>2005-02-11 10:32:46 +0000
committerVolker Lendecke <vlendec@samba.org>2005-02-11 10:32:46 +0000
commitf7d839b92f2fff2e315c6ad56edd7537383b8ded (patch)
treea04352339c9b685ce61735c361ade041b4654aab /source/auth
parentc66dfd4e48c9fbed4216a857f577b1c05a03b528 (diff)
downloadsamba-f7d839b92f2fff2e315c6ad56edd7537383b8ded.tar.gz
samba-f7d839b92f2fff2e315c6ad56edd7537383b8ded.tar.xz
samba-f7d839b92f2fff2e315c6ad56edd7537383b8ded.zip
r5331: Support SIDs as %s replacements in the afs username map parameter.
Add 'log nt token command' parameter. If set, %s is replaced with the user sid, and %t takes all the group sids. Volker
Diffstat (limited to 'source/auth')
-rw-r--r--source/auth/auth_util.c33
1 files changed, 33 insertions, 0 deletions
diff --git a/source/auth/auth_util.c b/source/auth/auth_util.c
index 30902a8dad6..5c933e90c9f 100644
--- a/source/auth/auth_util.c
+++ b/source/auth/auth_util.c
@@ -592,6 +592,39 @@ static NTSTATUS create_nt_user_token(const DOM_SID *user_sid, const DOM_SID *gro
debug_nt_user_token(DBGC_AUTH, 10, ptoken);
+ if ((lp_log_nt_token_command() != NULL) &&
+ (strlen(lp_log_nt_token_command()) > 0)) {
+ TALLOC_CTX *mem_ctx;
+ char *command;
+ fstring sidstr;
+ char *user_sidstr, *group_sidstr;
+
+ mem_ctx = talloc_init("setnttoken");
+ if (mem_ctx == NULL)
+ return NT_STATUS_NO_MEMORY;
+
+ sid_to_string(sidstr, &ptoken->user_sids[0]);
+ user_sidstr = talloc_strdup(mem_ctx, sidstr);
+
+ group_sidstr = talloc_strdup(mem_ctx, "");
+ for (i=1; i<ptoken->num_sids; i++) {
+ sid_to_string(sidstr, &ptoken->user_sids[i]);
+ group_sidstr = talloc_asprintf(mem_ctx, "%s %s",
+ group_sidstr, sidstr);
+ }
+
+ command = strdup(lp_log_nt_token_command());
+ command = realloc_string_sub(command, "%s", user_sidstr);
+ command = realloc_string_sub(command, "%t", group_sidstr);
+ DEBUG(8, ("running command: [%s]\n", command));
+ if (smbrun(command, NULL) != 0) {
+ DEBUG(0, ("Could not log NT token\n"));
+ nt_status = NT_STATUS_ACCESS_DENIED;
+ }
+ talloc_destroy(mem_ctx);
+ SAFE_FREE(command);
+ }
+
*token = ptoken;
return nt_status;