2008-01-16 12:27:29 +03:00
/*
Unix SMB / CIFS implementation .
idmap TDB2 backend , used for clustered Samba setups .
2008-08-07 05:59:39 +04:00
This uses dbwrap to access tdb files . The location can be set
using tdb : idmap2 . tdb = " in smb.conf
2008-01-16 12:27:29 +03:00
Copyright ( C ) Andrew Tridgell 2007
This is heavily based upon idmap_tdb . c , which is :
Copyright ( C ) Tim Potter 2000
Copyright ( C ) Jim McDonough < jmcd @ us . ibm . com > 2003
Copyright ( C ) Jeremy Allison 2006
Copyright ( C ) Simo Sorce 2003 - 2006
2010-06-17 11:39:24 +04:00
Copyright ( C ) Michael Adam 2009 - 2010
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
2011-04-04 13:46:31 +04:00
# include "system/filesys.h"
2008-01-16 12:27:29 +03:00
# include "winbindd.h"
2010-08-18 20:13:42 +04:00
# include "idmap.h"
2010-06-23 14:01:47 +04:00
# include "idmap_rw.h"
2011-07-07 19:42:08 +04:00
# include "dbwrap/dbwrap.h"
2011-07-06 18:40:21 +04:00
# include "dbwrap/dbwrap_open.h"
2010-10-18 17:55:47 +04:00
# include "../libcli/security/dom_sid.h"
2011-05-05 13:25:29 +04:00
# include "util_tdb.h"
2008-01-16 12:27:29 +03:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_IDMAP
2010-06-16 17:31:05 +04:00
struct idmap_tdb2_context {
2010-06-16 19:40:12 +04:00
struct db_context * db ;
2010-06-16 17:47:23 +04:00
const char * script ; /* script to provide idmaps */
2010-06-23 14:01:47 +04:00
struct idmap_rw_ops * rw_ops ;
2010-06-16 17:31:05 +04:00
} ;
2008-01-16 12:27:29 +03:00
/* High water mark keys */
# define HWM_GROUP "GROUP HWM"
# define HWM_USER "USER HWM"
/*
2010-06-16 19:30:07 +04:00
* check and initialize high / low water marks in the db
*/
static NTSTATUS idmap_tdb2_init_hwm ( struct idmap_domain * dom )
2008-01-16 12:27:29 +03:00
{
2011-03-13 12:41:27 +03:00
NTSTATUS status ;
2008-09-17 10:23:17 +04:00
uint32 low_id ;
2010-06-16 19:40:12 +04:00
struct idmap_tdb2_context * ctx ;
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
2008-01-16 12:27:29 +03:00
2009-01-26 15:07:59 +03:00
/* Create high water marks for group and user id */
2011-10-06 23:07:27 +04:00
status = dbwrap_fetch_uint32 ( ctx - > db , HWM_USER , & low_id ) ;
if ( ! NT_STATUS_IS_OK ( status ) | | ( low_id < dom - > low_id ) ) {
2011-10-06 22:28:39 +04:00
status = dbwrap_trans_store_uint32 ( ctx - > db , HWM_USER ,
dom - > low_id ) ;
2011-03-13 12:41:27 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-07-16 18:51:46 +04:00
DEBUG ( 0 , ( " Unable to initialise user hwm in idmap "
2011-03-13 12:41:27 +03:00
" database: %s \n " , nt_errstr ( status ) ) ) ;
2008-07-16 18:51:46 +04:00
return NT_STATUS_INTERNAL_DB_ERROR ;
2008-01-16 12:27:29 +03:00
}
}
2011-10-06 23:07:27 +04:00
status = dbwrap_fetch_uint32 ( ctx - > db , HWM_GROUP , & low_id ) ;
if ( ! NT_STATUS_IS_OK ( status ) | | ( low_id < dom - > low_id ) ) {
2011-10-06 22:28:39 +04:00
status = dbwrap_trans_store_uint32 ( ctx - > db , HWM_GROUP ,
dom - > low_id ) ;
2011-03-13 12:41:27 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2008-07-16 18:51:46 +04:00
DEBUG ( 0 , ( " Unable to initialise group hwm in idmap "
2011-03-13 12:41:27 +03:00
" database: %s \n " , nt_errstr ( status ) ) ) ;
2008-07-16 18:51:46 +04:00
return NT_STATUS_INTERNAL_DB_ERROR ;
2008-01-16 12:27:29 +03:00
}
}
return NT_STATUS_OK ;
}
2010-06-16 19:28:34 +04:00
/*
open the permanent tdb
*/
static NTSTATUS idmap_tdb2_open_db ( struct idmap_domain * dom )
{
char * db_path ;
2010-06-16 19:40:12 +04:00
struct idmap_tdb2_context * ctx ;
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
2010-06-16 19:28:34 +04:00
2010-06-16 19:40:12 +04:00
if ( ctx - > db ) {
2010-06-16 19:28:34 +04:00
/* its already open */
return NT_STATUS_OK ;
}
2011-06-24 12:15:02 +04:00
db_path = talloc_asprintf ( NULL , " %s/idmap2.tdb " , lp_private_dir ( ) ) ;
2010-06-16 19:28:34 +04:00
NT_STATUS_HAVE_NO_MEMORY ( db_path ) ;
/* Open idmap repository */
2010-06-17 10:04:53 +04:00
ctx - > db = db_open ( ctx , db_path , 0 , TDB_DEFAULT , O_RDWR | O_CREAT , 0644 ) ;
2010-06-16 19:28:34 +04:00
TALLOC_FREE ( db_path ) ;
2010-06-16 19:40:12 +04:00
if ( ctx - > db = = NULL ) {
2010-06-16 19:28:34 +04:00
DEBUG ( 0 , ( " Unable to open idmap_tdb2 database '%s' \n " ,
db_path ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2010-06-16 19:30:07 +04:00
return idmap_tdb2_init_hwm ( dom ) ;
2010-06-16 19:28:34 +04:00
}
2008-01-16 12:27:29 +03:00
/*
Allocate a new id .
*/
2009-07-28 18:53:37 +04:00
struct idmap_tdb2_allocate_id_context {
const char * hwmkey ;
const char * hwmtype ;
uint32_t high_hwm ;
uint32_t hwm ;
} ;
static NTSTATUS idmap_tdb2_allocate_id_action ( struct db_context * db ,
void * private_data )
{
NTSTATUS ret ;
struct idmap_tdb2_allocate_id_context * state ;
uint32_t hwm ;
state = ( struct idmap_tdb2_allocate_id_context * ) private_data ;
2011-10-06 23:07:27 +04:00
ret = dbwrap_fetch_uint32 ( db , state - > hwmkey , & hwm ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2009-07-28 18:53:37 +04:00
ret = NT_STATUS_INTERNAL_DB_ERROR ;
goto done ;
}
/* check it is in the range */
if ( hwm > state - > high_hwm ) {
DEBUG ( 1 , ( " Fatal Error: %s range full!! (max: %lu) \n " ,
state - > hwmtype , ( unsigned long ) state - > high_hwm ) ) ;
ret = NT_STATUS_UNSUCCESSFUL ;
goto done ;
}
/* fetch a new id and increment it */
2009-07-29 16:39:30 +04:00
ret = dbwrap_trans_change_uint32_atomic ( db , state - > hwmkey , & hwm , 1 ) ;
2009-07-29 16:16:11 +04:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2009-07-28 18:53:37 +04:00
DEBUG ( 1 , ( " Fatal error while fetching a new %s value \n ! " ,
state - > hwmtype ) ) ;
goto done ;
}
/* recheck it is in the range */
if ( hwm > state - > high_hwm ) {
DEBUG ( 1 , ( " Fatal Error: %s range full!! (max: %lu) \n " ,
state - > hwmtype , ( unsigned long ) state - > high_hwm ) ) ;
ret = NT_STATUS_UNSUCCESSFUL ;
goto done ;
}
ret = NT_STATUS_OK ;
state - > hwm = hwm ;
done :
return ret ;
}
2010-06-16 17:31:55 +04:00
static NTSTATUS idmap_tdb2_allocate_id ( struct idmap_domain * dom ,
struct unixid * xid )
2008-01-16 12:27:29 +03:00
{
const char * hwmkey ;
const char * hwmtype ;
uint32_t high_hwm ;
2009-08-20 17:28:19 +04:00
uint32_t hwm = 0 ;
2008-09-17 10:15:40 +04:00
NTSTATUS status ;
2009-07-28 18:53:37 +04:00
struct idmap_tdb2_allocate_id_context state ;
2010-06-16 19:40:12 +04:00
struct idmap_tdb2_context * ctx ;
2008-09-17 10:15:40 +04:00
2010-06-16 19:21:27 +04:00
status = idmap_tdb2_open_db ( dom ) ;
2008-09-17 10:15:40 +04:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2008-01-16 12:27:29 +03:00
2010-06-16 19:40:12 +04:00
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
2008-01-16 12:27:29 +03:00
/* Get current high water mark */
switch ( xid - > type ) {
case ID_TYPE_UID :
hwmkey = HWM_USER ;
hwmtype = " UID " ;
break ;
case ID_TYPE_GID :
hwmkey = HWM_GROUP ;
hwmtype = " GID " ;
break ;
default :
DEBUG ( 2 , ( " Invalid ID type (0x%x) \n " , xid - > type ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
2010-06-16 19:14:51 +04:00
high_hwm = dom - > high_id ;
2010-06-16 17:31:55 +04:00
2009-07-28 18:53:37 +04:00
state . hwm = hwm ;
state . high_hwm = high_hwm ;
state . hwmtype = hwmtype ;
state . hwmkey = hwmkey ;
2008-08-07 12:35:19 +04:00
2010-06-16 19:40:12 +04:00
status = dbwrap_trans_do ( ctx - > db , idmap_tdb2_allocate_id_action ,
2009-07-28 18:53:37 +04:00
& state ) ;
2008-01-16 12:27:29 +03:00
2009-07-28 18:53:37 +04:00
if ( NT_STATUS_IS_OK ( status ) ) {
xid - > id = state . hwm ;
2010-06-01 16:03:32 +04:00
DEBUG ( 10 , ( " New %s = %d \n " , hwmtype , state . hwm ) ) ;
2009-07-28 18:53:37 +04:00
} else {
DEBUG ( 1 , ( " Error allocating a new %s \n " , hwmtype ) ) ;
2008-01-16 12:27:29 +03:00
}
2009-07-28 18:53:37 +04:00
return status ;
2008-01-16 12:27:29 +03:00
}
2010-07-30 01:13:54 +04:00
/**
* Allocate a new unix - ID .
* For now this is for the default idmap domain only .
* Should be extended later on .
*/
static NTSTATUS idmap_tdb2_get_new_id ( struct idmap_domain * dom ,
struct unixid * id )
{
NTSTATUS ret ;
if ( ! strequal ( dom - > name , " * " ) ) {
DEBUG ( 3 , ( " idmap_tdb2_get_new_id: "
" Refusing creation of mapping for domain'%s'. "
" Currently only supported for the default "
" domain \" * \" . \n " ,
dom - > name ) ) ;
return NT_STATUS_NOT_IMPLEMENTED ;
}
2010-06-16 17:31:55 +04:00
ret = idmap_tdb2_allocate_id ( dom , id ) ;
2010-07-30 01:13:54 +04:00
return ret ;
}
2008-01-16 12:27:29 +03:00
/*
IDMAP MAPPING TDB BACKEND
*/
2010-06-23 14:02:31 +04:00
static NTSTATUS idmap_tdb2_set_mapping ( struct idmap_domain * dom ,
const struct id_map * map ) ;
2008-01-16 12:27:29 +03:00
/*
Initialise idmap database .
*/
2011-03-03 01:00:58 +03:00
static NTSTATUS idmap_tdb2_db_init ( struct idmap_domain * dom )
2008-01-16 12:27:29 +03:00
{
NTSTATUS ret ;
struct idmap_tdb2_context * ctx ;
2011-06-07 20:00:36 +04:00
char * config_option = NULL ;
const char * idmap_script = NULL ;
2008-01-16 12:27:29 +03:00
2010-06-17 00:36:33 +04:00
ctx = talloc_zero ( dom , struct idmap_tdb2_context ) ;
2008-01-16 12:27:29 +03:00
if ( ! ctx ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2011-06-07 20:00:36 +04:00
config_option = talloc_asprintf ( ctx , " idmap config %s " , dom - > name ) ;
if ( config_option = = NULL ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto failed ;
}
2011-08-10 15:41:14 +04:00
ctx - > script = lp_parm_const_string ( - 1 , config_option , " script " , NULL ) ;
2011-06-07 20:00:36 +04:00
talloc_free ( config_option ) ;
2010-06-16 19:17:44 +04:00
2011-06-07 20:00:36 +04:00
idmap_script = lp_parm_const_string ( - 1 , " idmap " , " script " , NULL ) ;
if ( idmap_script ! = NULL ) {
DEBUG ( 0 , ( " Warning: 'idmap:script' is deprecated. "
" Please use 'idmap config * : script' instead! \n " ) ) ;
}
2009-05-27 21:24:03 +04:00
2011-06-07 20:00:36 +04:00
if ( strequal ( dom - > name , " * " ) & & ctx - > script = = NULL ) {
/* fall back to idmap:script for backwards compatibility */
ctx - > script = idmap_script ;
}
2010-06-16 17:49:30 +04:00
2011-06-07 20:00:36 +04:00
if ( ctx - > script ) {
DEBUG ( 1 , ( " using idmap script '%s' \n " , ctx - > script ) ) ;
2008-01-16 12:27:29 +03:00
}
2010-06-23 14:01:47 +04:00
ctx - > rw_ops = talloc_zero ( ctx , struct idmap_rw_ops ) ;
if ( ctx - > rw_ops = = NULL ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto failed ;
}
ctx - > rw_ops - > get_new_id = idmap_tdb2_get_new_id ;
ctx - > rw_ops - > set_mapping = idmap_tdb2_set_mapping ;
2010-06-16 19:21:27 +04:00
dom - > private_data = ctx ;
ret = idmap_tdb2_open_db ( dom ) ;
2010-06-16 17:08:16 +04:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
goto failed ;
}
2008-01-16 12:27:29 +03:00
return NT_STATUS_OK ;
failed :
talloc_free ( ctx ) ;
return ret ;
}
2010-06-17 10:23:25 +04:00
/**
* store a mapping in the database .
*/
2009-07-28 15:31:09 +04:00
struct idmap_tdb2_set_mapping_context {
const char * ksidstr ;
const char * kidstr ;
} ;
static NTSTATUS idmap_tdb2_set_mapping_action ( struct db_context * db ,
void * private_data )
{
TDB_DATA data ;
NTSTATUS ret ;
struct idmap_tdb2_set_mapping_context * state ;
TALLOC_CTX * tmp_ctx = talloc_stackframe ( ) ;
state = ( struct idmap_tdb2_set_mapping_context * ) private_data ;
2009-08-20 17:28:19 +04:00
DEBUG ( 10 , ( " Storing %s <-> %s map \n " , state - > ksidstr , state - > kidstr ) ) ;
2009-07-28 15:31:09 +04:00
/* check wheter sid mapping is already present in db */
2011-08-24 15:08:13 +04:00
ret = dbwrap_fetch_bystring ( db , tmp_ctx , state - > ksidstr , & data ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2009-07-28 15:31:09 +04:00
ret = NT_STATUS_OBJECT_NAME_COLLISION ;
goto done ;
}
ret = dbwrap_store_bystring ( db , state - > ksidstr ,
string_term_tdb_data ( state - > kidstr ) ,
TDB_INSERT ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
DEBUG ( 0 , ( " Error storing SID -> ID: %s \n " , nt_errstr ( ret ) ) ) ;
goto done ;
}
ret = dbwrap_store_bystring ( db , state - > kidstr ,
string_term_tdb_data ( state - > ksidstr ) ,
TDB_INSERT ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
DEBUG ( 0 , ( " Error storing ID -> SID: %s \n " , nt_errstr ( ret ) ) ) ;
/* try to remove the previous stored SID -> ID map */
dbwrap_delete_bystring ( db , state - > ksidstr ) ;
goto done ;
}
DEBUG ( 10 , ( " Stored %s <-> %s \n " , state - > ksidstr , state - > kidstr ) ) ;
done :
talloc_free ( tmp_ctx ) ;
return ret ;
}
2010-06-17 10:23:25 +04:00
static NTSTATUS idmap_tdb2_set_mapping ( struct idmap_domain * dom , const struct id_map * map )
{
struct idmap_tdb2_context * ctx ;
NTSTATUS ret ;
char * ksidstr , * kidstr ;
struct idmap_tdb2_set_mapping_context state ;
if ( ! map | | ! map - > sid ) {
return NT_STATUS_INVALID_PARAMETER ;
}
ksidstr = kidstr = NULL ;
/* TODO: should we filter a set_mapping using low/high filters ? */
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
switch ( map - > xid . type ) {
case ID_TYPE_UID :
kidstr = talloc_asprintf ( ctx , " UID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
case ID_TYPE_GID :
kidstr = talloc_asprintf ( ctx , " GID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
default :
DEBUG ( 2 , ( " INVALID unix ID type: 0x02%x \n " , map - > xid . type ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
if ( kidstr = = NULL ) {
DEBUG ( 0 , ( " ERROR: Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
ksidstr = sid_string_talloc ( ctx , map - > sid ) ;
if ( ksidstr = = NULL ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
state . ksidstr = ksidstr ;
state . kidstr = kidstr ;
ret = dbwrap_trans_do ( ctx - > db , idmap_tdb2_set_mapping_action ,
& state ) ;
done :
talloc_free ( ksidstr ) ;
talloc_free ( kidstr ) ;
return ret ;
}
2010-06-23 13:30:56 +04:00
/**
* Create a new mapping for an unmapped SID , also allocating a new ID .
* This should be run inside a transaction .
*
* TODO :
* Properly integrate this with multi domain idmap config :
* Currently , the allocator is default - config only .
*/
static NTSTATUS idmap_tdb2_new_mapping ( struct idmap_domain * dom , struct id_map * map )
{
NTSTATUS ret ;
2010-06-23 14:02:31 +04:00
struct idmap_tdb2_context * ctx ;
2010-06-23 13:30:56 +04:00
2010-06-23 14:02:31 +04:00
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
2010-06-23 13:30:56 +04:00
2010-06-23 14:02:31 +04:00
ret = idmap_rw_new_mapping ( dom , ctx - > rw_ops , map ) ;
2010-06-23 13:30:56 +04:00
return ret ;
}
2008-01-16 12:27:29 +03:00
/*
run a script to perform a mapping
The script should the following command lines :
SIDTOID S - 1 - xxxx
IDTOSID UID xxxx
IDTOSID GID xxxx
and should return one of the following as a single line of text
UID : xxxx
GID : xxxx
SID : xxxx
ERR : xxxx
*/
static NTSTATUS idmap_tdb2_script ( struct idmap_tdb2_context * ctx , struct id_map * map ,
const char * fmt , . . . )
{
va_list ap ;
char * cmd ;
FILE * p ;
char line [ 64 ] ;
unsigned long v ;
2010-06-16 17:47:23 +04:00
cmd = talloc_asprintf ( ctx , " %s " , ctx - > script ) ;
2008-01-16 12:27:29 +03:00
NT_STATUS_HAVE_NO_MEMORY ( cmd ) ;
va_start ( ap , fmt ) ;
cmd = talloc_vasprintf_append ( cmd , fmt , ap ) ;
va_end ( ap ) ;
NT_STATUS_HAVE_NO_MEMORY ( cmd ) ;
p = popen ( cmd , " r " ) ;
talloc_free ( cmd ) ;
if ( p = = NULL ) {
return NT_STATUS_NONE_MAPPED ;
}
if ( fgets ( line , sizeof ( line ) - 1 , p ) = = NULL ) {
pclose ( p ) ;
return NT_STATUS_NONE_MAPPED ;
}
pclose ( p ) ;
DEBUG ( 10 , ( " idmap script gave: %s \n " , line ) ) ;
if ( sscanf ( line , " UID:%lu " , & v ) = = 1 ) {
map - > xid . id = v ;
map - > xid . type = ID_TYPE_UID ;
} else if ( sscanf ( line , " GID:%lu " , & v ) = = 1 ) {
map - > xid . id = v ;
map - > xid . type = ID_TYPE_GID ;
} else if ( strncmp ( line , " SID:S- " , 6 ) = = 0 ) {
if ( ! string_to_sid ( map - > sid , & line [ 4 ] ) ) {
DEBUG ( 0 , ( " Bad SID in '%s' from idmap script %s \n " ,
2010-06-16 17:47:23 +04:00
line , ctx - > script ) ) ;
2008-01-16 12:27:29 +03:00
return NT_STATUS_NONE_MAPPED ;
}
} else {
DEBUG ( 0 , ( " Bad reply '%s' from idmap script %s \n " ,
2010-06-16 17:47:23 +04:00
line , ctx - > script ) ) ;
2008-01-16 12:27:29 +03:00
return NT_STATUS_NONE_MAPPED ;
}
return NT_STATUS_OK ;
}
/*
Single id to sid lookup function .
*/
2010-06-16 18:02:07 +04:00
static NTSTATUS idmap_tdb2_id_to_sid ( struct idmap_domain * dom , struct id_map * map )
2008-01-16 12:27:29 +03:00
{
NTSTATUS ret ;
TDB_DATA data ;
char * keystr ;
2008-09-17 10:15:40 +04:00
NTSTATUS status ;
2010-06-16 18:02:07 +04:00
struct idmap_tdb2_context * ctx ;
2008-09-17 10:15:40 +04:00
2010-06-16 18:02:07 +04:00
if ( ! dom | | ! map ) {
2008-01-16 12:27:29 +03:00
return NT_STATUS_INVALID_PARAMETER ;
}
2010-06-16 19:21:27 +04:00
status = idmap_tdb2_open_db ( dom ) ;
NT_STATUS_NOT_OK_RETURN ( status ) ;
2010-06-16 18:02:07 +04:00
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
2008-01-16 12:27:29 +03:00
/* apply filters before checking */
2010-06-16 19:12:44 +04:00
if ( ! idmap_unix_id_is_in_range ( map - > xid . id , dom ) ) {
2008-01-16 12:27:29 +03:00
DEBUG ( 5 , ( " Requested id (%u) out of range (%u - %u). Filtered! \n " ,
2010-06-16 19:12:44 +04:00
map - > xid . id , dom - > low_id , dom - > high_id ) ) ;
2008-01-16 12:27:29 +03:00
return NT_STATUS_NONE_MAPPED ;
}
switch ( map - > xid . type ) {
case ID_TYPE_UID :
keystr = talloc_asprintf ( ctx , " UID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
case ID_TYPE_GID :
keystr = talloc_asprintf ( ctx , " GID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
default :
DEBUG ( 2 , ( " INVALID unix ID type: 0x02%x \n " , map - > xid . type ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
if ( keystr = = NULL ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
DEBUG ( 10 , ( " Fetching record %s \n " , keystr ) ) ;
/* Check if the mapping exists */
2011-08-24 15:08:13 +04:00
status = dbwrap_fetch_bystring ( ctx - > db , keystr , keystr , & data ) ;
2008-01-16 12:27:29 +03:00
2011-08-24 15:08:13 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2009-07-29 15:36:18 +04:00
char * sidstr ;
struct idmap_tdb2_set_mapping_context store_state ;
2008-01-16 12:27:29 +03:00
DEBUG ( 10 , ( " Record %s not found \n " , keystr ) ) ;
2010-06-16 17:47:23 +04:00
if ( ctx - > script = = NULL ) {
2008-01-16 12:27:29 +03:00
ret = NT_STATUS_NONE_MAPPED ;
goto done ;
}
ret = idmap_tdb2_script ( ctx , map , " IDTOSID %s " , keystr ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
goto done ;
}
2009-07-29 15:36:18 +04:00
sidstr = sid_string_talloc ( keystr , map - > sid ) ;
if ( ! sidstr ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
2008-01-16 12:27:29 +03:00
}
2009-07-29 15:36:18 +04:00
store_state . ksidstr = sidstr ;
store_state . kidstr = keystr ;
2010-06-16 19:40:12 +04:00
ret = dbwrap_trans_do ( ctx - > db , idmap_tdb2_set_mapping_action ,
2009-07-29 15:36:18 +04:00
& store_state ) ;
2008-01-16 12:27:29 +03:00
goto done ;
}
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
if ( ! string_to_sid ( map - > sid , ( const char * ) data . dptr ) ) {
DEBUG ( 10 , ( " INVALID SID (%s) in record %s \n " ,
( const char * ) data . dptr , keystr ) ) ;
ret = NT_STATUS_INTERNAL_DB_ERROR ;
goto done ;
}
DEBUG ( 10 , ( " Found record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_OK ;
done :
talloc_free ( keystr ) ;
return ret ;
}
/*
Single sid to id lookup function .
*/
2010-06-16 19:06:17 +04:00
static NTSTATUS idmap_tdb2_sid_to_id ( struct idmap_domain * dom , struct id_map * map )
2008-01-16 12:27:29 +03:00
{
NTSTATUS ret ;
TDB_DATA data ;
char * keystr ;
unsigned long rec_id = 0 ;
2010-06-16 19:06:17 +04:00
struct idmap_tdb2_context * ctx ;
2009-01-25 01:52:23 +03:00
TALLOC_CTX * tmp_ctx = talloc_stackframe ( ) ;
2008-09-17 10:15:40 +04:00
2010-06-16 19:21:27 +04:00
ret = idmap_tdb2_open_db ( dom ) ;
2009-01-25 01:52:23 +03:00
NT_STATUS_NOT_OK_RETURN ( ret ) ;
2008-01-16 12:27:29 +03:00
2010-06-16 19:06:17 +04:00
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
2009-01-25 01:52:23 +03:00
keystr = sid_string_talloc ( tmp_ctx , map - > sid ) ;
if ( keystr = = NULL ) {
2008-01-16 12:27:29 +03:00
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
DEBUG ( 10 , ( " Fetching record %s \n " , keystr ) ) ;
/* Check if sid is present in database */
2011-08-24 15:08:13 +04:00
ret = dbwrap_fetch_bystring ( ctx - > db , tmp_ctx , keystr , & data ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2009-07-29 15:43:29 +04:00
char * idstr ;
struct idmap_tdb2_set_mapping_context store_state ;
2008-01-16 12:27:29 +03:00
DEBUG ( 10 , ( __location__ " Record %s not found \n " , keystr ) ) ;
2010-06-16 17:47:23 +04:00
if ( ctx - > script = = NULL ) {
2008-01-16 12:27:29 +03:00
ret = NT_STATUS_NONE_MAPPED ;
goto done ;
}
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
ret = idmap_tdb2_script ( ctx , map , " SIDTOID %s " , keystr ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
goto done ;
}
2010-04-29 14:14:08 +04:00
/* apply filters before returning result */
2010-06-16 19:12:44 +04:00
if ( ! idmap_unix_id_is_in_range ( map - > xid . id , dom ) ) {
2010-04-29 14:14:08 +04:00
DEBUG ( 5 , ( " Script returned id (%u) out of range "
" (%u - %u). Filtered! \n " ,
2010-06-16 19:12:44 +04:00
map - > xid . id , dom - > low_id , dom - > high_id ) ) ;
2010-04-29 14:14:08 +04:00
ret = NT_STATUS_NONE_MAPPED ;
goto done ;
}
2009-07-29 15:43:29 +04:00
idstr = talloc_asprintf ( tmp_ctx , " %cID %lu " ,
map - > xid . type = = ID_TYPE_UID ? ' U ' : ' G ' ,
( unsigned long ) map - > xid . id ) ;
if ( idstr = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
store_state . ksidstr = keystr ;
store_state . kidstr = idstr ;
2010-06-16 19:40:12 +04:00
ret = dbwrap_trans_do ( ctx - > db , idmap_tdb2_set_mapping_action ,
2009-07-29 15:43:29 +04:00
& store_state ) ;
2008-01-16 12:27:29 +03:00
goto done ;
}
/* What type of record is this ? */
if ( sscanf ( ( const char * ) data . dptr , " UID %lu " , & rec_id ) = = 1 ) { /* Try a UID record. */
map - > xid . id = rec_id ;
map - > xid . type = ID_TYPE_UID ;
DEBUG ( 10 , ( " Found uid record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_OK ;
} else if ( sscanf ( ( const char * ) data . dptr , " GID %lu " , & rec_id ) = = 1 ) { /* Try a GID record. */
map - > xid . id = rec_id ;
map - > xid . type = ID_TYPE_GID ;
DEBUG ( 10 , ( " Found gid record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_OK ;
} else { /* Unknown record type ! */
DEBUG ( 2 , ( " Found INVALID record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_INTERNAL_DB_ERROR ;
2010-04-29 14:11:04 +04:00
goto done ;
2008-01-16 12:27:29 +03:00
}
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
/* apply filters before returning result */
2010-06-16 19:12:44 +04:00
if ( ! idmap_unix_id_is_in_range ( map - > xid . id , dom ) ) {
2008-01-16 12:27:29 +03:00
DEBUG ( 5 , ( " Requested id (%u) out of range (%u - %u). Filtered! \n " ,
2010-06-16 19:12:44 +04:00
map - > xid . id , dom - > low_id , dom - > high_id ) ) ;
2008-01-16 12:27:29 +03:00
ret = NT_STATUS_NONE_MAPPED ;
}
done :
2009-01-25 01:52:23 +03:00
talloc_free ( tmp_ctx ) ;
2008-01-16 12:27:29 +03:00
return ret ;
}
/*
lookup a set of unix ids .
*/
static NTSTATUS idmap_tdb2_unixids_to_sids ( struct idmap_domain * dom , struct id_map * * ids )
{
NTSTATUS ret ;
int i ;
2009-03-02 09:19:50 +03:00
/* initialize the status to avoid suprise */
for ( i = 0 ; ids [ i ] ; i + + ) {
ids [ i ] - > status = ID_UNKNOWN ;
}
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
for ( i = 0 ; ids [ i ] ; i + + ) {
2010-06-16 18:02:07 +04:00
ret = idmap_tdb2_id_to_sid ( dom , ids [ i ] ) ;
2008-01-16 12:27:29 +03:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
/* if it is just a failed mapping continue */
if ( NT_STATUS_EQUAL ( ret , NT_STATUS_NONE_MAPPED ) ) {
/* make sure it is marked as unmapped */
ids [ i ] - > status = ID_UNMAPPED ;
continue ;
}
2010-04-29 14:09:48 +04:00
2008-01-16 12:27:29 +03:00
/* some fatal error occurred, return immediately */
goto done ;
}
/* all ok, id is mapped */
ids [ i ] - > status = ID_MAPPED ;
}
ret = NT_STATUS_OK ;
done :
return ret ;
}
/*
lookup a set of sids .
*/
2010-07-30 01:13:54 +04:00
struct idmap_tdb2_sids_to_unixids_context {
struct idmap_domain * dom ;
struct id_map * * ids ;
bool allocate_unmapped ;
} ;
static NTSTATUS idmap_tdb2_sids_to_unixids_action ( struct db_context * db ,
void * private_data )
2008-01-16 12:27:29 +03:00
{
2010-07-30 01:13:54 +04:00
struct idmap_tdb2_sids_to_unixids_context * state ;
2008-01-16 12:27:29 +03:00
int i ;
2010-07-30 01:13:54 +04:00
NTSTATUS ret = NT_STATUS_OK ;
2008-01-16 12:27:29 +03:00
2010-07-30 01:13:54 +04:00
state = ( struct idmap_tdb2_sids_to_unixids_context * ) private_data ;
2010-04-29 14:09:48 +04:00
2010-07-30 01:13:54 +04:00
DEBUG ( 10 , ( " idmap_tdb2_sids_to_unixids_action: "
" domain: [%s], allocate: %s \n " ,
state - > dom - > name ,
state - > allocate_unmapped ? " yes " : " no " ) ) ;
2008-01-16 12:27:29 +03:00
2010-07-30 01:13:54 +04:00
for ( i = 0 ; state - > ids [ i ] ; i + + ) {
if ( ( state - > ids [ i ] - > status = = ID_UNKNOWN ) | |
/* retry if we could not map in previous run: */
( state - > ids [ i ] - > status = = ID_UNMAPPED ) )
{
NTSTATUS ret2 ;
2010-06-16 19:06:17 +04:00
ret2 = idmap_tdb2_sid_to_id ( state - > dom , state - > ids [ i ] ) ;
2010-07-30 01:13:54 +04:00
if ( ! NT_STATUS_IS_OK ( ret2 ) ) {
/* if it is just a failed mapping, continue */
if ( NT_STATUS_EQUAL ( ret2 , NT_STATUS_NONE_MAPPED ) ) {
/* make sure it is marked as unmapped */
state - > ids [ i ] - > status = ID_UNMAPPED ;
ret = STATUS_SOME_UNMAPPED ;
} else {
/* some fatal error occurred, return immediately */
ret = ret2 ;
goto done ;
}
} else {
/* all ok, id is mapped */
state - > ids [ i ] - > status = ID_MAPPED ;
2008-01-16 12:27:29 +03:00
}
2010-07-30 01:13:54 +04:00
}
2010-04-29 14:09:48 +04:00
2010-07-30 01:13:54 +04:00
if ( ( state - > ids [ i ] - > status = = ID_UNMAPPED ) & &
state - > allocate_unmapped )
{
ret = idmap_tdb2_new_mapping ( state - > dom , state - > ids [ i ] ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
goto done ;
}
2008-01-16 12:27:29 +03:00
}
2010-07-30 01:13:54 +04:00
}
2008-01-16 12:27:29 +03:00
2010-07-30 01:13:54 +04:00
done :
return ret ;
}
static NTSTATUS idmap_tdb2_sids_to_unixids ( struct idmap_domain * dom , struct id_map * * ids )
{
NTSTATUS ret ;
int i ;
struct idmap_tdb2_sids_to_unixids_context state ;
2010-06-16 19:40:12 +04:00
struct idmap_tdb2_context * ctx ;
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
2010-07-30 01:13:54 +04:00
/* initialize the status to avoid suprise */
for ( i = 0 ; ids [ i ] ; i + + ) {
ids [ i ] - > status = ID_UNKNOWN ;
2008-01-16 12:27:29 +03:00
}
2010-07-30 01:13:54 +04:00
state . dom = dom ;
state . ids = ids ;
state . allocate_unmapped = false ;
2010-06-16 19:40:12 +04:00
ret = idmap_tdb2_sids_to_unixids_action ( ctx - > db , & state ) ;
2010-07-30 01:13:54 +04:00
2010-06-01 18:45:51 +04:00
if ( NT_STATUS_EQUAL ( ret , STATUS_SOME_UNMAPPED ) & & ! dom - > read_only ) {
2010-07-30 01:13:54 +04:00
state . allocate_unmapped = true ;
2010-06-16 19:40:12 +04:00
ret = dbwrap_trans_do ( ctx - > db ,
2010-07-30 01:13:54 +04:00
idmap_tdb2_sids_to_unixids_action ,
& state ) ;
}
2008-01-16 12:27:29 +03:00
return ret ;
}
static struct idmap_methods db_methods = {
. init = idmap_tdb2_db_init ,
. unixids_to_sids = idmap_tdb2_unixids_to_sids ,
. sids_to_unixids = idmap_tdb2_sids_to_unixids ,
2011-03-08 02:15:25 +03:00
. allocate_id = idmap_tdb2_get_new_id
2008-01-16 12:27:29 +03:00
} ;
2011-12-03 10:03:35 +04:00
NTSTATUS samba_init_module ( void )
2008-01-16 12:27:29 +03:00
{
return smb_register_idmap ( SMB_IDMAP_INTERFACE_VERSION , " tdb2 " , & db_methods ) ;
}