2001-09-26 00:21:21 +04:00
/*
2005-01-14 22:26:13 +03:00
Unix SMB / CIFS implementation .
2001-09-26 00:21:21 +04:00
LDAP protocol helper functions for SAMBA
2007-10-11 00:34:30 +04:00
Copyright ( C ) Jean Fran <EFBFBD> ois Micouleau 1998
2003-05-14 07:32:20 +04:00
Copyright ( C ) Gerald Carter 2001 - 2003
2002-09-25 19:19:00 +04:00
Copyright ( C ) Shahms King 2001
2003-06-25 16:51:58 +04:00
Copyright ( C ) Andrew Bartlett 2002 - 2003
2003-11-14 06:28:03 +03:00
Copyright ( C ) Stefan ( metze ) Metzmacher 2002 - 2003
2006-03-01 23:47:36 +03:00
Copyright ( C ) Simo Sorce 2006
2009-05-31 13:14:06 +04:00
2001-09-26 00:21:21 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2001-09-26 00:21:21 +04:00
( at your option ) any later version .
2009-05-31 13:14:06 +04:00
2001-09-26 00:21:21 +04:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2009-05-31 13:14:06 +04:00
2001-09-26 00:21:21 +04:00
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2009-05-31 13:14:06 +04:00
2001-09-26 00:21:21 +04:00
*/
/* TODO:
* persistent connections : if using NSS LDAP , many connections are made
* however , using only one within Samba would be nice
*
* Clean up SSL stuff , compile on OpenLDAP 1. x , 2. x , and Netscape SDK
*
* Other LDAP based login attributes : accountExpires , etc .
2006-02-20 23:09:36 +03:00
* ( should be the domain of Samba proper , but the sam_password / struct samu
2001-09-26 00:21:21 +04:00
* structures don ' t have fields for some of these attributes )
*
* SSL is done , but can ' t get the certificate based authentication to work
* against on my test platform ( Linux 2.4 , OpenLDAP 2. x )
*/
/* NOTE: this will NOT work against an Active Directory server
* due to the fact that the two password fields cannot be retrieved
* from a server ; recommend using security = domain in this situation
* and / or winbind
*/
2003-05-14 07:32:20 +04:00
# include "includes.h"
2011-03-18 20:58:37 +03:00
# include "passdb.h"
2009-03-16 13:27:58 +03:00
# include "../libcli/auth/libcli_auth.h"
2010-08-05 04:25:37 +04:00
# include "secrets.h"
2010-08-18 20:13:42 +04:00
# include "idmap_cache.h"
2010-10-12 08:27:50 +04:00
# include "../libcli/security/security.h"
2011-03-02 18:11:00 +03:00
# include "../lib/util/util_pw.h"
2011-02-25 00:30:16 +03:00
# include "lib/winbind_util.h"
2012-03-16 02:16:23 +04:00
# include "librpc/gen_ndr/idmap.h"
2012-07-23 06:47:01 +04:00
# include "lib/param/loadparm.h"
2012-12-03 04:42:38 +04:00
# include "lib/util_sid_passdb.h"
2003-05-14 07:32:20 +04:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_PASSDB
2001-09-26 00:21:21 +04:00
# include <lber.h>
# include <ldap.h>
2003-06-25 16:51:58 +04:00
2003-06-05 06:34:30 +04:00
# include "smbldap.h"
2011-10-10 23:45:42 +04:00
# include "passdb/pdb_ldap.h"
2011-10-10 23:48:35 +04:00
# include "passdb/pdb_nds.h"
2011-10-10 23:53:15 +04:00
# include "passdb/pdb_ipa.h"
2011-10-17 20:00:01 +04:00
# include "passdb/pdb_ldap_util.h"
2011-10-17 20:03:31 +04:00
# include "passdb/pdb_ldap_schema.h"
2003-06-05 06:34:30 +04:00
2003-07-05 13:46:12 +04:00
/**********************************************************************
2006-02-04 01:19:41 +03:00
Simple helper function to make stuff better readable
2003-07-05 13:46:12 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2006-02-04 01:19:41 +03:00
2010-07-15 18:52:32 +04:00
LDAP * priv2ld ( struct ldapsam_privates * priv )
2003-07-05 13:46:12 +04:00
{
2006-02-04 01:19:41 +03:00
return priv - > smbldap_state - > ldap_struct ;
2003-07-05 13:46:12 +04:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
2003-09-11 02:33:06 +04:00
Get the attribute name given a user schame version .
2003-05-14 07:32:20 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static const char * get_userattr_key2string ( int schema_ver , int key )
{
2003-09-11 02:33:06 +04:00
switch ( schema_ver ) {
2003-05-14 07:32:20 +04:00
case SCHEMAVER_SAMBASAMACCOUNT :
return get_attr_key2string ( attrib_map_v30 , key ) ;
2009-05-31 13:14:06 +04:00
2003-05-14 07:32:20 +04:00
default :
DEBUG ( 0 , ( " get_userattr_key2string: unknown schema version specified \n " ) ) ;
break ;
}
return NULL ;
}
/**********************************************************************
2003-09-11 02:33:06 +04:00
Return the list of attribute names given a user schema version .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-05-14 07:32:20 +04:00
2006-02-04 01:19:41 +03:00
const char * * get_userattr_list ( TALLOC_CTX * mem_ctx , int schema_ver )
2003-05-14 07:32:20 +04:00
{
2003-09-11 02:33:06 +04:00
switch ( schema_ver ) {
2003-05-14 07:32:20 +04:00
case SCHEMAVER_SAMBASAMACCOUNT :
2006-02-04 01:19:41 +03:00
return get_attr_list ( mem_ctx , attrib_map_v30 ) ;
2003-05-14 07:32:20 +04:00
default :
DEBUG ( 0 , ( " get_userattr_list: unknown schema version specified! \n " ) ) ;
break ;
}
2009-05-31 13:14:06 +04:00
2003-05-14 07:32:20 +04:00
return NULL ;
}
2003-09-11 02:33:06 +04:00
2004-09-20 15:02:14 +04:00
/**************************************************************************
Return the list of attribute names to delete given a user schema version .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2006-02-04 01:19:41 +03:00
static const char * * get_userattr_delete_list ( TALLOC_CTX * mem_ctx ,
int schema_ver )
2004-09-20 15:02:14 +04:00
{
switch ( schema_ver ) {
case SCHEMAVER_SAMBASAMACCOUNT :
2006-02-04 01:19:41 +03:00
return get_attr_list ( mem_ctx ,
attrib_map_to_delete_v30 ) ;
2004-09-20 15:02:14 +04:00
default :
2004-10-12 01:09:36 +04:00
DEBUG ( 0 , ( " get_userattr_delete_list: unknown schema version specified! \n " ) ) ;
2004-09-20 15:02:14 +04:00
break ;
}
2009-05-31 13:14:06 +04:00
2004-09-20 15:02:14 +04:00
return NULL ;
}
2003-05-14 07:32:20 +04:00
/*******************************************************************
2003-09-11 02:33:06 +04:00
Generate the LDAP search filter for the objectclass based on the
version of the schema we are using .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-05-14 07:32:20 +04:00
static const char * get_objclass_filter ( int schema_ver )
{
2007-11-04 20:15:37 +03:00
fstring objclass_filter ;
char * result ;
2009-05-31 13:14:06 +04:00
2003-09-11 02:33:06 +04:00
switch ( schema_ver ) {
2003-05-14 07:32:20 +04:00
case SCHEMAVER_SAMBASAMACCOUNT :
2003-07-23 16:33:59 +04:00
fstr_sprintf ( objclass_filter , " (objectclass=%s) " , LDAP_OBJ_SAMBASAMACCOUNT ) ;
2003-05-14 07:32:20 +04:00
break ;
default :
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " get_objclass_filter: Invalid schema version specified! \n " ) ) ;
2007-11-04 20:15:37 +03:00
objclass_filter [ 0 ] = ' \0 ' ;
2003-05-14 07:32:20 +04:00
break ;
}
2009-05-31 13:14:06 +04:00
2007-11-04 20:15:37 +03:00
result = talloc_strdup ( talloc_tos ( ) , objclass_filter ) ;
SMB_ASSERT ( result ! = NULL ) ;
return result ;
2003-05-14 07:32:20 +04:00
}
2005-09-30 21:13:37 +04:00
/*****************************************************************
Scan a sequence number off OpenLDAP ' s syncrepl contextCSN
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static NTSTATUS ldapsam_get_seq_num ( struct pdb_methods * my_methods , time_t * seq_num )
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
NTSTATUS ntstatus = NT_STATUS_UNSUCCESSFUL ;
LDAPMessage * msg = NULL ;
LDAPMessage * entry = NULL ;
TALLOC_CTX * mem_ctx ;
char * * values = NULL ;
int rc , num_result , num_values , rid ;
2007-11-15 03:05:42 +03:00
char * suffix = NULL ;
2007-12-08 04:32:32 +03:00
char * tok ;
2005-09-30 21:13:37 +04:00
const char * p ;
const char * * attrs ;
/* Unfortunatly there is no proper way to detect syncrepl-support in
* smbldap_connect_system ( ) . The syncrepl OIDs are submitted for publication
* but do not show up in the root - DSE yet . Neither we can query the
* subschema - context for the syncProviderSubentry or syncConsumerSubentry
* objectclass . Currently we require lp_ldap_suffix ( ) to show up as
* namingContext . - Guenther
*/
if ( ! lp_parm_bool ( - 1 , " ldapsam " , " syncrepl_seqnum " , False ) ) {
return ntstatus ;
}
if ( ! seq_num ) {
DEBUG ( 3 , ( " ldapsam_get_seq_num: no sequence_number \n " ) ) ;
return ntstatus ;
}
2012-07-18 09:37:23 +04:00
if ( ! smbldap_has_naming_context ( ldap_state - > smbldap_state - > ldap_struct , lp_ldap_suffix ( talloc_tos ( ) ) ) ) {
2005-09-30 21:13:37 +04:00
DEBUG ( 3 , ( " ldapsam_get_seq_num: DIT not configured to hold %s "
2012-07-18 09:37:23 +04:00
" as top-level namingContext \n " , lp_ldap_suffix ( talloc_tos ( ) ) ) ) ;
2005-09-30 21:13:37 +04:00
return ntstatus ;
}
mem_ctx = talloc_init ( " ldapsam_get_seq_num " ) ;
if ( mem_ctx = = NULL )
return NT_STATUS_NO_MEMORY ;
2011-06-07 05:30:12 +04:00
if ( ( attrs = talloc_array ( mem_ctx , const char * , 2 ) ) = = NULL ) {
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
ntstatus = NT_STATUS_NO_MEMORY ;
goto done ;
}
2005-09-30 21:13:37 +04:00
/* if we got a syncrepl-rid (up to three digits long) we speak with a consumer */
rid = lp_parm_int ( - 1 , " ldapsam " , " syncrepl_rid " , - 1 ) ;
if ( rid > 0 ) {
/* consumer syncreplCookie: */
/* csn=20050126161620Z#0000001#00#00000 */
attrs [ 0 ] = talloc_strdup ( mem_ctx , " syncreplCookie " ) ;
attrs [ 1 ] = NULL ;
2007-11-15 03:05:42 +03:00
suffix = talloc_asprintf ( mem_ctx ,
2012-07-18 09:37:23 +04:00
" cn=syncrepl%d,%s " , rid , lp_ldap_suffix ( talloc_tos ( ) ) ) ;
2007-11-15 03:05:42 +03:00
if ( ! suffix ) {
ntstatus = NT_STATUS_NO_MEMORY ;
goto done ;
}
2005-09-30 21:13:37 +04:00
} else {
/* provider contextCSN */
/* 20050126161620Z#000009#00#000000 */
attrs [ 0 ] = talloc_strdup ( mem_ctx , " contextCSN " ) ;
attrs [ 1 ] = NULL ;
2007-11-15 03:05:42 +03:00
suffix = talloc_asprintf ( mem_ctx ,
2012-07-18 09:37:23 +04:00
" cn=ldapsync,%s " , lp_ldap_suffix ( talloc_tos ( ) ) ) ;
2005-09-30 21:13:37 +04:00
2007-11-15 03:05:42 +03:00
if ( ! suffix ) {
ntstatus = NT_STATUS_NO_MEMORY ;
goto done ;
}
2005-09-30 21:13:37 +04:00
}
rc = smbldap_search ( ldap_state - > smbldap_state , suffix ,
LDAP_SCOPE_BASE , " (objectclass=*) " , attrs , 0 , & msg ) ;
if ( rc ! = LDAP_SUCCESS ) {
goto done ;
}
num_result = ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , msg ) ;
if ( num_result ! = 1 ) {
DEBUG ( 3 , ( " ldapsam_get_seq_num: Expected one entry, got %d \n " , num_result ) ) ;
goto done ;
}
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , msg ) ;
if ( entry = = NULL ) {
DEBUG ( 3 , ( " ldapsam_get_seq_num: Could not retrieve entry \n " ) ) ;
goto done ;
}
values = ldap_get_values ( ldap_state - > smbldap_state - > ldap_struct , entry , attrs [ 0 ] ) ;
if ( values = = NULL ) {
DEBUG ( 3 , ( " ldapsam_get_seq_num: no values \n " ) ) ;
goto done ;
}
num_values = ldap_count_values ( values ) ;
if ( num_values = = 0 ) {
DEBUG ( 3 , ( " ldapsam_get_seq_num: not a single value \n " ) ) ;
goto done ;
}
p = values [ 0 ] ;
2007-12-08 04:32:32 +03:00
if ( ! next_token_talloc ( mem_ctx , & p , & tok , " # " ) ) {
2005-09-30 21:13:37 +04:00
DEBUG ( 0 , ( " ldapsam_get_seq_num: failed to parse sequence number \n " ) ) ;
goto done ;
}
p = tok ;
if ( ! strncmp ( p , " csn= " , strlen ( " csn= " ) ) )
p + = strlen ( " csn= " ) ;
DEBUG ( 10 , ( " ldapsam_get_seq_num: got %s: %s \n " , attrs [ 0 ] , p ) ) ;
* seq_num = generalized_to_unix_time ( p ) ;
/* very basic sanity check */
if ( * seq_num < = 0 ) {
DEBUG ( 3 , ( " ldapsam_get_seq_num: invalid sequence number: %d \n " ,
( int ) * seq_num ) ) ;
goto done ;
}
ntstatus = NT_STATUS_OK ;
done :
if ( values ! = NULL )
ldap_value_free ( values ) ;
if ( msg ! = NULL )
ldap_msgfree ( msg ) ;
if ( mem_ctx )
talloc_destroy ( mem_ctx ) ;
return ntstatus ;
}
2001-09-26 00:21:21 +04:00
/*******************************************************************
2003-09-11 02:33:06 +04:00
Run the search by name .
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2007-11-15 03:05:42 +03:00
int ldapsam_search_suffix_by_name ( struct ldapsam_privates * ldap_state ,
2003-06-21 04:45:03 +04:00
const char * user ,
2005-02-17 17:27:34 +03:00
LDAPMessage * * result ,
const char * * attr )
2001-09-26 00:21:21 +04:00
{
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
2009-07-10 00:03:52 +04:00
char * escape_user = escape_ldap_string ( talloc_tos ( ) , user ) ;
2007-11-15 03:05:42 +03:00
int ret = - 1 ;
2003-02-01 10:59:29 +03:00
if ( ! escape_user ) {
return LDAP_NO_MEMORY ;
}
2001-09-26 00:21:21 +04:00
/*
2001-12-31 03:06:51 +03:00
* in the filter expression , replace % u with the real name
* so in ldap filter , % u MUST exist : - )
2001-09-26 00:21:21 +04:00
*/
2007-11-15 03:05:42 +03:00
filter = talloc_asprintf ( talloc_tos ( ) , " (&%s%s) " , " (uid=%u) " ,
2003-05-14 07:32:20 +04:00
get_objclass_filter ( ldap_state - > schema_ver ) ) ;
2007-11-15 03:05:42 +03:00
if ( ! filter ) {
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_user ) ;
2007-11-15 03:05:42 +03:00
return LDAP_NO_MEMORY ;
}
/*
2001-12-31 03:06:51 +03:00
* have to use this here because $ is filtered out
2007-11-15 03:05:42 +03:00
* in string_sub
2001-09-26 00:21:21 +04:00
*/
2003-02-01 10:59:29 +03:00
2007-11-15 03:05:42 +03:00
filter = talloc_all_string_sub ( talloc_tos ( ) ,
filter , " %u " , escape_user ) ;
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_user ) ;
2007-11-15 03:05:42 +03:00
if ( ! filter ) {
return LDAP_NO_MEMORY ;
}
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
ret = smbldap_search_suffix ( ldap_state - > smbldap_state ,
filter , attr , result ) ;
TALLOC_FREE ( filter ) ;
return ret ;
2001-09-26 00:21:21 +04:00
}
2003-04-28 14:20:55 +04:00
/*******************************************************************
2003-09-11 02:33:06 +04:00
Run the search by SID .
2003-04-28 14:20:55 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2007-11-15 03:05:42 +03:00
static int ldapsam_search_suffix_by_sid ( struct ldapsam_privates * ldap_state ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid , LDAPMessage * * result ,
2007-11-15 03:05:42 +03:00
const char * * attr )
2003-04-28 14:20:55 +04:00
{
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
2003-04-28 14:20:55 +04:00
int rc ;
fstring sid_string ;
2007-11-15 03:05:42 +03:00
filter = talloc_asprintf ( talloc_tos ( ) , " (&(%s=%s)%s) " ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_USER_SID ) ,
2007-12-16 00:47:30 +03:00
sid_to_fstring ( sid_string , sid ) ,
2003-05-14 07:32:20 +04:00
get_objclass_filter ( ldap_state - > schema_ver ) ) ;
2007-11-15 03:05:42 +03:00
if ( ! filter ) {
return LDAP_NO_MEMORY ;
}
rc = smbldap_search_suffix ( ldap_state - > smbldap_state ,
filter , attr , result ) ;
TALLOC_FREE ( filter ) ;
2001-09-26 00:21:21 +04:00
return rc ;
}
2003-03-19 21:21:44 +03:00
/*******************************************************************
Delete complete object or objectclass and attrs from
2003-03-23 12:18:33 +03:00
object found in search_result depending on lp_ldap_delete_dn
2003-03-19 21:21:44 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2006-02-04 01:19:41 +03:00
static int ldapsam_delete_entry ( struct ldapsam_privates * priv ,
TALLOC_CTX * mem_ctx ,
LDAPMessage * entry ,
const char * objectclass ,
const char * * attrs )
2003-03-19 21:21:44 +03:00
{
LDAPMod * * mods = NULL ;
2006-02-04 01:19:41 +03:00
char * name ;
const char * dn ;
2003-03-19 21:21:44 +03:00
BerElement * ptr = NULL ;
2006-02-04 01:19:41 +03:00
dn = smbldap_talloc_dn ( mem_ctx , priv2ld ( priv ) , entry ) ;
if ( dn = = NULL ) {
return LDAP_NO_MEMORY ;
2003-09-11 02:33:06 +04:00
}
2003-03-19 21:21:44 +03:00
2003-03-23 12:18:33 +03:00
if ( lp_ldap_delete_dn ( ) ) {
2006-02-04 01:19:41 +03:00
return smbldap_delete ( priv - > smbldap_state , dn ) ;
2003-03-19 21:21:44 +03:00
}
/* Ok, delete only the SAM attributes */
2009-05-31 13:14:06 +04:00
2006-02-04 01:19:41 +03:00
for ( name = ldap_first_attribute ( priv2ld ( priv ) , entry , & ptr ) ;
2003-03-19 21:21:44 +03:00
name ! = NULL ;
2006-02-04 01:19:41 +03:00
name = ldap_next_attribute ( priv2ld ( priv ) , entry , ptr ) ) {
2005-02-17 17:27:34 +03:00
const char * * attrib ;
2003-03-19 21:21:44 +03:00
/* We are only allowed to delete the attributes that
really exist . */
2003-09-11 02:33:06 +04:00
for ( attrib = attrs ; * attrib ! = NULL ; attrib + + ) {
2004-09-20 15:02:14 +04:00
if ( strequal ( * attrib , name ) ) {
DEBUG ( 10 , ( " ldapsam_delete_entry: deleting "
" attribute %s \n " , name ) ) ;
smbldap_set_mod ( & mods , LDAP_MOD_DELETE , name ,
NULL ) ;
2003-03-19 21:21:44 +03:00
}
}
ldap_memfree ( name ) ;
}
2006-02-04 01:19:41 +03:00
2003-03-19 21:21:44 +03:00
if ( ptr ! = NULL ) {
ber_free ( ptr , 0 ) ;
}
2007-11-15 03:05:42 +03:00
2003-06-21 04:45:03 +04:00
smbldap_set_mod ( & mods , LDAP_MOD_DELETE , " objectClass " , objectclass ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( mem_ctx , mods ) ;
2007-11-15 03:05:42 +03:00
2006-02-04 01:19:41 +03:00
return smbldap_modify ( priv - > smbldap_state , dn , mods ) ;
2003-04-28 14:20:55 +04:00
}
2007-11-15 03:05:42 +03:00
2006-02-21 22:22:49 +03:00
static time_t ldapsam_get_entry_timestamp ( struct ldapsam_privates * ldap_state , LDAPMessage * entry )
2004-03-18 22:22:51 +03:00
{
2007-11-15 03:05:42 +03:00
char * temp ;
2004-03-18 22:22:51 +03:00
struct tm tm ;
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute ( ldap_state - > smbldap_state - > ldap_struct , entry ,
2004-07-08 02:46:51 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_MOD_TIMESTAMP ) ,
2007-11-15 03:05:42 +03:00
talloc_tos ( ) ) ;
if ( ! temp ) {
2004-03-18 22:22:51 +03:00
return ( time_t ) 0 ;
2007-11-15 03:05:42 +03:00
}
2004-03-18 22:22:51 +03:00
2007-05-29 17:20:40 +04:00
if ( ! strptime ( temp , " %Y%m%d%H%M%SZ " , & tm ) ) {
DEBUG ( 2 , ( " ldapsam_get_entry_timestamp: strptime failed on: %s \n " ,
( char * ) temp ) ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( temp ) ;
2007-05-29 17:20:40 +04:00
return ( time_t ) 0 ;
}
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( temp ) ;
2004-03-18 22:22:51 +03:00
tzset ( ) ;
2004-03-25 21:25:41 +03:00
return timegm ( & tm ) ;
2004-03-18 22:22:51 +03:00
}
2001-09-26 00:21:21 +04:00
/**********************************************************************
2006-02-20 23:09:36 +03:00
Initialize struct samu from an LDAP query .
2003-09-11 02:33:06 +04:00
( Based on init_sam_from_buffer in pdb_tdb . c )
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2007-11-15 03:05:42 +03:00
static bool init_sam_from_ldap ( struct ldapsam_privates * ldap_state ,
2006-02-20 23:09:36 +03:00
struct samu * sampass ,
2002-11-02 06:47:48 +03:00
LDAPMessage * entry )
2001-09-26 00:21:21 +04:00
{
time_t logon_time ,
logoff_time ,
kickoff_time ,
2007-11-15 03:05:42 +03:00
pass_last_set_time ,
pass_can_change_time ,
2004-03-18 22:22:51 +03:00
ldap_entry_time ,
bad_password_time ;
2007-11-15 03:05:42 +03:00
char * username = NULL ,
* domain = NULL ,
* nt_username = NULL ,
* fullname = NULL ,
* homedir = NULL ,
* dir_drive = NULL ,
* logon_script = NULL ,
* profile_path = NULL ,
* acct_desc = NULL ,
* workstations = NULL ,
* munged_dial = NULL ;
2010-05-21 04:38:04 +04:00
uint32_t user_rid ;
2002-11-02 06:47:48 +03:00
uint8 smblmpwd [ LM_HASH_LEN ] ,
smbntpwd [ NT_HASH_LEN ] ;
2007-10-19 04:40:25 +04:00
bool use_samba_attrs = True ;
2010-05-21 04:38:04 +04:00
uint32_t acct_ctrl = 0 ;
uint16_t logon_divs ;
uint16_t bad_password_count = 0 ,
2003-09-19 03:53:48 +04:00
logon_count = 0 ;
2010-05-21 04:38:04 +04:00
uint32_t hours_len ;
2001-12-31 03:06:51 +03:00
uint8 hours [ MAX_HOURS_LEN ] ;
2007-11-15 03:05:42 +03:00
char * temp = NULL ;
2010-03-17 00:18:52 +03:00
struct login_cache cache_entry ;
2010-05-21 04:38:04 +04:00
uint32_t pwHistLen ;
2007-10-19 04:40:25 +04:00
bool expand_explicit = lp_passdb_expand_explicit ( ) ;
2007-11-15 03:05:42 +03:00
bool ret = false ;
TALLOC_CTX * ctx = talloc_init ( " init_sam_from_ldap " ) ;
2001-12-31 03:06:51 +03:00
2007-11-15 03:05:42 +03:00
if ( ! ctx ) {
return false ;
}
2002-11-02 06:47:48 +03:00
if ( sampass = = NULL | | ldap_state = = NULL | | entry = = NULL ) {
2001-12-30 22:21:25 +03:00
DEBUG ( 0 , ( " init_sam_from_ldap: NULL parameters found! \n " ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2001-12-30 22:21:25 +03:00
}
2006-02-04 01:19:41 +03:00
if ( priv2ld ( ldap_state ) = = NULL ) {
DEBUG ( 0 , ( " init_sam_from_ldap: ldap_state->smbldap_state-> "
" ldap_struct is NULL! \n " ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2002-11-02 06:47:48 +03:00
}
2007-11-15 03:05:42 +03:00
2010-01-05 15:30:42 +03:00
if ( ! ( username = smbldap_talloc_first_attribute ( priv2ld ( ldap_state ) ,
2007-11-15 03:05:42 +03:00
entry ,
" uid " ,
ctx ) ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 1 , ( " init_sam_from_ldap: No uid attribute found for "
" this user! \n " ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2003-04-28 14:20:55 +04:00
}
2003-09-11 02:33:06 +04:00
DEBUG ( 2 , ( " init_sam_from_ldap: Entry found for user: %s \n " , username ) ) ;
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
nt_username = talloc_strdup ( ctx , username ) ;
if ( ! nt_username ) {
goto fn_exit ;
}
domain = talloc_strdup ( ctx , ldap_state - > domain_name ) ;
if ( ! domain ) {
goto fn_exit ;
}
2001-09-26 00:21:21 +04:00
2002-11-02 06:47:48 +03:00
pdb_set_username ( sampass , username , PDB_SET ) ;
pdb_set_domain ( sampass , domain , PDB_DEFAULT ) ;
pdb_set_nt_username ( sampass , nt_username , PDB_SET ) ;
2003-05-22 21:07:41 +04:00
2003-05-14 07:32:20 +04:00
/* deal with different attributes between the schema first */
2007-11-15 03:05:42 +03:00
2003-09-11 02:33:06 +04:00
if ( ldap_state - > schema_ver = = SCHEMAVER_SAMBASAMACCOUNT ) {
2007-11-15 03:05:42 +03:00
if ( ( temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_USER_SID ) ,
ctx ) ) ! = NULL ) {
2003-04-28 14:20:55 +04:00
pdb_set_user_sid_from_string ( sampass , temp , PDB_SET ) ;
}
2003-09-11 02:33:06 +04:00
} else {
2007-11-15 03:05:42 +03:00
if ( ( temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_USER_RID ) ,
ctx ) ) ! = NULL ) {
2010-05-21 04:38:04 +04:00
user_rid = ( uint32_t ) atol ( temp ) ;
2003-04-28 14:20:55 +04:00
pdb_set_user_sid_from_rid ( sampass , user_rid , PDB_SET ) ;
}
}
2001-09-26 00:21:21 +04:00
2010-02-05 17:40:12 +03:00
if ( IS_SAM_DEFAULT ( sampass , PDB_USERSID ) ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 1 , ( " init_sam_from_ldap: no %s or %s attribute found for this user %s \n " ,
2007-11-15 03:05:42 +03:00
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_USER_SID ) ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_USER_RID ) ,
2003-05-14 07:32:20 +04:00
username ) ) ;
2003-04-28 14:20:55 +04:00
return False ;
}
2002-07-15 14:35:28 +04:00
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_PWD_LAST_SET ) ,
ctx ) ;
if ( temp ) {
2002-04-08 05:52:44 +04:00
pass_last_set_time = ( time_t ) atol ( temp ) ;
2007-11-15 03:05:42 +03:00
pdb_set_pass_last_set_time ( sampass ,
pass_last_set_time , PDB_SET ) ;
2002-04-08 05:52:44 +04:00
}
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_LOGON_TIME ) ,
ctx ) ;
if ( temp ) {
2002-03-02 13:16:28 +03:00
logon_time = ( time_t ) atol ( temp ) ;
2002-11-02 06:47:48 +03:00
pdb_set_logon_time ( sampass , logon_time , PDB_SET ) ;
2002-03-02 13:16:28 +03:00
}
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_LOGOFF_TIME ) ,
ctx ) ;
if ( temp ) {
2002-03-02 13:16:28 +03:00
logoff_time = ( time_t ) atol ( temp ) ;
2002-11-02 06:47:48 +03:00
pdb_set_logoff_time ( sampass , logoff_time , PDB_SET ) ;
2002-03-02 13:16:28 +03:00
}
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_KICKOFF_TIME ) ,
ctx ) ;
if ( temp ) {
2002-03-02 13:16:28 +03:00
kickoff_time = ( time_t ) atol ( temp ) ;
2002-11-02 06:47:48 +03:00
pdb_set_kickoff_time ( sampass , kickoff_time , PDB_SET ) ;
2002-03-02 13:16:28 +03:00
}
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_PWD_CAN_CHANGE ) ,
ctx ) ;
if ( temp ) {
2002-03-02 13:16:28 +03:00
pass_can_change_time = ( time_t ) atol ( temp ) ;
2007-11-15 03:05:42 +03:00
pdb_set_pass_can_change_time ( sampass ,
pass_can_change_time , PDB_SET ) ;
2002-03-02 13:16:28 +03:00
}
2001-09-26 00:21:21 +04:00
/* recommend that 'gecos' and 'displayName' should refer to the same
2002-03-02 13:16:28 +03:00
* attribute OID . userFullName depreciated , only used by Samba
* primary rules of LDAP : don ' t make a new attribute when one is already defined
2001-12-31 03:06:51 +03:00
* that fits your needs ; using cn then displayName rather than ' userFullName '
2001-09-26 00:21:21 +04:00
*/
2007-11-15 03:05:42 +03:00
fullname = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_DISPLAY_NAME ) ,
ctx ) ;
if ( fullname ) {
pdb_set_fullname ( sampass , fullname , PDB_SET ) ;
} else {
fullname = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_CN ) ,
ctx ) ;
if ( fullname ) {
2002-11-02 06:47:48 +03:00
pdb_set_fullname ( sampass , fullname , PDB_SET ) ;
2002-04-08 05:52:44 +04:00
}
2001-09-26 00:21:21 +04:00
}
2007-11-15 03:05:42 +03:00
dir_drive = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_HOME_DRIVE ) ,
ctx ) ;
if ( dir_drive ) {
2002-11-02 06:47:48 +03:00
pdb_set_dir_drive ( sampass , dir_drive , PDB_SET ) ;
2007-11-15 03:05:42 +03:00
} else {
pdb_set_dir_drive ( sampass , lp_logon_drive ( ) , PDB_DEFAULT ) ;
2002-04-08 05:52:44 +04:00
}
2001-10-10 21:04:23 +04:00
2007-11-15 03:05:42 +03:00
homedir = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_HOME_PATH ) ,
ctx ) ;
if ( homedir ) {
2005-12-01 17:46:56 +03:00
if ( expand_explicit ) {
2007-11-15 03:05:42 +03:00
homedir = talloc_sub_basic ( ctx ,
username ,
domain ,
homedir ) ;
if ( ! homedir ) {
goto fn_exit ;
}
2005-12-01 17:46:56 +03:00
}
2007-11-15 03:05:42 +03:00
pdb_set_homedir ( sampass , homedir , PDB_SET ) ;
} else {
pdb_set_homedir ( sampass ,
talloc_sub_basic ( ctx , username , domain ,
lp_logon_home ( ) ) ,
PDB_DEFAULT ) ;
2002-04-08 05:52:44 +04:00
}
2001-10-10 21:04:23 +04:00
2007-11-15 03:05:42 +03:00
logon_script = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_LOGON_SCRIPT ) ,
ctx ) ;
if ( logon_script ) {
2005-12-01 17:46:56 +03:00
if ( expand_explicit ) {
2007-11-15 03:05:42 +03:00
logon_script = talloc_sub_basic ( ctx ,
username ,
domain ,
logon_script ) ;
if ( ! logon_script ) {
goto fn_exit ;
}
2005-12-01 17:46:56 +03:00
}
2007-11-15 03:05:42 +03:00
pdb_set_logon_script ( sampass , logon_script , PDB_SET ) ;
} else {
pdb_set_logon_script ( sampass ,
talloc_sub_basic ( ctx , username , domain ,
lp_logon_script ( ) ) ,
PDB_DEFAULT ) ;
2002-04-08 05:52:44 +04:00
}
2001-10-10 21:04:23 +04:00
2007-11-15 03:05:42 +03:00
profile_path = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_PROFILE_PATH ) ,
ctx ) ;
if ( profile_path ) {
2005-12-01 17:46:56 +03:00
if ( expand_explicit ) {
2007-11-15 03:05:42 +03:00
profile_path = talloc_sub_basic ( ctx ,
username ,
domain ,
profile_path ) ;
if ( ! profile_path ) {
goto fn_exit ;
}
2005-12-01 17:46:56 +03:00
}
2007-11-15 03:05:42 +03:00
pdb_set_profile_path ( sampass , profile_path , PDB_SET ) ;
} else {
pdb_set_profile_path ( sampass ,
talloc_sub_basic ( ctx , username , domain ,
lp_logon_path ( ) ) ,
PDB_DEFAULT ) ;
2002-04-08 05:52:44 +04:00
}
2007-11-15 03:05:42 +03:00
acct_desc = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_DESC ) ,
ctx ) ;
if ( acct_desc ) {
2002-11-02 06:47:48 +03:00
pdb_set_acct_desc ( sampass , acct_desc , PDB_SET ) ;
2002-04-08 05:52:44 +04:00
}
2007-11-15 03:05:42 +03:00
workstations = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_USER_WKS ) ,
ctx ) ;
if ( workstations ) {
2002-11-02 06:47:48 +03:00
pdb_set_workstations ( sampass , workstations , PDB_SET ) ;
2002-04-08 05:52:44 +04:00
}
2007-11-15 03:05:42 +03:00
munged_dial = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_MUNGED_DIAL ) ,
ctx ) ;
if ( munged_dial ) {
2003-12-04 07:52:00 +03:00
pdb_set_munged_dial ( sampass , munged_dial , PDB_SET ) ;
}
2007-11-15 03:05:42 +03:00
2001-09-26 00:21:21 +04:00
/* FIXME: hours stuff should be cleaner */
2007-11-15 03:05:42 +03:00
2001-09-26 00:21:21 +04:00
logon_divs = 168 ;
hours_len = 21 ;
memset ( hours , 0xff , hours_len ) ;
2005-03-05 04:22:53 +03:00
if ( ldap_state - > is_nds_ldap ) {
char * user_dn ;
2005-09-30 21:13:37 +04:00
size_t pwd_len ;
2005-03-22 20:08:09 +03:00
char clear_text_pw [ 512 ] ;
2007-11-15 03:05:42 +03:00
2005-03-05 04:22:53 +03:00
/* Make call to Novell eDirectory ldap extension to get clear text password.
NOTE : This will only work if we have an SSL connection to eDirectory . */
2009-03-18 07:29:02 +03:00
user_dn = smbldap_talloc_dn ( ctx , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
2005-03-05 04:22:53 +03:00
if ( user_dn ! = NULL ) {
2009-03-18 07:29:02 +03:00
DEBUG ( 3 , ( " init_sam_from_ldap: smbldap_talloc_dn(ctx, %s) returned '%s' \n " , username , user_dn ) ) ;
2005-03-05 04:22:53 +03:00
pwd_len = sizeof ( clear_text_pw ) ;
if ( pdb_nds_get_password ( ldap_state - > smbldap_state , user_dn , & pwd_len , clear_text_pw ) = = LDAP_SUCCESS ) {
nt_lm_owf_gen ( clear_text_pw , smbntpwd , smblmpwd ) ;
2006-06-09 16:55:07 +04:00
if ( ! pdb_set_lanman_passwd ( sampass , smblmpwd , PDB_SET ) ) {
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( user_dn ) ;
2005-03-05 04:22:53 +03:00
return False ;
2006-06-09 16:55:07 +04:00
}
2005-03-05 04:22:53 +03:00
ZERO_STRUCT ( smblmpwd ) ;
2006-06-09 16:55:07 +04:00
if ( ! pdb_set_nt_passwd ( sampass , smbntpwd , PDB_SET ) ) {
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( user_dn ) ;
2005-03-05 04:22:53 +03:00
return False ;
2006-06-09 16:55:07 +04:00
}
2005-03-05 04:22:53 +03:00
ZERO_STRUCT ( smbntpwd ) ;
use_samba_attrs = False ;
}
2006-06-09 16:55:07 +04:00
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( user_dn ) ;
2006-06-09 16:55:07 +04:00
2005-03-05 04:22:53 +03:00
} else {
DEBUG ( 0 , ( " init_sam_from_ldap: failed to get user_dn for '%s' \n " , username ) ) ;
}
2005-09-30 21:13:37 +04:00
}
2001-09-26 00:21:21 +04:00
2005-03-05 04:22:53 +03:00
if ( use_samba_attrs ) {
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_LMPW ) ,
ctx ) ;
if ( temp ) {
2005-03-05 04:22:53 +03:00
pdb_gethexpwd ( temp , smblmpwd ) ;
memset ( ( char * ) temp , ' \0 ' , strlen ( temp ) + 1 ) ;
2007-11-15 03:05:42 +03:00
if ( ! pdb_set_lanman_passwd ( sampass , smblmpwd , PDB_SET ) ) {
goto fn_exit ;
}
2005-03-05 04:22:53 +03:00
ZERO_STRUCT ( smblmpwd ) ;
}
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_NTPW ) ,
ctx ) ;
if ( temp ) {
2005-03-05 04:22:53 +03:00
pdb_gethexpwd ( temp , smbntpwd ) ;
memset ( ( char * ) temp , ' \0 ' , strlen ( temp ) + 1 ) ;
2007-11-15 03:05:42 +03:00
if ( ! pdb_set_nt_passwd ( sampass , smbntpwd , PDB_SET ) ) {
goto fn_exit ;
}
2005-03-05 04:22:53 +03:00
ZERO_STRUCT ( smbntpwd ) ;
}
2005-09-30 21:13:37 +04:00
}
pwHistLen = 0 ;
2002-04-08 05:52:44 +04:00
2009-07-14 01:53:49 +04:00
pdb_get_account_policy ( PDB_POLICY_PASSWORD_HISTORY , & pwHistLen ) ;
2004-07-08 02:46:51 +04:00
if ( pwHistLen > 0 ) {
uint8 * pwhist = NULL ;
int i ;
2011-06-07 05:30:12 +04:00
char * history_string = talloc_array ( ctx , char ,
2007-11-15 03:05:42 +03:00
MAX_PW_HISTORY_LEN * 64 ) ;
if ( ! history_string ) {
goto fn_exit ;
}
2004-07-08 02:46:51 +04:00
2006-05-17 02:03:05 +04:00
pwHistLen = MIN ( pwHistLen , MAX_PW_HISTORY_LEN ) ;
2004-10-04 19:53:33 +04:00
2011-06-07 05:30:12 +04:00
pwhist = talloc_array ( ctx , uint8 ,
2010-01-05 20:22:25 +03:00
pwHistLen * PW_HISTORY_ENTRY_LEN ) ;
if ( pwhist = = NULL ) {
2007-11-15 03:05:42 +03:00
DEBUG ( 0 , ( " init_sam_from_ldap: talloc failed! \n " ) ) ;
goto fn_exit ;
2004-07-08 02:46:51 +04:00
}
2004-08-11 22:39:29 +04:00
memset ( pwhist , ' \0 ' , pwHistLen * PW_HISTORY_ENTRY_LEN ) ;
2004-07-08 02:46:51 +04:00
2007-11-15 03:05:42 +03:00
if ( smbldap_get_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_PWD_HISTORY ) ,
history_string ,
MAX_PW_HISTORY_LEN * 64 ) ) {
bool hex_failed = false ;
2004-07-08 02:46:51 +04:00
for ( i = 0 ; i < pwHistLen ; i + + ) {
2004-08-11 22:39:29 +04:00
/* Get the 16 byte salt. */
2007-11-15 03:05:42 +03:00
if ( ! pdb_gethexpwd ( & history_string [ i * 64 ] ,
& pwhist [ i * PW_HISTORY_ENTRY_LEN ] ) ) {
hex_failed = true ;
2004-07-08 02:46:51 +04:00
break ;
}
2004-08-11 22:39:29 +04:00
/* Get the 16 byte MD5 hash of salt+passwd. */
2006-05-17 02:03:05 +04:00
if ( ! pdb_gethexpwd ( & history_string [ ( i * 64 ) + 32 ] ,
2007-11-15 03:05:42 +03:00
& pwhist [ ( i * PW_HISTORY_ENTRY_LEN ) +
PW_HISTORY_SALT_LEN ] ) ) {
2004-08-11 22:39:29 +04:00
hex_failed = True ;
break ;
}
}
if ( hex_failed ) {
2008-07-24 11:45:02 +04:00
DEBUG ( 2 , ( " init_sam_from_ldap: Failed to get password history for user %s \n " ,
2004-08-11 22:39:29 +04:00
username ) ) ;
memset ( pwhist , ' \0 ' , pwHistLen * PW_HISTORY_ENTRY_LEN ) ;
2004-07-08 02:46:51 +04:00
}
}
if ( ! pdb_set_pw_history ( sampass , pwhist , pwHistLen , PDB_SET ) ) {
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2004-07-08 02:46:51 +04:00
}
}
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_ACB_INFO ) ,
ctx ) ;
if ( temp ) {
2002-04-08 05:52:44 +04:00
acct_ctrl = pdb_decode_acct_ctrl ( temp ) ;
2007-11-15 03:05:42 +03:00
if ( acct_ctrl = = 0 ) {
2002-04-08 05:52:44 +04:00
acct_ctrl | = ACB_NORMAL ;
2007-11-15 03:05:42 +03:00
}
2002-04-08 05:52:44 +04:00
2002-11-02 06:47:48 +03:00
pdb_set_acct_ctrl ( sampass , acct_ctrl , PDB_SET ) ;
2007-11-15 03:05:42 +03:00
} else {
acct_ctrl | = ACB_NORMAL ;
2002-04-08 05:52:44 +04:00
}
2001-09-26 00:21:21 +04:00
2002-11-02 06:47:48 +03:00
pdb_set_hours_len ( sampass , hours_len , PDB_SET ) ;
pdb_set_logon_divs ( sampass , logon_divs , PDB_SET ) ;
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_BAD_PASSWORD_COUNT ) ,
ctx ) ;
if ( temp ) {
2010-05-21 04:38:04 +04:00
bad_password_count = ( uint32_t ) atol ( temp ) ;
2007-11-15 03:05:42 +03:00
pdb_set_bad_password_count ( sampass ,
bad_password_count , PDB_SET ) ;
2003-09-19 03:53:48 +04:00
}
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_BAD_PASSWORD_TIME ) ,
ctx ) ;
if ( temp ) {
2004-03-18 22:22:51 +03:00
bad_password_time = ( time_t ) atol ( temp ) ;
pdb_set_bad_password_time ( sampass , bad_password_time , PDB_SET ) ;
}
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_LOGON_COUNT ) ,
ctx ) ;
if ( temp ) {
2010-05-21 04:38:04 +04:00
logon_count = ( uint32_t ) atol ( temp ) ;
2003-09-19 03:53:48 +04:00
pdb_set_logon_count ( sampass , logon_count , PDB_SET ) ;
}
2002-11-02 06:47:48 +03:00
/* pdb_set_unknown_6(sampass, unknown6, PDB_SET); */
2001-09-26 00:21:21 +04:00
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_LOGON_HOURS ) ,
ctx ) ;
if ( temp ) {
2004-08-13 22:02:58 +04:00
pdb_gethexhours ( temp , hours ) ;
memset ( ( char * ) temp , ' \0 ' , strlen ( temp ) + 1 ) ;
2011-02-16 18:47:23 +03:00
pdb_set_hours ( sampass , hours , hours_len , PDB_SET ) ;
2004-08-13 22:02:58 +04:00
ZERO_STRUCT ( hours ) ;
}
2001-09-26 00:21:21 +04:00
2006-02-04 01:19:41 +03:00
if ( lp_parm_bool ( - 1 , " ldapsam " , " trusted " , False ) ) {
2010-02-04 19:19:57 +03:00
struct passwd unix_pw ;
bool have_uid = false ;
bool have_gid = false ;
2010-05-21 05:25:01 +04:00
struct dom_sid mapped_gsid ;
const struct dom_sid * primary_gsid ;
2012-03-23 14:11:33 +04:00
struct unixid id ;
2010-02-04 19:19:57 +03:00
ZERO_STRUCT ( unix_pw ) ;
unix_pw . pw_name = username ;
unix_pw . pw_passwd = discard_const_p ( char , " x " ) ;
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
priv2ld ( ldap_state ) ,
entry ,
" uidNumber " ,
ctx ) ;
if ( temp ) {
2006-02-04 01:19:41 +03:00
/* We've got a uid, feed the cache */
2010-02-04 19:19:57 +03:00
unix_pw . pw_uid = strtoul ( temp , NULL , 10 ) ;
have_uid = true ;
}
temp = smbldap_talloc_single_attribute (
priv2ld ( ldap_state ) ,
entry ,
" gidNumber " ,
ctx ) ;
if ( temp ) {
/* We've got a uid, feed the cache */
unix_pw . pw_gid = strtoul ( temp , NULL , 10 ) ;
have_gid = true ;
}
unix_pw . pw_gecos = smbldap_talloc_single_attribute (
priv2ld ( ldap_state ) ,
entry ,
" gecos " ,
ctx ) ;
if ( unix_pw . pw_gecos ) {
unix_pw . pw_gecos = fullname ;
}
unix_pw . pw_dir = smbldap_talloc_single_attribute (
priv2ld ( ldap_state ) ,
entry ,
" homeDirectory " ,
ctx ) ;
if ( unix_pw . pw_dir ) {
unix_pw . pw_dir = discard_const_p ( char , " " ) ;
}
unix_pw . pw_shell = smbldap_talloc_single_attribute (
priv2ld ( ldap_state ) ,
entry ,
" loginShell " ,
ctx ) ;
if ( unix_pw . pw_shell ) {
unix_pw . pw_shell = discard_const_p ( char , " " ) ;
}
if ( have_uid & & have_gid ) {
sampass - > unix_pw = tcopy_passwd ( sampass , & unix_pw ) ;
} else {
sampass - > unix_pw = Get_Pwnam_alloc ( sampass , unix_pw . pw_name ) ;
}
if ( sampass - > unix_pw = = NULL ) {
DEBUG ( 0 , ( " init_sam_from_ldap: Failed to find Unix account for %s \n " ,
pdb_get_username ( sampass ) ) ) ;
goto fn_exit ;
}
2012-03-23 14:11:33 +04:00
id . id = sampass - > unix_pw - > pw_uid ;
id . type = ID_TYPE_UID ;
idmap_cache_set_sid2unixid ( pdb_get_user_sid ( sampass ) , & id ) ;
2010-02-04 19:19:57 +03:00
gid_to_sid ( & mapped_gsid , sampass - > unix_pw - > pw_gid ) ;
primary_gsid = pdb_get_group_sid ( sampass ) ;
2010-08-26 17:48:50 +04:00
if ( primary_gsid & & dom_sid_equal ( primary_gsid , & mapped_gsid ) ) {
2012-03-23 14:11:33 +04:00
id . id = sampass - > unix_pw - > pw_gid ;
id . type = ID_TYPE_GID ;
idmap_cache_set_sid2unixid ( primary_gsid , & id ) ;
2006-02-04 01:19:41 +03:00
}
}
2004-03-18 22:22:51 +03:00
/* check the timestamp of the cache vs ldap entry */
2007-11-15 03:05:42 +03:00
if ( ! ( ldap_entry_time = ldapsam_get_entry_timestamp ( ldap_state ,
entry ) ) ) {
ret = true ;
goto fn_exit ;
}
2004-03-18 22:22:51 +03:00
/* see if we have newer updates */
2010-03-17 00:18:52 +03:00
if ( ! login_cache_read ( sampass , & cache_entry ) ) {
2004-03-19 04:29:14 +03:00
DEBUG ( 9 , ( " No cache entry, bad count = %u, bad time = %u \n " ,
( unsigned int ) pdb_get_bad_password_count ( sampass ) ,
( unsigned int ) pdb_get_bad_password_time ( sampass ) ) ) ;
2007-11-15 03:05:42 +03:00
ret = true ;
goto fn_exit ;
2004-03-18 22:22:51 +03:00
}
2007-11-15 03:05:42 +03:00
DEBUG ( 7 , ( " ldap time is %u, cache time is %u, bad time = %u \n " ,
( unsigned int ) ldap_entry_time ,
2010-03-17 00:18:52 +03:00
( unsigned int ) cache_entry . entry_timestamp ,
( unsigned int ) cache_entry . bad_password_time ) ) ;
2004-03-18 22:22:51 +03:00
2010-03-17 00:18:52 +03:00
if ( ldap_entry_time > cache_entry . entry_timestamp ) {
2004-03-18 22:22:51 +03:00
/* cache is older than directory , so
2007-11-15 03:05:42 +03:00
we need to delete the entry but allow the
2004-03-18 22:22:51 +03:00
fields to be written out */
login_cache_delentry ( sampass ) ;
} else {
/* read cache in */
2007-11-15 03:05:42 +03:00
pdb_set_acct_ctrl ( sampass ,
pdb_get_acct_ctrl ( sampass ) |
2010-03-17 00:18:52 +03:00
( cache_entry . acct_ctrl & ACB_AUTOLOCK ) ,
2004-03-18 22:22:51 +03:00
PDB_SET ) ;
2007-11-15 03:05:42 +03:00
pdb_set_bad_password_count ( sampass ,
2010-03-17 00:18:52 +03:00
cache_entry . bad_password_count ,
2004-03-18 22:22:51 +03:00
PDB_SET ) ;
2007-11-15 03:05:42 +03:00
pdb_set_bad_password_time ( sampass ,
2010-03-17 00:18:52 +03:00
cache_entry . bad_password_time ,
2004-03-18 22:22:51 +03:00
PDB_SET ) ;
}
2007-11-15 03:05:42 +03:00
ret = true ;
fn_exit :
TALLOC_FREE ( ctx ) ;
return ret ;
2001-09-26 00:21:21 +04:00
}
/**********************************************************************
2006-02-20 23:09:36 +03:00
Initialize the ldap db from a struct samu . Called on update .
2003-09-11 02:33:06 +04:00
( Based on init_buffer_from_sam in pdb_tdb . c )
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2007-11-15 03:05:42 +03:00
static bool init_ldap_from_sam ( struct ldapsam_privates * ldap_state ,
2003-03-22 22:16:36 +03:00
LDAPMessage * existing ,
2006-02-20 23:09:36 +03:00
LDAPMod * * * mods , struct samu * sampass ,
2007-10-19 04:40:25 +04:00
bool ( * need_update ) ( const struct samu * ,
2003-03-27 17:31:46 +03:00
enum pdb_elements ) )
2001-09-26 00:21:21 +04:00
{
2007-11-15 03:05:42 +03:00
char * temp = NULL ;
2001-09-26 00:21:21 +04:00
2001-12-30 22:21:25 +03:00
if ( mods = = NULL | | sampass = = NULL ) {
DEBUG ( 0 , ( " init_ldap_from_sam: NULL parameters found! \n " ) ) ;
return False ;
}
2001-09-26 00:21:21 +04:00
* mods = NULL ;
2007-11-15 03:05:42 +03:00
/*
2001-09-26 00:21:21 +04:00
* took out adding " objectclass: sambaAccount "
* do this on a per - mod basis
*/
2006-03-29 18:52:03 +04:00
if ( need_update ( sampass , PDB_USERNAME ) ) {
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-03-30 20:40:41 +04:00
" uid " , pdb_get_username ( sampass ) ) ;
2006-03-29 18:52:03 +04:00
if ( ldap_state - > is_nds_ldap ) {
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
" cn " , pdb_get_username ( sampass ) ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
" sn " , pdb_get_username ( sampass ) ) ;
}
}
2003-03-30 20:40:41 +04:00
2003-09-11 02:33:06 +04:00
DEBUG ( 2 , ( " init_ldap_from_sam: Setting entry for user: %s \n " , pdb_get_username ( sampass ) ) ) ;
2003-03-22 22:16:36 +03:00
2003-04-23 04:59:19 +04:00
/* only update the RID if we actually need to */
2003-09-11 02:33:06 +04:00
if ( need_update ( sampass , PDB_USERSID ) ) {
2003-04-28 14:20:55 +04:00
fstring sid_string ;
2010-05-21 05:25:01 +04:00
const struct dom_sid * user_sid = pdb_get_user_sid ( sampass ) ;
2007-11-15 03:05:42 +03:00
2003-09-11 02:33:06 +04:00
switch ( ldap_state - > schema_ver ) {
2003-05-14 07:32:20 +04:00
case SCHEMAVER_SAMBASAMACCOUNT :
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_USER_SID ) ,
2007-12-16 00:47:30 +03:00
sid_to_fstring ( sid_string , user_sid ) ) ;
2003-05-14 07:32:20 +04:00
break ;
2007-11-15 03:05:42 +03:00
2003-05-14 07:32:20 +04:00
default :
DEBUG ( 0 , ( " init_ldap_from_sam: unknown schema version specified \n " ) ) ;
break ;
2007-11-15 03:05:42 +03:00
}
2002-03-02 13:16:28 +03:00
}
2001-09-26 00:21:21 +04:00
2003-04-28 14:20:55 +04:00
/* we don't need to store the primary group RID - so leaving it
' free ' to hang off the unix primary group makes life easier */
2003-03-30 20:40:41 +04:00
2003-09-11 02:33:06 +04:00
if ( need_update ( sampass , PDB_GROUPSID ) ) {
2003-05-14 22:36:54 +04:00
fstring sid_string ;
2010-05-21 05:25:01 +04:00
const struct dom_sid * group_sid = pdb_get_group_sid ( sampass ) ;
2007-11-15 03:05:42 +03:00
2003-09-11 02:33:06 +04:00
switch ( ldap_state - > schema_ver ) {
2003-05-14 07:32:20 +04:00
case SCHEMAVER_SAMBASAMACCOUNT :
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 22:36:54 +04:00
get_userattr_key2string ( ldap_state - > schema_ver ,
2007-12-16 00:47:30 +03:00
LDAP_ATTR_PRIMARY_GROUP_SID ) , sid_to_fstring ( sid_string , group_sid ) ) ;
2003-05-14 07:32:20 +04:00
break ;
2007-11-15 03:05:42 +03:00
2003-05-14 07:32:20 +04:00
default :
DEBUG ( 0 , ( " init_ldap_from_sam: unknown schema version specified \n " ) ) ;
break ;
}
2007-11-15 03:05:42 +03:00
2003-04-28 14:20:55 +04:00
}
2007-11-15 03:05:42 +03:00
2001-09-26 00:21:21 +04:00
/* displayName, cn, and gecos should all be the same
2002-10-01 17:10:57 +04:00
* most easily accomplished by giving them the same OID
2007-11-15 03:05:42 +03:00
* gecos isn ' t set here b / c it should be handled by the
2002-10-01 17:10:57 +04:00
* add - user script
2003-03-22 22:16:36 +03:00
* We change displayName only and fall back to cn if
* it does not exist .
2001-12-31 03:06:51 +03:00
*/
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_FULLNAME ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_DISPLAY_NAME ) ,
pdb_get_fullname ( sampass ) ) ;
2003-03-22 22:16:36 +03:00
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_ACCTDESC ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_DESC ) ,
pdb_get_acct_desc ( sampass ) ) ;
2003-03-22 22:16:36 +03:00
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_WORKSTATIONS ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_USER_WKS ) ,
pdb_get_workstations ( sampass ) ) ;
2007-11-15 03:05:42 +03:00
2003-12-04 07:52:00 +03:00
if ( need_update ( sampass , PDB_MUNGEDDIAL ) )
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_MUNGED_DIAL ) ,
pdb_get_munged_dial ( sampass ) ) ;
2007-11-15 03:05:42 +03:00
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_SMBHOME ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_HOME_PATH ) ,
pdb_get_homedir ( sampass ) ) ;
2007-11-15 03:05:42 +03:00
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_DRIVE ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_HOME_DRIVE ) ,
pdb_get_dir_drive ( sampass ) ) ;
2001-09-26 00:21:21 +04:00
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_LOGONSCRIPT ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_LOGON_SCRIPT ) ,
pdb_get_logon_script ( sampass ) ) ;
2001-12-31 03:06:51 +03:00
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_PROFILE ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_PROFILE_PATH ) ,
pdb_get_profile_path ( sampass ) ) ;
2001-09-26 00:21:21 +04:00
2009-02-20 00:36:20 +03:00
if ( asprintf ( & temp , " %li " , ( long int ) pdb_get_logon_time ( sampass ) ) < 0 ) {
2007-11-15 03:05:42 +03:00
return false ;
}
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_LOGONTIME ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_LOGON_TIME ) , temp ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( temp ) ;
2002-03-02 13:16:28 +03:00
2009-02-20 00:36:20 +03:00
if ( asprintf ( & temp , " %li " , ( long int ) pdb_get_logoff_time ( sampass ) ) < 0 ) {
2007-11-15 03:05:42 +03:00
return false ;
}
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_LOGOFFTIME ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_LOGOFF_TIME ) , temp ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( temp ) ;
2003-03-30 20:40:41 +04:00
2009-02-20 00:36:20 +03:00
if ( asprintf ( & temp , " %li " , ( long int ) pdb_get_kickoff_time ( sampass ) ) < 0 ) {
2007-11-15 03:05:42 +03:00
return false ;
}
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_KICKOFFTIME ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_KICKOFF_TIME ) , temp ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( temp ) ;
2003-03-30 20:40:41 +04:00
2009-02-20 00:36:20 +03:00
if ( asprintf ( & temp , " %li " , ( long int ) pdb_get_pass_can_change_time_noncalc ( sampass ) ) < 0 ) {
2007-11-15 03:05:42 +03:00
return false ;
}
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_CANCHANGETIME ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_PWD_CAN_CHANGE ) , temp ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( temp ) ;
2003-03-30 20:40:41 +04:00
2003-05-14 07:32:20 +04:00
if ( ( pdb_get_acct_ctrl ( sampass ) & ( ACB_WSTRUST | ACB_SVRTRUST | ACB_DOMTRUST ) )
2003-09-11 02:33:06 +04:00
| | ( lp_ldap_passwd_sync ( ) ! = LDAP_PASSWD_SYNC_ONLY ) ) {
2002-09-25 19:19:00 +04:00
2004-01-31 02:37:38 +03:00
if ( need_update ( sampass , PDB_LMPASSWD ) ) {
2007-11-15 03:05:42 +03:00
const uchar * lm_pw = pdb_get_lanman_passwd ( sampass ) ;
2004-01-31 02:37:38 +03:00
if ( lm_pw ) {
2007-11-15 03:05:42 +03:00
char pwstr [ 34 ] ;
pdb_sethexpwd ( pwstr , lm_pw ,
2004-01-31 02:37:38 +03:00
pdb_get_acct_ctrl ( sampass ) ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_LMPW ) ,
2007-11-15 03:05:42 +03:00
pwstr ) ;
2004-01-31 02:37:38 +03:00
} else {
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_LMPW ) ,
NULL ) ;
}
}
if ( need_update ( sampass , PDB_NTPASSWD ) ) {
2007-11-15 03:05:42 +03:00
const uchar * nt_pw = pdb_get_nt_passwd ( sampass ) ;
2004-01-31 02:37:38 +03:00
if ( nt_pw ) {
2007-11-15 03:05:42 +03:00
char pwstr [ 34 ] ;
pdb_sethexpwd ( pwstr , nt_pw ,
2004-01-31 02:37:38 +03:00
pdb_get_acct_ctrl ( sampass ) ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_NTPW ) ,
2007-11-15 03:05:42 +03:00
pwstr ) ;
2004-01-31 02:37:38 +03:00
} else {
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_NTPW ) ,
NULL ) ;
}
}
2003-03-30 20:40:41 +04:00
2004-07-08 02:46:51 +04:00
if ( need_update ( sampass , PDB_PWHISTORY ) ) {
2007-11-15 03:05:42 +03:00
char * pwstr = NULL ;
2010-05-21 04:38:04 +04:00
uint32_t pwHistLen = 0 ;
2009-07-14 01:53:49 +04:00
pdb_get_account_policy ( PDB_POLICY_PASSWORD_HISTORY , & pwHistLen ) ;
2007-11-15 03:05:42 +03:00
pwstr = SMB_MALLOC_ARRAY ( char , 1024 ) ;
if ( ! pwstr ) {
return false ;
}
2004-07-08 02:46:51 +04:00
if ( pwHistLen = = 0 ) {
/* Remove any password history from the LDAP store. */
2007-11-15 03:05:42 +03:00
memset ( pwstr , ' 0 ' , 64 ) ; /* NOTE !!!! '0' *NOT '\0' */
pwstr [ 64 ] = ' \0 ' ;
2004-07-08 02:46:51 +04:00
} else {
2007-11-15 03:05:42 +03:00
int i ;
2010-05-21 04:38:04 +04:00
uint32_t currHistLen = 0 ;
2004-07-08 02:46:51 +04:00
const uint8 * pwhist = pdb_get_pw_history ( sampass , & currHistLen ) ;
if ( pwhist ! = NULL ) {
2007-11-15 03:05:42 +03:00
/* We can only store (1024-1/64 password history entries. */
pwHistLen = MIN ( pwHistLen , ( ( 1024 - 1 ) / 64 ) ) ;
2004-07-08 02:46:51 +04:00
for ( i = 0 ; i < pwHistLen & & i < currHistLen ; i + + ) {
2004-08-11 22:39:29 +04:00
/* Store the salt. */
2007-11-15 03:05:42 +03:00
pdb_sethexpwd ( & pwstr [ i * 64 ] , & pwhist [ i * PW_HISTORY_ENTRY_LEN ] , 0 ) ;
2004-08-11 22:39:29 +04:00
/* Followed by the md5 hash of salt + md4 hash */
2007-11-15 03:05:42 +03:00
pdb_sethexpwd ( & pwstr [ ( i * 64 ) + 32 ] ,
2004-08-11 22:39:29 +04:00
& pwhist [ ( i * PW_HISTORY_ENTRY_LEN ) + PW_HISTORY_SALT_LEN ] , 0 ) ;
2007-11-15 03:05:42 +03:00
DEBUG ( 100 , ( " pwstr=%s \n " , pwstr ) ) ;
2004-07-08 02:46:51 +04:00
}
2007-11-15 03:05:42 +03:00
}
2004-07-08 02:46:51 +04:00
}
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_PWD_HISTORY ) ,
2007-11-15 03:05:42 +03:00
pwstr ) ;
SAFE_FREE ( pwstr ) ;
2004-07-08 02:46:51 +04:00
}
2004-01-31 02:37:38 +03:00
if ( need_update ( sampass , PDB_PASSLASTSET ) ) {
2007-11-15 03:05:42 +03:00
if ( asprintf ( & temp , " %li " ,
2009-02-20 00:36:20 +03:00
( long int ) pdb_get_pass_last_set_time ( sampass ) ) < 0 ) {
2007-11-15 03:05:42 +03:00
return false ;
}
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_PWD_LAST_SET ) ,
temp ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( temp ) ;
2004-01-31 02:37:38 +03:00
}
2002-09-25 19:19:00 +04:00
}
2004-08-13 22:02:58 +04:00
if ( need_update ( sampass , PDB_HOURS ) ) {
2005-03-22 20:08:09 +03:00
const uint8 * hours = pdb_get_hours ( sampass ) ;
2004-08-13 22:02:58 +04:00
if ( hours ) {
2007-11-15 03:05:42 +03:00
char hourstr [ 44 ] ;
pdb_sethexhours ( hourstr , hours ) ;
2004-08-13 22:02:58 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct ,
existing ,
mods ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_LOGON_HOURS ) ,
2007-11-15 03:05:42 +03:00
hourstr ) ;
2004-08-13 22:02:58 +04:00
}
}
2003-03-30 20:40:41 +04:00
if ( need_update ( sampass , PDB_ACCTCTRL ) )
2003-06-21 04:45:03 +04:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , existing , mods ,
2003-05-14 07:32:20 +04:00
get_userattr_key2string ( ldap_state - > schema_ver , LDAP_ATTR_ACB_INFO ) ,
pdb_encode_acct_ctrl ( pdb_get_acct_ctrl ( sampass ) , NEW_PW_FORMAT_SPACE_PADDED_LEN ) ) ;
2003-03-30 20:40:41 +04:00
2007-11-15 03:05:42 +03:00
/* password lockout cache:
2004-03-18 22:22:51 +03:00
- If we are now autolocking or clearing , we write to ldap
- If we are clearing , we delete the cache entry
- If the count is > 0 , we update the cache
This even means when autolocking , we cache , just in case the
update doesn ' t work , and we have to cache the autolock flag */
if ( need_update ( sampass , PDB_BAD_PASSWORD_COUNT ) ) /* &&
need_update ( sampass , PDB_BAD_PASSWORD_TIME ) ) */ {
2010-05-21 04:38:04 +04:00
uint16_t badcount = pdb_get_bad_password_count ( sampass ) ;
2004-03-18 22:22:51 +03:00
time_t badtime = pdb_get_bad_password_time ( sampass ) ;
2010-05-21 04:38:04 +04:00
uint32_t pol ;
2009-07-14 01:53:49 +04:00
pdb_get_account_policy ( PDB_POLICY_BAD_ATTEMPT_LOCKOUT , & pol ) ;
2004-03-18 22:22:51 +03:00
2004-03-19 04:29:14 +03:00
DEBUG ( 3 , ( " updating bad password fields, policy=%u, count=%u, time=%u \n " ,
( unsigned int ) pol , ( unsigned int ) badcount , ( unsigned int ) badtime ) ) ;
2004-03-18 22:22:51 +03:00
if ( ( badcount > = pol ) | | ( badcount = = 0 ) ) {
2004-03-19 04:29:14 +03:00
DEBUG ( 7 , ( " making mods to update ldap, count=%u, time=%u \n " ,
( unsigned int ) badcount , ( unsigned int ) badtime ) ) ;
2007-11-15 03:05:42 +03:00
if ( asprintf ( & temp , " %li " , ( long ) badcount ) < 0 ) {
return false ;
}
2004-03-18 22:22:51 +03:00
smbldap_make_mod (
ldap_state - > smbldap_state - > ldap_struct ,
2007-11-15 03:05:42 +03:00
existing , mods ,
2004-03-18 22:22:51 +03:00
get_userattr_key2string (
2007-11-15 03:05:42 +03:00
ldap_state - > schema_ver ,
2004-03-18 22:22:51 +03:00
LDAP_ATTR_BAD_PASSWORD_COUNT ) ,
temp ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( temp ) ;
2004-03-18 22:22:51 +03:00
2009-02-20 00:36:20 +03:00
if ( asprintf ( & temp , " %li " , ( long int ) badtime ) < 0 ) {
2007-11-15 03:05:42 +03:00
return false ;
}
2004-03-18 22:22:51 +03:00
smbldap_make_mod (
2007-11-15 03:05:42 +03:00
ldap_state - > smbldap_state - > ldap_struct ,
2004-03-18 22:22:51 +03:00
existing , mods ,
get_userattr_key2string (
2007-11-15 03:05:42 +03:00
ldap_state - > schema_ver ,
LDAP_ATTR_BAD_PASSWORD_TIME ) ,
2004-03-18 22:22:51 +03:00
temp ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( temp ) ;
2004-03-18 22:22:51 +03:00
}
if ( badcount = = 0 ) {
DEBUG ( 7 , ( " bad password count is reset, deleting login cache entry for %s \n " , pdb_get_nt_username ( sampass ) ) ) ;
login_cache_delentry ( sampass ) ;
} else {
2010-03-17 00:08:37 +03:00
struct login_cache cache_entry ;
2004-05-26 21:45:12 +04:00
cache_entry . entry_timestamp = time ( NULL ) ;
cache_entry . acct_ctrl = pdb_get_acct_ctrl ( sampass ) ;
cache_entry . bad_password_count = badcount ;
cache_entry . bad_password_time = badtime ;
2004-03-18 22:22:51 +03:00
DEBUG ( 7 , ( " Updating bad password count and time in login cache \n " ) ) ;
2010-03-17 00:22:21 +03:00
login_cache_write ( sampass , & cache_entry ) ;
2004-03-18 22:22:51 +03:00
}
}
2001-09-26 00:21:21 +04:00
return True ;
}
/**********************************************************************
2003-09-11 02:33:06 +04:00
End enumeration of the LDAP password list .
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2002-07-15 14:35:28 +04:00
static void ldapsam_endsampwent ( struct pdb_methods * my_methods )
2001-09-26 00:21:21 +04:00
{
2002-07-15 14:35:28 +04:00
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
2002-11-02 06:47:48 +03:00
if ( ldap_state - > result ) {
2002-03-02 13:16:28 +03:00
ldap_msgfree ( ldap_state - > result ) ;
ldap_state - > result = NULL ;
2001-09-26 00:21:21 +04:00
}
}
2006-02-04 01:19:41 +03:00
static void append_attr ( TALLOC_CTX * mem_ctx , const char * * * attr_list ,
const char * new_attr )
r1108: Index: pdb_ldap.c
===================================================================
--- pdb_ldap.c (revision 1095)
+++ pdb_ldap.c (working copy)
@@ -1134,6 +1134,19 @@
return NT_STATUS_OK;
}
+static void append_attr(char ***attr_list, const char *new_attr)
+{
+ int i;
+
+ for (i=0; (*attr_list)[i] != NULL; i++)
+ ;
+
+ (*attr_list) = Realloc((*attr_list), sizeof(**attr_list) * (i+2));
+ SMB_ASSERT((*attr_list) != NULL);
+ (*attr_list)[i] = strdup(new_attr);
+ (*attr_list)[i+1] = NULL;
+}
+
/**********************************************************************
Get SAM_ACCOUNT entry from LDAP by username.
*********************************************************************/
@@ -1149,6 +1162,7 @@
int rc;
attr_list = get_userattr_list( ldap_state->schema_ver );
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_name(ldap_state, sname, &result, attr_list);
free_attr_list( attr_list );
@@ -1194,6 +1208,7 @@
switch ( ldap_state->schema_ver ) {
case SCHEMAVER_SAMBASAMACCOUNT:
attr_list = get_userattr_list(ldap_state->schema_ver);
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_sid(ldap_state, sid, result, attr_list);
free_attr_list( attr_list );
Index: login_cache.c
===================================================================
--- login_cache.c (revision 1095)
+++ login_cache.c (working copy)
@@ -95,10 +95,13 @@
&entry->bad_password_count,
&entry->bad_password_time) == -1) {
DEBUG(7, ("No cache entry found\n"));
+ SAFE_FREE(entry);
SAFE_FREE(databuf.dptr);
return NULL;
}
+ SAFE_FREE(databuf.dptr);
+
DEBUG(5, ("Found login cache entry: timestamp %12u, flags 0x%x, count %d, time %12u\n",
(unsigned int)entry->entry_timestamp, entry->acct_ctrl,
entry->bad_password_count, (unsigned int)entry->bad_password_time));
(This used to be commit c0bf8425f4b9ee30ffc878704bde980d8c51ed05)
2004-06-10 21:42:16 +04:00
{
int i ;
2004-09-17 05:13:47 +04:00
if ( new_attr = = NULL ) {
return ;
}
for ( i = 0 ; ( * attr_list ) [ i ] ! = NULL ; i + + ) {
r1108: Index: pdb_ldap.c
===================================================================
--- pdb_ldap.c (revision 1095)
+++ pdb_ldap.c (working copy)
@@ -1134,6 +1134,19 @@
return NT_STATUS_OK;
}
+static void append_attr(char ***attr_list, const char *new_attr)
+{
+ int i;
+
+ for (i=0; (*attr_list)[i] != NULL; i++)
+ ;
+
+ (*attr_list) = Realloc((*attr_list), sizeof(**attr_list) * (i+2));
+ SMB_ASSERT((*attr_list) != NULL);
+ (*attr_list)[i] = strdup(new_attr);
+ (*attr_list)[i+1] = NULL;
+}
+
/**********************************************************************
Get SAM_ACCOUNT entry from LDAP by username.
*********************************************************************/
@@ -1149,6 +1162,7 @@
int rc;
attr_list = get_userattr_list( ldap_state->schema_ver );
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_name(ldap_state, sname, &result, attr_list);
free_attr_list( attr_list );
@@ -1194,6 +1208,7 @@
switch ( ldap_state->schema_ver ) {
case SCHEMAVER_SAMBASAMACCOUNT:
attr_list = get_userattr_list(ldap_state->schema_ver);
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_sid(ldap_state, sid, result, attr_list);
free_attr_list( attr_list );
Index: login_cache.c
===================================================================
--- login_cache.c (revision 1095)
+++ login_cache.c (working copy)
@@ -95,10 +95,13 @@
&entry->bad_password_count,
&entry->bad_password_time) == -1) {
DEBUG(7, ("No cache entry found\n"));
+ SAFE_FREE(entry);
SAFE_FREE(databuf.dptr);
return NULL;
}
+ SAFE_FREE(databuf.dptr);
+
DEBUG(5, ("Found login cache entry: timestamp %12u, flags 0x%x, count %d, time %12u\n",
(unsigned int)entry->entry_timestamp, entry->acct_ctrl,
entry->bad_password_count, (unsigned int)entry->bad_password_time));
(This used to be commit c0bf8425f4b9ee30ffc878704bde980d8c51ed05)
2004-06-10 21:42:16 +04:00
;
2004-09-17 05:13:47 +04:00
}
r1108: Index: pdb_ldap.c
===================================================================
--- pdb_ldap.c (revision 1095)
+++ pdb_ldap.c (working copy)
@@ -1134,6 +1134,19 @@
return NT_STATUS_OK;
}
+static void append_attr(char ***attr_list, const char *new_attr)
+{
+ int i;
+
+ for (i=0; (*attr_list)[i] != NULL; i++)
+ ;
+
+ (*attr_list) = Realloc((*attr_list), sizeof(**attr_list) * (i+2));
+ SMB_ASSERT((*attr_list) != NULL);
+ (*attr_list)[i] = strdup(new_attr);
+ (*attr_list)[i+1] = NULL;
+}
+
/**********************************************************************
Get SAM_ACCOUNT entry from LDAP by username.
*********************************************************************/
@@ -1149,6 +1162,7 @@
int rc;
attr_list = get_userattr_list( ldap_state->schema_ver );
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_name(ldap_state, sname, &result, attr_list);
free_attr_list( attr_list );
@@ -1194,6 +1208,7 @@
switch ( ldap_state->schema_ver ) {
case SCHEMAVER_SAMBASAMACCOUNT:
attr_list = get_userattr_list(ldap_state->schema_ver);
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_sid(ldap_state, sid, result, attr_list);
free_attr_list( attr_list );
Index: login_cache.c
===================================================================
--- login_cache.c (revision 1095)
+++ login_cache.c (working copy)
@@ -95,10 +95,13 @@
&entry->bad_password_count,
&entry->bad_password_time) == -1) {
DEBUG(7, ("No cache entry found\n"));
+ SAFE_FREE(entry);
SAFE_FREE(databuf.dptr);
return NULL;
}
+ SAFE_FREE(databuf.dptr);
+
DEBUG(5, ("Found login cache entry: timestamp %12u, flags 0x%x, count %d, time %12u\n",
(unsigned int)entry->entry_timestamp, entry->acct_ctrl,
entry->bad_password_count, (unsigned int)entry->bad_password_time));
(This used to be commit c0bf8425f4b9ee30ffc878704bde980d8c51ed05)
2004-06-10 21:42:16 +04:00
2011-06-07 05:10:15 +04:00
( * attr_list ) = talloc_realloc ( mem_ctx , ( * attr_list ) ,
2006-02-04 01:19:41 +03:00
const char * , i + 2 ) ;
r1108: Index: pdb_ldap.c
===================================================================
--- pdb_ldap.c (revision 1095)
+++ pdb_ldap.c (working copy)
@@ -1134,6 +1134,19 @@
return NT_STATUS_OK;
}
+static void append_attr(char ***attr_list, const char *new_attr)
+{
+ int i;
+
+ for (i=0; (*attr_list)[i] != NULL; i++)
+ ;
+
+ (*attr_list) = Realloc((*attr_list), sizeof(**attr_list) * (i+2));
+ SMB_ASSERT((*attr_list) != NULL);
+ (*attr_list)[i] = strdup(new_attr);
+ (*attr_list)[i+1] = NULL;
+}
+
/**********************************************************************
Get SAM_ACCOUNT entry from LDAP by username.
*********************************************************************/
@@ -1149,6 +1162,7 @@
int rc;
attr_list = get_userattr_list( ldap_state->schema_ver );
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_name(ldap_state, sname, &result, attr_list);
free_attr_list( attr_list );
@@ -1194,6 +1208,7 @@
switch ( ldap_state->schema_ver ) {
case SCHEMAVER_SAMBASAMACCOUNT:
attr_list = get_userattr_list(ldap_state->schema_ver);
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_sid(ldap_state, sid, result, attr_list);
free_attr_list( attr_list );
Index: login_cache.c
===================================================================
--- login_cache.c (revision 1095)
+++ login_cache.c (working copy)
@@ -95,10 +95,13 @@
&entry->bad_password_count,
&entry->bad_password_time) == -1) {
DEBUG(7, ("No cache entry found\n"));
+ SAFE_FREE(entry);
SAFE_FREE(databuf.dptr);
return NULL;
}
+ SAFE_FREE(databuf.dptr);
+
DEBUG(5, ("Found login cache entry: timestamp %12u, flags 0x%x, count %d, time %12u\n",
(unsigned int)entry->entry_timestamp, entry->acct_ctrl,
entry->bad_password_count, (unsigned int)entry->bad_password_time));
(This used to be commit c0bf8425f4b9ee30ffc878704bde980d8c51ed05)
2004-06-10 21:42:16 +04:00
SMB_ASSERT ( ( * attr_list ) ! = NULL ) ;
2006-02-04 01:19:41 +03:00
( * attr_list ) [ i ] = talloc_strdup ( ( * attr_list ) , new_attr ) ;
r1108: Index: pdb_ldap.c
===================================================================
--- pdb_ldap.c (revision 1095)
+++ pdb_ldap.c (working copy)
@@ -1134,6 +1134,19 @@
return NT_STATUS_OK;
}
+static void append_attr(char ***attr_list, const char *new_attr)
+{
+ int i;
+
+ for (i=0; (*attr_list)[i] != NULL; i++)
+ ;
+
+ (*attr_list) = Realloc((*attr_list), sizeof(**attr_list) * (i+2));
+ SMB_ASSERT((*attr_list) != NULL);
+ (*attr_list)[i] = strdup(new_attr);
+ (*attr_list)[i+1] = NULL;
+}
+
/**********************************************************************
Get SAM_ACCOUNT entry from LDAP by username.
*********************************************************************/
@@ -1149,6 +1162,7 @@
int rc;
attr_list = get_userattr_list( ldap_state->schema_ver );
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_name(ldap_state, sname, &result, attr_list);
free_attr_list( attr_list );
@@ -1194,6 +1208,7 @@
switch ( ldap_state->schema_ver ) {
case SCHEMAVER_SAMBASAMACCOUNT:
attr_list = get_userattr_list(ldap_state->schema_ver);
+ append_attr(&attr_list, MODIFY_TIMESTAMP_STRING);
rc = ldapsam_search_suffix_by_sid(ldap_state, sid, result, attr_list);
free_attr_list( attr_list );
Index: login_cache.c
===================================================================
--- login_cache.c (revision 1095)
+++ login_cache.c (working copy)
@@ -95,10 +95,13 @@
&entry->bad_password_count,
&entry->bad_password_time) == -1) {
DEBUG(7, ("No cache entry found\n"));
+ SAFE_FREE(entry);
SAFE_FREE(databuf.dptr);
return NULL;
}
+ SAFE_FREE(databuf.dptr);
+
DEBUG(5, ("Found login cache entry: timestamp %12u, flags 0x%x, count %d, time %12u\n",
(unsigned int)entry->entry_timestamp, entry->acct_ctrl,
entry->bad_password_count, (unsigned int)entry->bad_password_time));
(This used to be commit c0bf8425f4b9ee30ffc878704bde980d8c51ed05)
2004-06-10 21:42:16 +04:00
( * attr_list ) [ i + 1 ] = NULL ;
}
2010-02-04 19:19:57 +03:00
static void ldapsam_add_unix_attributes ( TALLOC_CTX * mem_ctx ,
const char * * * attr_list )
{
append_attr ( mem_ctx , attr_list , " uidNumber " ) ;
append_attr ( mem_ctx , attr_list , " gidNumber " ) ;
append_attr ( mem_ctx , attr_list , " homeDirectory " ) ;
append_attr ( mem_ctx , attr_list , " loginShell " ) ;
append_attr ( mem_ctx , attr_list , " gecos " ) ;
}
2001-09-26 00:21:21 +04:00
/**********************************************************************
2006-02-20 23:09:36 +03:00
Get struct samu entry from LDAP by username .
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2006-02-20 23:09:36 +03:00
static NTSTATUS ldapsam_getsampwnam ( struct pdb_methods * my_methods , struct samu * user , const char * sname )
2001-09-26 00:21:21 +04:00
{
2002-09-26 22:58:34 +04:00
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL ;
2002-07-15 14:35:28 +04:00
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
2003-11-14 06:28:03 +03:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
2003-02-01 10:59:29 +03:00
int count ;
2005-02-17 17:27:34 +03:00
const char * * attr_list ;
2003-05-14 07:32:20 +04:00
int rc ;
2009-05-31 13:14:06 +04:00
2006-02-20 23:09:36 +03:00
attr_list = get_userattr_list ( user , ldap_state - > schema_ver ) ;
append_attr ( user , & attr_list ,
2006-02-04 01:19:41 +03:00
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_MOD_TIMESTAMP ) ) ;
2010-02-04 19:19:57 +03:00
ldapsam_add_unix_attributes ( user , & attr_list ) ;
2006-02-04 01:19:41 +03:00
rc = ldapsam_search_suffix_by_name ( ldap_state , sname , & result ,
attr_list ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( attr_list ) ;
2003-05-14 07:32:20 +04:00
if ( rc ! = LDAP_SUCCESS )
2002-11-27 00:00:18 +03:00
return NT_STATUS_NO_SUCH_USER ;
2009-05-31 13:14:06 +04:00
2003-06-21 04:45:03 +04:00
count = ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2009-05-31 13:14:06 +04:00
2003-02-01 10:59:29 +03:00
if ( count < 1 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 4 , ( " ldapsam_getsampwnam: Unable to locate user [%s] count=%d \n " , sname , count ) ) ;
2003-07-15 21:00:11 +04:00
ldap_msgfree ( result ) ;
2003-02-01 10:59:29 +03:00
return NT_STATUS_NO_SUCH_USER ;
} else if ( count > 1 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 1 , ( " ldapsam_getsampwnam: Duplicate entries for this user [%s] Failing. count=%d \n " , sname , count ) ) ;
2003-07-15 21:00:11 +04:00
ldap_msgfree ( result ) ;
2002-11-27 00:00:18 +03:00
return NT_STATUS_NO_SUCH_USER ;
2001-09-26 00:21:21 +04:00
}
2003-02-01 10:59:29 +03:00
2003-06-21 04:45:03 +04:00
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2002-09-25 19:19:00 +04:00
if ( entry ) {
2002-11-02 06:47:48 +03:00
if ( ! init_sam_from_ldap ( ldap_state , user , entry ) ) {
2002-08-17 21:00:51 +04:00
DEBUG ( 1 , ( " ldapsam_getsampwnam: init_sam_from_ldap failed for user '%s'! \n " , sname ) ) ;
2002-03-02 13:16:28 +03:00
ldap_msgfree ( result ) ;
2002-11-27 00:00:18 +03:00
return NT_STATUS_NO_SUCH_USER ;
2002-03-02 13:16:28 +03:00
}
2006-02-04 01:19:41 +03:00
pdb_set_backend_private_data ( user , result , NULL ,
2003-07-05 13:46:12 +04:00
my_methods , PDB_CHANGED ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( user , result ) ;
2002-09-26 22:58:34 +04:00
ret = NT_STATUS_OK ;
2002-09-25 19:19:00 +04:00
} else {
2001-09-26 00:21:21 +04:00
ldap_msgfree ( result ) ;
}
2002-09-26 22:58:34 +04:00
return ret ;
2001-09-26 00:21:21 +04:00
}
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
static int ldapsam_get_ldap_user_by_sid ( struct ldapsam_privates * ldap_state ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid , LDAPMessage * * result )
2001-09-26 00:21:21 +04:00
{
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
int rc = - 1 ;
2005-02-17 17:27:34 +03:00
const char * * attr_list ;
2003-07-05 14:39:41 +04:00
2003-09-11 02:33:06 +04:00
switch ( ldap_state - > schema_ver ) {
2006-02-04 01:19:41 +03:00
case SCHEMAVER_SAMBASAMACCOUNT : {
TALLOC_CTX * tmp_ctx = talloc_new ( NULL ) ;
if ( tmp_ctx = = NULL ) {
return LDAP_NO_MEMORY ;
}
attr_list = get_userattr_list ( tmp_ctx ,
ldap_state - > schema_ver ) ;
append_attr ( tmp_ctx , & attr_list ,
get_userattr_key2string (
ldap_state - > schema_ver ,
LDAP_ATTR_MOD_TIMESTAMP ) ) ;
2010-02-04 19:19:57 +03:00
ldapsam_add_unix_attributes ( tmp_ctx , & attr_list ) ;
2006-02-04 01:19:41 +03:00
rc = ldapsam_search_suffix_by_sid ( ldap_state , sid ,
result , attr_list ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( tmp_ctx ) ;
2003-05-14 07:32:20 +04:00
if ( rc ! = LDAP_SUCCESS )
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
return rc ;
2003-05-14 07:32:20 +04:00
break ;
2006-02-04 01:19:41 +03:00
}
2009-05-31 13:14:06 +04:00
2012-06-22 18:27:56 +04:00
default :
DEBUG ( 0 , ( " Invalid schema version specified \n " ) ) ;
2003-07-05 14:39:41 +04:00
break ;
2001-09-26 00:21:21 +04:00
}
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
return rc ;
}
/**********************************************************************
2006-02-20 23:09:36 +03:00
Get struct samu entry from LDAP by SID .
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2010-05-21 05:25:01 +04:00
static NTSTATUS ldapsam_getsampwsid ( struct pdb_methods * my_methods , struct samu * user , const struct dom_sid * sid )
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
2003-11-14 06:28:03 +03:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
int count ;
int rc ;
rc = ldapsam_get_ldap_user_by_sid ( ldap_state ,
sid , & result ) ;
if ( rc ! = LDAP_SUCCESS )
return NT_STATUS_NO_SUCH_USER ;
2003-06-21 04:45:03 +04:00
count = ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2009-05-31 13:14:06 +04:00
2003-09-11 02:33:06 +04:00
if ( count < 1 ) {
2007-12-15 23:11:36 +03:00
DEBUG ( 4 , ( " ldapsam_getsampwsid: Unable to locate SID [%s] "
" count=%d \n " , sid_string_dbg ( sid ) , count ) ) ;
2003-06-07 07:22:37 +04:00
ldap_msgfree ( result ) ;
2003-02-01 10:59:29 +03:00
return NT_STATUS_NO_SUCH_USER ;
2003-09-11 02:33:06 +04:00
} else if ( count > 1 ) {
2007-12-15 23:11:36 +03:00
DEBUG ( 1 , ( " ldapsam_getsampwsid: More than one user with SID "
" [%s]. Failing. count=%d \n " , sid_string_dbg ( sid ) ,
count ) ) ;
2003-06-07 07:22:37 +04:00
ldap_msgfree ( result ) ;
2002-11-27 00:00:18 +03:00
return NT_STATUS_NO_SUCH_USER ;
2001-09-26 00:21:21 +04:00
}
2003-06-21 04:45:03 +04:00
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2003-09-11 02:33:06 +04:00
if ( ! entry ) {
2003-07-05 13:46:12 +04:00
ldap_msgfree ( result ) ;
2003-07-06 10:18:54 +04:00
return NT_STATUS_NO_SUCH_USER ;
}
if ( ! init_sam_from_ldap ( ldap_state , user , entry ) ) {
2004-10-12 01:09:36 +04:00
DEBUG ( 1 , ( " ldapsam_getsampwsid: init_sam_from_ldap failed! \n " ) ) ;
2003-07-06 10:18:54 +04:00
ldap_msgfree ( result ) ;
return NT_STATUS_NO_SUCH_USER ;
2001-09-26 00:21:21 +04:00
}
2003-07-06 10:18:54 +04:00
2006-02-04 01:19:41 +03:00
pdb_set_backend_private_data ( user , result , NULL ,
2003-07-06 10:18:54 +04:00
my_methods , PDB_CHANGED ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( user , result ) ;
2003-07-06 10:18:54 +04:00
return NT_STATUS_OK ;
2002-07-15 14:35:28 +04:00
}
2002-11-02 06:47:48 +03:00
/********************************************************************
2003-09-11 02:33:06 +04:00
Do the actual modification - also change a plaintext passord if
it it set .
2002-11-02 06:47:48 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static NTSTATUS ldapsam_modify_entry ( struct pdb_methods * my_methods ,
2006-02-20 23:09:36 +03:00
struct samu * newpwd , char * dn ,
2003-04-23 03:14:49 +04:00
LDAPMod * * mods , int ldap_op ,
2007-10-19 04:40:25 +04:00
bool ( * need_update ) ( const struct samu * , enum pdb_elements ) )
2002-09-25 19:19:00 +04:00
{
2002-11-02 06:47:48 +03:00
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
2002-09-25 19:19:00 +04:00
int rc ;
2009-05-31 13:14:06 +04:00
2006-03-07 22:24:28 +03:00
if ( ! newpwd | | ! dn ) {
2002-11-02 06:47:48 +03:00
return NT_STATUS_INVALID_PARAMETER ;
}
2009-05-31 13:14:06 +04:00
2003-04-23 03:14:49 +04:00
if ( ! ( pdb_get_acct_ctrl ( newpwd ) & ( ACB_WSTRUST | ACB_SVRTRUST | ACB_DOMTRUST ) ) & &
2003-09-11 02:33:06 +04:00
( lp_ldap_passwd_sync ( ) ! = LDAP_PASSWD_SYNC_OFF ) & &
need_update ( newpwd , PDB_PLAINTEXT_PW ) & &
( pdb_get_plaintext_passwd ( newpwd ) ! = NULL ) ) {
2002-09-25 19:19:00 +04:00
BerElement * ber ;
struct berval * bv ;
2005-03-05 04:22:53 +03:00
char * retoid = NULL ;
struct berval * retdata = NULL ;
2003-04-25 09:59:49 +04:00
char * utf8_password ;
2003-04-26 17:29:37 +04:00
char * utf8_dn ;
2008-04-30 01:36:24 +04:00
size_t converted_size ;
2009-07-15 01:12:59 +04:00
int ret ;
2003-04-25 09:59:49 +04:00
2005-03-05 04:22:53 +03:00
if ( ! ldap_state - > is_nds_ldap ) {
2006-05-16 17:26:49 +04:00
if ( ! smbldap_has_extension ( ldap_state - > smbldap_state - > ldap_struct ,
LDAP_EXOP_MODIFY_PASSWD ) ) {
2005-03-05 04:22:53 +03:00
DEBUG ( 2 , ( " ldap password change requested, but LDAP "
" server does not support it -- ignoring \n " ) ) ;
return NT_STATUS_OK ;
}
2004-09-25 14:12:34 +04:00
}
2009-03-19 04:20:11 +03:00
if ( ! push_utf8_talloc ( talloc_tos ( ) , & utf8_password ,
2008-04-30 01:36:24 +04:00
pdb_get_plaintext_passwd ( newpwd ) ,
& converted_size ) )
{
2003-04-25 09:59:49 +04:00
return NT_STATUS_NO_MEMORY ;
}
2002-09-25 19:19:00 +04:00
2009-03-19 04:20:11 +03:00
if ( ! push_utf8_talloc ( talloc_tos ( ) , & utf8_dn , dn , & converted_size ) ) {
TALLOC_FREE ( utf8_password ) ;
2003-04-26 17:29:37 +04:00
return NT_STATUS_NO_MEMORY ;
}
2002-09-25 19:19:00 +04:00
if ( ( ber = ber_alloc_t ( LBER_USE_DER ) ) = = NULL ) {
DEBUG ( 0 , ( " ber_alloc_t returns NULL \n " ) ) ;
2009-03-19 04:20:11 +03:00
TALLOC_FREE ( utf8_password ) ;
TALLOC_FREE ( utf8_dn ) ;
2002-11-02 06:47:48 +03:00
return NT_STATUS_UNSUCCESSFUL ;
2002-09-25 19:19:00 +04:00
}
2003-04-25 09:59:49 +04:00
2008-03-15 01:26:28 +03:00
if ( ( ber_printf ( ber , " { " ) < 0 ) | |
2009-07-15 01:12:59 +04:00
( ber_printf ( ber , " ts " , LDAP_TAG_EXOP_MODIFY_PASSWD_ID ,
utf8_dn ) < 0 ) ) {
DEBUG ( 0 , ( " ldapsam_modify_entry: ber_printf returns a "
" value <0 \n " ) ) ;
ber_free ( ber , 1 ) ;
TALLOC_FREE ( utf8_dn ) ;
TALLOC_FREE ( utf8_password ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
if ( ( utf8_password ! = NULL ) & & ( * utf8_password ! = ' \0 ' ) ) {
ret = ber_printf ( ber , " ts} " ,
LDAP_TAG_EXOP_MODIFY_PASSWD_NEW ,
utf8_password ) ;
} else {
ret = ber_printf ( ber , " } " ) ;
}
if ( ret < 0 ) {
DEBUG ( 0 , ( " ldapsam_modify_entry: ber_printf returns a "
" value <0 \n " ) ) ;
ber_free ( ber , 1 ) ;
TALLOC_FREE ( utf8_dn ) ;
TALLOC_FREE ( utf8_password ) ;
return NT_STATUS_UNSUCCESSFUL ;
2008-03-15 01:26:28 +03:00
}
2002-09-25 19:19:00 +04:00
if ( ( rc = ber_flatten ( ber , & bv ) ) < 0 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_modify_entry: ber_flatten returns a value <0 \n " ) ) ;
2003-04-25 09:59:49 +04:00
ber_free ( ber , 1 ) ;
2009-03-19 04:20:11 +03:00
TALLOC_FREE ( utf8_dn ) ;
TALLOC_FREE ( utf8_password ) ;
2002-11-02 06:47:48 +03:00
return NT_STATUS_UNSUCCESSFUL ;
2002-09-25 19:19:00 +04:00
}
2009-05-31 13:14:06 +04:00
2009-03-19 04:20:11 +03:00
TALLOC_FREE ( utf8_dn ) ;
TALLOC_FREE ( utf8_password ) ;
2003-04-25 09:59:49 +04:00
ber_free ( ber , 1 ) ;
2002-11-02 06:47:48 +03:00
2005-03-05 04:22:53 +03:00
if ( ! ldap_state - > is_nds_ldap ) {
rc = smbldap_extended_operation ( ldap_state - > smbldap_state ,
LDAP_EXOP_MODIFY_PASSWD ,
bv , NULL , NULL , & retoid ,
& retdata ) ;
} else {
rc = pdb_nds_set_password ( ldap_state - > smbldap_state , dn ,
pdb_get_plaintext_passwd ( newpwd ) ) ;
}
if ( rc ! = LDAP_SUCCESS ) {
2003-12-26 03:43:48 +03:00
char * ld_error = NULL ;
2004-09-25 14:12:34 +04:00
if ( rc = = LDAP_OBJECT_CLASS_VIOLATION ) {
DEBUG ( 3 , ( " Could not set userPassword "
" attribute due to an objectClass "
" violation -- ignoring \n " ) ) ;
ber_bvfree ( bv ) ;
return NT_STATUS_OK ;
}
2003-12-26 03:43:48 +03:00
ldap_get_option ( ldap_state - > smbldap_state - > ldap_struct , LDAP_OPT_ERROR_STRING ,
& ld_error ) ;
DEBUG ( 0 , ( " ldapsam_modify_entry: LDAP Password could not be changed for user %s: %s \n \t %s \n " ,
pdb_get_username ( newpwd ) , ldap_err2string ( rc ) , ld_error ? ld_error : " unknown " ) ) ;
SAFE_FREE ( ld_error ) ;
ber_bvfree ( bv ) ;
2008-01-03 05:20:23 +03:00
# if defined(LDAP_CONSTRAINT_VIOLATION)
if ( rc = = LDAP_CONSTRAINT_VIOLATION )
return NT_STATUS_PASSWORD_RESTRICTION ;
# endif
2003-12-26 03:43:48 +03:00
return NT_STATUS_UNSUCCESSFUL ;
2002-09-25 19:19:00 +04:00
} else {
2003-09-11 02:33:06 +04:00
DEBUG ( 3 , ( " ldapsam_modify_entry: LDAP Password changed for user %s \n " , pdb_get_username ( newpwd ) ) ) ;
2003-04-23 03:14:49 +04:00
# ifdef DEBUG_PASSWORD
2003-09-11 02:33:06 +04:00
DEBUG ( 100 , ( " ldapsam_modify_entry: LDAP Password changed to %s \n " , pdb_get_plaintext_passwd ( newpwd ) ) ) ;
2003-04-23 03:14:49 +04:00
# endif
2005-03-05 04:22:53 +03:00
if ( retdata )
ber_bvfree ( retdata ) ;
if ( retoid )
2005-12-20 21:20:39 +03:00
ldap_memfree ( retoid ) ;
2002-09-25 19:19:00 +04:00
}
ber_bvfree ( bv ) ;
}
2010-07-06 20:39:26 +04:00
if ( ! mods ) {
DEBUG ( 5 , ( " ldapsam_modify_entry: mods is empty: nothing to modify \n " ) ) ;
/* may be password change below however */
} else {
switch ( ldap_op ) {
case LDAP_MOD_ADD :
if ( ldap_state - > is_nds_ldap ) {
smbldap_set_mod ( & mods , LDAP_MOD_ADD ,
" objectclass " ,
" inetOrgPerson " ) ;
} else {
smbldap_set_mod ( & mods , LDAP_MOD_ADD ,
" objectclass " ,
LDAP_OBJ_ACCOUNT ) ;
}
rc = smbldap_add ( ldap_state - > smbldap_state ,
dn , mods ) ;
break ;
case LDAP_MOD_REPLACE :
rc = smbldap_modify ( ldap_state - > smbldap_state ,
dn , mods ) ;
break ;
default :
DEBUG ( 0 , ( " ldapsam_modify_entry: Wrong LDAP operation type: %d! \n " ,
ldap_op ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
if ( rc ! = LDAP_SUCCESS ) {
return NT_STATUS_UNSUCCESSFUL ;
}
}
2002-09-26 22:58:34 +04:00
return NT_STATUS_OK ;
2002-09-25 19:19:00 +04:00
}
2001-09-26 00:21:21 +04:00
/**********************************************************************
2003-09-11 02:33:06 +04:00
Delete entry from LDAP for username .
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2006-02-04 01:19:41 +03:00
static NTSTATUS ldapsam_delete_sam_account ( struct pdb_methods * my_methods ,
2006-02-20 23:09:36 +03:00
struct samu * sam_acct )
2001-09-26 00:21:21 +04:00
{
2006-02-04 01:19:41 +03:00
struct ldapsam_privates * priv =
( struct ldapsam_privates * ) my_methods - > private_data ;
This is another *BIG* change...
Samba now features a pluggable passdb interface, along the same lines as the
one in use in the auth subsystem. In this case, only one backend may be active
at a time by the 'normal' interface, and only one backend per passdb_context is
permitted outside that.
This pluggable interface is designed to allow any number of passdb backends to
be compiled in, with the selection at runtime. The 'passdb backend' paramater
has been created (and documented!) to support this.
As such, configure has been modfied to allow (for example) --with-ldap and the
old smbpasswd to be selected at the same time.
This patch also introduces two new backends: smbpasswd_nua and tdbsam_nua.
These two backends accept 'non unix accounts', where the user does *not* exist
in /etc/passwd. These accounts' don't have UIDs in the unix sense, but to
avoid conflicts in the algroitmic mapping of RIDs, they use the values
specified in the 'non unix account range' paramter - in the same way as the
winbind ranges are specifed.
While I was at it, I cleaned up some of the code in pdb_tdb (code copied
directly from smbpasswd and not really considered properly). Most of this was
to do with % macro expansion on stored data. It isn't easy to get the macros
into the tdb, and the first password change will 'expand' them. tdbsam needs
to use a similar system to pdb_ldap in this regard.
This patch only makes minor adjustments to pdb_nisplus and pdb_ldap, becouse I
don't have the test facilities for these. I plan to incoroprate at least
pdb_ldap into this scheme after consultation with Jerry.
Each (converted) passdb module now no longer has any 'static' variables, and
only exports 1 init function outside its .c file.
The non-unix-account support in this patch has been proven! It is now possible
to join a win2k machine to a Samba PDC without an account in /etc/passwd!
Other changes:
Minor interface adjustments:
pdb_delete_sam_account() now takes a SAM_ACCOUNT, not a char*.
pdb_update_sam_account() no longer takes the 'override' argument that was being
ignored so often (every other passdb backend). Extra checks have been added in
some places.
Minor code changes:
smbpasswd no longer attempts to initialise the passdb at startup, this is
now done on first use.
pdbedit has lost some of its 'machine account' logic, as this behaviour is now
controlled by the passdb subsystem directly.
The samr subsystem no longer calls 'local password change', but does the pdb
interactions directly. This allow the ACB_ flags specifed to be transferred
direct to the backend, without interference.
Doco:
I've updated the doco to reflect some of the changes, and removed some paramters
no longer applicable to HEAD.
(This used to be commit ff354c99c585068af6dc1ff35a1f109a806b326b)
2002-01-20 17:30:58 +03:00
const char * sname ;
2001-09-26 00:21:21 +04:00
int rc ;
2006-02-04 01:19:41 +03:00
LDAPMessage * msg , * entry ;
NTSTATUS result = NT_STATUS_NO_MEMORY ;
2005-02-17 17:27:34 +03:00
const char * * attr_list ;
2006-02-04 01:19:41 +03:00
TALLOC_CTX * mem_ctx ;
2001-09-26 00:21:21 +04:00
This is another *BIG* change...
Samba now features a pluggable passdb interface, along the same lines as the
one in use in the auth subsystem. In this case, only one backend may be active
at a time by the 'normal' interface, and only one backend per passdb_context is
permitted outside that.
This pluggable interface is designed to allow any number of passdb backends to
be compiled in, with the selection at runtime. The 'passdb backend' paramater
has been created (and documented!) to support this.
As such, configure has been modfied to allow (for example) --with-ldap and the
old smbpasswd to be selected at the same time.
This patch also introduces two new backends: smbpasswd_nua and tdbsam_nua.
These two backends accept 'non unix accounts', where the user does *not* exist
in /etc/passwd. These accounts' don't have UIDs in the unix sense, but to
avoid conflicts in the algroitmic mapping of RIDs, they use the values
specified in the 'non unix account range' paramter - in the same way as the
winbind ranges are specifed.
While I was at it, I cleaned up some of the code in pdb_tdb (code copied
directly from smbpasswd and not really considered properly). Most of this was
to do with % macro expansion on stored data. It isn't easy to get the macros
into the tdb, and the first password change will 'expand' them. tdbsam needs
to use a similar system to pdb_ldap in this regard.
This patch only makes minor adjustments to pdb_nisplus and pdb_ldap, becouse I
don't have the test facilities for these. I plan to incoroprate at least
pdb_ldap into this scheme after consultation with Jerry.
Each (converted) passdb module now no longer has any 'static' variables, and
only exports 1 init function outside its .c file.
The non-unix-account support in this patch has been proven! It is now possible
to join a win2k machine to a Samba PDC without an account in /etc/passwd!
Other changes:
Minor interface adjustments:
pdb_delete_sam_account() now takes a SAM_ACCOUNT, not a char*.
pdb_update_sam_account() no longer takes the 'override' argument that was being
ignored so often (every other passdb backend). Extra checks have been added in
some places.
Minor code changes:
smbpasswd no longer attempts to initialise the passdb at startup, this is
now done on first use.
pdbedit has lost some of its 'machine account' logic, as this behaviour is now
controlled by the passdb subsystem directly.
The samr subsystem no longer calls 'local password change', but does the pdb
interactions directly. This allow the ACB_ flags specifed to be transferred
direct to the backend, without interference.
Doco:
I've updated the doco to reflect some of the changes, and removed some paramters
no longer applicable to HEAD.
(This used to be commit ff354c99c585068af6dc1ff35a1f109a806b326b)
2002-01-20 17:30:58 +03:00
if ( ! sam_acct ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_delete_sam_account: sam_acct was NULL! \n " ) ) ;
2002-11-27 00:00:18 +03:00
return NT_STATUS_INVALID_PARAMETER ;
This is another *BIG* change...
Samba now features a pluggable passdb interface, along the same lines as the
one in use in the auth subsystem. In this case, only one backend may be active
at a time by the 'normal' interface, and only one backend per passdb_context is
permitted outside that.
This pluggable interface is designed to allow any number of passdb backends to
be compiled in, with the selection at runtime. The 'passdb backend' paramater
has been created (and documented!) to support this.
As such, configure has been modfied to allow (for example) --with-ldap and the
old smbpasswd to be selected at the same time.
This patch also introduces two new backends: smbpasswd_nua and tdbsam_nua.
These two backends accept 'non unix accounts', where the user does *not* exist
in /etc/passwd. These accounts' don't have UIDs in the unix sense, but to
avoid conflicts in the algroitmic mapping of RIDs, they use the values
specified in the 'non unix account range' paramter - in the same way as the
winbind ranges are specifed.
While I was at it, I cleaned up some of the code in pdb_tdb (code copied
directly from smbpasswd and not really considered properly). Most of this was
to do with % macro expansion on stored data. It isn't easy to get the macros
into the tdb, and the first password change will 'expand' them. tdbsam needs
to use a similar system to pdb_ldap in this regard.
This patch only makes minor adjustments to pdb_nisplus and pdb_ldap, becouse I
don't have the test facilities for these. I plan to incoroprate at least
pdb_ldap into this scheme after consultation with Jerry.
Each (converted) passdb module now no longer has any 'static' variables, and
only exports 1 init function outside its .c file.
The non-unix-account support in this patch has been proven! It is now possible
to join a win2k machine to a Samba PDC without an account in /etc/passwd!
Other changes:
Minor interface adjustments:
pdb_delete_sam_account() now takes a SAM_ACCOUNT, not a char*.
pdb_update_sam_account() no longer takes the 'override' argument that was being
ignored so often (every other passdb backend). Extra checks have been added in
some places.
Minor code changes:
smbpasswd no longer attempts to initialise the passdb at startup, this is
now done on first use.
pdbedit has lost some of its 'machine account' logic, as this behaviour is now
controlled by the passdb subsystem directly.
The samr subsystem no longer calls 'local password change', but does the pdb
interactions directly. This allow the ACB_ flags specifed to be transferred
direct to the backend, without interference.
Doco:
I've updated the doco to reflect some of the changes, and removed some paramters
no longer applicable to HEAD.
(This used to be commit ff354c99c585068af6dc1ff35a1f109a806b326b)
2002-01-20 17:30:58 +03:00
}
sname = pdb_get_username ( sam_acct ) ;
2006-02-04 01:19:41 +03:00
DEBUG ( 3 , ( " ldapsam_delete_sam_account: Deleting user %s from "
" LDAP. \n " , sname ) ) ;
2001-09-26 00:21:21 +04:00
2006-02-04 01:19:41 +03:00
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
DEBUG ( 0 , ( " talloc_new failed \n " ) ) ;
goto done ;
}
2003-05-14 07:32:20 +04:00
2006-02-04 01:19:41 +03:00
attr_list = get_userattr_delete_list ( mem_ctx , priv - > schema_ver ) ;
if ( attr_list = = NULL ) {
goto done ;
2002-11-27 00:00:18 +03:00
}
2006-02-04 01:19:41 +03:00
rc = ldapsam_search_suffix_by_name ( priv , sname , & msg , attr_list ) ;
if ( ( rc ! = LDAP_SUCCESS ) | |
( ldap_count_entries ( priv2ld ( priv ) , msg ) ! = 1 ) | |
( ( entry = ldap_first_entry ( priv2ld ( priv ) , msg ) ) = = NULL ) ) {
DEBUG ( 5 , ( " Could not find user %s \n " , sname ) ) ;
result = NT_STATUS_NO_SUCH_USER ;
goto done ;
2003-05-14 07:32:20 +04:00
}
2009-05-31 13:14:06 +04:00
2006-02-04 01:19:41 +03:00
rc = ldapsam_delete_entry (
priv , mem_ctx , entry ,
priv - > schema_ver = = SCHEMAVER_SAMBASAMACCOUNT ?
2012-06-22 18:27:56 +04:00
LDAP_OBJ_SAMBASAMACCOUNT : 0 ,
2006-02-04 01:19:41 +03:00
attr_list ) ;
2002-11-27 00:00:18 +03:00
2006-02-04 01:19:41 +03:00
result = ( rc = = LDAP_SUCCESS ) ?
NT_STATUS_OK : NT_STATUS_ACCESS_DENIED ;
2003-05-14 07:32:20 +04:00
2006-02-04 01:19:41 +03:00
done :
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( mem_ctx ) ;
2006-02-04 01:19:41 +03:00
return result ;
2001-09-26 00:21:21 +04:00
}
/**********************************************************************
2006-02-20 23:09:36 +03:00
Update struct samu .
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-09-11 02:33:06 +04:00
2006-02-20 23:09:36 +03:00
static NTSTATUS ldapsam_update_sam_account ( struct pdb_methods * my_methods , struct samu * newpwd )
2001-09-26 00:21:21 +04:00
{
2002-09-26 22:58:34 +04:00
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL ;
2002-07-15 14:35:28 +04:00
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
2003-09-11 02:33:06 +04:00
int rc = 0 ;
2001-09-26 00:21:21 +04:00
char * dn ;
2003-11-14 06:28:03 +03:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
LDAPMod * * mods = NULL ;
2005-02-17 17:27:34 +03:00
const char * * attr_list ;
2001-09-26 00:21:21 +04:00
2006-07-11 22:01:26 +04:00
result = ( LDAPMessage * ) pdb_get_backend_private_data ( newpwd , my_methods ) ;
2003-07-05 13:46:12 +04:00
if ( ! result ) {
2006-02-04 01:19:41 +03:00
attr_list = get_userattr_list ( NULL , ldap_state - > schema_ver ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( pdb_get_username ( newpwd ) = = NULL ) {
return NT_STATUS_INVALID_PARAMETER ;
}
2003-07-05 13:46:12 +04:00
rc = ldapsam_search_suffix_by_name ( ldap_state , pdb_get_username ( newpwd ) , & result , attr_list ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( attr_list ) ;
2003-07-05 14:39:41 +04:00
if ( rc ! = LDAP_SUCCESS ) {
2003-07-05 13:46:12 +04:00
return NT_STATUS_UNSUCCESSFUL ;
2003-07-05 14:39:41 +04:00
}
2006-02-04 01:19:41 +03:00
pdb_set_backend_private_data ( newpwd , result , NULL ,
my_methods , PDB_CHANGED ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( newpwd , result ) ;
2003-07-05 13:46:12 +04:00
}
2001-09-26 00:21:21 +04:00
2003-06-21 04:45:03 +04:00
if ( ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , result ) = = 0 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_update_sam_account: No user to modify! \n " ) ) ;
2002-11-02 06:47:48 +03:00
return NT_STATUS_UNSUCCESSFUL ;
2002-03-02 13:16:28 +03:00
}
2001-09-26 00:21:21 +04:00
2003-06-21 04:45:03 +04:00
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2009-05-05 20:50:48 +04:00
dn = smbldap_talloc_dn ( talloc_tos ( ) , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
2003-09-11 02:33:06 +04:00
if ( ! dn ) {
return NT_STATUS_UNSUCCESSFUL ;
}
2003-03-22 22:16:36 +03:00
2003-09-11 02:33:06 +04:00
DEBUG ( 4 , ( " ldapsam_update_sam_account: user %s to be modified has dn: %s \n " , pdb_get_username ( newpwd ) , dn ) ) ;
2003-07-05 14:39:41 +04:00
2003-03-27 17:31:46 +03:00
if ( ! init_ldap_from_sam ( ldap_state , entry , & mods , newpwd ,
2011-08-11 09:39:47 +04:00
pdb_element_is_changed ) ) {
2003-03-22 22:16:36 +03:00
DEBUG ( 0 , ( " ldapsam_update_sam_account: init_ldap_from_sam failed! \n " ) ) ;
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( dn ) ;
2003-11-14 06:28:03 +03:00
if ( mods ! = NULL )
ldap_mods_free ( mods , True ) ;
2003-03-22 22:16:36 +03:00
return NT_STATUS_UNSUCCESSFUL ;
}
2008-03-14 20:01:06 +03:00
if ( ( lp_ldap_passwd_sync ( ) ! = LDAP_PASSWD_SYNC_ONLY )
& & ( mods = = NULL ) ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 4 , ( " ldapsam_update_sam_account: mods is empty: nothing to update for user: %s \n " ,
2003-03-22 22:16:36 +03:00
pdb_get_username ( newpwd ) ) ) ;
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( dn ) ;
2003-03-22 22:16:36 +03:00
return NT_STATUS_OK ;
}
2009-05-31 13:14:06 +04:00
2011-08-11 09:39:47 +04:00
ret = ldapsam_modify_entry ( my_methods , newpwd , dn , mods , LDAP_MOD_REPLACE , pdb_element_is_changed ) ;
2008-03-14 20:01:06 +03:00
if ( mods ! = NULL ) {
ldap_mods_free ( mods , True ) ;
}
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( dn ) ;
2003-03-22 22:16:36 +03:00
2006-06-21 00:05:39 +04:00
/*
* We need to set the backend private data to NULL here . For example
* setuserinfo level 25 does a pdb_update_sam_account twice on the
* same one , and with the explicit delete / add logic for attribute
* values the second time we would use the wrong " old " value which
* does not exist in LDAP anymore . Thus the LDAP server would refuse
* the update .
* The existing LDAPMessage is still being auto - freed by the
* destructor .
*/
pdb_set_backend_private_data ( newpwd , NULL , NULL , my_methods ,
PDB_CHANGED ) ;
2003-03-28 12:59:11 +03:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2002-09-26 22:58:34 +04:00
return ret ;
2001-09-26 00:21:21 +04:00
}
2003-09-11 02:33:06 +04:00
DEBUG ( 2 , ( " ldapsam_update_sam_account: successfully modified uid = %s in the LDAP database \n " ,
2003-03-22 22:16:36 +03:00
pdb_get_username ( newpwd ) ) ) ;
2002-09-26 22:58:34 +04:00
return NT_STATUS_OK ;
2001-09-26 00:21:21 +04:00
}
2005-10-21 00:40:47 +04:00
/***************************************************************************
2006-02-20 23:09:36 +03:00
Renames a struct samu
2005-10-21 00:40:47 +04:00
- The " rename user script " has full responsibility for changing everything
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2009-06-24 02:33:44 +04:00
static NTSTATUS ldapsam_del_groupmem ( struct pdb_methods * my_methods ,
TALLOC_CTX * tmp_ctx ,
2010-05-21 04:38:04 +04:00
uint32_t group_rid ,
uint32_t member_rid ) ;
2009-06-24 02:33:44 +04:00
static NTSTATUS ldapsam_enum_group_memberships ( struct pdb_methods * methods ,
TALLOC_CTX * mem_ctx ,
struct samu * user ,
2010-05-21 05:25:01 +04:00
struct dom_sid * * pp_sids ,
2009-06-24 02:33:44 +04:00
gid_t * * pp_gids ,
2011-02-21 12:30:28 +03:00
uint32_t * p_num_groups ) ;
2009-06-24 02:33:44 +04:00
2005-10-21 00:40:47 +04:00
static NTSTATUS ldapsam_rename_sam_account ( struct pdb_methods * my_methods ,
2007-11-15 03:05:42 +03:00
struct samu * old_acct ,
2005-10-21 00:40:47 +04:00
const char * newname )
{
const char * oldname ;
int rc ;
2007-11-15 03:05:42 +03:00
char * rename_script = NULL ;
2006-07-20 00:59:04 +04:00
fstring oldname_lower , newname_lower ;
2005-10-21 00:40:47 +04:00
if ( ! old_acct ) {
DEBUG ( 0 , ( " ldapsam_rename_sam_account: old_acct was NULL! \n " ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
if ( ! newname ) {
DEBUG ( 0 , ( " ldapsam_rename_sam_account: newname was NULL! \n " ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
2007-11-15 03:05:42 +03:00
2005-10-21 00:40:47 +04:00
oldname = pdb_get_username ( old_acct ) ;
2007-11-15 03:05:42 +03:00
/* rename the posix user */
2012-07-18 09:37:23 +04:00
rename_script = lp_renameuser_script ( talloc_tos ( ) ) ;
2008-01-10 00:09:55 +03:00
if ( rename_script = = NULL ) {
2007-11-15 03:05:42 +03:00
return NT_STATUS_NO_MEMORY ;
}
2005-10-21 00:40:47 +04:00
2007-11-15 03:05:42 +03:00
if ( ! ( * rename_script ) ) {
2012-01-27 05:10:44 +04:00
TALLOC_FREE ( rename_script ) ;
2005-10-21 00:40:47 +04:00
return NT_STATUS_ACCESS_DENIED ;
2007-11-15 03:05:42 +03:00
}
2005-10-21 00:40:47 +04:00
2007-11-15 03:05:42 +03:00
DEBUG ( 3 , ( " ldapsam_rename_sam_account: Renaming user %s to %s. \n " ,
2005-10-21 00:40:47 +04:00
oldname , newname ) ) ;
2006-07-20 00:59:04 +04:00
/* We have to allow the account name to end with a '$'.
Also , follow the semantics in _samr_create_user ( ) and lower case the
posix name but preserve the case in passdb */
fstrcpy ( oldname_lower , oldname ) ;
2012-08-09 04:01:00 +04:00
if ( ! strlower_m ( oldname_lower ) ) {
return NT_STATUS_INVALID_PARAMETER ;
}
2006-07-20 00:59:04 +04:00
fstrcpy ( newname_lower , newname ) ;
2012-08-09 04:01:00 +04:00
if ( ! strlower_m ( newname_lower ) ) {
return NT_STATUS_INVALID_PARAMETER ;
}
2007-11-15 03:05:42 +03:00
rename_script = realloc_string_sub2 ( rename_script ,
" %unew " ,
newname_lower ,
true ,
true ) ;
2008-12-09 19:28:15 +03:00
if ( ! rename_script ) {
2007-11-15 03:05:42 +03:00
return NT_STATUS_NO_MEMORY ;
}
rename_script = realloc_string_sub2 ( rename_script ,
" %uold " ,
oldname_lower ,
true ,
true ) ;
2005-10-21 00:40:47 +04:00
rc = smbrun ( rename_script , NULL ) ;
2007-11-15 03:05:42 +03:00
DEBUG ( rc ? 0 : 3 , ( " Running the command `%s' gave %d \n " ,
2005-10-21 00:40:47 +04:00
rename_script , rc ) ) ;
2012-01-27 05:10:44 +04:00
TALLOC_FREE ( rename_script ) ;
2007-11-15 03:05:42 +03:00
2006-09-20 04:15:50 +04:00
if ( rc = = 0 ) {
smb_nscd_flush_user_cache ( ) ;
}
2005-10-21 00:40:47 +04:00
if ( rc )
return NT_STATUS_UNSUCCESSFUL ;
return NT_STATUS_OK ;
}
2001-09-26 00:21:21 +04:00
/**********************************************************************
2006-02-20 23:09:36 +03:00
Add struct samu to LDAP .
2001-09-26 00:21:21 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-05-14 07:32:20 +04:00
2006-02-20 23:09:36 +03:00
static NTSTATUS ldapsam_add_sam_account ( struct pdb_methods * my_methods , struct samu * newpwd )
2001-09-26 00:21:21 +04:00
{
2002-09-26 22:58:34 +04:00
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL ;
2002-07-15 14:35:28 +04:00
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
2001-09-26 00:21:21 +04:00
int rc ;
2003-05-14 07:32:20 +04:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
LDAPMod * * mods = NULL ;
2003-09-11 02:33:06 +04:00
int ldap_op = LDAP_MOD_REPLACE ;
2010-05-21 04:38:04 +04:00
uint32_t num_result ;
2005-02-17 17:27:34 +03:00
const char * * attr_list ;
2007-11-15 03:05:42 +03:00
char * escape_user = NULL ;
2003-05-14 07:32:20 +04:00
const char * username = pdb_get_username ( newpwd ) ;
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid = pdb_get_user_sid ( newpwd ) ;
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
char * dn = NULL ;
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
TALLOC_CTX * ctx = talloc_init ( " ldapsam_add_sam_account " ) ;
if ( ! ctx ) {
return NT_STATUS_NO_MEMORY ;
}
2003-05-14 07:32:20 +04:00
2002-03-23 11:32:25 +03:00
if ( ! username | | ! * username ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: Cannot add user without a username! \n " ) ) ;
2007-11-15 03:05:42 +03:00
status = NT_STATUS_INVALID_PARAMETER ;
goto fn_exit ;
2001-09-26 00:21:21 +04:00
}
2003-05-14 07:32:20 +04:00
/* free this list after the second search or in case we exit on failure */
2007-11-15 03:05:42 +03:00
attr_list = get_userattr_list ( ctx , ldap_state - > schema_ver ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
2003-05-14 07:32:20 +04:00
rc = ldapsam_search_suffix_by_name ( ldap_state , username , & result , attr_list ) ;
2002-11-27 00:00:18 +03:00
if ( rc ! = LDAP_SUCCESS ) {
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2002-11-27 00:00:18 +03:00
}
2001-09-26 00:21:21 +04:00
2003-06-21 04:45:03 +04:00
if ( ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , result ) ! = 0 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: User '%s' already in the base, with samba attributes \n " ,
2003-02-01 10:59:29 +03:00
username ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2001-09-26 00:21:21 +04:00
}
ldap_msgfree ( result ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
result = NULL ;
2011-08-11 09:39:47 +04:00
if ( pdb_element_is_set_or_changed ( newpwd , PDB_USERSID ) ) {
2007-11-15 03:05:42 +03:00
rc = ldapsam_get_ldap_user_by_sid ( ldap_state ,
sid , & result ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( rc = = LDAP_SUCCESS ) {
if ( ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , result ) ! = 0 ) {
2007-12-15 23:11:36 +03:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: SID '%s' "
" already in the base, with samba "
" attributes \n " , sid_string_dbg ( sid ) ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
ldap_msgfree ( result ) ;
2007-11-15 03:05:42 +03:00
result = NULL ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
}
2001-09-26 00:21:21 +04:00
2003-07-05 14:39:41 +04:00
/* does the entry already exist but without a samba attributes?
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
we need to return the samba attributes here */
2007-11-15 03:05:42 +03:00
2009-07-10 00:03:52 +04:00
escape_user = escape_ldap_string ( talloc_tos ( ) , username ) ;
2007-11-15 03:05:42 +03:00
filter = talloc_strdup ( attr_list , " (uid=%u) " ) ;
if ( ! filter ) {
status = NT_STATUS_NO_MEMORY ;
goto fn_exit ;
}
filter = talloc_all_string_sub ( attr_list , filter , " %u " , escape_user ) ;
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_user ) ;
2007-11-15 03:05:42 +03:00
if ( ! filter ) {
status = NT_STATUS_NO_MEMORY ;
goto fn_exit ;
}
2003-05-14 07:32:20 +04:00
2007-11-15 03:05:42 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state ,
2003-06-21 04:45:03 +04:00
filter , attr_list , & result ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( rc ! = LDAP_SUCCESS ) {
2007-11-15 03:05:42 +03:00
goto fn_exit ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
2002-11-27 00:00:18 +03:00
2003-06-21 04:45:03 +04:00
num_result = ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2007-11-15 03:05:42 +03:00
2001-12-31 03:06:51 +03:00
if ( num_result > 1 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: More than one user with that uid exists: bailing out! \n " ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2001-12-31 03:06:51 +03:00
}
2007-11-15 03:05:42 +03:00
2001-12-31 03:06:51 +03:00
/* Check if we need to update an existing entry */
if ( num_result = = 1 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 3 , ( " ldapsam_add_sam_account: User exists without samba attributes: adding them \n " ) ) ;
2001-09-26 00:21:21 +04:00
ldap_op = LDAP_MOD_REPLACE ;
2003-06-21 04:45:03 +04:00
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2009-03-18 07:29:02 +03:00
dn = smbldap_talloc_dn ( ctx , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
2007-11-15 03:05:42 +03:00
if ( ! dn ) {
status = NT_STATUS_NO_MEMORY ;
goto fn_exit ;
}
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
} else if ( ldap_state - > schema_ver = = SCHEMAVER_SAMBASAMACCOUNT ) {
/* There might be a SID for this account already - say an idmap entry */
2007-11-15 03:05:42 +03:00
filter = talloc_asprintf ( ctx ,
" (&(%s=%s)(|(objectClass=%s)(objectClass=%s))) " ,
get_userattr_key2string ( ldap_state - > schema_ver ,
LDAP_ATTR_USER_SID ) ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( ctx , sid ) ,
2007-11-15 03:05:42 +03:00
LDAP_OBJ_IDMAP_ENTRY ,
LDAP_OBJ_SID_ENTRY ) ;
if ( ! filter ) {
status = NT_STATUS_NO_MEMORY ;
goto fn_exit ;
}
2003-11-14 06:28:03 +03:00
/* free old result before doing a new search */
if ( result ! = NULL ) {
ldap_msgfree ( result ) ;
result = NULL ;
}
2007-11-15 03:05:42 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state ,
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
filter , attr_list , & result ) ;
2007-11-15 03:05:42 +03:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( rc ! = LDAP_SUCCESS ) {
2007-11-15 03:05:42 +03:00
goto fn_exit ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
2007-11-15 03:05:42 +03:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
num_result = ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2007-11-15 03:05:42 +03:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( num_result > 1 ) {
2006-03-05 20:49:30 +03:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: More than one user with specified Sid exists: bailing out! \n " ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
2007-11-15 03:05:42 +03:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
/* Check if we need to update an existing entry */
if ( num_result = = 1 ) {
2007-11-15 03:05:42 +03:00
2003-09-11 02:33:06 +04:00
DEBUG ( 3 , ( " ldapsam_add_sam_account: User exists without samba attributes: adding them \n " ) ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
ldap_op = LDAP_MOD_REPLACE ;
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , result ) ;
2009-03-18 07:29:02 +03:00
dn = smbldap_talloc_dn ( ctx , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
2007-11-15 03:05:42 +03:00
if ( ! dn ) {
status = NT_STATUS_NO_MEMORY ;
goto fn_exit ;
}
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
}
2003-07-15 21:00:11 +04:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( num_result = = 0 ) {
2007-03-01 03:49:28 +03:00
char * escape_username ;
2001-12-31 03:06:51 +03:00
/* Check if we need to add an entry */
2003-09-11 02:33:06 +04:00
DEBUG ( 3 , ( " ldapsam_add_sam_account: Adding new user \n " ) ) ;
2001-12-31 03:06:51 +03:00
ldap_op = LDAP_MOD_ADD ;
2007-03-01 03:49:28 +03:00
escape_username = escape_rdn_val_string_alloc ( username ) ;
if ( ! escape_username ) {
2007-11-15 03:05:42 +03:00
status = NT_STATUS_NO_MEMORY ;
goto fn_exit ;
2007-03-01 03:49:28 +03:00
}
2002-03-23 11:32:25 +03:00
if ( username [ strlen ( username ) - 1 ] = = ' $ ' ) {
2007-11-15 03:05:42 +03:00
dn = talloc_asprintf ( ctx ,
" uid=%s,%s " ,
escape_username ,
2012-07-18 09:37:23 +04:00
lp_ldap_machine_suffix ( talloc_tos ( ) ) ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
} else {
2007-11-15 03:05:42 +03:00
dn = talloc_asprintf ( ctx ,
" uid=%s,%s " ,
escape_username ,
2012-07-18 09:37:23 +04:00
lp_ldap_user_suffix ( talloc_tos ( ) ) ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
2007-03-01 03:49:28 +03:00
SAFE_FREE ( escape_username ) ;
2007-11-15 03:05:42 +03:00
if ( ! dn ) {
status = NT_STATUS_NO_MEMORY ;
goto fn_exit ;
}
2001-09-26 00:21:21 +04:00
}
2003-03-27 17:31:46 +03:00
if ( ! init_ldap_from_sam ( ldap_state , entry , & mods , newpwd ,
2011-08-11 09:39:47 +04:00
pdb_element_is_set_or_changed ) ) {
2002-03-02 13:16:28 +03:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: init_ldap_from_sam failed! \n " ) ) ;
2007-11-15 03:05:42 +03:00
if ( mods ! = NULL ) {
ldap_mods_free ( mods , true ) ;
}
goto fn_exit ;
2002-03-02 13:16:28 +03:00
}
2003-03-22 22:16:36 +03:00
2002-11-02 06:47:48 +03:00
if ( mods = = NULL ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: mods is empty: nothing to add for user: %s \n " , pdb_get_username ( newpwd ) ) ) ;
2007-11-15 03:05:42 +03:00
goto fn_exit ;
2002-11-27 00:00:18 +03:00
}
2003-09-11 02:33:06 +04:00
switch ( ldap_state - > schema_ver ) {
2003-05-14 07:32:20 +04:00
case SCHEMAVER_SAMBASAMACCOUNT :
2003-06-21 04:45:03 +04:00
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectclass " , LDAP_OBJ_SAMBASAMACCOUNT ) ;
2003-05-14 07:32:20 +04:00
break ;
default :
DEBUG ( 0 , ( " ldapsam_add_sam_account: invalid schema version specified \n " ) ) ;
break ;
}
2001-09-26 00:21:21 +04:00
2011-08-11 09:39:47 +04:00
ret = ldapsam_modify_entry ( my_methods , newpwd , dn , mods , ldap_op , pdb_element_is_set_or_changed ) ;
2003-06-22 14:09:52 +04:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ldapsam_add_sam_account: failed to modify/add user with uid = %s (dn = %s) \n " ,
2002-11-02 06:47:48 +03:00
pdb_get_username ( newpwd ) , dn ) ) ;
2007-11-15 03:05:42 +03:00
ldap_mods_free ( mods , true ) ;
goto fn_exit ;
2001-09-26 00:21:21 +04:00
}
2002-09-25 19:19:00 +04:00
2003-09-11 02:33:06 +04:00
DEBUG ( 2 , ( " ldapsam_add_sam_account: added: uid == %s in the LDAP database \n " , pdb_get_username ( newpwd ) ) ) ;
2007-11-15 03:05:42 +03:00
ldap_mods_free ( mods , true ) ;
status = NT_STATUS_OK ;
fn_exit :
TALLOC_FREE ( ctx ) ;
if ( result ) {
ldap_msgfree ( result ) ;
}
return status ;
2001-09-26 00:21:21 +04:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-03-19 12:43:23 +03:00
static int ldapsam_search_one_group ( struct ldapsam_privates * ldap_state ,
const char * filter ,
LDAPMessage * * result )
{
int scope = LDAP_SCOPE_SUBTREE ;
int rc ;
2005-02-17 17:27:34 +03:00
const char * * attr_list ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
attr_list = get_attr_list ( NULL , groupmap_attr_list ) ;
2007-11-15 03:05:42 +03:00
rc = smbldap_search ( ldap_state - > smbldap_state ,
2012-07-18 09:37:23 +04:00
lp_ldap_suffix ( talloc_tos ( ) ) , scope ,
2003-05-14 07:32:20 +04:00
filter , attr_list , 0 , result ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( attr_list ) ;
2003-03-19 12:43:23 +03:00
return rc ;
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
static bool init_group_from_ldap ( struct ldapsam_privates * ldap_state ,
2003-03-19 12:43:23 +03:00
GROUP_MAP * map , LDAPMessage * entry )
{
2007-11-15 03:05:42 +03:00
char * temp = NULL ;
TALLOC_CTX * ctx = talloc_init ( " init_group_from_ldap " ) ;
2003-03-19 12:43:23 +03:00
if ( ldap_state = = NULL | | map = = NULL | | entry = = NULL | |
2003-09-11 02:33:06 +04:00
ldap_state - > smbldap_state - > ldap_struct = = NULL ) {
2003-03-19 12:43:23 +03:00
DEBUG ( 0 , ( " init_group_from_ldap: NULL parameters found! \n " ) ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return false ;
2003-03-19 12:43:23 +03:00
}
2007-11-15 03:05:42 +03:00
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_GIDNUMBER ) ,
ctx ) ;
if ( ! temp ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " init_group_from_ldap: Mandatory attribute %s not found \n " ,
2003-05-14 09:28:16 +04:00
get_attr_key2string ( groupmap_attr_list , LDAP_ATTR_GIDNUMBER ) ) ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return false ;
2003-03-19 12:43:23 +03:00
}
2003-09-11 02:33:06 +04:00
DEBUG ( 2 , ( " init_group_from_ldap: Entry found for group: %s \n " , temp ) ) ;
2003-03-19 12:43:23 +03:00
2003-03-23 11:41:05 +03:00
map - > gid = ( gid_t ) atol ( temp ) ;
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( temp ) ;
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_GROUP_SID ) ,
ctx ) ;
if ( ! temp ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " init_group_from_ldap: Mandatory attribute %s not found \n " ,
2003-05-14 09:28:16 +04:00
get_attr_key2string ( groupmap_attr_list , LDAP_ATTR_GROUP_SID ) ) ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return false ;
2003-03-19 12:43:23 +03:00
}
2007-11-15 03:05:42 +03:00
2003-12-26 06:14:31 +03:00
if ( ! string_to_sid ( & map - > sid , temp ) ) {
DEBUG ( 1 , ( " SID string [%s] could not be read as a valid SID \n " , temp ) ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return false ;
2003-12-26 06:14:31 +03:00
}
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( temp ) ;
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_GROUP_TYPE ) ,
ctx ) ;
if ( ! temp ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " init_group_from_ldap: Mandatory attribute %s not found \n " ,
2003-05-14 09:28:16 +04:00
get_attr_key2string ( groupmap_attr_list , LDAP_ATTR_GROUP_TYPE ) ) ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return false ;
2003-03-19 12:43:23 +03:00
}
2006-09-08 18:28:06 +04:00
map - > sid_name_use = ( enum lsa_SidType ) atol ( temp ) ;
2003-03-19 12:43:23 +03:00
if ( ( map - > sid_name_use < SID_NAME_USER ) | |
2003-09-11 02:33:06 +04:00
( map - > sid_name_use > SID_NAME_UNKNOWN ) ) {
DEBUG ( 0 , ( " init_group_from_ldap: Unknown Group type: %d \n " , map - > sid_name_use ) ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return false ;
2003-03-19 12:43:23 +03:00
}
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( temp ) ;
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_DISPLAY_NAME ) ,
ctx ) ;
if ( ! temp ) {
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_CN ) ,
ctx ) ;
if ( ! temp ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " init_group_from_ldap: Attributes cn not found either \
for gidNumber ( % lu ) \ n " ,(unsigned long)map->gid)) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return false ;
2003-03-23 11:41:05 +03:00
}
2003-03-19 12:43:23 +03:00
}
2011-09-27 01:55:47 +04:00
map - > nt_name = talloc_strdup ( map , temp ) ;
if ( ! map - > nt_name ) {
TALLOC_FREE ( ctx ) ;
return false ;
}
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( temp ) ;
temp = smbldap_talloc_single_attribute (
ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_DESC ) ,
ctx ) ;
if ( ! temp ) {
temp = talloc_strdup ( ctx , " " ) ;
if ( ! temp ) {
TALLOC_FREE ( ctx ) ;
return false ;
}
2003-03-19 12:43:23 +03:00
}
2011-09-27 01:55:47 +04:00
map - > comment = talloc_strdup ( map , temp ) ;
if ( ! map - > comment ) {
TALLOC_FREE ( ctx ) ;
return false ;
}
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
if ( lp_parm_bool ( - 1 , " ldapsam " , " trusted " , false ) ) {
2012-03-23 14:11:33 +04:00
struct unixid id ;
id . id = map - > gid ;
id . type = ID_TYPE_GID ;
idmap_cache_set_sid2unixid ( & map - > sid , & id ) ;
2003-03-19 12:43:23 +03:00
}
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( ctx ) ;
return true ;
2003-03-19 12:43:23 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-03-19 12:43:23 +03:00
static NTSTATUS ldapsam_getgroup ( struct pdb_methods * methods ,
const char * filter ,
GROUP_MAP * map )
{
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
2003-11-14 06:28:03 +03:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
2003-03-19 12:43:23 +03:00
int count ;
if ( ldapsam_search_one_group ( ldap_state , filter , & result )
! = LDAP_SUCCESS ) {
return NT_STATUS_NO_SUCH_GROUP ;
}
2006-02-04 01:19:41 +03:00
count = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
2003-03-19 12:43:23 +03:00
if ( count < 1 ) {
2007-11-26 16:30:50 +03:00
DEBUG ( 4 , ( " ldapsam_getgroup: Did not find group, filter was "
" %s \n " , filter ) ) ;
2003-07-15 21:00:11 +04:00
ldap_msgfree ( result ) ;
2003-03-19 12:43:23 +03:00
return NT_STATUS_NO_SUCH_GROUP ;
}
if ( count > 1 ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 1 , ( " ldapsam_getgroup: Duplicate entries for filter %s: "
" count=%d \n " , filter , count ) ) ;
2003-07-15 21:00:11 +04:00
ldap_msgfree ( result ) ;
2003-03-19 12:43:23 +03:00
return NT_STATUS_NO_SUCH_GROUP ;
}
2006-02-04 01:19:41 +03:00
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
2003-03-19 12:43:23 +03:00
if ( ! entry ) {
ldap_msgfree ( result ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
if ( ! init_group_from_ldap ( ldap_state , map , entry ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 1 , ( " ldapsam_getgroup: init_group_from_ldap failed for "
" group filter %s \n " , filter ) ) ;
2003-03-19 12:43:23 +03:00
ldap_msgfree ( result ) ;
return NT_STATUS_NO_SUCH_GROUP ;
}
ldap_msgfree ( result ) ;
return NT_STATUS_OK ;
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-11-10 02:28:40 +03:00
static NTSTATUS ldapsam_getgrsid ( struct pdb_methods * methods , GROUP_MAP * map ,
2010-05-21 05:25:01 +04:00
struct dom_sid sid )
2002-11-02 06:47:48 +03:00
{
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
NTSTATUS status ;
2007-12-16 00:00:39 +03:00
fstring tmp ;
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
if ( asprintf ( & filter , " (&(objectClass=%s)(%s=%s)) " ,
LDAP_OBJ_GROUPMAP ,
2003-05-14 09:28:16 +04:00
get_attr_key2string ( groupmap_attr_list , LDAP_ATTR_GROUP_SID ) ,
2007-12-16 00:47:30 +03:00
sid_to_fstring ( tmp , & sid ) ) < 0 ) {
2007-11-15 03:05:42 +03:00
return NT_STATUS_NO_MEMORY ;
}
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
status = ldapsam_getgroup ( methods , filter , map ) ;
SAFE_FREE ( filter ) ;
return status ;
2002-11-02 06:47:48 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-11-10 02:28:40 +03:00
static NTSTATUS ldapsam_getgrgid ( struct pdb_methods * methods , GROUP_MAP * map ,
2003-06-18 19:24:10 +04:00
gid_t gid )
2002-11-02 06:47:48 +03:00
{
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
NTSTATUS status ;
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
if ( asprintf ( & filter , " (&(objectClass=%s)(%s=%lu)) " ,
2003-05-14 09:28:16 +04:00
LDAP_OBJ_GROUPMAP ,
get_attr_key2string ( groupmap_attr_list , LDAP_ATTR_GIDNUMBER ) ,
2007-11-15 03:05:42 +03:00
( unsigned long ) gid ) < 0 ) {
return NT_STATUS_NO_MEMORY ;
}
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
status = ldapsam_getgroup ( methods , filter , map ) ;
SAFE_FREE ( filter ) ;
return status ;
2002-11-02 06:47:48 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-11-10 02:28:40 +03:00
static NTSTATUS ldapsam_getgrnam ( struct pdb_methods * methods , GROUP_MAP * map ,
2003-06-18 19:24:10 +04:00
const char * name )
2002-11-02 06:47:48 +03:00
{
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
2009-07-10 00:03:52 +04:00
char * escape_name = escape_ldap_string ( talloc_tos ( ) , name ) ;
2007-11-15 03:05:42 +03:00
NTSTATUS status ;
2003-03-19 12:43:23 +03:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( ! escape_name ) {
return NT_STATUS_NO_MEMORY ;
}
2003-03-19 12:43:23 +03:00
2007-11-15 03:05:42 +03:00
if ( asprintf ( & filter , " (&(objectClass=%s)(|(%s=%s)(%s=%s))) " ,
2003-05-14 09:28:16 +04:00
LDAP_OBJ_GROUPMAP ,
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
get_attr_key2string ( groupmap_attr_list , LDAP_ATTR_DISPLAY_NAME ) , escape_name ,
2007-11-15 03:05:42 +03:00
get_attr_key2string ( groupmap_attr_list , LDAP_ATTR_CN ) ,
escape_name ) < 0 ) {
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_name ) ;
2007-11-15 03:05:42 +03:00
return NT_STATUS_NO_MEMORY ;
}
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_name ) ;
2007-11-15 03:05:42 +03:00
status = ldapsam_getgroup ( methods , filter , map ) ;
SAFE_FREE ( filter ) ;
return status ;
2003-03-19 12:43:23 +03:00
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_extract_rid_from_entry ( LDAP * ldap_struct ,
2005-03-22 23:50:29 +03:00
LDAPMessage * entry ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * domain_sid ,
2010-05-21 04:38:04 +04:00
uint32_t * rid )
2005-03-22 23:50:29 +03:00
{
fstring str ;
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2005-03-22 23:50:29 +03:00
if ( ! smbldap_get_single_attribute ( ldap_struct , entry , " sambaSID " ,
str , sizeof ( str ) - 1 ) ) {
DEBUG ( 10 , ( " Could not find sambaSID attribute \n " ) ) ;
return False ;
}
if ( ! string_to_sid ( & sid , str ) ) {
DEBUG ( 10 , ( " Could not convert string %s to sid \n " , str ) ) ;
return False ;
}
2010-08-26 17:48:50 +04:00
if ( dom_sid_compare_domain ( & sid , domain_sid ) ! = 0 ) {
2005-03-22 23:50:29 +03:00
DEBUG ( 10 , ( " SID %s is not in expected domain %s \n " ,
2007-12-15 23:11:36 +03:00
str , sid_string_dbg ( domain_sid ) ) ) ;
2005-03-22 23:50:29 +03:00
return False ;
}
if ( ! sid_peek_rid ( & sid , rid ) ) {
DEBUG ( 10 , ( " Could not peek into RID \n " ) ) ;
return False ;
}
return True ;
}
2005-02-20 16:47:16 +03:00
static NTSTATUS ldapsam_enum_group_members ( struct pdb_methods * methods ,
TALLOC_CTX * mem_ctx ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * group ,
2010-05-21 04:38:04 +04:00
uint32_t * * pp_member_rids ,
2005-10-18 07:24:00 +04:00
size_t * p_num_members )
2005-02-20 16:47:16 +03:00
{
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
struct smbldap_state * conn = ldap_state - > smbldap_state ;
2006-03-01 23:47:36 +03:00
const char * id_attrs [ ] = { " memberUid " , " gidNumber " , NULL } ;
const char * sid_attrs [ ] = { " sambaSID " , NULL } ;
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL ;
LDAPMessage * result = NULL ;
2005-02-20 16:47:16 +03:00
LDAPMessage * entry ;
2006-03-01 23:47:36 +03:00
char * filter ;
2005-02-20 16:47:16 +03:00
char * * values = NULL ;
char * * memberuid ;
2006-03-01 23:47:36 +03:00
char * gidstr ;
int rc , count ;
2005-02-20 16:47:16 +03:00
2005-10-18 07:24:00 +04:00
* pp_member_rids = NULL ;
* p_num_members = 0 ;
2005-02-20 16:47:16 +03:00
2006-03-01 23:47:36 +03:00
filter = talloc_asprintf ( mem_ctx ,
2006-03-05 20:49:30 +03:00
" (&(objectClass=%s) "
" (objectClass=%s) "
2006-03-01 23:47:36 +03:00
" (sambaSID=%s)) " ,
2006-03-05 20:49:30 +03:00
LDAP_OBJ_POSIXGROUP ,
LDAP_OBJ_GROUPMAP ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx , group ) ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( filter = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2005-02-20 16:47:16 +03:00
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( conn , lp_ldap_suffix ( talloc_tos ( ) ) ,
2006-03-01 23:47:36 +03:00
LDAP_SCOPE_SUBTREE , filter , id_attrs , 0 ,
& result ) ;
2005-02-20 16:47:16 +03:00
if ( rc ! = LDAP_SUCCESS )
goto done ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2005-02-20 16:47:16 +03:00
2006-03-01 23:47:36 +03:00
count = ldap_count_entries ( conn - > ldap_struct , result ) ;
2005-02-20 16:47:16 +03:00
if ( count > 1 ) {
DEBUG ( 1 , ( " Found more than one groupmap entry for %s \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( group ) ) ) ;
2006-03-01 23:47:36 +03:00
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
2005-02-20 16:47:16 +03:00
goto done ;
}
if ( count = = 0 ) {
2006-03-01 23:47:36 +03:00
ret = NT_STATUS_NO_SUCH_GROUP ;
2005-02-20 16:47:16 +03:00
goto done ;
}
2006-03-01 23:47:36 +03:00
entry = ldap_first_entry ( conn - > ldap_struct , result ) ;
2005-02-20 16:47:16 +03:00
if ( entry = = NULL )
goto done ;
2006-03-01 23:47:36 +03:00
gidstr = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " gidNumber " , mem_ctx ) ;
if ( ! gidstr ) {
DEBUG ( 0 , ( " ldapsam_enum_group_members: Unable to find the group's gid! \n " ) ) ;
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
2005-02-20 16:47:16 +03:00
goto done ;
}
2006-03-01 23:47:36 +03:00
values = ldap_get_values ( conn - > ldap_struct , entry , " memberUid " ) ;
2009-10-31 02:45:09 +03:00
if ( ( values ! = NULL ) & & ( values [ 0 ] ! = NULL ) ) {
2005-02-20 16:47:16 +03:00
2006-10-05 10:29:06 +04:00
filter = talloc_asprintf ( mem_ctx , " (&(objectClass=%s)(| " , LDAP_OBJ_SAMBASAMACCOUNT ) ;
2006-03-01 23:47:36 +03:00
if ( filter = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
2005-02-20 16:47:16 +03:00
goto done ;
}
2006-03-01 23:47:36 +03:00
for ( memberuid = values ; * memberuid ! = NULL ; memberuid + = 1 ) {
2007-03-01 03:49:28 +03:00
char * escape_memberuid ;
2009-07-10 00:03:52 +04:00
escape_memberuid = escape_ldap_string ( talloc_tos ( ) ,
* memberuid ) ;
2007-03-01 03:49:28 +03:00
if ( escape_memberuid = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2009-05-31 13:14:06 +04:00
2007-09-14 21:42:10 +04:00
filter = talloc_asprintf_append_buffer ( filter , " (uid=%s) " , escape_memberuid ) ;
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_memberuid ) ;
2006-03-01 23:47:36 +03:00
if ( filter = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
}
2007-09-14 21:42:10 +04:00
filter = talloc_asprintf_append_buffer ( filter , " )) " ) ;
2006-03-01 23:47:36 +03:00
if ( filter = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2005-02-20 16:47:16 +03:00
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( conn , lp_ldap_suffix ( talloc_tos ( ) ) ,
2006-03-01 23:47:36 +03:00
LDAP_SCOPE_SUBTREE , filter , sid_attrs , 0 ,
& result ) ;
if ( rc ! = LDAP_SUCCESS )
goto done ;
count = ldap_count_entries ( conn - > ldap_struct , result ) ;
DEBUG ( 10 , ( " ldapsam_enum_group_members: found %d accounts \n " , count ) ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2006-03-01 23:47:36 +03:00
for ( entry = ldap_first_entry ( conn - > ldap_struct , result ) ;
entry ! = NULL ;
entry = ldap_next_entry ( conn - > ldap_struct , entry ) )
{
char * sidstr ;
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2010-05-21 04:38:04 +04:00
uint32_t rid ;
2006-03-01 23:47:36 +03:00
sidstr = smbldap_talloc_single_attribute ( conn - > ldap_struct ,
entry , " sambaSID " ,
mem_ctx ) ;
if ( ! sidstr ) {
2008-07-18 15:15:05 +04:00
DEBUG ( 0 , ( " Severe DB error, %s can't miss the sambaSID "
" attribute \n " , LDAP_OBJ_SAMBASAMACCOUNT ) ) ;
2006-03-01 23:47:36 +03:00
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
goto done ;
}
if ( ! string_to_sid ( & sid , sidstr ) )
goto done ;
2012-07-12 18:00:59 +04:00
if ( ! sid_check_is_in_our_sam ( & sid ) ) {
2006-03-01 23:47:36 +03:00
DEBUG ( 0 , ( " Inconsistent SAM -- group member uid not "
" in our domain \n " ) ) ;
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
goto done ;
}
sid_peek_rid ( & sid , & rid ) ;
2006-12-09 05:58:18 +03:00
if ( ! add_rid_to_array_unique ( mem_ctx , rid , pp_member_rids ,
p_num_members ) ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2006-03-01 23:47:36 +03:00
}
2005-02-20 16:47:16 +03:00
}
2006-03-01 23:47:36 +03:00
filter = talloc_asprintf ( mem_ctx ,
2006-03-05 20:49:30 +03:00
" (&(objectClass=%s) "
" (gidNumber=%s)) " ,
LDAP_OBJ_SAMBASAMACCOUNT ,
gidstr ) ;
2006-03-01 23:47:36 +03:00
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( conn , lp_ldap_suffix ( talloc_tos ( ) ) ,
2006-03-01 23:47:36 +03:00
LDAP_SCOPE_SUBTREE , filter , sid_attrs , 0 ,
& result ) ;
2005-02-20 16:47:16 +03:00
if ( rc ! = LDAP_SUCCESS )
goto done ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2006-03-01 23:47:36 +03:00
for ( entry = ldap_first_entry ( conn - > ldap_struct , result ) ;
2005-02-20 16:47:16 +03:00
entry ! = NULL ;
entry = ldap_next_entry ( conn - > ldap_struct , entry ) )
{
2010-05-21 04:38:04 +04:00
uint32_t rid ;
2005-02-20 16:47:16 +03:00
2006-03-01 23:47:36 +03:00
if ( ! ldapsam_extract_rid_from_entry ( conn - > ldap_struct ,
entry ,
get_global_sam_sid ( ) ,
& rid ) ) {
2008-07-18 15:15:05 +04:00
DEBUG ( 0 , ( " Severe DB error, %s can't miss the samba SID " " attribute \n " , LDAP_OBJ_SAMBASAMACCOUNT ) ) ;
2006-03-01 23:47:36 +03:00
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
2005-02-20 16:47:16 +03:00
goto done ;
}
2006-12-09 05:58:18 +03:00
if ( ! add_rid_to_array_unique ( mem_ctx , rid , pp_member_rids ,
p_num_members ) ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2005-02-20 16:47:16 +03:00
}
2006-03-01 23:47:36 +03:00
ret = NT_STATUS_OK ;
2009-05-31 13:14:06 +04:00
2005-02-20 16:47:16 +03:00
done :
2006-03-01 23:47:36 +03:00
if ( values )
2005-02-20 16:47:16 +03:00
ldap_value_free ( values ) ;
2006-03-01 23:47:36 +03:00
return ret ;
2005-02-20 16:47:16 +03:00
}
2004-11-12 18:49:47 +03:00
static NTSTATUS ldapsam_enum_group_memberships ( struct pdb_methods * methods ,
2006-02-04 01:19:41 +03:00
TALLOC_CTX * mem_ctx ,
2006-02-20 23:09:36 +03:00
struct samu * user ,
2010-05-21 05:25:01 +04:00
struct dom_sid * * pp_sids ,
2006-02-04 01:19:41 +03:00
gid_t * * pp_gids ,
2011-02-21 12:30:28 +03:00
uint32_t * p_num_groups )
2004-11-12 18:49:47 +03:00
{
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
struct smbldap_state * conn = ldap_state - > smbldap_state ;
2006-03-05 20:49:30 +03:00
char * filter ;
2005-02-17 17:27:34 +03:00
const char * attrs [ ] = { " gidNumber " , " sambaSID " , NULL } ;
2004-11-19 14:59:56 +03:00
char * escape_name ;
2006-03-05 20:49:30 +03:00
int rc , count ;
LDAPMessage * result = NULL ;
2004-11-12 18:49:47 +03:00
LDAPMessage * entry ;
2006-03-05 20:49:30 +03:00
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL ;
2010-08-26 14:54:13 +04:00
uint32_t num_sids ;
2011-02-21 12:30:28 +03:00
uint32_t num_gids ;
2006-03-05 20:49:30 +03:00
char * gidstr ;
gid_t primary_gid = - 1 ;
2004-11-12 18:49:47 +03:00
2005-10-18 07:24:00 +04:00
* pp_sids = NULL ;
2004-11-12 18:49:47 +03:00
num_sids = 0 ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( pdb_get_username ( user ) = = NULL ) {
return NT_STATUS_INVALID_PARAMETER ;
}
2009-07-10 00:03:52 +04:00
escape_name = escape_ldap_string ( talloc_tos ( ) , pdb_get_username ( user ) ) ;
2004-11-12 18:49:47 +03:00
if ( escape_name = = NULL )
2004-11-20 00:01:23 +03:00
return NT_STATUS_NO_MEMORY ;
2004-11-12 18:49:47 +03:00
2010-02-05 18:20:21 +03:00
if ( user - > unix_pw ) {
primary_gid = user - > unix_pw - > pw_gid ;
} else {
/* retrieve the users primary gid */
filter = talloc_asprintf ( mem_ctx ,
" (&(objectClass=%s)(uid=%s)) " ,
LDAP_OBJ_SAMBASAMACCOUNT ,
escape_name ) ;
if ( filter = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2006-03-05 20:49:30 +03:00
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( conn , lp_ldap_suffix ( talloc_tos ( ) ) ,
2010-02-05 18:20:21 +03:00
LDAP_SCOPE_SUBTREE , filter , attrs , 0 , & result ) ;
2006-03-05 20:49:30 +03:00
2010-02-05 18:20:21 +03:00
if ( rc ! = LDAP_SUCCESS )
goto done ;
2006-03-05 20:49:30 +03:00
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2006-03-05 20:49:30 +03:00
2010-02-05 18:20:21 +03:00
count = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
2006-03-05 20:49:30 +03:00
2010-02-05 18:20:21 +03:00
switch ( count ) {
case 0 :
DEBUG ( 1 , ( " User account [%s] not found! \n " , pdb_get_username ( user ) ) ) ;
ret = NT_STATUS_NO_SUCH_USER ;
goto done ;
case 1 :
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
2006-03-05 20:49:30 +03:00
2010-02-05 18:20:21 +03:00
gidstr = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " gidNumber " , mem_ctx ) ;
if ( ! gidstr ) {
DEBUG ( 1 , ( " Unable to find the member's gid! \n " ) ) ;
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
goto done ;
}
primary_gid = strtoul ( gidstr , NULL , 10 ) ;
break ;
default :
DEBUG ( 1 , ( " found more than one account with the same user name ?! \n " ) ) ;
2006-03-05 20:49:30 +03:00
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
goto done ;
}
}
filter = talloc_asprintf ( mem_ctx ,
2009-05-12 08:56:57 +04:00
" (&(objectClass=%s)(|(memberUid=%s)(gidNumber=%u))) " ,
LDAP_OBJ_POSIXGROUP , escape_name , ( unsigned int ) primary_gid ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( filter = = NULL ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2004-11-12 18:49:47 +03:00
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( conn , lp_ldap_suffix ( talloc_tos ( ) ) ,
2006-03-05 20:49:30 +03:00
LDAP_SCOPE_SUBTREE , filter , attrs , 0 , & result ) ;
2004-11-12 18:49:47 +03:00
if ( rc ! = LDAP_SUCCESS )
goto done ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2006-03-05 20:49:30 +03:00
2004-11-12 18:49:47 +03:00
num_gids = 0 ;
2005-10-18 07:24:00 +04:00
* pp_gids = NULL ;
2004-11-12 18:49:47 +03:00
num_sids = 0 ;
2005-10-18 07:24:00 +04:00
* pp_sids = NULL ;
2004-11-12 18:49:47 +03:00
/* We need to add the primary group as the first gid/sid */
2006-12-09 05:58:18 +03:00
if ( ! add_gid_to_array_unique ( mem_ctx , primary_gid , pp_gids , & num_gids ) ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2004-11-12 18:49:47 +03:00
/* This sid will be replaced later */
2008-01-09 02:11:31 +03:00
ret = add_sid_to_array_unique ( mem_ctx , & global_sid_NULL , pp_sids ,
& num_sids ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2006-12-09 05:58:18 +03:00
goto done ;
}
2004-11-12 18:49:47 +03:00
2006-03-05 20:49:30 +03:00
for ( entry = ldap_first_entry ( conn - > ldap_struct , result ) ;
2004-11-12 18:49:47 +03:00
entry ! = NULL ;
entry = ldap_next_entry ( conn - > ldap_struct , entry ) )
{
fstring str ;
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2004-11-12 18:49:47 +03:00
gid_t gid ;
char * end ;
if ( ! smbldap_get_single_attribute ( conn - > ldap_struct ,
entry , " sambaSID " ,
str , sizeof ( str ) - 1 ) )
2005-01-19 20:42:33 +03:00
continue ;
2004-11-12 18:49:47 +03:00
if ( ! string_to_sid ( & sid , str ) )
goto done ;
if ( ! smbldap_get_single_attribute ( conn - > ldap_struct ,
entry , " gidNumber " ,
str , sizeof ( str ) - 1 ) )
2005-01-19 20:42:33 +03:00
continue ;
2004-11-12 18:49:47 +03:00
gid = strtoul ( str , & end , 10 ) ;
if ( PTR_DIFF ( end , str ) ! = strlen ( str ) )
goto done ;
if ( gid = = primary_gid ) {
2005-10-18 07:24:00 +04:00
sid_copy ( & ( * pp_sids ) [ 0 ] , & sid ) ;
2004-11-12 18:49:47 +03:00
} else {
2006-12-09 05:58:18 +03:00
if ( ! add_gid_to_array_unique ( mem_ctx , gid , pp_gids ,
& num_gids ) ) {
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2008-01-09 02:11:31 +03:00
ret = add_sid_to_array_unique ( mem_ctx , & sid , pp_sids ,
& num_sids ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2006-12-09 05:58:18 +03:00
goto done ;
}
2004-11-12 18:49:47 +03:00
}
}
2010-08-26 17:48:50 +04:00
if ( dom_sid_compare ( & global_sid_NULL , & ( * pp_sids ) [ 0 ] ) = = 0 ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 3 , ( " primary group of [%s] not found \n " ,
pdb_get_username ( user ) ) ) ;
2012-02-19 15:49:55 +04:00
ret = NT_STATUS_INTERNAL_DB_CORRUPTION ;
2004-11-12 18:49:47 +03:00
goto done ;
}
2005-10-18 07:24:00 +04:00
* p_num_groups = num_sids ;
2004-11-12 18:49:47 +03:00
2006-03-05 20:49:30 +03:00
ret = NT_STATUS_OK ;
2004-11-12 18:49:47 +03:00
done :
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_name ) ;
2006-03-05 20:49:30 +03:00
return ret ;
2004-11-12 18:49:47 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
2006-02-04 01:19:41 +03:00
* Augment a posixGroup object with a sambaGroupMapping domgroup
2003-05-14 07:32:20 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2006-02-04 01:19:41 +03:00
static NTSTATUS ldapsam_map_posixgroup ( TALLOC_CTX * mem_ctx ,
struct ldapsam_privates * ldap_state ,
GROUP_MAP * map )
2003-03-19 12:43:23 +03:00
{
2006-02-04 01:19:41 +03:00
const char * filter , * dn ;
LDAPMessage * msg , * entry ;
LDAPMod * * mods ;
int rc ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
filter = talloc_asprintf ( mem_ctx ,
2008-07-18 15:15:05 +04:00
" (&(objectClass=%s)(gidNumber=%u)) " ,
2009-05-12 08:56:57 +04:00
LDAP_OBJ_POSIXGROUP , ( unsigned int ) map - > gid ) ;
2006-02-04 01:19:41 +03:00
if ( filter = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter ,
get_attr_list ( mem_ctx , groupmap_attr_list ) ,
& msg ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , msg ) ;
2002-11-02 06:47:48 +03:00
2006-02-04 01:19:41 +03:00
if ( ( rc ! = LDAP_SUCCESS ) | |
( ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , msg ) ! = 1 ) | |
( ( entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , msg ) ) = = NULL ) ) {
return NT_STATUS_NO_SUCH_GROUP ;
}
dn = smbldap_talloc_dn ( mem_ctx , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
if ( dn = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
mods = NULL ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectClass " ,
2008-07-18 15:15:05 +04:00
LDAP_OBJ_GROUPMAP ) ;
2006-02-04 01:19:41 +03:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , entry , & mods , " sambaSid " ,
2007-12-15 23:49:15 +03:00
sid_string_talloc ( mem_ctx , & map - > sid ) ) ;
2006-02-04 01:19:41 +03:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , entry , & mods , " sambaGroupType " ,
talloc_asprintf ( mem_ctx , " %d " , map - > sid_name_use ) ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , entry , & mods , " displayName " ,
map - > nt_name ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , entry , & mods , " description " ,
map - > comment ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( mem_ctx , mods ) ;
2006-02-04 01:19:41 +03:00
rc = smbldap_modify ( ldap_state - > smbldap_state , dn , mods ) ;
if ( rc ! = LDAP_SUCCESS ) {
return NT_STATUS_ACCESS_DENIED ;
}
return NT_STATUS_OK ;
}
2003-05-14 07:32:20 +04:00
2002-11-10 02:28:40 +03:00
static NTSTATUS ldapsam_add_group_mapping_entry ( struct pdb_methods * methods ,
2002-11-02 06:47:48 +03:00
GROUP_MAP * map )
{
2003-03-19 12:43:23 +03:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
2006-02-04 01:19:41 +03:00
LDAPMessage * msg = NULL ;
2003-03-19 12:43:23 +03:00
LDAPMod * * mods = NULL ;
2006-02-04 01:19:41 +03:00
const char * attrs [ ] = { NULL } ;
char * filter ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
char * dn ;
TALLOC_CTX * mem_ctx ;
NTSTATUS result ;
2003-03-19 12:43:23 +03:00
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2003-03-19 12:43:23 +03:00
int rc ;
2006-02-04 01:19:41 +03:00
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
DEBUG ( 0 , ( " talloc_new failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
filter = talloc_asprintf ( mem_ctx , " (sambaSid=%s) " ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx , & map - > sid ) ) ;
2006-02-04 01:19:41 +03:00
if ( filter = = NULL ) {
result = NT_STATUS_NO_MEMORY ;
goto done ;
2003-03-19 12:43:23 +03:00
}
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( ldap_state - > smbldap_state , lp_ldap_suffix ( talloc_tos ( ) ) ,
2006-02-04 01:19:41 +03:00
LDAP_SCOPE_SUBTREE , filter , attrs , True , & msg ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , msg ) ;
2003-07-07 09:11:10 +04:00
2006-02-04 01:19:41 +03:00
if ( ( rc = = LDAP_SUCCESS ) & &
( ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , msg ) > 0 ) ) {
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
DEBUG ( 3 , ( " SID %s already present in LDAP, refusing to add "
2007-12-15 23:11:36 +03:00
" group mapping entry \n " , sid_string_dbg ( & map - > sid ) ) ) ;
2006-02-04 01:19:41 +03:00
result = NT_STATUS_GROUP_EXISTS ;
goto done ;
}
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
switch ( map - > sid_name_use ) {
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
case SID_NAME_DOM_GRP :
/* To map a domain group we need to have a posix group
to attach to . */
result = ldapsam_map_posixgroup ( mem_ctx , ldap_state , map ) ;
goto done ;
break ;
case SID_NAME_ALIAS :
2012-07-12 18:00:59 +04:00
if ( ! sid_check_is_in_our_sam ( & map - > sid )
2006-03-15 19:00:34 +03:00
& & ! sid_check_is_in_builtin ( & map - > sid ) )
{
DEBUG ( 3 , ( " Refusing to map sid %s as an alias, not in our domain \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( & map - > sid ) ) ) ;
2006-02-04 01:19:41 +03:00
result = NT_STATUS_INVALID_PARAMETER ;
goto done ;
}
break ;
2003-07-07 09:11:10 +04:00
2006-02-04 01:19:41 +03:00
default :
DEBUG ( 3 , ( " Got invalid use '%s' for mapping \n " ,
sid_type_lookup ( map - > sid_name_use ) ) ) ;
result = NT_STATUS_INVALID_PARAMETER ;
goto done ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
/* Domain groups have been mapped in a separate routine, we have to
* create an alias now */
if ( map - > gid = = - 1 ) {
DEBUG ( 10 , ( " Refusing to map gid==-1 \n " ) ) ;
result = NT_STATUS_INVALID_PARAMETER ;
goto done ;
2003-09-11 02:33:06 +04:00
}
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
if ( pdb_gid_to_sid ( map - > gid , & sid ) ) {
2009-05-12 08:56:57 +04:00
DEBUG ( 3 , ( " Gid %u is already mapped to SID %s, refusing to "
" add \n " , ( unsigned int ) map - > gid , sid_string_dbg ( & sid ) ) ) ;
2006-02-04 01:19:41 +03:00
result = NT_STATUS_GROUP_EXISTS ;
goto done ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
/* Ok, enough checks done. It's still racy to go ahead now, but that's
* the best we can get out of LDAP . */
2003-03-30 20:40:41 +04:00
2006-02-04 01:19:41 +03:00
dn = talloc_asprintf ( mem_ctx , " sambaSid=%s,%s " ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx , & map - > sid ) ,
2012-07-18 09:37:23 +04:00
lp_ldap_group_suffix ( talloc_tos ( ) ) ) ;
2006-02-04 01:19:41 +03:00
if ( dn = = NULL ) {
result = NT_STATUS_NO_MEMORY ;
goto done ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
mods = NULL ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , NULL , & mods , " objectClass " ,
2008-07-18 15:15:05 +04:00
LDAP_OBJ_SID_ENTRY ) ;
2006-02-04 01:19:41 +03:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , NULL , & mods , " objectClass " ,
2008-07-18 15:15:05 +04:00
LDAP_OBJ_GROUPMAP ) ;
2006-02-04 01:19:41 +03:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , NULL , & mods , " sambaSid " ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx , & map - > sid ) ) ;
2006-02-04 01:19:41 +03:00
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , NULL , & mods , " sambaGroupType " ,
talloc_asprintf ( mem_ctx , " %d " , map - > sid_name_use ) ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , NULL , & mods , " displayName " ,
map - > nt_name ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , NULL , & mods , " description " ,
map - > comment ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , NULL , & mods , " gidNumber " ,
2009-05-12 08:56:57 +04:00
talloc_asprintf ( mem_ctx , " %u " , ( unsigned int ) map - > gid ) ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( mem_ctx , mods ) ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
rc = smbldap_add ( ldap_state - > smbldap_state , dn , mods ) ;
result = ( rc = = LDAP_SUCCESS ) ?
NT_STATUS_OK : NT_STATUS_ACCESS_DENIED ;
done :
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( mem_ctx ) ;
2006-02-04 01:19:41 +03:00
return result ;
2002-11-02 06:47:48 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
2006-02-04 01:19:41 +03:00
* Update a group mapping entry . We ' re quite strict about what can be changed :
* Only the description and displayname may be changed . It simply does not
* make any sense to change the SID , gid or the type in a mapping .
2003-05-14 07:32:20 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-11-10 02:28:40 +03:00
static NTSTATUS ldapsam_update_group_mapping_entry ( struct pdb_methods * methods ,
2002-11-02 06:47:48 +03:00
GROUP_MAP * map )
{
2003-03-19 12:43:23 +03:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
int rc ;
2006-02-04 01:19:41 +03:00
const char * filter , * dn ;
LDAPMessage * msg = NULL ;
2003-11-14 06:28:03 +03:00
LDAPMessage * entry = NULL ;
LDAPMod * * mods = NULL ;
2006-02-04 01:19:41 +03:00
TALLOC_CTX * mem_ctx ;
NTSTATUS result ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
DEBUG ( 0 , ( " talloc_new failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
/* Make 100% sure that sid, gid and type are not changed by looking up
* exactly the values we ' re given in LDAP . */
2006-03-05 20:49:30 +03:00
filter = talloc_asprintf ( mem_ctx , " (&(objectClass=%s) "
2006-02-04 01:19:41 +03:00
" (sambaSid=%s)(gidNumber=%u) "
" (sambaGroupType=%d)) " ,
2006-03-05 20:49:30 +03:00
LDAP_OBJ_GROUPMAP ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx , & map - > sid ) ,
2009-05-12 08:56:57 +04:00
( unsigned int ) map - > gid , map - > sid_name_use ) ;
2006-02-04 01:19:41 +03:00
if ( filter = = NULL ) {
result = NT_STATUS_NO_MEMORY ;
goto done ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter ,
get_attr_list ( mem_ctx , groupmap_attr_list ) ,
& msg ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , msg ) ;
2006-02-04 01:19:41 +03:00
if ( ( rc ! = LDAP_SUCCESS ) | |
( ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct , msg ) ! = 1 ) | |
( ( entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct , msg ) ) = = NULL ) ) {
result = NT_STATUS_NO_SUCH_GROUP ;
goto done ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
dn = smbldap_talloc_dn ( mem_ctx , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
2003-03-30 20:40:41 +04:00
2006-02-04 01:19:41 +03:00
if ( dn = = NULL ) {
result = NT_STATUS_NO_MEMORY ;
goto done ;
2003-03-30 20:40:41 +04:00
}
2006-02-04 01:19:41 +03:00
mods = NULL ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , entry , & mods , " displayName " ,
map - > nt_name ) ;
smbldap_make_mod ( ldap_state - > smbldap_state - > ldap_struct , entry , & mods , " description " ,
map - > comment ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( mem_ctx , mods ) ;
2006-02-04 01:19:41 +03:00
2003-03-30 20:40:41 +04:00
if ( mods = = NULL ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 4 , ( " ldapsam_update_group_mapping_entry: mods is empty: "
" nothing to do \n " ) ) ;
result = NT_STATUS_OK ;
goto done ;
2003-03-30 20:40:41 +04:00
}
2003-03-19 12:43:23 +03:00
2003-06-21 04:45:03 +04:00
rc = smbldap_modify ( ldap_state - > smbldap_state , dn , mods ) ;
2003-03-19 12:43:23 +03:00
if ( rc ! = LDAP_SUCCESS ) {
2006-02-04 01:19:41 +03:00
result = NT_STATUS_ACCESS_DENIED ;
goto done ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
DEBUG ( 2 , ( " ldapsam_update_group_mapping_entry: successfully modified "
" group %lu in LDAP \n " , ( unsigned long ) map - > gid ) ) ;
result = NT_STATUS_OK ;
done :
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( mem_ctx ) ;
2006-02-04 01:19:41 +03:00
return result ;
2002-11-02 06:47:48 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-11-10 02:28:40 +03:00
static NTSTATUS ldapsam_delete_group_mapping_entry ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
struct dom_sid sid )
2002-11-02 06:47:48 +03:00
{
2006-02-04 01:19:41 +03:00
struct ldapsam_privates * priv =
( struct ldapsam_privates * ) methods - > private_data ;
LDAPMessage * msg , * entry ;
2003-03-19 21:21:44 +03:00
int rc ;
2006-02-04 01:19:41 +03:00
NTSTATUS result ;
TALLOC_CTX * mem_ctx ;
char * filter ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
DEBUG ( 0 , ( " talloc_new failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
filter = talloc_asprintf ( mem_ctx , " (&(objectClass=%s)(%s=%s)) " ,
LDAP_OBJ_GROUPMAP , LDAP_ATTRIBUTE_SID ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx , & sid ) ) ;
2006-02-04 01:19:41 +03:00
if ( filter = = NULL ) {
result = NT_STATUS_NO_MEMORY ;
goto done ;
}
rc = smbldap_search_suffix ( priv - > smbldap_state , filter ,
get_attr_list ( mem_ctx , groupmap_attr_list ) ,
& msg ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , msg ) ;
2003-03-19 12:43:23 +03:00
2006-02-04 01:19:41 +03:00
if ( ( rc ! = LDAP_SUCCESS ) | |
( ldap_count_entries ( priv2ld ( priv ) , msg ) ! = 1 ) | |
( ( entry = ldap_first_entry ( priv2ld ( priv ) , msg ) ) = = NULL ) ) {
result = NT_STATUS_NO_SUCH_GROUP ;
goto done ;
}
rc = ldapsam_delete_entry ( priv , mem_ctx , entry , LDAP_OBJ_GROUPMAP ,
get_attr_list ( mem_ctx ,
groupmap_attr_list_to_delete ) ) ;
2009-05-31 13:14:06 +04:00
2006-02-04 01:19:41 +03:00
if ( ( rc = = LDAP_NAMING_VIOLATION ) | |
2009-05-07 19:50:34 +04:00
( rc = = LDAP_NOT_ALLOWED_ON_RDN ) | |
2006-02-04 01:19:41 +03:00
( rc = = LDAP_OBJECT_CLASS_VIOLATION ) ) {
const char * attrs [ ] = { " sambaGroupType " , " description " ,
" displayName " , " sambaSIDList " ,
NULL } ;
/* Second try. Don't delete the sambaSID attribute, this is
for " old " entries that are tacked on a winbind
sambaIdmapEntry . */
rc = ldapsam_delete_entry ( priv , mem_ctx , entry ,
LDAP_OBJ_GROUPMAP , attrs ) ;
2003-03-19 12:43:23 +03:00
}
2006-02-04 01:19:41 +03:00
if ( ( rc = = LDAP_NAMING_VIOLATION ) | |
2009-05-07 19:50:34 +04:00
( rc = = LDAP_NOT_ALLOWED_ON_RDN ) | |
2006-02-04 01:19:41 +03:00
( rc = = LDAP_OBJECT_CLASS_VIOLATION ) ) {
const char * attrs [ ] = { " sambaGroupType " , " description " ,
" displayName " , " sambaSIDList " ,
" gidNumber " , NULL } ;
2003-05-14 07:32:20 +04:00
2006-02-04 01:19:41 +03:00
/* Third try. This is a post-3.0.21 alias (containing only
* sambaSidEntry and sambaGroupMapping classes ) , we also have
* to delete the gidNumber attribute , only the sambaSidEntry
* remains */
2003-05-14 07:32:20 +04:00
2006-02-04 01:19:41 +03:00
rc = ldapsam_delete_entry ( priv , mem_ctx , entry ,
LDAP_OBJ_GROUPMAP , attrs ) ;
}
result = ( rc = = LDAP_SUCCESS ) ? NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL ;
done :
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( mem_ctx ) ;
2006-02-04 01:19:41 +03:00
return result ;
}
2003-03-19 12:43:23 +03:00
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2006-02-04 01:19:41 +03:00
static NTSTATUS ldapsam_setsamgrent ( struct pdb_methods * my_methods ,
2007-10-19 04:40:25 +04:00
bool update )
2003-03-19 12:43:23 +03:00
{
2006-02-04 01:19:41 +03:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) my_methods - > private_data ;
2007-11-28 09:22:35 +03:00
char * filter = NULL ;
2003-03-19 12:43:23 +03:00
int rc ;
2005-02-17 17:27:34 +03:00
const char * * attr_list ;
2003-03-19 12:43:23 +03:00
2007-11-28 09:22:35 +03:00
filter = talloc_asprintf ( NULL , " (objectclass=%s) " , LDAP_OBJ_GROUPMAP ) ;
if ( ! filter ) {
return NT_STATUS_NO_MEMORY ;
}
2006-02-04 01:19:41 +03:00
attr_list = get_attr_list ( NULL , groupmap_attr_list ) ;
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( ldap_state - > smbldap_state , lp_ldap_suffix ( talloc_tos ( ) ) ,
2003-03-19 12:43:23 +03:00
LDAP_SCOPE_SUBTREE , filter ,
2003-05-14 07:32:20 +04:00
attr_list , 0 , & ldap_state - > result ) ;
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( attr_list ) ;
2003-03-19 12:43:23 +03:00
if ( rc ! = LDAP_SUCCESS ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " ldapsam_setsamgrent: LDAP search failed: %s \n " ,
ldap_err2string ( rc ) ) ) ;
DEBUG ( 3 , ( " ldapsam_setsamgrent: Query was: %s, %s \n " ,
2012-07-18 09:37:23 +04:00
lp_ldap_suffix ( talloc_tos ( ) ) , filter ) ) ;
2003-03-19 12:43:23 +03:00
ldap_msgfree ( ldap_state - > result ) ;
ldap_state - > result = NULL ;
2007-11-28 09:22:35 +03:00
TALLOC_FREE ( filter ) ;
2003-03-19 12:43:23 +03:00
return NT_STATUS_UNSUCCESSFUL ;
}
2007-11-28 09:22:35 +03:00
TALLOC_FREE ( filter ) ;
2004-10-12 01:09:36 +04:00
DEBUG ( 2 , ( " ldapsam_setsamgrent: %d entries in the base! \n " ,
2003-06-21 04:45:03 +04:00
ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct ,
2003-03-19 12:43:23 +03:00
ldap_state - > result ) ) ) ;
2006-02-04 01:19:41 +03:00
ldap_state - > entry =
ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct ,
ldap_state - > result ) ;
2003-03-19 12:43:23 +03:00
ldap_state - > index = 0 ;
return NT_STATUS_OK ;
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-03-19 12:43:23 +03:00
static void ldapsam_endsamgrent ( struct pdb_methods * my_methods )
{
2003-03-20 01:38:37 +03:00
ldapsam_endsampwent ( my_methods ) ;
2003-03-19 12:43:23 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-03-19 12:43:23 +03:00
static NTSTATUS ldapsam_getsamgrent ( struct pdb_methods * my_methods ,
GROUP_MAP * map )
{
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL ;
2006-02-04 01:19:41 +03:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) my_methods - > private_data ;
2007-10-19 04:40:25 +04:00
bool bret = False ;
2003-03-19 12:43:23 +03:00
while ( ! bret ) {
if ( ! ldap_state - > entry )
return ret ;
2009-05-31 13:14:06 +04:00
2003-03-19 12:43:23 +03:00
ldap_state - > index + + ;
2006-02-04 01:19:41 +03:00
bret = init_group_from_ldap ( ldap_state , map ,
ldap_state - > entry ) ;
2009-05-31 13:14:06 +04:00
2006-02-04 01:19:41 +03:00
ldap_state - > entry =
ldap_next_entry ( ldap_state - > smbldap_state - > ldap_struct ,
ldap_state - > entry ) ;
2003-03-19 12:43:23 +03:00
}
return NT_STATUS_OK ;
2002-11-02 06:47:48 +03:00
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-11-10 02:28:40 +03:00
static NTSTATUS ldapsam_enum_group_mapping ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * domsid , enum lsa_SidType sid_name_use ,
2011-09-27 01:55:47 +04:00
GROUP_MAP * * * pp_rmap ,
2006-02-04 01:19:41 +03:00
size_t * p_num_entries ,
2007-10-19 04:40:25 +04:00
bool unix_only )
2002-11-02 06:47:48 +03:00
{
2011-09-27 01:55:47 +04:00
GROUP_MAP * map = NULL ;
2005-10-18 07:24:00 +04:00
size_t entries = 0 ;
2002-11-02 06:47:48 +03:00
2005-10-18 07:24:00 +04:00
* p_num_entries = 0 ;
2011-11-09 01:11:32 +04:00
* pp_rmap = NULL ;
2002-03-02 13:16:28 +03:00
2003-03-19 12:43:23 +03:00
if ( ! NT_STATUS_IS_OK ( ldapsam_setsamgrent ( methods , False ) ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " ldapsam_enum_group_mapping: Unable to open "
" passdb \n " ) ) ;
2003-03-19 12:43:23 +03:00
return NT_STATUS_ACCESS_DENIED ;
2002-08-17 21:00:51 +04:00
}
2011-09-27 01:55:47 +04:00
while ( true ) {
map = talloc_zero ( NULL , GROUP_MAP ) ;
if ( ! map ) {
return NT_STATUS_NO_MEMORY ;
}
if ( ! NT_STATUS_IS_OK ( ldapsam_getsamgrent ( methods , map ) ) ) {
TALLOC_FREE ( map ) ;
break ;
}
2003-03-19 12:43:23 +03:00
if ( sid_name_use ! = SID_NAME_UNKNOWN & &
2011-09-27 01:55:47 +04:00
sid_name_use ! = map - > sid_name_use ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 11 , ( " ldapsam_enum_group_mapping: group %s is "
2011-09-27 01:55:47 +04:00
" not of the requested type \n " ,
map - > nt_name ) ) ;
2003-03-19 12:43:23 +03:00
continue ;
}
2011-09-27 01:55:47 +04:00
if ( unix_only = = ENUM_ONLY_MAPPED & & map - > gid = = - 1 ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 11 , ( " ldapsam_enum_group_mapping: group %s is "
2011-09-27 01:55:47 +04:00
" non mapped \n " , map - > nt_name ) ) ;
2003-03-19 12:43:23 +03:00
continue ;
}
2002-08-17 21:00:51 +04:00
2011-09-27 01:55:47 +04:00
* pp_rmap = talloc_realloc ( NULL , * pp_rmap ,
GROUP_MAP * , entries + 1 ) ;
r13915: Fixed a very interesting class of realloc() bugs found by Coverity.
realloc can return NULL in one of two cases - (1) the realloc failed,
(2) realloc succeeded but the new size requested was zero, in which
case this is identical to a free() call.
The error paths dealing with these two cases should be different,
but mostly weren't. Secondly the standard idiom for dealing with
realloc when you know the new size is non-zero is the following :
tmp = realloc(p, size);
if (!tmp) {
SAFE_FREE(p);
return error;
} else {
p = tmp;
}
However, there were *many* *many* places in Samba where we were
using the old (broken) idiom of :
p = realloc(p, size)
if (!p) {
return error;
}
which will leak the memory pointed to by p on realloc fail.
This commit (hopefully) fixes all these cases by moving to
a standard idiom of :
p = SMB_REALLOC(p, size)
if (!p) {
return error;
}
Where if the realloc returns null due to the realloc failing
or size == 0 we *guarentee* that the storage pointed to by p
has been freed. This allows me to remove a lot of code that
was dealing with the standard (more verbose) method that required
a tmp pointer. This is almost always what you want. When a
realloc fails you never usually want the old memory, you
want to free it and get into your error processing asap.
For the 11 remaining cases where we really do need to keep the
old pointer I have invented the new macro SMB_REALLOC_KEEP_OLD_ON_ERROR,
which can be used as follows :
tmp = SMB_REALLOC_KEEP_OLD_ON_ERROR(p, size);
if (!tmp) {
SAFE_FREE(p);
return error;
} else {
p = tmp;
}
SMB_REALLOC_KEEP_OLD_ON_ERROR guarentees never to free the
pointer p, even on size == 0 or realloc fail. All this is
done by a hidden extra argument to Realloc(), BOOL free_old_on_error
which is set appropriately by the SMB_REALLOC and SMB_REALLOC_KEEP_OLD_ON_ERROR
macros (and their array counterparts).
It remains to be seen what this will do to our Coverity bug count :-).
Jeremy.
(This used to be commit 1d710d06a214f3f1740e80e0bffd6aab44aac2b0)
2006-03-07 09:31:04 +03:00
if ( ! ( * pp_rmap ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " ldapsam_enum_group_mapping: Unable to "
" enlarge group map! \n " ) ) ;
2003-03-19 12:43:23 +03:00
return NT_STATUS_UNSUCCESSFUL ;
}
2002-03-02 13:16:28 +03:00
2011-09-27 01:55:47 +04:00
( * pp_rmap ) [ entries ] = talloc_move ( ( * pp_rmap ) , & map ) ;
2003-03-19 12:43:23 +03:00
entries + = 1 ;
}
2011-09-27 01:55:47 +04:00
2003-03-19 12:43:23 +03:00
ldapsam_endsamgrent ( methods ) ;
2005-10-18 07:24:00 +04:00
* p_num_entries = entries ;
2003-03-19 12:43:23 +03:00
return NT_STATUS_OK ;
2002-03-02 13:16:28 +03:00
}
2004-04-07 16:43:44 +04:00
static NTSTATUS ldapsam_modify_aliasmem ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * alias ,
const struct dom_sid * member ,
2004-04-07 16:43:44 +04:00
int modop )
{
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
2007-11-15 03:05:42 +03:00
char * dn = NULL ;
2004-04-07 16:43:44 +04:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
int count ;
LDAPMod * * mods = NULL ;
int rc ;
2006-09-08 18:28:06 +04:00
enum lsa_SidType type = SID_NAME_USE_NONE ;
2007-12-16 00:00:39 +03:00
fstring tmp ;
2004-04-07 16:43:44 +04:00
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
if ( sid_check_is_in_builtin ( alias ) ) {
2006-03-15 19:00:34 +03:00
type = SID_NAME_ALIAS ;
2006-02-04 01:19:41 +03:00
}
2012-07-12 18:00:59 +04:00
if ( sid_check_is_in_our_sam ( alias ) ) {
2006-02-04 01:19:41 +03:00
type = SID_NAME_ALIAS ;
}
if ( type = = SID_NAME_USE_NONE ) {
DEBUG ( 5 , ( " SID %s is neither in builtin nor in our domain! \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( alias ) ) ) ;
2006-02-04 01:19:41 +03:00
return NT_STATUS_NO_SUCH_ALIAS ;
}
2007-11-15 03:05:42 +03:00
if ( asprintf ( & filter ,
2006-02-04 01:19:41 +03:00
" (&(objectClass=%s)(sambaSid=%s)(sambaGroupType=%d)) " ,
2007-12-16 00:47:30 +03:00
LDAP_OBJ_GROUPMAP , sid_to_fstring ( tmp , alias ) ,
2007-11-15 03:05:42 +03:00
type ) < 0 ) {
return NT_STATUS_NO_MEMORY ;
}
2004-04-07 16:43:44 +04:00
if ( ldapsam_search_one_group ( ldap_state , filter ,
2007-11-15 03:05:42 +03:00
& result ) ! = LDAP_SUCCESS ) {
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
return NT_STATUS_NO_SUCH_ALIAS ;
2007-11-15 03:05:42 +03:00
}
2004-04-07 16:43:44 +04:00
count = ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct ,
result ) ;
if ( count < 1 ) {
2004-10-12 01:09:36 +04:00
DEBUG ( 4 , ( " ldapsam_modify_aliasmem: Did not find alias \n " ) ) ;
2004-04-07 16:43:44 +04:00
ldap_msgfree ( result ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
return NT_STATUS_NO_SUCH_ALIAS ;
}
if ( count > 1 ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 1 , ( " ldapsam_modify_aliasmem: Duplicate entries for "
" filter %s: count=%d \n " , filter , count ) ) ;
2004-04-07 16:43:44 +04:00
ldap_msgfree ( result ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
return NT_STATUS_NO_SUCH_ALIAS ;
}
2007-11-15 03:05:42 +03:00
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct ,
result ) ;
if ( ! entry ) {
ldap_msgfree ( result ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2009-05-05 23:12:33 +04:00
dn = smbldap_talloc_dn ( talloc_tos ( ) , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
2004-04-07 16:43:44 +04:00
if ( ! dn ) {
ldap_msgfree ( result ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
smbldap_set_mod ( & mods , modop ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_SID_LIST ) ,
2007-12-16 00:47:30 +03:00
sid_to_fstring ( tmp , member ) ) ;
2004-04-07 16:43:44 +04:00
rc = smbldap_modify ( ldap_state - > smbldap_state , dn , mods ) ;
ldap_mods_free ( mods , True ) ;
ldap_msgfree ( result ) ;
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( dn ) ;
2006-02-04 01:19:41 +03:00
if ( rc = = LDAP_TYPE_OR_VALUE_EXISTS ) {
return NT_STATUS_MEMBER_IN_ALIAS ;
}
if ( rc = = LDAP_NO_SUCH_ATTRIBUTE ) {
return NT_STATUS_MEMBER_NOT_IN_ALIAS ;
}
2004-04-07 16:43:44 +04:00
if ( rc ! = LDAP_SUCCESS ) {
return NT_STATUS_UNSUCCESSFUL ;
}
return NT_STATUS_OK ;
}
static NTSTATUS ldapsam_add_aliasmem ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * alias ,
const struct dom_sid * member )
2004-04-07 16:43:44 +04:00
{
return ldapsam_modify_aliasmem ( methods , alias , member , LDAP_MOD_ADD ) ;
}
static NTSTATUS ldapsam_del_aliasmem ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * alias ,
const struct dom_sid * member )
2004-04-07 16:43:44 +04:00
{
return ldapsam_modify_aliasmem ( methods , alias , member ,
LDAP_MOD_DELETE ) ;
}
static NTSTATUS ldapsam_enum_aliasmem ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * alias ,
2009-06-08 21:43:01 +04:00
TALLOC_CTX * mem_ctx ,
2010-05-21 05:25:01 +04:00
struct dom_sid * * pp_members ,
2005-10-18 07:24:00 +04:00
size_t * p_num_members )
2004-04-07 16:43:44 +04:00
{
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
int count ;
2007-11-15 03:05:42 +03:00
char * * values = NULL ;
2004-04-07 16:43:44 +04:00
int i ;
2007-11-15 03:05:42 +03:00
char * filter = NULL ;
2010-08-26 14:54:13 +04:00
uint32_t num_members = 0 ;
2006-09-08 18:28:06 +04:00
enum lsa_SidType type = SID_NAME_USE_NONE ;
2007-12-16 00:00:39 +03:00
fstring tmp ;
2004-04-07 16:43:44 +04:00
2005-10-18 07:24:00 +04:00
* pp_members = NULL ;
* p_num_members = 0 ;
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
if ( sid_check_is_in_builtin ( alias ) ) {
2006-03-15 19:00:34 +03:00
type = SID_NAME_ALIAS ;
2006-02-04 01:19:41 +03:00
}
2012-07-12 18:00:59 +04:00
if ( sid_check_is_in_our_sam ( alias ) ) {
2006-02-04 01:19:41 +03:00
type = SID_NAME_ALIAS ;
}
if ( type = = SID_NAME_USE_NONE ) {
DEBUG ( 5 , ( " SID %s is neither in builtin nor in our domain! \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( alias ) ) ) ;
2006-02-04 01:19:41 +03:00
return NT_STATUS_NO_SUCH_ALIAS ;
}
2007-11-15 03:05:42 +03:00
if ( asprintf ( & filter ,
2006-02-04 01:19:41 +03:00
" (&(objectClass=%s)(sambaSid=%s)(sambaGroupType=%d)) " ,
2007-12-16 00:47:30 +03:00
LDAP_OBJ_GROUPMAP , sid_to_fstring ( tmp , alias ) ,
2007-11-15 03:05:42 +03:00
type ) < 0 ) {
return NT_STATUS_NO_MEMORY ;
}
2004-04-07 16:43:44 +04:00
if ( ldapsam_search_one_group ( ldap_state , filter ,
2007-11-15 03:05:42 +03:00
& result ) ! = LDAP_SUCCESS ) {
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
return NT_STATUS_NO_SUCH_ALIAS ;
2007-11-15 03:05:42 +03:00
}
2004-04-07 16:43:44 +04:00
count = ldap_count_entries ( ldap_state - > smbldap_state - > ldap_struct ,
result ) ;
if ( count < 1 ) {
2004-10-12 01:09:36 +04:00
DEBUG ( 4 , ( " ldapsam_enum_aliasmem: Did not find alias \n " ) ) ;
2004-04-07 16:43:44 +04:00
ldap_msgfree ( result ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
return NT_STATUS_NO_SUCH_ALIAS ;
}
if ( count > 1 ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 1 , ( " ldapsam_enum_aliasmem: Duplicate entries for "
" filter %s: count=%d \n " , filter , count ) ) ;
2004-04-07 16:43:44 +04:00
ldap_msgfree ( result ) ;
2007-11-15 03:05:42 +03:00
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
return NT_STATUS_NO_SUCH_ALIAS ;
}
2007-11-15 03:05:42 +03:00
SAFE_FREE ( filter ) ;
2004-04-07 16:43:44 +04:00
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct ,
result ) ;
if ( ! entry ) {
ldap_msgfree ( result ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
values = ldap_get_values ( ldap_state - > smbldap_state - > ldap_struct ,
entry ,
get_attr_key2string ( groupmap_attr_list ,
LDAP_ATTR_SID_LIST ) ) ;
if ( values = = NULL ) {
ldap_msgfree ( result ) ;
return NT_STATUS_OK ;
}
count = ldap_count_values ( values ) ;
for ( i = 0 ; i < count ; i + + ) {
2010-05-21 05:25:01 +04:00
struct dom_sid member ;
2008-01-09 02:11:31 +03:00
NTSTATUS status ;
2004-04-07 16:43:44 +04:00
if ( ! string_to_sid ( & member , values [ i ] ) )
continue ;
2009-06-08 21:43:01 +04:00
status = add_sid_to_array ( mem_ctx , & member , pp_members ,
2008-01-09 02:11:31 +03:00
& num_members ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-12-09 05:58:18 +03:00
ldap_value_free ( values ) ;
ldap_msgfree ( result ) ;
2008-01-09 02:11:31 +03:00
return status ;
2006-12-09 05:58:18 +03:00
}
2004-04-07 16:43:44 +04:00
}
2005-10-18 07:24:00 +04:00
* p_num_members = num_members ;
2004-04-07 16:43:44 +04:00
ldap_value_free ( values ) ;
ldap_msgfree ( result ) ;
return NT_STATUS_OK ;
}
static NTSTATUS ldapsam_alias_memberships ( struct pdb_methods * methods ,
2005-03-27 20:33:04 +04:00
TALLOC_CTX * mem_ctx ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * domain_sid ,
const struct dom_sid * members ,
2005-10-18 07:24:00 +04:00
size_t num_members ,
2010-05-21 04:38:04 +04:00
uint32_t * * pp_alias_rids ,
2005-10-18 07:24:00 +04:00
size_t * p_num_alias_rids )
2004-04-07 16:43:44 +04:00
{
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
2004-11-06 02:34:00 +03:00
LDAP * ldap_struct ;
2004-04-07 16:43:44 +04:00
2005-02-17 17:27:34 +03:00
const char * attrs [ ] = { LDAP_ATTRIBUTE_SID , NULL } ;
2004-04-07 16:43:44 +04:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
2004-11-06 02:34:00 +03:00
int i ;
2004-04-07 16:43:44 +04:00
int rc ;
2004-11-06 02:34:00 +03:00
char * filter ;
2006-09-08 18:28:06 +04:00
enum lsa_SidType type = SID_NAME_USE_NONE ;
2010-02-03 13:32:41 +03:00
bool is_builtin = false ;
bool sid_added = false ;
2006-02-04 01:19:41 +03:00
2009-08-03 18:28:59 +04:00
* pp_alias_rids = NULL ;
* p_num_alias_rids = 0 ;
2006-02-04 01:19:41 +03:00
if ( sid_check_is_builtin ( domain_sid ) ) {
2010-02-03 13:32:41 +03:00
is_builtin = true ;
2006-03-15 19:00:34 +03:00
type = SID_NAME_ALIAS ;
2006-02-04 01:19:41 +03:00
}
2004-11-06 02:34:00 +03:00
2012-07-12 17:55:21 +04:00
if ( sid_check_is_our_sam ( domain_sid ) ) {
2006-02-04 01:19:41 +03:00
type = SID_NAME_ALIAS ;
}
if ( type = = SID_NAME_USE_NONE ) {
DEBUG ( 5 , ( " SID %s is neither builtin nor domain! \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( domain_sid ) ) ) ;
2006-02-04 01:19:41 +03:00
return NT_STATUS_UNSUCCESSFUL ;
}
2004-11-06 02:34:00 +03:00
2009-08-03 18:28:59 +04:00
if ( num_members = = 0 ) {
return NT_STATUS_OK ;
}
2004-11-06 02:34:00 +03:00
filter = talloc_asprintf ( mem_ctx ,
2010-02-10 15:48:11 +03:00
" (&(objectclass=%s)(sambaGroupType=%d)(| " ,
2006-02-04 01:19:41 +03:00
LDAP_OBJ_GROUPMAP , type ) ;
2004-11-06 02:34:00 +03:00
for ( i = 0 ; i < num_members ; i + + )
filter = talloc_asprintf ( mem_ctx , " %s(sambaSIDList=%s) " ,
filter ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx ,
& members [ i ] ) ) ;
2004-11-06 02:34:00 +03:00
filter = talloc_asprintf ( mem_ctx , " %s)) " , filter ) ;
2004-04-07 16:43:44 +04:00
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( filter = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2010-02-03 13:32:41 +03:00
if ( is_builtin & &
ldap_state - > search_cache . filter & &
strcmp ( ldap_state - > search_cache . filter , filter ) = = 0 ) {
filter = talloc_move ( filter , & ldap_state - > search_cache . filter ) ;
result = ldap_state - > search_cache . result ;
ldap_state - > search_cache . result = NULL ;
} else {
2012-07-18 09:37:23 +04:00
rc = smbldap_search ( ldap_state - > smbldap_state , lp_ldap_suffix ( talloc_tos ( ) ) ,
2010-02-03 13:32:41 +03:00
LDAP_SCOPE_SUBTREE , filter , attrs , 0 , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( filter , result ) ;
2010-02-03 13:32:41 +03:00
}
2004-04-07 16:43:44 +04:00
2004-11-06 02:34:00 +03:00
ldap_struct = ldap_state - > smbldap_state - > ldap_struct ;
2004-04-07 16:43:44 +04:00
2004-11-06 02:34:00 +03:00
for ( entry = ldap_first_entry ( ldap_struct , result ) ;
2004-04-07 16:43:44 +04:00
entry ! = NULL ;
2004-11-06 02:34:00 +03:00
entry = ldap_next_entry ( ldap_struct , entry ) )
2004-04-07 16:43:44 +04:00
{
2004-11-06 02:34:00 +03:00
fstring sid_str ;
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2010-05-21 04:38:04 +04:00
uint32_t rid ;
2004-04-07 16:43:44 +04:00
2004-11-06 02:34:00 +03:00
if ( ! smbldap_get_single_attribute ( ldap_struct , entry ,
LDAP_ATTRIBUTE_SID ,
sid_str ,
sizeof ( sid_str ) - 1 ) )
2004-04-07 16:43:44 +04:00
continue ;
2004-11-06 02:34:00 +03:00
if ( ! string_to_sid ( & sid , sid_str ) )
2004-04-07 16:43:44 +04:00
continue ;
2005-03-27 20:33:04 +04:00
if ( ! sid_peek_check_rid ( domain_sid , & sid , & rid ) )
continue ;
2010-02-03 13:32:41 +03:00
sid_added = true ;
2006-12-09 05:58:18 +03:00
if ( ! add_rid_to_array_unique ( mem_ctx , rid , pp_alias_rids ,
p_num_alias_rids ) ) {
return NT_STATUS_NO_MEMORY ;
}
2004-04-07 16:43:44 +04:00
}
2010-02-03 13:32:41 +03:00
if ( ! is_builtin & & ! sid_added ) {
TALLOC_FREE ( ldap_state - > search_cache . filter ) ;
/*
* Note : result is a talloc child of filter because of the
2012-09-06 19:53:00 +04:00
* smbldap_talloc_autofree_ldapmsg ( ) usage
2010-02-03 13:32:41 +03:00
*/
ldap_state - > search_cache . filter = talloc_move ( ldap_state , & filter ) ;
ldap_state - > search_cache . result = result ;
}
2004-04-07 16:43:44 +04:00
return NT_STATUS_OK ;
}
2006-02-04 01:19:41 +03:00
static NTSTATUS ldapsam_set_account_policy_in_ldap ( struct pdb_methods * methods ,
2009-07-14 01:53:49 +04:00
enum pdb_policy_type type ,
2010-05-21 04:38:04 +04:00
uint32_t value )
2005-09-30 21:13:37 +04:00
{
NTSTATUS ntstatus = NT_STATUS_UNSUCCESSFUL ;
int rc ;
LDAPMod * * mods = NULL ;
fstring value_string ;
const char * policy_attr = NULL ;
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
2005-12-20 18:10:41 +03:00
DEBUG ( 10 , ( " ldapsam_set_account_policy_in_ldap \n " ) ) ;
2005-09-30 21:13:37 +04:00
if ( ! ldap_state - > domain_dn ) {
return NT_STATUS_INVALID_PARAMETER ;
}
2009-07-14 01:53:49 +04:00
policy_attr = get_account_policy_attr ( type ) ;
2005-09-30 21:13:37 +04:00
if ( policy_attr = = NULL ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " ldapsam_set_account_policy_in_ldap: invalid "
" policy \n " ) ) ;
2005-09-30 21:13:37 +04:00
return ntstatus ;
}
slprintf ( value_string , sizeof ( value_string ) - 1 , " %i " , value ) ;
smbldap_set_mod ( & mods , LDAP_MOD_REPLACE , policy_attr , value_string ) ;
2006-02-04 01:19:41 +03:00
rc = smbldap_modify ( ldap_state - > smbldap_state , ldap_state - > domain_dn ,
mods ) ;
2005-09-30 21:13:37 +04:00
ldap_mods_free ( mods , True ) ;
if ( rc ! = LDAP_SUCCESS ) {
return ntstatus ;
}
2009-07-14 01:53:49 +04:00
if ( ! cache_account_policy_set ( type , value ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " ldapsam_set_account_policy_in_ldap: failed to "
" update local tdb cache \n " ) ) ;
2005-09-30 21:13:37 +04:00
return ntstatus ;
}
return NT_STATUS_OK ;
}
2006-02-04 01:19:41 +03:00
static NTSTATUS ldapsam_set_account_policy ( struct pdb_methods * methods ,
2009-07-14 01:53:49 +04:00
enum pdb_policy_type type ,
uint32_t value )
2005-12-20 18:10:41 +03:00
{
2009-07-14 01:53:49 +04:00
return ldapsam_set_account_policy_in_ldap ( methods , type ,
2006-02-04 01:19:41 +03:00
value ) ;
2005-12-20 18:10:41 +03:00
}
2006-02-04 01:19:41 +03:00
static NTSTATUS ldapsam_get_account_policy_from_ldap ( struct pdb_methods * methods ,
2009-07-14 01:53:49 +04:00
enum pdb_policy_type type ,
2010-05-21 04:38:04 +04:00
uint32_t * value )
2005-09-30 21:13:37 +04:00
{
NTSTATUS ntstatus = NT_STATUS_UNSUCCESSFUL ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
int count ;
int rc ;
char * * vals = NULL ;
2009-10-30 23:50:41 +03:00
char * filter ;
2005-09-30 21:13:37 +04:00
const char * policy_attr = NULL ;
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
const char * attrs [ 2 ] ;
DEBUG ( 10 , ( " ldapsam_get_account_policy_from_ldap \n " ) ) ;
if ( ! ldap_state - > domain_dn ) {
return NT_STATUS_INVALID_PARAMETER ;
}
2009-07-14 01:53:49 +04:00
policy_attr = get_account_policy_attr ( type ) ;
2005-09-30 21:13:37 +04:00
if ( ! policy_attr ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " ldapsam_get_account_policy_from_ldap: invalid "
2009-07-14 01:53:49 +04:00
" policy index: %d \n " , type ) ) ;
2005-09-30 21:13:37 +04:00
return ntstatus ;
}
attrs [ 0 ] = policy_attr ;
attrs [ 1 ] = NULL ;
2010-04-29 02:52:17 +04:00
filter = talloc_asprintf ( talloc_tos ( ) , " (objectClass=%s) " , LDAP_OBJ_DOMINFO ) ;
2009-10-30 23:50:41 +03:00
if ( filter = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2005-09-30 21:13:37 +04:00
rc = smbldap_search ( ldap_state - > smbldap_state , ldap_state - > domain_dn ,
2009-10-30 23:50:41 +03:00
LDAP_SCOPE_BASE , filter , attrs , 0 ,
2006-02-04 01:19:41 +03:00
& result ) ;
2010-04-29 02:52:17 +04:00
TALLOC_FREE ( filter ) ;
2005-09-30 21:13:37 +04:00
if ( rc ! = LDAP_SUCCESS ) {
return ntstatus ;
}
2006-02-04 01:19:41 +03:00
count = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
2005-09-30 21:13:37 +04:00
if ( count < 1 ) {
goto out ;
}
2006-02-04 01:19:41 +03:00
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
2005-09-30 21:13:37 +04:00
if ( entry = = NULL ) {
goto out ;
}
2006-02-04 01:19:41 +03:00
vals = ldap_get_values ( priv2ld ( ldap_state ) , entry , policy_attr ) ;
2005-09-30 21:13:37 +04:00
if ( vals = = NULL ) {
goto out ;
}
2010-05-21 04:38:04 +04:00
* value = ( uint32_t ) atol ( vals [ 0 ] ) ;
2009-05-31 13:14:06 +04:00
2005-09-30 21:13:37 +04:00
ntstatus = NT_STATUS_OK ;
out :
if ( vals )
ldap_value_free ( vals ) ;
ldap_msgfree ( result ) ;
return ntstatus ;
}
/* wrapper around ldapsam_get_account_policy_from_ldap(), handles tdb as cache
2006-02-04 01:19:41 +03:00
- if user hasn ' t decided to use account policies inside LDAP just reuse the
old tdb values
2009-05-31 13:14:06 +04:00
2005-09-30 21:13:37 +04:00
- if there is a valid cache entry , return that
- if there is an LDAP entry , update cache and return
- otherwise set to default , update cache and return
Guenther
*/
2006-02-04 01:19:41 +03:00
static NTSTATUS ldapsam_get_account_policy ( struct pdb_methods * methods ,
2009-07-14 01:53:49 +04:00
enum pdb_policy_type type ,
uint32_t * value )
2005-09-30 21:13:37 +04:00
{
NTSTATUS ntstatus = NT_STATUS_UNSUCCESSFUL ;
2009-07-14 01:53:49 +04:00
if ( cache_account_policy_get ( type , value ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 11 , ( " ldapsam_get_account_policy: got valid value from "
" cache \n " ) ) ;
2005-09-30 21:13:37 +04:00
return NT_STATUS_OK ;
}
2009-07-14 01:53:49 +04:00
ntstatus = ldapsam_get_account_policy_from_ldap ( methods , type ,
2006-02-04 01:19:41 +03:00
value ) ;
2005-09-30 21:13:37 +04:00
if ( NT_STATUS_IS_OK ( ntstatus ) ) {
goto update_cache ;
}
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " ldapsam_get_account_policy: failed to retrieve from "
" ldap \n " ) ) ;
2005-09-30 21:13:37 +04:00
#if 0
/* should we automagically migrate old tdb value here ? */
2009-07-14 01:53:49 +04:00
if ( account_policy_get ( type , value ) )
2005-09-30 21:13:37 +04:00
goto update_ldap ;
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " ldapsam_get_account_policy: no tdb for %d, trying "
2009-07-14 01:53:49 +04:00
" default \n " , type ) ) ;
2005-09-30 21:13:37 +04:00
# endif
2009-07-14 01:53:49 +04:00
if ( ! account_policy_get_default ( type , value ) ) {
2005-09-30 21:13:37 +04:00
return ntstatus ;
}
2009-05-31 13:14:06 +04:00
2005-09-30 21:13:37 +04:00
/* update_ldap: */
2009-05-31 13:14:06 +04:00
2009-07-14 01:53:49 +04:00
ntstatus = ldapsam_set_account_policy ( methods , type , * value ) ;
2005-09-30 21:13:37 +04:00
if ( ! NT_STATUS_IS_OK ( ntstatus ) ) {
return ntstatus ;
}
2009-05-31 13:14:06 +04:00
2005-09-30 21:13:37 +04:00
update_cache :
2009-05-31 13:14:06 +04:00
2009-07-14 01:53:49 +04:00
if ( ! cache_account_policy_set ( type , * value ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " ldapsam_get_account_policy: failed to update local "
" tdb as a cache \n " ) ) ;
2005-09-30 21:13:37 +04:00
return NT_STATUS_UNSUCCESSFUL ;
}
return NT_STATUS_OK ;
}
2005-03-22 23:50:29 +03:00
static NTSTATUS ldapsam_lookup_rids ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * domain_sid ,
2005-03-22 23:50:29 +03:00
int num_rids ,
2010-05-21 04:38:04 +04:00
uint32_t * rids ,
2005-11-27 01:04:28 +03:00
const char * * names ,
2006-09-08 18:28:06 +04:00
enum lsa_SidType * attrs )
2005-03-22 23:50:29 +03:00
{
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
LDAPMessage * msg = NULL ;
LDAPMessage * entry ;
char * allsids = NULL ;
int i , rc , num_mapped ;
2006-02-04 01:19:41 +03:00
NTSTATUS result = NT_STATUS_NO_MEMORY ;
TALLOC_CTX * mem_ctx ;
LDAP * ld ;
2007-10-19 04:40:25 +04:00
bool is_builtin ;
2005-03-22 23:50:29 +03:00
2006-02-04 01:19:41 +03:00
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
DEBUG ( 0 , ( " talloc_new failed \n " ) ) ;
goto done ;
}
2005-03-22 23:50:29 +03:00
2006-02-04 01:19:41 +03:00
if ( ! sid_check_is_builtin ( domain_sid ) & &
2012-07-12 17:55:21 +04:00
! sid_check_is_our_sam ( domain_sid ) ) {
2006-02-04 01:19:41 +03:00
result = NT_STATUS_INVALID_PARAMETER ;
2005-03-22 23:50:29 +03:00
goto done ;
}
2009-06-07 04:02:26 +04:00
if ( num_rids = = 0 ) {
result = NT_STATUS_NONE_MAPPED ;
goto done ;
}
2005-03-22 23:50:29 +03:00
for ( i = 0 ; i < num_rids ; i + + )
2005-11-27 01:04:28 +03:00
attrs [ i ] = SID_NAME_UNKNOWN ;
2005-03-22 23:50:29 +03:00
2006-02-04 01:19:41 +03:00
allsids = talloc_strdup ( mem_ctx , " " ) ;
if ( allsids = = NULL ) {
goto done ;
}
2005-03-22 23:50:29 +03:00
for ( i = 0 ; i < num_rids ; i + + ) {
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2006-03-05 20:49:30 +03:00
sid_compose ( & sid , domain_sid , rids [ i ] ) ;
2007-12-15 23:49:15 +03:00
allsids = talloc_asprintf_append_buffer (
allsids , " (sambaSid=%s) " ,
sid_string_talloc ( mem_ctx , & sid ) ) ;
2006-02-04 01:19:41 +03:00
if ( allsids = = NULL ) {
goto done ;
}
2005-03-22 23:50:29 +03:00
}
/* First look for users */
{
char * filter ;
const char * ldap_attrs [ ] = { " uid " , " sambaSid " , NULL } ;
2006-02-04 01:19:41 +03:00
filter = talloc_asprintf (
2006-03-05 20:49:30 +03:00
mem_ctx , ( " (&(objectClass=%s)(|%s)) " ) ,
LDAP_OBJ_SAMBASAMACCOUNT , allsids ) ;
2006-02-04 01:19:41 +03:00
if ( filter = = NULL ) {
goto done ;
}
2005-03-22 23:50:29 +03:00
rc = smbldap_search ( ldap_state - > smbldap_state ,
2012-07-18 09:37:23 +04:00
lp_ldap_user_suffix ( talloc_tos ( ) ) ,
2005-03-22 23:50:29 +03:00
LDAP_SCOPE_SUBTREE , filter , ldap_attrs , 0 ,
& msg ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , msg ) ;
2005-03-22 23:50:29 +03:00
}
if ( rc ! = LDAP_SUCCESS )
goto done ;
2006-02-04 01:19:41 +03:00
ld = ldap_state - > smbldap_state - > ldap_struct ;
2005-03-22 23:50:29 +03:00
num_mapped = 0 ;
2006-02-04 01:19:41 +03:00
for ( entry = ldap_first_entry ( ld , msg ) ;
2005-03-22 23:50:29 +03:00
entry ! = NULL ;
2006-02-04 01:19:41 +03:00
entry = ldap_next_entry ( ld , entry ) ) {
2010-05-21 04:38:04 +04:00
uint32_t rid ;
2005-03-22 23:50:29 +03:00
int rid_index ;
2006-02-04 01:19:41 +03:00
const char * name ;
2005-03-22 23:50:29 +03:00
2006-02-04 01:19:41 +03:00
if ( ! ldapsam_extract_rid_from_entry ( ld , entry , domain_sid ,
2005-03-22 23:50:29 +03:00
& rid ) ) {
DEBUG ( 2 , ( " Could not find sid from ldap entry \n " ) ) ;
continue ;
}
2006-02-04 01:19:41 +03:00
name = smbldap_talloc_single_attribute ( ld , entry , " uid " ,
names ) ;
if ( name = = NULL ) {
2005-03-22 23:50:29 +03:00
DEBUG ( 2 , ( " Could not retrieve uid attribute \n " ) ) ;
continue ;
}
for ( rid_index = 0 ; rid_index < num_rids ; rid_index + + ) {
if ( rid = = rids [ rid_index ] )
break ;
}
if ( rid_index = = num_rids ) {
DEBUG ( 2 , ( " Got a RID not asked for: %d \n " , rid ) ) ;
continue ;
}
2005-11-27 01:04:28 +03:00
attrs [ rid_index ] = SID_NAME_USER ;
2006-02-04 01:19:41 +03:00
names [ rid_index ] = name ;
2005-03-22 23:50:29 +03:00
num_mapped + = 1 ;
}
if ( num_mapped = = num_rids ) {
/* No need to look for groups anymore -- we're done */
result = NT_STATUS_OK ;
goto done ;
}
/* Same game for groups */
{
char * filter ;
2006-02-04 01:19:41 +03:00
const char * ldap_attrs [ ] = { " cn " , " displayName " , " sambaSid " ,
" sambaGroupType " , NULL } ;
2005-03-22 23:50:29 +03:00
2006-02-04 01:19:41 +03:00
filter = talloc_asprintf (
2006-03-05 20:49:30 +03:00
mem_ctx , " (&(objectClass=%s)(|%s)) " ,
LDAP_OBJ_GROUPMAP , allsids ) ;
2006-02-04 01:19:41 +03:00
if ( filter = = NULL ) {
goto done ;
}
2005-03-22 23:50:29 +03:00
rc = smbldap_search ( ldap_state - > smbldap_state ,
2012-07-18 09:37:23 +04:00
lp_ldap_suffix ( talloc_tos ( ) ) ,
2005-03-22 23:50:29 +03:00
LDAP_SCOPE_SUBTREE , filter , ldap_attrs , 0 ,
& msg ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , msg ) ;
2005-03-22 23:50:29 +03:00
}
if ( rc ! = LDAP_SUCCESS )
goto done ;
2006-02-04 01:19:41 +03:00
/* ldap_struct might have changed due to a reconnect */
ld = ldap_state - > smbldap_state - > ldap_struct ;
/* For consistency checks, we already checked we're only domain or builtin */
is_builtin = sid_check_is_builtin ( domain_sid ) ;
for ( entry = ldap_first_entry ( ld , msg ) ;
2005-03-22 23:50:29 +03:00
entry ! = NULL ;
2006-02-04 01:19:41 +03:00
entry = ldap_next_entry ( ld , entry ) )
2005-03-22 23:50:29 +03:00
{
2010-05-21 04:38:04 +04:00
uint32_t rid ;
2005-03-22 23:50:29 +03:00
int rid_index ;
2006-02-04 01:19:41 +03:00
const char * attr ;
2006-09-08 18:28:06 +04:00
enum lsa_SidType type ;
2006-02-04 01:19:41 +03:00
const char * dn = smbldap_talloc_dn ( mem_ctx , ld , entry ) ;
attr = smbldap_talloc_single_attribute ( ld , entry , " sambaGroupType " ,
mem_ctx ) ;
if ( attr = = NULL ) {
DEBUG ( 2 , ( " Could not extract type from ldap entry %s \n " ,
dn ) ) ;
continue ;
}
2005-03-22 23:50:29 +03:00
2006-09-08 18:28:06 +04:00
type = ( enum lsa_SidType ) atol ( attr ) ;
2006-02-04 01:19:41 +03:00
/* Consistency checks */
2006-03-15 19:00:34 +03:00
if ( ( is_builtin & & ( type ! = SID_NAME_ALIAS ) ) | |
2006-02-04 01:19:41 +03:00
( ! is_builtin & & ( ( type ! = SID_NAME_ALIAS ) & &
( type ! = SID_NAME_DOM_GRP ) ) ) ) {
DEBUG ( 2 , ( " Rejecting invalid group mapping entry %s \n " , dn ) ) ;
}
if ( ! ldapsam_extract_rid_from_entry ( ld , entry , domain_sid ,
2005-03-22 23:50:29 +03:00
& rid ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 2 , ( " Could not find sid from ldap entry %s \n " , dn ) ) ;
2005-03-22 23:50:29 +03:00
continue ;
}
2006-03-01 23:47:36 +03:00
attr = smbldap_talloc_single_attribute ( ld , entry , " displayName " , names ) ;
2006-02-04 01:19:41 +03:00
if ( attr = = NULL ) {
2006-03-01 23:47:36 +03:00
DEBUG ( 10 , ( " Could not retrieve 'displayName' attribute from %s \n " ,
2006-02-04 01:19:41 +03:00
dn ) ) ;
2006-03-01 23:47:36 +03:00
attr = smbldap_talloc_single_attribute ( ld , entry , " cn " , names ) ;
2006-02-04 01:19:41 +03:00
}
if ( attr = = NULL ) {
DEBUG ( 2 , ( " Could not retrieve naming attribute from %s \n " ,
dn ) ) ;
2005-03-22 23:50:29 +03:00
continue ;
}
for ( rid_index = 0 ; rid_index < num_rids ; rid_index + + ) {
if ( rid = = rids [ rid_index ] )
break ;
}
if ( rid_index = = num_rids ) {
DEBUG ( 2 , ( " Got a RID not asked for: %d \n " , rid ) ) ;
continue ;
}
2006-02-04 01:19:41 +03:00
attrs [ rid_index ] = type ;
names [ rid_index ] = attr ;
2005-03-22 23:50:29 +03:00
num_mapped + = 1 ;
}
result = NT_STATUS_NONE_MAPPED ;
if ( num_mapped > 0 )
result = ( num_mapped = = num_rids ) ?
NT_STATUS_OK : STATUS_SOME_UNMAPPED ;
done :
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( mem_ctx ) ;
2005-03-22 23:50:29 +03:00
return result ;
}
2006-02-08 13:36:13 +03:00
static char * get_ldap_filter ( TALLOC_CTX * mem_ctx , const char * username )
2005-04-15 17:41:49 +04:00
{
char * filter = NULL ;
char * escaped = NULL ;
char * result = NULL ;
2008-12-23 21:42:25 +03:00
if ( asprintf ( & filter , " (&%s(objectclass=%s)) " ,
" (uid=%u) " , LDAP_OBJ_SAMBASAMACCOUNT ) < 0 ) {
goto done ;
}
2005-04-15 17:41:49 +04:00
2009-07-10 00:03:52 +04:00
escaped = escape_ldap_string ( talloc_tos ( ) , username ) ;
2005-04-15 17:41:49 +04:00
if ( escaped = = NULL ) goto done ;
2005-12-18 21:06:15 +03:00
result = talloc_string_sub ( mem_ctx , filter , " %u " , username ) ;
2005-04-15 17:41:49 +04:00
done :
SAFE_FREE ( filter ) ;
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escaped ) ;
2005-04-15 17:41:49 +04:00
return result ;
}
2010-07-05 14:36:19 +04:00
static const char * * talloc_attrs ( TALLOC_CTX * mem_ctx , . . . )
2005-04-15 17:41:49 +04:00
{
int i , num = 0 ;
va_list ap ;
const char * * result ;
va_start ( ap , mem_ctx ) ;
while ( va_arg ( ap , const char * ) ! = NULL )
num + = 1 ;
va_end ( ap ) ;
2011-06-07 05:30:12 +04:00
if ( ( result = talloc_array ( mem_ctx , const char * , num + 1 ) ) = = NULL ) {
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
return NULL ;
}
2005-04-15 17:41:49 +04:00
va_start ( ap , mem_ctx ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
for ( i = 0 ; i < num ; i + + ) {
result [ i ] = talloc_strdup ( result , va_arg ( ap , const char * ) ) ;
if ( result [ i ] = = NULL ) {
talloc_free ( result ) ;
2009-01-20 02:09:51 +03:00
va_end ( ap ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
return NULL ;
}
}
2005-04-15 17:41:49 +04:00
va_end ( ap ) ;
result [ num ] = NULL ;
return result ;
}
struct ldap_search_state {
struct smbldap_state * connection ;
2010-05-21 04:38:04 +04:00
uint32_t acct_flags ;
uint16_t group_type ;
2005-04-15 17:41:49 +04:00
const char * base ;
int scope ;
const char * filter ;
const char * * attrs ;
int attrsonly ;
void * pagedresults_cookie ;
LDAPMessage * entries , * current_entry ;
2007-10-19 04:40:25 +04:00
bool ( * ldap2displayentry ) ( struct ldap_search_state * state ,
2005-04-15 17:41:49 +04:00
TALLOC_CTX * mem_ctx ,
LDAP * ld , LDAPMessage * entry ,
struct samr_displayentry * result ) ;
} ;
2007-10-19 04:40:25 +04:00
static bool ldapsam_search_firstpage ( struct pdb_search * search )
2005-04-15 17:41:49 +04:00
{
2006-07-11 22:01:26 +04:00
struct ldap_search_state * state =
( struct ldap_search_state * ) search - > private_data ;
2005-05-12 12:33:27 +04:00
LDAP * ld ;
2005-04-15 17:41:49 +04:00
int rc = LDAP_OPERATIONS_ERROR ;
state - > entries = NULL ;
if ( state - > connection - > paged_results ) {
rc = smbldap_search_paged ( state - > connection , state - > base ,
state - > scope , state - > filter ,
state - > attrs , state - > attrsonly ,
lp_ldap_page_size ( ) , & state - > entries ,
& state - > pagedresults_cookie ) ;
}
if ( ( rc ! = LDAP_SUCCESS ) | | ( state - > entries = = NULL ) ) {
if ( state - > entries ! = NULL ) {
/* Left over from unsuccessful paged attempt */
ldap_msgfree ( state - > entries ) ;
state - > entries = NULL ;
}
rc = smbldap_search ( state - > connection , state - > base ,
state - > scope , state - > filter , state - > attrs ,
state - > attrsonly , & state - > entries ) ;
if ( ( rc ! = LDAP_SUCCESS ) | | ( state - > entries = = NULL ) )
return False ;
/* Ok, the server was lying. It told us it could do paged
* searches when it could not . */
state - > connection - > paged_results = False ;
}
2005-05-12 12:33:27 +04:00
ld = state - > connection - > ldap_struct ;
if ( ld = = NULL ) {
DEBUG ( 5 , ( " Don't have an LDAP connection right after a "
" search \n " ) ) ;
return False ;
}
state - > current_entry = ldap_first_entry ( ld , state - > entries ) ;
2005-04-15 17:41:49 +04:00
return True ;
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_search_nextpage ( struct pdb_search * search )
2005-04-15 17:41:49 +04:00
{
2006-07-11 22:01:26 +04:00
struct ldap_search_state * state =
( struct ldap_search_state * ) search - > private_data ;
2005-04-15 17:41:49 +04:00
int rc ;
if ( ! state - > connection - > paged_results ) {
/* There is no next page when there are no paged results */
return False ;
}
rc = smbldap_search_paged ( state - > connection , state - > base ,
state - > scope , state - > filter , state - > attrs ,
state - > attrsonly , lp_ldap_page_size ( ) ,
& state - > entries ,
& state - > pagedresults_cookie ) ;
if ( ( rc ! = LDAP_SUCCESS ) | | ( state - > entries = = NULL ) )
return False ;
2006-02-04 01:19:41 +03:00
state - > current_entry = ldap_first_entry ( state - > connection - > ldap_struct , state - > entries ) ;
2005-04-15 17:41:49 +04:00
if ( state - > current_entry = = NULL ) {
ldap_msgfree ( state - > entries ) ;
state - > entries = NULL ;
2009-05-18 18:04:04 +04:00
return false ;
2005-04-15 17:41:49 +04:00
}
return True ;
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_search_next_entry ( struct pdb_search * search ,
2005-04-15 17:41:49 +04:00
struct samr_displayentry * entry )
{
2006-07-11 22:01:26 +04:00
struct ldap_search_state * state =
( struct ldap_search_state * ) search - > private_data ;
2007-10-19 04:40:25 +04:00
bool result ;
2005-04-15 17:41:49 +04:00
retry :
if ( ( state - > entries = = NULL ) & & ( state - > pagedresults_cookie = = NULL ) )
return False ;
if ( ( state - > entries = = NULL ) & &
! ldapsam_search_nextpage ( search ) )
return False ;
2010-07-06 18:55:14 +04:00
if ( state - > current_entry = = NULL ) {
return false ;
}
2009-02-12 19:48:52 +03:00
result = state - > ldap2displayentry ( state , search ,
state - > connection - > ldap_struct ,
2005-04-15 17:41:49 +04:00
state - > current_entry , entry ) ;
if ( ! result ) {
char * dn ;
2006-02-04 01:19:41 +03:00
dn = ldap_get_dn ( state - > connection - > ldap_struct , state - > current_entry ) ;
2005-04-15 17:41:49 +04:00
DEBUG ( 5 , ( " Skipping entry %s \n " , dn ! = NULL ? dn : " <NULL> " ) ) ;
if ( dn ! = NULL ) ldap_memfree ( dn ) ;
}
2006-02-04 01:19:41 +03:00
state - > current_entry = ldap_next_entry ( state - > connection - > ldap_struct , state - > current_entry ) ;
2005-04-15 17:41:49 +04:00
if ( state - > current_entry = = NULL ) {
ldap_msgfree ( state - > entries ) ;
state - > entries = NULL ;
}
if ( ! result ) goto retry ;
return True ;
}
2005-04-18 20:07:49 +04:00
static void ldapsam_search_end ( struct pdb_search * search )
2005-04-15 17:41:49 +04:00
{
2006-07-11 22:01:26 +04:00
struct ldap_search_state * state =
( struct ldap_search_state * ) search - > private_data ;
2005-04-15 17:41:49 +04:00
int rc ;
if ( state - > pagedresults_cookie = = NULL )
return ;
if ( state - > entries ! = NULL )
ldap_msgfree ( state - > entries ) ;
state - > entries = NULL ;
state - > current_entry = NULL ;
if ( ! state - > connection - > paged_results )
return ;
/* Tell the LDAP server we're not interested in the rest anymore. */
rc = smbldap_search_paged ( state - > connection , state - > base , state - > scope ,
state - > filter , state - > attrs ,
state - > attrsonly , 0 , & state - > entries ,
& state - > pagedresults_cookie ) ;
if ( rc ! = LDAP_SUCCESS )
DEBUG ( 5 , ( " Could not end search properly \n " ) ) ;
return ;
}
2007-10-19 04:40:25 +04:00
static bool ldapuser2displayentry ( struct ldap_search_state * state ,
2005-04-15 17:41:49 +04:00
TALLOC_CTX * mem_ctx ,
LDAP * ld , LDAPMessage * entry ,
struct samr_displayentry * result )
{
char * * vals ;
2008-04-30 01:36:24 +04:00
size_t converted_size ;
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2010-05-21 04:38:04 +04:00
uint32_t acct_flags ;
2005-04-15 17:41:49 +04:00
vals = ldap_get_values ( ld , entry , " sambaAcctFlags " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) ) {
DEBUG ( 5 , ( " \" sambaAcctFlags \" not found \n " ) ) ;
return False ;
}
acct_flags = pdb_decode_acct_ctrl ( vals [ 0 ] ) ;
ldap_value_free ( vals ) ;
if ( ( state - > acct_flags ! = 0 ) & &
( ( state - > acct_flags & acct_flags ) = = 0 ) )
return False ;
result - > acct_flags = acct_flags ;
result - > account_name = " " ;
result - > fullname = " " ;
result - > description = " " ;
vals = ldap_get_values ( ld , entry , " uid " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) ) {
DEBUG ( 5 , ( " \" uid \" not found \n " ) ) ;
return False ;
}
2008-04-30 01:36:24 +04:00
if ( ! pull_utf8_talloc ( mem_ctx ,
2011-05-06 03:19:49 +04:00
discard_const_p ( char * , & result - > account_name ) ,
2008-04-30 01:36:24 +04:00
vals [ 0 ] , & converted_size ) )
{
DEBUG ( 0 , ( " ldapuser2displayentry: pull_utf8_talloc failed: %s " ,
strerror ( errno ) ) ) ;
}
2005-04-15 17:41:49 +04:00
ldap_value_free ( vals ) ;
vals = ldap_get_values ( ld , entry , " displayName " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) )
DEBUG ( 8 , ( " \" displayName \" not found \n " ) ) ;
2008-04-30 01:36:24 +04:00
else if ( ! pull_utf8_talloc ( mem_ctx ,
2011-05-06 03:19:49 +04:00
discard_const_p ( char * , & result - > fullname ) ,
2008-04-30 01:36:24 +04:00
vals [ 0 ] , & converted_size ) )
{
DEBUG ( 0 , ( " ldapuser2displayentry: pull_utf8_talloc failed: %s " ,
strerror ( errno ) ) ) ;
}
2005-04-15 17:41:49 +04:00
ldap_value_free ( vals ) ;
vals = ldap_get_values ( ld , entry , " description " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) )
DEBUG ( 8 , ( " \" description \" not found \n " ) ) ;
2008-04-30 01:36:24 +04:00
else if ( ! pull_utf8_talloc ( mem_ctx ,
2011-05-06 03:19:49 +04:00
discard_const_p ( char * , & result - > description ) ,
2008-04-30 01:36:24 +04:00
vals [ 0 ] , & converted_size ) )
{
DEBUG ( 0 , ( " ldapuser2displayentry: pull_utf8_talloc failed: %s " ,
strerror ( errno ) ) ) ;
}
2005-04-15 17:41:49 +04:00
ldap_value_free ( vals ) ;
if ( ( result - > account_name = = NULL ) | |
( result - > fullname = = NULL ) | |
( result - > description = = NULL ) ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return False ;
}
2009-05-31 13:14:06 +04:00
2005-04-15 17:41:49 +04:00
vals = ldap_get_values ( ld , entry , " sambaSid " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) ) {
DEBUG ( 0 , ( " \" objectSid \" not found \n " ) ) ;
return False ;
}
if ( ! string_to_sid ( & sid , vals [ 0 ] ) ) {
DEBUG ( 0 , ( " Could not convert %s to SID \n " , vals [ 0 ] ) ) ;
ldap_value_free ( vals ) ;
return False ;
}
ldap_value_free ( vals ) ;
if ( ! sid_peek_check_rid ( get_global_sam_sid ( ) , & sid , & result - > rid ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " sid %s does not belong to our domain \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( & sid ) ) ) ;
2005-04-15 17:41:49 +04:00
return False ;
}
return True ;
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_search_users ( struct pdb_methods * methods ,
2005-04-15 17:41:49 +04:00
struct pdb_search * search ,
2010-05-21 04:38:04 +04:00
uint32_t acct_flags )
2005-04-15 17:41:49 +04:00
{
2006-07-11 22:01:26 +04:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
2005-04-15 17:41:49 +04:00
struct ldap_search_state * state ;
2009-02-12 19:48:52 +03:00
state = talloc ( search , struct ldap_search_state ) ;
2005-04-15 17:41:49 +04:00
if ( state = = NULL ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return False ;
}
state - > connection = ldap_state - > smbldap_state ;
if ( ( acct_flags ! = 0 ) & & ( ( acct_flags & ACB_NORMAL ) ! = 0 ) )
2012-07-18 09:37:23 +04:00
state - > base = lp_ldap_user_suffix ( talloc_tos ( ) ) ;
2005-04-15 17:41:49 +04:00
else if ( ( acct_flags ! = 0 ) & &
2005-07-18 17:16:52 +04:00
( ( acct_flags & ( ACB_WSTRUST | ACB_SVRTRUST | ACB_DOMTRUST ) ) ! = 0 ) )
2012-07-18 09:37:23 +04:00
state - > base = lp_ldap_machine_suffix ( talloc_tos ( ) ) ;
2005-04-15 17:41:49 +04:00
else
2012-07-18 09:37:23 +04:00
state - > base = lp_ldap_suffix ( talloc_tos ( ) ) ;
2005-04-15 17:41:49 +04:00
state - > acct_flags = acct_flags ;
2009-02-12 19:48:52 +03:00
state - > base = talloc_strdup ( search , state - > base ) ;
2005-04-15 17:41:49 +04:00
state - > scope = LDAP_SCOPE_SUBTREE ;
2009-02-12 19:48:52 +03:00
state - > filter = get_ldap_filter ( search , " * " ) ;
state - > attrs = talloc_attrs ( search , " uid " , " sambaSid " ,
2005-04-15 17:41:49 +04:00
" displayName " , " description " ,
" sambaAcctFlags " , NULL ) ;
state - > attrsonly = 0 ;
state - > pagedresults_cookie = NULL ;
state - > entries = NULL ;
state - > ldap2displayentry = ldapuser2displayentry ;
if ( ( state - > filter = = NULL ) | | ( state - > attrs = = NULL ) ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return False ;
}
2005-06-25 00:25:18 +04:00
search - > private_data = state ;
2005-04-18 20:07:49 +04:00
search - > next_entry = ldapsam_search_next_entry ;
search - > search_end = ldapsam_search_end ;
2005-04-15 17:41:49 +04:00
return ldapsam_search_firstpage ( search ) ;
}
2007-10-19 04:40:25 +04:00
static bool ldapgroup2displayentry ( struct ldap_search_state * state ,
2005-04-15 17:41:49 +04:00
TALLOC_CTX * mem_ctx ,
LDAP * ld , LDAPMessage * entry ,
struct samr_displayentry * result )
{
char * * vals ;
2008-04-30 01:36:24 +04:00
size_t converted_size ;
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2010-05-21 04:38:04 +04:00
uint16_t group_type ;
2005-04-15 17:41:49 +04:00
result - > account_name = " " ;
result - > fullname = " " ;
result - > description = " " ;
2005-07-27 01:57:49 +04:00
vals = ldap_get_values ( ld , entry , " sambaGroupType " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) ) {
DEBUG ( 5 , ( " \" sambaGroupType \" not found \n " ) ) ;
2005-12-31 13:57:43 +03:00
if ( vals ! = NULL ) {
ldap_value_free ( vals ) ;
}
2005-07-27 01:57:49 +04:00
return False ;
}
group_type = atoi ( vals [ 0 ] ) ;
if ( ( state - > group_type ! = 0 ) & &
( ( state - > group_type ! = group_type ) ) ) {
2005-12-31 13:57:43 +03:00
ldap_value_free ( vals ) ;
2005-07-27 01:57:49 +04:00
return False ;
}
2005-12-31 13:57:43 +03:00
ldap_value_free ( vals ) ;
2005-08-26 22:57:32 +04:00
/* display name is the NT group name */
2005-04-15 17:41:49 +04:00
vals = ldap_get_values ( ld , entry , " displayName " ) ;
2005-08-26 23:15:19 +04:00
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) ) {
2005-04-15 17:41:49 +04:00
DEBUG ( 8 , ( " \" displayName \" not found \n " ) ) ;
2005-08-26 23:15:19 +04:00
/* fallback to the 'cn' attribute */
vals = ldap_get_values ( ld , entry , " cn " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) ) {
DEBUG ( 5 , ( " \" cn \" not found \n " ) ) ;
return False ;
}
2008-04-30 01:36:24 +04:00
if ( ! pull_utf8_talloc ( mem_ctx ,
2011-05-06 03:19:49 +04:00
discard_const_p ( char * ,
2008-04-30 01:36:24 +04:00
& result - > account_name ) ,
vals [ 0 ] , & converted_size ) )
{
DEBUG ( 0 , ( " ldapgroup2displayentry: pull_utf8_talloc "
" failed: %s " , strerror ( errno ) ) ) ;
}
2005-08-26 23:15:19 +04:00
}
2008-04-30 01:36:24 +04:00
else if ( ! pull_utf8_talloc ( mem_ctx ,
2011-05-06 03:19:49 +04:00
discard_const_p ( char * ,
2008-04-30 01:36:24 +04:00
& result - > account_name ) ,
vals [ 0 ] , & converted_size ) )
{
DEBUG ( 0 , ( " ldapgroup2displayentry: pull_utf8_talloc failed: %s " ,
strerror ( errno ) ) ) ;
2005-08-26 23:15:19 +04:00
}
2005-04-15 17:41:49 +04:00
ldap_value_free ( vals ) ;
vals = ldap_get_values ( ld , entry , " description " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) )
DEBUG ( 8 , ( " \" description \" not found \n " ) ) ;
2008-04-30 01:36:24 +04:00
else if ( ! pull_utf8_talloc ( mem_ctx ,
2011-05-06 03:19:49 +04:00
discard_const_p ( char * , & result - > description ) ,
2008-04-30 01:36:24 +04:00
vals [ 0 ] , & converted_size ) )
{
DEBUG ( 0 , ( " ldapgroup2displayentry: pull_utf8_talloc failed: %s " ,
strerror ( errno ) ) ) ;
}
2005-04-15 17:41:49 +04:00
ldap_value_free ( vals ) ;
if ( ( result - > account_name = = NULL ) | |
( result - > fullname = = NULL ) | |
( result - > description = = NULL ) ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return False ;
}
2009-05-31 13:14:06 +04:00
2005-04-15 17:41:49 +04:00
vals = ldap_get_values ( ld , entry , " sambaSid " ) ;
if ( ( vals = = NULL ) | | ( vals [ 0 ] = = NULL ) ) {
DEBUG ( 0 , ( " \" objectSid \" not found \n " ) ) ;
2005-12-31 13:57:43 +03:00
if ( vals ! = NULL ) {
ldap_value_free ( vals ) ;
}
2005-04-15 17:41:49 +04:00
return False ;
}
if ( ! string_to_sid ( & sid , vals [ 0 ] ) ) {
DEBUG ( 0 , ( " Could not convert %s to SID \n " , vals [ 0 ] ) ) ;
return False ;
}
ldap_value_free ( vals ) ;
2005-07-27 01:57:49 +04:00
switch ( group_type ) {
case SID_NAME_DOM_GRP :
case SID_NAME_ALIAS :
2006-03-15 19:00:34 +03:00
if ( ! sid_peek_check_rid ( get_global_sam_sid ( ) , & sid , & result - > rid )
& & ! sid_peek_check_rid ( & global_sid_Builtin , & sid , & result - > rid ) )
{
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " %s is not in our domain \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( & sid ) ) ) ;
2005-07-27 01:57:49 +04:00
return False ;
}
break ;
2009-05-31 13:14:06 +04:00
2005-07-27 01:57:49 +04:00
default :
2011-03-01 00:04:29 +03:00
DEBUG ( 0 , ( " unknown group type: %d \n " , group_type ) ) ;
2005-07-27 01:57:49 +04:00
return False ;
}
2008-07-10 20:20:30 +04:00
result - > acct_flags = 0 ;
2005-04-15 17:41:49 +04:00
return True ;
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_search_grouptype ( struct pdb_methods * methods ,
2005-04-15 17:41:49 +04:00
struct pdb_search * search ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid ,
2006-09-08 18:28:06 +04:00
enum lsa_SidType type )
2005-04-15 17:41:49 +04:00
{
2006-07-11 22:01:26 +04:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
2005-04-15 17:41:49 +04:00
struct ldap_search_state * state ;
2007-12-16 00:00:39 +03:00
fstring tmp ;
2005-04-15 17:41:49 +04:00
2009-02-12 19:48:52 +03:00
state = talloc ( search , struct ldap_search_state ) ;
2005-04-15 17:41:49 +04:00
if ( state = = NULL ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return False ;
}
state - > connection = ldap_state - > smbldap_state ;
2012-07-18 09:37:23 +04:00
state - > base = lp_ldap_suffix ( search ) ;
2005-04-15 17:41:49 +04:00
state - > connection = ldap_state - > smbldap_state ;
state - > scope = LDAP_SCOPE_SUBTREE ;
2009-02-12 19:48:52 +03:00
state - > filter = talloc_asprintf ( search , " (&(objectclass=%s) "
2008-07-18 15:15:05 +04:00
" (sambaGroupType=%d)(sambaSID=%s*)) " ,
LDAP_OBJ_GROUPMAP ,
type , sid_to_fstring ( tmp , sid ) ) ;
2009-02-12 19:48:52 +03:00
state - > attrs = talloc_attrs ( search , " cn " , " sambaSid " ,
2006-02-04 01:19:41 +03:00
" displayName " , " description " ,
" sambaGroupType " , NULL ) ;
2005-04-15 17:41:49 +04:00
state - > attrsonly = 0 ;
state - > pagedresults_cookie = NULL ;
state - > entries = NULL ;
2005-07-27 01:57:49 +04:00
state - > group_type = type ;
2005-04-15 17:41:49 +04:00
state - > ldap2displayentry = ldapgroup2displayentry ;
if ( ( state - > filter = = NULL ) | | ( state - > attrs = = NULL ) ) {
DEBUG ( 0 , ( " talloc failed \n " ) ) ;
return False ;
}
2005-06-25 00:25:18 +04:00
search - > private_data = state ;
2005-04-18 20:07:49 +04:00
search - > next_entry = ldapsam_search_next_entry ;
search - > search_end = ldapsam_search_end ;
2005-04-15 17:41:49 +04:00
return ldapsam_search_firstpage ( search ) ;
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_search_groups ( struct pdb_methods * methods ,
2005-04-15 17:41:49 +04:00
struct pdb_search * search )
{
2006-03-15 19:00:34 +03:00
return ldapsam_search_grouptype ( methods , search , get_global_sam_sid ( ) , SID_NAME_DOM_GRP ) ;
2005-04-15 17:41:49 +04:00
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_search_aliases ( struct pdb_methods * methods ,
2005-04-15 17:41:49 +04:00
struct pdb_search * search ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid )
2005-04-15 17:41:49 +04:00
{
2006-03-15 19:00:34 +03:00
return ldapsam_search_grouptype ( methods , search , sid , SID_NAME_ALIAS ) ;
2005-04-15 17:41:49 +04:00
}
2009-06-28 19:36:12 +04:00
static uint32_t ldapsam_capabilities ( struct pdb_methods * methods )
2006-02-04 01:19:41 +03:00
{
2009-06-28 19:36:12 +04:00
return PDB_CAP_STORE_RIDS ;
2006-02-04 01:19:41 +03:00
}
static NTSTATUS ldapsam_get_new_rid ( struct ldapsam_privates * priv ,
2010-05-21 04:38:04 +04:00
uint32_t * rid )
2006-02-04 01:19:41 +03:00
{
struct smbldap_state * smbldap_state = priv - > smbldap_state ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
LDAPMod * * mods = NULL ;
NTSTATUS status ;
char * value ;
int rc ;
2010-05-21 04:38:04 +04:00
uint32_t nextRid = 0 ;
2006-05-13 21:28:21 +04:00
const char * dn ;
2006-02-04 01:19:41 +03:00
TALLOC_CTX * mem_ctx ;
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
DEBUG ( 0 , ( " talloc_new failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
status = smbldap_search_domain_info ( smbldap_state , & result ,
get_global_sam_name ( ) , False ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 3 , ( " Could not get domain info: %s \n " ,
nt_errstr ( status ) ) ) ;
goto done ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2006-02-04 01:19:41 +03:00
entry = ldap_first_entry ( priv2ld ( priv ) , result ) ;
if ( entry = = NULL ) {
DEBUG ( 0 , ( " Could not get domain info entry \n " ) ) ;
status = NT_STATUS_INTERNAL_DB_CORRUPTION ;
goto done ;
}
/* Find the largest of the three attributes "sambaNextRid",
" sambaNextGroupRid " and " sambaNextUserRid " . I gave up on the
concept of differentiating between user and group rids , and will
use only " sambaNextRid " in the future . But for compatibility
reasons I look if others have chosen different strategies - - VL */
value = smbldap_talloc_single_attribute ( priv2ld ( priv ) , entry ,
" sambaNextRid " , mem_ctx ) ;
if ( value ! = NULL ) {
2010-05-21 04:38:04 +04:00
uint32_t tmp = ( uint32_t ) strtoul ( value , NULL , 10 ) ;
2006-02-04 01:19:41 +03:00
nextRid = MAX ( nextRid , tmp ) ;
}
value = smbldap_talloc_single_attribute ( priv2ld ( priv ) , entry ,
" sambaNextUserRid " , mem_ctx ) ;
if ( value ! = NULL ) {
2010-05-21 04:38:04 +04:00
uint32_t tmp = ( uint32_t ) strtoul ( value , NULL , 10 ) ;
2006-02-04 01:19:41 +03:00
nextRid = MAX ( nextRid , tmp ) ;
}
value = smbldap_talloc_single_attribute ( priv2ld ( priv ) , entry ,
" sambaNextGroupRid " , mem_ctx ) ;
if ( value ! = NULL ) {
2010-05-21 04:38:04 +04:00
uint32_t tmp = ( uint32_t ) strtoul ( value , NULL , 10 ) ;
2006-02-04 01:19:41 +03:00
nextRid = MAX ( nextRid , tmp ) ;
}
if ( nextRid = = 0 ) {
nextRid = BASE_RID - 1 ;
}
nextRid + = 1 ;
smbldap_make_mod ( priv2ld ( priv ) , entry , & mods , " sambaNextRid " ,
talloc_asprintf ( mem_ctx , " %d " , nextRid ) ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( mem_ctx , mods ) ;
2006-02-04 01:19:41 +03:00
2006-05-13 21:28:21 +04:00
if ( ( dn = smbldap_talloc_dn ( mem_ctx , priv2ld ( priv ) , entry ) ) = = NULL ) {
status = NT_STATUS_NO_MEMORY ;
goto done ;
}
rc = smbldap_modify ( smbldap_state , dn , mods ) ;
2006-02-04 01:19:41 +03:00
/* ACCESS_DENIED is used as a placeholder for "the modify failed,
* please retry " */
status = ( rc = = LDAP_SUCCESS ) ? NT_STATUS_OK : NT_STATUS_ACCESS_DENIED ;
done :
if ( NT_STATUS_IS_OK ( status ) ) {
* rid = nextRid ;
}
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( mem_ctx ) ;
2006-02-04 01:19:41 +03:00
return status ;
}
2010-05-21 04:38:04 +04:00
static NTSTATUS ldapsam_new_rid_internal ( struct pdb_methods * methods , uint32_t * rid )
2006-02-04 01:19:41 +03:00
{
int i ;
for ( i = 0 ; i < 10 ; i + + ) {
2006-07-11 22:01:26 +04:00
NTSTATUS result = ldapsam_get_new_rid (
( struct ldapsam_privates * ) methods - > private_data , rid ) ;
2006-02-04 01:19:41 +03:00
if ( NT_STATUS_IS_OK ( result ) ) {
2006-05-26 04:13:06 +04:00
return result ;
2006-02-04 01:19:41 +03:00
}
if ( ! NT_STATUS_EQUAL ( result , NT_STATUS_ACCESS_DENIED ) ) {
2006-05-26 04:13:06 +04:00
return result ;
2006-02-04 01:19:41 +03:00
}
/* The ldap update failed (maybe a race condition), retry */
}
/* Tried 10 times, fail. */
2006-05-26 04:13:06 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2010-05-21 04:38:04 +04:00
static bool ldapsam_new_rid ( struct pdb_methods * methods , uint32_t * rid )
2006-05-26 04:13:06 +04:00
{
NTSTATUS result = ldapsam_new_rid_internal ( methods , rid ) ;
return NT_STATUS_IS_OK ( result ) ? True : False ;
2006-02-04 01:19:41 +03:00
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_sid_to_id ( struct pdb_methods * methods ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid ,
2012-03-16 02:16:23 +04:00
struct unixid * id )
2006-02-04 01:19:41 +03:00
{
2006-07-11 22:01:26 +04:00
struct ldapsam_privates * priv =
( struct ldapsam_privates * ) methods - > private_data ;
2006-02-04 01:19:41 +03:00
char * filter ;
const char * attrs [ ] = { " sambaGroupType " , " gidNumber " , " uidNumber " ,
NULL } ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
2007-10-19 04:40:25 +04:00
bool ret = False ;
2006-02-04 01:19:41 +03:00
char * value ;
int rc ;
TALLOC_CTX * mem_ctx ;
2012-12-03 04:42:38 +04:00
if ( ! sid_check_object_is_for_passdb ( sid ) ) {
return false ;
2012-08-21 08:56:45 +04:00
}
2012-12-03 04:44:49 +04:00
ret = pdb_sid_to_id_unix_users_and_groups ( sid , id ) ;
if ( ret = = true ) {
return true ;
}
2006-02-04 01:19:41 +03:00
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
DEBUG ( 0 , ( " talloc_new failed \n " ) ) ;
return False ;
}
filter = talloc_asprintf ( mem_ctx ,
" (&(sambaSid=%s) "
2006-03-05 20:49:30 +03:00
" (|(objectClass=%s)(objectClass=%s))) " ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( mem_ctx , sid ) ,
2006-03-05 20:49:30 +03:00
LDAP_OBJ_GROUPMAP , LDAP_OBJ_SAMBASAMACCOUNT ) ;
2006-02-04 01:19:41 +03:00
if ( filter = = NULL ) {
DEBUG ( 5 , ( " talloc_asprintf failed \n " ) ) ;
goto done ;
}
rc = smbldap_search_suffix ( priv - > smbldap_state , filter ,
attrs , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
goto done ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2006-02-04 01:19:41 +03:00
if ( ldap_count_entries ( priv2ld ( priv ) , result ) ! = 1 ) {
DEBUG ( 10 , ( " Got %d entries, expected one \n " ,
ldap_count_entries ( priv2ld ( priv ) , result ) ) ) ;
goto done ;
}
entry = ldap_first_entry ( priv2ld ( priv ) , result ) ;
value = smbldap_talloc_single_attribute ( priv2ld ( priv ) , entry ,
" sambaGroupType " , mem_ctx ) ;
if ( value ! = NULL ) {
const char * gid_str ;
/* It's a group */
gid_str = smbldap_talloc_single_attribute (
priv2ld ( priv ) , entry , " gidNumber " , mem_ctx ) ;
if ( gid_str = = NULL ) {
DEBUG ( 1 , ( " %s has sambaGroupType but no gidNumber \n " ,
smbldap_talloc_dn ( mem_ctx , priv2ld ( priv ) ,
entry ) ) ) ;
goto done ;
}
2012-03-16 02:16:23 +04:00
id - > id = strtoul ( gid_str , NULL , 10 ) ;
id - > type = ID_TYPE_GID ;
2012-03-23 14:11:33 +04:00
idmap_cache_set_sid2unixid ( sid , id ) ;
2006-02-04 01:19:41 +03:00
ret = True ;
goto done ;
}
/* It must be a user */
value = smbldap_talloc_single_attribute ( priv2ld ( priv ) , entry ,
" uidNumber " , mem_ctx ) ;
if ( value = = NULL ) {
DEBUG ( 1 , ( " Could not find uidNumber in %s \n " ,
smbldap_talloc_dn ( mem_ctx , priv2ld ( priv ) , entry ) ) ) ;
goto done ;
}
2012-03-16 02:16:23 +04:00
id - > id = strtoul ( value , NULL , 10 ) ;
id - > type = ID_TYPE_UID ;
2012-03-23 14:11:33 +04:00
idmap_cache_set_sid2unixid ( sid , id ) ;
2006-02-04 01:19:41 +03:00
ret = True ;
done :
2006-02-20 20:59:58 +03:00
TALLOC_FREE ( mem_ctx ) ;
2006-02-04 01:19:41 +03:00
return ret ;
}
2009-11-16 13:37:18 +03:00
/**
* Find the SID for a uid .
* This is shortcut is only used if ldapsam : trusted is set to true .
*/
static bool ldapsam_uid_to_sid ( struct pdb_methods * methods , uid_t uid ,
2010-05-21 05:25:01 +04:00
struct dom_sid * sid )
2009-11-16 13:37:18 +03:00
{
struct ldapsam_privates * priv =
( struct ldapsam_privates * ) methods - > private_data ;
char * filter ;
const char * attrs [ ] = { " sambaSID " , NULL } ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
bool ret = false ;
char * user_sid_string ;
2010-01-23 15:18:00 +03:00
struct dom_sid user_sid ;
2009-11-16 13:37:18 +03:00
int rc ;
TALLOC_CTX * tmp_ctx = talloc_stackframe ( ) ;
2012-03-23 14:11:33 +04:00
struct unixid id ;
2009-11-16 13:37:18 +03:00
filter = talloc_asprintf ( tmp_ctx ,
" (&(uidNumber=%u) "
" (objectClass=%s) "
" (objectClass=%s)) " ,
( unsigned int ) uid ,
LDAP_OBJ_POSIXACCOUNT ,
LDAP_OBJ_SAMBASAMACCOUNT ) ;
if ( filter = = NULL ) {
DEBUG ( 3 , ( " talloc_asprintf failed \n " ) ) ;
goto done ;
}
rc = smbldap_search_suffix ( priv - > smbldap_state , filter , attrs , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
goto done ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2009-11-16 13:37:18 +03:00
if ( ldap_count_entries ( priv2ld ( priv ) , result ) ! = 1 ) {
DEBUG ( 3 , ( " ERROR: Got %d entries for uid %u, expected one \n " ,
ldap_count_entries ( priv2ld ( priv ) , result ) ,
( unsigned int ) uid ) ) ;
goto done ;
}
entry = ldap_first_entry ( priv2ld ( priv ) , result ) ;
user_sid_string = smbldap_talloc_single_attribute ( priv2ld ( priv ) , entry ,
" sambaSID " , tmp_ctx ) ;
if ( user_sid_string = = NULL ) {
DEBUG ( 1 , ( " Could not find sambaSID in object '%s' \n " ,
smbldap_talloc_dn ( tmp_ctx , priv2ld ( priv ) , entry ) ) ) ;
goto done ;
}
2010-01-23 15:18:00 +03:00
if ( ! string_to_sid ( & user_sid , user_sid_string ) ) {
2009-11-16 13:37:18 +03:00
DEBUG ( 3 , ( " Error calling sid_string_talloc for sid '%s' \n " ,
user_sid_string ) ) ;
goto done ;
}
2010-01-23 15:18:00 +03:00
sid_copy ( sid , & user_sid ) ;
2009-11-16 13:37:18 +03:00
2012-03-23 14:11:33 +04:00
id . id = uid ;
id . type = ID_TYPE_UID ;
idmap_cache_set_sid2unixid ( sid , & id ) ;
2009-11-16 13:37:18 +03:00
ret = true ;
done :
TALLOC_FREE ( tmp_ctx ) ;
return ret ;
}
2010-01-31 00:28:19 +03:00
/**
* Find the SID for a gid .
* This is shortcut is only used if ldapsam : trusted is set to true .
*/
static bool ldapsam_gid_to_sid ( struct pdb_methods * methods , gid_t gid ,
2010-05-21 05:25:01 +04:00
struct dom_sid * sid )
2010-01-31 00:28:19 +03:00
{
struct ldapsam_privates * priv =
( struct ldapsam_privates * ) methods - > private_data ;
char * filter ;
const char * attrs [ ] = { " sambaSID " , NULL } ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
bool ret = false ;
char * group_sid_string ;
2010-05-21 05:25:01 +04:00
struct dom_sid group_sid ;
2010-01-31 00:28:19 +03:00
int rc ;
TALLOC_CTX * tmp_ctx = talloc_stackframe ( ) ;
2012-03-23 14:11:33 +04:00
struct unixid id ;
2010-01-31 00:28:19 +03:00
filter = talloc_asprintf ( tmp_ctx ,
" (&(gidNumber=%u) "
" (objectClass=%s)) " ,
( unsigned int ) gid ,
LDAP_OBJ_GROUPMAP ) ;
if ( filter = = NULL ) {
DEBUG ( 3 , ( " talloc_asprintf failed \n " ) ) ;
goto done ;
}
rc = smbldap_search_suffix ( priv - > smbldap_state , filter , attrs , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
goto done ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2010-01-31 00:28:19 +03:00
if ( ldap_count_entries ( priv2ld ( priv ) , result ) ! = 1 ) {
DEBUG ( 3 , ( " ERROR: Got %d entries for gid %u, expected one \n " ,
ldap_count_entries ( priv2ld ( priv ) , result ) ,
( unsigned int ) gid ) ) ;
goto done ;
}
entry = ldap_first_entry ( priv2ld ( priv ) , result ) ;
group_sid_string = smbldap_talloc_single_attribute ( priv2ld ( priv ) , entry ,
" sambaSID " , tmp_ctx ) ;
if ( group_sid_string = = NULL ) {
DEBUG ( 1 , ( " Could not find sambaSID in object '%s' \n " ,
smbldap_talloc_dn ( tmp_ctx , priv2ld ( priv ) , entry ) ) ) ;
goto done ;
}
if ( ! string_to_sid ( & group_sid , group_sid_string ) ) {
DEBUG ( 3 , ( " Error calling sid_string_talloc for sid '%s' \n " ,
group_sid_string ) ) ;
goto done ;
}
sid_copy ( sid , & group_sid ) ;
2012-03-23 14:11:33 +04:00
id . id = gid ;
id . type = ID_TYPE_GID ;
idmap_cache_set_sid2unixid ( sid , & id ) ;
2010-01-31 00:28:19 +03:00
ret = true ;
done :
TALLOC_FREE ( tmp_ctx ) ;
return ret ;
}
2009-11-16 13:37:18 +03:00
2006-03-01 23:47:36 +03:00
/*
2009-11-16 13:01:53 +03:00
* The following functions are called only if
2006-03-01 23:47:36 +03:00
* ldapsam : trusted and ldapsam : editposix are
* set to true
*/
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
2006-03-01 23:47:36 +03:00
/*
* ldapsam_create_user creates a new
* posixAccount and sambaSamAccount object
* in the ldap users subtree
*
* The uid is allocated by winbindd .
*/
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
2006-03-01 23:47:36 +03:00
static NTSTATUS ldapsam_create_user ( struct pdb_methods * my_methods ,
TALLOC_CTX * tmp_ctx , const char * name ,
2010-05-21 04:38:04 +04:00
uint32_t acb_info , uint32_t * rid )
2006-03-01 23:47:36 +03:00
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
LDAPMessage * entry = NULL ;
LDAPMessage * result = NULL ;
2010-05-21 04:38:04 +04:00
uint32_t num_result ;
2007-10-19 04:40:25 +04:00
bool is_machine = False ;
bool add_posix = False ;
2006-03-01 23:47:36 +03:00
LDAPMod * * mods = NULL ;
struct samu * user ;
char * filter ;
char * username ;
char * homedir ;
char * gidstr ;
char * uidstr ;
char * shell ;
const char * dn = NULL ;
2010-05-21 05:25:01 +04:00
struct dom_sid group_sid ;
struct dom_sid user_sid ;
2006-03-01 23:47:36 +03:00
gid_t gid = - 1 ;
uid_t uid = - 1 ;
NTSTATUS ret ;
int rc ;
2009-05-31 13:14:06 +04:00
2006-03-05 20:49:30 +03:00
if ( ( ( acb_info & ACB_NORMAL ) & & name [ strlen ( name ) - 1 ] = = ' $ ' ) | |
acb_info & ACB_WSTRUST | |
acb_info & ACB_SVRTRUST | |
acb_info & ACB_DOMTRUST ) {
2006-03-01 23:47:36 +03:00
is_machine = True ;
2005-01-26 02:30:05 +03:00
}
2003-11-14 06:28:03 +03:00
2009-07-10 00:03:52 +04:00
username = escape_ldap_string ( talloc_tos ( ) , name ) ;
2006-03-05 20:49:30 +03:00
filter = talloc_asprintf ( tmp_ctx , " (&(uid=%s)(objectClass=%s)) " ,
username , LDAP_OBJ_POSIXACCOUNT ) ;
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( username ) ;
2002-03-02 13:16:28 +03:00
2006-03-01 23:47:36 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 0 , ( " ldapsam_create_user: ldap search failed! \n " ) ) ;
2008-07-10 12:47:46 +04:00
return NT_STATUS_ACCESS_DENIED ;
2002-03-02 13:16:28 +03:00
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2002-03-02 13:16:28 +03:00
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
2002-03-02 13:16:28 +03:00
2006-03-01 23:47:36 +03:00
if ( num_result > 1 ) {
DEBUG ( 0 , ( " ldapsam_create_user: More than one user with name [%s] ?! \n " , name ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
if ( num_result = = 1 ) {
char * tmp ;
/* check if it is just a posix account.
* or if there is a sid attached to this entry
*/
2003-03-19 12:43:23 +03:00
2006-03-01 23:47:36 +03:00
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
if ( ! entry ) {
return NT_STATUS_UNSUCCESSFUL ;
}
2002-03-02 13:16:28 +03:00
2006-03-01 23:47:36 +03:00
tmp = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " sambaSID " , tmp_ctx ) ;
if ( tmp ) {
DEBUG ( 1 , ( " ldapsam_create_user: The user [%s] already exist! \n " , name ) ) ;
return NT_STATUS_USER_EXISTS ;
}
2005-09-30 21:13:37 +04:00
2006-03-01 23:47:36 +03:00
/* it is just a posix account, retrieve the dn for later use */
dn = smbldap_talloc_dn ( tmp_ctx , priv2ld ( ldap_state ) , entry ) ;
if ( ! dn ) {
DEBUG ( 0 , ( " ldapsam_create_user: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
}
2005-09-30 21:13:37 +04:00
2006-03-01 23:47:36 +03:00
if ( num_result = = 0 ) {
add_posix = True ;
}
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
/* Create the basic samu structure and generate the mods for the ldap commit */
2006-05-26 04:13:06 +04:00
if ( ! NT_STATUS_IS_OK ( ( ret = ldapsam_new_rid_internal ( my_methods , rid ) ) ) ) {
2006-03-01 23:47:36 +03:00
DEBUG ( 1 , ( " ldapsam_create_user: Could not allocate a new RID \n " ) ) ;
return ret ;
}
2006-02-04 01:19:41 +03:00
2006-03-05 20:49:30 +03:00
sid_compose ( & user_sid , get_global_sam_sid ( ) , * rid ) ;
2002-03-02 13:16:28 +03:00
2006-03-01 23:47:36 +03:00
user = samu_new ( tmp_ctx ) ;
if ( ! user ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unable to allocate user struct \n " ) ) ;
2002-03-02 13:16:28 +03:00
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
if ( ! pdb_set_username ( user , name , PDB_SET ) ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unable to fill user structs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
if ( ! pdb_set_domain ( user , get_global_sam_name ( ) , PDB_SET ) ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unable to fill user structs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
if ( is_machine ) {
2006-03-05 20:49:30 +03:00
if ( acb_info & ACB_NORMAL ) {
if ( ! pdb_set_acct_ctrl ( user , ACB_WSTRUST , PDB_SET ) ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unable to fill user structs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
} else {
if ( ! pdb_set_acct_ctrl ( user , acb_info , PDB_SET ) ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unable to fill user structs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2006-03-01 23:47:36 +03:00
}
} else {
if ( ! pdb_set_acct_ctrl ( user , ACB_NORMAL | ACB_DISABLED , PDB_SET ) ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unable to fill user structs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
}
2006-02-12 00:27:08 +03:00
2006-03-01 23:47:36 +03:00
if ( ! pdb_set_user_sid ( user , & user_sid , PDB_SET ) ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unable to fill user structs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
2006-02-12 00:27:08 +03:00
}
2003-04-28 14:20:55 +04:00
2011-08-11 09:39:47 +04:00
if ( ! init_ldap_from_sam ( ldap_state , entry , & mods , user , pdb_element_is_set_or_changed ) ) {
2006-03-01 23:47:36 +03:00
DEBUG ( 1 , ( " ldapsam_create_user: Unable to fill user structs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
2003-04-28 14:20:55 +04:00
}
2006-03-05 20:49:30 +03:00
if ( ldap_state - > schema_ver ! = SCHEMAVER_SAMBASAMACCOUNT ) {
DEBUG ( 1 , ( " ldapsam_create_user: Unsupported schema version \n " ) ) ;
2006-03-01 23:47:36 +03:00
}
2006-03-05 20:49:30 +03:00
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectClass " , LDAP_OBJ_SAMBASAMACCOUNT ) ;
2003-04-28 14:20:55 +04:00
2006-03-01 23:47:36 +03:00
if ( add_posix ) {
2007-03-01 03:49:28 +03:00
char * escape_name ;
2006-03-01 23:47:36 +03:00
DEBUG ( 3 , ( " ldapsam_create_user: Creating new posix user \n " ) ) ;
2003-04-28 14:20:55 +04:00
2006-03-01 23:47:36 +03:00
/* retrieve the Domain Users group gid */
2010-05-18 00:04:24 +04:00
if ( ! sid_compose ( & group_sid , get_global_sam_sid ( ) , DOMAIN_RID_USERS ) | |
2006-03-01 23:47:36 +03:00
! sid_to_gid ( & group_sid , & gid ) ) {
DEBUG ( 0 , ( " ldapsam_create_user: Unable to get the Domain Users gid: bailing out! \n " ) ) ;
return NT_STATUS_INVALID_PRIMARY_GROUP ;
}
2003-04-28 14:20:55 +04:00
2006-03-01 23:47:36 +03:00
/* lets allocate a new userid for this user */
if ( ! winbind_allocate_uid ( & uid ) ) {
DEBUG ( 0 , ( " ldapsam_create_user: Unable to allocate a new user id: bailing out! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2003-05-14 07:32:20 +04:00
2003-04-28 14:20:55 +04:00
2006-03-01 23:47:36 +03:00
if ( is_machine ) {
/* TODO: choose a more appropriate default for machines */
homedir = talloc_sub_specified ( tmp_ctx , lp_template_homedir ( ) , " SMB_workstations_home " , ldap_state - > domain_name , uid , gid ) ;
shell = talloc_strdup ( tmp_ctx , " /bin/false " ) ;
} else {
homedir = talloc_sub_specified ( tmp_ctx , lp_template_homedir ( ) , name , ldap_state - > domain_name , uid , gid ) ;
shell = talloc_sub_specified ( tmp_ctx , lp_template_shell ( ) , name , ldap_state - > domain_name , uid , gid ) ;
}
2009-05-12 21:38:00 +04:00
uidstr = talloc_asprintf ( tmp_ctx , " %u " , ( unsigned int ) uid ) ;
gidstr = talloc_asprintf ( tmp_ctx , " %u " , ( unsigned int ) gid ) ;
2007-03-01 03:49:28 +03:00
escape_name = escape_rdn_val_string_alloc ( name ) ;
if ( ! escape_name ) {
DEBUG ( 0 , ( " ldapsam_create_user: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
if ( is_machine ) {
2012-07-18 09:37:23 +04:00
dn = talloc_asprintf ( tmp_ctx , " uid=%s,%s " , escape_name , lp_ldap_machine_suffix ( talloc_tos ( ) ) ) ;
2006-03-01 23:47:36 +03:00
} else {
2012-07-18 09:37:23 +04:00
dn = talloc_asprintf ( tmp_ctx , " uid=%s,%s " , escape_name , lp_ldap_user_suffix ( talloc_tos ( ) ) ) ;
2002-10-01 17:10:57 +04:00
}
2007-03-01 03:49:28 +03:00
SAFE_FREE ( escape_name ) ;
2006-03-01 23:47:36 +03:00
if ( ! homedir | | ! shell | | ! uidstr | | ! gidstr | | ! dn ) {
DEBUG ( 0 , ( " ldapsam_create_user: Out of memory! \n " ) ) ;
2002-10-01 17:10:57 +04:00
return NT_STATUS_NO_MEMORY ;
}
2003-06-21 04:45:03 +04:00
2006-03-01 23:47:36 +03:00
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectClass " , LDAP_OBJ_ACCOUNT ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectClass " , LDAP_OBJ_POSIXACCOUNT ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " cn " , name ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " uidNumber " , uidstr ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " gidNumber " , gidstr ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " homeDirectory " , homedir ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " loginShell " , shell ) ;
2002-03-02 13:16:28 +03:00
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( tmp_ctx , mods ) ;
2006-02-12 00:27:08 +03:00
2006-03-01 23:47:36 +03:00
if ( add_posix ) {
rc = smbldap_add ( ldap_state - > smbldap_state , dn , mods ) ;
} else {
rc = smbldap_modify ( ldap_state - > smbldap_state , dn , mods ) ;
}
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 0 , ( " ldapsam_create_user: failed to create a new user [%s] (dn = %s) \n " , name , dn ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
DEBUG ( 2 , ( " ldapsam_create_user: added account [%s] in the LDAP database \n " , name ) ) ;
flush_pwnam_cache ( ) ;
return NT_STATUS_OK ;
}
static NTSTATUS ldapsam_delete_user ( struct pdb_methods * my_methods , TALLOC_CTX * tmp_ctx , struct samu * sam_acct )
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
int num_result ;
const char * dn ;
char * filter ;
int rc ;
DEBUG ( 0 , ( " ldapsam_delete_user: Attempt to delete user [%s] \n " , pdb_get_username ( sam_acct ) ) ) ;
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
filter = talloc_asprintf ( tmp_ctx ,
" (&(uid=%s) "
2006-03-05 20:49:30 +03:00
" (objectClass=%s) "
" (objectClass=%s)) " ,
pdb_get_username ( sam_acct ) ,
LDAP_OBJ_POSIXACCOUNT ,
LDAP_OBJ_SAMBASAMACCOUNT ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( filter = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 0 , ( " ldapsam_delete_user: user search failed! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result = = 0 ) {
DEBUG ( 0 , ( " ldapsam_delete_user: user not found! \n " ) ) ;
return NT_STATUS_NO_SUCH_USER ;
}
if ( num_result > 1 ) {
DEBUG ( 0 , ( " ldapsam_delete_user: More than one user with name [%s] ?! \n " , pdb_get_username ( sam_acct ) ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
if ( ! entry ) {
return NT_STATUS_UNSUCCESSFUL ;
}
/* it is just a posix account, retrieve the dn for later use */
dn = smbldap_talloc_dn ( tmp_ctx , priv2ld ( ldap_state ) , entry ) ;
if ( ! dn ) {
DEBUG ( 0 , ( " ldapsam_delete_user: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2009-06-24 02:33:44 +04:00
/* try to remove memberships first */
{
NTSTATUS status ;
struct dom_sid * sids = NULL ;
gid_t * gids = NULL ;
2011-02-21 12:30:28 +03:00
uint32_t num_groups = 0 ;
2009-06-24 02:33:44 +04:00
int i ;
uint32_t user_rid = pdb_get_user_rid ( sam_acct ) ;
status = ldapsam_enum_group_memberships ( my_methods ,
tmp_ctx ,
sam_acct ,
& sids ,
& gids ,
& num_groups ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto delete_dn ;
}
for ( i = 0 ; i < num_groups ; i + + ) {
uint32_t group_rid ;
sid_peek_rid ( & sids [ i ] , & group_rid ) ;
ldapsam_del_groupmem ( my_methods ,
tmp_ctx ,
group_rid ,
user_rid ) ;
}
}
delete_dn :
2006-03-01 23:47:36 +03:00
rc = smbldap_delete ( ldap_state - > smbldap_state , dn ) ;
if ( rc ! = LDAP_SUCCESS ) {
return NT_STATUS_UNSUCCESSFUL ;
}
flush_pwnam_cache ( ) ;
return NT_STATUS_OK ;
}
/*
* ldapsam_create_group creates a new
* posixGroup and sambaGroupMapping object
* in the ldap groups subtree
*
* The gid is allocated by winbindd .
*/
static NTSTATUS ldapsam_create_dom_group ( struct pdb_methods * my_methods ,
TALLOC_CTX * tmp_ctx ,
const char * name ,
2010-05-21 04:38:04 +04:00
uint32_t * rid )
2006-03-01 23:47:36 +03:00
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
NTSTATUS ret ;
LDAPMessage * entry = NULL ;
LDAPMessage * result = NULL ;
2010-05-21 04:38:04 +04:00
uint32_t num_result ;
2007-10-19 04:40:25 +04:00
bool is_new_entry = False ;
2006-03-01 23:47:36 +03:00
LDAPMod * * mods = NULL ;
char * filter ;
char * groupsidstr ;
char * groupname ;
char * grouptype ;
char * gidstr ;
const char * dn = NULL ;
2010-05-21 05:25:01 +04:00
struct dom_sid group_sid ;
2006-03-01 23:47:36 +03:00
gid_t gid = - 1 ;
int rc ;
2009-05-31 13:14:06 +04:00
2009-07-10 00:03:52 +04:00
groupname = escape_ldap_string ( talloc_tos ( ) , name ) ;
2006-03-05 20:49:30 +03:00
filter = talloc_asprintf ( tmp_ctx , " (&(cn=%s)(objectClass=%s)) " ,
groupname , LDAP_OBJ_POSIXGROUP ) ;
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( groupname ) ;
2006-03-01 23:47:36 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 0 , ( " ldapsam_create_group: ldap search failed! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result > 1 ) {
DEBUG ( 0 , ( " ldapsam_create_group: There exists more than one group with name [%s]: bailing out! \n " , name ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
if ( num_result = = 1 ) {
char * tmp ;
/* check if it is just a posix group.
* or if there is a sid attached to this entry
*/
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
if ( ! entry ) {
return NT_STATUS_UNSUCCESSFUL ;
}
tmp = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " sambaSID " , tmp_ctx ) ;
if ( tmp ) {
DEBUG ( 1 , ( " ldapsam_create_group: The group [%s] already exist! \n " , name ) ) ;
return NT_STATUS_GROUP_EXISTS ;
}
/* it is just a posix group, retrieve the gid and the dn for later use */
tmp = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " gidNumber " , tmp_ctx ) ;
if ( ! tmp ) {
DEBUG ( 1 , ( " ldapsam_create_group: Couldn't retrieve the gidNumber for [%s]?!?! \n " , name ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
gid = strtoul ( tmp , NULL , 10 ) ;
dn = smbldap_talloc_dn ( tmp_ctx , priv2ld ( ldap_state ) , entry ) ;
if ( ! dn ) {
DEBUG ( 0 , ( " ldapsam_create_group: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
}
if ( num_result = = 0 ) {
2009-01-22 14:01:16 +03:00
is_new_entry = true ;
}
if ( ! NT_STATUS_IS_OK ( ( ret = ldapsam_new_rid_internal ( my_methods , rid ) ) ) ) {
DEBUG ( 1 , ( " ldapsam_create_group: Could not allocate a new RID \n " ) ) ;
return ret ;
}
sid_compose ( & group_sid , get_global_sam_sid ( ) , * rid ) ;
groupsidstr = talloc_strdup ( tmp_ctx , sid_string_talloc ( tmp_ctx ,
& group_sid ) ) ;
grouptype = talloc_asprintf ( tmp_ctx , " %d " , SID_NAME_DOM_GRP ) ;
if ( ! groupsidstr | | ! grouptype ) {
DEBUG ( 0 , ( " ldapsam_create_group: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectClass " , LDAP_OBJ_GROUPMAP ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " sambaSid " , groupsidstr ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " sambaGroupType " , grouptype ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " displayName " , name ) ;
if ( is_new_entry ) {
2007-03-01 03:49:28 +03:00
char * escape_name ;
2006-03-01 23:47:36 +03:00
DEBUG ( 3 , ( " ldapsam_create_user: Creating new posix group \n " ) ) ;
/* lets allocate a new groupid for this group */
if ( ! winbind_allocate_gid ( & gid ) ) {
DEBUG ( 0 , ( " ldapsam_create_group: Unable to allocate a new group id: bailing out! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2009-05-12 21:38:00 +04:00
gidstr = talloc_asprintf ( tmp_ctx , " %u " , ( unsigned int ) gid ) ;
2007-03-01 03:49:28 +03:00
escape_name = escape_rdn_val_string_alloc ( name ) ;
if ( ! escape_name ) {
DEBUG ( 0 , ( " ldapsam_create_group: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2012-07-18 09:37:23 +04:00
dn = talloc_asprintf ( tmp_ctx , " cn=%s,%s " , escape_name , lp_ldap_group_suffix ( talloc_tos ( ) ) ) ;
2007-03-01 03:49:28 +03:00
SAFE_FREE ( escape_name ) ;
2006-03-01 23:47:36 +03:00
if ( ! gidstr | | ! dn ) {
DEBUG ( 0 , ( " ldapsam_create_group: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectclass " , LDAP_OBJ_POSIXGROUP ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " cn " , name ) ;
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " gidNumber " , gidstr ) ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( tmp_ctx , mods ) ;
2006-03-01 23:47:36 +03:00
if ( is_new_entry ) {
rc = smbldap_add ( ldap_state - > smbldap_state , dn , mods ) ;
#if 0
if ( rc = = LDAP_OBJECT_CLASS_VIOLATION ) {
/* This call may fail with rfc2307bis schema */
/* Retry adding a structural class */
smbldap_set_mod ( & mods , LDAP_MOD_ADD , " objectClass " , " ???? " ) ;
rc = smbldap_add ( ldap_state - > smbldap_state , dn , mods ) ;
}
# endif
} else {
rc = smbldap_modify ( ldap_state - > smbldap_state , dn , mods ) ;
}
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 0 , ( " ldapsam_create_group: failed to create a new group [%s] (dn = %s) \n " , name , dn ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
DEBUG ( 2 , ( " ldapsam_create_group: added group [%s] in the LDAP database \n " , name ) ) ;
return NT_STATUS_OK ;
}
2010-05-21 04:38:04 +04:00
static NTSTATUS ldapsam_delete_dom_group ( struct pdb_methods * my_methods , TALLOC_CTX * tmp_ctx , uint32_t rid )
2006-03-01 23:47:36 +03:00
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
int num_result ;
const char * dn ;
char * gidstr ;
char * filter ;
2010-05-21 05:25:01 +04:00
struct dom_sid group_sid ;
2006-03-01 23:47:36 +03:00
int rc ;
/* get the group sid */
2006-03-05 20:49:30 +03:00
sid_compose ( & group_sid , get_global_sam_sid ( ) , rid ) ;
2006-03-01 23:47:36 +03:00
filter = talloc_asprintf ( tmp_ctx ,
" (&(sambaSID=%s) "
2006-03-05 20:49:30 +03:00
" (objectClass=%s) "
" (objectClass=%s)) " ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( tmp_ctx , & group_sid ) ,
2006-03-05 20:49:30 +03:00
LDAP_OBJ_POSIXGROUP ,
LDAP_OBJ_GROUPMAP ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( filter = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 1 , ( " ldapsam_delete_dom_group: group search failed! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result = = 0 ) {
DEBUG ( 1 , ( " ldapsam_delete_dom_group: group not found! \n " ) ) ;
return NT_STATUS_NO_SUCH_GROUP ;
}
if ( num_result > 1 ) {
DEBUG ( 0 , ( " ldapsam_delete_dom_group: More than one group with the same SID ?! \n " ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
if ( ! entry ) {
return NT_STATUS_UNSUCCESSFUL ;
}
/* here it is, retrieve the dn for later use */
dn = smbldap_talloc_dn ( tmp_ctx , priv2ld ( ldap_state ) , entry ) ;
if ( ! dn ) {
DEBUG ( 0 , ( " ldapsam_delete_dom_group: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
gidstr = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " gidNumber " , tmp_ctx ) ;
if ( ! gidstr ) {
DEBUG ( 0 , ( " ldapsam_delete_dom_group: Unable to find the group's gid! \n " ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
/* check no user have this group marked as primary group */
filter = talloc_asprintf ( tmp_ctx ,
" (&(gidNumber=%s) "
2006-03-05 20:49:30 +03:00
" (objectClass=%s) "
" (objectClass=%s)) " ,
gidstr ,
LDAP_OBJ_POSIXACCOUNT ,
LDAP_OBJ_SAMBASAMACCOUNT ) ;
2006-03-01 23:47:36 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 1 , ( " ldapsam_delete_dom_group: accounts search failed! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result ! = 0 ) {
DEBUG ( 3 , ( " ldapsam_delete_dom_group: Can't delete group, it is a primary group for %d users \n " , num_result ) ) ;
return NT_STATUS_MEMBERS_PRIMARY_GROUP ;
}
rc = smbldap_delete ( ldap_state - > smbldap_state , dn ) ;
if ( rc ! = LDAP_SUCCESS ) {
return NT_STATUS_UNSUCCESSFUL ;
}
return NT_STATUS_OK ;
}
static NTSTATUS ldapsam_change_groupmem ( struct pdb_methods * my_methods ,
TALLOC_CTX * tmp_ctx ,
2010-05-21 04:38:04 +04:00
uint32_t group_rid ,
uint32_t member_rid ,
2006-03-01 23:47:36 +03:00
int modop )
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
LDAPMessage * entry = NULL ;
LDAPMessage * result = NULL ;
2010-05-21 04:38:04 +04:00
uint32_t num_result ;
2006-03-01 23:47:36 +03:00
LDAPMod * * mods = NULL ;
char * filter ;
char * uidstr ;
const char * dn = NULL ;
2010-05-21 05:25:01 +04:00
struct dom_sid group_sid ;
struct dom_sid member_sid ;
2006-03-01 23:47:36 +03:00
int rc ;
switch ( modop ) {
case LDAP_MOD_ADD :
DEBUG ( 1 , ( " ldapsam_change_groupmem: add new member(rid=%d) to a domain group(rid=%d) " , member_rid , group_rid ) ) ;
break ;
case LDAP_MOD_DELETE :
DEBUG ( 1 , ( " ldapsam_change_groupmem: delete member(rid=%d) from a domain group(rid=%d) " , member_rid , group_rid ) ) ;
break ;
default :
return NT_STATUS_UNSUCCESSFUL ;
}
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
/* get member sid */
2006-03-05 20:49:30 +03:00
sid_compose ( & member_sid , get_global_sam_sid ( ) , member_rid ) ;
2006-03-01 23:47:36 +03:00
/* get the group sid */
2006-03-05 20:49:30 +03:00
sid_compose ( & group_sid , get_global_sam_sid ( ) , group_rid ) ;
2006-03-01 23:47:36 +03:00
filter = talloc_asprintf ( tmp_ctx ,
" (&(sambaSID=%s) "
2006-03-05 20:49:30 +03:00
" (objectClass=%s) "
" (objectClass=%s)) " ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( tmp_ctx , & member_sid ) ,
2006-03-05 20:49:30 +03:00
LDAP_OBJ_POSIXACCOUNT ,
LDAP_OBJ_SAMBASAMACCOUNT ) ;
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( filter = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
/* get the member uid */
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 1 , ( " ldapsam_change_groupmem: member search failed! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result = = 0 ) {
DEBUG ( 1 , ( " ldapsam_change_groupmem: member not found! \n " ) ) ;
return NT_STATUS_NO_SUCH_MEMBER ;
}
if ( num_result > 1 ) {
DEBUG ( 0 , ( " ldapsam_change_groupmem: More than one account with the same SID ?! \n " ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
if ( ! entry ) {
return NT_STATUS_UNSUCCESSFUL ;
}
if ( modop = = LDAP_MOD_DELETE ) {
/* check if we are trying to remove the member from his primary group */
char * gidstr ;
gid_t user_gid , group_gid ;
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
gidstr = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " gidNumber " , tmp_ctx ) ;
if ( ! gidstr ) {
DEBUG ( 0 , ( " ldapsam_change_groupmem: Unable to find the member's gid! \n " ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
user_gid = strtoul ( gidstr , NULL , 10 ) ;
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
if ( ! sid_to_gid ( & group_sid , & group_gid ) ) {
DEBUG ( 0 , ( " ldapsam_change_groupmem: Unable to get group gid from SID! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
if ( user_gid = = group_gid ) {
2007-11-26 17:28:13 +03:00
DEBUG ( 3 , ( " ldapsam_change_groupmem: can't remove user from its own primary group! \n " ) ) ;
2006-03-01 23:47:36 +03:00
return NT_STATUS_MEMBERS_PRIMARY_GROUP ;
}
}
/* here it is, retrieve the uid for later use */
uidstr = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) , entry , " uid " , tmp_ctx ) ;
if ( ! uidstr ) {
DEBUG ( 0 , ( " ldapsam_change_groupmem: Unable to find the member's name! \n " ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
filter = talloc_asprintf ( tmp_ctx ,
" (&(sambaSID=%s) "
2006-03-05 20:49:30 +03:00
" (objectClass=%s) "
" (objectClass=%s)) " ,
2007-12-15 23:10:58 +03:00
sid_string_talloc ( tmp_ctx , & group_sid ) ,
2006-03-05 20:49:30 +03:00
LDAP_OBJ_POSIXGROUP ,
LDAP_OBJ_GROUPMAP ) ;
2006-03-01 23:47:36 +03:00
/* get the group */
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 1 , ( " ldapsam_change_groupmem: group search failed! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( tmp_ctx , result ) ;
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result = = 0 ) {
DEBUG ( 1 , ( " ldapsam_change_groupmem: group not found! \n " ) ) ;
return NT_STATUS_NO_SUCH_GROUP ;
}
if ( num_result > 1 ) {
DEBUG ( 0 , ( " ldapsam_change_groupmem: More than one group with the same SID ?! \n " ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
if ( ! entry ) {
return NT_STATUS_UNSUCCESSFUL ;
}
/* here it is, retrieve the dn for later use */
dn = smbldap_talloc_dn ( tmp_ctx , priv2ld ( ldap_state ) , entry ) ;
if ( ! dn ) {
DEBUG ( 0 , ( " ldapsam_change_groupmem: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
smbldap_set_mod ( & mods , modop , " memberUid " , uidstr ) ;
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( tmp_ctx , mods ) ;
2006-03-01 23:47:36 +03:00
rc = smbldap_modify ( ldap_state - > smbldap_state , dn , mods ) ;
if ( rc ! = LDAP_SUCCESS ) {
if ( rc = = LDAP_TYPE_OR_VALUE_EXISTS & & modop = = LDAP_MOD_ADD ) {
DEBUG ( 1 , ( " ldapsam_change_groupmem: member is already in group, add failed! \n " ) ) ;
return NT_STATUS_MEMBER_IN_GROUP ;
}
if ( rc = = LDAP_NO_SUCH_ATTRIBUTE & & modop = = LDAP_MOD_DELETE ) {
DEBUG ( 1 , ( " ldapsam_change_groupmem: member is not in group, delete failed! \n " ) ) ;
return NT_STATUS_MEMBER_NOT_IN_GROUP ;
}
return NT_STATUS_UNSUCCESSFUL ;
}
2009-05-31 13:14:06 +04:00
2006-03-01 23:47:36 +03:00
return NT_STATUS_OK ;
}
static NTSTATUS ldapsam_add_groupmem ( struct pdb_methods * my_methods ,
TALLOC_CTX * tmp_ctx ,
2010-05-21 04:38:04 +04:00
uint32_t group_rid ,
uint32_t member_rid )
2006-03-01 23:47:36 +03:00
{
return ldapsam_change_groupmem ( my_methods , tmp_ctx , group_rid , member_rid , LDAP_MOD_ADD ) ;
}
static NTSTATUS ldapsam_del_groupmem ( struct pdb_methods * my_methods ,
TALLOC_CTX * tmp_ctx ,
2010-05-21 04:38:04 +04:00
uint32_t group_rid ,
uint32_t member_rid )
2006-03-01 23:47:36 +03:00
{
return ldapsam_change_groupmem ( my_methods , tmp_ctx , group_rid , member_rid , LDAP_MOD_DELETE ) ;
}
static NTSTATUS ldapsam_set_primary_group ( struct pdb_methods * my_methods ,
TALLOC_CTX * mem_ctx ,
struct samu * sampass )
{
struct ldapsam_privates * ldap_state = ( struct ldapsam_privates * ) my_methods - > private_data ;
LDAPMessage * entry = NULL ;
LDAPMessage * result = NULL ;
2010-05-21 04:38:04 +04:00
uint32_t num_result ;
2006-03-01 23:47:36 +03:00
LDAPMod * * mods = NULL ;
char * filter ;
2007-03-01 03:49:28 +03:00
char * escape_username ;
2006-03-01 23:47:36 +03:00
char * gidstr ;
const char * dn = NULL ;
gid_t gid ;
int rc ;
DEBUG ( 0 , ( " ldapsam_set_primary_group: Attempt to set primary group for user [%s] \n " , pdb_get_username ( sampass ) ) ) ;
if ( ! sid_to_gid ( pdb_get_group_sid ( sampass ) , & gid ) ) {
2008-07-14 18:40:36 +04:00
DEBUG ( 0 , ( " ldapsam_set_primary_group: failed to retrieve gid from user's group SID! \n " ) ) ;
2006-03-01 23:47:36 +03:00
return NT_STATUS_UNSUCCESSFUL ;
}
2009-05-12 21:38:00 +04:00
gidstr = talloc_asprintf ( mem_ctx , " %u " , ( unsigned int ) gid ) ;
2006-03-01 23:47:36 +03:00
if ( ! gidstr ) {
DEBUG ( 0 , ( " ldapsam_set_primary_group: Out of Memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2007-03-01 03:49:28 +03:00
2009-07-10 00:03:52 +04:00
escape_username = escape_ldap_string ( talloc_tos ( ) ,
pdb_get_username ( sampass ) ) ;
2007-03-01 03:49:28 +03:00
if ( escape_username = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
filter = talloc_asprintf ( mem_ctx ,
" (&(uid=%s) "
2006-03-05 20:49:30 +03:00
" (objectClass=%s) "
" (objectClass=%s)) " ,
2007-03-01 03:49:28 +03:00
escape_username ,
2006-03-05 20:49:30 +03:00
LDAP_OBJ_POSIXACCOUNT ,
LDAP_OBJ_SAMBASAMACCOUNT ) ;
2007-03-01 03:49:28 +03:00
2009-07-10 00:03:52 +04:00
TALLOC_FREE ( escape_username ) ;
2007-03-01 03:49:28 +03:00
r16334: Fix Klocwork ID's 1087, 1095, 1096, 1098, 1099, 1101, 1102, 1105, 1107, 1109,
1111
Volker
(This used to be commit d3f5acb16e14ec394f1af41fa2f9e27fdca937db)
2006-06-17 11:20:47 +04:00
if ( filter = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
rc = smbldap_search_suffix ( ldap_state - > smbldap_state , filter , NULL , & result ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 0 , ( " ldapsam_set_primary_group: user search failed! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2006-03-01 23:47:36 +03:00
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result = = 0 ) {
DEBUG ( 0 , ( " ldapsam_set_primary_group: user not found! \n " ) ) ;
return NT_STATUS_NO_SUCH_USER ;
}
if ( num_result > 1 ) {
DEBUG ( 0 , ( " ldapsam_set_primary_group: More than one user with name [%s] ?! \n " , pdb_get_username ( sampass ) ) ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
if ( ! entry ) {
return NT_STATUS_UNSUCCESSFUL ;
}
/* retrieve the dn for later use */
dn = smbldap_talloc_dn ( mem_ctx , priv2ld ( ldap_state ) , entry ) ;
if ( ! dn ) {
DEBUG ( 0 , ( " ldapsam_set_primary_group: Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
/* remove the old one, and add the new one, this way we do not risk races */
smbldap_make_mod ( priv2ld ( ldap_state ) , entry , & mods , " gidNumber " , gidstr ) ;
if ( mods = = NULL ) {
return NT_STATUS_OK ;
}
rc = smbldap_modify ( ldap_state - > smbldap_state , dn , mods ) ;
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 0 , ( " ldapsam_set_primary_group: failed to modify [%s] primary group to [%s] \n " ,
pdb_get_username ( sampass ) , gidstr ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
flush_pwnam_cache ( ) ;
return NT_STATUS_OK ;
}
2007-09-11 20:38:31 +04:00
/**********************************************************************
trusted domains functions
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-09-11 20:50:32 +04:00
static char * trusteddom_dn ( struct ldapsam_privates * ldap_state ,
const char * domain )
{
return talloc_asprintf ( talloc_tos ( ) , " sambaDomainName=%s,%s " , domain ,
ldap_state - > domain_dn ) ;
}
2007-10-19 04:40:25 +04:00
static bool get_trusteddom_pw_int ( struct ldapsam_privates * ldap_state ,
2008-07-10 20:21:03 +04:00
TALLOC_CTX * mem_ctx ,
2007-09-11 20:50:32 +04:00
const char * domain , LDAPMessage * * entry )
{
int rc ;
char * filter ;
int scope = LDAP_SCOPE_SUBTREE ;
const char * * attrs = NULL ; /* NULL: get all attrs */
int attrsonly = 0 ; /* 0: return values too */
LDAPMessage * result = NULL ;
char * trusted_dn ;
2010-05-21 04:38:04 +04:00
uint32_t num_result ;
2007-09-11 20:50:32 +04:00
filter = talloc_asprintf ( talloc_tos ( ) ,
" (&(objectClass=%s)(sambaDomainName=%s)) " ,
LDAP_OBJ_TRUSTDOM_PASSWORD , domain ) ;
trusted_dn = trusteddom_dn ( ldap_state , domain ) ;
if ( trusted_dn = = NULL ) {
return False ;
}
rc = smbldap_search ( ldap_state - > smbldap_state , trusted_dn , scope ,
filter , attrs , attrsonly , & result ) ;
2008-07-10 20:21:03 +04:00
if ( result ! = NULL ) {
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2008-07-10 20:21:03 +04:00
}
2007-09-11 20:50:32 +04:00
if ( rc = = LDAP_NO_SUCH_OBJECT ) {
* entry = NULL ;
return True ;
}
if ( rc ! = LDAP_SUCCESS ) {
return False ;
}
num_result = ldap_count_entries ( priv2ld ( ldap_state ) , result ) ;
if ( num_result > 1 ) {
DEBUG ( 1 , ( " ldapsam_get_trusteddom_pw: more than one "
2008-07-18 15:15:05 +04:00
" %s object for domain '%s'?! \n " ,
LDAP_OBJ_TRUSTDOM_PASSWORD , domain ) ) ;
2007-09-11 20:50:32 +04:00
return False ;
}
if ( num_result = = 0 ) {
DEBUG ( 1 , ( " ldapsam_get_trusteddom_pw: no "
2008-07-18 15:15:05 +04:00
" %s object for domain %s. \n " ,
LDAP_OBJ_TRUSTDOM_PASSWORD , domain ) ) ;
2007-09-11 20:50:32 +04:00
* entry = NULL ;
} else {
* entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
}
return True ;
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_get_trusteddom_pw ( struct pdb_methods * methods ,
2007-09-11 20:38:31 +04:00
const char * domain ,
char * * pwd ,
2010-05-21 05:25:01 +04:00
struct dom_sid * sid ,
2007-09-11 20:38:31 +04:00
time_t * pass_last_set_time )
{
2007-09-11 20:50:32 +04:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
LDAPMessage * entry = NULL ;
DEBUG ( 10 , ( " ldapsam_get_trusteddom_pw called for domain %s \n " , domain ) ) ;
2008-07-10 20:21:03 +04:00
if ( ! get_trusteddom_pw_int ( ldap_state , talloc_tos ( ) , domain , & entry ) | |
2007-09-11 20:50:32 +04:00
( entry = = NULL ) )
{
return False ;
}
/* password */
if ( pwd ! = NULL ) {
char * pwd_str ;
pwd_str = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) ,
entry , " sambaClearTextPassword " , talloc_tos ( ) ) ;
if ( pwd_str = = NULL ) {
return False ;
}
/* trusteddom_pw routines do not use talloc yet... */
* pwd = SMB_STRDUP ( pwd_str ) ;
if ( * pwd = = NULL ) {
return False ;
}
}
/* last change time */
if ( pass_last_set_time ! = NULL ) {
char * time_str ;
time_str = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) ,
entry , " sambaPwdLastSet " , talloc_tos ( ) ) ;
if ( time_str = = NULL ) {
return False ;
}
* pass_last_set_time = ( time_t ) atol ( time_str ) ;
}
/* domain sid */
if ( sid ! = NULL ) {
char * sid_str ;
2010-01-23 15:18:00 +03:00
struct dom_sid dom_sid ;
2007-09-11 20:50:32 +04:00
sid_str = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) ,
entry , " sambaSID " ,
talloc_tos ( ) ) ;
if ( sid_str = = NULL ) {
return False ;
}
2010-01-23 15:18:00 +03:00
if ( ! string_to_sid ( & dom_sid , sid_str ) ) {
2007-09-11 20:50:32 +04:00
return False ;
}
2010-01-23 15:18:00 +03:00
sid_copy ( sid , & dom_sid ) ;
2007-09-11 20:50:32 +04:00
}
2007-09-11 20:38:31 +04:00
2007-09-11 20:50:32 +04:00
return True ;
2007-09-11 20:38:31 +04:00
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_set_trusteddom_pw ( struct pdb_methods * methods ,
2007-09-11 20:38:31 +04:00
const char * domain ,
const char * pwd ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid )
2007-09-11 20:38:31 +04:00
{
2007-09-11 20:50:32 +04:00
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
LDAPMessage * entry = NULL ;
LDAPMod * * mods = NULL ;
char * prev_pwd = NULL ;
char * trusted_dn = NULL ;
int rc ;
DEBUG ( 10 , ( " ldapsam_set_trusteddom_pw called for domain %s \n " , domain ) ) ;
/*
* get the current entry ( if there is one ) in order to put the
* current password into the previous password attribute
*/
2008-07-10 20:21:03 +04:00
if ( ! get_trusteddom_pw_int ( ldap_state , talloc_tos ( ) , domain , & entry ) ) {
2007-09-11 20:50:32 +04:00
return False ;
}
mods = NULL ;
smbldap_make_mod ( priv2ld ( ldap_state ) , entry , & mods , " objectClass " ,
2008-07-18 15:15:05 +04:00
LDAP_OBJ_TRUSTDOM_PASSWORD ) ;
2007-09-11 20:50:32 +04:00
smbldap_make_mod ( priv2ld ( ldap_state ) , entry , & mods , " sambaDomainName " ,
domain ) ;
smbldap_make_mod ( priv2ld ( ldap_state ) , entry , & mods , " sambaSID " ,
sid_string_tos ( sid ) ) ;
smbldap_make_mod ( priv2ld ( ldap_state ) , entry , & mods , " sambaPwdLastSet " ,
2009-02-20 00:36:20 +03:00
talloc_asprintf ( talloc_tos ( ) , " %li " , ( long int ) time ( NULL ) ) ) ;
2007-09-11 20:50:32 +04:00
smbldap_make_mod ( priv2ld ( ldap_state ) , entry , & mods ,
" sambaClearTextPassword " , pwd ) ;
2008-07-10 20:21:03 +04:00
2007-09-11 20:50:32 +04:00
if ( entry ! = NULL ) {
prev_pwd = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) ,
entry , " sambaClearTextPassword " , talloc_tos ( ) ) ;
if ( prev_pwd ! = NULL ) {
smbldap_make_mod ( priv2ld ( ldap_state ) , entry , & mods ,
" sambaPreviousClearTextPassword " ,
prev_pwd ) ;
}
}
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmod ( talloc_tos ( ) , mods ) ;
2009-10-20 20:35:16 +04:00
2007-09-11 20:50:32 +04:00
trusted_dn = trusteddom_dn ( ldap_state , domain ) ;
if ( trusted_dn = = NULL ) {
return False ;
}
if ( entry = = NULL ) {
rc = smbldap_add ( ldap_state - > smbldap_state , trusted_dn , mods ) ;
} else {
rc = smbldap_modify ( ldap_state - > smbldap_state , trusted_dn , mods ) ;
}
if ( rc ! = LDAP_SUCCESS ) {
DEBUG ( 1 , ( " error writing trusted domain password! \n " ) ) ;
return False ;
}
return True ;
2007-09-11 20:38:31 +04:00
}
2007-10-19 04:40:25 +04:00
static bool ldapsam_del_trusteddom_pw ( struct pdb_methods * methods ,
2007-09-11 20:38:31 +04:00
const char * domain )
{
2007-09-11 20:50:32 +04:00
int rc ;
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
LDAPMessage * entry = NULL ;
const char * trusted_dn ;
2008-07-10 20:21:03 +04:00
if ( ! get_trusteddom_pw_int ( ldap_state , talloc_tos ( ) , domain , & entry ) ) {
2007-09-11 20:50:32 +04:00
return False ;
}
if ( entry = = NULL ) {
DEBUG ( 5 , ( " ldapsam_del_trusteddom_pw: no such trusted domain: "
" %s \n " , domain ) ) ;
return True ;
}
trusted_dn = smbldap_talloc_dn ( talloc_tos ( ) , priv2ld ( ldap_state ) ,
entry ) ;
if ( trusted_dn = = NULL ) {
DEBUG ( 0 , ( " ldapsam_del_trusteddom_pw: Out of memory! \n " ) ) ;
return False ;
}
rc = smbldap_delete ( ldap_state - > smbldap_state , trusted_dn ) ;
if ( rc ! = LDAP_SUCCESS ) {
return False ;
}
return True ;
2007-09-11 20:38:31 +04:00
}
static NTSTATUS ldapsam_enum_trusteddoms ( struct pdb_methods * methods ,
TALLOC_CTX * mem_ctx ,
2010-05-21 04:38:04 +04:00
uint32_t * num_domains ,
2007-09-11 20:38:31 +04:00
struct trustdom_info * * * domains )
{
2007-09-11 20:50:32 +04:00
int rc ;
struct ldapsam_privates * ldap_state =
( struct ldapsam_privates * ) methods - > private_data ;
char * filter ;
int scope = LDAP_SCOPE_SUBTREE ;
const char * attrs [ ] = { " sambaDomainName " , " sambaSID " , NULL } ;
int attrsonly = 0 ; /* 0: return values too */
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
filter = talloc_asprintf ( talloc_tos ( ) , " (objectClass=%s) " ,
LDAP_OBJ_TRUSTDOM_PASSWORD ) ;
rc = smbldap_search ( ldap_state - > smbldap_state ,
ldap_state - > domain_dn ,
scope ,
filter ,
attrs ,
attrsonly ,
& result ) ;
2008-07-10 20:21:03 +04:00
if ( result ! = NULL ) {
2012-09-06 19:53:00 +04:00
smbldap_talloc_autofree_ldapmsg ( mem_ctx , result ) ;
2008-07-10 20:21:03 +04:00
}
2007-09-11 20:50:32 +04:00
if ( rc ! = LDAP_SUCCESS ) {
return NT_STATUS_UNSUCCESSFUL ;
}
* num_domains = 0 ;
2011-06-07 05:30:12 +04:00
if ( ! ( * domains = talloc_array ( mem_ctx , struct trustdom_info * , 1 ) ) ) {
2007-09-11 20:50:32 +04:00
DEBUG ( 1 , ( " talloc failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
for ( entry = ldap_first_entry ( priv2ld ( ldap_state ) , result ) ;
entry ! = NULL ;
entry = ldap_next_entry ( priv2ld ( ldap_state ) , entry ) )
{
char * dom_name , * dom_sid_str ;
struct trustdom_info * dom_info ;
2011-06-07 05:38:41 +04:00
dom_info = talloc ( * domains , struct trustdom_info ) ;
2007-09-11 20:50:32 +04:00
if ( dom_info = = NULL ) {
DEBUG ( 1 , ( " talloc failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
dom_name = smbldap_talloc_single_attribute ( priv2ld ( ldap_state ) ,
entry ,
" sambaDomainName " ,
talloc_tos ( ) ) ;
if ( dom_name = = NULL ) {
DEBUG ( 1 , ( " talloc failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
dom_info - > name = dom_name ;
dom_sid_str = smbldap_talloc_single_attribute (
priv2ld ( ldap_state ) , entry , " sambaSID " ,
talloc_tos ( ) ) ;
if ( dom_sid_str = = NULL ) {
DEBUG ( 1 , ( " talloc failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
if ( ! string_to_sid ( & dom_info - > sid , dom_sid_str ) ) {
DEBUG ( 1 , ( " Error calling string_to_sid on SID %s \n " ,
dom_sid_str ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
ADD_TO_ARRAY ( * domains , struct trustdom_info * , dom_info ,
domains , num_domains ) ;
if ( * domains = = NULL ) {
DEBUG ( 1 , ( " talloc failed \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
}
DEBUG ( 5 , ( " ldapsam_enum_trusteddoms: got %d domains \n " , * num_domains ) ) ;
return NT_STATUS_OK ;
2007-09-11 20:38:31 +04:00
}
2006-03-01 23:47:36 +03:00
/**********************************************************************
Housekeeping
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static void free_private_data ( void * * vp )
{
struct ldapsam_privates * * ldap_state = ( struct ldapsam_privates * * ) vp ;
smbldap_free_struct ( & ( * ldap_state ) - > smbldap_state ) ;
if ( ( * ldap_state ) - > result ! = NULL ) {
ldap_msgfree ( ( * ldap_state ) - > result ) ;
( * ldap_state ) - > result = NULL ;
}
if ( ( * ldap_state ) - > domain_dn ! = NULL ) {
SAFE_FREE ( ( * ldap_state ) - > domain_dn ) ;
}
* ldap_state = NULL ;
/* No need to free any further, as it is talloc()ed */
}
/*********************************************************************
Intitalise the parts of the pdb_methods structure that are common to
all pdb_ldap modes
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static NTSTATUS pdb_init_ldapsam_common ( struct pdb_methods * * pdb_method , const char * location )
{
NTSTATUS nt_status ;
struct ldapsam_privates * ldap_state ;
2011-11-16 02:56:38 +04:00
char * bind_dn = NULL ;
char * bind_secret = NULL ;
2006-03-01 23:47:36 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status = make_pdb_method ( pdb_method ) ) ) {
return nt_status ;
}
( * pdb_method ) - > name = " ldapsam " ;
( * pdb_method ) - > getsampwnam = ldapsam_getsampwnam ;
( * pdb_method ) - > getsampwsid = ldapsam_getsampwsid ;
( * pdb_method ) - > add_sam_account = ldapsam_add_sam_account ;
( * pdb_method ) - > update_sam_account = ldapsam_update_sam_account ;
( * pdb_method ) - > delete_sam_account = ldapsam_delete_sam_account ;
( * pdb_method ) - > rename_sam_account = ldapsam_rename_sam_account ;
( * pdb_method ) - > getgrsid = ldapsam_getgrsid ;
( * pdb_method ) - > getgrgid = ldapsam_getgrgid ;
( * pdb_method ) - > getgrnam = ldapsam_getgrnam ;
( * pdb_method ) - > add_group_mapping_entry = ldapsam_add_group_mapping_entry ;
( * pdb_method ) - > update_group_mapping_entry = ldapsam_update_group_mapping_entry ;
( * pdb_method ) - > delete_group_mapping_entry = ldapsam_delete_group_mapping_entry ;
( * pdb_method ) - > enum_group_mapping = ldapsam_enum_group_mapping ;
( * pdb_method ) - > get_account_policy = ldapsam_get_account_policy ;
( * pdb_method ) - > set_account_policy = ldapsam_set_account_policy ;
( * pdb_method ) - > get_seq_num = ldapsam_get_seq_num ;
2009-06-28 19:36:12 +04:00
( * pdb_method ) - > capabilities = ldapsam_capabilities ;
2006-03-01 23:47:36 +03:00
( * pdb_method ) - > new_rid = ldapsam_new_rid ;
2007-09-11 20:38:31 +04:00
( * pdb_method ) - > get_trusteddom_pw = ldapsam_get_trusteddom_pw ;
( * pdb_method ) - > set_trusteddom_pw = ldapsam_set_trusteddom_pw ;
( * pdb_method ) - > del_trusteddom_pw = ldapsam_del_trusteddom_pw ;
( * pdb_method ) - > enum_trusteddoms = ldapsam_enum_trusteddoms ;
2006-03-01 23:47:36 +03:00
/* TODO: Setup private data and free */
2011-06-07 05:44:43 +04:00
if ( ! ( ldap_state = talloc_zero ( * pdb_method , struct ldapsam_privates ) ) ) {
2006-03-01 23:47:36 +03:00
DEBUG ( 0 , ( " pdb_init_ldapsam_common: talloc() failed for ldapsam private_data! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2011-11-16 02:56:38 +04:00
if ( ! fetch_ldap_pw ( & bind_dn , & bind_secret ) ) {
DEBUG ( 0 , ( " pdb_init_ldapsam_common: Failed to retrieve LDAP password from secrets.tdb \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2006-03-01 23:47:36 +03:00
2011-11-16 02:56:38 +04:00
nt_status = smbldap_init ( * pdb_method , pdb_get_tevent_context ( ) ,
location , false , bind_dn , bind_secret ,
& ldap_state - > smbldap_state ) ;
memset ( bind_secret , ' \0 ' , strlen ( bind_secret ) ) ;
SAFE_FREE ( bind_secret ) ;
SAFE_FREE ( bind_dn ) ;
2006-03-01 23:47:36 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
return nt_status ;
}
if ( ! ( ldap_state - > domain_name = talloc_strdup ( * pdb_method , get_global_sam_name ( ) ) ) ) {
return NT_STATUS_NO_MEMORY ;
}
( * pdb_method ) - > private_data = ldap_state ;
( * pdb_method ) - > free_private_data = free_private_data ;
return NT_STATUS_OK ;
}
2003-05-14 07:32:20 +04:00
/**********************************************************************
2003-06-21 04:45:03 +04:00
Initialise the normal mode for pdb_ldap
2003-05-14 07:32:20 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2013-01-28 19:16:42 +04:00
NTSTATUS pdb_ldapsam_init_common ( struct pdb_methods * * pdb_method ,
const char * location )
2002-03-02 13:16:28 +03:00
{
NTSTATUS nt_status ;
2007-11-15 03:05:42 +03:00
struct ldapsam_privates * ldap_state = NULL ;
2010-05-21 04:38:04 +04:00
uint32_t alg_rid_base ;
2007-11-15 03:05:42 +03:00
char * alg_rid_base_string = NULL ;
2003-07-11 09:33:40 +04:00
LDAPMessage * result = NULL ;
LDAPMessage * entry = NULL ;
2010-05-21 05:25:01 +04:00
struct dom_sid ldap_domain_sid ;
struct dom_sid secrets_domain_sid ;
2007-11-15 03:05:42 +03:00
char * domain_sid_string = NULL ;
char * dn = NULL ;
2006-07-27 16:20:19 +04:00
char * uri = talloc_strdup ( NULL , location ) ;
trim_char ( uri , ' \" ' , ' \" ' ) ;
nt_status = pdb_init_ldapsam_common ( pdb_method , uri ) ;
2010-01-12 15:53:01 +03:00
TALLOC_FREE ( uri ) ;
2002-03-02 13:16:28 +03:00
2006-02-04 01:19:41 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2002-03-02 13:16:28 +03:00
return nt_status ;
}
2003-05-12 22:12:31 +04:00
( * pdb_method ) - > name = " ldapsam " ;
2002-03-02 13:16:28 +03:00
2004-04-07 16:43:44 +04:00
( * pdb_method ) - > add_aliasmem = ldapsam_add_aliasmem ;
( * pdb_method ) - > del_aliasmem = ldapsam_del_aliasmem ;
( * pdb_method ) - > enum_aliasmem = ldapsam_enum_aliasmem ;
( * pdb_method ) - > enum_alias_memberships = ldapsam_alias_memberships ;
2005-04-18 20:07:49 +04:00
( * pdb_method ) - > search_users = ldapsam_search_users ;
( * pdb_method ) - > search_groups = ldapsam_search_groups ;
( * pdb_method ) - > search_aliases = ldapsam_search_aliases ;
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
if ( lp_parm_bool ( - 1 , " ldapsam " , " trusted " , False ) ) {
( * pdb_method ) - > enum_group_members = ldapsam_enum_group_members ;
( * pdb_method ) - > enum_group_memberships =
ldapsam_enum_group_memberships ;
( * pdb_method ) - > lookup_rids = ldapsam_lookup_rids ;
( * pdb_method ) - > sid_to_id = ldapsam_sid_to_id ;
2009-11-16 13:37:18 +03:00
( * pdb_method ) - > uid_to_sid = ldapsam_uid_to_sid ;
2010-01-31 00:28:19 +03:00
( * pdb_method ) - > gid_to_sid = ldapsam_gid_to_sid ;
2007-11-15 03:05:42 +03:00
2006-03-01 23:47:36 +03:00
if ( lp_parm_bool ( - 1 , " ldapsam " , " editposix " , False ) ) {
( * pdb_method ) - > create_user = ldapsam_create_user ;
( * pdb_method ) - > delete_user = ldapsam_delete_user ;
( * pdb_method ) - > create_dom_group = ldapsam_create_dom_group ;
( * pdb_method ) - > delete_dom_group = ldapsam_delete_dom_group ;
( * pdb_method ) - > add_groupmem = ldapsam_add_groupmem ;
( * pdb_method ) - > del_groupmem = ldapsam_del_groupmem ;
( * pdb_method ) - > set_unix_primary_group = ldapsam_set_primary_group ;
}
2006-02-04 01:19:41 +03:00
}
2006-07-11 22:01:26 +04:00
ldap_state = ( struct ldapsam_privates * ) ( ( * pdb_method ) - > private_data ) ;
2003-07-11 09:33:40 +04:00
ldap_state - > schema_ver = SCHEMAVER_SAMBASAMACCOUNT ;
2002-03-02 13:16:28 +03:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
/* Try to setup the Domain Name, Domain SID, algorithmic rid base */
2007-11-15 03:05:42 +03:00
2006-02-04 01:19:41 +03:00
nt_status = smbldap_search_domain_info ( ldap_state - > smbldap_state ,
2007-11-15 03:05:42 +03:00
& result ,
2004-02-26 01:01:02 +03:00
ldap_state - > domain_name , True ) ;
2007-11-15 03:05:42 +03:00
2003-07-11 09:33:40 +04:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2011-08-15 16:46:12 +04:00
DEBUG ( 0 , ( " pdb_init_ldapsam: WARNING: Could not get domain "
" info, nor add one to the domain. "
" We cannot work reliably without it. \n " ) ) ;
return NT_STATUS_CANT_ACCESS_DOMAIN_INFO ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
2006-02-04 01:19:41 +03:00
/* Given that the above might fail, everything below this must be
* optional */
2007-11-15 03:05:42 +03:00
2006-02-04 01:19:41 +03:00
entry = ldap_first_entry ( ldap_state - > smbldap_state - > ldap_struct ,
result ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( ! entry ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " pdb_init_ldapsam: Could not get domain info "
" entry \n " ) ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
ldap_msgfree ( result ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
2009-03-18 07:29:02 +03:00
dn = smbldap_talloc_dn ( talloc_tos ( ) , ldap_state - > smbldap_state - > ldap_struct , entry ) ;
2005-01-26 02:30:05 +03:00
if ( ! dn ) {
2007-03-01 05:43:33 +03:00
ldap_msgfree ( result ) ;
2005-01-26 02:30:05 +03:00
return NT_STATUS_UNSUCCESSFUL ;
}
ldap_state - > domain_dn = smb_xstrdup ( dn ) ;
2009-03-18 07:29:02 +03:00
TALLOC_FREE ( dn ) ;
2005-02-21 14:11:13 +03:00
2007-11-15 03:05:42 +03:00
domain_sid_string = smbldap_talloc_single_attribute (
2006-02-04 01:19:41 +03:00
ldap_state - > smbldap_state - > ldap_struct ,
2007-11-15 03:05:42 +03:00
entry ,
2006-02-04 01:19:41 +03:00
get_userattr_key2string ( ldap_state - > schema_ver ,
2007-11-15 03:05:42 +03:00
LDAP_ATTR_USER_SID ) ,
2008-03-04 13:02:26 +03:00
talloc_tos ( ) ) ;
2007-11-15 03:05:42 +03:00
if ( domain_sid_string ) {
2007-10-19 04:40:25 +04:00
bool found_sid ;
2003-12-26 06:14:31 +03:00
if ( ! string_to_sid ( & ldap_domain_sid , domain_sid_string ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 1 , ( " pdb_init_ldapsam: SID [%s] could not be "
" read as a valid SID \n " , domain_sid_string ) ) ;
2007-03-01 05:43:33 +03:00
ldap_msgfree ( result ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( domain_sid_string ) ;
2003-12-26 06:14:31 +03:00
return NT_STATUS_INVALID_PARAMETER ;
}
2012-09-05 19:49:39 +04:00
found_sid = PDB_secrets_fetch_domain_sid ( ldap_state - > domain_name ,
2006-02-04 01:19:41 +03:00
& secrets_domain_sid ) ;
2010-08-26 17:48:50 +04:00
if ( ! found_sid | | ! dom_sid_equal ( & secrets_domain_sid ,
2006-02-04 01:19:41 +03:00
& ldap_domain_sid ) ) {
DEBUG ( 1 , ( " pdb_init_ldapsam: Resetting SID for domain "
" %s based on pdb_ldap results %s -> %s \n " ,
ldap_state - > domain_name ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( & secrets_domain_sid ) ,
sid_string_dbg ( & ldap_domain_sid ) ) ) ;
2007-11-15 03:05:42 +03:00
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
/* reset secrets.tdb sid */
2012-09-05 19:49:39 +04:00
PDB_secrets_store_domain_sid ( ldap_state - > domain_name ,
2006-02-04 01:19:41 +03:00
& ldap_domain_sid ) ;
DEBUG ( 1 , ( " New global sam SID: %s \n " ,
2007-12-15 23:11:36 +03:00
sid_string_dbg ( get_global_sam_sid ( ) ) ) ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
sid_copy ( & ldap_state - > domain_sid , & ldap_domain_sid ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( domain_sid_string ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
2007-11-15 03:05:42 +03:00
alg_rid_base_string = smbldap_talloc_single_attribute (
2006-02-04 01:19:41 +03:00
ldap_state - > smbldap_state - > ldap_struct ,
2007-11-15 03:05:42 +03:00
entry ,
2006-02-04 01:19:41 +03:00
get_attr_key2string ( dominfo_attr_list ,
LDAP_ATTR_ALGORITHMIC_RID_BASE ) ,
2008-03-04 13:02:26 +03:00
talloc_tos ( ) ) ;
2007-11-15 03:05:42 +03:00
if ( alg_rid_base_string ) {
2010-05-21 04:38:04 +04:00
alg_rid_base = ( uint32_t ) atol ( alg_rid_base_string ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
if ( alg_rid_base ! = algorithmic_rid_base ( ) ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 0 , ( " The value of 'algorithmic RID base' has "
" changed since the LDAP \n "
2003-11-14 06:28:03 +03:00
" database was initialised. Aborting. \n " ) ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
ldap_msgfree ( result ) ;
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( alg_rid_base_string ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
return NT_STATUS_UNSUCCESSFUL ;
}
2007-11-15 03:05:42 +03:00
TALLOC_FREE ( alg_rid_base_string ) ;
This patch cleans up some of our ldap code, for better behaviour:
We now always read the Domain SID out of LDAP. If the local secrets.tdb
is ever different to LDAP, it is overwritten out of LDAP. We also
store the 'algorithmic rid base' into LDAP, and assert if it changes.
(This ensures cross-host synchronisation, and allows for possible
integration with idmap). If we fail to read/add the domain entry, we just
fallback to the old behaviour.
We always use an existing DN when adding IDMAP entries to LDAP, unless
no suitable entry is available. This means that a user's posixAccount
will have a SID added to it, or a user's sambaSamAccount will have a UID
added. Where we cannot us an existing DN, we use
'sambaSid=S-x-y-z,....' as the DN.
The code now allows modifications to the ID mapping in many cases.
Likewise, we now check more carefully when adding new user entires to LDAP,
to not duplicate SIDs (for users, at this stage), and to add the sambaSamAccount
onto the idmap entry for that user, if it is already established (ensuring
we do not duplicate sambaSid entries in the directory).
The allocated UID code has been expanded to take into account the space
between '1000 - algorithmic rid base'. This much better fits into what
an NT4 does - allocating in the bottom part of the RID range.
On the code cleanup side of things, we now share as much code as
possible between idmap_ldap and pdb_ldap.
We also no longer use the race-prone 'enumerate all users' method for
finding the next RID to allocate. Instead, we just start at the bottom
of the range, and increment again if the user already exists. The first
time this is run, it may well take a long time, but next time will just
be able to use the next Rid.
Thanks to metze and AB for double-checking parts of this.
Andrew Bartlett
(This used to be commit 9c595c8c2327b92a86901d84c3f2c284dabd597e)
2003-07-04 17:29:42 +04:00
}
ldap_msgfree ( result ) ;
2002-03-02 13:16:28 +03:00
return NT_STATUS_OK ;
}
2013-01-28 19:16:42 +04:00
NTSTATUS pdb_ldapsam_init ( void )
2002-03-02 13:16:28 +03:00
{
2003-05-12 22:12:31 +04:00
NTSTATUS nt_status ;
2013-01-28 19:16:42 +04:00
nt_status = smb_register_passdb ( PASSDB_INTERFACE_VERSION ,
" ldapsam " ,
pdb_ldapsam_init_common ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2003-05-12 22:12:31 +04:00
return nt_status ;
2013-01-28 19:16:42 +04:00
}
2003-05-12 22:12:31 +04:00
2005-03-05 04:22:53 +03:00
/* Let pdb_nds register backends */
pdb_nds_init ( ) ;
2010-07-14 17:08:02 +04:00
pdb_ipa_init ( ) ;
2003-05-01 03:06:44 +04:00
return NT_STATUS_OK ;
2002-03-02 13:16:28 +03:00
}