2008-01-16 12:27:29 +03:00
/*
Unix SMB / CIFS implementation .
idmap TDB2 backend , used for clustered Samba setups .
This uses 2 tdb files . One is permanent , and is in shared storage
on the cluster ( using " tdb:idmap2.tdb = " in smb . conf ) . The other is a
temporary cache tdb on local storage .
Copyright ( C ) Andrew Tridgell 2007
This is heavily based upon idmap_tdb . c , which is :
Copyright ( C ) Tim Potter 2000
Copyright ( C ) Jim McDonough < jmcd @ us . ibm . com > 2003
Copyright ( C ) Jeremy Allison 2006
Copyright ( C ) Simo Sorce 2003 - 2006
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
# include "winbindd.h"
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_IDMAP
/* High water mark keys */
# define HWM_GROUP "GROUP HWM"
# define HWM_USER "USER HWM"
static struct idmap_tdb2_state {
/* User and group id pool */
uid_t low_uid , high_uid ; /* Range of uids to allocate */
gid_t low_gid , high_gid ; /* Range of gids to allocate */
const char * idmap_script ;
} idmap_tdb2_state ;
/* tdb context for the local cache tdb */
static TDB_CONTEXT * idmap_tdb2_tmp ;
/* handle to the permanent tdb */
static struct db_context * idmap_tdb2_perm ;
/*
open the cache tdb
*/
static NTSTATUS idmap_tdb2_open_cache_db ( void )
{
const char * db_path ;
if ( idmap_tdb2_tmp ) {
/* its already open */
return NT_STATUS_OK ;
}
db_path = lock_path ( " idmap2_cache.tdb " ) ;
/* Open idmap repository */
if ( ! ( idmap_tdb2_tmp = tdb_open_log ( db_path , 0 , TDB_CLEAR_IF_FIRST , O_RDWR | O_CREAT , 0644 ) ) ) {
DEBUG ( 0 , ( " Unable to open cache idmap database '%s' \n " , db_path ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
return NT_STATUS_OK ;
}
static NTSTATUS idmap_tdb2_alloc_load ( void ) ;
/*
open the permanent tdb
*/
static NTSTATUS idmap_tdb2_open_perm_db ( void )
{
char * db_path ;
if ( idmap_tdb2_perm ) {
/* its already open */
return NT_STATUS_OK ;
}
db_path = lp_parm_talloc_string ( - 1 , " tdb " , " idmap2.tdb " , NULL ) ;
if ( db_path = = NULL ) {
/* fall back to the private directory, which, despite
its name , is usually on shared storage */
db_path = talloc_asprintf ( NULL , " %s/idmap2.tdb " , lp_private_dir ( ) ) ;
}
NT_STATUS_HAVE_NO_MEMORY ( db_path ) ;
/* Open idmap repository */
idmap_tdb2_perm = db_open ( NULL , db_path , 0 , TDB_DEFAULT ,
O_RDWR | O_CREAT , 0644 ) ;
TALLOC_FREE ( db_path ) ;
if ( idmap_tdb2_perm = = NULL ) {
DEBUG ( 0 , ( " Unable to open permanent idmap database '%s' \n " ,
db_path ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
/* load the ranges and high/low water marks */
return idmap_tdb2_alloc_load ( ) ;
}
/*
load the idmap allocation ranges and high / low water marks
*/
static NTSTATUS idmap_tdb2_alloc_load ( void )
{
const char * range ;
uid_t low_uid = 0 ;
uid_t high_uid = 0 ;
gid_t low_gid = 0 ;
gid_t high_gid = 0 ;
/* load ranges */
idmap_tdb2_state . low_uid = 0 ;
idmap_tdb2_state . high_uid = 0 ;
idmap_tdb2_state . low_gid = 0 ;
idmap_tdb2_state . high_gid = 0 ;
/* see if a idmap script is configured */
idmap_tdb2_state . idmap_script = lp_parm_const_string ( - 1 , " idmap " , " script " , NULL ) ;
if ( idmap_tdb2_state . idmap_script ) {
DEBUG ( 1 , ( " using idmap script '%s' \n " , idmap_tdb2_state . idmap_script ) ) ;
}
range = lp_parm_const_string ( - 1 , " idmap alloc config " , " range " , NULL ) ;
if ( range & & range [ 0 ] ) {
unsigned low_id , high_id ;
if ( sscanf ( range , " %u - %u " , & low_id , & high_id ) = = 2 ) {
if ( low_id < high_id ) {
idmap_tdb2_state . low_gid = idmap_tdb2_state . low_uid = low_id ;
idmap_tdb2_state . high_gid = idmap_tdb2_state . high_uid = high_id ;
} else {
DEBUG ( 1 , ( " ERROR: invalid idmap alloc range [%s] " , range ) ) ;
}
} else {
DEBUG ( 1 , ( " ERROR: invalid syntax for idmap alloc config:range [%s] " , range ) ) ;
}
}
/* Create high water marks for group and user id */
if ( lp_idmap_uid ( & low_uid , & high_uid ) ) {
idmap_tdb2_state . low_uid = low_uid ;
idmap_tdb2_state . high_uid = high_uid ;
}
if ( lp_idmap_gid ( & low_gid , & high_gid ) ) {
idmap_tdb2_state . low_gid = low_gid ;
idmap_tdb2_state . high_gid = high_gid ;
}
if ( idmap_tdb2_state . high_uid < = idmap_tdb2_state . low_uid ) {
DEBUG ( 1 , ( " idmap uid range missing or invalid \n " ) ) ;
DEBUGADD ( 1 , ( " idmap will be unable to map foreign SIDs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
} else {
uint32 low_id ;
if ( ( ( low_id = dbwrap_fetch_int32 ( idmap_tdb2_perm ,
HWM_USER ) ) = = - 1 ) | |
( low_id < idmap_tdb2_state . low_uid ) ) {
if ( dbwrap_store_int32 (
idmap_tdb2_perm , HWM_USER ,
idmap_tdb2_state . low_uid ) = = - 1 ) {
DEBUG ( 0 , ( " Unable to initialise user hwm in idmap database \n " ) ) ;
return NT_STATUS_INTERNAL_DB_ERROR ;
}
}
}
if ( idmap_tdb2_state . high_gid < = idmap_tdb2_state . low_gid ) {
DEBUG ( 1 , ( " idmap gid range missing or invalid \n " ) ) ;
DEBUGADD ( 1 , ( " idmap will be unable to map foreign SIDs \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
} else {
uint32 low_id ;
if ( ( ( low_id = dbwrap_fetch_int32 ( idmap_tdb2_perm ,
HWM_GROUP ) ) = = - 1 ) | |
( low_id < idmap_tdb2_state . low_gid ) ) {
if ( dbwrap_store_int32 (
idmap_tdb2_perm , HWM_GROUP ,
idmap_tdb2_state . low_gid ) = = - 1 ) {
DEBUG ( 0 , ( " Unable to initialise group hwm in idmap database \n " ) ) ;
return NT_STATUS_INTERNAL_DB_ERROR ;
}
}
}
return NT_STATUS_OK ;
}
/*
Initialise idmap alloc database .
*/
static NTSTATUS idmap_tdb2_alloc_init ( const char * params )
{
/* nothing to do - we want to avoid opening the permanent
database if possible . Instead we load the params when we
first need it . */
return NT_STATUS_OK ;
}
/*
Allocate a new id .
*/
static NTSTATUS idmap_tdb2_allocate_id ( struct unixid * xid )
{
bool ret ;
const char * hwmkey ;
const char * hwmtype ;
uint32_t high_hwm ;
uint32_t hwm ;
NTSTATUS status ;
status = idmap_tdb2_open_perm_db ( ) ;
NT_STATUS_NOT_OK_RETURN ( status ) ;
/* Get current high water mark */
switch ( xid - > type ) {
case ID_TYPE_UID :
hwmkey = HWM_USER ;
hwmtype = " UID " ;
high_hwm = idmap_tdb2_state . high_uid ;
break ;
case ID_TYPE_GID :
hwmkey = HWM_GROUP ;
hwmtype = " GID " ;
high_hwm = idmap_tdb2_state . high_gid ;
break ;
default :
DEBUG ( 2 , ( " Invalid ID type (0x%x) \n " , xid - > type ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
if ( ( hwm = dbwrap_fetch_int32 ( idmap_tdb2_perm , hwmkey ) ) = = - 1 ) {
return NT_STATUS_INTERNAL_DB_ERROR ;
}
/* check it is in the range */
if ( hwm > high_hwm ) {
DEBUG ( 1 , ( " Fatal Error: %s range full!! (max: %lu) \n " ,
hwmtype , ( unsigned long ) high_hwm ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
/* fetch a new id and increment it */
ret = dbwrap_change_uint32_atomic ( idmap_tdb2_perm , hwmkey , & hwm , 1 ) ;
if ( ret = = - 1 ) {
DEBUG ( 1 , ( " Fatal error while fetching a new %s value \n ! " , hwmtype ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
/* recheck it is in the range */
if ( hwm > high_hwm ) {
DEBUG ( 1 , ( " Fatal Error: %s range full!! (max: %lu) \n " ,
hwmtype , ( unsigned long ) high_hwm ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
xid - > id = hwm ;
DEBUG ( 10 , ( " New %s = %d \n " , hwmtype , hwm ) ) ;
return NT_STATUS_OK ;
}
/*
Get current highest id .
*/
static NTSTATUS idmap_tdb2_get_hwm ( struct unixid * xid )
{
const char * hwmkey ;
const char * hwmtype ;
uint32_t hwm ;
uint32_t high_hwm ;
/* Get current high water mark */
switch ( xid - > type ) {
case ID_TYPE_UID :
hwmkey = HWM_USER ;
hwmtype = " UID " ;
high_hwm = idmap_tdb2_state . high_uid ;
break ;
case ID_TYPE_GID :
hwmkey = HWM_GROUP ;
hwmtype = " GID " ;
high_hwm = idmap_tdb2_state . high_gid ;
break ;
default :
return NT_STATUS_INVALID_PARAMETER ;
}
if ( ( hwm = dbwrap_fetch_int32 ( idmap_tdb2_perm , hwmkey ) ) = = - 1 ) {
return NT_STATUS_INTERNAL_DB_ERROR ;
}
xid - > id = hwm ;
/* Warn if it is out of range */
if ( hwm > = high_hwm ) {
DEBUG ( 0 , ( " Warning: %s range full!! (max: %lu) \n " ,
hwmtype , ( unsigned long ) high_hwm ) ) ;
}
return NT_STATUS_OK ;
}
/*
Set high id .
*/
static NTSTATUS idmap_tdb2_set_hwm ( struct unixid * xid )
{
/* not supported, or we would invalidate the cache tdb on
other nodes */
DEBUG ( 0 , ( " idmap_tdb2_set_hwm not supported \n " ) ) ;
return NT_STATUS_NOT_SUPPORTED ;
}
/*
Close the alloc tdb
*/
static NTSTATUS idmap_tdb2_alloc_close ( void )
{
/* don't actually close it */
return NT_STATUS_OK ;
}
/*
IDMAP MAPPING TDB BACKEND
*/
struct idmap_tdb2_context {
uint32_t filter_low_id ;
uint32_t filter_high_id ;
} ;
/*
try fetching from the cache tdb , and if that fails then
fetch from the permanent tdb
*/
static TDB_DATA tdb2_fetch_bystring ( TALLOC_CTX * mem_ctx , const char * keystr )
{
TDB_DATA ret ;
NTSTATUS status ;
ret = tdb_fetch_bystring ( idmap_tdb2_tmp , keystr ) ;
if ( ret . dptr ! = NULL ) {
/* got it from cache */
unsigned char * tmp ;
tmp = ( unsigned char * ) talloc_memdup ( mem_ctx , ret . dptr ,
ret . dsize ) ;
SAFE_FREE ( ret . dptr ) ;
ret . dptr = tmp ;
if ( ret . dptr = = NULL ) {
return make_tdb_data ( NULL , 0 ) ;
}
return ret ;
}
status = idmap_tdb2_open_perm_db ( ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ret ;
}
/* fetch from the permanent tdb */
return dbwrap_fetch_bystring ( idmap_tdb2_perm , mem_ctx , keystr ) ;
}
/*
store into both databases
*/
static NTSTATUS tdb2_store_bystring ( const char * keystr , TDB_DATA data , int flags )
{
NTSTATUS ret ;
NTSTATUS status = idmap_tdb2_open_perm_db ( ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return NT_STATUS_UNSUCCESSFUL ;
}
ret = dbwrap_store_bystring ( idmap_tdb2_perm , keystr , data , flags ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
ret = tdb_store_bystring ( idmap_tdb2_tmp , keystr , data , flags ) ? NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL ;
}
return ret ;
}
/*
delete from both databases
*/
static NTSTATUS tdb2_delete_bystring ( const char * keystr )
{
NTSTATUS ret ;
NTSTATUS status = idmap_tdb2_open_perm_db ( ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return NT_STATUS_UNSUCCESSFUL ;
}
ret = dbwrap_delete_bystring ( idmap_tdb2_perm , keystr ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
ret = tdb_delete_bystring ( idmap_tdb2_tmp , keystr ) ? NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL ;
}
return ret ;
}
/*
Initialise idmap database .
*/
static NTSTATUS idmap_tdb2_db_init ( struct idmap_domain * dom )
{
NTSTATUS ret ;
struct idmap_tdb2_context * ctx ;
char * config_option = NULL ;
const char * range ;
NTSTATUS status ;
status = idmap_tdb2_open_cache_db ( ) ;
NT_STATUS_NOT_OK_RETURN ( status ) ;
ctx = talloc ( dom , struct idmap_tdb2_context ) ;
if ( ! ctx ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
config_option = talloc_asprintf ( ctx , " idmap config %s " , dom - > name ) ;
if ( ! config_option ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto failed ;
}
range = lp_parm_const_string ( - 1 , config_option , " range " , NULL ) ;
if ( ( ! range ) | |
( sscanf ( range , " %u - %u " , & ctx - > filter_low_id , & ctx - > filter_high_id ) ! = 2 ) | |
( ctx - > filter_low_id > ctx - > filter_high_id ) ) {
ctx - > filter_low_id = 0 ;
ctx - > filter_high_id = 0 ;
}
dom - > private_data = ctx ;
dom - > initialized = True ;
talloc_free ( config_option ) ;
return NT_STATUS_OK ;
failed :
talloc_free ( ctx ) ;
return ret ;
}
/*
run a script to perform a mapping
The script should the following command lines :
SIDTOID S - 1 - xxxx
IDTOSID UID xxxx
IDTOSID GID xxxx
and should return one of the following as a single line of text
UID : xxxx
GID : xxxx
SID : xxxx
ERR : xxxx
*/
static NTSTATUS idmap_tdb2_script ( struct idmap_tdb2_context * ctx , struct id_map * map ,
const char * fmt , . . . )
{
va_list ap ;
char * cmd ;
FILE * p ;
char line [ 64 ] ;
unsigned long v ;
cmd = talloc_asprintf ( ctx , " %s " , idmap_tdb2_state . idmap_script ) ;
NT_STATUS_HAVE_NO_MEMORY ( cmd ) ;
va_start ( ap , fmt ) ;
cmd = talloc_vasprintf_append ( cmd , fmt , ap ) ;
va_end ( ap ) ;
NT_STATUS_HAVE_NO_MEMORY ( cmd ) ;
p = popen ( cmd , " r " ) ;
talloc_free ( cmd ) ;
if ( p = = NULL ) {
return NT_STATUS_NONE_MAPPED ;
}
if ( fgets ( line , sizeof ( line ) - 1 , p ) = = NULL ) {
pclose ( p ) ;
return NT_STATUS_NONE_MAPPED ;
}
pclose ( p ) ;
DEBUG ( 10 , ( " idmap script gave: %s \n " , line ) ) ;
if ( sscanf ( line , " UID:%lu " , & v ) = = 1 ) {
map - > xid . id = v ;
map - > xid . type = ID_TYPE_UID ;
} else if ( sscanf ( line , " GID:%lu " , & v ) = = 1 ) {
map - > xid . id = v ;
map - > xid . type = ID_TYPE_GID ;
} else if ( strncmp ( line , " SID:S- " , 6 ) = = 0 ) {
if ( ! string_to_sid ( map - > sid , & line [ 4 ] ) ) {
DEBUG ( 0 , ( " Bad SID in '%s' from idmap script %s \n " ,
line , idmap_tdb2_state . idmap_script ) ) ;
return NT_STATUS_NONE_MAPPED ;
}
} else {
DEBUG ( 0 , ( " Bad reply '%s' from idmap script %s \n " ,
line , idmap_tdb2_state . idmap_script ) ) ;
return NT_STATUS_NONE_MAPPED ;
}
return NT_STATUS_OK ;
}
/*
Single id to sid lookup function .
*/
static NTSTATUS idmap_tdb2_id_to_sid ( struct idmap_tdb2_context * ctx , struct id_map * map )
{
NTSTATUS ret ;
TDB_DATA data ;
char * keystr ;
if ( ! ctx | | ! map ) {
return NT_STATUS_INVALID_PARAMETER ;
}
/* apply filters before checking */
if ( ( ctx - > filter_low_id & & ( map - > xid . id < ctx - > filter_low_id ) ) | |
( ctx - > filter_high_id & & ( map - > xid . id > ctx - > filter_high_id ) ) ) {
DEBUG ( 5 , ( " Requested id (%u) out of range (%u - %u). Filtered! \n " ,
map - > xid . id , ctx - > filter_low_id , ctx - > filter_high_id ) ) ;
return NT_STATUS_NONE_MAPPED ;
}
switch ( map - > xid . type ) {
case ID_TYPE_UID :
keystr = talloc_asprintf ( ctx , " UID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
case ID_TYPE_GID :
keystr = talloc_asprintf ( ctx , " GID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
default :
DEBUG ( 2 , ( " INVALID unix ID type: 0x02%x \n " , map - > xid . type ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
/* final SAFE_FREE safe */
data . dptr = NULL ;
if ( keystr = = NULL ) {
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
DEBUG ( 10 , ( " Fetching record %s \n " , keystr ) ) ;
/* Check if the mapping exists */
data = tdb2_fetch_bystring ( keystr , keystr ) ;
if ( ! data . dptr ) {
fstring sidstr ;
DEBUG ( 10 , ( " Record %s not found \n " , keystr ) ) ;
if ( idmap_tdb2_state . idmap_script = = NULL ) {
ret = NT_STATUS_NONE_MAPPED ;
goto done ;
}
ret = idmap_tdb2_script ( ctx , map , " IDTOSID %s " , keystr ) ;
/* store it on shared storage */
if ( ! NT_STATUS_IS_OK ( ret ) ) {
goto done ;
}
2008-01-16 16:50:46 +03:00
if ( sid_to_fstring ( sidstr , map - > sid ) ) {
2008-01-16 12:27:29 +03:00
/* both forward and reverse mappings */
tdb2_store_bystring ( keystr ,
string_term_tdb_data ( sidstr ) ,
TDB_REPLACE ) ;
tdb2_store_bystring ( sidstr ,
string_term_tdb_data ( keystr ) ,
TDB_REPLACE ) ;
}
goto done ;
}
if ( ! string_to_sid ( map - > sid , ( const char * ) data . dptr ) ) {
DEBUG ( 10 , ( " INVALID SID (%s) in record %s \n " ,
( const char * ) data . dptr , keystr ) ) ;
ret = NT_STATUS_INTERNAL_DB_ERROR ;
goto done ;
}
DEBUG ( 10 , ( " Found record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_OK ;
done :
talloc_free ( keystr ) ;
return ret ;
}
/*
Single sid to id lookup function .
*/
static NTSTATUS idmap_tdb2_sid_to_id ( struct idmap_tdb2_context * ctx , struct id_map * map )
{
NTSTATUS ret ;
TDB_DATA data ;
char * keystr ;
unsigned long rec_id = 0 ;
2008-01-16 16:50:46 +03:00
if ( ( keystr = sid_string_talloc ( ctx , map - > sid ) ) = = NULL ) {
2008-01-16 12:27:29 +03:00
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
DEBUG ( 10 , ( " Fetching record %s \n " , keystr ) ) ;
/* Check if sid is present in database */
data = tdb2_fetch_bystring ( keystr , keystr ) ;
if ( ! data . dptr ) {
fstring idstr ;
DEBUG ( 10 , ( __location__ " Record %s not found \n " , keystr ) ) ;
if ( idmap_tdb2_state . idmap_script = = NULL ) {
ret = NT_STATUS_NONE_MAPPED ;
goto done ;
}
ret = idmap_tdb2_script ( ctx , map , " SIDTOID %s " , keystr ) ;
/* store it on shared storage */
if ( ! NT_STATUS_IS_OK ( ret ) ) {
goto done ;
}
snprintf ( idstr , sizeof ( idstr ) , " %cID %lu " ,
map - > xid . type = = ID_TYPE_UID ? ' U ' : ' G ' ,
( unsigned long ) map - > xid . id ) ;
/* store both forward and reverse mappings */
tdb2_store_bystring ( keystr , string_term_tdb_data ( idstr ) ,
TDB_REPLACE ) ;
tdb2_store_bystring ( idstr , string_term_tdb_data ( keystr ) ,
TDB_REPLACE ) ;
goto done ;
}
/* What type of record is this ? */
if ( sscanf ( ( const char * ) data . dptr , " UID %lu " , & rec_id ) = = 1 ) { /* Try a UID record. */
map - > xid . id = rec_id ;
map - > xid . type = ID_TYPE_UID ;
DEBUG ( 10 , ( " Found uid record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_OK ;
} else if ( sscanf ( ( const char * ) data . dptr , " GID %lu " , & rec_id ) = = 1 ) { /* Try a GID record. */
map - > xid . id = rec_id ;
map - > xid . type = ID_TYPE_GID ;
DEBUG ( 10 , ( " Found gid record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_OK ;
} else { /* Unknown record type ! */
DEBUG ( 2 , ( " Found INVALID record %s -> %s \n " , keystr , ( const char * ) data . dptr ) ) ;
ret = NT_STATUS_INTERNAL_DB_ERROR ;
}
/* apply filters before returning result */
if ( ( ctx - > filter_low_id & & ( map - > xid . id < ctx - > filter_low_id ) ) | |
( ctx - > filter_high_id & & ( map - > xid . id > ctx - > filter_high_id ) ) ) {
DEBUG ( 5 , ( " Requested id (%u) out of range (%u - %u). Filtered! \n " ,
map - > xid . id , ctx - > filter_low_id , ctx - > filter_high_id ) ) ;
ret = NT_STATUS_NONE_MAPPED ;
}
done :
talloc_free ( keystr ) ;
return ret ;
}
/*
lookup a set of unix ids .
*/
static NTSTATUS idmap_tdb2_unixids_to_sids ( struct idmap_domain * dom , struct id_map * * ids )
{
struct idmap_tdb2_context * ctx ;
NTSTATUS ret ;
int i ;
/* make sure we initialized */
if ( ! dom - > initialized ) {
ret = idmap_tdb2_db_init ( dom ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
return ret ;
}
}
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
for ( i = 0 ; ids [ i ] ; i + + ) {
ret = idmap_tdb2_id_to_sid ( ctx , ids [ i ] ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
/* if it is just a failed mapping continue */
if ( NT_STATUS_EQUAL ( ret , NT_STATUS_NONE_MAPPED ) ) {
/* make sure it is marked as unmapped */
ids [ i ] - > status = ID_UNMAPPED ;
continue ;
}
/* some fatal error occurred, return immediately */
goto done ;
}
/* all ok, id is mapped */
ids [ i ] - > status = ID_MAPPED ;
}
ret = NT_STATUS_OK ;
done :
return ret ;
}
/*
lookup a set of sids .
*/
static NTSTATUS idmap_tdb2_sids_to_unixids ( struct idmap_domain * dom , struct id_map * * ids )
{
struct idmap_tdb2_context * ctx ;
NTSTATUS ret ;
int i ;
/* make sure we initialized */
if ( ! dom - > initialized ) {
ret = idmap_tdb2_db_init ( dom ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
return ret ;
}
}
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
for ( i = 0 ; ids [ i ] ; i + + ) {
ret = idmap_tdb2_sid_to_id ( ctx , ids [ i ] ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
/* if it is just a failed mapping continue */
if ( NT_STATUS_EQUAL ( ret , NT_STATUS_NONE_MAPPED ) ) {
/* make sure it is marked as unmapped */
ids [ i ] - > status = ID_UNMAPPED ;
continue ;
}
/* some fatal error occurred, return immediately */
goto done ;
}
/* all ok, id is mapped */
ids [ i ] - > status = ID_MAPPED ;
}
ret = NT_STATUS_OK ;
done :
return ret ;
}
/*
set a mapping .
*/
static NTSTATUS idmap_tdb2_set_mapping ( struct idmap_domain * dom , const struct id_map * map )
{
struct idmap_tdb2_context * ctx ;
NTSTATUS ret ;
TDB_DATA data ;
char * ksidstr , * kidstr ;
struct db_record * update_lock = NULL ;
struct db_record * rec = NULL ;
/* make sure we initialized */
if ( ! dom - > initialized ) {
ret = idmap_tdb2_db_init ( dom ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
return ret ;
}
}
if ( ! map | | ! map - > sid ) {
return NT_STATUS_INVALID_PARAMETER ;
}
ksidstr = kidstr = NULL ;
data . dptr = NULL ;
/* TODO: should we filter a set_mapping using low/high filters ? */
ctx = talloc_get_type ( dom - > private_data , struct idmap_tdb2_context ) ;
switch ( map - > xid . type ) {
case ID_TYPE_UID :
kidstr = talloc_asprintf ( ctx , " UID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
case ID_TYPE_GID :
kidstr = talloc_asprintf ( ctx , " GID %lu " , ( unsigned long ) map - > xid . id ) ;
break ;
default :
DEBUG ( 2 , ( " INVALID unix ID type: 0x02%x \n " , map - > xid . type ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
if ( kidstr = = NULL ) {
DEBUG ( 0 , ( " ERROR: Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
2008-01-16 16:50:46 +03:00
if ( ! ( ksidstr = sid_string_talloc ( ctx , map - > sid ) ) ) {
2008-01-16 12:27:29 +03:00
DEBUG ( 0 , ( " Out of memory! \n " ) ) ;
ret = NT_STATUS_NO_MEMORY ;
goto done ;
}
DEBUG ( 10 , ( " Storing %s <-> %s map \n " , ksidstr , kidstr ) ) ;
/*
* Get us the update lock . This is necessary to get the lock orders
* right , we need to deal with two records under a lock .
*/
if ( ! ( update_lock = idmap_tdb2_perm - > fetch_locked (
idmap_tdb2_perm , ctx ,
string_term_tdb_data ( " UPDATELOCK " ) ) ) ) {
DEBUG ( 10 , ( " Failed to lock record %s \n " , ksidstr ) ) ;
ret = NT_STATUS_UNSUCCESSFUL ;
goto done ;
}
/*
* * DELETE * previous mappings if any . *
*/
/* First delete indexed on SID */
if ( ( ( rec = idmap_tdb2_perm - > fetch_locked (
idmap_tdb2_perm , update_lock ,
string_term_tdb_data ( ksidstr ) ) ) ! = NULL )
& & ( rec - > value . dsize ! = 0 ) ) {
struct db_record * rec2 ;
if ( ( rec2 = idmap_tdb2_perm - > fetch_locked (
idmap_tdb2_perm , update_lock , rec - > value ) )
! = NULL ) {
rec2 - > delete_rec ( rec2 ) ;
TALLOC_FREE ( rec2 ) ;
}
rec - > delete_rec ( rec ) ;
tdb_delete ( idmap_tdb2_tmp , rec - > key ) ;
tdb_delete ( idmap_tdb2_tmp , rec - > value ) ;
}
TALLOC_FREE ( rec ) ;
/* Now delete indexed on unix ID */
if ( ( ( rec = idmap_tdb2_perm - > fetch_locked (
idmap_tdb2_perm , update_lock ,
string_term_tdb_data ( kidstr ) ) ) ! = NULL )
& & ( rec - > value . dsize ! = 0 ) ) {
struct db_record * rec2 ;
if ( ( rec2 = idmap_tdb2_perm - > fetch_locked (
idmap_tdb2_perm , update_lock , rec - > value ) )
! = NULL ) {
rec2 - > delete_rec ( rec2 ) ;
TALLOC_FREE ( rec2 ) ;
}
rec - > delete_rec ( rec ) ;
tdb_delete ( idmap_tdb2_tmp , rec - > key ) ;
tdb_delete ( idmap_tdb2_tmp , rec - > value ) ;
}
TALLOC_FREE ( rec ) ;
if ( ! NT_STATUS_IS_OK ( tdb2_store_bystring ( ksidstr , string_term_tdb_data ( kidstr ) ,
TDB_INSERT ) ) ) {
DEBUG ( 0 , ( " Error storing SID -> ID \n " ) ) ;
ret = NT_STATUS_UNSUCCESSFUL ;
goto done ;
}
if ( ! NT_STATUS_IS_OK ( tdb2_store_bystring ( kidstr , string_term_tdb_data ( ksidstr ) ,
TDB_INSERT ) ) ) {
DEBUG ( 0 , ( " Error storing ID -> SID \n " ) ) ;
/* try to remove the previous stored SID -> ID map */
tdb2_delete_bystring ( ksidstr ) ;
ret = NT_STATUS_UNSUCCESSFUL ;
goto done ;
}
DEBUG ( 10 , ( " Stored %s <-> %s \n " , ksidstr , kidstr ) ) ;
ret = NT_STATUS_OK ;
done :
talloc_free ( ksidstr ) ;
talloc_free ( kidstr ) ;
SAFE_FREE ( data . dptr ) ;
TALLOC_FREE ( update_lock ) ;
return ret ;
}
/*
remove a mapping .
*/
static NTSTATUS idmap_tdb2_remove_mapping ( struct idmap_domain * dom , const struct id_map * map )
{
/* not supported as it would invalidate the cache tdb on other
nodes */
DEBUG ( 0 , ( " idmap_tdb2_remove_mapping not supported \n " ) ) ;
return NT_STATUS_NOT_SUPPORTED ;
}
/*
Close the idmap tdb instance
*/
static NTSTATUS idmap_tdb2_close ( struct idmap_domain * dom )
{
/* don't do anything */
return NT_STATUS_OK ;
}
/*
Dump all mappings out
*/
static NTSTATUS idmap_tdb2_dump_data ( struct idmap_domain * dom , struct id_map * * maps , int * num_maps )
{
DEBUG ( 0 , ( " idmap_tdb2_dump_data not supported \n " ) ) ;
return NT_STATUS_NOT_SUPPORTED ;
}
static struct idmap_methods db_methods = {
. init = idmap_tdb2_db_init ,
. unixids_to_sids = idmap_tdb2_unixids_to_sids ,
. sids_to_unixids = idmap_tdb2_sids_to_unixids ,
. set_mapping = idmap_tdb2_set_mapping ,
. remove_mapping = idmap_tdb2_remove_mapping ,
. dump_data = idmap_tdb2_dump_data ,
. close_fn = idmap_tdb2_close
} ;
static struct idmap_alloc_methods db_alloc_methods = {
. init = idmap_tdb2_alloc_init ,
. allocate_id = idmap_tdb2_allocate_id ,
. get_id_hwm = idmap_tdb2_get_hwm ,
. set_id_hwm = idmap_tdb2_set_hwm ,
. close_fn = idmap_tdb2_alloc_close
} ;
NTSTATUS idmap_tdb2_init ( void )
{
NTSTATUS ret ;
/* register both backends */
ret = smb_register_idmap_alloc ( SMB_IDMAP_INTERFACE_VERSION , " tdb2 " , & db_alloc_methods ) ;
2008-01-16 16:50:46 +03:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
DEBUG ( 0 , ( " Unable to register idmap alloc tdb2 module: %s \n " , get_friendly_nt_error_msg ( ret ) ) ) ;
return ret ;
}
2008-01-16 12:27:29 +03:00
return smb_register_idmap ( SMB_IDMAP_INTERFACE_VERSION , " tdb2 " , & db_methods ) ;
}