mirror of
https://github.com/samba-team/samba.git
synced 2025-11-11 00:23:51 +03:00
Merge branch 'v4-0-test' of ssh://git.samba.org/data/git/samba into 4-0-local
This commit is contained in:
@@ -443,7 +443,7 @@ PUBLIC_DEPENDENCIES = \
|
|||||||
HEIMDAL_ROKEN_GETPROGNAME \
|
HEIMDAL_ROKEN_GETPROGNAME \
|
||||||
HEIMDAL_ROKEN_CLOSEFROM \
|
HEIMDAL_ROKEN_CLOSEFROM \
|
||||||
RESOLV \
|
RESOLV \
|
||||||
EXT_SOCKET
|
LIBREPLACE_NETWORK
|
||||||
# End SUBSYSTEM HEIMDAL_ROKEN
|
# End SUBSYSTEM HEIMDAL_ROKEN
|
||||||
#######################
|
#######################
|
||||||
|
|
||||||
@@ -503,7 +503,7 @@ OBJ_FILES = \
|
|||||||
../heimdal/lib/vers/print_version.ho \
|
../heimdal/lib/vers/print_version.ho \
|
||||||
../lib/socket_wrapper/socket_wrapper.ho \
|
../lib/socket_wrapper/socket_wrapper.ho \
|
||||||
replace.ho
|
replace.ho
|
||||||
PRIVATE_DEPENDENCIES = HEIMDAL_ASN1_COMPILE_LEX HEIMDAL_ROKEN_GETPROGNAME_H EXT_SOCKET EXT_NSL
|
PRIVATE_DEPENDENCIES = HEIMDAL_ASN1_COMPILE_LEX HEIMDAL_ROKEN_GETPROGNAME_H LIBREPLACE_NETWORK
|
||||||
|
|
||||||
# End BINARY asn1_compile
|
# End BINARY asn1_compile
|
||||||
#######################
|
#######################
|
||||||
@@ -530,7 +530,7 @@ OBJ_FILES = ../heimdal/lib/vers/print_version.ho \
|
|||||||
../heimdal/lib/roken/setprogname.ho \
|
../heimdal/lib/roken/setprogname.ho \
|
||||||
../lib/socket_wrapper/socket_wrapper.ho \
|
../lib/socket_wrapper/socket_wrapper.ho \
|
||||||
replace.ho
|
replace.ho
|
||||||
PRIVATE_DEPENDENCIES = HEIMDAL_COM_ERR_COMPILE_LEX HEIMDAL_ROKEN_GETPROGNAME_H EXT_SOCKET EXT_NSL
|
PRIVATE_DEPENDENCIES = HEIMDAL_COM_ERR_COMPILE_LEX HEIMDAL_ROKEN_GETPROGNAME_H LIBREPLACE_NETWORK
|
||||||
# End BINARY compile_et
|
# End BINARY compile_et
|
||||||
#######################
|
#######################
|
||||||
|
|
||||||
|
|||||||
@@ -121,7 +121,7 @@ distclean:: clean
|
|||||||
rm -f Makefile
|
rm -f Makefile
|
||||||
|
|
||||||
realdistclean:: distclean
|
realdistclean:: distclean
|
||||||
rm -f configure.in include/config.h.in
|
rm -f configure include/config.h.in
|
||||||
|
|
||||||
check:: test @PYTHON_CHECK_TARGET@
|
check:: test @PYTHON_CHECK_TARGET@
|
||||||
|
|
||||||
|
|||||||
@@ -65,7 +65,7 @@ static struct backends_list_entry {
|
|||||||
|
|
||||||
#ifdef HAVE_LDB_LDAP
|
#ifdef HAVE_LDB_LDAP
|
||||||
#define LDAP_INIT &ldb_ldap_backend_ops, \
|
#define LDAP_INIT &ldb_ldap_backend_ops, \
|
||||||
&ldb_ildap_backend_ops, \
|
&ldb_ldapi_backend_ops, \
|
||||||
&ldb_ldaps_backend_ops,
|
&ldb_ldaps_backend_ops,
|
||||||
#else
|
#else
|
||||||
#define LDAP_INIT
|
#define LDAP_INIT
|
||||||
|
|||||||
@@ -129,11 +129,11 @@ static struct ops_list_entry {
|
|||||||
#ifndef STATIC_LIBLDB_MODULES
|
#ifndef STATIC_LIBLDB_MODULES
|
||||||
|
|
||||||
#define STATIC_LIBLDB_MODULES \
|
#define STATIC_LIBLDB_MODULES \
|
||||||
ldb_operational_module_ops, \
|
&ldb_operational_module_ops, \
|
||||||
ldb_rdn_name_module_ops, \
|
&ldb_rdn_name_module_ops, \
|
||||||
ldb_paged_results_module_ops, \
|
&ldb_paged_results_module_ops, \
|
||||||
ldb_sort_module_ops, \
|
&ldb_server_sort_module_ops, \
|
||||||
ldb_asq_module_ops, \
|
&ldb_asq_module_ops, \
|
||||||
NULL
|
NULL
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|||||||
@@ -18,7 +18,6 @@
|
|||||||
|
|
||||||
#include "replace.h"
|
#include "replace.h"
|
||||||
#include "system/filesys.h"
|
#include "system/filesys.h"
|
||||||
#include "system/network.h"
|
|
||||||
#include "system/time.h"
|
#include "system/time.h"
|
||||||
#include "talloc.h"
|
#include "talloc.h"
|
||||||
#include "ldb.h"
|
#include "ldb.h"
|
||||||
|
|||||||
@@ -185,7 +185,7 @@ extern const struct ldb_module_ops ldb_paged_results_module_ops;
|
|||||||
extern const struct ldb_module_ops ldb_rdn_name_module_ops;
|
extern const struct ldb_module_ops ldb_rdn_name_module_ops;
|
||||||
extern const struct ldb_module_ops ldb_schema_module_ops;
|
extern const struct ldb_module_ops ldb_schema_module_ops;
|
||||||
extern const struct ldb_module_ops ldb_asq_module_ops;
|
extern const struct ldb_module_ops ldb_asq_module_ops;
|
||||||
extern const struct ldb_module_ops ldb_sort_module_ops;
|
extern const struct ldb_module_ops ldb_server_sort_module_ops;
|
||||||
extern const struct ldb_module_ops ldb_ldap_module_ops;
|
extern const struct ldb_module_ops ldb_ldap_module_ops;
|
||||||
extern const struct ldb_module_ops ldb_ildap_module_ops;
|
extern const struct ldb_module_ops ldb_ildap_module_ops;
|
||||||
extern const struct ldb_module_ops ldb_tdb_module_ops;
|
extern const struct ldb_module_ops ldb_tdb_module_ops;
|
||||||
@@ -194,7 +194,7 @@ extern const struct ldb_module_ops ldb_sqlite3_module_ops;
|
|||||||
extern const struct ldb_backend_ops ldb_tdb_backend_ops;
|
extern const struct ldb_backend_ops ldb_tdb_backend_ops;
|
||||||
extern const struct ldb_backend_ops ldb_sqlite3_backend_ops;
|
extern const struct ldb_backend_ops ldb_sqlite3_backend_ops;
|
||||||
extern const struct ldb_backend_ops ldb_ldap_backend_ops;
|
extern const struct ldb_backend_ops ldb_ldap_backend_ops;
|
||||||
extern const struct ldb_backend_ops ldb_ildap_backend_ops;
|
extern const struct ldb_backend_ops ldb_ldapi_backend_ops;
|
||||||
extern const struct ldb_backend_ops ldb_ldaps_backend_ops;
|
extern const struct ldb_backend_ops ldb_ldaps_backend_ops;
|
||||||
|
|
||||||
int ldb_match_msg(struct ldb_context *ldb,
|
int ldb_match_msg(struct ldb_context *ldb,
|
||||||
|
|||||||
@@ -826,17 +826,17 @@ failed:
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
_PUBLIC_ struct ldb_backend_ops ldb_ldap_backend_ops = {
|
const struct ldb_backend_ops ldb_ldap_backend_ops = {
|
||||||
.name = "ldap",
|
.name = "ldap",
|
||||||
.connect_fn = lldb_connect
|
.connect_fn = lldb_connect
|
||||||
};
|
};
|
||||||
|
|
||||||
_PUBLIC_ struct ldb_backend_ops ldb_ldapi_backend_ops = {
|
const struct ldb_backend_ops ldb_ldapi_backend_ops = {
|
||||||
.name = "ldapi",
|
.name = "ldapi",
|
||||||
.connect_fn = lldb_connect
|
.connect_fn = lldb_connect
|
||||||
};
|
};
|
||||||
|
|
||||||
_PUBLIC_ struct ldb_backend_ops ldb_ldaps_backend_ops = {
|
const struct ldb_backend_ops ldb_ldaps_backend_ops = {
|
||||||
.name = "ldaps",
|
.name = "ldaps",
|
||||||
.connect_fn = lldb_connect
|
.connect_fn = lldb_connect
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ ctags:
|
|||||||
.SUFFIXES: _wrap.c .i
|
.SUFFIXES: _wrap.c .i
|
||||||
|
|
||||||
.i_wrap.c:
|
.i_wrap.c:
|
||||||
[ "$(SWIG)" == "no" ] || $(SWIG) -O -Wall -python -keyword $<
|
[ "$(SWIG)" = "no" ] || $(SWIG) -O -Wall -python -keyword $<
|
||||||
|
|
||||||
.SUFFIXES: .1 .1.xml .3 .3.xml .xml .html .c .o
|
.SUFFIXES: .1 .1.xml .3 .3.xml .xml .html .c .o
|
||||||
|
|
||||||
|
|||||||
@@ -32,7 +32,7 @@ int sample_add(struct ldb_module *mod, struct ldb_request *req)
|
|||||||
return ldb_next_request(mod, req);
|
return ldb_next_request(mod, req);
|
||||||
}
|
}
|
||||||
|
|
||||||
_PUBLIC_ const struct ldb_module_ops ldb_sample_module_ops = {
|
const struct ldb_module_ops ldb_sample_module_ops = {
|
||||||
.name = "sample",
|
.name = "sample",
|
||||||
.add = sample_add,
|
.add = sample_add,
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -19,7 +19,7 @@ fi
|
|||||||
|
|
||||||
cat <<EOF | $VALGRIND ldbadd || exit 1
|
cat <<EOF | $VALGRIND ldbadd || exit 1
|
||||||
dn: @MODULES
|
dn: @MODULES
|
||||||
@LIST: sample_module
|
@LIST: sample
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
cat <<EOF | $VALGRIND ldbadd || exit 1
|
cat <<EOF | $VALGRIND ldbadd || exit 1
|
||||||
|
|||||||
@@ -15,7 +15,6 @@ rename
|
|||||||
initgroups
|
initgroups
|
||||||
memmove
|
memmove
|
||||||
strdup
|
strdup
|
||||||
inet_ntoa
|
|
||||||
setlinebuf
|
setlinebuf
|
||||||
vsyslog
|
vsyslog
|
||||||
timegm
|
timegm
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ if test "$ac_cv_prog_gcc" = yes; then
|
|||||||
CFLAGS="$CFLAGS -Wno-format-y2k"
|
CFLAGS="$CFLAGS -Wno-format-y2k"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
LIBS="$SOCKET_LIBS $NSL_LIBS"
|
LIBS="${LIBREPLACE_NETWORK_LIBS}"
|
||||||
AC_SUBST(LIBS)
|
AC_SUBST(LIBS)
|
||||||
|
|
||||||
AC_SUBST(LDFLAGS)
|
AC_SUBST(LDFLAGS)
|
||||||
|
|||||||
@@ -34,10 +34,10 @@ fi
|
|||||||
##################
|
##################
|
||||||
# look for a method of finding the list of network interfaces
|
# look for a method of finding the list of network interfaces
|
||||||
#
|
#
|
||||||
# This tests need LIBS="$NSL_LIBS $SOCKET_LIBS"
|
# This tests need LIBS="${LIBREPLACE_NETWORK_LIBS}"
|
||||||
#
|
#
|
||||||
old_LIBS=$LIBS
|
old_LIBS=$LIBS
|
||||||
LIBS="$NSL_LIBS $SOCKET_LIBS"
|
LIBS="${LIBREPLACE_NETWORK_LIBS}"
|
||||||
SAVE_CPPFLAGS="$CPPFLAGS"
|
SAVE_CPPFLAGS="$CPPFLAGS"
|
||||||
CPPFLAGS="$CPPFLAGS -I$libreplacedir"
|
CPPFLAGS="$CPPFLAGS -I$libreplacedir"
|
||||||
iface=no;
|
iface=no;
|
||||||
|
|||||||
@@ -185,7 +185,13 @@ char *rep_getpass(const char *prompt)
|
|||||||
buf[0] = 0;
|
buf[0] = 0;
|
||||||
if (!gotintr) {
|
if (!gotintr) {
|
||||||
in_fd = fileno(in);
|
in_fd = fileno(in);
|
||||||
fgets(buf, bufsize, in);
|
if (fgets(buf, bufsize, in) == NULL) {
|
||||||
|
buf[0] = 0;
|
||||||
|
if (in && in != stdin) {
|
||||||
|
fclose(in);
|
||||||
|
}
|
||||||
|
return buf;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
nread = strlen(buf);
|
nread = strlen(buf);
|
||||||
if (nread) {
|
if (nread) {
|
||||||
|
|||||||
@@ -3,18 +3,22 @@
|
|||||||
* replacement functions
|
* replacement functions
|
||||||
* Copyright (C) Michael Adam <obnox@samba.org> 2008
|
* Copyright (C) Michael Adam <obnox@samba.org> 2008
|
||||||
*
|
*
|
||||||
* This program is free software; you can redistribute it and/or modify
|
* ** NOTE! The following LGPL license applies to the replace
|
||||||
* it under the terms of the GNU General Public License as published by
|
* ** library. This does NOT imply that all of Samba is released
|
||||||
* the Free Software Foundation; either version 3 of the License, or
|
* ** under the LGPL
|
||||||
* (at your option) any later version.
|
|
||||||
*
|
*
|
||||||
* This program is distributed in the hope that it will be useful,
|
* This library is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU Lesser General Public
|
||||||
|
* License as published by the Free Software Foundation; either
|
||||||
|
* version 3 of the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This library is distributed in the hope that it will be useful,
|
||||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
* GNU General Public License for more details.
|
* Lesser General Public License for more details.
|
||||||
*
|
*
|
||||||
* You should have received a copy of the GNU General Public License
|
* You should have received a copy of the GNU Lesser General Public
|
||||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "replace.h"
|
#include "replace.h"
|
||||||
|
|||||||
39
source/lib/replace/inet_ntoa.c
Normal file
39
source/lib/replace/inet_ntoa.c
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
/*
|
||||||
|
* Unix SMB/CIFS implementation.
|
||||||
|
* replacement routines for broken systems
|
||||||
|
* Copyright (C) Andrew Tridgell 2003
|
||||||
|
* Copyright (C) Michael Adam 2008
|
||||||
|
*
|
||||||
|
* ** NOTE! The following LGPL license applies to the replace
|
||||||
|
* ** library. This does NOT imply that all of Samba is released
|
||||||
|
* ** under the LGPL
|
||||||
|
*
|
||||||
|
* This library is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU Lesser General Public
|
||||||
|
* License as published by the Free Software Foundation; either
|
||||||
|
* version 3 of the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This library is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
* Lesser General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public
|
||||||
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "replace.h"
|
||||||
|
#include "system/network.h"
|
||||||
|
|
||||||
|
/**
|
||||||
|
* NOTE: this is not thread safe, but it can't be, either
|
||||||
|
* since it returns a pointer to static memory.
|
||||||
|
*/
|
||||||
|
char *rep_inet_ntoa(struct in_addr ip)
|
||||||
|
{
|
||||||
|
uint8_t *p = (uint8_t *)&ip.s_addr;
|
||||||
|
static char buf[18];
|
||||||
|
slprintf(buf, 17, "%d.%d.%d.%d",
|
||||||
|
(int)p[0], (int)p[1], (int)p[2], (int)p[3]);
|
||||||
|
return buf;
|
||||||
|
}
|
||||||
19
source/lib/replace/inet_ntoa.m4
Normal file
19
source/lib/replace/inet_ntoa.m4
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
AC_CHECK_FUNCS(inet_ntoa,[],[LIBREPLACEOBJ="${LIBREPLACEOBJ} inet_ntoa.o"])
|
||||||
|
|
||||||
|
AC_CACHE_CHECK([for broken inet_ntoa],libreplace_cv_REPLACE_INET_NTOA,[
|
||||||
|
AC_TRY_RUN([
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <netinet/in.h>
|
||||||
|
#ifdef HAVE_ARPA_INET_H
|
||||||
|
#include <arpa/inet.h>
|
||||||
|
#endif
|
||||||
|
main() { struct in_addr ip; ip.s_addr = 0x12345678;
|
||||||
|
if (strcmp(inet_ntoa(ip),"18.52.86.120") &&
|
||||||
|
strcmp(inet_ntoa(ip),"120.86.52.18")) { exit(0); }
|
||||||
|
exit(1);}],
|
||||||
|
libreplace_cv_REPLACE_INET_NTOA=yes,libreplace_cv_REPLACE_INET_NTOA=no,libreplace_cv_REPLACE_INET_NTOA=cross)])
|
||||||
|
if test x"$libreplace_cv_REPLACE_INET_NTOA" = x"yes"; then
|
||||||
|
AC_DEFINE(REPLACE_INET_NTOA,1,[Whether inet_ntoa should be replaced])
|
||||||
|
fi
|
||||||
@@ -120,24 +120,6 @@ if test x"$libreplace_cv_USABLE_NET_IF_H" = x"yes";then
|
|||||||
AC_DEFINE(HAVE_NET_IF_H, 1, usability of net/if.h)
|
AC_DEFINE(HAVE_NET_IF_H, 1, usability of net/if.h)
|
||||||
fi
|
fi
|
||||||
|
|
||||||
AC_CACHE_CHECK([for broken inet_ntoa],libreplace_cv_REPLACE_INET_NTOA,[
|
|
||||||
AC_TRY_RUN([
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <unistd.h>
|
|
||||||
#include <sys/types.h>
|
|
||||||
#include <netinet/in.h>
|
|
||||||
#ifdef HAVE_ARPA_INET_H
|
|
||||||
#include <arpa/inet.h>
|
|
||||||
#endif
|
|
||||||
main() { struct in_addr ip; ip.s_addr = 0x12345678;
|
|
||||||
if (strcmp(inet_ntoa(ip),"18.52.86.120") &&
|
|
||||||
strcmp(inet_ntoa(ip),"120.86.52.18")) { exit(0); }
|
|
||||||
exit(1);}],
|
|
||||||
libreplace_cv_REPLACE_INET_NTOA=yes,libreplace_cv_REPLACE_INET_NTOA=no,libreplace_cv_REPLACE_INET_NTOA=cross)])
|
|
||||||
if test x"$libreplace_cv_REPLACE_INET_NTOA" = x"yes"; then
|
|
||||||
AC_DEFINE(REPLACE_INET_NTOA,1,[Whether inet_ntoa should be replaced])
|
|
||||||
fi
|
|
||||||
|
|
||||||
AC_HAVE_TYPE([socklen_t],[#include <sys/socket.h>])
|
AC_HAVE_TYPE([socklen_t],[#include <sys/socket.h>])
|
||||||
AC_HAVE_TYPE([sa_family_t],[#include <sys/socket.h>])
|
AC_HAVE_TYPE([sa_family_t],[#include <sys/socket.h>])
|
||||||
AC_HAVE_TYPE([struct addrinfo], [#include <netdb.h>])
|
AC_HAVE_TYPE([struct addrinfo], [#include <netdb.h>])
|
||||||
@@ -176,7 +158,7 @@ fi
|
|||||||
AC_CHECK_FUNCS(seteuid setresuid setegid setresgid chroot bzero strerror)
|
AC_CHECK_FUNCS(seteuid setresuid setegid setresgid chroot bzero strerror)
|
||||||
AC_CHECK_FUNCS(vsyslog setlinebuf mktime ftruncate chsize rename)
|
AC_CHECK_FUNCS(vsyslog setlinebuf mktime ftruncate chsize rename)
|
||||||
AC_CHECK_FUNCS(waitpid strlcpy strlcat initgroups memmove strdup)
|
AC_CHECK_FUNCS(waitpid strlcpy strlcat initgroups memmove strdup)
|
||||||
AC_CHECK_FUNCS(pread pwrite strndup strcasestr strtok_r mkdtemp socketpair)
|
AC_CHECK_FUNCS(pread pwrite strndup strcasestr strtok_r mkdtemp)
|
||||||
AC_CHECK_FUNCS(isatty)
|
AC_CHECK_FUNCS(isatty)
|
||||||
AC_HAVE_DECL(setresuid, [#include <unistd.h>])
|
AC_HAVE_DECL(setresuid, [#include <unistd.h>])
|
||||||
AC_HAVE_DECL(setresgid, [#include <unistd.h>])
|
AC_HAVE_DECL(setresgid, [#include <unistd.h>])
|
||||||
@@ -348,9 +330,11 @@ m4_include(socket.m4)
|
|||||||
m4_include(inet_ntop.m4)
|
m4_include(inet_ntop.m4)
|
||||||
m4_include(inet_pton.m4)
|
m4_include(inet_pton.m4)
|
||||||
m4_include(inet_aton.m4)
|
m4_include(inet_aton.m4)
|
||||||
|
m4_include(inet_ntoa.m4)
|
||||||
m4_include(getaddrinfo.m4)
|
m4_include(getaddrinfo.m4)
|
||||||
m4_include(repdir.m4)
|
m4_include(repdir.m4)
|
||||||
m4_include(getifaddrs.m4)
|
m4_include(getifaddrs.m4)
|
||||||
|
m4_include(socketpair.m4)
|
||||||
|
|
||||||
AC_CHECK_FUNCS([syslog printf memset memcpy],,[AC_MSG_ERROR([Required function not found])])
|
AC_CHECK_FUNCS([syslog printf memset memcpy],,[AC_MSG_ERROR([Required function not found])])
|
||||||
|
|
||||||
|
|||||||
@@ -27,7 +27,6 @@
|
|||||||
#include "system/time.h"
|
#include "system/time.h"
|
||||||
#include "system/passwd.h"
|
#include "system/passwd.h"
|
||||||
#include "system/syslog.h"
|
#include "system/syslog.h"
|
||||||
#include "system/network.h"
|
|
||||||
#include "system/locale.h"
|
#include "system/locale.h"
|
||||||
#include "system/wait.h"
|
#include "system/wait.h"
|
||||||
|
|
||||||
@@ -295,20 +294,6 @@ char *rep_strdup(const char *s)
|
|||||||
}
|
}
|
||||||
#endif /* HAVE_STRDUP */
|
#endif /* HAVE_STRDUP */
|
||||||
|
|
||||||
#ifndef WITH_PTHREADS
|
|
||||||
/* REWRITE: not thread safe */
|
|
||||||
#ifdef REPLACE_INET_NTOA
|
|
||||||
char *rep_inet_ntoa(struct in_addr ip)
|
|
||||||
{
|
|
||||||
uint8_t *p = (uint8_t *)&ip.s_addr;
|
|
||||||
static char buf[18];
|
|
||||||
slprintf(buf, 17, "%d.%d.%d.%d",
|
|
||||||
(int)p[0], (int)p[1], (int)p[2], (int)p[3]);
|
|
||||||
return buf;
|
|
||||||
}
|
|
||||||
#endif /* REPLACE_INET_NTOA */
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef HAVE_SETLINEBUF
|
#ifndef HAVE_SETLINEBUF
|
||||||
void rep_setlinebuf(FILE *stream)
|
void rep_setlinebuf(FILE *stream)
|
||||||
{
|
{
|
||||||
@@ -599,25 +584,3 @@ int rep_unsetenv(const char *name)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef HAVE_SOCKETPAIR
|
|
||||||
int rep_socketpair(int d, int type, int protocol, int sv[2])
|
|
||||||
{
|
|
||||||
if (d != AF_UNIX) {
|
|
||||||
errno = EAFNOSUPPORT;
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (protocol != 0) {
|
|
||||||
errno = EPROTONOSUPPORT;
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (type != SOCK_STREAM) {
|
|
||||||
errno = EOPNOTSUPP;
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
return pipe(sv);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|||||||
@@ -212,7 +212,7 @@ int rep_dlclose(void *handle);
|
|||||||
|
|
||||||
#ifndef HAVE_SOCKETPAIR
|
#ifndef HAVE_SOCKETPAIR
|
||||||
#define socketpair rep_socketpair
|
#define socketpair rep_socketpair
|
||||||
int rep_socketpair(int d, int type, int protocol, int sv[2]);
|
/* prototype is in system/network.h */
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef PRINTF_ATTRIBUTE
|
#ifndef PRINTF_ATTRIBUTE
|
||||||
@@ -325,7 +325,7 @@ ssize_t rep_pread(int __fd, void *__buf, size_t __nbytes, off_t __offset);
|
|||||||
ssize_t rep_pwrite(int __fd, const void *__buf, size_t __nbytes, off_t __offset);
|
ssize_t rep_pwrite(int __fd, const void *__buf, size_t __nbytes, off_t __offset);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef REPLACE_INET_NTOA
|
#if !defined(HAVE_INET_NTOA) || defined(REPLACE_INET_NTOA)
|
||||||
#define inet_ntoa rep_inet_ntoa
|
#define inet_ntoa rep_inet_ntoa
|
||||||
/* prototype is in "system/network.h" */
|
/* prototype is in "system/network.h" */
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -3,6 +3,9 @@ AC_LIBREPLACE_BROKEN_CHECKS
|
|||||||
SMB_EXT_LIB(LIBREPLACE_EXT, [${LIBDL}])
|
SMB_EXT_LIB(LIBREPLACE_EXT, [${LIBDL}])
|
||||||
SMB_ENABLE(LIBREPLACE_EXT)
|
SMB_ENABLE(LIBREPLACE_EXT)
|
||||||
|
|
||||||
|
SMB_EXT_LIB(LIBREPLACE_NETWORK, [${LIBREPLACE_NETWORK_LIBS}])
|
||||||
|
SMB_ENABLE(LIBREPLACE_NETWORK)
|
||||||
|
|
||||||
# remove leading ./
|
# remove leading ./
|
||||||
LIBREPLACE_DIR=`echo ${libreplacedir} |sed -e 's/^\.\///g'`
|
LIBREPLACE_DIR=`echo ${libreplacedir} |sed -e 's/^\.\///g'`
|
||||||
|
|
||||||
|
|||||||
@@ -1264,7 +1264,7 @@ static int add_cnk_list_entry(struct pr_chunk_x **list,
|
|||||||
VA_COPY(ap2, ap);
|
VA_COPY(ap2, ap);
|
||||||
ret = vsnprintf(NULL, 0, format, ap2);
|
ret = vsnprintf(NULL, 0, format, ap2);
|
||||||
va_end(ap2);
|
va_end(ap2);
|
||||||
if (ret <= 0) return ret;
|
if (ret < 0) return ret;
|
||||||
|
|
||||||
(*ptr) = (char *)malloc(ret+1);
|
(*ptr) = (char *)malloc(ret+1);
|
||||||
if (!*ptr) return -1;
|
if (!*ptr) return -1;
|
||||||
|
|||||||
@@ -7,10 +7,10 @@ dnl only looks in /etc/hosts), so we only look for -lsocket if we need
|
|||||||
dnl it.
|
dnl it.
|
||||||
AC_CHECK_FUNCS(connect)
|
AC_CHECK_FUNCS(connect)
|
||||||
if test x"$ac_cv_func_connect" = x"no"; then
|
if test x"$ac_cv_func_connect" = x"no"; then
|
||||||
AC_CHECK_LIB_EXT(nsl_s, SOCKET_LIBS, connect)
|
AC_CHECK_LIB_EXT(nsl_s, LIBREPLACE_NETWORK_LIBS, connect)
|
||||||
AC_CHECK_LIB_EXT(nsl, SOCKET_LIBS, connect)
|
AC_CHECK_LIB_EXT(nsl, LIBREPLACE_NETWORK_LIBS, connect)
|
||||||
AC_CHECK_LIB_EXT(socket, SOCKET_LIBS, connect)
|
AC_CHECK_LIB_EXT(socket, LIBREPLACE_NETWORK_LIBS, connect)
|
||||||
AC_CHECK_LIB_EXT(inet, SOCKET_LIBS, connect)
|
AC_CHECK_LIB_EXT(inet, LIBREPLACE_NETWORK_LIBS, connect)
|
||||||
dnl We can't just call AC_CHECK_FUNCS(connect) here,
|
dnl We can't just call AC_CHECK_FUNCS(connect) here,
|
||||||
dnl because the value has been cached.
|
dnl because the value has been cached.
|
||||||
if test x"$ac_cv_lib_ext_nsl_s_connect" = x"yes" ||
|
if test x"$ac_cv_lib_ext_nsl_s_connect" = x"yes" ||
|
||||||
@@ -24,9 +24,9 @@ fi
|
|||||||
|
|
||||||
AC_CHECK_FUNCS(gethostbyname)
|
AC_CHECK_FUNCS(gethostbyname)
|
||||||
if test x"$ac_cv_func_gethostbyname" = x"no"; then
|
if test x"$ac_cv_func_gethostbyname" = x"no"; then
|
||||||
AC_CHECK_LIB_EXT(nsl_s, NSL_LIBS, gethostbyname)
|
AC_CHECK_LIB_EXT(nsl_s, LIBREPLACE_NETWORK_LIBS, gethostbyname)
|
||||||
AC_CHECK_LIB_EXT(nsl, NSL_LIBS, gethostbyname)
|
AC_CHECK_LIB_EXT(nsl, LIBREPLACE_NETWORK_LIBS, gethostbyname)
|
||||||
AC_CHECK_LIB_EXT(socket, NSL_LIBS, gethostbyname)
|
AC_CHECK_LIB_EXT(socket, LIBREPLACE_NETWORK_LIBS, gethostbyname)
|
||||||
dnl We can't just call AC_CHECK_FUNCS(gethostbyname) here,
|
dnl We can't just call AC_CHECK_FUNCS(gethostbyname) here,
|
||||||
dnl because the value has been cached.
|
dnl because the value has been cached.
|
||||||
if test x"$ac_cv_lib_ext_nsl_s_gethostbyname" = x"yes" ||
|
if test x"$ac_cv_lib_ext_nsl_s_gethostbyname" = x"yes" ||
|
||||||
@@ -37,4 +37,3 @@ if test x"$ac_cv_func_gethostbyname" = x"no"; then
|
|||||||
[Whether the system has gethostbyname()])
|
[Whether the system has gethostbyname()])
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|||||||
46
source/lib/replace/socketpair.c
Normal file
46
source/lib/replace/socketpair.c
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
/*
|
||||||
|
* Unix SMB/CIFS implementation.
|
||||||
|
* replacement routines for broken systems
|
||||||
|
* Copyright (C) Jelmer Vernooij <jelmer@samba.org> 2006
|
||||||
|
* Copyright (C) Michael Adam <obnox@samba.org> 2008
|
||||||
|
*
|
||||||
|
* ** NOTE! The following LGPL license applies to the replace
|
||||||
|
* ** library. This does NOT imply that all of Samba is released
|
||||||
|
* ** under the LGPL
|
||||||
|
*
|
||||||
|
* This library is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU Lesser General Public
|
||||||
|
* License as published by the Free Software Foundation; either
|
||||||
|
* version 3 of the License, or (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This library is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
* Lesser General Public License for more details.
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU Lesser General Public
|
||||||
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "replace.h"
|
||||||
|
#include "system/network.h"
|
||||||
|
|
||||||
|
int rep_socketpair(int d, int type, int protocol, int sv[2])
|
||||||
|
{
|
||||||
|
if (d != AF_UNIX) {
|
||||||
|
errno = EAFNOSUPPORT;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (protocol != 0) {
|
||||||
|
errno = EPROTONOSUPPORT;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (type != SOCK_STREAM) {
|
||||||
|
errno = EOPNOTSUPP;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
return pipe(sv);
|
||||||
|
}
|
||||||
1
source/lib/replace/socketpair.m4
Normal file
1
source/lib/replace/socketpair.m4
Normal file
@@ -0,0 +1 @@
|
|||||||
|
AC_CHECK_FUNCS(socketpair,[],[LIBREPLACEOBJ="${LIBREPLACEOBJ} socketpair.o"])
|
||||||
@@ -88,7 +88,7 @@
|
|||||||
typedef int socklen_t;
|
typedef int socklen_t;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef REPLACE_INET_NTOA
|
#if !defined (HAVE_INET_NTOA) || defined(REPLACE_INET_NTOA)
|
||||||
/* define is in "replace.h" */
|
/* define is in "replace.h" */
|
||||||
char *rep_inet_ntoa(struct in_addr ip);
|
char *rep_inet_ntoa(struct in_addr ip);
|
||||||
#endif
|
#endif
|
||||||
@@ -143,6 +143,11 @@ int rep_getifaddrs(struct ifaddrs **);
|
|||||||
void rep_freeifaddrs(struct ifaddrs *);
|
void rep_freeifaddrs(struct ifaddrs *);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifndef HAVE_SOCKETPAIR
|
||||||
|
/* define is in "replace.h" */
|
||||||
|
int rep_socketpair(int d, int type, int protocol, int sv[2]);
|
||||||
|
#endif
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Some systems have getaddrinfo but not the
|
* Some systems have getaddrinfo but not the
|
||||||
* defines needed to use it.
|
* defines needed to use it.
|
||||||
@@ -310,7 +315,7 @@ struct addrinfo {
|
|||||||
|
|
||||||
/* Needed for some systems that don't define it (Solaris). */
|
/* Needed for some systems that don't define it (Solaris). */
|
||||||
#ifndef ifr_netmask
|
#ifndef ifr_netmask
|
||||||
#define ifr_netmask ifr_addrs
|
#define ifr_netmask ifr_addr
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef SOCKET_WRAPPER
|
#ifdef SOCKET_WRAPPER
|
||||||
|
|||||||
@@ -11,50 +11,6 @@ if test x"$samba_cv_HAVE_SOCK_SIN_LEN" = x"yes"; then
|
|||||||
AC_DEFINE(HAVE_SOCK_SIN_LEN,1,[Whether the sockaddr_in struct has a sin_len property])
|
AC_DEFINE(HAVE_SOCK_SIN_LEN,1,[Whether the sockaddr_in struct has a sin_len property])
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# The following test taken from the cvs sources
|
|
||||||
# If we can't find connect, try looking in -lsocket, -lnsl, and -linet.
|
|
||||||
# The Irix 5 libc.so has connect and gethostbyname, but Irix 5 also has
|
|
||||||
# libsocket.so which has a bad implementation of gethostbyname (it
|
|
||||||
# only looks in /etc/hosts), so we only look for -lsocket if we need
|
|
||||||
# it.
|
|
||||||
AC_CHECK_FUNCS(connect)
|
|
||||||
if test x"$ac_cv_func_connect" = x"no"; then
|
|
||||||
AC_CHECK_LIB_EXT(nsl_s, SOCKET_LIBS, connect)
|
|
||||||
AC_CHECK_LIB_EXT(nsl, SOCKET_LIBS, connect)
|
|
||||||
AC_CHECK_LIB_EXT(socket, SOCKET_LIBS, connect)
|
|
||||||
AC_CHECK_LIB_EXT(inet, SOCKET_LIBS, connect)
|
|
||||||
SMB_ENABLE(EXT_SOCKET,YES)
|
|
||||||
dnl We can't just call AC_CHECK_FUNCS(connect) here, because the value
|
|
||||||
dnl has been cached.
|
|
||||||
if test x"$ac_cv_lib_ext_nsl_s_connect" = x"yes" ||
|
|
||||||
test x"$ac_cv_lib_ext_nsl_connect" = x"yes" ||
|
|
||||||
test x"$ac_cv_lib_ext_socket_connect" = x"yes" ||
|
|
||||||
test x"$ac_cv_lib_ext_inet_connect" = x"yes"; then
|
|
||||||
AC_DEFINE(HAVE_CONNECT,1,[Whether the system has connect()])
|
|
||||||
else
|
|
||||||
AC_MSG_ERROR([no connect() function available!])
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
|
|
||||||
SMB_EXT_LIB(EXT_SOCKET,[${SOCKET_LIBS}],[${SOCKET_CFLAGS}],[${SOCKET_CPPFLAGS}],[${SOCKET_LDFLAGS}])
|
|
||||||
|
|
||||||
AC_CHECK_FUNCS(gethostbyname)
|
|
||||||
if test x"$ac_cv_func_gethostbyname" = x"no"; then
|
|
||||||
AC_CHECK_LIB_EXT(nsl_s, NSL_LIBS, gethostbyname)
|
|
||||||
AC_CHECK_LIB_EXT(nsl, NSL_LIBS, gethostbyname)
|
|
||||||
AC_CHECK_LIB_EXT(socket, NSL_LIBS, gethostbyname)
|
|
||||||
SMB_ENABLE(EXT_NSL,YES)
|
|
||||||
dnl We can't just call AC_CHECK_FUNCS(gethostbyname) here, because the value
|
|
||||||
dnl has been cached.
|
|
||||||
if test x"$ac_cv_lib_ext_nsl_s_gethostbyname" != x"yes" &&
|
|
||||||
test x"$ac_cv_lib_ext_nsl_gethostbyname" != x"yes" &&
|
|
||||||
test x"$ac_cv_lib_ext_socket_gethostbyname" != x"yes"; then
|
|
||||||
AC_MSG_ERROR([no gethostbyname() function available!])
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
|
|
||||||
SMB_EXT_LIB(EXT_NSL,[${NSL_LIBS}],[],[],[])
|
|
||||||
|
|
||||||
############################################
|
############################################
|
||||||
# check for unix domain sockets
|
# check for unix domain sockets
|
||||||
AC_CACHE_CHECK([for unix domain sockets],samba_cv_unixsocket, [
|
AC_CACHE_CHECK([for unix domain sockets],samba_cv_unixsocket, [
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ PRIVATE_PROTO_HEADER = netif_proto.h
|
|||||||
OBJ_FILES = \
|
OBJ_FILES = \
|
||||||
interface.o \
|
interface.o \
|
||||||
netif.o
|
netif.o
|
||||||
PRIVATE_DEPENDENCIES = LIBSAMBA-UTIL EXT_SOCKET EXT_NSL
|
PRIVATE_DEPENDENCIES = LIBSAMBA-UTIL LIBREPLACE_NETWORK
|
||||||
# End SUBSYSTEM LIBNETIF
|
# End SUBSYSTEM LIBNETIF
|
||||||
##############################
|
##############################
|
||||||
|
|
||||||
@@ -16,7 +16,7 @@ SUBSYSTEM = samba-socket
|
|||||||
OUTPUT_TYPE = MERGED_OBJ
|
OUTPUT_TYPE = MERGED_OBJ
|
||||||
OBJ_FILES = \
|
OBJ_FILES = \
|
||||||
socket_ip.o
|
socket_ip.o
|
||||||
PRIVATE_DEPENDENCIES = EXT_SOCKET EXT_NSL LIBSAMBA-ERRORS
|
PRIVATE_DEPENDENCIES = LIBSAMBA-ERRORS LIBREPLACE_NETWORK
|
||||||
# End MODULE socket_ip
|
# End MODULE socket_ip
|
||||||
################################################
|
################################################
|
||||||
|
|
||||||
@@ -27,7 +27,7 @@ SUBSYSTEM = samba-socket
|
|||||||
OUTPUT_TYPE = MERGED_OBJ
|
OUTPUT_TYPE = MERGED_OBJ
|
||||||
OBJ_FILES = \
|
OBJ_FILES = \
|
||||||
socket_unix.o
|
socket_unix.o
|
||||||
PRIVATE_DEPENDENCIES = EXT_SOCKET EXT_NSL
|
PRIVATE_DEPENDENCIES = LIBREPLACE_NETWORK
|
||||||
# End MODULE socket_unix
|
# End MODULE socket_unix
|
||||||
################################################
|
################################################
|
||||||
|
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
# Start SUBSYSTEM SOCKET_WRAPPER
|
# Start SUBSYSTEM SOCKET_WRAPPER
|
||||||
[SUBSYSTEM::SOCKET_WRAPPER]
|
[SUBSYSTEM::SOCKET_WRAPPER]
|
||||||
OBJ_FILES = socket_wrapper.o
|
OBJ_FILES = socket_wrapper.o
|
||||||
PRIVATE_DEPENDENCIES = EXT_SOCKET
|
PRIVATE_DEPENDENCIES = LIBREPLACE_NETWORK
|
||||||
# End SUBSYSTEM SOCKET_WRAPPER
|
# End SUBSYSTEM SOCKET_WRAPPER
|
||||||
##############################
|
##############################
|
||||||
|
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ OBJ_FILES = xfile.o \
|
|||||||
become_daemon.o
|
become_daemon.o
|
||||||
PUBLIC_DEPENDENCIES = \
|
PUBLIC_DEPENDENCIES = \
|
||||||
LIBTALLOC LIBCRYPTO \
|
LIBTALLOC LIBCRYPTO \
|
||||||
SOCKET_WRAPPER EXT_NSL \
|
SOCKET_WRAPPER LIBREPLACE_NETWORK \
|
||||||
CHARSET EXECINFO
|
CHARSET EXECINFO
|
||||||
|
|
||||||
PUBLIC_HEADERS += $(addprefix lib/util/, util.h \
|
PUBLIC_HEADERS += $(addprefix lib/util/, util.h \
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ OBJ_FILES = \
|
|||||||
ndr/ndr_basic.o \
|
ndr/ndr_basic.o \
|
||||||
ndr/ndr_string.o \
|
ndr/ndr_string.o \
|
||||||
ndr/uuid.o
|
ndr/uuid.o
|
||||||
PUBLIC_DEPENDENCIES = LIBSAMBA-ERRORS LIBTALLOC LIBSAMBA-UTIL CHARSET EXT_NSL \
|
PUBLIC_DEPENDENCIES = LIBSAMBA-ERRORS LIBTALLOC LIBSAMBA-UTIL CHARSET \
|
||||||
LIBSAMBA-CONFIG
|
LIBSAMBA-CONFIG
|
||||||
# End SUBSYSTEM LIBNDR
|
# End SUBSYSTEM LIBNDR
|
||||||
################################################
|
################################################
|
||||||
|
|||||||
@@ -4,4 +4,6 @@ ENV="$1"
|
|||||||
|
|
||||||
shift 1
|
shift 1
|
||||||
|
|
||||||
$ENV valgrind -q --db-attach=yes --num-callers=30 $@
|
CMD="$ENV valgrind -q --db-attach=yes --num-callers=30 $@"
|
||||||
|
echo $CMD
|
||||||
|
eval $CMD
|
||||||
|
|||||||
@@ -15,34 +15,7 @@ sub parse_results($$$$$)
|
|||||||
my $unexpected_err = 0;
|
my $unexpected_err = 0;
|
||||||
my $orig_open_len = $#$open_tests;
|
my $orig_open_len = $#$open_tests;
|
||||||
|
|
||||||
while(1) {
|
while(<$fh>) {
|
||||||
my $line = "";
|
|
||||||
my $char = "";
|
|
||||||
my $eof = 0;
|
|
||||||
my $error = 0;
|
|
||||||
|
|
||||||
while ($char ne "\n") {
|
|
||||||
my $ret = sysread($fh, $char, 1);
|
|
||||||
if (not defined($ret)) {
|
|
||||||
$error = $!;
|
|
||||||
last;
|
|
||||||
}
|
|
||||||
if ($ret == 0) {
|
|
||||||
$eof = 1;
|
|
||||||
last;
|
|
||||||
}
|
|
||||||
|
|
||||||
$line .= $char;
|
|
||||||
if ($char eq "\r") {
|
|
||||||
$msg_ops->output_msg($line);
|
|
||||||
$line = "";
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
last if ($eof or $error);
|
|
||||||
|
|
||||||
$_ = $line;
|
|
||||||
|
|
||||||
if (/^test: (.+)\n/) {
|
if (/^test: (.+)\n/) {
|
||||||
$msg_ops->control_msg($_);
|
$msg_ops->control_msg($_);
|
||||||
$msg_ops->start_test($open_tests, $1);
|
$msg_ops->start_test($open_tests, $1);
|
||||||
|
|||||||
@@ -2539,7 +2539,7 @@ static bool test_raw_oplock_batch22(struct torture_context *tctx, struct smbcli_
|
|||||||
int te;
|
int te;
|
||||||
|
|
||||||
if (torture_setting_bool(tctx, "samba3", false)) {
|
if (torture_setting_bool(tctx, "samba3", false)) {
|
||||||
torture_skip(tctx, "BACHT22 disabled against samba3\n");
|
torture_skip(tctx, "BATCH22 disabled against samba3\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!torture_setup_dir(cli1, BASEDIR)) {
|
if (!torture_setup_dir(cli1, BASEDIR)) {
|
||||||
@@ -2629,7 +2629,7 @@ static bool test_raw_oplock_batch23(struct torture_context *tctx, struct smbcli_
|
|||||||
struct smbcli_state *cli3 = NULL;
|
struct smbcli_state *cli3 = NULL;
|
||||||
|
|
||||||
if (torture_setting_bool(tctx, "samba3", false)) {
|
if (torture_setting_bool(tctx, "samba3", false)) {
|
||||||
torture_skip(tctx, "BACHT23 disabled against samba3\n");
|
torture_skip(tctx, "BATCH23 disabled against samba3\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!torture_setup_dir(cli1, BASEDIR)) {
|
if (!torture_setup_dir(cli1, BASEDIR)) {
|
||||||
|
|||||||
@@ -16,6 +16,8 @@ OBJ_FILES = \
|
|||||||
wb_dom_info_trusted.o \
|
wb_dom_info_trusted.o \
|
||||||
wb_sid2domain.o \
|
wb_sid2domain.o \
|
||||||
wb_name2domain.o \
|
wb_name2domain.o \
|
||||||
|
wb_sids2xids.o \
|
||||||
|
wb_xids2sids.o \
|
||||||
wb_gid2sid.o \
|
wb_gid2sid.o \
|
||||||
wb_sid2uid.o \
|
wb_sid2uid.o \
|
||||||
wb_sid2gid.o \
|
wb_sid2gid.o \
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
/*
|
/*
|
||||||
Unix SMB/CIFS implementation.
|
Unix SMB/CIFS implementation.
|
||||||
|
|
||||||
Map SIDs to uids/gids and back
|
Map SIDs to unixids and back
|
||||||
|
|
||||||
Copyright (C) Kai Blin 2008
|
Copyright (C) Kai Blin 2008
|
||||||
|
|
||||||
@@ -177,39 +177,46 @@ struct idmap_context *idmap_init(TALLOC_CTX *mem_ctx,
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
idmap_ctx->unix_groups_sid = dom_sid_parse_talloc(mem_ctx, "S-1-22-2");
|
||||||
|
if (idmap_ctx->unix_groups_sid == NULL) {
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
idmap_ctx->unix_users_sid = dom_sid_parse_talloc(mem_ctx, "S-1-22-1");
|
||||||
|
if (idmap_ctx->unix_users_sid == NULL) {
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
return idmap_ctx;
|
return idmap_ctx;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Convert a uid to the corresponding SID
|
* Convert an unixid to the corresponding SID
|
||||||
*
|
*
|
||||||
* \param idmap_ctx idmap context to use
|
* \param idmap_ctx idmap context to use
|
||||||
* \param mem_ctx talloc context the memory for the struct dom_sid is allocated
|
* \param mem_ctx talloc context the memory for the struct dom_sid is allocated
|
||||||
* from.
|
* from.
|
||||||
* \param uid Unix uid to map to a SID
|
* \param unixid pointer to a unixid struct to convert
|
||||||
* \param sid Pointer that will take the struct dom_sid pointer if the mapping
|
* \param sid pointer that will take the struct dom_sid pointer if the mapping
|
||||||
* succeeds.
|
* succeeds.
|
||||||
* \return NT_STATUS_OK on success, NT_STATUS_NONE_MAPPED if mapping not
|
* \return NT_STATUS_OK on success, NT_STATUS_NONE_MAPPED if mapping not
|
||||||
* possible or some other NTSTATUS that is more descriptive on failure.
|
* possible or some other NTSTATUS that is more descriptive on failure.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
NTSTATUS idmap_uid_to_sid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
NTSTATUS idmap_xid_to_sid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
||||||
const uid_t uid, struct dom_sid **sid)
|
const struct unixid *unixid, struct dom_sid **sid)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
NTSTATUS status = NT_STATUS_NONE_MAPPED;
|
NTSTATUS status = NT_STATUS_NONE_MAPPED;
|
||||||
struct ldb_context *ldb = idmap_ctx->ldb_ctx;
|
struct ldb_context *ldb = idmap_ctx->ldb_ctx;
|
||||||
struct ldb_message *msg;
|
|
||||||
struct ldb_result *res = NULL;
|
struct ldb_result *res = NULL;
|
||||||
int trans = -1;
|
uint32_t low, high;
|
||||||
uid_t low, high;
|
struct dom_sid *unix_sid, *new_sid;
|
||||||
char *sid_string, *uid_string;
|
|
||||||
struct dom_sid *unix_users_sid, *new_sid;
|
|
||||||
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
|
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
|
||||||
|
|
||||||
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
||||||
NULL, "(&(objectClass=sidMap)(uidNumber=%u))",
|
NULL, "(&(objectClass=sidMap)(xidNumber=%u))",
|
||||||
uid);
|
unixid->id);
|
||||||
if (ret != LDB_SUCCESS) {
|
if (ret != LDB_SUCCESS) {
|
||||||
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
@@ -228,19 +235,13 @@ NTSTATUS idmap_uid_to_sid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
return NT_STATUS_OK;
|
return NT_STATUS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
DEBUG(6, ("uid not found in idmap db, trying to allocate SID.\n"));
|
DEBUG(6, ("xid not found in idmap db, trying to allocate SID.\n"));
|
||||||
|
|
||||||
trans = ldb_transaction_start(ldb);
|
|
||||||
if (trans != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Now redo the search to make sure noone added a mapping for that SID
|
/* Now redo the search to make sure noone added a mapping for that SID
|
||||||
* while we weren't looking.*/
|
* while we weren't looking.*/
|
||||||
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
||||||
NULL, "(&(objectClass=sidMap)(uidNumber=%u))",
|
NULL, "(&(objectClass=sidMap)(xidNumber=%u))",
|
||||||
uid);
|
unixid->id);
|
||||||
if (ret != LDB_SUCCESS) {
|
if (ret != LDB_SUCCESS) {
|
||||||
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
@@ -260,285 +261,58 @@ NTSTATUS idmap_uid_to_sid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (uid >= low && uid <= high) {
|
if (unixid->id >= low && unixid->id <= high) {
|
||||||
/* An existing user would have been mapped before */
|
/* An existing xid would have been mapped before */
|
||||||
status = NT_STATUS_NO_SUCH_USER;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* For local users, we just create a rid = uid +1, so root doesn't end
|
/* For local users, we just create a rid = uid +1, so root doesn't end
|
||||||
* up with a 0 rid */
|
* up with a 0 rid */
|
||||||
unix_users_sid = dom_sid_parse_talloc(tmp_ctx, "S-1-22-1");
|
if (unixid->type == ID_TYPE_UID) {
|
||||||
if (unix_users_sid == NULL) {
|
unix_sid = dom_sid_parse_talloc(tmp_ctx, "S-1-22-1");
|
||||||
|
} else {
|
||||||
|
unix_sid = dom_sid_parse_talloc(tmp_ctx, "S-1-22-2");
|
||||||
|
}
|
||||||
|
if (unix_sid == NULL) {
|
||||||
status = NT_STATUS_NO_MEMORY;
|
status = NT_STATUS_NO_MEMORY;
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
new_sid = dom_sid_add_rid(mem_ctx, unix_users_sid, uid + 1);
|
new_sid = dom_sid_add_rid(mem_ctx, unix_sid, unixid->id + 1);
|
||||||
if (new_sid == NULL) {
|
if (new_sid == NULL) {
|
||||||
status = NT_STATUS_NO_MEMORY;
|
status = NT_STATUS_NO_MEMORY;
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
sid_string = dom_sid_string(tmp_ctx, new_sid);
|
|
||||||
if (sid_string == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
uid_string = talloc_asprintf(tmp_ctx, "%u", uid);
|
|
||||||
if (uid_string == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
msg = ldb_msg_new(tmp_ctx);
|
|
||||||
if (msg == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
msg->dn = ldb_dn_new_fmt(tmp_ctx, ldb, "CN=%s", sid_string);
|
|
||||||
if (msg->dn == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(msg, "uidNumber", uid_string);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = idmap_msg_add_dom_sid(idmap_ctx, tmp_ctx, msg, "objectSid",
|
|
||||||
new_sid);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(msg, "objectClass", "sidMap");
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(msg, "cn", sid_string);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_add(ldb, msg);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
trans = ldb_transaction_commit(ldb);
|
|
||||||
if (trans != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
*sid = new_sid;
|
*sid = new_sid;
|
||||||
talloc_free(tmp_ctx);
|
talloc_free(tmp_ctx);
|
||||||
return NT_STATUS_OK;
|
return NT_STATUS_OK;
|
||||||
|
|
||||||
failed:
|
failed:
|
||||||
if (trans == LDB_SUCCESS) ldb_transaction_cancel(ldb);
|
|
||||||
talloc_free(tmp_ctx);
|
talloc_free(tmp_ctx);
|
||||||
return status;
|
return status;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Map a Unix gid to the corresponding SID
|
|
||||||
*
|
|
||||||
* \param idmap_ctx idmap context to use
|
|
||||||
* \param mem_ctx talloc context the memory for the struct dom_sid is allocated
|
|
||||||
* from.
|
|
||||||
* \param gid Unix gid to map to a SID
|
|
||||||
* \param sid Pointer that will take the struct dom_sid pointer if mapping
|
|
||||||
* succeeds.
|
|
||||||
* \return NT_STATUS_OK on success, NT_STATUS_NONE_MAPPED if mapping not
|
|
||||||
* possible or some other NTSTATUS that is more descriptive on failure.
|
|
||||||
*/
|
|
||||||
NTSTATUS idmap_gid_to_sid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|
||||||
const gid_t gid, struct dom_sid **sid)
|
|
||||||
{
|
|
||||||
int ret;
|
|
||||||
NTSTATUS status = NT_STATUS_NONE_MAPPED;
|
|
||||||
struct ldb_context *ldb = idmap_ctx->ldb_ctx;
|
|
||||||
struct ldb_message *msg;
|
|
||||||
struct ldb_result *res = NULL;
|
|
||||||
int trans = -1;
|
|
||||||
gid_t low, high;
|
|
||||||
char *sid_string, *gid_string;
|
|
||||||
struct dom_sid *unix_groups_sid, *new_sid;
|
|
||||||
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
|
|
||||||
|
|
||||||
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
|
||||||
NULL, "(&(objectClass=sidMap)(gidNumber=%u))", gid);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (res->count == 1) {
|
|
||||||
*sid = idmap_msg_get_dom_sid(mem_ctx, res->msgs[0],
|
|
||||||
"objectSid");
|
|
||||||
if (*sid == NULL) {
|
|
||||||
DEBUG(1, ("Failed to get sid from db: %u\n", ret));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
/* No change, so cancel the transaction */
|
|
||||||
ldb_transaction_cancel(ldb);
|
|
||||||
talloc_free(tmp_ctx);
|
|
||||||
return NT_STATUS_OK;
|
|
||||||
}
|
|
||||||
|
|
||||||
DEBUG(6, ("gid not found in idmap db, trying to allocate SID.\n"));
|
|
||||||
|
|
||||||
trans = ldb_transaction_start(ldb);
|
|
||||||
if (trans != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Now redo the search to make sure noone added a mapping for that SID
|
|
||||||
* while we weren't looking.*/
|
|
||||||
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
|
||||||
NULL, "(&(objectClass=sidMap)(gidNumber=%u))",
|
|
||||||
gid);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (res->count > 0) {
|
|
||||||
DEBUG(1, ("sidMap modified while trying to add a mapping.\n"));
|
|
||||||
status = NT_STATUS_RETRY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = idmap_get_bounds(idmap_ctx, &low, &high);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Failed to get id bounds from db: %u\n", ret));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (gid >= low && gid <= high) {
|
|
||||||
/* An existing group would have been mapped before */
|
|
||||||
status = NT_STATUS_NO_SUCH_USER;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* For local groups, we just create a rid = gid +1, so root doesn't end
|
|
||||||
* up with a 0 rid */
|
|
||||||
unix_groups_sid = dom_sid_parse_talloc(tmp_ctx, "S-1-22-2");
|
|
||||||
if (unix_groups_sid == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
new_sid = dom_sid_add_rid(mem_ctx, unix_groups_sid, gid + 1);
|
|
||||||
if (new_sid == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
sid_string = dom_sid_string(tmp_ctx, new_sid);
|
|
||||||
if (sid_string == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
gid_string = talloc_asprintf(tmp_ctx, "%u", gid);
|
|
||||||
if (gid_string == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
msg = ldb_msg_new(tmp_ctx);
|
|
||||||
if (msg == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
msg->dn = ldb_dn_new_fmt(tmp_ctx, ldb, "CN=%s", sid_string);
|
|
||||||
if (msg->dn == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(msg, "gidNumber", gid_string);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = idmap_msg_add_dom_sid(idmap_ctx, tmp_ctx, msg, "objectSid",
|
|
||||||
new_sid);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(msg, "objectClass", "sidMap");
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(msg, "cn", sid_string);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_add(ldb, msg);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
trans = ldb_transaction_commit(ldb);
|
|
||||||
if (trans != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
*sid = new_sid;
|
|
||||||
talloc_free(tmp_ctx);
|
|
||||||
return NT_STATUS_OK;
|
|
||||||
|
|
||||||
failed:
|
|
||||||
if (trans == LDB_SUCCESS) ldb_transaction_cancel(ldb);
|
|
||||||
talloc_free(tmp_ctx);
|
|
||||||
return status;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Map a SID to a Unix uid.
|
* Map a SID to an unixid struct.
|
||||||
*
|
*
|
||||||
* If no mapping exists, a new mapping will be created.
|
* If no mapping exists, a new mapping will be created.
|
||||||
*
|
*
|
||||||
* \todo Check if SIDs can be resolved if lp_idmap_trusted_only() == true
|
* \todo Check if SIDs can be resolved if lp_idmap_trusted_only() == true
|
||||||
|
* \todo Fix backwards compatibility for Samba3
|
||||||
*
|
*
|
||||||
* \param idmap_ctx idmap context to use
|
* \param idmap_ctx idmap context to use
|
||||||
* \param mem_ctx talloc context to use
|
* \param mem_ctx talloc context to use
|
||||||
* \param sid SID to map to a Unix uid
|
* \param sid SID to map to an unixid struct
|
||||||
* \param uid pointer to receive the mapped uid
|
* \param unixid pointer to a unixid struct pointer
|
||||||
* \return NT_STATUS_OK on success, NT_STATUS_INVALID_SID if the sid is not from
|
* \return NT_STATUS_OK on success, NT_STATUS_INVALID_SID if the sid is not from
|
||||||
* a trusted domain and idmap trusted only = true, NT_STATUS_NONE_MAPPED if the
|
* a trusted domain and idmap trusted only = true, NT_STATUS_NONE_MAPPED if the
|
||||||
* mapping failed.
|
* mapping failed.
|
||||||
*/
|
*/
|
||||||
NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
NTSTATUS idmap_sid_to_xid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
||||||
const struct dom_sid *sid, uid_t *uid)
|
const struct dom_sid *sid, struct unixid **unixid)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
NTSTATUS status = NT_STATUS_NONE_MAPPED;
|
NTSTATUS status = NT_STATUS_NONE_MAPPED;
|
||||||
@@ -547,8 +321,8 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
struct ldb_message *hwm_msg, *map_msg;
|
struct ldb_message *hwm_msg, *map_msg;
|
||||||
struct ldb_result *res = NULL;
|
struct ldb_result *res = NULL;
|
||||||
int trans;
|
int trans;
|
||||||
uid_t low, high, hwm, new_uid;
|
uint32_t low, high, hwm, new_xid;
|
||||||
char *sid_string, *uid_string, *hwm_string;
|
char *sid_string, *unixid_string, *hwm_string;
|
||||||
bool hwm_entry_exists;
|
bool hwm_entry_exists;
|
||||||
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
|
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
|
||||||
|
|
||||||
@@ -562,20 +336,65 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (res->count == 1) {
|
if (res->count == 1) {
|
||||||
new_uid = ldb_msg_find_attr_as_uint(res->msgs[0], "uidNumber",
|
new_xid = ldb_msg_find_attr_as_uint(res->msgs[0], "xidNumber",
|
||||||
-1);
|
-1);
|
||||||
if (new_uid == (uid_t) -1) {
|
if (new_xid == (uint32_t) -1) {
|
||||||
DEBUG(1, ("Invalid uid mapping.\n"));
|
DEBUG(1, ("Invalid xid mapping.\n"));
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
*uid = new_uid;
|
|
||||||
|
*unixid = talloc(mem_ctx, struct unixid);
|
||||||
|
if (*unixid == NULL) {
|
||||||
|
status = NT_STATUS_NO_MEMORY;
|
||||||
|
goto failed;
|
||||||
|
}
|
||||||
|
|
||||||
|
(*unixid)->id = new_xid;
|
||||||
|
(*unixid)->type = ID_TYPE_BOTH;
|
||||||
|
|
||||||
talloc_free(tmp_ctx);
|
talloc_free(tmp_ctx);
|
||||||
return NT_STATUS_OK;
|
return NT_STATUS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
DEBUG(6, ("No existing mapping found, attempting to create one.\n"));
|
DEBUG(6, ("No existing mapping found, attempting to create one.\n"));
|
||||||
|
|
||||||
|
if (dom_sid_in_domain(idmap_ctx->unix_users_sid, sid)) {
|
||||||
|
uint32_t rid;
|
||||||
|
DEBUG(6, ("This is a local unix uid, just calculate that.\n"));
|
||||||
|
status = dom_sid_split_rid(tmp_ctx, sid, NULL, &rid);
|
||||||
|
if (!NT_STATUS_IS_OK(status)) goto failed;
|
||||||
|
|
||||||
|
*unixid = talloc(mem_ctx, struct unixid);
|
||||||
|
if (*unixid == NULL) {
|
||||||
|
status = NT_STATUS_NO_MEMORY;
|
||||||
|
goto failed;
|
||||||
|
}
|
||||||
|
(*unixid)->id = rid - 1;
|
||||||
|
(*unixid)->type = ID_TYPE_UID;
|
||||||
|
|
||||||
|
talloc_free(tmp_ctx);
|
||||||
|
return NT_STATUS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (dom_sid_in_domain(idmap_ctx->unix_groups_sid, sid)) {
|
||||||
|
uint32_t rid;
|
||||||
|
DEBUG(6, ("This is a local unix gid, just calculate that.\n"));
|
||||||
|
status = dom_sid_split_rid(tmp_ctx, sid, NULL, &rid);
|
||||||
|
if (!NT_STATUS_IS_OK(status)) goto failed;
|
||||||
|
|
||||||
|
*unixid = talloc(mem_ctx, struct unixid);
|
||||||
|
if (*unixid == NULL) {
|
||||||
|
status = NT_STATUS_NO_MEMORY;
|
||||||
|
goto failed;
|
||||||
|
}
|
||||||
|
(*unixid)->id = rid - 1;
|
||||||
|
(*unixid)->type = ID_TYPE_GID;
|
||||||
|
|
||||||
|
talloc_free(tmp_ctx);
|
||||||
|
return NT_STATUS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
trans = ldb_transaction_start(ldb);
|
trans = ldb_transaction_start(ldb);
|
||||||
if (trans != LDB_SUCCESS) {
|
if (trans != LDB_SUCCESS) {
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
@@ -629,8 +448,8 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
hwm = ldb_msg_find_attr_as_uint(res->msgs[0], "uidNumber", -1);
|
hwm = ldb_msg_find_attr_as_uint(res->msgs[0], "xidNumber", -1);
|
||||||
if (hwm == (uid_t)-1) {
|
if (hwm == (uint32_t)-1) {
|
||||||
hwm = low;
|
hwm = low;
|
||||||
hwm_entry_exists = false;
|
hwm_entry_exists = false;
|
||||||
} else {
|
} else {
|
||||||
@@ -638,7 +457,7 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (hwm > high) {
|
if (hwm > high) {
|
||||||
DEBUG(1, ("Out of uids to allocate.\n"));
|
DEBUG(1, ("Out of xids to allocate.\n"));
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
@@ -652,7 +471,7 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
|
|
||||||
hwm_msg->dn = dn;
|
hwm_msg->dn = dn;
|
||||||
|
|
||||||
new_uid = hwm;
|
new_xid = hwm;
|
||||||
hwm++;
|
hwm++;
|
||||||
|
|
||||||
hwm_string = talloc_asprintf(tmp_ctx, "%u", hwm);
|
hwm_string = talloc_asprintf(tmp_ctx, "%u", hwm);
|
||||||
@@ -667,8 +486,8 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
uid_string = talloc_asprintf(tmp_ctx, "%u", new_uid);
|
unixid_string = talloc_asprintf(tmp_ctx, "%u", new_xid);
|
||||||
if (uid_string == NULL) {
|
if (unixid_string == NULL) {
|
||||||
status = NT_STATUS_NO_MEMORY;
|
status = NT_STATUS_NO_MEMORY;
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
@@ -696,7 +515,7 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
els[0].num_values = 1;
|
els[0].num_values = 1;
|
||||||
els[0].values = &vals[0];
|
els[0].values = &vals[0];
|
||||||
els[0].flags = LDB_FLAG_MOD_DELETE;
|
els[0].flags = LDB_FLAG_MOD_DELETE;
|
||||||
els[0].name = talloc_strdup(tmp_ctx, "uidNumber");
|
els[0].name = talloc_strdup(tmp_ctx, "xidNumber");
|
||||||
if (els[0].name == NULL) {
|
if (els[0].name == NULL) {
|
||||||
status = NT_STATUS_NO_MEMORY;
|
status = NT_STATUS_NO_MEMORY;
|
||||||
goto failed;
|
goto failed;
|
||||||
@@ -707,19 +526,19 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
els[1].flags = LDB_FLAG_MOD_ADD;
|
els[1].flags = LDB_FLAG_MOD_ADD;
|
||||||
els[1].name = els[0].name;
|
els[1].name = els[0].name;
|
||||||
|
|
||||||
vals[0].data = (uint8_t *)uid_string;
|
vals[0].data = (uint8_t *)unixid_string;
|
||||||
vals[0].length = strlen(uid_string);
|
vals[0].length = strlen(unixid_string);
|
||||||
vals[1].data = (uint8_t *)hwm_string;
|
vals[1].data = (uint8_t *)hwm_string;
|
||||||
vals[1].length = strlen(hwm_string);
|
vals[1].length = strlen(hwm_string);
|
||||||
} else {
|
} else {
|
||||||
ret = ldb_msg_add_empty(hwm_msg, "uidNumber", LDB_FLAG_MOD_ADD,
|
ret = ldb_msg_add_empty(hwm_msg, "xidNumber", LDB_FLAG_MOD_ADD,
|
||||||
NULL);
|
NULL);
|
||||||
if (ret != LDB_SUCCESS) {
|
if (ret != LDB_SUCCESS) {
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = ldb_msg_add_string(hwm_msg, "uidNumber", hwm_string);
|
ret = ldb_msg_add_string(hwm_msg, "xidNumber", hwm_string);
|
||||||
if (ret != LDB_SUCCESS)
|
if (ret != LDB_SUCCESS)
|
||||||
{
|
{
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
@@ -729,7 +548,7 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
|
|
||||||
ret = ldb_modify(ldb, hwm_msg);
|
ret = ldb_modify(ldb, hwm_msg);
|
||||||
if (ret != LDB_SUCCESS) {
|
if (ret != LDB_SUCCESS) {
|
||||||
DEBUG(1, ("Updating the uid high water mark failed: %s\n",
|
DEBUG(1, ("Updating the xid high water mark failed: %s\n",
|
||||||
ldb_errstring(ldb)));
|
ldb_errstring(ldb)));
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
goto failed;
|
goto failed;
|
||||||
@@ -747,7 +566,7 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
ret = ldb_msg_add_string(map_msg, "uidNumber", uid_string);
|
ret = ldb_msg_add_string(map_msg, "xidNumber", unixid_string);
|
||||||
if (ret != LDB_SUCCESS) {
|
if (ret != LDB_SUCCESS) {
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
status = NT_STATUS_NONE_MAPPED;
|
||||||
goto failed;
|
goto failed;
|
||||||
@@ -786,7 +605,14 @@ NTSTATUS idmap_sid_to_uid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
*uid = new_uid;
|
*unixid = talloc(mem_ctx, struct unixid);
|
||||||
|
if (*unixid == NULL) {
|
||||||
|
status = NT_STATUS_NO_MEMORY;
|
||||||
|
goto failed;
|
||||||
|
}
|
||||||
|
|
||||||
|
(*unixid)->id = new_xid;
|
||||||
|
(*unixid)->type = ID_TYPE_BOTH;
|
||||||
talloc_free(tmp_ctx);
|
talloc_free(tmp_ctx);
|
||||||
return NT_STATUS_OK;
|
return NT_STATUS_OK;
|
||||||
|
|
||||||
@@ -797,276 +623,92 @@ failed:
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Map a SID to a Unix gid.
|
* Convert an array of unixids to the corresponding array of SIDs
|
||||||
*
|
|
||||||
* If no mapping exist, a new mapping will be created.
|
|
||||||
*
|
|
||||||
* \todo Check if SID resolve when lp_idmap_trusted_only() == true
|
|
||||||
*
|
*
|
||||||
* \param idmap_ctx idmap context to use
|
* \param idmap_ctx idmap context to use
|
||||||
* \param mem_ctx talloc context to use
|
* \param mem_ctx talloc context the memory for the dom_sids is allocated
|
||||||
* \param sid SID to map to a Unix gid
|
* from.
|
||||||
* \param gid pointer to receive the mapped gid
|
* \param count length of id_mapping array.
|
||||||
* \return NT_STATUS_OK on success, NT_STATUS_INVALID_SID if the sid is not from
|
* \param id array of id_mappings.
|
||||||
* a trusted domain and idmap trusted only = true, NT_STATUS_NONE_MAPPED if the
|
* \return NT_STATUS_OK on success, NT_STATUS_NONE_MAPPED if mapping is not
|
||||||
* mapping failed.
|
* possible at all, NT_STATUS_SOME_UNMAPPED if some mappings worked and some
|
||||||
|
* did not.
|
||||||
*/
|
*/
|
||||||
NTSTATUS idmap_sid_to_gid(struct idmap_context *idmap_ctx, TALLOC_CTX *mem_ctx,
|
|
||||||
const struct dom_sid *sid, gid_t *gid)
|
|
||||||
{
|
|
||||||
int ret;
|
|
||||||
NTSTATUS status = NT_STATUS_NONE_MAPPED;
|
|
||||||
struct ldb_context *ldb = idmap_ctx->ldb_ctx;
|
|
||||||
struct ldb_dn *dn;
|
|
||||||
struct ldb_message *hwm_msg, *map_msg;
|
|
||||||
struct ldb_result *res = NULL;
|
|
||||||
int trans = -1;
|
|
||||||
gid_t low, high, hwm, new_gid;
|
|
||||||
char *sid_string, *gid_string, *hwm_string;
|
|
||||||
bool hwm_entry_exists;
|
|
||||||
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
|
|
||||||
|
|
||||||
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
NTSTATUS idmap_xids_to_sids(struct idmap_context *idmap_ctx,
|
||||||
NULL, "(&(objectClass=sidMap)(objectSid=%s))",
|
TALLOC_CTX *mem_ctx, int count,
|
||||||
ldap_encode_ndr_dom_sid(tmp_ctx, sid));
|
struct id_mapping *id)
|
||||||
if (ret != LDB_SUCCESS) {
|
{
|
||||||
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
int i;
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
int error_count = 0;
|
||||||
goto failed;
|
|
||||||
|
for (i = 0; i < count; ++i) {
|
||||||
|
id[i].status = idmap_xid_to_sid(idmap_ctx, mem_ctx,
|
||||||
|
id[i].unixid, &id[i].sid);
|
||||||
|
if (NT_STATUS_EQUAL(id[i].status, NT_STATUS_RETRY)) {
|
||||||
|
id[i].status = idmap_xid_to_sid(idmap_ctx, mem_ctx,
|
||||||
|
id[i].unixid,
|
||||||
|
&id[i].sid);
|
||||||
|
}
|
||||||
|
if (!NT_STATUS_IS_OK(id[i].status)) {
|
||||||
|
DEBUG(1, ("idmapping failed for id[%d]\n", i));
|
||||||
|
error_count++;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (res->count == 1) {
|
if (error_count == count) {
|
||||||
new_gid = ldb_msg_find_attr_as_uint(res->msgs[0], "gidNumber",
|
/* Mapping did not work at all. */
|
||||||
-1);
|
return NT_STATUS_NONE_MAPPED;
|
||||||
if (new_gid == (gid_t) -1) {
|
} else if (error_count > 0) {
|
||||||
DEBUG(1, ("Invalid gid mapping.\n"));
|
/* Some mappings worked, some did not. */
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
return STATUS_SOME_UNMAPPED;
|
||||||
goto failed;
|
} else {
|
||||||
}
|
return NT_STATUS_OK;
|
||||||
*gid = new_gid;
|
}
|
||||||
talloc_free(tmp_ctx);
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Convert an array of SIDs to the corresponding array of unixids
|
||||||
|
*
|
||||||
|
* \param idmap_ctx idmap context to use
|
||||||
|
* \param mem_ctx talloc context the memory for the unixids is allocated
|
||||||
|
* from.
|
||||||
|
* \param count length of id_mapping array.
|
||||||
|
* \param id array of id_mappings.
|
||||||
|
* \return NT_STATUS_OK on success, NT_STATUS_NONE_MAPPED if mapping is not
|
||||||
|
* possible at all, NT_STATUS_SOME_UNMAPPED if some mappings worked and some
|
||||||
|
* did not.
|
||||||
|
*/
|
||||||
|
|
||||||
|
NTSTATUS idmap_sids_to_xids(struct idmap_context *idmap_ctx,
|
||||||
|
TALLOC_CTX *mem_ctx, int count,
|
||||||
|
struct id_mapping *id)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
int error_count = 0;
|
||||||
|
|
||||||
|
for (i = 0; i < count; ++i) {
|
||||||
|
id[i].status = idmap_sid_to_xid(idmap_ctx, mem_ctx,
|
||||||
|
id[i].sid, &id[i].unixid);
|
||||||
|
if (NT_STATUS_EQUAL(id[i].status, NT_STATUS_RETRY)) {
|
||||||
|
id[i].status = idmap_sid_to_xid(idmap_ctx, mem_ctx,
|
||||||
|
id[i].sid,
|
||||||
|
&id[i].unixid);
|
||||||
|
}
|
||||||
|
if (!NT_STATUS_IS_OK(id[i].status)) {
|
||||||
|
DEBUG(1, ("idmapping failed for id[%d]\n", i));
|
||||||
|
error_count++;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (error_count == count) {
|
||||||
|
/* Mapping did not work at all. */
|
||||||
|
return NT_STATUS_NONE_MAPPED;
|
||||||
|
} else if (error_count > 0) {
|
||||||
|
/* Some mappings worked, some did not. */
|
||||||
|
return STATUS_SOME_UNMAPPED;
|
||||||
|
} else {
|
||||||
return NT_STATUS_OK;
|
return NT_STATUS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
DEBUG(6, ("No existing mapping found, attempting to create one.\n"));
|
|
||||||
|
|
||||||
trans = ldb_transaction_start(ldb);
|
|
||||||
if (trans != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Redo the search to make sure noone changed the mapping while we
|
|
||||||
* weren't looking */
|
|
||||||
ret = ldb_search_exp_fmt(ldb, tmp_ctx, &res, NULL, LDB_SCOPE_SUBTREE,
|
|
||||||
NULL, "(&(objectClass=sidMap)(objectSid=%s))",
|
|
||||||
ldap_encode_ndr_dom_sid(tmp_ctx, sid));
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (res->count > 0) {
|
|
||||||
DEBUG(1, ("Database changed while trying to add a sidmap.\n"));
|
|
||||||
status = NT_STATUS_RETRY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*FIXME: if lp_idmap_trusted_only() == true, check if SID can be
|
|
||||||
* resolved here. */
|
|
||||||
|
|
||||||
ret = idmap_get_bounds(idmap_ctx, &low, &high);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
dn = ldb_dn_new(tmp_ctx, ldb, "CN=CONFIG");
|
|
||||||
if (dn == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_search(ldb, dn, LDB_SCOPE_BASE, NULL, NULL, &res);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Search failed: %s\n", ldb_errstring(ldb)));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
talloc_steal(tmp_ctx, res);
|
|
||||||
|
|
||||||
if (res->count != 1) {
|
|
||||||
DEBUG(1, ("No CN=CONFIG record, idmap database is broken.\n"));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
hwm = ldb_msg_find_attr_as_uint(res->msgs[0], "gidNumber", -1);
|
|
||||||
if (hwm == (gid_t)-1) {
|
|
||||||
hwm = low;
|
|
||||||
hwm_entry_exists = false;
|
|
||||||
} else {
|
|
||||||
hwm_entry_exists = true;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (hwm > high) {
|
|
||||||
DEBUG(1, ("Out of gids to allocate.\n"));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
hwm_msg = ldb_msg_new(tmp_ctx);
|
|
||||||
if (hwm_msg == NULL) {
|
|
||||||
DEBUG(1, ("Out of memory when creating ldb_message\n"));
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
hwm_msg->dn = dn;
|
|
||||||
|
|
||||||
new_gid = hwm;
|
|
||||||
hwm++;
|
|
||||||
|
|
||||||
hwm_string = talloc_asprintf(tmp_ctx, "%u", hwm);
|
|
||||||
if (hwm_string == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
sid_string = dom_sid_string(tmp_ctx, sid);
|
|
||||||
if (sid_string == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
gid_string = talloc_asprintf(tmp_ctx, "%u", new_gid);
|
|
||||||
if (gid_string == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (hwm_entry_exists) {
|
|
||||||
struct ldb_message_element *els;
|
|
||||||
struct ldb_val *vals;
|
|
||||||
|
|
||||||
/* We're modifying the entry, not just adding a new one. */
|
|
||||||
els = talloc_array(tmp_ctx, struct ldb_message_element, 2);
|
|
||||||
if (els == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
vals = talloc_array(tmp_ctx, struct ldb_val, 2);
|
|
||||||
if (els == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
hwm_msg->num_elements = 2;
|
|
||||||
hwm_msg->elements = els;
|
|
||||||
|
|
||||||
els[0].num_values = 1;
|
|
||||||
els[0].values = &vals[0];
|
|
||||||
els[0].flags = LDB_FLAG_MOD_DELETE;
|
|
||||||
els[0].name = talloc_strdup(tmp_ctx, "gidNumber");
|
|
||||||
if (els[0].name == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
els[1].num_values = 1;
|
|
||||||
els[1].values = &vals[1];
|
|
||||||
els[1].flags = LDB_FLAG_MOD_ADD;
|
|
||||||
els[1].name = els[0].name;
|
|
||||||
|
|
||||||
vals[0].data = (uint8_t *)gid_string;
|
|
||||||
vals[0].length = strlen(gid_string);
|
|
||||||
vals[1].data = (uint8_t *)hwm_string;
|
|
||||||
vals[1].length = strlen(hwm_string);
|
|
||||||
} else {
|
|
||||||
ret = ldb_msg_add_empty(hwm_msg, "gidNumber", LDB_FLAG_MOD_ADD,
|
|
||||||
NULL);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(hwm_msg, "gidNumber", hwm_string);
|
|
||||||
if (ret != LDB_SUCCESS)
|
|
||||||
{
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_modify(ldb, hwm_msg);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Updating the gid high water mark failed: %s\n",
|
|
||||||
ldb_errstring(ldb)));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
map_msg = ldb_msg_new(tmp_ctx);
|
|
||||||
if (map_msg == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
map_msg->dn = ldb_dn_new_fmt(tmp_ctx, ldb, "CN=%s", sid_string);
|
|
||||||
if (map_msg->dn == NULL) {
|
|
||||||
status = NT_STATUS_NO_MEMORY;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(map_msg, "gidNumber", gid_string);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = idmap_msg_add_dom_sid(idmap_ctx, tmp_ctx, map_msg, "objectSid",
|
|
||||||
sid);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(map_msg, "objectClass", "sidMap");
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_msg_add_string(map_msg, "cn", sid_string);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = ldb_add(ldb, map_msg);
|
|
||||||
if (ret != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Adding a sidmap failed: %s\n", ldb_errstring(ldb)));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
trans = ldb_transaction_commit(ldb);
|
|
||||||
if (trans != LDB_SUCCESS) {
|
|
||||||
DEBUG(1, ("Transaction failed: %s\n", ldb_errstring(ldb)));
|
|
||||||
status = NT_STATUS_NONE_MAPPED;
|
|
||||||
goto failed;
|
|
||||||
}
|
|
||||||
|
|
||||||
*gid = new_gid;
|
|
||||||
talloc_free(tmp_ctx);
|
|
||||||
return NT_STATUS_OK;
|
|
||||||
|
|
||||||
failed:
|
|
||||||
if (trans == LDB_SUCCESS) ldb_transaction_cancel(ldb);
|
|
||||||
talloc_free(tmp_ctx);
|
|
||||||
return status;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -25,6 +25,26 @@
|
|||||||
struct idmap_context {
|
struct idmap_context {
|
||||||
struct loadparm_context *lp_ctx;
|
struct loadparm_context *lp_ctx;
|
||||||
struct ldb_context *ldb_ctx;
|
struct ldb_context *ldb_ctx;
|
||||||
|
struct dom_sid *unix_groups_sid;
|
||||||
|
struct dom_sid *unix_users_sid;
|
||||||
|
};
|
||||||
|
|
||||||
|
enum id_type {
|
||||||
|
ID_TYPE_NOT_SPECIFIED = 0,
|
||||||
|
ID_TYPE_UID,
|
||||||
|
ID_TYPE_GID,
|
||||||
|
ID_TYPE_BOTH
|
||||||
|
};
|
||||||
|
|
||||||
|
struct unixid {
|
||||||
|
uint32_t id;
|
||||||
|
enum id_type type;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct id_mapping {
|
||||||
|
struct unixid *unixid;
|
||||||
|
struct dom_sid *sid;
|
||||||
|
NTSTATUS status;
|
||||||
};
|
};
|
||||||
|
|
||||||
#include "winbind/idmap_proto.h"
|
#include "winbind/idmap_proto.h"
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
Command backend for wbinfo -G
|
Command backend for wbinfo -G
|
||||||
|
|
||||||
Copyright (C) Kai Blin 2007
|
Copyright (C) 2007-2008 Kai Blin
|
||||||
|
|
||||||
This program is free software; you can redistribute it and/or modify
|
This program is free software; you can redistribute it and/or modify
|
||||||
it under the terms of the GNU General Public License as published by
|
it under the terms of the GNU General Public License as published by
|
||||||
@@ -33,37 +33,62 @@ struct gid2sid_state {
|
|||||||
struct dom_sid *sid;
|
struct dom_sid *sid;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static void gid2sid_recv_sid(struct composite_context *ctx);
|
||||||
|
|
||||||
struct composite_context *wb_gid2sid_send(TALLOC_CTX *mem_ctx,
|
struct composite_context *wb_gid2sid_send(TALLOC_CTX *mem_ctx,
|
||||||
struct wbsrv_service *service, gid_t gid)
|
struct wbsrv_service *service, gid_t gid)
|
||||||
{
|
{
|
||||||
struct composite_context *result;
|
struct composite_context *result, *ctx;
|
||||||
struct gid2sid_state *state;
|
struct gid2sid_state *state;
|
||||||
|
struct unixid *unixid;
|
||||||
|
struct id_mapping *ids;
|
||||||
|
|
||||||
DEBUG(5, ("wb_gid2sid_send called\n"));
|
DEBUG(5, ("wb_gid2sid_send called\n"));
|
||||||
|
|
||||||
result = composite_create(mem_ctx, service->task->event_ctx);
|
result = composite_create(mem_ctx, service->task->event_ctx);
|
||||||
if (!result) return NULL;
|
if (!result) return NULL;
|
||||||
|
|
||||||
state = talloc(mem_ctx, struct gid2sid_state);
|
state = talloc(result, struct gid2sid_state);
|
||||||
if (composite_nomem(state, result)) return result;
|
if (composite_nomem(state, result)) return result;
|
||||||
|
|
||||||
state->ctx = result;
|
state->ctx = result;
|
||||||
result->private_data = state;
|
result->private_data = state;
|
||||||
state->service = service;
|
state->service = service;
|
||||||
|
|
||||||
state->ctx->status = idmap_gid_to_sid(service->idmap_ctx, mem_ctx, gid,
|
unixid = talloc(result, struct unixid);
|
||||||
&state->sid);
|
if (composite_nomem(unixid, result)) return result;
|
||||||
if (NT_STATUS_EQUAL(state->ctx->status, NT_STATUS_RETRY)) {
|
unixid->id = gid;
|
||||||
state->ctx->status = idmap_gid_to_sid(service->idmap_ctx,
|
unixid->type = ID_TYPE_GID;
|
||||||
mem_ctx, gid,
|
|
||||||
&state->sid);
|
|
||||||
}
|
|
||||||
if (!composite_is_ok(state->ctx)) return result;
|
|
||||||
|
|
||||||
composite_done(state->ctx);
|
ids = talloc(result, struct id_mapping);
|
||||||
|
if (composite_nomem(ids, result)) return result;
|
||||||
|
ids->unixid = unixid;
|
||||||
|
ids->sid = NULL;
|
||||||
|
|
||||||
|
ctx = wb_xids2sids_send(result, service, 1, ids);
|
||||||
|
if (composite_nomem(ctx, result)) return result;
|
||||||
|
|
||||||
|
composite_continue(result, ctx, gid2sid_recv_sid, state);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void gid2sid_recv_sid(struct composite_context *ctx)
|
||||||
|
{
|
||||||
|
struct gid2sid_state *state = talloc_get_type(ctx->async.private_data,
|
||||||
|
struct gid2sid_state);
|
||||||
|
struct id_mapping *ids = NULL;
|
||||||
|
state->ctx->status = wb_xids2sids_recv(ctx, &ids);
|
||||||
|
if (!composite_is_ok(state->ctx)) return;
|
||||||
|
|
||||||
|
if (!NT_STATUS_IS_OK(ids->status)) {
|
||||||
|
composite_error(state->ctx, ids->status);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
state->sid = ids->sid;
|
||||||
|
composite_done(state->ctx);
|
||||||
|
}
|
||||||
|
|
||||||
NTSTATUS wb_gid2sid_recv(struct composite_context *ctx, TALLOC_CTX *mem_ctx,
|
NTSTATUS wb_gid2sid_recv(struct composite_context *ctx, TALLOC_CTX *mem_ctx,
|
||||||
struct dom_sid **sid)
|
struct dom_sid **sid)
|
||||||
{
|
{
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
Map a SID to a gid
|
Map a SID to a gid
|
||||||
|
|
||||||
Copyright (C) Kai Blin 2007
|
Copyright (C) 2007-2008 Kai Blin
|
||||||
|
|
||||||
This program is free software; you can redistribute it and/or modify
|
This program is free software; you can redistribute it and/or modify
|
||||||
it under the terms of the GNU General Public License as published by
|
it under the terms of the GNU General Public License as published by
|
||||||
@@ -33,11 +33,14 @@ struct sid2gid_state {
|
|||||||
gid_t gid;
|
gid_t gid;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static void sid2gid_recv_gid(struct composite_context *ctx);
|
||||||
|
|
||||||
struct composite_context *wb_sid2gid_send(TALLOC_CTX *mem_ctx,
|
struct composite_context *wb_sid2gid_send(TALLOC_CTX *mem_ctx,
|
||||||
struct wbsrv_service *service, const struct dom_sid *sid)
|
struct wbsrv_service *service, const struct dom_sid *sid)
|
||||||
{
|
{
|
||||||
struct composite_context *result;
|
struct composite_context *result, *ctx;
|
||||||
struct sid2gid_state *state;
|
struct sid2gid_state *state;
|
||||||
|
struct id_mapping *ids;
|
||||||
|
|
||||||
DEBUG(5, ("wb_sid2gid_send called\n"));
|
DEBUG(5, ("wb_sid2gid_send called\n"));
|
||||||
|
|
||||||
@@ -51,18 +54,43 @@ struct composite_context *wb_sid2gid_send(TALLOC_CTX *mem_ctx,
|
|||||||
result->private_data = state;
|
result->private_data = state;
|
||||||
state->service = service;
|
state->service = service;
|
||||||
|
|
||||||
state->ctx->status = idmap_sid_to_gid(service->idmap_ctx, state, sid,
|
ids = talloc(result, struct id_mapping);
|
||||||
&state->gid);
|
if (composite_nomem(ids, result)) return result;
|
||||||
if (NT_STATUS_EQUAL(state->ctx->status, NT_STATUS_RETRY)) {
|
|
||||||
state->ctx->status = idmap_sid_to_gid(service->idmap_ctx, state,
|
|
||||||
sid, &state->gid);
|
|
||||||
}
|
|
||||||
if (!composite_is_ok(state->ctx)) return result;
|
|
||||||
|
|
||||||
composite_done(state->ctx);
|
ids->sid = dom_sid_dup(result, sid);
|
||||||
|
if (composite_nomem(ids->sid, result)) return result;
|
||||||
|
|
||||||
|
ctx = wb_sids2xids_send(result, service, 1, ids);
|
||||||
|
if (composite_nomem(ctx, result)) return result;
|
||||||
|
|
||||||
|
composite_continue(result, ctx, sid2gid_recv_gid, state);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void sid2gid_recv_gid(struct composite_context *ctx)
|
||||||
|
{
|
||||||
|
struct sid2gid_state *state = talloc_get_type(ctx->async.private_data,
|
||||||
|
struct sid2gid_state);
|
||||||
|
|
||||||
|
struct id_mapping *ids = NULL;
|
||||||
|
|
||||||
|
state->ctx->status = wb_sids2xids_recv(ctx, &ids);
|
||||||
|
if (!composite_is_ok(state->ctx)) return;
|
||||||
|
|
||||||
|
if (!NT_STATUS_IS_OK(ids->status)) {
|
||||||
|
composite_error(state->ctx, ids->status);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ids->unixid->type == ID_TYPE_BOTH ||
|
||||||
|
ids->unixid->type == ID_TYPE_GID) {
|
||||||
|
state->gid = ids->unixid->id;
|
||||||
|
composite_done(state->ctx);
|
||||||
|
} else {
|
||||||
|
composite_error(state->ctx, NT_STATUS_INVALID_SID);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
NTSTATUS wb_sid2gid_recv(struct composite_context *ctx, gid_t *gid)
|
NTSTATUS wb_sid2gid_recv(struct composite_context *ctx, gid_t *gid)
|
||||||
{
|
{
|
||||||
NTSTATUS status = composite_wait(ctx);
|
NTSTATUS status = composite_wait(ctx);
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
Map a SID to a uid
|
Map a SID to a uid
|
||||||
|
|
||||||
Copyright (C) Kai Blin 2007-2008
|
Copyright (C) 2007-2008 Kai Blin
|
||||||
|
|
||||||
This program is free software; you can redistribute it and/or modify
|
This program is free software; you can redistribute it and/or modify
|
||||||
it under the terms of the GNU General Public License as published by
|
it under the terms of the GNU General Public License as published by
|
||||||
@@ -33,11 +33,14 @@ struct sid2uid_state {
|
|||||||
uid_t uid;
|
uid_t uid;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static void sid2uid_recv_uid(struct composite_context *ctx);
|
||||||
|
|
||||||
struct composite_context *wb_sid2uid_send(TALLOC_CTX *mem_ctx,
|
struct composite_context *wb_sid2uid_send(TALLOC_CTX *mem_ctx,
|
||||||
struct wbsrv_service *service, const struct dom_sid *sid)
|
struct wbsrv_service *service, const struct dom_sid *sid)
|
||||||
{
|
{
|
||||||
struct composite_context *result;
|
struct composite_context *result, *ctx;
|
||||||
struct sid2uid_state *state;
|
struct sid2uid_state *state;
|
||||||
|
struct id_mapping *ids;
|
||||||
|
|
||||||
DEBUG(5, ("wb_sid2uid_send called\n"));
|
DEBUG(5, ("wb_sid2uid_send called\n"));
|
||||||
|
|
||||||
@@ -45,24 +48,49 @@ struct composite_context *wb_sid2uid_send(TALLOC_CTX *mem_ctx,
|
|||||||
if (!result) return NULL;
|
if (!result) return NULL;
|
||||||
|
|
||||||
state = talloc(result, struct sid2uid_state);
|
state = talloc(result, struct sid2uid_state);
|
||||||
if(composite_nomem(state, result)) return result;
|
if (composite_nomem(state, result)) return result;
|
||||||
|
|
||||||
state->ctx = result;
|
state->ctx = result;
|
||||||
result->private_data = state;
|
result->private_data = state;
|
||||||
state->service = service;
|
state->service = service;
|
||||||
|
|
||||||
state->ctx->status = idmap_sid_to_uid(service->idmap_ctx, state, sid,
|
ids = talloc(result, struct id_mapping);
|
||||||
&state->uid);
|
if (composite_nomem(ids, result)) return result;
|
||||||
if (NT_STATUS_EQUAL(state->ctx->status, NT_STATUS_RETRY)) {
|
|
||||||
state->ctx->status = idmap_sid_to_uid(service->idmap_ctx, state,
|
|
||||||
sid, &state->uid);
|
|
||||||
}
|
|
||||||
if (!composite_is_ok(state->ctx)) return result;
|
|
||||||
|
|
||||||
composite_done(state->ctx);
|
ids->sid = dom_sid_dup(result, sid);
|
||||||
|
if (composite_nomem(ids->sid, result)) return result;
|
||||||
|
|
||||||
|
ctx = wb_sids2xids_send(result, service, 1, ids);
|
||||||
|
if (composite_nomem(ctx, result)) return result;
|
||||||
|
|
||||||
|
composite_continue(result, ctx, sid2uid_recv_uid, state);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void sid2uid_recv_uid(struct composite_context *ctx)
|
||||||
|
{
|
||||||
|
struct sid2uid_state *state = talloc_get_type(ctx->async.private_data,
|
||||||
|
struct sid2uid_state);
|
||||||
|
|
||||||
|
struct id_mapping *ids = NULL;
|
||||||
|
|
||||||
|
state->ctx->status = wb_sids2xids_recv(ctx, &ids);
|
||||||
|
if (!composite_is_ok(state->ctx)) return;
|
||||||
|
|
||||||
|
if (!NT_STATUS_IS_OK(ids->status)) {
|
||||||
|
composite_error(state->ctx, ids->status);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ids->unixid->type == ID_TYPE_BOTH ||
|
||||||
|
ids->unixid->type == ID_TYPE_UID) {
|
||||||
|
state->uid = ids->unixid->id;
|
||||||
|
composite_done(state->ctx);
|
||||||
|
} else {
|
||||||
|
composite_error(state->ctx, NT_STATUS_INVALID_SID);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
NTSTATUS wb_sid2uid_recv(struct composite_context *ctx, uid_t *uid)
|
NTSTATUS wb_sid2uid_recv(struct composite_context *ctx, uid_t *uid)
|
||||||
{
|
{
|
||||||
NTSTATUS status = composite_wait(ctx);
|
NTSTATUS status = composite_wait(ctx);
|
||||||
|
|||||||
82
source/winbind/wb_sids2xids.c
Normal file
82
source/winbind/wb_sids2xids.c
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
/*
|
||||||
|
Unix SMB/CIFS implementation.
|
||||||
|
|
||||||
|
Map SIDs to unixids.
|
||||||
|
|
||||||
|
Copyright (C) 2008 Kai Blin
|
||||||
|
|
||||||
|
This program is free software; you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation; either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "includes.h"
|
||||||
|
#include "libcli/composite/composite.h"
|
||||||
|
#include "winbind/wb_server.h"
|
||||||
|
#include "smbd/service_task.h"
|
||||||
|
#include "winbind/wb_helper.h"
|
||||||
|
#include "libcli/security/proto.h"
|
||||||
|
#include "winbind/idmap.h"
|
||||||
|
|
||||||
|
struct sids2xids_state {
|
||||||
|
struct composite_context *ctx;
|
||||||
|
struct wbsrv_service *service;
|
||||||
|
struct id_mapping *ids;
|
||||||
|
int count;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct composite_context *wb_sids2xids_send(TALLOC_CTX *mem_ctx,
|
||||||
|
struct wbsrv_service *service,
|
||||||
|
int count, struct id_mapping *ids)
|
||||||
|
{
|
||||||
|
struct composite_context *result;
|
||||||
|
struct sids2xids_state *state;
|
||||||
|
|
||||||
|
DEBUG(5, ("wb_sids2xids_send called\n"));
|
||||||
|
|
||||||
|
result = composite_create(mem_ctx, service->task->event_ctx);
|
||||||
|
if (!result) return NULL;
|
||||||
|
|
||||||
|
state = talloc(result, struct sids2xids_state);
|
||||||
|
if (composite_nomem(state, result)) return result;
|
||||||
|
|
||||||
|
state->ctx = result;
|
||||||
|
result->private_data = state;
|
||||||
|
state->service = service;
|
||||||
|
state->count = count;
|
||||||
|
state->ids = ids;
|
||||||
|
|
||||||
|
state->ctx->status = idmap_sids_to_xids(service->idmap_ctx, mem_ctx,
|
||||||
|
count, state->ids);
|
||||||
|
if (!composite_is_ok(state->ctx)) return result;
|
||||||
|
|
||||||
|
composite_done(state->ctx);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS wb_sids2xids_recv(struct composite_context *ctx,
|
||||||
|
struct id_mapping **ids)
|
||||||
|
{
|
||||||
|
NTSTATUS status = composite_wait(ctx);
|
||||||
|
|
||||||
|
DEBUG(5, ("wb_sids2xids_recv called\n"));
|
||||||
|
|
||||||
|
if (NT_STATUS_IS_OK(status)) {
|
||||||
|
struct sids2xids_state *state =
|
||||||
|
talloc_get_type(ctx->private_data,
|
||||||
|
struct sids2xids_state);
|
||||||
|
*ids = state->ids;
|
||||||
|
}
|
||||||
|
talloc_free(ctx);
|
||||||
|
return status;
|
||||||
|
}
|
||||||
|
|
||||||
@@ -3,7 +3,7 @@
|
|||||||
|
|
||||||
Command backend for wbinfo -U
|
Command backend for wbinfo -U
|
||||||
|
|
||||||
Copyright (C) Kai Blin 2007-2008
|
Copyright (C) 2007-2008 Kai Blin
|
||||||
|
|
||||||
This program is free software; you can redistribute it and/or modify
|
This program is free software; you can redistribute it and/or modify
|
||||||
it under the terms of the GNU General Public License as published by
|
it under the terms of the GNU General Public License as published by
|
||||||
@@ -33,35 +33,62 @@ struct uid2sid_state {
|
|||||||
struct dom_sid *sid;
|
struct dom_sid *sid;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static void uid2sid_recv_sid(struct composite_context *ctx);
|
||||||
|
|
||||||
struct composite_context *wb_uid2sid_send(TALLOC_CTX *mem_ctx,
|
struct composite_context *wb_uid2sid_send(TALLOC_CTX *mem_ctx,
|
||||||
struct wbsrv_service *service, uid_t uid)
|
struct wbsrv_service *service, uid_t uid)
|
||||||
{
|
{
|
||||||
struct composite_context *result;
|
struct composite_context *result, *ctx;
|
||||||
struct uid2sid_state *state;
|
struct uid2sid_state *state;
|
||||||
|
struct unixid *unixid;
|
||||||
|
struct id_mapping *ids;
|
||||||
|
|
||||||
DEBUG(5, ("wb_uid2sid_send called\n"));
|
DEBUG(5, ("wb_uid2sid_send called\n"));
|
||||||
|
|
||||||
result = composite_create(mem_ctx, service->task->event_ctx);
|
result = composite_create(mem_ctx, service->task->event_ctx);
|
||||||
if (!result) return NULL;
|
if (!result) return NULL;
|
||||||
|
|
||||||
state = talloc(mem_ctx, struct uid2sid_state);
|
state = talloc(result, struct uid2sid_state);
|
||||||
if (composite_nomem(state, result)) return result;
|
if (composite_nomem(state, result)) return result;
|
||||||
|
|
||||||
state->ctx = result;
|
state->ctx = result;
|
||||||
result->private_data = state;
|
result->private_data = state;
|
||||||
state->service = service;
|
state->service = service;
|
||||||
|
|
||||||
state->ctx->status = idmap_uid_to_sid(service->idmap_ctx, mem_ctx, uid,
|
unixid = talloc(result, struct unixid);
|
||||||
&state->sid);
|
if (composite_nomem(unixid, result)) return result;
|
||||||
if (NT_STATUS_EQUAL(state->ctx->status, NT_STATUS_RETRY)) {
|
unixid->id = uid;
|
||||||
state->ctx->status = idmap_uid_to_sid(service->idmap_ctx,
|
unixid->type = ID_TYPE_UID;
|
||||||
mem_ctx, uid,
|
|
||||||
&state->sid);
|
ids = talloc(result, struct id_mapping);
|
||||||
|
if (composite_nomem(ids, result)) return result;
|
||||||
|
ids->unixid = unixid;
|
||||||
|
ids->sid = NULL;
|
||||||
|
|
||||||
|
ctx = wb_xids2sids_send(result, service, 1, ids);
|
||||||
|
if (composite_nomem(ctx, result)) return result;
|
||||||
|
|
||||||
|
composite_continue(result, ctx, uid2sid_recv_sid, state);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void uid2sid_recv_sid(struct composite_context *ctx)
|
||||||
|
{
|
||||||
|
struct uid2sid_state *state = talloc_get_type(ctx->async.private_data,
|
||||||
|
struct uid2sid_state);
|
||||||
|
struct id_mapping *ids = NULL;
|
||||||
|
|
||||||
|
state->ctx->status = wb_xids2sids_recv(ctx, &ids);
|
||||||
|
if (!composite_is_ok(state->ctx)) return;
|
||||||
|
|
||||||
|
if (!NT_STATUS_IS_OK(ids->status)) {
|
||||||
|
composite_error(state->ctx, ids->status);
|
||||||
|
return;
|
||||||
}
|
}
|
||||||
if (!composite_is_ok(state->ctx)) return result;
|
|
||||||
|
state->sid = ids->sid;
|
||||||
|
|
||||||
composite_done(state->ctx);
|
composite_done(state->ctx);
|
||||||
return result;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS wb_uid2sid_recv(struct composite_context *ctx, TALLOC_CTX *mem_ctx,
|
NTSTATUS wb_uid2sid_recv(struct composite_context *ctx, TALLOC_CTX *mem_ctx,
|
||||||
|
|||||||
82
source/winbind/wb_xids2sids.c
Normal file
82
source/winbind/wb_xids2sids.c
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
/*
|
||||||
|
Unix SMB/CIFS implementation.
|
||||||
|
|
||||||
|
Convet an unixid struct to a SID
|
||||||
|
|
||||||
|
Copyright (C) 2008 Kai Blin
|
||||||
|
|
||||||
|
This program is free software; you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation; either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "includes.h"
|
||||||
|
#include "libcli/composite/composite.h"
|
||||||
|
#include "winbind/wb_server.h"
|
||||||
|
#include "smbd/service_task.h"
|
||||||
|
#include "winbind/wb_helper.h"
|
||||||
|
#include "libcli/security/proto.h"
|
||||||
|
#include "winbind/idmap.h"
|
||||||
|
|
||||||
|
struct xids2sids_state {
|
||||||
|
struct composite_context *ctx;
|
||||||
|
struct wbsrv_service *service;
|
||||||
|
struct id_mapping *ids;
|
||||||
|
int count;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct composite_context *wb_xids2sids_send(TALLOC_CTX *mem_ctx,
|
||||||
|
struct wbsrv_service *service,
|
||||||
|
int count, struct id_mapping *ids)
|
||||||
|
{
|
||||||
|
struct composite_context *result;
|
||||||
|
struct xids2sids_state *state;
|
||||||
|
|
||||||
|
DEBUG(0, ("wb_xids2sids_send called\n"));
|
||||||
|
|
||||||
|
result = composite_create(mem_ctx, service->task->event_ctx);
|
||||||
|
if (!result) return NULL;
|
||||||
|
|
||||||
|
state = talloc(mem_ctx, struct xids2sids_state);
|
||||||
|
if (composite_nomem(state, result)) return result;
|
||||||
|
|
||||||
|
state->ctx = result;
|
||||||
|
result->private_data = state;
|
||||||
|
state->service = service;
|
||||||
|
state->count = count;
|
||||||
|
state->ids = ids;
|
||||||
|
|
||||||
|
state->ctx->status = idmap_xids_to_sids(service->idmap_ctx, mem_ctx,
|
||||||
|
count, state->ids);
|
||||||
|
if (!composite_is_ok(state->ctx)) return result;
|
||||||
|
|
||||||
|
composite_done(state->ctx);
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS wb_xids2sids_recv(struct composite_context *ctx,
|
||||||
|
struct id_mapping **ids)
|
||||||
|
{
|
||||||
|
NTSTATUS status = composite_wait(ctx);
|
||||||
|
|
||||||
|
DEBUG(0, ("wb_xids2sids_recv called.\n"));
|
||||||
|
|
||||||
|
if (NT_STATUS_IS_OK(status)) {
|
||||||
|
struct xids2sids_state *state =
|
||||||
|
talloc_get_type(ctx->private_data,
|
||||||
|
struct xids2sids_state);
|
||||||
|
*ids = state->ids;
|
||||||
|
}
|
||||||
|
talloc_free(ctx);
|
||||||
|
return status;
|
||||||
|
}
|
||||||
|
|
||||||
Reference in New Issue
Block a user