mirror of
https://github.com/samba-team/samba.git
synced 2024-12-28 07:21:54 +03:00
4fd6fdd9a9
Jeremy.
(This used to be commit b5d953bc26
)
1012 lines
28 KiB
C
1012 lines
28 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
idmap LDAP backend
|
|
|
|
Copyright (C) Tim Potter 2000
|
|
Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
|
|
Copyright (C) Simo Sorce 2003
|
|
Copyright (C) Gerald Carter 2003
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#undef DBGC_CLASS
|
|
#define DBGC_CLASS DBGC_IDMAP
|
|
|
|
|
|
#include <lber.h>
|
|
#include <ldap.h>
|
|
|
|
#include "smbldap.h"
|
|
|
|
#define IDMAP_GROUP_SUFFIX "ou=idmap group"
|
|
#define IDMAP_USER_SUFFIX "ou=idmap people"
|
|
|
|
|
|
struct ldap_idmap_state {
|
|
struct smbldap_state *smbldap_state;
|
|
TALLOC_CTX *mem_ctx;
|
|
};
|
|
|
|
#define LDAP_MAX_ALLOC_ID 128 /* number tries while allocating
|
|
new id */
|
|
|
|
static struct ldap_idmap_state ldap_state;
|
|
|
|
static NTSTATUS ldap_set_mapping(const DOM_SID *sid, unid_t id, int id_type);
|
|
static NTSTATUS ldap_set_mapping_internals(const DOM_SID *sid, unid_t id, int id_type,
|
|
const char *ldap_dn, LDAPMessage *entry);
|
|
static NTSTATUS ldap_idmap_close(void);
|
|
|
|
|
|
/**********************************************************************
|
|
Even if the sambaDomain attribute in LDAP tells us that this RID is
|
|
safe to use, always check before use.
|
|
*********************************************************************/
|
|
|
|
static BOOL sid_in_use(struct ldap_idmap_state *state,
|
|
const DOM_SID *sid, int *error)
|
|
{
|
|
fstring filter;
|
|
fstring sid_string;
|
|
LDAPMessage *result = NULL;
|
|
int count;
|
|
int rc;
|
|
char *sid_attr[] = {LDAP_ATTRIBUTE_SID, NULL};
|
|
|
|
slprintf(filter, sizeof(filter)-1, "(%s=%s)", LDAP_ATTRIBUTE_SID, sid_to_string(sid_string, sid));
|
|
|
|
rc = smbldap_search_suffix(state->smbldap_state,
|
|
filter, sid_attr, &result);
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
char *ld_error = NULL;
|
|
ldap_get_option(state->smbldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error);
|
|
DEBUG(2, ("Failed to check if sid %s is alredy in use: %s\n",
|
|
sid_string, ld_error));
|
|
SAFE_FREE(ld_error);
|
|
|
|
*error = rc;
|
|
return True;
|
|
}
|
|
|
|
if ((count = ldap_count_entries(state->smbldap_state->ldap_struct, result)) > 0) {
|
|
DEBUG(3, ("Sid %s already in use - trying next RID\n",
|
|
sid_string));
|
|
ldap_msgfree(result);
|
|
return True;
|
|
}
|
|
|
|
ldap_msgfree(result);
|
|
|
|
/* good, sid is not in use */
|
|
return False;
|
|
}
|
|
|
|
/**********************************************************************
|
|
Set the new nextRid attribute, and return one we can use.
|
|
|
|
This also checks that this RID is actually free - in case the admin
|
|
manually stole it :-).
|
|
*********************************************************************/
|
|
|
|
static NTSTATUS ldap_next_rid(struct ldap_idmap_state *state, uint32 *rid,
|
|
int rid_type)
|
|
{
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
int rc;
|
|
LDAPMessage *domain_result = NULL;
|
|
LDAPMessage *entry = NULL;
|
|
char *dn;
|
|
LDAPMod **mods = NULL;
|
|
fstring old_rid_string;
|
|
fstring next_rid_string;
|
|
fstring algorithmic_rid_base_string;
|
|
uint32 next_rid;
|
|
uint32 alg_rid_base;
|
|
int attempts = 0;
|
|
char *ld_error = NULL;
|
|
|
|
while (attempts < 10) {
|
|
if (!NT_STATUS_IS_OK(ret = smbldap_search_domain_info(state->smbldap_state,
|
|
&domain_result, get_global_sam_name(), True))) {
|
|
return ret;
|
|
}
|
|
|
|
entry = ldap_first_entry(state->smbldap_state->ldap_struct, domain_result);
|
|
if (!entry) {
|
|
DEBUG(0, ("Could not get domain info entry\n"));
|
|
ldap_msgfree(domain_result);
|
|
return ret;
|
|
}
|
|
|
|
if ((dn = smbldap_get_dn(state->smbldap_state->ldap_struct, entry)) == NULL) {
|
|
DEBUG(0, ("Could not get domain info DN\n"));
|
|
ldap_msgfree(domain_result);
|
|
return ret;
|
|
}
|
|
|
|
/* yes, we keep 3 seperate counters, one for rids between 1000 (BASE_RID) and
|
|
algorithmic_rid_base. The other two are to avoid stomping on the
|
|
different sets of algorithmic RIDs */
|
|
|
|
if (smbldap_get_single_attribute(state->smbldap_state->ldap_struct, entry,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_ALGORITHMIC_RID_BASE),
|
|
algorithmic_rid_base_string)) {
|
|
|
|
alg_rid_base = (uint32)atol(algorithmic_rid_base_string);
|
|
} else {
|
|
alg_rid_base = algorithmic_rid_base();
|
|
/* Try to make the modification atomically by enforcing the
|
|
old value in the delete mod. */
|
|
slprintf(algorithmic_rid_base_string, sizeof(algorithmic_rid_base_string)-1, "%d", alg_rid_base);
|
|
smbldap_make_mod(state->smbldap_state->ldap_struct, entry, &mods,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_ALGORITHMIC_RID_BASE),
|
|
algorithmic_rid_base_string);
|
|
}
|
|
|
|
next_rid = 0;
|
|
|
|
if (alg_rid_base > BASE_RID) {
|
|
/* we have a non-default 'algorithmic rid base', so we have 'low' rids that we
|
|
can allocate to new users */
|
|
if (smbldap_get_single_attribute(state->smbldap_state->ldap_struct, entry,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_NEXT_RID),
|
|
old_rid_string)) {
|
|
*rid = (uint32)atol(old_rid_string);
|
|
} else {
|
|
*rid = BASE_RID;
|
|
}
|
|
|
|
next_rid = *rid+1;
|
|
if (next_rid >= alg_rid_base) {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
slprintf(next_rid_string, sizeof(next_rid_string)-1, "%d", next_rid);
|
|
|
|
/* Try to make the modification atomically by enforcing the
|
|
old value in the delete mod. */
|
|
smbldap_make_mod(state->smbldap_state->ldap_struct, entry, &mods,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_NEXT_RID),
|
|
next_rid_string);
|
|
}
|
|
|
|
if (!next_rid) { /* not got one already */
|
|
switch (rid_type) {
|
|
case USER_RID_TYPE:
|
|
if (smbldap_get_single_attribute(state->smbldap_state->ldap_struct, entry,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_NEXT_USERRID),
|
|
old_rid_string)) {
|
|
*rid = (uint32)atol(old_rid_string);
|
|
}
|
|
break;
|
|
case GROUP_RID_TYPE:
|
|
if (smbldap_get_single_attribute(state->smbldap_state->ldap_struct, entry,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_NEXT_GROUPRID),
|
|
old_rid_string)) {
|
|
*rid = (uint32)atol(old_rid_string);
|
|
}
|
|
break;
|
|
}
|
|
|
|
/* This is the core of the whole routine. If we had
|
|
scheme-style closures, there would be a *lot* less code
|
|
duplication... */
|
|
|
|
next_rid = *rid+RID_MULTIPLIER;
|
|
slprintf(next_rid_string, sizeof(next_rid_string)-1, "%d", next_rid);
|
|
|
|
switch (rid_type) {
|
|
case USER_RID_TYPE:
|
|
/* Try to make the modification atomically by enforcing the
|
|
old value in the delete mod. */
|
|
smbldap_make_mod(state->smbldap_state->ldap_struct, entry, &mods,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_NEXT_USERRID),
|
|
next_rid_string);
|
|
break;
|
|
|
|
case GROUP_RID_TYPE:
|
|
/* Try to make the modification atomically by enforcing the
|
|
old value in the delete mod. */
|
|
smbldap_make_mod(state->smbldap_state->ldap_struct, entry, &mods,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_NEXT_GROUPRID),
|
|
next_rid_string);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if ((rc = smbldap_modify(state->smbldap_state, dn, mods)) == LDAP_SUCCESS) {
|
|
DOM_SID dom_sid;
|
|
DOM_SID sid;
|
|
pstring domain_sid_string;
|
|
int error = 0;
|
|
|
|
if (!smbldap_get_single_attribute(state->smbldap_state->ldap_struct, domain_result,
|
|
get_attr_key2string(dominfo_attr_list, LDAP_ATTR_DOM_SID),
|
|
domain_sid_string)) {
|
|
ldap_mods_free(mods, True);
|
|
SAFE_FREE(dn);
|
|
ldap_msgfree(domain_result);
|
|
return ret;
|
|
}
|
|
|
|
if (!string_to_sid(&dom_sid, domain_sid_string)) {
|
|
ldap_mods_free(mods, True);
|
|
SAFE_FREE(dn);
|
|
ldap_msgfree(domain_result);
|
|
return ret;
|
|
}
|
|
|
|
ldap_mods_free(mods, True);
|
|
mods = NULL;
|
|
SAFE_FREE(dn);
|
|
ldap_msgfree(domain_result);
|
|
|
|
sid_copy(&sid, &dom_sid);
|
|
sid_append_rid(&sid, *rid);
|
|
|
|
/* check RID is not in use */
|
|
if (sid_in_use(state, &sid, &error)) {
|
|
if (error) {
|
|
return ret;
|
|
}
|
|
continue;
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
ld_error = NULL;
|
|
ldap_get_option(state->smbldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error);
|
|
DEBUG(2, ("Failed to modify rid: %s\n", ld_error ? ld_error : "(NULL"));
|
|
SAFE_FREE(ld_error);
|
|
|
|
ldap_mods_free(mods, True);
|
|
mods = NULL;
|
|
|
|
SAFE_FREE(dn);
|
|
|
|
ldap_msgfree(domain_result);
|
|
domain_result = NULL;
|
|
|
|
{
|
|
/* Sleep for a random timeout */
|
|
unsigned sleeptime = (sys_random()*sys_getpid()*attempts);
|
|
attempts += 1;
|
|
|
|
sleeptime %= 100;
|
|
msleep(sleeptime);
|
|
}
|
|
}
|
|
|
|
DEBUG(0, ("Failed to set new RID\n"));
|
|
return ret;
|
|
}
|
|
|
|
|
|
/*****************************************************************************
|
|
Allocate a new RID
|
|
*****************************************************************************/
|
|
|
|
static NTSTATUS ldap_allocate_rid(uint32 *rid, int rid_type)
|
|
{
|
|
return ldap_next_rid( &ldap_state, rid, rid_type );
|
|
}
|
|
|
|
/*****************************************************************************
|
|
Allocate a new uid or gid
|
|
*****************************************************************************/
|
|
|
|
static NTSTATUS ldap_allocate_id(unid_t *id, int id_type)
|
|
{
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
int rc = LDAP_SERVER_DOWN;
|
|
int count = 0;
|
|
LDAPMessage *result = NULL;
|
|
LDAPMessage *entry = NULL;
|
|
pstring id_str, new_id_str;
|
|
LDAPMod **mods = NULL;
|
|
const char *type;
|
|
char *dn;
|
|
char **attr_list;
|
|
pstring filter;
|
|
uid_t luid, huid;
|
|
gid_t lgid, hgid;
|
|
|
|
|
|
type = (id_type & ID_USERID) ?
|
|
get_attr_key2string( idpool_attr_list, LDAP_ATTR_UIDNUMBER ) :
|
|
get_attr_key2string( idpool_attr_list, LDAP_ATTR_GIDNUMBER );
|
|
|
|
pstr_sprintf(filter, "(objectClass=%s)", LDAP_OBJ_IDPOOL);
|
|
|
|
attr_list = get_attr_list( idpool_attr_list );
|
|
|
|
rc = smbldap_search(ldap_state.smbldap_state, lp_ldap_idmap_suffix(),
|
|
LDAP_SCOPE_SUBTREE, filter,
|
|
attr_list, 0, &result);
|
|
free_attr_list( attr_list );
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
DEBUG(0,("ldap_allocate_id: %s object not found\n", LDAP_OBJ_IDPOOL));
|
|
goto out;
|
|
}
|
|
|
|
count = ldap_count_entries(ldap_state.smbldap_state->ldap_struct, result);
|
|
if (count != 1) {
|
|
DEBUG(0,("ldap_allocate_id: single %s object not found\n", LDAP_OBJ_IDPOOL));
|
|
goto out;
|
|
}
|
|
|
|
dn = smbldap_get_dn(ldap_state.smbldap_state->ldap_struct, result);
|
|
if (!dn) {
|
|
goto out;
|
|
}
|
|
entry = ldap_first_entry(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
if (!smbldap_get_single_attribute(ldap_state.smbldap_state->ldap_struct, entry, type, id_str)) {
|
|
DEBUG(0,("ldap_allocate_id: %s attribute not found\n",
|
|
type));
|
|
goto out;
|
|
}
|
|
|
|
/* this must succeed or else we wouldn't have initialized */
|
|
|
|
lp_idmap_uid( &luid, &huid);
|
|
lp_idmap_gid( &lgid, &hgid);
|
|
|
|
/* make sure we still have room to grow */
|
|
|
|
if (id_type & ID_USERID) {
|
|
id->uid = strtoul(id_str, NULL, 10);
|
|
if (id->uid > huid ) {
|
|
DEBUG(0,("ldap_allocate_id: Cannot allocate uid above %lu!\n",
|
|
(unsigned long)huid));
|
|
goto out;
|
|
}
|
|
}
|
|
else {
|
|
id->gid = strtoul(id_str, NULL, 10);
|
|
if (id->gid > hgid ) {
|
|
DEBUG(0,("ldap_allocate_id: Cannot allocate gid above %lu!\n",
|
|
(unsigned long)hgid));
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
pstr_sprintf(new_id_str, "%lu",
|
|
((id_type & ID_USERID) ? (unsigned long)id->uid :
|
|
(unsigned long)id->gid) + 1);
|
|
|
|
smbldap_set_mod( &mods, LDAP_MOD_DELETE, type, id_str );
|
|
smbldap_set_mod( &mods, LDAP_MOD_ADD, type, new_id_str );
|
|
|
|
rc = smbldap_modify(ldap_state.smbldap_state, dn, mods);
|
|
|
|
SAFE_FREE(dn);
|
|
ldap_mods_free( mods, True );
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
DEBUG(0,("ldap_allocate_id: Failed to allocate new %s. ldap_modify() failed.\n",
|
|
type));
|
|
goto out;
|
|
}
|
|
|
|
ret = NT_STATUS_OK;
|
|
out:
|
|
return ret;
|
|
}
|
|
|
|
/*****************************************************************************
|
|
get a sid from an id
|
|
*****************************************************************************/
|
|
|
|
static NTSTATUS ldap_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type)
|
|
{
|
|
LDAPMessage *result = NULL;
|
|
LDAPMessage *entry = NULL;
|
|
fstring id_str;
|
|
pstring sid_str;
|
|
pstring filter;
|
|
pstring suffix;
|
|
const char *type;
|
|
const char *obj_class;
|
|
int rc;
|
|
int count;
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
char **attr_list;
|
|
|
|
/* first we try for a samba user or group mapping */
|
|
|
|
if ( id_type & ID_USERID ) {
|
|
type = get_attr_key2string( idpool_attr_list, LDAP_ATTR_UIDNUMBER );
|
|
obj_class = LDAP_OBJ_SAMBASAMACCOUNT;
|
|
fstr_sprintf(id_str, "%lu", (unsigned long)id.uid );
|
|
pstrcpy( suffix, lp_ldap_suffix());
|
|
}
|
|
else {
|
|
type = get_attr_key2string( idpool_attr_list, LDAP_ATTR_GIDNUMBER );
|
|
obj_class = LDAP_OBJ_GROUPMAP;
|
|
fstr_sprintf(id_str, "%lu", (unsigned long)id.gid );
|
|
pstrcpy( suffix, lp_ldap_group_suffix() );
|
|
}
|
|
|
|
DEBUG(5,("ldap_get_sid_from_id: Searching \"%s\"\n", filter ));
|
|
|
|
attr_list = get_attr_list( sidmap_attr_list );
|
|
pstr_sprintf(filter, "(&(|(objectClass=%s)(objectClass=%s))(%s=%s))",
|
|
LDAP_OBJ_IDMAP_ENTRY, obj_class, type, id_str);
|
|
|
|
rc = smbldap_search(ldap_state.smbldap_state, suffix, LDAP_SCOPE_SUBTREE,
|
|
filter, attr_list, 0, &result);
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
DEBUG(3,("ldap_get_isd_from_id: Failure looking up entry (%s)\n",
|
|
ldap_err2string(rc) ));
|
|
goto out;
|
|
}
|
|
|
|
count = ldap_count_entries(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
if (count > 1) {
|
|
DEBUG(0,("ldap_get_sid_from_id: mapping returned [%d] entries!\n",
|
|
count));
|
|
goto out;
|
|
}
|
|
|
|
/* fall back to looking up an idmap entry if we didn't find and
|
|
actual user or group */
|
|
|
|
if (count == 0) {
|
|
ldap_msgfree(result);
|
|
result = NULL;
|
|
|
|
pstr_sprintf(filter, "(&(objectClass=%s)(%s=%lu))",
|
|
LDAP_OBJ_IDMAP_ENTRY, type,
|
|
((id_type & ID_USERID) ? (unsigned long)id.uid :
|
|
(unsigned long)id.gid));
|
|
|
|
pstrcpy( suffix, lp_ldap_idmap_suffix() );
|
|
|
|
rc = smbldap_search(ldap_state.smbldap_state, suffix, LDAP_SCOPE_SUBTREE,
|
|
filter, attr_list, 0, &result);
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
DEBUG(3,("ldap_get_isd_from_id: Failure looking up entry (%s)\n",
|
|
ldap_err2string(rc) ));
|
|
goto out;
|
|
}
|
|
|
|
count = ldap_count_entries(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
if (count != 1) {
|
|
DEBUG(0,("ldap_get_sid_from_id: mapping not found for %s: %lu\n",
|
|
type, ((id_type & ID_USERID) ? (unsigned long)id.uid :
|
|
(unsigned long)id.gid)));
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
entry = ldap_first_entry(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
if ( !smbldap_get_single_attribute(ldap_state.smbldap_state->ldap_struct, entry, LDAP_ATTRIBUTE_SID, sid_str) )
|
|
goto out;
|
|
|
|
if (!string_to_sid(sid, sid_str))
|
|
goto out;
|
|
|
|
ret = NT_STATUS_OK;
|
|
out:
|
|
free_attr_list( attr_list );
|
|
|
|
if (result)
|
|
ldap_msgfree(result);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
Get an id from a sid
|
|
***********************************************************************/
|
|
|
|
static NTSTATUS ldap_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid)
|
|
{
|
|
LDAPMessage *result = NULL;
|
|
LDAPMessage *entry = NULL;
|
|
pstring sid_str;
|
|
pstring filter;
|
|
pstring id_str;
|
|
const char *suffix;
|
|
const char *type;
|
|
int rc;
|
|
int count;
|
|
char **attr_list;
|
|
char *dn = NULL;
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
|
|
sid_to_string(sid_str, sid);
|
|
|
|
DEBUG(8,("ldap_get_id_from_sid: %s (%s)\n", sid_str,
|
|
(*id_type & ID_GROUPID ? "group" : "user") ));
|
|
|
|
/* ahhh.... ok. We have to check users and groups in places other
|
|
than idmap (hint: we're a domain member of a Samba domain) */
|
|
|
|
if ( *id_type & ID_GROUPID ) {
|
|
|
|
type = get_attr_key2string( sidmap_attr_list, LDAP_ATTR_GIDNUMBER );
|
|
suffix = lp_ldap_group_suffix();
|
|
pstr_sprintf(filter, "(&(|(objectClass=%s)(objectClass=%s))(%s=%s))",
|
|
LDAP_OBJ_GROUPMAP, LDAP_OBJ_IDMAP_ENTRY,
|
|
get_attr_key2string( sidmap_attr_list, LDAP_ATTR_SID ),
|
|
sid_str);
|
|
|
|
}
|
|
else {
|
|
|
|
type = get_attr_key2string( sidmap_attr_list, LDAP_ATTR_UIDNUMBER );
|
|
suffix = lp_ldap_suffix();
|
|
pstr_sprintf(filter, "(&(|(&(objectClass=%s)(objectClass=%s))(objectClass=%s))(%s=%s))",
|
|
LDAP_OBJ_SAMBASAMACCOUNT, LDAP_OBJ_POSIXACCOUNT, LDAP_OBJ_IDMAP_ENTRY,
|
|
get_attr_key2string( sidmap_attr_list, LDAP_ATTR_SID ),
|
|
sid_str);
|
|
|
|
}
|
|
|
|
DEBUG(10,("ldap_get_id_from_sid: Searching for \"%s\"\n", filter));
|
|
|
|
/* do the search and check for errors */
|
|
|
|
attr_list = get_attr_list( sidmap_attr_list );
|
|
rc = smbldap_search(ldap_state.smbldap_state, suffix, LDAP_SCOPE_SUBTREE,
|
|
filter, attr_list, 0, &result);
|
|
|
|
if ( rc != LDAP_SUCCESS ) {
|
|
DEBUG(3,("ldap_get_id_from_sid: Failure looking up group mapping (%s)\n",
|
|
ldap_err2string(rc) ));
|
|
goto out;
|
|
}
|
|
|
|
count = ldap_count_entries(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
if ( count > 1 ) {
|
|
DEBUG(3,("ldap_get_id_from_sid: search \"%s\" returned [%d] entries. Bailing...\n",
|
|
filter, count));
|
|
goto out;
|
|
}
|
|
|
|
/* see if we need to do a search here */
|
|
|
|
if ( count == 0 ) {
|
|
|
|
if ( result ) {
|
|
ldap_msgfree(result);
|
|
result = NULL;
|
|
}
|
|
|
|
/* look in idmap suffix */
|
|
|
|
suffix = lp_ldap_idmap_suffix();
|
|
pstr_sprintf(filter, "(&(objectClass=%s)(%s=%s))",
|
|
LDAP_OBJ_IDMAP_ENTRY, LDAP_ATTRIBUTE_SID, sid_str);
|
|
|
|
rc = smbldap_search(ldap_state.smbldap_state, suffix, LDAP_SCOPE_SUBTREE,
|
|
filter, attr_list, 0, &result);
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
DEBUG(3,("ldap_get_id_from_sid: Failure looking up idmap entry (%s)\n",
|
|
ldap_err2string(rc) ));
|
|
goto out;
|
|
}
|
|
|
|
/* check for the number of entries returned */
|
|
|
|
count = ldap_count_entries(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
if ( count > 1 ) {
|
|
DEBUG(0, ("ldap_get_id_from_sid: (2nd) search %s returned [%d] entries!\n",
|
|
filter, count));
|
|
goto out;
|
|
}
|
|
|
|
|
|
/* try to allocate a new id if we still haven't found one */
|
|
|
|
if ( (count==0) && !(*id_type & ID_QUERY_ONLY) ) {
|
|
int i;
|
|
|
|
DEBUG(8,("ldap_get_id_from_sid: Allocating new id\n"));
|
|
|
|
for (i = 0; i < LDAP_MAX_ALLOC_ID; i++) {
|
|
ret = ldap_allocate_id(id, *id_type);
|
|
if ( NT_STATUS_IS_OK(ret) )
|
|
break;
|
|
}
|
|
|
|
if ( !NT_STATUS_IS_OK(ret) ) {
|
|
DEBUG(0,("ldap_allocate_id: cannot acquire id lock!\n"));
|
|
goto out;
|
|
}
|
|
|
|
DEBUG(10,("ldap_get_id_from_sid: Allocated new %cid [%ul]\n",
|
|
(*id_type & ID_GROUPID ? 'g' : 'u'), (uint32)id->uid ));
|
|
|
|
ret = ldap_set_mapping(sid, *id, *id_type);
|
|
|
|
/* all done */
|
|
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
DEBUG(10,("ldap_get_id_from_sid: success\n"));
|
|
|
|
entry = ldap_first_entry(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
dn = smbldap_get_dn(ldap_state.smbldap_state->ldap_struct, result);
|
|
if (!dn)
|
|
goto out;
|
|
|
|
DEBUG(10, ("Found mapping entry at dn=%s, looking for %s\n", dn, type));
|
|
|
|
if ( smbldap_get_single_attribute(ldap_state.smbldap_state->ldap_struct, entry, type, id_str) ) {
|
|
if ( (*id_type & ID_USERID) )
|
|
id->uid = strtoul(id_str, NULL, 10);
|
|
else
|
|
id->gid = strtoul(id_str, NULL, 10);
|
|
|
|
ret = NT_STATUS_OK;
|
|
goto out;
|
|
}
|
|
|
|
out:
|
|
free_attr_list( attr_list );
|
|
if (result)
|
|
ldap_msgfree(result);
|
|
SAFE_FREE(dn);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/***********************************************************************
|
|
This function cannot be called to modify a mapping, only set a new one
|
|
|
|
This takes a possible pointer to the existing entry for the UID or SID
|
|
involved.
|
|
***********************************************************************/
|
|
|
|
static NTSTATUS ldap_set_mapping_internals(const DOM_SID *sid, unid_t id,
|
|
int id_type, const char *ldap_dn,
|
|
LDAPMessage *entry)
|
|
{
|
|
pstring dn;
|
|
pstring id_str;
|
|
fstring type;
|
|
LDAPMod **mods = NULL;
|
|
int rc = -1;
|
|
int ldap_op;
|
|
fstring sid_string;
|
|
char **values = NULL;
|
|
int i;
|
|
|
|
sid_to_string( sid_string, sid );
|
|
|
|
if (ldap_dn) {
|
|
DEBUG(10, ("Adding new IDMAP mapping on DN: %s", ldap_dn));
|
|
ldap_op = LDAP_MOD_REPLACE;
|
|
pstrcpy( dn, ldap_dn );
|
|
} else {
|
|
ldap_op = LDAP_MOD_ADD;
|
|
pstr_sprintf(dn, "%s=%s,%s", get_attr_key2string( sidmap_attr_list, LDAP_ATTR_SID),
|
|
sid_string, lp_ldap_idmap_suffix());
|
|
}
|
|
|
|
if ( id_type & ID_USERID )
|
|
fstrcpy( type, get_attr_key2string( sidmap_attr_list, LDAP_ATTR_UIDNUMBER ) );
|
|
else
|
|
fstrcpy( type, get_attr_key2string( sidmap_attr_list, LDAP_ATTR_GIDNUMBER ) );
|
|
|
|
pstr_sprintf(id_str, "%lu", ((id_type & ID_USERID) ? (unsigned long)id.uid :
|
|
(unsigned long)id.gid));
|
|
|
|
if (entry)
|
|
values = ldap_get_values(ldap_state.smbldap_state->ldap_struct, entry, "objectClass");
|
|
|
|
if (values) {
|
|
BOOL found_idmap = False;
|
|
for (i=0; values[i]; i++) {
|
|
if (StrCaseCmp(values[i], LDAP_OBJ_IDMAP_ENTRY) == 0) {
|
|
found_idmap = True;
|
|
break;
|
|
}
|
|
}
|
|
if (!found_idmap)
|
|
smbldap_set_mod( &mods, LDAP_MOD_ADD,
|
|
"objectClass", LDAP_OBJ_IDMAP_ENTRY );
|
|
} else {
|
|
smbldap_set_mod( &mods, LDAP_MOD_ADD,
|
|
"objectClass", LDAP_OBJ_IDMAP_ENTRY );
|
|
}
|
|
|
|
smbldap_make_mod( ldap_state.smbldap_state->ldap_struct,
|
|
entry, &mods, type, id_str );
|
|
|
|
smbldap_make_mod( ldap_state.smbldap_state->ldap_struct,
|
|
entry, &mods,
|
|
get_attr_key2string(sidmap_attr_list, LDAP_ATTR_SID),
|
|
sid_string );
|
|
|
|
/* There may well be nothing at all to do */
|
|
if (mods) {
|
|
switch(ldap_op)
|
|
{
|
|
case LDAP_MOD_ADD:
|
|
smbldap_set_mod( &mods, LDAP_MOD_ADD,
|
|
"objectClass", LDAP_OBJ_SID_ENTRY );
|
|
rc = smbldap_add(ldap_state.smbldap_state, dn, mods);
|
|
break;
|
|
case LDAP_MOD_REPLACE:
|
|
rc = smbldap_modify(ldap_state.smbldap_state, dn, mods);
|
|
break;
|
|
}
|
|
|
|
ldap_mods_free( mods, True );
|
|
} else {
|
|
rc = LDAP_SUCCESS;
|
|
}
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
char *ld_error = NULL;
|
|
ldap_get_option(ldap_state.smbldap_state->ldap_struct, LDAP_OPT_ERROR_STRING,
|
|
&ld_error);
|
|
DEBUG(0,("ldap_set_mapping_internals: Failed to %s mapping from %s to %lu [%s]\n",
|
|
(ldap_op == LDAP_MOD_ADD) ? "add" : "replace",
|
|
sid_string, (unsigned long)((id_type & ID_USERID) ? id.uid : id.gid), type));
|
|
DEBUG(0, ("ldap_set_mapping_internals: Error was: %s (%s)\n", ld_error ? ld_error : "(NULL)", ldap_err2string (rc)));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
DEBUG(10,("ldap_set_mapping: Successfully created mapping from %s to %lu [%s]\n",
|
|
sid_string, ((id_type & ID_USERID) ? (unsigned long)id.uid :
|
|
(unsigned long)id.gid), type));
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
This function cannot be called to modify a mapping, only set a new one
|
|
***********************************************************************/
|
|
|
|
static NTSTATUS ldap_set_mapping(const DOM_SID *sid, unid_t id, int id_type)
|
|
{
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
char *dn = NULL;
|
|
LDAPMessage *result = NULL;
|
|
LDAPMessage *entry = NULL;
|
|
const char *type;
|
|
const char *obj_class;
|
|
const char *posix_obj_class;
|
|
const char *suffix;
|
|
fstring sid_str;
|
|
fstring id_str;
|
|
pstring filter;
|
|
char **attr_list;
|
|
int rc;
|
|
int count;
|
|
|
|
/* try for a samba user or group mapping (looking for an entry with a SID) */
|
|
if ( id_type & ID_USERID ) {
|
|
obj_class = LDAP_OBJ_SAMBASAMACCOUNT;
|
|
suffix = lp_ldap_suffix();
|
|
type = get_attr_key2string( idpool_attr_list, LDAP_ATTR_UIDNUMBER );
|
|
posix_obj_class = LDAP_OBJ_POSIXACCOUNT;
|
|
fstr_sprintf(id_str, "%lu", (unsigned long)id.uid );
|
|
}
|
|
else {
|
|
obj_class = LDAP_OBJ_GROUPMAP;
|
|
suffix = lp_ldap_group_suffix();
|
|
type = get_attr_key2string( idpool_attr_list, LDAP_ATTR_GIDNUMBER );
|
|
posix_obj_class = LDAP_OBJ_POSIXGROUP;
|
|
fstr_sprintf(id_str, "%lu", (unsigned long)id.gid );
|
|
}
|
|
|
|
sid_to_string(sid_str, sid);
|
|
pstr_sprintf(filter,
|
|
"(|"
|
|
"(&(|(objectClass=%s)(|(objectClass=%s)(objectClass=%s)))(%s=%s))"
|
|
"(&(objectClass=%s)(%s=%s))"
|
|
")",
|
|
/* objectClasses that might contain a SID */
|
|
LDAP_OBJ_SID_ENTRY, LDAP_OBJ_IDMAP_ENTRY, obj_class,
|
|
get_attr_key2string( sidmap_attr_list, LDAP_ATTR_SID ),
|
|
sid_str,
|
|
|
|
/* objectClasses that might contain a Unix UID/GID */
|
|
posix_obj_class,
|
|
/* Unix UID/GID specifier*/
|
|
type,
|
|
/* actual ID */
|
|
id_str);
|
|
|
|
attr_list = get_attr_list( sidmap_attr_list );
|
|
rc = smbldap_search(ldap_state.smbldap_state, suffix, LDAP_SCOPE_SUBTREE,
|
|
filter, attr_list, 0, &result);
|
|
free_attr_list( attr_list );
|
|
|
|
if (rc != LDAP_SUCCESS)
|
|
goto out;
|
|
|
|
count = ldap_count_entries(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
/* fall back to looking up an idmap entry if we didn't find anything under the idmap
|
|
user or group suffix */
|
|
|
|
if (count == 1) {
|
|
entry = ldap_first_entry(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
dn = smbldap_get_dn(ldap_state.smbldap_state->ldap_struct, result);
|
|
if (!dn)
|
|
goto out;
|
|
DEBUG(10, ("Found partial mapping entry at dn=%s, looking for %s\n", dn, type));
|
|
|
|
ret = ldap_set_mapping_internals(sid, id, id_type, dn, entry);
|
|
|
|
goto out;
|
|
} else if (count > 1) {
|
|
DEBUG(0, ("Too many entries trying to find DN to attach ldap \n"));
|
|
goto out;
|
|
}
|
|
|
|
ret = ldap_set_mapping_internals(sid, id, id_type, NULL, NULL);
|
|
|
|
out:
|
|
if (result)
|
|
ldap_msgfree(result);
|
|
SAFE_FREE(dn);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**********************************************************************
|
|
Verify the sambaUnixIdPool entry in the directiry.
|
|
**********************************************************************/
|
|
|
|
static NTSTATUS verify_idpool( void )
|
|
{
|
|
fstring filter;
|
|
int rc;
|
|
char **attr_list;
|
|
LDAPMessage *result = NULL;
|
|
LDAPMod **mods = NULL;
|
|
int count;
|
|
|
|
fstr_sprintf( filter, "(objectclass=%s)", LDAP_OBJ_IDPOOL );
|
|
|
|
attr_list = get_attr_list( idpool_attr_list );
|
|
rc = smbldap_search(ldap_state.smbldap_state, lp_ldap_idmap_suffix(),
|
|
LDAP_SCOPE_SUBTREE, filter, attr_list, 0, &result);
|
|
free_attr_list ( attr_list );
|
|
|
|
if (rc != LDAP_SUCCESS)
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
|
|
count = ldap_count_entries(ldap_state.smbldap_state->ldap_struct, result);
|
|
|
|
if ( count > 1 ) {
|
|
DEBUG(0,("ldap_idmap_init: multiple entries returned from %s (base == %s)\n",
|
|
filter, lp_ldap_idmap_suffix() ));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
else if (count == 0) {
|
|
uid_t luid, huid;
|
|
gid_t lgid, hgid;
|
|
fstring uid_str, gid_str;
|
|
|
|
if ( !lp_idmap_uid(&luid, &huid) || !lp_idmap_gid( &lgid, &hgid ) ) {
|
|
DEBUG(0,("ldap_idmap_init: idmap uid/gid parameters not specified\n"));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
fstr_sprintf( uid_str, "%lu", (unsigned long)luid );
|
|
fstr_sprintf( gid_str, "%lu", (unsigned long)lgid );
|
|
|
|
smbldap_set_mod( &mods, LDAP_MOD_ADD, "objectClass", LDAP_OBJ_IDPOOL );
|
|
smbldap_set_mod( &mods, LDAP_MOD_ADD,
|
|
get_attr_key2string(idpool_attr_list, LDAP_ATTR_UIDNUMBER), uid_str );
|
|
smbldap_set_mod( &mods, LDAP_MOD_ADD,
|
|
get_attr_key2string(idpool_attr_list, LDAP_ATTR_GIDNUMBER), gid_str );
|
|
|
|
rc = smbldap_modify(ldap_state.smbldap_state, lp_ldap_idmap_suffix(), mods);
|
|
}
|
|
|
|
return ( rc==LDAP_SUCCESS ? NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL );
|
|
}
|
|
|
|
/*****************************************************************************
|
|
Initialise idmap database.
|
|
*****************************************************************************/
|
|
|
|
static NTSTATUS ldap_idmap_init( char *params )
|
|
{
|
|
NTSTATUS nt_status;
|
|
|
|
ldap_state.mem_ctx = talloc_init("idmap_ldap");
|
|
if (!ldap_state.mem_ctx) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
/* assume location is the only parameter */
|
|
if (!NT_STATUS_IS_OK(nt_status =
|
|
smbldap_init(ldap_state.mem_ctx, params,
|
|
&ldap_state.smbldap_state))) {
|
|
talloc_destroy(ldap_state.mem_ctx);
|
|
return nt_status;
|
|
}
|
|
|
|
/* see if the idmap suffix and sub entries exists */
|
|
|
|
nt_status = verify_idpool();
|
|
if ( !NT_STATUS_IS_OK(nt_status) )
|
|
return nt_status;
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/*****************************************************************************
|
|
End the LDAP session
|
|
*****************************************************************************/
|
|
|
|
static NTSTATUS ldap_idmap_close(void)
|
|
{
|
|
|
|
smbldap_free_struct(&(ldap_state).smbldap_state);
|
|
talloc_destroy(ldap_state.mem_ctx);
|
|
|
|
DEBUG(5,("The connection to the LDAP server was closed\n"));
|
|
/* maybe free the results here --metze */
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/* This function doesn't make as much sense in an LDAP world since the calling
|
|
node doesn't really control the ID ranges */
|
|
static void ldap_idmap_status(void)
|
|
{
|
|
DEBUG(0, ("LDAP IDMAP Status not available\n"));
|
|
}
|
|
|
|
static struct idmap_methods ldap_methods = {
|
|
ldap_idmap_init,
|
|
ldap_allocate_rid,
|
|
ldap_allocate_id,
|
|
ldap_get_sid_from_id,
|
|
ldap_get_id_from_sid,
|
|
ldap_set_mapping,
|
|
ldap_idmap_close,
|
|
ldap_idmap_status
|
|
|
|
};
|
|
|
|
NTSTATUS idmap_ldap_init(void)
|
|
{
|
|
return smb_register_idmap(SMB_IDMAP_INTERFACE_VERSION, "ldap", &ldap_methods);
|
|
}
|