mirror of
https://github.com/samba-team/samba.git
synced 2025-01-12 09:18:10 +03:00
aa39cc37da
(This used to be commit 398bd14fc6
)
677 lines
18 KiB
C
677 lines
18 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
idmap TDB backend
|
|
|
|
Copyright (C) Tim Potter 2000
|
|
Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
|
|
Copyright (C) Simo Sorce 2003
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#undef DBGC_CLASS
|
|
#define DBGC_CLASS DBGC_IDMAP
|
|
|
|
/* High water mark keys */
|
|
#define HWM_GROUP "GROUP HWM"
|
|
#define HWM_USER "USER HWM"
|
|
|
|
/* idmap version determines auto-conversion */
|
|
#define IDMAP_VERSION 2
|
|
|
|
/* Globals */
|
|
static TDB_CONTEXT *idmap_tdb;
|
|
|
|
static struct idmap_state {
|
|
|
|
/* User and group id pool */
|
|
|
|
uid_t uid_low, uid_high; /* Range of uids to allocate */
|
|
gid_t gid_low, gid_high; /* Range of gids to allocate */
|
|
} idmap_state;
|
|
|
|
/**********************************************************************
|
|
allocate a new RID; We don't care if is a user or group
|
|
**********************************************************************/
|
|
|
|
static NTSTATUS db_allocate_rid(uint32 *rid, int rid_type)
|
|
{
|
|
uint32 lowrid, highrid;
|
|
uint32 tmp_rid;
|
|
|
|
/* can't handle group rids right now. This is such a mess.... */
|
|
|
|
if ( rid_type == GROUP_RID_TYPE )
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
|
|
/* cannot fail since idmap is only called winbindd */
|
|
|
|
get_free_rid_range( &lowrid, &highrid );
|
|
|
|
tmp_rid = lowrid;
|
|
|
|
if ( !tdb_change_uint32_atomic(idmap_tdb, "RID_COUNTER", &tmp_rid, RID_MULTIPLIER) ) {
|
|
DEBUG(3,("db_allocate_rid: Failed to locate next rid record in idmap db\n"));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
if ( tmp_rid > highrid ) {
|
|
DEBUG(0, ("db_allocate_rid: no RIDs available!\n"));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
*rid = tmp_rid;
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/**********************************************************************
|
|
Allocate either a user or group id from the pool
|
|
**********************************************************************/
|
|
|
|
static NTSTATUS db_allocate_id(unid_t *id, int id_type)
|
|
{
|
|
BOOL ret;
|
|
int hwm;
|
|
|
|
if (!id)
|
|
return NT_STATUS_INVALID_PARAMETER;
|
|
|
|
/* Get current high water mark */
|
|
switch (id_type & ID_TYPEMASK) {
|
|
case ID_USERID:
|
|
|
|
if ((hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) {
|
|
return NT_STATUS_INTERNAL_DB_ERROR;
|
|
}
|
|
|
|
/* check it is in the range */
|
|
if (hwm > idmap_state.uid_high) {
|
|
DEBUG(0, ("idmap Fatal Error: UID range full!! (max: %lu)\n",
|
|
(unsigned long)idmap_state.uid_high));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
/* fetch a new id and increment it */
|
|
ret = tdb_change_uint32_atomic(idmap_tdb, HWM_USER, (unsigned int *)&hwm, 1);
|
|
if (!ret) {
|
|
DEBUG(0, ("idmap_tdb: Fatal error while fetching a new id\n!"));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
/* recheck it is in the range */
|
|
if (hwm > idmap_state.uid_high) {
|
|
DEBUG(0, ("idmap Fatal Error: UID range full!! (max: %lu)\n",
|
|
(unsigned long)idmap_state.uid_high));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
(*id).uid = hwm;
|
|
DEBUG(10,("db_allocate_id: ID_USERID (*id).uid = %d\n", (unsigned int)hwm));
|
|
|
|
break;
|
|
case ID_GROUPID:
|
|
if ((hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) {
|
|
return NT_STATUS_INTERNAL_DB_ERROR;
|
|
}
|
|
|
|
/* check it is in the range */
|
|
if (hwm > idmap_state.gid_high) {
|
|
DEBUG(0, ("idmap Fatal Error: GID range full!! (max: %lu)\n",
|
|
(unsigned long)idmap_state.gid_high));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
/* fetch a new id and increment it */
|
|
ret = tdb_change_uint32_atomic(idmap_tdb, HWM_GROUP, (unsigned int *)&hwm, 1);
|
|
|
|
if (!ret) {
|
|
DEBUG(0, ("idmap_tdb: Fatal error while fetching a new id\n!"));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
/* recheck it is in the range */
|
|
if (hwm > idmap_state.gid_high) {
|
|
DEBUG(0, ("idmap Fatal Error: GID range full!! (max: %lu)\n",
|
|
(unsigned long)idmap_state.gid_high));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
(*id).gid = hwm;
|
|
DEBUG(10,("db_allocate_id: ID_GROUPID (*id).gid = %d\n", (unsigned int)hwm));
|
|
|
|
break;
|
|
default:
|
|
return NT_STATUS_INVALID_PARAMETER;
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/* Get a sid from an id */
|
|
static NTSTATUS internal_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type)
|
|
{
|
|
TDB_DATA key, data;
|
|
fstring keystr;
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
|
|
if (!sid)
|
|
return NT_STATUS_INVALID_PARAMETER;
|
|
|
|
switch (id_type & ID_TYPEMASK) {
|
|
case ID_USERID:
|
|
slprintf(keystr, sizeof(keystr), "UID %lu", (unsigned long)id.uid);
|
|
break;
|
|
case ID_GROUPID:
|
|
slprintf(keystr, sizeof(keystr), "GID %lu", (unsigned long)id.gid);
|
|
break;
|
|
default:
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
key.dptr = keystr;
|
|
key.dsize = strlen(keystr) + 1;
|
|
|
|
DEBUG(10,("internal_get_sid_from_id: fetching record %s\n", keystr ));
|
|
|
|
data = tdb_fetch(idmap_tdb, key);
|
|
|
|
if (data.dptr) {
|
|
if (string_to_sid(sid, data.dptr)) {
|
|
DEBUG(10,("internal_get_sid_from_id: fetching record %s -> %s\n", keystr, data.dptr ));
|
|
ret = NT_STATUS_OK;
|
|
}
|
|
SAFE_FREE(data.dptr);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Error codes for get_id_from_sid */
|
|
enum getidfromsiderr { GET_ID_FROM_SID_OK = 0, GET_ID_FROM_SID_NOTFOUND, GET_ID_FROM_SID_WRONG_TYPE, GET_ID_FROM_SID_ERR };
|
|
|
|
static enum getidfromsiderr internal_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid)
|
|
{
|
|
enum getidfromsiderr ret = GET_ID_FROM_SID_ERR;
|
|
fstring keystr;
|
|
TDB_DATA key, data;
|
|
int type = *id_type & ID_TYPEMASK;
|
|
|
|
/* Check if sid is present in database */
|
|
sid_to_string(keystr, sid);
|
|
|
|
key.dptr = keystr;
|
|
key.dsize = strlen(keystr) + 1;
|
|
|
|
DEBUG(10,("internal_get_id_from_sid: fetching record %s of type 0x%x\n", keystr, type ));
|
|
|
|
data = tdb_fetch(idmap_tdb, key);
|
|
if (!data.dptr) {
|
|
DEBUG(10,("internal_get_id_from_sid: record %s not found\n", keystr ));
|
|
return GET_ID_FROM_SID_NOTFOUND;
|
|
} else {
|
|
DEBUG(10,("internal_get_id_from_sid: record %s -> %s\n", keystr, data.dptr ));
|
|
}
|
|
|
|
if (type == ID_EMPTY || type == ID_USERID) {
|
|
fstring scanstr;
|
|
/* Parse and return existing uid */
|
|
fstrcpy(scanstr, "UID %d");
|
|
|
|
if (sscanf(data.dptr, scanstr, &((*id).uid)) == 1) {
|
|
/* uid ok? */
|
|
if (type == ID_EMPTY) {
|
|
*id_type = ID_USERID;
|
|
}
|
|
DEBUG(10,("internal_get_id_from_sid: %s fetching record %s -> %s \n",
|
|
(type == ID_EMPTY) ? "ID_EMPTY" : "ID_USERID",
|
|
keystr, data.dptr ));
|
|
ret = GET_ID_FROM_SID_OK;
|
|
} else {
|
|
ret = GET_ID_FROM_SID_WRONG_TYPE;
|
|
}
|
|
}
|
|
|
|
if ((ret != GET_ID_FROM_SID_OK) && (type == ID_EMPTY || type == ID_GROUPID)) {
|
|
fstring scanstr;
|
|
/* Parse and return existing gid */
|
|
fstrcpy(scanstr, "GID %d");
|
|
|
|
if (sscanf(data.dptr, scanstr, &((*id).gid)) == 1) {
|
|
/* gid ok? */
|
|
if (type == ID_EMPTY) {
|
|
*id_type = ID_GROUPID;
|
|
}
|
|
DEBUG(10,("internal_get_id_from_sid: %s fetching record %s -> %s \n",
|
|
(type == ID_EMPTY) ? "ID_EMPTY" : "ID_GROUPID",
|
|
keystr, data.dptr ));
|
|
ret = GET_ID_FROM_SID_OK;
|
|
} else {
|
|
ret = GET_ID_FROM_SID_WRONG_TYPE;
|
|
}
|
|
}
|
|
|
|
SAFE_FREE(data.dptr);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Get a sid from an id */
|
|
static NTSTATUS db_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type_in)
|
|
{
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
enum getidfromsiderr iderr;
|
|
int id_type = id_type_in & ID_TYPEMASK;
|
|
unid_t id_tmp = id;
|
|
int id_type_tmp = id_type;
|
|
|
|
DEBUG(10,("db_get_sid_from_id: id_type_in = 0x%x\n", id_type_in));
|
|
|
|
ret = internal_get_sid_from_id(sid, id, id_type);
|
|
if (!NT_STATUS_IS_OK(ret)) {
|
|
return ret;
|
|
}
|
|
|
|
iderr = internal_get_id_from_sid(&id_tmp, &id_type_tmp, sid);
|
|
if (iderr != GET_ID_FROM_SID_OK) {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
if (id_type_tmp != id_type) {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
} else if (id_type == ID_USERID) {
|
|
if (id_tmp.uid != id.uid) {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
} else if (id_type == ID_GROUPID) {
|
|
if (id_tmp.gid != id.gid) {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
} else {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
return ret;
|
|
}
|
|
/* Get an id from a sid */
|
|
static NTSTATUS db_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid)
|
|
{
|
|
NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
|
|
enum getidfromsiderr iderr;
|
|
|
|
DEBUG(10,("db_get_id_from_sid\n"));
|
|
|
|
if (!sid || !id || !id_type)
|
|
return NT_STATUS_INVALID_PARAMETER;
|
|
|
|
iderr = internal_get_id_from_sid(id, id_type, sid);
|
|
if (iderr == GET_ID_FROM_SID_OK) {
|
|
DOM_SID sid_tmp;
|
|
ret = internal_get_sid_from_id(&sid_tmp, *id, *id_type);
|
|
if (NT_STATUS_IS_OK(ret)) {
|
|
if (!sid_equal(&sid_tmp, sid)) {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
}
|
|
} else if (iderr == GET_ID_FROM_SID_WRONG_TYPE) {
|
|
/* We found a record but not the type we wanted.
|
|
* This is an error, not an opportunity to overwrite...
|
|
* JRA.
|
|
*/
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
if (!(*id_type & ID_QUERY_ONLY) && (iderr != GET_ID_FROM_SID_OK) &&
|
|
(((*id_type & ID_TYPEMASK) == ID_USERID)
|
|
|| (*id_type & ID_TYPEMASK) == ID_GROUPID)) {
|
|
TDB_DATA sid_data;
|
|
TDB_DATA ugid_data;
|
|
fstring sid_string;
|
|
|
|
sid_to_string(sid_string, sid);
|
|
|
|
sid_data.dptr = sid_string;
|
|
sid_data.dsize = strlen(sid_string)+1;
|
|
|
|
/* Lock the record for this SID. */
|
|
if (tdb_chainlock(idmap_tdb, sid_data) != 0) {
|
|
DEBUG(10,("db_get_id_from_sid: failed to lock record %s. Error %s\n",
|
|
sid_string, tdb_errorstr(idmap_tdb) ));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
do {
|
|
fstring ugid_str;
|
|
|
|
/* Allocate a new id for this sid */
|
|
ret = db_allocate_id(id, *id_type);
|
|
if (!NT_STATUS_IS_OK(ret))
|
|
break;
|
|
|
|
/* Store the UID side */
|
|
/* Store new id */
|
|
if (*id_type & ID_USERID) {
|
|
slprintf(ugid_str, sizeof(ugid_str), "UID %lu",
|
|
(unsigned long)((*id).uid));
|
|
} else {
|
|
slprintf(ugid_str, sizeof(ugid_str), "GID %lu",
|
|
(unsigned long)((*id).gid));
|
|
}
|
|
|
|
ugid_data.dptr = ugid_str;
|
|
ugid_data.dsize = strlen(ugid_str) + 1;
|
|
|
|
DEBUG(10,("db_get_id_from_sid: storing %s -> %s\n",
|
|
ugid_data.dptr, sid_data.dptr ));
|
|
|
|
if (tdb_store(idmap_tdb, ugid_data, sid_data, TDB_INSERT) != -1) {
|
|
ret = NT_STATUS_OK;
|
|
break;
|
|
}
|
|
if (tdb_error(idmap_tdb) != TDB_ERR_EXISTS)
|
|
DEBUG(10,("db_get_id_from_sid: error %s\n", tdb_errorstr(idmap_tdb) ));
|
|
ret = NT_STATUS_UNSUCCESSFUL;
|
|
} while (tdb_error(idmap_tdb) == TDB_ERR_EXISTS);
|
|
|
|
if (NT_STATUS_IS_OK(ret)) {
|
|
|
|
DEBUG(10,("db_get_id_from_sid: storing %s -> %s\n",
|
|
sid_data.dptr, ugid_data.dptr ));
|
|
|
|
if (tdb_store(idmap_tdb, sid_data, ugid_data, TDB_REPLACE) == -1) {
|
|
DEBUG(10,("db_get_id_from_sid: error %s\n", tdb_errorstr(idmap_tdb) ));
|
|
/* TODO: print tdb error !! */
|
|
tdb_chainunlock(idmap_tdb, sid_data);
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
}
|
|
|
|
tdb_chainunlock(idmap_tdb, sid_data);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static NTSTATUS db_set_mapping(const DOM_SID *sid, unid_t id, int id_type)
|
|
{
|
|
TDB_DATA ksid, kid, data;
|
|
fstring ksidstr;
|
|
fstring kidstr;
|
|
|
|
DEBUG(10,("db_set_mapping: id_type = 0x%x\n", id_type));
|
|
|
|
if (!sid)
|
|
return NT_STATUS_INVALID_PARAMETER;
|
|
|
|
sid_to_string(ksidstr, sid);
|
|
|
|
ksid.dptr = ksidstr;
|
|
ksid.dsize = strlen(ksidstr) + 1;
|
|
|
|
if (id_type & ID_USERID) {
|
|
slprintf(kidstr, sizeof(kidstr), "UID %lu", (unsigned long)id.uid);
|
|
} else if (id_type & ID_GROUPID) {
|
|
slprintf(kidstr, sizeof(kidstr), "GID %lu", (unsigned long)id.gid);
|
|
} else {
|
|
return NT_STATUS_INVALID_PARAMETER;
|
|
}
|
|
|
|
kid.dptr = kidstr;
|
|
kid.dsize = strlen(kidstr) + 1;
|
|
|
|
/* *DELETE* prevoius mappings if any.
|
|
* This is done both SID and [U|G]ID passed in */
|
|
|
|
/* Lock the record for this SID. */
|
|
if (tdb_chainlock(idmap_tdb, ksid) != 0) {
|
|
DEBUG(10,("db_set_mapping: failed to lock record %s. Error %s\n",
|
|
ksidstr, tdb_errorstr(idmap_tdb) ));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
DEBUG(10,("db_set_mapping: fetching %s\n", ksid.dptr));
|
|
|
|
data = tdb_fetch(idmap_tdb, ksid);
|
|
if (data.dptr) {
|
|
DEBUG(10,("db_set_mapping: deleting %s and %s\n", data.dptr, ksid.dptr ));
|
|
tdb_delete(idmap_tdb, data);
|
|
tdb_delete(idmap_tdb, ksid);
|
|
SAFE_FREE(data.dptr);
|
|
}
|
|
data = tdb_fetch(idmap_tdb, kid);
|
|
if (data.dptr) {
|
|
DEBUG(10,("db_set_mapping: deleting %s and %s\n", data.dptr, kid.dptr ));
|
|
tdb_delete(idmap_tdb, data);
|
|
tdb_delete(idmap_tdb, kid);
|
|
SAFE_FREE(data.dptr);
|
|
}
|
|
|
|
if (tdb_store(idmap_tdb, ksid, kid, TDB_INSERT) == -1) {
|
|
DEBUG(0, ("idb_set_mapping: tdb_store 1 error: %s\n", tdb_errorstr(idmap_tdb)));
|
|
tdb_chainunlock(idmap_tdb, ksid);
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
if (tdb_store(idmap_tdb, kid, ksid, TDB_INSERT) == -1) {
|
|
DEBUG(0, ("idb_set_mapping: tdb_store 2 error: %s\n", tdb_errorstr(idmap_tdb)));
|
|
tdb_chainunlock(idmap_tdb, ksid);
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
tdb_chainunlock(idmap_tdb, ksid);
|
|
DEBUG(10,("db_set_mapping: stored %s -> %s and %s -> %s\n", ksid.dptr, kid.dptr, kid.dptr, ksid.dptr ));
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/*****************************************************************************
|
|
Initialise idmap database.
|
|
*****************************************************************************/
|
|
|
|
static NTSTATUS db_idmap_init( char *params )
|
|
{
|
|
SMB_STRUCT_STAT stbuf;
|
|
char *tdbfile = NULL;
|
|
int32 version;
|
|
BOOL tdb_is_new = False;
|
|
|
|
/* use the old database if present */
|
|
tdbfile = strdup(lock_path("winbindd_idmap.tdb"));
|
|
if (!tdbfile) {
|
|
DEBUG(0, ("idmap_init: out of memory!\n"));
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
if (!file_exist(tdbfile, &stbuf)) {
|
|
tdb_is_new = True;
|
|
}
|
|
|
|
DEBUG(10,("db_idmap_init: Opening tdbfile %s\n", tdbfile ));
|
|
|
|
/* Open idmap repository */
|
|
if (!(idmap_tdb = tdb_open_log(tdbfile, 0,
|
|
TDB_DEFAULT, O_RDWR | O_CREAT,
|
|
0644))) {
|
|
DEBUG(0, ("idmap_init: Unable to open idmap database\n"));
|
|
SAFE_FREE(tdbfile);
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
SAFE_FREE(tdbfile);
|
|
|
|
if (tdb_is_new) {
|
|
/* the file didn't existed before opening it, let's
|
|
* store idmap version as nobody else yet opened and
|
|
* stored it. I do not like this method but didn't
|
|
* found a way to understand if an opened tdb have
|
|
* been just created or not --- SSS */
|
|
tdb_store_int32(idmap_tdb, "IDMAP_VERSION", IDMAP_VERSION);
|
|
}
|
|
|
|
/* check against earlier versions */
|
|
version = tdb_fetch_int32(idmap_tdb, "IDMAP_VERSION");
|
|
if (version != IDMAP_VERSION) {
|
|
DEBUG(0, ("idmap_init: Unable to open idmap database, it's in an old format!\n"));
|
|
return NT_STATUS_INTERNAL_DB_ERROR;
|
|
}
|
|
|
|
/* Create high water marks for group and user id */
|
|
if (!lp_idmap_uid(&idmap_state.uid_low, &idmap_state.uid_high)) {
|
|
DEBUG(1, ("idmap uid range missing or invalid\n"));
|
|
DEBUGADD(1, ("idmap will be unable to map foreign SIDs\n"));
|
|
} else {
|
|
if (tdb_fetch_int32(idmap_tdb, HWM_USER) == -1) {
|
|
if (tdb_store_int32(idmap_tdb, HWM_USER, idmap_state.uid_low) == -1) {
|
|
DEBUG(0, ("idmap_init: Unable to initialise user hwm in idmap database\n"));
|
|
return NT_STATUS_INTERNAL_DB_ERROR;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!lp_idmap_gid(&idmap_state.gid_low, &idmap_state.gid_high)) {
|
|
DEBUG(1, ("idmap gid range missing or invalid\n"));
|
|
DEBUGADD(1, ("idmap will be unable to map foreign SIDs\n"));
|
|
} else {
|
|
if (tdb_fetch_int32(idmap_tdb, HWM_GROUP) == -1) {
|
|
if (tdb_store_int32(idmap_tdb, HWM_GROUP, idmap_state.gid_low) == -1) {
|
|
DEBUG(0, ("idmap_init: Unable to initialise group hwm in idmap database\n"));
|
|
return NT_STATUS_INTERNAL_DB_ERROR;
|
|
}
|
|
}
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/* Close the tdb */
|
|
static NTSTATUS db_idmap_close(void)
|
|
{
|
|
if (idmap_tdb) {
|
|
if (tdb_close(idmap_tdb) == 0) {
|
|
return NT_STATUS_OK;
|
|
} else {
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/* Dump status information to log file. Display different stuff based on
|
|
the debug level:
|
|
|
|
Debug Level Information Displayed
|
|
=================================================================
|
|
0 Percentage of [ug]id range allocated
|
|
0 High water marks (next allocated ids)
|
|
*/
|
|
|
|
#define DUMP_INFO 0
|
|
|
|
static void db_idmap_status(void)
|
|
{
|
|
int user_hwm, group_hwm;
|
|
|
|
DEBUG(0, ("winbindd idmap status:\n"));
|
|
|
|
/* Get current high water marks */
|
|
|
|
if ((user_hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) {
|
|
DEBUG(DUMP_INFO,
|
|
("\tCould not get userid high water mark!\n"));
|
|
}
|
|
|
|
if ((group_hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) {
|
|
DEBUG(DUMP_INFO,
|
|
("\tCould not get groupid high water mark!\n"));
|
|
}
|
|
|
|
/* Display next ids to allocate */
|
|
|
|
if (user_hwm != -1) {
|
|
DEBUG(DUMP_INFO,
|
|
("\tNext userid to allocate is %d\n", user_hwm));
|
|
}
|
|
|
|
if (group_hwm != -1) {
|
|
DEBUG(DUMP_INFO,
|
|
("\tNext groupid to allocate is %d\n", group_hwm));
|
|
}
|
|
|
|
/* Display percentage of id range already allocated. */
|
|
|
|
if (user_hwm != -1) {
|
|
int num_users = user_hwm - idmap_state.uid_low;
|
|
int total_users =
|
|
idmap_state.uid_high - idmap_state.uid_low;
|
|
|
|
DEBUG(DUMP_INFO,
|
|
("\tUser id range is %d%% full (%d of %d)\n",
|
|
num_users * 100 / total_users, num_users,
|
|
total_users));
|
|
}
|
|
|
|
if (group_hwm != -1) {
|
|
int num_groups = group_hwm - idmap_state.gid_low;
|
|
int total_groups =
|
|
idmap_state.gid_high - idmap_state.gid_low;
|
|
|
|
DEBUG(DUMP_INFO,
|
|
("\tGroup id range is %d%% full (%d of %d)\n",
|
|
num_groups * 100 / total_groups, num_groups,
|
|
total_groups));
|
|
}
|
|
|
|
/* Display complete mapping of users and groups to rids */
|
|
}
|
|
|
|
/**********************************************************************
|
|
Return the TDB_CONTEXT* for winbindd_idmap. I **really** feel
|
|
dirty doing this, but not so dirty that I want to create another
|
|
tdb
|
|
***********************************************************************/
|
|
|
|
TDB_CONTEXT *idmap_tdb_handle( void )
|
|
{
|
|
if ( idmap_tdb )
|
|
return idmap_tdb;
|
|
|
|
/* go ahead an open it; db_idmap_init() doesn't use any params
|
|
right now */
|
|
|
|
db_idmap_init( NULL );
|
|
if ( idmap_tdb )
|
|
return idmap_tdb;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static struct idmap_methods db_methods = {
|
|
|
|
db_idmap_init,
|
|
db_allocate_rid,
|
|
db_allocate_id,
|
|
db_get_sid_from_id,
|
|
db_get_id_from_sid,
|
|
db_set_mapping,
|
|
db_idmap_close,
|
|
db_idmap_status
|
|
|
|
};
|
|
|
|
NTSTATUS idmap_tdb_init(void)
|
|
{
|
|
return smb_register_idmap(SMB_IDMAP_INTERFACE_VERSION, "tdb", &db_methods);
|
|
}
|