1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-12 09:18:10 +03:00
samba-mirror/source3/nsswitch/idmap.c
Gerald Carter c16059f1f0 r22713: Offline logon fixes for idmap manager:
(a) Ignore the negative cache when the domain is offline
(b) don't delete expired entries from the cache as these
    can be used when offline (same model as thw wcache entries)
(c) Delay idmap backend initialization when offline
    as the backend routines will not be called until we go
    online anyways.  This prevents idmap_init() from failing
    when a backend's init() function fails becuase of lack of
    network connectivity
(This used to be commit 4086ef15b3)
2007-10-10 12:21:49 -05:00

1465 lines
38 KiB
C

/*
Unix SMB/CIFS implementation.
ID Mapping
Copyright (C) Tim Potter 2000
Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
Copyright (C) Simo Sorce 2003
Copyright (C) Jeremy Allison 2006
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "includes.h"
#include "winbindd.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_IDMAP
static_decl_idmap;
struct idmap_backend {
const char *name;
struct idmap_methods *methods;
struct idmap_backend *prev, *next;
};
struct idmap_alloc_backend {
const char *name;
struct idmap_alloc_methods *methods;
struct idmap_alloc_backend *prev, *next;
};
struct idmap_cache_ctx;
struct idmap_alloc_context {
const char *params;
struct idmap_alloc_methods *methods;
BOOL initialized;
};
static TALLOC_CTX *idmap_ctx = NULL;
static struct idmap_cache_ctx *idmap_cache;
static struct idmap_backend *backends = NULL;
static struct idmap_domain **idmap_domains = NULL;
static int num_domains = 0;
static int pdb_dom_num = -1;
static int def_dom_num = -1;
static struct idmap_alloc_backend *alloc_backends = NULL;
static struct idmap_alloc_context *idmap_alloc_ctx = NULL;
#define IDMAP_CHECK_RET(ret) do { if ( ! NT_STATUS_IS_OK(ret)) { DEBUG(2, ("ERROR: NTSTATUS = 0x%08x\n", NT_STATUS_V(ret))); goto done; } } while(0)
#define IDMAP_REPORT_RET(ret) do { if ( ! NT_STATUS_IS_OK(ret)) { DEBUG(2, ("ERROR: NTSTATUS = 0x%08x\n", NT_STATUS_V(ret))); } } while(0)
#define IDMAP_CHECK_ALLOC(mem) do { if (!mem) { DEBUG(0, ("Out of memory!\n")); ret = NT_STATUS_NO_MEMORY; goto done; } } while(0)
static struct idmap_methods *get_methods(struct idmap_backend *be, const char *name)
{
struct idmap_backend *b;
for (b = be; b; b = b->next) {
if (strequal(b->name, name)) {
return b->methods;
}
}
return NULL;
}
static struct idmap_alloc_methods *get_alloc_methods(struct idmap_alloc_backend *be, const char *name)
{
struct idmap_alloc_backend *b;
for (b = be; b; b = b->next) {
if (strequal(b->name, name)) {
return b->methods;
}
}
return NULL;
}
BOOL idmap_is_offline(void)
{
return ( lp_winbind_offline_logon() &&
get_global_winbindd_state_offline() );
}
/**********************************************************************
Allow a module to register itself as a method.
**********************************************************************/
NTSTATUS smb_register_idmap(int version, const char *name, struct idmap_methods *methods)
{
struct idmap_methods *test;
struct idmap_backend *entry;
if (!idmap_ctx) {
return NT_STATUS_INTERNAL_DB_ERROR;
}
if ((version != SMB_IDMAP_INTERFACE_VERSION)) {
DEBUG(0, ("Failed to register idmap module.\n"
"The module was compiled against SMB_IDMAP_INTERFACE_VERSION %d,\n"
"current SMB_IDMAP_INTERFACE_VERSION is %d.\n"
"Please recompile against the current version of samba!\n",
version, SMB_IDMAP_INTERFACE_VERSION));
return NT_STATUS_OBJECT_TYPE_MISMATCH;
}
if (!name || !name[0] || !methods) {
DEBUG(0,("Called with NULL pointer or empty name!\n"));
return NT_STATUS_INVALID_PARAMETER;
}
test = get_methods(backends, name);
if (test) {
DEBUG(0,("Idmap module %s already registered!\n", name));
return NT_STATUS_OBJECT_NAME_COLLISION;
}
entry = talloc(idmap_ctx, struct idmap_backend);
if ( ! entry) {
DEBUG(0,("Out of memory!\n"));
return NT_STATUS_NO_MEMORY;
}
entry->name = talloc_strdup(idmap_ctx, name);
if ( ! entry->name) {
DEBUG(0,("Out of memory!\n"));
return NT_STATUS_NO_MEMORY;
}
entry->methods = methods;
DLIST_ADD(backends, entry);
DEBUG(5, ("Successfully added idmap backend '%s'\n", name));
return NT_STATUS_OK;
}
/**********************************************************************
Allow a module to register itself as a method.
**********************************************************************/
NTSTATUS smb_register_idmap_alloc(int version, const char *name, struct idmap_alloc_methods *methods)
{
struct idmap_alloc_methods *test;
struct idmap_alloc_backend *entry;
if (!idmap_ctx) {
return NT_STATUS_INTERNAL_DB_ERROR;
}
if ((version != SMB_IDMAP_INTERFACE_VERSION)) {
DEBUG(0, ("Failed to register idmap alloc module.\n"
"The module was compiled against SMB_IDMAP_INTERFACE_VERSION %d,\n"
"current SMB_IDMAP_INTERFACE_VERSION is %d.\n"
"Please recompile against the current version of samba!\n",
version, SMB_IDMAP_INTERFACE_VERSION));
return NT_STATUS_OBJECT_TYPE_MISMATCH;
}
if (!name || !name[0] || !methods) {
DEBUG(0,("Called with NULL pointer or empty name!\n"));
return NT_STATUS_INVALID_PARAMETER;
}
test = get_alloc_methods(alloc_backends, name);
if (test) {
DEBUG(0,("idmap_alloc module %s already registered!\n", name));
return NT_STATUS_OBJECT_NAME_COLLISION;
}
entry = talloc(idmap_ctx, struct idmap_alloc_backend);
if ( ! entry) {
DEBUG(0,("Out of memory!\n"));
return NT_STATUS_NO_MEMORY;
}
entry->name = talloc_strdup(idmap_ctx, name);
if ( ! entry->name) {
DEBUG(0,("Out of memory!\n"));
return NT_STATUS_NO_MEMORY;
}
entry->methods = methods;
DLIST_ADD(alloc_backends, entry);
DEBUG(5, ("Successfully added idmap alloc backend '%s'\n", name));
return NT_STATUS_OK;
}
static int close_domain_destructor(struct idmap_domain *dom)
{
NTSTATUS ret;
ret = dom->methods->close_fn(dom);
if (!NT_STATUS_IS_OK(ret)) {
DEBUG(3, ("Failed to close idmap domain [%s]!\n", dom->name));
}
return 0;
}
/**************************************************************************
Shutdown.
**************************************************************************/
NTSTATUS idmap_close(void)
{
/* close the alloc backend first before freeing idmap_ctx */
if (idmap_alloc_ctx) {
idmap_alloc_ctx->methods->close_fn();
idmap_alloc_ctx->methods = NULL;
}
alloc_backends = NULL;
/* this talloc_free call will fire the talloc destructors
* that will free all active backends resources */
TALLOC_FREE(idmap_ctx);
idmap_cache = NULL;
idmap_domains = NULL;
backends = NULL;
return NT_STATUS_OK;
}
/**********************************************************************
Initialise idmap cache and a remote backend (if configured).
**********************************************************************/
static const char *idmap_default_domain[] = { "default domain", NULL };
/****************************************************************************
****************************************************************************/
NTSTATUS idmap_init_cache(void)
{
/* Always initialize the cache. We'll have to delay initialization
of backends if we are offline */
if ( idmap_ctx ) {
return NT_STATUS_OK;
}
if ( (idmap_ctx = talloc_named_const(NULL, 0, "idmap_ctx")) == NULL ) {
return NT_STATUS_NO_MEMORY;
}
if ( (idmap_cache = idmap_cache_init(idmap_ctx)) == NULL ) {
return NT_STATUS_UNSUCCESSFUL;
}
return NT_STATUS_OK;
}
/****************************************************************************
****************************************************************************/
NTSTATUS idmap_init(void)
{
NTSTATUS ret;
static NTSTATUS idmap_init_status = NT_STATUS_UNSUCCESSFUL;
struct idmap_domain *dom;
char *compat_backend = NULL;
char *compat_params = NULL;
const char **dom_list = NULL;
char *alloc_backend = NULL;
BOOL default_already_defined = False;
BOOL pri_dom_is_in_list = False;
int compat = 0;
int i;
ret = idmap_init_cache();
if ( !NT_STATUS_IS_OK(ret) )
return ret;
if (NT_STATUS_IS_OK(idmap_init_status)) {
return NT_STATUS_OK;
}
/* We can't reliably call intialization code here unless
we are online. But return NT_STATUS_OK so the upper
level code doesn't abort idmap lookups. */
if ( get_global_winbindd_state_offline() ) {
idmap_init_status = NT_STATUS_FILE_IS_OFFLINE;
return NT_STATUS_OK;
}
static_init_idmap;
dom_list = lp_idmap_domains();
if ( lp_idmap_backend() ) {
const char **compat_list = lp_idmap_backend();
char *p = NULL;
const char *q = NULL;
if ( dom_list ) {
DEBUG(0, ("WARNING: idmap backend and idmap domains are "
"mutually excusive!\n"));
DEBUGADD(0,("idmap backend option will be IGNORED!\n"));
} else {
compat = 1;
if ( (compat_backend = talloc_strdup( idmap_ctx, *compat_list )) == NULL ) {
ret = NT_STATUS_NO_MEMORY;
goto done;
}
/* strip any leading idmap_ prefix of */
if (strncmp(*compat_list, "idmap_", 6) == 0 ) {
q = *compat_list += 6;
DEBUG(0, ("WARNING: idmap backend uses obsolete and "
"deprecated 'idmap_' prefix.\n"
"Please replace 'idmap_%s' by '%s' in %s\n",
q, q, dyn_CONFIGFILE));
compat_backend = talloc_strdup( idmap_ctx, q);
} else {
compat_backend = talloc_strdup( idmap_ctx, *compat_list);
}
/* separate the backend and module arguements */
if ((p = strchr(compat_backend, ':')) != NULL) {
*p = '\0';
compat_params = p + 1;
}
}
} else if ( !dom_list ) {
/* Back compatible: without idmap domains and explicit
idmap backend. Taking default idmap backend: tdb */
compat = 1;
compat_backend = talloc_strdup( idmap_ctx, "tdb");
compat_params = compat_backend;
}
if ( ! dom_list) {
dom_list = idmap_default_domain;
}
/***************************
* initialize idmap domains
*/
DEBUG(1, ("Initializing idmap domains\n"));
for (i = 0; dom_list[i]; i++) {
const char *parm_backend;
char *config_option;
/* ignore BUILTIN and local MACHINE domains */
if ( strequal(dom_list[i], "BUILTIN")
|| strequal(dom_list[i], get_global_sam_name() ) )
{
DEBUG(0,("idmap_init: Ignoring invalid domain %s\n",
dom_list[i]));
continue;
}
if (strequal(dom_list[i], lp_workgroup())) {
pri_dom_is_in_list = True;
}
/* init domain */
dom = TALLOC_ZERO_P(idmap_ctx, struct idmap_domain);
IDMAP_CHECK_ALLOC(dom);
dom->name = talloc_strdup(dom, dom_list[i]);
IDMAP_CHECK_ALLOC(dom->name);
config_option = talloc_asprintf(dom, "idmap config %s", dom->name);
IDMAP_CHECK_ALLOC(config_option);
/* default or specific ? */
dom->default_domain = lp_parm_bool(-1, config_option, "default", False);
if (dom->default_domain ||
strequal(dom_list[i], idmap_default_domain[0])) {
/* make sure this is set even when we match idmap_default_domain[0] */
dom->default_domain = True;
if (default_already_defined) {
DEBUG(1, ("ERROR: Multiple domains defined as default!\n"));
ret = NT_STATUS_INVALID_PARAMETER;
goto done;
}
default_already_defined = True;
}
dom->readonly = lp_parm_bool(-1, config_option, "readonly", False);
/* find associated backend (default: tdb) */
if (compat) {
parm_backend = talloc_strdup(idmap_ctx, compat_backend);
} else {
parm_backend = talloc_strdup(idmap_ctx,
lp_parm_const_string(-1, config_option, "backend", "tdb"));
}
IDMAP_CHECK_ALLOC(parm_backend);
/* get the backend methods for this domain */
dom->methods = get_methods(backends, parm_backend);
if ( ! dom->methods) {
ret = smb_probe_module("idmap", parm_backend);
if (NT_STATUS_IS_OK(ret)) {
dom->methods = get_methods(backends, parm_backend);
}
}
if ( ! dom->methods) {
DEBUG(0, ("ERROR: Could not get methods for backend %s\n", parm_backend));
ret = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* check the set_mapping function exists otherwise mark the module as readonly */
if ( ! dom->methods->set_mapping) {
DEBUG(5, ("Forcing to readonly, as ithis module can't store arbitrary mappings.\n"));
dom->readonly = True;
}
/* now that we have methods, set the destructor for this domain */
talloc_set_destructor(dom, close_domain_destructor);
if (compat_params) {
dom->params = talloc_strdup(dom, compat_params);
IDMAP_CHECK_ALLOC(dom->params);
} else {
dom->params = NULL;
}
/* Finally instance a backend copy for this domain */
ret = dom->methods->init(dom);
if ( ! NT_STATUS_IS_OK(ret)) {
DEBUG(0, ("ERROR: Initialization failed for backend %s (domain %s), deferred!\n",
parm_backend, dom->name));
}
idmap_domains = talloc_realloc(idmap_ctx, idmap_domains, struct idmap_domain *, i+1);
if ( ! idmap_domains) {
DEBUG(0, ("Out of memory!\n"));
ret = NT_STATUS_NO_MEMORY;
goto done;
}
idmap_domains[i] = dom;
if (dom->default_domain) { /* save default domain position for future uses */
def_dom_num = i;
}
DEBUG(10, ("Domain %s - Backend %s - %sdefault - %sreadonly\n",
dom->name, parm_backend,
dom->default_domain?"":"not ", dom->readonly?"":"not "));
talloc_free(config_option);
}
/* save the number of domains we have */
num_domains = i;
/* automatically add idmap_nss backend if needed */
if ((lp_server_role() == ROLE_DOMAIN_MEMBER) &&
( ! pri_dom_is_in_list) &&
lp_winbind_trusted_domains_only()) {
dom = TALLOC_ZERO_P(idmap_ctx, struct idmap_domain);
IDMAP_CHECK_ALLOC(dom);
dom->name = talloc_strdup(dom, lp_workgroup());
IDMAP_CHECK_ALLOC(dom->name);
dom->default_domain = False;
dom->readonly = True;
/* get the backend methods for passdb */
dom->methods = get_methods(backends, "nss");
/* (the nss module is always statically linked) */
if ( ! dom->methods) {
DEBUG(0, ("ERROR: Could not get methods for idmap_nss ?!\n"));
ret = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* now that we have methods, set the destructor for this domain */
talloc_set_destructor(dom, close_domain_destructor);
if (compat_params) {
dom->params = talloc_strdup(dom, compat_params);
IDMAP_CHECK_ALLOC(dom->params);
} else {
dom->params = NULL;
}
/* Finally instance a backend copy for this domain */
ret = dom->methods->init(dom);
if ( ! NT_STATUS_IS_OK(ret)) {
DEBUG(0, ("ERROR: Initialization failed for idmap_nss ?!\n"));
ret = NT_STATUS_UNSUCCESSFUL;
goto done;
}
idmap_domains = talloc_realloc(idmap_ctx, idmap_domains, struct idmap_domain *, num_domains+1);
if ( ! idmap_domains) {
DEBUG(0, ("Out of memory!\n"));
ret = NT_STATUS_NO_MEMORY;
goto done;
}
idmap_domains[num_domains] = dom;
DEBUG(10, ("Domain %s - Backend nss - not default - readonly\n", dom->name ));
num_domains++;
}
/**** automatically add idmap_passdb backend ****/
dom = TALLOC_ZERO_P(idmap_ctx, struct idmap_domain);
IDMAP_CHECK_ALLOC(dom);
dom->name = talloc_strdup(dom, get_global_sam_name());
IDMAP_CHECK_ALLOC(dom->name);
dom->default_domain = False;
dom->readonly = True;
/* get the backend methods for passdb */
dom->methods = get_methods(backends, "passdb");
/* (the passdb module is always statically linked) */
if ( ! dom->methods) {
DEBUG(0, ("ERROR: Could not get methods for idmap_passdb ?!\n"));
ret = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* now that we have methods, set the destructor for this domain */
talloc_set_destructor(dom, close_domain_destructor);
if (compat_params) {
dom->params = talloc_strdup(dom, compat_params);
IDMAP_CHECK_ALLOC(dom->params);
} else {
dom->params = NULL;
}
/* Finally instance a backend copy for this domain */
ret = dom->methods->init(dom);
if ( ! NT_STATUS_IS_OK(ret)) {
DEBUG(0, ("ERROR: Initialization failed for idmap_passdb ?!\n"));
ret = NT_STATUS_UNSUCCESSFUL;
goto done;
}
idmap_domains = talloc_realloc(idmap_ctx, idmap_domains, struct idmap_domain *, num_domains+1);
if ( ! idmap_domains) {
DEBUG(0, ("Out of memory!\n"));
ret = NT_STATUS_NO_MEMORY;
goto done;
}
idmap_domains[num_domains] = dom;
/* needed to handle special BUILTIN and wellknown SIDs cases */
pdb_dom_num = num_domains;
DEBUG(10, ("Domain %s - Backend passdb - not default - readonly\n", dom->name));
num_domains++;
/**** finished adding idmap_passdb backend ****/
/* sort domains so that the default is the last one */
/* don't sort if no default domain defined */
if (def_dom_num != -1 && def_dom_num != num_domains-1) { /* default is not last, move it */
struct idmap_domain *tmp;
if (pdb_dom_num > def_dom_num) {
pdb_dom_num --;
} else if (pdb_dom_num == def_dom_num) { /* ?? */
pdb_dom_num = num_domains - 1;
}
tmp = idmap_domains[def_dom_num];
for (i = def_dom_num; i < num_domains-1; i++) {
idmap_domains[i] = idmap_domains[i+1];
}
idmap_domains[i] = tmp;
def_dom_num = i;
}
/* Initialize alloc module */
DEBUG(3, ("Initializing idmap alloc module\n"));
alloc_backend = NULL;
if (compat) {
alloc_backend = talloc_strdup(idmap_ctx, compat_backend);
} else {
char *ab = lp_idmap_alloc_backend();
if (ab && (ab[0] != '\0')) {
alloc_backend = talloc_strdup(idmap_ctx, lp_idmap_alloc_backend());
}
}
if ( alloc_backend ) {
idmap_alloc_ctx = TALLOC_ZERO_P(idmap_ctx, struct idmap_alloc_context);
IDMAP_CHECK_ALLOC(idmap_alloc_ctx);
idmap_alloc_ctx->methods = get_alloc_methods(alloc_backends, alloc_backend);
if ( ! idmap_alloc_ctx->methods) {
ret = smb_probe_module("idmap", alloc_backend);
if (NT_STATUS_IS_OK(ret)) {
idmap_alloc_ctx->methods = get_alloc_methods(alloc_backends, alloc_backend);
}
}
if (idmap_alloc_ctx->methods) {
if (compat_params) {
idmap_alloc_ctx->params = talloc_strdup(idmap_alloc_ctx, compat_params);
IDMAP_CHECK_ALLOC(idmap_alloc_ctx->params);
} else {
idmap_alloc_ctx->params = NULL;
}
ret = idmap_alloc_ctx->methods->init(idmap_alloc_ctx->params);
if ( ! NT_STATUS_IS_OK(ret)) {
DEBUG(0, ("ERROR: Initialization failed for alloc "
"backend %s, deferred!\n", alloc_backend));
} else {
idmap_alloc_ctx->initialized = True;
}
} else {
DEBUG(2, ("idmap_init: Unable to get methods for alloc backend %s\n",
alloc_backend));
/* certain compat backends are just readonly */
if ( compat ) {
TALLOC_FREE(idmap_alloc_ctx);
ret = NT_STATUS_OK;
} else {
ret = NT_STATUS_UNSUCCESSFUL;
}
}
}
/* cleanpu temporary strings */
TALLOC_FREE( compat_backend );
idmap_init_status = NT_STATUS_OK;
return ret;
done:
DEBUG(0, ("Aborting IDMAP Initialization ...\n"));
idmap_close();
return ret;
}
static NTSTATUS idmap_alloc_init(void)
{
NTSTATUS ret;
if (! NT_STATUS_IS_OK(ret = idmap_init())) {
return ret;
}
if ( ! idmap_alloc_ctx) {
return NT_STATUS_NOT_SUPPORTED;
}
if ( ! idmap_alloc_ctx->initialized) {
ret = idmap_alloc_ctx->methods->init(idmap_alloc_ctx->params);
if ( ! NT_STATUS_IS_OK(ret)) {
DEBUG(0, ("ERROR: Initialization failed for alloc "
"backend, deferred!\n"));
return ret;
} else {
idmap_alloc_ctx->initialized = True;
}
}
return NT_STATUS_OK;
}
/**************************************************************************
idmap allocator interface functions
**************************************************************************/
NTSTATUS idmap_allocate_uid(struct unixid *id)
{
NTSTATUS ret;
if (! NT_STATUS_IS_OK(ret = idmap_alloc_init())) {
return ret;
}
id->type = ID_TYPE_UID;
return idmap_alloc_ctx->methods->allocate_id(id);
}
NTSTATUS idmap_allocate_gid(struct unixid *id)
{
NTSTATUS ret;
if (! NT_STATUS_IS_OK(ret = idmap_alloc_init())) {
return ret;
}
id->type = ID_TYPE_GID;
return idmap_alloc_ctx->methods->allocate_id(id);
}
NTSTATUS idmap_set_uid_hwm(struct unixid *id)
{
NTSTATUS ret;
if (! NT_STATUS_IS_OK(ret = idmap_alloc_init())) {
return ret;
}
id->type = ID_TYPE_UID;
return idmap_alloc_ctx->methods->set_id_hwm(id);
}
NTSTATUS idmap_set_gid_hwm(struct unixid *id)
{
NTSTATUS ret;
if (! NT_STATUS_IS_OK(ret = idmap_alloc_init())) {
return ret;
}
id->type = ID_TYPE_GID;
return idmap_alloc_ctx->methods->set_id_hwm(id);
}
/******************************************************************************
Lookup an idmap_domain give a full user or group SID
******************************************************************************/
static struct idmap_domain* find_idmap_domain_from_sid( DOM_SID *account_sid )
{
DOM_SID domain_sid;
uint32 rid;
struct winbindd_domain *domain = NULL;
int i;
/* 1. Handle BUILTIN or Special SIDs and prevent them from
falling into the default domain space (if we have a
configured passdb backend. */
if ( (pdb_dom_num != -1) &&
(sid_check_is_in_builtin(account_sid) ||
sid_check_is_in_wellknown_domain(account_sid) ||
sid_check_is_in_unix_groups(account_sid) ||
sid_check_is_in_unix_users(account_sid)) )
{
return idmap_domains[pdb_dom_num];
}
/* 2. Lookup the winbindd_domain from the account_sid */
sid_copy( &domain_sid, account_sid );
sid_split_rid( &domain_sid, &rid );
domain = find_domain_from_sid_noinit( &domain_sid );
for (i = 0; domain && i < num_domains; i++) {
if ( strequal( idmap_domains[i]->name, domain->name ) ) {
return idmap_domains[i];
}
}
/* 3. Fall back to the default domain */
if ( def_dom_num != -1 ) {
return idmap_domains[def_dom_num];
}
return NULL;
}
/******************************************************************************
Lookup an index given an idmap_domain pointer
******************************************************************************/
static uint32 find_idmap_domain_index( struct idmap_domain *id_domain)
{
int i;
for (i = 0; i < num_domains; i++) {
if ( idmap_domains[i] == id_domain )
return i;
}
return -1;
}
/*********************************************************
Check if creating a mapping is permitted for the domain
*********************************************************/
static NTSTATUS idmap_can_map(const struct id_map *map, struct idmap_domain **ret_dom)
{
struct idmap_domain *dom;
/* Check we do not create mappings for our own local domain, or BUILTIN or special SIDs */
if ((sid_compare_domain(map->sid, get_global_sam_sid()) == 0) ||
sid_check_is_in_builtin(map->sid) ||
sid_check_is_in_wellknown_domain(map->sid)) {
DEBUG(10, ("We are not supposed to create mappings for our own domains (local, builtin, specials)\n"));
return NT_STATUS_UNSUCCESSFUL;
}
/* Special check for trusted domain only = Yes */
if (lp_winbind_trusted_domains_only()) {
struct winbindd_domain *wdom = find_our_domain();
if (wdom && (sid_compare_domain(map->sid, &wdom->sid) == 0)) {
DEBUG(10, ("We are not supposed to create mappings for our primary domain when <trusted domain only> is True\n"));
DEBUGADD(10, ("Leave [%s] unmapped\n", sid_string_static(map->sid)));
return NT_STATUS_UNSUCCESSFUL;
}
}
if ( (dom = find_idmap_domain_from_sid( map->sid )) == NULL ) {
/* huh, couldn't find a suitable domain, let's just leave it unmapped */
DEBUG(10, ("Could not find idmap backend for SID %s", sid_string_static(map->sid)));
return NT_STATUS_NO_SUCH_DOMAIN;
}
if (dom->readonly) {
/* ouch the domain is read only, let's just leave it unmapped */
DEBUG(10, ("idmap backend for SID %s is READONLY!\n", sid_string_static(map->sid)));
return NT_STATUS_UNSUCCESSFUL;
}
*ret_dom = dom;
return NT_STATUS_OK;
}
static NTSTATUS idmap_new_mapping(TALLOC_CTX *ctx, struct id_map *map)
{
NTSTATUS ret;
struct idmap_domain *dom;
/* If we are offline we cannot lookup SIDs, deny mapping */
if (idmap_is_offline()) {
return NT_STATUS_FILE_IS_OFFLINE;
}
ret = idmap_can_map(map, &dom);
if ( ! NT_STATUS_IS_OK(ret)) {
return NT_STATUS_NONE_MAPPED;
}
/* check if this is a valid SID and then map it */
switch (map->xid.type) {
case ID_TYPE_UID:
ret = idmap_allocate_uid(&map->xid);
if ( ! NT_STATUS_IS_OK(ret)) {
/* can't allocate id, let's just leave it unmapped */
DEBUG(2, ("uid allocation failed! Can't create mapping\n"));
return NT_STATUS_NONE_MAPPED;
}
break;
case ID_TYPE_GID:
ret = idmap_allocate_gid(&map->xid);
if ( ! NT_STATUS_IS_OK(ret)) {
/* can't allocate id, let's just leave it unmapped */
DEBUG(2, ("gid allocation failed! Can't create mapping\n"));
return NT_STATUS_NONE_MAPPED;
}
break;
default:
/* invalid sid, let's just leave it unmapped */
DEBUG(3,("idmap_new_mapping: Refusing to create a "
"mapping for an unspecified ID type.\n"));
return NT_STATUS_NONE_MAPPED;
}
/* ok, got a new id, let's set a mapping */
map->status = ID_MAPPED;
DEBUG(10, ("Setting mapping: %s <-> %s %lu\n",
sid_string_static(map->sid),
(map->xid.type == ID_TYPE_UID) ? "UID" : "GID",
(unsigned long)map->xid.id));
ret = dom->methods->set_mapping(dom, map);
if ( ! NT_STATUS_IS_OK(ret)) {
/* something wrong here :-( */
DEBUG(2, ("Failed to commit mapping\n!"));
/* TODO: would it make sense to have an "unalloc_id function?" */
return NT_STATUS_NONE_MAPPED;
}
return NT_STATUS_OK;
}
static NTSTATUS idmap_backends_set_mapping(const struct id_map *map)
{
struct idmap_domain *dom;
NTSTATUS ret;
DEBUG(10, ("Setting mapping %s <-> %s %lu\n",
sid_string_static(map->sid),
(map->xid.type == ID_TYPE_UID) ? "UID" : "GID",
(unsigned long)map->xid.id));
ret = idmap_can_map(map, &dom);
if ( ! NT_STATUS_IS_OK(ret)) {
return ret;
}
DEBUG(10,("set_mapping for domain %s\n", dom->name ));
return dom->methods->set_mapping(dom, map);
}
static NTSTATUS idmap_backends_unixids_to_sids(struct id_map **ids)
{
struct idmap_domain *dom;
struct id_map **unmapped;
struct id_map **_ids;
TALLOC_CTX *ctx;
NTSTATUS ret;
int i, u, n;
if (!ids || !*ids) {
DEBUG(1, ("Invalid list of maps\n"));
return NT_STATUS_INVALID_PARAMETER;
}
ctx = talloc_named_const(NULL, 0, "idmap_backends_unixids_to_sids ctx");
if ( ! ctx) {
DEBUG(0, ("Out of memory!\n"));
return NT_STATUS_NO_MEMORY;
}
DEBUG(10, ("Query backends to map ids->sids\n"));
/* start from the default (the last one) and then if there are still
* unmapped entries cycle through the others */
_ids = ids;
unmapped = NULL;
for (n = num_domains-1; n >= 0; n--) { /* cycle backwards */
dom = idmap_domains[n];
DEBUG(10, ("Query sids from domain %s\n", dom->name));
ret = dom->methods->unixids_to_sids(dom, _ids);
IDMAP_REPORT_RET(ret);
unmapped = NULL;
for (i = 0, u = 0; _ids[i]; i++) {
if (_ids[i]->status != ID_MAPPED) {
unmapped = talloc_realloc(ctx, unmapped, struct id_map *, u + 2);
IDMAP_CHECK_ALLOC(unmapped);
unmapped[u] = _ids[i];
u++;
}
}
if (unmapped) {
/* terminate the unmapped list */
unmapped[u] = NULL;
} else { /* no more entries, get out */
break;
}
_ids = unmapped;
}
if (unmapped) {
/* there are still unmapped ids, map them to the unix users/groups domains */
/* except for expired entries, these will be returned as valid (offline mode) */
for (i = 0; unmapped[i]; i++) {
if (unmapped[i]->status == ID_EXPIRED) continue;
switch (unmapped[i]->xid.type) {
case ID_TYPE_UID:
uid_to_unix_users_sid((uid_t)unmapped[i]->xid.id, unmapped[i]->sid);
unmapped[i]->status = ID_MAPPED;
break;
case ID_TYPE_GID:
gid_to_unix_groups_sid((gid_t)unmapped[i]->xid.id, unmapped[i]->sid);
unmapped[i]->status = ID_MAPPED;
break;
default: /* what?! */
unmapped[i]->status = ID_UNKNOWN;
break;
}
}
}
ret = NT_STATUS_OK;
done:
talloc_free(ctx);
return ret;
}
static NTSTATUS idmap_backends_sids_to_unixids(struct id_map **ids)
{
struct id_map ***dom_ids;
struct idmap_domain *dom;
TALLOC_CTX *ctx;
NTSTATUS ret;
int i, *counters;
if ( (ctx = talloc_named_const(NULL, 0, "be_sids_to_ids")) == NULL ) {
DEBUG(1, ("failed to allocate talloc context, OOM?\n"));
return NT_STATUS_NO_MEMORY;
}
DEBUG(10, ("Query backends to map sids->ids\n"));
/* split list per domain */
if (num_domains == 0) {
DEBUG(1, ("No domains available?\n"));
return NT_STATUS_UNSUCCESSFUL;
}
dom_ids = TALLOC_ZERO_ARRAY(ctx, struct id_map **, num_domains);
IDMAP_CHECK_ALLOC(dom_ids);
counters = TALLOC_ZERO_ARRAY(ctx, int, num_domains);
IDMAP_CHECK_ALLOC(counters);
/* partition the requests by domain */
for (i = 0; ids[i]; i++) {
uint32 idx;
if ( (dom = find_idmap_domain_from_sid( ids[i]->sid )) == NULL ) {
/* no available idmap_domain. Move on */
continue;
}
DEBUG(10,("SID %s is being handled by %s\n",
sid_string_static(ids[i]->sid),
dom ? dom->name : "none" ));
idx = find_idmap_domain_index( dom );
SMB_ASSERT( idx != -1 );
dom_ids[idx] = talloc_realloc(ctx, dom_ids[idx],
struct id_map *, counters[idx] + 2);
IDMAP_CHECK_ALLOC(dom_ids[idx]);
dom_ids[idx][counters[idx]] = ids[i];
counters[idx]++;
dom_ids[idx][counters[idx]] = NULL;
}
/* All the ids have been dispatched in the right queues.
Let's cycle through the filled ones */
for (i = 0; i < num_domains; i++) {
if (dom_ids[i]) {
dom = idmap_domains[i];
DEBUG(10, ("Query ids from domain %s\n", dom->name));
ret = dom->methods->sids_to_unixids(dom, dom_ids[i]);
IDMAP_REPORT_RET(ret);
}
}
/* ok all the backends have been contacted at this point */
/* let's see if we have any unmapped SID left and act accordingly */
for (i = 0; ids[i]; i++) {
/* NOTE: this will NOT touch ID_EXPIRED entries that the backend
* was not able to confirm/deny (offline mode) */
if (ids[i]->status == ID_UNKNOWN || ids[i]->status == ID_UNMAPPED) {
/* ok this is an unmapped one, see if we can map it */
ret = idmap_new_mapping(ctx, ids[i]);
if (NT_STATUS_IS_OK(ret)) {
/* successfully mapped */
ids[i]->status = ID_MAPPED;
} else if (NT_STATUS_EQUAL(ret, NT_STATUS_NONE_MAPPED)) {
/* could not map it */
ids[i]->status = ID_UNMAPPED;
} else {
/* Something very bad happened down there
* OR we are offline */
ids[i]->status = ID_UNKNOWN;
}
}
}
ret = NT_STATUS_OK;
done:
talloc_free(ctx);
return ret;
}
/**************************************************************************
idmap interface functions
**************************************************************************/
NTSTATUS idmap_unixids_to_sids(struct id_map **ids)
{
TALLOC_CTX *ctx;
NTSTATUS ret;
struct id_map **bids;
int i, bi;
int bn = 0;
struct winbindd_domain *our_domain = find_our_domain();
if (! NT_STATUS_IS_OK(ret = idmap_init())) {
return ret;
}
if (!ids || !*ids) {
DEBUG(1, ("Invalid list of maps\n"));
return NT_STATUS_INVALID_PARAMETER;
}
ctx = talloc_named_const(NULL, 0, "idmap_unixids_to_sids ctx");
if ( ! ctx) {
DEBUG(1, ("failed to allocate talloc context, OOM?\n"));
return NT_STATUS_NO_MEMORY;
}
/* no ids to be asked to the backends by default */
bids = NULL;
bi = 0;
for (i = 0; ids[i]; i++) {
if ( ! ids[i]->sid) {
DEBUG(1, ("invalid null SID in id_map array"));
talloc_free(ctx);
return NT_STATUS_INVALID_PARAMETER;
}
ret = idmap_cache_map_id(idmap_cache, ids[i]);
if ( ! NT_STATUS_IS_OK(ret)) {
if ( ! bids) {
/* alloc space for ids to be resolved by backends (realloc ten by ten) */
bids = TALLOC_ARRAY(ctx, struct id_map *, 10);
if ( ! bids) {
DEBUG(1, ("Out of memory!\n"));
talloc_free(ctx);
return NT_STATUS_NO_MEMORY;
}
bn = 10;
}
/* add this id to the ones to be retrieved from the backends */
bids[bi] = ids[i];
bi++;
/* check if we need to allocate new space on the rids array */
if (bi == bn) {
bn += 10;
bids = talloc_realloc(ctx, bids, struct id_map *, bn);
if ( ! bids) {
DEBUG(1, ("Out of memory!\n"));
talloc_free(ctx);
return NT_STATUS_NO_MEMORY;
}
}
/* make sure the last element is NULL */
bids[bi] = NULL;
}
}
/* let's see if there is any id mapping to be retieved from the backends */
if (bi) {
/* Only do query if we are online */
if ( IS_DOMAIN_OFFLINE(our_domain) ) {
ret = NT_STATUS_FILE_IS_OFFLINE;
goto done;
}
ret = idmap_backends_unixids_to_sids(bids);
IDMAP_CHECK_RET(ret);
/* update the cache */
for (i = 0; i < bi; i++) {
if (bids[i]->status == ID_MAPPED) {
ret = idmap_cache_set(idmap_cache, bids[i]);
} else if (bids[i]->status == ID_EXPIRED) {
/* the cache returned an expired entry and the backend was
* was not able to clear the situation (offline).
* This handles a previous NT_STATUS_SYNCHRONIZATION_REQUIRED
* for disconnected mode, */
bids[i]->status = ID_MAPPED;
} else if (bids[i]->status == ID_UNKNOWN) {
/* something bad here. We were not able to handle this for some
* reason, mark it as unmapped and hope next time things will
* settle down. */
bids[i]->status = ID_UNMAPPED;
} else { /* unmapped */
ret = idmap_cache_set_negative_id(idmap_cache, bids[i]);
}
IDMAP_CHECK_RET(ret);
}
}
ret = NT_STATUS_OK;
done:
talloc_free(ctx);
return ret;
}
NTSTATUS idmap_sids_to_unixids(struct id_map **ids)
{
TALLOC_CTX *ctx;
NTSTATUS ret;
struct id_map **bids;
int i, bi;
int bn = 0;
struct winbindd_domain *our_domain = find_our_domain();
if (! NT_STATUS_IS_OK(ret = idmap_init())) {
return ret;
}
if (!ids || !*ids) {
DEBUG(1, ("Invalid list of maps\n"));
return NT_STATUS_INVALID_PARAMETER;
}
ctx = talloc_named_const(NULL, 0, "idmap_sids_to_unixids ctx");
if ( ! ctx) {
DEBUG(1, ("failed to allocate talloc context, OOM?\n"));
return NT_STATUS_NO_MEMORY;
}
/* no ids to be asked to the backends by default */
bids = NULL;
bi = 0;
for (i = 0; ids[i]; i++) {
if ( ! ids[i]->sid) {
DEBUG(1, ("invalid null SID in id_map array\n"));
talloc_free(ctx);
return NT_STATUS_INVALID_PARAMETER;
}
ret = idmap_cache_map_sid(idmap_cache, ids[i]);
if ( ! NT_STATUS_IS_OK(ret)) {
if ( ! bids) {
/* alloc space for ids to be resolved
by backends (realloc ten by ten) */
bids = TALLOC_ARRAY(ctx, struct id_map *, 10);
if ( ! bids) {
DEBUG(1, ("Out of memory!\n"));
talloc_free(ctx);
return NT_STATUS_NO_MEMORY;
}
bn = 10;
}
/* add this id to the ones to be retrieved from the backends */
bids[bi] = ids[i];
bi++;
/* check if we need to allocate new space on the ids array */
if (bi == bn) {
bn += 10;
bids = talloc_realloc(ctx, bids, struct id_map *, bn);
if ( ! bids) {
DEBUG(1, ("Out of memory!\n"));
talloc_free(ctx);
return NT_STATUS_NO_MEMORY;
}
}
/* make sure the last element is NULL */
bids[bi] = NULL;
}
}
/* let's see if there is any id mapping to be retieved from the backends */
if (bids) {
/* Only do query if we are online */
if ( IS_DOMAIN_OFFLINE(our_domain) ) {
ret = NT_STATUS_FILE_IS_OFFLINE;
goto done;
}
ret = idmap_backends_sids_to_unixids(bids);
IDMAP_CHECK_RET(ret);
/* update the cache */
for (i = 0; bids[i]; i++) {
if (bids[i]->status == ID_MAPPED) {
ret = idmap_cache_set(idmap_cache, bids[i]);
} else if (bids[i]->status == ID_EXPIRED) {
/* the cache returned an expired entry and the backend was
* was not able to clear the situation (offline).
* This handles a previous NT_STATUS_SYNCHRONIZATION_REQUIRED
* for disconnected mode, */
bids[i]->status = ID_MAPPED;
} else if (bids[i]->status == ID_UNKNOWN) {
/* something bad here. We were not able to handle this for some
* reason, mark it as unmapped and hope next time things will
* settle down. */
bids[i]->status = ID_UNMAPPED;
} else { /* unmapped */
ret = idmap_cache_set_negative_sid(idmap_cache, bids[i]);
}
IDMAP_CHECK_RET(ret);
}
}
ret = NT_STATUS_OK;
done:
talloc_free(ctx);
return ret;
}
NTSTATUS idmap_set_mapping(const struct id_map *id)
{
TALLOC_CTX *ctx;
NTSTATUS ret;
if (! NT_STATUS_IS_OK(ret = idmap_init())) {
return ret;
}
/* sanity checks */
if ((id->sid == NULL) || (id->status != ID_MAPPED)) {
DEBUG(1, ("NULL SID or unmapped entry\n"));
return NT_STATUS_INVALID_PARAMETER;
}
/* TODO: check uid/gid range ? */
ctx = talloc_named_const(NULL, 0, "idmap_set_mapping ctx");
if ( ! ctx) {
DEBUG(1, ("failed to allocate talloc context, OOM?\n"));
return NT_STATUS_NO_MEMORY;
}
/* set the new mapping */
ret = idmap_backends_set_mapping(id);
IDMAP_CHECK_RET(ret);
/* set the mapping in the cache */
ret = idmap_cache_set(idmap_cache, id);
IDMAP_CHECK_RET(ret);
done:
talloc_free(ctx);
return ret;
}
/**************************************************************************
Dump backend status.
**************************************************************************/
void idmap_dump_maps(char *logfile)
{
NTSTATUS ret;
struct unixid allid;
struct id_map *maps;
int num_maps;
FILE *dump;
int i;
if (! NT_STATUS_IS_OK(ret = idmap_init())) {
return;
}
dump = fopen(logfile, "w");
if ( ! dump) {
DEBUG(0, ("Unable to open open stream for file [%s], errno: %d\n", logfile, errno));
return;
}
if (NT_STATUS_IS_OK(ret = idmap_alloc_init())) {
allid.type = ID_TYPE_UID;
allid.id = 0;
idmap_alloc_ctx->methods->get_id_hwm(&allid);
fprintf(dump, "USER HWM %lu\n", (unsigned long)allid.id);
allid.type = ID_TYPE_GID;
allid.id = 0;
idmap_alloc_ctx->methods->get_id_hwm(&allid);
fprintf(dump, "GROUP HWM %lu\n", (unsigned long)allid.id);
}
maps = talloc(idmap_ctx, struct id_map);
num_maps = 0;
for (i = 0; i < num_domains; i++) {
if (idmap_domains[i]->methods->dump_data) {
idmap_domains[i]->methods->dump_data(idmap_domains[i], &maps, &num_maps);
}
}
for (i = 0; i < num_maps; i++) {
switch (maps[i].xid.type) {
case ID_TYPE_UID:
fprintf(dump, "UID %lu %s\n",
(unsigned long)maps[i].xid.id,
sid_string_static(maps[i].sid));
break;
case ID_TYPE_GID:
fprintf(dump, "GID %lu %s\n",
(unsigned long)maps[i].xid.id,
sid_string_static(maps[i].sid));
break;
case ID_TYPE_NOT_SPECIFIED:
break;
}
}
fflush(dump);
fclose(dump);
}
char *idmap_fetch_secret(const char *backend, bool alloc,
const char *domain, const char *identity)
{
char *tmp, *ret;
int r;
if (alloc) {
r = asprintf(&tmp, "IDMAP_ALLOC_%s", backend);
} else {
r = asprintf(&tmp, "IDMAP_%s_%s", backend, domain);
}
if (r < 0)
return NULL;
strupper_m(tmp); /* make sure the key is case insensitive */
ret = secrets_fetch_generic(tmp, identity);
SAFE_FREE( tmp );
return ret;
}