/* Unix SMB/CIFS implementation. ID Mapping Copyright (C) Tim Potter 2000 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003 Copyright (C) Simo Sorce 2003 Copyright (C) Jeremy Allison 2006 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/ #include "includes.h" #include "winbindd.h" #undef DBGC_CLASS #define DBGC_CLASS DBGC_IDMAP static_decl_idmap; struct idmap_backend { const char *name; struct idmap_methods *methods; struct idmap_backend *prev, *next; }; struct idmap_alloc_backend { const char *name; struct idmap_alloc_methods *methods; struct idmap_alloc_backend *prev, *next; }; struct idmap_cache_ctx; static TALLOC_CTX *idmap_ctx = NULL; static struct idmap_cache_ctx *idmap_cache; static struct idmap_backend *backends = NULL; static struct idmap_domain **idmap_domains = NULL; static int num_domains = 0; static int pdb_dom_num = -1; static int def_dom_num = -1; static struct idmap_alloc_backend *alloc_backends = NULL; static struct idmap_alloc_methods *alloc_methods = NULL; #define IDMAP_CHECK_RET(ret) do { if ( ! NT_STATUS_IS_OK(ret)) { DEBUG(2, ("ERROR: NTSTATUS = 0x%08x\n", NT_STATUS_V(ret))); goto done; } } while(0) #define IDMAP_CHECK_ALLOC(mem) do { if (!mem) { DEBUG(0, ("Out of memory!\n")); ret = NT_STATUS_NO_MEMORY; goto done; } } while(0) static struct idmap_methods *get_methods(struct idmap_backend *be, const char *name) { struct idmap_backend *b; for (b = be; b; b = b->next) { if (strequal(b->name, name)) { return b->methods; } } return NULL; } static struct idmap_alloc_methods *get_alloc_methods(struct idmap_alloc_backend *be, const char *name) { struct idmap_alloc_backend *b; for (b = be; b; b = b->next) { if (strequal(b->name, name)) { return b->methods; } } return NULL; } /********************************************************************** Allow a module to register itself as a method. **********************************************************************/ NTSTATUS smb_register_idmap(int version, const char *name, struct idmap_methods *methods) { struct idmap_methods *test; struct idmap_backend *entry; if (!idmap_ctx) { return NT_STATUS_INTERNAL_DB_ERROR; } if ((version != SMB_IDMAP_INTERFACE_VERSION)) { DEBUG(0, ("Failed to register idmap module.\n" "The module was compiled against SMB_IDMAP_INTERFACE_VERSION %d,\n" "current SMB_IDMAP_INTERFACE_VERSION is %d.\n" "Please recompile against the current version of samba!\n", version, SMB_IDMAP_INTERFACE_VERSION)); return NT_STATUS_OBJECT_TYPE_MISMATCH; } if (!name || !name[0] || !methods) { DEBUG(0,("Called with NULL pointer or empty name!\n")); return NT_STATUS_INVALID_PARAMETER; } test = get_methods(backends, name); if (test) { DEBUG(0,("Idmap module %s already registered!\n", name)); return NT_STATUS_OBJECT_NAME_COLLISION; } entry = talloc(idmap_ctx, struct idmap_backend); if ( ! entry) { DEBUG(0,("Out of memory!\n")); return NT_STATUS_NO_MEMORY; } entry->name = talloc_strdup(idmap_ctx, name); if ( ! entry->name) { DEBUG(0,("Out of memory!\n")); return NT_STATUS_NO_MEMORY; } entry->methods = methods; DLIST_ADD(backends, entry); DEBUG(5, ("Successfully added idmap backend '%s'\n", name)); return NT_STATUS_OK; } /********************************************************************** Allow a module to register itself as a method. **********************************************************************/ NTSTATUS smb_register_idmap_alloc(int version, const char *name, struct idmap_alloc_methods *methods) { struct idmap_alloc_methods *test; struct idmap_alloc_backend *entry; if (!idmap_ctx) { return NT_STATUS_INTERNAL_DB_ERROR; } if ((version != SMB_IDMAP_INTERFACE_VERSION)) { DEBUG(0, ("Failed to register idmap alloc module.\n" "The module was compiled against SMB_IDMAP_INTERFACE_VERSION %d,\n" "current SMB_IDMAP_INTERFACE_VERSION is %d.\n" "Please recompile against the current version of samba!\n", version, SMB_IDMAP_INTERFACE_VERSION)); return NT_STATUS_OBJECT_TYPE_MISMATCH; } if (!name || !name[0] || !methods) { DEBUG(0,("Called with NULL pointer or empty name!\n")); return NT_STATUS_INVALID_PARAMETER; } test = get_alloc_methods(alloc_backends, name); if (test) { DEBUG(0,("idmap_alloc module %s already registered!\n", name)); return NT_STATUS_OBJECT_NAME_COLLISION; } entry = talloc(idmap_ctx, struct idmap_alloc_backend); if ( ! entry) { DEBUG(0,("Out of memory!\n")); return NT_STATUS_NO_MEMORY; } entry->name = talloc_strdup(idmap_ctx, name); if ( ! entry->name) { DEBUG(0,("Out of memory!\n")); return NT_STATUS_NO_MEMORY; } entry->methods = methods; DLIST_ADD(alloc_backends, entry); DEBUG(5, ("Successfully added idmap alloc backend '%s'\n", name)); return NT_STATUS_OK; } static int close_domain_destructor(struct idmap_domain *dom) { NTSTATUS ret; ret = dom->methods->close_fn(dom); if (!NT_STATUS_IS_OK(ret)) { DEBUG(3, ("Failed to close idmap domain [%s]!\n", dom->name)); } return 0; } /************************************************************************** Shutdown. **************************************************************************/ NTSTATUS idmap_close(void) { /* close the alloc backend first before freeing idmap_ctx */ if (alloc_methods) { alloc_methods->close_fn(); alloc_methods = NULL; } alloc_backends = NULL; /* this talloc_free call will fire the talloc destructors * that will free all active backends resources */ TALLOC_FREE(idmap_ctx); idmap_cache = NULL; idmap_domains = NULL; backends = NULL; return NT_STATUS_OK; } /********************************************************************** Initialise idmap cache and a remote backend (if configured). **********************************************************************/ static const char *idmap_default_domain[] = { "default domain", NULL }; NTSTATUS idmap_init(void) { NTSTATUS ret; struct idmap_domain *dom; const char *compat_backend = NULL; const char *compat_params = NULL; const char **dom_list = NULL; char *alloc_backend; BOOL default_already_defined = False; BOOL pri_dom_is_in_list = False; int compat = 0; int i; if (idmap_ctx) { return NT_STATUS_OK; } idmap_ctx = talloc_named_const(NULL, 0, "IDMAP MEMORY CONTEXT"); if ( ! idmap_ctx) { return NT_STATUS_NO_MEMORY; } /* init cache */ idmap_cache = idmap_cache_init(idmap_ctx); if ( ! idmap_cache) { return NT_STATUS_UNSUCCESSFUL; } /* register static backends */ static_init_idmap; if ((dom_list = lp_idmap_domains()) != NULL) { if (lp_idmap_backend()) { DEBUG(0, ("WARNING: idmap backend and idmap domains are mutually excusive!\n")); DEBUGADD(0, (" idmap backend option will be IGNORED!\n")); } } else if (lp_idmap_backend()) { const char **compat_list = lp_idmap_backend(); const char *p; DEBUG(0, ("WARNING: idmap backend is deprecated!\n")); compat = 1; /* strip any leading idmap_ prefix of */ if (strncmp(*compat_list, "idmap_", 6) == 0 ) { p = *compat_list += 6; DEBUG(0, ("WARNING: idmap backend uses obsolete and deprecated 'idmap_' prefix.\n")); DEBUGADD(0, (" Please replace 'idmap_%s' by '%s' in %s\n", p, p, dyn_CONFIGFILE)); compat_backend = p; } else { compat_backend = *compat_list; } if ((p = strchr(compat_backend, ':')) != NULL) { compat_params = p + 1; } } if ( ! dom_list) { dom_list = idmap_default_domain; } /*************************** * initialize idmap domains */ DEBUG(1, ("Initializing idmap domains\n")); for (i = 0; dom_list[i]; i++) { const char *parm_backend; char *config_option; if (strequal(dom_list[i], lp_workgroup())) { pri_dom_is_in_list = True; } /* init domain */ dom = talloc_zero(idmap_ctx, struct idmap_domain); IDMAP_CHECK_ALLOC(dom); dom->name = talloc_strdup(dom, dom_list[i]); IDMAP_CHECK_ALLOC(dom->name); config_option = talloc_asprintf(dom, "idmap config %s", dom->name); IDMAP_CHECK_ALLOC(config_option); /* default or specific ? */ dom->default_domain = lp_parm_bool(-1, config_option, "default", False); if (dom->default_domain || strequal(dom_list[i], idmap_default_domain[0])) { /* the default domain is a cacth all domain * so no specific domain sid is provided */ dom->sid = NULL; /* make sure this is set even when we match idmap_default_domain[0] */ dom->default_domain = True; if (lp_parm_const_string(-1, config_option, "domain sid", NULL)) { DEBUG(1, ("WARNING: Can't force a /domain sid/ on the DEFAULT domain, Ignoring!")); } /* only one default domain is permitted */ if (default_already_defined) { DEBUG(1, ("ERROR: Multiple domains defined as default!\n")); ret = NT_STATUS_INVALID_PARAMETER; goto done; } default_already_defined = True; } else { const char *sid; sid = lp_parm_const_string(-1, config_option, "domain sid", NULL); if (sid) { dom->sid = string_sid_talloc(dom, sid); } else { struct winbindd_domain *wdom = find_domain_from_name(dom->name); if (wdom) { dom->sid = sid_dup_talloc(dom, &wdom->sid); IDMAP_CHECK_ALLOC(dom->sid); } } if ( ! dom->sid) { DEBUG(1, ("ERROR: Could not find DOMAIN SID for domain %s\n", dom->name)); DEBUGADD(1, (" Consider to set explicitly the /domain sid/ option\n")); ret = NT_STATUS_NO_SUCH_DOMAIN; goto done; } } /* is this a readonly domain ? */ dom->readonly = lp_parm_bool(-1, config_option, "readonly", False); /* find associated backend (default: tdb) */ if (compat) { parm_backend = talloc_strdup(idmap_ctx, compat_backend); } else { parm_backend = talloc_strdup(idmap_ctx, lp_parm_const_string(-1, config_option, "backend", "tdb")); } IDMAP_CHECK_ALLOC(parm_backend); /* get the backend methods for this domain */ dom->methods = get_methods(backends, parm_backend); if ( ! dom->methods) { ret = smb_probe_module("idmap", parm_backend); if (NT_STATUS_IS_OK(ret)) { dom->methods = get_methods(backends, parm_backend); } } if ( ! dom->methods) { DEBUG(0, ("ERROR: Could not get methods for backend %s\n", parm_backend)); ret = NT_STATUS_UNSUCCESSFUL; goto done; } /* check the set_mapping function exists otherwise mark the module as readonly */ if ( ! dom->methods->set_mapping) { dom->readonly = True; } /* now that we have methods, set the destructor for this domain */ talloc_set_destructor(dom, close_domain_destructor); /* Finally instance a backend copy for this domain */ ret = dom->methods->init(dom, compat_params); if ( ! NT_STATUS_IS_OK(ret)) { DEBUG(0, ("ERROR: Initialization failed for backend %s (domain %s)\n", parm_backend, dom->name)); ret = NT_STATUS_UNSUCCESSFUL; goto done; } idmap_domains = talloc_realloc(idmap_ctx, idmap_domains, struct idmap_domain *, i+1); if ( ! idmap_domains) { DEBUG(0, ("Out of memory!\n")); ret = NT_STATUS_NO_MEMORY; goto done; } idmap_domains[i] = dom; if (dom->default_domain) { /* save default domain position for future uses */ def_dom_num = i; } DEBUG(10, ("Domain %s - Sid %s - Backend %s - %sdefault - %sreadonly\n", dom->name, sid_string_static(dom->sid), parm_backend, dom->default_domain?"":"not ", dom->readonly?"":"not ")); talloc_free(config_option); } /* save the number of domains we have */ num_domains = i; /* automatically add idmap_nss backend if needed */ if ((lp_server_role() == ROLE_DOMAIN_MEMBER) && ( ! pri_dom_is_in_list) && lp_winbind_trusted_domains_only()) { DOM_SID our_sid; if (!secrets_fetch_domain_sid(lp_workgroup(), &our_sid)) { DEBUG(0, ("Could not fetch our SID - did we join?\n")); ret = NT_STATUS_UNSUCCESSFUL; goto done; } dom = talloc_zero(idmap_ctx, struct idmap_domain); IDMAP_CHECK_ALLOC(dom); dom->name = talloc_strdup(dom, lp_workgroup()); IDMAP_CHECK_ALLOC(dom->name); dom->default_domain = False; dom->readonly = True; dom->sid = sid_dup_talloc(dom, &our_sid); IDMAP_CHECK_ALLOC(dom->sid); /* get the backend methods for passdb */ dom->methods = get_methods(backends, "nss"); /* (the nss module is always statically linked) */ if ( ! dom->methods) { DEBUG(0, ("ERROR: Could not get methods for idmap_nss ?!\n")); ret = NT_STATUS_UNSUCCESSFUL; goto done; } /* now that we have methods, set the destructor for this domain */ talloc_set_destructor(dom, close_domain_destructor); /* Finally instance a backend copy for this domain */ ret = dom->methods->init(dom, compat_params); if ( ! NT_STATUS_IS_OK(ret)) { DEBUG(0, ("ERROR: Initialization failed for idmap_nss ?!\n")); ret = NT_STATUS_UNSUCCESSFUL; goto done; } idmap_domains = talloc_realloc(idmap_ctx, idmap_domains, struct idmap_domain *, num_domains+1); if ( ! idmap_domains) { DEBUG(0, ("Out of memory!\n")); ret = NT_STATUS_NO_MEMORY; goto done; } idmap_domains[num_domains] = dom; DEBUG(10, ("Domain %s - Sid %s - Backend nss - not default - readonly\n", dom->name, sid_string_static(dom->sid))); num_domains++; } /**** automatically add idmap_passdb backend ****/ dom = talloc_zero(idmap_ctx, struct idmap_domain); IDMAP_CHECK_ALLOC(dom); dom->name = talloc_strdup(dom, get_global_sam_name()); IDMAP_CHECK_ALLOC(dom->name); dom->default_domain = False; dom->readonly = True; dom->sid = sid_dup_talloc(dom, get_global_sam_sid()); IDMAP_CHECK_ALLOC(dom->sid); /* get the backend methods for passdb */ dom->methods = get_methods(backends, "passdb"); /* (the passdb module is always statically linked) */ if ( ! dom->methods) { DEBUG(0, ("ERROR: Could not get methods for idmap_passdb ?!\n")); ret = NT_STATUS_UNSUCCESSFUL; goto done; } /* now that we have methods, set the destructor for this domain */ talloc_set_destructor(dom, close_domain_destructor); /* Finally instance a backend copy for this domain */ ret = dom->methods->init(dom, compat_params); if ( ! NT_STATUS_IS_OK(ret)) { DEBUG(0, ("ERROR: Initialization failed for idmap_passdb ?!\n")); ret = NT_STATUS_UNSUCCESSFUL; goto done; } idmap_domains = talloc_realloc(idmap_ctx, idmap_domains, struct idmap_domain *, num_domains+1); if ( ! idmap_domains) { DEBUG(0, ("Out of memory!\n")); ret = NT_STATUS_NO_MEMORY; goto done; } idmap_domains[num_domains] = dom; /* needed to handle special BUILTIN and wellknown SIDs cases */ pdb_dom_num = num_domains; DEBUG(10, ("Domain %s - Sid %s - Backend passdb - not default - readonly\n", dom->name, sid_string_static(dom->sid))); DEBUGADD(10, (" (special: includes handling BUILTIN and Wellknown SIDs as well)\n")); num_domains++; /**** finished adding idmap_passdb backend ****/ /* sort domains so that the default is the last one */ if (def_dom_num != num_domains-1) { /* default is not last, move it */ struct idmap_domain *tmp; if (pdb_dom_num > def_dom_num) { pdb_dom_num --; } else if (pdb_dom_num == def_dom_num) { /* ?? */ pdb_dom_num = num_domains - 1; } tmp = idmap_domains[def_dom_num]; for (i = def_dom_num; i < num_domains-1; i++) { idmap_domains[i] = idmap_domains[i+1]; } idmap_domains[i] = tmp; def_dom_num = i; } /*************************** * initialize alloc module */ DEBUG(1, ("Initializing idmap alloc module\n")); if (compat) { alloc_backend = talloc_strdup(idmap_ctx, compat_backend); } else { char *ab = lp_idmap_alloc_backend(); if (ab && (ab[0] != '\0')) { alloc_backend = talloc_strdup(idmap_ctx, lp_idmap_alloc_backend()); } else { alloc_backend = talloc_strdup(idmap_ctx, "tdb"); } } IDMAP_CHECK_ALLOC(alloc_backend); alloc_methods = get_alloc_methods(alloc_backends, alloc_backend); if ( ! alloc_methods) { ret = smb_probe_module("idmap", alloc_backend); if (NT_STATUS_IS_OK(ret)) { alloc_methods = get_alloc_methods(alloc_backends, alloc_backend); } } if ( ! alloc_methods) { DEBUG(0, ("ERROR: Could not get methods for alloc backend %s\n", alloc_backend)); ret = NT_STATUS_UNSUCCESSFUL; goto done; } ret = alloc_methods->init(compat_params); if ( ! NT_STATUS_IS_OK(ret)) { DEBUG(0, ("ERROR: Initialization failed for alloc backend %s\n", alloc_backend)); ret = NT_STATUS_UNSUCCESSFUL; goto done; } return NT_STATUS_OK; done: DEBUG(0, ("Aborting IDMAP Initialization ...\n")); idmap_close(); return ret; } /************************************************************************** idmap allocator interface functions **************************************************************************/ NTSTATUS idmap_allocate_uid(struct unixid *id) { NTSTATUS ret; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return ret; } id->type = ID_TYPE_UID; return alloc_methods->allocate_id(id); } NTSTATUS idmap_allocate_gid(struct unixid *id) { NTSTATUS ret; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return ret; } id->type = ID_TYPE_GID; return alloc_methods->allocate_id(id); } NTSTATUS idmap_set_uid_hwm(struct unixid *id) { NTSTATUS ret; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return ret; } id->type = ID_TYPE_UID; return alloc_methods->set_id_hwm(id); } NTSTATUS idmap_set_gid_hwm(struct unixid *id) { NTSTATUS ret; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return ret; } id->type = ID_TYPE_GID; return alloc_methods->set_id_hwm(id); } /********************************************************* Check if creating a mapping is permitted for the domain *********************************************************/ static NTSTATUS idmap_can_map(const struct id_map *map, struct idmap_domain **ret_dom) { struct idmap_domain *dom; int i; /* Check we do not create mappings for our own local domain, or BUILTIN or special SIDs */ if ((sid_compare_domain(map->sid, get_global_sam_sid()) == 0) || sid_check_is_in_builtin(map->sid) || sid_check_is_in_wellknown_domain(map->sid)) { DEBUG(10, ("We are not supposed to create mappings for our own domains (local, builtin, specials)\n")); return NT_STATUS_UNSUCCESSFUL; } /* Special check for trusted domain only = Yes */ if (lp_winbind_trusted_domains_only()) { struct winbindd_domain *wdom = find_our_domain(); if (wdom && (sid_compare_domain(map->sid, &wdom->sid) == 0)) { DEBUG(10, ("We are not supposed to create mappings for our primary domain when <trusted domain only> is True\n")); DEBUGADD(10, ("Leave [%s] unmapped\n", sid_string_static(map->sid))); return NT_STATUS_UNSUCCESSFUL; } } for (i = 0, dom = NULL; i < num_domains; i++) { if ((idmap_domains[i]->default_domain) || /* ok set it into the default domain */ (sid_compare_domain(idmap_domains[i]->sid, map->sid) == 0)) { /* ok found a specific domain */ dom = idmap_domains[i]; break; } } if (! dom) { /* huh, couldn't find a suitable domain, let's just leave it unmapped */ DEBUG(10, ("Could not find imdap backend for SID %s", sid_string_static(map->sid))); return NT_STATUS_NO_SUCH_DOMAIN; } if (dom->readonly) { /* ouch the domain is read only, let's just leave it unmapped */ DEBUG(10, ("imdap backend for SID %s is READONLY!\n", sid_string_static(map->sid))); return NT_STATUS_UNSUCCESSFUL; } *ret_dom = dom; return NT_STATUS_OK; } static NTSTATUS idmap_new_mapping(TALLOC_CTX *ctx, struct id_map *map) { NTSTATUS ret; struct idmap_domain *dom; const char *domname, *name; enum lsa_SidType sid_type; BOOL wbret; ret = idmap_can_map(map, &dom); if ( ! NT_STATUS_IS_OK(ret)) { return NT_STATUS_NONE_MAPPED; } /* by default calls to winbindd are disabled the following call will not recurse so this is safe */ winbind_on(); wbret = winbind_lookup_sid(ctx, map->sid, &domname, &name, &sid_type); winbind_off(); /* check if this is a valid SID and then map it */ if (wbret) { switch (sid_type) { case SID_NAME_USER: ret = idmap_allocate_uid(&map->xid); if ( ! NT_STATUS_IS_OK(ret)) { /* can't allocate id, let's just leave it unmapped */ DEBUG(2, ("uid allocation failed! Can't create mapping\n")); return NT_STATUS_NONE_MAPPED; } break; case SID_NAME_DOM_GRP: case SID_NAME_ALIAS: case SID_NAME_WKN_GRP: ret = idmap_allocate_gid(&map->xid); if ( ! NT_STATUS_IS_OK(ret)) { /* can't allocate id, let's just leave it unmapped */ DEBUG(2, ("gid allocation failed! Can't create mapping\n")); return NT_STATUS_NONE_MAPPED; } break; default: /* invalid sid, let's just leave it unmapped */ DEBUG(10, ("SID %s is UNKNOWN, skip mapping\n", sid_string_static(map->sid))); return NT_STATUS_NONE_MAPPED; } /* ok, got a new id, let's set a mapping */ map->status = ID_MAPPED; DEBUG(10, ("Setting mapping: %s <-> %s %lu\n", sid_string_static(map->sid), (map->xid.type == ID_TYPE_UID) ? "UID" : "GID", (unsigned long)map->xid.id)); ret = dom->methods->set_mapping(dom, map); if ( ! NT_STATUS_IS_OK(ret)) { /* something wrong here :-( */ DEBUG(2, ("Failed to commit mapping\n!")); /* TODO: would it make sense to have an "unalloc_id function?" */ return NT_STATUS_NONE_MAPPED; } } else { DEBUG(2,("Invalid SID, not mapping %s (type %d)\n", sid_string_static(map->sid), sid_type)); return NT_STATUS_NONE_MAPPED; } return NT_STATUS_OK; } static NTSTATUS idmap_backends_set_mapping(const struct id_map *map) { struct idmap_domain *dom; NTSTATUS ret; DEBUG(10, ("Setting mapping %s <-> %s %lu\n", sid_string_static(map->sid), (map->xid.type == ID_TYPE_UID) ? "UID" : "GID", (unsigned long)map->xid.id)); ret = idmap_can_map(map, &dom); if ( ! NT_STATUS_IS_OK(ret)) { return ret; } DEBUG(10, ("set_mapping for domain %s(%s)\n", dom->name, sid_string_static(dom->sid))); return dom->methods->set_mapping(dom, map); } static NTSTATUS idmap_backends_unixids_to_sids(struct id_map **ids) { struct idmap_domain *dom; struct id_map **unmapped; struct id_map **_ids; TALLOC_CTX *ctx; NTSTATUS ret; int i, u, n; if (!ids || !*ids) { DEBUG(1, ("Invalid list of maps\n")); return NT_STATUS_INVALID_PARAMETER; } ctx = talloc_named_const(NULL, 0, "idmap_backends_unixids_to_sids ctx"); if ( ! ctx) { DEBUG(0, ("Out of memory!\n")); return NT_STATUS_NO_MEMORY; } DEBUG(10, ("Query backends to map ids->sids\n")); /* start from the default (the last one) and then if there are still * unmapped entries cycle through the others */ _ids = ids; /* make sure all maps are marked as in UNKNOWN status */ for (i = 0; _ids[i]; i++) { _ids[i]->status = ID_UNKNOWN; } unmapped = NULL; for (n = num_domains-1; n >= 0; n--) { /* cycle backwards */ dom = idmap_domains[n]; DEBUG(10, ("Query sids from domain %s(%s)\n", dom->name, sid_string_static(dom->sid))); ret = dom->methods->unixids_to_sids(dom, _ids); IDMAP_CHECK_RET(ret); unmapped = NULL; for (i = 0, u = 0; _ids[i]; i++) { if (_ids[i]->status == ID_UNKNOWN || _ids[i]->status == ID_UNMAPPED) { unmapped = talloc_realloc(ctx, unmapped, struct id_map *, u + 2); IDMAP_CHECK_ALLOC(unmapped); unmapped[u] = _ids[i]; u++; } } if (unmapped) { /* terminate the unmapped list */ unmapped[u] = NULL; } else { /* no more entries, get out */ break; } _ids = unmapped; } if (unmapped) { /* there are still unmapped ids, map them to the unix users/groups domains */ for (i = 0; unmapped[i]; i++) { switch (unmapped[i]->xid.type) { case ID_TYPE_UID: uid_to_unix_users_sid((uid_t)unmapped[i]->xid.id, unmapped[i]->sid); unmapped[i]->status = ID_MAPPED; break; case ID_TYPE_GID: gid_to_unix_groups_sid((gid_t)unmapped[i]->xid.id, unmapped[i]->sid); unmapped[i]->status = ID_MAPPED; break; default: /* what?! */ unmapped[i]->status = ID_UNKNOWN; break; } } } ret = NT_STATUS_OK; done: talloc_free(ctx); return ret; } static NTSTATUS idmap_backends_sids_to_unixids(struct id_map **ids) { struct id_map ***dom_ids; struct idmap_domain *dom; TALLOC_CTX *ctx; NTSTATUS ret; int i, *counters; if (!ids || !*ids) { DEBUG(1, ("Invalid list of maps\n")); return NT_STATUS_INVALID_PARAMETER; } ctx = talloc_named_const(NULL, 0, "idmap_backends_sids_to_unixids ctx"); if ( ! ctx) { DEBUG(1, ("failed to allocate talloc context, OOM?\n")); return NT_STATUS_NO_MEMORY; } DEBUG(10, ("Query backends to map sids->ids\n")); /* split list per domain */ dom_ids = talloc_zero_array(ctx, struct id_map **, num_domains); IDMAP_CHECK_ALLOC(dom_ids); counters = talloc_zero_array(ctx, int, num_domains); for (i = 0; ids[i]; i++) { int dom_num; /* make sure they are unknown to start off */ ids[i]->status = ID_UNKNOWN; for (dom_num = 0, dom = NULL; dom_num < num_domains; dom_num++) { if (idmap_domains[dom_num]->default_domain) { /* we got to the default domain */ dom = idmap_domains[dom_num]; break; } if (sid_compare_domain(idmap_domains[dom_num]->sid, ids[i]->sid) == 0) { dom = idmap_domains[dom_num]; break; } } if (( ! dom) || dom->default_domain) { /* handle BUILTIN or Special SIDs * and prevent them from falling into the default domain space */ if ((sid_check_is_in_builtin(ids[i]->sid) || sid_check_is_in_wellknown_domain(ids[i]->sid))) { if (pdb_dom_num != -1) { dom = idmap_domains[pdb_dom_num]; dom_num = pdb_dom_num; } else { dom = NULL; } } } if ( ! dom) { /* no dom move on */ continue; } DEBUG(10, ("SID %s is being handled by %s(%d)\n", sid_string_static(ids[i]->sid), dom?dom->name:"none", dom_num)); dom_ids[dom_num] = talloc_realloc(ctx, dom_ids[dom_num], struct id_map *, counters[dom_num] + 2); IDMAP_CHECK_ALLOC(dom_ids[dom_num]); dom_ids[dom_num][counters[dom_num]] = ids[i]; counters[dom_num]++; dom_ids[dom_num][counters[dom_num]] = NULL; } /* ok all the ids have been dispatched in the right queues * let's cycle through the filled ones */ for (i = 0; i < num_domains; i++) { if (dom_ids[i]) { /* ok, we have ids in this one */ dom = idmap_domains[i]; DEBUG(10, ("Query ids from domain %s(%s)\n", dom->name, sid_string_static(dom->sid))); ret = dom->methods->sids_to_unixids(dom, dom_ids[i]); IDMAP_CHECK_RET(ret); } } /* ok all the backends have been contacted at this point */ /* let's see if we have any unmapped SID left and act accordingly */ for (i = 0; ids[i]; i++) { if (ids[i]->status == ID_UNKNOWN || ids[i]->status == ID_UNMAPPED) { /* ok this is an unmapped one, see if we can map it */ ret = idmap_new_mapping(ctx, ids[i]); if (NT_STATUS_IS_OK(ret)) { /* successfully mapped */ ids[i]->status = ID_MAPPED; } else if (NT_STATUS_EQUAL(ret, NT_STATUS_NONE_MAPPED)) { /* could not map it */ ids[i]->status = ID_UNMAPPED; } else { /* Something very bad happened down there */ ids[i]->status = ID_UNKNOWN; } } } ret = NT_STATUS_OK; done: talloc_free(ctx); return ret; } /************************************************************************** idmap interface functions **************************************************************************/ NTSTATUS idmap_unixids_to_sids(struct id_map **ids) { TALLOC_CTX *ctx; NTSTATUS ret; struct id_map **bids; int i, bi; int bn = 0; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return ret; } if (!ids || !*ids) { DEBUG(1, ("Invalid list of maps\n")); return NT_STATUS_INVALID_PARAMETER; } ctx = talloc_named_const(NULL, 0, "idmap_unixids_to_sids ctx"); if ( ! ctx) { DEBUG(1, ("failed to allocate talloc context, OOM?\n")); return NT_STATUS_NO_MEMORY; } /* no ids to be asked to the backends by default */ bids = NULL; bi = 0; for (i = 0; ids[i]; i++) { if ( ! ids[i]->sid) { DEBUG(1, ("invalid null SID in id_map array")); talloc_free(ctx); return NT_STATUS_INVALID_PARAMETER; } ret = idmap_cache_map_id(idmap_cache, ids[i]); if ( ! NT_STATUS_IS_OK(ret)) { if ( ! bids) { /* alloc space for ids to be resolved by backends (realloc ten by ten) */ bids = talloc_array(ctx, struct id_map *, 10); if ( ! bids) { DEBUG(1, ("Out of memory!\n")); talloc_free(ctx); return NT_STATUS_NO_MEMORY; } bn = 10; } /* add this id to the ones to be retrieved from the backends */ bids[bi] = ids[i]; bi++; /* check if we need to allocate new space on the rids array */ if (bi == bn) { bn += 10; bids = talloc_realloc(ctx, bids, struct id_map *, bn); if ( ! bids) { DEBUG(1, ("Out of memory!\n")); talloc_free(ctx); return NT_STATUS_NO_MEMORY; } } /* make sure the last element is NULL */ bids[bi] = NULL; } } /* let's see if there is any id mapping to be retieved from the backends */ if (bi) { ret = idmap_backends_unixids_to_sids(bids); IDMAP_CHECK_RET(ret); /* update the cache */ for (i = 0; i < bi; i++) { if (bids[i]->status == ID_MAPPED) { ret = idmap_cache_set(idmap_cache, bids[i]); } else if (bids[i]->status == ID_UNKNOWN) { /* return an expired entry in the cache or an unknown */ /* this handles a previous NT_STATUS_SYNCHRONIZATION_REQUIRED * for disconnected mode */ idmap_cache_map_id(idmap_cache, ids[i]); } else { /* unmapped */ ret = idmap_cache_set_negative_id(idmap_cache, bids[i]); } IDMAP_CHECK_RET(ret); } } ret = NT_STATUS_OK; done: talloc_free(ctx); return ret; } NTSTATUS idmap_sids_to_unixids(struct id_map **ids) { TALLOC_CTX *ctx; NTSTATUS ret; struct id_map **bids; int i, bi; int bn = 0; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return ret; } if (!ids || !*ids) { DEBUG(1, ("Invalid list of maps\n")); return NT_STATUS_INVALID_PARAMETER; } ctx = talloc_named_const(NULL, 0, "idmap_sids_to_unixids ctx"); if ( ! ctx) { DEBUG(1, ("failed to allocate talloc context, OOM?\n")); return NT_STATUS_NO_MEMORY; } /* no ids to be asked to the backends by default */ bids = NULL; bi = 0; for (i = 0; ids[i]; i++) { if ( ! ids[i]->sid) { DEBUG(1, ("invalid null SID in id_map array\n")); talloc_free(ctx); return NT_STATUS_INVALID_PARAMETER; } ret = idmap_cache_map_sid(idmap_cache, ids[i]); if ( ! NT_STATUS_IS_OK(ret)) { if ( ! bids) { /* alloc space for ids to be resolved by backends (realloc ten by ten) */ bids = talloc_array(ctx, struct id_map *, 10); if ( ! bids) { DEBUG(1, ("Out of memory!\n")); talloc_free(ctx); return NT_STATUS_NO_MEMORY; } bn = 10; } /* add this id to the ones to be retrieved from the backends */ bids[bi] = ids[i]; bi++; /* check if we need to allocate new space on the ids array */ if (bi == bn) { bn += 10; bids = talloc_realloc(ctx, bids, struct id_map *, bn); if ( ! bids) { DEBUG(1, ("Out of memory!\n")); talloc_free(ctx); return NT_STATUS_NO_MEMORY; } } /* make sure the last element is NULL */ bids[bi] = NULL; } } /* let's see if there is any id mapping to be retieved from the backends */ if (bids) { ret = idmap_backends_sids_to_unixids(bids); IDMAP_CHECK_RET(ret); /* update the cache */ for (i = 0; bids[i]; i++) { if (bids[i]->status == ID_MAPPED) { ret = idmap_cache_set(idmap_cache, bids[i]); } else if (bids[i]->status == ID_UNKNOWN) { /* return an expired entry in the cache or an unknown */ /* this handles a previous NT_STATUS_SYNCHRONIZATION_REQUIRED * for disconnected mode */ idmap_cache_map_id(idmap_cache, ids[i]); } else { ret = idmap_cache_set_negative_sid(idmap_cache, bids[i]); } IDMAP_CHECK_RET(ret); } } ret = NT_STATUS_OK; done: talloc_free(ctx); return ret; } NTSTATUS idmap_set_mapping(const struct id_map *id) { TALLOC_CTX *ctx; NTSTATUS ret; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return ret; } /* sanity checks */ if ((id->sid == NULL) || (id->status != ID_MAPPED)) { DEBUG(1, ("NULL SID or unmapped entry\n")); return NT_STATUS_INVALID_PARAMETER; } /* TODO: check uid/gid range ? */ ctx = talloc_named_const(NULL, 0, "idmap_set_mapping ctx"); if ( ! ctx) { DEBUG(1, ("failed to allocate talloc context, OOM?\n")); return NT_STATUS_NO_MEMORY; } /* set the new mapping */ ret = idmap_backends_set_mapping(id); IDMAP_CHECK_RET(ret); /* set the mapping in the cache */ ret = idmap_cache_set(idmap_cache, id); IDMAP_CHECK_RET(ret); done: talloc_free(ctx); return ret; } /************************************************************************** Dump backend status. **************************************************************************/ void idmap_dump_maps(char *logfile) { NTSTATUS ret; struct unixid allid; struct id_map *maps; int num_maps; FILE *dump; int i; if (! NT_STATUS_IS_OK(ret = idmap_init())) { return; } dump = fopen(logfile, "w"); if ( ! dump) { DEBUG(0, ("Unable to open open stream for file [%s], errno: %d\n", logfile, errno)); return; } allid.type = ID_TYPE_UID; allid.id = 0; alloc_methods->get_id_hwm(&allid); fprintf(dump, "USER HWM %lu\n", (unsigned long)allid.id); allid.type = ID_TYPE_GID; allid.id = 0; alloc_methods->get_id_hwm(&allid); fprintf(dump, "GROUP HWM %lu\n", (unsigned long)allid.id); maps = talloc(idmap_ctx, struct id_map); num_maps = 0; for (i = 0; i < num_domains; i++) { if (idmap_domains[i]->methods->dump_data) { idmap_domains[i]->methods->dump_data(idmap_domains[i], &maps, &num_maps); } } for (i = 0; i < num_maps; i++) { switch (maps[i].xid.type) { case ID_TYPE_UID: fprintf(dump, "UID %lu %s\n", (unsigned long)maps[i].xid.id, sid_string_static(maps[i].sid)); break; case ID_TYPE_GID: fprintf(dump, "GID %lu %s\n", (unsigned long)maps[i].xid.id, sid_string_static(maps[i].sid)); break; } } fflush(dump); fclose(dump); } const char *idmap_fecth_secret(const char *backend, bool alloc, const char *domain, const char *identity) { char *tmp, *ret; int r; if (alloc) { r = asprintf(&tmp, "IDMAP_ALLOC_%s", backend); } else { r = asprintf(&tmp, "IDMAP_%s_%s", backend, domain); } if (r < 0) return NULL; strupper_m(tmp); /* make sure the key is case insensitive */ ret = secrets_fetch_generic(tmp, identity); free(tmp); return ret; }