/* Unix SMB/CIFS implementation. idmap TDB backend Copyright (C) Tim Potter 2000 Copyright (C) Jim McDonough 2003 Copyright (C) Simo Sorce 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" #undef DBGC_CLASS #define DBGC_CLASS DBGC_IDMAP /* High water mark keys */ #define HWM_GROUP "GROUP HWM" #define HWM_USER "USER HWM" /* idmap version determines auto-conversion */ #define IDMAP_VERSION 2 /* Globals */ static TDB_CONTEXT *idmap_tdb; static struct idmap_state { /* User and group id pool */ uid_t uid_low, uid_high; /* Range of uids to allocate */ gid_t gid_low, gid_high; /* Range of gids to allocate */ } idmap_state; /********************************************************************** allocate a new RID; We don't care if is a user or group **********************************************************************/ static NTSTATUS db_allocate_rid(uint32 *rid, int rid_type) { uint32 lowrid, highrid; uint32 tmp_rid; /* can't handle group rids right now. This is such a mess.... */ if ( rid_type == GROUP_RID_TYPE ) return NT_STATUS_UNSUCCESSFUL; /* cannot fail since idmap is only called winbindd */ get_free_rid_range( &lowrid, &highrid ); tmp_rid = lowrid; if ( !tdb_change_uint32_atomic(idmap_tdb, "RID_COUNTER", &tmp_rid, RID_MULTIPLIER) ) { DEBUG(3,("db_allocate_rid: Failed to locate next rid record in idmap db\n")); return NT_STATUS_UNSUCCESSFUL; } if ( tmp_rid > highrid ) { DEBUG(0, ("db_allocate_rid: no RIDs available!\n")); return NT_STATUS_UNSUCCESSFUL; } *rid = tmp_rid; return NT_STATUS_OK; } /********************************************************************** Allocate either a user or group id from the pool **********************************************************************/ static NTSTATUS db_allocate_id(unid_t *id, int id_type) { BOOL ret; int hwm; if (!id) return NT_STATUS_INVALID_PARAMETER; /* Get current high water mark */ switch (id_type & ID_TYPEMASK) { case ID_USERID: if ((hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) { return NT_STATUS_INTERNAL_DB_ERROR; } /* check it is in the range */ if (hwm > idmap_state.uid_high) { DEBUG(0, ("idmap Fatal Error: UID range full!! (max: %lu)\n", (unsigned long)idmap_state.uid_high)); return NT_STATUS_UNSUCCESSFUL; } /* fetch a new id and increment it */ ret = tdb_change_uint32_atomic(idmap_tdb, HWM_USER, (unsigned int *)&hwm, 1); if (!ret) { DEBUG(0, ("idmap_tdb: Fatal error while fetching a new id\n!")); return NT_STATUS_UNSUCCESSFUL; } /* recheck it is in the range */ if (hwm > idmap_state.uid_high) { DEBUG(0, ("idmap Fatal Error: UID range full!! (max: %lu)\n", (unsigned long)idmap_state.uid_high)); return NT_STATUS_UNSUCCESSFUL; } (*id).uid = hwm; DEBUG(10,("db_allocate_id: ID_USERID (*id).uid = %d\n", (unsigned int)hwm)); break; case ID_GROUPID: if ((hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) { return NT_STATUS_INTERNAL_DB_ERROR; } /* check it is in the range */ if (hwm > idmap_state.gid_high) { DEBUG(0, ("idmap Fatal Error: GID range full!! (max: %lu)\n", (unsigned long)idmap_state.gid_high)); return NT_STATUS_UNSUCCESSFUL; } /* fetch a new id and increment it */ ret = tdb_change_uint32_atomic(idmap_tdb, HWM_GROUP, (unsigned int *)&hwm, 1); if (!ret) { DEBUG(0, ("idmap_tdb: Fatal error while fetching a new id\n!")); return NT_STATUS_UNSUCCESSFUL; } /* recheck it is in the range */ if (hwm > idmap_state.gid_high) { DEBUG(0, ("idmap Fatal Error: GID range full!! (max: %lu)\n", (unsigned long)idmap_state.gid_high)); return NT_STATUS_UNSUCCESSFUL; } (*id).gid = hwm; DEBUG(10,("db_allocate_id: ID_GROUPID (*id).gid = %d\n", (unsigned int)hwm)); break; default: return NT_STATUS_INVALID_PARAMETER; } return NT_STATUS_OK; } /* Get a sid from an id */ static NTSTATUS internal_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type) { TDB_DATA key, data; fstring keystr; NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; if (!sid) return NT_STATUS_INVALID_PARAMETER; switch (id_type & ID_TYPEMASK) { case ID_USERID: slprintf(keystr, sizeof(keystr), "UID %lu", (unsigned long)id.uid); break; case ID_GROUPID: slprintf(keystr, sizeof(keystr), "GID %lu", (unsigned long)id.gid); break; default: return NT_STATUS_UNSUCCESSFUL; } key.dptr = keystr; key.dsize = strlen(keystr) + 1; DEBUG(10,("internal_get_sid_from_id: fetching record %s\n", keystr )); data = tdb_fetch(idmap_tdb, key); if (data.dptr) { if (string_to_sid(sid, data.dptr)) { DEBUG(10,("internal_get_sid_from_id: fetching record %s -> %s\n", keystr, data.dptr )); ret = NT_STATUS_OK; } SAFE_FREE(data.dptr); } return ret; } /* Error codes for get_id_from_sid */ enum getidfromsiderr { GET_ID_FROM_SID_OK = 0, GET_ID_FROM_SID_NOTFOUND, GET_ID_FROM_SID_WRONG_TYPE, GET_ID_FROM_SID_ERR }; static enum getidfromsiderr internal_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid) { enum getidfromsiderr ret = GET_ID_FROM_SID_ERR; fstring keystr; TDB_DATA key, data; int type = *id_type & ID_TYPEMASK; /* Check if sid is present in database */ sid_to_string(keystr, sid); key.dptr = keystr; key.dsize = strlen(keystr) + 1; DEBUG(10,("internal_get_id_from_sid: fetching record %s of type 0x%x\n", keystr, type )); data = tdb_fetch(idmap_tdb, key); if (!data.dptr) { DEBUG(10,("internal_get_id_from_sid: record %s not found\n", keystr )); return GET_ID_FROM_SID_NOTFOUND; } else { DEBUG(10,("internal_get_id_from_sid: record %s -> %s\n", keystr, data.dptr )); } if (type == ID_EMPTY || type == ID_USERID) { fstring scanstr; /* Parse and return existing uid */ fstrcpy(scanstr, "UID %d"); if (sscanf(data.dptr, scanstr, &((*id).uid)) == 1) { /* uid ok? */ if (type == ID_EMPTY) { *id_type = ID_USERID; } DEBUG(10,("internal_get_id_from_sid: %s fetching record %s -> %s \n", (type == ID_EMPTY) ? "ID_EMPTY" : "ID_USERID", keystr, data.dptr )); ret = GET_ID_FROM_SID_OK; } else { ret = GET_ID_FROM_SID_WRONG_TYPE; } } if ((ret != GET_ID_FROM_SID_OK) && (type == ID_EMPTY || type == ID_GROUPID)) { fstring scanstr; /* Parse and return existing gid */ fstrcpy(scanstr, "GID %d"); if (sscanf(data.dptr, scanstr, &((*id).gid)) == 1) { /* gid ok? */ if (type == ID_EMPTY) { *id_type = ID_GROUPID; } DEBUG(10,("internal_get_id_from_sid: %s fetching record %s -> %s \n", (type == ID_EMPTY) ? "ID_EMPTY" : "ID_GROUPID", keystr, data.dptr )); ret = GET_ID_FROM_SID_OK; } else { ret = GET_ID_FROM_SID_WRONG_TYPE; } } SAFE_FREE(data.dptr); return ret; } /* Get a sid from an id */ static NTSTATUS db_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type_in) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; enum getidfromsiderr iderr; int id_type = id_type_in & ID_TYPEMASK; unid_t id_tmp = id; int id_type_tmp = id_type; DEBUG(10,("db_get_sid_from_id: id_type_in = 0x%x\n", id_type_in)); ret = internal_get_sid_from_id(sid, id, id_type); if (!NT_STATUS_IS_OK(ret)) { return ret; } iderr = internal_get_id_from_sid(&id_tmp, &id_type_tmp, sid); if (iderr != GET_ID_FROM_SID_OK) { return NT_STATUS_UNSUCCESSFUL; } if (id_type_tmp != id_type) { return NT_STATUS_UNSUCCESSFUL; } else if (id_type == ID_USERID) { if (id_tmp.uid != id.uid) { return NT_STATUS_UNSUCCESSFUL; } } else if (id_type == ID_GROUPID) { if (id_tmp.gid != id.gid) { return NT_STATUS_UNSUCCESSFUL; } } else { return NT_STATUS_UNSUCCESSFUL; } return ret; } /* Get an id from a sid */ static NTSTATUS db_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; enum getidfromsiderr iderr; DEBUG(10,("db_get_id_from_sid\n")); if (!sid || !id || !id_type) return NT_STATUS_INVALID_PARAMETER; iderr = internal_get_id_from_sid(id, id_type, sid); if (iderr == GET_ID_FROM_SID_OK) { DOM_SID sid_tmp; ret = internal_get_sid_from_id(&sid_tmp, *id, *id_type); if (NT_STATUS_IS_OK(ret)) { if (!sid_equal(&sid_tmp, sid)) { return NT_STATUS_UNSUCCESSFUL; } } } else if (iderr == GET_ID_FROM_SID_WRONG_TYPE) { /* We found a record but not the type we wanted. * This is an error, not an opportunity to overwrite... * JRA. */ return NT_STATUS_UNSUCCESSFUL; } if (!(*id_type & ID_QUERY_ONLY) && (iderr != GET_ID_FROM_SID_OK) && (((*id_type & ID_TYPEMASK) == ID_USERID) || (*id_type & ID_TYPEMASK) == ID_GROUPID)) { TDB_DATA sid_data; TDB_DATA ugid_data; fstring sid_string; sid_to_string(sid_string, sid); sid_data.dptr = sid_string; sid_data.dsize = strlen(sid_string)+1; /* Lock the record for this SID. */ if (tdb_chainlock(idmap_tdb, sid_data) != 0) { DEBUG(10,("db_get_id_from_sid: failed to lock record %s. Error %s\n", sid_string, tdb_errorstr(idmap_tdb) )); return NT_STATUS_UNSUCCESSFUL; } do { fstring ugid_str; /* Allocate a new id for this sid */ ret = db_allocate_id(id, *id_type); if (!NT_STATUS_IS_OK(ret)) break; /* Store the UID side */ /* Store new id */ if (*id_type & ID_USERID) { slprintf(ugid_str, sizeof(ugid_str), "UID %lu", (unsigned long)((*id).uid)); } else { slprintf(ugid_str, sizeof(ugid_str), "GID %lu", (unsigned long)((*id).gid)); } ugid_data.dptr = ugid_str; ugid_data.dsize = strlen(ugid_str) + 1; DEBUG(10,("db_get_id_from_sid: storing %s -> %s\n", ugid_data.dptr, sid_data.dptr )); if (tdb_store(idmap_tdb, ugid_data, sid_data, TDB_INSERT) != -1) { ret = NT_STATUS_OK; break; } if (tdb_error(idmap_tdb) != TDB_ERR_EXISTS) DEBUG(10,("db_get_id_from_sid: error %s\n", tdb_errorstr(idmap_tdb) )); ret = NT_STATUS_UNSUCCESSFUL; } while (tdb_error(idmap_tdb) == TDB_ERR_EXISTS); if (NT_STATUS_IS_OK(ret)) { DEBUG(10,("db_get_id_from_sid: storing %s -> %s\n", sid_data.dptr, ugid_data.dptr )); if (tdb_store(idmap_tdb, sid_data, ugid_data, TDB_REPLACE) == -1) { DEBUG(10,("db_get_id_from_sid: error %s\n", tdb_errorstr(idmap_tdb) )); /* TODO: print tdb error !! */ tdb_chainunlock(idmap_tdb, sid_data); return NT_STATUS_UNSUCCESSFUL; } } tdb_chainunlock(idmap_tdb, sid_data); } return ret; } static NTSTATUS db_set_mapping(const DOM_SID *sid, unid_t id, int id_type) { TDB_DATA ksid, kid, data; fstring ksidstr; fstring kidstr; DEBUG(10,("db_set_mapping: id_type = 0x%x\n", id_type)); if (!sid) return NT_STATUS_INVALID_PARAMETER; sid_to_string(ksidstr, sid); ksid.dptr = ksidstr; ksid.dsize = strlen(ksidstr) + 1; if (id_type & ID_USERID) { slprintf(kidstr, sizeof(kidstr), "UID %lu", (unsigned long)id.uid); } else if (id_type & ID_GROUPID) { slprintf(kidstr, sizeof(kidstr), "GID %lu", (unsigned long)id.gid); } else { return NT_STATUS_INVALID_PARAMETER; } kid.dptr = kidstr; kid.dsize = strlen(kidstr) + 1; /* *DELETE* prevoius mappings if any. * This is done both SID and [U|G]ID passed in */ /* Lock the record for this SID. */ if (tdb_chainlock(idmap_tdb, ksid) != 0) { DEBUG(10,("db_set_mapping: failed to lock record %s. Error %s\n", ksidstr, tdb_errorstr(idmap_tdb) )); return NT_STATUS_UNSUCCESSFUL; } DEBUG(10,("db_set_mapping: fetching %s\n", ksid.dptr)); data = tdb_fetch(idmap_tdb, ksid); if (data.dptr) { DEBUG(10,("db_set_mapping: deleting %s and %s\n", data.dptr, ksid.dptr )); tdb_delete(idmap_tdb, data); tdb_delete(idmap_tdb, ksid); SAFE_FREE(data.dptr); } data = tdb_fetch(idmap_tdb, kid); if (data.dptr) { DEBUG(10,("db_set_mapping: deleting %s and %s\n", data.dptr, kid.dptr )); tdb_delete(idmap_tdb, data); tdb_delete(idmap_tdb, kid); SAFE_FREE(data.dptr); } if (tdb_store(idmap_tdb, ksid, kid, TDB_INSERT) == -1) { DEBUG(0, ("idb_set_mapping: tdb_store 1 error: %s\n", tdb_errorstr(idmap_tdb))); tdb_chainunlock(idmap_tdb, ksid); return NT_STATUS_UNSUCCESSFUL; } if (tdb_store(idmap_tdb, kid, ksid, TDB_INSERT) == -1) { DEBUG(0, ("idb_set_mapping: tdb_store 2 error: %s\n", tdb_errorstr(idmap_tdb))); tdb_chainunlock(idmap_tdb, ksid); return NT_STATUS_UNSUCCESSFUL; } tdb_chainunlock(idmap_tdb, ksid); DEBUG(10,("db_set_mapping: stored %s -> %s and %s -> %s\n", ksid.dptr, kid.dptr, kid.dptr, ksid.dptr )); return NT_STATUS_OK; } /***************************************************************************** Initialise idmap database. *****************************************************************************/ static NTSTATUS db_idmap_init( char *params ) { SMB_STRUCT_STAT stbuf; char *tdbfile = NULL; int32 version; BOOL tdb_is_new = False; /* use the old database if present */ tdbfile = strdup(lock_path("winbindd_idmap.tdb")); if (!tdbfile) { DEBUG(0, ("idmap_init: out of memory!\n")); return NT_STATUS_NO_MEMORY; } if (!file_exist(tdbfile, &stbuf)) { tdb_is_new = True; } DEBUG(10,("db_idmap_init: Opening tdbfile %s\n", tdbfile )); /* Open idmap repository */ if (!(idmap_tdb = tdb_open_log(tdbfile, 0, TDB_DEFAULT, O_RDWR | O_CREAT, 0644))) { DEBUG(0, ("idmap_init: Unable to open idmap database\n")); SAFE_FREE(tdbfile); return NT_STATUS_UNSUCCESSFUL; } SAFE_FREE(tdbfile); if (tdb_is_new) { /* the file didn't existed before opening it, let's * store idmap version as nobody else yet opened and * stored it. I do not like this method but didn't * found a way to understand if an opened tdb have * been just created or not --- SSS */ tdb_store_int32(idmap_tdb, "IDMAP_VERSION", IDMAP_VERSION); } /* check against earlier versions */ version = tdb_fetch_int32(idmap_tdb, "IDMAP_VERSION"); if (version != IDMAP_VERSION) { DEBUG(0, ("idmap_init: Unable to open idmap database, it's in an old format!\n")); return NT_STATUS_INTERNAL_DB_ERROR; } /* Create high water marks for group and user id */ if (!lp_idmap_uid(&idmap_state.uid_low, &idmap_state.uid_high)) { DEBUG(1, ("idmap uid range missing or invalid\n")); DEBUGADD(1, ("idmap will be unable to map foreign SIDs\n")); } else { if (tdb_fetch_int32(idmap_tdb, HWM_USER) == -1) { if (tdb_store_int32(idmap_tdb, HWM_USER, idmap_state.uid_low) == -1) { DEBUG(0, ("idmap_init: Unable to initialise user hwm in idmap database\n")); return NT_STATUS_INTERNAL_DB_ERROR; } } } if (!lp_idmap_gid(&idmap_state.gid_low, &idmap_state.gid_high)) { DEBUG(1, ("idmap gid range missing or invalid\n")); DEBUGADD(1, ("idmap will be unable to map foreign SIDs\n")); } else { if (tdb_fetch_int32(idmap_tdb, HWM_GROUP) == -1) { if (tdb_store_int32(idmap_tdb, HWM_GROUP, idmap_state.gid_low) == -1) { DEBUG(0, ("idmap_init: Unable to initialise group hwm in idmap database\n")); return NT_STATUS_INTERNAL_DB_ERROR; } } } return NT_STATUS_OK; } /* Close the tdb */ static NTSTATUS db_idmap_close(void) { if (idmap_tdb) { if (tdb_close(idmap_tdb) == 0) { return NT_STATUS_OK; } else { return NT_STATUS_UNSUCCESSFUL; } } return NT_STATUS_OK; } /* Dump status information to log file. Display different stuff based on the debug level: Debug Level Information Displayed ================================================================= 0 Percentage of [ug]id range allocated 0 High water marks (next allocated ids) */ #define DUMP_INFO 0 static void db_idmap_status(void) { int user_hwm, group_hwm; DEBUG(0, ("winbindd idmap status:\n")); /* Get current high water marks */ if ((user_hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) { DEBUG(DUMP_INFO, ("\tCould not get userid high water mark!\n")); } if ((group_hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) { DEBUG(DUMP_INFO, ("\tCould not get groupid high water mark!\n")); } /* Display next ids to allocate */ if (user_hwm != -1) { DEBUG(DUMP_INFO, ("\tNext userid to allocate is %d\n", user_hwm)); } if (group_hwm != -1) { DEBUG(DUMP_INFO, ("\tNext groupid to allocate is %d\n", group_hwm)); } /* Display percentage of id range already allocated. */ if (user_hwm != -1) { int num_users = user_hwm - idmap_state.uid_low; int total_users = idmap_state.uid_high - idmap_state.uid_low; DEBUG(DUMP_INFO, ("\tUser id range is %d%% full (%d of %d)\n", num_users * 100 / total_users, num_users, total_users)); } if (group_hwm != -1) { int num_groups = group_hwm - idmap_state.gid_low; int total_groups = idmap_state.gid_high - idmap_state.gid_low; DEBUG(DUMP_INFO, ("\tGroup id range is %d%% full (%d of %d)\n", num_groups * 100 / total_groups, num_groups, total_groups)); } /* Display complete mapping of users and groups to rids */ } /********************************************************************** Return the TDB_CONTEXT* for winbindd_idmap. I **really** feel dirty doing this, but not so dirty that I want to create another tdb ***********************************************************************/ TDB_CONTEXT *idmap_tdb_handle( void ) { if ( idmap_tdb ) return idmap_tdb; /* go ahead an open it; db_idmap_init() doesn't use any params right now */ db_idmap_init( NULL ); if ( idmap_tdb ) return idmap_tdb; return NULL; } static struct idmap_methods db_methods = { db_idmap_init, db_allocate_rid, db_allocate_id, db_get_sid_from_id, db_get_id_from_sid, db_set_mapping, db_idmap_close, db_idmap_status }; NTSTATUS idmap_tdb_init(void) { return smb_register_idmap(SMB_IDMAP_INTERFACE_VERSION, "tdb", &db_methods); }