diff options
author | Simo Sorce <ssorce@redhat.com> | 2009-10-24 12:27:42 -0400 |
---|---|---|
committer | Simo Sorce <ssorce@redhat.com> | 2009-10-27 10:12:57 -0400 |
commit | ee633d9fe3b48a88387edab7978bb16422525d21 (patch) | |
tree | 78c9771fe2b5f6dbc1191e26d814531efae52fc9 | |
parent | a982b0724e27f4059c2a150e591337d9511cb7be (diff) | |
download | sssd-ee633d9fe3b48a88387edab7978bb16422525d21.tar.gz sssd-ee633d9fe3b48a88387edab7978bb16422525d21.tar.bz2 sssd-ee633d9fe3b48a88387edab7978bb16422525d21.zip |
Add proper support for IPA/AD schemas
Nested groups weren't properly handled.
Add 2 pass strategy to update groups memberships
Stuff work as expected when enumeration is enabled now.
-rw-r--r-- | server/providers/ldap/ldap_common.c | 10 | ||||
-rw-r--r-- | server/providers/ldap/ldap_id.c | 3 | ||||
-rw-r--r-- | server/providers/ldap/sdap.h | 3 | ||||
-rw-r--r-- | server/providers/ldap/sdap_async.c | 760 |
4 files changed, 574 insertions, 202 deletions
diff --git a/server/providers/ldap/ldap_common.c b/server/providers/ldap/ldap_common.c index b03e58fc..bb836c1e 100644 --- a/server/providers/ldap/ldap_common.c +++ b/server/providers/ldap/ldap_common.c @@ -162,6 +162,16 @@ int ldap_get_options(TALLOC_CTX *memctx, opts->schema_type = SDAP_SCHEMA_RFC2307BIS; default_user_map = rfc2307bis_user_map; default_group_map = rfc2307bis_group_map; + } else + if (strcasecmp(schema, "IPA") == 0) { + opts->schema_type = SDAP_SCHEMA_IPA_V1; + default_user_map = rfc2307bis_user_map; + default_group_map = rfc2307bis_group_map; + } else + if (strcasecmp(schema, "AD") == 0) { + opts->schema_type = SDAP_SCHEMA_AD; + default_user_map = rfc2307bis_user_map; + default_group_map = rfc2307bis_group_map; } else { DEBUG(0, ("Unrecognized schema type: %s\n", schema)); ret = EINVAL; diff --git a/server/providers/ldap/ldap_id.c b/server/providers/ldap/ldap_id.c index 681848f7..ecb87617 100644 --- a/server/providers/ldap/ldap_id.c +++ b/server/providers/ldap/ldap_id.c @@ -836,7 +836,8 @@ static void ldap_id_enum_groups_done(struct tevent_req *subreq) fail: /* always go offline on failures */ be_mark_offline(state->ctx->be); - DEBUG(1, ("Failed to enumerate groups, retrying later!\n")); + DEBUG(1, ("Failed to enumerate groups (%d [%s]), retrying later!\n", + (int)err, strerror(err))); tevent_req_done(req); } diff --git a/server/providers/ldap/sdap.h b/server/providers/ldap/sdap.h index 3abe2d66..3768015b 100644 --- a/server/providers/ldap/sdap.h +++ b/server/providers/ldap/sdap.h @@ -181,7 +181,8 @@ struct sdap_options { enum schema_type { SDAP_SCHEMA_RFC2307 = 1, /* memberUid = uid */ SDAP_SCHEMA_RFC2307BIS = 2, /* member = dn */ - SDAP_SCHEMA_IPA_V1 = 3 /* member/memberof with unrolling */ + SDAP_SCHEMA_IPA_V1 = 3, /* member/memberof */ + SDAP_SCHEMA_AD = 4 /* AD's member/memberof */ } schema_type; struct ldb_dn *users_base; diff --git a/server/providers/ldap/sdap_async.c b/server/providers/ldap/sdap_async.c index 6b8790a1..140f3fae 100644 --- a/server/providers/ldap/sdap_async.c +++ b/server/providers/ldap/sdap_async.c @@ -1027,7 +1027,7 @@ static int sdap_krb5_get_tgt_sync(TALLOC_CTX *memctx, ret = ENOMEM; goto done; } - DEBUG(1, ("Principal name is: [%s]\n", full_princ)); + DEBUG(4, ("Principal name is: [%s]\n", full_princ)); krberr = krb5_parse_name(context, full_princ, &kprinc); if (krberr) { @@ -1561,6 +1561,433 @@ static int sdap_save_user_recv(struct tevent_req *req, return EOK; } +/* ==Group-Parsing Routines=============================================== */ + +struct sdap_grp_members { + struct sdap_grp_members *prev, *next; + + char *name; + char *dn; + struct ldb_val *member_dns; + int num_mem_dns; +}; + +/* this function steals memory from "attrs", but does not modify its + * pointers. Make sure that's ok with what the caller expects */ +static int sdap_get_groups_save_membership(TALLOC_CTX *memctx, + struct sdap_options *opts, + struct sysdb_attrs *attrs, + struct sdap_grp_members **list) +{ + struct sdap_grp_members *m; + struct ldb_message_element *el; + int ret; + + m = talloc_zero(memctx, struct sdap_grp_members); + if (!m) { + return ENOMEM; + } + + ret = sysdb_attrs_get_el(attrs, + opts->group_map[SDAP_AT_GROUP_NAME].sys_name, &el); + if (ret != EOK) { + goto fail; + } + + m->name = talloc_steal(m, (char *)el->values[0].data); + if (!m->name) { + ret = ENOMEM; + goto fail; + } + + ret = sysdb_attrs_get_el(attrs, SYSDB_ORIG_DN, &el); + if (ret != EOK) { + goto fail; + } + m->dn = talloc_steal(m, (char *)el->values[0].data); + if (!m->dn) { + ret = ENOMEM; + goto fail; + } + + ret = sysdb_attrs_get_el(attrs, + opts->group_map[SDAP_AT_GROUP_MEMBER].sys_name, &el); + if (ret != EOK) { + goto fail; + } + if (el->num_values) { + m->member_dns = talloc_steal(m, el->values); + if (!m->member_dns) { + ret = ENOMEM; + goto fail; + } + } + m->num_mem_dns = el->num_values; + + DLIST_ADD(*list, m); + + return EOK; + +fail: + talloc_free(m); + return ret; +} + +static int sdap_parse_memberships(TALLOC_CTX *memctx, + struct sysdb_handle *handle, + struct sdap_options *opts, + struct ldb_val *values, + int num_values, + const char ***member_users, + const char ***member_groups) +{ + const char **mgs = NULL; + const char **mus = NULL; + int i, u, g; + int ret; + + /* if this is the first time we are called, check if users and + * groups base DNs are set, if not do it */ + if (!opts->users_base) { + opts->users_base = ldb_dn_new_fmt(opts, + sysdb_handle_get_ldb(handle), "%s", + dp_opt_get_string(opts->basic, + SDAP_USER_SEARCH_BASE)); + if (!opts->users_base) { + DEBUG(1, ("Unable to get casefold Users Base DN from [%s]\n", + dp_opt_get_string(opts->basic, + SDAP_USER_SEARCH_BASE))); + DEBUG(1, ("Out of memory?!\n")); + ret = ENOMEM; + goto done; + } + } + if (!opts->groups_base) { + opts->groups_base = ldb_dn_new_fmt(opts, + sysdb_handle_get_ldb(handle), "%s", + dp_opt_get_string(opts->basic, + SDAP_GROUP_SEARCH_BASE)); + if (!opts->users_base) { + DEBUG(1, ("Unable to get casefold Users Base DN from [%s]\n", + dp_opt_get_string(opts->basic, + SDAP_GROUP_SEARCH_BASE))); + DEBUG(1, ("Out of memory?!\n")); + ret = ENOMEM; + goto done; + } + } + + switch (opts->schema_type) { + case SDAP_SCHEMA_RFC2307: + DEBUG(9, ("[RFC2307 Schema]\n")); + + mus = talloc_array(memctx, const char *, num_values +1); + if (!mus) { + ret = ENOMEM; + goto done; + } + for (i = 0; i < num_values; i++) { + mus[i] = (char *)values[i].data; + DEBUG(7, (" member user %d: [%s]\n", i, mus[i])); + } + mus[i] = NULL; + + break; + + case SDAP_SCHEMA_RFC2307BIS: + DEBUG(9, ("[RFC2307bis Schema]\n")); + + /* in this schema only users are members */ + mus = talloc_array(memctx, const char *, num_values +1); + if (!mus) { + ret = ENOMEM; + goto done; + } + + for (i = 0, u = 0; i < num_values; i++) { + struct ldb_dn *tmp_dn = NULL; + const struct ldb_val *v; + + /* parse out DN */ + tmp_dn = ldb_dn_new_fmt(mus, + sysdb_handle_get_ldb(handle), "%.*s", + (int)values[i].length, + (char *)values[i].data); + if (!tmp_dn) { + DEBUG(1, ("Unable to parse DN: [%.*s]\n", + (int)values[i].length, + (char *)values[i].data)); + continue; + } + v = ldb_dn_get_rdn_val(tmp_dn); + if (!v) { + DEBUG(1, ("Unable to parse DN: [%.*s]\n", + (int)values[i].length, + (char *)values[i].data)); + continue; + } + + mus[u] = talloc_asprintf(mus, "%.*s", + (int)v->length, + (char *)v->data); + if (!mus[u]) { + DEBUG(1, ("Out of memory?!\n")); + continue; + } + u++; + + DEBUG(9, ("Member DN [%.*s], RDN [%.*s]\n", + (int)values[i].length, (char *)values[i].data, + (int)v->length, (char *)v->data)); + } + break; + + case SDAP_SCHEMA_IPA_V1: + case SDAP_SCHEMA_AD: + DEBUG(9, ("[IPA or AD Schema]\n")); + + /* Just allocate both big enough to contain all members for now */ + mus = talloc_array(memctx, const char *, num_values +1); + if (!mus) { + ret = ENOMEM; + goto done; + } + + mgs = talloc_array(memctx, const char *, num_values +1); + if (!mgs) { + ret = ENOMEM; + goto done; + } + + u = 0; + g = 0; + + for (i = 0; i < num_values; i++) { + struct ldb_dn *tmp_dn = NULL; + const struct ldb_val *v; + + /* parse out DN */ + tmp_dn = ldb_dn_new_fmt(mus, + sysdb_handle_get_ldb(handle), + "%.*s", + (int)values[i].length, + (char *)values[i].data); + if (!tmp_dn) { + DEBUG(1, ("Unable to parse DN: [%.*s]\n", + (int)values[i].length, + (char *)values[i].data)); + continue; + } + v = ldb_dn_get_rdn_val(tmp_dn); + if (!v) { + DEBUG(1, ("Unable to parse DN: [%.*s]\n", + (int)values[i].length, + (char *)values[i].data)); + continue; + } + DEBUG(9, ("Member DN [%.*s], RDN [%.*s]\n", + (int)values[i].length, (char *)values[i].data, + (int)v->length, (char *)v->data)); + + if (ldb_dn_compare_base(opts->users_base, tmp_dn) == 0) { + mus[u] = talloc_asprintf(mus, "%.*s", + (int)v->length, + (char *)v->data); + if (!mus[u]) { + DEBUG(1, ("Out of memory?!\n")); + continue; + } + u++; + + DEBUG(7, (" member user %d: [%.*s]\n", i, + (int)v->length, (char *)v->data)); + } else + if (ldb_dn_compare_base(opts->groups_base, tmp_dn) == 0) { + mgs[g] = talloc_asprintf(mgs, "%.*s", + (int)v->length, + (char *)v->data); + if (!mgs[g]) { + DEBUG(1, ("Out of memory?!\n")); + continue; + } + g++; + + DEBUG(7, (" member group %d: [%.*s]\n", i, + (int)v->length, (char *)v->data)); + } else { + DEBUG(1, ("Unkown Member type for DN: [%.*s]\n", + (int)values[i].length, + (char *)values[i].data)); + continue; + } + } + + if (g) { + mgs[g] = NULL; + } else { + talloc_zfree(mgs); + } + + if (u) { + mus[u] = NULL; + } else { + talloc_zfree(mus); + } + + break; + + default: + DEBUG(0, ("FATAL ERROR: Unhandled schema type! (%d)\n", + opts->schema_type)); + ret = EFAULT; + goto done; + } + + ret = EOK; + +done: + if (ret != EOK) { + talloc_zfree(mus); + talloc_zfree(mgs); + } + + *member_users = mus; + *member_groups = mgs; + + return ret; +} + +/* ==Save-Groups-Members================================================== */ + +struct sdap_set_members_state { + struct tevent_context *ev; + struct sysdb_handle *handle; + struct sdap_options *opts; + + struct sss_domain_info *dom; + + struct sdap_grp_members *curmem; +}; + +static void sdap_set_members_done(struct tevent_req *subreq); +static struct tevent_req *sdap_set_grpmem_send(TALLOC_CTX *memctx, + struct tevent_context *ev, + struct sysdb_handle *handle, + struct sdap_options *opts, + struct sss_domain_info *dom, + struct sdap_grp_members *gm); +static struct tevent_req *sdap_set_members_send(TALLOC_CTX *memctx, + struct tevent_context *ev, + struct sysdb_handle *handle, + struct sdap_options *opts, + struct sss_domain_info *dom, + struct sdap_grp_members *m) +{ + struct tevent_req *req, *subreq; + struct sdap_set_members_state *state; + + DEBUG(9, ("Now setting group members.\n")); + + req = tevent_req_create(memctx, &state, struct sdap_set_members_state); + if (!req) return NULL; + + state->ev = ev; + state->handle = handle; + state->dom = dom; + state->opts = opts; + state->curmem = m; + + subreq = sdap_set_grpmem_send(state, state->ev, state->handle, + state->opts, state->dom, + state->curmem); + if (!subreq) { + DEBUG(6, ("Error: Out of memory\n")); + return NULL; + } + tevent_req_set_callback(subreq, sdap_set_members_done, req); + + return req; +} + +static struct tevent_req *sdap_set_grpmem_send(TALLOC_CTX *memctx, + struct tevent_context *ev, + struct sysdb_handle *handle, + struct sdap_options *opts, + struct sss_domain_info *dom, + struct sdap_grp_members *gm) +{ + struct tevent_req *subreq; + const char **member_groups = NULL; + const char **member_users = NULL; + int ret; + + DEBUG(7, ("Adding member users to group [%s]\n", gm->name)); + + ret = sdap_parse_memberships(memctx, handle, opts, + gm->member_dns, + gm->num_mem_dns, + &member_users, &member_groups); + if (ret != EOK) { + return NULL; + } + + subreq = sysdb_store_group_send(memctx, ev, handle, dom, + gm->name, 0, + member_users, member_groups, NULL); + + /* steal members on subreq, + * so they are freed when the request is finished */ + talloc_steal(subreq, member_users); + talloc_steal(subreq, member_groups); + + return subreq; +} + +static void sdap_set_members_done(struct tevent_req *subreq) +{ + struct tevent_req *req = tevent_req_callback_data(subreq, + struct tevent_req); + struct sdap_set_members_state *state = tevent_req_data(req, + struct sdap_set_members_state); + int ret; + + ret = sysdb_store_group_recv(subreq); + talloc_zfree(subreq); + if (ret) { + DEBUG(2, ("Failed to store group members for %s. Ignoring\n", + state->curmem->name)); + } + + if (state->curmem->next) { + state->curmem = state->curmem->next; + + subreq = sdap_set_grpmem_send(state, state->ev, state->handle, + state->opts, state->dom, + state->curmem); + if (!subreq) { + DEBUG(6, ("Error: Out of memory\n")); + tevent_req_error(req, ENOMEM); + return; + } + tevent_req_set_callback(subreq, sdap_set_members_done, req); + return; + } + + tevent_req_done(req); +} + +static int sdap_set_members_recv(struct tevent_req *req) +{ + enum tevent_req_state tstate; + uint64_t err; + + if (tevent_req_is_error(req, &tstate, &err)) { + if (err) return err; + return EIO; + } + + return EOK; +} /* ==Save-Group-Entry===================================================== */ @@ -1568,12 +1995,10 @@ struct sdap_save_group_state { struct tevent_context *ev; struct sysdb_handle *handle; struct sdap_options *opts; - struct sdap_handle *sh; struct sss_domain_info *dom; const char *name; - struct sysdb_attrs *attrs; char *timestamp; }; @@ -1587,8 +2012,8 @@ static struct tevent_req *sdap_save_group_send(TALLOC_CTX *memctx, struct sysdb_handle *handle, struct sdap_options *opts, struct sss_domain_info *dom, - struct sdap_handle *sh, - struct sdap_msg *entry) + struct sysdb_attrs *attrs, + bool store_members) { struct tevent_req *req, *subreq; struct sdap_save_group_state *state; @@ -1596,8 +2021,6 @@ static struct tevent_req *sdap_save_group_send(TALLOC_CTX *memctx, const char **member_groups = NULL; const char **member_users = NULL; struct sysdb_attrs *group_attrs; - int mu, mg; - int i; long int l; gid_t gid; int ret; @@ -1607,16 +2030,11 @@ static struct tevent_req *sdap_save_group_send(TALLOC_CTX *memctx, state->ev = ev; state->handle = handle; - state->sh = sh; state->dom = dom; state->opts = opts; state->timestamp = NULL; - ret = sdap_parse_group(state, state->opts, state->sh, - entry, &state->attrs, NULL); - if (ret) goto fail; - - ret = sysdb_attrs_get_el(state->attrs, + ret = sysdb_attrs_get_el(attrs, opts->group_map[SDAP_AT_GROUP_NAME].sys_name, &el); if (ret) goto fail; if (el->num_values == 0) { @@ -1625,7 +2043,7 @@ static struct tevent_req *sdap_save_group_send(TALLOC_CTX *memctx, } state->name = (const char *)el->values[0].data; - ret = sysdb_attrs_get_el(state->attrs, + ret = sysdb_attrs_get_el(attrs, opts->group_map[SDAP_AT_GROUP_GID].sys_name, &el); if (ret) goto fail; if (el->num_values == 0) { @@ -1648,7 +2066,7 @@ static struct tevent_req *sdap_save_group_send(TALLOC_CTX *memctx, goto fail; } - ret = sysdb_attrs_get_el(state->attrs, SYSDB_ORIG_DN, &el); + ret = sysdb_attrs_get_el(attrs, SYSDB_ORIG_DN, &el); if (ret) { goto fail; } @@ -1658,13 +2076,13 @@ static struct tevent_req *sdap_save_group_send(TALLOC_CTX *memctx, DEBUG(7, ("Adding original DN [%s] to attributes of [%s].\n", el->values[0].data, state->name)); ret = sysdb_attrs_add_string(group_attrs, SYSDB_ORIG_DN, - (const char *) el->values[0].data); + (const char *)el->values[0].data); if (ret) { goto fail; } } - ret = sysdb_attrs_get_el(state->attrs, + ret = sysdb_attrs_get_el(attrs, opts->group_map[SDAP_AT_GROUP_MODSTAMP].sys_name, &el); if (ret) { goto fail; @@ -1687,178 +2105,25 @@ static struct tevent_req *sdap_save_group_send(TALLOC_CTX *memctx, } } - switch (opts->schema_type) { - case SDAP_SCHEMA_RFC2307: - - ret = sysdb_attrs_get_el(state->attrs, + if (store_members) { + ret = sysdb_attrs_get_el(attrs, opts->group_map[SDAP_AT_GROUP_MEMBER].sys_name, &el); - if (ret) goto fail; - if (el->num_values == 0) { - DEBUG(7, ("[RFC2307bis] No members for group [%s]\n", state->name)); - break; - } - - DEBUG(7, ("[RFC2307] Adding member users to group [%s]\n", - state->name)); - - member_users = talloc_array(state, const char *, - el->num_values +1); - if (!member_users) { - ret = ENOMEM; + if (ret != EOK) { goto fail; } - for (i = 0; i < el->num_values; i++) { - member_users[i] = (char *)el->values[i].data; - DEBUG(7, (" member user %d: [%s]\n", i, member_users[i])); - } - member_users[i] = NULL; - - break; - - case SDAP_SCHEMA_RFC2307BIS: - case SDAP_SCHEMA_IPA_V1: - - /* if this is the first time we are called, check if users and - * groups base DNs are set, if not do it */ - if (!opts->users_base) { - opts->users_base = ldb_dn_new_fmt(opts, - sysdb_handle_get_ldb(state->handle), "%s", - dp_opt_get_string(opts->basic, - SDAP_USER_SEARCH_BASE)); - if (!opts->users_base) { - DEBUG(1, ("Unable to get casefold Users Base DN from [%s]\n", - dp_opt_get_string(opts->basic, - SDAP_USER_SEARCH_BASE))); - DEBUG(1, ("Out of memory?!\n")); - ret = ENOMEM; - goto fail; - } - } - if (!opts->groups_base) { - opts->groups_base = ldb_dn_new_fmt(state->handle, - sysdb_handle_get_ldb(state->handle), "%s", - dp_opt_get_string(opts->basic, - SDAP_GROUP_SEARCH_BASE)); - if (!opts->users_base) { - DEBUG(1, ("Unable to get casefold Users Base DN from [%s]\n", - dp_opt_get_string(opts->basic, - SDAP_GROUP_SEARCH_BASE))); - DEBUG(1, ("Out of memory?!\n")); - ret = ENOMEM; - goto fail; - } - } - - ret = sysdb_attrs_get_el(state->attrs, - opts->group_map[SDAP_AT_GROUP_MEMBER].sys_name, &el); - if (ret) goto fail; if (el->num_values == 0) { - DEBUG(7, ("[RFC2307bis] No members for group [%s]\n", state->name)); - break; - } + DEBUG(7, ("No members for group [%s]\n", state->name)); - /* this will hold both lists, - * users filling up from top and groups from bottom, - * so the array will need 2 slots for NULL terminating element */ - member_users = talloc_zero_array(state, const char *, - el->num_values +2); - if (!member_users) { - ret = ENOMEM; - goto fail; - } - - mg = el->num_values; - mu = 0; - - DEBUG(7, ("[RFC2307bis] Adding members to group [%s]\n", state->name)); - - for (i = 0; i < el->num_values; i++) { - - struct ldb_dn *tmp_dn = NULL; - const struct ldb_val *v; - - - /* parse out DN */ - tmp_dn = ldb_dn_new_fmt(member_users, - sysdb_handle_get_ldb(state->handle), - "%.*s", - (int)el->values[i].length, - (char *)el->values[i].data); - if (!tmp_dn) { - DEBUG(1, ("Unable to parse DN: [%.*s]\n", - (int)el->values[i].length, - (char *)el->values[i].data)); - continue; - } - v = ldb_dn_get_rdn_val(tmp_dn); - if (!v) { - DEBUG(1, ("Unable to parse DN: [%.*s]\n", - (int)el->values[i].length, - (char *)el->values[i].data)); - continue; - } - DEBUG(9, ("Member DN [%.*s], RDN [%.*s]\n", - (int)el->values[i].length, (char *)el->values[i].data, - (int)v->length, (char *)v->data)); - - if (ldb_dn_compare_base(opts->users_base, tmp_dn) == 0) { - member_users[mu] = talloc_asprintf(member_users, - "%.*s", - (int)v->length, - (char *)v->data); - if (!member_users[mu]) { - DEBUG(1, ("Out of memory?!\n")); - continue; - } - - DEBUG(7, (" member user %d: [%s]\n", i, member_users[mu])); - - mu++; - - } else if (ldb_dn_compare_base(opts->groups_base, tmp_dn) == 0) { - member_users[mg] = talloc_asprintf(member_users, - "%.*s", - (int)v->length, - (char *)v->data); - if (!member_users[mg]) { - DEBUG(1, ("Out of memory?!\n")); - continue; - } - - DEBUG(7, (" member group %d: [%s]\n", i, member_users[mg])); - - mg--; + } else { + DEBUG(7, ("Adding member users to group [%s]\n", state->name)); - } else { - DEBUG(1, ("Unkown Member type for DN: [%s]\n", - (int)el->values[i].length, - (char *)el->values[i].data)); - continue; - } - if (mu > mg) { /* shouldn't be possible */ - DEBUG(0, ("Fatal Internal error: aborting\n")); - ret = EFAULT; + ret = sdap_parse_memberships(state, handle, opts, + el->values, el->num_values, + &member_users, &member_groups); + if (ret) { goto fail; } } - - /* if there are groups, set member_groups */ - if (mg != el->num_values) { - member_groups = &member_users[mg+1]; - } - - /* if there are no users, reset member_users */ - if (mu == 0) { - member_users = NULL; - } - - break; - - default: - DEBUG(0, ("FATAL ERROR: Unhandled schema type! (%d)\n", - opts->schema_type)); - ret = EFAULT; - goto fail; } DEBUG(6, ("Storing info for group %s\n", state->name)); @@ -2156,6 +2421,8 @@ struct sdap_get_groups_state { struct sysdb_handle *handle; struct sdap_op *op; char *higher_timestamp; + + struct sdap_grp_members *mlist; }; static void sdap_get_groups_transaction(struct tevent_req *subreq); @@ -2163,6 +2430,7 @@ static void sdap_get_groups_done(struct sdap_op *op, struct sdap_msg *reply, int error, void *pvt); static void sdap_get_groups_save_done(struct tevent_req *subreq); +static void sdap_get_groups_save_mems(struct tevent_req *subreq); struct tevent_req *sdap_get_groups_send(TALLOC_CTX *memctx, struct tevent_context *ev, @@ -2186,9 +2454,12 @@ struct tevent_req *sdap_get_groups_send(TALLOC_CTX *memctx, state->filter = filter; state->attrs = attrs; state->higher_timestamp = NULL; + state->mlist = NULL; subreq = sysdb_transaction_send(state, state->ev, sysdb); - if (!subreq) return NULL; + if (!subreq) { + return NULL; + } tevent_req_set_callback(subreq, sdap_get_groups_transaction, req); return req; @@ -2252,6 +2523,7 @@ static void sdap_get_groups_done(struct sdap_op *op, struct sdap_get_groups_state *state = tevent_req_data(req, struct sdap_get_groups_state); struct tevent_req *subreq; + struct sysdb_attrs *grp_attrs; char *errmsg; int result; int ret; @@ -2272,19 +2544,56 @@ static void sdap_get_groups_done(struct sdap_op *op, case LDAP_RES_SEARCH_ENTRY: - /* FIXME: we should do this in 2 steps: - * first save groups, then add all memberships - * otherwise nested memberships may go missing - * if the member group is added only after the - * parent group is added */ - subreq = sdap_save_group_send(state, state->ev, state->handle, - state->opts, state->dom, - state->sh, reply); - if (!subreq) { - tevent_req_error(req, ENOMEM); + /* allocate on reply so that it will be freed once the + * reply is processed. Remember to steal if you need something + * to stick longer */ + ret = sdap_parse_group(reply, state->opts, state->sh, + reply, &grp_attrs, NULL); + if (ret != EOK) { + tevent_req_error(req, ret); + return; + } + + switch (state->opts->schema_type) { + case SDAP_SCHEMA_RFC2307: + case SDAP_SCHEMA_RFC2307BIS: + + subreq = sdap_save_group_send(state, state->ev, state->handle, + state->opts, state->dom, + grp_attrs, true); + if (!subreq) { + tevent_req_error(req, ENOMEM); + return; + } + tevent_req_set_callback(subreq, sdap_get_groups_save_done, req); + + break; + + case SDAP_SCHEMA_IPA_V1: + case SDAP_SCHEMA_AD: + + subreq = sdap_save_group_send(state, state->ev, state->handle, + state->opts, state->dom, + grp_attrs, false); + if (!subreq) { + tevent_req_error(req, ENOMEM); + return; + } + tevent_req_set_callback(subreq, sdap_get_groups_save_done, req); + + ret = sdap_get_groups_save_membership(state, state->opts, + grp_attrs, &state->mlist); + if (ret != EOK) { + tevent_req_error(req, ret); + return; + } + + break; + + default: + tevent_req_error(req, EFAULT); return; } - tevent_req_set_callback(subreq, sdap_get_groups_save_done, req); break; @@ -2302,14 +2611,28 @@ static void sdap_get_groups_done(struct sdap_op *op, DEBUG(3, ("Search result: %s(%d), %s\n", ldap_err2string(result), result, errmsg)); - subreq = sysdb_transaction_commit_send(state, state->ev, - state->handle); - if (!subreq) { - tevent_req_error(req, ENOMEM); - return; + if (state->mlist) { + /* need second pass to set members */ + subreq = sdap_set_members_send(state, state->ev, state->handle, + state->opts, state->dom, + state->mlist); + if (!subreq) { + tevent_req_error(req, ENOMEM); + return; + } + tevent_req_set_callback(subreq, sdap_get_groups_save_mems, req); + + } else { + subreq = sysdb_transaction_commit_send(state, state->ev, + state->handle); + if (!subreq) { + tevent_req_error(req, ENOMEM); + return; + } + /* sysdb_transaction_complete will call tevent_req_done(req) */ + tevent_req_set_callback(subreq, sysdb_transaction_complete, req); } - /* sysdb_transaction_complete will call tevent_req_done(req) */ - tevent_req_set_callback(subreq, sysdb_transaction_complete, req); + break; default: @@ -2356,6 +2679,32 @@ static void sdap_get_groups_save_done(struct tevent_req *subreq) sdap_unlock_next_reply(state->op); } +static void sdap_get_groups_save_mems(struct tevent_req *subreq) +{ + struct tevent_req *req = tevent_req_callback_data(subreq, + struct tevent_req); + struct sdap_get_groups_state *state = tevent_req_data(req, + struct sdap_get_groups_state); + int ret; + + ret = sdap_set_members_recv(subreq); + talloc_zfree(subreq); + + if (ret) { + DEBUG(2, ("Failed to store group memberships.\n")); + tevent_req_error(req, ret); + return; + } + + subreq = sysdb_transaction_commit_send(state, state->ev, state->handle); + if (!subreq) { + tevent_req_error(req, ENOMEM); + return; + } + /* sysdb_transaction_complete will call tevent_req_done(req) */ + tevent_req_set_callback(subreq, sysdb_transaction_complete, req); +} + int sdap_get_groups_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, char **timestamp) { @@ -2587,6 +2936,7 @@ static void sdap_get_initgr_done(struct sdap_op *op, struct sdap_get_initgr_state *state = tevent_req_data(req, struct sdap_get_initgr_state); struct tevent_req *subreq; + struct sysdb_attrs *grp_attrs; char *errmsg; int result; int ret; @@ -2607,9 +2957,19 @@ static void sdap_get_initgr_done(struct sdap_op *op, case LDAP_RES_SEARCH_ENTRY: + /* allocate on reply so that it will be freed once the + * reply is processed. Remember to steal if you need something + * to stick longer */ + ret = sdap_parse_group(reply, state->opts, state->sh, + reply, &grp_attrs, NULL); + if (ret != EOK) { + tevent_req_error(req, ret); + return; + } + subreq = sdap_save_group_send(state, state->ev, state->handle, state->opts, state->dom, - state->sh, reply); + grp_attrs, true); if (!subreq) { tevent_req_error(req, ENOMEM); return; |