| 1 | /*
|
|---|
| 2 | Unix SMB/CIFS implementation.
|
|---|
| 3 |
|
|---|
| 4 | idmap TDB2 backend, used for clustered Samba setups.
|
|---|
| 5 |
|
|---|
| 6 | This uses dbwrap to access tdb files. The location can be set
|
|---|
| 7 | using tdb:idmap2.tdb =" in smb.conf
|
|---|
| 8 |
|
|---|
| 9 | Copyright (C) Andrew Tridgell 2007
|
|---|
| 10 |
|
|---|
| 11 | This is heavily based upon idmap_tdb.c, which is:
|
|---|
| 12 |
|
|---|
| 13 | Copyright (C) Tim Potter 2000
|
|---|
| 14 | Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
|
|---|
| 15 | Copyright (C) Jeremy Allison 2006
|
|---|
| 16 | Copyright (C) Simo Sorce 2003-2006
|
|---|
| 17 |
|
|---|
| 18 | This program is free software; you can redistribute it and/or modify
|
|---|
| 19 | it under the terms of the GNU General Public License as published by
|
|---|
| 20 | the Free Software Foundation; either version 2 of the License, or
|
|---|
| 21 | (at your option) any later version.
|
|---|
| 22 |
|
|---|
| 23 | This program is distributed in the hope that it will be useful,
|
|---|
| 24 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|---|
| 25 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|---|
| 26 | GNU General Public License for more details.
|
|---|
| 27 |
|
|---|
| 28 | You should have received a copy of the GNU General Public License
|
|---|
| 29 | along with this program; if not, write to the Free Software
|
|---|
| 30 | Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|---|
| 31 | */
|
|---|
| 32 |
|
|---|
| 33 | #include "includes.h"
|
|---|
| 34 | #include "winbindd.h"
|
|---|
| 35 |
|
|---|
| 36 | #undef DBGC_CLASS
|
|---|
| 37 | #define DBGC_CLASS DBGC_IDMAP
|
|---|
| 38 |
|
|---|
| 39 | /* High water mark keys */
|
|---|
| 40 | #define HWM_GROUP "GROUP HWM"
|
|---|
| 41 | #define HWM_USER "USER HWM"
|
|---|
| 42 |
|
|---|
| 43 | static struct idmap_tdb2_state {
|
|---|
| 44 | /* User and group id pool */
|
|---|
| 45 | uid_t low_uid, high_uid; /* Range of uids to allocate */
|
|---|
| 46 | gid_t low_gid, high_gid; /* Range of gids to allocate */
|
|---|
| 47 | const char *idmap_script;
|
|---|
| 48 | } idmap_tdb2_state;
|
|---|
| 49 |
|
|---|
| 50 |
|
|---|
| 51 |
|
|---|
| 52 | /* handle to the permanent tdb */
|
|---|
| 53 | static struct db_context *idmap_tdb2;
|
|---|
| 54 |
|
|---|
| 55 | static NTSTATUS idmap_tdb2_alloc_load(void);
|
|---|
| 56 |
|
|---|
| 57 | static NTSTATUS idmap_tdb2_load_ranges(void)
|
|---|
| 58 | {
|
|---|
| 59 | uid_t low_uid = 0;
|
|---|
| 60 | uid_t high_uid = 0;
|
|---|
| 61 | gid_t low_gid = 0;
|
|---|
| 62 | gid_t high_gid = 0;
|
|---|
| 63 |
|
|---|
| 64 | if (!lp_idmap_uid(&low_uid, &high_uid)) {
|
|---|
| 65 | DEBUG(1, ("idmap uid missing\n"));
|
|---|
| 66 | return NT_STATUS_UNSUCCESSFUL;
|
|---|
| 67 | }
|
|---|
| 68 |
|
|---|
| 69 | if (!lp_idmap_gid(&low_gid, &high_gid)) {
|
|---|
| 70 | DEBUG(1, ("idmap gid missing\n"));
|
|---|
| 71 | return NT_STATUS_UNSUCCESSFUL;
|
|---|
| 72 | }
|
|---|
| 73 |
|
|---|
| 74 | idmap_tdb2_state.low_uid = low_uid;
|
|---|
| 75 | idmap_tdb2_state.high_uid = high_uid;
|
|---|
| 76 | idmap_tdb2_state.low_gid = low_gid;
|
|---|
| 77 | idmap_tdb2_state.high_gid = high_gid;
|
|---|
| 78 |
|
|---|
| 79 | if (idmap_tdb2_state.high_uid <= idmap_tdb2_state.low_uid) {
|
|---|
| 80 | DEBUG(1, ("idmap uid range missing or invalid\n"));
|
|---|
| 81 | DEBUGADD(1, ("idmap will be unable to map foreign SIDs\n"));
|
|---|
| 82 | return NT_STATUS_UNSUCCESSFUL;
|
|---|
| 83 | }
|
|---|
| 84 |
|
|---|
| 85 | if (idmap_tdb2_state.high_gid <= idmap_tdb2_state.low_gid) {
|
|---|
| 86 | DEBUG(1, ("idmap gid range missing or invalid\n"));
|
|---|
| 87 | DEBUGADD(1, ("idmap will be unable to map foreign SIDs\n"));
|
|---|
| 88 | return NT_STATUS_UNSUCCESSFUL;
|
|---|
| 89 | }
|
|---|
| 90 |
|
|---|
| 91 | return NT_STATUS_OK;
|
|---|
| 92 | }
|
|---|
| 93 |
|
|---|
| 94 | /*
|
|---|
| 95 | open the permanent tdb
|
|---|
| 96 | */
|
|---|
| 97 | static NTSTATUS idmap_tdb2_open_db(void)
|
|---|
| 98 | {
|
|---|
| 99 | char *db_path;
|
|---|
| 100 |
|
|---|
| 101 | if (idmap_tdb2) {
|
|---|
| 102 | /* its already open */
|
|---|
| 103 | return NT_STATUS_OK;
|
|---|
| 104 | }
|
|---|
| 105 |
|
|---|
| 106 | db_path = lp_parm_talloc_string(-1, "tdb", "idmap2.tdb", NULL);
|
|---|
| 107 | if (db_path == NULL) {
|
|---|
| 108 | /* fall back to the private directory, which, despite
|
|---|
| 109 | its name, is usually on shared storage */
|
|---|
| 110 | db_path = talloc_asprintf(NULL, "%s/idmap2.tdb", lp_private_dir());
|
|---|
| 111 | }
|
|---|
| 112 | NT_STATUS_HAVE_NO_MEMORY(db_path);
|
|---|
| 113 |
|
|---|
| 114 | /* Open idmap repository */
|
|---|
| 115 | idmap_tdb2 = db_open(NULL, db_path, 0, TDB_DEFAULT, O_RDWR|O_CREAT, 0644);
|
|---|
| 116 | TALLOC_FREE(db_path);
|
|---|
| 117 |
|
|---|
| 118 | if (idmap_tdb2 == NULL) {
|
|---|
| 119 | DEBUG(0, ("Unable to open idmap_tdb2 database '%s'\n",
|
|---|
| 120 | db_path));
|
|---|
| 121 | return NT_STATUS_UNSUCCESSFUL;
|
|---|
| 122 | }
|
|---|
| 123 |
|
|---|
| 124 | /* load the ranges and high/low water marks */
|
|---|
| 125 | return idmap_tdb2_alloc_load();
|
|---|
| 126 | }
|
|---|
| 127 |
|
|---|
| 128 |
|
|---|
| 129 | /*
|
|---|
| 130 | load the idmap allocation ranges and high/low water marks
|
|---|
| 131 | */
|
|---|
| 132 | static NTSTATUS idmap_tdb2_alloc_load(void)
|
|---|
| 133 | {
|
|---|
| 134 | NTSTATUS status;
|
|---|
| 135 | uint32 low_id;
|
|---|
| 136 |
|
|---|
| 137 | /* see if a idmap script is configured */
|
|---|
| 138 | idmap_tdb2_state.idmap_script = lp_parm_const_string(-1, "idmap",
|
|---|
| 139 | "script", NULL);
|
|---|
| 140 |
|
|---|
| 141 | if (idmap_tdb2_state.idmap_script) {
|
|---|
| 142 | DEBUG(1, ("using idmap script '%s'\n",
|
|---|
| 143 | idmap_tdb2_state.idmap_script));
|
|---|
| 144 | }
|
|---|
| 145 |
|
|---|
| 146 | /* load ranges */
|
|---|
| 147 |
|
|---|
| 148 | status = idmap_tdb2_load_ranges();
|
|---|
| 149 | if (!NT_STATUS_IS_OK(status)) {
|
|---|
| 150 | return status;
|
|---|
| 151 | }
|
|---|
| 152 |
|
|---|
| 153 | /* Create high water marks for group and user id */
|
|---|
| 154 |
|
|---|
| 155 | low_id = dbwrap_fetch_int32(idmap_tdb2, HWM_USER);
|
|---|
| 156 | if ((low_id == -1) || (low_id < idmap_tdb2_state.low_uid)) {
|
|---|
| 157 | if (!NT_STATUS_IS_OK(dbwrap_trans_store_int32(
|
|---|
| 158 | idmap_tdb2, HWM_USER,
|
|---|
| 159 | idmap_tdb2_state.low_uid))) {
|
|---|
| 160 | DEBUG(0, ("Unable to initialise user hwm in idmap "
|
|---|
| 161 | "database\n"));
|
|---|
| 162 | return NT_STATUS_INTERNAL_DB_ERROR;
|
|---|
| 163 | }
|
|---|
| 164 | }
|
|---|
| 165 |
|
|---|
| 166 | low_id = dbwrap_fetch_int32(idmap_tdb2, HWM_GROUP);
|
|---|
| 167 | if ((low_id == -1) || (low_id < idmap_tdb2_state.low_gid)) {
|
|---|
| 168 | if (!NT_STATUS_IS_OK(dbwrap_trans_store_int32(
|
|---|
| 169 | idmap_tdb2, HWM_GROUP,
|
|---|
| 170 | idmap_tdb2_state.low_gid))) {
|
|---|
| 171 | DEBUG(0, ("Unable to initialise group hwm in idmap "
|
|---|
| 172 | "database\n"));
|
|---|
| 173 | return NT_STATUS_INTERNAL_DB_ERROR;
|
|---|
| 174 | }
|
|---|
| 175 | }
|
|---|
| 176 |
|
|---|
| 177 | return NT_STATUS_OK;
|
|---|
| 178 | }
|
|---|
| 179 |
|
|---|
| 180 |
|
|---|
| 181 | /*
|
|---|
| 182 | Initialise idmap alloc database.
|
|---|
| 183 | */
|
|---|
| 184 | static NTSTATUS idmap_tdb2_alloc_init(const char *params)
|
|---|
| 185 | {
|
|---|
| 186 | /* nothing to do - we want to avoid opening the permanent
|
|---|
| 187 | database if possible. Instead we load the params when we
|
|---|
| 188 | first need it. */
|
|---|
| 189 | return NT_STATUS_OK;
|
|---|
| 190 | }
|
|---|
| 191 |
|
|---|
| 192 |
|
|---|
| 193 | /*
|
|---|
| 194 | Allocate a new id.
|
|---|
| 195 | */
|
|---|
| 196 |
|
|---|
| 197 | struct idmap_tdb2_allocate_id_context {
|
|---|
| 198 | const char *hwmkey;
|
|---|
| 199 | const char *hwmtype;
|
|---|
| 200 | uint32_t high_hwm;
|
|---|
| 201 | uint32_t hwm;
|
|---|
| 202 | };
|
|---|
| 203 |
|
|---|
| 204 | static NTSTATUS idmap_tdb2_allocate_id_action(struct db_context *db,
|
|---|
| 205 | void *private_data)
|
|---|
| 206 | {
|
|---|
| 207 | NTSTATUS ret;
|
|---|
| 208 | struct idmap_tdb2_allocate_id_context *state;
|
|---|
| 209 | uint32_t hwm;
|
|---|
| 210 |
|
|---|
| 211 | state = (struct idmap_tdb2_allocate_id_context *)private_data;
|
|---|
| 212 |
|
|---|
| 213 | hwm = dbwrap_fetch_int32(db, state->hwmkey);
|
|---|
| 214 | if (hwm == -1) {
|
|---|
| 215 | ret = NT_STATUS_INTERNAL_DB_ERROR;
|
|---|
| 216 | goto done;
|
|---|
| 217 | }
|
|---|
| 218 |
|
|---|
| 219 | /* check it is in the range */
|
|---|
| 220 | if (hwm > state->high_hwm) {
|
|---|
| 221 | DEBUG(1, ("Fatal Error: %s range full!! (max: %lu)\n",
|
|---|
| 222 | state->hwmtype, (unsigned long)state->high_hwm));
|
|---|
| 223 | ret = NT_STATUS_UNSUCCESSFUL;
|
|---|
| 224 | goto done;
|
|---|
| 225 | }
|
|---|
| 226 |
|
|---|
| 227 | /* fetch a new id and increment it */
|
|---|
| 228 | ret = dbwrap_trans_change_uint32_atomic(db, state->hwmkey, &hwm, 1);
|
|---|
| 229 | if (!NT_STATUS_IS_OK(ret)) {
|
|---|
| 230 | DEBUG(1, ("Fatal error while fetching a new %s value\n!",
|
|---|
| 231 | state->hwmtype));
|
|---|
| 232 | goto done;
|
|---|
| 233 | }
|
|---|
| 234 |
|
|---|
| 235 | /* recheck it is in the range */
|
|---|
| 236 | if (hwm > state->high_hwm) {
|
|---|
| 237 | DEBUG(1, ("Fatal Error: %s range full!! (max: %lu)\n",
|
|---|
| 238 | state->hwmtype, (unsigned long)state->high_hwm));
|
|---|
| 239 | ret = NT_STATUS_UNSUCCESSFUL;
|
|---|
| 240 | goto done;
|
|---|
| 241 | }
|
|---|
| 242 |
|
|---|
| 243 | ret = NT_STATUS_OK;
|
|---|
| 244 | state->hwm = hwm;
|
|---|
| 245 |
|
|---|
| 246 | done:
|
|---|
| 247 | return ret;
|
|---|
| 248 | }
|
|---|
| 249 |
|
|---|
| 250 | static NTSTATUS idmap_tdb2_allocate_id(struct unixid *xid)
|
|---|
| 251 | {
|
|---|
| 252 | const char *hwmkey;
|
|---|
| 253 | const char *hwmtype;
|
|---|
| 254 | uint32_t high_hwm;
|
|---|
| 255 | uint32_t hwm = 0;
|
|---|
| 256 | NTSTATUS status;
|
|---|
| 257 | struct idmap_tdb2_allocate_id_context state;
|
|---|
| 258 |
|
|---|
| 259 | status = idmap_tdb2_open_db();
|
|---|
| 260 | NT_STATUS_NOT_OK_RETURN(status);
|
|---|
| 261 |
|
|---|
| 262 | /* Get current high water mark */
|
|---|
| 263 | switch (xid->type) {
|
|---|
| 264 |
|
|---|
| 265 | case ID_TYPE_UID:
|
|---|
| 266 | hwmkey = HWM_USER;
|
|---|
| 267 | hwmtype = "UID";
|
|---|
| 268 | high_hwm = idmap_tdb2_state.high_uid;
|
|---|
| 269 | break;
|
|---|
| 270 |
|
|---|
| 271 | case ID_TYPE_GID:
|
|---|
| 272 | hwmkey = HWM_GROUP;
|
|---|
| 273 | hwmtype = "GID";
|
|---|
| 274 | high_hwm = idmap_tdb2_state.high_gid;
|
|---|
| 275 | break;
|
|---|
| 276 |
|
|---|
| 277 | default:
|
|---|
| 278 | DEBUG(2, ("Invalid ID type (0x%x)\n", xid->type));
|
|---|
| 279 | return NT_STATUS_INVALID_PARAMETER;
|
|---|
| 280 | }
|
|---|
| 281 |
|
|---|
| 282 | state.hwm = hwm;
|
|---|
| 283 | state.high_hwm = high_hwm;
|
|---|
| 284 | state.hwmtype = hwmtype;
|
|---|
| 285 | state.hwmkey = hwmkey;
|
|---|
| 286 |
|
|---|
| 287 | status = dbwrap_trans_do(idmap_tdb2, idmap_tdb2_allocate_id_action,
|
|---|
| 288 | &state);
|
|---|
| 289 |
|
|---|
| 290 | if (NT_STATUS_IS_OK(status)) {
|
|---|
| 291 | xid->id = state.hwm;
|
|---|
| 292 | DEBUG(10,("New %s = %d\n", hwmtype, hwm));
|
|---|
| 293 | } else {
|
|---|
| 294 | DEBUG(1, ("Error allocating a new %s\n", hwmtype));
|
|---|
| 295 | }
|
|---|
| 296 |
|
|---|
| 297 | return status;
|
|---|
| 298 | }
|
|---|
| 299 |
|
|---|
| 300 | /*
|
|---|
| 301 | Get current highest id.
|
|---|
| 302 | */
|
|---|
| 303 | static NTSTATUS idmap_tdb2_get_hwm(struct unixid *xid)
|
|---|
| 304 | {
|
|---|
| 305 | const char *hwmkey;
|
|---|
| 306 | const char *hwmtype;
|
|---|
| 307 | uint32_t hwm;
|
|---|
| 308 | uint32_t high_hwm;
|
|---|
| 309 | NTSTATUS status;
|
|---|
| 310 |
|
|---|
| 311 | status = idmap_tdb2_open_db();
|
|---|
| 312 | NT_STATUS_NOT_OK_RETURN(status);
|
|---|
| 313 |
|
|---|
| 314 | /* Get current high water mark */
|
|---|
| 315 | switch (xid->type) {
|
|---|
| 316 |
|
|---|
| 317 | case ID_TYPE_UID:
|
|---|
| 318 | hwmkey = HWM_USER;
|
|---|
| 319 | hwmtype = "UID";
|
|---|
| 320 | high_hwm = idmap_tdb2_state.high_uid;
|
|---|
| 321 | break;
|
|---|
| 322 |
|
|---|
| 323 | case ID_TYPE_GID:
|
|---|
| 324 | hwmkey = HWM_GROUP;
|
|---|
| 325 | hwmtype = "GID";
|
|---|
| 326 | high_hwm = idmap_tdb2_state.high_gid;
|
|---|
| 327 | break;
|
|---|
| 328 |
|
|---|
| 329 | default:
|
|---|
| 330 | return NT_STATUS_INVALID_PARAMETER;
|
|---|
| 331 | }
|
|---|
| 332 |
|
|---|
| 333 | if ((hwm = dbwrap_fetch_int32(idmap_tdb2, hwmkey)) == -1) {
|
|---|
| 334 | return NT_STATUS_INTERNAL_DB_ERROR;
|
|---|
| 335 | }
|
|---|
| 336 |
|
|---|
| 337 | xid->id = hwm;
|
|---|
| 338 |
|
|---|
| 339 | /* Warn if it is out of range */
|
|---|
| 340 | if (hwm >= high_hwm) {
|
|---|
| 341 | DEBUG(0, ("Warning: %s range full!! (max: %lu)\n",
|
|---|
| 342 | hwmtype, (unsigned long)high_hwm));
|
|---|
| 343 | }
|
|---|
| 344 |
|
|---|
| 345 | return NT_STATUS_OK;
|
|---|
| 346 | }
|
|---|
| 347 |
|
|---|
| 348 | /*
|
|---|
| 349 | Set high id.
|
|---|
| 350 | */
|
|---|
| 351 | static NTSTATUS idmap_tdb2_set_hwm(struct unixid *xid)
|
|---|
| 352 | {
|
|---|
| 353 | /* not supported, or we would invalidate the cache tdb on
|
|---|
| 354 | other nodes */
|
|---|
| 355 | DEBUG(0,("idmap_tdb2_set_hwm not supported\n"));
|
|---|
| 356 | return NT_STATUS_NOT_SUPPORTED;
|
|---|
| 357 | }
|
|---|
| 358 |
|
|---|
| 359 | /*
|
|---|
| 360 | Close the alloc tdb
|
|---|
| 361 | */
|
|---|
| 362 | static NTSTATUS idmap_tdb2_alloc_close(void)
|
|---|
| 363 | {
|
|---|
| 364 | /* don't actually close it */
|
|---|
| 365 | return NT_STATUS_OK;
|
|---|
| 366 | }
|
|---|
| 367 |
|
|---|
| 368 | /*
|
|---|
| 369 | IDMAP MAPPING TDB BACKEND
|
|---|
| 370 | */
|
|---|
| 371 | struct idmap_tdb2_context {
|
|---|
| 372 | uint32_t filter_low_id;
|
|---|
| 373 | uint32_t filter_high_id;
|
|---|
| 374 | };
|
|---|
| 375 |
|
|---|
| 376 | /*
|
|---|
| 377 | Initialise idmap database.
|
|---|
| 378 | */
|
|---|
| 379 | static NTSTATUS idmap_tdb2_db_init(struct idmap_domain *dom,
|
|---|
| 380 | const char *params)
|
|---|
| 381 | {
|
|---|
| 382 | NTSTATUS ret;
|
|---|
| 383 | struct idmap_tdb2_context *ctx;
|
|---|
| 384 | NTSTATUS status;
|
|---|
| 385 |
|
|---|
| 386 | status = idmap_tdb2_open_db();
|
|---|
| 387 | NT_STATUS_NOT_OK_RETURN(status);
|
|---|
| 388 |
|
|---|
| 389 | ctx = talloc(dom, struct idmap_tdb2_context);
|
|---|
| 390 | if ( ! ctx) {
|
|---|
| 391 | DEBUG(0, ("Out of memory!\n"));
|
|---|
| 392 | return NT_STATUS_NO_MEMORY;
|
|---|
| 393 | }
|
|---|
| 394 |
|
|---|
| 395 | if (strequal(dom->name, "*")) {
|
|---|
| 396 | uid_t low_uid = 0;
|
|---|
| 397 | uid_t high_uid = 0;
|
|---|
| 398 | gid_t low_gid = 0;
|
|---|
| 399 | gid_t high_gid = 0;
|
|---|
| 400 |
|
|---|
| 401 | ctx->filter_low_id = 0;
|
|---|
| 402 | ctx->filter_high_id = 0;
|
|---|
| 403 |
|
|---|
| 404 | if (lp_idmap_uid(&low_uid, &high_uid)) {
|
|---|
| 405 | ctx->filter_low_id = low_uid;
|
|---|
| 406 | ctx->filter_high_id = high_uid;
|
|---|
| 407 | } else {
|
|---|
| 408 | DEBUG(3, ("Warning: 'idmap uid' not set!\n"));
|
|---|
| 409 | }
|
|---|
| 410 |
|
|---|
| 411 | if (lp_idmap_gid(&low_gid, &high_gid)) {
|
|---|
| 412 | if ((low_gid != low_uid) || (high_gid != high_uid)) {
|
|---|
| 413 | DEBUG(1, ("Warning: 'idmap uid' and 'idmap gid'"
|
|---|
| 414 | " ranges do not agree -- building "
|
|---|
| 415 | "intersection\n"));
|
|---|
| 416 | ctx->filter_low_id = MAX(ctx->filter_low_id,
|
|---|
| 417 | low_gid);
|
|---|
| 418 | ctx->filter_high_id = MIN(ctx->filter_high_id,
|
|---|
| 419 | high_gid);
|
|---|
| 420 | }
|
|---|
| 421 | } else {
|
|---|
| 422 | DEBUG(3, ("Warning: 'idmap gid' not set!\n"));
|
|---|
| 423 | }
|
|---|
| 424 | } else {
|
|---|
| 425 | char *config_option = NULL;
|
|---|
| 426 | const char *range;
|
|---|
| 427 | config_option = talloc_asprintf(ctx, "idmap config %s", dom->name);
|
|---|
| 428 | if ( ! config_option) {
|
|---|
| 429 | DEBUG(0, ("Out of memory!\n"));
|
|---|
| 430 | ret = NT_STATUS_NO_MEMORY;
|
|---|
| 431 | goto failed;
|
|---|
| 432 | }
|
|---|
| 433 |
|
|---|
| 434 | range = lp_parm_const_string(-1, config_option, "range", NULL);
|
|---|
| 435 | if (( ! range) ||
|
|---|
| 436 | (sscanf(range, "%u - %u", &ctx->filter_low_id, &ctx->filter_high_id) != 2))
|
|---|
| 437 | {
|
|---|
| 438 | ctx->filter_low_id = 0;
|
|---|
| 439 | ctx->filter_high_id = 0;
|
|---|
| 440 | }
|
|---|
| 441 |
|
|---|
| 442 | talloc_free(config_option);
|
|---|
| 443 | }
|
|---|
| 444 |
|
|---|
| 445 | if (ctx->filter_low_id > ctx->filter_high_id) {
|
|---|
| 446 | ctx->filter_low_id = 0;
|
|---|
| 447 | ctx->filter_high_id = 0;
|
|---|
| 448 | }
|
|---|
| 449 |
|
|---|
| 450 | dom->private_data = ctx;
|
|---|
| 451 |
|
|---|
| 452 | return NT_STATUS_OK;
|
|---|
| 453 |
|
|---|
| 454 | failed:
|
|---|
| 455 | talloc_free(ctx);
|
|---|
| 456 | return ret;
|
|---|
| 457 | }
|
|---|
| 458 |
|
|---|
| 459 | struct idmap_tdb2_set_mapping_context {
|
|---|
| 460 | const char *ksidstr;
|
|---|
| 461 | const char *kidstr;
|
|---|
| 462 | };
|
|---|
| 463 |
|
|---|
| 464 | static NTSTATUS idmap_tdb2_set_mapping_action(struct db_context *db,
|
|---|
| 465 | void *private_data)
|
|---|
| 466 | {
|
|---|
| 467 | TDB_DATA data;
|
|---|
| 468 | NTSTATUS ret;
|
|---|
| 469 | struct idmap_tdb2_set_mapping_context *state;
|
|---|
| 470 | TALLOC_CTX *tmp_ctx = talloc_stackframe();
|
|---|
| 471 |
|
|---|
| 472 | state = (struct idmap_tdb2_set_mapping_context *)private_data;
|
|---|
| 473 |
|
|---|
| 474 | DEBUG(10, ("Storing %s <-> %s map\n", state->ksidstr, state->kidstr));
|
|---|
| 475 |
|
|---|
| 476 | /* check wheter sid mapping is already present in db */
|
|---|
| 477 | data = dbwrap_fetch_bystring(db, tmp_ctx, state->ksidstr);
|
|---|
| 478 | if (data.dptr) {
|
|---|
| 479 | ret = NT_STATUS_OBJECT_NAME_COLLISION;
|
|---|
| 480 | goto done;
|
|---|
| 481 | }
|
|---|
| 482 |
|
|---|
| 483 | ret = dbwrap_store_bystring(db, state->ksidstr,
|
|---|
| 484 | string_term_tdb_data(state->kidstr),
|
|---|
| 485 | TDB_INSERT);
|
|---|
| 486 | if (!NT_STATUS_IS_OK(ret)) {
|
|---|
| 487 | DEBUG(0, ("Error storing SID -> ID: %s\n", nt_errstr(ret)));
|
|---|
| 488 | goto done;
|
|---|
| 489 | }
|
|---|
| 490 |
|
|---|
| 491 | ret = dbwrap_store_bystring(db, state->kidstr,
|
|---|
| 492 | string_term_tdb_data(state->ksidstr),
|
|---|
| 493 | TDB_INSERT);
|
|---|
| 494 | if (!NT_STATUS_IS_OK(ret)) {
|
|---|
| 495 | DEBUG(0, ("Error storing ID -> SID: %s\n", nt_errstr(ret)));
|
|---|
| 496 | /* try to remove the previous stored SID -> ID map */
|
|---|
| 497 | dbwrap_delete_bystring(db, state->ksidstr);
|
|---|
| 498 | goto done;
|
|---|
| 499 | }
|
|---|
| 500 |
|
|---|
| 501 | DEBUG(10,("Stored %s <-> %s\n", state->ksidstr, state->kidstr));
|
|---|
| 502 |
|
|---|
| 503 | done:
|
|---|
| 504 | talloc_free(tmp_ctx);
|
|---|
| 505 | return ret;
|
|---|
| 506 | }
|
|---|
| 507 |
|
|---|
| 508 |
|
|---|
| 509 | /*
|
|---|
| 510 | run a script to perform a mapping
|
|---|
| 511 |
|
|---|
| 512 | The script should the following command lines:
|
|---|
| 513 |
|
|---|
| 514 | SIDTOID S-1-xxxx
|
|---|
| 515 | IDTOSID UID xxxx
|
|---|
| 516 | IDTOSID GID xxxx
|
|---|
| 517 |
|
|---|
| 518 | and should return one of the following as a single line of text
|
|---|
| 519 | UID:xxxx
|
|---|
| 520 | GID:xxxx
|
|---|
| 521 | SID:xxxx
|
|---|
| 522 | ERR:xxxx
|
|---|
| 523 | */
|
|---|
| 524 | static NTSTATUS idmap_tdb2_script(struct idmap_tdb2_context *ctx, struct id_map *map,
|
|---|
| 525 | const char *fmt, ...)
|
|---|
| 526 | {
|
|---|
| 527 | va_list ap;
|
|---|
| 528 | char *cmd;
|
|---|
| 529 | FILE *p;
|
|---|
| 530 | char line[64];
|
|---|
| 531 | unsigned long v;
|
|---|
| 532 |
|
|---|
| 533 | cmd = talloc_asprintf(ctx, "%s ", idmap_tdb2_state.idmap_script);
|
|---|
| 534 | NT_STATUS_HAVE_NO_MEMORY(cmd);
|
|---|
| 535 |
|
|---|
| 536 | va_start(ap, fmt);
|
|---|
| 537 | cmd = talloc_vasprintf_append(cmd, fmt, ap);
|
|---|
| 538 | va_end(ap);
|
|---|
| 539 | NT_STATUS_HAVE_NO_MEMORY(cmd);
|
|---|
| 540 |
|
|---|
| 541 | p = popen(cmd, "r");
|
|---|
| 542 | talloc_free(cmd);
|
|---|
| 543 | if (p == NULL) {
|
|---|
| 544 | return NT_STATUS_NONE_MAPPED;
|
|---|
| 545 | }
|
|---|
| 546 |
|
|---|
| 547 | if (fgets(line, sizeof(line)-1, p) == NULL) {
|
|---|
| 548 | pclose(p);
|
|---|
| 549 | return NT_STATUS_NONE_MAPPED;
|
|---|
| 550 | }
|
|---|
| 551 | pclose(p);
|
|---|
| 552 |
|
|---|
| 553 | DEBUG(10,("idmap script gave: %s\n", line));
|
|---|
| 554 |
|
|---|
| 555 | if (sscanf(line, "UID:%lu", &v) == 1) {
|
|---|
| 556 | map->xid.id = v;
|
|---|
| 557 | map->xid.type = ID_TYPE_UID;
|
|---|
| 558 | } else if (sscanf(line, "GID:%lu", &v) == 1) {
|
|---|
| 559 | map->xid.id = v;
|
|---|
| 560 | map->xid.type = ID_TYPE_GID;
|
|---|
| 561 | } else if (strncmp(line, "SID:S-", 6) == 0) {
|
|---|
| 562 | if (!string_to_sid(map->sid, &line[4])) {
|
|---|
| 563 | DEBUG(0,("Bad SID in '%s' from idmap script %s\n",
|
|---|
| 564 | line, idmap_tdb2_state.idmap_script));
|
|---|
| 565 | return NT_STATUS_NONE_MAPPED;
|
|---|
| 566 | }
|
|---|
| 567 | } else {
|
|---|
| 568 | DEBUG(0,("Bad reply '%s' from idmap script %s\n",
|
|---|
| 569 | line, idmap_tdb2_state.idmap_script));
|
|---|
| 570 | return NT_STATUS_NONE_MAPPED;
|
|---|
| 571 | }
|
|---|
| 572 |
|
|---|
| 573 | return NT_STATUS_OK;
|
|---|
| 574 | }
|
|---|
| 575 |
|
|---|
| 576 |
|
|---|
| 577 |
|
|---|
| 578 | /*
|
|---|
| 579 | Single id to sid lookup function.
|
|---|
| 580 | */
|
|---|
| 581 | static NTSTATUS idmap_tdb2_id_to_sid(struct idmap_tdb2_context *ctx, struct id_map *map)
|
|---|
| 582 | {
|
|---|
| 583 | NTSTATUS ret;
|
|---|
| 584 | TDB_DATA data;
|
|---|
| 585 | char *keystr;
|
|---|
| 586 | NTSTATUS status;
|
|---|
| 587 |
|
|---|
| 588 | status = idmap_tdb2_open_db();
|
|---|
| 589 | NT_STATUS_NOT_OK_RETURN(status);
|
|---|
| 590 |
|
|---|
| 591 | if (!ctx || !map) {
|
|---|
| 592 | return NT_STATUS_INVALID_PARAMETER;
|
|---|
| 593 | }
|
|---|
| 594 |
|
|---|
| 595 | /* apply filters before checking */
|
|---|
| 596 | if ((ctx->filter_low_id && (map->xid.id < ctx->filter_low_id)) ||
|
|---|
| 597 | (ctx->filter_high_id && (map->xid.id > ctx->filter_high_id))) {
|
|---|
| 598 | DEBUG(5, ("Requested id (%u) out of range (%u - %u). Filtered!\n",
|
|---|
| 599 | map->xid.id, ctx->filter_low_id, ctx->filter_high_id));
|
|---|
| 600 | return NT_STATUS_NONE_MAPPED;
|
|---|
| 601 | }
|
|---|
| 602 |
|
|---|
| 603 | switch (map->xid.type) {
|
|---|
| 604 |
|
|---|
| 605 | case ID_TYPE_UID:
|
|---|
| 606 | keystr = talloc_asprintf(ctx, "UID %lu", (unsigned long)map->xid.id);
|
|---|
| 607 | break;
|
|---|
| 608 |
|
|---|
| 609 | case ID_TYPE_GID:
|
|---|
| 610 | keystr = talloc_asprintf(ctx, "GID %lu", (unsigned long)map->xid.id);
|
|---|
| 611 | break;
|
|---|
| 612 |
|
|---|
| 613 | default:
|
|---|
| 614 | DEBUG(2, ("INVALID unix ID type: 0x02%x\n", map->xid.type));
|
|---|
| 615 | return NT_STATUS_INVALID_PARAMETER;
|
|---|
| 616 | }
|
|---|
| 617 |
|
|---|
| 618 | /* final SAFE_FREE safe */
|
|---|
| 619 | data.dptr = NULL;
|
|---|
| 620 |
|
|---|
| 621 | if (keystr == NULL) {
|
|---|
| 622 | DEBUG(0, ("Out of memory!\n"));
|
|---|
| 623 | ret = NT_STATUS_NO_MEMORY;
|
|---|
| 624 | goto done;
|
|---|
| 625 | }
|
|---|
| 626 |
|
|---|
| 627 | DEBUG(10,("Fetching record %s\n", keystr));
|
|---|
| 628 |
|
|---|
| 629 | /* Check if the mapping exists */
|
|---|
| 630 | data = dbwrap_fetch_bystring(idmap_tdb2, keystr, keystr);
|
|---|
| 631 |
|
|---|
| 632 | if (!data.dptr) {
|
|---|
| 633 | char *sidstr;
|
|---|
| 634 | struct idmap_tdb2_set_mapping_context store_state;
|
|---|
| 635 |
|
|---|
| 636 | DEBUG(10,("Record %s not found\n", keystr));
|
|---|
| 637 | if (idmap_tdb2_state.idmap_script == NULL) {
|
|---|
| 638 | ret = NT_STATUS_NONE_MAPPED;
|
|---|
| 639 | goto done;
|
|---|
| 640 | }
|
|---|
| 641 |
|
|---|
| 642 | ret = idmap_tdb2_script(ctx, map, "IDTOSID %s", keystr);
|
|---|
| 643 |
|
|---|
| 644 | /* store it on shared storage */
|
|---|
| 645 | if (!NT_STATUS_IS_OK(ret)) {
|
|---|
| 646 | goto done;
|
|---|
| 647 | }
|
|---|
| 648 |
|
|---|
| 649 | sidstr = sid_string_talloc(keystr, map->sid);
|
|---|
| 650 | if (!sidstr) {
|
|---|
| 651 | ret = NT_STATUS_NO_MEMORY;
|
|---|
| 652 | goto done;
|
|---|
| 653 | }
|
|---|
| 654 |
|
|---|
| 655 | store_state.ksidstr = sidstr;
|
|---|
| 656 | store_state.kidstr = keystr;
|
|---|
| 657 |
|
|---|
| 658 | ret = dbwrap_trans_do(idmap_tdb2, idmap_tdb2_set_mapping_action,
|
|---|
| 659 | &store_state);
|
|---|
| 660 | goto done;
|
|---|
| 661 | }
|
|---|
| 662 |
|
|---|
| 663 | if (!string_to_sid(map->sid, (const char *)data.dptr)) {
|
|---|
| 664 | DEBUG(10,("INVALID SID (%s) in record %s\n",
|
|---|
| 665 | (const char *)data.dptr, keystr));
|
|---|
| 666 | ret = NT_STATUS_INTERNAL_DB_ERROR;
|
|---|
| 667 | goto done;
|
|---|
| 668 | }
|
|---|
| 669 |
|
|---|
| 670 | DEBUG(10,("Found record %s -> %s\n", keystr, (const char *)data.dptr));
|
|---|
| 671 | ret = NT_STATUS_OK;
|
|---|
| 672 |
|
|---|
| 673 | done:
|
|---|
| 674 | talloc_free(keystr);
|
|---|
| 675 | return ret;
|
|---|
| 676 | }
|
|---|
| 677 |
|
|---|
| 678 |
|
|---|
| 679 | /*
|
|---|
| 680 | Single sid to id lookup function.
|
|---|
| 681 | */
|
|---|
| 682 | static NTSTATUS idmap_tdb2_sid_to_id(struct idmap_tdb2_context *ctx, struct id_map *map)
|
|---|
| 683 | {
|
|---|
| 684 | NTSTATUS ret;
|
|---|
| 685 | TDB_DATA data;
|
|---|
| 686 | char *keystr;
|
|---|
| 687 | unsigned long rec_id = 0;
|
|---|
| 688 | TALLOC_CTX *tmp_ctx = talloc_stackframe();
|
|---|
| 689 |
|
|---|
| 690 | ret = idmap_tdb2_open_db();
|
|---|
| 691 | NT_STATUS_NOT_OK_RETURN(ret);
|
|---|
| 692 |
|
|---|
| 693 | keystr = sid_string_talloc(tmp_ctx, map->sid);
|
|---|
| 694 | if (keystr == NULL) {
|
|---|
| 695 | DEBUG(0, ("Out of memory!\n"));
|
|---|
| 696 | ret = NT_STATUS_NO_MEMORY;
|
|---|
| 697 | goto done;
|
|---|
| 698 | }
|
|---|
| 699 |
|
|---|
| 700 | DEBUG(10,("Fetching record %s\n", keystr));
|
|---|
| 701 |
|
|---|
| 702 | /* Check if sid is present in database */
|
|---|
| 703 | data = dbwrap_fetch_bystring(idmap_tdb2, tmp_ctx, keystr);
|
|---|
| 704 | if (!data.dptr) {
|
|---|
| 705 | char *idstr;
|
|---|
| 706 | struct idmap_tdb2_set_mapping_context store_state;
|
|---|
| 707 |
|
|---|
| 708 | DEBUG(10,(__location__ " Record %s not found\n", keystr));
|
|---|
| 709 |
|
|---|
| 710 | if (idmap_tdb2_state.idmap_script == NULL) {
|
|---|
| 711 | ret = NT_STATUS_NONE_MAPPED;
|
|---|
| 712 | goto done;
|
|---|
| 713 | }
|
|---|
| 714 |
|
|---|
| 715 | ret = idmap_tdb2_script(ctx, map, "SIDTOID %s", keystr);
|
|---|
| 716 | /* store it on shared storage */
|
|---|
| 717 | if (!NT_STATUS_IS_OK(ret)) {
|
|---|
| 718 | goto done;
|
|---|
| 719 | }
|
|---|
| 720 |
|
|---|
| 721 | idstr = talloc_asprintf(tmp_ctx, "%cID %lu",
|
|---|
| 722 | map->xid.type == ID_TYPE_UID?'U':'G',
|
|---|
| 723 | (unsigned long)map->xid.id);
|
|---|
| 724 | if (idstr == NULL) {
|
|---|
| 725 | ret = NT_STATUS_NO_MEMORY;
|
|---|
| 726 | goto done;
|
|---|
| 727 | }
|
|---|
| 728 |
|
|---|
| 729 | store_state.ksidstr = keystr;
|
|---|
| 730 | store_state.kidstr = idstr;
|
|---|
| 731 |
|
|---|
| 732 | ret = dbwrap_trans_do(idmap_tdb2, idmap_tdb2_set_mapping_action,
|
|---|
| 733 | &store_state);
|
|---|
| 734 | goto done;
|
|---|
| 735 | }
|
|---|
| 736 |
|
|---|
| 737 | /* What type of record is this ? */
|
|---|
| 738 | if (sscanf((const char *)data.dptr, "UID %lu", &rec_id) == 1) { /* Try a UID record. */
|
|---|
| 739 | map->xid.id = rec_id;
|
|---|
| 740 | map->xid.type = ID_TYPE_UID;
|
|---|
| 741 | DEBUG(10,("Found uid record %s -> %s \n", keystr, (const char *)data.dptr ));
|
|---|
| 742 | ret = NT_STATUS_OK;
|
|---|
| 743 |
|
|---|
| 744 | } else if (sscanf((const char *)data.dptr, "GID %lu", &rec_id) == 1) { /* Try a GID record. */
|
|---|
| 745 | map->xid.id = rec_id;
|
|---|
| 746 | map->xid.type = ID_TYPE_GID;
|
|---|
| 747 | DEBUG(10,("Found gid record %s -> %s \n", keystr, (const char *)data.dptr ));
|
|---|
| 748 | ret = NT_STATUS_OK;
|
|---|
| 749 |
|
|---|
| 750 | } else { /* Unknown record type ! */
|
|---|
| 751 | DEBUG(2, ("Found INVALID record %s -> %s\n", keystr, (const char *)data.dptr));
|
|---|
| 752 | ret = NT_STATUS_INTERNAL_DB_ERROR;
|
|---|
| 753 | }
|
|---|
| 754 |
|
|---|
| 755 | /* apply filters before returning result */
|
|---|
| 756 | if ((ctx->filter_low_id && (map->xid.id < ctx->filter_low_id)) ||
|
|---|
| 757 | (ctx->filter_high_id && (map->xid.id > ctx->filter_high_id))) {
|
|---|
| 758 | DEBUG(5, ("Requested id (%u) out of range (%u - %u). Filtered!\n",
|
|---|
| 759 | map->xid.id, ctx->filter_low_id, ctx->filter_high_id));
|
|---|
| 760 | ret = NT_STATUS_NONE_MAPPED;
|
|---|
| 761 | }
|
|---|
| 762 |
|
|---|
| 763 | done:
|
|---|
| 764 | talloc_free(tmp_ctx);
|
|---|
| 765 | return ret;
|
|---|
| 766 | }
|
|---|
| 767 |
|
|---|
| 768 | /*
|
|---|
| 769 | lookup a set of unix ids.
|
|---|
| 770 | */
|
|---|
| 771 | static NTSTATUS idmap_tdb2_unixids_to_sids(struct idmap_domain *dom, struct id_map **ids)
|
|---|
| 772 | {
|
|---|
| 773 | struct idmap_tdb2_context *ctx;
|
|---|
| 774 | NTSTATUS ret;
|
|---|
| 775 | int i;
|
|---|
| 776 |
|
|---|
| 777 | /* initialize the status to avoid suprise */
|
|---|
| 778 | for (i = 0; ids[i]; i++) {
|
|---|
| 779 | ids[i]->status = ID_UNKNOWN;
|
|---|
| 780 | }
|
|---|
| 781 |
|
|---|
| 782 | ctx = talloc_get_type(dom->private_data, struct idmap_tdb2_context);
|
|---|
| 783 |
|
|---|
| 784 | for (i = 0; ids[i]; i++) {
|
|---|
| 785 | ret = idmap_tdb2_id_to_sid(ctx, ids[i]);
|
|---|
| 786 | if ( ! NT_STATUS_IS_OK(ret)) {
|
|---|
| 787 |
|
|---|
| 788 | /* if it is just a failed mapping continue */
|
|---|
| 789 | if (NT_STATUS_EQUAL(ret, NT_STATUS_NONE_MAPPED)) {
|
|---|
| 790 |
|
|---|
| 791 | /* make sure it is marked as unmapped */
|
|---|
| 792 | ids[i]->status = ID_UNMAPPED;
|
|---|
| 793 | continue;
|
|---|
| 794 | }
|
|---|
| 795 |
|
|---|
| 796 | /* some fatal error occurred, return immediately */
|
|---|
| 797 | goto done;
|
|---|
| 798 | }
|
|---|
| 799 |
|
|---|
| 800 | /* all ok, id is mapped */
|
|---|
| 801 | ids[i]->status = ID_MAPPED;
|
|---|
| 802 | }
|
|---|
| 803 |
|
|---|
| 804 | ret = NT_STATUS_OK;
|
|---|
| 805 |
|
|---|
| 806 | done:
|
|---|
| 807 | return ret;
|
|---|
| 808 | }
|
|---|
| 809 |
|
|---|
| 810 | /*
|
|---|
| 811 | lookup a set of sids.
|
|---|
| 812 | */
|
|---|
| 813 | static NTSTATUS idmap_tdb2_sids_to_unixids(struct idmap_domain *dom, struct id_map **ids)
|
|---|
| 814 | {
|
|---|
| 815 | struct idmap_tdb2_context *ctx;
|
|---|
| 816 | NTSTATUS ret;
|
|---|
| 817 | int i;
|
|---|
| 818 |
|
|---|
| 819 | /* initialize the status to avoid suprise */
|
|---|
| 820 | for (i = 0; ids[i]; i++) {
|
|---|
| 821 | ids[i]->status = ID_UNKNOWN;
|
|---|
| 822 | }
|
|---|
| 823 |
|
|---|
| 824 | ctx = talloc_get_type(dom->private_data, struct idmap_tdb2_context);
|
|---|
| 825 |
|
|---|
| 826 | for (i = 0; ids[i]; i++) {
|
|---|
| 827 | ret = idmap_tdb2_sid_to_id(ctx, ids[i]);
|
|---|
| 828 | if ( ! NT_STATUS_IS_OK(ret)) {
|
|---|
| 829 |
|
|---|
| 830 | /* if it is just a failed mapping continue */
|
|---|
| 831 | if (NT_STATUS_EQUAL(ret, NT_STATUS_NONE_MAPPED)) {
|
|---|
| 832 |
|
|---|
| 833 | /* make sure it is marked as unmapped */
|
|---|
| 834 | ids[i]->status = ID_UNMAPPED;
|
|---|
| 835 | continue;
|
|---|
| 836 | }
|
|---|
| 837 |
|
|---|
| 838 | /* some fatal error occurred, return immediately */
|
|---|
| 839 | goto done;
|
|---|
| 840 | }
|
|---|
| 841 |
|
|---|
| 842 | /* all ok, id is mapped */
|
|---|
| 843 | ids[i]->status = ID_MAPPED;
|
|---|
| 844 | }
|
|---|
| 845 |
|
|---|
| 846 | ret = NT_STATUS_OK;
|
|---|
| 847 |
|
|---|
| 848 | done:
|
|---|
| 849 | return ret;
|
|---|
| 850 | }
|
|---|
| 851 |
|
|---|
| 852 |
|
|---|
| 853 | /*
|
|---|
| 854 | set a mapping.
|
|---|
| 855 | */
|
|---|
| 856 |
|
|---|
| 857 | static NTSTATUS idmap_tdb2_set_mapping(struct idmap_domain *dom, const struct id_map *map)
|
|---|
| 858 | {
|
|---|
| 859 | struct idmap_tdb2_context *ctx;
|
|---|
| 860 | NTSTATUS ret;
|
|---|
| 861 | char *ksidstr, *kidstr;
|
|---|
| 862 | struct idmap_tdb2_set_mapping_context state;
|
|---|
| 863 |
|
|---|
| 864 | if (!map || !map->sid) {
|
|---|
| 865 | return NT_STATUS_INVALID_PARAMETER;
|
|---|
| 866 | }
|
|---|
| 867 |
|
|---|
| 868 | ksidstr = kidstr = NULL;
|
|---|
| 869 |
|
|---|
| 870 | /* TODO: should we filter a set_mapping using low/high filters ? */
|
|---|
| 871 |
|
|---|
| 872 | ctx = talloc_get_type(dom->private_data, struct idmap_tdb2_context);
|
|---|
| 873 |
|
|---|
| 874 | switch (map->xid.type) {
|
|---|
| 875 |
|
|---|
| 876 | case ID_TYPE_UID:
|
|---|
| 877 | kidstr = talloc_asprintf(ctx, "UID %lu", (unsigned long)map->xid.id);
|
|---|
| 878 | break;
|
|---|
| 879 |
|
|---|
| 880 | case ID_TYPE_GID:
|
|---|
| 881 | kidstr = talloc_asprintf(ctx, "GID %lu", (unsigned long)map->xid.id);
|
|---|
| 882 | break;
|
|---|
| 883 |
|
|---|
| 884 | default:
|
|---|
| 885 | DEBUG(2, ("INVALID unix ID type: 0x02%x\n", map->xid.type));
|
|---|
| 886 | return NT_STATUS_INVALID_PARAMETER;
|
|---|
| 887 | }
|
|---|
| 888 |
|
|---|
| 889 | if (kidstr == NULL) {
|
|---|
| 890 | DEBUG(0, ("ERROR: Out of memory!\n"));
|
|---|
| 891 | ret = NT_STATUS_NO_MEMORY;
|
|---|
| 892 | goto done;
|
|---|
| 893 | }
|
|---|
| 894 |
|
|---|
| 895 | if (!(ksidstr = sid_string_talloc(ctx, map->sid))) {
|
|---|
| 896 | DEBUG(0, ("Out of memory!\n"));
|
|---|
| 897 | ret = NT_STATUS_NO_MEMORY;
|
|---|
| 898 | goto done;
|
|---|
| 899 | }
|
|---|
| 900 |
|
|---|
| 901 | state.ksidstr = ksidstr;
|
|---|
| 902 | state.kidstr = kidstr;
|
|---|
| 903 |
|
|---|
| 904 | ret = dbwrap_trans_do(idmap_tdb2, idmap_tdb2_set_mapping_action,
|
|---|
| 905 | &state);
|
|---|
| 906 |
|
|---|
| 907 | done:
|
|---|
| 908 | talloc_free(ksidstr);
|
|---|
| 909 | talloc_free(kidstr);
|
|---|
| 910 | return ret;
|
|---|
| 911 | }
|
|---|
| 912 |
|
|---|
| 913 | /*
|
|---|
| 914 | remove a mapping.
|
|---|
| 915 | */
|
|---|
| 916 | static NTSTATUS idmap_tdb2_remove_mapping(struct idmap_domain *dom, const struct id_map *map)
|
|---|
| 917 | {
|
|---|
| 918 | /* not supported as it would invalidate the cache tdb on other
|
|---|
| 919 | nodes */
|
|---|
| 920 | DEBUG(0,("idmap_tdb2_remove_mapping not supported\n"));
|
|---|
| 921 | return NT_STATUS_NOT_SUPPORTED;
|
|---|
| 922 | }
|
|---|
| 923 |
|
|---|
| 924 | /*
|
|---|
| 925 | Close the idmap tdb instance
|
|---|
| 926 | */
|
|---|
| 927 | static NTSTATUS idmap_tdb2_close(struct idmap_domain *dom)
|
|---|
| 928 | {
|
|---|
| 929 | /* don't do anything */
|
|---|
| 930 | return NT_STATUS_OK;
|
|---|
| 931 | }
|
|---|
| 932 |
|
|---|
| 933 |
|
|---|
| 934 | /*
|
|---|
| 935 | Dump all mappings out
|
|---|
| 936 | */
|
|---|
| 937 | static NTSTATUS idmap_tdb2_dump_data(struct idmap_domain *dom, struct id_map **maps, int *num_maps)
|
|---|
| 938 | {
|
|---|
| 939 | DEBUG(0,("idmap_tdb2_dump_data not supported\n"));
|
|---|
| 940 | return NT_STATUS_NOT_SUPPORTED;
|
|---|
| 941 | }
|
|---|
| 942 |
|
|---|
| 943 | static struct idmap_methods db_methods = {
|
|---|
| 944 | .init = idmap_tdb2_db_init,
|
|---|
| 945 | .unixids_to_sids = idmap_tdb2_unixids_to_sids,
|
|---|
| 946 | .sids_to_unixids = idmap_tdb2_sids_to_unixids,
|
|---|
| 947 | .set_mapping = idmap_tdb2_set_mapping,
|
|---|
| 948 | .remove_mapping = idmap_tdb2_remove_mapping,
|
|---|
| 949 | .dump_data = idmap_tdb2_dump_data,
|
|---|
| 950 | .close_fn = idmap_tdb2_close
|
|---|
| 951 | };
|
|---|
| 952 |
|
|---|
| 953 | static struct idmap_alloc_methods db_alloc_methods = {
|
|---|
| 954 | .init = idmap_tdb2_alloc_init,
|
|---|
| 955 | .allocate_id = idmap_tdb2_allocate_id,
|
|---|
| 956 | .get_id_hwm = idmap_tdb2_get_hwm,
|
|---|
| 957 | .set_id_hwm = idmap_tdb2_set_hwm,
|
|---|
| 958 | .close_fn = idmap_tdb2_alloc_close
|
|---|
| 959 | };
|
|---|
| 960 |
|
|---|
| 961 | NTSTATUS idmap_tdb2_init(void)
|
|---|
| 962 | {
|
|---|
| 963 | NTSTATUS ret;
|
|---|
| 964 |
|
|---|
| 965 | /* register both backends */
|
|---|
| 966 | ret = smb_register_idmap_alloc(SMB_IDMAP_INTERFACE_VERSION, "tdb2", &db_alloc_methods);
|
|---|
| 967 | if (! NT_STATUS_IS_OK(ret)) {
|
|---|
| 968 | DEBUG(0, ("Unable to register idmap alloc tdb2 module: %s\n", get_friendly_nt_error_msg(ret)));
|
|---|
| 969 | return ret;
|
|---|
| 970 | }
|
|---|
| 971 |
|
|---|
| 972 | return smb_register_idmap(SMB_IDMAP_INTERFACE_VERSION, "tdb2", &db_methods);
|
|---|
| 973 | }
|
|---|