source: vendor/current/source3/winbindd/idmap_util.c

Last change on this file was 989, checked in by Silvan Scherrer, 9 years ago

Samba Server: update vendor to version 4.4.7

File size: 5.7 KB
Line 
1/*
2 Unix SMB/CIFS implementation.
3 ID Mapping
4 Copyright (C) Simo Sorce 2003
5 Copyright (C) Jeremy Allison 2006
6 Copyright (C) Michael Adam 2010
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.*/
20
21#include "includes.h"
22#include "winbindd.h"
23#include "winbindd_proto.h"
24#include "idmap.h"
25#include "idmap_cache.h"
26#include "../libcli/security/security.h"
27#include "secrets.h"
28
29#undef DBGC_CLASS
30#define DBGC_CLASS DBGC_IDMAP
31
32/*****************************************************************
33 Returns the SID mapped to the given UID.
34 If mapping is not possible returns an error.
35*****************************************************************/
36
37NTSTATUS idmap_uid_to_sid(struct dom_sid *sid, uid_t uid)
38{
39 NTSTATUS ret;
40 struct id_map map;
41 bool expired;
42
43 DEBUG(10, ("idmap_uid_to_sid: uid = [%lu]\n", (unsigned long)uid));
44
45 if (winbindd_use_idmap_cache()
46 && idmap_cache_find_uid2sid(uid, sid, &expired)) {
47 DEBUG(10, ("idmap_cache_find_uid2sid found %u%s\n",
48 (unsigned int)uid,
49 expired ? " (expired)": ""));
50 if (expired && idmap_is_online()) {
51 DEBUG(10, ("revalidating expired entry\n"));
52 goto backend;
53 }
54 if (is_null_sid(sid)) {
55 DEBUG(10, ("Returning negative cache entry\n"));
56 return NT_STATUS_NONE_MAPPED;
57 }
58 DEBUG(10, ("Returning positive cache entry\n"));
59 return NT_STATUS_OK;
60 }
61
62backend:
63 ZERO_STRUCT(map);
64 map.sid = sid;
65 map.xid.type = ID_TYPE_UID;
66 map.xid.id = uid;
67
68 ret = idmap_backends_unixid_to_sid(&map);
69 if ( ! NT_STATUS_IS_OK(ret)) {
70 DEBUG(10, ("error mapping uid [%lu]: %s\n", (unsigned long)uid,
71 nt_errstr(ret)));
72 map.status = ID_UNMAPPED;
73 }
74
75 if (map.status != ID_MAPPED) {
76 if (winbindd_use_idmap_cache()) {
77 struct dom_sid null_sid;
78 struct unixid id;
79 id.type = ID_TYPE_UID;
80 id.id = uid;
81 ZERO_STRUCT(null_sid);
82 idmap_cache_set_sid2unixid(&null_sid, &id);
83 }
84 DEBUG(10, ("uid [%lu] not mapped\n", (unsigned long)uid));
85 return NT_STATUS_NONE_MAPPED;
86 }
87
88 if (winbindd_use_idmap_cache()) {
89 idmap_cache_set_sid2unixid(sid, &map.xid);
90 }
91
92 return NT_STATUS_OK;
93}
94
95/*****************************************************************
96 Returns SID mapped to the given GID.
97 If mapping is not possible returns an error.
98*****************************************************************/
99
100NTSTATUS idmap_gid_to_sid(struct dom_sid *sid, gid_t gid)
101{
102 NTSTATUS ret;
103 struct id_map map;
104 bool expired;
105
106 DEBUG(10, ("idmap_gid_to_sid: gid = [%lu]\n", (unsigned long)gid));
107
108 if (winbindd_use_idmap_cache()
109 && idmap_cache_find_gid2sid(gid, sid, &expired)) {
110 DEBUG(10, ("idmap_cache_find_gid2sid found %u%s\n",
111 (unsigned int)gid,
112 expired ? " (expired)": ""));
113 if (expired && idmap_is_online()) {
114 DEBUG(10, ("revalidating expired entry\n"));
115 goto backend;
116 }
117 if (is_null_sid(sid)) {
118 DEBUG(10, ("Returning negative cache entry\n"));
119 return NT_STATUS_NONE_MAPPED;
120 }
121 DEBUG(10, ("Returning positive cache entry\n"));
122 return NT_STATUS_OK;
123 }
124
125backend:
126 ZERO_STRUCT(map);
127 map.sid = sid;
128 map.xid.type = ID_TYPE_GID;
129 map.xid.id = gid;
130
131 ret = idmap_backends_unixid_to_sid(&map);
132 if ( ! NT_STATUS_IS_OK(ret)) {
133 DEBUG(10, ("error mapping gid [%lu]: %s\n", (unsigned long)gid,
134 nt_errstr(ret)));
135 map.status = ID_UNMAPPED;
136 }
137
138 if (map.status != ID_MAPPED) {
139 if (winbindd_use_idmap_cache()) {
140 struct dom_sid null_sid;
141 struct unixid id;
142 id.type = ID_TYPE_GID;
143 id.id = gid;
144 ZERO_STRUCT(null_sid);
145 idmap_cache_set_sid2unixid(&null_sid, &id);
146 }
147 DEBUG(10, ("gid [%lu] not mapped\n", (unsigned long)gid));
148 return NT_STATUS_NONE_MAPPED;
149 }
150
151 if (winbindd_use_idmap_cache()) {
152 idmap_cache_set_sid2unixid(sid, &map.xid);
153 }
154
155 return NT_STATUS_OK;
156}
157
158/**
159 * check whether a given unix id is inside the filter range of an idmap domain
160 */
161bool idmap_unix_id_is_in_range(uint32_t id, struct idmap_domain *dom)
162{
163 if ((dom->low_id && (id < dom->low_id)) ||
164 (dom->high_id && (id > dom->high_id)))
165 {
166 return false;
167 }
168
169 return true;
170}
171
172/**
173 * Helper for unixids_to_sids: find entry by id in mapping array,
174 * search up to IDMAP_AD_MAX_IDS entries
175 */
176struct id_map *idmap_find_map_by_id(struct id_map **maps, enum id_type type,
177 uint32_t id)
178{
179 int i;
180
181 for (i = 0; i < IDMAP_LDAP_MAX_IDS; i++) {
182 if (maps[i] == NULL) { /* end of the run */
183 return NULL;
184 }
185 if ((maps[i]->xid.type == type) && (maps[i]->xid.id == id)) {
186 return maps[i];
187 }
188 }
189
190 return NULL;
191}
192
193/**
194 * Helper for sids_to_unix_ids: find entry by SID in mapping array,
195 * search up to IDMAP_AD_MAX_IDS entries
196 */
197struct id_map *idmap_find_map_by_sid(struct id_map **maps, struct dom_sid *sid)
198{
199 int i;
200
201 for (i = 0; i < IDMAP_LDAP_MAX_IDS; i++) {
202 if (maps[i] == NULL) { /* end of the run */
203 return NULL;
204 }
205 if (dom_sid_equal(maps[i]->sid, sid)) {
206 return maps[i];
207 }
208 }
209
210 return NULL;
211}
212
213char *idmap_fetch_secret(const char *backend, const char *domain,
214 const char *identity)
215{
216 char *tmp, *ret;
217 int r;
218
219 r = asprintf(&tmp, "IDMAP_%s_%s", backend, domain);
220
221 if (r < 0)
222 return NULL;
223
224 /* make sure the key is case insensitive */
225 if (!strupper_m(tmp)) {
226 SAFE_FREE(tmp);
227 return NULL;
228 }
229
230 ret = secrets_fetch_generic(tmp, identity);
231
232 SAFE_FREE(tmp);
233
234 return ret;
235}
Note: See TracBrowser for help on using the repository browser.