r7415: * big change -- volker's new async winbindd from trunk
[samba.git] / source / sam / idmap_util.c
index 94de30a5ce5f8e7d6b4ac1a966ef3b39658a31ac..3c9f420a9a7eb21a264fb80e4235d2d7b50250b2 100644 (file)
 #undef DBGC_CLASS
 #define DBGC_CLASS DBGC_IDMAP
 
+#if 0  /* NOT USED */
+
+/**********************************************************************
+ Get the free RID base if idmap is configured, otherwise return 0
+**********************************************************************/
+
+uint32 idmap_get_free_rid_base(void)
+{
+       uint32 low, high;
+       if (idmap_get_free_rid_range(&low, &high)) {
+               return low;
+       }
+       return 0;
+}
+
+/**********************************************************************
+**********************************************************************/
+
+BOOL idmap_check_ugid_is_in_free_range(uint32 id)
+{
+       uint32 low, high;
+
+       if (!idmap_get_free_ugid_range(&low, &high)) {
+               return False;
+       }
+       if (id < low || id > high) {
+               return False;
+       }
+       return True;
+}
+
+/**********************************************************************
+**********************************************************************/
+
+BOOL idmap_check_rid_is_in_free_range(uint32 rid)
+{
+       uint32 low, high;
+
+       if (!idmap_get_free_rid_range(&low, &high)) {
+               return False;
+       }
+       if (rid < algorithmic_rid_base()) {
+               return True;
+       }
+
+       if (rid < low || rid > high) {
+               return False;
+       }
+
+       return True;
+}
+
+/**********************************************************************
+ if it is a foreign SID or if the SID is in the free range, return true
+**********************************************************************/
+
+BOOL idmap_check_sid_is_in_free_range(const DOM_SID *sid)
+{
+       if (sid_compare_domain(get_global_sam_sid(), sid) == 0) {
+       
+               uint32 rid;
+
+               if (sid_peek_rid(sid, &rid)) {
+                       return idmap_check_rid_is_in_free_range(rid);
+               }
+
+               return False;
+       }
+
+       return True;
+}
+
+#endif /* NOT USED */
 
 /*****************************************************************
  Returns SID pointer.
 *****************************************************************/  
 
-NTSTATUS idmap_uid_to_sid(DOM_SID *sid, uid_t uid)
+NTSTATUS idmap_uid_to_sid(DOM_SID *sid, uid_t uid, int flags)
 {
        unid_t id;
-       int flags;
 
-       DEBUG(10,("idmap_uid_to_sid: uid = [%d]\n", uid));
+       DEBUG(10,("idmap_uid_to_sid: uid = [%lu]\n", (unsigned long)uid));
 
-       flags = ID_USERID;
+       flags |= ID_USERID;
        id.uid = uid;
        
        return idmap_get_sid_from_id(sid, id, flags);
@@ -45,20 +117,15 @@ NTSTATUS idmap_uid_to_sid(DOM_SID *sid, uid_t uid)
  Returns SID pointer.
 *****************************************************************/  
 
-NTSTATUS idmap_gid_to_sid(DOM_SID *sid, gid_t gid)
+NTSTATUS idmap_gid_to_sid(DOM_SID *sid, gid_t gid, int flags)
 {
        unid_t id;
-       int flags;
 
-       DEBUG(10,("idmap_gid_to_sid: gid = [%d]\n", gid));
+       DEBUG(10,("idmap_gid_to_sid: gid = [%lu]\n", (unsigned long)gid));
 
-       flags = ID_GROUPID;
-#if 0  /* JERRY */
-       if (!idmap_check_ugid_is_in_free_range(gid)) {
-               flags |= ID_QUERY_ONLY;
-       }
-#endif
+       flags |= ID_GROUPID;
        id.gid = gid;
+
        return idmap_get_sid_from_id(sid, id, flags);
 }
 
@@ -78,10 +145,10 @@ NTSTATUS idmap_sid_to_uid(const DOM_SID *sid, uid_t *uid, uint32 flags)
 
        flags |= ID_USERID;
 
-       ret = idmap_get_id_from_sid(&id, &flags, sid);
+       ret = idmap_get_id_from_sid(&id, (int *)&flags, sid);
        
        if ( NT_STATUS_IS_OK(ret) ) {
-               DEBUG(10,("idmap_sid_to_uid: uid = [%d]\n", id.uid));
+               DEBUG(10,("idmap_sid_to_uid: uid = [%lu]\n", (unsigned long)id.uid));
                *uid = id.uid;
        } 
 
@@ -107,116 +174,13 @@ NTSTATUS idmap_sid_to_gid(const DOM_SID *sid, gid_t *gid, uint32 flags)
 
        flags |= ID_GROUPID;
 
-       ret = idmap_get_id_from_sid(&id, &flags, sid);
+       ret = idmap_get_id_from_sid(&id, (int *)&flags, sid);
        
        if ( NT_STATUS_IS_OK(ret) ) 
        {
-               DEBUG(10,("idmap_sid_to_gid: gid = [%d]\n", id.gid));
+               DEBUG(10,("idmap_sid_to_gid: gid = [%lu]\n", (unsigned long)id.gid));
                *gid = id.gid;
        }
 
        return ret;
 }
-
-
-/***************************************************************************
- Check first, call set_mapping if it doesn't already exist.
-***************************************************************************/
-
-static NTSTATUS wellknown_id_init(DOM_SID *sid, unid_t id, int flags)
-{
-       unid_t storedid;
-       int qflags = flags | ID_QUERY_ONLY;
-
-       if (!NT_STATUS_IS_OK(idmap_get_id_from_sid(&storedid, &qflags, sid))) {
-               return idmap_set_mapping(sid, id, flags);
-       } else {
-               if (flags == ID_USERID && id.uid != storedid.uid) {
-                       DEBUG(0,("wellknown_id_init: WARNING ! Stored uid %u for SID %s is not the same as the requested uid %u\n",
-                               (unsigned int)storedid.uid, sid_string_static(sid), (unsigned int)id.uid ));
-                       DEBUG(0,("wellknown_id_init: Attempting to overwrite old mapping with new.\n"));
-                       return idmap_set_mapping(sid, id, flags);
-               } else if (flags == ID_GROUPID && id.gid != storedid.gid) {
-                       DEBUG(0,("wellknown_id_init: WARNING ! Stored gid %u for SID %s is not the same as the requested gid %u\n",
-                               (unsigned int)storedid.gid, sid_string_static(sid), (unsigned int)id.gid ));
-                       DEBUG(0,("wellknown_id_init: Attempting to overwrite old mapping with new.\n"));
-                       return idmap_set_mapping(sid, id, flags);
-               }
-       }
-       return NT_STATUS_OK;
-}
-
-/***************************************************************************
- Initialize idmap withWellknown SIDs like Guest, that are necessary
- to make samba run properly.
-***************************************************************************/
-
-BOOL idmap_init_wellknown_sids(void)
-{
-       const char *guest_account = lp_guestaccount();
-       struct passwd *pass;
-       GROUP_MAP *map=NULL;
-       int num_entries=0;
-       DOM_SID sid;
-       unid_t id;
-       fstring sid_string;
-
-       if (!(guest_account && *guest_account)) {
-               DEBUG(1, ("NULL guest account!?!?\n"));
-               return False;
-       }
-
-       pass = getpwnam_alloc(guest_account);
-       if (!pass) {
-               return False;
-       }
-
-       /* Fill in the SID for the guest account. */
-       id.uid = pass->pw_uid;
-       sid_copy(&sid, get_global_sam_sid());
-       sid_append_rid(&sid, DOMAIN_USER_RID_GUEST);
-
-       if (!NT_STATUS_IS_OK(wellknown_id_init(&sid, id, ID_USERID))) {
-               DEBUG(0, ("Failed to setup UID mapping for GUEST (%s) to (%u)\n", 
-                         sid_to_string(sid_string, &sid), (unsigned int)id.uid));
-               passwd_free(&pass);
-               return False;
-       }
-
-       /* check if DOMAIN_GROUP_RID_GUESTS SID is set, if not store the
-        * guest account gid as mapping */
-       id.gid = pass->pw_gid;
-       sid_copy(&sid, get_global_sam_sid());
-       sid_append_rid(&sid, DOMAIN_GROUP_RID_GUESTS);
-       if (!NT_STATUS_IS_OK(wellknown_id_init(&sid, id, ID_GROUPID))) {
-               DEBUG(0, ("Failed to setup GID mapping for Group DOMAIN GUESTS (%s) to (%u)\n", 
-                         sid_to_string(sid_string, &sid), (unsigned int)id.gid));
-               passwd_free(&pass);
-               return False;
-       }
-
-       passwd_free(&pass);
-       /* now fill in group mappings */
-       if(pdb_enum_group_mapping(SID_NAME_UNKNOWN, &map, &num_entries, ENUM_ONLY_MAPPED)) {
-               int i;
-
-               for (i = 0; i < num_entries; i++) {
-                       id.gid = map[i].gid;
-                       wellknown_id_init(&map[i].sid, id, ID_GROUPID);
-               }
-               SAFE_FREE(map);
-       }
-
-       /* Fill in the SID for the administrator account. */
-       id.uid = 0;
-       sid_copy(&sid, get_global_sam_sid());
-       sid_append_rid(&sid, DOMAIN_USER_RID_ADMIN);
-
-       if (!NT_STATUS_IS_OK(wellknown_id_init(&sid, id, ID_USERID))) {
-               DEBUG(0, ("Failed to setup UID mapping for ADMINISTRATOR (%s) to (%u)\n", 
-                         sid_to_string(sid_string, &sid), (unsigned int)id.uid));
-               return False;
-       }
-
-       return True;
-}