ID Mapping
Copyright (C) Simo Sorce 2003
Copyright (C) Jeremy Allison 2006
+ Copyright (C) Michael Adam 2010
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
along with this program. If not, see <http://www.gnu.org/licenses/>.*/
#include "includes.h"
+#include "winbindd.h"
+#include "winbindd_proto.h"
+#include "idmap.h"
+#include "idmap_cache.h"
+#include "../libcli/security/security.h"
+#include "secrets.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_IDMAP
If mapping is not possible returns an error.
*****************************************************************/
-NTSTATUS idmap_uid_to_sid(const char *domname, DOM_SID *sid, uid_t uid)
+NTSTATUS idmap_uid_to_sid(struct dom_sid *sid, uid_t uid)
{
NTSTATUS ret;
struct id_map map;
bool expired;
- DEBUG(10,("uid = [%lu]\n", (unsigned long)uid));
+ DEBUG(10, ("idmap_uid_to_sid: uid = [%lu]\n", (unsigned long)uid));
- if (idmap_cache_find_uid2sid(uid, sid, &expired)) {
- DEBUG(10, ("idmap_cache_find_uid2sid found %d%s\n", uid,
+ if (winbindd_use_idmap_cache()
+ && idmap_cache_find_uid2sid(uid, sid, &expired)) {
+ DEBUG(10, ("idmap_cache_find_uid2sid found %u%s\n",
+ (unsigned int)uid,
expired ? " (expired)": ""));
if (expired && idmap_is_online()) {
DEBUG(10, ("revalidating expired entry\n"));
}
backend:
+ ZERO_STRUCT(map);
map.sid = sid;
map.xid.type = ID_TYPE_UID;
map.xid.id = uid;
- ret = idmap_backends_unixid_to_sid(domname, &map);
+ ret = idmap_backends_unixid_to_sid(&map);
if ( ! NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("error mapping uid [%lu]\n", (unsigned long)uid));
- return ret;
+ DEBUG(10, ("error mapping uid [%lu]: %s\n", (unsigned long)uid,
+ nt_errstr(ret)));
+ map.status = ID_UNMAPPED;
}
if (map.status != ID_MAPPED) {
- struct dom_sid null_sid;
- ZERO_STRUCT(null_sid);
- idmap_cache_set_sid2uid(&null_sid, uid);
+ if (winbindd_use_idmap_cache()) {
+ struct dom_sid null_sid;
+ struct unixid id;
+ id.type = ID_TYPE_UID;
+ id.id = uid;
+ ZERO_STRUCT(null_sid);
+ idmap_cache_set_sid2unixid(&null_sid, &id);
+ }
DEBUG(10, ("uid [%lu] not mapped\n", (unsigned long)uid));
return NT_STATUS_NONE_MAPPED;
}
- idmap_cache_set_sid2uid(sid, uid);
+ if (winbindd_use_idmap_cache()) {
+ idmap_cache_set_sid2unixid(sid, &map.xid);
+ }
return NT_STATUS_OK;
}
If mapping is not possible returns an error.
*****************************************************************/
-NTSTATUS idmap_gid_to_sid(const char *domname, DOM_SID *sid, gid_t gid)
+NTSTATUS idmap_gid_to_sid(const char *domname, struct dom_sid *sid, gid_t gid)
{
NTSTATUS ret;
struct id_map map;
bool expired;
- DEBUG(10,("gid = [%lu]\n", (unsigned long)gid));
+ DEBUG(10,("idmap_gid_to_sid: gid = [%lu], domain = '%s'\n",
+ (unsigned long)gid, domname?domname:"NULL"));
- if (idmap_cache_find_uid2sid(gid, sid, &expired)) {
- DEBUG(10, ("idmap_cache_find_gid2sid found %d%s\n", gid,
+ if (winbindd_use_idmap_cache()
+ && idmap_cache_find_gid2sid(gid, sid, &expired)) {
+ DEBUG(10, ("idmap_cache_find_gid2sid found %u%s\n",
+ (unsigned int)gid,
expired ? " (expired)": ""));
if (expired && idmap_is_online()) {
DEBUG(10, ("revalidating expired entry\n"));
}
backend:
+ ZERO_STRUCT(map);
map.sid = sid;
map.xid.type = ID_TYPE_GID;
map.xid.id = gid;
- ret = idmap_backends_unixid_to_sid(domname, &map);
+ ret = idmap_backends_unixid_to_sid(&map);
if ( ! NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("error mapping gid [%lu]\n", (unsigned long)gid));
- return ret;
+ DEBUG(10, ("error mapping gid [%lu]: %s\n", (unsigned long)gid,
+ nt_errstr(ret)));
+ map.status = ID_UNMAPPED;
}
if (map.status != ID_MAPPED) {
- struct dom_sid null_sid;
- ZERO_STRUCT(null_sid);
- idmap_cache_set_sid2uid(&null_sid, gid);
+ if (winbindd_use_idmap_cache()) {
+ struct dom_sid null_sid;
+ struct unixid id;
+ id.type = ID_TYPE_GID;
+ id.id = gid;
+ ZERO_STRUCT(null_sid);
+ idmap_cache_set_sid2unixid(&null_sid, &id);
+ }
DEBUG(10, ("gid [%lu] not mapped\n", (unsigned long)gid));
return NT_STATUS_NONE_MAPPED;
}
- idmap_cache_set_sid2uid(sid, gid);
+ if (winbindd_use_idmap_cache()) {
+ idmap_cache_set_sid2unixid(sid, &map.xid);
+ }
return NT_STATUS_OK;
}
-/*****************************************************************
- Returns the UID mapped to the given SID.
- If mapping is not possible or SID maps to a GID returns an error.
-*****************************************************************/
-
-NTSTATUS idmap_sid_to_uid(const char *dom_name, DOM_SID *sid, uid_t *uid)
+/**
+ * check whether a given unix id is inside the filter range of an idmap domain
+ */
+bool idmap_unix_id_is_in_range(uint32_t id, struct idmap_domain *dom)
{
- NTSTATUS ret;
- struct id_map map;
- bool expired;
-
- DEBUG(10,("idmap_sid_to_uid: sid = [%s]\n", sid_string_dbg(sid)));
-
- if (idmap_cache_find_sid2uid(sid, uid, &expired)) {
- DEBUG(10, ("idmap_cache_find_sid2uid found %d%s\n",
- (int)(*uid), expired ? " (expired)": ""));
- if (expired && idmap_is_online()) {
- DEBUG(10, ("revalidating expired entry\n"));
- goto backend;
- }
- if ((*uid) == -1) {
- DEBUG(10, ("Returning negative cache entry\n"));
- return NT_STATUS_NONE_MAPPED;
- }
- DEBUG(10, ("Returning positive cache entry\n"));
- return NT_STATUS_OK;
+ if (id == 0) {
+ /* 0 is not an allowed unix id for id mapping */
+ return false;
}
-backend:
- map.sid = sid;
- map.xid.type = ID_TYPE_UID;
-
- ret = idmap_backends_sid_to_unixid(dom_name, &map);
-
- if (NT_STATUS_IS_OK(ret) && (map.status == ID_MAPPED)) {
- if (map.xid.type != ID_TYPE_UID) {
- DEBUG(10, ("sid [%s] not mapped to a uid "
- "[%u,%u,%u]\n",
- sid_string_dbg(sid),
- map.status,
- map.xid.type,
- map.xid.id));
- idmap_cache_set_sid2uid(sid, -1);
- return NT_STATUS_NONE_MAPPED;
- }
- goto done;
+ if ((dom->low_id && (id < dom->low_id)) ||
+ (dom->high_id && (id > dom->high_id)))
+ {
+ return false;
}
- ret = idmap_new_mapping(sid, ID_TYPE_UID, &map.xid);
+ return true;
+}
- if (!NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("idmap_new_mapping failed: %s\n",
- nt_errstr(ret)));
- idmap_cache_set_sid2uid(sid, -1);
- return ret;
+/**
+ * Helper for unixids_to_sids: find entry by id in mapping array,
+ * search up to IDMAP_AD_MAX_IDS entries
+ */
+struct id_map *idmap_find_map_by_id(struct id_map **maps, enum id_type type,
+ uint32_t id)
+{
+ int i;
+
+ for (i = 0; i < IDMAP_LDAP_MAX_IDS; i++) {
+ if (maps[i] == NULL) { /* end of the run */
+ return NULL;
+ }
+ if ((maps[i]->xid.type == type) && (maps[i]->xid.id == id)) {
+ return maps[i];
+ }
}
-done:
- *uid = (uid_t)map.xid.id;
- idmap_cache_set_sid2uid(sid, *uid);
- return NT_STATUS_OK;
+ return NULL;
}
-/*****************************************************************
- Returns the GID mapped to the given SID.
- If mapping is not possible or SID maps to a UID returns an error.
-*****************************************************************/
-
-NTSTATUS idmap_sid_to_gid(const char *domname, DOM_SID *sid, gid_t *gid)
+/**
+ * Helper for sids_to_unix_ids: find entry by SID in mapping array,
+ * search up to IDMAP_AD_MAX_IDS entries
+ */
+struct id_map *idmap_find_map_by_sid(struct id_map **maps, struct dom_sid *sid)
{
- NTSTATUS ret;
- struct id_map map;
- bool expired;
-
- DEBUG(10,("idmap_sid_to_gid: sid = [%s]\n", sid_string_dbg(sid)));
+ int i;
- if (idmap_cache_find_sid2gid(sid, gid, &expired)) {
- DEBUG(10, ("idmap_cache_find_sid2gid found %d%s\n",
- (int)(*gid), expired ? " (expired)": ""));
- if (expired && idmap_is_online()) {
- DEBUG(10, ("revalidating expired entry\n"));
- goto backend;
+ for (i = 0; i < IDMAP_LDAP_MAX_IDS; i++) {
+ if (maps[i] == NULL) { /* end of the run */
+ return NULL;
}
- if ((*gid) == -1) {
- DEBUG(10, ("Returning negative cache entry\n"));
- return NT_STATUS_NONE_MAPPED;
+ if (dom_sid_equal(maps[i]->sid, sid)) {
+ return maps[i];
}
- DEBUG(10, ("Returning positive cache entry\n"));
- return NT_STATUS_OK;
}
-backend:
- map.sid = sid;
- map.xid.type = ID_TYPE_GID;
+ return NULL;
+}
- ret = idmap_backends_sid_to_unixid(domname, &map);
- if (NT_STATUS_IS_OK(ret) && (map.status == ID_MAPPED)) {
- if (map.xid.type != ID_TYPE_GID) {
- DEBUG(10, ("sid [%s] not mapped to a gid "
- "[%u,%u,%u]\n",
- sid_string_dbg(sid),
- map.status,
- map.xid.type,
- map.xid.id));
- idmap_cache_set_sid2gid(sid, -1);
- return NT_STATUS_NONE_MAPPED;
- }
- goto done;
- }
+char *idmap_fetch_secret(const char *backend, const char *domain,
+ const char *identity)
+{
+ char *tmp, *ret;
+ int r;
- ret = idmap_new_mapping(sid, ID_TYPE_GID, &map.xid);
+ r = asprintf(&tmp, "IDMAP_%s_%s", backend, domain);
- if (!NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("idmap_new_mapping failed: %s\n",
- nt_errstr(ret)));
- idmap_cache_set_sid2gid(sid, -1);
- return ret;
+ if (r < 0)
+ return NULL;
+
+ /* make sure the key is case insensitive */
+ if (!strupper_m(tmp)) {
+ SAFE_FREE(tmp);
+ return NULL;
}
-done:
- *gid = map.xid.id;
- idmap_cache_set_sid2gid(sid, *gid);
- return NT_STATUS_OK;
+ ret = secrets_fetch_generic(tmp, identity);
+
+ SAFE_FREE(tmp);
+
+ return ret;
}