ID Mapping
Copyright (C) Simo Sorce 2003
Copyright (C) Jeremy Allison 2006
+ Copyright (C) Michael Adam 2010
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
#include "includes.h"
#include "winbindd.h"
#include "winbindd_proto.h"
+#include "idmap.h"
+#include "idmap_cache.h"
+#include "../libcli/security/security.h"
+#include "secrets.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_IDMAP
If mapping is not possible returns an error.
*****************************************************************/
-NTSTATUS idmap_uid_to_sid(const char *domname, DOM_SID *sid, uid_t uid)
+NTSTATUS idmap_uid_to_sid(struct dom_sid *sid, uid_t uid)
{
NTSTATUS ret;
struct id_map map;
bool expired;
- DEBUG(10,("idmap_uid_to_sid: uid = [%lu], domain = '%s'\n",
- (unsigned long)uid, domname?domname:"NULL"));
+ DEBUG(10, ("idmap_uid_to_sid: uid = [%lu]\n", (unsigned long)uid));
if (winbindd_use_idmap_cache()
&& idmap_cache_find_uid2sid(uid, sid, &expired)) {
- DEBUG(10, ("idmap_cache_find_uid2sid found %d%s\n", uid,
+ DEBUG(10, ("idmap_cache_find_uid2sid found %u%s\n",
+ (unsigned int)uid,
expired ? " (expired)": ""));
if (expired && idmap_is_online()) {
DEBUG(10, ("revalidating expired entry\n"));
}
backend:
+ ZERO_STRUCT(map);
map.sid = sid;
map.xid.type = ID_TYPE_UID;
map.xid.id = uid;
- ret = idmap_backends_unixid_to_sid(domname, &map);
+ ret = idmap_backends_unixid_to_sid(&map);
if ( ! NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("error mapping uid [%lu]\n", (unsigned long)uid));
- return ret;
+ DEBUG(10, ("error mapping uid [%lu]: %s\n", (unsigned long)uid,
+ nt_errstr(ret)));
+ map.status = ID_UNMAPPED;
}
if (map.status != ID_MAPPED) {
if (winbindd_use_idmap_cache()) {
struct dom_sid null_sid;
+ struct unixid id;
+ id.type = ID_TYPE_UID;
+ id.id = uid;
ZERO_STRUCT(null_sid);
- idmap_cache_set_sid2uid(&null_sid, uid);
+ idmap_cache_set_sid2unixid(&null_sid, &id);
}
DEBUG(10, ("uid [%lu] not mapped\n", (unsigned long)uid));
return NT_STATUS_NONE_MAPPED;
}
if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2uid(sid, uid);
+ idmap_cache_set_sid2unixid(sid, &map.xid);
}
return NT_STATUS_OK;
If mapping is not possible returns an error.
*****************************************************************/
-NTSTATUS idmap_gid_to_sid(const char *domname, DOM_SID *sid, gid_t gid)
+NTSTATUS idmap_gid_to_sid(const char *domname, struct dom_sid *sid, gid_t gid)
{
NTSTATUS ret;
struct id_map map;
bool expired;
- DEBUG(10,("idmap_gid_to_si: gid = [%lu], domain = '%s'\n",
+ DEBUG(10,("idmap_gid_to_sid: gid = [%lu], domain = '%s'\n",
(unsigned long)gid, domname?domname:"NULL"));
if (winbindd_use_idmap_cache()
&& idmap_cache_find_gid2sid(gid, sid, &expired)) {
- DEBUG(10, ("idmap_cache_find_gid2sid found %d%s\n", gid,
+ DEBUG(10, ("idmap_cache_find_gid2sid found %u%s\n",
+ (unsigned int)gid,
expired ? " (expired)": ""));
if (expired && idmap_is_online()) {
DEBUG(10, ("revalidating expired entry\n"));
}
backend:
+ ZERO_STRUCT(map);
map.sid = sid;
map.xid.type = ID_TYPE_GID;
map.xid.id = gid;
- ret = idmap_backends_unixid_to_sid(domname, &map);
+ ret = idmap_backends_unixid_to_sid(&map);
if ( ! NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("error mapping gid [%lu]\n", (unsigned long)gid));
- return ret;
+ DEBUG(10, ("error mapping gid [%lu]: %s\n", (unsigned long)gid,
+ nt_errstr(ret)));
+ map.status = ID_UNMAPPED;
}
if (map.status != ID_MAPPED) {
if (winbindd_use_idmap_cache()) {
struct dom_sid null_sid;
+ struct unixid id;
+ id.type = ID_TYPE_GID;
+ id.id = gid;
ZERO_STRUCT(null_sid);
- idmap_cache_set_sid2uid(&null_sid, gid);
+ idmap_cache_set_sid2unixid(&null_sid, &id);
}
DEBUG(10, ("gid [%lu] not mapped\n", (unsigned long)gid));
return NT_STATUS_NONE_MAPPED;
}
if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2gid(sid, gid);
+ idmap_cache_set_sid2unixid(sid, &map.xid);
}
return NT_STATUS_OK;
}
-/*****************************************************************
- Returns the UID mapped to the given SID.
- If mapping is not possible or SID maps to a GID returns an error.
-*****************************************************************/
-
-NTSTATUS idmap_sid_to_uid(const char *dom_name, DOM_SID *sid, uid_t *uid)
+/**
+ * check whether a given unix id is inside the filter range of an idmap domain
+ */
+bool idmap_unix_id_is_in_range(uint32_t id, struct idmap_domain *dom)
{
- NTSTATUS ret;
- struct id_map map;
- bool expired;
-
- DEBUG(10,("idmap_sid_to_uid: sid = [%s], domain = '%s'\n",
- sid_string_dbg(sid), dom_name));
-
- if (winbindd_use_idmap_cache()
- && idmap_cache_find_sid2uid(sid, uid, &expired)) {
- DEBUG(10, ("idmap_cache_find_sid2uid found %d%s\n",
- (int)(*uid), expired ? " (expired)": ""));
- if (expired && idmap_is_online()) {
- DEBUG(10, ("revalidating expired entry\n"));
- goto backend;
- }
- if ((*uid) == -1) {
- DEBUG(10, ("Returning negative cache entry\n"));
- return NT_STATUS_NONE_MAPPED;
- }
- DEBUG(10, ("Returning positive cache entry\n"));
- return NT_STATUS_OK;
+ if (id == 0) {
+ /* 0 is not an allowed unix id for id mapping */
+ return false;
}
-backend:
- map.sid = sid;
- map.xid.type = ID_TYPE_UID;
-
- ret = idmap_backends_sid_to_unixid(dom_name, &map);
-
- if (NT_STATUS_IS_OK(ret) && (map.status == ID_MAPPED)) {
- if (map.xid.type != ID_TYPE_UID) {
- DEBUG(10, ("sid [%s] not mapped to a uid "
- "[%u,%u,%u]\n",
- sid_string_dbg(sid),
- map.status,
- map.xid.type,
- map.xid.id));
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2uid(sid, -1);
- }
- return NT_STATUS_NONE_MAPPED;
- }
- goto done;
+ if ((dom->low_id && (id < dom->low_id)) ||
+ (dom->high_id && (id > dom->high_id)))
+ {
+ return false;
}
- if (dom_name[0] != '\0') {
- /*
- * We had the task to go to a specific domain which
- * could not answer our request. Fail.
- */
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2uid(sid, -1);
- }
- return NT_STATUS_NONE_MAPPED;
- }
+ return true;
+}
- ret = idmap_new_mapping(sid, ID_TYPE_UID, &map.xid);
+/**
+ * Helper for unixids_to_sids: find entry by id in mapping array,
+ * search up to IDMAP_AD_MAX_IDS entries
+ */
+struct id_map *idmap_find_map_by_id(struct id_map **maps, enum id_type type,
+ uint32_t id)
+{
+ int i;
- if (!NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("idmap_new_mapping failed: %s\n",
- nt_errstr(ret)));
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2uid(sid, -1);
+ for (i = 0; i < IDMAP_LDAP_MAX_IDS; i++) {
+ if (maps[i] == NULL) { /* end of the run */
+ return NULL;
+ }
+ if ((maps[i]->xid.type == type) && (maps[i]->xid.id == id)) {
+ return maps[i];
}
- return ret;
}
-done:
- *uid = (uid_t)map.xid.id;
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2uid(sid, *uid);
- }
- return NT_STATUS_OK;
+ return NULL;
}
-/*****************************************************************
- Returns the GID mapped to the given SID.
- If mapping is not possible or SID maps to a UID returns an error.
-*****************************************************************/
-
-NTSTATUS idmap_sid_to_gid(const char *domname, DOM_SID *sid, gid_t *gid)
+/**
+ * Helper for sids_to_unix_ids: find entry by SID in mapping array,
+ * search up to IDMAP_AD_MAX_IDS entries
+ */
+struct id_map *idmap_find_map_by_sid(struct id_map **maps, struct dom_sid *sid)
{
- NTSTATUS ret;
- struct id_map map;
- bool expired;
-
- DEBUG(10,("idmap_sid_to_gid: sid = [%s], domain = '%s'\n",
- sid_string_dbg(sid), domname));
+ int i;
- if (winbindd_use_idmap_cache()
- && idmap_cache_find_sid2gid(sid, gid, &expired)) {
- DEBUG(10, ("idmap_cache_find_sid2gid found %d%s\n",
- (int)(*gid), expired ? " (expired)": ""));
- if (expired && idmap_is_online()) {
- DEBUG(10, ("revalidating expired entry\n"));
- goto backend;
+ for (i = 0; i < IDMAP_LDAP_MAX_IDS; i++) {
+ if (maps[i] == NULL) { /* end of the run */
+ return NULL;
}
- if ((*gid) == -1) {
- DEBUG(10, ("Returning negative cache entry\n"));
- return NT_STATUS_NONE_MAPPED;
+ if (dom_sid_equal(maps[i]->sid, sid)) {
+ return maps[i];
}
- DEBUG(10, ("Returning positive cache entry\n"));
- return NT_STATUS_OK;
}
-backend:
- map.sid = sid;
- map.xid.type = ID_TYPE_GID;
+ return NULL;
+}
- ret = idmap_backends_sid_to_unixid(domname, &map);
- if (NT_STATUS_IS_OK(ret) && (map.status == ID_MAPPED)) {
- if (map.xid.type != ID_TYPE_GID) {
- DEBUG(10, ("sid [%s] not mapped to a gid "
- "[%u,%u,%u]\n",
- sid_string_dbg(sid),
- map.status,
- map.xid.type,
- map.xid.id));
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2gid(sid, -1);
- }
- return NT_STATUS_NONE_MAPPED;
- }
- goto done;
- }
+char *idmap_fetch_secret(const char *backend, const char *domain,
+ const char *identity)
+{
+ char *tmp, *ret;
+ int r;
- if (domname[0] != '\0') {
- /*
- * We had the task to go to a specific domain which
- * could not answer our request. Fail.
- */
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2uid(sid, -1);
- }
- return NT_STATUS_NONE_MAPPED;
- }
+ r = asprintf(&tmp, "IDMAP_%s_%s", backend, domain);
- ret = idmap_new_mapping(sid, ID_TYPE_GID, &map.xid);
+ if (r < 0)
+ return NULL;
- if (!NT_STATUS_IS_OK(ret)) {
- DEBUG(10, ("idmap_new_mapping failed: %s\n",
- nt_errstr(ret)));
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2gid(sid, -1);
- }
- return ret;
+ /* make sure the key is case insensitive */
+ if (!strupper_m(tmp)) {
+ SAFE_FREE(tmp);
+ return NULL;
}
-done:
- *gid = map.xid.id;
- if (winbindd_use_idmap_cache()) {
- idmap_cache_set_sid2gid(sid, *gid);
- }
- return NT_STATUS_OK;
+ ret = secrets_fetch_generic(tmp, identity);
+
+ SAFE_FREE(tmp);
+
+ return ret;
}