libcli/security Provide a common, top level libcli/security/security.h
[samba.git] / source3 / winbindd / idmap_util.c
index 2a6beca5a2a9b3f0b5b68d6947ec208a46dc0812..7525fa76203d30bfc3a24ad7a7f8c3cf0458155d 100644 (file)
    along with this program.  If not, see <http://www.gnu.org/licenses/>.*/
 
 #include "includes.h"
+#include "winbindd.h"
+#include "winbindd_proto.h"
+#include "idmap.h"
+#include "idmap_cache.h"
+#include "../libcli/security/security.h"
 
 #undef DBGC_CLASS
 #define DBGC_CLASS DBGC_IDMAP
  If mapping is not possible returns an error.
 *****************************************************************/  
 
-NTSTATUS idmap_uid_to_sid(const char *domname, DOM_SID *sid, uid_t uid)
+NTSTATUS idmap_uid_to_sid(const char *domname, struct dom_sid *sid, uid_t uid)
 {
        NTSTATUS ret;
        struct id_map map;
        bool expired;
 
-       DEBUG(10,("uid = [%lu]\n", (unsigned long)uid));
+       DEBUG(10,("idmap_uid_to_sid: uid = [%lu], domain = '%s'\n",
+                 (unsigned long)uid, domname?domname:"NULL"));
 
-       if (idmap_cache_find_uid2sid(uid, sid, &expired)) {
-               DEBUG(10, ("idmap_cache_find_uid2sid found %d%s\n", uid,
+       if (winbindd_use_idmap_cache()
+           && idmap_cache_find_uid2sid(uid, sid, &expired)) {
+               DEBUG(10, ("idmap_cache_find_uid2sid found %u%s\n",
+                       (unsigned int)uid,
                           expired ? " (expired)": ""));
                if (expired && idmap_is_online()) {
                        DEBUG(10, ("revalidating expired entry\n"));
@@ -62,14 +70,18 @@ backend:
        }
 
        if (map.status != ID_MAPPED) {
-               struct dom_sid null_sid;
-               ZERO_STRUCT(null_sid);
-               idmap_cache_set_sid2uid(&null_sid, uid);
+               if (winbindd_use_idmap_cache()) {
+                       struct dom_sid null_sid;
+                       ZERO_STRUCT(null_sid);
+                       idmap_cache_set_sid2uid(&null_sid, uid);
+               }
                DEBUG(10, ("uid [%lu] not mapped\n", (unsigned long)uid));
                return NT_STATUS_NONE_MAPPED;
        }
 
-       idmap_cache_set_sid2uid(sid, uid);
+       if (winbindd_use_idmap_cache()) {
+               idmap_cache_set_sid2uid(sid, uid);
+       }
 
        return NT_STATUS_OK;
 }
@@ -79,16 +91,19 @@ backend:
  If mapping is not possible returns an error.
 *****************************************************************/  
 
-NTSTATUS idmap_gid_to_sid(const char *domname, DOM_SID *sid, gid_t gid)
+NTSTATUS idmap_gid_to_sid(const char *domname, struct dom_sid *sid, gid_t gid)
 {
        NTSTATUS ret;
        struct id_map map;
        bool expired;
 
-       DEBUG(10,("gid = [%lu]\n", (unsigned long)gid));
+       DEBUG(10,("idmap_gid_to_sid: gid = [%lu], domain = '%s'\n",
+                 (unsigned long)gid, domname?domname:"NULL"));
 
-       if (idmap_cache_find_uid2sid(gid, sid, &expired)) {
-               DEBUG(10, ("idmap_cache_find_gid2sid found %d%s\n", gid,
+       if (winbindd_use_idmap_cache()
+           && idmap_cache_find_gid2sid(gid, sid, &expired)) {
+               DEBUG(10, ("idmap_cache_find_gid2sid found %u%s\n",
+                       (unsigned int)gid,
                           expired ? " (expired)": ""));
                if (expired && idmap_is_online()) {
                        DEBUG(10, ("revalidating expired entry\n"));
@@ -114,14 +129,18 @@ backend:
        }
 
        if (map.status != ID_MAPPED) {
-               struct dom_sid null_sid;
-               ZERO_STRUCT(null_sid);
-               idmap_cache_set_sid2uid(&null_sid, gid);
+               if (winbindd_use_idmap_cache()) {
+                       struct dom_sid null_sid;
+                       ZERO_STRUCT(null_sid);
+                       idmap_cache_set_sid2uid(&null_sid, gid);
+               }
                DEBUG(10, ("gid [%lu] not mapped\n", (unsigned long)gid));
                return NT_STATUS_NONE_MAPPED;
        }
 
-       idmap_cache_set_sid2uid(sid, gid);
+       if (winbindd_use_idmap_cache()) {
+               idmap_cache_set_sid2gid(sid, gid);
+       }
 
        return NT_STATUS_OK;
 }
@@ -131,15 +150,17 @@ backend:
  If mapping is not possible or SID maps to a GID returns an error.
 *****************************************************************/  
 
-NTSTATUS idmap_sid_to_uid(const char *dom_name, DOM_SID *sid, uid_t *uid)
+NTSTATUS idmap_sid_to_uid(const char *dom_name, struct dom_sid *sid, uid_t *uid)
 {
        NTSTATUS ret;
        struct id_map map;
        bool expired;
 
-       DEBUG(10,("idmap_sid_to_uid: sid = [%s]\n", sid_string_dbg(sid)));
+       DEBUG(10,("idmap_sid_to_uid: sid = [%s], domain = '%s'\n",
+                 sid_string_dbg(sid), dom_name));
 
-       if (idmap_cache_find_sid2uid(sid, uid, &expired)) {
+       if (winbindd_use_idmap_cache()
+           && idmap_cache_find_sid2uid(sid, uid, &expired)) {
                DEBUG(10, ("idmap_cache_find_sid2uid found %d%s\n",
                           (int)(*uid), expired ? " (expired)": ""));
                if (expired && idmap_is_online()) {
@@ -160,41 +181,40 @@ backend:
 
        ret = idmap_backends_sid_to_unixid(dom_name, &map);
 
-       if (NT_STATUS_IS_OK(ret) && (map.status == ID_MAPPED)) {
-               if (map.xid.type != ID_TYPE_UID) {
-                       DEBUG(10, ("sid [%s] not mapped to a uid "
-                                  "[%u,%u,%u]\n",
-                                  sid_string_dbg(sid),
-                                  map.status,
-                                  map.xid.type,
-                                  map.xid.id));
+       if (!NT_STATUS_IS_OK(ret)) {
+               DEBUG(10, ("idmap_backends_sid_to_unixid failed: %s\n",
+                          nt_errstr(ret)));
+               if (winbindd_use_idmap_cache()) {
                        idmap_cache_set_sid2uid(sid, -1);
-                       return NT_STATUS_NONE_MAPPED;
                }
-               goto done;
+               return ret;
        }
 
-       if (dom_name[0] != '\0') {
-               /*
-                * We had the task to go to a specific domain which
-                * could not answer our request. Fail.
-                */
-               idmap_cache_set_sid2uid(sid, -1);
+       if (map.status != ID_MAPPED) {
+               DEBUG(10, ("sid [%s] is not mapped\n", sid_string_dbg(sid)));
+               if (winbindd_use_idmap_cache()) {
+                       idmap_cache_set_sid2uid(sid, -1);
+               }
                return NT_STATUS_NONE_MAPPED;
        }
 
-       ret = idmap_new_mapping(sid, ID_TYPE_UID, &map.xid);
-
-       if (!NT_STATUS_IS_OK(ret)) {
-               DEBUG(10, ("idmap_new_mapping failed: %s\n",
-                          nt_errstr(ret)));
-               idmap_cache_set_sid2uid(sid, -1);
-               return ret;
+       if (map.xid.type != ID_TYPE_UID) {
+               DEBUG(10, ("sid [%s] not mapped to a uid "
+                          "[%u,%u,%u]\n",
+                          sid_string_dbg(sid),
+                          map.status,
+                          map.xid.type,
+                          map.xid.id));
+               if (winbindd_use_idmap_cache()) {
+                       idmap_cache_set_sid2uid(sid, -1);
+               }
+               return NT_STATUS_NONE_MAPPED;
        }
 
-done:
        *uid = (uid_t)map.xid.id;
-       idmap_cache_set_sid2uid(sid, *uid);
+       if (winbindd_use_idmap_cache()) {
+               idmap_cache_set_sid2uid(sid, *uid);
+       }
        return NT_STATUS_OK;
 }
 
@@ -203,15 +223,17 @@ done:
  If mapping is not possible or SID maps to a UID returns an error.
 *****************************************************************/  
 
-NTSTATUS idmap_sid_to_gid(const char *domname, DOM_SID *sid, gid_t *gid)
+NTSTATUS idmap_sid_to_gid(const char *domname, struct dom_sid *sid, gid_t *gid)
 {
        NTSTATUS ret;
        struct id_map map;
        bool expired;
 
-       DEBUG(10,("idmap_sid_to_gid: sid = [%s]\n", sid_string_dbg(sid)));
+       DEBUG(10,("idmap_sid_to_gid: sid = [%s], domain = '%s'\n",
+                 sid_string_dbg(sid), domname));
 
-       if (idmap_cache_find_sid2gid(sid, gid, &expired)) {
+       if (winbindd_use_idmap_cache()
+           && idmap_cache_find_sid2gid(sid, gid, &expired)) {
                DEBUG(10, ("idmap_cache_find_sid2gid found %d%s\n",
                           (int)(*gid), expired ? " (expired)": ""));
                if (expired && idmap_is_online()) {
@@ -231,40 +253,59 @@ backend:
        map.xid.type = ID_TYPE_GID;
 
        ret = idmap_backends_sid_to_unixid(domname, &map);
-       if (NT_STATUS_IS_OK(ret) && (map.status == ID_MAPPED)) {
-               if (map.xid.type != ID_TYPE_GID) {
-                       DEBUG(10, ("sid [%s] not mapped to a gid "
-                                  "[%u,%u,%u]\n",
-                                  sid_string_dbg(sid),
-                                  map.status,
-                                  map.xid.type,
-                                  map.xid.id));
-                       idmap_cache_set_sid2gid(sid, -1);
-                       return NT_STATUS_NONE_MAPPED;
+
+       if (!NT_STATUS_IS_OK(ret)) {
+               DEBUG(10, ("idmap_backends_sid_to_unixid failed: %s\n",
+                          nt_errstr(ret)));
+               if (winbindd_use_idmap_cache()) {
+                       idmap_cache_set_sid2uid(sid, -1);
                }
-               goto done;
+               return ret;
        }
 
-       if (domname[0] != '\0') {
-               /*
-                * We had the task to go to a specific domain which
-                * could not answer our request. Fail.
-                */
-               idmap_cache_set_sid2uid(sid, -1);
+       if (map.status != ID_MAPPED) {
+               DEBUG(10, ("sid [%s] is not mapped\n", sid_string_dbg(sid)));
+               if (winbindd_use_idmap_cache()) {
+                       idmap_cache_set_sid2uid(sid, -1);
+               }
                return NT_STATUS_NONE_MAPPED;
        }
 
-       ret = idmap_new_mapping(sid, ID_TYPE_GID, &map.xid);
-
-       if (!NT_STATUS_IS_OK(ret)) {
-               DEBUG(10, ("idmap_new_mapping failed: %s\n",
-                          nt_errstr(ret)));
-               idmap_cache_set_sid2gid(sid, -1);
-               return ret;
+       if (map.xid.type != ID_TYPE_GID) {
+               DEBUG(10, ("sid [%s] not mapped to a gid "
+                          "[%u,%u,%u]\n",
+                          sid_string_dbg(sid),
+                          map.status,
+                          map.xid.type,
+                          map.xid.id));
+               if (winbindd_use_idmap_cache()) {
+                       idmap_cache_set_sid2gid(sid, -1);
+               }
+               return NT_STATUS_NONE_MAPPED;
        }
 
-done:
        *gid = map.xid.id;
-       idmap_cache_set_sid2gid(sid, *gid);
+       if (winbindd_use_idmap_cache()) {
+               idmap_cache_set_sid2gid(sid, *gid);
+       }
        return NT_STATUS_OK;
 }
+
+/**
+ * check whether a given unix id is inside the filter range of an idmap domain
+ */
+bool idmap_unix_id_is_in_range(uint32_t id, struct idmap_domain *dom)
+{
+       if (id == 0) {
+               /* 0 is not an allowed unix id for id mapping */
+               return false;
+       }
+
+       if ((dom->low_id && (id < dom->low_id)) ||
+           (dom->high_id && (id > dom->high_id)))
+       {
+               return false;
+       }
+
+       return true;
+}