2 * idmap_rid: static map between Active Directory/NT RIDs and RFC 2307 accounts
3 * Copyright (C) Guenther Deschner, 2004
4 * Copyright (C) Sumit Bose, 2004
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
25 #define DBGC_CLASS DBGC_IDMAP
27 struct idmap_rid_context {
28 const char *domain_name;
34 /******************************************************************************
35 compat params can't be used because of the completely different way
36 we support multiple domains in the new idmap
37 *****************************************************************************/
39 static NTSTATUS idmap_rid_initialize(struct idmap_domain *dom,
43 struct idmap_rid_context *ctx;
44 char *config_option = NULL;
51 ctx = TALLOC_ZERO_P(dom, struct idmap_rid_context);
53 DEBUG(0, ("Out of memory!\n"));
54 return NT_STATUS_NO_MEMORY;
57 config_option = talloc_asprintf(ctx, "idmap config %s", dom->name);
58 if ( ! config_option) {
59 DEBUG(0, ("Out of memory!\n"));
60 ret = NT_STATUS_NO_MEMORY;
64 range = lp_parm_const_string(-1, config_option, "range", NULL);
66 (sscanf(range, "%u - %u", &ctx->low_id, &ctx->high_id) != 2) ||
67 (ctx->low_id > ctx->high_id))
73 /* lets see if the range is defined by the old idmap uid/idmap gid */
74 if (!ctx->low_id && !ctx->high_id) {
75 if (lp_idmap_uid(&low_uid, &high_uid)) {
76 ctx->low_id = low_uid;
77 ctx->high_id = high_uid;
80 if (lp_idmap_gid(&low_gid, &high_gid)) {
81 if ((ctx->low_id != low_gid) ||
82 (ctx->high_id != high_uid)) {
83 DEBUG(1, ("ERROR: idmap uid range must match idmap gid range\n"));
84 ret = NT_STATUS_UNSUCCESSFUL;
90 if (!ctx->low_id || !ctx->high_id) {
91 DEBUG(1, ("ERROR: Invalid configuration, ID range missing or invalid\n"));
92 ret = NT_STATUS_UNSUCCESSFUL;
96 ctx->base_rid = lp_parm_int(-1, config_option, "base_rid", 0);
97 ctx->domain_name = talloc_strdup( ctx, dom->name );
99 dom->private_data = ctx;
101 talloc_free(config_option);
109 static NTSTATUS idmap_rid_id_to_sid(struct idmap_domain *dom, struct id_map *map)
111 struct winbindd_domain *domain;
112 struct idmap_rid_context *ctx;
114 ctx = talloc_get_type(dom->private_data, struct idmap_rid_context);
116 /* apply filters before checking */
117 if (!idmap_unix_id_is_in_range(map->xid.id, dom)) {
118 DEBUG(5, ("Requested id (%u) out of range (%u - %u). Filtered!\n",
119 map->xid.id, dom->low_id, dom->high_id));
120 return NT_STATUS_NONE_MAPPED;
123 domain = find_domain_from_name_noinit(dom->name);
124 if (domain == NULL ) {
125 return NT_STATUS_NO_SUCH_DOMAIN;
128 sid_compose(map->sid, &domain->sid, map->xid.id - dom->low_id + ctx->base_rid);
130 /* We **really** should have some way of validating
131 the SID exists and is the correct type here. But
132 that is a deficiency in the idmap_rid design. */
134 map->status = ID_MAPPED;
139 /**********************************
140 Single sid to id lookup function.
141 **********************************/
143 static NTSTATUS idmap_rid_sid_to_id(struct idmap_domain *dom, struct id_map *map)
146 struct idmap_rid_context *ctx;
148 ctx = talloc_get_type(dom->private_data, struct idmap_rid_context);
150 sid_peek_rid(map->sid, &rid);
151 map->xid.id = rid - ctx->base_rid + dom->low_id;
153 /* apply filters before returning result */
155 if (!idmap_unix_id_is_in_range(map->xid.id, dom)) {
156 DEBUG(5, ("Requested id (%u) out of range (%u - %u). Filtered!\n",
157 map->xid.id, dom->low_id, dom->high_id));
158 map->status = ID_UNMAPPED;
159 return NT_STATUS_NONE_MAPPED;
162 /* We **really** should have some way of validating
163 the SID exists and is the correct type here. But
164 that is a deficiency in the idmap_rid design. */
166 map->status = ID_MAPPED;
171 /**********************************
172 lookup a set of unix ids.
173 **********************************/
175 static NTSTATUS idmap_rid_unixids_to_sids(struct idmap_domain *dom, struct id_map **ids)
180 /* initialize the status to avoid suprise */
181 for (i = 0; ids[i]; i++) {
182 ids[i]->status = ID_UNKNOWN;
185 for (i = 0; ids[i]; i++) {
187 ret = idmap_rid_id_to_sid(dom, ids[i]);
189 if (( ! NT_STATUS_IS_OK(ret)) &&
190 ( ! NT_STATUS_EQUAL(ret, NT_STATUS_NONE_MAPPED))) {
191 /* some fatal error occurred, log it */
192 DEBUG(3, ("Unexpected error resolving an ID (%d)\n", ids[i]->xid.id));
199 /**********************************
200 lookup a set of sids.
201 **********************************/
203 static NTSTATUS idmap_rid_sids_to_unixids(struct idmap_domain *dom, struct id_map **ids)
208 /* initialize the status to avoid suprise */
209 for (i = 0; ids[i]; i++) {
210 ids[i]->status = ID_UNKNOWN;
213 for (i = 0; ids[i]; i++) {
215 ret = idmap_rid_sid_to_id(dom, ids[i]);
217 if (( ! NT_STATUS_IS_OK(ret)) &&
218 ( ! NT_STATUS_EQUAL(ret, NT_STATUS_NONE_MAPPED))) {
219 /* some fatal error occurred, log it */
220 DEBUG(3, ("Unexpected error resolving a SID (%s)\n",
221 sid_string_dbg(ids[i]->sid)));
228 static NTSTATUS idmap_rid_close(struct idmap_domain *dom)
230 if (dom->private_data) {
231 TALLOC_FREE(dom->private_data);
236 static struct idmap_methods rid_methods = {
237 .init = idmap_rid_initialize,
238 .unixids_to_sids = idmap_rid_unixids_to_sids,
239 .sids_to_unixids = idmap_rid_sids_to_unixids,
240 .close_fn = idmap_rid_close
243 NTSTATUS idmap_rid_init(void)
245 return smb_register_idmap(SMB_IDMAP_INTERFACE_VERSION, "rid", &rid_methods);