• Home
  • History
  • Annotate
  • Line#
  • Navigate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/groupdb/
1/*
2 *  Unix SMB/CIFS implementation.
3 *  RPC Pipe client / server routines
4 *  Copyright (C) Andrew Tridgell              1992-2006,
5 *  Copyright (C) Jean Fran�ois Micouleau      1998-2001.
6 *  Copyright (C) Volker Lendecke              2006.
7 *  Copyright (C) Gerald Carter                2006.
8 *
9 *  This program is free software; you can redistribute it and/or modify
10 *  it under the terms of the GNU General Public License as published by
11 *  the Free Software Foundation; either version 3 of the License, or
12 *  (at your option) any later version.
13 *
14 *  This program is distributed in the hope that it will be useful,
15 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
16 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17 *  GNU General Public License for more details.
18 *
19 *  You should have received a copy of the GNU General Public License
20 *  along with this program; if not, see <http://www.gnu.org/licenses/>.
21 */
22
23#include "includes.h"
24#include "groupdb/mapping.h"
25
26static struct db_context *db; /* used for driver files */
27
28static bool enum_group_mapping(const DOM_SID *domsid, enum lsa_SidType sid_name_use, GROUP_MAP **pp_rmap,
29			       size_t *p_num_entries, bool unix_only);
30static bool group_map_remove(const DOM_SID *sid);
31
32/****************************************************************************
33 Open the group mapping tdb.
34****************************************************************************/
35static bool init_group_mapping(void)
36{
37	if (db != NULL) {
38		return true;
39	}
40
41	db = db_open(NULL, state_path("group_mapping.tdb"), 0,
42			   TDB_DEFAULT, O_RDWR|O_CREAT, 0600);
43	if (db == NULL) {
44		DEBUG(0, ("Failed to open group mapping database: %s\n",
45			  strerror(errno)));
46		return false;
47	}
48
49#if 0
50	/*
51	 * This code was designed to handle a group mapping version
52	 * upgrade. mapping_tdb is not active by default anymore, so ignore
53	 * this here.
54	 */
55	{
56		const char *vstring = "INFO/version";
57		int32 vers_id;
58		GROUP_MAP *map_table = NULL;
59		size_t num_entries = 0;
60
61		/* handle a Samba upgrade */
62		tdb_lock_bystring(tdb, vstring);
63
64		/* Cope with byte-reversed older versions of the db. */
65		vers_id = tdb_fetch_int32(tdb, vstring);
66		if ((vers_id == DATABASE_VERSION_V1)
67		    || (IREV(vers_id) == DATABASE_VERSION_V1)) {
68			/*
69			 * Written on a bigendian machine with old fetch_int
70			 * code. Save as le.
71			 */
72			tdb_store_int32(tdb, vstring, DATABASE_VERSION_V2);
73			vers_id = DATABASE_VERSION_V2;
74		}
75
76		/* if its an unknown version we remove everthing in the db */
77
78		if (vers_id != DATABASE_VERSION_V2) {
79			tdb_wipe_all(tdb);
80			tdb_store_int32(tdb, vstring, DATABASE_VERSION_V2);
81		}
82
83		tdb_unlock_bystring(tdb, vstring);
84
85		/* cleanup any map entries with a gid == -1 */
86
87		if ( enum_group_mapping( NULL, SID_NAME_UNKNOWN, &map_table,
88					 &num_entries, False ) ) {
89			int i;
90
91			for ( i=0; i<num_entries; i++ ) {
92				if ( map_table[i].gid == -1 ) {
93					group_map_remove( &map_table[i].sid );
94				}
95			}
96
97			SAFE_FREE( map_table );
98		}
99	}
100#endif
101
102	return true;
103}
104
105static char *group_mapping_key(TALLOC_CTX *mem_ctx, const DOM_SID *sid)
106{
107	char *sidstr, *result;
108
109	sidstr = sid_string_talloc(talloc_tos(), sid);
110	if (sidstr == NULL) {
111		return NULL;
112	}
113
114	result = talloc_asprintf(mem_ctx, "%s%s", GROUP_PREFIX, sidstr);
115
116	TALLOC_FREE(sidstr);
117	return result;
118}
119
120/****************************************************************************
121****************************************************************************/
122static bool add_mapping_entry(GROUP_MAP *map, int flag)
123{
124	char *key, *buf;
125	int len;
126	NTSTATUS status;
127
128	key = group_mapping_key(talloc_tos(), &map->sid);
129	if (key == NULL) {
130		return false;
131	}
132
133	len = tdb_pack(NULL, 0, "ddff",
134		map->gid, map->sid_name_use, map->nt_name, map->comment);
135
136	buf = TALLOC_ARRAY(key, char, len);
137	if (!buf) {
138		TALLOC_FREE(key);
139		return false;
140	}
141	len = tdb_pack((uint8 *)buf, len, "ddff", map->gid,
142		       map->sid_name_use, map->nt_name, map->comment);
143
144	status = dbwrap_trans_store(
145		db, string_term_tdb_data(key),
146		make_tdb_data((uint8_t *)buf, len), TDB_REPLACE);
147
148	TALLOC_FREE(key);
149
150	return NT_STATUS_IS_OK(status);
151}
152
153
154/****************************************************************************
155 Return the sid and the type of the unix group.
156****************************************************************************/
157
158static bool get_group_map_from_sid(DOM_SID sid, GROUP_MAP *map)
159{
160	TDB_DATA dbuf;
161	char *key;
162	int ret = 0;
163
164	/* the key is the SID, retrieving is direct */
165
166	key = group_mapping_key(talloc_tos(), &sid);
167	if (key == NULL) {
168		return false;
169	}
170
171	dbuf = dbwrap_fetch_bystring(db, key, key);
172	if (dbuf.dptr == NULL) {
173		TALLOC_FREE(key);
174		return false;
175	}
176
177	ret = tdb_unpack(dbuf.dptr, dbuf.dsize, "ddff",
178			&map->gid, &map->sid_name_use,
179			&map->nt_name, &map->comment);
180
181	TALLOC_FREE(key);
182
183	if ( ret == -1 ) {
184		DEBUG(3,("get_group_map_from_sid: tdb_unpack failure\n"));
185		return false;
186	}
187
188	sid_copy(&map->sid, &sid);
189
190	return true;
191}
192
193static bool dbrec2map(const struct db_record *rec, GROUP_MAP *map)
194{
195	if ((rec->key.dsize < strlen(GROUP_PREFIX))
196	    || (strncmp((char *)rec->key.dptr, GROUP_PREFIX,
197			GROUP_PREFIX_LEN) != 0)) {
198		return False;
199	}
200
201	if (!string_to_sid(&map->sid, (const char *)rec->key.dptr
202			   + GROUP_PREFIX_LEN)) {
203		return False;
204	}
205
206	return tdb_unpack(rec->value.dptr, rec->value.dsize, "ddff",
207			  &map->gid, &map->sid_name_use, &map->nt_name,
208			  &map->comment) != -1;
209}
210
211struct find_map_state {
212	bool found;
213	const char *name;	/* If != NULL, look for name */
214	gid_t gid;		/* valid iff name == NULL */
215	GROUP_MAP *map;
216};
217
218static int find_map(struct db_record *rec, void *private_data)
219{
220	struct find_map_state *state = (struct find_map_state *)private_data;
221
222	if (!dbrec2map(rec, state->map)) {
223		DEBUG(10, ("failed to unpack map\n"));
224		return 0;
225	}
226
227	if (state->name != NULL) {
228		if (strequal(state->name, state->map->nt_name)) {
229			state->found = true;
230			return 1;
231		}
232	}
233	else {
234		if (state->map->gid == state->gid) {
235			state->found = true;
236			return 1;
237		}
238	}
239
240	return 0;
241}
242
243/****************************************************************************
244 Return the sid and the type of the unix group.
245****************************************************************************/
246
247static bool get_group_map_from_gid(gid_t gid, GROUP_MAP *map)
248{
249	struct find_map_state state;
250
251	state.found = false;
252	state.name = NULL;	/* Indicate we're looking for gid */
253	state.gid = gid;
254	state.map = map;
255
256	db->traverse_read(db, find_map, (void *)&state);
257
258	return state.found;
259}
260
261/****************************************************************************
262 Return the sid and the type of the unix group.
263****************************************************************************/
264
265static bool get_group_map_from_ntname(const char *name, GROUP_MAP *map)
266{
267	struct find_map_state state;
268
269	state.found = false;
270	state.name = name;
271	state.map = map;
272
273	db->traverse_read(db, find_map, (void *)&state);
274
275	return state.found;
276}
277
278/****************************************************************************
279 Remove a group mapping entry.
280****************************************************************************/
281
282static bool group_map_remove(const DOM_SID *sid)
283{
284	char *key;
285	NTSTATUS status;
286
287	key = group_mapping_key(talloc_tos(), sid);
288	if (key == NULL) {
289		return false;
290	}
291
292	status = dbwrap_trans_delete(db, string_term_tdb_data(key));
293
294	TALLOC_FREE(key);
295	return NT_STATUS_IS_OK(status);
296}
297
298/****************************************************************************
299 Enumerate the group mapping.
300****************************************************************************/
301
302struct enum_map_state {
303	const DOM_SID *domsid;
304	enum lsa_SidType sid_name_use;
305	bool unix_only;
306
307	size_t num_maps;
308	GROUP_MAP *maps;
309};
310
311static int collect_map(struct db_record *rec, void *private_data)
312{
313	struct enum_map_state *state = (struct enum_map_state *)private_data;
314	GROUP_MAP map;
315	GROUP_MAP *tmp;
316
317	if (!dbrec2map(rec, &map)) {
318		return 0;
319	}
320	/* list only the type or everything if UNKNOWN */
321	if (state->sid_name_use != SID_NAME_UNKNOWN
322	    && state->sid_name_use != map.sid_name_use) {
323		DEBUG(11,("enum_group_mapping: group %s is not of the "
324			  "requested type\n", map.nt_name));
325		return 0;
326	}
327
328	if ((state->unix_only == ENUM_ONLY_MAPPED) && (map.gid == -1)) {
329		DEBUG(11,("enum_group_mapping: group %s is non mapped\n",
330			  map.nt_name));
331		return 0;
332	}
333
334	if ((state->domsid != NULL) &&
335	    (sid_compare_domain(state->domsid, &map.sid) != 0)) {
336		DEBUG(11,("enum_group_mapping: group %s is not in domain\n",
337			  sid_string_dbg(&map.sid)));
338		return 0;
339	}
340
341	if (!(tmp = SMB_REALLOC_ARRAY(state->maps, GROUP_MAP,
342				      state->num_maps+1))) {
343		DEBUG(0,("enum_group_mapping: Unable to enlarge group "
344			 "map!\n"));
345		return 1;
346	}
347
348	state->maps = tmp;
349	state->maps[state->num_maps] = map;
350	state->num_maps++;
351	return 0;
352}
353
354static bool enum_group_mapping(const DOM_SID *domsid,
355			       enum lsa_SidType sid_name_use,
356			       GROUP_MAP **pp_rmap,
357			       size_t *p_num_entries, bool unix_only)
358{
359	struct enum_map_state state;
360
361	state.domsid = domsid;
362	state.sid_name_use = sid_name_use;
363	state.unix_only = unix_only;
364	state.num_maps = 0;
365	state.maps = NULL;
366
367	if (db->traverse_read(db, collect_map, (void *)&state) < 0) {
368		return false;
369	}
370
371	*pp_rmap = state.maps;
372	*p_num_entries = state.num_maps;
373
374	return true;
375}
376
377/* This operation happens on session setup, so it should better be fast. We
378 * store a list of aliases a SID is member of hanging off MEMBEROF/SID. */
379
380static NTSTATUS one_alias_membership(const DOM_SID *member,
381			       DOM_SID **sids, size_t *num)
382{
383	fstring tmp;
384	fstring key;
385	char *string_sid;
386	TDB_DATA dbuf;
387	const char *p;
388	NTSTATUS status = NT_STATUS_OK;
389	TALLOC_CTX *frame = talloc_stackframe();
390
391	slprintf(key, sizeof(key), "%s%s", MEMBEROF_PREFIX,
392		 sid_to_fstring(tmp, member));
393
394	dbuf = dbwrap_fetch_bystring(db, frame, key);
395	if (dbuf.dptr == NULL) {
396		TALLOC_FREE(frame);
397		return NT_STATUS_OK;
398	}
399
400	p = (const char *)dbuf.dptr;
401
402	while (next_token_talloc(frame, &p, &string_sid, " ")) {
403		DOM_SID alias;
404
405		if (!string_to_sid(&alias, string_sid))
406			continue;
407
408		status= add_sid_to_array_unique(NULL, &alias, sids, num);
409		if (!NT_STATUS_IS_OK(status)) {
410			goto done;
411		}
412	}
413
414done:
415	TALLOC_FREE(frame);
416	return status;
417}
418
419static NTSTATUS alias_memberships(const DOM_SID *members, size_t num_members,
420				  DOM_SID **sids, size_t *num)
421{
422	size_t i;
423
424	*num = 0;
425	*sids = NULL;
426
427	for (i=0; i<num_members; i++) {
428		NTSTATUS status = one_alias_membership(&members[i], sids, num);
429		if (!NT_STATUS_IS_OK(status))
430			return status;
431	}
432	return NT_STATUS_OK;
433}
434
435static bool is_aliasmem(const DOM_SID *alias, const DOM_SID *member)
436{
437	DOM_SID *sids;
438	size_t i, num;
439
440	/* This feels the wrong way round, but the on-disk data structure
441	 * dictates it this way. */
442	if (!NT_STATUS_IS_OK(alias_memberships(member, 1, &sids, &num)))
443		return False;
444
445	for (i=0; i<num; i++) {
446		if (sid_compare(alias, &sids[i]) == 0) {
447			TALLOC_FREE(sids);
448			return True;
449		}
450	}
451	TALLOC_FREE(sids);
452	return False;
453}
454
455
456static NTSTATUS add_aliasmem(const DOM_SID *alias, const DOM_SID *member)
457{
458	GROUP_MAP map;
459	char *key;
460	fstring string_sid;
461	char *new_memberstring;
462	struct db_record *rec;
463	NTSTATUS status;
464
465	if (!get_group_map_from_sid(*alias, &map))
466		return NT_STATUS_NO_SUCH_ALIAS;
467
468	if ( (map.sid_name_use != SID_NAME_ALIAS) &&
469	     (map.sid_name_use != SID_NAME_WKN_GRP) )
470		return NT_STATUS_NO_SUCH_ALIAS;
471
472	if (is_aliasmem(alias, member))
473		return NT_STATUS_MEMBER_IN_ALIAS;
474
475	sid_to_fstring(string_sid, member);
476
477	key = talloc_asprintf(talloc_tos(), "%s%s", MEMBEROF_PREFIX,
478			      string_sid);
479	if (key == NULL) {
480		return NT_STATUS_NO_MEMORY;
481	}
482
483	if (db->transaction_start(db) != 0) {
484		DEBUG(0, ("transaction_start failed\n"));
485		return NT_STATUS_INTERNAL_DB_CORRUPTION;
486	}
487
488	rec = db->fetch_locked(db, key, string_term_tdb_data(key));
489
490	if (rec == NULL) {
491		DEBUG(10, ("fetch_lock failed\n"));
492		TALLOC_FREE(key);
493		status = NT_STATUS_INTERNAL_DB_CORRUPTION;
494		goto cancel;
495	}
496
497	sid_to_fstring(string_sid, alias);
498
499	if (rec->value.dptr != NULL) {
500		new_memberstring = talloc_asprintf(
501			key, "%s %s", (char *)(rec->value.dptr), string_sid);
502	} else {
503		new_memberstring = talloc_strdup(key, string_sid);
504	}
505
506	if (new_memberstring == NULL) {
507		TALLOC_FREE(key);
508		status = NT_STATUS_NO_MEMORY;
509		goto cancel;
510	}
511
512	status = rec->store(rec, string_term_tdb_data(new_memberstring), 0);
513
514	TALLOC_FREE(key);
515
516	if (!NT_STATUS_IS_OK(status)) {
517		DEBUG(10, ("Could not store record: %s\n", nt_errstr(status)));
518		goto cancel;
519	}
520
521	if (db->transaction_commit(db) != 0) {
522		DEBUG(0, ("transaction_commit failed\n"));
523		status = NT_STATUS_INTERNAL_DB_CORRUPTION;
524		return status;
525	}
526
527	return NT_STATUS_OK;
528
529 cancel:
530	if (db->transaction_cancel(db) != 0) {
531		smb_panic("transaction_cancel failed");
532	}
533
534	return status;
535}
536
537struct aliasmem_state {
538	TALLOC_CTX *mem_ctx;
539	const DOM_SID *alias;
540	DOM_SID **sids;
541	size_t *num;
542};
543
544static int collect_aliasmem(struct db_record *rec, void *priv)
545{
546	struct aliasmem_state *state = (struct aliasmem_state *)priv;
547	const char *p;
548	char *alias_string;
549	TALLOC_CTX *frame;
550
551	if (strncmp((const char *)rec->key.dptr, MEMBEROF_PREFIX,
552		    MEMBEROF_PREFIX_LEN) != 0)
553		return 0;
554
555	p = (const char *)rec->value.dptr;
556
557	frame = talloc_stackframe();
558
559	while (next_token_talloc(frame, &p, &alias_string, " ")) {
560		DOM_SID alias, member;
561		const char *member_string;
562
563		if (!string_to_sid(&alias, alias_string))
564			continue;
565
566		if (sid_compare(state->alias, &alias) != 0)
567			continue;
568
569		/* Ok, we found the alias we're looking for in the membership
570		 * list currently scanned. The key represents the alias
571		 * member. Add that. */
572
573		member_string = strchr((const char *)rec->key.dptr, '/');
574
575		/* Above we tested for MEMBEROF_PREFIX which includes the
576		 * slash. */
577
578		SMB_ASSERT(member_string != NULL);
579		member_string += 1;
580
581		if (!string_to_sid(&member, member_string))
582			continue;
583
584		if (!NT_STATUS_IS_OK(add_sid_to_array(state->mem_ctx, &member,
585						      state->sids,
586						      state->num)))
587		{
588			/* talloc fail. */
589			break;
590		}
591	}
592
593	TALLOC_FREE(frame);
594	return 0;
595}
596
597static NTSTATUS enum_aliasmem(const DOM_SID *alias, TALLOC_CTX *mem_ctx,
598			      DOM_SID **sids, size_t *num)
599{
600	GROUP_MAP map;
601	struct aliasmem_state state;
602
603	if (!get_group_map_from_sid(*alias, &map))
604		return NT_STATUS_NO_SUCH_ALIAS;
605
606	if ( (map.sid_name_use != SID_NAME_ALIAS) &&
607	     (map.sid_name_use != SID_NAME_WKN_GRP) )
608		return NT_STATUS_NO_SUCH_ALIAS;
609
610	*sids = NULL;
611	*num = 0;
612
613	state.alias = alias;
614	state.sids = sids;
615	state.num = num;
616	state.mem_ctx = mem_ctx;
617
618	db->traverse_read(db, collect_aliasmem, &state);
619	return NT_STATUS_OK;
620}
621
622static NTSTATUS del_aliasmem(const DOM_SID *alias, const DOM_SID *member)
623{
624	NTSTATUS status;
625	DOM_SID *sids;
626	size_t i, num;
627	bool found = False;
628	char *member_string;
629	char *key;
630	fstring sid_string;
631
632	if (db->transaction_start(db) != 0) {
633		DEBUG(0, ("transaction_start failed\n"));
634		return NT_STATUS_INTERNAL_DB_CORRUPTION;
635	}
636
637	status = alias_memberships(member, 1, &sids, &num);
638
639	if (!NT_STATUS_IS_OK(status)) {
640		goto cancel;
641	}
642
643	for (i=0; i<num; i++) {
644		if (sid_compare(&sids[i], alias) == 0) {
645			found = True;
646			break;
647		}
648	}
649
650	if (!found) {
651		TALLOC_FREE(sids);
652		status = NT_STATUS_MEMBER_NOT_IN_ALIAS;
653		goto cancel;
654	}
655
656	if (i < num)
657		sids[i] = sids[num-1];
658
659	num -= 1;
660
661	sid_to_fstring(sid_string, member);
662
663	key = talloc_asprintf(sids, "%s%s", MEMBEROF_PREFIX, sid_string);
664	if (key == NULL) {
665		TALLOC_FREE(sids);
666		status = NT_STATUS_NO_MEMORY;
667		goto cancel;
668	}
669
670	if (num == 0) {
671		status = dbwrap_delete_bystring(db, key);
672		goto commit;
673	}
674
675	member_string = talloc_strdup(sids, "");
676	if (member_string == NULL) {
677		TALLOC_FREE(sids);
678		status = NT_STATUS_NO_MEMORY;
679		goto cancel;
680	}
681
682	for (i=0; i<num; i++) {
683
684		sid_to_fstring(sid_string, &sids[i]);
685
686		member_string = talloc_asprintf_append_buffer(
687			member_string, " %s", sid_string);
688
689		if (member_string == NULL) {
690			TALLOC_FREE(sids);
691			status = NT_STATUS_NO_MEMORY;
692			goto cancel;
693		}
694	}
695
696	status = dbwrap_store_bystring(
697		db, key, string_term_tdb_data(member_string), 0);
698 commit:
699	TALLOC_FREE(sids);
700
701	if (!NT_STATUS_IS_OK(status)) {
702		DEBUG(10, ("dbwrap_store_bystring failed: %s\n",
703			   nt_errstr(status)));
704		goto cancel;
705	}
706
707	if (db->transaction_commit(db) != 0) {
708		DEBUG(0, ("transaction_commit failed\n"));
709		status = NT_STATUS_INTERNAL_DB_CORRUPTION;
710		return status;
711	}
712
713	return NT_STATUS_OK;
714
715 cancel:
716	if (db->transaction_cancel(db) != 0) {
717		smb_panic("transaction_cancel failed");
718	}
719	return status;
720}
721
722static const struct mapping_backend tdb_backend = {
723	.add_mapping_entry         = add_mapping_entry,
724	.get_group_map_from_sid    = get_group_map_from_sid,
725	.get_group_map_from_gid    = get_group_map_from_gid,
726	.get_group_map_from_ntname = get_group_map_from_ntname,
727	.group_map_remove          = group_map_remove,
728	.enum_group_mapping        = enum_group_mapping,
729	.one_alias_membership      = one_alias_membership,
730	.add_aliasmem              = add_aliasmem,
731	.del_aliasmem              = del_aliasmem,
732	.enum_aliasmem             = enum_aliasmem
733};
734
735/*
736  initialise the tdb mapping backend
737 */
738const struct mapping_backend *groupdb_tdb_init(void)
739{
740	if (!init_group_mapping()) {
741		DEBUG(0,("Failed to initialise tdb mapping backend\n"));
742		return NULL;
743	}
744
745	return &tdb_backend;
746}
747