summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSumit Bose <sbose@redhat.com>2012-06-21 12:54:34 +0200
committerSumit Bose <sbose@redhat.com>2012-06-26 09:03:21 +0200
commita9576c275b8477564b0f40861ed77801623757a4 (patch)
treebc25aa1f5673292550070038eb6b9e099e764d4f
parent16cc94c7c4bf757a322f6605da33230f34b7a41e (diff)
downloadfreeipa-a9576c275b8477564b0f40861ed77801623757a4.zip
freeipa-a9576c275b8477564b0f40861ed77801623757a4.tar.gz
freeipa-a9576c275b8477564b0f40861ed77801623757a4.tar.xz
Add sidgen postop and task
A postop plugin is added to create the SID for new created users and groups. A directory server task allows to set the SID for existing users and groups. Fixes https://fedorahosted.org/freeipa/ticket/2825
-rw-r--r--daemons/configure.ac1
-rw-r--r--daemons/ipa-slapi-plugins/Makefile.am1
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/Makefile.am60
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-conf.ldif16
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-conf.ldif20
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-example.ldif10
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.c244
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.h110
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_common.c568
-rw-r--r--daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_task.c348
-rw-r--r--freeipa.spec.in4
-rw-r--r--ipaserver/install/adtrustinstance.py8
12 files changed, 1390 insertions, 0 deletions
diff --git a/daemons/configure.ac b/daemons/configure.ac
index 8f02688..76ebaa6 100644
--- a/daemons/configure.ac
+++ b/daemons/configure.ac
@@ -341,6 +341,7 @@ AC_CONFIG_FILES([
ipa-slapi-plugins/ipa-version/Makefile
ipa-slapi-plugins/ipa-uuid/Makefile
ipa-slapi-plugins/ipa-modrdn/Makefile
+ ipa-slapi-plugins/ipa-sidgen/Makefile
])
AC_OUTPUT
diff --git a/daemons/ipa-slapi-plugins/Makefile.am b/daemons/ipa-slapi-plugins/Makefile.am
index 01b8bc3..5a3c9e7 100644
--- a/daemons/ipa-slapi-plugins/Makefile.am
+++ b/daemons/ipa-slapi-plugins/Makefile.am
@@ -10,6 +10,7 @@ SUBDIRS = \
ipa-uuid \
ipa-version \
ipa-winsync \
+ ipa-sidgen \
$(NULL)
EXTRA_DIST = \
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/Makefile.am b/daemons/ipa-slapi-plugins/ipa-sidgen/Makefile.am
new file mode 100644
index 0000000..0d8b74e
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/Makefile.am
@@ -0,0 +1,60 @@
+NULL =
+
+PLUGIN_COMMON_DIR=../common
+
+INCLUDES = \
+ -I. \
+ -I$(srcdir) \
+ -I$(PLUGIN_COMMON_DIR) \
+ -I/usr/include/dirsrv \
+ -DPREFIX=\""$(prefix)"\" \
+ -DBINDIR=\""$(bindir)"\" \
+ -DLIBDIR=\""$(libdir)"\" \
+ -DLIBEXECDIR=\""$(libexecdir)"\" \
+ -DDATADIR=\""$(datadir)"\" \
+ $(AM_CFLAGS) \
+ $(LDAP_CFLAGS) \
+ $(WARN_CFLAGS) \
+ $(NULL)
+
+plugindir = $(libdir)/dirsrv/plugins
+plugin_LTLIBRARIES = \
+ libipa_sidgen.la \
+ libipa_sidgen_task.la \
+ $(NULL)
+
+libipa_sidgen_la_SOURCES = \
+ ipa_sidgen.c \
+ ipa_sidgen_common.c \
+ $(NULL)
+
+libipa_sidgen_la_LDFLAGS = -avoid-version
+
+libipa_sidgen_la_LIBADD = \
+ $(LDAP_LIBS) \
+ $(NULL)
+
+libipa_sidgen_task_la_SOURCES = \
+ ipa_sidgen_task.c \
+ ipa_sidgen_common.c \
+ $(NULL)
+
+libipa_sidgen_task_la_LDFLAGS = -avoid-version
+
+libipa_sidgen_task_la_LIBADD = \
+ $(LDAP_LIBS) \
+ $(NULL)
+
+appdir = $(IPA_DATA_DIR)
+app_DATA = \
+ ipa-sidgen-conf.ldif \
+ ipa-sidgen-task-conf.ldif \
+ $(NULL)
+
+EXTRA_DIST = \
+ $(app_DATA) \
+ $(NULL)
+
+MAINTAINERCLEANFILES = \
+ *~ \
+ Makefile.in
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-conf.ldif b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-conf.ldif
new file mode 100644
index 0000000..6a8ed5f
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-conf.ldif
@@ -0,0 +1,16 @@
+dn: cn=IPA SIDGEN,cn=plugins,cn=config
+changetype: add
+objectclass: top
+objectclass: nsSlapdPlugin
+objectclass: extensibleObject
+cn: IPA SIDGEN
+nsslapd-pluginpath: libipa_sidgen
+nsslapd-plugininitfunc: ipa_sidgen_init
+nsslapd-plugintype: postoperation
+nsslapd-pluginenabled: on
+nsslapd-pluginid: ipa_sidgen_postop
+nsslapd-pluginversion: 1.0
+nsslapd-pluginvendor: Red Hat, Inc.
+nsslapd-plugindescription: IPA SIDGEN post operation
+nsslapd-plugin-depends-on-type: database
+nsslapd-basedn: $SUFFIX
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-conf.ldif b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-conf.ldif
new file mode 100644
index 0000000..c54989e
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-conf.ldif
@@ -0,0 +1,20 @@
+dn: cn=ipa-sidgen-task,cn=plugins,cn=config
+changetype: add
+objectClass: top
+objectClass: nsSlapdPlugin
+objectClass: extensibleObject
+cn: ipa-sidgen-task
+nsslapd-pluginPath: libipa_sidgen_task
+nsslapd-pluginInitfunc: sidgen_task_init
+nsslapd-pluginType: object
+nsslapd-pluginEnabled: on
+nsslapd-pluginId: ipa_sidgen_task
+nsslapd-pluginVersion: 1.0
+nsslapd-pluginVendor: RedHat
+nsslapd-pluginDescription: Generate SIDs for existing user and group entries
+
+dn: cn=ipa-sidgen-task,cn=tasks,cn=config
+changetype: add
+objectClass: top
+objectClass: extensibleObject
+cn: ipa-sidgen-task
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-example.ldif b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-example.ldif
new file mode 100644
index 0000000..9cfded7
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa-sidgen-task-example.ldif
@@ -0,0 +1,10 @@
+dn: cn=sidgen,cn=ipa-sidgen-task,cn=plugins,cn=config
+changetype: add
+objectClass: top
+objectClass: nsSlapdPlugin
+objectClass: extensibleObject
+cn: ipa-sidgen-task
+nsslapd-pluginPath: libipa_sidgen_task
+nsslapd-pluginInitfunc: sidgen_task_init
+nsslapd-basedn: $SUFFIX
+delay: 0
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.c b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.c
new file mode 100644
index 0000000..135c47a
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.c
@@ -0,0 +1,244 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ * Additional permission under GPLv3 section 7:
+ *
+ * In the following paragraph, "GPL" means the GNU General Public
+ * License, version 3 or any later version, and "Non-GPL Code" means
+ * code that is governed neither by the GPL nor a license
+ * compatible with the GPL.
+ *
+ * You may link the code of this Program with Non-GPL Code and convey
+ * linked combinations including the two, provided that such Non-GPL
+ * Code only links to the code of this Program through those well
+ * defined interfaces identified in the file named EXCEPTION found in
+ * the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline
+ * functions from the Approved Interfaces without causing the resulting
+ * work to be covered by the GPL. Only the copyright holders of this
+ * Program may make changes or additions to the list of Approved
+ * Interfaces.
+ *
+ * Authors:
+ * Sumit Bose <sbose@redhat.com>
+ *
+ * Copyright (C) 2012 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#include <stdlib.h>
+#include <errno.h>
+#include <stdbool.h>
+#include <dirsrv/slapi-plugin.h>
+
+#include "util.h"
+#include "ipa_sidgen.h"
+
+Slapi_PluginDesc ipa_sidgen_plugin_desc = {
+ IPA_SIDGEN_FEATURE_DESC,
+ "FreeIPA project",
+ "FreeIPA/1.0",
+ IPA_SIDGEN_PLUGIN_DESC
+};
+
+static int ipa_sidgen_start(Slapi_PBlock *pb)
+{
+ return 0;
+}
+
+static int ipa_sidgen_close(Slapi_PBlock *pb)
+{
+ int ret;
+ struct ipa_sidgen_ctx *ctx;
+
+ ret = slapi_pblock_get(pb, SLAPI_PLUGIN_PRIVATE, &ctx);
+ if (ret == 0) {
+ free_ranges(&ctx->ranges);
+ slapi_ch_free_string(&ctx->dom_sid);
+ } else {
+ LOG_FATAL("Missing private plugin context.\n");
+ }
+
+ return 0;
+}
+
+static int ipa_sidgen_add_post_op(Slapi_PBlock *pb)
+{
+ int ret;
+ int is_repl_op;
+ struct slapi_entry *entry = NULL;
+ const char *dn_str;
+ Slapi_DN *dn = NULL;
+ struct ipa_sidgen_ctx *ctx;
+ Slapi_PBlock *search_pb = NULL;
+ char *errmsg = NULL;
+
+ ret = slapi_pblock_get(pb, SLAPI_IS_REPLICATED_OPERATION, &is_repl_op);
+ if (ret != 0) {
+ LOG_FATAL("slapi_pblock_get failed!?\n");
+ return LDAP_OPERATIONS_ERROR;
+ }
+
+ if (is_repl_op) {
+ LOG("Is replicated operation, nothing to do.\n");
+ return LDAP_SUCCESS;
+ }
+
+ ret = slapi_pblock_get(pb, SLAPI_PLUGIN_PRIVATE, &ctx);
+ if (ret != 0) {
+ LOG_FATAL("Missing private plugin context.\n");
+ goto done;
+ }
+
+ if (ctx->dom_sid == NULL) {
+ ret = get_dom_sid(ctx->plugin_id, ctx->base_dn, &ctx->dom_sid);
+ if (ret != 0) {
+ LOG_FATAL("Domain SID not available, nothing to do.\n");
+ ret = 0;
+ goto done;
+ }
+ }
+
+ ret = slapi_pblock_get(pb, SLAPI_TARGET_DN, &dn_str);
+ if (ret != 0) {
+ LOG_FATAL("Missing target DN.\n");
+ goto done;
+ }
+
+ dn = slapi_sdn_new_dn_byref(dn_str);
+ if (dn == NULL) {
+ LOG_FATAL("Failed to convert target DN.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ ret = slapi_search_internal_get_entry(dn, NULL, &entry, ctx->plugin_id);
+ if (ret != 0 || entry == NULL) {
+ LOG_FATAL("Missing target entry.\n");
+ ret = LDAP_NO_SUCH_OBJECT;
+ goto done;
+ }
+
+ if (ctx->ranges == NULL) {
+ ret = get_ranges(ctx->plugin_id, ctx->base_dn, &ctx->ranges);
+ if (ret != 0) {
+ if (ret == LDAP_NO_SUCH_OBJECT) {
+ ret = 0;
+ LOG("No ID ranges found, nothing to do.\n");
+ } else {
+ LOG_FATAL("Failed to get ID ranges.\n");
+ }
+ goto done;
+ }
+ }
+
+ ret = find_sid_for_ldap_entry(entry, ctx->plugin_id, ctx->base_dn,
+ ctx->dom_sid, ctx->ranges);
+ if (ret != 0) {
+ LOG_FATAL("Cannot add SID to new entry.\n");
+ goto done;
+ }
+
+ ret = 0;
+done:
+ slapi_free_search_results_internal(search_pb);
+ slapi_pblock_destroy(search_pb);
+ slapi_sdn_free(&dn);
+
+ if (ret != 0) {
+ if (errmsg == NULL) {
+ errmsg = "SIDGEN error";
+ }
+ slapi_send_ldap_result(pb, ret, NULL, errmsg, 0, NULL);
+ }
+
+ return ret;
+}
+
+static int ipa_sidgen_init_ctx(Slapi_PBlock *pb, struct ipa_sidgen_ctx **_ctx)
+{
+ struct ipa_sidgen_ctx *ctx;
+ Slapi_Entry *entry;
+ int ret;
+
+ ctx = calloc(1, sizeof(struct ipa_sidgen_ctx));
+ if (ctx == NULL) {
+ return LDAP_OPERATIONS_ERROR;
+ }
+
+ ret = slapi_pblock_get(pb, SLAPI_PLUGIN_IDENTITY, &ctx->plugin_id);
+ if ((ret != 0) || (ctx->plugin_id == NULL)) {
+ LOG_FATAL("Could not get identity or identity was NULL\n");
+ if (ret == 0) {
+ ret = -1;
+ }
+ goto done;
+ }
+
+ slapi_pblock_get(pb, SLAPI_PLUGIN_CONFIG_ENTRY, &entry);
+ if (entry == NULL) {
+ LOG_FATAL("Plugin configuration not found!\n");
+ ret = EINVAL;
+ goto done;
+ }
+
+ ctx->base_dn = slapi_entry_attr_get_charptr(entry, "nsslapd-basedn");
+ if (ctx->base_dn == NULL) {
+ LOG_FATAL("Base DN not found in plugin configuration!\n");
+ ret = EINVAL;
+ goto done;
+ }
+
+ ret = 0;
+
+done:
+ if (ret != 0) {
+ free(ctx);
+ } else {
+ *_ctx = ctx;
+ }
+
+ return ret;
+}
+
+int ipa_sidgen_init(Slapi_PBlock *pb)
+{
+ int ret;
+ struct ipa_sidgen_ctx *ctx;
+
+ ret = ipa_sidgen_init_ctx(pb, &ctx);
+ if (ret != 0) {
+ LOG_FATAL("Failed ot initialize sidgen postop plugin.\n");
+ /* do not cause DS to stop, simply do nothing */
+ return 0;
+ }
+
+ ret = 0;
+ if (slapi_pblock_set(pb, SLAPI_PLUGIN_VERSION,
+ SLAPI_PLUGIN_VERSION_03) != 0 ||
+ slapi_pblock_set(pb, SLAPI_PLUGIN_START_FN,
+ (void *) ipa_sidgen_start) != 0 ||
+ slapi_pblock_set(pb, SLAPI_PLUGIN_CLOSE_FN,
+ (void *) ipa_sidgen_close) != 0 ||
+ slapi_pblock_set(pb, SLAPI_PLUGIN_DESCRIPTION,
+ (void *) &ipa_sidgen_plugin_desc) != 0 ||
+ slapi_pblock_set(pb, SLAPI_PLUGIN_POST_ADD_FN,
+ (void *) ipa_sidgen_add_post_op) != 0 ||
+ slapi_pblock_set(pb, SLAPI_PLUGIN_PRIVATE, ctx) != 0) {
+ LOG_FATAL("failed to register plugin\n");
+ ret = EFAIL;
+ }
+
+ return ret;
+}
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.h b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.h
new file mode 100644
index 0000000..2c48843
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen.h
@@ -0,0 +1,110 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ * Additional permission under GPLv3 section 7:
+ *
+ * In the following paragraph, "GPL" means the GNU General Public
+ * License, version 3 or any later version, and "Non-GPL Code" means
+ * code that is governed neither by the GPL nor a license
+ * compatible with the GPL.
+ *
+ * You may link the code of this Program with Non-GPL Code and convey
+ * linked combinations including the two, provided that such Non-GPL
+ * Code only links to the code of this Program through those well
+ * defined interfaces identified in the file named EXCEPTION found in
+ * the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline
+ * functions from the Approved Interfaces without causing the resulting
+ * work to be covered by the GPL. Only the copyright holders of this
+ * Program may make changes or additions to the list of Approved
+ * Interfaces.
+ *
+ * Authors:
+ * Sumit Bose <sbose@redhat.com>
+ *
+ * Copyright (C) 2012 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#ifndef _IPA_SIDGEN_H_
+#define _IPA_SIDGEN_H_
+
+#define OBJECTCLASS "objectclass"
+#define IPA_OBJECT "ipaobject"
+#define MEP_MANAGED_ENTRY "mepManagedEntry"
+#define UID_NUMBER "uidNumber"
+#define GID_NUMBER "gidNumber"
+#define IPA_SID "ipaNTSecurityIdentifier"
+#define DOM_ATTRS_FILTER OBJECTCLASS"=ipaNTDomainAttrs"
+#define DOMAIN_ID_RANGE_FILTER OBJECTCLASS"=ipaDomainIDRange"
+#define POSIX_ACCOUNT "posixAccount"
+#define POSIX_GROUP "posixGroup"
+#define IPA_ID_OBJECT "ipaIDObject"
+#define IPANT_USER_ATTRS "ipaNTUserAttrs"
+#define IPANT_GROUP_ATTRS "ipaNTGroupAttrs"
+
+#define IPA_DNA_MAGIC 999
+
+#define IPA_PLUGIN_NAME "ipa-sidgen-postop"
+#define IPA_SIDGEN_FEATURE_DESC "IPA SIDGEN postop plugin"
+#define IPA_SIDGEN_PLUGIN_DESC "Add a SID to newly added or modified " \
+ "objects with uid pr gid numbers"
+
+#define IPA_BASE_ID "ipaBaseID"
+#define IPA_ID_RANGE_SIZE "ipaIDRangeSize"
+#define IPA_BASE_RID "ipaBaseRID"
+#define IPA_SECONDARY_BASE_RID "ipaSecondaryBaseRID"
+
+struct range_info {
+ uint32_t base_id;
+ uint32_t id_range_size;
+ uint32_t base_rid;
+ uint32_t secondary_base_rid;
+};
+
+struct ipa_sidgen_ctx {
+ Slapi_ComponentId *plugin_id;
+ const char *base_dn;
+ char *dom_sid;
+ struct range_info **ranges;
+};
+
+void set_plugin_id_for_sidgen_task(Slapi_ComponentId *plugin_id);
+
+int sidgen_task_add(Slapi_PBlock *pb, Slapi_Entry *e,
+ Slapi_Entry *eAfter, int *returncode,
+ char *returntext, void *arg);
+
+int get_dom_sid(Slapi_ComponentId *plugin_id, const char *base_dn, char **_sid);
+
+int get_objectclass_flags(char **objectclasses,
+ bool *has_posix_account,
+ bool *has_posix_group,
+ bool *has_ipa_id_object);
+
+void free_ranges(struct range_info ***_ranges);
+
+int get_ranges(Slapi_ComponentId *plugin_id, const char *base_dn,
+ struct range_info ***_ranges);
+
+int find_sid_for_id(uint32_t id, Slapi_ComponentId *plugin_id,
+ const char *base_dn, const char *dom_sid,
+ struct range_info **ranges, char **_sid);
+
+int find_sid_for_ldap_entry(struct slapi_entry *entry,
+ Slapi_ComponentId *plugin_id,
+ const char *base_dn,
+ const char *dom_sid,
+ struct range_info **ranges);
+#endif /* _IPA_SIDGEN_H_ */
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_common.c b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_common.c
new file mode 100644
index 0000000..cbbb2ef
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_common.c
@@ -0,0 +1,568 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ * Additional permission under GPLv3 section 7:
+ *
+ * In the following paragraph, "GPL" means the GNU General Public
+ * License, version 3 or any later version, and "Non-GPL Code" means
+ * code that is governed neither by the GPL nor a license
+ * compatible with the GPL.
+ *
+ * You may link the code of this Program with Non-GPL Code and convey
+ * linked combinations including the two, provided that such Non-GPL
+ * Code only links to the code of this Program through those well
+ * defined interfaces identified in the file named EXCEPTION found in
+ * the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline
+ * functions from the Approved Interfaces without causing the resulting
+ * work to be covered by the GPL. Only the copyright holders of this
+ * Program may make changes or additions to the list of Approved
+ * Interfaces.
+ *
+ * Authors:
+ * Sumit Bose <sbose@redhat.com>
+ *
+ * Copyright (C) 2012 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#include <stdlib.h>
+#include <errno.h>
+#include <stdbool.h>
+#include <dirsrv/slapi-plugin.h>
+
+#include "util.h"
+#include "ipa_sidgen.h"
+
+int get_dom_sid(Slapi_ComponentId *plugin_id, const char *base_dn, char **_sid)
+{
+ Slapi_PBlock *search_pb = NULL;
+ int search_result;
+ Slapi_Entry **search_entries = NULL;
+ int ret;
+ const char *sid;
+
+ search_pb = slapi_pblock_new();
+ if (search_pb == NULL) {
+ LOG_FATAL("Failed to create new pblock.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ slapi_search_internal_set_pb(search_pb, base_dn,
+ LDAP_SCOPE_SUBTREE, DOM_ATTRS_FILTER,
+ NULL, 0, NULL, NULL, plugin_id, 0);
+
+ ret = slapi_search_internal_pb(search_pb);
+ if (ret != 0) {
+ LOG_FATAL("Starting internal search failed.\n");
+ goto done;
+ }
+
+ ret = slapi_pblock_get(search_pb, SLAPI_PLUGIN_INTOP_RESULT, &search_result);
+ if (ret != 0 || search_result != LDAP_SUCCESS) {
+ LOG_FATAL("Internal search failed.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ ret = slapi_pblock_get(search_pb, SLAPI_PLUGIN_INTOP_SEARCH_ENTRIES,
+ &search_entries);
+ if (ret != 0) {
+ LOG_FATAL("Failed to read searched entries.\n");
+ goto done;
+ }
+
+ if (search_entries == NULL || search_entries[0] == NULL) {
+ LOG("No existing entries.\n");
+ ret = LDAP_NO_SUCH_OBJECT;
+ goto done;
+ }
+
+ if (search_entries[1] != NULL) {
+ LOG("Too many results found.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ sid = slapi_entry_attr_get_charptr(search_entries[0], IPA_SID);
+ if (sid == NULL) {
+ LOG("Domain object does not have a SID.\n");
+ ret = LDAP_NO_SUCH_ATTRIBUTE;
+ goto done;
+ }
+
+ *_sid = slapi_ch_strdup(sid);
+ if (*_sid == NULL) {
+ LOG("slapi_ch_strdup failed.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ LOG("Found domain SID [%s].\n", *_sid);
+ ret = 0;
+
+done:
+ slapi_free_search_results_internal(search_pb);
+ slapi_pblock_destroy(search_pb);
+
+ return ret;
+}
+
+static int slapi_entry_to_range_info(struct slapi_entry *entry,
+ struct range_info **_range)
+{
+ int ret;
+ unsigned long ul_val;
+ struct range_info *range = NULL;
+
+ range = ( struct range_info *) slapi_ch_calloc(1, sizeof(struct range_info));
+ if (range == NULL) {
+ return LDAP_OPERATIONS_ERROR;
+ }
+
+ ul_val = slapi_entry_attr_get_ulong(entry, IPA_BASE_ID);
+ if (ul_val == 0 || ul_val >= UINT32_MAX) {
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+ range->base_id = ul_val;
+
+ ul_val = slapi_entry_attr_get_ulong(entry, IPA_ID_RANGE_SIZE);
+ if (ul_val == 0 || ul_val >= UINT32_MAX) {
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+ range->id_range_size = ul_val;
+
+ ul_val = slapi_entry_attr_get_ulong(entry, IPA_BASE_RID);
+ if (ul_val == 0 || ul_val >= UINT32_MAX) {
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+ range->base_rid = ul_val;
+
+ ul_val = slapi_entry_attr_get_ulong(entry, IPA_SECONDARY_BASE_RID);
+ if (ul_val == 0 || ul_val >= UINT32_MAX) {
+ ret = ERANGE;
+ goto done;
+ }
+ range->secondary_base_rid = ul_val;
+
+ *_range = range;
+ ret = 0;
+
+done:
+ if (ret != 0) {
+ slapi_ch_free((void **) &range);
+ }
+
+ return ret;
+}
+
+int get_objectclass_flags(char **objectclasses,
+ bool *has_posix_account,
+ bool *has_posix_group,
+ bool *has_ipa_id_object)
+{
+ size_t c;
+
+ if (objectclasses == NULL) {
+ return LDAP_OPERATIONS_ERROR;
+ }
+
+ *has_posix_account = false;
+ *has_posix_group = false;
+ *has_ipa_id_object = false;
+
+ for (c = 0; objectclasses[c] != NULL; c++) {
+ if (strcasecmp(objectclasses[c], POSIX_ACCOUNT) == 0) {
+ *has_posix_account = true;
+ } else if (strcasecmp(objectclasses[c], POSIX_GROUP) == 0) {
+ *has_posix_group = true;
+ } else if (strcasecmp(objectclasses[c], IPA_ID_OBJECT) == 0) {
+ *has_ipa_id_object = true;
+ }
+ }
+
+ return 0;
+}
+
+void free_ranges(struct range_info ***_ranges)
+{
+ size_t c;
+ struct range_info **ranges = *_ranges;
+
+ if (ranges != NULL) {
+ for (c = 0; ranges[c] != NULL; c++) {
+ slapi_ch_free((void **) &ranges[c]);
+ }
+
+ slapi_ch_free((void **) _ranges);
+ }
+}
+
+int get_ranges(Slapi_ComponentId *plugin_id, const char *base_dn,
+ struct range_info ***_ranges)
+{
+ Slapi_PBlock *search_pb = NULL;
+ Slapi_Entry **search_entries = NULL;
+ int search_result;
+ size_t c;
+ int ret;
+ struct range_info **ranges = NULL;
+
+ search_pb = slapi_pblock_new();
+ if (search_pb == NULL) {
+ LOG_FATAL("Failed to create new pblock.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ slapi_search_internal_set_pb(search_pb, base_dn,
+ LDAP_SCOPE_SUBTREE, DOMAIN_ID_RANGE_FILTER,
+ NULL, 0, NULL, NULL, plugin_id, 0);
+
+ ret = slapi_search_internal_pb(search_pb);
+ if (ret != 0) {
+ LOG_FATAL("Starting internal search failed.\n");
+ goto done;
+ }
+
+ ret = slapi_pblock_get(search_pb, SLAPI_PLUGIN_INTOP_RESULT, &search_result);
+ if (ret != 0 || search_result != LDAP_SUCCESS) {
+ LOG_FATAL("Internal search failed.\n");
+ ret = (search_result != LDAP_SUCCESS) ? search_result:
+ LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ ret = slapi_pblock_get(search_pb, SLAPI_PLUGIN_INTOP_SEARCH_ENTRIES,
+ &search_entries);
+ if (ret != 0) {
+ LOG_FATAL("Failed to read searched entries.\n");
+ goto done;
+ }
+
+ if (search_entries == NULL || search_entries[0] == NULL) {
+ LOG("No ranges found.\n");
+ ret = LDAP_NO_SUCH_OBJECT;
+ goto done;
+ }
+
+ for (c = 0; search_entries[c] != NULL; c++);
+ ranges = (struct range_info **) slapi_ch_calloc(c + 1,
+ sizeof(struct range_info *));
+ if (ranges == NULL) {
+ LOG("calloc failed.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ for (c = 0; search_entries[c] != NULL; c++) {
+ ret = slapi_entry_to_range_info(search_entries[c], &ranges[c]);
+ if (ret != 0) {
+ LOG_FATAL("Failed to convert LDAP entry to range struct.\n");
+ goto done;
+ }
+ }
+
+ *_ranges = ranges;
+ ret = 0;
+
+done:
+ slapi_free_search_results_internal(search_pb);
+ slapi_pblock_destroy(search_pb);
+ if (ret != 0) {
+ free_ranges(&ranges);
+ }
+
+ return ret;
+}
+
+static int find_sid(const char *sid, Slapi_ComponentId *plugin_id,
+ const char *base_dn)
+{
+ Slapi_PBlock *search_pb = NULL;
+ Slapi_Entry **search_entries = NULL;
+ int search_result;
+ int ret;
+ char *filter = NULL;
+
+ search_pb = slapi_pblock_new();
+ if (search_pb == NULL) {
+ LOG_FATAL("Failed to create new pblock.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ filter = slapi_ch_smprintf("%s=%s", IPA_SID, sid);
+ if (filter == NULL) {
+ LOG_FATAL("Cannot create search filter to check if SID is used.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ slapi_search_internal_set_pb(search_pb, base_dn,
+ LDAP_SCOPE_SUBTREE, filter,
+ NULL, 0, NULL, NULL, plugin_id, 0);
+
+ ret = slapi_search_internal_pb(search_pb);
+ if (ret != 0) {
+ LOG_FATAL("Starting internal search failed.\n");
+ goto done;
+ }
+
+ ret = slapi_pblock_get(search_pb, SLAPI_PLUGIN_INTOP_RESULT, &search_result);
+ if (ret != 0 || search_result != LDAP_SUCCESS) {
+ LOG_FATAL("Internal search failed.\n");
+ ret = (search_result != LDAP_SUCCESS) ? search_result:
+ LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ ret = slapi_pblock_get(search_pb, SLAPI_PLUGIN_INTOP_SEARCH_ENTRIES,
+ &search_entries);
+ if (ret != 0) {
+ LOG_FATAL("Failed to read searched entries.\n");
+ goto done;
+ }
+
+ if (search_entries == NULL || search_entries[0] == NULL) {
+ LOG("No SID found.\n");
+ ret = LDAP_NO_SUCH_OBJECT;
+ goto done;
+ }
+
+ ret = 0;
+
+done:
+ slapi_ch_free_string(&filter);
+ slapi_free_search_results_internal(search_pb);
+ slapi_pblock_destroy(search_pb);
+
+ return ret;
+}
+
+static int rid_to_sid_with_check(uint32_t rid, Slapi_ComponentId *plugin_id,
+ const char *base_dn, const char *dom_sid,
+ char **_sid)
+{
+ char *sid = NULL;
+ int ret;
+
+ sid = slapi_ch_smprintf("%s-%lu", dom_sid, (unsigned long) rid);
+ if (sid == NULL) {
+ LOG("Failed to create SID string.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ LOG("SID is [%s].\n", sid);
+
+ ret = find_sid(sid, plugin_id, base_dn);
+ if (ret == LDAP_NO_SUCH_OBJECT) {
+ *_sid = sid;
+ ret = 0;
+ goto done;
+ } else if (ret != 0) {
+ LOG_FATAL("Cannot check if SID is already used.\n");
+ goto done;
+ }
+
+ LOG_FATAL("SID [%s] is already used.\n", sid);
+ ret = LDAP_CONSTRAINT_VIOLATION;
+
+done:
+ if (ret != 0) {
+ slapi_ch_free_string(&sid);
+ }
+
+ return ret;
+}
+
+int find_sid_for_id(uint32_t id, Slapi_ComponentId *plugin_id,
+ const char *base_dn, const char *dom_sid,
+ struct range_info **ranges, char **_sid)
+{
+ uint32_t rid;
+ size_t c;
+ char *sid = NULL;
+ int ret;
+
+ rid = 0;
+ for (c = 0; ranges[c] != NULL; c++) {
+ if (id >= ranges[c]->base_id &&
+ id < (ranges[c]->base_id + ranges[c]->id_range_size)) {
+ rid = ranges[c]->base_rid + (id - ranges[c]->base_id);
+ break;
+ }
+ }
+
+ if (rid == 0) {
+ LOG("No matching range found. Cannot add SID.\n");
+ ret = LDAP_NO_SUCH_OBJECT;
+ goto done;
+ }
+
+ ret = rid_to_sid_with_check(rid, plugin_id, base_dn, dom_sid, &sid);
+ if (ret != LDAP_CONSTRAINT_VIOLATION) {
+ goto done;
+ }
+
+ /* SID is already used, try secondary range.*/
+ rid = ranges[c]->secondary_base_rid + (id - ranges[c]->base_id);
+
+ ret = rid_to_sid_with_check(rid, plugin_id, base_dn, dom_sid, &sid);
+ if (ret != LDAP_CONSTRAINT_VIOLATION) {
+ goto done;
+ }
+
+ LOG_FATAL("Secondary SID is used as well.\n");
+
+done:
+ if (ret != 0) {
+ slapi_ch_free_string(&sid);
+ } else {
+ *_sid = sid;
+ }
+
+ return ret;
+}
+
+int find_sid_for_ldap_entry(struct slapi_entry *entry,
+ Slapi_ComponentId *plugin_id,
+ const char *base_dn,
+ const char *dom_sid,
+ struct range_info **ranges)
+{
+ int ret;
+ const char *dn_str;
+ uint32_t uid_number;
+ uint32_t gid_number;
+ uint32_t id;
+ char *sid = NULL;
+ char **objectclasses = NULL;
+ Slapi_PBlock *mod_pb = NULL;
+ Slapi_Mods *smods = NULL;
+ int result;
+ bool has_posix_account = false;
+ bool has_posix_group = false;
+ bool has_ipa_id_object = false;
+ const char *objectclass_to_add = NULL;
+
+ dn_str = slapi_entry_get_dn_const(entry);
+ if (dn_str == NULL) {
+ LOG_FATAL("Cannot find DN of an LDAP entry.\n");
+ ret = LDAP_NO_SUCH_ATTRIBUTE;
+ goto done;
+ }
+ LOG("Trying to add SID for [%s].\n", dn_str);
+
+ uid_number = slapi_entry_attr_get_ulong(entry, UID_NUMBER);
+ gid_number = slapi_entry_attr_get_ulong(entry, GID_NUMBER);
+
+ if (uid_number == 0 && gid_number == 0) {
+ LOG("[%s] does not have Posix IDs, nothing to do.\n", dn_str);
+ ret = 0;
+ goto done;
+ }
+
+ if (uid_number == IPA_DNA_MAGIC || gid_number == IPA_DNA_MAGIC) {
+ LOG_FATAL("Looks that DNA plugin was not run before.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ if (uid_number >= UINT32_MAX || gid_number >= UINT32_MAX) {
+ LOG_FATAL("ID value too large.\n");
+ ret = LDAP_CONSTRAINT_VIOLATION;
+ goto done;
+ }
+
+ sid = slapi_entry_attr_get_charptr(entry, IPA_SID);
+ if (sid != NULL) {
+ LOG("Object already has a SID, nothing to do.\n");
+ ret = 0;
+ goto done;
+ }
+
+ objectclasses = slapi_entry_attr_get_charray(entry, OBJECTCLASS);
+ ret = get_objectclass_flags(objectclasses, &has_posix_account,
+ &has_posix_group,
+ &has_ipa_id_object);
+ if (ret != 0) {
+ LOG_FATAL("Cannot determine objectclasses.\n");
+ goto done;
+ }
+
+ if (has_posix_account && uid_number != 0 && gid_number != 0) {
+ id = uid_number;
+ objectclass_to_add = IPANT_USER_ATTRS;
+ } else if (has_posix_group && gid_number != 0) {
+ id = gid_number;
+ objectclass_to_add = IPANT_GROUP_ATTRS;
+ } else if (has_ipa_id_object) {
+ id = (uid_number != 0) ? uid_number : gid_number;
+ objectclass_to_add = NULL;
+ } else {
+ LOG_FATAL("Inconsistent objectclasses and attributes, nothing to do.\n");
+ ret = 0;
+ goto done;
+ }
+
+ ret = find_sid_for_id(id, plugin_id, base_dn, dom_sid, ranges, &sid);
+ if (ret != 0) {
+ LOG_FATAL("Cannot convert Posix ID [%ul] into an unused SID.\n", id);
+ goto done;
+ }
+
+ smods = slapi_mods_new();
+ if (smods == NULL) {
+ LOG("slapi_mods_new failed.\n");
+ ret = LDAP_OPERATIONS_ERROR;
+ goto done;
+ }
+
+ if (objectclass_to_add != NULL) {
+ slapi_mods_add_string(smods, LDAP_MOD_ADD,
+ OBJECTCLASS, objectclass_to_add);
+ }
+ slapi_mods_add_string(smods, LDAP_MOD_REPLACE, IPA_SID, sid);
+
+ mod_pb = slapi_pblock_new();
+ slapi_modify_internal_set_pb(mod_pb, dn_str,
+ slapi_mods_get_ldapmods_byref(smods),
+ NULL, NULL, plugin_id, 0);
+
+ ret = slapi_modify_internal_pb(mod_pb);
+ if (ret != 0) {
+ LOG_FATAL("Modify failed with [%d] on entry [%s]\n", ret, dn_str);
+ goto done;
+ }
+
+ ret = slapi_pblock_get(mod_pb, SLAPI_PLUGIN_INTOP_RESULT, &result);
+ if (ret != 0 || result != LDAP_SUCCESS){
+ LOG_FATAL("Modify failed on entry [%s]\n", dn_str);
+ goto done;
+ }
+
+done:
+ slapi_ch_free_string(&sid);
+ slapi_pblock_destroy(mod_pb);
+ slapi_mods_free(&smods);
+ slapi_ch_array_free(objectclasses);
+
+ return ret;
+}
diff --git a/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_task.c b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_task.c
new file mode 100644
index 0000000..ffbc9c6
--- /dev/null
+++ b/daemons/ipa-slapi-plugins/ipa-sidgen/ipa_sidgen_task.c
@@ -0,0 +1,348 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ *
+ * Additional permission under GPLv3 section 7:
+ *
+ * In the following paragraph, "GPL" means the GNU General Public
+ * License, version 3 or any later version, and "Non-GPL Code" means
+ * code that is governed neither by the GPL nor a license
+ * compatible with the GPL.
+ *
+ * You may link the code of this Program with Non-GPL Code and convey
+ * linked combinations including the two, provided that such Non-GPL
+ * Code only links to the code of this Program through those well
+ * defined interfaces identified in the file named EXCEPTION found in
+ * the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline
+ * functions from the Approved Interfaces without causing the resulting
+ * work to be covered by the GPL. Only the copyright holders of this
+ * Program may make changes or additions to the list of Approved
+ * Interfaces.
+ *
+ * Authors:
+ * Sumit Bose <sbose@redhat.com>
+ *
+ * Copyright (C) 2012 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#include <errno.h>
+#include <stdlib.h>
+#include <stdbool.h>
+
+#include <pthread.h>
+#include <dirsrv/slapi-plugin.h>
+
+#include "util.h"
+#include "ipa_sidgen.h"
+
+#define NSEC_PER_SEC 1000000000UL
+
+
+#define AT_CN "cn"
+
+Slapi_ComponentId *global_sidgen_plugin_id = NULL;
+
+struct worker_ctx {
+ long delay;
+ char *base_dn;
+ Slapi_ComponentId *plugin_id;
+ pthread_t tid;
+ char *dom_sid;
+ struct range_info **ranges;
+};
+
+static const char *fetch_attr(Slapi_Entry *e, const char *attrname,
+ const char *default_val)
+{
+ Slapi_Attr *attr;
+ Slapi_Value *val = NULL;
+
+ if (slapi_entry_attr_find(e, attrname, &attr) != 0)
+ return default_val;
+ slapi_attr_first_value(attr, &val);
+ return slapi_value_get_string(val);
+}
+
+static void free_pblock(void *arg)
+{
+ Slapi_PBlock *pb = (Slapi_PBlock *) arg;
+
+ slapi_free_search_results_internal(pb);
+ slapi_pblock_destroy(pb);
+}
+
+static int do_work(struct worker_ctx *worker_ctx)
+{
+ Slapi_PBlock *pb;
+ int ret;
+ size_t c;
+ char *filter = NULL;
+ char *attrs[] = { OBJECTCLASS, UID_NUMBER, GID_NUMBER, NULL };
+ Slapi_Entry **e = NULL;
+ struct timespec ts;
+
+ pb = slapi_pblock_new();
+ if (pb == NULL) {
+ return ENOMEM;
+ }
+
+ pthread_cleanup_push(free_pblock, (void *) pb);
+
+ filter = slapi_ch_smprintf("(&(%s=%s)(!(%s=%s))(|(%s=%s)(%s=%s)(%s=%s))(!(%s=*)))",
+ OBJECTCLASS, IPA_OBJECT,
+ OBJECTCLASS, MEP_MANAGED_ENTRY,
+ OBJECTCLASS, POSIX_ACCOUNT,
+ OBJECTCLASS, POSIX_GROUP,
+ OBJECTCLASS, IPA_ID_OBJECT,
+ IPA_SID);
+ if (filter == NULL) {
+ LOG_FATAL("Cannot generate search filter for objects without a SID.\n");
+ ret = ENOMEM;
+ goto done;
+ }
+ LOG("Base DN: [%s], Filter: [%s].\n", worker_ctx->base_dn, filter);
+
+ slapi_search_internal_set_pb(pb, worker_ctx->base_dn, LDAP_SCOPE_SUBTREE,
+ filter, attrs, 0, NULL, NULL,
+ worker_ctx->plugin_id, 0);
+ ret = slapi_search_internal_pb(pb);
+ if (ret != 0) {
+ slapi_pblock_get(pb, SLAPI_PLUGIN_INTOP_RESULT, &ret);
+ if (ret != 0) {
+ LOG_FATAL("Search failed with [%d].\n", ret);
+ } else {
+ LOG_FATAL("slapi_search_internal_pb failed, "
+ "but no error code available.\n");
+ ret = EFAULT;
+ }
+ goto done;
+ }
+
+ ret = slapi_pblock_get(pb, SLAPI_PLUGIN_INTOP_SEARCH_ENTRIES, &e);
+ if (ret != 0) {
+ LOG_FATAL("slapi_pblock_get failed.\n");
+ ret = EFAULT;
+ goto done;
+ }
+
+ if (e == NULL || e[0] == NULL) {
+ LOG("No entry with missing SID found.\n");
+ ret = 0;
+ goto done;
+ }
+
+ for (c = 0; e[c] != NULL; c++) {
+ ret = find_sid_for_ldap_entry(e[c], worker_ctx->plugin_id,
+ worker_ctx->base_dn, worker_ctx->dom_sid,
+ worker_ctx->ranges);
+ if (ret != 0) {
+ LOG_FATAL("Cannot add SID to existing entry.\n");
+ goto done;
+ }
+
+ if (worker_ctx->delay != 0) {
+ ts.tv_nsec = worker_ctx->delay % NSEC_PER_SEC;
+ ts.tv_sec = (worker_ctx->delay - ts.tv_nsec) / NSEC_PER_SEC;
+ nanosleep(&ts, NULL);
+ }
+ };
+
+done:
+ slapi_ch_free_string(&filter);
+ pthread_cleanup_pop(1);
+
+ LOG("do_work finished with [%d].\n", ret);
+
+ return ret;
+}
+
+static void *sidgen_task_thread(void *arg)
+{
+ Slapi_Task *task = (Slapi_Task *)arg;
+ struct worker_ctx *worker_ctx;
+ int ret;
+
+ if (task == NULL) {
+ LOG_FATAL("Missing task data!\n");
+ ret =SLAPI_DSE_CALLBACK_OK;
+ goto done;
+ }
+
+ worker_ctx = slapi_task_get_data(task);
+ if (worker_ctx == NULL) {
+ LOG_FATAL("Missing context!\n");
+ ret =SLAPI_DSE_CALLBACK_OK;
+ goto done;
+ }
+
+ slapi_task_begin(task, 1);
+ LOG_FATAL("Sidgen task starts ...\n");
+
+ ret = do_work(worker_ctx);
+
+done:
+ LOG_FATAL("Sidgen task finished [%d].\n", ret);
+ slapi_task_inc_progress(task);
+ slapi_task_finish(task, ret);
+
+ return NULL;
+}
+
+static void sidgen_task_destructor(Slapi_Task *task)
+{
+ struct worker_ctx *worker_ctx;
+
+ if (task != NULL) {
+ worker_ctx = slapi_task_get_data(task);
+ if (worker_ctx != NULL) {
+ free_ranges(&worker_ctx->ranges);
+ slapi_ch_free_string(&worker_ctx->dom_sid);
+ slapi_ch_free_string(&worker_ctx->base_dn);
+ slapi_ch_free((void **) &worker_ctx);
+ }
+ }
+}
+
+int sidgen_task_add(Slapi_PBlock *pb, Slapi_Entry *e,
+ Slapi_Entry *eAfter, int *returncode,
+ char *returntext, void *arg)
+{
+ int ret = SLAPI_DSE_CALLBACK_ERROR;
+ const char *str;
+ struct worker_ctx *worker_ctx = NULL;
+ char *endptr;
+ Slapi_Task *task = NULL;
+
+ *returncode = LDAP_OPERATIONS_ERROR;
+ returntext[0] = '\0';
+
+ worker_ctx = (struct worker_ctx *) slapi_ch_calloc(1,
+ sizeof(struct worker_ctx));
+ if (worker_ctx == NULL) {
+ LOG_FATAL("slapi_ch_malloc failed!\n");
+ *returncode = LDAP_OPERATIONS_ERROR;
+ ret = SLAPI_DSE_CALLBACK_ERROR;
+ goto done;
+ }
+
+ worker_ctx->plugin_id = global_sidgen_plugin_id;
+
+ str = fetch_attr(e, "delay", NULL);
+ if (str != NULL) {
+ errno = 0;
+ worker_ctx->delay = strtol(str, &endptr, 10);
+ if (errno != 0 || worker_ctx->delay < 0) {
+ LOG_FATAL("invalid delay [%s]!\n", str);
+ *returncode = LDAP_CONSTRAINT_VIOLATION;
+ ret = SLAPI_DSE_CALLBACK_ERROR;
+ goto done;
+ }
+ }
+ LOG("delay is [%li].\n", worker_ctx->delay);
+
+ str = fetch_attr(e, "nsslapd-basedn", NULL);
+ if (str == NULL) {
+ LOG_FATAL("Missing nsslapd-basedn!\n");
+ *returncode = LDAP_CONSTRAINT_VIOLATION;
+ ret = SLAPI_DSE_CALLBACK_ERROR;
+ goto done;
+ }
+ worker_ctx->base_dn = slapi_ch_strdup(str);
+ if (worker_ctx->base_dn == NULL) {
+ LOG_FATAL("Failed to copy base DN.\n");
+ *returncode = LDAP_OPERATIONS_ERROR;
+ ret = ENOMEM;
+ goto done;
+ }
+
+ ret = get_dom_sid(worker_ctx->plugin_id, worker_ctx->base_dn,
+ &worker_ctx->dom_sid);
+ if (ret != 0) {
+ LOG_FATAL("Cannot find domain SID.\n");
+ goto done;
+ }
+
+ ret = get_ranges(worker_ctx->plugin_id, worker_ctx->base_dn,
+ &worker_ctx->ranges);
+ if (ret != 0) {
+ LOG_FATAL("Cannot find ranges.\n");
+ goto done;
+ }
+
+ task = slapi_new_task(slapi_entry_get_ndn(e));
+ if (task == NULL) {
+ LOG_FATAL("unable to allocate new task!\n");
+ *returncode = LDAP_OPERATIONS_ERROR;
+ ret = SLAPI_DSE_CALLBACK_ERROR;
+ goto done;
+ }
+
+ slapi_task_set_destructor_fn(task, sidgen_task_destructor);
+ slapi_task_set_data(task, worker_ctx);
+
+ ret = pthread_create(&worker_ctx->tid, NULL, sidgen_task_thread, task);
+ if (ret != 0) {
+ LOG_FATAL("unable to create sidgen task thread!\n");
+ *returncode = LDAP_OPERATIONS_ERROR;
+ ret = SLAPI_DSE_CALLBACK_ERROR;
+ slapi_task_finish(task, *returncode);
+ goto done;
+ }
+
+ ret = SLAPI_DSE_CALLBACK_OK;
+ *returncode = LDAP_SUCCESS;
+
+done:
+ if (ret != SLAPI_DSE_CALLBACK_OK) {
+ slapi_ch_free((void **) &worker_ctx->base_dn);
+ slapi_ch_free((void **) &worker_ctx);
+ }
+ return ret;
+}
+
+static int sigden_task_start(Slapi_PBlock *pb)
+{
+ int ret = 0;
+
+ ret = slapi_task_register_handler("ipa-sidgen-task", sidgen_task_add);
+
+ return ret;
+}
+
+int sidgen_task_init(Slapi_PBlock *pb)
+{
+ int ret = 0;
+
+ ret = slapi_pblock_get(pb, SLAPI_PLUGIN_IDENTITY,
+ &global_sidgen_plugin_id);
+ if (ret != 0 || global_sidgen_plugin_id == NULL) {
+ LOG_FATAL("Plugin identity not available.\n");
+ ret = (ret != 0) ? ret : EINVAL;
+ goto done;
+ }
+
+ ret = slapi_pblock_set(pb, SLAPI_PLUGIN_VERSION,
+ (void *) SLAPI_PLUGIN_VERSION_03);
+
+ ret |= slapi_pblock_set(pb, SLAPI_PLUGIN_START_FN,
+ (void *) sigden_task_start);
+
+done:
+ if (ret != 0) {
+ LOG_FATAL("Failed to initialize plug-in\n" );
+ }
+
+ return ret;
+}
diff --git a/freeipa.spec.in b/freeipa.spec.in
index c1b8c58..398d17c 100644
--- a/freeipa.spec.in
+++ b/freeipa.spec.in
@@ -358,6 +358,8 @@ rm %{buildroot}/%{plugin_dir}/libipa_modrdn.la
rm %{buildroot}/%{plugin_dir}/libipa_lockout.la
rm %{buildroot}/%{plugin_dir}/libipa_cldap.la
rm %{buildroot}/%{plugin_dir}/libipa_extdom_extop.la
+rm %{buildroot}/%{plugin_dir}/libipa_sidgen.la
+rm %{buildroot}/%{plugin_dir}/libipa_sidgen_task.la
rm %{buildroot}/%{_libdir}/krb5/plugins/kdb/ipadb.la
rm %{buildroot}/%{_libdir}/samba/pdb/ipasam.la
@@ -668,6 +670,8 @@ fi
%attr(755,root,root) %{plugin_dir}/libipa_extdom_extop.so
%{_usr}/share/ipa/smb.conf.empty
%attr(755,root,root) %{_libdir}/samba/pdb/ipasam.so
+%attr(755,root,root) %{plugin_dir}/libipa_sidgen.so
+%attr(755,root,root) %{plugin_dir}/libipa_sidgen_task.so
%{_mandir}/man1/ipa-adtrust-install.1.gz
%{python_sitelib}/ipaserver/dcerpc*
%{python_sitelib}/ipaserver/install/adtrustinstance*
diff --git a/ipaserver/install/adtrustinstance.py b/ipaserver/install/adtrustinstance.py
index 602a362..3e3c433 100644
--- a/ipaserver/install/adtrustinstance.py
+++ b/ipaserver/install/adtrustinstance.py
@@ -229,6 +229,13 @@ class ADTRUSTInstance(service.Service):
except:
pass
+ def __add_sidgen_module(self):
+ try:
+ self._ldap_mod("ipa-sidgen-conf.ldif", self.sub_dict)
+ self._ldap_mod("ipa-sidgen-task-conf.ldif", self.sub_dict)
+ except:
+ pass
+
def __write_smb_registry(self):
template = os.path.join(ipautil.SHARE_DIR, "smb.conf.template")
conf = ipautil.template_file(template, self.sub_dict)
@@ -442,6 +449,7 @@ class ADTRUSTInstance(service.Service):
self.step("adding admin(group) SIDs", self.__add_admin_sids)
self.step("activating CLDAP plugin", self.__add_cldap_module)
self.step("activating extdom plugin", self.__add_extdom_module)
+ self.step("activating sidgen plugin and task", self.__add_sidgen_module)
self.step("configuring smbd to start on boot", self.__enable)
if not self.no_msdcs:
self.step("adding special DNS service records", \