summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSumit Bose <sbose@redhat.com>2013-08-19 17:15:47 +0200
committerJakub Hrozek <jhrozek@redhat.com>2013-08-28 17:30:07 +0200
commitcaee9828ee30609e9f433957dbb3d0163390a207 (patch)
tree323dc74055327b86a47e2e32ffb14a66b25a5971
parentb8d0374cd23db90fce203292ff547641f62e338a (diff)
downloadsssd-caee9828ee30609e9f433957dbb3d0163390a207.tar.gz
sssd-caee9828ee30609e9f433957dbb3d0163390a207.tar.xz
sssd-caee9828ee30609e9f433957dbb3d0163390a207.zip
ipa-server-mode: add IPA group memberships to AD users
When IPA trusts an AD domain the AD user or groups can be placed into IPA groups e.g. to put AD users under the control of HBAC. Since IPA group can only have members from the IPA directory tree and the AD users and groups are not stored there a special IPA object called external group was introduced. SIDs of users and groups can be added to the external group and since the external groups are in the IPA directory tree they can be member of IPA groups. To speed things up and to remove some load from the IPA servers SSSD reads all external groups and stores them in memory for some time before rereading the data. Enhances https://fedorahosted.org/sssd/ticket/1962
-rw-r--r--Makefile.am1
-rw-r--r--src/db/sysdb.h1
-rw-r--r--src/providers/ipa/ipa_subdomains.h15
-rw-r--r--src/providers/ipa/ipa_subdomains_ext_groups.c924
-rw-r--r--src/providers/ipa/ipa_subdomains_id.c73
5 files changed, 1006 insertions, 8 deletions
diff --git a/Makefile.am b/Makefile.am
index c3f3c4a54..3dd81ad07 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -1565,6 +1565,7 @@ libsss_ipa_la_SOURCES = \
src/providers/ipa/ipa_hosts.c \
src/providers/ipa/ipa_subdomains.c \
src/providers/ipa/ipa_subdomains_id.c \
+ src/providers/ipa/ipa_subdomains_ext_groups.c \
src/providers/ipa/ipa_s2n_exop.c \
src/providers/ipa/ipa_hbac_hosts.c \
src/providers/ipa/ipa_hbac_private.h \
diff --git a/src/db/sysdb.h b/src/db/sysdb.h
index 96679007a..b91596c4f 100644
--- a/src/db/sysdb.h
+++ b/src/db/sysdb.h
@@ -171,6 +171,7 @@
SYSDB_HOMEDIR, SYSDB_SHELL, \
SYSDB_DEFAULT_ATTRS, \
SYSDB_PRIMARY_GROUP_GIDNUM, \
+ SYSDB_SID_STR, \
NULL}
#define SYSDB_GRSRC_ATTRS {SYSDB_NAME, SYSDB_GIDNUM, \
SYSDB_MEMBERUID, \
diff --git a/src/providers/ipa/ipa_subdomains.h b/src/providers/ipa/ipa_subdomains.h
index 315ce9e06..ceb862226 100644
--- a/src/providers/ipa/ipa_subdomains.h
+++ b/src/providers/ipa/ipa_subdomains.h
@@ -46,11 +46,16 @@ struct ipa_ad_server_ctx {
struct ipa_ad_server_ctx *next, *prev;
};
+/* struct for external group memberships, defined in
+ * ipa_subdomains_ext_groups.c */
+struct ipa_ext_groups;
+
struct ipa_server_mode_ctx {
const char *realm;
const char *hostname;
struct ipa_ad_server_ctx *trusts;
+ struct ipa_ext_groups *ext_groups;
};
int ipa_ad_subdom_init(struct be_ctx *be_ctx,
@@ -70,4 +75,14 @@ struct req_input {
const char *secid;
} inp;
};
+
+struct tevent_req *ipa_get_ad_memberships_send(TALLOC_CTX *mem_ctx,
+ struct tevent_context *ev,
+ struct be_acct_req *ar,
+ struct ipa_server_mode_ctx *server_mode,
+ struct sss_domain_info *user_dom,
+ struct sdap_id_ctx *sdap_id_ctx,
+ const char *domain);
+
+errno_t ipa_get_ad_memberships_recv(struct tevent_req *req, int *dp_error_out);
#endif /* _IPA_SUBDOMAINS_H_ */
diff --git a/src/providers/ipa/ipa_subdomains_ext_groups.c b/src/providers/ipa/ipa_subdomains_ext_groups.c
new file mode 100644
index 000000000..0244fee99
--- /dev/null
+++ b/src/providers/ipa/ipa_subdomains_ext_groups.c
@@ -0,0 +1,924 @@
+/*
+ SSSD
+
+ IPA Identity Backend Module for sub-domains - evaluate external group
+ memberships
+
+ Authors:
+ Sumit Bose <sbose@redhat.com>
+
+ Copyright (C) 2013 Red Hat
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "util/util.h"
+#include "db/sysdb.h"
+#include "providers/ldap/ldap_common.h"
+#include "providers/ldap/sdap_async.h"
+#include "providers/ipa/ipa_id.h"
+#include "providers/ad/ad_id.h"
+#include "providers/ipa/ipa_subdomains.h"
+
+#define IPA_EXT_GROUPS_FILTER "objectClass=ipaexternalgroup"
+
+struct ipa_ext_groups {
+ time_t next_update;
+ hash_table_t *ext_groups;
+};
+
+static errno_t process_ext_groups(TALLOC_CTX *mem_ctx, size_t reply_count,
+ struct sysdb_attrs **reply,
+ hash_table_t **_ext_group_hash)
+{
+ int ret;
+ hash_table_t *ext_group_hash = NULL;
+ hash_key_t key;
+ hash_value_t value;
+ hash_table_t *m_hash = NULL;
+ hash_key_t m_key;
+ hash_value_t m_value;
+ size_t g;
+ size_t s;
+ size_t m;
+ TALLOC_CTX *tmp_ctx = NULL;
+ const char **ext_sids;
+ const char **mof;
+
+ tmp_ctx = talloc_new(NULL);
+ if (tmp_ctx == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("talloc_new failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ ret = sss_hash_create(mem_ctx, reply_count, &ext_group_hash);
+ if (ret != HASH_SUCCESS) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sss_hash_create failed.\n"));
+ goto done;
+ }
+
+ key.type = HASH_KEY_STRING;
+ m_key.type = HASH_KEY_STRING;
+ m_value.type = HASH_VALUE_PTR;
+ m_value.ptr = NULL;
+
+ for (g = 0; g < reply_count; g++) {
+ ret = sysdb_attrs_get_string_array(reply[g], "ipaExternalMember",
+ tmp_ctx, &ext_sids);
+ if (ret == ENOENT) {
+ /* no external members, try next external group. */
+ continue;
+ }
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE,
+ ("sysdb_attrs_get_string_array failed.\n"));
+ goto done;
+ }
+
+ ret = sysdb_attrs_get_string_array(reply[g], "memberOf",
+ tmp_ctx, &mof);
+ if (ret == ENOENT) {
+ /* no IPA groups, try next external group. */
+ continue;
+ }
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE,
+ ("sysdb_attrs_get_string_array failed.\n"));
+ goto done;
+ }
+
+ for (s = 0; ext_sids[s] != NULL; s++) {
+ /* hash_lookup does not modify key.str. */
+ key.str = discard_const(ext_sids[s]);
+ ret = hash_lookup(ext_group_hash, &key, &value);
+ if (ret == HASH_SUCCESS) {
+ if (value.type != HASH_VALUE_PTR) {
+ DEBUG(SSSDBG_OP_FAILURE, ("Unexpected value type.\n"));
+ ret = EINVAL;
+ goto done;
+ }
+
+ for (m = 0; mof[m] != NULL; m++) {
+ /* hash_enter does not modify m_key.str. */
+ m_key.str = discard_const(mof[m]);
+ DEBUG(SSSDBG_TRACE_ALL, ("Adding group [%s] to SID [%s].\n",
+ m_key.str, key.str));
+ ret = hash_enter(value.ptr, &m_key, &m_value);
+ if (ret != HASH_SUCCESS) {
+ DEBUG(SSSDBG_OP_FAILURE, ("hash_enter failed.\n"));
+ goto done;
+ }
+ }
+ } else if (ret == HASH_ERROR_KEY_NOT_FOUND) {
+ ret = sss_hash_create(ext_group_hash, 5, &m_hash);
+ if (ret != HASH_SUCCESS) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sss_hash_create failed.\n"));
+ goto done;
+ }
+
+ value.type = HASH_VALUE_PTR;
+ value.ptr = m_hash;
+
+ DEBUG(SSSDBG_TRACE_ALL,
+ ("Adding SID [%s] to external group hash.\n", key.str));
+ ret = hash_enter(ext_group_hash, &key, &value);
+ if (ret != HASH_SUCCESS) {
+ DEBUG(SSSDBG_OP_FAILURE, ("hash_enter failed.\n"));
+ goto done;
+ }
+
+ for (m = 0; mof[m] != NULL; m++) {
+ /* hash_enter does not modify m_key.str. */
+ m_key.str = discard_const(mof[m]);
+ DEBUG(SSSDBG_TRACE_ALL, ("Adding group [%s] to SID [%s].\n",
+ m_key.str, key.str));
+ ret = hash_enter(m_hash, &m_key, &m_value);
+ if (ret != HASH_SUCCESS) {
+ DEBUG(SSSDBG_OP_FAILURE, ("hash_enter failed.\n"));
+ goto done;
+ }
+ }
+ } else {
+ DEBUG(SSSDBG_OP_FAILURE, ("hash_lookup failed.\n"));
+ goto done;
+ }
+ }
+ }
+
+ ret = EOK;
+done:
+ if (ret != EOK) {
+ talloc_free(ext_group_hash);
+ } else {
+ *_ext_group_hash = ext_group_hash;
+ }
+
+ talloc_free(tmp_ctx);
+
+ return ret;
+}
+
+static errno_t find_ipa_ext_memberships(TALLOC_CTX *mem_ctx,
+ const char *user_name,
+ struct sss_domain_info *user_dom,
+ hash_table_t *ext_group_hash,
+ struct ldb_dn **_user_dn,
+ char ***_groups)
+{
+ int ret;
+ TALLOC_CTX *tmp_ctx = NULL;
+ struct ldb_result *result;
+ char **groups = NULL;
+ size_t c;
+ const char *sid;
+ hash_key_t key;
+ hash_value_t value;
+ hash_entry_t *entry;
+ struct hash_iter_context_t *iter;
+ hash_table_t *group_hash;
+ size_t g_count;
+ struct ldb_dn *user_dn = NULL;
+
+ tmp_ctx = talloc_new(NULL);
+ if (tmp_ctx == NULL) {
+ return ENOMEM;
+ }
+
+ ret = sysdb_initgroups(tmp_ctx, user_dom->sysdb, user_dom, user_name,
+ &result);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sysdb_initgroups failed.\n"));
+ goto done;
+ }
+
+ if (result->count == 0) {
+ DEBUG(SSSDBG_MINOR_FAILURE, ("User [%d] not found in cache.\n",
+ user_name));
+ ret = EOK;
+ goto done;
+ }
+
+ ret = sss_hash_create(tmp_ctx, 10, &group_hash);
+ if (ret != HASH_SUCCESS) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sss_hash_create failed.\n"));
+ goto done;
+ }
+
+ key.type = HASH_KEY_STRING;
+
+ /* The IPA external domains can have references to group and user SIDs.
+ * This means that we not only want to look up the group SIDs but the SID
+ * of the user (first element of result) as well. */
+ for (c = 0; c < result->count; c++) {
+ sid = ldb_msg_find_attr_as_string(result->msgs[c], SYSDB_SID_STR,
+ NULL);
+ if (sid == NULL) {
+ DEBUG(SSSDBG_MINOR_FAILURE, ("Group [%s] does not have a SID.\n",
+ ldb_dn_get_linearized(result->msgs[c]->dn)));
+ continue;
+ }
+
+ key.str = discard_const(sid);
+ ret = hash_lookup(ext_group_hash, &key, &value);
+ if (ret == HASH_ERROR_KEY_NOT_FOUND) {
+ DEBUG(SSSDBG_TRACE_ALL, ("SID [%s] not found in ext group hash.\n",
+ sid));
+ } else if (ret == HASH_SUCCESS) {
+ iter = new_hash_iter_context(value.ptr);
+ if (iter == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("new_hash_iter_context failed.\n"));
+ ret = EINVAL;
+ goto done;
+ }
+
+ while ((entry = iter->next(iter)) != NULL) {
+ ret = hash_enter(group_hash, &entry->key, &entry->value);
+ if (ret != HASH_SUCCESS) {
+ DEBUG(SSSDBG_OP_FAILURE, ("Failed to add group [%s].\n",
+ entry->key.str));
+ }
+ }
+
+ talloc_free(iter);
+ } else {
+ DEBUG(SSSDBG_OP_FAILURE, ("hash_lookup failed for SID [%s].\n",
+ sid));
+ }
+ }
+
+ g_count = hash_count(group_hash);
+ if (g_count == 0) {
+ DEBUG(SSSDBG_TRACE_FUNC, ("No external groupmemberships found.\n"));
+ ret = EOK;
+ goto done;
+ }
+
+ groups = talloc_zero_array(mem_ctx, char *, g_count + 1);
+ if (groups == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("talloc_array failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ iter = new_hash_iter_context(group_hash);
+ if (iter == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("new_hash_iter_context failed.\n"));
+ ret = EINVAL;
+ goto done;
+ }
+
+ c = 0;
+ while ((entry = iter->next(iter)) != NULL) {
+ groups[c] = talloc_strdup(groups, entry->key.str);
+ if (groups[c] == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("talloc_strdup failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+ c++;
+ }
+
+ user_dn = ldb_dn_copy(mem_ctx, result->msgs[0]->dn);
+ if (user_dn == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("ldb_dn_copy failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ ret = EOK;
+done:
+ *_user_dn = user_dn;
+ *_groups = groups;
+
+ talloc_free(tmp_ctx);
+
+ return ret;
+}
+
+static errno_t add_ad_user_to_cached_groups(struct ldb_dn *user_dn,
+ struct sss_domain_info *user_dom,
+ struct sss_domain_info *group_dom,
+ char **groups,
+ bool *missing_groups)
+{
+ size_t c;
+ struct sysdb_attrs *user_attrs;
+ size_t msgs_count;
+ struct ldb_message **msgs;
+ char *subfilter;
+ TALLOC_CTX *tmp_ctx;
+ int ret;
+
+ *missing_groups = false;
+
+ tmp_ctx = talloc_new(NULL);
+ if (tmp_ctx == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("talloc_new failed.\n"));
+ return ENOMEM;
+ }
+
+ for (c = 0; groups[c] != NULL; c++) {
+ if (groups[c][0] == '\0') {
+ continue;
+ }
+
+ subfilter = talloc_asprintf(tmp_ctx, "(%s=%s)", SYSDB_ORIG_DN, groups[c]);
+ if (subfilter == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("talloc_asprintf failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ ret = sysdb_search_groups(tmp_ctx, group_dom->sysdb, group_dom,
+ subfilter, NULL, &msgs_count, &msgs);
+ if (ret != EOK) {
+ if (ret == ENOENT) {
+ DEBUG(SSSDBG_TRACE_ALL, ("Group [%s] not in the cache.\n",
+ groups[c]));
+ *missing_groups = true;
+ continue;
+ } else {
+ DEBUG(SSSDBG_OP_FAILURE, ("sysdb_search_entry failed.\n"));
+ goto done;
+ }
+ }
+
+/* TODO? Do we have to remove members as well? I think not because the AD
+ * query before removes all memberships. */
+
+ ret = sysdb_mod_group_member(group_dom->sysdb, user_dn, msgs[0]->dn,
+ LDB_FLAG_MOD_ADD);
+ if (ret != EOK && ret != EEXIST) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sysdb_mod_group_member failed.\n"));
+ goto done;
+ }
+
+ user_attrs = sysdb_new_attrs(tmp_ctx);
+ if (user_attrs == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sysdb_new_attrs failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ ret = sysdb_attrs_add_string(user_attrs, SYSDB_ORIG_MEMBEROF,
+ groups[c]);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sysdb_attrs_add_string failed.\n"));
+ goto done;
+ }
+
+ ret = sysdb_set_entry_attr(user_dom->sysdb, user_dn, user_attrs,
+ LDB_FLAG_MOD_ADD);
+ if (ret != EOK && ret != EEXIST) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sysdb_set_entry_attr failed.\n"));
+ goto done;
+ }
+
+ /* mark group as already processed */
+ groups[c][0] = '\0';
+ }
+
+ ret = EOK;
+done:
+ talloc_free(tmp_ctx);
+
+ return ret;
+}
+
+static struct tevent_req *ipa_add_ad_memberships_send(TALLOC_CTX *mem_ctx,
+ struct tevent_context *ev,
+ struct sdap_id_ctx *sdap_id_ctx,
+ struct ldb_dn *user_dn,
+ struct sss_domain_info *user_dom,
+ char **groups,
+ struct sss_domain_info *group_dom);
+static void ipa_add_ad_memberships_done(struct tevent_req *subreq);
+
+struct get_ad_membership_state {
+ struct tevent_context *ev;
+ struct ipa_server_mode_ctx *server_mode;
+ struct sdap_id_op *sdap_op;
+ struct sdap_id_ctx *sdap_id_ctx;
+ struct fo_server *srv;
+ char *user_name;
+ struct sss_domain_info *user_dom;
+
+ int dp_error;
+ const char *domain;
+ size_t reply_count;
+ struct sysdb_attrs **reply;
+};
+
+static void ipa_get_ad_memberships_connect_done(struct tevent_req *subreq);
+static void ipa_get_ext_groups_done(struct tevent_req *subreq);
+static errno_t ipa_add_ext_groups_step(struct tevent_req *req);
+static errno_t ipa_add_ad_memberships_recv(struct tevent_req *req,
+ int *dp_error_out);
+
+struct tevent_req *ipa_get_ad_memberships_send(TALLOC_CTX *mem_ctx,
+ struct tevent_context *ev,
+ struct be_acct_req *ar,
+ struct ipa_server_mode_ctx *server_mode,
+ struct sss_domain_info *user_dom,
+ struct sdap_id_ctx *sdap_id_ctx,
+ const char *domain)
+{
+ int ret;
+ struct tevent_req *req;
+ struct tevent_req *subreq;
+ struct get_ad_membership_state *state;
+
+ req = tevent_req_create(mem_ctx, &state, struct get_ad_membership_state);
+ if (req == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("tevent_req_create failed.\n"));
+ return NULL;
+ }
+
+ state->ev = ev;
+ state->user_dom = user_dom;
+ state->sdap_id_ctx = sdap_id_ctx;
+ state->srv = NULL;
+ state->domain = domain;
+ state->dp_error = -1;
+
+ if ((ar->entry_type & BE_REQ_TYPE_MASK) != BE_REQ_INITGROUPS
+ || ar->filter_type != BE_FILTER_NAME) {
+ DEBUG(SSSDBG_OP_FAILURE, ("Unsupported request type.\n"));
+ ret = EINVAL;
+ goto done;
+ }
+
+ state->user_name = talloc_strdup(state, ar->filter_value);
+ if (state->user_name == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("talloc_Strdup failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ state->sdap_op = sdap_id_op_create(state,
+ state->sdap_id_ctx->conn->conn_cache);
+ if (state->sdap_op == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ state->server_mode = server_mode;
+ if (server_mode->ext_groups == NULL) {
+ server_mode->ext_groups = talloc_zero(server_mode,
+ struct ipa_ext_groups);
+ if (server_mode->ext_groups == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("talloc_zero failed.\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+ }
+
+ if (server_mode->ext_groups->next_update > time(NULL)) {
+ DEBUG(SSSDBG_TRACE_FUNC, ("External group information still valid.\n"));
+ ret = ipa_add_ext_groups_step(req);
+ if (ret == EOK) {
+ goto done;
+ } else if (ret == EAGAIN) {
+ return req;
+ } else {
+ DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ext_groups_step failed.\n"));
+ goto done;
+ }
+
+ }
+
+ subreq = sdap_id_op_connect_send(state->sdap_op, state, &ret);
+ if (subreq == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_connect_send failed: %d(%s).\n",
+ ret, strerror(ret)));
+ goto done;
+ }
+
+ tevent_req_set_callback(subreq, ipa_get_ad_memberships_connect_done, req);
+
+ return req;
+
+done:
+ if (ret != EOK) {
+ state->dp_error = DP_ERR_FATAL;
+ tevent_req_error(req, ret);
+ } else {
+ state->dp_error = DP_ERR_OK;
+ tevent_req_done(req);
+ }
+ tevent_req_post(req, state->ev);
+
+ return req;
+}
+
+static void ipa_get_ad_memberships_connect_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct get_ad_membership_state *state = tevent_req_data(req,
+ struct get_ad_membership_state);
+ int ret;
+ char *basedn;
+
+ ret = sdap_id_op_connect_recv(subreq, &state->dp_error);
+ talloc_zfree(subreq);
+ if (ret != EOK) {
+ if (state->dp_error == DP_ERR_OFFLINE) {
+ DEBUG(SSSDBG_MINOR_FAILURE,
+ ("No IPA server is available, going offline\n"));
+ } else {
+ DEBUG(SSSDBG_OP_FAILURE,
+ ("Failed to connect to IPA server: [%d](%s)\n",
+ ret, strerror(ret)));
+ }
+
+ goto fail;
+ }
+
+
+ ret = domain_to_basedn(state, state->domain, &basedn);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("domain_to_basedn failed.\n"));
+ goto fail;
+ }
+
+ subreq = sdap_get_generic_send(state, state->ev, state->sdap_id_ctx->opts,
+ sdap_id_op_handle(state->sdap_op), basedn,
+ LDAP_SCOPE_SUBTREE,
+ IPA_EXT_GROUPS_FILTER, NULL, NULL, 0,
+ dp_opt_get_int(state->sdap_id_ctx->opts->basic,
+ SDAP_ENUM_SEARCH_TIMEOUT),
+ false);
+ if (subreq == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sdap_get_generic_send failed.\n"));
+ ret = ENOMEM;
+ goto fail;
+ }
+
+ tevent_req_set_callback(subreq, ipa_get_ext_groups_done, req);
+ return;
+
+fail:
+ tevent_req_error(req, ret);
+ return;
+}
+
+static void ipa_get_ext_groups_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct get_ad_membership_state *state = tevent_req_data(req,
+ struct get_ad_membership_state);
+ int ret;
+ hash_table_t *ext_group_hash;
+
+ ret = sdap_get_generic_recv(subreq, state,
+ &state->reply_count, &state->reply);
+ talloc_zfree(subreq);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("ipa_get_ext_groups request failed.\n"));
+ tevent_req_error(req, ret);
+ return;
+ }
+
+ DEBUG(SSSDBG_TRACE_FUNC, ("[%d] external groups found.\n",
+ state->reply_count));
+
+ ret = process_ext_groups(state->server_mode->ext_groups,
+ state->reply_count, state->reply, &ext_group_hash);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("process_ext_groups failed.\n"));
+ goto fail;
+ }
+
+ state->server_mode->ext_groups->ext_groups = ext_group_hash;
+ /* Do we have to make the update timeout configurable? */
+ state->server_mode->ext_groups->next_update = time(NULL) + 10;
+
+ ret = ipa_add_ext_groups_step(req);
+ if (ret == EOK) {
+ tevent_req_done(req);
+ return;
+ } else if (ret == EAGAIN) {
+ return;
+ } else {
+ DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ext_groups_step failed.\n"));
+ goto fail;
+ }
+
+fail:
+ tevent_req_error(req, ret);
+ return;
+}
+
+static errno_t ipa_add_ext_groups_step(struct tevent_req *req)
+{
+ struct get_ad_membership_state *state = tevent_req_data(req,
+ struct get_ad_membership_state);
+ struct ldb_dn *user_dn;
+ int ret;
+ char **groups = NULL;
+ struct tevent_req *subreq;
+
+ ret = find_ipa_ext_memberships(state, state->user_name, state->user_dom,
+ state->server_mode->ext_groups->ext_groups,
+ &user_dn, &groups);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("find_ipa_ext_memberships failed.\n"));
+ goto fail;
+ }
+
+ if (groups == NULL) {
+ DEBUG(SSSDBG_TRACE_ALL, ("No external groups memberships found.\n"));
+ state->dp_error = DP_ERR_OK;
+ return EOK;
+ }
+
+ subreq = ipa_add_ad_memberships_send(state, state->ev, state->sdap_id_ctx,
+ user_dn, state->user_dom, groups,
+ state->sdap_id_ctx->be->domain);
+ if (subreq == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ad_memberships_send failed.\n"));
+ ret = ENOMEM;
+ goto fail;
+ }
+
+ tevent_req_set_callback(subreq, ipa_add_ad_memberships_done, req);
+ return EAGAIN;
+
+fail:
+ tevent_req_error(req, ret);
+ return ret;
+}
+
+static void ipa_add_ad_memberships_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct get_ad_membership_state *state = tevent_req_data(req,
+ struct get_ad_membership_state);
+ int ret;
+
+ ret = ipa_add_ad_memberships_recv(subreq, &state->dp_error);
+ talloc_zfree(subreq);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("ipa_add_ad_memberships request failed.\n"));
+ tevent_req_error(req, ret);
+ return;
+ }
+
+ state->dp_error = DP_ERR_OK;
+ tevent_req_done(req);
+ return;
+}
+
+errno_t ipa_get_ad_memberships_recv(struct tevent_req *req, int *dp_error_out)
+{
+ struct get_ad_membership_state *state = tevent_req_data(req,
+ struct get_ad_membership_state);
+
+ TEVENT_REQ_RETURN_ON_ERROR(req);
+
+ if (dp_error_out) {
+ *dp_error_out = state->dp_error;
+ }
+
+ return EOK;
+}
+
+struct add_ad_membership_state {
+ struct tevent_context *ev;
+ struct sdap_id_ctx *sdap_id_ctx;
+ struct sdap_id_op *sdap_op;
+ struct ldb_dn *user_dn;
+ struct sss_domain_info *user_dom;
+ struct sss_domain_info *group_dom;
+ char **groups;
+ int dp_error;
+ size_t iter;
+ struct sdap_domain *group_sdom;
+};
+
+static void ipa_add_ad_memberships_connect_done(struct tevent_req *subreq);
+static void ipa_add_ad_memberships_get_next(struct tevent_req *req);
+static void ipa_add_ad_memberships_get_group_done(struct tevent_req *subreq);
+static struct tevent_req *ipa_add_ad_memberships_send(TALLOC_CTX *mem_ctx,
+ struct tevent_context *ev,
+ struct sdap_id_ctx *sdap_id_ctx,
+ struct ldb_dn *user_dn,
+ struct sss_domain_info *user_dom,
+ char **groups,
+ struct sss_domain_info *group_dom)
+{
+ int ret;
+ struct tevent_req *req;
+ struct tevent_req *subreq;
+ struct add_ad_membership_state *state;
+ bool missing_groups = false;
+
+ req = tevent_req_create(mem_ctx, &state, struct add_ad_membership_state);
+ if (req == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("tevent_req_create failed.\n"));
+ return NULL;
+ }
+
+ state->ev = ev;
+ state->user_dom = user_dom;
+ state->sdap_id_ctx = sdap_id_ctx;
+ state->user_dn = user_dn;
+ state->group_dom = group_dom;
+ state->groups = groups;
+ state->dp_error = -1;
+ state->iter = 0;
+ state->group_sdom = sdap_domain_get(sdap_id_ctx->opts, group_dom);
+ if (state->group_sdom == NULL) {
+ ret = EIO;
+ goto done;
+ }
+
+ ret = add_ad_user_to_cached_groups(user_dn, user_dom, group_dom, groups,
+ &missing_groups);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("add_ad_user_to_cached_groups failed.\n"));
+ goto done;
+ }
+
+ if (!missing_groups) {
+ DEBUG(SSSDBG_TRACE_ALL, ("All groups found in cache.\n"));
+ ret = EOK;
+ goto done;
+ }
+
+ state->sdap_op = sdap_id_op_create(state,
+ state->sdap_id_ctx->conn->conn_cache);
+ if (state->sdap_op == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_create failed\n"));
+ ret = ENOMEM;
+ goto done;
+ }
+
+ subreq = sdap_id_op_connect_send(state->sdap_op, state, &ret);
+ if (subreq == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sdap_id_op_connect_send failed: %d(%s).\n",
+ ret, strerror(ret)));
+ goto done;
+ }
+
+ tevent_req_set_callback(subreq, ipa_add_ad_memberships_connect_done, req);
+
+ return req;
+
+done:
+ if (ret != EOK) {
+ state->dp_error = DP_ERR_FATAL;
+ tevent_req_error(req, ret);
+ } else {
+ state->dp_error = DP_ERR_OK;
+ tevent_req_done(req);
+ }
+ tevent_req_post(req, state->ev);
+
+ return req;
+}
+
+static void ipa_add_ad_memberships_connect_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct add_ad_membership_state *state = tevent_req_data(req,
+ struct add_ad_membership_state);
+ int ret;
+
+ ret = sdap_id_op_connect_recv(subreq, &state->dp_error);
+ talloc_zfree(subreq);
+ if (ret != EOK) {
+ if (state->dp_error == DP_ERR_OFFLINE) {
+ DEBUG(SSSDBG_MINOR_FAILURE,
+ ("No IPA server is available, going offline\n"));
+ } else {
+ DEBUG(SSSDBG_OP_FAILURE,
+ ("Failed to connect to IPA server: [%d](%s)\n",
+ ret, strerror(ret)));
+ }
+
+ tevent_req_error(req, ret);
+ return;
+ }
+
+ state->iter = 0;
+ ipa_add_ad_memberships_get_next(req);
+}
+
+static void ipa_add_ad_memberships_get_next(struct tevent_req *req)
+{
+ struct add_ad_membership_state *state = tevent_req_data(req,
+ struct add_ad_membership_state);
+ struct tevent_req *subreq;
+ struct ldb_dn *group_dn;
+ int ret;
+ const struct ldb_val *val;
+ bool missing_groups;
+
+ while (state->groups[state->iter] != NULL
+ && state->groups[state->iter][0] == '\0') {
+ state->iter++;
+ }
+
+ if (state->groups[state->iter] == NULL) {
+ ret = add_ad_user_to_cached_groups(state->user_dn, state->user_dom,
+ state->group_dom, state->groups,
+ &missing_groups);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("add_ad_user_to_cached_groups failed.\n"));
+ goto fail;
+ }
+
+ if (missing_groups) {
+ DEBUG(SSSDBG_CRIT_FAILURE, ("There are unresolved external group " \
+ "memberships even after all groups have " \
+ "been looked up on the LDAP server."));
+ }
+ tevent_req_done(req);
+ return;
+ }
+
+ group_dn = ldb_dn_new(state, sysdb_ctx_get_ldb(state->group_dom->sysdb),
+ state->groups[state->iter]);
+ if (group_dn == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("ldb_dn_new failed.\n"));
+ ret = ENOMEM;
+ goto fail;
+ }
+
+ val = ldb_dn_get_component_val(group_dn, 0);
+
+/* TODO: here is would be useful for have a filter type like BE_FILTER_DN to
+ * directly fetch the group with the corresponding DN. */
+ subreq = groups_get_send(state, state->ev,
+ state->sdap_id_ctx, state->group_sdom,
+ state->sdap_id_ctx->conn,
+ (const char *) val->data,
+ BE_FILTER_NAME, BE_ATTR_CORE,
+ false);
+ if (subreq == NULL) {
+ DEBUG(SSSDBG_OP_FAILURE, ("sdap_get_generic_send failed: %d(%s).\n"));
+ ret = ENOMEM;
+ goto fail;
+ }
+
+ tevent_req_set_callback(subreq, ipa_add_ad_memberships_get_group_done, req);
+ return;
+
+fail:
+ tevent_req_error(req, ret);
+}
+
+static void ipa_add_ad_memberships_get_group_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct add_ad_membership_state *state = tevent_req_data(req,
+ struct add_ad_membership_state);
+ int ret;
+
+ ret = groups_get_recv(subreq, &state->dp_error, NULL);
+ talloc_zfree(subreq);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("Failed to read group [%s] from LDAP [%d](%s)\n",
+ state->groups[state->iter], ret, strerror(ret)));
+
+ tevent_req_error(req, ret);
+ return;
+ }
+
+ state->iter++;
+ ipa_add_ad_memberships_get_next(req);
+}
+
+static errno_t ipa_add_ad_memberships_recv(struct tevent_req *req,
+ int *dp_error_out)
+{
+ struct add_ad_membership_state *state = tevent_req_data(req,
+ struct add_ad_membership_state);
+
+ TEVENT_REQ_RETURN_ON_ERROR(req);
+
+ if (dp_error_out) {
+ *dp_error_out = state->dp_error;
+ }
+
+ return EOK;
+}
diff --git a/src/providers/ipa/ipa_subdomains_id.c b/src/providers/ipa/ipa_subdomains_id.c
index c380d159e..c29a2a304 100644
--- a/src/providers/ipa/ipa_subdomains_id.c
+++ b/src/providers/ipa/ipa_subdomains_id.c
@@ -250,8 +250,14 @@ int ipa_get_subdom_acct_recv(struct tevent_req *req, int *dp_error_out)
/* IPA lookup for server mode. Directly to AD. */
struct ipa_get_ad_acct_state {
int dp_error;
+ struct tevent_context *ev;
+ struct ipa_id_ctx *ipa_ctx;
+ struct be_req *be_req;
+ struct be_acct_req *ar;
+ struct sss_domain_info *user_dom;
};
+static void ipa_get_ad_acct_ad_part_done(struct tevent_req *subreq);
static void ipa_get_ad_acct_done(struct tevent_req *subreq);
static struct ad_id_ctx *ipa_get_ad_id_ctx(struct ipa_id_ctx *ipa_ctx,
struct sss_domain_info *dom);
@@ -267,7 +273,6 @@ ipa_get_ad_acct_send(TALLOC_CTX *mem_ctx,
struct tevent_req *req;
struct tevent_req *subreq;
struct ipa_get_ad_acct_state *state;
- struct sss_domain_info *dom;
struct sdap_domain *sdom;
struct sdap_id_conn_ctx **clist;
struct sdap_id_ctx *sdap_id_ctx;;
@@ -276,16 +281,22 @@ ipa_get_ad_acct_send(TALLOC_CTX *mem_ctx,
req = tevent_req_create(mem_ctx, &state, struct ipa_get_ad_acct_state);
if (req == NULL) return NULL;
+ state->dp_error = -1;
+ state->ev = ev;
+ state->ipa_ctx = ipa_ctx;
+ state->be_req = be_req;
+ state->ar = ar;
+
/* This can only be a subdomain request, verify subdomain */
- dom = find_subdomain_by_name(ipa_ctx->sdap_id_ctx->be->domain,
- ar->domain, true);
- if (dom == NULL) {
+ state->user_dom = find_subdomain_by_name(ipa_ctx->sdap_id_ctx->be->domain,
+ ar->domain, true);
+ if (state->user_dom == NULL) {
ret = EINVAL;
goto fail;
}
/* Let's see if this subdomain has a ad_id_ctx */
- ad_id_ctx = ipa_get_ad_id_ctx(ipa_ctx, dom);
+ ad_id_ctx = ipa_get_ad_id_ctx(ipa_ctx, state->user_dom);
if (ad_id_ctx == NULL) {
ret = EINVAL;
goto fail;
@@ -304,7 +315,7 @@ ipa_get_ad_acct_send(TALLOC_CTX *mem_ctx,
clist[1] = NULL;
/* Now we already need ad_id_ctx in particular sdap_id_conn_ctx */
- sdom = sdap_domain_get(sdap_id_ctx->opts, dom);
+ sdom = sdap_domain_get(sdap_id_ctx->opts, state->user_dom);
if (sdom == NULL) {
ret = EIO;
goto fail;
@@ -316,10 +327,11 @@ ipa_get_ad_acct_send(TALLOC_CTX *mem_ctx,
ret = ENOMEM;
goto fail;
}
- tevent_req_set_callback(subreq, ipa_get_ad_acct_done, req);
+ tevent_req_set_callback(subreq, ipa_get_ad_acct_ad_part_done, req);
return req;
fail:
+ state->dp_error = DP_ERR_FATAL;
tevent_req_error(req, ret);
tevent_req_post(req, ev);
return req;
@@ -339,7 +351,7 @@ ipa_get_ad_id_ctx(struct ipa_id_ctx *ipa_ctx,
}
static void
-ipa_get_ad_acct_done(struct tevent_req *subreq)
+ipa_get_ad_acct_ad_part_done(struct tevent_req *subreq)
{
struct tevent_req *req = tevent_req_callback_data(subreq,
struct tevent_req);
@@ -355,6 +367,51 @@ ipa_get_ad_acct_done(struct tevent_req *subreq)
return;
}
+ if ((state->ar->entry_type & BE_REQ_TYPE_MASK) != BE_REQ_INITGROUPS) {
+ tevent_req_done(req);
+ return;
+ }
+
+ /* For initgroups request we have to check IPA group memberships of AD
+ * users. */
+ subreq = ipa_get_ad_memberships_send(state, state->ev, state->ar,
+ state->ipa_ctx->server_mode,
+ state->user_dom,
+ state->ipa_ctx->sdap_id_ctx,
+ state->ipa_ctx->server_mode->realm);
+ if (subreq == NULL) {
+ ret = ENOMEM;
+ goto fail;
+ }
+ tevent_req_set_callback(subreq, ipa_get_ad_acct_done, req);
+
+ return;
+
+fail:
+ state->dp_error = DP_ERR_FATAL;
+ tevent_req_error(req, ret);
+ tevent_req_post(req, state->ev);
+ return;
+}
+
+static void
+ipa_get_ad_acct_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct ipa_get_ad_acct_state *state = tevent_req_data(req,
+ struct ipa_get_ad_acct_state);
+ errno_t ret;
+
+ ret = ipa_get_ad_memberships_recv(subreq, &state->dp_error);
+ talloc_zfree(subreq);
+ if (ret != EOK) {
+ DEBUG(SSSDBG_OP_FAILURE, ("IPA external groups lookup failed: %d\n",
+ ret));
+ tevent_req_error(req, ret);
+ return;
+ }
+
tevent_req_done(req);
}