4 LDAP semantics mapping module
6 Copyright (C) Jelmer Vernooij 2005
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2006
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 This module relies on ldb_map to do all the real work, but performs
25 some of the trivial mappings between AD semantics and that provided
26 by OpenLDAP and similar servers.
30 #include "ldb/include/ldb.h"
31 #include "ldb/include/ldb_private.h"
32 #include "ldb/include/ldb_errors.h"
33 #include "ldb/ldb_map/ldb_map.h"
35 #include "librpc/gen_ndr/ndr_misc.h"
36 #include "librpc/ndr/libndr.h"
38 struct entryuuid_private {
39 struct ldb_dn **base_dns;
42 static struct ldb_val encode_guid(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
45 NTSTATUS status = GUID_from_string((char *)val->data, &guid);
46 enum ndr_err_code ndr_err;
47 struct ldb_val out = data_blob(NULL, 0);
49 if (!NT_STATUS_IS_OK(status)) {
52 ndr_err = ndr_push_struct_blob(&out, ctx, NULL, &guid,
53 (ndr_push_flags_fn_t)ndr_push_GUID);
54 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
61 static struct ldb_val guid_always_string(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
64 struct ldb_val out = data_blob(NULL, 0);
65 if (val->length >= 32 && val->data[val->length] == '\0') {
66 ldb_handler_copy(module->ldb, ctx, val, &out);
68 enum ndr_err_code ndr_err;
70 guid = talloc(ctx, struct GUID);
74 ndr_err = ndr_pull_struct_blob(val, guid, NULL, guid,
75 (ndr_pull_flags_fn_t)ndr_pull_GUID);
76 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
80 out = data_blob_string_const(GUID_string(ctx, guid));
86 static struct ldb_val encode_ns_guid(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
89 NTSTATUS status = NS_GUID_from_string((char *)val->data, &guid);
90 enum ndr_err_code ndr_err;
91 struct ldb_val out = data_blob(NULL, 0);
93 if (!NT_STATUS_IS_OK(status)) {
96 ndr_err = ndr_push_struct_blob(&out, ctx, NULL, &guid,
97 (ndr_push_flags_fn_t)ndr_push_GUID);
98 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
105 static struct ldb_val guid_ns_string(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
107 struct ldb_val out = data_blob(NULL, 0);
108 if (val->length >= 32 && val->data[val->length] == '\0') {
110 GUID_from_string((char *)val->data, &guid);
111 out = data_blob_string_const(NS_GUID_string(ctx, &guid));
113 enum ndr_err_code ndr_err;
115 guid_p = talloc(ctx, struct GUID);
116 if (guid_p == NULL) {
119 ndr_err = ndr_pull_struct_blob(val, guid_p, NULL, guid_p,
120 (ndr_pull_flags_fn_t)ndr_pull_GUID);
121 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
125 out = data_blob_string_const(NS_GUID_string(ctx, guid_p));
131 /* The backend holds binary sids, so just copy them back */
132 static struct ldb_val val_copy(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
134 struct ldb_val out = data_blob(NULL, 0);
135 ldb_handler_copy(module->ldb, ctx, val, &out);
140 /* Ensure we always convert sids into binary, so the backend doesn't have to know about both forms */
141 static struct ldb_val sid_always_binary(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
143 struct ldb_val out = data_blob(NULL, 0);
144 const struct ldb_schema_attribute *a = ldb_schema_attribute_by_name(module->ldb, "objectSid");
146 if (a->syntax->canonicalise_fn(module->ldb, ctx, val, &out) != LDB_SUCCESS) {
147 return data_blob(NULL, 0);
153 /* Ensure we always convert objectCategory into a DN */
154 static struct ldb_val objectCategory_always_dn(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
157 struct ldb_val out = data_blob(NULL, 0);
158 const struct ldb_schema_attribute *a = ldb_schema_attribute_by_name(module->ldb, "objectCategory");
160 dn = ldb_dn_new(ctx, module->ldb, val->data);
161 if (dn && ldb_dn_is_valid(dn)) {
163 return val_copy(module, ctx, val);
167 if (a->syntax->canonicalise_fn(module->ldb, ctx, val, &out) != LDB_SUCCESS) {
168 return data_blob(NULL, 0);
174 static struct ldb_val normalise_to_signed32(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
176 long long int signed_ll = strtoll((const char *)val->data, NULL, 10);
177 if (signed_ll >= 0x80000000LL) {
180 uint32_t unsigned_int;
182 .unsigned_int = strtoul((const char *)val->data, NULL, 10)
185 struct ldb_val out = data_blob_string_const(talloc_asprintf(ctx, "%d", u.signed_int));
188 return val_copy(module, ctx, val);
191 static struct ldb_val usn_to_entryCSN(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
194 unsigned long long usn = strtoull((const char *)val->data, NULL, 10);
195 time_t t = (usn >> 24);
196 out = data_blob_string_const(talloc_asprintf(ctx, "%s#%06x#00#000000", ldb_timestring(ctx, t), (unsigned int)(usn & 0xFFFFFF)));
200 static unsigned long long entryCSN_to_usn_int(TALLOC_CTX *ctx, const struct ldb_val *val)
202 char *entryCSN = talloc_strdup(ctx, (const char *)val->data);
205 unsigned long long usn;
210 p = strchr(entryCSN, '#');
225 usn = strtol(mod_per_sec, NULL, 16);
227 t = ldb_string_to_time(entryCSN);
229 usn = usn | ((unsigned long long)t <<24);
233 static struct ldb_val entryCSN_to_usn(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
236 unsigned long long usn = entryCSN_to_usn_int(ctx, val);
237 out = data_blob_string_const(talloc_asprintf(ctx, "%lld", usn));
241 static struct ldb_val usn_to_timestamp(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
244 unsigned long long usn = strtoull((const char *)val->data, NULL, 10);
245 time_t t = (usn >> 24);
246 out = data_blob_string_const(ldb_timestring(ctx, t));
250 static struct ldb_val timestamp_to_usn(struct ldb_module *module, TALLOC_CTX *ctx, const struct ldb_val *val)
254 unsigned long long usn;
256 t = ldb_string_to_time((const char *)val->data);
258 usn = ((unsigned long long)t <<24);
260 out = data_blob_string_const(talloc_asprintf(ctx, "%lld", usn));
265 static const struct ldb_map_attribute entryuuid_attributes[] =
269 .local_name = "objectGUID",
273 .remote_name = "entryUUID",
274 .convert_local = guid_always_string,
275 .convert_remote = encode_guid,
281 .local_name = "invocationId",
285 .remote_name = "invocationId",
286 .convert_local = guid_always_string,
287 .convert_remote = encode_guid,
293 .local_name = "objectSid",
297 .remote_name = "objectSid",
298 .convert_local = sid_always_binary,
299 .convert_remote = val_copy,
304 .local_name = "name",
308 .remote_name = "samba4RDN"
313 .local_name = "whenCreated",
317 .remote_name = "createTimestamp"
322 .local_name = "whenChanged",
326 .remote_name = "modifyTimestamp"
331 .local_name = "objectClasses",
335 .remote_name = "samba4ObjectClasses"
340 .local_name = "dITContentRules",
344 .remote_name = "samba4DITContentRules"
349 .local_name = "attributeTypes",
353 .remote_name = "samba4AttributeTypes"
358 .local_name = "sambaPassword",
362 .remote_name = "userPassword"
367 .local_name = "objectCategory",
371 .remote_name = "objectCategory",
372 .convert_local = objectCategory_always_dn,
373 .convert_remote = val_copy,
378 .local_name = "distinguishedName",
382 .remote_name = "entryDN"
387 .local_name = "groupType",
391 .remote_name = "groupType",
392 .convert_local = normalise_to_signed32,
393 .convert_remote = val_copy,
398 .local_name = "sAMAccountType",
402 .remote_name = "sAMAccountType",
403 .convert_local = normalise_to_signed32,
404 .convert_remote = val_copy,
409 .local_name = "usnChanged",
413 .remote_name = "entryCSN",
414 .convert_local = usn_to_entryCSN,
415 .convert_remote = entryCSN_to_usn
420 .local_name = "usnCreated",
424 .remote_name = "createTimestamp",
425 .convert_local = usn_to_timestamp,
426 .convert_remote = timestamp_to_usn,
439 /* This objectClass conflicts with builtin classes on OpenLDAP */
440 const struct ldb_map_objectclass entryuuid_objectclasses[] =
443 .local_name = "subSchema",
444 .remote_name = "samba4SubSchema"
451 /* These things do not show up in wildcard searches in OpenLDAP, but
452 * we need them to show up in the AD-like view */
453 static const char * const entryuuid_wildcard_attributes[] = {
463 static const struct ldb_map_attribute nsuniqueid_attributes[] =
467 .local_name = "objectGUID",
471 .remote_name = "nsuniqueid",
472 .convert_local = guid_ns_string,
473 .convert_remote = encode_ns_guid,
479 .local_name = "objectSid",
483 .remote_name = "objectSid",
484 .convert_local = sid_always_binary,
485 .convert_remote = val_copy,
490 .local_name = "whenCreated",
494 .remote_name = "createTimestamp"
499 .local_name = "whenChanged",
503 .remote_name = "modifyTimestamp"
508 .local_name = "sambaPassword",
512 .remote_name = "userPassword"
517 .local_name = "objectCategory",
521 .remote_name = "objectCategory",
522 .convert_local = objectCategory_always_dn,
523 .convert_remote = val_copy,
528 .local_name = "distinguishedName",
532 .remote_name = "entryDN"
537 .local_name = "groupType",
541 .remote_name = "groupType",
542 .convert_local = normalise_to_signed32,
543 .convert_remote = val_copy,
548 .local_name = "sAMAccountType",
552 .remote_name = "sAMAccountType",
553 .convert_local = normalise_to_signed32,
554 .convert_remote = val_copy,
559 .local_name = "usnChanged",
563 .remote_name = "modifyTimestamp",
564 .convert_local = usn_to_timestamp,
565 .convert_remote = timestamp_to_usn,
570 .local_name = "usnCreated",
574 .remote_name = "createTimestamp",
575 .convert_local = usn_to_timestamp,
576 .convert_remote = timestamp_to_usn,
589 /* These things do not show up in wildcard searches in OpenLDAP, but
590 * we need them to show up in the AD-like view */
591 static const char * const nsuniqueid_wildcard_attributes[] = {
600 static int get_remote_rootdse(struct ldb_context *ldb, void *context,
601 struct ldb_reply *ares)
603 struct entryuuid_private *entryuuid_private;
604 entryuuid_private = talloc_get_type(context,
605 struct entryuuid_private);
606 if (ares->type == LDB_REPLY_ENTRY) {
608 struct ldb_message_element *el = ldb_msg_find_element(ares->message, "namingContexts");
609 entryuuid_private->base_dns = talloc_realloc(entryuuid_private, entryuuid_private->base_dns, struct ldb_dn *,
611 for (i=0; i < el->num_values; i++) {
612 if (!entryuuid_private->base_dns) {
613 return LDB_ERR_OPERATIONS_ERROR;
615 entryuuid_private->base_dns[i] = ldb_dn_new(entryuuid_private->base_dns, ldb, (const char *)el->values[i].data);
616 if ( ! ldb_dn_validate(entryuuid_private->base_dns[i])) {
617 return LDB_ERR_OPERATIONS_ERROR;
620 entryuuid_private->base_dns[i] = NULL;
626 static int find_base_dns(struct ldb_module *module,
627 struct entryuuid_private *entryuuid_private)
630 struct ldb_request *req;
631 const char *naming_context_attr[] = {
635 req = talloc(entryuuid_private, struct ldb_request);
637 ldb_set_errstring(module->ldb, "Out of Memory");
638 return LDB_ERR_OPERATIONS_ERROR;
641 req->operation = LDB_SEARCH;
642 req->op.search.base = ldb_dn_new(req, module->ldb, NULL);
643 req->op.search.scope = LDB_SCOPE_BASE;
645 req->op.search.tree = ldb_parse_tree(req, "objectClass=*");
646 if (req->op.search.tree == NULL) {
647 ldb_set_errstring(module->ldb, "Unable to parse search expression");
649 return LDB_ERR_OPERATIONS_ERROR;
652 req->op.search.attrs = naming_context_attr;
653 req->controls = NULL;
654 req->context = entryuuid_private;
655 req->callback = get_remote_rootdse;
656 ldb_set_timeout(module->ldb, req, 0); /* use default timeout */
658 ret = ldb_next_request(module, req);
660 if (ret == LDB_SUCCESS) {
661 ret = ldb_wait(req->handle, LDB_WAIT_ALL);
665 if (ret != LDB_SUCCESS) {
672 /* the context init function */
673 static int entryuuid_init(struct ldb_module *module)
676 struct map_private *map_private;
677 struct entryuuid_private *entryuuid_private;
679 ret = ldb_map_init(module, entryuuid_attributes, entryuuid_objectclasses, entryuuid_wildcard_attributes, "extensibleObject", NULL);
680 if (ret != LDB_SUCCESS)
683 map_private = talloc_get_type(module->private_data, struct map_private);
685 entryuuid_private = talloc_zero(map_private, struct entryuuid_private);
686 map_private->caller_private = entryuuid_private;
688 ret = find_base_dns(module, entryuuid_private);
690 return ldb_next_init(module);
693 /* the context init function */
694 static int nsuniqueid_init(struct ldb_module *module)
697 struct map_private *map_private;
698 struct entryuuid_private *entryuuid_private;
700 ret = ldb_map_init(module, nsuniqueid_attributes, NULL, nsuniqueid_wildcard_attributes, "extensibleObject", NULL);
701 if (ret != LDB_SUCCESS)
704 map_private = talloc_get_type(module->private_data, struct map_private);
706 entryuuid_private = talloc_zero(map_private, struct entryuuid_private);
707 map_private->caller_private = entryuuid_private;
709 ret = find_base_dns(module, entryuuid_private);
711 return ldb_next_init(module);
714 static int get_seq(struct ldb_context *ldb, void *context,
715 struct ldb_reply *ares)
717 unsigned long long *max_seq = (unsigned long long *)context;
718 unsigned long long seq;
719 if (ares->type == LDB_REPLY_ENTRY) {
720 struct ldb_message_element *el = ldb_msg_find_element(ares->message, "contextCSN");
722 seq = entryCSN_to_usn_int(ares, &el->values[0]);
723 *max_seq = MAX(seq, *max_seq);
730 static int entryuuid_sequence_number(struct ldb_module *module, struct ldb_request *req)
733 struct map_private *map_private;
734 struct entryuuid_private *entryuuid_private;
735 unsigned long long max_seq = 0;
736 struct ldb_request *search_req;
737 map_private = talloc_get_type(module->private_data, struct map_private);
739 entryuuid_private = talloc_get_type(map_private->caller_private, struct entryuuid_private);
741 /* Search the baseDNs for a sequence number */
742 for (i=0; entryuuid_private &&
743 entryuuid_private->base_dns &&
744 entryuuid_private->base_dns[i];
746 static const char *contextCSN_attr[] = {
749 search_req = talloc(req, struct ldb_request);
750 if (search_req == NULL) {
751 ldb_set_errstring(module->ldb, "Out of Memory");
752 return LDB_ERR_OPERATIONS_ERROR;
755 search_req->operation = LDB_SEARCH;
756 search_req->op.search.base = entryuuid_private->base_dns[i];
757 search_req->op.search.scope = LDB_SCOPE_BASE;
759 search_req->op.search.tree = ldb_parse_tree(search_req, "objectClass=*");
760 if (search_req->op.search.tree == NULL) {
761 ldb_set_errstring(module->ldb, "Unable to parse search expression");
762 talloc_free(search_req);
763 return LDB_ERR_OPERATIONS_ERROR;
766 search_req->op.search.attrs = contextCSN_attr;
767 search_req->controls = NULL;
768 search_req->context = &max_seq;
769 search_req->callback = get_seq;
770 ldb_set_timeout(module->ldb, search_req, 0); /* use default timeout */
772 ret = ldb_next_request(module, search_req);
774 if (ret == LDB_SUCCESS) {
775 ret = ldb_wait(search_req->handle, LDB_WAIT_ALL);
778 talloc_free(search_req);
779 if (ret != LDB_SUCCESS) {
784 switch (req->op.seq_num.type) {
785 case LDB_SEQ_HIGHEST_SEQ:
786 req->op.seq_num.seq_num = max_seq;
789 req->op.seq_num.seq_num = max_seq;
790 req->op.seq_num.seq_num++;
792 case LDB_SEQ_HIGHEST_TIMESTAMP:
794 req->op.seq_num.seq_num = (max_seq >> 24);
798 req->op.seq_num.flags = 0;
799 req->op.seq_num.flags |= LDB_SEQ_TIMESTAMP_SEQUENCE;
800 req->op.seq_num.flags |= LDB_SEQ_GLOBAL_SEQUENCE;
804 _PUBLIC_ const struct ldb_module_ops ldb_entryuuid_module_ops = {
806 .init_context = entryuuid_init,
807 .sequence_number = entryuuid_sequence_number,
811 _PUBLIC_ const struct ldb_module_ops ldb_nsuniqueid_module_ops = {
812 .name = "nsuniqueid",
813 .init_context = nsuniqueid_init,
814 .sequence_number = entryuuid_sequence_number,