xref: /titanic_51/usr/src/cmd/idmap/idmapd/idmapd.h (revision b3700b074e637f8c6991b70754c88a2cfffb246b)
1c5c4113dSnw141292 /*
2c5c4113dSnw141292  * CDDL HEADER START
3c5c4113dSnw141292  *
4c5c4113dSnw141292  * The contents of this file are subject to the terms of the
5c5c4113dSnw141292  * Common Development and Distribution License (the "License").
6c5c4113dSnw141292  * You may not use this file except in compliance with the License.
7c5c4113dSnw141292  *
8c5c4113dSnw141292  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9c5c4113dSnw141292  * or http://www.opensolaris.org/os/licensing.
10c5c4113dSnw141292  * See the License for the specific language governing permissions
11c5c4113dSnw141292  * and limitations under the License.
12c5c4113dSnw141292  *
13c5c4113dSnw141292  * When distributing Covered Code, include this CDDL HEADER in each
14c5c4113dSnw141292  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15c5c4113dSnw141292  * If applicable, add the following below this CDDL HEADER, with the
16c5c4113dSnw141292  * fields enclosed by brackets "[]" replaced with your own identifying
17c5c4113dSnw141292  * information: Portions Copyright [yyyy] [name of copyright owner]
18c5c4113dSnw141292  *
19c5c4113dSnw141292  * CDDL HEADER END
20c5c4113dSnw141292  */
21c5c4113dSnw141292 /*
22148c5f43SAlan Wright  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23*b3700b07SGordon Ross  * Copyright 2014 Nexenta Systems, Inc.  All rights reserved.
24c5c4113dSnw141292  */
25c5c4113dSnw141292 
26c5c4113dSnw141292 #ifndef _IDMAPD_H
27c5c4113dSnw141292 #define	_IDMAPD_H
28c5c4113dSnw141292 
29c5c4113dSnw141292 #include <stdio.h>
30c5c4113dSnw141292 #include <stdlib.h>
31c5c4113dSnw141292 #include <stdarg.h>
32c5c4113dSnw141292 #include <rpc/rpc.h>
33c5c4113dSnw141292 #include <synch.h>
34c5c4113dSnw141292 #include <thread.h>
35c5c4113dSnw141292 #include <libintl.h>
36c5c4113dSnw141292 #include <strings.h>
3791d7f85eSGordon Ross #include <sqlite-sys/sqlite.h>
387a8a68f5SJulian Pullen #include <syslog.h>
39c5c4113dSnw141292 #include <inttypes.h>
409b214d32SJordan Brown #include <rpcsvc/idmap_prot.h>
41c5c4113dSnw141292 #include "adutils.h"
427a8a68f5SJulian Pullen #include "idmap_priv.h"
43c5c4113dSnw141292 #include "idmap_config.h"
442b4a7802SBaban Kenkre #include "libadutils.h"
45c5c4113dSnw141292 
46c5c4113dSnw141292 #ifdef __cplusplus
47c5c4113dSnw141292 extern "C" {
48c5c4113dSnw141292 #endif
49c5c4113dSnw141292 
50479ac375Sdm199847 #define	CHECK_NULL(s)	(s != NULL ? s : "null")
51c5c4113dSnw141292 
52c5c4113dSnw141292 extern mutex_t _svcstate_lock;	/* lock for _rpcsvcstate, _rpcsvccount */
53c5c4113dSnw141292 
54e8c27ec8Sbaban typedef enum idmap_namemap_mode {
55e8c27ec8Sbaban 	IDMAP_NM_NONE = 0,
56e8c27ec8Sbaban 	IDMAP_NM_AD,
57e8c27ec8Sbaban 	IDMAP_NM_NLDAP,
58e8c27ec8Sbaban 	IDMAP_NM_MIXED
59e8c27ec8Sbaban } idmap_namemap_mode_t;
60e8c27ec8Sbaban 
61c5c4113dSnw141292 /*
62148c5f43SAlan Wright  * Debugging output.
63148c5f43SAlan Wright  *
64148c5f43SAlan Wright  * There are some number of areas - configuration, mapping, discovery, et
65148c5f43SAlan Wright  * cetera - and for each area there is a verbosity level controlled through
66148c5f43SAlan Wright  * an SMF property.  The default is zero, and "debug/all" provides a master
67148c5f43SAlan Wright  * control allowing you to turn on all debugging output with one setting.
68148c5f43SAlan Wright  *
69148c5f43SAlan Wright  * A typical debugging output sequence would look like
70148c5f43SAlan Wright  *
71148c5f43SAlan Wright  * 	if (DBG(CONFIG, 2)) {
72148c5f43SAlan Wright  *		idmapdlog(LOG_DEBUG,
73148c5f43SAlan Wright  *		    "some message about config at verbosity 2");
74148c5f43SAlan Wright  *	}
75148c5f43SAlan Wright  */
76148c5f43SAlan Wright enum idmapd_debug {
77148c5f43SAlan Wright 	IDMAPD_DEBUG_ALL = 0,
78148c5f43SAlan Wright 	IDMAPD_DEBUG_CONFIG = 1,
79148c5f43SAlan Wright 	IDMAPD_DEBUG_MAPPING = 2,
80148c5f43SAlan Wright 	IDMAPD_DEBUG_DISC = 3,
81148c5f43SAlan Wright 	IDMAPD_DEBUG_DNS = 4,
82148c5f43SAlan Wright 	IDMAPD_DEBUG_LDAP = 5,
83148c5f43SAlan Wright 	IDMAPD_DEBUG_MAX = 5
84148c5f43SAlan Wright };
85148c5f43SAlan Wright 
86148c5f43SAlan Wright #define	DBG(type, lev)	\
87148c5f43SAlan Wright 	(_idmapdstate.debug[IDMAPD_DEBUG_##type] >= (lev) || \
88148c5f43SAlan Wright 	    _idmapdstate.debug[IDMAPD_DEBUG_ALL] >= (lev))
89148c5f43SAlan Wright 
90148c5f43SAlan Wright /*
91c5c4113dSnw141292  * Global state of idmapd daemon.
92c5c4113dSnw141292  */
93c5c4113dSnw141292 typedef struct idmapd_state {
94c5c4113dSnw141292 	rwlock_t	rwlk_cfg;		/* config lock */
95c5c4113dSnw141292 	idmap_cfg_t	*cfg;			/* config */
9671590c90Snw141292 	bool_t		daemon_mode;
97c5c4113dSnw141292 	char		hostname[MAX_NAME_LEN];	/* my hostname */
98c5c4113dSnw141292 	uid_t		next_uid;
99c5c4113dSnw141292 	gid_t		next_gid;
100c5c4113dSnw141292 	uid_t		limit_uid;
101c5c4113dSnw141292 	gid_t		limit_gid;
102c5c4113dSnw141292 	int		new_eph_db;	/* was the ephem ID db [re-]created? */
103e3f2c991SKeyur Desai 	int		num_gcs;
104e3f2c991SKeyur Desai 	adutils_ad_t	**gcs;
105e3f2c991SKeyur Desai 	int		num_dcs;
106e3f2c991SKeyur Desai 	adutils_ad_t	**dcs;
107*b3700b07SGordon Ross 	mutex_t		addisc_lk;
108*b3700b07SGordon Ross 	cond_t		addisc_cv;
109*b3700b07SGordon Ross 	int		addisc_st;
110148c5f43SAlan Wright 	int		debug[IDMAPD_DEBUG_MAX+1];
111c5c4113dSnw141292 } idmapd_state_t;
112c5c4113dSnw141292 extern idmapd_state_t	_idmapdstate;
113c5c4113dSnw141292 
114*b3700b07SGordon Ross #define	ADDISC_ST_REQUESTED	1
115*b3700b07SGordon Ross #define	ADDISC_ST_RUNNING	2
116*b3700b07SGordon Ross 
117c5c4113dSnw141292 #define	RDLOCK_CONFIG() \
118c5c4113dSnw141292 	(void) rw_rdlock(&_idmapdstate.rwlk_cfg);
119c5c4113dSnw141292 #define	WRLOCK_CONFIG() \
120c5c4113dSnw141292 	(void) rw_wrlock(&_idmapdstate.rwlk_cfg);
121c5c4113dSnw141292 #define	UNLOCK_CONFIG() \
122c5c4113dSnw141292 	(void) rw_unlock(&_idmapdstate.rwlk_cfg);
123c5c4113dSnw141292 
12462c60062Sbaban typedef struct hashentry {
12562c60062Sbaban 	uint_t	key;
12662c60062Sbaban 	uint_t	next;
12762c60062Sbaban } hashentry_t;
12862c60062Sbaban 
129c5c4113dSnw141292 typedef struct lookup_state {
130c5c4113dSnw141292 	bool_t			sid2pid_done;
131c5c4113dSnw141292 	bool_t			pid2sid_done;
132c5c4113dSnw141292 	int			ad_nqueries;
133e8c27ec8Sbaban 	int			nldap_nqueries;
1344aa0a5e7Snw141292 	bool_t			eph_map_unres_sids;
135e3f2c991SKeyur Desai 	int			directory_based_mapping;	/* enum */
13648cd229bSGordon Ross 	uint_t			id_cache_timeout;
13748cd229bSGordon Ross 	uint_t			name_cache_timeout;
13862c60062Sbaban 	uint_t			curpos;
13962c60062Sbaban 	hashentry_t		*sid_history;
14062c60062Sbaban 	uint_t			sid_history_size;
14162c60062Sbaban 	idmap_mapping_batch	*batch;
14262c60062Sbaban 	idmap_ids_res		*result;
143e8c27ec8Sbaban 	idmap_namemap_mode_t	nm_siduid;
144e8c27ec8Sbaban 	idmap_namemap_mode_t	nm_sidgid;
145e8c27ec8Sbaban 	char			*ad_unixuser_attr;
146e8c27ec8Sbaban 	char			*ad_unixgroup_attr;
147479ac375Sdm199847 	char			*nldap_winname_attr;
148479ac375Sdm199847 	char			*defdom;
149479ac375Sdm199847 	sqlite			*cache;
150479ac375Sdm199847 	sqlite			*db;
151c5c4113dSnw141292 } lookup_state_t;
152c5c4113dSnw141292 
153e8c27ec8Sbaban #define	NLDAP_OR_MIXED(nm) \
1541fdeec65Sjoyce mcintosh 	((nm) == IDMAP_NM_NLDAP || (nm) == IDMAP_NM_MIXED)
155e8c27ec8Sbaban #define	AD_OR_MIXED(nm) \
1561fdeec65Sjoyce mcintosh 	((nm) == IDMAP_NM_AD || (nm) == IDMAP_NM_MIXED)
1571fdeec65Sjoyce mcintosh 
1581fdeec65Sjoyce mcintosh #define	PID_UID_OR_UNKNOWN(pidtype) \
1591fdeec65Sjoyce mcintosh 	((pidtype) == IDMAP_UID || (pidtype) == IDMAP_POSIXID)
1601fdeec65Sjoyce mcintosh #define	PID_GID_OR_UNKNOWN(pidtype) \
1611fdeec65Sjoyce mcintosh 	((pidtype) == IDMAP_GID || (pidtype) == IDMAP_POSIXID)
162e8c27ec8Sbaban 
163e8c27ec8Sbaban #define	NLDAP_OR_MIXED_MODE(pidtype, ls) \
1641fdeec65Sjoyce mcintosh 	(NLDAP_MODE(pidtype, ls) || MIXED_MODE(pidtype, ls))
165e8c27ec8Sbaban #define	AD_OR_MIXED_MODE(pidtype, ls)\
1661fdeec65Sjoyce mcintosh 	(AD_MODE(pidtype, ls) || MIXED_MODE(pidtype, ls))
167e8c27ec8Sbaban #define	NLDAP_MODE(pidtype, ls) \
1681fdeec65Sjoyce mcintosh 	((PID_UID_OR_UNKNOWN(pidtype) && (ls)->nm_siduid == IDMAP_NM_NLDAP) || \
1691fdeec65Sjoyce mcintosh 	(PID_GID_OR_UNKNOWN(pidtype) && (ls)->nm_sidgid == IDMAP_NM_NLDAP))
170e8c27ec8Sbaban #define	AD_MODE(pidtype, ls) \
1711fdeec65Sjoyce mcintosh 	((PID_UID_OR_UNKNOWN(pidtype) && (ls)->nm_siduid == IDMAP_NM_AD) || \
1721fdeec65Sjoyce mcintosh 	(PID_GID_OR_UNKNOWN(pidtype) && (ls)->nm_sidgid == IDMAP_NM_AD))
173e8c27ec8Sbaban #define	MIXED_MODE(pidtype, ls) \
1741fdeec65Sjoyce mcintosh 	((PID_UID_OR_UNKNOWN(pidtype) && (ls)->nm_siduid == IDMAP_NM_MIXED) || \
1751fdeec65Sjoyce mcintosh 	(PID_GID_OR_UNKNOWN(pidtype) && (ls)->nm_sidgid == IDMAP_NM_MIXED))
176e8c27ec8Sbaban 
177e8c27ec8Sbaban 
178c5c4113dSnw141292 typedef struct list_cb_data {
179c5c4113dSnw141292 	void		*result;
180c5c4113dSnw141292 	uint64_t	next;
181c5c4113dSnw141292 	uint64_t	len;
182c5c4113dSnw141292 	uint64_t	limit;
18348258c6bSjp151216 	int		flag;
184c5c4113dSnw141292 } list_cb_data_t;
185c5c4113dSnw141292 
186c5c4113dSnw141292 typedef struct msg_table {
187c5c4113dSnw141292 	idmap_retcode	retcode;
188c5c4113dSnw141292 	const char	*msg;
189c5c4113dSnw141292 } msg_table_t;
190c5c4113dSnw141292 
1911fcced4cSJordan Brown /*
1921fcced4cSJordan Brown  * Data structure to store well-known SIDs and
1931fcced4cSJordan Brown  * associated mappings (if any)
1941fcced4cSJordan Brown  */
1951fcced4cSJordan Brown typedef struct wksids_table {
1961fcced4cSJordan Brown 	const char	*sidprefix;
1971fcced4cSJordan Brown 	uint32_t	rid;
1981fcced4cSJordan Brown 	const char	*domain;
1991fcced4cSJordan Brown 	const char	*winname;
2001fcced4cSJordan Brown 	int		is_wuser;
201e3f2c991SKeyur Desai 	posix_id_t	pid;
2021fcced4cSJordan Brown 	int		is_user;
2031fcced4cSJordan Brown 	int		direction;
2041fcced4cSJordan Brown } wksids_table_t;
2051fcced4cSJordan Brown 
2060dcc7149Snw141292 #define	IDMAPD_SEARCH_TIMEOUT		3   /* seconds */
2070dcc7149Snw141292 #define	IDMAPD_LDAP_OPEN_TIMEOUT	1   /* secs; initial, w/ exp backoff */
2080dcc7149Snw141292 
20962c60062Sbaban /*
210e8c27ec8Sbaban  * The following flags are used by idmapd while processing a
211e8c27ec8Sbaban  * given mapping request. Note that idmapd uses multiple passes to
212e8c27ec8Sbaban  * process the request and the flags are used to pass information
213e8c27ec8Sbaban  * about the state of the request between these passes.
21462c60062Sbaban  */
215c5c4113dSnw141292 
216e8c27ec8Sbaban /* Initial state. Done. Reset all flags. Remaining passes can be skipped */
217c5c4113dSnw141292 #define	_IDMAP_F_DONE			0x00000000
218e8c27ec8Sbaban /* Set when subsequent passes are required */
219e8c27ec8Sbaban #define	_IDMAP_F_NOTDONE		0x00000001
220e8c27ec8Sbaban /* Don't update name_cache. (e.g. set when winname,SID found in name_cache) */
221e8c27ec8Sbaban #define	_IDMAP_F_DONT_UPDATE_NAMECACHE	0x00000002
222e8c27ec8Sbaban /* Batch this request for AD lookup */
223e8c27ec8Sbaban #define	_IDMAP_F_LOOKUP_AD		0x00000004
224e8c27ec8Sbaban /* Batch this request for nldap directory lookup */
225e8c27ec8Sbaban #define	_IDMAP_F_LOOKUP_NLDAP		0x00000008
226e8c27ec8Sbaban /*
227e8c27ec8Sbaban  * Expired ephemeral mapping found in cache when processing sid2uid request.
228e8c27ec8Sbaban  * Use it if the given SID cannot be mapped by name
229e8c27ec8Sbaban  */
230e8c27ec8Sbaban #define	_IDMAP_F_EXP_EPH_UID		0x00000010
231e8c27ec8Sbaban /* Same as above. Used for sid2gid request */
232e8c27ec8Sbaban #define	_IDMAP_F_EXP_EPH_GID		0x00000020
2334d61c878SJulian Pullen /* This request is not valid for the current forest */
2344d61c878SJulian Pullen #define	_IDMAP_F_LOOKUP_OTHER_AD	0x00000040
2354d61c878SJulian Pullen 
236e8c27ec8Sbaban 
237e8c27ec8Sbaban /*
238e8c27ec8Sbaban  * Check if we are done. If so, subsequent passes can be skipped
239e8c27ec8Sbaban  * when processing a given mapping request.
240e8c27ec8Sbaban  */
241e8c27ec8Sbaban #define	ARE_WE_DONE(f)	((f & _IDMAP_F_NOTDONE) == 0)
242c5c4113dSnw141292 
243c5c4113dSnw141292 #define	SIZE_INCR	5
244c5c4113dSnw141292 #define	MAX_TRIES	5
245c5c4113dSnw141292 #define	IDMAP_DBDIR	"/var/idmap"
246c5c4113dSnw141292 #define	IDMAP_CACHEDIR	"/var/run/idmap"
247c5c4113dSnw141292 #define	IDMAP_DBNAME	IDMAP_DBDIR "/idmap.db"
248c5c4113dSnw141292 #define	IDMAP_CACHENAME	IDMAP_CACHEDIR "/idmap.db"
2498e228215Sdm199847 
250148c5f43SAlan Wright #define	IS_ID_NONE(id)	\
251148c5f43SAlan Wright 	((id).idtype == IDMAP_NONE)
252cd37da74Snw141292 
253fe1c642dSBill Krier #define	IS_ID_SID(id)	\
254fe1c642dSBill Krier 	((id).idtype == IDMAP_SID ||	\
255fe1c642dSBill Krier 	(id).idtype == IDMAP_USID ||	\
256fe1c642dSBill Krier 	(id).idtype == IDMAP_GSID)	\
257fe1c642dSBill Krier 
258148c5f43SAlan Wright #define	IS_ID_UID(id)	\
259148c5f43SAlan Wright 	((id).idtype == IDMAP_UID)
260cd37da74Snw141292 
261148c5f43SAlan Wright #define	IS_ID_GID(id)	\
262148c5f43SAlan Wright 	((id).idtype == IDMAP_GID)
263cd37da74Snw141292 
264148c5f43SAlan Wright #define	IS_ID_POSIX(id)	\
265148c5f43SAlan Wright 	((id).idtype == IDMAP_UID ||	\
266148c5f43SAlan Wright 	(id).idtype == IDMAP_GID ||	\
267148c5f43SAlan Wright 	(id).idtype == IDMAP_POSIXID)	\
268cd37da74Snw141292 
2691fcced4cSJordan Brown /*
2701fcced4cSJordan Brown  * Local RID ranges
2711fcced4cSJordan Brown  */
2721fcced4cSJordan Brown #define	LOCALRID_UID_MIN	1000U
2731fcced4cSJordan Brown #define	LOCALRID_UID_MAX	((uint32_t)INT32_MAX)
2741fcced4cSJordan Brown #define	LOCALRID_GID_MIN	(((uint32_t)INT32_MAX) + 1)
2751fcced4cSJordan Brown #define	LOCALRID_GID_MAX	UINT32_MAX
2761fcced4cSJordan Brown 
277148c5f43SAlan Wright /*
278148c5f43SAlan Wright  * Tracing.
279148c5f43SAlan Wright  *
280148c5f43SAlan Wright  * The tracing mechanism is intended to help the administrator understand
281148c5f43SAlan Wright  * why their mapping configuration is doing what it is.  Each interesting
282148c5f43SAlan Wright  * decision point during the mapping process calls TRACE() with the current
283148c5f43SAlan Wright  * request and response and a printf-style message.  The message, plus
284148c5f43SAlan Wright  * data from the request and the response, is logged to the service log
285148c5f43SAlan Wright  * (if debug/mapping is greater than zero) or reported to the caller
286148c5f43SAlan Wright  * (if IDMAP_REQ_FLG_TRACE was set in the request.  The primary consumer
287148c5f43SAlan Wright  * is the "-V" option to "idmap show".
288148c5f43SAlan Wright  *
289148c5f43SAlan Wright  * TRACING(req) says whether tracing is appropriate for the request, and
290148c5f43SAlan Wright  * is used to determine and record whether any request in a batch requested
291148c5f43SAlan Wright  * tracing, to control whether later code loops over the batch to do tracing
292148c5f43SAlan Wright  * for any of the requests.
293148c5f43SAlan Wright  *
294148c5f43SAlan Wright  * TRACE(req, res, fmt, ...) generates a trace entry if appropriate.
295148c5f43SAlan Wright  */
296148c5f43SAlan Wright #define	TRACING(req)	\
297148c5f43SAlan Wright 	(DBG(MAPPING, 1) ||	\
298148c5f43SAlan Wright 	((req)->flag & IDMAP_REQ_FLG_TRACE) != 0)
299148c5f43SAlan Wright #define	TRACE(req, res, ...)			\
300148c5f43SAlan Wright 	((void)(TRACING(req) && trace(req, res, __VA_ARGS__)))
301148c5f43SAlan Wright extern int	trace(idmap_mapping *req, idmap_id_res *res, char *fmt, ...);
302148c5f43SAlan Wright 
303c5c4113dSnw141292 typedef idmap_retcode (*update_list_res_cb)(void *, const char **, uint64_t);
304c5c4113dSnw141292 typedef int (*list_svc_cb)(void *, int, char **, char **);
305c5c4113dSnw141292 
306c5c4113dSnw141292 extern void	idmap_prog_1(struct svc_req *, register SVCXPRT *);
307c5c4113dSnw141292 extern void	idmapdlog(int, const char *, ...);
308c5c4113dSnw141292 extern int	init_mapping_system();
309c5c4113dSnw141292 extern void	fini_mapping_system();
310c5c4113dSnw141292 extern void	print_idmapdstate();
311c5c4113dSnw141292 extern int	create_directory(const char *, uid_t, gid_t);
312c5c4113dSnw141292 extern int	load_config();
313349d5d8fSnw141292 extern void	reload_ad();
314148c5f43SAlan Wright extern void	idmap_init_tsd_key(void);
315349d5d8fSnw141292 extern void	degrade_svc(int, const char *);
316c8e26105Sjp151216 extern void	restore_svc(void);
317*b3700b07SGordon Ross extern void	notify_dc_changed(void);
318c5c4113dSnw141292 
319c5c4113dSnw141292 
320c5c4113dSnw141292 extern int		init_dbs();
321c5c4113dSnw141292 extern void		fini_dbs();
322c5c4113dSnw141292 extern idmap_retcode	get_db_handle(sqlite **);
323c5c4113dSnw141292 extern idmap_retcode	get_cache_handle(sqlite **);
32471590c90Snw141292 extern idmap_retcode	sql_exec_no_cb(sqlite *, const char *, char *);
325c5c4113dSnw141292 extern idmap_retcode	add_namerule(sqlite *, idmap_namerule *);
326c5c4113dSnw141292 extern idmap_retcode	rm_namerule(sqlite *, idmap_namerule *);
327cd37da74Snw141292 extern idmap_retcode	flush_namerules(sqlite *);
328c5c4113dSnw141292 
329cd37da74Snw141292 extern char 		*tolower_u8(const char *);
330cd37da74Snw141292 
331cd37da74Snw141292 extern idmap_retcode	gen_sql_expr_from_rule(idmap_namerule *, char **);
332c5c4113dSnw141292 extern idmap_retcode	validate_list_cb_data(list_cb_data_t *, int,
333c5c4113dSnw141292 				char **, int, uchar_t **, size_t);
33471590c90Snw141292 extern idmap_retcode	process_list_svc_sql(sqlite *, const char *, char *,
33548258c6bSjp151216 				uint64_t, int, list_svc_cb, void *);
336479ac375Sdm199847 extern idmap_retcode	sid2pid_first_pass(lookup_state_t *,
337c5c4113dSnw141292 				idmap_mapping *, idmap_id_res *);
338479ac375Sdm199847 extern idmap_retcode	sid2pid_second_pass(lookup_state_t *,
339479ac375Sdm199847 				idmap_mapping *, idmap_id_res *);
340479ac375Sdm199847 extern idmap_retcode	pid2sid_first_pass(lookup_state_t *,
341fe1c642dSBill Krier 				idmap_mapping *, idmap_id_res *, int);
342479ac375Sdm199847 extern idmap_retcode	pid2sid_second_pass(lookup_state_t *,
343479ac375Sdm199847 				idmap_mapping *, idmap_id_res *, int);
344479ac375Sdm199847 extern idmap_retcode	update_cache_sid2pid(lookup_state_t *,
345c5c4113dSnw141292 				idmap_mapping *, idmap_id_res *);
346479ac375Sdm199847 extern idmap_retcode	update_cache_pid2sid(lookup_state_t *,
347c5c4113dSnw141292 				idmap_mapping *, idmap_id_res *);
348c5c4113dSnw141292 extern idmap_retcode	get_u2w_mapping(sqlite *, sqlite *, idmap_mapping *,
349c5c4113dSnw141292 				idmap_mapping *, int);
350c5c4113dSnw141292 extern idmap_retcode	get_w2u_mapping(sqlite *, sqlite *, idmap_mapping *,
351c5c4113dSnw141292 				idmap_mapping *);
352479ac375Sdm199847 extern idmap_retcode	load_cfg_in_state(lookup_state_t *);
353e8c27ec8Sbaban extern void		cleanup_lookup_state(lookup_state_t *);
354c5c4113dSnw141292 
355e8c27ec8Sbaban extern idmap_retcode	ad_lookup_batch(lookup_state_t *,
356c5c4113dSnw141292 				idmap_mapping_batch *, idmap_ids_res *);
357479ac375Sdm199847 extern idmap_retcode	lookup_name2sid(sqlite *, const char *, const char *,
358148c5f43SAlan Wright 				int, char **, char **, char **,
359148c5f43SAlan Wright 				idmap_rid_t *, idmap_id_type *,
360148c5f43SAlan Wright 				idmap_mapping *, int);
36108f0d8daSafshin salek ardakani - Sun Microsystems - Irvine United States extern idmap_retcode	lookup_wksids_name2sid(const char *, const char *,
36208f0d8daSafshin salek ardakani - Sun Microsystems - Irvine United States 				char **, char **, char **, idmap_rid_t *,
363148c5f43SAlan Wright 				idmap_id_type *);
3649fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States extern idmap_retcode	idmap_cache_flush(idmap_flush_op);
3657a8a68f5SJulian Pullen 
366e3f2c991SKeyur Desai extern const wksids_table_t *find_wksid_by_pid(posix_id_t pid, int is_user);
3671fcced4cSJordan Brown extern const wksids_table_t *find_wksid_by_sid(const char *sid, int rid,
368148c5f43SAlan Wright     idmap_id_type type);
3691fcced4cSJordan Brown extern const wksids_table_t *find_wksid_by_name(const char *name,
370148c5f43SAlan Wright     const char *domain, idmap_id_type type);
3711fcced4cSJordan Brown extern const wksids_table_t *find_wk_by_sid(char *sid);
3721fcced4cSJordan Brown 
373c5c4113dSnw141292 #ifdef __cplusplus
374c5c4113dSnw141292 }
375c5c4113dSnw141292 #endif
376c5c4113dSnw141292 
377c5c4113dSnw141292 #endif /* _IDMAPD_H */
378