2 Unix SMB/CIFS implementation.
4 Winbind daemon for ntdom nss module
6 Copyright (C) Tim Potter 2000
7 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
9 This library is free software; you can redistribute it and/or
10 modify it under the terms of the GNU Lesser General Public
11 License as published by the Free Software Foundation; either
12 version 3 of the License, or (at your option) any later version.
14 This library is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 Library General Public License for more details.
19 You should have received a copy of the GNU Lesser General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
26 #include "nsswitch/winbind_struct_protocol.h"
27 #include "nsswitch/libwbclient/wbclient.h"
33 #ifdef HAVE_SYS_MMAN_H
38 #define DBGC_CLASS DBGC_WINBIND
40 #define WB_REPLACE_CHAR '_'
42 /* bits for fd_event.flags */
43 #define EVENT_FD_READ 1
44 #define EVENT_FD_WRITE 2
47 struct fd_event
*next
, *prev
;
49 int flags
; /* see EVENT_FD_* flags */
50 void (*handler
)(struct fd_event
*fde
, int flags
);
53 void (*finished
)(void *private_data
, bool success
);
62 enum lsa_SidType type
;
65 struct winbindd_cli_state
{
66 struct winbindd_cli_state
*prev
, *next
; /* Linked list pointers */
67 int sock
; /* Open socket from client */
68 struct fd_event fd_event
;
69 pid_t pid
; /* pid of client */
70 bool finished
; /* Can delete from list */
71 bool write_extra_data
; /* Write extra_data field */
72 time_t last_access
; /* Time of last access (read or write) */
73 bool privileged
; /* Is the client 'privileged' */
75 TALLOC_CTX
*mem_ctx
; /* memory per request */
76 struct winbindd_request request
; /* Request from client */
77 struct winbindd_response response
; /* Respose to client */
78 bool getpwent_initialized
; /* Has getpwent_state been
80 bool getgrent_initialized
; /* Has getgrent_state been
82 struct getent_state
*getpwent_state
; /* State for getpwent() */
83 struct getent_state
*getgrent_state
; /* State for getgrent() */
86 /* State between get{pw,gr}ent() calls */
89 struct getent_state
*prev
, *next
;
91 uint32 sam_entry_index
, num_sam_entries
;
96 /* Storage for cached getpwent() user entries */
98 struct getpwent_user
{
99 fstring name
; /* Account name */
100 fstring gecos
; /* User information */
101 fstring homedir
; /* User Home Directory */
102 fstring shell
; /* User Login Shell */
103 DOM_SID user_sid
; /* NT user and primary group SIDs */
107 /* Server state structure */
114 gid_t primary_gid
; /* allow the nss_info
115 backend to set the primary group */
116 DOM_SID user_sid
; /* NT user and primary group SIDs */
120 /* Our connection to the DC */
122 struct winbindd_cm_conn
{
123 struct cli_state
*cli
;
125 struct rpc_pipe_client
*samr_pipe
;
126 POLICY_HND sam_connect_handle
, sam_domain_handle
;
128 struct rpc_pipe_client
*lsa_pipe
;
129 POLICY_HND lsa_policy
;
131 struct rpc_pipe_client
*netlogon_pipe
;
134 struct winbindd_async_request
;
138 struct winbindd_domain
;
140 struct winbindd_child_dispatch_table
{
142 enum winbindd_cmd struct_cmd
;
143 enum winbindd_result (*struct_fn
)(struct winbindd_domain
*domain
,
144 struct winbindd_cli_state
*state
);
147 struct winbindd_child
{
148 struct winbindd_child
*next
, *prev
;
151 struct winbindd_domain
*domain
;
154 struct fd_event event
;
155 struct timed_event
*lockout_policy_event
;
156 struct winbindd_async_request
*requests
;
158 const struct winbindd_child_dispatch_table
*table
;
161 /* Structures to hold per domain information */
163 struct winbindd_domain
{
164 fstring name
; /* Domain name (NetBIOS) */
165 fstring alt_name
; /* alt Domain name, if any (FQDN for ADS) */
166 fstring forest_name
; /* Name of the AD forest we're in */
167 DOM_SID sid
; /* SID for this domain */
168 uint32 domain_flags
; /* Domain flags from netlogon.h */
169 uint32 domain_type
; /* Domain type from netlogon.h */
170 uint32 domain_trust_attribs
; /* Trust attribs from netlogon.h */
171 bool initialized
; /* Did we already ask for the domain mode? */
172 bool native_mode
; /* is this a win2k domain in native mode ? */
173 bool active_directory
; /* is this a win2k active directory ? */
174 bool primary
; /* is this our primary domain ? */
175 bool internal
; /* BUILTIN and member SAM */
176 bool online
; /* is this domain available ? */
177 time_t startup_time
; /* When we set "startup" true. */
178 bool startup
; /* are we in the first 30 seconds after startup_time ? */
180 bool can_do_samlogon_ex
; /* Due to the lack of finer control what type
181 * of DC we have, let us try to do a
182 * credential-chain less samlogon_ex call
183 * with AD and schannel. If this fails with
184 * DCERPC_FAULT_OP_RNG_ERROR, then set this
185 * to False. This variable is around so that
186 * we don't have to try _ex every time. */
188 /* Lookup methods for this domain (LDAP or RPC) */
189 struct winbindd_methods
*methods
;
191 /* the backend methods are used by the cache layer to find the right
193 struct winbindd_methods
*backend
;
195 /* Private data for the backends (used for connection cache) */
200 * idmap config settings, used to tell the idmap child which
201 * special domain config to use for a mapping
203 bool have_idmap_config
;
204 uint32_t id_range_low
, id_range_high
;
208 struct sockaddr_storage dcaddr
;
210 /* Sequence number stuff */
212 time_t last_seq_check
;
213 uint32 sequence_number
;
214 NTSTATUS last_status
;
216 /* The smb connection */
218 struct winbindd_cm_conn conn
;
220 /* The child pid we're talking to */
222 struct winbindd_child child
;
224 /* Callback we use to try put us back online. */
226 uint32 check_online_timeout
;
227 struct timed_event
*check_online_event
;
229 /* Linked list info */
231 struct winbindd_domain
*prev
, *next
;
234 /* per-domain methods. This is how LDAP vs RPC is selected
236 struct winbindd_methods
{
237 /* does this backend provide a consistent view of the data? (ie. is the primary group
241 /* get a list of users, returning a WINBIND_USERINFO for each one */
242 NTSTATUS (*query_user_list
)(struct winbindd_domain
*domain
,
245 WINBIND_USERINFO
**info
);
247 /* get a list of domain groups */
248 NTSTATUS (*enum_dom_groups
)(struct winbindd_domain
*domain
,
251 struct acct_info
**info
);
253 /* get a list of domain local groups */
254 NTSTATUS (*enum_local_groups
)(struct winbindd_domain
*domain
,
257 struct acct_info
**info
);
259 /* convert one user or group name to a sid */
260 NTSTATUS (*name_to_sid
)(struct winbindd_domain
*domain
,
262 enum winbindd_cmd orig_cmd
,
263 const char *domain_name
,
266 enum lsa_SidType
*type
);
268 /* convert a sid to a user or group name */
269 NTSTATUS (*sid_to_name
)(struct winbindd_domain
*domain
,
274 enum lsa_SidType
*type
);
276 NTSTATUS (*rids_to_names
)(struct winbindd_domain
*domain
,
278 const DOM_SID
*domain_sid
,
283 enum lsa_SidType
**types
);
285 /* lookup user info for a given SID */
286 NTSTATUS (*query_user
)(struct winbindd_domain
*domain
,
288 const DOM_SID
*user_sid
,
289 WINBIND_USERINFO
*user_info
);
291 /* lookup all groups that a user is a member of. The backend
292 can also choose to lookup by username or rid for this
294 NTSTATUS (*lookup_usergroups
)(struct winbindd_domain
*domain
,
296 const DOM_SID
*user_sid
,
297 uint32
*num_groups
, DOM_SID
**user_gids
);
299 /* Lookup all aliases that the sids delivered are member of. This is
300 * to implement 'domain local groups' correctly */
301 NTSTATUS (*lookup_useraliases
)(struct winbindd_domain
*domain
,
306 uint32
**alias_rids
);
308 /* find all members of the group with the specified group_rid */
309 NTSTATUS (*lookup_groupmem
)(struct winbindd_domain
*domain
,
311 const DOM_SID
*group_sid
,
313 DOM_SID
**sid_mem
, char ***names
,
314 uint32
**name_types
);
316 /* return the current global sequence number */
317 NTSTATUS (*sequence_number
)(struct winbindd_domain
*domain
, uint32
*seq
);
319 /* return the lockout policy */
320 NTSTATUS (*lockout_policy
)(struct winbindd_domain
*domain
,
322 struct samr_DomInfo12
*lockout_policy
);
324 /* return the lockout policy */
325 NTSTATUS (*password_policy
)(struct winbindd_domain
*domain
,
327 struct samr_DomInfo1
*password_policy
);
329 /* enumerate trusted domains */
330 NTSTATUS (*trusted_domains
)(struct winbindd_domain
*domain
,
338 /* Used to glue a policy handle and cli_state together */
341 struct cli_state
*cli
;
345 /* Filled out by IDMAP backends */
346 struct winbindd_idmap_methods
{
347 /* Called when backend is first loaded */
350 bool (*get_sid_from_uid
)(uid_t uid
, DOM_SID
*sid
);
351 bool (*get_sid_from_gid
)(gid_t gid
, DOM_SID
*sid
);
353 bool (*get_uid_from_sid
)(DOM_SID
*sid
, uid_t
*uid
);
354 bool (*get_gid_from_sid
)(DOM_SID
*sid
, gid_t
*gid
);
356 /* Called when backend is unloaded */
358 /* Called to dump backend status */
359 void (*status
)(void);
362 /* Data structures for dealing with the trusted domain cache */
364 struct winbindd_tdc_domain
{
365 const char *domain_name
;
366 const char *dns_name
;
369 uint32 trust_attribs
;
373 /* Switch for listing users or groups */
379 #include "winbindd/winbindd_proto.h"
381 #define WINBINDD_ESTABLISH_LOOP 30
382 #define WINBINDD_RESCAN_FREQ lp_winbind_cache_time()
383 #define WINBINDD_PAM_AUTH_KRB5_RENEW_TIME 2592000 /* one month */
384 #define DOM_SEQUENCE_NONE ((uint32)-1)
386 #define IS_DOMAIN_OFFLINE(x) ( lp_winbind_offline_logon() && \
387 ( get_global_winbindd_state_offline() \
389 #define IS_DOMAIN_ONLINE(x) (!IS_DOMAIN_OFFLINE(x))
391 #endif /* _WINBINDD_H */