winbind: Keep "force_reauth" in invalidate_cm_connection
[Samba.git] / source3 / passdb / pdb_ldap_util.c
blob35a379c577d638abaf73d6d0da1c2f98e912b3ad
1 /*
2 Unix SMB/CIFS mplementation.
3 LDAP protocol helper functions for SAMBA
4 Copyright (C) Jean François Micouleau 1998
5 Copyright (C) Gerald Carter 2001-2003
6 Copyright (C) Shahms King 2001
7 Copyright (C) Andrew Bartlett 2002-2003
8 Copyright (C) Stefan (metze) Metzmacher 2002-2003
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include "includes.h"
26 #include "smbldap.h"
27 #include "passdb.h"
28 #include "passdb/pdb_ldap_util.h"
29 #include "passdb/pdb_ldap_schema.h"
31 /**********************************************************************
32 Add the account-policies below the sambaDomain object to LDAP,
33 *********************************************************************/
35 static NTSTATUS add_new_domain_account_policies(struct smbldap_state *ldap_state,
36 const char *domain_name)
38 NTSTATUS ntstatus = NT_STATUS_UNSUCCESSFUL;
39 int i, rc;
40 uint32_t policy_default;
41 const char *policy_attr = NULL;
42 char *dn = NULL;
43 LDAPMod **mods = NULL;
44 char *escape_domain_name;
46 DEBUG(3,("add_new_domain_account_policies: Adding new account policies for domain\n"));
48 escape_domain_name = escape_rdn_val_string_alloc(domain_name);
49 if (!escape_domain_name) {
50 DEBUG(0, ("Out of memory!\n"));
51 return NT_STATUS_NO_MEMORY;
54 if (asprintf(&dn, "%s=%s,%s",
55 get_attr_key2string(dominfo_attr_list, LDAP_ATTR_DOMAIN),
56 escape_domain_name, lp_ldap_suffix(talloc_tos())) < 0) {
57 SAFE_FREE(escape_domain_name);
58 return NT_STATUS_NO_MEMORY;
61 SAFE_FREE(escape_domain_name);
63 for (i=1; decode_account_policy_name(i) != NULL; i++) {
64 char *val = NULL;
66 policy_attr = get_account_policy_attr(i);
67 if (!policy_attr) {
68 DEBUG(0,("add_new_domain_account_policies: ops. no policy!\n"));
69 continue;
72 if (!account_policy_get_default(i, &policy_default)) {
73 DEBUG(0,("add_new_domain_account_policies: failed to get default account policy\n"));
74 SAFE_FREE(dn);
75 return ntstatus;
78 DEBUG(10,("add_new_domain_account_policies: adding \"%s\" with value: %d\n", policy_attr, policy_default));
80 if (asprintf(&val, "%d", policy_default) < 0) {
81 SAFE_FREE(dn);
82 return NT_STATUS_NO_MEMORY;
85 smbldap_set_mod( &mods, LDAP_MOD_REPLACE, policy_attr, val);
87 rc = smbldap_modify(ldap_state, dn, mods);
89 SAFE_FREE(val);
91 if (rc!=LDAP_SUCCESS) {
92 char *ld_error = NULL;
93 ldap_get_option(smbldap_get_ldap(ldap_state),
94 LDAP_OPT_ERROR_STRING, &ld_error);
95 DEBUG(1,("add_new_domain_account_policies: failed to add account policies to dn= %s with: %s\n\t%s\n",
96 dn, ldap_err2string(rc),
97 ld_error ? ld_error : "unknown"));
98 SAFE_FREE(ld_error);
99 SAFE_FREE(dn);
100 ldap_mods_free(mods, True);
101 return ntstatus;
105 SAFE_FREE(dn);
106 ldap_mods_free(mods, True);
108 return NT_STATUS_OK;
111 /**********************************************************************
112 Add the sambaDomain to LDAP, so we don't have to search for this stuff
113 again. This is a once-add operation for now.
115 TODO: Add other attributes, and allow modification.
116 *********************************************************************/
118 static NTSTATUS add_new_domain_info(struct smbldap_state *ldap_state,
119 const char *domain_name)
121 fstring sid_string;
122 fstring algorithmic_rid_base_string;
123 char *filter = NULL;
124 char *dn = NULL;
125 LDAPMod **mods = NULL;
126 int rc;
127 LDAPMessage *result = NULL;
128 int num_result;
129 const char **attr_list;
130 char *escape_domain_name;
132 /* escape for filter */
133 escape_domain_name = escape_ldap_string(talloc_tos(), domain_name);
134 if (!escape_domain_name) {
135 DEBUG(0, ("Out of memory!\n"));
136 return NT_STATUS_NO_MEMORY;
139 if (asprintf(&filter, "(&(%s=%s)(objectclass=%s))",
140 get_attr_key2string(dominfo_attr_list, LDAP_ATTR_DOMAIN),
141 escape_domain_name, LDAP_OBJ_DOMINFO) < 0) {
142 TALLOC_FREE(escape_domain_name);
143 return NT_STATUS_NO_MEMORY;
146 TALLOC_FREE(escape_domain_name);
148 attr_list = get_attr_list(NULL, dominfo_attr_list );
149 rc = smbldap_search_suffix(ldap_state, filter, attr_list, &result);
150 TALLOC_FREE( attr_list );
151 SAFE_FREE(filter);
153 if (rc != LDAP_SUCCESS) {
154 return NT_STATUS_UNSUCCESSFUL;
157 num_result = ldap_count_entries(smbldap_get_ldap(ldap_state), result);
159 if (num_result > 1) {
160 DEBUG (0, ("add_new_domain_info: More than domain with that name exists: bailing "
161 "out!\n"));
162 ldap_msgfree(result);
163 return NT_STATUS_UNSUCCESSFUL;
166 /* Check if we need to add an entry */
167 DEBUG(3,("add_new_domain_info: Adding new domain\n"));
169 /* this time escape for DN */
170 escape_domain_name = escape_rdn_val_string_alloc(domain_name);
171 if (!escape_domain_name) {
172 DEBUG(0, ("Out of memory!\n"));
173 return NT_STATUS_NO_MEMORY;
176 if (asprintf(&dn, "%s=%s,%s",
177 get_attr_key2string(dominfo_attr_list, LDAP_ATTR_DOMAIN),
178 escape_domain_name, lp_ldap_suffix(talloc_tos())) < 0) {
179 SAFE_FREE(escape_domain_name);
180 return NT_STATUS_NO_MEMORY;
183 SAFE_FREE(escape_domain_name);
185 /* Free original search */
186 ldap_msgfree(result);
188 /* make the changes - the entry *must* not already have samba
189 * attributes */
191 smbldap_set_mod(&mods, LDAP_MOD_ADD,
192 get_attr_key2string(dominfo_attr_list,
193 LDAP_ATTR_DOMAIN),
194 domain_name);
196 /* If we don't have an entry, then ask secrets.tdb for what it thinks.
197 It may choose to make it up */
199 sid_to_fstring(sid_string, get_global_sam_sid());
200 smbldap_set_mod(&mods, LDAP_MOD_ADD,
201 get_attr_key2string(dominfo_attr_list,
202 LDAP_ATTR_DOM_SID),
203 sid_string);
205 slprintf(algorithmic_rid_base_string,
206 sizeof(algorithmic_rid_base_string) - 1, "%i",
207 algorithmic_rid_base());
208 smbldap_set_mod(&mods, LDAP_MOD_ADD,
209 get_attr_key2string(dominfo_attr_list,
210 LDAP_ATTR_ALGORITHMIC_RID_BASE),
211 algorithmic_rid_base_string);
212 smbldap_set_mod(&mods, LDAP_MOD_ADD, "objectclass", LDAP_OBJ_DOMINFO);
214 /* add the sambaNextUserRid attributes. */
217 uint32_t rid = BASE_RID;
218 fstring rid_str;
220 fstr_sprintf( rid_str, "%i", rid );
221 DEBUG(10,("add_new_domain_info: setting next available user rid [%s]\n", rid_str));
222 smbldap_set_mod(&mods, LDAP_MOD_ADD,
223 get_attr_key2string(dominfo_attr_list,
224 LDAP_ATTR_NEXT_USERRID),
225 rid_str);
229 rc = smbldap_add(ldap_state, dn, mods);
231 if (rc!=LDAP_SUCCESS) {
232 char *ld_error = NULL;
233 ldap_get_option(smbldap_get_ldap(ldap_state),
234 LDAP_OPT_ERROR_STRING, &ld_error);
235 DEBUG(1,("add_new_domain_info: failed to add domain dn= %s with: %s\n\t%s\n",
236 dn, ldap_err2string(rc),
237 ld_error?ld_error:"unknown"));
238 SAFE_FREE(ld_error);
239 SAFE_FREE(dn);
240 ldap_mods_free(mods, True);
241 return NT_STATUS_UNSUCCESSFUL;
244 DEBUG(2,("add_new_domain_info: added: domain = %s in the LDAP database\n", domain_name));
245 ldap_mods_free(mods, True);
246 SAFE_FREE(dn);
247 return NT_STATUS_OK;
250 /**********************************************************************
251 Search for the domain info entry
252 *********************************************************************/
254 NTSTATUS smbldap_search_domain_info(struct smbldap_state *ldap_state,
255 LDAPMessage ** result, const char *domain_name,
256 bool try_add)
258 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
259 char *filter = NULL;
260 int rc;
261 const char **attr_list;
262 int count;
263 char *escape_domain_name;
265 escape_domain_name = escape_ldap_string(talloc_tos(), domain_name);
266 if (!escape_domain_name) {
267 DEBUG(0, ("Out of memory!\n"));
268 return NT_STATUS_NO_MEMORY;
271 if (asprintf(&filter, "(&(objectClass=%s)(%s=%s))",
272 LDAP_OBJ_DOMINFO,
273 get_attr_key2string(dominfo_attr_list, LDAP_ATTR_DOMAIN),
274 escape_domain_name) < 0) {
275 TALLOC_FREE(escape_domain_name);
276 return NT_STATUS_NO_MEMORY;
279 TALLOC_FREE(escape_domain_name);
281 DEBUG(2, ("smbldap_search_domain_info: Searching for:[%s]\n", filter));
283 attr_list = get_attr_list( NULL, dominfo_attr_list );
284 rc = smbldap_search_suffix(ldap_state, filter, attr_list , result);
285 TALLOC_FREE( attr_list );
287 if (rc != LDAP_SUCCESS) {
288 DEBUG(2,("smbldap_search_domain_info: Problem during LDAPsearch: %s\n", ldap_err2string (rc)));
289 DEBUG(2,("smbldap_search_domain_info: Query was: %s, %s\n", lp_ldap_suffix(talloc_tos()), filter));
290 goto failed;
293 SAFE_FREE(filter);
295 count = ldap_count_entries(smbldap_get_ldap(ldap_state), *result);
297 if (count == 1) {
298 return NT_STATUS_OK;
301 ldap_msgfree(*result);
302 *result = NULL;
304 if (count < 1) {
306 DEBUG(3, ("smbldap_search_domain_info: Got no domain info entries for domain\n"));
308 if (!try_add)
309 goto failed;
311 status = add_new_domain_info(ldap_state, domain_name);
312 if (!NT_STATUS_IS_OK(status)) {
313 DEBUG(0, ("smbldap_search_domain_info: Adding domain info for %s failed with %s\n",
314 domain_name, nt_errstr(status)));
315 goto failed;
318 status = add_new_domain_account_policies(ldap_state, domain_name);
319 if (!NT_STATUS_IS_OK(status)) {
320 DEBUG(0, ("smbldap_search_domain_info: Adding domain account policies for %s failed with %s\n",
321 domain_name, nt_errstr(status)));
322 goto failed;
325 return smbldap_search_domain_info(ldap_state, result, domain_name, False);
329 if (count > 1 ) {
331 DEBUG(0, ("smbldap_search_domain_info: Got too many (%d) domain info entries for domain %s\n",
332 count, domain_name));
333 goto failed;
336 failed:
337 return status;