s3:winbind: WINBIND_USERINFO -> wbint_userinfo
[Samba/aatanasov.git] / source3 / winbindd / winbindd_ads.c
bloba9df61d5f442c52a81c95e5e15c465c3ff860a01
1 /*
2 Unix SMB/CIFS implementation.
4 Winbind ADS backend functions
6 Copyright (C) Andrew Tridgell 2001
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2003
8 Copyright (C) Gerald (Jerry) Carter 2004
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "includes.h"
25 #include "winbindd.h"
27 #ifdef HAVE_ADS
29 #undef DBGC_CLASS
30 #define DBGC_CLASS DBGC_WINBIND
32 extern struct winbindd_methods reconnect_methods;
35 return our ads connections structure for a domain. We keep the connection
36 open to make things faster
38 static ADS_STRUCT *ads_cached_connection(struct winbindd_domain *domain)
40 ADS_STRUCT *ads;
41 ADS_STATUS status;
42 fstring dc_name;
43 struct sockaddr_storage dc_ss;
45 DEBUG(10,("ads_cached_connection\n"));
47 if (domain->private_data) {
49 time_t expire;
50 time_t now = time(NULL);
52 /* check for a valid structure */
53 ads = (ADS_STRUCT *)domain->private_data;
55 expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire);
57 DEBUG(7, ("Current tickets expire in %d seconds (at %d, time is now %d)\n",
58 (uint32)expire-(uint32)now, (uint32) expire, (uint32) now));
60 if ( ads->config.realm && (expire > now)) {
61 return ads;
62 } else {
63 /* we own this ADS_STRUCT so make sure it goes away */
64 DEBUG(7,("Deleting expired krb5 credential cache\n"));
65 ads->is_mine = True;
66 ads_destroy( &ads );
67 ads_kdestroy("MEMORY:winbind_ccache");
68 domain->private_data = NULL;
72 /* we don't want this to affect the users ccache */
73 setenv("KRB5CCNAME", "MEMORY:winbind_ccache", 1);
75 ads = ads_init(domain->alt_name, domain->name, NULL);
76 if (!ads) {
77 DEBUG(1,("ads_init for domain %s failed\n", domain->name));
78 return NULL;
81 /* the machine acct password might have change - fetch it every time */
83 SAFE_FREE(ads->auth.password);
84 SAFE_FREE(ads->auth.realm);
86 if ( IS_DC ) {
87 DOM_SID sid;
88 time_t last_set_time;
90 if ( !pdb_get_trusteddom_pw( domain->name, &ads->auth.password, &sid, &last_set_time ) ) {
91 ads_destroy( &ads );
92 return NULL;
94 ads->auth.realm = SMB_STRDUP( ads->server.realm );
95 strupper_m( ads->auth.realm );
97 else {
98 struct winbindd_domain *our_domain = domain;
100 ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
102 /* always give preference to the alt_name in our
103 primary domain if possible */
105 if ( !domain->primary )
106 our_domain = find_our_domain();
108 if ( our_domain->alt_name[0] != '\0' ) {
109 ads->auth.realm = SMB_STRDUP( our_domain->alt_name );
110 strupper_m( ads->auth.realm );
112 else
113 ads->auth.realm = SMB_STRDUP( lp_realm() );
116 ads->auth.renewable = WINBINDD_PAM_AUTH_KRB5_RENEW_TIME;
118 /* Setup the server affinity cache. We don't reaally care
119 about the name. Just setup affinity and the KRB5_CONFIG
120 file. */
122 get_dc_name( ads->server.workgroup, ads->server.realm, dc_name, &dc_ss );
124 status = ads_connect(ads);
125 if (!ADS_ERR_OK(status) || !ads->config.realm) {
126 DEBUG(1,("ads_connect for domain %s failed: %s\n",
127 domain->name, ads_errstr(status)));
128 ads_destroy(&ads);
130 /* if we get ECONNREFUSED then it might be a NT4
131 server, fall back to MSRPC */
132 if (status.error_type == ENUM_ADS_ERROR_SYSTEM &&
133 status.err.rc == ECONNREFUSED) {
134 /* 'reconnect_methods' is the MS-RPC backend. */
135 DEBUG(1,("Trying MSRPC methods\n"));
136 domain->backend = &reconnect_methods;
138 return NULL;
141 /* set the flag that says we don't own the memory even
142 though we do so that ads_destroy() won't destroy the
143 structure we pass back by reference */
145 ads->is_mine = False;
147 domain->private_data = (void *)ads;
148 return ads;
152 /* Query display info for a realm. This is the basic user list fn */
153 static NTSTATUS query_user_list(struct winbindd_domain *domain,
154 TALLOC_CTX *mem_ctx,
155 uint32 *num_entries,
156 struct wbint_userinfo **info)
158 ADS_STRUCT *ads = NULL;
159 const char *attrs[] = { "*", NULL };
160 int i, count;
161 ADS_STATUS rc;
162 LDAPMessage *res = NULL;
163 LDAPMessage *msg = NULL;
164 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
166 *num_entries = 0;
168 DEBUG(3,("ads: query_user_list\n"));
170 if ( !winbindd_can_contact_domain( domain ) ) {
171 DEBUG(10,("query_user_list: No incoming trust for domain %s\n",
172 domain->name));
173 return NT_STATUS_OK;
176 ads = ads_cached_connection(domain);
178 if (!ads) {
179 domain->last_status = NT_STATUS_SERVER_DISABLED;
180 goto done;
183 rc = ads_search_retry(ads, &res, "(objectCategory=user)", attrs);
184 if (!ADS_ERR_OK(rc) || !res) {
185 DEBUG(1,("query_user_list ads_search: %s\n", ads_errstr(rc)));
186 goto done;
189 count = ads_count_replies(ads, res);
190 if (count == 0) {
191 DEBUG(1,("query_user_list: No users found\n"));
192 goto done;
195 (*info) = TALLOC_ZERO_ARRAY(mem_ctx, struct wbint_userinfo, count);
196 if (!*info) {
197 status = NT_STATUS_NO_MEMORY;
198 goto done;
201 i = 0;
203 for (msg = ads_first_entry(ads, res); msg; msg = ads_next_entry(ads, msg)) {
204 const char *name;
205 const char *gecos = NULL;
206 const char *homedir = NULL;
207 const char *shell = NULL;
208 uint32 group;
209 uint32 atype;
210 DOM_SID user_sid;
211 gid_t primary_gid = (gid_t)-1;
213 if (!ads_pull_uint32(ads, msg, "sAMAccountType", &atype) ||
214 ds_atype_map(atype) != SID_NAME_USER) {
215 DEBUG(1,("Not a user account? atype=0x%x\n", atype));
216 continue;
219 name = ads_pull_username(ads, mem_ctx, msg);
221 if ( ads_pull_sid( ads, msg, "objectSid", &user_sid ) ) {
222 status = nss_get_info_cached( domain, &user_sid, mem_ctx,
223 ads, msg, &homedir, &shell, &gecos,
224 &primary_gid );
227 if (gecos == NULL) {
228 gecos = ads_pull_string(ads, mem_ctx, msg, "name");
231 if (!ads_pull_sid(ads, msg, "objectSid",
232 &(*info)[i].user_sid)) {
233 DEBUG(1,("No sid for %s !?\n", name));
234 continue;
236 if (!ads_pull_uint32(ads, msg, "primaryGroupID", &group)) {
237 DEBUG(1,("No primary group for %s !?\n", name));
238 continue;
241 (*info)[i].acct_name = name;
242 (*info)[i].full_name = gecos;
243 (*info)[i].homedir = homedir;
244 (*info)[i].shell = shell;
245 (*info)[i].primary_gid = primary_gid;
246 sid_compose(&(*info)[i].group_sid, &domain->sid, group);
247 i++;
250 (*num_entries) = i;
251 status = NT_STATUS_OK;
253 DEBUG(3,("ads query_user_list gave %d entries\n", (*num_entries)));
255 done:
256 if (res)
257 ads_msgfree(ads, res);
259 return status;
262 /* list all domain groups */
263 static NTSTATUS enum_dom_groups(struct winbindd_domain *domain,
264 TALLOC_CTX *mem_ctx,
265 uint32 *num_entries,
266 struct acct_info **info)
268 ADS_STRUCT *ads = NULL;
269 const char *attrs[] = {"userPrincipalName", "sAMAccountName",
270 "name", "objectSid", NULL};
271 int i, count;
272 ADS_STATUS rc;
273 LDAPMessage *res = NULL;
274 LDAPMessage *msg = NULL;
275 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
276 const char *filter;
277 bool enum_dom_local_groups = False;
279 *num_entries = 0;
281 DEBUG(3,("ads: enum_dom_groups\n"));
283 if ( !winbindd_can_contact_domain( domain ) ) {
284 DEBUG(10,("enum_dom_groups: No incoming trust for domain %s\n",
285 domain->name));
286 return NT_STATUS_OK;
289 /* only grab domain local groups for our domain */
290 if ( domain->active_directory && strequal(lp_realm(), domain->alt_name) ) {
291 enum_dom_local_groups = True;
294 /* Workaround ADS LDAP bug present in MS W2K3 SP0 and W2K SP4 w/o
295 * rollup-fixes:
297 * According to Section 5.1(4) of RFC 2251 if a value of a type is it's
298 * default value, it MUST be absent. In case of extensible matching the
299 * "dnattr" boolean defaults to FALSE and so it must be only be present
300 * when set to TRUE.
302 * When it is set to FALSE and the OpenLDAP lib (correctly) encodes a
303 * filter using bitwise matching rule then the buggy AD fails to decode
304 * the extensible match. As a workaround set it to TRUE and thereby add
305 * the dnAttributes "dn" field to cope with those older AD versions.
306 * It should not harm and won't put any additional load on the AD since
307 * none of the dn components have a bitmask-attribute.
309 * Thanks to Ralf Haferkamp for input and testing - Guenther */
311 filter = talloc_asprintf(mem_ctx, "(&(objectCategory=group)(&(groupType:dn:%s:=%d)(!(groupType:dn:%s:=%d))))",
312 ADS_LDAP_MATCHING_RULE_BIT_AND, GROUP_TYPE_SECURITY_ENABLED,
313 ADS_LDAP_MATCHING_RULE_BIT_AND,
314 enum_dom_local_groups ? GROUP_TYPE_BUILTIN_LOCAL_GROUP : GROUP_TYPE_RESOURCE_GROUP);
316 if (filter == NULL) {
317 status = NT_STATUS_NO_MEMORY;
318 goto done;
321 ads = ads_cached_connection(domain);
323 if (!ads) {
324 domain->last_status = NT_STATUS_SERVER_DISABLED;
325 goto done;
328 rc = ads_search_retry(ads, &res, filter, attrs);
329 if (!ADS_ERR_OK(rc) || !res) {
330 DEBUG(1,("enum_dom_groups ads_search: %s\n", ads_errstr(rc)));
331 goto done;
334 count = ads_count_replies(ads, res);
335 if (count == 0) {
336 DEBUG(1,("enum_dom_groups: No groups found\n"));
337 goto done;
340 (*info) = TALLOC_ZERO_ARRAY(mem_ctx, struct acct_info, count);
341 if (!*info) {
342 status = NT_STATUS_NO_MEMORY;
343 goto done;
346 i = 0;
348 for (msg = ads_first_entry(ads, res); msg; msg = ads_next_entry(ads, msg)) {
349 char *name, *gecos;
350 DOM_SID sid;
351 uint32 rid;
353 name = ads_pull_username(ads, mem_ctx, msg);
354 gecos = ads_pull_string(ads, mem_ctx, msg, "name");
355 if (!ads_pull_sid(ads, msg, "objectSid", &sid)) {
356 DEBUG(1,("No sid for %s !?\n", name));
357 continue;
360 if (!sid_peek_check_rid(&domain->sid, &sid, &rid)) {
361 DEBUG(1,("No rid for %s !?\n", name));
362 continue;
365 fstrcpy((*info)[i].acct_name, name);
366 fstrcpy((*info)[i].acct_desc, gecos);
367 (*info)[i].rid = rid;
368 i++;
371 (*num_entries) = i;
373 status = NT_STATUS_OK;
375 DEBUG(3,("ads enum_dom_groups gave %d entries\n", (*num_entries)));
377 done:
378 if (res)
379 ads_msgfree(ads, res);
381 return status;
384 /* list all domain local groups */
385 static NTSTATUS enum_local_groups(struct winbindd_domain *domain,
386 TALLOC_CTX *mem_ctx,
387 uint32 *num_entries,
388 struct acct_info **info)
391 * This is a stub function only as we returned the domain
392 * local groups in enum_dom_groups() if the domain->native field
393 * was true. This is a simple performance optimization when
394 * using LDAP.
396 * if we ever need to enumerate domain local groups separately,
397 * then this optimization in enum_dom_groups() will need
398 * to be split out
400 *num_entries = 0;
402 return NT_STATUS_OK;
405 /* convert a single name to a sid in a domain - use rpc methods */
406 static NTSTATUS name_to_sid(struct winbindd_domain *domain,
407 TALLOC_CTX *mem_ctx,
408 const char *domain_name,
409 const char *name,
410 uint32_t flags,
411 DOM_SID *sid,
412 enum lsa_SidType *type)
414 return reconnect_methods.name_to_sid(domain, mem_ctx,
415 domain_name, name, flags,
416 sid, type);
419 /* convert a domain SID to a user or group name - use rpc methods */
420 static NTSTATUS sid_to_name(struct winbindd_domain *domain,
421 TALLOC_CTX *mem_ctx,
422 const DOM_SID *sid,
423 char **domain_name,
424 char **name,
425 enum lsa_SidType *type)
427 return reconnect_methods.sid_to_name(domain, mem_ctx, sid,
428 domain_name, name, type);
431 /* convert a list of rids to names - use rpc methods */
432 static NTSTATUS rids_to_names(struct winbindd_domain *domain,
433 TALLOC_CTX *mem_ctx,
434 const DOM_SID *sid,
435 uint32 *rids,
436 size_t num_rids,
437 char **domain_name,
438 char ***names,
439 enum lsa_SidType **types)
441 return reconnect_methods.rids_to_names(domain, mem_ctx, sid,
442 rids, num_rids,
443 domain_name, names, types);
446 /* If you are looking for "dn_lookup": Yes, it used to be here!
447 * It has gone now since it was a major speed bottleneck in
448 * lookup_groupmem (its only use). It has been replaced by
449 * an rpc lookup sids call... R.I.P. */
451 /* Lookup user information from a rid */
452 static NTSTATUS query_user(struct winbindd_domain *domain,
453 TALLOC_CTX *mem_ctx,
454 const DOM_SID *sid,
455 struct wbint_userinfo *info)
457 ADS_STRUCT *ads = NULL;
458 const char *attrs[] = { "*", NULL };
459 ADS_STATUS rc;
460 int count;
461 LDAPMessage *msg = NULL;
462 char *ldap_exp;
463 char *sidstr;
464 uint32 group_rid;
465 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
466 struct netr_SamInfo3 *user = NULL;
467 gid_t gid;
469 DEBUG(3,("ads: query_user\n"));
471 info->homedir = NULL;
472 info->shell = NULL;
473 info->primary_gid = (gid_t)-1;
475 /* try netsamlogon cache first */
477 if ( (user = netsamlogon_cache_get( mem_ctx, sid )) != NULL )
479 DEBUG(5,("query_user: Cache lookup succeeded for %s\n",
480 sid_string_dbg(sid)));
482 sid_compose(&info->user_sid, &domain->sid, user->base.rid);
483 sid_compose(&info->group_sid, &domain->sid, user->base.primary_gid);
485 info->acct_name = talloc_strdup(mem_ctx, user->base.account_name.string);
486 info->full_name = talloc_strdup(mem_ctx, user->base.full_name.string);
488 nss_get_info_cached( domain, sid, mem_ctx, NULL, NULL,
489 &info->homedir, &info->shell, &info->full_name,
490 &gid );
491 info->primary_gid = gid;
493 TALLOC_FREE(user);
495 return NT_STATUS_OK;
498 if ( !winbindd_can_contact_domain(domain)) {
499 DEBUG(8,("query_user: No incoming trust from domain %s\n",
500 domain->name));
502 /* We still need to generate some basic information
503 about the user even if we cannot contact the
504 domain. Most of this stuff we can deduce. */
506 sid_copy( &info->user_sid, sid );
508 /* Assume "Domain Users" for the primary group */
510 sid_compose(&info->group_sid, &domain->sid, DOMAIN_GROUP_RID_USERS );
512 /* Try to fill in what the nss_info backend can do */
514 nss_get_info_cached( domain, sid, mem_ctx, NULL, NULL,
515 &info->homedir, &info->shell, &info->full_name,
516 &gid);
517 info->primary_gid = gid;
519 status = NT_STATUS_OK;
520 goto done;
523 /* no cache...do the query */
525 if ( (ads = ads_cached_connection(domain)) == NULL ) {
526 domain->last_status = NT_STATUS_SERVER_DISABLED;
527 goto done;
530 sidstr = sid_binstring(talloc_tos(), sid);
531 if (asprintf(&ldap_exp, "(objectSid=%s)", sidstr) == -1) {
532 status = NT_STATUS_NO_MEMORY;
533 goto done;
535 rc = ads_search_retry(ads, &msg, ldap_exp, attrs);
536 free(ldap_exp);
537 TALLOC_FREE(sidstr);
538 if (!ADS_ERR_OK(rc) || !msg) {
539 DEBUG(1,("query_user(sid=%s) ads_search: %s\n",
540 sid_string_dbg(sid), ads_errstr(rc)));
541 goto done;
544 count = ads_count_replies(ads, msg);
545 if (count != 1) {
546 DEBUG(1,("query_user(sid=%s): Not found\n",
547 sid_string_dbg(sid)));
548 goto done;
551 info->acct_name = ads_pull_username(ads, mem_ctx, msg);
553 nss_get_info_cached( domain, sid, mem_ctx, ads, msg,
554 &info->homedir, &info->shell, &info->full_name,
555 &gid);
556 info->primary_gid = gid;
558 if (info->full_name == NULL) {
559 info->full_name = ads_pull_string(ads, mem_ctx, msg, "name");
562 if (!ads_pull_uint32(ads, msg, "primaryGroupID", &group_rid)) {
563 DEBUG(1,("No primary group for %s !?\n",
564 sid_string_dbg(sid)));
565 goto done;
568 sid_copy(&info->user_sid, sid);
569 sid_compose(&info->group_sid, &domain->sid, group_rid);
571 status = NT_STATUS_OK;
573 DEBUG(3,("ads query_user gave %s\n", info->acct_name));
574 done:
575 if (msg)
576 ads_msgfree(ads, msg);
578 return status;
581 /* Lookup groups a user is a member of - alternate method, for when
582 tokenGroups are not available. */
583 static NTSTATUS lookup_usergroups_member(struct winbindd_domain *domain,
584 TALLOC_CTX *mem_ctx,
585 const char *user_dn,
586 DOM_SID *primary_group,
587 size_t *p_num_groups, DOM_SID **user_sids)
589 ADS_STATUS rc;
590 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
591 int count;
592 LDAPMessage *res = NULL;
593 LDAPMessage *msg = NULL;
594 char *ldap_exp;
595 ADS_STRUCT *ads;
596 const char *group_attrs[] = {"objectSid", NULL};
597 char *escaped_dn;
598 size_t num_groups = 0;
600 DEBUG(3,("ads: lookup_usergroups_member\n"));
602 if ( !winbindd_can_contact_domain( domain ) ) {
603 DEBUG(10,("lookup_usergroups_members: No incoming trust for domain %s\n",
604 domain->name));
605 return NT_STATUS_OK;
608 ads = ads_cached_connection(domain);
610 if (!ads) {
611 domain->last_status = NT_STATUS_SERVER_DISABLED;
612 goto done;
615 if (!(escaped_dn = escape_ldap_string(talloc_tos(), user_dn))) {
616 status = NT_STATUS_NO_MEMORY;
617 goto done;
620 ldap_exp = talloc_asprintf(mem_ctx,
621 "(&(member=%s)(objectCategory=group)(groupType:dn:%s:=%d))",
622 escaped_dn,
623 ADS_LDAP_MATCHING_RULE_BIT_AND,
624 GROUP_TYPE_SECURITY_ENABLED);
625 if (!ldap_exp) {
626 DEBUG(1,("lookup_usergroups(dn=%s) asprintf failed!\n", user_dn));
627 TALLOC_FREE(escaped_dn);
628 status = NT_STATUS_NO_MEMORY;
629 goto done;
632 TALLOC_FREE(escaped_dn);
634 rc = ads_search_retry(ads, &res, ldap_exp, group_attrs);
636 if (!ADS_ERR_OK(rc) || !res) {
637 DEBUG(1,("lookup_usergroups ads_search member=%s: %s\n", user_dn, ads_errstr(rc)));
638 return ads_ntstatus(rc);
641 count = ads_count_replies(ads, res);
643 *user_sids = NULL;
644 num_groups = 0;
646 /* always add the primary group to the sid array */
647 status = add_sid_to_array(mem_ctx, primary_group, user_sids,
648 &num_groups);
649 if (!NT_STATUS_IS_OK(status)) {
650 goto done;
653 if (count > 0) {
654 for (msg = ads_first_entry(ads, res); msg;
655 msg = ads_next_entry(ads, msg)) {
656 DOM_SID group_sid;
658 if (!ads_pull_sid(ads, msg, "objectSid", &group_sid)) {
659 DEBUG(1,("No sid for this group ?!?\n"));
660 continue;
663 /* ignore Builtin groups from ADS - Guenther */
664 if (sid_check_is_in_builtin(&group_sid)) {
665 continue;
668 status = add_sid_to_array(mem_ctx, &group_sid,
669 user_sids, &num_groups);
670 if (!NT_STATUS_IS_OK(status)) {
671 goto done;
677 *p_num_groups = num_groups;
678 status = (user_sids != NULL) ? NT_STATUS_OK : NT_STATUS_NO_MEMORY;
680 DEBUG(3,("ads lookup_usergroups (member) succeeded for dn=%s\n", user_dn));
681 done:
682 if (res)
683 ads_msgfree(ads, res);
685 return status;
688 /* Lookup groups a user is a member of - alternate method, for when
689 tokenGroups are not available. */
690 static NTSTATUS lookup_usergroups_memberof(struct winbindd_domain *domain,
691 TALLOC_CTX *mem_ctx,
692 const char *user_dn,
693 DOM_SID *primary_group,
694 size_t *p_num_groups,
695 DOM_SID **user_sids)
697 ADS_STATUS rc;
698 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
699 ADS_STRUCT *ads;
700 const char *attrs[] = {"memberOf", NULL};
701 size_t num_groups = 0;
702 DOM_SID *group_sids = NULL;
703 int i;
704 char **strings = NULL;
705 size_t num_strings = 0, num_sids = 0;
708 DEBUG(3,("ads: lookup_usergroups_memberof\n"));
710 if ( !winbindd_can_contact_domain( domain ) ) {
711 DEBUG(10,("lookup_usergroups_memberof: No incoming trust for "
712 "domain %s\n", domain->name));
713 return NT_STATUS_OK;
716 ads = ads_cached_connection(domain);
718 if (!ads) {
719 domain->last_status = NT_STATUS_SERVER_DISABLED;
720 return NT_STATUS_UNSUCCESSFUL;
723 rc = ads_search_retry_extended_dn_ranged(ads, mem_ctx, user_dn, attrs,
724 ADS_EXTENDED_DN_HEX_STRING,
725 &strings, &num_strings);
727 if (!ADS_ERR_OK(rc)) {
728 DEBUG(1,("lookup_usergroups_memberof ads_search "
729 "member=%s: %s\n", user_dn, ads_errstr(rc)));
730 return ads_ntstatus(rc);
733 *user_sids = NULL;
734 num_groups = 0;
736 /* always add the primary group to the sid array */
737 status = add_sid_to_array(mem_ctx, primary_group, user_sids,
738 &num_groups);
739 if (!NT_STATUS_IS_OK(status)) {
740 goto done;
743 group_sids = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID, num_strings + 1);
744 if (!group_sids) {
745 status = NT_STATUS_NO_MEMORY;
746 goto done;
749 for (i=0; i<num_strings; i++) {
750 rc = ads_get_sid_from_extended_dn(mem_ctx, strings[i],
751 ADS_EXTENDED_DN_HEX_STRING,
752 &(group_sids)[i]);
753 if (!ADS_ERR_OK(rc)) {
754 /* ignore members without SIDs */
755 if (NT_STATUS_EQUAL(ads_ntstatus(rc),
756 NT_STATUS_NOT_FOUND)) {
757 continue;
759 else {
760 status = ads_ntstatus(rc);
761 goto done;
764 num_sids++;
767 if (i == 0) {
768 DEBUG(1,("No memberOf for this user?!?\n"));
769 status = NT_STATUS_NO_MEMORY;
770 goto done;
773 for (i=0; i<num_sids; i++) {
775 /* ignore Builtin groups from ADS - Guenther */
776 if (sid_check_is_in_builtin(&group_sids[i])) {
777 continue;
780 status = add_sid_to_array(mem_ctx, &group_sids[i], user_sids,
781 &num_groups);
782 if (!NT_STATUS_IS_OK(status)) {
783 goto done;
788 *p_num_groups = num_groups;
789 status = (*user_sids != NULL) ? NT_STATUS_OK : NT_STATUS_NO_MEMORY;
791 DEBUG(3,("ads lookup_usergroups (memberof) succeeded for dn=%s\n",
792 user_dn));
794 done:
795 TALLOC_FREE(strings);
796 TALLOC_FREE(group_sids);
798 return status;
802 /* Lookup groups a user is a member of. */
803 static NTSTATUS lookup_usergroups(struct winbindd_domain *domain,
804 TALLOC_CTX *mem_ctx,
805 const DOM_SID *sid,
806 uint32 *p_num_groups, DOM_SID **user_sids)
808 ADS_STRUCT *ads = NULL;
809 const char *attrs[] = {"tokenGroups", "primaryGroupID", NULL};
810 ADS_STATUS rc;
811 int count;
812 LDAPMessage *msg = NULL;
813 char *user_dn = NULL;
814 DOM_SID *sids;
815 int i;
816 DOM_SID primary_group;
817 uint32 primary_group_rid;
818 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
819 size_t num_groups = 0;
821 DEBUG(3,("ads: lookup_usergroups\n"));
822 *p_num_groups = 0;
824 status = lookup_usergroups_cached(domain, mem_ctx, sid,
825 p_num_groups, user_sids);
826 if (NT_STATUS_IS_OK(status)) {
827 return NT_STATUS_OK;
830 if ( !winbindd_can_contact_domain( domain ) ) {
831 DEBUG(10,("lookup_usergroups: No incoming trust for domain %s\n",
832 domain->name));
834 /* Tell the cache manager not to remember this one */
836 return NT_STATUS_SYNCHRONIZATION_REQUIRED;
839 ads = ads_cached_connection(domain);
841 if (!ads) {
842 domain->last_status = NT_STATUS_SERVER_DISABLED;
843 status = NT_STATUS_SERVER_DISABLED;
844 goto done;
847 rc = ads_search_retry_sid(ads, &msg, sid, attrs);
849 if (!ADS_ERR_OK(rc)) {
850 status = ads_ntstatus(rc);
851 DEBUG(1, ("lookup_usergroups(sid=%s) ads_search tokenGroups: "
852 "%s\n", sid_string_dbg(sid), ads_errstr(rc)));
853 goto done;
856 count = ads_count_replies(ads, msg);
857 if (count != 1) {
858 status = NT_STATUS_UNSUCCESSFUL;
859 DEBUG(1,("lookup_usergroups(sid=%s) ads_search tokenGroups: "
860 "invalid number of results (count=%d)\n",
861 sid_string_dbg(sid), count));
862 goto done;
865 if (!msg) {
866 DEBUG(1,("lookup_usergroups(sid=%s) ads_search tokenGroups: NULL msg\n",
867 sid_string_dbg(sid)));
868 status = NT_STATUS_UNSUCCESSFUL;
869 goto done;
872 user_dn = ads_get_dn(ads, mem_ctx, msg);
873 if (user_dn == NULL) {
874 status = NT_STATUS_NO_MEMORY;
875 goto done;
878 if (!ads_pull_uint32(ads, msg, "primaryGroupID", &primary_group_rid)) {
879 DEBUG(1,("%s: No primary group for sid=%s !?\n",
880 domain->name, sid_string_dbg(sid)));
881 goto done;
884 sid_copy(&primary_group, &domain->sid);
885 sid_append_rid(&primary_group, primary_group_rid);
887 count = ads_pull_sids(ads, mem_ctx, msg, "tokenGroups", &sids);
889 /* there must always be at least one group in the token,
890 unless we are talking to a buggy Win2k server */
892 /* actually this only happens when the machine account has no read
893 * permissions on the tokenGroup attribute - gd */
895 if (count == 0) {
897 /* no tokenGroups */
899 /* lookup what groups this user is a member of by DN search on
900 * "memberOf" */
902 status = lookup_usergroups_memberof(domain, mem_ctx, user_dn,
903 &primary_group,
904 &num_groups, user_sids);
905 *p_num_groups = (uint32)num_groups;
906 if (NT_STATUS_IS_OK(status)) {
907 goto done;
910 /* lookup what groups this user is a member of by DN search on
911 * "member" */
913 status = lookup_usergroups_member(domain, mem_ctx, user_dn,
914 &primary_group,
915 &num_groups, user_sids);
916 *p_num_groups = (uint32)num_groups;
917 goto done;
920 *user_sids = NULL;
921 num_groups = 0;
923 status = add_sid_to_array(mem_ctx, &primary_group, user_sids,
924 &num_groups);
925 if (!NT_STATUS_IS_OK(status)) {
926 goto done;
929 for (i=0;i<count;i++) {
931 /* ignore Builtin groups from ADS - Guenther */
932 if (sid_check_is_in_builtin(&sids[i])) {
933 continue;
936 status = add_sid_to_array_unique(mem_ctx, &sids[i],
937 user_sids, &num_groups);
938 if (!NT_STATUS_IS_OK(status)) {
939 goto done;
943 *p_num_groups = (uint32)num_groups;
944 status = (*user_sids != NULL) ? NT_STATUS_OK : NT_STATUS_NO_MEMORY;
946 DEBUG(3,("ads lookup_usergroups (tokenGroups) succeeded for sid=%s\n",
947 sid_string_dbg(sid)));
948 done:
949 TALLOC_FREE(user_dn);
950 ads_msgfree(ads, msg);
951 return status;
954 /* Lookup aliases a user is member of - use rpc methods */
955 static NTSTATUS lookup_useraliases(struct winbindd_domain *domain,
956 TALLOC_CTX *mem_ctx,
957 uint32 num_sids, const DOM_SID *sids,
958 uint32 *num_aliases, uint32 **alias_rids)
960 return reconnect_methods.lookup_useraliases(domain, mem_ctx,
961 num_sids, sids,
962 num_aliases,
963 alias_rids);
967 find the members of a group, given a group rid and domain
969 static NTSTATUS lookup_groupmem(struct winbindd_domain *domain,
970 TALLOC_CTX *mem_ctx,
971 const DOM_SID *group_sid, uint32 *num_names,
972 DOM_SID **sid_mem, char ***names,
973 uint32 **name_types)
975 ADS_STATUS rc;
976 ADS_STRUCT *ads = NULL;
977 char *ldap_exp;
978 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
979 char *sidbinstr;
980 char **members = NULL;
981 int i;
982 size_t num_members = 0;
983 ads_control args;
984 struct rpc_pipe_client *cli;
985 struct policy_handle lsa_policy;
986 DOM_SID *sid_mem_nocache = NULL;
987 char **names_nocache = NULL;
988 enum lsa_SidType *name_types_nocache = NULL;
989 char **domains_nocache = NULL; /* only needed for rpccli_lsa_lookup_sids */
990 uint32 num_nocache = 0;
991 TALLOC_CTX *tmp_ctx = NULL;
993 DEBUG(10,("ads: lookup_groupmem %s sid=%s\n", domain->name,
994 sid_string_dbg(group_sid)));
996 *num_names = 0;
998 tmp_ctx = talloc_new(mem_ctx);
999 if (!tmp_ctx) {
1000 DEBUG(1, ("ads: lookup_groupmem: talloc failed\n"));
1001 status = NT_STATUS_NO_MEMORY;
1002 goto done;
1005 if ( !winbindd_can_contact_domain( domain ) ) {
1006 DEBUG(10,("lookup_groupmem: No incoming trust for domain %s\n",
1007 domain->name));
1008 return NT_STATUS_OK;
1011 ads = ads_cached_connection(domain);
1013 if (!ads) {
1014 domain->last_status = NT_STATUS_SERVER_DISABLED;
1015 goto done;
1018 if ((sidbinstr = sid_binstring(talloc_tos(), group_sid)) == NULL) {
1019 status = NT_STATUS_NO_MEMORY;
1020 goto done;
1023 /* search for all members of the group */
1024 ldap_exp = talloc_asprintf(tmp_ctx, "(objectSid=%s)", sidbinstr);
1025 TALLOC_FREE(sidbinstr);
1026 if (ldap_exp == NULL) {
1027 DEBUG(1, ("ads: lookup_groupmem: talloc_asprintf for ldap_exp failed!\n"));
1028 status = NT_STATUS_NO_MEMORY;
1029 goto done;
1032 args.control = ADS_EXTENDED_DN_OID;
1033 args.val = ADS_EXTENDED_DN_HEX_STRING;
1034 args.critical = True;
1036 rc = ads_ranged_search(ads, tmp_ctx, LDAP_SCOPE_SUBTREE, ads->config.bind_path,
1037 ldap_exp, &args, "member", &members, &num_members);
1039 if (!ADS_ERR_OK(rc)) {
1040 DEBUG(0,("ads_ranged_search failed with: %s\n", ads_errstr(rc)));
1041 status = NT_STATUS_UNSUCCESSFUL;
1042 goto done;
1045 DEBUG(10, ("ads lookup_groupmem: got %d sids via extended dn call\n", (int)num_members));
1047 /* Now that we have a list of sids, we need to get the
1048 * lists of names and name_types belonging to these sids.
1049 * even though conceptually not quite clean, we use the
1050 * RPC call lsa_lookup_sids for this since it can handle a
1051 * list of sids. ldap calls can just resolve one sid at a time.
1053 * At this stage, the sids are still hidden in the exetended dn
1054 * member output format. We actually do a little better than
1055 * stated above: In extracting the sids from the member strings,
1056 * we try to resolve as many sids as possible from the
1057 * cache. Only the rest is passed to the lsa_lookup_sids call. */
1059 if (num_members) {
1060 (*sid_mem) = TALLOC_ZERO_ARRAY(mem_ctx, DOM_SID, num_members);
1061 (*names) = TALLOC_ZERO_ARRAY(mem_ctx, char *, num_members);
1062 (*name_types) = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_members);
1063 (sid_mem_nocache) = TALLOC_ZERO_ARRAY(tmp_ctx, DOM_SID, num_members);
1065 if ((members == NULL) || (*sid_mem == NULL) ||
1066 (*names == NULL) || (*name_types == NULL) ||
1067 (sid_mem_nocache == NULL))
1069 DEBUG(1, ("ads: lookup_groupmem: talloc failed\n"));
1070 status = NT_STATUS_NO_MEMORY;
1071 goto done;
1074 else {
1075 (*sid_mem) = NULL;
1076 (*names) = NULL;
1077 (*name_types) = NULL;
1080 for (i=0; i<num_members; i++) {
1081 enum lsa_SidType name_type;
1082 char *name, *domain_name;
1083 DOM_SID sid;
1085 rc = ads_get_sid_from_extended_dn(tmp_ctx, members[i], args.val,
1086 &sid);
1087 if (!ADS_ERR_OK(rc)) {
1088 if (NT_STATUS_EQUAL(ads_ntstatus(rc),
1089 NT_STATUS_NOT_FOUND)) {
1090 /* Group members can be objects, like Exchange
1091 * Public Folders, that don't have a SID. Skip
1092 * them. */
1093 continue;
1095 else {
1096 status = ads_ntstatus(rc);
1097 goto done;
1100 if (lookup_cached_sid(mem_ctx, &sid, &domain_name, &name,
1101 &name_type)) {
1102 DEBUG(10,("ads: lookup_groupmem: got sid %s from "
1103 "cache\n", sid_string_dbg(&sid)));
1104 sid_copy(&(*sid_mem)[*num_names], &sid);
1105 (*names)[*num_names] = fill_domain_username_talloc(
1106 *names,
1107 domain_name,
1108 name,
1109 true);
1111 (*name_types)[*num_names] = name_type;
1112 (*num_names)++;
1114 else {
1115 DEBUG(10, ("ads: lookup_groupmem: sid %s not found in "
1116 "cache\n", sid_string_dbg(&sid)));
1117 sid_copy(&(sid_mem_nocache)[num_nocache], &sid);
1118 num_nocache++;
1122 DEBUG(10, ("ads: lookup_groupmem: %d sids found in cache, "
1123 "%d left for lsa_lookupsids\n", *num_names, num_nocache));
1125 /* handle sids not resolved from cache by lsa_lookup_sids */
1126 if (num_nocache > 0) {
1127 unsigned int orig_timeout;
1129 status = cm_connect_lsa(domain, tmp_ctx, &cli, &lsa_policy);
1131 if (!NT_STATUS_IS_OK(status)) {
1132 goto done;
1136 * This call can take a long time
1137 * allow the server to time out.
1138 * 35 seconds should do it.
1140 orig_timeout = rpccli_set_timeout(cli, 35000);
1142 status = rpccli_lsa_lookup_sids(cli, tmp_ctx,
1143 &lsa_policy,
1144 num_nocache,
1145 sid_mem_nocache,
1146 &domains_nocache,
1147 &names_nocache,
1148 &name_types_nocache);
1150 /* And restore our original timeout. */
1151 rpccli_set_timeout(cli, orig_timeout);
1153 if (!(NT_STATUS_IS_OK(status) ||
1154 NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED) ||
1155 NT_STATUS_EQUAL(status, NT_STATUS_NONE_MAPPED)))
1157 DEBUG(1, ("lsa_lookupsids call failed with %s "
1158 "- retrying...\n", nt_errstr(status)));
1160 status = cm_connect_lsa(domain, tmp_ctx, &cli,
1161 &lsa_policy);
1163 if (!NT_STATUS_IS_OK(status)) {
1164 goto done;
1168 * This call can take a long time
1169 * allow the server to time out.
1170 * 35 seconds should do it.
1172 orig_timeout = rpccli_set_timeout(cli, 35000);
1174 status = rpccli_lsa_lookup_sids(cli, tmp_ctx,
1175 &lsa_policy,
1176 num_nocache,
1177 sid_mem_nocache,
1178 &domains_nocache,
1179 &names_nocache,
1180 &name_types_nocache);
1182 /* And restore our original timeout. */
1183 rpccli_set_timeout(cli, orig_timeout);
1186 if (NT_STATUS_IS_OK(status) ||
1187 NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED))
1189 /* Copy the entries over from the "_nocache" arrays
1190 * to the result arrays, skipping the gaps the
1191 * lookup_sids call left. */
1192 for (i=0; i < num_nocache; i++) {
1193 if (((names_nocache)[i] != NULL) &&
1194 ((name_types_nocache)[i] != SID_NAME_UNKNOWN))
1196 sid_copy(&(*sid_mem)[*num_names],
1197 &sid_mem_nocache[i]);
1198 (*names)[*num_names] =
1199 fill_domain_username_talloc(
1200 *names,
1201 domains_nocache[i],
1202 names_nocache[i],
1203 true);
1204 (*name_types)[*num_names] = name_types_nocache[i];
1205 (*num_names)++;
1209 else if (NT_STATUS_EQUAL(status, NT_STATUS_NONE_MAPPED)) {
1210 DEBUG(10, ("lookup_groupmem: lsa_lookup_sids could "
1211 "not map any SIDs at all.\n"));
1212 /* Don't handle this as an error here.
1213 * There is nothing left to do with respect to the
1214 * overall result... */
1216 else if (!NT_STATUS_IS_OK(status)) {
1217 DEBUG(10, ("lookup_groupmem: Error looking up %d "
1218 "sids via rpc_lsa_lookup_sids: %s\n",
1219 (int)num_members, nt_errstr(status)));
1220 goto done;
1224 status = NT_STATUS_OK;
1225 DEBUG(3,("ads lookup_groupmem for sid=%s succeeded\n",
1226 sid_string_dbg(group_sid)));
1228 done:
1230 TALLOC_FREE(tmp_ctx);
1232 return status;
1235 /* find the sequence number for a domain */
1236 static NTSTATUS sequence_number(struct winbindd_domain *domain, uint32 *seq)
1238 ADS_STRUCT *ads = NULL;
1239 ADS_STATUS rc;
1241 DEBUG(3,("ads: fetch sequence_number for %s\n", domain->name));
1243 if ( !winbindd_can_contact_domain( domain ) ) {
1244 DEBUG(10,("sequence: No incoming trust for domain %s\n",
1245 domain->name));
1246 *seq = time(NULL);
1247 return NT_STATUS_OK;
1250 *seq = DOM_SEQUENCE_NONE;
1252 ads = ads_cached_connection(domain);
1254 if (!ads) {
1255 domain->last_status = NT_STATUS_SERVER_DISABLED;
1256 return NT_STATUS_UNSUCCESSFUL;
1259 rc = ads_USN(ads, seq);
1261 if (!ADS_ERR_OK(rc)) {
1263 /* its a dead connection, destroy it */
1265 if (domain->private_data) {
1266 ads = (ADS_STRUCT *)domain->private_data;
1267 ads->is_mine = True;
1268 ads_destroy(&ads);
1269 ads_kdestroy("MEMORY:winbind_ccache");
1270 domain->private_data = NULL;
1273 return ads_ntstatus(rc);
1276 /* find the lockout policy of a domain - use rpc methods */
1277 static NTSTATUS lockout_policy(struct winbindd_domain *domain,
1278 TALLOC_CTX *mem_ctx,
1279 struct samr_DomInfo12 *policy)
1281 return reconnect_methods.lockout_policy(domain, mem_ctx, policy);
1284 /* find the password policy of a domain - use rpc methods */
1285 static NTSTATUS password_policy(struct winbindd_domain *domain,
1286 TALLOC_CTX *mem_ctx,
1287 struct samr_DomInfo1 *policy)
1289 return reconnect_methods.password_policy(domain, mem_ctx, policy);
1292 /* get a list of trusted domains */
1293 static NTSTATUS trusted_domains(struct winbindd_domain *domain,
1294 TALLOC_CTX *mem_ctx,
1295 uint32 *num_domains,
1296 char ***names,
1297 char ***alt_names,
1298 DOM_SID **dom_sids)
1300 NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
1301 struct netr_DomainTrustList trusts;
1302 int i;
1303 uint32 flags;
1304 struct rpc_pipe_client *cli;
1305 uint32 fr_flags = (NETR_TRUST_FLAG_IN_FOREST | NETR_TRUST_FLAG_TREEROOT);
1306 int ret_count;
1308 DEBUG(3,("ads: trusted_domains\n"));
1310 *num_domains = 0;
1311 *alt_names = NULL;
1312 *names = NULL;
1313 *dom_sids = NULL;
1315 /* If this is our primary domain or a root in our forest,
1316 query for all trusts. If not, then just look for domain
1317 trusts in the target forest */
1319 if ( domain->primary ||
1320 ((domain->domain_flags&fr_flags) == fr_flags) )
1322 flags = NETR_TRUST_FLAG_OUTBOUND |
1323 NETR_TRUST_FLAG_INBOUND |
1324 NETR_TRUST_FLAG_IN_FOREST;
1325 } else {
1326 flags = NETR_TRUST_FLAG_IN_FOREST;
1329 result = cm_connect_netlogon(domain, &cli);
1331 if (!NT_STATUS_IS_OK(result)) {
1332 DEBUG(5, ("trusted_domains: Could not open a connection to %s "
1333 "for PIPE_NETLOGON (%s)\n",
1334 domain->name, nt_errstr(result)));
1335 return NT_STATUS_UNSUCCESSFUL;
1338 result = rpccli_netr_DsrEnumerateDomainTrusts(cli, mem_ctx,
1339 cli->desthost,
1340 flags,
1341 &trusts,
1342 NULL);
1343 if ( NT_STATUS_IS_OK(result) && trusts.count) {
1345 /* Allocate memory for trusted domain names and sids */
1347 if ( !(*names = TALLOC_ARRAY(mem_ctx, char *, trusts.count)) ) {
1348 DEBUG(0, ("trusted_domains: out of memory\n"));
1349 return NT_STATUS_NO_MEMORY;
1352 if ( !(*alt_names = TALLOC_ARRAY(mem_ctx, char *, trusts.count)) ) {
1353 DEBUG(0, ("trusted_domains: out of memory\n"));
1354 return NT_STATUS_NO_MEMORY;
1357 if ( !(*dom_sids = TALLOC_ARRAY(mem_ctx, DOM_SID, trusts.count)) ) {
1358 DEBUG(0, ("trusted_domains: out of memory\n"));
1359 return NT_STATUS_NO_MEMORY;
1362 /* Copy across names and sids */
1365 ret_count = 0;
1366 for (i = 0; i < trusts.count; i++) {
1367 struct winbindd_domain d;
1369 ZERO_STRUCT(d);
1371 /* drop external trusts if this is not our primary
1372 domain. This means that the returned number of
1373 domains may be less that the ones actually trusted
1374 by the DC. */
1376 if ( (trusts.array[i].trust_attributes == NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN) &&
1377 !domain->primary )
1379 DEBUG(10,("trusted_domains: Skipping external trusted domain "
1380 "%s because it is outside of our primary domain\n",
1381 trusts.array[i].netbios_name));
1382 continue;
1385 (*names)[ret_count] = CONST_DISCARD(char *, trusts.array[i].netbios_name);
1386 (*alt_names)[ret_count] = CONST_DISCARD(char *, trusts.array[i].dns_name);
1387 if (trusts.array[i].sid) {
1388 sid_copy(&(*dom_sids)[ret_count], trusts.array[i].sid);
1389 } else {
1390 sid_copy(&(*dom_sids)[ret_count], &global_sid_NULL);
1393 /* add to the trusted domain cache */
1395 fstrcpy( d.name, trusts.array[i].netbios_name);
1396 fstrcpy( d.alt_name, trusts.array[i].dns_name);
1397 if (trusts.array[i].sid) {
1398 sid_copy( &d.sid, trusts.array[i].sid);
1399 } else {
1400 sid_copy(&d.sid, &global_sid_NULL);
1403 if ( domain->primary ) {
1404 DEBUG(10,("trusted_domains(ads): Searching "
1405 "trusted domain list of %s and storing "
1406 "trust flags for domain %s\n",
1407 domain->name, d.alt_name));
1409 d.domain_flags = trusts.array[i].trust_flags;
1410 d.domain_type = trusts.array[i].trust_type;
1411 d.domain_trust_attribs = trusts.array[i].trust_attributes;
1413 wcache_tdc_add_domain( &d );
1414 ret_count++;
1415 } else if ( (domain->domain_flags&fr_flags) == fr_flags ) {
1416 /* Check if we already have this record. If
1417 * we are following our forest root that is not
1418 * our primary domain, we want to keep trust
1419 * flags from the perspective of our primary
1420 * domain not our forest root. */
1421 struct winbindd_tdc_domain *exist = NULL;
1423 exist =
1424 wcache_tdc_fetch_domain(NULL, trusts.array[i].netbios_name);
1425 if (!exist) {
1426 DEBUG(10,("trusted_domains(ads): Searching "
1427 "trusted domain list of %s and storing "
1428 "trust flags for domain %s\n",
1429 domain->name, d.alt_name));
1430 d.domain_flags = trusts.array[i].trust_flags;
1431 d.domain_type = trusts.array[i].trust_type;
1432 d.domain_trust_attribs = trusts.array[i].trust_attributes;
1434 wcache_tdc_add_domain( &d );
1435 ret_count++;
1437 TALLOC_FREE(exist);
1438 } else {
1439 /* This gets a little tricky. If we are
1440 following a transitive forest trust, then
1441 innerit the flags, type, and attribs from
1442 the domain we queried to make sure we don't
1443 record the view of the trust from the wrong
1444 side. Always view it from the side of our
1445 primary domain. --jerry */
1446 struct winbindd_tdc_domain *parent = NULL;
1448 DEBUG(10,("trusted_domains(ads): Searching "
1449 "trusted domain list of %s and inheriting "
1450 "trust flags for domain %s\n",
1451 domain->name, d.alt_name));
1453 parent = wcache_tdc_fetch_domain(NULL, domain->name);
1454 if (parent) {
1455 d.domain_flags = parent->trust_flags;
1456 d.domain_type = parent->trust_type;
1457 d.domain_trust_attribs = parent->trust_attribs;
1458 } else {
1459 d.domain_flags = domain->domain_flags;
1460 d.domain_type = domain->domain_type;
1461 d.domain_trust_attribs = domain->domain_trust_attribs;
1463 TALLOC_FREE(parent);
1465 wcache_tdc_add_domain( &d );
1466 ret_count++;
1470 *num_domains = ret_count;
1473 return result;
1476 /* the ADS backend methods are exposed via this structure */
1477 struct winbindd_methods ads_methods = {
1478 True,
1479 query_user_list,
1480 enum_dom_groups,
1481 enum_local_groups,
1482 name_to_sid,
1483 sid_to_name,
1484 rids_to_names,
1485 query_user,
1486 lookup_usergroups,
1487 lookup_useraliases,
1488 lookup_groupmem,
1489 sequence_number,
1490 lockout_policy,
1491 password_policy,
1492 trusted_domains,
1495 #endif