1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-25 06:04:04 +03:00
Michael Adam 476672b647 dlist: remove unneeded type argument from DLIST_ADD_END()
Signed-off-by: Michael Adam <obnox@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
2016-02-06 21:48:17 +01:00

511 lines
12 KiB
C

/*
ldb database library
Copyright (C) Andrew Bartlett <abartlet@samba.org> 2007
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
/*
* Name: ldb
*
* Component: ldb update_keytabs module
*
* Description: Update keytabs whenever their matching secret record changes
*
* Author: Andrew Bartlett
*/
#include "includes.h"
#include "ldb_module.h"
#include "lib/util/dlinklist.h"
#include "auth/credentials/credentials.h"
#include "auth/credentials/credentials_krb5.h"
#include "system/kerberos.h"
#include "auth/kerberos/kerberos.h"
#include "auth/kerberos/kerberos_srv_keytab.h"
#include "dsdb/samdb/ldb_modules/util.h"
#include "param/secrets.h"
struct dn_list {
struct ldb_message *msg;
bool do_delete;
struct dn_list *prev, *next;
};
struct update_kt_private {
struct dn_list *changed_dns;
};
struct update_kt_ctx {
struct ldb_module *module;
struct ldb_request *req;
struct ldb_dn *dn;
bool do_delete;
struct ldb_reply *op_reply;
bool found;
};
static struct update_kt_ctx *update_kt_ctx_init(struct ldb_module *module,
struct ldb_request *req)
{
struct update_kt_ctx *ac;
ac = talloc_zero(req, struct update_kt_ctx);
if (ac == NULL) {
ldb_oom(ldb_module_get_ctx(module));
return NULL;
}
ac->module = module;
ac->req = req;
return ac;
}
/* FIXME: too many semi-async searches here for my taste, direct and indirect as
* cli_credentials_set_secrets() performs a sync ldb search.
* Just hope we are lucky and nothing breaks (using the tdb backend masks a lot
* of async issues). -SSS
*/
static int add_modified(struct ldb_module *module, struct ldb_dn *dn, bool do_delete,
struct ldb_request *parent)
{
struct ldb_context *ldb = ldb_module_get_ctx(module);
struct update_kt_private *data = talloc_get_type(ldb_module_get_private(module), struct update_kt_private);
struct dn_list *item;
char *filter;
struct ldb_result *res;
int ret;
filter = talloc_asprintf(data,
"(&(objectClass=kerberosSecret)(privateKeytab=*))");
if (!filter) {
return ldb_oom(ldb);
}
ret = dsdb_module_search(module, data, &res,
dn, LDB_SCOPE_BASE, NULL,
DSDB_FLAG_NEXT_MODULE, parent,
"%s", filter);
talloc_free(filter);
if (ret != LDB_SUCCESS) {
return ret;
}
if (res->count != 1) {
/* if it's not a kerberosSecret then we don't have anything to update */
talloc_free(res);
return LDB_SUCCESS;
}
item = talloc(data->changed_dns? (void *)data->changed_dns: (void *)data, struct dn_list);
if (!item) {
talloc_free(res);
return ldb_oom(ldb);
}
item->msg = talloc_steal(item, res->msgs[0]);
item->do_delete = do_delete;
talloc_free(res);
DLIST_ADD_END(data->changed_dns, item);
return LDB_SUCCESS;
}
static int ukt_search_modified(struct update_kt_ctx *ac);
static int update_kt_op_callback(struct ldb_request *req,
struct ldb_reply *ares)
{
struct ldb_context *ldb;
struct update_kt_ctx *ac;
int ret;
ac = talloc_get_type(req->context, struct update_kt_ctx);
ldb = ldb_module_get_ctx(ac->module);
if (!ares) {
return ldb_module_done(ac->req, NULL, NULL,
LDB_ERR_OPERATIONS_ERROR);
}
if (ares->error != LDB_SUCCESS) {
return ldb_module_done(ac->req, ares->controls,
ares->response, ares->error);
}
if (ares->type != LDB_REPLY_DONE) {
ldb_set_errstring(ldb, "Invalid request type!\n");
return ldb_module_done(ac->req, NULL, NULL,
LDB_ERR_OPERATIONS_ERROR);
}
if (ac->do_delete) {
return ldb_module_done(ac->req, ares->controls,
ares->response, LDB_SUCCESS);
}
ac->op_reply = talloc_steal(ac, ares);
ret = ukt_search_modified(ac);
if (ret != LDB_SUCCESS) {
return ldb_module_done(ac->req, NULL, NULL, ret);
}
return LDB_SUCCESS;
}
static int ukt_del_op(struct update_kt_ctx *ac)
{
struct ldb_context *ldb;
struct ldb_request *down_req;
int ret;
ldb = ldb_module_get_ctx(ac->module);
ret = ldb_build_del_req(&down_req, ldb, ac,
ac->dn,
ac->req->controls,
ac, update_kt_op_callback,
ac->req);
LDB_REQ_SET_LOCATION(down_req);
if (ret != LDB_SUCCESS) {
return ret;
}
return ldb_next_request(ac->module, down_req);
}
static int ukt_search_modified_callback(struct ldb_request *req,
struct ldb_reply *ares)
{
struct update_kt_ctx *ac;
int ret;
ac = talloc_get_type(req->context, struct update_kt_ctx);
if (!ares) {
return ldb_module_done(ac->req, NULL, NULL,
LDB_ERR_OPERATIONS_ERROR);
}
if (ares->error != LDB_SUCCESS) {
return ldb_module_done(ac->req, ares->controls,
ares->response, ares->error);
}
switch (ares->type) {
case LDB_REPLY_ENTRY:
ac->found = true;
break;
case LDB_REPLY_REFERRAL:
/* ignore */
break;
case LDB_REPLY_DONE:
if (ac->found) {
/* do the dirty sync job here :/ */
ret = add_modified(ac->module, ac->dn, ac->do_delete, ac->req);
}
if (ac->do_delete) {
ret = ukt_del_op(ac);
if (ret != LDB_SUCCESS) {
return ldb_module_done(ac->req,
NULL, NULL, ret);
}
break;
}
return ldb_module_done(ac->req, ac->op_reply->controls,
ac->op_reply->response, LDB_SUCCESS);
}
talloc_free(ares);
return LDB_SUCCESS;
}
static int ukt_search_modified(struct update_kt_ctx *ac)
{
struct ldb_context *ldb;
static const char * const no_attrs[] = { NULL };
struct ldb_request *search_req;
int ret;
ldb = ldb_module_get_ctx(ac->module);
ret = ldb_build_search_req(&search_req, ldb, ac,
ac->dn, LDB_SCOPE_BASE,
"(&(objectClass=kerberosSecret)"
"(privateKeytab=*))", no_attrs,
NULL,
ac, ukt_search_modified_callback,
ac->req);
LDB_REQ_SET_LOCATION(search_req);
if (ret != LDB_SUCCESS) {
return ret;
}
return ldb_next_request(ac->module, search_req);
}
/* add */
static int update_kt_add(struct ldb_module *module, struct ldb_request *req)
{
struct ldb_context *ldb;
struct update_kt_ctx *ac;
struct ldb_request *down_req;
int ret;
ldb = ldb_module_get_ctx(module);
ac = update_kt_ctx_init(module, req);
if (ac == NULL) {
return ldb_operr(ldb);
}
ac->dn = req->op.add.message->dn;
ret = ldb_build_add_req(&down_req, ldb, ac,
req->op.add.message,
req->controls,
ac, update_kt_op_callback,
req);
LDB_REQ_SET_LOCATION(down_req);
if (ret != LDB_SUCCESS) {
return ret;
}
return ldb_next_request(module, down_req);
}
/* modify */
static int update_kt_modify(struct ldb_module *module, struct ldb_request *req)
{
struct ldb_context *ldb;
struct update_kt_ctx *ac;
struct ldb_request *down_req;
int ret;
ldb = ldb_module_get_ctx(module);
ac = update_kt_ctx_init(module, req);
if (ac == NULL) {
return ldb_operr(ldb);
}
ac->dn = req->op.mod.message->dn;
ret = ldb_build_mod_req(&down_req, ldb, ac,
req->op.mod.message,
req->controls,
ac, update_kt_op_callback,
req);
LDB_REQ_SET_LOCATION(down_req);
if (ret != LDB_SUCCESS) {
return ret;
}
return ldb_next_request(module, down_req);
}
/* delete */
static int update_kt_delete(struct ldb_module *module, struct ldb_request *req)
{
struct update_kt_ctx *ac;
ac = update_kt_ctx_init(module, req);
if (ac == NULL) {
return ldb_operr(ldb_module_get_ctx(module));
}
ac->dn = req->op.del.dn;
ac->do_delete = true;
return ukt_search_modified(ac);
}
/* rename */
static int update_kt_rename(struct ldb_module *module, struct ldb_request *req)
{
struct ldb_context *ldb;
struct update_kt_ctx *ac;
struct ldb_request *down_req;
int ret;
ldb = ldb_module_get_ctx(module);
ac = update_kt_ctx_init(module, req);
if (ac == NULL) {
return ldb_operr(ldb);
}
ac->dn = req->op.rename.newdn;
ret = ldb_build_rename_req(&down_req, ldb, ac,
req->op.rename.olddn,
req->op.rename.newdn,
req->controls,
ac, update_kt_op_callback,
req);
LDB_REQ_SET_LOCATION(down_req);
if (ret != LDB_SUCCESS) {
return ret;
}
return ldb_next_request(module, down_req);
}
/* prepare for a commit */
static int update_kt_prepare_commit(struct ldb_module *module)
{
struct ldb_context *ldb = ldb_module_get_ctx(module);
struct update_kt_private *data = talloc_get_type(ldb_module_get_private(module), struct update_kt_private);
struct dn_list *p;
struct smb_krb5_context *smb_krb5_context;
int krb5_ret = smb_krb5_init_context(data,
ldb_get_opaque(ldb, "loadparm"),
&smb_krb5_context);
TALLOC_CTX *tmp_ctx = NULL;
if (krb5_ret != 0) {
ldb_asprintf_errstring(ldb, "Failed to setup krb5_context: %s", error_message(krb5_ret));
goto fail;
}
tmp_ctx = talloc_new(data);
if (!tmp_ctx) {
ldb_oom(ldb);
goto fail;
}
for (p=data->changed_dns; p; p = p->next) {
const char *error_string;
const char *realm;
char *upper_realm;
struct ldb_message_element *spn_el = ldb_msg_find_element(p->msg, "servicePrincipalName");
const char **SPNs = NULL;
int num_SPNs = 0;
int i;
realm = ldb_msg_find_attr_as_string(p->msg, "realm", NULL);
if (spn_el) {
upper_realm = strupper_talloc(tmp_ctx, realm);
if (!upper_realm) {
ldb_oom(ldb);
goto fail;
}
num_SPNs = spn_el->num_values;
SPNs = talloc_array(tmp_ctx, const char *, num_SPNs);
if (!SPNs) {
ldb_oom(ldb);
goto fail;
}
for (i = 0; i < num_SPNs; i++) {
SPNs[i] = talloc_asprintf(SPNs, "%*.*s@%s",
(int)spn_el->values[i].length,
(int)spn_el->values[i].length,
(const char *)spn_el->values[i].data,
upper_realm);
if (!SPNs[i]) {
ldb_oom(ldb);
goto fail;
}
}
}
krb5_ret = smb_krb5_update_keytab(tmp_ctx, smb_krb5_context->krb5_context,
keytab_name_from_msg(tmp_ctx, ldb, p->msg),
ldb_msg_find_attr_as_string(p->msg, "samAccountName", NULL),
realm, SPNs, num_SPNs,
ldb_msg_find_attr_as_string(p->msg, "saltPrincipal", NULL),
ldb_msg_find_attr_as_string(p->msg, "secret", NULL),
ldb_msg_find_attr_as_string(p->msg, "priorSecret", NULL),
ldb_msg_find_attr_as_int(p->msg, "msDS-KeyVersionNumber", 0),
(uint32_t)ldb_msg_find_attr_as_int(p->msg, "msDS-SupportedEncryptionTypes", ENC_ALL_TYPES),
p->do_delete, NULL, &error_string);
if (krb5_ret != 0) {
ldb_asprintf_errstring(ldb, "Failed to update keytab from entry %s in %s: %s",
ldb_dn_get_linearized(p->msg->dn),
(const char *)ldb_get_opaque(ldb, "ldb_url"),
error_string);
goto fail;
}
}
talloc_free(data->changed_dns);
data->changed_dns = NULL;
talloc_free(tmp_ctx);
return ldb_next_prepare_commit(module);
fail:
talloc_free(data->changed_dns);
data->changed_dns = NULL;
talloc_free(tmp_ctx);
return LDB_ERR_OPERATIONS_ERROR;
}
/* end a transaction */
static int update_kt_del_trans(struct ldb_module *module)
{
struct update_kt_private *data = talloc_get_type(ldb_module_get_private(module), struct update_kt_private);
talloc_free(data->changed_dns);
data->changed_dns = NULL;
return ldb_next_del_trans(module);
}
static int update_kt_init(struct ldb_module *module)
{
struct ldb_context *ldb;
struct update_kt_private *data;
ldb = ldb_module_get_ctx(module);
data = talloc(module, struct update_kt_private);
if (data == NULL) {
return ldb_oom(ldb);
}
data->changed_dns = NULL;
ldb_module_set_private(module, data);
return ldb_next_init(module);
}
static const struct ldb_module_ops ldb_update_keytab_module_ops = {
.name = "update_keytab",
.init_context = update_kt_init,
.add = update_kt_add,
.modify = update_kt_modify,
.rename = update_kt_rename,
.del = update_kt_delete,
.prepare_commit = update_kt_prepare_commit,
.del_transaction = update_kt_del_trans,
};
int ldb_update_keytab_module_init(const char *version)
{
LDB_MODULE_CHECK_VERSION(version);
return ldb_register_module(&ldb_update_keytab_module_ops);
}