gensec: Refactor gensec_security_mechs()
[samba4-gss.git] / source4 / dsdb / kcc / kcc_service.c
blob066cc070c30470b998579316298496e05823e93e
1 /*
2 Unix SMB/CIFS Implementation.
4 KCC service
6 Copyright (C) Andrew Tridgell 2009
7 based on repl service code
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "includes.h"
25 #include "dsdb/samdb/samdb.h"
26 #include "auth/auth.h"
27 #include "samba/service.h"
28 #include "lib/events/events.h"
29 #include "lib/messaging/irpc.h"
30 #include "dsdb/kcc/kcc_service.h"
31 #include <ldb_errors.h>
32 #include "../lib/util/dlinklist.h"
33 #include "librpc/gen_ndr/ndr_misc.h"
34 #include "librpc/gen_ndr/ndr_drsuapi.h"
35 #include "librpc/gen_ndr/ndr_drsblobs.h"
36 #include "param/param.h"
37 #include "libds/common/roles.h"
40 establish system creds
42 static WERROR kccsrv_init_creds(struct kccsrv_service *service)
44 service->system_session_info = system_session(service->task->lp_ctx);
45 if (!service->system_session_info) {
46 return WERR_NOT_ENOUGH_MEMORY;
49 return WERR_OK;
53 connect to the local SAM
55 static WERROR kccsrv_connect_samdb(struct kccsrv_service *service, struct loadparm_context *lp_ctx)
57 const struct GUID *ntds_guid;
59 service->samdb = samdb_connect(service,
60 service->task->event_ctx,
61 lp_ctx,
62 service->system_session_info,
63 NULL,
64 0);
65 if (!service->samdb) {
66 return WERR_DS_UNAVAILABLE;
69 ntds_guid = samdb_ntds_objectGUID(service->samdb);
70 if (!ntds_guid) {
71 DBG_ERR("Failed to determine own NTDS objectGUID\n");
72 return WERR_DS_UNAVAILABLE;
75 service->ntds_guid = *ntds_guid;
77 if (samdb_rodc(service->samdb, &service->am_rodc) != LDB_SUCCESS) {
78 DEBUG(0,(__location__ ": Failed to determine RODC status\n"));
79 return WERR_DS_UNAVAILABLE;
82 return WERR_OK;
87 load our local partition list
89 static WERROR kccsrv_load_partitions(struct kccsrv_service *s)
91 struct ldb_dn *basedn;
92 struct ldb_result *r;
93 struct ldb_message_element *el;
94 static const char *attrs[] = { "namingContexts", "configurationNamingContext", NULL };
95 unsigned int i;
96 int ret;
98 basedn = ldb_dn_new(s, s->samdb, NULL);
99 W_ERROR_HAVE_NO_MEMORY(basedn);
101 ret = ldb_search(s->samdb, s, &r, basedn, LDB_SCOPE_BASE, attrs,
102 "(objectClass=*)");
103 talloc_free(basedn);
104 if (ret != LDB_SUCCESS) {
105 return WERR_FOOBAR;
106 } else if (r->count != 1) {
107 talloc_free(r);
108 return WERR_FOOBAR;
111 el = ldb_msg_find_element(r->msgs[0], "namingContexts");
112 if (!el) {
113 return WERR_FOOBAR;
116 for (i=0; i < el->num_values; i++) {
117 const char *v = (const char *)el->values[i].data;
118 struct ldb_dn *pdn;
119 struct dsdb_ldb_dn_list_node *p;
121 pdn = ldb_dn_new(s, s->samdb, v);
122 if (!ldb_dn_validate(pdn)) {
123 return WERR_FOOBAR;
126 p = talloc_zero(s, struct dsdb_ldb_dn_list_node);
127 W_ERROR_HAVE_NO_MEMORY(p);
129 p->dn = talloc_steal(p, pdn);
131 DLIST_ADD(s->partitions, p);
133 DEBUG(2, ("kccsrv_partition[%s] loaded\n", v));
136 el = ldb_msg_find_element(r->msgs[0], "configurationNamingContext");
137 if (!el) {
138 return WERR_FOOBAR;
140 s->config_dn = ldb_dn_new(s, s->samdb, (const char *)el->values[0].data);
141 if (!ldb_dn_validate(s->config_dn)) {
142 return WERR_FOOBAR;
145 talloc_free(r);
147 return WERR_OK;
151 struct kcc_manual_runcmd_state {
152 struct irpc_message *msg;
153 struct drsuapi_DsExecuteKCC *r;
154 struct kccsrv_service *service;
159 * Called when samba_kcc script has finished
161 static void manual_samba_kcc_done(struct tevent_req *subreq)
163 struct kcc_manual_runcmd_state *st =
164 tevent_req_callback_data(subreq,
165 struct kcc_manual_runcmd_state);
166 int rc;
167 int sys_errno;
168 NTSTATUS status;
170 st->service->periodic.subreq = NULL;
172 rc = samba_runcmd_recv(subreq, &sys_errno);
173 TALLOC_FREE(subreq);
175 if (rc != 0) {
176 status = map_nt_error_from_unix_common(sys_errno);
177 } else {
178 status = NT_STATUS_OK;
181 if (!NT_STATUS_IS_OK(status)) {
182 DEBUG(0,(__location__ ": Failed manual run of samba_kcc - %s\n",
183 nt_errstr(status)));
184 } else {
185 DEBUG(3,("Completed manual run of samba_kcc OK\n"));
188 if (!(st->r->in.req->ctr1.flags & DRSUAPI_DS_EXECUTE_KCC_ASYNCHRONOUS_OPERATION)) {
189 irpc_send_reply(st->msg, status);
193 static NTSTATUS kccsrv_execute_kcc(struct irpc_message *msg, struct drsuapi_DsExecuteKCC *r)
195 TALLOC_CTX *mem_ctx;
196 NTSTATUS status = NT_STATUS_OK;
197 struct kccsrv_service *service = talloc_get_type(msg->private_data, struct kccsrv_service);
199 const char * const *samba_kcc_command;
200 struct kcc_manual_runcmd_state *st;
202 if (!service->samba_kcc_code) {
203 mem_ctx = talloc_new(service);
205 status = kccsrv_simple_update(service, mem_ctx);
206 if (!NT_STATUS_IS_OK(status)) {
207 DEBUG(0,("kccsrv_execute_kcc failed - %s\n",
208 nt_errstr(status)));
210 talloc_free(mem_ctx);
212 return NT_STATUS_OK;
215 /* Invocation of the samba_kcc python script for replication
216 * topology generation.
219 samba_kcc_command =
220 lpcfg_samba_kcc_command(service->task->lp_ctx);
222 st = talloc(msg, struct kcc_manual_runcmd_state);
223 if (st == NULL) {
224 return NT_STATUS_NO_MEMORY;
227 st->msg = msg;
228 st->r = r;
229 st->service = service;
231 /* don't run at the same time as an existing child */
232 if (service->periodic.subreq) {
233 status = NT_STATUS_DS_BUSY;
234 return status;
237 DEBUG(2, ("Calling samba_kcc script\n"));
238 service->periodic.subreq = samba_runcmd_send(service,
239 service->task->event_ctx,
240 timeval_current_ofs(40, 0),
241 2, 0, samba_kcc_command, NULL);
243 if (service->periodic.subreq == NULL) {
244 status = NT_STATUS_NO_MEMORY;
245 DEBUG(0,(__location__ ": failed - %s\n", nt_errstr(status)));
246 return status;
247 } else {
248 tevent_req_set_callback(service->periodic.subreq,
249 manual_samba_kcc_done, st);
252 if (r->in.req->ctr1.flags & DRSUAPI_DS_EXECUTE_KCC_ASYNCHRONOUS_OPERATION) {
253 /* This actually means reply right away, let it run in the background */
254 } else {
255 /* mark the request as replied async, the caller wants to know when this is finished */
256 msg->defer_reply = true;
258 return status;
262 static NTSTATUS kccsrv_replica_get_info(struct irpc_message *msg, struct drsuapi_DsReplicaGetInfo *r)
264 return kccdrs_replica_get_info(msg, r);
268 startup the kcc service task
270 static NTSTATUS kccsrv_task_init(struct task_server *task)
272 WERROR status;
273 struct kccsrv_service *service;
274 uint32_t periodic_startup_interval;
276 switch (lpcfg_server_role(task->lp_ctx)) {
277 case ROLE_STANDALONE:
278 task_server_terminate(task, "kccsrv: no KCC required in standalone configuration", false);
279 return NT_STATUS_INVALID_DOMAIN_ROLE;
280 case ROLE_DOMAIN_MEMBER:
281 task_server_terminate(task, "kccsrv: no KCC required in domain member configuration", false);
282 return NT_STATUS_INVALID_DOMAIN_ROLE;
283 case ROLE_ACTIVE_DIRECTORY_DC:
284 /* Yes, we want a KCC */
285 break;
288 task_server_set_title(task, "task[kccsrv]");
290 service = talloc_zero(task, struct kccsrv_service);
291 if (!service) {
292 task_server_terminate(task, "kccsrv_task_init: out of memory", true);
293 return NT_STATUS_NO_MEMORY;
295 service->task = task;
296 service->startup_time = timeval_current();
297 task->private_data = service;
299 status = kccsrv_init_creds(service);
300 if (!W_ERROR_IS_OK(status)) {
301 task_server_terminate(task,
302 talloc_asprintf(task,
303 "kccsrv: Failed to obtain server credentials: %s\n",
304 win_errstr(status)), true);
305 return werror_to_ntstatus(status);
308 status = kccsrv_connect_samdb(service, task->lp_ctx);
309 if (!W_ERROR_IS_OK(status)) {
310 task_server_terminate(task, talloc_asprintf(task,
311 "kccsrv: Failed to connect to local samdb: %s\n",
312 win_errstr(status)), true);
313 return werror_to_ntstatus(status);
316 status = kccsrv_load_partitions(service);
317 if (!W_ERROR_IS_OK(status)) {
318 task_server_terminate(task, talloc_asprintf(task,
319 "kccsrv: Failed to load partitions: %s\n",
320 win_errstr(status)), true);
321 return werror_to_ntstatus(status);
324 periodic_startup_interval =
325 lpcfg_parm_int(task->lp_ctx, NULL, "kccsrv",
326 "periodic_startup_interval", 15); /* in seconds */
327 service->periodic.interval =
328 lpcfg_parm_int(task->lp_ctx, NULL, "kccsrv",
329 "periodic_interval", 300); /* in seconds */
331 /* (kccsrv:samba_kcc=true) will run newer samba_kcc replication
332 * topology generation code.
334 service->samba_kcc_code = lpcfg_parm_bool(task->lp_ctx, NULL,
335 "kccsrv", "samba_kcc", true);
337 status = kccsrv_periodic_schedule(service, periodic_startup_interval);
338 if (!W_ERROR_IS_OK(status)) {
339 task_server_terminate(task, talloc_asprintf(task,
340 "kccsrv: Failed to periodic schedule: %s\n",
341 win_errstr(status)), true);
342 return werror_to_ntstatus(status);
345 irpc_add_name(task->msg_ctx, "kccsrv");
347 IRPC_REGISTER(task->msg_ctx, drsuapi, DRSUAPI_DSEXECUTEKCC, kccsrv_execute_kcc, service);
348 IRPC_REGISTER(task->msg_ctx, drsuapi, DRSUAPI_DSREPLICAGETINFO, kccsrv_replica_get_info, service);
349 return NT_STATUS_OK;
353 register ourselves as a available server
355 NTSTATUS server_service_kcc_init(TALLOC_CTX *ctx)
357 static const struct service_details details = {
358 .inhibit_fork_on_accept = true,
359 .inhibit_pre_fork = true,
360 .task_init = kccsrv_task_init,
361 .post_fork = NULL
363 return register_server_service(ctx, "kcc", &details);