source: trunk/server/source4/dsdb/kcc/kcc_service.c

Last change on this file was 745, checked in by Silvan Scherrer, 13 years ago

Samba Server: updated trunk to 3.6.0

File size: 6.8 KB
Line 
1/*
2 Unix SMB/CIFS mplementation.
3
4 KCC service
5
6 Copyright (C) Andrew Tridgell 2009
7 based on repl service code
8
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
13
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
18
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
21
22*/
23
24#include "includes.h"
25#include "dsdb/samdb/samdb.h"
26#include "auth/auth.h"
27#include "smbd/service.h"
28#include "lib/events/events.h"
29#include "lib/messaging/irpc.h"
30#include "dsdb/kcc/kcc_service.h"
31#include <ldb_errors.h>
32#include "../lib/util/dlinklist.h"
33#include "librpc/gen_ndr/ndr_misc.h"
34#include "librpc/gen_ndr/ndr_drsuapi.h"
35#include "librpc/gen_ndr/ndr_drsblobs.h"
36#include "param/param.h"
37
38/*
39 establish system creds
40 */
41static WERROR kccsrv_init_creds(struct kccsrv_service *service)
42{
43 service->system_session_info = system_session(service->task->lp_ctx);
44 if (!service->system_session_info) {
45 return WERR_NOMEM;
46 }
47
48 return WERR_OK;
49}
50
51/*
52 connect to the local SAM
53 */
54static WERROR kccsrv_connect_samdb(struct kccsrv_service *service, struct loadparm_context *lp_ctx)
55{
56 const struct GUID *ntds_guid;
57
58 service->samdb = samdb_connect(service, service->task->event_ctx, lp_ctx, service->system_session_info, 0);
59 if (!service->samdb) {
60 return WERR_DS_UNAVAILABLE;
61 }
62
63 ntds_guid = samdb_ntds_objectGUID(service->samdb);
64 if (!ntds_guid) {
65 return WERR_DS_UNAVAILABLE;
66 }
67
68 service->ntds_guid = *ntds_guid;
69
70 if (samdb_rodc(service->samdb, &service->am_rodc) != LDB_SUCCESS) {
71 DEBUG(0,(__location__ ": Failed to determine RODC status\n"));
72 return WERR_DS_UNAVAILABLE;
73 }
74
75 return WERR_OK;
76}
77
78
79/*
80 load our local partition list
81 */
82static WERROR kccsrv_load_partitions(struct kccsrv_service *s)
83{
84 struct ldb_dn *basedn;
85 struct ldb_result *r;
86 struct ldb_message_element *el;
87 static const char *attrs[] = { "namingContexts", "configurationNamingContext", NULL };
88 unsigned int i;
89 int ret;
90
91 basedn = ldb_dn_new(s, s->samdb, NULL);
92 W_ERROR_HAVE_NO_MEMORY(basedn);
93
94 ret = ldb_search(s->samdb, s, &r, basedn, LDB_SCOPE_BASE, attrs,
95 "(objectClass=*)");
96 talloc_free(basedn);
97 if (ret != LDB_SUCCESS) {
98 return WERR_FOOBAR;
99 } else if (r->count != 1) {
100 talloc_free(r);
101 return WERR_FOOBAR;
102 }
103
104 el = ldb_msg_find_element(r->msgs[0], "namingContexts");
105 if (!el) {
106 return WERR_FOOBAR;
107 }
108
109 for (i=0; i < el->num_values; i++) {
110 const char *v = (const char *)el->values[i].data;
111 struct ldb_dn *pdn;
112 struct kccsrv_partition *p;
113
114 pdn = ldb_dn_new(s, s->samdb, v);
115 if (!ldb_dn_validate(pdn)) {
116 return WERR_FOOBAR;
117 }
118
119 p = talloc_zero(s, struct kccsrv_partition);
120 W_ERROR_HAVE_NO_MEMORY(p);
121
122 p->dn = talloc_steal(p, pdn);
123 p->service = s;
124
125 DLIST_ADD(s->partitions, p);
126
127 DEBUG(2, ("kccsrv_partition[%s] loaded\n", v));
128 }
129
130 el = ldb_msg_find_element(r->msgs[0], "configurationNamingContext");
131 if (!el) {
132 return WERR_FOOBAR;
133 }
134 s->config_dn = ldb_dn_new(s, s->samdb, (const char *)el->values[0].data);
135 if (!ldb_dn_validate(s->config_dn)) {
136 return WERR_FOOBAR;
137 }
138
139 talloc_free(r);
140
141 return WERR_OK;
142}
143
144static NTSTATUS kccsrv_execute_kcc(struct irpc_message *msg, struct drsuapi_DsExecuteKCC *r)
145{
146 TALLOC_CTX *mem_ctx;
147 NTSTATUS status;
148 struct kccsrv_service *service = talloc_get_type(msg->private_data, struct kccsrv_service);
149
150 mem_ctx = talloc_new(service);
151 status = kccsrv_simple_update(service, mem_ctx);
152
153 if (!NT_STATUS_IS_OK(status)) {
154 DEBUG(0,("kccsrv_simple_update failed - %s\n", nt_errstr(status)));
155 talloc_free(mem_ctx);
156 return status;
157 }
158
159 talloc_free(mem_ctx);
160 return NT_STATUS_OK;
161}
162
163static NTSTATUS kccsrv_replica_get_info(struct irpc_message *msg, struct drsuapi_DsReplicaGetInfo *r)
164{
165 return kccdrs_replica_get_info(msg, r);
166}
167
168/*
169 startup the kcc service task
170*/
171static void kccsrv_task_init(struct task_server *task)
172{
173 WERROR status;
174 struct kccsrv_service *service;
175 uint32_t periodic_startup_interval;
176
177 switch (lpcfg_server_role(task->lp_ctx)) {
178 case ROLE_STANDALONE:
179 task_server_terminate(task, "kccsrv: no KCC required in standalone configuration", false);
180 return;
181 case ROLE_DOMAIN_MEMBER:
182 task_server_terminate(task, "kccsrv: no KCC required in domain member configuration", false);
183 return;
184 case ROLE_DOMAIN_CONTROLLER:
185 /* Yes, we want a KCC */
186 break;
187 }
188
189 task_server_set_title(task, "task[kccsrv]");
190
191 service = talloc_zero(task, struct kccsrv_service);
192 if (!service) {
193 task_server_terminate(task, "kccsrv_task_init: out of memory", true);
194 return;
195 }
196 service->task = task;
197 service->startup_time = timeval_current();
198 task->private_data = service;
199
200 status = kccsrv_init_creds(service);
201 if (!W_ERROR_IS_OK(status)) {
202 task_server_terminate(task,
203 talloc_asprintf(task,
204 "kccsrv: Failed to obtain server credentials: %s\n",
205 win_errstr(status)), true);
206 return;
207 }
208
209 status = kccsrv_connect_samdb(service, task->lp_ctx);
210 if (!W_ERROR_IS_OK(status)) {
211 task_server_terminate(task, talloc_asprintf(task,
212 "kccsrv: Failed to connect to local samdb: %s\n",
213 win_errstr(status)), true);
214 return;
215 }
216
217 status = kccsrv_load_partitions(service);
218 if (!W_ERROR_IS_OK(status)) {
219 task_server_terminate(task, talloc_asprintf(task,
220 "kccsrv: Failed to load partitions: %s\n",
221 win_errstr(status)), true);
222 return;
223 }
224
225 periodic_startup_interval = lpcfg_parm_int(task->lp_ctx, NULL, "kccsrv",
226 "periodic_startup_interval", 15); /* in seconds */
227 service->periodic.interval = lpcfg_parm_int(task->lp_ctx, NULL, "kccsrv",
228 "periodic_interval", 300); /* in seconds */
229
230 status = kccsrv_periodic_schedule(service, periodic_startup_interval);
231 if (!W_ERROR_IS_OK(status)) {
232 task_server_terminate(task, talloc_asprintf(task,
233 "kccsrv: Failed to periodic schedule: %s\n",
234 win_errstr(status)), true);
235 return;
236 }
237
238 irpc_add_name(task->msg_ctx, "kccsrv");
239
240 IRPC_REGISTER(task->msg_ctx, drsuapi, DRSUAPI_DSEXECUTEKCC, kccsrv_execute_kcc, service);
241 IRPC_REGISTER(task->msg_ctx, drsuapi, DRSUAPI_DSREPLICAGETINFO, kccsrv_replica_get_info, service);
242}
243
244/*
245 register ourselves as a available server
246*/
247NTSTATUS server_service_kcc_init(void)
248{
249 return register_server_service("kcc", kccsrv_task_init);
250}
Note: See TracBrowser for help on using the repository browser.