remove samlogon_user
[samba.git] / source3 / passdb / pdb_ldap.c
1 /* 
2    Unix SMB/Netbios implementation.
3    Version 2.9.
4    LDAP protocol helper functions for SAMBA
5    Copyright (C) Gerald Carter 2001
6    Copyright (C) Shahms King 2001
7    Copyright (C) Jean François Micouleau 1998
8    
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 2 of the License, or
12    (at your option) any later version.
13    
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18    
19    You should have received a copy of the GNU General Public License
20    along with this program; if not, write to the Free Software
21    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22    
23 */
24
25 #include "includes.h"
26
27 #ifdef WITH_LDAP_SAM
28 /* TODO:
29 *  persistent connections: if using NSS LDAP, many connections are made
30 *      however, using only one within Samba would be nice
31 *  
32 *  Clean up SSL stuff, compile on OpenLDAP 1.x, 2.x, and Netscape SDK
33 *
34 *  Other LDAP based login attributes: accountExpires, etc.
35 *  (should be the domain of Samba proper, but the sam_password/SAM_ACCOUNT
36 *  structures don't have fields for some of these attributes)
37 *
38 *  SSL is done, but can't get the certificate based authentication to work
39 *  against on my test platform (Linux 2.4, OpenLDAP 2.x)
40 */
41
42 /* NOTE: this will NOT work against an Active Directory server
43 *  due to the fact that the two password fields cannot be retrieved
44 *  from a server; recommend using security = domain in this situation
45 *  and/or winbind
46 */
47
48 #include <lber.h>
49 #include <ldap.h>
50
51 #ifndef SAM_ACCOUNT
52 #define SAM_ACCOUNT struct sam_passwd
53 #endif
54
55 struct ldap_enum_info {
56         LDAP *ldap_struct;
57         LDAPMessage *result;
58         LDAPMessage *entry;
59 };
60
61 static struct ldap_enum_info global_ldap_ent;
62
63
64
65 /*******************************************************************
66  open a connection to the ldap server.
67 ******************************************************************/
68 static BOOL ldap_open_connection (LDAP ** ldap_struct)
69 {
70         int port;
71         int version, rc;
72         int tls = LDAP_OPT_X_TLS_HARD;
73
74         /* there should be an lp_ldap_ssl_port(), what happen if for some
75            reason we need to bind an SSLed LDAP on port 389 ?? ---simo */
76         if (lp_ldap_ssl() == LDAP_SSL_ON && lp_ldap_port() == 389) {
77                 port = 636;
78         }
79         else {
80                 port = lp_ldap_port();
81         }
82
83         if ((*ldap_struct = ldap_init(lp_ldap_server(), port)) == NULL) {
84                 DEBUG(0, ("The LDAP server is not responding !\n"));
85                 return False;
86         }
87
88         /* Connect to older servers using SSL and V2 rather than Start TLS */
89         if (ldap_get_option(*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version) == LDAP_OPT_SUCCESS)
90         {
91                 if (version != LDAP_VERSION2)
92                 {
93                         version = LDAP_VERSION2;
94                         ldap_set_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version);
95                 }
96         }
97
98         switch (lp_ldap_ssl())
99         {
100                 case LDAP_SSL_START_TLS:
101                         if (ldap_get_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, 
102                                 &version) == LDAP_OPT_SUCCESS)
103                         {
104                                 if (version < LDAP_VERSION3)
105                                 {
106                                         version = LDAP_VERSION3;
107                                         ldap_set_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION,
108                                                         &version);
109                                 }
110                         }
111                         if ((rc = ldap_start_tls_s (*ldap_struct, NULL, NULL)) != LDAP_SUCCESS)
112                         {
113                                 DEBUG(0,("Failed to issue the StartTLS instruction: %s\n",
114                                        ldap_err2string(rc)));
115                                 return False;
116                         }
117                         DEBUG (2, ("StartTLS issued: using a TLS connection\n"));
118                         break;
119                         
120                 case LDAP_SSL_ON:
121                         if (ldap_set_option (*ldap_struct, LDAP_OPT_X_TLS, &tls) != LDAP_SUCCESS)
122                         {
123                                 DEBUG(0, ("Failed to setup a TLS session\n"));
124                         }
125                         break;
126                         
127                 case LDAP_SSL_OFF:
128                 default:
129                         /* 
130                          * No special needs to setup options prior to the LDAP
131                          * bind (which should be called next via ldap_connect_system()
132                          */
133                         break;
134         }
135
136         DEBUG(2, ("ldap_open_connection: connection opened\n"));
137         return True;
138 }
139
140 /*******************************************************************
141  connect to the ldap server under system privilege.
142 ******************************************************************/
143 static BOOL ldap_connect_system(LDAP * ldap_struct)
144 {
145         int rc;
146         static BOOL got_pw = False;
147         static pstring ldap_secret;
148
149         /* get the password if we don't have it already */
150         if (!got_pw && !(got_pw=fetch_ldap_pw(lp_ldap_admin_dn(), ldap_secret, sizeof(pstring)))) 
151         {
152                 DEBUG(0, ("ldap_connect_system: Failed to retrieve password for %s from secrets.tdb\n",
153                         lp_ldap_admin_dn()));
154                 return False;
155         }
156
157         /* removed the sasl_bind_s "EXTERNAL" stuff, as my testsuite 
158            (OpenLDAP) doesnt' seem to support it */
159            
160         DEBUG(10,("ldap_connect_system: Binding to ldap server as \"%s\"\n",
161                 lp_ldap_admin_dn()));
162                 
163         if ((rc = ldap_simple_bind_s(ldap_struct, lp_ldap_admin_dn(), 
164                 ldap_secret)) != LDAP_SUCCESS)
165         {
166                 DEBUG(0, ("Bind failed: %s\n", ldap_err2string(rc)));
167                 return False;
168         }
169         
170         DEBUG(2, ("ldap_connect_system: succesful connection to the LDAP server\n"));
171         return True;
172 }
173
174 /*******************************************************************
175  run the search by name.
176 ******************************************************************/
177 static int ldap_search_one_user (LDAP * ldap_struct, const char *filter, LDAPMessage ** result)
178 {
179         int scope = LDAP_SCOPE_SUBTREE;
180         int rc;
181
182         DEBUG(2, ("ldap_search_one_user: searching for:[%s]\n", filter));
183
184         rc = ldap_search_s(ldap_struct, lp_ldap_suffix (), scope, filter, NULL, 0, result);
185
186         if (rc != LDAP_SUCCESS) {
187                 DEBUG(0,("ldap_search_one_user: Problem during the LDAP search: %s\n", 
188                         ldap_err2string (rc)));
189                 DEBUG(3,("ldap_search_one_user: Query was: %s, %s\n", lp_ldap_suffix(), 
190                         filter));
191         }
192         
193         return rc;
194 }
195
196 /*******************************************************************
197  run the search by name.
198 ******************************************************************/
199 static int ldap_search_one_user_by_name (LDAP * ldap_struct, const char *user,
200                              LDAPMessage ** result)
201 {
202         pstring filter;
203         
204         /*
205          * in the filter expression, replace %u with the real name
206          * so in ldap filter, %u MUST exist :-)
207          */
208         pstrcpy(filter, lp_ldap_filter());
209
210         /* 
211          * have to use this here because $ is filtered out
212            * in pstring_sub
213          */
214         all_string_sub(filter, "%u", user, sizeof(pstring));
215
216         return ldap_search_one_user(ldap_struct, filter, result);
217 }
218
219 /*******************************************************************
220  run the search by uid.
221 ******************************************************************/
222 static int ldap_search_one_user_by_uid(LDAP * ldap_struct, int uid,
223                             LDAPMessage ** result)
224 {
225         struct passwd *user;
226         pstring filter;
227
228         /* Get the username from the system and look that up in the LDAP */
229         
230         if ((user = sys_getpwuid(uid)) == NULL) {
231                 DEBUG(3,("ldap_search_one_user_by_uid: Failed to locate uid [%d]\n", uid));
232                 return LDAP_NO_SUCH_OBJECT;
233         }
234         
235         pstrcpy(filter, lp_ldap_filter());
236         
237         all_string_sub(filter, "%u", user->pw_name, sizeof(pstring));
238
239         return ldap_search_one_user(ldap_struct, filter, result);
240 }
241
242 /*******************************************************************
243  run the search by rid.
244 ******************************************************************/
245 static int ldap_search_one_user_by_rid (LDAP * ldap_struct, uint32 rid,
246                             LDAPMessage ** result)
247 {
248         pstring filter;
249         int rc;
250
251         /* check if the user rid exsists, if not, try searching on the uid */
252         
253         snprintf(filter, sizeof(filter) - 1, "rid=%i", rid);
254         rc = ldap_search_one_user(ldap_struct, filter, result);
255         
256         if (rc != LDAP_SUCCESS)
257                 rc = ldap_search_one_user_by_uid(ldap_struct, 
258                         pdb_user_rid_to_uid(rid), result);
259
260         return rc;
261 }
262
263 /*******************************************************************
264 search an attribute and return the first value found.
265 ******************************************************************/
266 static BOOL get_single_attribute (LDAP * ldap_struct, LDAPMessage * entry,
267                      char *attribute, char *value)
268 {
269         char **values;
270
271         if ((values = ldap_get_values (ldap_struct, entry, attribute)) == NULL) {
272                 value = NULL;
273                 DEBUG (2, ("get_single_attribute: [%s] = [<does not exist>]\n", attribute));
274                 
275                 return False;
276         }
277
278         pstrcpy(value, values[0]);
279         ldap_value_free(values);
280         DEBUG (2, ("get_single_attribute: [%s] = [%s]\n", attribute, value));
281                 
282         return True;
283 }
284
285 /************************************************************************
286 Routine to manage the LDAPMod structure array
287 manage memory used by the array, by each struct, and values
288
289 ************************************************************************/
290 static void make_a_mod (LDAPMod *** modlist, int modop, const char *attribute, const char *value)
291 {
292         LDAPMod **mods;
293         int i;
294         int j;
295
296         mods = *modlist;
297
298         if (attribute == NULL || *attribute == '\0')
299                 return;
300
301         if (value == NULL || *value == '\0')
302                 return;
303
304         if (mods == NULL) 
305         {
306                 mods = (LDAPMod **) malloc(sizeof(LDAPMod *));
307                 if (mods == NULL)
308                 {
309                         DEBUG(0, ("make_a_mod: out of memory!\n"));
310                         return;
311                 }
312                 mods[0] = NULL;
313         }
314
315         for (i = 0; mods[i] != NULL; ++i) {
316                 if (mods[i]->mod_op == modop && !strcasecmp(mods[i]->mod_type, attribute))
317                         break;
318         }
319
320         if (mods[i] == NULL)
321         {
322                 mods = (LDAPMod **) Realloc (mods, (i + 2) * sizeof (LDAPMod *));
323                 if (mods == NULL)
324                 {
325                         DEBUG(0, ("make_a_mod: out of memory!\n"));
326                         return;
327                 }
328                 mods[i] = (LDAPMod *) malloc(sizeof(LDAPMod));
329                 if (mods[i] == NULL)
330                 {
331                         DEBUG(0, ("make_a_mod: out of memory!\n"));
332                         return;
333                 }
334                 mods[i]->mod_op = modop;
335                 mods[i]->mod_values = NULL;
336                 mods[i]->mod_type = strdup(attribute);
337                 mods[i + 1] = NULL;
338         }
339
340         if (value != NULL)
341         {
342                 j = 0;
343                 if (mods[i]->mod_values != NULL) {
344                         for (; mods[i]->mod_values[j] != NULL; j++);
345                 }
346                 mods[i]->mod_values = (char **)Realloc(mods[i]->mod_values,
347                                                (j + 2) * sizeof (char *));
348                                                
349                 if (mods[i]->mod_values == NULL) {
350                         DEBUG (0, ("make_a_mod: Memory allocation failure!\n"));
351                         return;
352                 }
353                 mods[i]->mod_values[j] = strdup(value);
354                 mods[i]->mod_values[j + 1] = NULL;
355         }
356         *modlist = mods;
357 }
358
359 /* New Interface is being implemented here */
360
361 /**********************************************************************
362 Initialize SAM_ACCOUNT from an LDAP query
363 (Based on init_sam_from_buffer in pdb_tdb.c)
364 *********************************************************************/
365 static BOOL init_sam_from_ldap (SAM_ACCOUNT * sampass,
366                    LDAP * ldap_struct, LDAPMessage * entry)
367 {
368         time_t  logon_time,
369                         logoff_time,
370                         kickoff_time,
371                         pass_last_set_time, 
372                         pass_can_change_time, 
373                         pass_must_change_time;
374         pstring         username, 
375                         domain,
376                         nt_username,
377                         fullname,
378                         homedir,
379                         dir_drive,
380                         logon_script,
381                         profile_path,
382                         acct_desc,
383                         munged_dial,
384                         workstations;
385         struct passwd *sys_user;
386         uint32          user_rid, 
387                         group_rid;
388         uint8           smblmpwd[16],
389                         smbntpwd[16];
390         uint16          acct_ctrl, 
391                         logon_divs;
392         uint32 hours_len;
393         uint8           hours[MAX_HOURS_LEN];
394         pstring temp;
395         gid_t           gid = getegid();
396
397
398         /*
399          * do a little initialization
400          */
401         username[0]     = '\0';
402         domain[0]       = '\0';
403         nt_username[0]  = '\0';
404         fullname[0]     = '\0';
405         homedir[0]      = '\0';
406         dir_drive[0]    = '\0';
407         logon_script[0] = '\0';
408         profile_path[0] = '\0';
409         acct_desc[0]    = '\0';
410         munged_dial[0]  = '\0';
411         workstations[0] = '\0';
412          
413
414         if (sampass == NULL || ldap_struct == NULL || entry == NULL) {
415                 DEBUG(0, ("init_sam_from_ldap: NULL parameters found!\n"));
416                 return False;
417         }
418
419         get_single_attribute(ldap_struct, entry, "uid", username);
420         DEBUG(2, ("Entry found for user: %s\n", username));
421
422         pstrcpy(nt_username, username);
423
424         pstrcpy(domain, lp_workgroup());
425
426         get_single_attribute(ldap_struct, entry, "pwdLastSet", temp);
427         pass_last_set_time = (time_t) strtol(temp, NULL, 16);
428
429         get_single_attribute(ldap_struct, entry, "logonTime", temp);
430         logon_time = (time_t) strtol(temp, NULL, 16);
431
432         get_single_attribute(ldap_struct, entry, "logoffTime", temp);
433         logoff_time = (time_t) strtol(temp, NULL, 16);
434
435         get_single_attribute(ldap_struct, entry, "kickoffTime", temp);
436         kickoff_time = (time_t) strtol(temp, NULL, 16);
437
438         get_single_attribute(ldap_struct, entry, "pwdCanChange", temp);
439         pass_can_change_time = (time_t) strtol(temp, NULL, 16);
440
441         get_single_attribute(ldap_struct, entry, "pwdMustChange", temp);
442         pass_must_change_time = (time_t) strtol(temp, NULL, 16);
443
444         /* recommend that 'gecos' and 'displayName' should refer to the same
445            * attribute OID.  userFullName depreciated, only used by Samba
446            * primary rules of LDAP: don't make a new attribute when one is already defined
447          * that fits your needs; using cn then displayName rather than 'userFullName'
448          */
449
450         if (!get_single_attribute(ldap_struct, entry, "cn", fullname)) {
451                 get_single_attribute(ldap_struct, entry, "displayName", fullname);
452         }
453
454
455         if (!get_single_attribute(ldap_struct, entry, "homeDrive", dir_drive)) {
456                 pstrcpy(dir_drive, lp_logon_drive());
457                 standard_sub_advanced(-1, username, "", gid, username, dir_drive);
458                 DEBUG(5,("homeDrive fell back to %s\n",dir_drive));
459                 pdb_set_dir_drive(sampass, dir_drive, False);
460         }
461         else
462                 pdb_set_dir_drive(sampass, dir_drive, True);
463
464         if (!get_single_attribute(ldap_struct, entry, "smbHome", homedir)) {
465                 pstrcpy(homedir, lp_logon_home());
466                 standard_sub_advanced(-1, username, "", gid, username, homedir);
467                 DEBUG(5,("smbHome fell back to %s\n",homedir));
468                 pdb_set_homedir(sampass, homedir, False);
469         }
470         else
471                 pdb_set_homedir(sampass, homedir, True);
472
473         if (!get_single_attribute(ldap_struct, entry, "scriptPath", logon_script)) {
474                 pstrcpy(logon_script, lp_logon_script());
475                 standard_sub_advanced(-1, username, "", gid, username, logon_script);
476                 DEBUG(5,("scriptPath fell back to %s\n",logon_script));
477                 pdb_set_logon_script(sampass, logon_script, False);
478         }
479         else
480                 pdb_set_logon_script(sampass, logon_script, True);
481
482         if (!get_single_attribute(ldap_struct, entry, "profilePath", profile_path)) {
483                 pstrcpy(profile_path, lp_logon_path());
484                 standard_sub_advanced(-1, username, "", gid, username, profile_path);
485                 DEBUG(5,("profilePath fell back to %s\n",profile_path));
486                 pdb_set_profile_path(sampass, profile_path, False);
487         }
488         else
489                 pdb_set_profile_path(sampass, profile_path, True);
490                 
491         get_single_attribute(ldap_struct, entry, "description", acct_desc);
492         get_single_attribute(ldap_struct, entry, "userWorkstations", workstations);
493         get_single_attribute(ldap_struct, entry, "rid", temp);
494         user_rid = (uint32)strtol(temp, NULL, 10);
495         get_single_attribute(ldap_struct, entry, "primaryGroupID", temp);
496         group_rid = (uint32)strtol(temp, NULL, 10);
497
498
499         /* These values MAY be in LDAP, but they can also be retrieved through 
500          *  sys_getpw*() which is how we're doing it 
501          */
502         sys_user = sys_getpwnam(username);
503         if (sys_user == NULL) {
504                 DEBUG (2,("init_sam_from_ldap: User [%s] does not ave a uid!\n", username));
505                 return False;
506         }
507
508
509         /* FIXME: hours stuff should be cleaner */
510         
511         logon_divs = 168;
512         hours_len = 21;
513         memset(hours, 0xff, hours_len);
514
515         get_single_attribute (ldap_struct, entry, "lmPassword", temp);
516         pdb_gethexpwd(temp, smblmpwd);
517         memset((char *)temp, '\0', sizeof(temp));
518         get_single_attribute (ldap_struct, entry, "ntPassword", temp);
519         pdb_gethexpwd(temp, smbntpwd);
520         memset((char *)temp, '\0', sizeof(temp));
521         get_single_attribute (ldap_struct, entry, "acctFlags", temp);
522         acct_ctrl = pdb_decode_acct_ctrl(temp);
523
524         if (acct_ctrl == 0)
525                 acct_ctrl |= ACB_NORMAL;
526
527
528         pdb_set_acct_ctrl(sampass, acct_ctrl);
529         pdb_set_logon_time(sampass, logon_time);
530         pdb_set_logoff_time(sampass, logoff_time);
531         pdb_set_kickoff_time(sampass, kickoff_time);
532         pdb_set_pass_can_change_time(sampass, pass_can_change_time);
533         pdb_set_pass_must_change_time(sampass, pass_must_change_time);
534         pdb_set_pass_last_set_time(sampass, pass_last_set_time);
535
536         pdb_set_hours_len(sampass, hours_len);
537         pdb_set_logons_divs(sampass, logon_divs);
538
539         pdb_set_uid(sampass, sys_user->pw_uid);
540         pdb_set_gid(sampass, sys_user->pw_gid);
541         pdb_set_user_rid(sampass, user_rid);
542         pdb_set_group_rid(sampass, group_rid);
543
544         pdb_set_username(sampass, username);
545
546         pdb_set_domain(sampass, domain);
547         pdb_set_nt_username(sampass, nt_username);
548
549         pdb_set_fullname(sampass, fullname);
550
551         pdb_set_acct_desc(sampass, acct_desc);
552         pdb_set_workstations(sampass, workstations);
553         pdb_set_munged_dial(sampass, munged_dial);
554         
555         if (!pdb_set_nt_passwd(sampass, smbntpwd))
556                 return False;
557         if (!pdb_set_lanman_passwd(sampass, smblmpwd))
558                 return False;
559
560         /* pdb_set_unknown_3(sampass, unknown3); */
561         /* pdb_set_unknown_5(sampass, unknown5); */
562         /* pdb_set_unknown_6(sampass, unknown6); */
563
564         pdb_set_hours(sampass, hours);
565
566         return True;
567 }
568
569 /**********************************************************************
570 Initialize SAM_ACCOUNT from an LDAP query
571 (Based on init_buffer_from_sam in pdb_tdb.c)
572 *********************************************************************/
573 static BOOL init_ldap_from_sam (LDAPMod *** mods, int ldap_state, const SAM_ACCOUNT * sampass)
574 {
575         pstring temp;
576
577         if (mods == NULL || sampass == NULL) {
578                 DEBUG(0, ("init_ldap_from_sam: NULL parameters found!\n"));
579                 return False;
580         }
581
582         *mods = NULL;
583
584         /* 
585          * took out adding "objectclass: sambaAccount"
586          * do this on a per-mod basis
587          */
588
589
590         make_a_mod(mods, ldap_state, "uid", pdb_get_username(sampass));
591         DEBUG(2, ("Setting entry for user: %s\n", pdb_get_username(sampass)));
592
593         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_pass_last_set_time(sampass));
594         make_a_mod(mods, ldap_state, "pwdLastSet", temp);
595
596         slprintf(temp, sizeof(temp) - 1, "%li", pdb_get_logon_time(sampass));
597         make_a_mod(mods, ldap_state, "logonTime", temp);
598
599         slprintf(temp, sizeof(temp) - 1, "%li", pdb_get_logoff_time(sampass));
600         make_a_mod(mods, ldap_state, "logoffTime", temp);
601
602         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_kickoff_time(sampass));
603         make_a_mod(mods, ldap_state, "kickoffTime", temp);
604
605         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_pass_can_change_time(sampass));
606         make_a_mod(mods, ldap_state, "pwdCanChange", temp);
607
608         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_pass_must_change_time(sampass));
609         make_a_mod(mods, ldap_state, "pwdMustChange", temp);
610
611         /* displayName, cn, and gecos should all be the same
612            *  most easily accomplished by giving them the same OID
613            *  gecos isn't set here b/c it should be handled by the 
614            *  add-user script
615          */
616
617         make_a_mod(mods, ldap_state, "displayName", pdb_get_fullname(sampass));
618         make_a_mod(mods, ldap_state, "cn", pdb_get_fullname(sampass));
619         make_a_mod(mods, ldap_state, "description", pdb_get_acct_desc(sampass));
620         make_a_mod(mods, ldap_state, "userWorkstations", pdb_get_workstations(sampass));
621
622         /*
623          * Only updates fields which have been set (not defaults from smb.conf)
624          */
625
626         if (IS_SAM_SET(sampass, FLAG_SAM_SMBHOME))
627         make_a_mod(mods, ldap_state, "smbHome", pdb_get_homedir(sampass));
628                 
629         if (IS_SAM_SET(sampass, FLAG_SAM_DRIVE))
630         make_a_mod(mods, ldap_state, "homeDrive", pdb_get_dirdrive(sampass));
631                 
632         if (IS_SAM_SET(sampass, FLAG_SAM_LOGONSCRIPT))
633         make_a_mod(mods, ldap_state, "scriptPath", pdb_get_logon_script(sampass));
634
635         if (IS_SAM_SET(sampass, FLAG_SAM_PROFILE))
636         make_a_mod(mods, ldap_state, "profilePath", pdb_get_profile_path(sampass));
637
638
639         if ( !sampass->user_rid)
640                 slprintf(temp, sizeof(temp) - 1, "%i", pdb_uid_to_user_rid(pdb_get_uid(sampass)));
641         else
642                 slprintf(temp, sizeof(temp) - 1, "%i", sampass->user_rid);
643         make_a_mod(mods, ldap_state, "rid", temp);
644
645         if ( !sampass->group_rid)
646                 slprintf(temp, sizeof(temp) - 1, "%i", pdb_gid_to_group_rid(pdb_get_gid(sampass)));
647         else
648                 slprintf(temp, sizeof(temp) - 1, "%i", sampass->group_rid);
649         make_a_mod(mods, ldap_state, "primaryGroupID", temp);
650
651         /* FIXME: Hours stuff goes in LDAP  */
652         pdb_sethexpwd (temp, pdb_get_lanman_passwd(sampass), pdb_get_acct_ctrl(sampass));
653         make_a_mod (mods, ldap_state, "lmPassword", temp);
654         
655         pdb_sethexpwd (temp, pdb_get_nt_passwd(sampass), pdb_get_acct_ctrl(sampass));
656         make_a_mod (mods, ldap_state, "ntPassword", temp);
657         
658         make_a_mod (mods, ldap_state, "acctFlags", pdb_encode_acct_ctrl (pdb_get_acct_ctrl(sampass),
659                 NEW_PW_FORMAT_SPACE_PADDED_LEN));
660
661         return True;
662 }
663
664 /**********************************************************************
665 Connect to LDAP server for password enumeration
666 *********************************************************************/
667 BOOL pdb_setsampwent(BOOL update)
668 {
669         int rc;
670         pstring filter;
671
672         if (!ldap_open_connection(&global_ldap_ent.ldap_struct))
673         {
674                 return False;
675         }
676         if (!ldap_connect_system(global_ldap_ent.ldap_struct))
677         {
678                 ldap_unbind(global_ldap_ent.ldap_struct);
679                 return False;
680         }
681
682         pstrcpy(filter, lp_ldap_filter());
683         all_string_sub(filter, "%u", "*", sizeof(pstring));
684
685         rc = ldap_search_s(global_ldap_ent.ldap_struct, lp_ldap_suffix(),
686                            LDAP_SCOPE_SUBTREE, filter, NULL, 0,
687                            &global_ldap_ent.result);
688
689         if (rc != LDAP_SUCCESS)
690         {
691                 DEBUG(0, ("LDAP search failed: %s\n", ldap_err2string(rc)));
692                 DEBUG(3, ("Query was: %s, %s\n", lp_ldap_suffix(), filter));
693                 ldap_msgfree(global_ldap_ent.result);
694                 ldap_unbind(global_ldap_ent.ldap_struct);
695                 global_ldap_ent.ldap_struct = NULL;
696                 global_ldap_ent.result = NULL;
697                 return False;
698         }
699
700         DEBUG(2, ("pdb_setsampwent: %d entries in the base!\n",
701                 ldap_count_entries(global_ldap_ent.ldap_struct,
702                 global_ldap_ent.result)));
703
704         global_ldap_ent.entry = ldap_first_entry(global_ldap_ent.ldap_struct,
705                                  global_ldap_ent.result);
706
707         return True;
708 }
709
710 /**********************************************************************
711 End enumeration of the LDAP password list 
712 *********************************************************************/
713 void pdb_endsampwent(void)
714 {
715         if (global_ldap_ent.ldap_struct && global_ldap_ent.result)
716         {
717                 ldap_msgfree(global_ldap_ent.result);
718                 ldap_unbind(global_ldap_ent.ldap_struct);
719                 global_ldap_ent.ldap_struct = NULL;
720                 global_ldap_ent.result = NULL;
721         }
722 }
723
724 /**********************************************************************
725 Get the next entry in the LDAP password database 
726 *********************************************************************/
727 BOOL pdb_getsampwent(SAM_ACCOUNT * user)
728 {
729         if (!global_ldap_ent.entry)
730                 return False;
731
732         global_ldap_ent.entry = ldap_next_entry(global_ldap_ent.ldap_struct,
733                                 global_ldap_ent.entry);
734
735         if (global_ldap_ent.entry != NULL)
736         {
737                 return init_sam_from_ldap(user, global_ldap_ent.ldap_struct,
738                                           global_ldap_ent.entry);
739         }
740         return False;
741 }
742
743 /**********************************************************************
744 Get SAM_ACCOUNT entry from LDAP by username 
745 *********************************************************************/
746 BOOL pdb_getsampwnam(SAM_ACCOUNT * user, const char *sname)
747 {
748         LDAP *ldap_struct;
749         LDAPMessage *result;
750         LDAPMessage *entry;
751
752         if (!ldap_open_connection(&ldap_struct))
753                 return False;
754         if (!ldap_connect_system(ldap_struct))
755         {
756                 ldap_unbind(ldap_struct);
757                 return False;
758         }
759         if (ldap_search_one_user_by_name(ldap_struct, sname, &result) != LDAP_SUCCESS)
760         {
761                 ldap_unbind(ldap_struct);
762                 return False;
763         }
764         if (ldap_count_entries(ldap_struct, result) < 1)
765         {
766                 DEBUG(0,
767                       ("We don't find this user [%s] count=%d\n", sname,
768                        ldap_count_entries(ldap_struct, result)));
769                 ldap_unbind(ldap_struct);
770                 return False;
771         }
772         entry = ldap_first_entry(ldap_struct, result);
773         if (entry)
774         {
775                 init_sam_from_ldap(user, ldap_struct, entry);
776                 ldap_msgfree(result);
777                 ldap_unbind(ldap_struct);
778                 return True;
779         }
780         else
781         {
782                 ldap_msgfree(result);
783                 ldap_unbind(ldap_struct);
784                 return False;
785         }
786 }
787
788 /**********************************************************************
789 Get SAM_ACCOUNT entry from LDAP by rid 
790 *********************************************************************/
791 BOOL pdb_getsampwrid(SAM_ACCOUNT * user, uint32 rid)
792 {
793         LDAP *ldap_struct;
794         LDAPMessage *result;
795         LDAPMessage *entry;
796
797         if (!ldap_open_connection(&ldap_struct))
798                 return False;
799
800         if (!ldap_connect_system(ldap_struct))
801         {
802                 ldap_unbind(ldap_struct);
803                 return False;
804         }
805         if (ldap_search_one_user_by_rid(ldap_struct, rid, &result) !=
806             LDAP_SUCCESS)
807         {
808                 ldap_unbind(ldap_struct);
809                 return False;
810         }
811
812         if (ldap_count_entries(ldap_struct, result) < 1)
813         {
814                 DEBUG(0,
815                       ("We don't find this rid [%i] count=%d\n", rid,
816                        ldap_count_entries(ldap_struct, result)));
817                 ldap_unbind(ldap_struct);
818                 return False;
819         }
820
821         entry = ldap_first_entry(ldap_struct, result);
822         if (entry)
823         {
824                 init_sam_from_ldap(user, ldap_struct, entry);
825                 ldap_msgfree(result);
826                 ldap_unbind(ldap_struct);
827                 return True;
828         }
829         else
830         {
831                 ldap_msgfree(result);
832                 ldap_unbind(ldap_struct);
833                 return False;
834         }
835 }
836
837 /**********************************************************************
838 Delete entry from LDAP for username 
839 *********************************************************************/
840 BOOL pdb_delete_sam_account(const char *sname)
841 {
842         int rc;
843         char *dn;
844         LDAP *ldap_struct;
845         LDAPMessage *entry;
846         LDAPMessage *result;
847
848         if (!ldap_open_connection (&ldap_struct))
849                 return False;
850
851         DEBUG (3, ("Deleting user %s from LDAP.\n", sname));
852         
853         if (!ldap_connect_system (ldap_struct)) {
854                 ldap_unbind (ldap_struct);
855                 DEBUG(0, ("Failed to delete user %s from LDAP.\n", sname));
856                 return False;
857         }
858
859         rc = ldap_search_one_user_by_name (ldap_struct, sname, &result);
860         if (ldap_count_entries (ldap_struct, result) == 0) {
861                 DEBUG (0, ("User doesn't exit!\n"));
862                 ldap_msgfree (result);
863                 ldap_unbind (ldap_struct);
864                 return False;
865         }
866
867         entry = ldap_first_entry (ldap_struct, result);
868         dn = ldap_get_dn (ldap_struct, entry);
869
870         rc = ldap_delete_s (ldap_struct, dn);
871
872         ldap_memfree (dn);
873         if (rc != LDAP_SUCCESS) {
874                 char *ld_error;
875                 ldap_get_option (ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error);
876                 DEBUG (0,("failed to delete user with uid = %s with: %s\n\t%s\n",
877                         sname, ldap_err2string (rc), ld_error));
878                 free (ld_error);
879                 ldap_unbind (ldap_struct);
880                 return False;
881         }
882
883         DEBUG (2,("successfully deleted uid = %s from the LDAP database\n", sname));
884         ldap_unbind (ldap_struct);
885         return True;
886 }
887
888 /**********************************************************************
889 Update SAM_ACCOUNT 
890 *********************************************************************/
891 BOOL pdb_update_sam_account(const SAM_ACCOUNT * newpwd, BOOL override)
892 {
893         int rc;
894         char *dn;
895         LDAP *ldap_struct;
896         LDAPMessage *result;
897         LDAPMessage *entry;
898         LDAPMod **mods;
899
900         if (!ldap_open_connection(&ldap_struct)) /* open a connection to the server */
901                 return False;
902
903         if (!ldap_connect_system(ldap_struct))  /* connect as system account */
904         {
905                 ldap_unbind(ldap_struct);
906                 return False;
907         }
908
909         rc = ldap_search_one_user_by_name(ldap_struct,
910                                           pdb_get_username(newpwd), &result);
911
912         if (ldap_count_entries(ldap_struct, result) == 0)
913         {
914                 DEBUG(0, ("No user to modify!\n"));
915                 ldap_msgfree(result);
916                 ldap_unbind(ldap_struct);
917                 return False;
918         }
919
920         init_ldap_from_sam(&mods, LDAP_MOD_REPLACE, newpwd);
921
922         entry = ldap_first_entry(ldap_struct, result);
923         dn = ldap_get_dn(ldap_struct, entry);
924
925         rc = ldap_modify_s(ldap_struct, dn, mods);
926
927         if (rc != LDAP_SUCCESS)
928         {
929                 char *ld_error;
930                 ldap_get_option(ldap_struct, LDAP_OPT_ERROR_STRING,
931                                 &ld_error);
932                 DEBUG(0,
933                       ("failed to modify user with uid = %s with: %s\n\t%s\n",
934                        pdb_get_username(newpwd), ldap_err2string(rc),
935                        ld_error));
936                 free(ld_error);
937                 ldap_unbind(ldap_struct);
938                 return False;
939         }
940
941         DEBUG(2,
942               ("successfully modified uid = %s in the LDAP database\n",
943                pdb_get_username(newpwd)));
944         ldap_mods_free(mods, 1);
945         ldap_unbind(ldap_struct);
946         return True;
947 }
948
949 /**********************************************************************
950 Add SAM_ACCOUNT to LDAP 
951 *********************************************************************/
952 BOOL pdb_add_sam_account(const SAM_ACCOUNT * newpwd)
953 {
954         int rc;
955         pstring filter;
956         LDAP *ldap_struct;
957         LDAPMessage *result;
958         pstring dn;
959         LDAPMod **mods;
960         int             ldap_op;
961         uint32          num_result;
962
963         if (!ldap_open_connection(&ldap_struct))        /* open a connection to the server */
964         {
965                 return False;
966         }
967
968         if (!ldap_connect_system(ldap_struct))  /* connect as system account */
969         {
970                 ldap_unbind(ldap_struct);
971                 return False;
972         }
973
974         rc = ldap_search_one_user_by_name (ldap_struct, pdb_get_username(newpwd), &result);
975
976         if (ldap_count_entries(ldap_struct, result) != 0)
977         {
978                 DEBUG(0,("User already in the base, with samba properties\n"));
979                 ldap_msgfree(result);
980                 ldap_unbind(ldap_struct);
981                 return False;
982         }
983         ldap_msgfree(result);
984
985         slprintf (filter, sizeof (filter) - 1, "uid=%s", pdb_get_username(newpwd));
986         rc = ldap_search_one_user(ldap_struct, filter, &result);
987         num_result = ldap_count_entries(ldap_struct, result);
988         
989         if (num_result > 1) {
990                 DEBUG (0, ("More than one user with that uid exists: bailing out!\n"));
991                 return False;
992         }
993         
994         /* Check if we need to update an existing entry */
995         if (num_result == 1) {
996                 char *tmp;
997                 LDAPMessage *entry;
998                 
999                 DEBUG(3,("User exists without samba properties: adding them\n"));
1000                 ldap_op = LDAP_MOD_REPLACE;
1001                 entry = ldap_first_entry (ldap_struct, result);
1002                 tmp = ldap_get_dn (ldap_struct, entry);
1003                 slprintf (dn, sizeof (dn) - 1, "%s", tmp);
1004                 ldap_memfree (tmp);
1005         }
1006         else {
1007                 /* Check if we need to add an entry */
1008                 DEBUG(3,("Adding new user\n"));
1009                 ldap_op = LDAP_MOD_ADD;
1010                 slprintf (dn, sizeof (dn) - 1, "uid=%s,%s", pdb_get_username(newpwd), lp_ldap_suffix ());
1011         }
1012
1013         ldap_msgfree(result);
1014
1015         init_ldap_from_sam(&mods, ldap_op, newpwd);
1016         make_a_mod(&mods, LDAP_MOD_ADD, "objectclass", "sambaAccount");
1017
1018         if (ldap_op == LDAP_MOD_REPLACE) {
1019                 rc = ldap_modify_s(ldap_struct, dn, mods);
1020         }
1021         else {
1022                 rc = ldap_add_s(ldap_struct, dn, mods);
1023         }
1024
1025         if (rc != LDAP_SUCCESS)
1026         {
1027                 char *ld_error;
1028
1029                 ldap_get_option (ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error);
1030                 DEBUG(0,("failed to modify user with uid = %s with: %s\n\t%s\n",
1031                         pdb_get_username(newpwd), ldap_err2string (rc), ld_error));
1032                 free(ld_error);
1033                 ldap_mods_free(mods, 1);
1034                 ldap_unbind(ldap_struct);
1035                 return False;
1036         }
1037         
1038         DEBUG(2,("added: uid = %s in the LDAP database\n", pdb_get_username(newpwd)));
1039         ldap_mods_free(mods, 1);
1040         ldap_unbind(ldap_struct);
1041         return True;
1042 }
1043
1044 #else
1045 void dummy_function(void);
1046 void
1047 dummy_function (void)
1048 {
1049 }                               /* stop some compilers complaining */
1050 #endif