getpwnam_alloc -> getpwnam
[tprouty/samba.git] / source3 / passdb / pdb_ldap.c
1 /* 
2    Unix SMB/Netbios implementation.
3    Version 2.9.
4    LDAP protocol helper functions for SAMBA
5    Copyright (C) Gerald Carter 2001
6    Copyright (C) Shahms King 2001
7    Copyright (C) Jean François Micouleau 1998
8    
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 2 of the License, or
12    (at your option) any later version.
13    
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18    
19    You should have received a copy of the GNU General Public License
20    along with this program; if not, write to the Free Software
21    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22    
23 */
24
25 #include "includes.h"
26
27 #ifdef WITH_LDAP_SAM
28 /* TODO:
29 *  persistent connections: if using NSS LDAP, many connections are made
30 *      however, using only one within Samba would be nice
31 *  
32 *  Clean up SSL stuff, compile on OpenLDAP 1.x, 2.x, and Netscape SDK
33 *
34 *  Other LDAP based login attributes: accountExpires, etc.
35 *  (should be the domain of Samba proper, but the sam_password/SAM_ACCOUNT
36 *  structures don't have fields for some of these attributes)
37 *
38 *  SSL is done, but can't get the certificate based authentication to work
39 *  against on my test platform (Linux 2.4, OpenLDAP 2.x)
40 */
41
42 /* NOTE: this will NOT work against an Active Directory server
43 *  due to the fact that the two password fields cannot be retrieved
44 *  from a server; recommend using security = domain in this situation
45 *  and/or winbind
46 */
47
48 #include <lber.h>
49 #include <ldap.h>
50
51 #ifndef SAM_ACCOUNT
52 #define SAM_ACCOUNT struct sam_passwd
53 #endif
54
55 struct ldap_enum_info {
56         LDAP *ldap_struct;
57         LDAPMessage *result;
58         LDAPMessage *entry;
59 };
60
61 static struct ldap_enum_info global_ldap_ent;
62
63
64
65 /*******************************************************************
66  open a connection to the ldap server.
67 ******************************************************************/
68 static BOOL ldap_open_connection (LDAP ** ldap_struct)
69 {
70         int port;
71         int version, rc;
72         int tls = LDAP_OPT_X_TLS_HARD;
73
74         /* there should be an lp_ldap_ssl_port(), what happen if for some
75            reason we need to bind an SSLed LDAP on port 389 ?? ---simo */
76         if (lp_ldap_ssl() == LDAP_SSL_ON && lp_ldap_port() == 389) {
77                 port = 636;
78         }
79         else {
80                 port = lp_ldap_port();
81         }
82
83         if ((*ldap_struct = ldap_init(lp_ldap_server(), port)) == NULL) {
84                 DEBUG(0, ("The LDAP server is not responding !\n"));
85                 return False;
86         }
87
88         /* Connect to older servers using SSL and V2 rather than Start TLS */
89         if (ldap_get_option(*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version) == LDAP_OPT_SUCCESS)
90         {
91                 if (version != LDAP_VERSION2)
92                 {
93                         version = LDAP_VERSION2;
94                         ldap_set_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version);
95                 }
96         }
97
98         switch (lp_ldap_ssl())
99         {
100                 case LDAP_SSL_START_TLS:
101                         if (ldap_get_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, 
102                                 &version) == LDAP_OPT_SUCCESS)
103                         {
104                                 if (version < LDAP_VERSION3)
105                                 {
106                                         version = LDAP_VERSION3;
107                                         ldap_set_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION,
108                                                         &version);
109                                 }
110                         }
111                         if ((rc = ldap_start_tls_s (*ldap_struct, NULL, NULL)) != LDAP_SUCCESS)
112                         {
113                                 DEBUG(0,("Failed to issue the StartTLS instruction: %s\n",
114                                        ldap_err2string(rc)));
115                                 return False;
116                         }
117                         DEBUG (2, ("StartTLS issued: using a TLS connection\n"));
118                         break;
119                         
120                 case LDAP_SSL_ON:
121                         if (ldap_set_option (*ldap_struct, LDAP_OPT_X_TLS, &tls) != LDAP_SUCCESS)
122                         {
123                                 DEBUG(0, ("Failed to setup a TLS session\n"));
124                         }
125                         break;
126                         
127                 case LDAP_SSL_OFF:
128                 default:
129                         /* 
130                          * No special needs to setup options prior to the LDAP
131                          * bind (which should be called next via ldap_connect_system()
132                          */
133                         break;
134         }
135
136         DEBUG(2, ("ldap_open_connection: connection opened\n"));
137         return True;
138 }
139
140 /*******************************************************************
141  connect to the ldap server under system privilege.
142 ******************************************************************/
143 static BOOL ldap_connect_system(LDAP * ldap_struct)
144 {
145         int rc;
146         static BOOL got_pw = False;
147         static pstring ldap_secret;
148
149         /* get the password if we don't have it already */
150         if (!got_pw && !(got_pw=fetch_ldap_pw(lp_ldap_admin_dn(), ldap_secret, sizeof(pstring)))) 
151         {
152                 DEBUG(0, ("ldap_connect_system: Failed to retrieve password for %s from secrets.tdb\n",
153                         lp_ldap_admin_dn()));
154                 return False;
155         }
156
157         /* removed the sasl_bind_s "EXTERNAL" stuff, as my testsuite 
158            (OpenLDAP) doesnt' seem to support it */
159            
160         DEBUG(10,("ldap_connect_system: Binding to ldap server as \"%s\"\n",
161                 lp_ldap_admin_dn()));
162                 
163         if ((rc = ldap_simple_bind_s(ldap_struct, lp_ldap_admin_dn(), 
164                 ldap_secret)) != LDAP_SUCCESS)
165         {
166                 DEBUG(0, ("Bind failed: %s\n", ldap_err2string(rc)));
167                 return False;
168         }
169         
170         DEBUG(2, ("ldap_connect_system: succesful connection to the LDAP server\n"));
171         return True;
172 }
173
174 /*******************************************************************
175  run the search by name.
176 ******************************************************************/
177 static int ldap_search_one_user (LDAP * ldap_struct, const char *filter, LDAPMessage ** result)
178 {
179         int scope = LDAP_SCOPE_SUBTREE;
180         int rc;
181
182         DEBUG(2, ("ldap_search_one_user: searching for:[%s]\n", filter));
183
184         rc = ldap_search_s(ldap_struct, lp_ldap_suffix (), scope, filter, NULL, 0, result);
185
186         if (rc != LDAP_SUCCESS) {
187                 DEBUG(0,("ldap_search_one_user: Problem during the LDAP search: %s\n", 
188                         ldap_err2string (rc)));
189                 DEBUG(3,("ldap_search_one_user: Query was: %s, %s\n", lp_ldap_suffix(), 
190                         filter));
191         }
192         
193         return rc;
194 }
195
196 /*******************************************************************
197  run the search by name.
198 ******************************************************************/
199 static int ldap_search_one_user_by_name (LDAP * ldap_struct, const char *user,
200                              LDAPMessage ** result)
201 {
202         pstring filter;
203         
204         /*
205          * in the filter expression, replace %u with the real name
206          * so in ldap filter, %u MUST exist :-)
207          */
208         pstrcpy(filter, lp_ldap_filter());
209
210         /* 
211          * have to use this here because $ is filtered out
212            * in pstring_sub
213          */
214         all_string_sub(filter, "%u", user, sizeof(pstring));
215
216         return ldap_search_one_user(ldap_struct, filter, result);
217 }
218
219 /*******************************************************************
220  run the search by uid.
221 ******************************************************************/
222 static int ldap_search_one_user_by_uid(LDAP * ldap_struct, int uid,
223                             LDAPMessage ** result)
224 {
225         struct passwd *user;
226         pstring filter;
227
228         /* Get the username from the system and look that up in the LDAP */
229         
230         if ((user = sys_getpwuid(uid)) == NULL) {
231                 DEBUG(3,("ldap_search_one_user_by_uid: Failed to locate uid [%d]\n", uid));
232                 return LDAP_NO_SUCH_OBJECT;
233         }
234         
235         pstrcpy(filter, lp_ldap_filter());
236         
237         all_string_sub(filter, "%u", user->pw_name, sizeof(pstring));
238
239         return ldap_search_one_user(ldap_struct, filter, result);
240 }
241
242 /*******************************************************************
243  run the search by rid.
244 ******************************************************************/
245 static int ldap_search_one_user_by_rid (LDAP * ldap_struct, uint32 rid,
246                             LDAPMessage ** result)
247 {
248         pstring filter;
249         int rc;
250
251         /* check if the user rid exsists, if not, try searching on the uid */
252         
253         snprintf(filter, sizeof(filter) - 1, "rid=%i", rid);
254         rc = ldap_search_one_user(ldap_struct, filter, result);
255         
256         if (rc != LDAP_SUCCESS)
257                 rc = ldap_search_one_user_by_uid(ldap_struct, 
258                         pdb_user_rid_to_uid(rid), result);
259
260         return rc;
261 }
262
263 /*******************************************************************
264 search an attribute and return the first value found.
265 ******************************************************************/
266 static BOOL get_single_attribute (LDAP * ldap_struct, LDAPMessage * entry,
267                      char *attribute, char *value)
268 {
269         char **values;
270
271         if ((values = ldap_get_values (ldap_struct, entry, attribute)) == NULL) {
272                 value = NULL;
273                 DEBUG (2, ("get_single_attribute: [%s] = [<does not exist>]\n", attribute));
274                 
275                 return False;
276         }
277
278         pstrcpy(value, values[0]);
279         ldap_value_free(values);
280         DEBUG (2, ("get_single_attribute: [%s] = [%s]\n", attribute, value));
281                 
282         return True;
283 }
284
285 /************************************************************************
286 Routine to manage the LDAPMod structure array
287 manage memory used by the array, by each struct, and values
288
289 ************************************************************************/
290 static void make_a_mod (LDAPMod *** modlist, int modop, const char *attribute, const char *value)
291 {
292         LDAPMod **mods;
293         int i;
294         int j;
295
296         mods = *modlist;
297
298         if (attribute == NULL || *attribute == '\0')
299                 return;
300
301         if (value == NULL || *value == '\0')
302                 return;
303
304         if (mods == NULL) 
305         {
306                 mods = (LDAPMod **) malloc(sizeof(LDAPMod *));
307                 if (mods == NULL)
308                 {
309                         DEBUG(0, ("make_a_mod: out of memory!\n"));
310                         return;
311                 }
312                 mods[0] = NULL;
313         }
314
315         for (i = 0; mods[i] != NULL; ++i) {
316                 if (mods[i]->mod_op == modop && !strcasecmp(mods[i]->mod_type, attribute))
317                         break;
318         }
319
320         if (mods[i] == NULL)
321         {
322                 mods = (LDAPMod **) Realloc (mods, (i + 2) * sizeof (LDAPMod *));
323                 if (mods == NULL)
324                 {
325                         DEBUG(0, ("make_a_mod: out of memory!\n"));
326                         return;
327                 }
328                 mods[i] = (LDAPMod *) malloc(sizeof(LDAPMod));
329                 if (mods[i] == NULL)
330                 {
331                         DEBUG(0, ("make_a_mod: out of memory!\n"));
332                         return;
333                 }
334                 mods[i]->mod_op = modop;
335                 mods[i]->mod_values = NULL;
336                 mods[i]->mod_type = strdup(attribute);
337                 mods[i + 1] = NULL;
338         }
339
340         if (value != NULL)
341         {
342                 j = 0;
343                 if (mods[i]->mod_values != NULL) {
344                         for (; mods[i]->mod_values[j] != NULL; j++);
345                 }
346                 mods[i]->mod_values = (char **)Realloc(mods[i]->mod_values,
347                                                (j + 2) * sizeof (char *));
348                                                
349                 if (mods[i]->mod_values == NULL) {
350                         DEBUG (0, ("make_a_mod: Memory allocation failure!\n"));
351                         return;
352                 }
353                 mods[i]->mod_values[j] = strdup(value);
354                 mods[i]->mod_values[j + 1] = NULL;
355         }
356         *modlist = mods;
357 }
358
359 /* New Interface is being implemented here */
360
361 /**********************************************************************
362 Initialize SAM_ACCOUNT from an LDAP query
363 (Based on init_sam_from_buffer in pdb_tdb.c)
364 *********************************************************************/
365 static BOOL init_sam_from_ldap (SAM_ACCOUNT * sampass,
366                    LDAP * ldap_struct, LDAPMessage * entry)
367 {
368         time_t  logon_time,
369                         logoff_time,
370                         kickoff_time,
371                         pass_last_set_time, 
372                         pass_can_change_time, 
373                         pass_must_change_time;
374         pstring         username, 
375                         domain,
376                         nt_username,
377                         fullname,
378                         homedir,
379                         dir_drive,
380                         logon_script,
381                         profile_path,
382                         acct_desc,
383                         munged_dial,
384                         workstations;
385         struct passwd   *pw;
386         uint32          user_rid, 
387                         group_rid;
388         uint8           smblmpwd[16],
389                         smbntpwd[16];
390         uint16          acct_ctrl, 
391                         logon_divs;
392         uint32 hours_len;
393         uint8           hours[MAX_HOURS_LEN];
394         pstring temp;
395         uid_t           uid = -1;
396         gid_t           gid = getegid();
397
398
399         /*
400          * do a little initialization
401          */
402         username[0]     = '\0';
403         domain[0]       = '\0';
404         nt_username[0]  = '\0';
405         fullname[0]     = '\0';
406         homedir[0]      = '\0';
407         dir_drive[0]    = '\0';
408         logon_script[0] = '\0';
409         profile_path[0] = '\0';
410         acct_desc[0]    = '\0';
411         munged_dial[0]  = '\0';
412         workstations[0] = '\0';
413          
414
415         if (sampass == NULL || ldap_struct == NULL || entry == NULL) {
416                 DEBUG(0, ("init_sam_from_ldap: NULL parameters found!\n"));
417                 return False;
418         }
419
420         get_single_attribute(ldap_struct, entry, "uid", username);
421         DEBUG(2, ("Entry found for user: %s\n", username));
422
423         pstrcpy(nt_username, username);
424
425         pstrcpy(domain, lp_workgroup());
426
427         get_single_attribute(ldap_struct, entry, "pwdLastSet", temp);
428         pass_last_set_time = (time_t) strtol(temp, NULL, 16);
429
430         get_single_attribute(ldap_struct, entry, "logonTime", temp);
431         logon_time = (time_t) strtol(temp, NULL, 16);
432
433         get_single_attribute(ldap_struct, entry, "logoffTime", temp);
434         logoff_time = (time_t) strtol(temp, NULL, 16);
435
436         get_single_attribute(ldap_struct, entry, "kickoffTime", temp);
437         kickoff_time = (time_t) strtol(temp, NULL, 16);
438
439         get_single_attribute(ldap_struct, entry, "pwdCanChange", temp);
440         pass_can_change_time = (time_t) strtol(temp, NULL, 16);
441
442         get_single_attribute(ldap_struct, entry, "pwdMustChange", temp);
443         pass_must_change_time = (time_t) strtol(temp, NULL, 16);
444
445         /* recommend that 'gecos' and 'displayName' should refer to the same
446            * attribute OID.  userFullName depreciated, only used by Samba
447            * primary rules of LDAP: don't make a new attribute when one is already defined
448          * that fits your needs; using cn then displayName rather than 'userFullName'
449          */
450
451         if (!get_single_attribute(ldap_struct, entry, "cn", fullname)) {
452                 get_single_attribute(ldap_struct, entry, "displayName", fullname);
453         }
454
455
456         if (!get_single_attribute(ldap_struct, entry, "homeDrive", dir_drive)) {
457                 pstrcpy(dir_drive, lp_logon_drive());
458                 standard_sub_advanced(-1, username, "", gid, username, dir_drive);
459                 DEBUG(5,("homeDrive fell back to %s\n",dir_drive));
460                 pdb_set_dir_drive(sampass, dir_drive, False);
461         }
462         else
463                 pdb_set_dir_drive(sampass, dir_drive, True);
464
465         if (!get_single_attribute(ldap_struct, entry, "smbHome", homedir)) {
466                 pstrcpy(homedir, lp_logon_home());
467                 standard_sub_advanced(-1, username, "", gid, username, homedir);
468                 DEBUG(5,("smbHome fell back to %s\n",homedir));
469                 pdb_set_homedir(sampass, homedir, False);
470         }
471         else
472                 pdb_set_homedir(sampass, homedir, True);
473
474         if (!get_single_attribute(ldap_struct, entry, "scriptPath", logon_script)) {
475                 pstrcpy(logon_script, lp_logon_script());
476                 standard_sub_advanced(-1, username, "", gid, username, logon_script);
477                 DEBUG(5,("scriptPath fell back to %s\n",logon_script));
478                 pdb_set_logon_script(sampass, logon_script, False);
479         }
480         else
481                 pdb_set_logon_script(sampass, logon_script, True);
482
483         if (!get_single_attribute(ldap_struct, entry, "profilePath", profile_path)) {
484                 pstrcpy(profile_path, lp_logon_path());
485                 standard_sub_advanced(-1, username, "", gid, username, profile_path);
486                 DEBUG(5,("profilePath fell back to %s\n",profile_path));
487                 pdb_set_profile_path(sampass, profile_path, False);
488         }
489         else
490                 pdb_set_profile_path(sampass, profile_path, True);
491                 
492         get_single_attribute(ldap_struct, entry, "description", acct_desc);
493         get_single_attribute(ldap_struct, entry, "userWorkstations", workstations);
494         get_single_attribute(ldap_struct, entry, "rid", temp);
495         user_rid = (uint32)strtol(temp, NULL, 10);
496         get_single_attribute(ldap_struct, entry, "primaryGroupID", temp);
497         group_rid = (uint32)strtol(temp, NULL, 10);
498
499
500         /* These values MAY be in LDAP, but they can also be retrieved through 
501          *  sys_getpw*() which is how we're doing it 
502          */
503         pw = getpwnam(username);
504         if (pw == NULL) {
505                 DEBUG (2,("init_sam_from_ldap: User [%s] does not ave a uid!\n", username));
506                 return False;
507         }
508         uid = pw->pw_uid;
509         gid = pw->pw_gid;
510
511         /* FIXME: hours stuff should be cleaner */
512         
513         logon_divs = 168;
514         hours_len = 21;
515         memset(hours, 0xff, hours_len);
516
517         get_single_attribute (ldap_struct, entry, "lmPassword", temp);
518         pdb_gethexpwd(temp, smblmpwd);
519         memset((char *)temp, '\0', sizeof(temp));
520         get_single_attribute (ldap_struct, entry, "ntPassword", temp);
521         pdb_gethexpwd(temp, smbntpwd);
522         memset((char *)temp, '\0', sizeof(temp));
523         get_single_attribute (ldap_struct, entry, "acctFlags", temp);
524         acct_ctrl = pdb_decode_acct_ctrl(temp);
525
526         if (acct_ctrl == 0)
527                 acct_ctrl |= ACB_NORMAL;
528
529         pdb_set_uid(sampass, uid);
530         pdb_set_gid(sampass, gid);
531         
532         pdb_set_acct_ctrl(sampass, acct_ctrl);
533         pdb_set_logon_time(sampass, logon_time);
534         pdb_set_logoff_time(sampass, logoff_time);
535         pdb_set_kickoff_time(sampass, kickoff_time);
536         pdb_set_pass_can_change_time(sampass, pass_can_change_time);
537         pdb_set_pass_must_change_time(sampass, pass_must_change_time);
538         pdb_set_pass_last_set_time(sampass, pass_last_set_time);
539
540         pdb_set_hours_len(sampass, hours_len);
541         pdb_set_logon_divs(sampass, logon_divs);
542
543         pdb_set_user_rid(sampass, user_rid);
544         pdb_set_group_rid(sampass, group_rid);
545
546         pdb_set_username(sampass, username);
547
548         pdb_set_domain(sampass, domain);
549         pdb_set_nt_username(sampass, nt_username);
550
551         pdb_set_fullname(sampass, fullname);
552
553         pdb_set_acct_desc(sampass, acct_desc);
554         pdb_set_workstations(sampass, workstations);
555         pdb_set_munged_dial(sampass, munged_dial);
556         
557         if (!pdb_set_nt_passwd(sampass, smbntpwd))
558                 return False;
559         if (!pdb_set_lanman_passwd(sampass, smblmpwd))
560                 return False;
561
562         /* pdb_set_unknown_3(sampass, unknown3); */
563         /* pdb_set_unknown_5(sampass, unknown5); */
564         /* pdb_set_unknown_6(sampass, unknown6); */
565
566         pdb_set_hours(sampass, hours);
567
568         return True;
569 }
570
571 /**********************************************************************
572 Initialize SAM_ACCOUNT from an LDAP query
573 (Based on init_buffer_from_sam in pdb_tdb.c)
574 *********************************************************************/
575 static BOOL init_ldap_from_sam (LDAPMod *** mods, int ldap_state, const SAM_ACCOUNT * sampass)
576 {
577         pstring temp;
578
579         if (mods == NULL || sampass == NULL) {
580                 DEBUG(0, ("init_ldap_from_sam: NULL parameters found!\n"));
581                 return False;
582         }
583
584         *mods = NULL;
585
586         /* 
587          * took out adding "objectclass: sambaAccount"
588          * do this on a per-mod basis
589          */
590
591
592         make_a_mod(mods, ldap_state, "uid", pdb_get_username(sampass));
593         DEBUG(2, ("Setting entry for user: %s\n", pdb_get_username(sampass)));
594
595         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_pass_last_set_time(sampass));
596         make_a_mod(mods, ldap_state, "pwdLastSet", temp);
597
598         slprintf(temp, sizeof(temp) - 1, "%li", pdb_get_logon_time(sampass));
599         make_a_mod(mods, ldap_state, "logonTime", temp);
600
601         slprintf(temp, sizeof(temp) - 1, "%li", pdb_get_logoff_time(sampass));
602         make_a_mod(mods, ldap_state, "logoffTime", temp);
603
604         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_kickoff_time(sampass));
605         make_a_mod(mods, ldap_state, "kickoffTime", temp);
606
607         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_pass_can_change_time(sampass));
608         make_a_mod(mods, ldap_state, "pwdCanChange", temp);
609
610         slprintf (temp, sizeof (temp) - 1, "%li", pdb_get_pass_must_change_time(sampass));
611         make_a_mod(mods, ldap_state, "pwdMustChange", temp);
612
613         /* displayName, cn, and gecos should all be the same
614            *  most easily accomplished by giving them the same OID
615            *  gecos isn't set here b/c it should be handled by the 
616            *  add-user script
617          */
618
619         make_a_mod(mods, ldap_state, "displayName", pdb_get_fullname(sampass));
620         make_a_mod(mods, ldap_state, "cn", pdb_get_fullname(sampass));
621         make_a_mod(mods, ldap_state, "description", pdb_get_acct_desc(sampass));
622         make_a_mod(mods, ldap_state, "userWorkstations", pdb_get_workstations(sampass));
623
624         /*
625          * Only updates fields which have been set (not defaults from smb.conf)
626          */
627
628         if (IS_SAM_SET(sampass, FLAG_SAM_SMBHOME))
629         make_a_mod(mods, ldap_state, "smbHome", pdb_get_homedir(sampass));
630                 
631         if (IS_SAM_SET(sampass, FLAG_SAM_DRIVE))
632         make_a_mod(mods, ldap_state, "homeDrive", pdb_get_dirdrive(sampass));
633                 
634         if (IS_SAM_SET(sampass, FLAG_SAM_LOGONSCRIPT))
635         make_a_mod(mods, ldap_state, "scriptPath", pdb_get_logon_script(sampass));
636
637         if (IS_SAM_SET(sampass, FLAG_SAM_PROFILE))
638         make_a_mod(mods, ldap_state, "profilePath", pdb_get_profile_path(sampass));
639
640
641         if ( !pdb_get_user_rid(sampass))
642                 slprintf(temp, sizeof(temp) - 1, "%i", pdb_uid_to_user_rid(pdb_get_uid(sampass)));
643         else
644                 slprintf(temp, sizeof(temp) - 1, "%i", pdb_get_user_rid(sampass));
645         make_a_mod(mods, ldap_state, "rid", temp);
646
647         if ( !pdb_get_group_rid(sampass))
648                 slprintf(temp, sizeof(temp) - 1, "%i", pdb_gid_to_group_rid(pdb_get_gid(sampass)));
649         else
650                 slprintf(temp, sizeof(temp) - 1, "%i", pdb_get_group_rid(sampass));
651         make_a_mod(mods, ldap_state, "primaryGroupID", temp);
652
653         /* FIXME: Hours stuff goes in LDAP  */
654         pdb_sethexpwd (temp, pdb_get_lanman_passwd(sampass), pdb_get_acct_ctrl(sampass));
655         make_a_mod (mods, ldap_state, "lmPassword", temp);
656         
657         pdb_sethexpwd (temp, pdb_get_nt_passwd(sampass), pdb_get_acct_ctrl(sampass));
658         make_a_mod (mods, ldap_state, "ntPassword", temp);
659         
660         make_a_mod (mods, ldap_state, "acctFlags", pdb_encode_acct_ctrl (pdb_get_acct_ctrl(sampass),
661                 NEW_PW_FORMAT_SPACE_PADDED_LEN));
662
663         return True;
664 }
665
666 /**********************************************************************
667 Connect to LDAP server for password enumeration
668 *********************************************************************/
669 BOOL pdb_setsampwent(BOOL update)
670 {
671         int rc;
672         pstring filter;
673
674         if (!ldap_open_connection(&global_ldap_ent.ldap_struct))
675         {
676                 return False;
677         }
678         if (!ldap_connect_system(global_ldap_ent.ldap_struct))
679         {
680                 ldap_unbind(global_ldap_ent.ldap_struct);
681                 return False;
682         }
683
684         pstrcpy(filter, lp_ldap_filter());
685         all_string_sub(filter, "%u", "*", sizeof(pstring));
686
687         rc = ldap_search_s(global_ldap_ent.ldap_struct, lp_ldap_suffix(),
688                            LDAP_SCOPE_SUBTREE, filter, NULL, 0,
689                            &global_ldap_ent.result);
690
691         if (rc != LDAP_SUCCESS)
692         {
693                 DEBUG(0, ("LDAP search failed: %s\n", ldap_err2string(rc)));
694                 DEBUG(3, ("Query was: %s, %s\n", lp_ldap_suffix(), filter));
695                 ldap_msgfree(global_ldap_ent.result);
696                 ldap_unbind(global_ldap_ent.ldap_struct);
697                 global_ldap_ent.ldap_struct = NULL;
698                 global_ldap_ent.result = NULL;
699                 return False;
700         }
701
702         DEBUG(2, ("pdb_setsampwent: %d entries in the base!\n",
703                 ldap_count_entries(global_ldap_ent.ldap_struct,
704                 global_ldap_ent.result)));
705
706         global_ldap_ent.entry = ldap_first_entry(global_ldap_ent.ldap_struct,
707                                  global_ldap_ent.result);
708
709         return True;
710 }
711
712 /**********************************************************************
713 End enumeration of the LDAP password list 
714 *********************************************************************/
715 void pdb_endsampwent(void)
716 {
717         if (global_ldap_ent.ldap_struct && global_ldap_ent.result)
718         {
719                 ldap_msgfree(global_ldap_ent.result);
720                 ldap_unbind(global_ldap_ent.ldap_struct);
721                 global_ldap_ent.ldap_struct = NULL;
722                 global_ldap_ent.result = NULL;
723         }
724 }
725
726 /**********************************************************************
727 Get the next entry in the LDAP password database 
728 *********************************************************************/
729 BOOL pdb_getsampwent(SAM_ACCOUNT * user)
730 {
731         if (!global_ldap_ent.entry)
732                 return False;
733
734         global_ldap_ent.entry = ldap_next_entry(global_ldap_ent.ldap_struct,
735                                 global_ldap_ent.entry);
736
737         if (global_ldap_ent.entry != NULL)
738         {
739                 return init_sam_from_ldap(user, global_ldap_ent.ldap_struct,
740                                           global_ldap_ent.entry);
741         }
742         return False;
743 }
744
745 /**********************************************************************
746 Get SAM_ACCOUNT entry from LDAP by username 
747 *********************************************************************/
748 BOOL pdb_getsampwnam(SAM_ACCOUNT * user, const char *sname)
749 {
750         LDAP *ldap_struct;
751         LDAPMessage *result;
752         LDAPMessage *entry;
753
754         if (!ldap_open_connection(&ldap_struct))
755                 return False;
756         if (!ldap_connect_system(ldap_struct))
757         {
758                 ldap_unbind(ldap_struct);
759                 return False;
760         }
761         if (ldap_search_one_user_by_name(ldap_struct, sname, &result) != LDAP_SUCCESS)
762         {
763                 ldap_unbind(ldap_struct);
764                 return False;
765         }
766         if (ldap_count_entries(ldap_struct, result) < 1)
767         {
768                 DEBUG(0,
769                       ("We don't find this user [%s] count=%d\n", sname,
770                        ldap_count_entries(ldap_struct, result)));
771                 ldap_unbind(ldap_struct);
772                 return False;
773         }
774         entry = ldap_first_entry(ldap_struct, result);
775         if (entry)
776         {
777                 init_sam_from_ldap(user, ldap_struct, entry);
778                 ldap_msgfree(result);
779                 ldap_unbind(ldap_struct);
780                 return True;
781         }
782         else
783         {
784                 ldap_msgfree(result);
785                 ldap_unbind(ldap_struct);
786                 return False;
787         }
788 }
789
790 /**********************************************************************
791 Get SAM_ACCOUNT entry from LDAP by rid 
792 *********************************************************************/
793 BOOL pdb_getsampwrid(SAM_ACCOUNT * user, uint32 rid)
794 {
795         LDAP *ldap_struct;
796         LDAPMessage *result;
797         LDAPMessage *entry;
798
799         if (!ldap_open_connection(&ldap_struct))
800                 return False;
801
802         if (!ldap_connect_system(ldap_struct))
803         {
804                 ldap_unbind(ldap_struct);
805                 return False;
806         }
807         if (ldap_search_one_user_by_rid(ldap_struct, rid, &result) !=
808             LDAP_SUCCESS)
809         {
810                 ldap_unbind(ldap_struct);
811                 return False;
812         }
813
814         if (ldap_count_entries(ldap_struct, result) < 1)
815         {
816                 DEBUG(0,
817                       ("We don't find this rid [%i] count=%d\n", rid,
818                        ldap_count_entries(ldap_struct, result)));
819                 ldap_unbind(ldap_struct);
820                 return False;
821         }
822
823         entry = ldap_first_entry(ldap_struct, result);
824         if (entry)
825         {
826                 init_sam_from_ldap(user, ldap_struct, entry);
827                 ldap_msgfree(result);
828                 ldap_unbind(ldap_struct);
829                 return True;
830         }
831         else
832         {
833                 ldap_msgfree(result);
834                 ldap_unbind(ldap_struct);
835                 return False;
836         }
837 }
838
839 /**********************************************************************
840 Delete entry from LDAP for username 
841 *********************************************************************/
842 BOOL pdb_delete_sam_account(SAM_ACCOUNT * sam_acct)
843 {
844         const char *sname;
845         int rc;
846         char *dn;
847         LDAP *ldap_struct;
848         LDAPMessage *entry;
849         LDAPMessage *result;
850
851         if (!sam_acct) {
852                 DEBUG(0, ("sam_acct was NULL!\n"));
853                 return False;
854         }
855
856         sname = pdb_get_username(sam_acct);
857
858         if (!ldap_open_connection (&ldap_struct))
859                 return False;
860
861         DEBUG (3, ("Deleting user %s from LDAP.\n", sname));
862         
863         if (!ldap_connect_system (ldap_struct)) {
864                 ldap_unbind (ldap_struct);
865                 DEBUG(0, ("Failed to delete user %s from LDAP.\n", sname));
866                 return False;
867         }
868
869         rc = ldap_search_one_user_by_name (ldap_struct, sname, &result);
870         if (ldap_count_entries (ldap_struct, result) == 0) {
871                 DEBUG (0, ("User doesn't exit!\n"));
872                 ldap_msgfree (result);
873                 ldap_unbind (ldap_struct);
874                 return False;
875         }
876
877         entry = ldap_first_entry (ldap_struct, result);
878         dn = ldap_get_dn (ldap_struct, entry);
879
880         rc = ldap_delete_s (ldap_struct, dn);
881
882         ldap_memfree (dn);
883         if (rc != LDAP_SUCCESS) {
884                 char *ld_error;
885                 ldap_get_option (ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error);
886                 DEBUG (0,("failed to delete user with uid = %s with: %s\n\t%s\n",
887                         sname, ldap_err2string (rc), ld_error));
888                 free (ld_error);
889                 ldap_unbind (ldap_struct);
890                 return False;
891         }
892
893         DEBUG (2,("successfully deleted uid = %s from the LDAP database\n", sname));
894         ldap_unbind (ldap_struct);
895         return True;
896 }
897
898 /**********************************************************************
899 Update SAM_ACCOUNT 
900 *********************************************************************/
901 BOOL pdb_update_sam_account(SAM_ACCOUNT * newpwd)
902 {
903         int rc;
904         char *dn;
905         LDAP *ldap_struct;
906         LDAPMessage *result;
907         LDAPMessage *entry;
908         LDAPMod **mods;
909
910         if (!ldap_open_connection(&ldap_struct)) /* open a connection to the server */
911                 return False;
912
913         if (!ldap_connect_system(ldap_struct))  /* connect as system account */
914         {
915                 ldap_unbind(ldap_struct);
916                 return False;
917         }
918
919         rc = ldap_search_one_user_by_name(ldap_struct,
920                                           pdb_get_username(newpwd), &result);
921
922         if (ldap_count_entries(ldap_struct, result) == 0)
923         {
924                 DEBUG(0, ("No user to modify!\n"));
925                 ldap_msgfree(result);
926                 ldap_unbind(ldap_struct);
927                 return False;
928         }
929
930         init_ldap_from_sam(&mods, LDAP_MOD_REPLACE, newpwd);
931
932         entry = ldap_first_entry(ldap_struct, result);
933         dn = ldap_get_dn(ldap_struct, entry);
934
935         rc = ldap_modify_s(ldap_struct, dn, mods);
936
937         if (rc != LDAP_SUCCESS)
938         {
939                 char *ld_error;
940                 ldap_get_option(ldap_struct, LDAP_OPT_ERROR_STRING,
941                                 &ld_error);
942                 DEBUG(0,
943                       ("failed to modify user with uid = %s with: %s\n\t%s\n",
944                        pdb_get_username(newpwd), ldap_err2string(rc),
945                        ld_error));
946                 free(ld_error);
947                 ldap_unbind(ldap_struct);
948                 return False;
949         }
950
951         DEBUG(2,
952               ("successfully modified uid = %s in the LDAP database\n",
953                pdb_get_username(newpwd)));
954         ldap_mods_free(mods, 1);
955         ldap_unbind(ldap_struct);
956         return True;
957 }
958
959 /**********************************************************************
960 Add SAM_ACCOUNT to LDAP 
961 *********************************************************************/
962 BOOL pdb_add_sam_account(SAM_ACCOUNT * newpwd)
963 {
964         int rc;
965         pstring filter;
966         LDAP *ldap_struct;
967         LDAPMessage *result;
968         pstring dn;
969         LDAPMod **mods;
970         int             ldap_op;
971         uint32          num_result;
972
973         if (!ldap_open_connection(&ldap_struct))        /* open a connection to the server */
974         {
975                 return False;
976         }
977
978         if (!ldap_connect_system(ldap_struct))  /* connect as system account */
979         {
980                 ldap_unbind(ldap_struct);
981                 return False;
982         }
983
984         rc = ldap_search_one_user_by_name (ldap_struct, pdb_get_username(newpwd), &result);
985
986         if (ldap_count_entries(ldap_struct, result) != 0)
987         {
988                 DEBUG(0,("User already in the base, with samba properties\n"));
989                 ldap_msgfree(result);
990                 ldap_unbind(ldap_struct);
991                 return False;
992         }
993         ldap_msgfree(result);
994
995         slprintf (filter, sizeof (filter) - 1, "uid=%s", pdb_get_username(newpwd));
996         rc = ldap_search_one_user(ldap_struct, filter, &result);
997         num_result = ldap_count_entries(ldap_struct, result);
998         
999         if (num_result > 1) {
1000                 DEBUG (0, ("More than one user with that uid exists: bailing out!\n"));
1001                 return False;
1002         }
1003         
1004         /* Check if we need to update an existing entry */
1005         if (num_result == 1) {
1006                 char *tmp;
1007                 LDAPMessage *entry;
1008                 
1009                 DEBUG(3,("User exists without samba properties: adding them\n"));
1010                 ldap_op = LDAP_MOD_REPLACE;
1011                 entry = ldap_first_entry (ldap_struct, result);
1012                 tmp = ldap_get_dn (ldap_struct, entry);
1013                 slprintf (dn, sizeof (dn) - 1, "%s", tmp);
1014                 ldap_memfree (tmp);
1015         }
1016         else {
1017                 /* Check if we need to add an entry */
1018                 DEBUG(3,("Adding new user\n"));
1019                 ldap_op = LDAP_MOD_ADD;
1020                 slprintf (dn, sizeof (dn) - 1, "uid=%s,%s", pdb_get_username(newpwd), lp_ldap_suffix ());
1021         }
1022
1023         ldap_msgfree(result);
1024
1025         init_ldap_from_sam(&mods, ldap_op, newpwd);
1026         make_a_mod(&mods, LDAP_MOD_ADD, "objectclass", "sambaAccount");
1027
1028         if (ldap_op == LDAP_MOD_REPLACE) {
1029                 rc = ldap_modify_s(ldap_struct, dn, mods);
1030         }
1031         else {
1032                 rc = ldap_add_s(ldap_struct, dn, mods);
1033         }
1034
1035         if (rc != LDAP_SUCCESS)
1036         {
1037                 char *ld_error;
1038
1039                 ldap_get_option (ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error);
1040                 DEBUG(0,("failed to modify user with uid = %s with: %s\n\t%s\n",
1041                         pdb_get_username(newpwd), ldap_err2string (rc), ld_error));
1042                 free(ld_error);
1043                 ldap_mods_free(mods, 1);
1044                 ldap_unbind(ldap_struct);
1045                 return False;
1046         }
1047         
1048         DEBUG(2,("added: uid = %s in the LDAP database\n", pdb_get_username(newpwd)));
1049         ldap_mods_free(mods, 1);
1050         ldap_unbind(ldap_struct);
1051         return True;
1052 }
1053
1054 #else
1055 void dummy_function(void);
1056 void
1057 dummy_function (void)
1058 {
1059 }                               /* stop some compilers complaining */
1060 #endif