Clean up provision and rootdse module to hard-code less stuff.
[samba.git] / source4 / dsdb / samdb / ldb_modules / rootdse.c
index 987fd7a7f1c6444dbdf4680b58a426a4e3d23886..50f333d09572bfd6d70150641f748ff5be174531 100644 (file)
@@ -8,7 +8,7 @@
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
    
    This program is distributed in the hope that it will be useful,
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
 #include "lib/ldb/include/ldb.h"
 #include "lib/ldb/include/ldb_errors.h"
 #include "lib/ldb/include/ldb_private.h"
-#include "auth/gensec/gensec.h"
 #include "system/time.h"
+#include "dsdb/samdb/samdb.h"
+#include "version.h"
 
 struct private_data {
        int num_controls;
        char **controls;
+       int num_partitions;
+       struct ldb_dn **partitions;
 };
 
 /*
@@ -43,35 +45,38 @@ static int do_attribute(const char * const *attrs, const char *name)
                ldb_attr_in_list(attrs, "*");
 }
 
+static int do_attribute_explicit(const char * const *attrs, const char *name)
+{
+       return attrs != NULL && ldb_attr_in_list(attrs, name);
+}
+
 
 /*
   add dynamically generated attributes to rootDSE result
 */
-static int rootdse_add_dynamic(struct ldb_module *module, struct ldb_request *req)
+static int rootdse_add_dynamic(struct ldb_module *module, struct ldb_message *msg, const char * const *attrs)
 {
        struct private_data *priv = talloc_get_type(module->private_data, struct private_data);
-       struct ldb_search *s = &req->op.search;
-       struct ldb_message *msg;
-       struct cli_credentials *server_creds;
+       char **server_sasl;
+       const struct dsdb_schema *schema;
 
-       /* this is gross, and will be removed when I change ldb_result not
-          to be so pointer crazy :-) */
-       if (s->res->msgs == NULL) {
-               return LDB_SUCCESS;
-       }
+       schema = dsdb_get_schema(module->ldb);
 
-       msg = s->res->msgs[0];
+       msg->dn = ldb_dn_new(msg, module->ldb, NULL);
 
-       msg->dn = ldb_dn_explode(msg, "");
+       /* don't return the distinduishedName, cn and name attributes */
+       ldb_msg_remove_attr(msg, "distinguishedName");
+       ldb_msg_remove_attr(msg, "cn");
+       ldb_msg_remove_attr(msg, "name");
 
-       if (do_attribute(s->attrs, "currentTime")) {
+       if (do_attribute(attrs, "currentTime")) {
                if (ldb_msg_add_steal_string(msg, "currentTime", 
                                             ldb_timestring(msg, time(NULL))) != 0) {
                        goto failed;
                }
        }
 
-       if (do_attribute(s->attrs, "supportedControl")) {
+       if (do_attribute(attrs, "supportedControl")) {
                int i;
                for (i = 0; i < priv->num_controls; i++) {
                        char *control = talloc_strdup(msg, priv->controls[i]);
@@ -85,40 +90,129 @@ static int rootdse_add_dynamic(struct ldb_module *module, struct ldb_request *re
                }
        }
 
-       server_creds = talloc_get_type(ldb_get_opaque(module->ldb, "server_credentials"), 
-                                      struct cli_credentials);
-       if (server_creds && do_attribute(s->attrs, "supportedSASLMechanisms")) {
-               struct gensec_security_ops **backends = gensec_security_all();
-               enum credentials_use_kerberos use_kerberos
-                       = cli_credentials_get_kerberos_state(server_creds);
-               struct gensec_security_ops **ops
-                       = gensec_use_kerberos_mechs(req, backends, use_kerberos);
+       if (do_attribute(attrs, "namingContexts")) {
+               int i;
+               for (i = 0; i < priv->num_partitions; i++) {
+                       struct ldb_dn *dn = priv->partitions[i];
+                       if (ldb_msg_add_steal_string(msg, "namingContexts",
+                                                    ldb_dn_alloc_linearized(msg, dn)) != 0) {
+                               goto failed;
+                       }
+               }
+       }
+
+       server_sasl = talloc_get_type(ldb_get_opaque(module->ldb, "supportedSASLMechanims"), 
+                                      char *);
+       if (server_sasl && do_attribute(attrs, "supportedSASLMechanisms")) {
                int i;
-               for (i = 0; ops && ops[i]; i++) {
-                       if (ops[i]->sasl_name) {
-                               char *sasl_name = talloc_strdup(msg, ops[i]->sasl_name);
-                               if (!sasl_name) {
+               for (i = 0; server_sasl && server_sasl[i]; i++) {
+                       char *sasl_name = talloc_strdup(msg, server_sasl[i]);
+                       if (!sasl_name) {
+                               goto failed;
+                       }
+                       if (ldb_msg_add_steal_string(msg, "supportedSASLMechanisms",
+                                                    sasl_name) != 0) {
+                               goto failed;
+                       }
+               }
+       }
+
+       if (do_attribute(attrs, "highestCommittedUSN")) {
+               uint64_t seq_num;
+               int ret = ldb_sequence_number(module->ldb, LDB_SEQ_HIGHEST_SEQ, &seq_num);
+               if (ret == LDB_SUCCESS) {
+                       if (ldb_msg_add_fmt(msg, "highestCommittedUSN", 
+                                           "%llu", (unsigned long long)seq_num) != 0) {
+                               goto failed;
+                       }
+               }
+       }
+
+       if (schema && do_attribute_explicit(attrs, "dsSchemaAttrCount")) {
+               struct dsdb_attribute *cur;
+               uint32_t n = 0;
+
+               for (cur = schema->attributes; cur; cur = cur->next) {
+                       n++;
+               }
+
+               if (ldb_msg_add_fmt(msg, "dsSchemaAttrCount", 
+                                   "%u", n) != 0) {
+                       goto failed;
+               }
+       }
+
+       if (schema && do_attribute_explicit(attrs, "dsSchemaClassCount")) {
+               struct dsdb_class *cur;
+               uint32_t n = 0;
+
+               for (cur = schema->classes; cur; cur = cur->next) {
+                       n++;
+               }
+
+               if (ldb_msg_add_fmt(msg, "dsSchemaClassCount", 
+                                   "%u", n) != 0) {
+                       goto failed;
+               }
+       }
+
+       if (schema && do_attribute_explicit(attrs, "dsSchemaPrefixCount")) {
+               if (ldb_msg_add_fmt(msg, "dsSchemaPrefixCount", 
+                                   "%u", schema->num_prefixes) != 0) {
+                       goto failed;
+               }
+       }
+
+       if (do_attribute_explicit(attrs, "validFSMOs")) {
+               const struct dsdb_schema_fsmo *schema_fsmo;
+               const struct dsdb_naming_fsmo *naming_fsmo;
+               const struct dsdb_pdc_fsmo *pdc_fsmo;
+               const char *dn_str;
+
+               schema_fsmo = talloc_get_type(ldb_get_opaque(module->ldb, "dsdb_schema_fsmo"),
+                                             struct dsdb_schema_fsmo);
+               if (schema_fsmo && schema_fsmo->we_are_master) {
+                       dn_str = ldb_dn_get_linearized(samdb_schema_dn(module->ldb));
+                       if (dn_str && dn_str[0]) {
+                               if (ldb_msg_add_fmt(msg, "validFSMOs", "%s", dn_str) != 0) {
                                        goto failed;
                                }
-                               if (ldb_msg_add_steal_string(msg, "supportedSASLMechanisms",
-                                                            sasl_name) != 0) {
+                       }
+               }
+
+               naming_fsmo = talloc_get_type(ldb_get_opaque(module->ldb, "dsdb_naming_fsmo"),
+                                             struct dsdb_naming_fsmo);
+               if (naming_fsmo && naming_fsmo->we_are_master) {
+                       dn_str = ldb_dn_get_linearized(samdb_partitions_dn(module->ldb, msg));
+                       if (dn_str && dn_str[0]) {
+                               if (ldb_msg_add_fmt(msg, "validFSMOs", "%s", dn_str) != 0) {
+                                       goto failed;
+                               }
+                       }
+               }
+
+               pdc_fsmo = talloc_get_type(ldb_get_opaque(module->ldb, "dsdb_pdc_fsmo"),
+                                          struct dsdb_pdc_fsmo);
+               if (pdc_fsmo && pdc_fsmo->we_are_master) {
+                       dn_str = ldb_dn_get_linearized(samdb_base_dn(module->ldb));
+                       if (dn_str && dn_str[0]) {
+                               if (ldb_msg_add_fmt(msg, "validFSMOs", "%s", dn_str) != 0) {
                                        goto failed;
                                }
                        }
                }
        }
 
-       if (do_attribute(s->attrs, "highestCommittedUSN")) {
-               if (module->ldb->sequence_number != NULL && 
-                   ldb_msg_add_fmt(msg, "highestCommittedUSN", 
-                                   "%llu", module->ldb->sequence_number(module->ldb)) != 0) {
+       if (schema && do_attribute_explicit(attrs, "vendorVersion")) {
+               if (ldb_msg_add_fmt(msg, "vendorVersion", 
+                                   "%s", SAMBA_VERSION_STRING) != 0) {
                        goto failed;
                }
        }
-       
+
        /* TODO: lots more dynamic attributes should be added here */
 
-       return 0;
+       return LDB_SUCCESS;
 
 failed:
        return LDB_ERR_OPERATIONS_ERROR;
@@ -127,40 +221,98 @@ failed:
 /*
   handle search requests
 */
-static int rootdse_search_bytree(struct ldb_module *module, struct ldb_request *req)
+
+struct rootdse_context {
+       struct ldb_module *module;
+       void *up_context;
+       int (*up_callback)(struct ldb_context *, void *, struct ldb_reply *);
+
+       const char * const * attrs;
+};
+
+static int rootdse_callback(struct ldb_context *ldb, void *context, struct ldb_reply *ares)
 {
-       struct ldb_search *s = &req->op.search;
+       struct rootdse_context *ac;
+
+       ac = talloc_get_type(context, struct rootdse_context);
+
+       if (ares->type == LDB_REPLY_ENTRY) {
+               /*
+                * if the client explicit asks for the 'netlogon' attribute
+                * the reply_entry needs to be skipped
+                */
+               if (ac->attrs && ldb_attr_in_list(ac->attrs, "netlogon")) {
+                       talloc_free(ares);
+                       return LDB_SUCCESS;
+               }
+
+               /* for each record returned post-process to add any dynamic
+                  attributes that have been asked for */
+               if (rootdse_add_dynamic(ac->module, ares->message, ac->attrs) != LDB_SUCCESS) {
+                       goto error;
+               }
+       }
+
+       return ac->up_callback(ldb, ac->up_context, ares);
+
+error:
+       talloc_free(ares);
+       return LDB_ERR_OPERATIONS_ERROR;
+}
+
+static int rootdse_search(struct ldb_module *module, struct ldb_request *req)
+{
+       struct rootdse_context *ac;
+       struct ldb_request *down_req;
        int ret;
-       TALLOC_CTX *tmp_ctx;
 
        /* see if its for the rootDSE */
-       if (s->scope != LDB_SCOPE_BASE ||
-           (s->base && s->base->comp_num != 0)) {
+       if (req->op.search.scope != LDB_SCOPE_BASE ||
+           ( ! ldb_dn_is_null(req->op.search.base))) {
                return ldb_next_request(module, req);
        }
 
-       tmp_ctx = talloc_new(module);
+       ac = talloc(req, struct rootdse_context);
+       if (ac == NULL) {
+               return LDB_ERR_OPERATIONS_ERROR;
+       }
+
+       ac->module = module;
+       ac->up_context = req->context;
+       ac->up_callback = req->callback;
+       ac->attrs = req->op.search.attrs;
 
-       /* in our db we store the rootDSE with a DN of cn=rootDSE */
-       s->base = ldb_dn_explode(tmp_ctx, "cn=rootDSE");
-       s->tree = ldb_parse_tree(tmp_ctx, "dn=*");
-       if (s->base == NULL || s->tree == NULL) {
+       down_req = talloc_zero(req, struct ldb_request);
+       if (down_req == NULL) {
+               return LDB_ERR_OPERATIONS_ERROR;
+       }
+
+       down_req->operation = req->operation;
+       /* in our db we store the rootDSE with a DN of @ROOTDSE */
+       down_req->op.search.base = ldb_dn_new(down_req, module->ldb, "@ROOTDSE");
+       down_req->op.search.scope = LDB_SCOPE_BASE;
+       down_req->op.search.tree = ldb_parse_tree(down_req, NULL);
+       if (down_req->op.search.base == NULL || down_req->op.search.tree == NULL) {
                ldb_oom(module->ldb);
-               talloc_free(tmp_ctx);
+               talloc_free(down_req);
                return LDB_ERR_OPERATIONS_ERROR;
        }
+       down_req->op.search.attrs = req->op.search.attrs;
+       down_req->controls = req->controls;
 
-       /* grab the static contents of the record */
-       ret = ldb_next_request(module, req);
+       down_req->context = ac;
+       down_req->callback = rootdse_callback;
+       ldb_set_timeout_from_prev_req(module->ldb, req, down_req);
 
-       req->op.search.res = s->res;
+       /* perform the search */
+       ret = ldb_next_request(module, down_req);
 
+       /* do not free down_req as the call results may be linked to it,
+        * it will be freed when the upper level request get freed */
        if (ret == LDB_SUCCESS) {
-               ret = rootdse_add_dynamic(module, req);
+               req->handle = down_req->handle;
        }
 
-       talloc_free(tmp_ctx);
-
        return ret;
 }
 
@@ -174,7 +326,7 @@ static int rootdse_register_control(struct ldb_module *module, struct ldb_reques
                return LDB_ERR_OPERATIONS_ERROR;
        }
 
-       list[priv->num_controls] = talloc_strdup(list, req->op.reg.oid);
+       list[priv->num_controls] = talloc_strdup(list, req->op.reg_control.oid);
        if (!list[priv->num_controls]) {
                return LDB_ERR_OPERATIONS_ERROR;
        }
@@ -185,48 +337,66 @@ static int rootdse_register_control(struct ldb_module *module, struct ldb_reques
        return LDB_SUCCESS;
 }
  
+static int rootdse_register_partition(struct ldb_module *module, struct ldb_request *req)
+{
+       struct private_data *priv = talloc_get_type(module->private_data, struct private_data);
+       struct ldb_dn **list;
+
+       list = talloc_realloc(priv, priv->partitions, struct ldb_dn *, priv->num_partitions + 1);
+       if (!list) {
+               return LDB_ERR_OPERATIONS_ERROR;
+       }
+
+       list[priv->num_partitions] = ldb_dn_copy(list, req->op.reg_partition.dn);
+       if (!list[priv->num_partitions]) {
+               return LDB_ERR_OPERATIONS_ERROR;
+       }
+
+       priv->num_partitions += 1;
+       priv->partitions = list;
+
+       return LDB_SUCCESS;
+}
 
 static int rootdse_request(struct ldb_module *module, struct ldb_request *req)
 {
        switch (req->operation) {
-       case LDB_REQ_SEARCH:
-               return rootdse_search_bytree(module, req);
-       case LDB_REQ_REGISTER:
+
+       case LDB_REQ_REGISTER_CONTROL:
                return rootdse_register_control(module, req);
+       case LDB_REQ_REGISTER_PARTITION:
+               return rootdse_register_partition(module, req);
+
        default:
                break;
        }
        return ldb_next_request(module, req);
 }
 
-static const struct ldb_module_ops rootdse_ops = {
-       .name           = "rootdse",
-       .request        = rootdse_request
-};
-
-struct ldb_module *rootdse_module_init(struct ldb_context *ldb, const char *options[])
+static int rootdse_init(struct ldb_module *module)
 {
-       struct ldb_module *ctx;
        struct private_data *data;
 
-       ctx = talloc(ldb, struct ldb_module);
-       if (!ctx)
-               return NULL;
-
-       data = talloc(ctx, struct private_data);
+       data = talloc(module, struct private_data);
        if (data == NULL) {
-               talloc_free(ctx);
-               return NULL;
+               return -1;
        }
 
        data->num_controls = 0;
        data->controls = NULL;
-       ctx->private_data = data;
+       data->num_partitions = 0;
+       data->partitions = NULL;
+       module->private_data = data;
 
-       ctx->ldb = ldb;
-       ctx->prev = ctx->next = NULL;
-       ctx->ops = &rootdse_ops;
+       ldb_set_default_dns(module->ldb);
 
-       return ctx;
+       return ldb_next_init(module);
 }
 
+_PUBLIC_ const struct ldb_module_ops ldb_rootdse_module_ops = {
+       .name                   = "rootdse",
+       .init_context           = rootdse_init,
+       .search                 = rootdse_search,
+       .request                = rootdse_request
+};