84e8c3880dbd77c7ce008b5fcbaffd60e0db25ef
[ira/wip.git] / source3 / winbindd / winbindd_misc.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    Winbind daemon - miscellaneous other functions
5
6    Copyright (C) Tim Potter      2000
7    Copyright (C) Andrew Bartlett 2002
8
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18
19    You should have received a copy of the GNU General Public License
20    along with this program.  If not, see <http://www.gnu.org/licenses/>.
21 */
22
23 #include "includes.h"
24 #include "winbindd.h"
25 #include "../librpc/gen_ndr/cli_netlogon.h"
26
27 #undef DBGC_CLASS
28 #define DBGC_CLASS DBGC_WINBIND
29
30 /* Constants and helper functions for determining domain trust types */
31
32 enum trust_type {
33         EXTERNAL = 0,
34         FOREST,
35         IN_FOREST,
36         NONE,
37 };
38
39 const char *trust_type_strings[] = {"External", 
40                                     "Forest", 
41                                     "In Forest",
42                                     "None"};
43
44 static enum trust_type get_trust_type(struct winbindd_tdc_domain *domain)
45 {
46         if (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN)   
47                 return EXTERNAL;
48         else if (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE)
49                 return FOREST;
50         else if (((domain->trust_flags & NETR_TRUST_FLAG_IN_FOREST) == NETR_TRUST_FLAG_IN_FOREST) &&
51             ((domain->trust_flags & NETR_TRUST_FLAG_PRIMARY) == 0x0))
52                 return IN_FOREST;
53         return NONE;    
54 }
55
56 static const char *get_trust_type_string(struct winbindd_tdc_domain *domain)
57 {
58         return trust_type_strings[get_trust_type(domain)];
59 }
60
61 static bool trust_is_inbound(struct winbindd_tdc_domain *domain)
62 {
63         return (domain->trust_flags == 0x0) ||
64             ((domain->trust_flags & NETR_TRUST_FLAG_IN_FOREST) ==
65             NETR_TRUST_FLAG_IN_FOREST) ||                       
66             ((domain->trust_flags & NETR_TRUST_FLAG_INBOUND) ==
67             NETR_TRUST_FLAG_INBOUND);           
68 }
69
70 static bool trust_is_outbound(struct winbindd_tdc_domain *domain)
71 {
72         return (domain->trust_flags == 0x0) ||
73             ((domain->trust_flags & NETR_TRUST_FLAG_IN_FOREST) ==
74             NETR_TRUST_FLAG_IN_FOREST) ||                       
75             ((domain->trust_flags & NETR_TRUST_FLAG_OUTBOUND) ==
76             NETR_TRUST_FLAG_OUTBOUND);          
77 }
78
79 static bool trust_is_transitive(struct winbindd_tdc_domain *domain)
80 {
81         if ((domain->trust_attribs == NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE) ||         
82             (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN) ||
83             (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL))
84                 return False;
85         return True;
86 }
87
88 void winbindd_list_trusted_domains(struct winbindd_cli_state *state)
89 {
90         struct winbindd_tdc_domain *dom_list = NULL;
91         struct winbindd_tdc_domain *d = NULL;
92         size_t num_domains = 0;
93         int extra_data_len = 0;
94         char *extra_data = NULL;
95         int i = 0;
96
97         DEBUG(3, ("[%5lu]: list trusted domains\n",
98                   (unsigned long)state->pid));
99
100         if( !wcache_tdc_fetch_list( &dom_list, &num_domains )) {
101                 request_error(state);   
102                 goto done;
103         }
104
105         extra_data = talloc_strdup(state->mem_ctx, "");
106         if (extra_data == NULL) {
107                 request_error(state);
108                 goto done;
109         }
110
111         for ( i = 0; i < num_domains; i++ ) {
112                 struct winbindd_domain *domain;
113                 bool is_online = true;          
114
115                 d = &dom_list[i];
116                 domain = find_domain_from_name_noinit(d->domain_name);
117                 if (domain) {
118                         is_online = domain->online;
119                 }
120                 extra_data = talloc_asprintf_append_buffer(
121                         extra_data,
122                         "%s\\%s\\%s\\%s\\%s\\%s\\%s\\%s\n",
123                         d->domain_name,
124                         d->dns_name ? d->dns_name : d->domain_name,
125                         sid_string_talloc(state->mem_ctx, &d->sid),
126                         get_trust_type_string(d),
127                         trust_is_transitive(d) ? "Yes" : "No",
128                         trust_is_inbound(d) ? "Yes" : "No",
129                         trust_is_outbound(d) ? "Yes" : "No",
130                         is_online ? "Online" : "Offline" );
131         }
132
133         state->response->data.num_entries = num_domains;
134
135         extra_data_len = strlen(extra_data);
136         if (extra_data_len > 0) {
137
138                 /* Strip the last \n */
139                 extra_data[extra_data_len-1] = '\0';
140
141                 state->response->extra_data.data = extra_data;
142                 state->response->length += extra_data_len;
143         }
144
145         request_ok(state);      
146 done:
147         TALLOC_FREE( dom_list );
148 }
149
150 enum winbindd_result winbindd_dual_list_trusted_domains(struct winbindd_domain *domain,
151                                                         struct winbindd_cli_state *state)
152 {
153         int i;
154         int extra_data_len = 0;
155         char *extra_data;
156         NTSTATUS result;
157         bool have_own_domain = False;
158         struct netr_DomainTrustList trusts;
159
160         DEBUG(3, ("[%5lu]: list trusted domains\n",
161                   (unsigned long)state->pid));
162
163         result = domain->methods->trusted_domains(domain, state->mem_ctx,
164                                                   &trusts);
165
166         if (!NT_STATUS_IS_OK(result)) {
167                 DEBUG(3, ("winbindd_dual_list_trusted_domains: trusted_domains returned %s\n",
168                         nt_errstr(result) ));
169                 return WINBINDD_ERROR;
170         }
171
172         extra_data = talloc_strdup(state->mem_ctx, "");
173
174         for (i=0; i<trusts.count; i++) {
175                 extra_data = talloc_asprintf_append_buffer(
176                         extra_data, "%s\\%s\\%s\n",
177                         trusts.array[i].netbios_name,
178                         trusts.array[i].dns_name,
179                         sid_string_talloc(state->mem_ctx,
180                                           trusts.array[i].sid));
181         }
182
183         /* add our primary domain */
184
185         for (i=0; i<trusts.count; i++) {
186                 if (strequal(trusts.array[i].netbios_name, domain->name)) {
187                         have_own_domain = True;
188                         break;
189                 }
190         }
191
192         if (state->request->data.list_all_domains && !have_own_domain) {
193                 extra_data = talloc_asprintf_append_buffer(
194                         extra_data, "%s\\%s\\%s\n", domain->name,
195                         domain->alt_name ? domain->alt_name : domain->name,
196                         sid_string_talloc(state->mem_ctx, &domain->sid));
197         }
198
199         extra_data_len = strlen(extra_data);
200         if (extra_data_len > 0) {
201
202                 /* Strip the last \n */
203                 extra_data[extra_data_len-1] = '\0';
204
205                 state->response->extra_data.data = extra_data;
206                 state->response->length += extra_data_len+1;
207         }
208
209         return WINBINDD_OK;
210 }
211
212 struct domain_info_state {
213         struct winbindd_domain *domain;
214         struct winbindd_cli_state *cli;
215         struct winbindd_request ping_request;
216 };
217
218 static void domain_info_done(struct tevent_req *req);
219
220 void winbindd_domain_info(struct winbindd_cli_state *cli)
221 {
222         struct domain_info_state *state;
223         struct winbindd_domain *domain;
224         struct tevent_req *req;
225
226         DEBUG(3, ("[%5lu]: domain_info [%s]\n", (unsigned long)cli->pid,
227                   cli->request->domain_name));
228
229         domain = find_domain_from_name_noinit(cli->request->domain_name);
230
231         if (domain == NULL) {
232                 DEBUG(3, ("Did not find domain [%s]\n",
233                           cli->request->domain_name));
234                 request_error(cli);
235                 return;
236         }
237
238         if (domain->initialized) {
239                 fstrcpy(cli->response->data.domain_info.name,
240                         domain->name);
241                 fstrcpy(cli->response->data.domain_info.alt_name,
242                         domain->alt_name);
243                 sid_to_fstring(cli->response->data.domain_info.sid,
244                                &domain->sid);
245                 cli->response->data.domain_info.native_mode =
246                         domain->native_mode;
247                 cli->response->data.domain_info.active_directory =
248                         domain->active_directory;
249                 cli->response->data.domain_info.primary =
250                         domain->primary;
251                 request_ok(cli);
252                 return;
253         }
254
255         state = talloc_zero(cli->mem_ctx, struct domain_info_state);
256         if (state == NULL) {
257                 DEBUG(0, ("talloc failed\n"));
258                 request_error(cli);
259                 return;
260         }
261
262         state->cli = cli;
263         state->domain = domain;
264         state->ping_request.cmd = WINBINDD_PING;
265
266         /*
267          * Send a ping down. This implicitly initializes the domain.
268          */
269
270         req = wb_domain_request_send(state, winbind_event_context(),
271                                      domain, &state->ping_request);
272         if (req == NULL) {
273                 DEBUG(3, ("wb_domain_request_send failed\n"));
274                 request_error(cli);
275                 return;
276         }
277         tevent_req_set_callback(req, domain_info_done, state);
278 }
279
280 static void domain_info_done(struct tevent_req *req)
281 {
282         struct domain_info_state *state = tevent_req_callback_data(
283                 req, struct domain_info_state);
284         struct winbindd_response *response;
285         int ret, err;
286
287         ret = wb_domain_request_recv(req, req, &response, &err);
288         TALLOC_FREE(req);
289         if (ret == -1) {
290                 DEBUG(10, ("wb_domain_request failed: %s\n", strerror(errno)));
291                 request_error(state->cli);
292                 return;
293         }
294         if (!state->domain->initialized) {
295                 DEBUG(5, ("wb_domain_request did not initialize domain %s\n",
296                           state->domain->name));
297                 request_error(state->cli);
298                 return;
299         }
300
301         fstrcpy(state->cli->response->data.domain_info.name,
302                 state->domain->name);
303         fstrcpy(state->cli->response->data.domain_info.alt_name,
304                 state->domain->alt_name);
305         sid_to_fstring(state->cli->response->data.domain_info.sid,
306                        &state->domain->sid);
307
308         state->cli->response->data.domain_info.native_mode =
309                 state->domain->native_mode;
310         state->cli->response->data.domain_info.active_directory =
311                 state->domain->active_directory;
312         state->cli->response->data.domain_info.primary =
313                 state->domain->primary;
314
315         request_ok(state->cli);
316 }
317
318 /* List various tidbits of information */
319
320 void winbindd_info(struct winbindd_cli_state *state)
321 {
322
323         DEBUG(3, ("[%5lu]: request misc info\n", (unsigned long)state->pid));
324
325         state->response->data.info.winbind_separator = *lp_winbind_separator();
326         fstrcpy(state->response->data.info.samba_version, samba_version_string());
327         request_ok(state);
328 }
329
330 /* Tell the client the current interface version */
331
332 void winbindd_interface_version(struct winbindd_cli_state *state)
333 {
334         DEBUG(3, ("[%5lu]: request interface version\n",
335                   (unsigned long)state->pid));
336
337         state->response->data.interface_version = WINBIND_INTERFACE_VERSION;
338         request_ok(state);
339 }
340
341 /* What domain are we a member of? */
342
343 void winbindd_domain_name(struct winbindd_cli_state *state)
344 {
345         DEBUG(3, ("[%5lu]: request domain name\n", (unsigned long)state->pid));
346
347         fstrcpy(state->response->data.domain_name, lp_workgroup());
348         request_ok(state);
349 }
350
351 /* What's my name again? */
352
353 void winbindd_netbios_name(struct winbindd_cli_state *state)
354 {
355         DEBUG(3, ("[%5lu]: request netbios name\n",
356                   (unsigned long)state->pid));
357
358         fstrcpy(state->response->data.netbios_name, global_myname());
359         request_ok(state);
360 }
361
362 /* Where can I find the privileged pipe? */
363
364 void winbindd_priv_pipe_dir(struct winbindd_cli_state *state)
365 {
366         char *priv_dir;
367         DEBUG(3, ("[%5lu]: request location of privileged pipe\n",
368                   (unsigned long)state->pid));
369
370         priv_dir = get_winbind_priv_pipe_dir();
371         state->response->extra_data.data = talloc_move(state->mem_ctx,
372                                                       &priv_dir);
373
374         /* must add one to length to copy the 0 for string termination */
375         state->response->length +=
376                 strlen((char *)state->response->extra_data.data) + 1;
377
378         request_ok(state);
379 }
380