s3:events: change event_add_timed() prototype to match samba4
[nivanova/samba-autobuild/.git] / source3 / winbindd / winbindd_dual.c
index e21524689bbc5eae4702d66afbe668620b4a9518..1499141c34f74b837f90c20c6b89a2237cd3bfa4 100644 (file)
 #define DBGC_CLASS DBGC_WINBIND
 
 extern bool override_logfile;
+extern struct winbindd_methods cache_methods;
 
 /* Read some data from a client connection */
 
 static void child_read_request(struct winbindd_cli_state *state)
 {
-       ssize_t len;
+       NTSTATUS status;
 
        /* Read data */
 
-       len = read_data(state->sock, (char *)&state->request,
-                       sizeof(state->request), NULL);
+       status = read_data(state->sock, (char *)&state->request,
+                          sizeof(state->request));
 
-       if (len != sizeof(state->request)) {
-               DEBUG(len > 0 ? 0 : 3, ("Got invalid request length: %d\n", (int)len));
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(3, ("child_read_request: read_data failed: %s\n",
+                         nt_errstr(status)));
                state->finished = True;
                return;
        }
@@ -71,11 +73,12 @@ static void child_read_request(struct winbindd_cli_state *state)
        /* Ensure null termination */
        state->request.extra_data.data[state->request.extra_len] = '\0';
 
-       len = read_data(state->sock, state->request.extra_data.data,
-                       state->request.extra_len, NULL);
+       status= read_data(state->sock, state->request.extra_data.data,
+                         state->request.extra_len);
 
-       if (len != state->request.extra_len) {
-               DEBUG(0, ("Could not read extra data\n"));
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(0, ("Could not read extra data: %s\n",
+                         nt_errstr(status)));
                state->finished = True;
                return;
        }
@@ -101,6 +104,7 @@ struct winbindd_async_request {
        void *private_data;
 };
 
+static void async_request_fail(struct winbindd_async_request *state);
 static void async_main_request_sent(void *private_data, bool success);
 static void async_request_sent(void *private_data, bool success);
 static void async_reply_recv(void *private_data, bool success);
@@ -116,6 +120,10 @@ void async_request(TALLOC_CTX *mem_ctx, struct winbindd_child *child,
 
        SMB_ASSERT(continuation != NULL);
 
+       DEBUG(10, ("Sending request to child pid %d (domain=%s)\n",
+                  (int)child->pid,
+                  (child->domain != NULL) ? child->domain->name : "''"));
+
        state = TALLOC_P(mem_ctx, struct winbindd_async_request);
 
        if (state == NULL) {
@@ -126,6 +134,7 @@ void async_request(TALLOC_CTX *mem_ctx, struct winbindd_child *child,
 
        state->mem_ctx = mem_ctx;
        state->child = child;
+       state->reply_timeout_event = NULL;
        state->request = request;
        state->response = response;
        state->continuation = continuation;
@@ -145,10 +154,7 @@ static void async_main_request_sent(void *private_data, bool success)
 
        if (!success) {
                DEBUG(5, ("Could not send async request\n"));
-
-               state->response->length = sizeof(struct winbindd_response);
-               state->response->result = WINBINDD_ERROR;
-               state->continuation(state->private_data, False);
+               async_request_fail(state);
                return;
        }
 
@@ -169,7 +175,7 @@ static void async_main_request_sent(void *private_data, bool success)
 
 static void async_request_timeout_handler(struct event_context *ctx,
                                        struct timed_event *te,
-                                       const struct timeval *now,
+                                       struct timeval now,
                                        void *private_data)
 {
        struct winbindd_async_request *state =
@@ -194,10 +200,12 @@ static void async_request_fail(struct winbindd_async_request *state)
 
        TALLOC_FREE(state->reply_timeout_event);
 
-       SMB_ASSERT(state->child_pid != (pid_t)0);
+       /* If child exists and is not already reaped,
+          send kill signal to child. */
 
-       /* If not already reaped, send kill signal to child. */
-       if (state->child->pid == state->child_pid) {
+       if ((state->child->pid != (pid_t)0) &&
+                       (state->child->pid != (pid_t)-1) &&
+                       (state->child->pid == state->child_pid)) {
                kill(state->child_pid, SIGTERM);
 
                /* 
@@ -239,7 +247,6 @@ static void async_request_sent(void *private_data_data, bool success)
        state->reply_timeout_event = event_add_timed(winbind_event_context(),
                                                        NULL,
                                                        timeval_current_ofs(300,0),
-                                                       "async_request_timeout",
                                                        async_request_timeout_handler,
                                                        state);
        if (!state->reply_timeout_event) {
@@ -292,13 +299,27 @@ static void schedule_async_request(struct winbindd_child *child)
                return;         /* Busy */
        }
 
+       /*
+        * This may be a reschedule, so we might
+        * have an existing timeout event pending on
+        * the first entry in the child->requests list
+        * (we only send one request at a time).
+        * Ensure we free it before we reschedule.
+        * Bug #5814, from hargagan <shargagan@novell.com>.
+        * JRA.
+        */
+
+       TALLOC_FREE(request->reply_timeout_event);
+
        if ((child->pid == 0) && (!fork_domain_child(child))) {
-               /* Cancel all outstanding requests */
+               /* fork_domain_child failed.
+                  Cancel all outstanding requests */
 
                while (request != NULL) {
                        /* request might be free'd in the continuation */
                        struct winbindd_async_request *next = request->next;
-                       request->continuation(request->private_data, False);
+
+                       async_request_fail(request);
                        request = next;
                }
                return;
@@ -475,12 +496,27 @@ void winbind_child_died(pid_t pid)
                return;
        }
 
+       /* This will be re-added in fork_domain_child() */
+
+       DLIST_REMOVE(children, child);
+       
        remove_fd_event(&child->event);
        close(child->event.fd);
        child->event.fd = 0;
        child->event.flags = 0;
        child->pid = 0;
 
+       if (child->requests) {
+               /*
+                * schedule_async_request() will also
+                * clear this event but the call is
+                * idempotent so it doesn't hurt to
+                * cover all possible future code
+                * paths. JRA.
+                */
+               TALLOC_FREE(child->requests->reply_timeout_event);
+       }
+
        schedule_async_request(child);
 }
 
@@ -494,6 +530,36 @@ void winbindd_flush_negative_conn_cache(struct winbindd_domain *domain)
        }
 }
 
+/* 
+ * Parent winbindd process sets its own debug level first and then
+ * sends a message to all the winbindd children to adjust their debug
+ * level to that of parents.
+ */
+
+void winbind_msg_debug(struct messaging_context *msg_ctx,
+                        void *private_data,
+                        uint32_t msg_type,
+                        struct server_id server_id,
+                        DATA_BLOB *data)
+{
+       struct winbindd_child *child;
+
+       DEBUG(10,("winbind_msg_debug: got debug message.\n"));
+       
+       debug_message(msg_ctx, private_data, MSG_DEBUG, server_id, data);
+
+       for (child = children; child != NULL; child = child->next) {
+
+               DEBUG(10,("winbind_msg_debug: sending message to pid %u.\n",
+                       (unsigned int)child->pid));
+
+               messaging_send_buf(msg_ctx, pid_to_procid(child->pid),
+                          MSG_DEBUG,
+                          data->data,
+                          strlen((char *) data->data) + 1);
+       }
+}
+
 /* Set our domains as offline and forward the offline message to our children. */
 
 void winbind_msg_offline(struct messaging_context *msg_ctx,
@@ -676,16 +742,98 @@ void winbind_msg_dump_event_list(struct messaging_context *msg_ctx,
 
 }
 
+void winbind_msg_dump_domain_list(struct messaging_context *msg_ctx,
+                                 void *private_data,
+                                 uint32_t msg_type,
+                                 struct server_id server_id,
+                                 DATA_BLOB *data)
+{
+       TALLOC_CTX *mem_ctx;
+       const char *message = NULL;
+       struct server_id *sender = NULL;
+       const char *domain = NULL;
+       char *s = NULL;
+       NTSTATUS status;
+       struct winbindd_domain *dom = NULL;
+
+       DEBUG(5,("winbind_msg_dump_domain_list received.\n"));
+
+       if (!data || !data->data) {
+               return;
+       }
+
+       if (data->length < sizeof(struct server_id)) {
+               return;
+       }
+
+       mem_ctx = talloc_init("winbind_msg_dump_domain_list");
+       if (!mem_ctx) {
+               return;
+       }
+
+       sender = (struct server_id *)data->data;
+       if (data->length > sizeof(struct server_id)) {
+               domain = (const char *)data->data+sizeof(struct server_id);
+       }
+
+       if (domain) {
+
+               DEBUG(5,("winbind_msg_dump_domain_list for domain: %s\n",
+                       domain));
+
+               message = NDR_PRINT_STRUCT_STRING(mem_ctx, winbindd_domain,
+                                                 find_domain_from_name_noinit(domain));
+               if (!message) {
+                       talloc_destroy(mem_ctx);
+                       return;
+               }
+
+               messaging_send_buf(msg_ctx, *sender,
+                                  MSG_WINBIND_DUMP_DOMAIN_LIST,
+                                  (uint8_t *)message, strlen(message) + 1);
+
+               talloc_destroy(mem_ctx);
+
+               return;
+       }
+
+       DEBUG(5,("winbind_msg_dump_domain_list all domains\n"));
+
+       for (dom = domain_list(); dom; dom=dom->next) {
+               message = NDR_PRINT_STRUCT_STRING(mem_ctx, winbindd_domain, dom);
+               if (!message) {
+                       talloc_destroy(mem_ctx);
+                       return;
+               }
+
+               s = talloc_asprintf_append(s, "%s\n", message);
+               if (!s) {
+                       talloc_destroy(mem_ctx);
+                       return;
+               }
+       }
+
+       status = messaging_send_buf(msg_ctx, *sender,
+                                   MSG_WINBIND_DUMP_DOMAIN_LIST,
+                                   (uint8_t *)s, strlen(s) + 1);
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(0,("failed to send message: %s\n",
+               nt_errstr(status)));
+       }
+
+       talloc_destroy(mem_ctx);
+}
+
 static void account_lockout_policy_handler(struct event_context *ctx,
                                           struct timed_event *te,
-                                          const struct timeval *now,
+                                          struct timeval now,
                                           void *private_data)
 {
        struct winbindd_child *child =
                (struct winbindd_child *)private_data;
        TALLOC_CTX *mem_ctx = NULL;
        struct winbindd_methods *methods;
-       SAM_UNK_INFO_12 lockout_policy;
+       struct samr_DomInfo12 lockout_policy;
        NTSTATUS result;
 
        DEBUG(10,("account_lockout_policy_handler called\n"));
@@ -717,11 +865,114 @@ static void account_lockout_policy_handler(struct event_context *ctx,
 
        child->lockout_policy_event = event_add_timed(winbind_event_context(), NULL,
                                                      timeval_current_ofs(3600, 0),
-                                                     "account_lockout_policy_handler",
                                                      account_lockout_policy_handler,
                                                      child);
 }
 
+static time_t get_machine_password_timeout(void)
+{
+       /* until we have gpo support use lp setting */
+       return lp_machine_password_timeout();
+}
+
+static bool calculate_next_machine_pwd_change(const char *domain,
+                                             struct timeval *t)
+{
+       time_t pass_last_set_time;
+       time_t timeout;
+       time_t next_change;
+       char *pw;
+
+       pw = secrets_fetch_machine_password(domain,
+                                           &pass_last_set_time,
+                                           NULL);
+
+       if (pw == NULL) {
+               DEBUG(0,("cannot fetch own machine password ????"));
+               return false;
+       }
+
+       SAFE_FREE(pw);
+
+       timeout = get_machine_password_timeout();
+       if (timeout == 0) {
+               DEBUG(10,("machine password never expires\n"));
+               return false;
+       }
+
+       if (time(NULL) < (pass_last_set_time + timeout)) {
+               next_change = pass_last_set_time + timeout;
+               DEBUG(10,("machine password still valid until: %s\n",
+                       http_timestring(talloc_tos(), next_change)));
+               *t = timeval_set(next_change, 0);
+               return true;
+       }
+
+       DEBUG(10,("machine password expired, needs immediate change\n"));
+
+       *t = timeval_zero();
+
+       return true;
+}
+
+static void machine_password_change_handler(struct event_context *ctx,
+                                           struct timed_event *te,
+                                           struct timeval now,
+                                           void *private_data)
+{
+       struct winbindd_child *child =
+               (struct winbindd_child *)private_data;
+       struct rpc_pipe_client *netlogon_pipe = NULL;
+       TALLOC_CTX *frame;
+       NTSTATUS result;
+       struct timeval next_change;
+
+       DEBUG(10,("machine_password_change_handler called\n"));
+
+       TALLOC_FREE(child->machine_password_change_event);
+
+       if (!calculate_next_machine_pwd_change(child->domain->name,
+                                              &next_change)) {
+               return;
+       }
+
+       if (!winbindd_can_contact_domain(child->domain)) {
+               DEBUG(10,("machine_password_change_handler: Removing myself since I "
+                         "do not have an incoming trust to domain %s\n",
+                         child->domain->name));
+               return;
+       }
+
+       result = cm_connect_netlogon(child->domain, &netlogon_pipe);
+       if (!NT_STATUS_IS_OK(result)) {
+               DEBUG(10,("machine_password_change_handler: "
+                       "failed to connect netlogon pipe: %s\n",
+                        nt_errstr(result)));
+               return;
+       }
+
+       frame = talloc_stackframe();
+
+       result = trust_pw_find_change_and_store_it(netlogon_pipe,
+                                                  frame,
+                                                  child->domain->name);
+       TALLOC_FREE(frame);
+
+       if (!NT_STATUS_IS_OK(result)) {
+               DEBUG(10,("machine_password_change_handler: "
+                       "failed to change machine password: %s\n",
+                        nt_errstr(result)));
+       } else {
+               DEBUG(10,("machine_password_change_handler: "
+                       "successfully changed machine password\n"));
+       }
+
+       child->machine_password_change_event = event_add_timed(winbind_event_context(), NULL,
+                                                             next_change,
+                                                             machine_password_change_handler,
+                                                             child);
+}
+
 /* Deal with a request to go offline. */
 
 static void child_msg_offline(struct messaging_context *msg,
@@ -731,6 +982,7 @@ static void child_msg_offline(struct messaging_context *msg,
                              DATA_BLOB *data)
 {
        struct winbindd_domain *domain;
+       struct winbindd_domain *primary_domain = NULL;
        const char *domainname = (const char *)data->data;
 
        if (data->data == NULL || data->length == 0) {
@@ -744,6 +996,8 @@ static void child_msg_offline(struct messaging_context *msg,
                return;
        }
 
+       primary_domain = find_our_domain();
+
        /* Mark the requested domain offline. */
 
        for (domain = domain_list(); domain; domain = domain->next) {
@@ -753,6 +1007,11 @@ static void child_msg_offline(struct messaging_context *msg,
                if (strequal(domain->name, domainname)) {
                        DEBUG(5,("child_msg_offline: marking %s offline.\n", domain->name));
                        set_domain_offline(domain);
+                       /* we are in the trusted domain, set the primary domain 
+                        * offline too */
+                       if (domain != primary_domain) {
+                               set_domain_offline(primary_domain);
+                       }
                }
        }
 }
@@ -766,6 +1025,7 @@ static void child_msg_online(struct messaging_context *msg,
                             DATA_BLOB *data)
 {
        struct winbindd_domain *domain;
+       struct winbindd_domain *primary_domain = NULL;
        const char *domainname = (const char *)data->data;
 
        if (data->data == NULL || data->length == 0) {
@@ -779,6 +1039,8 @@ static void child_msg_online(struct messaging_context *msg,
                return;
        }
 
+       primary_domain = find_our_domain();
+
        /* Set our global state as online. */
        set_global_winbindd_state_online();
 
@@ -793,6 +1055,16 @@ static void child_msg_online(struct messaging_context *msg,
                        DEBUG(5,("child_msg_online: requesting %s to go online.\n", domain->name));
                        winbindd_flush_negative_conn_cache(domain);
                        set_domain_online_request(domain);
+
+                       /* we can be in trusted domain, which will contact primary domain
+                        * we have to bring primary domain online in trusted domain process
+                        * see, winbindd_dual_pam_auth() --> winbindd_dual_pam_auth_samlogon()
+                        * --> contact_domain = find_our_domain()
+                        * */
+                       if (domain != primary_domain) {
+                               winbindd_flush_negative_conn_cache(primary_domain);
+                               set_domain_online_request(primary_domain);
+                       }
                }
        }
 }
@@ -876,6 +1148,14 @@ static bool fork_domain_child(struct winbindd_child *child)
        int fdpair[2];
        struct winbindd_cli_state state;
        struct winbindd_domain *domain;
+       struct winbindd_domain *primary_domain = NULL;
+
+       if (child->domain) {
+               DEBUG(10, ("fork_domain_child called for domain '%s'\n",
+                          child->domain->name));
+       } else {
+               DEBUG(10, ("fork_domain_child called without domain.\n"));
+       }
 
        if (socketpair(AF_UNIX, SOCK_STREAM, 0, fdpair) != 0) {
                DEBUG(0, ("Could not open child pipe: %s\n",
@@ -886,9 +1166,6 @@ static bool fork_domain_child(struct winbindd_child *child)
        ZERO_STRUCT(state);
        state.pid = sys_getpid();
 
-       /* Stop zombies */
-       CatchChild();
-
        child->pid = sys_fork();
 
        if (child->pid == -1) {
@@ -910,29 +1187,31 @@ static bool fork_domain_child(struct winbindd_child *child)
 
        /* Child */
 
+       DEBUG(10, ("Child process %d\n", (int)sys_getpid()));
+
+       /* Stop zombies in children */
+       CatchChild();
+
        state.sock = fdpair[0];
        close(fdpair[1]);
 
-       /* tdb needs special fork handling */
-       if (tdb_reopen_all(1) == -1) {
-               DEBUG(0,("tdb_reopen_all failed.\n"));
+       if (!reinit_after_fork(winbind_messaging_context(),
+                              winbind_event_context(), true)) {
+               DEBUG(0,("reinit_after_fork() failed\n"));
                _exit(0);
        }
 
        close_conns_after_fork();
 
+       /* Ensure we're not handling an event inherited from
+          our parent. */
+       ccache_remove_all_after_fork();
+
        if (!override_logfile) {
                lp_set_logfile(child->logfilename);
                reopen_logs();
        }
 
-       /*
-        * For clustering, we need to re-init our ctdbd connection after the
-        * fork
-        */
-       if (!NT_STATUS_IS_OK(messaging_reinit(winbind_messaging_context())))
-               exit(1);
-
        /* Don't handle the same messages as our parent. */
        messaging_deregister(winbind_messaging_context(),
                             MSG_SMB_CONF_UPDATED, NULL);
@@ -946,6 +1225,10 @@ static bool fork_domain_child(struct winbindd_child *child)
                             MSG_WINBIND_ONLINESTATUS, NULL);
        messaging_deregister(winbind_messaging_context(),
                             MSG_DUMP_EVENT_LIST, NULL);
+       messaging_deregister(winbind_messaging_context(),
+                            MSG_WINBIND_DUMP_DOMAIN_LIST, NULL);
+       messaging_deregister(winbind_messaging_context(),
+                            MSG_DEBUG, NULL);
 
        /* Handle online/offline messages. */
        messaging_register(winbind_messaging_context(), NULL,
@@ -956,40 +1239,76 @@ static bool fork_domain_child(struct winbindd_child *child)
                           MSG_WINBIND_ONLINESTATUS, child_msg_onlinestatus);
        messaging_register(winbind_messaging_context(), NULL,
                           MSG_DUMP_EVENT_LIST, child_msg_dump_event_list);
+       messaging_register(winbind_messaging_context(), NULL,
+                          MSG_DEBUG, debug_message);
 
+       primary_domain = find_our_domain();
+
+       if (primary_domain == NULL) {
+               smb_panic("no primary domain found");
+       }
+       /* we have destroy all time event in reinit_after_fork()
+        * set check_online_event to NULL */
+       for (domain = domain_list(); domain; domain = domain->next) {
+               domain->check_online_event = NULL;
+       }
+       /* It doesn't matter if we allow cache login,
+        * try to bring domain online after fork. */
        if ( child->domain ) {
                child->domain->startup = True;
                child->domain->startup_time = time(NULL);
-       }
-
-       /* Ensure we have no pending check_online events other
-          than one for this domain. */
-
-       for (domain = domain_list(); domain; domain = domain->next) {
-               if (domain != child->domain) {
-                       TALLOC_FREE(domain->check_online_event);
+               /* we can be in primary domain or in trusted domain
+                * If we are in trusted domain, set the primary domain
+                * in start-up mode */
+               if (!(child->domain->internal)) {
+                       set_domain_online_request(child->domain);
+                       if (!(child->domain->primary)) {
+                               primary_domain->startup = True;
+                               primary_domain->startup_time = time(NULL);
+                               set_domain_online_request(primary_domain);
+                       }
                }
        }
 
-       /* Ensure we're not handling an event inherited from
-          our parent. */
-
-       cancel_named_event(winbind_event_context(),
-                          "krb5_ticket_refresh_handler");
-
        /* We might be in the idmap child...*/
        if (child->domain && !(child->domain->internal) &&
            lp_winbind_offline_logon()) {
 
                set_domain_online_request(child->domain);
 
+               if (primary_domain && (primary_domain != child->domain)) {
+                       /* We need to talk to the primary
+                        * domain as well as the trusted
+                        * domain inside a trusted domain
+                        * child.
+                        * See the code in :
+                        * set_dc_type_and_flags_trustinfo()
+                        * for details.
+                        */
+                       set_domain_online_request(primary_domain);
+               }
+
                child->lockout_policy_event = event_add_timed(
                        winbind_event_context(), NULL, timeval_zero(),
-                       "account_lockout_policy_handler",
                        account_lockout_policy_handler,
                        child);
        }
 
+       if (child->domain && child->domain->primary &&
+           !lp_use_kerberos_keytab() &&
+           lp_server_role() == ROLE_DOMAIN_MEMBER) {
+
+               struct timeval next_change;
+
+               if (calculate_next_machine_pwd_change(child->domain->name,
+                                                      &next_change)) {
+                       child->machine_password_change_event = event_add_timed(
+                               winbind_event_context(), NULL, next_change,
+                               machine_password_change_handler,
+                               child);
+               }
+       }
+
        while (1) {
 
                int ret;
@@ -999,6 +1318,11 @@ static bool fork_domain_child(struct winbindd_child *child)
                struct timeval now;
                TALLOC_CTX *frame = talloc_stackframe();
 
+               /* check for signals */
+               winbind_check_sigterm(false);
+               winbind_check_sighup(override_logfile ? NULL :
+                               child->logfilename);
+
                run_events(winbind_event_context(), 0, NULL, NULL);
 
                GetTimeOfDay(&now);