Avoid including libds/common/roles.h in public loadparm.h header.
[vlendec/samba-autobuild/.git] / source4 / dsdb / dns / dns_update.c
1 /*
2    Unix SMB/CIFS mplementation.
3
4    DNS update service
5
6    Copyright (C) Andrew Tridgell 2009
7
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 3 of the License, or
11    (at your option) any later version.
12
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17
18    You should have received a copy of the GNU General Public License
19    along with this program.  If not, see <http://www.gnu.org/licenses/>.
20
21 */
22
23 /*
24   this module auto-creates the named.conf.update file, which tells
25   bind9 what KRB5 principals it should accept for updates to our zone
26
27   It also uses the samba_dnsupdate script to auto-create the right DNS
28   names for ourselves as a DC in the domain, using TSIG-GSS
29  */
30
31 #include "includes.h"
32 #include "dsdb/samdb/samdb.h"
33 #include "auth/auth.h"
34 #include "smbd/service.h"
35 #include "lib/messaging/irpc.h"
36 #include "param/param.h"
37 #include "system/filesys.h"
38 #include "dsdb/common/util.h"
39 #include "libcli/composite/composite.h"
40 #include "libcli/security/dom_sid.h"
41 #include "librpc/gen_ndr/ndr_irpc.h"
42 #include "libds/common/roles.h"
43
44 NTSTATUS server_service_dnsupdate_init(void);
45
46 struct dnsupdate_service {
47         struct task_server *task;
48         struct auth_session_info *system_session_info;
49         struct ldb_context *samdb;
50
51         /* status for periodic config file update */
52         struct {
53                 uint32_t interval;
54                 struct tevent_timer *te;
55                 struct tevent_req *subreq;
56                 NTSTATUS status;
57         } confupdate;
58
59         /* status for periodic DNS name check */
60         struct {
61                 uint32_t interval;
62                 struct tevent_timer *te;
63                 struct tevent_req *subreq;
64                 struct tevent_req *spnreq;
65                 NTSTATUS status;
66         } nameupdate;
67 };
68
69 /*
70   called when rndc reload has finished
71  */
72 static void dnsupdate_rndc_done(struct tevent_req *subreq)
73 {
74         struct dnsupdate_service *service = tevent_req_callback_data(subreq,
75                                             struct dnsupdate_service);
76         int ret;
77         int sys_errno;
78
79         service->confupdate.subreq = NULL;
80
81         ret = samba_runcmd_recv(subreq, &sys_errno);
82         TALLOC_FREE(subreq);
83         if (ret != 0) {
84                 service->confupdate.status = map_nt_error_from_unix_common(sys_errno);
85         } else {
86                 service->confupdate.status = NT_STATUS_OK;
87         }
88
89         if (!NT_STATUS_IS_OK(service->confupdate.status)) {
90                 DEBUG(0,(__location__ ": Failed rndc update - %s\n",
91                          nt_errstr(service->confupdate.status)));
92         } else {
93                 DEBUG(3,("Completed rndc reload OK\n"));
94         }
95 }
96
97 /*
98   called every 'dnsupdate:conf interval' seconds
99  */
100 static void dnsupdate_rebuild(struct dnsupdate_service *service)
101 {
102         int ret;
103         size_t size;
104         struct ldb_result *res1, *res2;
105         const char *tmp_path, *path, *path_static;
106         char *static_policies;
107         int fd;
108         unsigned int i;
109         const char *attrs1[] = { "msDS-HasDomainNCs", NULL };
110         const char *attrs2[] = { "name", NULL };
111         const char *realm = lpcfg_realm(service->task->lp_ctx);
112         TALLOC_CTX *tmp_ctx = talloc_new(service);
113         const char * const *rndc_command = lpcfg_rndc_command(service->task->lp_ctx);
114         const char **dc_list;
115         int dc_count=0;
116
117         /* abort any pending script run */
118         TALLOC_FREE(service->confupdate.subreq);
119
120         /* find the DNs for all the non-RODC DCs in the forest */
121         ret = dsdb_search(service->samdb, tmp_ctx, &res1, ldb_get_config_basedn(service->samdb),
122                           LDB_SCOPE_SUBTREE,
123                           attrs1,
124                           0,
125                           "(&(objectclass=NTDSDSA)(!(msDS-isRODC=TRUE)))");
126         if (ret != LDB_SUCCESS) {
127                 DEBUG(0,(__location__ ": Unable to find DCs list - %s", ldb_errstring(service->samdb)));
128                 talloc_free(tmp_ctx);
129                 return;
130         }
131
132         dc_list = talloc_array(tmp_ctx, const char *, 0);
133         for (i=0; i<res1->count; i++) {
134                 struct ldb_dn *server_dn = res1->msgs[i]->dn;
135                 struct ldb_dn *domain_dn;
136                 const char *acct_name, *full_account, *dns_domain;
137
138                 /* this is a nasty hack to form the account name of
139                  * this DC. We do it this way as we don't necessarily
140                  * have access to the domain NC, so all we have to go
141                  * on is what is in the configuration partition
142                  */
143
144                 domain_dn = ldb_msg_find_attr_as_dn(service->samdb, tmp_ctx, res1->msgs[i], "msDS-HasDomainNCs");
145                 if (domain_dn == NULL) continue;
146
147                 ldb_dn_remove_child_components(server_dn, 1);
148                 ret = dsdb_search_dn(service->samdb, tmp_ctx, &res2, server_dn, attrs2, 0);
149                 if (ret != LDB_SUCCESS) {
150                         continue;
151                 }
152
153                 acct_name = ldb_msg_find_attr_as_string(res2->msgs[0], "name", NULL);
154                 if (acct_name == NULL) continue;
155
156                 dns_domain = samdb_dn_to_dns_domain(tmp_ctx, domain_dn);
157                 if (dns_domain == NULL) {
158                         continue;
159                 }
160
161                 full_account = talloc_asprintf(tmp_ctx, "%s$@%s", acct_name, dns_domain);
162                 if (full_account == NULL) continue;
163
164                 dc_list = talloc_realloc(tmp_ctx, dc_list, const char *, dc_count+1);
165                 if (dc_list == NULL) {
166                         continue;
167                 }
168                 dc_list[dc_count++] = full_account;
169         }
170
171         path = lpcfg_parm_string(service->task->lp_ctx, NULL, "dnsupdate", "path");
172         if (path == NULL) {
173                 path = lpcfg_private_path(tmp_ctx, service->task->lp_ctx, "named.conf.update");
174         }
175
176         path_static = lpcfg_parm_string(service->task->lp_ctx, NULL, "dnsupdate", "extra_static_grant_rules");
177         if (path_static == NULL) {
178                 path_static = lpcfg_private_path(tmp_ctx, service->task->lp_ctx, "named.conf.update.static");
179         }
180
181         tmp_path = talloc_asprintf(tmp_ctx, "%s.tmp", path);
182         if (path == NULL || tmp_path == NULL || path_static == NULL ) {
183                 DEBUG(0,(__location__ ": Unable to get paths\n"));
184                 talloc_free(tmp_ctx);
185                 return;
186         }
187
188         static_policies = file_load(path_static, &size, 0, tmp_ctx);
189
190         unlink(tmp_path);
191         fd = open(tmp_path, O_CREAT|O_TRUNC|O_WRONLY, 0444);
192         if (fd == -1) {
193                 DEBUG(1,(__location__ ": Unable to open %s - %s\n", tmp_path, strerror(errno)));
194                 talloc_free(tmp_ctx);
195                 return;
196         }
197
198         dprintf(fd, "/* this file is auto-generated - do not edit */\n");
199         dprintf(fd, "update-policy {\n");
200         if( static_policies != NULL ) {
201                 dprintf(fd, "/* Start of static entries */\n");
202                 dprintf(fd, "%s\n",static_policies);
203                 dprintf(fd, "/* End of static entries */\n");
204         }
205         dprintf(fd, "\tgrant %s ms-self * A AAAA;\n", realm);
206         dprintf(fd, "\tgrant Administrator@%s wildcard * A AAAA SRV CNAME;\n", realm);
207
208         for (i=0; i<dc_count; i++) {
209                 dprintf(fd, "\tgrant %s wildcard * A AAAA SRV CNAME;\n", dc_list[i]);
210         }
211         dprintf(fd, "};\n");
212         close(fd);
213
214
215         if (NT_STATUS_IS_OK(service->confupdate.status) &&
216             file_compare(tmp_path, path) == true) {
217                 unlink(tmp_path);
218                 talloc_free(tmp_ctx);
219                 return;
220         }
221
222         if (rename(tmp_path, path) != 0) {
223                 DEBUG(0,(__location__ ": Failed to rename %s to %s - %s\n",
224                          tmp_path, path, strerror(errno)));
225                 talloc_free(tmp_ctx);
226                 return;
227         }
228
229         DEBUG(2,("Loading new DNS update grant rules\n"));
230         service->confupdate.subreq = samba_runcmd_send(service,
231                                                        service->task->event_ctx,
232                                                        timeval_current_ofs(10, 0),
233                                                        2, 0,
234                                                        rndc_command,
235                                                        "reload", NULL);
236         if (service->confupdate.subreq == NULL) {
237                 DEBUG(0,(__location__ ": samba_runcmd_send() failed with no memory\n"));
238                 talloc_free(tmp_ctx);
239                 return;
240         }
241         tevent_req_set_callback(service->confupdate.subreq,
242                                 dnsupdate_rndc_done,
243                                 service);
244
245         talloc_free(tmp_ctx);
246 }
247
248 static NTSTATUS dnsupdate_confupdate_schedule(struct dnsupdate_service *service);
249
250 /*
251   called every 'dnsupdate:conf interval' seconds
252  */
253 static void dnsupdate_confupdate_handler_te(struct tevent_context *ev, struct tevent_timer *te,
254                                           struct timeval t, void *ptr)
255 {
256         struct dnsupdate_service *service = talloc_get_type(ptr, struct dnsupdate_service);
257
258         dnsupdate_rebuild(service);
259         dnsupdate_confupdate_schedule(service);
260 }
261
262
263 static NTSTATUS dnsupdate_confupdate_schedule(struct dnsupdate_service *service)
264 {
265         service->confupdate.te = tevent_add_timer(service->task->event_ctx, service,
266                                                 timeval_current_ofs(service->confupdate.interval, 0),
267                                                 dnsupdate_confupdate_handler_te, service);
268         NT_STATUS_HAVE_NO_MEMORY(service->confupdate.te);
269         return NT_STATUS_OK;
270 }
271
272
273 /*
274   called when dns update script has finished
275  */
276 static void dnsupdate_nameupdate_done(struct tevent_req *subreq)
277 {
278         struct dnsupdate_service *service = tevent_req_callback_data(subreq,
279                                             struct dnsupdate_service);
280         int ret;
281         int sys_errno;
282
283         service->nameupdate.subreq = NULL;
284
285         ret = samba_runcmd_recv(subreq, &sys_errno);
286         TALLOC_FREE(subreq);
287         if (ret != 0) {
288                 service->nameupdate.status = map_nt_error_from_unix_common(sys_errno);
289         } else {
290                 service->nameupdate.status = NT_STATUS_OK;
291         }
292
293         if (!NT_STATUS_IS_OK(service->nameupdate.status)) {
294                 DEBUG(0,(__location__ ": Failed DNS update - %s\n",
295                          nt_errstr(service->nameupdate.status)));
296         } else {
297                 DEBUG(3,("Completed DNS update check OK\n"));
298         }
299 }
300
301
302 /*
303   called when spn update script has finished
304  */
305 static void dnsupdate_spnupdate_done(struct tevent_req *subreq)
306 {
307         struct dnsupdate_service *service = tevent_req_callback_data(subreq,
308                                             struct dnsupdate_service);
309         int ret;
310         int sys_errno;
311
312         service->nameupdate.spnreq = NULL;
313
314         ret = samba_runcmd_recv(subreq, &sys_errno);
315         TALLOC_FREE(subreq);
316         if (ret != 0) {
317                 service->nameupdate.status = map_nt_error_from_unix_common(sys_errno);
318         } else {
319                 service->nameupdate.status = NT_STATUS_OK;
320         }
321
322         if (!NT_STATUS_IS_OK(service->nameupdate.status)) {
323                 DEBUG(0,(__location__ ": Failed SPN update - %s\n",
324                          nt_errstr(service->nameupdate.status)));
325         } else {
326                 DEBUG(3,("Completed SPN update check OK\n"));
327         }
328 }
329
330 /*
331   called every 'dnsupdate:name interval' seconds
332  */
333 static void dnsupdate_check_names(struct dnsupdate_service *service)
334 {
335         const char * const *dns_update_command = lpcfg_dns_update_command(service->task->lp_ctx);
336         const char * const *spn_update_command = lpcfg_spn_update_command(service->task->lp_ctx);
337
338         /* kill any existing child */
339         TALLOC_FREE(service->nameupdate.subreq);
340
341         DEBUG(3,("Calling DNS name update script\n"));
342         service->nameupdate.subreq = samba_runcmd_send(service,
343                                                        service->task->event_ctx,
344                                                        timeval_current_ofs(20, 0),
345                                                        2, 0,
346                                                        dns_update_command,
347                                                        NULL);
348         if (service->nameupdate.subreq == NULL) {
349                 DEBUG(0,(__location__ ": samba_runcmd_send() failed with no memory\n"));
350                 return;
351         }
352         tevent_req_set_callback(service->nameupdate.subreq,
353                                 dnsupdate_nameupdate_done,
354                                 service);
355
356         DEBUG(3,("Calling SPN name update script\n"));
357         service->nameupdate.spnreq = samba_runcmd_send(service,
358                                                        service->task->event_ctx,
359                                                        timeval_current_ofs(20, 0),
360                                                        2, 0,
361                                                        spn_update_command,
362                                                        NULL);
363         if (service->nameupdate.spnreq == NULL) {
364                 DEBUG(0,(__location__ ": samba_runcmd_send() failed with no memory\n"));
365                 return;
366         }
367         tevent_req_set_callback(service->nameupdate.spnreq,
368                                 dnsupdate_spnupdate_done,
369                                 service);
370 }
371
372 static NTSTATUS dnsupdate_nameupdate_schedule(struct dnsupdate_service *service);
373
374 /*
375   called every 'dnsupdate:name interval' seconds
376  */
377 static void dnsupdate_nameupdate_handler_te(struct tevent_context *ev, struct tevent_timer *te,
378                                             struct timeval t, void *ptr)
379 {
380         struct dnsupdate_service *service = talloc_get_type(ptr, struct dnsupdate_service);
381
382         dnsupdate_check_names(service);
383         dnsupdate_nameupdate_schedule(service);
384 }
385
386
387 static NTSTATUS dnsupdate_nameupdate_schedule(struct dnsupdate_service *service)
388 {
389         service->nameupdate.te = tevent_add_timer(service->task->event_ctx, service,
390                                                   timeval_current_ofs(service->nameupdate.interval, 0),
391                                                   dnsupdate_nameupdate_handler_te, service);
392         NT_STATUS_HAVE_NO_MEMORY(service->nameupdate.te);
393         return NT_STATUS_OK;
394 }
395
396
397 struct dnsupdate_RODC_state {
398         struct irpc_message *msg;
399         struct dnsupdate_RODC *r;
400         char *tmp_path;
401         char *tmp_path2;
402         int fd;
403 };
404
405 static int dnsupdate_RODC_destructor(struct dnsupdate_RODC_state *st)
406 {
407         if (st->fd != -1) {
408                 close(st->fd);
409         }
410         unlink(st->tmp_path);
411         if (st->tmp_path2 != NULL) {
412                 unlink(st->tmp_path2);
413         }
414         return 0;
415 }
416
417 /*
418   called when the DNS update has completed
419  */
420 static void dnsupdate_RODC_callback(struct tevent_req *req)
421 {
422         struct dnsupdate_RODC_state *st =
423                 tevent_req_callback_data(req,
424                                          struct dnsupdate_RODC_state);
425         int sys_errno;
426         int i, ret;
427
428         ret = samba_runcmd_recv(req, &sys_errno);
429         talloc_free(req);
430         if (ret != 0) {
431                 st->r->out.result = map_nt_error_from_unix_common(sys_errno);
432                 DEBUG(2,(__location__ ": RODC DNS Update failed: %s\n", nt_errstr(st->r->out.result)));
433         } else {
434                 st->r->out.result = NT_STATUS_OK;
435                 DEBUG(3,(__location__ ": RODC DNS Update OK\n"));
436         }
437
438         for (i=0; i<st->r->in.dns_names->count; i++) {
439                 st->r->out.dns_names->names[i].status = NT_STATUS_V(st->r->out.result);
440         }
441
442         irpc_send_reply(st->msg, NT_STATUS_OK);
443 }
444
445
446 /**
447  * Called when we get a RODC DNS update request from the netlogon
448  * rpc server
449  */
450 static NTSTATUS dnsupdate_dnsupdate_RODC(struct irpc_message *msg,
451                                          struct dnsupdate_RODC *r)
452 {
453         struct dnsupdate_service *s = talloc_get_type(msg->private_data,
454                                                       struct dnsupdate_service);
455         const char * const *dns_update_command = lpcfg_dns_update_command(s->task->lp_ctx);
456         struct dnsupdate_RODC_state *st;
457         struct tevent_req *req;
458         int i, ret;
459         struct GUID ntds_guid;
460         const char *site, *dnsdomain, *dnsforest, *ntdsguid;
461         const char *hostname = NULL;
462         struct ldb_dn *sid_dn;
463         const char *attrs[] = { "dNSHostName", NULL };
464         struct ldb_result *res;
465
466         st = talloc_zero(msg, struct dnsupdate_RODC_state);
467         if (!st) {
468                 r->out.result = NT_STATUS_NO_MEMORY;
469                 return NT_STATUS_OK;
470         }
471
472         st->r = r;
473         st->msg = msg;
474
475         st->tmp_path = smbd_tmp_path(st, s->task->lp_ctx, "rodcdns.XXXXXX");
476         if (!st->tmp_path) {
477                 talloc_free(st);
478                 r->out.result = NT_STATUS_NO_MEMORY;
479                 return NT_STATUS_OK;
480         }
481
482         st->fd = mkstemp(st->tmp_path);
483         if (st->fd == -1) {
484                 DEBUG(0,("Unable to create a temporary file for RODC dnsupdate\n"));
485                 talloc_free(st);
486                 r->out.result = NT_STATUS_INTERNAL_DB_CORRUPTION;
487                 return NT_STATUS_OK;
488         }
489
490         talloc_set_destructor(st, dnsupdate_RODC_destructor);
491
492         st->tmp_path2 = talloc_asprintf(st, "%s.cache", st->tmp_path);
493         if (!st->tmp_path2) {
494                 talloc_free(st);
495                 r->out.result = NT_STATUS_NO_MEMORY;
496                 return NT_STATUS_OK;
497         }
498
499         sid_dn = ldb_dn_new_fmt(st, s->samdb, "<SID=%s>", dom_sid_string(st, r->in.dom_sid));
500         if (!sid_dn) {
501                 talloc_free(st);
502                 r->out.result = NT_STATUS_NO_MEMORY;
503                 return NT_STATUS_OK;
504         }
505
506         /* work out the site */
507         ret = samdb_find_site_for_computer(s->samdb, st, sid_dn, &site);
508         if (ret != LDB_SUCCESS) {
509                 DEBUG(2, (__location__ ": Unable to find site for computer %s\n",
510                           ldb_dn_get_linearized(sid_dn)));
511                 talloc_free(st);
512                 r->out.result = NT_STATUS_NO_SUCH_USER;
513                 return NT_STATUS_OK;
514         }
515
516         /* work out the ntdsguid */
517         ret = samdb_find_ntdsguid_for_computer(s->samdb, sid_dn, &ntds_guid);
518         ntdsguid = GUID_string(st, &ntds_guid);
519         if (ret != LDB_SUCCESS || !ntdsguid) {
520                 DEBUG(2, (__location__ ": Unable to find NTDS GUID for computer %s\n",
521                           ldb_dn_get_linearized(sid_dn)));
522                 talloc_free(st);
523                 r->out.result = NT_STATUS_NO_SUCH_USER;
524                 return NT_STATUS_OK;
525         }
526
527
528         /* find dnsdomain and dnsforest */
529         dnsdomain = lpcfg_realm(s->task->lp_ctx);
530         dnsforest = dnsdomain;
531
532         /* find the hostname */
533         ret = dsdb_search_dn(s->samdb, st, &res, sid_dn, attrs, 0);
534         if (ret == LDB_SUCCESS) {
535                 hostname = ldb_msg_find_attr_as_string(res->msgs[0], "dNSHostName", NULL);
536         }
537         if (ret != LDB_SUCCESS || !hostname) {
538                 DEBUG(2, (__location__ ": Unable to find NTDS GUID for computer %s\n",
539                           ldb_dn_get_linearized(sid_dn)));
540                 talloc_free(st);
541                 r->out.result = NT_STATUS_NO_SUCH_USER;
542                 return NT_STATUS_OK;
543         }
544
545
546         for (i=0; i<st->r->in.dns_names->count; i++) {
547                 struct NL_DNS_NAME_INFO *n = &r->in.dns_names->names[i];
548                 switch (n->type) {
549                 case NlDnsLdapAtSite:
550                         dprintf(st->fd, "SRV _ldap._tcp.%s._sites.%s. %s %u\n",
551                                 site, dnsdomain, hostname, n->port);
552                         break;
553                 case NlDnsGcAtSite:
554                         dprintf(st->fd, "SRV _ldap._tcp.%s._sites.gc._msdcs.%s. %s %u\n",
555                                 site, dnsdomain, hostname, n->port);
556                         break;
557                 case NlDnsDsaCname:
558                         dprintf(st->fd, "CNAME %s._msdcs.%s. %s\n",
559                                 ntdsguid, dnsforest, hostname);
560                         break;
561                 case NlDnsKdcAtSite:
562                         dprintf(st->fd, "SRV _kerberos._tcp.%s._sites.dc._msdcs.%s. %s %u\n",
563                                 site, dnsdomain, hostname, n->port);
564                         break;
565                 case NlDnsDcAtSite:
566                         dprintf(st->fd, "SRV _ldap._tcp.%s._sites.dc._msdcs.%s. %s %u\n",
567                                 site, dnsdomain, hostname, n->port);
568                         break;
569                 case NlDnsRfc1510KdcAtSite:
570                         dprintf(st->fd, "SRV _kerberos._tcp.%s._sites.%s. %s %u\n",
571                                 site, dnsdomain, hostname, n->port);
572                         break;
573                 case NlDnsGenericGcAtSite:
574                         dprintf(st->fd, "SRV _gc._tcp.%s._sites.%s. %s %u\n",
575                                 site, dnsforest, hostname, n->port);
576                         break;
577                 }
578         }
579
580         close(st->fd);
581         st->fd = -1;
582
583         DEBUG(3,("Calling RODC DNS name update script %s\n", st->tmp_path));
584         req = samba_runcmd_send(st,
585                                 s->task->event_ctx,
586                                 timeval_current_ofs(20, 0),
587                                 2, 0,
588                                 dns_update_command,
589                                 "--update-list",
590                                 st->tmp_path,
591                                 "--update-cache",
592                                 st->tmp_path2,
593                                 NULL);
594         NT_STATUS_HAVE_NO_MEMORY(req);
595
596         /* setup the callback */
597         tevent_req_set_callback(req, dnsupdate_RODC_callback, st);
598
599         msg->defer_reply = true;
600
601         return NT_STATUS_OK;
602 }
603
604 /*
605   startup the dns update task
606 */
607 static void dnsupdate_task_init(struct task_server *task)
608 {
609         NTSTATUS status;
610         struct dnsupdate_service *service;
611
612         if (lpcfg_server_role(task->lp_ctx) != ROLE_ACTIVE_DIRECTORY_DC) {
613                 /* not useful for non-DC */
614                 return;
615         }
616
617         task_server_set_title(task, "task[dnsupdate]");
618
619         service = talloc_zero(task, struct dnsupdate_service);
620         if (!service) {
621                 task_server_terminate(task, "dnsupdate_task_init: out of memory", true);
622                 return;
623         }
624         service->task           = task;
625         task->private_data      = service;
626
627         service->system_session_info = system_session(service->task->lp_ctx);
628         if (!service->system_session_info) {
629                 task_server_terminate(task,
630                                       "dnsupdate: Failed to obtain server credentials\n",
631                                       true);
632                 return;
633         }
634
635         service->samdb = samdb_connect(service, service->task->event_ctx, task->lp_ctx,
636                                        service->system_session_info, 0);
637         if (!service->samdb) {
638                 task_server_terminate(task, "dnsupdate: Failed to connect to local samdb\n",
639                                       true);
640                 return;
641         }
642
643         service->confupdate.interval    = lpcfg_parm_int(task->lp_ctx, NULL,
644                                                       "dnsupdate", "config interval", 60); /* in seconds */
645
646         service->nameupdate.interval    = lpcfg_parm_int(task->lp_ctx, NULL,
647                                                       "dnsupdate", "name interval", 600); /* in seconds */
648
649         dnsupdate_rebuild(service);
650         status = dnsupdate_confupdate_schedule(service);
651         if (!NT_STATUS_IS_OK(status)) {
652                 task_server_terminate(task, talloc_asprintf(task,
653                                       "dnsupdate: Failed to confupdate schedule: %s\n",
654                                                             nt_errstr(status)), true);
655                 return;
656         }
657
658         dnsupdate_check_names(service);
659         status = dnsupdate_nameupdate_schedule(service);
660         if (!NT_STATUS_IS_OK(status)) {
661                 task_server_terminate(task, talloc_asprintf(task,
662                                       "dnsupdate: Failed to nameupdate schedule: %s\n",
663                                                             nt_errstr(status)), true);
664                 return;
665         }
666
667         irpc_add_name(task->msg_ctx, "dnsupdate");
668
669         IRPC_REGISTER(task->msg_ctx, irpc, DNSUPDATE_RODC,
670                       dnsupdate_dnsupdate_RODC, service);
671
672         /* create the intial file */
673         dnsupdate_rebuild(service);
674
675 }
676
677 /*
678   register ourselves as a available server
679 */
680 NTSTATUS server_service_dnsupdate_init(void)
681 {
682         return register_server_service("dnsupdate", dnsupdate_task_init);
683 }