/* ldb database library Copyright (C) Andrew Tridgell 2005 Copyright (C) Simo Sorce 2006-2008 Copyright (C) Matthias Dieter Wallnöfer 2009 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ /* handle operational attributes */ /* createTimestamp: HIDDEN, searchable, ldaptime, alias for whenCreated modifyTimestamp: HIDDEN, searchable, ldaptime, alias for whenChanged for the above two, we do the search as normal, and if createTimestamp or modifyTimestamp is asked for, then do additional searches for whenCreated and whenChanged and fill in the resulting values we also need to replace these with the whenCreated/whenChanged equivalent in the search expression trees whenCreated: not-HIDDEN, CONSTRUCTED, SEARCHABLE whenChanged: not-HIDDEN, CONSTRUCTED, SEARCHABLE on init we need to setup attribute handlers for these so comparisons are done correctly. The resolution is 1 second. on add we need to add both the above, for current time on modify we need to change whenChanged structuralObjectClass: HIDDEN, CONSTRUCTED, not-searchable. always same as objectclass? for this one we do the search as normal, then if requested ask for objectclass, change the attribute name, and add it primaryGroupToken: HIDDEN, CONSTRUCTED, SEARCHABLE contains the RID of a certain group object attributeTypes: in schema only objectClasses: in schema only matchingRules: in schema only matchingRuleUse: in schema only creatorsName: not supported by w2k3? modifiersName: not supported by w2k3? */ #include "includes.h" #include "ldb_includes.h" #include "ldb_module.h" #include "librpc/gen_ndr/ndr_misc.h" #include "param/param.h" #include "dsdb/samdb/samdb.h" #include "dsdb/samdb/ldb_modules/util.h" #include "auth/auth.h" #include "libcli/security/dom_sid.h" #ifndef ARRAY_SIZE #define ARRAY_SIZE(a) (sizeof(a)/sizeof(a[0])) #endif struct operational_data { struct ldb_dn *aggregate_dn; }; /* construct a canonical name from a message */ static int construct_canonical_name(struct ldb_module *module, struct ldb_message *msg) { char *canonicalName; canonicalName = ldb_dn_canonical_string(msg, msg->dn); if (canonicalName == NULL) { return LDB_ERR_OPERATIONS_ERROR; } return ldb_msg_add_steal_string(msg, "canonicalName", canonicalName); } /* construct a primary group token for groups from a message */ static int construct_primary_group_token(struct ldb_module *module, struct ldb_message *msg) { struct ldb_context *ldb; uint32_t primary_group_token; ldb = ldb_module_get_ctx(module); if (ldb_match_msg_objectclass(msg, "group") == 1) { primary_group_token = samdb_result_rid_from_sid(msg, msg, "objectSid", 0); if (primary_group_token == 0) { return LDB_SUCCESS; } return samdb_msg_add_int(ldb, msg, msg, "primaryGroupToken", primary_group_token); } else { return LDB_SUCCESS; } } /* construct the token groups for SAM objects from a message */ static int construct_token_groups(struct ldb_module *module, struct ldb_message *msg) { struct ldb_context *ldb; const struct dom_sid *sid; ldb = ldb_module_get_ctx(module); sid = samdb_result_dom_sid(msg, msg, "objectSid"); if (sid != NULL) { NTSTATUS status; uint32_t prim_group_rid; struct dom_sid **sids = NULL; unsigned int i, num_sids = 0; int ret; prim_group_rid = samdb_result_uint(msg, "primaryGroupID", 0); if (prim_group_rid != 0) { struct dom_sid *prim_group_sid; prim_group_sid = dom_sid_add_rid(msg, samdb_domain_sid(ldb), prim_group_rid); if (prim_group_sid == NULL) { ldb_oom(ldb); return LDB_ERR_OPERATIONS_ERROR; } /* onlyChilds = false, we want to consider also the * "primaryGroupID" for membership */ status = authsam_expand_nested_groups(ldb, prim_group_sid, false, msg, &sids, &num_sids); if (NT_STATUS_EQUAL(status, NT_STATUS_NO_MEMORY)) { ldb_oom(ldb); return LDB_ERR_OPERATIONS_ERROR; } if (!NT_STATUS_IS_OK(status)) { return LDB_ERR_OPERATIONS_ERROR; } for (i = 0; i < num_sids; i++) { ret = samdb_msg_add_dom_sid(ldb, msg, msg, "tokenGroups", sids[i]); if (ret != LDB_SUCCESS) { talloc_free(sids); return ret; } } talloc_free(sids); } sids = NULL; num_sids = 0; /* onlyChils = true, we don't want to have the SAM object itself * in the result */ status = authsam_expand_nested_groups(ldb, sid, true, msg, &sids, &num_sids); if (NT_STATUS_EQUAL(status, NT_STATUS_NO_MEMORY)) { ldb_oom(ldb); return LDB_ERR_OPERATIONS_ERROR; } if (!NT_STATUS_IS_OK(status)) { return LDB_ERR_OPERATIONS_ERROR; } for (i = 0; i < num_sids; i++) { ret = samdb_msg_add_dom_sid(ldb, msg, msg, "tokenGroups", sids[i]); if (ret != LDB_SUCCESS) { talloc_free(sids); return ret; } } talloc_free(sids); } return LDB_SUCCESS; } /* construct the parent GUID for an entry from a message */ static int construct_parent_guid(struct ldb_module *module, struct ldb_message *msg) { struct ldb_result *res; const struct ldb_val *parent_guid; const char *attrs[] = { "objectGUID", NULL }; int ret; struct ldb_val v; /* TODO: In the future, this needs to honour the partition boundaries */ struct ldb_dn *parent_dn = ldb_dn_get_parent(msg, msg->dn); if (parent_dn == NULL) { DEBUG(4,(__location__ ": Failed to find parent for dn %s\n", ldb_dn_get_linearized(msg->dn))); return LDB_SUCCESS; } ret = dsdb_module_search_dn(module, msg, &res, parent_dn, attrs, DSDB_SEARCH_SHOW_DELETED); talloc_free(parent_dn); /* if there is no parentGUID for this object, then return */ if (ret == LDB_ERR_NO_SUCH_OBJECT) { DEBUG(4,(__location__ ": Parent dn for %s does not exist \n", ldb_dn_get_linearized(msg->dn))); return LDB_SUCCESS; } else if (ret != LDB_SUCCESS) { return ret; } parent_guid = ldb_msg_find_ldb_val(res->msgs[0], "objectGUID"); if (!parent_guid) { talloc_free(res); return LDB_SUCCESS; } v = data_blob_dup_talloc(res, parent_guid); if (!v.data) { talloc_free(res); return LDB_ERR_OPERATIONS_ERROR; } ret = ldb_msg_add_steal_value(msg, "parentGUID", &v); talloc_free(res); return ret; } /* construct a subSchemaSubEntry */ static int construct_subschema_subentry(struct ldb_module *module, struct ldb_message *msg) { struct operational_data *data = talloc_get_type(ldb_module_get_private(module), struct operational_data); char *subSchemaSubEntry; /* We may be being called before the init function has finished */ if (!data) { return LDB_SUCCESS; } /* Try and set this value up, if possible. Don't worry if it * fails, we may not have the DB set up yet, and it's not * really vital anyway */ if (!data->aggregate_dn) { struct ldb_context *ldb = ldb_module_get_ctx(module); data->aggregate_dn = samdb_aggregate_schema_dn(ldb, data); } if (data->aggregate_dn) { subSchemaSubEntry = ldb_dn_alloc_linearized(msg, data->aggregate_dn); return ldb_msg_add_steal_string(msg, "subSchemaSubEntry", subSchemaSubEntry); } return LDB_SUCCESS; } /* a list of attribute names that should be substituted in the parse tree before the search is done */ static const struct { const char *attr; const char *replace; } parse_tree_sub[] = { { "createTimestamp", "whenCreated" }, { "modifyTimestamp", "whenChanged" } }; /* a list of attribute names that are hidden, but can be searched for using another (non-hidden) name to produce the correct result */ static const struct { const char *attr; const char *replace; const char *extra_attr; int (*constructor)(struct ldb_module *, struct ldb_message *); } search_sub[] = { { "createTimestamp", "whenCreated", NULL , NULL }, { "modifyTimestamp", "whenChanged", NULL , NULL }, { "structuralObjectClass", "objectClass", NULL , NULL }, { "canonicalName", "distinguishedName", NULL , construct_canonical_name }, { "primaryGroupToken", "objectClass", "objectSid", construct_primary_group_token }, { "tokenGroups", "objectSid", "primaryGroupID", construct_token_groups }, { "parentGUID", NULL, NULL, construct_parent_guid }, { "subSchemaSubEntry", NULL, NULL, construct_subschema_subentry } }; enum op_remove { OPERATIONAL_REMOVE_ALWAYS, /* remove always */ OPERATIONAL_REMOVE_UNASKED,/* remove if not requested */ OPERATIONAL_SD_FLAGS /* show if SD_FLAGS_OID set, or asked for */ }; /* a list of attributes that may need to be removed from the underlying db return */ static const struct { const char *attr; enum op_remove op; } operational_remove[] = { { "nTSecurityDescriptor", OPERATIONAL_SD_FLAGS }, { "parentGUID", OPERATIONAL_REMOVE_ALWAYS }, { "replPropertyMetaData", OPERATIONAL_REMOVE_UNASKED }, { "unicodePwd", OPERATIONAL_REMOVE_UNASKED }, { "dBCSPwd", OPERATIONAL_REMOVE_UNASKED }, { "ntPwdHistory", OPERATIONAL_REMOVE_UNASKED }, { "lmPwdHistory", OPERATIONAL_REMOVE_UNASKED }, { "supplementalCredentials", OPERATIONAL_REMOVE_UNASKED } }; /* post process a search result record. For any search_sub[] attributes that were asked for, we need to call the appropriate copy routine to copy the result into the message, then remove any attributes that we added to the search but were not asked for by the user */ static int operational_search_post_process(struct ldb_module *module, struct ldb_message *msg, const char * const *attrs, bool sd_flags_set) { struct ldb_context *ldb; unsigned int i, a = 0; bool constructed_attributes = false; ldb = ldb_module_get_ctx(module); /* removed any attrs that should not be shown to the user */ for (i=0; icontext, struct operational_context); if (!ares) { return ldb_module_done(ac->req, NULL, NULL, LDB_ERR_OPERATIONS_ERROR); } if (ares->error != LDB_SUCCESS) { return ldb_module_done(ac->req, ares->controls, ares->response, ares->error); } switch (ares->type) { case LDB_REPLY_ENTRY: /* for each record returned post-process to add any derived attributes that have been asked for */ ret = operational_search_post_process(ac->module, ares->message, ac->attrs, ac->sd_flags_set); if (ret != 0) { return ldb_module_done(ac->req, NULL, NULL, LDB_ERR_OPERATIONS_ERROR); } return ldb_module_send_entry(ac->req, ares->message, ares->controls); case LDB_REPLY_REFERRAL: return ldb_module_send_referral(ac->req, ares->referral); case LDB_REPLY_DONE: return ldb_module_done(ac->req, ares->controls, ares->response, LDB_SUCCESS); } talloc_free(ares); return LDB_SUCCESS; } static int operational_search(struct ldb_module *module, struct ldb_request *req) { struct ldb_context *ldb; struct operational_context *ac; struct ldb_request *down_req; const char **search_attrs = NULL; unsigned int i, a; int ret; /* There are no operational attributes on special DNs */ if (ldb_dn_is_special(req->op.search.base)) { return ldb_next_request(module, req); } ldb = ldb_module_get_ctx(module); ac = talloc(req, struct operational_context); if (ac == NULL) { return LDB_ERR_OPERATIONS_ERROR; } ac->module = module; ac->req = req; ac->attrs = req->op.search.attrs; /* FIXME: We must copy the tree and keep the original * unmodified. SSS */ /* replace any attributes in the parse tree that are searchable, but are stored using a different name in the backend */ for (i=0;iop.search.tree, parse_tree_sub[i].attr, parse_tree_sub[i].replace); } /* in the list of attributes we are looking for, rename any attributes to the alias for any hidden attributes that can be fetched directly using non-hidden names */ for (a=0;ac->attrs && ac->attrs[a];a++) { for (i=0;iattrs[a], search_sub[i].attr) == 0 && search_sub[i].replace) { if (search_sub[i].extra_attr) { const char **search_attrs2; /* Only adds to the end of the list */ search_attrs2 = ldb_attr_list_copy_add(req, search_attrs ? search_attrs : ac->attrs, search_sub[i].extra_attr); if (search_attrs2 == NULL) { return LDB_ERR_OPERATIONS_ERROR; } /* may be NULL, talloc_free() doesn't mind */ talloc_free(search_attrs); search_attrs = search_attrs2; } if (!search_attrs) { search_attrs = ldb_attr_list_copy(req, ac->attrs); if (search_attrs == NULL) { return LDB_ERR_OPERATIONS_ERROR; } } /* Despite the ldb_attr_list_copy_add, this is safe as that fn only adds to the end */ search_attrs[a] = search_sub[i].replace; } } } /* remember if the SD_FLAGS_OID was set */ ac->sd_flags_set = (ldb_request_get_control(req, LDB_CONTROL_SD_FLAGS_OID) != NULL); ret = ldb_build_search_req_ex(&down_req, ldb, ac, req->op.search.base, req->op.search.scope, req->op.search.tree, /* use new set of attrs if any */ search_attrs == NULL?req->op.search.attrs:search_attrs, req->controls, ac, operational_callback, req); if (ret != LDB_SUCCESS) { return LDB_ERR_OPERATIONS_ERROR; } /* perform the search */ return ldb_next_request(module, down_req); } static int operational_init(struct ldb_module *ctx) { struct operational_data *data; int ret = ldb_next_init(ctx); if (ret != LDB_SUCCESS) { return ret; } data = talloc_zero(ctx, struct operational_data); if (!data) { ldb_module_oom(ctx); return LDB_ERR_OPERATIONS_ERROR; } ldb_module_set_private(ctx, data); return LDB_SUCCESS; } const struct ldb_module_ops ldb_operational_module_ops = { .name = "operational", .search = operational_search, .init_context = operational_init };