#include "librpc/gen_ndr/auth.h"
#include "../auth/auth_sam_reply.h"
#include "auth.h"
-#include "ntdomain.h"
+#include "rpc_server/rpc_pipes.h"
#include "../lib/tsocket/tsocket.h"
#include "../lib/util/tevent_ntstatus.h"
#include "rpc_contexts.h"
+#include "rpc_server/rpc_config.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_RPC_SRV
-static struct pipes_struct *InternalPipes;
-
-/* TODO
- * the following prototypes are declared here to avoid
- * code being moved about too much for a patch to be
- * disrupted / less obvious.
- *
- * these functions, and associated functions that they
- * call, should be moved behind a .so module-loading
- * system _anyway_. so that's the next step...
- */
-
-/****************************************************************************
- Internal Pipe iterator functions.
-****************************************************************************/
-
-struct pipes_struct *get_first_internal_pipe(void)
-{
- return InternalPipes;
-}
-
-struct pipes_struct *get_next_internal_pipe(struct pipes_struct *p)
-{
- return p->next;
-}
-
-static void free_pipe_rpc_context_internal( PIPE_RPC_FNS *list )
-{
- PIPE_RPC_FNS *tmp = list;
- PIPE_RPC_FNS *tmp2;
-
- while (tmp) {
- tmp2 = tmp->next;
- SAFE_FREE(tmp);
- tmp = tmp2;
- }
-
- return;
-}
-
-bool check_open_pipes(void)
-{
- struct pipes_struct *p;
-
- for (p = InternalPipes; p != NULL; p = p->next) {
- if (num_pipe_handles(p) != 0) {
- return true;
- }
- }
- return false;
-}
-
-/****************************************************************************
- Close an rpc pipe.
-****************************************************************************/
-
-int close_internal_rpc_pipe_hnd(struct pipes_struct *p)
-{
- if (!p) {
- DEBUG(0,("Invalid pipe in close_internal_rpc_pipe_hnd\n"));
- return False;
- }
-
- TALLOC_FREE(p->auth.auth_ctx);
-
- /* Free the handles database. */
- close_policy_by_pipe(p);
-
- free_pipe_rpc_context_internal( p->contexts );
-
- DLIST_REMOVE(InternalPipes, p);
-
- ZERO_STRUCTP(p);
-
- return 0;
-}
-
/****************************************************************************
Make an internal namedpipes structure
****************************************************************************/
struct pipes_struct *make_internal_rpc_pipe_p(TALLOC_CTX *mem_ctx,
const struct ndr_syntax_id *syntax,
const struct tsocket_address *remote_address,
- const struct auth3_session_info *session_info,
+ const struct auth_session_info *session_info,
struct messaging_context *msg_ctx)
{
struct pipes_struct *p;
struct pipe_rpc_fns *context_fns;
+ const char *pipe_name;
+ int ret;
- DEBUG(4,("Create pipe requested %s\n",
- get_pipe_name_from_syntax(talloc_tos(), syntax)));
+ pipe_name = get_pipe_name_from_syntax(talloc_tos(), syntax);
- p = talloc_zero(mem_ctx, struct pipes_struct);
+ DEBUG(4,("Create pipe requested %s\n", pipe_name));
- if (!p) {
+ ret = make_base_pipes_struct(mem_ctx, msg_ctx, pipe_name,
+ NCALRPC, RPC_LITTLE_ENDIAN, false,
+ remote_address, NULL, &p);
+ if (ret) {
DEBUG(0,("ERROR! no memory for pipes_struct!\n"));
return NULL;
}
- p->mem_ctx = talloc_named(p, 0, "pipe %s %p",
- get_pipe_name_from_syntax(talloc_tos(),
- syntax), p);
- if (p->mem_ctx == NULL) {
- DEBUG(0,("open_rpc_pipe_p: talloc_init failed.\n"));
- TALLOC_FREE(p);
- return NULL;
- }
-
if (!init_pipe_handles(p, syntax)) {
DEBUG(0,("open_rpc_pipe_p: init_pipe_handles failed.\n"));
TALLOC_FREE(p);
return NULL;
}
- p->msg_ctx = msg_ctx;
-
- DLIST_ADD(InternalPipes, p);
-
- p->remote_address = tsocket_address_copy(remote_address, p);
- if (p->remote_address == NULL) {
- return false;
- }
-
- p->endian = RPC_LITTLE_ENDIAN;
-
- p->transport = NCALRPC;
-
- context_fns = SMB_MALLOC_P(struct pipe_rpc_fns);
+ context_fns = talloc(p, struct pipe_rpc_fns);
if (context_fns == NULL) {
- DEBUG(0,("malloc() failed!\n"));
- return False;
+ DEBUG(0,("talloc() failed!\n"));
+ TALLOC_FREE(p);
+ return NULL;
}
context_fns->next = context_fns->prev = NULL;
/* add to the list of open contexts */
DLIST_ADD(p->contexts, context_fns);
- DEBUG(4,("Created internal pipe %s\n",
- get_pipe_name_from_syntax(talloc_tos(), syntax)));
-
- talloc_set_destructor(p, close_internal_rpc_pipe_hnd);
+ DEBUG(4,("Created internal pipe %s\n", pipe_name));
return p;
}
-static NTSTATUS rpcint_dispatch(struct pipes_struct *p,
- TALLOC_CTX *mem_ctx,
- uint32_t opnum,
- const DATA_BLOB *in_data,
- DATA_BLOB *out_data)
+struct rpcint_dispatch_state {
+ const struct api_struct *cmd;
+ DATA_BLOB out_data;
+ struct pipes_struct *p;
+};
+static void rpcint_dispatch_done(struct tevent_req *subreq);
+
+static struct tevent_req *rpcint_dispatch_send(struct tevent_context *ev,
+ TALLOC_CTX *mem_ctx,
+ struct pipes_struct *p,
+ uint32_t opnum,
+ const DATA_BLOB *in_data)
{
struct pipe_rpc_fns *fns = find_pipe_fns_by_context(p->contexts, 0);
uint32_t num_cmds = fns->n_cmds;
const struct api_struct *cmds = fns->cmds;
uint32_t i;
- bool ok;
+ struct rpcint_dispatch_state *state;
+ struct tevent_req *subreq;
+ struct tevent_req *req = tevent_req_create(mem_ctx, &state,
+ struct rpcint_dispatch_state);
+ if (req == NULL) {
+ return NULL;
+ }
+ state->p = p;
/* set opnum */
p->opnum = opnum;
for (i = 0; i < num_cmds; i++) {
- if (cmds[i].opnum == opnum && cmds[i].fn != NULL) {
+ if (cmds[i].opnum == opnum && cmds[i].fn_send != NULL) {
break;
}
}
if (i == num_cmds) {
- return NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE;
+ tevent_req_nterror(req, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE);
+ return tevent_req_post(req, ev);
}
+ state->cmd = &cmds[i];
p->in_data.data = *in_data;
p->out_data.rdata = data_blob_null;
- ok = cmds[i].fn(p);
+ subreq = state->cmd->fn_send(ev, state, p);
+ if (tevent_req_nomem(subreq, req)) {
+ return tevent_req_post(req, ev);
+ }
+ tevent_req_set_callback(subreq, rpcint_dispatch_done, req);
+ return req;
+}
+
+static void rpcint_dispatch_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct rpcint_dispatch_state *state
+ = tevent_req_data(req, struct rpcint_dispatch_state);
+ struct pipes_struct *p = state->p;
+ bool ok;
+
+ ok = state->cmd->fn_recv(subreq);
p->in_data.data = data_blob_null;
if (!ok) {
data_blob_free(&p->out_data.rdata);
talloc_free_children(p->mem_ctx);
- return NT_STATUS_RPC_CALL_FAILED;
+ tevent_req_nterror(req, NT_STATUS_RPC_CALL_FAILED);
+ return;
}
if (p->fault_state) {
- p->fault_state = false;
+ NTSTATUS status = NT_STATUS(p->fault_state);
+ p->fault_state = 0;
data_blob_free(&p->out_data.rdata);
talloc_free_children(p->mem_ctx);
- return NT_STATUS_RPC_CALL_FAILED;
+ tevent_req_nterror(req, status);
+ return;
}
- if (p->bad_handle_fault_state) {
- p->bad_handle_fault_state = false;
- data_blob_free(&p->out_data.rdata);
- talloc_free_children(p->mem_ctx);
- return NT_STATUS_RPC_SS_CONTEXT_MISMATCH;
- }
+ state->out_data = p->out_data.rdata;
+ talloc_steal(state, state->out_data.data);
+ p->out_data.rdata = data_blob_null;
- if (p->rng_fault_state) {
- p->rng_fault_state = false;
- data_blob_free(&p->out_data.rdata);
- talloc_free_children(p->mem_ctx);
- return NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE;
+ talloc_free_children(p->mem_ctx);
+ tevent_req_done(req);
+}
+
+static NTSTATUS rpcint_dispatch_recv(struct tevent_req *req,
+ TALLOC_CTX *mem_ctx,
+ DATA_BLOB *out_data)
+{
+ struct rpcint_dispatch_state *state
+ = tevent_req_data(req, struct rpcint_dispatch_state);
+ NTSTATUS status;
+
+ if (tevent_req_is_nterror(req, &status)) {
+ tevent_req_received(req);
+ return status;
}
- *out_data = p->out_data.rdata;
+ *out_data = state->out_data;
talloc_steal(mem_ctx, out_data->data);
- p->out_data.rdata = data_blob_null;
-
- talloc_free_children(p->mem_ctx);
+ tevent_req_received(req);
return NT_STATUS_OK;
}
DATA_BLOB out_data;
uint32_t out_flags;
};
+static void rpcint_bh_raw_call_done(struct tevent_req *subreq);
static struct tevent_req *rpcint_bh_raw_call_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
dcerpc_binding_handle_data(h,
struct rpcint_bh_state);
struct tevent_req *req;
+ struct tevent_req *subreq;
struct rpcint_bh_raw_call_state *state;
bool ok;
- NTSTATUS status;
req = tevent_req_create(mem_ctx, &state,
struct rpcint_bh_raw_call_state);
ok = rpcint_bh_is_connected(h);
if (!ok) {
- tevent_req_nterror(req, NT_STATUS_INVALID_CONNECTION);
+ tevent_req_nterror(req, NT_STATUS_CONNECTION_DISCONNECTED);
return tevent_req_post(req, ev);
}
- /* TODO: allow async */
- status = rpcint_dispatch(hs->p, state, opnum,
- &state->in_data,
- &state->out_data);
- if (!NT_STATUS_IS_OK(status)) {
- tevent_req_nterror(req, status);
+ subreq = rpcint_dispatch_send(ev, state, hs->p, opnum,
+ &state->in_data);
+ if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
}
+ tevent_req_set_callback(subreq, rpcint_bh_raw_call_done, req);
+
+ return req;
+}
+
+static void rpcint_bh_raw_call_done(struct tevent_req *subreq)
+{
+ struct tevent_req *req = tevent_req_callback_data(subreq,
+ struct tevent_req);
+ struct rpcint_bh_raw_call_state *state
+ = tevent_req_data(req, struct rpcint_bh_raw_call_state);
+ NTSTATUS status;
+ status = rpcint_dispatch_recv(subreq, state,
+ &state->out_data);
+ if (!NT_STATUS_IS_OK(status)) {
+ tevent_req_nterror(req, status);
+ return;
+ }
tevent_req_done(req);
- return tevent_req_post(req, ev);
}
static NTSTATUS rpcint_bh_raw_call_recv(struct tevent_req *req,
ok = rpcint_bh_is_connected(h);
if (!ok) {
- tevent_req_nterror(req, NT_STATUS_INVALID_CONNECTION);
+ tevent_req_nterror(req, NT_STATUS_CONNECTION_DISCONNECTED);
return tevent_req_post(req, ev);
}
const struct ndr_syntax_id *abstract_syntax,
const struct ndr_interface_table *ndr_table,
const struct tsocket_address *remote_address,
- const struct auth3_session_info *session_info,
+ const struct auth_session_info *session_info,
struct messaging_context *msg_ctx,
struct dcerpc_binding_handle **binding_handle)
{
NTSTATUS rpcint_binding_handle(TALLOC_CTX *mem_ctx,
const struct ndr_interface_table *ndr_table,
const struct tsocket_address *remote_address,
- const struct auth3_session_info *session_info,
+ const struct auth_session_info *session_info,
struct messaging_context *msg_ctx,
struct dcerpc_binding_handle **binding_handle)
{
* @return NT_STATUS_OK on success, a corresponding NT status if an
* error occured.
*/
-static NTSTATUS rpc_pipe_open_internal(TALLOC_CTX *mem_ctx,
+NTSTATUS rpc_pipe_open_internal(TALLOC_CTX *mem_ctx,
const struct ndr_syntax_id *abstract_syntax,
- const struct auth3_session_info *session_info,
+ const struct auth_session_info *session_info,
const struct tsocket_address *remote_address,
struct messaging_context *msg_ctx,
struct rpc_pipe_client **presult)
}
result->abstract_syntax = *abstract_syntax;
- result->transfer_syntax = ndr_transfer_syntax;
+ result->transfer_syntax = ndr_transfer_syntax_ndr;
if (remote_address == NULL) {
struct tsocket_address *local;
const char *pipe_name,
const struct tsocket_address *local_address,
const struct tsocket_address *remote_address,
- const struct auth3_session_info *session_info)
+ const struct auth_session_info *session_info)
{
struct np_proxy_state *result;
char *socket_np_dir;
struct tevent_context *ev;
struct tevent_req *subreq;
struct auth_session_info_transport *session_info_t;
- struct auth_session_info *session_info_npa;
- struct auth_user_info_dc *user_info_dc;
- union netr_Validation val;
- NTSTATUS status;
bool ok;
int ret;
int sys_errno;
goto fail;
}
- session_info_npa = talloc_zero(talloc_tos(), struct auth_session_info);
- if (session_info_npa == NULL) {
+ session_info_t = talloc_zero(talloc_tos(), struct auth_session_info_transport);
+ if (session_info_t == NULL) {
DEBUG(0, ("talloc failed\n"));
goto fail;
}
- /* Send the named_pipe_auth server the user's full token */
- session_info_npa->security_token = session_info->security_token;
- session_info_npa->session_key = session_info->session_key;
- session_info_npa->unix_token = session_info->unix_token;
- session_info_npa->unix_info = session_info->unix_info;
-
- val.sam3 = session_info->info3;
-
- /* Convert into something we can build a struct
- * auth_session_info from. Most of the work here
- * will be to convert the SIDS, which we will then ignore, but
- * this is the easier way to handle it */
- status = make_user_info_dc_netlogon_validation(talloc_tos(), "", 3, &val, &user_info_dc);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(0, ("conversion of info3 into user_info_dc failed!\n"));
+ session_info_t->session_info = copy_session_info(session_info_t,
+ session_info);
+ if (session_info_t->session_info == NULL) {
+ DEBUG(0, ("copy_session_info failed\n"));
goto fail;
}
- session_info_npa->info = talloc_move(session_info_npa, &user_info_dc->info);
- talloc_free(user_info_dc);
-
- session_info_t = talloc_zero(talloc_tos(), struct auth_session_info_transport);
- if (session_info_npa == NULL) {
- DEBUG(0, ("talloc failed\n"));
- goto fail;
- }
-
- session_info_t->session_info = talloc_steal(session_info_t, session_info_npa);
-
become_root();
subreq = tstream_npa_connect_send(talloc_tos(), ev,
socket_np_dir,
&result->allocation_size);
TALLOC_FREE(subreq);
if (ret != 0) {
- DEBUG(0, ("tstream_npa_connect_recv to %s for pipe %s and "
+ int l = 1;
+ if (errno == ENOENT) {
+ l = 2;
+ }
+ DEBUG(l, ("tstream_npa_connect_recv to %s for pipe %s and "
"user %s\\%s failed: %s\n",
socket_np_dir, pipe_name, session_info_t->session_info->info->domain_name,
session_info_t->session_info->info->account_name,
static NTSTATUS rpc_pipe_open_external(TALLOC_CTX *mem_ctx,
const char *pipe_name,
const struct ndr_syntax_id *abstract_syntax,
- const struct auth3_session_info *session_info,
+ const struct auth_session_info *session_info,
struct rpc_pipe_client **_result)
{
struct tsocket_address *local, *remote;
}
result->abstract_syntax = *abstract_syntax;
- result->transfer_syntax = ndr_transfer_syntax;
+ result->transfer_syntax = ndr_transfer_syntax_ndr;
result->desthost = get_myname(result);
result->srv_name_slash = talloc_asprintf_strupper_m(
NTSTATUS rpc_pipe_open_interface(TALLOC_CTX *mem_ctx,
const struct ndr_syntax_id *syntax,
- const struct auth3_session_info *session_info,
+ const struct auth_session_info *session_info,
const struct tsocket_address *remote_address,
struct messaging_context *msg_ctx,
struct rpc_pipe_client **cli_pipe)
{
struct rpc_pipe_client *cli = NULL;
- const char *server_type;
+ enum rpc_service_mode_e pipe_mode;
const char *pipe_name;
NTSTATUS status;
TALLOC_CTX *tmp_ctx;
DEBUG(5, ("Connecting to %s pipe.\n", pipe_name));
- server_type = lp_parm_const_string(GLOBAL_SECTION_SNUM,
- "rpc_server", pipe_name,
- "embedded");
+ pipe_mode = rpc_service_mode(pipe_name);
- if (strcasecmp_m(server_type, "embedded") == 0) {
+ switch (pipe_mode) {
+ case RPC_SERVICE_MODE_EMBEDDED:
status = rpc_pipe_open_internal(tmp_ctx,
syntax, session_info,
remote_address, msg_ctx,
if (!NT_STATUS_IS_OK(status)) {
goto done;
}
- } else if (strcasecmp_m(server_type, "daemon") == 0 ||
- strcasecmp_m(server_type, "external") == 0) {
+ break;
+ case RPC_SERVICE_MODE_EXTERNAL:
/* It would be nice to just use rpc_pipe_open_ncalrpc() but
* for now we need to use the special proxy setup to connect
* to spoolssd. */
if (!NT_STATUS_IS_OK(status)) {
goto done;
}
- } else {
+ break;
+ case RPC_SERVICE_MODE_DISABLED:
status = NT_STATUS_NOT_IMPLEMENTED;
- DEBUG(0, ("Wrong servertype specified in config file: %s",
- nt_errstr(status)));
+ DEBUG(0, ("Service pipe %s is disabled in config file: %s",
+ pipe_name, nt_errstr(status)));
goto done;
}