/* SSSD IPA Provider Initialization functions Authors: Simo Sorce Copyright (C) 2009 Red Hat This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include #include #include #include #include "providers/ipa/ipa_common.h" #include "providers/krb5/krb5_auth.h" struct ipa_options *ipa_options = NULL; /* Id Handler */ struct bet_ops ipa_id_ops = { .handler = sdap_account_info_handler, .finalize = NULL }; struct bet_ops ipa_auth_ops = { .handler = krb5_pam_handler, .finalize = NULL, }; struct bet_ops ipa_chpass_ops = { .handler = krb5_pam_handler, .finalize = NULL, }; int sssm_ipa_init(struct be_ctx *bectx, struct bet_ops **ops, void **pvt_data) { struct sdap_id_ctx *ctx; int ret; if (!ipa_options) { ipa_get_options(bectx, bectx->cdb, bectx->conf_path, bectx->domain, &ipa_options); } if (!ipa_options) { return ENOMEM; } ctx = talloc_zero(bectx, struct sdap_id_ctx); if (!ctx) { return ENOMEM; } ctx->be = bectx; ret = ipa_get_id_options(ctx, bectx->cdb, bectx->conf_path, ipa_options, &ctx->opts); if (ret != EOK) { goto done; } ret = setup_tls_config(ctx->opts->basic); if (ret != EOK) { DEBUG(1, ("setup_tls_config failed [%d][%s].\n", ret, strerror(ret))); goto done; } ret = sdap_id_setup_tasks(ctx); if (ret != EOK) { goto done; } *ops = &ipa_id_ops; *pvt_data = ctx; ret = EOK; done: if (ret != EOK) { talloc_free(ctx); } return ret; } int sssm_ipa_auth_init(struct be_ctx *bectx, struct bet_ops **ops, void **pvt_data) { struct krb5_ctx *ctx = NULL; int ret; struct tevent_signal *sige; unsigned v; FILE *debug_filep; if (!ipa_options) { ipa_get_options(bectx, bectx->cdb, bectx->conf_path, bectx->domain, &ipa_options); } if (!ipa_options) { return ENOMEM; } ctx = talloc_zero(bectx, struct krb5_ctx); if (!ctx) { return ENOMEM; } ret = ipa_get_auth_options(ctx, bectx->cdb, bectx->conf_path, ipa_options, &ctx->opts); if (ret != EOK) { goto done; } ret = check_and_export_options(ctx->opts, bectx->domain); if (ret != EOK) { DEBUG(1, ("check_and_export_opts failed.\n")); goto done; } sige = tevent_add_signal(bectx->ev, ctx, SIGCHLD, SA_SIGINFO, krb5_child_sig_handler, NULL); if (sige == NULL) { DEBUG(1, ("tevent_add_signal failed.\n")); ret = ENOMEM; goto done; } if (debug_to_file != 0) { ret = open_debug_file_ex("krb5_child", &debug_filep); if (ret != EOK) { DEBUG(0, ("Error setting up logging (%d) [%s]\n", ret, strerror(ret))); goto done; } ctx->child_debug_fd = fileno(debug_filep); if (ctx->child_debug_fd == -1) { DEBUG(0, ("fileno failed [%d][%s]\n", errno, strerror(errno))); ret = errno; goto done; } v = fcntl(ctx->child_debug_fd, F_GETFD, 0); fcntl(ctx->child_debug_fd, F_SETFD, v & ~FD_CLOEXEC); } *ops = &ipa_auth_ops; *pvt_data = ctx; ret = EOK; done: if (ret != EOK) { talloc_free(ctx); } return ret; } int sssm_ipa_chpass_init(struct be_ctx *bectx, struct bet_ops **ops, void **pvt_auth_data) { return sssm_ipa_auth_init(bectx, ops, pvt_auth_data); }