passdb/pdb_wbc_sam.c and auth/auth_wbc.c used anywhere?
Volker Lendecke
vl at samba.org
Tue Jan 3 07:23:35 UTC 2017
On Tue, Jan 03, 2017 at 01:10:15PM +1300, Andrew Bartlett wrote:
> On Fri, 2016-12-30 at 12:42 +0100, Volker Lendecke wrote:
> > Hi!
> >
> > Are those two used at all? If so, what is the exact use case?
> >
> > Thanks,
>
> auth_wbc diverged from auth_winbind via this commit:
>
> commit c383022f89a34b83039502cc58178498cc06370e
> Author: Dan Sledz <dan.sledz at isilon.com>
> Date: Fri Feb 13 12:24:22 2009 -0800
>
> Introduce a new authentication backend auth_onefs_wb
>
> This new backend is custom tailored to onefs' unique requirements:
> 1) No fallback logic
> 2) Does not validate the domain of the user
> 3) Handles unencrypted passwords
>
> I don't thin OneFS ever made it to Samba 4.x, this links says they are
> on Likewise: https://community.emc.com/message/745769#745769
Attached.
Review?
Thanks, Volker
-------------- next part --------------
>From 45a8a68d61f1619e2153b6eddec4100852be2a87 Mon Sep 17 00:00:00 2001
From: Volker Lendecke <vl at samba.org>
Date: Tue, 3 Jan 2017 07:04:59 +0000
Subject: [PATCH 1/2] auth: Remove auth_wbc
It seems that this was only used in OneFS. The filesystem parts were
removed in 2012 with 70be41c772d.
Signed-off-by: Volker Lendecke <vl at samba.org>
---
source3/auth/auth_wbc.c | 199 ---------------------------------------------
source3/auth/wscript_build | 8 --
source3/wscript | 2 +-
3 files changed, 1 insertion(+), 208 deletions(-)
delete mode 100644 source3/auth/auth_wbc.c
diff --git a/source3/auth/auth_wbc.c b/source3/auth/auth_wbc.c
deleted file mode 100644
index 1b70042d909..00000000000
--- a/source3/auth/auth_wbc.c
+++ /dev/null
@@ -1,199 +0,0 @@
-/*
- Unix SMB/CIFS implementation.
-
- Winbind client authentication mechanism designed to defer all
- authentication to the winbind daemon.
-
- Copyright (C) Tim Potter 2000
- Copyright (C) Andrew Bartlett 2001 - 2002
- Copyright (C) Dan Sledz 2009
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
-*/
-
-/* This auth module is very similar to auth_winbind with 3 distinct
- * differences.
- *
- * 1) Does not fallback to another auth module if winbindd is unavailable
- * 2) Does not validate the domain of the user
- * 3) Handles unencrypted passwords
- *
- * The purpose of this module is to defer all authentication decisions (ie:
- * local user vs NIS vs LDAP vs AD; encrypted vs plaintext) to the wbc
- * compatible daemon. This centeralizes all authentication decisions to a
- * single provider.
- *
- * This auth backend is most useful when used in conjunction with pdb_wbc_sam.
- */
-
-#include "includes.h"
-#include "auth.h"
-#include "nsswitch/libwbclient/wbclient.h"
-
-#undef DBGC_CLASS
-#define DBGC_CLASS DBGC_AUTH
-
-/* Authenticate a user with a challenge/response */
-
-static NTSTATUS check_wbc_security(const struct auth_context *auth_context,
- void *my_private_data,
- TALLOC_CTX *mem_ctx,
- const struct auth_usersupplied_info *user_info,
- struct auth_serversupplied_info **server_info)
-{
- NTSTATUS nt_status;
- wbcErr wbc_status;
- struct wbcAuthUserParams params;
- struct wbcAuthUserInfo *info = NULL;
- struct wbcAuthErrorInfo *err = NULL;
-
- if (!user_info || !auth_context || !server_info) {
- return NT_STATUS_INVALID_PARAMETER;
- }
-
- ZERO_STRUCT(params);
-
- /* Send off request */
-
- DEBUG(10, ("Check auth for: [%s]", user_info->mapped.account_name));
-
- params.account_name = user_info->client.account_name;
- params.domain_name = user_info->mapped.domain_name;
- params.workstation_name = user_info->workstation_name;
-
- params.flags = 0;
- params.parameter_control= user_info->logon_parameters;
-
- /* Handle plaintext */
- switch (user_info->password_state) {
- case AUTH_PASSWORD_PLAIN:
- {
- DEBUG(3,("Checking plaintext password for %s.\n",
- user_info->mapped.account_name));
- params.level = WBC_AUTH_USER_LEVEL_PLAIN;
-
- params.password.plaintext = user_info->password.plaintext;
- break;
- }
- case AUTH_PASSWORD_RESPONSE:
- case AUTH_PASSWORD_HASH:
- {
- DEBUG(3,("Checking encrypted password for %s.\n",
- user_info->mapped.account_name));
- params.level = WBC_AUTH_USER_LEVEL_RESPONSE;
-
- memcpy(params.password.response.challenge,
- auth_context->challenge.data,
- sizeof(params.password.response.challenge));
-
- if (user_info->password.response.nt.length != 0) {
- params.password.response.nt_length =
- user_info->password.response.nt.length;
- params.password.response.nt_data =
- user_info->password.response.nt.data;
- }
- if (user_info->password.response.lanman.length != 0) {
- params.password.response.lm_length =
- user_info->password.response.lanman.length;
- params.password.response.lm_data =
- user_info->password.response.lanman.data;
- }
- break;
- }
- default:
- DEBUG(0,("user_info constructed for user '%s' was invalid - password_state=%u invalid.\n",user_info->mapped.account_name, user_info->password_state));
- return NT_STATUS_INTERNAL_ERROR;
-#if 0 /* If ever implemented in libwbclient */
- case AUTH_PASSWORD_HASH:
- {
- DEBUG(3,("Checking logon (hash) password for %s.\n",
- user_info->mapped.account_name));
- params.level = WBC_AUTH_USER_LEVEL_HASH;
-
- if (user_info->password.hash.nt) {
- memcpy(params.password.hash.nt_hash, user_info->password.hash.nt, sizeof(* user_info->password.hash.nt));
- } else {
- memset(params.password.hash.nt_hash, '\0', sizeof(params.password.hash.nt_hash));
- }
-
- if (user_info->password.hash.lanman) {
- memcpy(params.password.hash.lm_hash, user_info->password.hash.lanman, sizeof(* user_info->password.hash.lanman));
- } else {
- memset(params.password.hash.lm_hash, '\0', sizeof(params.password.hash.lm_hash));
- }
-
- }
-#endif
- }
-
- /* we are contacting the privileged pipe */
- become_root();
- wbc_status = wbcAuthenticateUserEx(¶ms, &info, &err);
- unbecome_root();
-
- if (!WBC_ERROR_IS_OK(wbc_status)) {
- DEBUG(10,("wbcAuthenticateUserEx failed (%d): %s\n",
- wbc_status, wbcErrorString(wbc_status)));
- }
-
- if (wbc_status == WBC_ERR_NO_MEMORY) {
- return NT_STATUS_NO_MEMORY;
- }
-
- if (wbc_status == WBC_ERR_AUTH_ERROR) {
- nt_status = NT_STATUS(err->nt_status);
- wbcFreeMemory(err);
- return nt_status;
- }
-
- if (!WBC_ERROR_IS_OK(wbc_status)) {
- return NT_STATUS_LOGON_FAILURE;
- }
-
- DEBUG(10,("wbcAuthenticateUserEx succeeded\n"));
-
- nt_status = make_server_info_wbcAuthUserInfo(mem_ctx,
- user_info->client.account_name,
- user_info->mapped.domain_name,
- info, server_info);
- wbcFreeMemory(info);
- if (!NT_STATUS_IS_OK(nt_status)) {
- return nt_status;
- }
-
- (*server_info)->nss_token |= user_info->was_mapped;
-
- return nt_status;
-}
-
-/* module initialisation */
-static NTSTATUS auth_init_wbc(struct auth_context *auth_context, const char *param, auth_methods **auth_method)
-{
- struct auth_methods *result;
-
- result = talloc_zero(auth_context, struct auth_methods);
- if (result == NULL) {
- return NT_STATUS_NO_MEMORY;
- }
- result->name = "wbc";
- result->auth = check_wbc_security;
-
- *auth_method = result;
- return NT_STATUS_OK;
-}
-
-NTSTATUS auth_wbc_init(void)
-{
- return smb_register_auth(AUTH_INTERFACE_VERSION, "wbc", auth_init_wbc);
-}
diff --git a/source3/auth/wscript_build b/source3/auth/wscript_build
index e7a605177e7..b95fb9831f9 100644
--- a/source3/auth/wscript_build
+++ b/source3/auth/wscript_build
@@ -46,14 +46,6 @@ bld.SAMBA3_MODULE('auth_winbind',
init_function='',
internal_module=True)
-bld.SAMBA3_MODULE('auth_wbc',
- subsystem='auth',
- source='auth_wbc.c',
- deps='samba-util',
- init_function='',
- internal_module=bld.SAMBA3_IS_STATIC_MODULE('auth_wbc'),
- enabled=bld.SAMBA3_IS_ENABLED_MODULE('auth_wbc'))
-
bld.SAMBA3_MODULE('auth_domain',
subsystem='auth',
source='auth_domain.c',
diff --git a/source3/wscript b/source3/wscript
index c6b2421c45b..9784993f536 100644
--- a/source3/wscript
+++ b/source3/wscript
@@ -1663,7 +1663,7 @@ main() {
forced_static_modules.extend(TO_LIST('auth_domain auth_builtin auth_sam auth_winbind'))
default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam
- auth_unix auth_wbc
+ auth_unix
nss_info_template idmap_tdb idmap_passdb
idmap_nss'''))
--
2.11.0
>From 988f2c7391b17240eee2bc6e10b892b5853a7ed3 Mon Sep 17 00:00:00 2001
From: Volker Lendecke <vl at samba.org>
Date: Tue, 3 Jan 2017 07:04:59 +0000
Subject: [PATCH 2/2] passdb: Remove pdb_wbc_sam
It seems that this was only used in OneFS. The filesystem parts were
removed in 2012 with 70be41c772d.
Signed-off-by: Volker Lendecke <vl at samba.org>
---
source3/passdb/pdb_wbc_sam.c | 452 -------------------------------------------
source3/passdb/pdb_wbc_sam.h | 33 ----
source3/passdb/wscript_build | 8 -
source3/wscript | 2 +-
4 files changed, 1 insertion(+), 494 deletions(-)
delete mode 100644 source3/passdb/pdb_wbc_sam.c
delete mode 100644 source3/passdb/pdb_wbc_sam.h
diff --git a/source3/passdb/pdb_wbc_sam.c b/source3/passdb/pdb_wbc_sam.c
deleted file mode 100644
index b73fcc4a46e..00000000000
--- a/source3/passdb/pdb_wbc_sam.c
+++ /dev/null
@@ -1,452 +0,0 @@
-/*
- Unix SMB/CIFS implementation.
-
- Password and authentication handling by wbclient
-
- Copyright (C) Andrew Bartlett 2002
- Copyright (C) Jelmer Vernooij 2002
- Copyright (C) Simo Sorce 2003
- Copyright (C) Volker Lendecke 2006
- Copyright (C) Dan Sledz 2009
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
-*/
-
-/* This passdb module retrieves full passdb information for local users and
- * groups from a wbclient compatible daemon.
- *
- * The purpose of this module is to defer all SAM authorization information
- * storage and retrieval to a wbc compatible daemon.
- *
- * This passdb backend is most useful when used in conjunction with auth_wbc.
- *
- * A few current limitations of this module are:
- * - read only interface
- * - no privileges
- */
-
-#include "includes.h"
-#include "passdb.h"
-#include "lib/winbind_util.h"
-#include "passdb/pdb_wbc_sam.h"
-#include "idmap.h"
-
-/***************************************************************************
- Default implementations of some functions.
- ****************************************************************************/
-static NTSTATUS _pdb_wbc_sam_getsampw(struct pdb_methods *methods,
- struct samu *user,
- const struct passwd *pwd)
-{
- NTSTATUS result = NT_STATUS_OK;
-
- if (pwd == NULL)
- return NT_STATUS_NO_SUCH_USER;
-
- ZERO_STRUCTP(user);
-
- /* Can we really get away with this little of information */
- user->methods = methods;
- result = samu_set_unix(user, pwd);
-
- return result;
-}
-
-static NTSTATUS pdb_wbc_sam_getsampwnam(struct pdb_methods *methods, struct samu *user, const char *sname)
-{
- return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwnam(sname));
-}
-
-static NTSTATUS pdb_wbc_sam_getsampwsid(struct pdb_methods *methods, struct samu *user, const struct dom_sid *sid)
-{
- return _pdb_wbc_sam_getsampw(methods, user, winbind_getpwsid(sid));
-}
-
-static bool pdb_wbc_sam_id_to_sid(struct pdb_methods *methods, struct unixid *id,
- struct dom_sid *sid)
-{
- switch (id->type) {
- case ID_TYPE_UID:
- return winbind_uid_to_sid(sid, id->id);
-
- case ID_TYPE_GID:
- return winbind_gid_to_sid(sid, id->id);
-
- default:
- return false;
- }
-}
-
-static NTSTATUS pdb_wbc_sam_enum_group_members(struct pdb_methods *methods,
- TALLOC_CTX *mem_ctx,
- const struct dom_sid *group,
- uint32_t **pp_member_rids,
- size_t *p_num_members)
-{
- return NT_STATUS_NOT_IMPLEMENTED;
-}
-
-static NTSTATUS pdb_wbc_sam_enum_group_memberships(struct pdb_methods *methods,
- TALLOC_CTX *mem_ctx,
- struct samu *user,
- struct dom_sid **pp_sids,
- gid_t **pp_gids,
- uint32_t *p_num_groups)
-{
- size_t i;
- const char *username = pdb_get_username(user);
- uint32_t num_groups;
-
- if (!winbind_get_groups(mem_ctx, username, &num_groups, pp_gids)) {
- return NT_STATUS_NO_SUCH_USER;
- }
- *p_num_groups = num_groups;
-
- if (*p_num_groups == 0) {
- smb_panic("primary group missing");
- }
-
- *pp_sids = talloc_array(mem_ctx, struct dom_sid, *p_num_groups);
-
- if (*pp_sids == NULL) {
- TALLOC_FREE(*pp_gids);
- return NT_STATUS_NO_MEMORY;
- }
-
- for (i=0; i < *p_num_groups; i++) {
- gid_to_sid(&(*pp_sids)[i], (*pp_gids)[i]);
- }
-
- return NT_STATUS_OK;
-}
-
-static NTSTATUS pdb_wbc_sam_lookup_rids(struct pdb_methods *methods,
- const struct dom_sid *domain_sid,
- int num_rids,
- uint32_t *rids,
- const char **names,
- enum lsa_SidType *attrs)
-{
- NTSTATUS result = NT_STATUS_OK;
- const char *p = NULL;
- const char **pp = NULL;
- char *domain = NULL;
- char **account_names = NULL;
- enum lsa_SidType *attr_list = NULL;
- int i;
-
- if (!winbind_lookup_rids(talloc_tos(), domain_sid, num_rids, rids,
- &p, &pp, &attr_list))
- {
- result = NT_STATUS_NONE_MAPPED;
- goto done;
- }
- domain = discard_const_p(char, p);
- account_names = discard_const_p(char *, pp);
-
- memcpy(attrs, attr_list, num_rids * sizeof(enum lsa_SidType));
-
- for (i=0; i<num_rids; i++) {
- if (attrs[i] == SID_NAME_UNKNOWN) {
- names[i] = NULL;
- } else {
- names[i] = talloc_strdup(names, account_names[i]);
- if (names[i] == NULL) {
- result = NT_STATUS_NO_MEMORY;
- goto done;
- }
-
- }
- }
-
-done:
- TALLOC_FREE(account_names);
- TALLOC_FREE(domain);
- TALLOC_FREE(attr_list);
- return result;
-}
-
-static NTSTATUS pdb_wbc_sam_get_account_policy(struct pdb_methods *methods, enum pdb_policy_type type, uint32_t *value)
-{
- return NT_STATUS_UNSUCCESSFUL;
-}
-
-static NTSTATUS pdb_wbc_sam_set_account_policy(struct pdb_methods *methods, enum pdb_policy_type type, uint32_t value)
-{
- return NT_STATUS_UNSUCCESSFUL;
-}
-
-static bool pdb_wbc_sam_search_groups(struct pdb_methods *methods,
- struct pdb_search *search)
-{
- return false;
-}
-
-static bool pdb_wbc_sam_search_aliases(struct pdb_methods *methods,
- struct pdb_search *search,
- const struct dom_sid *sid)
-{
-
- return false;
-}
-
-static bool pdb_wbc_sam_get_trusteddom_pw(struct pdb_methods *methods,
- const char *domain,
- char **pwd,
- struct dom_sid *sid,
- time_t *pass_last_set_time)
-{
- return false;
-
-}
-
-static bool pdb_wbc_sam_set_trusteddom_pw(struct pdb_methods *methods,
- const char *domain,
- const char *pwd,
- const struct dom_sid *sid)
-{
- return false;
-}
-
-static bool pdb_wbc_sam_del_trusteddom_pw(struct pdb_methods *methods,
- const char *domain)
-{
- return false;
-}
-
-static NTSTATUS pdb_wbc_sam_enum_trusteddoms(struct pdb_methods *methods,
- TALLOC_CTX *mem_ctx,
- uint32_t *num_domains,
- struct trustdom_info ***domains)
-{
- return NT_STATUS_NOT_IMPLEMENTED;
-}
-
-static bool _make_group_map(struct pdb_methods *methods, const char *domain, const char *name, enum lsa_SidType name_type, gid_t gid, struct dom_sid *sid, GROUP_MAP *map)
-{
- map->nt_name = talloc_asprintf(map, "%s%c%s",
- domain, *lp_winbind_separator(), name);
- if (!map->nt_name) {
- return false;
- }
- map->sid_name_use = name_type;
- map->sid = *sid;
- map->gid = gid;
- return true;
-}
-
-static NTSTATUS pdb_wbc_sam_getgrsid(struct pdb_methods *methods, GROUP_MAP *map,
- struct dom_sid sid)
-{
- NTSTATUS result = NT_STATUS_OK;
- const char *p1 = NULL, *p2 = NULL;
- char *name = NULL;
- char *domain = NULL;
- enum lsa_SidType name_type;
- gid_t gid;
-
- if (!winbind_lookup_sid(talloc_tos(), &sid, &p1, &p2, &name_type)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
- domain = discard_const_p(char, p1);
- name = discard_const_p(char, p2);
-
- if ((name_type != SID_NAME_DOM_GRP) &&
- (name_type != SID_NAME_DOMAIN) &&
- (name_type != SID_NAME_ALIAS) &&
- (name_type != SID_NAME_WKN_GRP)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
- if (!winbind_sid_to_gid(&gid, &sid)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
- if (!_make_group_map(methods, domain, name, name_type, gid, &sid, map)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
-done:
- TALLOC_FREE(name);
- TALLOC_FREE(domain);
- return result;
-}
-
-static NTSTATUS pdb_wbc_sam_getgrgid(struct pdb_methods *methods, GROUP_MAP *map,
- gid_t gid)
-{
- NTSTATUS result = NT_STATUS_OK;
- const char *p1 = NULL, *p2 = NULL;
- char *name = NULL;
- char *domain = NULL;
- struct dom_sid sid;
- enum lsa_SidType name_type;
-
- if (!winbind_gid_to_sid(&sid, gid)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
- if (!winbind_lookup_sid(talloc_tos(), &sid, &p1, &p2, &name_type)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
- domain = discard_const_p(char, p1);
- name = discard_const_p(char, p2);
-
- if ((name_type != SID_NAME_DOM_GRP) &&
- (name_type != SID_NAME_DOMAIN) &&
- (name_type != SID_NAME_ALIAS) &&
- (name_type != SID_NAME_WKN_GRP)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
- if (!_make_group_map(methods, domain, name, name_type, gid, &sid, map)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
-done:
- TALLOC_FREE(name);
- TALLOC_FREE(domain);
-
- return result;
-}
-
-static NTSTATUS pdb_wbc_sam_getgrnam(struct pdb_methods *methods, GROUP_MAP *map,
- const char *name)
-{
- NTSTATUS result = NT_STATUS_OK;
- const char *domain = "";
- struct dom_sid sid;
- gid_t gid;
- enum lsa_SidType name_type;
-
- if (!winbind_lookup_name(domain, name, &sid, &name_type)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
- if ((name_type != SID_NAME_DOM_GRP) &&
- (name_type != SID_NAME_DOMAIN) &&
- (name_type != SID_NAME_ALIAS) &&
- (name_type != SID_NAME_WKN_GRP)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
- if (!winbind_sid_to_gid(&gid, &sid)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
- if (!_make_group_map(methods, domain, name, name_type, gid, &sid, map)) {
- result = NT_STATUS_NO_SUCH_GROUP;
- goto done;
- }
-
-done:
-
- return result;
-}
-
-static NTSTATUS pdb_wbc_sam_enum_group_mapping(struct pdb_methods *methods,
- const struct dom_sid *sid, enum lsa_SidType sid_name_use,
- GROUP_MAP ***pp_rmap, size_t *p_num_entries,
- bool unix_only)
-{
- return NT_STATUS_NOT_IMPLEMENTED;
-}
-
-static NTSTATUS pdb_wbc_sam_get_aliasinfo(struct pdb_methods *methods,
- const struct dom_sid *sid,
- struct acct_info *info)
-{
- return NT_STATUS_NOT_IMPLEMENTED;
-}
-
-static NTSTATUS pdb_wbc_sam_enum_aliasmem(struct pdb_methods *methods,
- const struct dom_sid *alias,
- TALLOC_CTX *mem_ctx,
- struct dom_sid **pp_members,
- size_t *p_num_members)
-{
- return NT_STATUS_NOT_IMPLEMENTED;
-}
-
-static NTSTATUS pdb_wbc_sam_alias_memberships(struct pdb_methods *methods,
- TALLOC_CTX *mem_ctx,
- const struct dom_sid *domain_sid,
- const struct dom_sid *members,
- size_t num_members,
- uint32_t **pp_alias_rids,
- size_t *p_num_alias_rids)
-{
- if (!winbind_get_sid_aliases(mem_ctx, domain_sid,
- members, num_members, pp_alias_rids, p_num_alias_rids))
- return NT_STATUS_UNSUCCESSFUL;
-
- return NT_STATUS_OK;
-}
-
-static NTSTATUS pdb_init_wbc_sam(struct pdb_methods **pdb_method, const char *location)
-{
- NTSTATUS result;
-
- if (!NT_STATUS_IS_OK(result = make_pdb_method( pdb_method))) {
- return result;
- }
-
- (*pdb_method)->name = "wbc_sam";
-
- (*pdb_method)->getsampwnam = pdb_wbc_sam_getsampwnam;
- (*pdb_method)->getsampwsid = pdb_wbc_sam_getsampwsid;
-
- (*pdb_method)->getgrsid = pdb_wbc_sam_getgrsid;
- (*pdb_method)->getgrgid = pdb_wbc_sam_getgrgid;
- (*pdb_method)->getgrnam = pdb_wbc_sam_getgrnam;
- (*pdb_method)->enum_group_mapping = pdb_wbc_sam_enum_group_mapping;
- (*pdb_method)->enum_group_members = pdb_wbc_sam_enum_group_members;
- (*pdb_method)->enum_group_memberships = pdb_wbc_sam_enum_group_memberships;
- (*pdb_method)->get_aliasinfo = pdb_wbc_sam_get_aliasinfo;
- (*pdb_method)->enum_aliasmem = pdb_wbc_sam_enum_aliasmem;
- (*pdb_method)->enum_alias_memberships = pdb_wbc_sam_alias_memberships;
- (*pdb_method)->lookup_rids = pdb_wbc_sam_lookup_rids;
- (*pdb_method)->get_account_policy = pdb_wbc_sam_get_account_policy;
- (*pdb_method)->set_account_policy = pdb_wbc_sam_set_account_policy;
- (*pdb_method)->id_to_sid = pdb_wbc_sam_id_to_sid;
-
- (*pdb_method)->search_groups = pdb_wbc_sam_search_groups;
- (*pdb_method)->search_aliases = pdb_wbc_sam_search_aliases;
-
- (*pdb_method)->get_trusteddom_pw = pdb_wbc_sam_get_trusteddom_pw;
- (*pdb_method)->set_trusteddom_pw = pdb_wbc_sam_set_trusteddom_pw;
- (*pdb_method)->del_trusteddom_pw = pdb_wbc_sam_del_trusteddom_pw;
- (*pdb_method)->enum_trusteddoms = pdb_wbc_sam_enum_trusteddoms;
-
- (*pdb_method)->private_data = NULL;
- (*pdb_method)->free_private_data = NULL;
-
- return NT_STATUS_OK;
-}
-
-NTSTATUS pdb_wbc_sam_init(void)
-{
- return smb_register_passdb(PASSDB_INTERFACE_VERSION, "wbc_sam", pdb_init_wbc_sam);
-}
diff --git a/source3/passdb/pdb_wbc_sam.h b/source3/passdb/pdb_wbc_sam.h
deleted file mode 100644
index 02473c9b6e9..00000000000
--- a/source3/passdb/pdb_wbc_sam.h
+++ /dev/null
@@ -1,33 +0,0 @@
-/*
- Unix SMB/CIFS implementation.
-
- Password and authentication handling by wbclient
-
- Copyright (C) Andrew Bartlett 2002
- Copyright (C) Jelmer Vernooij 2002
- Copyright (C) Simo Sorce 2003
- Copyright (C) Volker Lendecke 2006
- Copyright (C) Dan Sledz 2009
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
-*/
-
-#ifndef _PASSDB_PDB_WBC_SAM_H_
-#define _PASSDB_PDB_WBC_SAM_H_
-
-/* The following definitions come from passdb/pdb_wbc_sam.c */
-
-NTSTATUS pdb_wbc_sam_init(void);
-
-#endif /* _PASSDB_PDB_WBC_SAM_H_ */
diff --git a/source3/passdb/wscript_build b/source3/passdb/wscript_build
index 105777a2b94..f943597004a 100644
--- a/source3/passdb/wscript_build
+++ b/source3/passdb/wscript_build
@@ -24,14 +24,6 @@ bld.SAMBA3_MODULE('pdb_smbpasswd',
internal_module=bld.SAMBA3_IS_STATIC_MODULE('pdb_smbpasswd'),
enabled=bld.SAMBA3_IS_ENABLED_MODULE('pdb_smbpasswd'))
-bld.SAMBA3_MODULE('pdb_wbc_sam',
- subsystem='pdb',
- source='pdb_wbc_sam.c',
- deps='samba-util wbclient',
- init_function='',
- internal_module=bld.SAMBA3_IS_STATIC_MODULE('pdb_wbc_sam'),
- enabled=bld.SAMBA3_IS_ENABLED_MODULE('pdb_wbc_sam'))
-
bld.SAMBA3_MODULE('pdb_samba_dsdb',
subsystem='pdb',
source='pdb_samba_dsdb.c',
diff --git a/source3/wscript b/source3/wscript
index 9784993f536..b09e3727efc 100644
--- a/source3/wscript
+++ b/source3/wscript
@@ -1662,7 +1662,7 @@ main() {
default_static_modules.extend(TO_LIST('rpc_mdssvc_module'))
forced_static_modules.extend(TO_LIST('auth_domain auth_builtin auth_sam auth_winbind'))
- default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam pdb_wbc_sam
+ default_static_modules.extend(TO_LIST('''pdb_smbpasswd pdb_tdbsam
auth_unix
nss_info_template idmap_tdb idmap_passdb
idmap_nss'''))
--
2.11.0
More information about the samba-technical
mailing list