mirror of
https://github.com/samba-team/samba.git
synced 2025-01-25 06:04:04 +03:00
245aa33f0d
for anonymous bound connections. When doing anonymous bind you can never use paged LDAP control for RootDSE searches on AD. Guenther (This used to be commit dc1d92faabd4b291f607eb481349ba37e52ef11e)
191 lines
4.8 KiB
C
191 lines
4.8 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
Some Helpful wrappers on LDAP
|
|
|
|
Copyright (C) Andrew Tridgell 2001
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#ifdef HAVE_LDAP
|
|
/*
|
|
a wrapper around ldap_search_s that retries depending on the error code
|
|
this is supposed to catch dropped connections and auto-reconnect
|
|
*/
|
|
static ADS_STATUS ads_do_search_retry_internal(ADS_STRUCT *ads, const char *bind_path, int scope,
|
|
const char *expr,
|
|
const char **attrs, void *args,
|
|
LDAPMessage **res)
|
|
{
|
|
ADS_STATUS status = ADS_SUCCESS;
|
|
int count = 3;
|
|
char *bp;
|
|
|
|
*res = NULL;
|
|
|
|
if (!ads->ld &&
|
|
time(NULL) - ads->last_attempt < ADS_RECONNECT_TIME) {
|
|
return ADS_ERROR(LDAP_SERVER_DOWN);
|
|
}
|
|
|
|
bp = SMB_STRDUP(bind_path);
|
|
|
|
if (!bp) {
|
|
return ADS_ERROR_NT(NT_STATUS_NO_MEMORY);
|
|
}
|
|
|
|
*res = NULL;
|
|
|
|
/* when binding anonymously, we cannot use the paged search LDAP
|
|
* control - Guenther */
|
|
|
|
if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
|
|
status = ads_do_search(ads, bp, scope, expr, attrs, res);
|
|
} else {
|
|
status = ads_do_search_all_args(ads, bp, scope, expr, attrs, args, res);
|
|
}
|
|
if (ADS_ERR_OK(status)) {
|
|
DEBUG(5,("Search for %s gave %d replies\n",
|
|
expr, ads_count_replies(ads, *res)));
|
|
SAFE_FREE(bp);
|
|
return status;
|
|
}
|
|
|
|
while (--count) {
|
|
|
|
if (*res)
|
|
ads_msgfree(ads, *res);
|
|
*res = NULL;
|
|
|
|
DEBUG(3,("Reopening ads connection to realm '%s' after error %s\n",
|
|
ads->config.realm, ads_errstr(status)));
|
|
|
|
if (ads->ld) {
|
|
ldap_unbind(ads->ld);
|
|
}
|
|
|
|
ads->ld = NULL;
|
|
status = ads_connect(ads);
|
|
|
|
if (!ADS_ERR_OK(status)) {
|
|
DEBUG(1,("ads_search_retry: failed to reconnect (%s)\n",
|
|
ads_errstr(status)));
|
|
ads_destroy(&ads);
|
|
SAFE_FREE(bp);
|
|
return status;
|
|
}
|
|
|
|
*res = NULL;
|
|
|
|
/* when binding anonymously, we cannot use the paged search LDAP
|
|
* control - Guenther */
|
|
|
|
if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
|
|
status = ads_do_search(ads, bp, scope, expr, attrs, res);
|
|
} else {
|
|
status = ads_do_search_all_args(ads, bp, scope, expr, attrs, args, res);
|
|
}
|
|
|
|
if (ADS_ERR_OK(status)) {
|
|
DEBUG(5,("Search for filter: %s, base: %s gave %d replies\n",
|
|
expr, bp, ads_count_replies(ads, *res)));
|
|
SAFE_FREE(bp);
|
|
return status;
|
|
}
|
|
}
|
|
SAFE_FREE(bp);
|
|
|
|
if (!ADS_ERR_OK(status))
|
|
DEBUG(1,("ads reopen failed after error %s\n",
|
|
ads_errstr(status)));
|
|
|
|
return status;
|
|
}
|
|
|
|
ADS_STATUS ads_do_search_retry(ADS_STRUCT *ads, const char *bind_path,
|
|
int scope, const char *expr,
|
|
const char **attrs, LDAPMessage **res)
|
|
{
|
|
return ads_do_search_retry_internal(ads, bind_path, scope, expr, attrs, NULL, res);
|
|
}
|
|
|
|
ADS_STATUS ads_do_search_retry_args(ADS_STRUCT *ads, const char *bind_path,
|
|
int scope, const char *expr,
|
|
const char **attrs, void *args,
|
|
LDAPMessage **res)
|
|
{
|
|
return ads_do_search_retry_internal(ads, bind_path, scope, expr, attrs, args, res);
|
|
}
|
|
|
|
|
|
ADS_STATUS ads_search_retry(ADS_STRUCT *ads, LDAPMessage **res,
|
|
const char *expr, const char **attrs)
|
|
{
|
|
return ads_do_search_retry(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE,
|
|
expr, attrs, res);
|
|
}
|
|
|
|
ADS_STATUS ads_search_retry_dn(ADS_STRUCT *ads, LDAPMessage **res,
|
|
const char *dn,
|
|
const char **attrs)
|
|
{
|
|
return ads_do_search_retry(ads, dn, LDAP_SCOPE_BASE,
|
|
"(objectclass=*)", attrs, res);
|
|
}
|
|
|
|
ADS_STATUS ads_search_retry_extended_dn(ADS_STRUCT *ads, LDAPMessage **res,
|
|
const char *dn,
|
|
const char **attrs,
|
|
enum ads_extended_dn_flags flags)
|
|
{
|
|
ads_control args;
|
|
|
|
args.control = ADS_EXTENDED_DN_OID;
|
|
args.val = flags;
|
|
args.critical = True;
|
|
|
|
return ads_do_search_retry_args(ads, dn, LDAP_SCOPE_BASE,
|
|
"(objectclass=*)", attrs, &args, res);
|
|
}
|
|
|
|
ADS_STATUS ads_search_retry_sid(ADS_STRUCT *ads, LDAPMessage **res,
|
|
const DOM_SID *sid,
|
|
const char **attrs)
|
|
{
|
|
char *dn, *sid_string;
|
|
ADS_STATUS status;
|
|
|
|
sid_string = sid_binstring_hex(sid);
|
|
if (sid_string == NULL) {
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
if (!asprintf(&dn, "<SID=%s>", sid_string)) {
|
|
SAFE_FREE(sid_string);
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
status = ads_do_search_retry(ads, dn, LDAP_SCOPE_BASE,
|
|
"(objectclass=*)", attrs, res);
|
|
SAFE_FREE(dn);
|
|
SAFE_FREE(sid_string);
|
|
return status;
|
|
}
|
|
|
|
#endif
|