1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/source3/winbindd/winbindd_reconnect_ads.c
Ralph Boehme a8d5e4d367 winbindd: add and use ldap_reconnect_need_retry() in winbindd_reconnect_ads.c
ldap_reconnect_need_retry() is a copy of reconnect_need_retry() minus
the RPC connection invalidation.

Bug: https://bugzilla.samba.org/show_bug.cgi?id=13332

Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org>
2018-03-15 15:46:09 +01:00

349 lines
8.2 KiB
C

/*
Unix SMB/CIFS implementation.
Wrapper around winbindd_ads.c to centralize retry logic.
Copyright (C) Christof Schmitt 2016
Based on winbindd_reconnect.c
Copyright (C) Volker Lendecke 2005
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "winbindd.h"
#ifdef HAVE_ADS
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_WINBIND
extern struct winbindd_methods ads_methods;
static bool ldap_reconnect_need_retry(NTSTATUS status,
struct winbindd_domain *domain)
{
if (NT_STATUS_IS_OK(status)) {
return false;
}
if (!NT_STATUS_IS_ERR(status)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NONE_MAPPED)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_GROUP)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_ALIAS)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_MEMBER)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_DOMAIN)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_PRIVILEGE)) {
return false;
}
if (NT_STATUS_EQUAL(status, NT_STATUS_NO_MEMORY)) {
return false;
}
return true;
}
/* List all users */
static NTSTATUS query_user_list(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
uint32_t **rids)
{
NTSTATUS result;
result = ads_methods.query_user_list(domain, mem_ctx, rids);
if (ldap_reconnect_need_retry(result, domain)) {
result = ads_methods.query_user_list(domain, mem_ctx, rids);
}
return result;
}
/* list all domain groups */
static NTSTATUS enum_dom_groups(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
uint32_t *num_entries,
struct wb_acct_info **info)
{
NTSTATUS result;
result = ads_methods.enum_dom_groups(domain, mem_ctx,
num_entries, info);
if (ldap_reconnect_need_retry(result, domain)) {
result = ads_methods.enum_dom_groups(domain, mem_ctx,
num_entries, info);
}
return result;
}
/* List all domain groups */
static NTSTATUS enum_local_groups(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
uint32_t *num_entries,
struct wb_acct_info **info)
{
NTSTATUS result;
result = ads_methods.enum_local_groups(domain, mem_ctx,
num_entries, info);
if (ldap_reconnect_need_retry(result, domain)) {
result = ads_methods.enum_local_groups(domain, mem_ctx,
num_entries, info);
}
return result;
}
/* convert a single name to a sid in a domain */
static NTSTATUS name_to_sid(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
const char *domain_name,
const char *name,
uint32_t flags,
struct dom_sid *sid,
enum lsa_SidType *type)
{
NTSTATUS result;
result = ads_methods.name_to_sid(domain, mem_ctx, domain_name, name,
flags, sid, type);
if (reconnect_need_retry(result, domain)) {
result = ads_methods.name_to_sid(domain, mem_ctx,
domain_name, name, flags,
sid, type);
}
return result;
}
/*
convert a domain SID to a user or group name
*/
static NTSTATUS sid_to_name(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
const struct dom_sid *sid,
char **domain_name,
char **name,
enum lsa_SidType *type)
{
NTSTATUS result;
result = ads_methods.sid_to_name(domain, mem_ctx, sid,
domain_name, name, type);
if (reconnect_need_retry(result, domain))
result = ads_methods.sid_to_name(domain, mem_ctx, sid,
domain_name, name, type);
return result;
}
static NTSTATUS rids_to_names(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
const struct dom_sid *sid,
uint32_t *rids,
size_t num_rids,
char **domain_name,
char ***names,
enum lsa_SidType **types)
{
NTSTATUS result;
result = ads_methods.rids_to_names(domain, mem_ctx, sid,
rids, num_rids,
domain_name, names, types);
if (reconnect_need_retry(result, domain)) {
result = ads_methods.rids_to_names(domain, mem_ctx, sid,
rids, num_rids, domain_name,
names, types);
}
return result;
}
/* Lookup groups a user is a member of. I wish Unix had a call like this! */
static NTSTATUS lookup_usergroups(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
const struct dom_sid *user_sid,
uint32_t *num_groups,
struct dom_sid **user_gids)
{
NTSTATUS result;
result = ads_methods.lookup_usergroups(domain, mem_ctx, user_sid,
num_groups, user_gids);
if (ldap_reconnect_need_retry(result, domain)) {
result = ads_methods.lookup_usergroups(domain, mem_ctx,
user_sid, num_groups,
user_gids);
}
return result;
}
static NTSTATUS lookup_useraliases(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
uint32_t num_sids,
const struct dom_sid *sids,
uint32_t *num_aliases, uint32_t **alias_rids)
{
NTSTATUS result;
result = ads_methods.lookup_useraliases(domain, mem_ctx, num_sids, sids,
num_aliases, alias_rids);
if (reconnect_need_retry(result, domain)) {
result = ads_methods.lookup_useraliases(domain, mem_ctx,
num_sids, sids,
num_aliases,
alias_rids);
}
return result;
}
/* Lookup group membership given a rid. */
static NTSTATUS lookup_groupmem(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
const struct dom_sid *group_sid,
enum lsa_SidType type,
uint32_t *num_names,
struct dom_sid **sid_mem, char ***names,
uint32_t **name_types)
{
NTSTATUS result;
result = ads_methods.lookup_groupmem(domain, mem_ctx, group_sid, type,
num_names, sid_mem, names,
name_types);
if (ldap_reconnect_need_retry(result, domain)) {
result = ads_methods.lookup_groupmem(domain, mem_ctx, group_sid,
type, num_names, sid_mem,
names, name_types);
}
return result;
}
/* find the sequence number for a domain */
static NTSTATUS sequence_number(struct winbindd_domain *domain, uint32_t *seq)
{
NTSTATUS result;
result = ads_methods.sequence_number(domain, seq);
if (ldap_reconnect_need_retry(result, domain)) {
result = ads_methods.sequence_number(domain, seq);
}
return result;
}
/* find the lockout policy of a domain */
static NTSTATUS lockout_policy(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
struct samr_DomInfo12 *policy)
{
NTSTATUS result;
result = ads_methods.lockout_policy(domain, mem_ctx, policy);
if (reconnect_need_retry(result, domain)) {
result = ads_methods.lockout_policy(domain, mem_ctx, policy);
}
return result;
}
/* find the password policy of a domain */
static NTSTATUS password_policy(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
struct samr_DomInfo1 *policy)
{
NTSTATUS result;
result = ads_methods.password_policy(domain, mem_ctx, policy);
if (reconnect_need_retry(result, domain)) {
result = ads_methods.password_policy(domain, mem_ctx, policy);
}
return result;
}
/* get a list of trusted domains */
static NTSTATUS trusted_domains(struct winbindd_domain *domain,
TALLOC_CTX *mem_ctx,
struct netr_DomainTrustList *trusts)
{
NTSTATUS result;
result = ads_methods.trusted_domains(domain, mem_ctx, trusts);
if (reconnect_need_retry(result, domain)) {
result = ads_methods.trusted_domains(domain, mem_ctx, trusts);
}
return result;
}
/* the rpc backend methods are exposed via this structure */
struct winbindd_methods reconnect_ads_methods = {
true,
query_user_list,
enum_dom_groups,
enum_local_groups,
name_to_sid,
sid_to_name,
rids_to_names,
lookup_usergroups,
lookup_useraliases,
lookup_groupmem,
sequence_number,
lockout_policy,
password_policy,
trusted_domains,
};
#endif