mirror of
https://github.com/samba-team/samba.git
synced 2024-12-30 13:18:05 +03:00
e7425bd524
Thanks to Isaac Boukris <iboukris@gmail.com> for finding the issue and testing this fix. BUG: https://bugzilla.samba.org/show_bug.cgi?id=13244 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Fri Jan 26 02:25:20 CET 2018 on sn-devel-144
394 lines
9.9 KiB
C
394 lines
9.9 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
Some Helpful wrappers on LDAP
|
|
|
|
Copyright (C) Andrew Tridgell 2001
|
|
Copyright (C) Guenther Deschner 2006,2007
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "ads.h"
|
|
#include "lib/param/loadparm.h"
|
|
|
|
#ifdef HAVE_LDAP
|
|
|
|
static ADS_STATUS ads_ranged_search_internal(ADS_STRUCT *ads,
|
|
TALLOC_CTX *mem_ctx,
|
|
int scope,
|
|
const char *base,
|
|
const char *filter,
|
|
const char **attrs,
|
|
void *args,
|
|
const char *range_attr,
|
|
char ***strings,
|
|
size_t *num_strings,
|
|
uint32_t *first_usn,
|
|
int *num_retries,
|
|
bool *more_values);
|
|
|
|
/*
|
|
a wrapper around ldap_search_s that retries depending on the error code
|
|
this is supposed to catch dropped connections and auto-reconnect
|
|
*/
|
|
static ADS_STATUS ads_do_search_retry_internal(ADS_STRUCT *ads, const char *bind_path, int scope,
|
|
const char *expr,
|
|
const char **attrs, void *args,
|
|
LDAPMessage **res)
|
|
{
|
|
ADS_STATUS status = ADS_SUCCESS;
|
|
int count = 3;
|
|
char *bp;
|
|
|
|
*res = NULL;
|
|
|
|
if (!ads->ldap.ld &&
|
|
time_mono(NULL) - ads->ldap.last_attempt < ADS_RECONNECT_TIME) {
|
|
return ADS_ERROR(LDAP_SERVER_DOWN);
|
|
}
|
|
|
|
bp = SMB_STRDUP(bind_path);
|
|
|
|
if (!bp) {
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
*res = NULL;
|
|
|
|
/* when binding anonymously, we cannot use the paged search LDAP
|
|
* control - Guenther */
|
|
|
|
if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
|
|
status = ads_do_search(ads, bp, scope, expr, attrs, res);
|
|
} else {
|
|
status = ads_do_search_all_args(ads, bp, scope, expr, attrs, args, res);
|
|
}
|
|
if (ADS_ERR_OK(status)) {
|
|
DEBUG(5,("Search for %s in <%s> gave %d replies\n",
|
|
expr, bp, ads_count_replies(ads, *res)));
|
|
SAFE_FREE(bp);
|
|
return status;
|
|
}
|
|
|
|
while (--count) {
|
|
|
|
if (NT_STATUS_EQUAL(ads_ntstatus(status), NT_STATUS_IO_TIMEOUT) &&
|
|
ads->config.ldap_page_size >= (lp_ldap_page_size() / 4) &&
|
|
lp_ldap_page_size() > 4) {
|
|
int new_page_size = (ads->config.ldap_page_size / 2);
|
|
DEBUG(1, ("Reducing LDAP page size from %d to %d due to IO_TIMEOUT\n",
|
|
ads->config.ldap_page_size, new_page_size));
|
|
ads->config.ldap_page_size = new_page_size;
|
|
}
|
|
|
|
if (*res)
|
|
ads_msgfree(ads, *res);
|
|
*res = NULL;
|
|
|
|
DEBUG(3,("Reopening ads connection to realm '%s' after error %s\n",
|
|
ads->config.realm, ads_errstr(status)));
|
|
|
|
ads_disconnect(ads);
|
|
status = ads_connect(ads);
|
|
|
|
if (!ADS_ERR_OK(status)) {
|
|
bool orig_is_mine = ads->is_mine;
|
|
|
|
DEBUG(1,("ads_search_retry: failed to reconnect (%s)\n",
|
|
ads_errstr(status)));
|
|
/*
|
|
* We need to keep the ads pointer
|
|
* from being freed here as we don't own it and
|
|
* callers depend on it being around.
|
|
*/
|
|
ads->is_mine = false;
|
|
ads_destroy(&ads);
|
|
ads->is_mine = orig_is_mine;
|
|
SAFE_FREE(bp);
|
|
return status;
|
|
}
|
|
|
|
*res = NULL;
|
|
|
|
/* when binding anonymously, we cannot use the paged search LDAP
|
|
* control - Guenther */
|
|
|
|
if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
|
|
status = ads_do_search(ads, bp, scope, expr, attrs, res);
|
|
} else {
|
|
status = ads_do_search_all_args(ads, bp, scope, expr, attrs, args, res);
|
|
}
|
|
|
|
if (ADS_ERR_OK(status)) {
|
|
DEBUG(5,("Search for filter: %s, base: %s gave %d replies\n",
|
|
expr, bp, ads_count_replies(ads, *res)));
|
|
SAFE_FREE(bp);
|
|
return status;
|
|
}
|
|
}
|
|
SAFE_FREE(bp);
|
|
|
|
if (!ADS_ERR_OK(status)) {
|
|
DEBUG(1,("ads reopen failed after error %s\n",
|
|
ads_errstr(status)));
|
|
}
|
|
return status;
|
|
}
|
|
|
|
ADS_STATUS ads_do_search_retry(ADS_STRUCT *ads, const char *bind_path,
|
|
int scope, const char *expr,
|
|
const char **attrs, LDAPMessage **res)
|
|
{
|
|
return ads_do_search_retry_internal(ads, bind_path, scope, expr, attrs, NULL, res);
|
|
}
|
|
|
|
static ADS_STATUS ads_do_search_retry_args(ADS_STRUCT *ads, const char *bind_path,
|
|
int scope, const char *expr,
|
|
const char **attrs, void *args,
|
|
LDAPMessage **res)
|
|
{
|
|
return ads_do_search_retry_internal(ads, bind_path, scope, expr, attrs, args, res);
|
|
}
|
|
|
|
|
|
ADS_STATUS ads_search_retry(ADS_STRUCT *ads, LDAPMessage **res,
|
|
const char *expr, const char **attrs)
|
|
{
|
|
return ads_do_search_retry(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE,
|
|
expr, attrs, res);
|
|
}
|
|
|
|
ADS_STATUS ads_search_retry_dn(ADS_STRUCT *ads, LDAPMessage **res,
|
|
const char *dn,
|
|
const char **attrs)
|
|
{
|
|
return ads_do_search_retry(ads, dn, LDAP_SCOPE_BASE,
|
|
"(objectclass=*)", attrs, res);
|
|
}
|
|
|
|
ADS_STATUS ads_search_retry_dn_sd_flags(ADS_STRUCT *ads, LDAPMessage **res,
|
|
uint32_t sd_flags,
|
|
const char *dn,
|
|
const char **attrs)
|
|
{
|
|
ads_control args;
|
|
|
|
args.control = ADS_SD_FLAGS_OID;
|
|
args.val = sd_flags;
|
|
args.critical = True;
|
|
|
|
return ads_do_search_retry_args(ads, dn, LDAP_SCOPE_BASE,
|
|
"(objectclass=*)", attrs, &args, res);
|
|
}
|
|
|
|
ADS_STATUS ads_search_retry_extended_dn_ranged(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx,
|
|
const char *dn,
|
|
const char **attrs,
|
|
enum ads_extended_dn_flags flags,
|
|
char ***strings,
|
|
size_t *num_strings)
|
|
{
|
|
ads_control args;
|
|
|
|
args.control = ADS_EXTENDED_DN_OID;
|
|
args.val = flags;
|
|
args.critical = True;
|
|
|
|
/* we can only range process one attribute */
|
|
if (!attrs || !attrs[0] || attrs[1]) {
|
|
return ADS_ERROR_NT(NT_STATUS_INVALID_PARAMETER);
|
|
}
|
|
|
|
return ads_ranged_search(ads, mem_ctx, LDAP_SCOPE_BASE, dn,
|
|
"(objectclass=*)", &args, attrs[0],
|
|
strings, num_strings);
|
|
|
|
}
|
|
|
|
ADS_STATUS ads_search_retry_sid(ADS_STRUCT *ads, LDAPMessage **res,
|
|
const struct dom_sid *sid,
|
|
const char **attrs)
|
|
{
|
|
char *dn, *sid_string;
|
|
ADS_STATUS status;
|
|
|
|
sid_string = sid_binstring_hex_talloc(talloc_tos(), sid);
|
|
if (sid_string == NULL) {
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
if (!asprintf(&dn, "<SID=%s>", sid_string)) {
|
|
TALLOC_FREE(sid_string);
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
status = ads_do_search_retry(ads, dn, LDAP_SCOPE_BASE,
|
|
"(objectclass=*)", attrs, res);
|
|
SAFE_FREE(dn);
|
|
TALLOC_FREE(sid_string);
|
|
return status;
|
|
}
|
|
|
|
ADS_STATUS ads_ranged_search(ADS_STRUCT *ads,
|
|
TALLOC_CTX *mem_ctx,
|
|
int scope,
|
|
const char *base,
|
|
const char *filter,
|
|
void *args,
|
|
const char *range_attr,
|
|
char ***strings,
|
|
size_t *num_strings)
|
|
{
|
|
ADS_STATUS status;
|
|
uint32_t first_usn;
|
|
int num_retries = 0;
|
|
const char **attrs;
|
|
bool more_values = False;
|
|
|
|
*num_strings = 0;
|
|
*strings = NULL;
|
|
|
|
attrs = talloc_array(mem_ctx, const char *, 3);
|
|
ADS_ERROR_HAVE_NO_MEMORY(attrs);
|
|
|
|
attrs[0] = talloc_strdup(mem_ctx, range_attr);
|
|
attrs[1] = talloc_strdup(mem_ctx, "usnChanged");
|
|
attrs[2] = NULL;
|
|
|
|
ADS_ERROR_HAVE_NO_MEMORY(attrs[0]);
|
|
ADS_ERROR_HAVE_NO_MEMORY(attrs[1]);
|
|
|
|
do {
|
|
status = ads_ranged_search_internal(ads, mem_ctx,
|
|
scope, base, filter,
|
|
attrs, args, range_attr,
|
|
strings, num_strings,
|
|
&first_usn, &num_retries,
|
|
&more_values);
|
|
|
|
if (NT_STATUS_EQUAL(STATUS_MORE_ENTRIES, ads_ntstatus(status))) {
|
|
continue;
|
|
}
|
|
|
|
if (!ADS_ERR_OK(status)) {
|
|
*num_strings = 0;
|
|
strings = NULL;
|
|
goto done;
|
|
}
|
|
|
|
} while (more_values);
|
|
|
|
done:
|
|
DEBUG(10,("returning with %d strings\n", (int)*num_strings));
|
|
|
|
return status;
|
|
}
|
|
|
|
static ADS_STATUS ads_ranged_search_internal(ADS_STRUCT *ads,
|
|
TALLOC_CTX *mem_ctx,
|
|
int scope,
|
|
const char *base,
|
|
const char *filter,
|
|
const char **attrs,
|
|
void *args,
|
|
const char *range_attr,
|
|
char ***strings,
|
|
size_t *num_strings,
|
|
uint32_t *first_usn,
|
|
int *num_retries,
|
|
bool *more_values)
|
|
{
|
|
LDAPMessage *res = NULL;
|
|
ADS_STATUS status;
|
|
int count;
|
|
uint32_t current_usn;
|
|
|
|
DEBUG(10, ("Searching for attrs[0] = %s, attrs[1] = %s\n", attrs[0], attrs[1]));
|
|
|
|
*more_values = False;
|
|
|
|
status = ads_do_search_retry_internal(ads, base, scope, filter, attrs, args, &res);
|
|
|
|
if (!ADS_ERR_OK(status)) {
|
|
DEBUG(1,("ads_search: %s\n",
|
|
ads_errstr(status)));
|
|
return status;
|
|
}
|
|
|
|
if (!res) {
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
count = ads_count_replies(ads, res);
|
|
if (count == 0) {
|
|
ads_msgfree(ads, res);
|
|
return ADS_ERROR(LDAP_SUCCESS);
|
|
}
|
|
|
|
if (*num_strings == 0) {
|
|
if (!ads_pull_uint32(ads, res, "usnChanged", first_usn)) {
|
|
DEBUG(1, ("could not pull first usnChanged!\n"));
|
|
ads_msgfree(ads, res);
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
}
|
|
|
|
if (!ads_pull_uint32(ads, res, "usnChanged", ¤t_usn)) {
|
|
DEBUG(1, ("could not pull current usnChanged!\n"));
|
|
ads_msgfree(ads, res);
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
if (*first_usn != current_usn) {
|
|
DEBUG(5, ("USN on this record changed"
|
|
" - restarting search\n"));
|
|
if (*num_retries < 5) {
|
|
(*num_retries)++;
|
|
*num_strings = 0;
|
|
ads_msgfree(ads, res);
|
|
return ADS_ERROR_NT(STATUS_MORE_ENTRIES);
|
|
} else {
|
|
DEBUG(5, ("USN on this record changed"
|
|
" - restarted search too many times, aborting!\n"));
|
|
ads_msgfree(ads, res);
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
}
|
|
|
|
*strings = ads_pull_strings_range(ads, mem_ctx, res,
|
|
range_attr,
|
|
*strings,
|
|
&attrs[0],
|
|
num_strings,
|
|
more_values);
|
|
|
|
ads_msgfree(ads, res);
|
|
|
|
/* paranoia checks */
|
|
if (*strings == NULL && *more_values) {
|
|
DEBUG(0,("no strings found but more values???\n"));
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
if (*num_strings == 0 && *more_values) {
|
|
DEBUG(0,("no strings found but more values???\n"));
|
|
return ADS_ERROR(LDAP_NO_MEMORY);
|
|
}
|
|
|
|
return (*more_values) ? ADS_ERROR_NT(STATUS_MORE_ENTRIES) : ADS_ERROR(LDAP_SUCCESS);
|
|
}
|
|
|
|
#endif
|