lib: Fix a shutdown crash with "clustering = yes"
[Samba.git] / source3 / winbindd / winbindd_reconnect_ads.c
blobf77430572d07fb25d854c4aec40918dd3e92a8e6
1 /*
2 Unix SMB/CIFS implementation.
4 Wrapper around winbindd_ads.c to centralize retry logic.
5 Copyright (C) Christof Schmitt 2016
7 Based on winbindd_reconnect.c
8 Copyright (C) Volker Lendecke 2005
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "includes.h"
25 #include "winbindd.h"
27 #ifdef HAVE_ADS
29 #undef DBGC_CLASS
30 #define DBGC_CLASS DBGC_WINBIND
32 extern struct winbindd_methods ads_methods;
34 static bool ldap_reconnect_need_retry(NTSTATUS status,
35 struct winbindd_domain *domain)
37 if (NT_STATUS_IS_OK(status)) {
38 return false;
41 if (!NT_STATUS_IS_ERR(status)) {
42 return false;
45 if (NT_STATUS_EQUAL(status, NT_STATUS_NONE_MAPPED)) {
46 return false;
49 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) {
50 return false;
53 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_GROUP)) {
54 return false;
57 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_ALIAS)) {
58 return false;
61 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_MEMBER)) {
62 return false;
65 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_DOMAIN)) {
66 return false;
69 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_PRIVILEGE)) {
70 return false;
73 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_MEMORY)) {
74 return false;
77 return true;
80 /* List all users */
81 static NTSTATUS query_user_list(struct winbindd_domain *domain,
82 TALLOC_CTX *mem_ctx,
83 uint32_t **rids)
85 NTSTATUS result;
87 result = ads_methods.query_user_list(domain, mem_ctx, rids);
89 if (ldap_reconnect_need_retry(result, domain)) {
90 result = ads_methods.query_user_list(domain, mem_ctx, rids);
93 return result;
96 /* list all domain groups */
97 static NTSTATUS enum_dom_groups(struct winbindd_domain *domain,
98 TALLOC_CTX *mem_ctx,
99 uint32_t *num_entries,
100 struct wb_acct_info **info)
102 NTSTATUS result;
104 result = ads_methods.enum_dom_groups(domain, mem_ctx,
105 num_entries, info);
107 if (ldap_reconnect_need_retry(result, domain)) {
108 result = ads_methods.enum_dom_groups(domain, mem_ctx,
109 num_entries, info);
112 return result;
115 /* List all domain groups */
116 static NTSTATUS enum_local_groups(struct winbindd_domain *domain,
117 TALLOC_CTX *mem_ctx,
118 uint32_t *num_entries,
119 struct wb_acct_info **info)
121 NTSTATUS result;
123 result = ads_methods.enum_local_groups(domain, mem_ctx,
124 num_entries, info);
126 if (ldap_reconnect_need_retry(result, domain)) {
127 result = ads_methods.enum_local_groups(domain, mem_ctx,
128 num_entries, info);
131 return result;
134 /* convert a single name to a sid in a domain */
135 static NTSTATUS name_to_sid(struct winbindd_domain *domain,
136 TALLOC_CTX *mem_ctx,
137 const char *domain_name,
138 const char *name,
139 uint32_t flags,
140 const char **pdom_name,
141 struct dom_sid *sid,
142 enum lsa_SidType *type)
144 NTSTATUS result;
146 result = ads_methods.name_to_sid(domain, mem_ctx, domain_name, name,
147 flags, pdom_name, sid, type);
149 if (reconnect_need_retry(result, domain)) {
150 result = ads_methods.name_to_sid(domain, mem_ctx,
151 domain_name, name, flags,
152 pdom_name, sid, type);
155 return result;
159 convert a domain SID to a user or group name
161 static NTSTATUS sid_to_name(struct winbindd_domain *domain,
162 TALLOC_CTX *mem_ctx,
163 const struct dom_sid *sid,
164 char **domain_name,
165 char **name,
166 enum lsa_SidType *type)
168 NTSTATUS result;
170 result = ads_methods.sid_to_name(domain, mem_ctx, sid,
171 domain_name, name, type);
173 if (reconnect_need_retry(result, domain))
174 result = ads_methods.sid_to_name(domain, mem_ctx, sid,
175 domain_name, name, type);
177 return result;
180 static NTSTATUS rids_to_names(struct winbindd_domain *domain,
181 TALLOC_CTX *mem_ctx,
182 const struct dom_sid *sid,
183 uint32_t *rids,
184 size_t num_rids,
185 char **domain_name,
186 char ***names,
187 enum lsa_SidType **types)
189 NTSTATUS result;
191 result = ads_methods.rids_to_names(domain, mem_ctx, sid,
192 rids, num_rids,
193 domain_name, names, types);
194 if (reconnect_need_retry(result, domain)) {
195 result = ads_methods.rids_to_names(domain, mem_ctx, sid,
196 rids, num_rids, domain_name,
197 names, types);
200 return result;
203 /* Lookup groups a user is a member of. I wish Unix had a call like this! */
204 static NTSTATUS lookup_usergroups(struct winbindd_domain *domain,
205 TALLOC_CTX *mem_ctx,
206 const struct dom_sid *user_sid,
207 uint32_t *num_groups,
208 struct dom_sid **user_gids)
210 NTSTATUS result;
212 result = ads_methods.lookup_usergroups(domain, mem_ctx, user_sid,
213 num_groups, user_gids);
215 if (ldap_reconnect_need_retry(result, domain)) {
216 result = ads_methods.lookup_usergroups(domain, mem_ctx,
217 user_sid, num_groups,
218 user_gids);
221 return result;
224 static NTSTATUS lookup_useraliases(struct winbindd_domain *domain,
225 TALLOC_CTX *mem_ctx,
226 uint32_t num_sids,
227 const struct dom_sid *sids,
228 uint32_t *num_aliases, uint32_t **alias_rids)
230 NTSTATUS result;
232 result = ads_methods.lookup_useraliases(domain, mem_ctx, num_sids, sids,
233 num_aliases, alias_rids);
235 if (reconnect_need_retry(result, domain)) {
236 result = ads_methods.lookup_useraliases(domain, mem_ctx,
237 num_sids, sids,
238 num_aliases,
239 alias_rids);
242 return result;
245 /* Lookup group membership given a rid. */
246 static NTSTATUS lookup_groupmem(struct winbindd_domain *domain,
247 TALLOC_CTX *mem_ctx,
248 const struct dom_sid *group_sid,
249 enum lsa_SidType type,
250 uint32_t *num_names,
251 struct dom_sid **sid_mem, char ***names,
252 uint32_t **name_types)
254 NTSTATUS result;
256 result = ads_methods.lookup_groupmem(domain, mem_ctx, group_sid, type,
257 num_names, sid_mem, names,
258 name_types);
260 if (ldap_reconnect_need_retry(result, domain)) {
261 result = ads_methods.lookup_groupmem(domain, mem_ctx, group_sid,
262 type, num_names, sid_mem,
263 names, name_types);
266 return result;
269 /* find the sequence number for a domain */
270 static NTSTATUS sequence_number(struct winbindd_domain *domain, uint32_t *seq)
272 NTSTATUS result;
274 result = ads_methods.sequence_number(domain, seq);
276 if (ldap_reconnect_need_retry(result, domain)) {
277 result = ads_methods.sequence_number(domain, seq);
280 return result;
283 /* find the lockout policy of a domain */
284 static NTSTATUS lockout_policy(struct winbindd_domain *domain,
285 TALLOC_CTX *mem_ctx,
286 struct samr_DomInfo12 *policy)
288 NTSTATUS result;
290 result = ads_methods.lockout_policy(domain, mem_ctx, policy);
292 if (reconnect_need_retry(result, domain)) {
293 result = ads_methods.lockout_policy(domain, mem_ctx, policy);
296 return result;
299 /* find the password policy of a domain */
300 static NTSTATUS password_policy(struct winbindd_domain *domain,
301 TALLOC_CTX *mem_ctx,
302 struct samr_DomInfo1 *policy)
304 NTSTATUS result;
306 result = ads_methods.password_policy(domain, mem_ctx, policy);
308 if (reconnect_need_retry(result, domain)) {
309 result = ads_methods.password_policy(domain, mem_ctx, policy);
312 return result;
315 /* get a list of trusted domains */
316 static NTSTATUS trusted_domains(struct winbindd_domain *domain,
317 TALLOC_CTX *mem_ctx,
318 struct netr_DomainTrustList *trusts)
320 NTSTATUS result;
322 result = ads_methods.trusted_domains(domain, mem_ctx, trusts);
324 if (reconnect_need_retry(result, domain)) {
325 result = ads_methods.trusted_domains(domain, mem_ctx, trusts);
328 return result;
331 /* the rpc backend methods are exposed via this structure */
332 struct winbindd_methods reconnect_ads_methods = {
333 true,
334 query_user_list,
335 enum_dom_groups,
336 enum_local_groups,
337 name_to_sid,
338 sid_to_name,
339 rids_to_names,
340 lookup_usergroups,
341 lookup_useraliases,
342 lookup_groupmem,
343 sequence_number,
344 lockout_policy,
345 password_policy,
346 trusted_domains,
349 #endif