2 ldb database library - ildap backend
4 Copyright (C) Andrew Tridgell 2005
5 Copyright (C) Simo Sorce 2008
7 ** NOTE! The following LGPL license applies to the ldb
8 ** library. This does NOT imply that all of Samba is released
11 This library is free software; you can redistribute it and/or
12 modify it under the terms of the GNU Lesser General Public
13 License as published by the Free Software Foundation; either
14 version 3 of the License, or (at your option) any later version.
16 This library is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
19 Lesser General Public License for more details.
21 You should have received a copy of the GNU Lesser General Public
22 License along with this library; if not, see <http://www.gnu.org/licenses/>.
28 * Component: ldb ildap backend
30 * Description: This is a ldb backend for the internal ldap
31 * client library in Samba4. By using this backend we are
32 * independent of a system ldap library
34 * Author: Andrew Tridgell
38 * - description: make the module use asynchronous calls
44 #include "ldb_module.h"
45 #include "util/dlinklist.h"
47 #include "libcli/ldap/libcli_ldap.h"
48 #include "libcli/ldap/ldap_client.h"
49 #include "auth/auth.h"
50 #include "auth/credentials/credentials.h"
53 struct ldap_connection
*ldap
;
54 struct tevent_context
*event_ctx
;
58 struct ldb_module
*module
;
59 struct ldb_request
*req
;
61 struct ildb_private
*ildb
;
62 struct ldap_request
*ireq
;
64 /* indicate we are already processing
65 * the ldap_request in ildb_callback() */
66 bool in_ildb_callback
;
70 struct ildb_destructor_ctx
*dc
;
73 static void ildb_request_done(struct ildb_context
*ctx
,
74 struct ldb_control
**ctrls
, int error
)
76 struct ldb_context
*ldb
;
77 struct ldb_reply
*ares
;
79 ldb
= ldb_module_get_ctx(ctx
->module
);
83 if (ctx
->req
== NULL
) {
84 /* if the req has been freed already just return */
88 ares
= talloc_zero(ctx
->req
, struct ldb_reply
);
91 ctx
->req
->callback(ctx
->req
, NULL
);
94 ares
->type
= LDB_REPLY_DONE
;
95 ares
->controls
= talloc_steal(ares
, ctrls
);
98 ctx
->req
->callback(ctx
->req
, ares
);
101 static void ildb_auto_done_callback(struct tevent_context
*ev
,
102 struct tevent_timer
*te
,
106 struct ildb_context
*ac
;
108 ac
= talloc_get_type(private_data
, struct ildb_context
);
109 ildb_request_done(ac
, NULL
, LDB_SUCCESS
);
113 convert a ldb_message structure to a list of ldap_mod structures
114 ready for ildap_add() or ildap_modify()
116 static struct ldap_mod
**ildb_msg_to_mods(void *mem_ctx
, int *num_mods
,
117 const struct ldb_message
*msg
,
120 struct ldap_mod
**mods
;
124 /* allocate maximum number of elements needed */
125 mods
= talloc_array(mem_ctx
, struct ldap_mod
*, msg
->num_elements
+1);
132 for (i
= 0; i
< msg
->num_elements
; i
++) {
133 const struct ldb_message_element
*el
= &msg
->elements
[i
];
135 mods
[n
] = talloc(mods
, struct ldap_mod
);
141 mods
[n
]->attrib
= *el
;
143 switch (el
->flags
& LDB_FLAG_MOD_MASK
) {
144 case LDB_FLAG_MOD_ADD
:
145 mods
[n
]->type
= LDAP_MODIFY_ADD
;
147 case LDB_FLAG_MOD_DELETE
:
148 mods
[n
]->type
= LDAP_MODIFY_DELETE
;
150 case LDB_FLAG_MOD_REPLACE
:
151 mods
[n
]->type
= LDAP_MODIFY_REPLACE
;
168 map an ildap NTSTATUS to a ldb error code
170 static int ildb_map_error(struct ldb_module
*module
, NTSTATUS status
)
172 struct ildb_private
*ildb
;
173 struct ldb_context
*ldb
;
176 ildb
= talloc_get_type(ldb_module_get_private(module
), struct ildb_private
);
177 ldb
= ldb_module_get_ctx(module
);
179 if (NT_STATUS_IS_OK(status
)) {
183 mem_ctx
= talloc_new(ildb
);
186 return LDB_ERR_OPERATIONS_ERROR
;
188 ldb_set_errstring(ldb
,
189 ldap_errstr(ildb
->ldap
, mem_ctx
, status
));
190 talloc_free(mem_ctx
);
191 if (NT_STATUS_IS_LDAP(status
)) {
192 return NT_STATUS_LDAP_CODE(status
);
194 return LDB_ERR_OPERATIONS_ERROR
;
197 static void ildb_request_timeout(struct tevent_context
*ev
, struct tevent_timer
*te
,
198 struct timeval t
, void *private_data
)
200 struct ildb_context
*ac
= talloc_get_type(private_data
, struct ildb_context
);
202 if (ac
->ireq
->state
== LDAP_REQUEST_PENDING
) {
203 DLIST_REMOVE(ac
->ireq
->conn
->pending
, ac
->ireq
);
206 ildb_request_done(ac
, NULL
, LDB_ERR_TIME_LIMIT_EXCEEDED
);
209 static void ildb_callback(struct ldap_request
*req
)
211 struct ldb_context
*ldb
;
212 struct ildb_context
*ac
;
214 struct ldap_SearchResEntry
*search
;
215 struct ldap_message
*msg
;
216 struct ldb_control
**controls
;
217 struct ldb_message
*ldbmsg
;
219 bool callback_failed
;
224 ac
= talloc_get_type(req
->async
.private_data
, struct ildb_context
);
225 ldb
= ldb_module_get_ctx(ac
->module
);
226 callback_failed
= false;
227 request_done
= false;
230 /* check if we are already processing this request */
231 if (ac
->in_ildb_callback
) {
234 /* mark the request as being in process */
235 ac
->in_ildb_callback
= true;
237 if (!NT_STATUS_IS_OK(req
->status
)) {
238 ret
= ildb_map_error(ac
->module
, req
->status
);
239 ildb_request_done(ac
, NULL
, ret
);
243 if (req
->num_replies
< 1) {
244 ret
= LDB_ERR_OPERATIONS_ERROR
;
245 ildb_request_done(ac
, NULL
, ret
);
251 case LDAP_TAG_ModifyRequest
:
252 if (req
->replies
[0]->type
!= LDAP_TAG_ModifyResponse
) {
253 ret
= LDB_ERR_PROTOCOL_ERROR
;
256 status
= ldap_check_response(ac
->ireq
->conn
, &req
->replies
[0]->r
.GeneralResult
);
257 ret
= ildb_map_error(ac
->module
, status
);
261 case LDAP_TAG_AddRequest
:
262 if (req
->replies
[0]->type
!= LDAP_TAG_AddResponse
) {
263 ret
= LDB_ERR_PROTOCOL_ERROR
;
266 status
= ldap_check_response(ac
->ireq
->conn
, &req
->replies
[0]->r
.GeneralResult
);
267 ret
= ildb_map_error(ac
->module
, status
);
271 case LDAP_TAG_DelRequest
:
272 if (req
->replies
[0]->type
!= LDAP_TAG_DelResponse
) {
273 ret
= LDB_ERR_PROTOCOL_ERROR
;
276 status
= ldap_check_response(ac
->ireq
->conn
, &req
->replies
[0]->r
.GeneralResult
);
277 ret
= ildb_map_error(ac
->module
, status
);
281 case LDAP_TAG_ModifyDNRequest
:
282 if (req
->replies
[0]->type
!= LDAP_TAG_ModifyDNResponse
) {
283 ret
= LDB_ERR_PROTOCOL_ERROR
;
286 status
= ldap_check_response(ac
->ireq
->conn
, &req
->replies
[0]->r
.GeneralResult
);
287 ret
= ildb_map_error(ac
->module
, status
);
291 case LDAP_TAG_SearchRequest
:
292 /* loop over all messages */
293 for (i
= 0; i
< req
->num_replies
; i
++) {
295 msg
= req
->replies
[i
];
298 case LDAP_TAG_SearchResultDone
:
300 status
= ldap_check_response(ac
->ireq
->conn
, &msg
->r
.GeneralResult
);
301 if (!NT_STATUS_IS_OK(status
)) {
302 ret
= ildb_map_error(ac
->module
, status
);
306 controls
= talloc_steal(ac
, msg
->controls
);
307 if (msg
->r
.SearchResultDone
.resultcode
) {
308 if (msg
->r
.SearchResultDone
.errormessage
) {
309 ldb_set_errstring(ldb
, msg
->r
.SearchResultDone
.errormessage
);
313 ret
= msg
->r
.SearchResultDone
.resultcode
;
317 case LDAP_TAG_SearchResultEntry
:
319 ldbmsg
= ldb_msg_new(ac
);
321 ret
= LDB_ERR_OPERATIONS_ERROR
;
325 search
= &(msg
->r
.SearchResultEntry
);
327 ldbmsg
->dn
= ldb_dn_new(ldbmsg
, ldb
, search
->dn
);
328 if ( ! ldb_dn_validate(ldbmsg
->dn
)) {
329 ret
= LDB_ERR_OPERATIONS_ERROR
;
332 ldbmsg
->num_elements
= search
->num_attributes
;
333 ldbmsg
->elements
= talloc_move(ldbmsg
, &search
->attributes
);
335 controls
= talloc_steal(ac
, msg
->controls
);
337 ret
= ldb_module_send_entry(ac
->req
, ldbmsg
, controls
);
338 if (ret
!= LDB_SUCCESS
) {
339 callback_failed
= true;
344 case LDAP_TAG_SearchResultReference
:
346 referral
= talloc_strdup(ac
, msg
->r
.SearchResultReference
.referral
);
348 ret
= ldb_module_send_referral(ac
->req
, referral
);
349 if (ret
!= LDB_SUCCESS
) {
350 callback_failed
= true;
356 /* TAG not handled, fail ! */
357 ret
= LDB_ERR_PROTOCOL_ERROR
;
361 if (ret
!= LDB_SUCCESS
) {
366 talloc_free(req
->replies
);
368 req
->num_replies
= 0;
373 ret
= LDB_ERR_PROTOCOL_ERROR
;
377 if (ret
!= LDB_SUCCESS
) {
379 /* if the callback failed the caller will have freed the
380 * request. Just return and don't try to use it */
381 if ( ! callback_failed
) {
386 /* mark the request as not being in progress */
387 ac
->in_ildb_callback
= false;
390 ildb_request_done(ac
, controls
, ret
);
396 static int ildb_request_send(struct ildb_context
*ac
, struct ldap_message
*msg
)
398 struct ldb_context
*ldb
;
399 struct ldap_request
*req
;
402 return LDB_ERR_OPERATIONS_ERROR
;
405 ldb
= ldb_module_get_ctx(ac
->module
);
407 ldb_request_set_state(ac
->req
, LDB_ASYNC_PENDING
);
409 req
= ldap_request_send(ac
->ildb
->ldap
, msg
);
411 ldb_set_errstring(ldb
, "async send request failed");
412 return LDB_ERR_OPERATIONS_ERROR
;
414 ac
->ireq
= talloc_reparent(ac
->ildb
->ldap
, ac
, req
);
416 if (!ac
->ireq
->conn
) {
417 ldb_set_errstring(ldb
, "connection to remote LDAP server dropped?");
418 return LDB_ERR_OPERATIONS_ERROR
;
421 talloc_free(req
->time_event
);
422 req
->time_event
= NULL
;
423 if (ac
->req
->timeout
) {
424 req
->time_event
= tevent_add_timer(ac
->ildb
->event_ctx
, ac
,
425 timeval_current_ofs(ac
->req
->timeout
, 0),
426 ildb_request_timeout
, ac
);
429 req
->async
.fn
= ildb_callback
;
430 req
->async
.private_data
= ac
;
436 search for matching records using an asynchronous function
438 static int ildb_search(struct ildb_context
*ac
)
440 struct ldb_context
*ldb
;
441 struct ldb_request
*req
= ac
->req
;
442 struct ldap_message
*msg
;
445 ldb
= ldb_module_get_ctx(ac
->module
);
447 if (!req
->callback
|| !req
->context
) {
448 ldb_set_errstring(ldb
, "Async interface called with NULL callback function or NULL context");
449 return LDB_ERR_OPERATIONS_ERROR
;
452 if (req
->op
.search
.tree
== NULL
) {
453 ldb_set_errstring(ldb
, "Invalid expression parse tree");
454 return LDB_ERR_OPERATIONS_ERROR
;
457 msg
= new_ldap_message(req
);
459 ldb_set_errstring(ldb
, "Out of Memory");
460 return LDB_ERR_OPERATIONS_ERROR
;
463 msg
->type
= LDAP_TAG_SearchRequest
;
465 if (req
->op
.search
.base
== NULL
) {
466 msg
->r
.SearchRequest
.basedn
= talloc_strdup(msg
, "");
468 msg
->r
.SearchRequest
.basedn
= ldb_dn_get_extended_linearized(msg
, req
->op
.search
.base
, 0);
470 if (msg
->r
.SearchRequest
.basedn
== NULL
) {
471 ldb_set_errstring(ldb
, "Unable to determine baseDN");
473 return LDB_ERR_OPERATIONS_ERROR
;
476 if (req
->op
.search
.scope
== LDB_SCOPE_DEFAULT
) {
477 msg
->r
.SearchRequest
.scope
= LDB_SCOPE_SUBTREE
;
479 msg
->r
.SearchRequest
.scope
= req
->op
.search
.scope
;
482 msg
->r
.SearchRequest
.deref
= LDAP_DEREFERENCE_NEVER
;
483 msg
->r
.SearchRequest
.timelimit
= 0;
484 msg
->r
.SearchRequest
.sizelimit
= 0;
485 msg
->r
.SearchRequest
.attributesonly
= 0;
486 msg
->r
.SearchRequest
.tree
= discard_const(req
->op
.search
.tree
);
488 for (n
= 0; req
->op
.search
.attrs
&& req
->op
.search
.attrs
[n
]; n
++) /* noop */ ;
489 msg
->r
.SearchRequest
.num_attributes
= n
;
490 msg
->r
.SearchRequest
.attributes
= req
->op
.search
.attrs
;
491 msg
->controls
= req
->controls
;
493 return ildb_request_send(ac
, msg
);
499 static int ildb_add(struct ildb_context
*ac
)
501 struct ldb_request
*req
= ac
->req
;
502 struct ldap_message
*msg
;
503 struct ldap_mod
**mods
;
506 msg
= new_ldap_message(req
);
508 return LDB_ERR_OPERATIONS_ERROR
;
511 msg
->type
= LDAP_TAG_AddRequest
;
513 msg
->r
.AddRequest
.dn
= ldb_dn_get_extended_linearized(msg
, req
->op
.add
.message
->dn
, 0);
514 if (msg
->r
.AddRequest
.dn
== NULL
) {
516 return LDB_ERR_INVALID_DN_SYNTAX
;
519 mods
= ildb_msg_to_mods(msg
, &n
, req
->op
.add
.message
, 0);
522 return LDB_ERR_OPERATIONS_ERROR
;
525 msg
->r
.AddRequest
.num_attributes
= n
;
526 msg
->r
.AddRequest
.attributes
= talloc_array(msg
, struct ldb_message_element
, n
);
527 if (msg
->r
.AddRequest
.attributes
== NULL
) {
529 return LDB_ERR_OPERATIONS_ERROR
;
532 for (i
= 0; i
< n
; i
++) {
533 msg
->r
.AddRequest
.attributes
[i
] = mods
[i
]->attrib
;
535 msg
->controls
= req
->controls
;
537 return ildb_request_send(ac
, msg
);
543 static int ildb_modify(struct ildb_context
*ac
)
545 struct ldb_request
*req
= ac
->req
;
546 struct ldap_message
*msg
;
547 struct ldap_mod
**mods
;
550 msg
= new_ldap_message(req
);
552 return LDB_ERR_OPERATIONS_ERROR
;
555 msg
->type
= LDAP_TAG_ModifyRequest
;
557 msg
->r
.ModifyRequest
.dn
= ldb_dn_get_extended_linearized(msg
, req
->op
.mod
.message
->dn
, 0);
558 if (msg
->r
.ModifyRequest
.dn
== NULL
) {
560 return LDB_ERR_INVALID_DN_SYNTAX
;
563 mods
= ildb_msg_to_mods(msg
, &n
, req
->op
.mod
.message
, 1);
566 return LDB_ERR_OPERATIONS_ERROR
;
569 msg
->r
.ModifyRequest
.num_mods
= n
;
570 msg
->r
.ModifyRequest
.mods
= talloc_array(msg
, struct ldap_mod
, n
);
571 if (msg
->r
.ModifyRequest
.mods
== NULL
) {
573 return LDB_ERR_OPERATIONS_ERROR
;
576 for (i
= 0; i
< n
; i
++) {
577 msg
->r
.ModifyRequest
.mods
[i
] = *mods
[i
];
579 msg
->controls
= req
->controls
;
580 return ildb_request_send(ac
, msg
);
586 static int ildb_delete(struct ildb_context
*ac
)
588 struct ldb_request
*req
= ac
->req
;
589 struct ldap_message
*msg
;
591 msg
= new_ldap_message(req
);
593 return LDB_ERR_OPERATIONS_ERROR
;
596 msg
->type
= LDAP_TAG_DelRequest
;
598 msg
->r
.DelRequest
.dn
= ldb_dn_get_extended_linearized(msg
, req
->op
.del
.dn
, 0);
599 if (msg
->r
.DelRequest
.dn
== NULL
) {
601 return LDB_ERR_INVALID_DN_SYNTAX
;
603 msg
->controls
= req
->controls
;
605 return ildb_request_send(ac
, msg
);
611 static int ildb_rename(struct ildb_context
*ac
)
613 struct ldb_request
*req
= ac
->req
;
614 struct ldap_message
*msg
;
615 const char *rdn_name
;
616 const struct ldb_val
*rdn_val
;
618 msg
= new_ldap_message(req
);
620 return LDB_ERR_OPERATIONS_ERROR
;
623 msg
->type
= LDAP_TAG_ModifyDNRequest
;
624 msg
->r
.ModifyDNRequest
.dn
= ldb_dn_get_extended_linearized(msg
, req
->op
.rename
.olddn
, 0);
625 if (msg
->r
.ModifyDNRequest
.dn
== NULL
) {
627 return LDB_ERR_INVALID_DN_SYNTAX
;
630 rdn_name
= ldb_dn_get_rdn_name(req
->op
.rename
.newdn
);
631 rdn_val
= ldb_dn_get_rdn_val(req
->op
.rename
.newdn
);
633 if ((rdn_name
!= NULL
) && (rdn_val
!= NULL
)) {
634 msg
->r
.ModifyDNRequest
.newrdn
=
635 talloc_asprintf(msg
, "%s=%s", rdn_name
,
636 rdn_val
->length
> 0 ? ldb_dn_escape_value(msg
, *rdn_val
) : "");
638 msg
->r
.ModifyDNRequest
.newrdn
= talloc_strdup(msg
, "");
640 if (msg
->r
.ModifyDNRequest
.newrdn
== NULL
) {
642 return LDB_ERR_OPERATIONS_ERROR
;
645 msg
->r
.ModifyDNRequest
.newsuperior
=
646 ldb_dn_alloc_linearized(msg
, ldb_dn_get_parent(msg
, req
->op
.rename
.newdn
));
647 if (msg
->r
.ModifyDNRequest
.newsuperior
== NULL
) {
649 return LDB_ERR_INVALID_DN_SYNTAX
;
652 msg
->r
.ModifyDNRequest
.deleteolddn
= true;
653 msg
->controls
= req
->controls
;
655 return ildb_request_send(ac
, msg
);
658 static int ildb_start_trans(struct ldb_module
*module
)
660 /* TODO implement a local locking mechanism here */
665 static int ildb_end_trans(struct ldb_module
*module
)
667 /* TODO implement a local transaction mechanism here */
672 static int ildb_del_trans(struct ldb_module
*module
)
674 /* TODO implement a local locking mechanism here */
679 static bool ildb_dn_is_special(struct ldb_request
*req
)
681 struct ldb_dn
*dn
= NULL
;
683 switch (req
->operation
) {
685 dn
= req
->op
.search
.base
;
688 dn
= req
->op
.add
.message
->dn
;
691 dn
= req
->op
.mod
.message
->dn
;
697 dn
= req
->op
.rename
.olddn
;
703 if (dn
&& ldb_dn_is_special(dn
)) {
709 static int ildb_handle_request(struct ldb_module
*module
, struct ldb_request
*req
)
711 struct ldb_context
*ldb
;
712 struct ildb_private
*ildb
;
713 struct ildb_context
*ac
;
714 struct tevent_timer
*te
;
717 ildb
= talloc_get_type(ldb_module_get_private(module
), struct ildb_private
);
718 ldb
= ldb_module_get_ctx(module
);
720 if (req
->starttime
== 0 || req
->timeout
== 0) {
721 ldb_set_errstring(ldb
, "Invalid timeout settings");
722 return LDB_ERR_TIME_LIMIT_EXCEEDED
;
725 ac
= talloc_zero(req
, struct ildb_context
);
727 ldb_set_errstring(ldb
, "Out of Memory");
728 return LDB_ERR_OPERATIONS_ERROR
;
735 if (ildb_dn_is_special(req
)) {
737 te
= tevent_add_timer(ac
->ildb
->event_ctx
,
739 ildb_auto_done_callback
, ac
);
741 return LDB_ERR_OPERATIONS_ERROR
;
747 switch (ac
->req
->operation
) {
749 ret
= ildb_search(ac
);
755 ret
= ildb_modify(ac
);
758 ret
= ildb_delete(ac
);
761 ret
= ildb_rename(ac
);
764 /* no other op supported */
765 ret
= LDB_ERR_PROTOCOL_ERROR
;
772 static const struct ldb_module_ops ildb_ops
= {
774 .search
= ildb_handle_request
,
775 .add
= ildb_handle_request
,
776 .modify
= ildb_handle_request
,
777 .del
= ildb_handle_request
,
778 .rename
= ildb_handle_request
,
779 /* .request = ildb_handle_request, */
780 .start_transaction
= ildb_start_trans
,
781 .end_transaction
= ildb_end_trans
,
782 .del_transaction
= ildb_del_trans
,
786 connect to the database
788 static int ildb_connect(struct ldb_context
*ldb
, const char *url
,
789 unsigned int flags
, const char *options
[],
790 struct ldb_module
**_module
)
792 struct ldb_module
*module
;
793 struct ildb_private
*ildb
;
794 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
795 struct cli_credentials
*creds
;
796 struct loadparm_context
*lp_ctx
;
798 module
= ldb_module_new(ldb
, ldb
, "ldb_ildap backend", &ildb_ops
);
799 if (!module
) return LDB_ERR_OPERATIONS_ERROR
;
801 ildb
= talloc(module
, struct ildb_private
);
806 ldb_module_set_private(module
, ildb
);
808 ildb
->event_ctx
= ldb_get_event_context(ldb
);
810 lp_ctx
= talloc_get_type(ldb_get_opaque(ldb
, "loadparm"),
811 struct loadparm_context
);
813 ildb
->ldap
= ldap4_new_connection(ildb
, lp_ctx
,
820 if (flags
& LDB_FLG_RECONNECT
) {
821 ldap_set_reconn_params(ildb
->ldap
, 10);
824 status
= ldap_connect(ildb
->ldap
, url
);
825 if (!NT_STATUS_IS_OK(status
)) {
826 ldb_debug(ldb
, LDB_DEBUG_ERROR
, "Failed to connect to ldap URL '%s' - %s",
827 url
, ldap_errstr(ildb
->ldap
, module
, status
));
831 /* caller can optionally setup credentials using the opaque token 'credentials' */
832 creds
= talloc_get_type(ldb_get_opaque(ldb
, "credentials"), struct cli_credentials
);
834 struct auth_session_info
*session_info
= talloc_get_type(ldb_get_opaque(ldb
, "sessionInfo"), struct auth_session_info
);
836 creds
= session_info
->credentials
;
840 if (creds
!= NULL
&& cli_credentials_authentication_requested(creds
)) {
841 const char *bind_dn
= cli_credentials_get_bind_dn(creds
);
843 const char *password
= cli_credentials_get_password(creds
);
844 status
= ldap_bind_simple(ildb
->ldap
, bind_dn
, password
);
845 if (!NT_STATUS_IS_OK(status
)) {
846 ldb_debug(ldb
, LDB_DEBUG_ERROR
, "Failed to bind - %s",
847 ldap_errstr(ildb
->ldap
, module
, status
));
851 status
= ldap_bind_sasl(ildb
->ldap
, creds
, lp_ctx
);
852 if (!NT_STATUS_IS_OK(status
)) {
853 ldb_debug(ldb
, LDB_DEBUG_ERROR
, "Failed to bind - %s",
854 ldap_errstr(ildb
->ldap
, module
, status
));
865 if (NT_STATUS_IS_LDAP(status
)) {
866 return NT_STATUS_LDAP_CODE(status
);
867 } else if (NT_STATUS_EQUAL(status
, NT_STATUS_WRONG_PASSWORD
)
868 || NT_STATUS_EQUAL(status
, NT_STATUS_NO_SUCH_USER
)
869 || NT_STATUS_EQUAL(status
, NT_STATUS_LOGON_FAILURE
)
870 || NT_STATUS_EQUAL(status
, NT_STATUS_ACCOUNT_LOCKED_OUT
)) {
871 return LDB_ERR_INVALID_CREDENTIALS
;
873 return LDB_ERR_OPERATIONS_ERROR
;
877 initialise the module
879 _PUBLIC_
int ldb_ildap_init(const char *ldb_version
)
882 const char *names
[] = { "ldap", "ldaps", "ldapi", NULL
};
883 for (i
=0; names
[i
]; i
++) {
884 ret
= ldb_register_backend(names
[i
], ildb_connect
, true);
885 if (ret
!= LDB_SUCCESS
) {