ctdb-tests: Update statd-callout tests to handle both modes
[samba4-gss.git] / source3 / winbindd / winbindd_reconnect_ads.c
blob367f4c68e88cd675c92a41a332e07accd2f9488d
1 /*
2 Unix SMB/CIFS implementation.
4 Wrapper around winbindd_ads.c to centralize retry logic.
5 Copyright (C) Christof Schmitt 2016
7 Based on winbindd_reconnect.c
8 Copyright (C) Volker Lendecke 2005
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "includes.h"
25 #include "winbindd.h"
27 #ifdef HAVE_ADS
29 #undef DBGC_CLASS
30 #define DBGC_CLASS DBGC_WINBIND
32 extern struct winbindd_methods ads_methods;
34 static bool ldap_reconnect_need_retry(NTSTATUS status,
35 struct winbindd_domain *domain)
37 if (NT_STATUS_IS_OK(status)) {
38 return false;
41 if (!NT_STATUS_IS_ERR(status)) {
42 return false;
45 if (NT_STATUS_EQUAL(status, NT_STATUS_NONE_MAPPED)) {
46 return false;
49 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) {
50 return false;
53 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_GROUP)) {
54 return false;
57 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_ALIAS)) {
58 return false;
61 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_MEMBER)) {
62 return false;
65 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_DOMAIN)) {
66 return false;
69 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_PRIVILEGE)) {
70 return false;
73 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_MEMORY)) {
74 return false;
77 return true;
80 /* List all users */
81 static NTSTATUS query_user_list(struct winbindd_domain *domain,
82 TALLOC_CTX *mem_ctx,
83 uint32_t **rids)
85 NTSTATUS result;
87 result = ads_methods.query_user_list(domain, mem_ctx, rids);
89 if (ldap_reconnect_need_retry(result, domain)) {
90 result = ads_methods.query_user_list(domain, mem_ctx, rids);
93 return result;
96 /* list all domain groups */
97 static NTSTATUS enum_dom_groups(struct winbindd_domain *domain,
98 TALLOC_CTX *mem_ctx,
99 uint32_t *num_entries,
100 struct wb_acct_info **info)
102 NTSTATUS result;
104 result = ads_methods.enum_dom_groups(domain, mem_ctx,
105 num_entries, info);
107 if (ldap_reconnect_need_retry(result, domain)) {
108 result = ads_methods.enum_dom_groups(domain, mem_ctx,
109 num_entries, info);
112 return result;
115 /* List all domain groups */
116 static NTSTATUS enum_local_groups(struct winbindd_domain *domain,
117 TALLOC_CTX *mem_ctx,
118 uint32_t *num_entries,
119 struct wb_acct_info **info)
121 NTSTATUS result;
123 result = ads_methods.enum_local_groups(domain, mem_ctx,
124 num_entries, info);
126 if (ldap_reconnect_need_retry(result, domain)) {
127 result = ads_methods.enum_local_groups(domain, mem_ctx,
128 num_entries, info);
131 return result;
134 /* convert a single name to a sid in a domain */
135 static NTSTATUS name_to_sid(struct winbindd_domain *domain,
136 TALLOC_CTX *mem_ctx,
137 const char *domain_name,
138 const char *name,
139 uint32_t flags,
140 const char **pdom_name,
141 struct dom_sid *sid,
142 enum lsa_SidType *type)
144 NTSTATUS result;
146 result = ads_methods.name_to_sid(domain, mem_ctx, domain_name, name,
147 flags, pdom_name, sid, type);
149 if (reconnect_need_retry(result, domain)) {
150 result = ads_methods.name_to_sid(domain, mem_ctx,
151 domain_name, name, flags,
152 pdom_name, sid, type);
155 return result;
159 convert a domain SID to a user or group name
161 static NTSTATUS sid_to_name(struct winbindd_domain *domain,
162 TALLOC_CTX *mem_ctx,
163 const struct dom_sid *sid,
164 char **domain_name,
165 char **name,
166 enum lsa_SidType *type)
168 NTSTATUS result;
170 result = ads_methods.sid_to_name(domain, mem_ctx, sid,
171 domain_name, name, type);
173 if (reconnect_need_retry(result, domain))
174 result = ads_methods.sid_to_name(domain, mem_ctx, sid,
175 domain_name, name, type);
177 return result;
180 static NTSTATUS rids_to_names(struct winbindd_domain *domain,
181 TALLOC_CTX *mem_ctx,
182 const struct dom_sid *sid,
183 uint32_t *rids,
184 size_t num_rids,
185 char **domain_name,
186 char ***names,
187 enum lsa_SidType **types)
189 NTSTATUS result;
191 result = ads_methods.rids_to_names(domain, mem_ctx, sid,
192 rids, num_rids,
193 domain_name, names, types);
194 if (reconnect_need_retry(result, domain)) {
195 result = ads_methods.rids_to_names(domain, mem_ctx, sid,
196 rids, num_rids, domain_name,
197 names, types);
200 return result;
203 /* Lookup groups a user is a member of. I wish Unix had a call like this! */
204 static NTSTATUS lookup_usergroups(struct winbindd_domain *domain,
205 TALLOC_CTX *mem_ctx,
206 const struct dom_sid *user_sid,
207 uint32_t *num_groups,
208 struct dom_sid **user_gids)
210 NTSTATUS result;
212 result = ads_methods.lookup_usergroups(domain, mem_ctx, user_sid,
213 num_groups, user_gids);
215 if (ldap_reconnect_need_retry(result, domain)) {
216 result = ads_methods.lookup_usergroups(domain, mem_ctx,
217 user_sid, num_groups,
218 user_gids);
221 return result;
224 static NTSTATUS lookup_useraliases(struct winbindd_domain *domain,
225 TALLOC_CTX *mem_ctx,
226 uint32_t num_sids,
227 const struct dom_sid *sids,
228 uint32_t *num_aliases, uint32_t **alias_rids)
230 NTSTATUS result;
232 result = ads_methods.lookup_useraliases(domain, mem_ctx, num_sids, sids,
233 num_aliases, alias_rids);
235 if (reconnect_need_retry(result, domain)) {
236 result = ads_methods.lookup_useraliases(domain, mem_ctx,
237 num_sids, sids,
238 num_aliases,
239 alias_rids);
242 return result;
245 /* Lookup group membership given a rid. */
246 static NTSTATUS lookup_groupmem(struct winbindd_domain *domain,
247 TALLOC_CTX *mem_ctx,
248 const struct dom_sid *group_sid,
249 enum lsa_SidType type,
250 uint32_t *num_names,
251 struct dom_sid **sid_mem, char ***names,
252 uint32_t **name_types)
254 NTSTATUS result;
256 result = ads_methods.lookup_groupmem(domain, mem_ctx, group_sid, type,
257 num_names, sid_mem, names,
258 name_types);
260 if (ldap_reconnect_need_retry(result, domain)) {
261 result = ads_methods.lookup_groupmem(domain, mem_ctx, group_sid,
262 type, num_names, sid_mem,
263 names, name_types);
266 return result;
269 static NTSTATUS lookup_aliasmem(struct winbindd_domain *domain,
270 TALLOC_CTX *mem_ctx,
271 const struct dom_sid *group_sid,
272 enum lsa_SidType type,
273 uint32_t *num_names,
274 struct dom_sid **sid_mem)
276 NTSTATUS result = NT_STATUS_OK;
278 result = ads_methods.lookup_aliasmem(domain,
279 mem_ctx,
280 group_sid,
281 type,
282 num_names,
283 sid_mem);
285 if (ldap_reconnect_need_retry(result, domain)) {
286 result = ads_methods.lookup_aliasmem(domain,
287 mem_ctx,
288 group_sid,
289 type,
290 num_names,
291 sid_mem);
293 return result;
296 /* find the lockout policy of a domain */
297 static NTSTATUS lockout_policy(struct winbindd_domain *domain,
298 TALLOC_CTX *mem_ctx,
299 struct samr_DomInfo12 *policy)
301 NTSTATUS result;
303 result = ads_methods.lockout_policy(domain, mem_ctx, policy);
305 if (reconnect_need_retry(result, domain)) {
306 result = ads_methods.lockout_policy(domain, mem_ctx, policy);
309 return result;
312 /* find the password policy of a domain */
313 static NTSTATUS password_policy(struct winbindd_domain *domain,
314 TALLOC_CTX *mem_ctx,
315 struct samr_DomInfo1 *policy)
317 NTSTATUS result;
319 result = ads_methods.password_policy(domain, mem_ctx, policy);
321 if (reconnect_need_retry(result, domain)) {
322 result = ads_methods.password_policy(domain, mem_ctx, policy);
325 return result;
328 /* get a list of trusted domains */
329 static NTSTATUS trusted_domains(struct winbindd_domain *domain,
330 TALLOC_CTX *mem_ctx,
331 struct netr_DomainTrustList *trusts)
333 NTSTATUS result;
335 result = ads_methods.trusted_domains(domain, mem_ctx, trusts);
337 if (reconnect_need_retry(result, domain)) {
338 result = ads_methods.trusted_domains(domain, mem_ctx, trusts);
341 return result;
344 /* the rpc backend methods are exposed via this structure */
345 struct winbindd_methods reconnect_ads_methods = {
346 true,
347 query_user_list,
348 enum_dom_groups,
349 enum_local_groups,
350 name_to_sid,
351 sid_to_name,
352 rids_to_names,
353 lookup_usergroups,
354 lookup_useraliases,
355 lookup_groupmem,
356 lookup_aliasmem,
357 lockout_policy,
358 password_policy,
359 trusted_domains,
362 #endif