2015-12-26 22:44:43 +00:00
|
|
|
#include "stdafx.h"
|
|
|
|
#include "DrsConnection.h"
|
|
|
|
#include "RpcTypeConverter.h"
|
|
|
|
|
|
|
|
using namespace DSInternals::Common;
|
2016-10-01 19:58:38 +00:00
|
|
|
using namespace DSInternals::Common::Exceptions;
|
2015-12-26 22:44:43 +00:00
|
|
|
using namespace DSInternals::Common::Interop;
|
|
|
|
using namespace DSInternals::Replication::Model;
|
|
|
|
|
|
|
|
using namespace System;
|
|
|
|
using namespace System::ComponentModel;
|
|
|
|
using namespace System::Reflection;
|
|
|
|
using namespace System::Security::Principal;
|
|
|
|
using namespace System::Runtime::InteropServices;
|
|
|
|
using namespace Microsoft::Win32::SafeHandles;
|
|
|
|
using namespace msclr::interop;
|
|
|
|
|
|
|
|
namespace DSInternals
|
|
|
|
{
|
|
|
|
namespace Replication
|
|
|
|
{
|
|
|
|
namespace Interop
|
|
|
|
{
|
|
|
|
DrsConnection::DrsConnection(IntPtr rpcHandle, Guid clientDsa)
|
|
|
|
: SafeHandleZeroOrMinusOneIsInvalid(true)
|
|
|
|
{
|
|
|
|
this->_clientDsa = clientDsa;
|
2016-04-30 09:19:32 +00:00
|
|
|
this->_serverReplEpoch = DrsConnection::defaultReplEpoch;
|
2015-12-26 22:44:43 +00:00
|
|
|
|
|
|
|
// Register the RetrieveSessionKey as RCP security callback. Mind the delegate lifecycle.
|
|
|
|
this->_securityCallback = gcnew SecurityCallback(this, &DrsConnection::RetrieveSessionKey);
|
2016-04-30 09:19:32 +00:00
|
|
|
RPC_STATUS status = RpcBindingSetOption(rpcHandle.ToPointer(), RPC_C_OPT_SECURITY_CALLBACK, (ULONG_PTR)Marshal::GetFunctionPointerForDelegate(this->_securityCallback).ToPointer());
|
2015-12-26 22:44:43 +00:00
|
|
|
|
2016-04-30 09:19:32 +00:00
|
|
|
this->Bind(rpcHandle);
|
|
|
|
if (this->_serverReplEpoch != DrsConnection::defaultReplEpoch)
|
|
|
|
{
|
|
|
|
// The domain must have been renamed, so we need to rebind with the proper dwReplEpoch.
|
|
|
|
this->ReleaseHandle();
|
|
|
|
this->Bind(rpcHandle);
|
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
DrsConnection::DrsConnection(IntPtr preexistingDrssHandle, bool ownsHandle)
|
|
|
|
: SafeHandleZeroOrMinusOneIsInvalid(ownsHandle)
|
|
|
|
{
|
|
|
|
this->SetHandle(preexistingDrssHandle);
|
|
|
|
}
|
|
|
|
|
|
|
|
DrsConnection::DrsConnection()
|
|
|
|
: SafeHandleZeroOrMinusOneIsInvalid(true)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2016-04-30 09:19:32 +00:00
|
|
|
void DrsConnection::Bind(IntPtr rpcHandle)
|
|
|
|
{
|
|
|
|
// Init binding parameters
|
|
|
|
UUID clientDsaUuid = RpcTypeConverter::ToUUID(this->_clientDsa);
|
|
|
|
auto clientInfo = this->CreateClientInfo();
|
|
|
|
DRS_EXTENSIONS *genericServerInfo = nullptr;
|
|
|
|
DRS_HANDLE drsHandle = nullptr;
|
|
|
|
|
|
|
|
// Bind
|
|
|
|
ULONG result = IDL_DRSBind_NoSEH(rpcHandle.ToPointer(), &clientDsaUuid, (DRS_EXTENSIONS*)clientInfo.get(), &genericServerInfo, &drsHandle);
|
|
|
|
Validator::AssertSuccess((Win32ErrorCode)result);
|
|
|
|
|
|
|
|
// Prevent memory leak by storing the genericServerInfo in midl_ptr
|
|
|
|
auto genericServerInfoSafePtr = midl_ptr<DRS_EXTENSIONS>(genericServerInfo);
|
|
|
|
|
|
|
|
// Store the DRS handle
|
|
|
|
this->SetHandle((IntPtr)drsHandle);
|
|
|
|
|
|
|
|
// Parse the server info
|
|
|
|
DRS_EXTENSIONS_INT serverInfo = DRS_EXTENSIONS_INT(genericServerInfo);
|
|
|
|
this->_serverSiteObjectGuid = RpcTypeConverter::ToGuid(serverInfo.siteObjGuid);
|
|
|
|
this->_serverReplEpoch = serverInfo.dwReplEpoch;
|
2017-04-09 19:16:18 +00:00
|
|
|
this->_serverCapabilities = serverInfo.dwFlags;
|
2016-04-30 09:19:32 +00:00
|
|
|
}
|
|
|
|
|
2015-12-26 22:44:43 +00:00
|
|
|
array<byte>^ DrsConnection::SessionKey::get()
|
|
|
|
{
|
|
|
|
return this->_sessionKey;
|
|
|
|
}
|
2016-09-16 15:22:16 +00:00
|
|
|
|
|
|
|
Guid DrsConnection::ServerSiteGuid::get()
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
2016-09-16 15:22:16 +00:00
|
|
|
return this->_serverSiteObjectGuid;
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
midl_ptr<DRS_EXTENSIONS_INT> DrsConnection::CreateClientInfo()
|
|
|
|
{
|
|
|
|
auto clientInfo = make_midl_ptr<DRS_EXTENSIONS_INT>();
|
|
|
|
clientInfo->dwFlags = DRS_EXT::ALL_EXT;
|
2017-04-09 19:16:18 +00:00
|
|
|
clientInfo->dwFlagsExt = DRS_EXT2::DRS_EXT_LH_BETA2 | DRS_EXT2::DRS_EXT_RECYCLE_BIN | DRS_EXT2::DRS_EXT_PAM;
|
2016-06-05 23:01:54 +00:00
|
|
|
clientInfo->dwExtCaps = DRS_EXT2::DRS_EXT_LH_BETA2 | DRS_EXT2::DRS_EXT_RECYCLE_BIN | DRS_EXT2::DRS_EXT_PAM;
|
2016-04-30 09:19:32 +00:00
|
|
|
clientInfo->dwReplEpoch = this->_serverReplEpoch;
|
2015-12-26 22:44:43 +00:00
|
|
|
return clientInfo;
|
|
|
|
}
|
|
|
|
|
2016-09-16 15:22:16 +00:00
|
|
|
/// <summary>
|
|
|
|
/// Gets the replication cursor information for the specified partition.
|
|
|
|
/// </summary>
|
|
|
|
/// <param name="namingContext">The distinguished name of the partition for which to retrieve the replication cursor information.</param>
|
|
|
|
array<ReplicationCursor^>^ DrsConnection::GetReplicationCursors(String^ namingContext)
|
|
|
|
{
|
|
|
|
// Validate connection
|
|
|
|
// TODO: Extract connection validation as a proteted method
|
|
|
|
if (this->IsInvalid)
|
|
|
|
{
|
|
|
|
// TODO: Exception type
|
|
|
|
throw gcnew Exception("Not connected");
|
|
|
|
}
|
|
|
|
Validator::AssertNotNullOrWhiteSpace(namingContext, "namingContext");
|
|
|
|
|
|
|
|
// Prepare the parameters
|
|
|
|
DRS_HANDLE handle = this->handle.ToPointer();
|
|
|
|
const DWORD inVersion = 1;
|
|
|
|
DWORD outVersion = 0;
|
|
|
|
auto request = CreateReplicationCursorsRequest(namingContext);
|
|
|
|
|
|
|
|
DRS_MSG_GETREPLINFO_REPLY reply = { nullptr };
|
|
|
|
|
|
|
|
// Retrieve info from DC
|
|
|
|
auto result = IDL_DRSGetReplInfo_NoSEH(handle, inVersion, (DRS_MSG_GETREPLINFO_REQ*)request.get(), &outVersion, &reply);
|
|
|
|
|
|
|
|
// Validate the return code
|
|
|
|
Validator::AssertSuccess((Win32ErrorCode)result);
|
|
|
|
|
|
|
|
// TODO: Check the returned outVersion.
|
|
|
|
|
|
|
|
// Prevent memory leak by storing the cursors in midl_ptr
|
|
|
|
auto cursors = midl_ptr<DS_REPL_CURSORS>(reply.pCursors);
|
|
|
|
|
|
|
|
// Process the results
|
|
|
|
auto managedCursors = RpcTypeConverter::ToReplicationCursors(move(cursors));
|
|
|
|
return managedCursors;
|
|
|
|
}
|
|
|
|
|
2017-04-09 19:16:18 +00:00
|
|
|
midl_ptr<DRS_MSG_GETCHGREQ_V10> DrsConnection::CreateGenericReplicateRequest(midl_ptr<DSNAME> &&dsName, array<ATTRTYP>^ partialAttributeSet, ULONG maxBytes, ULONG maxObjects)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
|
|
|
// TODO: Add support for Windows Server 2003
|
2017-04-09 19:16:18 +00:00
|
|
|
auto request = make_midl_ptr<DRS_MSG_GETCHGREQ_V10>();
|
2015-12-26 22:44:43 +00:00
|
|
|
// Inset client ID:
|
|
|
|
request->uuidDsaObjDest = RpcTypeConverter::ToUUID(this->_clientDsa);
|
|
|
|
// Insert DSNAME
|
|
|
|
request->pNC = dsName.release(); // Note: Request deleter will also delete DSNAME.
|
|
|
|
// Insert PAS:
|
|
|
|
auto nativePas = CreateNativePas(partialAttributeSet);
|
|
|
|
request->pPartialAttrSetEx = nativePas.release(); // Note: Request deleter will also delete PAS.
|
|
|
|
// Insert response size limits:
|
|
|
|
request->cMaxBytes = maxBytes;
|
|
|
|
request->cMaxObjects = maxObjects;
|
|
|
|
// Set correct flags:
|
|
|
|
// TODO: + DRS_OPTIONS::PER_SYNC ?
|
|
|
|
request->ulFlags = DRS_OPTIONS::DRS_INIT_SYNC |
|
|
|
|
DRS_OPTIONS::DRS_WRIT_REP |
|
|
|
|
DRS_OPTIONS::DRS_NEVER_SYNCED;
|
|
|
|
return request;
|
|
|
|
}
|
|
|
|
|
2016-09-16 15:22:16 +00:00
|
|
|
midl_ptr<DRS_MSG_GETREPLINFO_REQ_V1> DrsConnection::CreateReplicationCursorsRequest(String^ namingContext)
|
|
|
|
{
|
|
|
|
auto request = make_midl_ptr<DRS_MSG_GETREPLINFO_REQ_V1>();
|
|
|
|
request->InfoType = DS_REPL_INFO_TYPE::DS_REPL_INFO_CURSORS_FOR_NC;
|
|
|
|
request->pszObjectDN = RpcTypeConverter::ToNativeString(namingContext).release();
|
|
|
|
return request;
|
|
|
|
}
|
|
|
|
|
2017-04-09 19:16:18 +00:00
|
|
|
midl_ptr<DRS_MSG_GETCHGREQ_V10> DrsConnection::CreateReplicateAllRequest(ReplicationCookie^ cookie, array<ATTRTYP>^ partialAttributeSet, ULONG maxBytes, ULONG maxObjects)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
|
|
|
auto ncToReplicate = RpcTypeConverter::ToDsName(cookie->NamingContext);
|
|
|
|
auto request = CreateGenericReplicateRequest(move(ncToReplicate), partialAttributeSet, maxBytes, maxObjects);
|
|
|
|
// Insert replication state from cookie:
|
|
|
|
request->usnvecFrom.usnHighObjUpdate = cookie->HighObjUpdate;
|
|
|
|
request->usnvecFrom.usnHighPropUpdate = cookie->HighPropUpdate;
|
|
|
|
request->usnvecFrom.usnReserved = cookie->Reserved;
|
|
|
|
request->uuidInvocIdSrc = RpcTypeConverter::ToUUID(cookie->InvocationId);
|
2016-09-16 15:22:16 +00:00
|
|
|
request->ulFlags |= DRS_OPTIONS::DRS_GET_NC_SIZE;
|
2015-12-26 22:44:43 +00:00
|
|
|
return request;
|
|
|
|
}
|
|
|
|
|
2017-04-09 19:16:18 +00:00
|
|
|
midl_ptr<DRS_MSG_GETCHGREQ_V10> DrsConnection::CreateReplicateSingleRequest(Guid objectGuid, array<ATTRTYP>^ partialAttributeSet)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
|
|
|
auto objectToReplicate = RpcTypeConverter::ToDsName(objectGuid);
|
|
|
|
auto request = CreateGenericReplicateRequest(move(objectToReplicate), partialAttributeSet, defaultMaxBytes, defaultMaxObjects);
|
|
|
|
request->ulExtendedOp = EXOP_REQ::EXOP_REPL_OBJ;
|
|
|
|
// Guid of an existing DC must be set for the replication to work
|
|
|
|
request->uuidDsaObjDest = RpcTypeConverter::ToUUID(this->_serverSiteObjectGuid);
|
|
|
|
return request;
|
|
|
|
}
|
|
|
|
|
2017-04-09 19:16:18 +00:00
|
|
|
midl_ptr<DRS_MSG_GETCHGREQ_V10> DrsConnection::CreateReplicateSingleRequest(String^ distinguishedName, array<ATTRTYP>^ partialAttributeSet)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
|
|
|
auto objectToReplicate = RpcTypeConverter::ToDsName(distinguishedName);
|
|
|
|
auto request = CreateGenericReplicateRequest(move(objectToReplicate), partialAttributeSet, defaultMaxBytes, defaultMaxObjects);
|
|
|
|
request->ulExtendedOp = EXOP_REQ::EXOP_REPL_OBJ;
|
2016-09-16 15:22:16 +00:00
|
|
|
// Guid of an existing object must be set for the replication to work
|
2015-12-26 22:44:43 +00:00
|
|
|
request->uuidDsaObjDest = RpcTypeConverter::ToUUID(this->_serverSiteObjectGuid);
|
|
|
|
return request;
|
|
|
|
}
|
|
|
|
|
|
|
|
ReplicationResult^ DrsConnection::ReplicateAllObjects(ReplicationCookie^ cookie)
|
|
|
|
{
|
|
|
|
return this->ReplicateAllObjects(cookie, nullptr, DrsConnection::defaultMaxBytes, DrsConnection::defaultMaxObjects);
|
|
|
|
}
|
|
|
|
|
|
|
|
ReplicationResult^ DrsConnection::ReplicateAllObjects(ReplicationCookie^ cookie, ULONG maxBytes, ULONG maxObjects)
|
|
|
|
{
|
|
|
|
return this->ReplicateAllObjects(cookie, nullptr, maxBytes, maxObjects);
|
|
|
|
}
|
|
|
|
|
|
|
|
ReplicationResult^ DrsConnection::ReplicateAllObjects(ReplicationCookie^ cookie, array<ATTRTYP>^ partialAttributeSet, ULONG maxBytes, ULONG maxObjects)
|
|
|
|
{
|
2016-09-16 15:22:16 +00:00
|
|
|
// Validate parameters
|
|
|
|
Validator::AssertNotNull(cookie, "cookie");
|
|
|
|
|
2015-12-26 22:44:43 +00:00
|
|
|
auto request = CreateReplicateAllRequest(cookie, partialAttributeSet, maxBytes, maxObjects);
|
|
|
|
auto reply = GetNCChanges(move(request));
|
2017-03-12 17:38:21 +00:00
|
|
|
auto objects = ReadObjects(reply->pObjects, reply->cNumObjects, reply->rgValues, reply->cNumValues);
|
2015-12-26 22:44:43 +00:00
|
|
|
USN_VECTOR usnTo = reply->usnvecTo;
|
|
|
|
Guid invocationId = RpcTypeConverter::ToGuid(reply->uuidInvocIdSrc);
|
|
|
|
auto newCookie = gcnew ReplicationCookie(cookie->NamingContext, invocationId, usnTo.usnHighObjUpdate, usnTo.usnHighPropUpdate, usnTo.usnReserved);
|
|
|
|
bool hasMoreData = reply->fMoreData != 0;
|
2016-09-16 15:22:16 +00:00
|
|
|
return gcnew ReplicationResult(objects, hasMoreData, newCookie, reply->cNumNcSizeObjects);
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ReplicaObject^ DrsConnection::ReplicateSingleObject(String^ distinguishedName)
|
|
|
|
{
|
|
|
|
return this->ReplicateSingleObject(distinguishedName, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
ReplicaObject^ DrsConnection::ReplicateSingleObject(String^ distinguishedName, array<ATTRTYP>^ partialAttributeSet)
|
|
|
|
{
|
2016-10-01 19:58:38 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
auto request = CreateReplicateSingleRequest(distinguishedName, partialAttributeSet);
|
|
|
|
auto reply = GetNCChanges(move(request));
|
2017-03-12 17:38:21 +00:00
|
|
|
auto objects = ReadObjects(reply->pObjects, reply->cNumObjects, reply->rgValues, reply->cNumValues);
|
2016-10-01 19:58:38 +00:00
|
|
|
// TODO: Assert objects.Count == 1; It is guaranteed that it is > 0
|
|
|
|
return objects[0];
|
|
|
|
}
|
|
|
|
catch (DirectoryObjectNotFoundException^)
|
|
|
|
{
|
|
|
|
// ReplicateSingleObject also exits with this error when access is denied, so we need to differentiate between these situations.
|
|
|
|
bool objectExists = this->TestObjectExistence(distinguishedName);
|
|
|
|
if (objectExists)
|
|
|
|
{
|
|
|
|
// Force the validator to throw the DRA access denied exception.
|
|
|
|
Validator::AssertSuccess(Win32ErrorCode::DS_DRA_ACCESS_DENIED);
|
|
|
|
}
|
2017-03-08 23:45:13 +00:00
|
|
|
|
|
|
|
// Rethrow the original exception otherwise, as the object really does not exists.
|
|
|
|
throw;
|
2016-10-01 19:58:38 +00:00
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ReplicaObject^ DrsConnection::ReplicateSingleObject(Guid objectGuid)
|
|
|
|
{
|
|
|
|
return this->ReplicateSingleObject(objectGuid, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
ReplicaObject^ DrsConnection::ReplicateSingleObject(Guid objectGuid, array<ATTRTYP>^ partialAttributeSet)
|
|
|
|
{
|
2016-10-01 19:58:38 +00:00
|
|
|
try
|
|
|
|
{
|
|
|
|
auto request = CreateReplicateSingleRequest(objectGuid, partialAttributeSet);
|
|
|
|
auto reply = GetNCChanges(move(request));
|
2017-03-12 17:38:21 +00:00
|
|
|
auto objects = ReadObjects(reply->pObjects, reply->cNumObjects, reply->rgValues, reply->cNumValues);
|
2016-10-01 19:58:38 +00:00
|
|
|
// TODO: Assert objects.Count == 1; It is guaranteed that it is > 0
|
|
|
|
return objects[0];
|
|
|
|
}
|
|
|
|
catch (DirectoryObjectNotFoundException^)
|
|
|
|
{
|
|
|
|
// ReplicateSingleObject also exits with this error when access is denied, so we need to differentiate between these situations.
|
|
|
|
bool objectExists = this->TestObjectExistence(objectGuid);
|
|
|
|
if (objectExists)
|
|
|
|
{
|
|
|
|
// Force the validator to throw the DRA access denied exception.
|
|
|
|
Validator::AssertSuccess(Win32ErrorCode::DS_DRA_ACCESS_DENIED);
|
|
|
|
}
|
2017-03-08 23:45:13 +00:00
|
|
|
|
|
|
|
// Rethrow the original exception otherwise, as the object really does not exists.
|
|
|
|
throw;
|
2016-10-01 19:58:38 +00:00
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
|
2017-04-09 19:16:18 +00:00
|
|
|
midl_ptr<DRS_MSG_GETCHGREPLY_V9> DrsConnection::GetNCChanges(midl_ptr<DRS_MSG_GETCHGREQ_V10> &&request)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
|
|
|
// Validate connection
|
|
|
|
if (this->IsInvalid)
|
|
|
|
{
|
|
|
|
// TODO: Exception type
|
|
|
|
throw gcnew Exception("Not connected");
|
|
|
|
}
|
|
|
|
DRS_HANDLE handle = this->handle.ToPointer();
|
2017-04-09 19:16:18 +00:00
|
|
|
const DWORD inVersion = this->MaxSupportedReplicationRequestVersion;
|
2015-12-26 22:44:43 +00:00
|
|
|
DWORD outVersion = 0;
|
2017-04-09 19:16:18 +00:00
|
|
|
auto reply = make_midl_ptr<DRS_MSG_GETCHGREPLY_V9>();
|
2015-12-26 22:44:43 +00:00
|
|
|
// Send message:
|
2016-10-01 19:58:38 +00:00
|
|
|
auto result = (Win32ErrorCode) IDL_DRSGetNCChanges_NoSEH(handle, inVersion, (DRS_MSG_GETCHGREQ*)request.get(), &outVersion, (DRS_MSG_GETCHGREPLY*)reply.get());
|
|
|
|
|
2015-12-26 22:44:43 +00:00
|
|
|
// Validate result
|
2016-10-01 19:58:38 +00:00
|
|
|
Validator::AssertSuccess(result);
|
2017-04-09 19:16:18 +00:00
|
|
|
|
2015-12-26 22:44:43 +00:00
|
|
|
// TODO: Test extended error code:
|
|
|
|
DWORD extendedError = reply->dwDRSError;
|
2017-04-09 19:16:18 +00:00
|
|
|
|
|
|
|
// Check the returned structure version
|
|
|
|
if (outVersion == 6 && reply->cNumValues > 0)
|
|
|
|
{
|
|
|
|
// We will now convert the REPLVALINF_V1 array into REPLVALINF_V3 array so that the caller does not have to differentiate between them.
|
|
|
|
// This convenience comes at the price of a minor performance loss
|
|
|
|
auto valuesV1 = ((DRS_MSG_GETCHGREPLY_V6*)reply.get())->rgValues;
|
|
|
|
auto valuesV3 = make_midl_ptr<REPLVALINF_V3>(reply->cNumValues);
|
|
|
|
|
|
|
|
for (DWORD i = 0; i < reply->cNumValues; i++)
|
|
|
|
{
|
|
|
|
memcpy(&(valuesV3.get()[i]), &valuesV1[i], sizeof(REPLVALINF_V1));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assign the new value and delete the old one. Only shallow free must be done.
|
|
|
|
reply->rgValues = valuesV3.release();
|
|
|
|
midl_user_free(valuesV1);
|
|
|
|
}
|
|
|
|
|
2015-12-26 22:44:43 +00:00
|
|
|
return reply;
|
|
|
|
}
|
|
|
|
|
|
|
|
midl_ptr<DRS_MSG_CRACKREPLY_V1> DrsConnection::CrackNames(midl_ptr<DRS_MSG_CRACKREQ_V1> &&request)
|
|
|
|
{
|
|
|
|
// Validate connection
|
|
|
|
if (this->IsInvalid)
|
|
|
|
{
|
|
|
|
// TODO: Exception type
|
|
|
|
throw gcnew Exception("Not connected");
|
|
|
|
}
|
|
|
|
const DWORD inVersion = 1;
|
|
|
|
// TODO: Check the returned version
|
|
|
|
DWORD outVersion = 0;
|
|
|
|
midl_ptr<DRS_MSG_CRACKREPLY_V1> reply = make_midl_ptr<DRS_MSG_CRACKREPLY_V1>();
|
|
|
|
DRS_HANDLE handle = this->handle.ToPointer();
|
|
|
|
auto result = IDL_DRSCrackNames_NoSEH(handle, inVersion, (DRS_MSG_CRACKREQ*)request.get(), &outVersion, (DRS_MSG_CRACKREPLY*)reply.get());
|
|
|
|
Validator::AssertSuccess((Win32ErrorCode)result);
|
|
|
|
return reply;
|
|
|
|
}
|
|
|
|
|
|
|
|
String^ DrsConnection::ResolveDistinguishedName(NTAccount^ accountName)
|
|
|
|
{
|
|
|
|
auto stringAccountName = accountName->Value;
|
2016-10-01 19:58:38 +00:00
|
|
|
auto dn = this->TryResolveName(stringAccountName, DS_NAME_FORMAT::DS_NT4_ACCOUNT_NAME, DS_NAME_FORMAT::DS_FQDN_1779_NAME);
|
|
|
|
if (dn == nullptr)
|
|
|
|
{
|
|
|
|
throw gcnew DirectoryObjectNotFoundException(stringAccountName, nullptr);
|
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
return dn;
|
|
|
|
}
|
|
|
|
|
|
|
|
String^ DrsConnection::ResolveDistinguishedName(SecurityIdentifier^ objectSid)
|
|
|
|
{
|
|
|
|
auto stringSid = objectSid->ToString();
|
2016-10-01 19:58:38 +00:00
|
|
|
auto dn = this->TryResolveName(stringSid, DS_NAME_FORMAT::DS_SID_OR_SID_HISTORY_NAME, DS_NAME_FORMAT::DS_FQDN_1779_NAME);
|
|
|
|
if (dn == nullptr)
|
|
|
|
{
|
|
|
|
throw gcnew DirectoryObjectNotFoundException(stringSid, nullptr);
|
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
return dn;
|
|
|
|
}
|
|
|
|
|
|
|
|
Guid DrsConnection::ResolveGuid(NTAccount^ accountName)
|
|
|
|
{
|
|
|
|
auto stringAccountName = accountName->Value;
|
2016-10-01 19:58:38 +00:00
|
|
|
auto stringGuid = this->TryResolveName(stringAccountName, DS_NAME_FORMAT::DS_NT4_ACCOUNT_NAME, DS_NAME_FORMAT::DS_UNIQUE_ID_NAME);
|
|
|
|
if (stringGuid == nullptr)
|
|
|
|
{
|
|
|
|
throw gcnew DirectoryObjectNotFoundException(stringAccountName, nullptr);
|
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
return Guid::Parse(stringGuid);
|
|
|
|
}
|
|
|
|
|
|
|
|
Guid DrsConnection::ResolveGuid(SecurityIdentifier^ objectSid)
|
|
|
|
{
|
|
|
|
auto stringSid = objectSid->ToString();
|
2016-10-01 19:58:38 +00:00
|
|
|
auto stringGuid = this->TryResolveName(stringSid, DS_NAME_FORMAT::DS_SID_OR_SID_HISTORY_NAME, DS_NAME_FORMAT::DS_UNIQUE_ID_NAME);
|
|
|
|
if (stringGuid == nullptr)
|
|
|
|
{
|
|
|
|
throw gcnew DirectoryObjectNotFoundException(stringSid, nullptr);
|
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
return Guid::Parse(stringGuid);
|
|
|
|
}
|
|
|
|
|
2016-06-21 07:27:40 +00:00
|
|
|
Guid DrsConnection::ResolveGuid(String^ userPrincipalName)
|
|
|
|
{
|
2016-10-01 19:58:38 +00:00
|
|
|
auto stringGuid = this->TryResolveName(userPrincipalName, DS_NAME_FORMAT::DS_USER_PRINCIPAL_NAME, DS_NAME_FORMAT::DS_UNIQUE_ID_NAME);
|
|
|
|
if (stringGuid == nullptr)
|
|
|
|
{
|
|
|
|
throw gcnew DirectoryObjectNotFoundException(userPrincipalName, nullptr);
|
|
|
|
}
|
2016-06-21 07:27:40 +00:00
|
|
|
return Guid::Parse(stringGuid);
|
|
|
|
}
|
|
|
|
|
2016-10-01 19:58:38 +00:00
|
|
|
String^ DrsConnection::TryResolveName(String^ name, DS_NAME_FORMAT formatOffered, DS_NAME_FORMAT formatDesired)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
|
|
|
// We only want to resolve 1 name at a time:
|
|
|
|
const size_t numItems = 1;
|
2016-10-01 19:58:38 +00:00
|
|
|
|
|
|
|
// Prepare the request
|
2015-12-26 22:44:43 +00:00
|
|
|
auto request = make_midl_ptr<DRS_MSG_CRACKREQ_V1>(numItems);
|
|
|
|
request->formatOffered = formatOffered;
|
|
|
|
request->formatDesired = formatDesired;
|
|
|
|
request->rpNames[0] = RpcTypeConverter::ToNativeString(name).release();
|
2016-10-01 19:58:38 +00:00
|
|
|
|
|
|
|
// Perform RPC call
|
2015-12-26 22:44:43 +00:00
|
|
|
auto reply = this->CrackNames(move(request));
|
2016-10-01 19:58:38 +00:00
|
|
|
|
|
|
|
// Process the response
|
2015-12-26 22:44:43 +00:00
|
|
|
auto item = reply->pResult->rItems[0];
|
2016-10-01 19:58:38 +00:00
|
|
|
if (item.status == DS_NAME_ERROR::DS_NAME_NO_ERROR)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
2016-10-01 19:58:38 +00:00
|
|
|
auto name = marshal_as<String^>(item.pName);
|
|
|
|
return name;
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
2016-10-01 19:58:38 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
// No name translation has been found for some reason.
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool DrsConnection::TestObjectExistence(String^ distinguishedName)
|
|
|
|
{
|
|
|
|
auto resolvedName = this->TryResolveName(distinguishedName, DS_NAME_FORMAT::DS_FQDN_1779_NAME, DS_NAME_FORMAT::DS_UNIQUE_ID_NAME);
|
|
|
|
// Return true if and only if the object exists
|
|
|
|
return resolvedName != nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool DrsConnection::TestObjectExistence(Guid objectGuid)
|
|
|
|
{
|
|
|
|
auto stringGuid = objectGuid.ToString("B");
|
|
|
|
auto resolvedName = this->TryResolveName(stringGuid, DS_NAME_FORMAT::DS_UNIQUE_ID_NAME, DS_NAME_FORMAT::DS_FQDN_1779_NAME);
|
|
|
|
// Return true if and only if the object exists
|
|
|
|
return resolvedName != nullptr;
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
bool DrsConnection::ReleaseHandle()
|
|
|
|
{
|
|
|
|
DRS_HANDLE ptr = this->handle.ToPointer();
|
|
|
|
ULONG result = IDL_DRSUnbind_NoSEH(&ptr);
|
|
|
|
// Do not validate result, as we do not want any exceptions in ReleaseHandle
|
|
|
|
this->handle = (IntPtr)ptr;
|
|
|
|
// Return true if the pointer has been nulled by the UnBind operation
|
|
|
|
return ptr == nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
midl_ptr<PARTIAL_ATTR_VECTOR_V1_EXT> DrsConnection::CreateNativePas(array<ATTRTYP>^ partialAttributeSet)
|
|
|
|
{
|
2016-09-16 15:22:16 +00:00
|
|
|
// TODO: Move to type RpcTypeConverter?
|
2015-12-26 22:44:43 +00:00
|
|
|
if (partialAttributeSet == nullptr)
|
|
|
|
{
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
auto attrCount = partialAttributeSet->Length;
|
|
|
|
if (attrCount < 1)
|
|
|
|
{
|
|
|
|
// Must request at least one attribute
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
// Initialize native PAS (maybe just attrCount-1 items, but safety first)
|
|
|
|
auto nativePas = make_midl_ptr<PARTIAL_ATTR_VECTOR_V1_EXT>(attrCount);
|
|
|
|
// Copy array of attribute ids.
|
|
|
|
ATTRTYP* nativePasAttIds = (ATTRTYP*)&nativePas->rgPartialAttr;
|
|
|
|
for (int i = 0; i < attrCount; i++)
|
|
|
|
{
|
|
|
|
nativePasAttIds[i] = partialAttributeSet[i];
|
|
|
|
}
|
|
|
|
return nativePas;
|
|
|
|
}
|
|
|
|
|
|
|
|
array<byte>^ DrsConnection::ReadValue(const ATTRVAL &value)
|
|
|
|
{
|
|
|
|
// Allocate managed array
|
|
|
|
auto managedValue = gcnew array<byte>(value.valLen);
|
|
|
|
// Pin it so the GC does not touch it
|
|
|
|
pin_ptr<byte> managedValuePin = &managedValue[0];
|
|
|
|
// Copy data from native to managed memory
|
|
|
|
memcpy(managedValuePin, value.pVal, value.valLen);
|
|
|
|
return managedValue;
|
|
|
|
}
|
|
|
|
|
|
|
|
array<array<byte>^>^ DrsConnection::ReadValues(const ATTRVALBLOCK &values)
|
|
|
|
{
|
|
|
|
auto valCount = values.valCount;
|
|
|
|
auto valArray = gcnew array<array<byte>^>(valCount);
|
|
|
|
for (ULONG i = 0; i < valCount; i++)
|
|
|
|
{
|
|
|
|
auto value = values.pAVal[i];
|
|
|
|
auto managedValue = ReadValue(value);
|
|
|
|
valArray[i] = managedValue;
|
|
|
|
}
|
|
|
|
return valArray;
|
|
|
|
}
|
2017-03-12 17:38:21 +00:00
|
|
|
|
2015-12-26 22:44:43 +00:00
|
|
|
ReplicaAttribute^ DrsConnection::ReadAttribute(const ATTR &attribute)
|
|
|
|
{
|
|
|
|
auto values = ReadValues(attribute.AttrVal);
|
|
|
|
auto managedAttribute = gcnew ReplicaAttribute(attribute.attrTyp, values);
|
|
|
|
return managedAttribute;
|
|
|
|
}
|
2017-03-12 17:38:21 +00:00
|
|
|
|
2017-04-09 19:16:18 +00:00
|
|
|
ReplicaAttribute^ DrsConnection::ReadAttribute(const REPLVALINF_V3 &attribute)
|
2017-03-12 17:38:21 +00:00
|
|
|
{
|
|
|
|
auto value = ReadValue(attribute.Aval);
|
|
|
|
auto managedAttribute = gcnew ReplicaAttribute(attribute.attrTyp, value);
|
|
|
|
return managedAttribute;
|
|
|
|
}
|
|
|
|
|
2015-12-26 22:44:43 +00:00
|
|
|
ReplicaAttributeCollection^ DrsConnection::ReadAttributes(const ATTRBLOCK &attributes)
|
|
|
|
{
|
|
|
|
auto attributeCount = attributes.attrCount;
|
|
|
|
auto managedAttributes = gcnew ReplicaAttributeCollection(attributeCount);
|
|
|
|
|
|
|
|
for (size_t i = 0; i < attributeCount; i++)
|
|
|
|
{
|
|
|
|
auto attribute = attributes.pAttr[i];
|
|
|
|
auto managedAttribute = ReadAttribute(attribute);
|
|
|
|
if (managedAttribute->Values->Length > 0)
|
|
|
|
{
|
|
|
|
managedAttributes->Add(managedAttribute);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return managedAttributes;
|
|
|
|
}
|
|
|
|
ReplicaObject^ DrsConnection::ReadObject(const ENTINF &object)
|
|
|
|
{
|
|
|
|
auto attributes = ReadAttributes(object.AttrBlock);
|
|
|
|
auto guid = ReadGuid(object.pName->Guid);
|
|
|
|
auto sid = ReadSid(object.pName);
|
|
|
|
auto dn = ReadName(object.pName);
|
|
|
|
return gcnew ReplicaObject(dn, guid, sid, attributes);
|
|
|
|
}
|
2017-04-09 19:16:18 +00:00
|
|
|
ReplicaObjectCollection^ DrsConnection::ReadObjects(const REPLENTINFLIST *objects, int objectCount, const REPLVALINF_V3 *linkedValues, int valueCount)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
2017-03-12 17:38:21 +00:00
|
|
|
// Read linked values first
|
|
|
|
// TODO: Handle the case when linked attributes of an object are split between reveral responses.
|
|
|
|
auto linkedValueCollection = gcnew ReplicatedLinkedValueCollection();
|
|
|
|
for (int i = 0; i < valueCount; i++)
|
|
|
|
{
|
|
|
|
auto linkedValue = linkedValues[i];
|
|
|
|
if (linkedValue.fIsPresent)
|
|
|
|
{
|
|
|
|
auto objectId = ReadGuid(linkedValue.pObject->Guid);
|
|
|
|
auto attribute = ReadAttribute(linkedValue);
|
|
|
|
linkedValueCollection->Add(objectId, attribute);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now read the replicated objects
|
|
|
|
auto managedObjects = gcnew ReplicaObjectCollection(objectCount);
|
2015-12-26 22:44:43 +00:00
|
|
|
auto currentObject = objects;
|
|
|
|
while (currentObject != nullptr)
|
|
|
|
{
|
|
|
|
auto managedObject = ReadObject(currentObject->Entinf);
|
2017-03-12 17:38:21 +00:00
|
|
|
managedObject->LoadLinkedValues(linkedValueCollection);
|
2015-12-26 22:44:43 +00:00
|
|
|
managedObjects->Add(managedObject);
|
|
|
|
currentObject = currentObject->pNextEntInf;
|
|
|
|
}
|
|
|
|
return managedObjects;
|
|
|
|
}
|
|
|
|
|
|
|
|
Guid DrsConnection::ReadGuid(const GUID &guid)
|
|
|
|
{
|
2016-09-16 15:22:16 +00:00
|
|
|
// TODO: Move to RpcTypeConverter?
|
2015-12-26 22:44:43 +00:00
|
|
|
return *reinterpret_cast<Guid *>(const_cast<GUID *>(&guid));
|
|
|
|
}
|
|
|
|
|
|
|
|
String^ DrsConnection::ReadName(const DSNAME* dsName)
|
|
|
|
{
|
2016-09-16 15:22:16 +00:00
|
|
|
// TODO: Move to RpcTypeConverter?
|
2015-12-26 22:44:43 +00:00
|
|
|
if (dsName == nullptr || dsName->NameLen <= 0)
|
|
|
|
{
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
wchar_t* nativeName = (wchar_t*)&dsName->StringName;
|
|
|
|
return marshal_as<String^>(nativeName);
|
|
|
|
}
|
|
|
|
|
|
|
|
SecurityIdentifier^ DrsConnection::ReadSid(const DSNAME* dsName)
|
|
|
|
{
|
2016-09-16 15:22:16 +00:00
|
|
|
// TODO: Move to type RpcTypeConverter?
|
2015-12-26 22:44:43 +00:00
|
|
|
if (dsName == nullptr || dsName->SidLen <= 0)
|
|
|
|
{
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return gcnew SecurityIdentifier(IntPtr((void*)&dsName->Sid));
|
|
|
|
}
|
|
|
|
|
2017-04-09 19:16:18 +00:00
|
|
|
//! This method is called each time a RPC session key is negotiated.
|
2015-12-26 22:44:43 +00:00
|
|
|
void DrsConnection::RetrieveSessionKey(void* rpcContext)
|
|
|
|
{
|
|
|
|
// Retrieve RPC Security Context
|
|
|
|
PSecHandle securityContext = nullptr;
|
2017-04-09 19:16:18 +00:00
|
|
|
RPC_STATUS rpcStatus = I_RpcBindingInqSecurityContext(rpcContext, (void**)&securityContext);
|
|
|
|
if (rpcStatus != RPC_S_OK)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
2017-04-09 19:16:18 +00:00
|
|
|
// We could not acquire the security context, so do not continue with session key retrieval
|
|
|
|
return;
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
// Retrieve the Session Key information from Security Context
|
|
|
|
SecPkgContext_SessionKey nativeKey = {};
|
2017-04-09 19:16:18 +00:00
|
|
|
SECURITY_STATUS secStatus = QueryContextAttributes(securityContext, SECPKG_ATTR_SESSION_KEY, &nativeKey);
|
2015-12-26 22:44:43 +00:00
|
|
|
// Extract the actual key if the authentication schema uses one
|
2017-04-09 19:16:18 +00:00
|
|
|
if (secStatus == SEC_E_OK && nativeKey.SessionKey != nullptr)
|
2015-12-26 22:44:43 +00:00
|
|
|
{
|
|
|
|
array<byte>^ managedKey = gcnew array<byte>(nativeKey.SessionKeyLength);
|
|
|
|
// Pin it so the GC does not touch it
|
|
|
|
pin_ptr<byte> pinnedManagedKey = &managedKey[0];
|
|
|
|
// Copy data from native to managed memory
|
|
|
|
memcpy(pinnedManagedKey, nativeKey.SessionKey, nativeKey.SessionKeyLength);
|
|
|
|
// Do not forget to free the unmanaged memory
|
2017-04-09 19:16:18 +00:00
|
|
|
secStatus = FreeContextBuffer(nativeKey.SessionKey);
|
2016-09-16 15:22:16 +00:00
|
|
|
this->_sessionKey = managedKey;
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
}
|
2017-04-09 19:16:18 +00:00
|
|
|
|
|
|
|
DWORD DrsConnection::MaxSupportedReplicationRequestVersion::get()
|
|
|
|
{
|
|
|
|
DWORD version = 5;
|
|
|
|
|
|
|
|
if (this->_serverCapabilities & DRS_EXT::DRS_EXT_GETCHGREQ_V8)
|
|
|
|
{
|
|
|
|
version = 8;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (this->_serverCapabilities & DRS_EXT::DRS_EXT_GETCHGREQ_V10)
|
|
|
|
{
|
|
|
|
version = 10;
|
|
|
|
}
|
|
|
|
|
|
|
|
return version;
|
|
|
|
}
|
2015-12-26 22:44:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|