|
|
//+----------------------------------------------------------------------------
//
// Windows 2000 Active Directory Service domain trust verification WMI provider
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1992 - 2000
//
// File: domain.cpp
//
// Contents: domain class implementation
//
// Classes: CDomainInfo
//
// History: 27-Mar-00 EricB created
//
//-----------------------------------------------------------------------------
#include <stdafx.h>
PCWSTR CSTR_PROP_LOCAL_DNS_NAME = L"DNSname"; // String
PCWSTR CSTR_PROP_LOCAL_FLAT_NAME = L"FlatName"; // String
PCWSTR CSTR_PROP_LOCAL_SID = L"SID"; // String
PCWSTR CSTR_PROP_LOCAL_TREE_NAME = L"TreeName"; // String
PCWSTR CSTR_PROP_LOCAL_DC_NAME = L"DCname"; // String
// TODO: string property listing the FSMOs owned by this DC?
//Implementaion of CDomainInfo class
//+----------------------------------------------------------------------------
//
// Class: CDomainInfo
//
//-----------------------------------------------------------------------------
CDomainInfo::CDomainInfo() { TRACE(L"CDomainInfo::CDomainInfo\n");
m_liLastEnumed.QuadPart = 0; }
CDomainInfo::~CDomainInfo() { TRACE(L"CDomainInfo::~CDomainInfo\n");
Reset(); }
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::Init
//
// Synopsis: Initializes the CDomainInfo object.
//
//-----------------------------------------------------------------------------
HRESULT CDomainInfo::Init(IWbemClassObject * pClassDef) { TRACE(L"CDomainInfo::Init\n");
NTSTATUS Status = STATUS_SUCCESS; OBJECT_ATTRIBUTES objectAttributes; CSmartPolicyHandle chPolicy;
m_sipClassDefLocalDomain = pClassDef;
InitializeObjectAttributes(&objectAttributes, NULL, 0L, NULL, NULL);
// Get Local policy
Status = LsaOpenPolicy(NULL, // Local server
&objectAttributes, MAXIMUM_ALLOWED, // Needed for Rediscover
&chPolicy);
if (!NT_SUCCESS(Status)) { TRACE(L"LsaOpenPolicy failed with error %d\n", Status); return HRESULT_FROM_WIN32(LsaNtStatusToWinError(Status)); }
PPOLICY_DNS_DOMAIN_INFO pDnsDomainInfo;
Status = LsaQueryInformationPolicy(chPolicy, PolicyDnsDomainInformation, (PVOID *)&pDnsDomainInfo);
if (!NT_SUCCESS(Status)) { TRACE(L"LsaQueryInformationPolicy failed with error %d\n", Status); return HRESULT_FROM_WIN32(LsaNtStatusToWinError(Status)); }
m_strDomainFlatName = pDnsDomainInfo->Name.Buffer; m_strDomainDnsName = pDnsDomainInfo->DnsDomainName.Buffer; m_strForestName = pDnsDomainInfo->DnsForestName.Buffer;
if (!SetSid(pDnsDomainInfo->Sid)) { ASSERT(false); LsaFreeMemory(pDnsDomainInfo); return E_OUTOFMEMORY; }
LsaFreeMemory(pDnsDomainInfo);
DWORD dwBufSize = MAX_COMPUTERNAME_LENGTH + 1;
if (!GetComputerName(m_strDcName.GetBuffer(dwBufSize), &dwBufSize)) { DWORD dwErr = GetLastError(); TRACE(L"GetComputerName failed with error %d\n", dwErr); return HRESULT_FROM_WIN32(dwErr); }
m_strDcName.ReleaseBuffer();
return S_OK; }
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::Reset
//
// Synopsis: Free the contents of the trust array and re-initialize it.
//
//-----------------------------------------------------------------------------
void CDomainInfo::Reset(void) { TRACE(L"CDomainInfo::Reset\n");
CTrustInfo * pTrustInfo = NULL;
if (IsEnumerated()) { // Empty cache
for (UINT i = 0; i < m_vectTrustInfo.size(); ++i) { pTrustInfo = m_vectTrustInfo[i]; if (pTrustInfo) delete pTrustInfo; } m_vectTrustInfo.clear(); } }
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::SetSid
//
//-----------------------------------------------------------------------------
BOOL CDomainInfo::SetSid(PSID pSid) { if (!pSid) { return TRUE; }
#if !defined(NT4_BUILD)
PWSTR buffer;
BOOL fRet = ConvertSidToStringSid(pSid, &buffer);
if (fRet) { m_strSid = buffer; LocalFree(buffer); }
return fRet; #else
// TODO: Code for NT4 ??
#endif
}
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::EnumerateTrusts
//
// Synopsis: List the trusts for this domain.
//
//-----------------------------------------------------------------------------
#if !defined(NT4_BUILD)
HRESULT CDomainInfo::EnumerateTrusts(void) { TRACE(L"CDomainInfo::EnumerateTrusts\n");
DWORD dwRet = ERROR_SUCCESS; CTrustInfo * pTrustInfo = NULL; PDS_DOMAIN_TRUSTS rgTrusts = NULL; ULONG nTrustCount = 0;
Reset();
dwRet = DsEnumerateDomainTrusts(NULL, DS_DOMAIN_DIRECT_OUTBOUND | DS_DOMAIN_DIRECT_INBOUND, &rgTrusts, &nTrustCount);
if (ERROR_SUCCESS != dwRet) { TRACE(L"DsEnumerateDomainTrusts failed with error %d\n", dwRet); return HRESULT_FROM_WIN32(dwRet); }
for (ULONG i = 0; i < nTrustCount; i++) { pTrustInfo = new CTrustInfo(); if (!pTrustInfo) { dwRet = ERROR_NOT_ENOUGH_MEMORY; break; } if (rgTrusts[i].DnsDomainName) { // Downlevel domains don't have a DNS name.
//
pTrustInfo->SetTrustedDomain(rgTrusts[i].DnsDomainName); } else { // So use the flat name instead.
//
pTrustInfo->SetTrustedDomain(rgTrusts[i].NetbiosDomainName); } pTrustInfo->SetFlatName(rgTrusts[i].NetbiosDomainName); if (!pTrustInfo->SetSid(rgTrusts[i].DomainSid)) { // NTRAID#NTBUG9-582047-2002/05/15-ericb
delete pTrustInfo; dwRet = ERROR_NOT_ENOUGH_MEMORY; break; } pTrustInfo->SetTrustType(rgTrusts[i].TrustType); pTrustInfo->SetTrustDirectionFromFlags(rgTrusts[i].Flags); pTrustInfo->SetTrustAttributes(rgTrusts[i].TrustAttributes); pTrustInfo->SetFlags(rgTrusts[i].Flags);
// NTRAID#NTBUG9-582047-2002/05/15-ericb
try { m_vectTrustInfo.push_back(pTrustInfo); } catch (...) { dwRet = ERROR_NOT_ENOUGH_MEMORY; delete pTrustInfo; break; }
pTrustInfo = NULL; }
if (rgTrusts) { NetApiBufferFree(rgTrusts); }
if (ERROR_SUCCESS == dwRet) { SYSTEMTIME st;
GetSystemTime(&st); SystemTimeToFileTime(&st, (LPFILETIME)&m_liLastEnumed); }
return HRESULT_FROM_WIN32(dwRet); }
#else // NT4_BUILD
HRESULT CDomainInfo::EnumerateTrusts(void) { TRACE(L"CDomainInfo::EnumerateTrusts\n");
NTSTATUS Status = STATUS_SUCCESS; DWORD dwErr = ERROR_SUCCESS; ULONG i = 0; CTrustInfo * pTrustInfo = NULL;
Reset();
LSA_ENUMERATION_HANDLE hEnumContext = NULL; ULONG nTrustCount = 0; ULONG nTotalCount = 0; ULONG j = 0; PLSA_TRUST_INFORMATION pTrustDomainInfo = NULL; DWORD hResumeHandle = 0; LPUSER_INFO_0 pUserList = NULL; CTrustInfo * pTempTrustInfo = NULL; LPWSTR Lop = NULL; CSmartPolicyHandle chPolicy; OBJECT_ATTRIBUTES objectAttributes;
InitializeObjectAttributes(&objectAttributes, NULL, 0L, NULL, NULL);
//
// We'll have to do this the old fashioned way. That means that we'll enumerate all of
// the trust directly, save them off in a list, and then go through and enumerate all
// of the interdomain trust accounts and merge those into the list.
//
do { Status = LsaOpenPolicy(NULL, // Local server
&objectAttributes, MAXIMUM_ALLOWED, // Needed for Rediscover
&chPolicy);
Status = LsaEnumerateTrustedDomains(chPolicy, &hEnumContext, (void**)&pTrustDomainInfo, ULONG_MAX, &nTrustCount );
if (NT_SUCCESS(Status) || Status == STATUS_MORE_ENTRIES) { dwErr = ERROR_SUCCESS; for ( i = 0; i < nTrustCount; i++ ) { pTrustInfo = new CTrustInfo(); CHECK_NULL( pTrustInfo, CLEAN_RETURN ); pTrustInfo->SetTrustedDomain( pTrustDomainInfo[i].Name.Buffer ); pTrustInfo->SetFlatName( pTrustDomainInfo[i].Name.Buffer ); pTrustInfo->SetSid( pTrustDomainInfo[i].Sid ); // SetSid currently not implemented for NT4
pTrustInfo->SetTrustType( TRUST_TYPE_DOWNLEVEL ); pTrustInfo->SetTrustDirection( TRUST_DIRECTION_OUTBOUND ); // NTRAID#NTBUG9-582047-2002/05/15-ericb
try { m_vectTrustInfo.push_back( pTrustInfo ); } catch (...) { dwRet = ERROR_NOT_ENOUGH_MEMORY; delete pTrustInfo; goto CLEAN_RETURN; } pTrustInfo = NULL; } LsaFreeMemory( pTrustDomainInfo ); pTrustDomainInfo = NULL; } else dwErr = LsaNtStatusToWinError(Status); } while (Status == STATUS_MORE_ENTRIES);
if( Status == STATUS_NO_MORE_ENTRIES ) dwErr = ERROR_SUCCESS; //
// Now, let's add in the user accounts
//
if ( dwErr == ERROR_SUCCESS ) { do { nTrustCount = 0; nTotalCount = 0;
dwErr = NetUserEnum(NULL, 0, FILTER_INTERDOMAIN_TRUST_ACCOUNT, (LPBYTE *)&pUserList, MAX_PREFERRED_LENGTH, &nTrustCount, &nTotalCount, &hResumeHandle);
if ( dwErr == ERROR_SUCCESS || dwErr == ERROR_MORE_DATA ) { dwErr = ERROR_SUCCESS; for ( i = 0; i < nTrustCount; i++ ) { Lop = wcsrchr( pUserList[ i ].usri0_name, L'$' ); if ( Lop ) { *Lop = UNICODE_NULL; } for ( j = 0; j < m_vectTrustInfo.size(); j++ ) { pTempTrustInfo = m_vectTrustInfo[j]; if ( _wcsicmp( pUserList[ i ].usri0_name, pTempTrustInfo->GetTrustedDomain() ) == 0 ) { pTempTrustInfo->SetTrustDirection( TRUST_DIRECTION_INBOUND | TRUST_DIRECTION_OUTBOUND ); break; } }
// If it wasn't found, add it...
if ( j == m_vectTrustInfo.size() ) { pTrustInfo = new CTrustInfo(); CHECK_NULL( pTrustInfo, CLEAN_RETURN ); pTrustInfo->SetTrustedDomain( pUserList[ i ].usri0_name ); pTrustInfo->SetFlatName( pUserList[ i ].usri0_name ); pTrustInfo->SetTrustType( TRUST_TYPE_DOWNLEVEL ); pTrustInfo->SetTrustDirection( TRUST_DIRECTION_INBOUND );
// NTRAID#NTBUG9-582047-2002/05/15-ericb
try { m_vectTrustInfo.push_back( pTrustInfo ); } catch (...) { dwRet = ERROR_NOT_ENOUGH_MEMORY; delete pTrustInfo; goto CLEAN_RETURN; } pTrustInfo = NULL; }
if ( Lop ) { *Lop = L'$'; } }
NetApiBufferFree( pUserList ); pUserList = NULL; }
} while ( dwErr == ERROR_MORE_DATA ); }
CLEAN_RETURN: if( pUserList ) NetApiBufferFree( pUserList ); if( pTrustDomainInfo ) LsaFreeMemory( pTrustDomainInfo );
if (ERROR_SUCCESS == dwErr) { SYSTEMTIME st;
GetSystemTime(&st); SystemTimeToFileTime(&st, (LPFILETIME)&m_liLastEnumed); }
return HRESULT_FROM_WIN32(dwErr); } #endif // NT4_BUILD
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::FindTrust
//
// Synopsis: Find a trust by trusted Domain Name
//
//-----------------------------------------------------------------------------
CTrustInfo * CDomainInfo::FindTrust(PCWSTR pwzTrust) { TRACE(L"CDomainInfo::FindTrust\n"); TRACE(L"\nlooking for domain %s\n", pwzTrust); ASSERT(IsEnumerated());
ULONG i = 0; for( i = 0; i < m_vectTrustInfo.size(); ++i ) { int nStrComp = CompareString(LOCALE_SYSTEM_DEFAULT, NORM_IGNORECASE, (m_vectTrustInfo[i])->GetTrustedDomain(), -1, pwzTrust, -1 ); ASSERT( nStrComp ); if( CSTR_EQUAL == nStrComp ) { TRACE(L"Trust found!\n"); return m_vectTrustInfo[i]; } }
return NULL; // Not Found
}
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::GetTrustByIndex
//
// Synopsis: Get trust info by Index
//
//-----------------------------------------------------------------------------
CTrustInfo * CDomainInfo::GetTrustByIndex(size_t index) { ASSERT(IsEnumerated());
if (index < Size()) { return m_vectTrustInfo[index]; } else { ASSERT(FALSE); return NULL; } }
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::IsTrustListStale
//
// Synopsis: Checks to see if the last emumeration time is older than the
// passed in criteria.
//
// Returns: TRUE if older.
//
// Notes: If the trusts haven't been enumerated (m_liLastEnumed == 0),
// then the enumeration is defined to be stale.
//
//-----------------------------------------------------------------------------
BOOL CDomainInfo::IsTrustListStale(LARGE_INTEGER liMaxAge) { TRACE(L"CDomainInfo::IsTrustListStale(0x%08x), MaxAge = %d\n", this, liMaxAge.QuadPart / TRUSTMON_FILETIMES_PER_MINUTE); BOOL fStale = FALSE; LARGE_INTEGER liCurrentTime; SYSTEMTIME st;
GetSystemTime(&st); SystemTimeToFileTime(&st, (LPFILETIME)&liCurrentTime);
fStale = (m_liLastEnumed.QuadPart + liMaxAge.QuadPart) < liCurrentTime.QuadPart;
return fStale; }
//+----------------------------------------------------------------------------
//
// Method: CDomainInfo::CreateAndSendInst
//
// Synopsis: Returns a copy of the current instance back to WMI
//
//-----------------------------------------------------------------------------
HRESULT CDomainInfo::CreateAndSendInst(IWbemObjectSink * pResponseHandler) { TRACE(L"CDomainInfo::CreateAndSendInst\n"); HRESULT hr = WBEM_S_NO_ERROR;
do { CComPtr<IWbemClassObject> ipNewInst; CComVariant var;
//
// Create a new instance of the WMI class object
//
hr = m_sipClassDefLocalDomain->SpawnInstance(0, &ipNewInst);
BREAK_ON_FAIL; // Set the DNS property value
var = GetDnsName(); hr = ipNewInst->Put(CSTR_PROP_LOCAL_DNS_NAME, 0, &var, 0); TRACE(L"\tCreating instance %s\n", var.bstrVal); BREAK_ON_FAIL;
// Set the flat name property value
var = GetFlatName(); hr = ipNewInst->Put(CSTR_PROP_LOCAL_FLAT_NAME, 0, &var, 0); TRACE(L"\twith flat name %s\n", var.bstrVal); BREAK_ON_FAIL;
// Set the SID property value
var = GetSid(); hr = ipNewInst->Put(CSTR_PROP_LOCAL_SID, 0, &var, 0); TRACE(L"\twith SID %s\n", var.bstrVal); BREAK_ON_FAIL;
// Set the forest name property value
var = GetForestName(); hr = ipNewInst->Put(CSTR_PROP_LOCAL_TREE_NAME, 0, &var, 0); TRACE(L"\twith forest name %s\n", var.bstrVal); BREAK_ON_FAIL;
// Set the DC name property value
var = GetDcName(); hr = ipNewInst->Put(CSTR_PROP_LOCAL_DC_NAME, 0, &var, 0); TRACE(L"\ton DC %s\n", var.bstrVal); BREAK_ON_FAIL;
//
// Send the object to the caller
//
// [In] param, no need to addref.
IWbemClassObject * pNewInstance = ipNewInst;
hr = pResponseHandler->Indicate(1, &pNewInstance);
BREAK_ON_FAIL;
} while(FALSE);
return hr; }
|