You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
3446 lines
110 KiB
3446 lines
110 KiB
//+-------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 1992 - 1999
|
|
//
|
|
// File: dsctx.cpp
|
|
//
|
|
// Contents: object to implement context menu extensions
|
|
//
|
|
// History: 08-dec-97 jimharr Created
|
|
//
|
|
//
|
|
//--------------------------------------------------------------------------
|
|
|
|
#include "stdafx.h"
|
|
#include "resource.h"
|
|
|
|
#include "util.h"
|
|
#include "dsutil.h"
|
|
|
|
#include "dsctx.h"
|
|
|
|
#include "dataobj.h"
|
|
#include "dscookie.h"
|
|
#include "dsdlgs.h"
|
|
#include "gsz.h"
|
|
#include "querysup.h"
|
|
#include "simdata.h"
|
|
|
|
#include <lm.h>
|
|
#include <cmnquery.h> // IPersistQuery
|
|
#include <cmnquryp.h> // to get IQueryFrame to notify DS Find
|
|
#include <dsquery.h>
|
|
#include <dsqueryp.h>
|
|
#include <ntlsa.h> // LsaQueryInformationPolicy
|
|
|
|
const CLSID CLSID_DSContextMenu = { /* 08eb4fa6-6ffd-11d1-b0e0-00c04fd8dca6 */
|
|
0x08eb4fa6, 0x6ffd, 0x11d1,
|
|
{0xb0, 0xe0, 0x00, 0xc0, 0x4f, 0xd8, 0xdc, 0xa6}
|
|
};
|
|
|
|
////////////////////////////////////////////////////////////////////
|
|
// Language independent context menu IDs
|
|
// WARNING : these should NEVER be changed
|
|
// the whole point of having these is so that other
|
|
// developers can rely on them being the same no matter
|
|
// what language or version they use. The context menus
|
|
// can change but their IDs should not
|
|
//
|
|
#define CMID_ENABLE_ACCOUNT L"_DSADMIN_ENABLE_ACCOUNT"
|
|
#define CMID_DISABLE_ACCOUNT L"_DSADMIN_DISABLE_ACCOUNT"
|
|
#define CMID_MAP_CERTIFICATES L"_DSADMIN_MAP_CERTIFICATES"
|
|
#define CMID_CHANGE_PASSWORD L"_DSADMIN_CHANGE_PASSWORD"
|
|
#define CMID_MOVE_OBJECT L"_DSADMIN_MOVE"
|
|
#define CMID_DELETE_OBJECT L"_DSADMIN_DELETE"
|
|
#define CMID_REPLICATE_NOW L"_DSADMIN_REPLICATE_NOW"
|
|
#define CMID_ADD_OBJECTS_TO_GROUP L"_DSADMIN_ADD_TO_GROUP"
|
|
#define CMID_COPY_OBJECT L"_DSADMIN_COPY"
|
|
#define CMID_RENAME_OBJECT L"_DSADMIN_RENAME"
|
|
|
|
|
|
static CLIPFORMAT g_cfDsObjectNames;
|
|
static CLIPFORMAT g_cfDsInternal;
|
|
static CLIPFORMAT g_cfCoClass;
|
|
|
|
static CLIPFORMAT g_cfPropSheetCfg;
|
|
|
|
static CLIPFORMAT g_cfParentHwnd;
|
|
static CLIPFORMAT g_cfComponentData;
|
|
|
|
///////////////////////////////////////////////////////////////////////////
|
|
// CContextMenuSingleDeleteHandler
|
|
|
|
class CContextMenuSingleDeleteHandler : public CSingleDeleteHandlerBase
|
|
{
|
|
public:
|
|
CContextMenuSingleDeleteHandler(CDSComponentData* pComponentData, HWND hwnd,
|
|
LPCWSTR lpszPath, LPCWSTR lpszClass,
|
|
BOOL bContainer, CDSContextMenu* pCtxMenu)
|
|
: CSingleDeleteHandlerBase(pComponentData, hwnd)
|
|
{
|
|
m_pCtxMenu = pCtxMenu;
|
|
m_lpszPath = lpszPath;
|
|
m_lpszClass= lpszClass;
|
|
m_bContainer = bContainer;
|
|
}
|
|
|
|
protected:
|
|
CDSContextMenu* m_pCtxMenu;
|
|
LPCWSTR m_lpszPath;
|
|
LPCWSTR m_lpszClass;
|
|
BOOL m_bContainer;
|
|
|
|
virtual HRESULT BeginTransaction()
|
|
{
|
|
return GetTransaction()->Begin(m_lpszPath, m_lpszClass, m_bContainer, NULL, NULL, FALSE);
|
|
}
|
|
virtual HRESULT DeleteObject()
|
|
{
|
|
CString szName;
|
|
return m_pCtxMenu->_Delete(m_lpszPath, m_lpszClass, &szName);
|
|
}
|
|
virtual HRESULT DeleteSubtree()
|
|
{
|
|
CString szName;
|
|
return m_pCtxMenu->_DeleteSubtree(m_lpszPath, &szName);
|
|
}
|
|
virtual void GetItemName(OUT CString& szName)
|
|
{
|
|
//
|
|
// Clear out any existing value
|
|
//
|
|
szName.Empty();
|
|
|
|
CPathCracker pathCracker;
|
|
HRESULT hr = pathCracker.Set(CComBSTR(GetItemPath()), ADS_SETTYPE_FULL);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = pathCracker.SetDisplayType(ADS_DISPLAY_VALUE_ONLY);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = pathCracker.put_EscapedMode(ADS_ESCAPEDMODE_OFF_EX);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
CComBSTR bstrName;
|
|
hr = pathCracker.Retrieve(ADS_FORMAT_LEAF, &bstrName);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
szName = bstrName;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (szName.IsEmpty())
|
|
{
|
|
szName = GetItemPath();
|
|
}
|
|
}
|
|
virtual LPCWSTR GetItemClass(){ return m_lpszClass; }
|
|
virtual LPCWSTR GetItemPath(){ return m_lpszPath; }
|
|
|
|
};
|
|
|
|
///////////////////////////////////////////////////////////////////////////
|
|
// CContextMenuMultipleDeleteHandler
|
|
|
|
class CContextMenuMultipleDeleteHandler : public CMultipleDeleteHandlerBase
|
|
{
|
|
public:
|
|
CContextMenuMultipleDeleteHandler(CDSComponentData* pComponentData, HWND hwnd,
|
|
IDataObject* pDataObject,
|
|
CObjectNamesFormatCracker* pObjCracker,
|
|
CDSContextMenu* pCtxMenu)
|
|
: CMultipleDeleteHandlerBase(pComponentData, hwnd)
|
|
{
|
|
m_pDataObject = pDataObject;
|
|
m_pObjCracker = pObjCracker;
|
|
m_pCtxMenu = pCtxMenu;
|
|
|
|
ASSERT(m_pObjCracker->GetCount() > 1);
|
|
// allocate an array of BOOL's to keep track of what actually got deleted
|
|
// and initialize ot to zero (FALSE)
|
|
m_pDeletedArr = new BOOL[GetItemCount()];
|
|
::ZeroMemory(m_pDeletedArr, sizeof(BOOL)*GetItemCount());
|
|
}
|
|
virtual ~CContextMenuMultipleDeleteHandler()
|
|
{
|
|
delete[] m_pDeletedArr;
|
|
}
|
|
|
|
BOOL WasItemDeleted(UINT i)
|
|
{
|
|
ASSERT(i < GetItemCount());
|
|
return m_pDeletedArr[i];
|
|
}
|
|
|
|
protected:
|
|
virtual UINT GetItemCount() { return m_pObjCracker->GetCount();}
|
|
virtual HRESULT BeginTransaction()
|
|
{
|
|
return GetTransaction()->Begin(m_pDataObject, NULL, NULL, FALSE);
|
|
}
|
|
virtual HRESULT DeleteObject(UINT i)
|
|
{
|
|
bool fAlternateDeleteMethod = false;
|
|
LPCWSTR lpszObjectPath = m_pObjCracker->GetName(i);
|
|
LPCWSTR lpszObjectClass = m_pObjCracker->GetClass(i);
|
|
|
|
HRESULT hr = ObjectDeletionCheck(
|
|
lpszObjectPath,
|
|
NULL,
|
|
lpszObjectClass,
|
|
fAlternateDeleteMethod );
|
|
if (FAILED(hr) || HRESULT_FROM_WIN32(ERROR_CANCELLED) == hr)
|
|
return hr;
|
|
|
|
if (!fAlternateDeleteMethod)
|
|
{
|
|
CString szName;
|
|
hr = m_pCtxMenu->_Delete(lpszObjectPath, lpszObjectClass, &szName);
|
|
}
|
|
if (SUCCEEDED(hr) && (hr != S_FALSE))
|
|
{
|
|
m_pDeletedArr[i] = TRUE;
|
|
}
|
|
return hr;
|
|
}
|
|
virtual HRESULT DeleteSubtree(UINT i)
|
|
{
|
|
CString szName;
|
|
HRESULT hr = m_pCtxMenu->_DeleteSubtree(m_pObjCracker->GetName(i), &szName);
|
|
if (SUCCEEDED(hr) && (hr != S_FALSE))
|
|
{
|
|
m_pDeletedArr[i] = TRUE;
|
|
}
|
|
return hr;
|
|
}
|
|
virtual void GetItemName(IN UINT i, OUT CString& szName)
|
|
{
|
|
//
|
|
// Clear out any existing value
|
|
//
|
|
szName.Empty();
|
|
|
|
CPathCracker pathCracker;
|
|
HRESULT hr = pathCracker.Set(CComBSTR(m_pObjCracker->GetName(i)), ADS_SETTYPE_FULL);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = pathCracker.SetDisplayType(ADS_DISPLAY_VALUE_ONLY);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = pathCracker.put_EscapedMode(ADS_ESCAPEDMODE_OFF_EX);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
CComBSTR bstrName;
|
|
hr = pathCracker.Retrieve(ADS_FORMAT_LEAF, &bstrName);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
szName = bstrName;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (szName.IsEmpty())
|
|
{
|
|
szName = m_pObjCracker->GetName(i);
|
|
}
|
|
}
|
|
|
|
virtual void GetItemPath(UINT i, CString& szPath)
|
|
{
|
|
szPath = m_pObjCracker->GetName(i);
|
|
}
|
|
virtual PCWSTR GetItemClass(UINT i)
|
|
{
|
|
return m_pObjCracker->GetClass(i);
|
|
}
|
|
private:
|
|
IDataObject* m_pDataObject;
|
|
CObjectNamesFormatCracker* m_pObjCracker;
|
|
CDSContextMenu* m_pCtxMenu;
|
|
BOOL* m_pDeletedArr;
|
|
};
|
|
|
|
///////////////////////////////////////////////////////////////////////////
|
|
// ContextMenu
|
|
|
|
class CContextMenuMoveHandler : public CMoveHandlerBase
|
|
{
|
|
public:
|
|
CContextMenuMoveHandler(CDSComponentData* pComponentData, HWND hwnd,
|
|
LPCWSTR lpszBrowseRootPath,
|
|
IDataObject* pDataObject,
|
|
CInternalFormatCracker* pInternalFormatCracker,
|
|
CObjectNamesFormatCracker* pObjectNamesFormatCracker)
|
|
: CMoveHandlerBase(pComponentData, hwnd, lpszBrowseRootPath)
|
|
{
|
|
m_pDataObject = pDataObject;
|
|
m_pInternalFormatCracker = pInternalFormatCracker;
|
|
m_pObjectNamesFormatCracker = pObjectNamesFormatCracker;
|
|
}
|
|
|
|
protected:
|
|
virtual UINT GetItemCount() { return m_pObjectNamesFormatCracker->GetCount();}
|
|
virtual HRESULT BeginTransaction()
|
|
{
|
|
return GetTransaction()->Begin(m_pDataObject,
|
|
GetDestPath(), GetDestClass(), IsDestContainer());
|
|
}
|
|
virtual void GetNewPath(UINT i, CString& szNewPath)
|
|
{
|
|
szNewPath = m_pObjectNamesFormatCracker->GetName(i);
|
|
}
|
|
virtual void GetItemPath(UINT i, CString& szPath)
|
|
{
|
|
szPath = m_pObjectNamesFormatCracker->GetName(i);
|
|
}
|
|
virtual PCWSTR GetItemClass(UINT i)
|
|
{
|
|
return m_pObjectNamesFormatCracker->GetClass(i);
|
|
}
|
|
virtual void GetName(UINT i, CString& strref)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
if (m_pInternalFormatCracker->HasData())
|
|
{
|
|
CUINode* pUINode = m_pInternalFormatCracker->GetCookie(i);
|
|
CDSCookie* pCookie = GetDSCookieFromUINode(pUINode);
|
|
if (pCookie != NULL)
|
|
{
|
|
strref = pCookie->GetName();
|
|
}
|
|
else
|
|
{
|
|
strref = L"";
|
|
}
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
// REVIEW_MARCOC_PORT: this might be inefficent, need to make a member variable
|
|
CPathCracker pathCracker;
|
|
hr = pathCracker.Set(CComBSTR(m_pObjectNamesFormatCracker->GetName(i)),
|
|
ADS_SETTYPE_FULL);
|
|
hr = pathCracker.SetDisplayType(ADS_DISPLAY_VALUE_ONLY);
|
|
|
|
CComBSTR DestName;
|
|
hr = pathCracker.GetElement( 0, &DestName );
|
|
strref = DestName;
|
|
return;
|
|
}
|
|
}
|
|
virtual HRESULT OnItemMoved(UINT i, IADs* /*pIADs*/)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
if (m_pInternalFormatCracker != NULL && m_pInternalFormatCracker->HasData())
|
|
{
|
|
CUINode* pUINode = m_pInternalFormatCracker->GetCookie(i);
|
|
pUINode->SetExtOp(OPCODE_MOVE);
|
|
|
|
/* REVIEW_JEFFJON : removed due to bug 190532 After changing view from list to detail
|
|
and back to list the drag and drop does not work from query window
|
|
We decided that saved queries will be snapshots of the time
|
|
they are run and we should not try to keep them updated.
|
|
|
|
CDSCookie* pCookie = GetDSCookieFromUINode(pUINode);
|
|
if (pCookie != NULL)
|
|
{
|
|
CUINode* pParentNode = pUINode->GetParent();
|
|
if (pParentNode != NULL && !IS_CLASS(pParentNode, DS_UI_NODE))
|
|
{
|
|
CComBSTR bsPath;
|
|
hr = pIADs->get_ADsPath(&bsPath);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
CString szPath;
|
|
StripADsIPath(bsPath, szPath);
|
|
pCookie->SetPath(szPath);
|
|
}
|
|
}
|
|
}
|
|
*/
|
|
}
|
|
return hr;
|
|
}
|
|
virtual void GetClassOfMovedItem(CString& szClass)
|
|
{
|
|
szClass.Empty();
|
|
if (NULL == m_pObjectNamesFormatCracker)
|
|
return;
|
|
UINT nCount = GetItemCount();
|
|
if (0 == nCount)
|
|
return;
|
|
szClass = m_pObjectNamesFormatCracker->GetClass(0);
|
|
for (UINT i = 1; i < nCount; i++)
|
|
{
|
|
if (0 != szClass.CompareNoCase( m_pObjectNamesFormatCracker->GetClass(i) ))
|
|
{
|
|
szClass.Empty();
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
|
|
private:
|
|
IDataObject* m_pDataObject;
|
|
CInternalFormatCracker* m_pInternalFormatCracker;
|
|
CObjectNamesFormatCracker* m_pObjectNamesFormatCracker;
|
|
};
|
|
|
|
|
|
///////////////////////////////////////////////////////////////////////////
|
|
// CDSContextMenu
|
|
|
|
CDSContextMenu::CDSContextMenu()
|
|
{
|
|
m_pDsObject = NULL;
|
|
m_fClasses = 0;
|
|
m_hwnd = NULL;
|
|
m_pCD = NULL;
|
|
}
|
|
|
|
CDSContextMenu::~CDSContextMenu()
|
|
{
|
|
if (m_pDsObject) {
|
|
m_pDsObject->Release();
|
|
}
|
|
}
|
|
|
|
const UINT Type_User = 0x0001;
|
|
const UINT Type_Group = 0x0002;
|
|
const UINT Type_Computer = 0x0004;
|
|
const UINT Type_NTDSConnection = 0x0008;
|
|
const UINT Type_TrueNTDSConnection = 0x0010;
|
|
const UINT Type_FRSConnection = 0x0020;
|
|
const UINT Type_Domain = 0x0040;
|
|
const UINT Type_Contact = 0x0080;
|
|
const UINT Type_OU = 0x0100;
|
|
|
|
const UINT Type_Others = 0x8000;
|
|
|
|
|
|
extern CDSComponentData* g_pCD;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
////////////////////////////////////////////////////////////
|
|
// IShellExtInit methods
|
|
STDMETHODIMP
|
|
CDSContextMenu::Initialize(LPCITEMIDLIST,
|
|
LPDATAOBJECT pDataObj,
|
|
HKEY)
|
|
{
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
|
|
HRESULT hr = 0;
|
|
USES_CONVERSION;
|
|
|
|
TRACE(_T("CDsContextMenu::Initialize.\n"));
|
|
TIMER(_T("Entering DSContext Init().\n"));
|
|
|
|
if (pDataObj == NULL)
|
|
{
|
|
return E_INVALIDARG; // no point in going on
|
|
}
|
|
|
|
// hold on to the data object
|
|
m_spDataObject = pDataObj;
|
|
|
|
// get path and class info: this format is always needed
|
|
hr = m_objectNamesFormat.Extract(pDataObj);
|
|
if (FAILED(hr))
|
|
return hr;
|
|
|
|
// we need at least one object in the selection
|
|
ASSERT(m_objectNamesFormat.HasData());
|
|
if (m_objectNamesFormat.GetCount() == 0)
|
|
{
|
|
TRACE (_T("DSContextMenu::Init: can't find path\n"));
|
|
return S_OK;
|
|
}
|
|
|
|
// get DSADMIN internal format (it can be there or not)
|
|
// if present, we are called from DS Admin
|
|
m_internalFormat.Extract(pDataObj);
|
|
|
|
// get extra info
|
|
_GetExtraInfo(pDataObj);
|
|
|
|
// check whether an NTDSConnection is actually an FRS connection
|
|
if (m_fClasses & Type_NTDSConnection)
|
|
{
|
|
//
|
|
// check whether this is an NTDS instance or an FRS instance
|
|
// CODEWORK this will not work outside of DSADMIN (e.g. in DSFIND)
|
|
//
|
|
if ( m_internalFormat.HasData()
|
|
&& NULL != m_internalFormat.GetCookie(0)
|
|
&& NULL != m_internalFormat.GetCookie(0)->GetParent() )
|
|
{
|
|
CUINode* pUIParentNode = m_internalFormat.GetCookie(0)->GetParent();
|
|
CDSCookie* pParentCookie = GetDSCookieFromUINode(pUIParentNode);
|
|
|
|
CString strClass = pParentCookie->GetClass();
|
|
bool fParentIsFrs = false;
|
|
HRESULT hr2 = DSPROP_IsFrsObject(
|
|
const_cast<LPWSTR>((LPCTSTR)strClass), &fParentIsFrs );
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
if ( SUCCEEDED(hr2) )
|
|
m_fClasses |= ( (fParentIsFrs) ? Type_FRSConnection : Type_TrueNTDSConnection );
|
|
}
|
|
}
|
|
|
|
TIMER(_T("Exiting DSContext Init().\n"));
|
|
return hr;
|
|
}
|
|
|
|
///////////////////////////////////////////////////////////
|
|
// IContextMenu methods
|
|
STDMETHODIMP
|
|
CDSContextMenu::QueryContextMenu(HMENU hMenu,
|
|
UINT indexMenu,
|
|
UINT idCmdFirst,
|
|
UINT,
|
|
UINT)
|
|
|
|
{
|
|
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
|
|
HRESULT hr = S_OK;
|
|
TCHAR szBuffer[MAX_PATH];
|
|
const INT cItems = 10; //max num of items added
|
|
UINT nLargestCmd = 0;
|
|
CComVariant CurrentState;
|
|
BOOL bEnableMove = TRUE;
|
|
BOOL bEnableDelete = TRUE;
|
|
BOOL bEnableRename = TRUE;
|
|
|
|
TRACE(_T("CDsContextMenu::QueryContextMenu.\n"));
|
|
TIMER(_T("Entering DSContext QCM().\n"));
|
|
|
|
if (m_internalFormat.HasData())
|
|
{
|
|
int iSystemFlags = 0;
|
|
DWORD i = 0;
|
|
|
|
//
|
|
// Loop through all the selected nodes adding the appropriate menu items
|
|
//
|
|
for (i=0; i < m_internalFormat.GetCookieCount(); i++)
|
|
{
|
|
CUINode* pUINode = m_internalFormat.GetCookie(i);
|
|
iSystemFlags = GetDSCookieFromUINode(pUINode)->GetSystemFlags();
|
|
|
|
switch (m_internalFormat.GetSnapinType()) // assume multi-selected items all have the same snapin type
|
|
{
|
|
case SNAPINTYPE_DS:
|
|
case SNAPINTYPE_DSEX:
|
|
bEnableMove = bEnableMove &&
|
|
!(iSystemFlags & FLAG_DOMAIN_DISALLOW_MOVE);
|
|
bEnableDelete = bEnableDelete &&
|
|
!(iSystemFlags & FLAG_DISALLOW_DELETE);
|
|
bEnableRename = bEnableRename &&
|
|
!(iSystemFlags & FLAG_DOMAIN_DISALLOW_RENAME);
|
|
break;
|
|
|
|
case SNAPINTYPE_SITE:
|
|
bEnableMove = bEnableMove &&
|
|
( iSystemFlags & (FLAG_CONFIG_ALLOW_MOVE | FLAG_CONFIG_ALLOW_LIMITED_MOVE) );
|
|
bEnableDelete = bEnableDelete &&
|
|
!(iSystemFlags & FLAG_DISALLOW_DELETE);
|
|
bEnableRename = bEnableRename &&
|
|
(iSystemFlags & FLAG_CONFIG_ALLOW_RENAME);
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
} // switch
|
|
} // end of for loop
|
|
} // if
|
|
|
|
//
|
|
// add them items to your menu, inserting them at indexMenu + the offset for your
|
|
// item. idCmdFirst / idCmdList is the range you should use, they should
|
|
// not exceed this range. On exit return the number of items and IDs you claimed,
|
|
//
|
|
|
|
//
|
|
// Add the Move menu item if this is the Sites snapin
|
|
// CODEWORK JonN 8/21/01 "if this is NOT the Sites snapin"
|
|
//
|
|
if ((m_CallerSnapin != CLSID_SiteSnapin) &&
|
|
!(m_fClasses & Type_Domain) &&
|
|
bEnableMove &&
|
|
(m_pCD != NULL))
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_MOVE_OBJECT,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_MOVE_OBJECT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_MOVE_OBJECT);
|
|
}
|
|
|
|
//
|
|
// If this is a User or Computer object add the Reset Account menu item
|
|
// It is done this way so that if m_fClasses contains more than computer
|
|
// and object types in conjuction with user and/or object types we fail
|
|
//
|
|
if ( m_fClasses && !(m_fClasses & ~(Type_User | Type_Computer)))
|
|
{
|
|
if (m_objectNamesFormat.GetCount() == 1)
|
|
{
|
|
//
|
|
// Load the string for the menu item
|
|
//
|
|
if (m_fClasses == Type_Computer) // Computer
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_RESET_ACCOUNT,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
}
|
|
else // User
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_CHANGE_PASSWORD,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Insert the menu item
|
|
//
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_CHANGE_PASSWORD,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_CHANGE_PASSWORD);
|
|
|
|
//
|
|
// Bind and figure out if the account is disabled
|
|
// then add a menu item to enable or disable the account accordingly
|
|
//
|
|
hr = DSAdminOpenObject(m_objectNamesFormat.GetName(0),
|
|
IID_IADsUser,
|
|
(void **)&m_pDsObject,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = m_pDsObject->Get(CComBSTR(L"userAccountControl"), &CurrentState);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
m_UserAccountState = CurrentState.lVal;
|
|
if (!(m_UserAccountState & UF_SERVER_TRUST_ACCOUNT))
|
|
{
|
|
if ((m_UserAccountState & UF_ACCOUNTDISABLE))
|
|
{
|
|
//
|
|
// Account is disabled... Load the enable string and insert
|
|
// the menu item
|
|
//
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_ENABLE_ACCOUNT,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_ENABLE_ACCOUNT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_ENABLE_ACCOUNT);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Account is enabled... Load the disable string and insert
|
|
// the menu item.
|
|
//
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_DISABLE_ACCOUNT,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_DISABLE_ACCOUNT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_DISABLE_ACCOUNT);
|
|
}
|
|
}
|
|
} // if get userAccountControl succeeded
|
|
} // if bind succeeded
|
|
|
|
if (m_Advanced)
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_MAP_CERTIFICATES,
|
|
szBuffer, ARRAYLEN(szBuffer)) ) {
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_MAP_CERTIFICATES,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_MAP_CERTIFICATES);
|
|
}
|
|
}
|
|
else // m_objectNamesFormat.GetCount() != 1
|
|
{
|
|
if (m_fClasses && !(m_fClasses & ~(Type_User | Type_Computer)))
|
|
{
|
|
//
|
|
// Load the enable account menu item
|
|
//
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_ENABLE_ACCOUNT,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_ENABLE_ACCOUNT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_ENABLE_ACCOUNT);
|
|
|
|
//
|
|
// Load the disable account menu item
|
|
//
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_DISABLE_ACCOUNT,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_DISABLE_ACCOUNT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_DISABLE_ACCOUNT);
|
|
|
|
} // if (m_objectNamesFormat.GetCount() == 1)
|
|
}
|
|
} // if User or Computer
|
|
|
|
//
|
|
// If the node is a user, or contact insert Add objects to group menu item
|
|
// Note: OU removed 08/02/2000 by JeffJon
|
|
//
|
|
if (m_fClasses && !(m_fClasses & ~(Type_User | Type_Contact)))
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_ADD_TO_GROUP,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
BOOL bInsertSuccess = InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_ADD_OBJECTS_TO_GROUP,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_ADD_OBJECTS_TO_GROUP);
|
|
if (!bInsertSuccess)
|
|
{
|
|
TRACE(_T("Failed to insert Add to group context menu item. 0x%x\n"), GetLastError());
|
|
}
|
|
}
|
|
|
|
//
|
|
// If we weren't called from MMC
|
|
//
|
|
if (!m_internalFormat.HasData())
|
|
{
|
|
//
|
|
// Insert the delete menu item if appropriate
|
|
//
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_DELETE,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
if (bEnableDelete)
|
|
{
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_DELETE_OBJECT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_DELETE_OBJECT);
|
|
}
|
|
|
|
//
|
|
// If single selection and node is a computer insert the rename menu item
|
|
// NOTE : the rename handler is heavily dependent on DSAdmin being the caller
|
|
// hence the check for m_pCD.
|
|
//
|
|
if (m_pCD != NULL &&
|
|
(m_objectNamesFormat.GetCount() == 1) &&
|
|
!(m_fClasses & Type_Computer))
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_RENAME,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
if (bEnableRename)
|
|
{
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_RENAME_OBJECT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_RENAME_OBJECT);
|
|
}
|
|
}
|
|
} // if not called from mmc
|
|
|
|
|
|
//
|
|
// If node type is NTDSConnection insert the replicate now menu item
|
|
//
|
|
if (m_fClasses & Type_TrueNTDSConnection)
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_REPLICATE_NOW,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_REPLICATE_NOW,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_REPLICATE_NOW);
|
|
} // node type NTDSConnection
|
|
|
|
//
|
|
// If node type is user and we can copy it the add the copy object menu item
|
|
//
|
|
if ( (m_pCD != NULL) && (m_objectNamesFormat.GetCount() == 1) && (m_fClasses == Type_User) )
|
|
{
|
|
if (S_OK == m_pCD->_CanCopyDSObject(m_spDataObject))
|
|
{
|
|
if ( !LoadString(AfxGetInstanceHandle(), IDS_COPY_OBJECT,
|
|
szBuffer, ARRAYLEN(szBuffer)) )
|
|
{
|
|
TRACE(_T("Failed to load resource for menu item. hr is %lx\n"), hr);
|
|
goto exit_gracefully;
|
|
}
|
|
InsertMenu(hMenu,
|
|
indexMenu,
|
|
MF_BYPOSITION|MF_STRING,
|
|
idCmdFirst+IDC_COPY_OBJECT,
|
|
szBuffer);
|
|
nLargestCmd = __max(nLargestCmd, idCmdFirst+IDC_COPY_OBJECT);
|
|
} // if
|
|
} // if
|
|
|
|
|
|
hr = S_OK;
|
|
|
|
exit_gracefully:
|
|
|
|
if (SUCCEEDED(hr))
|
|
hr = MAKE_HRESULT(SEVERITY_SUCCESS, 0, cItems);
|
|
|
|
TIMER(_T("Exiting DSContext QCM().\n"));
|
|
return hr;
|
|
}
|
|
|
|
STDMETHODIMP
|
|
CDSContextMenu::InvokeCommand(LPCMINVOKECOMMANDINFO lpcmi)
|
|
{
|
|
AFX_MANAGE_STATE(AfxGetStaticModuleState());
|
|
|
|
HRESULT hr = S_OK;
|
|
TRACE (_T("CDSContextMenu::InvokeCommand\n"));
|
|
|
|
if (lpcmi->hwnd != m_hwnd)
|
|
{
|
|
m_hwnd = lpcmi->hwnd;
|
|
}
|
|
|
|
TRACE (_T("\tlpcmi->lpVerb is %d.\n"), lpcmi->lpVerb);
|
|
switch ((INT_PTR)(lpcmi->lpVerb)) {
|
|
case IDC_ENABLE_ACCOUNT:
|
|
if (m_objectNamesFormat.GetCount() == 1) {
|
|
if (m_UserAccountState & UF_ACCOUNTDISABLE) {
|
|
DisableAccount(FALSE);
|
|
} else {
|
|
DisableAccount(TRUE);
|
|
}
|
|
} else {
|
|
DisableAccount(FALSE);
|
|
}
|
|
break;
|
|
|
|
case IDC_DISABLE_ACCOUNT:
|
|
DisableAccount(TRUE);
|
|
break;
|
|
|
|
case IDC_MAP_CERTIFICATES:
|
|
{
|
|
ASSERT (m_objectNamesFormat.GetCount() == 1);
|
|
LPWSTR pszCanonical = NULL;
|
|
CString szName = m_objectNamesFormat.GetName(0);
|
|
CString szPath;
|
|
StripADsIPath(szName, szPath, false); // don't use escaped mode
|
|
|
|
// we don't care about the return code here
|
|
CrackName((LPWSTR) (LPCWSTR)szPath,
|
|
&pszCanonical,
|
|
GET_OBJ_CAN_NAME,
|
|
NULL);
|
|
|
|
CSimData simData;
|
|
if ( simData.FInit(pszCanonical, szName, m_hwnd))
|
|
{
|
|
CThemeContextActivator activator;
|
|
simData.DoModal();
|
|
}
|
|
else
|
|
hr = E_FAIL;
|
|
|
|
if ( pszCanonical )
|
|
LocalFreeStringW(&pszCanonical);
|
|
|
|
return hr;
|
|
}
|
|
break;
|
|
case IDC_CHANGE_PASSWORD:
|
|
ASSERT (m_objectNamesFormat.GetCount() == 1);
|
|
ModifyPassword();
|
|
break;
|
|
case IDC_MOVE_OBJECT:
|
|
MoveObject();
|
|
break;
|
|
case IDC_DELETE_OBJECT:
|
|
TRACE(_T("called Delete in context menu extension\n"));
|
|
DeleteObject();
|
|
break;
|
|
case IDC_REPLICATE_NOW:
|
|
ReplicateNow();
|
|
break;
|
|
case IDC_ADD_OBJECTS_TO_GROUP:
|
|
AddToGroup();
|
|
break;
|
|
case IDC_COPY_OBJECT:
|
|
CopyObject();
|
|
break;
|
|
case IDC_RENAME_OBJECT:
|
|
Rename();
|
|
break;
|
|
}
|
|
return hr;
|
|
}
|
|
|
|
STDMETHODIMP
|
|
CDSContextMenu::GetCommandString(UINT_PTR idCmd,
|
|
UINT uFlags,
|
|
UINT FAR*,
|
|
LPSTR pszName,
|
|
UINT ccMax)
|
|
|
|
{
|
|
HRESULT hr = S_OK;
|
|
|
|
TRACE (_T("CDSContextMenu::GetCommandString\n"));
|
|
TRACE (_T("\tidCmd is %d.\n"), idCmd);
|
|
if (uFlags == GCS_HELPTEXT)
|
|
{
|
|
CString csHelp;
|
|
|
|
switch ((idCmd))
|
|
{
|
|
case IDC_ENABLE_ACCOUNT:
|
|
csHelp.LoadString (IDS_ENABLE_ACCOUNT_HELPSTRING);
|
|
break;
|
|
|
|
case IDC_DISABLE_ACCOUNT:
|
|
csHelp.LoadString (IDS_DISABLE_ACCOUNT_HELPSTRING);
|
|
break;
|
|
|
|
case IDC_MAP_CERTIFICATES:
|
|
csHelp.LoadString (IDS_MAP_CERTS_HELPSTRING);
|
|
break;
|
|
|
|
case IDC_CHANGE_PASSWORD:
|
|
csHelp.LoadString (IDS_CHANGE_PWD_HELPSTRING);
|
|
break;
|
|
|
|
case IDC_MOVE_OBJECT:
|
|
csHelp.LoadString (IDS_MOVE_OBJECT_HELPSTRING);
|
|
break;
|
|
|
|
case IDC_DELETE_OBJECT:
|
|
csHelp.LoadString (IDS_DELETE_OBJECT_HELPSTRING);
|
|
break;
|
|
|
|
case IDC_REPLICATE_NOW:
|
|
csHelp.LoadString (IDS_REPLICATE_HELPSTRING);
|
|
break;
|
|
|
|
case IDC_ADD_OBJECTS_TO_GROUP:
|
|
csHelp.LoadString (IDS_ADD_OBJECTS_HELPSTRING);
|
|
break;
|
|
case IDC_COPY_OBJECT:
|
|
csHelp.LoadString (IDS_COPY_HELPSTRING);
|
|
break;
|
|
case IDC_RENAME_OBJECT:
|
|
csHelp.LoadString (IDS_RENAME_HELPSTRING);
|
|
break;
|
|
}
|
|
|
|
//NTRAID#NTBUG9-567482-2002/03/10-jmessec There is no release-mode code to validate length < ccMax; could
|
|
//cause a buffer overflow of pszName; especially since buffer length is defined by caller
|
|
ASSERT ((UINT)csHelp.GetLength() < ccMax);
|
|
wcscpy ((LPWSTR)pszName, (LPWSTR)(LPCWSTR)csHelp);
|
|
}
|
|
else if (uFlags == GCS_VERB)
|
|
{
|
|
//
|
|
// Return the language independent ID of the context menu item
|
|
//
|
|
CString szMenuID;
|
|
|
|
switch ((idCmd))
|
|
{
|
|
case IDC_ENABLE_ACCOUNT:
|
|
szMenuID = CMID_ENABLE_ACCOUNT;
|
|
break;
|
|
|
|
case IDC_DISABLE_ACCOUNT:
|
|
szMenuID = CMID_DISABLE_ACCOUNT;
|
|
break;
|
|
|
|
case IDC_MAP_CERTIFICATES:
|
|
szMenuID = CMID_MAP_CERTIFICATES;
|
|
break;
|
|
|
|
case IDC_CHANGE_PASSWORD:
|
|
szMenuID = CMID_CHANGE_PASSWORD;
|
|
break;
|
|
|
|
case IDC_MOVE_OBJECT:
|
|
szMenuID = CMID_MOVE_OBJECT;
|
|
break;
|
|
|
|
case IDC_DELETE_OBJECT:
|
|
szMenuID = CMID_DELETE_OBJECT;
|
|
break;
|
|
|
|
case IDC_REPLICATE_NOW:
|
|
szMenuID = CMID_REPLICATE_NOW;
|
|
break;
|
|
|
|
case IDC_ADD_OBJECTS_TO_GROUP:
|
|
szMenuID = CMID_ADD_OBJECTS_TO_GROUP;
|
|
break;
|
|
|
|
case IDC_COPY_OBJECT:
|
|
szMenuID = CMID_COPY_OBJECT;
|
|
break;
|
|
|
|
case IDC_RENAME_OBJECT:
|
|
szMenuID = CMID_RENAME_OBJECT;
|
|
break;
|
|
}
|
|
|
|
//NTRAID#NTBUG9-567482-2002/03/10-jmessec There is no release-mode code to validate length < ccMax; could
|
|
//cause a buffer overflow of pszName; especially since buffer length is defined by caller
|
|
ASSERT ((UINT)szMenuID.GetLength() < ccMax);
|
|
wcscpy ((LPWSTR)pszName, (LPWSTR)(LPCWSTR)szMenuID);
|
|
}
|
|
else
|
|
{
|
|
TRACE(_T("We are not supporting any other GetCommandString() flags besides GCS_VERB and GCS_HELPTEXT"));
|
|
return E_INVALIDARG;
|
|
}
|
|
return hr;
|
|
}
|
|
|
|
void CDSContextMenu::_ToggleDisabledIcon(UINT index, BOOL bDisable)
|
|
{
|
|
if ( (m_pCD != NULL) && m_internalFormat.HasData())
|
|
{
|
|
CDSUINode* pDSUINode = dynamic_cast<CDSUINode*>(m_internalFormat.GetCookie(index));
|
|
ASSERT(pDSUINode != NULL);
|
|
if (pDSUINode == NULL)
|
|
return;
|
|
m_pCD->ToggleDisabled(pDSUINode, bDisable);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
void CDSContextMenu::DisableAccount(BOOL bDisable)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
HRESULT hr2 = S_OK;
|
|
CComVariant Disabled;
|
|
DWORD Response = IDYES;
|
|
|
|
if (m_objectNamesFormat.GetCount() == 1) { // single selection
|
|
if (m_pDsObject) {
|
|
if (((bDisable) && (!(m_UserAccountState & UF_ACCOUNTDISABLE))) ||
|
|
((!bDisable) && (m_UserAccountState & UF_ACCOUNTDISABLE))) {
|
|
Disabled.vt = VT_I4;
|
|
Disabled.lVal = m_UserAccountState;
|
|
if (bDisable == TRUE) {
|
|
Disabled.lVal |= UF_ACCOUNTDISABLE;
|
|
} else {
|
|
Disabled.lVal &= ~UF_ACCOUNTDISABLE;
|
|
}
|
|
|
|
// prep for display by getting obj name
|
|
CPathCracker pathCracker;
|
|
|
|
hr2 = pathCracker.Set(CComBSTR(m_objectNamesFormat.GetName(0)), ADS_SETTYPE_FULL);
|
|
ASSERT(SUCCEEDED(hr2));
|
|
hr2 = pathCracker.SetDisplayType(ADS_DISPLAY_VALUE_ONLY);
|
|
ASSERT(SUCCEEDED(hr2));
|
|
|
|
CComBSTR DestName;
|
|
|
|
LONG iEMode = 0;
|
|
hr2 = pathCracker.get_EscapedMode(&iEMode);
|
|
ASSERT(SUCCEEDED(hr2));
|
|
hr2 = pathCracker.put_EscapedMode(ADS_ESCAPEDMODE_OFF_EX);
|
|
ASSERT(SUCCEEDED(hr2));
|
|
hr2 = pathCracker.GetElement( 0, &DestName );
|
|
ASSERT(SUCCEEDED(hr2));
|
|
hr2 = pathCracker.put_EscapedMode(iEMode);
|
|
ASSERT(SUCCEEDED(hr2));
|
|
PVOID apv[1] = {(LPWSTR)DestName};
|
|
|
|
CString strClass = m_objectNamesFormat.GetClass(0);
|
|
|
|
if ((strClass == "computer") && (bDisable)) {
|
|
Response = ReportErrorEx (m_hwnd,IDS_12_DISABLE_COMPUTER_P,hr,
|
|
MB_YESNO | MB_DEFBUTTON2 | MB_ICONWARNING, apv, 1);
|
|
}
|
|
if (Response == IDYES) {
|
|
hr = m_pDsObject->Put(CComBSTR(L"userAccountControl"), Disabled);
|
|
hr = m_pDsObject->SetInfo();
|
|
|
|
if (SUCCEEDED(hr)) {
|
|
_ToggleDisabledIcon(0, bDisable);
|
|
if (bDisable) {
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_DISABLED_SUCCESSFULLY,hr,
|
|
MB_OK | MB_ICONINFORMATION, apv, 1);
|
|
}
|
|
else {
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_ENABLED_SUCCESSFULLY,hr,
|
|
MB_OK | MB_ICONINFORMATION, apv, 1);
|
|
}
|
|
} else {
|
|
if (bDisable) {
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_DISABLE_FAILED,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
} else
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_ENABLE_FAILED,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
PVOID apv[1] = {(LPWSTR)m_objectNamesFormat.GetName(0)};
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_OBJECT_NOT_ACCESSABLE,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
}
|
|
else //multiple selection
|
|
{
|
|
UINT index;
|
|
IADsUser * pObj = NULL;
|
|
CComVariant CurrentState;
|
|
DWORD UserAccountState;
|
|
BOOL error = FALSE;
|
|
DWORD ResponseToo = IDYES;
|
|
|
|
if ((m_fClasses & Type_Computer) && (bDisable))
|
|
{
|
|
ResponseToo = ReportMessageEx (m_hwnd, IDS_MULTI_DISABLE_COMPUTER,
|
|
MB_YESNO | MB_ICONWARNING);
|
|
}
|
|
if (ResponseToo == IDYES)
|
|
{
|
|
for (index = 0; index < m_objectNamesFormat.GetCount(); index++)
|
|
{
|
|
hr = DSAdminOpenObject(m_objectNamesFormat.GetName(index),
|
|
IID_IADsUser,
|
|
(void **)&pObj,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = pObj->Get(CComBSTR(L"userAccountControl"), &CurrentState);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
UserAccountState = CurrentState.lVal;
|
|
if (((bDisable) && (!(UserAccountState & UF_ACCOUNTDISABLE))) ||
|
|
((!bDisable) && (UserAccountState & UF_ACCOUNTDISABLE)))
|
|
{
|
|
Disabled.vt = VT_I4;
|
|
Disabled.lVal = UserAccountState;
|
|
if (bDisable == TRUE)
|
|
{
|
|
Disabled.lVal |= UF_ACCOUNTDISABLE;
|
|
}
|
|
else
|
|
{
|
|
Disabled.lVal &= ~UF_ACCOUNTDISABLE;
|
|
}
|
|
hr = pObj->Put(CComBSTR(L"userAccountControl"), Disabled);
|
|
hr = pObj->SetInfo();
|
|
if (FAILED(hr))
|
|
{
|
|
error = TRUE;
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
_ToggleDisabledIcon(index, bDisable);
|
|
}
|
|
}
|
|
}
|
|
pObj->Release();
|
|
}
|
|
else
|
|
{
|
|
// prep for display by getting obj name
|
|
CPathCracker pathCracker;
|
|
|
|
hr2 = pathCracker.Set(CComBSTR(m_objectNamesFormat.GetName(index)), ADS_SETTYPE_FULL);
|
|
ASSERT(SUCCEEDED(hr2));
|
|
hr2 = pathCracker.SetDisplayType(ADS_DISPLAY_VALUE_ONLY);
|
|
ASSERT(SUCCEEDED(hr2));
|
|
|
|
CComBSTR ObjName;
|
|
|
|
hr2 = pathCracker.GetElement( 0, &ObjName );
|
|
ASSERT(SUCCEEDED(hr2));
|
|
PVOID apv[1] = {(LPWSTR)ObjName};
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_OBJECT_NOT_ACCESSABLE,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
}
|
|
}
|
|
if (error)
|
|
{
|
|
if (bDisable)
|
|
ReportErrorEx (m_hwnd,IDS_DISABLES_FAILED,hr,
|
|
MB_OK | MB_ICONERROR, NULL, 0);
|
|
else
|
|
ReportErrorEx (m_hwnd,IDS_ENABLES_FAILED,hr,
|
|
MB_OK | MB_ICONERROR, NULL, 0);
|
|
}
|
|
else
|
|
{
|
|
if (bDisable)
|
|
{
|
|
ReportErrorEx (m_hwnd, IDS_DISABLED_SUCCESSFULLY, S_OK,
|
|
MB_OK | MB_ICONINFORMATION, NULL, 0);
|
|
}
|
|
else
|
|
{
|
|
ReportErrorEx (m_hwnd, IDS_ENABLED_SUCCESSFULLY, S_OK,
|
|
MB_OK | MB_ICONINFORMATION, NULL, 0);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void CDSContextMenu::ModifyPassword()
|
|
{
|
|
HRESULT hr = S_OK;
|
|
CString NewPwd, CfmPwd;
|
|
CComVariant Var;
|
|
BOOL error;
|
|
LPCWSTR lpszClass, lpszPath;
|
|
CChangePassword ChgDlg;
|
|
CWaitCursor CWait;
|
|
|
|
lpszPath = m_objectNamesFormat.GetName(0);
|
|
|
|
// prep for display by getting obj name
|
|
CPathCracker pathCracker;
|
|
|
|
hr = pathCracker.Set(CComBSTR(lpszPath), ADS_SETTYPE_FULL);
|
|
hr = pathCracker.SetDisplayType(ADS_DISPLAY_VALUE_ONLY);
|
|
hr = pathCracker.put_EscapedMode(ADS_ESCAPEDMODE_OFF_EX);
|
|
|
|
CComBSTR ObjName;
|
|
hr = pathCracker.Retrieve(ADS_FORMAT_LEAF, &ObjName );
|
|
|
|
PVOID apv[1] = {(LPWSTR)ObjName};
|
|
|
|
if (!m_pDsObject) {
|
|
hr = DSAdminOpenObject(lpszPath,
|
|
IID_IADsUser,
|
|
(void **)&m_pDsObject,
|
|
TRUE /*bServer*/);
|
|
if (FAILED(hr)) {
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_OBJECT_NOT_ACCESSABLE,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
goto exit_gracefully;
|
|
}
|
|
}
|
|
|
|
lpszClass = m_objectNamesFormat.GetClass(0);
|
|
|
|
//
|
|
// Get the userAccountControl
|
|
//
|
|
ASSERT(SUCCEEDED(hr));
|
|
hr = m_pDsObject->Get(CComBSTR(L"userAccountControl"), &Var);
|
|
|
|
if (wcscmp(lpszClass, L"computer") == 0)
|
|
{
|
|
if (FAILED(hr) || ((Var.lVal & UF_SERVER_TRUST_ACCOUNT) != 0))
|
|
{
|
|
ReportErrorEx (m_hwnd, IDS_1_CANT_RESET_DOMAIN_CONTROLLER, S_OK,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
else
|
|
{
|
|
DWORD Response = IDYES;
|
|
Response = ReportMessageEx (m_hwnd, IDS_CONFIRM_PASSWORD,
|
|
MB_YESNO | MB_ICONWARNING | MB_DEFBUTTON2);
|
|
if (Response == IDYES)
|
|
{
|
|
hr = m_pDsObject->Get(CComBSTR(L"sAMAccountName"), &Var);
|
|
ASSERT(SUCCEEDED(hr));
|
|
NewPwd = Var.bstrVal;
|
|
NewPwd = NewPwd.Left(14);
|
|
INT loc = NewPwd.Find(L"$");
|
|
if (loc > 0)
|
|
{
|
|
NewPwd = NewPwd.Left(loc);
|
|
}
|
|
|
|
// NTRAID#NTBUG9-483038-10/18/2001-JeffJon
|
|
// CString::MakeLower() doesn't lower case German characters
|
|
// correctly. Using _wcslwr instead. setlocale must be
|
|
// called before calling _wcslwr so that it properly lowercases
|
|
// extended characters. Store the result and call setlocale
|
|
// again when done to set it back to the original so as not
|
|
// to affect other snapins in the process
|
|
|
|
PWSTR oldLocale = _wsetlocale(LC_ALL, L"");
|
|
|
|
CString lowerCaseNewPwd = _wcslwr((LPWSTR)(LPCWSTR)NewPwd);
|
|
|
|
_wsetlocale(LC_ALL, oldLocale);
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = m_pDsObject->SetPassword(CComBSTR(lowerCaseNewPwd));
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
ReportErrorEx (m_hwnd,IDS_1_RESET_ACCOUNT_SUCCESSFULL,hr,
|
|
MB_OK | MB_ICONINFORMATION, apv, 1);
|
|
}
|
|
else
|
|
{
|
|
ReportErrorEx (m_hwnd,IDS_12_RESET_ACCOUNT_FAILED,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else // Not computer object
|
|
{
|
|
//
|
|
// If password doesn't expire don't allow the checkbox for
|
|
// requiring the user to change the password at next logon
|
|
//
|
|
if (Var.lVal & UF_DONT_EXPIRE_PASSWD)
|
|
{
|
|
ChgDlg.AllowMustChangePasswordCheck(FALSE);
|
|
}
|
|
|
|
//
|
|
// NTRAID#Windows Bugs-278296-2001/01/12-jeffjon
|
|
// Checking "user must change password" on the Reset Pwd dialog
|
|
// is silently ignored when Write PwdLastSet not granted
|
|
//
|
|
// Disable the checkbox if the admin doesn't have the right
|
|
// to write the pwdLastSet attribute
|
|
//
|
|
BOOL bAllowMustChangePassword = FALSE;
|
|
CComPtr<IDirectoryObject> spDirObject;
|
|
hr = m_pDsObject->QueryInterface(IID_IDirectoryObject, (void**)&spDirObject);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
PWSTR ppAttrs[] = { (PWSTR)g_pszAllowedAttributesEffective };
|
|
DWORD dwAttrsReturned = 0;
|
|
PADS_ATTR_INFO pAttrInfo = 0;
|
|
hr = spDirObject->GetObjectAttributes(ppAttrs, 1, &pAttrInfo, &dwAttrsReturned);
|
|
if (SUCCEEDED(hr) && dwAttrsReturned == 1 && pAttrInfo)
|
|
{
|
|
if (pAttrInfo->pszAttrName &&
|
|
0 == _wcsicmp(pAttrInfo->pszAttrName, g_pszAllowedAttributesEffective) &&
|
|
pAttrInfo->pADsValues)
|
|
{
|
|
for (DWORD dwIdx = 0; dwIdx < pAttrInfo->dwNumValues; ++dwIdx)
|
|
{
|
|
if (pAttrInfo->pADsValues[dwIdx].CaseIgnoreString &&
|
|
_wcsicmp(pAttrInfo->pADsValues[dwIdx].CaseIgnoreString, g_pszPwdLastSet))
|
|
{
|
|
bAllowMustChangePassword = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Disable the checkbox if the user object doesn't have rights
|
|
// to change their password
|
|
//
|
|
if (!CanUserChangePassword(spDirObject))
|
|
{
|
|
bAllowMustChangePassword = FALSE;
|
|
}
|
|
}
|
|
if (!bAllowMustChangePassword)
|
|
{
|
|
ChgDlg.AllowMustChangePasswordCheck(FALSE);
|
|
}
|
|
|
|
|
|
do
|
|
{
|
|
error = FALSE;
|
|
|
|
CThemeContextActivator activator;
|
|
if (ChgDlg.DoModal() == IDOK)
|
|
{
|
|
// NTRAID#NTBUG9-635046-2002/06/10-artm
|
|
hr = ChgDlg.GetLastEncryptionResult();
|
|
if (FAILED(hr))
|
|
{
|
|
// For whatever reason, we failed to correctly store
|
|
// the password(s) the user typed. Tell the user that
|
|
// the operation failed, and retry getting password.
|
|
ReportErrorEx(
|
|
m_hwnd,
|
|
IDS_12_PASSWORD_CHANGE_FAILED,
|
|
hr,
|
|
MB_OK | MB_ICONERROR,
|
|
apv,
|
|
1);
|
|
|
|
error = TRUE;
|
|
continue;
|
|
}
|
|
|
|
CWaitCursor CWait2;
|
|
const EncryptedString newPwd = ChgDlg.GetNew();
|
|
const EncryptedString cfmPwd = ChgDlg.GetConfirm();
|
|
|
|
if (newPwd == cfmPwd)
|
|
{
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
WCHAR* clearText = newPwd.GetClearTextCopy();
|
|
|
|
if (NULL == clearText)
|
|
{
|
|
// Ran out of memory!
|
|
hr = E_OUTOFMEMORY;
|
|
newPwd.DestroyClearTextCopy(clearText);
|
|
|
|
ReportErrorEx(
|
|
m_hwnd,
|
|
IDS_12_PASSWORD_CHANGE_FAILED,
|
|
hr,
|
|
MB_OK | MB_ICONERROR,
|
|
apv,
|
|
1);
|
|
|
|
return;
|
|
}
|
|
hr = m_pDsObject->SetPassword(CComBSTR(clearText));
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
hr = ModifyNetWareUserPassword(m_pDsObject, lpszPath, clearText);
|
|
}
|
|
|
|
// Zero out memory used for clear text copy and free its memory.
|
|
newPwd.DestroyClearTextCopy(clearText);
|
|
clearText = NULL;
|
|
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
HRESULT hr2 = S_OK;
|
|
BOOL ForceChange = ChgDlg.GetChangePwd();
|
|
if (ForceChange)
|
|
{
|
|
//Check to see if the user password does not expire
|
|
BOOL bContinueToForceChange = TRUE;
|
|
IADs* pIADs = NULL;
|
|
HRESULT hr3 = m_pDsObject->QueryInterface(IID_IADs, OUT (void **)&pIADs);
|
|
if (SUCCEEDED(hr3))
|
|
{
|
|
ASSERT(pIADs != NULL);
|
|
CComVariant var;
|
|
hr3 = pIADs->Get(CComBSTR(gsz_userAccountControl), OUT &var);
|
|
if (SUCCEEDED(hr3))
|
|
{
|
|
ASSERT(var.vt == VT_I4);
|
|
if (var.lVal & UF_DONT_EXPIRE_PASSWD)
|
|
{
|
|
ReportErrorEx (m_hwnd,IDS_12_PASSWORD_DOES_NOT_EXPIRE,hr,
|
|
MB_OK | MB_ICONWARNING, apv, 1);
|
|
bContinueToForceChange = FALSE;
|
|
}
|
|
pIADs->Release();
|
|
}
|
|
}
|
|
|
|
// If password can expire then force the change at next logon
|
|
if (bContinueToForceChange)
|
|
{
|
|
IDirectoryObject * pIDSObject = NULL;
|
|
LPWSTR szPwdLastSet = L"pwdLastSet";
|
|
ADSVALUE ADsValuePwdLastSet = {ADSTYPE_LARGE_INTEGER, NULL};
|
|
ADS_ATTR_INFO AttrInfoPwdLastSet = {szPwdLastSet, ADS_ATTR_UPDATE,
|
|
ADSTYPE_LARGE_INTEGER,
|
|
&ADsValuePwdLastSet, 1};
|
|
ADsValuePwdLastSet.LargeInteger.QuadPart = 0;
|
|
hr2 = m_pDsObject->QueryInterface(IID_IDirectoryObject,
|
|
OUT (void **)&pIDSObject);
|
|
if (SUCCEEDED(hr2))
|
|
{
|
|
ASSERT(pIDSObject != NULL);
|
|
DWORD cAttrModified = 0;
|
|
hr2 = pIDSObject->SetObjectAttributes(&AttrInfoPwdLastSet,
|
|
1, &cAttrModified);
|
|
pIDSObject->Release();
|
|
|
|
if (FAILED(hr2))
|
|
{
|
|
ReportErrorEx(
|
|
m_hwnd,
|
|
IDS_PASSWORD_CHANGE_SUCCESS_FORCE_CHANGE_FAIL,
|
|
hr,
|
|
MB_OK | MB_ICONERROR, apv, 2);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (SUCCEEDED(hr2))
|
|
{
|
|
ReportErrorEx (m_hwnd,IDS_12_PASSWORD_CHANGE_SUCCESSFUL,hr,
|
|
MB_OK | MB_ICONINFORMATION, apv, 1);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
ReportErrorEx (m_hwnd,IDS_12_PASSWORD_CHANGE_FAILED,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
ReportErrorEx (m_hwnd,IDS_NEW_AND_CONFIRM_NOT_SAME,hr,
|
|
MB_OK | MB_ICONERROR, NULL, 0);
|
|
ChgDlg.Clear();
|
|
error = TRUE;
|
|
}
|
|
}
|
|
} while (error);
|
|
}
|
|
exit_gracefully:
|
|
return;
|
|
}
|
|
|
|
#define BREAK_ON_FAIL if (FAILED(hr)) { break; }
|
|
#define BREAK_AND_ASSERT_ON_FAIL if (FAILED(hr)) { ASSERT(FALSE); break; }
|
|
#define RETURN_AND_ASSERT_ON_FAIL if (FAILED(hr)) { ASSERT(FALSE); return; }
|
|
|
|
void CDSContextMenu::MoveObject()
|
|
{
|
|
|
|
// REVIEW_MARCOC: need to make sure the LDAP path has the SERVER or DOMAIN in it
|
|
|
|
// if called in the context of DS Admin, guard against property sheet open on this cookie
|
|
if (_WarningOnSheetsUp())
|
|
return;
|
|
|
|
// get the first path in the data object
|
|
ASSERT(m_objectNamesFormat.HasData());
|
|
|
|
// now do crack name to get root path for the browse dialog
|
|
CString szRootPath;
|
|
|
|
if (m_pCD != NULL)
|
|
{
|
|
szRootPath = m_pCD->GetBasePathsInfo()->GetProviderAndServerName();
|
|
szRootPath += m_pCD->GetRootPath();
|
|
}
|
|
else
|
|
{
|
|
|
|
LPCWSTR lpszObjPath = m_objectNamesFormat.GetName(0);
|
|
|
|
// make sure there's no strange escaping in the path
|
|
CComBSTR bstrPath;
|
|
CComBSTR bstrProvider;
|
|
CComBSTR bstrServer;
|
|
|
|
|
|
CPathCracker pathCracker;
|
|
|
|
pathCracker.Set(CComBSTR(lpszObjPath), ADS_SETTYPE_FULL);
|
|
pathCracker.SetDisplayType(ADS_DISPLAY_FULL);
|
|
pathCracker.put_EscapedMode(ADS_ESCAPEDMODE_OFF);
|
|
pathCracker.Retrieve( ADS_FORMAT_X500_DN, &bstrPath);
|
|
pathCracker.Retrieve( ADS_FORMAT_SERVER, &bstrServer);
|
|
pathCracker.Retrieve( ADS_FORMAT_PROVIDER, &bstrProvider);
|
|
|
|
|
|
LPWSTR pwszDomainPath;
|
|
HRESULT hr = CrackName(const_cast<LPWSTR>((LPCWSTR)bstrPath),
|
|
&pwszDomainPath,
|
|
GET_FQDN_DOMAIN_NAME,
|
|
m_hwnd);
|
|
|
|
if ((FAILED(hr)) || (HRESULT_CODE(hr) == DS_NAME_ERROR_NO_MAPPING))
|
|
{
|
|
TRACE(_T("CrackNames failed to get domain for %s.\n"),
|
|
lpszObjPath);
|
|
szRootPath = L"";
|
|
}
|
|
else
|
|
{
|
|
CPathCracker pathCrackerOther;
|
|
hr = pathCrackerOther.Set( CComBSTR(pwszDomainPath), ADS_SETTYPE_DN );
|
|
RETURN_AND_ASSERT_ON_FAIL;
|
|
hr = pathCrackerOther.Set( bstrProvider, ADS_SETTYPE_PROVIDER );
|
|
RETURN_AND_ASSERT_ON_FAIL;
|
|
hr = pathCrackerOther.Set( bstrServer, ADS_SETTYPE_SERVER );
|
|
RETURN_AND_ASSERT_ON_FAIL;
|
|
CComBSTR sbstrRootPath;
|
|
hr = pathCrackerOther.Retrieve( ADS_FORMAT_X500, &sbstrRootPath );
|
|
RETURN_AND_ASSERT_ON_FAIL;
|
|
szRootPath = sbstrRootPath;
|
|
}
|
|
if (pwszDomainPath != NULL)
|
|
::LocalFreeStringW(&pwszDomainPath);
|
|
}
|
|
|
|
CMultiselectMoveHandler moveHandler(m_pCD, m_hwnd, szRootPath);
|
|
HRESULT hr = moveHandler.Initialize(m_spDataObject, &m_objectNamesFormat,
|
|
&m_internalFormat);
|
|
ASSERT(SUCCEEDED(hr));
|
|
moveHandler.Move();
|
|
}
|
|
|
|
|
|
void CDSContextMenu::DeleteObject()
|
|
{
|
|
_ASSERTE(m_objectNamesFormat.HasData());
|
|
|
|
// if called in the context of DS Admin, guard against property sheet open on this cookie
|
|
if (_WarningOnSheetsUp())
|
|
return;
|
|
|
|
UINT nObjectCount = m_objectNamesFormat.GetCount();
|
|
if (nObjectCount == 0)
|
|
{
|
|
ASSERT(nObjectCount != 0);
|
|
return;
|
|
}
|
|
|
|
UINT nDeletedCount = 0;
|
|
|
|
PCWSTR* pszNameDelArr = 0;
|
|
PCWSTR* pszClassDelArr = 0;
|
|
DWORD* dwFlagsDelArr = 0;
|
|
DWORD* dwProviderFlagsDelArr = 0;
|
|
|
|
do // false loop
|
|
{
|
|
pszNameDelArr = new PCWSTR[nObjectCount];
|
|
pszClassDelArr = new PCWSTR[nObjectCount];
|
|
dwFlagsDelArr = new DWORD[nObjectCount];
|
|
dwProviderFlagsDelArr = new DWORD[nObjectCount];
|
|
|
|
if (!pszNameDelArr ||
|
|
!pszClassDelArr ||
|
|
!dwFlagsDelArr ||
|
|
!dwProviderFlagsDelArr)
|
|
{
|
|
break;
|
|
}
|
|
|
|
switch(nObjectCount)
|
|
{
|
|
case 1:
|
|
{
|
|
// single selection delete
|
|
CContextMenuSingleDeleteHandler deleteHandler(m_pCD, m_hwnd,
|
|
m_objectNamesFormat.GetName(0),
|
|
m_objectNamesFormat.GetClass(0),
|
|
m_objectNamesFormat.IsContainer(0),
|
|
this);
|
|
HRESULT hr = deleteHandler.Delete();
|
|
if (SUCCEEDED(hr) && (hr != S_FALSE))
|
|
{
|
|
nDeletedCount = 1;
|
|
pszNameDelArr[0] = m_objectNamesFormat.GetName(0);
|
|
pszClassDelArr[0] = m_objectNamesFormat.GetClass(0);
|
|
dwFlagsDelArr[0] = m_objectNamesFormat.GetFlags(0);
|
|
dwProviderFlagsDelArr[0] = m_objectNamesFormat.GetProviderFlags(0);
|
|
}
|
|
|
|
}
|
|
break;
|
|
default:
|
|
{
|
|
// multiple selection
|
|
CContextMenuMultipleDeleteHandler deleteHandler(m_pCD, m_hwnd, m_spDataObject,
|
|
&m_objectNamesFormat, this);
|
|
deleteHandler.Delete();
|
|
for (UINT k=0; k< nObjectCount; k++)
|
|
{
|
|
if (deleteHandler.WasItemDeleted(k))
|
|
{
|
|
pszNameDelArr[nDeletedCount] = m_objectNamesFormat.GetName(k);
|
|
pszClassDelArr[nDeletedCount] = m_objectNamesFormat.GetClass(k);
|
|
dwFlagsDelArr[nDeletedCount] = m_objectNamesFormat.GetFlags(k);
|
|
dwProviderFlagsDelArr[nDeletedCount] = m_objectNamesFormat.GetProviderFlags(k);
|
|
|
|
nDeletedCount++;
|
|
} // if
|
|
} // for
|
|
}
|
|
}; // switch
|
|
|
|
|
|
_NotifyDsFind((PCWSTR*)pszNameDelArr,
|
|
(PCWSTR*)pszClassDelArr,
|
|
dwFlagsDelArr,
|
|
dwProviderFlagsDelArr,
|
|
nDeletedCount);
|
|
} while (false);
|
|
|
|
if (pszNameDelArr)
|
|
{
|
|
delete[] pszNameDelArr;
|
|
pszNameDelArr = 0;
|
|
}
|
|
|
|
if (pszClassDelArr)
|
|
{
|
|
delete[] pszClassDelArr;
|
|
pszClassDelArr = 0;
|
|
}
|
|
|
|
if (dwFlagsDelArr)
|
|
{
|
|
delete[] dwFlagsDelArr;
|
|
dwFlagsDelArr = 0;
|
|
}
|
|
|
|
if (dwProviderFlagsDelArr)
|
|
{
|
|
delete[] dwProviderFlagsDelArr;
|
|
dwProviderFlagsDelArr = 0;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
void CDSContextMenu::_NotifyDsFind(LPCWSTR* lpszNameDelArr,
|
|
LPCWSTR* lpszClassDelArr,
|
|
DWORD* dwFlagsDelArr,
|
|
DWORD* dwProviderFlagsDelArr,
|
|
UINT nDeletedCount)
|
|
{
|
|
if (nDeletedCount == 0)
|
|
{
|
|
// nothing to delete
|
|
return;
|
|
}
|
|
|
|
if (m_internalFormat.HasData())
|
|
{
|
|
// called from DS Admin directly, not from DS Find
|
|
return;
|
|
}
|
|
|
|
// ask DS Find about the notification interface
|
|
CComPtr<IQueryFrame> spIQueryFrame;
|
|
if ( !::SendMessage(m_hwnd, CQFWM_GETFRAME, 0, (LPARAM)&spIQueryFrame) )
|
|
{
|
|
// interface not found
|
|
return;
|
|
}
|
|
|
|
CComPtr<IDsQueryHandler> spDsQueryHandler;
|
|
HRESULT hr = spIQueryFrame->GetHandler(IID_IDsQueryHandler, (void **)&spDsQueryHandler);
|
|
if (FAILED(hr))
|
|
{
|
|
// interface not found
|
|
return;
|
|
}
|
|
|
|
// we finally have the interface, build the data structures
|
|
|
|
// figure out how much storage we need
|
|
DWORD cbStruct = sizeof(DSOBJECTNAMES) +
|
|
((nDeletedCount - 1) * sizeof(DSOBJECT));
|
|
|
|
size_t cbStorage = 0;
|
|
for (UINT index = 0; index < nDeletedCount; index++)
|
|
{
|
|
cbStorage += sizeof(WCHAR)*(wcslen(lpszNameDelArr[index])+1);
|
|
cbStorage += sizeof(WCHAR)*(wcslen(lpszClassDelArr[index])+1);
|
|
}
|
|
|
|
// allocate memory
|
|
LPDSOBJECTNAMES pDSObj = (LPDSOBJECTNAMES)::malloc(cbStruct + cbStorage);
|
|
if (pDSObj == NULL)
|
|
{
|
|
ASSERT(FALSE);
|
|
return;
|
|
}
|
|
|
|
// fill in the structs
|
|
pDSObj->clsidNamespace = m_CallerSnapin;
|
|
|
|
pDSObj->cItems = nDeletedCount;
|
|
DWORD NextOffset = cbStruct;
|
|
for (index = 0; index < nDeletedCount; index++)
|
|
{
|
|
pDSObj->aObjects[index].dwFlags = dwFlagsDelArr[index];
|
|
|
|
pDSObj->aObjects[index].dwProviderFlags = dwProviderFlagsDelArr[index];
|
|
|
|
pDSObj->aObjects[index].offsetName = NextOffset;
|
|
pDSObj->aObjects[index].offsetClass = static_cast<ULONG>(NextOffset +
|
|
(wcslen(lpszNameDelArr[index])+1) * sizeof(WCHAR));
|
|
|
|
_tcscpy((LPTSTR)((BYTE *)pDSObj + NextOffset), lpszNameDelArr[index]);
|
|
NextOffset += static_cast<ULONG>((wcslen(lpszNameDelArr[index]) + 1) * sizeof(WCHAR));
|
|
|
|
_tcscpy((LPTSTR)((BYTE *)pDSObj + NextOffset), lpszClassDelArr[index]);
|
|
NextOffset += static_cast<ULONG>((wcslen(lpszClassDelArr[index]) + 1) * sizeof(WCHAR));
|
|
}
|
|
|
|
// make the call
|
|
hr = spDsQueryHandler->UpdateView(DSQRVF_ITEMSDELETED, pDSObj);
|
|
|
|
::free(pDSObj);
|
|
|
|
}
|
|
|
|
HRESULT
|
|
CDSContextMenu::_Delete(LPCWSTR lpszPath, LPCWSTR lpszClass,
|
|
CString * csName)
|
|
{
|
|
CComBSTR strParent;
|
|
CComBSTR strThisRDN;
|
|
IADsContainer * pDSContainer = NULL;
|
|
IADs * pDSObject = NULL;
|
|
HRESULT hr = S_OK;
|
|
|
|
hr = DSAdminOpenObject(lpszPath,
|
|
IID_IADs,
|
|
(void **) &pDSObject,
|
|
TRUE /*bServer*/);
|
|
if (!SUCCEEDED(hr)) {
|
|
goto error;
|
|
}
|
|
|
|
hr = pDSObject->get_Parent(&strParent);
|
|
if (!SUCCEEDED(hr)) {
|
|
goto error;
|
|
}
|
|
|
|
hr = pDSObject->get_Name (&strThisRDN);
|
|
if (!SUCCEEDED(hr)) {
|
|
goto error;
|
|
}
|
|
|
|
pDSObject->Release();
|
|
pDSObject = NULL;
|
|
|
|
hr = DSAdminOpenObject(strParent,
|
|
IID_IADsContainer,
|
|
(void **) &pDSContainer,
|
|
TRUE /*bServer*/);
|
|
if (!SUCCEEDED(hr)) {
|
|
goto error;
|
|
}
|
|
|
|
hr = pDSContainer->Delete (CComBSTR(lpszClass),
|
|
CComBSTR(strThisRDN));
|
|
|
|
error:
|
|
if (pDSContainer)
|
|
pDSContainer->Release();
|
|
if (pDSObject)
|
|
pDSObject->Release();
|
|
if (FAILED(hr)) {
|
|
*csName = strThisRDN;
|
|
}
|
|
return hr;
|
|
}
|
|
|
|
HRESULT
|
|
CDSContextMenu::_DeleteSubtree(LPCWSTR lpszPath,
|
|
CString * csName)
|
|
{
|
|
HRESULT hr = S_OK;
|
|
|
|
IADsDeleteOps * pObj = NULL;
|
|
IADs * pObj2 = NULL;
|
|
|
|
hr = DSAdminOpenObject(lpszPath,
|
|
IID_IADsDeleteOps,
|
|
(void **)&pObj,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr)) {
|
|
TIMER(_T("Call to Deleteobject (to do subtree delete).\n"));
|
|
hr = pObj->DeleteObject(NULL); //flag is reserved by ADSI
|
|
TIMER(_T("Call to Deleteobject completed.\n"));
|
|
}
|
|
if (FAILED(hr)) {
|
|
CComBSTR strName;
|
|
HRESULT hr2 = pObj->QueryInterface (IID_IADs, (void **)&pObj2);
|
|
if (SUCCEEDED(hr2)) {
|
|
hr2 = pObj2->get_Name(&strName);
|
|
if (SUCCEEDED(hr2)) {
|
|
*csName = strName;
|
|
} else {
|
|
csName->LoadString (IDS_UNKNOWN);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (pObj2) {
|
|
pObj2->Release();
|
|
}
|
|
if (pObj) {
|
|
pObj->Release();
|
|
}
|
|
return hr;
|
|
}
|
|
|
|
// code from JeffParh
|
|
NTSTATUS RetrieveRootDomainName( LPCWSTR lpcwszTargetDC, BSTR* pbstrRootDomainName )
|
|
{
|
|
if (NULL == pbstrRootDomainName)
|
|
{
|
|
ASSERT(FALSE);
|
|
return STATUS_INVALID_PARAMETER;
|
|
}
|
|
ASSERT( NULL == *pbstrRootDomainName );
|
|
|
|
NTSTATUS ntStatus = STATUS_SUCCESS;
|
|
LSA_HANDLE hPolicy = NULL;
|
|
POLICY_DNS_DOMAIN_INFO* pDnsDomainInfo = NULL;
|
|
|
|
do { // false loop
|
|
|
|
UNICODE_STRING unistrTargetDC;
|
|
if (NULL != lpcwszTargetDC)
|
|
{
|
|
unistrTargetDC.Length = (USHORT)(::lstrlen(lpcwszTargetDC)*sizeof(WCHAR));
|
|
unistrTargetDC.MaximumLength = unistrTargetDC.Length;
|
|
unistrTargetDC.Buffer = (LPWSTR)lpcwszTargetDC;
|
|
}
|
|
|
|
LSA_OBJECT_ATTRIBUTES oa;
|
|
ZeroMemory( &oa, sizeof(oa) );
|
|
ntStatus = LsaOpenPolicy(
|
|
(NULL != lpcwszTargetDC) ? &unistrTargetDC : NULL,
|
|
&oa,
|
|
POLICY_VIEW_LOCAL_INFORMATION,
|
|
&hPolicy
|
|
);
|
|
if ( !LSA_SUCCESS( ntStatus ) )
|
|
{
|
|
ASSERT(FALSE);
|
|
break;
|
|
}
|
|
|
|
ntStatus = LsaQueryInformationPolicy(
|
|
hPolicy,
|
|
PolicyDnsDomainInformation,
|
|
(PVOID*)&pDnsDomainInfo
|
|
);
|
|
if ( !LSA_SUCCESS( ntStatus ) )
|
|
{
|
|
ASSERT(FALSE);
|
|
break;
|
|
}
|
|
|
|
*pbstrRootDomainName = ::SysAllocStringLen(
|
|
pDnsDomainInfo->DnsForestName.Buffer,
|
|
pDnsDomainInfo->DnsForestName.Length / sizeof(WCHAR) );
|
|
if (NULL == *pbstrRootDomainName)
|
|
{
|
|
ntStatus = STATUS_NO_MEMORY;
|
|
break;
|
|
}
|
|
|
|
} while (false); // false loop
|
|
|
|
if (NULL != pDnsDomainInfo)
|
|
{
|
|
NTSTATUS ntstatus2 = LsaFreeMemory( pDnsDomainInfo );
|
|
ASSERT( LSA_SUCCESS(ntstatus2) );
|
|
}
|
|
if (NULL != hPolicy)
|
|
{
|
|
NTSTATUS ntstatus2 = LsaClose( hPolicy );
|
|
ASSERT( LSA_SUCCESS(ntstatus2) );
|
|
}
|
|
|
|
return ntStatus;
|
|
}
|
|
|
|
void AddMatchingNCs(
|
|
IN OUT CStringList& refstrlist,
|
|
IN const PADS_ATTR_INFO padsattrinfo1,
|
|
IN const PADS_ATTR_INFO padsattrinfo2 )
|
|
{
|
|
if ( !padsattrinfo1 || !padsattrinfo2 )
|
|
return;
|
|
for (DWORD iTarget = 0; iTarget < padsattrinfo1[0].dwNumValues; iTarget++)
|
|
{
|
|
LPWSTR lpszTargetNC = padsattrinfo1[0].pADsValues[iTarget].DNString;
|
|
ASSERT( NULL != lpszTargetNC );
|
|
bool fFound = false;
|
|
for (DWORD iSource = 0; iSource < padsattrinfo2[0].dwNumValues; iSource++)
|
|
{
|
|
LPWSTR lpszSourceNC = padsattrinfo2[0].pADsValues[iSource].DNString;
|
|
ASSERT( NULL != lpszSourceNC );
|
|
if ( !lstrcmpiW( lpszTargetNC, lpszSourceNC ) )
|
|
{
|
|
fFound = true;
|
|
break;
|
|
}
|
|
}
|
|
if (fFound)
|
|
refstrlist.AddHead( lpszTargetNC ); // CODEWORK can throw
|
|
}
|
|
}
|
|
|
|
|
|
HRESULT PrepareReplicaSyncParameters(
|
|
IN LPCWSTR strNTDSConnection,
|
|
IN BSTR bstrRootDomainName,
|
|
OUT BSTR* pbstrDsBindName,
|
|
OUT UUID* puuidSourceObjectGUID,
|
|
OUT CStringList& refstrlistCommonNCs,
|
|
OUT ULONG* pulDsSyncOptions,
|
|
OUT BSTR* pbstrFromServer
|
|
)
|
|
{
|
|
ASSERT( NULL != strNTDSConnection
|
|
&& NULL != bstrRootDomainName
|
|
&& NULL != pbstrDsBindName
|
|
&& NULL == *pbstrDsBindName
|
|
&& NULL != puuidSourceObjectGUID
|
|
&& refstrlistCommonNCs.IsEmpty()
|
|
&& NULL != pulDsSyncOptions
|
|
);
|
|
|
|
HRESULT hr = S_OK;
|
|
|
|
do { // false loop
|
|
|
|
CComPtr<IADs> spIADs;
|
|
// read attributes of nTDSConnection object
|
|
hr = DSAdminOpenObject(strNTDSConnection,
|
|
IID_IADs,
|
|
(void **) &spIADs,
|
|
TRUE /*bServer*/);
|
|
BREAK_ON_FAIL;
|
|
hr = GetStringAttr( spIADs, L"fromServer", pbstrFromServer);
|
|
BREAK_AND_ASSERT_ON_FAIL; // required attribute
|
|
spIADs.Release(); // method of CComPtr<>, also sets pointer to NULL
|
|
|
|
// get the path to the target nTDSDSA object
|
|
CPathCracker pathCracker;
|
|
|
|
hr = pathCracker.Set( const_cast<BSTR>(strNTDSConnection), ADS_SETTYPE_FULL );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
hr = pathCracker.RemoveLeafElement();
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
CComBSTR sbstrTargetNTDSDSAPath;
|
|
hr = pathCracker.Retrieve( ADS_FORMAT_X500, &sbstrTargetNTDSDSAPath );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
|
|
// get the sitename for the target NTDSA object
|
|
hr = pathCracker.SetDisplayType( ADS_DISPLAY_VALUE_ONLY );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
CComBSTR sbstrTargetSite;
|
|
hr = pathCracker.GetElement( 3L, &sbstrTargetSite );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
hr = pathCracker.SetDisplayType( ADS_DISPLAY_FULL );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
|
|
// read objectGUID of the target nTDSDSA object
|
|
hr = DSAdminOpenObject(sbstrTargetNTDSDSAPath,
|
|
IID_IADs,
|
|
(void **) &spIADs,
|
|
TRUE /*bServer*/);
|
|
BREAK_ON_FAIL;
|
|
CComBSTR sbstrTargetObjectGUID;
|
|
hr = GetObjectGUID( spIADs, &sbstrTargetObjectGUID );
|
|
// The objectGUID attribute should be set for nTDSDSA objects
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
|
|
// read hasMasterNCs of the target nTDSDSA object
|
|
Smart_PADS_ATTR_INFO spTargetMasterNCAttrs;
|
|
// 531591 JonN 2002/04/01 .NET Server domains use msDS-hasMasterNCs
|
|
hr = GetAttr( spIADs, L"msDS-hasMasterNCs", &spTargetMasterNCAttrs );
|
|
if (FAILED(hr) || !spTargetMasterNCAttrs)
|
|
{
|
|
// 531591 JonN 2002/04/01 W2K domains fallback to hasMasterNCs
|
|
spTargetMasterNCAttrs.Empty();
|
|
hr = GetAttr( spIADs, L"hasMasterNCs", &spTargetMasterNCAttrs );
|
|
}
|
|
// At least the hasMasterNCs attribute should be set for nTDSDSA objects,
|
|
// even those on W2K domains
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
|
|
// read hasPartialReplicaNCs of the target nTDSDSA object
|
|
Smart_PADS_ATTR_INFO spTargetPartialNCAttrs;
|
|
(void) GetAttr( spIADs, L"hasPartialReplicaNCs", &spTargetPartialNCAttrs );
|
|
// The hasPartialReplicaNCs attribute may or may not be set for nTDSDSA objects
|
|
spIADs.Release(); // method of CComPtr<>, also sets pointer to NULL
|
|
|
|
/*
|
|
hr = spIADsPathname->RemoveLeafElement();
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
CComBSTR sbstrTargetServerPath;
|
|
hr = spIADsPathname->Retrieve( ADS_FORMAT_X500, &sbstrTargetServerPath );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
hr = DSAdminOpenObject(sbstrTargetServerPath,
|
|
IID_IADs,
|
|
(void **) &spIADs,
|
|
TRUE);
|
|
BREAK_ON_FAIL;
|
|
CComVariant var;
|
|
hr = spIADs->Get(L"dNSHostName", &var);
|
|
BREAK_ON_FAIL; // can be missing for brand-new DCs
|
|
spIADs.Release(); // method of CComPtr<>, also sets pointer to NULL
|
|
ASSERT((var.vt == VT_BSTR) && var.bstrVal && *(var.bstrVal));
|
|
LPWSTR lpszDNSHostName = var.bstrVal;
|
|
*/
|
|
|
|
// get the path to the source nTDSDSA object
|
|
hr = pathCracker.Set(
|
|
(pbstrFromServer) ? *pbstrFromServer : NULL,
|
|
ADS_SETTYPE_DN );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
CComBSTR sbstrSourceNTDSDSAPath;
|
|
hr = pathCracker.Retrieve( ADS_FORMAT_X500, &sbstrSourceNTDSDSAPath );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
|
|
// get the sitename for the source NTDSA object
|
|
hr = pathCracker.SetDisplayType( ADS_DISPLAY_VALUE_ONLY );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
CComBSTR sbstrSourceSite;
|
|
hr = pathCracker.GetElement( 3L, &sbstrSourceSite );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
hr = pathCracker.SetDisplayType( ADS_DISPLAY_FULL );
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
|
|
// determine whether the two DCs are in the same site
|
|
*pulDsSyncOptions = (lstrcmpi(sbstrSourceSite, sbstrTargetSite))
|
|
? DS_REPSYNC_ASYNCHRONOUS_OPERATION
|
|
: 0;
|
|
|
|
// read objectGUID of the source NTDSDSA object
|
|
hr = DSAdminOpenObject(sbstrSourceNTDSDSAPath,
|
|
IID_IADs,
|
|
(void **) &spIADs,
|
|
TRUE /*bServer*/);
|
|
BREAK_ON_FAIL;
|
|
hr = GetObjectGUID( spIADs, puuidSourceObjectGUID );
|
|
// The objectGUID attribute should be set for nTDSDSA objects
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
|
|
// read hasMasterNCs of the source nTDSDSA object
|
|
Smart_PADS_ATTR_INFO spSourceMasterNCAttrs;
|
|
// 531591 JonN 2002/04/01 .NET Server domains use msDS-hasMasterNCs
|
|
hr = GetAttr( spIADs, L"msDS-hasMasterNCs", &spSourceMasterNCAttrs );
|
|
if (FAILED(hr) || !spSourceMasterNCAttrs)
|
|
{
|
|
// 531591 JonN 2002/04/01 W2K domains fallback to hasMasterNCs
|
|
spSourceMasterNCAttrs.Empty();
|
|
hr = GetAttr( spIADs, L"hasMasterNCs", &spSourceMasterNCAttrs );
|
|
}
|
|
// At least the hasMasterNCs attribute should be set for nTDSDSA objects,
|
|
// even those on W2K domains.
|
|
|
|
|
|
// read hasMasterNCs of the source nTDSDSA object
|
|
Smart_PADS_ATTR_INFO spSourcePartialNCAttrs;
|
|
(void) GetAttr( spIADs, L"hasPartialReplicaNCs", &spSourcePartialNCAttrs );
|
|
// The hasPartialReplicaNCs attribute may or may not be set for nTDSDSA objects
|
|
spIADs.Release(); // method of CComPtr<>, also sets pointer to NULL
|
|
|
|
// Determine which NCs the two NTDSDSAs have in common
|
|
AddMatchingNCs( refstrlistCommonNCs, spTargetMasterNCAttrs, spSourceMasterNCAttrs );
|
|
AddMatchingNCs( refstrlistCommonNCs, spTargetPartialNCAttrs, spSourceMasterNCAttrs );
|
|
AddMatchingNCs( refstrlistCommonNCs, spTargetPartialNCAttrs, spSourcePartialNCAttrs );
|
|
|
|
// Build the name of the inbound domain controller for this connection
|
|
CString csGUID( sbstrTargetObjectGUID );
|
|
ASSERT( L'{' == csGUID[0] && L'}' == csGUID[csGUID.GetLength()-1] );
|
|
CString csDC = csGUID.Mid( 1, csGUID.GetLength()-2 );
|
|
csDC += L"._msdcs.";
|
|
csDC += bstrRootDomainName;
|
|
*pbstrDsBindName = ::SysAllocString( csDC );
|
|
/*
|
|
*pbstrDsBindName = ::SysAllocString( lpszDNSHostName );
|
|
*/
|
|
if (NULL == *pbstrDsBindName)
|
|
{
|
|
hr = E_OUTOFMEMORY;
|
|
BREAK_AND_ASSERT_ON_FAIL;
|
|
}
|
|
|
|
} while (false); // false loop
|
|
|
|
return hr;
|
|
}
|
|
|
|
void CDSContextMenu::AddToGroup()
|
|
{
|
|
|
|
CWaitCursor waitcursor;
|
|
HRESULT hr = S_OK;
|
|
TRACE (_T("CDSContextMenu::AddToGroup\n"));
|
|
|
|
hr = AddDataObjListToGroup (&m_objectNamesFormat, m_hwnd, m_pCD);
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
bool IsRPCError( NTSTATUS ntstatus )
|
|
{
|
|
switch (ntstatus)
|
|
{
|
|
case RPC_S_SERVER_UNAVAILABLE:
|
|
case HRESULT_FROM_WIN32(RPC_S_SERVER_UNAVAILABLE):
|
|
case ERROR_DS_DNS_LOOKUP_FAILURE:
|
|
case HRESULT_FROM_WIN32(ERROR_DS_DNS_LOOKUP_FAILURE):
|
|
case ERROR_NO_SUCH_DOMAIN:
|
|
case HRESULT_FROM_WIN32(ERROR_NO_SUCH_DOMAIN):
|
|
case SEC_E_NO_AUTHENTICATING_AUTHORITY: // already an HRESULT
|
|
case ERROR_DOMAIN_CONTROLLER_NOT_FOUND:
|
|
case HRESULT_FROM_WIN32(ERROR_DOMAIN_CONTROLLER_NOT_FOUND):
|
|
return true;
|
|
default:
|
|
break;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// This level takes care of displaying the error messages
|
|
// CODEWORK should this try to replicate other domains to GCs?
|
|
void CDSContextMenu::ReplicateNow()
|
|
{
|
|
CWaitCursor waitcursor;
|
|
|
|
CComBSTR sbstrRootDomainName;
|
|
LPCWSTR lpcwszTargetDC = NULL;
|
|
if ( NULL != m_pCD && NULL != m_pCD->GetBasePathsInfo() )
|
|
lpcwszTargetDC = m_pCD->GetBasePathsInfo()->GetServerName();
|
|
NTSTATUS ntstatus = RetrieveRootDomainName( lpcwszTargetDC, &sbstrRootDomainName );
|
|
if ( !LSA_SUCCESS(ntstatus) )
|
|
{
|
|
// error in RetrieveRootDomainName against DSADMIN target DC
|
|
PVOID apv[1] = {(LPWSTR)(lpcwszTargetDC) };
|
|
(void) ReportErrorEx( m_hwnd,
|
|
(IsRPCError(ntstatus)) ? IDS_REPLNOW_1_RPC_PARAMLOAD_ERROR
|
|
: IDS_REPLNOW_1_PARAMLOAD_ERROR,
|
|
ntstatus, // CODEWORK
|
|
MB_OK | MB_ICONEXCLAMATION,
|
|
apv,
|
|
1,
|
|
IDS_REPLNOW_TITLE,
|
|
FALSE);
|
|
return;
|
|
}
|
|
|
|
CComBSTR sbstrFailingConnection;
|
|
CComBSTR sbstrFromServer;
|
|
CComBSTR sbstrFailingNC;
|
|
HRESULT hr = S_OK;
|
|
bool fSyncError = false;
|
|
ULONG ulOptionsUsed = 0;
|
|
// loop through the array of objects
|
|
UINT cCount;
|
|
for (cCount=0; cCount < m_objectNamesFormat.GetCount(); cCount++) {
|
|
if (wcscmp(m_objectNamesFormat.GetClass(cCount), L"nTDSConnection") !=0)
|
|
continue;
|
|
|
|
// get the replication parameters for this connection object
|
|
CComBSTR sbstrDsBindName;
|
|
UUID uuidSourceObjectGUID;
|
|
CStringList strlistCommonNCs;
|
|
ULONG ulDsSyncOptions = 0L;
|
|
sbstrFromServer.Empty();
|
|
sbstrFailingConnection = m_objectNamesFormat.GetName(cCount);
|
|
hr = PrepareReplicaSyncParameters(
|
|
sbstrFailingConnection,
|
|
sbstrRootDomainName,
|
|
&sbstrDsBindName,
|
|
&uuidSourceObjectGUID,
|
|
strlistCommonNCs,
|
|
&ulDsSyncOptions,
|
|
&sbstrFromServer
|
|
);
|
|
BREAK_ON_FAIL;
|
|
|
|
// now bind to the target DC
|
|
Smart_DsHandle shDS;
|
|
DWORD dwWinError = DsBind( sbstrDsBindName, // DomainControllerAddress
|
|
NULL, // DnsDomainName
|
|
&shDS );
|
|
if (ERROR_SUCCESS != dwWinError)
|
|
{
|
|
hr = HRESULT_FROM_WIN32(dwWinError);
|
|
ASSERT( FAILED(hr) );
|
|
break;
|
|
}
|
|
|
|
// sync all common naming contexts for this connection
|
|
CString strCommonNC;
|
|
POSITION pos = strlistCommonNCs.GetHeadPosition();
|
|
while (NULL != pos)
|
|
{
|
|
strCommonNC = strlistCommonNCs.GetNext( pos ) ;
|
|
ASSERT( 0 != strCommonNC.GetLength() );
|
|
dwWinError = DsReplicaSync( shDS,
|
|
const_cast<LPWSTR>((LPCTSTR)strCommonNC),
|
|
&uuidSourceObjectGUID,
|
|
ulDsSyncOptions );
|
|
if (ERROR_SUCCESS != dwWinError)
|
|
{
|
|
sbstrFailingNC = strCommonNC;
|
|
hr = HRESULT_FROM_WIN32(dwWinError);
|
|
ASSERT( FAILED(hr) );
|
|
break;
|
|
}
|
|
}
|
|
if ( FAILED(hr) )
|
|
{
|
|
fSyncError = true;
|
|
break;
|
|
}
|
|
ulOptionsUsed |= ulDsSyncOptions;
|
|
|
|
} // for
|
|
|
|
if ( SUCCEEDED(hr) )
|
|
{
|
|
(void) ReportMessageEx( m_hwnd,
|
|
(ulOptionsUsed & DS_REPSYNC_ASYNCHRONOUS_OPERATION)
|
|
? IDS_REPLNOW_SUCCEEDED_DELAYED
|
|
: IDS_REPLNOW_SUCCEEDED_IMMEDIATE,
|
|
MB_OK | MB_ICONINFORMATION,
|
|
NULL,
|
|
0,
|
|
IDS_REPLNOW_TITLE );
|
|
}
|
|
else
|
|
{
|
|
// JonN 3/30/00
|
|
// 6793: SITEREPL: ReplicateNow should provide more error information
|
|
|
|
// retrieve name of target DC
|
|
CComBSTR sbstrToServerRDN;
|
|
CPathCracker pathCracker;
|
|
HRESULT hr2 = pathCracker.Set(sbstrFailingConnection, ADS_SETTYPE_FULL);
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
hr2 = pathCracker.SetDisplayType(ADS_DISPLAY_VALUE_ONLY);
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
hr2 = pathCracker.GetElement(2, &sbstrToServerRDN);
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
|
|
if (fSyncError)
|
|
{
|
|
// error in DsReplicaSync against connection target DC
|
|
|
|
// retrieve name of source DC
|
|
CComBSTR sbstrFromServerRDN;
|
|
hr2 = pathCracker.Set(sbstrFromServer, ADS_SETTYPE_DN);
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
hr2 = pathCracker.GetElement(1, &sbstrFromServerRDN);
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
|
|
// retrieve name of naming context
|
|
if (sbstrFailingNC && !wcsncmp(L"CN=",sbstrFailingNC,3))
|
|
{
|
|
hr2 = pathCracker.Set(sbstrFailingNC, ADS_SETTYPE_DN);
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
hr2 = pathCracker.GetElement( 0, &sbstrFailingNC );
|
|
ASSERT( SUCCEEDED(hr2) );
|
|
} else {
|
|
LPWSTR pwzDomainNC = NULL;
|
|
hr2 = CrackName(sbstrFailingNC, &pwzDomainNC, GET_DNS_DOMAIN_NAME, NULL);
|
|
ASSERT( SUCCEEDED(hr2) && NULL != pwzDomainNC );
|
|
sbstrFailingNC = pwzDomainNC;
|
|
LocalFreeStringW(&pwzDomainNC);
|
|
}
|
|
|
|
PVOID apv[3] = { sbstrToServerRDN, sbstrFromServerRDN, sbstrFailingNC };
|
|
(void) ReportErrorEx( m_hwnd,
|
|
(IsRPCError(hr)) ? IDS_REPLNOW_3_RPC_FORCESYNC_ERROR
|
|
: IDS_REPLNOW_3_FORCESYNC_ERROR,
|
|
hr,
|
|
MB_OK | MB_ICONEXCLAMATION,
|
|
apv,
|
|
3,
|
|
IDS_REPLNOW_TITLE );
|
|
}
|
|
else
|
|
{
|
|
// error in PrepareReplicaSyncParameters against connection target DC
|
|
PVOID apv[1] = { sbstrToServerRDN };
|
|
(void) ReportErrorEx( m_hwnd,
|
|
(IsRPCError(hr)) ? IDS_REPLNOW_1_RPC_PARAMLOAD_ERROR
|
|
: IDS_REPLNOW_1_PARAMLOAD_ERROR,
|
|
hr,
|
|
MB_OK | MB_ICONEXCLAMATION,
|
|
apv,
|
|
1,
|
|
IDS_REPLNOW_TITLE );
|
|
}
|
|
}
|
|
}
|
|
|
|
void CDSContextMenu::CopyObject()
|
|
{
|
|
if (m_pCD != NULL)
|
|
{
|
|
m_pCD->_CopyDSObject(m_spDataObject);
|
|
}
|
|
}
|
|
|
|
void CDSContextMenu::_GetExtraInfo(LPDATAOBJECT pDataObj)
|
|
{
|
|
FORMATETC fmte = {CF_HDROP, NULL, DVASPECT_CONTENT, -1, TYMED_HGLOBAL};
|
|
|
|
ASSERT(m_objectNamesFormat.HasData());
|
|
|
|
//we assume these are all the same
|
|
m_Advanced = (m_objectNamesFormat.GetProviderFlags(0) & DSPROVIDER_ADVANCED) != 0;
|
|
|
|
// set classes flag
|
|
for (UINT index = 0; index < m_objectNamesFormat.GetCount(); index++)
|
|
{
|
|
if (wcscmp(m_objectNamesFormat.GetClass(index), L"user") == 0
|
|
#ifdef INETORGPERSON
|
|
|| wcscmp(m_objectNamesFormat.GetClass(index), L"inetOrgPerson") == 0
|
|
#endif
|
|
)
|
|
m_fClasses |= Type_User;
|
|
else if (wcscmp(m_objectNamesFormat.GetClass(index), L"group") == 0)
|
|
m_fClasses |= Type_Group;
|
|
else if (wcscmp(m_objectNamesFormat.GetClass(index), L"computer") == 0)
|
|
m_fClasses |= Type_Computer;
|
|
else if (wcscmp(m_objectNamesFormat.GetClass(index), L"nTDSConnection") == 0)
|
|
m_fClasses |= Type_NTDSConnection;
|
|
else if (wcscmp(m_objectNamesFormat.GetClass(index), L"domainDNS") == 0)
|
|
m_fClasses |= Type_Domain;
|
|
else if (wcscmp(m_objectNamesFormat.GetClass(index), L"contact") == 0)
|
|
m_fClasses |= Type_Contact;
|
|
else if (wcscmp(m_objectNamesFormat.GetClass(index), L"group") == 0)
|
|
m_fClasses |= Type_Group;
|
|
else if (wcscmp(m_objectNamesFormat.GetClass(index), L"organizationalUnit") == 0)
|
|
m_fClasses |= Type_OU;
|
|
else
|
|
m_fClasses |= Type_Others;
|
|
} // for
|
|
|
|
|
|
// set classid
|
|
g_cfCoClass = (CLIPFORMAT)RegisterClipboardFormat(CCF_SNAPIN_CLASSID);
|
|
fmte.cfFormat = g_cfCoClass;
|
|
STGMEDIUM Stg;
|
|
Stg.tymed = TYMED_HGLOBAL;
|
|
//NTRAID#NTBUG9-571991-2002/03/10-jmessec Not checking failure of GlobalAlloc, possible leading to NULL ptr dereference
|
|
Stg.hGlobal = GlobalAlloc (GPTR, sizeof(CLSID));
|
|
HRESULT hr = pDataObj->GetDataHere(&fmte, &Stg);
|
|
if ( SUCCEEDED(hr) )
|
|
{
|
|
memcpy (&m_CallerSnapin, Stg.hGlobal, sizeof(GUID));
|
|
}
|
|
else
|
|
{
|
|
m_CallerSnapin = GUID_NULL;
|
|
}
|
|
GlobalFree(Stg.hGlobal);
|
|
|
|
//NTRAID#NTBUG9-571992-2002/03/10-jmessec Should not bypass the published MMC COM APIs in this manner; container
|
|
//structure could change in the future
|
|
|
|
// get HWND (MMC mainframe window)
|
|
g_cfParentHwnd = (CLIPFORMAT)RegisterClipboardFormat(CFSTR_DS_PARENTHWND);
|
|
fmte.cfFormat = g_cfParentHwnd;
|
|
Stg.tymed = TYMED_NULL;
|
|
if ( SUCCEEDED(pDataObj->GetData(&fmte, &Stg)) )
|
|
{
|
|
memcpy (&m_hwnd, Stg.hGlobal, sizeof(HWND));
|
|
ReleaseStgMedium(&Stg);
|
|
}
|
|
else
|
|
{
|
|
// need an HWND anyway
|
|
m_hwnd = ::GetActiveWindow();
|
|
}
|
|
|
|
|
|
TRACE(L"HWND = 0x%x\n", m_hwnd);
|
|
ASSERT((m_hwnd != NULL) && ::IsWindow(m_hwnd));
|
|
|
|
// get component data (if in the context of DS Admin)
|
|
g_cfComponentData = (CLIPFORMAT)RegisterClipboardFormat(CFSTR_DS_COMPDATA);
|
|
fmte.cfFormat = g_cfComponentData;
|
|
Stg.tymed = TYMED_NULL;
|
|
if ( SUCCEEDED(pDataObj->GetData(&fmte, &Stg)) )
|
|
{
|
|
memcpy (&m_pCD, Stg.hGlobal, sizeof(CDSComponentData*));
|
|
ReleaseStgMedium(&Stg);
|
|
} else
|
|
{
|
|
m_pCD = NULL;
|
|
}
|
|
|
|
// get component data (if in the context of DS Find)
|
|
if (m_pCD == NULL)
|
|
{
|
|
m_pCD = g_pCD;
|
|
}
|
|
}
|
|
|
|
BOOL
|
|
CDSContextMenu::_WarningOnSheetsUp()
|
|
{
|
|
// if called in the context of DS Admin, guard against property sheet open on this cookie
|
|
if ( (m_pCD != NULL) && m_internalFormat.HasData() )
|
|
{
|
|
return m_pCD->_WarningOnSheetsUp(&m_internalFormat);
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
|
|
void
|
|
CDSContextMenu::Rename()
|
|
{
|
|
CThemeContextActivator activator;
|
|
|
|
HRESULT hr = S_OK;
|
|
INT_PTR answer = IDOK;
|
|
LPWSTR pszDomain = NULL;
|
|
LPWSTR pwzLocalDomain = NULL;
|
|
IDirectoryObject * pObj = NULL;
|
|
IADs * pObj2 = NULL;
|
|
IADs * pPartitions = NULL;
|
|
CString csLogin;
|
|
CString csTemp;
|
|
CString csSam;
|
|
CWaitCursor cwait;
|
|
BOOL error = FALSE;
|
|
BOOL fAccessDenied = FALSE;
|
|
LPWSTR pszNewName = NULL;
|
|
LPWSTR pszFirstName = NULL;
|
|
LPWSTR pszDispName = NULL;
|
|
LPWSTR pszSurName = NULL;
|
|
LPWSTR pszSAMName = NULL;
|
|
LPWSTR pszUPN = NULL;
|
|
BOOL NoRename = FALSE;
|
|
|
|
CString serverName;
|
|
|
|
CComVariant Var;
|
|
|
|
|
|
// guard against property sheet open on this cookie
|
|
if (_WarningOnSheetsUp())
|
|
return;
|
|
|
|
CString strClass = m_objectNamesFormat.GetClass(0);
|
|
if (strClass == L"user"
|
|
#ifdef INETORGPERSON
|
|
|| strClass == L"inetOrgPerson"
|
|
#endif
|
|
)
|
|
{
|
|
// rename user
|
|
CRenameUserDlg dlgRename(m_pCD);
|
|
|
|
LPWSTR pAttrNames[] = {L"distinguishedName",
|
|
L"userPrincipalName",
|
|
L"sAMAccountName",
|
|
L"givenName",
|
|
L"displayName",
|
|
L"sn",
|
|
L"cn"};
|
|
PADS_ATTR_INFO pAttrs = NULL;
|
|
ULONG cAttrs = 0;
|
|
|
|
CString szPath = m_objectNamesFormat.GetName(0);
|
|
hr = DSAdminOpenObject(szPath,
|
|
IID_IDirectoryObject,
|
|
(void **)&pObj,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr)) {
|
|
hr = pObj->GetObjectAttributes (pAttrNames, 7, &pAttrs, &cAttrs);
|
|
if (SUCCEEDED(hr)) {
|
|
for (UINT i = 0; i < cAttrs; i++) {
|
|
if (_wcsicmp (L"distinguishedName", pAttrs[i].pszAttrName) == 0) {
|
|
hr = CrackName (pAttrs[i].pADsValues->CaseIgnoreString,
|
|
&pszDomain, GET_NT4_DOMAIN_NAME, NULL);
|
|
if (SUCCEEDED(hr)) {
|
|
dlgRename.m_dldomain = pszDomain;
|
|
dlgRename.m_dldomain += L'\\';
|
|
}
|
|
// get the Domain of this object, need it later.
|
|
CComBSTR bsDN;
|
|
CPathCracker pathCracker;
|
|
pathCracker.SetDisplayType(ADS_DISPLAY_FULL);
|
|
pathCracker.Set(CComBSTR(szPath), ADS_SETTYPE_FULL);
|
|
pathCracker.Retrieve(ADS_FORMAT_X500_DN, &bsDN);
|
|
|
|
// NTRAID#NTBUG9-698115-2002/09/04-artm
|
|
// Get the server name we're connected to, we'll need it later for getting root domains.
|
|
// If we fail to get it that's okay, we'll still get the root domains
|
|
// unless the user is running dsadmin under "runas". If that's the case,
|
|
// the we won't show parent domains (but everything else will work).
|
|
CComBSTR tempServerName;
|
|
hr = pathCracker.Retrieve(ADS_FORMAT_SERVER, &tempServerName);
|
|
if (SUCCEEDED(hr))
|
|
{
|
|
serverName = tempServerName;
|
|
}
|
|
|
|
// get the NT 5 (dns) domain name
|
|
TRACE(L"CrackName(%s, &pwzLocalDomain, GET_DNS_DOMAIN_NAME, NULL);\n", bsDN);
|
|
hr = CrackName(bsDN, &pwzLocalDomain, GET_DNS_DOMAIN_NAME, NULL);
|
|
TRACE(L"CrackName returned hr = 0x%x, pwzLocalDomain = <%s>\n", hr, pwzLocalDomain);
|
|
}
|
|
if (_wcsicmp (L"userPrincipalName", pAttrs[i].pszAttrName) == 0) {
|
|
csTemp = pAttrs[i].pADsValues->CaseIgnoreString;
|
|
INT loc = csTemp.Find (L'@');
|
|
if (loc > 0) {
|
|
dlgRename.m_login = csTemp.Left(loc);
|
|
dlgRename.m_domain = csTemp.Right (csTemp.GetLength() - loc);
|
|
} else {
|
|
dlgRename.m_login = csTemp;
|
|
ASSERT (0 && L"can't find @ in upn");
|
|
}
|
|
}
|
|
|
|
if (_wcsicmp (L"sAMAccountName", pAttrs[i].pszAttrName) == 0) {
|
|
dlgRename.m_samaccountname = pAttrs[i].pADsValues->CaseIgnoreString;
|
|
}
|
|
if (_wcsicmp (L"givenName", pAttrs[i].pszAttrName) == 0) {
|
|
dlgRename.m_first = pAttrs[i].pADsValues->CaseIgnoreString;
|
|
}
|
|
if (_wcsicmp (L"displayName", pAttrs[i].pszAttrName) == 0) {
|
|
dlgRename.m_displayname = pAttrs[i].pADsValues->CaseIgnoreString;
|
|
}
|
|
if (_wcsicmp (L"sn", pAttrs[i].pszAttrName) == 0) {
|
|
dlgRename.m_last = pAttrs[i].pADsValues->CaseIgnoreString;
|
|
}
|
|
if (_wcsicmp (L"cn", pAttrs[i].pszAttrName) == 0) {
|
|
dlgRename.m_cn = pAttrs[i].pADsValues->CaseIgnoreString;
|
|
dlgRename.m_oldcn = dlgRename.m_cn;
|
|
}
|
|
}
|
|
}
|
|
// get UPN suffixes from this OU, if present
|
|
IADs * pObjADs = NULL;
|
|
IADs * pCont = NULL;
|
|
BSTR bsParentPath;
|
|
CStringList UPNs;
|
|
CString strAtDomain;
|
|
|
|
hr = pObj->QueryInterface (IID_IADs, (void **)&pObjADs);
|
|
ASSERT (SUCCEEDED(hr));
|
|
hr = pObjADs->get_Parent(&bsParentPath);
|
|
ASSERT (SUCCEEDED(hr));
|
|
hr = DSAdminOpenObject(bsParentPath,
|
|
IID_IADs,
|
|
(void **)&pCont,
|
|
TRUE /*bServer*/);
|
|
|
|
CComVariant sVar;
|
|
hr = pCont->Get ( CComBSTR(L"uPNSuffixes"), &sVar);
|
|
if (SUCCEEDED(hr)) {
|
|
hr = HrVariantToStringList (IN sVar, UPNs);
|
|
if (SUCCEEDED(hr)) {
|
|
POSITION pos = UPNs.GetHeadPosition();
|
|
CString csSuffix;
|
|
while (pos != NULL) {
|
|
csSuffix = L"@";
|
|
csSuffix += UPNs.GetNext(INOUT pos);
|
|
TRACE(_T("UPN suffix: %s\n"), csSuffix);
|
|
if (wcscmp (csSuffix, dlgRename.m_domain) &&
|
|
!dlgRename.m_domains.Find(csSuffix))
|
|
{
|
|
dlgRename.m_domains.AddTail (csSuffix);
|
|
}
|
|
}
|
|
}
|
|
} else {// now get the domain options
|
|
CComPtr<IDsBrowseDomainTree> pDsDomains = NULL;
|
|
PDOMAIN_TREE pNewDomains = NULL;
|
|
|
|
do // false while loop
|
|
{
|
|
hr = ::CoCreateInstance(CLSID_DsDomainTreeBrowser,
|
|
NULL,
|
|
CLSCTX_INPROC_SERVER,
|
|
IID_IDsBrowseDomainTree,
|
|
(LPVOID*)&pDsDomains);
|
|
if (FAILED(hr) || pDsDomains == NULL)
|
|
{
|
|
ASSERT(SUCCEEDED(hr) && pDsDomains != NULL);
|
|
break;
|
|
}
|
|
|
|
// NTRAID#NTBUG9-698115-2002/09/04-artm
|
|
// Ensure that the domains we request are correctly scoped.
|
|
hr = pDsDomains->SetComputer(serverName, NULL, NULL);
|
|
if (FAILED(hr))
|
|
{
|
|
ASSERT(SUCCEEDED(hr));
|
|
break;
|
|
}
|
|
|
|
hr = pDsDomains->GetDomains(&pNewDomains, 0);
|
|
if (FAILED(hr) || pNewDomains == NULL)
|
|
{
|
|
// Only expect to get here with failed hresult.
|
|
ASSERT(FAILED(hr));
|
|
break;
|
|
}
|
|
|
|
for (UINT index = 0; index < pNewDomains->dwCount; index++)
|
|
{
|
|
if (pNewDomains->aDomains[index].pszTrustParent == NULL)
|
|
{
|
|
// Add the root domain only if it is a substring of the current
|
|
// domain.
|
|
//
|
|
size_t cchRoot = wcslen(pNewDomains->aDomains[index].pszName);
|
|
PWSTR pRoot = pwzLocalDomain + wcslen(pwzLocalDomain) - cchRoot;
|
|
|
|
if (pRoot >= pwzLocalDomain &&
|
|
!_wcsicmp(pRoot, pNewDomains->aDomains[index].pszName))
|
|
{
|
|
strAtDomain = "@";
|
|
strAtDomain += pNewDomains->aDomains[index].pszName;
|
|
|
|
if (_wcsicmp(pNewDomains->aDomains[index].pszName, dlgRename.m_domain) &&
|
|
!dlgRename.m_domains.Find(strAtDomain))
|
|
{
|
|
dlgRename.m_domains.AddTail (strAtDomain);
|
|
}
|
|
}
|
|
}
|
|
} // end for loop
|
|
} while (false);
|
|
|
|
if (pDsDomains != NULL && pNewDomains != NULL)
|
|
{
|
|
pDsDomains->FreeDomains(&pNewDomains);
|
|
pNewDomains = NULL;
|
|
}
|
|
|
|
// If the local domain isn't the same as the root, then add it
|
|
|
|
CString strAtLocalDomain = L"@";
|
|
strAtLocalDomain += pwzLocalDomain;
|
|
|
|
if (!dlgRename.m_domains.Find(strAtLocalDomain))
|
|
{
|
|
dlgRename.m_domains.AddTail(strAtLocalDomain);
|
|
}
|
|
|
|
LocalFreeStringW(&pszDomain);
|
|
// get UPN suffixes
|
|
CString csPartitions;
|
|
CStringList UPNsToo;
|
|
// get config path from main object
|
|
csPartitions = m_pCD->GetBasePathsInfo()->GetProviderAndServerName();
|
|
csPartitions += L"CN=Partitions,";
|
|
csPartitions += m_pCD->GetBasePathsInfo()->GetConfigNamingContext();
|
|
hr = DSAdminOpenObject(csPartitions,
|
|
IID_IADs,
|
|
(void **)&pPartitions,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr)) {
|
|
CComVariant sVarToo;
|
|
hr = pPartitions->Get ( CComBSTR(L"uPNSuffixes"), &sVarToo);
|
|
if (SUCCEEDED(hr)) {
|
|
hr = HrVariantToStringList (IN sVarToo, UPNsToo);
|
|
if (SUCCEEDED(hr)) {
|
|
POSITION pos = UPNsToo.GetHeadPosition();
|
|
CString csSuffix;
|
|
while (pos != NULL) {
|
|
csSuffix = L"@";
|
|
csSuffix += UPNsToo.GetNext(INOUT pos);
|
|
TRACE(_T("UPN suffix: %s\n"), csSuffix);
|
|
if (wcscmp (csSuffix, dlgRename.m_domain) &&
|
|
!dlgRename.m_domains.Find(csSuffix))
|
|
{
|
|
dlgRename.m_domains.AddTail (csSuffix);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
pPartitions->Release();
|
|
}
|
|
}
|
|
error = TRUE;
|
|
while ((error) && (!fAccessDenied))
|
|
{
|
|
answer = dlgRename.DoModal();
|
|
if (answer == IDOK)
|
|
{
|
|
ADSVALUE avUPN = {ADSTYPE_CASE_IGNORE_STRING, NULL};
|
|
ADS_ATTR_INFO aiUPN = {L"userPrincipalName", ADS_ATTR_UPDATE,
|
|
ADSTYPE_CASE_IGNORE_STRING, &avUPN, 1};
|
|
ADSVALUE avSAMName = {ADSTYPE_CASE_IGNORE_STRING, NULL};
|
|
ADS_ATTR_INFO aiSAMName = {L"sAMAccountName", ADS_ATTR_UPDATE,
|
|
ADSTYPE_CASE_IGNORE_STRING, &avSAMName, 1};
|
|
ADSVALUE avGiven = {ADSTYPE_CASE_IGNORE_STRING, NULL};
|
|
ADS_ATTR_INFO aiGiven = {L"givenName", ADS_ATTR_UPDATE,
|
|
ADSTYPE_CASE_IGNORE_STRING, &avGiven, 1};
|
|
ADSVALUE avSurName = {ADSTYPE_CASE_IGNORE_STRING, NULL};
|
|
ADS_ATTR_INFO aiSurName = {L"sn", ADS_ATTR_UPDATE,
|
|
ADSTYPE_CASE_IGNORE_STRING, &avSurName, 1};
|
|
ADSVALUE avDispName = {ADSTYPE_CASE_IGNORE_STRING, NULL};
|
|
ADS_ATTR_INFO aiDispName = {L"displayName", ADS_ATTR_UPDATE,
|
|
ADSTYPE_CASE_IGNORE_STRING, &avDispName, 1};
|
|
|
|
ADS_ATTR_INFO rgAttrs[5];
|
|
ULONG cModified = 0;
|
|
cAttrs = 0;
|
|
|
|
if (!dlgRename.m_login.IsEmpty() &&
|
|
!dlgRename.m_domain.IsEmpty())
|
|
{
|
|
dlgRename.m_login.TrimRight();
|
|
dlgRename.m_login.TrimLeft();
|
|
dlgRename.m_domain.TrimRight();
|
|
dlgRename.m_domain.TrimLeft();
|
|
csTemp = (dlgRename.m_login + dlgRename.m_domain);
|
|
pszUPN = new WCHAR[wcslen(csTemp) + 1];
|
|
if (pszUPN)
|
|
{
|
|
wcscpy (pszUPN, csTemp);
|
|
avUPN.CaseIgnoreString = pszUPN;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
aiUPN.dwControlCode = ADS_ATTR_CLEAR;
|
|
}
|
|
rgAttrs[cAttrs++] = aiUPN;
|
|
|
|
// test UPN for duplication
|
|
|
|
// test UPN for duplication
|
|
// validate UPN with GC before doing the put.
|
|
BOOL fDomainSearchFailed = FALSE;
|
|
BOOL fGCSearchFailed = FALSE;
|
|
|
|
|
|
BOOL dup = FALSE;
|
|
CString strFilter;
|
|
LPWSTR pAttributes[1] = {L"cn"};
|
|
IDirectorySearch * pGCObj = NULL;
|
|
CDSSearch DSS (m_pCD->m_pClassCache, m_pCD);
|
|
hr = DSPROP_GetGCSearchOnDomain(pwzLocalDomain,
|
|
IID_IDirectorySearch,
|
|
(void **)&pGCObj);
|
|
|
|
if (FAILED(hr)) {
|
|
fGCSearchFailed = TRUE;
|
|
} else {
|
|
DSS.Init (pGCObj);
|
|
|
|
LPWSTR pUserAttributes[1] = {L"cn"};
|
|
strFilter = L"(userPrincipalName=";
|
|
strFilter += pszUPN;
|
|
strFilter += L")";
|
|
DSS.SetAttributeList (pUserAttributes, 1);
|
|
DSS.SetFilterString ((LPWSTR)(LPCWSTR)strFilter);
|
|
DSS.SetSearchScope (ADS_SCOPE_SUBTREE);
|
|
DSS.DoQuery();
|
|
hr = DSS.GetNextRow();
|
|
dup = FALSE;
|
|
while ((hr == S_OK) && (dup == FALSE)) { // this means a row was returned, so we're dup
|
|
ADS_SEARCH_COLUMN Col;
|
|
hr = DSS.GetColumn(pUserAttributes[0], &Col);
|
|
if (_wcsicmp(Col.pADsValues->CaseIgnoreString, dlgRename.m_oldcn)) {
|
|
dup = TRUE;
|
|
ReportErrorEx (m_hwnd, IDS_UPN_DUP, hr,
|
|
MB_OK, NULL, 0);
|
|
}
|
|
hr = DSS.GetNextRow();
|
|
}
|
|
if (hr != S_ADS_NOMORE_ROWS) {
|
|
fGCSearchFailed = TRUE;
|
|
}
|
|
}
|
|
HRESULT hr2 = S_OK;
|
|
if (dup)
|
|
continue;
|
|
else {
|
|
CString strInitPath = L"LDAP://";
|
|
strInitPath += pwzLocalDomain;
|
|
TRACE(_T("Initialize Domain search object with: %s...\n"), strInitPath);
|
|
hr2 = DSS.Init (strInitPath);
|
|
if (SUCCEEDED(hr2)) {
|
|
LPWSTR pAttributes2[1] = {L"cn"};
|
|
strFilter = L"(userPrincipalName=";
|
|
strFilter += pszUPN;
|
|
strFilter += L")";
|
|
TRACE(_T("searching current domain for %s...\n"), pszUPN);
|
|
DSS.SetAttributeList (pAttributes2, 1);
|
|
DSS.SetFilterString ((LPWSTR)(LPCWSTR)strFilter);
|
|
DSS.SetSearchScope (ADS_SCOPE_SUBTREE);
|
|
DSS.DoQuery();
|
|
hr2 = DSS.GetNextRow();
|
|
TRACE(_T("done searching current domain for %s...\n"), pszUPN);
|
|
}
|
|
while ((hr2 == S_OK) && (dup == FALSE)) { // this means a row was returned, so we're dup
|
|
ADS_SEARCH_COLUMN Col;
|
|
HRESULT hr3 = DSS.GetColumn(pAttributes[0], &Col);
|
|
ASSERT(hr3 == S_OK);
|
|
if (_wcsicmp(Col.pADsValues->CaseIgnoreString, dlgRename.m_oldcn)) {
|
|
dup = TRUE;
|
|
ReportErrorEx (m_hwnd, IDS_UPN_DUP, hr,
|
|
MB_OK, NULL, 0);
|
|
}
|
|
hr2 = DSS.GetNextRow();
|
|
}
|
|
if (hr2 != S_ADS_NOMORE_ROWS) { // oops, had another problem
|
|
fDomainSearchFailed = TRUE;
|
|
}
|
|
}
|
|
if (dup)
|
|
continue;
|
|
else {
|
|
if (fDomainSearchFailed || fGCSearchFailed) {
|
|
HRESULT hrSearch = S_OK;
|
|
if (fDomainSearchFailed) {
|
|
hrSearch = hr2;
|
|
} else {
|
|
hrSearch = hr;
|
|
}
|
|
ReportErrorEx (m_hwnd,IDS_UPN_SEARCH_FAILED2,hrSearch,
|
|
MB_OK | MB_ICONWARNING, NULL, 0);
|
|
}
|
|
}
|
|
|
|
if (pGCObj) {
|
|
pGCObj->Release();
|
|
pGCObj = NULL;
|
|
}
|
|
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec this should be + 1, not + sizeof(WCHAR)
|
|
pszNewName = new WCHAR[wcslen(dlgRename.m_cn) + 1];
|
|
dlgRename.m_cn.TrimRight();
|
|
dlgRename.m_cn.TrimLeft();
|
|
|
|
wcscpy (pszNewName, dlgRename.m_cn);
|
|
|
|
if (dlgRename.m_cn == dlgRename.m_oldcn)
|
|
NoRename = TRUE;
|
|
|
|
if (!dlgRename.m_displayname.IsEmpty()) {
|
|
dlgRename.m_displayname.TrimLeft();
|
|
dlgRename.m_displayname.TrimRight();
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec this should be + 1, not + sizeof(WCHAR)
|
|
pszDispName = new WCHAR[wcslen(dlgRename.m_displayname) + 1];
|
|
wcscpy (pszDispName, dlgRename.m_displayname);
|
|
avDispName.CaseIgnoreString = pszDispName;
|
|
} else {
|
|
aiDispName.dwControlCode = ADS_ATTR_CLEAR;
|
|
}
|
|
rgAttrs[cAttrs++] = aiDispName;
|
|
|
|
if (!dlgRename.m_first.IsEmpty()) {
|
|
dlgRename.m_first.TrimLeft();
|
|
dlgRename.m_first.TrimRight();
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec this should be + 1, not + sizeof(WCHAR)
|
|
pszFirstName = new WCHAR[wcslen(dlgRename.m_first) + 1];
|
|
wcscpy (pszFirstName, dlgRename.m_first);
|
|
avGiven.CaseIgnoreString = pszFirstName;
|
|
} else {
|
|
aiGiven.dwControlCode = ADS_ATTR_CLEAR;
|
|
}
|
|
rgAttrs[cAttrs++] = aiGiven;
|
|
|
|
if (!dlgRename.m_last.IsEmpty()) {
|
|
dlgRename.m_last.TrimLeft();
|
|
dlgRename.m_last.TrimRight();
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec sizeof(WCHAR) below should be 1
|
|
pszSurName = new WCHAR[wcslen(dlgRename.m_last) + 1];
|
|
wcscpy (pszSurName, dlgRename.m_last);
|
|
avSurName.CaseIgnoreString = pszSurName;
|
|
} else {
|
|
aiSurName.dwControlCode = ADS_ATTR_CLEAR;
|
|
}
|
|
rgAttrs[cAttrs++] = aiSurName;
|
|
|
|
if (!dlgRename.m_samaccountname.IsEmpty()) {
|
|
dlgRename.m_samaccountname.TrimLeft();
|
|
dlgRename.m_samaccountname.TrimRight();
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec sizeof(WCHAR) below should be 1
|
|
pszSAMName = new WCHAR[wcslen(dlgRename.m_samaccountname) + 1];
|
|
wcscpy (pszSAMName, dlgRename.m_samaccountname);
|
|
avSAMName.CaseIgnoreString = pszSAMName;
|
|
} else {
|
|
aiSAMName.dwControlCode = ADS_ATTR_CLEAR;
|
|
}
|
|
rgAttrs[cAttrs++] = aiSAMName;
|
|
|
|
|
|
hr = pObj->SetObjectAttributes (rgAttrs, cAttrs, &cModified);
|
|
if (FAILED(hr)) {
|
|
if (hr == E_ACCESSDENIED) {
|
|
fAccessDenied = TRUE;
|
|
NoRename = TRUE;
|
|
} else {
|
|
ReportErrorEx (m_hwnd, IDS_NAME_CHANGE_FAILED, hr,
|
|
MB_OK|MB_ICONERROR, NULL, 0, TRUE);
|
|
}
|
|
} else {
|
|
error = FALSE;
|
|
}
|
|
} else {
|
|
error = FALSE;
|
|
}
|
|
}
|
|
} else {
|
|
answer = IDCANCEL;
|
|
PVOID apv[1] = {(BSTR)(LPWSTR)(LPCWSTR)m_objectNamesFormat.GetName(0)};
|
|
ReportErrorEx (m_hwnd,IDS_12_USER_OBJECT_NOT_ACCESSABLE,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
} else if (strClass == L"group") {
|
|
CRenameGroupDlg * pdlgRename = new CRenameGroupDlg;
|
|
|
|
CString szPath;
|
|
szPath = m_objectNamesFormat.GetName(0);
|
|
hr = DSAdminOpenObject(szPath,
|
|
IID_IADs,
|
|
(void **)&pObj2,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr)) {
|
|
hr = pObj2->Get (CComBSTR(L"sAMAccountName"), &Var);
|
|
ASSERT (SUCCEEDED(hr));
|
|
csSam = Var.bstrVal;
|
|
if (strClass == L"computer") {
|
|
INT loc = csSam.Find(L"$");
|
|
if (loc > 0) {
|
|
csSam = csSam.Left(loc);
|
|
}
|
|
}
|
|
|
|
hr = pObj2->Get (CComBSTR(L"cn"), &Var);
|
|
ASSERT (SUCCEEDED(hr));
|
|
pdlgRename->m_cn = Var.bstrVal;
|
|
|
|
// figure out group type
|
|
if (strClass == L"group") {
|
|
CComVariant varType;
|
|
hr = pObj2->Get(CComBSTR(L"groupType"), &varType);
|
|
ASSERT(SUCCEEDED(hr));
|
|
INT GroupType = (varType.lVal & ~GROUP_TYPE_SECURITY_ENABLED);
|
|
if (GroupType == GROUP_TYPE_RESOURCE_GROUP) {
|
|
pdlgRename->m_samtextlimit = 64;
|
|
}
|
|
}
|
|
|
|
pdlgRename->m_samaccountname = csSam;
|
|
|
|
error = TRUE;
|
|
while ((error) && (!fAccessDenied))
|
|
{
|
|
answer = pdlgRename->DoModal();
|
|
if (answer == IDOK)
|
|
{
|
|
pdlgRename->m_cn.TrimRight();
|
|
pdlgRename->m_cn.TrimLeft();
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec 1 * sizeof(WCHAR) below should be 1
|
|
pszNewName = new WCHAR[wcslen(pdlgRename->m_cn) + (1 * sizeof(WCHAR))];
|
|
wcscpy (pszNewName, pdlgRename->m_cn);
|
|
Var.vt = VT_BSTR;
|
|
|
|
pdlgRename->m_samaccountname.TrimLeft();
|
|
pdlgRename->m_samaccountname.TrimRight();
|
|
csSam = pdlgRename->m_samaccountname;
|
|
if (strClass == L"computer")
|
|
{
|
|
csSam += L"$";
|
|
}
|
|
Var.bstrVal = SysAllocString(csSam);
|
|
hr = pObj2->Put (CComBSTR(L"sAMAccountName"), Var);
|
|
ASSERT (SUCCEEDED(hr));
|
|
if (FAILED(hr)) {
|
|
continue;
|
|
}
|
|
|
|
hr = pObj2->SetInfo();
|
|
if (FAILED(hr)) {
|
|
if (hr == E_ACCESSDENIED) {
|
|
fAccessDenied = TRUE;
|
|
NoRename = TRUE;
|
|
} else {
|
|
ReportErrorEx (m_hwnd, IDS_NAME_CHANGE_FAILED, hr,
|
|
MB_OK|MB_ICONERROR, NULL, 0, TRUE);
|
|
}
|
|
} else {
|
|
error = FALSE;
|
|
}
|
|
} else {
|
|
error = FALSE;
|
|
}
|
|
}
|
|
} else {
|
|
answer = IDCANCEL;
|
|
}
|
|
if (pdlgRename) {
|
|
delete pdlgRename;
|
|
}
|
|
} else if (strClass == L"contact") {
|
|
// rename contact
|
|
CRenameContactDlg dlgRename;
|
|
|
|
CString szPath;
|
|
szPath = m_objectNamesFormat.GetName(0);
|
|
hr = DSAdminOpenObject(szPath,
|
|
IID_IADs,
|
|
(void **)&pObj2,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr)) {
|
|
hr = pObj2->Get (CComBSTR(L"givenName"), &Var);
|
|
ASSERT (SUCCEEDED(hr) || (hr == E_ADS_PROPERTY_NOT_FOUND));
|
|
if (SUCCEEDED(hr)) {
|
|
dlgRename.m_first = Var.bstrVal;
|
|
}
|
|
|
|
hr = pObj2->Get (CComBSTR(L"sn"), &Var);
|
|
ASSERT (SUCCEEDED(hr) || (hr == E_ADS_PROPERTY_NOT_FOUND));
|
|
if (SUCCEEDED(hr)) {
|
|
dlgRename.m_last = Var.bstrVal;
|
|
}
|
|
|
|
hr = pObj2->Get (CComBSTR(L"displayName"), &Var);
|
|
ASSERT (SUCCEEDED(hr) || (hr == E_ADS_PROPERTY_NOT_FOUND));
|
|
if (SUCCEEDED(hr)) {
|
|
dlgRename.m_disp = Var.bstrVal;
|
|
}
|
|
|
|
hr = pObj2->Get (CComBSTR(L"cn"), &Var);
|
|
ASSERT (SUCCEEDED(hr) || (hr == E_ADS_PROPERTY_NOT_FOUND));
|
|
if (SUCCEEDED(hr)) {
|
|
dlgRename.m_cn = Var.bstrVal;
|
|
}
|
|
|
|
error = TRUE;
|
|
while ((error) && (!fAccessDenied))
|
|
{
|
|
answer = dlgRename.DoModal();
|
|
if (answer == IDOK)
|
|
{
|
|
dlgRename.m_cn.TrimRight();
|
|
dlgRename.m_cn.TrimLeft();
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec 1 * sizeof(WCHAR) below should be 1
|
|
pszNewName = new WCHAR[wcslen(dlgRename.m_cn) + (1 * sizeof(WCHAR))];
|
|
wcscpy (pszNewName, dlgRename.m_cn);
|
|
Var.vt = VT_BSTR;
|
|
|
|
if (!dlgRename.m_first.IsEmpty())
|
|
{
|
|
dlgRename.m_first.TrimLeft();
|
|
dlgRename.m_first.TrimRight();
|
|
Var.bstrVal = SysAllocString (dlgRename.m_first);
|
|
hr = pObj2->Put (CComBSTR(L"givenName"), Var);
|
|
ASSERT (SUCCEEDED(hr));
|
|
}
|
|
|
|
if (!dlgRename.m_last.IsEmpty()) {
|
|
dlgRename.m_last.TrimLeft();
|
|
dlgRename.m_last.TrimRight();
|
|
Var.bstrVal = SysAllocString(dlgRename.m_last);
|
|
hr = pObj2->Put (CComBSTR(L"sn"), Var);
|
|
ASSERT (SUCCEEDED(hr));
|
|
}
|
|
|
|
if (!dlgRename.m_disp.IsEmpty()) {
|
|
dlgRename.m_disp.TrimLeft();
|
|
dlgRename.m_disp.TrimRight();
|
|
Var.bstrVal = SysAllocString(dlgRename.m_disp);
|
|
hr = pObj2->Put (CComBSTR(L"displayName"), Var);
|
|
ASSERT (SUCCEEDED(hr));
|
|
}
|
|
|
|
hr = pObj2->SetInfo();
|
|
if (FAILED(hr)) {
|
|
if (hr == E_ACCESSDENIED) {
|
|
fAccessDenied = TRUE;
|
|
NoRename = TRUE;
|
|
} else {
|
|
ReportErrorEx (m_hwnd, IDS_NAME_CHANGE_FAILED, hr,
|
|
MB_OK|MB_ICONERROR, NULL, 0, TRUE);
|
|
}
|
|
} else {
|
|
error = FALSE;
|
|
}
|
|
} else {
|
|
error = FALSE;
|
|
}
|
|
}
|
|
} else {
|
|
answer = IDCANCEL;
|
|
}
|
|
} else {
|
|
// need generic dialog here.
|
|
CRenameGenericDlg dlgRename (CWnd::FromHandle(m_hwnd));
|
|
|
|
CString szPath;
|
|
szPath = m_objectNamesFormat.GetName(0);
|
|
hr = DSAdminOpenObject(szPath,
|
|
IID_IADs,
|
|
(void **)&pObj2,
|
|
TRUE /*bServer*/);
|
|
if (SUCCEEDED(hr)) {
|
|
CDSClassCacheItemBase* pItem = NULL;
|
|
|
|
pItem = m_pCD->m_pClassCache->FindClassCacheItem(m_pCD, (LPCWSTR)strClass, szPath);
|
|
|
|
ASSERT (pItem != NULL);
|
|
//get the naming attribute
|
|
CString csNewAttrName;
|
|
csNewAttrName = pItem->GetNamingAttribute();
|
|
|
|
hr = pObj2->Get (CComBSTR(csNewAttrName), &Var);
|
|
|
|
ASSERT (SUCCEEDED(hr) || (hr == E_ADS_PROPERTY_NOT_FOUND));
|
|
if (SUCCEEDED(hr)) {
|
|
dlgRename.m_cn = Var.bstrVal;
|
|
}
|
|
|
|
//NTRAID#NTBUG9-571993-2002/03/10-jmessec what is all of this while (error) rigamarole for? it never loops
|
|
error = TRUE;
|
|
while (error)
|
|
{
|
|
CThemeContextActivator activator;
|
|
answer = dlgRename.DoModal();
|
|
if (answer == IDOK)
|
|
{
|
|
dlgRename.m_cn.TrimRight();
|
|
dlgRename.m_cn.TrimLeft();
|
|
//NTRAID#NTBUG9-569671-2002/03/10-jmessec 1 * sizeof(WCHAR) below should be 1
|
|
pszNewName = new WCHAR[wcslen(dlgRename.m_cn) + (1 * sizeof(WCHAR))];
|
|
wcscpy (pszNewName, dlgRename.m_cn);
|
|
error = FALSE;
|
|
}
|
|
else
|
|
{
|
|
error = FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
if ((answer == IDOK) && (error == FALSE) && (NoRename == FALSE)) {
|
|
CString csObjectPath = m_objectNamesFormat.GetName(0);
|
|
CDSClassCacheItemBase* pItem = NULL;
|
|
pItem = m_pCD->m_pClassCache->FindClassCacheItem(m_pCD, (LPCWSTR)strClass, csObjectPath);
|
|
ASSERT (pItem != NULL);
|
|
|
|
// get the new name in the form "cn=foo" or "ou=foo"
|
|
CString csNewAttrName;
|
|
csNewAttrName = pItem->GetNamingAttribute();
|
|
csNewAttrName += L"=";
|
|
csNewAttrName += pszNewName;
|
|
TRACE(_T("_RenameObject: Attributed name is %s.\n"), csNewAttrName);
|
|
|
|
// bind to object
|
|
IADs *pDSObject = NULL;
|
|
hr = DSAdminOpenObject(csObjectPath,
|
|
IID_IADs,
|
|
(void **)&pDSObject,
|
|
TRUE /*bServer*/);
|
|
if (!SUCCEEDED(hr)) {
|
|
goto error;
|
|
}
|
|
BSTR bsParentPath;
|
|
// get the path of the object container
|
|
hr = pDSObject->get_Parent (&bsParentPath);
|
|
if (!SUCCEEDED(hr)) {
|
|
goto error;
|
|
}
|
|
pDSObject->Release();
|
|
pDSObject = NULL;
|
|
|
|
IADsContainer * pContainer = NULL;
|
|
// bind to the object container
|
|
hr = DSAdminOpenObject(bsParentPath,
|
|
IID_IADsContainer,
|
|
(void **)&pContainer,
|
|
TRUE /*bServer*/);
|
|
if (!SUCCEEDED(hr)) {
|
|
goto error;
|
|
}
|
|
|
|
// build the new LDAP path
|
|
CString csNewNamingContext, csNewPath, szPath;
|
|
BSTR bsEscapedName;
|
|
csNewNamingContext = csNewAttrName;
|
|
csNewNamingContext += L",";
|
|
StripADsIPath(bsParentPath, szPath);
|
|
csNewNamingContext += szPath;
|
|
m_pCD->GetBasePathsInfo()->ComposeADsIPath(csNewPath, csNewNamingContext);
|
|
|
|
// create a transaction object, the destructor will call End() on it
|
|
CDSNotifyHandlerTransaction transaction(m_pCD);
|
|
transaction.SetEventType(DSA_NOTIFY_REN);
|
|
|
|
// start the transaction
|
|
hr = transaction.Begin(m_objectNamesFormat.GetName(0),
|
|
m_objectNamesFormat.GetClass(0),
|
|
m_objectNamesFormat.IsContainer(0),
|
|
csNewPath,
|
|
m_objectNamesFormat.GetClass(0),
|
|
m_objectNamesFormat.IsContainer(0));
|
|
|
|
// ask for confirmation
|
|
if (transaction.NeedNotifyCount() > 0)
|
|
{
|
|
CString szMessage, szAssocData;
|
|
szMessage.LoadString(IDS_CONFIRM_RENAME);
|
|
szAssocData.LoadString(IDS_EXTENS_RENAME);
|
|
CConfirmOperationDialog dlg(::GetParent(m_hwnd), &transaction);
|
|
dlg.SetStrings(szMessage, szAssocData);
|
|
if (IDNO == dlg.DoModal())
|
|
{
|
|
transaction.End();
|
|
hr = S_OK;
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
CPathCracker pathCracker;
|
|
hr = pathCracker.GetEscapedElement(0, //reserved
|
|
(BSTR)(LPCWSTR)csNewAttrName,
|
|
&bsEscapedName);
|
|
if (FAILED(hr))
|
|
goto error;
|
|
|
|
IDispatch * pDispObj = NULL;
|
|
// do the actual rename
|
|
hr = pContainer->MoveHere(CComBSTR(csObjectPath),
|
|
CComBSTR(bsEscapedName),
|
|
&pDispObj);
|
|
|
|
|
|
if (SUCCEEDED(hr) && (hr != S_FALSE)) {
|
|
// let extensions know
|
|
transaction.Notify(0);
|
|
|
|
// send notify to diz
|
|
}
|
|
|
|
if (pDispObj) {
|
|
pDispObj->Release();
|
|
}
|
|
}
|
|
if (fAccessDenied) {
|
|
PVOID apv[1] = {(LPWSTR)m_objectNamesFormat.GetName(0)};
|
|
ReportErrorEx(::GetParent(m_hwnd),IDS_12_RENAME_NOT_ALLOWED,hr,
|
|
MB_OK | MB_ICONERROR, apv, 1);
|
|
}
|
|
|
|
error:
|
|
// transaction.End() will be called by the transaction's destructor
|
|
|
|
if (pwzLocalDomain) {
|
|
LocalFreeStringW(&pwzLocalDomain);
|
|
}
|
|
if (pszNewName) {
|
|
delete[] pszNewName;
|
|
}
|
|
if (pszFirstName) {
|
|
delete[] pszFirstName;
|
|
}
|
|
if (pszDispName) {
|
|
delete[] pszDispName;
|
|
}
|
|
if (pszSurName) {
|
|
delete[] pszSurName;
|
|
}
|
|
if (pszSAMName){
|
|
delete[] pszSAMName;
|
|
}
|
|
if (pszUPN) {
|
|
delete[] pszUPN;
|
|
}
|
|
|
|
if (pObj) {
|
|
pObj->Release();
|
|
}
|
|
if (pObj2) {
|
|
pObj2->Release();
|
|
}
|
|
}
|