Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

5844 lines
199 KiB

/*++
Copyright (c) 1995-2001 Microsoft Corporation
Module Name:
netname.c
Abstract:
Resource DLL for a network name.
Author:
Mike Massa (mikemas) 29-Dec-1995
Revision History:
Severely whacked on by Charlie Wickham (charlwi)
--*/
#define UNICODE 1
#include "clusres.h"
#include "clusrtl.h"
#include <lm.h>
#include <srvann.h>
#include <dsgetdc.h>
#include <dsgetdcp.h>
#include <adserr.h>
#include "netname.h"
#include "nameutil.h"
#include "namechk.h"
#include "clusudef.h"
#include "clusstrs.h"
//
// Constants
//
#define LOG_CURRENT_MODULE LOG_MODULE_NETNAME
#define IP_ADDRESS_RESOURCETYPE_NAME CLUS_RESTYPE_NAME_IPADDR
//
// Macros
//
#ifndef ARGUMENT_PRESENT
#define ARGUMENT_PRESENT( ArgumentPointer ) (\
(CHAR *)(ArgumentPointer) != (CHAR *)(NULL) )
#endif
//
// turn on _INSTRUMENTED_LOCKS if you're trying to figure out where the lock
// is getting orphaned
//
//#define _INSTRUMENTED_LOCKS
#ifdef _INSTRUMENTED_LOCKS
#define NetNameAcquireResourceLock() \
{ \
DWORD status; \
status = WaitForSingleObject(NetNameResourceMutex, INFINITE); \
if ( status == WAIT_ABANDONED ) { \
OutputDebugStringW( L"Resource List Mutex Abandoned!\n" ); \
DebugBreak(); \
} \
(NetNameLogEvent)(L"rtNetwork Name", \
LOG_INFORMATION, \
L"++NNMutex (line %1!u!)\n", \
__LINE__); \
}
#define NetNameReleaseResourceLock() \
{ \
BOOL released; \
(NetNameLogEvent)(L"rtNetwork Name", \
LOG_INFORMATION, \
L"--NNMutex (line %1!u!)\n", \
__LINE__); \
released = ReleaseMutex(NetNameResourceMutex); \
}
#define NetNameAcquireDnsListLock( _res_ ) \
{ \
DWORD status; \
status = WaitForSingleObject((_res_)->DnsListMutex, INFINITE); \
if ( status == WAIT_ABANDONED ) { \
OutputDebugStringW( L"DNS List Mutex Abandoned!\n" ); \
DebugBreak(); \
} \
(NetNameLogEvent)(L"rtNetwork Name", \
LOG_INFORMATION, \
L"++DNSMutex (res %1!X! line %2!u!)\n", \
_res_, __LINE__); \
}
#define NetNameReleaseDnsListLock( _res_ ) \
{ \
BOOL released; \
(NetNameLogEvent)(L"rtNetwork Name", \
LOG_INFORMATION, \
L"--DNSMutex (res %1!X! line %2!u!)\n", \
_res_, __LINE__); \
released = ReleaseMutex((_res_)->DnsListMutex); \
if ( !released ) { \
(NetNameLogEvent)(L"rtNetwork Name", \
LOG_INFORMATION, \
L"ERROR %1!d! releasing DNS mutex (res %2!X! line %3!u!)\n", \
GetLastError(), _res_, __LINE__); \
} \
}
#else // _INSTRUMENTED_LOCKS
#define NetNameAcquireResourceLock() \
{ \
DWORD status; \
status = WaitForSingleObject(NetNameResourceMutex, INFINITE); \
}
#define NetNameReleaseResourceLock() \
{ \
BOOL released; \
released = ReleaseMutex(NetNameResourceMutex); \
}
#define NetNameAcquireDnsListLock( _res_ ) \
{ \
DWORD status; \
status = WaitForSingleObject((_res_)->DnsListMutex, INFINITE); \
}
#define NetNameReleaseDnsListLock( _res_ ) \
{ \
BOOL released; \
released = ReleaseMutex((_res_)->DnsListMutex); \
}
#endif // _INSTRUMENTED_LOCKS
//
// Local Variables
//
// Mutex for sync'ing access to the list of resources as well as each resource
// block
//
HANDLE NetNameResourceMutex = NULL;
//
// The checking of DNS names requires talking to a DNS server, hence this work
// is spun off to a separate thread. The resource context blocks are linked
// together on a doubly linked list and are ref counted to make sure that a
// block isn't changed during offline processing while its DNS name records
// are being checked.
//
// The NetNameWorkerTerminate event signals the worker routine to exit.
//
HANDLE NetNameWorkerTerminate;
//
// NetNameWorkerPendingResources is used to signal the worker thread that a
// name is moving through a pending state. It is possible for an online
// operation to time out when lots of names go online
// simultaneously. Similarly, an offline might require communication with a DC
// which could take a while. The worker thread will periodically report back
// to resmon that we're making progress.
//
HANDLE NetNameWorkerPendingResources;
//
// list head for resource context block linkage
//
LIST_ENTRY NetNameResourceListHead;
//
// the amount of seconds the worker thread waits before doing something. This
// includes querying the DNS server to make sure registrations are correct and
// reporting back to resmon when names are going online. This value gets
// smaller when server communication is suspect.
//
ULONG NetNameWorkerCheckPeriod;
//
// ladies and gentlemen, the worker thread
//
HANDLE NetNameWorkerThread;
//
// Count of opened NetName resources.
// Incremented in NetNameOpen
// Decremented in NetNameClose
//
DWORD NetNameOpenCount = 0;
//
// account description string used for computer objects
//
LPWSTR NetNameCompObjAccountDesc;
//
// argh. If you have r/w and r/o props, you have to combine them into a
// combined prop table in order to support unknown properties correctly. For
// this reason, we use #defines to keep only one list of properties.
//
#define NETNAME_RW_PROPERTIES \
{ \
PARAM_NAME__NAME, \
NULL, \
CLUSPROP_FORMAT_SZ, \
0, 0, 0, \
RESUTIL_PROPITEM_REQUIRED, \
FIELD_OFFSET(NETNAME_PARAMS,NetworkName) \
}, \
{ \
PARAM_NAME__REMAP, \
NULL, \
CLUSPROP_FORMAT_DWORD, \
PARAM_DEFAULT__REMAP, \
0, 1, 0, \
FIELD_OFFSET(NETNAME_PARAMS,NetworkRemap) \
}, \
{ \
PARAM_NAME__REQUIRE_DNS, \
NULL, \
CLUSPROP_FORMAT_DWORD, \
PARAM_DEFAULT__REQUIRE_DNS, \
0, 1, 0, \
FIELD_OFFSET(NETNAME_PARAMS,RequireDNS) \
}, \
{ \
PARAM_NAME__REQUIRE_KERBEROS, \
NULL, \
CLUSPROP_FORMAT_DWORD, \
PARAM_DEFAULT__REQUIRE_KERBEROS, \
0, 1, 0, \
FIELD_OFFSET(NETNAME_PARAMS,RequireKerberos) \
}
#define NETNAME_RO_PROPERTIES \
{ \
PARAM_NAME__RESOURCE_DATA, \
NULL, \
CLUSPROP_FORMAT_BINARY, \
0, 0, 0, \
RESUTIL_PROPITEM_READ_ONLY, \
FIELD_OFFSET(NETNAME_PARAMS,ResourceData) \
}, \
{ \
PARAM_NAME__STATUS_NETBIOS, \
NULL, \
CLUSPROP_FORMAT_DWORD, \
0, 0, 0xFFFFFFFF, \
RESUTIL_PROPITEM_READ_ONLY, \
FIELD_OFFSET(NETNAME_PARAMS,StatusNetBIOS) \
}, \
{ \
PARAM_NAME__STATUS_DNS, \
NULL, \
CLUSPROP_FORMAT_DWORD, \
0, 0, 0xFFFFFFFF, \
RESUTIL_PROPITEM_READ_ONLY, \
FIELD_OFFSET(NETNAME_PARAMS,StatusDNS) \
}, \
{ \
PARAM_NAME__STATUS_KERBEROS, \
NULL, \
CLUSPROP_FORMAT_DWORD, \
0, 0, 0xFFFFFFFF, \
RESUTIL_PROPITEM_READ_ONLY, \
FIELD_OFFSET(NETNAME_PARAMS,StatusKerberos) \
}, \
{ \
PARAM_NAME__CREATING_DC, \
NULL, \
CLUSPROP_FORMAT_SZ, \
0, 0, 0, \
RESUTIL_PROPITEM_READ_ONLY, \
FIELD_OFFSET(NETNAME_PARAMS,CreatingDC) \
}
/*
#ifdef PASSWORD_ROTATION
// r/w
{ \
PARAM_NAME__UPDATE_INTERVAL, \
NULL, \
CLUSPROP_FORMAT_DWORD, \
PARAM_DEFAULT__UPDATE_INTERVAL, \
PARAM_MINIMUM__UPDATE_INTERVAL, \
PARAM_MAXIMUM__UPDATE_INTERVAL, \
0, \
FIELD_OFFSET(NETNAME_PARAMS,UpdateInterval) \
}
// read-only
{ \
PARAM_NAME__NEXT_UPDATE, \
NULL, \
CLUSPROP_FORMAT_BINARY, \
0, 0, 0, \
RESUTIL_PROPITEM_READ_ONLY, \
FIELD_OFFSET(NETNAME_PARAMS,NextUpdate) \
}, \
#endif // PASSWORD_ROTATION
*/
//
// Network Name resource read-write private properties.
//
// DON'T ADD PROPERTIES DIRECTLY TO THIS TABLE. ADD TO THE APPROPRIATE MACRO
// DEFINED ABOVE.
//
RESUTIL_PROPERTY_ITEM
NetNameResourcePrivateProperties[] = {
NETNAME_RW_PROPERTIES,
{ NULL, NULL, 0, 0, 0, 0 }
};
//
// Network Name resource read-only private properties.
//
// DON'T ADD PROPERTIES DIRECTLY TO THIS TABLE. ADD TO THE APPROPRIATE MACRO
// DEFINED ABOVE.
//
RESUTIL_PROPERTY_ITEM
NetNameResourceROPrivateProperties[] = {
NETNAME_RO_PROPERTIES,
{ NULL, NULL, 0, 0, 0, 0 }
};
//
// Network Name resource combined private properties.
//
// DON'T ADD PROPERTIES DIRECTLY TO THIS TABLE. ADD TO THE APPROPRIATE MACRO
// DEFINED ABOVE.
//
RESUTIL_PROPERTY_ITEM
NetNameResourceCombinedPrivateProperties[] = {
NETNAME_RW_PROPERTIES,
NETNAME_RO_PROPERTIES,
{ NULL, NULL, 0, 0, 0, 0 }
};
//
// static variables
//
//
// after an upgrade, this var will be true if MSMQ dependent netnames should
// be upgraded to kerberos support.
//
static BOOL CheckForKerberosUpgrade = FALSE;
//
// forward declarations
//
CLRES_FUNCTION_TABLE NetNameFunctionTable;
//
// Forward references
//
DWORD
NetNameGetPrivateResProperties(
IN OUT PNETNAME_RESOURCE ResourceEntry,
IN BOOL ReadOnly,
OUT PVOID OutBuffer,
IN DWORD OutBufferSize,
OUT LPDWORD BytesReturned
);
DWORD
NetNameValidatePrivateResProperties(
IN OUT PNETNAME_RESOURCE ResourceEntry,
IN PVOID InBuffer,
IN DWORD InBufferSize,
OUT PNETNAME_PARAMS Params,
OUT PBOOL NetnameHasChanged,
OUT PBOOL CompObjRenameIsRequired
);
DWORD
NetNameSetPrivateResProperties(
IN OUT PNETNAME_RESOURCE ResourceEntry,
IN PVOID InBuffer,
IN DWORD InBufferSize
);
DWORD
NetNameClusterNameChanged(
IN PNETNAME_RESOURCE Resource
);
DWORD
NetNameGetNetworkName(
IN OUT PNETNAME_RESOURCE ResourceEntry,
OUT PVOID OutBuffer,
IN DWORD OutBufferSize,
OUT LPDWORD BytesReturned
);
VOID
NetNameCleanupDnsLists(
IN PNETNAME_RESOURCE Resource
);
VOID
RemoveDnsRecords(
PNETNAME_RESOURCE Resource
);
//
// Local utility functions
//
VOID
WINAPI
NetNameReleaseResource(
IN RESID Resource
)
/*++
Routine Description:
Cleanup all handles and memory allocations in the netname context block
Arguments:
Resource - supplies resource id to be cleaned up.
Return Value:
None.
--*/
{
PNETNAME_RESOURCE resource = (PNETNAME_RESOURCE) Resource;
PLIST_ENTRY entry;
if ( resource == NULL ) {
return;
}
if (resource->Params.NetworkName != NULL) {
LocalFree( resource->Params.NetworkName );
}
if (resource->Params.ResourceData != NULL) {
LocalFree( resource->Params.ResourceData );
}
if (resource->Params.CreatingDC != NULL) {
LocalFree( resource->Params.CreatingDC );
}
if (resource->NodeName != NULL) {
LocalFree( resource->NodeName );
}
if (resource->NodeId != NULL) {
LocalFree( resource->NodeId );
}
if (resource->ParametersKey != NULL) {
ClusterRegCloseKey(resource->ParametersKey);
}
if (resource->ResKey != NULL){
ClusterRegCloseKey(resource->ResKey);
}
if (resource->ClusterResourceHandle != NULL){
CloseClusterResource(resource->ClusterResourceHandle);
}
if (resource->ObjectGUID != NULL) {
LocalFree( resource->ObjectGUID );
}
if ( resource->DnsLists != NULL ) {
NetNameCleanupDnsLists( resource );
}
if ( resource->DnsListMutex != NULL ) {
#if DBG
{
DWORD status;
status = WaitForSingleObject( resource->DnsListMutex, 0 );
if ( status == WAIT_TIMEOUT ) {
WCHAR buf[64];
buf[ COUNT_OF( buf ) - 1 ] = UNICODE_NULL;
_snwprintf(buf, COUNT_OF( buf ) - 1,
L"res %08X DNS list mutex still signalled at delete!\n",
(DWORD_PTR)resource);
OutputDebugStringW( buf );
DebugBreak();
} else {
ReleaseMutex( resource->DnsListMutex );
}
}
#endif
CloseHandle( resource->DnsListMutex );
}
(NetNameLogEvent)(resource->ResourceHandle,
LOG_INFORMATION,
L"ResID %1!u! closed.\n",
Resource
);
LocalFree( resource );
} // NetNameReleaseResource
VOID
NetNameUpdateDnsServer(
PNETNAME_RESOURCE Resource
)
/*++
Routine Description:
Update this resource's A and PTR records at its DNS server
Arguments:
Resource - pointer to netname resource context block
Return Value:
None
--*/
{
PDNS_LISTS dnsLists;
DWORD numberOfDnsLists;
ULONG numberOfRegisteredNames;
NetNameAcquireDnsListLock( Resource );
numberOfDnsLists = Resource->NumberOfDnsLists;
dnsLists = Resource->DnsLists;
while ( numberOfDnsLists-- ) {
if ( dnsLists->ForwardZoneIsDynamic ) {
#if DBG_DNSLIST
{
PDNS_RECORD dnsRec = dnsLists->A_RRSet.pFirstRR;
WCHAR buf[DNS_MAX_NAME_BUFFER_LENGTH + 64];
struct in_addr addr;
if ( dnsRec != NULL ) {
addr.s_addr = dnsLists->DnsServerList->AddrArray[0];
buf[ COUNT_OF( buf ) - 1 ] = UNICODE_NULL;
_snwprintf(buf, COUNT_OF( buf ) - 1,
L"REGISTERING ON adapter %.32ws (%hs)\n",
dnsLists->ConnectoidName,
inet_ntoa( addr ) );
OutputDebugStringW( buf );
do {
addr.s_addr = dnsRec->Data.A.IpAddress;
buf[ COUNT_OF( buf ) - 1 ] = UNICODE_NULL;
_snwprintf(buf, COUNT_OF( buf ) - 1,
L"\t(%ws, %hs)\n",
dnsRec->pName, inet_ntoa( addr ));
OutputDebugStringW( buf );
dnsRec = dnsRec->pNext;
} while ( dnsRec != NULL );
}
}
#endif
//
// resource went or is going offline; no point in
// continueing. don't need to grab resource lock since we have a
// refcount on the resource block
//
if (Resource->State != ClusterResourceOnline) {
break;
}
//
// register the records to update their timestamp (if there is
// something to register). Before we used to query but eventually
// the records would time out and be scavenged (deleted). This can
// cause lots of grief (or in Exchange's case, lots of undelivered
// mail).
//
// we don't worry about logging errors or update the
// LastARecQueryStatus since all of that is done in
// RegisterDnsRecords.
//
if ( dnsLists->A_RRSet.pFirstRR != NULL ) {
RegisterDnsRecords(dnsLists,
Resource->Params.NetworkName,
Resource->ResKey,
Resource->ResourceHandle,
FALSE, /* LogRegistration */
&numberOfRegisteredNames);
}
} // Is Forward zone dynamic?
++dnsLists;
} // while numberOfDnsLists != 0
NetNameReleaseDnsListLock( Resource );
} // NetNameUpdateDnsServer
DWORD WINAPI
NetNameWorker(
IN LPVOID NotUsed
)
/*++
Routine Description:
background worker thread. Checks on the health of the DNS registrations
and reports back to resmon while names are in the online pending
state. The netname Is/LooksAlive checks are too frequent such that they
would cause alot of DNS traffic on the network. This routine runs through
the linked list of netname resource blocks and queries the server for the
records that should be registered. Any discrepancies will cause the
records to be registered again. The success of each operation is left in
the DNS_LIST area for the particular record type.
In addition, when prompted, it will run down the list of resources and
report back the resource's status to resmon. Name registration is
serialized through srv.sys causing some names to time out before they get
registered.
Arguments:
NotUsed - not used...
Return Value:
ERROR_SUCCESS
--*/
{
DWORD status = ERROR_SUCCESS;
PLIST_ENTRY entry;
PNETNAME_RESOURCE resource;
DNS_STATUS dnsStatus;
BOOL reportPending;
DWORD oldCheckPeriod = NetNameWorkerCheckPeriod;
DWORD pendingResourceCount;
RESOURCE_STATUS resourceStatus;
HANDLE waitHandles[ 2 ] = { NetNameWorkerTerminate,
NetNameWorkerPendingResources };
ResUtilInitializeResourceStatus( &resourceStatus );
do {
status = WaitForMultipleObjects(2,
waitHandles,
FALSE,
NetNameWorkerCheckPeriod * 1000);
if ( status == WAIT_OBJECT_0 ) {
return ERROR_SUCCESS;
}
if ( status == ( WAIT_OBJECT_0 + 1 )) {
reportPending = TRUE;
#if DBG
(NetNameLogEvent)(L"rtNetwork Name",
LOG_INFORMATION,
L"Start of pending resource reporting\n");
#endif
}
//
// reset check frequency back to normal. if something goes wrong,
// other code will set it back to the problem check period.
//
NetNameWorkerCheckPeriod = NETNAME_WORKER_NORMAL_CHECK_PERIOD;
pendingResourceCount = 0;
NetNameAcquireResourceLock();
entry = NetNameResourceListHead.Flink;
while ( entry != &NetNameResourceListHead ) {
//
// get a pointer to the resource block
//
resource = CONTAINING_RECORD( entry, NETNAME_RESOURCE, Next );
if ( resource->State > ClusterResourcePending ) {
//
// bringing lots (40) of names online simultaneously caused
// some names to hit their pending timeouts. Each time a name
// enters a pending state, the NetNameWorkerPendingResources
// event is set to wake up this thread. The timeout is changed
// so we can report back to resmon that the operation is
// continuing. This should prevent resmon from timing out the
// resource and causing much thrashing. No other checking (DNS
// or Kerb) is done while this is happening.
//
#if DBG
(NetNameLogEvent)(resource->ResourceHandle,
LOG_INFORMATION,
L"Reporting resource pending\n");
#endif
oldCheckPeriod = NetNameWorkerCheckPeriod;
NetNameWorkerCheckPeriod = NETNAME_WORKER_PENDING_PERIOD;
resourceStatus.CheckPoint = ++resource->StatusCheckpoint;
resourceStatus.ResourceState = resource->State;
//
// never hold the resource lock when calling
// SetResourceStatus. You'll end up with deadlocks when resmon
// calls back in to the Looks/IsAlive routines. However, the
// resource state is always synch'ed by this lock. No need to
// bump refcount since this resource is still in a Pending
// state and resmon won't allow the resource delete cluster
// control to be issued.
//
NetNameReleaseResourceLock();
(NetNameSetResourceStatus)(resource->ResourceHandle,
&resourceStatus);
NetNameAcquireResourceLock();
++pendingResourceCount;
}
else if ( resource->State == ClusterResourceOnline && !reportPending ) {
//
// up the ref count so this resource doesn't go away while we
// re-register the records with the DNS server. This keeps
// them from getting scavenged (deleted).
//
++resource->RefCount;
NetNameReleaseResourceLock();
NetNameUpdateDnsServer( resource );
//
// check the status of the computer object and see if it is
// time to generate a new password.
//
if ( resource->DoKerberosCheck ) {
FILETIME currentFileTime;
if ( resource->ObjectGUID == NULL ) {
//
// wasn't able to get the GUID during online; let's try now
//
GetComputerObjectGuid( resource, NULL );
}
if ( resource->ObjectGUID != NULL ) {
status = CheckComputerObjectAttributes( resource, NULL );
InterlockedExchange( &resource->KerberosStatus, status );
}
#ifdef PASSWORD_ROTATION
GetSystemTimeAsFileTime( &currentFileTime );
if ( CompareFileTime( &currentFileTime, &resource->Params.NextUpdate ) == 1 ) {
ULARGE_INTEGER updateTime;
DWORD setValueStatus;
status = UpdateCompObjPassword( resource );
updateTime.LowPart = currentFileTime.dwLowDateTime;
updateTime.HighPart = currentFileTime.dwHighDateTime;
updateTime.QuadPart += ( resource->Params.UpdateInterval * 60 * 1000 * 100 );
currentFileTime.dwLowDateTime = updateTime.LowPart;
currentFileTime.dwHighDateTime = updateTime.HighPart;
setValueStatus = ResUtilSetBinaryValue(resource->ParametersKey,
PARAM_NAME__NEXT_UPDATE,
(const LPBYTE)&updateTime,
sizeof( updateTime ),
NULL,
NULL);
//
// not sure how we should handle an error here; any
// type of error generally indicates that the cluster
// service has croaked. Since this is our worker
// thread, there isn't much we can do until we've been
// asked to terminate.
//
// ASSERT( setValueStatus == ERROR_SUCCESS );
}
#endif // PASSWORD_ROTATION
}
//
// reacquire the mutex so we can release our reference. If the
// resource went offline and was deleted during the
// registration, then perform "last ref" cleanup. If the
// resource just went offline, we need to inform resmon that
// we're finally going offline. This is synchronized with the
// resource delete code by not having the DNS lists in use
// when a delete resource control is sent.
//
NetNameAcquireResourceLock();
ASSERT( resource->RefCount > 0 ); /* Ruihu: 11/04/2000 */
if (resource->RefCount == 1) {
//
// we hold the last reference to this resource so it must
// have been deleted while the registration was taking
// place. Clean up and free our context block for this
// resource. Restart the loop since we don't know if the
// flink for this entry is still valid.
//
NetNameReleaseResource( resource );
entry = NetNameResourceListHead.Flink; /* start over */
continue;
}
else
{
if ( resource->State == ClusterResourceOfflinePending ) {
BOOL nameChanged;
//
// The resource state was changed while we were
// dealing with DNS. Set the state to offline.
//
resourceStatus.ResourceState = ClusterResourceOffline;
resource->State = ClusterResourceOffline;
//
// note whatever cleanup we need to do while we hold the lock
//
nameChanged = resource->NameChangedWhileOnline;
resource->NameChangedWhileOnline = FALSE;
//
// ok to release lock since we haven't released our
// reference to this block
//
NetNameReleaseResourceLock();
//
// if appropriate, do cleanup processing
//
if ( nameChanged ) {
RemoveDnsRecords( resource );
resource->NameChangedWhileOnline = FALSE;
}
(NetNameSetResourceStatus)(resource->ResourceHandle,
&resourceStatus);
(NetNameLogEvent)(resource->ResourceHandle,
LOG_INFORMATION,
L"Resource is now offline\n");
NetNameAcquireResourceLock();
} // ( resource->State == ClusterResourceOfflinePending )
/* Ruihu: 11/04/2000 */
--resource->RefCount;
ASSERT(resource->RefCount >=0 );
if (resource->RefCount == 0) {
NetNameReleaseResource( resource );
entry = NetNameResourceListHead.Flink; /* start over */
continue;
}
/* Ruihu: 11/04/2000 */
} // end if resource count != 1
} // resource is online
entry = entry->Flink;
} // while entries in the resource block list
NetNameReleaseResourceLock();
if ( reportPending && pendingResourceCount == 0 ) {
//
// no resources are left in a pending state so revert back to
// checking DNS registrations
//
NetNameWorkerCheckPeriod = oldCheckPeriod;
reportPending = FALSE;
#if DBG
(NetNameLogEvent)(L"rtNetwork Name",
LOG_INFORMATION,
L"End of pending resource reporting\n");
#endif
}
} while ( TRUE );
} // NetNameWorker
BOOLEAN
NetNameInit(
IN HINSTANCE DllHandle
)
/*++
Routine Description:
Process attach initialization routine.
Arguments:
DllHandle - handle to clusres module
Return Value:
TRUE if initialization succeeded. FALSE otherwise.
--*/
{
DWORD status;
DWORD charsCopied;
DWORD charsAllocated = 0;
NetNameResourceMutex = CreateMutex(NULL, FALSE, NULL);
if (NetNameResourceMutex == NULL) {
return(FALSE);
}
//
// create worker thread terminate event with no special security,
// auto-reset, initially nonsignalled, and no name
//
NetNameWorkerTerminate = CreateEvent( NULL, FALSE, FALSE, NULL );
if ( NetNameWorkerTerminate == NULL ) {
CloseHandle( NetNameResourceMutex );
return FALSE;
}
//
// create worker thread online pending event with no special security,
// auto-reset, initially nonsignalled, and no name
//
NetNameWorkerPendingResources = CreateEvent( NULL, FALSE, FALSE, NULL );
if ( NetNameWorkerPendingResources == NULL ) {
CloseHandle( NetNameWorkerTerminate );
CloseHandle( NetNameResourceMutex );
return FALSE;
}
//
// init the list head of the list of resources to check for DNS
// registrations
//
InitializeListHead( &NetNameResourceListHead );
//
// lookup the account description string resource; start with 64 char
// buffer and double until we fail or we get all of the string. Not
// considered fatal if we can't load the string
//
charsAllocated = 64;
realloc:
charsCopied = 0;
NetNameCompObjAccountDesc = LocalAlloc( LMEM_FIXED, charsAllocated * sizeof( WCHAR ));
if ( NetNameCompObjAccountDesc ) {
charsCopied = LoadString(DllHandle,
RES_NETNAME_COMPUTER_ACCOUNT_DESCRIPTION,
NetNameCompObjAccountDesc,
charsAllocated);
if ( charsCopied != 0 && charsCopied == ( charsAllocated - 1 )) {
LocalFree( NetNameCompObjAccountDesc );
charsAllocated *= 2;
goto realloc;
}
}
if ( charsCopied == 0 && NetNameCompObjAccountDesc != NULL ) {
LocalFree( NetNameCompObjAccountDesc );
NetNameCompObjAccountDesc = NULL;
}
return(TRUE);
} // NetNameInit
VOID
NetNameCleanup(
VOID
)
/*++
Routine Description:
Process detach cleanup routine.
Arguments:
None.
Return Value:
None.
--*/
{
if (NetNameResourceMutex != NULL) {
CloseHandle(NetNameResourceMutex);
NetNameResourceMutex = NULL;
}
if ( NetNameWorkerTerminate ) {
CloseHandle( NetNameWorkerTerminate );
NetNameWorkerTerminate = NULL;
}
if ( NetNameWorkerPendingResources ) {
CloseHandle( NetNameWorkerPendingResources );
NetNameWorkerPendingResources = NULL;
}
} // NetNameCleanup
PNETNAME_RESOURCE
NetNameAllocateResource(
IN RESOURCE_HANDLE ResourceHandle
)
/*++
Routine Description:
Allocates a resource object.
Arguments:
ResourceHandle - A pointer to the Resource Monitor handle to be associated
with this resource.
Return Value:
A pointer to the new resource if successful. NULL otherwise.
--*/
{
PNETNAME_RESOURCE resource = NULL;
resource = LocalAlloc( LMEM_FIXED | LMEM_ZEROINIT, sizeof(NETNAME_RESOURCE) );
if (resource == NULL) {
(NetNameLogEvent)(ResourceHandle,
LOG_ERROR,
L"Resource allocation failed\n");
return(NULL);
}
resource->ResourceHandle = ResourceHandle;
return(resource);
} // NetNameAllocateResource
DWORD
NetNameCheckForCompObjRenameRecovery(
IN PNETNAME_RESOURCE Resource
)
/*++
Routine Description:
Using the Rename keys in the resource's GUID registry area, determine if a
rename operation was interrupted. All operations in this function center
around the Creating DC. If it is not available, we don't know the state of
the rename since the name could have been changed but the change hasn't
replicated to other DCs just yet. Consequently, the name will not go
online until netname can resolve the outcome of the rename.
If the object was renamed but the Name property wasn't updated, then the
object is renamed to be consistent with the current value of the Name
property.
Arguments:
Resource - pointer to netname resource context block/structure...
Return Value:
ERROR_SUCCESS if everything worked as expected.
--*/
{
LPWSTR originalName;
LPWSTR newName;
DWORD status;
DWORD functionStatus = ERROR_SUCCESS;
DWORD errorTextID;
WCHAR originalDollarName[ DNS_MAX_LABEL_BUFFER_LENGTH ];
WCHAR newDollarName[ DNS_MAX_LABEL_BUFFER_LENGTH ];
DWORD paramInError;
BOOL renameObject = FALSE;
USER_INFO_0 netUI0;
RESOURCE_HANDLE resourceHandle = Resource->ResourceHandle;
//
// read the rename keys from the regsitry
//
originalName = ResUtilGetSzValue( Resource->ResKey, PARAM_NAME__RENAMEORIGINALNAME );
if ( originalName == NULL ) {
status = GetLastError();
if ( status != ERROR_FILE_NOT_FOUND ) {
return status;
} else {
status = ERROR_SUCCESS;
}
}
newName = ResUtilGetSzValue( Resource->ResKey, PARAM_NAME__RENAMENEWNAME );
if ( newName == NULL ) {
status = GetLastError();
if ( status != ERROR_FILE_NOT_FOUND ) {
return status;
} else {
status = ERROR_SUCCESS;
}
}
if ( newName == NULL ) {
//
// never got far enough to do the rename. Clean up, if necessary, and
// return success
//
if ( originalName ) {
status = ClusterRegDeleteValue( Resource->ResKey, PARAM_NAME__RENAMEORIGINALNAME );
if ( status != ERROR_SUCCESS ) {
(NetNameLogEvent)(resourceHandle,
LOG_WARNING,
L"Failed to delete "
PARAM_NAME__RENAMEORIGINALNAME
L" from registry - status %1!u!\n",
status);
}
LocalFree( originalName );
}
return status;
}
(NetNameLogEvent)(resourceHandle,
LOG_INFORMATION,
L"Previous rename operation interrupted; attempting recovery.\n");
if ( originalName && newName ) {
HRESULT hr;
BOOL originalNameObjectExists;
BOOL newNameObjectExists;
//
// have to find which version of the object is in the DS to determine
// which name we're going to keep. Try the original name first
//
hr = IsComputerObjectInDS( resourceHandle,
Resource->NodeName,
originalName,
Resource->Params.CreatingDC,
&originalNameObjectExists,
NULL, // don't need FQDN
NULL); // don't need HostingDCName
if ( SUCCEEDED( hr )) {
if ( originalNameObjectExists ) {
//
// this means resmon croaked after writing the new name to the
// registry but before the rename was issued. We do nothing in
// this case.
//
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"The computer account (%1!ws!) for this resource is correct.\n",
originalName);
}
else {
//
// couldn't find an object with the original (old) name; try
// with the new name.
//
hr = IsComputerObjectInDS( resourceHandle,
Resource->NodeName,
newName,
Resource->Params.CreatingDC,
&newNameObjectExists,
NULL, // don't need FQDN
NULL); // don't need HostingDCName
if ( SUCCEEDED( hr )) {
if ( newNameObjectExists) {
//
// found the object with the new name so that means we
// renamed the object but resmon died before the Name
// property was updated. Make object name consistent
// with Name property
//
(NetNameLogEvent)(resourceHandle,
LOG_INFORMATION,
L"The computer account is currently %1!ws!. It will be"
L"renamed back to its original name (%2!ws!)\n",
newName,
originalName);
renameObject = TRUE;
}
else {
//
// this is bad; no object could be found for either
// the original or new name. Have to assume the admin
// deleted it.
//
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"The computer account for this resource cannot be found on DC "
L"%1!ws! during rename recovery. The original name (%2!ws!) was "
L"being renamed to %3!ws! and neither computer account "
L"could be found. The resource cannot go online until the "
L"object is recreated. This can be accomplished by disabling and "
L"re-enabling Kerberos Authentication for this resource.\n",
Resource->Params.CreatingDC,
originalName,
newName);
ClusResLogSystemEventByKey3(Resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_ONLINE_RENAME_RECOVERY_MISSING_ACCOUNT,
Resource->Params.CreatingDC,
originalName,
newName);
functionStatus = ERROR_DS_OBJ_NOT_FOUND;
}
}
else {
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"The AD search to find computer account %1!ws! on DC %2!ws! failed - "
L"status %3!08X!. The computer account for this resource was in the "
L"process of being renamed which did not complete. The account "
L"was being renamed on DC %2!ws! which appears to be unavailable "
L"or is preventing access in order to find the account. This DC must "
L"be made available before this resource can go online in order "
L"to reconcile the rename operation.\n",
newName,
Resource->Params.CreatingDC,
hr);
ClusResLogSystemEventByKeyData2(Resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_ONLINE_RENAME_DC_NOT_FOUND,
sizeof( hr ),
&hr,
newName,
Resource->Params.CreatingDC);
functionStatus = hr;
}
}
}
else {
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"The AD search to find computer account %1!ws! on DC %2!ws! failed - "
L"status %3!08X!. The computer account for this resource was in the "
L"process of being renamed which did not complete. The account was "
L"being renamed on DC %2!ws! which appears to be unavailable or is "
L"preventing access in order to find the account. This DC must be "
L"made available before this resource can go online in order to "
L"reconcile the rename operation.\n",
originalName,
Resource->Params.CreatingDC,
hr);
ClusResLogSystemEventByKeyData2(Resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_ONLINE_RENAME_DC_NOT_FOUND,
sizeof( hr ),
&hr,
originalName,
Resource->Params.CreatingDC);
functionStatus = hr;
}
}
else if ( originalName == NULL && newName ) {
if ( ClRtlStrICmp( newName, Resource->Params.NetworkName ) != 0 ) {
//
// made it through RenameComputerObject but crashed before Name
// property got stored. Change name of object back to Name
// property
//
renameObject = TRUE;
}
}
if ( renameObject ) {
//
// don't call RenameComputerObject to do the rename. In order to call
// it, we'd need to delete the Rename keys prior to the call. If
// resmon failed in between the delete and create of the keys, our
// Rename state would be lost. We don't try to fix up the DnsHostName
// attribute. It will be detected in Online that it is wrong and will
// be fixed up there.
//
//
// build the dollar sign names
//
originalDollarName[ COUNT_OF( originalDollarName ) - 1 ] = UNICODE_NULL;
_snwprintf( originalDollarName, COUNT_OF( originalDollarName ) - 1, L"%ws$", newName );
newDollarName[ COUNT_OF( newDollarName ) - 1 ] = UNICODE_NULL;
_snwprintf( newDollarName, COUNT_OF( newDollarName ) - 1, L"%ws$", Resource->Params.NetworkName );
(NetNameLogEvent)(resourceHandle,
LOG_INFORMATION,
L"Attempting rename of computer account %1!ws! to %2!ws! with DC %3!ws!.\n",
newName,
Resource->Params.NetworkName,
Resource->Params.CreatingDC);
netUI0.usri0_name = newDollarName;
status = NetUserSetInfo( Resource->Params.CreatingDC,
originalDollarName,
0,
(LPBYTE)&netUI0,
&paramInError);
if ( status == NERR_Success ) {
(NetNameLogEvent)(resourceHandle,
LOG_INFORMATION,
L"Renamed computer account from %1!ws! to %2!ws!.\n",
newName,
Resource->Params.NetworkName);
} else {
//
// "now this is fine situation you've gotten us into, Ollie."
//
// Failed to rename. Bail out of routine, leaving the Rename keys
// intact so it might work the next time once the problem
// (probably access to the object) is fixed.
//
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Failed to rename computer account %1!ws! to %2!ws! using DC %3!ws! "
L"(status %4!08X!).\n",
newName,
Resource->Params.NetworkName,
Resource->Params.CreatingDC,
status);
ClusResLogSystemEventByKeyData3(Resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_ONLINE_RENAME_RECOVERY_FAILED,
sizeof( status ),
&status,
newName,
Resource->Params.NetworkName,
Resource->Params.CreatingDC);
functionStatus = status;
goto cleanup;
}
}
//
// clean up Rename keys from registry
//
status = ClusterRegDeleteValue( Resource->ResKey, PARAM_NAME__RENAMEORIGINALNAME );
if ( status != ERROR_SUCCESS && status != ERROR_FILE_NOT_FOUND ) {
(NetNameLogEvent)(resourceHandle,
LOG_WARNING,
L"Failed to delete "
PARAM_NAME__RENAMEORIGINALNAME
L" from registry - status %1!u!\n",
status);
}
status = ClusterRegDeleteValue( Resource->ResKey, PARAM_NAME__RENAMENEWNAME );
if ( status != ERROR_SUCCESS && status != ERROR_FILE_NOT_FOUND ) {
(NetNameLogEvent)(resourceHandle,
LOG_WARNING,
L"Failed to delete "
PARAM_NAME__RENAMENEWNAME
L" from registry - status %1!u!\n",
status);
}
cleanup:
if ( newName != NULL ) {
LocalFree( newName );
}
if ( originalName != NULL ) {
LocalFree( originalName );
}
return functionStatus;
} // NetNameCheckForCompObjRenameRecovery
DWORD
NetNameGetParameters(
IN HKEY ResourceKey,
IN HKEY ParametersKey,
IN RESOURCE_HANDLE ResourceHandle,
OUT PNETNAME_PARAMS ParamBlock,
OUT DWORD * ResDataSize,
OUT DWORD * pdwFlags
)
/*++
Routine Description:
Reads the registry parameters for a netname resource.
Arguments:
ParametersKey - An open handle to the resource's parameters key.
ResourceHandle - The Resource Monitor handle associated with this resource.
ParamBlock - A pointer to a buffer into which to place the private properties read
from the registry
ResDataSize - A pointer to a buffer into which to place the number of bytes
pointed to by ParamBlock->ResourceData
pdwFlags - a pointer to a DWORD that receives the flags data. Used to store the
core resource flag.
Return Value:
ERROR_SUCCESS if the routine is successful.
A Win32 error code otherwise.
--*/
{
DWORD status;
DWORD bytesReturned;
//
// get the Flags parameter; hold core resource flag for cluster name
//
status = ResUtilGetDwordValue(ResourceKey,
PARAM_NAME__FLAGS,
pdwFlags,
0);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(ResourceHandle,
LOG_ERROR,
L"Unable to read Flags parameter, error=%1!u!\n",
status);
*pdwFlags = 0;
}
//
// Read the private parameters. always free the existing storage areas
//
if ( ParamBlock->NetworkName != NULL ) {
LocalFree( ParamBlock->NetworkName );
ParamBlock->NetworkName = NULL;
}
ParamBlock->NetworkName = ResUtilGetSzValue( ParametersKey, PARAM_NAME__NAME );
if (ParamBlock->NetworkName == NULL) {
status = GetLastError();
(NetNameLogEvent)(ResourceHandle,
LOG_WARNING,
L"Unable to read NetworkName parameter, error=%1!u!\n",
status);
goto error_exit;
}
status = ResUtilGetDwordValue(ParametersKey,
PARAM_NAME__REMAP,
&ParamBlock->NetworkRemap,
PARAM_DEFAULT__REMAP);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(ResourceHandle,
LOG_WARNING,
L"Unable to read NetworkRemap parameter, error=%1!u!\n",
status);
goto error_exit;
}
if ( ParamBlock->ResourceData != NULL ) {
LocalFree( ParamBlock->ResourceData );
ParamBlock->ResourceData = NULL;
}
//
// it is not fatal if this resource isn't in the registry. It will only
// have a value if RequireKerberos is set to one
//
status = ResUtilGetBinaryValue(ParametersKey,
PARAM_NAME__RESOURCE_DATA,
&ParamBlock->ResourceData,
ResDataSize);
if ( status != ERROR_SUCCESS ) {
(NetNameLogEvent)(ResourceHandle,
LOG_WARNING,
L"Unable to read ResourceData parameter, error=%1!u!\n",
status);
}
status = ResUtilGetDwordValue(ParametersKey,
PARAM_NAME__REQUIRE_DNS,
&ParamBlock->RequireDNS,
PARAM_DEFAULT__REQUIRE_DNS);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(ResourceHandle,
LOG_ERROR,
L"Unable to read RequireDNS parameter, error=%1!u!\n",
status);
goto error_exit;
}
status = ResUtilGetDwordValue(ParametersKey,
PARAM_NAME__REQUIRE_KERBEROS,
&ParamBlock->RequireKerberos,
PARAM_DEFAULT__REQUIRE_KERBEROS);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(ResourceHandle,
LOG_ERROR,
L"Unable to read RequireKerberos parameter, error=%1!u!\n",
status);
goto error_exit;
}
#ifdef PASSWORD_ROTATION
status = ResUtilGetBinaryValue(ParametersKey,
PARAM_NAME__NEXT_UPDATE,
(LPBYTE *)&ParamBlock->NextUpdate,
&bytesReturned);
if ( status != ERROR_SUCCESS ) {
(NetNameLogEvent)(ResourceHandle,
LOG_WARNING,
L"Unable to read NextUpdate parameter, error=%1!u!\n",
status);
}
status = ResUtilGetDwordValue(ParametersKey,
PARAM_NAME__UPDATE_INTERVAL,
&ParamBlock->UpdateInterval,
PARAM_DEFAULT__UPDATE_INTERVAL);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(ResourceHandle,
LOG_ERROR,
L"Unable to read UpdateInterval parameter, error=%1!u!\n",
status);
goto error_exit;
}
#endif // PASSWORD_ROTATION
if ( ParamBlock->CreatingDC != NULL ) {
LocalFree( ParamBlock->CreatingDC );
ParamBlock->CreatingDC = NULL;
}
//
// it is not fatal if this resource isn't in the registry. It will only
// have a value if RequireKerberos is set to one
//
ParamBlock->CreatingDC = ResUtilGetSzValue( ParametersKey, PARAM_NAME__CREATING_DC );
if (ParamBlock->CreatingDC == NULL) {
status = GetLastError();
(NetNameLogEvent)(ResourceHandle,
LOG_WARNING,
L"Unable to read CreatingDC parameter, error=%1!u!\n",
status);
status = ERROR_SUCCESS;
}
error_exit:
if (status != ERROR_SUCCESS) {
if (ParamBlock->NetworkName != NULL) {
LocalFree( ParamBlock->NetworkName );
ParamBlock->NetworkName = NULL;
}
if (ParamBlock->ResourceData != NULL) {
LocalFree( ParamBlock->ResourceData );
ParamBlock->ResourceData = NULL;
}
if ( ParamBlock->CreatingDC != NULL ) {
LocalFree( ParamBlock->CreatingDC );
ParamBlock->CreatingDC = NULL;
}
}
return(status);
} // NetNameGetParameters
#define TRANSPORT_BLOCK_SIZE 4
DWORD
GrowBlock(
PCHAR * Block,
DWORD UsedEntries,
DWORD BlockSize,
PDWORD FreeEntries
)
/*++
Routine Description:
Grow the specified block to hold more entries. Block might end up pointing
to different chunk of memory as a result
Arguments:
None
Return Value:
None
--*/
{
PVOID tmp;
tmp = LocalAlloc( LMEM_FIXED | LMEM_ZEROINIT,
(UsedEntries + TRANSPORT_BLOCK_SIZE) * BlockSize);
if (tmp == NULL) {
return ERROR_NOT_ENOUGH_MEMORY;
}
if (*Block != NULL) {
CopyMemory( tmp, *Block, UsedEntries * BlockSize );
LocalFree( *Block );
}
*Block = tmp;
*FreeEntries = TRANSPORT_BLOCK_SIZE;
return ERROR_SUCCESS;
} // GrowBlock
DWORD
UpdateDomainMapEntry(
PDOMAIN_ADDRESS_MAPPING DomainEntry,
LPWSTR IpAddress,
LPWSTR DomainName,
LPWSTR ConnectoidName,
DWORD DnsServerCount,
PDWORD DnsServerList
)
/*++
Routine Description:
Update the specified DomainMap entry by making copies of the supplied
parameters
Arguments:
None
Return Value:
None
--*/
{
//
// make copies of the address and domain and connectoid names
//
DomainEntry->IpAddress = ResUtilDupString ( IpAddress );
DomainEntry->DomainName = ResUtilDupString( DomainName );
DomainEntry->ConnectoidName = ResUtilDupString( ConnectoidName );
if ( DomainEntry->IpAddress == NULL
||
DomainEntry->DomainName == NULL
||
DomainEntry->ConnectoidName == NULL )
{
if ( DomainEntry->IpAddress != NULL ) {
LocalFree( DomainEntry->IpAddress );
}
if ( DomainEntry->DomainName != NULL ) {
LocalFree( DomainEntry->DomainName );
}
if ( DomainEntry->ConnectoidName != NULL ) {
LocalFree( DomainEntry->ConnectoidName );
}
return ERROR_NOT_ENOUGH_MEMORY;
}
//
// make a copy of the DNS server addresses to use when registering
//
if ( DnsServerCount > 0 ) {
DomainEntry->DnsServerList = LocalAlloc(LMEM_FIXED | LMEM_ZEROINIT,
sizeof( IP4_ARRAY ) +
(sizeof(IP4_ADDRESS) * (DnsServerCount - 1)));
if ( DomainEntry->DnsServerList == NULL ) {
LocalFree( DomainEntry->IpAddress );
LocalFree( DomainEntry->DomainName );
LocalFree( DomainEntry->ConnectoidName );
return ERROR_NOT_ENOUGH_MEMORY;
}
DomainEntry->DnsServerList->AddrCount = DnsServerCount;
RtlCopyMemory(DomainEntry->DnsServerList->AddrArray,
DnsServerList,
DnsServerCount * sizeof( IP4_ADDRESS ));
} else {
DomainEntry->DnsServerList = NULL;
}
return ERROR_SUCCESS;
} // UpdateDomainMapEntry
DWORD
NetNameGetLists(
IN PNETNAME_RESOURCE Resource,
IN PCLRTL_NET_ADAPTER_ENUM AdapterEnum OPTIONAL,
OUT LPWSTR ** TransportList,
OUT LPDWORD TransportCount,
OUT PDOMAIN_ADDRESS_MAPPING * DomainMapList OPTIONAL,
OUT LPDWORD DomainMapCount OPTIONAL
)
/*++
Build a list of NetBT transports, IP addresses, and Domain names on which
this name is dependent. The transport devices are used to register NETBios
names while the IP addresses and Domain Names are used if the adapter
associated with the IP address is the member of a DNS domain. Each IP
address can have a different domain name associated with it hence the need
to maintain a separate list.
--*/
{
DWORD status;
HRESOURCE providerHandle = NULL;
HKEY providerKey = NULL;
HRESENUM resEnumHandle = NULL;
DWORD i;
DWORD objectType;
DWORD providerNameSize = 0;
LPWSTR providerName = NULL;
LPWSTR providerType = NULL;
DWORD transportFreeEntries = 0;
LPWSTR * transportList = NULL;
DWORD transportCount = 0;
LPWSTR transportName = NULL;
HCLUSTER clusterHandle = NULL;
DWORD enableNetbios;
PDOMAIN_ADDRESS_MAPPING domainMapList = NULL;
DWORD domainMapCount = 0;
DWORD domainMapFreeEntries = 0;
LPWSTR ipAddress;
PCLRTL_NET_ADAPTER_INFO adapterInfo;
PCLRTL_NET_INTERFACE_INFO interfaceInfo;
WCHAR primaryDomain[ DNS_MAX_NAME_BUFFER_LENGTH ] = { 0 };
DWORD primaryDomainSize = DNS_MAX_NAME_BUFFER_LENGTH;
//
// get the node's primary domain name, if any. Domains with only NT4 DCs
// won't necessarily have a PDN
//
if ( !GetComputerNameEx(ComputerNamePhysicalDnsDomain,
primaryDomain,
&primaryDomainSize))
{
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_WARNING,
L"Unable to get primary domain name, status %1!u!.\n",
status
);
primaryDomainSize = 0;
}
//
// Open a handle to the cluster.
//
clusterHandle = OpenCluster(NULL);
if (clusterHandle == NULL) {
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to open handle to cluster, status %1!u!.\n",
status
);
goto error_exit;
}
//
// Enumerate the dependencies to find the IP Addresses
//
resEnumHandle = ClusterResourceOpenEnum(
Resource->ClusterResourceHandle,
CLUSTER_RESOURCE_ENUM_DEPENDS
);
if (resEnumHandle == NULL) {
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to open enum handle for this resource, status %1!u!.\n",
status
);
goto error_exit;
}
//
// enum all the dependent resources for this netname resource
//
for (i=0; ;i++) {
status = ClusterResourceEnum(
resEnumHandle,
i,
&objectType,
providerName,
&providerNameSize
);
if (status == ERROR_NO_MORE_ITEMS) {
break;
}
if ((status == ERROR_MORE_DATA) ||
((status == ERROR_SUCCESS) && (providerName == NULL))) {
if (providerName != NULL) {
LocalFree( providerName );
}
providerNameSize++;
providerName = LocalAlloc( LMEM_FIXED, providerNameSize * sizeof(WCHAR) );
if (providerName == NULL) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
status = ERROR_NOT_ENOUGH_MEMORY;
goto error_exit;
}
status = ClusterResourceEnum(
resEnumHandle,
i,
&objectType,
providerName,
&providerNameSize
);
ASSERT(status != ERROR_MORE_DATA);
}
if (status != ERROR_SUCCESS) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to enumerate resource dependencies, status %1!u!.\n",
status
);
goto error_exit;
}
//
// Open the resource
//
providerHandle = OpenClusterResource(clusterHandle, providerName);
if (providerHandle == NULL) {
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to open handle to provider resource %1!ws!, status %2!u!.\n",
providerName,
status
);
goto error_exit;
}
//
// Figure out what type it is.
//
providerKey = GetClusterResourceKey(providerHandle, KEY_READ);
status = GetLastError();
CloseClusterResource(providerHandle);
if (providerKey == NULL) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to open provider resource key, status %1!u!.\n",
status
);
goto error_exit;
}
providerType = ResUtilGetSzValue(providerKey, CLUSREG_NAME_RES_TYPE);
if (providerType == NULL) {
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to get provider resource type, status %1!u!.\n",
status
);
goto error_exit;
}
//
// make sure it's an IP address resource
//
if (wcscmp(providerType, IP_ADDRESS_RESOURCETYPE_NAME) == 0) {
HKEY parametersKey;
//
// Open the provider's parameters key.
//
status = ClusterRegOpenKey(
providerKey,
CLUSREG_KEYNAME_PARAMETERS,
KEY_READ,
&parametersKey
);
if (status != ERROR_SUCCESS) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to open provider's parameters key, status %1!u!.\n",
status
);
goto error_exit;
}
if ( ARGUMENT_PRESENT( DomainMapList )) {
ASSERT( ARGUMENT_PRESENT( DomainMapCount ));
ASSERT( ARGUMENT_PRESENT( AdapterEnum ));
//
// build a list of IP address strings that we can use for
// building the appropriate DNS records
//
ipAddress = ResUtilGetSzValue( parametersKey, CLUSREG_NAME_IPADDR_ADDRESS );
if (ipAddress == NULL) {
status = GetLastError();
ClusterRegCloseKey(parametersKey);
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to get provider's Address value, status %1!u!.\n",
status
);
goto error_exit;
}
//
// find the corresponding adapter/interface over which packets
// for this IP address would be sent. Get the domain name (if
// any) from the adapter info.
//
adapterInfo = ClRtlFindNetAdapterByInterfaceAddress(
AdapterEnum,
ipAddress,
&interfaceInfo);
if ( adapterInfo != NULL ) {
LPWSTR deviceGuid;
DWORD guidLength;
//
// argh. DeviceGuid is not bracketed by braces which the
// following Dns routines require. Dup the string and make
// it all nice and pretty for DNS.
//
guidLength = wcslen( adapterInfo->DeviceGuid );
deviceGuid = LocalAlloc( LMEM_FIXED, (guidLength + 3) * sizeof(WCHAR) );
if ( deviceGuid == NULL ) {
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
goto error_exit;
}
deviceGuid[0] = L'{';
wcscpy( &deviceGuid[1], adapterInfo->DeviceGuid );
wcscpy( &deviceGuid[ guidLength + 1 ], L"}" );
//
// see if dynamic DNS is enabled for this adapter and that
// they are DNS servers associated with this adapter. Bail
// if not. This check corresponds to the "register this
// connection's addresses in DNS" checkbox in the DNS
// proppage in the advanced TCP properties
//
if ( DnsIsDynamicRegistrationEnabled( deviceGuid ) &&
adapterInfo->DnsServerCount > 0)
{
//
// set up a mapping with the Primary Domain Name if
// apropriate
//
if ( primaryDomainSize != 0 ) {
if (domainMapFreeEntries == 0) {
status = GrowBlock((PCHAR *)&domainMapList,
domainMapCount,
sizeof( *domainMapList ),
&domainMapFreeEntries);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
goto error_exit;
}
}
//
// make copies of the address and name
//
status = UpdateDomainMapEntry(&domainMapList[ domainMapCount ],
ipAddress,
primaryDomain,
adapterInfo->ConnectoidName,
adapterInfo->DnsServerCount,
adapterInfo->DnsServerList);
if ( status != ERROR_SUCCESS ) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
goto error_exit;
}
domainMapCount++;
domainMapFreeEntries--;
}
//
// now check if we should care about the adapter
// specific name. It must be different from the
// primary domain name and have the "use this
// connection's DNS suffix" checkbox checked.
//
if ( DnsIsAdapterDomainNameRegistrationEnabled( deviceGuid ) &&
adapterInfo->AdapterDomainName != NULL &&
ClRtlStrICmp(adapterInfo->AdapterDomainName, primaryDomain) != 0)
{
if (domainMapFreeEntries == 0) {
status = GrowBlock((PCHAR *)&domainMapList,
domainMapCount,
sizeof( *domainMapList ),
&domainMapFreeEntries);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
goto error_exit;
}
}
//
// make copies of the address and name
//
status = UpdateDomainMapEntry(&domainMapList[ domainMapCount ],
ipAddress,
adapterInfo->AdapterDomainName,
adapterInfo->ConnectoidName,
adapterInfo->DnsServerCount,
adapterInfo->DnsServerList);
if ( status != ERROR_SUCCESS ) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
goto error_exit;
}
domainMapCount++;
domainMapFreeEntries--;
} // if register adapter domain is true and one has been specified
} // if dynamic DNS is enabled for this adapter
LocalFree( deviceGuid );
} // if we found the matching adapter in our adapter info
LocalFree( ipAddress );
} // if DomainMapList present
//
// Figure out if this resource supports NetBios.
//
status = ResUtilGetDwordValue(
parametersKey,
CLUSREG_NAME_IPADDR_ENABLE_NETBIOS,
&enableNetbios,
1
);
if (status != ERROR_SUCCESS) {
ClusterRegCloseKey(parametersKey);
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to get provider's EnableNetbios value, status %1!u!.\n",
status
);
goto error_exit;
}
if (enableNetbios) {
HKEY nodeParametersKey;
//
// Open the provider's node-specific parameters key.
//
status = ClusterRegOpenKey(
parametersKey,
Resource->NodeId,
KEY_READ,
&nodeParametersKey
);
ClusterRegCloseKey(parametersKey);
if (status != ERROR_SUCCESS) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to open provider's node parameters key, status %1!u!.\n",
status
);
goto error_exit;
}
transportName = ResUtilGetSzValue(
nodeParametersKey,
L"NbtDeviceName"
);
status = GetLastError();
ClusterRegCloseKey(nodeParametersKey);
if (transportName == NULL) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to get provider's transport name, status %1!u!.\n",
status
);
goto error_exit;
}
if (transportFreeEntries == 0) {
status = GrowBlock((PCHAR *)&transportList,
transportCount,
sizeof( *transportList ),
&transportFreeEntries);
if ( status != ERROR_SUCCESS) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
goto error_exit;
}
}
transportList[transportCount] = transportName;
transportName = NULL;
transportCount++;
transportFreeEntries--;
}
else {
ClusterRegCloseKey(parametersKey);
}
}
ClusterRegCloseKey(providerKey);
providerKey = NULL;
LocalFree( providerType );
providerType = NULL;
}
if (providerName != NULL) {
LocalFree( providerName );
providerName = NULL;
}
CloseCluster(clusterHandle);
ClusterResourceCloseEnum(resEnumHandle);
*TransportList = transportList;
*TransportCount = transportCount;
if ( ARGUMENT_PRESENT( DomainMapList )) {
*DomainMapList = domainMapList;
*DomainMapCount = domainMapCount;
}
return(ERROR_SUCCESS);
error_exit:
if (transportList != NULL) {
ASSERT(transportCount > 0);
while (transportCount > 0) {
LocalFree( transportList[--transportCount] );
}
LocalFree( transportList );
}
if ( domainMapList != NULL ) {
while (domainMapCount--) {
if ( domainMapList[ domainMapCount ].IpAddress != NULL ) {
LocalFree( domainMapList[ domainMapCount ].IpAddress );
}
if ( domainMapList[ domainMapCount ].DomainName != NULL ) {
LocalFree( domainMapList[ domainMapCount ].DomainName );
}
if ( domainMapList[ domainMapCount ].DnsServerList != NULL ) {
LocalFree( domainMapList[ domainMapCount ].DnsServerList );
}
}
LocalFree( domainMapList );
}
if (clusterHandle != NULL) {
CloseCluster(clusterHandle);
}
if (resEnumHandle != NULL) {
ClusterResourceCloseEnum(resEnumHandle);
}
if (providerName != NULL) {
LocalFree( providerName );
}
if (providerKey != NULL) {
ClusterRegCloseKey(providerKey);
}
if (providerType != NULL) {
LocalFree( providerType );
}
if (transportName != NULL) {
LocalFree( transportName );
}
return(status);
} // NetNameGetLists
void
FreeDNSRecordpName(PDNS_RECORDW DnsRecord)
{
PDNS_RECORDW Next;
//
// Rui: 02/24/2002
// BUG: 553148. DnsRecord->pName is allocated using LocalAlloc(),
// (DnsRecordBuild_W()). While DnsRecordListFree() uses HeapFree().
// This fix is a work around. MSDN suggests using DnsQuery(), instead of
// unpublished DnsRecordBuild_W().
//
Next = DnsRecord;
while (Next != NULL)
{
if (Next->pName != NULL)
{
LocalFree(Next->pName);
}
Next->pName = NULL;
Next = Next->pNext;
}
}
void
FreeDNSRecordPTRpNameHost(PDNS_RECORDW DnsRecord)
{
PDNS_RECORDW Next;
//
// Rui: 02/24/2002
// BUG: 553148. DnsRecord->Data.PTR.pNameHost is allocated using LocalAlloc(),
// (DnsRecordBuild_W()). While DnsRecordListFree() uses HeapFree().
// This fix is a work around. MSDN suggests using DnsQuery(), instead of
// unpublished DnsRecordBuild_W().
//
Next = DnsRecord;
while (Next != NULL)
{
if ( Next->Data.PTR.pNameHost != NULL )
{
LocalFree( Next->Data.PTR.pNameHost );
}
Next->Data.PTR.pNameHost = NULL;
Next = Next->pNext;
}
}
VOID
NetNameCleanupDnsLists(
IN PNETNAME_RESOURCE Resource
)
/*++
Routine Description:
Clean up the DNS list structures associated with the resource.
Arguments:
Resource - pointer to internal resource struct
Return Value:
None
--*/
{
PDNS_LISTS dnsLists;
DNS_STATUS dnsStatus;
PDNS_RECORD dnsRecord;
dnsLists = Resource->DnsLists;
while ( Resource->NumberOfDnsLists-- ) {
#if 0
//
// we have to free the args we handed to the DNS record build routines
//
dnsRecord = dnsLists->A_RRSet.pFirstRR;
while ( dnsRecord != NULL ) {
LocalFree( dnsRecord->pName );
dnsRecord->pName = NULL;
dnsRecord = dnsRecord->pNext;
}
dnsRecord = dnsLists->PTR_RRSet.pFirstRR;
while ( dnsRecord != NULL ) {
LocalFree( dnsRecord->Data.PTR.pNameHost );
dnsRecord->Data.PTR.pNameHost = NULL;
dnsRecord = dnsRecord->pNext;
}
#endif
//
// have DNSAPI clean up its structs
//
//
// BUG: 553148. Rui, 02/24/2002.
//
FreeDNSRecordpName(dnsLists->PTR_RRSet.pFirstRR);
FreeDNSRecordPTRpNameHost(dnsLists->PTR_RRSet.pFirstRR);
DnsRecordListFree( dnsLists->PTR_RRSet.pFirstRR, DnsFreeRecordListDeep );
FreeDNSRecordpName(dnsLists->A_RRSet.pFirstRR);
DnsRecordListFree( dnsLists->A_RRSet.pFirstRR, DnsFreeRecordListDeep );
//
// free server address info and connectoid name string
//
if ( dnsLists->DnsServerList != NULL ) {
LocalFree( dnsLists->DnsServerList );
}
if ( dnsLists->ConnectoidName != NULL ) {
LocalFree( dnsLists->ConnectoidName );
}
++dnsLists;
}
Resource->NumberOfDnsLists = 0;
if ( Resource->DnsLists != NULL ) {
LocalFree( Resource->DnsLists );
Resource->DnsLists = NULL;
}
} // NetNameCleanupDnsLists
VOID
NetNameOfflineNetbios(
IN PNETNAME_RESOURCE Resource
)
/*++
Routine Description:
do final clean up when taking this resource offline.
Arguments:
Resource - A pointer to the NETNAME_RESOURCE block for this resource.
Returns:
None.
--*/
{
DWORD status;
DWORD i;
LPWSTR * transportList = NULL;
DWORD transportCount = 0;
LPWSTR domainName = NULL;
//
// Now we can finally do the real work of taking the netbios name
// offline. Get the domain name so we can deregister the extra credentials
// with kerberos
//
if ( Resource->Params.CreatingDC ) {
domainName = wcschr( Resource->Params.CreatingDC, L'.' );
if ( domainName != NULL ) {
++domainName;
}
}
DeleteAlternateComputerName(Resource->Params.NetworkName,
domainName,
Resource->NameHandleList,
Resource->NameHandleCount,
Resource->ResourceHandle);
if (Resource->NameHandleList != NULL) {
LocalFree( Resource->NameHandleList );
Resource->NameHandleList = NULL;
Resource->NameHandleCount = 0;
}
//
// Remove the cluster service type bits
//
status = NetNameGetLists(Resource,
NULL,
&transportList,
&transportCount,
NULL,
NULL);
if (status == ERROR_SUCCESS) {
DWORD serviceBits;
serviceBits = SV_TYPE_CLUSTER_VS_NT | SV_TYPE_CLUSTER_NT;
for (i=0; i<transportCount; i++) {
I_NetServerSetServiceBitsEx(NULL, // target server
Resource->Params.NetworkName, // emulated server name
transportList[i], // transport name
serviceBits, // bits of interest
0, // bits
TRUE ); // Update immediately
}
while (transportCount > 0) {
LocalFree( transportList[--transportCount] );
}
LocalFree( transportList );
}
} // NetNameOfflineNetbios
DWORD
NetNameOnlineThread(
IN PCLUS_WORKER Worker,
IN PNETNAME_RESOURCE Resource
)
/*++
Routine Description:
Brings a network name resource online.
Arguments:
Worker - Supplies the worker structure
Resource - A pointer to the NETNAME_RESOURCE block for this resource.
Returns:
ERROR_SUCCESS if successful.
Win32 error code on failure.
--*/
{
DWORD status;
CLUSTER_RESOURCE_STATE finalState = ClusterResourceFailed;
LPWSTR * transportList = NULL;
DWORD transportCount = 0;
PDOMAIN_ADDRESS_MAPPING domainMapList = NULL;
DWORD domainMapCount = 0;
DWORD i;
DWORD dwFlags;
PCLRTL_NET_ADAPTER_ENUM adapterEnum = NULL;
RESOURCE_STATUS resourceStatus;
DWORD serviceBits;
ResUtilInitializeResourceStatus( &resourceStatus );
ASSERT(Resource->State == ClusterResourceOnlinePending);
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_INFORMATION,
L"Bringing resource online...\n"
);
//
// If this is the first resource to be brought online then spin up the DNS
// check thread at this point
//
NetNameAcquireResourceLock();
if ( NetNameWorkerThread == NULL ) {
NetNameWorkerThread = CreateThread(NULL,
0,
NetNameWorker,
NULL,
0,
NULL);
if ( NetNameWorkerThread == NULL ) {
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Can't start Netname worker thread. status = %1!u!\n",
status
);
NetNameReleaseResourceLock();
goto error_exit;
}
}
NetNameReleaseResourceLock();
//
// initialize the checkpoint var that is used to communicate back to
// resmon that we're still working on bringing the resource online
//
Resource->StatusCheckpoint = 0;
//
// notify the worker thread that we're bringing a name online.
//
SetEvent( NetNameWorkerPendingResources );
//
// This is an old comment but I'm leaving it in. Netname does handle set
// private props but there are other issues.
//
// This read must continue to be here as long as adminstrative agents
// (like cluster.exe) continue to write to the registry behind the back of
// the resource dll. We need to migrate to writing all registry parameters
// via the SET_COMMON/PRIVATE_PROPERTIES control function. That way,
// resource dll's can read their parameters in the open (allowing for the
// possibility that they may fail), and then update the parameters
// whenever the SET_PRIVATE_PROPERTIES control code is delivered and
// (optionally) on the SET_COMMON_PROPERTIES as needed.
//
// Fetch our parameters from the registry.
//
status = NetNameGetParameters(
Resource->ResKey,
Resource->ParametersKey,
Resource->ResourceHandle,
&Resource->Params,
&Resource->ResDataSize,
&Resource->dwFlags
);
if (status != ERROR_SUCCESS) {
goto error_exit;
}
if ( Resource->Params.NetworkName == NULL ) {
status = ERROR_RESOURCE_NOT_FOUND;
goto error_exit;
}
//
// if we just went through an upgrade and this resource is a provider for
// an MSMQ resource, then we need to force kerb support
//
if ( Resource->CheckForKerberosUpgrade ) {
Resource->CheckForKerberosUpgrade = FALSE;
status = UpgradeMSMQDependentNetnameToKerberos( Resource );
if ( status != ERROR_SUCCESS ) {
(NetNameLogEvent)( Resource->ResourceHandle,
LOG_ERROR,
L"Unable to set RequireKerberos property after an upgrade - status %1!u!. "
L"This resource requires that the RequireKerberos property be set to "
L"one in order for its dependent MSMQ resource to be successfully "
L"brought online.\n",
status);
ClusResLogSystemEventByKeyData(Resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_UPGRADE_TO_KERBEROS_SUPPORT_FAILED,
sizeof( status ),
&status);
goto error_exit;
}
}
//
// check to see if recovery from a half-baked rename is needed
//
if ( Resource->Params.CreatingDC ) {
status = NetNameCheckForCompObjRenameRecovery( Resource );
if ( status != ERROR_SUCCESS ) {
goto error_exit;
}
}
//
// Ensure that the specified network name is not the same as the
// computername of this node.
//
if ( lstrcmpiW(Resource->Params.NetworkName, Resource->NodeName) == 0 ) {
ClusResLogSystemEventByKey1(Resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_DUPLICATE,
Resource->Params.NetworkName);
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"The specified network name is the same as the local computername.\n"
);
status = ERROR_DUP_NAME;
goto error_exit;
}
//
// get the adapter configuration and determine which adapters are
// participating in a DNS domain
//
adapterEnum = ClRtlEnumNetAdapters();
if ( adapterEnum == NULL ) {
status = GetLastError();
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Couldn't acquire network adapter configuration, status %1!u!\n",
status
);
goto error_exit;
}
//
// Search our dependencies and return the list of NBT devices to which we
// need to bind the server. Also get the IP addresses this resource
// depends on so we can publish them in DNS.
//
status = NetNameGetLists(
Resource,
adapterEnum,
&transportList,
&transportCount,
&domainMapList,
&domainMapCount
);
if (status != ERROR_SUCCESS) {
goto error_exit;
}
//
// transportCount could be zero in the case where NetBIOS names are turned
// off for all IP addr resources. In any case, a network name must have at
// least one IP address associated with it.
//
if (( transportCount + domainMapCount ) == 0 ) {
ClusResLogSystemEventByKey(Resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_NO_IP_ADDRESS);
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"This resource is configured such that its name will not be registered "
L"with a name service or it could not be registered with either "
L"NetBIOS or a DNS name server at this time. This condition prevents "
L"the resource from changing its state to online.\n"
);
status = ERROR_DEPENDENCY_NOT_FOUND;
goto error_exit;
}
if ( transportCount > 0 ) {
//
// Allocate an array to hold the handles for the registered name
//
Resource->NameHandleList = LocalAlloc(
LMEM_FIXED | LMEM_ZEROINIT,
sizeof(HANDLE) * transportCount
);
if (Resource->NameHandleList == NULL) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory for name registration.\n"
);
goto error_exit;
}
}
Resource->NameHandleCount = transportCount;
//
// if we have DNS related data from a previous online, free it up now
// since AddAlternateComputerName will be reconstructing with current
// info. DnsLists is synchronized with offline worker thread since
// offline doesn't report offline complete until RemoveDnsRecords has
// completed.
//
if ( Resource->DnsLists != NULL ) {
NetNameCleanupDnsLists( Resource );
}
//
// Add the name/transport combinations.
//
status = AddAlternateComputerName(
Worker,
Resource,
transportList,
transportCount,
domainMapList,
domainMapCount
);
if (status != NERR_Success) {
NetNameOfflineNetbios( Resource );
//
// don't need to synchronize with worker thread since it only checks
// online resources
//
NetNameCleanupDnsLists( Resource );
goto error_exit;
}
finalState = ClusterResourceOnline;
//
// set the appropriate service type bit(s) for this name. core cluster
// name resource additionally gets the cluster bit.
//
serviceBits = SV_TYPE_CLUSTER_VS_NT;
if (Resource->dwFlags & CLUS_FLAG_CORE) {
serviceBits |= SV_TYPE_CLUSTER_NT;
}
for (i=0; i<transportCount; i++) {
I_NetServerSetServiceBitsEx(NULL, // Local server serv
Resource->Params.NetworkName,
transportList[i], //transport name
serviceBits,
serviceBits,
TRUE ); // Update immediately
}
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_INFORMATION,
L"Network Name %1!ws! is now online\n",
Resource->Params.NetworkName
);
error_exit:
if ( status != ERROR_SUCCESS ) {
if ( Resource->NameHandleList != NULL ) {
LocalFree( Resource->NameHandleList );
Resource->NameHandleList = NULL;
Resource->NameHandleCount = 0;
}
}
if (transportList != NULL) {
ASSERT(transportCount > 0);
while (transportCount > 0) {
LocalFree( transportList[--transportCount] );
}
LocalFree( transportList );
}
if (domainMapList != NULL) {
while (domainMapCount--) {
LocalFree( domainMapList[domainMapCount].IpAddress );
LocalFree( domainMapList[domainMapCount].DomainName );
LocalFree( domainMapList[domainMapCount].ConnectoidName );
if ( domainMapList[domainMapCount].DnsServerList != NULL ) {
LocalFree( domainMapList[domainMapCount].DnsServerList );
}
}
LocalFree( domainMapList );
}
if ( adapterEnum != NULL ) {
ClRtlFreeNetAdapterEnum( adapterEnum );
}
ASSERT(Resource->State == ClusterResourceOnlinePending);
//
// set the final state accordingly. We acquire the lock to synch with the
// worker thread
//
NetNameAcquireResourceLock();
Resource->State = finalState;
resourceStatus.ResourceState = finalState;
NetNameReleaseResourceLock();
(NetNameSetResourceStatus)( Resource->ResourceHandle, &resourceStatus );
return(status);
} // NetNameOnlineThread
DWORD
WINAPI
NetNameOfflineWorker(
IN PNETNAME_RESOURCE Resource,
IN BOOL Terminate,
IN PCLUS_WORKER Worker OPTIONAL
)
/*++
Routine Description:
Internal offline routine for Network Name resource. This routine is called
by both the offline and terminate routines. Terminate calls it directly
with Worker set to NULL, while Offline spins a worker thread and then has
the worker thread call it.
If terminate is true, we bag any long running operations like removing DNS
records. We'll figure out how to deal with the resource's carcass the next
time it is brought online.
Arguments:
Resource - supplies the resource it to be taken offline
Terminate - indicates whether call is result of NetNameTerminate or NetNameOffline
Worker - pointer to cluster work thread struct. NULL if called by Terminate
Return Value:
None.
--*/
{
DWORD status = ERROR_SUCCESS;
BOOL nameChanged = FALSE;
//
// Terminate any pending thread if it is running.
//
if ( Terminate ) {
ClusWorkerTerminate(&(Resource->PendingThread));
}
//
// Synchronize offline/terminate and worker thread
//
NetNameAcquireResourceLock();
if (Resource->State != ClusterResourceOffline) {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_INFORMATION,
L"Offline of resource continuing...\n"
);
Resource->State = ClusterResourceOfflinePending;
NetNameOfflineNetbios( Resource );
if ( Resource->RefCount > 1 ) {
//
// DNS registration is still in progress. If we don't synchronize
// with the worker thread, then it is possible to delete the
// resource while the worker routine still had a pointer to the
// freed memory. kaboom....
//
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"Waiting for Worker thread operation to finish\n");
status = ERROR_IO_PENDING;
}
if ( status == ERROR_SUCCESS ) {
if ( !Terminate ) {
//
// If the name was changed while we were still online, do the
// appropriate clean up after we release the netname lock. We
// have to maintain a reference since a delete can be issued
// after the resource has gone offline.
//
if ( Resource->NameChangedWhileOnline ) {
++Resource->RefCount;
nameChanged = TRUE;
Resource->NameChangedWhileOnline = FALSE;
}
}
Resource->State = ClusterResourceOffline;
}
}
else {
(NetNameLogEvent)(
Resource->ResourceHandle,
LOG_INFORMATION,
L"Resource is already offline.\n"
);
}
//
// release VS token
//
if ( Resource->VSToken ) {
CloseHandle( Resource->VSToken );
Resource->VSToken = NULL;
}
NetNameReleaseResourceLock();
if ( !Terminate ) {
RESOURCE_STATUS resourceStatus;
if ( nameChanged ) {
//
// we're not terminating the resource and we need to do some
// cleanup work. Before each major operation, check if we need to
// get out due to our Terminate routine being called.
//
if ( !ClusWorkerCheckTerminate( Worker )) {
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"Attempting removal of DNS records\n");
RemoveDnsRecords( Resource );
}
NetNameAcquireResourceLock();
--Resource->RefCount;
ASSERT( Resource->RefCount >= 0 );
if ( Resource->RefCount == 0 ) {
NetNameReleaseResource( Resource );
}
NetNameReleaseResourceLock();
}
//
// report we're offline here; any sooner and RemoveDnsRecords and the
// online thread could collide and cause bad things to happen
//
ResUtilInitializeResourceStatus( &resourceStatus );
resourceStatus.ResourceState = ClusterResourceOffline;
(NetNameSetResourceStatus)( Resource->ResourceHandle, &resourceStatus );
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"Resource is now offline\n");
}
return status;
} // NetNameOfflineWorker
DWORD
NetNameOfflineThread(
IN PCLUS_WORKER Worker,
IN PNETNAME_RESOURCE Resource
)
/*++
Routine Description:
stub routine to call common offline routine used by both terminate and
offline
Arguments:
Worker - pointer to cluster work thread
Resource - pointer to netname resource context block that is going offline
Return Value:
None
--*/
{
DWORD status;
//
// notify the worker thread that we're bringing a name offline.
//
SetEvent( NetNameWorkerPendingResources );
status = NetNameOfflineWorker( Resource, FALSE, Worker );
return status;
} // NetNameOfflineThread
DWORD
RemoveDependentIpAddress(
PNETNAME_RESOURCE Resource,
LPWSTR DependentResourceId
)
/*++
Routine Description:
A dependent IP address resource is being removed. Delete the associated
DNS records for this address and the netbt device.
Arguments:
Resource - pointer to private netname resource data
DependentResourceId - pointer to Unicode string of dependent resource's name
Return Value:
None
--*/
{
HCLUSTER clusterHandle;
HRESOURCE ipResourceHandle = NULL;
RESOURCE_HANDLE resourceHandle = Resource->ResourceHandle;
DWORD status;
HKEY ipResourceKey;
HKEY parametersKey;
LPWSTR reverseName;
PDNS_LISTS dnsList;
DWORD numberOfDnsLists = Resource->NumberOfDnsLists;
LPWSTR ipAddressBuffer;
IP4_ADDRESS ipAddress;
UNICODE_STRING ipAddressStringW;
ANSI_STRING ipAddressStringA;
//
// work our way through the miriad of Cluster APIs to read the IP address
// resource's address from the registry
//
clusterHandle = OpenCluster(NULL);
if (clusterHandle != NULL) {
ipResourceHandle = OpenClusterResource( clusterHandle, DependentResourceId );
CloseCluster( clusterHandle );
if ( ipResourceHandle != NULL ) {
ipResourceKey = GetClusterResourceKey( ipResourceHandle, KEY_READ );
CloseClusterResource( ipResourceHandle );
if ( ipResourceKey != NULL ) {
status = ClusterRegOpenKey(ipResourceKey,
CLUSREG_KEYNAME_PARAMETERS,
KEY_READ,
&parametersKey);
ClusterRegCloseKey( ipResourceKey );
if (status == ERROR_SUCCESS) {
ipAddressBuffer = ResUtilGetSzValue( parametersKey, CLUSREG_NAME_IPADDR_ADDRESS );
ClusterRegCloseKey( parametersKey );
if (ipAddressBuffer == NULL) {
status = GetLastError();
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Unable to get resource's Address value for resource "
L"'%1!ws!', status %2!u!.\n",
DependentResourceId,
status);
return status;
}
} else {
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Unable to open parameters key for resource '%1!ws!', "
L"status %2!u!.\n",
DependentResourceId,
status);
return status;
}
} else {
status = GetLastError();
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Unable to obtain registry key to resource '%1!ws!', "
L"status %2!u!.\n",
DependentResourceId,
status);
return status;
}
} else {
status = GetLastError();
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Unable to open handle to resource '%1!ws!', status %2!u!.\n",
DependentResourceId,
status);
return status;
}
} else {
status = GetLastError();
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Unable to open handle to cluster, status %1!u!.\n",
status);
return status;
}
//
// argh. dependencies can be removed while the two resources are in a
// stable state, i.e., not pending. Furthermore, the remove dependency
// control is issued to all nodes in the cluster (double argh). This
// really complicates matters since we're not tracking add dependency
// which means we potentially don't have current DNS data on all nodes
// except for the one that owns the resource. Consequently, if all nodes
// handle the remove then we may use stale DNS info and remove the wrong
// records at the server.
//
// Since this is our only chance to clean up PTR records at the server
// (due to the fact that the PTR logic uses ModifyRecordSet instead of
// ReplaceRecordSet), we can only process this request on a node where the
// resource is online (along with the fact that if the resource is online,
// then its DNS lists are correct). This is sort of ok since the resource
// will either 1) go online again at which point the DNS A records will be
// corrected at the server or 2) the resource will be deleted in which
// case the last node hosting resource will clean up at the server if
// possible.
//
// In any case, if we can't delete the records, we should log it.
//
if ( Resource->State != ClusterResourceOnline || numberOfDnsLists == 0 ) {
WCHAR msgBuffer[64];
msgBuffer[ COUNT_OF( msgBuffer ) - 1] = UNICODE_NULL;
if ( status == ERROR_SUCCESS ) {
_snwprintf(msgBuffer,
COUNT_OF( msgBuffer ) - 1,
L"IP Address %ws",
ipAddressBuffer);
} else {
_snwprintf(msgBuffer,
COUNT_OF( msgBuffer ) - 1,
L"Cluster IP Address resource %ws",
DependentResourceId);
}
ClusResLogSystemEventByKey1(Resource->ResKey,
LOG_UNUSUAL,
RES_NETNAME_CANT_DELETE_DEPENDENT_RESOURCE_DNS_RECORDS,
msgBuffer);
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Unable to delete DNS records associated with IP resource '%1!ws!'. "
L"The DNS Administrator can delete these records through the DNS "
L"management snapin.\n",
DependentResourceId);
if ( ipAddressBuffer != NULL ) {
LocalFree( ipAddressBuffer );
}
return ERROR_SUCCESS;
}
(NetNameLogEvent)(resourceHandle,
LOG_INFORMATION,
L"RemoveDependentIpAddress: Deleting DNS records associated with resource '%1!ws!'.\n",
DependentResourceId);
RtlInitUnicodeString( &ipAddressStringW, ipAddressBuffer );
RtlUnicodeStringToAnsiString( &ipAddressStringA,
&ipAddressStringW,
TRUE );
ipAddress = inet_addr( ipAddressStringA.Buffer );
RtlFreeAnsiString( &ipAddressStringA );
//
// finally, we know what to delete. Convert the address into reverse zone
// format and find it in the resource's DNS list structures.
//
reverseName = BuildUnicodeReverseName( ipAddressBuffer );
if ( reverseName == NULL ) {
status = GetLastError();
(NetNameLogEvent)(resourceHandle,
LOG_ERROR,
L"Unable to build DNS reverse zone name for resource '%1!ws!', status %2!u!.\n",
DependentResourceId,
status);
return status;
}
//
// co-ordinate changes to DnsLists with the worker thread
//
NetNameAcquireDnsListLock( Resource );
dnsList = Resource->DnsLists;
while ( numberOfDnsLists-- ) {
PDNS_RECORD dnsRecord;
PDNS_RECORD lastDnsRecord;
PDNS_RECORD nextDnsRecord;
DNS_STATUS dnsStatus;
if ( dnsList->ForwardZoneIsDynamic ) {
dnsRecord = dnsList->A_RRSet.pFirstRR;
lastDnsRecord = NULL;
while( dnsRecord != NULL ) {
if ( dnsRecord->Data.A.IpAddress == ipAddress ) {
//
// found a match. we need to whack just that record from
// the server and from our DNS lists.
//
nextDnsRecord = dnsRecord->pNext;
dnsRecord->pNext = NULL;
dnsStatus = DnsModifyRecordsInSet_W(NULL,
dnsRecord,
DNS_UPDATE_SECURITY_USE_DEFAULT,
NULL,
dnsList->DnsServerList,
NULL);
if ( dnsStatus == DNS_ERROR_RCODE_NO_ERROR ) {
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"Deleted DNS A record at server: name: %1!ws! IP Address: %2!ws!\n",
dnsRecord->pName,
ipAddressBuffer);
} else {
WCHAR statusBuf[ 32 ];
statusBuf[ COUNT_OF( statusBuf ) - 1 ] = UNICODE_NULL;
_snwprintf(statusBuf, COUNT_OF( statusBuf ) - 1,
L"%d",
dnsStatus );
ClusResLogSystemEventByKey3(Resource->ResKey,
LOG_UNUSUAL,
RES_NETNAME_DNS_SINGLE_A_RECORD_DELETE_FAILED,
dnsRecord->pName,
ipAddressBuffer,
statusBuf);
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_ERROR,
L"Failed to delete DNS A record at server: owner: %1!ws!, "
L"IP Address: %2!ws!. status %3!u!\n",
dnsRecord->pName,
ipAddressBuffer,
dnsStatus);
}
//
// fix up forward ptrs
//
if ( lastDnsRecord != NULL ) {
lastDnsRecord->pNext = nextDnsRecord;
} else {
dnsList->A_RRSet.pFirstRR = nextDnsRecord;
}
//
// fix up last ptr if necessary
//
if ( dnsList->A_RRSet.pLastRR == dnsRecord ) {
dnsList->A_RRSet.pLastRR = lastDnsRecord;
}
//
// have DNS clean up its allocations and free the record
DnsRecordListFree( dnsRecord, DnsFreeRecordListDeep );
break;
}
lastDnsRecord = dnsRecord;
dnsRecord = dnsRecord->pNext;
} // while dnsRecord != NULL
} // if forward zone is dynamic
if ( dnsList->ReverseZoneIsDynamic ) {
dnsRecord = dnsList->PTR_RRSet.pFirstRR;
lastDnsRecord = NULL;
while( dnsRecord != NULL ) {
if ( ClRtlStrICmp( reverseName, dnsRecord->pName ) == 0 ) {
//
// found a match. we need to whack that record from the
// server and from our DNS lists. This also means that we
// have to fix up the RRSet struct if the record we're
// whacking is either first and/or last.
//
nextDnsRecord = dnsRecord->pNext;
dnsRecord->pNext = NULL;
dnsStatus = DnsModifyRecordsInSet_W(NULL,
dnsRecord,
DNS_UPDATE_SECURITY_USE_DEFAULT,
NULL,
dnsList->DnsServerList,
NULL);
if ( dnsStatus == DNS_ERROR_RCODE_NO_ERROR ) {
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"Deleted DNS PTR record at server: name: %1!ws! host: %2!ws!\n",
dnsRecord->pName,
dnsRecord->Data.PTR.pNameHost
);
} else {
WCHAR statusBuf[ 32 ];
statusBuf[ COUNT_OF( statusBuf ) - 1 ] = UNICODE_NULL;
_snwprintf(statusBuf, COUNT_OF( statusBuf ) - 1,
L"%d",
dnsStatus );
ClusResLogSystemEventByKey3(Resource->ResKey,
LOG_UNUSUAL,
RES_NETNAME_DNS_PTR_RECORD_DELETE_FAILED,
dnsRecord->pName,
dnsRecord->Data.PTR.pNameHost,
statusBuf);
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_ERROR,
L"Failed to delete DNS PTR record: owner %1!ws! "
L"host: %2!ws!, status %3!u!\n",
dnsRecord->pName,
dnsRecord->Data.PTR.pNameHost,
dnsStatus
);
}
//
// fix up forward ptrs
//
if ( lastDnsRecord != NULL ) {
lastDnsRecord->pNext = nextDnsRecord;
} else {
dnsList->PTR_RRSet.pFirstRR = nextDnsRecord;
}
//
// fix up last ptr if necessary
//
if ( dnsList->PTR_RRSet.pLastRR == dnsRecord ) {
dnsList->PTR_RRSet.pLastRR = lastDnsRecord;
}
//
// have DNS clean up its allocations and free the record
DnsRecordListFree( dnsRecord, DnsFreeRecordListDeep );
break;
}
lastDnsRecord = dnsRecord;
dnsRecord = dnsRecord->pNext;
} // while dnsRecord != NULL
} // if reverse zone is dynamic
++dnsList;
} // while more dns lists to process
NetNameReleaseDnsListLock( Resource );
LocalFree( reverseName );
LocalFree( ipAddressBuffer );
return ERROR_SUCCESS;
} // RemoveDependentIpAddress
VOID
RemoveDnsRecords(
PNETNAME_RESOURCE Resource
)
/*++
Routine Description:
delete all the DNS records associated with this resource.
Arguments:
Resource - pointer to private netname resource data
Return Value:
None
--*/
{
PDNS_LISTS dnsLists;
DNS_STATUS dnsStatus;
PDNS_RECORD dnsRecord;
PDNS_RECORD nextDnsRecord;
ULONG numberOfDnsLists;
if ( Resource->NumberOfDnsLists == 0 ) {
//
// nothing to cleanup; log an entry in the event log so they know what
// to do
//
ClusResLogSystemEventByKey(Resource->ResKey,
LOG_UNUSUAL,
RES_NETNAME_CANT_DELETE_DNS_RECORDS);
return;
}
NetNameAcquireDnsListLock( Resource );
dnsLists = Resource->DnsLists;
numberOfDnsLists = Resource->NumberOfDnsLists;
while ( numberOfDnsLists-- ) {
if ( dnsLists->ReverseZoneIsDynamic ) {
//
// whack the PTR records; see the write up in RegisterDnsRecords
// for this bit of funkiness
//
dnsRecord = dnsLists->PTR_RRSet.pFirstRR;
while ( dnsRecord != NULL ) {
nextDnsRecord = dnsRecord->pNext;
dnsRecord->pNext = NULL;
dnsStatus = DnsModifyRecordsInSet_W(NULL,
dnsRecord,
DNS_UPDATE_SECURITY_USE_DEFAULT,
NULL,
dnsLists->DnsServerList,
NULL);
if ( dnsStatus == DNS_ERROR_RCODE_NO_ERROR ) {
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"Deleted DNS PTR record at server: owner: %1!ws! host: %2!ws!\n",
dnsRecord->pName,
dnsRecord->Data.PTR.pNameHost
);
} else {
WCHAR statusBuf[ 32 ];
statusBuf[ COUNT_OF( statusBuf ) - 1 ] = UNICODE_NULL;
_snwprintf(statusBuf, COUNT_OF( statusBuf ) - 1,
L"%d",
dnsStatus );
ClusResLogSystemEventByKey3(Resource->ResKey,
LOG_UNUSUAL,
RES_NETNAME_DNS_PTR_RECORD_DELETE_FAILED,
dnsRecord->pName,
dnsRecord->Data.PTR.pNameHost,
statusBuf);
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_ERROR,
L"Failed to delete DNS PTR record: owner %1!ws! host: %2!ws!, status %3!u!\n",
dnsRecord->pName,
dnsRecord->Data.PTR.pNameHost,
dnsStatus
);
}
dnsRecord->pNext = nextDnsRecord;
dnsRecord = nextDnsRecord;
}
}
//
// it's possible to remove all dependencies from the netname
// resource. In that situation, we're left with no DNS records.
//
if ( dnsLists->ForwardZoneIsDynamic && dnsLists->A_RRSet.pFirstRR != NULL ) {
//
// delete the A records from the DNS server
//
dnsStatus = DnsModifyRecordsInSet_W(NULL,
dnsLists->A_RRSet.pFirstRR,
DNS_UPDATE_SECURITY_USE_DEFAULT,
NULL,
dnsLists->DnsServerList,
NULL);
if ( dnsStatus == DNS_ERROR_RCODE_NO_ERROR ) {
dnsRecord = dnsLists->A_RRSet.pFirstRR;
while ( dnsRecord != NULL ) {
struct in_addr ipAddress;
ipAddress.s_addr = dnsRecord->Data.A.IpAddress;
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_INFORMATION,
L"Deleted DNS A record at server: owner: %1!ws! IP Address: %2!hs!\n",
dnsRecord->pName,
inet_ntoa( ipAddress ));
dnsRecord = dnsRecord->pNext;
}
} else {
WCHAR statusBuf[ 32 ];
statusBuf[ COUNT_OF( statusBuf ) - 1 ] = UNICODE_NULL;
_snwprintf(statusBuf, COUNT_OF( statusBuf ) - 1,
L"%d",
dnsStatus );
ClusResLogSystemEventByKey2(Resource->ResKey,
LOG_UNUSUAL,
RES_NETNAME_DNS_A_RECORD_DELETE_FAILED,
dnsLists->A_RRSet.pFirstRR->pName,
statusBuf);
(NetNameLogEvent)(Resource->ResourceHandle,
LOG_ERROR,
L"Failed to delete DNS A record at server: owner: %1!ws!, status %2!u!\n",
dnsLists->A_RRSet.pFirstRR->pName,
dnsStatus
);
}
}
++dnsLists;
}
NetNameCleanupDnsLists( Resource );
NetNameReleaseDnsListLock( Resource );
} // RemoveDnsRecords
DWORD
NetNameGetNetworkName(
IN OUT PNETNAME_RESOURCE ResourceEntry,
OUT PVOID OutBuffer,
IN DWORD OutBufferSize,
OUT LPDWORD BytesReturned
)
/*++
Routine Description:
Processes the CLUSCTL_RESOURCE_GET_NETWORK_NAME control function
for resources of type Network Name.
Arguments:
ResourceEntry - Supplies the resource entry on which to operate.
OutBuffer - Returns the output data.
OutBufferSize - Supplies the size, in bytes, of the data pointed
to by OutBuffer.
BytesReturned - The number of bytes returned in OutBuffer.
Return Value:
ERROR_SUCCESS - The function completed successfully.
ERROR_INVALID_PARAMETER - The data is formatted incorrectly.
ERROR_MORE_DATA - More data is available than can fit in OutBuffer.
Win32 error code - The function failed.
--*/
{
DWORD status;
DWORD required;
//
// Calculate the required number of bytes required for
// the network name string.
//
required = (lstrlenW( ResourceEntry->Params.NetworkName ) + 1) * sizeof( WCHAR );
//
// Make sure we can return the required number of bytes.
//
if ( BytesReturned == NULL ) {
status = ERROR_INVALID_PARAMETER;
} else {
//
// Copy the required number of bytes to the output parameter.
//
*BytesReturned = required;
//
// If there is no output buffer, the call just wanted the size.
//
if ( OutBuffer == NULL ) {
status = ERROR_SUCCESS;
} else {
//
// If the output buffer is large enough, copy the data.
// Otherwise return an error.
//
if ( OutBufferSize >= required ) {
lstrcpyW( OutBuffer, ResourceEntry->Params.NetworkName );
status = ERROR_SUCCESS;
} else {
status = ERROR_MORE_DATA;
}
}
}
return(status);
} // NetNameGetNetworkName
//
// Public Functions
//
BOOLEAN
WINAPI
NetNameDllEntryPoint(
IN HINSTANCE DllHandle,
IN DWORD Reason,
IN LPVOID Reserved
)
{
switch(Reason) {
case DLL_PROCESS_ATTACH:
return(NetNameInit( DllHandle ));
break;
case DLL_PROCESS_DETACH:
NetNameCleanup();
break;
default:
break;
}
return(TRUE);
} // NetNameDllEntryPoint
RESID
WINAPI
NetNameOpen(
IN LPCWSTR ResourceName,
IN HKEY ResourceKey,
IN RESOURCE_HANDLE ResourceHandle
)
/*++
Routine Description:
Open routine for Network Name resource
Arguments:
ResourceName - supplies the resource name
ResourceKey - a registry key for access registry information for this
resource.
ResourceHandle - the resource handle to be supplied with SetResourceStatus
is called.
Return Value:
RESID of created resource
NULL on failure
--*/
{
DWORD status;
HKEY parametersKey = NULL;
HKEY ResKey=NULL;
PNETNAME_RESOURCE resource = NULL;
LPWSTR nodeName = NULL;
DWORD nameSize = MAX_COMPUTERNAME_LENGTH + 1;
LPWSTR nodeId = NULL;
DWORD nodeIdSize = 6;
NETNAME_PARAMS paramBlock;
DWORD dwFlags;
DWORD resDataSize;
HCLUSTER clusterHandle;
HRESOURCE clusterResourceHandle = NULL;
RtlZeroMemory( &paramBlock, sizeof( paramBlock ));
//
// Open a handle to the resource and remember it.
//
clusterHandle = OpenCluster(NULL);
if (clusterHandle == NULL) {
status = GetLastError();
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to open handle to cluster, status %1!u!.\n",
status
);
goto error_exit;
}
clusterResourceHandle = OpenClusterResource(
clusterHandle,
ResourceName
);
CloseCluster( clusterHandle );
if (clusterResourceHandle == NULL) {
status = GetLastError();
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to open handle to resource <%1!ws!>, status %2!u!.\n",
ResourceName,
status
);
goto error_exit;
}
//
// Figure out what node we are running on.
//
nodeName = LocalAlloc( LMEM_FIXED, nameSize * sizeof(WCHAR));
if (nodeName == NULL) {
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
status = ERROR_NOT_ENOUGH_MEMORY;
goto error_exit;
}
if ( !GetComputerNameW(nodeName, &nameSize) ) {
status = GetLastError();
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to get local node name, status %1!u!.\n",
status
);
goto error_exit;
}
nodeId = LocalAlloc( LMEM_FIXED, nodeIdSize * sizeof(WCHAR));
if (nodeId == NULL) {
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to allocate memory.\n"
);
status = ERROR_NOT_ENOUGH_MEMORY;
goto error_exit;
}
status = GetCurrentClusterNodeId(nodeId, &nodeIdSize);
if (status != ERROR_SUCCESS) {
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to get local node name, status %1!u!.\n",
status
);
goto error_exit;
}
//
// Open handles to our key, our parameters key, and our node parameters
// key in the registry
//
status = ClusterRegOpenKey(ResourceKey,
L"",
KEY_ALL_ACCESS,
&ResKey);
if (status != ERROR_SUCCESS)
{
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to open the top level key,status %1!u!.\n",
status
);
goto error_exit;
}
status = ClusterRegOpenKey(ResourceKey,
CLUSREG_KEYNAME_PARAMETERS,
KEY_ALL_ACCESS,
&parametersKey);
if (status != NO_ERROR) {
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to open parameters key, status %1!u!.\n",
status);
goto error_exit;
}
//
// Fetch our parameters from the registry.
//
status = NetNameGetParameters(ResourceKey,
parametersKey,
ResourceHandle,
&paramBlock,
&resDataSize,
&dwFlags);
//
// Now we're ready to create a resource.
//
resource = NetNameAllocateResource(ResourceHandle);
if (resource == NULL) {
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to allocate resource structure.\n"
);
status = ERROR_NOT_ENOUGH_MEMORY;
goto error_exit;
} else {
status = ERROR_SUCCESS;
}
resource->RefCount = 1;
resource->NodeName = nodeName;
resource->NodeId = nodeId;
resource->State = ClusterResourceOffline;
resource->ResKey = ResKey;
resource->ParametersKey = parametersKey;
resource->Params = paramBlock;
resource->ResDataSize = resDataSize;
resource->dwFlags = dwFlags;
resource->ClusterResourceHandle = clusterResourceHandle;
resource->NameChangedWhileOnline = FALSE;
if ( resource->dwFlags & CLUS_FLAG_CORE ) {
LPWSTR currentName;
//
// for the core resource, we have to remember the current name in a
// separate location: FM will clobber the Name property directly in
// order to perserve the updating of the cluster name in a
// transaction. To that end, the CurrentName registry entry is used
// to store the current name.
//
// This entry is written in NetnameSetPrivateResProperties whenever
// the name changes. It is possible for that update to fail hence this
// update. We also have to write if this is the first time this name
// is opened since an upgrade from W2K.
//
currentName = ResUtilGetSzValue( resource->ResKey, PARAM_NAME__CORECURRENTNAME );
if ( currentName == NULL ) {
status = ClusterRegSetValue(resource->ResKey,
PARAM_NAME__CORECURRENTNAME,
REG_SZ,
(LPBYTE)resource->Params.NetworkName,
( wcslen(resource->Params.NetworkName) + 1 ) * sizeof(WCHAR)
);
if (status != ERROR_SUCCESS) {
(NetNameLogEvent)(resource->ResourceHandle,
LOG_ERROR,
L"Failed to write CurrentName to registry, status %1!u!\n",
status
);
goto error_exit;
}
} else {
LocalFree( currentName );
}
}
//
// initialize the mutex used to protect the DNS list data.
//
resource->DnsListMutex = CreateMutex(NULL, FALSE, NULL);
if ( resource->DnsListMutex == NULL ) {
status = GetLastError();
(NetNameLogEvent)(
ResourceHandle,
LOG_ERROR,
L"Unable to initialize DNS list mutex: %1!d!.\n",
status);
goto error_exit;
}
//
// insert resource in list for DNS check routine
//
NetNameAcquireResourceLock();
InsertHeadList( &NetNameResourceListHead, &resource->Next );
NetNameReleaseResourceLock();
InterlockedIncrement(&NetNameOpenCount);
#if 0
//
// If a computer object already exists for this name, get its object
// GUID. We can't fail the open if this doesn't succeed: while the
// resource may have its name property set, it may have never gone online,
// therefore there maybe no CO in the DS at this point in time.
//
// turned off for now until we figure out what to do with the GUID. It is
// only valid while the resource is online (assuming the CO doesn't get
// whacked) and we don't do any kind of health check for the CO right
// now. Besides, Open is probably not the best place to do this due to
// latency related to contacting the DS.
//
if ( resource->Params.NetworkName != NULL ) {
GetComputerObjectGuid( resource );
}
#endif
error_exit:
if (status == ERROR_SUCCESS) {
(NetNameLogEvent)(
ResourceHandle,
LOG_INFORMATION,
L"Successful open of resid %1!u!\n",
resource
);
} else {
if (paramBlock.NetworkName != NULL) {
LocalFree( paramBlock.NetworkName );
}
if (paramBlock.ResourceData != NULL) {
LocalFree( paramBlock.ResourceData );
}
if (paramBlock.CreatingDC != NULL) {
LocalFree( paramBlock.CreatingDC );
}
if (parametersKey != NULL) {
ClusterRegCloseKey(parametersKey);
}
if (ResKey != NULL){
ClusterRegCloseKey(ResKey);
}
if (clusterResourceHandle != NULL) {
CloseClusterResource(clusterResourceHandle);
}
if (nodeName != NULL) {
LocalFree( nodeName );
}
if (nodeId != NULL) {
LocalFree( nodeId );
}
if (resource != NULL) {
LocalFree( resource );
resource = NULL;
}
(NetNameLogEvent)(
ResourceHandle,
LOG_INFORMATION,
L"Open failed, status %1!u!\n",
status
);
SetLastError(status);
}
return resource;
} // NetNameOpen
DWORD
WINAPI
NetNameOnline(
IN RESID Resource,
IN OUT PHANDLE EventHandle
)
/*++
Routine Description:
Online routine for Network Name resource.
Arguments:
Resource - supplies resource id to be brought online
EventHandle - supplies a pointer to a handle to signal on error.
Return Value:
ERROR_SUCCESS if successful.
ERROR_RESOURCE_NOT_FOUND if RESID is not valid.
ERROR_RESOURCE_NOT_AVAILABLE if resource was arbitrated but failed to
acquire 'ownership'.
Win32 error code if other failure.
--*/
{
PNETNAME_RESOURCE resource = (PNETNAME_RESOURCE) Resource;
DWORD threadId;
DWORD status=ERROR_SUCCESS;
if (resource == NULL) {
return(ERROR_RESOURCE_NOT_FOUND);
}
NetNameAcquireResourceLock();
resource->State = ClusterResourceOnlinePending;
status = ClusWorkerCreate(
&resource->PendingThread,
NetNameOnlineThread,
resource
);
if (status != ERROR_SUCCESS) {
resource->State = ClusterResourceFailed;
(NetNameLogEvent)(
resource->ResourceHandle,
LOG_ERROR,
L"Unable to start online thread, status %1!u!.\n",
status
);
}
else {
status = ERROR_IO_PENDING;
}
NetNameReleaseResourceLock();
return(status);
} // NetNameOnline
DWORD
WINAPI
NetNameOffline(
IN RESID Resource
)
/*++
Routine Description:
Offline routine for Network Name resource. Spin a worker thread and return
pending.
Arguments:
Resource - supplies resource id to be taken offline.
Return Value:
ERROR_SUCCESS if successful.
A Win32 error code otherwise.
--*/
{
DWORD status;
PNETNAME_RESOURCE resource = (PNETNAME_RESOURCE) Resource;
if (resource != NULL) {
(NetNameLogEvent)(
resource->ResourceHandle,
LOG_INFORMATION,
L"Taking resource offline...\n"
);
status = ClusWorkerCreate(&resource->PendingThread,
NetNameOfflineThread,
resource);
if (status != ERROR_SUCCESS) {
resource->State = ClusterResourceFailed;
(NetNameLogEvent)(
resource->ResourceHandle,
LOG_ERROR,
L"Unable to start offline thread, status %1!u!.\n",
status
);
}
else {
status = ERROR_IO_PENDING;
}
}
else {
status = ERROR_RESOURCE_NOT_FOUND;
}
return(status);
} // NetNameOffline
VOID
WINAPI
NetNameTerminate(
IN RESID Resource
)
/*++
Routine Description:
Terminate routine for Network Name resource.
Arguments:
Resource - supplies resource id to be terminated
Return Value:
None.
--*/
{
PNETNAME_RESOURCE resource = (PNETNAME_RESOURCE) Resource;
if (resource != NULL) {
(NetNameLogEvent)(
resource->ResourceHandle,
LOG_INFORMATION,
L"Terminating resource...\n"
);
/* Ruihu: 11/06/2000 */
NetNameAcquireResourceLock();
if ((resource->State != ClusterResourceOffline) &&
(resource->State != ClusterResourceOfflinePending))
{
//
// only call private offline routine if we haven't called it
// already
//
NetNameReleaseResourceLock();
NetNameOfflineWorker( resource, TRUE, NULL );
NetNameAcquireResourceLock();
}
resource->State = ClusterResourceOffline;
NetNameReleaseResourceLock();
/* Ruihu: 11/06/2000 */
}
return;
} // NetNameTerminate
BOOL
WINAPI
NetNameLooksAlive(
IN RESID Resource
)
/*++
Routine Description:
LooksAlive routine for Network Name resource.
Check that any Netbt plumbing is still intact. Then check the status of
the last DNS operation. Finally check the kerberos status and fail if
appropriate to do so.
Arguments:
Resource - supplies the resource id to be polled.
Return Value:
TRUE - Resource looks like it is alive and well
FALSE - Resource looks like it is toast.
--*/
{
PNETNAME_RESOURCE resource = (PNETNAME_RESOURCE) Resource;
BOOL isHealthy = TRUE;
DWORD status;
DWORD numberOfFailures = 0;
ULONG numberOfDnsLists;
PDNS_LISTS dnsLists;
BOOL dnsFailure = FALSE;
if (resource == NULL) {
return(FALSE);
}
NetNameAcquireResourceLock();
//
// avoid gotos by breaking out of fake do loop
//
do {
status = NetNameCheckNbtName(resource->Params.NetworkName,
resource->NameHandleCount,
resource->NameHandleList,
resource->ResourceHandle);
if ( status != ERROR_SUCCESS ) {
ClusResLogSystemEventByKey1(resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_NOT_REGISTERED_WITH_RDR,
resource->Params.NetworkName);
(NetNameLogEvent)(resource->ResourceHandle,
LOG_INFORMATION,
L"Name %1!ws! failed IsAlive/LooksAlive check, error %2!u!.\n",
resource->Params.NetworkName,
status);
isHealthy = FALSE;
break;
}
//
// check how many of the DNS A record registrations are correct. We
// don't acquire the resource's DNS list lock since we're only reading
// the status out of a struct. The resource can't be deleted while
// we're in this routine and we're not walking the DNS records
// associated with this list so the number of lists won't change out
// from underneath of us.
//
numberOfDnsLists = resource->NumberOfDnsLists;
dnsLists = resource->DnsLists;
while ( numberOfDnsLists-- ) {
if (dnsLists->LastARecQueryStatus != DNS_ERROR_RCODE_NO_ERROR
&&
dnsLists->LastARecQueryStatus != ERROR_TIMEOUT )
{
dnsFailure = TRUE;
++numberOfFailures;
}
++dnsLists;
}
//
// If DNS is required and we detected a failure other than timeout or all
// DNS name registrations failed and there are no netbt names associated
// with this name, then we need to fail the resource
//
if ( ( resource->Params.RequireDNS && dnsFailure )
||
( numberOfFailures == resource->NumberOfDnsLists
&&
resource->NameHandleCount == 0 ) )
{
isHealthy = FALSE;
break;
}
#if 0
if ( resource->DoKerberosCheck ) {
//
// ISSUE-01/03/13 charlwi - should resource fail if can't reach DS?
//
// The problem here is that we might have lost our connection to a
// DC. Does that mean we fail the name? Not sure, since we don't know
// if replication has been late. On the other hand, if the object has
// been deleted from the DS, we should take some sort of action. This
// will affect clients that do not have tickets at this point, i.e.,
// existing clients with tickets will continue to work.
//
// see if our kerb plumbing is intact by getting a handle to the
// computer object and checking its DnsHostName and
// SecurityPrincipalName attributes
//
if ( resource->KerberosStatus != ERROR_SUCCESS ) {
isHealthy = FALSE;
}
}
#endif
} while ( FALSE );
NetNameReleaseResourceLock();
return isHealthy;
} // NetNameLooksAlive
BOOL
WINAPI
NetNameIsAlive(
IN RESID Resource
)
/*++
Routine Description:
IsAlive routine for Network Name resource.
Arguments:
Resource - supplies the resource id to be polled.
Return Value:
TRUE - Resource is alive and well
FALSE - Resource is toast.
--*/
{
return(NetNameLooksAlive(Resource));
} // NetNameIsAlive
VOID
WINAPI
NetNameClose(
IN RESID Resource
)
/*++
Routine Description:
Close routine for Network Name resource.
Arguments:
Resource - supplies resource id to be closed.
Return Value:
None.
--*/
{
PNETNAME_RESOURCE resource = (PNETNAME_RESOURCE) Resource;
PLIST_ENTRY entry;
if (resource != NULL) {
ClusWorkerTerminate( &resource->PendingThread );
if ( InterlockedDecrement(&NetNameOpenCount) == 0 ) {
// This is the last resource //
// Kill NetNameWorker //
//
// set the event to terminate the worker thread and wait for it to
// terminate.
//
if ( NetNameWorkerThread != NULL ) {
DWORD status;
SetEvent( NetNameWorkerTerminate );
status = WaitForSingleObject(NetNameWorkerThread, 3 * 60 * 1000);
if ( status == WAIT_TIMEOUT ) {
(NetNameLogEvent)(
resource->ResourceHandle,
LOG_ERROR,
L"Worker routine failed to stop. Terminating resrcmon.\n");
ClusResLogSystemEventByKey(resource->ResKey,
LOG_CRITICAL,
RES_NETNAME_DNS_CANNOT_STOP
);
ExitProcess(WAIT_TIMEOUT);
}
CloseHandle( NetNameWorkerThread );
NetNameWorkerThread = NULL;
}
}
NetNameAcquireResourceLock();
//
// release our reference to this block. If the DNS worker thread
// doesn't have an outstanding reference to it, then we can zap the
// block now. Otherwise the DNS check routine will detect that the ref
// count went to zero and get rid of it then. In either case, remove
// it from the resource block list to avoid the problem where an
// identical resource is recreated and both blocks are on the list.
//
RemoveEntryList(&resource->Next);
ASSERT( resource->RefCount > 0 );
if ( --resource->RefCount == 0 ) {
NetNameReleaseResource( resource );
}
NetNameReleaseResourceLock();
}
return;
} // NetNameClose
DWORD
NetNameGetRequiredDependencies(
OUT PVOID OutBuffer,
IN DWORD OutBufferSize,
OUT LPDWORD BytesReturned
)
/*++
Routine Description:
Processes the CLUSCTL_RESOURCE_GET_REQUIRED_DEPENDENCIES control function
for resources of type Network Name.
Arguments:
OutBuffer - Supplies a pointer to the output buffer to be filled in.
OutBufferSize - Supplies the size, in bytes, of the available space
pointed to by OutBuffer.
BytesReturned - Returns the number of bytes of OutBuffer actually
filled in by the resource. If OutBuffer is too small, BytesReturned
contains the total number of bytes for the operation to succeed.
Return Value:
ERROR_SUCCESS - The function completed successfully.
ERROR_MORE_DATA - The output buffer is too small to return the data.
BytesReturned contains the required size.
Win32 error code - The function failed.
--*/
{
typedef struct DEP_DATA {
CLUSPROP_SZ_DECLARE( ipaddrEntry, sizeof(IP_ADDRESS_RESOURCETYPE_NAME) / sizeof(WCHAR) );
CLUSPROP_SYNTAX endmark;
} DEP_DATA, *PDEP_DATA;
PDEP_DATA pdepdata = (PDEP_DATA)OutBuffer;
DWORD status;
*BytesReturned = sizeof(DEP_DATA);
if ( OutBufferSize < sizeof(DEP_DATA) ) {
if ( OutBuffer == NULL ) {
status = ERROR_SUCCESS;
} else {
status = ERROR_MORE_DATA;
}
} else {
ZeroMemory( pdepdata, sizeof(DEP_DATA) );
pdepdata->ipaddrEntry.Syntax.dw = CLUSPROP_SYNTAX_NAME;
pdepdata->ipaddrEntry.cbLength = sizeof(IP_ADDRESS_RESOURCETYPE_NAME);
lstrcpyW( pdepdata->ipaddrEntry.sz, IP_ADDRESS_RESOURCETYPE_NAME );
pdepdata->endmark.dw = CLUSPROP_SYNTAX_ENDMARK;
status = ERROR_SUCCESS;
}
return status;
} // NetNameGetRequiredDependencies
DWORD
NetNameResourceControl(
IN RESID Resource,
IN DWORD ControlCode,
IN PVOID InBuffer,
IN DWORD InBufferSize,
OUT PVOID OutBuffer,
IN DWORD OutBufferSize,
OUT LPDWORD BytesReturned
)
/*++
Routine Description:
ResourceControl routine for Network Name resources.
Perform the control request specified by ControlCode on the specified
resource.
Arguments:
ResourceId - Supplies the resource id for the specific resource.
ControlCode - Supplies the control code that defines the action
to be performed.
InBuffer - Supplies a pointer to a buffer containing input data.
InBufferSize - Supplies the size, in bytes, of the data pointed
to by InBuffer.
OutBuffer - Supplies a pointer to the output buffer to be filled in.
OutBufferSize - Supplies the size, in bytes, of the available space
pointed to by OutBuffer.
BytesReturned - Returns the number of bytes of OutBuffer actually
filled in by the resource. If OutBuffer is too small, BytesReturned
contains the total number of bytes for the operation to succeed.
Return Value:
ERROR_SUCCESS - The function completed successfully.
ERROR_INVALID_FUNCTION - The requested control code is not supported.
In some cases, this allows the cluster software to perform the work.
Win32 error code - The function failed.
--*/
{
DWORD status;
PNETNAME_RESOURCE resourceEntry = (PNETNAME_RESOURCE)Resource;
DWORD required;
BOOL readOnly = FALSE;
BOOL nameHasChanged;
BOOL compObjNeedsRenaming;
switch ( ControlCode ) {
case CLUSCTL_RESOURCE_UNKNOWN:
*BytesReturned = 0;
status = ERROR_SUCCESS;
break;
case CLUSCTL_RESOURCE_GET_PRIVATE_PROPERTY_FMTS:
status = ResUtilGetPropertyFormats( NetNameResourcePrivateProperties,
OutBuffer,
OutBufferSize,
BytesReturned,
&required );
if ( status == ERROR_MORE_DATA ) {
*BytesReturned = required;
}
break;
case CLUSCTL_RESOURCE_GET_REQUIRED_DEPENDENCIES:
status = NetNameGetRequiredDependencies( OutBuffer,
OutBufferSize,
BytesReturned
);
break;
case CLUSCTL_RESOURCE_ENUM_PRIVATE_PROPERTIES:
status = ResUtilEnumProperties( NetNameResourcePrivateProperties,
OutBuffer,
OutBufferSize,
BytesReturned,
&required );
if ( status == ERROR_MORE_DATA ) {
*BytesReturned = required;
}
break;
case CLUSCTL_RESOURCE_GET_RO_PRIVATE_PROPERTIES:
//
// NOTE: fallthrough is the required behavior here.
//
readOnly = TRUE;
case CLUSCTL_RESOURCE_GET_PRIVATE_PROPERTIES:
status = NetNameGetPrivateResProperties( resourceEntry,
readOnly,
OutBuffer,
OutBufferSize,
BytesReturned );
break;
case CLUSCTL_RESOURCE_VALIDATE_PRIVATE_PROPERTIES:
status = NetNameValidatePrivateResProperties( resourceEntry,
InBuffer,
InBufferSize,
NULL,
&nameHasChanged,
&compObjNeedsRenaming);
break;
case CLUSCTL_RESOURCE_CLUSTER_NAME_CHANGED:
case CLUSCTL_RESOURCE_SET_PRIVATE_PROPERTIES:
status = NetNameSetPrivateResProperties( resourceEntry,
InBuffer,
InBufferSize );
break;
case CLUSCTL_RESOURCE_GET_NETWORK_NAME:
status = NetNameGetNetworkName( resourceEntry,
OutBuffer,
OutBufferSize,
BytesReturned );
break;
case CLUSCTL_RESOURCE_DELETE:
RemoveDnsRecords( resourceEntry );
//
// if resource was created but has no properities, then
// NetworkName can be NULL. Otherwise, try to disable the object
// and remove any crypto checkpoints that may have been created
//
if ( resourceEntry->Params.NetworkName != NULL ) {
DisableComputerObject( resourceEntry );
RemoveNNCryptoCheckpoint( resourceEntry );
}
status = ERROR_SUCCESS;
break;
case CLUSCTL_RESOURCE_REMOVE_DEPENDENCY:
//
// argh! resource dependencies can be removed without any veto
// power by the resource DLL. We could be deleting the last
// dependent resource which leaves netname with nothing.
//
RemoveDependentIpAddress( resourceEntry, InBuffer );
status = ERROR_SUCCESS;
break;
case CLUSCTL_RESOURCE_NETNAME_GET_VIRTUAL_SERVER_TOKEN:
//
// dup an impersonation token of the virtual computer account for
// the caller.
//
// caller provides a structure indicating their process ID,
// desired access and whether the handle should be
// inheritable. This process must have PROCESS_DUP_HANDLE access
// to the target process.
//
if ( InBufferSize >= sizeof( CLUS_NETNAME_VS_TOKEN_INFO )) {
if ( OutBufferSize >= sizeof( HANDLE )) {
PCLUS_NETNAME_VS_TOKEN_INFO tokenInfo = (PCLUS_NETNAME_VS_TOKEN_INFO)InBuffer;
PHANDLE dupVSToken = (PHANDLE)OutBuffer;
if ( resourceEntry->State == ClusterResourceOnline ) {
status = DuplicateVSToken( resourceEntry, tokenInfo, dupVSToken );
if ( status == ERROR_SUCCESS ) {
*BytesReturned = sizeof( HANDLE );
} else {
*BytesReturned = 0;
}
} else {
return ERROR_INVALID_STATE;
}
}
else {
status = ERROR_MORE_DATA;
*BytesReturned = sizeof( HANDLE );
}
}
else {
status = ERROR_INVALID_PARAMETER;
}
break;
case CLUSCTL_RESOURCE_CLUSTER_VERSION_CHANGED:
//
// global flag was set during restype control. If appropriate, set
// it on existing resources so that during their first online,
// they do the upgrade check.
//
if ( CheckForKerberosUpgrade ) {
resourceEntry->CheckForKerberosUpgrade = TRUE;
}
status = ERROR_SUCCESS;
break;
default:
status = ERROR_INVALID_FUNCTION;
break;
}
return(status);
} // NetNameResourceControl
DWORD
NetNameResourceTypeControl(
IN LPCWSTR ResourceTypeName,
IN DWORD ControlCode,
IN PVOID InBuffer,
IN DWORD InBufferSize,
OUT PVOID OutBuffer,
IN DWORD OutBufferSize,
OUT LPDWORD BytesReturned
)
/*++
Routine Description:
ResourceTypeControl routine for Network Name resources.
Perform the control request specified by ControlCode.
Arguments:
ResourceTypeName - Supplies the name of the resource type.
ControlCode - Supplies the control code that defines the action
to be performed.
InBuffer - Supplies a pointer to a buffer containing input data.
InBufferSize - Supplies the size, in bytes, of the data pointed
to by InBuffer.
OutBuffer - Supplies a pointer to the output buffer to be filled in.
OutBufferSize - Supplies the size, in bytes, of the available space
pointed to by OutBuffer.
BytesReturned - Returns the number of bytes of OutBuffer actually
filled in by the resource. If OutBuffer is too small, BytesReturned
contains the total number of bytes for the operation to succeed.
Return Value:
ERROR_SUCCESS - The function completed successfully.
ERROR_INVALID_FUNCTION - The requested control code is not supported.
In some cases, this allows the cluster software to perform the work.
Win32 error code - The function failed.
--*/
{
DWORD status;
DWORD required;
switch ( ControlCode ) {
case CLUSCTL_RESOURCE_TYPE_UNKNOWN:
*BytesReturned = 0;
status = ERROR_SUCCESS;
break;
case CLUSCTL_RESOURCE_TYPE_GET_PRIVATE_RESOURCE_PROPERTY_FMTS:
status = ResUtilGetPropertyFormats( NetNameResourcePrivateProperties,
OutBuffer,
OutBufferSize,
BytesReturned,
&required );
if ( status == ERROR_MORE_DATA ) {
*BytesReturned = required;
}
break;
case CLUSCTL_RESOURCE_TYPE_GET_REQUIRED_DEPENDENCIES:
status = NetNameGetRequiredDependencies( OutBuffer,
OutBufferSize,
BytesReturned
);
break;
case CLUSCTL_RESOURCE_TYPE_ENUM_PRIVATE_PROPERTIES:
status = ResUtilEnumProperties( NetNameResourcePrivateProperties,
OutBuffer,
OutBufferSize,
BytesReturned,
&required );
if ( status == ERROR_MORE_DATA ) {
*BytesReturned = required;
}
break;
case CLUSCTL_RESOURCE_TYPE_CLUSTER_VERSION_CHANGED:
{
PDOMAIN_CONTROLLER_INFO dcInfo = NULL;
//
// if there is no DS based DC, don't add a computer object
// even if MSMQ dependent resources exist. Here we use
// DsGetDcName as opposed to DsGetDcNameWithAccount since the
// former API is documented to be successful even if all the
// DCs are down. That is the semantics we want here.
//
status = DsGetDcName( NULL, // Use local computer
NULL, // Use primary domain of this node
NULL, // Domain GUID
NULL, // Site name
DS_DIRECTORY_SERVICE_REQUIRED, // Needs W2k or higher DC
&dcInfo ); // Output DC info
if ( status == ERROR_SUCCESS ) {
//
// if MSMQ is in workgroup mode, then don't bother with
// individual resource upgrade checks
//
CheckForKerberosUpgrade = DoesMsmqNeedComputerObject();
(NetNameLogEvent)( L"rtNetwork Name",
LOG_INFORMATION,
L"Upgrade detected - Network Name resources will %1!ws!be checked "
L"for dependent MSMQ resources.\n",
CheckForKerberosUpgrade ? L"" : L"not " );
NetApiBufferFree ( dcInfo );
}
else {
(NetNameLogEvent)( L"rtNetwork Name",
LOG_WARNING,
L"Upgrade detected: Active Directory is not available in this "
L"domain. No Kerberos support upgrade check will be done. status %1!u!\n",
status);
}
}
status = ERROR_SUCCESS;
break;
default:
status = ERROR_INVALID_FUNCTION;
break;
}
return(status);
} // NetNameResourceTypeControl
DWORD
NetNameGetPrivateResProperties(
IN OUT PNETNAME_RESOURCE ResourceEntry,
IN BOOL ReadOnly,
OUT PVOID OutBuffer,
IN DWORD OutBufferSize,
OUT LPDWORD BytesReturned
)
/*++
Routine Description:
Processes the CLUSCTL_RESOURCE_GET_PRIVATE_PROPERTIES control function
for resources of type Network Name.
Arguments:
ResourceEntry - Supplies the resource entry on which to operate.
ReadOnly - true if we're selecting read only property table
OutBuffer - Returns the output data.
OutBufferSize - Supplies the size, in bytes, of the data pointed
to by OutBuffer.
BytesReturned - The number of bytes returned in OutBuffer.
Return Value:
ERROR_SUCCESS - The function completed successfully.
ERROR_INVALID_PARAMETER - The data is formatted incorrectly.
ERROR_NOT_ENOUGH_MEMORY - An error occurred allocating memory.
Win32 error code - The function failed.
--*/
{
DWORD status;
DWORD required;
//
// The resutil routines don't support resources with r/w, r/o, and unknown
// props very well. There is no easy way to get just the unknown
// properties. For the r/o request, the props are separated out into a
// separate table. For the r/w case, if we call RUGetAllProperties using
// the r/w table, we get the r/o props back since they weren't in the
// table. If we combine the two tables into one, then the r/o case is
// broken, i.e., it returns the r/w props as well as the r/o ones.
//
// The current (yucky) solution is to have 3 tables: r/w, r/o, and
// combined. Combined is used to get any unknown props that are associated
// with the resource. It would be nice to have a resutils routine that
// gathers the unknown props using a list of prop list tables as input.
//
if ( ReadOnly ) {
status = ResUtilGetProperties(ResourceEntry->ParametersKey,
NetNameResourceROPrivateProperties,
OutBuffer,
OutBufferSize,
BytesReturned,
&required );
} else {
//
// get the r/w props first; after the call, required will be non-zero
// if the buffer wasn't large enough. Regardless, we have to continue
// to get the amount of space for any unknown props
//
status = ResUtilGetProperties(ResourceEntry->ParametersKey,
NetNameResourcePrivateProperties,
OutBuffer,
OutBufferSize,
BytesReturned,
&required );
//
// Add unknown properties to the property list.
//
if ( status == ERROR_SUCCESS || status == ERROR_MORE_DATA ) {
status = ResUtilAddUnknownProperties(ResourceEntry->ParametersKey,
NetNameResourceCombinedPrivateProperties,
OutBuffer,
OutBufferSize,
BytesReturned,
&required);
}
} // end of if getting r/w props
//
// This is kinda wierd: if null is passed in for the input buffer, the
// return status is success and required reflects how many bytes are
// needed. If a buffer was specified but it was too small, then more data
// is returned. It appears that the thing to watch is required indicating
// that more space is needed regardless of whether a buffer was specified
// or not.
//
if ( required > 0 && ( status == ERROR_SUCCESS || status == ERROR_MORE_DATA )) {
*BytesReturned = required;
}
return(status);
} // NetNameGetPrivateResProperties
DWORD
NetNameValidatePrivateResProperties(
IN OUT PNETNAME_RESOURCE ResourceEntry,
IN PVOID InBuffer,
IN DWORD InBufferSize,
OUT PNETNAME_PARAMS Params OPTIONAL,
OUT PBOOL NewNameIsDifferent,
OUT PBOOL CompObjRenameIsRequired
)
/*++
Routine Description:
Processes the CLUSCTL_RESOURCE_VALIDATE_PRIVATE_PROPERTIES control
function for resources of type Network Name.
This routine imposes a set of rules on when netname's properties can be
changed. Currently, this is limited to:
1) changing RequireKerberos requires the resource to be offline and
2) changing the Name property when RequireKerberos equals one requires the
resource to be offline
These restrictions are in place in order to simplify the coding of
netname. Both of these properties have direct implication for
communicating with the domain's DS. Consequently, limiting property
changes to when the resource is offline provides immediate feedback on the
success or failure of the requested change.
Changing the Name property when the resource is offline is a little tricky
due to qualfication issues. Since the name can change and then change back
to its original value, we have to detect and act on that.
Arguments:
ResourceEntry - Supplies the resource entry on which to operate.
InBuffer - Supplies a pointer to a buffer containing the property list of
changed property values to validate.
InBufferSize - Supplies the size, in bytes, of the data pointed
to by InBuffer.
Params - Supplies a pointer to an optional parameter block to fill in.
NewNameIsDifferent - TRUE if the new name is different than the current name
CompObjRenameIsRequired - TRUE if the new name is different from the stored
name and a corresponding CO needs to be renamed
Return Value:
ERROR_SUCCESS - The function completed successfully.
ERROR_INVALID_DATA - No input data.
ERROR_INVALID_NETNAME - The specified network name has invalid characters.
RPC_S_STRING_TOO_LONG - The specified network name is too long.
ERROR_BUSY - The specified network name is already in use.
Win32 error code - The function failed.
--*/
{
DWORD status;
CLRTL_NAME_STATUS netnameStatus;
NETNAME_PARAMS currentProps; // as stored in the registry
NETNAME_PARAMS newProps; // storage for updated props if Params is null
PNETNAME_PARAMS pParams; // pointer to the block of updated props
LPWSTR nameOfPropInError;
//
// The NewNameIsDifferent flag can (eventually) drive the offline cleanup
// routine. If the name has truly changed while it was online, then we
// want to do the appropriate cleanup when it goes offline. The problem is
// that the name can change many times while it is online; it could return
// to its current value so the overall appearance is that it never
// changed. In that case, we want to avoid cleanup.
//
*NewNameIsDifferent = FALSE;
//
// Check if there is input data.
//
if ( (InBuffer == NULL) ||
(InBufferSize < sizeof(DWORD)) ) {
return(ERROR_INVALID_DATA);
}
//
// Retrieve the current set of private read/write properties from the
// cluster database. This may be different from what is stored in
// ResourceEntry since the name could be online at this point in time.
//
ZeroMemory( &currentProps, sizeof(currentProps) );
status = ResUtilGetPropertiesToParameterBlock(
ResourceEntry->ParametersKey,
NetNameResourcePrivateProperties,
(LPBYTE) &currentProps,
FALSE, /*CheckForRequiredProperties*/
&nameOfPropInError
);
if ( status != ERROR_SUCCESS ) {
(NetNameLogEvent)(
ResourceEntry->ResourceHandle,
LOG_ERROR,
L"Unable to read the '%1' property. Error: %2!u!.\n",
(nameOfPropInError == NULL ? L"" : nameOfPropInError),
status );
goto FnExit;
}
//
// Duplicate the resource parameter block.
//
if ( Params == NULL ) {
pParams = &newProps;
} else {
pParams = Params;
}
ZeroMemory( pParams, sizeof(NETNAME_PARAMS) );
status = ResUtilDupParameterBlock( (LPBYTE) pParams,
(LPBYTE) &currentProps,
NetNameResourcePrivateProperties );
if ( status != ERROR_SUCCESS ) {
return(status);
}
//
// Parse and validate the properties that are changing.
//
status = ResUtilVerifyPropertyTable( NetNameResourcePrivateProperties,
NULL,
TRUE, // Allow unknowns
InBuffer,
InBufferSize,
(LPBYTE) pParams );
//
// now make validation checks
//
if ( status == ERROR_SUCCESS ) {
//
// can't change RequireKerberos while we're online
//
if ( ResourceEntry->State == ClusterResourceOnline
&&
ResourceEntry->Params.RequireKerberos != pParams->RequireKerberos
)
{
status = ERROR_INVALID_STATE;
}
}
if ( status == ERROR_SUCCESS ) {
//
// if Kerb is on, we have to be offline to change the name
//
if ( ResourceEntry->State == ClusterResourceOnline
&&
ResourceEntry->Params.RequireKerberos
&&
pParams->NetworkName != NULL
)
{
if ( ClRtlStrICmp( pParams->NetworkName, ResourceEntry->Params.NetworkName ) != 0 ) {
status = ERROR_INVALID_STATE;
}
}
}
if ( status == ERROR_SUCCESS && pParams->NetworkName != NULL ) {
BOOL validateName = FALSE;
LPWSTR currentName;
//
// got a request to change the network name property. if this is the
// core resource, then it is possible our name has already been
// changed by FM. Look it up in the registry. Otherwise, use the one
// stored as the Name property.
//
if ( ResourceEntry->dwFlags & CLUS_FLAG_CORE ) {
currentName = ResUtilGetSzValue( ResourceEntry->ResKey, PARAM_NAME__CORECURRENTNAME );
if ( currentName == NULL ) {
//
// this is bad; we've lost track of the old name for the core
// resource so we can't rename it
//
status = GetLastError();
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_ERROR,
L"Unable to find core resource's current name. status %1!u!\n",
status );
}
} else {
currentName = currentProps.NetworkName;
}
if ( currentName != NULL ) {
//
// a name has been specified. validate the new name if:
// the name has never been set (ResourceEntry and currentProps value is null)
// OR
// resource hasn't been online yet (RE is null) but the new name is different
// from the stored name (currentProps)
// OR
// ( the new name is different from the future name (currentProps).
// AND
// the new name is different from the name currently online (ResourceEntry)
// )
//
// ClRtlIsNetNameValid will fail if the name hasn't changed and
// the name is online.
//
// currentProps value is NULL only when the name is created and
// hasn't had its Name property set, i.e., no data in the
// registry. Once brought online, the currentProps value is always
// non-NULL hence no need to test if the pointer is valid.
//
if ( ResourceEntry->Params.NetworkName == NULL ) {
if ( currentName == NULL ) {
validateName = TRUE;
} else if ( ClRtlStrICmp( pParams->NetworkName, currentName ) != 0 ) {
validateName = TRUE;
}
}
else if ( ClRtlStrICmp( pParams->NetworkName, currentName ) != 0
&&
ClRtlStrICmp( pParams->NetworkName, ResourceEntry->Params.NetworkName ) != 0
)
{
validateName = TRUE;
}
if ( validateName ) {
*NewNameIsDifferent = TRUE;
//
// Validate the syntax of the new name
//
if ( !ClRtlIsNetNameValid( pParams->NetworkName, &netnameStatus, TRUE /* CheckIfExists */ ) ) {
switch ( netnameStatus ) {
case NetNameTooLong:
status = RPC_S_STRING_TOO_LONG;
break;
case NetNameInUse:
status = ERROR_DUP_NAME;
break;
case NetNameDNSNonRFCChars:
//
// we leave it up to the calling application to do the
// validation and ask the user if non-RFC chars
// (underscores) are acceptable.
//
status = ERROR_SUCCESS;
break;
case NetNameInvalidChars:
default:
status = ERROR_INVALID_NETNAME;
break;
}
}
} // end if validateName
if ( status == ERROR_SUCCESS // everything is ok so far
&&
ResourceEntry->Params.CreatingDC != NULL // we have a CO
&&
pParams->RequireKerberos != 0 // and we're not disabling kerb
)
{
//
// check if the new name is different from the stored name. If
// so, inform the caller that the CO needs to be renamed.
//
*CompObjRenameIsRequired = ClRtlStrICmp( pParams->NetworkName, currentName );
}
#if 0
//
// ISSUE: not sure how to handle this. Under some circumstances,
// we want the resource to hijack the object but under others we
// don't. Most of the problem stems from having two resources with
// the same Name property and they are both offline. One
// possibility is to run the list of resources on this cluster and
// see if there are any dups but that isn't always effective since
// the NetworkName field in ResourceEntry->Params might be
// NULL. This still wouldn't work for a cluster in the same domain
// using the same name and it was offline.
//
// for now, we'll avoid this check to avoid causing a situation
// where it is valid to set the Name property but it would be
// disallowed by this check.
//
if ( status == ERROR_SUCCESS // everything is ok so far
&&
pParams->RequireKerberos // RK is set to one
&&
*NewNameIsDifferent // and we're changing the name
)
{
BOOL objectExists;
HRESULT hr;
//
// check if the new name has a corresponding computer object
// and fail it it does. We allow hijacking of a CO only if
// RequireKerberos was zero and is now one or if the resource
// has never created a CO.
//
hr = IsComputerObjectInDS(ResourceEntry->ResourceHandle,
ResourceEntry->NodeName,
pParams->NetworkName,
NULL,
&objectExists,
NULL, // don't need FQDN
NULL); // don't need HostingDCName
if ( SUCCEEDED( hr ) && objectExists ) {
status = E_ADS_OBJECT_EXISTS;
}
else {
//
// check if the new name is different from the stored
// name. If so, inform the caller that the CO needs to be
// renamed. This handles the case where the name was
// changed and then changed back to what it originally
// was. The first rename caused a CO rename so we have to
// undo that operation.
//
if ( currentProps.NetworkName != NULL ) {
*CompObjRenameIsRequired = ClRtlStrICmp( pParams->NetworkName, currentProps.NetworkName );
}
} // end of there is no existing object
} // end of if successful so far and RK is set to one and new name is different
#endif // 0
if ( currentName != currentProps.NetworkName ) {
LocalFree( currentName );
}
} // end of if currentName != NULL
} // end of if successful so far and new name is specified
FnExit:
//
// Cleanup our parameter block.
//
if (( status != ERROR_SUCCESS && pParams != NULL )
||
pParams == &newProps
)
{
ResUtilFreeParameterBlock( (LPBYTE) pParams,
(LPBYTE) &currentProps,
NetNameResourcePrivateProperties );
}
ResUtilFreeParameterBlock(
(LPBYTE) &currentProps,
NULL,
NetNameResourcePrivateProperties
);
return(status);
} // NetNameValidatePrivateResProperties
DWORD
NetNameSetPrivateResProperties(
IN OUT PNETNAME_RESOURCE ResourceEntry,
IN PVOID InBuffer,
IN DWORD InBufferSize
)
/*++
Routine Description:
Processes the CLUSCTL_RESOURCE_SET_PRIVATE_PROPERTIES control function
for resources of type Network Name.
Arguments:
ResourceEntry - Supplies the resource entry on which to operate.
InBuffer - Supplies a pointer to a buffer containing the property list of
changed property values to set.
InBufferSize - Supplies the size, in bytes, of the data pointed
to by InBuffer.
Return Value:
ERROR_SUCCESS - The function completed successfully.
ERROR_INVALID_PARAMETER - The data is formatted incorrectly.
ERROR_NOT_ENOUGH_MEMORY - An error occurred allocating memory.
Win32 error code - The function failed.
--*/
{
DWORD status = ERROR_SUCCESS;
BOOL newNameIsDifferent = FALSE;
BOOL disablingKerberos;
BOOL compObjNeedsRenaming = FALSE;
LPWSTR creatingDC = NULL;
BOOL coreName = ResourceEntry->dwFlags & CLUS_FLAG_CORE;
NETNAME_PARAMS params;
ZeroMemory( &params, sizeof(NETNAME_PARAMS) );
//
// Parse the properties so they can be validated together.
// This routine does individual property validation.
//
status = NetNameValidatePrivateResProperties( ResourceEntry,
InBuffer,
InBufferSize,
&params,
&newNameIsDifferent,
&compObjNeedsRenaming);
if ( status != ERROR_SUCCESS ) {
return(status);
}
//
// If network name is one of the parameters to be set, convert the name
// to uppercase.
//
if ( params.NetworkName != NULL ) {
_wcsupr( params.NetworkName );
}
//
// if kerb is currently required and we're turning it off, then note that
// now.
//
disablingKerberos = ( ResourceEntry->Params.RequireKerberos && !params.RequireKerberos );
if ( ResourceEntry->State == ClusterResourceOnline ||
ResourceEntry->State == ClusterResourceOnlinePending )
{
//
// If the resource is online, remember that the name property has
// truly changed (it can change and then be set back to its original
// value while online). When the resource goes offline, this flag is
// used to cleanup stuff with the old name.
//
ResourceEntry->NameChangedWhileOnline = newNameIsDifferent;
status = ERROR_RESOURCE_PROPERTIES_STORED;
}
else {
//
// read the CreatingDC parameter. If it is NULL, then that indicates
// that no CO has been created for this name.
//
creatingDC = ResUtilGetSzValue( ResourceEntry->ParametersKey, PARAM_NAME__CREATING_DC );
if ( creatingDC == NULL ) {
status = GetLastError();
if ( status != ERROR_FILE_NOT_FOUND ) {
goto cleanup;
}
status = ERROR_SUCCESS;
}
if ( newNameIsDifferent ) {
//
// name change; try to cleanup the old name's DNS records
//
RemoveDnsRecords( ResourceEntry );
}
//
// do renaming first before disabling the CO: you can't rename a
// disabled CO via NetUserSetInfo
//
if ( compObjNeedsRenaming && creatingDC ) {
LPWSTR currentName;
if ( coreName ) {
currentName = ResUtilGetSzValue( ResourceEntry->ResKey, PARAM_NAME__CORECURRENTNAME );
if ( currentName == NULL ) {
//
// this is bad; we've lost track of the old name for the
// core resource so we can't rename it
//
status = GetLastError();
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_ERROR,
L"Unable to find core resource's current name. status %1!u!\n",
status );
}
}
else {
//
// get the name parameter out of the registry since it
// represents the current setting, i.e., if the name is
// changed multiple times while the resource is offline, the
// registry holds the last value.
//
currentName = ResUtilGetSzValue( ResourceEntry->ParametersKey, PARAM_NAME__NAME );
if (currentName == NULL) {
status = GetLastError();
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_ERROR,
L"Unable to read NetworkName parameter to rename computer "
L"account, status %1!u!\n",
status);
}
}
if ( currentName != NULL ) {
status = RenameComputerObject( ResourceEntry, currentName, params.NetworkName );
LocalFree( currentName );
}
}
if ( status == ERROR_SUCCESS && disablingKerberos ) {
if ( creatingDC ) {
status = DisableComputerObject( ResourceEntry );
if ( status == NERR_UserNotFound ) {
//
// it's not an error if the CO is already gone
//
status = ERROR_SUCCESS;
}
else if ( status != NERR_Success ) {
//
// failed for some reason (probably access denied).
//
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_WARNING,
L"Unable to disable computer account for %1!ws!. Kerberos authentication "
L"to this name will fail. Set RequireKerberos back to one or, if "
L"appropriate, delete the CO from Active Directory. status %2!u!\n",
ResourceEntry->Params.NetworkName,
status );
}
} // end of if creatingDC != NULL
//
// clean up the resource's param block; delete the creating DC
// property so we don't think that we still have a CO. Do the
// cluster registry stuff first to make sure the resource will
// work the next time it goes online.
//
status = ClusterRegDeleteValue(ResourceEntry->ParametersKey,
PARAM_NAME__CREATING_DC);
if ( status == ERROR_SUCCESS || status == ERROR_FILE_NOT_FOUND ) {
status = ClusterRegDeleteValue(ResourceEntry->ParametersKey,
PARAM_NAME__RESOURCE_DATA);
if ( status == ERROR_SUCCESS || status == ERROR_FILE_NOT_FOUND ) {
ResourceEntry->Params.RequireKerberos = 0;
if ( ResourceEntry->Params.CreatingDC != NULL ) {
LocalFree( ResourceEntry->Params.CreatingDC );
ResourceEntry->Params.CreatingDC = NULL;
}
if ( ResourceEntry->Params.ResourceData != NULL ) {
LocalFree( ResourceEntry->Params.ResourceData );
ResourceEntry->Params.ResourceData = NULL;
}
RemoveNNCryptoCheckpoint( ResourceEntry );
} else {
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_ERROR,
L"Unable to clear the "
PARAM_NAME__RESOURCE_DATA
L" property for %1!ws!. status %2!u!\n",
ResourceEntry->Params.NetworkName,
status );
}
} else {
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_ERROR,
L"Unable to clear the "
PARAM_NAME__CREATING_DC
L" property for %1!ws!. status %2!u!\n",
ResourceEntry->Params.NetworkName,
status );
}
//
// all this can fail due to lack of access rights; don't make it a
// fatal error for the routine
//
status = ERROR_SUCCESS;
} // end of if disabling Kerberos
if ( creatingDC ) {
//
// free but don't clear the pointer; it is used as a flag later on
// to indicate that we did a rename on a CO
//
LocalFree( creatingDC );
}
} // end if resource state is not online or online pending
if ( coreName && ( status == ERROR_SUCCESS || status == ERROR_RESOURCE_PROPERTIES_STORED )) {
DWORD regStatus;
//
// Remember the name of the core resource in a different area to deal with
// FM changing the Name property as a result of calling SetClusterName.
//
regStatus = ClusterRegSetValue(ResourceEntry->ResKey,
PARAM_NAME__CORECURRENTNAME,
REG_SZ,
(LPBYTE)params.NetworkName,
( wcslen(params.NetworkName) + 1 ) * sizeof(WCHAR) );
if ( regStatus != ERROR_SUCCESS ) {
status = regStatus;
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_ERROR,
L"Failed to write "
PARAM_NAME__CORECURRENTNAME,
L" to registry, status %1!u!\n",
status
);
}
}
if ( status == ERROR_SUCCESS || status == ERROR_RESOURCE_PROPERTIES_STORED ) {
DWORD resUtilStatus;
//
// Save the parameter values.
//
resUtilStatus = ResUtilSetPropertyParameterBlock(ResourceEntry->ParametersKey,
NetNameResourcePrivateProperties,
NULL,
(LPBYTE) &params,
InBuffer,
InBufferSize,
NULL );
if ( resUtilStatus == ERROR_SUCCESS && newNameIsDifferent ) {
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_INFORMATION,
L"Name property changed from %1!ws! to %2!ws!\n",
ResourceEntry->Params.NetworkName,
params.NetworkName);
ClusResLogSystemEventByKey2( ResourceEntry->ResKey,
LOG_NOISE,
RES_NETNAME_RENAME,
ResourceEntry->Params.NetworkName,
params.NetworkName);
} else {
status = resUtilStatus;
}
}
if ( compObjNeedsRenaming && creatingDC ) {
DWORD deleteStatus;
//
// ok to whack RenameNewName from the registry
//
deleteStatus = ClusterRegDeleteValue( ResourceEntry->ResKey, PARAM_NAME__RENAMENEWNAME );
if ( deleteStatus != ERROR_SUCCESS && deleteStatus != ERROR_FILE_NOT_FOUND ) {
(NetNameLogEvent)(ResourceEntry->ResourceHandle,
LOG_WARNING,
L"Failed to delete "
PARAM_NAME__RENAMENEWNAME
L" from registry - status %1!u!\n",
deleteStatus);
}
}
cleanup:
ResUtilFreeParameterBlock( (LPBYTE) &params,
(LPBYTE) &ResourceEntry->Params,
NetNameResourcePrivateProperties );
return status;
} // NetNameSetPrivateResProperties
//***********************************************************
//
// Define Function Table
//
//***********************************************************
CLRES_V1_FUNCTION_TABLE( NetNameFunctionTable, // Name
CLRES_VERSION_V1_00, // Version
NetName, // Prefix
NULL, // Arbitrate
NULL, // Release
NetNameResourceControl, // ResControl
NetNameResourceTypeControl ); // ResTypeControl