|
|
/****************************************************************************/ // sessdir.cpp
//
// TS Session Directory code used by TermSrv.exe.
//
// Copyright (C) 2000 Microsot Corporation
/****************************************************************************/
// precomp.h includes COM base headers.
#define INITGUID
#include "precomp.h"
#pragma hdrstop
#include "icaevent.h"
#include "sessdir.h"
#include <tssd.h>
#pragma warning (push, 4)
#define CLSIDLENGTH 39
#define STORESERVERNAMELENGTH 64
#define CLUSTERNAMELENGTH 64
#define OPAQUESETTINGSLENGTH 256
#define TOTAL_STRINGS_LENGTH 640
#define USERNAME_OFFSET 0
#define DOMAIN_OFFSET 256
#define APPLICATIONTYPE_OFFSET 384
#define SINGLE_SESSION_FLAG 0x1
// Extern defined in icasrv.c.
extern "C" WCHAR gpszServiceName[];
// Extern defined in winsta.c
extern "C" LIST_ENTRY WinStationListHead; // protected by WinStationListLock
extern "C" void PostErrorValueEvent(unsigned EventCode, DWORD ErrVal);
WCHAR g_LocalServerAddress[64];
BOOL g_SessDirUseServerAddr = TRUE;
// Do not access directly. Use *TSSD functions.
//
// These variables are used to manage synchronization with retrieving the
// pointer to the COM object. See *TSSD, below, for details on how they are
// used.
ITSSessionDirectory *g_pTSSDPriv = NULL; CRITICAL_SECTION g_CritSecComObj; CRITICAL_SECTION g_CritSecInitialize; int g_nComObjRefCount = 0; BOOL g_bCritSecsInitialized = FALSE;
// Do not access directly. Use *TSSDEx functions.
//
// These variables are used to manage synchronization with retrieving the
// pointer to the COM object. See *TSSDEx, below, for details on how they are
// used.
ITSSessionDirectoryEx *g_pTSSDExPriv = NULL; int g_nTSSDExObjRefCount = 0;
/****************************************************************************/ // SessDirGetLocalIPAddr
//
// Gets the local IP address of this machine. On success, returns 0. On
// failure, returns a failure code from the function that failed.
/****************************************************************************/ DWORD SessDirGetLocalIPAddr(WCHAR *LocalIP) { DWORD NameSize; unsigned char *tempaddr; WCHAR psServerName[64]; char psServerNameA[64]; NameSize = sizeof(psServerName) / sizeof(WCHAR); if (GetComputerNameEx(ComputerNamePhysicalDnsHostname, psServerName, &NameSize)) { // Temporary code to get an IP address. This should be replaced in the
// fix to bug #323867.
struct hostent *hptr;
// change the wide character string to non-wide
sprintf(psServerNameA, "%S", psServerName);
if ((hptr = gethostbyname(psServerNameA)) == 0) { DWORD Err = WSAGetLastError();
return Err; }
tempaddr = (unsigned char *)*(hptr->h_addr_list); wsprintf(LocalIP, L"%d.%d.%d.%d", tempaddr[0], tempaddr[1], tempaddr[2], tempaddr[3]);
} else { DWORD Err = GetLastError();
return Err; }
return 0; }
/****************************************************************************/ // InitSessionDirectoryEx
//
// Reads values from the registry, and either initializes the session
// directory or updates it, depending on the value of the Update parameter.
/****************************************************************************/ DWORD InitSessionDirectoryEx(bool Update) { DWORD Len; DWORD Type; DWORD DataSize; BOOL hKeyTermSrvSucceeded = FALSE; HRESULT hr; DWORD NameSize; DWORD ErrVal; CLSID TSSDCLSID; CLSID TSSDEXCLSID; LONG RegRetVal; HKEY hKey = NULL; HKEY hKeyTermSrv = NULL; ITSSessionDirectory *pTSSD = NULL; ITSSessionDirectoryEx *pTSSDEx = NULL; BOOL bClusteringActive = FALSE; BOOL bThisServerIsInSingleSessionMode; WCHAR CLSIDStr[CLSIDLENGTH]; WCHAR CLSIDEXStr[CLSIDLENGTH]; WCHAR StoreServerName[STORESERVERNAMELENGTH]; WCHAR ClusterName[CLUSTERNAMELENGTH]; WCHAR OpaqueSettings[OPAQUESETTINGSLENGTH];
if (g_bCritSecsInitialized == FALSE) { ASSERT(FALSE); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_INIT_TSSD, (DWORD) E_OUTOFMEMORY); return (DWORD) E_OUTOFMEMORY; }
// trevorfo: Load only if any 1 loaded protocol needs it? Requires running
// off of StartAllWinStations.
// No more than one thread should be doing initialization.
EnterCriticalSection(&g_CritSecInitialize);
// Load registry keys.
RegRetVal = RegOpenKeyEx(HKEY_LOCAL_MACHINE, REG_CONTROL_TSERVER, 0, KEY_READ, &hKeyTermSrv); if (RegRetVal != ERROR_SUCCESS) { PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_INIT_TSSD, RegRetVal); goto RegFailExit; } else { hKeyTermSrvSucceeded = TRUE; } RegRetVal = RegOpenKeyEx(HKEY_LOCAL_MACHINE, REG_TS_CLUSTERSETTINGS, 0, KEY_READ, &hKey); if (RegRetVal != ERROR_SUCCESS) { DBGPRINT(("TERMSRV: RegOpenKeyEx for ClusterSettings err %u\n", RegRetVal)); goto RegFailExit; }
//
// First, we get the serious settings--active, SD location, and cluster
// name.
//
// If group policy exists for all three, use that. Otherwise, use what
// is in the registry.
//
StoreServerName[0] = L'\0'; ClusterName[0] = L'\0'; OpaqueSettings[0] = L'\0';
if (g_MachinePolicy.fPolicySessionDirectoryActive && g_MachinePolicy.fPolicySessionDirectoryLocation && g_MachinePolicy.fPolicySessionDirectoryClusterName) {
// Copy over parameters
bClusteringActive = g_MachinePolicy.SessionDirectoryActive;
wcsncpy(StoreServerName, g_MachinePolicy.SessionDirectoryLocation, STORESERVERNAMELENGTH); StoreServerName[STORESERVERNAMELENGTH - 1] = '\0';
wcsncpy(ClusterName, g_MachinePolicy.SessionDirectoryClusterName, CLUSTERNAMELENGTH); ClusterName[CLUSTERNAMELENGTH - 1] = '\0';
if (g_MachinePolicy.fPolicySessionDirectoryAdditionalParams) { wcsncpy(OpaqueSettings, g_MachinePolicy.SessionDirectoryAdditionalParams, OPAQUESETTINGSLENGTH); OpaqueSettings[OPAQUESETTINGSLENGTH - 1] = '\0'; }
} else {
Len = sizeof(bClusteringActive); RegQueryValueEx(hKeyTermSrv, REG_TS_SESSDIRACTIVE, NULL, &Type, (BYTE *)&bClusteringActive, &Len);
// Not an error for the name to be absent or empty.
DataSize = sizeof(StoreServerName); RegRetVal = RegQueryValueExW(hKey, REG_TS_CLUSTER_STORESERVERNAME, NULL, &Type, (BYTE *)StoreServerName, &DataSize); if (RegRetVal != ERROR_SUCCESS) { DBGPRINT(("TERMSRV: Failed RegQuery for StoreSvrName - " "err=%u, DataSize=%u, type=%u\n", RegRetVal, DataSize, Type)); }
// Not an error for the name to be absent or empty.
DataSize = sizeof(ClusterName); RegRetVal = RegQueryValueExW(hKey, REG_TS_CLUSTER_CLUSTERNAME, NULL, &Type, (BYTE *)ClusterName, &DataSize); if (RegRetVal != ERROR_SUCCESS) { DBGPRINT(("TERMSRV: Failed RegQuery for ClusterName - " "err=%u, DataSize=%u, type=%u\n", RegRetVal, DataSize, Type)); }
// Not an error for the string to be absent or empty.
DataSize = sizeof(OpaqueSettings); RegRetVal = RegQueryValueExW(hKey, REG_TS_CLUSTER_OPAQUESETTINGS, NULL, &Type, (BYTE *)OpaqueSettings, &DataSize); if (RegRetVal != ERROR_SUCCESS) { DBGPRINT(("TERMSRV: Failed RegQuery for OpaqueSettings - " "err=%u, DataSize=%u, type=%u\n", RegRetVal, DataSize, Type)); } }
//
// Now for the less crucial settings.
//
// Get the setting that determines whether the server's local address is
// visible to the client. Group Policy takes precedence over registry.
//
if (g_MachinePolicy.fPolicySessionDirectoryExposeServerIP) { g_SessDirUseServerAddr = g_MachinePolicy.SessionDirectoryExposeServerIP; } else { Len = sizeof(g_SessDirUseServerAddr); RegRetVal = RegQueryValueEx(hKeyTermSrv, REG_TS_SESSDIR_EXPOSE_SERVER_ADDR, NULL, &Type, (BYTE *)&g_SessDirUseServerAddr, &Len);
if (RegRetVal == ERROR_SUCCESS) { //DBGPRINT(("TERMSRV: RegOpenKeyEx for allow server addr to client %d"
// "\n", g_SessDirUseServerAddr));
} else { DBGPRINT(("TERMSRV: RegQueryValueEx for allow server addr to client" " %d, err %u\n", g_SessDirUseServerAddr, RegRetVal)); } }
// Get the single session per user setting from GP if it's active, otherwise
// from the registry.
if (g_MachinePolicy.fPolicySingleSessionPerUser) { bThisServerIsInSingleSessionMode = g_MachinePolicy.fSingleSessionPerUser; } else { Len = sizeof(bThisServerIsInSingleSessionMode); RegRetVal = RegQueryValueEx(hKeyTermSrv, POLICY_TS_SINGLE_SESSION_PER_USER, NULL, &Type, (BYTE *)&bThisServerIsInSingleSessionMode, &Len);
if (RegRetVal != ERROR_SUCCESS) { DBGPRINT(("TERMSRV: RegQueryValueEx for single session mode" ", Error %u\n", RegRetVal)); } } // Get the CLSID of the session directory object to instantiate.
CLSIDStr[0] = L'\0'; Len = sizeof(CLSIDStr); RegQueryValueEx(hKeyTermSrv, REG_TS_SESSDIRCLSID, NULL, &Type, (BYTE *)CLSIDStr, &Len);
// Get the CLSID of the session directory object to instantiate.
CLSIDEXStr[0] = L'\0'; Len = sizeof(CLSIDEXStr); RegQueryValueEx(hKeyTermSrv, REG_TS_SESSDIR_EX_CLSID, NULL, &Type, (BYTE *)CLSIDEXStr, &Len);
RegCloseKey(hKey); RegCloseKey(hKeyTermSrv);
//
// Configuration loading complete.
//
// See what to do about activation/deactivation.
//
pTSSD = GetTSSD(); if (pTSSD == NULL) { // This is the normal initialization path. If Update is true here, it
// should be treated as a normal initialize because the COM object was
// unloaded.
Update = false; } else { // Clustering is already active. See whether we should deactivate it.
if (bClusteringActive == FALSE) { ReleaseTSSD(); // Once here, once again at the end of the function.
ReleaseTSSDEx(); } } if (bClusteringActive) { // We need to get the local machine's address to pass in to
// the directory.
NameSize = 64; if ((ErrVal = SessDirGetLocalIPAddr(g_LocalServerAddress)) == 0) {
if (wcslen(CLSIDStr) > 0 && SUCCEEDED(CLSIDFromString(CLSIDStr, &TSSDCLSID))) {
// If it's not an update, create the TSSD object.
if (Update == false) { hr = CoCreateInstance(TSSDCLSID, NULL, CLSCTX_INPROC_SERVER, IID_ITSSessionDirectory, (void **)&pTSSD); if (SUCCEEDED(hr)) { if (SetTSSD(pTSSD) != 0) { DBGPRINT(("TERMSRV: InitSessDirEx: Could not set " "TSSD", E_FAIL)); pTSSD->Release(); pTSSD = NULL; hr = E_FAIL; } else { // Add 1 to the ref count because we're gonna use
// it.
pTSSD = GetTSSD(); } } } else { hr = S_OK; } if (SUCCEEDED (hr)) { // Right now the only flag we pass in to session directory
// says whether we are in single-session mode.
DWORD Flags = 0;
Flags |= (bThisServerIsInSingleSessionMode ? SINGLE_SESSION_FLAG : 0x0);
if (Update == false) hr = pTSSD->Initialize(g_LocalServerAddress, StoreServerName, ClusterName, OpaqueSettings, Flags, RepopulateSessionDirectory); else hr = pTSSD->Update(g_LocalServerAddress, StoreServerName, ClusterName, OpaqueSettings, Flags); if (FAILED(hr)) { DBGPRINT(("TERMSRV: InitSessDirEx: Failed %s TSSD, " "hr=0x%X\n", Update ? "update" : "init", hr)); ReleaseTSSD(); PostErrorValueEvent( EVENT_TS_SESSDIR_FAIL_INIT_TSSD, hr); }
} else { DBGPRINT(("TERMSRV: InitSessDirEx: Failed create TSSD, " "hr=0x%X\n", hr)); PostErrorValueEvent( EVENT_TS_SESSDIR_FAIL_CREATE_TSSD, hr); } } else { DBGPRINT(("TERMSRV: InitSessDirEx: Failed get or parse " "CLSID\n")); PostErrorValueEvent( EVENT_TS_SESSDIR_FAIL_GET_TSSD_CLSID, 0);
hr = E_INVALIDARG; } } else { DBGPRINT(("TERMSRV: InitSessDirEx: Failed to get local DNS name, " "lasterr=0x%X\n", ErrVal)); PostErrorValueEvent(EVENT_TS_SESSDIR_NO_COMPUTER_DNS_NAME, ErrVal);
hr = E_FAIL; }
// Initialize the other COM object, but only if the above succeeded.
if (SUCCEEDED(hr)) { if (wcslen(CLSIDEXStr) > 0 && SUCCEEDED(CLSIDFromString(CLSIDEXStr, &TSSDEXCLSID))) { // If it's not an update, create the TSSDEX object.
if (Update == false) { hr = CoCreateInstance(TSSDEXCLSID, NULL, CLSCTX_INPROC_SERVER, IID_ITSSessionDirectoryEx, (void **)&pTSSDEx); if (SUCCEEDED(hr)) { if (SetTSSDEx(pTSSDEx) != 0) { DBGPRINT(("TERMSRV: InitSessDirEx: Could not set " "TSSDEx\n", E_FAIL)); pTSSDEx->Release(); pTSSDEx = NULL; hr = E_FAIL; } } } else hr = S_OK; if (FAILED(hr)) { DBGPRINT(("TERMSRV: InitSessDirEx: Failed create TSSDEx, " "hr=0x%X\n", hr)); PostErrorValueEvent( EVENT_TS_SESSDIR_FAIL_CREATE_TSSDEX, hr); } } else { DBGPRINT(("TERMSRV: InitSessDirEx: Failed get or parse " "CLSIDSDEx\n")); PostErrorValueEvent( EVENT_TS_SESSDIR_FAIL_GET_TSSDEX_CLSID, 0); } } } else { DBGPRINT(("TERMSRV: InitSessDirEx: SessDir not activated\n")); }
if (pTSSD != NULL) ReleaseTSSD();
// Initialization complete--someone else is allowed to enter now.
LeaveCriticalSection(&g_CritSecInitialize); return S_OK;
RegFailExit: // Initialization complete--someone else is allowed to enter now.
LeaveCriticalSection(&g_CritSecInitialize);
if (hKeyTermSrvSucceeded) RegCloseKey(hKeyTermSrv);
return (DWORD) E_FAIL; }
/****************************************************************************/ // InitSessionDirectory
//
// Initializes the directory by loading and initializing the session directory
// object, if load balancing is enabled. We assume COM has been initialized
// on the service main thread as COINIT_MULTITHREADED.
//
// This function should only be called once ever. It is the location of the
// initialization of the critical sections used by this module.
/****************************************************************************/ void InitSessionDirectory() { BOOL br1 = FALSE; BOOL br2 = FALSE;
ASSERT(g_bCritSecsInitialized == FALSE);
// Initialize critical sections.
__try {
// Initialize the provider critical section to preallocate the event
// and spin 4096 times on each try (since we don't spend very
// long in our critical section).
br1 = InitializeCriticalSectionAndSpinCount(&g_CritSecComObj, 0x80001000); br2 = InitializeCriticalSectionAndSpinCount(&g_CritSecInitialize, 0x80001000);
// Since this happens at startup time, we should not fail.
ASSERT(br1 && br2);
if (br1 && br2) { g_bCritSecsInitialized = TRUE; } else { DBGPRINT(("TERMSRV: InitSessDir: critsec init failed\n"));
if (br1) DeleteCriticalSection(&g_CritSecComObj); if (br2) DeleteCriticalSection(&g_CritSecInitialize); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_INIT_TSSD, GetLastError()); }
} __except (EXCEPTION_EXECUTE_HANDLER) {
// Since this happens at startup time, we should not fail.
ASSERT(FALSE);
DBGPRINT(("TERMSRV: InitSessDir: critsec init failed\n"));
if (br1) DeleteCriticalSection(&g_CritSecComObj); if (br2) DeleteCriticalSection(&g_CritSecInitialize);
PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_INIT_TSSD, GetExceptionCode()); }
// Now do the common initialization.
if (g_bCritSecsInitialized) InitSessionDirectoryEx(false); }
/****************************************************************************/ // UpdateSessionDirectory
//
// Updates the session directory with new settings. Assumes COM has been
// initialized.
/****************************************************************************/ DWORD UpdateSessionDirectory() { return InitSessionDirectoryEx(true); }
#define REPOP_FAIL 1
#define REPOP_SUCCESS 0
/****************************************************************************/ // RepopulateSessionDirectory
//
// Repopulates the session directory. Returns REPOP_FAIL (1) on failure,
// REPOP_SUCCESS(0) otherwise.
/****************************************************************************/ DWORD RepopulateSessionDirectory() { DWORD WinStationCount = 0; PLIST_ENTRY Head, Next; DWORD i = 0; HRESULT hr; PWINSTATION pWinStation = NULL; ITSSessionDirectory *pTSSD; WCHAR *wBuffer = NULL;
// If we got here, it should be because of the session directory.
pTSSD = GetTSSD();
if (pTSSD != NULL) {
// Grab WinStationListLock
ENTERCRIT( &WinStationListLock );
Head = &WinStationListHead;
// Count the WinStations I care about.
for ( Next = Head->Flink; Next != Head; Next = Next->Flink ) {
pWinStation = CONTAINING_RECORD( Next, WINSTATION, Links );
switch (pWinStation->State) { case State_Active: case State_Disconnected: case State_Shadow: WinStationCount += 1; break; } }
// Allocate the memory for the structure to pass to the session
// directory.
TSSD_RepopulateSessionInfo *rsi = new TSSD_RepopulateSessionInfo[ WinStationCount];
if (rsi == NULL) { DBGPRINT(("TERMSRV: RepopulateSessDir: mem alloc failed\n"));
// Release WinStationListLock
LEAVECRIT( &WinStationListLock );
goto CleanUp; }
// Allocate string arrays (for now)
wBuffer = new WCHAR[WinStationCount * TOTAL_STRINGS_LENGTH]; if (wBuffer == NULL) { DBGPRINT(("TERMSRV: RepopulateSessDir: mem alloc failed\n"));
// Release WinStationListLock
LEAVECRIT( &WinStationListLock );
delete [] rsi;
goto CleanUp; }
// Set the pointers in the rsi
for ( i = 0; i < WinStationCount; i += 1) { rsi[i].UserName = &(wBuffer[i * TOTAL_STRINGS_LENGTH + USERNAME_OFFSET]); rsi[i].Domain = &(wBuffer[i * TOTAL_STRINGS_LENGTH + DOMAIN_OFFSET]); rsi[i].ApplicationType = &(wBuffer[i * TOTAL_STRINGS_LENGTH + APPLICATIONTYPE_OFFSET]); }
// Now populate the structure to pass in.
// Reset index to 0
i = 0; for ( Next = Head->Flink; Next != Head; Next = Next->Flink ) {
pWinStation = CONTAINING_RECORD( Next, WINSTATION, Links );
ASSERT(i <= WinStationCount);
// There are two sets of information here: First, if the session
// is Active, we can do stuff, then we have an intentional
// fallthrough to the common code used by Disconnected and Active
// sessions for the common stuff. For now, if it's disconnected
// we then call the update function in our COM object.
switch (pWinStation->State) { case State_Active: case State_Shadow: rsi[i].State = 0; // NOTE INTENTIONAL FALLTHROUGH
case State_Disconnected: rsi[i].TSProtocol = pWinStation->Client.ProtocolType; rsi[i].ResolutionWidth = pWinStation->Client.HRes; rsi[i].ResolutionHeight = pWinStation->Client.VRes; rsi[i].ColorDepth = pWinStation->Client.ColorDepth;
// TODO: I don't get it--USERNAME_LENGTH is 20, yet in the csi,
// TODO: it's 256. Likewise, DOMAIN_LENGTH is 17.
wcsncpy(rsi[i].UserName, pWinStation->UserName, USERNAME_LENGTH); rsi[i].UserName[USERNAME_LENGTH] = '\0'; wcsncpy(rsi[i].Domain, pWinStation->Domain, DOMAIN_LENGTH); rsi[i].Domain[DOMAIN_LENGTH] = '\0';
// TODO: Here there is a problem in that the INITIALPROGRAM
// TODO: length is 256 + 1, but the buffer we copy into is
// TODO: 256, hence we lose a character.
wcsncpy(rsi[i].ApplicationType, pWinStation-> Client.InitialProgram, INITIALPROGRAM_LENGTH - 1); rsi[i].ApplicationType[INITIALPROGRAM_LENGTH - 2] = '\0'; rsi[i].SessionID = pWinStation->LogonId; rsi[i].CreateTimeLow = pWinStation->LogonTime.LowPart; rsi[i].CreateTimeHigh = pWinStation->LogonTime.HighPart; if (pWinStation->State == State_Disconnected) { rsi[i].DisconnectionTimeLow = pWinStation->DisconnectTime. LowPart; rsi[i].DisconnectionTimeHigh = pWinStation->DisconnectTime. HighPart; rsi[i].State = 1; } i += 1; break; } }
// Release WinStationListLock
LEAVECRIT( &WinStationListLock );
// Call the session directory provider with our big struct.
hr = pTSSD->Repopulate(WinStationCount, rsi); delete [] rsi; delete [] wBuffer;
if (hr == S_OK) { ReleaseTSSD(); return REPOP_SUCCESS; } else { goto CleanUp; }
CleanUp: ReleaseTSSD(); }
return REPOP_FAIL; }
/****************************************************************************/ // DestroySessionDirectory
//
// Destroys the directory, releasing any COM objects held and other memory
// used. Assumes COM has been initialized.
/****************************************************************************/ void DestroySessionDirectory() { ITSSessionDirectory *pTSSD = NULL; ITSSessionDirectoryEx *pTSSDEx = NULL;
pTSSD = GetTSSD(); pTSSDEx = GetTSSDEx();
if (pTSSD != NULL) { ReleaseTSSD(); ReleaseTSSD(); }
if (pTSSDEx != NULL) { ReleaseTSSDEx(); ReleaseTSSDEx(); } }
/****************************************************************************/ // SessDirNotifyLogon
//
// Called to inform the session directory of session creation.
/****************************************************************************/ void SessDirNotifyLogon(TSSD_CreateSessionInfo *pCreateInfo) { HRESULT hr; ITSSessionDirectory *pTSSD;
pTSSD = GetTSSD();
// We can get called even when the directory is inactive.
if (pTSSD != NULL) { hr = pTSSD->NotifyCreateLocalSession(pCreateInfo); if (FAILED(hr)) { DBGPRINT(("TERMSRV: SessDirNotifyLogon: Call failed, " "hr=0x%X\n", hr)); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_UPDATE, hr); }
ReleaseTSSD(); }
}
/****************************************************************************/ // SessDirNotifyDisconnection
//
// Called on session disconnection to inform the session directory.
/****************************************************************************/ void SessDirNotifyDisconnection(DWORD SessionID, FILETIME DiscTime) { HRESULT hr; ITSSessionDirectory *pTSSD;
pTSSD = GetTSSD(); // We can get called even when the directory is inactive.
if (pTSSD != NULL) { hr = pTSSD->NotifyDisconnectLocalSession(SessionID, DiscTime); if (FAILED(hr)) { DBGPRINT(("TERMSRV: SessDirNotifyDisc: Call failed, " "hr=0x%X\n", hr)); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_UPDATE, hr); }
ReleaseTSSD(); } }
/****************************************************************************/ // SessDirNotifyReconnection
//
// Called on session reconnection to inform the session directory.
/****************************************************************************/ void SessDirNotifyReconnection(TSSD_ReconnectSessionInfo *pReconnInfo) { HRESULT hr; ITSSessionDirectory *pTSSD;
pTSSD = GetTSSD();
// We can get called even when the directory is inactive.
if (pTSSD != NULL) { hr = pTSSD->NotifyReconnectLocalSession(pReconnInfo); if (FAILED(hr)) { DBGPRINT(("TERMSRV: SessDirNotifyReconn: Call failed, " "hr=0x%X\n", hr)); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_UPDATE, hr); }
ReleaseTSSD(); } }
/****************************************************************************/ // SessDirNotifyLogoff
//
// Called on logoff to inform the session directory.
/****************************************************************************/ void SessDirNotifyLogoff(DWORD SessionID) { HRESULT hr; ITSSessionDirectory *pTSSD;
pTSSD = GetTSSD();
// We can get called even when the directory is inactive.
if (pTSSD != NULL) { hr = pTSSD->NotifyDestroyLocalSession(SessionID); if (FAILED(hr)) { DBGPRINT(("TERMSRV: SessDirNotifyLogoff: Call failed, " "hr=0x%X\n", hr)); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_UPDATE, hr); }
ReleaseTSSD(); } }
/****************************************************************************/ // SessDirNotifyReconnectPending
//
// Called to inform the session directory a session should start soon on
// another machine in the cluster (for Directory Integrity Service).
/****************************************************************************/ void SessDirNotifyReconnectPending(WCHAR *ServerName) { HRESULT hr; ITSSessionDirectory *pTSSD;
pTSSD = GetTSSD();
// We can get called even when the directory is inactive.
if (pTSSD != NULL) { hr = pTSSD->NotifyReconnectPending(ServerName); if (FAILED(hr)) { DBGPRINT(("TERMSRV: SessDirNotifyReconnectPending: Call failed, " "hr=0x%X\n", hr)); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_UPDATE, hr); }
ReleaseTSSD(); } }
/****************************************************************************/ // SessDirGetDisconnectedSessions
//
// Returns in the provided TSSD_DisconnectedSessionInfo buffer space
// up to TSSD_MaxDisconnectedSessions' worth of disconnected sessions
// from the session directory. Returns the number of sessions returned, which
// can be zero.
/****************************************************************************/ unsigned SessDirGetDisconnectedSessions( WCHAR *UserName, WCHAR *Domain, TSSD_DisconnectedSessionInfo Info[TSSD_MaxDisconnectedSessions]) { DWORD NumSessions = 0; HRESULT hr; ITSSessionDirectory *pTSSD;
pTSSD = GetTSSD();
// We can get called even when the directory is inactive.
if (pTSSD != NULL) { hr = pTSSD->GetUserDisconnectedSessions(UserName, Domain, &NumSessions, Info); if (FAILED(hr)) { DBGPRINT(("TERMSRV: SessDirGetDiscSessns: Call failed, " "hr=0x%X\n", hr)); PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_QUERY, hr); } ReleaseTSSD(); }
return NumSessions; }
/****************************************************************************/ // SessDirGetLBInfo
//
// Call the SessDirEx COM object interface, using the server address, get
// the opaque load balance info back, will send the info to the client.
/****************************************************************************/ BOOL SessDirGetLBInfo( WCHAR *ServerAddress, DWORD* pLBInfoSize, PBYTE* pLBInfo) { ITSSessionDirectoryEx *pTSSDEx; HRESULT hr; static BOOL EventLogged = FALSE;
*pLBInfoSize = 0; *pLBInfo = NULL;
pTSSDEx = GetTSSDEx();
if (pTSSDEx != NULL) { hr = pTSSDEx->GetLoadBalanceInfo(ServerAddress, (BSTR *)pLBInfo);
if(SUCCEEDED(hr)) { *pLBInfoSize = SysStringByteLen((BSTR)(*pLBInfo)); } else { DBGPRINT(("TERMSRV: SessDirGetLBInfo: Call failed, " "hr=0x%X\n", hr)); if (EventLogged == FALSE) { PostErrorValueEvent(EVENT_TS_SESSDIR_FAIL_LBQUERY, hr); EventLogged = TRUE; } }
ReleaseTSSDEx(); } else { DBGPRINT(("TERMSRV: SessDirGetLBInfo: Call failed, pTSSDEx is NULL ")); hr = E_FAIL; }
return SUCCEEDED(hr); }
#define SERVER_ADDRESS_LENGTH 64
/****************************************************************************/ // IsSameAsCurrentIP
//
// Determines whether the IP address given is the same as the current machine.
// Returning FALSE in case of error is not a problem--the client will
// just get redirected right back here.
/****************************************************************************/ BOOL IsSameAsCurrentIP(WCHAR *SessionIPAddress) { // Get the server adresses.
int RetVal; unsigned long NumericalSessionIPAddr = 0; char achComputerName[256]; DWORD dwComputerNameSize; PBYTE pServerAddrByte; PBYTE pSessionAddrByte; ADDRINFO *AddrInfo, *AI; struct sockaddr_in *pIPV4addr; char AnsiSessionIPAddress[SERVER_ADDRESS_LENGTH];
// Compute integer for the server address.
// First, get ServerAddress as an ANSI string.
RetVal = WideCharToMultiByte(CP_ACP, 0, SessionIPAddress, -1, AnsiSessionIPAddress, SERVER_ADDRESS_LENGTH, NULL, NULL); if (RetVal == 0) { DBGPRINT(("IsSameServerIP: WideCharToMB failed %d\n", GetLastError())); return FALSE; }
// Now, get the numerical server address.
// Now, use inet_addr to turn into an unsigned long.
NumericalSessionIPAddr = inet_addr(AnsiSessionIPAddress); if (NumericalSessionIPAddr == INADDR_NONE) { DBGPRINT(("IsSameServerIP: inet_addr failed\n")); return FALSE; }
pSessionAddrByte = (PBYTE) &NumericalSessionIPAddr;
dwComputerNameSize = sizeof(achComputerName); if (!GetComputerNameA(achComputerName,&dwComputerNameSize)) { return FALSE; }
RetVal = getaddrinfo(achComputerName, NULL, NULL, &AddrInfo); if (RetVal != 0) { DBGPRINT (("Cannot resolve address, error: %d\n", RetVal)); return FALSE; } else { // Compare all server adresses with client till a match is found.
// Currently only works for IPv4.
for (AI = AddrInfo; AI != NULL; AI = AI->ai_next) {
if (AI->ai_family == AF_INET) {
if (AI->ai_addrlen >= sizeof(struct sockaddr_in)) { pIPV4addr = (struct sockaddr_in *) AI->ai_addr; pServerAddrByte = (PBYTE)&pIPV4addr->sin_addr; if (RtlEqualMemory(pSessionAddrByte, pServerAddrByte, 4)) { return TRUE; } } } } }
return FALSE; }
/****************************************************************************/ // SessDirCheckRedirectClient
//
// Performs the set of steps needed to get the client's clustering
// capabilities, get the disconnected session list, and apply client
// redirection policy. Returns TRUE if the client was redirected, FALSE if
// the current WinStation transfer should be continued.
/****************************************************************************/ BOOL SessDirCheckRedirectClient( PWINSTATION pTargetWinStation, TS_LOAD_BALANCE_INFO *pLBInfo) { BOOL rc = FALSE; ULONG ReturnLength; unsigned i, NumSessions; NTSTATUS Status; ITSSessionDirectory *pTSSD;
pTSSD = GetTSSD();
pTargetWinStation->NumClusterDiscSessions = 0;
if (pTSSD != NULL) { if (pLBInfo->bClientSupportsRedirection && !pLBInfo->bRequestedSessionIDFieldValid) { // The client has not been redirected to this machine. See if we
// have disconnected sessions in the database for redirecting.
NumSessions = pTargetWinStation->NumClusterDiscSessions = SessDirGetDisconnectedSessions( pLBInfo->UserName, pLBInfo->Domain, pTargetWinStation->ClusterDiscSessions); if (pTargetWinStation->NumClusterDiscSessions > 0) { // trevorfo: Applying policy here for reconnection to only one session
// (whichever is first). More general policy requires a selection UI at the
// client or in WinLogon.
// Find the first session in the list that matches the
// client's session requirements. Namely, we filter based
// on the client's TS protocol, wire protocol, and application
// type.
for (i = 0; i < NumSessions; i++) { if ((pLBInfo->ProtocolType == pTargetWinStation->ClusterDiscSessions[i]. TSProtocol) && (!_wcsicmp(pLBInfo->InitialProgram, pTargetWinStation->ClusterDiscSessions[i]. ApplicationType))) { break; } } if (i == NumSessions) { TRACE((hTrace,TC_ICASRV,TT_API1, "TERMSRV: SessDirCheckRedir: No matching sessions " "found\n")); } else { // If the session is not on this server, redirect the
// client. See notes above about use of
// _IcaStackIoControl().
if (!IsSameAsCurrentIP(pTargetWinStation-> ClusterDiscSessions[i].ServerAddress)) { BYTE *pRedirInfo, *pRedirInfoStart; BYTE *LBInfo = NULL; DWORD LBInfoSize = 0; DWORD RedirInfoSize = 0; DWORD ServerAddrLen = 0; DWORD DomainSize = 0; DWORD UserNameSize = 0; DWORD PasswordSize = 0; RedirInfoSize = sizeof(TS_CLIENT_REDIRECTION_INFO);
// Setup the server addr
if (g_SessDirUseServerAddr || pLBInfo->bClientRequireServerAddr) { ServerAddrLen = (DWORD)((wcslen(pTargetWinStation-> ClusterDiscSessions[i].ServerAddress) + 1) * sizeof(WCHAR)); RedirInfoSize += (ServerAddrLen + sizeof(ULONG));
DBGPRINT(("TERMSRV: SessDirCheckRedir: size=%d, " "addr=%S\n", ServerAddrLen, (WCHAR *)pTargetWinStation-> ClusterDiscSessions[i].ServerAddress)); } else { DBGPRINT(("TERMSRV: SessDirCheckRedir no server " "address: g_SessDirUseServerAddr = %d, " "bClientRequireServerAddr = %d\n", g_SessDirUseServerAddr, pLBInfo->bClientRequireServerAddr)); }
// Setup the load balance info
if ((pLBInfo->bClientRequireServerAddr == 0) && SessDirGetLBInfo( pTargetWinStation->ClusterDiscSessions[i]. ServerAddress, &LBInfoSize, &LBInfo)) { if (LBInfo) { DBGPRINT(("TERMSRV: SessDirCheckRedir: size=%d, " "info=%S\n", LBInfoSize, (WCHAR *)LBInfo)); RedirInfoSize += (LBInfoSize + sizeof(ULONG)); } } else { DBGPRINT(("TERMSRV: SessDirCheckRedir failed: " "size=%d, info=%S\n", LBInfoSize, (WCHAR *)LBInfo)); }
// Only send domain, username and password info if client
// redirection version is 3 and above
if (pLBInfo->ClientRedirectionVersion >= TS_CLUSTER_REDIRECTION_VERSION3) { //domain
if (pLBInfo->Domain) { DomainSize = (DWORD)(wcslen(pLBInfo->Domain) + 1) * sizeof(WCHAR); RedirInfoSize += DomainSize + sizeof(ULONG); } //username
if (pLBInfo->UserName) { UserNameSize = (DWORD)(wcslen(pLBInfo->UserName) + 1) * sizeof(WCHAR); RedirInfoSize += UserNameSize + sizeof(ULONG); } //password
if (pLBInfo->Password) { PasswordSize = (DWORD)(wcslen(pLBInfo->Password) + 1) * sizeof(WCHAR); RedirInfoSize += PasswordSize + sizeof(ULONG); } }
// Setup the load balance IOCTL
pRedirInfoStart = pRedirInfo = new BYTE[RedirInfoSize];
TS_CLIENT_REDIRECTION_INFO *pClientRedirInfo = (TS_CLIENT_REDIRECTION_INFO *)pRedirInfo;
if (pRedirInfo != NULL) { pClientRedirInfo->SessionID = pTargetWinStation->ClusterDiscSessions[i]. SessionID;
pClientRedirInfo->Flags = 0;
pRedirInfo += sizeof(TS_CLIENT_REDIRECTION_INFO);
if (ServerAddrLen) { *((ULONG UNALIGNED*)(pRedirInfo)) = ServerAddrLen; wcscpy((WCHAR*)(pRedirInfo + sizeof(ULONG)), pTargetWinStation->ClusterDiscSessions[i]. ServerAddress);
pRedirInfo += ServerAddrLen + sizeof(ULONG); pClientRedirInfo->Flags |= TARGET_NET_ADDRESS; }
if (LBInfoSize) { *((ULONG UNALIGNED*)(pRedirInfo)) = LBInfoSize; memcpy((BYTE*)(pRedirInfo + sizeof(ULONG)), LBInfo, LBInfoSize);
pRedirInfo += LBInfoSize + sizeof(ULONG);
pClientRedirInfo->Flags |= LOAD_BALANCE_INFO; }
if (UserNameSize) { *((ULONG UNALIGNED*)(pRedirInfo)) = UserNameSize; wcscpy((WCHAR*)(pRedirInfo + sizeof(ULONG)), pLBInfo->UserName);
pRedirInfo += UserNameSize + sizeof(ULONG);
pClientRedirInfo->Flags |= LB_USERNAME; }
if (DomainSize) { *((ULONG UNALIGNED*)(pRedirInfo)) = DomainSize; wcscpy((WCHAR*)(pRedirInfo + sizeof(ULONG)), pLBInfo->Domain);
pRedirInfo += DomainSize + sizeof(ULONG);
pClientRedirInfo->Flags |= LB_DOMAIN; }
if (PasswordSize) { *((ULONG UNALIGNED*)(pRedirInfo)) = PasswordSize; wcscpy((WCHAR*)(pRedirInfo + sizeof(ULONG)), pLBInfo->Password);
pRedirInfo += PasswordSize + sizeof(ULONG);
pClientRedirInfo->Flags |= LB_PASSWORD; } } else { Status = STATUS_NO_MEMORY;
// The stack returned failure. Continue
// the current connection.
TRACE((hTrace,TC_ICASRV,TT_API1, "TERMSRV: Failed STACK_CLIENT_REDIR, " "SessionID=%u, Status=0x%X\n", pTargetWinStation->LogonId, Status)); PostErrorValueEvent( EVENT_TS_SESSDIR_FAIL_CLIENT_REDIRECT, Status);
goto Cleanup; }
Status = IcaStackIoControl(pTargetWinStation->hStack, IOCTL_TS_STACK_SEND_CLIENT_REDIRECTION, pClientRedirInfo, RedirInfoSize, NULL, 0, &ReturnLength);
if (NT_SUCCESS(Status)) { // Notify session directory
//
// There is a relatively benign race condition here.
// If the second server logs in the user completely,
// it may end up hitting the session directory
// before this statement executes. In that case,
// the directory integrity service may end up
// pinging the machine once.
SessDirNotifyReconnectPending(pTargetWinStation-> ClusterDiscSessions[i].ServerAddress);
// Drop the current connection.
rc = TRUE; } else { // The stack returned failure. Continue
// the current connection.
TRACE((hTrace,TC_ICASRV,TT_API1, "TERMSRV: Failed STACK_CLIENT_REDIR, " "SessionID=%u, Status=0x%X\n", pTargetWinStation->LogonId, Status)); PostErrorValueEvent( EVENT_TS_SESSDIR_FAIL_CLIENT_REDIRECT, Status); } Cleanup: // Cleanup the buffers
if (LBInfo != NULL) { SysFreeString((BSTR)LBInfo); LBInfo = NULL; }
if (pRedirInfo != NULL) { delete [] pRedirInfoStart; pRedirInfoStart = NULL; } } } } } ReleaseTSSD(); }
return rc; }
/****************************************************************************/ // SetTSSD
//
// These three functions ensure protected access to the session directory
// provider at all times. SetTSSD sets the pointer and increments the
// reference count to 1.
//
// SetTSSD returns:
// 0 on success
// -1 if failed because there was still a reference count on the COM object.
// This could happen if set was called too quickly after the final release
// to attempt to delete the object, as there still may be pending calls using
// the COM object.
// -2 if failed because the critical section is not initialized. This
// shouldn't be reached in normal operation, because Init is the only
// function that can call Set, and it bails if it fails the creation of the
// critical section.
/****************************************************************************/ int SetTSSD(ITSSessionDirectory *pTSSD) { int retval = 0;
if (g_bCritSecsInitialized != FALSE) { EnterCriticalSection(&g_CritSecComObj);
if (g_nComObjRefCount == 0) { ASSERT(g_pTSSDPriv == NULL); g_pTSSDPriv = pTSSD; g_nComObjRefCount = 1; } else { DBGPRINT(("TERMSRV: SetTSSD: obj ref count not 0!\n")); retval = -1; }
LeaveCriticalSection(&g_CritSecComObj); } else { ASSERT(g_bCritSecsInitialized == TRUE); retval = -2; }
return retval; }
/****************************************************************************/ // GetTSSD
//
// GetTSSD returns a pointer to the session directory provider, if any, and
// increments the reference count if there is one.
/****************************************************************************/ ITSSessionDirectory *GetTSSD() { ITSSessionDirectory *pTSSD = NULL;
if (g_bCritSecsInitialized != FALSE) { EnterCriticalSection(&g_CritSecComObj);
if (g_pTSSDPriv != NULL) { g_nComObjRefCount += 1; } else { ASSERT(g_nComObjRefCount == 0); }
pTSSD = g_pTSSDPriv; LeaveCriticalSection(&g_CritSecComObj); }
return pTSSD; }
/****************************************************************************/ // ReleaseTSSD
//
// ReleaseTSSD decrements the reference count of the session directory provider
// after a thread has finished using it, or when it is going to be deleted.
//
// If the reference count goes to zero, the pointer to the session directory
// provider is set to NULL.
/****************************************************************************/ void ReleaseTSSD() { ITSSessionDirectory *killthispTSSD = NULL;
if (g_bCritSecsInitialized != FALSE) { EnterCriticalSection(&g_CritSecComObj);
ASSERT(g_nComObjRefCount != 0);
if (g_nComObjRefCount != 0) { g_nComObjRefCount -= 1;
if (g_nComObjRefCount == 0) { killthispTSSD = g_pTSSDPriv; g_pTSSDPriv = NULL; } } LeaveCriticalSection(&g_CritSecComObj); } // Now, release the session directory provider if our temppTSSD is NULL.
// We didn't want to release it while holding the critical section because
// that might create a deadlock in the recovery thread. Well, it did once.
if (killthispTSSD != NULL) killthispTSSD->Release();
}
/****************************************************************************/ // SetTSSDEx
//
// These three functions ensure protected access to the session directory
// provider at all times. SetTSSDEx sets the pointer and increments the
// reference count to 1.
//
// SetTSSDEx returns:
// 0 on success
// -1 if failed because there was still a reference count on the COM object.
// This could happen if set was called too quickly after the final release
// to attempt to delete the object, as there still may be pending calls using
// the COM object.
/****************************************************************************/ int SetTSSDEx(ITSSessionDirectoryEx *pTSSDEx) { int retval = 0; EnterCriticalSection(&g_CritSecComObj);
if (g_nTSSDExObjRefCount == 0) { ASSERT(g_pTSSDExPriv == NULL); g_pTSSDExPriv = pTSSDEx; g_nTSSDExObjRefCount = 1; } else { DBGPRINT(("TERMSRV: SetTSSDEx: obj ref count not 0!\n")); retval = -1; }
LeaveCriticalSection(&g_CritSecComObj);
return retval; }
/****************************************************************************/ // GetTSSDEx
//
// GetTSSDEx returns a pointer to the session directory provider, if any, and
// increments the reference count if there is one.
/****************************************************************************/ ITSSessionDirectoryEx *GetTSSDEx() { ITSSessionDirectoryEx *pTSSDEx = NULL;
if (g_bCritSecsInitialized != FALSE) { EnterCriticalSection(&g_CritSecComObj);
if (g_pTSSDExPriv != NULL) { g_nTSSDExObjRefCount += 1; } else { ASSERT(g_nTSSDExObjRefCount == 0); }
pTSSDEx = g_pTSSDExPriv; LeaveCriticalSection(&g_CritSecComObj); }
return pTSSDEx; }
/****************************************************************************/ // ReleaseTSSDEx
//
// ReleaseTSSDEx decrements the reference count of the session directory
// provider after a thread has finished using it, or when it is going to be
// deleted.
//
// If the reference count goes to zero, the pointer to the session directory
// provider is set to NULL.
/****************************************************************************/ void ReleaseTSSDEx() { ITSSessionDirectoryEx *killthispTSSDEx = NULL; EnterCriticalSection(&g_CritSecComObj);
ASSERT(g_nTSSDExObjRefCount != 0);
if (g_nTSSDExObjRefCount != 0) { g_nTSSDExObjRefCount -= 1;
if (g_nTSSDExObjRefCount == 0) { killthispTSSDEx = g_pTSSDExPriv; g_pTSSDExPriv = NULL; } } LeaveCriticalSection(&g_CritSecComObj);
// Now, release the session directory provider if our temppTSSD is NULL.
// We didn't want to release it while holding the critical section because
// that might create a deadlock in the recovery thread. Well, it did once.
if (killthispTSSDEx != NULL) killthispTSSDEx->Release(); }
#pragma warning (pop)
|