I implemented the DsExecuteKCC() handling code on kccsrv_execute_kcc().
Signed-off-by: Andrew Tridgell <tridge@samba.org>
We just add a repsFrom entry for all DCs we find that have nTDSDSA
objects, except for ourselves
*/
We just add a repsFrom entry for all DCs we find that have nTDSDSA
objects, except for ourselves
*/
-static NTSTATUS kccsrv_simple_update(struct kccsrv_service *s, TALLOC_CTX *mem_ctx)
+NTSTATUS kccsrv_simple_update(struct kccsrv_service *s, TALLOC_CTX *mem_ctx)
{
struct ldb_result *res;
int ret, i;
{
struct ldb_result *res;
int ret, i;
+static NTSTATUS kccsrv_execute_kcc(struct irpc_message *msg,
+ struct drsuapi_DsExecuteKCC *r)
+{
+ TALLOC_CTX *mem_ctx;
+ NTSTATUS status;
+ struct kccsrv_service *service = talloc_get_type(msg->private_data, struct kccsrv_service);
+
+ mem_ctx = talloc_new(service);
+ status = kccsrv_simple_update(service, mem_ctx);
+
+ if (!NT_STATUS_IS_OK(status)) {
+ DEBUG(0,("kccsrv_simple_update failed - %s\n", nt_errstr(status)));
+ talloc_free(mem_ctx);
+ return status;
+ }
+
+ talloc_free(mem_ctx);
+ return NT_STATUS_OK;
+}
/*
startup the kcc service task
/*
startup the kcc service task
}
irpc_add_name(task->msg_ctx, "kccsrv");
}
irpc_add_name(task->msg_ctx, "kccsrv");
+ IRPC_REGISTER(task->msg_ctx, drsuapi, DRSUAPI_DSEXECUTEKCC, kccsrv_execute_kcc, service);
static WERROR dcesrv_drsuapi_DsExecuteKCC(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx,
struct drsuapi_DsExecuteKCC *r)
{
static WERROR dcesrv_drsuapi_DsExecuteKCC(struct dcesrv_call_state *dce_call, TALLOC_CTX *mem_ctx,
struct drsuapi_DsExecuteKCC *r)
{
- DCESRV_FAULT(DCERPC_FAULT_OP_RNG_ERROR);
+ WERROR status;
+ status = drs_security_level_check(dce_call, "DsExecuteKCC");
+
+ if (!W_ERROR_IS_OK(status)) {
+ return status;
+ }
+
+ dcesrv_irpc_forward_rpc_call(dce_call, mem_ctx, r, NDR_DRSUAPI_DSEXECUTEKCC,
+ &ndr_table_drsuapi, "kccsrv", "DsExecuteKCC");
+ return WERR_OK;