/* get_credentials deals with setting up creds */
- ret = smbldap_init(ctx, winbind_event_context(), ctx->url,
+ ret = smbldap_init(ctx, server_event_context(), ctx->url,
false, NULL, NULL, &ctx->smbldap_state);
if (!NT_STATUS_IS_OK(ret)) {
DEBUG(1, ("ERROR: smbldap_init (%s) failed!\n", ctx->url));
}
/* assume anonymous if we don't have a specified user */
- ret = smbldap_init(mem_ctx, winbind_event_context(), url,
+ ret = smbldap_init(mem_ctx, server_event_context(), url,
(user_dn == NULL), user_dn, secret,
&ctx->smbldap_state);
SAFE_FREE(secret);
* Note we MUST use the NULL context here, not the autofree context,
* to avoid side effects in forked children exiting.
*/
- msg = messaging_init(NULL, winbind_event_context());
+ msg = messaging_init(NULL, server_event_context());
if (msg == NULL) {
smb_panic("Could not init winbindd's messaging context.\n");
}
* Note we MUST use the NULL context here, not the autofree context,
* to avoid side effects in forked children exiting.
*/
- msg = imessaging_init(NULL, lp_ctx, myself, winbind_event_context());
+ msg = imessaging_init(NULL, lp_ctx, myself, server_event_context());
talloc_unlink(NULL, lp_ctx);
if (msg == NULL) {
struct tevent_signal *se;
bool *is_parent;
- is_parent = talloc(winbind_event_context(), bool);
+ is_parent = talloc(server_event_context(), bool);
if (!is_parent) {
return false;
}
*is_parent = parent;
- se = tevent_add_signal(winbind_event_context(),
+ se = tevent_add_signal(server_event_context(),
is_parent,
SIGTERM, 0,
winbindd_sig_term_handler,
return false;
}
- se = tevent_add_signal(winbind_event_context(),
+ se = tevent_add_signal(server_event_context(),
is_parent,
SIGINT, 0,
winbindd_sig_term_handler,
return false;
}
- se = tevent_add_signal(winbind_event_context(),
+ se = tevent_add_signal(server_event_context(),
is_parent,
SIGQUIT, 0,
winbindd_sig_term_handler,
if (foreground) {
struct stat st;
- is_parent = talloc(winbind_event_context(), bool);
+ is_parent = talloc(server_event_context(), bool);
if (!is_parent) {
return false;
}
return false;
}
if (S_ISFIFO(st.st_mode) || S_ISSOCK(st.st_mode)) {
- tevent_add_fd(winbind_event_context(),
+ tevent_add_fd(server_event_context(),
is_parent,
0,
TEVENT_FD_READ,
char *file = NULL;
if (lfile) {
- file = talloc_strdup(winbind_event_context(),
+ file = talloc_strdup(server_event_context(),
lfile);
if (!file) {
return false;
}
}
- se = tevent_add_signal(winbind_event_context(),
- winbind_event_context(),
+ se = tevent_add_signal(server_event_context(),
+ server_event_context(),
SIGHUP, 0,
winbindd_sig_hup_handler,
file);
{
struct tevent_signal *se;
- se = tevent_add_signal(winbind_event_context(),
- winbind_event_context(),
+ se = tevent_add_signal(server_event_context(),
+ server_event_context(),
SIGCHLD, 0,
winbindd_sig_chld_handler,
NULL);
{
struct tevent_signal *se;
- se = tevent_add_signal(winbind_event_context(),
- winbind_event_context(),
+ se = tevent_add_signal(server_event_context(),
+ server_event_context(),
SIGUSR2, 0,
winbindd_sig_usr2_handler,
NULL);
DEBUG(10, ("process_request: Handling async request %d:%s\n",
(int)state->pid, state->cmd_name));
- req = atable->send_req(state->mem_ctx, winbind_event_context(),
+ req = atable->send_req(state->mem_ctx, server_event_context(),
state, state->request);
if (req == NULL) {
DEBUG(0, ("process_request: atable->send failed for "
TALLOC_FREE(state->request);
- req = wb_resp_write_send(state, winbind_event_context(),
+ req = wb_resp_write_send(state, server_event_context(),
state->out_queue, state->sock,
state->response);
if (req == NULL) {
state->cmd_name = "no request";
state->recv_fn = NULL;
- req = wb_req_read_send(state, winbind_event_context(), state->sock,
+ req = wb_req_read_send(state, server_event_context(), state->sock,
WINBINDD_MAX_EXTRA_DATA);
if (req == NULL) {
remove_client(state);
state->privileged = privileged;
- req = wb_req_read_send(state, winbind_event_context(), state->sock,
+ req = wb_req_read_send(state, server_event_context(), state->sock,
WINBINDD_MAX_EXTRA_DATA);
if (req == NULL) {
TALLOC_FREE(state);
return;
}
- req = wait_for_read_send(state, winbind_event_context(), state->sock,
+ req = wait_for_read_send(state, server_event_context(), state->sock,
true);
if (req == NULL) {
DEBUG(0, ("winbind_client_request_read[%d:%s]:"
int rc;
char *socket_path;
- pub_state = talloc(winbind_event_context(),
+ pub_state = talloc(server_event_context(),
struct winbindd_listen_state);
if (!pub_state) {
goto failed;
goto failed;
}
- fde = tevent_add_fd(winbind_event_context(), pub_state, pub_state->fd,
+ fde = tevent_add_fd(server_event_context(), pub_state, pub_state->fd,
TEVENT_FD_READ, winbindd_listen_fde_handler,
pub_state);
if (fde == NULL) {
}
tevent_fd_set_auto_close(fde);
- priv_state = talloc(winbind_event_context(),
+ priv_state = talloc(server_event_context(),
struct winbindd_listen_state);
if (!priv_state) {
goto failed;
goto failed;
}
- fde = tevent_add_fd(winbind_event_context(), priv_state,
+ fde = tevent_add_fd(server_event_context(), priv_state,
priv_state->fd, TEVENT_FD_READ,
winbindd_listen_fde_handler, priv_state);
if (fde == NULL) {
}
tevent_fd_set_auto_close(fde);
- winbindd_scrub_clients_handler(winbind_event_context(), NULL,
+ winbindd_scrub_clients_handler(server_event_context(), NULL,
timeval_current(), NULL);
return true;
failed:
smb_nscd_flush_group_cache();
if (lp_allow_trusted_domains()) {
- if (tevent_add_timer(winbind_event_context(), NULL, timeval_zero(),
+ if (tevent_add_timer(server_event_context(), NULL, timeval_zero(),
rescan_trusted_domains, NULL) == NULL) {
DEBUG(0, ("Could not trigger rescan_trusted_domains()\n"));
exit(1);
*/
status = reinit_after_fork(winbind_messaging_context(),
- winbind_event_context(),
+ server_event_context(),
false, NULL);
if (!NT_STATUS_IS_OK(status)) {
exit_daemon("Winbindd reinit_after_fork() failed", map_errno_from_nt_status(status));
rpc_lsarpc_init(NULL);
rpc_samr_init(NULL);
- winbindd_init_addrchange(NULL, winbind_event_context(),
+ winbindd_init_addrchange(NULL, server_event_context(),
winbind_messaging_context());
/* setup listen sockets */
while (1) {
frame = talloc_stackframe();
- if (tevent_loop_once(winbind_event_context()) == -1) {
+ if (tevent_loop_once(server_event_context()) == -1) {
DEBUG(1, ("tevent_loop_once() failed: %s\n",
strerror(errno)));
return 1;
calc_new_online_timeout_check(domain);
- domain->check_online_event = tevent_add_timer(winbind_event_context(),
+ domain->check_online_event = tevent_add_timer(server_event_context(),
NULL,
timeval_current_ofs(domain->check_online_timeout,0),
check_domain_online_handler,
TALLOC_FREE(domain->check_online_event);
- domain->check_online_event = tevent_add_timer(winbind_event_context(),
+ domain->check_online_event = tevent_add_timer(server_event_context(),
NULL,
tev,
check_domain_online_handler,
if (entry->refresh_time == 0) {
entry->refresh_time = new_start;
}
- entry->event = tevent_add_timer(winbind_event_context(), entry,
+ entry->event = tevent_add_timer(server_event_context(), entry,
timeval_set(new_start, 0),
krb5_ticket_refresh_handler,
entry);
if (entry->refresh_time == 0) {
entry->refresh_time = t.tv_sec;
}
- entry->event = tevent_add_timer(winbind_event_context(),
+ entry->event = tevent_add_timer(server_event_context(),
entry,
t,
krb5_ticket_refresh_handler,
struct timeval t)
{
entry->refresh_time = 0;
- entry->event = tevent_add_timer(winbind_event_context(),
+ entry->event = tevent_add_timer(server_event_context(),
entry,
t,
krb5_ticket_gain_handler,
* the event has the krb5_ticket_gain_handler
*/
if (cur->refresh_time == 0) {
- new_event = tevent_add_timer(winbind_event_context(),
+ new_event = tevent_add_timer(server_event_context(),
cur,
t,
krb5_ticket_gain_handler,
cur);
} else {
- new_event = tevent_add_timer(winbind_event_context(),
+ new_event = tevent_add_timer(server_event_context(),
cur,
t,
krb5_ticket_refresh_handler,
if (!entry->refresh_time) {
entry->refresh_time = t.tv_sec;
}
- entry->event = tevent_add_timer(winbind_event_context(),
+ entry->event = tevent_add_timer(server_event_context(),
entry,
t,
krb5_ticket_refresh_handler,
if (entry->refresh_time == 0) {
entry->refresh_time = t.tv_sec;
}
- entry->event = tevent_add_timer(winbind_event_context(),
+ entry->event = tevent_add_timer(server_event_context(),
entry,
t,
krb5_ticket_refresh_handler,
return;
}
- subreq = wb_simple_trans_send(state, winbind_event_context(), NULL,
+ subreq = wb_simple_trans_send(state, server_event_context(), NULL,
state->child->sock, state->request);
if (tevent_req_nomem(subreq, req)) {
return;
nt_errstr(result)));
}
- child->lockout_policy_event = tevent_add_timer(winbind_event_context(), NULL,
+ child->lockout_policy_event = tevent_add_timer(server_event_context(), NULL,
timeval_current_ofs(3600, 0),
account_lockout_policy_handler,
child);
}
done:
- child->machine_password_change_event = tevent_add_timer(winbind_event_context(), NULL,
+ child->machine_password_change_event = tevent_add_timer(server_event_context(), NULL,
next_change,
machine_password_change_handler,
child);
status = reinit_after_fork(
winbind_messaging_context(),
- winbind_event_context(),
+ server_event_context(),
true, NULL);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0,("reinit_after_fork() failed\n"));
}
child->lockout_policy_event = tevent_add_timer(
- winbind_event_context(), NULL, timeval_zero(),
+ server_event_context(), NULL, timeval_zero(),
account_lockout_policy_handler,
child);
}
if (calculate_next_machine_pwd_change(child->domain->name,
&next_change)) {
child->machine_password_change_event = tevent_add_timer(
- winbind_event_context(), NULL, next_change,
+ server_event_context(), NULL, next_change,
machine_password_change_handler,
child);
}
}
- fde = tevent_add_fd(winbind_event_context(), NULL, state.cli.sock,
+ fde = tevent_add_fd(server_event_context(), NULL, state.cli.sock,
TEVENT_FD_READ, child_handler, &state);
if (fde == NULL) {
DEBUG(1, ("tevent_add_fd failed\n"));
int ret;
TALLOC_CTX *frame = talloc_stackframe();
- ret = tevent_loop_once(winbind_event_context());
+ ret = tevent_loop_once(server_event_context());
if (ret != 0) {
DEBUG(1, ("tevent_loop_once failed: %s\n",
strerror(errno)));
DEBUG(5, ("wb_irpc_DsrUpdateReadOnlyServerDnsRecords called\n"));
return wb_irpc_forward_rpc_call(msg, msg,
- winbind_event_context(),
+ server_event_context(),
req, NDR_WINBIND_DSRUPDATEREADONLYSERVERDNSRECORDS,
"winbind_DsrUpdateReadOnlyServerDnsRecords",
domain, IRPC_CALL_TIMEOUT);
DEBUG(5, ("wb_irpc_SamLogon called\n"));
return wb_irpc_forward_rpc_call(msg, msg,
- winbind_event_context(),
+ server_event_context(),
req, NDR_WINBIND_SAMLOGON,
"winbind_SamLogon",
domain, IRPC_CALL_TIMEOUT);
TALLOC_FREE(frame);
return wb_irpc_forward_rpc_call(msg, msg,
- winbind_event_context(),
+ server_event_context(),
req, NDR_WINBIND_LOGONCONTROL,
"winbind_LogonControl",
domain, 45 /* timeout */);
DEBUG(5, ("wb_irpc_GetForestTrustInformation called\n"));
return wb_irpc_forward_rpc_call(msg, msg,
- winbind_event_context(),
+ server_event_context(),
req, NDR_WINBIND_GETFORESTTRUSTINFORMATION,
"winbind_GetForestTrustInformation",
domain, 45 /* timeout */);
DEBUG(5, ("wb_irpc_SendToSam called\n"));
return wb_irpc_forward_rpc_call(msg, msg,
- winbind_event_context(),
+ server_event_context(),
req, NDR_WINBIND_SENDTOSAM,
"winbind_SendToSam",
domain, IRPC_CALL_TIMEOUT);
* Send a ping down. This implicitly initializes the domain.
*/
- req = wb_domain_request_send(state, winbind_event_context(),
+ req = wb_domain_request_send(state, server_event_context(),
domain, &state->ping_request);
if (req == NULL) {
DEBUG(3, ("wb_domain_request_send failed\n"));
return tevent_req_post(req, ev);
}
- subreq = wb_domain_request_send(state, winbind_event_context(), domain,
+ subreq = wb_domain_request_send(state, server_event_context(), domain,
request);
if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
fstrcpy(request->data.auth_crap.workstation, lp_netbios_name());
}
- subreq = wb_domain_request_send(state, winbind_event_context(), domain,
+ subreq = wb_domain_request_send(state, server_event_context(), domain,
request);
if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
return tevent_req_post(req, ev);
}
- subreq = wb_domain_request_send(state, winbind_event_context(),
+ subreq = wb_domain_request_send(state, server_event_context(),
contact_domain, request);
if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
return tevent_req_post(req, ev);
}
- subreq = wb_domain_request_send(state, winbind_event_context(),
+ subreq = wb_domain_request_send(state, server_event_context(),
domain, request);
if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
break;
}
- subreq = wb_domain_request_send(state, winbind_event_context(), domain,
+ subreq = wb_domain_request_send(state, server_event_context(), domain,
request);
if (tevent_req_nomem(subreq, req)) {
return tevent_req_post(req, ev);
state->request.length = sizeof(state->request);
state->request.cmd = WINBINDD_LIST_TRUSTDOM;
- req = wb_domain_request_send(state, winbind_event_context(),
+ req = wb_domain_request_send(state, server_event_context(),
domain, &state->request);
if (req == NULL) {
DEBUG(1, ("wb_domain_request_send failed\n"));