s3:smbd: s/struct fd_event/struct tevent_fd
[Samba/gebeck_regimport.git] / source3 / winbindd / winbindd_reconnect.c
blob62bf57ea4add35b04eb2e51f9eb9ea9b77662698
1 /*
2 Unix SMB/CIFS implementation.
4 Wrapper around winbindd_rpc.c to centralize retry logic.
6 Copyright (C) Volker Lendecke 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "winbindd.h"
25 #undef DBGC_CLASS
26 #define DBGC_CLASS DBGC_WINBIND
28 extern struct winbindd_methods msrpc_methods;
30 static bool reconnect_need_retry(NTSTATUS status)
32 if (NT_STATUS_IS_OK(status)) {
33 return false;
36 if (!NT_STATUS_IS_ERR(status)) {
37 return false;
40 if (NT_STATUS_EQUAL(status, NT_STATUS_NONE_MAPPED)) {
41 return false;
44 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) {
45 return false;
48 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_GROUP)) {
49 return false;
52 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_ALIAS)) {
53 return false;
56 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_MEMBER)) {
57 return false;
60 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_DOMAIN)) {
61 return false;
64 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_PRIVILEGE)) {
65 return false;
68 if (NT_STATUS_EQUAL(status, NT_STATUS_NO_MEMORY)) {
69 return false;
72 return true;
75 /* List all users */
76 static NTSTATUS query_user_list(struct winbindd_domain *domain,
77 TALLOC_CTX *mem_ctx,
78 uint32 *num_entries,
79 struct wbint_userinfo **info)
81 NTSTATUS result;
83 result = msrpc_methods.query_user_list(domain, mem_ctx,
84 num_entries, info);
86 if (reconnect_need_retry(result))
87 result = msrpc_methods.query_user_list(domain, mem_ctx,
88 num_entries, info);
89 return result;
92 /* list all domain groups */
93 static NTSTATUS enum_dom_groups(struct winbindd_domain *domain,
94 TALLOC_CTX *mem_ctx,
95 uint32 *num_entries,
96 struct wb_acct_info **info)
98 NTSTATUS result;
100 result = msrpc_methods.enum_dom_groups(domain, mem_ctx,
101 num_entries, info);
103 if (reconnect_need_retry(result))
104 result = msrpc_methods.enum_dom_groups(domain, mem_ctx,
105 num_entries, info);
106 return result;
109 /* List all domain groups */
111 static NTSTATUS enum_local_groups(struct winbindd_domain *domain,
112 TALLOC_CTX *mem_ctx,
113 uint32 *num_entries,
114 struct wb_acct_info **info)
116 NTSTATUS result;
118 result = msrpc_methods.enum_local_groups(domain, mem_ctx,
119 num_entries, info);
121 if (reconnect_need_retry(result))
122 result = msrpc_methods.enum_local_groups(domain, mem_ctx,
123 num_entries, info);
125 return result;
128 /* convert a single name to a sid in a domain */
129 static NTSTATUS name_to_sid(struct winbindd_domain *domain,
130 TALLOC_CTX *mem_ctx,
131 const char *domain_name,
132 const char *name,
133 uint32_t flags,
134 struct dom_sid *sid,
135 enum lsa_SidType *type)
137 NTSTATUS result;
139 result = msrpc_methods.name_to_sid(domain, mem_ctx, domain_name, name,
140 flags, sid, type);
142 if (reconnect_need_retry(result))
143 result = msrpc_methods.name_to_sid(domain, mem_ctx,
144 domain_name, name, flags,
145 sid, type);
147 return result;
151 convert a domain SID to a user or group name
153 static NTSTATUS sid_to_name(struct winbindd_domain *domain,
154 TALLOC_CTX *mem_ctx,
155 const struct dom_sid *sid,
156 char **domain_name,
157 char **name,
158 enum lsa_SidType *type)
160 NTSTATUS result;
162 result = msrpc_methods.sid_to_name(domain, mem_ctx, sid,
163 domain_name, name, type);
165 if (reconnect_need_retry(result))
166 result = msrpc_methods.sid_to_name(domain, mem_ctx, sid,
167 domain_name, name, type);
169 return result;
172 static NTSTATUS rids_to_names(struct winbindd_domain *domain,
173 TALLOC_CTX *mem_ctx,
174 const struct dom_sid *sid,
175 uint32 *rids,
176 size_t num_rids,
177 char **domain_name,
178 char ***names,
179 enum lsa_SidType **types)
181 NTSTATUS result;
183 result = msrpc_methods.rids_to_names(domain, mem_ctx, sid,
184 rids, num_rids,
185 domain_name, names, types);
186 if (reconnect_need_retry(result)) {
187 result = msrpc_methods.rids_to_names(domain, mem_ctx, sid,
188 rids, num_rids,
189 domain_name, names,
190 types);
193 return result;
196 /* Lookup user information from a rid or username. */
197 static NTSTATUS query_user(struct winbindd_domain *domain,
198 TALLOC_CTX *mem_ctx,
199 const struct dom_sid *user_sid,
200 struct wbint_userinfo *user_info)
202 NTSTATUS result;
204 result = msrpc_methods.query_user(domain, mem_ctx, user_sid,
205 user_info);
207 if (reconnect_need_retry(result))
208 result = msrpc_methods.query_user(domain, mem_ctx, user_sid,
209 user_info);
211 return result;
214 /* Lookup groups a user is a member of. I wish Unix had a call like this! */
215 static NTSTATUS lookup_usergroups(struct winbindd_domain *domain,
216 TALLOC_CTX *mem_ctx,
217 const struct dom_sid *user_sid,
218 uint32 *num_groups, struct dom_sid **user_gids)
220 NTSTATUS result;
222 result = msrpc_methods.lookup_usergroups(domain, mem_ctx,
223 user_sid, num_groups,
224 user_gids);
226 if (reconnect_need_retry(result))
227 result = msrpc_methods.lookup_usergroups(domain, mem_ctx,
228 user_sid, num_groups,
229 user_gids);
231 return result;
234 static NTSTATUS lookup_useraliases(struct winbindd_domain *domain,
235 TALLOC_CTX *mem_ctx,
236 uint32 num_sids, const struct dom_sid *sids,
237 uint32 *num_aliases, uint32 **alias_rids)
239 NTSTATUS result;
241 result = msrpc_methods.lookup_useraliases(domain, mem_ctx,
242 num_sids, sids,
243 num_aliases,
244 alias_rids);
246 if (reconnect_need_retry(result))
247 result = msrpc_methods.lookup_useraliases(domain, mem_ctx,
248 num_sids, sids,
249 num_aliases,
250 alias_rids);
252 return result;
255 /* Lookup group membership given a rid. */
256 static NTSTATUS lookup_groupmem(struct winbindd_domain *domain,
257 TALLOC_CTX *mem_ctx,
258 const struct dom_sid *group_sid,
259 enum lsa_SidType type,
260 uint32 *num_names,
261 struct dom_sid **sid_mem, char ***names,
262 uint32 **name_types)
264 NTSTATUS result;
266 result = msrpc_methods.lookup_groupmem(domain, mem_ctx,
267 group_sid, type, num_names,
268 sid_mem, names,
269 name_types);
271 if (reconnect_need_retry(result))
272 result = msrpc_methods.lookup_groupmem(domain, mem_ctx,
273 group_sid, type,
274 num_names,
275 sid_mem, names,
276 name_types);
278 return result;
281 /* find the sequence number for a domain */
282 static NTSTATUS sequence_number(struct winbindd_domain *domain, uint32 *seq)
284 NTSTATUS result;
286 result = msrpc_methods.sequence_number(domain, seq);
288 if (reconnect_need_retry(result))
289 result = msrpc_methods.sequence_number(domain, seq);
291 return result;
294 /* find the lockout policy of a domain */
295 static NTSTATUS lockout_policy(struct winbindd_domain *domain,
296 TALLOC_CTX *mem_ctx,
297 struct samr_DomInfo12 *policy)
299 NTSTATUS result;
301 result = msrpc_methods.lockout_policy(domain, mem_ctx, policy);
303 if (reconnect_need_retry(result))
304 result = msrpc_methods.lockout_policy(domain, mem_ctx, policy);
306 return result;
309 /* find the password policy of a domain */
310 static NTSTATUS password_policy(struct winbindd_domain *domain,
311 TALLOC_CTX *mem_ctx,
312 struct samr_DomInfo1 *policy)
314 NTSTATUS result;
316 result = msrpc_methods.password_policy(domain, mem_ctx, policy);
318 if (reconnect_need_retry(result))
319 result = msrpc_methods.password_policy(domain, mem_ctx, policy);
321 return result;
324 /* get a list of trusted domains */
325 static NTSTATUS trusted_domains(struct winbindd_domain *domain,
326 TALLOC_CTX *mem_ctx,
327 struct netr_DomainTrustList *trusts)
329 NTSTATUS result;
331 result = msrpc_methods.trusted_domains(domain, mem_ctx, trusts);
333 if (reconnect_need_retry(result))
334 result = msrpc_methods.trusted_domains(domain, mem_ctx,
335 trusts);
337 return result;
340 /* the rpc backend methods are exposed via this structure */
341 struct winbindd_methods reconnect_methods = {
342 False,
343 query_user_list,
344 enum_dom_groups,
345 enum_local_groups,
346 name_to_sid,
347 sid_to_name,
348 rids_to_names,
349 query_user,
350 lookup_usergroups,
351 lookup_useraliases,
352 lookup_groupmem,
353 sequence_number,
354 lockout_policy,
355 password_policy,
356 trusted_domains,