summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2012-08-27s4-torture: Test for #9058Volker Lendecke2-0/+73
Signed-off-by: Stefan Metzmacher <metze@samba.org> Autobuild-User(master): Stefan Metzmacher <metze@samba.org> Autobuild-Date(master): Mon Aug 27 17:43:09 CEST 2012 on sn-devel-104
2012-08-25s4:winbind: let wb_update_rodc_dns_send/recv use netlogon_queue (bug #9097)Stefan Metzmacher1-3/+30
metze Autobuild-User(master): Stefan Metzmacher <metze@samba.org> Autobuild-Date(master): Sat Aug 25 05:06:18 CEST 2012 on sn-devel-104
2012-08-25s4:winbind: let wb_sam_logon_send/recv() use the netlogon_queue (bug #9097)Stefan Metzmacher1-3/+30
metze
2012-08-25s4:winbind: add a netlogon_queue (tevent_queue)Stefan Metzmacher2-0/+12
This will protect the netlogon_creds later. metze
2012-08-25s4:winbind: convert wb_update_rodc_dns_send/recv to tevent_reqStefan Metzmacher2-78/+122
metze
2012-08-25s4:winbind: convert wb_sam_logon_send/recv to tevent_reqStefan Metzmacher3-93/+140
metze
2012-08-25s4:winbind: convert wb_sid2domain to tevent_req internallyStefan Metzmacher1-74/+174
The public wrapper still uses composite_context, because I don't have time to fix all the callers... metze
2012-08-25s4:librpc/rpc: don't do async requests if gensec doesn't support async ↵Stefan Metzmacher1-0/+32
replies (bug #9097) metze
2012-08-25s4:librpc/rpc: also call dcerpc_schedule_io_trigger() after bind and ↵Stefan Metzmacher1-0/+7
alter_context responses metze
2012-08-25s4:librpc/rpc: use dcerpc_req_dequeue() in dcerpc_request_recv_data()Stefan Metzmacher1-1/+1
metze
2012-08-25s4:librpc/rpc: use talloc_zero for 'struct rpc_request'Stefan Metzmacher1-11/+1
metze
2012-08-25libcli/smb: split out a smb_transport private libraryStefan Metzmacher1-3/+15
metze
2012-08-25libcli/smb: wscript_build => wscriptStefan Metzmacher1-1/+2
We'll need some configure checks in future. metze
2012-08-24Remove useless bool "upper_case_domain" parameter from ntv2_owf_gen().Jeremy Allison3-13/+3
The code in SMBNTLMv2encrypt_hash() should not be requesting case changes on the domain name. Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Fri Aug 24 21:39:42 CEST 2012 on sn-devel-104
2012-08-24Remove useless bool "upper_case_domain" parameter.Jeremy Allison1-13/+2
2012-08-24Move uppercasing the domain out of smb_pwd_check_ntlmv2()Jeremy Allison1-9/+21
Allows us to remove a silly bool parameter. Based on work done by "Blohm, Guntram (I/FP-37, extern)" <extern.guntram.blohm@audi.de>.
2012-08-24s3:lib: make sure we don't try to send messages to server_id's marked as ↵Stefan Metzmacher1-0/+4
disconnected metze Autobuild-User(master): Stefan Metzmacher <metze@samba.org> Autobuild-Date(master): Fri Aug 24 15:54:48 CEST 2012 on sn-devel-104
2012-08-24s3:lib: remove unused processes_exist()Stefan Metzmacher1-70/+0
metze
2012-08-24s3:lib: readd the CTDB_CONTROL_CHECK_SRVIDS optimization to serverids_exist()Stefan Metzmacher1-0/+45
metze
2012-08-24s3:lib: only loop over the server_ids we need to verify in serverids_exist()Stefan Metzmacher1-11/+23
metze
2012-08-24s3:lib: use server_id_is_disconnected() in serverids_exist()Stefan Metzmacher1-0/+4
metze
2012-08-24s3:lib: inline processes_exist() into serverids_exist()Stefan Metzmacher1-14/+99
metze
2012-08-24s3:lib: SERVERID_UNIQUE_ID_NOT_TO_VERIFY only means not to verify the ↵Stefan Metzmacher1-3/+4
'unique_id' part It doesn't mean the the server_id is always valid. metze
2012-08-24lib/util: don't SMB_ASSERT() in process_exists_by_pid()Stefan Metzmacher1-1/+3
Just return false... metze
2012-08-24s3:lib: implement process_exists() as wrapper of serverid_exists()Stefan Metzmacher1-14/+2
The changes the behavior of process_exists() it checks the pid.unique_id now, if it's not SERVERID_UNIQUE_ID_NOT_TO_VERIFY. metze
2012-08-24s3:g_lock: use serverid_exists() with SERVERID_UNIQUE_ID_NOT_TO_VERIFYStefan Metzmacher1-1/+10
metze
2012-08-24s3:lib: implement serverid_exists() as wrapper of serverids_exist()Stefan Metzmacher1-30/+5
metze
2012-08-24s3:lib: remove CTDB_CONTROL_CHECK_SRVIDS optimization in serverids_exist() ↵Stefan Metzmacher1-6/+0
for now This will be readded... metze
2012-08-24lib/param: fix usage of 'write list = +Group'Stefan Metzmacher1-2/+8
metze Autobuild-User(master): Björn Jacke <bj@sernet.de> Autobuild-Date(master): Fri Aug 24 11:28:17 CEST 2012 on sn-devel-104
2012-08-23s3: fix compile warning on openindianaBjörn Jacke1-5/+5
Autobuild-User(master): Björn Jacke <bj@sernet.de> Autobuild-Date(master): Thu Aug 23 18:22:13 CEST 2012 on sn-devel-104
2012-08-23crypto/aes_ccm_128: fix compile warning on openindianaBjörn Jacke1-1/+1
2012-08-23s3/registry: fix compile warning on openindianaBjörn Jacke1-1/+1
2012-08-23s4-selftest: Always set vfs objects in selftest smb.confAndrew Bartlett1-2/+2
This sets it for all enviornments, as it is harmless if ntvfs is used and critical if the provision script runs in s3fs mode. Andrew Bartlett Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Thu Aug 23 16:42:41 CEST 2012 on sn-devel-104
2012-08-23s4-selftest: Add test for samba-tool ntacl sysvolcheckAndrew Bartlett1-0/+26
2012-08-23s4-samba-tool: Add samba-tool ntacl sysvolcheck commandAndrew Bartlett2-1/+143
This command verifies that the current on-disk ACLs match the directory and the defaults from provision. Unlike sysvolreset, this does not change any of the permissions. Andrew Bartlett
2012-08-23s3-smbd: Add security_info_wanted argument to get_nt_acl_no_snumAndrew Bartlett5-8/+8
I need to get at the owner, group, DACL and SACL when testing correct ACL storage. Andrew Bartlett
2012-08-23s3-pysmbd: Fix return type of smbd.get_nt_aclAndrew Bartlett1-1/+1
The security_ prefix is stripped off in the python bindings. Andrew Bartlett
2012-08-23s3-smbd: Add talloc_stackframe() to get_nt_acl_no_snum()Andrew Bartlett1-3/+8
This is required because the functions it calls use talloc_tos(). Andrew Bartlett
2012-08-23s4-selftest: Add testing of samba-tool ntacl sysvolresetAndrew Bartlett2-0/+45
2012-08-23param: Add startup checks for valid server role/binary combinationsAndrew Bartlett5-0/+35
This should eliminate confusion from our users about what they can expect to successfully run. Andrew Bartlett
2012-08-23s3-pysmbd: Fix error messageAndrew Bartlett1-2/+2
2012-08-23s4-provision: Fix internal documentationAndrew Bartlett1-0/+1
2012-08-23s3-pysmbd: Allow a mode to be specified for the simple ACLAndrew Bartlett2-28/+33
The additional group for the ACL is now optional. Andrew Bartlett
2012-08-23s4-samba-tool: Add 'samba-tool ntacl sysvolreset' toolAndrew Bartlett1-1/+73
This will reset the NT ACL on the sysvol share to the default from provision, with GPO objects matching the LDAP ACL (as required). Andrew Bartlett
2012-08-23selftest: Add a test of the NT ACL -> posix ACL mapping layer to selftestAndrew Bartlett1-0/+1
2012-08-23selftest: Cope with the multiple possible representations of -1 in posixacl.pyAndrew Bartlett1-28/+29
2012-08-23selftest: Extend posixacl test to check the actual ACLAndrew Bartlett1-2/+274
Needing to be able to write this test is the primary reason I have been reworking the VFS and posix ACL layer over the past few weeks. By exposing the POSIX ACL as a IDL object we can eaisly manipulate it in python, and then verify that the ACL was handled correctly. This ensures the when we write an ACL in provision, that it will indeed allow that access at the FS layer. We need to extend this beyond just the critical two ACLs set during provision, to also include some special (hard) cases involving the merging of ACE entries, as this is the most delicate part of the ACL transfomation. A similar test should also be written to read the posix ACL and the mapped NT ACL on a file that has never had an NT ACL set. Andrew Bartlett
2012-08-23selftest: Add a test of the NT ACL -> posix ACL mapping layerAndrew Bartlett1-0/+131
This is the start of what will be a series of tests confirming exactly how some NT ACLs are mapped to posix ACLs. Andrew Bartlett
2012-08-23s4-scripting: Redefine getntacl() as accessing via the smbd VFS or directlyAndrew Bartlett2-6/+11
This allows us to write tests that compare the smbd vfs with what is in the DB or xattr. Andrew Bartlett
2012-08-23s4-provision: set POSIX ACLs to for use with the smbd file server (s3fs)Andrew Bartlett3-53/+94
This handles the fact that smbd will rarely override the POSIX ACL enforced by the kernel. This has caused issues with the creation of group policies by other members of the Domain Admins group. Andrew Bartlett