summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2009-07-15s3: Fix double free in net usershare.Bo Yang1-28/+4
Signed-off-by: Bo Yang <boyang@samba.org>
2009-07-15S3: Small fix to get rid of annoying log message.Bo Yang2-2/+7
Signed-off-by: Bo Yang <boyang@samba.org>
2009-07-15s3: Make smbd aware of permission change of usershare. Since usershare are ↵Bo Yang8-28/+235
relatively volatile and non-previledge users must disconnect from smbd and reconnect to it to make share permission in effect.
2009-07-14s3: make d9c0d58236 better readble and reduce indentationBjörn Jacke1-13/+13
2009-07-14s3: don't make same innetgr check twiceBjörn Jacke1-8/+11
2009-07-14remove all '\n' from ldb_debugSumit Bose19-57/+58
2009-07-14s3-account_policy: add pdb_policy_type enum.Günther Deschner16-166/+179
Guenther
2009-07-14s3-account_policy: remove trailing whitespace.Günther Deschner1-32/+32
Guenther
2009-07-14s3: re-run make idl.Günther Deschner2-1/+7
Guenther
2009-07-14samr: add missing samr_ValidationStatus codes.Günther Deschner1-1/+3
Guenther
2009-07-14reject ACLs with DESC_DACL_PROTECTED on GPFSChristian Ambach1-0/+5
as GPFS does not support the ACE4_FLAG_NO_PROPAGATE NFSv4 flag (which would be the mapping for the DESC_DACL_PROTECTED flag), the status of this flag is currently silently ignored by Samba. That means that if you deselect the "Allow inheritable permissions..." checkbox in Windows' ACL dialog and then apply the ACL, the flag will be back immediately. To make sure that automatic migration with e.g. robocopy does not lead to ACLs silently (and unintentionally) changed, this patch adds an explicit check for this flag and if set, it will return NT_STATUS_NOT_SUPPORTED so errors are shown up on the Windows side and the Administrator is aware of the ACLs not being settable like intended Signed-off-by: Christian Ambach <christian.ambach@de.ibm.com>
2009-07-13Make cli_posix_lock/unlock asynchronous.Jeremy Allison4-63/+247
Jeremy.
2009-07-13Fix set_posix_lock check which had been reversed in the recentJeremy Allison1-1/+1
changes. Jeremy.
2009-07-13s3-pdb_ads: set correct pdb field with the value from 'accountExpires' ↵Günther Deschner1-1/+1
attribute. Guenther
2009-07-13s3:net: Fix Bug #6222. Default to DRSUAPI replication for net rpc vampire keytabStefan Metzmacher1-4/+7
metze Signed-off-by: Günther Deschner <gd@samba.org>
2009-07-13s3-rpc_server: pass down full unix token to map_max_allowed_access().Günther Deschner3-18/+37
Also use unix_token->uid instead of geteuid() when checking for mapping of the SEC_FLAG_MAXIMUM_ALLOWED flag. Guenther
2009-07-13libds: merge the UF<->ACB flag mapping functions.Günther Deschner14-201/+51
Guenther
2009-07-13libds: share UF_ flags between samba3 and 4.Günther Deschner17-169/+86
Guenther
2009-07-13s3:smbd: close_file() handles named pipes just fine, no reason to return ↵Stefan Metzmacher1-5/+0
NOT_SUPPORTED metze
2009-07-13s3:smbd: make smbd_do_qfsinfo() non static for use in SMB2 GetInfoStefan Metzmacher2-8/+17
metze
2009-07-13s3:smbd: split out smbd_do_qfsinfo() from call_trans2qfsinfo()Stefan Metzmacher1-79/+93
metze
2009-07-13s3:smbd: make smbd_do_setfilepathinfo() non static for use in SMB2 SetInfoStefan Metzmacher2-8/+17
metze
2009-07-13s3:smbd: split out smbd_do_setfilepathinfo() from call_trans2setfilepathinfo()Stefan Metzmacher1-188/+216
metze
2009-07-12s3:smbd: start SMB2 GetInfo support for File*Information levelsStefan Metzmacher1-1/+139
TODO: the EA levels are not fully supported. metze
2009-07-12s3:smbd: add support for marshalling SMB2 FileFullEaInformationStefan Metzmacher1-0/+92
metze
2009-07-12s3:smbd: add support for marshalling SMB2 FileAllInformationStefan Metzmacher1-0/+36
metze
2009-07-12s3:smbd: filter out SMB2 specific private query info levels for SMB1Stefan Metzmacher1-0/+9
metze
2009-07-12s3:smbd: make smbd_do_qfilepathinfo() non static for use in SMB2Stefan Metzmacher2-15/+31
metze
2009-07-12s3:smbd: split calculation and mashalling of file index and access_maskStefan Metzmacher1-13/+19
metze
2009-07-12s3:smbd: split out smbd_do_qfilepathinfo() from call_trans2qfilepathinfo()Stefan Metzmacher1-459/+504
This prepares SMB2 GetInfo. metze
2009-07-12s3:smbd: add missing return after reply_nterror()Stefan Metzmacher1-0/+1
metze
2009-07-10Remove reply_unixerror() - no longer needed. Should make Metze's refactoring ↵Jeremy Allison7-87/+79
a lot easier. Jeremy.
2009-07-10Add hash values to the xattr ACLS to determine whenJeremy Allison1-55/+158
an underlying POSIX ACL is changed out from under us. Passes RAW-ACL test up to "invalid owner" problem when trying to create a file owned by Everyone. Now needs porting to modules/vfs_acl_tdb.c Jeremy.
2009-07-10Return 0 domains from enum_trusteddomsVolker Lendecke1-1/+3
2009-07-10Quieten events and tldap debug messagesVolker Lendecke2-2/+2
2009-07-10s3 smb2: Remove unused variableTim Prouty1-1/+0
2009-07-10Fix&Run local-gencacheVolker Lendecke2-4/+2
2009-07-10Fix our base64 implementation for blobs of length 4....Volker Lendecke3-1/+36
The additional length check bit us exactly at 4, removing it. The torture test survives valgrind up to 2000 bytes :-)
2009-07-10s3:smbd: add support for SMB2 LockStefan Metzmacher1-1/+151
metze
2009-07-10s3:smbd: make smbd_do_locking() non staticStefan Metzmacher2-16/+26
metze
2009-07-10s3:smbd: abstract the main locking logic from the LockingAndX parsingStefan Metzmacher1-178/+254
This prepares SMB2 Lock support. metze
2009-07-10s3:smbd: pass down the client pid to smbd_smb2_lock_send()Stefan Metzmacher1-0/+6
metze
2009-07-10s3:smbd: fix parsing of SMB2 Lock requests with lock_count > 1Stefan Metzmacher1-10/+13
We should not reuse the variable 'i'. metze
2009-07-10s3:smbd: fix parsing of invalid SMB2 requests.Stefan Metzmacher1-2/+2
Because of 0 - 2 => 0xFFFFFFFE, we got EMSGSIZE from the tstream layer. And terminate the transport connection. Instead we should let the caller deal with the invalid parameter, when checking the body size. So the caller always gets at least a 2 byte body. metze
2009-07-10Attempt to fix the build -- jlayton, please check!Volker Lendecke1-1/+1
2009-07-09cifs.upcall: use pid value from kernel to determine KRB5CCNAME to useJeff Layton1-12/+75
If the kernel sends the upcall a pid of the requesting process, we can open that process' /proc/<pid>/environ file and scrape the KRB5CCNAME value out of it. Signed-off-by: Jeff Layton <jlayton@redhat.com>
2009-07-09s3: Fix two arguments that broke when plumbing smb_filneame through dos_mode()Tim Prouty1-2/+2
2009-07-09Make escape_ldap_string take a talloc contextVolker Lendecke7-52/+54
2009-07-09s4:dsdb Allow unicodePwd to be set when adding a userAndrew Bartlett1-85/+84
Windows 7 sets it's join password using the unicodePwd attribute (as a quoted, utf16 string), and does so during the LDAPAdd of the object. Previously, this code only handled unicodePwd for modifies. Andrew Bartlett
2009-07-09Add constAndrew Bartlett1-2/+2