summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2010-01-14s3 selftest: Fix LOOKUP_SID test.Kai Blin1-4/+12
WINBINDD_LIST_USERS does not give a domain name if we're a DC and the user is from our domain.
2010-01-14s3 selftest: Fix WINBINDD_LIST_GROUPS testKai Blin1-9/+22
If there's no groups in the database, there are no entries in extra_data. This caused WINBINDD_LIST_GROUPS test to fail. Use the fact that WINBINDD_LIST_GROUPS now reports the number of groups in data.num_entries to identify the "no groups" case.
2010-01-14s3 winbindd: Return number of groups in data.num_entries for ↵Kai Blin1-1/+3
WINBINDD_LIST_GROUPS This allows to test if there's something wrong with the group list in extra_data or if there's simply no groups in the database. Volker, please check.
2010-01-14s3 selftest: Allow the enumeration of users and groupsKai Blin2-1/+3
This fixes the WINBINDD_GETPWENT test.
2010-01-14s3 selftest: Fix the WINBINDD_GETDCNAMEe test.Kai Blin1-0/+10
The WINBINDD_GETDCNAME test expected an NSS_STATUS_SUCCESS return from all calls. However, this does not apply for BUILTIN and the DC's own domain. Make the test work again by skipping those two.
2010-01-14s3 winbindd: Get WINBINDD_CHECK_MACHACC torture test to work again.Kai Blin1-1/+4
WINBINDD_CHECK_MACHACC used to report an NTSTATUS error and appropriate error strings. Make this work again.
2010-01-14s4:provision_users.ldif - Add a comment that some objects under "Users" are ↵Matthias Dieter Wallnöfer1-0/+3
now located elsewhere This is needed due to the new RID/SID distribution system
2010-01-14s4:provision_users.ldif - Add objects for IISMatthias Dieter Wallnöfer1-0/+21
Some WSPP locations point out that beginning with Windows Server 2008 they're also per default present. Compared against Windows Server 2008
2010-01-14s4:provision_users.ldif - Add additional BUILTIN objectsMatthias Dieter Wallnöfer1-0/+30
Compared against Windows Server 2008
2010-01-14s4:provision_users.ldif - add the restant part of the objects needing for ↵Matthias Dieter Wallnöfer1-0/+26
RODC support RODC = Read Only Domain Controllers Compared against Windows Server 2008
2010-01-14s4:provision_users.ldif - Fix up errors on existing entriesMatthias Dieter Wallnöfer1-6/+8
Compared against Windows Server 2008
2010-01-14s4:provision_users.ldif - Simple reorderingMatthias Dieter Wallnöfer1-70/+70
Sorted according the SID - easier for later enhancements.
2010-01-14s4:provision_users.ldif - Remove system objects from the wrong placeMatthias Dieter Wallnöfer1-27/+0
Objects like the "Cryptographic Operators", "Event Log Readers" don't belong here but into the builtin domain.
2010-01-14s4:SAMR RPC - Fix the criteria for group searchesMatthias Dieter Wallnöfer1-4/+4
This should match the MS-SAMR documentation (section 3.1.5.5.1.1)
2010-01-14s4-idl: get rid of the operation specific DRS options flagsAndrew Tridgell4-351/+46
It was confusing to have several sets of incomplete options when WSPP uses a single set.
2010-01-14s4-torture: switch smbtorture to the generic DRS optionsAndrew Tridgell1-4/+4
2010-01-14s4-drs: switch the DRS server to the generic DRS options flagsAndrew Tridgell2-8/+8
2010-01-14s4-torture: switch to generic DRS options flagsAndrew Tridgell1-3/+2
2010-01-14s4-drepl: switch drepl over to using the generic DRS options flagsAndrew Tridgell2-7/+5
WSPP uses a single set of flags for all these DRS operations.
2010-01-14s4-idl: update the DRS_OPTIONS bits based on the latest WSPP docsAndrew Tridgell1-2/+10
2010-01-14s4-drs: Uses dsdb_load_partition_usn() with urgent_uSN in s4 codeFernando J V da Silva1-1/+1
Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-01-14s4-drs: Store uSNUrgent for Urgent ReplicationFernando J V da Silva4-18/+121
When a object or attribute is created/updated/deleted, according to [MS-ADTS] 3.1.1.5.1.6, it stores the uSNUrgent on @REPLCHANGED for the partitions that it belongs. Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-01-14s3:pdb_ldap: restore Samba 3.0.x behavior and use the first "uid" value.Stefan Metzmacher1-1/+1
See bug #6157 for more details. metze Signed-off-by: Stefan Metzmacher <metze@samba.org> (cherry picked from commit 25806f43ddee7e2653e907eea2c6fcc075960fa1)
2010-01-14s3:smbldap: add smbldap_talloc_first_attribute()Stefan Metzmacher2-0/+37
metze Signed-off-by: Stefan Metzmacher <metze@samba.org> (cherry picked from commit c992127f8a96c37940a6d298c7c6859c47f83d9b)
2010-01-13s4:dsdb: use validate_update moduleStefan Metzmacher1-0/+1
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_OID_validate_ldb()Stefan Metzmacher1-13/+50
This is a very heavy weight way of checking this syntax, but it's very complex and using the existing function should be ok for now. We can optimize it later. metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_DN_STRING_validate_ldb()Stefan Metzmacher1-1/+48
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_DN_BINARY_validate_ldb()Stefan Metzmacher1-2/+49
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_DN_validate_ldb()Stefan Metzmacher1-1/+139
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_PRESENTATION_ADDRESS_validate_ldb()Stefan Metzmacher1-1/+12
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_UNICODE_validate_ldb()Stefan Metzmacher1-1/+69
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_DATA_BLOB_validate_ldb()Stefan Metzmacher1-8/+61
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_NTTIME_validate_ldb()Stefan Metzmacher1-1/+37
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_NTTIME_UTC_validate_ldb()Stefan Metzmacher1-1/+49
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_INT64_validate_ldb()Stefan Metzmacher1-1/+47
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_INT32_validate_ldb()Stefan Metzmacher1-1/+48
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_BOOL_validate_ldb()Stefan Metzmacher1-1/+30
metze
2010-01-13s4:dsdb: add validate_update moduleStefan Metzmacher2-1/+130
metze
2010-01-13s4:dsdb/schema: add inftrastructure for dsdb_validate_ldb()Stefan Metzmacher2-0/+61
metze
2010-01-13s4:dsdb/schema: add dsdb_syntax_DN_STRING_* wrappersStefan Metzmacher1-2/+30
metze
2010-01-13s4:dsdb/resolve_oids: also resolve oid in search attribute listStefan Metzmacher1-4/+55
metze
2010-01-13s4:dsdb/schema_load: add a TODO about schema reloadingStefan Metzmacher1-1/+11
metze
2010-01-13s4:ldb/tests: do a "schemaUpdateNow" after creating a new attribute in ↵Stefan Metzmacher1-0/+10
ldap_schema.py It seems that windows doesn't need that. And we should think about a check for reloading the schema at the start of each "write" operation. metze
2010-01-13s4:dsdb/repl: reorder dreplsrv_op_notify* functionsStefan Metzmacher1-53/+50
This make the whole async dreplsrv_op_notify_send/recv() readable. metze
2010-01-13s4:dsdb/repl: change dreplsrv_op_notify_send/recv() to tevent_reqStefan Metzmacher2-70/+74
metze
2010-01-13s4:dsdb/common: fix major bug in lsa_BinaryString to ldb_val conversation.Stefan Metzmacher1-2/+2
In lsa_BinaryString length and size are byte counts! TODO: we may need to do byte order conversion in this functions too... metze
2010-01-13s4:ldb_msg: first try to decode integers as signed and then fallback to unsignedStefan Metzmacher1-0/+18
LDAP only knowns about signed integers, so let ldb_msg_find_attr_as_uint() and ldb_msg_find_attr_as_uint64() cope with it. metze
2010-01-13s4:dsdb/common: let samdb_msg_add_uint() call samdb_msg_add_int()Stefan Metzmacher1-2/+1
This is important as LDAP servers always play with int32 values and we have to encode 0x80000000 as "-2147483648" instead of "2147483648". metze
2010-01-13s4:dsdb/common: let samdb_msg_add_uint64() call samdb_msg_add_int64()Stefan Metzmacher1-2/+1
This is important as LDAP servers always play with int64 values and we have to encode 0x8000000000000000LL as "-9223372036854775808" instead of "9223372036854775808". metze
2010-01-13s4:ldb: be more strict in parsing ldb time stringsStefan Metzmacher1-4/+4
metze