summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2012-05-25s3:smbd: pass smbd_server_connection to should_notify_deferred_opens()Stefan Metzmacher3-3/+3
metze
2012-05-25s3:smbd: move global oplocks vars to smbd_server_connectionStefan Metzmacher3-16/+21
metze
2012-05-25s3:smbd: remove unused get_number_of_exclusive_open_oplocks()Stefan Metzmacher2-10/+0
metze
2012-05-25move VERSION to alpha22Andrew Bartlett1-2/+2
We will change this to beta once we both fix the VERSION parsing scripts and we agree that the next release will indeed be the beta. Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Fri May 25 04:19:30 CEST 2012 on sn-devel-104
2012-05-25WHATSNEW: update for alpha21, and mark as releaseAndrew Bartlett2-9/+9
The plan has changed. This will we hope be the last alpha. Andrew Bartlett
2012-05-25wintest: s3fs is now the default in provisionAndrew Bartlett1-2/+1
2012-05-25doc: Explain our build systems for Samba 4.0Andrew Bartlett1-0/+97
2012-05-25s3:smbd/signing: use smbd_server_connection as talloc parent for its smb1 ↵Stefan Metzmacher1-2/+2
signing state metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Fri May 25 00:23:53 CEST 2012 on sn-devel-104
2012-05-24s3-passdb: Fix negative SID->uid/gid/both cache handlingIra Cooper1-0/+14
-1 uid/gid/both signals a non existent uid/gid/both. Signed-off-by: Stefan Metzmacher <metze@samba.org>
2012-05-24s3:smbd: remove global 'smbd_server_conn' !!!Stefan Metzmacher6-42/+63
For now we still use a global 'global_smbXsrv_connection' in order to pass the connection state to exit_server*(). metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Thu May 24 20:07:20 CEST 2012 on sn-devel-104
2012-05-24s3:smbd: only call file_init_global() in the parent smbdStefan Metzmacher2-2/+6
metze
2012-05-24s3:smbd/files: split file_init_global() out of file_init()Stefan Metzmacher2-13/+35
metze
2012-05-24s3:smbd: remove unused var in smbXsrv_connection_init_tables()Stefan Metzmacher1-2/+0
metze
2012-05-24s4:smb_server/smb: fix talloc_free() bugStefan Metzmacher1-1/+1
ERROR: talloc_free with references at ../source4/smb_server/smb/receive.c:637 reference at ../source4/ntvfs/posix/pvfs_wait.c:86 metze
2012-05-24waf: for MIT krb5 build require kerberos version above 1.9Alexander Bokovoy1-1/+8
MIT krb5 implementation provides sufficient support for features used in Samba 4 starting with 1.9. Require version above when using system MIT krb5 build. Autobuild-User: Alexander Bokovoy <ab@samba.org> Autobuild-Date: Thu May 24 18:15:36 CEST 2012 on sn-devel-104
2012-05-24s3-smbldap: Add API for external callback to perform LDAP bind in smbldapAlexander Bokovoy2-1/+21
In order to support other bind methods, introduce a generic bind callback. When smbldap_state.bind_callback is set, it means there is an alternative way to perform LDAP bind to ldap_simple_bind_s() so call it instead. The call is wrapped in become_root()/unbecome_root() to allow proper permissions in smbd to access needed resources in the callback, for example, credential caches. When run outside smbd, become_root()/unbecome_root() are no-op. The API expectation is similar to ldap_simple_bind_s(). A caller of smbldap API can pass additional information to the callback by setting smbldap_state.bind_callback_data pointer. Both callback and the data pointer elements of smbldap_state structure get cleaned up if someone sets proper credentials on smbldap_state with smbldap_set_creds() so if you are interested in using smbldap_state.bind_dn with the callback, make sure to set callback after credentials are set.
2012-05-24s4/scripting: in MIT build do not install samba-tool, it is not usable yetAlexander Bokovoy2-7/+4
2012-05-24s4-selftest: Demonstrate the correct behaviour between specified usernames ↵Andrew Bartlett1-0/+8
and kerberos ccache This shows that a username/password on the command line must always override any credentials cache in the environment. Andrew Bartlett
2012-05-24auth/credentials: 'workgroup' set via command line will not drop existing ccacheAlexander Bokovoy3-14/+7
The root cause for existing ccache being invalidated was use of global loadparm with 'workgroup' value set as if from command line. However, we don't really need to take 'workgroup' parameter value's nature into account when invalidating existing ccache. When -U is used on the command line, one can specify a password to force ccache invalidation. The commit also reverts previous fix now that root cause is clear.
2012-05-24s3:smbd/msdfs: pass allow_broken_path to resolve_dfspath_wcard()Stefan Metzmacher4-1/+6
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Thu May 24 16:14:01 CEST 2012 on sn-devel-104
2012-05-24s3:smbd/msdfs: pass 'allow_broken_path' to get_referred_path()Stefan Metzmacher4-8/+13
Note the DCERPC code should not be smb2 specific! I wonder why this is at all smb2 specific... metze
2012-05-24s3:smbd/msdfs: let create_conn_struct() also fake the 'smbd_server_connection'Stefan Metzmacher4-23/+63
metze
2012-05-24s3:smbd/files: work without sconn->file_bmap and assign fsp->fnum = -1Stefan Metzmacher1-23/+39
For faked connection_structs we do not need valid fnum values, e.g. in the dfs and printing code. metze
2012-05-24s3:smbd/files: fix error path and correctly cleanupStefan Metzmacher1-7/+7
metze
2012-05-24selftest: Run only the samba3 tests on builds without the AD DCAndrew Bartlett1-1/+6
Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Thu May 24 11:51:40 CEST 2012 on sn-devel-104
2012-05-24WHATSNEW: Move to document changes for beta1Andrew Bartlett1-57/+51
This is not the beta1 release, but this is the preperation for such a release. Andrew Bartlett
2012-05-24s4-provision: Make s3fs the default way to install a new Samba4 DCAndrew Bartlett2-2/+3
With s3fs now well settled into master, we now throw the swtich and make it the default. There is still much to do, but we need to be using s3fs by default to find out exactly what that is. Andrew Bartlett
2012-05-24s4-selftest: Always delete the user at the end of test_passwords.shAndrew Bartlett1-1/+1
If this test is run in the "dc" environment (rather than "dc:local") is would not delete the test user. Andrew Bartlett
2012-05-24dlz_bind9: Make the talloc destructor static and return 0.Amitay Isaacs1-1/+2
Autobuild-User: Amitay Isaacs <amitay@samba.org> Autobuild-Date: Thu May 24 03:32:50 CEST 2012 on sn-devel-104
2012-05-24dlz_bind9: Fix the named crash on reloading namedAmitay Isaacs1-1/+17
When reloading zones, named first creates new zone instance and then shuts down the old instance. Since ldb layer, keeps the same LDB open, talloc_free() on samdb handle, causes talloc "access after use" error. This patch keeps only single context (dlz_bind9_data) and uses reference counting to decide when to actually free the context. Since samdb handle is reused, use talloc_unlink() instead of talloc_free() on samdb handle.
2012-05-24s3-configure: Fix configure version information.Ira Cooper1-4/+4
version.h moved from include -> include/autoconf. Autobuild-User: Ira Cooper <ira@samba.org> Autobuild-Date: Thu May 24 01:34:24 CEST 2012 on sn-devel-104
2012-05-23s3:rpc_server/dfs: pass allow_broken_path=true to create_junction()Stefan Metzmacher1-2/+4
DCERPC code can't be smb2 specific! I'm not sure if 'true' is the correct value here, but at least it matches the old behavior and the tcp and smb1 cases. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed May 23 21:56:05 CEST 2012 on sn-devel-104
2012-05-23s3:smbd/proto.h: remove unused resolve_dfspath() prototypeStefan Metzmacher1-5/+0
metze
2012-05-23s3:smbd/files: remove unused VALID_FNUM()Stefan Metzmacher1-2/+0
metze
2012-05-23s3:smb2_server: make use of nt_status_np_pipe()Stefan Metzmacher3-3/+13
metze
2012-05-23s3:smbd: use nt_status_np_pipe for smb1Stefan Metzmacher3-7/+28
metze
2012-05-23s3:smbd: add nt_status_np_pipe()Stefan Metzmacher2-0/+12
This mapps between NT_STATUS_CONNECTION_* to NT_STATUS_PIPE_* metze
2012-05-23blackbox: fix samba4.blackbox.kinit testAlexander Bokovoy1-0/+1
This deserves some explanation. With commit 518232d4578d700f5f5ea1609275a6cd1de3a1e7 samba4.blackbox.kinit test set was wrapped with password settings reset before and after the tests with an idea to maintain reliable state for the tests. As result, the resetting of the password settings was done after the test that tried to use smbclient with a Kerberos ticket obtained with machine account credentials. However, the code in credentials_krb5.c, function cli_credentials_get_client_gss_creds(), never worked correctly when credentials were already in ccache. Instead, gensec_gssapi module always re-kinited even if existing credentials were available in the ccache. This had an effect on 'samba4.blackbox.kinit(dc:local).reset password policies(dc:local)' test equal to never having initialized ccache at all, as if 'rm -f $KRB5CCNAME' was run before the test. When the issue of not using already initialized credentials from ccache was fixed with d0aae88f1290e6a7a6d4bfc24aa62795e4892a31 'auth-credentials: Support using pre-fetched ccache when obtaining kerberos credentials' commit, Samba 4 credentials library started to correctly re-used already obtained credentials from ccaches. This caused failure of the test 'samba4.blackbox.kinit(dc:local).reset password policies(dc:local)' because machine account has no permissions to modify password settings. Thus, the correct fix is to reset ccache state before performing the test. Autobuild-User: Alexander Bokovoy <ab@samba.org> Autobuild-Date: Wed May 23 18:46:12 CEST 2012 on sn-devel-104
2012-05-23gse: Use the smb_gss_oid_equal wrapper.Andreas Schneider5-23/+10
Signed-off-by: Andreas Schneider <asn@samba.org>
2012-05-23krb5samba: Add smb_gss_oid_equal wrapper.Andreas Schneider4-2/+90
Signed-off-by: Andreas Schneider <asn@samba.org>
2012-05-23s3-autoconf: fix typo after migrating DNS resolver code to lib/addnsAlexander Bokovoy1-1/+1
2012-05-23wafsamba: ensure TO_LIST does not fail with empty stringAlexander Bokovoy1-0/+2
2012-05-23libcli/dns: make 'clidns' private library out of DNS code in WAF buildAlexander Bokovoy5-11/+9
After consolidating DNS resolver code to lib/addns, there is one piece that still needs to be moved into a common DNS resolver library: DNS_HOSTS_FILE subsystem. Unfortunately, direct move would require lib/addns to depend on libcli/util/{ntstatus.h,werror.h} (provided by errors subsystem). In addition, moving libcli/dns/* code to lib/addns/ would make conflicting the dns_tkey_record struct. The conflict comes from source4/dns_server/ and is due to use of IDL to define the struct. lib/addns/ library also provides its own definition so we either need to keep them in sync (rewrite code in lib/addns/ a bit) or depend on generated IDL headers. Thus, making a private library and subsystem clidns is an intermediate step that allows to buy some time fore refactoring.
2012-05-23Introduce system MIT krb5 build with --with-system-mitkrb5 option.Alexander Bokovoy48-471/+598
System MIT krb5 build also enabled by specifying --without-ad-dc When --with-system-mitkrb5 (or --withou-ad-dc) option is passed to top level configure in WAF build we are trying to detect and use system-wide MIT krb5 libraries. As result, Samba 4 DC functionality will be disabled due to the fact that it is currently impossible to implement embedded KDC server with MIT krb5. Thus, --with-system-mitkrb5/--without-ad-dc build will only produce * Samba 4 client libraries and their Python bindings * Samba 3 server (smbd, nmbd, winbindd from source3/) * Samba 3 client libraries In addition, Samba 4 DC server-specific tests will not be compiled into smbtorture. This in particular affects spoolss_win, spoolss_notify, and remote_pac rpc tests.
2012-05-23s4: samba-tool is usable without export-keytab command, make sure it does ↵Alexander Bokovoy1-19/+22
not break When export_keytab is not compiled in (pure client-side Samba 4 build as with system MIT krb5), export-keytab command of samba-tool will not be available. Make sure it is not provided but its absence does not break the Python tool.
2012-05-23auth-credentials: Support using pre-fetched ccache when obtaining kerberos ↵Alexander Bokovoy1-2/+12
credentials When credentials API is used by a client-side program that already as fetched required tickets into a ccache, we need to skip re-initializing ccache. This is used in FreeIPA when Samba 4 Python bindings are run after mod_auth_kerb has obtained user tickets already.
2012-05-23s3-passdb: add unixid_from_uid/unixid_from_gid/unixid_from_both APIAlexander Bokovoy3-1/+54
struct unixid is defined in idmap.idl and therefore to use it one would need generated headers from librpc/gen_ndr. Not all of these files are installed and available as public headers. Also, they pull in some support headers which requires them to be available via specific locations like <librpc/gen_ndr/*> or <libcli/util>. Instead of pulling the headers to get structure and enum definitions, introduce three simple helpers to fill in 'struct unixid' based on the type of id. This is sufficient for PASSDB users and does not require exposing generated headers or code.
2012-05-23dns: fix comments and make s4/libcli/resolve dns resolver workingAlexander Bokovoy2-4/+4
After migrating to use libaddns, reply_to_addrs() needed to change the way answers are iterated through. Originally libroken implementation gave all answers as separate records with last one being explicitly NULL. libaddns unmarshalling code gives all non-NULL answers and should be iterated with explicit reply->num_answers in use.
2012-05-23lib/krb5_wrap: implement krb5_cc_get_lifetime for MIT KerberosAlexander Bokovoy1-19/+22
In case krb5_cc_get_lifetime is not available, iterate over existing tickets in the keytab, find the one marked as TKT_FLAG_INITIAL, and use its lifetime. This is how it is implemented in Heimdal and how it was suggested to be done by MIT Kerberos developers.
2012-05-23gensec_gssapi: Make it possible to build with MIT krb5Simo Sorce4-11/+40
We need to ifdef out some minor things here because there is no available API to set these options in MIT. The realm and canonicalize options should be not interesting in the client case. Same for the send_to_kdc hacks. Also the OLD DES3 enctype is not at all interesting. I am not aware that Windows will ever use DES3 and no modern implementation relies on that enctype anymore as it has been fully deprecated long ago, so we can simply ignore it.