summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2010-08-14s4:password_hash LDB module - fix wrong error codesMatthias Dieter Wallnöfer1-4/+4
To match the passwords.py test
2010-08-14s4:passwords.py - test the error code when there doesn't exist any password yetMatthias Dieter Wallnöfer1-4/+24
After the creation of a user object we don't have any password yet.
2010-08-14s4:passwords.py - perform testing of wrong old passwords on change operationsMatthias Dieter Wallnöfer1-0/+44
2010-08-14s4:torture/rpc/samr.c - fix a wrong torture error messageMatthias Dieter Wallnöfer1-1/+1
2010-08-14s3: Remove a conn NULL check from claim_connectionVolker Lendecke1-4/+1
We've already dereferenced conn before
2010-08-14s3: Fix an uninitialized variableVolker Lendecke1-0/+3
2010-08-14s3:auth Add error paths for invalid password_state valuesAndrew Bartlett3-2/+10
Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s3:auth Change winbindd -> auth interface to more standard structuresAndrew Bartlett3-24/+46
This removes conversions to and from the source3 varient of the server_info structure when replaced in s3compat, and presents a tidier interface to winbindd in any case. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s3:auth Change 'make_user_info' to be talloc basedAndrew Bartlett1-72/+58
This is an ideal candidate, as it already uses a free function. It now uses talloc destructors to clear the passwords if required. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s3:auth Whitespace fixes after auth mergeAndrew Bartlett3-20/+20
2010-08-14s3:auth Make Samba3 use the new common struct auth_usersupplied_infoAndrew Bartlett19-191/+213
This common structure will make it much easier to produce an auth module for s3compat that calls Samba4's auth subsystem. In order the make the link work properly (and not map twice), we mark both that we did try and map the user, as well as if we changed the user during the mapping. Andrew Bartlett Signed-off-by: Andrew Tridgell <tridge@samba.org>
2010-08-14s4:auth Move struct auth_usersupplied_info to a common locationAndrew Bartlett7-54/+72
This also changes the calling convention slightly - we should always allocate this with talloc_zero() to allow some elements to be optional. Some elements may only make sense in Samba3, which I hope will use this common structure. Andrew Bartlett
2010-08-14waf: enable gccdeps in developer modeAndrew Tridgell1-2/+3
there are some bugs in the waf builtin preproc this that avoids
2010-08-14s4-build: fixed library name in dcerpc_server.pc.inAndrew Tridgell1-1/+1
Thanks to Metze for spotting this
2010-08-14ndr: allow ndr_print to print DATA_BLOBAndrew Tridgell3-6/+64
this prints DATA_BLOB structures using the ndr->print() calls Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-08-14dnsp: dnsp_name is 2 byte alignedAndrew Tridgell1-0/+2
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-08-14s3:idmap: fix sid_to_unixid for builtin and own domain.Michael Adam1-2/+12
The old idmap code created a new mapping if asking the backends failed. Now with the new layering, if passdb (which is used for our own domain and builtin), then we need to continue and ask the backends, giving tdb or whatever the default backend is a chance to create a mapping.
2010-08-14s3:idmap: fix spacing/indentationMichael Adam1-2/+2
2010-08-14s3:idmap_ldap: use idmap_rw_new_mapping in idmap_ldap_new_mappingMichael Adam1-34/+3
2010-08-14s3:idmap_ldap: add idmap_rw_ops to idmap_ldap_context and init in db_init()Michael Adam2-2/+13
2010-08-14s3:idmap_tdb: use idmap_rw_new_mapping in idmap_tdb_new_mappingMichael Adam1-34/+3
2010-08-14s3:idmap_tdb: add idmap_rw_ops to idmap_tdb_context and initialize them in ↵Michael Adam2-3/+20
init_db
2010-08-14s3:idmap_tdb2: use idmap_rw_new_mapping in idmap_tdb2_new_mappingMichael Adam1-34/+6
2010-08-14s3:idmap_tdb2: add rw_ops to idmap_tdb2_context and initialize in ↵Michael Adam2-2/+14
idmap_tdb2_db_init
2010-08-14s3:idmap: add abstract idmap_rw new_mapping mechanism without registering ↵Michael Adam2-0/+135
backends
2010-08-14s3:idmap_ad: untangle two assignments from checksMichael Adam1-2/+4
2010-08-14s3:idmap_ad: remove unused filter_low_id and filter_high_id from ↵Michael Adam1-14/+0
idmap_ad_context The filter range from the idmap_domain is used now.
2010-08-14s3:idmap_ad: use range from idmap_domain in idmap_ad_sids_to_unixids()Michael Adam1-4/+2
2010-08-14s3:idmap_ad: use range from idmap_domain in idmap_ad_unixids_to_sids()Michael Adam1-4/+2
2010-08-14s3:idmap_rid: remove a comment that does not apply in that place.Michael Adam1-4/+0
Probably got copied from a different location.
2010-08-14s3:idmap_rid: remove unused domain_name from the idmap_rid_context.Michael Adam1-3/+1
2010-08-14s3:idmap_rid: remove range from idmap_rid_context()Michael Adam1-39/+0
Now, the idmap_domain range that is centrally parsed is used.
2010-08-14s3:idmap_rid: use range from idmap_domain in idmap_rid_sid_to_id()Michael Adam1-8/+8
2010-08-14s3:idmap_rid: use ranges from idmap_domain struct in idmap_rid_id_to_sid()Michael Adam1-11/+12
2010-08-14s3:idmap_rid: remove unused talloc context var from idmap_rid_sids_to_unixids()Michael Adam1-8/+0
2010-08-14s3:idmap_rid: remove unused talloc context arg from idmap_rid_sid_to_id()Michael Adam1-2/+2
2010-08-14s3:idmap_rid: remove unused talloc context var from idmap_rid_unixids_to_sids()Michael Adam1-8/+0
2010-08-14s3:idmap_rid: remove unused talloc ctx argument from idmap_rid_id_to_sid()Michael Adam1-2/+2
2010-08-14s3:idmap_rid: untangle assignment from check in idmap_rid_initialize()Michael Adam1-1/+2
2010-08-14s3:idmap_ldap: add my (C)Michael Adam1-0/+1
2010-08-14s3:idmap_ldap: create mappings for unmapped sids in idmap_ldap_sids_to_unixids()Michael Adam1-4/+13
2010-08-14s3:idmap_ldap: add a idmap_ldap_new_mapping().Michael Adam1-0/+48
High level function to create a new mapping for an unmapped sid. This builds logic that used to reside in the top level idmap code in the backend.
2010-08-14s3:idmap_ldap: add idmap_ldap_get_new_id() to allocate a new id given a domainMichael Adam1-0/+25
Currently this only works with the default domain, calling out to idmap_ldap_allocate_id(). In the future this will be extended to also work for non-default domains.
2010-08-14s3:idmap_ldap: move idmap_ldap_set_mapping() further up.Michael Adam1-112/+113
2010-08-14s3:idmap_ldap: make idmap_ldap_alloc_context a member of idmap_ldap_contextMichael Adam1-71/+75
this hides this beneath the idmap structure and removes a global variable
2010-08-14s3:idmap_ldap: call idmap_ldap_alloc_init from idmap_ldap_init.Michael Adam1-0/+7
The alloc subsystem is now subordinate to the idmap system.
2010-08-14s3:idmap_ldap: remove the (now unused) range from idmap_ldap_alloc_contextMichael Adam1-3/+0
2010-08-14s3:idmap_ldap: use ranges from idmap domain in idmap_ldap_allocate_id()Michael Adam1-5/+6
Second step in removing the idmap range from the idmap_ldap_alloc_context.
2010-08-14s3:idmap_ldap: add idmap_domain arg to idmap_ldap_alloc_init and verify_idpoolMichael Adam1-37/+6
First step in removing idmap ranges from the idmap_ldap_alloc_context. The range from the domain is to be used now.
2010-08-14s3:idmap_ldap: remove unused filter range from struct idmap_ldap_contextMichael Adam1-1/+0