Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2009-07-14 | s3: make d9c0d58236 better readble and reduce indentation | Björn Jacke | 1 | -13/+13 | |
2009-07-14 | s3: don't make same innetgr check twice | Björn Jacke | 1 | -8/+11 | |
2009-07-14 | remove all '\n' from ldb_debug | Sumit Bose | 19 | -57/+58 | |
2009-07-14 | s3-account_policy: add pdb_policy_type enum. | Günther Deschner | 16 | -166/+179 | |
Guenther | |||||
2009-07-14 | s3-account_policy: remove trailing whitespace. | Günther Deschner | 1 | -32/+32 | |
Guenther | |||||
2009-07-14 | s3: re-run make idl. | Günther Deschner | 2 | -1/+7 | |
Guenther | |||||
2009-07-14 | samr: add missing samr_ValidationStatus codes. | Günther Deschner | 1 | -1/+3 | |
Guenther | |||||
2009-07-14 | reject ACLs with DESC_DACL_PROTECTED on GPFS | Christian Ambach | 1 | -0/+5 | |
as GPFS does not support the ACE4_FLAG_NO_PROPAGATE NFSv4 flag (which would be the mapping for the DESC_DACL_PROTECTED flag), the status of this flag is currently silently ignored by Samba. That means that if you deselect the "Allow inheritable permissions..." checkbox in Windows' ACL dialog and then apply the ACL, the flag will be back immediately. To make sure that automatic migration with e.g. robocopy does not lead to ACLs silently (and unintentionally) changed, this patch adds an explicit check for this flag and if set, it will return NT_STATUS_NOT_SUPPORTED so errors are shown up on the Windows side and the Administrator is aware of the ACLs not being settable like intended Signed-off-by: Christian Ambach <christian.ambach@de.ibm.com> | |||||
2009-07-13 | Make cli_posix_lock/unlock asynchronous. | Jeremy Allison | 4 | -63/+247 | |
Jeremy. | |||||
2009-07-13 | Fix set_posix_lock check which had been reversed in the recent | Jeremy Allison | 1 | -1/+1 | |
changes. Jeremy. | |||||
2009-07-13 | s3-pdb_ads: set correct pdb field with the value from 'accountExpires' ↵ | Günther Deschner | 1 | -1/+1 | |
attribute. Guenther | |||||
2009-07-13 | s3:net: Fix Bug #6222. Default to DRSUAPI replication for net rpc vampire keytab | Stefan Metzmacher | 1 | -4/+7 | |
metze Signed-off-by: Günther Deschner <gd@samba.org> | |||||
2009-07-13 | s3-rpc_server: pass down full unix token to map_max_allowed_access(). | Günther Deschner | 3 | -18/+37 | |
Also use unix_token->uid instead of geteuid() when checking for mapping of the SEC_FLAG_MAXIMUM_ALLOWED flag. Guenther | |||||
2009-07-13 | libds: merge the UF<->ACB flag mapping functions. | Günther Deschner | 14 | -201/+51 | |
Guenther | |||||
2009-07-13 | libds: share UF_ flags between samba3 and 4. | Günther Deschner | 17 | -169/+86 | |
Guenther | |||||
2009-07-13 | s3:smbd: close_file() handles named pipes just fine, no reason to return ↵ | Stefan Metzmacher | 1 | -5/+0 | |
NOT_SUPPORTED metze | |||||
2009-07-13 | s3:smbd: make smbd_do_qfsinfo() non static for use in SMB2 GetInfo | Stefan Metzmacher | 2 | -8/+17 | |
metze | |||||
2009-07-13 | s3:smbd: split out smbd_do_qfsinfo() from call_trans2qfsinfo() | Stefan Metzmacher | 1 | -79/+93 | |
metze | |||||
2009-07-13 | s3:smbd: make smbd_do_setfilepathinfo() non static for use in SMB2 SetInfo | Stefan Metzmacher | 2 | -8/+17 | |
metze | |||||
2009-07-13 | s3:smbd: split out smbd_do_setfilepathinfo() from call_trans2setfilepathinfo() | Stefan Metzmacher | 1 | -188/+216 | |
metze | |||||
2009-07-12 | s3:smbd: start SMB2 GetInfo support for File*Information levels | Stefan Metzmacher | 1 | -1/+139 | |
TODO: the EA levels are not fully supported. metze | |||||
2009-07-12 | s3:smbd: add support for marshalling SMB2 FileFullEaInformation | Stefan Metzmacher | 1 | -0/+92 | |
metze | |||||
2009-07-12 | s3:smbd: add support for marshalling SMB2 FileAllInformation | Stefan Metzmacher | 1 | -0/+36 | |
metze | |||||
2009-07-12 | s3:smbd: filter out SMB2 specific private query info levels for SMB1 | Stefan Metzmacher | 1 | -0/+9 | |
metze | |||||
2009-07-12 | s3:smbd: make smbd_do_qfilepathinfo() non static for use in SMB2 | Stefan Metzmacher | 2 | -15/+31 | |
metze | |||||
2009-07-12 | s3:smbd: split calculation and mashalling of file index and access_mask | Stefan Metzmacher | 1 | -13/+19 | |
metze | |||||
2009-07-12 | s3:smbd: split out smbd_do_qfilepathinfo() from call_trans2qfilepathinfo() | Stefan Metzmacher | 1 | -459/+504 | |
This prepares SMB2 GetInfo. metze | |||||
2009-07-12 | s3:smbd: add missing return after reply_nterror() | Stefan Metzmacher | 1 | -0/+1 | |
metze | |||||
2009-07-10 | Remove reply_unixerror() - no longer needed. Should make Metze's refactoring ↵ | Jeremy Allison | 7 | -87/+79 | |
a lot easier. Jeremy. | |||||
2009-07-10 | Add hash values to the xattr ACLS to determine when | Jeremy Allison | 1 | -55/+158 | |
an underlying POSIX ACL is changed out from under us. Passes RAW-ACL test up to "invalid owner" problem when trying to create a file owned by Everyone. Now needs porting to modules/vfs_acl_tdb.c Jeremy. | |||||
2009-07-10 | Return 0 domains from enum_trusteddoms | Volker Lendecke | 1 | -1/+3 | |
2009-07-10 | Quieten events and tldap debug messages | Volker Lendecke | 2 | -2/+2 | |
2009-07-10 | s3 smb2: Remove unused variable | Tim Prouty | 1 | -1/+0 | |
2009-07-10 | Fix&Run local-gencache | Volker Lendecke | 2 | -4/+2 | |
2009-07-10 | Fix our base64 implementation for blobs of length 4.... | Volker Lendecke | 3 | -1/+36 | |
The additional length check bit us exactly at 4, removing it. The torture test survives valgrind up to 2000 bytes :-) | |||||
2009-07-10 | s3:smbd: add support for SMB2 Lock | Stefan Metzmacher | 1 | -1/+151 | |
metze | |||||
2009-07-10 | s3:smbd: make smbd_do_locking() non static | Stefan Metzmacher | 2 | -16/+26 | |
metze | |||||
2009-07-10 | s3:smbd: abstract the main locking logic from the LockingAndX parsing | Stefan Metzmacher | 1 | -178/+254 | |
This prepares SMB2 Lock support. metze | |||||
2009-07-10 | s3:smbd: pass down the client pid to smbd_smb2_lock_send() | Stefan Metzmacher | 1 | -0/+6 | |
metze | |||||
2009-07-10 | s3:smbd: fix parsing of SMB2 Lock requests with lock_count > 1 | Stefan Metzmacher | 1 | -10/+13 | |
We should not reuse the variable 'i'. metze | |||||
2009-07-10 | s3:smbd: fix parsing of invalid SMB2 requests. | Stefan Metzmacher | 1 | -2/+2 | |
Because of 0 - 2 => 0xFFFFFFFE, we got EMSGSIZE from the tstream layer. And terminate the transport connection. Instead we should let the caller deal with the invalid parameter, when checking the body size. So the caller always gets at least a 2 byte body. metze | |||||
2009-07-10 | Attempt to fix the build -- jlayton, please check! | Volker Lendecke | 1 | -1/+1 | |
2009-07-09 | cifs.upcall: use pid value from kernel to determine KRB5CCNAME to use | Jeff Layton | 1 | -12/+75 | |
If the kernel sends the upcall a pid of the requesting process, we can open that process' /proc/<pid>/environ file and scrape the KRB5CCNAME value out of it. Signed-off-by: Jeff Layton <jlayton@redhat.com> | |||||
2009-07-09 | s3: Fix two arguments that broke when plumbing smb_filneame through dos_mode() | Tim Prouty | 1 | -2/+2 | |
2009-07-09 | Make escape_ldap_string take a talloc context | Volker Lendecke | 7 | -52/+54 | |
2009-07-09 | s4:dsdb Allow unicodePwd to be set when adding a user | Andrew Bartlett | 1 | -85/+84 | |
Windows 7 sets it's join password using the unicodePwd attribute (as a quoted, utf16 string), and does so during the LDAPAdd of the object. Previously, this code only handled unicodePwd for modifies. Andrew Bartlett | |||||
2009-07-09 | Add const | Andrew Bartlett | 1 | -2/+2 | |
2009-07-08 | s3: Repace a char * with an smb_filename struct in reply_rmdir | Tim Prouty | 1 | -3/+8 | |
2009-07-08 | s3: Prepare open.c to switch fsp_name to an smb_filename struct | Tim Prouty | 2 | -23/+30 | |
2009-07-08 | s3 plumb smb_filename through smb_set_file_allocation_info() | Tim Prouty | 1 | -23/+12 | |