summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2011-11-16s3-smbldap: remove duplicate prototype of smbldap_init().Günther Deschner1-3/+0
Guenther
2011-11-16s3-net: use better state variable name for smbldap_state.Günther Deschner1-9/+9
Guenther
2011-11-16s3-passdb: split out passdb/pdb_ldap_schema.cGünther Deschner13-327/+385
Guenther
2011-11-16s3: move smbldap_util to pdb_ldap_util.Günther Deschner8-21/+52
Guenther
2011-11-16s3-smbldap: use include/smb_ldap.h in smbldap.hGünther Deschner1-1/+1
Guenther
2011-11-16lib/util/debug: with log level = 10 we should be more verboseStefan Metzmacher1-3/+9
log level = 10 already impacts performance, so we can turn on more details and print the pid, [e][u|g]id and class information. So it implies "debug pid = yes", "debug uid = yes" and "debug class = yes". This generates a lot more useful log files. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Nov 16 12:25:02 CET 2011 on sn-devel-104
2011-11-16provision: Set the security descriptor while creating partitionsAmitay Isaacs2-12/+4
With Matthieu's patch, the setting of security descriptor on partition dn at create time works correctly. Autobuild-User: Amitay Isaacs <amitay@samba.org> Autobuild-Date: Wed Nov 16 08:54:25 CET 2011 on sn-devel-104
2011-11-16s4-dsdb: rework the NC detection for the descriptor calculationMatthieu Patou1-12/+31
This checks if instanceType attribute is available, and if INSTANCE_TYPE_IS_NC_HEAD bit is set. If the bit is set, then the DN is NC root and security descriptor is not inherited from parent SD. Signed-off-by: Amitay Isaacs <amitay@gmail.com>
2011-11-16s3-s4-upgrade: do not add description if it is empty string or noneAmitay Isaacs1-6/+12
Autobuild-User: Amitay Isaacs <amitay@samba.org> Autobuild-Date: Wed Nov 16 05:53:41 CET 2011 on sn-devel-104
2011-11-16Final part of patchset to fix bug #8556 - ACL permissions ignored when ↵Jeremy Allison3-16/+51
SMBsetatr is requested. This now plumbs access checks through all setattr calls. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed Nov 16 04:20:04 CET 2011 on sn-devel-104
2011-11-15Remove the check for FILE_WRITE_ATTRIBUTES from smb_set_file_time(). ItJeremy Allison3-8/+17
is called from places like fileio.c that need to update the write time on a file handle only open for write, without neccessarily having FILE_WRITE_ATTRIBUTES permission. Move all checks to before the smb_set_file_time() callers.
2011-11-15Always set the attribute first, before the time.Jeremy Allison1-7/+7
2011-11-15Move handle-based access check into handle codepath.Jeremy Allison1-4/+4
2011-11-15We've already checked fsp must be non-null here.Jeremy Allison1-1/+1
2011-11-15Remove unneeded access check. This is done inside smb_set_file_time().Jeremy Allison1-4/+0
2011-11-15Remove unneeded access check. This is done inside smb_set_file_size().Jeremy Allison1-4/+0
2011-11-15Move handle based access check into handle code path.Jeremy Allison1-4/+4
2011-11-16HEIMDAL:lib/krb5: add utf8 support to build_logon_name() for the PACStefan Metzmacher1-18/+49
Pair-Programmed-With: Arvid Requate <requate@univention.de> metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Nov 16 02:00:12 CET 2011 on sn-devel-104
2011-11-16HEIMDAL:lib/wind: export wind_ucs2write()Stefan Metzmacher1-0/+1
Pair-Programmed-With: Arvid Requate <requate@univention.de> metze
2011-11-16HEIMDAL:lib/winbd: fix wind_ucs2write with WIND_RW_LEStefan Metzmacher1-4/+4
Pair-Programmed-With: Arvid Requate <requate@univention.de> metze
2011-11-16HEIMDAL:lib/wind: fix wind_ucs4utf8() and wind_ucs2utf8()Stefan Metzmacher1-5/+5
Pair-Programmed-With: Arvid Requate <requate@univention.de> metze
2011-11-16Fix bug #8561 - Password change settings not fully observed.Jeremy Allison3-5/+36
Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed Nov 16 00:22:41 CET 2011 on sn-devel-104
2011-11-15Ensure we correctly calculate reply credits over all returnedJeremy Allison1-4/+13
SMB2 replies, and do as Windows does and return the total in the last SMB2 reply. Fixes an issue found by Christian M Ambach <christian.ambach@de.ibm.com> (and thanks to Christian for the initial patch this was based on).
2011-11-15Remove unneeded NULL check.Jeremy Allison1-4/+0
2011-11-15s4:partition LDB module - fix handling regarding special DNs on searchesMatthias Dieter Wallnöfer1-0/+5
Normally they should always be passed to the main backend unless something different has been specified. Reviewed-by: abartlet Autobuild-User: Matthias Dieter Wallnöfer <mdw@samba.org> Autobuild-Date: Tue Nov 15 22:43:06 CET 2011 on sn-devel-104
2011-11-15s4:torture/rpc/samr.c - use "NULL" instead of "0" when initialising pointersMatthias Dieter Wallnöfer1-1/+1
2011-11-15s4:join.py - fix typoMatthias Dieter Wallnöfer1-1/+1
2011-11-15s3: allow to set TCP_NODELAYACK socket option on AIXBjörn Jacke1-0/+3
this is the AIX way to disable delayed ACKs, the same like TCP_QUICKACK on Linux Autobuild-User: Björn Jacke <bj@sernet.de> Autobuild-Date: Tue Nov 15 21:00:07 CET 2011 on sn-devel-104
2011-11-15s3:smbd/aio: handle_aio_completed() should do nothing if aio_ex->fsp is NULLStefan Metzmacher1-0/+5
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Tue Nov 15 18:47:55 CET 2011 on sn-devel-104
2011-11-15s3:smbd/aio: pass ECANCELED to the smb2 aio handlersStefan Metzmacher1-1/+4
metze
2011-11-15s3:smb2_read: make it possible to cancel aio readsStefan Metzmacher1-1/+16
metze
2011-11-15s3:smb2_write: make it possible to cancel aio writesStefan Metzmacher1-1/+16
metze
2011-11-15s3:smbd/aio: add cancel_smb2_aio()Stefan Metzmacher2-0/+39
metze
2011-11-15s3:smb2_ioctl: STATUS_PENDING is defered by 1 millisecond for SMB2_IOCTLStefan Metzmacher1-1/+1
metze
2011-11-15s3:smb2_create: defer STATUS_PENDING for 2 seconds as beforeStefan Metzmacher1-1/+7
metze
2011-11-15s3:smb2_server: pass explicit defer_times to smbd_smb2_request_pending_queue()Stefan Metzmacher13-14/+15
metze
2011-11-15s3:smb2_server: always send STATUS_PENDING responses, but delayed by 0.5 ↵Stefan Metzmacher5-152/+125
milliseconds In future we'll pass the delay from the caller. metze
2011-11-15s3-winbind: Don't fail on users without a uid.Andreas Schneider1-1/+19
This fixes bug #8608. If you join samba with idmap_ad backend to an AD. When you try to enumerate users with 'getent passwd' and the user doesn't have a uid set, then getent is aborted cause of NT_STATUS_NONE_MAPPED. If we can't map a user we should not stop but continue enumerating users. This normally happens with the default user 'krbtgt' with idmap_ad but could also happen with other backends. Autobuild-User: Andreas Schneider <asn@cryptomilk.org> Autobuild-Date: Tue Nov 15 16:52:04 CET 2011 on sn-devel-104
2011-11-15s3-winbind: Make sure the map is clean.Andreas Schneider1-1/+5
2011-11-15s3-winbind: Increase the negative cache entry timout.Andreas Schneider1-1/+1
The timout for the cache entry of a negative connection should be the double of a connect timeout (which is 30 seconds).
2011-11-15s4:dsdb/schema_data: reject schema update unless they're allowedStefan Metzmacher1-0/+12
"dsdb:schema update allowed = yes" is now needed in smb.conf to enable schema updates, as schema updates are a currenty a good way to prevent samba from startup again, because of errors in the schema definition. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Tue Nov 15 13:00:07 CET 2011 on sn-devel-104
2011-11-15selftest/Samba4: allow schema updatesStefan Metzmacher1-0/+1
metze
2011-11-15s4:dsdb/schema: add "dsdb:schema update allowed" option to enable schema updatesStefan Metzmacher3-2/+17
By default schema updates are not allowed anymore, as we don't have complete validation code to prevent database corruption. metze
2011-11-15s4:dsdb/schema_data: reject changes to schemaInfo, msDs-Schema-Extensions, ↵Stefan Metzmacher1-0/+28
msDS-IntId As windows we return CONSTRAINT_VIOLATION now. metze
2011-11-15s4:dsdb/schema_data: make sure we reject schema changes if we're not the ↵Stefan Metzmacher1-0/+101
schema master metze
2011-11-15s4:dsdb/schema_data: make sure we only allow objects one level below the ↵Stefan Metzmacher1-1/+33
schema base The objectclass module should also check for this, but make sure we also reject it on things like provision. metze
2011-11-15s4:libnet_vampire: setup base_dn on the self_made_schemaStefan Metzmacher1-0/+5
metze
2011-11-15s4:libnet_vampire: use dsdb_modify(..., DSDB_FLAG_AS_SYSTEM) to store prefixMapStefan Metzmacher1-1/+1
metze
2011-11-15s4:param/provision: pass schema_dn to provision_get_schema()Stefan Metzmacher4-4/+15
metze
2011-11-15s4:dsdb/schema: pass and remember the schema_dn in dsdb_set_schema_from_ldif()Stefan Metzmacher2-4/+12
metze