summaryrefslogtreecommitdiff
path: root/source3/utils
AgeCommit message (Collapse)AuthorFilesLines
2010-03-28s3: Slightly simplify unmap_unix_groupVolker Lendecke1-4/+1
2010-03-26Fix bug #7240 - Net usershare is not case sensitive.Jeremy Allison1-4/+19
Updates usershare files in a backwards compatible way. I don't intend to back port this fix to 3.5.x as it depends on a version upgrade in the share_info.tdb share security database. Jeremy.
2010-03-26s3 ntlm_auth: Don't malloc data that will be talloc_free()dKai Blin1-12/+12
This fixes bug #7290 Thanks to Mohan <mohann@silver-peak.com> for the bug report.
2010-03-24s3:ntlmssp: use client.netbios_name instead of workstationStefan Metzmacher1-3/+4
metze Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-24s3:ntlmssp: rename void *auth_context; into void *callback_private;Stefan Metzmacher1-6/+6
metze Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-24s3:ntlmssp: remove unused get_global_myname() and get_domain() from ↵Stefan Metzmacher1-4/+0
ntlmssp_state Inspired by the NTLMSSP merge work by Andrew Bartlett. metze Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-24s3:ntlmssp: pass names and use_ntlmv2 to ntlmssp_client_start() and store themStefan Metzmacher1-1/+5
Inspired by the NTLMSSP merge work by Andrew Bartlett. metze Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-24s3:ntlmssp: pass names to ntlmssp_server_start() and store them in ntlmssp_stateStefan Metzmacher1-1/+27
Inspired by the NTLMSSP merge work by Andrew Bartlett. metze Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-24s3-testparm: Throw warning when 'workgroup' and 'netbios name' are identical.Karolin Seeger1-0/+6
Address bug #7285 (NetBIOS Namespace Clash Handling). Karolin
2010-03-16s3: fix buildwarning in smbta-util.Günther Deschner1-3/+5
Guenther
2010-03-16Fix developer build, remove mallocAndreas Schneider1-11/+7
2010-03-16Don't exit(0) on errorJim McDonough1-3/+3
2010-03-16Add smbta-util to manage the encryption key.Holger Hetterich1-0/+211
This program allows the administrator to enable or disable AES encryption when using vfs_smb_traffic_analyzer. It also generates new keys, stores them to a file, so that the file can be reused on another client or server.
2010-03-16s3:smbcacls: also honour the "--sddl" flag when setting ACLs.Michael Adam1-2/+6
Michael
2010-03-12s3: Add "net registry increment"Volker Lendecke1-0/+105
A convenience function to increment a DWORD value under a (cluster-wide) lock
2010-03-12s3: Add "g_lock_do" as a convenience wrapper functionVolker Lendecke1-27/+22
2010-03-12s3: Actually use mem_ctx in net_g_lock_init()Volker Lendecke1-3/+3
2010-03-12s3: Fix some "net registry" usage messagesVolker Lendecke1-3/+3
2010-03-10s3: Fix a long-standing problem with recycled PIDsVolker Lendecke3-0/+164
When a samba server process dies hard, it has no chance to clean up its entries in locking.tdb, brlock.tdb, connections.tdb and sessionid.tdb. For locking.tdb and brlock.tdb Samba is robust by checking every time we read an entry from the database if the corresponding process still exists. If it does not exist anymore, the entry is deleted. This is not 100% failsafe though: On systems with a limited PID space there is a non-zero chance that between the smbd's death and the fresh access, the PID is recycled by another long-running process. This renders all files that had been locked by the killed smbd potentially unusable until the new process also dies. This patch is supposed to fix the problem the following way: Every process ID in every database is augmented by a random 64-bit number that is stored in a serverid.tdb. Whenever we need to check if a process still exists we know its PID and the 64-bit number. We look up the PID in serverid.tdb and compare the 64-bit number. If it's the same, the process still is a valid smbd holding the lock. If it is different, a new smbd has taken over. I believe this is safe against an smbd that has died hard and the PID has been taken over by a non-samba process. This process would not have registered itself with a fresh 64-bit number in serverid.tdb, so the old one still exists in serverid.tdb. We protect against this case by the parent smbd taking care of deregistering PIDs from serverid.tdb and the fact that serverid.tdb is CLEAR_IF_FIRST. CLEAR_IF_FIRST does not work in a cluster, so the automatic cleanup does not work when all smbds are restarted. For this, "net serverid wipe" has to be run before smbd starts up. As a convenience, "net serverid wipedbs" also cleans up sessionid.tdb and connections.tdb. While there, this also cleans up overloading connections.tdb with all the process entries just for messaging_send_all(). Volker
2010-03-06s3: Fix the build of net_afs.c with --fake-kaserver=yes, bug 7216Volker Lendecke1-1/+1
Thanks to Geza Gemes <geza@kzsdabas.hu> for filing this bug
2010-03-05s3: Make "smbcontrol xx debuglevel" print the correct cluster pidVolker Lendecke1-2/+6
2010-03-05s3-net: fix net after spoolss_EnumPrinterDataEx IDL change.Günther Deschner1-9/+2
Guenther
2010-03-05s3-net: fix net after spoolss_SetPrinterData{Ex} IDL change.Günther Deschner1-24/+6
Guenther
2010-03-03Fix typo in comments.Karolin Seeger1-1/+1
2010-03-03s3:net: add a command "net registry setsd_sdd"Michael Adam1-0/+88
This permits to set the security descriptor of a registry key from the unix command line. Michael
2010-03-03s3:net: fix some i18n messages in net_registry_getsd_internal().Michael Adam1-2/+3
Michael
2010-03-03s3:net: add i18n macro _() to one messageMichael Adam1-1/+1
Michael
2010-03-03s3:net: add new subcommand "net registry getsd_sddl" to print secdesc in ↵Michael Adam1-0/+40
sddl format Michael
2010-03-03s3:net: refactor getting of secdesc out of net_registry_getsd()Michael Adam1-14/+42
New net_registry_getsd_internal does the work(), net_registry_getsd() just prints the result. This in preparation to add support for other output formats than the currently used display_sec_desc(). Michael
2010-03-03s3:smbcacls: add switch "--sddl" to output acls as sddl encoded stringsMichael Adam1-1/+9
2010-03-02s3: net_share.c: fix argc handlingHolger Hetterich1-6/+3
The "net share" command was no longer possible because it enters the net_share function with argc == 0.
2010-03-01s3: Abstract access to sessionid.tdb, similar to conn_tdb.cVolker Lendecke2-77/+36
2010-03-01s3: Add connections_forall_read()Volker Lendecke3-9/+6
In a cluster, this makes a large difference: For r/w traverse, we have to do a fetch_locked on every record which for most users of connections_forall is just overkill.
2010-02-23s3 move the sitename cache in its own fileSimo Sorce1-0/+1
2010-02-23s3: Consolidate some pid_to_procid() calls to procid_self()Volker Lendecke1-5/+5
2010-02-23s3: Consolidate server_id_self into the equivalent procid_self()Volker Lendecke4-4/+4
2010-02-15s3: eventlogadm.c: add -s option to use alternative config file.Holger Hetterich1-4/+15
Update the manpage accordingly.
2010-02-14s3: last part of TYPESAFE_QSORT() conversionAndrew Tridgell2-2/+2
convert smbcacls, sharesec and web/
2010-02-13s3: Fix Coverity ID 629: DEADCODEVolker Lendecke1-3/+0
We have already returned if (argc < 1) above
2010-02-12s3:make "net conf addshare" atomic by wrapping all writes in one transactionMichael Adam1-6/+36
Michael
2010-02-12s3:dbwrap: If "-n" is given to dbwrap_torture, open db with CLEAR_IF_FIRSTVolker Lendecke1-0/+4
2010-02-12s3: Implement global locks in a g_lock tdbVolker Lendecke3-0/+223
This is the basis to implement global locks in ctdb without depending on a shared file system. The initial goal is to make ctdb persistent transactions deterministic without too many timeouts.
2010-02-08s3-net: fix net ads dns usage calls.Günther Deschner1-3/+8
Bjoern, please check. Guenther
2010-01-28Fix bug #7069 - smbget does not return an error status after some errorsJeremy Allison1-38/+45
A combination patch from Johannes Poehlmann <johannes@lst.de> and Jeremy. Fix the return codes from smb_download_file() and smb_download_dir(). Jeremy.
2010-01-24s3: Add --use-ccache to netVolker Lendecke4-0/+9
2010-01-24s3: Fix a bug in net's use of poptVolker Lendecke1-1/+1
In order to add --use-ccache to net, I added another "bool opt_ccache;" to struct net_context. popt did not like this, it took a while to figure out why. Popt has the lines /* XXX Check alignment, may fail on funky platforms. */ if (arg == NULL || (((unsigned long)arg) & (sizeof(*arg)-1))) return POPT_ERROR_NULLARG; The "bool opt_ccache;" was not aligned anymore...
2010-01-23s3: Use global_sid_Builtin in net_groupmap_membershipsVolker Lendecke1-4/+3
2010-01-19s3 net: Fix compile warningsKai Blin24-380/+676
2010-01-19s3 net/i18n: Use only one spelling for "Usage:"Kai Blin11-57/+57
2010-01-19s3 net: Fix compile error with WITH_DNS_UPDATESKai Blin1-2/+2
bd3c922e2bc1a163efc1d8c9cb59578bebb79616 introduced a compile-time error when building with WITH_DNS_UPDATES.