summaryrefslogtreecommitdiff
path: root/source3/winbindd/idmap_ldap.c
AgeCommit message (Collapse)AuthorFilesLines
2010-10-12libcli/security Provide a common, top level libcli/security/security.hAndrew Bartlett1-1/+1
This will reduce the noise from merges of the rest of the libcli/security code, without this commit changing what code is actually used. This includes (along with other security headers) dom_sid.h and security_token.h Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Tue Oct 12 05:54:10 UTC 2010 on sn-devel-104
2010-09-20s3-util_sid: use shared dom_sid_compare_auth and dom_sid_equal_X functions.Günther Deschner1-1/+2
Guenther
2010-08-26s3-idmap: only include idmap headers where needed.Günther Deschner1-0/+1
Guenther
2010-08-14s3:idmap_ldap: use idmap_rw_new_mapping in idmap_ldap_new_mappingMichael Adam1-34/+3
2010-08-14s3:idmap_ldap: add idmap_rw_ops to idmap_ldap_context and init in db_init()Michael Adam1-0/+11
2010-08-14s3:idmap_ldap: add my (C)Michael Adam1-0/+1
2010-08-14s3:idmap_ldap: create mappings for unmapped sids in idmap_ldap_sids_to_unixids()Michael Adam1-4/+13
2010-08-14s3:idmap_ldap: add a idmap_ldap_new_mapping().Michael Adam1-0/+48
High level function to create a new mapping for an unmapped sid. This builds logic that used to reside in the top level idmap code in the backend.
2010-08-14s3:idmap_ldap: add idmap_ldap_get_new_id() to allocate a new id given a domainMichael Adam1-0/+25
Currently this only works with the default domain, calling out to idmap_ldap_allocate_id(). In the future this will be extended to also work for non-default domains.
2010-08-14s3:idmap_ldap: move idmap_ldap_set_mapping() further up.Michael Adam1-112/+113
2010-08-14s3:idmap_ldap: make idmap_ldap_alloc_context a member of idmap_ldap_contextMichael Adam1-71/+75
this hides this beneath the idmap structure and removes a global variable
2010-08-14s3:idmap_ldap: call idmap_ldap_alloc_init from idmap_ldap_init.Michael Adam1-0/+7
The alloc subsystem is now subordinate to the idmap system.
2010-08-14s3:idmap_ldap: remove the (now unused) range from idmap_ldap_alloc_contextMichael Adam1-3/+0
2010-08-14s3:idmap_ldap: use ranges from idmap domain in idmap_ldap_allocate_id()Michael Adam1-5/+6
Second step in removing the idmap range from the idmap_ldap_alloc_context.
2010-08-14s3:idmap_ldap: add idmap_domain arg to idmap_ldap_alloc_init and verify_idpoolMichael Adam1-37/+6
First step in removing idmap ranges from the idmap_ldap_alloc_context. The range from the domain is to be used now.
2010-08-14s3:idmap_ldap: remove unused filter range from struct idmap_ldap_contextMichael Adam1-1/+0
2010-08-14s3:idmap_ldap: don't load ranges - they have been loaded into struct ↵Michael Adam1-49/+1
idmap_domain
2010-08-14s3:idmap_ldap: use filter range from idmap domain, not idmap_ldap_contextMichael Adam1-8/+4
2010-08-14s3:idmap_ldap: re-implement allocate_id in idmap methods.Michael Adam1-0/+1
2010-08-14s3:idmap_ldap: remove unused idmap_ldap_alloc_methods.Michael Adam1-7/+0
2010-08-14s3:idmap_ldap: remoce unused idmap_alloc_ldap_initMichael Adam1-6/+0
2010-08-14s3:idmap_ldap: don't call idmap_alloc_ldap_init in idmap_ldap_initMichael Adam1-8/+0
The registering of alloc backends is being removed. The idmap backends are responsible for initializing their alloc code on their own if necessary.
2010-08-14s3:idmap: remove the set_mapping method from the idmap APIMichael Adam1-1/+0
2010-08-14s3:idmap: remove unused method set_id_hwm from idmap APIMichael Adam1-119/+0
Michael
2010-08-14s3:idmap: remove unused alloc method get_id_hwm from idmap APIMichael Adam1-98/+0
Michael
2010-08-14s3:idmap: remove unused method dump_data() from the idmap APIMichael Adam1-1/+0
Michael
2010-08-05s3-secrets: only include secrets.h when needed.Günther Deschner1-0/+1
Guenther
2010-06-21s3:idmap_ldap: remove unreached code (and explicit error return code)Michael Adam1-5/+1
2010-05-21s3:dom_sid Global replace of DOM_SID with struct dom_sidAndrew Bartlett1-2/+2
This matches the structure that new code is being written to, and removes one more of the old-style named structures, and the need to know that is is just an alias for struct dom_sid. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2009-11-23s3:idmap_ldap: fix indentation: tab/space mixupMichael Adam1-14/+14
Michael
2009-11-20s3:idmap_ldap: trim the " chars from the location string in idmap_ldap_db_initMichael Adam1-0/+2
When idmap backend is specified as idmap backend = ldap:"ldap://server1 ldap://server2" then currently "ldap://server1 ldap://server2" was passed to ldap_initialize including the quotes, leading to an ldap error. Michael
2009-11-20s3:idmap_ldap: trim the " chars from the location string in ↵Michael Adam1-0/+2
idmap_ldap_alloc_init When idmap alloc backend is specified as idmap alloc backend = ldap:"ldap://server1 ldap://server2" then currently "ldap://server1 ldap://server2" was passed to ldap_initialize including the quotes, leading to an ldap error. Michael
2009-10-15Fix valgrind memory leak in bug #6814 - Fixes for problems reported by valgrindJeremy Allison1-0/+1
Jeremy.
2009-05-28s3:idmap_ldap: filter out of range mappings in default idmap configMichael Adam1-16/+55
This fixes bug #6417 Michael
2009-05-25s3:winbind:idmap_ldap: warn about duplicate SID->XID mappings (bug #6387)Michael Adam1-2/+11
With the current infrastructure, we should not return error on duplicate mappings but just warn instead (because an error would trigger the attempt to create yet another mapping). Michael
2009-05-25s3:winbind:idmap_ldap: warn about duplicate XID->SID mappings (bug #6387)Michael Adam1-0/+8
With the current infrastructure, we should not return error on duplicate mappings but just warn instead (because an error would trigger the attempt to create yet another mapping). Michael
2009-05-22s3:winbind:idmap_ldap: fix a crash bug in idmap_ldap_unixids_to_sids (#6387)Michael Adam1-1/+1
This fixes a crash bug hit when multiple mappings were found by the ldap search. This crash was caused by an ldap asssertion in ldap_next_entry because was set to NULL in each iteration. The corresponding fix was applied to the idmap_ldap_sids_to_unixids() by Jerry in 2007 (b066668b74768d9ed547f16bf7b6ba6aea5df20a). This fixes the crash part of bug #6387. There is a logic part, too: The problem currently only occurs when multiple mappings are found for one given unixid. Now winbindd does not crash any more but it does not correctly handle this situation. It just returns the last mapping from the ldap search results. This needs fixing. Michael
2009-02-27Initialize the id_map status in idmap_ldap to avoid surpriseBo Yang1-0/+8
2008-08-12Fix prototypesVolker Lendecke1-2/+2
(This used to be commit 8b9d12714679745b98755e6805e71b75828ce227)
2008-08-12Remove "idmap alloc config : range" parameterVolker Lendecke1-34/+11
This was overwritten by "idmap uid/gid" anyway. These are now the range parameters for the alloc backend. (This used to be commit d563a7b80dc3e759069db2cd54d596a1b8c55191)
2008-08-12idmap rewriteVolker Lendecke1-28/+27
(This used to be commit 30a180f2fce8cf6a3e5548f6bba453272ba70b33)
2007-12-15Replace sid_string_static by sid_string_dbg in DEBUGsVolker Lendecke1-4/+2
(This used to be commit bb35e794ec129805e874ceba882bcc1e84791a09)
2007-12-15Use sid_string_talloc where we have a tmp talloc ctxVolker Lendecke1-3/+4
(This used to be commit f00ab810d2540679bec109498ac89e1eafe18f03)
2007-10-18RIP BOOL. Convert BOOL -> bool. I found a few interestingJeremy Allison1-4/+4
bugs in various places whilst doing this (places that assumed BOOL == int). I also need to fix the Samba4 pidl generation (next checkin). Jeremy. (This used to be commit f35a266b3cbb3e5fa6a86be60f34fe340a3ca71f)
2007-10-10r25165: Use talloc_asprintf_append_buffer with an unmodifiedJeremy Allison1-4/+4
string. Jeremy. (This used to be commit fe30a523dfc77cc373145624246fd3ad5c62b9ac)
2007-10-10r25154: move winbindd code into winbindd/Stefan Metzmacher1-0/+1505
metze (This used to be commit 3ac7566ae14c48ff9b0f6b232e0ec4b2f73df558)