summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2009-05-22s3: set winbindd request flags in ntlm_auth to make it contact trusted ↵Bo Yang3-2/+58
domain when krb5 auth is enabled Signed-off-by: Bo Yang <boyang@samba.org>
2009-05-20Make cli_posix_open() and cli_posix_mkdir() async.Jeremy Allison4-75/+243
Jeremy.
2009-05-20s3: Change unix_convert (and its callers) to use struct smb_filenameTim Prouty10-383/+588
This is the first of a series of patches that change path based operations to operate on a struct smb_filename instead of a char *. This same concept already exists in source4. My goals for this series of patches are to eventually: 1) Solve the stream vs. posix filename that contains a colon ambiguity that currently exists. 2) Make unix_convert the only function that parses the stream name. 3) Clean up the unix_convert API. 4) Change all path based vfs operation to take a struct smb_filename. 5) Make is_ntfs_stream_name() a constant operation that can simply check the state of struct smb_filename rather than re-parse the filename. 6) Eliminate the need for split_ntfs_stream_name() to exist. My strategy is to start from the inside at unix_convert() and work my way out through the vfs layer, call by call. This first patch does just that, by changing unix_convert and all of its callers to operate on struct smb_filename. Since this is such a large change, I plan on pushing the patches in phases, where each phase keeps full compatibility and passes make test. The API of unix_convert has been simplified from: NTSTATUS unix_convert(TALLOC_CTX *ctx, connection_struct *conn, const char *orig_path, bool allow_wcard_last_component, char **pp_conv_path, char **pp_saved_last_component, SMB_STRUCT_STAT *pst) to: NTSTATUS unix_convert(TALLOC_CTX *ctx, connection_struct *conn, const char *orig_path, struct smb_filename *smb_fname, uint32_t ucf_flags) Currently the smb_filename struct looks like: struct smb_filename { char *base_name; char *stream_name; char *original_lcomp; SMB_STRUCT_STAT st; }; One key point here is the decision to break up the base_name and stream_name. I have introduced a helper function called get_full_smb_filename() that takes an smb_filename struct and allocates the full_name. I changed the callers of unix_convert() to subsequently call get_full_smb_filename() for the time being, but I plan to eventually eliminate get_full_smb_filename().
2009-05-20s3:smbd: check the incoming session id for SMB2 requestsStefan Metzmacher3-2/+98
metze
2009-05-20s3:smbd: implement SMB2 Session Setup with raw NTLMSSPStefan Metzmacher4-1/+221
metze
2009-05-20s3:smbd: for now indicate raw NTLMSSP in the SMB2 Negotiate responseStefan Metzmacher1-0/+3
metze
2009-05-20s3:smbd: move the callback functions of smbd_smb2_request_reply() closer itselfStefan Metzmacher1-42/+42
metze
2009-05-20s3:smbd: add smbd_smb2_request_done_ex()Stefan Metzmacher2-5/+16
Some times we have to return a non-error response with status != NT_STATUS_OK. metze
2009-05-20s3:smbd: fix initialized memory in SMB2 responsesStefan Metzmacher1-4/+4
MESSAGE_ID and SESSION_ID are both 64bit. metze
2009-05-20Add a security model to LSA. Similar to the SAMR code - usingJeremy Allison1-88/+227
the MS-LSA docs. Jeremy.
2009-05-20Use SMB_VFS_NEXT_CLOSE. This VFS stuff is really opaque to me...Volker Lendecke1-5/+1
Thanks Michael to provide some transparency :-)
2009-05-20s3:smbd: add support for SMB2 Keepalive (SMB2 Echo)Stefan Metzmacher4-0/+93
metze
2009-05-20s3:smbd: allow SMB 2.002 dialect in SMB1 negprotStefan Metzmacher3-0/+38
We create a dummy SMB2 Negotiate inbuf and pass the connection to the SMB2 engine. metze
2009-05-20s3:smbd: add support for SMB2 NegotiateStefan Metzmacher4-1/+132
This is not complete, but a start that makes the samba4 smb2 client happy. metze
2009-05-20s3:smbd: make negprot_spnego() non staticStefan Metzmacher2-1/+3
metze
2009-05-20s3:smbd: add infrastructure for SMB2 supportStefan Metzmacher4-0/+1050
This is disabled by default and activated by "max protocol = SMB2". metze
2009-05-20s3:param: add PROTOCOL_SMB2Stefan Metzmacher2-1/+10
metze
2009-05-20Fix bug disclosed by lock8 torture testVolker Lendecke1-0/+17
We have to drop the gpfs level share modes, regardless of whether we put the file into the pending close queue.
2009-05-20Demonstrate a bug we have when dealing with real os-level share modesVolker Lendecke1-0/+75
Another one of those where you stare at logfiles for hours, and when you found it, it's absolutely obvious what is happening...
2009-05-20s3-selftest: add add and delete group scripts using nss_wrapper.Günther Deschner1-0/+2
Guenther
2009-05-20Do not do a merged build without shared libsVolker Lendecke1-0/+1
Jelmer, you might want to take a look at Andrew B's problem with --enable-developer --disable-shared --disable-shared-libs
2009-05-20Only build the krb5 locator when building shared libsVolker Lendecke1-1/+3
2009-05-19Make local-wbclient flexible in # of connections and opsVolker Lendecke1-4/+6
2009-05-19Fix wb_trans_done after conversion to unix calling conventionsVolker Lendecke1-2/+2
2009-05-19Fix an uninitialized variable in wb_context_initVolker Lendecke1-0/+1
2009-05-19Another attempt at fixing the static build of vfs_notify_famVolker Lendecke1-5/+6
2009-05-19Fix detection of "enum FAMCodes"Volker Lendecke1-1/+1
2009-05-19s3 onefs: Removing an incorrect TALLOC_FREEAravind Srinivasan1-1/+0
Signed-off-by: Tim Prouty <tprouty@samba.org>
2009-05-19Use TDB_VOLATILE instead of tdb_set_max_dead()Volker Lendecke1-5/+2
2009-05-18s3: Always allocate memory in dptr_ReadDirNameAravind Srinivasan3-18/+45
This is a follow up to 69d61453df6019caef4e7960fa78c6a3c51f3d2a to adjust the API to allow the lower layers allocate memory. Now the memory can explicitly be freed rather than relying on talloc_tos(). Signed-off-by: Tim Prouty <tprouty@samba.org>
2009-05-18s3 sendfile: Fix two bugs in sendfileTim Prouty1-3/+4
These were found interally via code inspection. 1) fake_sendfile was incorrectly writing zeros over real data on a short read. 2) sendfile_short_send was doing 4 byte writes instead of 1024 byte writes due to an incorrect sizeof usage. Jermey, Vl please check
2009-05-18Change access_check_samr_object -> access_check_object.Jeremy Allison3-24/+25
Make map_max_allowed_access global. Change lsa_get_generic_sd to add Everyone:LSA_POLICY_READ|LSA_POLICY_EXECUTE, not just LSA_POLICY_EXECUTE. Jeremy.
2009-05-19s3-lsa: let _lsa_OpenPolicy() just call _lsa_OpenPolicy2().Günther Deschner1-37/+6
Guenther
2009-05-18s3-selftest: enable RPC-SAMR-USERS-PRIVILEGES.Günther Deschner1-1/+1
Guenther
2009-05-18Fix SAMR server for winbindd access. Ensure we allowJeremy Allison1-2/+2
MAX_ACCESS to be mapped to what we're giving Everyone. Jeremy.
2009-05-18s3-lsa: let _lsa_GetSystemAccessAccount() call into _lsa_EnumPrivsAccount().Günther Deschner1-3/+23
Inspired by lsa server from Samba 4. Just removing a user in SAMR does not remove a user in LSA. If you use usermanager from windows, the "User Rights" management gui gets unaccessable as soon as you delete a user that had privileges granted. With this fix, that no longer existing user would properly appear as an unknown account in the GUI (as it does while using usermanager with windows domains). This almost makes Samba3 pass the RPC-SAMR-USERS-PRIVILEGES test. Guenther
2009-05-18s3-lsa: start a very basic implementation of _lsa_DeleteObject().Günther Deschner1-1/+23
Certainly not the full story but this gets us closer to pass the RPC-SAMR-USERS-PRIVILEGES test. Guenther
2009-05-18Move down the become_root()/unbecome_root() calls into the VFS modulesVolker Lendecke2-8/+22
The aio_fork module does not need this, as it does not communicate via signals but with pipes. Watching a strace log with those become_root() calls in aio.c is absolutely awful, and it does affect performance.
2009-05-18Fix bug 5681: Do not limit the number of network interfacesVolker Lendecke4-25/+40
Jeremy as far as I can see there is no real technical reason to limit the number of interfaces. If you like this patch, can you please merge it to 3.4? If you don't please tell me :-) Thanks, Volker
2009-05-18In aio_fork, we have to close all fd's, we might hold a gpfs share modeVolker Lendecke1-0/+16
Keeping such an fd open prohibits another open of that same file.
2009-05-18Add "file_walk_table" to do stuff with all open filesVolker Lendecke2-0/+26
2009-05-18Fix a race condition in vfs_aio_fork with gpfs share modesVolker Lendecke1-2/+8
2009-05-18Fix broken pipe handlingVolker Lendecke2-4/+4
Metze is right: If we have *any* error at the socket level, we just can not continue. Also, apply some defensive programming: With this async stuff someone else might already have closed the socket.
2009-05-18Fix a type-punned warningVolker Lendecke1-1/+1
2009-05-19s3: tevent_req_poll() loops forever when pipe is brokenBo Yang2-1/+28
Signed-off-by: Bo Yang <boyang@samba.org>
2009-05-17s3:fix bug #6371, unsuccessful net conf setparm leaves empty shareMichael Adam1-3/+25
Wrap creation of share and setting of parameter into a transaction. Michael
2009-05-17s3-events: Not only timed, also immediate events generate a timeout returnVolker Lendecke1-1/+1
2009-05-16Move smb_create_user() in samsyncSimo Sorce3-65/+60
It is not used anywhere else, so make it also static and remove it from proto.h
2009-05-16Fix static linking of vfs_notify_famVolker Lendecke2-1/+6
2009-05-16Fix a typoVolker Lendecke1-1/+1