summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2009-11-07s3: Get rid of explicit pipe namesVolker Lendecke1-49/+54
2009-11-07s3: get_pipe_name_from_iface -> get_pipe_name_from_syntaxVolker Lendecke9-57/+88
2009-11-06Fix bug 6865 - acl_xattr module: Has dependency that inherit acls = yes or ↵Jeremy Allison4-0/+27
xattrs are removed. Jeremy.
2009-11-06Fix bug 6841 - "map acl inherit = yes" not working.Jeremy Allison1-8/+29
The code to read the new V2 SAMBA_PAI entries had two errors. Jeremy.
2009-11-06s3-kerberos: let smb_krb5_get_tkt_from_creds() compile with older heimdal libs.Günther Deschner1-1/+1
Guenther
2009-11-06s3-netlogon: implement _netr_GetDcName and _netr_GetAnyDcName.Günther Deschner1-5/+116
Guenther
2009-11-06Revert "s3-kerberos: add smb_krb5_parse_name_flags()."Günther Deschner2-22/+1
This reverts commit 17ef153b68795fec681f9ce17c198236aba2b1c2.
2009-11-06s3-kerberos: support S4U2SELF impersionation through cli_krb5_get_ticket().Günther Deschner2-6/+22
Guenther
2009-11-06s3-kerberos: use smb_krb5_get_credentials in ads_krb5_mk_req.Günther Deschner1-4/+7
Guenther
2009-11-06s3-kerberos: modify cli_krb5_get_ticket to take a new impersonate_princ_s arg.Günther Deschner5-8/+13
Guenther
2009-11-06s3-net: better use memory credential cache in net_ads_kerberos_pac().Günther Deschner1-1/+1
Guenther
2009-11-06s3-net: allow to call "net ads kerberos pac <impersonation principal> -P".Günther Deschner1-1/+7
Guenther
2009-11-06s3-kerberos: add impersonate_principal for kerberos_return_pac_X calls.Günther Deschner3-1/+28
Guenther
2009-11-06s3-kerberos: add smb_krb5_get_tkt_from_creds().Günther Deschner1-0/+40
Guenther
2009-11-06s3-kerberos: fix some build warnings when building against heimdal.Günther Deschner1-2/+2
Guenther
2009-11-06s3-kerberos: add smb_krb5_get_{creds,credentials} incl. support for S4U2SELF ↵Günther Deschner3-2/+284
impersonation. Guenther
2009-11-06s3-kerberos: remove duplicate prototype.Günther Deschner1-4/+0
Guenther
2009-11-06s3-kerberos: add smb_krb5_parse_name_flags().Günther Deschner2-1/+22
Guenther
2009-11-06s3-kerberos: add configure checks for krb5_get_creds_X api.Günther Deschner1-0/+3
Guenther
2009-11-05Got the logic simplification worked out so we still passJeremy Allison5-33/+50
BASE-DELAYWRITE and also RAW-CLOSE. Jeremy.
2009-11-05Revert commit "0551284dc08eb93ef7b2b2227a45e5ec21d482fb" - simplifyJeremy Allison4-12/+34
the logic. This was incorrect (I'll revisit this tomorrow). Jeremy.
2009-11-05Remove the smbd:writetimeupdatedelay change Metze added. Metze pleaseJeremy Allison2-3/+7
explain why you added this. Change --maximum-runtime=900 for smbtorture4 with BASE-DELAYWRITE. Should allow it to successfully complete now. Jeremy.
2009-11-05Simplify the logic - remove extraneous argument and calls to ↵Jeremy Allison4-34/+12
set_close_write_time(). We were treating a file time set on close as a sticky write time set, and I don't think it is. I will add a torture test later to RAW-CLOSE to confirm this. Jeremy.
2009-11-05Fix explicit set of write time on close.Jeremy Allison1-1/+5
Jeremy.
2009-11-05Get closer to an accurate model of Windows timestamp changes.Jeremy Allison6-32/+56
"Normal" non truncate writes always cause the timestamp to be set on close. Once a close is done on a handle this can reset the sticky write time to current time also. Updated smbtorture4 confirms this. Jeremy.
2009-11-05s3: Fix a crash in notify_remove_onelevel when "change notify = no"Volker Lendecke1-0/+4
2009-11-05s3: Fix the talloc hierarchy in notify_remove_onelevelVolker Lendecke1-1/+1
We want to free the record early, not when talloc_tos() is free'ed.
2009-11-05s3: Add parameter "ctdb timeout"Volker Lendecke5-5/+36
When something in the cluster blocks, it can happen that we wait indefinitely long for ctdb, just adding to the blocking condition. In theory, nothing should block, but as someone said "In practice the difference between theory and practice is larger than in theory". This adds a timeout parameter in seconds, after which we stop waiting for ctdb and panic.
2009-11-06s3: Fix kerberos refresh chain.Bo Yang1-1/+3
Signed-off-by: Bo Yang <boyang@samba.org>
2009-11-04Fix debug comment (brain wasn't working...).Jeremy Allison1-2/+2
Jeremy.
2009-11-04Filter the returned DOS attributes by 0xFF for clientsJeremy Allison1-0/+12
using older protocols (LANMAN2 or below). Jeremy.
2009-11-04Remove "Protocol" as an extern, and add accessor functions.Jeremy Allison9-30/+31
Jeremy.
2009-11-04s3: add support for full windows timestamps resolution on filesBjörn Jacke2-6/+14
setting nanosecond timestamps using utimensat() was first supported by Linux kernel 2.6.22 and glibc 2.6. It's specified in POSIX.1-2008. This effectively makes us use Windows' full 100ns timestamp resolution - actually just an improvement from 10^-6 to 10^-7. For now Linux CIFS vfs will also just be able to make use of 100ns resolution, not 1ns.
2009-11-04libcli/nbt Move more of lmhosts lookup into common codeAndrew Bartlett1-45/+15
This aims to eventually share this with Samba4. Andrew Bartlett
2009-11-04s3-netlogon: make sure we protect some function codes in ↵Günther Deschner1-0/+13
_netr_LogonControl2Ex(). Guenther
2009-11-04s3-netlogon: let s3 pass against RPC-NETLOGON-S3 again.Günther Deschner1-0/+72
Guenther
2009-11-04s3-netlogon: implement _netr_NETLOGON_INFO_4 in netr_LogonControl2Ex() and ↵Günther Deschner1-0/+10
friends as well. Guenther
2009-11-04s3-netlogon: implement remote trust account changing in ↵Günther Deschner1-0/+41
netr_LogonControl2Ex() and friends. Guenther
2009-11-03s3-lsa: fill in some more info levels in _lsa_QueryInfoPolicy().Günther Deschner1-0/+32
Add dummys (just like s4 does) and fill in some more appropriate error codes. Guenther
2009-11-03s3-passdb: cleanup some callers of pdb_get_trusteddom_pw().Günther Deschner2-6/+2
Guenther
2009-11-03Fix debug statements to use correct function name.Jeremy Allison1-13/+13
Jeremy.
2009-11-03requires_resume_key is a bool not int.Jeremy Allison1-7/+2
Jeremy.
2009-11-03Fix more of the RAW-SEARCH test. Older info levels areJeremy Allison1-2/+9
not 4 byte aligned (levels 1 - 3). Jeremy.
2009-11-03s3: Remove debug_ctx()Volker Lendecke13-86/+70
smbd just crashed on me: In a debug message I called a routine preparing a string that itself used debug_ctx. The outer routine also used it after the inner routine had returned. It was still referencing the talloc context that the outer debug_ctx() had given us, which the inner DEBUG had already freed.
2009-11-02Convert from numbers to correct SMB_FIND_XX constant names.Jeremy Allison1-8/+12
Jeremy.
2009-11-03s3:registry: add an extra check for dsize==0 to regdb_fetch_keys_internal()Michael Adam1-1/+1
Don't only rely on dptr == NULL. I stumbled over this one when rewriting some of the dbwrap_ctdb code. Michael
2009-11-03s3:registry: add safety check for return value of tdb_unpack to ↵Michael Adam1-0/+4
regdb_fetch_keys_internal() Prevents segfaults in some situations. (For a non existent or empty record, we sometimes rely on the fetch operation to return dsize==0 and sometimes we rely on dptr==NULL.) Michael
2009-11-03s3:dbwrap_ctdb: add debug message to transaction_fetch_start()Michael Adam1-0/+4
for the case that another local process has started a transaction bewteen releasing the transaction_lock record and starting the transaction. Michael
2009-11-03s3:dbwrap_ctdb: split combined check in two and add descriptive debugMichael Adam1-1/+14
in db_ctdb_transaction_fetch_start() for error conditions when re-fetching the transaction_lock record inside the transaction Michael
2009-11-03s3:dbwrap_ctdb: fix race condition with concurrent transactions on the same ↵Michael Adam1-0/+12
node. In ctdb_transaction_commit(), when the trans2_commit control fails, there is a race condition in the 1 second sleep between the local transaction_cancel and the call to ctdb_replay_transaction(): The database is not locked, and neither is the transaction_lock record. So another client can start and possibly complete a new transaction in this gap, but only on the same node: The locking of the transaction_lock record on a different node which involves migration of the record to the other node has been disabled by introduction of the transaction_active flag on the db which closes precisely this gap from the start of the commit until the call to TRANS2_FINISH or TRANS2_ERROR. But this mechanism does not cover the case where a process on the same node tries to start a transaction: There is no obstacle to locking the transaction_lock record because the record does not need to be migrated. This commit closes this race condition in ctdb_transaction_fetch_start() by using the new ctdb_ctrl_transaction_active() call to ask the local ctdb daemon whether it has a transaction running on the database. If so, the check is repeated until the running transaction is done. This does introduce an additional call to the local ctdbd when starting transactions, but it does close the (hopefully) last race condition. Michael