Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2012-05-18 | Fix the waf build with the new "cleans up stale processes" test. | Jeremy Allison | 1 | -0/+1 | |
Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Fri May 18 00:20:36 CEST 2012 on sn-devel-104 | |||||
2012-05-17 | s3: Check for serverid_exists in close_directory | Volker Lendecke | 1 | -0/+3 | |
Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Check for serverid_exists in close_remove_share_mode | Volker Lendecke | 1 | -0/+3 | |
Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Be less picky on stale share mode entries | Volker Lendecke | 1 | -1/+3 | |
If a process died, the share mode entry might be bogus. Ignore those entries. Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Check for serverid_exists in find_oplock_types | Volker Lendecke | 1 | -0/+20 | |
Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Test whether get_share_mode_lock cleans up stale processes | Volker Lendecke | 4 | -1/+179 | |
Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Check for serverid_exists in rename_share_filename | Volker Lendecke | 1 | -0/+4 | |
Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Do not check the PIDs is parse_share_modes | Volker Lendecke | 1 | -42/+0 | |
We do that when conflicts arise Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Check for serverid_exists in smb_posix_unlink | Volker Lendecke | 1 | -0/+3 | |
Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Check for serverid_exists in open_mode_check | Volker Lendecke | 1 | -0/+5 | |
Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Check for serverid_exists in notify_deferred_opens | Volker Lendecke | 1 | -2/+8 | |
We will remove the check in parse_share_modes soon Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3: Add "share_mode_stale_server" | Volker Lendecke | 2 | -0/+33 | |
This is a helper routine that prunes a dead share mode entry on demand. This prepares for removing the serverids_exist call in parse_share_modes. Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3:gse: implement gensec_gse_expire_time() | Stefan Metzmacher | 1 | -0/+12 | |
metze | |||||
2012-05-17 | s3:gse: remember the expire time | Stefan Metzmacher | 1 | -2/+15 | |
metze | |||||
2012-05-17 | s3:smb2_sesssetup: make use of nt_status_squash() in ↵ | Stefan Metzmacher | 1 | -1/+1 | |
smbd_smb2_session_setup_recv() metze | |||||
2012-05-17 | Check the return from create_acl_blob | Richard Sharpe | 1 | -4/+6 | |
Autobuild-User: Richard Sharpe <sharpe@samba.org> Autobuild-Date: Thu May 17 07:17:29 CEST 2012 on sn-devel-104 | |||||
2012-05-17 | s3-smbd: Avoid creating a UID ACL entry for SIDs that are mapped as ↵ | Andrew Bartlett | 1 | -0/+35 | |
ID_TYPE_BOTH The GID ACL entry is what will be mapped in most cases, and so is sufficient. Andrew Bartlett Signed-off-by: Jeremy Allison <jra@samba.org> Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Thu May 17 05:08:44 CEST 2012 on sn-devel-104 | |||||
2012-05-17 | s3-smbd: Consider a group with the same SID as sufficient duplication | Andrew Bartlett | 1 | -0/+7 | |
This code is to ensure that the user does not loose rights when their file ownership is taken away. If the owner (an IDMAP_BOTH SID) appears as a group then a duplicate user is not required. Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | s3-smbd: Handle ID_TYPE_BOTH by mapping to both a group ACL entry and file ↵ | Andrew Bartlett | 1 | -39/+109 | |
ownership This will allow groups, such as domain administrators, to own files while correctly handling the rest of the ACL permissions. Andrew Bartlett Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | We need to split things up into a new helper function ↵ | Andrew Bartlett | 1 | -172/+184 | |
add_current_ace_to_acl() in order for there to be more posix ACL elements than NT ACL elements (so a group SID can own a file, but also get the group permissions that will be honoured) Andrew Bartlett Slightly modified by Jeremy to reduce diff size. Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-17 | This covers a case where an ID_TYPE_BOTH mapping creates group permissions, ↵ | Jeremy Allison | 1 | -2/+5 | |
but must own the file. Based on an original patch by Andrew Bartlett. | |||||
2012-05-17 | s3-smbd: Do not merge UID ACE values with GID ACE values for posix ACL | Andrew Bartlett | 1 | -5/+12 | |
This might happen when we get a SID mapped to IDMAP_BOTH. Andrew Bartlett Signed-off-by: Jeremy Allison <jra@samba.org> | |||||
2012-05-16 | s3:onefs: remove all onefs related code as it not maintained anymore | Stefan Metzmacher | 23 | -10395/+2 | |
See https://lists.samba.org/archive/samba-technical/2012-May/083631.html for the discussion. metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed May 16 11:23:05 CEST 2012 on sn-devel-104 | |||||
2012-05-16 | Fix the overwriting of errno before use in a DEBUG statement and use the ↵ | Richard Sharpe | 2 | -5/+8 | |
return value from store_acl_blob_fsp rather than ignoring it. Autobuild-User: Richard Sharpe <sharpe@samba.org> Autobuild-Date: Wed May 16 03:43:41 CEST 2012 on sn-devel-104 | |||||
2012-05-15 | s3: Fix Coverity ID 242710 Untrusted pointer read | Volker Lendecke | 1 | -1/+1 | |
According to susv3 we have to make sure that we call isupper with values only in the range of an unsigned char. This is best achieved by automatic narrowing through assignment. | |||||
2012-05-15 | libcli/smb: move smb2cli_ioctl.c from source3 to the toplevel | Björn Baumbach | 4 | -374/+1 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Tue May 15 20:17:01 CEST 2012 on sn-devel-104 | |||||
2012-05-15 | libcli/smb: move smb2cli_query_directory.c from source3 to the toplevel | Björn Baumbach | 4 | -244/+2 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2012-05-15 | libcli/smb: move smb2cli_query_info.c from source3 to the toplevel | Björn Baumbach | 4 | -288/+1 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2012-05-15 | libcli/smb: move smb2cli_set_info.c from source3 to the toplevel | Björn Baumbach | 4 | -211/+1 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2012-05-15 | libcli/smb: move smb2cli_flush.c from source3 to the toplevel | Björn Baumbach | 4 | -151/+1 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2012-05-15 | libcli/smb: move smb2cli_write.c from source3 to the toplevel | Björn Baumbach | 4 | -191/+1 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2012-05-15 | libcli/smb: move smb2cli_read.c from source3 to the toplevel | Björn Baumbach | 4 | -219/+1 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2012-05-15 | libcli/smb: move smb2cli_close.c from source3 to the toplevel | Stefan Metzmacher | 4 | -157/+1 | |
metze | |||||
2012-05-15 | libcli/smb: move smb2cli_create.c from source3 to the toplevel | Stefan Metzmacher | 4 | -318/+1 | |
metze | |||||
2012-05-15 | s3:libsmb: avoid interpret_long_date() in smb2cli_create | Stefan Metzmacher | 1 | -8/+8 | |
metze | |||||
2012-05-15 | s3:cli_np_tstream: include smbXcli_base.h, because we'll use functions from ↵ | Stefan Metzmacher | 1 | -0/+1 | |
there metze | |||||
2012-05-15 | s3: Remove some unused code | Volker Lendecke | 1 | -14/+0 | |
Autobuild-User: Volker Lendecke <vl@samba.org> Autobuild-Date: Tue May 15 18:24:10 CEST 2012 on sn-devel-104 | |||||
2012-05-15 | s3: Fix a likely cut&paste error | Volker Lendecke | 1 | -1/+1 | |
2012-05-15 | s3-auth: Rename to init_system_session_info(). | Andreas Schneider | 4 | -4/+4 | |
Autobuild-User: Andreas Schneider <asn@cryptomilk.org> Autobuild-Date: Tue May 15 13:56:00 CEST 2012 on sn-devel-104 | |||||
2012-05-15 | s3-auth: Don't lookup the system user in pdb. | Andreas Schneider | 1 | -4/+95 | |
This fixes bug #8944, ldapsam:trusted and ipasam. It is an additional fix for bug #8567 (0528cb5f3a15b72dcb34ece21a3ffb3e7b8d6eb9). | |||||
2012-05-15 | s3:auth: remove unused auth_server.c | Stefan Metzmacher | 6 | -508/+1 | |
metze | |||||
2012-05-15 | s3-auth: remove "security=server" (depricated since 3.6) | Stefan Metzmacher | 3 | -14/+2 | |
"security=server" has a lot of problems in the world with modern security (ntlmv2 and krb5). It was also not very reliable, as it needed a stable connection to the password server for the lifetime of the whole client connection! Please use "security=domain" or "security=ads" is you authentication against remote servers (domain controllers). metze -------------- / \ / REST \ / IN \ / PEACE \ / \ | SEC_SERVER | | security=server | | | | | | 12 May | | | | 2012 | *| * * * | * _________)/\\_//(\/(/\)/\//\/\///|_)_______ | |||||
2012-05-15 | selftest: Remove tests for security=server | Andrew Bartlett | 1 | -4/+1 | |
Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2012-05-14 | s3: talloc_zero is not needed for structs we ndr_pull into | Volker Lendecke | 1 | -1/+1 | |
Autobuild-User: Volker Lendecke <vl@samba.org> Autobuild-Date: Mon May 14 18:59:07 CEST 2012 on sn-devel-104 | |||||
2012-05-14 | libcli/smb: move smb2cli_logoff_* from source3 to the top level | Stefan Metzmacher | 4 | -142/+0 | |
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Mon May 14 17:02:46 CEST 2012 on sn-devel-104 | |||||
2012-05-14 | libcli/smb: git mv smb2_session.c smb2cli_session.c | Stefan Metzmacher | 1 | -1/+1 | |
metze | |||||
2012-05-14 | s3:libsmb: s/\<event_context/tevent_context/gc in smb2cli_write.c | Stefan Metzmacher | 1 | -2/+2 | |
metze | |||||
2012-05-14 | s3:libsmb: s/\<event_context/tevent_context/gc in smb2cli_session.c | Stefan Metzmacher | 1 | -2/+2 | |
metze | |||||
2012-05-14 | s3:libsmb: s/\<event_context/tevent_context/gc in smb2cli_read.c | Stefan Metzmacher | 1 | -2/+2 | |
metze | |||||
2012-05-14 | s3:libsmb: s/\<event_context/tevent_context/gc in smb2cli_query_directory.c | Stefan Metzmacher | 1 | -2/+2 | |
metze |