summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2012-10-18build: Assert that auth_domain, auth_builtin, auth_sam, auth_winbind are builtinAndrew Bartlett1-0/+6
These modules are used by default and for various reasons cannot be compiled into a .so The code setting up these lists is generic, so it is easier to just assert early, for this non-default configuration. Andrew Bartlett Signed-off-by: Andreas Schneider <asn@samba.org> Address bug #9295 - Can't find guest.so module if auth_builtin is built as module. Autobuild-User(master): Karolin Seeger <kseeger@samba.org> Autobuild-Date(master): Thu Oct 18 13:14:38 CEST 2012 on sn-devel-104
2012-10-18BUG #9295: Build standard auth modules as internal modules.Andreas Schneider1-8/+4
Signed-off-by: Andreas Schneider <asn@samba.org>
2012-10-17s3:smbd: fix brace placements in validate_my_share_entries() for readabilityMichael Adam1-2/+4
according to coding guidelines Signed-off-by: Michael Adam <obnox@samba.org> Signed-off-by: Jeremy Allison <jra@samba.org> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Wed Oct 17 14:37:58 CEST 2012 on sn-devel-104
2012-10-17s3:smbd: also log the "offline" flag when debugging the dos-modeMichael Adam1-0/+1
Signed-off-by: Michael Adam <obnox@samba.org> Signed-off-by: Jeremy Allison <jra@samba.org>
2012-10-12s3:smb2_getinfo ensure proper error for not yet present quota supportChristian Ambach1-0/+4
non-existing quota support needs to be signaled by NT_STATUS_NOT_SUPPORTED, not NT_STATUS_INVALID_PARAMETER Autobuild-User(master): Christian Ambach <ambi@samba.org> Autobuild-Date(master): Fri Oct 12 13:37:37 CEST 2012 on sn-devel-104
2012-10-12s3:vfs_gpfs re-indent run-away linesChristian Ambach1-4/+10
some lines added by the acl_blob additions were longer than 80 chars
2012-10-12s3:vfs_gpfs fix the buildChristian Ambach1-5/+11
make it compile again after the recent (untested) additions of the acl_blob functions
2012-10-12s3:vfs_gpfs remove a trailing spaceChristian Ambach1-1/+1
2012-10-12s3:vfs_gpfs skip local flock when gpfs sharemodes are disabledChristian Ambach1-2/+5
no sense in calling local flock when clustered sharemodes should be disabled
2012-10-11s3fs-printing: Simplify the comment and location handling.Andreas Schneider1-13/+17
Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Thu Oct 11 18:49:15 CEST 2012 on sn-devel-104
2012-10-11smbd: Always free the talloc_stackframe() before leaving ↵Andrew Bartlett1-0/+3
smbd_do_query_security_desc Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Thu Oct 11 15:20:54 CEST 2012 on sn-devel-104
2012-10-11rpc_server:srvsvc Remove psd variable that was no longer set by ↵Andrew Bartlett1-5/+3
SMB_VFS_FGET_NT_ACL This fixes up an error introduced by c8ade07760ae0ccfdf2d875c9f3027926e62321b. Andrew Bartlett Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Thu Oct 11 07:53:36 CEST 2012 on sn-devel-104
2012-10-11vfs: Remove irixacl module (all the fucntions in it are unimplemented)Andrew Bartlett7-197/+0
2012-10-11vfs: Fix alternative posix and no-op sys acl implementations to take a mem_ctxAndrew Bartlett4-31/+50
These were missed with the initial conversion to use a talloc context. Andrew Bartlett
2012-10-11vfs: Improve formatting of vfs_fake_aclsAndrew Bartlett1-2/+2
This avoids this bad style being copied into new modules. Andrew Bartlett Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Thu Oct 11 05:10:16 CEST 2012 on sn-devel-104
2012-10-11vfs: Improve formatting of vfs_defaultAndrew Bartlett1-23/+23
This avoids this bad style being copied into new modules. Andrew Bartlett
2012-10-11vfs: Use a blocking function in vfs_zfsacl for system ACL blobsAndrew Bartlett1-0/+12
This is so we do not query some other module for the ACL blob, as zfs ACLs are not posix ACLs. We may add a linearisation later. Andrew Bartlett
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_tru64acl for posix ACLsAndrew Bartlett1-0/+2
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_solarisacl for posix ACLsAndrew Bartlett1-0/+2
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_posixacl for posix ACLsAndrew Bartlett1-0/+2
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_irix for posix ACLsAndrew Bartlett1-0/+2
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_hpux for posix ACLsAndrew Bartlett1-0/+2
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_gpfs for posix ACLsAndrew Bartlett1-0/+58
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_fake_acls for posix ACLsAndrew Bartlett1-67/+2
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_default for posix ACLsAndrew Bartlett1-0/+2
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_aixacl2 for posix ACLsAndrew Bartlett1-0/+38
2012-10-11vfs: Use posix_sys_acl_blob_get_file in vfs_aixaclAndrew Bartlett1-0/+2
2012-10-11vfs: Use a blocking function in vfs_afsacl for system ACL blobsAndrew Bartlett1-1/+17
This is important, as we need to avoid asking any lower module for a possible libear ACL blob. We may implement a linearisation in the future. Andrew Bartlett
2012-10-11vfs: Implement a sys_acl_blob_get_{fd,file} for POSIX ACL backendsAndrew Bartlett3-1/+126
This simply linearlises the SMB_ACL_T (default and access acl for directories) and the file owner, group and mode into a blob. It will be useful for an improved vfs_acl_common.c that uses this sets that, rather than the hash of the NT ACL, in the xattr This will in turn insulate the stored hash from changes in the ACL mapping. Andrew Bartlett
2012-10-11vfs: Remove type parameter from sys_acl_blob_get_{fd,file}Andrew Bartlett5-14/+13
This interface actually needs to match the get_nt_acl interface in that the system ACL implmenetation may not be posix ACLs, and the blob is not meant to be enforced to be of a particular system ACL structure. Andrew Bartlett
2012-10-11smbd: Add mem_ctx to {f,}get_nt_acl VFS callAndrew Bartlett23-124/+231
This makes it clear which context the returned SD is allocated on, as a number of callers do not want it on talloc_tos(). As the ACL transformation allocates and then no longer needs a great deal of memory, a talloc_stackframe() call is used to contain the memory that is not returned further up the stack. Andrew Bartlett
2012-10-11smbd: Add mem_ctx to sys_acl_init() and all callersAndrew Bartlett25-140/+203
This changes from allocation on NULL to allocation on the supplied memory context. Currently that supplied context is talloc_tos() at the the final consumer of the ACL. Andrew Bartlett
2012-10-11build: Add vfs_media_harmony to the waf buildAndrew Bartlett1-0/+9
2012-10-10s3-rpc_server: fix build warningDavid Disseldorp1-0/+2
enum dcerpc_transport_t is undeclared, include required headers. Autobuild-User(master): David Disseldorp <ddiss@samba.org> Autobuild-Date(master): Wed Oct 10 12:41:28 CEST 2012 on sn-devel-104
2012-10-09Make sure the returned sd is on the right context, and if not it's always freed.Jeremy Allison1-1/+3
Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Tue Oct 9 23:35:50 CEST 2012 on sn-devel-104
2012-10-09Move setting of psd->dacl->revision and protect against null SD's.Jeremy Allison1-2/+4
2012-10-09s3: Pass down smb_filename to smbacl4_fill_ace4Volker Lendecke1-6/+6
A full fsp is a bit overkill here Autobuild-User(master): Volker Lendecke <vl@samba.org> Autobuild-Date(master): Tue Oct 9 13:38:49 CEST 2012 on sn-devel-104
2012-10-08s3fs-printing: Fix RAW printing for normal users.Andreas Schneider1-1/+1
This fixes bug #8769. Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Mon Oct 8 16:11:51 CEST 2012 on sn-devel-104
2012-10-06s3: Add two tests a CLEAR_IF_FIRST crashVolker Lendecke1-0/+56
Autobuild-User(master): Volker Lendecke <vl@samba.org> Autobuild-Date(master): Sat Oct 6 17:16:39 CEST 2012 on sn-devel-104
2012-10-06We should never just assign an st_mode to an ace->perms field, theoreticallyJeremy Allison1-2/+2
they are different so should go through a mapping function. Ensure this is so. Practically this does not matter, as for user permissions the mapping function is an identity, and the extra bits we may add are ignored anyway, but this makes the intent clear. Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Sat Oct 6 03:04:14 CEST 2012 on sn-devel-104
2012-10-05Modify ensure_canon_entry_valid() into ensure_canon_entry_valid_on_set() - ↵Jeremy Allison1-154/+141
makes the logic clearer.
2012-10-05Simplify ensure_canon_entry_valid by splitting out the _get codepath.Jeremy Allison1-3/+86
2012-10-04Remove the parameters:Jeremy Allison2-8/+0
security mask force security mode directory security mask force directory security mode and update the docs.
2012-10-04Remove all uses of ↵Jeremy Allison2-20/+10
lp_security_mask/lp_force_security_mode/lp_dir_security_mask/lp_force_dir_security_mode and replace with the normal masks. Now these parameters can be removed.
2012-10-04Revert "Add functions to programatically set the security mask and directory ↵Jeremy Allison2-16/+0
security mask parameters." This reverts commit 8f0ecbbbeebff0174579a78827d384067cd4cbb7. Not now needed as part of the move to remove security mask parameters.
2012-10-04Revert "When creating a new file/directory, we need to obey the create ↵Jeremy Allison1-15/+0
mask/directory mask parameters." This reverts commit c251a6b0442abc13bc8be4ff8de324c1d7706a78. Remove this as we're planning to remove the security mask, directory security mask parameters and only use create mask/directory mask.
2012-10-04s3fs-smbd: Make sure the registry is set up before we init printing.Andreas Schneider1-4/+4
Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Thu Oct 4 12:06:29 CEST 2012 on sn-devel-104
2012-10-04waf: Build pam_smbpass module only if enabled.Andreas Schneider2-1/+5
2012-10-03Revert "Fix bug #9222 - smbd ignores the "server signing = no" setting for ↵Jeremy Allison2-12/+4
SMB2." This reverts commit dfd3c31a3f9eea96854b2d22574856368e86b245. As Metze pointed out: From MS-SMB2 section 2.2.4: SMB2_NEGOTIATE_SIGNING_ENABLED When set, indicates that security signatures are enabled on the server. The server MUST set this bit, and the client MUST return STATUS_INVALID_NETWORK_RESPONSE if the flag is missing. I'll submit a documentation bug to fix #9222 that way.
2012-10-03Fix bug #9214 - Bad user supplied SMB2 credit value can cause smbd to call ↵Jeremy Allison1-1/+6
smb_panic. Terminate the connection cleanly instead.