summaryrefslogtreecommitdiff
path: root/source4/ldap_server/ldap_backend.c
AgeCommit message (Collapse)AuthorFilesLines
2012-06-22dsdb-schema: do not reload more often than schema_reload_intervalMatthieu Patou1-2/+23
Samba 4 use to try to reload the schema every time dsdb_get_schema was called (which could be 20+ time per ldb request). Now we only reload at most every xx seconds (xx being the value of dsdb:"schema_reload_interval" or 120). The timestamp of the last reloaded schema is kept in the dsdb_schema object. There is also a timestamp in the ldb_context, that is used by the LDAP server to know if it has to reload the schema after handling the request. This is used to allow that the schema will be immediately reload after a schemaUpdateNow request has been issued, the reload can't occur in the handling of the LDAP request itself because we have a transaction autostarted.
2011-10-11s4:ldap_backend.c/"map_ldb_error" - handle errors similar to "PyErr_SetLdbError"Matthias Dieter Wallnöfer1-6/+2
If the call was done using an error string ("add_err_string"), then use that one without an additional "ldb_strerror()" for the definitive LDAP output. Otherwise generate one using "ldb_strerror()". This omits redundancies in the error string generation (twice the same information by "ldb_strerror()"). Signed-off-by: Andrew Tridgell <tridge@samba.org>
2011-10-04s4-ldap-server: disallow all modifies on global catalog portAndrew Tridgell1-0/+20
2011-09-22s4-ldap-server: set the NO_GLOBAL_CATALOG control on non-GC operationsAndrew Tridgell1-0/+2
this makes us honor GC semantics on the two ldap ports
2011-03-04s4:LDAP server - remove validation checks of input DNsMatthias Dieter Wallnöfer1-23/+8
We should rather try to let the LDB modules perform these checks otherwise different backends behaviour differently. Reviewed by: Tridge
2011-02-10ldb: use #include <ldb.h> for ldbAndrew Tridgell1-2/+2
thi ensures we are using the header corresponding to the version of ldb we're linking against. Otherwise we could use the system ldb for link and the in-tree one for include Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
2010-12-13s4:ldap_server: don't call ldb_req_mark_untrusted() on the privileged ldapi ↵Stefan Metzmacher1-5/+15
socket metze
2010-12-13s4:ldap_server: rename helper functions to ldapsrv_ prefix and pass ldapsrv_callStefan Metzmacher1-15/+19
metze
2010-10-27s4-ldb: Changes the aclread module to use LDB_HANDLE_FLAG_UNTRUSTED to ↵Nadezhda Ivanova1-1/+0
determine the source of the request The aclread module used to use a control to make sure the request comes from the ldap server, but now the rootdse filters out any unregistered controls comming from ldap, so the control is lost. Using the LDB_HANDLE_FLAG_UNTRUSTED is a much more elegant solution. Autobuild-User: Nadezhda Ivanova <nivanova@samba.org> Autobuild-Date: Wed Oct 27 11:55:11 UTC 2010 on sn-devel-104
2010-10-19s4-ldap: mark all ldap:// requests as untrustedAndrew Tridgell1-0/+21
this allows the rootdse module to filter unregistered controls Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
2010-10-18s4:ldap_server - use error code constantMatthias Dieter Wallnöfer1-1/+1
Autobuild-User: Matthias Dieter Wallnöfer <mdw@samba.org> Autobuild-Date: Mon Oct 18 20:32:40 UTC 2010 on sn-devel-104
2010-10-10samdb: Add flags argument to samdb_connect().Jelmer Vernooij1-3/+1
2010-09-26s4-ldap: Added a control to apply the access checks on read via LDAPNadezhda Ivanova1-0/+1
2010-08-17s4-ldapserver: support controls on ldap add and renameAndrew Tridgell1-10/+12
we need to pass the controls down to the add and rename ldb operations Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
2010-08-15s4:ldap_backend.c - Windows returns WERROR codes in majuscule HEX formatMatthias Dieter Wallnöfer1-1/+1
2010-08-15s4:ldap_backend.c - map error codes - add a change which allows custom ↵Matthias Dieter Wallnöfer1-0/+13
WERROR codes This is strictly needed by my recent passwords work, since I want to remove most of the password change stuff in "samr_password.c". Since AD gives us CONSTRAINT_VIOLATION on all change problems I cannot distinguish on the SAMR level which the real cause was about. Therefore I need the extended WERROR codes here.
2010-08-14s4:ldap_backend.c - fix a DS error code after WERROR changeMatthias Dieter Wallnöfer1-1/+1
2010-07-16s4-loadparm: 2nd half of lp_ to lpcfg_ conversionAndrew Tridgell1-3/+3
this converts all callers that use the Samba4 loadparm lp_ calling convention to use the lpcfg_ prefix. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-07-02s4-dsdb: fixed use after free of sasl mechanisms opaqueAndrew Tridgell1-0/+6
the supportedSASLMechanisms opaque must live for at least as long as the ldb, or we can crash when the first connection is torn down Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
2010-07-02s4-dsdb: fixed spelling of supportedSASLMechanismsAndrew Tridgell1-1/+1
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
2010-06-20s4:ldap_backend.c - now also the LDAP server supports controls on delete ↵Matthias Dieter Wallnöfer1-5/+7
operations
2010-06-20s4:ldap_backend.c - move function "ldb_mod_req_with_controls" to a better ↵Matthias Dieter Wallnöfer1-51/+52
place in the code Under the "add" and over the "delete" function.
2010-06-20s4:ldap_backend.c - add some newlines to make logs easier to readMatthias Dieter Wallnöfer1-5/+5
2010-06-19s4:ldap_backend.c - more customisations to match Windows Server error ↵Matthias Dieter Wallnöfer1-13/+16
behaviour on renames
2010-06-18s4:ldap_backend.c - fix crash bugs when we got in error situations with ↵Matthias Dieter Wallnöfer1-5/+4
"res" still set to "NULL"
2010-06-18s4:ldap_backend.c - fix a small error (use "ModifyResponse" rather than ↵Matthias Dieter Wallnöfer1-1/+1
"AddResponse")
2010-06-16s4:lib: merge LDB_WRAP and LDBSAMBA and make LDBSAMBA a library.Stefan Metzmacher1-1/+1
This is needed to remove samba specifc symbols from the bundled ldb, in order to get the ABI right. metze Signed-off-by: Andreas Schneider <asn@samba.org>
2010-06-06s4:ldap_server/ldap_backend.c - send back also the extended error message if ↵Matthias Dieter Wallnöfer1-18/+39
it exists This message often contains suggestions how to fix issues.
2010-05-21s4:libcli/ldap Rename ldap.h to libcli_ldap.hAndrew Bartlett1-1/+0
It is a problem if a samba header is called ldap.h if we also want to use OpenLDAP's ldap.h Andrew Bartlett
2010-05-04s4/rodc: Support read-only databaseAnatoliy Atanasov1-20/+174
Check on modify if we are RODC and return referral. On the ldap backend side now we pass context and ldb_modify_default_callback to propagate the referral error to the client.
2010-02-25s4:ldap_server - make it "signed-safe"Matthias Dieter Wallnöfer1-5/+5
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2010-02-25s4:LDAP server - Enable support for returning referrals through itMatthias Dieter Wallnöfer1-0/+22
This is needed for my work regarding the referrals when the domain scope control isn't specified. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
2009-12-18Added freeing a successful req so it doesnt croud the ldb contextNadezhda Ivanova1-2/+4
2009-12-15Removed ldb_modify_ctrl from ldb, implemented as a static in ldap_backend.Nadezhda Ivanova1-1/+43
2009-11-20Some changes to allow processing of ldap controls on modify requests.Nadezhda Ivanova1-1/+1
ldap_backend used to filter out ldap controls on modify. Also, modified python binding for ldap_modify to allow writing tests for such controls.
2009-10-23s4-dsdb: add a static samdb_credentialsAndrew Tridgell1-2/+2
Similarly to system_session(), this creates a static samdb_credentials()
2009-10-08s4:ldap server - remove unused error handlingsMatthias Dieter Wallnöfer1-35/+0
Those error cases should be handled by LDB itself to be available on all connection methods and not only over LDAP.
2009-10-02s4:LDB/LDAP - Re-allow renamesMatthias Dieter Wallnöfer1-1/+1
The main problem is that the "rdn_name" module launches on a rename request also a modification one with the "special attributes" which can't be changed directly. An introduced flag helps to bypass the restriction.
2009-10-02s4:ldap_server Ensure we don't segfault when sent a NULL new RDNAndrew Bartlett1-4/+7
The Microsoft testsuite tried to rename cn=administrator,cn=users,... into "",cn=users... which didn't go so well. Andrew Bartlett
2009-09-28s4-ldap: fixed spellingAndrew Tridgell1-1/+1
2009-09-26gensec: Avoid exposing lp_ctx on the API level.Jelmer Vernooij1-1/+1
2009-08-14s4:ldap_server Correct removal of talloc_steal()Andrew Bartlett1-1/+0
This corrects commit 7a82aed71b74af8bc2a8a4381541adbb22452d20. The steal did not set ent->attributes, so it was incorrect to assign to ent->attributes. Andrew Bartlett
2009-08-14s4:ldap_server Remove another talloc_steal (with references)Andrew Bartlett1-1/+1
This talloc_steal also conflicts with the ldb_map code, and like the previous commit, is rudundent given the talloc_steal of the whole msg above. Andrew Bartlett
2009-08-14s4:ldap_server Don't talloc_steal (with references) in ldap_backendAndrew Bartlett1-1/+1
There may or may not be a need to take a reference to the 'name' in the ldb_map code, but given we seal the whole msg just above here, it makes no senst to steal the name, but not the values. Andrew Bartlett
2009-08-04s4-ldap_server: fix generated error string in map_ldb_error().Günther Deschner1-1/+1
Guenther
2009-07-31s4: Enhances the LDAP server to display error messages like Windows ServerMatthias Dieter Wallnöfer1-27/+178
Those error messages also include the WERROR code of the failed operation(s) in this manner: <error code eight chars in HEX>: <further error message> This also addresses bug #4949
2009-07-01use a talloc_unlink() as ops may have a referenceAndrew Tridgell1-1/+1
2008-12-17s4:ldap_server: return the extended dn to the LDAP client if availableAndrew Bartlett1-1/+16
This uses an early peek at the extended_dn_control (in the request) to see what output format to use. Signed-off-by: Stefan Metzmacher <metze@samba.org>
2008-11-17Remove restrictions on number of DN components in LDAP serverAndrew Bartlett1-13/+9
There is no reason for these restrictions to be in the LDAP server - they belong in the LDB layer. When accepting 'extended' or 'alternate' DNs we can't tell anyway. Andrew Bartlett
2008-11-02Remove use of global_loadparm for disabled gensec backends.Jelmer Vernooij1-0/+3