Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2009-11-15 | Fixed some major bugs in inheritance and access checks. | Nadezhda Ivanova | 1 | -1/+0 | |
Fixed sd creation not working on LDAP modify. Fixed incorrect replacement of CO and CG. Fixed incorrect access check on modify for SD modification. Fixed failing sec_descriptor test and enabled it. Fixed failing sd add test in ldap.python | |||||
2009-11-12 | s4:selftest Mark the RPC-DSSYNC test as knownfail for now | Andrew Bartlett | 1 | -0/+1 | |
We need to work on the provision or LDB modules to avoid DN attributes without GUIDs (caused because the target does not exist at creation time). Andrew Bartlett | |||||
2009-10-19 | s4-selftest: move secdesc.python test to skip list | Andrew Tridgell | 1 | -1/+0 | |
This test produces a python backtrace due to LDAP_INSUFFICIENT_ACCESS_RIGHTS errors, which are expected until the new acl code is finished. The python backtrace overrides the 'knownfail' listing, so we need to skip this test for now. | |||||
2009-10-19 | s4-test: removed duplicate knownfail entry | Andrew Tridgell | 1 | -1/+0 | |
2009-10-18 | s4-test: the ldap secdesc test is expected to fail for now | Andrew Tridgell | 1 | -0/+1 | |
Nadya, if this is not correct and you think this should be passing already the please let me know. When I looked over it, it doesn't look like it has a chance of passing until your acl module is in place and enabled by default. | |||||
2009-10-18 | s4-test: SMB2 oplocks in s4 are a mess | Andrew Tridgell | 1 | -0/+1 | |
I don't have time to fix these right now, and as we don't advertise SMB2 by default I'll mark it as a known failure till we start enabling SMB2 by default. | |||||
2009-10-17 | s4-torture: the BASE-CREATEX_ACCESS test is broken for non-administrators | Andrew Tridgell | 1 | -0/+1 | |
See my msg to samba-technical about this test and privilege testing. | |||||
2009-10-15 | s4-selftest: mark some CIFS backend tests as known fail | Andrew Tridgell | 1 | -0/+4 | |
The CIFS passthru NTVFS doesn't handle some options yet (eg. root_fid) | |||||
2009-09-20 | Initial implementation of security descriptor creation in DS | Nadezhda Ivanova | 1 | -1/+2 | |
TODO's: ACE sorting and clarifying the inheritance of object specific ace's. | |||||
2009-09-16 | Tests for descriptor inheritance | Zahari Zahariev | 1 | -0/+1 | |
Signed-off-by: Nadezhda Ivanova <nadezhda.ivanova@postpath.com> Signed-off-by: Andrew Bartlett <abartlet@samba.org> | |||||
2009-09-08 | Mark test_security_descriptor_add_neg as known failing (for now). | Jelmer Vernooij | 1 | -0/+1 | |
2009-07-15 | s4-selftest: ok, s4 cant print. add RPC-SPOOLSS-PRINTER to knownfail for now. | Günther Deschner | 1 | -0/+1 | |
Guenther | |||||
2009-05-21 | s4-selftest: adding RPC-SAMR-USERS-PRIVILEGES to knownfail list. | Günther Deschner | 1 | -0/+1 | |
Samba4 cannot pass this test currently as in Samba4 (unlike Samba3) the LSA and SAMR account are stored in the same db. Once you delete a SAMR user the LSA privilege account is deleted at the same time (which is wrong). Guenther | |||||
2009-05-13 | s4-selftest: match new name of RPC-SAMR-ACCESSMASK. | Günther Deschner | 1 | -0/+1 | |
Guenther | |||||
2009-04-25 | s4:selftest: s4 doesn't support osxrename and directory rename yet | Stefan Metzmacher | 1 | -0/+2 | |
metze | |||||
2009-01-16 | s4-winbind: Remove a "knownfail" entry for the now implemented LIST_GROUPS | Kai Blin | 1 | -1/+0 | |
2008-12-18 | s4:selftest: we pass raw.delete.delete21 | Stefan Metzmacher | 1 | -1/+0 | |
metze | |||||
2008-12-11 | s4:selftest: samba4 fails the changed delete test | Stefan Metzmacher | 1 | -0/+2 | |
metze | |||||
2008-12-10 | s4-smbtorture: skip ServerGetTrustInfo for samba4. | Günther Deschner | 1 | -0/+1 | |
Guenther | |||||
2008-12-04 | s4:selftest: we have netr_GetDcName() and netr_GetAnyDCName() ↵ | Stefan Metzmacher | 1 | -2/+0 | |
implementations now metze | |||||
2008-11-06 | s4-test: skip netr_DatabaseRedo test. | Günther Deschner | 1 | -0/+1 | |
Guenther | |||||
2008-09-18 | Move selftest code to top-level. | Jelmer Vernooij | 1 | -0/+52 | |