Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2009-11-13 | s4:heimdal: import lorikeet-heimdal-200909210500 (commit ↵ | Andrew Bartlett | 139 | -2179/+4119 | |
290db8d23647a27c39b97c189a0b2ef6ec21ca69) | |||||
2009-11-13 | s4-ldb: changed the DN checks for \n to warnings | Andrew Tridgell | 2 | -6/+11 | |
a \n is sometimes allowed in AD (eg in deleted DNs). Until we know when is really is allowed, treat it as a warning only. | |||||
2009-11-13 | s4-ldb: make DN escaping/unescaping consistent | Andrew Tridgell | 1 | -20/+54 | |
The DN escape function was using the form \c where c is any character. The unescape function was using \XX where XX is a 2 digit hex number. The asymmetry led to quite a few problems when we start to deal with DNs containing escape chars, such as CN=foo\0ADEL:XXX. The result was a DN that was not accessible. This patch changes the escaping to follow RFC2253 much more closely. We accept either type of escape, and produce the two types of escape, depending on the character being escaped | |||||
2009-11-12 | s4:heimdal_build: allow flex-2.5.35 with bison-2.3 | Stefan Metzmacher | 1 | -0/+1 | |
metze | |||||
2009-11-12 | s4:dsdb Make callbacks in extended_dn_out clearer to follow | Andrew Bartlett | 1 | -1/+6 | |
2009-11-12 | s4:selftest Mark the RPC-DSSYNC test as knownfail for now | Andrew Bartlett | 1 | -0/+1 | |
We need to work on the provision or LDB modules to avoid DN attributes without GUIDs (caused because the target does not exist at creation time). Andrew Bartlett | |||||
2009-11-12 | s4:libcli/ldap Add 'relax' OID to known network representations | Andrew Bartlett | 1 | -0/+2 | |
This patch, inspired by a patche by Endi S. Dewata <edewata@redhat.com>, allows this control to be passed to the LDAP backend. Andrew Bartlett | |||||
2009-11-12 | s4:provision - Added LDBBackend and ExistingBackend. | Endi S. Dewata | 2 | -32/+62 | |
2009-11-12 | s4:provision - Added constructors for FDSBackend and OpenLDAPBackend. | Endi S. Dewata | 2 | -43/+95 | |
2009-11-12 | s4:provision - Added setup() method in LDAPBackend. | Endi S. Dewata | 2 | -26/+32 | |
2009-11-12 | s4:provision - Moved provision_xxx_backend() into backend-specific ↵ | Endi S. Dewata | 2 | -318/+287 | |
provision() method. | |||||
2009-11-12 | s4:provision - Added start() method in LDAPBackend. | Endi S. Dewata | 2 | -13/+20 | |
2009-11-12 | s4:provision - Added initial implementation of FDSBackend and OpenLDAPBackend. | Endi S. Dewata | 2 | -37/+68 | |
2009-11-12 | s4:repl_meta_data Parse linked attributes with schema syntaxes | Andrew Bartlett | 1 | -39/+44 | |
The bug here was that by assuming all linked attributes were 'normal DNs', we would miss the binary portion of DN+Binary. This patch then has us reparse the string to determine it's GUID, for the GUID lookup, but maintains the binary porition into the on-disk format. Andrew Bartlett | |||||
2009-11-12 | s4:dsdb/schema Add more unit tests for DN+Binary syntaxes | Andrew Bartlett | 1 | -4/+9 | |
2009-11-12 | s4:torture Use (some) torture_assert() calls in RPC-DSSYNC test | Andrew Bartlett | 1 | -5/+4 | |
2009-11-12 | s4:dsdb Improve debug message in extended_dn_out | Andrew Bartlett | 1 | -1/+3 | |
2009-11-12 | s4:torture Remove _drs_util_verify_attids() from RPC-DSSYNC | Andrew Bartlett | 2 | -87/+0 | |
I'm satisfied that the task this test does is already done by the time we map the incoming schema, and process the objects. If we have the OID mapping wrong or incomplete, we will get any errors this test found errors there. (And this dramaticly reduces the test time, so we can now add RPC-DSSYNC to 'make test'). Andrew Bartlett | |||||
2009-11-12 | s4:torture/dsdb Add verification of the push-to-LDB functions in RPC-DSSYNC | Andrew Bartlett | 1 | -23/+260 | |
This is done by comparing the values against the remote host's LDAP server. Andrew Bartlett | |||||
2009-11-12 | s4:torture Add const | Andrew Bartlett | 1 | -1/+1 | |
2009-11-12 | s4:ldb Allow ldb_msg_canonicalize to handle empty elements | Andrew Bartlett | 1 | -1/+1 | |
(These are deliberately there in DRS replication). Andrew Bartlett | |||||
2009-11-12 | s4:dsdb/schema Allow a schema set when bound against a remote LDAP server | Andrew Bartlett | 1 | -3/+3 | |
2009-11-12 | s4:ldb Don't segfault if we somehow get an unknown extended dn element | Andrew Bartlett | 1 | -0/+8 | |
2009-11-12 | s4:ldb Change ldb_request_add_control to the normal 'for loop' pattern | Andrew Bartlett | 1 | -2/+1 | |
2009-11-12 | s4:torture Convert RPC-DSSYNC test to use LDB rather than raw LDAP | Andrew Bartlett | 1 | -49/+28 | |
(This should make it easier to do more 'compare DRS with LDAP' operations, as LDB is an easier interface to program.) Andrew Bartlett | |||||
2009-11-12 | NET-API-BECOME-DC: resolve the host name to an address before calling | Stefan Metzmacher | 1 | -2/+16 | |
libnet_BecomeDC and libnet_UnbecomeDC() We're supposed to pass in source_dsa_address... metze | |||||
2009-11-12 | s4:dsdb Add expected value tests for most DRS syntax conversions | Andrew Bartlett | 4 | -8/+159 | |
I've left out those for which I could not find an expected value in my default Windows 2003 server's database, and the values that rely on the current prefix map at the time. Andrew Bartlett | |||||
2009-11-12 | s4:Fix regression in dsdb_dn code - all parses of the DN would be rejected | Andrew Bartlett | 1 | -2/+6 | |
This is most likely the cause of the DRS replication failures I observed with my changes. Andrew Bartlett | |||||
2009-11-12 | s4:provision Add C binding to get at the generate schema | Andrew Bartlett | 3 | -0/+86 | |
This will allow us to do local tests against that schema | |||||
2009-11-12 | s4:provision Remove unused 'sambadn' parameter | Andrew Bartlett | 2 | -10/+4 | |
2009-11-12 | s4:dsdb/repl Split the 'convert' or 'commit' stages in the DRS import | Andrew Bartlett | 4 | -95/+125 | |
This will allow us in future to do tests on the LDB values we generate from the DRS replication. Andrew Bartlett | |||||
2009-11-12 | s4:dsdb/schema Simplify schema loading from ldb messages | Andrew Bartlett | 3 | -115/+83 | |
It turns out that we always add the class/attribute to the schema. | |||||
2009-11-12 | s4:vampire Print error message when we fail on the CLDAP ping | Andrew Bartlett | 1 | -2/+7 | |
Andrew Bartlett | |||||
2009-11-12 | s4:dsdb Cosmetic fixes found by metze in review of dsdb_dn changes | Andrew Bartlett | 3 | -30/+38 | |
These changes include reworking the code to call ldb_module_get_ctx() less often (avoid the function calls, particularly during the step into a complex function). Andrew Bartlett | |||||
2009-11-12 | s4:dsdb Ensure we allow 'odd' lengths for DN+String | Andrew Bartlett | 1 | -5/+5 | |
(Found in a code review by metze) Andrew Bartlett | |||||
2009-11-12 | s4:ldb Add Well Known GUID (WKGUID) tests to ldap.py | Andrew Bartlett | 1 | -0/+17 | |
2009-11-12 | s4:dsdb Add extensive tests for the behaviour of dsdb_dn | Andrew Bartlett | 3 | -2/+363 | |
2009-11-12 | s4:ldb Remove DN+Binary code from the core ldb_dn | Andrew Bartlett | 1 | -256/+6 | |
This is now in dsdb_dn. Removing this to a specific wrapper avoids a number of bugs where Binary DNs were being handled incorrectly. This reverts much of tridge's commit fd22e0304782e20b9bbb29464b6c745d409ff4c6 Andrew Bartlett | |||||
2009-11-12 | s4:dsdb Use new dsdb_dn code in LDB modules and Samba4 schema | Andrew Bartlett | 4 | -64/+99 | |
This converts the code from using the binary DN code in ldb_dn to using a special Samba-specfic wrapper around ldb_dn. We also use the dsdb_dn code for DN+Binary and DN+String comparisons (changed from treating them as Binary blobs) Andrew Bartlett | |||||
2009-11-12 | s4:ldb-samba Use new ldb_any_comparison helper function in ldb-samba | Andrew Bartlett | 1 | -41/+5 | |
2009-11-12 | s4:dsdb Add new dsdb_dn to handle DN+Binary and DN+String | Andrew Bartlett | 4 | -1/+343 | |
This aims to replace (and is based on) the code in ldb_dn.c. It is however much stricter in the DNs it will accept. Andrew Bartlett | |||||
2009-11-12 | s4:ldb Add a helper function for 'canonicalise' both strings base compares | Andrew Bartlett | 2 | -0/+33 | |
This will help simplify boilerplate comparison functions where we don't have a shortcut way to compare. Andrew Bartlett | |||||
2009-11-12 | lib/util Split data_blob_hex_string() into upper and lower | Andrew Bartlett | 5 | -10/+10 | |
Rather than have a repeat of the bugs we found at the plugfest where hexidecimal strings must be in upper or lower case in particular places, ensure that each caller chooses which case they want. This reverts most of the callers back to upper case, as things were before tridge's patch. The critical call in the extended DN code is of course handled in lower case. Andrew Bartlett | |||||
2009-11-11 | * install setup/display-specifiers files which are needed by provision script | TAKEDA Yasuma | 1 | -0/+2 | |
Signed-off-by: TAKEDA Yasuma <yasuma@osstech.co.jp> | |||||
2009-11-10 | s4:dcesrv_samr - Add more checks for invalid levels | Matthias Dieter Wallnöfer | 1 | -3/+27 | |
Add more checks on valid levels, mark unimplemented ones as "UNSUPPORTED" and otherwise as "INVALID_INFO_CLASS" to be safe. | |||||
2009-11-10 | Fixes for some tests not eorking against Windows or Samba. | Nadezhda Ivanova | 1 | -12/+8 | |
2009-11-10 | s4-smbtorture: strip trailing whitespace in RPC-SAMR. | Günther Deschner | 1 | -2/+2 | |
Guenther | |||||
2009-11-09 | s4-smbtorture: re-arrange netlogon LogonControl test. | Günther Deschner | 2 | -13/+65 | |
The LogonControl tests now are split out to a new RPC-NETLOGON-ADMIN test that tests the behaviour of that call when called by user, dc or workstation. Guenther | |||||
2009-11-09 | s4-samdb: remove the rDN size constraint of 64 | Andrew Tridgell | 2 | -4/+14 | |
This size constraint is not correct in it's current form, as windows does send us rDN values for CN with lengths longer than 64. Once we know how this constraint really works we can add it back in. | |||||
2009-11-09 | s4-hdb: go back to a separate samdb for the KDC | Andrew Tridgell | 1 | -1/+16 | |
The change to use a common system_session broke replication as the KDC forces CRED_DONT_USE_KERBEROS on session->credentials, which is shared with other parts of the system. This should be fixed once we confirm whether the ldap backend actually relies on CRED_DONT_USE_KERBEROS |