summaryrefslogtreecommitdiff
path: root/source4
AgeCommit message (Collapse)AuthorFilesLines
2009-11-17s4:dsdb Rework samdb code to use 'storage format' DNs for defaultObjectCategoryAndrew Bartlett4-1/+67
It is important to always ensure that this attribute has an extended DN if the rest of the database stores things that way. The knowlege of what format the DN is stored on disk with is passed around in an LDB opaque. Andrew Bartlett
2009-11-17s4:provision Generate a random objectGUID for each schema recordAndrew Bartlett1-0/+2
This is needed to then create extended DNs with GUID attributes in them, when importing from the LDIF Andrew Bartlett
2009-11-17s4:dsdb Load objectGUID and extended DN defaultObjectCategory into the schemaAndrew Bartlett4-37/+29
The load of defaultObjectCategory as an extended DN means we need to use the common parsing functions I just split out, rather than the GET_DS_DN macro. The objectGUIDs are loaded so that we can create the extended DN when we load from LDIF (and are loaded for the other cases for consistency). Also adapt callers to API changes needed for common parsing code Andrew Bartlett
2009-11-17s4:dsdb Use the new flags to dsdb_module_search in schema_loadAndrew Bartlett1-1/+3
This loads the defaultObjectCategory DN as an extended DN, so we can apply it, with the associated GUID, when setting this on records in the objectClass module. Previously we would not store the extended DN components for objectCategory. Andrew Bartlett
2009-11-17s4:dsdb Break up 'parse a DN from DRSUAPI' into a subfunctionAndrew Bartlett1-73/+91
This should make it easier to call this function from the DRS schema load code, rather than duplicate it. (we may do the same with other functions in future). Andrew Bartlett
2009-11-17s4:dsdb Add 'dsdb_flags' to dsdb_module_search() to enable often-used featuresAndrew Bartlett7-11/+84
These flags, also on dsdb_module_search_dn() allow us to add commonly set controls to this pre-packaged blocking search, without rebuilding the whole function in each caller. Andrew Bartlett
2009-11-16s4:SAMLDB moduleMatthias Dieter Wallnöfer1-14/+14
- Add more "\n" to make sure that error messages are displayed immediately - Add a "NULL" in a attribute list
2009-11-16Revert "s4:dsdb/repl/replicated_objects - Applicate also here the new ↵Matthias Dieter Wallnöfer1-4/+1
"lDAPDisplayName" generator" This reverts commit df95d5c29292968b465bff24c3cf78800677a4d4. abartlet pointed out in a post on the samba-technical list that this isn't necessary at all (lDAPDisplayName normalisation algorithm). Rather it breaks functionality of the replication.
2009-11-16s4:dsdb LDB attribute lists must always be a static const char **.Andrew Bartlett1-1/+1
(If they are not, then due to the async code, they will cause a segfault as they reference a reclaimed portion of the stack). Andrew Bartlett
2009-11-16s4:provision - Removed dependency on full Samba 3 schema from FDSEndi S. Dewata9-152/+170
2009-11-15Fixed some major bugs in inheritance and access checks.Nadezhda Ivanova5-120/+274
Fixed sd creation not working on LDAP modify. Fixed incorrect replacement of CO and CG. Fixed incorrect access check on modify for SD modification. Fixed failing sec_descriptor test and enabled it. Fixed failing sd add test in ldap.python
2009-11-15Fix writing corrupt registries because of hardcoded version string in IDL.Wilco Baan Hofman1-1/+1
Signed-off-by: Jelmer Vernooij <jelmer@samba.org>
2009-11-15Fix writing corrupt REG_SZ to the registry.Wilco Baan Hofman1-1/+2
Signed-off-by: Jelmer Vernooij <jelmer@samba.org>
2009-11-15Fix trailing garbage in the hbin block.Wilco Baan Hofman1-0/+5
This specifically fixes a problem showing extra bytes of garbage in list and print in regshell, even though the vk.data_length has the correct size. Signed-off-by: Jelmer Vernooij <jelmer@samba.org>
2009-11-15Added tests for descriptor inheritance on ldap modify.Zahari Zahariev1-121/+207
Fixed some expected owners and groups. Signed-off-by: Nadezhda Ivanova <nadezhda.ivanova@postpath.com>
2009-11-15ldb:python bindings - add a context on "py_ldb_delete"Matthias Dieter Wallnöfer1-2/+10
So the converted DN will be freed after usage.
2009-11-15s4:ldap.py - enhance schema addition testMatthias Dieter Wallnöfer1-12/+40
Don't add only a new objectclass but also a new attribute. Plus let now the server itself calculate the "lDAPDisplayName" attribute and compare the result.
2009-11-15s4:dsdb/repl/replicated_objects - Applicate also here the new ↵Matthias Dieter Wallnöfer1-1/+4
"lDAPDisplayName" generator Also here we've to be sure to generate the attribute correctly if it doesn't exist yet.
2009-11-15s4:SAMLDB module - Add support for required and generated schema attributesAndrew Bartlett1-7/+285
This missing support found by Microsoft test suite at AD interop event. Patch by Andrew Bartlett Enhancements by Matthias Dieter Wallnöfer
2009-11-15s4:samdb util - add a call for generating a correct "lDAPDisplayName"Matthias Dieter Wallnöfer1-0/+28
This is needed for the SAMLDB module enhancement regarding schema objects. The algorithm in pseudo code is located in MS-ADTS 3.1.1.2.3.4.
2009-11-15s4:ldap.py - Deactivates some at the moment pointless test partsMatthias Dieter Wallnöfer1-6/+6
I think those parts should be deactivated since they're result set checks for lookups which are commented out already.
2009-11-14s4-drs: DsExecuteKCC() implementationErick Nascimento3-2/+31
I implemented the DsExecuteKCC() handling code on kccsrv_execute_kcc(). Signed-off-by: Andrew Tridgell <tridge@samba.org>
2009-11-13s4:heimdal Import generated files from heimdal treeAndrew Bartlett9-827/+1185
We should be able to rebuild these, but a cp is easier :-)
2009-11-13s4:heimdal: import lorikeet-heimdal-200911122202 (commit ↵Andrew Bartlett59-646/+1168
9291fd2d101f3eecec550178634faa94ead3e9a1)
2009-11-13s4:heimdal: import lorikeet-heimdal-200909210500 (commit ↵Andrew Bartlett139-2179/+4119
290db8d23647a27c39b97c189a0b2ef6ec21ca69)
2009-11-13s4-ldb: changed the DN checks for \n to warningsAndrew Tridgell2-6/+11
a \n is sometimes allowed in AD (eg in deleted DNs). Until we know when is really is allowed, treat it as a warning only.
2009-11-13s4-ldb: make DN escaping/unescaping consistentAndrew Tridgell1-20/+54
The DN escape function was using the form \c where c is any character. The unescape function was using \XX where XX is a 2 digit hex number. The asymmetry led to quite a few problems when we start to deal with DNs containing escape chars, such as CN=foo\0ADEL:XXX. The result was a DN that was not accessible. This patch changes the escaping to follow RFC2253 much more closely. We accept either type of escape, and produce the two types of escape, depending on the character being escaped
2009-11-12s4:heimdal_build: allow flex-2.5.35 with bison-2.3Stefan Metzmacher1-0/+1
metze
2009-11-12s4:dsdb Make callbacks in extended_dn_out clearer to followAndrew Bartlett1-1/+6
2009-11-12s4:selftest Mark the RPC-DSSYNC test as knownfail for nowAndrew Bartlett1-0/+1
We need to work on the provision or LDB modules to avoid DN attributes without GUIDs (caused because the target does not exist at creation time). Andrew Bartlett
2009-11-12s4:libcli/ldap Add 'relax' OID to known network representationsAndrew Bartlett1-0/+2
This patch, inspired by a patche by Endi S. Dewata <edewata@redhat.com>, allows this control to be passed to the LDAP backend. Andrew Bartlett
2009-11-12s4:provision - Added LDBBackend and ExistingBackend.Endi S. Dewata2-32/+62
2009-11-12s4:provision - Added constructors for FDSBackend and OpenLDAPBackend.Endi S. Dewata2-43/+95
2009-11-12s4:provision - Added setup() method in LDAPBackend.Endi S. Dewata2-26/+32
2009-11-12s4:provision - Moved provision_xxx_backend() into backend-specific ↵Endi S. Dewata2-318/+287
provision() method.
2009-11-12s4:provision - Added start() method in LDAPBackend.Endi S. Dewata2-13/+20
2009-11-12s4:provision - Added initial implementation of FDSBackend and OpenLDAPBackend.Endi S. Dewata2-37/+68
2009-11-12s4:repl_meta_data Parse linked attributes with schema syntaxesAndrew Bartlett1-39/+44
The bug here was that by assuming all linked attributes were 'normal DNs', we would miss the binary portion of DN+Binary. This patch then has us reparse the string to determine it's GUID, for the GUID lookup, but maintains the binary porition into the on-disk format. Andrew Bartlett
2009-11-12s4:dsdb/schema Add more unit tests for DN+Binary syntaxesAndrew Bartlett1-4/+9
2009-11-12s4:torture Use (some) torture_assert() calls in RPC-DSSYNC testAndrew Bartlett1-5/+4
2009-11-12s4:dsdb Improve debug message in extended_dn_outAndrew Bartlett1-1/+3
2009-11-12s4:torture Remove _drs_util_verify_attids() from RPC-DSSYNCAndrew Bartlett2-87/+0
I'm satisfied that the task this test does is already done by the time we map the incoming schema, and process the objects. If we have the OID mapping wrong or incomplete, we will get any errors this test found errors there. (And this dramaticly reduces the test time, so we can now add RPC-DSSYNC to 'make test'). Andrew Bartlett
2009-11-12s4:torture/dsdb Add verification of the push-to-LDB functions in RPC-DSSYNCAndrew Bartlett1-23/+260
This is done by comparing the values against the remote host's LDAP server. Andrew Bartlett
2009-11-12s4:torture Add constAndrew Bartlett1-1/+1
2009-11-12s4:ldb Allow ldb_msg_canonicalize to handle empty elementsAndrew Bartlett1-1/+1
(These are deliberately there in DRS replication). Andrew Bartlett
2009-11-12s4:dsdb/schema Allow a schema set when bound against a remote LDAP serverAndrew Bartlett1-3/+3
2009-11-12s4:ldb Don't segfault if we somehow get an unknown extended dn elementAndrew Bartlett1-0/+8
2009-11-12s4:ldb Change ldb_request_add_control to the normal 'for loop' patternAndrew Bartlett1-2/+1
2009-11-12s4:torture Convert RPC-DSSYNC test to use LDB rather than raw LDAPAndrew Bartlett1-49/+28
(This should make it easier to do more 'compare DRS with LDAP' operations, as LDB is an easier interface to program.) Andrew Bartlett
2009-11-12NET-API-BECOME-DC: resolve the host name to an address before callingStefan Metzmacher1-2/+16
libnet_BecomeDC and libnet_UnbecomeDC() We're supposed to pass in source_dsa_address... metze