summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* TALLOC_FREE(sd) in check_open_rights upon an errorVolker Lendecke2009-07-141-0/+1
|
* Revert this commit :Jeremy Allison2009-07-148-224/+39
| | | | | | | | | | | s3: Make smbd aware of permission change of usershare. Since usershare are relatively volatile and non-previledge users must disconnect from smbd and reconnect to it to make share permission in effect. For now. This is a feature request and I think we need to design it a little differently so as not to touch core change_to_user() code. Jeremy.
* s3: fix build of pdbedit and net_sam. Guenther, please check. Signed-off-by: ↵Bo Yang2009-07-152-5/+5
| | | | Bo Yang <boyang@samba.org>
* s3: Fix double free in net usershare.Bo Yang2009-07-151-28/+4
| | | | Signed-off-by: Bo Yang <boyang@samba.org>
* S3: Small fix to get rid of annoying log message.Bo Yang2009-07-152-2/+7
| | | | Signed-off-by: Bo Yang <boyang@samba.org>
* s3: Make smbd aware of permission change of usershare. Since usershare are ↵Bo Yang2009-07-158-28/+235
| | | | relatively volatile and non-previledge users must disconnect from smbd and reconnect to it to make share permission in effect.
* s3: make d9c0d58236 better readble and reduce indentationBjörn Jacke2009-07-141-13/+13
|
* s3: don't make same innetgr check twiceBjörn Jacke2009-07-141-8/+11
|
* remove all '\n' from ldb_debugSumit Bose2009-07-1419-57/+58
|
* s3-account_policy: add pdb_policy_type enum.Günther Deschner2009-07-1416-166/+179
| | | | Guenther
* s3-account_policy: remove trailing whitespace.Günther Deschner2009-07-141-32/+32
| | | | Guenther
* s3: re-run make idl.Günther Deschner2009-07-142-1/+7
| | | | Guenther
* samr: add missing samr_ValidationStatus codes.Günther Deschner2009-07-141-1/+3
| | | | Guenther
* reject ACLs with DESC_DACL_PROTECTED on GPFSChristian Ambach2009-07-141-0/+5
| | | | | | | | as GPFS does not support the ACE4_FLAG_NO_PROPAGATE NFSv4 flag (which would be the mapping for the DESC_DACL_PROTECTED flag), the status of this flag is currently silently ignored by Samba. That means that if you deselect the "Allow inheritable permissions..." checkbox in Windows' ACL dialog and then apply the ACL, the flag will be back immediately. To make sure that automatic migration with e.g. robocopy does not lead to ACLs silently (and unintentionally) changed, this patch adds an explicit check for this flag and if set, it will return NT_STATUS_NOT_SUPPORTED so errors are shown up on the Windows side and the Administrator is aware of the ACLs not being settable like intended Signed-off-by: Christian Ambach <christian.ambach@de.ibm.com>
* Make cli_posix_lock/unlock asynchronous.Jeremy Allison2009-07-134-63/+247
| | | | Jeremy.
* Fix set_posix_lock check which had been reversed in the recentJeremy Allison2009-07-131-1/+1
| | | | | changes. Jeremy.
* s3-pdb_ads: set correct pdb field with the value from 'accountExpires' ↵Günther Deschner2009-07-131-1/+1
| | | | | | attribute. Guenther
* s3:net: Fix Bug #6222. Default to DRSUAPI replication for net rpc vampire keytabStefan Metzmacher2009-07-131-4/+7
| | | | | | metze Signed-off-by: Günther Deschner <gd@samba.org>
* s3-rpc_server: pass down full unix token to map_max_allowed_access().Günther Deschner2009-07-133-18/+37
| | | | | | | Also use unix_token->uid instead of geteuid() when checking for mapping of the SEC_FLAG_MAXIMUM_ALLOWED flag. Guenther
* libds: merge the UF<->ACB flag mapping functions.Günther Deschner2009-07-1314-201/+51
| | | | Guenther
* libds: share UF_ flags between samba3 and 4.Günther Deschner2009-07-1317-169/+86
| | | | Guenther
* s3:smbd: close_file() handles named pipes just fine, no reason to return ↵Stefan Metzmacher2009-07-131-5/+0
| | | | | | NOT_SUPPORTED metze
* s3:smbd: make smbd_do_qfsinfo() non static for use in SMB2 GetInfoStefan Metzmacher2009-07-132-8/+17
| | | | metze
* s3:smbd: split out smbd_do_qfsinfo() from call_trans2qfsinfo()Stefan Metzmacher2009-07-131-79/+93
| | | | metze
* s3:smbd: make smbd_do_setfilepathinfo() non static for use in SMB2 SetInfoStefan Metzmacher2009-07-132-8/+17
| | | | metze
* s3:smbd: split out smbd_do_setfilepathinfo() from call_trans2setfilepathinfo()Stefan Metzmacher2009-07-131-188/+216
| | | | metze
* s3:smbd: start SMB2 GetInfo support for File*Information levelsStefan Metzmacher2009-07-121-1/+139
| | | | | | TODO: the EA levels are not fully supported. metze
* s3:smbd: add support for marshalling SMB2 FileFullEaInformationStefan Metzmacher2009-07-121-0/+92
| | | | metze
* s3:smbd: add support for marshalling SMB2 FileAllInformationStefan Metzmacher2009-07-121-0/+36
| | | | metze
* s3:smbd: filter out SMB2 specific private query info levels for SMB1Stefan Metzmacher2009-07-121-0/+9
| | | | metze
* s3:smbd: make smbd_do_qfilepathinfo() non static for use in SMB2Stefan Metzmacher2009-07-122-15/+31
| | | | metze
* s3:smbd: split calculation and mashalling of file index and access_maskStefan Metzmacher2009-07-121-13/+19
| | | | metze
* s3:smbd: split out smbd_do_qfilepathinfo() from call_trans2qfilepathinfo()Stefan Metzmacher2009-07-121-459/+504
| | | | | | This prepares SMB2 GetInfo. metze
* s3:smbd: add missing return after reply_nterror()Stefan Metzmacher2009-07-121-0/+1
| | | | metze
* Remove reply_unixerror() - no longer needed. Should make Metze's refactoring ↵Jeremy Allison2009-07-107-87/+79
| | | | | | a lot easier. Jeremy.
* Add hash values to the xattr ACLS to determine whenJeremy Allison2009-07-101-55/+158
| | | | | | | | an underlying POSIX ACL is changed out from under us. Passes RAW-ACL test up to "invalid owner" problem when trying to create a file owned by Everyone. Now needs porting to modules/vfs_acl_tdb.c Jeremy.
* Return 0 domains from enum_trusteddomsVolker Lendecke2009-07-101-1/+3
|
* Quieten events and tldap debug messagesVolker Lendecke2009-07-102-2/+2
|
* s3 smb2: Remove unused variableTim Prouty2009-07-101-1/+0
|
* Fix&Run local-gencacheVolker Lendecke2009-07-102-4/+2
|
* Fix our base64 implementation for blobs of length 4....Volker Lendecke2009-07-103-1/+36
| | | | | The additional length check bit us exactly at 4, removing it. The torture test survives valgrind up to 2000 bytes :-)
* s3:smbd: add support for SMB2 LockStefan Metzmacher2009-07-101-1/+151
| | | | metze
* s3:smbd: make smbd_do_locking() non staticStefan Metzmacher2009-07-102-16/+26
| | | | metze
* s3:smbd: abstract the main locking logic from the LockingAndX parsingStefan Metzmacher2009-07-101-178/+254
| | | | | | This prepares SMB2 Lock support. metze
* s3:smbd: pass down the client pid to smbd_smb2_lock_send()Stefan Metzmacher2009-07-101-0/+6
| | | | metze
* s3:smbd: fix parsing of SMB2 Lock requests with lock_count > 1Stefan Metzmacher2009-07-101-10/+13
| | | | | | We should not reuse the variable 'i'. metze
* s3:smbd: fix parsing of invalid SMB2 requests.Stefan Metzmacher2009-07-101-2/+2
| | | | | | | | | | Because of 0 - 2 => 0xFFFFFFFE, we got EMSGSIZE from the tstream layer. And terminate the transport connection. Instead we should let the caller deal with the invalid parameter, when checking the body size. So the caller always gets at least a 2 byte body. metze
* Attempt to fix the build -- jlayton, please check!Volker Lendecke2009-07-101-1/+1
|
* cifs.upcall: use pid value from kernel to determine KRB5CCNAME to useJeff Layton2009-07-091-12/+75
| | | | | | | | If the kernel sends the upcall a pid of the requesting process, we can open that process' /proc/<pid>/environ file and scrape the KRB5CCNAME value out of it. Signed-off-by: Jeff Layton <jlayton@redhat.com>
* s3: Fix two arguments that broke when plumbing smb_filneame through dos_mode()Tim Prouty2009-07-091-2/+2
|