summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* s3:named pipe proxy Improve error messages when named pipes fail to forwardAndrew Bartlett2010-06-071-3/+6
| | | | | | I hope this helps the next person who needs to debug this. Andrew Bartlett
* s3:smbd Give the kerberos session key a parentAndrew Bartlett2010-06-071-0/+2
| | | | | | I can't see what would free this, so this should prevent a memory leak. Andrew Bartlett
* named_pipe_auth Always lower case the incoming pipe nameAndrew Bartlett2010-06-071-1/+7
| | | | | | | Windows connects to an upper case NETLOGON pipe, and we can't find the socket to connect to until we lower case the name. Andrew Bartlett
* s3:smbd Fix segfault if register_existing_vuid() failsAndrew Bartlett2010-06-071-4/+12
| | | | | | | The register_existing_vuid() call will handle both the ntlmssp_end and vuid invalidation internally, so we don't want to do it again. Andrew Bartlett
* s3:auth Rename user_info->domain -> user_info->mapped.domain_nameAndrew Bartlett2010-06-0710-38/+37
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s3:auth Rename user_info->client_domain -> user_info->client.domain_nameAndrew Bartlett2010-06-076-9/+9
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s3:auth fix header comment for internal_username -> mapped.account_nameAndrew Bartlett2010-06-071-1/+1
|
* s3:auth Rename user_info->internal_username -> user_info->mapped.account_nameAndrew Bartlett2010-06-0712-31/+31
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s3:auth Rename user_info->smb_name -> user_info->client.account_nameAndrew Bartlett2010-06-0711-30/+32
| | | | | | | This is closer to the structure I want for a common struct auth_usersupplied_info. Andrew Bartlett
* s4:samba_dsdb LDB module - fix typosMatthias Dieter Wallnöfer2010-06-071-2/+2
|
* s4:samba_dsdb LDB module - enhance/fix module rule commentsMatthias Dieter Wallnöfer2010-06-071-3/+5
|
* s3:auth make sure the primary group sid is usableSimo Sorce2010-06-071-13/+30
| | | | | | | | | | This function was previously performed under the cover by converting back and forth from info3 to samu and then later from samu to info3. Since we now shortcircuit that in some cases, check explicitly using get_primary_group_sid() Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth return the full passwd struct from check_accountSimo Sorce2010-06-071-12/+6
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:passdb Export function to calculate the proper primary group sidSimo Sorce2010-06-073-86/+136
| | | | | | | | Don't keep it buried in passdb, this function need to be available for use in places where we do not want to construct an artificial samu struct just to play tricks. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth remove unused structure memberSimo Sorce2010-06-073-110/+2
| | | | | | | sids are now completely handled using info3, remove dead code that fills server info sids and the structure members themselves Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth create nt token from info3 directlySimo Sorce2010-06-073-38/+167
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth handle unix domain sids in samuSimo Sorce2010-06-075-39/+143
| | | | | | | | When we generate a user out of thin air we may end up adding sids that are not part of the sam domain (unix domain sids). Handle the case and preserve these sids as extra sids. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth set the resolved user sid in the fake sam accountSimo Sorce2010-06-071-0/+3
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth check the user is valid firstSimo Sorce2010-06-071-43/+39
| | | | | | | | It makes no sense to go through all the hoops to build samu and convert it to info3, just to discard them later if the user was not valid. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s3:auth make sure we set the right usernameSimo Sorce2010-06-071-0/+5
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4:ldap.py - add some "objectclass" behaviour testsMatthias Dieter Wallnöfer2010-06-071-0/+190
|
* s4:objectclass LDB module - rework the code which handles the objectclasses ↵Matthias Dieter Wallnöfer2010-06-071-149/+191
| | | | | | | modification Before it has been very incomplete. We try now to match the Windows Server behaviour as close as possible.
* s4:ldap.py - enhance the attributes testcase to demonstrate how the ↵Matthias Dieter Wallnöfer2010-06-071-2/+75
| | | | | | attributes are checked against the schema and the specified objectclasses This demonstrates the bew "objectclass_attrs" LDB module behaviour.
* s4:acl LDB module - LDB attribute names should be compared using ↵Matthias Dieter Wallnöfer2010-06-071-2/+2
| | | | "ldb_attr_cmp" or "strcasecmp"
* s4:acl LDB module - adaption for "objectclass_attrs" moduleMatthias Dieter Wallnöfer2010-06-071-5/+15
| | | | | Since the attribute schema checking code moved back we need to give here the "LDB_ERR_NO_SUCH_ATTRIBUTE" error.
* s4:objectclass LDB module - remove "fix_check_attributes"Matthias Dieter Wallnöfer2010-06-071-62/+0
| | | | Also this task is now performed by the "objectclass_attrs" LDB module.
* s4:samldb LDB module - adjust the module to set always a ↵Matthias Dieter Wallnöfer2010-06-071-35/+45
| | | | | | | "defaultObjectCategory" on objectclass add operations This is needed to make the "objectclass_attrs" LDB module happy. The search check and case adjustment are done as it was using a second modify operation.
* s4:remove the "validate_update" LDB module - the task is now handled by the ↵Matthias Dieter Wallnöfer2010-06-074-141/+0
| | | | far more complete "objectclass_attrs" LDB module
* s4:dsdb - introduce a new "objectclass_attrs" LDB module which performs the ↵Matthias Dieter Wallnöfer2010-06-073-0/+401
| | | | | | | objectclass attributes checking Until now we had no real consistent mechanism which allowed us to check if attributes belong to the specified objectclasses.
* s4:objectclass LDB module - instanciate the schema variable centrally on the ↵Matthias Dieter Wallnöfer2010-06-071-28/+28
| | | | | | | "ac" context creation This unifies the position when the schema is read and prevents multiple instanciations (eg on a modification operation).
* s4:samldb LDB module - finally we can remove the RDN checkMatthias Dieter Wallnöfer2010-06-071-53/+0
| | | | This is now dynamically always done by the objectclass LDB module
* s4:ldap.py - enhance the rename tests to demonstrate the functionalityMatthias Dieter Wallnöfer2010-06-071-0/+37
|
* s4:objectclass LDB module - finally implement the correct entry rename ↵Matthias Dieter Wallnöfer2010-06-071-25/+130
| | | | | | protections Only the "systemFlags" check is still missing.
* s4:objectclass LDB module - cosmetic changeMatthias Dieter Wallnöfer2010-06-071-2/+3
|
* s4:objectclass LDB module - remove duplicated codeMatthias Dieter Wallnöfer2010-06-071-13/+4
|
* s4:objectclass LDB module - fix counter variable typesMatthias Dieter Wallnöfer2010-06-071-1/+1
|
* s4:objectclass LDB module - explain why the search can return with an empty ↵Matthias Dieter Wallnöfer2010-06-071-1/+2
| | | | return
* s4:objectclass LDB module - this "talloc_steal" is not necessaryMatthias Dieter Wallnöfer2010-06-071-1/+0
| | | | | The "parent_dn" was created on the "ac" context which lives anyway longer than this child request.
* s4:objectclass LDB module - fix error result if an entry doesn't contain a ↵Matthias Dieter Wallnöfer2010-06-071-3/+3
| | | | | | structural objectclass We need to return LDB_ERR_UNWILLING_TO_PERFORM (not LDB_ERR_NAMING_VIOLATION).
* s4:objectclass LDB module - use "ldb_oom" for expressing out of memoryMatthias Dieter Wallnöfer2010-06-071-2/+1
|
* s4:objectclass LDB module - fix header and add my copyrightMatthias Dieter Wallnöfer2010-06-071-4/+6
|
* s3-waf: Build rpc_server/srv_spoolss_util.c too.Andreas Schneider2010-06-071-0/+1
| | | | Signed-off-by: Günther Deschner <gd@samba.org>
* s3-lsa: Fix static list of luids in our privileges implementation.Günther Deschner2010-06-071-9/+9
| | | | | | The high/low order changed while moving to LSA defines. Found by torture test. Guenther
* s4-smbtorture: test workstation auth as well in RPC-SPOOLSS-ACCESS.Günther Deschner2010-06-071-2/+34
| | | | Guenther
* s4:ldb python bindings - implement comparison on Python LDB Message objectsMatthieu Patou2010-06-071-2/+38
| | | | Coauthors: Jelmer Vernooij, Matthias Dieter Wallnöfer
* s4: Remove an uselessly exposed controlMatthieu Patou2010-06-071-1/+0
|
* s4-smbtorture: handle printservers w/o printers in RPC-SPOOLSS-ACCESS.Günther Deschner2010-06-071-2/+2
| | | | Guenther
* s3-privileges: use LUID defines from lsa IDL.Günther Deschner2010-06-075-36/+26
| | | | Guenther
* Fix bug with incorrect flag values for inherited ace in some cases.Matthew McGillis2010-06-071-0/+5
|
* s4:password_hash LDB module - adapt the module to the new ↵Matthias Dieter Wallnöfer2010-06-061-17/+6
| | | | "ldb_msg_remove_attr" behaviour