summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* s3:dbwrap: add dbwrap_trans_change_int32_atomic()Michael Adam2009-07-292-0/+21
| | | | | | A transaction wrapper for dbwrap_change_int32_atomic(). Michael
* s3:dbwrap: export logic of dbwrap_change_int32_atomic into an action functionMichael Adam2009-07-291-6/+31
| | | | | | to prepare for adding a transaction wrapper to dbwrap_change_int32_atomic() Michael
* s3:dbwrap: change dbwrap_change_int32_atomic() to take int32_t, not int32Michael Adam2009-07-292-3/+3
| | | | Michael
* s3:winbind: use transaction store in idmap_tdb_set_hwm() to store new hwm.Michael Adam2009-07-291-5/+4
| | | | | | | | Btw, the previous code must have failed to warn when exceeding the high_hwm, because it overwrote hwm with the return value of the dbwrap_store_uint32(), which does not return the hwm but 0 or -1, depending on success. Michael
* s3:winbind: fix typo in debug message in idmap_tdb.Michael Adam2009-07-291-1/+1
| | | | Michael
* s3:winbind: fix typo in debugmessage of idmap_tdbMichael Adam2009-07-291-1/+1
| | | | Michael
* s3:winbind: use transaction in idmap_tdb2_allocate_id_action().Michael Adam2009-07-291-1/+1
| | | | | | | | | | This uses the new dbwrap_trans_change_uint32_atomic() instead of dbwrap_change_uint32_atomic(). Now all db write operations in idmap_tdb2.c are using transactions. Michael
* s3:dbwrap: add dbwrap_trans_change_uint32_atomic()Michael Adam2009-07-292-0/+21
| | | | | | A transaction wrapper for dbwrap_change_uint32_atomic(). Michael
* s3:dbwrap: export logic of dbwrap_change_uint32_atomic into an action functionMichael Adam2009-07-291-6/+31
| | | | | | to prepare for adding a transaction wrapper to dbwrap_change_uint32_atomic() Michael
* s3:dbwrap: untangle assignment and check in dbwrap_change_int32_atomic()Michael Adam2009-07-291-2/+2
| | | | Michael
* s3:dbwrap: untangle assignemend and check in dbwrap_change_uint32_atomic()Michael Adam2009-07-291-2/+2
| | | | Michael
* s3:dbwrap: don't leak in dbwrap_change_int32_atomic().Michael Adam2009-07-291-2/+3
| | | | Michael
* s3:dbwrap: don't leak in dbwrap_change_uint32_atomic()Michael Adam2009-07-291-2/+3
| | | | Michael
* s3:dbwrap: change dbwrap_change_int32_atomic() to return NTSTATUS not int32.Michael Adam2009-07-292-8/+9
| | | | Michael
* s3:dbwrap: change dbwrap_change_uint32_atomic() to return NTSTATUS not uint32_t.Michael Adam2009-07-295-17/+19
| | | | Michael
* s3:winbind: in idmap_tdb2_sid_to_id(), use transaction wrapped stores.Michael Adam2009-07-291-9/+15
| | | | | | | | | | | When a mapping is not found, then the idmap script is called (if defined). When this gives a reply for the desired sid, this reply is stored in the db. This patch wraps theses two store operations into a transaction by re-using the idmap_tdb2_set_mapping_action() function previously defined for idmap_tdb2_set_mapping(). Michael
* s3:winbind: in idmap_tdb2_id_to_sid(), use transaction wrapped stores.Michael Adam2009-07-291-9/+12
| | | | | | | | | | | When a mapping is not found, then the idmap script is called (if defined). When this gives a reply for the desired id, this reply is stored in the db. This patch wraps theses two store operations into a transaction by re-using the idmap_tdb2_set_mapping_action() function previously defined for idmap_tdb2_set_mapping(). Michael
* s3:winbind: use transaction wrapper in idmap_tdb2_allocate_id()Michael Adam2009-07-291-43/+69
| | | | Michael
* s3:winbind: use transaction wrapper in idmap_tdb2_set_mapping()Michael Adam2009-07-291-49/+55
| | | | Michael
* shadow_copy2: The system getrealfilename() can't deal with a 0-length fnameVolker Lendecke2009-07-291-0/+3
| | | | | | This fixes viewing the content of snapshots in the share root directory. We have to treat the filename that *just* consists of "@GMT-YYYY.MM.DD-HH.MM.SS" like the share root, which is the current working directory.
* Fix unqualified "net join"Volker Lendecke2009-07-291-4/+1
| | | | | | | | Kai, please check! Thanks, Volker
* (Hopefully) fix the problem Kai reported withJeremy Allison2009-07-284-8/+60
| | | | | | net ads leave and IPv6. Ensure all DC lookups prefer IPv4. Jeremy.
* s4:samba3sam Remove extra newlines that broke samba3sam testAndrew Bartlett2009-07-292-2/+0
| | | | | | | | | | The python ldif parser was changed to be stricter (perhaps too strict), and the extra newlines broke it. The problem was masked earlier because errors parsing the LDIF were considered to be 'end of file', and so no error was raised. Andrew Bartlett
* s4:provision We no longer add krbtgt or kpasswd account into secrets.ldbAndrew Bartlett2009-07-291-1/+1
|
* Remove a duplicate prototypeVolker Lendecke2009-07-281-1/+0
|
* Added prefer_ipv4 bool parameter to resolve_name().Jeremy Allison2009-07-2815-37/+104
| | | | | | | | | | W2K3 DC's can have IPv6 addresses but won't serve krb5/ldap or cldap on those addresses. Make sure when we're asking for DC's we prefer IPv4. If you have an IPv6-only network this prioritizing code will be a no-op. And if you have a mixed network then you need to prioritize IPv4 due to W2K3 DC's. Jeremy.
* release-scripts: Remove RFCs in source4/.Karolin Seeger2009-07-281-0/+8
| | | | | | | Remove RFCs as they are non-free content (with a strict interpretation of the DFSG). Addresse Debian bug #538034. Karolin
* pidl: import a patch to pidl made in the wireshark reporitory.Ronnie Sahlberg2009-07-281-5/+19
| | | | | | | | | | | Original commit message in wireshark SVN (rev 28961): ==== From Kovarththanan Rajaratnam: More "Cleanup header_field_info definitions" ==== Signed-off-by: Ronnie Sahlberg <ronniesahlberg@gmail.com> Signed-off-by: Stefan Metzmacher <metze@samba.org>
* s4:gensec/spnego: only generate the mechListMic when the server expects itStefan Metzmacher2009-07-281-1/+2
| | | | | | This fixes the ntvfs.cifs tests. metze
* Fix compile of py_net.cAndrew Bartlett2009-07-281-1/+3
|
* s4:libnet Add in a 'credentials' parameter for python libnet_JoinAndrew Bartlett2009-07-281-7/+20
|
* s4:tls Enable GnuTLS back to version 1.4 (an into the future)Andrew Bartlett2009-07-281-1/+1
| | | | | | We think we have the bug fixed. Andrew Bartlett
* s4:kerberos Add support for user principal names in certificatesAndrew Bartlett2009-07-288-42/+161
| | | | | | | | | | | | | | This extends the PKINIT code in Heimdal to ask the HDB layer if the User Principal Name name in the certificate is an alias (perhaps just by case change) of the name given in the AS-REQ. (This was a TODO in the Heimdal KDC) The testsuite is extended to test this behaviour, and the other PKINIT certficate (using the standard method to specify a principal name in a certificate) is updated to use a Administrator (not administrator). (This fixes the kinit test). Andrew Bartlett
* s4:kerberos Add 'net export keytab' command for wireshark decryptionAndrew Bartlett2009-07-2816-39/+419
| | | | | | | | | | | | It is much easier to do decryption with wireshark when the keytab is available for every host in the domain. Running 'net export keytab <keytab name>' will export the current (as pointed to by the supplied smb.conf) local Samba4 doamin. (This uses Heimdal's 'hdb' keytab and then the existing hdb-samba4, and so has a good chance of keeping working in the long term). Andrew Bartlett
* Fix the build breakage by #including modules/vfs_acl_common.cJeremy Allison2009-07-275-50/+33
| | | | | | | into acl_tdb and acl_xattr. Duplicates the code size, but keeps the code in common so I don't have to do bug fixes in two places (which is what I really cared about). Jeremy.
* s3: net ads user info should print primary group as well (bug #2658)Kai Blin2009-07-271-15/+57
| | | | | Thanks to Pavel V. Rochnyack <rpv@muma.tusur.ru> for reporting this and offering an initial patch.
* umount.cifs: do not attempt to update /etc/mtab if it is symbolic linkShirish Pargaonkar2009-07-271-3/+4
| | | | | | | | If /etc/mtab is a symbolic link to e.g. /proc/mounts, do not update it. This is a fix for a bug reported in 4675 on samba bugzilla Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
* frstrans.idl: add definition of frstrans_InitializeFileTransferAsync()Stefan Metzmacher2009-07-271-1/+79
| | | | metze
* frstrans.idl: add definition of frstrans_AsyncPoll()Stefan Metzmacher2009-07-271-1/+32
| | | | metze
* frstrans.idl: add definition of frstrans_RequestVersionVector()Stefan Metzmacher2009-07-271-1/+19
| | | | metze
* frstrans.idl: add definition of frstrans_RequestUpdates()Stefan Metzmacher2009-07-271-1/+54
| | | | metze
* frstrans.idl: add definition of frstrans_EstablishSessionStefan Metzmacher2009-07-271-1/+4
| | | | metze
* frstrans.idl: add definition of frstrans_EstablishConnection()Stefan Metzmacher2009-07-271-1/+17
| | | | metze
* frstrans.idl: add definition of frstrans_CheckConnectivity()Stefan Metzmacher2009-07-271-1/+4
| | | | metze
* librpc: rerun "make idl_full"Stefan Metzmacher2009-07-276-14/+14
| | | | metze
* pidl: allow foo being on the wire after [length_is(foo)] uint8 *bufferStefan Metzmacher2009-07-271-0/+4
| | | | metze
* pidl: add support for [string] on fixed size arrays.Stefan Metzmacher2009-07-273-2/+117
| | | | | | | | | | | | | | | | | | midl also supports this: struct { long l1; [string] wchar_t str[16]; long l2; }; Where the wire size of str is encoded like a length_is() header: 4-byte offset == 0; 4-byte array length; The strings are zero terminated. metze
* Revert "s4:kerberos Add 'net export keytab' command for wireshark decryption"Stefan Metzmacher2009-07-2710-361/+8
| | | | | | | | | | This reverts commit a40ce5d0d9d06f592a8885162bbaf644006b9f0f. This breaks the build... Andrew, please repush it, when it's fixed:-) metze
* Lift the event loop in rpc_api_pipe_req() one level into cli_do_rpc_ndrVolker Lendecke2009-07-274-72/+126
|
* Fix a valgrind error in chain_replyVolker Lendecke2009-07-272-3/+12
| | | | construct_reply() references the request after chain_reply has freed it.