summaryrefslogtreecommitdiffstats
path: root/source3
Commit message (Collapse)AuthorAgeFilesLines
...
* s3-build: add SCHANNEL_OBJ to Makefile.in.Günther Deschner2009-08-271-2/+5
| | | | Guenther
* s3:winbind: Convert WINBINDD_GETUSERSIDS to the new APIVolker Lendecke2009-08-276-255/+130
|
* s3:winbind: Fix a typoVolker Lendecke2009-08-271-1/+1
|
* s3:winbind: Remove the manual caching for the async wb_ functionsVolker Lendecke2009-08-276-80/+15
| | | | The generic NDR-based cache in winbindd_dual_ndr.c replaces this.
* s3:winbind: Some calls are not cacheableVolker Lendecke2009-08-271-0/+19
|
* s3:winbind: Factor out wcache_store_seqnum()Volker Lendecke2009-08-272-19/+34
|
* s3:winbind: Add a generic cache for NDR based parent-child requestsVolker Lendecke2009-08-277-21/+157
|
* s3:winbind: Factor out wcache_fetch_seqnumVolker Lendecke2009-08-271-14/+39
|
* s3/smbd: open the share_info.tdb on startup instead of tconxSteven Danneman2009-08-263-1/+11
| | | | | | | | This is a small performance optimization. Instead of opening the tdb on every smb connection in the forked child process, we now open it in the parent and share the fd. This also reduces the total fd usage in the system.
* s3/debug: make SPENGO OID list appear under one debug headerSteven Danneman2009-08-261-1/+4
|
* s3/winbindd: Remove unnecessary check for NULL SIDSteven Danneman2009-08-262-8/+7
| | | | | | | | | | | | | | | | There's a known bug in some Windows implementations of DsEnumerateDomainTrusts() where domain SIDs are not returned for transitively trusted domains within the same forest. Jerry originally worked around this in the winbindd parent by checking for S-0-0 and converting it to S-1-0 in 8b0fce0b. Guenter later moved these checks into the child process in commit 3bdfcbac making the initial patch unecessary. I've removed it and added a clarifying comment to the child process. If ever this SID is needed we could add an extra DsEnumerateDomainTrusts() call in trusted_domains() as suggested by the Microsoft KB.
* s3-selftest: enable running RPC-NETLOGON-S3 against samba3.Günther Deschner2009-08-261-1/+1
| | | | Guenther
* s3 onefs: Canonicalize the ACL in the correct ordertprouty2009-08-261-4/+8
|
* s3: Allow full_audit to play nice with smbd if it's using syslogtprouty2009-08-262-1/+17
| | | | | | | | Explictly pass the facility from both smbd and full_audit to syslog. Really the only major change is to not call openlog() in full_audit if WITH_SYSLOG is defined, which implies that smbd is already using syslog. This allows full audit to piggy-back on the same ident as smbd, while still differentiating the logging via the facility.
* s3 audit: Change create_file in full_audit to print whether a directory or ↵tprouty2009-08-261-2/+28
| | | | | | | file was requested full_audit will now print out whether the createfile was requested for a file or directory. The create disposition is also printed out.
* s3:winbind: Fix Coverity ID 942: Resource LeakVolker Lendecke2009-08-261-0/+2
|
* s3-netlogon: let get_md4pw() return a struct dom_sid.Günther Deschner2009-08-261-7/+5
| | | | Guenther
* Add a parameter to disable the automatic creation of krb5.conf filesVolker Lendecke2009-08-263-1/+19
| | | | | | | | | | | | | | This is necessary because MIT 1.5 can't deal with certain types (Tree Root) of transitive AD trusts. The workaround is to add a [capaths] directive to /etc/krb5.conf, which we don't automatically put into the krb5.conf winbind creates. The alternative would have been something like a "krb5 conf include", but I think if someone has to mess with /etc/krb5.conf at this level, it should be easy to add the site-local KDCs as well. Next alternative is to correctly figure out the [capaths] parameter for all trusted domains, but for that I don't have the time right now. Sorry :-)
* s3-netlogon: fix default case when _netr_LogonSamLogon is called from other ↵Günther Deschner2009-08-261-1/+3
| | | | | | opcodes. Guenther
* Revert "s3: Fix uninitialized const char *"Günther Deschner2009-08-261-1/+0
| | | | | | | Tim, I am reverting this as this eliminates "_netr_LogonSamLogonEx" from the debug messages completely. Followup fix to come immediately. This reverts commit add9b4afb14d3426d1f3bf5b8e7c86926f462578.
* s3-netlogon: get rid of init_net_r_req_chal().Günther Deschner2009-08-261-13/+1
| | | | Guenther
* s3-netlogon: let get_md4pw() return a struct samr_Password.Günther Deschner2009-08-262-8/+7
| | | | | | (in preparation of credential merge). Guenther
* s3-netlogon: make _netr_ServerAuthenticate a callback to ↵Günther Deschner2009-08-261-46/+16
| | | | | | _netr_ServerAuthenticate3. Guenther
* Allow for name array strings that don't end in a slashZach Loafman2009-08-251-12/+17
| | | | | | | Fix set_namearray to allow for strings that don't end in a slash. Also remove unnecessary strdup()s. Signed-off-by: Tim Prouty <tprouty@samba.org>
* Add some const to dsgetdcnameVolker Lendecke2009-08-252-6/+6
|
* Do an early TALLOC_FREEVolker Lendecke2009-08-251-1/+2
|
* Help debug for bug 6651 - smbd SIGSEGV when breaking oplocks.Jeremy Allison2009-08-241-0/+4
| | | | | | Should help track if we get invoked with an invalid fd from the signal handler. Jeremy.
* Second attempt at fix for bug 6529 - Offline files conflict with Vista and ↵Jeremy Allison2009-08-2419-133/+188
| | | | | | | | Office 2003. Confirmation from reporter that this fixes the issue in master on ext3/ext4. Back-ports to follow. Jeremy.
* Use existing time_t rounding function, don't invent my own.Jeremy Allison2009-08-241-1/+1
| | | | Jeremy.
* s3-netlogon: Only hand out rid when netlogon credential chain has been setup ↵Günther Deschner2009-08-241-1/+5
| | | | | | sucessfully. Guenther
* Second part of fix for 6529 - Offline files conflict with Vista and Office 2003.Jeremy Allison2009-08-243-0/+22
| | | | | | ext4 may be able to store ns timestamps, but the only API to *set* timestamps takes usec, not nsec. Round to usec on set requests. Jeremy.
* make smbcontrol smbd ping work proper checking for arguments handle short ↵Olaf Flebbe2009-08-242-14/+21
| | | | pid_t correctly
* LIBREPLACEOBJ now contains the full pathAndrew Tridgell2009-08-241-4/+1
|
* s3:lib: setup talloc log and abort functionsStefan Metzmacher2009-08-241-0/+7
| | | | metze
* s3:configure: require talloc >= 2.0.0Stefan Metzmacher2009-08-241-1/+1
| | | | metze
* s3:winbind: Fallback to the forest root for lookupnameVolker Lendecke2009-08-231-0/+49
| | | | Thanks to Steven Danneman for watching me closely :-)
* s3:winbind: Even on a domain controller, "our" domain is internalVolker Lendecke2009-08-231-6/+0
| | | | | It happens to be what we also share out via NETLOGON/SAMR, but winbind has direct access to it via the passdb domain methods
* s3:winbind: Do not drop the first user in sam_query_user_listVolker Lendecke2009-08-231-3/+4
|
* s3:winbind: For internal domains it is pointless to connect to a DCVolker Lendecke2009-08-232-1/+11
|
* s3:winbind: winbindd_dual_ndrcmd should output what it's doingVolker Lendecke2009-08-231-0/+4
|
* s3:winbind: Fix the talloc hierarchy in wb_queryuser_doneVolker Lendecke2009-08-231-1/+1
| | | | | | | | | We need to return state->userinfo beyond the end of wb_queryuser_recv, so the unmarshalled strings are children of that, not the state that is lost sooner. Metze, this scheme works fine as long as we only have a single malloc'ed entity that is returned. I think we need a different scheme in the future when we might have more than one independent object to be returned.
* Implement Metze's suggestion of trying getpwuid(0) then getpwnam(root).Jeremy Allison2009-08-221-9/+5
| | | | Jeremy.
* Log debug message when hires timestamps are available on theJeremy Allison2009-08-211-0/+4
| | | | | share. Jeremy.
* Fix bug 6529 - Offline files conflict with Vista and Office 2003Jeremy Allison2009-08-216-1/+42
| | | | | | | | On filesystems that can't store less than one second timestamps, round the incoming timestamp set requests so the client can't discover that a time set request has been truncated by the filesystem. Needs backporting to 3.4, 3.3, 3.2 and (even) 3.0. Jeremy
* Try and fix the buildfarm by using getpwnam(root) insteadJeremy Allison2009-08-211-0/+7
| | | | | | of getpwuid(0) if DEVELOPER is defined. I'm hoping the build farm defines DEVELOPER... Jeremy.
* Fix coverity CID: 932 - forward null.Jeremy Allison2009-08-211-2/+4
| | | | Jeremy.
* s3: fix bug #6650, authentication at member servers when winbindd is not runningMichael Adam2009-08-211-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Authentication of domain users on the member server fails when winbindd is not running. This is because the is_trusted_domain() check behaves differently when winbindd is running and when it isn't: Since wb_is_trusted_domain() calls wbcDomainInfo(), and this will also give a result for our own domain, this succeeds for the member server's own domain when winbindd is running. When winbindd is not running, is_trusted_domain() checks (and possibly updates) the trustdom cache, and this does the lsa_EnumTrustDom() rpc call to the DC which does not return its own domain. In case of winbindd not running, before 3.4, the domain part was _silently_ mapped to the workgroup in auth_util.c:make_user_info_map(), which effectively did nothing in the member case. But then the parameter "map untrusted to domain" was introduced and the mapping was made to the workstation name instead of the workgroup name by default unless "map untrusted to domain = yes". (Commits d8c54fddda2dba3cbc5fc13e93431b152813892e, 5cd4b7b7c03df6e896186d985b6858a06aa40b3f, and fbca26923915a70031f561b198cfe2cc0d9c3aa6) This was ok as long as winbindd was running, but with winbindd not running, these changes actually uncovered the above logic bug in the check. So the correct check is to treat the workgroup as trusted / or known in the member case. This is most easily achieved by not comparing the domain name against get_global_sam_name() which is the host name unless for a DC but against my_sam_name() which is the workgroup for a DC and for a member, too. (These names are not very intuitive...) I admit that this is a very long commit message for a one-liner, but this has needed some tracking down, and I think the change deserves some justification. Michael
* Add missing CreateFile flags to smb.hSteve French2009-08-211-1/+12
|
* Fix bug 6638 - ADS Domain Member: Computer Mgr can not set share ACLsJeremy Allison2009-08-201-3/+19
| | | | | Add good error message for share modification denial. Jeremy.
* s3-idmap: fix two uninitialized variable warnings in idmap_tdb2.Günther Deschner2009-08-201-3/+3
| | | | Guenther