summaryrefslogtreecommitdiffstats
path: root/source4/ldap_server
Commit message (Collapse)AuthorAgeFilesLines
* s4:ldap_server/ldap_backend.c - send back also the extended error message if ↵Matthias Dieter Wallnöfer2010-06-061-18/+39
| | | | | | it exists This message often contains suggestions how to fix issues.
* s4:libcli/ldap Rename ldap.h to libcli_ldap.hAndrew Bartlett2010-05-215-5/+1
| | | | | | | It is a problem if a samba header is called ldap.h if we also want to use OpenLDAP's ldap.h Andrew Bartlett
* s4/rodc: Support read-only databaseAnatoliy Atanasov2010-05-041-20/+174
| | | | | | Check on modify if we are RODC and return referral. On the ldap backend side now we pass context and ldb_modify_default_callback to propagate the referral error to the client.
* s4:auth Remove event context from anonymous_session()Andrew Bartlett2010-04-111-1/+1
| | | | | | | | This should always return a simple structure with no need to consult a DB, so remove the event context, and simplfy to call helper functions that don't look at privilages. Andrew Bartlett
* s4-waf: removed the AUTOGENERATED markersAndrew Tridgell2010-04-061-3/+0
| | | | we won't be using the mk -> wscript generator again
* s4-waf: mark the wscript files as python so vim/emacs knows how to highlight ↵Andrew Tridgell2010-04-061-0/+2
| | | | them
* build: commit all the waf build files in the treeAndrew Tridgell2010-04-061-0/+12
|
* s4:ldap_server - make it "signed-safe"Matthias Dieter Wallnöfer2010-02-253-7/+8
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4:LDAP server - Enable support for returning referrals through itMatthias Dieter Wallnöfer2010-02-251-0/+22
| | | | | | | This is needed for my work regarding the referrals when the domain scope control isn't specified. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* Added freeing a successful req so it doesnt croud the ldb contextNadezhda Ivanova2009-12-181-2/+4
|
* Removed ldb_modify_ctrl from ldb, implemented as a static in ldap_backend.Nadezhda Ivanova2009-12-151-1/+43
|
* Some changes to allow processing of ldap controls on modify requests.Nadezhda Ivanova2009-11-201-1/+1
| | | | | ldap_backend used to filter out ldap controls on modify. Also, modified python binding for ldap_modify to allow writing tests for such controls.
* s4-samdb: reduce the number of samdb opens at startupAndrew Tridgell2009-10-251-4/+2
| | | | | Using common parameters means that the ldb_wrap code can return a reference rather than a new database
* s4-ldbwrap: added re-use of ldb contexts in ldb_wrap_connect()Andrew Tridgell2009-10-231-1/+1
| | | | | | | | | This allows us to reuse a ldb context if it is open twice, instead of going through the expensive process of a full ldb open. We can reuse it if all of the parameters are the same. The change relies on callers using talloc_unlink() or free of a parent to close a ldb context.
* s4-dsdb: add a static samdb_credentialsAndrew Tridgell2009-10-231-2/+2
| | | | | Similarly to system_session(), this creates a static samdb_credentials()
* s4-dsdb: create a static system_session contextAndrew Tridgell2009-10-231-1/+1
| | | | | | This patch adds a system_session cache, preventing us from having to recreate it on every ldb open, and allowing us to detect when the same session is being used in ldb_wrap
* s4:ldap server - remove unused error handlingsMatthias Dieter Wallnöfer2009-10-081-35/+0
| | | | | Those error cases should be handled by LDB itself to be available on all connection methods and not only over LDAP.
* s4:LDB/LDAP - Re-allow renamesMatthias Dieter Wallnöfer2009-10-021-1/+1
| | | | | | The main problem is that the "rdn_name" module launches on a rename request also a modification one with the "special attributes" which can't be changed directly. An introduced flag helps to bypass the restriction.
* s4:ldap_server Ensure we don't segfault when sent a NULL new RDNAndrew Bartlett2009-10-021-4/+7
| | | | | | | The Microsoft testsuite tried to rename cn=administrator,cn=users,... into "",cn=users... which didn't go so well. Andrew Bartlett
* s4-ldap: fixed spellingAndrew Tridgell2009-09-281-1/+1
|
* gensec: Avoid exposing lp_ctx on the API level.Jelmer Vernooij2009-09-261-1/+1
|
* s4-server: kill main daemon if a task fails to initialiseAndrew Tridgell2009-09-181-4/+6
| | | | | | When one of our core tasks fails to initialise it can now ask for the server as a whole to die, rather than limping along in a degraded state.
* s4:ldap_server Correct removal of talloc_steal()Andrew Bartlett2009-08-141-1/+0
| | | | | | | | This corrects commit 7a82aed71b74af8bc2a8a4381541adbb22452d20. The steal did not set ent->attributes, so it was incorrect to assign to ent->attributes. Andrew Bartlett
* s4:ldap_server Remove another talloc_steal (with references)Andrew Bartlett2009-08-141-1/+1
| | | | | | | | This talloc_steal also conflicts with the ldb_map code, and like the previous commit, is rudundent given the talloc_steal of the whole msg above. Andrew Bartlett
* s4:ldap_server Don't talloc_steal (with references) in ldap_backendAndrew Bartlett2009-08-141-1/+1
| | | | | | | | There may or may not be a need to take a reference to the 'name' in the ldb_map code, but given we seal the whole msg just above here, it makes no senst to steal the name, but not the values. Andrew Bartlett
* s4:ldap_server: make sure we shutdown the tls socket before ↵Stefan Metzmacher2009-08-051-0/+1
| | | | | | | | stream_terminate_connection() removes the fd event This fixes a crash bug where tls_destructor() relies on the fd event still being there. metze
* s4-ldap_server: fix generated error string in map_ldb_error().Günther Deschner2009-08-041-1/+1
| | | | Guenther
* s4: Enhances the LDAP server to display error messages like Windows ServerMatthias Dieter Wallnöfer2009-07-311-27/+178
| | | | | | | Those error messages also include the WERROR code of the failed operation(s) in this manner: <error code eight chars in HEX>: <further error message> This also addresses bug #4949
* s4:ldap_server: the tls code steals the original socket on its own nowStefan Metzmacher2009-07-312-2/+2
| | | | metze
* use a talloc_unlink() as ops may have a referenceAndrew Tridgell2009-07-011-1/+1
|
* Reenable the LDAPI socket for the merged buildVolker Lendecke2009-06-241-2/+0
| | | | | | | | | | | It seems that the samba4 part of the merged build does not pick up the DEVELOPER flag from the s3 configure. Jelmer, can you fix that properly? Thanks, Volker
* Allow developers access the the privilaged ldapi socket for the momentAndrew Bartlett2009-06-191-0/+4
| | | | This allows us some time to get the EXTERNAL bind working
* s4:ldapsrv Place the 'privilaged' ldapi socket under an #ifdefAndrew Bartlett2009-06-191-1/+11
| | | | | | | | This makes it clear to our users that this particular implementation isn't final (all parties are agreed that an EXTERNAL bind is the right way to do this, but it has not been implemented yet). Andrew Bartlett
* Allow access as SYSTEM on a privileged ldapi connectionVolker Lendecke2009-06-061-13/+83
| | | | | | | This patch creates ldap_priv/ as a subdirectory under the private dir with the appropriate permissions to only allow the same access as the privileged winbind socket allows. Connecting to ldap_priv/ldapi gives SYSTEM access to the ldap database.
* Fix some nonempty blank linesVolker Lendecke2009-05-291-11/+11
|
* libcli/ldap: move generic ldap control encoding code to ldap_message.cStefan Metzmacher2009-02-241-2/+2
| | | | | | | As they can we static there, we pass the specific handlers as parameter where we need to support controls. metze
* Worked around a problem with select/poll/epoll and gnutls Andrew Tridgell2009-02-182-0/+5
| | | | | | | | | | | | | | | | | | | Our packet layer relies on the event system reliably telling us when a packet is available. When we are using a socket layer like TLS then things get a bit trickier, as there may be bytes in the encryption buffer which could be read even if there are no bytes at the socket level. The GNUTLS library is supposed to prevent this happening by always leaving some data at the socket level when there is data to be processed in its buffers, but it seems that this is not always reliable. To work around this I have added a new packet option packet_set_unreliable_select() which tells the packet layer to not assume that the socket layer has a reliable select, and to instead keep trying to read from the socket until it gets back no data. This option is set for the ldap client and server when TLS is negotiated. This seems to fix the problems with the ldaps tests.
* Remove auth/ntlm as a dependency of GENSEC by means of function pointers.Andrew Bartlett2009-02-131-9/+7
| | | | | | | | | | | When starting GENSEC on the server, the auth subsystem context must be passed in, which now includes function pointers to the key elements. This should (when the other dependencies are fixed up) allow GENSEC to exist as a client or server library without bundling in too much of our server code. Andrew Bartlett
* s4:service_stream: s/private/private_dataStefan Metzmacher2009-02-021-4/+4
| | | | metze
* s4:ldap_server: s/private/private_dataStefan Metzmacher2009-02-023-12/+12
| | | | metze
* s4:lib/tevent: rename structsStefan Metzmacher2008-12-292-7/+7
| | | | | | | | | | | | | | | | | | | | list="" list="$list event_context:tevent_context" list="$list fd_event:tevent_fd" list="$list timed_event:tevent_timer" for s in $list; do o=`echo $s | cut -d ':' -f1` n=`echo $s | cut -d ':' -f2` r=`git grep "struct $o" |cut -d ':' -f1 |sort -u` files=`echo "$r" | grep -v source3 | grep -v nsswitch | grep -v packaging4` for f in $files; do cat $f | sed -e "s/struct $o/struct $n/g" > $f.tmp mv $f.tmp $f done done metze
* s4: Fix subsystem for various services in samba daemon.Jelmer Vernooij2008-12-221-1/+1
|
* s4:ldap_server: return the extended dn to the LDAP client if availableAndrew Bartlett2008-12-171-1/+16
| | | | | | | This uses an early peek at the extended_dn_control (in the request) to see what output format to use. Signed-off-by: Stefan Metzmacher <metze@samba.org>
* Remove restrictions on number of DN components in LDAP serverAndrew Bartlett2008-11-171-13/+9
| | | | | | | | There is no reason for these restrictions to be in the LDAP server - they belong in the LDB layer. When accepting 'extended' or 'alternate' DNs we can't tell anyway. Andrew Bartlett
* Remove use of global_loadparm for disabled gensec backends.Jelmer Vernooij2008-11-021-0/+3
|
* Add gensec_settings structure. This wraps loadparm_context for now, butJelmer Vernooij2008-11-021-1/+1
| | | | should in the future only contain some settings required for gensec.
* Fix include paths to new location of libutil.Jelmer Vernooij2008-10-113-4/+4
|
* LDB ASYNC: misc changesSimo Sorce2008-09-291-19/+16
|
* Fix nasty bug that would come up only if a client connection to a remoteSimo Sorce2008-09-241-0/+1
| | | | | | | | | ldap server suddenly dies. We were creating a wrong talloc hierarchy, so the event.fde was not freed automatically as expected. This in turn made the event system call the ldap io handlers with a null packet structure, causing a segfault. Fix also the ordering in ldap_connection_dead() Thanks to Metze for the huge help in tracking down this one.
* Rename smbd -> samba.Jelmer Vernooij2008-09-241-1/+1
| | | | | | | | This reverts commit 05ea5e23cf4e70de0bd658b1c5c0ead133967091. Conflicts: source4/smbd/server.c