| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
|
|
| |
Basically the candidate owner makes a getncchanges call with extended op 6 when they want to
become the new owner. The current owner then updates the corresponding fSMORoleOwner attribute
in its database with the new owner, and replicates the change to the candidate, who then becomes the
owner.
The patch was made in cooperation with Anatoliy Atanasov <anatoliy.atanasov@postpath.com> who
kindly helped to debug it.
|
|
|
|
| |
structures can be used for other extended ops
|
| |
|
|
|
|
|
|
| |
RPC-SPOOLSS-PRINTSERVER.
Guenther
|
|
|
|
| |
"static const struct"s need to be global in order to work with Solaris cc.
|
|
|
|
| |
"static const struct"s need to be global in order to work with Solaris cc.
|
|
|
|
| |
According to "librpc/gen_ndr/security.h" they need to be "uint32_t".
|
| |
|
|
|
|
|
|
|
|
|
|
| |
At first I got the impression we are not handling those cases,
but after those tests surprisingly passed I saw that
we have correct behavior implemented in a helper function.
So I decided to commit those tests in case someone change the
strange-looking check for DRSUAPI_DRS_ADD_REF flag in
a function that handles delete operation :)
|
|
|
|
|
|
|
|
|
|
|
|
| |
run the operation
Operation was scheduled already, so we need to call
the callback function for it to be able to do its job.
For instance, if we are blocking an rpc call until an
operation is completed and there is no memory, then
client will be blocked without knowing what is going on
with the server.
|
| |
|
|
|
|
| |
and remove few trailing white spaces
|
|
|
|
|
|
|
|
|
| |
There are many spots where this function may fail
and I find it very useful to know where exactly function
fails and what are the input parameters during testing.
REPLICA_SYNC_FAIL() macro now dumps an error message
so we may remove extra DEBUG() dump in implementation.
|
|
|
|
| |
this can be missing after the schema tests
|
|
|
|
|
|
| |
We should make the 'common' error not show up, but the unusal case fatal.
Andrew Bartlett
|
|
|
|
|
|
|
|
| |
We set up our DNS pretty well these days, and I think the previous setting
was only there because Andrew Kroeger copied this out of our selftest code
in bf3f3af92677bce8f03b0dd2be552d6c8c730ca1.
Andrew Bartlett
|
|
|
|
| |
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
|
| |
don't rely on the netbios domain name being the first part of the
realm
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
|
|
| |
This is needed by the dsdb python interface
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
| |
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
| |
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|
|
|
|
| |
this fixes a segfault in net rodc preload
|
|
|
|
|
|
| |
Thanks to Brad Hards for pointing this out.
Guenther
|
| |
|
| |
|
|
|
|
| |
Guenther
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
This ensures that two ldap server operations cannot happen in parallel
by using packet_recv_disable() and packet_recv_enable() to disable
other interfaces during ldap calls.
This prevents problems caused by parallel ldap operations where
transactions could overlap.
|
|
|
|
|
| |
this avoids doing an epoll system call when we want to prevent receipt
of packets on a socket, unless there actually is a packet to receive.
|
|
|
|
| |
it doesn't actually work, but at least it now compiles
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
levels)
This allows for binding strings like this:
ncacn_ip_tcp:host[localaddress=192.168.2.1,seal]
which will force the connection to be locally bound to the specified
IP address
Signed-off-by: Andrew Tridgell <tridge@samba.org>
|
|
|
|
|
|
| |
- fail torture_context in case libnet_DeleteUser() has failed
- make use of torture_assert_* macros to track down where failur occured
- use only one memory context internally
|
|
|
|
| |
Sorry for the 'custom' definition first time
|
| |
|
|
|
|
| |
object is present
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
(Is there a particular reason we're not using ldb_wrap here?)
|
|
|
|
| |
hundred tests fail.
|
| |
|
| |
|
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
| |
metze
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Now that we support SePrintOperatorPrivilege, an interaction between
the spoolss tests and the privileges tests cause a failure. The
failure happens like this:
- the spoolss.access test creates and then deletes an account with
SePrintOperatorPrivilege privilege
- this leaves the privileges database with an entry for a deleted
account that is still visible via LSA calls. This is correct
behaviour (verified against w2k8r2)
- the lsa.privileges test then enumerates all accounts that have at
least one privilege, and gets the SID for the deleted account
- it then called LookupNames and LookupSids on this deleted account,
and gets an error.
The fix is to not call LookupSids and LookupNames on sids which have
SID_NAME_UNKNOWN as the type
Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
|