<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ds.git, branch bug515329.py</title>
<subtitle>Unnamed repository; edit this file to name it for gitweb.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/'/>
<entry>
<title>Repl Session API needs to check for NULL api before init</title>
<updated>2010-05-21T17:34:01+00:00</updated>
<author>
<name>Rich Megginson</name>
<email>rmeggins@redhat.com</email>
</author>
<published>2010-05-21T17:27:51+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=3880411360a9f2a47629ef30e2878d89ebe0fc02'/>
<id>3880411360a9f2a47629ef30e2878d89ebe0fc02</id>
<content type='text'>
The new repl sesssion API will crash when adding a replication agreement.
It should check to see if there is a repl session api before attempting
to get the init function.
Reviewed by: nhosoi
Branch: HEAD
Platforms tested: RHEL5 x86_64
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The new repl sesssion API will crash when adding a replication agreement.
It should check to see if there is a repl session api before attempting
to get the init function.
Reviewed by: nhosoi
Branch: HEAD
Platforms tested: RHEL5 x86_64
</pre>
</div>
</content>
</entry>
<entry>
<title>593899 - adding specific ACI causes very large mem allocate request</title>
<updated>2010-05-20T21:55:36+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-05-20T21:55:36+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=6f0705102374bcff44c24f0d90e7fb4c70e646df'/>
<id>6f0705102374bcff44c24f0d90e7fb4c70e646df</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=593899

Fix Description: There was a bug if an invalid syntax acl was given
(e.g., the value of userdn was not double quoted), normalize_nextACERule
mistakenly continued processing the acl and eventually tried to
allocate a huge size of memory (since the end address was less
than the start address, end - start became negative) and it made
the server quit.  Added more error handling code to prevent such
failures.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=593899

Fix Description: There was a bug if an invalid syntax acl was given
(e.g., the value of userdn was not double quoted), normalize_nextACERule
mistakenly continued processing the acl and eventually tried to
allocate a huge size of memory (since the end address was less
than the start address, end - start became negative) and it made
the server quit.  Added more error handling code to prevent such
failures.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 592389 - Set anonymous resource limits properly</title>
<updated>2010-05-20T21:45:59+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2010-05-20T21:08:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=55489b8cbf203d18237db8722ebc28b7d415b60e'/>
<id>55489b8cbf203d18237db8722ebc28b7d415b60e</id>
<content type='text'>
The anonymous resource limits were not being properly set.  This
patch ensures that the limits are set properly when an anonymous
or unauthenticated BIND operation is performed.  It also sets the
anonymous limits when we do a read on a connection that has not
yet perfomed a BIND.  These limits will be overwritten with any
default or user-based limits once a valid BIND is performed.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The anonymous resource limits were not being properly set.  This
patch ensures that the limits are set properly when an anonymous
or unauthenticated BIND operation is performed.  It also sets the
anonymous limits when we do a read on a connection that has not
yet perfomed a BIND.  These limits will be overwritten with any
default or user-based limits once a valid BIND is performed.
</pre>
</div>
</content>
</entry>
<entry>
<title>Correct function prototype for repl session hook</title>
<updated>2010-05-19T22:54:05+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2010-05-19T22:54:05+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=ecb1e8a90a6b4ca0cd268b9fc43a9b7e59d646e7'/>
<id>ecb1e8a90a6b4ca0cd268b9fc43a9b7e59d646e7</id>
<content type='text'>
The previous patch had a mangled function name in
the function prototype.  This corrects the name.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The previous patch had a mangled function name in
the function prototype.  This corrects the name.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add replication session hooks</title>
<updated>2010-05-19T22:42:57+00:00</updated>
<author>
<name>Nathan Kinder</name>
<email>nkinder@redhat.com</email>
</author>
<published>2010-05-18T21:49:26+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=7c2e049c16a741c1a109ac3a4246d29f2d42c7cb'/>
<id>7c2e049c16a741c1a109ac3a4246d29f2d42c7cb</id>
<content type='text'>
This adds the ability to write a plug-in to register callbacks for
controlling when replication is allowed to occur.  For details,
please see the design document at:

  http://directory.fedoraproject.org/wiki/Replication_Session_Hooks
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This adds the ability to write a plug-in to register callbacks for
controlling when replication is allowed to occur.  For details,
please see the design document at:

  http://directory.fedoraproject.org/wiki/Replication_Session_Hooks
</pre>
</div>
</content>
</entry>
<entry>
<title>593110 - backup-restore does not ALWAYS work</title>
<updated>2010-05-19T22:19:37+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-05-19T22:02:41+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=466052e83b57f58a0d5a2ee3fed8129376169323'/>
<id>466052e83b57f58a0d5a2ee3fed8129376169323</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=593110

Fix description:
ldap/servers/slapd/back-ldbm/dblayer.c -- A memory area that
stores nsslapd-directory was shared between 2 structures:
struct ldbminfo and dblayer_private.  In dblayer_post_close,
dblayer_private is released but not struct ldbminfo.  The
latter does not know the memory area is freed.  This fix
changes it so that each structure has its own copy.

ldap/servers/plugins/acl/acl.c -- A variable result_status
had a chance to be evaluated w/o an initialization.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=593110

Fix description:
ldap/servers/slapd/back-ldbm/dblayer.c -- A memory area that
stores nsslapd-directory was shared between 2 structures:
struct ldbminfo and dblayer_private.  In dblayer_post_close,
dblayer_private is released but not struct ldbminfo.  The
latter does not know the memory area is freed.  This fix
changes it so that each structure has its own copy.

ldap/servers/plugins/acl/acl.c -- A variable result_status
had a chance to be evaluated w/o an initialization.
</pre>
</div>
</content>
</entry>
<entry>
<title>593453 - Creating password policy with ns-newpolicy.pl on Replicated</title>
<updated>2010-05-18T23:11:32+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-05-18T23:11:32+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=f999c42c3c4a2c39143fa9bfeddc55d03b25f8dc'/>
<id>f999c42c3c4a2c39143fa9bfeddc55d03b25f8dc</id>
<content type='text'>
         Server Causes Crash

Fix description: normalized_mods-&gt;mod_bvalues is an array of
(struct berval *).  When slapi_dn_normalize_ext returns an
allocated memory (case rc &gt; 0), a new struct berval should have
been allocated and the address of the normalized string (normed)
and its length (dnlen) should be set in the berval.
The struct berval allocation was missing in the previous fix
for "Update to New DN Format".
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
         Server Causes Crash

Fix description: normalized_mods-&gt;mod_bvalues is an array of
(struct berval *).  When slapi_dn_normalize_ext returns an
allocated memory (case rc &gt; 0), a new struct berval should have
been allocated and the address of the normalized string (normed)
and its length (dnlen) should be set in the berval.
The struct berval allocation was missing in the previous fix
for "Update to New DN Format".
</pre>
</div>
</content>
</entry>
<entry>
<title>591336 - Implementing upgrade DN format tool</title>
<updated>2010-05-17T23:47:55+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-05-17T23:47:55+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=c12c48f47a0cdd7282950fa25e5e7548dd1c5ab0'/>
<id>c12c48f47a0cdd7282950fa25e5e7548dd1c5ab0</id>
<content type='text'>
Change description:
. adding upgradednformat utility to each server instance.
. adding 91upgradednformat.pl for in-place-upgrade.
. implementing ldbm_back_upgradednformat sharing the import/
  reincexing codes.
. adding a new DBVERSION ID "dn-4514" for the upgraded db.
. fixing access logs (delete.c and modify.c)
. fixing compiler warnings.
. fixing memory leaks.
. fixing a bug in syntax plugin to free strings.
. adding templates for plugin id, version, vendor, and description,
  which are needed for the online upgrade.
. dbversion_write takes an additional bit flags, which indicates
  which extra DBVERSION strings are written to the DBVERSION file.
  It was introduced for the upgrade tools not to intervene each
  other's tasks (e.g., dn2rdn for converting entrydn to entryrdn
  and upgradednformat for upgrading the DN format).
. fixing a bug in entryrdn index code which was missing to normalize
  RDN.

See also:
https://bugzilla.redhat.com/show_bug.cgi?id=591336
http://directory.fedoraproject.org/wiki/Upgrade_to_New_DN_Format#Migration.2FUpgrade
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Change description:
. adding upgradednformat utility to each server instance.
. adding 91upgradednformat.pl for in-place-upgrade.
. implementing ldbm_back_upgradednformat sharing the import/
  reincexing codes.
. adding a new DBVERSION ID "dn-4514" for the upgraded db.
. fixing access logs (delete.c and modify.c)
. fixing compiler warnings.
. fixing memory leaks.
. fixing a bug in syntax plugin to free strings.
. adding templates for plugin id, version, vendor, and description,
  which are needed for the online upgrade.
. dbversion_write takes an additional bit flags, which indicates
  which extra DBVERSION strings are written to the DBVERSION file.
  It was introduced for the upgrade tools not to intervene each
  other's tasks (e.g., dn2rdn for converting entrydn to entryrdn
  and upgradednformat for upgrading the DN format).
. fixing a bug in entryrdn index code which was missing to normalize
  RDN.

See also:
https://bugzilla.redhat.com/show_bug.cgi?id=591336
http://directory.fedoraproject.org/wiki/Upgrade_to_New_DN_Format#Migration.2FUpgrade
</pre>
</div>
</content>
</entry>
<entry>
<title>bump console version to 1.2.3</title>
<updated>2010-05-13T21:43:19+00:00</updated>
<author>
<name>Rich Megginson</name>
<email>rmeggins@redhat.com</email>
</author>
<published>2010-05-13T21:43:19+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=5bbca6cfe1f9f1a44872d97a2c80c8cc03c19bbf'/>
<id>5bbca6cfe1f9f1a44872d97a2c80c8cc03c19bbf</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 591685 - Server instances Fail to Start on Solaris due to Library Path and pcre</title>
<updated>2010-05-13T19:43:52+00:00</updated>
<author>
<name>Rich Megginson</name>
<email>rmeggins@redhat.com</email>
</author>
<published>2010-05-13T19:42:27+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=6d581d5b8199b0641e3305acb669498604af4cba'/>
<id>6d581d5b8199b0641e3305acb669498604af4cba</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=591685
Resolves: bug 591685
Bug Description: Server instances Fail to Start on Solaris due to Library Path and pcre
Reviewed by: self
Branch: master
Fix Description: Added pcre_libdir to the initscript LD_LIBRARY_PATH
Platforms tested: Solaris 9
Flag Day: no
Doc impact: no
(cherry picked from commit 21629abd33d98a000ae89c73cadd6782b885f793)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=591685
Resolves: bug 591685
Bug Description: Server instances Fail to Start on Solaris due to Library Path and pcre
Reviewed by: self
Branch: master
Fix Description: Added pcre_libdir to the initscript LD_LIBRARY_PATH
Platforms tested: Solaris 9
Flag Day: no
Doc impact: no
(cherry picked from commit 21629abd33d98a000ae89c73cadd6782b885f793)
</pre>
</div>
</content>
</entry>
</feed>
