summaryrefslogtreecommitdiffstats
path: root/ldap/servers
Commit message (Collapse)AuthorAgeFilesLines
...
* 163064 - It appears that Active Directory has a problem where it allows ↵Nathan Kinder2005-10-271-2/+5
| | | | duplicate values for system-only multivalued attributes. This change just skips the dscorepropagationdata attibute when receiving a change from DirSync.
* also checkin fix for 170350 onto trunkRich Megginson2005-10-211-7/+29
|
* 170071 - Automatically add grouptype for new groups being synchd to NT4Nathan Kinder2005-10-202-1/+13
|
* 170321 - Increase winsync version to 1.0.1Nathan Kinder2005-10-111-2/+2
|
* 169954 - Moved illegal declaration to the top of code blockNathan Kinder2005-10-061-1/+3
|
* 169954 - Winsync initialization would hang with certain entries. Fixed ↵Nathan Kinder2005-10-061-2/+11
| | | | improper use of ldap_get_next.
* 169388 - Fixed attribute comparision helper function that was causing ↵Nathan Kinder2005-09-281-1/+1
| | | | certain changes to not get synched.
* 168322 - Check size of hash needed before base64 encoding password hashesNathan Kinder2005-09-141-2/+2
|
* Fix for NT build failure: undefined symbols in index.cNoriko Hosoi2005-09-091-2/+2
|
* 167441 - Added SHA2 hashed password storage support.Nathan Kinder2005-09-065-79/+449
|
* Bug(s) fixed: 165641Rich Megginson2005-08-302-2/+3
| | | | | | | | | | | | | | Bug Description: ./ns-slapd crashes on bind containing invalid dn and password Reviewed by: Noriko (Thanks!) Branch: HEAD Fix Description: It's really crashing on the search request. The problem is that the server assumes all strings are encoded in utf8 format, since that is the only encoding allowed by the LDAP standards. Non-utf8 works in most places except the function slapi_utf8StrToLower(), which returns NULL given a string of non-utf8 bytes. The fix for this particular problem is to check for a NULL return value and handle accordingly. The real solution to this problem would be for the server to check for valid utf8 strings in _all_ LDAP data, according to the syntax of the attribute (e.g. for binary or octet string syntax data, and other binary formats, all bets are off, but then we shouldn't be doing strtolower on these blobs either). And, while we're at it, add data validation based on syntax for _all_ attributes e.g. in a pre-op. Platforms tested: RHEL4 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* Bug(s) fixed: 166229Rich Megginson2005-08-291-3/+8
| | | | | | | | | | | | Bug Description: slapd crashes during SASL authentication Reviewed by: Noriko (Thanks!) Branch: HEAD Fix Description: I could not reproduce the crash. I tried several different ways - no password in entry, empty password in entry, SSHA hashed password in entry - no crashes. No useful information from the FDS bug reporter either. In fact I found that SASL Digest-MD5 was not working at all. We needed to use the SASL_AUX_PASSWORD_PROP define instead of hardcoding "userpassword" - I guess sasl is case sensitive. I also fixed some missing new lines in log messages. Platforms tested: RHEL4 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* [Bug 164834] modify/replace allows multiple same valued attributes in an entryNoriko Hosoi2005-08-255-94/+113
| | | | | | | | 1) Eliminated SLAPD_MODUTIL_TREE_THREASHHOLD from attr.c as well as valueset.c. With this change, if an attribute has more than 1 value to add/replace/delete, it creates an AVL tree to check the duplicates. 2) Replace was not checking the duplicated value at all. Added a code to put the attribute values into the AVL tree as being done for add and delete.
* [Bug 166632] dbscan: not to truncate the entry even if it is larger than BUFSIZNoriko Hosoi2005-08-251-258/+292
| | | | | | By default, it dumps the entire entry. (it used to be truncated at the BUFSIZ size). In case no need to dump the entire entry, introduced the truncate option "-t".
* 166012 - Use of incorrect iterator in indexing code was causing illegal ↵Nathan Kinder2005-08-151-2/+6
| | | | access of memory which sometimes resulted in crashing.
* 165862 - Needed to set BE_INDEX_EQUALITY flag when doing a delete of an entry.Nathan Kinder2005-08-121-1/+1
|
* Bug(s) fixed: 165827Rich Megginson2005-08-121-1/+3
| | | | | | | | | | | | | Bug Description: Daily Acceptance: Directory Install failed to register Directory server as a Red Hat server (81) Reviewed by: Nathan (Thanks!) Fix Description: The index code, in the replace case, was not checking to see if there were actually any values to delete before attempting to delete them. This fix just checks to see if there are any values to delete. Platforms tested: RHEL3 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing with the new indexing tests New Tests integrated into TET: none
* 164843 - Modified indexing to deal with attribute subtypesNathan Kinder2005-08-124-37/+171
|
* Bug(s) fixed: 165640Rich Megginson2005-08-111-1/+1
| | | | | | | | | | | Bug Description: Directory Server crashes when deleting a view Reviewed by: Nathan (Thanks!) Fix Description: Needed to pass in the _address_ of theCache.pCacheViews to views_cache_add_ll_entry. Yet another lesson in using the compiler to catch type errors rather than casting to void*. Platforms tested: RHEL3 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* Bug(s) fixed: 165600Rich Megginson2005-08-101-1/+1
| | | | | | | | | | | Bug Description: Adding multiple attributes using a single ldapmodify crashes ns-slapd Reviewed by: Nathan (Thanks!) Fix Description: In C, the array '[]' dereference operator takes precedence over the '*' deref operator. In this case, I needed to put parentheses around the pointer dereference to avoid having array dereferenced first. modary is a pointer to an array, not an array, so I can't dereference it with the array operator until I first dereference the pointer. Platforms tested: RHEL3 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* 164017 - Attribute uniqueness plugin now only checks for conflicts in ↵Nathan Kinder2005-08-011-2/+8
| | | | subtrees that the operation applies to
* PAM is not thread safe. Therefore, we must put the code that accesses PAMRich Megginson2005-07-153-0/+30
| | | | | in a critical section. This fix creates a mutex at init time and uses that mutex to create a critical section around all PAM API access.
* [147585] test plugin to verify the bug, the previous check in was not ↵Noriko Hosoi2005-06-241-0/+2
| | | | returning SUCCESS.
* Bug 160008Rich Megginson2005-06-144-1/+162
| | | | | | | Coding done by David Irving, Fred Brittain, and Aaron Gagnon Reviewed by Rich Megginson - minor changes to md5_pwd.c Tested on RHEL3 with FDS post-7.1 Does not include the OpenLDAP migration script - that will be handled separately
* Added testpreop_search to verify bug 147585Noriko Hosoi2005-06-098-11/+32
| | | | Plus fixed branding/version number.
* Fix bug 155276, crash if config has changed since restore.Thomas Lackey2005-05-241-3/+16
|
* Bug(s) fixed: 158549Rich Megginson2005-05-242-2/+2
| | | | | | | | | | | Bug Description: Reliab 05: chaining backend test core dumped on HPUX backend Reviewed by: Noriko (Thanks!) Fix Description: This is a 64 bit issue. For ber_scanf, the "i" and "e" flags require a pointer to a long. There were a couple of places in the chaining backend code where we were passing in an int instead. This works fine on 32 bit where ints and longs are both 32 bits. I did a quick check through the code - these were the only places not using longs. The only way you would see this bug is in a "hub" chaining backend - one that gets requests from a mux and chains them to another farm server, or possibly on a mux in certain conditions. Platforms tested: HP-UX 11.i 64 bit Flag Day: no Doc impact: no QA impact: rerun chaining tests New Tests integrated into TET: none
* Fix for #158253: add attributes to the exclusion list for fractional ↵David Boreham2005-05-202-0/+2
| | | | replication. Add an error string returned to clients if an illegal attribute is configured
* Only check the read only status of the consumer for the fractional case if ↵Rich Megginson2005-05-181-1/+2
| | | | the acquire process has been successful thus far.
* Correctly report in the repl agreement status attrs that the repl init ↵Rich Megginson2005-05-181-0/+1
| | | | failed when it failed due to attempting to do fractional replication to another master.
* Fix for 157919: perform fractional consumer check after acquiring the replicaDavid Boreham2005-05-171-16/+19
|
* Fixed object build path: convert relative path to absolute path (tlackey)svrbld2005-05-161-0/+7
|
* Fix for #157895 : logon hours doesn't workDavid Boreham2005-05-161-1/+2
|
* Memory Leak Fixes for Apache DSDavid Boreham2005-05-163-11/+139
|
* Fix for #157901 : FMR in windows sync agreement codeDavid Boreham2005-05-161-1/+2
|
* Modify NTDS and PassSync to build in the 'built' directory.Thomas Lackey2005-05-162-8/+8
|
* Add installer icons.Thomas Lackey2005-05-132-0/+0
|
* Fix ntds installer to allow repair and removalDavid Boreham2005-05-134-222/+1292
|
* Change NT4 case to send plaintext passwordsDavid Boreham2005-05-121-40/+56
|
* Fix Windows SSL replication in-order processing of operatationsDavid Boreham2005-05-121-2/+12
|
* Update packaging for ntdsDavid Boreham2005-05-122-6/+11
|
* Patches we apply to apache ds 0.9David Boreham2005-05-113-42/+425
|
* Fixes for memory leaks in ntdsDavid Boreham2005-05-113-601/+1190
|
* Bug(s) fixed: 157377Rich Megginson2005-05-111-1/+1
| | | | | | | | | | | Bug Description: RL16: Server core dumped while configuring replication agreements Reviewed by: David (Thanks!) Fix Description: The code for handling bad agreements was wrong. It was not returning the correct error code. The result of this is that the client did not receive an appropriate error code/message from the server. The reason for the core dump was that, even though the agreement was not created, the DSE entry was still there, causing the server to become very confused. Returning the correct error code causes the server to refuse to create the bad DSE entry. Platforms tested: RHEL3 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* Changes so DS can be built with gcc on Solaris.Rob Crittenden2005-05-101-1/+6
| | | | Pass these build variables to gmake: NO_MDUPDATE=1 NS_USE_GCC=1
* Fix for #156449 : mangle 'street' attribute to defeat our schema aliasing it ↵David Boreham2005-05-093-3/+15
| | | | with 'streetaddress'
* Add makefile and component information to build the Apache DS for User SyncThomas Lackey2005-05-092-2/+27
| | | | on Windows.
* Fix for 157021: server doesn't correctly process modifies to windows sync ↵David Boreham2005-05-063-26/+71
| | | | agreements
* Fix for #155591: treat an ruv with no min_csn as pristineDavid Boreham2005-05-063-1/+30
|
* Fix for #157020: convert unicode password to little-endian byte orderDavid Boreham2005-05-061-0/+16
|