summaryrefslogtreecommitdiffstats
path: root/ldap/servers
Commit message (Collapse)AuthorAgeFilesLines
...
* 174550 - Fixed error message typoNathan Kinder2005-11-291-1/+1
|
* [173687] deadlock caused by error log rotation and loggingNoriko Hosoi2005-11-241-1/+17
| | | | need to set localuser before creating/opening error log.
* [173687] deadlock caused by error log rotation and loggingNoriko Hosoi2005-11-234-29/+49
| | | | | Modified to change the owner to the "localuser" if the error log file is not owned by the user.
* Cannot pass const strings into slapi_str2filter, since it can modifyFedoraDirSvr_20051103_RTCFedoraDirSvr10Rich Megginson2005-11-222-3/+10
| | | | | | | | | | the contents. I'm not sure why we haven't caught this earlier, but I believe it has something to do with the patch to make ds build on Fedora Core 4 with gcc4. To do that, we turn off the -fwriteable-strings argument to gcc. I suppose with it on, it moves those strings to some sort of writeable memory location. With it off, constant strings are definitely in the data section. There was one place in views that used a constant string, and a couple of places in the windows sync code.
* 1) Move the import, export, etc. (non network server mode) code to after the ↵Rich Megginson2005-11-211-65/+70
| | | | | | NSS/SSL init. For example, import needs to hash passwords, export of encrypted attrs needs encryption. 2) Only create, configure (for SSL) and bind TCP ports if running in regular or referral mode. Before, the code short circuited if doing import, export, etc. before getting to the port stuff. But since 1) above, the code needs to take care only to do network related stuff if in network mode.
* Move NSS/SSL initialization after the setuid so that key/cert/other nssRich Megginson2005-11-181-55/+63
| | | | | related files are owned by the correct user, but make that happen before the detach so we can ask for the pin on the terminal.
* Move ssl init on the secure socket into main with the rest of the nss/ssl initRich Megginson2005-11-181-2/+0
|
* The DS console Configuration Encryption tab was giving an error. The error ↵Rich Megginson2005-11-171-29/+28
| | | | | | was due to the security CGI not being able to read the ds key/cert db files. They were owned by root instead of the server uid because they were being created by NSS_Initialize which was being called before the server did the setuid. The fix is to move the NSS/SSL initialization code to just after the setuid call.
* [172824] Link SASL library dynamicallyNoriko Hosoi2005-11-101-1/+25
| | | | | | | i1) For non-RHEL platforms, package cyrus sasl library and the supported plugins. 2) by default, cyrus sasl expects to see the plugins in /usr/lib/sasl2. Instead, tell sasl to search "../../../lib/sasl2" (relative path from ns-slapd) for the plugins.
* Bug(s) fixed: 172672Rich Megginson2005-11-081-0/+3
| | | | | | | | | | | Bug Description: sasl code needs to accomodate older versions of sasl Reviewed by: Noriko (Thanks!) Fix Description: 1) Change build to use -L/usr/kerberos/lib on RHEL3 since that's where gssapi_krb5 is on that platform 2) ifdef out the use of SASL_AUX_PASSWORD_PROP - if it's not defined, we don't need to use it. Platforms tested: RHEL3 Flag Day: no Doc impact: no
* Fixed the build: removed __attribute__ from the previous checkin.Noriko Hosoi2005-11-041-7/+7
|
* Bug(s) fixed: 166229, 166081Rich Megginson2005-11-031-0/+54
| | | | | | | | | | | | | | | | | | | | | | | | Bug Description: slapd crashes during SASL authentication Reviewed by: Noriko (Thanks!) Branch: HEAD and Directory71RtmBranch Fix Description: When we build cyrus-sasl on RHEL, we tell it to use berkeley db for its sasldb database. It uses whatever version of berkeley db is installed in the system. On RHEL3, this is usually libdb-4.1. However, at runtime, slapd uses 4.2, leading to conflicts. This doesn't happen on RHEL4 because it already has 4.2 on it. The db is used to lookup auxiliary properties (auxprop) related to the user, such as password or whatever. This happens in sasl after the user is looked up. In our server, the way we use it, we don't care about these auxprops, or we get them in another way. If you don't tell sasl which auxprop plugin you want to use, it tries to use all of them, which means it will attempt to use the sasldb plugin, which will lead to the crash. The solution is to add our own auxprop plugin which is just a dummy that does nothing, and tell sasl to use our plugin. Platforms tested: RHEL3, RHEL4 Flag Day: no Doc impact: no QA impact: retest New Tests integrated into TET: none
* Bug(s) fixed: 172005Rich Megginson2005-10-2932-34/+34
| | | | | | | | | | | | | Bug Description: Change ldapserver version to 1.0 Reviewed by: Noriko (Thanks!) Fix Description: This also fixes some lingering build issues involving perldap, which is no longer a separate setup package, but just gets included into DS in a similar manner to nspr, nss, etc. Platforms tested: RHEL4 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* 163064 - It appears that Active Directory has a problem where it allows ↵Nathan Kinder2005-10-271-2/+5
| | | | duplicate values for system-only multivalued attributes. This change just skips the dscorepropagationdata attibute when receiving a change from DirSync.
* also checkin fix for 170350 onto trunkRich Megginson2005-10-211-7/+29
|
* 170071 - Automatically add grouptype for new groups being synchd to NT4Nathan Kinder2005-10-202-1/+13
|
* 170321 - Increase winsync version to 1.0.1Nathan Kinder2005-10-111-2/+2
|
* 169954 - Moved illegal declaration to the top of code blockNathan Kinder2005-10-061-1/+3
|
* 169954 - Winsync initialization would hang with certain entries. Fixed ↵Nathan Kinder2005-10-061-2/+11
| | | | improper use of ldap_get_next.
* 169388 - Fixed attribute comparision helper function that was causing ↵Nathan Kinder2005-09-281-1/+1
| | | | certain changes to not get synched.
* 168322 - Check size of hash needed before base64 encoding password hashesNathan Kinder2005-09-141-2/+2
|
* Fix for NT build failure: undefined symbols in index.cNoriko Hosoi2005-09-091-2/+2
|
* 167441 - Added SHA2 hashed password storage support.Nathan Kinder2005-09-065-79/+449
|
* Bug(s) fixed: 165641Rich Megginson2005-08-302-2/+3
| | | | | | | | | | | | | | Bug Description: ./ns-slapd crashes on bind containing invalid dn and password Reviewed by: Noriko (Thanks!) Branch: HEAD Fix Description: It's really crashing on the search request. The problem is that the server assumes all strings are encoded in utf8 format, since that is the only encoding allowed by the LDAP standards. Non-utf8 works in most places except the function slapi_utf8StrToLower(), which returns NULL given a string of non-utf8 bytes. The fix for this particular problem is to check for a NULL return value and handle accordingly. The real solution to this problem would be for the server to check for valid utf8 strings in _all_ LDAP data, according to the syntax of the attribute (e.g. for binary or octet string syntax data, and other binary formats, all bets are off, but then we shouldn't be doing strtolower on these blobs either). And, while we're at it, add data validation based on syntax for _all_ attributes e.g. in a pre-op. Platforms tested: RHEL4 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* Bug(s) fixed: 166229Rich Megginson2005-08-291-3/+8
| | | | | | | | | | | | Bug Description: slapd crashes during SASL authentication Reviewed by: Noriko (Thanks!) Branch: HEAD Fix Description: I could not reproduce the crash. I tried several different ways - no password in entry, empty password in entry, SSHA hashed password in entry - no crashes. No useful information from the FDS bug reporter either. In fact I found that SASL Digest-MD5 was not working at all. We needed to use the SASL_AUX_PASSWORD_PROP define instead of hardcoding "userpassword" - I guess sasl is case sensitive. I also fixed some missing new lines in log messages. Platforms tested: RHEL4 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* [Bug 164834] modify/replace allows multiple same valued attributes in an entryNoriko Hosoi2005-08-255-94/+113
| | | | | | | | 1) Eliminated SLAPD_MODUTIL_TREE_THREASHHOLD from attr.c as well as valueset.c. With this change, if an attribute has more than 1 value to add/replace/delete, it creates an AVL tree to check the duplicates. 2) Replace was not checking the duplicated value at all. Added a code to put the attribute values into the AVL tree as being done for add and delete.
* [Bug 166632] dbscan: not to truncate the entry even if it is larger than BUFSIZNoriko Hosoi2005-08-251-258/+292
| | | | | | By default, it dumps the entire entry. (it used to be truncated at the BUFSIZ size). In case no need to dump the entire entry, introduced the truncate option "-t".
* 166012 - Use of incorrect iterator in indexing code was causing illegal ↵Nathan Kinder2005-08-151-2/+6
| | | | access of memory which sometimes resulted in crashing.
* 165862 - Needed to set BE_INDEX_EQUALITY flag when doing a delete of an entry.Nathan Kinder2005-08-121-1/+1
|
* Bug(s) fixed: 165827Rich Megginson2005-08-121-1/+3
| | | | | | | | | | | | | Bug Description: Daily Acceptance: Directory Install failed to register Directory server as a Red Hat server (81) Reviewed by: Nathan (Thanks!) Fix Description: The index code, in the replace case, was not checking to see if there were actually any values to delete before attempting to delete them. This fix just checks to see if there are any values to delete. Platforms tested: RHEL3 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing with the new indexing tests New Tests integrated into TET: none
* 164843 - Modified indexing to deal with attribute subtypesNathan Kinder2005-08-124-37/+171
|
* Bug(s) fixed: 165640Rich Megginson2005-08-111-1/+1
| | | | | | | | | | | Bug Description: Directory Server crashes when deleting a view Reviewed by: Nathan (Thanks!) Fix Description: Needed to pass in the _address_ of theCache.pCacheViews to views_cache_add_ll_entry. Yet another lesson in using the compiler to catch type errors rather than casting to void*. Platforms tested: RHEL3 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* Bug(s) fixed: 165600Rich Megginson2005-08-101-1/+1
| | | | | | | | | | | Bug Description: Adding multiple attributes using a single ldapmodify crashes ns-slapd Reviewed by: Nathan (Thanks!) Fix Description: In C, the array '[]' dereference operator takes precedence over the '*' deref operator. In this case, I needed to put parentheses around the pointer dereference to avoid having array dereferenced first. modary is a pointer to an array, not an array, so I can't dereference it with the array operator until I first dereference the pointer. Platforms tested: RHEL3 Flag Day: no Doc impact: no QA impact: should be covered by regular nightly and manual testing New Tests integrated into TET: none
* 164017 - Attribute uniqueness plugin now only checks for conflicts in ↵Nathan Kinder2005-08-011-2/+8
| | | | subtrees that the operation applies to
* PAM is not thread safe. Therefore, we must put the code that accesses PAMRich Megginson2005-07-153-0/+30
| | | | | in a critical section. This fix creates a mutex at init time and uses that mutex to create a critical section around all PAM API access.
* [147585] test plugin to verify the bug, the previous check in was not ↵Noriko Hosoi2005-06-241-0/+2
| | | | returning SUCCESS.
* Bug 160008Rich Megginson2005-06-144-1/+162
| | | | | | | Coding done by David Irving, Fred Brittain, and Aaron Gagnon Reviewed by Rich Megginson - minor changes to md5_pwd.c Tested on RHEL3 with FDS post-7.1 Does not include the OpenLDAP migration script - that will be handled separately
* Added testpreop_search to verify bug 147585Noriko Hosoi2005-06-098-11/+32
| | | | Plus fixed branding/version number.
* Fix bug 155276, crash if config has changed since restore.Thomas Lackey2005-05-241-3/+16
|
* Bug(s) fixed: 158549Rich Megginson2005-05-242-2/+2
| | | | | | | | | | | Bug Description: Reliab 05: chaining backend test core dumped on HPUX backend Reviewed by: Noriko (Thanks!) Fix Description: This is a 64 bit issue. For ber_scanf, the "i" and "e" flags require a pointer to a long. There were a couple of places in the chaining backend code where we were passing in an int instead. This works fine on 32 bit where ints and longs are both 32 bits. I did a quick check through the code - these were the only places not using longs. The only way you would see this bug is in a "hub" chaining backend - one that gets requests from a mux and chains them to another farm server, or possibly on a mux in certain conditions. Platforms tested: HP-UX 11.i 64 bit Flag Day: no Doc impact: no QA impact: rerun chaining tests New Tests integrated into TET: none
* Fix for #158253: add attributes to the exclusion list for fractional ↵David Boreham2005-05-202-0/+2
| | | | replication. Add an error string returned to clients if an illegal attribute is configured
* Only check the read only status of the consumer for the fractional case if ↵Rich Megginson2005-05-181-1/+2
| | | | the acquire process has been successful thus far.
* Correctly report in the repl agreement status attrs that the repl init ↵Rich Megginson2005-05-181-0/+1
| | | | failed when it failed due to attempting to do fractional replication to another master.
* Fix for 157919: perform fractional consumer check after acquiring the replicaDavid Boreham2005-05-171-16/+19
|
* Fixed object build path: convert relative path to absolute path (tlackey)svrbld2005-05-161-0/+7
|
* Fix for #157895 : logon hours doesn't workDavid Boreham2005-05-161-1/+2
|
* Memory Leak Fixes for Apache DSDavid Boreham2005-05-163-11/+139
|
* Fix for #157901 : FMR in windows sync agreement codeDavid Boreham2005-05-161-1/+2
|
* Modify NTDS and PassSync to build in the 'built' directory.Thomas Lackey2005-05-162-8/+8
|
* Add installer icons.Thomas Lackey2005-05-132-0/+0
|