| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
The width of time in changelog is always 4 bytes.
|
|
|
|
|
|
| |
file, -c -- changelog file) for any type of files, which could sometimes crashes the command. To prevent it, introduced a simple file type checker and reset the file type if it does not match the real type.
2) key search was not working when the key has multiple values.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bug Description: customer requests that the server warns that the files are missing (the current errors are generic about being unable to retrieve server-cert)
Reviewed by: Nathan and Noriko (Thanks!)
Files: ssl.c
Branch: HEAD
Fix Description: Basically just check to see if the specified files are readable. If not, check for newer versions e.g. if the customer hasn't changed the cert filename from *-cert7.db to *-cert8.db yet. Also threw in key4.db in case that changes in the future (not likely). Log a warning if the files do not exist (most likely the server will fail to start in this case).
Platforms tested: RHEL3
Flag Day: no
Doc impact: no, I don't think so
QA impact: should be covered by regular nightly and manual testing
New Tests integrated into TET: none
|
| |
|
|
|
|
|
|
|
|
| |
options
1) if "max length of dumpled id list" is larger than 1 MB, it reduces it to 1 MB.
2) if "max length of dumpled id list" is less than 40B, it increases it to 40B.
3) if the idl is not dumpled in the MAX_BUFFER size buffer, it repeats till the dump is done.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
Bug Description: Many operations use write_audit_log_entry to write to the audit log. These functions build a string buffer to write to the audit log. The only problem is, they never check to see if audit logging is enabled until after all of this work has been done. write_audit_log_entry should check right away to see if logging is enabled. Should save some time for write operations.
Reviewed by: Noriko (Thanks!)
Fix Description: The code in auditlog.c is called for every update operation, and in many cases a lot of work is done before it is even known if audit logging is enabled. Perhaps this was because there was no function that could be called outside of the logging code to see if audit logging is enabled. I added config_get_auditlog_logging_enabled() and used it in auditlog.c to skip the code altogether if audit logging is disabled (the default).
Platforms tested: RHEL3
Flag Day: no
Doc impact: no, the functions are in the private API
QA impact: should be covered by regular nightly and manual testing
New Tests integrated into TET: none
|
| |
|
|
|
|
|
|
|
|
|
|
| |
1) Brandx -> Fedora
2) Pick up new internal component set (Admin SDK, Setup SDK, Admin Server)
3) Use JRE from the Admin Server package
4) Docs
a) Componentize Docs
b) Rebrand Docs
c) Drop packaging Administration Guide in the external version
|
|
|
|
|
|
|
|
|
|
|
| |
Bug Description: Various valgrind reported problems. Mostly not serious, but a few which could cause bad leaks in certain situations.
Reviewed by: Rob and David (Thanks!)
Fix Description: Mostly added frees where needed, or moved things around to make sure the proper free was called. I also fixed the formatting/spacing.
Platforms tested: RHEL3
Flag Day: no
Doc impact: No.
QA impact: should be covered by regular nightly and manual testing
New Tests integrated into TET: none
|
| |
|
| |
|
|
|
|
|
|
| |
Updated Files:
component_versions.mk components.mk internal_comp_deps.mk ldap/cm/Makefile
ldap/servers/slapd/sasl_io.c ldap/servers/slapd/saslbind.c
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
strlen, removing some dead code, other odds and ends.
|
|
|
|
| |
sync plus associated UI
|
|
|
|
| |
than 100 characters in total.
|
| |
|
| |
|
|
|
|
| |
warnings on Linux; remove pam_passthru from DS 7.1
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
CYRUS_SASL is undef'ed both in saslbind.c and sasl_io.c, which should be defined once Cyrus sasl library is pushed to /s/b/c.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Rename pwpolicy_make_response_control slapi_pwpolicy_make_response_control
|
|
|
|
|
|
|
|
|
|
|
| |
Bug Description: The TARGET dn is normalized before the search plugins get the DN. We should provide the original DN. For all other operations we pass in the SLAPI_ORIGINAL_TARGET_DN in the pblock - we can do the same for search as well. This bug was reported by Verisign.
Reviewed by: Noriko (Thanks!)
Fix Description: Use the pblock param SLAPI_ORIGINAL_TARGET_DN for search operations.
Platforms tested: RHEL3
Flag Day: no
Doc impact: Yes. Need to document this in the SLAPI doc.
QA impact: should be covered by regular nightly and manual testing
New Tests integrated into TET: none
|