1
0
mirror of https://github.com/samba-team/samba.git synced 2025-06-18 19:17:08 +03:00

4030 Commits

Author SHA1 Message Date
Jeremy Allison
7eeed8bb41 Allow server manager to close open files selected by id.
Jeremy.
2008-05-27 11:25:46 -07:00
Günther Deschner
017ad275e5 doserr: add WERR_REVISION_MISMATCH.
Guenther
2008-05-27 11:01:30 +02:00
Michael Adam
0a24c038b7 Remove unused function is_trusted_domain_situation().
This combined check has been replaced by is_dc_trusted_domain_situation()
which does not check for lp_allow_trusted_domains().

Michael
2008-05-26 16:42:25 +02:00
Michael Adam
a284c88435 Add function is_dc_trusted_domain_situation().
This is like is_trusted_domain_situation() except that it does not
check for lp_allow_trusted_domains().

Michael
2008-05-26 16:42:24 +02:00
Volker Lendecke
2dbbd81677 Move ber_[read|write]_OID_String protypes to proto.h 2008-05-25 13:53:43 +02:00
Volker Lendecke
17b0db20d2 Remove the reference to current_user_info from share_access.c
This required to pass around the domain a bit
2008-05-25 11:43:57 +02:00
Günther Deschner
7c93190843 drsuapi: add all code required for our drsuapi rpc client.
Guenther
2008-05-23 23:56:21 +02:00
Gerald W. Carter
b78b14c88e Manually merge Steven Danneman's patch for SPNEGO auth to a trusted
Win2008 domain (merged from v3-0-test).

   commit 8dc4e979776aae0ecaa74b51dc1eac78a7631405
   Author: Steven Danneman <sdanneman@isilon.com>
   Date:   Wed May 7 13:34:26 2008 -0700

      spnego SPN fix when contacting trusted domains

      cli_session_setup_spnego() was not taking into consideration the situation
      where we're connecting to a trusted domain, specifically one (like W2K8)
      which doesn't return a SPN in the NegTokenInit.

      This caused two problems:

      1) When guessing the SPN using kerberos_get_default_realm_from_ccache() we
      were always using our default realm, not the realm of the domain we're
      connecting to.

      2) When falling back on NTLMSSP for authentication we were passing the name
      of the domain we're connecting to for use in our credentials when we should be
      passing our own workgroup name.

      The fix for both was to split the single "domain" parameter into
      "user_domain" and "dest_realm" parameters.  We use the "user_domain"
      parameter to pass into the NTLM call, and we used "dest_realm" to create an SPN
      if none was returned in the NegTokenInit2 packet.  If no "dest_realm" is
      provided we assume we're connecting to our own domain and use the credentials
      cache to build the SPN.

      Since we have a reasonable guess at the SPN, I removed the check that defaults
      us directly to NTLM when negHint is empty.
2008-05-23 16:01:45 -05:00
Michael Adam
9971118c23 rpc_client: make rpc_pipe_open_tcp_port and rpc_pipe_get_tcp_port static.
Slim the interface...

Michael
2008-05-22 11:30:04 +02:00
Michael Adam
f7db445c82 rpc_client: use endpoint mapper to get the port for rpc_pipe_open_tcp().
Michael
2008-05-22 11:29:57 +02:00
Volker Lendecke
fe8f9e427a Compile endpoint mapper pidl output 2008-05-21 23:35:26 +02:00
Volker Lendecke
24ac40518f Add client support for NCACN_UNIX_STREAM 2008-05-21 23:35:25 +02:00
Volker Lendecke
be5d54a363 rpccli_schannel_bind_data only needs the schannel key 2008-05-21 23:35:25 +02:00
Volker Lendecke
2ff908a902 Rename rpc_pipe_client.tcp.sock to rpc_pipe_client.sock.fd 2008-05-21 23:35:24 +02:00
Tim Prouty
6b189dabc5 Cleanup size_t return values in callers of convert_string_allocate
This patch is the second iteration of an inside-out conversion to cleanup
functions in charcnv.c returning size_t == -1 to indicate failure.
2008-05-20 22:40:13 +02:00
Jeremy Allison
54556df561 Remove conn_find_byname now it's no longer used in
the msdfs.c code.
Jeremy
2008-05-19 17:19:18 -07:00
Michael Adam
ff7f0cad2e build: freeze proto.h
Michael
2008-05-18 22:58:07 +02:00
Volker Lendecke
93111ea0a1 Simplify fake_file logic 2008-05-16 23:18:50 +02:00
Volker Lendecke
368454a27c Remove "user" from connection_struct 2008-05-10 11:17:01 +02:00
Volker Lendecke
35438a9407 Add a comment explaining server_info in connection_struct 2008-05-10 11:17:01 +02:00
Volker Lendecke
2834dacc8d Remove the unix token info from connection_struct 2008-05-10 11:17:01 +02:00
Volker Lendecke
a3738aef59 Replace nt_user_token with server_info in connection_struct 2008-05-10 11:17:01 +02:00
Volker Lendecke
a34f735217 Next try at making the vuid cache circular
Jeremy, please check!
2008-05-10 11:17:00 +02:00
Volker Lendecke
0f53f9e7db Add "server_info" to connection_struct
This will replace all the user identity stuff in connection_struct, for now it
is just a source where the other fields in connection_struct are filled from.
2008-05-10 11:17:00 +02:00
Volker Lendecke
03944f8d89 Remove unused "force_group" from connection_struct 2008-05-10 11:17:00 +02:00
Kai Blin
1e9319cf88 net: Remove globals 2008-05-10 09:22:27 +02:00
Jeremy Allison
f487f742cb Yay ! Remove a VFS entry. Removed the set_nt_acl() call,
this can only be done via fset_nt_acl() using an open
file/directory handle. I'd like to do the same with
get_nt_acl() but am concerned about efficiency
problems with "hide unreadable/hide unwritable" when
doing a directory listing (this would mean opening
every file in the dir on list).
Moving closer to rationalizing the ACL model and
maybe moving the POSIX calls into a posix_acl VFS
module rather than having them as first class citizens
of the VFS.
Jeremy.
2008-05-08 18:09:07 -07:00
Volker Lendecke
b121a5acb2 Rename server_info->was_mapped to server_info->nss_token
"nss_token" from my point of view much better reflects what this flag actually
represents
2008-05-07 14:47:29 +02:00
Jeremy Allison
bb8f098cdf Merge branch 'v3-3-test' of ssh://jra@git.samba.org/data/git/samba into v3-3-test 2008-05-05 16:29:21 -07:00
Jeremy Allison
0a1fe8d601 Try and fix bug #5095, "Manage Documents privilege is not functional".
Should map the created sd to printer jobs, not printer.
Jerry please test and I'll add to 3.2 if it passes. Thanks,
Jeremy.
2008-05-05 16:24:52 -07:00
Volker Lendecke
425ca59cce Remove unused dir_status_struct 2008-05-05 22:53:09 +02:00
Volker Lendecke
420de03523 Remove "userdom_struct user" from "struct user_struct" 2008-05-05 18:28:59 +02:00
Volker Lendecke
74c88a4442 Remove "session_key" from "struct user_struct"
This one took a bit -- I hope I covered all data paths
2008-05-05 18:28:59 +02:00
Volker Lendecke
570a6b80fe Remove "guest" from "struct user_struct" 2008-05-05 18:28:59 +02:00
Volker Lendecke
aa2299d42a Remove the unix token info from "struct user_struct" 2008-05-05 18:28:58 +02:00
Volker Lendecke
51d5d512f2 Remove "nt_user_token" from "struct user_struct" 2008-05-05 18:28:58 +02:00
Volker Lendecke
b36fd84186 Remove "logon_script" from "struct user_struct" 2008-05-05 18:28:58 +02:00
Volker Lendecke
36bfd32f1f Remove unix_homedir from struct user_struct
This makes pdb_get_unix_homedir unused. I wonder if that was ever really used...
2008-05-05 18:28:58 +02:00
Volker Lendecke
41f9afd62d Remove "homedir" from "struct user_struct" 2008-05-05 18:28:58 +02:00
Volker Lendecke
32cd4bf34b pipes_struct->pipe_user_name is unused, remove it 2008-05-05 18:28:58 +02:00
Günther Deschner
d077ef64cd Fix client authentication with -P switch in client tools (Bug 5435).
Guenther
2008-05-05 16:59:53 +02:00
Volker Lendecke
559180f7d3 Remove connection_struct->mem_ctx, connection_struct is its own parent 2008-05-05 11:23:13 +02:00
Jeremy Allison
6bfb06ad95 Remove the "stat_open()" function, flag, and all associated code. It was only
being (correctly) used in the can_read/can_write checks for hide unreadable/unwritable
and this is more properly done using the functions in smbd/file_access.c.
Preparing to do NT access checks on all file access.
Jeremy.
2008-05-02 17:22:10 -07:00
Günther Deschner
2c41d69bcf ntlmssp: replace UNKNOWN_02000000 with NTLMSSP_NEGOTIATE_VERSION.
Guenther
2008-04-30 18:55:57 +02:00
Günther Deschner
b9ac03bdfa errors: add WERR_NOT_FOUND.
Guenther
2008-04-29 20:22:01 +02:00
Steven Danneman
f1a5405409 Fix bug 5419: memory leak in ads_do_search_all_args() when enumerating 1000s of entries
The ads_do_search_all_args() function attempts to string together several
LDAPMessage structures, returned across several paged ldap requests, into a
single LDAPMessage structure.  It does this by pulling entries off the second
LDAPMessage structure and appending them to the first via the OpenLDAP specific
ldap_add_result_entry() call.

The problem with this approach is it skips non-entry messages such as the
result, and controls.  These messages are leaked.

The short term solution as suggested by Volker is to replace the ads_*_entry()
calls with ads_*_message() calls so we don't leak any messages.

This fixes the leak but doesn't remove the dependence on the OpenLDAP specific
implementation of ldap_add_result_entry().
2008-04-26 08:11:20 -07:00
Günther Deschner
b11a5e70d3 errors: add WERR_INVALID_DOMAINNAME.
Guenther
2008-04-25 14:49:31 +02:00
Volker Lendecke
3433f430b0 Introduce a redirection for ncacn_np and ncacn_ip_tcp in rpc_pipe_client
Should be no functional change, just a change in the data structure
2008-04-25 11:12:52 +02:00
Volker Lendecke
f9bc336aff Make use of rpccli_xxx_bind_data 2008-04-25 11:12:51 +02:00
Volker Lendecke
42de50d2cd Move user/domain from rpc_pipe_client to cli_pipe_auth_data 2008-04-25 11:12:50 +02:00