1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-26 10:04:02 +03:00

17200 Commits

Author SHA1 Message Date
Jeremy Allison
de1e3f7a7a r17262: After messages from Metze and traces from Karolin Seeger,
turns out that EDQUOTA must map to NT_STATUS_DISK_FULL
for Windows apps to work correctly. My mistake.
Jeremy.
2007-10-10 11:38:23 -05:00
Gerald Carter
c152d20e90 r17260: remove extra ;SAMBA_3_0_23/source/utils/netlookup.c 2007-10-10 11:38:22 -05:00
Gerald Carter
87be77bf35 r17258: Cleanup the 'net ads help join' output and document createupn
and createcomputer options
2007-10-10 11:38:22 -05:00
Volker Lendecke
3ef34468b5 r17254: Simple flattening of an if-statement, no logic change.
Jeremy, I'm sure you will look at this nevertheless :-)

Volker
2007-10-10 11:38:22 -05:00
Jeremy Allison
f326bae3e2 r17249: Ensure we only set the FILE_WRITE_DATA on O_TRUNC
in one place.
Jeremy.
2007-10-10 11:38:22 -05:00
Jeremy Allison
8eed82d5d5 r17248: Ensure we definately add the WRITE_DATA on O_TRUNC.
Jeremy.
2007-10-10 11:38:22 -05:00
Jeremy Allison
d11e71ebcc r17247: When we map generic to specific we need to remember
to copy over the copy of the access_mask, open_access_mask.
Jerry - this is a definate fix for a 3.0.23b and should also
be on the patches page. CIFSFS breaks without this.
Jeremy.
2007-10-10 11:38:22 -05:00
Gerald Carter
dc4fec1f7d r17246: BUG 3964: lower case username prior to getpwnam() call in smbpasswd 2007-10-10 11:38:22 -05:00
Jeremy Allison
6ac3a4ce78 r17245: Second part of fix for #3962. Don't do a double
free in the infolevel2 case. Free both queue and
NT_PRINTER_INFO_LEVEL in the same place.
Jeremy.
2007-10-10 11:38:21 -05:00
Jeremy Allison
bb26412387 r17244: There were several error paths where NT_PRINTER_INFO_LEVEL
wasn't being freed - also one enum jobs case where the
NT_PRINTER_INFO_LEVEL and queue weren't being freed.
Strange that Coverity or Klokwork didn't pick these up.
Hopefully will fix #3962.
Jeremy.
2007-10-10 11:38:21 -05:00
Gerald Carter
42608b8bb9 r17242: BUG 3957: make sure to zero memory in the SRV hostlist in case there is not an A record for each SRV name 2007-10-10 11:38:21 -05:00
Gerald Carter
be12519fd8 r17239: BUG 3959: patch from William Charles <william@charles.name> to fix a segv in the DNS SRV lookups dur to calling rand() 2007-10-10 11:38:21 -05:00
Jeremy Allison
9c440925f8 r17234: Fix error mappings for EQUOTA and ENOBUFS.
Based on an idea from Shlomi Yaakobovich <Shlomi@exanet.com>.
Jeremy.
2007-10-10 11:38:21 -05:00
Volker Lendecke
736e55101b r17231: Some patch cosmetics 2007-10-10 11:38:21 -05:00
Volker Lendecke
2e400fb007 r17229: Indent-style reformatting -- getting used to the code again :-) 2007-10-10 11:38:20 -05:00
Volker Lendecke
640b4297a4 r17228: Modest reformatting 2007-10-10 11:38:20 -05:00
Jeremy Allison
89b83237b0 r17220: If we're going to fail a write with an errno, make
sure we return -1.
Jeremy.
2007-10-10 11:38:19 -05:00
Gerald Carter
41e30a9666 r17217: Fix a couple of "smbldap_open(): Cannot open when not root" bugs
when viewing or modifying local group membership.
2007-10-10 11:38:19 -05:00
Andrew Bartlett
bd3e06a0e4 r17216: From Kai Blin <kai.blin@gmail.com>:
A patch to make ntlm_auth recognize three new commands in
ntlmssp-client-1 and squid-2.5-ntlmssp:

The commands are the following:

Command: SF <hex number>
Reply: OK
Description: Takes feature request flags similar to samba4's
gensec_want_feature() call. So far, only NTLMSSP_FEATURE_SESSION_KEY,
NTLMSSP_FEATURE_SIGN and NTLMSSP_FEATURE_SEAL are implemented, using the same
values as the corresponding GENSEC_FEATURE_* flags in samba4.

Command: GF
Reply: GF <hex number>
Description: Returns the negotiated flags.

Command: GK
Reply: GK <base64 encoded session key>
Description: Returns the negotiated session key.

(These commands assist a wine project to use ntlm_auth for signing and
sealing of bulk data).

Andrew Bartlett
2007-10-10 11:38:19 -05:00
Volker Lendecke
4c4ae01c67 r17199: Add comment to the RID/SID miracle 2007-10-10 11:38:19 -05:00
Alexander Bokovoy
c005049043 r17198: Fix wins_nss dependencies 2007-10-10 11:38:19 -05:00
Volker Lendecke
f777b2d294 r17194: To run rpc-samba3-lsa in the build farm, we can't rely on geteuid()==0. Adapt
it to other "Am I root?" checks.

Jerry, Jeremy, please check this!

Thanks,

Volker
2007-10-10 11:38:19 -05:00
Volker Lendecke
41456b498a r17192: Make this actually survive valgrind. We NEED pidl here...
Maybe bzr is not such a bad idea, then you would probably see less spam on
samba-cvs, sorry for that... :-)

Volker
2007-10-10 11:38:19 -05:00
Volker Lendecke
32fbf66a4b r17191: Forgotten file, sorry! 2007-10-10 11:38:18 -05:00
Volker Lendecke
844c98eab4 r17190: Remove a warning from "opi", a 64-bit machine 2007-10-10 11:38:18 -05:00
Volker Lendecke
b185fb9fa6 r17188: Dump lsa_lookupsids3. I could not make it work at all against W2k3, the
rpc-lsa test even considers NT_STATUS_RPC_PROTSEQ_NOT_SUPPORTED not to be an
error.

Before someone re-activates this, show me a working sniff please :-)

Volker
2007-10-10 11:38:18 -05:00
Volker Lendecke
0b78da62f7 r17184: Attempt to get rid of some warnings on HP/UX. Without _XOPEN_SOURCE_EXTENDED
#defined getsockopt uses an int* as socklen parameter.

Volker
2007-10-10 11:38:18 -05:00
Gerald Carter
4e51cf34cf r17183: LsaLookupSids() shoudl return the string form of a SID when
it cannot be mapped and not the hex of the RID.  Who wrote that?
2007-10-10 11:38:18 -05:00
Jeremy Allison
2c82a159ae r17181: Fix the build farm RAW-READ bug. When making a copy
of the lock array in order to delete them individually
it's also important to make a copy of the *size* of
this array. Otherwise the unlock decrements the termination
index of your for loop :-). Doh ! Big thanks to Volker
for showing me how to set up the build farm to track
this one down. This is not a 3.0.23a issue.
Jeremy.
2007-10-10 11:38:18 -05:00
Jim McDonough
ca0c73f281 r17179: Merge the vl-posixacls tmp branch into mainline. It
modularizes our interface into the special posix API used on
the system. Without this patch the specific API flavor is
determined at compile time, something which severely limits
usability on systems with more than one file system. Our
first targets are AIX with its JFS and JFS2 APIs, at a later
stage also GPFS. But it's certainly not limited to IBM
stuff, this abstraction is also necessary for anything that
copes with NFSv4 ACLs. For this we will check in handling
very soon.

Major contributions can be found in the copyright notices as
well as the checkin log of the vl-posixacls branch. The
final merge to 3_0 post-3.0.23 was done by Peter Somogyi
<psomogyi@gamax.hu>
2007-10-10 11:38:17 -05:00
Volker Lendecke
f97f6cedff r17177: Get rid of a global variable by adding a private data pointer to
share_mode_forall().

Volker
2007-10-10 11:38:17 -05:00
Gerald Carter
1a58745886 r17162: Fix typo small typos noticed by Paul Green. 2007-10-10 11:38:17 -05:00
Gerald Carter
8ee22eeab5 r17159: Bug 3920: Restore wnibind use default domain behavior for domain groups.
This break local users and 'winbind nested groups' on domain members.
Cannot be helped.

My plans is to move the default domain crud to the client code (pam and
nss libraries) in 3.0.24.
2007-10-10 11:38:17 -05:00
Gerald Carter
75054e984e r17158: Add two new options to 'net ads join'
* createupn=[host_upn@realm]
  * createcomputer=<ou path top to bottom> (this was previously
    the only arg)
2007-10-10 11:38:17 -05:00
Jeremy Allison
11bab9d579 r17152: Don't handle the delete pending here, await
reschedule.
Jeremy.
2007-10-10 11:38:16 -05:00
Gerald Carter
3fea233802 r17151: revert a few accidental commits to the Makefile 2007-10-10 11:38:16 -05:00
Gerald Carter
bbe11b7a95 r17150: MMC User & group plugins fixes:
* Make sure to lower case all usernames before
  calling the create, delete, or rename hooks.
* Preserve case for usernames in passdb
* Flush the getpwnam cache after renaming a user
* Add become/unbecome root block in _samr_delete_dom_user()
  when trying to verify the account's existence.
2007-10-10 11:38:16 -05:00
Gerald Carter
1a7e81a4a8 r17149: Fail the join if we cannot set any SPNs for the machine account.
Disable the one we created and whine.
2007-10-10 11:38:16 -05:00
Gerald Carter
859c51cf25 r17148: the wins service should not accept any controls so that a GUI can grey it out as not remotely manageable 2007-10-10 11:38:16 -05:00
Gerald Carter
72bac13f21 r17147: Install fixes for libraries 2007-10-10 11:38:16 -05:00
Gerald Carter
36d4970646 r17146: Starting to cleanout my local tree some
* add code to lookup NS records (in prep for later coe that
  does DNS updates as part of the net ads join)
2007-10-10 11:38:15 -05:00
Jeremy Allison
12490fafc7 r17142: Ensure we record the correct can_read/can_write
from the client requested access mask.
Jeremy.
2007-10-10 11:38:15 -05:00
Jeremy Allison
3bcd52a475 r17140: Get rid of the lock release/reacquire code ! Turns out
that create dispositions that cause O_TRUNC break
oplocks. This simplifies the code - although we have
to keep separate the client requested access mask and
the access mask we actually use to open the file.
Jeremy.
2007-10-10 11:38:15 -05:00
Volker Lendecke
906720649b r17138: In preparation for the cluster merge, add an empty configure option :-)
Volker
2007-10-10 11:38:14 -05:00
Volker Lendecke
3482bb1ef5 r17136: Fix alignment on lsaquery. This broke in particular level 6, where the client
tried to figure out which role we are.

Needs to go into 23a.

Thanks to Karolin for insisting and setting up the test case :-)

Volker
2007-10-10 11:38:14 -05:00
Volker Lendecke
40e2679811 r17134: Fix a debug message 2007-10-10 11:38:14 -05:00
Jeremy Allison
788aa15ea2 r17131: Optimisation - when doing a stat open don't open the
file unless we really have to (ie. O_CREAT and file
doesn't exist).
Jeremy.
2007-10-10 11:38:14 -05:00
Jeremy Allison
b3b5aec0ee r17130: Remove unneeded unlock call.
Jeremy.
2007-10-10 11:38:14 -05:00
Jeremy Allison
b7374835e6 r17128: Missed a logic error in my last patch. Ensure we deal with any
oplocks that were granted when we had released the lock. Fix
strange case where stat open grants a batch oplock on file
create, but grants no oplock on file open.
Jeremy.
2007-10-10 11:38:14 -05:00
Jeremy Allison
8171c4c404 r17125: Drastic problems require drastic solutions. There's
no way to get all the cases where kernel oplocks are
on and we can't open the file and get the correct
semantics (think about the open with truncate with
an attribute only open - we'd need a vfs change to
add the truncate(fname, len) call). So always drop
the share mode lock before doing any real fd opens and
then re-acquire it afterwards. We're already dealing
with the race in the create case, and we deal with
any other races in the same way. Volker, please
examine *carefully* :-). This should fix the problems
people reported with kernel oplocks being on.
Jeremy.
2007-10-10 11:38:13 -05:00