1
0
mirror of https://github.com/samba-team/samba.git synced 2025-02-10 13:57:47 +03:00

1729 Commits

Author SHA1 Message Date
Gerald Carter
f0a1c6b9ce r8027: driver information is now back via winreg 2007-10-10 10:58:09 -05:00
Günther Deschner
1f17b4f45e r8019: Better give a hint that we are failing share-manipulation due to missing
scripts.

Guenther
2007-10-10 10:58:08 -05:00
Gerald Carter
0d6352da48 r7995: * privileges are local except when they're *not*
printmig.exe assumes that the LUID of the SeBackupPrivlege
  on the target server matches the LUID of the privilege
  on the local client.  Even though an LUID is never guaranteed
  to be the same across reboots.  How *awful*!  My cat could
  write better code! (more on my cat later....)

* Set the privelege LUID in the global PRIVS[] array

* Rename RegCreateKey() to RegCreateKeyEx() to better match MSDN

* Rename the unknown field in RegCreateKeyEx() to disposition
  (guess according to MSDN)

* Add the capability to define REG_TDB_ONLY for using the reg_db.c
  functions and stress the RegXXX() rpc functions.
2007-10-10 10:58:07 -05:00
Gerald Carter
7764e8a677 r7987: map generic bits to specific bits in open requests 2007-10-10 10:58:06 -05:00
Jeremy Allison
12ff297829 r7981: MS-DFS tidyup patches from James Peach <jpeach@sgi.com>.
Looking forward to the day he can commit these himself :-).
Jeremy.
2007-10-10 10:58:06 -05:00
Gerald Carter
63b81ad3cb r7938: * move the hardcoded registry value names from _reg_query_value()
to a thin layer in fetch_reg_values().  Not entirely efficient
  seeing as the the dynamic value paths are stored in an unsorted
  array but it is one strequal() per path.  If this was really big
  it should be worked into the reghook_cache().
2007-10-10 10:58:03 -05:00
Gerald Carter
3d837e58db r7908: * change REGISTRY_HOOK api to use const (fix compiler warning
in init_registry_data()
* Add means of storing registry values in registry.tdb
* add builtin_registry_values[] array for REG_DWORD and REG_SZ
  values needed during startup
* Finish up RegDeleteValue() and RegSetValue()
* Finish up regdb_store_reg_values() and regdb_fetch_reg_values()

I can now create and retrieve values using regedit.exe on Win2k.

bin/net -S rain -U% rpc registry enumerate 'hklm\software\samba'
Valuename  = Version
Type       = REG_SZ
Data       = 3.0.20

Next is to do the virtual writes in reg_printing.c and I'll be
done with Print Migrator (yeah!  finally)
2007-10-10 10:58:03 -05:00
Gerald Carter
71eb018a05 r7890: * add Reg[SG]etKeySec() server stubs
* merge a compile warning fix from trunk to SAMBA_3_0
2007-10-10 10:58:01 -05:00
Jeremy Allison
9506b8e145 r7882: Looks like a large patch - but what it actually does is make Samba
safe for using our headers and linking with C++ modules. Stops us
from using C++ reserved keywords in our code.
Jeremy
2007-10-10 10:58:00 -05:00
Gerald Carter
6ff0fa0b43 r7880: fix a typo and memleak on failures cases (patch from marcin) 2007-10-10 10:58:00 -05:00
Gerald Carter
d50f0ba07e r7878: mostly just a rename of REG_INFO to REG_QUERY_VALUE for better clarity 2007-10-10 10:58:00 -05:00
Volker Lendecke
61585fa56b r7836: Fix the bug where users show up as trusting domains.
Volker
2007-10-10 10:57:58 -05:00
Jeremy Allison
475d5a277d r7708: Hint from Luke Howard (thanks Luke). Ensure the schannel authenticator is 8
byte aligned, just like the NTLMSSP ones. Trying to fix 64-bit Windows domain
logon.
Jeremy.
2007-10-10 10:57:20 -05:00
Gerald Carter
91b81a23b8 r7698: * clean upserver frontend for RegDeleteKey()
* implement RegDeleteKey() for reg_db backend
2007-10-10 10:57:19 -05:00
Gerald Carter
e188fdbef8 r7691: * add .gdbinit to the svn:ignore files
* start adding write support to the Samba registry
  Flesh out the server implementations of
  RegCreateKey(), RegSetValue(), RegDeleteKey() and RegDeleteValue()

I can create a new key using regedit.exe now but the 'New Key #1'
key cannot be deleted yet.
2007-10-10 10:57:19 -05:00
Gerald Carter
2f08a904ee r7664: add access check hooks to _reg_open_entry which are passed off
to the reg_XXX backend.  If the backend does not define
a regkey_access_check() function, we default to using the
standard registry_access_check()
2007-10-10 10:57:19 -05:00
Gerald Carter
023728c059 r7649: * fix compile breakage (sorry, should have done a make clean before the
last checking).
* rename unknown field in REG_GETVERSION
* add server stubs for RegDeleteKey() and RegDeleteValue()
2007-10-10 10:57:18 -05:00
Gerald Carter
867fd3052b r7648: adding REGISTRY_HOOK->reg_access_check() for authprization checks on RegOpenKey(); passing it off to the backend code for a given path 2007-10-10 10:57:18 -05:00
Gerald Carter
23acef44e9 r7647: add access checks to the top level hive open calls; will need to pass the open request through the backend access check for the subkey open calls 2007-10-10 10:57:18 -05:00
Gerald Carter
ce82566bad r7645: adding server stubs for RegCreateKey() and RegSetValue() 2007-10-10 10:57:18 -05:00
Gerald Carter
707b782228 r7624: * removed unmatched tdb_lock_by_string() call (should fix build farm issues)
* comment out services.tdb code until I finish rewriting it
2007-10-10 10:57:17 -05:00
Gerald Carter
c98e17446a r7614: convert move_driver_to_download_area() to return WERROR in order to provide better error messages to clients when a AddPrinterDriver[Ex]() call fails 2007-10-10 10:57:16 -05:00
Gerald Carter
dafb32c01f r7613: small changes to _svcctl_open_service() and create_open_service_handle() to prevent invalid service names from being accepted; printmig.exe now migrates drivers successfully 2007-10-10 10:57:16 -05:00
Gerald Carter
f19c10d0c3 r7610: can successfully stop and start the 'spooler' service by setting the state for the 'disable spoolss' parameter in memory for an individual smbd 2007-10-10 10:57:16 -05:00
Günther Deschner
2e5cb531ab r7606: add WERR_NET_NAME_NOT_FOUND. This is what windows returns when
trying to manipulate non-existing shares.

Guenther
2007-10-10 10:57:15 -05:00
Gerald Carter
793d28a946 r7603: * fix a bug in the SERVICE_ALL_ACCESS security mask
* add calls to start and stop a service (to be filled
  in by the backend routines in services/svc_*.c
2007-10-10 10:57:15 -05:00
Gerald Carter
2b0ea30a1a r7595: start trying to split out the svcctl functions into separate files for better maintenance; add SERVICE_CONTROL_OPS for spoolss service 2007-10-10 10:57:15 -05:00
Gerald Carter
82b76d4b34 r7583: * more rearranging and renaming of functions
* add access checks to _svcctl_XXX() calls based on
  the access granted on the handle
2007-10-10 10:57:15 -05:00
Gerald Carter
55d0831103 r7581: fix bad merge 2007-10-10 10:57:14 -05:00
Gerald Carter
643dc05eb5 r7578: use global well known DOM_SID objects when possible 2007-10-10 10:57:14 -05:00
Gerald Carter
11902e503e r7576: implement access checks for open_scm and open_service
according to default security descriptor described in MSDN.

no one can get in to due to the permissions, but i'll fix
that next.
2007-10-10 10:57:14 -05:00
Gerald Carter
24b369d12f r7573: you can't make an omlette without break a few eggs....start reworking the svcctl code 2007-10-10 10:57:14 -05:00
Gerald Carter
560ce111ce r7563: svcctl patches from Marcin; have cleaned up formating and am checking the code in to snapshot it before I start changing more things 2007-10-10 10:57:14 -05:00
Gerald Carter
ffc7bd87d8 r7547: removing unused fields in the REGISTRY_KEY structure associated with open handles 2007-10-10 10:57:13 -05:00
Gerald Carter
a112c5570a r7440: * merge registry server changes from trunk (so far) for more
printmig.exe work
* merge the sys_select_signal(char c) change from trunk
  in order to keeo the winbind code in sync
2007-10-10 10:57:09 -05:00
Jeremy Allison
877e0a61f5 r7385: Rewrite the RPC bind parsing functions to follow the spec. I haven't yet
tested this so I may have screwed this up - however it now follows the
DCE spec. valgrinded tests to follow....
Jeremy.
2007-10-10 10:57:07 -05:00
Volker Lendecke
c25b4afda2 r7217: Only allow schannel connections if a successful Auth2 has been done
before. Things tested: Domain join and subsequent interactive and network
logon to NT4, W2kSP and XPSP2 workstations and a NT4 domain trusting us. Right
now I've got problems with my W2k3 domain trusts. So this needs testing,
although I'm really confident that this does not break.

Volker
2007-10-10 10:57:05 -05:00
Gerald Carter
9727d05241 r7139: trying to reduce the number of diffs between trunk and 3.0; changing version to 3.0.20pre1 2007-10-10 10:57:02 -05:00
Gerald Carter
318c3db4cb r7130: remove 'winbind enable local accounts' code from the 3.0 tree 2007-10-10 10:57:01 -05:00
Gerald Carter
81ffb0dbbb r6942: * merging the registry changes back to the 3.0 tree
* removing the testprns tool
2007-10-10 10:56:57 -05:00
Jeremy Allison
482f7e0e37 r6890: Refactor printing interface to take offset into job. Fixes bug
where large print jobs can have out-of-order offsets. Bug found
by Arcady Chernyak <Arcady.Chernyak@efi.com>
Jeremy.
2007-10-10 10:56:56 -05:00
Volker Lendecke
88a67e96d1 r6772: Fix a valgrind error for samr_open_alias uncovered by one of John's test.
Jerry, in query_aliasmem, set_aliasinfo and set_groupinfo (and possibly
others) need become_root()/unbecome_root() around the pdb calls. I'm not sure
I would do the access checks correctly, I would much rather leave that to
you.

Volker
2007-10-10 10:56:54 -05:00
Gerald Carter
a71e104af8 r6680: event log patches from Marcin 2007-10-10 10:56:51 -05:00
Gerald Carter
80da9ca386 r6679: BUG 2684: abartlett's patch for check the per service hosts allow/deny on printers when connecting via MS-RPC 2007-10-10 10:56:51 -05:00
Gerald Carter
611cca473e r6642: BUG 2686: shouold fix the group_setinfo() failures; similar to alias_setinfo() patch from last week 2007-10-10 10:56:49 -05:00
Gerald Carter
c43c1ec80c r6601: fixing query and set alias info calls (level 1 from the
MMC manage computer plugin.
2007-10-10 10:56:46 -05:00
Jeremy Allison
316df944a4 r6595: This is Volkers new-talloc patch. Just got the go-ahead from
Volker to commit. Woo Hoo !
Jeremy.
2007-10-10 10:56:46 -05:00
Gerald Carter
4615c96ccb r6566: fix a couple of local group bugs.
* ensure that we set full access on the handle
  returned from _samr_create_dom_alias() so that
  future set_alias commands succeed

* fix bug when looking for internal domains in winbindd
  (caused winbindd_getgrgid() for local groups to fail).
2007-10-10 10:56:45 -05:00
Volker Lendecke
f6e2730510 r6536: Jeremy, did you actually test this part of revision 801? I just tested that
Windows 2003 returns "4 (Local Group)" for

rpcclient -c 'lookupnames "System Operators"'

Before #ifdef'ing that out again I would like to see a sniff how you get a "5"
(WKN_GRP) out of lsa_lookupnames.

Volker
2007-10-10 10:56:44 -05:00
Gerald Carter
0ac57ae942 r6421: use add machine script when creating a user (ACB_NORMAL)
who has a name ending in '$' (usrmgr.exe does this for
domain trusts (that's was jfm's original comment I think).

avoid an assert() call in libldap.
2007-10-10 10:56:41 -05:00