]> git.ipfire.org Git - thirdparty/samba.git/log
thirdparty/samba.git
16 years agoCheck for the right error return value
Derrell Lipman [Sat, 14 Feb 2009 14:42:59 +0000 (09:42 -0500)] 
Check for the right error return value

16 years agoEnable total anonymization in vfs_smb_traffic_analyzer, by mapping any user names...
Holger Hetterich [Wed, 4 Feb 2009 14:31:24 +0000 (15:31 +0100)] 
Enable total anonymization in vfs_smb_traffic_analyzer, by mapping any user names to the one given by anonymize_prefix, without generating a hash number. This setting is optional and is compatible with the module configuration format of Samba 3.3.

16 years agoParameterize in local.h the MAX_RPC_DATA_SIZE, and ensure
Jeremy Allison [Sat, 14 Feb 2009 00:04:15 +0000 (16:04 -0800)] 
Parameterize in local.h the MAX_RPC_DATA_SIZE, and ensure
that "offered" read from the rpc packet in spoolss is under
that size. Tidyup from analysis from Veracode.
Jeremy.

16 years agoNoted by Vericode analysis. Correctly use chroot().
Jeremy Allison [Fri, 13 Feb 2009 23:08:57 +0000 (15:08 -0800)] 
Noted by Vericode analysis. Correctly use chroot().
Jeremy.

16 years agoFix Coverity ID 740 (RESOURCE_LEAK)
Volker Lendecke [Fri, 13 Feb 2009 20:52:21 +0000 (21:52 +0100)] 
Fix Coverity ID 740 (RESOURCE_LEAK)

16 years agoFix Coverity IDs 879 and 880 (RESOURCE_LEAK, REVERSE_INULL)
Volker Lendecke [Fri, 13 Feb 2009 18:06:39 +0000 (10:06 -0800)] 
Fix Coverity IDs 879 and 880 (RESOURCE_LEAK, REVERSE_INULL)

16 years agoFix Coverity ID 742 (RESOURCE_LEAK)
Volker Lendecke [Fri, 13 Feb 2009 17:58:35 +0000 (09:58 -0800)] 
Fix Coverity ID 742 (RESOURCE_LEAK)

16 years agoFix Coverity ID 744
Volker Lendecke [Fri, 13 Feb 2009 17:53:56 +0000 (09:53 -0800)] 
Fix Coverity ID 744

This was marked as a resource leak. This change makes the code a bit clearer
that we always free error_string.

16 years agos3:auth: only create_local_token() should add S-1-22-X-Y sids
Stefan Metzmacher [Wed, 11 Feb 2009 10:47:41 +0000 (11:47 +0100)] 
s3:auth: only create_local_token() should add S-1-22-X-Y sids

metze
(cherry picked from commit e7f7ed8bf6281ef01aca53ea44acdd4af4c51aa7)

16 years agos3:auth: add S-1-22-X-Y sids to the local token
Stefan Metzmacher [Wed, 11 Feb 2009 10:46:18 +0000 (11:46 +0100)] 
s3:auth: add S-1-22-X-Y sids to the local token

metze
(cherry picked from commit f14e4d4e54f424c05147cb0e635c9b8930270262)

16 years agoFix Coverity ID 745 (RESOURCE_LEAK)
Volker Lendecke [Fri, 13 Feb 2009 10:18:31 +0000 (11:18 +0100)] 
Fix Coverity ID 745 (RESOURCE_LEAK)

16 years agoFix double free caused by incorrect talloc_steal usage.
Dan Sledz [Thu, 12 Feb 2009 20:02:43 +0000 (12:02 -0800)] 
Fix double free caused by incorrect talloc_steal usage.

16 years ago[Bug 6069] Add a fstatvfs function for libsmbclient
Derrell Lipman [Thu, 12 Feb 2009 14:16:48 +0000 (09:16 -0500)] 
[Bug 6069] Add a fstatvfs function for libsmbclient

- DFS is not a POSIX feature, so the state of that bit should be zero if DFS
  is *not* supported. Bit feature reversed.

- Added smbc_statvfs function

Derrell

16 years agoFix bug #6098 - When the DNS server is invalid, the ads_find_dc() does not work corre...
Yasuma Takeda [Wed, 11 Feb 2009 22:36:51 +0000 (14:36 -0800)] 
Fix bug #6098 - When the DNS server is invalid, the ads_find_dc() does not work correctly with "security = domain"

1. If DNS server is invalid, the get_sorted_dc_list() is called with
realm(FQDN) and it fails.
2. On the next step, the get_sorted_dc_list() is called with realm(FQDN) again.

I think "again" is wrong place.
On the 2nd step, get_sorted_dc_list() should be called with realm(WORKGROUP).

16 years agos3:packaging: fix parsing of include.h in fill-templates
Michael Adam [Wed, 11 Feb 2009 21:27:48 +0000 (22:27 +0100)] 
s3:packaging: fix parsing of include.h in fill-templates

The content has changed slightly in master for the merged build,
and we must be more exact when parsing the lines.

Michael

16 years agos3:packaging: fix path to calling update-pkginfo after pushd in fill-templates
Michael Adam [Wed, 11 Feb 2009 21:25:41 +0000 (22:25 +0100)] 
s3:packaging: fix path to calling update-pkginfo after pushd in fill-templates

Michael

16 years agos3:packaging: paths cosmetics in fill-templates
Michael Adam [Wed, 11 Feb 2009 21:24:52 +0000 (22:24 +0100)] 
s3:packaging: paths cosmetics in fill-templates

Michael

16 years agoenable IPv6 support for NetBSD, FreeBSD
Björn Jacke [Wed, 11 Feb 2009 15:34:02 +0000 (16:34 +0100)] 
enable IPv6 support for NetBSD, FreeBSD

most systems include netinet/in.h via netdb.h but *BSD don't.

16 years agos3:build: some implementations of "ln" are picky about the order of arguments
Michael Adam [Wed, 11 Feb 2009 10:02:57 +0000 (11:02 +0100)] 
s3:build: some implementations of "ln" are picky about the order of arguments

Michael

16 years agoFix resume handle for _samr_EnumDomainGroups
Volker Lendecke [Wed, 11 Feb 2009 03:08:46 +0000 (19:08 -0800)] 
Fix resume handle for _samr_EnumDomainGroups

16 years agopackaging: make update-pkginfo callable from any directory
Michael Adam [Tue, 10 Feb 2009 22:52:40 +0000 (23:52 +0100)] 
packaging: make update-pkginfo callable from any directory

Michael
(cherry picked from commit 7ea90835ebf6e2f2c6f325760800d8361d087ede)

16 years agopackaging: use "find" instead of "du" to find files... :-)
Michael Adam [Fri, 12 Sep 2008 13:07:00 +0000 (15:07 +0200)] 
packaging: use "find" instead of "du" to find files... :-)

Michael
(This used to be commit 768aa82361a2c4b0aab71433b7593723a2868f0a)
(cherry picked from commit fd7635a1161e25d88a8252a5cf9de70ca2fe4232)

16 years agopackaging: remove commented out stuff from update-pkginfo
Michael Adam [Tue, 10 Feb 2009 22:50:14 +0000 (23:50 +0100)] 
packaging: remove commented out stuff from update-pkginfo

Michael
(cherry picked from commit d714e58ec1f74897cd13e7cd9dd9003600052b45)

16 years agopackaging: don't clutter the output of fillup-templates with popd output
Michael Adam [Tue, 10 Feb 2009 22:31:52 +0000 (23:31 +0100)] 
packaging: don't clutter the output of fillup-templates  with popd output

Michael
(cherry picked from commit 0c711935d30b500a15ef06fd658d382b2c1e2c84)

16 years agopackaging: fix fill-templates call to update-pkginfo to pushd appropriately first
Michael Adam [Tue, 10 Feb 2009 22:30:48 +0000 (23:30 +0100)] 
packaging: fix fill-templates call to update-pkginfo to pushd appropriately first

Michael
(cherry picked from commit c28d4ae537d9fc0b76eae758d32356eaf1113c89)

16 years agopackaging: add script fill-templates
Michael Adam [Tue, 10 Feb 2009 17:54:16 +0000 (18:54 +0100)] 
packaging: add script fill-templates

This is a standalone-wrapper for update-pkginfo, which is
usually called from create-tarball. It basically repeats
some functionality of create-tarball.

Michael
(cherry picked from commit ca23469a906bab690162184e8d3949897f7b5a67)

16 years ago[Bug 6069] Add a fstatvfs function for libsmbclient
Derrell Lipman [Tue, 10 Feb 2009 20:03:32 +0000 (15:03 -0500)] 
[Bug 6069] Add a fstatvfs function for libsmbclient

- Fill in the remainder of the data (or at least as much as we can get) for
  the fstatvfs return value.

Derrell

16 years ago[Bug 6069] Add a fstatvfs function for libsmbclient
Derrell Lipman [Tue, 10 Feb 2009 15:28:32 +0000 (10:28 -0500)] 
[Bug 6069] Add a fstatvfs function for libsmbclient

- Reverse the sense of the flags. Since the fstatvfs() function on POSIX-like
  systems would almost certainly indicate case sensitivity (for example),
  leave the bit turned off if the result is the POSIX-like result just as if
  issued on a typical local file system on a POSIX system.

Derrell

16 years agos3-spoolss: fix memleak in get_remote_printer_publishing_data().
Günther Deschner [Tue, 10 Feb 2009 09:59:34 +0000 (10:59 +0100)] 
s3-spoolss: fix memleak in get_remote_printer_publishing_data().

Guenther

16 years ago[Bug 6069] Add a fstatvfs function for libsmbclient
Derrell Lipman [Tue, 10 Feb 2009 03:46:29 +0000 (22:46 -0500)] 
[Bug 6069] Add a fstatvfs function for libsmbclient

- Complete the implementation of the f_flag field. We now return a flag
  indicatin UNIX CIFS, CASE SENSITIVE, and/or DFS support.

Derrell

16 years agoRevert "s3:winbindd_user: create domain connection in winbindd_fill_pwent if necessary."
Michael Adam [Mon, 9 Feb 2009 22:26:36 +0000 (23:26 +0100)] 
Revert "s3:winbindd_user: create domain connection in winbindd_fill_pwent if necessary."

This reverts commit 3981603761a1cc6fb74ff135fadf4ab3340be1c5.

I was confused about the real meaning of find_domain_from_name_noinit()
vs. find_domain_from_name(). We don't need the connection established
here, just the domain struct which gets initialized by rescan_trusted_domains().

Sorry for the noise.

Michael

16 years agodocs: Add man sharesec.
Karolin Seeger [Mon, 9 Feb 2009 20:00:47 +0000 (21:00 +0100)] 
docs: Add man sharesec.

Karolin
(cherry picked from commit cc51cbc862055975bcef016876662576b00e72ef)

16 years ago[Bug 6069] Add a fstatvfs function for libsmbclient
Derrell Lipman [Mon, 9 Feb 2009 17:41:29 +0000 (12:41 -0500)] 
[Bug 6069] Add a fstatvfs function for libsmbclient

- Add initial test implementation. This works on a Linux client to determine
  whether a connection's server supports UNIX CIFS. I'm eager to see what the
  build farm has to say about this, specifically how many, if any, hosts don't
  provide a statvfs.h file with the requisite struct statvfs.

Derrell

16 years agos3:winbindd_user: create domain connection in winbindd_fill_pwent if necessary.
Michael Adam [Mon, 9 Feb 2009 12:50:31 +0000 (13:50 +0100)] 
s3:winbindd_user: create domain connection in winbindd_fill_pwent if necessary.

Calling find_domain_from_name_noinit() might not be enough here.
This makes winbindd_getpwent() behave the same as winbindd_getgrent().

Michael

Signed-off-by: Michael Adam <obnox@samba.org>
16 years agos3:winbindd_user: fix a debug message.
Michael Adam [Mon, 9 Feb 2009 10:07:11 +0000 (11:07 +0100)] 
s3:winbindd_user: fix a debug message.

find_domain_from_name_noinit() is no longer called only for
name alias support.

Michael

Signed-off-by: Michael Adam <obnox@samba.org>
16 years agoFix coverity ID 876 (FORWARD_NULL)
Volker Lendecke [Sat, 7 Feb 2009 10:09:45 +0000 (11:09 +0100)] 
Fix coverity ID 876 (FORWARD_NULL)

Michael, please check!

Signed-off-by: Michael Adam <obnox@samba.org>
16 years agoFix count in _srvsvc_NetDiskEnum()
Volker Lendecke [Mon, 9 Feb 2009 11:32:16 +0000 (12:32 +0100)] 
Fix count in _srvsvc_NetDiskEnum()

Without this, remotely adding a share via MMC fails
(cherry picked from commit 197b4c42bbf53347f4953e39099192693d709a7d)

16 years agos3-rpcclient: fix getform command asprintf return code.
Günther Deschner [Sun, 8 Feb 2009 23:06:36 +0000 (00:06 +0100)] 
s3-rpcclient: fix getform command asprintf return code.

Guenther

16 years agoeliminate compiler warnings
Derrell Lipman [Mon, 9 Feb 2009 03:07:25 +0000 (22:07 -0500)] 
eliminate compiler warnings

16 years agomount.cifs: initialize rc to 0 in main
Jeff Layton [Fri, 6 Feb 2009 13:31:45 +0000 (08:31 -0500)] 
mount.cifs: initialize rc to 0 in main

The value of rc in main() isn't initialized in the declaration. This
wasn't a problem before, but Shirish's fakemount patch can make it so
that we return the uninitialized variable if the -n flag is used.

Fix this by initializing rc to 0.

Signed-off-by: Jeff Layton <jlayton@redhat.com>
16 years agomount.cifs: add fakemount (-f) and nomtab (-n) flags to mount.cifs
Shirish Pargaonkar [Fri, 6 Feb 2009 13:15:35 +0000 (08:15 -0500)] 
mount.cifs: add fakemount (-f) and nomtab (-n) flags to mount.cifs

...so that these options work correctly when passed in by mount(8).

16 years agos3:net conf: remove check for sharename being a usernam in "net conf addshare"
Michael Adam [Fri, 6 Feb 2009 09:42:11 +0000 (10:42 +0100)] 
s3:net conf: remove check for sharename being a usernam in "net conf addshare"

This is useless and can be overriden by "net conf setparm" anyways.

Michael

16 years agodocs: fix two typos in the mount.cifs manpage
Michael Adam [Thu, 5 Feb 2009 21:19:58 +0000 (22:19 +0100)] 
docs: fix two typos in the mount.cifs manpage

Michael
(cherry picked from commit 145fe37766cf1ecffb16a03b58b44d08f7ed7558)

Signed-off-by: Michael Adam <obnox@samba.org>
16 years agodocs: Clarify "ldap ssl" description in man smb.conf.
Karolin Seeger [Fri, 6 Feb 2009 08:41:21 +0000 (09:41 +0100)] 
docs: Clarify "ldap ssl" description in man smb.conf.

Mention "ldap ssl ads".

Karolin
(cherry picked from commit 61f1747441ff43c1d9c99bbf69e218c1984834c7)

16 years agodocs: Add description of "ldap ssl ads" to man smb.conf.
Karolin Seeger [Fri, 6 Feb 2009 08:10:15 +0000 (09:10 +0100)] 
docs: Add description of "ldap ssl ads" to man smb.conf.

Karolin
(cherry picked from commit 02f13538f00cc8368e3e5e8e510bac468c21089b)

16 years agoDon't try and delete a default ACL from a file.
Günter Kukkukk [Fri, 6 Feb 2009 02:59:03 +0000 (18:59 -0800)] 
Don't try and delete a default ACL from a file.

16 years agoHave nmbd check all available interfaces for WINS before failing
Aravind Srinivasan [Thu, 5 Feb 2009 22:46:59 +0000 (14:46 -0800)] 
Have nmbd check all available interfaces for WINS before failing

When nmbd is acting as WINS, it picks the first interface's IP as WINS
server's IP. If the first interface's IP is zero, we will just quit
(even though we might have other interfaces with valid IPs).

This patch makes nmbd look at all interfaces and pick the first interface
with a valid IP as the WINS server's IP.

16 years agoumount.cifs: clean-up entries in /etc/mtab after unmount
Shirish Pargaonkar [Thu, 5 Feb 2009 19:16:53 +0000 (14:16 -0500)] 
umount.cifs: clean-up entries in /etc/mtab after unmount

This patch removes the remaining entry in /etc/mtab after a filesystem
is unmounted by canonicalizing the mountpoint supplied on the command
line.

Please refer to bug 4370 in samba bugzilla.

16 years agos3/libads: Change "ldap ssl:ads" parameter to "ldap ssl ads".
Karolin Seeger [Thu, 5 Feb 2009 14:55:14 +0000 (15:55 +0100)] 
s3/libads: Change "ldap ssl:ads" parameter to "ldap ssl ads".

This used to be commit 3f9daf43.

Karolin

16 years agos3-net: remove unused ENUM_HND.
Günther Deschner [Wed, 4 Feb 2009 22:55:54 +0000 (23:55 +0100)] 
s3-net: remove unused ENUM_HND.

Guenther

16 years agoFix bug #Bug 6090 renaming or deleting a "not matching/resolving" symlink is failing.
Jeremy Allison [Wed, 4 Feb 2009 23:35:02 +0000 (15:35 -0800)] 
Fix bug #Bug 6090 renaming or deleting a "not matching/resolving" symlink is failing.
Reported by Kukks. Make sure we correctly use LSTAT in all cases where
POSIX pathnames are being used. This matters when dealing with symlinks
pointing to invalid paths being renamed or deleted not all deletes and
renames are done via an nt_create open.
Jeremy.

16 years agoFix bug #6085 - In vfs_default.c change utime( ) call.
Miguel Suarez [Tue, 3 Feb 2009 22:35:19 +0000 (14:35 -0800)] 
Fix bug #6085 - In vfs_default.c change utime( ) call.

16 years agoProbably fixes a crash during name resolution when log level >= 10
Ted Percival [Tue, 3 Feb 2009 22:10:20 +0000 (14:10 -0800)] 
Probably fixes a crash during name resolution when log level >= 10
and libc segfaults if printf is passed NULL for a "%s" arg
(eg. Solaris).

16 years agos3: Fix 'net rpc join' for users with the SeMachineAccountPrivilege.
Volker Lendecke [Tue, 3 Feb 2009 13:41:49 +0000 (14:41 +0100)] 
s3: Fix 'net rpc join' for users with the SeMachineAccountPrivilege.

This used to be commit fda8abac in master.

16 years agoFix bug #6082 - smbd_gpfs_getacl failed: Windows client can´t rename or delete file
Jeremy Allison [Tue, 3 Feb 2009 01:11:15 +0000 (17:11 -0800)] 
Fix bug #6082 - smbd_gpfs_getacl failed: Windows client can´t rename or delete file
This fixes the generic rename/delete problem for 3.3.0 and above.
Fixed slightly differently to discussions, user viewable modified
ACLs are not a good idea :-).
Jeremy.

16 years agoAdjust regex to match variable names including underscores
Lars Müller [Mon, 2 Feb 2009 20:38:38 +0000 (21:38 +0100)] 
Adjust regex to match variable names including underscores

This is required to get the CIFSUPCALL_PROGS setting extracted from
config.log.

16 years agoConditional install of the cifs.upcall man page
Lars Müller [Mon, 2 Feb 2009 20:12:52 +0000 (21:12 +0100)] 
Conditional install of the cifs.upcall man page

Only install the cifs.upcall man page if CIFSUPCALL_PROGS was set while
configure.

16 years agos3 build: Fix "assignment discards qualifiers from pointer target type" warnings
Tim Prouty [Mon, 2 Feb 2009 07:59:53 +0000 (23:59 -0800)] 
s3 build: Fix "assignment discards qualifiers from pointer target type" warnings

16 years agodocs: Describe "service" in man mount.cifs.
Karolin Seeger [Mon, 2 Feb 2009 10:46:39 +0000 (11:46 +0100)] 
docs: Describe "service" in man mount.cifs.

This fixes bug #5346.
Thanks to the Debian Samba package maintainers for reporting and providing a
patch!

Karolin
(cherry picked from commit 73f4fc1f802f31459b70dba4777d142d00fcdd92)

16 years agofix build with external dns_sd libraries
Björn Jacke [Sun, 1 Feb 2009 02:22:41 +0000 (03:22 +0100)] 
fix build with external dns_sd libraries

This used to be commit 16f07280 in master.

16 years agos3:winbind_group: fix "getent group" to allocate new gids.
Michael Adam [Sun, 1 Feb 2009 23:46:57 +0000 (00:46 +0100)] 
s3:winbind_group: fix "getent group" to allocate new gids.

"getent group" used to fill the idmap cache with negative
cache entries for unmapped group sids.

Don't pass domain name unconditionally to idmap_sid_to_gid().
idmap_sid_to_gid() only creates new mappings (allocating
idmap backends tdb, tdb2, ldap...) when the domain name passed
in is "".

Note that it is _wrong_ to directly call the idmap_sid_to_gid()
functions here, in the main winbindd. The correct fix would be
to send a sid_to_gid request to winbindd itself, but this needs
more work to prepare the async mechanisms, and we nee a quick
fix for getent passwd now.

Michael

16 years agos3:winbind_user: fix "getent passwd" to allocate new uids.
Michael Adam [Sun, 1 Feb 2009 23:36:59 +0000 (00:36 +0100)] 
s3:winbind_user: fix "getent passwd" to allocate new uids.

"getent passwd" used to fill the idmap cache with negative
cache entries for unmapped user sids.

Don't pass domain name unconditionally to idmap_sid_to_[ug]id().
idmap_sid_to_[ug]id() only creates new mappings (allocating
idmap backends tdb, tdb2, ldap...) when the domain name passed
in is "".

Note that it is _wrong_ to directly call the idmap_sid_to_[ug]id()
functions here, in the main winbindd. The correct fix would be
to send a sid_to_[ug]id request to winbindd itself, but this needs
more work to prepare the async mechanisms, and we nee a quick
fix for getent passwd now.

Michael

16 years agos3:winbind_user: move initialization of domain up in winbindd_fill_pwent()
Michael Adam [Sun, 1 Feb 2009 23:35:43 +0000 (00:35 +0100)] 
s3:winbind_user: move initialization of domain up in winbindd_fill_pwent()

and streamline logic some

Michael

16 years agoFix bug 5798: "CFLAGS info lost in configure"
Volker Lendecke [Thu, 2 Oct 2008 00:17:04 +0000 (02:17 +0200)] 
Fix bug 5798: "CFLAGS info lost in configure"

picked from 9097a67de

Volker

16 years agos3-docs: fix typo in eventlogadm manpage.
Günther Deschner [Thu, 22 Jan 2009 18:31:22 +0000 (19:31 +0100)] 
s3-docs: fix typo in eventlogadm manpage.

Guenther
(cherry picked from commit fb7b92abc2bea4b3d91cdd896f02db88065a4b8f)

16 years agoFix coverity CID#117 - resource leak in error path.
Jeremy Allison [Fri, 30 Jan 2009 01:56:08 +0000 (17:56 -0800)] 
Fix coverity CID#117 - resource leak in error path.
Jeremy.

16 years agoFix coverity CID#116. Resource leak on error path.
Jeremy Allison [Fri, 30 Jan 2009 01:30:45 +0000 (17:30 -0800)] 
Fix coverity CID#116. Resource leak on error path.
Jeremy.

16 years agoFix coverity CID#115. Resource leak in error path.
Jeremy Allison [Fri, 30 Jan 2009 01:27:16 +0000 (17:27 -0800)] 
Fix coverity CID#115. Resource leak in error path.
Jeremy.

16 years agoadd Tru64 sub-second resolution timestamp support
Björn Jacke [Thu, 29 Jan 2009 21:59:00 +0000 (22:59 +0100)] 
add Tru64 sub-second resolution timestamp support

16 years agoadd configure check for Tru64 sub-second timestamp resolution
Björn Jacke [Thu, 29 Jan 2009 20:59:44 +0000 (21:59 +0100)] 
add configure check for Tru64 sub-second timestamp resolution

16 years agoadd missing semicolons
Björn Jacke [Thu, 29 Jan 2009 19:56:51 +0000 (20:56 +0100)] 
add missing semicolons

the fixed configure check led to a missing semicolon in the now activated BSD
code. Then this error was even copypasted into the new AIX code. grrr

16 years agoFollowing Björn JACKE's patch, unify the detection of the timespec code in configure...
Jeremy Allison [Thu, 29 Jan 2009 18:47:02 +0000 (10:47 -0800)] 
Following Björn JACKE's patch, unify the detection of the timespec code in configure.in, and the application of it in time.c
Jeremy.

16 years agoadd configure check for AIX style sub-second resolution support
Björn Jacke [Wed, 28 Jan 2009 23:33:19 +0000 (00:33 +0100)] 
add configure check for AIX style sub-second resolution support

16 years agorather cosmetic fix for failed birthtime configure checks
Björn Jacke [Wed, 28 Jan 2009 23:20:00 +0000 (00:20 +0100)] 
rather cosmetic fix for failed birthtime configure checks

16 years agogive configure check "sub-second timestamps without struct timespec" a chance to...
Björn Jacke [Wed, 28 Jan 2009 23:17:12 +0000 (00:17 +0100)] 
give configure check "sub-second timestamps without struct timespec" a chance to succeed

16 years agos3:configure: autodetect ctdb/cluster support
Stefan Metzmacher [Wed, 28 Jan 2009 16:36:36 +0000 (17:36 +0100)] 
s3:configure: autodetect ctdb/cluster support

We need to make sure ctdb has transaction support
and we autodetect ipv6 support.

metze
(cherry picked from commit 11163720e6f30e83f523c5009e1e60b5cf28cda6)

16 years agos3:ctdbd_conn: canonicalize ips before sending them to ctdbd
Stefan Metzmacher [Wed, 28 Jan 2009 17:55:13 +0000 (18:55 +0100)] 
s3:ctdbd_conn: canonicalize ips before sending them to ctdbd

This makes samba work with older ctdb versions.

metze
(cherry picked from commit 7540d13956a8a69d25f6fbbc4f9a3417e91db1d2)

16 years agofix bug #6073: prevent ads_connect() from using SSL unless explicitly requested
Michael Adam [Thu, 29 Jan 2009 12:17:46 +0000 (13:17 +0100)] 
fix bug #6073: prevent ads_connect() from using SSL unless explicitly requested

This fixes "net ads join".
It copes with the changed default "ldap ssl = start tls".
A new boolean option "ldap ssl : ads" is added to allow for
explicitly requesting ssl with  ads.

Michael

16 years agoAvoid valgrind errors
Volker Lendecke [Wed, 28 Jan 2009 09:35:35 +0000 (10:35 +0100)] 
Avoid valgrind errors

In event handlers, we might destroy other events that are pending in the lists.
We can only run one event safely per select call.

Yes, I've seen these valgrind errors :-)

Jeremy, with ccdd921e61 you had checked in the change to run multiple events.
Do you remember why it was necessary and could not be solved in a different
way?

Volker

16 years agoFix a valgrind error when the socket dies
Volker Lendecke [Tue, 27 Jan 2009 18:41:34 +0000 (19:41 +0100)] 
Fix a valgrind error when the socket dies

Don't reference anything that might have been deleted in the async_req_error
call.

16 years agoFix warning (bad handler prototype) and fix detection of dns_sd
Jeremy Allison [Wed, 28 Jan 2009 00:17:55 +0000 (16:17 -0800)] 
Fix warning (bad handler prototype) and fix detection of dns_sd
libraries.
Jeremy.

16 years agoFix bug #6069 - Build breaks with too many arguments to
Jeremy Allison [Tue, 27 Jan 2009 23:47:47 +0000 (15:47 -0800)] 
Fix bug #6069 - Build breaks with too many arguments to
samba-3.3.0/source/smbd/dnsregister.c:85:event_add_timed().
Jeremy.

16 years agoWHATSNEW: oops, the wrong parameter was reported to have been removed.
Michael Adam [Tue, 27 Jan 2009 21:13:47 +0000 (22:13 +0100)] 
WHATSNEW: oops, the wrong parameter was reported to have been removed.

Micheal

16 years agolibreplace: fix detection of netinet/ip.h on solaris 8
Michael Adam [Tue, 27 Jan 2009 14:48:20 +0000 (15:48 +0100)] 
libreplace: fix detection of netinet/ip.h on solaris 8

(The test needs to additionally include <netinet/in_systm.h>.)

Michael

16 years agolibreplace: fix bug #6066 - netinet/ip.h present but cannot be compiled
Michael Adam [Tue, 27 Jan 2009 11:13:55 +0000 (12:13 +0100)] 
libreplace: fix bug #6066 - netinet/ip.h present but cannot be compiled

under solaris

Michael

16 years agoDocument default of the printing config variable.
Andreas Schneider [Mon, 26 Jan 2009 13:38:34 +0000 (14:38 +0100)] 
Document default of the printing config variable.

Signed-off-by: Andreas Schneider <anschneider@suse.de>
(cherry picked from commit d8f15e4efc00b9d509ff5761e9ca8ff5c6f443f7)

16 years agodocs: Adapt version number in new vfs_fileid manpage.
Karolin Seeger [Mon, 26 Jan 2009 13:19:48 +0000 (14:19 +0100)] 
docs: Adapt version number in new vfs_fileid manpage.

Karolin

16 years agodocs: Adapt version number in new vfs_shadow_copy2 manpage.
Karolin Seeger [Mon, 26 Jan 2009 13:19:07 +0000 (14:19 +0100)] 
docs: Adapt version number in new vfs_shadow_copy2 manpage.

Karolin

16 years agodocs: Add manpage for vfs_shadow_copy2.
Karolin Seeger [Mon, 26 Jan 2009 13:17:23 +0000 (14:17 +0100)] 
docs: Add manpage for vfs_shadow_copy2.

Karolin
(cherry picked from commit 512cf0ad50d30fcb35a28b0ef1b859d754f42a99)

16 years agos3-eventlog: fix various invalid memcpy in read_package_entry().
Günther Deschner [Sat, 24 Jan 2009 01:10:47 +0000 (02:10 +0100)] 
s3-eventlog: fix various invalid memcpy in read_package_entry().

Guenther

16 years agos3-eventlog: fix buffer allocation in eventlog read call.
Günther Deschner [Sat, 24 Jan 2009 01:07:40 +0000 (02:07 +0100)] 
s3-eventlog: fix buffer allocation in eventlog read call.

This broke with f6fa3080fee1b20df9f1968500840a88cf0ee592 back in April 2007...

Guenther

16 years agodocs: Fix formatting issue in man libsmbclient.
Karolin Seeger [Fri, 23 Jan 2009 12:02:46 +0000 (13:02 +0100)] 
docs: Fix formatting issue in man libsmbclient.

Karolin
(cherry picked from commit aa2fb0efb7ce2bc732569b4baf20c57375fdce59)

16 years agoWHATSNEW: Add note about libsmbclient changes.
Karolin Seeger [Fri, 23 Jan 2009 10:51:56 +0000 (11:51 +0100)] 
WHATSNEW: Add note about libsmbclient changes.

Karolin

16 years agolib/replace: add defines to let the callers find out if pwrite and pread are thread...
Stefan Metzmacher [Thu, 22 Jan 2009 10:52:54 +0000 (11:52 +0100)] 
lib/replace: add defines to let the callers find out if pwrite and pread are thread/fork safe

metze
(cherry picked from commit 7fc7ee9331d0539359ad88c527f59d5fdf212209)

16 years agoWHATSNEW: Add "Changes since" sections of pre releases and RCs.
Karolin Seeger [Fri, 23 Jan 2009 10:09:07 +0000 (11:09 +0100)] 
WHATSNEW: Add  "Changes since" sections of pre releases and RCs.

Karolin

16 years agoWHATSNEW: Update changes since 3.3.0rc2.
Karolin Seeger [Fri, 23 Jan 2009 09:36:25 +0000 (10:36 +0100)] 
WHATSNEW: Update changes since 3.3.0rc2.

Karolin

16 years agoApply same logic fix for #4308 Excel save operation corrupts file ACLs
Jeremy Allison [Fri, 23 Jan 2009 00:22:04 +0000 (16:22 -0800)] 
Apply same logic fix for #4308 Excel save operation corrupts file ACLs
to NFSv4 ACL code as this uses the same flawed logic as posix_acls.c.
Jeremy.

16 years agoFix logic error in try_chown - we shouldn't arbitrarily chown
Jeremy Allison [Fri, 23 Jan 2009 00:09:26 +0000 (16:09 -0800)] 
Fix logic error in try_chown - we shouldn't arbitrarily chown
to ourselves unless that was passed in.
Jeremy.

16 years agoSecond part of the attemt to fix #4308 - Excel save operation corrupts file ACLs.
Jeremy Allison [Thu, 22 Jan 2009 22:32:32 +0000 (14:32 -0800)] 
Second part of the attemt to fix #4308 - Excel save operation corrupts file ACLs.
If the chown succeeds then the ACL set should also. Ensure this is the case
(refactor some of this code to make it simpler to read also).
Jeremy.

16 years agoAnother attempt to fix bug #4308 - Excel save operation corrupts file ACLs.
Jeremy Allison [Thu, 22 Jan 2009 18:59:14 +0000 (10:59 -0800)] 
Another attempt to fix bug #4308 - Excel save operation corrupts file ACLs.
Simo is completely correct. We should be doing the chown *first*, and fail the
ACL set if this fails. The long standing assumption I made when writing the
initial POSIX ACL code was that Windows didn't control who could chown a file
in the same was as POSIX. In POSIX only root can do this whereas I wasn't sure
who could do this in Windows at the time (I didn't understand the privilege
model). So the assumption was that setting the ACL was more important (early
tests showed many failed ACL set's due to inability to chown). But now we have
privileges in smbd, and we must always fail an ACL set when we can't chown
first. The key that Simo noticed is that the CREATOR_OWNER bits in the ACL
incoming are relative to the *new* owner, not the old one. This is why the old
user owner disappears on ACL set - their access was set via the USER_OBJ in the
creator POSIX ACL and when the ownership changes they lose their access.

Patch is simple - just ensure we do the chown first before evaluating the
incoming ACL re-read the owners. We already have code to do this it just wasn't
rigorously being applied.
Jeremy.