[SCM] Samba Shared Repository - branch master updated
The branch, master has been updated via ecff09d75df Align samba_kdc_update_pac() prototype in pac-glue.h with the implementation in pac-glue.c via b1006c773be s4:kdc: Use talloc_get_type_abort() via ad1234d5ee8 s4:kdc: Create a temporary talloc context on which to allocate via cf139d14218 s4:kdc: Return NTSTATUS and auditing information from samba_kdc_update_pac() to be logged via d0d52262f78 s4:kdc: Flip sense of condition via f49ebef0035 s4:kdc: Unify common code paths via 6bb7aad1631 s4:kdc: Use samba_kdc_obtain_user_info_dc() for !client_pac_is_trusted case via 7485638e026 s4:kdc: Move adding compounded authentication SID out of samba_kdc_obtain_user_info_dc() via 6be1a397dac s4:kdc: Have samba_kdc_update_pac_blob() do less via e6c44222409 s4:kdc: Remove unused PAC_SIGNATURE_DATA parameters via 8c107763980 s4:kdc: Log errors in samba_kdc_update_pac_blob() via ea007ef7188 s4:kdc: Have samba_kdc_update_pac_blob() return krb5_error_code via baf03e3f114 s4:kdc: Add singular out path to samba_kdc_update_pac_blob() via d2a6c69940c s4:kdc: Make krb5_principal parameters const via f857967427f s4:kdc: Add helper function to determine whether a device is allowed to authenticate via 071ad174d92 s4:kdc: Add helper function to determine whether authentication to a server is allowed via af95ec0b3fb s4:kdc: Add functionality to log client and server authentication policies via 26d7d1a5af1 s4:auth: Log authentication policies for NTLM authentication via ad32cf0286c s4:auth: Add audit info parameters to check_password_recv() via 66841384751 s4:auth: Set ‘authoritative’ even if there is an error via ca9d27ae99d auth: Add functionality to log client and server policy information via f9c55b84ef1 lib:audit_logging: Add function to return the JSON null object via b11ad8b1376 python:tests: Fix typos via 78186805314 netcmd: domain: Fix typo via 7748e6857c4 tests/krb5: Test authentication policy audit logging via b0d20ce56c2 tests/krb5: Test more authentication logging of TGT lifetimes via a5770669e1a tests/krb5: Improve authentication policy creation via 0cfa7f6cff9 netcmd: domain: add error handling to domain claims commands via 76ca95db6bc netcmd: domain: add error handling to domain auth commands via ca4e36d17a8 netcmd: domain: add model exceptions and error handling via b00761da1d1 netcmd: domain: model stores ldb message for save via d7b04685680 netcmd: domain: man page updates for auth silo and policy cli via a9944ba860a netcmd: domain: silo member command tests via 3a579eab8bb netcmd: domain: model field tests via 83112842245 netcmd: domain: silo member add and remove does not write whole list via 705e65c16e8 netcmd: domain: remove parse_guid and parse_text as they are no longer used via daac480eb74 netcmd: domain: claims: base class is no longer required via bb0ab7b2410 netcmd: domain: claims: move claim value type lookup by attribute to model via 61ee26ade98 netcmd: domain: claims: make use of AttributeSchema and ClassSchema models via 44aaba8a82d netcmd: domain: add models for ClassSchema and AttributeSchema via 3ecea860aaf netcmd: auth silos: remove base class via d070a605bb0 netcmd: domain: add test for silo if policy is a dn via df5e6045fa1 netcmd: move get_policy method from base class to the model via 2842ed824ae netcmd: move method print_json to command base class via 15440c6d6bf netcmd: fix import sort/grouping as per python standard via 3da5be0b8f8 netcmd: move ldb_connect method to base class via d558b20ed10 netcmd: PEP257 fix incorrect docstring quotes via b6fda29fc7a netcmd: domain: claims: use consistent naming for options via b3fac344a35 netcmd: domain: claim commands use the model layer via 40da71fe9cf netcmd: domain: fix claims constant name was wrong should be claim type CN via 7e9d8072016 netcmd: domain: fix attributes created by test setUp method via 9911a81cc21 netcmd: domain: claim: show err if assertIsNone fails via 6056566a18d netcmd: domain: rename claim tests for consistency via 35d04e2463f netcmd: domain: tests for auth silo command line tools via 3df634e7527 netcmd: domain: add authentication silo commands via 3a0160ae943 netcmd: add domain models and basic model layer via d01cd64da23 netcmd: add custom json encoder for object type fields via 1a5184e404d netcmd: add optparse validators and Range validator from 9f5216912e0 vfs_gpfs: Move call to load GPFS library https://git.samba.org/?p=samba.git;a=shortlog;h=master - Log - commit ecff0
[SCM] Samba Shared Repository - branch master updated
The branch, master has been updated via 9f5216912e0 vfs_gpfs: Move call to load GPFS library via 25e1e487a5f vfs_gpfs: Check error from gpfswrap_lib_init via 3b72136f678 vfs_gpfs: Register smbd process with GPFS via 34b9c54ff2f gpfswrap: Add wrapper for gpfs_register_cifs_export from a75378e3542 s4:kdc: translate sdb_entry->old[er]_keys into hdb_add_history_key() https://git.samba.org/?p=samba.git;a=shortlog;h=master - Log - commit 9f5216912e0b2f2d0e74d4dbd10f3fb5017de331 Author: Christof Schmitt Date: Wed May 31 11:29:49 2023 -0700 vfs_gpfs: Move call to load GPFS library Load the GPFS library from the connect function and leave the module init for only the module registration. Signed-off-by: Christof Schmitt Reviewed-by: Stefan Metzmacher Autobuild-User(master): Stefan Metzmacher Autobuild-Date(master): Sun Jun 25 16:06:37 UTC 2023 on atb-devel-224 commit 25e1e487a5f32ec5ae3cd8e9f49535eae0358e88 Author: Christof Schmitt Date: Wed May 31 11:16:19 2023 -0700 vfs_gpfs: Check error from gpfswrap_lib_init Signed-off-by: Christof Schmitt Reviewed-by: Stefan Metzmacher commit 3b72136f6782d9704a197ab7b17201df6ff4d60d Author: Christof Schmitt Date: Wed May 31 11:13:51 2023 -0700 vfs_gpfs: Register smbd process with GPFS Issue API call to tell the file system that this is a Samba process. This fixed the GPFS handling of Samba since the rename of smbd processes in commit 5955dc1e4fd. BUG: https://bugzilla.samba.org/show_bug.cgi?id=15381 Signed-off-by: Christof Schmitt Reviewed-by: Stefan Metzmacher commit 34b9c54ff2f089dbffe65bdc69f3024b5d3efd5c Author: Christof Schmitt Date: Wed May 24 14:06:36 2023 -0700 gpfswrap: Add wrapper for gpfs_register_cifs_export BUG: https://bugzilla.samba.org/show_bug.cgi?id=15381 Signed-off-by: Christof Schmitt Reviewed-by: Stefan Metzmacher --- Summary of changes: lib/util/gpfswrap.c| 12 lib/util/gpfswrap.h| 1 + source3/modules/vfs_gpfs.c | 26 ++ 3 files changed, 31 insertions(+), 8 deletions(-) Changeset truncated at 500 lines: diff --git a/lib/util/gpfswrap.c b/lib/util/gpfswrap.c index d05358e141e..2f15bf452cf 100644 --- a/lib/util/gpfswrap.c +++ b/lib/util/gpfswrap.c @@ -28,6 +28,7 @@ static int (*gpfs_putacl_fn)(const char *pathname, int flags, void *acl); static int (*gpfs_get_realfilename_path_fn)(const char *pathname, char *filenamep, int *len); +static int (*gpfs_register_cifs_export_fn)(void); static int (*gpfs_set_winattrs_path_fn)(const char *pathname, int flags, struct gpfs_winattr *attrs); @@ -71,6 +72,7 @@ int gpfswrap_init(void) gpfs_fgetacl_fn = dlsym(l, "gpfs_getacl_fd"); gpfs_putacl_fn= dlsym(l, "gpfs_putacl"); gpfs_get_realfilename_path_fn = dlsym(l, "gpfs_get_realfilename_path"); + gpfs_register_cifs_export_fn = dlsym(l, "gpfs_register_cifs_export"); gpfs_set_winattrs_path_fn = dlsym(l, "gpfs_set_winattrs_path"); gpfs_set_winattrs_fn = dlsym(l, "gpfs_set_winattrs"); gpfs_get_winattrs_fn = dlsym(l, "gpfs_get_winattrs"); @@ -141,6 +143,16 @@ int gpfswrap_get_realfilename_path(const char *pathname, return gpfs_get_realfilename_path_fn(pathname, filenamep, len); } +int gpfswrap_register_cifs_export(void) +{ + if (gpfs_register_cifs_export_fn == NULL) { + errno = ENOSYS; + return -1; + } + + return gpfs_register_cifs_export_fn(); +} + int gpfswrap_set_winattrs_path(const char *pathname, int flags, struct gpfs_winattr *attrs) diff --git a/lib/util/gpfswrap.h b/lib/util/gpfswrap.h index 1e74496c060..e387a56446b 100644 --- a/lib/util/gpfswrap.h +++ b/lib/util/gpfswrap.h @@ -34,6 +34,7 @@ int gpfswrap_putacl(const char *pathname, int flags, void *acl); int gpfswrap_get_realfilename_path(const char *pathname, char *filenamep, int *len); +int gpfswrap_register_cifs_export(void); int gpfswrap_set_winattrs_path(const char *pathname, int flags, struct gpfs_winattr *attrs); diff --git a/source3/modules/vfs_gpfs.c b/source3/modules/vfs_gpfs.c index 969e7744fce..3398879c900 100644 --- a/source3/modules/vfs_gpfs.c +++ b/source3/modules/vfs_gpfs.c @@ -2041,7 +2041,24 @@ static int vfs_gpfs_connect(struct vfs_handle_struct *handle, return 0; } -