[SCM] Samba Shared Repository - branch master updated

Andrew Bartlett abartlet at samba.org
Sun Feb 12 17:26:02 MST 2012


The branch, master has been updated
       via  caf485a auth: Pass in the SMB username (for %U) into generate_session_info
       via  05f9495 s4:join python code - "msDS-KeyVersionNumber" does not exist on Win2k
       via  1e46ccb LDB:pyldb.c - use always the case insensitive comparison for attribute names
      from  2d66d16 wafsamba: Add tests for dict_concat.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit caf485a2bd0453b7d22600f9106a2026b1a50c79
Author: Andrew Bartlett <abartlet at samba.org>
Date:   Mon Jan 30 21:49:33 2012 +1100

    auth: Pass in the SMB username (for %U) into generate_session_info
    
    This matches what Samba3 does.
    
    Andrew Bartlett
    
    Autobuild-User: Andrew Bartlett <abartlet at samba.org>
    Autobuild-Date: Mon Feb 13 01:25:59 CET 2012 on sn-devel-104

commit 05f9495ff36c2335ff9c69ea408cd9328f6cc6e6
Author: Matthias Dieter Wallnöfer <mdw at samba.org>
Date:   Mon Jan 30 17:20:28 2012 +0100

    s4:join python code - "msDS-KeyVersionNumber" does not exist on Win2k
    
    No problem since "secretsdb_self_join()" then chooses 1 as a default
    value.
    Fix case sensitivity for "msDS-KeyVersionNumber".
    
    Signed-off-by: Andrew Bartlett <abartlet at samba.org>

commit 1e46ccba5ada1be310be4bbf4a954df73cde6c3a
Author: Matthias Dieter Wallnöfer <mdw at samba.org>
Date:   Sat Feb 11 12:48:20 2012 +0100

    LDB:pyldb.c - use always the case insensitive comparison for attribute names
    
    We can make no assumptions about our users
    
    Signed-off-by: Andrew Bartlett <abartlet at samba.org>

-----------------------------------------------------------------------

Summary of changes:
 auth/common_auth.h                     |    1 +
 lib/ldb/pyldb.c                        |    4 ++--
 source4/auth/ntlm/auth.c               |    8 ++++++--
 source4/auth/ntlm/auth_simple.c        |    1 +
 source4/auth/ntlmssp/ntlmssp_server.c  |    1 +
 source4/auth/unix_token.c              |    7 ++++---
 source4/scripting/python/samba/join.py |    8 ++++++--
 source4/smb_server/smb/sesssetup.c     |    4 +++-
 8 files changed, 24 insertions(+), 10 deletions(-)


Changeset truncated at 500 lines:

diff --git a/auth/common_auth.h b/auth/common_auth.h
index 453c0c9..d9996e1 100644
--- a/auth/common_auth.h
+++ b/auth/common_auth.h
@@ -120,6 +120,7 @@ struct auth4_context {
 	NTSTATUS (*generate_session_info)(TALLOC_CTX *mem_ctx,
 					  struct auth4_context *auth_context,
 					  void *server_returned_info,
+					  const char *original_user_name,
 					  uint32_t session_info_flags,
 					  struct auth_session_info **session_info);
 
diff --git a/lib/ldb/pyldb.c b/lib/ldb/pyldb.c
index b253bcd..2f99d14 100644
--- a/lib/ldb/pyldb.c
+++ b/lib/ldb/pyldb.c
@@ -1051,7 +1051,7 @@ static struct ldb_message *PyDict_AsMessage(TALLOC_CTX *mem_ctx,
 
 	while (PyDict_Next(py_obj, &dict_pos, &key, &value)) {
 		char *key_str = PyString_AsString(key);
-		if (strcmp(key_str, "dn") != 0) {
+		if (ldb_attr_cmp(key_str, "dn") != 0) {
 			msg_el = PyObject_AsMessageElement(msg->elements, value,
 							   mod_flags, key_str);
 			if (msg_el == NULL) {
@@ -2516,7 +2516,7 @@ static PyObject *py_ldb_msg_getitem_helper(PyLdbMessageObject *self, PyObject *p
 		return NULL;
 	}
 	name = PyString_AsString(py_name);
-	if (!strcmp(name, "dn"))
+	if (!ldb_attr_cmp(name, "dn"))
 		return pyldb_Dn_FromDn(msg->dn);
 	el = ldb_msg_find_element(msg, name);
 	if (el == NULL) {
diff --git a/source4/auth/ntlm/auth.c b/source4/auth/ntlm/auth.c
index 6dd82e4..fdfdb63 100644
--- a/source4/auth/ntlm/auth.c
+++ b/source4/auth/ntlm/auth.c
@@ -36,7 +36,8 @@
 static NTSTATUS auth_generate_session_info_wrapper(TALLOC_CTX *mem_ctx,
                                                   struct auth4_context *auth_context,
 						   void *server_returned_info,
-                                                  uint32_t session_info_flags,
+						   const char *original_user_name,
+						   uint32_t session_info_flags,
 						   struct auth_session_info **session_info);
 
 /***************************************************************************
@@ -140,6 +141,7 @@ static NTSTATUS auth_generate_session_info_principal(struct auth4_context *auth_
 
 		nt_status = auth_generate_session_info_wrapper(mem_ctx, auth_ctx,
 							       user_info_dc,
+							       user_info_dc->info->account_name,
 							       session_info_flags, session_info);
 		talloc_free(user_info_dc);
 
@@ -466,6 +468,7 @@ _PUBLIC_ NTSTATUS auth_check_password_recv(struct tevent_req *req,
 static NTSTATUS auth_generate_session_info_wrapper(TALLOC_CTX *mem_ctx,
                                                   struct auth4_context *auth_context,
 						   void *server_returned_info,
+						   const char *original_user_name,
                                                   uint32_t session_info_flags,
                                                   struct auth_session_info **session_info)
 {
@@ -494,7 +497,7 @@ static NTSTATUS auth_generate_session_info_wrapper(TALLOC_CTX *mem_ctx,
 			return NT_STATUS_INVALID_SERVER_STATE;
 		}
 		status = auth_session_info_fill_unix(wbc_ctx, auth_context->lp_ctx,
-						     *session_info);
+						     original_user_name, *session_info);
 		if (!NT_STATUS_IS_OK(status)) {
 			TALLOC_FREE(*session_info);
 		}
@@ -542,6 +545,7 @@ static NTSTATUS auth_generate_session_info_pac(struct auth4_context *auth_ctx,
 
 	status = auth_generate_session_info_wrapper(mem_ctx, auth_ctx,
 						    user_info_dc,
+						    user_info_dc->info->account_name,
 						    session_info_flags, session_info);
 	talloc_free(tmp_ctx);
 	return status;
diff --git a/source4/auth/ntlm/auth_simple.c b/source4/auth/ntlm/auth_simple.c
index 241906e..2e69991 100644
--- a/source4/auth/ntlm/auth_simple.c
+++ b/source4/auth/ntlm/auth_simple.c
@@ -96,6 +96,7 @@ _PUBLIC_ NTSTATUS authenticate_username_pw(TALLOC_CTX *mem_ctx,
 		}
 		nt_status = auth_context->generate_session_info(tmp_ctx, auth_context,
 								user_info_dc,
+								nt4_username,
 								flags,
 								session_info);
 
diff --git a/source4/auth/ntlmssp/ntlmssp_server.c b/source4/auth/ntlmssp/ntlmssp_server.c
index f463859..693613f 100644
--- a/source4/auth/ntlmssp/ntlmssp_server.c
+++ b/source4/auth/ntlmssp/ntlmssp_server.c
@@ -230,6 +230,7 @@ NTSTATUS gensec_ntlmssp_session_info(struct gensec_security *gensec_security,
 	if (gensec_security->auth_context && gensec_security->auth_context->generate_session_info) {
 		nt_status = gensec_security->auth_context->generate_session_info(mem_ctx, gensec_security->auth_context,
 										 gensec_ntlmssp->server_returned_info,
+										 gensec_ntlmssp->ntlmssp_state->user,
 										 session_info_flags,
 										 session_info);
 	} else {
diff --git a/source4/auth/unix_token.c b/source4/auth/unix_token.c
index 24f3226..7a7d464 100644
--- a/source4/auth/unix_token.c
+++ b/source4/auth/unix_token.c
@@ -125,8 +125,9 @@ NTSTATUS security_token_to_unix_token(TALLOC_CTX *mem_ctx,
 /*
   Fill in the auth_user_info_unix and auth_unix_token elements in a struct session_info
 */
-NTSTATUS auth_session_info_fill_unix( struct wbc_context *wbc_ctx,
+NTSTATUS auth_session_info_fill_unix(struct wbc_context *wbc_ctx,
 				     struct loadparm_context *lp_ctx,
+				     const char *original_user_name,
 				     struct auth_session_info *session_info)
 {
 	char *su;
@@ -149,11 +150,11 @@ NTSTATUS auth_session_info_fill_unix( struct wbc_context *wbc_ctx,
 							     session_info->info->account_name);
 	NT_STATUS_HAVE_NO_MEMORY(session_info->unix_info->unix_name);
 
-	len = strlen(session_info->info->account_name) + 1;
+	len = strlen(original_user_name) + 1;
 	session_info->unix_info->sanitized_username = su = talloc_array(session_info->unix_info, char, len);
 	NT_STATUS_HAVE_NO_MEMORY(su);
 
-	alpha_strcpy(su, session_info->info->account_name,
+	alpha_strcpy(su, original_user_name,
 		     ". _-$", len);
 
 	return NT_STATUS_OK;
diff --git a/source4/scripting/python/samba/join.py b/source4/scripting/python/samba/join.py
index dc09b46..b695277 100644
--- a/source4/scripting/python/samba/join.py
+++ b/source4/scripting/python/samba/join.py
@@ -506,8 +506,12 @@ class dc_join(object):
                                      domain_name=ctx.domain_name,
                                      newpassword=ctx.acct_pass)
 
-            res = ctx.samdb.search(base=ctx.acct_dn, scope=ldb.SCOPE_BASE, attrs=["msDS-keyVersionNumber"])
-            ctx.key_version_number = int(res[0]["msDS-keyVersionNumber"][0])
+            res = ctx.samdb.search(base=ctx.acct_dn, scope=ldb.SCOPE_BASE,
+                                   attrs=["msDS-KeyVersionNumber"])
+            if "msDS-KeyVersionNumber" in res[0]:
+                ctx.key_version_number = int(res[0]["msDS-KeyVersionNumber"][0])
+            else:
+                ctx.key_version_number = None
 
             print("Enabling account")
             m = ldb.Message()
diff --git a/source4/smb_server/smb/sesssetup.c b/source4/smb_server/smb/sesssetup.c
index c84be7f..2943747 100644
--- a/source4/smb_server/smb/sesssetup.c
+++ b/source4/smb_server/smb/sesssetup.c
@@ -85,7 +85,8 @@ static void sesssetup_old_send(struct tevent_req *subreq)
 	/* This references user_info_dc into session_info */
 	status = req->smb_conn->negotiate.auth_context->generate_session_info(req,
 									      req->smb_conn->negotiate.auth_context,
-									      user_info_dc, flags, &session_info);
+									      user_info_dc, sess->old.in.user, 
+									      flags, &session_info);
 	if (!NT_STATUS_IS_OK(status)) goto failed;
 
 	/* allocate a new session */
@@ -217,6 +218,7 @@ static void sesssetup_nt1_send(struct tevent_req *subreq)
 	status = state->auth_context->generate_session_info(req,
 							    state->auth_context,
 							    user_info_dc,
+							    sess->nt1.in.user,
 							    flags,
 							    &session_info);
 	if (!NT_STATUS_IS_OK(status)) goto failed;


-- 
Samba Shared Repository


More information about the samba-cvs mailing list