[SCM] Samba Shared Repository - branch master updated

Andrew Bartlett abartlet at samba.org
Tue Mar 25 21:21:05 MDT 2014


The branch, master has been updated
       via  233e3c9 selftest: Remove print_smbtorture4_version and smbtorture4_possible check
       via  d3cd9f1 dsdb: Do checks for invalid renames in samldb, before repl_meta_data
      from  a7df00c s3-nmbd: reset debug settings after reading config file (bug #10239)

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 233e3c96318db8111d8a7f5f649265cc9ecb5b27
Author: Andrew Bartlett <abartlet at samba.org>
Date:   Fri Mar 21 12:42:46 2014 +1300

    selftest: Remove print_smbtorture4_version and smbtorture4_possible check
    
    smbtorture is now always the same version as the rest of Samba, and is strictly required.
    
    Andrew Bartlett
    
    Change-Id: I89d9c52275477177fa8a89050920ff8a2fec9288
    Signed-off-by: Andrew Bartlett <abartlet at samba.org>
    Reviewed-By: Jelmer Vernooij <jelmer at samba.org>
    
    Autobuild-User(master): Andrew Bartlett <abartlet at samba.org>
    Autobuild-Date(master): Wed Mar 26 04:20:16 CET 2014 on sn-devel-104

commit d3cd9f1575af18a6765a6b6a31811c9976f9c11e
Author: Andrew Bartlett <abartlet at samba.org>
Date:   Mon Mar 24 17:15:19 2014 +1300

    dsdb: Do checks for invalid renames in samldb, before repl_meta_data
    
    This ensures that conflict objects can be created in CN=System, and
    that we do not stop replication just because some other DC allowed a
    rename we do not like.
    
    This is achived by doing the work in the samldb module, which is above
    repl_meta_data in the stack.
    
    Andrew Bartlett
    
    Change-Id: I8c1a7d3e0fbd5a470cf1326cc055044ca885f7d9
    Signed-off-by: Andrew Bartlett <abartlet at samba.org>
    Reviewed-by: Guenter Kukkukk <kukks at samba.org>
    Tested-by: Guenter Kukkukk <kukks at samba.org>

-----------------------------------------------------------------------

Summary of changes:
 selftest/selftesthelpers.py                     |   15 --
 source3/selftest/tests.py                       |    9 +-
 source4/dsdb/samdb/ldb_modules/samldb.c         |  261 ++++++++++++++++++++++-
 source4/dsdb/samdb/ldb_modules/subtree_rename.c |  248 +--------------------
 source4/selftest/tests.py                       |    2 -
 5 files changed, 273 insertions(+), 262 deletions(-)


Changeset truncated at 500 lines:

diff --git a/selftest/selftesthelpers.py b/selftest/selftesthelpers.py
index cdbe975..40e38aa 100644
--- a/selftest/selftesthelpers.py
+++ b/selftest/selftesthelpers.py
@@ -210,21 +210,6 @@ smbtorture4_options = [
     ] + get_env_torture_options()
 
 
-def print_smbtorture4_version():
-    """Print the version of Samba smbtorture4 comes from.
-
-    :return: Whether smbtorture4 was successfully run
-    """
-    try:
-        sub = subprocess.Popen([smbtorture4, "-V"], stdout=sys.stderr)
-    except OSError, e:
-        if e.errno == errno.ENOENT:
-            return False
-        raise
-    sub.communicate("")
-    return (sub.returncode == 0)
-
-
 def plansmbtorture4testsuite(name, env, options, target, modname=None):
     if modname is None:
         modname = "samba4.%s" % name
diff --git a/source3/selftest/tests.py b/source3/selftest/tests.py
index b8f477a..19e3066 100755
--- a/source3/selftest/tests.py
+++ b/source3/selftest/tests.py
@@ -29,19 +29,14 @@ smbtorture4_options.extend([
    '--option=torture:writetimeupdatedelay=500000',
    ])
 
-smbtorture4_possible = print_smbtorture4_version()
-
 def plansmbtorture4testsuite(name, env, options, description=''):
     if description == '':
         modname = "samba3.%s" % (name, )
     else:
         modname = "samba3.%s %s" % (name, description)
 
-    if smbtorture4_possible:
-        selftesthelpers.plansmbtorture4testsuite(
-            name, env, options, target='samba3', modname=modname)
-    else:
-        skiptestsuite(name, "smbtorture4 is not available")
+    selftesthelpers.plansmbtorture4testsuite(
+        name, env, options, target='samba3', modname=modname)
 
 
 plantestsuite("samba3.blackbox.success", "s3dc:local", [os.path.join(samba3srcdir, "script/tests/test_success.sh")])
diff --git a/source4/dsdb/samdb/ldb_modules/samldb.c b/source4/dsdb/samdb/ldb_modules/samldb.c
index 144d5a5..42a729c 100644
--- a/source4/dsdb/samdb/ldb_modules/samldb.c
+++ b/source4/dsdb/samdb/ldb_modules/samldb.c
@@ -1,7 +1,7 @@
 /*
    SAM ldb module
 
-   Copyright (C) Andrew Bartlett <abartlet at samba.org> 2005
+   Copyright (C) Andrew Bartlett <abartlet at samba.org> 2005-2014
    Copyright (C) Simo Sorce  2004-2008
    Copyright (C) Matthias Dieter Wallnöfer 2009-2011
    Copyright (C) Matthieu Patou 2012
@@ -2600,6 +2600,264 @@ static int samldb_delete(struct ldb_module *module, struct ldb_request *req)
 	return ldb_next_request(module, req);
 }
 
+/* rename */
+
+static int check_rename_constraints(struct ldb_message *msg,
+				    struct samldb_ctx *ac,
+				    struct ldb_dn *olddn, struct ldb_dn *newdn)
+{
+	struct ldb_context *ldb = ldb_module_get_ctx(ac->module);
+	struct ldb_dn *dn1, *dn2, *nc_root;
+	int32_t systemFlags;
+	bool move_op = false;
+	bool rename_op = false;
+	int ret;
+
+	/* Skip the checks if old and new DN are the same, or if we have the
+	 * relax control specified or if the returned objects is already
+	 * deleted and needs only to be moved for consistency. */
+
+	if (ldb_dn_compare(olddn, newdn) == 0) {
+		return LDB_SUCCESS;
+	}
+	if (ldb_request_get_control(ac->req, LDB_CONTROL_RELAX_OID) != NULL) {
+		return LDB_SUCCESS;
+	}
+	if (ldb_msg_find_attr_as_bool(msg, "isDeleted", false)) {
+		return LDB_SUCCESS;
+	}
+
+	/* Objects under CN=System */
+
+	dn1 = ldb_dn_copy(ac, ldb_get_default_basedn(ldb));
+	if (dn1 == NULL) return ldb_oom(ldb);
+
+	if ( ! ldb_dn_add_child_fmt(dn1, "CN=System")) {
+		talloc_free(dn1);
+		return LDB_ERR_OPERATIONS_ERROR;
+	}
+
+	if ((ldb_dn_compare_base(dn1, olddn) == 0) &&
+	    (ldb_dn_compare_base(dn1, newdn) != 0)) {
+		talloc_free(dn1);
+		ldb_asprintf_errstring(ldb,
+				       "subtree_rename: Cannot move/rename %s. Objects under CN=System have to stay under it!",
+				       ldb_dn_get_linearized(olddn));
+		return LDB_ERR_OTHER;
+	}
+
+	talloc_free(dn1);
+
+	/* LSA objects */
+
+	if ((samdb_find_attribute(ldb, msg, "objectClass", "secret") != NULL) ||
+	    (samdb_find_attribute(ldb, msg, "objectClass", "trustedDomain") != NULL)) {
+		ldb_asprintf_errstring(ldb,
+				       "subtree_rename: Cannot move/rename %s. It's an LSA-specific object!",
+				       ldb_dn_get_linearized(olddn));
+		return LDB_ERR_UNWILLING_TO_PERFORM;
+	}
+
+	/* systemFlags */
+
+	dn1 = ldb_dn_get_parent(ac, olddn);
+	if (dn1 == NULL) return ldb_oom(ldb);
+	dn2 = ldb_dn_get_parent(ac, newdn);
+	if (dn2 == NULL) return ldb_oom(ldb);
+
+	if (ldb_dn_compare(dn1, dn2) == 0) {
+		rename_op = true;
+	} else {
+		move_op = true;
+	}
+
+	talloc_free(dn1);
+	talloc_free(dn2);
+
+	systemFlags = ldb_msg_find_attr_as_int(msg, "systemFlags", 0);
+
+	/* Fetch name context */
+
+	ret = dsdb_find_nc_root(ldb, ac, olddn, &nc_root);
+	if (ret != LDB_SUCCESS) {
+		return ret;
+	}
+
+	if (ldb_dn_compare(nc_root, ldb_get_schema_basedn(ldb)) == 0) {
+		if (move_op) {
+			ldb_asprintf_errstring(ldb,
+					       "subtree_rename: Cannot move %s within schema partition",
+					       ldb_dn_get_linearized(olddn));
+			return LDB_ERR_UNWILLING_TO_PERFORM;
+		}
+		if (rename_op &&
+		    (systemFlags & SYSTEM_FLAG_SCHEMA_BASE_OBJECT) != 0) {
+			ldb_asprintf_errstring(ldb,
+					       "subtree_rename: Cannot rename %s within schema partition",
+					       ldb_dn_get_linearized(olddn));
+			return LDB_ERR_UNWILLING_TO_PERFORM;
+		}
+	} else if (ldb_dn_compare(nc_root, ldb_get_config_basedn(ldb)) == 0) {
+		if (move_op &&
+		    (systemFlags & SYSTEM_FLAG_CONFIG_ALLOW_MOVE) == 0) {
+			/* Here we have to do more: control the
+			 * "ALLOW_LIMITED_MOVE" flag. This means that the
+			 * grand-grand-parents of two objects have to be equal
+			 * in order to perform the move (this is used for
+			 * moving "server" objects in the "sites" container). */
+			bool limited_move =
+				systemFlags & SYSTEM_FLAG_CONFIG_ALLOW_LIMITED_MOVE;
+
+			if (limited_move) {
+				dn1 = ldb_dn_copy(ac, olddn);
+				if (dn1 == NULL) return ldb_oom(ldb);
+				dn2 = ldb_dn_copy(ac, newdn);
+				if (dn2 == NULL) return ldb_oom(ldb);
+
+				limited_move &= ldb_dn_remove_child_components(dn1, 3);
+				limited_move &= ldb_dn_remove_child_components(dn2, 3);
+				limited_move &= ldb_dn_compare(dn1, dn2) == 0;
+
+				talloc_free(dn1);
+				talloc_free(dn2);
+			}
+
+			if (!limited_move) {
+				ldb_asprintf_errstring(ldb,
+						       "subtree_rename: Cannot move %s to %s in config partition",
+						       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
+				return LDB_ERR_UNWILLING_TO_PERFORM;
+			}
+		}
+		if (rename_op &&
+		    (systemFlags & SYSTEM_FLAG_CONFIG_ALLOW_RENAME) == 0) {
+			ldb_asprintf_errstring(ldb,
+					       "subtree_rename: Cannot rename %s to %s within config partition",
+					       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
+			return LDB_ERR_UNWILLING_TO_PERFORM;
+		}
+	} else if (ldb_dn_compare(nc_root, ldb_get_default_basedn(ldb)) == 0) {
+		if (move_op &&
+		    (systemFlags & SYSTEM_FLAG_DOMAIN_DISALLOW_MOVE) != 0) {
+			ldb_asprintf_errstring(ldb,
+					       "subtree_rename: Cannot move %s to %s - DISALLOW_MOVE set",
+					       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
+			return LDB_ERR_UNWILLING_TO_PERFORM;
+		}
+		if (rename_op &&
+		    (systemFlags & SYSTEM_FLAG_DOMAIN_DISALLOW_RENAME) != 0) {
+			ldb_asprintf_errstring(ldb,
+						       "subtree_rename: Cannot rename %s to %s - DISALLOW_RENAME set",
+					       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
+			return LDB_ERR_UNWILLING_TO_PERFORM;
+		}
+	}
+
+	talloc_free(nc_root);
+
+	return LDB_SUCCESS;
+}
+
+
+static int samldb_rename_search_base_callback(struct ldb_request *req,
+					       struct ldb_reply *ares)
+{
+	struct ldb_request *rename_req;
+	struct samldb_ctx *ac;
+	int ret;
+
+	ac = talloc_get_type(req->context, struct samldb_ctx);
+
+	if (!ares) {
+		return ldb_module_done(ac->req, NULL, NULL,
+					LDB_ERR_OPERATIONS_ERROR);
+	}
+	if (ares->error != LDB_SUCCESS) {
+		return ldb_module_done(ac->req, ares->controls,
+					ares->response, ares->error);
+	}
+
+	switch (ares->type) {
+	case LDB_REPLY_ENTRY:
+		/*
+		 * This is the root entry of the originating move
+		 * respectively rename request. It has been already
+		 * stored in the list using "subtree_rename_search()".
+		 * Only this one is subject to constraint checking.
+		 */
+		ret = check_rename_constraints(ares->message, ac,
+					       ac->req->op.rename.olddn,
+					       ac->req->op.rename.newdn);
+		if (ret != LDB_SUCCESS) {
+			return ldb_module_done(ac->req, NULL, NULL,
+					       ret);
+		}
+		break;
+
+	case LDB_REPLY_REFERRAL:
+		/* ignore */
+		break;
+
+	case LDB_REPLY_DONE:
+
+		/*
+		 * Great, no problem with the rename, so go ahead as
+		 * if we never were here
+		 */
+		ret = ldb_next_request(ac->module, ac->req);
+		talloc_free(ares);
+		return ret;
+	}
+
+	talloc_free(ares);
+	return LDB_SUCCESS;
+}
+
+
+/* rename */
+static int samldb_rename(struct ldb_module *module, struct ldb_request *req)
+{
+	struct ldb_context *ldb;
+	static const char * const attrs[] = { "objectClass", "systemFlags",
+					      "isDeleted", NULL };
+	struct ldb_request *search_req;
+	struct samldb_ctx *ac;
+	int ret;
+
+	if (ldb_dn_is_special(req->op.rename.olddn)) { /* do not manipulate our control entries */
+		return ldb_next_request(module, req);
+	}
+
+	ldb = ldb_module_get_ctx(module);
+
+	ac = samldb_ctx_init(module, req);
+	if (!ac) {
+		return ldb_oom(ldb);
+	}
+
+	ret = ldb_build_search_req(&search_req, ldb, ac,
+				   req->op.rename.olddn,
+				   LDB_SCOPE_BASE,
+				   "(objectClass=*)",
+				   attrs,
+				   NULL,
+				   ac,
+				   samldb_rename_search_base_callback,
+				   req);
+	LDB_REQ_SET_LOCATION(search_req);
+	if (ret != LDB_SUCCESS) {
+		return ret;
+	}
+
+	ret = ldb_request_add_control(search_req, LDB_CONTROL_SHOW_RECYCLED_OID,
+				      true, NULL);
+	if (ret != LDB_SUCCESS) {
+		return ret;
+	}
+
+	return ldb_next_request(ac->module, search_req);
+}
+
 /* extended */
 
 static int samldb_extended_allocate_rid_pool(struct ldb_module *module, struct ldb_request *req)
@@ -2639,6 +2897,7 @@ static const struct ldb_module_ops ldb_samldb_module_ops = {
 	.add           = samldb_add,
 	.modify        = samldb_modify,
 	.del           = samldb_delete,
+	.rename        = samldb_rename,
 	.extended      = samldb_extended
 };
 
diff --git a/source4/dsdb/samdb/ldb_modules/subtree_rename.c b/source4/dsdb/samdb/ldb_modules/subtree_rename.c
index d26dabe..b9ecb3f 100644
--- a/source4/dsdb/samdb/ldb_modules/subtree_rename.c
+++ b/source4/dsdb/samdb/ldb_modules/subtree_rename.c
@@ -91,166 +91,11 @@ static int subtree_rename_callback(struct ldb_request *req,
 	return ldb_module_done(ac->req, NULL, NULL, LDB_SUCCESS);
 }
 
-static int check_constraints(struct ldb_message *msg,
-			     struct subtree_rename_context *ac,
-			     struct ldb_dn *olddn, struct ldb_dn *newdn)
-{
-	struct ldb_context *ldb = ldb_module_get_ctx(ac->module);
-	struct ldb_dn *dn1, *dn2, *nc_root;
-	int32_t systemFlags;
-	bool move_op = false;
-	bool rename_op = false;
-	int ret;
-
-	/* Skip the checks if old and new DN are the same, or if we have the
-	 * relax control specified or if the returned objects is already
-	 * deleted and needs only to be moved for consistency. */
-
-	if (ldb_dn_compare(olddn, newdn) == 0) {
-		return LDB_SUCCESS;
-	}
-	if (ldb_request_get_control(ac->req, LDB_CONTROL_RELAX_OID) != NULL) {
-		return LDB_SUCCESS;
-	}
-	if (ldb_msg_find_attr_as_bool(msg, "isDeleted", false)) {
-		return LDB_SUCCESS;
-	}
-
-	/* Objects under CN=System */
-
-	dn1 = ldb_dn_copy(ac, ldb_get_default_basedn(ldb));
-	if (dn1 == NULL) return ldb_oom(ldb);
-
-	if ( ! ldb_dn_add_child_fmt(dn1, "CN=System")) {
-		talloc_free(dn1);
-		return LDB_ERR_OPERATIONS_ERROR;
-	}
-
-	if ((ldb_dn_compare_base(dn1, olddn) == 0) &&
-	    (ldb_dn_compare_base(dn1, newdn) != 0)) {
-		talloc_free(dn1);
-		ldb_asprintf_errstring(ldb,
-				       "subtree_rename: Cannot move/rename %s. Objects under CN=System have to stay under it!",
-				       ldb_dn_get_linearized(olddn));
-		return LDB_ERR_OTHER;
-	}
-
-	talloc_free(dn1);
-
-	/* LSA objects */
-
-	if ((samdb_find_attribute(ldb, msg, "objectClass", "secret") != NULL) ||
-	    (samdb_find_attribute(ldb, msg, "objectClass", "trustedDomain") != NULL)) {
-		ldb_asprintf_errstring(ldb,
-				       "subtree_rename: Cannot move/rename %s. It's an LSA-specific object!",
-				       ldb_dn_get_linearized(olddn));
-		return LDB_ERR_UNWILLING_TO_PERFORM;
-	}
-
-	/* systemFlags */
-
-	dn1 = ldb_dn_get_parent(ac, olddn);
-	if (dn1 == NULL) return ldb_oom(ldb);
-	dn2 = ldb_dn_get_parent(ac, newdn);
-	if (dn2 == NULL) return ldb_oom(ldb);
-
-	if (ldb_dn_compare(dn1, dn2) == 0) {
-		rename_op = true;
-	} else {
-		move_op = true;
-	}
-
-	talloc_free(dn1);
-	talloc_free(dn2);
-
-	systemFlags = ldb_msg_find_attr_as_int(msg, "systemFlags", 0);
-
-	/* Fetch name context */
-
-	ret = dsdb_find_nc_root(ldb, ac, olddn, &nc_root);
-	if (ret != LDB_SUCCESS) {
-		return ret;
-	}
-
-	if (ldb_dn_compare(nc_root, ldb_get_schema_basedn(ldb)) == 0) {
-		if (move_op) {
-			ldb_asprintf_errstring(ldb,
-					       "subtree_rename: Cannot move %s within schema partition",
-					       ldb_dn_get_linearized(olddn));
-			return LDB_ERR_UNWILLING_TO_PERFORM;
-		}
-		if (rename_op &&
-		    (systemFlags & SYSTEM_FLAG_SCHEMA_BASE_OBJECT) != 0) {
-			ldb_asprintf_errstring(ldb,
-					       "subtree_rename: Cannot rename %s within schema partition",
-					       ldb_dn_get_linearized(olddn));
-			return LDB_ERR_UNWILLING_TO_PERFORM;
-		}
-	} else if (ldb_dn_compare(nc_root, ldb_get_config_basedn(ldb)) == 0) {
-		if (move_op &&
-		    (systemFlags & SYSTEM_FLAG_CONFIG_ALLOW_MOVE) == 0) {
-			/* Here we have to do more: control the
-			 * "ALLOW_LIMITED_MOVE" flag. This means that the
-			 * grand-grand-parents of two objects have to be equal
-			 * in order to perform the move (this is used for
-			 * moving "server" objects in the "sites" container). */
-			bool limited_move =
-				systemFlags & SYSTEM_FLAG_CONFIG_ALLOW_LIMITED_MOVE;
-
-			if (limited_move) {
-				dn1 = ldb_dn_copy(ac, olddn);
-				if (dn1 == NULL) return ldb_oom(ldb);
-				dn2 = ldb_dn_copy(ac, newdn);
-				if (dn2 == NULL) return ldb_oom(ldb);
-
-				limited_move &= ldb_dn_remove_child_components(dn1, 3);
-				limited_move &= ldb_dn_remove_child_components(dn2, 3);
-				limited_move &= ldb_dn_compare(dn1, dn2) == 0;
-
-				talloc_free(dn1);
-				talloc_free(dn2);
-			}
-
-			if (!limited_move) {
-				ldb_asprintf_errstring(ldb,
-						       "subtree_rename: Cannot move %s to %s in config partition",
-						       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
-				return LDB_ERR_UNWILLING_TO_PERFORM;
-			}
-		}
-		if (rename_op &&
-		    (systemFlags & SYSTEM_FLAG_CONFIG_ALLOW_RENAME) == 0) {
-			ldb_asprintf_errstring(ldb,
-					       "subtree_rename: Cannot rename %s to %s within config partition",
-					       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
-			return LDB_ERR_UNWILLING_TO_PERFORM;
-		}
-	} else if (ldb_dn_compare(nc_root, ldb_get_default_basedn(ldb)) == 0) {
-		if (move_op &&
-		    (systemFlags & SYSTEM_FLAG_DOMAIN_DISALLOW_MOVE) != 0) {
-			ldb_asprintf_errstring(ldb,
-					       "subtree_rename: Cannot move %s to %s - DISALLOW_MOVE set",
-					       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
-			return LDB_ERR_UNWILLING_TO_PERFORM;
-		}
-		if (rename_op &&
-		    (systemFlags & SYSTEM_FLAG_DOMAIN_DISALLOW_RENAME) != 0) {
-			ldb_asprintf_errstring(ldb,
-						       "subtree_rename: Cannot rename %s to %s - DISALLOW_RENAME set",
-					       ldb_dn_get_linearized(olddn), ldb_dn_get_linearized(newdn));
-			return LDB_ERR_UNWILLING_TO_PERFORM;
-		}
-	}
-
-	talloc_free(nc_root);
-
-	return LDB_SUCCESS;


-- 
Samba Shared Repository


More information about the samba-cvs mailing list