[SCM] Samba Shared Repository - branch v4-4-test updated

Karolin Seeger kseeger at samba.org
Fri Aug 5 11:38:02 UTC 2016


The branch, v4-4-test has been updated
       via  ec4a00b man: Wrong option for parameter ldap ssl in smb.conf man page
       via  49d09f6 async_req: make async_connect_send() "reentrant"
      from  d6639d7 vfs_acl_xattr: objects without NT ACL xattr

https://git.samba.org/?p=samba.git;a=shortlog;h=v4-4-test


- Log -----------------------------------------------------------------
commit ec4a00bc781a65e778a4c90f9ca54d431a45540e
Author: Marc Muehlfeld <mmuehlfeld at samba.org>
Date:   Sat Jul 16 20:14:15 2016 +0200

    man: Wrong option for parameter ldap ssl in smb.conf man page
    
    - "ldap ssl" does not accept the value "yes"
    - Replaced "start_tls" with "start tls".
    
    BUG: https://bugzilla.samba.org/show_bug.cgi?id=12023
    
    Signed-off-by: Marc Muehlfeld <mmuehlfeld at samba.org>
    Reviewed-by: Andreas Schneider <asn at samba.org>
    (cherry picked from commit 976be8fe39c78acfd3c2a23302d26cc262be0ae0)
    
    Autobuild-User(v4-4-test): Karolin Seeger <kseeger at samba.org>
    Autobuild-Date(v4-4-test): Fri Aug  5 13:37:41 CEST 2016 on sn-devel-144

commit 49d09f6e884386eb344d0c85b2f4d2b649ee94df
Author: Ralph Boehme <slow at samba.org>
Date:   Wed Aug 3 15:00:45 2016 +0200

    async_req: make async_connect_send() "reentrant"
    
    Allow callers to pass in socket fds that where already passed to an
    earlier call of async_connect_send(). Callers expect this behaviour and
    it was working until 05d4dbda8357712cb81008e0d611fdb0e7239587 broke it.
    
    The proper fix would be to change callers to close the fd and start from
    scratch with a fresh socket.
    
    Bug: https://bugzilla.samba.org/show_bug.cgi?id=12105
    
    Signed-off-by: Ralph Boehme <slow at samba.org>
    Reviewed-by: Jeremy Allison <jra at samba.org>
    
    Autobuild-User(master): Ralph Böhme <slow at samba.org>
    Autobuild-Date(master): Thu Aug  4 05:03:21 CEST 2016 on sn-devel-144
    
    (cherry picked from commit 9c6a4ea2788808bdcc7bfea798d838ea56c3b5ec)

-----------------------------------------------------------------------

Summary of changes:
 docs-xml/smbdotconf/ldap/ldapssl.xml |  4 ++--
 lib/async_req/async_sock.c           | 16 +++++++++++++---
 2 files changed, 15 insertions(+), 5 deletions(-)


Changeset truncated at 500 lines:

diff --git a/docs-xml/smbdotconf/ldap/ldapssl.xml b/docs-xml/smbdotconf/ldap/ldapssl.xml
index a50c88e..a53d726 100644
--- a/docs-xml/smbdotconf/ldap/ldapssl.xml
+++ b/docs-xml/smbdotconf/ldap/ldapssl.xml
@@ -14,7 +14,7 @@
 
 	<para>LDAP connections should be secured where possible. This may be
 	done setting <emphasis>either</emphasis> this parameter to
-	<parameter moreinfo="none">Start_tls</parameter>
+	<parameter moreinfo="none">start tls</parameter>
 	<emphasis>or</emphasis> by specifying <parameter moreinfo="none">ldaps://</parameter> in
         the URL argument of <smbconfoption name="passdb backend"/>.</para>
 
@@ -36,7 +36,7 @@
 	Please note that this parameter does only affect <emphasis>rpc</emphasis>
 	methods. To enable the LDAPv3 StartTLS extended operation (RFC2830) for
 	<emphasis>ads</emphasis>, set
-	<smbconfoption name="ldap ssl">yes</smbconfoption>
+	<smbconfoption name="ldap ssl">start tls</smbconfoption>
 	<emphasis>and</emphasis>
 	<smbconfoption name="ldap ssl ads">yes</smbconfoption>.
 	See <refentrytitle>smb.conf</refentrytitle><manvolnum>5</manvolnum>
diff --git a/lib/async_req/async_sock.c b/lib/async_req/async_sock.c
index c0ad8f3..a9e84d2 100644
--- a/lib/async_req/async_sock.c
+++ b/lib/async_req/async_sock.c
@@ -128,11 +128,21 @@ struct tevent_req *async_connect_send(
 	}
 
 	/*
-	 * The only errno indicating that the connect is still in
-	 * flight is EINPROGRESS, everything else is an error
+	 * The only errno indicating that an initial connect is still
+	 * in flight is EINPROGRESS.
+	 *
+	 * We get EALREADY when someone calls us a second time for a
+	 * given fd and the connect is still in flight (and returned
+	 * EINPROGRESS the first time).
+	 *
+	 * This allows callers like open_socket_out_send() to reuse
+	 * fds and call us with an fd for which the connect is still
+	 * in flight. The proper thing to do for callers would be
+	 * closing the fd and starting from scratch with a fresh
+	 * socket.
 	 */
 
-	if (errno != EINPROGRESS) {
+	if (errno != EINPROGRESS && errno != EALREADY) {
 		tevent_req_error(req, errno);
 		return tevent_req_post(req, ev);
 	}


-- 
Samba Shared Repository



More information about the samba-cvs mailing list