[SCM] Samba Shared Repository - annotated tag samba-4.15.0rc1 created

Karolin Seeger kseeger at samba.org
Thu Jul 15 08:53:26 UTC 2021


The annotated tag, samba-4.15.0rc1 has been created
        at  d3c94a1c4139d35d4d700f24a7f8ea8f6331f27d (tag)
   tagging  6a6f60447719d274011bd9575403f2fb0099ca91 (commit)
  replaces  ldb-2.4.0
 tagged by  Karolin Seeger
        on  Thu Jul 15 10:52:04 2021 +0200

- Log -----------------------------------------------------------------
samba: tag release samba-4.15.0rc1
-----BEGIN PGP SIGNATURE-----

iQIzBAABCgAdFiEEgfXigyvSVFoYl7cTqplEL7aAtiAFAmDv9zQACgkQqplEL7aA
tiAScg/8DPnmSVPkFqcA9O6ijC0iP7Aj8ECoOJNEMcOsrEXK0Vgu0o4B7+5lf8kb
AN6pEEyYQokfXR0noEmSkVhtEkf8kLC9ayAMzpxQCEWiwf2949C8YQ2CgCrLrCGm
kIoSlQdGsJQjDbqlwvZFatDaR0fjGlDHycgzT/IfvaCskwWnKo5JjxrUZmGSgpv3
Tg04NQZiieJf09j88qhXIot9gjUQdnuy5ws06b2+QnnRbZWz8edW9M8ybzQ2hBk/
mow7M1Rz1CdTejqryFg2d9zbQ8RPfvykiowm5+nUDjdiqtYq178DIY8EJNcrrl88
ShI0TYHm/KI5a+1/PZKovzF1KiDcSGyxSIQRJOb4+SI/VuIs9x0vFSceANZsuJYV
iXB8stlyd2z2snzQjIbC3buDbBnLwjqFbsJZq9vPhRMpHdclFGsbZw1sTU2e/IB5
l6nIspUbtUjoAWDYs56aTkiabz0BWrXF2U+mZh61CfPdoGGfPHV/s410BKfxhBlb
V3481YCsMlMCWkVpyAQx8AezF+KPvPRD5kUFTKqUiT3D23M5YbS3cVTB3LQsKgWQ
ONSDGmastuIk4HuQ5th6DZxkSOKVAMlUEEwjw/UGSWfuKJS2eBM91qMF1sAAGT0p
vrSIuGkzU6XPLhJiHB6SE/GoT9naiPhK4NfnOPUk8ggt/IP8iRg=
=ZMh0
-----END PGP SIGNATURE-----

Jeremy Allison (7):
      s3: tests: Our tests for "smbd async dosmode = yes" haven't been working correctly as the parameter has been set incorrectly.
      s3: tests: Add "SMB2-LIST-DIR-ASYNC" test.
      s3: smbd: Allow "smbd async dosmode = yes" to return valid DOS attributes again.
      s3: VFS: default: Move vfswrap_fgetxattr() before the async versions.
      s3: VFS: default: Add 'handle' member to struct vfswrap_getxattrat_state
      s3: VFS: default. In vfswrap_getxattrat_do_sync() always use the pathref fsp.
      s3: VFS: default. In vfswrap_getxattrat_do_async() always use the pathref fsp.

Karolin Seeger (3):
      WHATSNEW: Fix typos.
      WHATSNEW: Up to Samba 4.15.0rc1.
      VERSION: Disable GIT_SNAPSHOT for the Samba 4.15.0rc1 release.

Stefan Metzmacher (61):
      s3:tests: use SAMBA_DEPRECATED_SUPPRESS=1 for backbox tests
      selftest: use SAMBA_DEPRECATED_SUPPRESS=1 for all tests
      s4:torture:libsmbclient: make use of PROTOCOL_* enum values instead of of hardcoded int values
      libcli/smb: no longer use experimental dialects 2.2.2, 2.2.4, 3.1.0 on the wire
      smb2_negprot: no longer use experimental dialects 2.2.2, 2.2.4, 3.1.0 on the wire
      s3:torture: replace PROTOCOL_SMB2_22 with PROTOCOL_SMB3_00
      s3:smbd: replace PROTOCOL_SMB2_22 with PROTOCOL_SMB3_00
      libcli/smb: replace PROTOCOL_SMB2_22 with PROTOCOL_SMB3_00
      docs-xml: remove support for "SMB2_22"
      libcli/smb: remove unused PROTOCOL_SMB2_22 definition
      s3:smbd: replace PROTOCOL_SMB2_24 with PROTOCOL_SMB3_00
      libcli/smb: replace PROTOCOL_SMB2_24 with PROTOCOL_SMB3_00
      docs-xml: remove support for "SMB2_24"
      libcli/smb: remove unused PROTOCOL_SMB2_24 definition
      s3:smbd: replace PROTOCOL_SMB3_10 with PROTOCOL_SMB3_11
      libcli/smb: replace PROTOCOL_SMB3_10 with PROTOCOL_SMB3_11
      docs-xml: remove support for "SMB3_10"
      libcli/smb: remove unused PROTOCOL_SMB3_10 definition
      WHATSNEW: document the removal of SMB2_22, SMB2_24 and SMB3_10
      s4:torture: let smb2.session.bind_negative_* also test without session keys
      s4:torture: let smb2.session.bind_negative_* tests also use a different client guid
      s3:smbd: let smb2srv_session_lookup_global() clear the signing/encryption_flags
      s3:smbd: fix a NULL pointer deference caused by smb2srv_update_crypto_flags()
      s3:smbd: make sure smbXsrv_session_update() doesn't segfault with table == NULL
      s3:smbd: remove dead code from smbd_smb2_request_dispatch()
      s3:smbd: fallback to smb2srv_session_lookup_global() for session setups with failed signing
      lib/param: add lpcfg_parm_is_unspecified() helper
      lib/param: enable "server multi channel support" by default on Linux and FreeBSD
      WHATNEW: document "server multi channel support" change
      smb2_negprot: make use of struct smb311_capabilities.encryption
      docs-xml: add "client/server smb3 encryption algorithms" options
      libcli/smb: add helpers to parse client/server smb3 encryption algorithms into struct smb311_capabilities
      s3:libsmb: make use of 'client smb3 encryption algorithms'
      s4:param: make use of 'client smb3 encryption algorithms'
      s3:smbd: make use of 'server smb3 encryption algorithms'
      libcli/smb: let 'client smb3 encryption algorithms' disable aes-128-ccm for SMB3_0*
      libcli/smb: add smb311_capabilities_check() helper
      s3:smbd: let 'server smb3 encryption algorithms' disable aes-128-ccm for SMB3_0*
      libcli/smb: add aes-256-{gcm,ccm} support to smb2_signing_[en|de]crypt_pdu()
      lib/param: offer aes-256-{gcm,ccm} encryption by default
      libcli/smb: add SMB2_TRANSPORT_CAPABILITIES related defines to smb2_constants.h
      libcli/smb: add SMB2_RDMA_TRANSFORM_CAPABILITIES related defines to smb2_constants.h
      libcli/smb: add SMB2_SIGNING_CAPABILITIES related defines to smb2_constants.h
      s3:smbd: only allow cancel with the same session
      s3:smbstatus: pretty print the use of new signing/encryption algorithms
      s3:smbd: make sure STATUS_PENDING responses are never signed
      s3:smbd: make sure we don't try to sign CANCEL response PDUs
      libcli/smb: add smb2cli_conn_server_{signing,encryption}_algo()
      libcli/smb: skip session setup signing for REQUEST_OUT_OF_SEQUENCE, NOT_SUPPORTED and ACCESS_DENIED
      libcli/smb: make sure we always send a valid MID in cancel PDUs
      libcli/smb: make sure smb2_signing_calc_signature() never generates a signature without a valid MID
      libcli/smb: prepare support for SMB2_SIGNING_CAPABILITIES negotiation
      s3:smbd: prepare support for SMB2_SIGNING_CAPABILITIES
      docs-xml: add "client/server smb3 signing algorithms" options
      libcli/smb: actually make use of "client/server smb3 signing algorithms"
      s4:torture: force AES_CMAC or HMAC_SHA256 for some SMB 3.1.1 tests
      libcli/smb: add support for SMB2_SIGNING_AES128_GMAC
      docs-xml: offer aes-128-gmac by default
      s4:torture: more smb2.session.bind_negative_smb3* combinations
      s3:smbd: improve the error returns for invalid session binding requests
      WHATSNEW: add client/server smb3 signing/encryption algorithms

-----------------------------------------------------------------------


-- 
Samba Shared Repository



More information about the samba-cvs mailing list