Changeset 745 for trunk/server/examples
- Timestamp:
- Nov 27, 2012, 4:43:17 PM (13 years ago)
- Location:
- trunk/server
- Files:
-
- 1 deleted
- 17 edited
- 19 copied
Legend:
- Unmodified
- Added
- Removed
-
trunk/server
- Property svn:mergeinfo changed
/vendor/current merged: 581,587,591,594,597,600,615,618,740
- Property svn:mergeinfo changed
-
trunk/server/examples/LDAP/samba-nds.schema
r414 r745 285 285 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.67 NAME 'sambaRefuseMachinePwdChange' DESC 'Allow Machine Password changes (default: 0 => off)' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 286 286 287 dn: cn=schema 288 changetype: modify 289 add: attributetypes 290 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.70 NAME 'sambaTrustType' DESC 'Type of trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 291 292 dn: cn=schema 293 changetype: modify 294 add: attributetypes 295 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.71 NAME 'sambaTrustAttributes' DESC 'Trust attributes for a trusted domain' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 296 297 dn: cn=schema 298 changetype: modify 299 add: attributetypes 300 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.72 NAME 'sambaTrustDirection' DESC 'Direction of a trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 301 302 dn: cn=schema 303 changetype: modify 304 add: attributetypes 305 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.73 NAME 'sambaTrustPartner' DESC 'Fully qualified name of the domain with which a trust exists' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 306 307 dn: cn=schema 308 changetype: modify 309 add: attributetypes 310 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.74 NAME 'sambaFlatName' DESC 'NetBIOS name of a domain' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 311 312 dn: cn=schema 313 changetype: modify 314 add: attributetypes 315 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.75 NAME 'sambaTrustAuthOutgoing' DESC 'Authentication information for the outgoing portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 316 317 dn: cn=schema 318 changetype: modify 319 add: attributetypes 320 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.76 NAME 'sambaTrustAuthIncoming' DESC 'Authentication information for the incoming portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 321 322 dn: cn=schema 323 changetype: modify 324 add: attributetypes 325 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.77 NAME 'sambaSecurityIdentifier' DESC 'SID of a trusted domain' EQUALITY caseIgnoreIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE ) 326 327 dn: cn=schema 328 changetype: modify 329 add: attributetypes 330 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.78 NAME 'sambaTrustForestTrustInfo' DESC 'Forest trust information for a trusted domain object' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 287 331 288 332 ####################################################################### … … 360 404 add: objectClasses 361 405 objectClasses: ( 1.3.6.1.4.1.7165.2.2.13 NAME 'sambaPrivilege' DESC 'Samba Privilege' SUP top AUXILIARY MUST ( sambaSID ) MAY ( sambaPrivilegeList )) 406 407 dn: cn=schema 408 changetype: modify 409 add: objectClasses 410 objectClasses: ( 1.3.6.1.4.1.7165.2.2.16 NAME 'sambaTrustedDomain' SUP top STRUCTURAL DESC 'Samba Trusted Domain Object' MUST ( cn ) MAY ( sambaTrustType $ sambaTrustAttributes $ sambaTrustDirection $ sambaTrustPartner $ sambaFlatName $ sambaTrustAuthOutgoing $ sambaTrustAuthIncoming $ sambaSecurityIdentifier $ sambaTrustForestTrustInfo ) ) -
trunk/server/examples/LDAP/samba-schema-FDS.ldif
r414 r745 120 120 # 121 121 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.69 NAME 'sambaPreviousClearTextPassword' DESC 'Previous clear text password (used for trusted domain passwords)' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 ) 122 # 123 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.70 NAME 'sambaTrustType' DESC 'Type of trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 124 # 125 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.71 NAME 'sambaTrustAttributes' DESC 'Trust attributes for a trusted domain' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 126 # 127 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.72 NAME 'sambaTrustDirection' DESC 'Direction of a trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 128 # 129 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.73 NAME 'sambaTrustPartner' DESC 'Fully qualified name of the domain with which a trust exists' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 130 # 131 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.74 NAME 'sambaFlatName' DESC 'NetBIOS name of a domain' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 132 # 133 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.75 NAME 'sambaTrustAuthOutgoing' DESC 'Authentication information for the outgoing portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 134 # 135 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.76 NAME 'sambaTrustAuthIncoming' DESC 'Authentication information for the incoming portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 136 # 137 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.77 NAME 'sambaSecurityIdentifier' DESC 'SID of a trusted domain' EQUALITY caseIgnoreIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE ) 138 # 139 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.78 NAME 'sambaTrustForestTrustInfo' DESC 'Forest trust information for a trusted domain object' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 122 140 ## 123 141 ####################################################################### … … 163 181 ## 164 182 objectClasses: ( 1.3.6.1.4.1.7165.2.2.15 NAME 'sambaTrustedDomainPassword' SUP top STRUCTURAL DESC 'Samba Trusted Domain Password' MUST ( sambaDomainName $ sambaSID $ sambaClearTextPassword $ sambaPwdLastSet ) MAY ( sambaPreviousClearTextPassword ) ) 183 ## 184 ## used for IPA_ldapsam 185 ## 186 objectClasses: ( 1.3.6.1.4.1.7165.2.2.16 NAME 'sambaTrustedDomain' SUP top STRUCTURAL DESC 'Samba Trusted Domain Object' MUST ( cn ) MAY ( sambaTrustType $ sambaTrustAttributes $ sambaTrustDirection $ sambaTrustPartner $ sambaFlatName $ sambaTrustAuthOutgoing $ sambaTrustAuthIncoming $ sambaSecurityIdentifier $ sambaTrustForestTrustInfo ) ) -
trunk/server/examples/LDAP/samba-schema-netscapeds5.x
r414 r745 37 37 objectClasses: ( 1.3.6.1.4.1.7165.2.2.9 NAME 'sambaSidEntry' SUP top STRUCTURAL DESC 'Structural Class for a SID' MUST ( sambaSID ) X-ORIGIN 'user defined' ) 38 38 objectClasses: ( 1.3.6.1.4.1.7165.2.2.15 NAME 'sambaTrustedDomainPassword' SUP top STRUCTURAL DESC 'Samba Trusted Domain Password' MUST ( sambaDomainName $ sambaSID $ sambaClearTextPassword $ sambaPwdLastSet ) MAY ( sambaPreviousClearTextPassword ) X-ORIGIN 'user defined') 39 objectClasses: ( 1.3.6.1.4.1.7165.2.2.16 NAME 'sambaTrustedDomain' SUP top STRUCTURAL DESC 'Samba Trusted Domain Object' MUST ( cn ) MAY ( sambaTrustType $ sambaTrustAttributes $ sambaTrustDirection $ sambaTrustPartner $ sambaFlatName $ sambaTrustAuthOutgoing $ sambaTrustAuthIncoming $ sambaSecurityIdentifier $ sambaTrustForestTrustInfo ) X-ORIGIN 'user defined' ) 39 40 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.24 NAME 'sambaLMPassword' DESC 'LanManager Password' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE X-ORIGIN 'user defined' ) 40 41 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.25 NAME 'sambaNTPassword' DESC 'MD4 hash of the unicode password' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE X-ORIGIN 'user defined' ) … … 66 67 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.68 NAME 'sambaClearTextPassword' DESC 'Clear text password (used for trusted domain passwords)' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 X-ORIGIN 'user defined') 67 68 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.69 NAME 'sambaPreviousClearTextPassword' DESC 'Previous clear text password (used for trusted domain passwords)' EQUALITY octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 X-ORIGIN 'user defined') 69 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.70 NAME 'sambaTrustType' DESC 'Type of trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE X-ORIGIN 'user defined' ) 70 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.71 NAME 'sambaTrustAttributes' DESC 'Trust attributes for a trusted domain' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE X-ORIGIN 'user defined' ) 71 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.72 NAME 'sambaTrustDirection' DESC 'Direction of a trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE X-ORIGIN 'user defined' ) 72 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.73 NAME 'sambaTrustPartner' DESC 'Fully qualified name of the domain with which a trust exists' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} X-ORIGIN 'user defined' ) 73 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.74 NAME 'sambaFlatName' DESC 'NetBIOS name of a domain' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} X-ORIGIN 'user defined' ) 74 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.75 NAME 'sambaTrustAuthOutgoing' DESC 'Authentication information for the outgoing portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} X-ORIGIN 'user defined' ) 75 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.76 NAME 'sambaTrustAuthIncoming' DESC 'Authentication information for the incoming portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} X-ORIGIN 'user defined' ) 76 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.77 NAME 'sambaSecurityIdentifier' DESC 'SID of a trusted domain' EQUALITY caseIgnoreIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE X-ORIGIN 'user defined' ) 77 attributeTypes: ( 1.3.6.1.4.1.7165.2.1.78 NAME 'sambaTrustForestTrustInfo' DESC 'Forest trust information for a trusted domain object' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) -
trunk/server/examples/LDAP/samba.schema
r414 r745 470 470 SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 ) 471 471 472 attributetype ( 1.3.6.1.4.1.7165.2.1.70 NAME 'sambaTrustType' 473 DESC 'Type of trust' 474 EQUALITY integerMatch 475 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 476 477 attributetype ( 1.3.6.1.4.1.7165.2.1.71 NAME 'sambaTrustAttributes' 478 DESC 'Trust attributes for a trusted domain' 479 EQUALITY integerMatch 480 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 481 482 attributetype ( 1.3.6.1.4.1.7165.2.1.72 NAME 'sambaTrustDirection' 483 DESC 'Direction of a trust' 484 EQUALITY integerMatch 485 SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 486 487 attributetype ( 1.3.6.1.4.1.7165.2.1.73 NAME 'sambaTrustPartner' 488 DESC 'Fully qualified name of the domain with which a trust exists' 489 EQUALITY caseIgnoreMatch 490 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 491 492 attributetype ( 1.3.6.1.4.1.7165.2.1.74 NAME 'sambaFlatName' 493 DESC 'NetBIOS name of a domain' 494 EQUALITY caseIgnoreMatch 495 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 496 497 attributetype ( 1.3.6.1.4.1.7165.2.1.75 NAME 'sambaTrustAuthOutgoing' 498 DESC 'Authentication information for the outgoing portion of a trust' 499 EQUALITY caseExactMatch 500 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 501 502 attributetype ( 1.3.6.1.4.1.7165.2.1.76 NAME 'sambaTrustAuthIncoming' 503 DESC 'Authentication information for the incoming portion of a trust' 504 EQUALITY caseExactMatch 505 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 506 507 attributetype ( 1.3.6.1.4.1.7165.2.1.77 NAME 'sambaSecurityIdentifier' 508 DESC 'SID of a trusted domain' 509 EQUALITY caseIgnoreIA5Match SUBSTR caseExactIA5SubstringsMatch 510 SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE ) 511 512 attributetype ( 1.3.6.1.4.1.7165.2.1.78 NAME 'sambaTrustForestTrustInfo' 513 DESC 'Forest trust information for a trusted domain object' 514 EQUALITY caseExactMatch 515 SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 472 516 473 517 … … 574 618 ## MUST ( sambaSID ) 575 619 ## MAY ( sambaPrivilegeList ) ) 620 621 ## 622 ## used for IPA_ldapsam 623 ## 624 objectclass ( 1.3.6.1.4.1.7165.2.2.16 NAME 'sambaTrustedDomain' SUP top STRUCTURAL 625 DESC 'Samba Trusted Domain Object' 626 MUST ( cn ) 627 MAY ( sambaTrustType $ sambaTrustAttributes $ sambaTrustDirection $ 628 sambaTrustPartner $ sambaFlatName $ sambaTrustAuthOutgoing $ 629 sambaTrustAuthIncoming $ sambaSecurityIdentifier $ 630 sambaTrustForestTrustInfo) ) -
trunk/server/examples/LDAP/samba.schema.at.IBM-DS
r414 r745 1 ## Samba 3.0 schema for IBM Directory Server 5.1 - object classes only1 ## Samba 3.0 schema for IBM Directory Server 5.1 - attribute Types only 2 2 3 3 attributetypes=( 1.3.6.1.4.1.7165.2.1.24 NAME 'sambaLMPassword' DESC 'LanManager Password' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{32} SINGLE-VALUE ) … … 51 51 attributetypes=( 1.3.6.1.4.1.7165.2.1.42 NAME 'sambaOptionName' DESC 'Option Name' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} ) 52 52 53 attributetypes=( 1.3.6.1.4.1.7165.2.1.43 NAME 'sambaBoolOption' DESC 'A boolean option' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE )53 attributetypes=( 1.3.6.1.4.1.7165.2.1.43 NAME 'sambaBoolOption' DESC 'A boolean option' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALUE ) 54 54 55 55 attributetypes=( 1.3.6.1.4.1.7165.2.1.44 NAME 'sambaIntegerOption' DESC 'An integer option' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) … … 69 69 attributetypes=( 1.3.6.1.4.1.7165.2.1.53 NAME 'sambaTrustFlags' DESC 'Trust Password Flags' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 ) 70 70 71 attributetypes=( 1.3.6.1.4.1.7165.2.1.54 NAME 'sambaPasswordHistory' DESC 'Concatenated MD4 hashes of the unicode passwords used on this account' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{ 32} )71 attributetypes=( 1.3.6.1.4.1.7165.2.1.54 NAME 'sambaPasswordHistory' DESC 'Concatenated MD4 hashes of the unicode passwords used on this account' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} ) 72 72 IBMAttributetypes=( 1.3.6.1.4.1.7165.2.1.54 DBNAME( 'sambaPasswordHistory' 'sambaPasswordHistory' ) ACCESS-CLASS critical ) 73 73 … … 94 94 attributetypes=( 1.3.6.1.4.1.7165.2.1.67 NAME 'sambaRefuseMachinePwdChange' DESC 'Allow Machine Password changes (default: 0 => off)' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 95 95 96 attributetypes=( 1.3.6.1.4.1.7165.2.1.70 NAME 'sambaTrustType' DESC 'Type of trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 97 98 attributetypes=( 1.3.6.1.4.1.7165.2.1.71 NAME 'sambaTrustAttributes' DESC 'Trust attributes for a trusted domain' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 99 100 attributetypes=( 1.3.6.1.4.1.7165.2.1.72 NAME 'sambaTrustDirection' DESC 'Direction of a trust' EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) 101 102 attributetypes=( 1.3.6.1.4.1.7165.2.1.73 NAME 'sambaTrustPartner' DESC 'Fully qualified name of the domain with which a trust exists' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 103 104 attributetypes=( 1.3.6.1.4.1.7165.2.1.74 NAME 'sambaFlatName' DESC 'NetBIOS name of a domain' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) 105 106 attributetypes=( 1.3.6.1.4.1.7165.2.1.75 NAME 'sambaTrustAuthOutgoing' DESC 'Authentication information for the outgoing portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 107 108 attributetypes=( 1.3.6.1.4.1.7165.2.1.76 NAME 'sambaTrustAuthIncoming' DESC 'Authentication information for the incoming portion of a trust' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) 109 110 attributetypes=( 1.3.6.1.4.1.7165.2.1.77 NAME 'sambaSecurityIdentifier' DESC 'SID of a trusted domain' EQUALITY caseIgnoreIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{64} SINGLE-VALUE ) 111 112 attributetypes=( 1.3.6.1.4.1.7165.2.1.78 NAME 'sambaTrustForestTrustInfo' DESC 'Forest trust information for a trusted domain object' EQUALITY caseExactMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1050} ) -
trunk/server/examples/LDAP/samba.schema.oc.IBM-DS
r414 r745 20 20 21 21 objectclasses=( 1.3.6.1.4.1.7165.2.2.14 NAME 'sambaTrustPassword' SUP top STRUCTURAL DESC 'Samba Trust Password' MUST ( sambaDomainName $ sambaNTPassword $ sambaTrustFlags ) MAY ( sambaSID $ sambaPwdLastSet )) 22 23 objectclasses=( 1.3.6.1.4.1.7165.2.2.16 NAME 'sambaTrustedDomain' SUP top STRUCTURAL DESC 'Samba Trusted Domain Object' MUST ( cn ) MAY ( sambaTrustType $ sambaTrustAttributes $ sambaTrustDirection $ sambaTrustPartner $ sambaFlatName $ sambaTrustAuthOutgoing $ sambaTrustAuthIncoming $ sambaSecurityIdentifier $ sambaTrustForestTrustInfo ) ) -
trunk/server/examples/VFS/shadow_copy_test.c
r414 r745 20 20 21 21 #include "includes.h" 22 #include "ntioctl.h" 23 #include "smbd/proto.h" 22 24 23 25 #undef DBGC_CLASS … … 51 53 */ 52 54 53 static int test_get_shadow_copy_data(vfs_handle_struct *handle, files_struct *fsp, SHADOW_COPY_DATA *shadow_copy_data, bool labels) 55 static int test_get_shadow_copy_data(vfs_handle_struct *handle, 56 files_struct *fsp, 57 struct shadow_copy_data *shadow_copy_data, 58 bool labels) 54 59 { 55 60 uint32 num = 3; … … 60 65 if (labels) { 61 66 if (num) { 62 shadow_copy_data->labels = TALLOC_ZERO_ARRAY(shadow_copy_data ->mem_ctx,SHADOW_COPY_LABEL,num);67 shadow_copy_data->labels = TALLOC_ZERO_ARRAY(shadow_copy_data,SHADOW_COPY_LABEL,num); 63 68 } else { 64 69 shadow_copy_data->labels = NULL; … … 82 87 NTSTATUS vfs_shadow_copy_test_init(void) 83 88 { 84 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "shadow_copy_test", &vfs_test_shadow_copy_fns); 89 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, 90 "shadow_copy_test", 91 &vfs_test_shadow_copy_fns); 85 92 } -
trunk/server/examples/VFS/skel_opaque.c
r414 r745 24 24 25 25 #include "includes.h" 26 #include "smbd/proto.h" 26 27 27 28 /* PLEASE,PLEASE READ THE VFS MODULES CHAPTER OF THE … … 66 67 } 67 68 68 static int skel_get_shadow_copy_data(vfs_handle_struct *handle, files_struct *fsp, SHADOW_COPY_DATA*shadow_copy_data, bool labels)69 static int skel_get_shadow_copy_data(vfs_handle_struct *handle, files_struct *fsp, struct shadow_copy_data *shadow_copy_data, bool labels) 69 70 { 70 71 errno = ENOSYS; … … 84 85 85 86 static SMB_STRUCT_DIR *skel_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr) 87 { 88 return NULL; 89 } 90 91 static SMB_STRUCT_DIR *skel_fdopendir(vfs_handle_struct *handle, files_struct *fsp, const char *mask, uint32 attr) 86 92 { 87 93 return NULL; … … 151 157 uint32_t oplock_request, 152 158 uint64_t allocation_size, 159 uint32_t private_flags, 153 160 struct security_descriptor *sd, 154 161 struct ea_list *ea_list, … … 308 315 } 309 316 317 static int skel_fallocate(vfs_handle_struct *handle, files_struct *fsp, 318 enum vfs_fallocate_mode mode, 319 SMB_OFF_T offset, SMB_OFF_T len) 320 { 321 errno = ENOSYS; 322 return -1; 323 } 324 310 325 static bool skel_lock(vfs_handle_struct *handle, files_struct *fsp, int op, SMB_OFF_T offset, SMB_OFF_T count, int type) 311 326 { … … 356 371 } 357 372 358 static char *skel_realpath(vfs_handle_struct *handle, const char *path , char *resolved_path)373 static char *skel_realpath(vfs_handle_struct *handle, const char *path) 359 374 { 360 375 errno = ENOSYS; … … 464 479 465 480 static NTSTATUS skel_fget_nt_acl(vfs_handle_struct *handle, files_struct *fsp, 466 uint32 security_info, SEC_DESC**ppdesc)481 uint32 security_info, struct security_descriptor **ppdesc) 467 482 { 468 483 return NT_STATUS_NOT_IMPLEMENTED; … … 470 485 471 486 static NTSTATUS skel_get_nt_acl(vfs_handle_struct *handle, 472 const char *name, uint32 security_info, SEC_DESC**ppdesc)487 const char *name, uint32 security_info, struct security_descriptor **ppdesc) 473 488 { 474 489 return NT_STATUS_NOT_IMPLEMENTED; … … 476 491 477 492 static NTSTATUS skel_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, 478 uint32 security_info_sent, const SEC_DESC*psd)493 uint32 security_info_sent, const struct security_descriptor *psd) 479 494 { 480 495 return NT_STATUS_NOT_IMPLEMENTED; … … 747 762 } 748 763 749 static bool skel_is_offline(struct vfs_handle_struct *handle, const char *path, SMB_STRUCT_STAT *sbuf)764 static bool skel_is_offline(struct vfs_handle_struct *handle, const struct smb_filename *fname, SMB_STRUCT_STAT *sbuf) 750 765 { 751 766 errno = ENOSYS; … … 753 768 } 754 769 755 static int skel_set_offline(struct vfs_handle_struct *handle, const char *path)770 static int skel_set_offline(struct vfs_handle_struct *handle, const struct smb_filename *fname) 756 771 { 757 772 errno = ENOSYS; … … 776 791 777 792 .opendir = skel_opendir, 793 .fdopendir = skel_fdopendir, 778 794 .readdir = skel_readdir, 779 795 .seekdir = skel_seekdir, … … 787 803 /* File operations */ 788 804 789 .open = skel_open,805 .open_fn = skel_open, 790 806 .create_file = skel_create_file, 791 807 .close_fn = skel_close_fn, … … 813 829 .ntimes = skel_ntimes, 814 830 .ftruncate = skel_ftruncate, 831 .fallocate = skel_fallocate, 815 832 .lock = skel_lock, 816 833 .kernel_flock = skel_kernel_flock, -
trunk/server/examples/VFS/skel_transparent.c
r414 r745 24 24 25 25 #include "includes.h" 26 #include "smbd/proto.h" 26 27 27 28 /* PLEASE,PLEASE READ THE VFS MODULES CHAPTER OF THE … … 65 66 } 66 67 67 static int skel_get_shadow_copy_data(vfs_handle_struct *handle, files_struct *fsp, SHADOW_COPY_DATA*shadow_copy_data, bool labels)68 static int skel_get_shadow_copy_data(vfs_handle_struct *handle, files_struct *fsp, struct shadow_copy_data *shadow_copy_data, bool labels) 68 69 { 69 70 return SMB_VFS_NEXT_GET_SHADOW_COPY_DATA(handle, fsp, shadow_copy_data, labels); … … 83 84 { 84 85 return SMB_VFS_NEXT_OPENDIR(handle, fname, mask, attr); 86 } 87 88 static SMB_STRUCT_DIR *skel_fdopendir(vfs_handle_struct *handle, files_struct *fsp, const char *mask, uint32 attr) 89 { 90 return SMB_VFS_NEXT_FDOPENDIR(handle, fsp, mask, attr); 85 91 } 86 92 … … 144 150 uint32_t oplock_request, 145 151 uint64_t allocation_size, 152 uint32_t private_flags, 146 153 struct security_descriptor *sd, 147 154 struct ea_list *ea_list, … … 160 167 oplock_request, 161 168 allocation_size, 169 private_flags, 162 170 sd, 163 171 ea_list, … … 291 299 } 292 300 301 static int skel_fallocate(vfs_handle_struct *handle, files_struct *fsp, 302 enum vfs_fallocate_mode mode, 303 SMB_OFF_T offset, 304 SMB_OFF_T len) 305 { 306 return SMB_VFS_NEXT_FALLOCATE(handle, fsp, mode, offset, len); 307 } 308 293 309 static bool skel_lock(vfs_handle_struct *handle, files_struct *fsp, int op, SMB_OFF_T offset, SMB_OFF_T count, int type) 294 310 { … … 331 347 } 332 348 333 static char *skel_realpath(vfs_handle_struct *handle, const char *path , char *resolved_path)334 { 335 return SMB_VFS_NEXT_REALPATH(handle, path , resolved_path);349 static char *skel_realpath(vfs_handle_struct *handle, const char *path) 350 { 351 return SMB_VFS_NEXT_REALPATH(handle, path); 336 352 } 337 353 … … 454 470 455 471 static NTSTATUS skel_fget_nt_acl(vfs_handle_struct *handle, files_struct *fsp, 456 uint32 security_info, SEC_DESC**ppdesc)472 uint32 security_info, struct security_descriptor **ppdesc) 457 473 { 458 474 return SMB_VFS_NEXT_FGET_NT_ACL(handle, fsp, security_info, ppdesc); … … 460 476 461 477 static NTSTATUS skel_get_nt_acl(vfs_handle_struct *handle, 462 const char *name, uint32 security_info, SEC_DESC**ppdesc)478 const char *name, uint32 security_info, struct security_descriptor **ppdesc) 463 479 { 464 480 return SMB_VFS_NEXT_GET_NT_ACL(handle, name, security_info, ppdesc); … … 466 482 467 483 static NTSTATUS skel_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, 468 uint32 security_info_sent, const SEC_DESC*psd)484 uint32 security_info_sent, const struct security_descriptor *psd) 469 485 { 470 486 return SMB_VFS_NEXT_FSET_NT_ACL(handle, fsp, security_info_sent, psd); … … 692 708 } 693 709 694 static bool skel_is_offline(struct vfs_handle_struct *handle, const char *path, SMB_STRUCT_STAT *sbuf)695 { 696 return SMB_VFS_NEXT_IS_OFFLINE(handle, path, sbuf);697 } 698 699 static int skel_set_offline(struct vfs_handle_struct *handle, const char *path)700 { 701 return SMB_VFS_NEXT_SET_OFFLINE(handle, path);710 static bool skel_is_offline(struct vfs_handle_struct *handle, const struct smb_filename *fname, SMB_STRUCT_STAT *sbuf) 711 { 712 return SMB_VFS_NEXT_IS_OFFLINE(handle, fname, sbuf); 713 } 714 715 static int skel_set_offline(struct vfs_handle_struct *handle, const struct smb_filename *fname) 716 { 717 return SMB_VFS_NEXT_SET_OFFLINE(handle, fname); 702 718 } 703 719 … … 719 735 720 736 .opendir = skel_opendir, 737 .fdopendir = skel_fdopendir, 721 738 .readdir = skel_readdir, 722 739 .seekdir = skel_seekdir, … … 730 747 /* File operations */ 731 748 732 .open = skel_open,749 .open_fn = skel_open, 733 750 .create_file = skel_create_file, 734 751 .close_fn = skel_close_fn, … … 756 773 .ntimes = skel_ntimes, 757 774 .ftruncate = skel_ftruncate, 775 .fallocate = skel_fallocate, 758 776 .lock = skel_lock, 759 777 .kernel_flock = skel_kernel_flock, -
trunk/server/examples/libsmbclient/testctx.c
r414 r745 1 1 #include <libsmbclient.h> 2 #include <stdlib.h> 3 #include <stdio.h> 2 4 3 5 void create_and_destroy_context (void) 4 6 { 7 int i; 5 8 SMBCCTX *ctx; 6 9 ctx = smbc_new_context (); 10 /* Both should do the same thing */ 11 smbc_setOptionDebugToStderr(ctx, 1); 12 smbc_option_set(ctx, "debug_to_stderr", 1); 13 smbc_setDebug(ctx, 1); 14 i = smbc_getDebug(ctx); 15 if (i != 1) { 16 printf("smbc_getDebug() did not return debug level set\n"); 17 exit(1); 18 } 19 if (!smbc_getOptionDebugToStderr(ctx)) { 20 printf("smbc_setOptionDebugToStderr() did not stick\n"); 21 exit(1); 22 } 7 23 smbc_init_context (ctx); 8 9 24 smbc_free_context (ctx, 1); 10 25 } -
trunk/server/examples/libsmbclient/teststat2.c
r414 r745 9 9 * This test is intended to ensure that the timestamps returned by 10 10 * libsmbclient are the same as timestamps returned by the local system. To 11 * test this, we assume a working Samba environment, and a nd access the same11 * test this, we assume a working Samba environment, and access the same 12 12 * file via SMB and locally (or NFS). 13 13 * -
trunk/server/examples/pdb/test.c
r414 r745 68 68 **************************************************************************/ 69 69 70 static NTSTATUS testsam_getsampwsid (struct pdb_methods *methods, struct samu *user, const DOM_SID*sid)70 static NTSTATUS testsam_getsampwsid (struct pdb_methods *methods, struct samu *user, const struct dom_sid *sid) 71 71 { 72 72 DEBUG(10, ("testsam_getsampwsid called\n")); -
trunk/server/examples/perfcounter/perf.h
r414 r745 21 21 #ifndef __PERF_H__ 22 22 #define __PERF_H__ 23 24 #define _PUBLIC_ 25 26 #ifdef HAVE_STDBOOL_H 27 #include <stdbool.h> 28 #endif 29 30 #if !defined(HAVE_BOOL) 31 #ifdef HAVE__Bool 32 #define bool _Bool 33 #else 34 typedef int bool; 35 #endif 36 #endif 37 23 38 24 39 #include <stdlib.h> -
trunk/server/examples/printing/smbprint
r414 r745 82 82 fi 83 83 84 if [ "x$username" = ="x" ] ; then84 if [ "x$username" = "x" ] ; then 85 85 username="$server"; 86 86 fi … … 144 144 set -x; exec >>$debugfile 2>&1 145 145 debugargs="$debugfile." 146 #[ "x$debugsmb" = ="x" ] || debugargs="$debugargs -d $debugsmb"146 #[ "x$debugsmb" = "x" ] || debugargs="$debugargs -d $debugsmb" 147 147 fi 148 148 fi -
trunk/server/examples/scripts/shares/python/smbparm.py
r414 r745 354 354 "PANICACTION" : ("panic action", SambaParmString, P_GLOBAL, ""), 355 355 "LDAPMACHINESUFFIX" : ("ldap machine suffix", SambaParmString, P_GLOBAL, ""), 356 "UPDATEENCRYPTED" : ("update encrypted", SambaParmBool, P_GLOBAL, "No"),357 356 "MAXTTL" : ("max ttl", SambaParmString, P_GLOBAL, "259200"), 358 357 "WRITABLE" : ("read only", SambaParmBoolRev, P_LOCAL, "Yes"), -
trunk/server/examples/scripts/users_and_groups/createdomobj.pl
r414 r745 40 40 my $num_targets = 1; 41 41 my $startnum; # if empty, don't add numbers to prefix 42 my $prefix = $target_type;# name-prefix42 my $prefix; # name-prefix 43 43 my $path; # path to rpcclient command 44 44 my $rpccli_path = $rpccli_cmd; … … 103 103 if (exists($options{p})) { 104 104 $prefix = $options{p}; 105 } else { 106 $prefix = $target_type; 105 107 } 106 108
Note:
See TracChangeset
for help on using the changeset viewer.