head 1.3; access; symbols pkgsrc-2013Q2:1.3.0.2 pkgsrc-2013Q2-base:1.3 pkgsrc-2012Q4:1.2.0.24 pkgsrc-2012Q4-base:1.2 pkgsrc-2012Q3:1.2.0.22 pkgsrc-2012Q3-base:1.2 pkgsrc-2012Q2:1.2.0.20 pkgsrc-2012Q2-base:1.2 pkgsrc-2012Q1:1.2.0.18 pkgsrc-2012Q1-base:1.2 pkgsrc-2011Q4:1.2.0.16 pkgsrc-2011Q4-base:1.2 pkgsrc-2011Q3:1.2.0.14 pkgsrc-2011Q3-base:1.2 pkgsrc-2011Q2:1.2.0.12 pkgsrc-2011Q2-base:1.2 pkgsrc-2011Q1:1.2.0.10 pkgsrc-2011Q1-base:1.2 pkgsrc-2010Q4:1.2.0.8 pkgsrc-2010Q4-base:1.2 pkgsrc-2010Q3:1.2.0.6 pkgsrc-2010Q3-base:1.2 pkgsrc-2010Q2:1.2.0.4 pkgsrc-2010Q2-base:1.2 pkgsrc-2010Q1:1.2.0.2 pkgsrc-2010Q1-base:1.2 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.3 date 2013.02.05.07.45.51; author wiz; state dead; branches; next 1.2; 1.2 date 2010.03.02.14.56.22; author taca; state Exp; branches; next 1.1; 1.1 date 2010.02.16.16.24.16; author taca; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 2010.02.16.16.24.16; author taca; state Exp; branches; next ; desc @@ 1.3 log @Remove samba30 and samba33, as stated by Aleksej Saushev on Jul 7, 2012. @ text @$NetBSD: patch-aq,v 1.2 2010/03/02 14:56:22 taca Exp $ Add support for: passwd expand gecos state directory --- param/loadparm.c.orig 2010-02-25 09:46:35.000000000 +0000 +++ param/loadparm.c @@@@ -121,6 +121,7 @@@@ struct global { char *szDeletePrinterCommand; char *szOs2DriverMap; char *szLockDir; + char *szStateDir; char *szPidDir; char *szRootdir; char *szDefaultService; @@@@ -297,6 +298,7 @@@@ struct global { bool bUnixPasswdSync; bool bPasswdChatDebug; int iPasswdChatTimeout; + bool bPasswdExpandGecos; bool bTimestampLogs; bool bNTSmbSupport; bool bNTPipeSupport; @@@@ -1248,6 +1250,15 @@@@ static struct parm_struct parm_table[] = .flags = FLAG_ADVANCED, }, { + .label = "passwd expand gecos", + .type = P_BOOL, + .p_class = P_GLOBAL, + .ptr = &Globals.bPasswdExpandGecos, + .special = NULL, + .enum_list = NULL, + .flags = FLAG_ADVANCED, + }, + { .label = "check password script", .type = P_STRING, .p_class = P_GLOBAL, @@@@ -3729,6 +3740,15 @@@@ static struct parm_struct parm_table[] = .flags = FLAG_HIDE, }, { + .label = "state directory", + .type = P_STRING, + .p_class = P_GLOBAL, + .ptr = &Globals.szStateDir, + .special = NULL, + .enum_list = NULL, + .flags = FLAG_ADVANCED + }, + { .label = "pid directory", .type = P_STRING, .p_class = P_GLOBAL, @@@@ -4667,6 +4687,7 @@@@ static void init_globals(bool first_time string_set(&Globals.szPasswdProgram, ""); string_set(&Globals.szPidDir, get_dyn_PIDDIR()); string_set(&Globals.szLockDir, get_dyn_LOCKDIR()); + string_set(&Globals.szStateDir, get_dyn_STATEDIR()); string_set(&Globals.szSocketAddress, "0.0.0.0"); if (asprintf(&s, "Samba %s", SAMBA_VERSION_STRING) < 0) { @@@@ -4759,6 +4780,7 @@@@ static void init_globals(bool first_time Globals.bPamPasswordChange = False; Globals.bPasswdChatDebug = False; Globals.iPasswdChatTimeout = 2; /* 2 second default. */ + Globals.bPasswdExpandGecos = False; Globals.bNTPipeSupport = True; /* Do NT pipes by default. */ Globals.bNTStatusSupport = True; /* Use NT status by default. */ Globals.bStatCache = True; /* use stat cache by default */ @@@@ -4999,6 +5021,7 @@@@ FN_GLOBAL_STRING(lp_addprinter_cmd, &Glo FN_GLOBAL_STRING(lp_deleteprinter_cmd, &Globals.szDeletePrinterCommand) FN_GLOBAL_STRING(lp_os2_driver_map, &Globals.szOs2DriverMap) FN_GLOBAL_STRING(lp_lockdir, &Globals.szLockDir) +FN_GLOBAL_STRING(lp_statedir, &Globals.szStateDir) FN_GLOBAL_STRING(lp_piddir, &Globals.szPidDir) FN_GLOBAL_STRING(lp_mangling_method, &Globals.szManglingMethod) FN_GLOBAL_INTEGER(lp_mangle_prefix, &Globals.mangle_prefix) @@@@ -5178,6 +5201,7 @@@@ FN_GLOBAL_BOOL(lp_pam_password_change, & FN_GLOBAL_BOOL(lp_unix_password_sync, &Globals.bUnixPasswdSync) FN_GLOBAL_BOOL(lp_passwd_chat_debug, &Globals.bPasswdChatDebug) FN_GLOBAL_INTEGER(lp_passwd_chat_timeout, &Globals.iPasswdChatTimeout) +FN_GLOBAL_BOOL(lp_passwd_expand_gecos, &Globals.bPasswdExpandGecos) FN_GLOBAL_BOOL(lp_nt_pipe_support, &Globals.bNTPipeSupport) FN_GLOBAL_BOOL(lp_nt_status_support, &Globals.bNTStatusSupport) FN_GLOBAL_BOOL(lp_stat_cache, &Globals.bStatCache) @ 1.2 log @Update samba33 pacakge to 3.3.11. Changes since 3.3.10 -------------------- o Jeremy Allison * BUG 6557: Fix vfs_full_audit. * BUG 7036: Fix 'net rpc getsid' in hardened Windows environments. * BUG 7045: Fix bad (non memory copying) interfaces in smbc_setXXXX calls. * BUG 7067: Fix failing of smbd to respond to a read or a write caused by Linux asynchronous IO (aio). * BUG 7072: Fix unlocking of accounts from ldap. * BUG 7104: "wide links" and "unix extensions" are incompatible. * BUG 7122: Fix reading of large browselist. * BUG 7154: "mangling method = hash" can crash storing a name containing a '.'. * BUG 7155: Valgrind Conditional jump or move depends on uninitialised value(s) error when "mangling method = hash". o Gunther Deschner * BUG 7043: Fix crash bug in "SMBC_parse_path". o Volker Lendecke * BUG 5626: Fix build on AIX. * BUG 5885: Fix bogus ip address in SWAT. * BUG 7046: Fix a crash in libsmbclient used against the OpenSolaris CIFS server. o Stefan Metzmacher * BUG 7098: Fix results of 'smbclient -L' with a large browse list. * BUG 7170: Fix handling of external domains in setups with one way trusts. o William Jojo * BUG 7052: Fix DFS on AIX (maybe others). o Bo Yang * BUG 7106: Fix malformed require_membership_of_sid. @ text @d1 1 a1 1 $NetBSD: patch-aq,v 1.1.1.1 2010/02/16 16:24:16 taca Exp $ @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD$ d8 1 a8 1 --- param/loadparm.c.orig 2010-01-14 10:12:10.000000000 +0000 a25 9 @@@@ -589,7 +591,7 @@@@ static struct service sDefault = { True, /* bLevel2OpLocks */ False, /* bOnlyUser */ True, /* bMangledNames */ - True, /* bWidelinks */ + False, /* bWidelinks */ True, /* bSymlinks */ False, /* bSyncAlways */ False, /* bStrictAllocate */ @ 1.1.1.1 log @Importing Samba 3.3.10 as net/samba33. This isn't latest release, but diffrence from current package is minimal supported release. Since changes are too huge to write here, please refer each release notes: http://www.samba.org/samba/history/ And this pacakge already contain fix for CVE-2009-3297. @ text @@