autobuild: intermittent test failure detected

2013-07-19 Thread autobuild
The autobuild test system has detected an intermittent failing test in 
the current master tree.

The autobuild log of the failure is available here:

   http://git.samba.org/autobuild.flakey/2013-07-19-1145/flakey.log

The samba3 build logs are available here:

   http://git.samba.org/autobuild.flakey/2013-07-19-1145/samba3.stderr
   http://git.samba.org/autobuild.flakey/2013-07-19-1145/samba3.stdout

The source4 build logs are available here:

   http://git.samba.org/autobuild.flakey/2013-07-19-1145/samba.stderr
   http://git.samba.org/autobuild.flakey/2013-07-19-1145/samba.stdout
  
The top commit at the time of the failure was:

commit 51c68c28b27cd1644187af32cc4f630a7471cd28
Author: Shekhar Amlekar samle...@in.ibm.com
Date:   Thu Jul 11 21:12:29 2013 +0530

librpc: srvsvc.idl: define level 1005 share info flags

define level 1005 share info flags.

Reviewed-by: Günther Deschner g...@samba.org

Autobuild-User(master): Günther Deschner g...@samba.org
Autobuild-Date(master): Thu Jul 18 16:35:51 CEST 2013 on sn-devel-104


[SCM] Samba Shared Repository - branch master updated

2013-07-19 Thread Andrew Bartlett
The branch, master has been updated
   via  bb21fc5 Add torture tests to raw.eas to check sending Windows 
invalid names in the middle of an EA list.
   via  5d54ac4 Reply with correct trans2 message on a setpathinfo with a 
bad EA name.
   via  b50b006 Ensure we do pathname processing before SD and EA 
processing in NTTRANS_CREATE.
   via  4a43600 Ensure we can't create a file using NTTRANS with an invalid 
EA list.
   via  66fb5ee Ensure we can't create a file using TRANS2_OPEN with an 
invalid EA list.
   via  fe542fc Add error map of STATUS_INVALID_EA_NAME - ERRDOS, 
ERRbadfile
   via  50a288c Add the ability to send an NTSTATUS result back with a 
trans2 reply so we can return a parameter block with an error code.
   via  21c9296 Ensure we can't create a file using SMB2_CREATE with an 
invalid EA list.
   via  66e7b15 Ensure we never return an EA name to a Windows client it 
can't handle.
   via  f246d69 Ensure set_ea cannot set invalid Windows EA names.
   via  1766f9e Add ea_list_has_invalid_name() function.
  from  51c68c2 librpc: srvsvc.idl: define level 1005 share info flags

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -
commit bb21fc51e42c830d7fab4e89d83f8ef4d122fa1a
Author: Jeremy Allison j...@samba.org
Date:   Tue Jul 9 16:37:48 2013 -0700

Add torture tests to raw.eas to check sending Windows invalid names in the 
middle of an EA list.

Add torture tests to probe the set of invalid
Windows EA names.

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

Autobuild-User(master): Andrew Bartlett abart...@samba.org
Autobuild-Date(master): Fri Jul 19 11:50:25 CEST 2013 on sn-devel-104

commit 5d54ac414f2130fcbd434b7c96e1efe4a22cc1ff
Author: Jeremy Allison j...@samba.org
Date:   Tue Jul 16 09:14:12 2013 -0700

Reply with correct trans2 message on a setpathinfo with a bad EA name.

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

commit b50b006ace92bb0781173b1244e84ae7bf64732f
Author: Jeremy Allison j...@samba.org
Date:   Tue Jul 16 11:05:10 2013 -0700

Ensure we do pathname processing before SD and EA processing in 
NTTRANS_CREATE.

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

commit 4a4360070589a314667166f86c395878659123e1
Author: Jeremy Allison j...@samba.org
Date:   Tue Jul 9 15:54:39 2013 -0700

Ensure we can't create a file using NTTRANS with an invalid EA list.

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

commit 66fb5eeb968e12049381337d7c01401815537a34
Author: Jeremy Allison j...@samba.org
Date:   Tue Jul 9 15:59:53 2013 -0700

Ensure we can't create a file using TRANS2_OPEN with an invalid EA list.

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

commit fe542fc170053a370092fcf442075dc44189f23e
Author: Jeremy Allison j...@samba.org
Date:   Wed Jul 10 12:18:36 2013 -0700

Add error map of STATUS_INVALID_EA_NAME - ERRDOS, ERRbadfile

(from Windows2012 tests).

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

commit 50a288cb6a9bfff1d16cf488bbc0eedcb6ad4602
Author: Jeremy Allison j...@samba.org
Date:   Wed Jul 10 12:38:41 2013 -0700

Add the ability to send an NTSTATUS result back with a trans2 reply so we 
can return a parameter block with an error code.

This is needed when returning a STATUS_INVALID_NAME result (tested
from Windows 2012).

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

commit 21c92969b8d0ad7a77028d24c5b3fea63264e473
Author: Jeremy Allison j...@samba.org
Date:   Tue Jul 9 16:02:50 2013 -0700

Ensure we can't create a file using SMB2_CREATE with an invalid EA list.

Bug 9992 - Windows error 0x800700FE when copying files with xattr names 
containing :

Signed-off-by: Jeremy Allison j...@samba.org

Reviewed-by: Andrew Bartlett abart...@samba.org

commit 

[SCM] Samba Shared Repository - branch master updated

2013-07-19 Thread Günther Deschner
The branch, master has been updated
   via  44429f9 s3-printing: avoid KRB5CCNAME overwrite in printer 
publishing (Bug #7444).
  from  bb21fc5 Add torture tests to raw.eas to check sending Windows 
invalid names in the middle of an EA list.

http://gitweb.samba.org/?p=samba.git;a=shortlog;h=master


- Log -
commit 44429f948b72e7bcf968da492592c57864f211c7
Author: Günther Deschner g...@samba.org
Date:   Fri Jul 19 15:10:05 2013 +0200

s3-printing: avoid KRB5CCNAME overwrite in printer publishing (Bug #7444).

Guenther

Signed-off-by: Günther Deschner g...@samba.org
Reviewed-by: Andreas Schneider a...@samba.org

Autobuild-User(master): Günther Deschner g...@samba.org
Autobuild-Date(master): Fri Jul 19 17:53:08 CEST 2013 on sn-devel-104

---

Summary of changes:
 source3/printing/nt_printing_ads.c |   13 +
 1 files changed, 13 insertions(+), 0 deletions(-)


Changeset truncated at 500 lines:

diff --git a/source3/printing/nt_printing_ads.c 
b/source3/printing/nt_printing_ads.c
index dcd31b7..5d5f564 100644
--- a/source3/printing/nt_printing_ads.c
+++ b/source3/printing/nt_printing_ads.c
@@ -417,6 +417,7 @@ WERROR nt_printer_publish(TALLOC_CTX *mem_ctx,
ADS_STATUS ads_rc;
ADS_STRUCT *ads = NULL;
WERROR win_rc;
+   char *old_krb5ccname = NULL;
 
sinfo2 = talloc_zero(mem_ctx, struct spoolss_SetPrinterInfo2);
if (!sinfo2) {
@@ -454,6 +455,7 @@ WERROR nt_printer_publish(TALLOC_CTX *mem_ctx,
win_rc = WERR_SERVER_UNAVAILABLE;
goto done;
}
+   old_krb5ccname = getenv(KRB5_ENV_CCNAME);
setenv(KRB5_ENV_CCNAME, MEMORY:prtpub_cache, 1);
SAFE_FREE(ads-auth.password);
ads-auth.password = secrets_fetch_machine_password(lp_workgroup(),
@@ -479,6 +481,11 @@ WERROR nt_printer_publish(TALLOC_CTX *mem_ctx,
 
 done:
ads_destroy(ads);
+   ads_kdestroy(MEMORY:prtpub_cache);
+   unsetenv(KRB5_ENV_CCNAME);
+   if (old_krb5ccname) {
+   setenv(KRB5_ENV_CCNAME, old_krb5ccname, 0);
+   }
return win_rc;
 }
 
@@ -493,6 +500,7 @@ WERROR check_published_printers(struct messaging_context 
*msg_ctx)
struct spoolss_PrinterInfo2 *pinfo2;
NTSTATUS status;
WERROR result;
+   char *old_krb5ccname = NULL;
 
tmp_ctx = talloc_new(NULL);
if (!tmp_ctx) return WERR_NOMEM;
@@ -502,6 +510,7 @@ WERROR check_published_printers(struct messaging_context 
*msg_ctx)
DEBUG(3, (ads_init() failed\n));
return WERR_SERVER_UNAVAILABLE;
}
+   old_krb5ccname = getenv(KRB5_ENV_CCNAME);
setenv(KRB5_ENV_CCNAME, MEMORY:prtpub_cache, 1);
SAFE_FREE(ads-auth.password);
ads-auth.password = secrets_fetch_machine_password(lp_workgroup(),
@@ -546,6 +555,10 @@ WERROR check_published_printers(struct messaging_context 
*msg_ctx)
 done:
ads_destroy(ads);
ads_kdestroy(MEMORY:prtpub_cache);
+   unsetenv(KRB5_ENV_CCNAME);
+   if (old_krb5ccname) {
+   setenv(KRB5_ENV_CCNAME, old_krb5ccname, 0);
+   }
talloc_free(tmp_ctx);
return result;
 }


-- 
Samba Shared Repository