NetAPF bug #10149.
new connection attempts
* FIX: afpd: fix undefined behaviour when more then ~510 connetions where
established
+* FIX: afpd: fix a crash when searching for a UUID that is not a special
+ local UUID and LDAP support is not compiled in
* FIX: cnid_dbd: increase BerkeleyDB locks and lockobjs
* FIX: cnid_dbd: implement -d option, deletes CNID db
* FIX: suse: initscript return better status
cfrombstr(dir->d_fullpath), path, getcwdpath(), requested_rights);
/* Get uid or gid from UUID */
- EC_ZERO_LOG_ERR(getnamefromuuid(uuid, &username, &uuidtype), AFPERR_PARAM);
+ EC_ZERO_ERR(getnamefromuuid(uuid, &username, &uuidtype), AFPERR_PARAM);
EC_ZERO_LOG_ERR(lstat(path, &st), AFPERR_PARAM);
switch (uuidtype) {
* Caller must free name appropiately.
*/
int getnamefromuuid(const uuidp_t uuidp, char **name, uuidtype_t *type) {
- int ret = 0;
+ int ret;
uid_t uid;
gid_t gid;
struct passwd *pwd;
#ifdef HAVE_LDAP
ret = ldap_getnamefromuuid(uuid_bin2string(uuidp), name, type);
+#else
+ ret = -1;
+#endif
+
if (ret != 0) {
- LOG(log_warning, logtype_afpd, "getnamefromuuid(%s): no result from ldap_getnamefromuuid",
+ LOG(log_debug, logtype_afpd, "getnamefromuuid(%s): not found",
uuid_bin2string(uuidp));
add_cachebyuuid(uuidp, "UUID_ENOENT", UUID_ENOENT, 0);
return -1;
}
-#endif
add_cachebyuuid(uuidp, *name, *type, 0);