Here's an update to the latest release on the 4.15 branch.  While
updating to 4.16 would be nice, testing 4.15.7 could help -stable users.

Tests reports and oks welcome.


Index: Makefile
===================================================================
RCS file: /cvs/ports/net/samba/Makefile,v
retrieving revision 1.311
diff -u -p -r1.311 Makefile
--- Makefile    23 Mar 2022 20:00:48 -0000      1.311
+++ Makefile    15 May 2022 10:55:28 -0000
@@ -1,7 +1,8 @@
-VERSION =              4.15.6
+VERSION =              4.15.7
 DISTNAME =             samba-${VERSION}
 EPOCH =                        0
-REVISION-tevent =      4
+REVISION-ldb =         0
+REVISION-tevent =      5
 
 COMMENT-main =         SMB and CIFS client and server for UNIX
 COMMENT-ldb =          LDAP-like embedded database
Index: distinfo
===================================================================
RCS file: /cvs/ports/net/samba/distinfo,v
retrieving revision 1.91
diff -u -p -r1.91 distinfo
--- distinfo    23 Mar 2022 20:00:48 -0000      1.91
+++ distinfo    15 May 2022 10:55:28 -0000
@@ -1,2 +1,2 @@
-SHA256 (samba-4.15.6.tar.gz) = BXW5makEhEWCBCjcVAuoqVJ85Zb6Zq8C6iuh6pV4vLQ=
-SIZE (samba-4.15.6.tar.gz) = 19290189
+SHA256 (samba-4.15.7.tar.gz) = dtAJbBbtAmWzN9VzHzwLMu7TratvqLdYXAVbKHzQXWs=
+SIZE (samba-4.15.7.tar.gz) = 19290930
Index: patches/patch-auth_auth_log_c
===================================================================
RCS file: /cvs/ports/net/samba/patches/patch-auth_auth_log_c,v
retrieving revision 1.6
diff -u -p -r1.6 patch-auth_auth_log_c
--- patches/patch-auth_auth_log_c       10 Mar 2022 00:04:07 -0000      1.6
+++ patches/patch-auth_auth_log_c       15 May 2022 10:55:28 -0000
@@ -3,7 +3,7 @@ Avoid printf("%s", NULL);
 Index: auth/auth_log.c
 --- auth/auth_log.c.orig
 +++ auth/auth_log.c
-@@ -610,7 +610,8 @@ static void log_authentication_event_human_readable(
+@@ -622,7 +622,8 @@ static void log_authentication_event_human_readable(
                        ui->netlogon_trust_account.account_name);
                nl = talloc_asprintf(frame,
                        " NETLOGON computer [%s] trust account [%s]",
@@ -13,7 +13,7 @@ Index: auth/auth_log.c
        }
  
        remote = tsocket_address_string(ui->remote_host, frame);
-@@ -628,8 +629,10 @@ static void log_authentication_event_human_readable(
+@@ -640,8 +641,10 @@ static void log_authentication_event_human_readable(
                logon_line = talloc_asprintf(
                                frame,
                                " mapped to [%s]\\[%s].",
@@ -26,16 +26,15 @@ Index: auth/auth_log.c
        }
  
        DEBUGC(DBGC_AUTH_AUDIT, debug_level,
-@@ -639,13 +642,15 @@ static void log_authentication_event_human_readable(
+@@ -651,13 +654,14 @@ static void log_authentication_event_human_readable(
                "%s local host [%s]"
                " %s\n",
                ui->service_description,
 -              ui->auth_description,
--              log_escape(frame, ui->client.domain_name),
+-              log_escape(frame, clientDomain),
 +              ui->auth_description ? ui->auth_description : "(NULL)",
-+              log_escape(frame, ui->client.domain_name ?
-+                  ui->client.domain_name : "(NULL)"),
-               log_escape(frame, ui->client.account_name),
++              log_escape(frame, clientDomain ? clientDomain : "(NULL)"),
+               log_escape(frame, clientAccount),
                ts,
 -              password_type,
 +              password_type ? password_type : "(NULL)",

-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE

Reply via email to