userdom_struct user;
- bool guest;
-
DATA_BLOB session_key;
char *session_keystr; /* used by utmp and pam session code.
return False;
}
- if (user->guest) {
+ if (user->server_info->guest) {
return False;
}
}
if (vuser == NULL)
return NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
- if (vuser->guest) {
+ if (vuser->server_info->guest) {
/*
* I'm 99% sure this is not the right place to do this,
* global_sid_Anonymous should probably be put into the token
if (api_commands[i].auth_user && lp_restrict_anonymous()) {
user_struct *user = get_valid_user_struct(vuid);
- if (!user || user->guest) {
+ if (!user || user->server_info->guest) {
reply_nterror(req, NT_STATUS_ACCESS_DENIED);
return;
}
talloc_steal(vuser, vuser->server_info);
- vuser->guest = server_info->guest;
fstrcpy(vuser->user.unix_name, server_info->unix_name);
/* This is a potentially untrusted username */
(unsigned int)vuser->server_info->uid,
(unsigned int)vuser->server_info->gid,
vuser->user.unix_name, vuser->user.smb_name,
- vuser->user.domain, vuser->guest ));
+ vuser->user.domain, vuser->server_info->guest ));
DEBUG(3, ("register_existing_vuid: User name: %s\t"
"Real name: %s\n", vuser->user.unix_name,
vuser->homes_snum = -1;
- if (!vuser->guest) {
+ if (!vuser->server_info->guest) {
vuser->homes_snum = register_homes_share(
vuser->user.unix_name);
}
- if (srv_is_signing_negotiated() && !vuser->guest &&
+ if (srv_is_signing_negotiated() && !vuser->server_info->guest &&
!srv_signing_started()) {
/* Try and turn on server signing on the first non-guest
* sessionsetup. */
TALLOC_FREE(pass);
DEBUG(3,("Guest only user %s\n",user));
} else if (vuser) {
- if (vuser->guest) {
+ if (vuser->server_info->guest) {
if (!lp_guest_ok(snum)) {
DEBUG(2, ("guest user (from session setup) "
"not permitted to access this share "
conn->gid = vuser->server_info->gid;
string_set(&conn->user,vuser->user.unix_name);
fstrcpy(user,vuser->user.unix_name);
- guest = vuser->guest;
+ guest = vuser->server_info->guest;
} else if (lp_security() == SEC_SHARE) {
NTSTATUS status2;
char *found_username = NULL;
NTSTATUS status2;
status2 = find_forced_user(conn,
- (vuser != NULL) && vuser->guest,
+ (vuser != NULL) && vuser->server_info->guest,
user);
if (!NT_STATUS_IS_OK(status2)) {
conn_free(conn);
/* don't register sessions for the guest user - its just too
expensive to go through pam session code for browsing etc */
- if (vuser->guest) {
+ if (vuser->server_info->guest) {
return True;
}