c1208b485924964a7a4fcf19562964acb47fc214 |
|
05-Apr-2018 |
Justin Stephenson <jstephen@redhat.com> |
CONFDB: Add passwd_files and group_files options
Add new options to the files provider allowing an administrator to
configure the files provider to read and monitor multiple or
non-standard passwd and group file sources. These options default to
/etc/passwd and /etc/group when unset.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
346d6d8bf5fdb446921d754c07c8a7d913a048d5 |
|
29-Jan-2018 |
René Genz <liebundartig@freenet.de> |
Fix minor spelling mistakes
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
8fab9d6fa88824b20d3febe697147c407d31c160 |
|
26-Oct-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFDB: Remove the obsolete option magic_private_groups
Since this confdb definition was completely unused across the codebase,
this patch just removes the definition.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
d72ac2c58360cd272277b5ddde67bbff53106a74 |
|
26-Oct-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFIG: Add a new option auto_private_groups
The auto_private_groups option is used to configure the domain->mpg flag
which was already set automatically for subdomains, but for some time was
not settable by the admin via the configuration file.
The new option name, instead of the old magic_private_groups, was chosen
purely because this name would hopefully be better understood by admins.
The option doesn't do anything yet, it is just added to all the places a
new option should be added to.
Related:
https://pagure.io/SSSD/sssd/issue/1872
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
6b3bab516355fdf4cc81e6da9d87ec3818ab190f |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Add a new option to control per-UID limits
Adds a new option max_uid_secrets that allows to set a limit of secrets
for this particular client so that the user cannot starve other users.
Resolves:
https://pagure.io/SSSD/sssd/issue/3363
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
b4195db089bc481161b37cd129d0876571f633b4 |
|
30-Aug-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
CONFDB: Set a default value for subdomain_refresh_interval in case an invalid value is set
The code as it was seemed wrong as when an invalid value as set we
neither error out nor set a default valid value there.
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f982039c75ec064894deb676ae53ee57de868590 |
|
28-Aug-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
DESKPROFILE: Introduce the new IPA session provider
In order to provide FleetCommander[0] integration, a session provider
has been introduced for IPA. The design of this feature and more
technical details can be found at [1] and [2], which are the design
pages of both freeIPA and SSSD parts.
As there's no way to test freeIPA integration with our upstream tests,
no test has been provided yet.
Is also worth to mention that the name "deskprofile" has been chosen
instead of "fleetcmd" in order to match with the freeIPA plugin. It
means that, for consistence, all source files, directories created,
options added, functions prefixes and so on are following the choice
accordingly.
[0]: https://wiki.gnome.org/Projects/FleetCommander
[1]: https://github.com/abbra/freeipa-desktop-profile/blob/master/plugin/Feature.mediawiki
[2]: https://docs.pagure.org/SSSD.sssd/design_pages/fleet_commander_integration.html
Resolves:
https://pagure.io/SSSD/sssd/issue/2995
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a5f300adf19ec9c3087c62bd93a5175db799687a |
|
18-Aug-2017 |
Pavel Březina <pbrezina@redhat.com> |
sudo: add a threshold option to reduce size of rules refresh filter
If a large number of rules is expired at one time the ldap filter may
become too large to be processed by server. This commits adds a new
option "sudo_threshold" to sudo responder. If the threshold is
exceeded a full refreshed is done instead of rules refresh.
Resolves:
https://pagure.io/SSSD/sssd/issue/3478
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
555f43b491f40e0237b8677565a748b929092bee |
|
27-Jul-2017 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
CONFIG: Add session_recording section
Add information on "session_recording" config section, having three
options: "scope", "users", and "groups".
The section is intended for disabling session recording ("scope = none",
default), enabling session recording for all users ("scope = all"), and
enabling it for some specific users and/or groups ("scope = some",
"users = <users>", "groups = <groups>").
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
fa2fc8a2908619031292eaf375eb1a510b8b2eba |
|
21-Jun-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
DOMAIN: Add sss_domain_info_{get,set}_output_fqnames()
Let's avoid setting a domain's property directly from cr_domain code.
In order to do so, let's introduce a setter, which may help us in the
future whenever we decide to make sss_domain_info an opaque structure.
For completeness, a getter has also been introduced and used in the
usertools code.
Related:
https://pagure.io/SSSD/sssd/issue/3403
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
86526891366c4bc3e1ee861143b736d2670a6ba8 |
|
21-Jun-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
RESPONDER: Use fqnames as output when needed
As some regressions have been caused by not handling properly naming
conflicts when using shortnames, last explicitly use fully qualified
names as output in the following situations:
- domain resolution order is set;
- a trusted domain has been using `use_fully_qualified_name = false`
In both cases we want to ensure that even handling shortnames as input,
the output will always be fully qualified.
As part of this patch, our tests ended up being modified to reflect the
changes done. In other words, the tests related to shortnames now return
expect as return a fully qualified name for trusted domains.
Resolves:
https://pagure.io/SSSD/sssd/issue/3403
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
749963195393efa3a4f9b168dd02fbcc68976ba3 |
|
01-Jun-2017 |
Sumit Bose <sbose@redhat.com> |
RESPONDER_COMMON: update certmaps in responders
Make certificate mapping data available to the responders.
Related to https://pagure.io/SSSD/sssd/issue/3395
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
3e789aa0bd6b7bb6e62f91458b76753498030fb5 |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM: Add application services
Related to:
https://pagure.io/SSSD/sssd/issue/3310
Adds a new PAM responder option 'pam_app_services'. This option can hold
a list of PAM services that are allowed to contact the application
non-POSIX domains. These services are NOT allowed to contact any of the
POSIX domains.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
825e8bf2f73a815c2eceb36ae805145fcbacf74d |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFDB: Allow configuring [application] sections as non-POSIX domains
Related to:
https://pagure.io/SSSD/sssd/issue/3310
Allows to add a new section:
[application/$name]
This section internally (on the confdb level) expands to:
[domain/$name]
domain_type = application
The reasons to add this new section is two-fold. One, to make the
configuration of application domains more explicit and two, to make it
possible to share configuration between two domains, one POSIX and one
non-POSIX by application domain's inherit_from option:
[application/$name]
inherit_from = posix_domain_name
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
6324eaf1fb321c41ca9883966118df6d45259b7e |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFDB: Introduce SSSD domain type to distinguish POSIX and application domains
Related to:
https://pagure.io/SSSD/sssd/issue/3310
Adds a new option that allows to distinguish domains that do contain
POSIX users and groups and those that don't. The POSIX domains are the
default. The non-POSIX domains are selected by selecting an
"application" type domain.
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
16385568547351b5d2c562f3081f35f3341f695b |
|
29-Mar-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
Add domain_resolution_order config option
This is the local equivalent of option of ipaDomainResolutionOrder and
has precedence over the ones set on IPA side making the precedence order
to be like: Local > View > Globally.
As done for the IPA side configurations, the domains which were not
explicitly set up will be apennded to the final of the
domain_resolution_order list in the very same order they're presented in
the "domains" option of [sssd] section in the config file. There's no
guarantee of order for the subdomains though.
It's also important to mention that no expansion magic is performed on
our side. It means that if 'example.com' is set it does *not* stand for
all its subdomains DNS wise (like 'foo.example.com', 'bar.example.com',
etc).
Related:
https://pagure.io/SSSD/sssd/issue/3001
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
35c9dfe9ba78d3a635cd1af0fb6349ba44344623 |
|
27-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
KCM: Make the secrets ccache back end configurable, make secrets the default
Adds a new option 'ccache_storage' that allows to select either the
memory back end or the secrets back end. The secrets back end is the
default one and this option is even undocumented.
Reviewed-by: Michal Židek <mzidek@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
b9c563c29243291f40489bb0dcbf3946fca72d58 |
|
27-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
KCM: Initial responder build and packaging
Adds the initial build of the Kerberos Cache Manager responder (KCM).
This is a deamon that is capable of holding and storing Kerberos
ccaches. When KCM is used, the kerberos libraries (invoked through e.g.
kinit) are referred to as a 'client' and the KCM deamon is referred to
as 'server'.
At the moment, only the Heimdal implementation of Kerberos implements the
KCM server:
https://www.h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html
This patch adds a KCM server to SSSD.
In MIT, only the 'client-side' support was added:
http://k5wiki.kerberos.org/wiki/Projects/KCM_client
This page also describes the protocol between the client and the server.
The client is capable of talking to the server over either UNIX sockets
(Linux, most Unixes) or Mach RPC (macOS). Our server only implements the
UNIX sockets way and should be socket-activated by systemd, although can
in theory be also ran explicitly.
The KCM server only builds if the configuration option "--with-kcm" is
enabled. It is packaged in a new subpackage sssd-kcm in order to allow
distributions to enable the KCM credential caches by installing this
subpackage only, without the rest of the SSSD. The sssd-kcm subpackage
also includes a krb5.conf.d snippet that allows the admin to just uncomment
the KCM defaults and instructs them to start the socket.
The server can be configured in sssd.conf in the "[kcm]" section.
By default, the server only listens on the same socket path the Heimdal
server uses, which is "/var/run/.heim_org.h5l.kcm-socket". This is,
however, configurable.
The file src/responder/kcm/kcm.h is more or less directly imported from
the MIT Kerberos tree, with an additional sentinel code and some
comments. Not all KCM operations are implemented, only those that also
the MIT client implements. That said, this KCM server should also be
usable with a Heimdal client, although no special testing was with this
hybrid.
The patch also adds several error codes that will be used in later
patches.
Related to:
https://pagure.io/SSSD/sssd/issue/2887
Reviewed-by: Michal Židek <mzidek@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
8bb6680637ead03e24a38d15ec5265d11a920a1d |
|
14-Mar-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
CACHE_REQ: Check the caches first
This patch introduces a new configurable option to define whether the
responder should query all domains' caches before querying the Data
Providers.
This new option is called cache_first and, by default, it's disabled,
meaning that, for each provider, the responder may contact the cache and
the data provider in the same iteration.
Co-Author: Pavel Březina <pbrezina@redhat.com>
Related:
https://pagure.io/SSSD/sssd/issue/3001
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
78bb3676fe8326e0fe2b60daad8bf524e4625d4e |
|
27-Feb-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
MONITOR: Enable an implicit files domain if one is not configured
If SSSD is compiled with --enable-files-domain, the loading of the
domains changes such that:
* if no domain with id_provider=files exists in the config file, an
implicit SSSD files domain is added
* this domain is always first in the list
The administrator is free to create a files domain in the config file
himself and either place it at the end of the list or not enable it at
all.
Resolves:
https://pagure.io/SSSD/sssd/issue/3112
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
c778c36c5170c2b9f1cf7a6e3b0811124534df03 |
|
15-Feb-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFDB: Make pwfield configurable per-domain
Previously, the pwfield option was only configurable at the NSS level.
Because it's important for the files provider to report "x" as the
pwfield instead of "*" which is the SSSD default, this commit makes the
pwfield configurable at the domain level.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
2d1a59f6c2cf3cf4667cf2d01b2d780db916db42 |
|
15-Feb-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Add a new domain state called DOM_INCONSISTENT
This is a new domain state that indicates to the responder that it
should always send a DP request because the provider is rebuilding the
cache.
Currently it will be only used by the files provider when it is updating
the cache to make sure sssd always returns current data and updating the
cache from files is not as racy.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
c029f707d4847b01ff64bf3bb1fd46c0b5927cdb |
|
07-Feb-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
Partially revert "CONFIG: Use default config when none provided"
This reverts part of commit 59744cff6edb106ae799b2321cb8731edadf409a.
Removed is copying of default configuration into /etc/sssd/sssd.conf
Sample configurations is still part of installation.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
151a6de4793e0045a7085d4d72b975947662e566 |
|
23-Jan-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
RESPONDER: Shutdown {dbus,socket}-activated responders in case they're idle
This commit introduces a new option for the responders called
responder_idle_timeout, which specifies the number of seconds that the
responder process can be up without being used. The default value is
300 seconds (5 minutes) and can be configured per responder, being 60
seconds the minimum acceptable value.
Is important to note that setting "responder_idle_timeout = 0" disables
the responder timeout, which makes sense for the responders that always
will be running.
The shutdown timeout is activated per responder in case the responder
has been {dbus,socket}-activated. In case of any commnunication with the
responder the timeout is reset thereby ensuring we won't shutdown a
responder that is not idle.
Setting the responder's last request time is done slightly differently
for socket-activated and dbus-activated responders. In both cases it's
updated in any internal communication in sbus_message_handler(), but
for the socket-activated responders it's also updated when the
responder's socket is used.
Currently it works properly with all responders but the secrets one,
which has a different logic and must be treated separately in case some
change is required there.
Is worth to mention that this commit does not affect the responders
explicitly configured in the "services" line of sssd.conf.
Related:
https://fedorahosted.org/sssd/ticket/3245
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
7171a7584dda534dde5409f3e7f4657e845ece15 |
|
24-Nov-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add configurable payload size limit of a secret
Resolves:
https://fedorahosted.org/sssd/ticket/3169
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
ce43f710c9638fbbeae077559cd7514370a10c0c |
|
02-Nov-2016 |
Sumit Bose <sbose@redhat.com> |
PAM: add pam_response_filter option
Currently the main use-case for this new option is to not set the
KRB5CCNAME environment varible for services like 'sudo-i'.
Resolves https://fedorahosted.org/sssd/ticket/2296
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
65a38b8c9cabde6c46cc0e9868f54cb9bb10afbf |
|
05-Oct-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add a configurable limit of secrets that can be stored
Related:
https://fedorahosted.org/sssd/ticket/3169
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
efc65e78fa4e01e6cecc8690a9899af61213be62 |
|
03-Oct-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add a configurable depth limit for nested containers
Resolves:
https://fedorahosted.org/sssd/ticket/3168
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
aef0171e0bdc9a683958d69c7ee984fb10cd5de7 |
|
13-Sep-2016 |
Petr Cech <pcech@redhat.com> |
PROXY: Adding proxy_max_children option
The new option 'proxy_max_children' is applicable
in domain section. Default value is 10.
Resolves:
https://fedorahosted.org/sssd/ticket/3153
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
081c6d8c7c8e75487d1c4e42862964be1e85b575 |
|
12-Sep-2016 |
Justin Stephenson <jstephen@redhat.com> |
MONITOR: Add disable_netlink option
Adding a new monitor boolean option to disable netlink support.
This will give users more control over sssd state changes without
having to modify systemd unit files.
Resolves:
https://fedorahosted.org/sssd/ticket/3142
Reviewed-by: Petr Cech <pcech@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
fa93cd0f0fc75a6d635079e67788f8a9fe183c3c |
|
30-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
MONITOR: Remove the no longer used kill_service command
After introducing the watchdog, the force_timeout option is no longer
used.
Resolves:
https://fedorahosted.org/sssd/ticket/3052
Reviewed-by: Petr Čech <pcech@redhat.com> |
1620f435dbe7013f985128dcdf001e9158cb00e3 |
|
30-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
MONITOR: Remove the no longer used diag_cmd command
After introducing the watchdog, the diag_cmd is longer used and makes no
sense trying to make it usable by watchdog as the result of "pstack %p"
seems next to useless in this context.
Related:
https://fedorahosted.org/sssd/ticket/3051
Reviewed-by: Petr Čech <pcech@redhat.com> |
20348a30feb4be619b3b691c24c9be8131507c46 |
|
18-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
sysdb: make subdomain calls aware of upn_suffixes
sysdb_subdomain_store() and sysdb_update_subdomains() can now update
upn_suffixes as well.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
132b31fd5fb74a7627896cdceaf29c7601ed4795 |
|
18-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
sysdb: add UPN suffix support for the master domain
sysdb_master_domain_update() and sysdb_master_domain_add_info() are now
aware of the UPN suffix attribute.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
1b9b5477027d86a2afb2e72981253d108c5398da |
|
12-Jul-2016 |
Michal Židek <mzidek@redhat.com> |
config: Allow timeout for all sevices
Allow option "timeout" for all sevices.
Also remove unused macro CONFDB_SERVICE_TIMEOUT.
Resolves:
https://fedorahosted.org/sssd/ticket/3068
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
c744f9df3b6b169c8c70fcfd063ab6402229218e |
|
05-Jul-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
DOC: Fix few typos in doxygen comments
src/confdb/confdb.h:572: warning: argument 'memctx' of command @param
is not found in the argument list of
confdb_get_sub_sections(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb,
const char *section, char ***sections, int *num_sections)
src/confdb/confdb.h:592: warning: The following parameters of
confdb_get_sub_sections(TALLOC_CTX *mem_ctx, struct confdb_ctx *cdb,
const char *section, char ***sections, int *num_sections)
are not documented:
src/lib/idmap/sss_idmap.h:315: warning: argument 's_cv' of command @param
is not found in the argument list of
sss_idmap_add_auto_domain_ex(struct sss_idmap_ctx *ctx,
const char *domain_name, const char *domain_sid,
struct sss_idmap_range *range, const char *range_id, uint32_t rid,
bool external_mapping, idmap_store_cb cb, void *pvt)
src/lib/idmap/sss_idmap.h:94: warning: The following parameters of
sss_idmap_add_auto_domain_ex(struct sss_idmap_ctx *ctx,
const char *domain_name, const char *domain_sid,
struct sss_idmap_range *range, const char *range_id, uint32_t rid,
bool external_mapping, idmap_store_cb cb, void *pvt)
are not documented:
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a8d1a344e580f29699aed9b88d87fc3c6f5d113b |
|
29-Jun-2016 |
Simo Sorce <simo@redhat.com> |
Secrets: Add initial responder code for secrets service
Start implementing the Secrets Service Reponder core.
This commit implements stratup and basic conenction handling and HTTP
parsing (using the http-parser library).
Signed-off-by: Simo Sorce <simo@redhat.com>
Related:
https://fedorahosted.org/sssd/ticket/2913
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
052f8aa2034f7b091097dc5fdafc201b7d684525 |
|
29-Jun-2016 |
Simo Sorce <simo@redhat.com> |
ConfDB: Add helper function to get "subsections"
The secrets database will have "subsections", ie sections that are in the
"secrets" namespace and look like this: [secrets/<path>]
This function allows to source any section under secrets/ or under any
arbitrary sub-path.
Related:
https://fedorahosted.org/sssd/ticket/2913
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
8b2a31634764168183506925a4b9f461afdba6f3 |
|
27-Jun-2016 |
Michal Židek <mzidek@redhat.com> |
confdb: Check for config file errors on sssd startup
Resolves:
https://fedorahosted.org/sssd/ticket/2028
Signed-off-by: Lukas Slebodnik <lslebodn@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
cca497b4cbbbf05c4f9181b7d8113cde81754831 |
|
27-Jun-2016 |
Michal Židek <mzidek@redhat.com> |
confdb: Make it possible to use config snippets
Resolves:
https://fedorahosted.org/sssd/ticket/2247
Signed-off-by: Lukas Slebodnik <lslebodn@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
131684b9107a3fc07906013d16b35975531f2864 |
|
16-Jun-2016 |
Stephen Gallagher <sgallagh@redhat.com> |
DEBUG: Add `debug` alias for debug_level
Our users constantly make the mistake of typing `debug = 9` in the
sssd.conf instead of `debug_level = 9` as would be correct. This
happens frequently-enough that we should just alias it rather than
continue to have people make mistakes.
Resolves:
https://fedorahosted.org/sssd/ticket/2999
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Petr Cech <pcech@redhat.com> |
e7ccfb139388c947ec2dee16cfe3005f5643b90d |
|
10-Jun-2016 |
Petr Cech <pcech@redhat.com> |
RESPONDERS: Negative caching of local users
This patch adds new option 'neg_cache_locals_timeout' into section
of NSS responder. It allows negative caching of local groups and
users. Default value is 0 which means no caching.
Resolves:
https://fedorahosted.org/sssd/ticket/2928
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
59744cff6edb106ae799b2321cb8731edadf409a |
|
11-May-2016 |
Stephen Gallagher <sgallagh@redhat.com> |
CONFIG: Use default config when none provided
This patch makes SSSD possibly useful "out of the box" by allowing
packagers to provide a default config file located in $LIBDIR/sssd/conf
that will be copied by the monitor to /etc/sssd if no file already
exists in that location. This will make it possible to have SSSD set up
to have distribution-specific default configuration, such as enabling
the proxy provider to cache /etc/passwd (such as in the provided
example in this patch).
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
98dbaea0a00c60972b991755a44c51964dfb7877 |
|
11-May-2016 |
Stephen Gallagher <sgallagh@redhat.com> |
Internal: Rename CONFDB_DEFAULT_CONFIG_FILE
New name is SSSD_CONFIG_FILE. This is done because we will start to
ship a static default configuration in addition to the runtime
configuration.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
d0d7de66c9494621c1bc12384e41e5e38a77fbeb |
|
13-Apr-2016 |
Sumit Bose <sbose@redhat.com> |
PAC: only save PAC blob into the cache
Resolves https://fedorahosted.org/sssd/ticket/2158
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
4180d485829969d4626cc7d49d2b5f7146512f21 |
|
17-Feb-2016 |
Pavel Reichl <preichl@redhat.com> |
PAM: Pass account lockout status and display message
Tested against Windows Server 2012.
Resolves:
https://fedorahosted.org/sssd/ticket/2839
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
544a20de7667f05c1a406c4dea0706b0ab507430 |
|
26-Nov-2015 |
Sumit Bose <sbose@redhat.com> |
p11: enable ocsp checks
This patch enables the Online Certificate Status Protocol in NSS and
adds an option to disable it if needed. To make further tuning of
certificate verification more easy it is not an option on its own but an
option to the new certificate_verification configuration option.
Resolves https://fedorahosted.org/sssd/ticket/2812
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
89530c830ded58c6140cdb34c9de07bf77bb5bc0 |
|
13-Nov-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SSSD: Add a new option diag_cmd
This option is an optional one that is run when a sbus ping times out
and before a SIGKILL signal is sent.
It is undocumented by default.
diag_cmd (string):
A command that should be run for diagnostic purpose when an sbus timeout
fails. The option value may contain %p which would be expanded for the
process ID of the process that timed out
Example:
pstack %p
This setting would print the stackstrace of the service whose ping timed out.
Default: not set.
Reviewed-by: Petr Cech <pcech@redhat.com> |
d85be8ad409c9efa9cf9e9ab6f9c2d911b01e5c1 |
|
23-Sep-2015 |
Michal Židek <mzidek@redhat.com> |
PAM: Make p11_child timeout configurable
Ticket:
https://fedorahosted.org/sssd/ticket/2773
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
b5825c74b6bf7a99ae2172392dbecb51179013a6 |
|
21-Sep-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
UTIL: Convert domain->disabled into tri-state with domain states
Required for:
https://fedorahosted.org/sssd/ticket/2637
This is a first step towards making it possible for domain to be around,
but not contacted by Data Provider.
Also explicitly create domains as active, previously we only relied on
talloc_zero marking dom->disabled as false.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
175613be0cfb0890174d12d941e634d833b63dd9 |
|
03-Sep-2015 |
Michal Židek <mzidek@redhat.com> |
CONFDB: Assume config file version 2 if missing
Default to config file version 2 if the version
is not specified explicitly.
Ticket:
https://fedorahosted.org/sssd/ticket/2688
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
52e3ee5c5ff2c5a4341041826a803ad42d2b2de7 |
|
14-Aug-2015 |
Pavel Březina <pbrezina@redhat.com> |
sudo: use "higher value wins" when ordering rules
This commit changes the default ordering logic (lower value wins) to
a correct one that is used by native ldap support. It also adds a new
option sudo_inverse_order to switch to the original SSSD (incorrect)
behaviour if needed.
Resolves:
https://fedorahosted.org/sssd/ticket/2682
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
4de84af23db74e13e867985c9093f394c9fa8d51 |
|
31-Jul-2015 |
Sumit Bose <sbose@redhat.com> |
ssh: generate public keys from certificate
Resolves: https://fedorahosted.org/sssd/ticket/2711
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a8d887323f83984679a7d9b827a70146656bb7b2 |
|
31-Jul-2015 |
Sumit Bose <sbose@redhat.com> |
PAM: add certificate support to PAM (pre-)auth requests
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
4f68747b1baca78be496e9a5ebe4b89a9845dc8d |
|
28-Jul-2015 |
Pavel Reichl <preichl@redhat.com> |
TESTS: fix compiler warnings
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
bdf32fbb3c947dd1b2c54d1c21d8028a1ddc80e6 |
|
15-Jul-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
IFP: Add wildcard requests
Resolves:
https://fedorahosted.org/sssd/ticket/2553
Can be used as:
dbus-send --print-reply --system --dest=org.freedesktop.sssd.infopipe \
/org/freedesktop/sssd/infopipe/Users \
org.freedesktop.sssd.infopipe.Users.ListByName \
string:r\* uint32:10
dbus-send --print-reply --system --dest=org.freedesktop.sssd.infopipe \
/org/freedesktop/sssd/infopipe/Groups \
org.freedesktop.sssd.infopipe.Groups.ListByName \
string:r\* uint32:10
dbus-send --print-reply --system --dest=org.freedesktop.sssd.infopipe \
/org/freedesktop/sssd/infopipe/Users \
org.freedesktop.sssd.infopipe.Users.ListByDomainAndName \
string:ipaldap string:r\* uint32:10
dbus-send --print-reply --system --dest=org.freedesktop.sssd.infopipe \
/org/freedesktop/sssd/infopipe/Groups \
org.freedesktop.sssd.infopipe.Groups.ListByDomainAndName \
string:ipaldap string:r\* uint32:10
By default the wildcard_limit is unset, that is, the request will return
all cached entries that match.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
0aa18cc0bf3447ca734476926724f1632e160807 |
|
06-Jul-2015 |
Pavel Reichl <preichl@redhat.com> |
PAM: authenticate agains cache
Enable authenticating users from cache even when SSSD is in online mode.
Introduce new option `cached_auth_timeout`.
Resolves:
https://fedorahosted.org/sssd/ticket/1807
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
b50baee36c9ba9e1dd3f6b9c1356482aecd08128 |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Add a forest root attribute to sss_domain_info
Instead of complex forest root search methods, establish forest root
during subdomain list update. The subdomain code can then just use the
forest_root pointer.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
ea224c3813a537639778f91ac762732b3c289603 |
|
14-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
SYSDB: Store trust direction for subdomains
We need to store the subdomain trust direction in order to recover the
structure after SSSD restart.
The trust direction is a plain uint32_t to avoid leaking the knowledge
about AD trust directions to sysdb while at the same time making it easy
to compare values between sysdb and LDAP and avoid translating the
values.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
1711cbfd2e36d44af1ae50e3a2beeec3a1f0b5e8 |
|
05-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
confdb: Add new option subdomain_inherit
Adds a new option subdomain_inherit that would allow administrators to pick
and choose which option to pass to subdomains.
This option is required for:
https://fedorahosted.org/sssd/ticket/2644
as a short-term fix.
The proper solution is described in:
https://fedorahosted.org/sssd/ticket/2599
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
932c3e22e3c59a9c33f30dcc09e6bef257e14320 |
|
08-May-2015 |
Sumit Bose <sbose@redhat.com> |
Add cache_credentials_minimal_first_factor_length config option
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
e039f1aefecc65a7b3c2d4a13a612bff1dd367c8 |
|
23-Feb-2015 |
Pavel Reichl <preichl@redhat.com> |
PAM: new option pam_account_expired_message
This option sets string to be printed when authenticating using SSH
keys and account is expired.
Resolves:
https://fedorahosted.org/sssd/ticket/2050
Reviewed-by: Sumit Bose <sbose@redhat.com> |
4b6fa94d1a00b07c4310678ec721282288a186a0 |
|
28-Nov-2014 |
Michal Zidek <mzidek@redhat.com> |
confdb: Make confdb_set_string accept const char pointer
The last parameter (value) in the confdb_set_string
is not modified, so it makes sense to make it const
to avoid unnecessary warnings or casts.
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
a10ac1d0a7210def232205a48c53a075930e82f6 |
|
22-Oct-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
SSSD: Load a user to run a service as from configuration
Related:
https://fedorahosted.org/sssd/ticket/2370
Adds a option, user to run as, that is specified in the [sssd] section. When
this option is specified, SSSD will run as this user and his private
group. When these are not specified, SSSD will run as the configure-time
user and group (usually root).
Currently all services and providers are started as root. There is a
temporary svc_supported_as_nonroot() function that returns true for a
service if that service runs and was tested as nonroot and false
otherwise. Currently this function always returns false, but will be
amended in future patches.
Reviewed-by: Pavel Reichl <preichl@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
e7cc651468ab8b1462a6a39e712e7b8d36a3a166 |
|
20-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
confdb: add has_views and view_name to sss_domain_info
To let the responders know which view is applied and to make view
handling more efficiently especially when no view is applied/available
two new member are added to the sss_domain_info struct.
view_name is the name of the view if available. has_views is only true
if the client has a specific view applied, i.e. it is false for the case
when there are no views at all (e.g. plain LDAP provider) or the client
has the FreeIPA default view. This allows the responders to easily
bypass any view related code.
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
830ded27453015080a54d6ba85fd4999ee7e9af1 |
|
29-Sep-2014 |
Pavel Reichl <preichl@redhat.com> |
PAM: new options pam_trusted_users & pam_public_domains
pam_public_domains option is a list of numerical UIDs or user names
that are trusted.
pam_public_domains option is a list of domains accessible even for
untrusted users.
Based on:
https://fedorahosted.org/sssd/wiki/DesignDocs/RestrictDomainsInPAM
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
3ac7c4fe618ede980a4df8d90341ef1fd0f1f62f |
|
05-Sep-2014 |
William B <william@adelaide.edu.au> |
SSS_CACHE: Allow sss_cache tool to flush SSH hosts cache
Resolves:
https://fedorahosted.org/sssd/ticket/2358
Signed-off-by: Jan Cholasta <jcholast@redhat.com>
Reviewed-by: Jan Cholasta <jcholast@redhat.com>
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
f3a5ac1a50c1fccd0801023658e42d2093e1a33a |
|
13-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
Make the space override responder-agnostic
https://fedorahosted.org/sssd/ticket/2397
In order to make the override_space option usable by other responders,
we need to move the override_space option to the generic responder
structure.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
1f3127e88a87953f059c9a70d3582ae1719594b1 |
|
13-Aug-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
Only replace space with the specified substitution
https://fedorahosted.org/sssd/ticket/2397
- make sss_replace_whitespaces only replace space (' ') not any
whitespace
- make sss_replace_whitespaces only replace a single char, not the whole
string
- rename CONFDB_NSS_OVERRIDE_DEFAULT_WHITESPACE to
CONFDB_NSS_OVERRIDE_DEFAULT_SPACE
- rename the override_default_whitespace option to override_space
- rename sss_replace_whitespaces() to sss_replace_space()
- rename sss_reverse_replace_whitespaces() to sss_reverse_replace_space()
- rename nctx->override_default_wsp_str to nctx->override_space
- make the return value of sss_replace_space non-const to avoid freeing
the result without compilation warnings
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
2b94ab415b30861f42b68725d9231905baf8c3bd |
|
29-Jul-2014 |
Michal Zidek <mzidek@redhat.com> |
Remove unused function confdb_set_bool
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
ff22e829fd73fc53027d1e6ca005a9ac334086dd |
|
29-Jul-2014 |
Michal Zidek <mzidek@redhat.com> |
case_sensitivity = preserving
If case_sensitivity is set to 'preserving', getXXnam
returns name attribute in the same format as
stored in LDAP.
Fixes:
https://fedorahosted.org/sssd/ticket/2367
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
5328aaeea84268b6d4e26cd33a2b3e8ea89bc349 |
|
29-Jul-2014 |
Michal Zidek <mzidek@redhat.com> |
Add function confdb_set_string.
Part of fix for:
https://fedorahosted.org/sssd/ticket/2367
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
21bc143c2855638242e9dfe01ea66198b5883b8a |
|
28-Jul-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
NSS: Replace spaces with specified string in names.
This patch add possibility to replace whitespace in user and group names with
a specified string. With string "-", sssd will return the same result as
winbind enabled option "winbind normalize names"
Resolves:
https://fedorahosted.org/sssd/ticket/1854
Reviewed-by: Pavel Reichl <preichl@redhat.com>
Reviewed-by: Michal Židek <mzidek@redhat.com> |
ae0a5011e2644eaa482ea1b9e1451eff05c676b9 |
|
02-Jun-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
NSS: Add option to expand homedir template format
LDAP server can contain template for home directory instead of plain string.
This patch adds new expand option "%H", which will be replaced with value
from configuration option homedir_substring (from sssd.conf)
Resolves:
https://fedorahosted.org/sssd/ticket/1853 |
d81f46fb294a6f6f64d3237ab0e0ab01f2c5ea20 |
|
28-May-2014 |
Pavel Březina <pbrezina@redhat.com> |
confdb: add confdb_list_all_domain_names()
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
770dc892f867639f36f84455d65be6287935a529 |
|
13-May-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IFP: Per-attribute ACL for users
Introduces a new option called user_attributes that allows to specify
which user attributes are allowed to be queried from the IFP responder.
By default only the default POSIX set is allowed, this option allows to
either add other attributes (+attrname) or remove them from the default
set (-attrname).
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
cb4d5b588e704114b7090678752d33512baa718e |
|
04-Apr-2014 |
Jakub Hrozek <jhrozek@redhat.com> |
IFP: Re-add the InfoPipe server
Related:
https://fedorahosted.org/sssd/ticket/2072
This commit only adds the responder and the needed plumbing. No DBus
related code is in yet. |
4fcc27c0474b1879119cb04de4ed209711df231e |
|
07-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
confdb: Make offline timeout configurable
Added and documented option offline_timeout.
Resolves:
https://fedorahosted.org/sssd/ticket/1718 |
cd4cc8d8829f1ea5257bf874b91980368114275f |
|
25-Oct-2013 |
Pavel Březina <pbrezina@redhat.com> |
dp: make subdomains refresh interval configurable
This patch makes the refresh of available subdomains configurable.
New option:
subdomain_refresh_interval (undocumented)
Resolves:
https://fedorahosted.org/sssd/ticket/1968 |
66558156128105c1b1f246276c26b6111b0f514a |
|
22-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove unused constants |
19b4bb652f5cdc2797b66595eaf8811881aa9873 |
|
22-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Include external headers with #include <foo.h>
I find it more readable to include headers from outside the sssd tree
with <foo.h>, not "foo.h". The latter should be used for in-tree headers
only. |
c5711b0279ea85d69fe3c77dfb194360c346e1d7 |
|
27-Sep-2013 |
Sumit Bose <sbose@redhat.com> |
IPA: store forest name for forest member domains
In order to fix https://fedorahosted.org/sssd/ticket/2093 the name of
the forest must be known for a member domain of the forest. |
33c865412732554ef255e93c4e7a58b0bce963c6 |
|
28-Aug-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a new option to control subdomain enumeration |
d5e8c3a1290d68d07362a119e63121156ad448df |
|
19-Jul-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix the default FQDN format
Commit 52ae806bd17c3c00d70bd1aed437f10f5ae51a1c changed the default FQDN
format by accident to the one we only ever user internally. This commit
fixes the mistake. |
52ae806bd17c3c00d70bd1aed437f10f5ae51a1c |
|
19-Jul-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: warn if full_name_format is customized in server mode
https://fedorahosted.org/sssd/ticket/2009
If the IPA server mode is on and the SSSD is running on the IPA server,
then the server's extdom plugin calls getpwnam_r to read info about trusted
users from the AD server and return them to the clients that called the
extended operation.
The SSSD returns the subdomain users fully-qualified, ie "user@domain"
by default. The format of the fully qualified name is configurable.
However, the extdom plugin returns the user name without the domain
component.
With this patch, when ipa_server_mode is on, warn if the full_name_format
is set to a non-default value. That would prompt the admin to change the
format if he changed it to something exotic. |
504902d12a1ea1d3774bacd9a35efd9cecd5f9c2 |
|
11-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Fix some doxygen warnings |
0cf0e2d758d09e9b314ba72ce6638df10b258462 |
|
10-Jun-2013 |
Pavel Březina <pbrezina@redhat.com> |
back end: add refresh expired records periodic task
https://fedorahosted.org/sssd/ticket/1713
Add new option refresh_expired_interval. |
584eda085e83a428f2c39dadf0d7adeaff5c87f4 |
|
03-Apr-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
Init failover with be_res options |
bba1a5fd62cffcae076d1351df5a83fbc4a6ec17 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Change the way domains are linked.
- Use a double-linked list for domains and subdomains.
- Never remove a subdomain, simply mark it as disabled if it becomes
unused.
- Rework the way subdomains are refreshed.
Now sysdb_update_subdomains() actually updates the current subdomains
and marks as disabled the ones not found in the sysdb or add new ones
found. It never removes them.
Removal of missing domains from sysdb is deferred to the providers,
which will perform it at refresh time, for the ipa provider that is
done by ipa_subdomains_write_mappings() now.
sysdb_update_subdomains() is then used to update the memory hierarchy
of the subdomains.
- Removes sysdb_get_subdomains()
- Removes copy_subdomain()
- Add sysdb_subdomain_delete() |
1f800ebb0f190854b8296146174f3d696a426333 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Add ability to disable domains |
b8dcd1216e5ea7065213c750a92dabfe01fa3b70 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Add realm info to sss_domain_info |
c14184c07634801cda7864aa17c6fa8dc9ab43d1 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Move mpg flag to the domain where it belongs
A sysdb contains now multiple domains, but the mpg property is a
property of a specific domain not of the underlying database. |
59f136cd254d1acf2991c97221eb08803784777d |
|
15-Nov-2012 |
Paul B. Henson <henson@acm.org> |
Add ignore_group_members option.
https://fedorahosted.org/sssd/ticket/1376 |
66318dfe1e7138ff3fc780c4b3f0b29c4b2d8712 |
|
18-Oct-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Allow setting the default_shell option per-domain as well
https://fedorahosted.org/sssd/ticket/1583 |
3882325ff60f89d0c312e9519bdfd1351978fd73 |
|
05-Oct-2012 |
Jan Cholasta <jcholast@redhat.com> |
SSH: Expire hosts in known_hosts |
1542b85f13d72329685bdd97aa879c36d11f81be |
|
01-Oct-2012 |
Sumit Bose <sbose@redhat.com> |
Add new option default_domain_suffix |
38e2ec1c757955ab557fd95807afa58042d09482 |
|
27-Jul-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Renamed session provider to selinux provider |
695bca9d2f73096254308e0883fcc74b2631850e |
|
20-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
NSS: Add override_shell option
If override_shell is specified in the [nss] section, all users
managed by SSSD will have their shell set to this value. If it is
specified in the [domain/DOMAINNAME] section, it will apply to
only that domain (and override the [nss] value, if any).
https://fedorahosted.org/sssd/ticket/1087 |
2d257ccf620ce1b611f89cec8f0a94c88c2f2881 |
|
10-Jul-2012 |
Sumit Bose <sbose@redhat.com> |
pac responder: limit access by checking UIDs
A check for allowed UIDs is added in the common responder code directly
after accept(). If the platform does not support reading the UID of the
peer but allowed UIDs are configured, access is denied.
Currently only the PAC responder sets the allowed UIDs for a socket. The
default is that only root is allowed to access the socket of the PAC
responder.
Fixes: https://fedorahosted.org/sssd/ticket/1382 |
a6cbaf2932762e3e191a6bec252afec3c91bf97c |
|
06-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
CONFDB: Add the ability to set a boolean value in the confdb |
da9fd6373b94a49b748542ab568997b9e2421972 |
|
29-Jun-2012 |
Pavel Březina <pbrezina@redhat.com> |
confdb: add entry_cache_sudo_timeout option |
efc4a645d50f68d2a289c7e8a05bedf051d3c67d |
|
25-Jun-2012 |
Sumit Bose <sbose@redhat.com> |
Set default for subdomain_homedir |
b9e5bd09a5ff7009537a18914dbebcf10498f592 |
|
21-Jun-2012 |
Sumit Bose <sbose@redhat.com> |
PAC responder: add basic infrastructure
This adds only the basic outline of the PAC responder, it won't support
any operations, it will just start and initialize itself. |
bb79e7559dae451a14150377099e32d6b5159a6c |
|
18-Jun-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
Make the client idle timeout configurable |
3c60433641ce2e86b9b04778c8f8652ef0d097e4 |
|
13-Jun-2012 |
Stef Walter <stefw@gnome.org> |
Make re_expression and full_name_format per domain options
* Allows different user/domain qualified names for different
domains. For example Domain\User or user@domain.
* The global re_expression and full_name_format options remain
as defaults for the domains.
* Subdomains get the re_expression and full_name_format of
their parent domain.
https://bugzilla.redhat.com/show_bug.cgi?id=811663 |
e9f08ebaba5ec61af74c112f50c7d66257998c97 |
|
10-Jun-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Allow fast memcache timeout to be configurable
https://fedorahosted.org/sssd/ticket/1318 |
312818233ce48471c56d1a7589579892d9726e3b |
|
10-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
NSS: Add default_shell option
This option will allow administrators to set a default shell to be
used if a user does not have one set in the identity provider.
https://fedorahosted.org/sssd/ticket/1289 |
f6dbb235373b122ae15643ef5dbbe821ee1307d9 |
|
10-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
NSS: Add fallback_homedir option
This option is similar to override_homedir, except that it will
take effect only for users that do not have an explicit home
directory specified in LDAP.
https://fedorahosted.org/sssd/ticket/1250 |
bf8cce77a35cb0a3cdb0d21fb9c39b7b6372bc11 |
|
04-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Modify behavior of pam_pwd_expiration_warning
New option pwd_expiration_warning is introduced which can be set per
domain and can override the value specified by the original
pam_pwd_expiration_warning.
If the value of expiration warning is set to zero, the filter isn't
apllied at all - if backend server returns the warning, it will be
automatically displayed.
Default value for Kerberos: 7 days
Default value for LDAP: don't apply the filter
Technical note: default value when creating the domain is -1. This is
important so we can distinguish between "no value set" and 0. Without
this possibility it would be impossible to set different values for LDAP
and Kerberos provider. |
4fa3ef8d8a8a3cddf8025d306c3b90b37dd431bc |
|
24-Apr-2012 |
Jan Cholasta <jcholast@redhat.com> |
SSH: Add support for hashed known_hosts
https://fedorahosted.org/sssd/ticket/1203 |
8ccb0de226ccb9330f5a6865de487d6f0313902d |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
New config option for subdomains
subdomain_homedir - if set, it contains default value, can be overriden
in further processing |
fe1ac2443811a7125f2ddd0382a3f437f20377de |
|
24-Apr-2012 |
Sumit Bose <sbose@redhat.com> |
data provider: added subdomains |
c0f9698cd951b7223f251ff2511c4b22a6e4ba60 |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Responder part of the subdomain retrieval work |
d3f2fd9cb21cc10dce663a2f7d0deda07074e44e |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add conn_name to allow different names for domains and connections |
20d0bc6d587f346238062df4da5edfde815e59b1 |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add some utility functions for subdomains |
e76d78338026fa47dca32eaf7f5c15eabb1b951a |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Sysdb routines for subdomains |
b83e43eb88879c7fb3114aafcc525356ff7d4235 |
|
20-Apr-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Make the monitor SIGKILL time configurable
https://fedorahosted.org/sssd/ticket/1119 |
51773686d354b82081830444c048706d83d43d65 |
|
20-Apr-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
proxy: new option proxy_fast_alias |
d2d2d6ae0c436461bcc8f881df059eb036314c44 |
|
29-Feb-2012 |
Sumit Bose <sbose@redhat.com> |
Keep sysdb context in domain info struct |
3bea01f01d76e1e95a8239c0d3f67073992136a1 |
|
22-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Don't give memory context in confdb where not needed |
237eb8b15829c9b9dd630c6db7fff9f1f2e27ed7 |
|
18-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
Include the fd_limit configuration option |
e7311aec8d691e5427317442387af1bc8fff3742 |
|
07-Feb-2012 |
Jan Cholasta <jcholast@redhat.com> |
SSH: Responder |
74505b09d056883741e90cac45838c844365cae5 |
|
07-Feb-2012 |
Jan Cholasta <jcholast@redhat.com> |
DP: Add host info handler |
2d0550acbe07024d034fb616c1ec5b81929c4844 |
|
06-Feb-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add session target in data provider |
9e80079370ff3b943832adc3c5ef430e64be0a0c |
|
06-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
AUTOFS: responder |
5708dc97b69a468f077616d7a75e81f4172f63fa |
|
06-Feb-2012 |
Jakub Hrozek <jhrozek@redhat.com> |
AUTOFS: Data Provider request |
c9aab1c04c399ca2d1abef74f6df22ced34983dc |
|
04-Feb-2012 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration - responder 'sudo_timed' option
https://fedorahosted.org/sssd/ticket/1116 |
41ef946f3f74a46b9e26118116e4811e259b30ef |
|
04-Feb-2012 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration - in-memory cache in responder
New sudo responder option: cache_timeout
https://fedorahosted.org/sssd/ticket/1111 |
bd92e8ee315d4da9350b9ef0358c88a7b54aeebe |
|
04-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
NSS: Add individual timeouts for entry types
https://fedorahosted.org/sssd/ticket/1016 |
b8ecc581cdd8c7d097bf9db67a4cb220fbbcff6d |
|
20-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Failover: Introduce a per-service timeout
https://fedorahosted.org/sssd/ticket/976 |
2827b0d03f7b6bafa504d22a5d7ca39cbda048b3 |
|
16-Dec-2011 |
Pavel Březina <pbrezina@redhat.com> |
SUDO Integration - responder |
88c5d362804244a5a74785b94018ddf887094553 |
|
16-Dec-2011 |
Pavel Březina <pbrezina@redhat.com> |
SUDO integration - data provider backend handler |
b3b42c49656e192787a983aaa8b9ec744ba4cb9d |
|
16-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Use the case sensitivity flag in responders |
1a7529bf5f867b43e0475f7f9ac0cd8671fb16f1 |
|
08-Sep-2011 |
Pavel Březina <pbrezina@redhat.com> |
DEBUG timestamps offer higher precision
https://fedorahosted.org/sssd/ticket/956
Added: --debug-microseconds=0/1
Added: debug_microseconds to sssd.conf |
4b6a0d0b3d42e5fdb457f47d9adfa5e66b160256 |
|
02-Sep-2011 |
Stephen Gallagher <sgallagh@redhat.com> |
Add option to specify the kerberos replay cache dir
Adds a configure option to set the distribution default as well as
an sssd.conf option to override it.
https://fedorahosted.org/sssd/ticket/980 |
1dc99c9d468cfe2a7f7286a8969c586f8740bb9f |
|
29-Jul-2011 |
John Hodrien <J.H.Hodrien@leeds.ac.uk> |
Add vetoed_shells option
There may be users in LDAP that have a valid but unwelcome shell
set in their account. This adds a blacklist of shells that should
always be replaced by the fallback_shell.
Signed-off-by: Stephen Gallagher <sgallagh@redhat.com> |
068dbee9ca7bf5b37330eff91c94ae10f288d09f |
|
20-May-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add new options to override shell value
https://fedorahosted.org/sssd/ticket/742 |
d9d716b547d256c03df97b0ff8282349a0f365ad |
|
20-May-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a new option to override home directory value
https://fedorahosted.org/sssd/ticket/551 |
54af51d2129d29258108a6dbf072a82c930bf399 |
|
20-May-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Add a new option to override primary GID number
https://fedorahosted.org/sssd/ticket/742 |
67aa400d9ce91705225e51010e832877511cb7d4 |
|
19-Jan-2011 |
Sumit Bose <sbose@redhat.com> |
Add pam_pwd_expiration_warning config option |
c71ff1e4615ec8560b90ca7d4827d99424ad0355 |
|
22-Dec-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Update the ID cache for any PAM request
Also adds an option to limit how often we check the ID provider,
so that conversations with multiple PAM requests won't update the
cache multiple times.
https://fedorahosted.org/sssd/ticket/749 |
9468a58f9bd191ef80c114943a288037c635a835 |
|
15-Nov-2010 |
Sumit Bose <sbose@redhat.com> |
Introduce pam_verbosity config option
Currently we display all PAM messages generated by sssd to the user. But
only some of them are important and others are just some useful
information.
This patch introduces a new option to the PAM responder which controls
what kind of messages are displayed. As an example the 'Authenticated
with cached credentials' message is used. This message is only displayed
if pam_verbosity=1 or if there is an expire date. |
d94c1a6b8badd8e4cf94815ad14ce6c0c715e9d3 |
|
13-Oct-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Store entry_cache_timeout in sss_domain_info object
This is useful so that the NSS responder can identify an domain's
entry timeout for expiring the memory cache for a lookup such as
with netgroups. |
e44e99804519b37852ee9ea24d18d2d2710110ce |
|
15-Sep-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Use a different min_id for local domain
When we changed the default min_id to be 1, we forgot about the local
domain. It makes sense to keep the minimum id larger there. |
cab4c5011d0dc6d98e2115f46b1185a17804df49 |
|
09-Jul-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add try_inotify option
There are some special cases where inotify cannot be used, even if
the host OS claims that it is supported. In these cases, it should
be possible to explicitly disable the use of inotify.
https://fedorahosted.org/sssd/ticket/484 |
780ffc9f6d5e1fcd4df3d390b56cb98878223cc0 |
|
30-Jun-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Add dns_discovery_domain option
The service discovery used to use the SSSD domain name to perform DNS
queries. This is not an optimal solution, for example from the point of
view of authconfig.
This patch introduces a new option "dns_discovery_domain" that allows to set
the domain part of a DNS SRV query. If this option is not set, the
default behavior is to use the domain part of the machine's hostname.
Fixes: #479 |
855abda5ed5a0dcae499632ed5ead1d4cd293b48 |
|
09-Jun-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Change default min_id to 1
Also update manpage for min_id/max_id to be more clear about how
it relates to primary GID. |
83bc461f812b3c3df260b5f75d84b34bb1135062 |
|
30-Apr-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Add dns_resolver_timeout option
We had a hard-coded timeout of five seconds for DNS lookups in the
async resolver. This patch adds an option 'dns_resolver_timeout'
to specify this value (Default: 5) |
4aa841c5724f313435aeea1c0319e81bb0d14321 |
|
06-Apr-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Add userdel_cmd param
Fixes: #231 |
70f4c2a1c476804b4fc409923b6fb7b0c2d2aaf4 |
|
04-Mar-2010 |
Martin Nagy <mnagy@redhat.com> |
Make confdb_init's confdb_location parameter const |
af81aaa57f82eab78647113c391bd84247f96150 |
|
23-Feb-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Better cleanup task handling
Implements a different mechanism for cleanup task. Instead of just
deleting expired entries, this patch adds a new option
account_cache_expiration for domains. If an entry is expired and the last
login was more days in the past that account_cache_expiration, the entry is
deleted.
Groups are deleted if they are expired and and no user references them
(no user has memberof: attribute pointing at that group).
The parameter account_cache_expiration is not LDAP-specific, so that other
future backends might use the same timeout setting.
Fixes: #391 |
e0bb119bdc1549d731f371202428c0cb667d3388 |
|
22-Feb-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Restrict family lookups
Adds a new option that tells resolver which address family to prefer or
use exclusively.
Fixes: #404 |
48dbc3c447449b9bb1a9b7c839b9471ef4f547bf |
|
22-Feb-2010 |
Jakub Hrozek <jhrozek@redhat.com> |
Remove Kerberos options from confdb.h
Kerberos-specific options are pulled using dp_get_opts() and defined
in Kerberos subtree. There is no need to keep these in confdb. |
1c48b5a62f73234ed26bb20f0ab345ab61cda0ab |
|
18-Feb-2010 |
Stephen Gallagher <sgallagh@redhat.com> |
Rename server/ directory to src/
Also update BUILD.txt |