c1208b485924964a7a4fcf19562964acb47fc214 |
|
05-Apr-2018 |
Justin Stephenson <jstephen@redhat.com> |
CONFDB: Add passwd_files and group_files options
Add new options to the files provider allowing an administrator to
configure the files provider to read and monitor multiple or
non-standard passwd and group file sources. These options default to
/etc/passwd and /etc/group when unset.
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
d72ac2c58360cd272277b5ddde67bbff53106a74 |
|
26-Oct-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFIG: Add a new option auto_private_groups
The auto_private_groups option is used to configure the domain->mpg flag
which was already set automatically for subdomains, but for some time was
not settable by the admin via the configuration file.
The new option name, instead of the old magic_private_groups, was chosen
purely because this name would hopefully be better understood by admins.
The option doesn't do anything yet, it is just added to all the places a
new option should be added to.
Related:
https://pagure.io/SSSD/sssd/issue/1872
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
f34a8330c1615511795847b0a1454249d782db2a |
|
19-Oct-2017 |
Alexey Kamenskiy <alexey.kamenskiy@chinanetcloud.com> |
LDAP: Add support for rhost access control
This patch implements verification of pam_rhost against
rules stored in LDAP entry of a user.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
895584001760e8188db486bc39f9938624822d35 |
|
13-Sep-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
CONFIG: Fix schema for try_inotify
It is read only from "[sssd]" section.
Resolves:
https://pagure.io/SSSD/sssd/issue/3511
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
6b3bab516355fdf4cc81e6da9d87ec3818ab190f |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Add a new option to control per-UID limits
Adds a new option max_uid_secrets that allows to set a limit of secrets
for this particular client so that the user cannot starve other users.
Resolves:
https://pagure.io/SSSD/sssd/issue/3363
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
197da163943868216f704fb34031e7d5576e8aee |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Use separate quotas for /kcm and /secrets hives
This would differentiate between out-of-capacity errors for secrets and
for KCM as they are two independent trees as far as sssd-secrets is
concerned.
The quotas for /kcm are also different in their defaults. For the /secrets
hive, we presume a large amount of small secrets. For the /kcm hive, we
presume a small amount of large secrets, because the secret is a ccache
which contains multiple credentials.
The operations are also passed in a struct quota from the local request
context instead of local_context. The quota is assigned to the request
context when the hive is selected.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
4db56d8c90a6467a216590e5ba3bdcd2a2bf1ae9 |
|
01-Sep-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
SECRETS: Read the quotas for cn=secrets from [secrets/secrets] configuration subsection
This patch makes obsoletes the old way of configuring quotas for the
secrets responder. Instead, adds a new way of configuring each hive
separately in a configuration subsection, e.g.
[secrets/secrets]
max_secrets = 123
The old way is still supported as a backwards-compatible method.
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
4a311702045b065a97a0c0fc0ccc7a1fc84b38cf |
|
28-Aug-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
DESKPROFILE: Add ipa_deskprofile_request_interval
This option has been added to avoid contacting the Data Provider when no
rules were found in the previous request.
By adding this configurable option we avoid contacting the Data Provider
too often in the case described above and also when the server doesn't
support Desktop Profile's integration.
Resolves: https://pagure.io/SSSD/sssd/issue/3482
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
f982039c75ec064894deb676ae53ee57de868590 |
|
28-Aug-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
DESKPROFILE: Introduce the new IPA session provider
In order to provide FleetCommander[0] integration, a session provider
has been introduced for IPA. The design of this feature and more
technical details can be found at [1] and [2], which are the design
pages of both freeIPA and SSSD parts.
As there's no way to test freeIPA integration with our upstream tests,
no test has been provided yet.
Is also worth to mention that the name "deskprofile" has been chosen
instead of "fleetcmd" in order to match with the freeIPA plugin. It
means that, for consistence, all source files, directories created,
options added, functions prefixes and so on are following the choice
accordingly.
[0]: https://wiki.gnome.org/Projects/FleetCommander
[1]: https://github.com/abbra/freeipa-desktop-profile/blob/master/plugin/Feature.mediawiki
[2]: https://docs.pagure.org/SSSD.sssd/design_pages/fleet_commander_integration.html
Resolves:
https://pagure.io/SSSD/sssd/issue/2995
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a5f300adf19ec9c3087c62bd93a5175db799687a |
|
18-Aug-2017 |
Pavel Březina <pbrezina@redhat.com> |
sudo: add a threshold option to reduce size of rules refresh filter
If a large number of rules is expired at one time the ldap filter may
become too large to be processed by server. This commits adds a new
option "sudo_threshold" to sudo responder. If the threshold is
exceeded a full refreshed is done instead of rules refresh.
Resolves:
https://pagure.io/SSSD/sssd/issue/3478
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
555f43b491f40e0237b8677565a748b929092bee |
|
27-Jul-2017 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
CONFIG: Add session_recording section
Add information on "session_recording" config section, having three
options: "scope", "users", and "groups".
The section is intended for disabling session recording ("scope = none",
default), enabling session recording for all users ("scope = all"), and
enabling it for some specific users and/or groups ("scope = some",
"users = <users>", "groups = <groups>").
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
5919e884d3f71456f50b92236e002d98747be017 |
|
01-Jun-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
VALIDATOR: prevent duplicite report from subdomain sections
Issues is subdomain sections e.g. "[domain/A.test/B.A.test]" were
reported twice.
[rule/allowed_domain_options]: Attribute 'debug_leTYPOvel' is not allowed in section 'domain/A.test/B.A.test'. Check for typos.
[rule/allowed_subdomain_options]: Attribute 'debug_leTYPOvel' is not allowed in section 'domain/A.test/B.A.test'. Check for typos.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
39c5aee02fa36ba1cb78fe7669f272fec5277018 |
|
31-May-2017 |
Michal Židek <mzidek@redhat.com> |
VALIDATORS: Detect inherit_from in normal domain
This patch adds new sssd specific validator. In the future we
can add more checks in it, but currently it only checks if
the option inherit_from is used on normal domain and reports
error if it is.
Resolves:
https://pagure.io/SSSD/sssd/issue/3356
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
0bfc49133ab1a5f912b8cedef3f690318df7c50f |
|
31-May-2017 |
Michal Židek <mzidek@redhat.com> |
VALIDATORS: Change regex for app domains
Use the same restrictions for application domains that we use for
normal domain.
Resolves:
https://pagure.io/SSSD/sssd/issue/3356
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a6a750d981a7a9088daa823ed3894b94e156a763 |
|
31-May-2017 |
Michal Židek <mzidek@redhat.com> |
VALIDATORS: Escape special regex chars
The rule allowed_domain_options did not work because
of bad regex.
Resolves:
https://pagure.io/SSSD/sssd/issue/3356
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
f433e4dc4d80bef398ed8d9aac123963015bd2f0 |
|
31-May-2017 |
Michal Židek <mzidek@redhat.com> |
VALIDATORS: Remove application section domain
Application domains can use the same options as normal domains section
with one more additional option.
We could either duplicate all options from the domain section also in
the application domain section + add the one additional option or
add this one option to the domain section even though it is not meant
to be used there to avoid duplication of all domain options in the
rule for application section.
It would be could to enhance the validators in libini to allow
something like 'include' section in order to avoid this issue
in the future.
Resolves:
https://pagure.io/SSSD/sssd/issue/3356
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
0ab730850171c125cd4ce578c123656dd88eb484 |
|
31-May-2017 |
Michal Židek <mzidek@redhat.com> |
VALIDATORS: Add subdomain section
Add separate rule for subdomain sections.
Resolves:
https://pagure.io/SSSD/sssd/issue/3356
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
beab60d88fc07d463f6fb3756c8f3d29bdd78827 |
|
26-May-2017 |
Justin Stephenson <jstephen@redhat.com> |
CONFIG: Add subdomain_homedir to config locations
Option subdomain_homedir was missing from Python config API an
cfg_rules leading to config file validation failures. Add this option
into the necessary locations similar to other provider-generic domain
options.
Resolves:
https://pagure.io/SSSD/sssd/issue/3389
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
352f4832324839d358235de1236090b1fd4ddc0f |
|
28-Apr-2017 |
René Genz <liebundartig@freenet.de> |
Use correct spelling of override
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
720e1a5b95a953a0f1c8315bbb7c9c1edf9fb417 |
|
30-Mar-2017 |
Pavel Březina <pbrezina@redhat.com> |
secrets: allow to configure certificate check
Some users may want to use TLS with unverified peer (for example if
they use self-signed certificate) or if unverified hostname (if
certificate hostname does not match with the real hostname). On the
other side it may be useful to point to a directory containing custom
certificate authorities.
This patch add three new options to secrets responder:
verify_peer => peer's certificate must be valid
verify_host => hostnames must match
capath => path to directory containing CA certs
cacert => ca certificate
cert => client certificate
key => client private key
Resolves:
https://pagure.io/SSSD/sssd/issue/3192
Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3e789aa0bd6b7bb6e62f91458b76753498030fb5 |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
PAM: Add application services
Related to:
https://pagure.io/SSSD/sssd/issue/3310
Adds a new PAM responder option 'pam_app_services'. This option can hold
a list of PAM services that are allowed to contact the application
non-POSIX domains. These services are NOT allowed to contact any of the
POSIX domains.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
825e8bf2f73a815c2eceb36ae805145fcbacf74d |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFDB: Allow configuring [application] sections as non-POSIX domains
Related to:
https://pagure.io/SSSD/sssd/issue/3310
Allows to add a new section:
[application/$name]
This section internally (on the confdb level) expands to:
[domain/$name]
domain_type = application
The reasons to add this new section is two-fold. One, to make the
configuration of application domains more explicit and two, to make it
possible to share configuration between two domains, one POSIX and one
non-POSIX by application domain's inherit_from option:
[application/$name]
inherit_from = posix_domain_name
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
6324eaf1fb321c41ca9883966118df6d45259b7e |
|
30-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFDB: Introduce SSSD domain type to distinguish POSIX and application domains
Related to:
https://pagure.io/SSSD/sssd/issue/3310
Adds a new option that allows to distinguish domains that do contain
POSIX users and groups and those that don't. The POSIX domains are the
default. The non-POSIX domains are selected by selecting an
"application" type domain.
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
16385568547351b5d2c562f3081f35f3341f695b |
|
29-Mar-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
Add domain_resolution_order config option
This is the local equivalent of option of ipaDomainResolutionOrder and
has precedence over the ones set on IPA side making the precedence order
to be like: Local > View > Globally.
As done for the IPA side configurations, the domains which were not
explicitly set up will be apennded to the final of the
domain_resolution_order list in the very same order they're presented in
the "domains" option of [sssd] section in the config file. There's no
guarantee of order for the subdomains though.
It's also important to mention that no expansion magic is performed on
our side. It means that if 'example.com' is set it does *not* stand for
all its subdomains DNS wise (like 'foo.example.com', 'bar.example.com',
etc).
Related:
https://pagure.io/SSSD/sssd/issue/3001
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
e89ba95737202d551db2c9524127e6c4cf308796 |
|
27-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
KCM: Idle-terminate the responder if the secrets back end is used
Existing with memory database would be fatal as we keep the ccaches in
memory then, but if the ccaches are stored in sssd-secrets, we can just
exit on idle.
Reviewed-by: Michal Židek <mzidek@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
35c9dfe9ba78d3a635cd1af0fb6349ba44344623 |
|
27-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
KCM: Make the secrets ccache back end configurable, make secrets the default
Adds a new option 'ccache_storage' that allows to select either the
memory back end or the secrets back end. The secrets back end is the
default one and this option is even undocumented.
Reviewed-by: Michal Židek <mzidek@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
b9c563c29243291f40489bb0dcbf3946fca72d58 |
|
27-Mar-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
KCM: Initial responder build and packaging
Adds the initial build of the Kerberos Cache Manager responder (KCM).
This is a deamon that is capable of holding and storing Kerberos
ccaches. When KCM is used, the kerberos libraries (invoked through e.g.
kinit) are referred to as a 'client' and the KCM deamon is referred to
as 'server'.
At the moment, only the Heimdal implementation of Kerberos implements the
KCM server:
https://www.h5l.org/manual/HEAD/info/heimdal/Credential-cache-server-_002d-KCM.html
This patch adds a KCM server to SSSD.
In MIT, only the 'client-side' support was added:
http://k5wiki.kerberos.org/wiki/Projects/KCM_client
This page also describes the protocol between the client and the server.
The client is capable of talking to the server over either UNIX sockets
(Linux, most Unixes) or Mach RPC (macOS). Our server only implements the
UNIX sockets way and should be socket-activated by systemd, although can
in theory be also ran explicitly.
The KCM server only builds if the configuration option "--with-kcm" is
enabled. It is packaged in a new subpackage sssd-kcm in order to allow
distributions to enable the KCM credential caches by installing this
subpackage only, without the rest of the SSSD. The sssd-kcm subpackage
also includes a krb5.conf.d snippet that allows the admin to just uncomment
the KCM defaults and instructs them to start the socket.
The server can be configured in sssd.conf in the "[kcm]" section.
By default, the server only listens on the same socket path the Heimdal
server uses, which is "/var/run/.heim_org.h5l.kcm-socket". This is,
however, configurable.
The file src/responder/kcm/kcm.h is more or less directly imported from
the MIT Kerberos tree, with an additional sentinel code and some
comments. Not all KCM operations are implemented, only those that also
the MIT client implements. That said, this KCM server should also be
usable with a Heimdal client, although no special testing was with this
hybrid.
The patch also adds several error codes that will be used in later
patches.
Related to:
https://pagure.io/SSSD/sssd/issue/2887
Reviewed-by: Michal Židek <mzidek@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
8bb6680637ead03e24a38d15ec5265d11a920a1d |
|
14-Mar-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
CACHE_REQ: Check the caches first
This patch introduces a new configurable option to define whether the
responder should query all domains' caches before querying the Data
Providers.
This new option is called cache_first and, by default, it's disabled,
meaning that, for each provider, the responder may contact the cache and
the data provider in the same iteration.
Co-Author: Pavel Březina <pbrezina@redhat.com>
Related:
https://pagure.io/SSSD/sssd/issue/3001
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
4358d76475f0292461a2a479d2149472db103c1d |
|
08-Mar-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Shutdown the responder in case it becomes idle
Similarly to what has been done for the other responders, let's shutdown
the secrets responder in case it becomes idle.
Resolves:
https://pagure.io/SSSD/sssd/issue/3316
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
78bb3676fe8326e0fe2b60daad8bf524e4625d4e |
|
27-Feb-2017 |
Jakub Hrozek <jhrozek@redhat.com> |
MONITOR: Enable an implicit files domain if one is not configured
If SSSD is compiled with --enable-files-domain, the loading of the
domains changes such that:
* if no domain with id_provider=files exists in the config file, an
implicit SSSD files domain is added
* this domain is always first in the list
The administrator is free to create a files domain in the config file
himself and either place it at the end of the list or not enable it at
all.
Resolves:
https://pagure.io/SSSD/sssd/issue/3112
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
151a6de4793e0045a7085d4d72b975947662e566 |
|
23-Jan-2017 |
Fabiano Fidêncio <fidencio@redhat.com> |
RESPONDER: Shutdown {dbus,socket}-activated responders in case they're idle
This commit introduces a new option for the responders called
responder_idle_timeout, which specifies the number of seconds that the
responder process can be up without being used. The default value is
300 seconds (5 minutes) and can be configured per responder, being 60
seconds the minimum acceptable value.
Is important to note that setting "responder_idle_timeout = 0" disables
the responder timeout, which makes sense for the responders that always
will be running.
The shutdown timeout is activated per responder in case the responder
has been {dbus,socket}-activated. In case of any commnunication with the
responder the timeout is reset thereby ensuring we won't shutdown a
responder that is not idle.
Setting the responder's last request time is done slightly differently
for socket-activated and dbus-activated responders. In both cases it's
updated in any internal communication in sbus_message_handler(), but
for the socket-activated responders it's also updated when the
responder's socket is used.
Currently it works properly with all responders but the secrets one,
which has a different logic and must be treated separately in case some
change is required there.
Is worth to mention that this commit does not affect the responders
explicitly configured in the "services" line of sssd.conf.
Related:
https://fedorahosted.org/sssd/ticket/3245
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
7171a7584dda534dde5409f3e7f4657e845ece15 |
|
24-Nov-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add configurable payload size limit of a secret
Resolves:
https://fedorahosted.org/sssd/ticket/3169
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
682c9c3467055c2149af28826f7458b857b0f8c4 |
|
10-Nov-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add allowed_sec_users_options
There are options (the proxying related ones) that only apply to the
secrets' subsections. In order to make config API able to catch those,
let's create a new section called allowed_sec_users_options) and move
there these proxying options.
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
da8801c363716533f60bc78e10f3a2100cebc3a1 |
|
10-Nov-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Fix secrets rule in the allowed sections
We have been matching an invalid subsection of the secrets' section,
like:
[secrets/users/]
Let's ensure that we only match the following cases:
[secrets]
[secrets/users/[0-9]+]
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
ce43f710c9638fbbeae077559cd7514370a10c0c |
|
02-Nov-2016 |
Sumit Bose <sbose@redhat.com> |
PAM: add pam_response_filter option
Currently the main use-case for this new option is to not set the
KRB5CCNAME environment varible for services like 'sudo-i'.
Resolves https://fedorahosted.org/sssd/ticket/2296
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
65a38b8c9cabde6c46cc0e9868f54cb9bb10afbf |
|
05-Oct-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add a configurable limit of secrets that can be stored
Related:
https://fedorahosted.org/sssd/ticket/3169
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
efc65e78fa4e01e6cecc8690a9899af61213be62 |
|
03-Oct-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
SECRETS: Add a configurable depth limit for nested containers
Resolves:
https://fedorahosted.org/sssd/ticket/3168
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ba96228853da4981cc5c12904c52cd7242417d6d |
|
03-Oct-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFIG: List allowed secrets responder options
Related:
https://fedorahosted.org/sssd/ticket/3207
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
5e17edfc899d4fffb15f8300d15e4412af0f2f7d |
|
03-Oct-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
CONFIG: Add secrets responder to the allowed sections
The regular expression used is quite specific for the two cases we
support:
- [secrets]
- [secrets/users/$uid]
It could be done a bit more generic, but the way it's right now it can
easily catch errors like: [secrets/usrs/$uid] or [secrets/].
Related:
https://fedorahosted.org/sssd/ticket/3207
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
aef0171e0bdc9a683958d69c7ee984fb10cd5de7 |
|
13-Sep-2016 |
Petr Cech <pcech@redhat.com> |
PROXY: Adding proxy_max_children option
The new option 'proxy_max_children' is applicable
in domain section. Default value is 10.
Resolves:
https://fedorahosted.org/sssd/ticket/3153
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
081c6d8c7c8e75487d1c4e42862964be1e85b575 |
|
12-Sep-2016 |
Justin Stephenson <jstephen@redhat.com> |
MONITOR: Add disable_netlink option
Adding a new monitor boolean option to disable netlink support.
This will give users more control over sssd state changes without
having to modify systemd unit files.
Resolves:
https://fedorahosted.org/sssd/ticket/3142
Reviewed-by: Petr Cech <pcech@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
5b0735876aa66464b24cb7736a74fafd8ec82128 |
|
31-Aug-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
MONITOR: Remove leftovers from kill_service
Seems that wen I sent the v2 of ac35fe74 I attached the wrong pacth that
ended up being pushed.
The patch was incomplete as there are still some leftovers.
The .po and sssd-docs.pot were not touched as I do believe they are
autogenerated from Zanata.
Related:
https://fedorahosted.org/sssd/ticket/3052
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Petr Čech <pcech@redhat.com> |
e04df9feca0c9877c69aa46450d04c556bcb23ad |
|
31-Aug-2016 |
Fabiano Fidêncio <fidencio@redhat.com> |
MONITOR: Remove leftovers from diag_cmd
Seems that when I sent the v2 of 7579cf99 I attached the wrong patch
that ended up being pushed.
That patch was incomplete as there are still some leftovers.
Related:
https://fedorahosted.org/sssd/ticket/3051
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Petr Čech <pcech@redhat.com> |
d940593e647731c0caec1fd04cf16a1b23578f32 |
|
23-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFIG: session_provider does not exist anymore
The session_provider used to exist a long time ago when we used to set
the SELinux context from it, but the provider had been removed for a
long time. We just forgot to remove the value from the config API and
the validator.
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
dec00197181ee8f7efbfbdadd73629f66f80f1ff |
|
23-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFIG: selinux_provider is a valid provider type
We should not warn about it in the validator and should allow
selinux_provider from the config API.
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
d6342c92c226becbdd254f90a0005b8c00c300dc |
|
17-Aug-2016 |
Petr Cech <pcech@redhat.com> |
AD_PROVIDER: Add ad_enabled_domains option
Resolves:
https://fedorahosted.org/sssd/ticket/2828
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
6d19051c50c10fc4de056ebb385c63ec0ed221cb |
|
12-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFIG: re_expression is an allowed option for all domains
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
cc4d1af16820b15595b60c3df15220fb852eb897 |
|
12-Aug-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
CONFIG: full_name_format is an allowed option for all domains
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a20968099c0e02f17311ab4b20680a872d464393 |
|
10-Aug-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
config_schema: Add ldap_user_email to schema
Resolves:
https://fedorahosted.org/sssd/ticket/3068
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
aeab20358006d728a284f969f92f3890498cd651 |
|
12-Jul-2016 |
Michal Židek <mzidek@redhat.com> |
config: Add config_file_version to schema
Resolves:
https://fedorahosted.org/sssd/ticket/3068
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
1b9b5477027d86a2afb2e72981253d108c5398da |
|
12-Jul-2016 |
Michal Židek <mzidek@redhat.com> |
config: Allow timeout for all sevices
Allow option "timeout" for all sevices.
Also remove unused macro CONFDB_SERVICE_TIMEOUT.
Resolves:
https://fedorahosted.org/sssd/ticket/3068
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
0a172552ec16f3b84d127399551cad786da8fd9d |
|
12-Jul-2016 |
Michal Židek <mzidek@redhat.com> |
config: Fix user_attributes
Fixes:
https://fedorahosted.org/sssd/ticket/3068
Option user_attributes is also available in
NSS responder, but not in PAC responder.
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
fc04d11c2fdde0bfe280c6030df2b1d6bf15ce63 |
|
12-Jul-2016 |
Michal Židek <mzidek@redhat.com> |
config: override_space is monitor's option
We read override_space from [sssd] not
[nss] section.
Resolves:
https://fedorahosted.org/sssd/ticket/3068
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
c42ca36247022490ad65a33c453cb5e43900dbe9 |
|
27-Jun-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
Prepare ini schema with rules for validation
Resolves:
https://fedorahosted.org/sssd/ticket/2028
Reviewed-by: Michal Židek <mzidek@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |