0526dde7f3d4089617c0f4a6a85f83e9d266c9f1 |
|
19-Sep-2017 |
Marlena Marlenowska <stolarek.marcin@gmail.com> |
IDMAP: Prevent colision for explicitly defined slice.
Currently it happens for default domain, if someone configures
different ldap_idmap_default_domain_sid for two domains in
sssd.conf. There is no check preventing this in sdap_idmap.c, it's simply:
sdap_idmap_add_domain(idmap_ctx, dom_name,sid_str, 0). However, I believe
here is the best place to check it since there may be different use of
sss_idmap_calculate_ranges in the future.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
3996e391054a1c02ab62e1541ae21a8204bd5d0a |
|
03-Aug-2017 |
AmitKumar <amitkuma@redhat.com> |
Moving headers used by both server and client to special folder
These are the header files which are used by both client and server:
src/util/io.h
src/util/murmurhash3.h
src/util/util_safealign.h
This patch is about moving these header files to special folder
(src/shared). It will be easier to identify these headers when looking
for them in the src tree.
util_safalign.h is renamed as safalign.h because util_ namespace is
appropriate when this file belonged to the util's folder which is no
longer the case.
Resolves:
https://pagure.io/SSSD/sssd/issue/1898
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
c377d4d604f1e7b35c484711f1084b7a761772b6 |
|
24-Jul-2017 |
Sumit Bose <sbose@redhat.com> |
idmap_error_string: add missing descriptions
Related to https://pagure.io/SSSD/sssd/issue/1960
Related to https://pagure.io/SSSD/sssd/issue/1938
Related to https://pagure.io/SSSD/sssd/issue/1844
Related to https://pagure.io/SSSD/sssd/issue/1593
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
b9941359b3181c42f415530d5ccad0f4664d85fa |
|
21-Sep-2016 |
Lukas Slebodnik <lslebodn@redhat.com> |
Remove double semicolon at the end of line
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
bda0a8ee67c4222ede597fd57456b74e33116653 |
|
02-Mar-2016 |
Pavel Reichl <preichl@redhat.com> |
IDMAP: Make parameter names more descriptive
Domain SID (not name) is part of identification string for helper range
in generate_sec_slice_name().
Use more generic name for range identifier when calculating range for
new slice in sss_idmap_calculate_range().
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
012d334cec221d8abf86dffbbaf9649ec0a4b585 |
|
01-Mar-2016 |
Pavel Reichl <preichl@redhat.com> |
IDMAP: Add minor performance improvements
Some ID ranges are precalculated when ID mapping is being initialized.
This patch utilizes these (helper) ranges when new domains are generated
if appropriate.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
5554a2a679f72f19f266d660a5681e3b0c657379 |
|
28-Jan-2016 |
Pavel Reichl <preichl@redhat.com> |
IDMAP: Fix minor memory leak
Reviewed-by: Michal Židek <mzidek@redhat.com> |
8babbeee01e67893af4828ddfc922ecac0be4197 |
|
20-Jan-2016 |
Pavel Reichl <preichl@redhat.com> |
IDMAP: Add support for automatic adding of ranges
Resolves:
https://fedorahosted.org/sssd/ticket/2188
Reviewed-by: Sumit Bose <sbose@redhat.com> |
c3cdd6a644a870531092e4378cbcd1a428ff514c |
|
20-Jan-2016 |
Pavel Reichl <preichl@redhat.com> |
IDMAP: New structure for domain range params
Create new internal structure idmap_range_params by merging ID mapping
range relevant fields from idmap_domain_info and remove corrsponding
fields.
Resolves:
https://fedorahosted.org/sssd/ticket/2188
Reviewed-by: Sumit Bose <sbose@redhat.com> |
7db89d44b5582a0cb0a61a7aa42a2fac7ca9408f |
|
20-Jan-2016 |
Pavel Reichl <preichl@redhat.com> |
IDMAP: Fix computing max id for slice range
Max value of id mapping range was 1 unit too high.
Resolves:
https://fedorahosted.org/sssd/ticket/2922
Reviewed-by: Sumit Bose <sbose@redhat.com> |
ff6e24f4474cca6226cd44c47ba2ec6ba6cf9a16 |
|
26-Feb-2014 |
Sumit Bose <sbose@redhat.com> |
IDMAP: add sss_idmap_check_collision(_ex)
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
5c94d34d890c75ec179a32d2cda4fa060d2b5f0c |
|
07-Nov-2013 |
Pavel Březina <pbrezina@redhat.com> |
idmap: add API to free allocated SIDs |
3cbbfb4b05d0eb0a0809704e83589d0075e117a0 |
|
25-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: add sss_idmap_domain_by_name_has_algorithmic_mapping() |
d9059ad391cc73ad91893c3eab509d08699d5aba |
|
17-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: allow ranges with external mapping to overlap
If POSIX IDs are managed externally e.g. by AD it might be possible that
the IDs are centrally manages for the whole forest. Hence there might
not be a single ID range for each member domain in the forest but only a
single ID range for the whole forest. This means that we have to allow
collisions if ID ranges in this case.
Unit tests are added to make sure that the collisions are only allowed
for external mappings. |
222f2484ea37c8bd434184ccd38160fb58c8087f |
|
17-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: fix a memory leak if a collision is detected |
cff4a89e38078337d74aa558f0e628d5756b3bba |
|
17-Oct-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: add internal function to free a domain struct |
7f02ba09b9481f59c309fd09a88089857e7fe79f |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: add sss_idmap_domain_has_algorithmic_mapping
With this call it can be checked if for a given domain algorithmic
mapping is available or if the ID must be read from an external source.
The default if an error occurs or no matching range was found is false,
i.e external mapping, to meet the requirements for simple LDAP based
domains where only external mapping is available.
Fixes https://fedorahosted.org/sssd/ticket/1960 |
9869c20a4db6ce7e285a9d7ae7007718a6de207e |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: add calls to check if ID mapping conforms to ranges
When ID are mapped externally it must be checked if the extern ID falls
into the right configured range to avoid ID conflicts.
Fixes https://fedorahosted.org/sssd/ticket/1960 |
47b326af8e662b215139d55e6d52f2b6066fc6df |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: allow NULL domain sid for external mappings
Since it is planned that the LDAP based ID providers (LDAP, AD, IPA)
will always use libsss_idmap to map ID or get information about how to
map it, it must be possible to add domains to libsss_idmap which do not
have a SID or where is SID is not known when external mapping is used.
Algorithmic mapping always requires a domain SID.
Fixes https://fedorahosted.org/sssd/ticket/1960 |
c63c8a63ab062a9c4397278a29b12bd32c4f3895 |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: add option to indicate external_mapping
The idea is that ranges for IDs from AD can be used in libsss_idmap as
well, but whenever a mapping is requested for this range a specific
error code IDMAP_EXTERNAL is returned to tell SSSD to do
an AD lookup. This way SSSD does not need to inspect the ranges itself
but all is done inside if libsss_idmap.
Fixes https://fedorahosted.org/sssd/ticket/1960 |
9ef0d43b961c05f1aae2ec21eed4142ae3221bc3 |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: add optional unique range id
To be able to detect configuration changes in idranges managed by
FreeIPA an identifier should be stored on the client together with the
other idrange related data.
Fixes https://fedorahosted.org/sssd/ticket/1979 |
95a08a0c02281b28bd1914e0727b40ae25b4e16a |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
idmap: allow first RID to be set
Currently libss_idmap implicitly assumes that the RID 0 is always mapped
to the first ID of the given range. This is not the case anymore when
multiple ranges are used e.g. for trusted domains in FreeIPA.
A new call sss_idmap_add_domain_ex() was added which can take the first
RID as an argument. This new call will get more options with other
patches hence I didn't change the library version with this patch.
Fixes https://fedorahosted.org/sssd/ticket/1938 |
11fd679eb2edabd139c9016e2b7d2085ca3aac5d |
|
03-May-2013 |
Ondrej Kos <okos@redhat.com> |
IDMAP: Fix variable initialization
Before the recent changes, the variable was set to 0 too because it used
to be part of a structure allocated with talloc_zero. |
46222e5191473f9a46aec581273eb2eef22e23be |
|
29-Apr-2013 |
Michal Zidek <mzidek@redhat.com> |
libsss_idmap: function to calculate range
Calculation of range for domains is moved from
sdap_idmap code to sss_idmap code. Some refactoring
have been done to allow this move.
https://fedorahosted.org/sssd/ticket/1844 |
6f504738cad1ee9daa1bd6eec721caceef65f21d |
|
08-Jan-2013 |
Sumit Bose <sbose@redhat.com> |
IDMAP: add sss_idmap_smb_sid_to_unix()
To avoid a conversion on the caller side a new call is added to
libsss_idmap which converts a Samba dom_sid structure to a Posix ID. |
bd0baea783295bd22aeabdd7f4ce3aa31eb6144d |
|
04-Dec-2012 |
Michal Zidek <mzidek@redhat.com> |
Dereference after null check in sss_idmap_sid_to_unix
https://fedorahosted.org/sssd/ticket/1684 |
d6f283302268520c1506fb3da4f2a22f5a741be5 |
|
28-Nov-2012 |
Michal Zidek <mzidek@redhat.com> |
idmap: Silence DEBUG messages when dealing with built-in SIDs.
When converting built-in SID to unix GID/UID a confusing debug
message about the failed conversion was printed. This patch special
cases these built-in objects.
https://fedorahosted.org/sssd/ticket/1593 |
c51a204a40b8f85f7f525edb3e24520916d8b9c7 |
|
14-May-2012 |
Sumit Bose <sbose@redhat.com> |
Rename struct dom_sid to struct sss_dom_sid
To avoid conflicts with struct dom_sid used by samba the sss_ prefix is
added to the struct used by libsss_idmap. |
45f75fc8e98092fa48faa3d180fd42f7efd51486 |
|
03-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add routine to extract domain SID from an object SID
Also makes the domain prefix macros from sss_idmap public. |
b6dfbf81c61d4431aaa81687ec53e892f8b71edb |
|
01-May-2012 |
Sumit Bose <sbose@redhat.com> |
Allow different SID representations in libidmap
Besides as strings it is now possible to use binary SIDs or a struct
containing all SID information. Functions to convert between these
formats are added as well. |
a6098862048d4bb469130b9ff21be3020d6f2c54 |
|
27-Mar-2012 |
Sumit Bose <sbose@redhat.com> |
Add idmap library |