dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
cc2d77d5218c188119fa954c856e858cbde76947 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
Rename dp_backend.h to backend.h
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
a8356a0c98ee44e7256bb1c7767159c70e1fc218 |
|
08-Sep-2014 |
Yassir Elley <yelley@redhat.com> |
AD-GPO: processing changes for gpo_map_* options
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
f929e9e5a6daa71a22176b08eb7983fb4b708180 |
|
02-Sep-2014 |
Lukas Slebodnik <lslebodn@redhat.com> |
AD: Ignore all errors if gpo is in permissive mode.
This patch prevents problems with user authentication
if gpo is misconfigurated.
[ad_gpo_target_dn_retrieval_done] (0x0040): No DN retrieved for policy target.
[sdap_id_op_destroy] (0x4000): releasing operation connection
[ad_gpo_access_done] (0x0040): GPO-based access control failed.
[be_pam_handler_callback] (0x0100): Backend returned: (3, 4, No such file or
directory) [Internal Error (System error)]
[be_pam_handler_callback] (0x0100): Sending result [4][sssdad.com]
[be_pam_handler_callback] (0x0100): Sent result [4][sssdad.com]
Reviewed-by: Yassir Elley <yelley@redhat.com> |
db18dda869bc6c52a41797b2066cf121cf10f49c |
|
22-Jul-2014 |
Pavel Reichl <preichl@redhat.com> |
UTIL: rename find_subdomain_by_name
The function was named "find_subdomain" yet it could find both main
domain and subdomain.
sed 's/find_subdomain_by_name/find_domain_by_name/' -i `find . -name "*.[ch]"`
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
60cab26b12df9a2153823972cde0c38ca86e01b9 |
|
13-May-2014 |
Yassir Elley <yelley@redhat.com> |
Implemented LDAP component of GPO-based access control
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
72ae534f5aef6d2e5d3f2f51299aede5abf9687e |
|
19-Dec-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Add a utility function to create list of connections
ad_id.c and ad_access.c used the same block of code. With the upcoming
option to disable GC lookups, we should unify the code in a function to
avoid breaking one of the code paths.
The same applies for the LDAP connection to the trusted AD DC.
Includes a unit test. |
64cb81a65e584858dd631bc5160959d350c091e3 |
|
30-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Fix ad_access_filter parsing with empty filter |
1ce58f139699dd26b8888f4131c996263b6a80a5 |
|
25-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Add extended access filter
https://fedorahosted.org/sssd/ticket/2082
Adds a new option that allows the admin to specify a LDAP access filter
that can be applied globally, per-domain or per-forest. |
67b1fc914190e12ab014c0616b7f0a642fbe6356 |
|
25-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
AD: Search GC by default during access control, fall back to LDAP
Resolves:
https://fedorahosted.org/sssd/ticket/2082
In order to allow the ad_access_filter option to work for subdomain
users as well, the Global Catalog must be searched. This patch adds a
wrapper request atop sdap_access_send that selects the right connection
(GC or LDAP) and optionally falls back to LDAP. |
443eb8217741df57d9f58f2098487b91e3404e71 |
|
25-Oct-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Amend sdap_access_check to allow any connection
Related:
https://fedorahosted.org/sssd/ticket/2082
Also move the check for subdomain to the handler. I think it is the job
of the handler to decide which domain the request belongs to, not the
request itself. |
b8d703cf3aba81800cf1b8ccca64bb00ef0b30f7 |
|
28-Jun-2013 |
Sumit Bose <sbose@redhat.com> |
Replace new_subdomain() with find_subdomain_by_name()
new_subdomain() will create a new domain object and should not be used
anymore in the priovder code directly. Instead a reference to the domain
from the common domain object should be used. |
ee02e59e4d966f44c7a48ad04474156fc65d7006 |
|
17-Jun-2013 |
Pavel Březina <pbrezina@redhat.com> |
handle ERR_ACCOUNT_EXPIRED properly
https://fedorahosted.org/sssd/ticket/1953 |
dfd71fc92db940b2892cc996911cec03d7b6c52b |
|
19-Mar-2013 |
Simo Sorce <simo@redhat.com> |
Convert sdap_access to new error codes
Also simplify sdap_access_send to avoid completely fake _send() routines. |
b8dcd1216e5ea7065213c750a92dabfe01fa3b70 |
|
10-Feb-2013 |
Simo Sorce <simo@redhat.com> |
Add realm info to sss_domain_info |
cbaba2f47da96c4191971bce86f03afb3f88864a |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_data() helper funciton.
In preparation for making struct be_req opaque. |
03abdaa21ecf562b714f204ca42379ff08626f75 |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_be_ctx() helper.
In preparation for making be_req opaque |
8e5549e453558d4bebdec333a93e215d5d6ffaec |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Introduce be_req_terminate() helper
Call it everywhere instead of directly dereferencing be_req->fn
This is in preparation of making be_req opaque. |
249a28dbf31e11794c7f35d709c5561c1555898d |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Pass domain not be_req to access check functions |
24b715f096613d18f182cf0fff537e1fc79647fa |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be request structure member
The sysdb context is already available through the 'domain' context. |
a4cce2c98eedecb5d3b47da62104634cae268434 |
|
06-Jul-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
AD: Add AD access-control provider
This patch adds support for checking whether a user is expired or
disabled in AD. |