4a9c1047354dbe5a4ed41e5951ae623e3772e113 |
|
29-Jan-2018 |
René Genz <liebundartig@freenet.de> |
Fix minor spelling mistakes in providers/*
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
7988988aab5bd0249476671b850eb3909aa753f8 |
|
01-Dec-2017 |
Sumit Bose <sbose@redhat.com> |
ipa: handle users from different domains in ipa_resolve_user_list_send()
Instead of assuming that all users in the list can be found in the
provided domain with this patch the domain name part of the user name is
preferred. The provided domain name is used as a fallback.
Related to https://pagure.io/SSSD/sssd/issue/3579
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com> |
0e238c259c066cf997aaa940d33d6bda96c15925 |
|
27-Nov-2017 |
Sumit Bose <sbose@redhat.com> |
sysdb: do not use objectClass for users and groups
The majority of the object in the SSSD cache are users and groups. If
there are many user and groups in the cache the index objects of the
objectclass attributes 'user' and 'group' become large because the
must hold references to all objects of those object classes.
As a result the management of these index objects becomes costly because
they must be parsed and split apart quite often. Additionally they are
mostly useless because user and groups are lookup up by more specific
attributes in general.
Only when enumerating all user or groups this kind of index might be
useful.
There are two way of removing this kind of index from the user and group
objects. Either by removing objectClass from the list of indexes and add
a new attribute to all other type of object we want and index for. Or by
replacing objectClass with a different attribute for the user and group
objects. After some testing I think the latter one is the more reliable
one and implemented it in this patch.
Related to https://pagure.io/SSSD/sssd/issue/3503
Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3fd8ea55d59f29725ab32bdaf5b98ffaae7fbf9d |
|
10-Mar-2017 |
Sumit Bose <sbose@redhat.com> |
IPA: get overrides for all users found by certificate
Lookups by certificates can return more than one result. With this patch
the IPA provider will check for overrides for all returned users.
Related to https://pagure.io/SSSD/sssd/issue/3050
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ca68b1b4ba06b1cda316ae8af470647bd7015a5a |
|
16-Jan-2017 |
Lukas Slebodnik <lslebodn@redhat.com> |
DP: Remove unused attr_type from struct dp_id_data
Structure member attr_type was set to BE_ATTR_CORE on all places
and there was a single place src/providers/ldap/ldap_id.c where
we checked to other values. It is not used anymore; it's better to
remove it.
Reviewed-by: Michal Židek <mzidek@redhat.com> |
f2e8a7c3230fac11175c0bd17c14c66a8e9b25ad |
|
29-Jul-2016 |
Sumit Bose <sbose@redhat.com> |
IPA: make ipa_resolve_user_list_{send|recv} public and allow AD users
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
3d29430867cf92b2d71afa95abb679711231117c |
|
15-Jul-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: rename be_acct_req to dp_id_data
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
dea636af4d1902a081ee891f1b19ee2f8729d759 |
|
20-Jun-2016 |
Pavel Březina <pbrezina@redhat.com> |
DP: Switch to new interface
Reviewed-by: Sumit Bose <sbose@redhat.com>
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com> |
e2d96566aeb881bd89e5c9236d663f6a9a88019a |
|
24-Feb-2016 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Add interface to call into IPA provider from LDAP provider
https://fedorahosted.org/sssd/ticket/2522
Adds a pluggable interface that is able to resolve the IPA group's
external members. At the moment, the request calls the full be_
interface to make sure all corner cases like id-views are handled
internally.
Reviewed-by: Sumit Bose <sbose@redhat.com> |
565e6d91814884054ec0dc4d770804d7bf472d3f |
|
11-Dec-2015 |
Petr Cech <pcech@redhat.com> |
IPA_PROVIDER: Explicit no handle of services
Function get_object_from_cache() does not handle services.
This patch adds quick shortcut to avoid sending an LDAP query
to cache.
Resolves:
https://fedorahosted.org/sssd/ticket/2747
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
9ac2a33f4cdc4941fa63118dcffe8058854f33c4 |
|
02-Jul-2015 |
Michal Židek <mzidek@redhat.com> |
views: Add is_default_view helper function
Ticket:
https://fedorahosted.org/sssd/ticket/2641
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
40bc389bc79bc41429b5a92d5ce75955f8eefaf5 |
|
01-Jun-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
Skip enumeration requests in IPA and AD providers as well
Checking the enum request in the underlying LDAP provider to skip it
might be too late as the richer IPA or AD providers depend on having a
useful result when the sdap request finishes.
Move the enumeration check earlier instead and allow directly in the IPA
or AD handler.
Related:
https://fedorahosted.org/sssd/ticket/2659
Reviewed-by: Sumit Bose <sbose@redhat.com> |
0f9c28eb52d2b45c8a97f709308dc11377831b8c |
|
06-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: allow initgroups by UUID for FreeIPA users
If a FreeIPA user is searched with the help of an override name the UUID
from the override anchor is used to search the user. Currently the
initgroups request only allows searches by SID or name. With this patch
a UUID can be used as well.
Related to https://fedorahosted.org/sssd/ticket/2642
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
145578006684481434ced78461ab8d1c3570f478 |
|
05-May-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: enhance ipa_initgr_get_overrides_send()
This patch makes ipa_initgr_get_overrides_send() public and add support
to search overrides by UUID or by SID.
Related to https://fedorahosted.org/sssd/ticket/2633
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
605dc7fcc848dffb7c9d270c864c70e6dff1242e |
|
27-Apr-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: check ghosts in groups found by uuid as well
With views and overrides groups are not allowed to have ghost members
anymore because the name of a member might be overridden. To achieve
this ghost members are looked up and resolved later during group
lookups. Currently this is only done for group lookups by name but
should happen as well if the group is looked up by uuid.
Resolves https://fedorahosted.org/sssd/ticket/2631
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
a849d848d53f305a90613a74c1767a42b250deda |
|
08-Mar-2015 |
Pavel Březina <pbrezina@redhat.com> |
sdap_handle_acct_req_send: remove be_req
be_req was used only as a talloc context for subreq. This memory context
was replace by state of the parent request which is more suitable for
tevent coding style.
This change will allow us to use this function in be_refresh where
none be_req is available.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
cfb6e8c83ce4800d2fc1f5383abef07ab2208092 |
|
02-Mar-2015 |
Lukas Slebodnik <lslebodn@redhat.com> |
IPA: Remove unused argument from ipa_id_get_group_uuids
Reviewed-by: Pavel Reichl <preichl@redhat.com> |
b2c3722b9a1eaf265f6b102043958f6d4378788c |
|
30-Jan-2015 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Resolve IPA user groups' overrideDN in non-default view
When the client is in a non-default view, we need to store the override
data, in particular the overrideDN as well.
Resolves:
https://fedorahosted.org/sssd/ticket/2571
Reviewed-by: Sumit Bose <sbose@redhat.com> |
eab17959df71341073f946c533f59fc5e593b35c |
|
13-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: ipa_resolve_user_list_send() take care of overrides
Currently ipa_resolve_user_list_send() only looks up the related user
objects but do not check for overrides. This patch tries to fix this.
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
765d9075bb1e10ae0f09b6c2701bfd50aeb423d4 |
|
13-Jan-2015 |
Sumit Bose <sbose@redhat.com> |
IPA: resolve ghost members if a non-default view is applied
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
acebf94a16c91b17c7c082538ab3083ee26aa992 |
|
20-Nov-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: check overrrides for IPA users as well
Currently overrides were only available for sub-domains, e.g. trusted AD
domains. With this patch overrides can be used for IPA users as well.
Related to https://fedorahosted.org/sssd/ticket/2481
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> |
ed4a9bd4d0f7fb359bed66a8d63a92e7be633aae |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
views: search overrides for user and group requests
If the name or the POSIX ID of a user or a group is overridden the
search request for those objects have to check the overide objects first
before looking up the original objects.
This patch adds a new request for the IPA sub-domain users which checks
the overrides first if
- SSSD is running in ipa-server-mode and a name or a POSIX ID is
searched, since we do not override the SIDs we can skip the search in
the override tree here
- if the responder indicates it has not found the corresponding object
in the cache and the input might be an override name or ID and not the
original one of an object.
If an override object was found the SID is extracted from the anchor
attribute and the original object is search by its SID. If no override
object was found the original object is search with the original input
and finally it is checked if an override object exits for the found
object.
Relates to https://fedorahosted.org/sssd/ticket/2375
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
00c283ca719717ed483958571982d0e9ff95c4b1 |
|
16-Oct-2014 |
Sumit Bose <sbose@redhat.com> |
IPA: make IPA ID context available to extdom client code
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Pavel Březina <pbrezina@redhat.com> |
83bf46f4066e3d5e838a32357c201de9bd6ecdfd |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Update DEBUG* invocations to use new levels
Use a script to update DEBUG* macro invocations, which use literal
numbers for levels, to use bitmask macros instead:
grep -rl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e 'use strict;
use File::Slurp;
my @map=qw"
SSSDBG_FATAL_FAILURE
SSSDBG_CRIT_FAILURE
SSSDBG_OP_FAILURE
SSSDBG_MINOR_FAILURE
SSSDBG_CONF_SETTINGS
SSSDBG_FUNC_DATA
SSSDBG_TRACE_FUNC
SSSDBG_TRACE_LIBS
SSSDBG_TRACE_INTERNAL
SSSDBG_TRACE_ALL
";
my $text=read_file(\*STDIN);
my $repl;
$text=~s/
^
(
.*
\b
(DEBUG|DEBUG_PAM_DATA|DEBUG_GR_MEM)
\s*
\(\s*
)(
[0-9]
)(
\s*,
)
(
\s*
)
(
.*
)
$
/
$repl = $1.$map[$3].$4.$5.$6,
length($repl) <= 80
? $repl
: $1.$map[$3].$4."\n".(" " x length($1)).$6
/xmge;
print $text;
' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
a3c8390d19593b1e5277d95bfb4ab206d4785150 |
|
12-Feb-2014 |
Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com> |
Make DEBUG macro invocations variadic
Use a script to update DEBUG macro invocations to use it as a variadic
macro, supplying format string and its arguments directly, instead of
wrapping them in parens.
This script was used to update the code:
grep -rwl --include '*.[hc]' DEBUG . |
while read f; do
mv "$f"{,.orig}
perl -e \
'use strict;
use File::Slurp;
my $text=read_file(\*STDIN);
$text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs;
print $text;' < "$f.orig" > "$f"
rm "$f.orig"
done
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
Reviewed-by: Stephen Gallagher <sgallagh@redhat.com>
Reviewed-by: Simo Sorce <simo@redhat.com> |
d115f40c7a3999e3cbe705a2ff9cf0fd493f80fb |
|
15-Nov-2013 |
Michal Zidek <mzidek@redhat.com> |
SYSDB: Drop the sysdb_ctx parameter - module sysdb_ops (part 2) |
3d28e0e560b787b5c57ed7327d184310342a7e38 |
|
28-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
IPA: Look up AD users directly if IPA server mode is on
https://fedorahosted.org/sssd/ticket/1962
If the ipa_server_mode is selected IPA subdomain user and group lookups
are not done with the help of the extdom plugin but directly against AD
using the AD ID code. |
9aa117a93e315f790a1922d9ac7bd484878b621e |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: Pass in a connection to ID functions
Instead of using the default connection from the sdap_id_ctx, allow the
caller to specify which connection shall be used for this particular
request. Again, no functional change is present in this patch, just
another parameter is added. |
dcb44c39dda9699cdd6488fd116a51ced0687de3 |
|
07-Jun-2013 |
Jakub Hrozek <jhrozek@redhat.com> |
LDAP: sdap_id_ctx might contain several connections
With some LDAP server implementations, one server might provide
different "views" of the identites on different ports. One example is
the Active Directory Global catalog. The provider would contact
different view depending on which operation it is performing and against
which SSSD domain.
At the same time, these views run on the same server, which means the same
server options, enumeration, cleanup or Kerberos service should be used.
So instead of using several different failover ports or several
instances of sdap_id_ctx, this patch introduces a new "struct
sdap_id_conn_ctx" that contains the connection cache to the particular
view and an instance of "struct sdap_options" that contains the URI.
No functional changes are present in this patch, currently all providers
use a single connection. Multiple connections will be used later in the
upcoming patches. |
cbaba2f47da96c4191971bce86f03afb3f88864a |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_data() helper funciton.
In preparation for making struct be_req opaque. |
03abdaa21ecf562b714f204ca42379ff08626f75 |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add be_req_get_be_ctx() helper.
In preparation for making be_req opaque |
df0596ec12bc5091608371e2977f3111241e8caf |
|
21-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Remove sysdb as a be context structure member
The sysdb context is already available through the 'domain' structure. |
84c986f9bb2767d8930b6f5d92d34b09b8fabe60 |
|
15-Jan-2013 |
Simo Sorce <simo@redhat.com> |
Add domain arg to sysdb_search/delete_netgroup() |
e11c7dc43f4ff9897e37cc0d793f8e1fb3b8453a |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Use an entry type mask macro to filter entry types
Avoids hardcoding magic numbers everywhere and self documents why a
mask is being applied. |
6ff0d2242fe93d694b81b29ab12289db4859e1dc |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Streamline ipa_account_info handler
In particular note that we merge ipa_account_info_netgroups_done()
and ipa_account_info_users_done() into a single fucntion called
ipa_account_info_done() that handles both cases
We also remove the auxiliary function ipa_account_info_complete() that
unnecessarily violates the tevent_req style and instead use a new function
named ipa_account_info_error_text() to generate error text. |
39be7dbfa25a1cae78741a1c6c8c744e8c87e38f |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Fix tevent_req style for get_netgroup in ipa_id
Also do not intermix two tevent_req sequences |
791abc91fd8b2a7f73511ab8051df1065f9f54b2 |
|
04-Dec-2012 |
Simo Sorce <simo@redhat.com> |
Fix ipa_subdomain_id names and tevent_req style |
97f3e4045717b64fb7ee6b5838305a76942facc4 |
|
12-Nov-2012 |
Pavel Březina <pbrezina@redhat.com> |
subdomains: check request type on one place only
The check is now held only in ipa_get_subdomain_account_info_send(). |
64ddff90c7fcc02ccb06824ac93af7d5f361a88f |
|
31-May-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add support for filtering atributes
This patch adds support for filtering attributes when constructing
attribute list from a map for LDAP query. |
ca4b7b92738f3dd463914e3de5757cd98d37a983 |
|
10-May-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
LDAP: Add attr_count return value to build_attrs_from_map()
This is necessary because in several places in the code, we are
appending to the attrs returned from this value, and if we relied
on the map size macro, we would be appending after the NULL
terminator if one or more attributes were defined as NULL. |
881c4ba834b23ae651ac01db667801f314eb0a5d |
|
24-Apr-2012 |
Jan Zeleny <jzeleny@redhat.com> |
Add ID operations in subdomains |
f9edb7898c70adb2deccb03134184661a26ca0cc |
|
16-Mar-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
IPA: Allow service lookups |
bd92e8ee315d4da9350b9ef0358c88a7b54aeebe |
|
04-Feb-2012 |
Stephen Gallagher <sgallagh@redhat.com> |
NSS: Add individual timeouts for entry types
https://fedorahosted.org/sssd/ticket/1016 |
8edf0e447266d68f10264eb3f3ea514cd1687041 |
|
19-Dec-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Pass sdap_id_ctx to online check from IPA provider |
f4093e062cf1646b8f01d7078e63708aeb36a95d |
|
25-Nov-2011 |
Jakub Hrozek <jhrozek@redhat.com> |
Fix sdap_id_ctx/ipa_id_ctx mismatch in IPA provider
This was causing a segfault during HBAC processing and any ID lookups
except for netgroups |
8b1f2574ce7a964965a18ab047ab09c4694380c4 |
|
23-Nov-2011 |
Jan Zeleny <jzeleny@redhat.com> |
Added IPA account info handler
Currently it is only handling netgroups by itself, other requests are
forwarded to LDAP provider. |