History log of /sssd-io/src/providers/ipa/ipa_s2n_exop.c
Revision Date Author Comments Expand
43003851129556acea15539a1dc0d4350d54cac8 26-Feb-2018 Sumit Bose <sbose@redhat.com>

ipa: remove SYSDB_USER_CERT from sub-domain users If there are no certificates returned for a sub-domain user from the IPA server to the client we should make sure they are not present in the client's cache anymore and remove the whole attribute from the cached user entry. Related to https://pagure.io/SSSD/sssd/issue/3603 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

56f015ef6a161e01681f79e4ea0d1b642f9737b4 23-Jan-2018 Fabiano Fidêncio <fidencio@redhat.com>

IPA: Remove sshPublicKey attribute when it's not set Similary to what has been for the SSSD's server, we have to explicitly remove the 'sshPublicKey' attribute from an override in case it's not set, otherwise we may end up in a situation where a ssh key is removed from IPA but it'll still be present in the SSSD's client cache, allowing then users to ssh to a machine even having a key that has already been removed from IPA. Related: https://pagure.io/SSSD/sssd/issue/3602 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com> Reviewed-by: Sumit Bose <sbose@redhat.com>

a52226c651308a0a7732544b492eb4db56b84f1d 01-Dec-2017 Sumit Bose <sbose@redhat.com>

ipa: compare DNs instead of group names in ipa_s2n_save_objects() If group names are used to compare the current list of group memberships returned by the server with the one from the cache some groups might end up in the wrong result list if group names are overridden. This ambiguity can be resolved by using the DNs of the cached objects. Related to https://pagure.io/SSSD/sssd/issue/3579 Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

f29040342a6d69e170f4543662621f2e27221f91 01-Dec-2017 Sumit Bose <sbose@redhat.com>

IPA: use cache searches in get_groups_dns() If the group name is overridden in the default view we have to search for the name and cannot construct it because the extdom plugin will return the overridden name but the DN of the related group object in the cache will contain the original name. Related to https://pagure.io/SSSD/sssd/issue/3579 Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

919b5d76057d31877e0c25ca495711ff76c713d6 01-Dec-2017 Sumit Bose <sbose@redhat.com>

ipa: check for SYSDB_OVERRIDE_DN in process_members and get_group_dn_list process_members() and get_group_dn_list() are used on an IPA client to determine a list of users or groups which are missing in the cache and are needed to properly add a group or user object to the cache respectively. If a non-default view is assigned to the client the SYSDB_OVERRIDE_DN must be set for all user and group objects to indicate that it was already checked if there is an id-override defined for the object or not. There a circumstances were SYSDB_OVERRIDE_DN is not set, e.g. after a view name change. To make sure the cache is in a consistent state with this patch user and group entries without SYSDB_OVERRIDE_DN are considered as missing is a non-default view is assigned to the client. Related to https://pagure.io/SSSD/sssd/issue/3579 Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

eb404bcdbbff7e080a93d816e17b8cec04f79fc4 25-May-2017 Jakub Hrozek <jhrozek@redhat.com>

IPA: Return from function after marking a request as finished Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

3e3034199b44e01899ec7ba8152fef3738a0e093 25-May-2017 Jakub Hrozek <jhrozek@redhat.com>

IPA: Avoid using uninitialized ret value when skipping entries from the joined domain Reviewed-by: Fabiano Fidêncio <fidencio@redhat.com>

eb7095099b2dd0afb1d028dbc15d8c5a897d90f8 24-May-2017 Sumit Bose <sbose@redhat.com>

ipa: filter IPA users from extdom lookups by certificate The extdom lookup by certificate will return the names of all matching users, both from the IPA and trusted domains. The IPA users from the list should not be looked up via the extdom plugin because they are already lookup up directly. Additionally the lookup might fail and cause an error which might prevent that the remaining users from the list are looked up. Resolves https://pagure.io/SSSD/sssd/issue/3407 Reviewed-by: Pavel Březina <pbrezina@redhat.com>

0c5f463e9629ac08d647c70cffb30bccdd57ae96 28-Apr-2017 Justin Stephenson <jstephen@redhat.com>

IPA: Improve s2n debug message for missing ipaNTSecurityIdentifier This patch improves the log message to be more information for the SSSD user troubleshooting issues. If the IDM POSIX group used for AD trust HBAC/SUDO operation is missing the ipaNTSecurityIdentifier it can cause client s2n operations failures resolving the group which resulted in the inability to login for the AD user. Reviewed-by: Pavel Březina <pbrezina@redhat.com>

ef019268d2d112ebff3577e551cd19478d73d93b 24-Apr-2017 Jakub Hrozek <jhrozek@redhat.com>

IPA: Improve DEBUG message if a group has no ipaNTSecurityIdentifier There was an issue in a production deployment where the admin selected a GID outside the IDM range for a group that contained a user from the trusted domain. This resulted in not adding a SID for the IPA group, which in turn meant the group couldn't be resolved on the client. This patch just improves the DEBUG message so that it's clearer for the admins where the issue is. Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

b07bcd8b99590bd404733fa7ff1add37c55126bc 03-Apr-2017 Pavel Březina <pbrezina@redhat.com>

ipa_s2n_get_acct_info_send: provide correct req_input name To avoid crash. Resolves: https://pagure.io/SSSD/sssd/issue/3358 Reviewed-by: Sumit Bose <sbose@redhat.com> Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

2cf7becc05996eb6d8a3352d3d7b97c75652e590 29-Mar-2017 Sumit Bose <sbose@redhat.com>

IPA: lookup AD users by certificates on IPA clients Get a list of users mapped to a certificate back from the IPA server, look them up and store them together with the certificate used for the search as mapped attribute to the cache. Related to https://pagure.io/SSSD/sssd/issue/3050 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

415d93196533a6fcd90889c67396ef5af5bf791a 29-Mar-2017 Sumit Bose <sbose@redhat.com>

IPA: add mapped attributes to user from trusted domains Allow the usage of the mapped attribute for the lookup of AD users on IPA clients as already used for the normal LDAP lookup. Related to https://pagure.io/SSSD/sssd/issue/3050 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

cd83aead3c9799ac05d8f8977dbb92bbd399c6d5 23-Mar-2017 Justin Stephenson <jstephen@redhat.com>

IPA: Enhance debug logging for ipa s2n operations Add log messages to provide useful debug logging surrounding IPA client extended operations to the IPA Server during AD trust requests to retrieve information. Print more details about the objects requested and received during the ipa_s2n operations. This will improve log analysis and troubleshooting efforts during AD trust user and group resolution failures on IPA clients, such as missing groups. Reviewed-by: Sumit Bose <sbose@redhat.com>

a04bef313508c423ed06cc54805a3b8106ab90cd 23-Mar-2017 Justin Stephenson <jstephen@redhat.com>

IPA: Add s2n request to string function Add a function to convert request_types to string allowing the ability to print request type information for ipa_s2n functions during IPA client operations. Reviewed-by: Sumit Bose <sbose@redhat.com>

0302e3e7b3b06b809bd63c7911a42ab3e0a7ebf9 26-Aug-2016 Jakub Hrozek <jhrozek@redhat.com>

IPA: Parse qualified names when guessing AD user principal Most AD users store their UPN in an attribute. If they don't, or the sssd was configured (typically in earlier versions to work around a bug) to not look at the principal attribute, then sssd is supposed to guess the attribute. That currently doesn't work in 1.14, because the username is already qualified and then we also append the realm name to it. We need to parse the simple username from the qualified name first. The issue can be reproduced simply by authenticating as the Administrator account in IPA-AD trust setups. Resolves: https://fedorahosted.org/sssd/ticket/3127 Reviewed-by: Sumit Bose <sbose@redhat.com>

9a310913d696d190db14c625080678db853a33fd 29-Jul-2016 Sumit Bose <sbose@redhat.com>

LDAP/IPA: add local email address to aliases Adding email-addresses from the local domain to the alias names is strictly not needed by might help to speed up lookups in the NSS responder. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

3d29430867cf92b2d71afa95abb679711231117c 15-Jul-2016 Pavel Březina <pbrezina@redhat.com>

DP: rename be_acct_req to dp_id_data Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

c125e741d3111e2f9b56866ba00835ca05c6f349 07-Jul-2016 Jakub Hrozek <jhrozek@redhat.com>

IPA: Use internal fqname format instead of parsing NSS names Parsing the extdom plugin output is an "input" operation from the point of the IPA provider, so we need to parse the name and conversely, internally use only the qualified name. Reviewed-by: Sumit Bose <sbose@redhat.com>

accff8ebe158251b1d25a95b3b035fe7e08fd1ee 07-Jul-2016 Jakub Hrozek <jhrozek@redhat.com>

UTIL: expand_homedir_template manages usernames internally expand_homedir_template() can be considered an outward-facing interface, therefore the function and its input structure will accept the internal name format and parse it internally into a username and domain component. Reviewed-by: Sumit Bose <sbose@redhat.com>

21513e51a4a2eb08f245333bf8f223713a3d7cb3 09-Jun-2016 Sumit Bose <sbose@redhat.com>

IPA: allow lookups by cert in sub-domains on the client Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

cf89f552f06b95bd69d8c61aaa55a330a5d9f6e6 09-Jun-2016 Sumit Bose <sbose@redhat.com>

ipa: save cert as blob in the cache The IPA extdom plugin returns the user certificate base64 encoded. Before the IPA client can store it in the cache it must be decoded so that it is stored as a binary as the certificate from other sources. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

c371993cce13edb9185a5f0db76fbee03f0edc04 13-Apr-2016 Sumit Bose <sbose@redhat.com>

IPA: resolve PAC for trusted users on IPA clients Reviewed-by: Pavel Březina <pbrezina@redhat.com>

1df6751f81f7d9c225463f76b9789b0cc7a0de8b 13-Apr-2016 Sumit Bose <sbose@redhat.com>

IPA: ipa_s2n_get_list_send() allow other list types Reviewed-by: Pavel Březina <pbrezina@redhat.com>

aa0f39c7c09a55efc8d2282ca56e0e93e220aeba 13-Apr-2016 Sumit Bose <sbose@redhat.com>

IPA: rename ipa_s2n_get_fqlist* to ipa_s2n_get_list* Reviewed-by: Pavel Březina <pbrezina@redhat.com>

9a2f018c0f68a3ada4cea4128a861a7f85893f22 12-Jan-2016 Sumit Bose <sbose@redhat.com>

ldap: remove originalMeberOf if there is no memberOf Since originalMemerberOf is not mapped directly to an original attribute and is handled specially it is not automatically removed if there is no memberOf in the original object anymore. This patch put originalMemerberOf on the list of attribute which should be removed in that case. Resolves https://fedorahosted.org/sssd/ticket/2917 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

acce97e8d97e81a9e660d46c4e3c00bcb423c035 06-Jan-2016 Sumit Bose <sbose@redhat.com>

ipa_s2n_save_objects(): use configured user and group timeout Resolves https://fedorahosted.org/sssd/ticket/2899 Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

aedc71fe8360a51785933523f14bb5c4e7e2c38b 20-Nov-2015 Sumit Bose <sbose@redhat.com>

IPA: fix override with the same name If the user name of a AD user is overridden with the name itself in an IPA override object SSSD adds this name twice to the alias list causing an ldb error when trying to write the user object to the cache. As a result the user is not available. This patch makes sure that there are no duplicated alias names. Resolves https://fedorahosted.org/sssd/ticket/2874 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

6fe057efb981ee4b45dcadf131c03f8501fce28d 31-Jul-2015 Jakub Hrozek <jhrozek@redhat.com>

IPA: Remove MPG groups if getgrgid was called before getpw() https://fedorahosted.org/sssd/ticket/2724 This bug only affects IPA clients that are connected to IPA servers with AD trust and ID mapping in effect. If an IPA client calls getgrgid() for an ID that matches a user, the user's private group would be returned and stored as a group entry. Subsequent queries for that user would fail, because MPG domains impose uniqueness restriction for both the ID and name space across groups and users. To work around that, we remove the UPG groups in MPG domains during a group lookup. Reviewed-by: Sumit Bose <sbose@redhat.com>

9ac2a33f4cdc4941fa63118dcffe8058854f33c4 02-Jul-2015 Michal Židek <mzidek@redhat.com>

views: Add is_default_view helper function Ticket: https://fedorahosted.org/sssd/ticket/2641 Reviewed-by: Pavel Reichl <preichl@redhat.com>

3fe2e555edd3963d72483600e5d9616873afd00a 06-May-2015 Sumit Bose <sbose@redhat.com>

IPA: do not add domain name unconditionally Depending on the server-side configuration the extdom plugin can return short or fully qualified names for IPA objects. The client must handle the names according to its own configuration and not add the domain part of the fully-qualified name unconditionally. Resolves https://fedorahosted.org/sssd/ticket/2647 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

cffe3135f29c737f2598f3c1384bfba1694fb843 05-May-2015 Sumit Bose <sbose@redhat.com>

IPA: update initgr expire timestamp conditionally Newer versions of the extdom plugin return the full list of group-memberships during user lookups. As a result the lifetime of the group-membership data is updates in those cases. But if the user is not looked up directly but is resolved as a group member during a group lookup SSSD does not resolve all group-membership of the user to avoid deep recursion and eventually a complete enumeration of the user and group base. In this case the lifetime of the group-memberships should not be updated because it might be incomplete. Related to https://fedorahosted.org/sssd/ticket/2633 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

e87badc0f6fb20a443cf12bde9582ecbc2aef727 05-May-2015 Sumit Bose <sbose@redhat.com>

IPA: do initgroups if extdom exop supports it Newer versions of the extdom plugin return the full list of group-memberships during a user lookup request. With these version there is no need to reject a initgroups request for sub/trusted-domain users anymore. This is e.g. useful for callers which call getgrouplist() directly without calling getpwnam() before. Additionally it helps if for some reasons the lifetime of the user entry and the lifetime of the initgroups data is different. Related to https://fedorahosted.org/sssd/ticket/2633 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

c520f40d1a2d77cf1d413451b5682297733521ed 29-Apr-2015 Aron Parsons <parsonsa@bit-sys.com>

IPA: fix segfault in ipa_s2n_exop can be triggered on demand by assigning a POSIX group with external members sudo privileges, then dropping the cache and doing a sudo -U <user> -l. Reviewed-by: Sumit Bose <sbose@redhat.com>

625cff0b0938538e51fdd3b2d985e6082b492ea5 27-Apr-2015 Sumit Bose <sbose@redhat.com>

IPA: use sysdb_attrs_add_string_safe to add group member The member list returned by the extdom plugin might contain some entries more than once. Although this is an issue on the server side to avoid ldb errors duplicates should be filtered out on the client as well. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

2ab9a4538eb2e1a255e645f7efdcfd6bb722d265 27-Apr-2015 Sumit Bose <sbose@redhat.com>

IPA: do not try to save override data for the default view For the default view all override data is available in the cached user or group object. Even if separate override data is available it should not be written into the cache. Resolves https://fedorahosted.org/sssd/ticket/2630 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

131da4d9f40e0e407d7bcae18ff16507976bc6c7 19-Mar-2015 Pavel Reichl <preichl@redhat.com>

IPA: set EINVAL if dn can't be linearized Reviewed-by: Sumit Bose <sbose@redhat.com>

abb093b4ae10f2a5748bf9f194bf76794002eba0 19-Mar-2015 Sumit Bose <sbose@redhat.com>

IPA: make sure output variable is set Reviewed-by: Pavel Reichl <preichl@redhat.com>

8be0cf3eea892e13410c13abb030322599ca1b4f 17-Mar-2015 Sumit Bose <sbose@redhat.com>

IPA idviews: check if view name is set When working with older FreeIPA releases the view name might not always been set. This patch add checks to might sure it is only dereferenced when set. Resolves https://fedorahosted.org/sssd/ticket/2604 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

7ee9ac32485483beece872d6fcb3096fa77a004b 13-Mar-2015 Sumit Bose <sbose@redhat.com>

ipa: make sure extdom expo data is available Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

3e9712c2fdbba8f9cd25886943331e76e0b2cedd 13-Mar-2015 Sumit Bose <sbose@redhat.com>

ipa: do not treat missing sub-domain users as error Resolves: https://fedorahosted.org/sssd/ticket/2444 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

9ad346318dc2cc5d5a340d8d981ddfdcc6f632da 30-Jan-2015 Sumit Bose <sbose@redhat.com>

ipa_s2n_save_objects: properly handle fully-qualified group names Check if the given name is already fully-qualified instead of adding a domain name unconditionally. Related to https://fedorahosted.org/sssd/ticket/2529 and https://fedorahosted.org/sssd/ticket/2524 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

b2c5e98def89a0c3d16f5cf7e07ce2020338b540 26-Jan-2015 Jakub Hrozek <jhrozek@redhat.com>

IPA: Use attr's dom for users, too The 'dom' pointer points to domain of the main object being saved. In case of group, dom points to the domain where the group resides. But when saving members, each members might be from a different domain, so we need to find every member's domain based on the attributes. Also don't use Yoda style in conditions. Reviewed-by: Sumit Bose <sbose@redhat.com>

60f11e2fa1f63cd40ebace525ad823b0360fac94 26-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: process_members() add ghosts only once Since ghost entries might not be properly removed on the IPA server (https://fedorahosted.org/sssd/ticket/2567) chances are that during extdom group lookups a single user is returned multiple time. This patch removes the duplicates before trying to write the data to the cache. Related to https://fedorahosted.org/sssd/ticket/2159 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

dd5ebcde05442422f39084acb49b28cf47002d1e 23-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: properly handle mixed-case trusted domains In the SSSD cache domain names are handled case-sensitive. As a result fully-qualified names in RDN contain the domain part in the original spelling. When IPA client lookup up group-memberships on the IPA server via the extdom plugin the names returned are all lower case. To make sure new DNs are generated correctly the domain part must adjusted. Related to https://fedorahosted.org/sssd/ticket/2159 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

ba818cc39dfe94c2b8613f4badf7912811f0f737 21-Jan-2015 Sumit Bose <sbose@redhat.com>

views: fix GID overrride for mpg domains When adding a user sysdb internally adds a value to SYSDB_GIDNUM for mpg domain which might cause conflicts with the one we added to users git GID overrides. With this patch the override GID is added after the user is created but in the same transaction Releted to https://fedorahosted.org/sssd/ticket/2514 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

62d919aea98edd1095f6a22241903d4c045b46ed 14-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: set SYSDB_INITGR_EXPIRE for RESP_USER_GROUPLIST Since RESP_USER_GROUPLIST contains all group memberships it is effectively an initgroups request hence SYSDB_INITGR_EXPIRE will be set. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

3cd287313d93e29f9754feb46017dba2a039affd 14-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: resolve missing members Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

f1f22df95996390f63266ebacb624e521d934592 14-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: rename ipa_s2n_get_groups_send() to ipa_s2n_get_fqlist_send() Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

942ebb62c8df766a22271103abd518ddae02ea3a 14-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: process_members() optionally return missing members list Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

e6046d23b3e90102fb3c796737ced03fb5a60fea 14-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: add missing break The current request already returned the SID, we do not need to request it separately. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

2fc12875f7d51248799016c19c1298b85e06a286 14-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: make version check more precise The call protected by the check does not only expect the version 1 of the extdom plugin is used but a specific response type as well. Since version 1 can return older response types as well we want to be on the safe side. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

d8ceb194023a2cdc8bc183acc322e9a7fb6fe2b1 14-Jan-2015 Sumit Bose <sbose@redhat.com>

IPA: do not look up overrides on client with default view The IPA extdom plugin returns the data with the default view already applied hence it is on needed to look up the override data if the client has the default view assigned. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

034dcabb40e654a95f3714d871db471ff7bf97f8 17-Dec-2014 Sumit Bose <sbose@redhat.com>

IPA: handle GID overrides for MPG domains on clients Resolves https://fedorahosted.org/sssd/ticket/2514 Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

8f9d7684a47cd4715dce22c8254ddde205db9afe 17-Dec-2014 Lukas Slebodnik <lslebodn@redhat.com>

IPA: properly handle groups from different domains When groups are resolved on IPA clients as part of a user lookup not all groups have to be from the same domain as the used. This has to be checked to store the group object properly in the cache. Related to https://fedorahosted.org/sssd/ticket/2529 and https://fedorahosted.org/sssd/ticket/2524 Reviewed-by: Sumit Bose <sbose@redhat.com>

ad463501d3bdea4c24c17d792efc1c3e65c08c19 17-Dec-2014 Sumit Bose <sbose@redhat.com>

IPA: verify group memberships of trusted domain users Depending on the state of the cache group object a freshly created or updates user entry for a trusted domain user might already be a member of the group or not. This cache makes sure the requested user is a member of all groups returned from the extdom request. Special care has to be taken to cover cross-domain group-memberships properly. Resolves https://fedorahosted.org/sssd/ticket/2529 Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

1b2a9e3f17e54bcbe5c9bee82a91ae694b7ea0eb 24-Nov-2014 Jakub Hrozek <jhrozek@redhat.com>

IPA: Handle IPA groups returned from extop plugin Reviewed-by: Sumit Bose <sbose@redhat.com>

35863245aa8b8404caedfc95e68b3aa5af14542e 22-Oct-2014 Jakub Hrozek <jhrozek@redhat.com>

IPA: Handle NULL members in process_members() Reviewed-by: Lukáš Slebodník <lslebodn@redhat.com>

bc85b7e2b7b1569e64d8832c52cab9ad165e6fc1 22-Oct-2014 Sumit Bose <sbose@redhat.com>

ipa: improve error reporting for extdom LDAP exop This patch fixes a typo when calling ldap_parse_result() which prevented the server-side error message to be used and adds a hint that more information might be available on the server side. Fixes: https://fedorahosted.org/sssd/ticket/2456 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

ed4a9bd4d0f7fb359bed66a8d63a92e7be633aae 16-Oct-2014 Sumit Bose <sbose@redhat.com>

views: search overrides for user and group requests If the name or the POSIX ID of a user or a group is overridden the search request for those objects have to check the overide objects first before looking up the original objects. This patch adds a new request for the IPA sub-domain users which checks the overrides first if - SSSD is running in ipa-server-mode and a name or a POSIX ID is searched, since we do not override the SIDs we can skip the search in the override tree here - if the responder indicates it has not found the corresponding object in the cache and the input might be an override name or ID and not the original one of an object. If an override object was found the SID is extracted from the anchor attribute and the original object is search by its SID. If no override object was found the original object is search with the original input and finally it is checked if an override object exits for the found object. Relates to https://fedorahosted.org/sssd/ticket/2375 Reviewed-by: Pavel Březina <pbrezina@redhat.com>

9c8db0a17a66c58c36966b17d004142a4aaace8d 16-Oct-2014 Sumit Bose <sbose@redhat.com>

views: get overrides during user and group lookups With this patch the IPA provider will check if overrides exists for the given view during the lookup of users and groups from trusted domains. In ipa-server-mode the default view is automatically applied and written to the cache. On IPA clients which use the extdom plugin for user and group lookups the override data is saved separately and the original object and the override data are linked with DN attributes for faster reference. Related to https://fedorahosted.org/sssd/ticket/2375 Reviewed-by: Pavel Březina <pbrezina@redhat.com>

00c283ca719717ed483958571982d0e9ff95c4b1 16-Oct-2014 Sumit Bose <sbose@redhat.com>

IPA: make IPA ID context available to extdom client code Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> Reviewed-by: Pavel Březina <pbrezina@redhat.com>

abee3216261e3378430e472f0c992470b33976f0 14-Oct-2014 Sumit Bose <sbose@redhat.com>

add_v1_group_data: fix for empty members list Reviewed-by: Pavel Březina <pbrezina@redhat.com>

210e57203a1502f78a16b05010d52c9121b644e3 12-Oct-2014 Lukas Slebodnik <lslebodn@redhat.com>

IPA: Fix error handling after talloc_ber_flatten The function talloc_ber_flatten can return EFAULT, ENOMEM, EOK. But it was tested for -1. Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

28c70f003c7b330ab1d998a4eff1248d272a6ba9 30-Sep-2014 Sumit Bose <sbose@redhat.com>

IPA: add support for new extdom plugin version Initially the extdom plugin was only used to translate SIDs of AD user and groups to names or POSIX IDs. On IPA clients group memberships were resolved with the help of the PAC in the Kerberos ticket which required that the user has logged in at least once. Home directory and the login shell were auto generated. The new version of the extdom plugin can return the complete list of group memberships of a user and the list of all members of a group. Additionally the gecos field, home directory and login shell are returned together with an optional list of key-value pairs for arbitrary data which is written unmodified to the cache. Fixes https://fedorahosted.org/sssd/ticket/2159 and https://fedorahosted.org/sssd/ticket/2041 Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>

ae0a5011e2644eaa482ea1b9e1451eff05c676b9 02-Jun-2014 Lukas Slebodnik <lslebodn@redhat.com>

NSS: Add option to expand homedir template format LDAP server can contain template for home directory instead of plain string. This patch adds new expand option "%H", which will be replaced with value from configuration option homedir_substring (from sssd.conf) Resolves: https://fedorahosted.org/sssd/ticket/1853

5cd660aaa885bca95ac3dca660bb77e5786d5f8e 02-Jun-2014 Lukas Slebodnik <lslebodn@redhat.com>

NSS: Refactor expand_homedir_template Function expand_homedir_template had lot of parameters. After adding new expand option, all function call should be rewritten, (usually argument NULL will be added) This patch wraps all necessary arguments to structure.

a3c8390d19593b1e5277d95bfb4ab206d4785150 12-Feb-2014 Nikolai Kondrashov <Nikolai.Kondrashov@redhat.com>

Make DEBUG macro invocations variadic Use a script to update DEBUG macro invocations to use it as a variadic macro, supplying format string and its arguments directly, instead of wrapping them in parens. This script was used to update the code: grep -rwl --include '*.[hc]' DEBUG . | while read f; do mv "$f"{,.orig} perl -e \ 'use strict; use File::Slurp; my $text=read_file(\*STDIN); $text=~s#(\bDEBUG\s*\([^(]+)\((.*?)\)\s*\)\s*;#$1$2);#gs; print $text;' < "$f.orig" > "$f" rm "$f.orig" done Reviewed-by: Jakub Hrozek <jhrozek@redhat.com> Reviewed-by: Stephen Gallagher <sgallagh@redhat.com> Reviewed-by: Simo Sorce <simo@redhat.com>

/sssd-io/src/confdb/confdb.c /sssd-io/src/confdb/confdb_setup.c /sssd-io/src/db/sysdb.c /sssd-io/src/db/sysdb_autofs.c /sssd-io/src/db/sysdb_idmap.c /sssd-io/src/db/sysdb_ops.c /sssd-io/src/db/sysdb_ranges.c /sssd-io/src/db/sysdb_search.c /sssd-io/src/db/sysdb_selinux.c /sssd-io/src/db/sysdb_services.c /sssd-io/src/db/sysdb_ssh.c /sssd-io/src/db/sysdb_subdomains.c /sssd-io/src/db/sysdb_sudo.c /sssd-io/src/db/sysdb_upgrade.c /sssd-io/src/monitor/monitor.c /sssd-io/src/monitor/monitor_netlink.c /sssd-io/src/monitor/monitor_sbus.c /sssd-io/src/providers/ad/ad_access.c /sssd-io/src/providers/ad/ad_common.c /sssd-io/src/providers/ad/ad_domain_info.c /sssd-io/src/providers/ad/ad_dyndns.c /sssd-io/src/providers/ad/ad_id.c /sssd-io/src/providers/ad/ad_init.c /sssd-io/src/providers/ad/ad_srv.c /sssd-io/src/providers/ad/ad_subdomains.c /sssd-io/src/providers/data_provider_be.c /sssd-io/src/providers/data_provider_callbacks.c /sssd-io/src/providers/data_provider_fo.c /sssd-io/src/providers/data_provider_opts.c /sssd-io/src/providers/dp_auth_util.c /sssd-io/src/providers/dp_dyndns.c /sssd-io/src/providers/dp_pam_data_util.c /sssd-io/src/providers/dp_ptask.c /sssd-io/src/providers/dp_refresh.c /sssd-io/src/providers/fail_over.c /sssd-io/src/providers/fail_over_srv.c ipa_access.c ipa_auth.c ipa_autofs.c ipa_common.c ipa_config.c ipa_dyndns.c ipa_hbac_common.c ipa_hbac_hosts.c ipa_hbac_rules.c ipa_hbac_services.c ipa_hbac_users.c ipa_hostid.c ipa_hosts.c ipa_id.c ipa_idmap.c ipa_init.c ipa_netgroups.c ipa_s2n_exop.c ipa_selinux.c ipa_selinux_maps.c ipa_srv.c ipa_subdomains.c ipa_subdomains_ext_groups.c ipa_subdomains_id.c ipa_sudo.c /sssd-io/src/providers/krb5/krb5_access.c /sssd-io/src/providers/krb5/krb5_auth.c /sssd-io/src/providers/krb5/krb5_become_user.c /sssd-io/src/providers/krb5/krb5_child.c /sssd-io/src/providers/krb5/krb5_child_handler.c /sssd-io/src/providers/krb5/krb5_common.c /sssd-io/src/providers/krb5/krb5_delayed_online_authentication.c /sssd-io/src/providers/krb5/krb5_init.c /sssd-io/src/providers/krb5/krb5_init_shared.c /sssd-io/src/providers/krb5/krb5_renew_tgt.c /sssd-io/src/providers/krb5/krb5_utils.c /sssd-io/src/providers/krb5/krb5_wait_queue.c /sssd-io/src/providers/ldap/ldap_access.c /sssd-io/src/providers/ldap/ldap_auth.c /sssd-io/src/providers/ldap/ldap_child.c /sssd-io/src/providers/ldap/ldap_common.c /sssd-io/src/providers/ldap/ldap_id.c /sssd-io/src/providers/ldap/ldap_id_cleanup.c /sssd-io/src/providers/ldap/ldap_id_enum.c /sssd-io/src/providers/ldap/ldap_id_netgroup.c /sssd-io/src/providers/ldap/ldap_id_services.c /sssd-io/src/providers/ldap/ldap_init.c /sssd-io/src/providers/ldap/sdap.c /sssd-io/src/providers/ldap/sdap_access.c /sssd-io/src/providers/ldap/sdap_async.c /sssd-io/src/providers/ldap/sdap_async_autofs.c /sssd-io/src/providers/ldap/sdap_async_connection.c /sssd-io/src/providers/ldap/sdap_async_enum.c /sssd-io/src/providers/ldap/sdap_async_groups.c /sssd-io/src/providers/ldap/sdap_async_groups_ad.c /sssd-io/src/providers/ldap/sdap_async_initgroups.c /sssd-io/src/providers/ldap/sdap_async_initgroups_ad.c /sssd-io/src/providers/ldap/sdap_async_nested_groups.c /sssd-io/src/providers/ldap/sdap_async_netgroups.c /sssd-io/src/providers/ldap/sdap_async_services.c /sssd-io/src/providers/ldap/sdap_async_sudo.c /sssd-io/src/providers/ldap/sdap_async_sudo_hostinfo.c /sssd-io/src/providers/ldap/sdap_async_sudo_timer.c /sssd-io/src/providers/ldap/sdap_async_users.c /sssd-io/src/providers/ldap/sdap_autofs.c /sssd-io/src/providers/ldap/sdap_child_helpers.c /sssd-io/src/providers/ldap/sdap_dyndns.c /sssd-io/src/providers/ldap/sdap_fd_events.c /sssd-io/src/providers/ldap/sdap_id_op.c /sssd-io/src/providers/ldap/sdap_idmap.c /sssd-io/src/providers/ldap/sdap_range.c /sssd-io/src/providers/ldap/sdap_refresh.c /sssd-io/src/providers/ldap/sdap_reinit.c /sssd-io/src/providers/ldap/sdap_sudo.c /sssd-io/src/providers/ldap/sdap_sudo_cache.c /sssd-io/src/providers/proxy/proxy_auth.c /sssd-io/src/providers/proxy/proxy_child.c /sssd-io/src/providers/proxy/proxy_id.c /sssd-io/src/providers/proxy/proxy_init.c /sssd-io/src/providers/proxy/proxy_netgroup.c /sssd-io/src/providers/proxy/proxy_services.c /sssd-io/src/providers/simple/simple_access.c /sssd-io/src/providers/simple/simple_access_check.c /sssd-io/src/resolv/async_resolv.c /sssd-io/src/resolv/async_resolv_utils.c /sssd-io/src/responder/autofs/autofssrv.c /sssd-io/src/responder/autofs/autofssrv_cmd.c /sssd-io/src/responder/autofs/autofssrv_dp.c /sssd-io/src/responder/common/negcache.c /sssd-io/src/responder/common/responder_cmd.c /sssd-io/src/responder/common/responder_common.c /sssd-io/src/responder/common/responder_dp.c /sssd-io/src/responder/common/responder_get_domains.c /sssd-io/src/responder/nss/nsssrv.c /sssd-io/src/responder/nss/nsssrv_cmd.c /sssd-io/src/responder/nss/nsssrv_mmap_cache.c /sssd-io/src/responder/nss/nsssrv_netgroup.c /sssd-io/src/responder/nss/nsssrv_private.h /sssd-io/src/responder/nss/nsssrv_services.c /sssd-io/src/responder/pac/pacsrv.c /sssd-io/src/responder/pac/pacsrv_cmd.c /sssd-io/src/responder/pac/pacsrv_utils.c /sssd-io/src/responder/pam/pam_LOCAL_domain.c /sssd-io/src/responder/pam/pam_helpers.c /sssd-io/src/responder/pam/pamsrv.c /sssd-io/src/responder/pam/pamsrv_cmd.c /sssd-io/src/responder/pam/pamsrv_dp.c /sssd-io/src/responder/ssh/sshsrv.c /sssd-io/src/responder/ssh/sshsrv_cmd.c /sssd-io/src/responder/ssh/sshsrv_dp.c /sssd-io/src/responder/sudo/sudosrv.c /sssd-io/src/responder/sudo/sudosrv_cmd.c /sssd-io/src/responder/sudo/sudosrv_dp.c /sssd-io/src/responder/sudo/sudosrv_get_sudorules.c /sssd-io/src/responder/sudo/sudosrv_query.c /sssd-io/src/sbus/sbus_client.c /sssd-io/src/sbus/sssd_dbus_common.c /sssd-io/src/sbus/sssd_dbus_connection.c /sssd-io/src/sbus/sssd_dbus_server.c /sssd-io/src/sss_client/ssh/sss_ssh_authorizedkeys.c /sssd-io/src/sss_client/ssh/sss_ssh_knownhostsproxy.c /sssd-io/src/tests/auth-tests.c /sssd-io/src/tests/cmocka/test_dyndns.c /sssd-io/src/tests/cmocka/test_fqnames.c /sssd-io/src/tests/cmocka/test_nss_srv.c /sssd-io/src/tests/cmocka/test_utils.c /sssd-io/src/tests/common_dom.c /sssd-io/src/tests/common_tev.c /sssd-io/src/tests/debug-tests.c /sssd-io/src/tests/files-tests.c /sssd-io/src/tests/krb5_child-test.c /sssd-io/src/tests/resolv-tests.c /sssd-io/src/tests/simple_access-tests.c /sssd-io/src/tests/sysdb-tests.c /sssd-io/src/tests/sysdb_ssh-tests.c /sssd-io/src/tools/files.c /sssd-io/src/tools/selinux.c /sssd-io/src/tools/sss_cache.c /sssd-io/src/tools/sss_debuglevel.c /sssd-io/src/tools/sss_groupadd.c /sssd-io/src/tools/sss_groupdel.c /sssd-io/src/tools/sss_groupmod.c /sssd-io/src/tools/sss_groupshow.c /sssd-io/src/tools/sss_seed.c /sssd-io/src/tools/sss_sync_ops.c /sssd-io/src/tools/sss_useradd.c /sssd-io/src/tools/sss_userdel.c /sssd-io/src/tools/sss_usermod.c /sssd-io/src/tools/tools_mc_util.c /sssd-io/src/tools/tools_util.c /sssd-io/src/tools/tools_util.h /sssd-io/src/util/authtok.c /sssd-io/src/util/backup_file.c /sssd-io/src/util/check_and_open.c /sssd-io/src/util/child_common.c /sssd-io/src/util/crypto/libcrypto/crypto_base64.c /sssd-io/src/util/crypto/libcrypto/crypto_obfuscate.c /sssd-io/src/util/crypto/nss/nss_obfuscate.c /sssd-io/src/util/crypto/nss/nss_util.c /sssd-io/src/util/debug.c /sssd-io/src/util/domain_info_utils.c /sssd-io/src/util/find_uid.c /sssd-io/src/util/nscd.c /sssd-io/src/util/server.c /sssd-io/src/util/signal.c /sssd-io/src/util/sss_ini.c /sssd-io/src/util/sss_krb5.c /sssd-io/src/util/sss_krb5.h /sssd-io/src/util/sss_ldap.c /sssd-io/src/util/sss_nss.c /sssd-io/src/util/sss_selinux.c /sssd-io/src/util/sss_ssh.c /sssd-io/src/util/sss_tc_utf8.c /sssd-io/src/util/user_info_msg.c /sssd-io/src/util/usertools.c /sssd-io/src/util/util.c /sssd-io/src/util/util.h /sssd-io/src/util/util_lock.c /sssd-io/src/util/well_known_sids.c
c9124effceb40890bc9dd157155618067a7b8d2f 19-Dec-2013 Sumit Bose <sbose@redhat.com>

Use sysdb_attrs_add_lc_name_alias to add case-insensitive alias

d115f40c7a3999e3cbe705a2ff9cf0fd493f80fb 15-Nov-2013 Michal Zidek <mzidek@redhat.com>

SYSDB: Drop the sysdb_ctx parameter - module sysdb_ops (part 2)

/sssd-io/src/db/sysdb.h /sssd-io/src/db/sysdb_autofs.c /sssd-io/src/db/sysdb_ops.c /sssd-io/src/db/sysdb_services.c /sssd-io/src/db/sysdb_ssh.c /sssd-io/src/db/sysdb_sudo.c ipa_access.c ipa_hbac_common.c ipa_hbac_hosts.c ipa_hbac_services.c ipa_hbac_users.c ipa_id.c ipa_netgroups.c ipa_s2n_exop.c ipa_subdomains_ext_groups.c /sssd-io/src/providers/krb5/krb5_auth.c /sssd-io/src/providers/ldap/ldap_auth.c /sssd-io/src/providers/ldap/ldap_id.c /sssd-io/src/providers/ldap/ldap_id_cleanup.c /sssd-io/src/providers/ldap/ldap_id_netgroup.c /sssd-io/src/providers/ldap/sdap_async_groups.c /sssd-io/src/providers/ldap/sdap_async_initgroups.c /sssd-io/src/providers/ldap/sdap_async_initgroups_ad.c /sssd-io/src/providers/ldap/sdap_async_nested_groups.c /sssd-io/src/providers/ldap/sdap_async_netgroups.c /sssd-io/src/providers/ldap/sdap_async_users.c /sssd-io/src/providers/ldap/sdap_reinit.c /sssd-io/src/providers/proxy/proxy_auth.c /sssd-io/src/providers/proxy/proxy_id.c /sssd-io/src/providers/proxy/proxy_netgroup.c /sssd-io/src/providers/simple/simple_access_check.c /sssd-io/src/responder/nss/nsssrv_cmd.c /sssd-io/src/responder/pac/pacsrv_cmd.c /sssd-io/src/responder/pac/pacsrv_utils.c /sssd-io/src/responder/pam/pamsrv_cmd.c /sssd-io/src/responder/sudo/sudosrv_get_sudorules.c /sssd-io/src/tests/cmocka/test_nss_srv.c /sssd-io/src/tests/simple_access-tests.c /sssd-io/src/tests/sysdb-tests.c /sssd-io/src/tools/sss_cache.c /sssd-io/src/tools/sss_groupshow.c /sssd-io/src/tools/sss_seed.c /sssd-io/src/tools/sss_sync_ops.c
5cd4414fce1e0eb4133dfc6fc828bf25c8a959f9 24-Sep-2013 Lukas Slebodnik <lslebodn@redhat.com>

Include header file in implementation module. Declarations of public functions was in header files, but header files was not included in implementation file.

/sssd-io/src/providers/ad/ad_domain_info.c /sssd-io/src/providers/ad/ad_srv.c ipa_auth.c ipa_s2n_exop.c ipa_srv.c /sssd-io/src/providers/krb5/krb5_become_user.c /sssd-io/src/providers/krb5/krb5_init_shared.c /sssd-io/src/providers/ldap/ldap_access.c /sssd-io/src/providers/ldap/sdap_async_autofs.c /sssd-io/src/providers/ldap/sdap_async_enum.c /sssd-io/src/providers/ldap/sdap_async_nested_groups.c /sssd-io/src/providers/ldap/sdap_dyndns.c /sssd-io/src/responder/common/negcache.c /sssd-io/src/responder/ssh/sshsrv_dp.c /sssd-io/src/tests/common_check.c /sssd-io/src/util/crypto/libcrypto/crypto_base64.c /sssd-io/src/util/crypto/nss/nss_base64.c /sssd-io/src/util/crypto/nss/nss_util.c /sssd-io/src/util/find_uid.c /sssd-io/src/util/murmurhash3.c /sssd-io/src/util/user_info_msg.c /sssd-io/src/util/usertools.c
83b5a69a90dd74aaef01d48846a5504789a28317 19-Aug-2013 Sumit Bose <sbose@redhat.com>

ipa_s2n_get_user_done: make sure ALIAS name is lower case Fixes https://fedorahosted.org/sssd/ticket/1630

a9a619a4adb00ee60973050297b1b1c57e275016 19-Aug-2013 Sumit Bose <sbose@redhat.com>

ipa_s2n_get_user_done: free group_attrs as well

68c26d9ec785b8af0b45247705b20e82656bfd05 29-Jul-2013 Jakub Hrozek <jhrozek@redhat.com>

Use GID if subdomain is not MPG https://fedorahosted.org/sssd/ticket/2032 In non-MPG subdomains (such as those that manage their IDs manually with POSIX attributes), we need to set the GID ourself.

1987bff88e01c74d647dd2db4f541ac311537e1a 30-May-2013 Jakub Hrozek <jhrozek@redhat.com>

Add utility functions for formatting fully-qualified names Instead of using printf-like functions directly, provide two wrappers that would encapsulate formatting the fully-qualified names. No functional change is present in this patch.

e2f6326ea56217afab7623c542a237ee84eb74da 03-May-2013 Sumit Bose <sbose@redhat.com>

Add SID related lookups to IPA subdomains This patch add the functionality to handle lookup by SIDs and lookups for SIDs to the subdomain branch of the IPA ID provider.

2962b3d1e072ff2ebbe343095812dad697d6bf1d 02-May-2013 Sumit Bose <sbose@redhat.com>

Use struct to hold different types of request parameters Currently the POSIX ID or the user name are passed in different parameters to some calls. The method will get cumbersome and error-prone if new parameters like, e.g. the SID, are added. This patch adds a union to hold the different kind of parameters.

44c379a27a2d8de0ad933ebb2558b5e82b05fd56 02-May-2013 Sumit Bose <sbose@redhat.com>

Remove unused attribute list

6fc4702a3037d9bb5b27bcb58f70edf1802b7b19 10-Apr-2013 Jakub Hrozek <jhrozek@redhat.com>

Allow using flatname for subdomain home dir template https://fedorahosted.org/sssd/ticket/1609

233a3c6c48972b177e60d6ef4cecfacd3cf31659 19-Mar-2013 Simo Sorce <simo@redhat.com>

Use common error facility instead of sdap_result Simplifies and consolidates error reporting for ldap authentication paths. Adds 3 new error codes: ERR_CHPASS_DENIED - Used when password constraints deny password changes ERR_ACCOUNT_EXPIRED - Account is expired ERR_PASSWORD_EXPIRED - Password is expired

9f37bb2012faa136ef7c1f9fe93689ce2be85637 13-Mar-2013 Ondrej Kos <okos@redhat.com>

Fix initialization of multiple variables

2cbb879c517f2c756a2eb3962527979bac01ddab 10-Feb-2013 Stephen Gallagher <sgallagh@redhat.com>

NSS: Add original homedir to home directory template options https://fedorahosted.org/sssd/ticket/1805

99c0cfdc5f065ba38f1ee91701d1d27f9e4fdb96 15-Jan-2013 Simo Sorce <simo@redhat.com>

Add domain argument to sysdb_store_group() Also remove sysdb_store_domgroup()

6ac396bebb4cd3124711d26dce54263f6f9c7c45 15-Jan-2013 Simo Sorce <simo@redhat.com>

Add domain argument to sysdb_store_user() Also remove sysdb_store_domuser()

8d9e0547a864cee05ab36bc988300c0cfa986025 19-Nov-2012 Simo Sorce <simo@redhat.com>

Refactor the way subdomain accounts are saved The original sysdb code had a strong assumption that only users from one domain are saved in the databse, with the subdomain feature, we have changed reality, but have not adjusted all the code arund the sysdb calls to not rely on the original assumption. One of the side effects of this incongrunece is that currently group memberships do not return fully qualified names for subdomain users as they should. In oreder to fix this and other potential issues surrounding the violation of the original assumption, we need to fully qualify subdomain user names. By savin them fully qualified we do not risk aliasing local users and have group memberhips or other name based matching code mistake a domain user with subdomain usr or vice versa.

ac7a7ee3d1e138818a1ed78758f7dd3c3306a56b 26-Oct-2012 Sumit Bose <sbose@redhat.com>

Make sub-domains case-insensitive Currently the only type of supported sub-domains are AD domains which are not case-sensitive. To make it easier for Windows user we make sub-domains case-insensitive as well which allows to write the username in any case at the login prompt. If support for other types of sub-domains is added it might be necessary to set the case-sensitive flag based on the domain type.

4cf3bc3b94ccf1e60d29c0eb765f02cb49fbac2d 26-Oct-2012 Sumit Bose <sbose@redhat.com>

subdomain-id: Generate homedir only for users not groups

70eaade10feedd7845e39170d0b7eebf3a030af1 12-Oct-2012 Sumit Bose <sbose@redhat.com>

Allow extdom exop to return flat domain name as well There are case where the extdom extended operation will return the flat or NetBIOS name of a domain instead of the DNS domain name. If this name is available for the current domain we accept it as well. Related to https://fedorahosted.org/sssd/ticket/1561

36a12aea020a935ffa40505fa02860c3d921ad0c 24-Apr-2012 Sumit Bose <sbose@redhat.com>

Add s2n extended operation